]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
14 years agoDon't warn when compiling with --disable-threads
Sebastian Hahn [Tue, 8 Nov 2011 07:09:40 +0000 (08:09 +0100)] 
Don't warn when compiling with --disable-threads

STMT_VOID semantics suggested by nick, thanks!

14 years agoRobert says that this bug was not in fact one of frosty's
Nick Mathewson [Mon, 7 Nov 2011 16:54:54 +0000 (11:54 -0500)] 
Robert says that this bug was not in fact one of frosty's

14 years agoMerge branch 'bug4424' into maint-0.2.2
Nick Mathewson [Mon, 7 Nov 2011 16:47:28 +0000 (11:47 -0500)] 
Merge branch 'bug4424' into maint-0.2.2

14 years agoRemove an extraneous "if" in the 4424 fix
Nick Mathewson [Mon, 7 Nov 2011 16:46:51 +0000 (11:46 -0500)] 
Remove an extraneous "if" in the 4424 fix

14 years agoDon't leak an extend_info_t in rend_client_any_intro_points_usable
Robert Ransom [Mon, 7 Nov 2011 16:35:51 +0000 (08:35 -0800)] 
Don't leak an extend_info_t in rend_client_any_intro_points_usable

14 years agoMerge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2
Nick Mathewson [Mon, 7 Nov 2011 15:42:34 +0000 (10:42 -0500)] 
Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2

14 years agoAdd a changes file for 4410
Sebastian Hahn [Sun, 6 Nov 2011 16:24:09 +0000 (17:24 +0100)] 
Add a changes file for 4410

14 years agoFix remotely triggerable assert during ip decryption
Dan Rosenberg [Sun, 6 Nov 2011 16:23:14 +0000 (17:23 +0100)] 
Fix remotely triggerable assert during ip decryption

Fixes bug 4410.

14 years agoMerge branch 'bug4383_nm' into maint-0.2.2
Nick Mathewson [Thu, 3 Nov 2011 17:23:59 +0000 (13:23 -0400)] 
Merge branch 'bug4383_nm' into maint-0.2.2

14 years agoFix a memleak when fetching descriptors for bridges in ExcludeNodes.
George Kadianakis [Thu, 3 Nov 2011 16:16:31 +0000 (17:16 +0100)] 
Fix a memleak when fetching descriptors for bridges in ExcludeNodes.

14 years agoMerge remote-tracking branch 'erinn/win-bundle-fix' into maint-0.2.2
Nick Mathewson [Mon, 31 Oct 2011 01:28:19 +0000 (21:28 -0400)] 
Merge remote-tracking branch 'erinn/win-bundle-fix' into maint-0.2.2

14 years agoremove absolute path from contrib/package_nsis-mingw.sh in order to make it easier...
Erinn Clark [Mon, 31 Oct 2011 00:52:52 +0000 (00:52 +0000)] 
remove absolute path from contrib/package_nsis-mingw.sh in order to make it easier to automatically build tor expert bundle

14 years agoAdd a changes file for the 4340 fix
Sebastian Hahn [Sat, 29 Oct 2011 09:21:37 +0000 (11:21 +0200)] 
Add a changes file for the 4340 fix

14 years agoDisable stats requiring geoip info if we have none
Sebastian Hahn [Wed, 22 Dec 2010 07:34:41 +0000 (08:34 +0100)] 
Disable stats requiring geoip info if we have none

In other parts of the code we will otherwise attempt to collect these
statistics, and that will lead to crashes.

14 years agoDiscard all cells on a marked connection
Nick Mathewson [Fri, 28 Oct 2011 21:04:15 +0000 (17:04 -0400)] 
Discard all cells on a marked connection

Fix for bug 4299

14 years agoFix typo, spotted by tmpname0901. Thanks!
Sebastian Hahn [Fri, 28 Oct 2011 09:19:16 +0000 (11:19 +0200)] 
Fix typo, spotted by tmpname0901. Thanks!

14 years agobump maint-0.2.2 to 0.2.2.34-dev
Roger Dingledine [Fri, 28 Oct 2011 00:50:48 +0000 (20:50 -0400)] 
bump maint-0.2.2 to 0.2.2.34-dev

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Fri, 28 Oct 2011 00:03:21 +0000 (20:03 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agobump maint to 0.2.1.31
Roger Dingledine [Fri, 28 Oct 2011 00:01:58 +0000 (20:01 -0400)] 
bump maint to 0.2.1.31

14 years agoAdd option to give guard flag to relays without the CVE-2011-2768 fix
Robert Ransom [Tue, 25 Oct 2011 19:33:21 +0000 (12:33 -0700)] 
Add option to give guard flag to relays without the CVE-2011-2768 fix

This way, all of the DA operators can upgrade immediately, without nuking
every client's set of entry guards as soon as a majority of them upgrade.

Until enough guards have upgraded, a majority of dirauths should set this
config option so that there are still enough guards in the network. After
a few days pass, all dirauths should use the default.

14 years agoDon't give the Guard flag to relays without the CVE-2011-2768 fix
Robert Ransom [Tue, 25 Oct 2011 07:24:15 +0000 (00:24 -0700)] 
Don't give the Guard flag to relays without the CVE-2011-2768 fix

14 years agoMake tor_version_same_series non-static
Robert Ransom [Tue, 25 Oct 2011 06:36:57 +0000 (23:36 -0700)] 
Make tor_version_same_series non-static

14 years agoMerge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix
Sebastian Hahn [Wed, 26 Oct 2011 21:30:27 +0000 (23:30 +0200)] 
Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix

Conflicts:
src/or/connection_or.c

14 years agoReject create cells on outgoing OR connections from bridges
Robert Ransom [Sun, 23 Oct 2011 22:21:49 +0000 (15:21 -0700)] 
Reject create cells on outgoing OR connections from bridges

14 years agoMark which OR connections are outgoing
Robert Ransom [Sun, 23 Oct 2011 21:58:00 +0000 (14:58 -0700)] 
Mark which OR connections are outgoing

14 years agoDon't use any OR connection which sent us a CREATE_FAST cell for an EXTEND
Robert Ransom [Sun, 23 Oct 2011 21:27:56 +0000 (14:27 -0700)] 
Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND

Fix suggested by Nick Mathewson.

14 years agoDon't send a certificate chain on outgoing TLS connections from non-relays
Nick Mathewson [Sun, 23 Oct 2011 16:06:06 +0000 (16:06 +0000)] 
Don't send a certificate chain on outgoing TLS connections from non-relays

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 21:14:39 +0000 (17:14 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoRemove the -F option from tor-resolve.
Nick Mathewson [Mon, 23 May 2011 20:59:41 +0000 (16:59 -0400)] 
Remove the -F option from tor-resolve.

It used to mean "Force": it would tell tor-resolve to ask tor to
resolve an address even if it ended with .onion.  But when
AutomapHostsOnResolve was added, automatically refusing to resolve
.onion hosts stopped making sense.  So in 0.2.1.16-rc (commit
298dc95dfd8), we made tor-resolve happy to resolve anything.

The -F option stayed in, though, even though it didn't do anything.
Oddly, it never got documented.

Found while fixing GCC 4.6 "set, unused variable" warnings.

14 years agomanually backport a5232e0c4c
Roger Dingledine [Wed, 26 Oct 2011 21:11:52 +0000 (17:11 -0400)] 
manually backport a5232e0c4c

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 20:34:45 +0000 (16:34 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agostop asserting at boot
Roger Dingledine [Tue, 31 May 2011 03:50:37 +0000 (23:50 -0400)] 
stop asserting at boot

The patch for 3228 made us try to run init_keys() before we had loaded
our state file, resulting in an assert inside init_keys. We had moved
it too early in the function.

Now it's later in the function, but still above the accounting calls.

14 years agoReinit keys at the start of options_act().
Nick Mathewson [Mon, 23 May 2011 20:38:35 +0000 (16:38 -0400)] 
Reinit keys at the start of options_act().

Previously we did this nearer to the end (in the old_options &&
transition_affects_workers() block).  But other stuff cares about
keys being consistent with options... particularly anything which
tries to access a key, which can die in assert_identity_keys_ok().

Fixes bug 3228; bugfix on 0.2.2.18-alpha.

Conflicts:

src/or/config.c

14 years agoDon't crash a bridge authority on SIGHUP if it's not in the consensus
Robert Ransom [Wed, 16 Feb 2011 12:12:37 +0000 (04:12 -0800)] 
Don't crash a bridge authority on SIGHUP if it's not in the consensus

Fixes bug 2572.

14 years agoFix assert for relay/bridge state change
Sebastian Hahn [Tue, 25 Jan 2011 14:28:58 +0000 (15:28 +0100)] 
Fix assert for relay/bridge state change

When we added support for separate client tls certs on bridges in
a2bb0bfdd5 we forgot to correctly initialize this when changing
from relay to bridge or vice versa while Tor is running. Fix that
by always initializing keys when the state changes.

Fixes bug 2433.

Conflicts:

src/or/config.c

14 years agoMerge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2
Nick Mathewson [Wed, 26 Oct 2011 15:07:28 +0000 (11:07 -0400)] 
Merge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2

14 years agoDon't crash when accountingmax is set in non-server Tors
Nick Mathewson [Fri, 3 Dec 2010 18:37:13 +0000 (13:37 -0500)] 
Don't crash when accountingmax is set in non-server Tors

We use a hash of the identity key to seed a prng to tell when an
accounting period should end.  But thanks to the bug998 changes,
clients no longer have server-identity keys to use as a long-term seed
in accounting calculations.  In any case, their identity keys (as used
in TLS) were never never fixed.  So we can just set the wakeup time
from a random seed instead there.  Still open is whether everybody
should be random.

This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha.

Diagnosed with help from boboper on irc.

14 years agoProperly refcount client_identity_key
Sebastian Hahn [Tue, 26 Oct 2010 16:22:04 +0000 (18:22 +0200)] 
Properly refcount client_identity_key

In a2bb0bf we started using a separate client identity key. When we are
in "public server mode" (that means not a bridge) we will use the same
key. Reusing the key without doing the proper refcounting leads to a
segfault on cleanup during shutdown. Fix that.

Also introduce an assert that triggers if our refcount falls below 0.
That should never happen.

14 years agoAdd some asserts to get_{tlsclient|server}_identity_key
Nick Mathewson [Thu, 21 Oct 2010 17:54:12 +0000 (13:54 -0400)] 
Add some asserts to get_{tlsclient|server}_identity_key

We now require that:
  - Only actual servers should ever call get_server_identity_key
  - If you're being a client or bridge, the client and server keys should
    differ.
  - If you're being a public relay, the client and server keys
    should be the same.

14 years agoRename get_client_identity_key to get_tlsclient_identity_key
Nick Mathewson [Thu, 21 Oct 2010 17:53:31 +0000 (13:53 -0400)] 
Rename get_client_identity_key to get_tlsclient_identity_key

14 years agoMaintain separate server and client identity keys when appropriate.
Robert Ransom [Mon, 4 Oct 2010 05:38:53 +0000 (22:38 -0700)] 
Maintain separate server and client identity keys when appropriate.

Fixes a bug described in ticket #988.

Conflicts:

src/or/main.c
src/or/router.c

14 years agoMake crypto_free_pk_env tolerate NULL arg in 0.2.1. Error-proofing against bug 988...
Nick Mathewson [Sat, 13 Nov 2010 01:21:50 +0000 (20:21 -0500)] 
Make crypto_free_pk_env tolerate NULL arg in 0.2.1.  Error-proofing against bug 988 backport

14 years agoMaintain separate server and client TLS contexts.
Robert Ransom [Mon, 4 Oct 2010 01:14:08 +0000 (18:14 -0700)] 
Maintain separate server and client TLS contexts.

Fixes bug #988.

Conflicts:

src/or/main.c
src/or/router.c

14 years agoRefactor tor_tls_context_new:
Robert Ransom [Fri, 1 Oct 2010 21:06:57 +0000 (14:06 -0700)] 
Refactor tor_tls_context_new:

* Make tor_tls_context_new internal to tortls.c, and return the new
  tor_tls_context_t from it.

* Add a public tor_tls_context_init wrapper function to replace it.

Conflicts:

src/or/main.c
src/or/router.c

14 years agoAdd public_server_mode function.
Robert Ransom [Fri, 1 Oct 2010 07:07:10 +0000 (00:07 -0700)] 
Add public_server_mode function.

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 11:47:42 +0000 (07:47 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoFix zlib macro brokenness on osx with zlib 1.2.4 and higher.
Nick Mathewson [Tue, 8 Jun 2010 22:10:20 +0000 (18:10 -0400)] 
Fix zlib macro brokenness on osx with zlib 1.2.4 and higher.

From the code:
   zlib 1.2.4 and 1.2.5 do some "clever" things with macros.  Instead of
   saying "(defined(FOO) ? FOO : 0)" they like to say "FOO-0", on the theory
   that nobody will care if the compile outputs a no-such-identifier warning.

   Sorry, but we like -Werror over here, so I guess we need to define these.
   I hope that zlib 1.2.6 doesn't break these too.

Possible fix for bug 1526.

14 years agounmangle the fingerprint example in the man page
Roger Dingledine [Tue, 25 Oct 2011 22:24:37 +0000 (18:24 -0400)] 
unmangle the fingerprint example in the man page

Remove a confusing dollar sign from the example fingerprint in the
man page, and also make example fingerprint a valid one.

14 years agoMerge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2
Nick Mathewson [Thu, 20 Oct 2011 04:01:58 +0000 (00:01 -0400)] 
Merge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2

14 years agoFix crash when changing node restrictions with DNS lookup in progress
Nick Mathewson [Thu, 20 Oct 2011 03:14:05 +0000 (23:14 -0400)] 
Fix crash when changing node restrictions with DNS lookup in progress

Fixes bug 4259, bugfix on 0.2.2.25-alpha.  Bugfix by "Tey'".

Original message by submitter:

  Changing nodes restrictions using a controller while Tor is doing
  DNS resolution could makes Tor crashes (on WinXP at least). The
  problem can be repeated by trying to reach a non-existent domain
  using Tor:

    curl --socks4a 127.0.0.1:9050 inexistantdomain.ext

  .. and changing the ExitNodes parameter through the control port
  before Tor returns a DNS resolution error (of course, the following
  command won't work directly if the control port is password
  protected):

    echo SETCONF ExitNodes=TinyTurtle | nc -v 127.0.0.1 9051

  Using a non-existent domain is needed to repeat the issue so that
  Tor takes a few seconds for resolving the domain (which allows us to
  change the configuration). Tor will crash while processing the
  configuration change.

  The bug is located in the addressmap_clear_excluded_trackexithosts
  method which iterates over the entries of the addresses map in order
  to check whether the changes made to the configuration will impact
  those entries. When a DNS resolving is in progress, the new_adress
  field of the associated entry will be set to NULL. The method
  doesn't expect this field to be NULL, hence the crash.

14 years agoFree rend_data and intro_key when extra intro circs become general-purpose
Robert Ransom [Tue, 18 Oct 2011 14:08:02 +0000 (07:08 -0700)] 
Free rend_data and intro_key when extra intro circs become general-purpose

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Thu, 13 Oct 2011 14:14:16 +0000 (10:14 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoUpdate to the October 2011 GeoIP database.
Karsten Loesing [Thu, 13 Oct 2011 05:43:47 +0000 (07:43 +0200)] 
Update to the October 2011 GeoIP database.

14 years agoUpdate documentation comment for rend_client_reextend_intro_circuit
Robert Ransom [Mon, 10 Oct 2011 12:33:53 +0000 (05:33 -0700)] 
Update documentation comment for rend_client_reextend_intro_circuit

One of its callers assumes a non-zero result indicates a permanent failure
(i.e. the current attempt to connect to this HS either has failed or is
 doomed).  The other caller only requires that this function's result
never equal -2.

Bug reported by Sebastian Hahn.

14 years agoDon't launch a useless circuit in rend_client_reextend_intro_circuit
Robert Ransom [Mon, 10 Oct 2011 03:24:27 +0000 (20:24 -0700)] 
Don't launch a useless circuit in rend_client_reextend_intro_circuit

Fixes bug 4212.  Bug reported by katmagic and found by Sebastian.

14 years agoNote ticket and source version for feature3951 in changes file
Nick Mathewson [Fri, 7 Oct 2011 20:47:43 +0000 (16:47 -0400)] 
Note ticket and source version for feature3951 in changes file

14 years agoMerge remote-tracking branch 'karsten/feature3951' into maint-0.2.2
Nick Mathewson [Fri, 7 Oct 2011 20:46:50 +0000 (16:46 -0400)] 
Merge remote-tracking branch 'karsten/feature3951' into maint-0.2.2

14 years agoAvoid running DNS self-tests if we're operating as a bridge
warms0x [Fri, 7 Oct 2011 07:04:29 +0000 (07:04 +0000)] 
Avoid running DNS self-tests if we're operating as a bridge

14 years agoMake internal error check for unrecognized digest algorithm more robust
Nick Mathewson [Thu, 6 Oct 2011 17:02:50 +0000 (13:02 -0400)] 
Make internal error check for unrecognized digest algorithm more robust

Fixes Coverity CID 479.

14 years agoCheck return of init_keys() ip_address_changed: fix Coverity CID 484
Nick Mathewson [Thu, 6 Oct 2011 16:59:25 +0000 (12:59 -0400)] 
Check return of init_keys() ip_address_changed: fix Coverity CID 484

14 years agoTurn on directory request statistics by default.
Karsten Loesing [Tue, 9 Nov 2010 13:18:00 +0000 (14:18 +0100)] 
Turn on directory request statistics by default.

Change the default values for collecting directory request statistics and
inlcuding them in extra-info descriptors to 1.

Don't break if we are configured to collect directory request or entry
statistics and don't have a GeoIP database. Instead, print out a notice
and skip initializing the affected statistics code.

This is the cherry-picked 499661524b0a572303087af721325608dd91f7ce.

14 years agoLooks like Windows version 6.2 will be Windows 8
Sebastian Hahn [Sat, 1 Oct 2011 12:44:39 +0000 (14:44 +0200)] 
Looks like Windows version 6.2 will be Windows 8

Thanks to funkstar for the report

14 years agobridges should use create_fast cells for their own circuits
Roger Dingledine [Wed, 28 Sep 2011 19:35:27 +0000 (15:35 -0400)] 
bridges should use create_fast cells for their own circuits

fixes bug 4124, as noticed in bug 4115

14 years agobug 4115: make bridges use begindir for their dir fetches
Roger Dingledine [Wed, 28 Sep 2011 18:50:43 +0000 (14:50 -0400)] 
bug 4115: make bridges use begindir for their dir fetches

removes another avenue for enumerating bridges.

14 years agotrivial whitespace changes, take two
Roger Dingledine [Sun, 25 Sep 2011 02:46:21 +0000 (22:46 -0400)] 
trivial whitespace changes, take two

14 years agoTrivial whitespace fixes
Nick Mathewson [Sun, 25 Sep 2011 02:15:59 +0000 (22:15 -0400)] 
Trivial whitespace fixes

14 years agoAdd a changes file for Tom Lowenthal's patch for #4063
Nick Mathewson [Sun, 25 Sep 2011 02:15:13 +0000 (22:15 -0400)] 
Add a changes file for Tom Lowenthal's patch for #4063

14 years agoTicket #4063 - change circuit build timeout log entries from NOTICE to INFO
Tom Lowenthal [Sat, 24 Sep 2011 22:34:32 +0000 (15:34 -0700)] 
Ticket #4063 - change circuit build timeout log entries from NOTICE to INFO

14 years agochanges file for bug 4059
Nick Mathewson [Tue, 20 Sep 2011 13:56:26 +0000 (09:56 -0400)] 
changes file for bug 4059

14 years agoFix a potentially useless integer overflow check.
Mansour Moufid [Tue, 20 Sep 2011 01:25:23 +0000 (21:25 -0400)] 
Fix a potentially useless integer overflow check.

GCC 4.2 and maybe other compilers optimize away unsigned integer
overflow checks of the form (foo + bar < foo), for all bar.

Fix one such check in `src/common/OpenBSD_malloc_Linux.c'.

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Thu, 15 Sep 2011 20:34:47 +0000 (16:34 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoUpdate to the September 2011 GeoIP database.
Karsten Loesing [Mon, 12 Sep 2011 09:40:26 +0000 (11:40 +0200)] 
Update to the September 2011 GeoIP database.

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Tue, 13 Sep 2011 22:27:13 +0000 (18:27 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

Conflicts:
src/or/main.c
src/or/router.c

14 years agoGenerate our ssl session certs with a plausible lifetime
Roger Dingledine [Tue, 13 Sep 2011 22:24:45 +0000 (18:24 -0400)] 
Generate our ssl session certs with a plausible lifetime

Nobody but Tor uses certs on the wire with 2 hour lifetimes,
and it makes us stand out. Resolves ticket 4014.

14 years agoUpdate to the September 2011 GeoIP database.
Karsten Loesing [Mon, 12 Sep 2011 09:40:26 +0000 (11:40 +0200)] 
Update to the September 2011 GeoIP database.

14 years agoDemote 'INTRODUCE2 cell is too {old,new}' message to info level
Robert Ransom [Sun, 11 Sep 2011 01:40:09 +0000 (21:40 -0400)] 
Demote 'INTRODUCE2 cell is too {old,new}' message to info level

14 years agoDemote HS 'replay detected' log message for DH public keys to info level
Robert Ransom [Sun, 11 Sep 2011 00:54:26 +0000 (20:54 -0400)] 
Demote HS 'replay detected' log message for DH public keys to info level

14 years agoDescribe rend_service_descriptor_t more completely
Robert Ransom [Sat, 10 Sep 2011 23:09:01 +0000 (19:09 -0400)] 
Describe rend_service_descriptor_t more completely

14 years agoDescribe rend_intro_point_t more completely
Robert Ransom [Sat, 10 Sep 2011 23:05:53 +0000 (19:05 -0400)] 
Describe rend_intro_point_t more completely

14 years agoFix log message typo.
Robert Ransom [Sat, 10 Sep 2011 20:15:52 +0000 (16:15 -0400)] 
Fix log message typo.

14 years agoMerge remote-tracking branch 'public/gcc-295-fix' into maint-0.2.2
Nick Mathewson [Fri, 9 Sep 2011 16:54:27 +0000 (12:54 -0400)] 
Merge remote-tracking branch 'public/gcc-295-fix' into maint-0.2.2

14 years agoMerge remote-tracking branch 'public/enhance_replay_detection' into maint-0.2.2
Nick Mathewson [Fri, 9 Sep 2011 16:53:45 +0000 (12:53 -0400)] 
Merge remote-tracking branch 'public/enhance_replay_detection' into maint-0.2.2

14 years agoCheck for replays in PK-encrypted part of intro cell, not just in the g^x value
Nick Mathewson [Wed, 11 May 2011 01:40:10 +0000 (21:40 -0400)] 
Check for replays in PK-encrypted part of intro cell, not just in the g^x value

14 years agoAdd changes file for bsd4 fixes
Nick Mathewson [Fri, 9 Sep 2011 14:40:54 +0000 (10:40 -0400)] 
Add changes file for bsd4 fixes

14 years agoMerge remote-tracking branch 'public/bug2649_squashed' into maint-0.2.2
Nick Mathewson [Wed, 7 Sep 2011 18:43:06 +0000 (14:43 -0400)] 
Merge remote-tracking branch 'public/bug2649_squashed' into maint-0.2.2

14 years agoLook for correct "ar" to cross-compile
Nick Mathewson [Fri, 2 Sep 2011 15:51:49 +0000 (11:51 -0400)] 
Look for correct "ar" to cross-compile

For some reason, autoconf doesn't by default have an "AC_PROG_AR" for
this -- possibly it's assumed that any "ar" you have will work
everyplace.

Fixes bug 3909; found by sid77.

This fixes a build issue first present in fdbdb4dc1500, but the bug
(of not using a correct ar) has been in every Tor version ever: it
just didn't matter until then.

14 years agoFix assertion in addressmap_clear_excluded_trackexithosts
Nick Mathewson [Wed, 7 Sep 2011 00:26:20 +0000 (20:26 -0400)] 
Fix assertion in addressmap_clear_excluded_trackexithosts

Fixes bug 3923; bugfix on 0.2.2.25-alpha; bugfix from 'laruldan' on trac.

14 years agoCorrect man page: multiple control auth styles can be set at once
Roger Dingledine [Fri, 2 Sep 2011 11:01:55 +0000 (07:01 -0400)] 
Correct man page: multiple control auth styles can be set at once

14 years agoCheck for lround with autoconf; fall back to rint.
Nick Mathewson [Wed, 31 Aug 2011 02:22:15 +0000 (22:22 -0400)] 
Check for lround with autoconf; fall back to rint.

14 years agoFix a compilation issue on older FreeBSDs
Sebastian Hahn [Wed, 31 Aug 2011 00:45:49 +0000 (20:45 -0400)] 
Fix a compilation issue on older FreeBSDs

14 years agoUse %f with printf-style formatting, not %lf
Nick Mathewson [Wed, 31 Aug 2011 00:42:51 +0000 (20:42 -0400)] 
Use %f with printf-style formatting, not %lf

For printf, %f and %lf are synonymous, since floats are promoted to
doubles when passed as varargs.  It's only for scanf that we need to
say "%lf" for doubles and "%f" for floats.

Apparenly, some older compilers think it's naughty to say %lf and like
to spew warnings about it.

Found by grarpamp.

14 years agoSwitch a SMARTLIST_FOREACH in circuitbuild.c to BEGIN/END
Nick Mathewson [Wed, 31 Aug 2011 00:35:17 +0000 (20:35 -0400)] 
Switch a SMARTLIST_FOREACH in circuitbuild.c to BEGIN/END

It had some cpp stuff inside, and older GCCs don't like preprocessor
directives inside macro arguments.

Found by grarpamp.

14 years agoMention that HiddenServiceDir must exist
Sebastian Hahn [Thu, 25 Aug 2011 20:26:54 +0000 (22:26 +0200)] 
Mention that HiddenServiceDir must exist

14 years agolround() missing in MSVC
Gisle Vanem [Wed, 24 Aug 2011 17:52:44 +0000 (13:52 -0400)] 
lround() missing in MSVC

lround() is missing in MS Visual-C's <math.h>. Not available anywhere.
Here is an easy patch.

14 years agoDon't write ControlPorts to disk till after we setuid and make datadir
Nick Mathewson [Wed, 17 Aug 2011 15:22:16 +0000 (11:22 -0400)] 
Don't write ControlPorts to disk till after we setuid and make datadir

Fix for bug 3747; bugfix on 0.2.2.26-beta.

14 years agoRemove extra quotation marks around the result of esc_for_log
Robert Ransom [Mon, 15 Aug 2011 11:53:11 +0000 (04:53 -0700)] 
Remove extra quotation marks around the result of esc_for_log

14 years agoIgnore deprecation warnings on OS X
Sebastian Hahn [Wed, 10 Aug 2011 17:22:41 +0000 (19:22 +0200)] 
Ignore deprecation warnings on OS X

Starting with Lion, Apple decided to deprecate the system openssl. We
can start requiring users to install their own openssl once OS X doesn't
ship with it anymore.

14 years agoMerge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2
Nick Mathewson [Mon, 8 Aug 2011 21:21:21 +0000 (17:21 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.1' into maint-0.2.2

14 years agoUpdate to the August 2011 GeoIP database.
Karsten Loesing [Mon, 8 Aug 2011 14:57:01 +0000 (16:57 +0200)] 
Update to the August 2011 GeoIP database.

14 years agoCheck return value in fmt_addr
Nick Mathewson [Wed, 20 Jul 2011 17:16:06 +0000 (13:16 -0400)] 
Check return value in fmt_addr

Previously, if tor_addr_to_str() returned NULL, we would reuse the
last value returned by fmt_addr().  (This could happen if we were
erroneously asked to format an AF_UNSPEC address.)  Now instead we
return "???".