Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'technical-debt'

Results (1 - 100 of 120)

1 2
  • #6418 enhancement: Drop support for older versions of the hidden service protocol (new)
  • #6837 enhancement: More fine-grained modular decomposition (new)
  • #6877 defect: Finally replace all char[] buffers with uint8_t[] buffers (new)
  • #7174 project: Refactor node_t and router lists to make it easier to identify bugs (new)
  • #7479 defect: Replace more linked lists with queue.h implementations (new)
  • #7660 enhancement: Refactor circuit cannibalization into one place (new)
  • #7755 defect: circuit_t::timestamp_dirty should be cleaned up (new)
  • #9241 enhancement: Abstract and decouple path selection from circuit construction (new)
  • #10481 defect: connection_mark_unattached_ap_: checking always true edge_has_sent_end (new)
  • #10915 defect: Tool to find unused functions in Tor (new)
  • #11444 defect: Drop support for long-obsolete versions of Windows (new)
  • #11445 defect: Drop support for Windows XP (new)
  • #13260 defect: Transform code to cleaner c99 style (needs_information)
  • #14354 defect: Improve torflow engineering quality and deployment procedure (new)
  • #14709 task: Should the hash tables in circuitmux_t have channel ID in them? (new)
  • #15214 defect: networkstatus_compute_consensus() is unreasonably large and should be ... (new)
  • #15593 enhancement: Bring sanity to the tor side of the PT shutdown process. (accepted)
  • #15621 enhancement: Kill the pre-version 3 intro protocol code with fire. (new)
  • #16134 enhancement: The various stream lists tied to the circuit structures should use ... (new)
  • #16764 enhancement: Simplify Tor's control flow graph to the extent we can. (new)
  • #16849 defect: clear_status_flags_on_sybil might want to clear more flags (needs_revision)
  • #17224 enhancement: Refactor common parts of parse_dir_authority_line and ... (new)
  • #17295 enhancement: Route-selection and guard-selection logic completely replaced (new)
  • #17673 defect: circuit_handle_first_hop assumes all one-hop circuits are directory ... (new)
  • #17684 enhancement: Simplify directory_get_from_dirserver so it can be unit tested (new)
  • #17692 defect: Review every use of onehop_tunnel for assumptions that it's a ... (new)
  • #18481 defect: Allow the fallback directory schedules to be changed outside a test network (new)
  • #18643 enhancement: Replace the most error-prone binary parsers with trunnel (new)
  • #18644 task: Replace our routerparse.c core with something machine-generated (new)
  • #18645 task: Replace our http parser with something machine-generated (new)
  • #18721 enhancement: Define accessors for connection_t's address fields (new)
  • #18803 enhancement: Tools to manage Tor's intermodule callgraph, and help cut it down to size (new)
  • #18897 enhancement: Narrow scan-build checkers to those that have an acceptably low false ... (new)
  • #19286 defect: Document circuit abstraction, completely (new)
  • #19288 defect: Document circuitpathbias in detail (new)
  • #19293 defect: Document connection-attachment and addressmapping in detail (new)
  • #19308 enhancement: Group C files into module-groups for module callgraph purposes (new)
  • #19309 enhancement: Make target to count and list module callgraph violations (new)
  • #19311 enhancement: Create error vs warning distinction for module callgraph tool. (new)
  • #19329 defect: Integrate callgraph complexity measures into our regular process (new)
  • #19379 enhancement: Consider adding even more compiler warnings, even when they require ... (new)
  • #19380 defect: Hand-audit compiler warning results which we wouldn't want to have ... (new)
  • #19531 enhancement: Major cleanup in our baseXX APIs (new)
  • #19535 defect: A can't-happen case for one-hop circuits actually can happen (new)
  • #19665 defect: Should *Port_set count sockets? (new)
  • #20191 defect: Prevent a recurrence of #20103 (new)
  • #20554 enhancement: Refactor circuit_expire_building (new)
  • #20671 defect: Refactor stream cipher API (new)
  • #20672 defect: Refactor hashing API (new)
  • #20827 enhancement: Record guards' ed25519 identities (new)
  • #20835 task: Refactor choose_good_entry_server so it is (almost) never used (new)
  • #20919 defect: Extract prop271 state-parsing code into a generic thing (new)
  • #20931 enhancement: [prop271] Generate GUARD controller events (new)
  • #20953 enhancement: Isolate references to versioning (new)
  • #21020 enhancement: Refactor dirserv_generate_networkstatus_vote_obj (new)
  • #21023 defect: Replace custom checks with Autoconf macros (new)
  • #21423 defect: Refactor choose_good_entry_server based on different usecases (new)
  • #21474 defect: Fix make test-fuzz-corpora warnings (new)
  • #21494 defect: Fix scan-build warnings about assigning to char (new)
  • #21497 defect: Fix scan-build warnings: memory accesses (new)
  • #21910 enhancement: Refactor connection_edge_process_relay_cell() (assigned)
  • #21935 defect: prop224: Deeper testing of HS ntor subsystem (new)
  • #22123 enhancement: baseXX API strictness (new)
  • #22372 enhancement: Refactor dirserv_add_descriptor so we always free routerinfos and send ... (new)
  • #22448 defect: Move circuit_t.timestamp_dirty into origin_circuit_t (new)
  • #22717 defect: Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion (new)
  • #22881 defect: Unreachable relays launch multiple testing circuits per second (new)
  • #23066 defect: Test granularity, distribution, and inner range of crypto_rand* functions (new)
  • #23288 defect: refactor temporary file cleanup and make it more consistent (new)
  • #23423 defect: Remove redundant calls to connection_or_digest_is_known_relay() (new)
  • #23714 defect: stop casting small integers to (void *) (new)
  • #23764 defect: hs-v3: No live consensus on client with a bridge (new)
  • #24905 defect: Remove redundant connection_or_digest_is_known_relay() from ... (needs_revision)
  • #24906 defect: Make channelpadding_update_padding_for_channel() use !channel_is_client() (needs_revision)
  • #24911 defect: Remove the known digest check from channel_check_for_duplicates() (needs_revision)
  • #25669 enhancement: Privcount: blinding and encryption should be finished up (new)
  • #25964 enhancement: Remove hs_index_t fetch, and use one of the stores instead (new)
  • #26287 enhancement: run callgraph tool from Travis (new)
  • #26291 project: find all instances of SHA-1 in our design and implementation and kill ... (new)
  • #26337 enhancement: Investigate making rust error types use the failure crate (needs_information)
  • #27299 defect: hsv3: Clarify timing sources around hsv3 code (new)
  • #27661 defect: use C99 bool from stdbool.h instead of int everywhere (new)
  • #27662 defect: refactor networkstatus_parse_vote_from_string() (needs_revision)
  • #27879 task: Remove pathbias code (new)
  • #28282 enhancement: Refactor bandwidth file generation code (assigned)
  • #28675 enhancement: Deprecate standard cookie authentication (new)
  • #28777 defect: Split circuitpadding.c code into multiple modules (new)
  • #28982 enhancement: Refactor GETINFO dir/ so that new tor/ URLs automatically become GETINFOs (accepted)
  • #29053 enhancement: Use descriptor structs to deterministically create descriptor dumps (new)
  • #29115 enhancement: Make sure state file data types match the struct datatypes (new)
  • #29133 defect: Refactor dirserv_read_measured_bandwidths (new)
  • #29209 task: Reduce visibility of more data type internals (new)
  • #29232 enhancement: Write a function that prints a link specifier and link specifier list (new)
  • #29233 enhancement: Add a trunnel function that duplicates a trunnel object (new)
  • #29521 defect: Update test descriptors, and work out how to keep them updated (new)
  • #29642 enhancement: Free Windows library handles when we free_all in a module (new)
  • #29689 defect: Make Tor's test-network.sh consistent with chutney's test-network.sh (new)
  • #29701 enhancement: Load GeoIP[v6]File from the build directory when testing a tor build ... (new)
  • #29895 defect: avoid storing ints in void* in mainloop event data (new)
  • #29930 defect: Warning: can't unlink unverified-consensus on Windows (new)
1 2