Christian Grothoff
eaf9d728f5
more crypto refactoring
2021-11-05 22:48:11 +01:00
Christian Grothoff
ba627bf84c
-fixes
2021-11-05 22:22:47 +01:00
Christian Grothoff
3eae999efc
distinguish between blind and non-blind denomination signatures
2021-10-31 17:56:56 +01:00
Christian Grothoff
f0951d34dd
-fix more FTBFS
2021-10-27 09:23:13 +02:00
Christian Grothoff
fc371ea18b
start to work on transformation
2021-10-27 09:23:11 +02:00
Christian Grothoff
e1e9250ff7
add check for sufficiently recent version of libgnunetutil, remove now unnecessary crypto blinding logic
2020-12-25 08:44:57 +01:00
Christian Grothoff
699916056b
misc doxygen fixes
2020-12-20 17:10:09 +01:00
82813b337c
copy (un)blinding logic from GNUnet
2020-12-04 12:25:58 +01:00
d3b714922f
conditionally use (un)blinding implementation from libgnunetutil
2020-12-04 12:10:09 +01:00
Christian Grothoff
00350bc228
remove c_hash from planchet detail where it does not logically belong
2020-04-12 16:44:28 +02:00
Christian Grothoff
3404fda463
typos
2020-03-31 20:57:11 +02:00
Christian Grothoff
c597af8334
adjust types to match latest GNUnet API
2020-03-17 01:09:16 +01:00
Christian Grothoff
ffcadbff8c
code cleanup (comments, scoping, naming, indentation)
2020-03-07 00:28:07 +01:00
Christian Grothoff
f979ee9aca
add ENABLE_SANITY_CHECKS #define instead of using '1'
2020-03-01 13:13:33 +01:00
Christian Grothoff
59398cfd76
separate util.c and url.c
2020-01-19 20:33:07 +01:00
Christian Grothoff
5146d62b14
doxygen
2020-01-18 14:16:40 +01:00
Florian Dold
499cff87bf
remove patch_private_key, as it doesn't make any sense
...
In particular, we were patching the EdDSA private keys, which are
*hashed* before doing the curve multiplication. Thus clearing the bits
*before* the hashing doesn't make any sense at all. These bits are
cleared anyway when deriving the public key.
2019-11-28 00:24:05 +01:00
Christian Grothoff
385b3e77df
tighten formatting rules
2019-10-31 12:59:50 +01:00
Christian Grothoff
b9dee3a1d5
fix compiler warnings, add assertions
2019-09-05 11:11:30 +02:00
Florian Dold
eb55997084
re-format code
2019-08-25 16:18:24 +02:00
Christian Grothoff
de9fdf860a
replace denom_pub with denom_pub_hash in exchange API to reduce bandwidth
2019-05-02 21:16:51 +02:00
Christian Grothoff
499247a480
fixing #5178
2017-11-29 20:23:08 +01:00
Christian Grothoff
2f2930f1ba
major API refactoring, adding planchet generation and coin extraction APIs to the Taler crypto library, thereby simplifying code in withdraw, refresh, tipping, payback and testcases; slight API incompatibilities to previous versions are introduced
2017-10-31 14:02:54 +01:00
Christian Grothoff
ec8146de92
rename: TALER_setup_planchet -> TALER_planchet_setup_refresh
2017-10-31 12:44:17 +01:00
Christian Grothoff
a491a4709a
rename: TALER_FreshCoinP -> TALER_PlanchetSecretsP, and TALER_setup_fresh_coin -> TALER_setup_planchet
2017-10-31 12:38:14 +01:00
Christian Grothoff
1e30d60a25
fixing misc doxygen issues
2017-06-04 11:30:43 +02:00
Christian Grothoff
487237381d
fix misc doxygen issues
2017-04-20 07:49:56 +02:00
Jeff Burdges
3115c6acc6
Kinda seems to work
2016-08-11 22:18:04 +02:00
Jeff Burdges
1f39f7e92b
This might fix the compile error
2016-08-11 21:28:48 +02:00
Jeff Burdges
cdcd67a27d
Use KDF better
...
We now send the secret_seed to the skm variable, while sending the
counter salt to the xts variable. I have not check this with
http://eprint.iacr.org/2010/264 but it seems correct.
Indeed rsa_blinding_key_derive places the strong source of
randomness in skm too, and uses a constant string for xts.
2016-08-08 12:43:59 +02:00
Jeff Burdges
7958464696
Copy bit twiddling from libgcrypt/cipher/ecc.c
...
Reversed order buisness agrees with KC's experence from gnunet-rs
2016-08-08 10:38:07 +02:00
Christian Grothoff
745719dbc1
first half of changing refresh protocol to derive all key data from DH
2016-08-05 16:08:19 +02:00
Marcello Stanisci
59c6856284
fixing #4594
2016-07-07 17:55:25 +02:00
Christian Grothoff
32bb3b14bf
fix #4483
2016-05-24 20:13:31 +02:00
Christian Grothoff
80f6c4240e
-fix (C) notices
2016-01-19 14:39:00 +01:00
Christian Grothoff
c6f88ebd61
doxygen-fixes
2015-08-09 15:40:16 +02:00
Christian Grothoff
00d613728f
completing TALER_MINT_refresh_melt implementation
2015-08-08 19:52:05 +02:00
Christian Grothoff
3eddd802dc
-fix ftbfs in wallet-only mode
2015-07-15 11:40:51 +02:00
Christian Grothoff
401745fc30
-include wallet headers if compiling wallet library
2015-06-02 12:52:05 +02:00
Christian Grothoff
7b4623706c
Merge branch 'master' of git+ssh://taler.net/var/git/mint
2015-05-18 18:53:12 +02:00
Christian Grothoff
cb68cc7e5b
fix reporting in constructor
2015-05-18 18:52:52 +02:00
Christian Grothoff
25e530f37a
add test for varsize pq operation
2015-05-17 16:46:16 +02:00
Christian Grothoff
21da34a501
-fix doxygen errors
2015-05-16 18:26:34 +02:00
Christian Grothoff
f4a59d1ccc
eliminating ECDSA, replacing with EdDSA-ECDHE-combo in transfer protocol
2015-05-16 14:15:34 +02:00
Christian Grothoff
95f99d32dd
minor bugfixes
2015-05-01 09:59:18 +02:00
Christian Grothoff
e226e5c350
implementing TALER_refresh_link_encrypted_encode, and adding test
2015-04-18 13:08:19 +02:00
Christian Grothoff
0a0feeea86
finish #3777 including testing
2015-04-15 18:34:14 +02:00
Christian Grothoff
97e403bb66
moving core refresh crypto logic to util -- towards fixing #3777
2015-04-15 18:12:21 +02:00
Christian Grothoff
1fcd1873f0
basic tests for crypto functions
2015-04-13 18:57:37 +02:00
Christian Grothoff
2f6a4bb11c
rename TALER_RefreshLinkDecryptedP to TALER_RefreshLinkDecrypted as it contains a pointer and is thus not (P)acked
2015-04-13 18:42:39 +02:00