7d98964815
Whoever wrote this test, was a PROPER hacker: trying to force a TLS implementation not to properly compress some data, they generated a sequence of bytes in a very fancy manner, something like 255 0 0 0 255 0 0 0 123 0 0 0 255 0 0 0 - yeah, it's really a random sequence of bytes, surely, it's impossible to compress! Meh. Pick-to: 5.15 Change-Id: Ia10ae18a40b5b8f006c45147b06fe5be6efcb129 Reviewed-by: Mårten Nordheim <marten.nordheim@qt.io> |
||
---|---|---|
.. | ||
qasn1element | ||
qdtls | ||
qdtlscookie | ||
qocsp | ||
qpassworddigestor | ||
qsslcertificate | ||
qsslcipher | ||
qssldiffiehellmanparameters | ||
qsslellipticcurve | ||
qsslerror | ||
qsslkey | ||
qsslsocket | ||
qsslsocket_onDemandCertificates_member | ||
qsslsocket_onDemandCertificates_static | ||
CMakeLists.txt | ||
ssl.pro |