aboutsummaryrefslogtreecommitdiff
path: root/contrib/epee/include/hex.h (unfollow)
AgeCommit message (Collapse)AuthorFilesLines
2020-03-09Move hex->bin conversion to monero copyright files and with less includesLee Clagett1-3/+14
2020-03-05Various improvements to the ZMQ JSON-RPC handling:Lee Clagett1-1/+11
- Finding handling function in ZMQ JSON-RPC now uses binary search - Temporary `std::vector`s in JSON output now use `epee::span` to prevent allocations. - Binary -> hex in JSON output no longer allocates temporary buffer - C++ structs -> JSON skips intermediate DOM creation, and instead write directly to an output stream.
2019-03-05Update 2019 copyrightbinaryFate1-1/+1
2019-03-05epee: add SSL supportMartijn Otto1-0/+7
RPC connections now have optional tranparent SSL. An optional private key and certificate file can be passed, using the --{rpc,daemon}-ssl-private-key and --{rpc,daemon}-ssl-certificate options. Those have as argument a path to a PEM format private private key and certificate, respectively. If not given, a temporary self signed certificate will be used. SSL can be enabled or disabled using --{rpc}-ssl, which accepts autodetect (default), disabled or enabled. Access can be restricted to particular certificates using the --rpc-ssl-allowed-certificates, which takes a list of paths to PEM encoded certificates. This can allow a wallet to connect to only the daemon they think they're connected to, by forcing SSL and listing the paths to the known good certificates. To generate long term certificates: openssl genrsa -out /tmp/KEY 4096 openssl req -new -key /tmp/KEY -out /tmp/REQ openssl x509 -req -days 999999 -sha256 -in /tmp/REQ -signkey /tmp/KEY -out /tmp/CERT /tmp/KEY is the private key, and /tmp/CERT is the certificate, both in PEM format. /tmp/REQ can be removed. Adjust the last command to set expiration date, etc, as needed. It doesn't make a whole lot of sense for monero anyway, since most servers will run with one time temporary self signed certificates anyway. SSL support is transparent, so all communication is done on the existing ports, with SSL autodetection. This means you can start using an SSL daemon now, but you should not enforce SSL yet or nothing will talk to you.
2018-09-12wipeable_string: add hex_to_pod functionmoneromooo-monero1-0/+1
2018-08-16wallet: wipe seed from memory where appropriatemoneromooo-monero1-0/+5
2018-01-26Readd copyright starting datexmr-eric1-1/+1
2018-01-26Update 2018 copyrightxmr-eric1-1/+1
2017-04-11Simplified the implementation and features of spanLee Clagett1-20/+7
2017-04-11Improvements for epee binary to hex functions:Lee Clagett1-31/+44
- Performance improvements - Added `span` for zero-copy pointer+length arguments - Added `std::ostream` overload for direct writing to output buffers - Removal of unused `string_tools::buff_to_hex`
2017-02-27node_rpc_proxy: allow caching daemon RPC versionmoneromooo-monero1-0/+2
2017-02-27wallet: invalidate node proxy cache when reconnectingmoneromooo-monero1-0/+2
2017-01-25Updates to epee HTTP client codeLee Clagett1-5/+1
- http_simple_client now uses std::chrono for timeouts - http_simple_client accepts timeouts per connect / invoke call - shortened names of epee http invoke functions - invoke command functions only take relative path, connection is not automatically performed
2017-01-16wallet: add a node RPC cache layer for simple RPC callsmoneromooo-monero1-34/+28
Mostly getinfo and get_hard_fork_info, which are called pretty often. This speeds up transfers as a bonus.
2015-12-31updated copyright yearRiccardo Spagni1-1/+1
2015-10-27common: const and init list pedantrymoneromooo-monero1-1/+2
2015-05-31cleaning up, removing redundant files, renaming, fixing incorrect licensesRiccardo Spagni1-0/+28
2015-02-24Daemonize changes pulled in -- daemon buildsThomas Winget1-0/+42
many RPC functions added by the daemonize changes (and related changes on the upstream dev branch that were not merged) were commented out (apart from return). Other than that, this *should* work...at any rate, it builds, and that's something.