]>
git.ipfire.org Git - thirdparty/tor.git/log
Nick Mathewson [Thu, 18 Sep 2014 15:13:57 +0000 (11:13 -0400)]
Fix a double-free in failing case of handle_control_authenticate.
Bugfix on
ed8f020e205267e6270494634346ab68d830e1d8 ; bug not in any
released version of Tor. Found by Coverity; this is CID
1239290 .
Nick Mathewson [Thu, 18 Sep 2014 14:51:44 +0000 (10:51 -0400)]
Use the DL_SCHED_CONSENSUS schedule for consensuses.
Fixes bug 11679; bugfix on 0.2.2.6-alpha
Nick Mathewson [Thu, 18 Sep 2014 14:23:14 +0000 (10:23 -0400)]
Activate INSTRUMENT_DOWNLOADS under clang analyzer as well as coverity
Patch from teor; ticket 13177.
Nick Mathewson [Wed, 17 Sep 2014 15:00:27 +0000 (11:00 -0400)]
Fix a windows unused-arg warning
Nick Mathewson [Wed, 17 Sep 2014 14:27:40 +0000 (10:27 -0400)]
Merge remote-tracking branch 'public/ticket_13119_v3'
Peter Palfrader [Wed, 10 Sep 2014 15:18:34 +0000 (17:18 +0200)]
torrc.sample: Fix units
Arlo Breault [Wed, 10 Sep 2014 15:14:05 +0000 (08:14 -0700)]
Ignore coverage_html/
Nick Mathewson [Tue, 16 Sep 2014 15:11:48 +0000 (11:11 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Tue, 16 Sep 2014 15:11:17 +0000 (11:11 -0400)]
Add coccinelle script to remove pointless callocs
Nick Mathewson [Tue, 16 Sep 2014 15:10:02 +0000 (11:10 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5
Roger Dingledine [Sun, 14 Sep 2014 01:49:37 +0000 (21:49 -0400)]
clients now send correct address for rendezvous point
Clients now send the correct address for their chosen rendezvous point
when trying to access a hidden service. They used to send the wrong
address, which would still work some of the time because they also
sent the identity digest of the rendezvous point, and if the hidden
service happened to try connecting to the rendezvous point from a relay
that already had a connection open to it, the relay would reuse that
connection. Now connections to hidden services should be more robust
and faster. Also, this bug meant that clients were leaking to the hidden
service whether they were on a little-endian (common) or big-endian (rare)
system, which for some users might have reduced their anonymity.
Fixes bug 13151; bugfix on 0.2.1.5-alpha.
Nick Mathewson [Tue, 16 Sep 2014 14:57:00 +0000 (10:57 -0400)]
Add script to detect and remove unCish malloc-then-cast pattern
Also, apply it.
Nick Mathewson [Tue, 16 Sep 2014 13:40:38 +0000 (09:40 -0400)]
clean up eol whitespace from coccinelle-generated patches
Nick Mathewson [Tue, 16 Sep 2014 13:30:22 +0000 (09:30 -0400)]
Remove the legacy_test_helper and legacy_setup wrappers
These wrappers went into place when the default type for our unit
test functions changed from "void fn(void)" to "void fn(void *arg)".
To generate this patch, I did the same hokey-pokey as before with
replacing all operators used as macro arguments, then I ran a
coccinelle script, then I ran perl script to fix up everything that
used legacy_test_helper, then I manually removed the
legacy_test_helper functions, then I ran a final perl script to put
the operators back how they were.
==============================
#!/usr/bin/perl -w -i -p
s/==,/_X_EQ_,/g;
s/!=,/_X_NE_,/g;
s/<,/_X_LT_,/g;
s/>,/_X_GT_,/g;
s/>=,/_X_GEQ_,/g;
s/<=,/_X_LEQ_,/g;
--------------------
@@
identifier func =~ "test_.*$";
statement S, S2;
@@
static void func (
-void
+void *arg
)
{
... when != S2
+(void) arg;
S
...
}
--------------------
#!/usr/bin/perl -w -i -p
s/, *legacy_test_helper, *([^,]+), *\&legacy_setup, *([^\}]+) *}/, $2, $1, NULL, NULL }/g;
--------------------
#!/usr/bin/perl -w -i -p
s/_X_NEQ_/!=/g;
s/_X_NE_/!=/g;
s/_X_EQ_/==/g;
s/_X_GT_/>/g;
s/_X_LT_/</g;
s/_X_GEQ_/>=/g;
s/_X_LEQ_/<=/g;
--------------------
Nick Mathewson [Tue, 16 Sep 2014 01:39:12 +0000 (21:39 -0400)]
Add a changes file for 13119
Nick Mathewson [Tue, 16 Sep 2014 01:36:23 +0000 (21:36 -0400)]
Replace all uses of test_{str,}eq
Nick Mathewson [Tue, 16 Sep 2014 01:29:48 +0000 (21:29 -0400)]
Replace the remaining test_assert instances
Nick Mathewson [Tue, 16 Sep 2014 01:28:26 +0000 (21:28 -0400)]
remove two unused test_* macros
Nick Mathewson [Tue, 16 Sep 2014 01:27:23 +0000 (21:27 -0400)]
Replace remaining uses of deprecated test_mem* functions
Nick Mathewson [Tue, 16 Sep 2014 01:25:27 +0000 (21:25 -0400)]
Replace the remaining test_n?eq_ptr calls
Nick Mathewson [Tue, 16 Sep 2014 01:22:36 +0000 (21:22 -0400)]
Make not even macros use test_fail_msg.
Nick Mathewson [Tue, 16 Sep 2014 01:18:21 +0000 (21:18 -0400)]
Use coccinelle scripts to clean up our unit tests
This should get rid of most of the users of the old test_*
functions. Some are in macros and will need manual cleanup, though.
This patch is for 13119, and was automatically generated with these
scripts. The perl scripts are there because coccinelle hates
operators as macro arguments.
------------------------------
s/==,/_X_EQ_,/g;
s/!=,/_X_NE_,/g;
s/<,/_X_LT_,/g;
s/>,/_X_GT_,/g;
s/>=,/_X_GEQ_,/g;
s/<=,/_X_LEQ_,/g;
------------------------------
@@
expression a;
identifier func;
@@
func (...) {
<...
-test_fail_msg
+TT_DIE
(
+(
a
+)
)
...>
}
@@
identifier func;
@@
func (...) {
<...
-test_fail()
+TT_DIE(("Assertion failed."))
...>
}
@@
expression a;
identifier func;
@@
func (...) {
<...
-test_assert
+tt_assert
(a)
...>
}
@@
expression a, b;
identifier func;
@@
func (...) {
<...
-test_eq
+tt_int_op
(a,
+_X_EQ_,
b)
...>
}
@@
expression a, b;
identifier func;
@@
func (...) {
<...
-test_neq
+tt_int_op
(a,
+_X_NEQ_,
b)
...>
}
@@
expression a, b;
identifier func;
@@
func (...) {
<...
-test_streq
+tt_str_op
(a,
+_X_EQ_,
b)
...>
}
@@
expression a, b;
identifier func;
@@
func (...) {
<...
-test_strneq
+tt_str_op
(a,
+_X_NEQ_,
b)
...>
}
@@
expression a, b;
identifier func;
@@
func (...) {
<...
-test_eq_ptr
+tt_ptr_op
(a,
+_X_EQ_,
b)
...>
}
@@
expression a, b;
identifier func;
@@
func() {
<...
-test_neq_ptr
+tt_ptr_op
(a,
+_X_NEQ_,
b)
...>
}
@@
expression a, b, len;
identifier func;
@@
func (...) {
<...
-test_memeq
+tt_mem_op
(a,
+_X_EQ_,
b, len)
...>
}
@@
expression a, b, len;
identifier func;
@@
func (...) {
<...
-test_memneq
+tt_mem_op
(a,
+_X_NEQ_,
b, len)
...>
}
------------------------------
@@
char a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a == b
+a, _X_EQ_, b
)
...>
}
@@
int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a == b
+a, _X_EQ_, b
)
...>
}
@@
long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a == b
+a, _X_EQ_, b
)
...>
}
@@
unsigned int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a == b
+a, _X_EQ_, b
)
...>
}
@@
unsigned long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a == b
+a, _X_EQ_, b
)
...>
}
@@
char a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a != b
+a, _X_NEQ_, b
)
...>
}
@@
int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a != b
+a, _X_NEQ_, b
)
...>
}
@@
long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a != b
+a, _X_NEQ_, b
)
...>
}
@@
unsigned int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a != b
+a, _X_NEQ_, b
)
...>
}
@@
unsigned long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a != b
+a, _X_NEQ_, b
)
...>
}
@@
char a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a >= b
+a, _X_GEQ_, b
)
...>
}
@@
int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a >= b
+a, _X_GEQ_, b
)
...>
}
@@
long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a >= b
+a, _X_GEQ_, b
)
...>
}
@@
unsigned int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a >= b
+a, _X_GEQ_, b
)
...>
}
@@
unsigned long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a >= b
+a, _X_GEQ_, b
)
...>
}
@@
char a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a <= b
+a, _X_LEQ_, b
)
...>
}
@@
int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a <= b
+a, _X_LEQ_, b
)
...>
}
@@
long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a <= b
+a, _X_LEQ_, b
)
...>
}
@@
unsigned int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a <= b
+a, _X_LEQ_, b
)
...>
}
@@
unsigned long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a <= b
+a, _X_LEQ_, b
)
...>
}
@@
char a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a > b
+a, _X_GT_, b
)
...>
}
@@
int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a > b
+a, _X_GT_, b
)
...>
}
@@
long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a > b
+a, _X_GT_, b
)
...>
}
@@
unsigned int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a > b
+a, _X_GT_, b
)
...>
}
@@
unsigned long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a > b
+a, _X_GT_, b
)
...>
}
@@
char a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a < b
+a, _X_LT_, b
)
...>
}
@@
int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a < b
+a, _X_LT_, b
)
...>
}
@@
long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_int_op
(
-a < b
+a, _X_LT_, b
)
...>
}
@@
unsigned int a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a < b
+a, _X_LT_, b
)
...>
}
@@
unsigned long a, b;
identifier func;
@@
func (...) {
<...
-tt_assert
+tt_uint_op
(
-a < b
+a, _X_LT_, b
)
...>
}
------------------------------
s/_X_NEQ_/!=/g;
s/_X_NE_/!=/g;
s/_X_EQ_/==/g;
s/_X_GT_/>/g;
s/_X_LT_/</g;
s/_X_GEQ_/>=/g;
s/_X_LEQ_/<=/g;
s/test_mem_op\(/tt_mem_op\(/g;
Nick Mathewson [Mon, 15 Sep 2014 18:04:19 +0000 (14:04 -0400)]
Don't pass invalid memory regions to digestmap_set/get in test_routerlist
Fixes bug in
c887e20e6a5a2c17c65 ; bug in no released Tor version.
Nick Mathewson [Mon, 15 Sep 2014 17:52:56 +0000 (13:52 -0400)]
Clean up a clangalyzer warning in directory_remove_invalid
"At this point in the code, msg has been set to a string
constant. But the tor code checks that msg is not NULL, and the
redundant NULL check confuses the analyser[...] To avoid this
spurious warning, the patch initialises msg to NULL."
Patch from teor. another part of 13157.
Nick Mathewson [Mon, 15 Sep 2014 17:52:13 +0000 (13:52 -0400)]
Clear up another clangalyzer issue
"The NULL pointer warnings on the return value of
tor_addr_to_in6_addr32() are incorrect. But clang can't work this
out itself due to limited analysis depth. To teach the analyser that
the return value is safe to dereference, I applied tor_assert to the
return value."
Patch from teor. Part of 13157.
Roger Dingledine [Sat, 13 Sep 2014 21:10:04 +0000 (17:10 -0400)]
fix typo in comment
Nick Mathewson [Fri, 12 Sep 2014 20:14:49 +0000 (16:14 -0400)]
Mention "make check" in doc/HACKING
Sebastian Hahn [Fri, 12 Sep 2014 20:08:27 +0000 (22:08 +0200)]
Give an example how to run the unit tests
Nick Mathewson [Fri, 12 Sep 2014 01:41:56 +0000 (21:41 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
(Do an "ours" merge to avoid taking version number changes)
Nick Mathewson [Fri, 12 Sep 2014 01:38:32 +0000 (21:38 -0400)]
Bump maint-0.2.5 to 0.2.5.7-rc-dev
Nick Mathewson [Fri, 12 Sep 2014 01:25:03 +0000 (21:25 -0400)]
forward-port changelog from 0.2.5.7-rc
Nick Mathewson [Thu, 11 Sep 2014 18:40:19 +0000 (14:40 -0400)]
One more whitespace fix
Nick Mathewson [Thu, 11 Sep 2014 18:37:12 +0000 (14:37 -0400)]
Whitespace cleanups in test_util
Nick Mathewson [Thu, 11 Sep 2014 18:36:51 +0000 (14:36 -0400)]
Whitespace cleanups in transports/test_pt
Nick Mathewson [Thu, 11 Sep 2014 15:34:57 +0000 (11:34 -0400)]
Update HACKING instructions to mention format_changelog script
Nick Mathewson [Thu, 11 Sep 2014 13:17:13 +0000 (09:17 -0400)]
Use tor_malloc_zero() in pt tests
Fixes for PT tests merged with 8402; patch from Yawning.
Nick Mathewson [Thu, 11 Sep 2014 12:59:24 +0000 (08:59 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Thu, 11 Sep 2014 12:30:41 +0000 (08:30 -0400)]
Merge remote-tracking branch 'public/bug13104_025'
Nick Mathewson [Thu, 11 Sep 2014 12:28:46 +0000 (08:28 -0400)]
Fix "comparison is always false" warnings in new test_util_di_ops
Having a constant zero means that unsigned < 0 is always false.
Roger Dingledine [Thu, 11 Sep 2014 12:02:37 +0000 (08:02 -0400)]
Reduce log severity for unused ClientTransportPlugin lines
Tor Browser includes several ClientTransportPlugin lines in its
torrc-defaults file, leading every Tor Browser user who looks at her
logs to see these notices and wonder if they're dangerous.
Resolves bug 13124; bugfix on 0.2.5.3-alpha.
Nick Mathewson [Thu, 11 Sep 2014 04:11:26 +0000 (00:11 -0400)]
Merge remote-tracking branch 'public/bug13104_025'
Nick Mathewson [Thu, 11 Sep 2014 04:10:53 +0000 (00:10 -0400)]
C90 compliance for #13104 fixes
Nick Mathewson [Thu, 11 Sep 2014 04:05:56 +0000 (00:05 -0400)]
Add a changes file for bug 13104
Nick Mathewson [Thu, 11 Sep 2014 04:00:13 +0000 (00:00 -0400)]
Avoid an overflow on negation in format_helper_exit_status
Part of 13104; patch from teor.
Nick Mathewson [Thu, 11 Sep 2014 03:59:21 +0000 (23:59 -0400)]
Avoid divide by zero and NaNs in scale_array_elements_to_u64
Patch from teor; part of 13104
Nick Mathewson [Thu, 11 Sep 2014 03:58:02 +0000 (23:58 -0400)]
Extra tests for tor_memeq and memcmp
(Patch from teor; part of 13104)
Nick Mathewson [Thu, 11 Sep 2014 03:57:31 +0000 (23:57 -0400)]
Avoid overflows and underflows in sscanf and friends
(Patch from teor on 13104)
Nick Mathewson [Thu, 11 Sep 2014 03:48:59 +0000 (23:48 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Thu, 11 Sep 2014 03:46:20 +0000 (23:46 -0400)]
In routerlist_assert_ok(), check r2 before taking &(r2->cache_info)
Technically, we're not allowed to take the address of a member can't
exist relative to the null pointer. That makes me wonder how any sane
compliant system implements the offsetof macro, but let's let sleeping
balrogs lie.
Fixes 13096; patch on 0.1.1.9-alpha; patch from "teor", who was using
clang -fsanitize=undefined-trap -fsanitize-undefined-trap-on-error -ftrapv
Nick Mathewson [Thu, 11 Sep 2014 03:41:55 +0000 (23:41 -0400)]
Merge remote-tracking branch 'yawning/bug_8402'
Nick Mathewson [Thu, 11 Sep 2014 03:36:27 +0000 (23:36 -0400)]
Merge remote-tracking branch 'public/torrc_minimal'
Nick Mathewson [Thu, 11 Sep 2014 02:12:47 +0000 (22:12 -0400)]
Merge remote-tracking branch 'public/bug12908_025' into maint-0.2.5
Nick Mathewson [Mon, 18 Aug 2014 17:03:21 +0000 (13:03 -0400)]
Mark StrictE{ntry,xit}Nodes as obsolete.
Yawning Angel [Tue, 9 Sep 2014 18:21:19 +0000 (18:21 +0000)]
Fix issues brought up in nickm's review.
* Update pt_get_proxy_uri() documentation.
* proxy_supported is now unsigned.
* Added a changes file.
George Kadianakis [Thu, 24 Jul 2014 11:31:49 +0000 (14:31 +0300)]
Add unittests for finding the third quartile of a set.
Nick Mathewson [Tue, 9 Sep 2014 16:26:16 +0000 (12:26 -0400)]
Merge remote-tracking branch 'asn/bug13064'
Nick Mathewson [Tue, 9 Sep 2014 16:09:18 +0000 (12:09 -0400)]
Remove now-pointless SIZE_MAX stanza from OpenBSD_malloc_linux
Nick Mathewson [Tue, 9 Sep 2014 16:08:03 +0000 (12:08 -0400)]
Use S?SIZE_MAX, not S?SIZE_T_MAX
This fixes bug 13102 (not on any released Tor) where using the
standard SSIZE_MAX name broke mingw64, and we didn't realize.
I did this with
perl -i -pe 's/SIZE_T_MAX/SIZE_MAX/' src/*/*.[ch] src/*/*/*.[ch]
Sebastian Hahn [Thu, 4 Sep 2014 23:49:47 +0000 (01:49 +0200)]
Remove client-side bad directory logic
Implements the second half of #13060.
Sebastian Hahn [Thu, 4 Sep 2014 23:37:25 +0000 (01:37 +0200)]
Remove dirauth support for the BadDirectory flag
Implements the first half of #13060. The second half will be to remove
client support, too.
Nick Mathewson [Tue, 9 Sep 2014 15:51:18 +0000 (11:51 -0400)]
Merge branch 'bug12899_squashed'
Sebastian Hahn [Thu, 4 Sep 2014 21:16:51 +0000 (23:16 +0200)]
Remove support for naming directory authorities
This implements the meat of #12899. This commit should simply remove the
parts of Tor dirauths used to check whether a relay was supposed to be
named or not, it doesn't yet convert to a new mechanism for
reject/invalid/baddir/badexiting relays.
Nick Mathewson [Tue, 9 Sep 2014 15:05:28 +0000 (11:05 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Tue, 9 Sep 2014 15:04:54 +0000 (11:04 -0400)]
Merge remote-tracking branch 'andrea/bug12160_025' into maint-0.2.5
Nick Mathewson [Tue, 9 Sep 2014 14:57:09 +0000 (10:57 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Tue, 9 Sep 2014 14:51:39 +0000 (10:51 -0400)]
Merge remote-tracking branch 'public/bug12700_024' into maint-0.2.5
Nick Mathewson [Tue, 9 Sep 2014 14:33:45 +0000 (10:33 -0400)]
Updated building-tor-msvc.txt
Nick Mathewson [Tue, 9 Sep 2014 14:30:57 +0000 (10:30 -0400)]
Add instructions for building Tor with MSVC.
Written by "NewEraCracker" on ticket 13081; I've added a note that
this is not our preferred or supported build method.
Nick Mathewson [Tue, 9 Sep 2014 14:27:41 +0000 (10:27 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Tue, 9 Sep 2014 14:27:05 +0000 (10:27 -0400)]
Clean up the MVSC nmake files so they work again.
Fixes bug 13081; bugfix on 0.2.5.1-alpha. Patch from "NewEraCracker."
Nick Mathewson [Tue, 9 Sep 2014 14:22:42 +0000 (10:22 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Tue, 9 Sep 2014 14:22:01 +0000 (10:22 -0400)]
Add more escaped() calls in directory.c
Patch from teor to fix 13071.
Nick Mathewson [Mon, 8 Sep 2014 19:16:45 +0000 (15:16 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Mon, 8 Sep 2014 19:15:05 +0000 (15:15 -0400)]
Expand the event_mask field in controller conns to 64 bits
Back in
078d6bcd , we added an event number 0x20, but we didn't make
the event_mask field big enough to compensate.
Patch by "teor". Fixes 13085; bugfix on 0.2.5.1-alpha.
Nick Mathewson [Mon, 8 Sep 2014 19:08:51 +0000 (15:08 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
Nick Mathewson [Mon, 8 Sep 2014 19:07:54 +0000 (15:07 -0400)]
Add cscope generated files to .gitignore.
Closes #13092; patch from dgoulet.
George Kadianakis [Sat, 6 Sep 2014 11:37:41 +0000 (14:37 +0300)]
Evaluate TestingDirAuthVoteGuard only after filling all rs elements.
Andrea Shepard [Fri, 5 Sep 2014 18:08:46 +0000 (11:08 -0700)]
Correctly update channel local mark when address of incoming connection changes after handshake; fixes bug #12160
Sebastian Hahn [Thu, 4 Sep 2014 20:20:58 +0000 (22:20 +0200)]
Fix add_fingerprint_to_dir() doc and signature
This function never returns non-null, but its usage doesn't reflect
that. Let's make it explicit. This will be mostly overridden by later
commits, so no changes file here.
Sebastian Hahn [Thu, 4 Sep 2014 04:25:38 +0000 (06:25 +0200)]
Remove the AuthDirRejectUnlisted config option
This is in preparation for a big patch series removing the entire Naming
system from Tor. In its wake, the approved-routers file is being
deprecated, and a replacement option to allow only pre-approved routers
is not being implemented.
Nick Mathewson [Wed, 3 Sep 2014 17:29:43 +0000 (13:29 -0400)]
Merge remote-tracking branch 'intrigeri/bug12939-systemd-no-new-privileges'
Conflicts:
contrib/dist/tor.service.in
Nick Mathewson [Wed, 3 Sep 2014 17:28:46 +0000 (13:28 -0400)]
Merge remote-tracking branch 'intrigeri/bug12751-systemd-filesystem-sandbox'
Nick Mathewson [Wed, 3 Sep 2014 14:59:39 +0000 (10:59 -0400)]
Fix a couple of small memory leaks on failure cases.
[CID
1234702 ,
1234703 ]
Nick Mathewson [Wed, 3 Sep 2014 14:58:11 +0000 (10:58 -0400)]
Fix some 'dereference-before-null-check' warnings in test_circuitlist.c
Found by Coverity Scan.
[CID
1234704 ,
1234705 ,
1234706 ]
Nick Mathewson [Wed, 3 Sep 2014 13:51:14 +0000 (09:51 -0400)]
Fix the leaks that valgrind found in the new routerset tests.
(We have a tests-shouldn't-leak policy so that we won't accidentally
ignore true-positives.)
Nick Mathewson [Tue, 2 Sep 2014 23:18:21 +0000 (19:18 -0400)]
Use 'Bytes', not 'B', in torrc.sample.
Also put this change into torrc.minimal.in-staging
Closes ticket 10343
Magnus Nord [Tue, 2 Sep 2014 23:16:16 +0000 (19:16 -0400)]
Fix: typo in torrc.sample.in
Nick Mathewson [Tue, 2 Sep 2014 23:10:42 +0000 (19:10 -0400)]
Divide torrc.sample into torrc.sample and torrc.minimal
torrc.minimal is now the one that should change as infrequently as
possible. To schedule an change to go into it eventually, make your
change to torrc.minimal.in-sample.
torrc.sample is now the volatile one: we can change it to our hearts'
content.
Closes ticket #11144
Nick Mathewson [Tue, 2 Sep 2014 23:00:00 +0000 (19:00 -0400)]
Merge remote-tracking branch 'origin/maint-0.2.5'
rl1987 [Sun, 31 Aug 2014 11:09:06 +0000 (14:09 +0300)]
Documenting reject6 and accept6 ExitPolicy entries in manpage.
Sebastian Hahn [Sat, 30 Aug 2014 07:00:40 +0000 (09:00 +0200)]
Don't list relays w/ bw estimate of 0 in the consensus
This implements a feature from bug 13000. Instead of starting a bwauth
run with this wrong idea about their bw, relays should do the self-test
and then get measured.
Sebastian Hahn [Sat, 30 Aug 2014 06:36:20 +0000 (08:36 +0200)]
Don't delay uploading a new desc if bw estimate was 0
When a tor relay starts up and has no historical information about its
bandwidth capability, it uploads a descriptor with a bw estimate of 0.
It then starts its bw selftest, but has to wait 20 minutes to upload the
next descriptor due to the MAX_BANDWIDTH_CHANGE_FREQ delay. This change
should mean that on average, relays start seeing meaningful traffic a
little quicker, since they will have a higher chance to appear in the
consensus with a nonzero bw.
Patch by Roger, changes file and comment by Sebastian.
Nick Mathewson [Tue, 2 Sep 2014 19:40:47 +0000 (15:40 -0400)]
Fix more (void*)11 warnings in the tests
Nick Mathewson [Tue, 2 Sep 2014 19:40:04 +0000 (15:40 -0400)]
Make iter for DECLARE_TYPED_DIGESTMAP_FNS be a pointer.
This fixes a clangalyzer warning, and makes our C slightly better C.
Nick Mathewson [Tue, 2 Sep 2014 17:56:54 +0000 (13:56 -0400)]
Use real pointers in unit tests, not (void*)101 etc
The clangalyzer hates (void*)101 etc
Nick Mathewson [Tue, 2 Sep 2014 17:56:31 +0000 (13:56 -0400)]
Don't include a backtrace test for dereferencing 0 under analyzers
They hate this.
Nick Mathewson [Tue, 2 Sep 2014 17:29:45 +0000 (13:29 -0400)]
Add more assertions to esc_for_log to please the clangalyzer.
Nick Mathewson [Tue, 2 Sep 2014 17:29:11 +0000 (13:29 -0400)]
Add an assertion to read_file_to_str_until_eof
The clangalyzer doesn't believe our math here. I'm pretty sure our
math is right. Also, add some unit tests.
Nick Mathewson [Tue, 2 Sep 2014 16:58:32 +0000 (12:58 -0400)]
Explicitly initialize addresses in tor_ersatz_socketpair
This should stop a false positive from the clangalyzer.
Nick Mathewson [Tue, 2 Sep 2014 16:53:11 +0000 (12:53 -0400)]
Apply the MALLOC_ZERO_WORKS fixup to tor_realloc as well.
Also, make MALLOC_ZERO_WORKS never get applied when clang analyzer is
running. This should make the clangalyzer a little happier.