]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
7 years agomake ipv6-only config complaint clearer
Roger Dingledine [Sat, 8 Sep 2018 21:08:22 +0000 (17:08 -0400)] 
make ipv6-only config complaint clearer

(a relay operator hit this on #tor-relays and couldn't make sense
of it. i couldn't either until i went to go read the code.)

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Fri, 7 Sep 2018 19:14:03 +0000 (15:14 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Fri, 7 Sep 2018 19:12:27 +0000 (15:12 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

"ours" to avoid bump.

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Fri, 7 Sep 2018 19:12:09 +0000 (15:12 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

"ours" to avoid bump

7 years agoMerge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Fri, 7 Sep 2018 19:11:49 +0000 (15:11 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.2

"ours" to avoid bump

7 years agoBump to 0.3.3.10
Nick Mathewson [Fri, 7 Sep 2018 19:11:18 +0000 (15:11 -0400)] 
Bump to 0.3.3.10

7 years agoBump to 0.3.2.12
Nick Mathewson [Fri, 7 Sep 2018 19:11:07 +0000 (15:11 -0400)] 
Bump to 0.3.2.12

7 years agoBump to 0.2.9.17
Nick Mathewson [Fri, 7 Sep 2018 19:10:49 +0000 (15:10 -0400)] 
Bump to 0.2.9.17

7 years agoMerge remote-tracking branch 'dgoulet/ticket20700_035_03'
Nick Mathewson [Fri, 7 Sep 2018 19:03:32 +0000 (15:03 -0400)] 
Merge remote-tracking branch 'dgoulet/ticket20700_035_03'

7 years agoHSv3: Don't assert when reading bad client-side privkeys.
George Kadianakis [Fri, 7 Sep 2018 15:06:44 +0000 (18:06 +0300)] 
HSv3: Don't assert when reading bad client-side privkeys.

7 years agoHSv3: Add subcredential in client auth KDF on the client-side.
George Kadianakis [Thu, 6 Sep 2018 13:25:31 +0000 (16:25 +0300)] 
HSv3: Add subcredential in client auth KDF on the client-side.

7 years agoHSv3: Add subcredential in client auth KDF on the service-side.
George Kadianakis [Thu, 6 Sep 2018 13:07:27 +0000 (16:07 +0300)] 
HSv3: Add subcredential in client auth KDF on the service-side.

Also update some client auth test vectors that broke...

7 years agohs-v3: Make hs_desc_build_fake_authorized_client() return an object
David Goulet [Wed, 5 Sep 2018 17:37:37 +0000 (13:37 -0400)] 
hs-v3: Make hs_desc_build_fake_authorized_client() return an object

Return a newly allocated fake client authorization object instead of taking
the object as a parameter.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agobug: Use PATH_SEPARATOR instead of slash
Suphanat Chunhapanya [Sun, 2 Sep 2018 20:19:24 +0000 (03:19 +0700)] 
bug: Use PATH_SEPARATOR instead of slash

In function get_fname_suffix, previously it uses /, but in fact it
should use PATH_SEPARATOR.

7 years agohs-v3: Improve v3 client authorization logging
David Goulet [Thu, 30 Aug 2018 13:16:48 +0000 (09:16 -0400)] 
hs-v3: Improve v3 client authorization logging

Part of #20700.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Log client auth load activities client side
Suphanat Chunhapanya [Sun, 19 Aug 2018 12:47:46 +0000 (19:47 +0700)] 
hs-v3: Log client auth load activities client side

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Log client auth load activities service side
Suphanat Chunhapanya [Sun, 19 Aug 2018 12:37:38 +0000 (19:37 +0700)] 
hs-v3: Log client auth load activities service side

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Rename client_pk to client_auth_pk
Suphanat Chunhapanya [Mon, 21 May 2018 17:09:40 +0000 (00:09 +0700)] 
hs-v3: Rename client_pk to client_auth_pk

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Rename client_sk to client_auth_sk
Suphanat Chunhapanya [Mon, 21 May 2018 17:01:52 +0000 (00:01 +0700)] 
hs-v3: Rename client_sk to client_auth_sk

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agotest: HS v3 client auth is config equal function
Suphanat Chunhapanya [Wed, 16 May 2018 14:57:24 +0000 (21:57 +0700)] 
test: HS v3 client auth is config equal function

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Republish descriptors if client auth changes
Suphanat Chunhapanya [Wed, 9 May 2018 20:35:29 +0000 (03:35 +0700)] 
hs-v3: Republish descriptors if client auth changes

When reloading tor, check if our the configured client authorization have
changed from what we previously had. If so, republish the updated descriptor.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Make all descriptor content free functions public
Suphanat Chunhapanya [Wed, 9 May 2018 20:14:01 +0000 (03:14 +0700)] 
hs-v3: Make all descriptor content free functions public

Series of functions that we now need in hs_service.c.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Re-enable the decoding in the encoding function
Suphanat Chunhapanya [Sun, 22 Apr 2018 13:51:21 +0000 (20:51 +0700)] 
hs-v3: Re-enable the decoding in the encoding function

Previously, the validation by decoding a created descriptor was disabled
because the interface had to be entirely changed and not implemented at the
time.

This commit re-enabled it because it is now implemented.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agotest: HS v3 descriptor decoding with client authorization
Suphanat Chunhapanya [Sat, 21 Apr 2018 18:13:50 +0000 (01:13 +0700)] 
test: HS v3 descriptor decoding with client authorization

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Decrypt the descriptor with client private key
Suphanat Chunhapanya [Thu, 19 Apr 2018 19:10:19 +0000 (02:10 +0700)] 
hs-v3: Decrypt the descriptor with client private key

Parse the client authorization section from the descriptor, use the client
private key to decrypt the auth clients, and then use the descriptor cookie to
decrypt the descriptor.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Refactor the descriptor decryption/decoding
Suphanat Chunhapanya [Thu, 19 Apr 2018 15:44:17 +0000 (22:44 +0700)] 
hs-v3: Refactor the descriptor decryption/decoding

This commit refactors the existing decryption code to make it compatible with
a new logic for when the client authorization is enabled.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Refactor secret data building logic
Suphanat Chunhapanya [Thu, 19 Apr 2018 15:36:59 +0000 (22:36 +0700)] 
hs-v3: Refactor secret data building logic

Because this secret data building logic is not only used by the descriptor
encoding process but also by the descriptor decoding, refactor the function to
take both steps into account.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agotest: HS v3 client authorization loading secret key
Suphanat Chunhapanya [Sun, 19 Aug 2018 01:26:43 +0000 (08:26 +0700)] 
test: HS v3 client authorization loading secret key

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Load client authorization secret key from file
Suphanat Chunhapanya [Sun, 19 Aug 2018 01:22:13 +0000 (08:22 +0700)] 
hs-v3: Load client authorization secret key from file

The new ClientOnionAuthDir option is introduced which is where tor looks to
find the HS v3 client authorization files containing the client private key
material.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agotest: HS v3 descriptor encoding with client authorization
Suphanat Chunhapanya [Sat, 14 Apr 2018 10:50:07 +0000 (17:50 +0700)] 
test: HS v3 descriptor encoding with client authorization

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Encrypt the descriptor using a cookie
Suphanat Chunhapanya [Fri, 13 Apr 2018 21:04:31 +0000 (04:04 +0700)] 
hs-v3: Encrypt the descriptor using a cookie

Previously, we encrypted the descriptor without the descriptor cookie. This
commit, when the client auth is enabled, the descriptor cookie is always used.

I also removed the code that is used to generate fake auth clients because it
will not be used anymore.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agotest: Build an HSv3 descriptor with authorized client
Suphanat Chunhapanya [Thu, 12 Apr 2018 21:56:17 +0000 (04:56 +0700)] 
test: Build an HSv3 descriptor with authorized client

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agotest: HS v3 building a descriptor with client auth
Suphanat Chunhapanya [Thu, 12 Apr 2018 21:52:46 +0000 (04:52 +0700)] 
test: HS v3 building a descriptor with client auth

This commit tests that the descriptor building result, when the client
authorization is enabled, includes everything that is needed.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Generate all descriptor related keys
Suphanat Chunhapanya [Mon, 9 Apr 2018 16:09:41 +0000 (23:09 +0700)] 
hs-v3: Generate all descriptor related keys

We need to generate all the related keys when building the descriptor, so that
we can encrypt the descriptor.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agotest: HS v3 loading client auth keys service side
Suphanat Chunhapanya [Sat, 18 Aug 2018 14:24:26 +0000 (21:24 +0700)] 
test: HS v3 loading client auth keys service side

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agohs-v3: Load all client auth keys to the service
Suphanat Chunhapanya [Sat, 18 Aug 2018 05:28:12 +0000 (12:28 +0700)] 
hs-v3: Load all client auth keys to the service

This commit loads all client public keys from every file in
`authorized_clients/` directory.

Signed-off-by: David Goulet <dgoulet@torproject.org>
7 years agoMerge remote-tracking branch 'teor/bug27521'
Nick Mathewson [Fri, 7 Sep 2018 14:29:45 +0000 (10:29 -0400)] 
Merge remote-tracking branch 'teor/bug27521'

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Fri, 7 Sep 2018 13:49:41 +0000 (09:49 -0400)] 
Merge branch 'maint-0.3.4'

"ours" to avoid version bump

7 years agoBump to 0.3.4.8
Nick Mathewson [Fri, 7 Sep 2018 13:49:29 +0000 (09:49 -0400)] 
Bump to 0.3.4.8

7 years agoin master, remove changes files for already-merged changes
Nick Mathewson [Fri, 7 Sep 2018 13:39:54 +0000 (09:39 -0400)] 
in master, remove changes files for already-merged changes

7 years agoCopy updated 0.3.4.6-rc changelog to master
Nick Mathewson [Fri, 7 Sep 2018 13:32:31 +0000 (09:32 -0400)] 
Copy updated 0.3.4.6-rc changelog to master

Forward-ports fix for 27488.

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Fri, 7 Sep 2018 13:15:56 +0000 (09:15 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Fri, 7 Sep 2018 13:15:56 +0000 (09:15 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Fri, 7 Sep 2018 13:15:56 +0000 (09:15 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Fri, 7 Sep 2018 13:15:52 +0000 (09:15 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.2

7 years agoMerge branch 'ticket27344_029' into maint-0.2.9
Nick Mathewson [Fri, 7 Sep 2018 13:15:15 +0000 (09:15 -0400)] 
Merge branch 'ticket27344_029' into maint-0.2.9

7 years agoTell openssl to build its TLS contexts with security level 1
Nick Mathewson [Fri, 7 Sep 2018 12:57:14 +0000 (08:57 -0400)] 
Tell openssl to build its TLS contexts with security level 1

Fixes bug 27344, where we'd break compatibility with old tors by
rejecting RSA1024 and DH1024.

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Fri, 7 Sep 2018 12:48:23 +0000 (08:48 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge remote-tracking branch 'teor/bug27460-034' into maint-0.3.4
Nick Mathewson [Fri, 7 Sep 2018 12:48:19 +0000 (08:48 -0400)] 
Merge remote-tracking branch 'teor/bug27460-034' into maint-0.3.4

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Fri, 7 Sep 2018 12:46:46 +0000 (08:46 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Fri, 7 Sep 2018 12:46:45 +0000 (08:46 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

7 years agoMerge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Fri, 7 Sep 2018 12:46:45 +0000 (08:46 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.2

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Fri, 7 Sep 2018 12:46:45 +0000 (08:46 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoMerge remote-tracking branch 'teor/bug27461-032' into maint-0.3.2
Nick Mathewson [Fri, 7 Sep 2018 12:46:41 +0000 (08:46 -0400)] 
Merge remote-tracking branch 'teor/bug27461-032' into maint-0.3.2

7 years agoMerge remote-tracking branch 'teor/bug27461-029' into maint-0.2.9
Nick Mathewson [Fri, 7 Sep 2018 12:46:35 +0000 (08:46 -0400)] 
Merge remote-tracking branch 'teor/bug27461-029' into maint-0.2.9

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Fri, 7 Sep 2018 12:45:10 +0000 (08:45 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Fri, 7 Sep 2018 12:44:40 +0000 (08:44 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Fri, 7 Sep 2018 12:44:40 +0000 (08:44 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoMerge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Fri, 7 Sep 2018 12:44:39 +0000 (08:44 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.2

7 years agoMerge remote-tracking branch 'teor/bug27463-029' into maint-0.2.9
Nick Mathewson [Fri, 7 Sep 2018 12:44:36 +0000 (08:44 -0400)] 
Merge remote-tracking branch 'teor/bug27463-029' into maint-0.2.9

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Fri, 7 Sep 2018 12:42:19 +0000 (08:42 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Fri, 7 Sep 2018 12:42:19 +0000 (08:42 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoMerge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Fri, 7 Sep 2018 12:42:19 +0000 (08:42 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.2

7 years agoAppveyor: Disable gcc hardening in Windows 64-bit builds
teor [Wed, 5 Sep 2018 08:32:46 +0000 (18:32 +1000)] 
Appveyor: Disable gcc hardening in Windows 64-bit builds

As of August 29, 2018, Appveyor images come with gcc 8.2.0 by
default. 64-bit Windows executables compiled with gcc 8.2.0 and
tor's --enable-gcc-hardening crash.

Fixes bug 27460; bugfix on 0.3.4.1-alpha.

7 years agoMerge branch 'bug27461-029' into bug27461-032
teor [Fri, 7 Sep 2018 03:00:34 +0000 (13:00 +1000)] 
Merge branch 'bug27461-029' into bug27461-032

Fix a minor merge conflict due to an #endif comment.

7 years agoWindows: Stop calling SetProcessDEPPolicy() on 64-bit Windows
teor [Fri, 7 Sep 2018 02:58:11 +0000 (12:58 +1000)] 
Windows: Stop calling SetProcessDEPPolicy() on 64-bit Windows

It is not supported, and always fails. Some compilers warn about the
function pointer cast on 64-bit Windows.

Fixes bug 27461; bugfix on 0.2.2.23-alpha.

7 years agohs: Silence a spurious warning in rend_client_send_introduction()
teor [Wed, 5 Sep 2018 11:07:58 +0000 (21:07 +1000)] 
hs: Silence a spurious warning in rend_client_send_introduction()

gcc 8 warns that extend_info_t.nickname might be truncated by strncpy().

But it doesn't know that nickname can either contain a hex id, or a
nicknames. hex ids are only used for general and HSDir circuits.

Fixes bug 27463; bugfix on 0.1.1.2-alpha.

7 years agoComment: Fix typos in get_interface_addresses_win32()
teor [Thu, 6 Sep 2018 03:07:10 +0000 (13:07 +1000)] 
Comment: Fix typos in get_interface_addresses_win32()

Closes 27521.

7 years agoWindows: Silence a spurious warning in the GetAdaptersAddresses cast
teor [Thu, 6 Sep 2018 03:11:23 +0000 (13:11 +1000)] 
Windows: Silence a spurious warning in the GetAdaptersAddresses cast

GetProcAddress() returns FARPROC, which is (long long int(*)()) on
64-bit Windows:
https://msdn.microsoft.com/en-us/library/windows/desktop/ms683212(v=vs.85).aspx

But GetAdaptersAddresses() is (long unsigned int(*)()), on both 32-bit
and 64-bit Windows:
https://docs.microsoft.com/en-us/windows/desktop/api/iphlpapi/nf-iphlpapi-getadaptersaddresses

So gcc 8 issues a spurious "incompatible function pointer" warning
about the cast to GetAdaptersAddresses_fn_t.

Silence this warning by casting to a void function pointer, before
the cast to GetAdaptersAddresses_fn_t.

This issue is already fixed by 26481 in 0.3.5 and later, by removing
the lookup and cast.

Fixes bug 27465; bugfix on 0.2.3.11-alpha.

7 years agoRevert "Avoid double-close on TCP sockets under NSS."
Nick Mathewson [Thu, 6 Sep 2018 14:53:29 +0000 (10:53 -0400)] 
Revert "Avoid double-close on TCP sockets under NSS."

This reverts commit b5fddbd24144a94580e50886cd07a82968a1b86c.

The commit here was supposed to be a solution for #27451 (fd
management with NSS), but instead it caused an assertion failure.

Fixes bug 27500; but not in any released Tor.

7 years agoMerge remote-tracking branch 'tor-github/pr/294'
Nick Mathewson [Thu, 6 Sep 2018 13:47:32 +0000 (09:47 -0400)] 
Merge remote-tracking branch 'tor-github/pr/294'

7 years agoChanges file for 25132
Nick Mathewson [Thu, 6 Sep 2018 13:31:39 +0000 (09:31 -0400)] 
Changes file for 25132

7 years agoMerge remote-tracking branch 'ageis/control-getinfo-uptime'
Nick Mathewson [Thu, 6 Sep 2018 13:30:55 +0000 (09:30 -0400)] 
Merge remote-tracking branch 'ageis/control-getinfo-uptime'

7 years agoMerge remote-tracking branch 'teor/ticket27467'
Nick Mathewson [Thu, 6 Sep 2018 13:24:47 +0000 (09:24 -0400)] 
Merge remote-tracking branch 'teor/ticket27467'

7 years agoRemove GetAdaptersAddresses_fn_t
teor [Thu, 6 Sep 2018 02:54:03 +0000 (12:54 +1000)] 
Remove GetAdaptersAddresses_fn_t

The code that used it was removed as part of the 26481 refactor.

Closes ticket 27467.

7 years agoBackport to older NSS, which does not have SEC_DerSignDataWithAlgorithmID
Nick Mathewson [Wed, 5 Sep 2018 20:49:15 +0000 (16:49 -0400)] 
Backport to older NSS, which does not have SEC_DerSignDataWithAlgorithmID

7 years agoFix checkspaces
Nick Mathewson [Wed, 5 Sep 2018 20:48:53 +0000 (16:48 -0400)] 
Fix checkspaces

7 years agoSuppress strict-prototypes warnings in one more batch of NSS headers
Nick Mathewson [Wed, 5 Sep 2018 20:36:18 +0000 (16:36 -0400)] 
Suppress strict-prototypes warnings in one more batch of NSS headers

7 years agoAdd a last-ditch memwipe() implementation for nss+old glibc
Nick Mathewson [Wed, 5 Sep 2018 20:34:01 +0000 (16:34 -0400)] 
Add a last-ditch memwipe() implementation for nss+old glibc

On new glibc versions, there's an explicit_bzero().  With openssl,
there's openssl_memwipe().

When no other approach works, use memwipe() and a memory barrier.

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Wed, 5 Sep 2018 14:16:11 +0000 (10:16 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Wed, 5 Sep 2018 14:16:06 +0000 (10:16 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Wed, 5 Sep 2018 14:15:45 +0000 (10:15 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

7 years agoMerge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Wed, 5 Sep 2018 14:15:42 +0000 (10:15 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.2

7 years agoMerge remote-tracking branch 'teor/bug27418-029' into maint-0.2.9
Nick Mathewson [Wed, 5 Sep 2018 14:14:56 +0000 (10:14 -0400)] 
Merge remote-tracking branch 'teor/bug27418-029' into maint-0.2.9

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Wed, 5 Sep 2018 14:01:31 +0000 (10:01 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge remote-tracking branch 'teor/ticket27449-034' into maint-0.3.4
Nick Mathewson [Wed, 5 Sep 2018 14:01:27 +0000 (10:01 -0400)] 
Merge remote-tracking branch 'teor/ticket27449-034' into maint-0.3.4

7 years agoMerge branch 'maint-0.3.2' into maint-0.3.3
Nick Mathewson [Wed, 5 Sep 2018 13:56:19 +0000 (09:56 -0400)] 
Merge branch 'maint-0.3.2' into maint-0.3.3

7 years agoMerge branch 'maint-0.2.9' into maint-0.3.2
Nick Mathewson [Wed, 5 Sep 2018 13:56:19 +0000 (09:56 -0400)] 
Merge branch 'maint-0.2.9' into maint-0.3.2

7 years agoMerge branch 'maint-0.3.4'
Nick Mathewson [Wed, 5 Sep 2018 13:56:19 +0000 (09:56 -0400)] 
Merge branch 'maint-0.3.4'

7 years agoMerge branch 'maint-0.3.3' into maint-0.3.4
Nick Mathewson [Wed, 5 Sep 2018 13:56:19 +0000 (09:56 -0400)] 
Merge branch 'maint-0.3.3' into maint-0.3.4

7 years agoFix a type, and hopefully the win64 builds.
Nick Mathewson [Wed, 5 Sep 2018 13:36:15 +0000 (09:36 -0400)] 
Fix a type, and hopefully the win64 builds.

7 years agoAdd note about use of tor_memcmp()
Nick Mathewson [Wed, 5 Sep 2018 13:11:53 +0000 (09:11 -0400)] 
Add note about use of tor_memcmp()

7 years agoFix a reverse-inull warning from coverity in new code.
Nick Mathewson [Wed, 5 Sep 2018 12:34:14 +0000 (08:34 -0400)] 
Fix a reverse-inull warning from coverity in new code.

7 years agoTry to fix new coverity warnings in unit tests.
Nick Mathewson [Wed, 5 Sep 2018 12:30:35 +0000 (08:30 -0400)] 
Try to fix new coverity warnings in unit tests.

7 years agoTravis: don't call echo with a --flag as the first argument
teor [Wed, 5 Sep 2018 03:30:17 +0000 (13:30 +1000)] 
Travis: don't call echo with a --flag as the first argument

When we use echo in Travis, don't pass a --flag as the first argument.

Fixes bug 27418; bugfix on 0.3.4.7-rc.

7 years agoAppveyor: tail config.log and cat test-suite.log after failed builds
teor [Wed, 5 Sep 2018 00:44:01 +0000 (10:44 +1000)] 
Appveyor: tail config.log and cat test-suite.log after failed builds

Also zip the full logs, and upload them as build artifacts.

Implements ticket 27430.

7 years agoTravis: when showing a log fails, keep trying to show other logs
teor [Wed, 5 Sep 2018 03:12:54 +0000 (13:12 +1000)] 
Travis: when showing a log fails, keep trying to show other logs

When a Travis build fails, and showing a log fails, keep trying to
show the other logs.

Fixes bug 27453; bugfix on 0.3.4.7-rc.

7 years agoAppveyor: always log the compiler path and version
teor [Wed, 5 Sep 2018 00:17:39 +0000 (10:17 +1000)] 
Appveyor: always log the compiler path and version

Implements 27449.

7 years agoDebug one last reference-counting issue that only appeared on openssl master
Nick Mathewson [Wed, 5 Sep 2018 00:46:46 +0000 (20:46 -0400)] 
Debug one last reference-counting issue that only appeared on openssl master

7 years agoFix an easy refcounting bug in a unit test
Nick Mathewson [Wed, 5 Sep 2018 00:25:25 +0000 (20:25 -0400)] 
Fix an easy refcounting bug in a unit test