- Feb 12, 2018
-
-
ffmancera authored
Fixes #23635. Signed-off-by:
Fernando Fernandez Mancera <ffmancera@riseup.net>
-
- Feb 06, 2018
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Feb 05, 2018
-
-
Nick Mathewson authored
-
David Goulet authored
Services can keep rendezvous circuits for a while so don't log them if tor is a single onion service. Fixes #25116 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
The HT_FOREACH() is insanely heavy on the CPU and this is part of the fast path so make it return the nice memory size counter we added in 4d812e29. Fixes #25148 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
- Feb 02, 2018
-
-
Nick Mathewson authored
This is needed so llvm_fuzz will see it too.
-
David Goulet authored
Becasue the circuit creation burst and rate can change at runtime it is possible that between two refill of a bucket, we end up setting the bucket value to less than there currently is. Fixes #25128 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
These functions protect againts over and underflow. They BUG() in case we overflow the counter. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
If the cache is using 20% of our maximum allowed memory, clean 10% of it. Same behavior as the HS descriptor cache. Closes #25122 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
The current code flow makes it that we can release a channel in a PENDING state but not in the pending list. This happens while the channel is being processed in the scheduler loop. Fixes #25125 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
- Feb 01, 2018
-
-
Nick Mathewson authored
-
This tests many cases of the KIST scheduler with the pending list state by calling entry point in the scheduler while channels are scheduled or not. Also, it adds a test for the bug #24700. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
David Goulet authored
-
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Included crypto_rsa.[ch] into include.am in order to resolve a compiling issue. Follows #24658. Signed-off-by:
Fernando Fernandez Mancera <ffmancera@riseup.net>
-
crypto_get_rsa_padding_overhead() and crypto_get_rsa_padding() are not static inline anymore in order to split the crypto_rsa module from crypto.[ch]. Also included necessary modules in order to solve dependency issues. Also made two functions in crypto.c use crypto_pk_asn1_encdoe() instead of reaching into the crypto_pk_t struct.
-
ffmancera authored
OpenSSL never uses these callbacks anymore so the code is disabled. Fixes #25097. Signed-off-by:
Fernando Fernandez Mancera <ffmancera@riseup.net>
-
Nick Mathewson authored
Closes 25108.
-
Nick Mathewson authored
This reverts commit 9a062825. It appears that I misunderstood how the seccomp2 filter rules interact. It appears that `SCMP_ACT_ERRNO()` always takes precedence over `SCMP_ACT_ALLOW()` -- I had thought instead that earlier rules would override later ones. But this change caused bug 25115 (not in any released Tor).
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
- Jan 31, 2018
-
-
Nick Mathewson authored
-
The accurate address of a connection is real_addr, not the addr member. channel_tls_get_remote_addr_method() now returns real_addr instead. Fixes #24952; bugfix on 707c1e2e in 0.2.4.11-alpha. Signed-off-by:
Fernando Fernandez Mancera <ffmancera@riseup.net>
-