summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* fixup! Add client auth for ADD_ONION servicesfeature15588John Brooks2016-05-09
|
* fixup! Move rend auth cookie en-/decoding to a functionJohn Brooks2016-05-09
|
* Move rend client name checks to one functionJohn Brooks2016-05-09
|
* Add client auth for ADD_ONION servicesJohn Brooks2016-05-09
|
* Add client auth to rend_service_add_ephemeralJohn Brooks2016-05-09
|
* Move rend auth cookie en-/decoding to a functionJohn Brooks2016-05-09
| | | | | | | | | | | Tor stores client authorization cookies in two slightly different forms. The service's client_keys file has the standard base64-encoded cookie, including two chars of padding. The hostname file and the client remove the two padding chars, and store an auth type flag in the unused bits. The distinction makes no sense. Refactor all decoding to use the same function, which will accept either form, and use a helper function for encoding the truncated format.
* Make rend_authorized_client_free publicJohn Brooks2016-05-09
| | | | | | This is needed by control.c. Also, check whether client_name is set before doing memwipe.
* Use uint8_t for rend descriptor_cookie fieldsJohn Brooks2016-05-09
|
* Fix some memory issues in test_dns.cNick Mathewson2015-08-26
|
* Resolve check-spaces in test_dns.cNick Mathewson2015-08-26
|
* fix compilation warnings in test_dns.cNick Mathewson2015-08-26
|
* Merge remote-tracking branch 'rl1987/test_dns_resolve_rebased'Nick Mathewson2015-08-26
|\
| * Adding changes file.rl19872015-08-23
| |
| * Unit test dns_resolve(), dns_clip_ttl(), dns_get_expiry_ttl().rl19872015-08-23
| |
* | Document callgraph analysis codeNick Mathewson2015-08-25
| |
* | Make test_checkdir.c dirent include consistent with other filesNick Mathewson2015-08-25
| |
* | Expand changes fileNick Mathewson2015-08-25
| |
* | Log malformed hostnames in socks5 request respecting SafeLoggingAndreas Stieger2015-08-25
| |
* | Is this the syntax that will make freebsd make happy?Nick Mathewson2015-08-21
| |
* | Do not try to chmod test_keygen.sh: It is not generated by configure.Nick Mathewson2015-08-21
| |
* | Merge branch 'workqueue_squashed'Nick Mathewson2015-08-21
|\ \
| * | Remove tor-fw-helper more thoroughlySebastian Hahn2015-08-21
| | |
| * | Fix a bunch of check-spaces complaintsSebastian Hahn2015-08-21
| | |
| * | Observe workqueue_reply_t in check-spacesSebastian Hahn2015-08-21
| | |
| * | Ensure worker threads actually exit when it is timeSebastian Hahn2015-08-21
| | | | | | | | | | | | | | | This includes a small refactoring to use a new enum (workqueue_reply_t) for the return values instead of just ints.
| * | New testcase exposing bug during threadpool shutdownSebastian Hahn2015-08-20
| | | | | | | | | | | | | | | | | | We don't want to accept any work after one of our worker functions has returned WQ_RPL_SHUTDOWN. This testcase currently fails, because we do not actually stop any of the worker threads.
* | | Rename EVENT_SIGNAL -> EVENT_GOT_SIGNALNick Mathewson2015-08-20
|/ / | | | | | | | | | | This avoids a conflict with a macro decl from libevent 1.x. Fixes bug 16867; bug not in any released Tor.
* | Merge branch 'ed25519_keygen_squashed'Nick Mathewson2015-08-19
|\ \
| * | changes file for ed25519_keygen branchNick Mathewson2015-08-19
| | |
| * | More log messages for keygen problemsNick Mathewson2015-08-19
| | |
| * | Explain better why we are about to load the master key.Nick Mathewson2015-08-19
| | |
| * | Don' call failure to get keys a bug; it's possible now.Nick Mathewson2015-08-19
| | |
| * | When we infer the master key from the certificate, save it to disk.Nick Mathewson2015-08-19
| | |
| * | Document test_keygen.sh a little moreNick Mathewson2015-08-19
| | |
| * | Add test_keygen tests for all log outputs; improve keygen outputs.Nick Mathewson2015-08-19
| | |
| * | Suppress fingerprint display in test_keygen.shNick Mathewson2015-08-19
| | |
| * | Integreate test_keygen.sh into 'make check'.Nick Mathewson2015-08-19
| | |
| * | Resolve failing test_keygen tests.Nick Mathewson2015-08-19
| | |
| * | Checkpoint work on ed25519 keygen improvements.Nick Mathewson2015-08-19
| | | | | | | | | | | | Needs changes file, documentation, test integration, more tests.
* | | Merge remote-tracking branch 'teor/feature14882-TestingDirAuthVoteIsStrict-v3'Nick Mathewson2015-08-18
|\ \ \
| * | | Add unit tests for dirserv_set_routerstatus_testingteor2015-08-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Test that TestingDirAuthVote{Exit,Guard,HSDir}[Strict] work on routersets matching all routers, one router, and no routers. TestingDirAuthVote{Exit,Guard,HSDir} set the corresponding flag on routerstatuses which match the routerset, but leave other flags unmodified. TestingDirAuthVote{Exit,Guard,HSDir}Strict clear the corresponding flag on routerstatuses which don't match the routerset.
| * | | Refactor TestingDirAuthVote* into dirserv_set_routerstatus_testingteor2015-08-18
| | | | | | | | | | | | | | | | | | | | | | | | Make it easier to unit test TestingDirAuthVote{Exit,Guard,HSDir} by refactoring the code which sets flags based on them into a new function dirserv_set_routerstatus_testing.
| * | | New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flagsteor2015-08-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | "option to prevent guard,exit,hsdir flag assignment" "A node will never receive the corresponding flag unless that node is specified in the TestingDirAuthVote{Exit,Guard,HSDir} list, regardless of its uptime, bandwidth, exit policy, or DirPort". Patch modified by "teor": VoteOnHidServDirectoriesV2 is now obsolete, so TestingDirAuthVoteHSDir always votes on HSDirs. Closes ticket 14882. Patch by "robgjansen". Commit message and changes file by "teor" with quotes from "robgjansen".
| * | | Fix TestingDirAuthVoteHSDir docs: HSDir flag needs DirPortteor2015-08-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fix an error in the manual page and comments for TestingDirAuthVoteHSDir, which suggested that a HSDir required "ORPort connectivity". While this is true, it is in no way unique to the HSDir flag. Of all the flags, only HSDirs need a DirPort configured in order for the authorities to assign that particular flag. Fixed as part of 14882. Patch by "teor". Bugfix on 0.2.6.3 (f9d57473e1ff on 10 January 2015).
* | | | Update to latest trunnelNick Mathewson2015-08-18
| | | |
* | | | Merge remote-tracking branch 'arma/bug16844-logs'Nick Mathewson2015-08-18
|\ \ \ \
| * | | | Logs and debug info that I used for finding bug 16844Roger Dingledine2015-08-17
| | | | |
* | | | | Merge branch 'decouple_controller_events_squashed'Nick Mathewson2015-08-18
|\ \ \ \ \
| * | | | | Log meaningful messages before failing on windows with threadlocal.Nick Mathewson2015-08-18
| | | | | |
| * | | | | Improve threadlocal documentationNick Mathewson2015-08-18
| | | | | |