]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
10 months agoSupport creating ephemeral services with PoW defenses
Ld Qr [Sat, 12 Oct 2024 05:09:03 +0000 (05:09 +0000)] 
Support creating ephemeral services with PoW defenses

Add 3 more keywords to the ADD_ONION control command:
PoWDefensesEnabled, PoWQueueRate and PoWQueueBurst which correspond to
HiddenServicePoWDefensesEnabled, HiddenServicePoWQueueRate and HiddenServicePoWQueueBurst
from torrc.

10 months agoMerge branch 'fix-unittest' into 'main'
David Goulet [Wed, 25 Sep 2024 18:34:43 +0000 (18:34 +0000)] 
Merge branch 'fix-unittest' into 'main'

Fix unit test in test_entrynodes.c

See merge request tpo/core/tor!831

10 months agoFix unit test in test_entrynodes.c
Cecylia Bocovich [Tue, 24 Sep 2024 20:13:29 +0000 (16:13 -0400)] 
Fix unit test in test_entrynodes.c

11 months agoMerge branch 'typo-socks-proxy' into 'main'
David Goulet [Tue, 10 Sep 2024 12:49:51 +0000 (12:49 +0000)] 
Merge branch 'typo-socks-proxy' into 'main'

Fix a typo in the HTTP proxy error message.

See merge request tpo/core/tor!829

11 months agotest: Add unit tests for prop351
David Goulet [Tue, 10 Sep 2024 12:46:02 +0000 (08:46 -0400)] 
test: Add unit tests for prop351

Signed-off-by: David Goulet <dgoulet@torproject.org>
11 months agoFix a typo in the HTTP proxy error message.
Pier Angelo Vendrame [Tue, 10 Sep 2024 12:24:46 +0000 (14:24 +0200)] 
Fix a typo in the HTTP proxy error message.

11 months agoImplement proposal 351
Nick Mathewson [Mon, 9 Sep 2024 21:00:50 +0000 (17:00 -0400)] 
Implement proposal 351

This proposal adds new syntax to the SOCKS5 username/password extension scheme,
so that requests with usernames starting with <torS0X> are now reserved.

For C tor, all we need to do is reject every username starting with <torS0X>
unless it is exactly "<torS0X>0".

12 months agoMerge branch 'maint-0.4.8'
David Goulet [Mon, 5 Aug 2024 19:26:38 +0000 (15:26 -0400)] 
Merge branch 'maint-0.4.8'

12 months agodirvote: Fix memleak when computing consensus
David Goulet [Mon, 5 Aug 2024 15:59:30 +0000 (11:59 -0400)] 
dirvote: Fix memleak when computing consensus

Fixes #40966

Signed-off-by: David Goulet <dgoulet@torproject.org>
12 months agoMerge branch 'manpage-typos' into 'main'
David Goulet [Mon, 22 Jul 2024 14:54:42 +0000 (14:54 +0000)] 
Merge branch 'manpage-typos' into 'main'

two small presentation issues in man page

See merge request tpo/core/tor!824

13 months agotwo small presentation issues in man page
Roger Dingledine [Fri, 12 Jul 2024 21:46:40 +0000 (17:46 -0400)] 
two small presentation issues in man page

13 months agoMerge branch 'tap-out-phase-1' into 'main'
David Goulet [Thu, 27 Jun 2024 13:34:12 +0000 (13:34 +0000)] 
Merge branch 'tap-out-phase-1' into 'main'

Implement phase 1 of Proposal 350 (remove TAP onion keys)

See merge request tpo/core/tor!822

13 months agoChanges file for proposal 350 phase 1
Nick Mathewson [Tue, 25 Jun 2024 12:35:12 +0000 (08:35 -0400)] 
Changes file for proposal 350 phase 1

13 months agoDo not publish TAP key when publish-dummy-tap-key is 0.
Nick Mathewson [Tue, 25 Jun 2024 13:01:21 +0000 (09:01 -0400)] 
Do not publish TAP key when publish-dummy-tap-key is 0.

13 months agoUpdate supported protovers for prop350
Nick Mathewson [Mon, 24 Jun 2024 23:53:50 +0000 (19:53 -0400)] 
Update supported protovers for prop350

Relay=1 is no longer supported; it corresponds to TAP.

Microdesc=3 and Desc=3 are now supported; they correspond to the ability to
handle (micro)descriptors without TAP onion keys.

13 months agoAdd a test for parsing a routerdesc with no TAP key.
Nick Mathewson [Mon, 24 Jun 2024 21:48:42 +0000 (17:48 -0400)] 
Add a test for parsing a routerdesc with no TAP key.

13 months agoAdd a test for a microdesc with no onion key.
Nick Mathewson [Mon, 24 Jun 2024 21:23:20 +0000 (17:23 -0400)] 
Add a test for a microdesc with no onion key.

13 months agoRemove a now-unused variable.
Nick Mathewson [Mon, 24 Jun 2024 20:48:00 +0000 (16:48 -0400)] 
Remove a now-unused variable.

13 months agoprocess_descs: Authorities require TAP keys for now.
Nick Mathewson [Mon, 24 Jun 2024 19:03:15 +0000 (15:03 -0400)] 
process_descs: Authorities require TAP keys for now.

13 months agoRouterparse: accept routerdescs without TAP keys.
Nick Mathewson [Mon, 24 Jun 2024 18:55:27 +0000 (14:55 -0400)] 
Routerparse: accept routerdescs without TAP keys.

13 months agorouterparse: Simplify checking for now-mandatory elements
Nick Mathewson [Mon, 24 Jun 2024 18:40:11 +0000 (14:40 -0400)] 
routerparse: Simplify checking for now-mandatory elements

All of these elements are now mandatory, so we can now simplify
our logic for making sure that they are all present or all not-present.

13 months agoRename "onion_pkey" fields in routerinfo_t, and make them optional.
Nick Mathewson [Mon, 24 Jun 2024 18:30:32 +0000 (14:30 -0400)] 
Rename "onion_pkey" fields in routerinfo_t, and make them optional.

(Renaming them has forced me to look at every place where they are used, so I
can make sure that they are really optional now.)

13 months agoRemove node_get_rsa_onion_key
Nick Mathewson [Mon, 24 Jun 2024 18:16:11 +0000 (14:16 -0400)] 
Remove node_get_rsa_onion_key

13 months agoRemove TAP key from extend_info_t
Nick Mathewson [Mon, 24 Jun 2024 18:15:04 +0000 (14:15 -0400)] 
Remove TAP key from extend_info_t

13 months agoMake onion-key body optional in microdescs
Nick Mathewson [Mon, 24 Jun 2024 18:04:04 +0000 (14:04 -0400)] 
Make onion-key body optional in microdescs

Also, stop storing onion keys in microdesc_t.

(In prop350, for microdescs, we are making the body optional; the "onion-key"
entry is still mandatory, so that we can tell where microdescs begin.)

13 months agoRemove support for deciding to use CREATE/EXTEND/TAP.
Nick Mathewson [Mon, 24 Jun 2024 17:54:26 +0000 (13:54 -0400)] 
Remove support for deciding to use CREATE/EXTEND/TAP.

13 months agoprop350: Remove all support for TAP, CREATE, and EXTEND.
Nick Mathewson [Mon, 24 Jun 2024 17:51:54 +0000 (13:51 -0400)] 
prop350: Remove all support for TAP, CREATE, and EXTEND.

13 months agoprop350: Stop accepting CREATE and EXTEND.
Nick Mathewson [Mon, 24 Jun 2024 17:29:04 +0000 (13:29 -0400)] 
prop350: Stop accepting CREATE and EXTEND.

13 months agoMerge branch 'maint-0.4.8'
David Goulet [Tue, 18 Jun 2024 19:19:12 +0000 (15:19 -0400)] 
Merge branch 'maint-0.4.8'

13 months agobridge: Always put transport-info line
David Goulet [Tue, 11 Jun 2024 16:38:56 +0000 (12:38 -0400)] 
bridge: Always put transport-info line

Signed-off-by: David Goulet <dgoulet@torproject.org>
13 months agoClean-up Managed Proxy state in PT tests.
Alexander Færøy [Fri, 21 Jul 2023 00:53:12 +0000 (02:53 +0200)] 
Clean-up Managed Proxy state in PT tests.

This patch makes sure we clean up our version and implementation fields
in our Managed Proxy struct after each test run.

This was detected by LeakSanitizer.

See: tpo/core/tor#11101.

13 months agoAdd changes file for tpo/core/tor#11101.
Alexander Færøy [Fri, 21 Jul 2023 00:15:40 +0000 (02:15 +0200)] 
Add changes file for tpo/core/tor#11101.

13 months agoAdd implementation and version metadata to bridge extra-info.
Alexander Færøy [Fri, 21 Jul 2023 00:11:16 +0000 (02:11 +0200)] 
Add implementation and version metadata to bridge extra-info.

This patch adds two new keys to bridges' extra-info document:
"transport-version" and "transport-implementation".

These two new values always appear together (if one is missing, the
other one will be missing too) and is parsed from PT's STATUS
TYPE=version messages.

See: tpo/core/tor#11101.

13 months agoInclude "IMPLEMENTATION" parameter to STATUS TYPE=version PT messages.
Alexander Færøy [Fri, 21 Jul 2023 00:10:21 +0000 (02:10 +0200)] 
Include "IMPLEMENTATION" parameter to STATUS TYPE=version PT messages.

13 months agoDrop requirement for TRANSPORT being present in STATUS messages.
Alexander Færøy [Fri, 21 Jul 2023 00:09:33 +0000 (02:09 +0200)] 
Drop requirement for TRANSPORT being present in STATUS messages.

13 months agoAdd support for PT STATUS TYPE=version messages.
Alexander Færøy [Thu, 24 Mar 2022 19:13:41 +0000 (19:13 +0000)] 
Add support for PT STATUS TYPE=version messages.

This patch adds support for handling the version status message. Once we
receive such message, we add the given version string to the
managed_proxy_t instance. Note this value can be NULL and the value can
change throughout the lifetime of the PT as multiple status version
messages are handled.

See: tpo/core/tor#11101

13 months agoMerge branch 'sandbox-bwauth' into 'main'
David Goulet [Tue, 18 Jun 2024 13:10:19 +0000 (13:10 +0000)] 
Merge branch 'sandbox-bwauth' into 'main'

fix sandbox for bandwidth authority

Closes #40933

See merge request tpo/core/tor!821

14 months agofix sandbox for bandwidth authority
Peter Palfrader [Fri, 7 Jun 2024 17:29:52 +0000 (19:29 +0200)] 
fix sandbox for bandwidth authority

14 months agoMerge branch 'maint-0.4.8'
David Goulet [Thu, 6 Jun 2024 14:32:07 +0000 (10:32 -0400)] 
Merge branch 'maint-0.4.8'

14 months agoversion: Bump version to 0.4.8.12-dev
Tor CI Release [Thu, 6 Jun 2024 13:25:52 +0000 (13:25 +0000)] 
version: Bump version to 0.4.8.12-dev

14 months agoMerge branch 'maint-0.4.8'
David Goulet [Thu, 6 Jun 2024 13:22:20 +0000 (09:22 -0400)] 
Merge branch 'maint-0.4.8'

14 months agoversion: Bump version to 0.4.8.12
Tor CI Release [Thu, 6 Jun 2024 12:42:04 +0000 (12:42 +0000)] 
version: Bump version to 0.4.8.12

14 months agoMerge branch 'maint-0.4.8'
David Goulet [Thu, 6 Jun 2024 12:56:54 +0000 (08:56 -0400)] 
Merge branch 'maint-0.4.8'

14 months agofallbackdir: Update list generated on June 06, 2024
Tor CI Release [Thu, 6 Jun 2024 12:41:13 +0000 (12:41 +0000)] 
fallbackdir: Update list generated on June 06, 2024

14 months agoUpdate geoip files to match ipfire location db, 2024/06/06.
Tor CI Release [Thu, 6 Jun 2024 12:40:27 +0000 (12:40 +0000)] 
Update geoip files to match ipfire location db, 2024/06/06.

14 months agoMerge branch 'maint-0.4.8'
David Goulet [Thu, 30 May 2024 16:31:51 +0000 (12:31 -0400)] 
Merge branch 'maint-0.4.8'

14 months agoUpdate OverloadStatistics to match prop 328
Georg Koppen [Wed, 8 May 2024 09:34:05 +0000 (09:34 +0000)] 
Update OverloadStatistics to match prop 328

Closes: #40940.
14 months agoMerge branch 'maint-0.4.8'
David Goulet [Thu, 30 May 2024 16:30:44 +0000 (12:30 -0400)] 
Merge branch 'maint-0.4.8'

14 months agoMerge branch 'ticket40689_048_01' into maint-0.4.8
David Goulet [Thu, 30 May 2024 16:30:40 +0000 (12:30 -0400)] 
Merge branch 'ticket40689_048_01' into maint-0.4.8

14 months agoMerge branch 'ticket40689_048_01' into 'main'
David Goulet [Thu, 30 May 2024 16:29:56 +0000 (16:29 +0000)] 
Merge branch 'ticket40689_048_01' into 'main'

dirauth: Add new faravahar

Closes #40689

See merge request tpo/core/tor!819

14 months agoMerge branch 'maint-0.4.8'
David Goulet [Thu, 30 May 2024 13:51:52 +0000 (09:51 -0400)] 
Merge branch 'maint-0.4.8'

14 months agoscripts: Fix Python3 warnings
David Goulet [Thu, 30 May 2024 13:50:38 +0000 (09:50 -0400)] 
scripts: Fix Python3 warnings

Signed-off-by: David Goulet <dgoulet@torproject.org>
14 months agodirauth: Add new faravahar
David Goulet [Thu, 30 May 2024 13:09:39 +0000 (09:09 -0400)] 
dirauth: Add new faravahar

Brand new address, brand new keys, brand new day.

Closes #40689

Signed-off-by: David Goulet <dgoulet@torproject.org>
14 months agoMerge branch 'typos' into 'main'
David Goulet [Wed, 29 May 2024 16:58:01 +0000 (16:58 +0000)] 
Merge branch 'typos' into 'main'

fix a few comment typos

See merge request tpo/core/tor!818

14 months agofix a few comment typos
Roger Dingledine [Wed, 29 May 2024 16:45:51 +0000 (12:45 -0400)] 
fix a few comment typos

15 months agoMerge branch 'maint-0.4.8'
David Goulet [Tue, 30 Apr 2024 19:34:11 +0000 (15:34 -0400)] 
Merge branch 'maint-0.4.8'

15 months agoFix typo in tor-relays list address
hiro [Tue, 30 Apr 2024 12:35:16 +0000 (14:35 +0200)] 
Fix typo in tor-relays list address

15 months agoMerge branch 'maint-0.4.8'
David Goulet [Mon, 29 Apr 2024 20:02:12 +0000 (16:02 -0400)] 
Merge branch 'maint-0.4.8'

15 months agoMerge branch 'm4-serial-fix' into 'main'
David Goulet [Mon, 29 Apr 2024 20:00:44 +0000 (20:00 +0000)] 
Merge branch 'm4-serial-fix' into 'main'

m4: update ax_check_compile_flag.m4 from autoconf-archive

See merge request tpo/core/tor!813

15 months agoMerge branch 'changelogs' into 'main'
Alexander Færøy [Tue, 23 Apr 2024 17:51:16 +0000 (17:51 +0000)] 
Merge branch 'changelogs' into 'main'

forward-port the 0.4.8.10 and .11 changelogs

See merge request tpo/core/tor!814

15 months agofix changelog typos and clean up a bit
Roger Dingledine [Fri, 19 Apr 2024 12:18:48 +0000 (08:18 -0400)] 
fix changelog typos and clean up a bit

15 months agom4: update ax_check_compile_flag.m4 from autoconf-archive
Sam James [Fri, 19 Apr 2024 08:59:19 +0000 (09:59 +0100)] 
m4: update ax_check_compile_flag.m4 from autoconf-archive

I noticed this when doing some M4 macro analysis work, and saw
that the version of `ax_check_compile_flag.m4` in Tor has two serial
lines ('serial 5' and 'serial 6') which is invalid.

We could just fix one of the lines, but it makes more sense to just
sync with upstream, I think.

Import ax_check_compile_flag.m4 from autoconf-archive at latest
commit at time of writing (4e8aab846b0872fba99f1fe02ebcdff178a34c87).

Signed-off-by: Sam James <sam@gentoo.org>
15 months agoMerge branch 'typos' into 'main'
David Goulet [Thu, 18 Apr 2024 13:27:15 +0000 (13:27 +0000)] 
Merge branch 'typos' into 'main'

Typos

See merge request tpo/core/tor!812

15 months agoforward-port the 0.4.8.10 and .11 changelogs
Roger Dingledine [Thu, 18 Apr 2024 13:10:03 +0000 (09:10 -0400)] 
forward-port the 0.4.8.10 and .11 changelogs

15 months agotypos in comments
Roger Dingledine [Thu, 18 Apr 2024 13:04:12 +0000 (09:04 -0400)] 
typos in comments

15 months agofix syntax formatting in man page
Roger Dingledine [Thu, 18 Apr 2024 13:03:51 +0000 (09:03 -0400)] 
fix syntax formatting in man page

15 months agoMerge branch 'typo' into 'main'
David Goulet [Thu, 18 Apr 2024 12:35:09 +0000 (12:35 +0000)] 
Merge branch 'typo' into 'main'

typo

See merge request tpo/core/tor!811

15 months agotypo
trinity-1686a [Wed, 17 Apr 2024 22:17:45 +0000 (00:17 +0200)] 
typo

15 months agocircuit: Remove log_warn triggered by a proto violation
David Goulet [Tue, 16 Apr 2024 15:05:52 +0000 (11:05 -0400)] 
circuit: Remove log_warn triggered by a proto violation

Fixes #40932

Signed-off-by: David Goulet <dgoulet@torproject.org>
15 months agoMerge branch 'count-log-bug' into 'main'
David Goulet [Tue, 16 Apr 2024 15:20:18 +0000 (15:20 +0000)] 
Merge branch 'count-log-bug' into 'main'

also consider LD_BUG logs when counting bug reached

Closes #40924

See merge request tpo/core/tor!805

15 months agoMerge branch 'maint-0.4.8'
David Goulet [Mon, 15 Apr 2024 19:11:30 +0000 (15:11 -0400)] 
Merge branch 'maint-0.4.8'

15 months agoMerge branch 'tor-gitlab/mr/808' into maint-0.4.8
David Goulet [Mon, 15 Apr 2024 19:11:16 +0000 (15:11 -0400)] 
Merge branch 'tor-gitlab/mr/808' into maint-0.4.8

15 months agoconflux: Don't process a closed circuit on get packaged window
David Goulet [Mon, 15 Apr 2024 18:45:29 +0000 (14:45 -0400)] 
conflux: Don't process a closed circuit on get packaged window

Signed-off-by: David Goulet <dgoulet@torproject.org>
15 months agoconflux: Avoid noting a cell was sent on a closed circuit
David Goulet [Mon, 15 Apr 2024 18:24:45 +0000 (14:24 -0400)] 
conflux: Avoid noting a cell was sent on a closed circuit

It turns out that circuit_package_relay_cell() returns 0 in order to drop a
cell but there is a code path, if the circuit queue is full, that also silently
closes the circuit and returns 0.

This lead to Conflux thinking a cell was sent but actually the cell was not and
the circuit was closed leading to the hard assert.

And so this function makes sure that circuit_package_relay_cell() and
append_cell_to_circuit_queue() returns a value that indicate what happened with
the cell and circuit so the caller can make an informed decision with it.

This change makes it that we do NOT enter the Conflux subsystem if the cell is
not queued on the circuit.

Fixes #40921

Signed-off-by: David Goulet <dgoulet@torproject.org>
15 months agorename metric bug_reached to bug_reached_count
trinity-1686a [Sun, 14 Apr 2024 12:58:58 +0000 (14:58 +0200)] 
rename metric bug_reached to bug_reached_count

15 months agoalso consider LD_BUG logs when counting bug reached
trinity-1686a [Sat, 13 Apr 2024 20:15:09 +0000 (22:15 +0200)] 
also consider LD_BUG logs when counting bug reached

16 months agoMerge branch 'maint-0.4.8'
David Goulet [Wed, 10 Apr 2024 19:48:02 +0000 (15:48 -0400)] 
Merge branch 'maint-0.4.8'

16 months agoversion: Bump version to 0.4.8.11-dev
Tor CI Release [Wed, 10 Apr 2024 17:10:15 +0000 (17:10 +0000)] 
version: Bump version to 0.4.8.11-dev

16 months agoMerge branch 'maint-0.4.8'
David Goulet [Wed, 10 Apr 2024 17:06:15 +0000 (13:06 -0400)] 
Merge branch 'maint-0.4.8'

16 months agoversion: Bump version to 0.4.8.11
Tor CI Release [Wed, 10 Apr 2024 16:54:58 +0000 (16:54 +0000)] 
version: Bump version to 0.4.8.11

16 months agoMerge branch 'maint-0.4.8'
David Goulet [Wed, 10 Apr 2024 16:59:04 +0000 (12:59 -0400)] 
Merge branch 'maint-0.4.8'

16 months agofallbackdir: Update list generated on April 10, 2024
Tor CI Release [Wed, 10 Apr 2024 16:54:12 +0000 (16:54 +0000)] 
fallbackdir: Update list generated on April 10, 2024

16 months agoUpdate geoip files to match ipfire location db, 2024/04/10.
Tor CI Release [Wed, 10 Apr 2024 16:53:43 +0000 (16:53 +0000)] 
Update geoip files to match ipfire location db, 2024/04/10.

16 months agoMerge branch 'maint-0.4.8'
David Goulet [Tue, 9 Apr 2024 13:23:47 +0000 (09:23 -0400)] 
Merge branch 'maint-0.4.8'

16 months agodirauth: New keys and address for tor26
David Goulet [Mon, 8 Apr 2024 14:33:54 +0000 (10:33 -0400)] 
dirauth: New keys and address for tor26

Signed-off-by: David Goulet <dgoulet@torproject.org>
16 months agotest: Disable unit test causing issue with nightly package
David Goulet [Wed, 20 Mar 2024 13:23:24 +0000 (09:23 -0400)] 
test: Disable unit test causing issue with nightly package

Signed-off-by: David Goulet <dgoulet@torproject.org>
16 months agoMerge branch 'testing-intro-rot' into 'main'
David Goulet [Thu, 14 Mar 2024 17:41:54 +0000 (17:41 +0000)] 
Merge branch 'testing-intro-rot' into 'main'

hs_service: don't force high intro point rotation for TestingTorNetwork

Closes #40922

See merge request tpo/core/tor!802

16 months agohs_service: don't force high intro point rotation for TestingTorNetwork
Jim Newsome [Tue, 12 Mar 2024 14:16:47 +0000 (09:16 -0500)] 
hs_service: don't force high intro point rotation for TestingTorNetwork

This was previously added to facilitate testing intro point rotation
with chutney. However, the implementation is problematic since it forces
excessive rotation whenever TestingTorNetwork is enabled, and can't be
adjusted or disabled.

Alternatives for testing intro point rotation include:
 * Using shadow to "fast forward" time
 * Overriding the consensus parameters hs_intro_min_lifetime and
   hs_intro_max_lifetime.

Fixes #40922

17 months agoMerge branch 'dont-require-bandwidthcapacity' into 'main'
David Goulet [Tue, 12 Mar 2024 12:51:18 +0000 (12:51 +0000)] 
Merge branch 'dont-require-bandwidthcapacity' into 'main'

In router_is_active, don't require non-zero bandwidthcapacity

Closes #13000 and #40917

See merge request tpo/core/tor!801

17 months agoIn router_is_active, don't require non-zero bandwidthcapacity
Jim Newsome [Thu, 7 Mar 2024 18:32:02 +0000 (12:32 -0600)] 
In router_is_active, don't require non-zero bandwidthcapacity

This check was originally added in 962765a3, with the intent of
preventing relays with 0 measured bandwidth from being listed in the
consensus (part of fixing #13000).

Currently, that decision and other relevant places effectively use
`dirserv_get_credible_bandwidth_kb`, which prefers bwauth-measured
bandwidth over the self-reported `bandwidthcapacity`, making this check
mostly redundant.

i.e. this change should only affect behavior when the relay has uploaded
a descriptor with `bandwidthcapacity=0` *and* we have a non-zero
measured bandwidth, in which case we'll still trust the measured
bandwidth. This is what we want when bootstrapping a network (e.g. for
testing), since it allows us to initialize bandwidths using a bandwidth
authority file.

A relay can still cause `router_is_active` to return false by setting
the hibernate flag.

Also see discussion in #40917.

Fixes #40917.

17 months agoMerge branch 'document-read-until-eof' into 'main'
Alexander Færøy [Wed, 28 Feb 2024 16:56:24 +0000 (16:56 +0000)] 
Merge branch 'document-read-until-eof' into 'main'

make read_file_to_str_until_eof doc more explicit

Closes #40852

See merge request tpo/core/tor!799

17 months agoMerge branch 'maint-0.4.8'
Alexander Færøy [Wed, 28 Feb 2024 16:52:56 +0000 (16:52 +0000)] 
Merge branch 'maint-0.4.8'

17 months agomake read_file_to_str_until_eof doc more explicit
trinity-1686a [Sun, 18 Feb 2024 11:37:59 +0000 (12:37 +0100)] 
make read_file_to_str_until_eof doc more explicit

the sz_out param is set to what was read (i.e not including the final
NULL the function adds for convenience), but could be understood to
be set to what was read+1 (including the NULL terminator)

18 months agoMerge branch 'bug40911' into 'main'
David Goulet [Thu, 8 Feb 2024 19:41:22 +0000 (19:41 +0000)] 
Merge branch 'bug40911' into 'main'

Make two 1-bit fields unsigned

Closes #40911

See merge request tpo/core/tor!796

18 months agoTry to appease the changefile format checker
Sebastian Hahn [Tue, 6 Feb 2024 18:52:44 +0000 (19:52 +0100)] 
Try to appease the changefile format checker

18 months agoMerge branch 'main' into 'main'
Alexander Færøy [Mon, 5 Feb 2024 18:13:24 +0000 (18:13 +0000)] 
Merge branch 'main' into 'main'

Tor docs update

See merge request tpo/core/tor!798

18 months agoTor docs update
Gus [Mon, 5 Feb 2024 18:13:24 +0000 (18:13 +0000)] 
Tor docs update

18 months agoMake two 1-bit fields unsigned
Sebastian Hahn [Thu, 1 Feb 2024 18:45:04 +0000 (19:45 +0100)] 
Make two 1-bit fields unsigned

This should be a completely harmless warning as we only check whether
the fields are true or false.

Closes #40911.

18 months agoUpdate test strings
Sebastian Hahn [Thu, 1 Feb 2024 16:16:17 +0000 (17:16 +0100)] 
Update test strings

18 months agoAdd a changes file
Sebastian Hahn [Thu, 1 Feb 2024 15:45:58 +0000 (16:45 +0100)] 
Add a changes file