]> git.ipfire.org Git - thirdparty/tor.git/log
thirdparty/tor.git
13 years agoMerge branch 'maint-0.2.1' into release-0.2.1 release-0.2.1
Roger Dingledine [Thu, 5 Jan 2012 11:43:13 +0000 (06:43 -0500)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agoadd a changes file for ticket 4825
Roger Dingledine [Thu, 5 Jan 2012 11:42:26 +0000 (06:42 -0500)] 
add a changes file for ticket 4825

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Thu, 5 Jan 2012 11:38:15 +0000 (06:38 -0500)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agoUpdate to the January 2012 GeoIP database.
Karsten Loesing [Thu, 5 Jan 2012 10:10:57 +0000 (11:10 +0100)] 
Update to the January 2012 GeoIP database.

13 years agoBug 4786 fix: don't convert EARLY to RELAY on v1 connections
Nick Mathewson [Tue, 27 Dec 2011 21:41:25 +0000 (16:41 -0500)] 
Bug 4786 fix: don't convert EARLY to RELAY on v1 connections

We used to do this as a workaround for older Tors, but now it's never
the correct thing to do (especially since anything that didn't
understand RELAY_EARLY is now deprecated hard).

13 years agoTweak changelog a little tor-0.2.1.32
Nick Mathewson [Thu, 15 Dec 2011 19:23:21 +0000 (14:23 -0500)] 
Tweak changelog a little

13 years agoCopy 0.2.1.32 changelog entry into releasenotes
Nick Mathewson [Thu, 15 Dec 2011 18:17:05 +0000 (13:17 -0500)] 
Copy 0.2.1.32 changelog entry into releasenotes

13 years agoBump the version to 0.2.1.32
Nick Mathewson [Thu, 15 Dec 2011 17:01:07 +0000 (12:01 -0500)] 
Bump the version to 0.2.1.32

13 years agoChangelog and blurb for 0.2.1.32
Nick Mathewson [Thu, 15 Dec 2011 16:38:00 +0000 (11:38 -0500)] 
Changelog and blurb for 0.2.1.32

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Nick Mathewson [Thu, 15 Dec 2011 16:35:23 +0000 (11:35 -0500)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agoAdd a fix for the buf_pullup bug that Vektor reported
Nick Mathewson [Wed, 14 Dec 2011 21:38:43 +0000 (16:38 -0500)] 
Add a fix for the buf_pullup bug that Vektor reported

13 years agoUpdate the release-0.2.1 changelog while I am at it
Nick Mathewson [Wed, 14 Dec 2011 21:09:13 +0000 (16:09 -0500)] 
Update the release-0.2.1 changelog while I am at it

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Nick Mathewson [Wed, 14 Dec 2011 21:06:03 +0000 (16:06 -0500)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agoUpdate to the December 2011 GeoIP database.
Karsten Loesing [Thu, 8 Dec 2011 08:55:44 +0000 (09:55 +0100)] 
Update to the December 2011 GeoIP database.

13 years agoMerge remote-tracking branch 'karsten/geoip-november2011' into maint-0.2.1
Nick Mathewson [Mon, 14 Nov 2011 16:10:10 +0000 (11:10 -0500)] 
Merge remote-tracking branch 'karsten/geoip-november2011' into maint-0.2.1

13 years agoUpdate to the November 2011 GeoIP database.
Karsten Loesing [Mon, 7 Nov 2011 13:23:48 +0000 (14:23 +0100)] 
Update to the November 2011 GeoIP database.

13 years agoAdd a changes file for 4410
Sebastian Hahn [Sun, 6 Nov 2011 16:24:09 +0000 (17:24 +0100)] 
Add a changes file for 4410

13 years agoFix remotely triggerable assert during ip decryption
Dan Rosenberg [Sun, 6 Nov 2011 16:23:14 +0000 (17:23 +0100)] 
Fix remotely triggerable assert during ip decryption

Fixes bug 4410.

13 years agominor cleanup on already published changelog text
Roger Dingledine [Fri, 28 Oct 2011 00:16:33 +0000 (20:16 -0400)] 
minor cleanup on already published changelog text

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Fri, 28 Oct 2011 00:02:58 +0000 (20:02 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agobump maint to 0.2.1.31
Roger Dingledine [Fri, 28 Oct 2011 00:01:58 +0000 (20:01 -0400)] 
bump maint to 0.2.1.31

13 years agoslight tweak to text tor-0.2.1.31
Roger Dingledine [Wed, 26 Oct 2011 22:24:05 +0000 (18:24 -0400)] 
slight tweak to text

13 years agoopt for a short and sweet release blurb for 0.2.1.31.
Roger Dingledine [Wed, 26 Oct 2011 22:09:28 +0000 (18:09 -0400)] 
opt for a short and sweet release blurb for 0.2.1.31.

anybody who's reading it to decide whether to use it should not be
using it.

13 years agobump to 0.2.1.31
Roger Dingledine [Wed, 26 Oct 2011 22:03:26 +0000 (18:03 -0400)] 
bump to 0.2.1.31

13 years agofold in changes files
Roger Dingledine [Wed, 26 Oct 2011 22:02:13 +0000 (18:02 -0400)] 
fold in changes files

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Wed, 26 Oct 2011 21:41:24 +0000 (17:41 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agoReject create cells on outgoing OR connections from bridges
Robert Ransom [Sun, 23 Oct 2011 22:21:49 +0000 (15:21 -0700)] 
Reject create cells on outgoing OR connections from bridges

13 years agoMark which OR connections are outgoing
Robert Ransom [Sun, 23 Oct 2011 21:58:00 +0000 (14:58 -0700)] 
Mark which OR connections are outgoing

13 years agomerge in more changes entries
Roger Dingledine [Wed, 26 Oct 2011 21:21:07 +0000 (17:21 -0400)] 
merge in more changes entries

13 years agoDon't use any OR connection which sent us a CREATE_FAST cell for an EXTEND
Robert Ransom [Sun, 23 Oct 2011 21:27:56 +0000 (14:27 -0700)] 
Don't use any OR connection which sent us a CREATE_FAST cell for an EXTEND

Fix suggested by Nick Mathewson.

13 years agoDon't send a certificate chain on outgoing TLS connections from non-relays
Nick Mathewson [Sun, 23 Oct 2011 16:06:06 +0000 (16:06 +0000)] 
Don't send a certificate chain on outgoing TLS connections from non-relays

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Wed, 26 Oct 2011 21:13:18 +0000 (17:13 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agoRemove the -F option from tor-resolve.
Nick Mathewson [Mon, 23 May 2011 20:59:41 +0000 (16:59 -0400)] 
Remove the -F option from tor-resolve.

It used to mean "Force": it would tell tor-resolve to ask tor to
resolve an address even if it ended with .onion.  But when
AutomapHostsOnResolve was added, automatically refusing to resolve
.onion hosts stopped making sense.  So in 0.2.1.16-rc (commit
298dc95dfd8), we made tor-resolve happy to resolve anything.

The -F option stayed in, though, even though it didn't do anything.
Oddly, it never got documented.

Found while fixing GCC 4.6 "set, unused variable" warnings.

13 years agomanually backport a5232e0c4c
Roger Dingledine [Wed, 26 Oct 2011 21:11:52 +0000 (17:11 -0400)] 
manually backport a5232e0c4c

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Wed, 26 Oct 2011 20:34:20 +0000 (16:34 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agostop asserting at boot
Roger Dingledine [Tue, 31 May 2011 03:50:37 +0000 (23:50 -0400)] 
stop asserting at boot

The patch for 3228 made us try to run init_keys() before we had loaded
our state file, resulting in an assert inside init_keys. We had moved
it too early in the function.

Now it's later in the function, but still above the accounting calls.

13 years agoReinit keys at the start of options_act().
Nick Mathewson [Mon, 23 May 2011 20:38:35 +0000 (16:38 -0400)] 
Reinit keys at the start of options_act().

Previously we did this nearer to the end (in the old_options &&
transition_affects_workers() block).  But other stuff cares about
keys being consistent with options... particularly anything which
tries to access a key, which can die in assert_identity_keys_ok().

Fixes bug 3228; bugfix on 0.2.2.18-alpha.

Conflicts:

src/or/config.c

13 years agoDon't crash a bridge authority on SIGHUP if it's not in the consensus
Robert Ransom [Wed, 16 Feb 2011 12:12:37 +0000 (04:12 -0800)] 
Don't crash a bridge authority on SIGHUP if it's not in the consensus

Fixes bug 2572.

13 years agoFix assert for relay/bridge state change
Sebastian Hahn [Tue, 25 Jan 2011 14:28:58 +0000 (15:28 +0100)] 
Fix assert for relay/bridge state change

When we added support for separate client tls certs on bridges in
a2bb0bfdd5 we forgot to correctly initialize this when changing
from relay to bridge or vice versa while Tor is running. Fix that
by always initializing keys when the state changes.

Fixes bug 2433.

Conflicts:

src/or/config.c

13 years agoDon't crash when accountingmax is set in non-server Tors
Nick Mathewson [Fri, 3 Dec 2010 18:37:13 +0000 (13:37 -0500)] 
Don't crash when accountingmax is set in non-server Tors

We use a hash of the identity key to seed a prng to tell when an
accounting period should end.  But thanks to the bug998 changes,
clients no longer have server-identity keys to use as a long-term seed
in accounting calculations.  In any case, their identity keys (as used
in TLS) were never never fixed.  So we can just set the wakeup time
from a random seed instead there.  Still open is whether everybody
should be random.

This patch fixes bug 2235, which was introduced in 0.2.2.18-alpha.

Diagnosed with help from boboper on irc.

13 years agoProperly refcount client_identity_key
Sebastian Hahn [Tue, 26 Oct 2010 16:22:04 +0000 (18:22 +0200)] 
Properly refcount client_identity_key

In a2bb0bf we started using a separate client identity key. When we are
in "public server mode" (that means not a bridge) we will use the same
key. Reusing the key without doing the proper refcounting leads to a
segfault on cleanup during shutdown. Fix that.

Also introduce an assert that triggers if our refcount falls below 0.
That should never happen.

13 years agoAdd some asserts to get_{tlsclient|server}_identity_key
Nick Mathewson [Thu, 21 Oct 2010 17:54:12 +0000 (13:54 -0400)] 
Add some asserts to get_{tlsclient|server}_identity_key

We now require that:
  - Only actual servers should ever call get_server_identity_key
  - If you're being a client or bridge, the client and server keys should
    differ.
  - If you're being a public relay, the client and server keys
    should be the same.

13 years agoRename get_client_identity_key to get_tlsclient_identity_key
Nick Mathewson [Thu, 21 Oct 2010 17:53:31 +0000 (13:53 -0400)] 
Rename get_client_identity_key to get_tlsclient_identity_key

13 years agoMaintain separate server and client identity keys when appropriate.
Robert Ransom [Mon, 4 Oct 2010 05:38:53 +0000 (22:38 -0700)] 
Maintain separate server and client identity keys when appropriate.

Fixes a bug described in ticket #988.

Conflicts:

src/or/main.c
src/or/router.c

13 years agoMake crypto_free_pk_env tolerate NULL arg in 0.2.1. Error-proofing against bug 988...
Nick Mathewson [Sat, 13 Nov 2010 01:21:50 +0000 (20:21 -0500)] 
Make crypto_free_pk_env tolerate NULL arg in 0.2.1.  Error-proofing against bug 988 backport

13 years agoMaintain separate server and client TLS contexts.
Robert Ransom [Mon, 4 Oct 2010 01:14:08 +0000 (18:14 -0700)] 
Maintain separate server and client TLS contexts.

Fixes bug #988.

Conflicts:

src/or/main.c
src/or/router.c

13 years agoRefactor tor_tls_context_new:
Robert Ransom [Fri, 1 Oct 2010 21:06:57 +0000 (14:06 -0700)] 
Refactor tor_tls_context_new:

* Make tor_tls_context_new internal to tortls.c, and return the new
  tor_tls_context_t from it.

* Add a public tor_tls_context_init wrapper function to replace it.

Conflicts:

src/or/main.c
src/or/router.c

13 years agoAdd public_server_mode function.
Robert Ransom [Fri, 1 Oct 2010 07:07:10 +0000 (00:07 -0700)] 
Add public_server_mode function.

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Wed, 26 Oct 2011 11:39:01 +0000 (07:39 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agoFix zlib macro brokenness on osx with zlib 1.2.4 and higher.
Nick Mathewson [Tue, 8 Jun 2010 22:10:20 +0000 (18:10 -0400)] 
Fix zlib macro brokenness on osx with zlib 1.2.4 and higher.

From the code:
   zlib 1.2.4 and 1.2.5 do some "clever" things with macros.  Instead of
   saying "(defined(FOO) ? FOO : 0)" they like to say "FOO-0", on the theory
   that nobody will care if the compile outputs a no-such-identifier warning.

   Sorry, but we like -Werror over here, so I guess we need to define these.
   I hope that zlib 1.2.6 doesn't break these too.

Possible fix for bug 1526.

13 years agocatch up on changes files
Roger Dingledine [Mon, 24 Oct 2011 06:34:29 +0000 (02:34 -0400)] 
catch up on changes files

13 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Mon, 24 Oct 2011 06:25:33 +0000 (02:25 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

13 years agoUpdate to the October 2011 GeoIP database.
Karsten Loesing [Thu, 13 Oct 2011 05:43:47 +0000 (07:43 +0200)] 
Update to the October 2011 GeoIP database.

13 years agoUpdate to the September 2011 GeoIP database.
Karsten Loesing [Mon, 12 Sep 2011 09:40:26 +0000 (11:40 +0200)] 
Update to the September 2011 GeoIP database.

13 years agoGenerate our ssl session certs with a plausible lifetime
Roger Dingledine [Tue, 13 Sep 2011 22:24:45 +0000 (18:24 -0400)] 
Generate our ssl session certs with a plausible lifetime

Nobody but Tor uses certs on the wire with 2 hour lifetimes,
and it makes us stand out. Resolves ticket 4014.

14 years agoUpdate to the August 2011 GeoIP database.
Karsten Loesing [Mon, 8 Aug 2011 14:57:01 +0000 (16:57 +0200)] 
Update to the August 2011 GeoIP database.

14 years agoupdate to the july 2011 geoip db
Roger Dingledine [Thu, 7 Jul 2011 17:28:36 +0000 (13:28 -0400)] 
update to the july 2011 geoip db

14 years agoMerge branches 'cov217_021' and 'cid_450' into maint-0.2.1
Nick Mathewson [Fri, 1 Jul 2011 16:54:51 +0000 (12:54 -0400)] 
Merge branches 'cov217_021' and 'cid_450' into maint-0.2.1

14 years agoUse strlcpy in create_unix_sockaddr()
Nick Mathewson [Fri, 1 Jul 2011 16:06:54 +0000 (12:06 -0400)] 
Use strlcpy in create_unix_sockaddr()

Using strncpy meant that if listenaddress were ever >=
sizeof(sockaddr_un.sun_path), we would fail to nul-terminate
sun_path.  This isn't a big deal: we never read sun_path, and the
kernel is smart enough to reject the sockaddr_un if it isn't
nul-terminated.  Nonetheless, it's a dumb failure mode.  Instead, we
should reject addresses that don't fit in sockaddr_un.sun_path.

Coverity found this; it's CID 428.  Bugfix on 0.2.0.3-alpha.

14 years agoFix a rare memory leak in rend_cache_store
Nick Mathewson [Fri, 1 Jul 2011 15:52:39 +0000 (11:52 -0400)] 
Fix a rare memory leak in rend_cache_store

When we rejected a descriptor for not being the one we wanted, we
were letting the parsed descriptor go out of scope.

Found by Coverity; CID # 30.

Bugfix on 0.2.1.26.

(No changes file yet, since this is not in any 0.2.1.x release.)

14 years agoFix insanely large stack_allocation in log_credential_status
Nick Mathewson [Fri, 1 Jul 2011 16:36:33 +0000 (12:36 -0400)] 
Fix insanely large stack_allocation in log_credential_status

I'm not one to insist on C's miserly stack limits, but allocating a
256K array on the stack is too much even for me.

Bugfix on 0.2.1.7-alpha.  Found by coverity.  Fixes CID # 450.

14 years agoAbandon rendezvous circuits on SIGNAL NEWNYM
Robert Ransom [Fri, 10 Jun 2011 02:56:40 +0000 (19:56 -0700)] 
Abandon rendezvous circuits on SIGNAL NEWNYM

14 years agomove to the june 1 2011 maxmind geoip db
Roger Dingledine [Sun, 5 Jun 2011 15:12:28 +0000 (11:12 -0400)] 
move to the june 1 2011 maxmind geoip db

14 years agoFix typo in changes/bug2574. Thanks, rransom
Nick Mathewson [Sat, 28 May 2011 06:13:04 +0000 (02:13 -0400)] 
Fix typo in changes/bug2574. Thanks, rransom

14 years agoMerge branch 'bug2574' into maint-0.2.1
Nick Mathewson [Sat, 28 May 2011 06:07:48 +0000 (02:07 -0400)] 
Merge branch 'bug2574' into maint-0.2.1

14 years agoWork correctly if your nameserver is ::1
Nick Mathewson [Mon, 23 May 2011 21:42:38 +0000 (17:42 -0400)] 
Work correctly if your nameserver is ::1

We had all the code in place to handle this right... except that we
were unconditionally opening a PF_INET socket instead of looking at
sa_family.  Ow.

Fixes bug 2574; not a bugfix on any particular version, since this
never worked before.

14 years agofold in new changes entries
Roger Dingledine [Mon, 16 May 2011 23:35:28 +0000 (19:35 -0400)] 
fold in new changes entries

14 years agoMerge remote-tracking branch 'origin/maint-0.2.1' into release-0.2.1
Nick Mathewson [Mon, 16 May 2011 20:42:05 +0000 (16:42 -0400)] 
Merge remote-tracking branch 'origin/maint-0.2.1' into release-0.2.1

14 years agorm files for changes merged in all of release021, release022, master
Nick Mathewson [Mon, 16 May 2011 20:17:35 +0000 (16:17 -0400)] 
rm files for changes merged in all of release021, release022, master

14 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Nick Mathewson [Mon, 16 May 2011 18:55:14 +0000 (14:55 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

14 years agosquash! Add crypto_pk_check_key_public_exponent function
Nick Mathewson [Mon, 16 May 2011 18:44:23 +0000 (14:44 -0400)] 
squash! Add crypto_pk_check_key_public_exponent function

Rename crypto_pk_check_key_public_exponent to crypto_pk_public_exponent_ok:
it's nice to name predicates s.t. you can tell how to interpret true
and false.

14 years agoRequire that certain public keys have public exponent 65537
Robert Ransom [Thu, 28 Apr 2011 21:35:03 +0000 (14:35 -0700)] 
Require that certain public keys have public exponent 65537

14 years agoAdd crypto_pk_check_key_public_exponent function
Robert Ransom [Thu, 28 Apr 2011 19:13:03 +0000 (12:13 -0700)] 
Add crypto_pk_check_key_public_exponent function

14 years agoCheck fetched rendezvous descriptors' service IDs
Robert Ransom [Wed, 27 Apr 2011 20:37:08 +0000 (13:37 -0700)] 
Check fetched rendezvous descriptors' service IDs

14 years agoFixup whitespace issues from 3122 commit
Nick Mathewson [Mon, 16 May 2011 00:06:36 +0000 (20:06 -0400)] 
Fixup whitespace issues from 3122 commit

14 years agoAnother doc tweak on tor_memcmp: <b>b</b>, not <b>.
Nick Mathewson [Sun, 15 May 2011 23:56:05 +0000 (19:56 -0400)] 
Another doc tweak on tor_memcmp: <b>b</b>, not <b>.

14 years agominor tweaks to 4b19730c8234d
Roger Dingledine [Sun, 15 May 2011 23:20:42 +0000 (19:20 -0400)] 
minor tweaks to 4b19730c8234d

14 years agofold in latest changes entries
Roger Dingledine [Sat, 14 May 2011 04:21:12 +0000 (00:21 -0400)] 
fold in latest changes entries

14 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Sat, 14 May 2011 03:37:50 +0000 (23:37 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

14 years agoMerge remote-tracking branch 'public/bug3122_memcmp_squashed' into maint-0.2.1
Nick Mathewson [Thu, 12 May 2011 23:20:40 +0000 (19:20 -0400)] 
Merge remote-tracking branch 'public/bug3122_memcmp_squashed' into maint-0.2.1

14 years agoMerge branch 'bug3135' into maint-0.2.1
Nick Mathewson [Thu, 12 May 2011 02:49:44 +0000 (22:49 -0400)] 
Merge branch 'bug3135' into maint-0.2.1

14 years agoFix crash when read_file_to_string() fails in SAVECONF
Nick Mathewson [Thu, 12 May 2011 02:05:41 +0000 (22:05 -0400)] 
Fix crash when read_file_to_string() fails in SAVECONF

The new behavior is to try to rename the old file if there is one there
that we can't read.  In all likelihood, that will fail too, but at least
we tried, and at least it won't crash.

14 years agoHand-conversion and audit phase of memcmp transition
Nick Mathewson [Tue, 10 May 2011 20:58:38 +0000 (16:58 -0400)] 
Hand-conversion and audit phase of memcmp transition

Here I looked at the results of the automated conversion and cleaned
them up as follows:

   If there was a tor_memcmp or tor_memeq that was in fact "safe"[*] I
   changed it to a fast_memcmp or fast_memeq.

   Otherwise if there was a tor_memcmp that could turn into a
   tor_memneq or tor_memeq, I converted it.

This wants close attention.

[*] I'm erring on the side of caution here, and leaving some things
as tor_memcmp that could in my opinion use the data-dependent
fast_memcmp variant.

14 years agoAutomated conversion of memcmp to tor_memcmp/tor_mem[n]eq
Nick Mathewson [Tue, 10 May 2011 20:23:43 +0000 (16:23 -0400)] 
Automated conversion of memcmp to tor_memcmp/tor_mem[n]eq

This commit is _exactly_ the result of

perl -i -pe 's/\bmemcmp\(/tor_memcmp\(/g' src/*/*.[ch]
perl -i -pe 's/\!\s*tor_memcmp\(/tor_memeq\(/g' src/*/*.[ch]
perl -i -pe 's/0\s*==\s*tor_memcmp\(/tor_memeq\(/g' src/*/*.[ch]
perl -i -pe 's/0\s*!=\s*tor_memcmp\(/tor_memneq\(/g' src/*/*.[ch]
git checkout src/common/di_ops.[ch]
git checkout src/or/test.c
git checkout src/common/test.h

14 years agoAdd a "di_ops.h" include to util.h
Nick Mathewson [Tue, 10 May 2011 20:19:58 +0000 (16:19 -0400)] 
Add a "di_ops.h" include to util.h

14 years agoAdd a data-independent variant of memcmp and a d-i memeq function.
Nick Mathewson [Mon, 9 May 2011 22:39:23 +0000 (18:39 -0400)] 
Add a data-independent variant of memcmp and a d-i memeq function.

The tor_memcmp code is by Robert Ransom, and the tor_memeq code is
by me.  Both incorporate some ideas from DJB's stuff.

14 years agofold in changes file
Roger Dingledine [Wed, 11 May 2011 03:05:37 +0000 (23:05 -0400)] 
fold in changes file

14 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Wed, 11 May 2011 03:05:03 +0000 (23:05 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

14 years agoUpdate to the May 1 2011 Maxmind GeoLite Country database
Roger Dingledine [Wed, 11 May 2011 03:04:11 +0000 (23:04 -0400)] 
Update to the May 1 2011 Maxmind GeoLite Country database

14 years agofold in changes files for 0.2.1.31
Roger Dingledine [Wed, 11 May 2011 02:36:29 +0000 (22:36 -0400)] 
fold in changes files for 0.2.1.31

14 years agoMerge branch 'maint-0.2.1' into release-0.2.1
Roger Dingledine [Wed, 11 May 2011 01:26:01 +0000 (21:26 -0400)] 
Merge branch 'maint-0.2.1' into release-0.2.1

14 years agoFix a failure case of connection_ap_handshake_attach_circuit()
Sebastian Hahn [Wed, 27 Apr 2011 23:48:25 +0000 (01:48 +0200)] 
Fix a failure case of connection_ap_handshake_attach_circuit()

tor_fragile_assert() might be a no-op, so we have to return something
here to indicate failure to the caller.

14 years agoFix a bug introduced by purging rend_cache on NEWNYM
Robert Ransom [Mon, 25 Apr 2011 13:38:35 +0000 (06:38 -0700)] 
Fix a bug introduced by purging rend_cache on NEWNYM

If the user sent a SIGNAL NEWNYM command after we fetched a rendezvous
descriptor, while we were building the introduction-point circuit, we
would give up entirely on trying to connect to the hidden service.

Original patch by rransom slightly edited to go into 0.2.1

14 years agoAllow rend_client_send_introduction to fail transiently
Robert Ransom [Mon, 25 Apr 2011 15:36:02 +0000 (08:36 -0700)] 
Allow rend_client_send_introduction to fail transiently

i.e. without closing the AP connection.

14 years agoForget all rendezvous client state on SIGNAL NEWNYM
Robert Ransom [Wed, 20 Apr 2011 09:27:58 +0000 (02:27 -0700)] 
Forget all rendezvous client state on SIGNAL NEWNYM

14 years agoMake SIZE_T_CEILING unsigned; add a signed SSIZE_T_CEILING
Nick Mathewson [Tue, 26 Apr 2011 17:00:46 +0000 (13:00 -0400)] 
Make SIZE_T_CEILING unsigned; add a signed SSIZE_T_CEILING

None of the comparisons were _broken_ previously, but avoiding
signed/unsigned comparisons makes everybody happier.

Fixes bug2475.

14 years agoFix a bug in removing DNSPort requests from their circular list
Nick Mathewson [Thu, 21 Apr 2011 17:39:00 +0000 (13:39 -0400)] 
Fix a bug in removing DNSPort requests from their circular list

Under heavy load, this could result in an assertion failure.  Fix for
bug 2933; bugfix on 0.2.0.10-alpha.

14 years agoMerge remote-tracking branch 'rransom/bug2750-v3' into maint-0.2.1
Nick Mathewson [Tue, 19 Apr 2011 16:30:50 +0000 (12:30 -0400)] 
Merge remote-tracking branch 'rransom/bug2750-v3' into maint-0.2.1

14 years agoOuch: correctly tabify the micro-revision.i target in Makefile.am (0.2.1 only)
Nick Mathewson [Tue, 19 Apr 2011 16:29:20 +0000 (12:29 -0400)] 
Ouch: correctly tabify the micro-revision.i target in Makefile.am (0.2.1 only)

14 years agoAdd an XXX
Robert Ransom [Mon, 18 Apr 2011 20:25:48 +0000 (13:25 -0700)] 
Add an XXX