Age | Commit message (Collapse) | Author | |
---|---|---|---|
2022-02-04 | fixed CS signatures and cleanup/refactoring | Gian Demarmels | |
2022-02-04 | add sign and verify implementation | Gian Demarmels | |
2022-02-04 | sign_blinded implementation | Gian Demarmels | |
2022-02-04 | implemented planchet_prepare for CS | Gian Demarmels | |
2022-02-04 | added CS get R functionality and planchet setup | Gian Demarmels | |
2022-02-04 | CS planchet create and withdraw create | Gian Demarmels | |
2022-02-04 | added CS data structures, implemented CS keypair | Gian Demarmels | |
2021-11-25 | -fix | Christian Grothoff | |
2021-11-16 | [age restriction] progress 3/n | Özgür Kesim | |
- remove redundant struct members for age commitment hash - undo pre-mature implementation in taler-exchange-secmod-rsa.c - carry through age restriction parameter for TALER_denom_blind | |||
2021-11-14 | age restriction (load per denomination). 3/n | Özgür Kesim | |
2021-11-10 | age restriction progress 2/n | Özgür Kesim | |
Signed-off-by: Özgür Kesim <oec-taler@kesim.org> | |||
2021-11-06 | RSA-despecialization | Christian Grothoff | |
2021-11-05 | more crypto refactoring | Christian Grothoff | |
2021-11-05 | more crypto refactoring | Christian Grothoff | |
2021-11-05 | -fixes | Christian Grothoff | |
2021-10-31 | distinguish between blind and non-blind denomination signatures | Christian Grothoff | |
2021-10-27 | -fix more FTBFS | Christian Grothoff | |
2021-10-27 | start to work on transformation | Christian Grothoff | |
2020-12-25 | add check for sufficiently recent version of libgnunetutil, remove now ↵ | Christian Grothoff | |
unnecessary crypto blinding logic | |||
2020-12-20 | misc doxygen fixes | Christian Grothoff | |
2020-12-04 | copy (un)blinding logic from GNUnet | Florian Dold | |
2020-12-04 | conditionally use (un)blinding implementation from libgnunetutil | Florian Dold | |
2020-04-12 | remove c_hash from planchet detail where it does not logically belong | Christian Grothoff | |
2020-03-31 | typosCodeBlau-NGI-2019 | Christian Grothoff | |
2020-03-17 | adjust types to match latest GNUnet API | Christian Grothoff | |
2020-03-07 | code cleanup (comments, scoping, naming, indentation) | Christian Grothoff | |
2020-03-01 | add ENABLE_SANITY_CHECKS #define instead of using '1' | Christian Grothoff | |
2020-01-19 | separate util.c and url.c | Christian Grothoff | |
2020-01-18 | doxygen | Christian Grothoff | |
2019-11-28 | remove patch_private_key, as it doesn't make any sense | Florian Dold | |
In particular, we were patching the EdDSA private keys, which are *hashed* before doing the curve multiplication. Thus clearing the bits *before* the hashing doesn't make any sense at all. These bits are cleared anyway when deriving the public key. | |||
2019-10-31 | tighten formatting rules | Christian Grothoff | |
2019-09-05 | fix compiler warnings, add assertions | Christian Grothoff | |
2019-08-25 | re-format code | Florian Dold | |
2019-05-02 | replace denom_pub with denom_pub_hash in exchange API to reduce bandwidth | Christian Grothoff | |
2017-11-29 | fixing #5178 | Christian Grothoff | |
2017-10-31 | major API refactoring, adding planchet generation and coin extraction APIs ↵ | Christian Grothoff | |
to the Taler crypto library, thereby simplifying code in withdraw, refresh, tipping, payback and testcases; slight API incompatibilities to previous versions are introduced | |||
2017-10-31 | rename: TALER_setup_planchet -> TALER_planchet_setup_refresh | Christian Grothoff | |
2017-10-31 | rename: TALER_FreshCoinP -> TALER_PlanchetSecretsP, and ↵ | Christian Grothoff | |
TALER_setup_fresh_coin -> TALER_setup_planchet | |||
2017-06-04 | fixing misc doxygen issues | Christian Grothoff | |
2017-04-20 | fix misc doxygen issues | Christian Grothoff | |
2016-08-11 | Kinda seems to work | Jeff Burdges | |
2016-08-11 | This might fix the compile error | Jeff Burdges | |
2016-08-08 | Use KDF better | Jeff Burdges | |
We now send the secret_seed to the skm variable, while sending the counter salt to the xts variable. I have not check this with http://eprint.iacr.org/2010/264 but it seems correct. Indeed rsa_blinding_key_derive places the strong source of randomness in skm too, and uses a constant string for xts. | |||
2016-08-08 | Copy bit twiddling from libgcrypt/cipher/ecc.c | Jeff Burdges | |
Reversed order buisness agrees with KC's experence from gnunet-rs | |||
2016-08-05 | first half of changing refresh protocol to derive all key data from DH | Christian Grothoff | |
2016-07-07 | fixing #4594 | Marcello Stanisci | |
2016-05-24 | fix #4483 | Christian Grothoff | |
2016-01-19 | -fix (C) notices | Christian Grothoff | |
2015-08-09 | doxygen-fixes | Christian Grothoff | |
2015-08-08 | completing TALER_MINT_refresh_melt implementation | Christian Grothoff | |