summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2012-02-13Synchronize with upstream tinytest.Nick Mathewson
The big change here is a patch (first added to Libevent by Ed Day) to make sure that the CreateProcess forked-test trick works even when the main test program is invoked without its .exe suffix.
2012-02-13bump to 0.2.3.12-alpha-devRoger Dingledine
2012-02-13bump to 0.2.3.12-alphaRoger Dingledine
2012-02-13Reinstate TOR_PR_EXTENDED_SERVER_PORT, just a littleNick Mathewson
2012-02-12set_managed_proxy_environment() can't fail anymoreSebastian Hahn
It already couldn't fail on Windows, now it can't fail on non-Windows, either.
2012-02-12Properly set up environment for managed-mode obfsproxySebastian Hahn
2012-02-12Try to have (and maintain!) an invariant about unconfigured_proxies_nNick Mathewson
The invariant is: unconfigured_proxies_n is exactly the number of managed_proxy_t not in state PT_PROTO_COMPLETED. To maintain this, we need to stop overloading unconfigured_proxies_n to also count managed_proxy_t items that are in PT_PROTO_COMPLETED but which might need relaunching. To make it so we can detect those, we introduce another variable. This commit also adds a function to assert that we haven't broken the invariant. Fix for bug 5084; bugfix on 0.2.3.6-alpha, I think.
2012-02-12Don't smartlist_remove a managed proxy from a list we're iterating over.Nick Mathewson
In some cases, we solve this by doing a SMARTLIST_DEL_CURRENT before calling managed_proxy_destroy. But for a trickier one, we just make a copy of the list before iterating over it, so that changes to the manage proxy list don't hurt our iteration. This could be related to bug 5084.
2012-02-12Fix a check-spaces complaintSebastian Hahn
2012-02-12Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
Conflicts: src/common/Makefile.am src/or/Makefile.am
2012-02-12Unpack a smartlist_foreach and add an assert: try to hunt #5102Nick Mathewson
2012-02-12Fix #5097 on Windows, tooRobert Ransom
2012-02-12Fix bug #5097: remove bogus envvar from managed proxies' environmentRobert Ransom
2012-02-10Properly protect paths to sed, sha1sum, opensslSebastian Hahn
in Makefile.am, we used it without quoting it, causing build failure if your openssl/sed/sha1sum happened to live in a directory with a space in it (very common on windows)
2012-02-10Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
2012-02-10Downgrade "missing a certificate" from notice to infoNick Mathewson
It was apparently getting mistaken for a problem, even though it was at notice. Fixes 5067; fix on 0.2.0.10-alpha.
2012-02-10Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
Conflicts: src/common/tortls.c Conflict on comment near use of the new OPENSSL_V macro
2012-02-10Use correct CVE number for CVE-2011-4576. Found by fermenthor. bug 5066Nick Mathewson
2012-02-09Merge branch 'maint-0.2.2'Roger Dingledine
2012-02-09Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine
2012-02-09revert the revert in master, since I didn't want to revert it thereRoger Dingledine
2012-02-09Merge branch 'maint-0.2.2'Roger Dingledine
2012-02-09Revert "add a "docs" to the manual URI as listed in torrc.sample.in"Roger Dingledine
This reverts commit 55e8cae81553678ec77ce6b8fb1bf2d5e483e0aa. The conversation from irc: > weasel: i had intended to leave torrc.sample.in alone in maint-0.2.2, since i don't want to make all your stable users have to deal with a torrc change. but nickm changed it. is it in fact the case that a change in that file means a change in the deb? <weasel> it means you'll prompt every single user who ever touched their torrc <weasel> and they will be asked if they like your new version better than what they have right now <weasel> so it's not great Instead I changed the website to redirect requests for the tor-manual URL listed in maint-0.2.2's torrc.sample.in so the link will still work.
2012-02-09Update to the February 2012 GeoIP database.maint-0.2.1Karsten Loesing
2012-02-08add a "docs" to the manual URI as listed in torrc.sample.inNick Mathewson
2012-02-08Fix fencepost error with HearbeatPeriod optionSebastian Hahn
We'd only log every HeartbeatPeriod + 1 seconds. Discovered by Scott Bennett, reported as bug 4942.
2012-02-08Update sample torrc file for 0.2.3.xRoger Dingledine
Fix broken URLs. Tell readers about the OutboundBindAddress, ExitPolicyRejectPrivate, and PublishServerDescriptor options.
2012-01-31Fix straggling MS_WINDOWS issues; add a changes fileNick Mathewson
There was one MS_WINDOWS that remained because it wasn't on a macro line; a few remaining uses (and the definition!) in configure.in; and a now-nonsensical stanza of eventdns_tor.h that previously defined 'WIN32' if it didn't exist.
2012-01-31Use the standard _WIN32, not the Torism MS_WINDOWS or deprecated WIN32Nick Mathewson
This commit is completely mechanical; I used this perl script to make it: #!/usr/bin/perl -w -i.bak -p if (/^\s*\#/) { s/MS_WINDOWS/_WIN32/g; s/\bWIN32\b/_WIN32/g; }
2012-01-31Merge remote-tracking branch 'arma/bug4013'Nick Mathewson
2012-01-31Actually enable the windows absolute-path codeNick Mathewson
Checking for "WINDOWS" is wrong; our magic macro is MS_WINDOWS Fixes bug 4973; bugfix on 0.2.3.11-alpha.
2012-01-27if we ever have an old bridge, never again use microdescsRoger Dingledine
should reduce the risk of oscillation if our 0.2.2 bridge comes and goes
2012-01-25Allow 0.2.3.x clients to use 0.2.2.x bridges.Roger Dingledine
Previously the client would ask the bridge for microdescriptors, which are only supported in 0.2.3.x and later, and then fail to bootstrap when it didn't get the answers it wanted. Fixes bug 4013; bugfix on 0.2.3.2-alpha. The fix here is to revert to using normal descriptors if any of our bridges are known to not support microdescs. This is not ideal, a) because we'll start downloading a microdesc consensus as soon as we get a bridge descriptor, and that will waste time if we later get a bridge descriptor that tells us we don't like microdescriptors; and b) by changing our mind we're leaking to our other bridges that we have an old-version bridge. The alternate fix would have been to change we_use_microdescriptors_for_circuits() to ask if *any* of our bridges can support microdescriptors, and then change the directory logic that picks a bridge to only select from those that do. For people living in the future, where 0.2.2.x is obsolete, there won't be a difference. Note that in either of these potential fixes, we have risk of oscillation if our one funny-looking bridges goes away / comes back.
2012-01-23set SO_REUSEADDR before we bind, not afterRoger Dingledine
resolves bug 4950 (fixes a bug on commit aba7bb705a6 from #2850)
2012-01-23bump to 0.2.3.11-alpha-devRoger Dingledine
2012-01-23Use !SOCKET_OK to test if a socket is uninitializedtor-0.2.3.11-alphaSebastian Hahn
This fixes a compile warning on Windows. Fixes bug 4946, not in any released version.
2012-01-22update comment to reflect our TOR_INVALID_SOCKET conventionRoger Dingledine
2012-01-22bump to 0.2.3.11-alphaRoger Dingledine
2012-01-18Rename nonconformant identifiers.Nick Mathewson
Fixes bug 4893. These changes are pure mechanical, and were generated with this perl script: /usr/bin/perl -w -i.bak -p s/crypto_pk_env_t/crypto_pk_t/g; s/crypto_dh_env_t/crypto_dh_t/g; s/crypto_cipher_env_t/crypto_cipher_t/g; s/crypto_digest_env_t/crypto_digest_t/g; s/aes_free_cipher/aes_cipher_free/g; s/crypto_free_cipher_env/crypto_cipher_free/g; s/crypto_free_digest_env/crypto_digest_free/g; s/crypto_free_pk_env/crypto_pk_free/g; s/_crypto_dh_env_get_dh/_crypto_dh_get_dh/g; s/_crypto_new_pk_env_rsa/_crypto_new_pk_from_rsa/g; s/_crypto_pk_env_get_evp_pkey/_crypto_pk_get_evp_pkey/g; s/_crypto_pk_env_get_rsa/_crypto_pk_get_rsa/g; s/crypto_new_cipher_env/crypto_cipher_new/g; s/crypto_new_digest_env/crypto_digest_new/g; s/crypto_new_digest256_env/crypto_digest256_new/g; s/crypto_new_pk_env/crypto_pk_new/g; s/crypto_create_crypto_env/crypto_cipher_new/g; s/connection_create_listener/connection_listener_new/g; s/smartlist_create/smartlist_new/g; s/transport_create/transport_new/g;
2012-01-18Merge remote-tracking branch 'public/bug4533_part1'Nick Mathewson
Conflicts: src/common/compat.h
2012-01-18Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson
2012-01-18Use tor_socket_t, not unsigned, in tor-fw-helper-natmp.cNick Mathewson
2012-01-18Fix SOCKET_OK test on win64.Nick Mathewson
Bugfix on 0.2.2.29-beta; partial fix for 4533; found by wanoskarnet
2012-01-17Warn if sizeof(tor_socket_t) != sizeof(SOCKET)Nick Mathewson
2012-01-17Use SOCKET_OK macros in even more placesNick Mathewson
Add a TOR_INVALID_SOCKET macro to wrap -1/INVALID_SOCKET. Partial work for bug4533.
2012-01-16fix crash bug in original feature4207 branchRoger Dingledine
PLURAL() assumes that the plural is the canonical name for the option, so now it is.
2012-01-16Merge remote-tracking branch 'asn-mytor/bug4751'Nick Mathewson
2012-01-16Merge remote-tracking branch 'public/bug3325'Nick Mathewson
2012-01-16whitespace fixesNick Mathewson
2012-01-16Convert instances of tor_malloc+tor_snprintf into tor_asprintfNick Mathewson
These were found by looking for tor_snprintf() instances that were preceeded closely by tor_malloc(), though I probably converted some more snprintfs as well. (In every case, make sure that the length variable (if any) is removed, renamed, or lowered, so that anything else that might have assumed a longer buffer doesn't exist.)