mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-11 13:43:47 +01:00
266419d244
Right now, all our curve25519 backends ignore the high bit of the public key. But possibly, others could treat the high bit of the public key as encoding out-of-bounds values, or as something to be preserved. This could be used to distinguish clients with different backends, at the cost of killing a circuit. As a workaround, let's just clear the high bit of each public key indiscriminately before we use it. Fix for bug 8121, reported by rransom. Bugfix on 0.2.4.8-alpha. |
||
---|---|---|
.. | ||
bench.c | ||
include.am | ||
Makefile.nmake | ||
ntor_ref.py | ||
test_addr.c | ||
test_cell_formats.c | ||
test_config.c | ||
test_containers.c | ||
test_crypto.c | ||
test_data.c | ||
test_dir.c | ||
test_introduce.c | ||
test_microdesc.c | ||
test_ntor_cl.c | ||
test_pt.c | ||
test_replay.c | ||
test_util.c | ||
test-child.c | ||
test.c | ||
test.h |