- 04 Sep, 2018 13 commits
-
-
Nick Mathewson authored
This function was a wrapper around RSA_check_key() in openssl, which checks for invalid RSA private keys (like those where p or q are composite, or where d is not the inverse of e, or where n != p*q). We don't need a function like this in NSS, since unlike OpenSSL, NSS won't let you import a bogus private key. I've renamed the function and changed its return type to make it more reasonable, and added a unit test for trying to read a key where n != p*q.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
The tls_log_errors() function now behaves differently for NSS than it did for OpenSSL, so we need to tweak it a bit.
-
Nick Mathewson authored
This function was supposed to implement a half-duplex mode for our TLS connections. However, nothing in Tor actually uses it (besides some unit tests), and the implementation looks really questionable to me. It's probably best to remove it. We can add a tested one later if we need one in the future.
-
Nick Mathewson authored
This is enough to get a chutney network to bootstrap, though a bunch of work remains.
-
- 22 Aug, 2018 3 commits
-
-
Nick Mathewson authored
7 unit tests are failing at this point, but they're all TLS-related.
-
Nick Mathewson authored
I'll need this for debugging.
-
Nick Mathewson authored
This ensures that our test failure messages actually tell us what strings Tor was expecting. I will need this to debug some test failures.
-
- 21 Aug, 2018 19 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This was a gap that we left in the last commit.
-
Nick Mathewson authored
We used to link both libraries at once, but now that I'm working on TLS, there's nothing left to keep OpenSSL around for when NSS is enabled. Note that this patch causes a couple of places that still assumed OpenSSL to be disabled when NSS is enabled - tor-gencert - pbkdf2
-
Nick Mathewson authored
Also, add a stubbed-out nss version of the modules. The tests won't pass with NSS yet since the NSS modules don't do anything. This is a good patch to read with --color-moved.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This cleans up a lot of junk from crypto_rsa_openssl, and will save us duplicated code in crypto_rsa_nss (when it exists). (Actually, it already exists, but I am going to use git rebase so that this commit precedes the creation of crypto_rsa_nss.)
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
These functions exist only to expose RSA keys to other places in Tor that use OpenSSL; let's be specific about their purpose.
-
Nick Mathewson authored
-
Nick Mathewson authored
It is not nice to expose a private key's contents without having the function name advertise the fact. Fortunately, we weren't misusing these yet.
-
Nick Mathewson authored
-
- 14 Aug, 2018 1 commit
-
-
Nick Mathewson authored
-
- 08 Aug, 2018 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 02 Aug, 2018 1 commit
-
-
Nick Mathewson authored
-