- 10 Sep, 2018 9 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
"ours" to avoid version bump.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 09 Sep, 2018 1 commit
-
-
Nick Mathewson authored
This is an attempt to work around what I think may be a bug in OSS-Fuzz, which thinks that uninitialized data might be passed to the curve25519 functions.
-
- 08 Sep, 2018 1 commit
-
-
Roger Dingledine authored
(a relay operator hit this on #tor-relays and couldn't make sense of it. i couldn't either until i went to go read the code.)
-
- 07 Sep, 2018 29 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
"ours" to avoid bump.
-
Nick Mathewson authored
"ours" to avoid bump
-
Nick Mathewson authored
"ours" to avoid bump
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
-
-
Also update some client auth test vectors that broke...
-
David Goulet authored
Return a newly allocated fake client authorization object instead of taking the object as a parameter. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
In function get_fname_suffix, previously it uses /, but in fact it should use PATH_SEPARATOR.
-
David Goulet authored
Part of #20700 . Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
When reloading tor, check if our the configured client authorization have changed from what we previously had. If so, republish the updated descriptor. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Series of functions that we now need in hs_service.c. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Previously, the validation by decoding a created descriptor was disabled because the interface had to be entirely changed and not implemented at the time. This commit re-enabled it because it is now implemented. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Parse the client authorization section from the descriptor, use the client private key to decrypt the auth clients, and then use the descriptor cookie to decrypt the descriptor. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
This commit refactors the existing decryption code to make it compatible with a new logic for when the client authorization is enabled. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Because this secret data building logic is not only used by the descriptor encoding process but also by the descriptor decoding, refactor the function to take both steps into account. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
The new ClientOnionAuthDir option is introduced which is where tor looks to find the HS v3 client authorization files containing the client private key material. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-