[or-cvs] r15183: fix a few typos, and give the bootstrap phase stuff a change (in tor/trunk: . src/common)

arma at seul.org arma at seul.org
Fri Jun 13 04:26:06 UTC 2008


Author: arma
Date: 2008-06-13 00:26:05 -0400 (Fri, 13 Jun 2008)
New Revision: 15183

Modified:
   tor/trunk/ChangeLog
   tor/trunk/src/common/ciphers.inc
   tor/trunk/src/common/tortls.c
Log:
fix a few typos, and give the bootstrap phase stuff a changelog entry.


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-06-13 04:18:26 UTC (rev 15182)
+++ tor/trunk/ChangeLog	2008-06-13 04:26:05 UTC (rev 15183)
@@ -1,4 +1,15 @@
-Changes in version 0.2.1.1-alpha - 2008-??-??
+Changes in version 0.2.1.1-alpha - 2008-06-13
+  o Major features:
+    - Modify the list of ciphers advertised by OpenSSL in client mode
+      to even more closely resemble a common web browser.  We cheat a
+      little so that we can advertise ciphers that the locally
+      installed OpenSSL doesn't know about.
+    - Start sending "bootstrap phase" status events to the controller,
+      so it can keep the user informed of progress fetching directory
+      information and establishing circuits. Also inform the controller
+      if we think we're stuck at a particular bootstrap phase. Implements
+      proposal 137.
+
   o Memory fixes and improvements:
     - Add a malloc_good_size implementation to OpenBSD_malloc_linux.c,
       to avoid unused RAM in buffer chunks and memory pools.
@@ -37,12 +48,6 @@
       service, with the 30 seconds being the current voodoo saying that
       a descriptor is stable.
 
-  o Major features:
-    - Modify the list of ciphers advertised by OpenSSL in client mode
-      to even more closely resemble a common web browser.  We cheat a
-      little so that we can advertise ciphers that the locally
-      installed OpenSSL doesn't know about.
-
   o Minor features:
     - Allow separate log levels to be configured for different logging
       domains.  For example, this allows one to log all notices, warnings,

Modified: tor/trunk/src/common/ciphers.inc
===================================================================
--- tor/trunk/src/common/ciphers.inc	2008-06-13 04:18:26 UTC (rev 15182)
+++ tor/trunk/src/common/ciphers.inc	2008-06-13 04:26:05 UTC (rev 15183)
@@ -1,5 +1,5 @@
 /* This is an include file used to define the list of ciphers clients should
- * advertise.  Before including it, you should define the CIPHER and XCPIHER
+ * advertise.  Before including it, you should define the CIPHER and XCIPHER
  * macros. */
 #ifdef TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
     CIPHER(0xc00a, TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA)

Modified: tor/trunk/src/common/tortls.c
===================================================================
--- tor/trunk/src/common/tortls.c	2008-06-13 04:18:26 UTC (rev 15182)
+++ tor/trunk/src/common/tortls.c	2008-06-13 04:26:05 UTC (rev 15183)
@@ -104,10 +104,10 @@
 #ifdef V2_HANDSHAKE_CLIENT
 /** An array of fake SSL_CIPHER objects that we use in order to trick OpenSSL
  * in client mode into advertising the ciphers we want.  See
- * rectify_client_ciphers for details. */
+ * rectify_client_ciphers() for details. */
 static SSL_CIPHER *CLIENT_CIPHER_DUMMIES = NULL;
 /** A stack of SSL_CIPHER objects, some real, some fake.
- * See rectify_client_ciphers for details. */
+ * See rectify_client_ciphers() for details. */
 static STACK_OF(SSL_CIPHER) *CLIENT_CIPHER_STACK = NULL;
 #endif
 
@@ -731,7 +731,7 @@
 #endif
 
 /** Replace *<b>ciphers</b> with a new list of SSL ciphersuites: specifically,
- * a list designed to mimic a common web browser.  Some of the cipher in the
+ * a list designed to mimic a common web browser.  Some of the ciphers in the
  * list won't actually be implemented by OpenSSL: that's okay so long as the
  * server doesn't select them, and the server won't select anything besides
  * what's in SERVER_CIPHER_LIST.



More information about the tor-commits mailing list