69d32696a1fix documentation for SSL torrents
arvidn
2020-03-11 16:31:49 +0100
bc666052c7fix typo in building documentation
arvidn
2020-03-08 23:34:31 +0100
0f337b9ce7bump version to 1.2.5
arvidn
2020-03-08 01:20:12 +0100
eaa18ff7a1announce port=1 instead of port=0, when there is no listen port
arvidn
2020-03-07 16:12:30 +0100
9469913cb2fix typo in lsd::start
arvidn
2020-03-07 12:53:01 +0100
6480b9df8cminor tweak to set_queue_position to ensure trigger_auto_managed() is always called
Arvid Norberg
2020-03-05 12:10:41 +0100
9bfb108b4fenable all disabled trackers when listen sockets are re-opened
Arvid Norberg
2020-03-05 11:46:04 +0100
5c869f697cadd control of queue position in client_test
arvidn
2020-03-04 15:07:08 +0100
06ce1b4747fix issue where want_tick could get out of sync with the lists the torrent belonged to
arvidn
2020-03-04 12:51:26 +0100
65d6e83b1aadd support for TCP_NOTSENT_LOWAT
arvidn
2020-03-03 13:54:45 +0100
83bbefc008fix correct interface binding of local service discovery multicast
Arvid Norberg
2020-03-03 22:07:08 +0100
ee38106465restore in-class flag types, for backwards compatibility with libtorrent-1.1
arvidn
2020-03-03 10:01:50 +0100
14d5c99a18expanding a device does not look for a default route
arvidn
2020-02-28 18:17:21 +0100
1e4083b3fbrely less on the ability to enumerate the routing table reliably. Any IP address explicitly specified is assumed to represent an externally available IP, unless marked with the l-flag. If a device name or an unspecified address is used, they are expanded and only for such expanded entries is there a heuristic to determine which addresses are externally available and which are local. The default is to assume it's local only, unless it has a globally routable IP address or a default route can be found for the device.
arvidn
2020-02-18 22:50:19 +0100
47012b506aextend timeout for invalidation-of-torrent_handle test
arvidn
2020-03-01 00:01:20 +0100
a48adc8730add link to ABI report to README
arvidn
2020-02-29 17:14:39 +0100
9f3192f691exempt issues belonging to milestones from being marked stale
arvidn
2020-02-29 14:23:27 +0100
36f6affa3badd stale config for github
arvidn
2020-02-27 21:49:23 +0100
0eee042bf9Fix some more unlikely integer truncation
FranciscoPombal
2020-02-27 12:38:25 +0000
1dcbeb2e60remove some seemingly unnecessary TORRENT_TRY and TORRENT_CATCH from is_local(), is_any() and is_teredo(). simplify is_loopback()
arvidn
2020-02-26 10:59:57 +0100
cc792d8638improve error messages and error reporting of failing enum_routes()
arvidn
2020-02-26 09:04:37 +0100
8dbb7c4232don't repeat the settings documentation. add note to announce_ip
arvidn
2020-02-21 12:19:45 +0100
091dbd6494Fix possible output truncation in test_dht
FranciscoPombal
2020-02-22 00:43:31 +0000
68a57218e7add note about listening to port 0. Add bittorrent glossary
arvidn
2020-02-18 13:06:29 +0100
c299004abfundeprecate settings_pack::dht_upload_rate_limit. Make sure it doesn't overflow if set too high
arvidn
2020-02-18 14:48:29 +0100
14f1266199fix strncpy() warnings and ensure C strings are 0-terminated
arvidn
2020-02-15 11:08:04 +0100
224cc0ec6dinclude tiny version in DHT v field
arvidn
2020-02-18 13:08:26 +0100
dcdadb16ceupdate python to 3.7 on osx travis
arvidn
2020-02-16 10:44:33 +0100
ad83b1c0ebfix one more float->int conversion warning
arvidn
2020-02-09 00:15:54 +0100
0a4a06ce74apparently on VPNs it's common for the gateway for a route to be outside of the netmask of the network it's a router for. fix that in get_gateway
arvidn
2020-02-08 21:11:39 +0100
cc8cbcaf9dfix infinite loop when announcing
Steven Siloti
2020-01-24 21:38:30 -0800
4054cbbaeestore stop_when_ready flag in fastresume data
Vladimir Golovnev (glassez)
2020-01-22 11:45:11 +0300
8013216550document multi-homed support
arvidn
2020-01-18 17:32:51 +0100
208d71ba77support source-hint from routing table, where supported
arvidn
2020-01-19 23:22:39 +0100
bc0274ed6alimit the number of DHT nodes to run
arvidn
2020-01-21 00:46:09 +0100
2c8cf4834bsimplify the local service discovery logic to only deal with a single network. Instantiate LSD once per listen_socket_t instead of just once
arvidn
2020-01-15 08:04:51 +0100
819eea722bbackport of warning related fixes
Alden Torres
2020-01-19 23:09:44 -0500
f94c09c95duse our local address correctly for user port-mapping requests
arvidn
2020-01-19 20:16:57 +0100
7529d3e67eremove now unused, in_local_network() functions
arvidn
2020-01-15 00:03:49 +0100
b5ea5bb82cmove upnp mapper to have one per listen_socket_t. simplify the upnp logic to only deal with a single network.
arvidn
2020-01-15 00:03:31 +0100
b8726bd4f6refactor discover_device() away from upnp
arvidn
2020-01-14 23:52:08 +0100
a40ae61f15improve SOCKS5 error alerts by including the interface address in no-route-to-host errors
arvidn
2020-01-19 19:39:35 +0100
f5ebd4e354simplify natpmp by requiring it to be tied to a specific network, and use get_gateway() and remove unused get_default_route() functions
arvidn
2020-01-18 15:23:29 +0100
a53d3a8746factor out get_gateway function and add unit tests. IPv6 gateways are not addressed in the same network, so we can't use match_addr_mask(). Assume all local IPv6 addresses do not have a gateway
arvidn
2020-01-18 11:03:58 +0100
95df88e7a3make it a build error if we don't know how to enumerate network interfaces or network routes
arvidn
2020-01-12 22:36:36 +0100
a1d78aa60eonly start natpmp on listen sockets that have a router (since NATPMP needs one)
arvidn
2020-01-11 20:04:21 +0100
88d9c05e3cexpand IPv4 in expand_unspecified_address
arvidn
2020-01-09 15:41:47 +0100
0961427b50expand unspecified to loopback as well
arvidn
2020-01-09 00:32:43 +0100
8be7ab559aremove outgoing udp sockets and replace with listen_socket_t
arvidn
2020-01-07 17:53:45 +0100
4ceb2ea467limit tracker announces and SOCKS5 connection attempts to listen_socket_t that actually can reach the target
arvidn
2020-01-06 10:11:21 +0100
a0b0f2aec5fix clearing of netmask if it's not known, on windows
arvidn
2020-01-17 01:09:23 +0100
d13109426afix test_lsd to pass reliably
arvidn
2020-01-18 01:34:01 +0100
e4e967335cpopulate ip_interface.netmask on Windows
Steven Siloti
2020-01-15 20:25:47 -0800
82d4d1927drestrict DHT nodes to the network they are associated with (multi-homed)
arvidn
2020-01-15 19:47:41 +0100
df85b31490deprecate and remvoe broadcast_lsd setting
arvidn
2020-01-15 11:35:32 +0100