Age | Commit message (Collapse) | Author | |
---|---|---|---|
2014-11-04 | Merge remote-tracking branch 'public/bug13214_025_squashed' | Nick Mathewson | |
2014-11-04 | Check descriptor ID in addition to HS ID when saving a v2 hs descriptor | Nick Mathewson | |
Fixes bug 13214; reported by 'special'. | |||
2014-11-04 | Add comments and rename intro_nodes list in rend_services_introduce() | David Goulet | |
(No changes file needed: this patch just adds comments and renames variables. This is ticket 13646. message taken from the ticket. -Nick) | |||
2014-11-02 | Use tor_malloc_zero(x), not tor_calloc(x,sizeof(char)) | Nick Mathewson | |
(Also, fixes a wide line.) | |||
2014-11-02 | Apply new calloc coccinelle patch | Nick Mathewson | |
2014-11-02 | Use the | trick to save a comparison in our calloc check. | Nick Mathewson | |
2014-11-02 | Switch to a < comparison for our calloc check; explain how it works | Nick Mathewson | |
2014-11-02 | Document the calloc function overflow check. | Mansour Moufid | |
2014-11-02 | Remove a duplicate comment. | Mansour Moufid | |
2014-11-02 | Refactor the tor_reallocarray_ overflow check. | Mansour Moufid | |
2014-11-02 | Refactor the tor_calloc_ overflow check. | Mansour Moufid | |
2014-10-31 | Use digest256_len in networkstatus_copy_old_consensus_info() | Nick Mathewson | |
Now, if a router ever changes its microdescriptor, but the new microdescriptor SHA256 hash has the same 160-bit prefix as the old one, we treat it as a new microdescriptor when deciding whether to copy status information. (This function also is used to compare SHA1 digests of router descriptors, but don't worry: the descriptor_digest field either holds a SHA256 hash, or a SHA1 hash padded with 0 bytes.) | |||
2014-10-31 | Use digest256map for computing microdescriptor downloads | Nick Mathewson | |
2014-10-31 | Refactor {str,digest}map into a common implementation; add digest256map | Nick Mathewson | |
Needed for #13399. | |||
2014-10-31 | Re-run latest git trunnel to get fix from teor for #13577 | Nick Mathewson | |
2014-10-31 | Merge commit '13298d90a90dc62d21d38f910171c9b57a8f0273' | Nick Mathewson | |
2014-10-30 | Bump version to 0.2.6.1-alpha-dev | Nick Mathewson | |
2014-10-30 | Bump version to 0.2.6.1-alpha | Nick Mathewson | |
2014-10-30 | Silence spurious clang warnings | teor | |
Silence clang warnings under --enable-expensive-hardening, including: + implicit truncation of 64 bit values to 32 bit; + const char assignment to self; + tautological compare; and + additional parentheses around equality tests. (gcc uses these to silence assignment, so clang warns when they're present in an equality test. But we need to use extra parentheses in macros to isolate them from other code). | |||
2014-10-28 | Add another year to our copyright dates. | Nick Mathewson | |
Because in 95 years, we or our successors will surely care about enforcing the BSD license terms on this code. Right? | |||
2014-10-28 | Updating message that warns about running out of sockets we can use. | rl1987 | |
2014-10-28 | Fix smartlist_choose_node_by_bandwidth() so that it rejects ORs with BadExit ↵ | rl1987 | |
flag. | |||
2014-10-28 | Merge remote-tracking branch 'rl1987/feature10427' | Nick Mathewson | |
2014-10-27 | Merge remote-tracking branch 'sebastian/bug13286' | Nick Mathewson | |
2014-10-27 | Remove configure option to disable curve25519 | Sebastian Hahn | |
By now, support in the network is widespread and it's time to require more modern crypto on all Tor instances, whether they're clients or servers. By doing this early in 0.2.6, we can be sure that at some point all clients will have reasonable support. | |||
2014-10-26 | Congratulate relay operator when OR is first started | rl1987 | |
When Tor first generates identity keypair, emit a log message that thanks for their participation and points to new Tor relay lifecycle document. | |||
2014-10-26 | Fix a crash bug introduced in 223d354e3. | Nick Mathewson | |
Arma found this and commented on #11243. Bug not in any released version of Tor. | |||
2014-10-24 | bump version to 0.2.5.10-dev | Nick Mathewson | |
2014-10-22 | Switch new time tests to use SIZEOF_TIME_T, not sizeof(time_t) | Nick Mathewson | |
Otherwise, we get implicit conversion warning on some platforms. | |||
2014-10-23 | Fix minor typos, two line lengths, and a repeated include | teor | |
2014-10-22 | Merge remote-tracking branch 'public/bug11824_v2' | Nick Mathewson | |
2014-10-22 | Merge remote-tracking branch 'public/ticket6938' | Nick Mathewson | |
Conflicts: src/tools/tor-resolve.c | |||
2014-10-21 | Merge remote-tracking branch 'teor/bug13476-improve-time-handling' | Nick Mathewson | |
2014-10-21 | Conditionally compile time testing code based on integer size | teor | |
2014-10-20 | Merge remote-tracking branch 'teor/memwipe-more-keys' | Nick Mathewson | |
2014-10-20 | bump maint-0.2.5 to 0.2.5.9-rc-dev | Nick Mathewson | |
2014-10-20 | Use a macro to indicate "The ecdhe group we use by default". | Nick Mathewson | |
This might make Coverity happier about the if statement where we have a default case that's the same as one of the other cases. CID 1248515 | |||
2014-10-20 | Fix a use-after-free error in cleaned-up rouerlist code. | Nick Mathewson | |
Bug not in any released tor. This is CID 1248521 | |||
2014-10-20 | Memwipe more keys after tor has finished with them | teor | |
Ensure we securely wipe keys from memory after crypto_digest_get_digest and init_curve25519_keypair_from_file have finished using them. Fixes bug 13477. | |||
2014-10-20 | Further unit test tor_timegm and parse_rfc1123_time | teor | |
Add unit tests for tor_timegm signed overflow, tor_timegm and parse_rfc1123_time validity checks, and correct_tm year clamping. Unit tests (visible) fixes in bug 13476. | |||
2014-10-20 | Clamp (some) years supplied by the system to 1 CE | teor | |
Clamp year values returned by system localtime(_r) and gmtime(_r) to year 1. This ensures tor can read any values it might write out. Fixes bug 13476. | |||
2014-10-20 | Improve date validation in HTTP headers | teor | |
Check all date/time values passed to tor_timegm and parse_rfc1123_time for validity, taking leap years into account. Improves HTTP header validation. Avoid unlikely signed integer overflow in tor_timegm on systems with 32-bit time_t. Fixes bug 13476. | |||
2014-10-20 | Use correct day of year in correct_tm() | teor | |
Set the correct day of year value in correct_tm() when the system's localtime(_r) or gmtime(_r) functions fail to set struct tm. Fixes bug 13476. | |||
2014-10-16 | Merge remote-tracking branch 'origin/maint-0.2.5' | Nick Mathewson | |
2014-10-16 | Downgrade 'unexpected sendme cell from client' to PROTOCOL_WARN | Nick Mathewson | |
Closes 8093. | |||
2014-10-16 | Merge remote-tracking branch 'yawning/bug13314' | Nick Mathewson | |
2014-10-16 | Merge remote-tracking branch 'origin/maint-0.2.5' | Nick Mathewson | |
2014-10-16 | Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5 | Nick Mathewson | |
2014-10-16 | Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4 | Nick Mathewson | |
2014-10-16 | Merge branch 'no_sslv3_023' into maint-0.2.3 | Nick Mathewson | |