aboutsummaryrefslogtreecommitdiff
path: root/src/or/onion.c
Commit message (Expand)AuthorAge
* now assume all routers support rendezvous cells•••svn:r1699 Roger Dingledine2004-04-25
* use tor_assert•••remove obsolete BUF_OK macro svn:r1697 Roger Dingledine2004-04-25
* Remove onion_pkey from connection, since onion keys can change more often tha...•••svn:r1693 Nick Mathewson2004-04-25
* Merge flagday into main branch.•••svn:r1683 Nick Mathewson2004-04-24
* clean up some warnings•••svn:r1651 Roger Dingledine2004-04-17
* handle more purposes in new_route_len•••svn:r1618 Roger Dingledine2004-04-14
* normal circs are 3 hops, but rend/intro circs are 4, because•••the initiator doesn't get to choose the last hop svn:r1595 Roger Dingledine2004-04-12
* clean up choose_good_exit_server()•••svn:r1542 Roger Dingledine2004-04-07
* Generating data does no good if you make no use of it•••svn:r1534 Nick Mathewson2004-04-07
* Don't use Tor version 0.0.5 for intro/rendezvous points. (We don't need•••to worry about 0.0.4 or earlier, because nobody is running them any more.) svn:r1533 Nick Mathewson2004-04-07
* don't pick myself or my twins as hops when building circuits•••svn:r1531 Roger Dingledine2004-04-07
* There is no need to cast void* to other pointer types.•••svn:r1524 Nick Mathewson2004-04-07
* Put ourself in router list; act accordingly.•••svn:r1521 Nick Mathewson2004-04-07
* Force hybrid encryption on for key negotiation•••svn:r1509 Nick Mathewson2004-04-06
* Stupid sizeof operator!•••svn:r1508 Nick Mathewson2004-04-06
* Remove vestigial variable•••svn:r1507 Nick Mathewson2004-04-06
* Continue attack on magic numbers; use new crypto wrappers where possible•••svn:r1504 Nick Mathewson2004-04-06
* Refactor the heck out of crypto interface: admit that we will stick with one ...•••svn:r1458 Nick Mathewson2004-04-03
* alice can intercept y.onion requests, do a lookup on them via tor,•••and receive a 404 svn:r1455 Roger Dingledine2004-04-03
* Hide smartlist internals•••svn:r1451 Nick Mathewson2004-04-03
* router_choose_random_node can take a smartlist of nodes to exclude•••svn:r1442 Roger Dingledine2004-04-02
* now circuit_get_newest returns an appropriate circ for your purpose•••connection_ap_handshake_attach_circuit attaches to a circ of the right purpose add a skeletal rendclient.c svn:r1441 Roger Dingledine2004-04-02
* For hidden services: handle INTRODUCE2, send ESTABLISH_INTRO, RENDEZVOUS1.•••Also: - Add a pending final cpath element to build_state - Rename S_RENDEZVOUSING to S_CONNECT_REND - Add [CS]_REND_JOINED - Split out logic to initialize cpath crypto objects. - Have circuits/cpaths remember the KH element from their handshake, so they can use it for other authentication later. (As in ESTABLISH_INTRO) svn:r1438 Nick Mathewson2004-04-01
* alice chooses her rendezvous node from all running routers•••and she can set preferences in her options svn:r1433 Roger Dingledine2004-04-01
* let the circuit-launcher choose the exit node (if he wants)•••svn:r1428 Roger Dingledine2004-04-01
* Make smartlist Do What Arma Expects.•••svn:r1401 Nick Mathewson2004-03-30
* Remove maximum-size field from smartlists•••svn:r1397 Nick Mathewson2004-03-30
* clean up some 'warn' messages while i'm at it•••svn:r1342 Roger Dingledine2004-03-26
* isspace and friends take an int. solaris cares.•••svn:r1303 Roger Dingledine2004-03-19
* clean up some presentation and comments•••svn:r1294 Roger Dingledine2004-03-18
* make circuit-building less noisy when a node in your exclude/exit/entrynodes ...•••svn:r1206 Roger Dingledine2004-03-03
* bugfix: only warn about an unrouter router after we've fetched a directory•••svn:r1178 Roger Dingledine2004-02-29
* note bug in assert_connection_ok•••svn:r1159 Roger Dingledine2004-02-28
* rename ExcludedNodes config option to ExcludeNodes•••svn:r1155 Roger Dingledine2004-02-28
* best_support_idx is obsolete•••(also doesn't fix the bug) svn:r1097 Roger Dingledine2004-02-17
* Propagate yes/no/maybe a little farther forward.•••svn:r1096 Nick Mathewson2004-02-17
* Let paranoid exit nodes (which default to reject) be exit nodes•••Before we resolve the hostname, we don't know whether its IP will be accepted or rejected by the exit policy of each host. So we were only going with nodes that would certainly accept -- which was just itys and poblano. (This bug was hidden until now by the earlier port bug.) (Actual bugfix pending on Nick's next commit, hopefully.) svn:r1092 Roger Dingledine2004-02-17
* log when exit situation is hopeless.•••svn:r1057 Nick Mathewson2004-02-04
* for perf testing, paths are always 3 hops, not "3 or more"•••svn:r1030 Roger Dingledine2004-01-30
* fix a per-circuit memory leak•••svn:r1029 Roger Dingledine2004-01-30
* turn some knobs, add more debugging•••svn:r1023 Roger Dingledine2004-01-30
* small default route when doing speed testing•••svn:r1010 Roger Dingledine2004-01-20
* resolve cygwin warnings for pre19•••svn:r981 Roger Dingledine2004-01-08
* the onionskin challenge length was 30 bytes longer than necessary•••(i think ;) svn:r971 Roger Dingledine2004-01-05
* remove trailing whitespace•••svn:r951 Roger Dingledine2003-12-17
* end-to-end integrity checking now works•••initialize digests from shared secrets at handshake make circuit_send_next_onion_skin use connection_edge_send_command svn:r948 Roger Dingledine2003-12-17
* move cell size to 512 bytes•••move length to 2 bytes, put it in the relay header remove 4 reserved bytes in cell add 4 bytes to relay header for the integrity check svn:r942 Roger Dingledine2003-12-16
* add H(K|1) to the onionskin reply•••verify it at the client end abstract the onionskin handshake lengths breaks backward compatibility (again) svn:r941 Roger Dingledine2003-12-16
* start to track the 'unexpected relay cell' warning•••svn:r928 Roger Dingledine2003-12-14
* add options.ExcludedNodes -- nodes that are never picked in path building•••svn:r924 Roger Dingledine2003-12-14