summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2011-10-10Add some points to make it easy to turn off v3 supportNick Mathewson
2011-10-10Quiet two notices, and spelling mistake cleanupSebastian Hahn
2011-10-10Fix a few 64bit compiler warningsSebastian Hahn
2011-10-10Add more log statements for protocol/internal failuresNick Mathewson
2011-10-10Remove auth_challenge field from or_handshake_state_tNick Mathewson
We didn't need to record this value; it was already recorded implicitly while computing cell digests for later examination in the authenticate cells.
2011-10-10spec conformance: allow only one cert of each typeNick Mathewson
2011-10-10Give tor_cert_get_id_digests() fail-fast behaviorNick Mathewson
Right now we can take the digests only of an RSA key, and only expect to take the digests of an RSA key. The old tor_cert_get_id_digests() would return a good set of digests for an RSA key, and an all-zero one for a non-RSA key. This behavior is too error-prone: it carries the risk that we will someday check two non-RSA keys for equality and conclude that they must be equal because they both have the same (zero) "digest". Instead, let's have tor_cert_get_id_digests() return NULL for keys we can't handle, and make its callers explicitly test for NULL.
2011-10-10Fix some more issues wrt tor_cert_new found by asnNick Mathewson
2011-10-10Make more safe_str usage happen for new logs in command.cNick Mathewson
2011-10-10Set up network parameters on non-authenticated incoming connectionsNick Mathewson
Also add some info log messages for the steps of the v3 handshake. Now my test network bootstraps!
2011-10-10Make sure we stop putting cells into our hash at the right time.Nick Mathewson
2011-10-10Bugfixes for authenticate handling and generationNick Mathewson
2011-10-10Fix log message about what cells we are sendingNick Mathewson
2011-10-10more verbose log for recording an odd cellNick Mathewson
2011-10-10Actually accept cells in SERVER_RENEGOTIATINGNick Mathewson
2011-10-10Generate certificates that enable v3 handshakeNick Mathewson
2011-10-10Allow "finished flushing" during v3 handshakeNick Mathewson
2011-10-10Hook up all of the prop176 code; allow v3 negotiations to actually workNick Mathewson
2011-10-10Remove a no-longer-relevant commentNick Mathewson
2011-10-10Make tor_tls_cert_is_valid check key lengthsNick Mathewson
2011-10-10New functions to record digests of cells during v3 handshakeNick Mathewson
Also, free all of the new fields in or_handshake_state_t
2011-10-10Implement cert/auth cell readingNick Mathewson
2011-10-10Basic function to write authenticate cellsNick Mathewson
Also, tweak the cert cell code to send auth certs
2011-10-10Function to return peer cert as tor_tls_certNick Mathewson
2011-10-10Add AUTH keys as specified in proposal 176Nick Mathewson
Our keys and x.509 certs are proliferating here. Previously we had: An ID cert (using the main ID key), self-signed A link cert (using a shorter-term link key), signed by the ID key Once proposal 176 and 179 are done, we will also have: Optionally, a presentation cert (using the link key), signed by whomever. An authentication cert (using a shorter-term ID key), signed by the ID key. These new keys are managed as part of the tls context infrastructure, since you want to rotate them under exactly the same circumstances, and since they need X509 certificates.
2011-10-10Functions to get a public RSA key from a certNick Mathewson
2011-10-10Function to detect certificate types that signal v3 certificatesNick Mathewson
2011-10-10Function to get digests of the certs and their keysNick Mathewson
2011-10-10More functions to manipulate certs received in cellsNick Mathewson
2011-10-10Function to extract the TLSSECRETS field for v3 handshakesNick Mathewson
2011-10-10Functions to send cert and auth_challenge cells.Nick Mathewson
2011-10-10Cell types and states for new OR handshakeNick Mathewson
Also, define all commands > 128 as variable-length when using v3 or later link protocol. Running into a var cell with an unrecognized type is no longer a bug.
2011-10-10Add a sha256 hmac function, with testsNick Mathewson
2011-10-10Turn X509 certificates into a first-class type and add some functionsNick Mathewson
2011-10-10New function to get all digests of a public keyNick Mathewson
2011-10-10Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
2011-10-10Merge remote-tracking branch 'sebastian/osxcompile'Nick Mathewson
2011-10-11Consider hibernation before dropping privsSebastian Hahn
Without this patch, Tor wasn't sure whether it would be hibernating or not, so it postponed opening listeners until after the privs had been dropped. This doesn't work so well for low ports. Bug was introduced in the fix for bug 2003. Fixes bug 4217, reported by Zax and katmagic. Thanks!
2011-10-11Fix a compile warning on OS X 10.6 and upSebastian Hahn
2011-10-10Add a missing comma in tor_check_port_forwardingNick Mathewson
My fault; fix for bug 4213.
2011-10-10Update documentation comment for rend_client_reextend_intro_circuitRobert Ransom
One of its callers assumes a non-zero result indicates a permanent failure (i.e. the current attempt to connect to this HS either has failed or is doomed). The other caller only requires that this function's result never equal -2. Bug reported by Sebastian Hahn.
2011-10-10Don't launch a useless circuit in rend_client_reextend_intro_circuitRobert Ransom
Fixes bug 4212. Bug reported by katmagic and found by Sebastian.
2011-10-07Merge remote-tracking branch 'karsten/feature3951' into maint-0.2.2Nick Mathewson
2011-10-07Merge remote-tracking branch 'public/bug2003_nm'Nick Mathewson
2011-10-07reinstate a notice for the non-loopback socksport caseNick Mathewson
Thanks to prop171, it's no longer a crazy thing to do, but you should make sure that you really meant it!
2011-10-07Merge remote-tracking branch 'rransom-tor/bug4018'Nick Mathewson
2011-10-07Merge remote-tracking branch 'asn2/bug3656'Nick Mathewson
Conflicts: src/common/util.c src/common/util.h src/or/config.h src/or/main.c src/test/test_util.c
2011-10-07Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
2011-10-07Avoid running DNS self-tests if we're operating as a bridgewarms0x
2011-10-07Revive our beautiful unit tests.George Kadianakis
They broke when the PT_PROTO_INFANT proxy state was added.