- Aug 24, 2017
-
-
The `test-operator-cleanup` patch, and related coccinelle patches, don't do any checks for line length. This patch fixes the line length issues caused by the previous commits.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
coccinelle was getting confused
-
Nick Mathewson authored
-
This patch fixes the operator usage in src/test/*.c to use the symbolic operators instead of the normal C comparison operators. This patch was generated using: ./scripts/coccinelle/test-operator-cleanup src/test/*.[ch]
-
This patch replaces tt_assert() checks for NULL/non-NULL values with tt_ptr_op().
-
This patch replaces tt_assert() comparison of integers and unsigned integers with their respective tt_int_op or tt_uint_op counterpart.
-
-
-
This patch adds a script written by Nick for bug #13172 to clean up the usage of ==, !=, <, >, <=, and >= by replacing them with their symbolic OP_* counterpart. This will ensure that a tool like Coccinelle doesn't get confused and silently ignore large blocks of code.
-
Nick Mathewson authored
-
-
David Goulet authored
For a ready v3 rendezvous circuit, consider it so we don't expire. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
A client can re-extend up to 3 intro points on the same circuit. This happens when we get NACKed by the intro point for which we choose a new intro and re-extend the circuit to it. That process can be arbitrarly long so reset the dirty timestamp of the circuit everytime we choose to re-extend so we get a bit more time to actually do our introduction. This is a client circuit so it is short live once opened thus giving us a bit more time to complete the introduction is ok. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
When looking for an introduction circuit in circuit_get_best(), we log an info message if we are about to launch a new intro circuit in parallel. However, the condition was considering marked for close circuit leading to the function triggering the log info even though there is actually no valid intro circuit. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Only register the RP circuit when it opens and not when we send the INTRODUCE1 cell else, when re-extending to a new IP, we would register the same RP circuit with the same cookie twice leading to the circuit being closed. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Changed the assert_intro_circ_ok() to an almost non fatal function so tor can recover properly. We keep the anonymity assert because if that is not right, we have much deeper problems and client should stop sending bytes to the network immediately. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Simply directly return its returned value. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This function has been replaced by hs_client_receive_rendezvous_acked(() doing the same exact thing for both v2 and v3 service. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
The client needs to find the right intro point object from the circuit identity digest it is opened to. This new function does that. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
New function named hs_cell_introduce1_data_clear() is introduced to clear off an hs_cell_introduce1_data_t object. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Give it a name that shows the transition from a descriptor link spec to a trunnel link spec. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Avoid including a huge trunnel interface everytime we include hs_descriptor.h Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
When we free a client descriptor cache object, tell the OOM handler. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
When a client decodes a descriptor, make sure it matches the expected blinded key which is derived from the hidden service identity key. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
We can't trigger a valid upload because it would require us to MOCK a long list of functions ultimately not really testing the upload because we aren't on a running network. Signed-off-by:
David Goulet <dgoulet@torproject.org> Conflicts: src/test/test_hs_service.c
-
David Goulet authored
Needed by the client when fetching a descriptor. This function checks the directory purpose and hard assert if it is not for fetching. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This commit makes the client use the intro point state cache. It notes down when we get a NACK from the intro point and then uses that cache to decide if it should either close the circuits or re-extend to a new intro point. This also introduces a very useful function that checks if an intro point is usable that is query the state cache and checks a series of requirement. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This cache keeps track of the state of intro points which is needed when we have failures when using them. It is similar to the failure cache of the legacy system. At this commit, it is unused but initialized, cleanup and freed. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This moves it to hs_client.c so it can be used by both system (legacy and prop224). For now, only the legacy system uses it. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
Don't assert() on rend_data when closing circuits to report an IP failure. The prop224 code doesn't have yet the support for this. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
For now, prop224 doesn't have a mechanism to note down connection attempts so we only do it for legacy system using rend_data. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
The client can now handle RENDEZVOUS2 cell when they arrive. This consolidate both hidden service version in one function. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-