[tor-commits] [tor/master] Merge remote-tracking branch 'origin/maint-0.2.2'

nickm at torproject.org nickm at torproject.org
Thu Jan 5 19:15:14 UTC 2012


commit ef69f2f2ab588ea51ade8587c8c0af2064c32c85
Merge: 13b2aa6 ccd8289
Author: Nick Mathewson <nickm at torproject.org>
Date:   Thu Jan 5 14:17:44 2012 -0500

    Merge remote-tracking branch 'origin/maint-0.2.2'

 changes/bug4822     |   13 +++++++++++++
 src/common/tortls.c |   37 ++++++++++++++++++++++++++++++++++---
 2 files changed, 47 insertions(+), 3 deletions(-)

diff --cc src/common/tortls.c
index 2b46612,ef61f71..b7cd835
--- a/src/common/tortls.c
+++ b/src/common/tortls.c
@@@ -1158,20 -771,20 +1168,24 @@@ tor_tls_context_new(crypto_pk_env_t *id
    result = tor_malloc_zero(sizeof(tor_tls_context_t));
    result->refcnt = 1;
    if (!is_client) {
 -    result->my_cert = X509_dup(cert);
 -    result->my_id_cert = X509_dup(idcert);
 -    result->key = crypto_pk_dup_key(rsa);
 +    result->my_link_cert = tor_cert_new(X509_dup(cert));
 +    result->my_id_cert = tor_cert_new(X509_dup(idcert));
 +    result->my_auth_cert = tor_cert_new(X509_dup(authcert));
 +    if (!result->my_link_cert || !result->my_id_cert || !result->my_auth_cert)
 +      goto error;
 +    result->link_key = crypto_pk_dup_key(rsa);
 +    result->auth_key = crypto_pk_dup_key(rsa_auth);
    }
  
- #ifdef EVERYONE_HAS_AES
-   /* Tell OpenSSL to only use TLS1 */
+ #if 0
+   /* Tell OpenSSL to only use TLS1. This would actually break compatibility
+    * with clients that are configured to use SSLv23_method(), so we should
+    * probably never use it.
+    */
    if (!(result->ctx = SSL_CTX_new(TLSv1_method())))
      goto error;
- #else
+ #endif
+ 
    /* Tell OpenSSL to use SSL3 or TLS1 but not SSL2. */
    if (!(result->ctx = SSL_CTX_new(SSLv23_method())))
      goto error;



More information about the tor-commits mailing list