- Aug 16, 2017
- Aug 11, 2017
-
-
David Goulet authored
Our Windows compiler treats "time_t" as long long int but Linux likes it long int so cast those to make Windows happy. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Partially fix #23224. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Partially fixes #23223 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Use the PATH_SEPARATOR for a path comparaison so it works with Windows as well. Partially fix #23223 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
This change should improve overhead for downloading small numbers of descriptors and microdescriptors by improving compression performance and lowering directory request overhead. Closes ticket 23220.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Aug 09, 2017
-
-
Roger Dingledine authored
the values of "v3" and "bridge" have to do with *where* you publish to, not whether you publish.
-
Nick Mathewson authored
Implements 15645.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
George Kadianakis authored
- Fix various ssize_t/size_t confusions in the tests. - Fix a weird memset argument: "bad_memset: Argument -16 in memset loses precision in memset(&desc_two->blinded_kp.pubkey.pubkey, -16, 32UL)." - Fix check_after_deref instance in check_state_line_for_service_rev_counter(): "check_after_deref: Null-checking items suggests that it may be null, but it has already been dereferenced on all paths leading to the check."
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
-
Add a common function for both legacy and prop224 hidden service to increment and decrement the rendezvous stream counter on an origin circuit. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Also, this removes all the callsite of this rephist in the hs subsystem Fixes #23097 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Also fix a check-spaces instance.
-
Also add some unittests.
-
Also add a unittest for hs_get_responsible_hsdirs() which was used to find and fix the bug.
-
Also make sure we are not gonna advertise the ed25519 key of an intro point that doesn't support it.
-
-
We used to have a small HS desc cert lifetime but those certs can stick around for 36 hours if they get initialized in the beginning of overlap period. [warn] Bug: Non-fatal assertion !(hs_desc_encode_descriptor(desc->desc, &desc->signing_kp, &encoded_desc) < 0) failed in upload_descriptor_to_hsdir at src/or/hs_service.c:1886. Stack trace: (on Tor 0.3.2.0-alpha-dev b4a14555597fb9b3)
-
-
-
-
I repurposed the old directory_request_set_hs_ident() into a new directory_request_upload_set_hs_ident() which is only used for the upload purpose and so it can assert on the dir_purpose. When coding the client-side we can make a second function for fetch.
-
The structure was not zeroed out, and left some boolean fields uninitialized.
-
-
-