aboutsummaryrefslogtreecommitdiff
path: root/src/or/connection_edge.c
Commit message (Expand)AuthorAge
* Make a function to mark a connection and set hold_open_until_flushed.Nick Mathewson2010-09-27
* Move the "stop writing when the buffer is empty" logic to cnnection_finished_...Nick Mathewson2010-09-27
* Have edge connections use fetch_from_evbuffer_socks when appropriate.Nick Mathewson2010-09-27
* Add a new connection_fetch_from_buf_line() that can handle buffereventsNick Mathewson2010-09-27
* Refactor users of buf_datalen to bufferevent-friendly version.Nick Mathewson2010-09-27
* Add a max_cells arg to connection_edge_process_raw_inbuf•••I'm going to use this to implement more fairness in circuit_resume_edge_reading_helper in an attempt to fix bug 1298. (Updated with fixes from arma and Sebastian) Nick Mathewson2010-09-13
* Merge remote branch 'sebastian/bug1525'Nick Mathewson2010-09-13
|\
| * Update some documentation for the bug 1525 fixSebastian Hahn2010-08-08
| * Ensure controller RESOLVE commands respect __LeaveStreamsUnattached•••https://trac.torproject.org/projects/tor/ticket/1525 "The codepath taken by the control port "RESOLVE" command to create a synthetic SOCKS resolve request isn't the same as the path taken by a real SOCKS request from 'tor-resolve'. This prevents controllers who set LeaveStreamsUnattached=1 from being able to attach RESOLVE streams to circuits of their choosing." Create a new function connection_ap_rewrite_and_attach_if_allowed() and call that when Tor needs to attach a stream to a circuit but needs to know if the controller permits it. No tests added. Robert Hogan2010-08-08
* | Fix misplaced labelsSebastian Hahn2010-08-16
* | tiny changes i found in my sandboxRoger Dingledine2010-08-09
|/
* Create rephist.hSebastian Hahn2010-07-27
* Create relay.hSebastian Hahn2010-07-27
* Create reasons.hSebastian Hahn2010-07-27
* Create policies.hSebastian Hahn2010-07-27
* Create main.hSebastian Hahn2010-07-27
* Create hibernate.hSebastian Hahn2010-07-27
* Create dns.hSebastian Hahn2010-07-27
* Create dirserv.hSebastian Hahn2010-07-27
* Create control.hSebastian Hahn2010-07-27
* Create connection_or.hSebastian Hahn2010-07-27
* Create connection_edge.hSebastian Hahn2010-07-27
* Create connection.hSebastian Hahn2010-07-27
* Create config.hSebastian Hahn2010-07-27
* Create circuituse.hSebastian Hahn2010-07-27
* Create circuitlist.hSebastian Hahn2010-07-27
* Create buffers.hSebastian Hahn2010-07-27
* Create rendservice.hSebastian Hahn2010-07-27
* Create rendclient.hSebastian Hahn2010-07-27
* Create rendcommon.hSebastian Hahn2010-07-27
* Create routerlist.hSebastian Hahn2010-07-27
* Create router.hSebastian Hahn2010-07-27
* Split headers for dnsserv.c functions out of or.h•••The next series of commits begins addressing the issue that we're currently including the complete or.h file in all of our source files. To change that, we're splitting function definitions into new header files (one header file per source file). Sebastian Hahn2010-07-27
* let people test the RefuseUnknownExits ideaRoger Dingledine2010-03-10
* Merge remote branch 'origin/maint-0.2.1'•••Conflicts: src/common/test.h src/or/test.c Nick Mathewson2010-02-27
|\
| * Update Tor Project copyright yearsNick Mathewson2010-02-27
* | Merge remote branch 'sebastian/bug1238'Nick Mathewson2010-02-09
|\ \
| * | Fix a whitespace violationSebastian Hahn2010-02-09
* | | Make tor_addr_copy() conform to memcpy requirements•••The src and dest of a memcpy() call aren't supposed to overlap, but we were sometimes calling tor_addr_copy() as a no-op. Also, tor_addr_assign was a redundant copy of tor_addr_copy(); this patch removes it. Nick Mathewson2010-02-09
|/ /
* | When we've disabled .exit hostnames, actually reject them.•••Previously we were treating them as decent hostnames and sending them to the exit, which is completely wrong. Nick Mathewson2010-02-03
* | fix compileRoger Dingledine2009-12-21
* | Be more willing to use an unsuitable circuit for exit.•••Specifically, there are two cases: a) are we willing to start a new circuit at a node not in your ExitNodes config option, and b) are we willing to make use of a circuit that's already established but has an unsuitable exit. Now we discard all your circuits when you set ExitNodes, so the only way you could end up with an exit circuit that ends at an unsuitable place is if we explicitly ran out of exit nodes, StrictNodes was 0, and we built this circuit to solve a stream that needs solving. Fixes bug in dc322931, which would ignore the just-built circuit because it has an unsuitable exit. Roger Dingledine2009-12-21
* | Merge branch 'safelogging2'•••Conflicts: ChangeLog Nick Mathewson2009-12-15
|\ \
| * | Refactor the safe_str_*() API to make more sense.•••The new rule is: safe_str_X() means "this string is a piece of X information; make it safe to log." safe_str() on its own means "this string is a piece of who-knows-what; make it safe to log". Nick Mathewson2009-12-15
| * | Allow SafeLogging to exclude client related informationSebastian Hahn2009-12-12
* | | Now that FOO_free(NULL) always works, remove checks before calling it.Nick Mathewson2009-12-12
* | | *_free functions now accept NULL•••Some *_free functions threw asserts when passed NULL. Now all of them accept NULL as input and perform no action when called that way. This gains us consistence for our free functions, and allows some code simplifications where an explicit null check is no longer necessary. Sebastian Hahn2009-12-12
|/ /
* | New config option "CircuitStreamTimeout"•••New config option "CircuitStreamTimeout" to override our internal timeout schedule for how many seconds until we detach a stream from a circuit and try a new circuit. If your network is particularly slow, you might want to set this to a number like 60. Roger Dingledine2009-11-21
* | remove some dead code. some of it was tickling coverity.Roger Dingledine2009-10-10
* | Make sure we can't overflow in connection_ap_handshake_send_resolve•••Found by Coverity Sebastian Hahn2009-09-27