- 18 Jan, 2012 1 commit
-
-
Nick Mathewson authored
Fixes bug 4893. These changes are pure mechanical, and were generated with this perl script: /usr/bin/perl -w -i.bak -p s/crypto_pk_env_t/crypto_pk_t/g; s/crypto_dh_env_t/crypto_dh_t/g; s/crypto_cipher_env_t/crypto_cipher_t/g; s/crypto_digest_env_t/crypto_digest_t/g; s/aes_free_cipher/aes_cipher_free/g; s/crypto_free_cipher_env/crypto_cipher_free/g; s/crypto_free_digest_env/crypto_digest_free/g; s/crypto_free_pk_env/crypto_pk_free/g; s/_crypto_dh_env_get_dh/_crypto_dh_get_dh/g; s/_crypto_new_pk_env_rsa/_crypto_new_pk_from_rsa/g; s/_crypto_pk_env_get_evp_pkey/_crypto_pk_get_evp_pkey/g; s/_crypto_pk_env_get_rsa/_crypto_pk_get_rsa/g; s/crypto_new_cipher_env/crypto_cipher_new/g; s/crypto_new_digest_env/crypto_digest_new/g; s/crypto_new_digest256_env/crypto_digest256_new/g; s/crypto_new_pk_env/crypto_pk_new/g; s/crypto_create_crypto_env/crypto_cipher_new/g; s/connection_create_listener/connection_listener_new/g; s/smartlist_create/smartlist_new/g; s/transport_create/transport_new/g;
-
- 10 Jan, 2012 4 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
To solve bug 4779, we want to avoid OpenSSL 1.0.0's counter mode. But Fedora (and maybe others) lie about the actual OpenSSL version, so we can't trust the header to tell us if it's safe. Instead, let's do a run-time test to see whether it's safe, and if not, use our built-in version. fermenthor contributed a pretty essential fixup to this patch. Thanks!
-
Nick Mathewson authored
It's a pain to convert 0x0090813f to and from 0.9.8s-release on the fly, so these macros should help.
-
- 28 Dec, 2011 1 commit
-
-
Nick Mathewson authored
Previously we required 1.0.0, but there was a bug in the 1.0.0 counter mode. Found by Pascal. Fixes bug 4779. A more elegant solution would be good here if somebody has time to code one.
-
- 25 Nov, 2011 2 commits
-
-
Nick Mathewson authored
This shaves about 7% off our per-cell AES crypto time for me; the effect for accelerated AES crypto should be even more, since the AES calculation itself will make an even smaller portion of the counter-mode performance. (We don't want to do this for pre-1.0.0 OpenSSL, since our AES_CTR implementation was actually faster than OpenSSL's there, by about 10%.) Fixes issue #4526.
-
Nick Mathewson authored
Fixes bug 4525, fix on 0.2.3.8-alpha.
-
- 11 Nov, 2011 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This thing was pretty pointless on versions of OpenSSL 0.9.8 and later, and almost totally pointless on OpenSSL 1.0.0. Also, favor EVP by default, since it lets us get hardware acceleration where present. (See issue 4442)
-
- 16 Mar, 2011 1 commit
-
-
Nick Mathewson authored
About 860 doxygen-less things remain in 0.2.2
-
- 03 Jan, 2011 1 commit
-
-
Nick Mathewson authored
-
- 15 Oct, 2010 1 commit
-
-
Nick Mathewson authored
The old comment was from before I tried a huge pile of crazy stuff to make the inner loop faster. Short answer: GCC already knows how to unroll loops pretty well. Other short answer: we should have made the relay payload size an even multiple of 4, 8, or ideally 16.
-
- 10 Jul, 2010 1 commit
-
-
Nick Mathewson authored
This should make us conflict less with system files named "log.h". Yes, we shouldn't have been conflicting with those anyway, but some people's compilers act very oddly. The actual change was done with one "git mv", by editing Makefile.am, and running find . -name '*.[ch]' | xargs perl -i -pe 'if (/^#include.*\Wlog.h/) {s/log.h/torlog.h/; }'
-
- 27 Feb, 2010 1 commit
-
-
Nick Mathewson authored
-
- 26 Feb, 2010 1 commit
-
-
Sebastian Hahn authored
We used to only zero the first ptrsize bytes of the cipher. Since cipher is large enough, we didn't zero too many bytes. Discovered and fixed by ekir. Fixes bug 1254.
-
- 22 Feb, 2010 1 commit
-
-
Sebastian Hahn authored
We used to only zero the first ptrsize bytes of the cipher. Since cipher is large enough, we didn't zero too many bytes. Discovered and fixed by ekir. Fixes bug 1254.
-
- 12 Dec, 2009 1 commit
-
-
Sebastian Hahn authored
Some *_free functions threw asserts when passed NULL. Now all of them accept NULL as input and perform no action when called that way. This gains us consistence for our free functions, and allows some code simplifications where an explicit null check is no longer necessary.
-
- 27 May, 2009 1 commit
-
-
Nick Mathewson authored
-
- 04 May, 2009 1 commit
-
-
- 02 May, 2009 1 commit
-
-
Karsten Loesing authored
-
- 04 Jan, 2009 1 commit
-
-
Nick Mathewson authored
The subversion $Id$ fields made every commit force a rebuild of whatever file got committed. They were not actually useful for telling the version of Tor files in the wild. svn:r17867
-
- 11 Mar, 2008 1 commit
-
-
Nick Mathewson authored
Make some assert()s into tor_assert()s. Make some tor_assert()s called from logging into assert()s, and document why. svn:r13977
-
- 21 Feb, 2008 1 commit
-
-
Roger Dingledine authored
svn:r13649
-
- 12 Feb, 2008 1 commit
-
-
Nick Mathewson authored
Re-tune mempool parametes based on testing on peacetime: use smaller chuncks, free them a little more aggressively, and try very hard to concentrate allocations on fuller chunks. Also, lots of new documentation. svn:r13484
-
- 09 Feb, 2008 1 commit
-
-
Roger Dingledine authored
svn:r13440
-
- 07 Feb, 2008 2 commits
-
-
Nick Mathewson authored
Be more thorough about memory poisoning and clearing. Add an in-place version of aes_crypt in order to remove a memcpy from relay_crypt_one_payload. svn:r13414
-
Nick Mathewson authored
svn:r13412
-
- 12 Dec, 2007 1 commit
-
-
Roger Dingledine authored
svn:r12786
-
- 04 Oct, 2007 1 commit
-
-
Nick Mathewson authored
Add a bunch of function documentation; clean up a little code; fix some XXXXs; tag the nonsensical EXTRAINFO_PURPOSE_GENERAL as nonsesnse; note another bit of "do not cache special routers" code to nuke. svn:r11761
-
- 02 Oct, 2007 1 commit
-
-
Nick Mathewson authored
Make some functions static; remove some dead code. svn:r11750
-
- 20 Sep, 2007 3 commits
-
-
Nick Mathewson authored
Clean up some macros in aes.c svn:r11537
-
Nick Mathewson authored
Re-optimize counter-mode: save about 15% on my core2 by (1) not regenerating the entire counter buffer every time we encrypt a block of keystream (2) using the platform-optimized htonl to convert to big-endian (It's a single instruction on 486 and later ) and (3) not even keeping a separate "counter" and "buffer" when the platform is big-endian. The third still needs testing. svn:r11536
-
Roger Dingledine authored
is what you meant to do. svn:r11529
-
- 19 Sep, 2007 1 commit
-
-
Nick Mathewson authored
Switch our AES implementation from "128 bit counter with to 64 bits set to 0" to a proper implementation of counter mode. Also, add an aes_set_iv function to initialize the counter to a nonzero value. svn:r11518
-
- 01 Mar, 2007 1 commit
-
-
Nick Mathewson authored
Back out insufficiently evidenced FULL_UNROLL in aes.c svn:r9693
-
- 28 Feb, 2007 1 commit
-
-
Nick Mathewson authored
Add some missing (redundant but helpful in most cases) static declarations, and remove a function nobody was calling. svn:r9672
-
- 27 Feb, 2007 2 commits
-
-
Nick Mathewson authored
svn:r9664
-
Nick Mathewson authored
try to make aes encryption of cells about 30-40% faster where applicable. offer not available for all architectures or all versions of openssl. svn:r9663
-