aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2019-05-15Merge branch 'maint-0.4.0'George Kadianakis
2019-05-15Merge branch 'tor-github/pr/1013' into maint-0.4.0George Kadianakis
2019-05-14Merge remote-tracking branch 'tor-github/pr/1004'Nick Mathewson
2019-05-14Merge branch 'tor-github/pr/1006'George Kadianakis
2019-05-13Fix a compilation warning: function does not have to be STATIC.Nick Mathewson
2019-05-13Merge branch 'bug28683_30173_29203_squashed'Nick Mathewson
2019-05-13The practracker beatings will continue until the functions get smaller.Mike Perry
2019-05-13Changes file for bugs28693+30173+29203.Mike Perry
2019-05-13Tests for bugs 28683, 30173, and 29203.Mike Perry
2019-05-13Bug 29203: Provide ReducedCircuitPadding torrc and consensus paramsMike Perry
2019-05-13Bug 28693: Provide Torrc option to disable circuit padding.Mike Perry
2019-05-13Merge remote-tracking branch 'tor-github/pr/998'Nick Mathewson
2019-05-13sendme: Fix coverity CID 1444999David Goulet
The code flow in theory can end up with a layer_hint to be NULL but in practice it should never happen because with an origin circuit, we must have the layer_hint. Just in case, BUG() on it if we ever end up in this situation and recover by closing the circuit. Fixes #30467. Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-13Merge branch 'tor-github/pr/976'David Goulet
2019-05-10Don't pass a NULL into a %s when logging client auth file load failureNick Mathewson
Fortunately, in 0.3.5.1-alpha we improved logging for various failure cases involved with onion service client auth. Unfortunately, for this one, we freed the file right before logging its name. Fortunately, tor_free() sets its pointer to NULL, so we didn't have a use-after-free bug. Unfortunately, passing NULL to %s is not defined. Fortunately, GCC 9.1.1 caught the issue! Unfortunately, nobody has actually tried building Tor with GCC 9.1.1 before. Or if they had, they didn't report the warning. Fixes bug 30475; bugfix on 0.3.5.1-alpha.
2019-05-10Merge branch 'tor-github/pr/973'George Kadianakis
2019-05-08Merge branch 'tor-github/pr/1000'David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-07Only call tor_addr_parse() in circuit_is_acceptable() when neededNeel Chauhan
2019-05-07Merge branch 'tor-github/pr/994'David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-06Merge remote-tracking branch 'tor-github/pr/923'Nick Mathewson
2019-05-06Hiding crypt_path_t: Add changes file.George Kadianakis
2019-05-03sendme: Add FlowCtrl protover valueDavid Goulet
See proposal 289 section 4.3 for more details. It describes the flow control protocol at the circuit and stream level. If there is no FlowCtrl protocol version, tor supports the unauthenticated flow control features from its supported Relay protocols. At this commit, relay will start advertising FlowCtrl=1 meaning they support authenticated SENDMEs v1. Closes #30363 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-03Merge branch 'tor-github/pr/954'David Goulet
2019-05-03Hiding crypt_path_t: Hide 'crypto' usage in sendme.cGeorge Kadianakis
2019-05-03Hiding crypt_path_t: Change code to use the privatization macro.George Kadianakis
2019-05-03Hiding crypt_path_t: Hiding 'crypto' using a macro.George Kadianakis
2019-05-03Revert "Hiding crypt_path_t: Ensure that ->private is initialized."George Kadianakis
This reverts commit 7497c9193a0f2c891a0802bf5fbe73cf7ec1ca99.
2019-05-03Revert "Hiding crypt_path_t: Create a constructor for crypt_path_t."George Kadianakis
This reverts commit ab8b80944967ee5a6a0c45dbf61839cf257bfe44.
2019-05-03Hiding crypt_path_t: Some TODO notes for future directions.George Kadianakis
2019-05-03Hiding crypt_path_t: Move some more crypt_path-specific functions.George Kadianakis
- Move test-only cpath_get_n_hops() to crypt_path.c. - Move onion_next_hop_in_cpath() and rename to cpath_get_next_non_open_hop(). The latter function was directly accessing cpath->state, and it's a first step at hiding ->state.
2019-05-03Hiding crypt_path_t: Rename some functions to fit the crypt_path API.George Kadianakis
Some of these functions are now public and cpath-specific so their name should signify the fact they are part of the cpath module: assert_cpath_layer_ok -> cpath_assert_layer_ok assert_cpath_ok -> cpath_assert_ok onion_append_hop -> cpath_append_hop circuit_init_cpath_crypto -> cpath_init_circuit_crypto circuit_free_cpath_node -> cpath_free onion_append_to_cpath -> cpath_extend_linked_list
2019-05-03Hiding crypt_path_t: Trivial changes to satisfy check-local.George Kadianakis
2019-05-03Hiding crypt_path_t: Ensure that ->private is initialized.George Kadianakis
Now that we are using a constructor we should be more careful that we are always using the constructor to initialize crypt_path_t, so make sure that ->private is initialized.
2019-05-03Hiding crypt_path_t: Create a constructor for crypt_path_t.George Kadianakis
We are using an opaque pointer so the structure needs to be allocated on the heap. This means we now need a constructor for crypt_path_t. Also modify all places initializing a crypt_path_t to use the constructor.
2019-05-03Hiding crypt_path_t: Fixup broken unittests.George Kadianakis
2019-05-03Hiding crypt_path_t: Move the free func in crypt_path.c.George Kadianakis
Again everything is moved, apart from a free line using ->private.
2019-05-03Hiding crypt_path_t: Move some more init funcs in crypt_path.c.George Kadianakis
Everything is moved, but the argument of the function is edited to access ->private->crypto.
2019-05-03Hiding crypt_path_t: Start with crypt_path.crypto .George Kadianakis
Create some functions to eventually be able to hide crypt_path_t.crypto.
2019-05-03Hiding crypt_path_t: Move init functions to crypt_path.c.George Kadianakis
This commit only moves code.
2019-05-03Hiding crypt_path_t: Move assert functions in crypt_path.c.George Kadianakis
This commit only moves code, and makes one function public.
2019-05-03Hiding crypt_path_t: Introduce opaque crypt_path_private_t .George Kadianakis
This will be our base for incrementally hiding crypt_path_t.
2019-05-03Merge branch 'tor-github/pr/984'David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-03Note how to update the new website in the ReleasingTor.md instructionsNick Mathewson
2019-05-02Merge branch 'maint-0.4.0'Nick Mathewson
"ours" to avoid version bump.
2019-05-02Bump to 0.4.0.5-devNick Mathewson
2019-05-02forward-port changelog and releasenotes from 0.4.0.5Nick Mathewson
2019-05-02Merge branch 'tor-github/pr/986'George Kadianakis
2019-05-02sendme: Add changes file for prop289David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-02Merge branch 'tor-github/pr/999'George Kadianakis
2019-05-02Add comments to include.am files to note where new sources goNick Mathewson
This mechanism isn't perfect, and sometimes it will guess wrong, but it will help our automation.