aboutsummaryrefslogtreecommitdiff
path: root/src/or/rendclient.c
Commit message (Expand)AuthorAge
* Create rephist.hSebastian Hahn2010-07-27
* Create relay.hSebastian Hahn2010-07-27
* Create main.hSebastian Hahn2010-07-27
* Create directory.hSebastian Hahn2010-07-27
* Create connection_edge.hSebastian Hahn2010-07-27
* Create connection.hSebastian Hahn2010-07-27
* Create config.hSebastian Hahn2010-07-27
* Create circuituse.hSebastian Hahn2010-07-27
* Create circuitlist.hSebastian Hahn2010-07-27
* Create circuitbuild.hSebastian Hahn2010-07-27
* Create rendclient.hSebastian Hahn2010-07-27
* Create rendcommon.hSebastian Hahn2010-07-27
* Create routerlist.hSebastian Hahn2010-07-27
* Merge remote branch 'origin/maint-0.2.1'•••Conflicts: src/common/test.h src/or/test.c Nick Mathewson2010-02-27
|\
| * Update Tor Project copyright yearsNick Mathewson2010-02-27
* | Merge commit 'origin/maint-0.2.1'Nick Mathewson2010-02-07
|\|
| * lookup_last_hid_serv_request() could overflow and leak memory•••The problem was that we didn't allocate enough memory on 32-bit platforms with 64-bit time_t. The memory leak occured every time we fetched a hidden service descriptor we've fetched before. Sebastian Hahn2010-02-07
| * read the "circwindow" parameter from the consensus•••backport of c43859c5c12361fad505 backport of 0d13e0ed145f4c1b5bd1 Roger Dingledine2009-10-14
| * Merge commit 'karsten/fix-1073' into maint-0.2.1Nick Mathewson2009-09-16
| |\
| | * Reduce log level for bug case that we now know really exists.Karsten Loesing2009-09-01
| | * Avoid segfault when accessing hidden service.Karsten Loesing2009-08-29
* | | Merge branch 'safelogging2'•••Conflicts: ChangeLog Nick Mathewson2009-12-15
|\ \ \
| * | | Refactor the safe_str_*() API to make more sense.•••The new rule is: safe_str_X() means "this string is a piece of X information; make it safe to log." safe_str() on its own means "this string is a piece of who-knows-what; make it safe to log". Nick Mathewson2009-12-15
| * | | Allow SafeLogging to exclude client related informationSebastian Hahn2009-12-12
* | | | Now that FOO_free(NULL) always works, remove checks before calling it.Nick Mathewson2009-12-12
|/ / /
* | | Reduce log level for someone else sending us weak DH keys.•••See task 1114. The most plausible explanation for someone sending us weak DH keys is that they experiment with their Tor code or implement a new Tor client. Usually, we don't care about such events, especially not on warn level. If we really care about someone not following the Tor protocol, we can set ProtocolWarnings to 1. Karsten Loesing2009-10-25
* | | downgrade a log severity, since this event has been known•••to happen and there's nothing the user can do about it Roger Dingledine2009-09-21
* | | a mish-mash of stuff in my sandboxRoger Dingledine2009-09-17
* | | Read "circwindow=x" from the consensus and use it•••Tor now reads the "circwindow" parameter out of the consensus, and uses that value for its circuit package window rather than the default of 1000 cells. Begins the implementation of proposal 168. Roger Dingledine2009-09-15
* | | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-09-01
|\| |
| * | Fix compile warnings on Snow Leopard•••Big thanks to nickm and arma for helping me with this! Sebastian Hahn2009-09-01
| |/
* | Merge commit 'origin/maint-0.2.1'•••[Didn't take Karsten's full bug 1024 workaround, since 0.2.2 doesn't use v0 rend descs.] Nick Mathewson2009-07-02
|\|
| * Make an attempt to fix bug 1024.•••The internal error "could not find intro key" occurs when we want to send an INTRODUCE1 cell over a recently finished introduction circuit and think we built the introduction circuit with a v2 hidden service descriptor, but cannot find the introduction key in our descriptor. My first guess how we can end up in this situation is that we are wrong in thinking that we built the introduction circuit based on a v2 hidden service descriptor. This patch checks if we have a v0 descriptor, too, and uses that instead. Karsten Loesing2009-07-02
| * Better fix for 997.Karsten Loesing2009-06-19
| * Revert "Backport fix for bug 997."•••This reverts commit 3847f54945933a11d14053b80427f268ffcfd8ad. Karsten Loesing2009-06-19
| * Backport fix for bug 997.•••Backporting 6a32beb and ca8708a. Karsten Loesing2009-06-16
* | Fix more of bug 997.•••Fix refetching of hidden service descriptors when all introduction points have turned out to not work. Karsten Loesing2009-06-13
* | Restore changes from f79688d that got lost somehow during a merge.Karsten Loesing2009-06-12
* | Restore changes from Karsten's "Remove unused rendversion parameters".•••These were made undone by a merge. Nick Mathewson2009-05-28
* | Merge commit 'origin/maint-0.2.1'Nick Mathewson2009-05-27
|\|
| * Spell-check Tor.Nick Mathewson2009-05-27
| * Update copyright to 2009.Karsten Loesing2009-05-04
* | Remove unused rendversion parameters. YAGNI.Karsten Loesing2009-05-04
* | Clients do not request version 0 hidserv descs anymore.Karsten Loesing2009-05-04
* | Update copyright to 2009.Karsten Loesing2009-05-02
|/
* Don't extend introduction circuits indefinitely.•••Doing so could run you out of relay_early cells and give you a senselessly long circuit. Patch from Karsten; may fix bug 878. svn:r18459 Nick Mathewson2009-02-10
* Clean up (and mark for 0.2.2.) comments relating to non-beauty of current bug...•••svn:r17966 Nick Mathewson2009-01-06
* Remove svn $Id$s from our source, and remove tor --version --version.•••The subversion $Id$ fields made every commit force a rebuild of whatever file got committed. They were not actually useful for telling the version of Tor files in the wild. svn:r17867 Nick Mathewson2009-01-04
* Downlgrade tweak, and answer lots of XXX021s. No actual code fixes in this p...•••svn:r17686 Nick Mathewson2008-12-18
* Fix a valgrind-located memory stomp. Bugfix on 0.2.1.6-alpha.•••svn:r17667 Nick Mathewson2008-12-18