aboutsummaryrefslogtreecommitdiff
path: root/src/core/or/protover.c
AgeCommit message (Collapse)Author
2020-08-03Fix comment on protover_list_is_invalidNick Mathewson
2020-08-03Rename protover_contains_long_protocol_names to protover_list_is_invalidNick Mathewson
This is an automated commit, generated by this command: ./scripts/maint/rename_c_identifier.py \ protover_contains_long_protocol_names protover_list_is_invalid
2020-08-03Merge remote-tracking branch 'tor-gitlab/mr/94'Nick Mathewson
2020-07-10Add an extra comment about keeping rust and c protover in sync.Nick Mathewson
2020-05-18rust/protover: Fix protocol version support error handlingteor
Make Rust protocol version support checks consistent with the undocumented error behaviour of the corresponding C code. Fixes bug 34251; bugfix on 0.3.3.5-rc.
2020-05-11protover: Declare support for Relay=3teor
Declare support for the new Relay=3 IPv6 extend protocol, in C and Rust. Part of 33226.
2020-02-14Merge remote-tracking branch 'tor-github/pr/1727/head'Nick Mathewson
2020-02-12protover: Sort tor's supported protocol versionsteor
As recommended by the tor directory specification. Fixes bug 33285; bugfix on 0.4.0.1-alpha.
2020-02-12protover: Update a comment about protover parsingteor
Comment-only change.
2020-02-09protover: reject unexpected commascypherpunks
Consistently reject extra commas, instead of only rejecting leading commas. Fix on b2b2e1c7f24d9b65059e3d089768d6c49ba4f58f. Fixes #27194; bugfix on 0.2.9.4-alpha.
2020-01-08It's 2020. Update the copyright dates with "make update-copyright"Nick Mathewson
2019-08-26hs-v3: Add protover HSIntro=5David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-08-12Bug 31356: Bump protover for new padding machinesMike Perry
By binding the protover numbering to specific padding machines, we can make our padding negotiation simpler. We probably should have done this in the first place. This has the side effect that earlier 0.4.1.x-alpha clients won't negotiate with 0.4.1.x-stable relays, and 0.4.1.x-stable clients won't negotiate with earlier 0.4.1.x-alpha relays (or 0.4.0.x relays). Since we don't support alphas after the stable is released, this is fine, so long as it gets in before the first stable of 0.4.1.x.
2019-05-03sendme: Add FlowCtrl protover valueDavid Goulet
See proposal 289 section 4.3 for more details. It describes the flow control protocol at the circuit and stream level. If there is no FlowCtrl protocol version, tor supports the unauthenticated flow control features from its supported Relay protocols. At this commit, relay will start advertising FlowCtrl=1 meaning they support authenticated SENDMEs v1. Closes #30363 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-04-11Make it clear to coverity we aren't leaking in protover_all_supported()Nick Mathewson
The logic here should be "use versions or free it". The "free it" part was previously in a kind of obfuscated place, so coverity wasn't sure it was invoked as appropriate. CID 1437436.
2019-01-16Bump copyright date to 2019Nick Mathewson
2019-01-16Bump copyright date to 2019.Nick Mathewson
2019-01-02Circuit padding ProtoVer plumbing.Mike Perry
This helps us to determine if a middle node can pad to us or not. Co-authored-by: George Kadianakis <desnacked@riseup.net>
2018-10-01Remove versions.h include from routerparse.hNick Mathewson
2018-10-01Move routerparse and parsecommon to their own module.Nick Mathewson
2018-09-21Merge branch 'maint-0.3.4'Nick Mathewson
2018-09-16Add tortls.h includes to expose critical macro. Fix #27734.Nick Mathewson
2018-09-16When Tor is compiled with NSS, don't claim support for LinkAuth=1Nick Mathewson
Closes ticket 27288
2018-07-05Whoops. Protover.[ch] belong in src/core/orNick Mathewson