summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2014-04-15Uplift status.c unit test coverage with new test cases and macros.dana koch
A new set of unit test cases are provided, as well as introducing an alternative paradigm and macros to support it. Primarily, each test case is given its own namespace, in order to isolate tests from each other. We do this by in the usual fashion, by appending module and submodule names to our symbols. New macros assist by reducing friction for this and other tasks, like overriding a function in the global namespace with one in the current namespace, or declaring integer variables to assist tracking how many times a mock has been called. A set of tests for a small-scale module has been included in this commit, in order to highlight how the paradigm can be used. This suite gives 100% coverage to status.c in test execution.
2014-04-15Merge remote-tracking branch 'public/bug11513_024'Nick Mathewson
2014-04-15Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson
2014-04-15Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
Conflicts: src/or/circuituse.c
2014-04-14Don't send uninitialized stack to the controller and say it's a date.Nick Mathewson
Fixes bug 11519, apparently bugfix on 0.2.3.11-alpha.
2014-04-14Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson
2014-04-14Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
Conflicts: src/or/routerlist.h
2014-04-14Tweak changes file and comment dates.Nick Mathewson
2014-04-14Fill in the list of blacklisted signing keys.Nick Mathewson
I used a list of certificate files from arma, and a little script, both at 11464.
2014-04-14Code to blacklist authority signing keysNick Mathewson
(I need a list of actual signing keys to blacklist.)
2014-04-14New sort order for server choice of ciphersuites.Nick Mathewson
Back in 175b2678, we allowed servers to recognize clients who are telling them the truth about their ciphersuites, and select the best cipher from on that list. This implemented the server side of proposal 198. In bugs 11492, 11498, and 11499, cypherpunks found a bunch of mistakes and omissions and typos in the UNRESTRICTED_SERVER_CIPHER_LIST we had. In #11513, I found a couple more. Rather than try to hand-edit this list, I wrote a short python script to generate our ciphersuite preferences from the openssl headers. The new rules are: * Require forward secrecy. * Require RSA (since our servers only configure RSA keys) * Require AES or 3DES. (This means, reject RC4, DES, SEED, CAMELLIA, and NULL.) * No export ciphersuites. Then: * Prefer AES to 3DES. * If both suites have the same cipher, prefer ECDHE to DHE. * If both suites have the same DHE group type, prefer GCM to CBC. * If both suites have the same cipher mode, prefer SHA384 to SHA256 to SHA1. * If both suites have the same digest, prefer AES256 to AES128.
2014-04-12Merge remote-tracking branch 'asn/bug11486'Nick Mathewson
2014-04-11Add another unit test for parse_bridge_line().George Kadianakis
2014-04-09Demote "we stalled too much while trying to write" message to INFONick Mathewson
Resolves ticket 5286.
2014-04-09Fix a dumb C bug in the unit tests for 9841Nick Mathewson
Fixes bug 11460; bug only affects unit tests and is not in any released version of Tor.
2014-04-09Merge remote-tracking branch 'public/bug10431'Nick Mathewson
2014-04-09note a missing wordRoger Dingledine
2014-04-08Merge remote-tracking branch 'public/update_ciphers_ff28'Nick Mathewson
2014-04-08Merge remote-tracking branch 'origin/maint-0.2.4'Nick Mathewson
2014-04-08Merge remote-tracking branch 'public/bug11426'Nick Mathewson
2014-04-08Merge branch 'bug2454_025_squashed'Nick Mathewson
2014-04-08Check for new IP addr after circuit liveliness returnsMatthew Finkel
When we successfully create a usable circuit after it previously timed out for a certain amount of time, we should make sure that our public IP address hasn't changed and update our descriptor.
2014-04-08Move existing policy tests from test.c to new test_policy.cNick Mathewson
2014-04-08Remove unused extern decl for a nonexistent test suiteNick Mathewson
2014-04-08Merge branch 'bug7952_final'Nick Mathewson
Conflicts: src/test/include.am src/test/test.c
2014-04-08Making entire exit policy available to Tor controller.rl1987
2014-04-08Merge remote-tracking branch 'public/bug4241'Nick Mathewson
2014-04-08Merge remote-tracking branch 'public/bug9841_025'Nick Mathewson
2014-04-08Update ciphers.inc to match ff28Nick Mathewson
The major changes are to re-order some ciphers, to drop the ECDH suites (note: *not* ECDHE: ECDHE is still there), to kill off some made-up stuff (like the SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA suite), to drop some of the DSS suites... *and* to enable the ECDHE+GCM ciphersuites. This change is autogenerated by get_mozilla_ciphers.py from Firefox 28 and OpenSSL 1.0.1g. Resolves ticket 11438.
2014-04-08Teach the get_mozilla_ciphers.py script to parse recent firefoxenNick Mathewson
2014-04-07Fix a small memory leak when resolving PTR addressesNick Mathewson
Fixes bug 11437; bugfix on 0.2.4.7-alpha. Found by coverity; this is CID 1198198.
2014-04-07Fix some harmless/untriggerable memory leaks found by coverityNick Mathewson
2014-04-07Merge remote-tracking branch 'public/bug10363_024_squashed'Nick Mathewson
2014-04-07Another 10363 instance -- this one in the eventdns.c codeNick Mathewson
2014-04-07Another 10363 instance: this one in tor_memmem fallback codeNick Mathewson
2014-04-07Fix undefined behavior with pointer addition in channeltls.cNick Mathewson
In C, it's a bad idea to do this: char *cp = array; char *end = array + array_len; /* .... */ if (cp + 3 >= end) { /* out of bounds */ } because cp+3 might be more than one off the end of the array, and you are only allowed to construct pointers to the array elements, and to an element one past the end. Instead you have to say if (cp - array + 3 >= array_len) { /* ... */ } or something like that. This patch fixes two of these: one in process_versions_cell introduced in 0.2.0.10-alpha, and one in process_certs_cell introduced in 0.2.3.6-alpha. These are both tracked under bug 10363. "bobnomnom" found and reported both. See also 10313. In our code, this is likely to be a problem as we used it only if we get a nasty allocator that makes allocations end close to (void*)-1. But it's best not to have to worry about such things at all, so let's just fix all of these we can find.
2014-04-07For missing transport, say "PT_MISSING" not "NO_ROUTE"Nick Mathewson
2014-04-07Forward-port bug9665 fix to work with our fix for 11069Nick Mathewson
2014-04-07Fix bug9665Fábio J. Bertinatto
2014-04-07Make csiphash use the proper endian-converter on solarisNick Mathewson
fixes bug 11426; bugfix on 0.2.5.3-alpha, where csiphash was introduced.
2014-04-05Merge remote-tracking branch 'public/bug9650'Nick Mathewson
2014-04-05Merge remote-tracking branch 'public/bug10801_024'Nick Mathewson
Conflicts: src/common/address.c src/or/config.c
2014-04-05Make tor_addr_port_parse handle portless IPv6 addresses correctly.Nick Mathewson
(Not a bugfix on any Tor release; before 10801_024, it didn't handle portless addresses at all.)
2014-04-05Add a test for default/port conflicts in tor_addr_port_parseNick Mathewson
2014-04-04Protocol_Warn when a rendezvous cookie is used twice.Nick Mathewson
2014-04-04Test for circuit_set_rend_token(.,.,NULL)Nick Mathewson
2014-04-04Merge remote-tracking branch 'public/bug9841_024_v2' into bug9841_025Nick Mathewson
2014-04-04Fix to 9841 fix: setting a token to NULL should clear itNick Mathewson
Found by testing with chutney. The old behavior was "fail an assertion", which obviously isn't optimal. Bugfix on 8b9a2cb68b290e550695124d7ef0511225b451d5; bug not in any released version.
2014-04-02Fix make_socket_reusable() on windows. Bug not in any released TorNick Mathewson
2014-04-02Merge remote-tracking branch 'public/bug10081'Nick Mathewson