aboutsummaryrefslogtreecommitdiff
path: root/src/or/connection_or.c
Commit message (Expand)AuthorAge
* Merge branch 'bug4360'Nick Mathewson2011-11-21
|\
| * normalize the name of the CERTS cellRoger Dingledine2011-10-31
* | Don't fail to send netinfo if real_addr is unset•••If we haven't set real_addr on a connection, we also now that _base.addr hasn't been tampered with. So we can use that. Sebastian Hahn2011-11-16
* | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-11-15
|\ \ | |/ |/|
| * Use real_addr in send_netinfo•••Reported by "troll_un"; bugfix on 0.2.0.10-alpha; fixes bug 4349. Nick Mathewson2011-11-14
* | bridges send netinfo cells like clients on outgoing conns•••fixes bug 4348 Roger Dingledine2011-10-29
* | Merge branch 'maint-0.2.2_secfix' into master_secfix•••Conflicts: src/common/tortls.c src/or/connection_or.c src/or/dirserv.c src/or/or.h Sebastian Hahn2011-10-27
|\|
| * Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix•••Conflicts: src/or/connection_or.c Sebastian Hahn2011-10-26
| |\
| | * Mark which OR connections are outgoingRobert Ransom2011-10-26
| | * Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND•••Fix suggested by Nick Mathewson. Robert Ransom2011-10-26
| | * Rename get_client_identity_key to get_tlsclient_identity_keyNick Mathewson2011-10-26
| | * Maintain separate server and client identity keys when appropriate.•••Fixes a bug described in ticket #988. Conflicts: src/or/main.c src/or/router.c Robert Ransom2011-10-26
* | | Fix a bunch of whitespace errorsNick Mathewson2011-10-11
* | | Quiet two notices, and spelling mistake cleanupSebastian Hahn2011-10-10
* | | Fix a few 64bit compiler warningsSebastian Hahn2011-10-10
* | | Add more log statements for protocol/internal failuresNick Mathewson2011-10-10
* | | Give tor_cert_get_id_digests() fail-fast behavior•••Right now we can take the digests only of an RSA key, and only expect to take the digests of an RSA key. The old tor_cert_get_id_digests() would return a good set of digests for an RSA key, and an all-zero one for a non-RSA key. This behavior is too error-prone: it carries the risk that we will someday check two non-RSA keys for equality and conclude that they must be equal because they both have the same (zero) "digest". Instead, let's have tor_cert_get_id_digests() return NULL for keys we can't handle, and make its callers explicitly test for NULL. Nick Mathewson2011-10-10
* | | Make sure we stop putting cells into our hash at the right time.Nick Mathewson2011-10-10
* | | Bugfixes for authenticate handling and generationNick Mathewson2011-10-10
* | | more verbose log for recording an odd cellNick Mathewson2011-10-10
* | | Actually accept cells in SERVER_RENEGOTIATINGNick Mathewson2011-10-10
* | | Allow "finished flushing" during v3 handshakeNick Mathewson2011-10-10
* | | Hook up all of the prop176 code; allow v3 negotiations to actually workNick Mathewson2011-10-10
* | | New functions to record digests of cells during v3 handshake•••Also, free all of the new fields in or_handshake_state_t Nick Mathewson2011-10-10
* | | Implement cert/auth cell readingNick Mathewson2011-10-10
* | | Basic function to write authenticate cells•••Also, tweak the cert cell code to send auth certs Nick Mathewson2011-10-10
* | | Functions to send cert and auth_challenge cells.Nick Mathewson2011-10-10
* | | Cell types and states for new OR handshake•••Also, define all commands > 128 as variable-length when using v3 or later link protocol. Running into a var cell with an unrecognized type is no longer a bug. Nick Mathewson2011-10-10
* | | Make bufferevents work with TokenBucketRefillIntervalNick Mathewson2011-09-22
* | | Apply rate-limiting to the lowest bufferevent in the stack.•••When we're doing filtering ssl bufferevents, we want the rate-limits to apply to the lowest level of the bufferevent stack, so that we're actually limiting bytes sent on the network. Otherwise, we'll read from the network aggressively, and only limit stuff as we process it. Nick Mathewson2011-08-24
* | | Fix a compile warning on OS X 10.6Sebastian Hahn2011-07-15
* | | Avoid warning in broken_state_count_compareNick Mathewson2011-07-12
* | | Disable recording new broken conns when we have bootstrapped•••Rationale: right now there seems to be no way for our bootstrap status to dip under 100% once it has reached 100%. Thus, recording broken connections after that point is useless, and wastes memory. If at some point in the future we allow our bootstrap level to go backwards, then we should change this rule so that we disable recording broken connection states _as long as_ the bootstrap status is 100%. Nick Mathewson2011-07-11
* | | Document feature3116 fns and improve output•••- We were reporting the _bottom_ N failing states, not the top N. - With bufferevents enabled, we logged all TLS states as being "in bufferevent", which isn't actually informative. - When we had nothing to report, we reported nothing too loudly. - Also, we needed documentation. Nick Mathewson2011-07-11
* | | Limit the number of different handshake reasons to report•••If connections failed in more than 10 different states, let's just report the top ten states. Nick Mathewson2011-07-11
* | | Record the states of failing OR connections•••This code lets us record the state of any outgoing OR connection that fails before it becomes open, so we can notice if they're all dying in the same SSL state or the same OR handshake state. More work is still needed: - We need documentation - We need to actually call the code that reports the failure when we realize that we're having a hard time connecting out or making circuits. - We need to periodically clear out all this data -- perhaps, whenever we build a circuit successfully? - We'll eventually want to expose it to controllers, perhaps. Partial implementation of feature 3116. Nick Mathewson2011-07-11
* | | Split connection_about_to_close_connection into separate functions•••This patch does NOTHING but: - move code - add declarations and includes as needed to make the new code work - declare the new functions. Nick Mathewson2011-07-11
* | | Merge remote-tracking branch 'public/bug2841'•••Conflicts: src/or/config.c Nick Mathewson2011-07-11
|\ \ \
| * | | Refactor the interfaces of transport/proxy lookup fns•••Returning a tristate is needless here; we can just use the yielded transport/proxy_type field to tell whether there's a proxy, and have the return indicate success/failure. Also, store the proxy_type in the or_connection_t rather than letting it get out of sync if a configuration reload happens between launching the or_connection and deciding what to say with it. Nick Mathewson2011-07-03
| * | | Small tweaks to 2841 code••• - const-ify some transport_t pointers - Remove a vestigial argument to parse_bridge_line - Make it compile without warnings on my laptop with --enable-gcc-warnings Nick Mathewson2011-07-02
| * | | Revised how we handle ClientTransportPlugin and Bridge lines.•••Multiple Bridge lines can point to the same one ClientTransportPlugin line, and we can have multiple ClientTransportPlugin lines in our configuration file that don't match with a bridge. We also issue a warning when we have a Bridge line with a pluggable transport but we can't match it to a ClientTransportPlugin line. George Kadianakis2011-06-22
| * | | Tweaked connection{.c,.h,_or.c} based on nick's comments.•••* Tweaked doxygen comments. * Changed returns of get_proxy_addrport(). * Ran make check-spaces. * Various small code tweaks. George Kadianakis2011-06-21
| * | | Fixes small bugs.George Kadianakis2011-06-14
| * | | This commit is an attempt to beautify the previous commit.•••It creates some helper functions that return the proxy type, proxy addr/port, etc. George Kadianakis2011-06-14
| * | | We now warn the user if a proxy server is not up when we try to connect with it.George Kadianakis2011-06-14
| * | | Various trivial changes.•••* Improved function documentation. * Renamed find_bridge_transport_by_addrport() to find_transport_by_bridge_addrport(). * Sanitized log severities we use. * Ran check-spaces. George Kadianakis2011-06-12
| * | | We can now connect using transports as well!George Kadianakis2011-06-12
* | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-06-17
|\ \ \ \ | | |/ / | |/| |
| * | | log when we finish ssl handshake and move to renegotiation•••debug-level since it will be quite common. logged at both client and server side. this step should help us track what's going on with people filtering tor connections by our ssl habits. Roger Dingledine2011-06-17
* | | | Make the get_options() return const•••This lets us make a lot of other stuff const, allows the compiler to generate (slightly) better code, and will make me get slightly fewer patches from folks who stick mutable stuff into or_options_t. const: because not every input is an output! Nick Mathewson2011-06-14
| |/ / |/| |