- 16 Feb, 2018 19 commits
-
-
Nick Mathewson authored
Instead, define a maximum size, and enforce it with an assertion.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
(When a variable isn't going to be declared extern in the header, we require that it be static.)
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Isis Lovecruft authored
* FIXES #25271: https://bugs.torproject.org/25271
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Add an autoconf test to make sure we won't regret it. Closes ticket 24484.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Empty versions lists are permitted; empty keywords are not.
-
Nick Mathewson authored
Part of the 25249 fix to make rust match the C.
-
Nick Mathewson authored
Also correct MAX_VERSIONS_TO_EXPAND to match the C. NOTE that this patch leads to incorrect behavior: the C code allows huge ranges; it just doesn't allow votes on them (currently). For full compatibility, we'll need to make the rust code store ranges as ranges natively, possibly using something like the range_map crate. Still, this patch is smaller than a "proper" fix. Fixes TROVE-2018-003.
-
- 14 Feb, 2018 1 commit
-
-
Nick Mathewson authored
-
- 13 Feb, 2018 17 commits
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Taylor Yu authored
-
Nick Mathewson authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Fixes #25236 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
-
David Goulet authored
Never allow the function to set a bucket value above the allowed circuit burst. Closes #25202 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We had this safeguard around dos_init() but not when the consensus changes which can modify consensus parameters and possibly enable the DoS mitigation even if tor wasn't a public relay. Fixes #25223 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Explicitly inform the operator of the rejected relay to set a valid email address in the ContactInfo field and contact bad-relays@ mailing list. Fixes #25170 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
- 12 Feb, 2018 3 commits
-
-
We don't expect this to come up very much, but we may as well make sure that the value isn't predictable (as we do for the other addresses) in case the issue ever comes up. Spotted by teor.
-
-
Nick Mathewson authored
-