diff options
author | 2014-04-18 15:03:20 +0000 | |
---|---|---|
committer | 2014-04-18 15:03:20 +0000 | |
commit | a25f52752d2d86a204d2b0f6d4346d6ee88bd76c (patch) | |
tree | 253a330af54a3d13fa63d80e568229e58d5378c1 /lib/libm/arch/powerpc/fenv.c | |
parent | reaching into altq unconditionally (and w/o ifdef ALTQ) is bad, mmkay? (diff) | |
download | wireguard-openbsd-a25f52752d2d86a204d2b0f6d4346d6ee88bd76c.tar.xz wireguard-openbsd-a25f52752d2d86a204d2b0f6d4346d6ee88bd76c.zip |
Some dude named Tavis Ormandy reported a bug which has gone unfixed.
http://marc.info/?l=openssl-users&m=138014120223264&w=2
Arguably a doc bug, but we argue not. If you parse a new cert into memory
occupied by a previously verified cert, the new cert will inherit that
state, bypassing future verification checks. To avoid this, we will always
start fresh with a new object.
grudging ok from guenther, after i threatened to make him read the code yet
again. "that ok was way more painful and tiring then it should have been"
Diffstat (limited to 'lib/libm/arch/powerpc/fenv.c')
0 files changed, 0 insertions, 0 deletions