tor/changes
Nick Mathewson 0bd55ed96a Always Use EVP_aes_*_ctr() with openssl 1.1
(OpenSSL 1.1 makes EVP_CIPHER_CTX opaque, _and_ adds acceleration
for counter mode on more architectures.  So it won't work if we try
the older approach, and it might help if we try the newer one.)

Fixes bug 20588.
2016-11-06 21:01:25 -05:00
..
.dummy Add a .dummy file in the changes directory to stop git from removing it 2015-05-11 11:41:48 -04:00
20460 In test_tortls_classify_client_ciphers(), s/ECDH/ECDHE/ 2016-11-06 20:23:40 -05:00
bug19869 Avoid tor_fragile_assert() failure with DNSPort on RESOLVED_TYPE_ERROR 2016-10-26 14:16:40 -04:00
bug19968 Actually clamp the number of detected CPUs to 16. 2016-10-31 14:19:39 -04:00
bug19969 Fix warnings from lintChanges.py 2016-11-06 16:39:46 -05:00
bug20401 Actually free the worker_state_t object when we do an update with it 2016-10-31 15:20:25 -04:00
bug20472 Fix warnings from lintChanges.py 2016-11-06 16:39:46 -05:00
bug20487 Add a sentence to the manpage about nonanonymous=>Socksport 0. 2016-10-31 15:13:27 -04:00
bug20551 Fix warnings from lintChanges.py 2016-11-06 16:39:46 -05:00
bug20553 Work around a behavior change in openssl's BUF_MEM code 2016-11-03 10:51:10 -04:00
bug20588 Always Use EVP_aes_*_ctr() with openssl 1.1 2016-11-06 21:01:25 -05:00
more_module_docs changes file for module docs 2016-10-18 19:35:10 -04:00