bump stable to 0.1.2.16-dev since it needs some testing now

svn:r11144
This commit is contained in:
Roger Dingledine 2007-08-16 18:54:35 +00:00
parent 278b75619a
commit 521b065368
5 changed files with 10 additions and 10 deletions

View File

@ -1,4 +1,4 @@
Changes in version 0.1.2.xx - 2007-xxxxx
Changes in version 0.1.2.17 - 2007-08-xx
o Removed features:
- We removed support for the old (v0) control protocol. It has been
deprecated since Tor 0.1.1.1-alpha, and keeping it safe and secure
@ -8,7 +8,7 @@ Changes in version 0.1.2.xx - 2007-xxxxx
- Save on most routerlist_assert_ok() calls in routerlist.c,
thus greatly speeding up loading cached-routers from disk on
startup (backport from trunk).
- Disable sentiel-based debugging for buffer code: we squashed all
- Disable sentinel-based debugging for buffer code: we squashed all
the bugs that this was supposed to detect a long time ago, and
now its only effect is to change our buffer sizes from nice
powers of two (which platform mallocs tend to like) to values
@ -19,8 +19,8 @@ Changes in version 0.1.2.xx - 2007-xxxxx
o Minor bugfixes (misc):
- Choose perfectly fairly among routers when choosing by bandwidth and
weighting by fraction of bandwidth provided by exits. Previously,
we would choose with only approximate fairness, and correct ourselves
weighting by fraction of bandwidth provided by exits. Previously, we
would choose with only approximate fairness, and correct ourselves
if we ran off the end of the list.
- If we require CookieAuthentication but we fail to write the
cookie file, we would warn but not exit, and end up in a state

View File

@ -4,7 +4,7 @@ dnl Copyright (c) 2004-2007, Roger Dingledine, Nick Mathewson
dnl See LICENSE for licensing information
AC_INIT
AM_INIT_AUTOMAKE(tor, 0.1.2.16)
AM_INIT_AUTOMAKE(tor, 0.1.2.16-dev)
AM_CONFIG_HEADER(orconfig.h)
AC_CANONICAL_HOST

View File

@ -5,7 +5,7 @@
;
!include "MUI.nsh"
!define VERSION "0.1.2.16"
!define VERSION "0.1.2.16-dev"
!define INSTALLER "tor-${VERSION}-win32.exe"
!define WEBSITE "http://tor.eff.org/"

View File

@ -2257,8 +2257,8 @@ connection_control_process_inbuf(control_connection_t *conn)
char buf[128];
set_uint16(buf+2, htons(0x0000)); /* type == error */
set_uint16(buf+4, htons(0x0001)); /* code == internal error */
strlcpy(buf+6, "The v0 control protocol is not supported by Tor 0.2.0.x "
"and later; use Tor 0.1.2.x or upgrade your controller",
strlcpy(buf+6, "The v0 control protocol is not supported anymore. "
"Upgrade your controller.",
sizeof(buf)-6);
body_len = 2+strlen(buf+6)+2; /* code, msg, nul. */
set_uint16(buf+0, htons(body_len));
@ -3375,7 +3375,7 @@ control_event_guard(const char *nickname, const char *digest,
/** Choose a random authentication cookie and write it to disk.
* Anybody who can read the cookie from disk will be considered
* authorized to use the control connection. Return -1 if we can't
* write the file, or 0 on success */
* write the file, or 0 on success. */
int
init_cookie_authentication(int enabled)
{

View File

@ -227,6 +227,6 @@
#define USING_TWOS_COMPLEMENT
/* Version number of package */
#define VERSION "0.1.2.16"
#define VERSION "0.1.2.16-dev"