summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2009-10-15Revise 162's idea of how detached signatures work with flavorsNick Mathewson
The original proposal was vague and would have made older Tors reject detached-signature documents as soon as they saw one with flavors.
2009-10-15Allow signed data to include other hashes later.Nick Mathewson
Previously, we insisted that a valid signature must be a signature of the expected digest. Now we accept anything that starts with the expected digest. This lets us include another digest later.
2009-10-15Signature-checking code can handle longer digests.Nick Mathewson
2009-10-15Make signature-generation code handle different key and digest lengths.Nick Mathewson
2009-10-15Support for encoding and decoding 256-bit digests in base64Nick Mathewson
2009-10-15Merge commit 'origin/maint-0.2.1'Nick Mathewson
Conflicts: ChangeLog configure.in contrib/tor-mingw.nsi.in src/or/config.c src/win32/orconfig.h
2009-10-15bump to 0.2.1.20tor-0.2.1.20Roger Dingledine
2009-10-15Move moria1 and Tonga to alternate IP addresses.Roger Dingledine
2009-10-14Merge commit 'origin/maint-0.2.1'Nick Mathewson
2009-10-14Merge commit 'phobos/polipo-updates-maint-0.2.1' into maint-0.2.1Nick Mathewson
2009-10-14Merge commit 'phobos/tor-dmg-naming-update'Nick Mathewson
2009-10-14Merge commit 'origin/maint-0.2.1'Nick Mathewson
2009-10-14read the "circwindow" parameter from the consensusRoger Dingledine
backport of c43859c5c12361fad505 backport of 0d13e0ed145f4c1b5bd1
2009-10-14Code to parse and access network parameters.Nick Mathewson
Partial backport of 381766ce4b1145460. Partial backport of 56c6d78520a98fb64.
2009-10-14add blurbs for recent dev releasesRoger Dingledine
2009-10-13Another event2 evdns fix.Nick Mathewson
2009-10-13Fix a crash when using evdns from Libevent 2.Nick Mathewson
When we tried to use the deprecated non-threadsafe evdns interfaces in Libevent 2 without using the also-deprecated event_init() interface, Libevent 2 would sensibly crash, since it has no guess where to find the Libevent library. Here we use the evdns_base_*() functions instead if they're present, and fake them if they aren't.
2009-10-12bump to 0.2.2.5-alpha-devRoger Dingledine
2009-10-12move nickm's commit to the correct releaseRoger Dingledine
2009-10-12updated naming.Andrew Lewman
2009-10-12update namingAndrew Lewman
2009-10-11Move android changelog entry to now-correct Tor version.Nick Mathewson
2009-10-11Merge commit 'public/android'Nick Mathewson
2009-10-11fix compile on windowstor-0.2.2.5-alphaRoger Dingledine
2009-10-11bump to 0.2.2.5-alphaRoger Dingledine
2009-10-11Move dizum to an alternate IP address.Roger Dingledine
2009-10-11Ship test.h in releasePeter Palfrader
The test suite need the test.h file to build. Add it to noinst_HEADERS in the Makefile.am so it gets included in the tarball that make dist produces.
2009-10-10Fix testsuite call.tor-0.2.2.4-alphaPeter Palfrader
tinytest_main() returns 0 on success, -1 on errors and 1 on test failures. So test.c should check on !=0 instead of <0.
2009-10-10bump to 0.2.2.4-alphaRoger Dingledine
2009-10-10Don't set unreachable from dirvote unless we've been running a while.Nick Mathewson
This is a possible fix for bug 1023, where if we vote (or make a v2 consensus networkstatus) right after we come online, we can call rep_hist_note_router_unreachable() on every router we haven't connected to yet, and thereby make all their uptime values reset.
2009-10-10correct the spec for the stream_bw event.Roger Dingledine
"neonomad" pointed out on or-talk that the order is opposite from the intuitive order. explain why. we chose to fix the spec rather than the code because there are controllers like torflow that already expect the current behavior.
2009-10-10fix a bug where we were decrementing the wrong bucketRoger Dingledine
i think this doesn't actually affect anything, since linked conns usually don't impact buckets
2009-10-10remove some dead code. some of it was tickling coverity.Roger Dingledine
2009-10-10add blurbs for recent alpha releasesRoger Dingledine
2009-10-10Fix a memleak when throwing away some build timesSebastian Hahn
This was introduced in f7e6e852e80c22b40a8f09bc1c85074726d7078e. Found by Coverity
2009-10-07amend changelog for recent commits, plus clean upRoger Dingledine
2009-10-07Tweak an assert that shouldn't fire either way.Mike Perry
There were however other places where we used to call this function that might have caused this to fire. Better safe than sorry now.
2009-10-07Tweak values for when to discard all of our history.Mike Perry
This seems to be happening to me a lot on a garbage DSL line. We may need to come up with 2 threshholds: a high short onehop count and a lower longer count.
2009-10-07Remove another overzealous assert.Mike Perry
Pretimeouts may have build time data, just no timeout data.
2009-10-01try to stem the 'sea of fail'Roger Dingledine
2009-10-01fix the wiki link in doc pages. remove obsolete FAQ.Roger Dingledine
2009-10-01Ignore one-hop circuits for circuit timeout calcRoger Dingledine
Don't count one-hop circuits when we're estimating how long it takes circuits to build on average. Otherwise we'll set our circuit build timeout lower than we should. Bugfix on 0.2.2.2-alpha.
2009-09-30Move Tonga to an alternate IP addressRoger Dingledine
2009-09-30update spec to reflect change in Fast definitionRoger Dingledine
we made anybody who has 20KB/s Fast by definition, in 0.2.1.14-rc, but it looks like we forgot to fix the spec.
2009-09-30Move moria1 to a nearby IP addressRoger Dingledine
2009-09-30Dir auths reject relays running < Tor 0.1.2.14Roger Dingledine
Directory authorities now reject Tor relays with versions less than 0.1.2.14. This step cuts out four relays from the current network, none of which are very big.
2009-09-29Fix 1108: Handle corrupt or large build times state.Mike Perry
1108 was actually just a fencepost error in an assert, but making the state file handling code resilient is a good idea.
2009-09-29Add changelog entry for Android work.Nick Mathewson
2009-09-29Make tor-gencert build on AndroidNick Mathewson
Previously, tor-gencert would call RSA_generate_key() directly. This won't work on Android, which removes the (deprecated since OpenSSL 0.9.8) function. We can't call RSA_generate_key_ex() unconditionally either, since that didn't exist before 0.9.8. Instead, we must call our own crypto_pk_generate_key_with_bits, which knows how to call RSA_generate_key or RSA_generate_key_ex as appropriate. [Based on patch by Nathan Freitas]
2009-09-29Alter keygen function to generate keys of different lengths.Nick Mathewson