summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2018-09-04Debug one last reference-counting issue that only appeared on openssl masterNick Mathewson
2018-09-04Fix an easy refcounting bug in a unit testNick Mathewson
2018-09-04Merge branch 'nss_squashed' into nss_mergeNick Mathewson
2018-09-04Resolve openssl-only memory leaksNick Mathewson
2018-09-04Fix a pair of remaining leaks in tortls_nss.cNick Mathewson
Fun fact: PR_Close leaks memory if its socket is not valid.
2018-09-04Use FREE_AND_NULL for impl typesNick Mathewson
2018-09-04Port test_tortls_verify to not depend on openssl internalsNick Mathewson
2018-09-04Remove tor_tls_check_lifetime as unused.Nick Mathewson
Everything that might have used it, uses tor_tls_cert_is_valid() instead.
2018-09-04Add unit test for bridge-style TLS initialization.Nick Mathewson
2018-09-04Document winsock includes betterNick Mathewson
2018-09-04Fix documentation of initialized fields in crypto_init.cNick Mathewson
2018-09-04Make some additional RSA functions constNick Mathewson
2018-09-04Rename crypto_pk_check_key(), use it more reasonably, add testsNick Mathewson
This function was a wrapper around RSA_check_key() in openssl, which checks for invalid RSA private keys (like those where p or q are composite, or where d is not the inverse of e, or where n != p*q). We don't need a function like this in NSS, since unlike OpenSSL, NSS won't let you import a bogus private key. I've renamed the function and changed its return type to make it more reasonable, and added a unit test for trying to read a key where n != p*q.
2018-09-04Unify functions for reading/writing PEM keys, to avoid duplication.Nick Mathewson
2018-09-04Do not leave a certificate allocated after testing dirvote_add()Nick Mathewson
2018-09-04Do not leak a reference to "slot" when decoding private key.Nick Mathewson
2018-09-04Update prefork and postfork NSS code for unit tests.Nick Mathewson
2018-09-04Test a few more tortls.c functionsNick Mathewson
2018-09-04Several unit tests to improve test coverage of x509*.cNick Mathewson
2018-09-04Remove tor_x509_get_cert_impl as unneeded.Nick Mathewson
2018-09-04Avoid double-close on TCP sockets under NSS.Nick Mathewson
2018-09-04Avoid spurious error logs when using NSSNick Mathewson
The tls_log_errors() function now behaves differently for NSS than it did for OpenSSL, so we need to tweak it a bit.
2018-09-04Remove tor_tls_shutdown()Nick Mathewson
This function was supposed to implement a half-duplex mode for our TLS connections. However, nothing in Tor actually uses it (besides some unit tests), and the implementation looks really questionable to me. It's probably best to remove it. We can add a tested one later if we need one in the future.
2018-09-04Initial NSS support for TLS.Nick Mathewson
This is enough to get a chutney network to bootstrap, though a bunch of work remains.
2018-09-04Merge remote-tracking branch 'rl1987/doc26908'Nick Mathewson
2018-09-04c99 style in loopNick Mathewson
2018-09-04Merge branch 'tor_api_owning_control'Nick Mathewson
2018-09-04Merge branch 'bug24104_029_squashed'Nick Mathewson
2018-09-02Update sample torrc files to warn about not using BridgeRelay and MyFamily ↵rl1987
together
2018-09-01Test for descriptor does not change when hibernatingjuga0
2018-09-01Add missing router_tests to test.hjuga0
2018-09-01Check descriptor bandwidth changed if not hibernatingjuga0
There should be a separate check to update descriptor when start or end hibernating.
2018-09-01Add test for check_descriptor_bandwidth_changedjuga0
2018-09-01Allow mocking rep_hist_bandwidth_assessjuga0
2018-09-01Add test log helpers for msgs not containing strjuga0
2018-09-01Make bandwidth change factor a constantjuga0
used to determine large changes in bandwidth.
2018-08-29Change mention of is_extrainfo router_parse_list_from_string() to want_extrainfoNeel Chauhan
2018-08-29Merge branch 'ticket27246_035_01_squashed'Nick Mathewson
2018-08-29Expand the comments on ASN.1-encoded TAP keysNick Mathewson
2018-08-29router: Keep RSA onion public key in ASN.1 formatDavid Goulet
The OpenSSL "RSA" object is currently 408 bytes compares to the ASN.1 encoding which is 140 for a 1024 RSA key. We save 268 bytes per descriptor (routerinfo_t) *and* microdescriptor (microdesc_t). Scaling this to 6000 relays, and considering client usually only have microdescriptors, we save 1.608 MB of RAM which is considerable for mobile client. This commit makes it that we keep the RSA onion public key (used for TAP handshake) in ASN.1 format instead of an OpenSSL RSA object. Changes is done in both routerinfo_t and microdesc_t. Closes #27246 Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28Merge remote-tracking branch 'onionk/prototest1'Nick Mathewson
2018-08-28make a comment more rightRoger Dingledine
(from #20874 fix)
2018-08-28Merge remote-tracking branch 'onionk/connection-comments1'Nick Mathewson
2018-08-28Merge branch 'bug26367_035_01'Nick Mathewson
2018-08-28hs: Remove rend_client_non_anonymous_mode_enabledDavid Goulet
The removal of Tor2Web made this function useless. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28hs: Remove rend_client_allow_non_anonymous_connectionDavid Goulet
By removing Tor2Web, there is no way a client can be non anonymous so we remove that function and the callsites. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28circ: Remove useless param from cannibalization functionDavid Goulet
Because we just removed Tor2web support, the need_specific_rp is not needed anymore when cannibalizing a circuit. Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28hs: Render obsolete Tor2webDavid Goulet
Remove support for Tor2web in the code and build system. At this commit, tor doesn't have Tor2web support anymore. Ref: https://lists.torproject.org/pipermail/tor-dev/2018-July/013295.html Close #26367 Signed-off-by: David Goulet <dgoulet@torproject.org>
2018-08-28Fix log.c comments about assert vs tor_assert vs raw_assert.Nick Mathewson
2018-08-28Merge remote-tracking branch 'tor-github/pr/245'Nick Mathewson