summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2014-11-04Merge remote-tracking branch 'public/bug13214_025_squashed'Nick Mathewson
2014-11-04Check descriptor ID in addition to HS ID when saving a v2 hs descriptorNick Mathewson
Fixes bug 13214; reported by 'special'.
2014-11-04Add comments and rename intro_nodes list in rend_services_introduce()David Goulet
(No changes file needed: this patch just adds comments and renames variables. This is ticket 13646. message taken from the ticket. -Nick)
2014-11-02Use tor_malloc_zero(x), not tor_calloc(x,sizeof(char))Nick Mathewson
(Also, fixes a wide line.)
2014-11-02Apply new calloc coccinelle patchNick Mathewson
2014-11-02Use the | trick to save a comparison in our calloc check.Nick Mathewson
2014-11-02Switch to a < comparison for our calloc check; explain how it worksNick Mathewson
2014-11-02Document the calloc function overflow check.Mansour Moufid
2014-11-02Remove a duplicate comment.Mansour Moufid
2014-11-02Refactor the tor_reallocarray_ overflow check.Mansour Moufid
2014-11-02Refactor the tor_calloc_ overflow check.Mansour Moufid
2014-10-31Use digest256_len in networkstatus_copy_old_consensus_info()Nick Mathewson
Now, if a router ever changes its microdescriptor, but the new microdescriptor SHA256 hash has the same 160-bit prefix as the old one, we treat it as a new microdescriptor when deciding whether to copy status information. (This function also is used to compare SHA1 digests of router descriptors, but don't worry: the descriptor_digest field either holds a SHA256 hash, or a SHA1 hash padded with 0 bytes.)
2014-10-31Use digest256map for computing microdescriptor downloadsNick Mathewson
2014-10-31Refactor {str,digest}map into a common implementation; add digest256mapNick Mathewson
Needed for #13399.
2014-10-31Re-run latest git trunnel to get fix from teor for #13577Nick Mathewson
2014-10-31Merge commit '13298d90a90dc62d21d38f910171c9b57a8f0273'Nick Mathewson
2014-10-30Bump version to 0.2.6.1-alpha-devNick Mathewson
2014-10-30Bump version to 0.2.6.1-alphaNick Mathewson
2014-10-30Silence spurious clang warningsteor
Silence clang warnings under --enable-expensive-hardening, including: + implicit truncation of 64 bit values to 32 bit; + const char assignment to self; + tautological compare; and + additional parentheses around equality tests. (gcc uses these to silence assignment, so clang warns when they're present in an equality test. But we need to use extra parentheses in macros to isolate them from other code).
2014-10-28Add another year to our copyright dates.Nick Mathewson
Because in 95 years, we or our successors will surely care about enforcing the BSD license terms on this code. Right?
2014-10-28Updating message that warns about running out of sockets we can use.rl1987
2014-10-28Fix smartlist_choose_node_by_bandwidth() so that it rejects ORs with BadExit ↵rl1987
flag.
2014-10-28Merge remote-tracking branch 'rl1987/feature10427'Nick Mathewson
2014-10-27Merge remote-tracking branch 'sebastian/bug13286'Nick Mathewson
2014-10-27Remove configure option to disable curve25519Sebastian Hahn
By now, support in the network is widespread and it's time to require more modern crypto on all Tor instances, whether they're clients or servers. By doing this early in 0.2.6, we can be sure that at some point all clients will have reasonable support.
2014-10-26Congratulate relay operator when OR is first startedrl1987
When Tor first generates identity keypair, emit a log message that thanks for their participation and points to new Tor relay lifecycle document.
2014-10-26Fix a crash bug introduced in 223d354e3.Nick Mathewson
Arma found this and commented on #11243. Bug not in any released version of Tor.
2014-10-24bump version to 0.2.5.10-devNick Mathewson
2014-10-22Switch new time tests to use SIZEOF_TIME_T, not sizeof(time_t)Nick Mathewson
Otherwise, we get implicit conversion warning on some platforms.
2014-10-23Fix minor typos, two line lengths, and a repeated includeteor
2014-10-22Merge remote-tracking branch 'public/bug11824_v2'Nick Mathewson
2014-10-22Merge remote-tracking branch 'public/ticket6938'Nick Mathewson
Conflicts: src/tools/tor-resolve.c
2014-10-21Merge remote-tracking branch 'teor/bug13476-improve-time-handling'Nick Mathewson
2014-10-21Conditionally compile time testing code based on integer sizeteor
2014-10-20Merge remote-tracking branch 'teor/memwipe-more-keys'Nick Mathewson
2014-10-20bump maint-0.2.5 to 0.2.5.9-rc-devNick Mathewson
2014-10-20Use a macro to indicate "The ecdhe group we use by default".Nick Mathewson
This might make Coverity happier about the if statement where we have a default case that's the same as one of the other cases. CID 1248515
2014-10-20Fix a use-after-free error in cleaned-up rouerlist code.Nick Mathewson
Bug not in any released tor. This is CID 1248521
2014-10-20Memwipe more keys after tor has finished with themteor
Ensure we securely wipe keys from memory after crypto_digest_get_digest and init_curve25519_keypair_from_file have finished using them. Fixes bug 13477.
2014-10-20Further unit test tor_timegm and parse_rfc1123_timeteor
Add unit tests for tor_timegm signed overflow, tor_timegm and parse_rfc1123_time validity checks, and correct_tm year clamping. Unit tests (visible) fixes in bug 13476.
2014-10-20Clamp (some) years supplied by the system to 1 CEteor
Clamp year values returned by system localtime(_r) and gmtime(_r) to year 1. This ensures tor can read any values it might write out. Fixes bug 13476.
2014-10-20Improve date validation in HTTP headersteor
Check all date/time values passed to tor_timegm and parse_rfc1123_time for validity, taking leap years into account. Improves HTTP header validation. Avoid unlikely signed integer overflow in tor_timegm on systems with 32-bit time_t. Fixes bug 13476.
2014-10-20Use correct day of year in correct_tm()teor
Set the correct day of year value in correct_tm() when the system's localtime(_r) or gmtime(_r) functions fail to set struct tm. Fixes bug 13476.
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-10-16Downgrade 'unexpected sendme cell from client' to PROTOCOL_WARNNick Mathewson
Closes 8093.
2014-10-16Merge remote-tracking branch 'yawning/bug13314'Nick Mathewson
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.5'Nick Mathewson
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-10-16Merge branch 'no_sslv3_023' into maint-0.2.3Nick Mathewson