summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2018-04-05Revise procmon.c to use periodic_timer_tNick Mathewson
This removes its need to use event2/event.h, and thereby fixes another instance of 23750.
2018-04-05Add an API for a scheduled/manually activated event in the mainloopNick Mathewson
Using this API lets us remove event2/event.h usage from half a dozen modules, to better isolate libevent. Implements part of ticket 23750.
2018-04-02Remove an unnecessary event2 include.Nick Mathewson
The rest, are, unfortunately, necessary for now.
2018-04-02Remove event2/event.h include from compat_libevent.hNick Mathewson
Only one module was depending on this include (test_helpers.c), and it was doing so incorrectly.
2018-04-02Merge branch 'maint-0.3.3'Nick Mathewson
2018-04-02use channel_is_client for create cell countsRoger Dingledine
When a relay is collecting internal statistics about how many create cell requests it has seen of each type, accurately count the requests from relays that temporarily fall out of the consensus. (To be extra conservative, we were already ignoring requests from clients in our counts, and we continue ignoring them here.) Fixes bug 24910; bugfix on 0.2.4.17-rc.
2018-04-02dir auths no longer vote Guard if they're not voting V2DirRoger Dingledine
Directory authorities no longer vote in favor of the Guard flag for relays that don't advertise directory support. Starting in Tor 0.3.0.1-alpha, Tor clients have been avoiding using such relays in the Guard position, leading to increasingly broken load balancing for the 5%-or-so of Guards that don't advertise directory support. Fixes bug 22310; bugfix on 0.3.0.6.
2018-04-01misc tiny fixesRoger Dingledine
2018-03-29Fix CID 1433643Taylor Yu
Add a missing lock acquisition around access to queued_control_events in control_free_all(). Use the reassign-and-unlock strategy as in queued_events_flush_all(). Fixes bug 25675. Coverity found this bug, but only after we recently added an access to flush_queued_event_pending.
2018-03-29Merge branch 'maint-0.3.3'Nick Mathewson
2018-03-29Document torrc options that only work on v2 onion servicesteor
RendPostPeriod only works on v2 onion services. HiddenServiceAuthorizeClient is not yet implemented for v3 onion services. Closes ticket #25661, bugfix on 0.3.2.1-alpha.
2018-03-29Merge branch 'maint-0.3.3'Nick Mathewson
2018-03-29Merge branch 'bug25617_029' into maint-0.3.3Nick Mathewson
2018-03-29Merge branch 'maint-0.3.3'Nick Mathewson
"ours" merge to avoid version bump.
2018-03-29bump version to 0.3.3.4-alpha-devNick Mathewson
2018-03-29forward-port the 0.3.3.4-alpha changelogNick Mathewson
2018-03-29typo fix in doc/HACKING/ReleasingTorNick Mathewson
2018-03-29Mark controller-initiated DNS lookups as permitted to do DNS.Nick Mathewson
Fixes bug 25617; bugfix on 0.2.9.3-alpha.
2018-03-29Remove changes files from master for stuff that will be in 0.3.3.4-alphaNick Mathewson
2018-03-29Merge branch 'maint-0.3.3'Nick Mathewson
"-s ours" to avoid version bump.
2018-03-29Bump version to 0.3.3.4-alphaNick Mathewson
2018-03-29Improve bug25398 changes again.Nick Mathewson
2018-03-28Make check-changes pass on changes/bug25398Nick Mathewson
2018-03-28Merge remote-tracking branch 'hello71/bug25398'Nick Mathewson
2018-03-28Merge remote-tracking branch 'public/bug25512'Nick Mathewson
2018-03-28Merge remote-tracking branch 'asn-github/t-25432'Nick Mathewson
2018-03-28Merge branch 'maint-0.3.3'Nick Mathewson
2018-03-28Merge remote-tracking branch 'dgoulet/bug24767_033_03' into maint-0.3.3Nick Mathewson
2018-03-28Merge branch 'maint-0.3.3'Nick Mathewson
2018-03-28add a changes file for the rust libc updateNick Mathewson
2018-03-28Bug 25664: Update libc version requirement for RustGeorg Koppen
When merging the patches for #25310 the libc version requirement in `GettingStartedRust.md` and `configure.ac` did not get updated to the now needed 0.2.39.
2018-03-28Merge branch 'maint-0.3.3'Nick Mathewson
2018-03-28Merge branch 'bugs25036_25055_clean_033' into maint-0.3.3Nick Mathewson
2018-03-28Add a paranoia check in string_is_valid_nonrfc_hostname()Nick Mathewson
The earlier checks in this function should ensure that components is always nonempty. But in case somebody messes with them in the future, let's add an extra check to make sure we aren't crashing.
2018-03-28Rename string_is_valid_hostname -> string_is_valid_nonrfc_hostnameNick Mathewson
Per discussion on 25055.
2018-03-28Don't strlen before checking for NULLrl1987
2018-03-28Tweak loop conditionrl1987
2018-03-28Don't explode on NULL or empty stringrl1987
2018-03-28Allow alphanumeric TLDs in test for nowrl1987
2018-03-28Simplify hostname validation coderl1987
2018-03-28Validate hostnames with punycode TLDs correctlyrl1987
2018-03-28Improve handling of trailing dotrl1987
2018-03-28Test TLD validationrl1987
2018-03-28Refrain from including <ctype.h>rl1987
2018-03-28Also test bracket-less IPv6 string validationrl1987
2018-03-28Call strlen() oncerl1987
2018-03-28Fix bracketed IPv6 string validationrl1987
2018-03-28Adding changes filerl1987
2018-03-28Do not consider IP strings valid DNS names. Fixes #25055rl1987
2018-03-28Allow IPv6 address strings to be used as hostnames in SOCKS5 requestsrl1987