aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2019-02-13Merge branch 'tor-github/pr/650' into maint-0.3.5David Goulet
2019-02-12Merge branch 'maint-0.3.4' into maint-0.3.5Nick Mathewson
2019-02-12Merge branch 'maint-0.3.3' into maint-0.3.4Nick Mathewson
2019-02-12Merge branch 'maint-0.2.9' into maint-0.3.3Nick Mathewson
2019-02-12test: Fix a warning underflow in rend_cache/cleanDavid Goulet
Because the test is adding entries to the "rend_cache" directly, the rend_cache_increment_allocation() was never called which made the rend_cache_clean() call trigger that underflow warning: rend_cache/clean: [forking] Nov 29 09:55:04.024 [warn] rend_cache_decrement_allocation(): Bug: Underflow in rend_cache_decrement_allocation (on Tor 0.4.0.0-alpha-dev 2240fe63feb9a8cf) The test is still good and valid. Fixes #28660 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-02-12Update geoip and geoip6 to the February 5 2019 database.Karsten Loesing
2019-02-08Merge branch 'ticket29040_1_changes' into maint-0.3.5Nick Mathewson
2019-02-08Merge remote-tracking branch 'tor-github/pr/670' into maint-0.3.5Nick Mathewson
2019-02-05Merge branch 'maint-0.3.4' into maint-0.3.5Roger Dingledine
2019-02-05Merge branch 'maint-0.3.3' into maint-0.3.4Roger Dingledine
2019-02-01Update Cargo.lock with new comment; suppress 29244.Nick Mathewson
2019-01-26Allow empty username/password in SOCKS5 username/password auth messagerl1987
2019-01-23Another case of possible gmtime angst.Nick Mathewson
2019-01-24hs-v3: add an option param to safe log functionsSuphanat Chunhapanya
We add an option param to safe_str and safe_str_client because in some case we need to use those functions before global_options is set.
2019-01-24hs-v3: fix use after free in client auth configSuphanat Chunhapanya
We accidentally use `auth` after freeing it in client_service_authorization_free. The way to solve it is to free after using it.
2019-01-23test: Fix a warning underflow in rend_cache/cleanDavid Goulet
Because the test is adding entries to the "rend_cache" directly, the rend_cache_increment_allocation() was never called which made the rend_cache_clean() call trigger that underflow warning: rend_cache/clean: [forking] Nov 29 09:55:04.024 [warn] rend_cache_decrement_allocation(): Bug: Underflow in rend_cache_decrement_allocation (on Tor 0.4.0.0-alpha-dev 2240fe63feb9a8cf) The test is still good and valid. Fixes #28660 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-01-23Capture more BUG warnings in util/time testNick Mathewson
These are ones that happen on windows only. Fixes bug 29161.
2019-01-23If address/get_if_addrs6 can't findipv6, log WARN, not ERRNick Mathewson
Fixes 29160, and allows 28668 (treating ERR logs as test failures) to procede.
2019-01-23Log an HSDesc we failed to parse at Debug loglevelrl1987
2019-01-22Merge branch 'bug29042_035' into maint-0.3.5Nick Mathewson
2019-01-18Merge branch 'maint-0.3.3' into maint-0.3.4Nick Mathewson
2019-01-18Merge branch 'maint-0.2.9' into maint-0.3.3Nick Mathewson
2019-01-18Merge branch 'maint-0.3.4' into maint-0.3.5Nick Mathewson
2019-01-16Fail any unit test that causes an unhandled LD_BUG or LOG_ERRNick Mathewson
Closes ticket 28668.
2019-01-16Update and fix a couple of comments in meminfo.cKris Katterjohn
This fixes a typo and also notes that HW_PHYSMEM64 is defined on NetBSD (not just OpenBSD). Signed-off-by: Kris Katterjohn <katterjohn@gmail.com>
2019-01-16Use HW_PHYSMEM instead of HW_USERMEM in get_total_system_memory_implKris Katterjohn
The code checked for sysctl being available and HW_PHYSMEM being defined, but HW_USERMEM was actually being used with sysctl instead of HW_PHYSMEM. The case for OpenBSD, etc. use HW_PHYSMEM64 (which is obviously a 64-bit variant of HW_PHYSMEM) and the case for OSX uses HW_MEMSIZE (which appears to be a 64-bit variant of HW_PHYSMEM). Signed-off-by: Kris Katterjohn <katterjohn@gmail.com>
2019-01-16Log more messages when failing to decode RSA keysNick Mathewson
We log these messages at INFO level, except when we are reading a private key from a file, in which case we log at WARN. This fixes a regression from when we re-wrote our PEM code to be generic between nss and openssl. Fixes bug 29042, bugfix on 0.3.5.1-alpha.
2019-01-16Bump copyright date to 2019.Nick Mathewson
2019-01-14Rework rep_hist_log_link_protocol_counts()rl1987
2019-01-11Merge remote-tracking branch 'tor-github/pr/563' into maint-0.3.5Nick Mathewson
2019-01-10rend: stop warning when clients send multiple rend establish cellsteor
Stop logging "Tried to establish rendezvous on non-OR circuit..." as a warning. Instead, log it as a protocol warning, because there is nothing that relay operators can do to fix it. Fixes bug 29029; bugfix on 0.2.5.7-rc.
2019-01-09Merge remote-tracking branch 'tor-github/pr/636' into maint-0.3.5Nick Mathewson
2019-01-09Stop logging 'Your Guard' in circpathbias.crl1987
2019-01-09Fix (and make consistent) the use of OpenBSD preprocessor macro testsKris Katterjohn
Prior to this commit, the testsuite was failing on OpenBSD. After this commit the testsuite runs fine on OpenBSD. It was previously decided to test for the OpenBSD macro (rather than __OpenBSD__, etc.) because OpenBSD forks seem to have the former macro defined. sys/param.h must be included for the OpenBSD macro definition; however, many files tested for the OpenBSD macro without having this header included. This commit includes sys/param.h in the files where the OpenBSD macro is used (and sys/param.h is not already included), and it also changes some instances of the __OpenBSD__ macro to OpenBSD. See commit 27df23abb675ffeb198bf0c1cc85c4baed77a988 which changed everything to use OpenBSD instead of __OpenBSD__ or OPENBSD. See also tickets #6982 and #20980 (the latter ticket is where it was decided to use the OpenBSD macro). Signed-off-by: Kris Katterjohn <katterjohn@gmail.com>
2019-01-07Update to 0.3.5.7-devNick Mathewson
2019-01-07Update to 0.3.4.10-devNick Mathewson
2019-01-07Update to 0.3.3.3.11-devNick Mathewson
2019-01-07Fix tor_ersatz_socketpair on IPv6-only systemsKris Katterjohn
In get_local_listener used by tor_ersatz_socketpair, the address family used when binding the IPv6 socket was AF_INET instead of AF_INET6. Fixes bug 28995; bugfix on 0.3.5.1-alpha. Signed-off-by: Kris Katterjohn <katterjohn@gmail.com>
2019-01-07Bump version to 0.3.5.7Nick Mathewson
2019-01-07Bump to 0.3.4.10Nick Mathewson
2019-01-07Bump to 0.3.3.11Nick Mathewson
2019-01-07Merge branch 'maint-0.3.4' into maint-0.3.5Nick Mathewson
2019-01-07Merge branch 'maint-0.3.3' into maint-0.3.4Nick Mathewson
2019-01-07Merge branch 'maint-0.2.9' into maint-0.3.3Nick Mathewson
2019-01-07Update geoip and geoip6 to the January 3 2019 database.Karsten Loesing
2019-01-04Merge branch 'bug21394_029_redux' into maint-0.2.9Nick Mathewson
2019-01-04Merge branch 'maint-0.3.3' into maint-0.3.4Nick Mathewson
2019-01-04Merge remote-tracking branch 'dgoulet/ticket28619_033_01' into maint-0.3.3Nick Mathewson
2019-01-04Merge branch 'ticket27750_034_01_squashed' into maint-0.3.4Nick Mathewson
2019-01-03Merge branch 'ticket28879' into maint-0.3.5Nick Mathewson