aboutsummaryrefslogtreecommitdiff
path: root/src/or/connection.c
Commit message (Expand)AuthorAge
...
| * Change all SMARTLIST_FOREACH loops of >=10 lines to use BEGIN/END•••The SMARTLIST_FOREACH macro is more convenient than BEGIN/END when you have a nice short loop body, but using it for long bodies makes your preprocessor tell the compiler that all the code is on the same line. That causes grief, since compiler warnings and debugger lines will all refer to that one line. So, here's a new style rule: SMARTLIST_FOREACH blocks need to be short. Nick Mathewson2012-07-17
* | Merge remote-tracking branch 'asn/bug3589'Nick Mathewson2012-07-17
|\ \ | |/ |/|
| * Address Nick's comments.•••- Add a changes/ file. - Make it compile under --enable-gcc-warnings. - Update the file-level documentation of src/or/transports.c. - Only update descriptor if at least a managed proxy was configured. - Add our external IP address to the extra-info descriptor instead of 0.0.0.0. George Kadianakis2012-07-12
* | On windows, ENOBUFS starts with WSA. #6296. Fix on 0.2.18-rcNick Mathewson2012-07-05
|/
* Merge remote-tracking branch 'andrea/bug6028'Nick Mathewson2012-06-18
|\
| * Always set *socket_error to something appropriate when returning -1 from conn...Andrea Shepard2012-06-15
* | fix the typo on the typo fixRoger Dingledine2012-06-15
* | fix typos from 783f705dRoger Dingledine2012-06-15
* | Document that we are unlikely to underflow session group IDs.Nick Mathewson2012-06-15
* | Triage the XXX023 and XXX022 comments: postpone many.Nick Mathewson2012-06-15
|/
* Downgrade tor_assert(0) to tor_fragile_assert() in windows stub create_unix_s...Nick Mathewson2012-06-05
* Update copyright dates to 2012; add a few missing copyright statementsNick Mathewson2012-06-04
* Add about 60 more DOCDOC comments to 0.2.3•••Also, try to resolve some doxygen issues. First, define a magic "This is doxygen!" macro so that we take the correct branch in various #if/#else/#endifs in order to get the right documentation. Second, add in a few grouping @{ and @} entries in order to get some variables and fields to get grouped together. Nick Mathewson2012-06-04
* Resolve all currently pending DOCDOC items in masterNick Mathewson2012-06-04
* Merge remote-tracking branch 'public/bug5374'Nick Mathewson2012-05-31
|\
| * Delay getsockname() call until after connect() is done•••On Windows, getsockname() on a nonblocking apparently won't work until the connection is done connecting. On XP, it seems to fail by reporting success and declaring that your address is INADDR_ANY. On the Win8 preview, though, it fails more loudly and says WSAEINVAL. Fix for bug 5374; bugfix on 0.1.1.14-alpha. Nick Mathewson2012-05-24
* | Merge branch 'bug5604'Nick Mathewson2012-05-30
|\ \
| * | Add a little documentation for the bug5604 fixNick Mathewson2012-05-30
| * | If DisableNetwork, don't even try to open non-controller listeners•••Fix for 5604; bugfix on 0.2.3.9-alpha, which introduced DisableNetwork. Nick Mathewson2012-04-18
* | | MSVC build issue: it can't tell that tor_assert(0) aborts.Nick Mathewson2012-05-14
* | | Merge remote-tracking branch 'public/bug5537'Nick Mathewson2012-04-24
|\ \ \ | |/ / |/| |
| * | We allow IPv6 connections, don't use sockaddr_in with getsockname•••This fixes client_check_address_changed to work better with IPv6 Tor clients, and prevents them from spewing errors. Fix for ticket 5537. Nick Mathewson2012-03-30
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2012-04-11
|\ \ \ | |/ / |/| / | |/
| * Include a Host: header with any HTTP/1.1 proxy request•••Bugfix on 0.2.2.1-alpha, which added the orginal HTTP proxy authentication code. Fix for bug 5593. Nick Mathewson2012-04-10
* | Fix a bunch of check-spaces complaintsSebastian Hahn2012-03-28
* | Merge remote-tracking branch 'origin/maint-0.2.2'•••Conflicts: src/or/control.c Nick Mathewson2012-03-26
|\|
| * Implement 'safe cookie authentication'Robert Ransom2012-02-22
* | Remove misleading function comment (bug 5324)•••In the distant past, connection_handle_read() could be called when there are pending bytes in the TLS object during the main loop. The design since then has been to always read all pending bytes immediately, so read events only trigger when the socket actually has bytes to read. Resolves bug 5324. Roger Dingledine2012-03-07
* | Set IPV6_V6ONLY on listener sockets bound to IPv6 addresses.•••If we don't do this, [::] can be interpreted to mean all v4 and all v6 addresses. Found by dcf. Fixes bug 4760. See RFC 3493 section 5.3 for more info. Nick Mathewson2012-01-31
* | Use the standard _WIN32, not the Torism MS_WINDOWS or deprecated WIN32•••This commit is completely mechanical; I used this perl script to make it: #!/usr/bin/perl -w -i.bak -p if (/^\s*\#/) { s/MS_WINDOWS/_WIN32/g; s/\bWIN32\b/_WIN32/g; } Nick Mathewson2012-01-31
* | set SO_REUSEADDR before we bind, not after•••resolves bug 4950 (fixes a bug on commit aba7bb705a6 from #2850) Roger Dingledine2012-01-23
* | Rename nonconformant identifiers.•••Fixes bug 4893. These changes are pure mechanical, and were generated with this perl script: /usr/bin/perl -w -i.bak -p s/crypto_pk_env_t/crypto_pk_t/g; s/crypto_dh_env_t/crypto_dh_t/g; s/crypto_cipher_env_t/crypto_cipher_t/g; s/crypto_digest_env_t/crypto_digest_t/g; s/aes_free_cipher/aes_cipher_free/g; s/crypto_free_cipher_env/crypto_cipher_free/g; s/crypto_free_digest_env/crypto_digest_free/g; s/crypto_free_pk_env/crypto_pk_free/g; s/_crypto_dh_env_get_dh/_crypto_dh_get_dh/g; s/_crypto_new_pk_env_rsa/_crypto_new_pk_from_rsa/g; s/_crypto_pk_env_get_evp_pkey/_crypto_pk_get_evp_pkey/g; s/_crypto_pk_env_get_rsa/_crypto_pk_get_rsa/g; s/crypto_new_cipher_env/crypto_cipher_new/g; s/crypto_new_digest_env/crypto_digest_new/g; s/crypto_new_digest256_env/crypto_digest256_new/g; s/crypto_new_pk_env/crypto_pk_new/g; s/crypto_create_crypto_env/crypto_cipher_new/g; s/connection_create_listener/connection_listener_new/g; s/smartlist_create/smartlist_new/g; s/transport_create/transport_new/g; Nick Mathewson2012-01-18
* | Use SOCKET_OK macros in even more places•••Add a TOR_INVALID_SOCKET macro to wrap -1/INVALID_SOCKET. Partial work for bug4533. Nick Mathewson2012-01-17
* | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2012-01-03
|\|
| * Fix spelling in a controlsocket log msg•••Fixes bug 4803. Sebastian Hahn2011-12-30
* | Fix a check-spaces violation in compat.c•••Also fix a comment typo Sebastian Hahn2011-12-30
* | Merge remote-tracking branch 'public/bug4697'Nick Mathewson2011-12-22
|\ \
| * | Ignore all bufferevent events on a marked connection•••Bug 4697; fix on 0.2.3.1-alpha Nick Mathewson2011-12-17
* | | Convert a couple of char[256]s into sockaddr_storageNick Mathewson2011-12-21
* | | Merge remote-tracking branch 'origin/maint-0.2.2'Nick Mathewson2011-12-21
|\ \ \ | |/ / |/| / | |/
| * Do not even try to keep going on a socket with socklen==0•••Back in #1240, r1eo linked to information about how this could happen with older Linux kernels in response to nmap. Bugs #4545 and #4547 are about how our approach to trying to deal with this condition was broken and stupid. Thanks to wanoskarnet for reminding us about #1240. This is a fix for the abovementioned bugs, and is a bugfix on 0.1.0.3-rc. Nick Mathewson2011-12-21
* | Resolve bug 3448: remove mention of tor-ops (which is not in use)Nick Mathewson2011-12-02
* | Use correct address family where necessary for bridges on IPv6.Linus Nordberg2011-11-30
* | Add some logging and comments.Linus Nordberg2011-11-30
* | Initial hacking for proposal 186.•••This code handles the new ORPort options, and incidentally makes all remaining port types use the new port configuration systems. There are some rough edges! It doesn't do well in the case where your Address says one thing but you say to Advertise another ORPort. It doesn't handle AllAddrs. It doesn't actually advertise anything besides the first listed advertised IPv4 ORPort and DirPort. It doesn't do port forwarding to them either. It's not tested either, it needs more documentation, and it probably forgets to put the milk back in the refrigerator. Nick Mathewson2011-11-30
* | Fix some DOCDOCsNick Mathewson2011-11-29
* | New 'DisableNetwork' option to prevent Tor from using the network•••Some controllers want this so they can mess with Tor's configuration for a while via the control port before actually letting Tor out of the house. We do this with a new DisableNetwork option, that prevents Tor from making any outbound connections or binding any non-control listeners. Additionally, it shuts down the same functionality as shuts down when we are hibernating, plus the code that launches directory downloads. To make sure I didn't miss anything, I added a clause straight to connection_connect, so that we won't even try to open an outbound socket when the network is disabled. In my testing, I made this an assert, but since I probably missed something, I've turned it into a BUG warning for testing. Nick Mathewson2011-11-28
* | Fix compile warnings on windowsSebastian Hahn2011-11-15
* | Fix memory leak in retry_all_listeners: Coverity CID 485Nick Mathewson2011-10-26
* | Fix names of functions that convert strings to addrs•••Now let's have "lookup" indicate that there can be a hostname resolution, and "parse" indicate that there wasn't. Previously, we had one "lookup" function that did resolution; four "parse" functions, half of which did resolution; and a "from_str()" function that didn't do resolution. That's confusing and error-prone! The code changes in this commit are exactly the result of this perl script, run under "perl -p -i.bak" : s/tor_addr_port_parse/tor_addr_port_lookup/g; s/parse_addr_port(?=[^_])/addr_port_lookup/g; s/tor_addr_from_str/tor_addr_parse/g; This patch leaves aton and pton alone: their naming convention and behavior is is determined by the sockets API. More renaming may be needed. Nick Mathewson2011-10-11