summaryrefslogtreecommitdiff
path: root/src/or
AgeCommit message (Collapse)Author
2015-09-01Bug 15482: Don't abandon circuits that are still in use for browsing.Mike Perry
Only applies to connections with SOCKS auth set, so that non-web Tor activity is not affected. Simpler version of Nick's patch because the randomness worried me, and I'm not otherwise sure why we want a max here.
2015-09-01missing semicolonNick Mathewson
2015-09-01Fix an always-false check with an assertionNick Mathewson
In validate_recommended_package_line, at this point in the function, n_entries is always >= 1. Coverity doesn't like us checking it for 0. CID 1268063.
2015-09-01Fix a false-positive in coverity scan with an assertionNick Mathewson
CID 1301373
2015-09-01Fix code for checking expired certificates on loadNick Mathewson
Fixes CID 1306915, which noticed that the check was dead.
2015-09-01Simplify API for find_rp_for_intro()Nick Mathewson
The function now unconditionally allocates a new extend_info_t. This should convince coverity that we're not leaking memory. (CID 1311875)
2015-09-01properly delete current channel in channel_free_listSebastian Hahn
channel_unregister() removes channels from the current smartlist while we're in a SMORTLIST_FOREACH loop. This only works by accident.
2015-08-26Merge remote-tracking branch 'rl1987/test_dns_resolve_rebased'Nick Mathewson
2015-08-25Log malformed hostnames in socks5 request respecting SafeLoggingAndreas Stieger
2015-08-23Unit test dns_resolve(), dns_clip_ttl(), dns_get_expiry_ttl().rl1987
2015-08-21Is this the syntax that will make freebsd make happy?Nick Mathewson
2015-08-21Merge branch 'workqueue_squashed'Nick Mathewson
2015-08-21Fix a bunch of check-spaces complaintsSebastian Hahn
2015-08-21Ensure worker threads actually exit when it is timeSebastian Hahn
This includes a small refactoring to use a new enum (workqueue_reply_t) for the return values instead of just ints.
2015-08-20Rename EVENT_SIGNAL -> EVENT_GOT_SIGNALNick Mathewson
This avoids a conflict with a macro decl from libevent 1.x. Fixes bug 16867; bug not in any released Tor.
2015-08-19Merge branch 'ed25519_keygen_squashed'Nick Mathewson
2015-08-19More log messages for keygen problemsNick Mathewson
2015-08-19Explain better why we are about to load the master key.Nick Mathewson
2015-08-19Don' call failure to get keys a bug; it's possible now.Nick Mathewson
2015-08-19When we infer the master key from the certificate, save it to disk.Nick Mathewson
2015-08-19Add test_keygen tests for all log outputs; improve keygen outputs.Nick Mathewson
2015-08-19Resolve failing test_keygen tests.Nick Mathewson
2015-08-19Checkpoint work on ed25519 keygen improvements.Nick Mathewson
Needs changes file, documentation, test integration, more tests.
2015-08-18Merge remote-tracking branch 'teor/feature14882-TestingDirAuthVoteIsStrict-v3'Nick Mathewson
2015-08-18Merge remote-tracking branch 'arma/bug16844-logs'Nick Mathewson
2015-08-18Merge branch 'decouple_controller_events_squashed'Nick Mathewson
2015-08-18Use thread-local storage to block event_queue recursion.Nick Mathewson
2015-08-18Multithreading support for event-queue code.Nick Mathewson
2015-08-18Refactor initialization logic for control-event-queueNick Mathewson
This puts the init logic in a separate function, which we will need once we have locking.
2015-08-18Remove obsolete event_format_tNick Mathewson
We used to use this when we had some controllers that would accept long names and some that wouldn't. But it's been obsolete for a while, and it's time to strip it out of the code.
2015-08-18Refactor our logic for sending events to controllersNick Mathewson
Previously we'd put these strings right on the controllers' outbufs. But this could cause some trouble, for these reasons: 1) Calling the network stack directly here would make a huge portion of our networking code (from which so much of the rest of Tor is reachable) reachable from everything that potentially generated controller events. 2) Since _some_ events (EVENT_ERR for instance) would cause us to call connection_flush(), every control_event_* function would appear to be able to reach even _more_ of the network stack in our cllgraph. 3) Every time we generated an event, we'd have to walk the whole connection list, which isn't exactly fast. This is an attempt to break down the "blob" described in http://archives.seul.org/tor/dev/Mar-2015/msg00197.html -- the set of functions from which nearly all the other functions in Tor are reachable. Closes ticket 16695.
2015-08-18Use tabs in src/or/include.amSebastian Hahn
2015-08-18Fix typo in double_digest_map typeSebastian Hahn
2015-08-18Refactor TestingDirAuthVote* into dirserv_set_routerstatus_testingteor
Make it easier to unit test TestingDirAuthVote{Exit,Guard,HSDir} by refactoring the code which sets flags based on them into a new function dirserv_set_routerstatus_testing.
2015-08-18New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flagsteor
"option to prevent guard,exit,hsdir flag assignment" "A node will never receive the corresponding flag unless that node is specified in the TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of its uptime, bandwidth, exit policy, or DirPort". Patch modified by "teor": VoteOnHidServDirectoriesV2 is now obsolete, so TestingDirAuthVoteHSDir always votes on HSDirs. Closes ticket 14882. Patch by "robgjansen". Commit message and changes file by "teor" with quotes from "robgjansen".
2015-08-18Fix TestingDirAuthVoteHSDir docs: HSDir flag needs DirPortteor
Fix an error in the manual page and comments for TestingDirAuthVoteHSDir, which suggested that a HSDir required "ORPort connectivity". While this is true, it is in no way unique to the HSDir flag. Of all the flags, only HSDirs need a DirPort configured in order for the authorities to assign that particular flag. Fixed as part of 14882. Patch by "teor". Bugfix on 0.2.6.3 (f9d57473e1ff on 10 January 2015).
2015-08-17Merge remote-tracking branches 'public/decouple_lost_owner' and ↵Nick Mathewson
'public/decouple_signals'
2015-08-17Logs and debug info that I used for finding bug 16844Roger Dingledine
2015-08-17Merge remote-tracking branch 'public/decouple_retry_directory'Nick Mathewson
2015-08-17Fix an assertion failure introduced in 20254907d7Nick Mathewson
Fixes bug 16829; bug not in any released Tor.
2015-08-17Fix a stupid memory leak I introduced in 8afbc154. Bug not in any released Tor.Nick Mathewson
2015-08-17Remove redundant tor_free() in command_process_create_cell().Isis Lovecruft
* FIXES #16823: https://bugs.torproject.org/16823 If an OP were to send a CREATE_FAST cell to an OR, and that CREATE_FAST cell had unparseable key material, then tor_free() would be called on the create cell twice. This fix removes the second (conditional on the key material being bad) call to tor_free(), so that now the create cell is always freed once, regardless of the status of the key material. (This isn't actually a double-free bug, since tor_free() sets its input to NULL, and has no effect when called with input NULL.)
2015-08-17Merge remote-tracking branch 'isis/fix/circuitlist-docstring-typo'Nick Mathewson
2015-08-14Merge remote-tracking branch 'public/decouple_init_keys'Nick Mathewson
2015-08-13Fix some types on container fnsNick Mathewson
2015-08-13Decouple routerlist_retry_directory_downloads() from the blobNick Mathewson
Instead of having it call update_all_descriptor_downloads and update_networkstatus_downloads directly, we can have it cause them to get rescheduled and called from run_scheduled_events. Closes ticket 16789.
2015-08-13Change lost_owning_controller() to call activate_signal().Nick Mathewson
Closes ticket 16788.
2015-08-12Fix a windows compilation errorNick Mathewson
2015-08-12Fix a memory leak when adding an ri with expired ed certsNick Mathewson
Fixes bug 16539; bugfix on 0.2.7.2-alpha.
2015-08-12Try to decouple process_signal() from anything not event-drivenNick Mathewson
This needs debugging; it currently breaks the stem tests.