Commit message (Collapse) | Author | Age | |
---|---|---|---|
* | Tell the bridge operator on what ports his transports spawned. | George Kadianakis | 2011-11-02 |
| | | | | | | - Add a LOG_WARN message when registering the transports of a server managed proxy, so that the bridge operator can see in what ports the transports spawned and notify his/her clients. | ||
* | Rename tor_process_destroy() to tor_process_handle_destroy(). | George Kadianakis | 2011-10-24 |
| | |||
* | Improve general code quality. | George Kadianakis | 2011-10-24 |
| | | | | | | | | - Add a tor_process_get_pid() function that returns the PID of a process_handle_t. - Conform to make check-spaces. - Add some more documentation. - Improve some log messages. | ||
* | Add PT_PROTO_FAILED_LAUNCH managed proxy state. | George Kadianakis | 2011-10-24 |
| | | | | | | We used to try to terminate the managed proxy process even if it failed while launching. We introduce a new managed proxy state, to represent a *broken* and *not launched* proxy. | ||
* | Make set_managed_proxy_environment() work on Windows. | George Kadianakis | 2011-10-24 |
| | |||
* | Prepare util.[ch] to use the new process_handle_t API. | George Kadianakis | 2011-10-24 |
| | | | | Also, create tor_process_destroy() which destroys a process_handle_t. | ||
* | Port managed proxy launching code to the new subprocess API. | George Kadianakis | 2011-10-17 |
| | |||
* | Add some points to make it easy to turn off v3 support | Nick Mathewson | 2011-10-10 |
| | |||
* | Quiet two notices, and spelling mistake cleanup | Sebastian Hahn | 2011-10-10 |
| | |||
* | Fix a few 64bit compiler warnings | Sebastian Hahn | 2011-10-10 |
| | |||
* | Add more log statements for protocol/internal failures | Nick Mathewson | 2011-10-10 |
| | |||
* | Remove auth_challenge field from or_handshake_state_t | Nick Mathewson | 2011-10-10 |
| | | | | | | We didn't need to record this value; it was already recorded implicitly while computing cell digests for later examination in the authenticate cells. | ||
* | spec conformance: allow only one cert of each type | Nick Mathewson | 2011-10-10 |
| | |||
* | Give tor_cert_get_id_digests() fail-fast behavior | Nick Mathewson | 2011-10-10 |
| | | | | | | | | | | | | Right now we can take the digests only of an RSA key, and only expect to take the digests of an RSA key. The old tor_cert_get_id_digests() would return a good set of digests for an RSA key, and an all-zero one for a non-RSA key. This behavior is too error-prone: it carries the risk that we will someday check two non-RSA keys for equality and conclude that they must be equal because they both have the same (zero) "digest". Instead, let's have tor_cert_get_id_digests() return NULL for keys we can't handle, and make its callers explicitly test for NULL. | ||
* | Fix some more issues wrt tor_cert_new found by asn | Nick Mathewson | 2011-10-10 |
| | |||
* | Make more safe_str usage happen for new logs in command.c | Nick Mathewson | 2011-10-10 |
| | |||
* | Set up network parameters on non-authenticated incoming connections | Nick Mathewson | 2011-10-10 |
| | | | | | | Also add some info log messages for the steps of the v3 handshake. Now my test network bootstraps! | ||
* | Make sure we stop putting cells into our hash at the right time. | Nick Mathewson | 2011-10-10 |
| | |||
* | Bugfixes for authenticate handling and generation | Nick Mathewson | 2011-10-10 |
| | |||
* | Fix log message about what cells we are sending | Nick Mathewson | 2011-10-10 |
| | |||
* | more verbose log for recording an odd cell | Nick Mathewson | 2011-10-10 |
| | |||
* | Actually accept cells in SERVER_RENEGOTIATING | Nick Mathewson | 2011-10-10 |
| | |||
* | Generate certificates that enable v3 handshake | Nick Mathewson | 2011-10-10 |
| | |||
* | Allow "finished flushing" during v3 handshake | Nick Mathewson | 2011-10-10 |
| | |||
* | Hook up all of the prop176 code; allow v3 negotiations to actually work | Nick Mathewson | 2011-10-10 |
| | |||
* | Remove a no-longer-relevant comment | Nick Mathewson | 2011-10-10 |
| | |||
* | Make tor_tls_cert_is_valid check key lengths | Nick Mathewson | 2011-10-10 |
| | |||
* | New functions to record digests of cells during v3 handshake | Nick Mathewson | 2011-10-10 |
| | | | | Also, free all of the new fields in or_handshake_state_t | ||
* | Implement cert/auth cell reading | Nick Mathewson | 2011-10-10 |
| | |||
* | Basic function to write authenticate cells | Nick Mathewson | 2011-10-10 |
| | | | | Also, tweak the cert cell code to send auth certs | ||
* | Function to return peer cert as tor_tls_cert | Nick Mathewson | 2011-10-10 |
| | |||
* | Add AUTH keys as specified in proposal 176 | Nick Mathewson | 2011-10-10 |
| | | | | | | | | | | | | | | | | Our keys and x.509 certs are proliferating here. Previously we had: An ID cert (using the main ID key), self-signed A link cert (using a shorter-term link key), signed by the ID key Once proposal 176 and 179 are done, we will also have: Optionally, a presentation cert (using the link key), signed by whomever. An authentication cert (using a shorter-term ID key), signed by the ID key. These new keys are managed as part of the tls context infrastructure, since you want to rotate them under exactly the same circumstances, and since they need X509 certificates. | ||
* | Functions to get a public RSA key from a cert | Nick Mathewson | 2011-10-10 |
| | |||
* | Function to detect certificate types that signal v3 certificates | Nick Mathewson | 2011-10-10 |
| | |||
* | Function to get digests of the certs and their keys | Nick Mathewson | 2011-10-10 |
| | |||
* | More functions to manipulate certs received in cells | Nick Mathewson | 2011-10-10 |
| | |||
* | Function to extract the TLSSECRETS field for v3 handshakes | Nick Mathewson | 2011-10-10 |
| | |||
* | Functions to send cert and auth_challenge cells. | Nick Mathewson | 2011-10-10 |
| | |||
* | Cell types and states for new OR handshake | Nick Mathewson | 2011-10-10 |
| | | | | | | Also, define all commands > 128 as variable-length when using v3 or later link protocol. Running into a var cell with an unrecognized type is no longer a bug. | ||
* | Add a sha256 hmac function, with tests | Nick Mathewson | 2011-10-10 |
| | |||
* | Turn X509 certificates into a first-class type and add some functions | Nick Mathewson | 2011-10-10 |
| | |||
* | New function to get all digests of a public key | Nick Mathewson | 2011-10-10 |
| | |||
* | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-10-10 |
|\ | |||
| * | Update documentation comment for rend_client_reextend_intro_circuit | Robert Ransom | 2011-10-10 |
| | | | | | | | | | | | | | | | | | | One of its callers assumes a non-zero result indicates a permanent failure (i.e. the current attempt to connect to this HS either has failed or is doomed). The other caller only requires that this function's result never equal -2. Bug reported by Sebastian Hahn. | ||
| * | Don't launch a useless circuit in rend_client_reextend_intro_circuit | Robert Ransom | 2011-10-10 |
| | | | | | | | | Fixes bug 4212. Bug reported by katmagic and found by Sebastian. | ||
| * | Merge remote-tracking branch 'karsten/feature3951' into maint-0.2.2 | Nick Mathewson | 2011-10-07 |
| |\ | |||
| | * | Turn on directory request statistics by default. | Karsten Loesing | 2011-10-05 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Change the default values for collecting directory request statistics and inlcuding them in extra-info descriptors to 1. Don't break if we are configured to collect directory request or entry statistics and don't have a GeoIP database. Instead, print out a notice and skip initializing the affected statistics code. This is the cherry-picked 499661524b0a572303087af721325608dd91f7ce. | ||
* | | | Merge remote-tracking branch 'sebastian/osxcompile' | Nick Mathewson | 2011-10-10 |
|\ \ \ | |||
| * | | | Fix a compile warning on OS X 10.6 and up | Sebastian Hahn | 2011-10-11 |
| | | | | |||
* | | | | Consider hibernation before dropping privs | Sebastian Hahn | 2011-10-11 |
|/ / / | | | | | | | | | | | | | | | | | | | | | | Without this patch, Tor wasn't sure whether it would be hibernating or not, so it postponed opening listeners until after the privs had been dropped. This doesn't work so well for low ports. Bug was introduced in the fix for bug 2003. Fixes bug 4217, reported by Zax and katmagic. Thanks! |