1. 21 Sep, 2009 3 commits
  2. 18 Sep, 2009 1 commit
  3. 17 Sep, 2009 2 commits
  4. 16 Sep, 2009 1 commit
  5. 15 Sep, 2009 3 commits
    • Sebastian Hahn's avatar
      make some bug 1090 warnings go away · 113ba0e7
      Sebastian Hahn authored
      When we excluded some Exits, we were sometimes warning the user that we
      were going to use the node regardless. Many of those warnings were in
      fact bogus, because the relay in question was not used to connect to
      the outside world.
      Based on patch by Rotor, thanks!
    • Roger Dingledine's avatar
      Read "circwindow=x" from the consensus and use it · c43859c5
      Roger Dingledine authored
      Tor now reads the "circwindow" parameter out of the consensus,
      and uses that value for its circuit package window rather than the
      default of 1000 cells. Begins the implementation of proposal 168.
    • Nick Mathewson's avatar
      Implement proposal 167: Authorities vote on network parameters. · 381766ce
      Nick Mathewson authored
      This code adds a new field to vote on: "params".  It consists of a list of
      sorted key=int pairs.  The output is computed as the median of all the
      integers for any key on which anybody voted.
      Improved with input from Roger.
  6. 14 Sep, 2009 2 commits
    • Sebastian Hahn's avatar
      Fix a memory leak when parsing a ns · b792afa9
      Sebastian Hahn authored
      Adding the same vote to a networkstatus consensus leads to a memory leak
      on the client side. Fix that by only using the first vote from any given
      voter, and ignoring the others.
      Problem found by Rotor, who also helped writing the patch. Thanks!
    • Sebastian Hahn's avatar
      Fix a spec conformance issue when parsing a ns vote · c1a6fb42
      Sebastian Hahn authored
      A vote may only contain exactly one signature. Make sure we reject
      votes that violate this.
      Problem found by Rotor, who also helped writing the patch. Thanks!
  7. 03 Sep, 2009 1 commit
    • Roger Dingledine's avatar
      Fix obscure 64-bit big-endian hidserv bug · fcacf224
      Roger Dingledine authored
      Fix an obscure bug where hidden services on 64-bit big-endian
      systems might mis-read the timestamp in v3 introduce cells, and
      refuse to connect back to the client. Discovered by "rotor".
      Bugfix on
  8. 02 Sep, 2009 3 commits
  9. 01 Sep, 2009 1 commit
  10. 31 Aug, 2009 3 commits
    • Roger Dingledine's avatar
      Add getinfo accepted-server-descriptor. Clean spec. · 075c0040
      Roger Dingledine authored
      Add a "getinfo status/accepted-server-descriptor" controller
      command, which is the recommended way for controllers to learn
      whether our server descriptor has been successfully received by at
      least on directory authority. Un-recommend good-server-descriptor
      getinfo and status events until we have a better design for them.
    • Roger Dingledine's avatar
      Only send reachability status events on overall success/failure · 4c297f74
      Roger Dingledine authored
      We were telling the controller about CHECKING_REACHABILITY and
      REACHABILITY_FAILED status events whenever we launch a testing
      circuit or notice that one has failed. Instead, only tell the
      controller when we want to inform the user of overall success or
      overall failure. Bugfix on Fixes bug 1075. Reported
      by SwissTorExit.
    • Nick Mathewson's avatar
      Revise parsing of time and memory units to handle spaces. · 00b37f07
      Nick Mathewson authored
      When we added support for fractional units (like 1.5 MB) I broke
      support for giving units with no space (like 2MB).  This patch should
      fix that.  It also adds a propoer tor_parse_double().
      Fix for bug 1076.  Bugfix on
  11. 29 Aug, 2009 1 commit
  12. 28 Aug, 2009 3 commits
  13. 27 Aug, 2009 2 commits
  14. 26 Aug, 2009 4 commits
  15. 21 Aug, 2009 1 commit
  16. 20 Aug, 2009 3 commits
    • Roger Dingledine's avatar
      Survive unparseable cached cert file · eb829cc3
      Roger Dingledine authored
    • Roger Dingledine's avatar
      Notice v3 cert parsing failures · 7f518873
      Roger Dingledine authored
      If any the v3 certs we download are unparseable, we should actually
      notice the failure so we don't retry indefinitely. Bugfix on 0.2.0.x;
      reported by "rotator".
    • Nick Mathewson's avatar
      Fix a rare infinite-recursion bug when shutting down. · 9d118277
      Nick Mathewson authored
      Once we had called log_free_all(), anything that tried to log a
      message (like a failed tor_assert()) would fail like this:
         1. The logging call eventually invokes the _log() function.
         2. _log() calls tor_mutex_lock(log_mutex).
         3. tor_mutex_lock(m) calls tor_assert(m).
         4. Since we freed the log_mutex, tor_assert() fails, and tries to
            log its failure.
         5. GOTO 1.
      Now we allocate the mutex statically, and never destroy it on
      Bugfix on, which introduced the log mutex.
      This bug was found by Matt Edman.
  17. 19 Aug, 2009 2 commits
  18. 11 Aug, 2009 1 commit
  19. 10 Aug, 2009 2 commits
  20. 09 Aug, 2009 1 commit