[or-cvs] r11144: bump stable to 0.1.2.16-dev since it needs some testing now (in tor/branches/tor-0_1_2-patches: . contrib src/or src/win32)
arma at seul.org
arma at seul.org
Thu Aug 16 18:54:35 UTC 2007
Author: arma
Date: 2007-08-16 14:54:35 -0400 (Thu, 16 Aug 2007)
New Revision: 11144
Modified:
tor/branches/tor-0_1_2-patches/ChangeLog
tor/branches/tor-0_1_2-patches/configure.in
tor/branches/tor-0_1_2-patches/contrib/tor-mingw.nsi.in
tor/branches/tor-0_1_2-patches/src/or/control.c
tor/branches/tor-0_1_2-patches/src/win32/orconfig.h
Log:
bump stable to 0.1.2.16-dev since it needs some testing now
Modified: tor/branches/tor-0_1_2-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_1_2-patches/ChangeLog 2007-08-16 18:32:45 UTC (rev 11143)
+++ tor/branches/tor-0_1_2-patches/ChangeLog 2007-08-16 18:54:35 UTC (rev 11144)
@@ -1,4 +1,4 @@
-Changes in version 0.1.2.xx - 2007-xxxxx
+Changes in version 0.1.2.17 - 2007-08-xx
o Removed features:
- We removed support for the old (v0) control protocol. It has been
deprecated since Tor 0.1.1.1-alpha, and keeping it safe and secure
@@ -8,7 +8,7 @@
- Save on most routerlist_assert_ok() calls in routerlist.c,
thus greatly speeding up loading cached-routers from disk on
startup (backport from trunk).
- - Disable sentiel-based debugging for buffer code: we squashed all
+ - Disable sentinel-based debugging for buffer code: we squashed all
the bugs that this was supposed to detect a long time ago, and
now its only effect is to change our buffer sizes from nice
powers of two (which platform mallocs tend to like) to values
@@ -19,8 +19,8 @@
o Minor bugfixes (misc):
- Choose perfectly fairly among routers when choosing by bandwidth and
- weighting by fraction of bandwidth provided by exits. Previously,
- we would choose with only approximate fairness, and correct ourselves
+ weighting by fraction of bandwidth provided by exits. Previously, we
+ would choose with only approximate fairness, and correct ourselves
if we ran off the end of the list.
- If we require CookieAuthentication but we fail to write the
cookie file, we would warn but not exit, and end up in a state
Modified: tor/branches/tor-0_1_2-patches/configure.in
===================================================================
--- tor/branches/tor-0_1_2-patches/configure.in 2007-08-16 18:32:45 UTC (rev 11143)
+++ tor/branches/tor-0_1_2-patches/configure.in 2007-08-16 18:54:35 UTC (rev 11144)
@@ -4,7 +4,7 @@
dnl See LICENSE for licensing information
AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.1.2.16)
+AM_INIT_AUTOMAKE(tor, 0.1.2.16-dev)
AM_CONFIG_HEADER(orconfig.h)
AC_CANONICAL_HOST
Modified: tor/branches/tor-0_1_2-patches/contrib/tor-mingw.nsi.in
===================================================================
--- tor/branches/tor-0_1_2-patches/contrib/tor-mingw.nsi.in 2007-08-16 18:32:45 UTC (rev 11143)
+++ tor/branches/tor-0_1_2-patches/contrib/tor-mingw.nsi.in 2007-08-16 18:54:35 UTC (rev 11144)
@@ -5,7 +5,7 @@
;
!include "MUI.nsh"
-!define VERSION "0.1.2.16"
+!define VERSION "0.1.2.16-dev"
!define INSTALLER "tor-${VERSION}-win32.exe"
!define WEBSITE "http://tor.eff.org/"
Modified: tor/branches/tor-0_1_2-patches/src/or/control.c
===================================================================
--- tor/branches/tor-0_1_2-patches/src/or/control.c 2007-08-16 18:32:45 UTC (rev 11143)
+++ tor/branches/tor-0_1_2-patches/src/or/control.c 2007-08-16 18:54:35 UTC (rev 11144)
@@ -2257,8 +2257,8 @@
char buf[128];
set_uint16(buf+2, htons(0x0000)); /* type == error */
set_uint16(buf+4, htons(0x0001)); /* code == internal error */
- strlcpy(buf+6, "The v0 control protocol is not supported by Tor 0.2.0.x "
- "and later; use Tor 0.1.2.x or upgrade your controller",
+ strlcpy(buf+6, "The v0 control protocol is not supported anymore. "
+ "Upgrade your controller.",
sizeof(buf)-6);
body_len = 2+strlen(buf+6)+2; /* code, msg, nul. */
set_uint16(buf+0, htons(body_len));
@@ -3375,7 +3375,7 @@
/** Choose a random authentication cookie and write it to disk.
* Anybody who can read the cookie from disk will be considered
* authorized to use the control connection. Return -1 if we can't
- * write the file, or 0 on success */
+ * write the file, or 0 on success. */
int
init_cookie_authentication(int enabled)
{
Modified: tor/branches/tor-0_1_2-patches/src/win32/orconfig.h
===================================================================
--- tor/branches/tor-0_1_2-patches/src/win32/orconfig.h 2007-08-16 18:32:45 UTC (rev 11143)
+++ tor/branches/tor-0_1_2-patches/src/win32/orconfig.h 2007-08-16 18:54:35 UTC (rev 11144)
@@ -227,6 +227,6 @@
#define USING_TWOS_COMPLEMENT
/* Version number of package */
-#define VERSION "0.1.2.16"
+#define VERSION "0.1.2.16-dev"
More information about the tor-commits
mailing list