summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2016-12-14whitespace fixesNick Mathewson
2016-12-14Fix a "make check" regression in --list-fingerprint.Nick Mathewson
2016-12-14Merge branch 'dgoulet_ticket19043_030_03_squashed'Nick Mathewson
2016-12-14prop224: Use LOG_PROTOCOL_WARN instead of log_warn(LD_PROTOCOL, ...) in ↵David Goulet
hs_intropoint.c Signed-off-by: David Goulet <dgoulet@torproject.org>
2016-12-14crypto: Change crypto_mac_sha3_256 to use the key length in the constructionDavid Goulet
Signed-off-by: David Goulet <dgoulet@torproject.org>
2016-12-14prop224: Add unittests handling v3 ESTABLISH_INTRO cells.George Kadianakis
Test for both v2 and v3 ESTABLISH_INTRO handling.
2016-12-14prop224: Use new HS functions in old HS code.George Kadianakis
This is needed to make old code unittestable.
2016-12-14prop224: Introduce the new introduction point code.George Kadianakis
(pun not intended) Now our code supports both legacy and prop224 ESTABLISH_INTRO cells :) hs_intro_received_establish_intro() is the new entry point.
2016-12-14prop224: Add code that generates ESTABLISH_INTRO cells.George Kadianakis
Currently unused. It will only be used for creating ESTABLISH_INTRO cells in unittests :)
2016-12-14prop224 prepwork: Use of HS circuitmap in existing HS code.George Kadianakis
The new HS circuitmap API replaces old public functions as follows: circuit_clear_rend_token -> hs_circuitmap_remove_circuit circuit_get_rendezvous -> hs_circuitmap_get_rend_circ circuit_get_intro_point -> hs_circuitmap_get_intro_circ_v2 circuit_set_rendezvous_cookie -> hs_circuitmap_register_rend_circ circuit_set_intro_point_digest -> hs_circuitmap_register_intro_circ_v2 This commit also removes the old rendinfo code that is now unused. It also fixes the broken rendinfo unittests.
2016-12-14prop224 prepwork: Introduce HS circuitmap subsystem.George Kadianakis
The HS circuitmap is a hash table that maps introduction and rendezvous tokens to specific circuits such that given a token it's easy to find the corresponding circuit. It supports rend circuits and v2/v3 intro circuits. It will be used by the prop224 ESTABLISH_INTRO code to register and lookup v3 introduction circuits. The next commit after this removes the old code and fixes the unittests. Please consult both commits while reviewing functionality differences between the old and new code. Let me know if you want this rebased differently :) WRT architectural differences, this commit removes the rendinfo pointer from or_circuit_t. It then adds an hs_token_t pointer and a hashtable node for the HS circuitmap. IIUC, this adds another pointer to the weight of or_circuit_t. Let me know if you don't like this, or if you have suggestions on improving it.
2016-12-14prop224 prepwork: Finish decoupling old ESTABLISH_INTRO creation logic.George Kadianakis
2016-12-14prpo224 prepwork: Decouple legacy ESTABLISH_INTRO creation logic.George Kadianakis
This commit only moves code.
2016-12-14prop224 prepwork: Introduce HMAC-SHA3 function.George Kadianakis
2016-12-13Merge remote-tracking branch 'teor/fix-frac-paths-comment'Nick Mathewson
2016-12-14Clarify a comment in compute_frac_paths_availableteor
2016-12-13Remove AuthDirMaxServersPerAuthAddrNick Mathewson
Back when Roger had do do most of our testing on the moria host, we needed a higher limit for the number of relays running on a single IP address when that limit was shared with an authority. Nowadays, the idea is pretty obsolete. Also remove the router_addr_is_trusted_dir() function, which served no other purpose. Closes ticket 20960.
2016-12-13Remove a little dead code from routerparse.cNick Mathewson
In c35fad2bdef47f2063ccc989cac99b154e2ee36e, merged in 0.2.4.7-alpha, we removed the code to parse v1 directory objects. When we did so, we removed everything that could set the CST_CHECK_AUTHORITY flag for check_signature_token(). So in this code, we remove the flag itself, the code to handle the flag, and a function that only existed to handle the flag.
2016-12-12whitespace fixNick Mathewson
2016-12-12Merge branch 'people-to-node-type'Nick Mathewson
2016-12-12Replace "people" with the appropriate network component in commentsJ. Ryan Stinnett
Fixes #18145.
2016-12-12Merge remote-tracking branch 'jryans/log-severity'Nick Mathewson
2016-12-12Merge remote-tracking branch 'rubiate/ticket20511'Nick Mathewson
2016-12-12helper_compare_hs_desc: coverity memleak complaintsNick Mathewson
This test helper had a memory leak on failure, which Coverity Scan doesn't like. Closes CID 1375996 and 1375997. Not in any released Tor.
2016-12-11Merge remote-tracking branch 'dgoulet/bug20936_030_01'Nick Mathewson
2016-12-11Merge branch 'maint-0.2.9'Nick Mathewson
2016-12-11Merge remote-tracking branch 'dgoulet/bug20938_029_01' into maint-0.2.9Nick Mathewson
2016-12-09test: fix memory leak in single onion poisoningDavid Goulet
Closes #20938 Signed-off-by: David Goulet <dgoulet@torproject.org>
2016-12-09test: Fix memory leak in test_circuituse.cDavid Goulet
Circuit object wasn't freed correctly. Also, the cpath build state object needed to be zeroed else we were freeing garbage pointers. Closes #20936 Signed-off-by: David Goulet <dgoulet@torproject.org>
2016-12-09Downgrade a harmless bug warning to info.Nick Mathewson
Makes 19926 less annoying in 0.2.9. In 0.3.0, we should actually fix this.
2016-12-09Merge branch 'maint-0.2.9'Nick Mathewson
2016-12-09Merge branch 'maint-0.2.8' into maint-0.2.9Nick Mathewson
2016-12-09Merge branch 'maint-0.2.7' into maint-0.2.8Nick Mathewson
2016-12-09Merge branch 'maint-0.2.6' into maint-0.2.7Nick Mathewson
2016-12-09Merge branch 'maint-0.2.5' into maint-0.2.6Nick Mathewson
2016-12-09Merge branch 'maint-0.2.4' into maint-0.2.5Nick Mathewson
2016-12-09Merge branch 'maint-0.2.9'Nick Mathewson
2016-12-09router: Fix memory leak in signed_descriptor_move()David Goulet
The signed_descriptor_move() was not releasing memory inside the destination object before overwriting it with the source object. This commit adds a reset function that free that memory inside a signed descriptor object and zero it. Closes #20715. Signed-off-by: David Goulet <dgoulet@torproject.org>
2016-12-09Update geoip and geoip6 to the December 7 2016 database.Karsten Loesing
2016-12-08Fix a completely stupid stack-protector warning in test_channels.cNick Mathewson
This was breaking the build on debian precise, since it thought that using a 'const int' to dimension an array made that array variable-size, and made us not get protection. Bug not in any released version of Tor. I will insist that this one wasn't my fault. "Variables won't. Constants aren't." -- Osborn's Law
2016-12-08Update to trunnel 1.5.1Nick Mathewson
2016-12-08whitespace cleanupsNick Mathewson
2016-12-08Merge branch 'feature15056_v1_squashed'Nick Mathewson
2016-12-08Adding some assertions to onion.cNick Mathewson
2016-12-08Fix comment on connection_or_client_learned_peer_id().Nick Mathewson
2016-12-08Tiny cleanup of chan handling when setting connection ID digestsNick Mathewson
2016-12-08Use connection_or_clear_identity in connection_or_clear_identity_map.Nick Mathewson
2016-12-08Add an ed25519_copy; use it in a couple of places dgoulet suggested.Nick Mathewson
2016-12-08Add some unit testing for ed25519 IDs in extend2 cells.Nick Mathewson
2016-12-08Unit tests for channel identity map codeNick Mathewson