aboutsummaryrefslogtreecommitdiff
path: root/src/common
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2012-09-04 12:41:37 -0400
committerNick Mathewson <nickm@torproject.org>2012-09-06 11:31:30 -0400
commit7607ad2becc9634f01ca6dd99a0475ecf276ac93 (patch)
treeeabd095db793904dcf0f018e477c57d45b8bf487 /src/common
parente3a130a7eb6e56a150c1902641efa5a7e0f62ad4 (diff)
downloadtor-7607ad2becc9634f01ca6dd99a0475ecf276ac93.tar
tor-7607ad2becc9634f01ca6dd99a0475ecf276ac93.tar.gz
Detect openssl header version doesn't match runtime version
We already do this for libevent; let's do it for openssl too. For now, I'm making it always a warn, since this has caused some problems in the past. Later, we can see about making it less severe.
Diffstat (limited to 'src/common')
-rw-r--r--src/common/crypto.c13
1 files changed, 13 insertions, 0 deletions
diff --git a/src/common/crypto.c b/src/common/crypto.c
index 77f94ba80..7768cc37b 100644
--- a/src/common/crypto.c
+++ b/src/common/crypto.c
@@ -255,6 +255,19 @@ crypto_global_init(int useAccel, const char *accelName, const char *accelDir)
OpenSSL_add_all_algorithms();
_crypto_global_initialized = 1;
setup_openssl_threading();
+
+ if (SSLeay() == OPENSSL_VERSION_NUMBER &&
+ !strcmp(SSLeay_version(SSLEAY_VERSION), OPENSSL_VERSION_TEXT)) {
+ log_info(LD_CRYPTO, "OpenSSL version matches version from headers "
+ "(%lx: %s).", SSLeay(), SSLeay_version(SSLEAY_VERSION));
+ } else {
+ log_warn(LD_CRYPTO, "OpenSSL version from headers does not match the "
+ "version we're running with. If you get weird crashes, that "
+ "might be why. (Compiled with %lx: %s; running with %lx: %s).",
+ (unsigned long)OPENSSL_VERSION_NUMBER, OPENSSL_VERSION_TEXT,
+ SSLeay(), SSLeay_version(SSLEAY_VERSION));
+ }
+
if (useAccel > 0) {
#ifdef DISABLE_ENGINES
(void)accelName;