summaryrefslogtreecommitdiff
path: root/src/or/routerkeys.c
AgeCommit message (Collapse)Author
2016-02-27Update the copyright year.Nick Mathewson
2016-02-27Make sure that every module in src/or has a brief description.Nick Mathewson
2016-02-10Rename crypto_digest_all, and digests_t.Nick Mathewson
They are no longer "all" digests, but only the "common" digests. Part of 17795. This is an automated patch I made with a couple of perl one-liners: perl -i -pe 's/crypto_digest_all/crypto_common_digests/g;' src/*/*.[ch] perl -i -pe 's/\bdigests_t\b/common_digests_t/g;' src/*/*.[ch]
2015-10-21Fix a memory leak in reading an expired ed signing key.Nick Mathewson
Closes 17403.
2015-09-22Merge branch 'feature16769_squashed'Nick Mathewson
2015-09-22Add a --master-key optionNick Mathewson
This lets the user override the default location for the master key when used with --keygen Part of 16769.
2015-09-22Add a new --newpass option to add or remove secret key passphrases.Nick Mathewson
2015-09-22Merge branch 'feature16944_v2'Nick Mathewson
2015-09-13Convince coverity that we do not have a particular memory leakNick Mathewson
2015-09-10Merge remote-tracking branch 'public/ed25519_hup_v2'Nick Mathewson
2015-09-04Never ever try to load the secret key if offline_master is setNick Mathewson
(Not even if we can't find the public key.)
2015-09-04Add "OfflineMasterKey" optionNick Mathewson
When this is set, and Tor is running as a relay, it will not generate or load its secret identity key. You can manage the secret identity key with --keygen. Implements ticket 16944.
2015-09-01Fix a false-positive in coverity scan with an assertionNick Mathewson
CID 1301373
2015-09-01Fix code for checking expired certificates on loadNick Mathewson
Fixes CID 1306915, which noticed that the check was dead.
2015-08-19Reload Ed25519 keys on sighup.Nick Mathewson
Closes ticket 16790.
2015-08-19More log messages for keygen problemsNick Mathewson
2015-08-19Explain better why we are about to load the master key.Nick Mathewson
2015-08-19When we infer the master key from the certificate, save it to disk.Nick Mathewson
2015-08-19Add test_keygen tests for all log outputs; improve keygen outputs.Nick Mathewson
2015-08-19Resolve failing test_keygen tests.Nick Mathewson
2015-08-19Checkpoint work on ed25519 keygen improvements.Nick Mathewson
Needs changes file, documentation, test integration, more tests.
2015-07-16Fix most check-spaces issuesNick Mathewson
2015-07-15Merge branches 'feature_16582' and 'feature_16581'Nick Mathewson
2015-07-15Don't allow INIT_ED_KEY_{NO_REPAIR,NEEDCERT} to be used together.Nick Mathewson
We haven't implemented NO_REPAIR for NEEDCERT, and we don't need it: but it's safest to stop any attempt to use it that way.
2015-07-15Add more EINVAL errno setting on key read failuresNick Mathewson
Teor found these. This is for part of #16582.
2015-07-14Add more consistency checks in load_ed_keysNick Mathewson
Make sure that signing certs are signed by the right identity key, to prevent a recurrence of #16530. Also make sure that the master identity key we find on disk matches the one we have in RAM, if we have one. This is for #16581.
2015-07-14Do more consistency checks in ed_key_init_from_file()Nick Mathewson
When there is a signing key and the certificate lists a key, make sure that the certificate lists the same signing key. When there are public key and secret key stored in separate files, make sure they match. Use the right file name when we load an encrypted secret key and then find a problem with it. This is part of 16581.
2015-07-14If loading an ed25519 master key fails with errno != ENOENT, give up.Nick Mathewson
This implements feature 16582: if we get EMFILE or something when loading our master key, we should not at that point attempt to overwrite it.
2015-07-14Preserve errno when loading encrypted ed25519 keys.Nick Mathewson
2015-06-27Avoid a segfault when reading an encrypted key that isn't thereNick Mathewson
Patch from cypherpunks. Fixes bug 16449. Bug not in any released tor.
2015-06-19fix some memory leaks that coverity foundNick Mathewson
2015-06-17Handle "keygen" if datadir does not yet existNick Mathewson
2015-06-17Merge branch '13642_offline_master_v2_squashed'Nick Mathewson
2015-06-17Support encrypted offline master keys with a new --keygen flagNick Mathewson
When --keygen is provided, we prompt for a passphrase when we make a new master key; if it is nonempty, we store the secret key in a new crypto_pwbox. Also, if --keygen is provided and there *is* an encrypted master key, we load it and prompt for a passphrase unconditionally. We make a new signing key unconditionally when --keygen is provided. We never overwrite a master key.
2015-06-03Ensure signing_key is non-NULL before accessing one of its membersteor
signing_key can be NULL in ed_key_init_from_file in routerkeys.c. Discovered by clang 3.7 address sanitizer. Fix on c03694938ed0, not in any released version of Tor.
2015-06-01Fix a memory leak in routerkeys.cNick Mathewson
2015-06-01Appease make check-spacesAndrea Shepard
2015-05-29Another memory leak bytes the dust.Nick Mathewson
2015-05-28Small leak in ed_key_init_from_file. CID 1301373Nick Mathewson
2015-05-28Fix null dereference on key setup error.Nick Mathewson
CID 1301369
2015-05-28Fix a bug when we fail to read a cert from a file.Nick Mathewson
Found by coverity -- CID 1301366.
2015-05-28Do not allocate our ed-link crosscert till after tls ctxNick Mathewson
We need this to prevent some annoying chutney crash-at-starts
2015-05-28Generate weird certificates correctlyNick Mathewson
(Our link protocol assumes that the link cert certifies the TLS key, and there is an RSA->Ed25519 crosscert)
2015-05-28# This is a combination of 2 commits.Nick Mathewson
# The first commit's message is: Regenerate ed25519 keys when they will expire soon. Also, have testing-level options to set the lifetimes and expiration-tolerances of all key types, plus a non-testing-level option to set the lifetime of any auto-generated signing key. # The 2nd commit message will be skipped: # fixup! Regenerate ed25519 keys when they will expire soon.
2015-05-28Only load master ed25519 secret keys when we absolutely must.Nick Mathewson
2015-05-28Implement proposal 228: cross-certification with onion keysNick Mathewson
Routers now use TAP and ntor onion keys to sign their identity keys, and put these signatures in their descriptors. That allows other parties to be confident that the onion keys are indeed controlled by the router that generated the descriptor.
2015-05-28Implement ed25519-signed descriptorsNick Mathewson
Now that we have ed25519 keys, we can sign descriptors with them and check those signatures as documented in proposal 220.
2015-05-28prop220: Implement certificates and key storage/creationNick Mathewson
For prop220, we have a new ed25519 certificate type. This patch implements the code to create, parse, and validate those, along with code for routers to maintain their own sets of certificates and keys. (Some parts of master identity key encryption are done, but the implementation of that isn't finished)