mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 21:23:58 +01:00
Merge branch 'maint-0.3.5'
This commit is contained in:
commit
7f59b9fb1f
4
changes/bug29040
Normal file
4
changes/bug29040
Normal file
@ -0,0 +1,4 @@
|
||||
o Minor bugfixes (onion services):
|
||||
- Avoid crashing if ClientOnionAuthDir (incorrectly) contains
|
||||
more than one private key for a hidden service. Fixes bug 29040;
|
||||
bugfix on 0.3.5.1-alpha.
|
@ -1056,10 +1056,14 @@ config_free_all(void)
|
||||
* (We return "[scrubbed]" if SafeLogging is "1", and address otherwise.)
|
||||
*/
|
||||
const char *
|
||||
safe_str_client(const char *address)
|
||||
safe_str_client_opts(const or_options_t *options, const char *address)
|
||||
{
|
||||
tor_assert(address);
|
||||
if (get_options()->SafeLogging_ == SAFELOG_SCRUB_ALL)
|
||||
if (!options) {
|
||||
options = get_options();
|
||||
}
|
||||
|
||||
if (options->SafeLogging_ == SAFELOG_SCRUB_ALL)
|
||||
return "[scrubbed]";
|
||||
else
|
||||
return address;
|
||||
@ -1073,10 +1077,14 @@ safe_str_client(const char *address)
|
||||
* otherwise.)
|
||||
*/
|
||||
const char *
|
||||
safe_str(const char *address)
|
||||
safe_str_opts(const or_options_t *options, const char *address)
|
||||
{
|
||||
tor_assert(address);
|
||||
if (get_options()->SafeLogging_ != SAFELOG_SCRUB_NONE)
|
||||
if (!options) {
|
||||
options = get_options();
|
||||
}
|
||||
|
||||
if (options->SafeLogging_ != SAFELOG_SCRUB_NONE)
|
||||
return "[scrubbed]";
|
||||
else
|
||||
return address;
|
||||
|
@ -141,6 +141,16 @@ MOCK_DECL(char *,
|
||||
#define get_cachedir_fname_suffix(sub1, suffix) \
|
||||
options_get_cachedir_fname2_suffix(get_options(), (sub1), NULL, (suffix))
|
||||
|
||||
#define safe_str_client(address) \
|
||||
safe_str_client_opts(NULL, address)
|
||||
#define safe_str(address) \
|
||||
safe_str_opts(NULL, address)
|
||||
|
||||
const char * safe_str_client_opts(const or_options_t *options,
|
||||
const char *address);
|
||||
const char * safe_str_opts(const or_options_t *options,
|
||||
const char *address);
|
||||
|
||||
int using_default_dir_authorities(const or_options_t *options);
|
||||
|
||||
int create_keys_directory(const or_options_t *options);
|
||||
|
@ -1637,17 +1637,17 @@ hs_config_client_authorization(const or_options_t *options,
|
||||
* as a key of global map in the future. */
|
||||
if (hs_parse_address(auth->onion_address, &identity_pk,
|
||||
NULL, NULL) < 0) {
|
||||
client_service_authorization_free(auth);
|
||||
log_warn(LD_REND, "The onion address \"%s\" is invalid in "
|
||||
"file %s", filename, auth->onion_address);
|
||||
client_service_authorization_free(auth);
|
||||
continue;
|
||||
}
|
||||
|
||||
if (digest256map_get(auths, identity_pk.pubkey)) {
|
||||
client_service_authorization_free(auth);
|
||||
log_warn(LD_REND, "Duplicate authorization for the same hidden "
|
||||
"service address %s.",
|
||||
safe_str_client(auth->onion_address));
|
||||
safe_str_client_opts(options, auth->onion_address));
|
||||
client_service_authorization_free(auth);
|
||||
goto end;
|
||||
}
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user