[or-cvs] r14671: If the user has an openssl that supports my "release buffer (in tor/trunk: . src/common)

nickm at seul.org nickm at seul.org
Mon May 19 18:13:01 UTC 2008


Author: nickm
Date: 2008-05-19 14:13:00 -0400 (Mon, 19 May 2008)
New Revision: 14671

Modified:
   tor/trunk/ChangeLog
   tor/trunk/src/common/tortls.c
Log:
If the user has an openssl that supports my "release buffer ram" patch, use it.

Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-05-19 17:22:22 UTC (rev 14670)
+++ tor/trunk/ChangeLog	2008-05-19 18:13:00 UTC (rev 14671)
@@ -91,6 +91,10 @@
       this new scheme when the server supports it.
     - Add a new V3AuthUseLegacyKey option to make it easier for authorities
       to change their identity keys if they have to.
+    - If the user has applied the experimental SSL_MODE_RELEASE_BUFFERS
+      patch to their OpenSSL, turn it on to save memory on servers.  This
+      patch will (with any luck) get included in a mainline distribution
+      before too long.
 
   o Minor features (security):
     - Reject requests for reverse-dns lookup of names in a private

Modified: tor/trunk/src/common/tortls.c
===================================================================
--- tor/trunk/src/common/tortls.c	2008-05-19 17:22:22 UTC (rev 14670)
+++ tor/trunk/src/common/tortls.c	2008-05-19 18:13:00 UTC (rev 14671)
@@ -564,6 +564,9 @@
   SSL_CTX_set_options(result->ctx, SSL_OP_NO_SSLv2);
 #endif
   SSL_CTX_set_options(result->ctx, SSL_OP_SINGLE_DH_USE);
+#ifdef SSL_MODE_RELEASE_BUFFERS
+  SSL_CTX_set_mode(result->ctx, SSL_MODE_RELEASE_BUFFERS);
+#endif
   if (cert && !SSL_CTX_use_certificate(result->ctx,cert))
     goto error;
   X509_free(cert); /* We just added a reference to cert. */



More information about the tor-commits mailing list