tor/changes
Sebastian Hahn ed8374eb5a Simplify DH prime generation logic some.
This is just refactoring work here. The old logic was kind of
convoluted, especially after the bug 5572 fix. We don't actually need to
distinguish so many cases here. Dropping detection of the
"!old_options || !old_options->DynamicDHGroups" case is fine because
that's the same that we'd do for clients.

Also add a changes file for bug 5572.
2012-04-08 01:11:02 +02:00
..
bridgepassword Do not use strcmp() to compare an http authenticator to its expected value 2012-04-01 00:42:04 -04:00
bug2987 Write initial documentation for the contents of the state file 2012-03-28 04:08:56 -04:00
bug3942 Suppress "decided to publish new descriptor" message when not a server 2012-04-02 18:59:21 -04:00
bug4011 Keep separate time-to-downloads for each consensus flavor 2012-03-28 02:55:33 -04:00
bug4091_debugging Log statement to help track down bug4091 2012-03-27 18:28:39 -04:00
bug4875 Make relays handle an address suggestion from a directory server giving an IPv6 address. 2012-03-28 22:16:55 +02:00
bug5053 Count IPv6 connections in bridge and entry stats. 2012-02-09 11:12:30 +01:00
bug5151 note that bug 5151 is on 0.2.3.9-alpha 2012-03-28 17:19:24 -04:00
bug5180 Changelog for torify changes 2012-03-27 18:46:47 -04:00
bug5449 Provide large enough buffer in test_util_sscanf() 2012-03-27 15:16:22 +02:00
bug5508 Add changes file. 2012-03-30 12:06:53 +02:00
bug5558 tor_vsscanf(): Don't return -1 if '%%' doesn't match. 2012-04-03 16:20:24 +02:00
bug5572 Simplify DH prime generation logic some. 2012-04-08 01:11:02 +02:00
crypto_api Refactor the API for setting up a block cipher. 2012-03-27 22:37:56 -04:00
ides-becomes-turtles ides has become turtles, and gotten a new IP address 2012-04-05 01:53:04 +02:00
memleak_safecookie Fix a memory leak in an error case of SAFECOOKIE authentication. 2012-03-30 10:20:48 -04:00
openssl101_aes Use OpenSSL 1.0.1's EVP aes_ctr implementation when available 2012-03-27 22:38:06 -04:00
pad_rsa_always Excise PK_NO_PADDING entirely: Unpadded RSA is silly. 2012-03-27 22:38:06 -04:00