- Feb 08, 2018
-
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
Rationale: this helps for performance only, but we don't actually have any reason to think that the checks here are performance-critical. Let's not normalize the use of unsafe {}.
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
Explicitly inform the operator of the rejected relay to set a valid email address in the ContactInfo field and contact bad-relays@ mailing list. Fixes #25170 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Karsten Loesing authored
-
- Feb 07, 2018
-
-
Isis Lovecruft authored
* FIXES #25127: https://bugs.torproject.org/25127 * ADDS a new module to the Rust tor_util crate for small utilities for working with static strings between languages. * CHANGES the return type of protover_compute_for_old_tor to point to immutable data. * CHANGES the code from the previous commit to use the new static string utilities.
-
Roger Dingledine authored
also be more consistent about punctuation in doxygen comments
-
Nick Mathewson authored
-
Roger Dingledine authored
some of these ought to have been noticed by the "misspell" tool, so if anybody is debugging it, here are some bug reports :)
-
Nick Mathewson authored
-
David Goulet authored
On slow system, 1 msec between one read and the other was too tight. For instance, it failed on armel with a 4msec gap: https://buildd.debian.org/status/package.php?p=tor&suite=experimental Increase to 10 msec for now to address slow system. It is important that we keep this OP_LE test in so we make sure the msec/usec/nsec read aren't desynchronized by huge gaps. We'll adjust again if we ever encounter a system that goes slower than 10 msec between calls. Fixes #25113 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
-
George Kadianakis authored
-
- Feb 06, 2018
-
-
David Goulet authored
Remove a series of connection counters that were only used when dumping the rephist statistics with SIGUSR1 signal. This reduces the or_history_t structure size. Closes #25163 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
This removes the code that tracks the extend attemps a client makes. We don't use it and it was only used to provide statistics on a SIGUSR1 from the rephist dump stats function. Part of #25163 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Nick Mathewson authored
-
Isis Lovecruft authored
* FIXES #25127: https://bugs.torproject.org/25127.
-
- Feb 05, 2018
-
-
Nick Mathewson authored
-
David Goulet authored
Services can keep rendezvous circuits for a while so don't log them if tor is a single onion service. Fixes #25116 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
The HT_FOREACH() is insanely heavy on the CPU and this is part of the fast path so make it return the nice memory size counter we added in 4d812e29. Fixes #25148 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
- Feb 02, 2018
-
-
Nick Mathewson authored
This is needed so llvm_fuzz will see it too.
-
David Goulet authored
Becasue the circuit creation burst and rate can change at runtime it is possible that between two refill of a bucket, we end up setting the bucket value to less than there currently is. Fixes #25128 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
Nick Mathewson authored
-
Nick Mathewson authored
-
David Goulet authored
-
David Goulet authored
Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
These functions protect againts over and underflow. They BUG() in case we overflow the counter. Signed-off-by:
David Goulet <dgoulet@torproject.org>
-
David Goulet authored
If the cache is using 20% of our maximum allowed memory, clean 10% of it. Same behavior as the HS descriptor cache. Closes #25122 Signed-off-by:
David Goulet <dgoulet@torproject.org>
-