Skip to content
Permalink
4971

Commits on May 11, 2012

  1. Merge branch '4971' of github.com:meejah/tor into 4971

    Conflicts:
    	src/or/config.c
    meejah committed May 11, 2012
  2. fix style to K&R

    meejah committed May 11, 2012
  3. add new GETINFO config/defaults

    returns the default values for every configuration item, similar
    to GETINFO config/names; include a changes entry for it.
    
    Fix for bug 4971
    meejah committed May 11, 2012
  4. fix style to K&R

    meejah committed May 11, 2012
  5. add new GETINFO config/defaults

    returns the default values for every configuration item, similar
    to GETINFO config/names; include a changes entry for it.
    
    Fix for bug 4971
    meejah committed May 11, 2012

Commits on May 10, 2012

  1. Merge branch 'maint-0.2.2'

    Roger Dingledine
    Roger Dingledine committed May 10, 2012
  2. fix over-wide line from f661747

    Roger Dingledine
    Roger Dingledine committed May 10, 2012
  3. Fix O(n^2) performance when parsing a big pile of extrainfos

    We were doing an O(n) strlen in router_get_extrainfo_hash() for
    every one we tried to parse.  Instead, have
    router_get_extrainfo_hash() take the length of the extrainfo as an
    argument, so that when it's called from
    extrainfo_parse_from_string(), it doesn't do a strlen() over the
    whole pile of extrainfos.
    nmathewson authored and Roger Dingledine committed May 10, 2012
  4. Merge branch 'bug5786'

    nmathewson committed May 10, 2012
  5. Merge remote-tracking branch 'origin/maint-0.2.2'

    Conflicts:
    	src/common/util.c
    	src/test/test_util.c
    nmathewson committed May 10, 2012
  6. Add changes/bug5760

    neenaoffline committed May 10, 2012

Commits on May 8, 2012

  1. Fix a segfault in pt/protocol test

    Now that the pt code logs mp->argv[0] all over the place, we need to
    be sure to set up mp->argv in our tests.
    
    Bugfix on e603692, not in any released version.
    nmathewson committed May 8, 2012

Commits on May 7, 2012

  1. Detect out-of-bounds bwweightscale values early in the voting process

    If the authorities agreed on a sufficiently bad bwweightscale value
    (<=0 or == INT32_MAX), the bandwidth algorithm could make the voters
    assert while computing the consensus.
    
    Fix for bug5786; bugfix on 0.2.2.17-alpha
    nmathewson committed May 7, 2012
  2. Check more thoroughly for dups when parsing networkstatus parameters

    See changes file for details.
    
    Partial fix for bug 5786; fix on 0.2.2.2-alpha.
    nmathewson committed May 7, 2012
  3. Handle out-of-range values in tor_parse_* integer functions

    The underlying strtoX functions handle overflow by saturating and
    setting errno to ERANGE.  If the min/max arguments to the
    tor_parse_* functions are equal to the minimum/maximum of the
    underlying type, then with the old approach, we wouldn't treat a
    too-large value as genuinely broken.
    
    Found this while looking at bug 5786; bugfix on 19da1f3 (in Tor
    0.0.9), which introduced these functions.
    nmathewson committed May 7, 2012
  4. Apply a patch from Gisle Vanem to make tor-gencert build under MSVC

    (Note: It makes sense to use tor-gencert on Windows for testing
    purposes only.  If you are a directory authority operator, and you
    are contemplating running tor-gencert on a Windows box in an actual
    production environment, you are probably making a mistake.)
    nmathewson committed May 7, 2012
  5. Fix an overwide line

    nmathewson committed May 7, 2012
  6. Changes file for bug 5070

    nmathewson committed May 7, 2012
Older