- Dec 19, 2019
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This needs to be a point so that the CONF_VAR() macro can work correctly.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This commit moves VersioningAuthoritativeDirectory, RecommendedClientVersions, and RecommendedServerVersions.
-
Nick Mathewson authored
This way, we can't get out of sync between the two declarations.
-
Nick Mathewson authored
I've chosen the "AuthDirMaxServersPerAddr" option here for simplicity, since it is used literally nowhere else besides the dirauth module. Once we have all the infrastructure in place for this, we can move more options into this structure.
-
Nick Mathewson authored
These modules are only built when the selected modules are disabled. The provide stub implementations of the subsystem blocks. Later, other stub implementations could move here. Having real subsystem blocks here will let us handle disabled configuration options better.
-
- Dec 10, 2019
-
-
Neel Chauhan authored
In cancel_descriptor_fetches(), use connection_list_by_type_purpose() instead of connection_list_by_type_state()
-
David Goulet authored
With v3, the "pending_final_cpath" of a circuit is always NULL which means that for v3, established client rendezvous circuit waiting for the intro point to ACK, will always end up timing out quickly. This can increase the delays to which you connect to a service since in order to succeed, the rendezvous circuit needs to fully established (CIRCUIT_PURPOSE_C_REND_JOINED) within the cutoff of the introduction circuit as well which is these days around 2-3 seconds. Fixes #32021 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Dec 09, 2019
-
-
Taylor Yu authored
Part of ticket 30984.
-
Taylor Yu authored
Simplify handle_control_getinfo() by using the new reply lines abstraction. Previously, this function explicitly checked for whether it should generate a MidReplyLine, a DataReplyLine, or an EndReplyLine. control_write_reply_lines() now abstracts this check. Part of #30984.
-
Taylor Yu authored
Simplify handle_control_protocolinfo() by using the new reply line abstraction. Part of #30984.
-
Taylor Yu authored
Factor out the parts of handle_control_protocolinfo() that assemble the AUTHMETHODS and COOKIEFILE strings. Part of #30984.
-
Taylor Yu authored
In handle_control_getconf(), use the new control reply line abstraction to simplify output generation. Previously, this function explicitly checked for whether it should generate a MidReplyLine or an EndReplyLine. control_write_reply_lines() now abstracts this check. Part of #30984.
-
Taylor Yu authored
Part of #30984.
-
- Dec 04, 2019
-
-
All of these files contain "*.h", except for: * src/app/config/.may_include * src/test/.may_include which also contain "*.inc". This change prevents includes of "*.c" files, and other unusually named files. Part of 32609.
-
George Kadianakis authored
-
- Dec 03, 2019
-
-
David Goulet authored
Found by Stem regression tests. Reported by atagar. Fixes #32664 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
-
Now we have a function that reads a file and returns a credential. We need that for the REMOVE control port command.
-
- Remove key_dir which is useless. - Kill an indentation layer. We want to make it cleaner and slimmer so that we can reuse parts of it in the REMOVE command for removing the right client auth file.
-
Because the function that parses client auth credentials saved on disk (parse_auth_file_content()) is not future compatible, there is no way to add support for storing the nickname on the disk. Hence, nicknames cannot persist after Tor restart making them pretty much useless. In the future we can introduce nicknames by adding a new file format for client auth credentials, but this was not deemed worth doing at this stage.
-
- See hs_client_register_auth_credentials() for the entry point. - Also set the permanent flag for credentials we read from the filesystem. - Also add some missing documentation.
-
- Nov 29, 2019
- Nov 27, 2019
-
-
David Goulet authored
Since the removal of ip->circuit_established, this function does litterally nothing so clean it up. Part of #32020 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
By centralizing the circuit cleanup type that is: on close, free and repurpose, some actions on the circuit can not happen for a certain cleanup type or for all types. This passes a cleanup type so the HS subsystem (v2 and v3) can take actions based on the type of cleanup. For instance, there is slow code that we do not run on a circuit close but rather only on free. Part of #32020 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Report back to the v3 subsystem any introduction point client circuit failure so they can be noted down in the failure cache. Fixes #32020 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-