diff options
author | Simon Josefsson <simon@josefsson.org> | 2005-11-01 21:14:22 +0000 |
---|---|---|
committer | Simon Josefsson <simon@josefsson.org> | 2005-11-01 21:14:22 +0000 |
commit | a0c918dfb106496f93166af8282c3e87bfab9395 (patch) | |
tree | 5cac92d016b808fd635571519ac2ff4c2ce63948 | |
parent | c911908549d635467001227d3ba25e40cb9169f5 (diff) | |
download | gnutls-a0c918dfb106496f93166af8282c3e87bfab9395.tar.gz |
Fix.
-rw-r--r-- | NEWS | 7 |
1 files changed, 4 insertions, 3 deletions
@@ -12,9 +12,10 @@ See the end for copying conditions. applications that must remain interoperable, you can use the GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2 or GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD5 flags when verifying certificates. Naturally, this is not - recommended default behaviour for applications. To use this, call - gnutls_certificate_set_verify_flags with these flags to change the - verification mode used by gnutls_certificate_verify_peers2. + recommended default behaviour for applications. To enable the + broken algorithms, call gnutls_certificate_set_verify_flags with the + proper flag, to change the verification mode used by + gnutls_certificate_verify_peers2. - Make it possible to send empty data through gnutls_record_send, to align with the send(2) API. - Some changes in the certificate receiving part of handshake to prevent |