| Commit message (Collapse) | Author | Age |
|
|
|
|
|
|
| |
Start getting freaky with openssl callbacks in tortls.c: detect client ciphers, and if the list doesn't look like the list current Tors use, present only a single cert do not ask for a client cert. Also, support for client-side renegotiation. None of this is enabled unless you define V2_HANDSHAKE_SERVER.
svn:r12622
|
|
|
|
|
|
|
| |
When we complete an OR handshake, set up all the internal fields and mark the connection as open.
svn:r12495
|
|
|
|
|
|
|
| |
Improve "tls error. breaking" message a little.
svn:r12411
|
|
|
|
|
|
|
| |
without link encryption.
svn:r12410
|
|
|
|
|
|
|
| |
Parse CERT cells and act correctly when we get them.
svn:r12396
|
|
|
|
|
|
|
| |
Send and parse link_auth cells properly.
svn:r12386
|
|
|
|
|
|
|
| |
Add functions to encode certificates
svn:r12384
|
|
|
|
|
|
|
| |
Make TLS contexts reference-counted, and add a reference from TLS objects to their corresponding context. This lets us reliably get the certificates for a given TLS connection, even if we have rotated TLS contexts.
svn:r12383
|
|
|
|
|
|
|
| |
Remember X509 certificates in the context. Store peer/self certificate digests in handshake state.
svn:r12382
|
|
|
|
|
|
|
| |
Code to remember client_random and server_random values, and to compute hmac using TLS master secret.
svn:r12381
|
|
|
|
|
|
|
| |
Clean spaces.
svn:r12301
|
|
|
|
|
|
|
| |
Implement (but do not enable) link connection version negotiation
svn:r12286
|
|
|
|
|
|
|
| |
Drop support for OpenSSL 0.9.6.
svn:r12191
|
|
|
|
|
|
|
| |
New code (disabled for now) to use the SSL context's cert store instead of using its "extra chain cert" list to get our identity certificate sent. This is a little close to what OpenSSL expects people to do, and it has the advantage that we should be able to keep the id cert from being sent by setting the NO_CHAIN_CERT bit. I have tried turning new code on, and it seemed to work fine.
svn:r12086
|
|
|
|
|
|
|
| |
Cheesy attempt to break some censorware. Not a long-term fix, but it will be intersting to watch the epidemiology of the workarounds as the censors apply them.
svn:r10975
|
|
|
|
|
|
|
| |
Review XXXX comments without a version; upgrade some to XXXX020.
svn:r10315
|
|
|
|
| |
svn:r10111
|
|
|
|
|
|
|
| |
Move private function declarations from crypto.c into a new #ifdef CRYPTO_PRIVATE block in crypto.h
svn:r10074
|
|
|
|
|
|
|
| |
Fix 35 remaining DOCDOC comments. Yowza.
svn:r9596
|
|
|
|
|
|
|
| |
Update copyright dates.
svn:r9570
|
|
|
|
|
|
|
| |
Implement proposal 106: stop requiring clients to have certificates, and stop checking for nicknames in certificates. [See proposal 106 for rationale.] Also improve messages when checking TLS handshake, to re-resolve bug 382.
svn:r9568
|
|
|
|
|
|
|
| |
Removing the last DOCDOC comment hurt so much that I had to use Doxygen to identify undocumented macros and comments, and add 150 more DOCDOCs to point out where they were. Oops. Hey, kids! Fixing some of these could be your first Tor patch!
svn:r9477
|
|
|
|
|
|
|
| |
Audit non-const char arguments; make a lot more of them const.
svn:r9466
|
|
|
|
|
|
|
| |
Tidy up ORCONN reason patch from Mike Perry. Changes: make some of the handling of TLS error codes less error prone. Enforce house style wrt spaces. Make it compile with --enable-gcc-warnings. Only set or_conn->tls_error in the case of an actual error. Add a changelog entry.
svn:r9355
|
|
|
|
|
|
|
| |
Patch from Mike Perry: Track reasons for OR connection failure; display them in control events. Needs review and revision.
svn:r9354
|
|
|
|
|
|
|
|
|
| |
"read this if you don't understand the code and want some help."
which is not the same as "hey, you think you understand this code,
but you don't."
svn:r9307
|
|
|
|
|
|
|
| |
connection handles more than 4 gigs in either direction, we assert.
svn:r9306
|
|
|
|
| |
svn:r9269
|
|
|
|
|
|
|
| |
Count TLS bytes accurately: previously, we counted only the number of bytes read or transmitted via tls, not the number of extra bytes used to do so. This has been a lonstanding wart. The fix "Works for me".
svn:r9207
|
|
|
|
|
|
|
| |
Try to fix an assert failure in new write limiting code: make buffers.c aware of previous "forced" write sizes from tortls.
svn:r9105
|
|
|
|
|
|
|
| |
More doxygen comments
svn:r8637
|
|
|
|
| |
svn:r8427
|
|
|
|
|
|
|
| |
Try to appease some warnings with newer gccs that believe that ignoring a return value is okay, but casting a return value and then ignoring it is a sign of madness.
svn:r8312
|
|
|
|
| |
svn:r6720
|
|
|
|
| |
svn:r6717
|
|
|
|
|
|
|
| |
don't yell as loudly.
svn:r6716
|
|
|
|
|
|
|
| |
a client-only tls, that is, one with no certs.
svn:r6558
|
|
|
|
|
|
|
|
|
|
| |
is, even tor clients do the same sort of handshake.
this has been true for years, so it's best to get rid of the
stale code.
svn:r6557
|
|
|
|
|
|
|
| |
hopefully this change is a no-op.
svn:r6556
|
|
|
|
|
|
|
| |
shout about it unless we want to hear about protocol violations.
svn:r6507
|
|
|
|
|
|
|
| |
Maybe this will help us win the war of names.
svn:r6489
|
|
|
|
|
|
| |
the log. Use them everywhere except for routerinfo->plaftorm, routerinfo->contact_info, and rend*.c. (need sleep now)
svn:r6087
|
|
|
|
|
|
|
|
|
| |
This is needed because Windows already has an err() that we
can't clobber. And we need to be able to make the log functions
a macro so we can print the function's name in the log entry.
svn:r6000
|
|
|
|
| |
svn:r5949
|
|
|
|
|
|
| |
we have not tried running without this yet". B is "this is suspicious, but the last time we tested, it was okay." C is "How could this possibly be the cause?"
svn:r5840
|
|
|
|
|
|
| |
interesting crypto-related changes made on 0.1.1.9. This will help hunt bug 234.
svn:r5777
|
|
|
|
|
|
| |
intended.
svn:r5582
|
|
|
|
|
|
| |
copies dh->length.
svn:r5372
|
|
|
|
| |
svn:r5371
|
|
|
|
|
|
| |
domain. Domains are now bitmasks... just in case. Make some err msgs non-general.
svn:r5309
|