Skip to content
Snippets Groups Projects
  1. Nov 03, 2016
    • Nick Mathewson's avatar
      Work around a behavior change in openssl's BUF_MEM code · 9b18b215
      Nick Mathewson authored
      In our code to write public keys to a string, for some unfathomable
      reason since 253f0f16, we would allocate a memory BIO, then
      set the NOCLOSE flag on it, extract its memory buffer, and free it.
      Then a little while later we'd free the memory buffer with
      BUF_MEM_free().
      
      As of openssl 1.1 this doesn't work any more, since there is now a
      BIO_BUF_MEM structure that wraps the BUF_MEM structure.  This
      BIO_BUF_MEM doesn't get freed in our code.
      
      So, we had a memory leak!
      
      Is this an openssl bug?  Maybe.  But our code was already pretty
      silly.  Why mess around with the NOCLOSE flag here when we can just
      keep the BIO object around until we don't need the buffer any more?
      
      Fixes bug 20553; bugfix on 0.0.2pre8
      9b18b215
  2. Oct 17, 2016
  3. Oct 06, 2016
  4. Oct 05, 2016
  5. Sep 23, 2016
  6. Sep 22, 2016
  7. Sep 21, 2016
  8. Sep 20, 2016
  9. Sep 07, 2016
  10. Aug 24, 2016
  11. Aug 22, 2016
    • Nick Mathewson's avatar
      Do not pass NULL to log(%s) in dir_server_new. · 0ba05313
      Nick Mathewson authored
      This bug had existed since 0.2.4.7-alpha, but now that we have
      FallbackDirs by default, it actually matters.
      
      Fixes bug 19947; bugfix on 0.2.4.7-alpha or maybe 0.2.8.1-alpha.
      
      Rubiate wrote the patch; teor wrote the changes file.
      0ba05313
  12. Aug 19, 2016
  13. Aug 12, 2016
Loading