Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
The test suite need the test.h file to build. Add it to
noinst_HEADERS in the Makefile.am so it gets included
in the tarball that make dist produces.
|
|
tinytest_main() returns 0 on success, -1 on errors and 1 on test
failures. So test.c should check on !=0 instead of <0.
|
|
|
|
This is a possible fix for bug 1023, where if we vote (or make a v2
consensus networkstatus) right after we come online, we can call
rep_hist_note_router_unreachable() on every router we haven't connected
to yet, and thereby make all their uptime values reset.
|
|
"neonomad" pointed out on or-talk that the order is opposite from the
intuitive order. explain why. we chose to fix the spec rather than the
code because there are controllers like torflow that already expect
the current behavior.
|
|
i think this doesn't actually affect anything, since linked
conns usually don't impact buckets
|
|
|
|
|
|
This was introduced in f7e6e852e80c22b40a8f09bc1c85074726d7078e.
Found by Coverity
|
|
|
|
There were however other places where we used to call this
function that might have caused this to fire. Better
safe than sorry now.
|
|
This seems to be happening to me a lot on a garbage DSL line.
We may need to come up with 2 threshholds: a high short onehop
count and a lower longer count.
|
|
Pretimeouts may have build time data, just no timeout data.
|
|
|
|
|
|
Don't count one-hop circuits when we're estimating how long it
takes circuits to build on average. Otherwise we'll set our circuit
build timeout lower than we should. Bugfix on 0.2.2.2-alpha.
|
|
|
|
we made anybody who has 20KB/s Fast by definition, in 0.2.1.14-rc,
but it looks like we forgot to fix the spec.
|
|
|
|
Directory authorities now reject Tor relays with versions less than
0.1.2.14. This step cuts out four relays from the current network,
none of which are very big.
|
|
1108 was actually just a fencepost error in an assert,
but making the state file handling code resilient is a
good idea.
|
|
|
|
|
|
|
|
|
|
|
|
The earlier fix would only handle the success case. In the failing
case, test_mem_op does a goto done, which would leave the leak leaking.
|
|
Found by coverity
test_mem_op_hex was leaking memory, which showed up in a few
tests.
Also, the dir_param test had a memleak of its own.
Found by Coverity
|
|
Found by Coverity
|
|
Should quiet a coverity warning.
|
|
Some memory could be lost in the error case of
circuit_build_times_parse_state.
Found by Coverity
|
|
|
|
|
|
The September one seems to have removed most US IP addresses.
|
|
|
|
- Avoid memmoving 0 bytes which might lead to compiler warnings.
- Don't require relays to be entry node AND bridge at the same to time to
record clients.
- Fix a memory leak when writing dirreq-stats.
- Don't say in the stats files that measurement intervals are twice as long
as they really are.
- Reduce minimum observation time for requests to 12 hours, or we might
never record usage.
- Clear exit stats correctly after writing them, or we accumulate old stats
over time.
- Reset interval start for buffer stats, too.
|
|
"Unusual" in this context means "not the same as nickm's." We should grow a
better list later.
(Also, move TLS state table to a separate header.)
|
|
The big change is to add a function to display the current SSL handshake
state, and to log it everywhere reasonable. (A failure in
SSL23_ST_CR_SRVR_HELLO_A is different from one in
SSL3_ST_CR_SESSION_TICKET_A.)
This patch also adds a new log domain for OR handshaking, so you can pull out
all the handshake log messages without having to run at debug for everything.
For example, you'd just say "log notice-err [handshake]debug-err file
tor.log".
|
|
|
|
This was the only log notice that happened during other
tor invocations, like --verify-config and --list-fingerprint.
Plus, now we think it works, so no need to hear about it.
|
|
* debian-merge:
New upstream version
finishing touches on the changelog
bump to 0.2.2.3-alpha, plus add a changelog for bug 1103
Be more robust to bad circwindow values
Fix Bug 1103.
Bump version to 0.2.2.2-alpha-dev
|
|
|
|
* commit 'tor-0.2.2.3-alpha':
finishing touches on the changelog
bump to 0.2.2.3-alpha, plus add a changelog for bug 1103
Be more robust to bad circwindow values
Fix Bug 1103.
Bump version to 0.2.2.2-alpha-dev
|
|
|
|
|
|
Update the HACKING document and the cross compilation helper
|
|
|