Skip to content
Snippets Groups Projects
  1. Aug 03, 2012
  2. Jul 06, 2012
  3. Jun 13, 2012
  4. Jun 07, 2012
  5. Jun 04, 2012
  6. Jun 03, 2012
    • Nick Mathewson's avatar
      Work around a bug in OpenSSL 1.0.1's TLS 1.1 and TLS 1.2 support · 841a8d55
      Nick Mathewson authored
      It appears that when OpenSSL negotiates a 1.1 or 1.2 connection, and it
      decides to renegotiate, the client will send a record with version "1.0"
      rather than with the current TLS version.  This would cause the
      connection to fail whenever both sides had OpenSSL 1.0.1, and the v2 Tor
      handshake was in use.
      
      As a workaround, disable TLS 1.1 and TLS 1.2.  When a later version of
      OpenSSL is released, we can make this conditional on running a fixed
      version of OpenSSL.
      
      Alternatively, we could disable TLS 1.1 and TLS 1.2 only on the client
      side.  But doing it this way for now means that we not only fix TLS with
      patched clients; we also fix TLS when the server has this patch and the
      client does not.  That could be important to keep the network running
      well.
      
      Fixes bug 6033.
      841a8d55
  7. May 31, 2012
  8. May 30, 2012
    • Nick Mathewson's avatar
      Add __attribute__(format)s for our varargs printf/scanf wrappers · e2848946
      Nick Mathewson authored
      It turns out that if you set the third argument of
      __attribute__(format) to 0, GCC and Clang will check the format
      argument without expecting to find variadic arguments.  This is the
      correct behavior for vsnprintf, vasprintf, and vscanf.
      
      I'm hoping this will fix bug 5969 (a clang warning) by telling clang that
      the format argument to tor_vasprintf is indeed a format string.
      e2848946
  9. May 16, 2012
  10. May 15, 2012
  11. May 10, 2012
  12. May 07, 2012
  13. Apr 19, 2012
  14. Apr 11, 2012
  15. Apr 10, 2012
  16. Apr 05, 2012
  17. Apr 04, 2012
Loading