| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
|
|
|
| |
(Note: Debian package uses dh addon instead of this patch)
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
(Note: Debian package uses dh addon instead of this patch)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
- Use SSL_OP_NO_COMPRESSION if available due to the "CRIME attack".
[CVE-2012-4929]
- Use SSL_MODE_RELEASE_BUFFERS if available.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
Bug: https://sourceforge.net/p/w3m/patches/66/
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|