aboutsummaryrefslogtreecommitdiff
path: root/src/common/tortls.c
Commit message (Expand)AuthorAge
* doxygen and other cleanups•••svn:r13440 Roger Dingledine2008-02-09
* r17987@catbus: nickm | 2008-02-08 17:01:56 -0500••• Remove spurious log stmt svn:r13432 Nick Mathewson2008-02-08
* r14062@tombo: nickm | 2008-02-08 15:17:07 -0500••• Change DNs in x509 certificates to be harder to fingerprint. Raise common code. Refactor random hostname generation into crypto.c svn:r13429 Nick Mathewson2008-02-08
* Update some copyright notices: it is now 2008.•••svn:r13412 Nick Mathewson2008-02-07
* r17955@catbus: nickm | 2008-02-06 16:53:07 -0500••• The SSL portion of the revised handshake now seems to work: I just finally got a client and a server to negotiate versions. Now to make sure certificate verification is really happening, connections are getting opened, etc. svn:r13409 Nick Mathewson2008-02-06
* r17953@catbus: nickm | 2008-02-06 15:00:44 -0500••• Implement a better means for testing for renegotiation. svn:r13408 Nick Mathewson2008-02-06
* r17947@catbus: nickm | 2008-02-06 11:57:53 -0500••• Fix a bunch of DOCDOC items; document the --quiet flag; refactor a couple of XXXX020 items. svn:r13405 Nick Mathewson2008-02-06
* r17903@catbus: nickm | 2008-02-05 14:40:03 -0500••• Remove some dead code; fix some XXX020s; turn some XXX020s into XXXX_IP6s (i.e., "needs to be fixed when we add ipv6 support"). svn:r13382 Nick Mathewson2008-02-05
* We accidentally enabled the under-development v2 TLS handshake•••code, which is causing log entries like "TLS error while renegotiating handshake". Disable it again. Resolves bug 590. svn:r13219 Roger Dingledine2008-01-21
* r17717@catbus: nickm | 2008-01-21 17:09:23 -0500••• Fix certificate leak. svn:r13218 Nick Mathewson2008-01-21
* r17639@catbus: nickm | 2008-01-15 19:09:21 -0500••• Fix some hard to trigger but nonetheless real memory leaks spotted by an anonymous contributor. Needs review. Partial backport candidate. svn:r13147 Nick Mathewson2008-01-16
* minor cleanups•••svn:r13095 Roger Dingledine2008-01-10
* r17490@catbus: nickm | 2008-01-07 11:48:02 -0500••• Fix bug 582: decref the idcert when we add it to the store. svn:r13052 Nick Mathewson2008-01-07
* r17473@catbus: nickm | 2008-01-05 22:15:05 -0500••• Add a reverse mapping from SSL to tor_tls_t*: we need this in order to do a couple of things the sensible way from inside callbacks. Also, add a couple of missing cases in connection_or.c svn:r13040 Nick Mathewson2008-01-06
* r15767@tombo: nickm | 2007-12-31 16:06:27 -0500••• Note an unfreed cert svn:r13008 Nick Mathewson2007-12-31
* clean up copyrights, and assign 2007 copyrights to The Tor Project, Inc•••svn:r12786 Roger Dingledine2007-12-12
* r15223@tombo: nickm | 2007-12-07 23:41:21 -0500••• Aaand, do the code to enable the client side of the new TLS handshake. There are some loose ends that need tying up in connection_or, and a lot of half-baked code to remove, and some special cases to test for, and lots and lots of testing to do, but that is what weekends are for. svn:r12721 Nick Mathewson2007-12-08
* r16919@catbus: nickm | 2007-12-03 12:59:02 -0500••• Add DHE-RSA-AES256-SHA to the list of ciphers encountered from v1 connections. svn:r12652 Nick Mathewson2007-12-03
* r15088@tombo: nickm | 2007-11-30 23:47:29 -0500••• Add support to get a callback invoked when the client renegotiate a connection. Also, make clients renegotiate. (not enabled yet, until they detect that the server acted like a v2 server) svn:r12623 Nick Mathewson2007-12-01
* r15087@tombo: nickm | 2007-11-30 22:32:26 -0500••• Start getting freaky with openssl callbacks in tortls.c: detect client ciphers, and if the list doesn't look like the list current Tors use, present only a single cert do not ask for a client cert. Also, support for client-side renegotiation. None of this is enabled unless you define V2_HANDSHAKE_SERVER. svn:r12622 Nick Mathewson2007-12-01
* r16669@catbus: nickm | 2007-11-14 14:50:03 -0500••• When we complete an OR handshake, set up all the internal fields and mark the connection as open. svn:r12495 Nick Mathewson2007-11-14
* r16523@catbus: nickm | 2007-11-07 11:35:49 -0500••• Improve "tls error. breaking" message a little. svn:r12411 Nick Mathewson2007-11-07
* a note from steven about how to set up a private test network•••without link encryption. svn:r12410 Roger Dingledine2007-11-07
* r16455@catbus: nickm | 2007-11-06 12:48:00 -0500••• Parse CERT cells and act correctly when we get them. svn:r12396 Nick Mathewson2007-11-06
* r16432@catbus: nickm | 2007-11-05 14:18:57 -0500••• Send and parse link_auth cells properly. svn:r12386 Nick Mathewson2007-11-05
* r16413@catbus: nickm | 2007-11-05 13:14:18 -0500••• Add functions to encode certificates svn:r12384 Nick Mathewson2007-11-05
* r16412@catbus: nickm | 2007-11-05 11:45:17 -0500••• Make TLS contexts reference-counted, and add a reference from TLS objects to their corresponding context. This lets us reliably get the certificates for a given TLS connection, even if we have rotated TLS contexts. svn:r12383 Nick Mathewson2007-11-05
* r16411@catbus: nickm | 2007-11-05 11:27:37 -0500••• Remember X509 certificates in the context. Store peer/self certificate digests in handshake state. svn:r12382 Nick Mathewson2007-11-05
* r16410@catbus: nickm | 2007-11-05 10:54:29 -0500••• Code to remember client_random and server_random values, and to compute hmac using TLS master secret. svn:r12381 Nick Mathewson2007-11-05
* r16302@catbus: nickm | 2007-10-31 16:45:16 -0400••• Clean spaces. svn:r12301 Nick Mathewson2007-10-31
* r16285@catbus: nickm | 2007-10-30 17:43:25 -0400••• Implement (but do not enable) link connection version negotiation svn:r12286 Nick Mathewson2007-10-30
* r16159@catbus: nickm | 2007-10-25 12:53:38 -0400••• Drop support for OpenSSL 0.9.6. svn:r12191 Nick Mathewson2007-10-25
* r15997@catbus: nickm | 2007-10-21 20:25:40 -0400••• New code (disabled for now) to use the SSL context's cert store instead of using its "extra chain cert" list to get our identity certificate sent. This is a little close to what OpenSSL expects people to do, and it has the advantage that we should be able to keep the id cert from being sent by setting the NO_CHAIN_CERT bit. I have tried turning new code on, and it seemed to work fine. svn:r12086 Nick Mathewson2007-10-22
* r13988@catbus: nickm | 2007-07-29 16:32:36 -0400••• Cheesy attempt to break some censorware. Not a long-term fix, but it will be intersting to watch the epidemiology of the workarounds as the censors apply them. svn:r10975 Nick Mathewson2007-07-29
* r12936@catbus: nickm | 2007-05-24 14:12:34 -0400••• Review XXXX comments without a version; upgrade some to XXXX020. svn:r10315 Nick Mathewson2007-05-24
* fix some code comments, a wrapper, and add a todo item•••svn:r10111 Roger Dingledine2007-05-04
* r12595@catbus: nickm | 2007-04-30 18:32:34 -0400••• Move private function declarations from crypto.c into a new #ifdef CRYPTO_PRIVATE block in crypto.h svn:r10074 Nick Mathewson2007-04-30
* r11832@catbus: nickm | 2007-02-16 15:31:59 -0500••• Fix 35 remaining DOCDOC comments. Yowza. svn:r9596 Nick Mathewson2007-02-16
* r11775@catbus: nickm | 2007-02-12 16:39:09 -0500••• Update copyright dates. svn:r9570 Nick Mathewson2007-02-12
* r11773@catbus: nickm | 2007-02-12 15:18:48 -0500••• Implement proposal 106: stop requiring clients to have certificates, and stop checking for nicknames in certificates. [See proposal 106 for rationale.] Also improve messages when checking TLS handshake, to re-resolve bug 382. svn:r9568 Nick Mathewson2007-02-12
* r11629@catbus: nickm | 2007-02-02 15:06:17 -0500••• Removing the last DOCDOC comment hurt so much that I had to use Doxygen to identify undocumented macros and comments, and add 150 more DOCDOCs to point out where they were. Oops. Hey, kids! Fixing some of these could be your first Tor patch! svn:r9477 Nick Mathewson2007-02-02
* r11607@catbus: nickm | 2007-01-30 17:19:27 -0500••• Audit non-const char arguments; make a lot more of them const. svn:r9466 Nick Mathewson2007-01-30
* r11966@Kushana: nickm | 2007-01-15 16:12:17 -0500••• Tidy up ORCONN reason patch from Mike Perry. Changes: make some of the handling of TLS error codes less error prone. Enforce house style wrt spaces. Make it compile with --enable-gcc-warnings. Only set or_conn->tls_error in the case of an actual error. Add a changelog entry. svn:r9355 Nick Mathewson2007-01-15
* r11957@Kushana: nickm | 2007-01-15 15:25:57 -0500••• Patch from Mike Perry: Track reasons for OR connection failure; display them in control events. Needs review and revision. svn:r9354 Nick Mathewson2007-01-15
* apparently i think of comments with no whitespace around them as•••"read this if you don't understand the code and want some help." which is not the same as "hey, you think you understand this code, but you don't." svn:r9307 Roger Dingledine2007-01-09
* Fix an assert error introduced in 0.1.2.5-alpha: if a single TLS•••connection handles more than 4 gigs in either direction, we assert. svn:r9306 Roger Dingledine2007-01-09
* more progress and cleanups•••svn:r9269 Roger Dingledine2007-01-05
* r11741@Kushana: nickm | 2006-12-28 22:41:29 -0500••• Count TLS bytes accurately: previously, we counted only the number of bytes read or transmitted via tls, not the number of extra bytes used to do so. This has been a lonstanding wart. The fix "Works for me". svn:r9207 Nick Mathewson2006-12-29
* r11566@Kushana: nickm | 2006-12-13 17:46:24 -0500••• Try to fix an assert failure in new write limiting code: make buffers.c aware of previous "forced" write sizes from tortls. svn:r9105 Nick Mathewson2006-12-13
* r8923@totoro: nickm | 2006-10-07 11:44:33 -0400••• More doxygen comments svn:r8637 Nick Mathewson2006-10-07