diff options
author | Nick Mathewson <nickm@torproject.org> | 2012-05-15 11:13:49 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2012-05-15 11:15:43 -0400 |
commit | e3243ad5f6a2c6acfd671e2cab22c4b6a4c21f47 (patch) | |
tree | 1bed24147eff68e847a67f62ea78a45ba1ae2bdd /changes | |
parent | 5905a0b2dbcff8bd07e179750f53a8f010b4a5e0 (diff) | |
download | tor-e3243ad5f6a2c6acfd671e2cab22c4b6a4c21f47.tar tor-e3243ad5f6a2c6acfd671e2cab22c4b6a4c21f47.tar.gz |
Treat SW_SERVER_HELLO_B as another sign of an SSL handshake
We've been only treating SW_SERVER_HELLO_A as meaning that an SSL
handshake was happening. But that's not right: if the initial
attempt to write a ServerHello fails, we would get a callback in
state SW_SERVER_HELLO_B instead.
(That's "instead" and not "in addition": any failed attempt to write
the hello will fail and cause the info callback not to get written.)
Fix for bug 4592; bugfix on 0.2.0.13-alpha.
Diffstat (limited to 'changes')
-rw-r--r-- | changes/bug4592 | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/changes/bug4592 b/changes/bug4592 new file mode 100644 index 000000000..31140b0ce --- /dev/null +++ b/changes/bug4592 @@ -0,0 +1,3 @@ + o Minor bugfixes: + - Detect SSL handshake even when the initial attempt to write the + server hello fails. Fix for bug 4592; bugfix on 0.2.0.13-alpha. |