lists.torproject.org
Sign In
Sign Up
Sign In
Sign Up
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2025
April
March
February
January
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
February
January
2019
December
November
October
September
August
July
June
May
April
March
February
January
2018
December
November
October
September
August
July
June
May
April
March
February
January
2017
December
November
October
September
August
July
June
May
April
March
February
January
2016
December
November
October
September
August
July
June
May
April
March
February
January
2015
December
November
October
September
August
July
June
May
April
March
February
January
2014
December
November
October
September
August
July
June
May
April
March
February
January
2013
December
November
October
September
August
July
June
May
April
March
February
January
2012
December
November
October
September
August
July
June
May
April
March
February
January
2011
December
November
October
September
August
July
June
May
April
March
February
List overview
Download
tor-commits
March 2016
----- 2025 -----
April 2025
March 2025
February 2025
January 2025
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
----- 2019 -----
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
----- 2018 -----
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
----- 2017 -----
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
----- 2016 -----
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
----- 2015 -----
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
----- 2014 -----
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
----- 2013 -----
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
----- 2012 -----
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
----- 2011 -----
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
tor-commits@lists.torproject.org
16 participants
1259 discussions
Start a n
N
ew thread
[snowflake/master] remove webRTCConn SendLoop and simplify Write without additional channel, as net.Conn is already safe
by serene@torproject.org
04 Mar '16
04 Mar '16
commit d4efe774d109b094b81699a608cd1024e096bb64 Author: Serene Han <keroserene+git(a)gmail.com> Date: Tue Feb 23 17:34:51 2016 -0800 remove webRTCConn SendLoop and simplify Write without additional channel, as net.Conn is already safe --- client/client_test.go | 14 ++++++-------- client/snowflake.go | 1 - client/webrtc.go | 52 ++++++++++++++++++--------------------------------- 3 files changed, 24 insertions(+), 43 deletions(-) diff --git a/client/client_test.go b/
…
[View More]
client/client_test.go index cad40de..9acf6fc 100644 --- a/client/client_test.go +++ b/client/client_test.go @@ -33,19 +33,17 @@ func TestConnect(t *testing.T) { } So(c.buffer.Bytes(), ShouldEqual, nil) - Convey("sendData buffers when datachannel is nil", func() { - c.sendData([]byte("test")) + Convey("Write buffers when datachannel is nil", func() { + c.Write([]byte("test")) c.snowflake = nil So(c.buffer.Bytes(), ShouldResemble, []byte("test")) }) - Convey("sendData sends to datachannel when not nil", func() { + Convey("Write sends to datachannel when not nil", func() { mock := new(MockDataChannel) - mock.done = make(chan bool) - go c.SendLoop() - c.writeChannel = make(chan []byte) c.snowflake = mock - c.sendData([]byte("test")) + mock.done = make(chan bool, 1) + c.Write([]byte("test")) <-mock.done So(c.buffer.Bytes(), ShouldEqual, nil) So(mock.destination.Bytes(), ShouldResemble, []byte("test")) @@ -54,7 +52,7 @@ func TestConnect(t *testing.T) { Convey("Receive answer sets remote description", func() { c.answerChannel = make(chan *webrtc.SessionDescription) c.config = webrtc.NewConfiguration() - c.PreparePeerConnection() + c.preparePeerConnection() c.receiveAnswer() sdp := webrtc.DeserializeSessionDescription("test") c.answerChannel <- sdp diff --git a/client/snowflake.go b/client/snowflake.go index 29d263a..615038c 100644 --- a/client/snowflake.go +++ b/client/snowflake.go @@ -70,7 +70,6 @@ func dialWebRTC() (*webRTCConn, error) { connection := NewWebRTCConnection(config, broker) go connection.ConnectLoop() - go connection.SendLoop() return connection, nil } diff --git a/client/webrtc.go b/client/webrtc.go index 89d1592..0c865fa 100644 --- a/client/webrtc.go +++ b/client/webrtc.go @@ -19,7 +19,6 @@ type webRTCConn struct { offerChannel chan *webrtc.SessionDescription answerChannel chan *webrtc.SessionDescription errorChannel chan error - writeChannel chan []byte recvPipe *io.PipeReader writePipe *io.PipeWriter buffer bytes.Buffer @@ -33,8 +32,15 @@ func (c *webRTCConn) Read(b []byte) (int, error) { return c.recvPipe.Read(b) } +// Writes bytes out to the snowflake proxy. func (c *webRTCConn) Write(b []byte) (int, error) { - c.sendData(b) + c.BytesInfo.AddOutbound(len(b)) + if nil == c.snowflake { + log.Printf("Buffered %d bytes --> WebRTC", len(b)) + c.buffer.Write(b) + } else { + c.snowflake.Send(b) + } return len(b), nil } @@ -64,19 +70,18 @@ func (c *webRTCConn) SetWriteDeadline(t time.Time) error { } func NewWebRTCConnection(config *webrtc.Configuration, - broker *BrokerChannel) *webRTCConn { + broker *BrokerChannel) *webRTCConn { connection := new(webRTCConn) connection.config = config connection.broker = broker - connection.offerChannel = make(chan *webrtc.SessionDescription) - connection.answerChannel = make(chan *webrtc.SessionDescription) - connection.writeChannel = make(chan []byte) - connection.errorChannel = make(chan error) - connection.reset = make(chan struct{}) + connection.offerChannel = make(chan *webrtc.SessionDescription, 1) + connection.answerChannel = make(chan *webrtc.SessionDescription, 1) + connection.errorChannel = make(chan error, 1) + connection.reset = make(chan struct{}, 1) // Log every few seconds. connection.BytesInfo = &BytesInfo{ - inboundChan: make(chan int), outboundChan: make(chan int), + inboundChan: make(chan int, 5), outboundChan: make(chan int, 5), inbound: 0, outbound: 0, inEvents: 0, outEvents: 0, } go connection.BytesInfo.Log() @@ -106,20 +111,6 @@ func (c *webRTCConn) ConnectLoop() { } } -// Expected in own goroutine. -func (c *webRTCConn) SendLoop() { - log.Println("send loop") - for data := range c.writeChannel { - // Flush buffer if necessary. - for c.buffer.Len() > 0 { - c.snowflake.Send(c.buffer.Bytes()) - log.Println("Flushed", c.buffer.Len(), "bytes") - c.buffer.Reset() - } - c.snowflake.Send(data) - } -} - func (c *webRTCConn) preparePeerConnection() { if nil != c.pc { c.pc.Close() @@ -185,6 +176,7 @@ func (c *webRTCConn) establishDataChannel() error { dc.Send(c.buffer.Bytes()) log.Println("Flushed", c.buffer.Len(), "bytes") c.buffer.Reset() + c.snowflake = dc } dc.OnClose = func() { @@ -198,6 +190,9 @@ func (c *webRTCConn) establishDataChannel() error { } } dc.OnMessage = func(msg []byte) { + if len(msg) <= 0 { + log.Println("0 length---") + } c.BytesInfo.AddInbound(len(msg)) n, err := c.writePipe.Write(msg) if err != nil { @@ -261,17 +256,6 @@ func (c *webRTCConn) receiveAnswer() { }() } -func (c *webRTCConn) sendData(data []byte) { - c.BytesInfo.AddOutbound(len(data)) - // Buffer the data in case datachannel isn't available yet. - if nil == c.snowflake { - log.Printf("Buffered %d bytes --> WebRTC", len(data)) - c.buffer.Write(data) - return - } - c.writeChannel <- data -} - func (c *webRTCConn) Reset() { go func() { c.reset <- struct{}{} // Attempt to negotiate a new datachannel..
[View Less]
1
0
0
0
[snowflake/master] rendezvous / BrokerChannel tests for client
by serene@torproject.org
04 Mar '16
04 Mar '16
commit 5aae41c9016cb79ee4f7ccb9830ef0d08ed0ee2a Author: Serene Han <keroserene+git(a)gmail.com> Date: Sat Feb 27 14:45:53 2016 -0800 rendezvous / BrokerChannel tests for client --- client/client_test.go | 56 +++++++++++++++++++++++++++++++++++++++++++++++++++ client/rendezvous.go | 12 ++++++----- 2 files changed, 63 insertions(+), 5 deletions(-) diff --git a/client/client_test.go b/client/client_test.go index 9acf6fc..a3fe078 100644 --- a/client/client_test.go +++ b/client/
…
[View More]
client_test.go @@ -4,6 +4,10 @@ import ( "bytes" "
github.com/keroserene/go-webrtc
" . "
github.com/smartystreets/goconvey/convey
" + "net/http" + // "net/http/httptest" + "io/ioutil" + "strings" "testing" ) @@ -21,6 +25,29 @@ func (*MockDataChannel) Close() error { return nil } +type MockResponse struct{} + +func (m *MockResponse) Read(p []byte) (int, error) { + p = []byte(`{"type":"answer","sdp":"fake"}`) + return 0, nil +} +func (m *MockResponse) Close() error { + return nil +} + +type MockTransport struct { +} + +// Just returns a response with fake SDP answer. +func (m *MockTransport) RoundTrip(req *http.Request) (*http.Response, error) { + s := ioutil.NopCloser(strings.NewReader(`{"type":"answer","sdp":"fake"}`)) + r := &http.Response{ + StatusCode: http.StatusOK, + Body: s, + } + return r, nil +} + func TestConnect(t *testing.T) { Convey("Snowflake", t, func() { @@ -72,6 +99,35 @@ func TestConnect(t *testing.T) { // TODO }) }) + }) + + Convey("Rendezvous", t, func() { + + Convey("BrokerChannel with no front domain", func() { + b := NewBrokerChannel("test.broker", "") + So(b.url, ShouldNotBeNil) + So(b.url.Path, ShouldResemble, "test.broker") + So(b.transport, ShouldNotBeNil) + }) + + Convey("BrokerChannel with front domain", func() { + b := NewBrokerChannel("test.broker", "front") + So(b.url, ShouldNotBeNil) + So(b.url.Path, ShouldResemble, "test.broker") + So(b.url.Host, ShouldResemble, "front") + So(b.transport, ShouldNotBeNil) + }) + + Convey("BrokerChannel Negotiate responds with answer", func() { + b := NewBrokerChannel("test.broker", "") + sdp := webrtc.DeserializeSessionDescription("test") + // Replace transport with a mock. + b.transport = &MockTransport{} + answer, err := b.Negotiate(sdp) + So(err, ShouldBeNil) + So(answer, ShouldNotBeNil) + So(answer.Sdp, ShouldResemble, "fake") + }) }) } diff --git a/client/rendezvous.go b/client/rendezvous.go index fe75b09..29969f0 100644 --- a/client/rendezvous.go +++ b/client/rendezvous.go @@ -18,9 +18,10 @@ import ( type BrokerChannel struct { // The Host header to put in the HTTP request (optional and may be // different from the host name in URL). - Host string - url *url.URL - transport http.Transport // Used to make all requests. + Host string + url *url.URL + // transport http.Transport // Used to make all requests. + transport http.RoundTripper // Used to make all requests. } // Construct a new BrokerChannel, where: @@ -41,8 +42,9 @@ func NewBrokerChannel(broker string, front string) *BrokerChannel { // We make a copy of DefaultTransport because we want the default Dial // and TLSHandshakeTimeout settings. But we want to disable the default // ProxyFromEnvironment setting. - bc.transport = *http.DefaultTransport.(*http.Transport) - bc.transport.Proxy = nil + transport := http.DefaultTransport.(*http.Transport) + transport.Proxy = nil + bc.transport = transport return bc }
[View Less]
1
0
0
0
[snowflake/master] update README and include TOC
by serene@torproject.org
04 Mar '16
04 Mar '16
commit 38999e02de8bc87e5aac5ce074da2e2a9f5b9b02 Author: Serene Han <keroserene+git(a)gmail.com> Date: Wed Feb 24 07:47:17 2016 -0800 update README and include TOC --- README.md | 24 ++++++++++++++++++++++-- 1 file changed, 22 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index e716041..425a07d 100644 --- a/README.md +++ b/README.md @@ -1,9 +1,23 @@ -# snowflake-pt +# Snowflake [](
…
[View More]
http…
A Pluggable Transport using WebRTC +<!-- START doctoc generated TOC please keep comment here to allow auto update --> +<!-- DON'T EDIT THIS SECTION, INSTEAD RE-RUN doctoc TO UPDATE --> +**Table of Contents** + +- [Status](#status) +- [Usage](#usage) + - [Dependencies](#dependencies) + - [More Info](#more-info) + - [Building a Snowflake](#building-a-snowflake) +- [Appendix](#appendix) + - [-- Testing directly via WebRTC Server --](#---testing-directly-via-webrtc-server---) + - [-- Via Browser Proxy --](#---via-browser-proxy---) + +<!-- END doctoc generated TOC please keep comment here to allow auto update --> ### Status @@ -23,8 +37,14 @@ This should start the client plugin, bootstrapping to 100% using WebRTC. #### Dependencies +Client: - [
go-webrtc](https://github.com/keroserene/go-webrtc)
. -- Go 1.5+ +- Go 1.5.* (1.6 is not yet supported. See [Issue #22](https://github.com/keroserene/snowflake/issues/22)) + +Proxy: +- [CoffeeScript](coffeescript.org) + +--- #### More Info
[View Less]
1
0
0
0
[snowflake/master] only flush datachannel with nonzero bytes, which prevents Tor from marking the SOCKS for close (#12)
by serene@torproject.org
04 Mar '16
04 Mar '16
commit f3e0abe0e169f6e5467aae75286ace935924370f Author: Serene Han <keroserene+git(a)gmail.com> Date: Thu Feb 25 01:23:59 2016 -0800 only flush datachannel with nonzero bytes, which prevents Tor from marking the SOCKS for close (#12) --- client/snowflake.go | 3 ++- client/webrtc.go | 13 ++++++++----- 2 files changed, 10 insertions(+), 6 deletions(-) diff --git a/client/snowflake.go b/client/snowflake.go index 615038c..2c40796 100644 --- a/client/snowflake.go +++ b/client/
…
[View More]
snowflake.go @@ -101,7 +101,7 @@ func handler(conn *pt.SocksConn) error { log.Println("handler fired:", conn) remote, err := dialWebRTC() - if err != nil { + if err != nil || remote == nil { conn.Reject() return err } @@ -123,6 +123,7 @@ func handler(conn *pt.SocksConn) error { func acceptLoop(ln *pt.SocksListener) error { defer ln.Close() for { + log.Println("SOCKS listening...") conn, err := ln.AcceptSocks() if err != nil { if e, ok := err.(net.Error); ok && e.Temporary() { diff --git a/client/webrtc.go b/client/webrtc.go index 0c865fa..d60f212 100644 --- a/client/webrtc.go +++ b/client/webrtc.go @@ -172,11 +172,13 @@ func (c *webRTCConn) establishDataChannel() error { if nil != c.snowflake { panic("PeerConnection snowflake already exists.") } - // Flush the buffer, then enable datachannel. - dc.Send(c.buffer.Bytes()) - log.Println("Flushed", c.buffer.Len(), "bytes") - c.buffer.Reset() - + // Flush the buffer if necessary. + if c.buffer.Len() > 0 { + dc.Send(c.buffer.Bytes()) + log.Println("Flushed", c.buffer.Len(), "bytes.") + c.buffer.Reset() + } + // Then enable the datachannel. c.snowflake = dc } dc.OnClose = func() { @@ -190,6 +192,7 @@ func (c *webRTCConn) establishDataChannel() error { } } dc.OnMessage = func(msg []byte) { + // log.Println("ONMESSAGE: ", len(msg)) if len(msg) <= 0 { log.Println("0 length---") }
[View Less]
1
0
0
0
[snowflake/master] move endWebRTC() mostly into webRTCConn.Close()
by serene@torproject.org
04 Mar '16
04 Mar '16
commit 5edac195f640237dffab21beffc755a588faef57 Author: Serene Han <keroserene+git(a)gmail.com> Date: Fri Feb 26 14:35:15 2016 -0800 move endWebRTC() mostly into webRTCConn.Close() --- client/snowflake.go | 18 +++++++----------- client/webrtc.go | 45 +++++++++++++++++++++++++++++++++++---------- 2 files changed, 42 insertions(+), 21 deletions(-) diff --git a/client/snowflake.go b/client/snowflake.go index 2c40796..25ccfef 100644 --- a/client/snowflake.go +++ b/client/
…
[View More]
snowflake.go @@ -46,6 +46,8 @@ func copyLoop(a, b net.Conn) { wg.Done() }() wg.Wait() + // a.Close() + // b.Close() log.Println("copy loop ended") } @@ -79,16 +81,8 @@ func endWebRTC() { if nil == webrtcRemote { return } - if nil != webrtcRemote.snowflake { - s := webrtcRemote.snowflake - webrtcRemote.snowflake = nil - log.Printf("WebRTC: closing DataChannel") - s.Close() - } - if nil != webrtcRemote.pc { - log.Printf("WebRTC: closing PeerConnection") - webrtcRemote.pc.Close() - } + webrtcRemote.Close() + webrtcRemote = nil } // Establish a WebRTC channel for SOCKS connections. @@ -116,6 +110,7 @@ func handler(conn *pt.SocksConn) error { // TODO: Make SOCKS acceptance more independent from WebRTC so they can // be more easily interchanged. copyLoop(conn, remote) + // <-remote.endChannel log.Println("----END---") return nil } @@ -123,8 +118,9 @@ func handler(conn *pt.SocksConn) error { func acceptLoop(ln *pt.SocksListener) error { defer ln.Close() for { - log.Println("SOCKS listening...") + log.Println("SOCKS listening...", ln) conn, err := ln.AcceptSocks() + log.Println("accepting", conn, err) if err != nil { if e, ok := err.(net.Error); ok && e.Temporary() { continue diff --git a/client/webrtc.go b/client/webrtc.go index d60f212..2388e9a 100644 --- a/client/webrtc.go +++ b/client/webrtc.go @@ -19,6 +19,7 @@ type webRTCConn struct { offerChannel chan *webrtc.SessionDescription answerChannel chan *webrtc.SessionDescription errorChannel chan error + endChannel chan struct{} recvPipe *io.PipeReader writePipe *io.PipeWriter buffer bytes.Buffer @@ -45,8 +46,25 @@ func (c *webRTCConn) Write(b []byte) (int, error) { } func (c *webRTCConn) Close() error { - // Data channel closed implicitly? - return c.pc.Close() + var err error = nil + log.Printf("WebRTC: Closing") + if nil != c.snowflake { + s := c.snowflake + c.snowflake = nil + log.Printf("WebRTC: closing DataChannel") + s.Close() + } + if nil != c.pc { + log.Printf("WebRTC: closing PeerConnection") + err = c.pc.Close() + c.pc = nil + } + close(c.offerChannel) + close(c.answerChannel) + close(c.errorChannel) + // c.writePipe.Close() + // c.recvPipe.Close() + return err } func (c *webRTCConn) LocalAddr() net.Addr { @@ -77,6 +95,7 @@ func NewWebRTCConnection(config *webrtc.Configuration, connection.offerChannel = make(chan *webrtc.SessionDescription, 1) connection.answerChannel = make(chan *webrtc.SessionDescription, 1) connection.errorChannel = make(chan error, 1) + connection.endChannel = make(chan struct{}, 1) connection.reset = make(chan struct{}, 1) // Log every few seconds. @@ -100,13 +119,13 @@ func (c *webRTCConn) ConnectLoop() { // PeerConnection won't need to be re-prepared each time. c.preparePeerConnection() err := c.establishDataChannel() - if err == nil { + if err != nil { + log.Println("WebRTC: Could not establish DataChannel.") + } else { c.sendOffer() c.receiveAnswer() <-c.reset log.Println(" --- snowflake connection reset ---") - } else { - log.Println("WebRTC: Could not establish DataChannel.") } } } @@ -172,7 +191,7 @@ func (c *webRTCConn) establishDataChannel() error { if nil != c.snowflake { panic("PeerConnection snowflake already exists.") } - // Flush the buffer if necessary. + // Flush buffered outgoing SOCKS data if necessary. if c.buffer.Len() > 0 { dc.Send(c.buffer.Bytes()) log.Println("Flushed", c.buffer.Len(), "bytes.") @@ -186,10 +205,16 @@ func (c *webRTCConn) establishDataChannel() error { // Future writes will go to the buffer until a new DataChannel is available. log.Println("WebRTC: DataChannel.OnClose") // Only reset if this OnClose was triggered remotely. - if nil != c.snowflake { - c.snowflake = nil - c.Reset() + if nil == c.snowflake { + panic("Should not have nil snowflake before closing. ") } + c.snowflake = nil + // TODO: Need a way to update the circuit so that when a new WebRTC + // data channel is available, the relay actually recognizes the new + // snowflake? + c.Reset() + // c.Close() + // c.endChannel <- struct{}{} } dc.OnMessage = func(msg []byte) { // log.Println("ONMESSAGE: ", len(msg)) @@ -214,7 +239,6 @@ func (c *webRTCConn) establishDataChannel() error { // Block until an offer is available, then send it to either // the Broker or signal pipe. func (c *webRTCConn) sendOffer() error { - log.Println("sendOffer...") select { case offer := <-c.offerChannel: if "" == brokerURL { @@ -254,6 +278,7 @@ func (c *webRTCConn) receiveAnswer() { log.Printf("Received Answer:\n\n%s\n", answer.Sdp) err := c.pc.SetRemoteDescription(answer) if nil != err { + log.Printf("webrtc: Unable to SetRemoteDescription.") c.errorChannel <- err } }()
[View Less]
1
0
0
0
[tordnsel/master] make the tests compile
by arlo@torproject.org
04 Mar '16
04 Mar '16
commit 461d2d89e915e76d4e722eb70d2973642ae3de97 Author: David Kaloper <david(a)numm.org> Date: Wed Oct 23 03:52:21 2013 +0200 make the tests compile --- src/TorDNSEL/Config/Tests.hs | 1 + src/TorDNSEL/DNS/Server/Tests.hs | 1 + src/TorDNSEL/DNS/Tests.hs | 2 +- src/TorDNSEL/Directory/Tests.hs | 1 + 4 files changed, 4 insertions(+), 1 deletion(-) diff --git a/src/TorDNSEL/Config/Tests.hs b/src/TorDNSEL/Config/Tests.hs index 54460a0..e7b9a54 100644 --- a/src/TorDNSEL/
…
[View More]
Config/Tests.hs +++ b/src/TorDNSEL/Config/Tests.hs @@ -1,3 +1,4 @@ +{-# LANGUAGE OverloadedStrings #-} ----------------------------------------------------------------------------- -- | -- Module : TorDNSEL.Config.Tests diff --git a/src/TorDNSEL/DNS/Server/Tests.hs b/src/TorDNSEL/DNS/Server/Tests.hs index 2293e4b..eebea2a 100644 --- a/src/TorDNSEL/DNS/Server/Tests.hs +++ b/src/TorDNSEL/DNS/Server/Tests.hs @@ -1,3 +1,4 @@ +{-# LANGUAGE OverloadedStrings #-} ----------------------------------------------------------------------------- -- | -- Module : TorDNSEL.DNS.Server.Tests diff --git a/src/TorDNSEL/DNS/Tests.hs b/src/TorDNSEL/DNS/Tests.hs index 42f7bb1..0c0eede 100644 --- a/src/TorDNSEL/DNS/Tests.hs +++ b/src/TorDNSEL/DNS/Tests.hs @@ -16,7 +16,7 @@ module TorDNSEL.DNS.Tests (tests) where import Control.Monad (replicateM) import qualified Data.ByteString as B -import qualified Data.ByteString.Base as B +import qualified Data.ByteString.Internal as B (c2w) import qualified Data.ByteString.Lazy as L import Test.HUnit (Test(..), (@=?)) diff --git a/src/TorDNSEL/Directory/Tests.hs b/src/TorDNSEL/Directory/Tests.hs index f9b8c45..66b95ba 100644 --- a/src/TorDNSEL/Directory/Tests.hs +++ b/src/TorDNSEL/Directory/Tests.hs @@ -1,3 +1,4 @@ +{-# LANGUAGE OverloadedStrings #-} ----------------------------------------------------------------------------- -- | -- Module : TorDNSEL.Directory.Tests
[View Less]
1
0
0
0
[tordnsel/master] reign in over the extensions
by arlo@torproject.org
04 Mar '16
04 Mar '16
commit 1c90be2dc4d3b275f434bb4e9ea63f169ae46f3e Author: David Kaloper <david(a)numm.org> Date: Wed Sep 4 05:30:41 2013 +0200 reign in over the extensions --- src/TorDNSEL/Config/Internals.hs | 2 - src/TorDNSEL/Control/Concurrent/Link/Internals.hs | 1 - src/TorDNSEL/DNS/Internals.hs | 1 - src/TorDNSEL/DNS/Server/Internals.hs | 1 - src/TorDNSEL/Directory/Internals.hs | 2 - src/TorDNSEL/Directory/Tests.hs
…
[View More]
| 2 - src/TorDNSEL/Document.hs | 1 - src/TorDNSEL/ExitTest/Initiator/Internals.hs | 9 +-- src/TorDNSEL/ExitTest/Server/Internals.hs | 1 - src/TorDNSEL/Log/Internals.hsc | 3 +- src/TorDNSEL/Main.hsc | 2 +- src/TorDNSEL/NetworkState/Internals.hs | 1 - src/TorDNSEL/NetworkState/Storage/Internals.hs | 1 - src/TorDNSEL/Random.hs | 2 +- src/TorDNSEL/Socks/Internals.hs | 1 - src/TorDNSEL/Statistics/Internals.hs | 3 +- src/TorDNSEL/TorControl/Internals.hs | 12 +-- src/TorDNSEL/Util.hsc | 5 +- tordnsel.cabal | 99 +++++++++++++---------- 19 files changed, 64 insertions(+), 85 deletions(-) diff --git a/src/TorDNSEL/Config/Internals.hs b/src/TorDNSEL/Config/Internals.hs index 5458813..c8aa790 100644 --- a/src/TorDNSEL/Config/Internals.hs +++ b/src/TorDNSEL/Config/Internals.hs @@ -1,5 +1,3 @@ -{-# LANGUAGE PatternGuards, BangPatterns, TypeSynonymInstances, - FlexibleInstances, FlexibleContexts #-} {-# OPTIONS_GHC -fno-warn-incomplete-patterns #-} ----------------------------------------------------------------------------- diff --git a/src/TorDNSEL/Control/Concurrent/Link/Internals.hs b/src/TorDNSEL/Control/Concurrent/Link/Internals.hs index 8107481..cf83cba 100644 --- a/src/TorDNSEL/Control/Concurrent/Link/Internals.hs +++ b/src/TorDNSEL/Control/Concurrent/Link/Internals.hs @@ -1,4 +1,3 @@ -{-# LANGUAGE PatternGuards, DeriveDataTypeable #-} {-# OPTIONS_GHC -fno-ignore-asserts #-} ----------------------------------------------------------------------------- diff --git a/src/TorDNSEL/DNS/Internals.hs b/src/TorDNSEL/DNS/Internals.hs index 735d7a8..b80b170 100644 --- a/src/TorDNSEL/DNS/Internals.hs +++ b/src/TorDNSEL/DNS/Internals.hs @@ -1,4 +1,3 @@ -{-# LANGUAGE PatternGuards #-} {-# OPTIONS_GHC -fno-warn-unused-imports #-} ----------------------------------------------------------------------------- diff --git a/src/TorDNSEL/DNS/Server/Internals.hs b/src/TorDNSEL/DNS/Server/Internals.hs index 622de9b..8ab3637 100644 --- a/src/TorDNSEL/DNS/Server/Internals.hs +++ b/src/TorDNSEL/DNS/Server/Internals.hs @@ -1,4 +1,3 @@ -{-# LANGUAGE PatternGuards, DeriveDataTypeable #-} {-# OPTIONS_GHC -fno-warn-incomplete-patterns #-} ----------------------------------------------------------------------------- diff --git a/src/TorDNSEL/Directory/Internals.hs b/src/TorDNSEL/Directory/Internals.hs index 7dc1eb2..154b30c 100644 --- a/src/TorDNSEL/Directory/Internals.hs +++ b/src/TorDNSEL/Directory/Internals.hs @@ -1,5 +1,3 @@ -{-# LANGUAGE PatternGuards, TypeSynonymInstances, FlexibleContexts #-} - ----------------------------------------------------------------------------- -- | -- Module : TorDNSEL.Directory.Internals diff --git a/src/TorDNSEL/Directory/Tests.hs b/src/TorDNSEL/Directory/Tests.hs index 9a895b6..f9b8c45 100644 --- a/src/TorDNSEL/Directory/Tests.hs +++ b/src/TorDNSEL/Directory/Tests.hs @@ -1,5 +1,3 @@ -{-# OPTIONS_GHC -fglasgow-exts #-} - ----------------------------------------------------------------------------- -- | -- Module : TorDNSEL.Directory.Tests diff --git a/src/TorDNSEL/Document.hs b/src/TorDNSEL/Document.hs index 52ea9c9..50c986c 100644 --- a/src/TorDNSEL/Document.hs +++ b/src/TorDNSEL/Document.hs @@ -1,4 +1,3 @@ -{-# LANGUAGE PatternGuards, FlexibleContexts #-} ----------------------------------------------------------------------------- -- | diff --git a/src/TorDNSEL/ExitTest/Initiator/Internals.hs b/src/TorDNSEL/ExitTest/Initiator/Internals.hs index a63e25f..d4538df 100644 --- a/src/TorDNSEL/ExitTest/Initiator/Internals.hs +++ b/src/TorDNSEL/ExitTest/Initiator/Internals.hs @@ -1,11 +1,4 @@ -{-# LANGUAGE PatternGuards, BangPatterns, Rank2Types #-} -{-# OPTIONS_GHC -fno-warn-type-defaults -fglasgow-exts #-} --- XXX: We use -fglasgow-exts here as it is not possible to specify LANGUAGE --- pragmas for different GHC versions using CPP. --- Otherwise, we would add on GHC 6.10: --- ScopedTypeVariables --- and on GHC 6.8: --- PatternSignatures +{-# OPTIONS_GHC -fno-warn-type-defaults #-} ----------------------------------------------------------------------------- -- | diff --git a/src/TorDNSEL/ExitTest/Server/Internals.hs b/src/TorDNSEL/ExitTest/Server/Internals.hs index b6aa705..97d1f8e 100644 --- a/src/TorDNSEL/ExitTest/Server/Internals.hs +++ b/src/TorDNSEL/ExitTest/Server/Internals.hs @@ -1,4 +1,3 @@ -{-# LANGUAGE PatternGuards, BangPatterns #-} {-# OPTIONS_GHC -fno-warn-type-defaults #-} ----------------------------------------------------------------------------- diff --git a/src/TorDNSEL/Log/Internals.hsc b/src/TorDNSEL/Log/Internals.hsc index 7c5b490..0b26873 100644 --- a/src/TorDNSEL/Log/Internals.hsc +++ b/src/TorDNSEL/Log/Internals.hsc @@ -1,5 +1,4 @@ -{-# LANGUAGE ForeignFunctionInterface, TypeSynonymInstances, - OverlappingInstances, FlexibleInstances #-} +{-# LANGUAGE ForeignFunctionInterface, OverlappingInstances #-} ----------------------------------------------------------------------------- -- | diff --git a/src/TorDNSEL/Main.hsc b/src/TorDNSEL/Main.hsc index 4d4092e..e612de0 100644 --- a/src/TorDNSEL/Main.hsc +++ b/src/TorDNSEL/Main.hsc @@ -1,4 +1,4 @@ -{-# LANGUAGE PatternGuards, BangPatterns, ForeignFunctionInterface, CPP #-} +{-# LANGUAGE ForeignFunctionInterface, CPP #-} {-# OPTIONS_GHC -fno-warn-type-defaults -fno-warn-missing-fields -fno-warn-orphans #-} diff --git a/src/TorDNSEL/NetworkState/Internals.hs b/src/TorDNSEL/NetworkState/Internals.hs index 32b4a42..c42cae7 100644 --- a/src/TorDNSEL/NetworkState/Internals.hs +++ b/src/TorDNSEL/NetworkState/Internals.hs @@ -1,4 +1,3 @@ -{-# LANGUAGE PatternGuards, BangPatterns #-} {-# OPTIONS_GHC -fno-warn-type-defaults #-} ----------------------------------------------------------------------------- diff --git a/src/TorDNSEL/NetworkState/Storage/Internals.hs b/src/TorDNSEL/NetworkState/Storage/Internals.hs index fd9a04b..79481f6 100644 --- a/src/TorDNSEL/NetworkState/Storage/Internals.hs +++ b/src/TorDNSEL/NetworkState/Storage/Internals.hs @@ -1,4 +1,3 @@ -{-# LANGUAGE PatternGuards, FlexibleContexts #-} ----------------------------------------------------------------------------- -- | diff --git a/src/TorDNSEL/Random.hs b/src/TorDNSEL/Random.hs index 69c254d..a9f5a8c 100644 --- a/src/TorDNSEL/Random.hs +++ b/src/TorDNSEL/Random.hs @@ -1,4 +1,4 @@ -{-# LANGUAGE ForeignFunctionInterface, ScopedTypeVariables #-} +{-# LANGUAGE ForeignFunctionInterface #-} ----------------------------------------------------------------------------- -- | diff --git a/src/TorDNSEL/Socks/Internals.hs b/src/TorDNSEL/Socks/Internals.hs index d6c91f7..f514c44 100644 --- a/src/TorDNSEL/Socks/Internals.hs +++ b/src/TorDNSEL/Socks/Internals.hs @@ -1,4 +1,3 @@ -{-# LANGUAGE GeneralizedNewtypeDeriving, DeriveDataTypeable #-} {-# OPTIONS_GHC -fno-warn-unused-binds #-} ----------------------------------------------------------------------------- diff --git a/src/TorDNSEL/Statistics/Internals.hs b/src/TorDNSEL/Statistics/Internals.hs index e24c745..cc0f799 100644 --- a/src/TorDNSEL/Statistics/Internals.hs +++ b/src/TorDNSEL/Statistics/Internals.hs @@ -1,5 +1,4 @@ -{-# LANGUAGE BangPatterns #-} -{-# OPTIONS_GHC -fglasgow-exts -fno-warn-type-defaults #-} +{-# OPTIONS_GHC -fno-warn-type-defaults #-} ----------------------------------------------------------------------------- -- | diff --git a/src/TorDNSEL/TorControl/Internals.hs b/src/TorDNSEL/TorControl/Internals.hs index dba1e85..2ea2e16 100644 --- a/src/TorDNSEL/TorControl/Internals.hs +++ b/src/TorDNSEL/TorControl/Internals.hs @@ -1,13 +1,5 @@ -{-# LANGUAGE PatternGuards, MultiParamTypeClasses, ExistentialQuantification, - FlexibleContexts, FlexibleInstances, - DeriveDataTypeable #-} -{-# OPTIONS_GHC -fno-warn-type-defaults -fglasgow-exts #-} --- XXX: We use -fglasgow-exts here as it is not possible to specify LANGUAGE --- pragmas for different GHC versions using CPP. --- Otherwise, we would add on GHC 6.10: --- ScopedTypeVariables --- and on GHC 6.8: --- PatternSignatures +{-# LANGUAGE ExistentialQuantification #-} +{-# OPTIONS_GHC -fno-warn-type-defaults #-} ----------------------------------------------------------------------------- -- | diff --git a/src/TorDNSEL/Util.hsc b/src/TorDNSEL/Util.hsc index 89837cd..57ada86 100644 --- a/src/TorDNSEL/Util.hsc +++ b/src/TorDNSEL/Util.hsc @@ -1,7 +1,4 @@ -{-# LANGUAGE PatternGuards, BangPatterns, ForeignFunctionInterface, - TypeSynonymInstances, OverlappingInstances, - UndecidableInstances, FlexibleInstances, MultiParamTypeClasses, - GeneralizedNewtypeDeriving, FlexibleContexts #-} +{-# LANGUAGE ForeignFunctionInterface, OverlappingInstances, UndecidableInstances #-} {-# OPTIONS_GHC -fno-warn-type-defaults -fno-warn-orphans -Wwarn #-} -- ^^^^^^ -- XXX: findSubstrings is deprecated diff --git a/tordnsel.cabal b/tordnsel.cabal index 23fa628..7e8d015 100644 --- a/tordnsel.cabal +++ b/tordnsel.cabal @@ -1,71 +1,84 @@ Name: TorDNSEL Version: 0.1.1-dev Synopsis: provides a DNSBL-style interface for detecting Tor exit nodes -Description: TorDNSEL implements a design for a DNSBL-style interface for - detecting connections exiting the Tor network. This design and its rationale - is described at <
https://gitweb.torproject.org/tordnsel.git/tree/doc/torel-design.txt
>. +Description: + TorDNSEL implements a design for a DNSBL-style interface for detecting + connections exiting the Tor network. This design and its rationale is + described at + <
https://gitweb.torproject.org/tordnsel.git/tree/doc/torel-design.txt
>. License: PublicDomain License-File: LICENSE Homepage:
http://p56soo2ibjkx23xo.onion/
-Package-URL:
https://archive.torproject.org/tor-package-archive/tordnsel/tordnsel-0.1.1.…
+Package-URL:
https://archive.torproject.org/tor-package-archive/tordnsel/tordnsel-0.1.1.…
Author: tup Maintainer: tup.tuple(a)googlemail.com, lunar(a)debian.org, andrew(a)torproject.org Build-Type: Simple Build-Depends: base>=2.0, network>=2.0, mtl>=1.0, unix>=1.0, stm>=2.0, - time>=1.0, HUnit>=1.1, binary>=0.4, bytestring>=0.9, array>=0.1, directory>=1.0, - containers>=0.1, deepseq >= 1.3 + time>=1.0, HUnit>=1.1, binary>=0.4, bytestring>=0.9, array>=0.1, directory>=1.0, + containers>=0.1, deepseq >= 1.3 Tested-With: GHC==6.6, GHC==6.8, GHC==6.10, GHC==6.12 Data-Files: config/tordnsel.conf.sample, contrib/cacti-input.pl, - contrib/tordnsel-init.d-script.sample, doc/tordnsel.8 + contrib/tordnsel-init.d-script.sample, doc/tordnsel.8 Executable: tordnsel Main-Is: tordnsel.hs -Other-Modules: TorDNSEL.Config, - TorDNSEL.Config.Internals, - TorDNSEL.Control.Concurrent.Link, - TorDNSEL.Control.Concurrent.Link.Internals, - TorDNSEL.Control.Concurrent.Util, - TorDNSEL.Directory, - TorDNSEL.Directory.Internals, - TorDNSEL.DistinctQueue, - TorDNSEL.DNS, - TorDNSEL.DNS.Internals, - TorDNSEL.DNS.Server, - TorDNSEL.DNS.Server.Internals, - TorDNSEL.Document, - TorDNSEL.ExitTest.Initiator, - TorDNSEL.ExitTest.Initiator.Internals, - TorDNSEL.ExitTest.Request, - TorDNSEL.ExitTest.Server, - TorDNSEL.ExitTest.Server.Internals, - TorDNSEL.Log, - TorDNSEL.Log.Internals, - TorDNSEL.Main, - TorDNSEL.NetworkState, - TorDNSEL.NetworkState.Internals, - TorDNSEL.NetworkState.Storage, - TorDNSEL.NetworkState.Storage.Internals, - TorDNSEL.NetworkState.Types, - TorDNSEL.Random, - TorDNSEL.Socks, - TorDNSEL.Socks.Internals, - TorDNSEL.Statistics, - TorDNSEL.Statistics.Internals, - TorDNSEL.TorControl, - TorDNSEL.TorControl.Internals, +Other-Modules: TorDNSEL.Config + TorDNSEL.Config.Internals + TorDNSEL.Control.Concurrent.Link + TorDNSEL.Control.Concurrent.Link.Internals + TorDNSEL.Control.Concurrent.Util + TorDNSEL.Directory + TorDNSEL.Directory.Internals + TorDNSEL.DistinctQueue + TorDNSEL.DNS + TorDNSEL.DNS.Internals + TorDNSEL.DNS.Server + TorDNSEL.DNS.Server.Internals + TorDNSEL.Document + TorDNSEL.ExitTest.Initiator + TorDNSEL.ExitTest.Initiator.Internals + TorDNSEL.ExitTest.Request + TorDNSEL.ExitTest.Server + TorDNSEL.ExitTest.Server.Internals + TorDNSEL.Log + TorDNSEL.Log.Internals + TorDNSEL.Main + TorDNSEL.NetworkState + TorDNSEL.NetworkState.Internals + TorDNSEL.NetworkState.Storage + TorDNSEL.NetworkState.Storage.Internals + TorDNSEL.NetworkState.Types + TorDNSEL.Random + TorDNSEL.Socks + TorDNSEL.Socks.Internals + TorDNSEL.Statistics + TorDNSEL.Statistics.Internals + TorDNSEL.TorControl + TorDNSEL.TorControl.Internals TorDNSEL.Util HS-Source-Dirs: src Includes: sys/types.h, unistd.h, sysexits.h, netinet/in.h, openssl/rand.h Extra-Libraries: crypto GHC-Options: -O2 -Wall -Werror CPP-Options: -DVERSION="0.1.1-dev" +Extensions: FlexibleContexts + FlexibleInstances + TypeSynonymInstances + MultiParamTypeClasses + PatternGuards + BangPatterns + ViewPatterns + ScopedTypeVariables + DeriveDataTypeable + GeneralizedNewtypeDeriving + Rank2Types Executable: runtests Buildable: False Main-Is: runtests.hs -Other-Modules: TorDNSEL.Config.Tests, - TorDNSEL.Directory.Tests, - TorDNSEL.DNS.Tests, +Other-Modules: TorDNSEL.Config.Tests + TorDNSEL.Directory.Tests + TorDNSEL.DNS.Tests TorDNSEL.DNS.Server.Tests HS-Source-Dirs: src Includes: netinet/in.h, openssl/rand.h
[View Less]
1
0
0
0
[tordnsel/master] network-2.3 compat
by arlo@torproject.org
04 Mar '16
04 Mar '16
commit 921f6d9889335da34271efae48e1d27dc86420fe Author: Arlo Breault <arlolra(a)gmail.com> Date: Fri Mar 4 12:53:16 2016 -0800 network-2.3 compat --- src/TorDNSEL/Util.hsc | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/src/TorDNSEL/Util.hsc b/src/TorDNSEL/Util.hsc index beee747..89837cd 100644 --- a/src/TorDNSEL/Util.hsc +++ b/src/TorDNSEL/Util.hsc @@ -531,6 +531,10 @@ bindListeningUnixDomainStreamSocket sockPath mode = do listen sock sOMAXCONN return sock +--
…
[View More]
network-2.3 compat +-- +deriving instance Ord SockAddr + -------------------------------------------------------------------------------- -- Monads
[View Less]
1
0
0
0
[tordnsel/master] import CInt constructors
by arlo@torproject.org
04 Mar '16
04 Mar '16
commit 3b1cf52e377f0ef9fe3daae3f396f545668897f8 Author: David Kaloper <david(a)numm.org> Date: Fri Oct 11 18:45:25 2013 +0200 import CInt constructors --- src/TorDNSEL/Log/Internals.hsc | 2 +- src/TorDNSEL/Main.hsc | 2 +- src/TorDNSEL/Random.hs | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/src/TorDNSEL/Log/Internals.hsc b/src/TorDNSEL/Log/Internals.hsc index 7d7a2d8..7c5b490 100644 --- a/src/TorDNSEL/Log/Internals.hsc +++ b/src/TorDNSEL/
…
[View More]
Log/Internals.hsc @@ -33,7 +33,7 @@ import Data.Bits ((.|.)) import qualified Data.ByteString.Char8 as B import Data.List (foldl') import Data.Time (UTCTime, getCurrentTime) -import Foreign.C (CString, CInt, withCString) +import Foreign.C (CString, CInt(..), withCString) import System.IO (Handle, stdout, stderr, openFile, IOMode(AppendMode), hFlush, hClose) import System.IO.Unsafe (unsafePerformIO) diff --git a/src/TorDNSEL/Main.hsc b/src/TorDNSEL/Main.hsc index 3037ee7..4d4092e 100644 --- a/src/TorDNSEL/Main.hsc +++ b/src/TorDNSEL/Main.hsc @@ -108,7 +108,7 @@ import System.Posix.Types (UserID, GroupID) import System.Posix.User ( getEffectiveUserID, UserEntry(userID), GroupEntry(groupID) , getUserEntryForName, getGroupEntryForName, setUserID, setGroupID ) -import Foreign.C (CString, CInt, withCString) +import Foreign.C (CString, CInt(..), withCString) import TorDNSEL.Config import TorDNSEL.Control.Concurrent.Link diff --git a/src/TorDNSEL/Random.hs b/src/TorDNSEL/Random.hs index 8464223..69c254d 100644 --- a/src/TorDNSEL/Random.hs +++ b/src/TorDNSEL/Random.hs @@ -26,7 +26,7 @@ import System.Directory (doesFileExist) import System.IO (Handle, openFile, IOMode(ReadMode)) import Foreign (Ptr, Word8, withForeignPtr, plusPtr) -import Foreign.C.Types (CInt) +import Foreign.C.Types (CInt(..)) import TorDNSEL.Util
[View Less]
1
0
0
0
[tordnsel/master] remove the extra Ord instance
by arlo@torproject.org
04 Mar '16
04 Mar '16
commit ead3f98a9d38c1221c6af096ca10f8e1479cee9c Author: David Kaloper <david(a)numm.org> Date: Thu Aug 8 04:07:08 2013 +0200 remove the extra Ord instance --- src/TorDNSEL/Util.hsc | 9 --------- 1 file changed, 9 deletions(-) diff --git a/src/TorDNSEL/Util.hsc b/src/TorDNSEL/Util.hsc index 76c6525..beee747 100644 --- a/src/TorDNSEL/Util.hsc +++ b/src/TorDNSEL/Util.hsc @@ -531,15 +531,6 @@ bindListeningUnixDomainStreamSocket sockPath mode = do listen sock sOMAXCONN
…
[View More]
return sock -instance Ord SockAddr where - SockAddrInet port1 addr1 `compare` SockAddrInet port2 addr2 = - case addr1 `compare` addr2 of - EQ -> port1 `compare` port2 - other -> other - SockAddrUnix path1 `compare` SockAddrUnix path2 = path1 `compare` path2 - SockAddrInet _ _ `compare` SockAddrUnix _ = LT - SockAddrUnix _ `compare` SockAddrInet _ _ = GT - -------------------------------------------------------------------------------- -- Monads
[View Less]
1
0
0
0
← Newer
1
...
115
116
117
118
119
120
121
...
126
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
Results per page:
10
25
50
100
200