Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-05-15 | Merge branch 'maint-0.4.0' | George Kadianakis | |
2019-05-15 | Merge branch 'tor-github/pr/1013' into maint-0.4.0 | George Kadianakis | |
2019-05-14 | Merge remote-tracking branch 'tor-github/pr/1004' | Nick Mathewson | |
2019-05-14 | Merge branch 'tor-github/pr/1006' | George Kadianakis | |
2019-05-13 | Fix a compilation warning: function does not have to be STATIC. | Nick Mathewson | |
2019-05-13 | Merge branch 'bug28683_30173_29203_squashed' | Nick Mathewson | |
2019-05-13 | The practracker beatings will continue until the functions get smaller. | Mike Perry | |
2019-05-13 | Changes file for bugs28693+30173+29203. | Mike Perry | |
2019-05-13 | Tests for bugs 28683, 30173, and 29203. | Mike Perry | |
2019-05-13 | Bug 29203: Provide ReducedCircuitPadding torrc and consensus params | Mike Perry | |
2019-05-13 | Bug 28693: Provide Torrc option to disable circuit padding. | Mike Perry | |
2019-05-13 | Merge remote-tracking branch 'tor-github/pr/998' | Nick Mathewson | |
2019-05-13 | sendme: Fix coverity CID 1444999 | David Goulet | |
The code flow in theory can end up with a layer_hint to be NULL but in practice it should never happen because with an origin circuit, we must have the layer_hint. Just in case, BUG() on it if we ever end up in this situation and recover by closing the circuit. Fixes #30467. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-05-13 | Merge branch 'tor-github/pr/976' | David Goulet | |
2019-05-10 | Don't pass a NULL into a %s when logging client auth file load failure | Nick Mathewson | |
Fortunately, in 0.3.5.1-alpha we improved logging for various failure cases involved with onion service client auth. Unfortunately, for this one, we freed the file right before logging its name. Fortunately, tor_free() sets its pointer to NULL, so we didn't have a use-after-free bug. Unfortunately, passing NULL to %s is not defined. Fortunately, GCC 9.1.1 caught the issue! Unfortunately, nobody has actually tried building Tor with GCC 9.1.1 before. Or if they had, they didn't report the warning. Fixes bug 30475; bugfix on 0.3.5.1-alpha. | |||
2019-05-10 | Merge branch 'tor-github/pr/973' | George Kadianakis | |
2019-05-08 | Merge branch 'tor-github/pr/1000' | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-05-07 | Only call tor_addr_parse() in circuit_is_acceptable() when needed | Neel Chauhan | |
2019-05-07 | Merge branch 'tor-github/pr/994' | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-05-06 | Merge remote-tracking branch 'tor-github/pr/923' | Nick Mathewson | |
2019-05-06 | Hiding crypt_path_t: Add changes file. | George Kadianakis | |
2019-05-03 | sendme: Add FlowCtrl protover value | David Goulet | |
See proposal 289 section 4.3 for more details. It describes the flow control protocol at the circuit and stream level. If there is no FlowCtrl protocol version, tor supports the unauthenticated flow control features from its supported Relay protocols. At this commit, relay will start advertising FlowCtrl=1 meaning they support authenticated SENDMEs v1. Closes #30363 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-05-03 | Merge branch 'tor-github/pr/954' | David Goulet | |
2019-05-03 | Hiding crypt_path_t: Hide 'crypto' usage in sendme.c | George Kadianakis | |
2019-05-03 | Hiding crypt_path_t: Change code to use the privatization macro. | George Kadianakis | |
2019-05-03 | Hiding crypt_path_t: Hiding 'crypto' using a macro. | George Kadianakis | |
2019-05-03 | Revert "Hiding crypt_path_t: Ensure that ->private is initialized." | George Kadianakis | |
This reverts commit 7497c9193a0f2c891a0802bf5fbe73cf7ec1ca99. | |||
2019-05-03 | Revert "Hiding crypt_path_t: Create a constructor for crypt_path_t." | George Kadianakis | |
This reverts commit ab8b80944967ee5a6a0c45dbf61839cf257bfe44. | |||
2019-05-03 | Hiding crypt_path_t: Some TODO notes for future directions. | George Kadianakis | |
2019-05-03 | Hiding crypt_path_t: Move some more crypt_path-specific functions. | George Kadianakis | |
- Move test-only cpath_get_n_hops() to crypt_path.c. - Move onion_next_hop_in_cpath() and rename to cpath_get_next_non_open_hop(). The latter function was directly accessing cpath->state, and it's a first step at hiding ->state. | |||
2019-05-03 | Hiding crypt_path_t: Rename some functions to fit the crypt_path API. | George Kadianakis | |
Some of these functions are now public and cpath-specific so their name should signify the fact they are part of the cpath module: assert_cpath_layer_ok -> cpath_assert_layer_ok assert_cpath_ok -> cpath_assert_ok onion_append_hop -> cpath_append_hop circuit_init_cpath_crypto -> cpath_init_circuit_crypto circuit_free_cpath_node -> cpath_free onion_append_to_cpath -> cpath_extend_linked_list | |||
2019-05-03 | Hiding crypt_path_t: Trivial changes to satisfy check-local. | George Kadianakis | |
2019-05-03 | Hiding crypt_path_t: Ensure that ->private is initialized. | George Kadianakis | |
Now that we are using a constructor we should be more careful that we are always using the constructor to initialize crypt_path_t, so make sure that ->private is initialized. | |||
2019-05-03 | Hiding crypt_path_t: Create a constructor for crypt_path_t. | George Kadianakis | |
We are using an opaque pointer so the structure needs to be allocated on the heap. This means we now need a constructor for crypt_path_t. Also modify all places initializing a crypt_path_t to use the constructor. | |||
2019-05-03 | Hiding crypt_path_t: Fixup broken unittests. | George Kadianakis | |
2019-05-03 | Hiding crypt_path_t: Move the free func in crypt_path.c. | George Kadianakis | |
Again everything is moved, apart from a free line using ->private. | |||
2019-05-03 | Hiding crypt_path_t: Move some more init funcs in crypt_path.c. | George Kadianakis | |
Everything is moved, but the argument of the function is edited to access ->private->crypto. | |||
2019-05-03 | Hiding crypt_path_t: Start with crypt_path.crypto . | George Kadianakis | |
Create some functions to eventually be able to hide crypt_path_t.crypto. | |||
2019-05-03 | Hiding crypt_path_t: Move init functions to crypt_path.c. | George Kadianakis | |
This commit only moves code. | |||
2019-05-03 | Hiding crypt_path_t: Move assert functions in crypt_path.c. | George Kadianakis | |
This commit only moves code, and makes one function public. | |||
2019-05-03 | Hiding crypt_path_t: Introduce opaque crypt_path_private_t . | George Kadianakis | |
This will be our base for incrementally hiding crypt_path_t. | |||
2019-05-03 | Merge branch 'tor-github/pr/984' | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-05-03 | Note how to update the new website in the ReleasingTor.md instructions | Nick Mathewson | |
2019-05-02 | Merge branch 'maint-0.4.0' | Nick Mathewson | |
"ours" to avoid version bump. | |||
2019-05-02 | Bump to 0.4.0.5-dev | Nick Mathewson | |
2019-05-02 | forward-port changelog and releasenotes from 0.4.0.5 | Nick Mathewson | |
2019-05-02 | Merge branch 'tor-github/pr/986' | George Kadianakis | |
2019-05-02 | sendme: Add changes file for prop289 | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2019-05-02 | Merge branch 'tor-github/pr/999' | George Kadianakis | |
2019-05-02 | Add comments to include.am files to note where new sources go | Nick Mathewson | |
This mechanism isn't perfect, and sometimes it will guess wrong, but it will help our automation. |