- 21 Aug, 2018 15 commits
-
-
Nick Mathewson authored
We used to link both libraries at once, but now that I'm working on TLS, there's nothing left to keep OpenSSL around for when NSS is enabled. Note that this patch causes a couple of places that still assumed OpenSSL to be disabled when NSS is enabled - tor-gencert - pbkdf2
-
Nick Mathewson authored
Also, add a stubbed-out nss version of the modules. The tests won't pass with NSS yet since the NSS modules don't do anything. This is a good patch to read with --color-moved.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This cleans up a lot of junk from crypto_rsa_openssl, and will save us duplicated code in crypto_rsa_nss (when it exists). (Actually, it already exists, but I am going to use git rebase so that this commit precedes the creation of crypto_rsa_nss.)
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
These functions exist only to expose RSA keys to other places in Tor that use OpenSSL; let's be specific about their purpose.
-
Nick Mathewson authored
-
Nick Mathewson authored
It is not nice to expose a private key's contents without having the function name advertise the fact. Fortunately, we weren't misusing these yet.
-
Nick Mathewson authored
-
- 14 Aug, 2018 1 commit
-
-
Nick Mathewson authored
-
- 08 Aug, 2018 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 02 Aug, 2018 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 31 Jul, 2018 18 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
(We do this unconditionally, since we still need it for tortls.c)
-
Nick Mathewson authored
Notably, there's a test to make sure that it round-trips with OpenSSL, if OpenSSL is enabled.
-
Nick Mathewson authored
-
Nick Mathewson authored
We only ever need this to get us a DH ephemeral key object, so make a function that does just that.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This is comparatively straightforward too, except for a couple of twists: * For as long as we're building with two crypto libraries, we want to seed _both_ their RNGs, and use _both_ their RNGs to improve the output of crypto_strongest_rand() * The NSS prng will sometimes refuse to generate huge outputs. When it does, we stretch the output with SHAKE. We only need this for the tests.
-
Nick Mathewson authored
-
Nick Mathewson authored
This was a fairly straightforward port, once I realized which layer I should be calling into.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-