mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-27 13:53:31 +01:00
forward-port r13777
svn:r13778
This commit is contained in:
parent
04efc74e18
commit
c5a7ff8e43
@ -81,7 +81,8 @@ Changes in version 0.2.0.20-rc - 2008-02-24
|
||||
o Minor bugfixes (memory leaks and code problems):
|
||||
- We were leaking a file descriptor if Tor started with a zero-length
|
||||
cached-descriptors file. Patch by freddy77; bugfix on 0.1.2.
|
||||
- Detect size overflow in zlib code. Reported by Dan Kaminsky.
|
||||
- Detect size overflow in zlib code. Reported by Justin Ferguson and
|
||||
Dan Kaminsky.
|
||||
- We were comparing the raw BridgePassword entry with a base64'ed
|
||||
version of it, when handling a "/tor/networkstatus-bridges"
|
||||
directory request. Now compare correctly. Noticed by Veracode.
|
||||
|
@ -2541,7 +2541,8 @@ handle_control_protocolinfo(control_connection_t *conn, uint32_t len,
|
||||
char *esc_cfile = esc_for_log(cfile);
|
||||
char *methods;
|
||||
{
|
||||
int passwd = (options->HashedControlPassword != NULL);
|
||||
int passwd = (options->HashedControlPassword != NULL ||
|
||||
options->HashedControlSessionPassword != NULL);
|
||||
smartlist_t *mlist = smartlist_create();
|
||||
if (cookies)
|
||||
smartlist_add(mlist, (char*)"COOKIE");
|
||||
|
Loading…
Reference in New Issue
Block a user