str4d
5c2f56549b
Refactor MessageEncrypter interface to use PublicKey and PrivateKey
2016-04-21 01:08:39 +00:00
str4d
d545aaa892
Encrypt and save crash reports, send them the next time TorPlugin start
...
Will currently fail at runtime; requires a public key and a server onion.
2016-04-20 23:42:46 +00:00
akwizgran
e78ba2e806
Key derivation fixes, renamed a key derivation method.
2016-03-30 12:02:49 +01:00
str4d
701cfdba48
Extract contact exchange protocol from BT introduction protocol
2016-03-26 15:53:02 +13:00
Ernir Erlingsson
5aba1d79f1
Fixes after comments, also removed the CryptoComoponent from the IdentIcons
2016-03-14 21:02:51 +01:00
Ernir Erlingsson
1be400eb84
Switched Roboguice/Guice out for Dagger 2
2016-03-14 21:01:21 +01:00
str4d
c822623677
Migrate Bluetooth protocol to BQP's master secret derivation
2016-02-02 02:45:49 +00:00
str4d
77e4ec381a
Implement BQP crypto
2016-02-02 02:45:49 +00:00
str4d
4d7a23779a
Rename crypto methods and constants for Bluetooth key agreement
2016-02-02 02:45:49 +00:00
akwizgran
5355951466
Separate the sync layer from its clients. #112
2016-01-20 10:35:09 +00:00
akwizgran
9868feeb2a
Refactor KeyManager and TagRecogniser. #55
2015-12-14 11:02:49 +00:00
akwizgran
027ae8340f
Whitespace-only code formatting changes.
2015-11-30 09:38:25 +00:00
akwizgran
7fbad8dc26
Use FortunaGenerator to implement PseudoRandom.
2015-01-14 20:46:03 +00:00
akwizgran
5d46d3a4b4
AuthenticatedCipher interface isn't needed outside crypto package.
2015-01-09 13:06:44 +00:00
akwizgran
dc5e37a96d
Remove AAD from AuthenticatedCipher interface.
2015-01-09 13:01:02 +00:00
akwizgran
4e57029d98
Use constant-time GCM multiplier.
2015-01-06 19:30:11 +00:00
akwizgran
1f69f0d2f6
Variable-length frames (untested).
2015-01-05 17:35:45 +00:00
akwizgran
d3bf2d59a1
Use the same maximum frame length for all transports.
2015-01-05 16:24:44 +00:00
akwizgran
358166bc12
Don't try to erase secrets from memory.
...
1. The things we're really trying to protect - contact identities,
message contents, etc - can't be erased from memory because they're
encapsulated inside objects we don't control.
2. Long-term secrets can't be protected by erasing them from memory
because they're stored in the database and the database key has to be
held in memory whenever the app's running.
3. If the runtime uses a compacting garbage collector then we have no
way to ensure an object is erased from memory.
4. Trying to erase secrets from memory makes the code more complex.
Conclusion: Let's not try to protect secrets from an attacker who can
read arbitrary memory locations.
2014-12-29 21:08:27 +00:00
akwizgran
f316d64afa
Moved stream crypto to crypto component.
2014-12-29 19:55:05 +00:00
akwizgran
388b36b6be
Check periodically for retransmittable packets. Bug #46 .
2014-12-14 20:26:41 +00:00
akwizgran
7b8181e309
Massive refactoring to merge handling of simplex and duplex connections.
2014-11-04 16:51:25 +00:00
akwizgran
b24f153704
Renamed a load of things from 'connection' to 'stream'.
2014-10-08 16:21:55 +01:00
akwizgran
e5353dc6d4
Replaced AuthenticatedCipher opmode with a boolean.
2014-01-16 18:59:02 +00:00
akwizgran
8886d954d7
Reorganised Guice modules. Contribute entropy to pool on Linux/Android.
2014-01-14 19:33:17 +00:00
akwizgran
c9928348ef
Use the Fortuna generator instead of the JVM's SecureRandom. Bug #4 .
...
Note that this is only the generator part of Fortuna, not the
accumulator. The generator requires a seed, which is provided by a
platform-specific implementation of SeedProvider. On Linux the
implementation reads the seed from /dev/urandom.
2014-01-13 19:16:33 +00:00
akwizgran
ea47420e99
Add a password strength meter to SetupActivity. Dev task #42 .
2014-01-09 01:29:00 +00:00
akwizgran
832476412c
Changed the root package from net.sf.briar to org.briarproject.
2014-01-08 16:18:30 +00:00