- Apr 23, 2015
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
When we made assertions not get compiled in for the coverage case, we missed one case where, for our tests, we really DO want to have an assertion fail: the backtrace test. Bugfix on 1228dd29; bug not in any released tor
-
-
teor authored
The "longest possible policy" comment in router_parse_addr_policy_item_from_string() used an example policy that was actually shorter than the maximum length. This comment was amended, and expanded to count the maximum number of characters. Comment change only.
-
For this to work bt_test.py now returns an exit code indicating success or failure. Additionally, check-local and its specific dependencies are now obsolete so they are removed.
-
-
The zero length keys test now requires the path to the Tor binary as the first parameter to ensure the correct Tor binary is used without hard coding a path. The wrapper script calls the zero length keys test for each test separately to ensure the correct shell is used (as configured by autoconf). Another solution would have been to place the tests into separate functions so multiple tests could be run internally. This would have made a diff of considerable size and frankly it is outside the scope of this fix.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Apr 22, 2015
-
-
teor authored
Unit tests for the 10 valid combinations of set/NULL config options DirAuthorities, AlternateBridgeAuthority, AlternateDirAuthority, and FallbackDir. Add assertion in consider_adding_dir_servers() for checks in validate_dir_servers(): "You cannot set both DirAuthority and Alternate*Authority."
-
teor authored
Only add the default fallback directories when the DirAuthorities, AlternateDirAuthority, and FallbackDir directory config options are set to their defaults. The default fallback directory list is currently empty, this fix will only change tor's behaviour when it has default fallback directories. Fixes bug 15642; bugfix on 90f6071d in 0.2.4.7-alpha. Patch by "teor".
-
teor authored
When self-testing reachability, use ExtendAllowPrivateAddresses to determine if local/private addresses imply reachability. The previous fix used TestingTorNetwork, which implies ExtendAllowPrivateAddresses, but this excluded rare configs where ExtendAllowPrivateAddresses is set but TestingTorNetwork is not. Fixes bug 15771; bugfix on 0.2.6.1-alpha, bug #13924. Patch by "teor", issue discovered by CJ Ess.
-
Nick Mathewson authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
- Apr 21, 2015
-
-
David Goulet authored
Ref: https://trac.torproject.org/projects/tor/ticket/14847?replyto=31#comment:31 Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
Also, fix a small typo in a comment. Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
The expected message of the command now expects "650+" and "650 OK". Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
The "SERVER=" option now supports LongName described in the control-spec.txt Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
The HS_DESC_CONTENT event results in multiple line thus must be prefixed with a "650+" and ending with "650 OK". Reported-by:
Damian Johnson <atagar@torproject.org> Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
The HS_DESC event was using rend_data_t from the dir connection to reply the onion address and authentication type. With the new HSFETCH command, it's now possible to fetch a descriptor only using the descriptor id thus resulting in not having an onion address in any HS_DESC event. This patch removes rend_query from the hs desc control functions and replace it by an onion address string and an auth type. On a successful fetch, the service id is taken from the fetched descriptor. For that, an extra parameter is added to "store as a client" function that contains the cache entry stored. This will make the control event functions scale more easily over time if other values not present in rend_data_t are needed since the rend_data from the dir connection might not contained everything we need. Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
Big refactor of the HS client descriptor fetch functionnality. This allows to fetch an HS descriptor using only a descriptor ID. Furthermore, it's also possible to provide a list of HSDir(s) now that are used instead of the automatically choosen one. The approach taken was to add a descriptor_id field to the rend_data_t structure so it can be used, if available, by the HS client. The onion address field however has priority over it that is if both are set, the onion address is used to fetch the descriptor. A new public function is introduced called rend_client_fetch_v2_desc(...) that does NOT lookup the client cache before fetching and can take a list of HSDirs as a parameter. The HSFETCH control command now uses this new function thus making it work and final. Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
As defined in section 4.1.26 in the control-spec.txt, this new event replies the content of a successfully fetched HS descriptor. This also adds a unit test for the controller event. Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
This adds the command on the controller side that parses and validate arguments but does nothing for now. The HS desriptor fetch must be modularized a bit more before we can use the command. See control-spec.txt section 3.26 for more information on this command. Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@ev0ke.net>
-