1. 21 Aug, 2018 1 commit
    • Nick Mathewson's avatar
      When enabling NSS, disable OpenSSL. · 6a88d8f6
      Nick Mathewson authored
      We used to link both libraries at once, but now that I'm working on
      TLS, there's nothing left to keep OpenSSL around for when NSS is
      Note that this patch causes a couple of places that still assumed
      OpenSSL to be disabled when NSS is enabled
         - tor-gencert
         - pbkdf2
  2. 31 Jul, 2018 1 commit
    • Nick Mathewson's avatar
      Use NSS in crypto_rand.c · 60705a57
      Nick Mathewson authored
      This is comparatively straightforward too, except for a couple of
         * For as long as we're building with two crypto libraries, we
           want to seed _both_ their RNGs, and use _both_ their RNGs to
           improve the output of crypto_strongest_rand()
         * The NSS prng will sometimes refuse to generate huge outputs.
           When it does, we stretch the output with SHAKE.  We only need
           this for the tests.
  3. 10 Jul, 2018 2 commits
  4. 28 Jun, 2018 2 commits
  5. 27 Jun, 2018 2 commits
  6. 22 Jun, 2018 3 commits
  7. 21 Jun, 2018 3 commits
  8. 20 Jun, 2018 1 commit
  9. 07 May, 2018 1 commit
    • Taylor Yu's avatar
      Restore sys/random.h inclusion for getentropy() · 9326abe1
      Taylor Yu authored
      Code movement for the refactoring for ticket 24658 didn't copy the
      inclusion of sys/random.h, which is needed to get a prototype for
      getentropy() on macOS 10.12 Sierra.  It also didn't copy the inclusion
      of sys/syscall.h, which might prevent the getrandom() syscall from
      being properly detected.  Move these inclusions.  Bug not in any
      released Tor.
  10. 03 May, 2018 1 commit
  11. 06 Apr, 2018 1 commit