summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2017-05-15fix duplicate words in changelogtor-0.3.0.7Nick Mathewson
2017-05-15copy changelog into releasenotesNick Mathewson
2017-05-15finish 0.3.0.7 changelogNick Mathewson
2017-05-15Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-05-15bump version to 0.3.0.7Nick Mathewson
2017-05-15Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-05-15Merge branch 'bug22246_030' into maint-0.3.0Nick Mathewson
2017-05-15Start on an 0.3.0.7 changelogNick Mathewson
2017-05-15Initialize the HS cache at startupNick Mathewson
Failure to do this caused an assertion failure with #22246 . This assertion failure can be triggered remotely, so we're tracking it as medium-severity TROVE-2017-002.
2017-05-10Merge branch 'maint-0.3.0' into release-0.3.0Roger Dingledine
2017-05-10resolve now-unused parameter from #21642 fixRoger Dingledine
2017-05-10Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-05-10Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-05-10Merge branch 'prop275_minimal_029' into maint-0.2.9Nick Mathewson
2017-05-08Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-05-08Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-05-08Merge branch 'bug21943_029' into maint-0.2.9Nick Mathewson
2017-05-08Add a changes file for 21943.Nick Mathewson
2017-05-08Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-05-08Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-05-08Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-05-08Merge branch 'maint-0.2.7-redux' into maint-0.2.8Nick Mathewson
2017-05-08Merge branch 'maint-0.2.6' into maint-0.2.7-reduxNick Mathewson
2017-05-08Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2017-05-08Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-05-08Update geoip and geoip6 to the May 2 2017 database.Karsten Loesing
2017-04-26Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-04-26bump to 0.3.0.6-devNick Mathewson
2017-04-26Reflow blurb.tor-0.3.0.6Nick Mathewson
2017-04-26improve the blurbs.Nick Mathewson
2017-04-26Pick a date, write a blurbNick Mathewson
2017-04-26Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-04-26Bump version to 0.3.0.6Nick Mathewson
2017-04-26Add getpid() to the seccomp2 sandbox.Nick Mathewson
We hadn't needed this before, because most getpid() callers on Linux were looking at the vDSO version of getpid(). I don't know why at least one version of OpenSSL seems to be ignoring the vDSO, but this change should fix it. Fixes bug 21943; bugfix on 0.2.5.1-alpha when the sandbox was introduced.
2017-04-24More changelog/releasenotes work for 0.3.0.6Nick Mathewson
2017-04-24Remove draft 030 release notes into the releasenotes fileNick Mathewson
2017-04-24Fold new entries into an 0.3.0.6 changelog.Nick Mathewson
2017-04-24Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-04-24Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-04-24control: Wrong check on base16_decode return valueDavid Goulet
The GETINFO extra-info/digest/<digest> broke in commit 568dc27a19 that refactored the base16_decode() API to return the decoded length. Unfortunately, that if() condition should have checked for the correct length instead of an error which broke the command in tor-0.2.9.1-alpha. Fixes #22034 Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-04-07Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-04-07Merge remote-tracking branch 'public/bug21894_029' into maint-0.3.0Nick Mathewson
2017-04-07Never read off the end of a buffer in base32_encode()Nick Mathewson
When we "fixed" #18280 in 4e4a7d2b0c199227252a742541461ec4cc35d358 in 0291 it appears that we introduced a bug: The base32_encode function can read off the end of the input buffer, if the input buffer size modulo 5 is not equal to 0 or 3. This is not completely horrible, for two reasons: * The extra bits that are read are never actually used: so this is only a crash when asan is enabled, in the worst case. Not a data leak. * The input sizes passed to base32_encode are only ever multiples of 5. They are all either DIGEST_LEN (20), REND_SERVICE_ID_LEN (10), sizeof(rand_bytes) in addressmap.c (10), or an input in crypto.c that is forced to a multiple of 5. So this bug can't actually trigger in today's Tor. Closes bug 21894; bugfix on 0.2.9.1-alpha.
2017-04-06Merge branch 'maint-0.3.0' into release-0.3.0Nick Mathewson
2017-04-06Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-04-06Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-04-06Merge branch 'maint-0.2.7-redux' into maint-0.2.8Nick Mathewson
2017-04-06Merge branch 'maint-0.2.6' into maint-0.2.7-reduxNick Mathewson
2017-04-06Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2017-04-06Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson