- May 18, 2023
-
-
Nick Mathewson authored
Clean up hs_ntor.rs, add test vectors generated by C tor, and fix some bugs Closes #865 See merge request tpo/core/arti!1189
-
- May 17, 2023
-
-
Nick Mathewson authored
Refactor Introduce messages to support looking at encoded headers Closes #866 See merge request tpo/core/arti!1188
-
Nick Mathewson authored
We never want to create one of these from its parts except when we are testing it; we only want to forward an Introduce1 message with a new command on it.
-
Nick Mathewson authored
We'll need to store this so that it can later on be used to complete the hs_ntor handshake.
-
Nick Mathewson authored
-
Nick Mathewson authored
This is still not the most beautiful interface, but it'll do for now.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
There were two bugs here that made the behavior unlike that of C tor: we had swapped the MAC inputs, and we had forgotten to include the public key X in the input.
-
Nick Mathewson authored
We'll want these so we can implement some test vectors.
-
Nick Mathewson authored
I think that these Input structs had been defined so that we could use hs_ntor interchangeably with other handshakes. The trouble is, though, that it doesn't really work like any other handshakes we have.
-
Nick Mathewson authored
Note that some of the invocations for this function seem to put the key and the message in a questionable order. But that's a thing to figure out later, while debugging.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
We'll want this because our hs_ntor handshake requires access to an encoded version of the header independent from the actual encrypted message. part of #866.
-
gabi-250 authored
Change log levels of messages from INFO to others Closes #854 See merge request tpo/core/arti!1172
-
Saksham Mittal authored
This commit changes certain log messages to debug for recoverable errors and a warn if all such attempts fail, in order to not clutter up the info messages that end users get to see.
-
gabi-250 authored
Refactor ClientCirc APIs to use Arc<ClientCirc>. Closes #846 See merge request tpo/core/arti!1187
-
- May 16, 2023
-
-
Nick Mathewson authored
tor-cert: Replace the KeyUnknownCert::check_key API Closes #759 See merge request tpo/core/arti!1184
-
Nick Mathewson authored
netdir: New function to check consistency of a HasRelayIds Closes #855 See merge request tpo/core/arti!1186
-
Nick Mathewson authored
Closes #759
-
Nick Mathewson authored
-
Nick Mathewson authored
These should have a cleaner API than check_key, and be easier to understand. Part of #759
-
Nick Mathewson authored
This function will be used to look up a relay by a set of LinkSpecs given from an incoming HsDesc or INTRODUCE2 message. It differs from other "lookup relay by IDs" functions in that it needs to be able to return "here's a relay", "couldn't found a relay", or "learned that this relay is impossible." Closes #855: This is the only new API needed for ChanTarget validation, I think.
-
gabi-250 authored
dev docs: key-management.md updates and clarifications See merge request tpo/core/arti!1185
-
gabi-250 authored
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
-
Nick Mathewson authored
RPC: revise semantics for weak references and object IDs Closes #848 See merge request tpo/core/arti!1183
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This lets us simplify our logic a bit for strong references.
-
Nick Mathewson authored
Now ClientCirc is no longer `Clone`, and the things that need it to be `Clone` instead return and use an Arc<ClientCirc> We're doing this so that ClientCirc can participate in the RPC system, and so that its semantics are more obvious. Closes #846. Thanks to the type system, this was a much simpler refactoring than I had feared it would be.
-
gabi-250 authored
There are several places where he `KeyType` isn't needed anymore. Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
-
gabi-250 authored
This also moves the `extension` function out of `KeyType` because for the C Tor key store, a key's file extension depends on the role/user of the key, which isn't known by `KeyType` (`KeyType` is a tor-agnostic key type such as `Ed25519Private`). Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
-
gabi-250 authored
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
-
gabi-250 authored
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
-
gabi-250 authored
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
-
gabi-250 authored
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
-
gabi-250 authored
Signed-off-by: Gabriela Moldovan <gabi@torproject.org>
-