aboutsummaryrefslogtreecommitdiff
path: root/src/trunnel/include.am
AgeCommit message (Collapse)Author
2019-06-11trunnel: Rename sendme.trunnel to sendme_cell.trunnelDavid Goulet
This is to avoid having two sendme.{c|h} in the repository since the subsystem is implemented in src/core/or/sendme.{c|h}. Fixes #30769 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-15fix typos, whitespace, commentsRoger Dingledine
2019-04-29prop289: Add SENDME trunnel declarationDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-01-02Add padding negotiation trunnel output.Mike Perry
Co-authored-by: George Kadianakis <desnacked@riseup.net>
2018-10-26Add trunnel spec and impl for NETINFO cellsrl1987
2018-06-26Generate trunnel impls and include into buildrl1987
2018-06-20Simplify AM_CPPFLAGS include setupNick Mathewson
We had accumulated a bunch of cruft here. Now let's only include src and src/ext. (exception: src/trunnel is autogenerated code, and need to include src/trunnel.) This commit will break the build hard. The next commit will fix it.
2018-06-02Heed --disable-unittests properlyrl1987
2017-07-25trunnel: Add prop224 RENDEZVOUS1 cell definitionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-05-08Netflow record collapsing defense.Mike Perry
This defense will cause Cisco, Juniper, Fortinet, and other routers operating in the default configuration to collapse netflow records that would normally be split due to the 15 second flow idle timeout. Collapsing these records should greatly reduce the utility of default netflow data for correlation attacks, since all client-side records should become 30 minute chunks of total bytes sent/received, rather than creating multiple separate records for every webpage load/ssh command interaction/XMPP chat/whatever else happens to be inactive for more than 15 seconds. The defense adds consensus parameters to govern the range of timeout values for sending padding packets, as well as for keeping connections open. The defense only sends padding when connections are otherwise inactive, and it does not pad connections used solely for directory traffic at all. By default it also doesn't pad inter-relay connections. Statistics on the total padding in the last 24 hours are exported to the extra-info descriptors.
2016-10-31prop224: Add INTRODUCE1 and INTRODUCE_ACK trunnel definitionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2016-10-31prop224: Add ESTABLISH_INTRO and INTRO_ESTABLISHED trunnel definitionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2015-09-29Add a README for the trunnel directoryNick Mathewson
2015-05-28Merge branch '12498_ed25519_keys_v6'Nick Mathewson
Fixed numerous conflicts, and ported code to use new base64 api.
2015-05-28Add trunnel-generated items for link handshake code.Nick Mathewson
This includes the link handshake variations for proposal220. We'll use this for testing first, and then use it to extend our current code to support prop220.
2015-05-28prop220: Implement certificates and key storage/creationNick Mathewson
For prop220, we have a new ed25519 certificate type. This patch implements the code to create, parse, and validate those, along with code for routers to maintain their own sets of certificates and keys. (Some parts of master identity key encryption are done, but the implementation of that isn't finished)
2015-03-21Disable assertions during coverage buildsSebastian Hahn
This removes roughly 5000 branches in my testing. We never want to trigger assertions even during tests, so this is sane. Implements #15400.
2014-09-25Use trunnel for crypto_pwbox encoding/decoding.Nick Mathewson
This reduces the likelihood that I have made any exploitable errors in the encoding/decoding. This commit also imports the trunnel runtime source into Tor.