[or-cvs] r17660: {tor} clean up old changelog a bit while i'm at it (tor/branches/tor-0_2_0-patches)

arma at seul.org arma at seul.org
Wed Dec 17 22:46:20 UTC 2008


Author: arma
Date: 2008-12-17 17:46:19 -0500 (Wed, 17 Dec 2008)
New Revision: 17660

Modified:
   tor/branches/tor-0_2_0-patches/ChangeLog
Log:
clean up old changelog a bit while i'm at it


Modified: tor/branches/tor-0_2_0-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_2_0-patches/ChangeLog	2008-12-17 22:46:00 UTC (rev 17659)
+++ tor/branches/tor-0_2_0-patches/ChangeLog	2008-12-17 22:46:19 UTC (rev 17660)
@@ -8,35 +8,35 @@
       reported by "wood".
     - When sending CREATED cells back for a given circuit, use a 64-bit
       connection ID to find the right connection, rather than an addr:port
-      combination.  Now that we can have multiple OR connections between the
-      same ORs, it is no longer possible to use addr:port to uniquely
+      combination.  Now that we can have multiple OR connections between
+      the same ORs, it is no longer possible to use addr:port to uniquely
       identify a connection.
 
   o Minor bugfixes:
-    - Do not mark smartlist_bsearch_idx() function as ATTR_PURE.  This bug
+    - Do not mark smartlist_bsearch_idx() function as ATTR_PURE. This bug
       could make gcc generate non-functional binary search code. Bugfix
       on 0.2.0.10-alpha.
     - Build correctly on platforms without socklen_t.
     - Compile without warnings on solaris.
     - Avoid potential crash on internal error during signature collection.
-      Fixes bug 864.  Patch from rovv.
+      Fixes bug 864. Patch from rovv.
     - Correct handling of possible malformed authority signing key
-      certificates with internal signature types.  Fixes bug 880.
+      certificates with internal signature types. Fixes bug 880.
       Bugfix on 0.2.0.3-alpha.
     - Fix a hard-to-trigger resource leak when logging credential status.
       CID 349.
     - When we can't initialize DNS because the network is down, do not
-      automatically stop Tor from starting.  Instead, we retry failed
-      dns_inits() every 10 minutes, and change the exit policy to reject *:*
-      until one succeeds.  Fixes bug 691.
+      automatically stop Tor from starting. Instead, we retry failed
+      dns_inits() every 10 minutes, and change the exit policy to reject
+      *:* until one succeeds. Fixes bug 691.
     - Use 64 bits instead of 32 bits for connection identifiers used with
       the controller protocol, to greatly reduce risk of identifier reuse.
-    - When we're choosing an exit node for a circuit, and we have no pending
-      streams, choose a good general exit rather than one that supports "all
-      the pending streams".  Bugfix on 0.1.1.x. (Fix by rovv.)
+    - When we're choosing an exit node for a circuit, and we have
+      no pending streams, choose a good general exit rather than one that
+      supports "all the pending streams". Bugfix on 0.1.1.x. Fix by rovv.
     - Fix another case of assuming, when a specific exit is requested,
       that we know more than the user about what hosts it allows.
-      Fixes one case of bug 752.  Patch from rovv.
+      Fixes one case of bug 752. Patch from rovv.
     - Clip the MaxCircuitDirtiness config option to a minimum of 10
       seconds. Warn the user if lower values are given in the
       configuration. Bugfix on 0.1.0.1-rc. Patch by Sebastian.
@@ -46,11 +46,11 @@
 
   o Minor features:
     - Report the case where all signatures in a detached set are rejected
-      differently than the case where there is an error handling the detached
-      set.
+      differently than the case where there is an error handling the
+      detached set.
     - When we realize that another process has modified our cached
       descriptors, print out a more useful error message rather than
-      triggering an assertion. Fixes bug 885.  Patch from Karsten.
+      triggering an assertion. Fixes bug 885. Patch from Karsten.
     - Implement the 0x20 hack to better resist DNS poisoning: set the
       case on outgoing DNS requests randomly, and reject responses that do
       not match the case correctly. This logic can be disabled with the



More information about the tor-commits mailing list