1. 30 6月, 2016 4 次提交
  2. 29 6月, 2016 1 次提交
  3. 27 6月, 2016 2 次提交
  4. 26 6月, 2016 1 次提交
  5. 25 6月, 2016 2 次提交
  6. 23 6月, 2016 1 次提交
  7. 22 6月, 2016 1 次提交
  8. 21 6月, 2016 2 次提交
  9. 16 6月, 2016 3 次提交
  10. 14 6月, 2016 2 次提交
  11. 13 6月, 2016 1 次提交
  12. 12 6月, 2016 1 次提交
  13. 11 6月, 2016 1 次提交
  14. 08 6月, 2016 5 次提交
  15. 07 6月, 2016 1 次提交
    • J
      Do not suggest nonsensical OpenSSL verify modes [ci skip] · 5e3fb2f7
      Jonne Haß 提交于
      SSL_set_verify(3) explains:
      
      SSL_VERIFY_FAIL_IF_NO_PEER_CERT
        Server mode: if the client did not return a certificate, the TLS/SSL
      handshake is immediately terminated with a "handshake failure" alert.
      This flag must
        be used together with SSL_VERIFY_PEER.
      
        Client mode: ignored
      
      SSL_VERIFY_CLIENT_ONCE
        Server mode: only request a client certificate on the initial TLS/SSL
      handshake. Do not ask for a client certificate again in case of a
      renegotiation.
        This flag must be used together with SSL_VERIFY_PEER.
      
        Client mode: ignored
      
      The SMTP connection here uses a OpenSSL socket in client mode,
      suggesting invalid/ignored flags is rather misleading.
      5e3fb2f7
  16. 06 6月, 2016 1 次提交
  17. 04 6月, 2016 3 次提交
  18. 03 6月, 2016 1 次提交
  19. 02 6月, 2016 2 次提交
  20. 31 5月, 2016 1 次提交
  21. 29 5月, 2016 3 次提交
  22. 28 5月, 2016 1 次提交