Commit Graph

62 Commits

Author SHA1 Message Date
csoler
a962330f25 fixed compilation in GxsSecurity with debug flags 2017-01-01 21:28:14 +01:00
Phenom
674b6de381 Fix Some gcc warnings 383 to 208 lines
Left explicit #warning and deprecated.
Some lines are wrong indented and produce mal formed code.
2016-11-30 22:01:01 +01:00
Gio
68a00138d2 Avoid usage of deprecated function RSA_generate_key that make android
compiler mad
2016-08-23 12:15:28 +02:00
csoler
eb05922cd1 added a tooltip and read color for unsecure GXS identities. These are still supported for a few weeks at most. So get rid of them 2016-06-17 22:21:06 -04:00
csoler
886d896151 fixed warning about old fingerprint for own keys. 2016-06-17 20:46:24 -04:00
csoler
c25b65074a removed check key debug info 2016-06-16 23:10:13 -04:00
csoler
25c0c9d4ce added systematic consistency checking of public/private RSA keys at deserialisation time 2016-06-16 23:06:07 -04:00
csoler
8d54603b02 fixed bug in private key extraction 2016-06-16 21:27:28 -04:00
csoler
a2ca0385db fixed compilation and several problems following separation of public/private keys 2016-06-04 21:39:40 -04:00
csoler
590be092e5 separated RsTlvSecurityKey into two incompatible classes to enforce the correct usage of private vs. public keys 2016-06-02 23:47:57 -04:00
csoler
7914aeb60a use RsTemporaryMemory in signature verification 2016-04-30 17:33:47 -04:00
csoler
be7e87cb1e use RsTemporaryMemory in signature verification 2016-04-30 17:25:24 -04:00
csoler
55e80871eb added missing free for public keys used in envelop encryption 2016-04-22 17:30:55 -04:00
csoler
0d3ff0e3aa fixed possible uninitialised memory read in memory decryption return 2016-04-21 19:46:47 -04:00
csoler
0c711a4c61 added missing calls to EVP_CIPHER_CTX_cleanup() to release memory after decryption, causing memory leaks 2016-04-21 19:41:21 -04:00
csoler
0266b3cfa2 improved debug output in gxsnetservice.cc 2016-02-21 11:34:49 -05:00
csoler
09a6efad52 removed dead code in GxsSecurity 2016-02-20 21:25:21 -05:00
csoler
6a4add8806 implemented per-item encryption and Vetting method compatibility layer 2016-02-20 17:53:03 -05:00
csoler
b2a6bfbbd0 fixed one bug in debug output of encrypted key offset 2016-02-19 20:55:27 -05:00
csoler
0293e246a2 fixed encryption method on the basis that encrypted keys always have the same length 2016-02-18 23:38:07 -05:00
csoler
6995212a8b added code for single item encryption/decryption 2016-02-18 21:30:52 -05:00
csoler
08e4c90cc2 added single-block multiple encryption 2016-02-16 22:36:22 -05:00
csoler
0513e71c68 fixed sending part in encrypted msg items 2016-02-14 19:42:21 -05:00
csoler
fd04f0b3bb updated to upstream/master 2016-01-13 20:27:08 -05:00
csoler
d55993d1e4 removed two instances of malloc(0) captured by new rs_malloc funtion 2016-01-12 21:43:04 -05:00
csoler
d13526facd added a new method rs_malloc that checks its arguments and prints a stacktrace on error/weird call. Changed the code everywhere to use this instead of malloc. Removed some mallocs and replaced with RsTemporaryMemory 2016-01-12 21:10:11 -05:00
csoler
9c6e7dfc13 added checks after mallocs in several files 2016-01-11 23:49:00 -05:00
csoler
9da8a8abc3 fixed compilation of RsNxsTransaction encryption code 2016-01-01 21:37:27 -05:00
csoler
6ecd2991e7 merged with latest trunk 2016-01-01 15:15:19 -05:00
csoler
55e66d090c fixed mismatch between API versions causing signed groups created with old API to fail author signature checking 2015-12-17 00:08:08 -05:00
csoler
79c80c968a fixed a few bugs in display of tracking info 2015-10-27 22:41:29 -04:00
csoler
21c31fb446 modifications to item encryption so as to match APIs 2015-10-22 20:24:36 -04:00
csoler
1c12178874 finished implementing decryption routines. Still needs fixing compilation 2015-10-01 23:37:50 -04:00
csoler
22d4893721 removed a few compilation warning that might cause compilation errors on some systems 2015-09-24 18:03:19 -04:00
csoler
e8c93a5639 started with new crypto methods for multiple peers 2015-09-23 18:40:55 -04:00
csoler
0873c0dfa2 added methods to check public/private keys for consistent fingerprint and content. Should be later used to check GXS keys when they arrive from neighbor nodes.
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@8613 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2015-07-31 17:23:43 +02:00
csoler
0b66b36a46 fixed memory leak in GxsSecurity
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@8541 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2015-06-22 21:35:39 +00:00
csoler
13ff39429e * Renamed RS_TLVKEY_DISTRIB_PRIVATE into *_PUBLISH, as it is used as such.
* Allow to check signatures and validate groups using private keys in GxsSecurity
* removed inconsistency in key flags when full keys where mixed up with publish keys.

This should fix the following bugs:
* channel owners did not receive posts from other peers who have publish rights
* channels sometimes not gettign through



git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@8275 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2015-05-19 21:28:46 +00:00
csoler
48ea291d95 moved signature validation and encryption one level up into p3IdService. Added timestamp for GXS identities and auto-removal after 7 days. Updated display in IdDialog
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@8015 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2015-03-14 14:33:23 +00:00
csoler
5967ee535f fixed free/delete mess in GRouter
git-svn-id: http://svn.code.sf.net/p/retroshare/code/branches/v0.6-NewGRouterModel@7863 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2015-01-23 15:16:04 +00:00
csoler
c83d27924e fixed bug causing a security breach by storing private GXS keys into the public key cache. Added a few asserts to totally remove that possibility. Ideally we should have 2 incompatible key types.
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7829 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2015-01-10 07:30:26 +00:00
csoler
306d6852c2 Added missing free() in error handling code (Patch rom G10H4ck)
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7819 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2015-01-05 19:26:50 +00:00
csoler
756b9acf41 fixed bug caused by old GXS keys in distant chat. Added a security warning for these keys to be deleted.
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7684 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2014-11-15 20:54:42 +00:00
csoler
e007151197 implemented more tests and fixed a few bugs in GxsSecurity
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7683 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2014-11-15 20:24:56 +00:00
csoler
9752fb9698 security check for encryption key length to avoid crashing when deserialisation gives wrong numbers
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7535 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2014-09-14 19:23:23 +00:00
csoler
80f4401e88 - implemented DH protocol for PFS encryption in distant chat between GXS ids.
- changed format of keyId in rstlvkeys.{h,cc}, but kept the serialisation for backward compatibility (A #define needs to be removed to fix it for good). Updated rsrecogn, rsmsgitems, gxssecurity accordingly
- added "chat peer" in IdDialog to help testing distant chat.

Distant chat works and is now encrypted. The GUI still needs some smoothing: display of correct peer names
in chat window, remove the need to add a message in p3chatservice.cc:3217 to force poping up the chat window.

- added MsgAddress class to handle generic address types while keeping type separation in Messages. Not used yet.



git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7403 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2014-06-12 10:28:23 +00:00
csoler
ec031ba940 moved all the code using explicit EVP_KEY and RSA structures into gxssecurity (except rsrecon, still need to do)
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7371 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2014-05-17 13:50:40 +00:00
csoler
d3b92ddab9 Fixed mismatched free/delete; removed one dangerous and unused function; added missing memory release calls
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7370 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2014-05-15 21:55:34 +00:00
csoler
d782d8eed9 forgot to free memory.
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7369 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2014-05-15 21:08:23 +00:00
csoler
1bf3e2967f fixed security hole in generation of key fingerprints. Fingerprint of previously existing GXS ids can be faked. The change is backward compatible.
git-svn-id: http://svn.code.sf.net/p/retroshare/code/trunk@7368 b45a01b8-16f6-495d-af2f-9b41ad6348cc
2014-05-15 21:00:44 +00:00