tor/changes
Nick Mathewson 1eb838b303 Work around openssl declaring x509_get_not{Before,After} as functions
Now that x509_get_not{Before,After} are functions in OpenSSL 1.1
(not yet releasesd), we need to define a variant that takes a const
pointer to X509 and returns a const pointer to ASN1_time.

Part of 17237. I'm not convinced this is an openssl bug or a tor
bug. It might be just one of those things.
2015-10-06 09:04:37 -04:00
..
.dummy Add a .dummy file in the changes directory to stop git from removing it 2015-05-11 11:41:48 -04:00
bug15609 Socks->SOCKS in torrcs. Fixes 15609 2015-09-29 10:20:31 +02:00
bug17151 Add changes file for bug17151 2015-09-29 10:08:02 +02:00
bug17154 Changes file for bug17154 2015-09-29 10:10:52 +02:00
bug17173-socket-hack-rv Add checks and unit tests for get_interface_address* failure 2015-09-29 10:17:05 +02:00
bug17237_027 Work around openssl declaring x509_get_not{Before,After} as functions 2015-10-06 09:04:37 -04:00
bug17251 Fix 17251: avoid integer overflow in test_crypto_slow 2015-10-06 08:58:03 -04:00