- Feb 08, 2013
-
-
Nick Mathewson authored
We need a weak RNG in a couple of places where the strong RNG is both needless and too slow. We had been using the weak RNG from our platform's libc implementation, but that was problematic (because many platforms have exceptionally horrible weak RNGs -- like, ones that only return values between 0 and SHORT_MAX) and because we were using it in a way that was wrong for LCG-based weak RNGs. (We were counting on the low bits of the LCG output to be as random as the high ones, which isn't true.) This patch adds a separate type for a weak RNG, adds an LCG implementation for it, and uses that exclusively where we had been using the platform weak RNG.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Karsten Loesing authored
-
Karsten Loesing authored
-
- Feb 07, 2013
-
-
Nick Mathewson authored
Conflicts: src/or/connection.c
-
Nick Mathewson authored
-
Nick Mathewson authored
Conflicts: src/common/util.c
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
-
-
-
I think we want both sets of messages to appear independently to help us know what needs tuning.
-
Nick Mathewson authored
-
Nick Mathewson authored
Right now, all our curve25519 backends ignore the high bit of the public key. But possibly, others could treat the high bit of the public key as encoding out-of-bounds values, or as something to be preserved. This could be used to distinguish clients with different backends, at the cost of killing a circuit. As a workaround, let's just clear the high bit of each public key indiscriminately before we use it. Fix for bug 8121, reported by rransom. Bugfix on 0.2.4.8-alpha.
-
- Feb 05, 2013
-
-
Roger Dingledine authored
-
Nick Mathewson authored
-
Mike Perry authored
-
Mike Perry authored
I noticed bad wifi networks can have low use success rates.
-
- Feb 04, 2013
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
Nick Mathewson authored
Implements ticket 8151.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Authorities don't set is_possible_guard on node_t, so they were never deciding that they could build enough paths. This is a quick and dirty fix. Bug not in any released version of Tor
-
Nick Mathewson authored
-
Nick Mathewson authored
These seem to have gotten conflicted out of existence while mike was working on path bias stuff. Thanks to sysrqb for collecting these in a handy patch.
-
Nick Mathewson authored
It appears that the code for 7291 gave an unused-value warning when built with --disable-curve25519.
-
Nick Mathewson authored
The fix is to move the two functions to format/parse base64 curve25519 public keys into a new "crypto_format.c" file. I could have put them in crypto.c, but that's a big file worth splitting anyway. Fixes bug 8153; bugfix on 0.2.4.8-alpha where I did the fix for 7869.
-
Nick Mathewson authored
This prevents bug 8147, where such nodes would accrue points towards Guard, Fast, HSDir, and so on. Fixes bug 8147.
-
Nick Mathewson authored
Another bug 8145 fix.
-
Nick Mathewson authored
Fix for 8145.
-
Nick Mathewson authored
-
Nick Mathewson authored
Fixes bug 8146.
-
Nick Mathewson authored
-