Commit graph

80 commits

Author SHA1 Message Date
Jeff Becker 4cc3b7f9fb restructure build to separate the 3 main components into 3 subdirectories
libi2pd for core libs

libi2pd_client for i2pd client libs

daemon for i2pd daemon libs
2017-04-21 06:33:45 -04:00
orignal fa1965deb4 assign signature types 8 and 9 to GOST R 34.10 2017-03-31 10:04:39 -04:00
orignal 69804c23f1 check if destination keys are correct 2017-03-25 16:53:20 -04:00
orignal bd2c2acd5f use CryptoProA params for GOST R 34.10-2012 256 bits 2017-03-21 11:48:34 -04:00
orignal 726828a487 use GOST 34.11-2012 with GOST 34.10 2017-03-20 11:57:39 -04:00
orignal 6b9a270506 enable TC26 paramSet A 512 for GOST 34.10-2012 2017-03-15 12:41:02 -04:00
orignal 6369a900da added TC26 param sets for GOST R 34.10-2012 2017-03-14 20:03:44 -04:00
orignal e877247032 support of GOST 34.10-2012 512 bits 2017-03-14 16:41:06 -04:00
orignal bd8cdd345a A,B,B param sets for GOST R 34.10 2017-03-10 16:57:56 -05:00
orignal ba89c60b6d correct param set for GOST R 34.10 verification 2017-03-10 11:55:30 -05:00
orignal cd860bfbf8 correct param set for GOST R 34.10 signing 2017-03-09 21:46:34 -05:00
orignal 145e36925f check certificate size 2017-02-23 22:08:25 -05:00
orignal 83b9b3bf4a enable GOST R 34.10 signatures from netid!=2 2017-02-19 18:08:10 -05:00
orignal d83fc3181b EdDSA keys compatible with Java 2017-01-07 21:20:09 -05:00
orignal 447f5f69c9 use AVX for DHT 2016-12-08 15:23:40 -05:00
orignal 6f2357c695 fixed openssl 1.1 crash 2016-11-11 12:44:44 -05:00
orignal 7bff4db483 eliminate potential excessive CPU usage 2016-11-06 09:53:45 -05:00
orignal fbf75ea3b9 check if signer/verifier is set already 2016-10-12 13:28:22 -04:00
orignal f17df1f16d spinlock added 2016-10-11 12:06:40 -04:00
orignal f91f3796a8 make sure verifier gets created once 2016-10-10 08:59:45 -04:00
Jeff Becker 4dc9f6948d
bounds checks 2016-07-25 09:57:35 -04:00
orignal 3907b4101a include openssl through OPENSSL macro 2016-05-11 15:12:38 -04:00
orignal 2ebb2d8f0e fixed race condition 2016-04-06 21:02:58 -04:00
Mikhail Titov 74827cd8cf Workaround c++11 dynamic array for MSVC 2016-03-10 14:20:40 -06:00
orignal 6f0a136727 some cleanup 2016-02-08 20:29:34 -05:00
Jeff Becker babcbcbcea
use const size_t instead of size_t 2016-02-05 12:32:50 -05:00
Jeff Becker d4febb4e84
* bounds check on Identity::FromBuffer
* properly indet last commits
2016-02-05 08:52:07 -05:00
Jeff Becker d0ea59c568
add base64 buffer encoding bounds checking 2016-02-05 08:44:09 -05:00
orignal 64b2a32c9a #343. check for malformed messages 2016-02-02 11:55:38 -05:00
orignal 5487fad2ce fixed race conditin 2016-01-10 18:55:00 -05:00
orignal 26d305d866 fixed misalignment of certificate length 2016-01-09 17:26:17 -05:00
hagen ca375314f0 * sane log messages: Identity.cpp 2015-12-21 03:00:12 +00:00
orignal 62cf83921b cumulative update from bitbucket 2015-11-03 09:15:49 -05:00
orignal 01913d2b14 EdDSA signer added 2015-04-09 10:03:21 -04:00
orignal 48289845df EdDSA signature type added 2015-04-08 16:28:52 -04:00
orignal 454f2dabbd EdDSA signature type added 2015-04-08 16:18:16 -04:00
orignal 1d737409ec fill padding with random data 2015-03-14 17:15:23 -04:00
orignal 3e13a1feed long ElGamal private key 2015-01-05 19:32:46 -05:00
Francisco Blas (klondike) Izquierdo Riera 700c53e60a Fix any remaning aliasing rules with propper memcpy wrappers 2014-12-30 15:37:24 +01:00
Francisco Blas (klondike) Izquierdo Riera 1636187e26 Avoid aliasing problems by using special buf endian handling functions wrapping memcpy 2014-12-29 23:04:02 +01:00
orignal 0ee7f02f51 extend temporary buffer size to 1024 2014-12-11 12:22:22 -05:00
orignal 9438f388ad copy private signing key of proper size 2014-12-10 22:38:01 -05:00
orignal 0b3ee77717 RSA signatures 2014-12-10 21:31:06 -05:00
orignal 4c8d85870b check identity buffer size 2014-12-04 19:28:20 -05:00
orignal 3d0349191d fixed memory corruption 2014-12-03 21:00:25 -05:00
orignal 9acf80e563 from/to base64 2014-12-01 14:50:10 -05:00
orignal f7d90648e3 drop verifier not used anymore 2014-11-26 10:28:06 -05:00
orignal 4778c8bdfb fixed excess data for P521 2014-11-24 21:48:01 -05:00
orignal 9574163aeb fixed incorrect certificate length 2014-11-24 21:23:12 -05:00
orignal 199ff0c210 ECDSA P384 and ECDSA P521 support 2014-11-24 20:19:13 -05:00