ain...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Closes: 805183 823024
Changes:
ntp (1:4.
ain...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Changes:
ntp (1:4.2.8p7+dfsg-2) unstable; ur
ain...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Closes: 315935 691672 778415 793926 804377 8
: medium
Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-
Package: wnpp
Severity: wishlist
* Package name: ntpsec
Version : 0.9.1
* URL : https://www.ntpsec.org
* License : NTP / BSD 3-Clause / BSD 4-Clause
Description : a secure, hardened, and improved ntp daemon
I don't actually have the time to work on this
: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure S
: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure S
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 16 Jan 2016 17:53:34 +0100
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.165-3
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx &l
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 13 Jan 2016 17:50:08 +0100
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.165-2
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx &l
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 11 Jan 2016 21:28:32 +0100
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.165-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx &l
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 26 Dec 2015 20:55:48 +0100
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.164-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx &l
: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure S
Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure S
ain...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Closes: 802638
Changes:
ntp (1:4.2.8p4+dfsg
ain...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Closes: 793745
Changes:
ntp (1:4.2.8p4+dfsg
ain...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Changes:
ntp (1:4.2.8p4+dfsg-1) unstable;
Maintainer: Debian OpenSSL Team <pkg-openssl-de...@lists.alioth.debian.org>
Changed-By: Kurt Roeckx <k...@roeckx.be>
Description:
libcrypto1.0.2-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure S
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 08 Aug 2015 15:12:31 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.163-5
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
On Tue, Jul 21, 2015 at 04:50:42PM +, Thorsten Glaser wrote:
Daniel Pocock daniel at pocock.pro writes:
I looked at the package ssl-cert to try and understand and there I found
that it is using /etc/ssl/certs for server certs while other packages
Do NOT do that.
It's causing
On Thu, Jul 30, 2015 at 04:06:51PM +0200, Simon Richter wrote:
Hi,
On 30.07.2015 05:12, Nikolaus Rath wrote:
I'm looking at the bug overview page for src:python3-llfuse
(https://bugs.debian.org/cgi-bin/pkgreport.cgi?src=python-llfuse). The
first thing it lists is the apparently nasty
...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Changes:
ntp (1:4.2.8p3+dfsg-1) unstable; urgency=medium
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 21 Jul 2015 11:39:55 +
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.163-4
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 21 Jul 2015 13:01:57 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.163-3
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 19 Jul 2015 21:46:44 +0200
Source: lice5
Binary: epic5-script-lice
Architecture: source all
Version: 1:5.2.7-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 20 Jul 2015 14:30:21 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.163-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 20 Jul 2015 15:49:09 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.163-2
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 19 Jul 2015 20:40:12 +0200
Source: epic5
Binary: epic5
Architecture: source amd64
Version: 1.1.11-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
On Thu, Jun 04, 2015 at 06:18:16PM +0200, Wouter Verhelst wrote:
- There is no trust path from your already-installed distribution to the
archive package (yes, I did sign the gpg keys; no, I don't consider
that enough).
There are 2 popular methods for this:
- Have an app store. We would
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
On Wed, Apr 15, 2015 at 01:59:16PM +0100, Ian Jackson wrote:
You can see the `options' file I passed, below. I have not verified
the Secretary's quorum calculation.
devotee did a quorum calculation, but i will need to recalculate
it since there are DDs that don't have a key in the keyring.
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Changes:
ntp (1:4.2.6.p5+dfsg-5) unstable; urgency=high
...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Changes:
ntp (1:4.2.6.p5+dfsg-4) unstable; urgency=medium
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
On Fri, Nov 21, 2014 at 12:42:34PM +, Simon McVittie wrote:
A couple of questions for people who know low-level things:
* Of Debian's architectures (official and otherwise), which ones are
known/defined/designed to be OK with unaligned accesses from
user-space, and which ones (can be
On Mon, Nov 10, 2014 at 06:12:46PM +, Ian Jackson wrote:
Neil McGovern writes (Re: REISSUED CfV: General Resolution: Init system
coupling):
Indeed, unfortunately so. Given the rather rushed nature though, it
would be nice to try and work out a way of avoiding having to do this
manual
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer
On Fri, Oct 17, 2014 at 11:41:15AM +0100, Ian Jackson wrote:
Manuel A. Fernandez Montecelo writes (Re: Determining, ad hoc, whether
someone is a DD):
Not a primary source, but perhaps this is of some use, it is in general
a nice overview and easy to lookup by name or username. In
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
-modules-t...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
python-mysqldb - Python interface to MySQL
python-mysqldb-dbg - Python interface to MySQL (debug extension)
Closes: 718699
Changes:
python-mysqldb (1.2.3-2.1) unstable; urgency=medium
.
* Non-maintainer
On Thu, Aug 28, 2014 at 11:38:49PM +0200, Salvo Tomaselli wrote:
Hello,
I've recently packaged subsurface 4.2 for experimental, because it depends on
libgit2 which is in experimental...
I think you might want to read these posts:
...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libid3tag0 - ID3 tag reading library from the MAD project
libid3tag0-dev - ID3 tag reading library from the MAD project
Closes: 755532
Changes:
libid3tag (0.15.1b-11) unstable; urgency=medium
.
[ Fernando Seiti Furusato ferse
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 02 Aug 2014 16:10:59 +0200
Source: epic4
Binary: epic4
Architecture: source amd64
Version: 1:2.10.5-2
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
On Fri, Aug 01, 2014 at 10:16:12AM +0200, Ondrej Surý wrote:
On Fri, Aug 1, 2014, at 09:54, Michael Tokarev wrote:
01.08.2014 11:37, Ansgar Burchardt wrote:
Hi,
as a first step towards source-only uploads, the archive will now accept
source-only uploads provided the following
On Mon, Jul 14, 2014 at 08:49:26AM +, Thorsten Glaser wrote:
Kibi wrote:
Joachim Breitner nome...@debian.org (2014-07-13):
Am Sonntag, den 13.07.2014, 13:02 +0200 schrieb Cyril Brulebois:
[10]https://www.debian.org/intro/organization
not really helpful. It links to
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer
On Sat, Jul 19, 2014 at 05:41:41AM -0400, Theodore Ts'o wrote:
I take a somewhat different philosophical position, which is that it's
impossible to make something moron-proof, because morons are
incredibly ingenious :-), and there are legitimate times when you
might indeed want more than 256
On Fri, Jul 18, 2014 at 08:54:14AM -0400, Theodore Ts'o wrote:
On Fri, Jul 18, 2014 at 02:03:06PM +0200, Johannes Schauer wrote:
maybe this will help in the future:
http://lists.openwall.net/linux-kernel/2014/07/17/235
Latest version of the patch:
On Mon, Jul 14, 2014 at 02:09:55PM -0300, Henrique de Moraes Holschuh wrote:
On Mon, 14 Jul 2014, Kurt Roeckx wrote:
I plan to try and get them to use symbol versioning, at least on
those platforms that support it. This will probably be just like
Thank you.
the patch currently
On Sun, Jul 13, 2014 at 08:36:30PM +0200, Matthias Urlichs wrote:
Hi,
Mike Hommey:
Well, it kind of is. Because those versioned symbols in openssl come
from a debian patch, afaict. So while debian may be fine (as long as all
build-rdeps have been rebuilt since openssl got those versioned
On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote:
Hi Kurt,
On Sat, Jul 12, 2014 at 01:25:47PM +0200, Kurt Roeckx wrote:
What are you doing with the binaries, include files, man pages,
...? Will they conflict with the ones from openssl?
my intention is to package
On Sat, Jul 12, 2014 at 02:15:13PM +0200, Kurt Roeckx wrote:
On Sat, Jul 12, 2014 at 01:53:45PM +0200, Toni Mueller wrote:
There are a number of reasons for that, but one has been that I was
unhappy about the perceived 'closedness' of the project
I was never very happy with it either
On Mon, Jul 07, 2014 at 01:51:00PM +0200, Johannes Schauer wrote:
Kurt Roeckx k...@roeckx.be
libtool
== libtool_2.4.2-1.7.arch-all.unusedbd ==
gfortran=4:4.8.2-4
gfortran Depends on gfortran-4.8, and that is being used.
openssl (U)
== openssl_1.0.1g-4.arch-all.unusedbd ==
m4=1.4.17-4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 06 Jul 2014 15:21:48 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.159-4
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
On Thu, Jun 26, 2014 at 02:32:27PM +0200, Ondrej Surý wrote:
Hi Charles,
On Thu, Jun 26, 2014, at 14:27, Charles Plessy wrote:
If your disagreement with the FTP team is unresolvable, and if you have
time, maybe you can try to open a ticket for a resolution by the Technical
Comittee ?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 24 Jun 2014 22:14:25 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.159-3
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
On Tue, Jun 17, 2014 at 02:34:27PM +0200, Jakub Wilk wrote:
* Simon McVittie s...@debian.org, 2014-06-17, 13:20:
It should be possible to make a CA certificate that is only considered to
be valid for the spi-inc.org and debian.org subtrees, and then trust the
assertion that SPI control that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 15 Jun 2014 16:15:55 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.159-2
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
On Thu, Jun 12, 2014 at 10:23:58AM +0200, Thorsten Glaser wrote:
On Wed, 11 Jun 2014, Josh Triplett wrote:
device is inferiour to the random devices on OpenBSD/MirBSD, so you
should seed the aRC4 state with additional random bytes:
As far as I know, OpenBSD stopped using (A)RC4 for their
On Tue, Jun 10, 2014 at 06:01:19PM +0200, Jakub Wilk wrote:
* Vincent Danjean vdanjean...@free.fr, 2014-06-10, 16:27:
In healpix-cxx, I'm getting warnings from dh_shlibdeps about missing
OpenMP symbols. See, for example, this excerpt from
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 09 Jun 2014 13:40:30 +0200
Source: epic4
Binary: epic4
Architecture: source amd64
Version: 1:2.10.5-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 09 Jun 2014 14:18:30 +0200
Source: epic5
Binary: epic5
Architecture: source amd64
Version: 1.1.10-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
On Sun, Jun 01, 2014 at 11:39:34AM -0700, Russ Allbery wrote:
How can we make the transition smooth ?
I have a package.install file that contains a line
/usr/lib/perl5/
Build-Depends on perl (= 5.20) would make the transition smooth for users
and the buildds. The only drawback I can
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 26 May 2014 22:03:29 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.159-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 01 May 2014 19:04:06 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.158-2
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
On Mon, Apr 21, 2014 at 02:38:52AM +0100, Steven Chamberlain wrote:
They've ripped out this whole PRNG now to use the one from their own libc:
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/crypto/rand/rand_lib.c.diff?r1=1.14;r2=1.15
And I think just a change like that might work
On Mon, Apr 21, 2014 at 12:34:12AM +0100, Kevin Chadwick wrote:
previously on this list people contributed:
On Sun, Apr 20, 2014 at 07:07:45PM +0100, Steven Chamberlain wrote:
Hi,
But meanwhile, OpenBSD developers are extensively cleaning up OpenSSL
1.0.1g.
One of the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 21 Apr 2014 12:59:25 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.158-1
Distribution: unstable
Urgency: medium
Maintainer: Kurt Roeckx k
On Sun, Apr 20, 2014 at 07:07:45PM +0100, Steven Chamberlain wrote:
Hi,
But meanwhile, OpenBSD developers are extensively cleaning up OpenSSL
1.0.1g.
One of the problems with anything from OpenBSD is that they only
care about OpenBSD, and if you want to use that fork you'll
actually have to
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
On Wed, Mar 05, 2014 at 08:29:37AM +0100, Ondrej Surý wrote:
On Tue, Mar 4, 2014, at 21:33, Gunnar Wolf wrote:
Ondrej Surý dijo [Tue, Mar 04, 2014 at 08:10:47PM +0100]:
On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote:
As keyring maintainers, we no longer consider 1024D keys to be
On Tue, Mar 04, 2014 at 08:10:47PM +0100, Ondrej Surý wrote:
On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote:
As keyring maintainers, we no longer consider 1024D keys to be
trustable. We are not yet mass-removing them, because we don't want to
hamper the project's work, but we definitively
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets
On Tue, Feb 18, 2014 at 03:15:24PM +0100, Ondrej Surý wrote:
Hi,
I don't really want to open another can of worms, but what's the opinion
of non-Linux ports maintainers on default init?
Or maybe I should turn it another way:
If we have working OpenRC on kFreeBSD and GNU Hurd, can I do:
On Tue, Jan 21, 2014 at 08:31:56AM -0500, The Wanderer wrote:
On 01/20/2014 09:34 PM, Paul Wise wrote:
On Tue, Jan 21, 2014 at 1:22 AM, Holger Levsen wrote:
wait, what? Do you have any vendor statements to support this 20%
extra space?
Flash is basically probabilistic storage and
On Sun, Dec 22, 2013 at 08:12:40PM +0100, Andreas Metzler wrote:
Hello,
Debian ist still relying heavily on GnuTLS 2.12.x, and I do not think
this is sustainable for much longer.
State of Play:
-
In July 2011 with version 3.0 [1] GnuTLS switched to Nettle as only
supported
On Thu, Jan 09, 2014 at 07:20:40PM +, Colin Watson wrote:
On Thu, Jan 02, 2014 at 06:14:07PM +, Dimitri John Ledkov wrote:
The correct solution is for libtool package to be marked as
multi-arch: allowed without splitting this tiny package into two
even smaller packages.
This
On Thu, Jan 09, 2014 at 07:20:40PM +, Colin Watson wrote:
Overall, I would therefore prefer option 1 (not the option I expected to
prefer when I started analysing this!), because as far as I can see it
will unblock cross-building for both packages that need /usr/bin/libtool
and those
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
On Tue, Dec 31, 2013 at 08:59:53AM -0600, Matt Zagrabelny wrote:
On Tue, Dec 31, 2013 at 8:54 AM, Clint Adams cl...@debian.org wrote:
On Sun, Dec 29, 2013 at 03:50:06AM +0100, David Weinehall wrote:
Apart from the termination clause, the GPLv2 is far more concise,
I don't see tivoization as
On Sat, Dec 28, 2013 at 04:11:18PM -0500, Stephen M. Webb wrote:
On 12/28/2013 03:53 PM, Clint Adams wrote:
On Sat, Dec 28, 2013 at 09:45:09AM +0100, David Weinehall wrote:
As one of the GPL v2 only proponents, I take affront. I choose to
license what little software I release as GPL v2
On Sat, Dec 28, 2013 at 05:59:35PM -0500, Stephen M. Webb wrote:
On 12/28/2013 04:15 PM, Kurt Roeckx wrote:
On Sat, Dec 28, 2013 at 04:11:18PM -0500, Stephen M. Webb wrote:
On 12/28/2013 03:53 PM, Clint Adams wrote:
On Sat, Dec 28, 2013 at 09:45:09AM +0100, David Weinehall wrote:
As one
On Fri, Dec 27, 2013 at 02:38:50PM +, Thorsten Glaser wrote:
Steve Langasek dixit:
of GPLv3, and explicitly did not. In fact, the system library exception is
now defined even more narrowly than for GPLv2, so that it now covers only
language runtime libraries. I think this was a poor
: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers debian-...@lists.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
openssh-client - secure shell (SSH) client, for secure access to remote
machines
openssh-client-udeb - secure shell client for the Debian installer (udeb
Maintainer: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 17 Nov 2013 22:54:31 +0100
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.157-3
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k
101 - 200 of 758 matches
Mail list logo