diff options
author | steve <steve> | 2009-04-20 11:33:07 +0000 |
---|---|---|
committer | steve <steve> | 2009-04-20 11:33:07 +0000 |
commit | 8a5b5b47ae9254ac0fc8e881093cca7ec6e026f1 (patch) | |
tree | 058bbd41b2d52242e9c827d4e374c21933bf53f1 /CHANGES.SSLeay | |
parent | 7e413b974dcb89c688389cdbed54103611bfda04 (diff) | |
download | openssl-8a5b5b47ae9254ac0fc8e881093cca7ec6e026f1.tar.gz |
Updates from 1.0.0-stable branch.
Diffstat (limited to 'CHANGES.SSLeay')
-rw-r--r-- | CHANGES.SSLeay | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/CHANGES.SSLeay b/CHANGES.SSLeay index dbb80b003..ca5cd7297 100644 --- a/CHANGES.SSLeay +++ b/CHANGES.SSLeay @@ -148,7 +148,7 @@ eric (about to go bushwalking for the 4 day easter break :-) This would tend to cause memory overwrites since SSLv3 has a maximum packet size of 16k. If your program uses buffers <= 16k, you would probably never see this problem. - - Fixed a new errors that were cause by malloc() not returning + - Fixed a few errors that were cause by malloc() not returning 0 initialised memory.. - SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing |