Skip to content
Snippets Groups Projects
Forked from The Tor Project / Core / Tor
15656 commits behind the upstream repository.
David Goulet's avatar
David Goulet authored
These functions protect againts over and underflow. They BUG() in case we
overflow the counter.

Signed-off-by: David Goulet's avatarDavid Goulet <dgoulet@torproject.org>
4d812e29
History
Tor protects your privacy on the internet by hiding the connection
between your Internet address and the services you use. We believe Tor
is reasonably secure, but please ensure you read the instructions and
configure it properly.

To build Tor from source:
        ./configure && make && make install

To build Tor from a just-cloned git repository:
        sh autogen.sh && ./configure && make && make install

Home page:
        https://www.torproject.org/

Download new versions:
        https://www.torproject.org/download/download.html

Documentation, including links to installation and setup instructions:
        https://www.torproject.org/docs/documentation.html

Making applications work with Tor:
        https://wiki.torproject.org/projects/tor/wiki/doc/TorifyHOWTO

Frequently Asked Questions:
        https://www.torproject.org/docs/faq.html


To get started working on Tor development:
        See the doc/HACKING directory.