| Commit message (Expand) | Author | Age |
... | |
| * | Change all SMARTLIST_FOREACH loops of >=10 lines to use BEGIN/END•••The SMARTLIST_FOREACH macro is more convenient than BEGIN/END when
you have a nice short loop body, but using it for long bodies makes
your preprocessor tell the compiler that all the code is on the same
line. That causes grief, since compiler warnings and debugger lines
will all refer to that one line.
So, here's a new style rule: SMARTLIST_FOREACH blocks need to be
short.
| Nick Mathewson | 2012-07-17 |
* | | Merge remote-tracking branch 'asn/bug3589' | Nick Mathewson | 2012-07-17 |
|\ \
| |/
|/| |
|
| * | Address Nick's comments.•••- Add a changes/ file.
- Make it compile under --enable-gcc-warnings.
- Update the file-level documentation of src/or/transports.c.
- Only update descriptor if at least a managed proxy was configured.
- Add our external IP address to the extra-info descriptor instead of 0.0.0.0.
| George Kadianakis | 2012-07-12 |
* | | On windows, ENOBUFS starts with WSA. #6296. Fix on 0.2.18-rc | Nick Mathewson | 2012-07-05 |
|/ |
|
* | Merge remote-tracking branch 'andrea/bug6028' | Nick Mathewson | 2012-06-18 |
|\ |
|
| * | Always set *socket_error to something appropriate when returning -1 from conn... | Andrea Shepard | 2012-06-15 |
* | | fix the typo on the typo fix | Roger Dingledine | 2012-06-15 |
* | | fix typos from 783f705d | Roger Dingledine | 2012-06-15 |
* | | Document that we are unlikely to underflow session group IDs. | Nick Mathewson | 2012-06-15 |
* | | Triage the XXX023 and XXX022 comments: postpone many. | Nick Mathewson | 2012-06-15 |
|/ |
|
* | Downgrade tor_assert(0) to tor_fragile_assert() in windows stub create_unix_s... | Nick Mathewson | 2012-06-05 |
* | Update copyright dates to 2012; add a few missing copyright statements | Nick Mathewson | 2012-06-04 |
* | Add about 60 more DOCDOC comments to 0.2.3•••Also, try to resolve some doxygen issues. First, define a magic
"This is doxygen!" macro so that we take the correct branch in
various #if/#else/#endifs in order to get the right documentation.
Second, add in a few grouping @{ and @} entries in order to get some
variables and fields to get grouped together.
| Nick Mathewson | 2012-06-04 |
* | Resolve all currently pending DOCDOC items in master | Nick Mathewson | 2012-06-04 |
* | Merge remote-tracking branch 'public/bug5374' | Nick Mathewson | 2012-05-31 |
|\ |
|
| * | Delay getsockname() call until after connect() is done•••On Windows, getsockname() on a nonblocking apparently won't work
until the connection is done connecting. On XP, it seems to fail by
reporting success and declaring that your address is INADDR_ANY. On the
Win8 preview, though, it fails more loudly and says WSAEINVAL.
Fix for bug 5374; bugfix on 0.1.1.14-alpha.
| Nick Mathewson | 2012-05-24 |
* | | Merge branch 'bug5604' | Nick Mathewson | 2012-05-30 |
|\ \ |
|
| * | | Add a little documentation for the bug5604 fix | Nick Mathewson | 2012-05-30 |
| * | | If DisableNetwork, don't even try to open non-controller listeners•••Fix for 5604; bugfix on 0.2.3.9-alpha, which introduced DisableNetwork.
| Nick Mathewson | 2012-04-18 |
* | | | MSVC build issue: it can't tell that tor_assert(0) aborts. | Nick Mathewson | 2012-05-14 |
* | | | Merge remote-tracking branch 'public/bug5537' | Nick Mathewson | 2012-04-24 |
|\ \ \
| |/ /
|/| | |
|
| * | | We allow IPv6 connections, don't use sockaddr_in with getsockname•••This fixes client_check_address_changed to work better with IPv6 Tor
clients, and prevents them from spewing errors. Fix for ticket 5537.
| Nick Mathewson | 2012-03-30 |
* | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2012-04-11 |
|\ \ \
| |/ /
|/| /
| |/ |
|
| * | Include a Host: header with any HTTP/1.1 proxy request•••Bugfix on 0.2.2.1-alpha, which added the orginal HTTP proxy
authentication code. Fix for bug 5593.
| Nick Mathewson | 2012-04-10 |
* | | Fix a bunch of check-spaces complaints | Sebastian Hahn | 2012-03-28 |
* | | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts:
src/or/control.c
| Nick Mathewson | 2012-03-26 |
|\| |
|
| * | Implement 'safe cookie authentication' | Robert Ransom | 2012-02-22 |
* | | Remove misleading function comment (bug 5324)•••In the distant past, connection_handle_read() could be called when there
are pending bytes in the TLS object during the main loop. The design
since then has been to always read all pending bytes immediately, so
read events only trigger when the socket actually has bytes to read.
Resolves bug 5324.
| Roger Dingledine | 2012-03-07 |
* | | Set IPV6_V6ONLY on listener sockets bound to IPv6 addresses.•••If we don't do this, [::] can be interpreted to mean all v4 and all
v6 addresses. Found by dcf. Fixes bug 4760. See RFC 3493 section
5.3 for more info.
| Nick Mathewson | 2012-01-31 |
* | | Use the standard _WIN32, not the Torism MS_WINDOWS or deprecated WIN32•••This commit is completely mechanical; I used this perl script to make it:
#!/usr/bin/perl -w -i.bak -p
if (/^\s*\#/) {
s/MS_WINDOWS/_WIN32/g;
s/\bWIN32\b/_WIN32/g;
}
| Nick Mathewson | 2012-01-31 |
* | | set SO_REUSEADDR before we bind, not after•••resolves bug 4950 (fixes a bug on commit aba7bb705a6 from #2850)
| Roger Dingledine | 2012-01-23 |
* | | Rename nonconformant identifiers.•••Fixes bug 4893.
These changes are pure mechanical, and were generated with this
perl script:
/usr/bin/perl -w -i.bak -p
s/crypto_pk_env_t/crypto_pk_t/g;
s/crypto_dh_env_t/crypto_dh_t/g;
s/crypto_cipher_env_t/crypto_cipher_t/g;
s/crypto_digest_env_t/crypto_digest_t/g;
s/aes_free_cipher/aes_cipher_free/g;
s/crypto_free_cipher_env/crypto_cipher_free/g;
s/crypto_free_digest_env/crypto_digest_free/g;
s/crypto_free_pk_env/crypto_pk_free/g;
s/_crypto_dh_env_get_dh/_crypto_dh_get_dh/g;
s/_crypto_new_pk_env_rsa/_crypto_new_pk_from_rsa/g;
s/_crypto_pk_env_get_evp_pkey/_crypto_pk_get_evp_pkey/g;
s/_crypto_pk_env_get_rsa/_crypto_pk_get_rsa/g;
s/crypto_new_cipher_env/crypto_cipher_new/g;
s/crypto_new_digest_env/crypto_digest_new/g;
s/crypto_new_digest256_env/crypto_digest256_new/g;
s/crypto_new_pk_env/crypto_pk_new/g;
s/crypto_create_crypto_env/crypto_cipher_new/g;
s/connection_create_listener/connection_listener_new/g;
s/smartlist_create/smartlist_new/g;
s/transport_create/transport_new/g;
| Nick Mathewson | 2012-01-18 |
* | | Use SOCKET_OK macros in even more places•••Add a TOR_INVALID_SOCKET macro to wrap -1/INVALID_SOCKET.
Partial work for bug4533.
| Nick Mathewson | 2012-01-17 |
* | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2012-01-03 |
|\| |
|
| * | Fix spelling in a controlsocket log msg•••Fixes bug 4803.
| Sebastian Hahn | 2011-12-30 |
* | | Fix a check-spaces violation in compat.c•••Also fix a comment typo
| Sebastian Hahn | 2011-12-30 |
* | | Merge remote-tracking branch 'public/bug4697' | Nick Mathewson | 2011-12-22 |
|\ \ |
|
| * | | Ignore all bufferevent events on a marked connection•••Bug 4697; fix on 0.2.3.1-alpha
| Nick Mathewson | 2011-12-17 |
* | | | Convert a couple of char[256]s into sockaddr_storage | Nick Mathewson | 2011-12-21 |
* | | | Merge remote-tracking branch 'origin/maint-0.2.2' | Nick Mathewson | 2011-12-21 |
|\ \ \
| |/ /
|/| /
| |/ |
|
| * | Do not even try to keep going on a socket with socklen==0•••Back in #1240, r1eo linked to information about how this could happen
with older Linux kernels in response to nmap. Bugs #4545 and #4547
are about how our approach to trying to deal with this condition was
broken and stupid. Thanks to wanoskarnet for reminding us about #1240.
This is a fix for the abovementioned bugs, and is a bugfix on
0.1.0.3-rc.
| Nick Mathewson | 2011-12-21 |
* | | Resolve bug 3448: remove mention of tor-ops (which is not in use) | Nick Mathewson | 2011-12-02 |
* | | Use correct address family where necessary for bridges on IPv6. | Linus Nordberg | 2011-11-30 |
* | | Add some logging and comments. | Linus Nordberg | 2011-11-30 |
* | | Initial hacking for proposal 186.•••This code handles the new ORPort options, and incidentally makes all
remaining port types use the new port configuration systems.
There are some rough edges! It doesn't do well in the case where your
Address says one thing but you say to Advertise another ORPort. It
doesn't handle AllAddrs. It doesn't actually advertise anything besides
the first listed advertised IPv4 ORPort and DirPort. It doesn't do
port forwarding to them either.
It's not tested either, it needs more documentation, and it probably
forgets to put the milk back in the refrigerator.
| Nick Mathewson | 2011-11-30 |
* | | Fix some DOCDOCs | Nick Mathewson | 2011-11-29 |
* | | New 'DisableNetwork' option to prevent Tor from using the network•••Some controllers want this so they can mess with Tor's configuration
for a while via the control port before actually letting Tor out of
the house.
We do this with a new DisableNetwork option, that prevents Tor from
making any outbound connections or binding any non-control
listeners. Additionally, it shuts down the same functionality as
shuts down when we are hibernating, plus the code that launches
directory downloads.
To make sure I didn't miss anything, I added a clause straight to
connection_connect, so that we won't even try to open an outbound
socket when the network is disabled. In my testing, I made this an
assert, but since I probably missed something, I've turned it into a
BUG warning for testing.
| Nick Mathewson | 2011-11-28 |
* | | Fix compile warnings on windows | Sebastian Hahn | 2011-11-15 |
* | | Fix memory leak in retry_all_listeners: Coverity CID 485 | Nick Mathewson | 2011-10-26 |
* | | Fix names of functions that convert strings to addrs•••Now let's have "lookup" indicate that there can be a hostname
resolution, and "parse" indicate that there wasn't. Previously, we
had one "lookup" function that did resolution; four "parse" functions,
half of which did resolution; and a "from_str()" function that didn't
do resolution. That's confusing and error-prone!
The code changes in this commit are exactly the result of this perl
script, run under "perl -p -i.bak" :
s/tor_addr_port_parse/tor_addr_port_lookup/g;
s/parse_addr_port(?=[^_])/addr_port_lookup/g;
s/tor_addr_from_str/tor_addr_parse/g;
This patch leaves aton and pton alone: their naming convention and
behavior is is determined by the sockets API.
More renaming may be needed.
| Nick Mathewson | 2011-10-11 |