summaryrefslogtreecommitdiff
path: root/src/or/routerparse.c
AgeCommit message (Collapse)Author
2017-08-08Correctly assign HSDir flags based on protocol listGeorge Kadianakis
In Nick's words: "We want to always return false if the platform is a Tor version, and it is not as new as 0.3.0.8 -- but if the platform is not a Tor version, or if the version is as new as 0.3.0.8, then we want to obey the protocol list. That way, other implementations of our protocol won't have to claim any particular Tor version, and future versions of Tor will have the freedom to drop this protocol in the distant future."
2017-08-08prop224: HSDir v3 support is >= 0.3.0.8David Goulet
Because of bug #22447, we have to select nodes that are at least this version. Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-07-13rephist: Remove unused crypto_pk statistics.Isis Lovecruft
These statistics were largely ununsed, and kept track of statistical information on things like how many time we had done TLS or how many signatures we had verified. This information is largely not useful, and would only be logged after receiving a SIGUSR1 signal (but only if the logging severity level was less than LOG_INFO). * FIXES #19871. * REMOVES note_crypto_pk_op(), dump_pk_op(), and pk_op_counts from src/or/rephist.c. * REMOVES every external call to these functions.
2017-07-01general formatting / whitespace / typo fixesRoger Dingledine
2017-05-10#22211 Fix a comment in routerparse.cNick Mathewson
2017-05-04Update the consdiff directory code based on #22143 fixesNick Mathewson
These are mostly just identifier renames, except for one place in routerparse.c where we switch to using a correct hash.
2017-05-04Store the sha3 of a networkstatus as part of the networkstatus_tNick Mathewson
Also store it in the cached_dir_t.
2017-05-03bug#22143/prop#140: identify input diffs by their digest-as-signedNick Mathewson
See may 3 changes to prop140 for more background.
2017-04-07prop224: Flag router with HSIntro/HSDir using protoverDavid Goulet
Note down in the routerstatus_t of a node if the router supports the HSIntro=4 version for the ed25519 authentication key and HSDir=2 version for the v3 descriptor supports. Signed-off-by: David Goulet <dgoulet@torproject.org>
2017-03-15Run the copyright update script.Nick Mathewson
2017-03-06Check for NULL as input to extrainfo_parse_entry_from_string()Nick Mathewson
We hope this will make the clangalyzer less worried about this function. Closes ticket 21496.
2017-02-28Merge remote-tracking branch 'teor/bug21507-029'Nick Mathewson
2017-02-19Reject Tor versions that contain non-numeric prefixesteor
strto* and _atoi64 accept +, -, and various whitespace before numeric characters. And permitted whitespace is different between POSIX and Windows. Fixes bug 21507 and part of 21508; bugfix on 0.0.8pre1.
2017-02-17Merge branch 'maint-0.2.9' into maint-0.3.0Nick Mathewson
2017-02-17Check for micro < 0, rather than checking "minor" twice.Nick Mathewson
Bug found with clang scan-build. Fixes bug on f63e06d3dc6757d. Bug not present in any released Tor.
2017-02-15Merge branch 'maint-0.2.9'Nick Mathewson
2017-02-15whoops; make 21450 compileNick Mathewson
2017-02-15Merge branch 'maint-0.2.9'Nick Mathewson
2017-02-15Limit version numbers to 0...INT32_MAX.Nick Mathewson
Closes 21450; patch from teor.
2017-02-15Merge branch 'maint-0.2.9'Nick Mathewson
2017-02-15Merge branch 'bug21278_redux_029_squashed' into maint-0.2.9Nick Mathewson
2017-02-15Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2017-02-15Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson
2017-02-15Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson
2017-02-15Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2017-02-15Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2017-02-15give tor_version_parse_platform some function documentationRoger Dingledine
2017-02-15Extract the part of tor_version_as_new_as that extracts platformNick Mathewson
Also add a "strict" mode to reject negative inputs.
2017-02-14Avoid integer underflow in tor_version_compare.Nick Mathewson
Fix for TROVE-2017-001 and bug 21278. (Note: Instead of handling signed ints "correctly", we keep the old behavior, except for the part where we would crash with -ftrapv.)
2017-01-30Memory leak on bogus ed key in microdescNick Mathewson
2017-01-30Fix a memory leak found while fuzzingNick Mathewson
2017-01-30Three more fuzzers: consensus, hsdesc, intro pointsNick Mathewson
2017-01-30Make a bunch of signature/digest-checking functions mockableNick Mathewson
2016-12-20Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson
2016-12-20Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2016-12-20Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2016-12-19Merge branch 'maint-0.2.9'Nick Mathewson
2016-12-19Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2016-12-19Merge branch 'bug21018_024' into maint-0.2.8Nick Mathewson
2016-12-18Fix parsing bug with unecognized token at EOSNick Mathewson
In get_token(), we could read one byte past the end of the region. This is only a big problem in the case where the region itself is (a) potentially hostile, and (b) not explicitly nul-terminated. This patch fixes the underlying bug, and also makes sure that the one remaining case of not-NUL-terminated potentially hostile data gets NUL-terminated. Fix for bug 21018, TROVE-2016-12-002, and CVE-2016-1254
2016-12-16Merge branch 'prop271_030_v1_squashed'Nick Mathewson
2016-12-13Remove a little dead code from routerparse.cNick Mathewson
In c35fad2bdef47f2063ccc989cac99b154e2ee36e, merged in 0.2.4.7-alpha, we removed the code to parse v1 directory objects. When we did so, we removed everything that could set the CST_CHECK_AUTHORITY flag for check_signature_token(). So in this code, we remove the flag itself, the code to handle the flag, and a function that only existed to handle the flag.
2016-12-05Fix a couple more crypto_digest() calls to be explicit < 0Nick Mathewson
2016-11-30Teach parse_iso_time about the spaceless variant.Nick Mathewson
(We previously added support for generating the spaceless 2016-11-14T19:58:12 variant, but not for actually parsing it.)
2016-11-24crypto_digest256 returns expected error value of -1Chelsea H. Komlo
2016-11-24crypto_digest returns expected error value of -1Chelsea H. Komlo
2016-11-10Merge remote-tracking branch 'public/feature20552'Nick Mathewson
2016-11-08Merge branch 'maint-0.2.9'Nick Mathewson
2016-11-04Merge branch 'ticket17238_029_02-resquash'Nick Mathewson
Conflicts: src/or/rendclient.c src/or/rendcommon.c src/or/routerparse.c src/test/test_dir.c src/trunnel/ed25519_cert.h
2016-11-04Move token parsing code to parsecommon.{c|h}David Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org> Signed-off-by: George Kadianakis <desnacked@riseup.net>