- Jul 01, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Using strncpy meant that if listenaddress were ever >= sizeof(sockaddr_un.sun_path), we would fail to nul-terminate sun_path. This isn't a big deal: we never read sun_path, and the kernel is smart enough to reject the sockaddr_un if it isn't nul-terminated. Nonetheless, it's a dumb failure mode. Instead, we should reject addresses that don't fit in sockaddr_un.sun_path. Coverity found this; it's CID 428. Bugfix on 0.2.0.3-alpha.
-
Nick Mathewson authored
When we rejected a descriptor for not being the one we wanted, we were letting the parsed descriptor go out of scope. Found by Coverity; CID # 30. Bugfix on 0.2.1.26. (No changes file yet, since this is not in any 0.2.1.x release.)
-
Nick Mathewson authored
I'm not one to insist on C's miserly stack limits, but allocating a 256K array on the stack is too much even for me. Bugfix on 0.2.1.7-alpha. Found by coverity. Fixes CID # 450.
-
- Jun 22, 2011
-
-
Robert Ransom authored
-
Robert Ransom authored
-
Robert Ransom authored
-
- Jun 21, 2011
-
-
Roger Dingledine authored
otherwise you scp a tarball up but only one version of the website has it.
-
- Jun 20, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Jun 17, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
This reverts commit 507c1257.
-
Nick Mathewson authored
This reverts commit 40cfad1b.
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
-
-
-
Roger Dingledine authored
debug-level since it will be quite common. logged at both client and server side. this step should help us track what's going on with people filtering tor connections by our ssl habits.
-
- Jun 14, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Original message from bug3393: check_private_dir() to ensure that ControlSocketsGroupWritable is safe to use. Unfortunately, check_private_dir() only checks against the currently running user… which can be root until privileges are dropped to the user and group configured by the User config option. The attached patch fixes the issue by adding a new effective_user argument to check_private_dir() and updating the callers. It might not be the best way to fix the issue, but it did in my tests. (Code by lunar; changelog by nickm)
-
- Jun 13, 2011
-
-
Nick Mathewson authored
-
Fix for bug 3369.
-
- Jun 08, 2011
-
-
Sebastian Hahn authored
If rep_hist_buffer_stats_write() was called unitinitalized, we'd leak memory.
-
Sebastian Hahn authored
This was harmless, we never compared it to anything but itself or 0. But Coverity complained, and it had a point.
-
Sebastian Hahn authored
Coverity warned about it, it's harmless to comment out.
-
Sebastian Hahn authored
-
Sebastian Hahn authored
-
Sebastian Hahn authored
-
- Jun 06, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
George Kadianakis notes that if you give crypto_rand_int() a value above INT_MAX, it can return a negative number, which is not what the documentation would imply. The simple solution is to assert that the input is in [1,INT_MAX+1]. If in the future we need a random-value function that can return values up to UINT_MAX, we can add one. Fixes bug 3306; bugfix on 0.2.2pre14.
-
- Jun 05, 2011
-
-
Roger Dingledine authored
-
Roger Dingledine authored
-
- Jun 03, 2011
-
-
Nick Mathewson authored
-
Nick Mathewson authored
When we added the check for key size, we required that the keys be 128 bytes. But RSA_size (which defers to BN_num_bytes) will return 128 for keys of length 1017..1024. This patch adds a new crypto_pk_num_bits() that returns the actual number of significant bits in the modulus, and uses that to enforce key sizes. Also, credit the original bug3318 in the changes file.
-
Nick Mathewson authored
-