- May 20, 2019
-
-
Unify this with the trunnel ABI so we don't duplicate. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
We want to support parsing a cell with unknown status code so we are forward compatible. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Like the previous commit about the INTRODUCE_ACK status code, change all auth key type to use the one defined in the trunnel file. Standardize the use of these auth type to a common ABI. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
This enum was the exact same as hs_intro_ack_status_t that was removed at the previous commit. It was used client side when parsing the INTRODUCE_ACK cell. Now, the entire code dealing with the INTRODUCE_ACK cell (both sending and receiving) have been modified to all use the same ABI defined in the trunnel introduce1 file. Finally, the client will default to the normal behavior when receiving an unknown NACK status code which is to note down that we've failed and re-extend to the next intro point. This way, unknown status code won't trigger a different behavior client side. Part of #30454. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Remove the hs_intro_ack_status_t enum and move the value into trunnel. Only use these values from now on in the intro point code. Interestingly enough, the client side also re-define these values in hs_cell.h with the hs_cell_introd_ack_status_t enum. Next commit will fix that and force to use the trunnel ABI. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- May 09, 2019
-
-
David Goulet authored
The INTRODUCE1 trunnel definition file doesn't support that value so it can not be used else it leads to an assert on the intro point side if ever tried. Fortunately, it was impossible to reach that code path. Part of #30454 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Apr 19, 2019
-
-
teor authored
"ours" merge, to avoid taking any changes from PR 792 in 0.3.4. (We already merged PR 791 for 29665 into 0.3.4.)
-
teor authored
-
teor authored
-
teor authored
-
teor authored
-
teor authored
"ours" merge, to avoid taking any changes from PR 772 in 0.3.4. (We already merged a different fix for 23790 into 0.3.2 and later.)
-
teor authored
-
- Apr 15, 2019
-
-
teor authored
-
- Apr 05, 2019
- Apr 04, 2019
-
-
Nick Mathewson authored
When classifying a client's selection of TLS ciphers, if the client ciphers are not yet available, do not cache the result. Previously, we had cached the unavailability of the cipher list and never looked again, which in turn led us to assume that the client only supported the ancient V1 link protocol. This, in turn, was causing Stem integration tests to stall in some cases. Fixes bug 30021; bugfix on 0.2.4.8-alpha.
-
- Apr 03, 2019
-
-
Nick Mathewson authored
-
Karsten Loesing authored
-
- Apr 02, 2019
-
-
teor authored
-
- Apr 01, 2019
-
-
teor authored
And add some useful comments
-
Also, refrain from caching target/. See: https://levans.fr/rust_travis_cache.html
-
teor authored
-
teor authored
And fix a comment. See: https://gcc.gnu.org/onlinedocs/gcc/Gcov-Data-Files.html#Gcov-Data-Files
-
teor authored
Otherwise, "make check-changes" will complain when we backport the change.
-
- Mar 27, 2019
-
-
teor authored
-
- Mar 22, 2019
-
-
teor authored
We need a recent test-network.sh to use new chutney features in CI. Fixes bug 29703; bugfix on 0.2.9.1-alpha.
-
- Mar 21, 2019
-
- Mar 20, 2019
-
-
Alexander Hansen Færøy authored
Since we have moved coveralls to the script target the entire build will now fail if coveralls fail. We handle it more gracefully by echo'ing the failure instead of doing a hard-failure. See: https://bugs.torproject.org/29036
-
Alexander Hansen Færøy authored
This should ensure that GCDA files are never entering the cache of Travis CI. See: https://bugs.torproject.org/29036
-
- Mar 19, 2019
- Mar 18, 2019