- Feb 11, 2013
-
-
Nick Mathewson authored
Bugfix on 96b1bd4f. Not in any released Tor.
-
Nick Mathewson authored
One is a probably-impossible leak if we fail to sign a consensus; another occurs when we can't look up the user we're trying to chown our sockets to.
-
Nick Mathewson authored
Coverity is worried about this (CID 980653). It hasn't happened in testing, but we might as well make sure it can't happen.
-
Nick Mathewson authored
When we compute the estimated microseconds we need to handle our pending onionskins, we could (in principle) overflow a uint32_t if we ever had 4 million pending onionskins before we had any data about how onionskins take. Nevertheless, let's compute it properly. Fixes bug 8210; bugfix on 0.2.4.10. Found by coverity; this is CID 980651.
-
Nick Mathewson authored
If geoip_format_bridge_stats() returned NULL when it should have returned a string, we would have tried to deref NULL, and died. Not a big deal in the unit tests, but still worth fixing. Found by coverity; This is CID 743384.
-
Nick Mathewson authored
-
Nick Mathewson authored
This one occurs when changing configuration options. Found by coverity.
-
Nick Mathewson authored
This fixes a crash bug if we fail to generate an extrainfo descriptor. Fixes bug 8208; bugfix on 0.2.3.16-alpha.
-
Nick Mathewson authored
Coverity is worried that we're checking entry_conn in some cases, but not in the case where we set entry_conn->pending_optimistic_data. This commit should calm it down (CID 718623).
-
Nick Mathewson authored
Found by coverity
-
Nick Mathewson authored
This shouldn't actually matter, since tor-resolve will return soon after this function exits, but it's nice to be warning-free Found by coverity, fixes CID 718633
-
Nick Mathewson authored
These shouldn't really matter, but it's nice to be leak-free.
-
Nick Mathewson authored
Fixes CID 980650; bugfix on 0.2.4.10-alpha.
-
Nick Mathewson authored
This test was accounting for about 2/3 of our unit tests' runtime, even on systems with a fast curve25519. No test should take so long.
-
-
Roger Dingledine authored
It returns the method by which we decided our public IP address (explicitly configured, resolved from explicit hostname, guessed from interfaces, learned by gethostname). Now we can provide more helpful log messages when a relay guesses its IP address incorrectly (e.g. due to unexpected lines in /etc/hosts). Resolves ticket 2267. While we're at it, stop sending a stray "(null)" in some cases for the server status "EXTERNAL_ADDRESS" controller event. Resolves bug 8200.
-
Roger Dingledine authored
-
- Feb 09, 2013
-
-
Nick Mathewson authored
To avoid surprises, good coding practice suggests parenthesizing every macro definition -- or at the very least, all those involving an expression.
-
- Feb 08, 2013
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
This check isn't necessary (see comment on #7801), but it took at least two smart people a little while to see why it wasn't necessary, so let's have it in to make the code more readable.
-
Nick Mathewson authored
-
Nick Mathewson authored
We need a weak RNG in a couple of places where the strong RNG is both needless and too slow. We had been using the weak RNG from our platform's libc implementation, but that was problematic (because many platforms have exceptionally horrible weak RNGs -- like, ones that only return values between 0 and SHORT_MAX) and because we were using it in a way that was wrong for LCG-based weak RNGs. (We were counting on the low bits of the LCG output to be as random as the high ones, which isn't true.) This patch adds a separate type for a weak RNG, adds an LCG implementation for it, and uses that exclusively where we had been using the platform weak RNG.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Karsten Loesing authored
-
Karsten Loesing authored
-
- Feb 07, 2013
-
-
Nick Mathewson authored
Fixes bug 7727; fix on 0.2.4.10-alpha.
-
Nick Mathewson authored
-
-
-
I think we want both sets of messages to appear independently to help us know what needs tuning.
-
Nick Mathewson authored
Right now, all our curve25519 backends ignore the high bit of the public key. But possibly, others could treat the high bit of the public key as encoding out-of-bounds values, or as something to be preserved. This could be used to distinguish clients with different backends, at the cost of killing a circuit. As a workaround, let's just clear the high bit of each public key indiscriminately before we use it. Fix for bug 8121, reported by rransom. Bugfix on 0.2.4.8-alpha.
-
- Feb 05, 2013
-
-
Mike Perry authored
I noticed bad wifi networks can have low use success rates.
-
- Feb 04, 2013
-
-
Roger Dingledine authored
-
Nick Mathewson authored
Implements ticket 8151.
-
Nick Mathewson authored
Authorities don't set is_possible_guard on node_t, so they were never deciding that they could build enough paths. This is a quick and dirty fix. Bug not in any released version of Tor
-
Nick Mathewson authored
These seem to have gotten conflicted out of existence while mike was working on path bias stuff. Thanks to sysrqb for collecting these in a handy patch.
-