Age | Commit message (Collapse) | Author | |
---|---|---|---|
2015-06-03 | Ensure signing_key is non-NULL before accessing one of its members | teor | |
signing_key can be NULL in ed_key_init_from_file in routerkeys.c. Discovered by clang 3.7 address sanitizer. Fix on c03694938ed0, not in any released version of Tor. | |||
2015-06-03 | Remove undefined directive-in-macro in test_util_writepid | teor | |
clang 3.7 complains that using a preprocessor directive inside a macro invocation in test_util_writepid in test_util.c is undefined. Fix on 79e85313aa61 on 0.2.7.1-alpha. | |||
2015-06-03 | Always initialise return value in compute_desc_id in rendcommon.c | teor | |
Fix on e6a581f126ba, released in 0.2.7.1-alpha. | |||
2015-06-03 | Silence unused variable warnings in find_cipher_by_id | teor | |
Unused variable warnings were still generated under some versions of OpenSSL. Instead, make sure all variables are used under all versions. Fix on 496df21c89d1, not in any released version of tor. | |||
2015-06-03 | Fix an incorrect comment on spawn_func | teor | |
spawn_func calls pthread_create on unix, not fork Fix on existing code split out of compat.c into compat_pthreads.c in c2f0d52b7fb9 | |||
2015-06-01 | Add a master-key-ed25519 line for convenience | Nick Mathewson | |
2015-06-01 | More check-spaces fixes | Nick Mathewson | |
2015-06-01 | Fix a memory leak in routerkeys.c | Nick Mathewson | |
2015-06-01 | Fix some memory leaks in ed25519 code and tests | Nick Mathewson | |
2015-06-01 | Appease make check-spaces | Andrea Shepard | |
2015-05-30 | Fix return-type gcc warning | Sharif Olorin | |
find_dl_schedule_and_len caused gcc to spit up with -Werror. Signed-off-by: Sharif Olorin <sio@tesser.org> | |||
2015-05-29 | Another memory leak bytes the dust. | Nick Mathewson | |
2015-05-29 | Attempt to fix keypinning on Windows | Nick Mathewson | |
Not that I would countenance a directory authority on Windows, but it would be nice if the unit tests passed. | |||
2015-05-29 | Fix another int-to-ptr cast. | Nick Mathewson | |
2015-05-29 | Fix a warning from the clangalyzer. | Nick Mathewson | |
2015-05-29 | Fix a sizeof(ptr) mistake in test-memwipe.c | Nick Mathewson | |
2015-05-29 | more generic scan-build script | Nick Mathewson | |
2015-05-28 | Merge remote-tracking branch 'origin/maint-0.2.6' | Nick Mathewson | |
2015-05-28 | Fix sandbox use with systemd. bug 16212. | Nick Mathewson | |
2015-05-28 | Avoid double-free on rend_add_service() failure | Nick Mathewson | |
Rend_add_service() frees its argument on failure; no need to free again. Fixes bug 16228, bugfix on 0.2.7.1-alpha Found by coverity; this is CID 1301387. | |||
2015-05-28 | There sure are a lot of these in test_hs.c. CID 1301385 | Nick Mathewson | |
2015-05-28 | Fix a bug in earlier torcert fix, fix another. | Nick Mathewson | |
2015-05-28 | Another test_hs leak. CID 1301383. | Nick Mathewson | |
2015-05-28 | Memory leak in tor_cert_parse. CID 1301382. | Nick Mathewson | |
2015-05-28 | Memory leak in tor_cert_parse. CID gi1301381 | Nick Mathewson | |
2015-05-28 | Fix leak-on-test-failure in test_routerkeys.c | Nick Mathewson | |
CID 1301379 | |||
2015-05-28 | Memory leak in test_hs_rend_data | Nick Mathewson | |
CID 1301377 | |||
2015-05-28 | Fix memory leak in test_routerkeys | Nick Mathewson | |
CID 1301376 | |||
2015-05-28 | Small leak in ed_key_init_from_file. CID 1301373 | Nick Mathewson | |
2015-05-28 | Memory leak on error in connection_or_compute_auth_cell_body. CID 1301372 | Nick Mathewson | |
2015-05-28 | fix memory leak on bad ns convote. CID 1301371. | Nick Mathewson | |
2015-05-28 | Fix memory leak on failure to generate EI. CID 1301370. | Nick Mathewson | |
2015-05-28 | Fix null dereference on key setup error. | Nick Mathewson | |
CID 1301369 | |||
2015-05-28 | Update trunnel code. | Nick Mathewson | |
This gets the minor change in trunnel 1.4.1, which should avoid deadcode warnings from Coverity. | |||
2015-05-28 | Avoid dereferencing null on unit test failure for link handshakes. | Nick Mathewson | |
This fixes CID 1301368 -- found by coverity | |||
2015-05-28 | Fix a bug when we fail to read a cert from a file. | Nick Mathewson | |
Found by coverity -- CID 1301366. | |||
2015-05-28 | Add assertions to crypto_dh_dup() | Nick Mathewson | |
Without these, coverity is annoyed that aren't checking for NULL in bench.c CID 1293335 -- found by coverity. | |||
2015-05-28 | Impose an upper limit on threads per threadpool. | Nick Mathewson | |
Found by Coverity; Fixes CID 1268069 | |||
2015-05-28 | Bug 12498 needs a changes file. | Nick Mathewson | |
2015-05-28 | Merge branch '12498_ed25519_keys_v6' | Nick Mathewson | |
Fixed numerous conflicts, and ported code to use new base64 api. | |||
2015-05-28 | Document some ed25519 key options | Nick Mathewson | |
2015-05-28 | Note some functions that should move or be merged | Nick Mathewson | |
2015-05-28 | Do not allocate our ed-link crosscert till after tls ctx | Nick Mathewson | |
We need this to prevent some annoying chutney crash-at-starts | |||
2015-05-28 | Generate weird certificates correctly | Nick Mathewson | |
(Our link protocol assumes that the link cert certifies the TLS key, and there is an RSA->Ed25519 crosscert) | |||
2015-05-28 | Regenerate ed25519 keys when they will expire soon. | Nick Mathewson | |
Also, have testing-level options to set the lifetimes and expiration-tolerances of all key types, plus a non-testing-level option to set the lifetime of any auto-generated signing key. | |||
2015-05-28 | # This is a combination of 2 commits. | Nick Mathewson | |
# The first commit's message is: Regenerate ed25519 keys when they will expire soon. Also, have testing-level options to set the lifetimes and expiration-tolerances of all key types, plus a non-testing-level option to set the lifetime of any auto-generated signing key. # The 2nd commit message will be skipped: # fixup! Regenerate ed25519 keys when they will expire soon. | |||
2015-05-28 | Only load master ed25519 secret keys when we absolutely must. | Nick Mathewson | |
2015-05-28 | Implement ed25519 identity collation for voting. | Nick Mathewson | |
This is a new collator type that follows proposal 220 for deciding which identities to include. The rule is (approximately): If a <ed,rsa> identity is listed by more than half of authorities, include it. And include all <rsa> votes about that node as matching. Otherwise, if an <*,rsa> or <rsa> identity is listed by more than half of the authorities, and no <ed,rsa> has been listed, include it. | |||
2015-05-28 | Refactor code that matches up routers with the same identity in votes | Nick Mathewson | |
This makes 'routerstatus collation' into a first-class concept, so we can change how that works for prop220. | |||
2015-05-28 | Checkpoint some work on voting on ed25519 identities | Nick Mathewson | |
* Include ed25519 identities in votes * Include "no ed25519 identity" in votes * Include some commented-out code about identity voting. (This will disappear.) * Include some functions for identity voting (These will disappear.) * Enforce uniqueness in ed25519 keys within a vote |