- Jun 10, 2019
- Jun 05, 2019
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- May 29, 2019
-
-
George Kadianakis authored
-
- May 22, 2019
-
-
David Goulet authored
-
- May 20, 2019
-
-
Unify this with the trunnel ABI so we don't duplicate. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
We want to support parsing a cell with unknown status code so we are forward compatible. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Like the previous commit about the INTRODUCE_ACK status code, change all auth key type to use the one defined in the trunnel file. Standardize the use of these auth type to a common ABI. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
This enum was the exact same as hs_intro_ack_status_t that was removed at the previous commit. It was used client side when parsing the INTRODUCE_ACK cell. Now, the entire code dealing with the INTRODUCE_ACK cell (both sending and receiving) have been modified to all use the same ABI defined in the trunnel introduce1 file. Finally, the client will default to the normal behavior when receiving an unknown NACK status code which is to note down that we've failed and re-extend to the next intro point. This way, unknown status code won't trigger a different behavior client side. Part of #30454. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Remove the hs_intro_ack_status_t enum and move the value into trunnel. Only use these values from now on in the intro point code. Interestingly enough, the client side also re-define these values in hs_cell.h with the hs_cell_introd_ack_status_t enum. Next commit will fix that and force to use the trunnel ABI. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- May 17, 2019
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- May 15, 2019
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
George Kadianakis authored
-
- May 14, 2019
-
-
Nick Mathewson authored
-
Nick Mathewson authored
Closes ticket 30452.
-
- May 10, 2019
-
-
Nick Mathewson authored
Fortunately, in 0.3.5.1-alpha we improved logging for various failure cases involved with onion service client auth. Unfortunately, for this one, we freed the file right before logging its name. Fortunately, tor_free() sets its pointer to NULL, so we didn't have a use-after-free bug. Unfortunately, passing NULL to %s is not defined. Fortunately, GCC 9.1.1 caught the issue! Unfortunately, nobody has actually tried building Tor with GCC 9.1.1 before. Or if they had, they didn't report the warning. Fixes bug 30475; bugfix on 0.3.5.1-alpha.
-
- May 09, 2019
-
-
David Goulet authored
The INTRODUCE1 trunnel definition file doesn't support that value so it can not be used else it leads to an assert on the intro point side if ever tried. Fortunately, it was impossible to reach that code path. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- May 02, 2019
-
-
Nick Mathewson authored
-
- Apr 30, 2019
-
-
Nick Mathewson authored
-
George Kadianakis authored
-
rl1987 authored
-
- Apr 29, 2019
-
-
Nick Mathewson authored
Fixes conflicts and also moves bandwidth-file-digest.
-
Nick Mathewson authored
Fixes bug 30316; bugfix on 0.3.5.1-alpha.
-
Nick Mathewson authored
-
- Apr 25, 2019
-
-
George Kadianakis authored
-
- Apr 24, 2019
-
-
Alexander Hansen Færøy authored
In this patch we lower the log level of the failures for the three calls to unlink() in networkstatus_set_current_consensus(). These errors might trigger on Windows because the memory mapped consensus file keeps the file in open state even after we have close()'d it. Windows will then error on the unlink() call with a "Permission denied" error. The consequences of ignoring these errors is that we leave an unused file around on the file-system, which is an easier way to fix this problem right now than refactoring networkstatus_set_current_consensus(). See: https://bugs.torproject.org/29930
-
- Apr 23, 2019
-
-
teor authored
Fixes bug 30263; bugfix on 0.4.0.1-alpha.
-
- Apr 22, 2019
-
-
teor authored
Closes ticket 30234.
-