summaryrefslogtreecommitdiff
path: root/src/tools
AgeCommit message (Collapse)Author
2018-07-10Rename torlog.[ch] to log.[ch]Nick Mathewson
Fun fact: these files used to be called log.[ch] until we ran into conflicts with systems having a log.h file. But now that we always include "lib/log/log.h", we should be fine.
2018-07-10Rename util_malloc to malloc.Nick Mathewson
2018-07-10Remove all users of addr_port_lookup outside of address.cNick Mathewson
This function has a nasty API, since whether or not it invokes the resolver depends on whether one of its arguments is NULL. That's a good way for accidents to happen. This patch incidentally makes tor-resolve support socks hosts on IPv6.
2018-07-10Refactor ipv[46].[ch]Nick Mathewson
These are now combined into an inaddr.[ch], since their purpose is to implement functions for struct in_addr and struct in6_addr. The definitions for in6_addr and its allies are now in a separate header, inaddr_st.h. Closes ticket 26532.
2018-07-05Fix our build system to know the new locations of the src/or stuffNick Mathewson
2018-07-05Fix every include path changed in the previous commit (automated)Nick Mathewson
I am very glad to have written this script.
2018-07-05Move socks5_status.h to src/lib/netNick Mathewson
There might be a better place for it in the long run, but this is the best I can think of for now.
2018-07-01Tabify all of the .am files.Nick Mathewson
2018-06-29Stop using util.h and compat.h in src/toolsNick Mathewson
2018-06-29Extract socks5_status_tNick Mathewson
I'm not sure of the best place to put this header long-term, since both or/*.c and tools/tor-resolve.c use it.
2018-06-29Remove read_all and write_allNick Mathewson
These had become wrappers around their fd and socket variants; there were only a few users of the original functions still remaining.
2018-06-27Move util_format into a new libtor-encoding libraryNick Mathewson
libtor-encoding is about various ways to transform data to and from character sequences.
2018-06-27Fix up include paths for sandbox.h (automated)Nick Mathewson
2018-06-27rectify include paths (automatic) for address.hNick Mathewson
2018-06-27Link GetAdaptersAddresses, rather than loading it on-demand.Nick Mathewson
This function has been present since Windows XP.
2018-06-22Automated fixup of include paths after torlog.h movement.Nick Mathewson
2018-06-21Rectify include paths (automated)Nick Mathewson
2018-06-21Refactor makefiles to keep list of internal libraries in one place.Nick Mathewson
This change makes it possible for us to change the list of libraries more easily, without changing every single linker line.
2018-06-20Remove all use of the assert.h headerNick Mathewson
Nothing in Tor has actually called assert() for some while.
2018-06-20Run rectify_include_paths.pyNick Mathewson
2018-06-20Update copyrights to 2018.Nick Mathewson
2018-05-08Add crypto_log_errors() to crypto_util.[ch]Fernando Fernandez Mancera
crypto_log_errors() has been moved to crypto_util.[ch]. It was duplicated in some files so they have been removed too. Follows #24658. Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
2018-05-03Merge remote-tracking branch 'isis/bug24660_r1'Nick Mathewson
2018-04-16Remove old tor-fw-helper README from EXTRA_DISTNick Mathewson
We removed this file, but didn't take it out of EXTRA_DIST -- thus breaking "make dist".
2018-04-06crypto: Refactor (P)RNG functionality into new crypto_rand module.Isis Lovecruft
* ADD new /src/common/crypto_rand.[ch] module. * ADD new /src/common/crypto_util.[ch] module (contains the memwipe() function, since all crypto_* modules need this). * FIXES part of #24658: https://bugs.torproject.org/24658
2018-04-04Remove PortForwarding optionsNeel Chauhan
Signed-off-by: Isis Lovecruft <isis@torproject.org>
2018-03-26Merge branch 'bug24658-rm-curve25519-header' into bug24658-mergeNick Mathewson
2018-02-20Remove a bunch of other redundant #includesNick Mathewson
Folks have found two in the past week or so; we may as well fix the others. Found with: \#!/usr/bin/python3 import re def findMulti(fname): includes = set() with open(fname) as f: for line in f: m = re.match(r'^\s*#\s*include\s+["<](\S+)[>"]', line) if m: inc = m.group(1) if inc in includes: print("{}: {}".format(fname, inc)) includes.add(m.group(1)) import sys for fname in sys.argv[1:]: findMulti(fname)
2018-02-03Include crypto_digest.h in order to solve dependency issues.Fernando Fernandez Mancera
Included crypto_digest.h in some files in order to solve xof+digest module dependency issues. Removed crypto.h where it isn't needed anymore. Follows #24658. Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
2017-12-11Fix the log-severities memory-leak in tor-resolve.cNick Mathewson
Also, rename the variable to have a more manageable name, and make its scope more clear. Fixes bug 24582; bugfix on 0.2.1.1-alpha.
2017-11-01tor_runner.c: Add a circumlocution and a caveat.Nick Mathewson
2017-11-01Explain purpose, usage, and status of tor_runner.cNick Mathewson
2017-11-01Add a small library to emulate tor_run_main() with exec()Nick Mathewson
2017-09-17Fix memory leak in tor-gencert.cNick Mathewson
This was introduced in 4ff170d7b1cbe4074cb852, and is probably unreachable, but coverity complained about it (CID 1417761). Bug not in any released Tor, so no changes file.
2017-09-12Fix warnings about passing uninitialized buffers into functionsNick Mathewson
Most of these buffers were never actually inspected, but it's still bad style.
2017-08-2122839: Build tor with rust enabled on winTies Stuij
- make tor_util static library name configurable - fix Rust libary dependency order for Windows
2017-04-29Add --enable-rust configure switchSebastian Hahn
Introduce a way to optionally enable Rust integration for our builds. No actual Rust code is added yet and specifying the flag has no effect other than failing the build if rustc and cargo are unavailable.
2017-04-07Remove tor-checkkey as obsoleteNick Mathewson
CVE-2008-0166 is long gone, and we no longer need a helper tool to dump out public key moduli so folks can detect it. Closes ticket 21842.
2017-03-15Run the copyright update script.Nick Mathewson
2017-01-25Do not truncate too long hostnamesjunglefowl
If a hostname is supplied to tor-resolve which is too long, it will be silently truncated, resulting in a different hostname lookup: $ tor-resolve $(python -c 'print("google.com" + "m" * 256)') If tor-resolve uses SOCKS5, the length is stored in an unsigned char, which overflows in this case and leads to the hostname "google.com". As this one is a valid hostname, it returns an address instead of giving an error due to the invalid supplied hostname.
2016-12-18Revert ticket 20982 changes.Nick Mathewson
They broke stem, and breaking application compatibility is usually a bad idea. This reverts commit 6e10130e18c80f4521e31b071455ae0b1bbea761, commit 78a13df15842e8ab262e17825160386fadb77056, and commit 62f52a888acc191bcb507d27d31d54e42e6effdd. We might re-apply this later, if all the downstream tools can handle it, and it turns out to be useful for some reason.
2016-12-16Remove the version prefix from version numberscypherpunks
2016-12-16Remove the trailing dot from version numberscypherpunks
2016-11-03Merge branch 'bug20553_028'Nick Mathewson
2016-11-03Work around a behavior change in openssl's BUF_MEM codeNick Mathewson
In our code to write public keys to a string, for some unfathomable reason since 253f0f160e1185c, we would allocate a memory BIO, then set the NOCLOSE flag on it, extract its memory buffer, and free it. Then a little while later we'd free the memory buffer with BUF_MEM_free(). As of openssl 1.1 this doesn't work any more, since there is now a BIO_BUF_MEM structure that wraps the BUF_MEM structure. This BIO_BUF_MEM doesn't get freed in our code. So, we had a memory leak! Is this an openssl bug? Maybe. But our code was already pretty silly. Why mess around with the NOCLOSE flag here when we can just keep the BIO object around until we don't need the buffer any more? Fixes bug 20553; bugfix on 0.0.2pre8
2016-06-27Merge branch 'maint-0.2.8'Nick Mathewson
2016-06-24Bug19499: Fix GCC warnings when building against bleeding edge OpenSSL.Yawning Angel
The previous version of the new accessors didn't specify const but it was changed in master.
2016-06-14use new-form macros to disable -Wredundant-declsNick Mathewson
2016-06-14Merge branch 'maint-0.2.8'Nick Mathewson
2016-06-14Suppress the Wredundant-decls warning in another set of openssl headersNick Mathewson