Age | Commit message (Collapse) | Author | |
---|---|---|---|
2012-10-04 | Merge remote-tracking branch 'linus/bug6757' | Nick Mathewson | |
2012-10-04 | Merge remote-tracking branch 'origin/maint-0.2.3' | Nick Mathewson | |
2012-10-03 | pass the reason from the truncated cell to the controller | Roger Dingledine | |
(rather than just always declaring that the reason is END_CIRC_REASON_OR_CONN_CLOSED) resolves bug 7039. | |||
2012-10-03 | properly free the return values of rate_limit_log() | Roger Dingledine | |
resolves bug 7022. | |||
2012-10-03 | actually use the rate-limiting string | Roger Dingledine | |
previously we just allocated the string and then freed it. | |||
2012-10-02 | reformat; no actual changes | Roger Dingledine | |
2012-10-02 | and make the last commit compile | Roger Dingledine | |
2012-10-02 | Fix compilation error left over from 1cbf45bed1. (Bug 7021) | Nick Mathewson | |
2012-10-02 | more consistently use [gs]et_uint8 | Roger Dingledine | |
2012-10-01 | The --version option should imply --quiet. | Nick Mathewson | |
Patch from 'maker'. | |||
2012-09-28 | Add missing declaration so 6876 compiles | Nick Mathewson | |
2012-09-28 | Merge remote-tracking branch 'linus/enh6876_2' | Nick Mathewson | |
2012-09-25 | Merge remote-tracking branch 'rransom/warn-about-hses-without-guards' | Nick Mathewson | |
2012-09-22 | Merge branch 'maint-0.2.3' | Roger Dingledine | |
2012-09-22 | add faravahar as our ninth v3 dir auth | Roger Dingledine | |
2012-09-22 | bump to 0.2.4.3-alpha-dev | Roger Dingledine | |
2012-09-22 | bump to 0.2.4.3-alphator-0.2.4.3-alpha | Roger Dingledine | |
2012-09-22 | 4aff97cfc didn't update the 'last modified' timestamp | Roger Dingledine | |
2012-09-21 | Remove the testing_since* fields | Nick Mathewson | |
They weren't actually used since 7a35dad00 Bug 5809 | |||
2012-09-21 | Fix comment in crypto.h; bug 6830 | Nick Mathewson | |
2012-09-21 | add changes file and whitespace fixes for bug 4020 | Nick Mathewson | |
2012-09-21 | Reinstate address in warning message when binding non-locally | Tom Fitzhenry | |
bug4020 Signed-off-by: Tom Fitzhenry <tom@tom-fitzhenry.me.uk> | |||
2012-09-20 | Don't leak msg when parse_virtual_addr_network() fails. | Linus Nordberg | |
2012-09-20 | Make option OutboundBindAddress accept IPv6 addresses too. | Linus Nordberg | |
Implements ticket 6786. | |||
2012-09-19 | Have node_get_pref_orport() return an IPv6 OR port when UseBridges is set. | Linus Nordberg | |
We used to never return an IPv6 address unless ClientUseIPv6 was set. We should allow clients running with bridges use IPv6 OR ports even without setting ClientUseIPv6. Configuring an IPv6 address in a Bridge line should imply that. Fixes th second part of #6757. | |||
2012-09-19 | Set (and reset) node_t.ipv6_preferred for bridges based on Bridge lines. | Linus Nordberg | |
We used to set it only when ClientPreferIPv6ORPort was set which seems wrong. Fixes one part of #6757. | |||
2012-09-18 | Fix comment typo | Robert Ransom | |
2012-09-18 | Warn if HSes are configured on a client with UseEntryGuards disabled | Robert Ransom | |
2012-09-18 | Correct comment explaining why tor2web mode should disable entry guards | Robert Ransom | |
2012-09-18 | Disable Guard usage for Tor2webMode. | Mike Perry | |
Tor2webMode is fingerprintable by hidden services through repeated usage of the same three guard nodes for its rend and intro points. | |||
2012-09-18 | Bump bug 6866 log messages back up to notice for 0.2.4 | Nick Mathewson | |
2012-09-18 | Merge remote-tracking branch 'origin/maint-0.2.3' | Nick Mathewson | |
2012-09-18 | Whitespace fixes | Nick Mathewson | |
2012-09-18 | Print the correct address family in log printout. | Linus Nordberg | |
Look at the address family of the preferred OR port rather than the node.ipv6_preferred flag since the logic has changed with new ClientUseIPv6 config option. Fixes ticket 6884. | |||
2012-09-17 | Bug 6866: Convert pathbias asserts into log messages. | Mike Perry | |
Asserts were hit by Tor2Web mode. | |||
2012-09-17 | Merge remote-tracking branch 'linus/bug6880' | Nick Mathewson | |
2012-09-17 | Don't do reachability testing over IPv6 unless AuthDirPublishIPv6 is set. | Linus Nordberg | |
This affects both directory authorities and bridge authoritites. | |||
2012-09-17 | Fix comment typo in tor_memeq | Robert Ransom | |
2012-09-17 | Add unit test for crypto_pk_cmp_keys and NULL | Nick Mathewson | |
2012-09-17 | Fix documentation for crypto_pk_cmp_keys | Robert Ransom | |
Now that crypto_pk_cmp_keys might return the result of tor_memcmp, there is no guarantee that it will only return -1, 0, or 1. (It currently does only return -1, 0, or 1, but that's a lucky accident due to details of the current implementation of tor_memcmp and the particular input given to it.) Fortunately, none of crypto_pk_cmp_keys's callers rely on this behaviour, so changing its documentation is sufficient. | |||
2012-09-17 | Implement and use crypto_pk_eq_keys | Robert Ransom | |
2012-09-17 | Make crypto_pk_cmp_keys do something sane for NULL keys | Robert Ransom | |
Fixes bug 4283; bugfix on r76 (Git commit 01aadefbfc7dbd99ddaff922b897996b768cf2f9). | |||
2012-09-17 | Merge remote-tracking branch 'public/bug6853' | Nick Mathewson | |
2012-09-17 | Merge branch 'bug6861_typofix' | Nick Mathewson | |
2012-09-17 | Avoid sign-extending when computing rend auth type. | Nick Mathewson | |
Right-shifting negative values has implementation-defined behavior. On all the platforms we work on right now, the behavior is to sign-extend the input. That isn't what we wanted in auth_type_val = (descriptor_cookie_tmp[16] >> 4) + 1; Fix for 6861; bugfix on 0.2.1.5-alpha; reported pseudonymously. The broken behavior didn't actually hurt anything, I think, since the only way to get sign-extension to happen would be to have the top bit of descriptor_cookie_tmp[16] set, which would make the value of descriptor_cookie_tmp[16] >> 4 somewhere between 0b11111111 and 0b11111000 (that is, between -1 and -8). So auth_type_val would be between -7 and 0. And the immediate next line does: if (auth_type_val < 1 || auth_type_val > 2) { So the incorrectly computed auth_type_val would be rejected as invalid, just as a correctly computed auth_type_val would be. Still, this stuff shouldn't sit around the codebase. | |||
2012-09-17 | Parse votes with >31 flags correctly | Nick Mathewson | |
We were doing (1<<p) to generate a flag at position p, but we should have been doing (U64_LITERAL(1)<<p). Fixes bug 6861; bugfix on 0.2.0.3-alpha; reported pseudonymously. | |||
2012-09-17 | Merge branch '6044_nm_squashed' | Nick Mathewson | |
2012-09-17 | Turn the read_file_until_eof tests into a single implementation | Nick Mathewson | |
2012-09-17 | Handle FIFOs in read_file_to_str | meejah | |
add read_file_to_str_until_eof which is used by read_file_to_str if the file happens to be a FIFO. change file_status() to return FN_FILE if st_mode matches S_IFIFO (on not-windows) so that init_key_from_file() will read from a FIFO. | |||
2012-09-14 | Merge remote-tracking branch 'origin/maint-0.2.3' | Nick Mathewson | |