[or-cvs] r13808: forward-port r13799 and the 0.2.0.21-rc changelog (in tor/trunk: . doc src/or)
arma at seul.org
arma at seul.org
Sun Mar 2 22:29:05 UTC 2008
Author: arma
Date: 2008-03-02 17:29:04 -0500 (Sun, 02 Mar 2008)
New Revision: 13808
Modified:
tor/trunk/ChangeLog
tor/trunk/doc/TODO
tor/trunk/src/or/buffers.c
Log:
forward-port r13799 and the 0.2.0.21-rc changelog
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2008-03-02 21:46:54 UTC (rev 13807)
+++ tor/trunk/ChangeLog 2008-03-02 22:29:04 UTC (rev 13808)
@@ -9,6 +9,25 @@
Bugfix on 0.2.0.20-rc.
+Changes in version 0.2.0.21-rc - 2008-03-02
+ o Major bugfixes:
+ - The control port should declare that it requires password auth
+ when HashedControlSessionPassword is set too. Patch from Matt Edman;
+ bugfix on 0.2.0.20-rc. Fixes bug 615.
+ - Downgrade assert in connection_buckets_decrement() to a log message.
+ This may help us solve bug 614, and in any case will make its
+ symptoms less severe. Bugfix on 0.2.0.20-rc. Reported by fredzupy.
+ - We were sometimes miscounting the number of bytes read from the
+ network, causing our rate limiting to not be followed exactly.
+ Bugfix on 0.2.0.16-alpha. Reported by lodger.
+
+ o Minor bugfixes:
+ - Fix compilation with OpenSSL 0.9.8 and 0.9.8a. All other supported
+ OpenSSL versions should have been working fine. Diagnosis and patch
+ from lodger, Karsten Loesing and Sebastian Hahn. Fixes bug 616.
+ Bugfix on 0.2.0.20-rc.
+
+
Changes in version 0.2.0.20-rc - 2008-02-24
Tor 0.2.0.20-rc is the first release candidate for the 0.2.0 series. It
makes more progress towards normalizing Tor's TLS handshake, makes
Modified: tor/trunk/doc/TODO
===================================================================
--- tor/trunk/doc/TODO 2008-03-02 21:46:54 UTC (rev 13807)
+++ tor/trunk/doc/TODO 2008-03-02 22:29:04 UTC (rev 13808)
@@ -234,6 +234,7 @@
- get rid of the v1 directory stuff (making, serving, and caching).
- perhaps replace it with a "this is a tor server" stock webpage.
+ - even clients run rep_hist_load_mtbf_data(). this wastes memory.
- bridge communities with local bridge authorities:
- clients who have a password configured decide to ask their bridge
Modified: tor/trunk/src/or/buffers.c
===================================================================
--- tor/trunk/src/or/buffers.c 2008-03-02 21:46:54 UTC (rev 13807)
+++ tor/trunk/src/or/buffers.c 2008-03-02 22:29:04 UTC (rev 13808)
@@ -635,13 +635,13 @@
check();
if (r < 0)
return r; /* Error */
- else if ((size_t)r < readlen) { /* eof, block, or no more to read. */
- tor_assert(r+total_read < INT_MAX);
- return (int)(r + total_read);
+ tor_assert(total_read+r < INT_MAX);
+ total_read += r;
+ if ((size_t)r < readlen) { /* eof, block, or no more to read. */
+ break;
}
- total_read += r;
}
- return r;
+ return (int)total_read;
}
/** As read_to_buf, but reads from a TLS connection, and returns a TLS
@@ -689,11 +689,12 @@
check();
if (r < 0)
return r; /* Error */
- else if ((size_t)r < readlen) /* eof, block, or no more to read. */
- return r;
- total_read += r;
+ tor_assert(total_read+r < INT_MAX);
+ total_read += r;
+ if ((size_t)r < readlen) /* eof, block, or no more to read. */
+ break;
}
- return r;
+ return (int)total_read;
}
/** Helper for flush_buf(): try to write <b>sz</b> bytes from chunk
More information about the tor-commits
mailing list