- 08 Dec, 2017 1 commit
-
-
Nick Mathewson authored
-
- 04 Nov, 2017 1 commit
-
-
Sebastian Hahn authored
This reverts commit 27fa4a98.
-
- 31 Oct, 2017 1 commit
-
-
When the directory information changes, callback to the HS client subsystem so it can check if any pending SOCKS connections are waiting for a descriptor. If yes, attempt a refetch for those. Fixes #23762 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 20 Oct, 2017 1 commit
-
-
Nick Mathewson authored
This function was never about 'finishing' the event loop, but rather about making sure that the code outside the event loop would be run at least once.
-
- 27 Sep, 2017 1 commit
-
-
David Goulet authored
If 6 SOCKS requests are opened at once, it would have triggered 6 fetches which ultimately poke all 6 HSDir. We don't want that, if we have multiple SOCKS requests for the same service, do one fetch only. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 22 Sep, 2017 1 commit
-
-
Nick Mathewson authored
The is_first_hop field should have been called used_create_fast, but everywhere that we wanted to check it, we should have been checking channel_is_client() instead.
-
- 15 Sep, 2017 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
It's been deprecated since 0.2.9.2-alpha. Closes ticket 23426.
-
- 12 Sep, 2017 1 commit
-
-
David Goulet authored
Fixes #23481 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 11 Sep, 2017 1 commit
-
-
Add magic comments recognized by default -Wimplicit-fallthrough=3 or break, as required.
-
- 07 Sep, 2017 1 commit
-
-
Nick Mathewson authored
Undeprecate it; rename it to TestingClientDNSRejectInternalAddresses; add the old name as an alias; reject configurations where it is set but TestingTorNetwork is not; change the documentation accordingly. Closes tickets 21031 and 21522.
-
- 05 Sep, 2017 6 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
I'm doing this using the Proxy-Authorization: header to support clients that understand it, and with a new tor-specific header that makes more sense for our use.
-
Nick Mathewson authored
-
Nick Mathewson authored
Our convention is that functions which manipulate a type T should be named T_foo. But the buffer functions were super old, and followed all kinds of conventions. Now they're uniform. Here's the perl I used to do this: \#!/usr/bin/perl -w -i -p s/read_to_buf\(/buf_read_from_socket\(/; s/flush_buf\(/buf_flush_to_socket\(/; s/read_to_buf_tls\(/buf_read_from_tls\(/; s/flush_buf_tls\(/buf_flush_to_tls\(/; s/write_to_buf\(/buf_add\(/; s/write_to_buf_compress\(/buf_add_compress\(/; s/move_buf_to_buf\(/buf_move_to_buf\(/; s/peek_from_buf\(/buf_peek\(/; s/fetch_from_buf\(/buf_get_bytes\(/; s/fetch_from_buf_line\(/buf_get_line\(/; s/fetch_from_buf_line\(/buf_get_line\(/; s/buf_remove_from_front\(/buf_drain\(/; s/peek_buf_startswith\(/buf_peek_startswith\(/; s/assert_buf_ok\(/buf_assert_ok\(/;
-
Nick Mathewson authored
This commit does not change the implementation of any function: it only moves code and adds new includes as necessary. Part of #23149.
-
- 24 Aug, 2017 4 commits
-
-
David Goulet authored
Simply directly return its returned value. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
For now, prop224 doesn't have a mechanism to note down connection attempts so we only do it for legacy system using rend_data. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Recognize and handle v3 addresses. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 22 Aug, 2017 1 commit
-
-
Nick Mathewson authored
Right now there's a single warn_if_unnamed flag for router_get_consensus_status_by_nickname() and node_get_by_nickname(), that is nearly always 1. I've turned it into an 'unsigned' bitfield, and inverted its sense. I've added the flags argument to node_get_by_hex_id() too, though it does nothing there right now. I've removed the router_get_consensus_status_by_nickname() function, since it was only used in once place. This patch changes the warning behavior of GETINFO ns/name/<name>, since all other name lookups from the controller currently warn. Later I'm going to add more flags, for ed25519 support.
-
- 19 Aug, 2017 2 commits
-
-
George Kadianakis authored
We will need to edit this function, and it's already pretty huge. Let's make it a bit smaller. This commit moves code, fixes a 80 char line and add two lines at the start to make it compile. Trivial change. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
George Kadianakis authored
We need this func so that we recognize SOCKS conns to v3 addresses. - Also rename rend_valid_service_id() to rend_valid_v2_service_id() - Also move parse_extended_hostname() tests to their own unittest, and add a v3 address to the test as well. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 09 Aug, 2017 4 commits
-
-
Add a common function for both legacy and prop224 hidden service to increment and decrement the rendezvous stream counter on an origin circuit. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
-
This commit refactors the handle_hs_exit_conn() function introduced at a prior commit that connects the rendezvous circuit to the edge connection used to connect to the service virtual port requested in a BEGIN cell. The refactor adds the support for prop224 adding the hs_service_set_conn_addr_port() function that has the same purpose has rend_service_set_connection_addr_port() from the legacy code. The rend_service_set_connection_addr_port() has also been a bit refactored so the common code can be shared between the two HS subsystems (legacy and prop224). In terms of functionallity, nothing has changed, we still close the circuits in case of failure for the same reasons as the legacy system currently does. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
This commit simply moves the code from the if condition of a rendezvous circuit to a function to handle such a connection. No code was modified _except_ the use or rh.stream_id changed to n_stream->stream_id so we don't have to pass the cell header to the function. This is groundwork for prop224 support which will break down the handle_hs_exit_conn() depending on the version of hidden service the circuit and edge connection is for. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 25 Jul, 2017 1 commit
-
-
Roger Dingledine authored
-
- 07 Jul, 2017 3 commits
-
-
-
- Move some crypto structures so that they are visible by tests. - Introduce a func to count number of hops in cpath which will be used by the tests. - Mark a function as mockable.
-
The legacy HS circuit code uses rend_data to match between circuits and streams. We refactor some of that code so that it understands hs_ident as well which is used for prop224.
-
- 08 Jun, 2017 1 commit
-
-
This fixes an assertion failure in relay_send_end_cell_from_edge_() when an origin circuit and a cpath_layer = NULL were passed. A service rendezvous circuit could do such a thing when a malformed BEGIN cell is received but shouldn't in the first place because the service needs to send an END cell on the circuit for which it can not do without a cpath_layer. Fixes #22493 Reported-by:
Roger Dingledine <arma@torproject.org> Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 30 May, 2017 1 commit
-
-
Add magic comments recognized by default -Wimplicit-fallthrough=3 or break, as required.
-
- 15 May, 2017 1 commit
-
-
Nick Mathewson authored
Also add a get_options() call so it compiles. Fixes bug 18100; bugfix on 0.2.6.3-alpha. Patch from "d4fq0fQAgoJ".
-
- 09 May, 2017 1 commit
-
-
Deprecated in 0.2.9.2-alpha, this commits changes it as OBSOLETE() and cleans up the code associated with it. Partially fixes #22060 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- 21 Apr, 2017 1 commit
-
-
Nick Mathewson authored
-
- 15 Mar, 2017 1 commit
-
-
Nick Mathewson authored
-
- 02 Mar, 2017 1 commit
-
-
teor authored
Fixes bug 21576; bugfix on Tor 0.2.9.3-alpha. Reported by alecmuffett.
-