4971
Commits on May 11, 2012
-
Merge branch '4971' of github.com:meejah/tor into 4971
Conflicts: src/or/config.c
-
-
-
-
add new GETINFO config/defaults
returns the default values for every configuration item, similar to GETINFO config/names; include a changes entry for it. Fix for bug 4971
-
-
-
-
add new GETINFO config/defaults
returns the default values for every configuration item, similar to GETINFO config/names; include a changes entry for it. Fix for bug 4971
Commits on May 10, 2012
-
Roger Dingledine committed
May 10, 2012 -
fix over-wide line from f661747
Roger Dingledine committedMay 10, 2012 -
Fix O(n^2) performance when parsing a big pile of extrainfos
We were doing an O(n) strlen in router_get_extrainfo_hash() for every one we tried to parse. Instead, have router_get_extrainfo_hash() take the length of the extrainfo as an argument, so that when it's called from extrainfo_parse_from_string(), it doesn't do a strlen() over the whole pile of extrainfos.
-
-
-
Merge remote-tracking branch 'origin/maint-0.2.2'
Conflicts: src/common/util.c src/test/test_util.c
-
-
-
-
-
Commits on May 8, 2012
-
Fix a segfault in pt/protocol test
Now that the pt code logs mp->argv[0] all over the place, we need to be sure to set up mp->argv in our tests. Bugfix on e603692, not in any released version.
Commits on May 7, 2012
-
Detect out-of-bounds bwweightscale values early in the voting process
If the authorities agreed on a sufficiently bad bwweightscale value (<=0 or == INT32_MAX), the bandwidth algorithm could make the voters assert while computing the consensus. Fix for bug5786; bugfix on 0.2.2.17-alpha
-
Check more thoroughly for dups when parsing networkstatus parameters
See changes file for details. Partial fix for bug 5786; fix on 0.2.2.2-alpha.
-
Handle out-of-range values in tor_parse_* integer functions
The underlying strtoX functions handle overflow by saturating and setting errno to ERANGE. If the min/max arguments to the tor_parse_* functions are equal to the minimum/maximum of the underlying type, then with the old approach, we wouldn't treat a too-large value as genuinely broken. Found this while looking at bug 5786; bugfix on 19da1f3 (in Tor 0.0.9), which introduced these functions.
-
Apply a patch from Gisle Vanem to make tor-gencert build under MSVC
(Note: It makes sense to use tor-gencert on Windows for testing purposes only. If you are a directory authority operator, and you are contemplating running tor-gencert on a Windows box in an actual production environment, you are probably making a mistake.)
-
-
-
-
-
-
-