New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
0.10 #6935
Commits on Dec 12, 2014
-
Configuration menu - View commit details
-
Copy full SHA for 0133e4f - Browse repository at this point
Copy the full SHA 0133e4fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 44b4c0d - Browse repository at this point
Copy the full SHA 44b4c0dView commit details
Commits on Dec 15, 2014
-
Configuration menu - View commit details
-
Copy full SHA for a572ff7 - Browse repository at this point
Copy the full SHA a572ff7View commit details
Commits on Dec 16, 2014
-
Bump version but keep CLIENT_VERSION_IS_RELEASE at false as this is not a release yet.
Configuration menu - View commit details
-
Copy full SHA for c3c635b - Browse repository at this point
Copy the full SHA c3c635bView commit details
Commits on Dec 19, 2014
-
1
Configuration menu - View commit details
-
Copy full SHA for b03632a - Browse repository at this point
Copy the full SHA b03632aView commit details
Commits on Dec 22, 2014
-
Check against MANDATORY flags prior to accepting to mempool
Previously transactions were only tested again the STANDARD_SCRIPT_VERIFY_FLAGS prior to mempool acceptance, so any bugs in those flags that allowed actually-invalid transactions to pass would result in allowing invalid transactions into the mempool. Fortunately there is a second check in CreateNewBlock() that would prevent those transactions from being mined, resulting in an invalid block, however this could still be exploited as a DoS attack. Rebased-From: 7c041b3
Configuration menu - View commit details
-
Copy full SHA for 0cb8763 - Browse repository at this point
Copy the full SHA 0cb8763View commit details -
remove max orphan blocks config parameter since it is no longer funct…
…ional Rebased-From: 4bc95c4
Configuration menu - View commit details
-
Copy full SHA for ad3d208 - Browse repository at this point
Copy the full SHA ad3d208View commit details
Commits on Dec 23, 2014
-
Configuration menu - View commit details
-
Copy full SHA for 8446262 - Browse repository at this point
Copy the full SHA 8446262View commit details -
Enforce minRelayTxFee on wallet created tx and add a maxtxfee option.
Previously the minRelayTxFee was only enforced on user specified values. It was possible for smartfee to produce a fee below minRelayTxFee which would just result in the transaction getting stuck because it can't be relayed. This also introduces a maxtxfee option which sets an absolute maximum for any fee created by the wallet, with an intention of increasing user confidence that the automatic fees won't burn them. This was frequently a concern even before smartfees. If the configured fee policy won't even allow the wallet to meet the relay fee the transaction creation may be aborted. Rebased-From: aa279d6 Github-Pull: #5485
Configuration menu - View commit details
-
Copy full SHA for 11855c1 - Browse repository at this point
Copy the full SHA 11855c1View commit details -
Apply AreSane() checks to the fees from the network.
'Sane' was already defined by this code as: fee.GetFeePerK() > minRelayFee.GetFeePerK() * 10000 But sanity was only enforced for data loaded from disk. Note that this is a pretty expansive definition of 'sane': A 10 BTC fee is still passes the test if its on a 100kb transaction. This prevents a single insane fee on the network from making us reject our stored fee data at start. We still may reject valid saved fee state if minRelayFee is changed between executions. This also reduces the risk and limits the damage from a cascading failure where one party pays a bunch of insane fees which cases others to pay insane fees. Rebased-From: 6484930 Github-Pull: #5481
Configuration menu - View commit details
-
Copy full SHA for 15ad0b5 - Browse repository at this point
Copy the full SHA 15ad0b5View commit details -
Configuration menu - View commit details
-
Copy full SHA for d10a901 - Browse repository at this point
Copy the full SHA d10a901View commit details -
Configuration menu - View commit details
-
Copy full SHA for 3a88ba0 - Browse repository at this point
Copy the full SHA 3a88ba0View commit details -
Configuration menu - View commit details
-
Copy full SHA for c888111 - Browse repository at this point
Copy the full SHA c888111View commit details -
Configuration menu - View commit details
-
Copy full SHA for 63b5a1d - Browse repository at this point
Copy the full SHA 63b5a1dView commit details -
Configuration menu - View commit details
-
Copy full SHA for f4dcc1e - Browse repository at this point
Copy the full SHA f4dcc1eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 3aa3c71 - Browse repository at this point
Copy the full SHA 3aa3c71View commit details -
Configuration menu - View commit details
-
Copy full SHA for 13e129e - Browse repository at this point
Copy the full SHA 13e129eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 3434927 - Browse repository at this point
Copy the full SHA 3434927View commit details -
Configuration menu - View commit details
-
Copy full SHA for a230049 - Browse repository at this point
Copy the full SHA a230049View commit details -
Configuration menu - View commit details
-
Copy full SHA for 2bb0ca9 - Browse repository at this point
Copy the full SHA 2bb0ca9View commit details -
1
Configuration menu - View commit details
-
Copy full SHA for 4e0bfa5 - Browse repository at this point
Copy the full SHA 4e0bfa5View commit details
Commits on Dec 27, 2014
-
Fix CScriptID(const CScript& in) in empty script case
Previously an empty script wouldn't be hashed, and CScriptID would be assigned the incorrect value of 0 instead. This bug can be seen in the RPC decodescript command: $ btc decodescript "" { "asm" : "", "type" : "nonstandard", "p2sh" : "31h1vYVSYuKP6AhS86fbRdMw9XHieotbST" } Correct output: $ btc decodescript "" { "asm" : "", "type" : "nonstandard", "p2sh" : "3J98t1WpEZ73CNmQviecrnyiWrnqRhWNLy" } Rebased-From: d78f0da Github-Pull: #5541
Configuration menu - View commit details
-
Copy full SHA for 06ca065 - Browse repository at this point
Copy the full SHA 06ca065View commit details -
Configuration menu - View commit details
-
Copy full SHA for b3d67e1 - Browse repository at this point
Copy the full SHA b3d67e1View commit details -
Configuration menu - View commit details
-
Copy full SHA for 52e5705 - Browse repository at this point
Copy the full SHA 52e5705View commit details -
Configuration menu - View commit details
-
Copy full SHA for 591c569 - Browse repository at this point
Copy the full SHA 591c569View commit details
Commits on Dec 28, 2014
-
Configuration menu - View commit details
-
Copy full SHA for ed934bd - Browse repository at this point
Copy the full SHA ed934bdView commit details
Commits on Dec 30, 2014
-
Configuration menu - View commit details
-
Copy full SHA for 87d43a3 - Browse repository at this point
Copy the full SHA 87d43a3View commit details
Commits on Dec 31, 2014
-
Configuration menu - View commit details
-
Copy full SHA for 968f13c - Browse repository at this point
Copy the full SHA 968f13cView commit details -
Correct tooltip on address book page
Rebased-From: 06206bb Github-Pull: 5571
Configuration menu - View commit details
-
Copy full SHA for 8543b0d - Browse repository at this point
Copy the full SHA 8543b0dView commit details -
Configuration menu - View commit details
-
Copy full SHA for b790d13 - Browse repository at this point
Copy the full SHA b790d13View commit details -
Configuration menu - View commit details
-
Copy full SHA for 18021d0 - Browse repository at this point
Copy the full SHA 18021d0View commit details -
Bugfix: prioritisetransaction: Do some basic sanity checking on txid
Configuration menu - View commit details
-
Copy full SHA for 1eadfd9 - Browse repository at this point
Copy the full SHA 1eadfd9View commit details -
- Avoid ambiguous language regarding when transactions confirm - Elaborate on downgrading warning - Other minor language improvements - Clarify watch-only behaviour Github-Pull: #5534
Configuration menu - View commit details
-
Copy full SHA for d1bcef4 - Browse repository at this point
Copy the full SHA d1bcef4View commit details
Commits on Jan 2, 2015
-
Remove redundant copyright notices from README files
The normative place for these for the entire project is COPYING, and the main README already has a MIT license section. Rebased-From: e6df2bb
Configuration menu - View commit details
-
Copy full SHA for 8061d67 - Browse repository at this point
Copy the full SHA 8061d67View commit details -
Bump project-wide COPYRIGHT_YEAR to 2015
There is still a redundancy here between configure.ac and clientversion.h. Rebased-From: edbc904
Configuration menu - View commit details
-
Copy full SHA for 4f57a3b - Browse repository at this point
Copy the full SHA 4f57a3bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 9241f7a - Browse repository at this point
Copy the full SHA 9241f7aView commit details -
Configuration menu - View commit details
-
Copy full SHA for 50891ad - Browse repository at this point
Copy the full SHA 50891adView commit details -
Configuration menu - View commit details
-
Copy full SHA for c202901 - Browse repository at this point
Copy the full SHA c202901View commit details -
Configuration menu - View commit details
-
Copy full SHA for 221a380 - Browse repository at this point
Copy the full SHA 221a380View commit details
Commits on Jan 3, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 94b362d - Browse repository at this point
Copy the full SHA 94b362dView commit details
Commits on Jan 5, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 4a3d3e2 - Browse repository at this point
Copy the full SHA 4a3d3e2View commit details -
4a3d3e2 Fix typo in release notes (Peter Todd)
Configuration menu - View commit details
-
Copy full SHA for 68c0580 - Browse repository at this point
Copy the full SHA 68c0580View commit details
Commits on Jan 6, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 58fda4d - Browse repository at this point
Copy the full SHA 58fda4dView commit details -
Configuration menu - View commit details
-
Copy full SHA for 06fdf32 - Browse repository at this point
Copy the full SHA 06fdf32View commit details
Commits on Jan 7, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 3022e7d - Browse repository at this point
Copy the full SHA 3022e7dView commit details -
Bugfix: only track UTXO modification after lookup
Otherwise, if CCoinsViewCache::ModifyCoins throws an exception in between setting hasModifier and constructing the CCoinsModifier, the cache ends up in an inconsistent state, resulting in an assert failure in the next modification. Bug discovered by Wladimir J. van der Laan. Rebased-From: 1c52aad Github-Pull: #5597
Configuration menu - View commit details
-
Copy full SHA for 008138c - Browse repository at this point
Copy the full SHA 008138cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 867c600 - Browse repository at this point
Copy the full SHA 867c600View commit details
Commits on Jan 8, 2015
-
2ecd294 Bugfix: configure: Correctly detect "nothing to build" condition (Luke Dashjr) b7a4ecc Bugfix: Only check for boost when building code that requires it (Luke Dashjr) a19eeac Bugfix: configure: Check for openssl/ec.h (Luke Dashjr) fe925e2 Use EXTRA_LIBRARIES instead of noinst_LIBRARIES so we can avoid building unused code (Cory Fields)
Configuration menu - View commit details
-
Copy full SHA for 7fdbedc - Browse repository at this point
Copy the full SHA 7fdbedcView commit details -
Configuration menu - View commit details
-
Copy full SHA for e2677d7 - Browse repository at this point
Copy the full SHA e2677d7View commit details -
Configuration menu - View commit details
-
Copy full SHA for 263b65e - Browse repository at this point
Copy the full SHA 263b65eView commit details
Commits on Jan 10, 2015
-
4
Configuration menu - View commit details
-
Copy full SHA for ace39db - Browse repository at this point
Copy the full SHA ace39dbView commit details -
Configuration menu - View commit details
-
Copy full SHA for 2d375fe - Browse repository at this point
Copy the full SHA 2d375feView commit details -
Configuration menu - View commit details
-
Copy full SHA for 76ce5c8 - Browse repository at this point
Copy the full SHA 76ce5c8View commit details
Commits on Jan 12, 2015
-
Improve robustness of DER recoding code
Add some defensive programming on top of #5634. This copies the respective OpenSSL code in ECDSA_verify in OpenSSL pre-1.0.1k (e.g. https://github.com/openssl/openssl/blob/OpenSSL_1_0_1j/crypto/ecdsa/ecs_vrf.c#L89) more closely. As reported by @SergioDemianLerner. Github-Pull: #5640 Rebased-From: c6b7b29
Configuration menu - View commit details
-
Copy full SHA for 12b7c44 - Browse repository at this point
Copy the full SHA 12b7c44View commit details -
Introduce 10 minute block download timeout
This will disconnect peers that do not transfer a block in 10 minutes, plus 5 minutes for every previously queued block with validated headers (accomodating downstream bandwidth down to a few kilobytes per second - below that the node would have trouble staying synchronized anyway). Github-Pull: #5608 Rebased-From: 9161303
Configuration menu - View commit details
-
Copy full SHA for a3a7317 - Browse repository at this point
Copy the full SHA a3a7317View commit details -
Configuration menu - View commit details
-
Copy full SHA for 4e7c219 - Browse repository at this point
Copy the full SHA 4e7c219View commit details -
Update 0.10 release notes as of 0.10.0rc2
Also add 0.9.4's release notes to the archive. Added commits based on http://sourceforge.net/p/bitcoin/mailman/message/33225960/ [skip ci]
Micha committedJan 12, 2015 Configuration menu - View commit details
-
Copy full SHA for af35bdc - Browse repository at this point
Copy the full SHA af35bdcView commit details -
Configuration menu - View commit details
-
Copy full SHA for c3200bc - Browse repository at this point
Copy the full SHA c3200bcView commit details -
af35bdc Update 0.10 release notes as of 0.10.0rc2 (Micha)
Configuration menu - View commit details
-
Copy full SHA for 249bf0e - Browse repository at this point
Copy the full SHA 249bf0eView commit details
Commits on Jan 15, 2015
-
Add a -rpckeepalive and disable RPC use of HTTP persistent connections.
It turns out that some miners have been staying with old versions of Bitcoin Core because their software behaves poorly with persistent connections and the Bitcoin Core thread and connection limits. What happens is that underlying HTTP libraries leave connections open invisibly to their users and then the user runs into the default four thread limit. This looks like Bitcoin Core is unresponsive to RPC. There are many things that should be improved in Bitcoin Core's behavior here, e.g. supporting more concurrent connections, not tying up threads for idle connections, disconnecting kept-alive connections when limits are reached, etc. All are fairly big, risky changes. Disabling keep-alive is a simple workaround. It's often not easy to turn off the keep-alive support in the client where it may be buried in some platform library. If you are one of the few who really needs persistent connections you probably know that you want them and can find a switch; while if you don't and the misbehavior is hitting you it is hard to discover the source of your problems is keepalive related. Given that it is best to default to off until they're handled better. Github-Merge: #5655 Rebased-From: 16a5c18 56c1093 1dd8ee7
Configuration menu - View commit details
-
Copy full SHA for aaf55d2 - Browse repository at this point
Copy the full SHA aaf55d2View commit details
Commits on Jan 19, 2015
-
Restore RPC HTTP keepalives to default.
This avoids a regression for issues like #334 where high speed repeated connections eventually run the HTTP client out of sockets because all of theirs end up in time_wait. Maybe the trade-off here is suboptimal, but if both choices will fail then we prefer fewer changes until the root cause is solved. Rebased-From: 1a25a7e 7d2cb48 Github-Pull: #5674
Configuration menu - View commit details
-
Copy full SHA for 186a517 - Browse repository at this point
Copy the full SHA 186a517View commit details -
qt: fix broken unicode chars on osx 10.10
- qt: avoid hard-coding font names They may not contain all necessary characters for a language - qt: fix broken unicode chars on osx 10.10 The default font changed again. The real fix is to compile qt against a >= 10.8 sdk, but this is simple enough to backport to 0.10 to avoid having to do that there. Note: NSAppKitVersionNumber is a double and there's no official value for NSAppKitVersionNumber10_10. Since == isn't reliable for doubles, use Apple's guidelines for testing versions here: https://developer.apple.com/library/mac/releasenotes/AppKit/RN-AppKit/ Chinese and Japanese fonts have been hard-coded as well, otherwise they fail to show up at all. - qt: fonts: allow SubstituteFonts to filter based on user's language SubstituteFonts() has been moved to after app identification so that QSettings are accessible. Github-Pull: #5671 Rebased-From: 73cd4ed 52954e6 f5ad78b
Configuration menu - View commit details
-
Copy full SHA for 58259ad - Browse repository at this point
Copy the full SHA 58259adView commit details
Commits on Jan 23, 2015
-
fix crash: CoinControl "space" bug
Just like novacoin-project/novacoin@baf80c2 Github-Pull: #5700 Rebased-From: 944c256
Configuration menu - View commit details
-
Copy full SHA for ed4206a - Browse repository at this point
Copy the full SHA ed4206aView commit details
Commits on Jan 26, 2015
-
Make empty byte arrays pass CheckSignatureEncoding()
Makes it possible to compactly provide a delibrately invalid signature for use with CHECK(MULTI)SIG. For instance with BIP19 if m != n invalid signatures need to be provided in the scriptSig; prior to this change those invalid signatures would need to be large DER-encoded signatures. Note that we may want to further expand on this change in the future by saying that only OP_0 is a "valid" invalid signature; BIP19 even with this change is inherently malleable as the invalid signatures can be any validly encoded DER signature. Rebased-From: 2fa9a8e Github-Pull: #5627
Configuration menu - View commit details
-
Copy full SHA for b24ff47 - Browse repository at this point
Copy the full SHA b24ff47View commit details -
Configuration menu - View commit details
-
Copy full SHA for c5044bc - Browse repository at this point
Copy the full SHA c5044bcView commit details
Commits on Jan 29, 2015
-
Configuration menu - View commit details
-
Copy full SHA for b61940b - Browse repository at this point
Copy the full SHA b61940bView commit details
Commits on Jan 30, 2015
-
[Qt] don't allow amount changes when AmountSpinBox is read-only
- before it was possible to use the steps to change e.g. amouns of authenticated or unauthenticated payment requests (AmountSpinBox is already set to read-only here) - this is now fixed - also move the reimplemented stepEnabled() function to the protected section of our class, where it belongs (see Qt doc) Github-Pull: #5637 Rebased-From: 0fd9e2b
Configuration menu - View commit details
-
Copy full SHA for 6a02ef8 - Browse repository at this point
Copy the full SHA 6a02ef8View commit details
Commits on Feb 1, 2015
-
Configuration menu - View commit details
-
Copy full SHA for abfbeaf - Browse repository at this point
Copy the full SHA abfbeafView commit details -
Configuration menu - View commit details
-
Copy full SHA for 18695f0 - Browse repository at this point
Copy the full SHA 18695f0View commit details -
Configuration menu - View commit details
-
Copy full SHA for 773c30d - Browse repository at this point
Copy the full SHA 773c30dView commit details -
Configuration menu - View commit details
-
Copy full SHA for 6da2028 - Browse repository at this point
Copy the full SHA 6da2028View commit details -
Configuration menu - View commit details
-
Copy full SHA for 3916a81 - Browse repository at this point
Copy the full SHA 3916a81View commit details
Commits on Feb 2, 2015
-
Configuration menu - View commit details
-
Copy full SHA for fd7350d - Browse repository at this point
Copy the full SHA fd7350dView commit details
Commits on Feb 3, 2015
-
fd7350d doc/release-notes.md: Add summary of mining enhancements (Luke Dashjr)
Configuration menu - View commit details
-
Copy full SHA for b788c55 - Browse repository at this point
Copy the full SHA b788c55View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1bbad80 - Browse repository at this point
Copy the full SHA 1bbad80View commit details -
Configuration menu - View commit details
-
Copy full SHA for 2448d34 - Browse repository at this point
Copy the full SHA 2448d34View commit details -
Configuration menu - View commit details
-
Copy full SHA for b6347bf - Browse repository at this point
Copy the full SHA b6347bfView commit details -
3916a81 Increase coverage of DERSIG edge cases (Pieter Wuille) 6da2028 Add RPC test for DERSIG BIP switchover logic (Pieter Wuille) 773c30d BIP66 changeover logic (Pieter Wuille) 18695f0 Example unit tests from BIP66 (Pieter Wuille) abfbeaf Change IsDERSignature to BIP66 implementation (Pieter Wuille)
Configuration menu - View commit details
-
Copy full SHA for 336f9fb - Browse repository at this point
Copy the full SHA 336f9fbView commit details -
Increase block download timeout base from 10 to 20 minutes.
This harmonizes the block fetch timeout with the existing ping timeout and eliminates a guaranteed eventual failure from congestion collapse for a network operating right at its limit. It's unlikely that we wouldn't suffer other failures if we were really anywhere near the network's limit, and a complete avoidance of congestion collapse risk requires (I think) an exponential back-off. So this isn't a major concern, but I think it's also useful for reducing the complexity of understanding out timeouts. Github-Pull: #5647 Rebased-From: 3ff735c
Configuration menu - View commit details
-
Copy full SHA for 1eb14af - Browse repository at this point
Copy the full SHA 1eb14afView commit details
Commits on Feb 5, 2015
-
Modify release-notes for changes related to free tranactions
Add comment about free transactions no longer being the default Inform about the relay policy change
Configuration menu - View commit details
-
Copy full SHA for 63efb36 - Browse repository at this point
Copy the full SHA 63efb36View commit details -
63efb36 Modify release-notes for changes related to free tranactions (Alex Morcos)
Configuration menu - View commit details
-
Copy full SHA for 275400b - Browse repository at this point
Copy the full SHA 275400bView commit details -
Configuration menu - View commit details
-
Copy full SHA for e43f25c - Browse repository at this point
Copy the full SHA e43f25cView commit details
Commits on Feb 8, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 7b6c847 - Browse repository at this point
Copy the full SHA 7b6c847View commit details
Commits on Feb 9, 2015
-
7b6c847 doc/release-notes.md: Explain affect of BIP66 on miners (Luke Dashjr)
Configuration menu - View commit details
-
Copy full SHA for 327d3e8 - Browse repository at this point
Copy the full SHA 327d3e8View commit details
Commits on Feb 13, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 047a898 - Browse repository at this point
Copy the full SHA 047a898View commit details
Commits on Feb 20, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 7f502be - Browse repository at this point
Copy the full SHA 7f502beView commit details
Commits on Feb 23, 2015
-
Configuration menu - View commit details
-
Copy full SHA for d148f62 - Browse repository at this point
Copy the full SHA d148f62View commit details
Commits on Feb 24, 2015
-
Sanitize command strings before logging them.
Normally bitcoin core does not display any network originated strings without sanitizing or hex encoding. This wasn't done for strcommand in many places. This could be used to play havoc with a terminal displaying the logs, especially with printtoconsole in use. Thanks to Evil-Knievel for reporting this issue. Conflicts: src/main.cpp
Configuration menu - View commit details
-
Copy full SHA for 23126a0 - Browse repository at this point
Copy the full SHA 23126a0View commit details
Commits on Feb 26, 2015
-
Better fingerprinting protection for non-main-chain getdatas.
Configuration menu - View commit details
-
Copy full SHA for aeb9279 - Browse repository at this point
Copy the full SHA aeb9279View commit details
Commits on Mar 9, 2015
-
[Qt] fix a issue where "command line options"-action overwrite "Prefe…
Configuration menu - View commit details
-
Copy full SHA for 786cf72 - Browse repository at this point
Copy the full SHA 786cf72View commit details -
Configuration menu - View commit details
-
Copy full SHA for d5d8998 - Browse repository at this point
Copy the full SHA d5d8998View commit details -
Ignore getaddr messages on Outbound connections.
The only time when a client sends a "getaddr" message is when he esatblishes an Outbound connection (see ProcessMessage() in src/main.cpp). Another bitcoin client is expected to receive a "getaddr" message only on Inbound connection. Ignoring "gettaddr" requests on Outbound connections can resolve potential privacy issues (and as was said such request normally do not happen anyway). Rebased-From: dca799e Github-Pull: #5442
Configuration menu - View commit details
-
Copy full SHA for 200f293 - Browse repository at this point
Copy the full SHA 200f293View commit details
Commits on Mar 11, 2015
-
fix possible block db breakage during re-index
When re-indexing, there are a few cases where garbage data may be skipped in the block files. In these cases, the indices are correctly written to the index db, however the pointer to the next position for writing in the current block file is calculated by adding the sizes of the valid blocks found. As a result, when the re-index is finished, the index db is correct for all existing blocks, but the next block will be written to an incorrect offset, likely overwriting existing blocks. Rather than using the sum of all valid blocks to determine the next write position, use the end of the last block written to the file. Don't assume that the current block is the last one in the file, since they may be read out-of-order. Rebased-From: bb6acff Github-Pull: #5864
Configuration menu - View commit details
-
Copy full SHA for 002c8a2 - Browse repository at this point
Copy the full SHA 002c8a2View commit details
Commits on Mar 12, 2015
-
Configuration menu - View commit details
-
Copy full SHA for c91c660 - Browse repository at this point
Copy the full SHA c91c660View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1117378 - Browse repository at this point
Copy the full SHA 1117378View commit details
Commits on Mar 16, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 81145a6 - Browse repository at this point
Copy the full SHA 81145a6View commit details -
Configuration menu - View commit details
-
Copy full SHA for 2c08406 - Browse repository at this point
Copy the full SHA 2c08406View commit details
Commits on Mar 17, 2015
-
Configuration menu - View commit details
-
Copy full SHA for ca301bf - Browse repository at this point
Copy the full SHA ca301bfView commit details
Commits on Mar 18, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 601327b - Browse repository at this point
Copy the full SHA 601327bView commit details
Commits on Mar 19, 2015
-
0.10 fix for crashes on OSX 10.6
strnlen is available at build-time but not at runtime, causing a crash. 0.11 drops support for 10.6, so this is not needed in master.
Configuration menu - View commit details
-
Copy full SHA for 8752b5c - Browse repository at this point
Copy the full SHA 8752b5cView commit details -
8752b5c 0.10 fix for crashes on OSX 10.6 (Cory Fields)
Configuration menu - View commit details
-
Copy full SHA for 10c09f9 - Browse repository at this point
Copy the full SHA 10c09f9View commit details
Commits on Mar 24, 2015
-
Configuration menu - View commit details
-
Copy full SHA for c9e022b - Browse repository at this point
Copy the full SHA c9e022bView commit details -
Configuration menu - View commit details
-
Copy full SHA for 1d2cdd2 - Browse repository at this point
Copy the full SHA 1d2cdd2View commit details
Commits on Mar 25, 2015
-
Configuration menu - View commit details
-
Copy full SHA for a316622 - Browse repository at this point
Copy the full SHA a316622View commit details
Commits on Mar 26, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 78f64ef - Browse repository at this point
Copy the full SHA 78f64efView commit details -
Configuration menu - View commit details
-
Copy full SHA for 0eccf0a - Browse repository at this point
Copy the full SHA 0eccf0aView commit details -
Configuration menu - View commit details
-
Copy full SHA for 4635a4c - Browse repository at this point
Copy the full SHA 4635a4cView commit details
Commits on Mar 28, 2015
-
Add a consistency check for the block chain data structures
This adds a -checkblockindex (defaulting to true for regtest), which occasionally does a full consistency check for mapBlockIndex, setBlockIndexCandidates, chainActive, and mapBlocksUnlinked.
Configuration menu - View commit details
-
Copy full SHA for a1f425b - Browse repository at this point
Copy the full SHA a1f425bView commit details
Commits on Mar 30, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 90bef66 - Browse repository at this point
Copy the full SHA 90bef66View commit details
Commits on Apr 1, 2015
-
Configuration menu - View commit details
-
Copy full SHA for b788994 - Browse repository at this point
Copy the full SHA b788994View commit details -
Make addrman's bucket placement deterministic.
Give each address a single fixed location in the new and tried tables, which become simple fixed-size arrays instead of sets and vectors. This prevents attackers from having an advantages by inserting an address multiple times. This change was suggested as Countermeasure 1 in Eclipse Attacks on Bitcoin’s Peer-to-Peer Network, Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg. ePrint Archive Report 2015/263. March 2015. It is also more efficient. Conflicts: src/addrman.cpp src/addrman.h Rebased-From: e6b343d Github-Pull: #5941
Configuration menu - View commit details
-
Copy full SHA for cf0218f - Browse repository at this point
Copy the full SHA cf0218fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 2218d4b - Browse repository at this point
Copy the full SHA 2218d4bView commit details -
Do not bias outgoing connections towards fresh addresses
This change was suggested as Countermeasure 2 in Eclipse Attacks on Bitcoin’s Peer-to-Peer Network, Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg. ePrint Archive Report 2015/263. March 2015. Rebased-From: 68ba3f67bd500a64fb8932c6b41924ddc31d76f Github-Pull: #5941
Configuration menu - View commit details
-
Copy full SHA for 214154e - Browse repository at this point
Copy the full SHA 214154eView commit details -
Always use a 50% chance to choose between tried and new entries
Configuration menu - View commit details
-
Copy full SHA for 0c6f334 - Browse repository at this point
Copy the full SHA 0c6f334View commit details -
Configuration menu - View commit details
-
Copy full SHA for aa587d4 - Browse repository at this point
Copy the full SHA aa587d4View commit details -
Configuration menu - View commit details
-
Copy full SHA for ae1479a - Browse repository at this point
Copy the full SHA ae1479aView commit details -
Configuration menu - View commit details
-
Copy full SHA for 2b7636c - Browse repository at this point
Copy the full SHA 2b7636cView commit details -
1
Configuration menu - View commit details
-
Copy full SHA for fe31225 - Browse repository at this point
Copy the full SHA fe31225View commit details -
Configuration menu - View commit details
-
Copy full SHA for 9e1cc16 - Browse repository at this point
Copy the full SHA 9e1cc16View commit details
Commits on Apr 2, 2015
-
Docs: Use new Bitcoin.org download URLs
To give the torrents (which use web seeds) better names, we updated the URL scheme on bitcoin.org/bin. This updates the release notes and release doc accordingly, plus updates some other details based on recent changes to the site. [skip ci]
Configuration menu - View commit details
-
Copy full SHA for bf1cc80 - Browse repository at this point
Copy the full SHA bf1cc80View commit details
Commits on Apr 3, 2015
-
bf1cc80 Docs: Use new Bitcoin.org download URLs (David A. Harding)
Configuration menu - View commit details
-
Copy full SHA for 24e4899 - Browse repository at this point
Copy the full SHA 24e4899View commit details
Commits on Apr 6, 2015
-
doc: Credit Jonas Nick in release notes
For discovering the vulnerability and discussing the fix that led to PR #5860.
Configuration menu - View commit details
-
Copy full SHA for 149c1d8 - Browse repository at this point
Copy the full SHA 149c1d8View commit details -
Keep mempool consistent during block-reorgs
This fixes a subtle bug involving block re-orgs and non-standard transactions. Start with a block containing a non-standard transaction, and one or more transactions spending it in the memory pool. Then re-org away from that block to another chain that does not contain the non-standard transaction. Result before this fix: the dependent transactions get stuck in the mempool without their parent, putting the mempool in an inconsistent state. Tested with a new unit test (adapted for 0.10). Rebased-From: ad9e86d Github-Pull: #5945
Configuration menu - View commit details
-
Copy full SHA for 1c62e84 - Browse repository at this point
Copy the full SHA 1c62e84View commit details
Commits on Apr 9, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 34127c7 - Browse repository at this point
Copy the full SHA 34127c7View commit details
Commits on Apr 14, 2015
-
Configuration menu - View commit details
-
Copy full SHA for eae305f - Browse repository at this point
Copy the full SHA eae305fView commit details
Commits on Apr 16, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 57d1f46 - Browse repository at this point
Copy the full SHA 57d1f46View commit details
Commits on Apr 18, 2015
-
Initialization: set fallback locale as environment variable
The scope of `std::locale::global` appears to be smaller than `setenv("LC_ALL", ...)` and insufficient to fix messed up locale settings for the whole application.
Configuration menu - View commit details
-
Copy full SHA for df45564 - Browse repository at this point
Copy the full SHA df45564View commit details -
Initialization: setup environment before starting tests
The environment is prepared by the main thread to guard against invalid locale settings and to prevent deinitialization issues of Boost path, which can result in app crashes.
Configuration menu - View commit details
-
Copy full SHA for 7494e09 - Browse repository at this point
Copy the full SHA 7494e09View commit details -
Initialization: setup environment before starting QT tests
The environment is prepared by the main thread to guard against invalid locale settings.
Configuration menu - View commit details
-
Copy full SHA for 323de27 - Browse repository at this point
Copy the full SHA 323de27View commit details
Commits on Apr 20, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 3a70613 - Browse repository at this point
Copy the full SHA 3a70613View commit details -
Configuration menu - View commit details
-
Copy full SHA for bac6fca - Browse repository at this point
Copy the full SHA bac6fcaView commit details -
Cap nAttempts penalty at 8 and switch to pow instead of a division loop.
On hosts that had spent some time with a failed internet connection their nAttempts penalty was going through the roof (e.g. thousands for all peers) and as a result the connect search was pegging the CPU and failing to get more than a 4 connections after days of running (because it was taking so long per try). Rebased-From: a784f90 Github-Pull: #6029
Configuration menu - View commit details
-
Copy full SHA for 139cd81 - Browse repository at this point
Copy the full SHA 139cd81View commit details -
Configuration menu - View commit details
-
Copy full SHA for bf8ad0d - Browse repository at this point
Copy the full SHA bf8ad0dView commit details
Commits on Apr 25, 2015
-
Configuration menu - View commit details
-
Copy full SHA for d8ac901 - Browse repository at this point
Copy the full SHA d8ac901View commit details
Commits on May 4, 2015
-
Configuration menu - View commit details
-
Copy full SHA for ebc0e41 - Browse repository at this point
Copy the full SHA ebc0e41View commit details
Commits on May 6, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 824c011 - Browse repository at this point
Copy the full SHA 824c011View commit details
Commits on May 7, 2015
-
824c011 wallet: fix boost::get usage with boost 1.58 (Cory Fields)
Configuration menu - View commit details
-
Copy full SHA for 9a5b88c - Browse repository at this point
Copy the full SHA 9a5b88cView commit details
Commits on May 10, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 424ae66 - Browse repository at this point
Copy the full SHA 424ae66View commit details
Commits on May 12, 2015
-
Configuration menu - View commit details
-
Copy full SHA for d7e7727 - Browse repository at this point
Copy the full SHA d7e7727View commit details -
Configuration menu - View commit details
-
Copy full SHA for 49e4d14 - Browse repository at this point
Copy the full SHA 49e4d14View commit details -
Configuration menu - View commit details
-
Copy full SHA for da65606 - Browse repository at this point
Copy the full SHA da65606View commit details -
2
Configuration menu - View commit details
-
Copy full SHA for ff32503 - Browse repository at this point
Copy the full SHA ff32503View commit details
Commits on May 16, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 16f4560 - Browse repository at this point
Copy the full SHA 16f4560View commit details
Commits on May 27, 2015
-
1
Configuration menu - View commit details
-
Copy full SHA for e4a7d51 - Browse repository at this point
Copy the full SHA e4a7d51View commit details -
Fix two problems in CSubNet parsing
Fix two CSubNet constructor problems: - The use of `/x` where 8 does not divide x was broken, due to a bit-order issue - The use of e.g. `1.2.3.4/24` where the netmasked bits in the network are not 0 was broken. Fix this by explicitly normalizing the netwok according to the bitmask. Also add tests for these cases. Fixes #6179. Thanks to @jonasschnelli for reporting and initial fix. Rebased-From: b45c50c Github-Pull: #6186
Configuration menu - View commit details
-
Copy full SHA for ae3d8f3 - Browse repository at this point
Copy the full SHA ae3d8f3View commit details -
Configuration menu - View commit details
-
Copy full SHA for ebd7d8d - Browse repository at this point
Copy the full SHA ebd7d8dView commit details
Commits on Jun 2, 2015
-
Configuration menu - View commit details
-
Copy full SHA for ecc96f5 - Browse repository at this point
Copy the full SHA ecc96f5View commit details
Commits on Jun 3, 2015
-
json: fail read_string if string contains trailing garbage
Change `read_string` to fail when not the entire input has been consumed. This avoids unexpected, even dangerous behavior (fixes #6223). The new JSON parser adapted in #6121 also solves this problem so in master this is a temporary fix, but should be backported to older releases. Also adds tests for the new behavior. Github-Pull: #6226 Rebased-From: 4e157fc
Configuration menu - View commit details
-
Copy full SHA for 181771b - Browse repository at this point
Copy the full SHA 181771bView commit details
Commits on Jun 10, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 09334e0 - Browse repository at this point
Copy the full SHA 09334e0View commit details
Commits on Jun 15, 2015
-
Chance "getbalance *" not to use IsTrusted. The method and result now match the "getbalance <specific-account>" behavior. In particular, "getbalance * 0" now works. Also fixed a comment -- GetGalance has required 1 confirmation for many years, and the default "getbalance *" behavior matches that. Github-Pull: #6276 Rebased-From: 7d6a85a Rebased-By: @trasher-
Configuration menu - View commit details
-
Copy full SHA for 0fd8464 - Browse repository at this point
Copy the full SHA 0fd8464View commit details -
Add option
-alerts
to opt out of alert systemMake it possible to opt-out of the centralized alert system by providing an option `-noalerts` or `-alerts=0`. The default remains unchanged. This is a gentler form of #6260, in which I went a bit overboard by removing the alert system completely. I intend to add this to the GUI options in another pull after this. Conflicts: src/init.cpp src/main.cpp Github-Pull: #6274 Rebased-From: 02a6702
Configuration menu - View commit details
-
Copy full SHA for be64204 - Browse repository at this point
Copy the full SHA be64204View commit details
Commits on Jun 22, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 3f55638 - Browse repository at this point
Copy the full SHA 3f55638View commit details
Commits on Jul 17, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 7e66e9c - Browse repository at this point
Copy the full SHA 7e66e9cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 255eced - Browse repository at this point
Copy the full SHA 255ecedView commit details
Commits on Jul 20, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 0739e6e - Browse repository at this point
Copy the full SHA 0739e6eView commit details -
Fix warning introduced by #6412
SOCKET are defined as unsigned integers, thus always >=0. Rebased-From: 89289d8
Configuration menu - View commit details
-
Copy full SHA for ae52a7f - Browse repository at this point
Copy the full SHA ae52a7fView commit details
Commits on Sep 21, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 8b59079 - Browse repository at this point
Copy the full SHA 8b59079View commit details -
Avoid leaking file descriptors in RegisterLoad
This is pretty trivial, but if there's an error here we'll leak a file descriptor. Changed it to always close the file.
Configuration menu - View commit details
-
Copy full SHA for 04507de - Browse repository at this point
Copy the full SHA 04507deView commit details -
Checking libcrypto for a function after we've already found a (possibly different) libcrypto is not what we want to do here. pkg-config might've found a cross lib while AC_CHECK_LIB may find a different or native one. Run a link-test against the lib that's already been found instead.
Configuration menu - View commit details
-
Copy full SHA for 3861f0f - Browse repository at this point
Copy the full SHA 3861f0fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 4e5ea71 - Browse repository at this point
Copy the full SHA 4e5ea71View commit details -
Configuration menu - View commit details
-
Copy full SHA for 843469e - Browse repository at this point
Copy the full SHA 843469eView commit details -
Handle leveldb::DestroyDB() errors on wipe failure
Add error checking to CLevelDBWrapper for errors from leveldb::DestroyDB(). Without it, if unlink() or DeleteFileW() fail to delete files, they will fail silent. If they fail to delete any files, CLevelDBWrapper will silently open and read the existing database. Typically any permissions issues would be caught by leveldb as it churns through many files as part of its compaction process, but it is conceivable that this could cause problems on Windows with anti-virus and indexing software.
Configuration menu - View commit details
-
Copy full SHA for 28d76d2 - Browse repository at this point
Copy the full SHA 28d76d2View commit details -
Configuration menu - View commit details
-
Copy full SHA for 65426ac - Browse repository at this point
Copy the full SHA 65426acView commit details -
Configuration menu - View commit details
-
Copy full SHA for bdf2542 - Browse repository at this point
Copy the full SHA bdf2542View commit details -
Configuration menu - View commit details
-
Copy full SHA for 0194bdd - Browse repository at this point
Copy the full SHA 0194bddView commit details -
net: Set SO_REUSEADDR for Windows too
When running the rpc tests in Wine, nodes often fail to listen on localhost due to a stale socket from a previous run. This aligns the behavior with other platforms.
Configuration menu - View commit details
-
Copy full SHA for c9ad65e - Browse repository at this point
Copy the full SHA c9ad65eView commit details -
Configuration menu - View commit details
-
Copy full SHA for 0dfcdd4 - Browse repository at this point
Copy the full SHA 0dfcdd4View commit details -
add support for miniupnpc api version 14
The value of new arg ttl is set to 2 as it's recommended default.
Configuration menu - View commit details
-
Copy full SHA for 2ede6b7 - Browse repository at this point
Copy the full SHA 2ede6b7View commit details -
Configuration menu - View commit details
-
Copy full SHA for ceba0f8 - Browse repository at this point
Copy the full SHA ceba0f8View commit details -
Configuration menu - View commit details
-
Copy full SHA for 5e6d893 - Browse repository at this point
Copy the full SHA 5e6d893View commit details
Commits on Sep 22, 2015
-
Configuration menu - View commit details
-
Copy full SHA for f696ea1 - Browse repository at this point
Copy the full SHA f696ea1View commit details -
5e6d893 travis: for travis generating an extra build (Cory Fields) ceba0f8 PARTIAL: typofixes (found by misspell_fixer) (Veres Lajos) 2ede6b7 add support for miniupnpc api version 14 (Pavel Vasin) 0dfcdd4 rpc-tests: re-enable rpc-tests for Windows (Cory Fields) c9ad65e net: Set SO_REUSEADDR for Windows too (Cory Fields) 0194bdd add unit test for CNetAddr::GetGroup. (Alex Morcos) bdf2542 Fix masking of irrelevant bits in address groups. (Alex Morcos) 65426ac Add missing files to files.md (fanquake) 28d76d2 Handle leveldb::DestroyDB() errors on wipe failure (Adam Weiss) 843469e Use unique name for AlertNotify tempfile (Casey Rodarmor) 4e5ea71 Make sure LogPrint strings are line-terminated (J Ross Nicoll) 3861f0f build: fix libressl detection (Cory Fields) 04507de Avoid leaking file descriptors in RegisterLoad (Casey Rodarmor) 8b59079 Add autogen.sh to source tarball. (randy-waterhouse)
Configuration menu - View commit details
-
Copy full SHA for 743cc9e - Browse repository at this point
Copy the full SHA 743cc9eView commit details
Commits on Sep 29, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 9bd0b4a - Browse repository at this point
Copy the full SHA 9bd0b4aView commit details
Commits on Oct 7, 2015
-
Test LowS in standardness, removes nuisance malleability vector.
This adds SCRIPT_VERIFY_LOW_S to STANDARD_SCRIPT_VERIFY_FLAGS which will make the node require the canonical 'low-s' encoding for ECDSA signatures when relaying or mining. Consensus behavior is unchanged. The rational is explained in a81cd96: Absent this kind of test ECDSA is not a strong signature as given a valid signature {r, s} both that value and {r, -s mod n} are valid. These two encodings have different hashes allowing third parties a vector to change users txids. These attacks are avoided by picking a particular form as canonical and rejecting the other form(s); in the of the LOW_S rule, the smaller of the two possible S values is used. If widely deployed this change would eliminate the last remaining known vector for nuisance malleability on boring SIGHASH_ALL p2pkh transactions. On the down-side it will block most transactions made by sufficiently out of date software. Unlike the other avenues to change txids on boring transactions this one was randomly violated by all deployed bitcoin software prior to its discovery. So, while other malleability vectors where made non-standard as soon as they were discovered, this one has remained permitted. Even BIP62 did not propose applying this rule to old version transactions, but conforming implementations have become much more common since BIP62 was initially written. Bitcoin Core has produced compatible signatures since a28fb70 in September 2013, but this didn't make it into a release until 0.9 in March 2014; Bitcoinj has done so for a similar span of time. Bitcoinjs and electrum have been more recently updated. This does not replace the need for BIP62 or similar, as miners can still cooperate to break transactions. Nor does it replace the need for wallet software to handle malleability sanely[1]. This only eliminates the cheap and irritating DOS attack. [1] On the Malleability of Bitcoin Transactions Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Łukasz Mazurek http://fc15.ifca.ai/preproceedings/bitcoin/paper_9.pdf Conflicts: src/policy/policy.h Rebased-From: b196b68 Github-Pull: #6769
Configuration menu - View commit details
-
Copy full SHA for 1cea6b0 - Browse repository at this point
Copy the full SHA 1cea6b0View commit details
Commits on Oct 8, 2015
-
Make CScriptNum() take nMaxNumSize as an argument
While the existing numeric opcodes are all limited to 4-byte bignum arguments, new opcodes will need different limits. Rebased-From: 99088d6
Configuration menu - View commit details
-
Copy full SHA for 6897468 - Browse repository at this point
Copy the full SHA 6897468View commit details -
Move LOCKTIME_THRESHOLD to src/script/script.h
Will now be needed by CHECKLOCKTIMEVERIFY code. Rebased-From: 48e9c57
Configuration menu - View commit details
-
Copy full SHA for 750d54f - Browse repository at this point
Copy the full SHA 750d54fView commit details -
Replace NOP2 with CHECKLOCKTIMEVERIFY (BIP65)
<nLockTime> CHECKLOCKTIMEVERIFY -> <nLockTime> Fails if tx.nLockTime < nLockTime, allowing the funds in a txout to be locked until some block height or block time in the future is reached. Only the logic and unittests are implemented; this commit does not have any actual soft-fork logic in it. Thanks to Pieter Wuille for rebase. Credit goes to Gregory Maxwell for the suggestion of comparing the argument against the transaction nLockTime rather than the current time/blockheight directly. Rebased-From: bc60b2b
Configuration menu - View commit details
-
Copy full SHA for 6d01325 - Browse repository at this point
Copy the full SHA 6d01325View commit details -
Enable CHECKLOCKTIMEVERIFY as a standard script verify flag
Transactions that fail CLTV verification will be rejected from the mempool, making it easy to test the feature. However blocks containing "invalid" CLTV-using transactions will still be accepted; this is *not* the soft-fork required to actually enable CLTV for production use. Rebased-From: ffd75ad
Configuration menu - View commit details
-
Copy full SHA for 0e01d0f - Browse repository at this point
Copy the full SHA 0e01d0fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 4137248 - Browse repository at this point
Copy the full SHA 4137248View commit details -
Configuration menu - View commit details
-
Copy full SHA for 6a1343b - Browse repository at this point
Copy the full SHA 6a1343bView commit details -
CLTV: Add more tests to improve coverage
Four cases included: * The CLTV operand type mismatches the tx locktime. In the script it is 1 (interpreted as block height), but in the tx is 500000000 (interpreted as date) * The stack is empty when executing OP_CLTV * The tx is final by having only one input with MAX_INT sequence number * The operand for CLTV is negative (after OP_0 OP_1 OP_SUB) Rebased-From: cb54d17
Configuration menu - View commit details
-
Copy full SHA for 5dc72f8 - Browse repository at this point
Copy the full SHA 5dc72f8View commit details
Commits on Oct 9, 2015
-
Update miniupnpc to 1.9.20151008
This version of miniupnpc fixes a buffer overflow in the XML (ugh) parser during initial network discovery. http://talosintel.com/reports/TALOS-2015-0035/ The commit fixing the vulnerability is: miniupnp/miniupnp@79cca97 Reported by timothy on IRC. Github-Pull: #6789 Rebased-From: 0cca024
Configuration menu - View commit details
-
Copy full SHA for 093d7b5 - Browse repository at this point
Copy the full SHA 093d7b5View commit details -
Configuration menu - View commit details
-
Copy full SHA for 1bf6ac6 - Browse repository at this point
Copy the full SHA 1bf6ac6View commit details -
Configuration menu - View commit details
-
Copy full SHA for 44d6bc8 - Browse repository at this point
Copy the full SHA 44d6bc8View commit details -
Configuration menu - View commit details
-
Copy full SHA for cf5bf55 - Browse repository at this point
Copy the full SHA cf5bf55View commit details
Commits on Oct 10, 2015
-
Configuration menu - View commit details
-
Copy full SHA for f2778e0 - Browse repository at this point
Copy the full SHA f2778e0View commit details -
Configuration menu - View commit details
-
Copy full SHA for 91ef4d9 - Browse repository at this point
Copy the full SHA 91ef4d9View commit details
Commits on Oct 11, 2015
-
Configuration menu - View commit details
-
Copy full SHA for 842c48d - Browse repository at this point
Copy the full SHA 842c48dView commit details -
Configuration menu - View commit details
-
Copy full SHA for 8d598c2 - Browse repository at this point
Copy the full SHA 8d598c2View commit details
Commits on Oct 15, 2015
-
Configuration menu - View commit details
-
Copy full SHA for fb818b6 - Browse repository at this point
Copy the full SHA fb818b6View commit details
Commits on Oct 19, 2015
-
build: make sure OpenSSL heeds noexecstack
This passes `-Wa,--noexecstack` to the assembler when building platform-specific assembly files, to signal that a non-executable stack can be used. This is the same approach as used by Debian (see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430583) Rebased-From: bfcdc21 Github-Pull: #6852
Configuration menu - View commit details
-
Copy full SHA for 0b3fd07 - Browse repository at this point
Copy the full SHA 0b3fd07View commit details -
fb818b6 Bring historical release notes up to date (Micha)
Configuration menu - View commit details
-
Copy full SHA for 7e9a987 - Browse repository at this point
Copy the full SHA 7e9a987View commit details
Commits on Oct 23, 2015
-
Set TCP_NODELAY on P2P sockets.
Nagle appears to be a significant contributor to latency now that the static sleeps are gone. Most of our messages are relatively large compared to IP + TCP so I do not expect this to create enormous overhead. This may also reduce traffic burstyness somewhat. Conflicts: src/net.cpp Rebased-From: a4e28b3 Github-Pull: #6867
Configuration menu - View commit details
-
Copy full SHA for 5297194 - Browse repository at this point
Copy the full SHA 5297194View commit details -
5dc72f8 CLTV: Add more tests to improve coverage (Esteban Ordano) 6a1343b Add RPC tests for the CHECKLOCKTIMEVERIFY (BIP65) soft-fork (Peter Todd) 4137248 Add CHECKLOCKTIMEVERIFY (BIP65) soft-fork logic (Peter Todd) 0e01d0f Enable CHECKLOCKTIMEVERIFY as a standard script verify flag (Peter Todd) 6d01325 Replace NOP2 with CHECKLOCKTIMEVERIFY (BIP65) (Peter Todd) 750d54f Move LOCKTIME_THRESHOLD to src/script/script.h (Peter Todd) 6897468 Make CScriptNum() take nMaxNumSize as an argument (Peter Todd)
Configuration menu - View commit details
-
Copy full SHA for 4b80b09 - Browse repository at this point
Copy the full SHA 4b80b09View commit details
Commits on Nov 1, 2015
-
qt: Final translations update on 0.10 branch
Translations for 0.12 have been opened, translations for 0.10 have been closed.
Configuration menu - View commit details
-
Copy full SHA for 72a0adf - Browse repository at this point
Copy the full SHA 72a0adfView commit details