| Commit message (Expand) | Author | Age |
... | |
| | * | | Fix zlib macro brokenness on osx with zlib 1.2.4 and higher.•••From the code:
zlib 1.2.4 and 1.2.5 do some "clever" things with macros. Instead of
saying "(defined(FOO) ? FOO : 0)" they like to say "FOO-0", on the theory
that nobody will care if the compile outputs a no-such-identifier warning.
Sorry, but we like -Werror over here, so I guess we need to define these.
I hope that zlib 1.2.6 doesn't break these too.
Possible fix for bug 1526.
| Nick Mathewson | 2011-10-26 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-10-26 |
|\| | | |
|
| * | | | Make internal error check for unrecognized digest algorithm more robust•••Fixes Coverity CID 479.
| Nick Mathewson | 2011-10-06 |
* | | | | Fix a reference-leak in tor_tls_received_v3_certificate•••We were calling SSL_get_peer_certificate but not X509_free.
This is a major part of bug4252; the bug has been in no released version.
| Nick Mathewson | 2011-10-23 |
* | | | | Fix memory leak in prop176 code•••This fixes part of bug4252. Bug not in any released version.
| Nick Mathewson | 2011-10-23 |
* | | | | Stop using addr_port_lookup as an address splitting function•••It's too risky to have a function where if you leave one parameter
NULL, it splits up address:port strings, but if you set it, it does
hostname resolution.
| Nick Mathewson | 2011-10-11 |
* | | | | Change "reverse_lookup_name" functions to refer to "PTR_name"s•••Under the new convention, having a tor_addr.*lookup function that
doesn't do hostname resolution is too close for comfort.
I used this script here, and have made no other changes.
s/tor_addr_parse_reverse_lookup_name/tor_addr_parse_PTR_name/g;
s/tor_addr_to_reverse_lookup_name/tor_addr_to_PTR_name/g;
| Nick Mathewson | 2011-10-11 |
* | | | | Fix names of functions that convert strings to addrs•••Now let's have "lookup" indicate that there can be a hostname
resolution, and "parse" indicate that there wasn't. Previously, we
had one "lookup" function that did resolution; four "parse" functions,
half of which did resolution; and a "from_str()" function that didn't
do resolution. That's confusing and error-prone!
The code changes in this commit are exactly the result of this perl
script, run under "perl -p -i.bak" :
s/tor_addr_port_parse/tor_addr_port_lookup/g;
s/parse_addr_port(?=[^_])/addr_port_lookup/g;
s/tor_addr_from_str/tor_addr_parse/g;
This patch leaves aton and pton alone: their naming convention and
behavior is is determined by the sockets API.
More renaming may be needed.
| Nick Mathewson | 2011-10-11 |
* | | | | Fix a bunch of whitespace errors | Nick Mathewson | 2011-10-11 |
| |_|/
|/| | |
|
* | | | Add some points to make it easy to turn off v3 support | Nick Mathewson | 2011-10-10 |
* | | | Quiet two notices, and spelling mistake cleanup | Sebastian Hahn | 2011-10-10 |
* | | | Give tor_cert_get_id_digests() fail-fast behavior•••Right now we can take the digests only of an RSA key, and only expect to
take the digests of an RSA key. The old tor_cert_get_id_digests() would
return a good set of digests for an RSA key, and an all-zero one for a
non-RSA key. This behavior is too error-prone: it carries the risk that
we will someday check two non-RSA keys for equality and conclude that
they must be equal because they both have the same (zero) "digest".
Instead, let's have tor_cert_get_id_digests() return NULL for keys we
can't handle, and make its callers explicitly test for NULL.
| Nick Mathewson | 2011-10-10 |
* | | | Fix some more issues wrt tor_cert_new found by asn | Nick Mathewson | 2011-10-10 |
* | | | Generate certificates that enable v3 handshake | Nick Mathewson | 2011-10-10 |
* | | | Remove a no-longer-relevant comment | Nick Mathewson | 2011-10-10 |
* | | | Make tor_tls_cert_is_valid check key lengths | Nick Mathewson | 2011-10-10 |
* | | | Function to return peer cert as tor_tls_cert | Nick Mathewson | 2011-10-10 |
* | | | Add AUTH keys as specified in proposal 176•••Our keys and x.509 certs are proliferating here. Previously we had:
An ID cert (using the main ID key), self-signed
A link cert (using a shorter-term link key), signed by the ID key
Once proposal 176 and 179 are done, we will also have:
Optionally, a presentation cert (using the link key),
signed by whomever.
An authentication cert (using a shorter-term ID key), signed by
the ID key.
These new keys are managed as part of the tls context infrastructure,
since you want to rotate them under exactly the same circumstances,
and since they need X509 certificates.
| Nick Mathewson | 2011-10-10 |
* | | | Functions to get a public RSA key from a cert | Nick Mathewson | 2011-10-10 |
* | | | Function to detect certificate types that signal v3 certificates | Nick Mathewson | 2011-10-10 |
* | | | Function to get digests of the certs and their keys | Nick Mathewson | 2011-10-10 |
* | | | More functions to manipulate certs received in cells | Nick Mathewson | 2011-10-10 |
* | | | Function to extract the TLSSECRETS field for v3 handshakes | Nick Mathewson | 2011-10-10 |
* | | | Add a sha256 hmac function, with tests | Nick Mathewson | 2011-10-10 |
* | | | Turn X509 certificates into a first-class type and add some functions | Nick Mathewson | 2011-10-10 |
* | | | New function to get all digests of a public key | Nick Mathewson | 2011-10-10 |
* | | | Fix a compile warning on OS X 10.6 and up | Sebastian Hahn | 2011-10-11 |
* | | | Add a missing comma in tor_check_port_forwarding•••My fault; fix for bug 4213.
| Nick Mathewson | 2011-10-10 |
* | | | Merge remote-tracking branch 'asn2/bug3656'•••Conflicts:
src/common/util.c
src/common/util.h
src/or/config.h
src/or/main.c
src/test/test_util.c
| Nick Mathewson | 2011-10-07 |
|\ \ \ |
|
| * | | | Make it compile on Windows™. | George Kadianakis | 2011-10-07 |
| * | | | Put some sense into our logging.•••Transform our logging severities to something more sensible.
Remove sneaky printf()s.
| George Kadianakis | 2011-09-12 |
| * | | | Make check-spaces happy. | George Kadianakis | 2011-09-11 |
| * | | | Enforce transport names being C identifiers.•••Introduce string_is_C_identifier() and use it to enforce transport
names according to the 180 spec.
| George Kadianakis | 2011-09-11 |
| * | | | Introduce tor_terminate_process() function. | George Kadianakis | 2011-09-11 |
| * | | | Improve the code a tad.•••* Use strcmpstart() instead of strcmp(x,y,strlen(y)).
* Warn the user if the managed proxy failed to launch.
* Improve function documentation.
* Use smartlist_len() instead of n_unconfigured_proxies.
* Split managed_proxy_destroy() to managed_proxy_destroy()
and managed_proxy_destroy_with_transports().
* Constification.
| George Kadianakis | 2011-08-15 |
| * | | | Reuse get_string_from_pipe() in log_from_pipe(). | George Kadianakis | 2011-07-18 |
| * | | | Replaced ST_* enum prefix for stream status with IO_STREAM_*. | George Kadianakis | 2011-07-18 |
| * | | | Make some utility functions.•••* Create a function that will get input from a stream, so that we can
communicate with the managed proxy.
* Hackish change to tor_spawn_background() so that we can specify an
environ for our spawn.
| George Kadianakis | 2011-07-13 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-10-03 |
|\ \ \ \
| | |/ /
| |/| | |
|
| * | | | Looks like Windows version 6.2 will be Windows 8•••Thanks to funkstar for the report
| Sebastian Hahn | 2011-10-01 |
* | | | | Make bufferevents work with TokenBucketRefillInterval | Nick Mathewson | 2011-09-22 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-09-20 |
|\| | | |
|
| * | | | Fix a potentially useless integer overflow check.•••GCC 4.2 and maybe other compilers optimize away unsigned integer
overflow checks of the form (foo + bar < foo), for all bar.
Fix one such check in `src/common/OpenBSD_malloc_Linux.c'.
| Mansour Moufid | 2011-09-20 |
* | | | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
configure.in
src/or/circuitbuild.c
| Nick Mathewson | 2011-09-09 |
|\| | | |
|
| * | | | Check for lround with autoconf; fall back to rint. | Nick Mathewson | 2011-08-30 |
| * | | | Fix a compilation issue on older FreeBSDs | Sebastian Hahn | 2011-08-30 |
* | | | | Fix double-closing a stdio stream•••After a stream reached eof, we fclose it, but then
test_util_spawn_background_partial_read() reads from it again, which causes
an error and thus another fclose(). Some platforms are fine with this, others
(e.g. debian-sid-i386) trigger a double-free() error. The actual code used by
Tor (log_from_pipe() and tor_check_port_forwarding()) handle this case
correctly.
| Steven Murdoch | 2011-09-01 |
* | | | | Tweaks on last process-launch patches | Nick Mathewson | 2011-08-31 |
* | | | | Make a version of tor_read_all_handle() for non-Windows platforms•••Mainly used for testing reading from subprocesses. To be more generic
we now pass in a pointer to a process_handle_t rather than a Windows-
specific HANDLE.
| Steven Murdoch | 2011-09-01 |
* | | | | Add a missing include to util.c to get waitpid() on Linux | Nick Mathewson | 2011-08-31 |