summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2009-10-15Parse detached signatures and microdesc networkstatuses correctly.Nick Mathewson
2009-10-15Revise proposal 162: SHA256(x), not SHA256(SHA256(x))Nick Mathewson
The point of doing SHA256 twice is, generally, is to prevent message extension attacks where an attacker who knows H(A) can calculate H(A|B). But for attaching a signature to a document, the attacker already _knows_ A, so trying to keep them from calculating H(A|B) is pointless.
2009-10-15Implement signatures for microdesc consensuses right.Nick Mathewson
This means we need to handle the existence of multiple flavors of signature in a detached signatures document, generate them correctly, and so on.
2009-10-15Generate all the flavors of consensuses when building consensuses.Nick Mathewson
2009-10-15Parse detached signature documents with multiple flavors and algorithms.Nick Mathewson
2009-10-15Refactor consensus signature storage for multiple digests and flavors.Nick Mathewson
This patch introduces a new type called document_signature_t to represent the signature of a consensus document. Now, each consensus document can have up to one document signature per voter per digest algorithm. Also, each detached-signatures document can have up to one signature per <voter, algorithm, flavor>.
2009-10-15Code to generate, store, and parse microdescriptors and consensuses.Nick Mathewson
The consensus documents are not signed properly, not served, and not exchanged yet.
2009-10-15Add a function to get the most frequent member of a list.Nick Mathewson
2009-10-15Add ability to parse one or more m line from a vote.Nick Mathewson
2009-10-15Functions to encode microdescriptors and their lines.Nick Mathewson
2009-10-15Revise 162's idea of how detached signatures work with flavorsNick Mathewson
The original proposal was vague and would have made older Tors reject detached-signature documents as soon as they saw one with flavors.
2009-10-15Allow signed data to include other hashes later.Nick Mathewson
Previously, we insisted that a valid signature must be a signature of the expected digest. Now we accept anything that starts with the expected digest. This lets us include another digest later.
2009-10-15Signature-checking code can handle longer digests.Nick Mathewson
2009-10-15Make signature-generation code handle different key and digest lengths.Nick Mathewson
2009-10-15Support for encoding and decoding 256-bit digests in base64Nick Mathewson
2009-10-15Merge commit 'origin/maint-0.2.1'Nick Mathewson
Conflicts: ChangeLog configure.in contrib/tor-mingw.nsi.in src/or/config.c src/win32/orconfig.h
2009-10-15bump to 0.2.1.20tor-0.2.1.20Roger Dingledine
2009-10-15Move moria1 and Tonga to alternate IP addresses.Roger Dingledine
2009-10-14Merge commit 'origin/maint-0.2.1'Nick Mathewson
2009-10-14Merge commit 'phobos/polipo-updates-maint-0.2.1' into maint-0.2.1Nick Mathewson
2009-10-14Merge commit 'phobos/tor-dmg-naming-update'Nick Mathewson
2009-10-14Merge commit 'origin/maint-0.2.1'Nick Mathewson
2009-10-14read the "circwindow" parameter from the consensusRoger Dingledine
backport of c43859c5c12361fad505 backport of 0d13e0ed145f4c1b5bd1
2009-10-14Code to parse and access network parameters.Nick Mathewson
Partial backport of 381766ce4b1145460. Partial backport of 56c6d78520a98fb64.
2009-10-14add blurbs for recent dev releasesRoger Dingledine
2009-10-13Another event2 evdns fix.Nick Mathewson
2009-10-13Fix a crash when using evdns from Libevent 2.Nick Mathewson
When we tried to use the deprecated non-threadsafe evdns interfaces in Libevent 2 without using the also-deprecated event_init() interface, Libevent 2 would sensibly crash, since it has no guess where to find the Libevent library. Here we use the evdns_base_*() functions instead if they're present, and fake them if they aren't.
2009-10-12bump to 0.2.2.5-alpha-devRoger Dingledine
2009-10-12move nickm's commit to the correct releaseRoger Dingledine
2009-10-12updated naming.Andrew Lewman
2009-10-12update namingAndrew Lewman
2009-10-11Move android changelog entry to now-correct Tor version.Nick Mathewson
2009-10-11Merge commit 'public/android'Nick Mathewson
2009-10-11fix compile on windowstor-0.2.2.5-alphaRoger Dingledine
2009-10-11bump to 0.2.2.5-alphaRoger Dingledine
2009-10-11Move dizum to an alternate IP address.Roger Dingledine
2009-10-11Ship test.h in releasePeter Palfrader
The test suite need the test.h file to build. Add it to noinst_HEADERS in the Makefile.am so it gets included in the tarball that make dist produces.
2009-10-10Fix testsuite call.tor-0.2.2.4-alphaPeter Palfrader
tinytest_main() returns 0 on success, -1 on errors and 1 on test failures. So test.c should check on !=0 instead of <0.
2009-10-10bump to 0.2.2.4-alphaRoger Dingledine
2009-10-10Don't set unreachable from dirvote unless we've been running a while.Nick Mathewson
This is a possible fix for bug 1023, where if we vote (or make a v2 consensus networkstatus) right after we come online, we can call rep_hist_note_router_unreachable() on every router we haven't connected to yet, and thereby make all their uptime values reset.
2009-10-10correct the spec for the stream_bw event.Roger Dingledine
"neonomad" pointed out on or-talk that the order is opposite from the intuitive order. explain why. we chose to fix the spec rather than the code because there are controllers like torflow that already expect the current behavior.
2009-10-10fix a bug where we were decrementing the wrong bucketRoger Dingledine
i think this doesn't actually affect anything, since linked conns usually don't impact buckets
2009-10-10remove some dead code. some of it was tickling coverity.Roger Dingledine
2009-10-10add blurbs for recent alpha releasesRoger Dingledine
2009-10-10Fix a memleak when throwing away some build timesSebastian Hahn
This was introduced in f7e6e852e80c22b40a8f09bc1c85074726d7078e. Found by Coverity
2009-10-07amend changelog for recent commits, plus clean upRoger Dingledine
2009-10-07Tweak an assert that shouldn't fire either way.Mike Perry
There were however other places where we used to call this function that might have caused this to fire. Better safe than sorry now.
2009-10-07Tweak values for when to discard all of our history.Mike Perry
This seems to be happening to me a lot on a garbage DSL line. We may need to come up with 2 threshholds: a high short onehop count and a lower longer count.
2009-10-07Remove another overzealous assert.Mike Perry
Pretimeouts may have build time data, just no timeout data.
2009-10-01try to stem the 'sea of fail'Roger Dingledine