tor/src
Peter Palfrader 36b06be738 Add (SOCK_DGRAM, IPPROTO_UDP) sockets to the sandboxing whitelist
If we did not find a non-private IPaddress by iterating over interfaces,
we would try to get one via
get_interface_address6_via_udp_socket_hack().  This opens a datagram
socket with IPPROTO_UDP.  Previously all our datagram sockets (via
libevent) used IPPROTO_IP, so we did not have that in the sandboxing
whitelist.  Add (SOCK_DGRAM, IPPROTO_UDP) sockets to the sandboxing
whitelist.  Fixes bug 19660.
2016-07-11 09:37:01 +02:00
..
common Add (SOCK_DGRAM, IPPROTO_UDP) sockets to the sandboxing whitelist 2016-07-11 09:37:01 +02:00
config Merge branch 'maint-0.2.6' into maint-0.2.7 2016-06-13 10:48:56 -04:00
ext Fix keccak-tiny portability on exotic platforms. 2016-05-03 16:12:07 -04:00
or When checking if a routerstatus is reachable, don't check the node 2016-07-06 14:46:22 +10:00
test Repair unit test that assumed we have 9 dirauths. 2016-07-05 12:52:19 -04:00
tools Bug19499: Fix GCC warnings when building against bleeding edge OpenSSL. 2016-06-24 22:20:41 +00:00
trunnel Update to trunnel 1.4.4 to fix 18373 2016-02-22 14:19:29 -05:00
win32 Bump maint-0.2.8 to 0.2.8.5-rc-dev 2016-07-07 12:43:52 -04:00
include.am Use trunnel for crypto_pwbox encoding/decoding. 2014-09-25 11:58:14 -04:00