summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2011-06-20Merge branch 'maint-0.2.2' into release-0.2.2tor-0.2.2.29-betaRoger Dingledine
2011-06-20Fix overwide lines in util.cNick Mathewson
2011-06-20bump to 0.2.2.29-betaRoger Dingledine
2011-06-20fold in the changes filesRoger Dingledine
2011-06-19Merge branch 'maint-0.2.2' into release-0.2.2Roger Dingledine
2011-06-19Tweak bug2355_revert at suggestion from RogerNick Mathewson
2011-06-17Add changes file for bug2355 revertNick Mathewson
2011-06-17Revert "Add an "auto" option to UseBridges"Nick Mathewson
This reverts commit 507c1257a4d9c629fefc2adbad8db73607749734.
2011-06-17Revert "Update man page for new UseBridges tristate behaviour."Nick Mathewson
This reverts commit 40cfad1b5ae90b06eb74861a4fdc1310f8611111.
2011-06-17Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2Nick Mathewson
2011-06-17Abandon rendezvous circuits on SIGNAL NEWNYMRobert Ransom
2011-06-17Merge branch 'bug3407' into maint-0.2.2Nick Mathewson
2011-06-17Make send_control_event_impl's behaviour saneRobert Ransom
2011-06-17Fix comment typoRobert Ransom
2011-06-17Make connection_printf_to_buf's behaviour saneRobert Ransom
2011-06-17log when we finish ssl handshake and move to renegotiationRoger Dingledine
debug-level since it will be quite common. logged at both client and server side. this step should help us track what's going on with people filtering tor connections by our ssl habits.
2011-06-14Merge remote-tracking branch 'public/bug3369' into maint-0.2.2Nick Mathewson
2011-06-14Add changes file for bug3393Nick Mathewson
2011-06-14Make ControlSocketsGroupWritable work with User.Jérémy Bobbio
Original message from bug3393: check_private_dir() to ensure that ControlSocketsGroupWritable is safe to use. Unfortunately, check_private_dir() only checks against the currently running user… which can be root until privileges are dropped to the user and group configured by the User config option. The attached patch fixes the issue by adding a new effective_user argument to check_private_dir() and updating the callers. It might not be the best way to fix the issue, but it did in my tests. (Code by lunar; changelog by nickm)
2011-06-13changelog entry for bug3369Nick Mathewson
2011-06-13client-side DNS proxy server: reply NOTIMPL to unsupported queriesintrigeri
Fix for bug 3369.
2011-06-08Fix a rare memleak during stats writingSebastian Hahn
If rep_hist_buffer_stats_write() was called unitinitalized, we'd leak memory.
2011-06-08Don't use signed 1-bit bitfieldsSebastian Hahn
This was harmless, we never compared it to anything but itself or 0. But Coverity complained, and it had a point.
2011-06-08Comment out some obviously dead code.Sebastian Hahn
Coverity warned about it, it's harmless to comment out.
2011-06-08Remove a few dead assignments during router parsingSebastian Hahn
2011-06-08Check some more return values in unit testsSebastian Hahn
2011-06-08remove some dead code, found by coveritySebastian Hahn
2011-06-06Merge branch 'bug3306_nm_squashed' into maint-0.2.2Nick Mathewson
2011-06-06Detect insanely large circuit build state; don't give its length to rand_intNick Mathewson
2011-06-06Check maximum properly in crypto_rand_int()Nick Mathewson
George Kadianakis notes that if you give crypto_rand_int() a value above INT_MAX, it can return a negative number, which is not what the documentation would imply. The simple solution is to assert that the input is in [1,INT_MAX+1]. If in the future we need a random-value function that can return values up to UINT_MAX, we can add one. Fixes bug 3306; bugfix on 0.2.2pre14.
2011-06-05Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine
2011-06-05move to the june 1 2011 maxmind geoip dbRoger Dingledine
2011-06-05put the release blurb inRoger Dingledine
2011-06-03prepare for tomorrow's releasetor-0.2.2.28-betaRoger Dingledine
2011-06-03whoopsRoger Dingledine
2011-06-03fold in latest changes filesRoger Dingledine
2011-06-03Merge branch 'maint-0.2.2' into release-0.2.2Roger Dingledine
2011-06-03Merge branch 'bug3318c' into maint-0.2.2Nick Mathewson
2011-06-03Reject 128-byte keys that are not 1024-bitNick Mathewson
When we added the check for key size, we required that the keys be 128 bytes. But RSA_size (which defers to BN_num_bytes) will return 128 for keys of length 1017..1024. This patch adds a new crypto_pk_num_bits() that returns the actual number of significant bits in the modulus, and uses that to enforce key sizes. Also, credit the original bug3318 in the changes file.
2011-06-03Merge remote-tracking branch 'rransom/bug2748-v2' into maint-0.2.2Nick Mathewson
2011-06-02Changes file for bug2355.Nick Mathewson
2011-06-02Update man page for new UseBridges tristate behaviour.anonym
2011-06-02Add an "auto" option to UseBridgesNick Mathewson
UseBridges 1 now means "connect only to bridges; if you know no bridges, don't make connections." UseBridges auto means "Use bridges if they are known, and we have no EntryNodes set, and we aren't a server." UseBridges 0 means "don't use bridges."
2011-06-02Merge remote-tracking branch 'rransom-tor/bug3309' into maint-0.2.2Nick Mathewson
2011-06-02Merge remote-tracking branch 'arma/bug3321' into maint-0.2.2Nick Mathewson
2011-06-02Fix unit test failure in dir/formatsSebastian Hahn
options->DirPort is 0 in the unit tests, so router_get_advertised_dir_port() would return 0 so we wouldn't pick a dirport. This isn't what we want for the unit tests. Fixes bug introduced in 95ac3ea5946.
2011-06-02Add info-level log messages during HS-client-state purgeRobert Ransom
I hope these will never be useful, but having them and not needing them is better than needing them and not having them.
2011-06-02Refactor HS client state-clearing code into a separate functionRobert Ransom
2011-06-02Clear last_hid_serv_requests on SIGNAL NEWNYMRobert Ransom
Fixes bug #3309.
2011-06-02Make last_hid_serv_requests functions less fragileRobert Ransom
Previously, Tor would dereference a NULL pointer and crash if lookup_last_hid_serv_request were called before the first call to directory_clean_last_hid_serv_requests. As far as I can tell, that's currently impossible, but I want that undocumented invariant to go away in case I^Wwe break it someday.