User: Password:
|
|
Subscribe / Log in / New account

A longstanding GnuTLS certificate validation botch

A longstanding GnuTLS certificate validation botch

Posted Mar 17, 2014 11:36 UTC (Mon) by DavidMoffatt (guest, #80219)
Parent article: A longstanding GnuTLS certificate validation botch

I don't get it! "First, ensuring that check_if_ca() returned zero" makes sense but why " != 1 rather than == 0"? When is a negative number == 0?
Did they do some kind of overload of "=="?

Could be get a repo URL and change # so we could see the diff?


(Log in to post comments)

A longstanding GnuTLS certificate validation botch

Posted Mar 17, 2014 12:23 UTC (Mon) by jwakely (guest, #60262) [Link]


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds