- May 08, 2016
-
-
Isis Lovecruft authored
-
Isis Lovecruft authored
* THANKS TO Yawning Angel for suggesting the clarification.
-
Isis Lovecruft authored
* THANKS TO eikovi@sigaint.org for pointing them out.
-
- May 06, 2016
-
-
Isis Lovecruft authored
-
- Apr 13, 2016
-
-
- Apr 08, 2016
-
-
George Kadianakis authored
Too complex and not sufficient gain. For full rationale, please see thread: https://lists.torproject.org/pipermail/tor-dev/2016-March/010560.html
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
- Kill last remnants of TAP from the proposal. - Replace SHA256 with SHA3-256 and our KDF with SHAKE. - Make the INTRO_ESTABLISHED cell extensible. - Improve the descriptor format a bit. - Don't be ambiguous about "INTRODUCE" cells (pointed out by malekbr). - Cleanup the scaling section.
-
John Brooks authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
- Apr 06, 2016
-
-
David Goulet authored
Base64 holds 6 bits, not 5. Patch from twim. Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
- Mar 21, 2016
-
-
Nick Mathewson authored
-
- Mar 15, 2016
-
-
Nick Mathewson authored
-
Nick Mathewson authored
(Note that no corresponding tor change is needed, since we don't actually use these keys yet.) Resolves 17668.{S1,T1}
-
- Mar 11, 2016
-
-
Roger Dingledine authored
-
- Feb 28, 2016
-
-
Isis Lovecruft authored
-
- Feb 25, 2016
-
-
Nick Mathewson authored
-
- Feb 23, 2016
-
-
Nick Mathewson authored
-
- Feb 21, 2016
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Feb 19, 2016
-
-
Nick Mathewson authored
-
- Feb 15, 2016
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
- Feb 12, 2016
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Feb 10, 2016
-
-
Isis Lovecruft authored
After the following development meeting discussing this proposal: http://meetbot.debian.net/tor-dev/2016/tor-dev.2016-02-04-13.28.html These changes were sent to tor-dev@lists.torproject.org: https://lists.torproject.org/pipermail/tor-dev/2016-February/010379.html
-
- Feb 09, 2016
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
- Feb 05, 2016
-
-
George Kadianakis authored
- Remove ed25519 keys completely. Use RSA keys for referencing. - Replace SHA256 with SHA3-256 (Keccak). - Specify better the format and contents of TIMESTAMP. - Put TIMESTAMP in the front of COMMIT for symmetry with REVEAL. - Use base64 not base32. - Specify what happens when PREVIOUS_SRV is unknown. - Remove some paragraphs that are no longer valid. - Simplify consistent ordering in HASHED_REVEALS. - Put algorithm name first on disk and commit.
-
- Feb 04, 2016
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Jan 24, 2016
-
-
teor (Tim Wilson-Brown) authored
-
teor (Tim Wilson-Brown) authored
Update the directory spec to describe client behaviour with default fallback directory mirrors after #15775 and #4483.
-
- Jan 18, 2016
-
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-