]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
6 years agoMerge branch 'tor-github/pr/1022'
David Goulet [Thu, 23 May 2019 13:50:28 +0000 (09:50 -0400)] 
Merge branch 'tor-github/pr/1022'

6 years agoMerge branch 'tor-github/pr/1034'
David Goulet [Thu, 23 May 2019 13:40:07 +0000 (09:40 -0400)] 
Merge branch 'tor-github/pr/1034'

6 years agoMerge branch 'tor-github/pr/988'
David Goulet [Thu, 23 May 2019 13:30:36 +0000 (09:30 -0400)] 
Merge branch 'tor-github/pr/988'

6 years agoNow this repository is full of 0.4.1.1-alpha-dev
Nick Mathewson [Wed, 22 May 2019 22:07:29 +0000 (18:07 -0400)] 
Now this repository is full of 0.4.1.1-alpha-dev

6 years agocircuitpadding tests: Use tt_i64_op() to compare int64_t values tor-0.4.1.1-alpha
Nick Mathewson [Wed, 22 May 2019 19:19:24 +0000 (15:19 -0400)] 
circuitpadding tests: Use tt_i64_op() to compare int64_t values

Bug not in any released Tor.

6 years agoMore 0.4.1.1-alpha hangelogs edits
Nick Mathewson [Wed, 22 May 2019 17:57:34 +0000 (13:57 -0400)] 
More 0.4.1.1-alpha hangelogs edits

(credit to seborn here)

6 years agoFold last entry into changelog
Nick Mathewson [Wed, 22 May 2019 16:00:20 +0000 (12:00 -0400)] 
Fold last entry into changelog

6 years agoBump to 0.4.1.1-alpha
Nick Mathewson [Wed, 22 May 2019 15:56:02 +0000 (11:56 -0400)] 
Bump to 0.4.1.1-alpha

6 years agoMerge remote-tracking branch 'dgoulet/ticket30454_035_01'
Nick Mathewson [Wed, 22 May 2019 15:50:46 +0000 (11:50 -0400)] 
Merge remote-tracking branch 'dgoulet/ticket30454_035_01'

6 years agoMerge branch 'ticket30428_041_02_squashed'
Nick Mathewson [Wed, 22 May 2019 15:48:43 +0000 (11:48 -0400)] 
Merge branch 'ticket30428_041_02_squashed'

6 years agosendme: Add non fatal asserts for extra safety
David Goulet [Wed, 22 May 2019 15:05:36 +0000 (11:05 -0400)] 
sendme: Add non fatal asserts for extra safety

Two non fatal asserts are added in this commit. First one is to see if the
SENDME digest list kept on the circuit for validation ever grows bigger than
the maximum number of expected SENDME on a circuit (currently 10).

The second one is to know if we ever send more than one SENDME at a time on a
circuit. In theory, we shouldn't but if we ever do, the v1 implementation
wouldn't work because we only keep one single cell digest (the previous cell
to the SENDME) on the circuit/cpath. Thus, sending two SENDME consecutively
will lead to a mismatch on the other side because the same cell digest would
be use and thus the circuit would collapse.

Finally, add an extra debug log in case we emit a v0 which also includes the
consensus emit version in that case.

Part of #30428

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agosendme: Always pop last SENDME digest from circuit
David Goulet [Wed, 22 May 2019 14:37:27 +0000 (10:37 -0400)] 
sendme: Always pop last SENDME digest from circuit

We must not accumulate digests on the circuit if the other end point is using
another SENDME version that is not using those digests like v0.

This commit makes it that we always pop the digest regardless of the version.

Part of #30428

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agosendme: Clarify how sendme_circuit_cell_is_next() works
David Goulet [Tue, 21 May 2019 19:19:30 +0000 (15:19 -0400)] 
sendme: Clarify how sendme_circuit_cell_is_next() works

Commit 4ef8470fa5480d3b was actually reverted before because in the end we
needed to do this minus 1 check on the window.

This commit clarifies that in the code, takes the useful comment changes from
4ef8470fa5480d3b and makes sendme_circuit_cell_is_next() private since it
behaves in a very specific way that one external caller might expect.

Part of #30428.

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agosendme: Properly record SENDMEs on both edges
David Goulet [Wed, 15 May 2019 14:16:05 +0000 (10:16 -0400)] 
sendme: Properly record SENDMEs on both edges

Turns out that we were only recording the "b_digest" but to have
bidirectionnal authenticated SENDMEs, we need to use the "f_digest" in the
forward cell situation.

Because of the cpath refactoring, this commit plays with the crypt_path_ and
relay_crypto_t API a little bit in order to respect the abstractions.

Previously, we would record the cell digest as the SENDME digest in the
decrypt cell function but to avoid code duplication (both directions needs to
record), we now do that right after iff the cell is recognized (at the edge).
It is now done in circuit_receive_relay_cell() instead.

We now also record the cell digest as the SENDME digest in both relay cell
encryption functions since they are split depending on the direction.
relay_encrypt_cell_outbound() and relay_encrypt_cell_inbound() need to
consider recording the cell digest depending on their direction (f vs b
digest).

Fixes #30428

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agosendme: Never fallback to v0 if unknown version
David Goulet [Tue, 7 May 2019 13:44:10 +0000 (09:44 -0400)] 
sendme: Never fallback to v0 if unknown version

There was a missing cell version check against our max supported version. In
other words, we do not fallback to v0 anymore in case we do know the SENDME
version.

We can either handle it or not, never fallback to the unauthenticated version
in order to avoid gaming the authenticated logic.

Add a unit tests making sure we properly test that and also test that we can
always handle the default emit and accepted versions.

Fixes #30428

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agosendme: Validate v1 SENDMEs on both client and exit side
David Goulet [Tue, 7 May 2019 13:19:41 +0000 (09:19 -0400)] 
sendme: Validate v1 SENDMEs on both client and exit side

The validation of the SENDME cell is now done as the very first thing when
receiving it for both client and exit. On failure to validate, the circuit is
closed as detailed in the specification.

Part of #30428

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agosendme: Record cell digest on both client and exit
David Goulet [Tue, 7 May 2019 13:16:39 +0000 (09:16 -0400)] 
sendme: Record cell digest on both client and exit

It turns out that only the exit side is validating the authenticated SENDME v1
logic and never the client side. Which means that if a client ever uploaded
data towards an exit, the authenticated SENDME logic wouldn't apply.

For this to work, we have to record the cell digest client side as well which
introduced a new function that supports both type of edges.

This also removes a test that is not valid anymore which was that we didn't
allow cell recording on an origin circuit (client).

Part of #30428

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agoMerge remote-tracking branch 'nickm/ticket30454_034_01_squashed' into ticket30454_035_01
David Goulet [Wed, 22 May 2019 15:43:55 +0000 (11:43 -0400)] 
Merge remote-tracking branch 'nickm/ticket30454_034_01_squashed' into ticket30454_035_01

6 years agoEdit changelog entries for clarity and conciseness
Nick Mathewson [Wed, 22 May 2019 15:06:37 +0000 (11:06 -0400)] 
Edit changelog entries for clarity and conciseness

6 years agolight movement and editing on changelog
Nick Mathewson [Tue, 21 May 2019 23:18:58 +0000 (19:18 -0400)] 
light movement and editing on changelog

6 years agoIn microdesc_cache_reload(), set journal length to length of string we read
rl1987 [Fri, 17 May 2019 16:44:45 +0000 (19:44 +0300)] 
In microdesc_cache_reload(), set journal length to length of string we read

Hopefully this will fix CID 1444769.

6 years agohs: Remove hs_cell_onion_key_type_t enum
David Goulet [Wed, 15 May 2019 19:30:29 +0000 (15:30 -0400)] 
hs: Remove hs_cell_onion_key_type_t enum

Unify this with the trunnel ABI so we don't duplicate.

Part of #30454

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agotrunnel: Remove INTRODUCE1 status code IN statement
David Goulet [Wed, 15 May 2019 19:27:27 +0000 (15:27 -0400)] 
trunnel: Remove INTRODUCE1 status code IN statement

We want to support parsing a cell with unknown status code so we are forward
compatible.

Part of #30454

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agohs: Add changes file for #30454
David Goulet [Thu, 9 May 2019 17:23:14 +0000 (13:23 -0400)] 
hs: Add changes file for #30454

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agohs: Remove hs_intro_auth_key_type_t enum
David Goulet [Thu, 9 May 2019 17:09:44 +0000 (13:09 -0400)] 
hs: Remove hs_intro_auth_key_type_t enum

Like the previous commit about the INTRODUCE_ACK status code, change all auth
key type to use the one defined in the trunnel file.

Standardize the use of these auth type to a common ABI.

Part of #30454

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agohs: Get rid of duplicate hs_cell_introd_ack_status_t
David Goulet [Thu, 9 May 2019 17:01:15 +0000 (13:01 -0400)] 
hs: Get rid of duplicate hs_cell_introd_ack_status_t

This enum was the exact same as hs_intro_ack_status_t that was removed at the
previous commit. It was used client side when parsing the INTRODUCE_ACK cell.

Now, the entire code dealing with the INTRODUCE_ACK cell (both sending and
receiving) have been modified to all use the same ABI defined in the trunnel
introduce1 file.

Finally, the client will default to the normal behavior when receiving an
unknown NACK status code which is to note down that we've failed and re-extend
to the next intro point. This way, unknown status code won't trigger a
different behavior client side.

Part of #30454.

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agohs: Define INTRODUCE_ACK status code in trunnel
David Goulet [Thu, 9 May 2019 16:55:52 +0000 (12:55 -0400)] 
hs: Define INTRODUCE_ACK status code in trunnel

Remove the hs_intro_ack_status_t enum and move the value into trunnel. Only
use these values from now on in the intro point code.

Interestingly enough, the client side also re-define these values in hs_cell.h
with the hs_cell_introd_ack_status_t enum. Next commit will fix that and force
to use the trunnel ABI.

Part of #30454

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agoDon't forget to use the mutex in testing_enable_prefilled_rng()
rl1987 [Mon, 6 May 2019 14:21:11 +0000 (17:21 +0300)] 
Don't forget to use the mutex in testing_enable_prefilled_rng()

6 years agoInitial changelog draft for 0.4.1.1-alpha (mostly automated)
Nick Mathewson [Fri, 17 May 2019 14:12:07 +0000 (10:12 -0400)] 
Initial changelog draft for 0.4.1.1-alpha (mostly automated)

6 years agoOOM-purge the DNS cache one part at a time
Nick Mathewson [Fri, 17 May 2019 14:03:41 +0000 (10:03 -0400)] 
OOM-purge the DNS cache one part at a time

Previously we purged it in 1-hour increments -- but one-hour is the
maximum TTL for the cache!  Now we do it in 25%-TTL increments.

Fixes bug 29617; bugfix on 0.3.5.1-alpha.

6 years agoMerge remote-tracking branch 'tor-github/pr/1033'
Nick Mathewson [Fri, 17 May 2019 12:18:20 +0000 (08:18 -0400)] 
Merge remote-tracking branch 'tor-github/pr/1033'

6 years agoMerge branch 'maint-0.4.0'
Nick Mathewson [Fri, 17 May 2019 12:10:17 +0000 (08:10 -0400)] 
Merge branch 'maint-0.4.0'

6 years agoMerge branch 'maint-0.3.4' into maint-0.3.5
Nick Mathewson [Fri, 17 May 2019 12:10:16 +0000 (08:10 -0400)] 
Merge branch 'maint-0.3.4' into maint-0.3.5

6 years agoMerge branch 'maint-0.3.5' into maint-0.4.0
Nick Mathewson [Fri, 17 May 2019 12:10:16 +0000 (08:10 -0400)] 
Merge branch 'maint-0.3.5' into maint-0.4.0

6 years agoMerge branch 'maint-0.2.9' into maint-0.3.4 maint-0.3.4
Nick Mathewson [Fri, 17 May 2019 12:10:15 +0000 (08:10 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.4

6 years agoUpdate geoip and geoip6 to the May 13 2019 database.
Karsten Loesing [Fri, 17 May 2019 06:52:13 +0000 (08:52 +0200)] 
Update geoip and geoip6 to the May 13 2019 database.

6 years agoYes, these functions really do have to be this long.
Mike Perry [Thu, 16 May 2019 20:29:09 +0000 (20:29 +0000)] 
Yes, these functions really do have to be this long.

6 years agoChanges file.
Mike Perry [Thu, 16 May 2019 20:25:25 +0000 (20:25 +0000)] 
Changes file.

6 years agoRefactor rend machines, stage 2/2: Move histogram code.
Mike Perry [Thu, 16 May 2019 19:42:45 +0000 (19:42 +0000)] 
Refactor rend machines, stage 2/2: Move histogram code.

Comment clarifications now that the code is seperated. It's the same code, but
its doing this for different reasons on each side.

6 years agoRefactor rend machines, stage 1/2: Move state transition code.
Mike Perry [Thu, 16 May 2019 19:30:42 +0000 (19:30 +0000)] 
Refactor rend machines, stage 1/2: Move state transition code.

6 years agoRefactor intro machines, stage 2/2: Move histogram code.
Mike Perry [Thu, 16 May 2019 19:17:31 +0000 (19:17 +0000)] 
Refactor intro machines, stage 2/2: Move histogram code.

The client side had garbage histograms and deadcode here, too. That code has
been removed.

The tests have also been updated to properly test the intro circ by sending
padding from the relay side to the client, and verifying that both shut down
when padding was up. (The tests previously erroneously tested only the client
side of intro circs, which actually were supposed to be doing nothing).

6 years agoRefactor intro machines, stage 1/2: Move state transition code.
Mike Perry [Thu, 16 May 2019 18:41:21 +0000 (18:41 +0000)] 
Refactor intro machines, stage 1/2: Move state transition code.

This just moves the state transition directives into the proper client/relay
side functions. It also allows us to remove some dead-code from the client
side (since the client doesn't send padding).

6 years agoImprove logging around the circpad module..
George Kadianakis [Thu, 28 Mar 2019 13:38:33 +0000 (15:38 +0200)] 
Improve logging around the circpad module..

- Add some more useful logs for future debugging.

- Stop usage of circpad_state_to_string(). It's innacurate.

- Reduce severity and fix up log domain of some logging messages.

6 years agoAdd unittests for the new machines.
George Kadianakis [Thu, 28 Mar 2019 13:39:08 +0000 (15:39 +0200)] 
Add unittests for the new machines.

6 years agoAdd client-side onion service circuit hiding machines.
George Kadianakis [Thu, 16 May 2019 11:02:16 +0000 (14:02 +0300)] 
Add client-side onion service circuit hiding machines.

6 years agoCorrectly handle machines out of tokens that have not closed yet.
George Kadianakis [Wed, 17 Apr 2019 10:23:23 +0000 (13:23 +0300)] 
Correctly handle machines out of tokens that have not closed yet.

Perhaps the machine on the other side is still not done.

6 years agoIntroduce circpad free_all() function.
George Kadianakis [Wed, 17 Apr 2019 11:52:51 +0000 (14:52 +0300)] 
Introduce circpad free_all() function.

6 years agoGenerate non-padding circpad events for PADDING_NEGOTIATE(D).
George Kadianakis [Fri, 12 Apr 2019 20:42:46 +0000 (23:42 +0300)] 
Generate non-padding circpad events for PADDING_NEGOTIATE(D).

As part of our machines, we need to know when a PADDING_NEGOATIATE(D) cell gets
sent out, so we add an event for this.

6 years agoMake register_padding_machine part of the public API.
George Kadianakis [Wed, 20 Mar 2019 15:41:10 +0000 (17:41 +0200)] 
Make register_padding_machine part of the public API.

We are gonna use this function to register our new machine.

6 years agoBehave correctly when state->max_length is zero.
George Kadianakis [Wed, 20 Mar 2019 15:42:56 +0000 (17:42 +0200)] 
Behave correctly when state->max_length is zero.

6 years agofix typos, whitespace, comments
Roger Dingledine [Thu, 16 May 2019 03:20:03 +0000 (23:20 -0400)] 
fix typos, whitespace, comments

6 years agoMerge branch 'tor-github/pr/1002'
George Kadianakis [Wed, 15 May 2019 20:23:18 +0000 (23:23 +0300)] 
Merge branch 'tor-github/pr/1002'

6 years agoMerge branch 'tor-github/pr/1021'
David Goulet [Wed, 15 May 2019 19:35:22 +0000 (15:35 -0400)] 
Merge branch 'tor-github/pr/1021'

Signed-off-by: David Goulet <dgoulet@torproject.org>
6 years agoMerge branch 'bug28780-squashed3-rebased' into bug28780_rebase
George Kadianakis [Wed, 15 May 2019 13:46:51 +0000 (16:46 +0300)] 
Merge branch 'bug28780-squashed3-rebased' into bug28780_rebase

6 years agoThe practracker beatings will continue until the files get smaller.
Mike Perry [Wed, 15 May 2019 04:47:50 +0000 (04:47 +0000)] 
The practracker beatings will continue until the files get smaller.

6 years agoAdd control port circuit ID to all pathbias bug messages.
Mike Perry [Wed, 8 May 2019 21:28:00 +0000 (21:28 +0000)] 
Add control port circuit ID to all pathbias bug messages.

To ease debugging of miscount issues, attach vanguards with --loglevel DEBUG
and obtain control port logs (or use any other control port CIRC and
CIRC_MINOR event logging mechanism).

6 years agoPathbias should continue to ignore previously ignored circs.
Mike Perry [Wed, 8 May 2019 21:21:03 +0000 (21:21 +0000)] 
Pathbias should continue to ignore previously ignored circs.

If circuit padding wants to keep a circuit open and pathbias used to ignore
it, pathbias should continue to ignore it.

This may catch other purpose-change related miscounts (such as timeout
measurement, cannibalization, onion service circuit transitions, and
vanguards).

6 years agoBug 28780: Changes file
Mike Perry [Thu, 18 Apr 2019 20:35:22 +0000 (20:35 +0000)] 
Bug 28780: Changes file

6 years agoBug 28780: Add tests
Mike Perry [Wed, 15 May 2019 04:46:05 +0000 (04:46 +0000)] 
Bug 28780: Add tests

Also test circpad expiry safeguard.

6 years agoBug 28780: Make use of purpose to keep padding circuits open.
Mike Perry [Thu, 18 Apr 2019 20:40:55 +0000 (20:40 +0000)] 
Bug 28780: Make use of purpose to keep padding circuits open.

When a circuit is marked for close, check to see if any of our padding
machines want to take ownership of it and continue padding until the machine
hits the END state.

For safety, we also ensure that machines that do not terminate are still
closed as follows: Because padding machine timers are UINT32_MAX in size, if
some sort of network event doesn't happen on a padding-only circuit within
that time, we can conclude it is deadlocked and allow
circuit_expire_old_circuits_clientside() to close it.

If too much network activity happens, then per-machine padding limits can be
used to cease padding, which will cause network cell events to cease, on the
circuit, which will cause circpad to abandon the circuit as per the above time
limit.

6 years agoBug 28780: Add purpose for keeping padding circuits open
Mike Perry [Wed, 15 May 2019 04:42:28 +0000 (04:42 +0000)] 
Bug 28780: Add purpose for keeping padding circuits open

6 years agoMerge branch 'bug29085_rebase'
George Kadianakis [Wed, 15 May 2019 12:13:08 +0000 (15:13 +0300)] 
Merge branch 'bug29085_rebase'

6 years agoPractracker beatings are even more fun when they get caused mid-PR due to a github...
Mike Perry [Wed, 15 May 2019 04:58:21 +0000 (04:58 +0000)] 
Practracker beatings are even more fun when they get caused mid-PR due to a github auto-rebase of a PR

Because github PRs choose the most recent origin/master at the time of the PR
(and for any fixups pushed to a PR later to send to CI), there are tons of
conflicts and unexpected practracker issues.

This means CI can suddenly fail after fixups to a branch that pass locally.

Then CI fails and we have to close and re-open the PR.

6 years agoCheck the token supply when we received a padding event, too.
Mike Perry [Wed, 15 May 2019 03:43:57 +0000 (03:43 +0000)] 
Check the token supply when we received a padding event, too.

We need to check here because otherwise we can try to schedule padding with no
tokens left upon the receipt of a padding event when our bins just became
empty.

6 years agoFix two typo bugs found by new state length test.
Mike Perry [Wed, 15 May 2019 03:33:53 +0000 (03:33 +0000)] 
Fix two typo bugs found by new state length test.

6 years agoAdd test to explicitly check state lengths and token counts.
Mike Perry [Wed, 15 May 2019 03:45:03 +0000 (03:45 +0000)] 
Add test to explicitly check state lengths and token counts.

Our other tests tested state lengths against padding packets, and token counts
against non-padding packets. This test checks state lengths against
non-padding packets (and also padding packets too), and checks token counts
against padding packets (and also non-padding packets too).

The next three commits are needed to make this test pass (it found 3 bugs).
Yay?

6 years agoEliminate unneeded casts to circuit_t in circpad tests.
Mike Perry [Tue, 14 May 2019 22:25:15 +0000 (22:25 +0000)] 
Eliminate unneeded casts to circuit_t in circpad tests.

6 years agoBug 29085: Changes file.
Mike Perry [Wed, 8 May 2019 00:50:52 +0000 (00:50 +0000)] 
Bug 29085: Changes file.

6 years agoBug 29085: Avoid monotime usage for rtt estimates if it is not in use.
Mike Perry [Wed, 8 May 2019 00:40:49 +0000 (00:40 +0000)] 
Bug 29085: Avoid monotime usage for rtt estimates if it is not in use.

6 years agoMake the relationship between mutable histograms and token removal explicit.
Mike Perry [Sat, 11 May 2019 03:12:33 +0000 (03:12 +0000)] 
Make the relationship between mutable histograms and token removal explicit.

6 years agochanges file for ticket 28878
Nick Mathewson [Wed, 15 May 2019 00:22:30 +0000 (20:22 -0400)] 
changes file for ticket 28878

6 years agoTravis: fix an rng seed for coverage builds.
Nick Mathewson [Wed, 15 May 2019 00:16:35 +0000 (20:16 -0400)] 
Travis: fix an rng seed for coverage builds.

6 years agoUse reproducible RNG logic in circuitpadding tests.
Nick Mathewson [Wed, 15 May 2019 00:12:50 +0000 (20:12 -0400)] 
Use reproducible RNG logic in circuitpadding tests.

6 years agoTesting: allow the user to pass a seed in for reproducible-RNG tests
Nick Mathewson [Wed, 15 May 2019 00:05:53 +0000 (20:05 -0400)] 
Testing: allow the user to pass a seed in for reproducible-RNG tests

The environment variable TOR_TEST_RNG_SEED, if provided, is a hex
value for the RNG seed.

6 years agoUse new RNG and tinytest code to simplify prob_distr tests
Nick Mathewson [Tue, 14 May 2019 23:51:16 +0000 (19:51 -0400)] 
Use new RNG and tinytest code to simplify prob_distr tests

Since the reproducible RNG dumps its own seed, we don't need to do
it for it. Since tinytest can tell us if the test failed, we don't
need our own test_failed booleans.

6 years agoMake testing_disable_reproducible_rng() log seed on test failure
Nick Mathewson [Tue, 14 May 2019 23:49:50 +0000 (19:49 -0400)] 
Make testing_disable_reproducible_rng() log seed on test failure

This should let us simplify test_prob_distr.c and other stuff in the
future.

6 years agoGive tinytest a function to say whether the current test has failed
Nick Mathewson [Tue, 14 May 2019 23:47:43 +0000 (19:47 -0400)] 
Give tinytest a function to say whether the current test has failed

6 years agoMerge branch 'maint-0.3.5' into maint-0.4.0
Nick Mathewson [Wed, 15 May 2019 11:41:42 +0000 (07:41 -0400)] 
Merge branch 'maint-0.3.5' into maint-0.4.0

6 years agoMerge branch 'maint-0.4.0'
Nick Mathewson [Wed, 15 May 2019 11:41:42 +0000 (07:41 -0400)] 
Merge branch 'maint-0.4.0'

6 years agoMerge branch 'bug30475_035' into maint-0.3.5
Nick Mathewson [Wed, 15 May 2019 11:41:34 +0000 (07:41 -0400)] 
Merge branch 'bug30475_035' into maint-0.3.5

6 years agoMerge branch 'maint-0.4.0'
George Kadianakis [Wed, 15 May 2019 10:46:20 +0000 (13:46 +0300)] 
Merge branch 'maint-0.4.0'

6 years agoMerge branch 'tor-github/pr/1013' into maint-0.4.0
George Kadianakis [Wed, 15 May 2019 10:45:39 +0000 (13:45 +0300)] 
Merge branch 'tor-github/pr/1013' into maint-0.4.0

6 years agoBug 29085: Minor unit test updates for refactoring.
Mike Perry [Tue, 7 May 2019 23:37:33 +0000 (23:37 +0000)] 
Bug 29085: Minor unit test updates for refactoring.

Deliver nonpadding events instead of calling token removal functions.

6 years agoBug 29085: Refactor padding sent accounting out of callback.
Mike Perry [Sat, 11 May 2019 03:26:53 +0000 (03:26 +0000)] 
Bug 29085: Refactor padding sent accounting out of callback.

This commit moves code that updates the state length and padding limit counts
out from the callback to its own function, for clarity.

It does not change functionality.

6 years agoBug 29085: Refactor non-padding accounting out of token removal.
Mike Perry [Sat, 11 May 2019 02:51:14 +0000 (02:51 +0000)] 
Bug 29085: Refactor non-padding accounting out of token removal.

This commit moves the padding state limit checks and the padding rate limit
checks out of the token removal codepath, and causes all three functions to
get called from a single circpad_machine_count_nonpadding_sent() function.

It does not change functionality.

6 years agoupdate practracker for tor_init
Nick Mathewson [Tue, 14 May 2019 23:56:20 +0000 (19:56 -0400)] 
update practracker for tor_init

6 years agoMerge branch 'ticket30452_035_v3' into ticket30452_041_v3
Nick Mathewson [Tue, 14 May 2019 23:55:51 +0000 (19:55 -0400)] 
Merge branch 'ticket30452_035_v3' into ticket30452_041_v3

6 years agoMake --list-modules imply --hush
Nick Mathewson [Tue, 14 May 2019 23:55:35 +0000 (19:55 -0400)] 
Make --list-modules imply --hush

6 years agoUpdate practracker for 30452
Nick Mathewson [Tue, 14 May 2019 23:22:35 +0000 (19:22 -0400)] 
Update practracker for 30452

6 years agoMerge branch 'ticket30452_035_v3' into ticket30452_041_v3
Nick Mathewson [Tue, 14 May 2019 23:20:53 +0000 (19:20 -0400)] 
Merge branch 'ticket30452_035_v3' into ticket30452_041_v3

6 years agoAdd a --list-modules command
Nick Mathewson [Thu, 9 May 2019 15:26:13 +0000 (11:26 -0400)] 
Add a --list-modules command

Closes ticket 30452.

6 years agoMerge remote-tracking branch 'tor-github/pr/1004'
Nick Mathewson [Tue, 14 May 2019 15:43:10 +0000 (11:43 -0400)] 
Merge remote-tracking branch 'tor-github/pr/1004'

6 years agoMerge branch 'tor-github/pr/1006'
George Kadianakis [Tue, 14 May 2019 12:15:09 +0000 (15:15 +0300)] 
Merge branch 'tor-github/pr/1006'

6 years agoFix a compilation warning: function does not have to be STATIC.
Nick Mathewson [Mon, 13 May 2019 18:34:16 +0000 (14:34 -0400)] 
Fix a compilation warning: function does not have to be STATIC.

6 years agoMerge branch 'bug28683_30173_29203_squashed'
Nick Mathewson [Mon, 13 May 2019 18:33:31 +0000 (14:33 -0400)] 
Merge branch 'bug28683_30173_29203_squashed'

6 years agoThe practracker beatings will continue until the functions get smaller.
Mike Perry [Thu, 18 Apr 2019 18:14:31 +0000 (18:14 +0000)] 
The practracker beatings will continue until the functions get smaller.

6 years agoChanges file for bugs28693+30173+29203.
Mike Perry [Wed, 17 Apr 2019 23:37:22 +0000 (23:37 +0000)] 
Changes file for bugs28693+30173+29203.

6 years agoTests for bugs 28683, 30173, and 29203.
Mike Perry [Wed, 17 Apr 2019 23:21:54 +0000 (23:21 +0000)] 
Tests for bugs 28683, 30173, and 29203.

6 years agoBug 29203: Provide ReducedCircuitPadding torrc and consensus params
Mike Perry [Wed, 17 Apr 2019 06:09:06 +0000 (06:09 +0000)] 
Bug 29203: Provide ReducedCircuitPadding torrc and consensus params

6 years agoBug 28693: Provide Torrc option to disable circuit padding.
Mike Perry [Wed, 17 Apr 2019 05:51:39 +0000 (05:51 +0000)] 
Bug 28693: Provide Torrc option to disable circuit padding.