diff options
author | Yawning Angel <yawning@schwanenlied.me> | 2015-05-21 17:07:30 +0000 |
---|---|---|
committer | Yawning Angel <yawning@schwanenlied.me> | 2015-05-21 17:07:30 +0000 |
commit | 452cebc4a41bdba41d4a8ce3c16e73d585bb53f4 (patch) | |
tree | 90145e18db15b67bdaf7e47a771c51014ec54ba7 /src/or/config.c | |
parent | 0b7bf3585a378bca4fc5bb551af3c37d517fdf28 (diff) | |
download | tor-452cebc4a41bdba41d4a8ce3c16e73d585bb53f4.tar.gz tor-452cebc4a41bdba41d4a8ce3c16e73d585bb53f4.zip |
Remove support for OpenSSL without ECC.
As OpenSSL >= 1.0.0 is now required, ECDHE is now mandatory. The group
has to be validated at runtime, because of RedHat lawyers (P224 support
is entirely missing in the OpenSSL RPM, but P256 is present and is the
default).
Resolves ticket #16140.
Diffstat (limited to 'src/or/config.c')
-rw-r--r-- | src/or/config.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/src/or/config.c b/src/or/config.c index 1c04578893..e4a2d1c5ae 100644 --- a/src/or/config.c +++ b/src/or/config.c @@ -2806,6 +2806,9 @@ options_validate(or_options_t *old_options, or_options_t *options, COMPLAIN("Unrecognized TLSECGroup: Falling back to the default."); tor_free(options->TLSECGroup); } + if (!evaluate_ecgroup_for_tls(options->TLSECGroup)) { + REJECT("Unsupported TLSECGroup."); + } if (options->ExcludeNodes && options->StrictNodes) { COMPLAIN("You have asked to exclude certain relays from all positions " |