summaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)Author
2020-06-15Bump to 0.4.4.1-alphaNick Mathewson
2020-06-11Fix and update unittests.George Kadianakis
Co-authored-by: Florentin Rochet <florentin.rochet@uclouvain.be>
2020-06-11Update functions that load and write the guard state file.George Kadianakis
Co-authored-by: Florentin Rochet <florentin.rochet@uclouvain.be>
2020-06-11Pick guards on the order they were sampled (prop310).George Kadianakis
Co-authored-by: Florentin Rochet <florentin.rochet@uclouvain.be>
2020-06-11Refactor some guard state file parsing code into functions.Florentin Rochet
Co-authored-by: Florentin Rochet <florentin.rochet@uclouvain.be>
2020-06-05Merge remote-tracking branch 'tor-github/pr/1902/head'Nick Mathewson
2020-06-05Fix some checks of tor_inet_ntoa() return valuerl1987
Also, fix a format string.
2020-06-04Merge remote-tracking branch 'tor-github/pr/1910/head'Nick Mathewson
2020-06-04config: Styling fix + use fmt_addr()c
Conform to C99 as suggested by nickm on #32888 and use fmt_addr() rather than tor_addr_to_str_dup()
2020-06-03config: Add interface address debug loggingc
Add logging for "the local network interface addresses" as requested by ticket #32888.
2020-06-02remove a period from a doxygen headingNick Mathewson
The other headings don't have periods.
2020-06-02Merge branch 'tor-github/pr/1909'George Kadianakis
2020-06-01config: Add IPv4 Address config debug loggingc
Per ticket #32888 this should address logging "the Address torrc option", "and whether it is an IP address, or a DNS name"; or the detected "local hostname", "and whether it is an IP address, or a DNS name". Some of these details already seem to be logged, so just add what's missing.
2020-05-30Preemptive circs should work with UseEntryGuards 0Roger Dingledine
Resume being willing to use preemptively-built circuits when UseEntryGuards is set to 0. We accidentally disabled this feature with that config setting (in our fix for #24469), leading to slower load times. Fixes bug 34303; bugfix on 0.3.3.2-alpha.
2020-05-28Merge branch 'tor-github/pr/1901'David Goulet
2020-05-27Merge branch 'tor-github/pr/1898'George Kadianakis
2020-05-27Add HS v3 status to the SIGUSR1 dumpstats()Neel Chauhan
2020-05-21Merge remote-tracking branch 'tor-github/pr/1899/head'Nick Mathewson
2020-05-21Merge branch 'tor-github/pr/1850'George Kadianakis
2020-05-21Merge branch 'tor-github/pr/1861'George Kadianakis
2020-05-21Tweak format stringrl1987
2020-05-21Check for NULL from tor_dup_ip()rl1987
2020-05-21Bail out of format_networkstatus_vote if fmt_addr32() failed.rl1987
Something is fishy if we cannot put IP address string into dir-vote line.
2020-05-21Actually, bail out of routerstatus_format_entry() if fmt_addr32() failsrl1987
2020-05-21Check that fmt_addr32() returned non-empty string before putting it into ↵rl1987
documents
2020-05-21Check for possible failures of tor_inet_ntop/tor_inet_ntoa in fmt_addr32 and ↵rl1987
tor_dup_ip
2020-05-21Check output value of tor_inet_ntop/tor_inet_ntoa in dns.crl1987
2020-05-21Fix an enum comparison that was blowing up jenkins.George Kadianakis
The warning was: 11:23:10 ../tor/src/feature/hs/hs_service.c: In function 'log_cant_upload_desc': 11:23:10 ../tor/src/feature/hs/hs_service.c:3118:3: error: comparison of unsigned expression < 0 is always false [-Werror=type-limits] See #34254 for more info. I guess this means that gcc assigned an unsigned type to the `log_desc_upload_reason_t` enum and it warned if we compared it against 0... For now I think it's simpler to remove that check instead of turning the enum to a signed type, or trying to hack it some other way. From what it seems, enum is up to the compiler on whether it's signed/unsigned: https://stackoverflow.com/questions/159034/are-c-enums-signed-or-unsigned
2020-05-20Add support for console control signals in WindowsDamon Harris
2020-05-19Merge branch 'tor-github/pr/1886'David Goulet
2020-05-19Merge branch 'tor-github/pr/1897'David Goulet
2020-05-19Merge branch 'tor-github/pr/1894'David Goulet
2020-05-19doxygen: add a link to src-ref on mainpage.md.Nick Mathewson
Closes 34246.
2020-05-19Merge branch 'maint-0.4.3'Nick Mathewson
2020-05-19Doxygen: fix unbalanced groups.Nick Mathewson
Closes ticket 34255.
2020-05-17Declare variables in for loops in rend_service_dump_stats()Neel Chauhan
2020-05-16Fix spacing in if statement in tor_version_parse()Neel Chauhan
2020-05-16Fix spacing in if statement in port_parse_config()Neel Chauhan
2020-05-15bump to 0.4.3.5-devNick Mathewson
2020-05-14bump to 0.4.3.5Nick Mathewson
2020-05-12Merge branch 'bug34130_035'Nick Mathewson
2020-05-12Fix crash when tor is compiled with NSS and seccomp sandbox is enabledDaniel Pinto
Adds seccomp rules for socket and getpeername used by NSS
2020-05-08Improve logging of included config filesDaniel Pinto
2020-05-07Merge remote-tracking branch 'tor-github/pr/1880/head'Nick Mathewson
2020-05-06Merge branch 'maint-0.4.3'Nick Mathewson
2020-05-06Fix a boolean logic error when logging about invalid hostnames.Nick Mathewson
Fixes bug 34131; bugfix on 0.4.3.1-alpha.
2020-05-06connection_or_finished_flushing(): add a missing "break;"Nick Mathewson
This one is harmless like the others (so far)
2020-05-06Merge branch 'maint-0.4.2' into maint-0.4.3Nick Mathewson
2020-05-06Merge branch 'maint-0.4.1' into maint-0.4.2Nick Mathewson
2020-05-06btrack_orconn_cevent.c: Add a missing "break;"Nick Mathewson