From 8a5b5b47ae9254ac0fc8e881093cca7ec6e026f1 Mon Sep 17 00:00:00 2001 From: steve Date: Mon, 20 Apr 2009 11:33:07 +0000 Subject: Updates from 1.0.0-stable branch. --- CHANGES.SSLeay | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'CHANGES.SSLeay') diff --git a/CHANGES.SSLeay b/CHANGES.SSLeay index dbb80b003..ca5cd7297 100644 --- a/CHANGES.SSLeay +++ b/CHANGES.SSLeay @@ -148,7 +148,7 @@ eric (about to go bushwalking for the 4 day easter break :-) This would tend to cause memory overwrites since SSLv3 has a maximum packet size of 16k. If your program uses buffers <= 16k, you would probably never see this problem. - - Fixed a new errors that were cause by malloc() not returning + - Fixed a few errors that were cause by malloc() not returning 0 initialised memory.. - SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing -- cgit v1.2.1