- Sep 21, 2018
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
cypherpunks authored
Missed in 667a6e8f.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
The main.c code is responsible for initialization and shutdown; the mainloop.c code is responsible for running the main loop of Tor. Splitting the "generic event loop" part of mainloop.c from the event-loop-specific part is not done as part of this patch.
-
Nick Mathewson authored
The parts for handling cell formats should be in src/core/or. The parts for handling onionskin queues should be in src/core/or. Only the crypto wrapper belongs in src/core/crypto.
-
Nick Mathewson authored
-
Alexander Hansen Færøy authored
See: https://bugs.torproject.org/4700
-
David Goulet authored
When sending the INTRODUCE1 cell, we acquire the needed data for the cell but if the RP node_t has invalid data, we'll fail the send and completely kill the SOCKS connection. Instead, close the rendezvous circuit and return a transient error meaning that Tor can recover by selecting a new rendezvous point. We'll also do the same when we are unable to encode the INTRODUCE1 cell for which at that point, we'll simply take another shot at a new rendezvous point. Fixes #27774 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
rl1987 authored
-
rl1987 authored
-
- Sep 20, 2018
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Alexander Hansen Færøy authored
See: https://bugs.torproject.org/4700
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Fixes bug 27782; bugfix on 0.3.5.1-alpha
-
Nick Mathewson authored
Related to #27795 -- since NSS will close the socket, we must not count it as owned by Tor.
-
Nick Mathewson authored
When we close a socket via tor_tls_free(), we previously had no way for our socket accounting logic to learn about it. This meant that the socket accounting code would think we had run out of sockets, and freak out. Fixes bug 27795; bugfix on 0.3.5.1-alpha.
-
Nick Mathewson authored
-
Nick Mathewson authored
-