- Nov 19, 2010
-
-
Robert Ransom authored
-
Robert Ransom authored
Spotted by Nick Mathewson.
-
- Nov 17, 2010
-
-
Robert Ransom authored
Fixes bug #2195.
-
Robert Ransom authored
-
- Nov 12, 2010
-
-
Nick Mathewson authored
In all likelihood, this bug would make Tor assert, but if it doesn't, let's not have two bugs.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Robert Ransom authored
If buf_shrink_freelists calls log_warn for some reason, we don't want the log call itself to throw buf_shrink_freelists further off the rails.
-
Robert Ransom authored
Sending a log message to a control port can cause Tor to allocate a buffer, thereby changing the length of the freelist behind buf_shrink_freelists's back, thereby causing an assertion to fail. Fixes bug #1125.
-
Robert Ransom authored
If buf_shrink_freelists calls log_warn for some reason, we don't want the log call itself to throw buf_shrink_freelists further off the rails.
-
Robert Ransom authored
Sending a log message to a control port can cause Tor to allocate a buffer, thereby changing the length of the freelist behind buf_shrink_freelists's back, thereby causing an assertion to fail. Fixes bug #1125.
-
- Nov 11, 2010
-
-
Nick Mathewson authored
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Nov 10, 2010
-
-
Nick Mathewson authored
-
Nick Mathewson authored
We would never actually enforce multiplicity rules when parsing annotations, since the counts array never got entries added to it for annotations in the token list that got added by earlier calls to tokenize_string. Found by piebeer.
-
Nick Mathewson authored
-
Sebastian Hahn authored
We decided to no longer ship expert packages for OS X because they're a lot of trouble to keep maintained and confuse users. For those who want a tor on OS X without Vidalia, macports is a fine option. Alternatively, building from source is easy, too. The polipo stuff that is still required for the Vidalia bundle build can now be found in the torbrowser repository, git://git.torproject.org/torbrowser.git.
-
Roger Dingledine authored
-
- Nov 06, 2010
-
-
Roger Dingledine authored
-
- Oct 26, 2010
-
-
Sebastian Hahn authored
-
Sebastian Hahn authored
In a2bb0bfd we started using a separate client identity key. When we are in "public server mode" (that means not a bridge) we will use the same key. Reusing the key without doing the proper refcounting leads to a segfault on cleanup during shutdown. Fix that. Also introduce an assert that triggers if our refcount falls below 0. That should never happen.
-
- Oct 21, 2010
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
We now require that: - Only actual servers should ever call get_server_identity_key - If you're being a client or bridge, the client and server keys should differ. - If you're being a public relay, the client and server keys should be the same.
-
Nick Mathewson authored
-
Nick Mathewson authored
When intro->extend_info is created for an introduction point, it only starts out with a nickname, not necessarily an identity digest. Thus, doing router_get_by_digest isn't necessarily safe.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Oct 20, 2010
-
-
Nick Mathewson authored
-
Nick Mathewson authored
We want to fetch directory info more aggressively if we need it to refuseunknownexits. Thus, we'll want it if our exit policy is _NOT_ reject *.
-
Nick Mathewson authored
-
Nick Mathewson authored
Found by rransom while working on issue #988. Bugfix on 0.2.2.17-alpha. Fixes bug 2097.
-
Sebastian Hahn authored
-Wpointer-sign is implied with -Wall, which we use when building with --enable-gcc-warnings.
-
Sebastian Hahn authored
When configuring with --enable-gcc-warnings, we use -Wformat=2 which automatically enables the available -Wformat switches, so adding them again in the --enable-gcc-hardening case doesn't make sense..
-
Sebastian Hahn authored
We used to enable ssp-buffer-size=1 only when building with --enable-gcc-warnings. That would result in warnings (and no protection for small arrays) when building with --enable-gcc-hardening without enabling warnings, too. Fixes bug 2031. Also remove an XXX: We now allow to build with -fstack-protector by using --enable-gcc-hardening.
-
- Oct 18, 2010
-
-
Sebastian Hahn authored
There are no relay left that run version 0.2.1.3 through 0.2.1.18, so changing this behaviour should be safe now.
-
- Oct 17, 2010
-
-
Robert Hogan authored
Add changes file
-