Roger Dingledine
|
f2ed011813
We were comparing the raw BridgePassword entry with a base64'ed
|
17 years ago |
Roger Dingledine
|
f34d46e7dd
similarly, don't throw around an int for the uint8_t circ->state
|
17 years ago |
Roger Dingledine
|
7427cf5d56
don't throw around an int for relay_command if we're going to
|
17 years ago |
Roger Dingledine
|
0977c29196
notice an integer overflow if we ever get source files with more
|
17 years ago |
Roger Dingledine
|
e9474ed28e
if you thought r13604 was a kludge, how about this.
|
17 years ago |
Roger Dingledine
|
56a7c9238e
be more clear about a possible integer underflow problem. this
|
17 years ago |
Roger Dingledine
|
e0beb6cc5e
check return value for crypto_pk_asn1_encode here too. thanks veracode.
|
17 years ago |
Nick Mathewson
|
260c37c14c
r18236@catbus: nickm | 2008-02-19 18:55:21 -0500
|
17 years ago |
Roger Dingledine
|
913f66278c
rearrange our assert so we don't possibly overflow rh.length before
|
17 years ago |
Nick Mathewson
|
0399538b90
r18233@catbus: nickm | 2008-02-19 18:46:07 -0500
|
17 years ago |
Roger Dingledine
|
707da4f73f
start checking the return value of crypto_pk_asn1_encode() while
|
17 years ago |
Nick Mathewson
|
42c4670e27
r18230@catbus: nickm | 2008-02-19 18:29:43 -0500
|
17 years ago |
Roger Dingledine
|
319c0d8933
is_reverse in our struct is uint8_t. don't make it be an int
|
17 years ago |
Nick Mathewson
|
dbcf29d301
r18228@catbus: nickm | 2008-02-19 18:05:53 -0500
|
17 years ago |
Nick Mathewson
|
9479dd3768
r18226@catbus: nickm | 2008-02-19 18:01:01 -0500
|
17 years ago |
Roger Dingledine
|
d1a195d3cb
call a "number of characters" a size_t, not an int
|
17 years ago |
Nick Mathewson
|
632c035ad9
r18221@catbus: nickm | 2008-02-19 17:46:16 -0500
|
17 years ago |
Roger Dingledine
|
c126b79f07
be more explicit about a harmless thing that freaked veracode out
|
17 years ago |
Nick Mathewson
|
4ccffd7aea
r18218@catbus: nickm | 2008-02-19 17:27:40 -0500
|
17 years ago |
Roger Dingledine
|
810bfe970c
make explicit that we don't care if a rename() call fails.
|
17 years ago |
Nick Mathewson
|
749735215b
r18208@catbus: nickm | 2008-02-19 17:02:30 -0500
|
17 years ago |
Roger Dingledine
|
23e4c849c9
resolve another edge case in staying dormant
|
17 years ago |
Roger Dingledine
|
da7f0315e6
maybe it should compile too.
|
17 years ago |
Roger Dingledine
|
d964beac16
If we only ever used Tor for hidden service lookups or posts, we
|
17 years ago |
Roger Dingledine
|
33c754315b
clear up another connlimit lie
|
17 years ago |
Roger Dingledine
|
d61835a4ba
clean up the socket counting thing. third time's a charm.
|
17 years ago |
Nick Mathewson
|
f4dc006fb5
r18198@catbus: nickm | 2008-02-19 14:30:30 -0500
|
17 years ago |
Nick Mathewson
|
b98c437fcc
r18195@catbus: nickm | 2008-02-19 14:11:15 -0500
|
17 years ago |
Roger Dingledine
|
ab4d3888e4
hunt for killerchicken's socket counting problem
|
17 years ago |
Roger Dingledine
|
be8a85dc1c
document that if you enable TOR_PERF, you won't be compatible with the
|
17 years ago |