Age | Commit message (Collapse) | Author | |
---|---|---|---|
2017-08-08 | Correctly assign HSDir flags based on protocol list | George Kadianakis | |
In Nick's words: "We want to always return false if the platform is a Tor version, and it is not as new as 0.3.0.8 -- but if the platform is not a Tor version, or if the version is as new as 0.3.0.8, then we want to obey the protocol list. That way, other implementations of our protocol won't have to claim any particular Tor version, and future versions of Tor will have the freedom to drop this protocol in the distant future." | |||
2017-08-08 | prop224: HSDir v3 support is >= 0.3.0.8 | David Goulet | |
Because of bug #22447, we have to select nodes that are at least this version. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2017-07-13 | rephist: Remove unused crypto_pk statistics. | Isis Lovecruft | |
These statistics were largely ununsed, and kept track of statistical information on things like how many time we had done TLS or how many signatures we had verified. This information is largely not useful, and would only be logged after receiving a SIGUSR1 signal (but only if the logging severity level was less than LOG_INFO). * FIXES #19871. * REMOVES note_crypto_pk_op(), dump_pk_op(), and pk_op_counts from src/or/rephist.c. * REMOVES every external call to these functions. | |||
2017-07-01 | general formatting / whitespace / typo fixes | Roger Dingledine | |
2017-05-10 | #22211 Fix a comment in routerparse.c | Nick Mathewson | |
2017-05-04 | Update the consdiff directory code based on #22143 fixes | Nick Mathewson | |
These are mostly just identifier renames, except for one place in routerparse.c where we switch to using a correct hash. | |||
2017-05-04 | Store the sha3 of a networkstatus as part of the networkstatus_t | Nick Mathewson | |
Also store it in the cached_dir_t. | |||
2017-05-03 | bug#22143/prop#140: identify input diffs by their digest-as-signed | Nick Mathewson | |
See may 3 changes to prop140 for more background. | |||
2017-04-07 | prop224: Flag router with HSIntro/HSDir using protover | David Goulet | |
Note down in the routerstatus_t of a node if the router supports the HSIntro=4 version for the ed25519 authentication key and HSDir=2 version for the v3 descriptor supports. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2017-03-15 | Run the copyright update script. | Nick Mathewson | |
2017-03-06 | Check for NULL as input to extrainfo_parse_entry_from_string() | Nick Mathewson | |
We hope this will make the clangalyzer less worried about this function. Closes ticket 21496. | |||
2017-02-28 | Merge remote-tracking branch 'teor/bug21507-029' | Nick Mathewson | |
2017-02-19 | Reject Tor versions that contain non-numeric prefixes | teor | |
strto* and _atoi64 accept +, -, and various whitespace before numeric characters. And permitted whitespace is different between POSIX and Windows. Fixes bug 21507 and part of 21508; bugfix on 0.0.8pre1. | |||
2017-02-17 | Merge branch 'maint-0.2.9' into maint-0.3.0 | Nick Mathewson | |
2017-02-17 | Check for micro < 0, rather than checking "minor" twice. | Nick Mathewson | |
Bug found with clang scan-build. Fixes bug on f63e06d3dc6757d. Bug not present in any released Tor. | |||
2017-02-15 | Merge branch 'maint-0.2.9' | Nick Mathewson | |
2017-02-15 | whoops; make 21450 compile | Nick Mathewson | |
2017-02-15 | Merge branch 'maint-0.2.9' | Nick Mathewson | |
2017-02-15 | Limit version numbers to 0...INT32_MAX. | Nick Mathewson | |
Closes 21450; patch from teor. | |||
2017-02-15 | Merge branch 'maint-0.2.9' | Nick Mathewson | |
2017-02-15 | Merge branch 'bug21278_redux_029_squashed' into maint-0.2.9 | Nick Mathewson | |
2017-02-15 | Merge branch 'maint-0.2.8' into maint-0.2.9 | Nick Mathewson | |
2017-02-15 | Merge branch 'maint-0.2.7' into maint-0.2.8 | Nick Mathewson | |
2017-02-15 | Merge branch 'maint-0.2.6' into maint-0.2.7 | Nick Mathewson | |
2017-02-15 | Merge branch 'maint-0.2.5' into maint-0.2.6 | Nick Mathewson | |
2017-02-15 | Merge branch 'maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2017-02-15 | give tor_version_parse_platform some function documentation | Roger Dingledine | |
2017-02-15 | Extract the part of tor_version_as_new_as that extracts platform | Nick Mathewson | |
Also add a "strict" mode to reject negative inputs. | |||
2017-02-14 | Avoid integer underflow in tor_version_compare. | Nick Mathewson | |
Fix for TROVE-2017-001 and bug 21278. (Note: Instead of handling signed ints "correctly", we keep the old behavior, except for the part where we would crash with -ftrapv.) | |||
2017-01-30 | Memory leak on bogus ed key in microdesc | Nick Mathewson | |
2017-01-30 | Fix a memory leak found while fuzzing | Nick Mathewson | |
2017-01-30 | Three more fuzzers: consensus, hsdesc, intro points | Nick Mathewson | |
2017-01-30 | Make a bunch of signature/digest-checking functions mockable | Nick Mathewson | |
2016-12-20 | Merge branch 'maint-0.2.6' into maint-0.2.7 | Nick Mathewson | |
2016-12-20 | Merge branch 'maint-0.2.5' into maint-0.2.6 | Nick Mathewson | |
2016-12-20 | Merge branch 'maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2016-12-19 | Merge branch 'maint-0.2.9' | Nick Mathewson | |
2016-12-19 | Merge branch 'maint-0.2.8' into maint-0.2.9 | Nick Mathewson | |
2016-12-19 | Merge branch 'bug21018_024' into maint-0.2.8 | Nick Mathewson | |
2016-12-18 | Fix parsing bug with unecognized token at EOS | Nick Mathewson | |
In get_token(), we could read one byte past the end of the region. This is only a big problem in the case where the region itself is (a) potentially hostile, and (b) not explicitly nul-terminated. This patch fixes the underlying bug, and also makes sure that the one remaining case of not-NUL-terminated potentially hostile data gets NUL-terminated. Fix for bug 21018, TROVE-2016-12-002, and CVE-2016-1254 | |||
2016-12-16 | Merge branch 'prop271_030_v1_squashed' | Nick Mathewson | |
2016-12-13 | Remove a little dead code from routerparse.c | Nick Mathewson | |
In c35fad2bdef47f2063ccc989cac99b154e2ee36e, merged in 0.2.4.7-alpha, we removed the code to parse v1 directory objects. When we did so, we removed everything that could set the CST_CHECK_AUTHORITY flag for check_signature_token(). So in this code, we remove the flag itself, the code to handle the flag, and a function that only existed to handle the flag. | |||
2016-12-05 | Fix a couple more crypto_digest() calls to be explicit < 0 | Nick Mathewson | |
2016-11-30 | Teach parse_iso_time about the spaceless variant. | Nick Mathewson | |
(We previously added support for generating the spaceless 2016-11-14T19:58:12 variant, but not for actually parsing it.) | |||
2016-11-24 | crypto_digest256 returns expected error value of -1 | Chelsea H. Komlo | |
2016-11-24 | crypto_digest returns expected error value of -1 | Chelsea H. Komlo | |
2016-11-10 | Merge remote-tracking branch 'public/feature20552' | Nick Mathewson | |
2016-11-08 | Merge branch 'maint-0.2.9' | Nick Mathewson | |
2016-11-04 | Merge branch 'ticket17238_029_02-resquash' | Nick Mathewson | |
Conflicts: src/or/rendclient.c src/or/rendcommon.c src/or/routerparse.c src/test/test_dir.c src/trunnel/ed25519_cert.h | |||
2016-11-04 | Move token parsing code to parsecommon.{c|h} | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> Signed-off-by: George Kadianakis <desnacked@riseup.net> |