- Feb 21, 2019
-
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
boklm tracked this down, and it doesn't make sense. It caused This change goes back to the previous LDFLAGS line.
-
- Feb 20, 2019
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Feb 19, 2019
-
-
Nick Mathewson authored
Fixes bug 29530, where the LOG_ERR messages were occurring when we had no configured network, and so we were failing the unit tests because of the recently-merged #28668. Bug not in any released Tor.
-
Nick Mathewson authored
This test fails in some environments; since the code isn't used in 0.4.0, let's disable it for now. Band-aid solution for #29534; bug not in any released Tor.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
malloc_options needs to be declared extern (and declaring it extern means we need to initialize it separately) Fixes bug 29145; bugfix on 0.2.9.3-alpha Signed-off-by:
Kris Katterjohn <katterjohn@gmail.com>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Signed-off-by:
José M. Guisado <guigom@riseup.net>
-
Nick Mathewson authored
-
- Feb 17, 2019
-
-
Roger Dingledine authored
introduced in 85542ee5 next step is to fix it in torspec too
-
Roger Dingledine authored
-
- Feb 16, 2019
-
-
Neel Chauhan authored
-
- Feb 15, 2019
-
-
rl1987 authored
-
- Feb 14, 2019
-
-
Closes #29508 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
-
George Kadianakis authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This module is currently implemented to use the same technique as libottery (later used by the bsds' arc4random replacement), using AES-CTR-256 as its underlying stream cipher. It's backtracking- resistant immediately after each call, and prediction-resistant after a while. Here's how it works: We generate psuedorandom bytes using AES-CTR-256. We generate BUFLEN bytes at a time. When we do this, we keep the first SEED_LEN bytes as the key and the IV for our next invocation of AES_CTR, and yield the remaining BUFLEN - SEED_LEN bytes to the user as they invoke the PRNG. As we yield bytes to the user, we clear them from the buffer. Every RESEED_AFTER times we refill the buffer, we mix in an additional SEED_LEN bytes from our strong PRNG into the seed. If the user ever asks for a huge number of bytes at once, we pull SEED_LEN bytes from the PRNG and use them with our stream cipher to fill the user's request.
-
Nick Mathewson authored
test_crypto.c is pretty big; it wouldn't hurt to split it up some more before I start adding stuff to the PRNG tests.
-
Nick Mathewson authored
This is the second part of refactoring the random-int-in-range code.
-
George Kadianakis authored
until #29298 is implemented.
-
- Feb 13, 2019
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-