]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
14 years agoforward-port the 0.2.1.31 release notes tor-0.2.2.34
Roger Dingledine [Thu, 27 Oct 2011 00:22:13 +0000 (20:22 -0400)] 
forward-port the 0.2.1.31 release notes

14 years agoadd a release blurb
Roger Dingledine [Thu, 27 Oct 2011 00:20:43 +0000 (20:20 -0400)] 
add a release blurb

14 years agobump to 0.2.2.34
Roger Dingledine [Wed, 26 Oct 2011 22:46:39 +0000 (18:46 -0400)] 
bump to 0.2.2.34

14 years agofold in changes entries
Roger Dingledine [Wed, 26 Oct 2011 22:44:58 +0000 (18:44 -0400)] 
fold in changes entries

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 22:35:30 +0000 (18:35 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoAdd option to give guard flag to relays without the CVE-2011-2768 fix
Robert Ransom [Tue, 25 Oct 2011 19:33:21 +0000 (12:33 -0700)] 
Add option to give guard flag to relays without the CVE-2011-2768 fix

This way, all of the DA operators can upgrade immediately, without nuking
every client's set of entry guards as soon as a majority of them upgrade.

Until enough guards have upgraded, a majority of dirauths should set this
config option so that there are still enough guards in the network. After
a few days pass, all dirauths should use the default.

14 years agoDon't give the Guard flag to relays without the CVE-2011-2768 fix
Robert Ransom [Tue, 25 Oct 2011 07:24:15 +0000 (00:24 -0700)] 
Don't give the Guard flag to relays without the CVE-2011-2768 fix

14 years agoMake tor_version_same_series non-static
Robert Ransom [Tue, 25 Oct 2011 06:36:57 +0000 (23:36 -0700)] 
Make tor_version_same_series non-static

14 years agoMerge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix
Sebastian Hahn [Wed, 26 Oct 2011 21:30:27 +0000 (23:30 +0200)] 
Merge branch 'maint-0.2.1_secfix' into maint-0.2.2_secfix

Conflicts:
src/or/connection_or.c

14 years agoReject create cells on outgoing OR connections from bridges
Robert Ransom [Sun, 23 Oct 2011 22:21:49 +0000 (15:21 -0700)] 
Reject create cells on outgoing OR connections from bridges

14 years agoMark which OR connections are outgoing
Robert Ransom [Sun, 23 Oct 2011 21:58:00 +0000 (14:58 -0700)] 
Mark which OR connections are outgoing

14 years agoDon't use any OR connection which sent us a CREATE_FAST cell for an EXTEND
Robert Ransom [Sun, 23 Oct 2011 21:27:56 +0000 (14:27 -0700)] 
Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND

Fix suggested by Nick Mathewson.

14 years agoDon't send a certificate chain on outgoing TLS connections from non-relays
Nick Mathewson [Sun, 23 Oct 2011 16:06:06 +0000 (16:06 +0000)] 
Don't send a certificate chain on outgoing TLS connections from non-relays

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 21:14:56 +0000 (17:14 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 21:14:39 +0000 (17:14 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoRemove the -F option from tor-resolve.
Nick Mathewson [Mon, 23 May 2011 20:59:41 +0000 (16:59 -0400)] 
Remove the -F option from tor-resolve.

It used to mean "Force": it would tell tor-resolve to ask tor to
resolve an address even if it ended with .onion.  But when
AutomapHostsOnResolve was added, automatically refusing to resolve
.onion hosts stopped making sense.  So in 0.2.1.16-rc (commit
298dc95dfd8), we made tor-resolve happy to resolve anything.

The -F option stayed in, though, even though it didn't do anything.
Oddly, it never got documented.

Found while fixing GCC 4.6 "set, unused variable" warnings.

14 years agomanually backport a5232e0c4c
Roger Dingledine [Wed, 26 Oct 2011 21:11:52 +0000 (17:11 -0400)] 
manually backport a5232e0c4c

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 20:35:09 +0000 (16:35 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 20:34:45 +0000 (16:34 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoalways more commits waiting!
Roger Dingledine [Wed, 26 Oct 2011 20:32:54 +0000 (16:32 -0400)] 
always more commits waiting!

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 20:31:58 +0000 (16:31 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agocloser to an 0.2.2.34 changelog
Roger Dingledine [Wed, 26 Oct 2011 20:25:03 +0000 (16:25 -0400)] 
closer to an 0.2.2.34 changelog

14 years agostop asserting at boot
Roger Dingledine [Tue, 31 May 2011 03:50:37 +0000 (23:50 -0400)] 
stop asserting at boot

The patch for 3228 made us try to run init_keys() before we had loaded
our state file, resulting in an assert inside init_keys. We had moved
it too early in the function.

Now it's later in the function, but still above the accounting calls.

14 years agoReinit keys at the start of options_act().
Nick Mathewson [Mon, 23 May 2011 20:38:35 +0000 (16:38 -0400)] 
Reinit keys at the start of options_act().

Previously we did this nearer to the end (in the old_options &&
transition_affects_workers() block).  But other stuff cares about
keys being consistent with options... particularly anything which
tries to access a key, which can die in assert_identity_keys_ok().

Fixes bug 3228; bugfix on 0.2.2.18-alpha.

Conflicts:

src/or/config.c

14 years agoDon't crash a bridge authority on SIGHUP if it's not in the consensus
Robert Ransom [Wed, 16 Feb 2011 12:12:37 +0000 (04:12 -0800)] 
Don't crash a bridge authority on SIGHUP if it's not in the consensus

Fixes bug 2572.

14 years agoFix assert for relay/bridge state change
Sebastian Hahn [Tue, 25 Jan 2011 14:28:58 +0000 (15:28 +0100)] 
Fix assert for relay/bridge state change

When we added support for separate client tls certs on bridges in
a2bb0bfdd5 we forgot to correctly initialize this when changing
from relay to bridge or vice versa while Tor is running. Fix that
by always initializing keys when the state changes.

Fixes bug 2433.

Conflicts:

src/or/config.c

14 years agoMerge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2
Nick Mathewson [Wed, 26 Oct 2011 15:07:28 +0000 (11:07 -0400)] 
Merge remote-tracking branch 'public/cov_run224_022' into maint-0.2.2

14 years agoDon't crash when accountingmax is set in non-server Tors
Nick Mathewson [Fri, 3 Dec 2010 18:37:13 +0000 (13:37 -0500)] 
Don't crash when accountingmax is set in non-server Tors

We use a hash of the identity key to seed a prng to tell when an
accounting period should end.  But thanks to the bug998 changes,
clients no longer have server-identity keys to use as a long-term seed
in accounting calculations.  In any case, their identity keys (as used
in TLS) were never never fixed.  So we can just set the wakeup time
from a random seed instead there.  Still open is whether everybody
should be random.

This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha.

Diagnosed with help from boboper on irc.

14 years agoProperly refcount client_identity_key
Sebastian Hahn [Tue, 26 Oct 2010 16:22:04 +0000 (18:22 +0200)] 
Properly refcount client_identity_key

In a2bb0bf we started using a separate client identity key. When we are
in "public server mode" (that means not a bridge) we will use the same
key. Reusing the key without doing the proper refcounting leads to a
segfault on cleanup during shutdown. Fix that.

Also introduce an assert that triggers if our refcount falls below 0.
That should never happen.

14 years agoAdd some asserts to get_{tlsclient|server}_identity_key
Nick Mathewson [Thu, 21 Oct 2010 17:54:12 +0000 (13:54 -0400)] 
Add some asserts to get_{tlsclient|server}_identity_key

We now require that:
  - Only actual servers should ever call get_server_identity_key
  - If you're being a client or bridge, the client and server keys should
    differ.
  - If you're being a public relay, the client and server keys
    should be the same.

14 years agoRename get_client_identity_key to get_tlsclient_identity_key
Nick Mathewson [Thu, 21 Oct 2010 17:53:31 +0000 (13:53 -0400)] 
Rename get_client_identity_key to get_tlsclient_identity_key

14 years agoMaintain separate server and client identity keys when appropriate.
Robert Ransom [Mon, 4 Oct 2010 05:38:53 +0000 (22:38 -0700)] 
Maintain separate server and client identity keys when appropriate.

Fixes a bug described in ticket #988.

Conflicts:

src/or/main.c
src/or/router.c

14 years agoMake crypto_free_pk_env tolerate NULL arg in 0.2.1. Error-proofing against bug 988...
Nick Mathewson [Sat, 13 Nov 2010 01:21:50 +0000 (20:21 -0500)] 
Make crypto_free_pk_env tolerate NULL arg in 0.2.1.  Error-proofing against bug 988 backport

14 years agoMaintain separate server and client TLS contexts.
Robert Ransom [Mon, 4 Oct 2010 01:14:08 +0000 (18:14 -0700)] 
Maintain separate server and client TLS contexts.

Fixes bug #988.

Conflicts:

src/or/main.c
src/or/router.c

14 years agoRefactor tor_tls_context_new:
Robert Ransom [Fri, 1 Oct 2010 21:06:57 +0000 (14:06 -0700)] 
Refactor tor_tls_context_new:

* Make tor_tls_context_new internal to tortls.c, and return the new
  tor_tls_context_t from it.

* Add a public tor_tls_context_init wrapper function to replace it.

Conflicts:

src/or/main.c
src/or/router.c

14 years agoAdd public_server_mode function.
Robert Ransom [Fri, 1 Oct 2010 07:07:10 +0000 (00:07 -0700)] 
Add public_server_mode function.

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 11:49:41 +0000 (07:49 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Wed, 26 Oct 2011 11:47:42 +0000 (07:47 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoFix zlib macro brokenness on osx with zlib 1.2.4 and higher.
Nick Mathewson [Tue, 8 Jun 2010 22:10:20 +0000 (18:10 -0400)] 
Fix zlib macro brokenness on osx with zlib 1.2.4 and higher.

From the code:
   zlib 1.2.4 and 1.2.5 do some "clever" things with macros.  Instead of
   saying "(defined(FOO) ? FOO : 0)" they like to say "FOO-0", on the theory
   that nobody will care if the compile outputs a no-such-identifier warning.

   Sorry, but we like -Werror over here, so I guess we need to define these.
   I hope that zlib 1.2.6 doesn't break these too.

Possible fix for bug 1526.

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Tue, 25 Oct 2011 23:34:20 +0000 (19:34 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agounmangle the fingerprint example in the man page
Roger Dingledine [Tue, 25 Oct 2011 22:24:37 +0000 (18:24 -0400)] 
unmangle the fingerprint example in the man page

Remove a confusing dollar sign from the example fingerprint in the
man page, and also make example fingerprint a valid one.

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Mon, 24 Oct 2011 06:36:01 +0000 (02:36 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoMerge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2
Nick Mathewson [Thu, 20 Oct 2011 04:01:58 +0000 (00:01 -0400)] 
Merge remote-tracking branch 'rransom-tor/bug4251-022' into maint-0.2.2

14 years agoFix crash when changing node restrictions with DNS lookup in progress
Nick Mathewson [Thu, 20 Oct 2011 03:14:05 +0000 (23:14 -0400)] 
Fix crash when changing node restrictions with DNS lookup in progress

Fixes bug 4259, bugfix on 0.2.2.25-alpha.  Bugfix by "Tey'".

Original message by submitter:

  Changing nodes restrictions using a controller while Tor is doing
  DNS resolution could makes Tor crashes (on WinXP at least). The
  problem can be repeated by trying to reach a non-existent domain
  using Tor:

    curl --socks4a 127.0.0.1:9050 inexistantdomain.ext

  .. and changing the ExitNodes parameter through the control port
  before Tor returns a DNS resolution error (of course, the following
  command won't work directly if the control port is password
  protected):

    echo SETCONF ExitNodes=TinyTurtle | nc -v 127.0.0.1 9051

  Using a non-existent domain is needed to repeat the issue so that
  Tor takes a few seconds for resolving the domain (which allows us to
  change the configuration). Tor will crash while processing the
  configuration change.

  The bug is located in the addressmap_clear_excluded_trackexithosts
  method which iterates over the entries of the addresses map in order
  to check whether the changes made to the configuration will impact
  those entries. When a DNS resolving is in progress, the new_adress
  field of the associated entry will be set to NULL. The method
  doesn't expect this field to be NULL, hence the crash.

14 years agoFree rend_data and intro_key when extra intro circs become general-purpose
Robert Ransom [Tue, 18 Oct 2011 14:08:02 +0000 (07:08 -0700)] 
Free rend_data and intro_key when extra intro circs become general-purpose

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Thu, 13 Oct 2011 14:14:16 +0000 (10:14 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoUpdate to the October 2011 GeoIP database.
Karsten Loesing [Thu, 13 Oct 2011 05:43:47 +0000 (07:43 +0200)] 
Update to the October 2011 GeoIP database.

14 years agoUpdate documentation comment for rend_client_reextend_intro_circuit
Robert Ransom [Mon, 10 Oct 2011 12:33:53 +0000 (05:33 -0700)] 
Update documentation comment for rend_client_reextend_intro_circuit

One of its callers assumes a non-zero result indicates a permanent failure
(i.e. the current attempt to connect to this HS either has failed or is
 doomed).  The other caller only requires that this function's result
never equal -2.

Bug reported by Sebastian Hahn.

14 years agoDon't launch a useless circuit in rend_client_reextend_intro_circuit
Robert Ransom [Mon, 10 Oct 2011 03:24:27 +0000 (20:24 -0700)] 
Don't launch a useless circuit in rend_client_reextend_intro_circuit

Fixes bug 4212.  Bug reported by katmagic and found by Sebastian.

14 years agoNote ticket and source version for feature3951 in changes file
Nick Mathewson [Fri, 7 Oct 2011 20:47:43 +0000 (16:47 -0400)] 
Note ticket and source version for feature3951 in changes file

14 years agoMerge remote-tracking branch 'karsten/feature3951' into maint-0.2.2
Nick Mathewson [Fri, 7 Oct 2011 20:46:50 +0000 (16:46 -0400)] 
Merge remote-tracking branch 'karsten/feature3951' into maint-0.2.2

14 years agoAvoid running DNS self-tests if we're operating as a bridge
warms0x [Fri, 7 Oct 2011 07:04:29 +0000 (07:04 +0000)] 
Avoid running DNS self-tests if we're operating as a bridge

14 years agoMake internal error check for unrecognized digest algorithm more robust
Nick Mathewson [Thu, 6 Oct 2011 17:02:50 +0000 (13:02 -0400)] 
Make internal error check for unrecognized digest algorithm more robust

Fixes Coverity CID 479.

14 years agoCheck return of init_keys() ip_address_changed: fix Coverity CID 484
Nick Mathewson [Thu, 6 Oct 2011 16:59:25 +0000 (12:59 -0400)] 
Check return of init_keys() ip_address_changed: fix Coverity CID 484

14 years agoTurn on directory request statistics by default.
Karsten Loesing [Tue, 9 Nov 2010 13:18:00 +0000 (14:18 +0100)] 
Turn on directory request statistics by default.

Change the default values for collecting directory request statistics and
inlcuding them in extra-info descriptors to 1.

Don't break if we are configured to collect directory request or entry
statistics and don't have a GeoIP database. Instead, print out a notice
and skip initializing the affected statistics code.

This is the cherry-picked 499661524b0a572303087af721325608dd91f7ce.

14 years agoLooks like Windows version 6.2 will be Windows 8
Sebastian Hahn [Sat, 1 Oct 2011 12:44:39 +0000 (14:44 +0200)] 
Looks like Windows version 6.2 will be Windows 8

Thanks to funkstar for the report

14 years agobridges should use create_fast cells for their own circuits
Roger Dingledine [Wed, 28 Sep 2011 19:35:27 +0000 (15:35 -0400)] 
bridges should use create_fast cells for their own circuits

fixes bug 4124, as noticed in bug 4115

14 years agobug 4115: make bridges use begindir for their dir fetches
Roger Dingledine [Wed, 28 Sep 2011 18:50:43 +0000 (14:50 -0400)] 
bug 4115: make bridges use begindir for their dir fetches

removes another avenue for enumerating bridges.

14 years agotrivial whitespace changes, take two
Roger Dingledine [Sun, 25 Sep 2011 02:46:21 +0000 (22:46 -0400)] 
trivial whitespace changes, take two

14 years agoTrivial whitespace fixes
Nick Mathewson [Sun, 25 Sep 2011 02:15:59 +0000 (22:15 -0400)] 
Trivial whitespace fixes

14 years agoAdd a changes file for Tom Lowenthal's patch for #4063
Nick Mathewson [Sun, 25 Sep 2011 02:15:13 +0000 (22:15 -0400)] 
Add a changes file for Tom Lowenthal's patch for #4063

14 years agoTicket #4063 - change circuit build timeout log entries from NOTICE to INFO
Tom Lowenthal [Sat, 24 Sep 2011 22:34:32 +0000 (15:34 -0700)] 
Ticket #4063 - change circuit build timeout log entries from NOTICE to INFO

14 years agochanges file for bug 4059
Nick Mathewson [Tue, 20 Sep 2011 13:56:26 +0000 (09:56 -0400)] 
changes file for bug 4059

14 years agoFix a potentially useless integer overflow check.
Mansour Moufid [Tue, 20 Sep 2011 01:25:23 +0000 (21:25 -0400)] 
Fix a potentially useless integer overflow check.

GCC 4.2 and maybe other compilers optimize away unsigned integer
overflow checks of the form (foo + bar < foo), for all bar.

Fix one such check in `src/common/OpenBSD_malloc_Linux.c'.

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Thu, 15 Sep 2011 20:34:47 +0000 (16:34 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

14 years agoUpdate to the September 2011 GeoIP database.
Karsten Loesing [Mon, 12 Sep 2011 09:40:26 +0000 (11:40 +0200)] 
Update to the September 2011 GeoIP database.

14 years agoprepare a release blurb tor-0.2.2.33
Roger Dingledine [Tue, 13 Sep 2011 23:08:47 +0000 (19:08 -0400)] 
prepare a release blurb

14 years agobump to 0.2.2.33
Roger Dingledine [Tue, 13 Sep 2011 22:42:16 +0000 (18:42 -0400)] 
bump to 0.2.2.33

14 years agofold in one more
Roger Dingledine [Tue, 13 Sep 2011 22:34:50 +0000 (18:34 -0400)] 
fold in one more

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Tue, 13 Sep 2011 22:34:12 +0000 (18:34 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoMerge branch 'maint-0.2.1' into maint-0.2.2
Roger Dingledine [Tue, 13 Sep 2011 22:27:13 +0000 (18:27 -0400)] 
Merge branch 'maint-0.2.1' into maint-0.2.2

Conflicts:
src/or/main.c
src/or/router.c

14 years agoGenerate our ssl session certs with a plausible lifetime
Roger Dingledine [Tue, 13 Sep 2011 22:24:45 +0000 (18:24 -0400)] 
Generate our ssl session certs with a plausible lifetime

Nobody but Tor uses certs on the wire with 2 hour lifetimes,
and it makes us stand out. Resolves ticket 4014.

14 years agofold in recent changelog entries
Roger Dingledine [Mon, 12 Sep 2011 10:04:08 +0000 (06:04 -0400)] 
fold in recent changelog entries

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Mon, 12 Sep 2011 09:55:17 +0000 (05:55 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoUpdate to the September 2011 GeoIP database.
Karsten Loesing [Mon, 12 Sep 2011 09:40:26 +0000 (11:40 +0200)] 
Update to the September 2011 GeoIP database.

14 years agoDemote 'INTRODUCE2 cell is too {old,new}' message to info level
Robert Ransom [Sun, 11 Sep 2011 01:40:09 +0000 (21:40 -0400)] 
Demote 'INTRODUCE2 cell is too {old,new}' message to info level

14 years agoDemote HS 'replay detected' log message for DH public keys to info level
Robert Ransom [Sun, 11 Sep 2011 00:54:26 +0000 (20:54 -0400)] 
Demote HS 'replay detected' log message for DH public keys to info level

14 years agoDescribe rend_service_descriptor_t more completely
Robert Ransom [Sat, 10 Sep 2011 23:09:01 +0000 (19:09 -0400)] 
Describe rend_service_descriptor_t more completely

14 years agoDescribe rend_intro_point_t more completely
Robert Ransom [Sat, 10 Sep 2011 23:05:53 +0000 (19:05 -0400)] 
Describe rend_intro_point_t more completely

14 years agoFix log message typo.
Robert Ransom [Sat, 10 Sep 2011 20:15:52 +0000 (16:15 -0400)] 
Fix log message typo.

14 years agotypos on line 1 of your changelog make you look dumb
Roger Dingledine [Fri, 9 Sep 2011 17:51:43 +0000 (13:51 -0400)] 
typos on line 1 of your changelog make you look dumb

14 years agofold in latest changes files
Roger Dingledine [Fri, 9 Sep 2011 17:43:40 +0000 (13:43 -0400)] 
fold in latest changes files

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Fri, 9 Sep 2011 17:15:19 +0000 (13:15 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoMerge remote-tracking branch 'public/gcc-295-fix' into maint-0.2.2
Nick Mathewson [Fri, 9 Sep 2011 16:54:27 +0000 (12:54 -0400)] 
Merge remote-tracking branch 'public/gcc-295-fix' into maint-0.2.2

14 years agoMerge remote-tracking branch 'public/enhance_replay_detection' into maint-0.2.2
Nick Mathewson [Fri, 9 Sep 2011 16:53:45 +0000 (12:53 -0400)] 
Merge remote-tracking branch 'public/enhance_replay_detection' into maint-0.2.2

14 years agoCheck for replays in PK-encrypted part of intro cell, not just in the g^x value
Nick Mathewson [Wed, 11 May 2011 01:40:10 +0000 (21:40 -0400)] 
Check for replays in PK-encrypted part of intro cell, not just in the g^x value

14 years agoAdd changes file for bsd4 fixes
Nick Mathewson [Fri, 9 Sep 2011 14:40:54 +0000 (10:40 -0400)] 
Add changes file for bsd4 fixes

14 years agoMerge remote-tracking branch 'public/bug2649_squashed' into maint-0.2.2
Nick Mathewson [Wed, 7 Sep 2011 18:43:06 +0000 (14:43 -0400)] 
Merge remote-tracking branch 'public/bug2649_squashed' into maint-0.2.2

14 years agoLook for correct "ar" to cross-compile
Nick Mathewson [Fri, 2 Sep 2011 15:51:49 +0000 (11:51 -0400)] 
Look for correct "ar" to cross-compile

For some reason, autoconf doesn't by default have an "AC_PROG_AR" for
this -- possibly it's assumed that any "ar" you have will work
everyplace.

Fixes bug 3909; found by sid77.

This fixes a build issue first present in fdbdb4dc1500, but the bug
(of not using a correct ar) has been in every Tor version ever: it
just didn't matter until then.

14 years agofold in changes files so far
Roger Dingledine [Wed, 7 Sep 2011 00:56:42 +0000 (20:56 -0400)] 
fold in changes files so far

14 years agoMerge branch 'maint-0.2.2' into release-0.2.2
Roger Dingledine [Wed, 7 Sep 2011 00:55:27 +0000 (20:55 -0400)] 
Merge branch 'maint-0.2.2' into release-0.2.2

14 years agoFix assertion in addressmap_clear_excluded_trackexithosts
Nick Mathewson [Wed, 7 Sep 2011 00:26:20 +0000 (20:26 -0400)] 
Fix assertion in addressmap_clear_excluded_trackexithosts

Fixes bug 3923; bugfix on 0.2.2.25-alpha; bugfix from 'laruldan' on trac.

14 years agoCorrect man page: multiple control auth styles can be set at once
Roger Dingledine [Fri, 2 Sep 2011 11:01:55 +0000 (07:01 -0400)] 
Correct man page: multiple control auth styles can be set at once

14 years agoCheck for lround with autoconf; fall back to rint.
Nick Mathewson [Wed, 31 Aug 2011 02:22:15 +0000 (22:22 -0400)] 
Check for lround with autoconf; fall back to rint.

14 years agoFix a compilation issue on older FreeBSDs
Sebastian Hahn [Wed, 31 Aug 2011 00:45:49 +0000 (20:45 -0400)] 
Fix a compilation issue on older FreeBSDs

14 years agoUse %f with printf-style formatting, not %lf
Nick Mathewson [Wed, 31 Aug 2011 00:42:51 +0000 (20:42 -0400)] 
Use %f with printf-style formatting, not %lf

For printf, %f and %lf are synonymous, since floats are promoted to
doubles when passed as varargs.  It's only for scanf that we need to
say "%lf" for doubles and "%f" for floats.

Apparenly, some older compilers think it's naughty to say %lf and like
to spew warnings about it.

Found by grarpamp.

14 years agoSwitch a SMARTLIST_FOREACH in circuitbuild.c to BEGIN/END
Nick Mathewson [Wed, 31 Aug 2011 00:35:17 +0000 (20:35 -0400)] 
Switch a SMARTLIST_FOREACH in circuitbuild.c to BEGIN/END

It had some cpp stuff inside, and older GCCs don't like preprocessor
directives inside macro arguments.

Found by grarpamp.

14 years agoupdate punctuation now that we've seen the source text tor-0.2.2.32
Roger Dingledine [Sat, 27 Aug 2011 19:05:58 +0000 (15:05 -0400)] 
update punctuation now that we've seen the source text

14 years agoexpand and relocate the dedication
Roger Dingledine [Fri, 26 Aug 2011 22:58:44 +0000 (18:58 -0400)] 
expand and relocate the dedication

14 years agoour windows ce support isn't actually support
Roger Dingledine [Fri, 26 Aug 2011 21:03:44 +0000 (17:03 -0400)] 
our windows ce support isn't actually support