- 14 Jun, 2011 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Original message from bug3393: check_private_dir() to ensure that ControlSocketsGroupWritable is safe to use. Unfortunately, check_private_dir() only checks against the currently running user… which can be root until privileges are dropped to the user and group configured by the User config option. The attached patch fixes the issue by adding a new effective_user argument to check_private_dir() and updating the callers. It might not be the best way to fix the issue, but it did in my tests. (Code by lunar; changelog by nickm)
-
- 12 Jun, 2011 1 commit
-
-
Sebastian Hahn authored
Thanks to Nick for the idea for the fix.
-
- 10 Jun, 2011 2 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 09 Jun, 2011 3 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 08 Jun, 2011 10 commits
-
-
Sebastian Hahn authored
-
Sebastian Hahn authored
If rep_hist_buffer_stats_write() was called unitinitalized, we'd leak memory.
-
Sebastian Hahn authored
This was harmless, we never compared it to anything but itself or 0. But Coverity complained, and it had a point.
-
Sebastian Hahn authored
Coverity warned about it, it's harmless to comment out.
-
Sebastian Hahn authored
-
Sebastian Hahn authored
-
Sebastian Hahn authored
-
Sebastian Hahn authored
-
Sebastian Hahn authored
-
Sebastian Hahn authored
Before, it wasn't really obvious if one meant hours:minutes or minutes:seconds etc.
-
- 07 Jun, 2011 1 commit
-
-
Nick Mathewson authored
When we set a networkstatus in the non-preferred flavor, we'd check the time in the current_consensus. But that might have been NULL, which could produce a crash as seen in bug 3361.
-
- 06 Jun, 2011 5 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
George Kadianakis notes that if you give crypto_rand_int() a value above INT_MAX, it can return a negative number, which is not what the documentation would imply. The simple solution is to assert that the input is in [1,INT_MAX+1]. If in the future we need a random-value function that can return values up to UINT_MAX, we can add one. Fixes bug 3306; bugfix on 0.2.2pre14.
-
- 05 Jun, 2011 6 commits
-
-
George Kadianakis authored
so that parse_log_domain() doesn't fail.
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- 03 Jun, 2011 7 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
When we added the check for key size, we required that the keys be 128 bytes. But RSA_size (which defers to BN_num_bytes) will return 128 for keys of length 1017..1024. This patch adds a new crypto_pk_num_bits() that returns the actual number of significant bits in the modulus, and uses that to enforce key sizes. Also, credit the original bug3318 in the changes file.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- 02 Jun, 2011 2 commits
-
-
Nick Mathewson authored
-
-