summaryrefslogtreecommitdiff
path: root/src/feature/rend
AgeCommit message (Collapse)Author
2019-11-15Doxygen: rename all .dox files to end with .mdNick Mathewson
Using a standard ending here will let other tools that expect markdown understand our output here. This commit was automatically generated with: for fn in $(find src -name '*.dox'); do \ git mv "$fn" "${fn%.dox}.md"; \ done
2019-11-15Doxygen: remove /** and **/ from all .dox filesNick Mathewson
This is an automatically generated commit, made with: find src -name '*.dox' | \ xargs perl -i -ne 'print unless (m#^\s*/?\*\*/?\s*$#);'
2019-11-05hs-v2: Fix memory leak in error code pathDavid Goulet
Coverity CID: 1455168 Closes #32356 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-11-05Doxygen: add several missing links.Nick Mathewson
2019-11-04directory-level documentation for feature/*Nick Mathewson
2019-11-04Doxygen: Avoid ambiguity in @dir directivesNick Mathewson
This commit was automatically generated with: find src -name '*.dox' |xargs perl -i -pe 's{\@dir ([^/])}{\@dir /$1};'
2019-11-04Add stub directory-level documentation for most source directoriesNick Mathewson
This includes app, core, feature, lib, and tools, but excludes ext, test, and trunnel. This was generated by the following shell script: cd src for dname in $(find lib core feature app tools -type d |grep -v \\.deps$); do keyword="$(echo "$dname" |sed -e "s/\//_/" )" target="${dname}/${keyword}.dox" echo "$target" cat <<EOF >"$target" /** @dir ${dname} @brief ${dname} **/ EOF git add "$target" done
2019-10-30hs-v2: Lookup intro failure cache when picking an intro from descriptorNeel Chauhan
When picking an intro point from the service descriptor, the client failed to lookup the failure cache. It made an HS v2 client re-pick bad intro points for which we already know it won't work in the first place. Based on Neel Chauhan original patch. Fixes #25568 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-26doxygen: add @file declarations for src/feature/Nick Mathewson
If a file doesn't use the file command (either \file or @file), Doxygen won't try to process it.
2019-10-20Merge branch 'maint-0.4.2'Roger Dingledine
2019-10-20fix easy typosRoger Dingledine
2019-10-16Doxygen: Fix mismatched filenames.Nick Mathewson
In 8 places, our \file declarations didn't match the actual files they were in.
2019-09-23fix typo in commentRoger Dingledine
2019-09-09Merge branch 'ticket30924_042_04_squashed' into ↵Nick Mathewson
ticket30924_042_04_squashed_merged
2019-09-04rendclient: use ptrdiff, not off_t, for offset of DH field.Nick Mathewson
The off_t type is only useful for offsets on the filesystem. For in-memory offsets, use ptrdiff_t.
2019-09-03Merge remote-tracking branch 'tor-github/pr/1279'Nick Mathewson
2019-09-02Merge branch 'maint-0.4.1'Nick Mathewson
2019-09-02Merge branch 'ticket12399_035' into maint-0.4.1Nick Mathewson
2019-09-02Change loglevel of message 'Hash of session info was not as expected'rl1987
2019-08-30Space out the arguments to the cell functions in rend_process_relay_cell()Neel Chauhan
2019-08-29Merge branch 'maint-0.4.1'David Goulet
2019-08-29Merge branch 'tor-github/pr/1255' into maint-0.4.1David Goulet
2019-08-26hs-v3: Move to hs_dos.c INTRO2 defenses initializationDavid Goulet
A bit cleaner especially that the next commit(s) will make the consensus param interface private to hs_dos.c so we expose as little as we can outside of the subsystem. Part of #30924 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-08-08hs: Initialize the INTRO2 bucket for legacy intro pointDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-08-06hs: Limit the amount of relayed INTRODUCE2David Goulet
This commit add the hs_dos.{c|h} file that has the purpose of having the anti-DoS code for onion services. At this commit, it only has one which is a function that decides if an INTRODUCE2 can be sent on the given introduction service circuit (S<->IP) using a simple token bucket. The rate per second is 25 and allowed burst to 200. Basic defenses on #15516. Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-06-05Revert "hs: Implement a helper to repurpose a circuit"Mike Perry
This reverts commit 3789f22bcbfbc6de415a838e4c4bfb2555c7d6c3.
2019-06-05Don't access rend data after a circuit has been marked for close.George Kadianakis
This can cause issues if the circuit was repurposed into a padding circuit instead of closing, since in that case we will wipe off the rend_data.
2019-06-05Run "make autostyle."Nick Mathewson
2019-06-05Merge remote-tracking branch 'tor-github/pr/1053'Nick Mathewson
2019-05-29hs: Implement a helper to repurpose a circuitDavid Goulet
When we repurpose a hidden service circuit, we need to clean up from the HS circuit map and any HS related data structured contained in the circuit. This commit adds an helper function that does it when repurposing a hidden service circuit. Fixes #29034 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-08Merge branch 'tor-github/pr/1000'David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-05-03Revert "Hiding crypt_path_t: Create a constructor for crypt_path_t."George Kadianakis
This reverts commit ab8b80944967ee5a6a0c45dbf61839cf257bfe44.
2019-05-03Hiding crypt_path_t: Rename some functions to fit the crypt_path API.George Kadianakis
Some of these functions are now public and cpath-specific so their name should signify the fact they are part of the cpath module: assert_cpath_layer_ok -> cpath_assert_layer_ok assert_cpath_ok -> cpath_assert_ok onion_append_hop -> cpath_append_hop circuit_init_cpath_crypto -> cpath_init_circuit_crypto circuit_free_cpath_node -> cpath_free onion_append_to_cpath -> cpath_extend_linked_list
2019-05-03Hiding crypt_path_t: Create a constructor for crypt_path_t.George Kadianakis
We are using an opaque pointer so the structure needs to be allocated on the heap. This means we now need a constructor for crypt_path_t. Also modify all places initializing a crypt_path_t to use the constructor.
2019-05-03Hiding crypt_path_t: Move init functions to crypt_path.c.George Kadianakis
This commit only moves code.
2019-04-30Use safe_mem_is_zero in a few more places.Nick Mathewson
I don't believe any of these represent a real timing vulnerability (remote timing against memcmp() on a modern CPU is not easy), but these are the ones where I believe we should be more careful.
2019-04-30Merge branch 'tor-github/pr/936'George Kadianakis
2019-04-19Initialize rate_limited to false in directory_get_from_hs_dir()Neel Chauhan
2019-04-19Make rate_limited and is_rate_limited a boolNeel Chauhan
2019-04-11On failure to create extend info for an introduction point, don't leak.Nick Mathewson
This is CID 1438152. No backport needed: this path is already inside a BUG() guard.
2019-04-11Make repeated/rate limited HSFETCH queries fail with QUERY_RATE_LIMITEDNeel Chauhan
2019-03-25Split all controller events code into a new control_events.cNick Mathewson
Also, split the formatting code shared by control.c and control_events.c into controller_fmt.c.
2019-02-27Set CIRCLAUNCH_NEED_UPTIME in rend_service_relaunch_rendezvous() on a ↵Neel Chauhan
hs_service_requires_uptime_circ()
2019-02-26Merge branch 'tor-github/pr/611'George Kadianakis
2019-01-18Merge branch 'maint-0.3.5'Nick Mathewson
2019-01-18Merge branch 'maint-0.3.4' into maint-0.3.5Nick Mathewson
2019-01-17Fix users of base32_decode to check for expected length in return.Nick Mathewson
Also, when we log about a failure from base32_decode(), we now say that the length is wrong or that the characters were invalid: previously we would just say that there were invalid characters. Follow-up on 28913 work.
2019-01-16Bump copyright date to 2019Nick Mathewson
2019-01-16Bump copyright date to 2019.Nick Mathewson
2019-01-11Merge branch 'maint-0.3.5'Nick Mathewson