aboutsummaryrefslogtreecommitdiff
path: root/src/or/or.h
Commit message (Expand)AuthorAge
* obey exit policies for addresses too•••svn:r555 Roger Dingledine2003-10-07
* some early bugfixes•••our log() conflicts with log(3) distribute only the correct files from doc/ and src/config/ sometimes laptops go back in time. i guess that's ok for now. and bump the version number because we're live. svn:r544 Roger Dingledine2003-10-07
* refactor around connection_edge_send_command()•••svn:r539 Roger Dingledine2003-10-04
* refactor so connection_write_to_buf() never fails•••svn:r537 Roger Dingledine2003-10-04
* socks5 now works•••(or at least, we can talk to mozilla.) svn:r536 Roger Dingledine2003-10-04
* Add new cell fullness and bandwidth stats.•••svn:r533 Nick Mathewson2003-10-02
* my_routerinfo, router_is_me, and learn_my_address are obsolete•••ACIs are decided now by strcmp'ing nicknames, rather than comparing addr:port svn:r529 Roger Dingledine2003-10-01
* rebuild directory before uploading•••svn:r528 Nick Mathewson2003-10-01
* Move dirserv/routers code out of main.c•••svn:r527 Nick Mathewson2003-10-01
* ORs post descriptors periodically too•••svn:r523 Roger Dingledine2003-09-30
* mark all dirservers up at boot; mark a dirserver down if dir fetch fails•••svn:r519 Roger Dingledine2003-09-30
* Bugfixes in directory code:•••Improve debugging output on fingerprint checking. Make sure to add our own fingerprint to the fingerprint list _before_ adding our own descriptor, or else we'll reject ourself. Don't call a directory invalid just because we have a newer descriptor for some router. Use router_get_dir_hash to generate hashes for signed directories. Make sure we add our own descriptor successfully. Don't fall-through on failed base64-endode. svn:r514 Nick Mathewson2003-09-30
* move connection_array accessors from main.c to connection.c•••(leave poll_array accessors in main.c) svn:r512 Roger Dingledine2003-09-30
* move the tls handshake stuff to connection_or•••svn:r510 Roger Dingledine2003-09-30
* getting closer to having dirserv working•••we now add our own descriptor to the descriptor list and we rebuild the directory (and dump to disk) after receiving a POST svn:r509 Roger Dingledine2003-09-30
* Write necessary backends for online directory generation. I think.•••svn:r503 Nick Mathewson2003-09-27
* clean up receiver buckets; prepare for payloads in relay_end; note a few bugs•••svn:r502 Roger Dingledine2003-09-27
* clean up connection_assert_ok compiler warnings•••svn:r498 Roger Dingledine2003-09-27
* add Address config element, use it in descriptor•••svn:r496 Roger Dingledine2003-09-27
* Refactor common file code into util.c; add published to descriptors•••svn:r487 Nick Mathewson2003-09-26
* first pass: obey log convention•••ERR is if something fatal just happened WARNING is something bad happened, but we're still running. The bad thing is either a bug in the code, an attack or buggy protocol/implementation of the remote peer, etc. The operator should examine the bad thing and try to correct it. (No error or warning messages should be expected. I expect most people to run on -l warning eventually.) NOTICE is never ever used. INFO means something happened (maybe bad, maybe ok), but there's nothing you need to (or can) do about it. DEBUG is for everything louder than INFO. svn:r486 Roger Dingledine2003-09-26
* various bugfixes and updates•••redo all the config files for the new format (we'll redo them again soon) fix (another! yuck) segfault in log_fn when input is too large tor_tls_context_new() returns -1 for error, not NULL fix segfault in check_conn_marked() on conn's that die during tls handshake make ORs also initialize conn from router when we're the receiving node make non-dirserver ORs upload descriptor to every dirserver on startup add our local address to the descriptor add Content-Length field to POST command revert the Content-Length search in fetch_from_buf_http() to previous code fix segfault in memmove in fetch_from_buf_http() raise maximum allowed headers/body size in directory.c svn:r484 Roger Dingledine2003-09-25
* Refactor buffers; implement descriptors.•••'buf_t' is now an opaque type defined in buffers.c . Router descriptors now include all keys; routers generate keys as needed on startup (in a newly defined "data directory"), and generate their own descriptors. Descriptors are now self-signed. Implementation is not complete: descriptors are never published; and upon receiving a descriptor, the directory doesn't do anything with it. At least "routers.or" and orkeygen are now obsolete, BTW. svn:r483 Nick Mathewson2003-09-25
* cleanups, bugfixes, more verbose logs•••Fixed up the assert_*_ok funcs some (more work remains) Changed config so it reads either /etc/torrc or the -f arg, never both Finally tracked down a nasty bug with our use of tls: It turns out that if you ask SSL_read() for no more than n bytes, it will read the entire record from the network (and maybe part of the next record, I'm not sure), give you n bytes of it, and keep the remaining bytes internally. This is fine, except our poll-for-read looks at the network, and there are no bytes pending on the network, so we never know to ask SSL_read() for more bytes. Currently I've hacked it so if we ask for n bytes and it returns n bytes, then it reads again right then. This will interact poorly with our rate limiting; we need a cleaner solution. svn:r481 Roger Dingledine2003-09-24
* get network/host order working right again for socks4•••svn:r476 Roger Dingledine2003-09-21
* bugfixes and note missing features•••deal with content-length headers better when reading http don't assume struct socks4_info is a packed struct fail the socks handshake if destip is zero flesh out conn_state_to_string() for dir conn fix typo (bug) in connection_handle_read() directory get is now called fetch, post is now upload reopen logs on sighup svn:r475 Roger Dingledine2003-09-21
* leave the socks handshake on the inbuf until it's complete•••this paves the way for supporting socks5 and other handshakes it also removes those pesky AP-only variables from connection_t also hacked a fix for a bug where some streams weren't ending properly -- maybe because marked connections weren't flushing properly? svn:r472 Roger Dingledine2003-09-18
* add in directory 'post' support•••svn:r471 Roger Dingledine2003-09-17
* phase out non-tls handshake, now that tls is stable.•••svn:r470 Roger Dingledine2003-09-16
* bugfixes and refactorings•••svn:r468 Roger Dingledine2003-09-16
* Make sequential ACI selection logic handle HIGHER/LOWER•••svn:r466 Nick Mathewson2003-09-16
* Add first cut of assert_*_ok functions•••svn:r464 Nick Mathewson2003-09-16
* Add #ifdef'd code (on by default) to allocate ACIs sequentially.•••svn:r462 Nick Mathewson2003-09-16
* clean up exported api's•••svn:r461 Roger Dingledine2003-09-16
* refactor connects into connection_connect()•••svn:r460 Roger Dingledine2003-09-16
* fix the cpuworker circ-had-vanished bug (maybe)•••still several (many) tls-related bugs outstanding. svn:r454 Roger Dingledine2003-09-14
* fix two more bugs•••svn:r452 Roger Dingledine2003-09-13
* reshuffle functions for cleaner organization•••svn:r451 Roger Dingledine2003-09-12
* tls works between routers now too•••things are still a bit shaky svn:r450 Roger Dingledine2003-09-12
* check for funny business from the remote peer•••svn:r445 Roger Dingledine2003-09-11
* Add router_get_by_pk function; use in connection_tls_finish_handshake.•••svn:r441 Nick Mathewson2003-09-11
* collect info from peer we just handshaked with•••svn:r439 Roger Dingledine2003-09-11
* tls infrastructure now in place, give or take•••svn:r434 Roger Dingledine2003-09-08
* add CertFile, Nickname•••write new certfile if you don't have one already set up a tls context on startup svn:r432 Roger Dingledine2003-09-08
* clean up config.c so it doesn't expose as much•••svn:r430 Roger Dingledine2003-09-08
* more futzing towards tls•••not there yet svn:r429 Roger Dingledine2003-09-07
* clean read_to_buf more•••svn:r428 Roger Dingledine2003-09-05
* general cleanup and reabstraction, to prepare for tls•••svn:r426 Roger Dingledine2003-09-05
* Add initial interfaces and code for TLS support. Interfaces are right; code ...•••svn:r424 Nick Mathewson2003-09-04
* remove last vestiges of op_port•••svn:r418 Roger Dingledine2003-08-27