diff options
author | Richard Levitte <levitte@openssl.org> | 2004-01-23 16:49:39 +0000 |
---|---|---|
committer | Richard Levitte <levitte@openssl.org> | 2004-01-23 16:49:39 +0000 |
commit | 2bff903483e5d330e06cd1c6e9a120c5dcfb7912 (patch) | |
tree | bea00dc09b8185458483a0d6de392db11653dc2b /bugs/SSLv3 | |
parent | c4fd5d764d4cc2bd12c487967a3b06f2ab7020ad (diff) | |
download | openssl-new-2bff903483e5d330e06cd1c6e9a120c5dcfb7912.tar.gz |
This branch hasn't been updated with changes from HEAD for a looooong time...
Here goes.
Diffstat (limited to 'bugs/SSLv3')
-rw-r--r-- | bugs/SSLv3 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/bugs/SSLv3 b/bugs/SSLv3 index db53e1343a..a75a1652d9 100644 --- a/bugs/SSLv3 +++ b/bugs/SSLv3 @@ -29,7 +29,7 @@ RC4-MD5, but a re-connect tries to use DES-CBC-SHA. So netscape, when doing a re-connect, always takes the first cipher in the cipher list. If we accept a netscape connection, demand a client cert, have a -non-self-sighed CA which does not have it's CA in netscape, and the +non-self-signed CA which does not have it's CA in netscape, and the browser has a cert, it will crash/hang. Works for 3.x and 4.xbeta Netscape browsers do not really notice the server sending a |