Merge pull request #7313
0331aa3
Fixing typos on security-check.py and torcontrol.cpp (calebogden)
This commit is contained in:
commit
5e00147838
2 changed files with 7 additions and 7 deletions
|
@ -1,7 +1,7 @@
|
||||||
#!/usr/bin/python2
|
#!/usr/bin/python2
|
||||||
'''
|
'''
|
||||||
Perform basic ELF security checks on a series of executables.
|
Perform basic ELF security checks on a series of executables.
|
||||||
Exit status will be 0 if succesful, and the program will be silent.
|
Exit status will be 0 if successful, and the program will be silent.
|
||||||
Otherwise the exit status will be 1 and it will log which executables failed which checks.
|
Otherwise the exit status will be 1 and it will log which executables failed which checks.
|
||||||
Needs `readelf` (for ELF) and `objdump` (for PE).
|
Needs `readelf` (for ELF) and `objdump` (for PE).
|
||||||
'''
|
'''
|
||||||
|
|
|
@ -79,7 +79,7 @@ public:
|
||||||
/**
|
/**
|
||||||
* Connect to a Tor control port.
|
* Connect to a Tor control port.
|
||||||
* target is address of the form host:port.
|
* target is address of the form host:port.
|
||||||
* connected is the handler that is called when connection is succesfully established.
|
* connected is the handler that is called when connection is successfully established.
|
||||||
* disconnected is a handler that is called when the connection is broken.
|
* disconnected is a handler that is called when the connection is broken.
|
||||||
* Return true on success.
|
* Return true on success.
|
||||||
*/
|
*/
|
||||||
|
@ -177,7 +177,7 @@ void TorControlConnection::eventcb(struct bufferevent *bev, short what, void *ct
|
||||||
{
|
{
|
||||||
TorControlConnection *self = (TorControlConnection*)ctx;
|
TorControlConnection *self = (TorControlConnection*)ctx;
|
||||||
if (what & BEV_EVENT_CONNECTED) {
|
if (what & BEV_EVENT_CONNECTED) {
|
||||||
LogPrint("tor", "tor: Succesfully connected!\n");
|
LogPrint("tor", "tor: Successfully connected!\n");
|
||||||
self->connected(*self);
|
self->connected(*self);
|
||||||
} else if (what & (BEV_EVENT_EOF|BEV_EVENT_ERROR)) {
|
} else if (what & (BEV_EVENT_EOF|BEV_EVENT_ERROR)) {
|
||||||
if (what & BEV_EVENT_ERROR)
|
if (what & BEV_EVENT_ERROR)
|
||||||
|
@ -380,7 +380,7 @@ private:
|
||||||
void authchallenge_cb(TorControlConnection& conn, const TorControlReply& reply);
|
void authchallenge_cb(TorControlConnection& conn, const TorControlReply& reply);
|
||||||
/** Callback for PROTOCOLINFO result */
|
/** Callback for PROTOCOLINFO result */
|
||||||
void protocolinfo_cb(TorControlConnection& conn, const TorControlReply& reply);
|
void protocolinfo_cb(TorControlConnection& conn, const TorControlReply& reply);
|
||||||
/** Callback after succesful connection */
|
/** Callback after successful connection */
|
||||||
void connected_cb(TorControlConnection& conn);
|
void connected_cb(TorControlConnection& conn);
|
||||||
/** Callback after connection lost or failed connection attempt */
|
/** Callback after connection lost or failed connection attempt */
|
||||||
void disconnected_cb(TorControlConnection& conn);
|
void disconnected_cb(TorControlConnection& conn);
|
||||||
|
@ -419,7 +419,7 @@ TorController::~TorController()
|
||||||
void TorController::add_onion_cb(TorControlConnection& conn, const TorControlReply& reply)
|
void TorController::add_onion_cb(TorControlConnection& conn, const TorControlReply& reply)
|
||||||
{
|
{
|
||||||
if (reply.code == 250) {
|
if (reply.code == 250) {
|
||||||
LogPrint("tor", "tor: ADD_ONION succesful\n");
|
LogPrint("tor", "tor: ADD_ONION successful\n");
|
||||||
BOOST_FOREACH(const std::string &s, reply.lines) {
|
BOOST_FOREACH(const std::string &s, reply.lines) {
|
||||||
std::map<std::string,std::string> m = ParseTorReplyMapping(s);
|
std::map<std::string,std::string> m = ParseTorReplyMapping(s);
|
||||||
std::map<std::string,std::string>::iterator i;
|
std::map<std::string,std::string>::iterator i;
|
||||||
|
@ -448,7 +448,7 @@ void TorController::add_onion_cb(TorControlConnection& conn, const TorControlRep
|
||||||
void TorController::auth_cb(TorControlConnection& conn, const TorControlReply& reply)
|
void TorController::auth_cb(TorControlConnection& conn, const TorControlReply& reply)
|
||||||
{
|
{
|
||||||
if (reply.code == 250) {
|
if (reply.code == 250) {
|
||||||
LogPrint("tor", "tor: Authentication succesful\n");
|
LogPrint("tor", "tor: Authentication successful\n");
|
||||||
|
|
||||||
// Now that we know Tor is running setup the proxy for onion addresses
|
// Now that we know Tor is running setup the proxy for onion addresses
|
||||||
// if -onion isn't set to something else.
|
// if -onion isn't set to something else.
|
||||||
|
@ -501,7 +501,7 @@ static std::vector<uint8_t> ComputeResponse(const std::string &key, const std::v
|
||||||
void TorController::authchallenge_cb(TorControlConnection& conn, const TorControlReply& reply)
|
void TorController::authchallenge_cb(TorControlConnection& conn, const TorControlReply& reply)
|
||||||
{
|
{
|
||||||
if (reply.code == 250) {
|
if (reply.code == 250) {
|
||||||
LogPrint("tor", "tor: SAFECOOKIE authentication challenge succesful\n");
|
LogPrint("tor", "tor: SAFECOOKIE authentication challenge successful\n");
|
||||||
std::pair<std::string,std::string> l = SplitTorReplyLine(reply.lines[0]);
|
std::pair<std::string,std::string> l = SplitTorReplyLine(reply.lines[0]);
|
||||||
if (l.first == "AUTHCHALLENGE") {
|
if (l.first == "AUTHCHALLENGE") {
|
||||||
std::map<std::string,std::string> m = ParseTorReplyMapping(l.second);
|
std::map<std::string,std::string> m = ParseTorReplyMapping(l.second);
|
||||||
|
|
Loading…
Reference in a new issue