Permalink
split-hs-intro…
Commits on Dec 5, 2015
-
Basic tests for the handoff code: let's make sure we can encode them
Decoding tests will follow later
-
-
-
-
-
Some progress towards the prop 255 implemenatation
It works... but I think it needs more code still
-
Commits on Dec 1, 2015
-
-
-
Fix undefined behavior caused by memory overlap
The tor_cert_get_checkable_sig function uses the signing key included in the certificate (if available) when a separate public key is not given. When the signature is valid, the tor_cert_checksig function copies the public key from the checkable structure to the public key field of the certificate signing key. In situations where the separate public key is not given but the certificate includes a signing key, the source and destination pointers in the copy operation are equal and invoke undefined behavior. Undefined behaviour is avoided by ensuring both pointers are different.
Commits on Nov 30, 2015
Commits on Nov 27, 2015
-
-
-
-
-
Fix use-after-free of stack memory in policies_parse_exit_policy*
Change the function names & comments to make the copying explicit.
-
Commits on Nov 26, 2015
-
-
Unit test the full length of SHA256 and SHA512 digests
Bugfix on a tor version before the refactoring in git commit cea1225 (23 Sep 2009). Patch by "teor".
-
-
Fix buffer size in sha512 unit test
Nobody likes a stack overflow, even in unit tests. Closes 17699; but not in any released tor.
-
Fix test_tortls.c to no longer test failing crypto_rand.
(crypto_rand is no longer allowed to fail.) Closes bug 17686; bug not in any released tor. (No backport, since the tortls tests aren't in 0.2.7)
-
-
-
Add unit tests that check for common RNG failure modes
Check that crypto_rand doesn't return all zeroes, identical values, or incrementing values (OpenSSL's rand_predictable feature).
-
-
-
-