Nick Mathewson
ded33cb2c7
Use the | trick to save a comparison in our calloc check.
2014-11-02 11:54:42 -05:00
Nick Mathewson
0d8abf5365
Switch to a < comparison for our calloc check; explain how it works
2014-11-02 11:54:42 -05:00
Mansour Moufid
81b452d245
Document the calloc function overflow check.
2014-11-02 11:54:42 -05:00
Mansour Moufid
06b1ef7b76
Remove a duplicate comment.
2014-11-02 11:54:42 -05:00
Mansour Moufid
3ab2c865bf
Add a rule to the calloc semantic patch for argument ordering.
2014-11-02 11:54:42 -05:00
Mansour Moufid
533790ca77
The second argument to tor_calloc should be a constant.
...
Just like the conventional calloc.
2014-11-02 11:54:42 -05:00
Mansour Moufid
a746081f38
Refactor the calloc semantic patch.
...
This does not change its effects.
2014-11-02 11:54:42 -05:00
Mansour Moufid
3206dbdce1
Refactor the tor_reallocarray_ overflow check.
2014-11-02 11:54:42 -05:00
Mansour Moufid
aff6fa0b59
Refactor the tor_calloc_ overflow check.
2014-11-02 11:54:41 -05:00
Nick Mathewson
f179ff18f3
Merge remote-tracking branch 'public/bug13399'
2014-11-01 17:04:04 -04:00
Nick Mathewson
efd5001c3b
Use digest256_len in networkstatus_copy_old_consensus_info()
...
Now, if a router ever changes its microdescriptor, but the new
microdescriptor SHA256 hash has the same 160-bit prefix as the old
one, we treat it as a new microdescriptor when deciding whether to
copy status information.
(This function also is used to compare SHA1 digests of router
descriptors, but don't worry: the descriptor_digest field either holds
a SHA256 hash, or a SHA1 hash padded with 0 bytes.)
2014-10-31 11:36:31 -04:00
Nick Mathewson
dc05b8549a
Use digest256map for computing microdescriptor downloads
2014-10-31 11:32:32 -04:00
Nick Mathewson
bac6d542c9
Merge branch 'digest256map'
2014-10-31 11:15:49 -04:00
Nick Mathewson
542b470164
Refactor {str,digest}map into a common implementation; add digest256map
...
Needed for #13399 .
2014-10-31 10:54:12 -04:00
Nick Mathewson
5ad8721838
Repair format_changelog.py drupal breaks a little more. Drupal is weird.
2014-10-31 09:13:08 -04:00
Nick Mathewson
e20fc286c0
Re-run latest git trunnel to get fix from teor for #13577
2014-10-31 08:56:14 -04:00
Nick Mathewson
6f87aa3371
Merge commit '13298d90a90dc62d21d38f910171c9b57a8f0273'
2014-10-31 08:52:07 -04:00
Nick Mathewson
96e3936fb7
Teach format_changelog.py --blog about drupal <!--break-->
2014-10-30 17:08:42 -04:00
Nick Mathewson
0eb1886692
Twiddle the format_changelog.py option defaults.
2014-10-30 16:54:10 -04:00
Nick Mathewson
0799f6f2ca
New empty changelog section
2014-10-30 13:56:36 -04:00
Nick Mathewson
98ac48785b
Bump version to 0.2.6.1-alpha-dev
2014-10-30 10:25:24 -04:00
Nick Mathewson
5a601dd290
Clarify 13476 changelog (From sebastian)
2014-10-30 09:56:40 -04:00
Nick Mathewson
b46259e368
Fix a typo in the ChangeLog, spotted by Yawning
2014-10-30 09:52:36 -04:00
Nick Mathewson
d8ced3b473
Bump version to 0.2.6.1-alpha
2014-10-30 08:58:58 -04:00
Nick Mathewson
ffe10d01d1
Final(?) tweaks to 0.2.6.1-alpha changelog
2014-10-30 08:54:44 -04:00
teor
13298d90a9
Silence spurious clang warnings
...
Silence clang warnings under --enable-expensive-hardening, including:
+ implicit truncation of 64 bit values to 32 bit;
+ const char assignment to self;
+ tautological compare; and
+ additional parentheses around equality tests. (gcc uses these to
silence assignment, so clang warns when they're present in an
equality test. But we need to use extra parentheses in macros to
isolate them from other code).
2014-10-30 22:34:46 +11:00
George Kadianakis
acc392856d
Make 0.2.6.1-alpha ChangeLog prettier.
2014-10-29 13:42:55 -04:00
Nick Mathewson
9200af8054
Add a draft blurb for 0.2.6.1-alpha
2014-10-29 10:24:13 -04:00
Nick Mathewson
c11ce1ca5b
Reinvoke format_changelog.py
...
Also, tweak it so that it puts major deprecations and requirements
early in the changelog.
2014-10-29 10:19:10 -04:00
Nick Mathewson
51cc787ad4
a few more style fixes for the changelog
2014-10-29 10:18:48 -04:00
Nick Mathewson
bc95f334e4
Edit changelog entries for terseness and style.
2014-10-29 10:17:27 -04:00
Nick Mathewson
5ef96d3209
Add in a few more changes entries for 0.2.6.1-alpha
...
(Also resort and rewrap)
2014-10-29 09:06:55 -04:00
Nick Mathewson
d541f79645
Track down "bugfix on version" entries for 0.2.6.1-alpha changelog
2014-10-29 08:50:13 -04:00
Nick Mathewson
fcdcb377a4
Add another year to our copyright dates.
...
Because in 95 years, we or our successors will surely care about
enforcing the BSD license terms on this code. Right?
2014-10-28 15:30:16 -04:00
rl1987
fd83bc1d41
Adding changes file for 9708.
2014-10-28 14:13:30 -04:00
rl1987
6317146b4d
Initial version of doc/TUNING.
2014-10-28 14:13:30 -04:00
rl1987
14d59fdc10
Updating message that warns about running out of sockets we can use.
2014-10-28 14:13:25 -04:00
rl1987
f1ebe6bda4
Fix smartlist_choose_node_by_bandwidth() so that it rejects ORs with BadExit flag.
2014-10-28 14:07:08 -04:00
Nick Mathewson
2c884fd8cc
Merge remote-tracking branch 'rl1987/feature10427'
2014-10-28 14:03:40 -04:00
Nick Mathewson
0793ef862b
Merge remote-tracking branch 'sebastian/bug13286'
2014-10-27 12:12:16 -04:00
Nick Mathewson
682c154cc4
Start on an 0.2.6.1-alpha changelog
...
I concatenated the remaining changes/* files, removed them, made the
headings more uniform, then told format_changelog.py to sort,
collate, and wrap them.
2014-10-27 11:27:52 -04:00
Nick Mathewson
a477d7c666
Remove changes files that have already been merged in release-0.2.5
...
(This means that changes/* is now "everything that changed since
0.2.5.10".)
2014-10-27 11:09:41 -04:00
Nick Mathewson
4e7046cfb2
Teach format_changelog.py to emit HTML.
2014-10-27 10:32:25 -04:00
Sebastian Hahn
909aa51b3f
Remove configure option to disable curve25519
...
By now, support in the network is widespread and it's time to require
more modern crypto on all Tor instances, whether they're clients or
servers. By doing this early in 0.2.6, we can be sure that at some point
all clients will have reasonable support.
2014-10-27 14:41:19 +01:00
rl1987
36e771628e
Congratulate relay operator when OR is first started
...
When Tor first generates identity keypair, emit a log message that
thanks for their participation and points to new Tor relay lifecycle
document.
2014-10-26 21:53:48 +02:00
Nick Mathewson
f5fc7e3306
Fix a crash bug introduced in 223d354e3
.
...
Arma found this and commented on #11243 . Bug not in any released
version of Tor.
2014-10-26 14:09:03 -04:00
Nick Mathewson
1ce57267b4
Merge remote-tracking branch 'origin/maint-0.2.5'
2014-10-24 09:23:53 -04:00
Nick Mathewson
9e2608b0d3
bump version to 0.2.5.10-dev
2014-10-24 09:22:58 -04:00
Nick Mathewson
9116f49c77
Forward-port changelog and release notes for 0.2.5.10
2014-10-24 09:21:40 -04:00
Nick Mathewson
ac4dd248e1
Switch new time tests to use SIZEOF_TIME_T, not sizeof(time_t)
...
Otherwise, we get implicit conversion warning on some platforms.
2014-10-22 12:57:21 -04:00