- Feb 24, 2016
-
-
Péter Szilágyi authored
-
Péter Szilágyi authored
-
Péter Szilágyi authored
-
Péter Szilágyi authored
eth/downloader: bump the download queue size to prevent starvation
-
Jeffrey Wilcke authored
Closes #2241: Use Keccak-256 from golang.org/x/crypto/sha3 and mention explicitly
-
Péter Szilágyi authored
p2p/discover: NTP sanity check clock drift in case of expirations
-
Péter Szilágyi authored
ethdb: fully disable metrics if not requested (oops?)
-
Péter Szilágyi authored
-
Péter Szilágyi authored
-
- Feb 23, 2016
-
-
Péter Szilágyi authored
-
Péter Szilágyi authored
Added Vagrantfile so that developers can spin up a VM to build geth
-
Péter Szilágyi authored
-
Péter Szilágyi authored
eth: fixed homestead tx check
-
Péter Szilágyi authored
eth/downloader: fix partial rollback and ancestor lookup
-
Péter Szilágyi authored
core/state, trie: add node iterator, test state/trie sync consistency
-
- Feb 21, 2016
-
-
Ricardo Catalinas Jiménez authored
-
Ricardo Catalinas Jiménez authored
-
Ricardo Catalinas Jiménez authored
-
Ricardo Catalinas Jiménez authored
-
Ricardo Catalinas Jiménez authored
-
Ricardo Catalinas Jiménez authored
-
Ricardo Catalinas Jiménez authored
-
Ricardo Catalinas Jiménez authored
As we aren't really using the standarized SHA-3
-
Ricardo Catalinas Jiménez authored
This hash function is slightly different from the standarized NIST SHA-3 as both of them use different domain separation bits.
-
Ricardo Catalinas Jiménez authored
-
Ricardo Catalinas Jiménez authored
Revision: 1f22c0103821b9390939b6776727195525381532
-
Ricardo Catalinas Jiménez authored
-
- Feb 20, 2016
-
-
Jeffrey Wilcke authored
When a block is queried for retrieval we should add a check whether the block falls within the frontier rules. If we'd always use `From` retrieving transaction might fail. This PR temporarily changes everything to `FromFrontier` (safe!).
-
- Feb 19, 2016
-
-
Jeffrey Wilcke authored
core, core/vm: consensus changes necessary for the homestead release
-
Felix Lange authored
console: seed random number generator
-
Bas van Kervel authored
-
Jeffrey Wilcke authored
p2p, p2p/discover: EIP-8 changes
-
Felix Lange authored
-
Felix Lange authored
-
Felix Lange authored
-
Péter Szilágyi authored
-
- Feb 18, 2016
-
-
Jeffrey Wilcke authored
Assuming the following scenario where a miner has 15% of all hashing power and the ability to exert a moderate control over the network to the point where if the attacker sees a message A, it can't stop A from propagating, but what it **can** do is send a message B and ensure that most nodes see B before A. The attacker can then selfish mine and augment selfish mining strategy by giving his own blocks an advantage. This change makes the time at which a block is received less relevant and so the level of control an attacker has over the network no longer makes a difference. This change changes the current td algorithm `B_td > C_td` to the new algorithm `B_td > C_td || B_td == C_td && rnd < 0.5`.
-
Jeffrey Wilcke authored
* Removed some strange code that didn't apply state reverting properly * Refactored code setting from vm & state transition to the executioner * Updated tests
-
Jeffrey Wilcke authored
-
Gustav Simonsson authored
* change gas cost for contract creating txs * invalidate signature with s value greater than secp256k1 N / 2 * OOG contract creation if not enough gas to store code * new difficulty adjustment algorithm * new DELEGATECALL op code
-