Oh, that's absolutely my fault that has not contacted you or showed up
on irc this week. I didn't spend too much time on it thought, so
things are not that bad. Do you need any help on this, or you can
complete all the work by yourself and I should move to another task
(maybe events)?
Beck
___
Hi Damian,
I explored sphinx and tried it on stem these days, and it seemed
pretty handy. I think a good way to produce nice documentation for
stem is to create a page for each module manually, write an
introduction by hand, and use autoclass / autofunction / autoexception
in the autodoc extension
Hi Damian,
I was actually on a short trip these days, and just arrived home. I'll
restart working on it tomorrow, and I believe there is more I can do.
That said I might join Ravi's work on the general controller class a
bit later after I've finished my work on the descriptor crypto.
Best,
Beck
Hi Karsten,
> I don't have good answers to your questions. To be honest, when I
> implemented the Java verification code for #2768, I looked for hints in
> an old Java version of Tor, rewrote that code, updated it for current
> BouncyCastle versions using their JavaDocs and examples, and tweaked
Hi Damian,
> Quick question, if it is PKCS1 that we need then will the pycrypto
> package do the trick? It looks like PKCS1 support is pretty new for
> it, but the package itself is generally available by default.
PyCrypto should do the trick, as described in their API document [1].
But I encount
Hi Karsten & Damian,
I've been trying to port function determineKeyHash() from
VerifyDescriptors.java to stem, and it turned out to be more
complicated than I thought due to my unfamiliarity to many
cryptography terms and standards. I finally figured out a way to do it
by using a light-weighted li
Hi Damian & Karsten,
I created ticket #5810 about this and CCed both of you:
https://trac.torproject.org/projects/tor/ticket/5810
Just want to make sure you guys are notified.
Beck
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torp
I observed some inconsistency, if not errors, in the directory server specs
[1]:
1. Outline
Every authority has a very-secret, long-term "Authority Identity Key".
This is stored encrypted and/or offline, and is used to sign "key
certificate" documents. Every key certificate contains a me
On Mon, May 7, 2012 at 5:13 PM, Karsten Loesing wrote:
> On 5/6/12 3:36 AM, Damian Johnson wrote:
> > First I'd like to make sure that I'm clear on what we're trying to do.
> > The javadocs for VerifyDescriptors [1] says that it...
> >
> >> Verify server descriptors using the contained signing key