aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
* | | closer to a changelog for the next alphaRoger Dingledine2011-10-26
| | |
* | | Merge branch 'cov_run224_squashed'Nick Mathewson2011-10-26
|\ \ \
| * | | Changelog for recent coverity issuesNick Mathewson2011-10-26
| | | |
| * | | Fix memory leak in retry_all_listeners: Coverity CID 485Nick Mathewson2011-10-26
| | | |
| * | | Fix memory leak in options_act_reversible: fix Coverity CID 486,487Nick Mathewson2011-10-26
|/ / /
* | | Do not tread vpadding cell as versions cell. Not in any released version.Nick Mathewson2011-10-26
| | |
* | | Fix a NULL pointer dereference in parse_server_transport_line().George Kadianakis2011-10-26
| | |
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-26
|\| |
| * | Merge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2Nick Mathewson2011-10-26
| |\ \
| | * | Make internal error check for unrecognized digest algorithm more robustNick Mathewson2011-10-06
| | | | | | | | | | | | | | | | Fixes Coverity CID 479.
| | * | Check return of init_keys() ip_address_changed: fix Coverity CID 484Nick Mathewson2011-10-06
| | | |
* | | | Fix a couple of pluggable transport bugsSebastian Hahn2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | Fix coverity complaints 490, 491 and 492. Especially the one in parse_client_transport_line() could've been a remotely triggerable segfault, I think.
* | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-26
|\| | |
| * | | Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-10-26
| |\ \ \ | | | |/ | | |/|
| | * | Fix zlib macro brokenness on osx with zlib 1.2.4 and higher.Nick Mathewson2011-10-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | From the code: zlib 1.2.4 and 1.2.5 do some "clever" things with macros. Instead of saying "(defined(FOO) ? FOO : 0)" they like to say "FOO-0", on the theory that nobody will care if the compile outputs a no-such-identifier warning. Sorry, but we like -Werror over here, so I guess we need to define these. I hope that zlib 1.2.6 doesn't break these too. Possible fix for bug 1526.
* | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-25
|\| | |
| * | | unmangle the fingerprint example in the man pageRoger Dingledine2011-10-25
| | | | | | | | | | | | | | | | | | | | Remove a confusing dollar sign from the example fingerprint in the man page, and also make example fingerprint a valid one.
* | | | Merge branch 'ticket4294'Nick Mathewson2011-10-25
|\ \ \ \
| * | | | Avoid likely memory fragmentation from rep_hist_note_descs_servedNick Mathewson2011-10-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When you're doing malloc(sizeof(int)), something may well have gone wrong. This technique is a bit abusive, but we're already relying on it working correctly in geoip.c.
| * | | | Add percentiles to the desc stats reportingSebastian Hahn2011-10-25
|/ / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | To get a better idea what's going on on Tonga, add some code to report how often the most and least frequently fetched descriptor was fetched, as well as 25, 50, 75 percentile. Also ensure we only count bridge descriptors here.
* | | | Merge remote-tracking branch 'sebastian/bug4293'Nick Mathewson2011-10-24
|\ \ \ \
| * | | | Don't initialize desc stats for non-bridgedirauth nodesSebastian Hahn2011-10-24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Also make sure that calling rep_hist_note_desc_served() while stats aren't initialized just returns. Bug spotted by SwissTorHelp. Thanks!
* | | | | checkpoint: fold in changes filesRoger Dingledine2011-10-24
|/ / / /
* | | | bump to 0.2.3.5-alpha-devRoger Dingledine2011-10-23
| | | |
* | | | Double-check that we really can get RSA keys from ID/Auth certsNick Mathewson2011-10-23
| | | | | | | | | | | | | | | | Addresses issue 4287; issue not in any released Tor.
* | | | Fix a reference-leak in tor_tls_received_v3_certificateNick Mathewson2011-10-23
| | | | | | | | | | | | | | | | | | | | | | | | We were calling SSL_get_peer_certificate but not X509_free. This is a major part of bug4252; the bug has been in no released version.
* | | | Fix memory leak in prop176 codeNick Mathewson2011-10-23
| | | | | | | | | | | | | | | | This fixes part of bug4252. Bug not in any released version.
* | | | Merge remote-tracking branch 'rransom-tor/bug3825c'Nick Mathewson2011-10-23
|\ \ \ \
| * | | | Check for intro circ timeouts properlyRobert Ransom2011-10-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, we would treat an intro circuit failure as a timeout iff the circuit failed due to a mismatch in relay identity keys. (Due to a bug elsewhere, we only recognize relay identity-key mismatches on the first hop, so this isn't as bad as it could have been.) Bugfix on commit eaed37d14c6e1dc93a392f62ef2e501f75e4878a, not yet in any release.
* | | | | Merge branch 'ticket4200'Nick Mathewson2011-10-21
|\ \ \ \ \
| * | | | | Fix missing word in changes/ticket4200Nick Mathewson2011-10-21
| | | | | |
| * | | | | Check for jumping clock in *format_*stats functionsSebastian Hahn2011-10-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | None of these were real bugs (yet), because the callers made sure everything was fine. Make it more explicit. Suggested by Nick
| * | | | | Add new stats type: descriptor fetch statsSebastian Hahn2011-10-21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This is used for the bridge authority currently, to get a better intuition on how many descriptors are actually fetched from it and how many fetches happen in total. Implements ticket 4200.
| * | | | | remove code related to tracking descriptor serving timesSebastian Hahn2011-10-21
|/ / / / / | | | | | | | | | | | | | | | | | | | | This had broken due to bitrot - it doesn't know about microdescriptors at all, and afaik hasn't generally been used in ages.
* | | | | Merge remote-tracking branch 'rransom-tor/bug4091'Nick Mathewson2011-10-20
|\ \ \ \ \
| * | | | | Check whether a client port is a Unix socket before using its IP addrRobert Ransom2011-10-20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Bugfix on commit c1ac0695d5bc64b555c345e4be87b18bab3ae56b, not yet in any release. Fixes bug 4091; bug reported by SwissTorHelp.
* | | | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-20
|\ \ \ \ \ \ | | |_|/ / / | |/| | | |
| * | | | | Merge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2Nick Mathewson2011-10-20
| |\ \ \ \ \
| | * | | | | Free rend_data and intro_key when extra intro circs become general-purposeRobert Ransom2011-10-18
| | | | | | |
* | | | | | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-10-19
|\| | | | | | | |_|/ / / / |/| | | | |
| * | | | | Fix crash when changing node restrictions with DNS lookup in progressNick Mathewson2011-10-19
| |/ / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes bug 4259, bugfix on 0.2.2.25-alpha. Bugfix by "Tey'". Original message by submitter: Changing nodes restrictions using a controller while Tor is doing DNS resolution could makes Tor crashes (on WinXP at least). The problem can be repeated by trying to reach a non-existent domain using Tor: curl --socks4a 127.0.0.1:9050 inexistantdomain.ext .. and changing the ExitNodes parameter through the control port before Tor returns a DNS resolution error (of course, the following command won't work directly if the control port is password protected): echo SETCONF ExitNodes=TinyTurtle | nc -v 127.0.0.1 9051 Using a non-existent domain is needed to repeat the issue so that Tor takes a few seconds for resolving the domain (which allows us to change the configuration). Tor will crash while processing the configuration change. The bug is located in the addressmap_clear_excluded_trackexithosts method which iterates over the entries of the addresses map in order to check whether the changes made to the configuration will impact those entries. When a DNS resolving is in progress, the new_adress field of the associated entry will be set to NULL. The method doesn't expect this field to be NULL, hence the crash.
* | | | | Merge branch 'maint-0.2.2'Roger Dingledine2011-10-13
|\| | | |
| * | | | Merge branch 'maint-0.2.1' into maint-0.2.2Roger Dingledine2011-10-13
| |\ \ \ \ | | | |/ / | | |/| |
| | * | | Update to the October 2011 GeoIP database.Karsten Loesing2011-10-13
| | | | |
* | | | | Merge branch 'bug3512'Nick Mathewson2011-10-11
|\ \ \ \ \
| * | | | | Stop using addr_port_lookup as an address splitting functionNick Mathewson2011-10-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It's too risky to have a function where if you leave one parameter NULL, it splits up address:port strings, but if you set it, it does hostname resolution.
| * | | | | Change "reverse_lookup_name" functions to refer to "PTR_name"sNick Mathewson2011-10-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Under the new convention, having a tor_addr.*lookup function that doesn't do hostname resolution is too close for comfort. I used this script here, and have made no other changes. s/tor_addr_parse_reverse_lookup_name/tor_addr_parse_PTR_name/g; s/tor_addr_to_reverse_lookup_name/tor_addr_to_PTR_name/g;
| * | | | | Fix names of functions that convert strings to addrsNick Mathewson2011-10-11
|/ / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Now let's have "lookup" indicate that there can be a hostname resolution, and "parse" indicate that there wasn't. Previously, we had one "lookup" function that did resolution; four "parse" functions, half of which did resolution; and a "from_str()" function that didn't do resolution. That's confusing and error-prone! The code changes in this commit are exactly the result of this perl script, run under "perl -p -i.bak" : s/tor_addr_port_parse/tor_addr_port_lookup/g; s/parse_addr_port(?=[^_])/addr_port_lookup/g; s/tor_addr_from_str/tor_addr_parse/g; This patch leaves aton and pton alone: their naming convention and behavior is is determined by the sockets API. More renaming may be needed.
* | | | | Fix a bunch of whitespace errorsNick Mathewson2011-10-11
| | | | |
* | | | | Merge branch 'prop176-v2'Nick Mathewson2011-10-10
|\ \ \ \ \