your group -- or they
would have to support it as a one-off patch. I was hoping your group
would accept it, but it appears your efforts are concentrated on 0.9.9-
dev.
Thanks for your time.
/Brian/
--
Brian Long | | |
IT Data Center S
ould
> have to work with that.
Understood. Is there any way to get TLS extension code back-ported to
0.9.7 and 0.9.8? I've just recently joined the list, so I don't
understand the development cycle. Is 0.9.7 only accepting security
fixes? What about 0.9.8?
/Brian/
--
Please excuse the previous HTML email. The following is the patch
included in wpa_supplicant.
---
This patch is adding support for TLS hello extensions and externally
generated pre-shared key material to OpenSSL 0.9.8. This is
based on the patch from
Please excuse the previous HTML email. The following is the patch
included in wpa_supplicant.
---
This patch is adding support for TLS hello extensions and externally
generated pre-shared key material to OpenSSL 0.9.8. This is
based on the patch from A
http://www.w3.org/TR/REC-html40/loose.dtd";>
CVS log for hostap/wpa_supplicant/openssl-tls-extensions.patch
CVS log for
hostap/wpa_supplicant/openssl-tls-extensions.patch
Help
Up to [HostAP] / hostap / wpa_supplicant
Request diff between arbitrary revisions
Default branch: MAIN
Boo
:)
/Brian/
--
Brian Long | | |
IT Data Center Systems | .|||. .|||.
Cisco Linux Developer | ..:|||:...:|||:..
Phone: (919) 392-7363 | C i s c o S
l; instead, I'd like
to know if you folks would accept the patch which would eventually find
its way into RHEL. The patch is located here:
http://hostap.epitest.fi/cgi-bin/viewcvs.cgi/hostap/wpa_supplicant/openssl-tls-extensions.patch
Thank you for your consideration.
/Brian/
--