aboutsummaryrefslogtreecommitdiff
path: root/src/crypto/crypto.cpp (follow)
AgeCommit message (Collapse)AuthorFilesLines
2018-11-15Removed a lot of unnecessary includesMartijn Otto1-1/+0
2018-09-11crypto: some paranoid checks in generate_signature/check_signaturemoneromooo-monero1-1/+11
Reported by QuarksLab.
2018-09-11crypto: never return zero in random32_unbiasedmoneromooo-monero1-1/+1
This avoids problems when the caller can't deal with a zero walue, which happens often enough that it's worth nipping the problem in the bud.
2018-08-15Merge pull request #4137luigi11111-0/+3
63e342b crypto: move null_pkey/null_skey to the cpp file (moneromooo-monero) 0496c7c crypto: do not use boost::value_initialized to init null skey/pkey (moneromooo-monero)
2018-07-27Merge pull request #4097luigi11111-4/+24
61caab8 crypto: remove slight bias in key generation due to modulo (moneromooo-monero)
2018-07-20crypto: do not use boost::value_initialized to init null skey/pkeymoneromooo-monero1-2/+2
2018-07-15crypto: move null_pkey/null_skey to the cpp filemoneromooo-monero1-0/+3
2018-07-05crypto: remove slight bias in key generation due to modulomoneromooo-monero1-4/+24
2018-06-28crypto: remove unused unsafe random scalar generatormoneromooo-monero1-6/+0
2018-05-31Merge pull request #3592luigi11111-4/+11
90a16b1 crypto: fix initialization order issue with random mutex (moneromooo-monero) 6a61f52 unit_tests: add ringdb unit tests (moneromooo-monero)
2018-05-13crypto: more places needing fixing for GCC 8.1moneroexamples1-10/+10
2018-04-10crypto: fix initialization order issue with random mutexmoneromooo-monero1-4/+11
2018-03-14crypto: revert odd namespace changes made in #3303stoffu1-1/+1
2018-03-05Correct spelling mistakes.Edward Betts1-1/+1
2018-03-04Code modifications to integrate Ledger HW device into monero-wallet-cli.cslashm1-1/+1
The basic approach it to delegate all sensitive data (master key, secret ephemeral key, key derivation, ....) and related operations to the device. As device has low memory, it does not keep itself the values (except for view/spend keys) but once computed there are encrypted (with AES are equivalent) and return back to monero-wallet-cli. When they need to be manipulated by the device, they are decrypted on receive. Moreover, using the client for storing the value in encrypted form limits the modification in the client code. Those values are transfered from one C-structure to another one as previously. The code modification has been done with the wishes to be open to any other hardware wallet. To achieve that a C++ class hw::Device has been introduced. Two initial implementations are provided: the "default", which remaps all calls to initial Monero code, and the "Ledger", which delegates all calls to Ledger device.
2018-02-16Merge pull request #3187Riccardo Spagni1-3/+16
851bd057 call _exit instead of abort in release mode (moneromooo-monero)
2018-02-01call _exit instead of abort in release modemoneromooo-monero1-3/+16
Avoids cores being created, as they're nowadays often piped to some call home system
2018-01-26Update 2018 copyrightxmr-eric1-1/+1
2017-10-07Subaddresseskenshi841-33/+92
2017-08-23crypto: use malloc instead of allocamoneromooo-monero1-10/+9
2017-06-22crypto: moved boost::lock_guard into a smaller scopestoffu1-4/+5
2017-06-22Signature proving payment to destination by only revealing key derivation, ↵stoffu1-0/+125
not the actual tx secret key
2017-02-21update copyright year, fix occasional lack of newline at line endRiccardo Spagni1-1/+1
2016-12-15Preliminary support for DragonFly BSDAntonio Huete Jimenez1-1/+1
- It builds but no further testing has been done.
2016-08-28rct amount key modified as per luigi1111's recommendationsmoneromooo-monero1-1/+1
This allows the key to be not the same for two outputs sent to the same address (eg, if you pay yourself, and also get change back). Also remove the key amounts lists and return parameters since we don't actually generate random ones, so we don't need to save them as we can recalculate them when needed if we have the correct keys.
2016-08-28crypto: error out where appropriatemoneromooo-monero1-2/+2
2016-05-18crypto: fix compile error: use named type in sizeofredfish1-4/+5
Btw, the warning 4200 remains disabled, but it did not get triggered (GCC 6.1.1, ARM). But, perhaps a better way than disabling the warning would be to do what is suggested here: http://stackoverflow.com/questions/3350852/how-to-correctly-fix-zero-sized-array-in-struct-union-warning-c4200-without%3E
2016-05-15crypto: make clear generate_random_bytes is not thread safemoneromooo-monero1-1/+1
And add a thread safe version to encourage proper use
2016-03-11Use boost::thread instead of std::threadHoward Chu1-7/+6
and all other associated IPC
2016-01-21OpenBSD support for Monero.me0wmix1-1/+1
2015-12-31updated copyright yearRiccardo Spagni1-1/+1
2015-01-02year updated in licenseRiccardo Spagni1-1/+1
2014-09-09FreeBSD alloca.h reference fixedfluffypony1-1/+6
2014-07-23License updated to BSD 3-clausefluffypony1-3/+29
2014-06-12builds, but doesn't link. other than that, electrum-style recovery ↵Thomas Winget1-2/+17
implemented (but not tested\!)
2014-06-12most functions prototyped/modified for wallet recoveryThomas Winget1-0/+6
2014-03-03moved all stuff to githubAntonio Juarez1-12/+95
2013-11-15crypto libamjuarez1-0/+245