On Friday 05 December 2014 18:12:59 Jérémie Courrèges-Anglas wrote:
Hi,
Tim Rühsen tim.rueh...@gmx.de writes:
Am Mittwoch, 3. Dezember 2014, 12:36:33 schrieb Jérémie Courrèges-Anglas:
Hi,
Giuseppe Scrivano gscriv...@gnu.org writes:
[...]
we should also hide --rand-egd from
Tim Ruehsen tim.rueh...@gmx.de writes:
[...]
I pushed your patch together with some little changes around it (different
commits).
Cool, thanks.
--
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE
signature.asc
Description: PGP signature
Hi,
Tim Rühsen tim.rueh...@gmx.de writes:
Am Mittwoch, 3. Dezember 2014, 12:36:33 schrieb Jérémie Courrèges-Anglas:
Hi,
Giuseppe Scrivano gscriv...@gnu.org writes:
[...]
we should also hide --rand-egd from wget --help and do not accept this
option when HAVE_RAND_EGD is not set.
On Wednesday 03 December 2014 20:19:48 Tim Rühsen wrote:
Am Mittwoch, 3. Dezember 2014, 12:36:33 schrieb Jérémie Courrèges-Anglas:
Hi,
Giuseppe Scrivano gscriv...@gnu.org writes:
[...]
we should also hide --rand-egd from wget --help and do not accept this
option when
Hi,
Giuseppe Scrivano gscriv...@gnu.org writes:
[...]
we should also hide --rand-egd from wget --help and do not accept this
option when HAVE_RAND_EGD is not set.
I thought about that and took the lazy approach: the option is still
available even if gnutls is used, even though it's a nop.
Am Mittwoch, 3. Dezember 2014, 12:36:33 schrieb Jérémie Courrèges-Anglas:
Hi,
Giuseppe Scrivano gscriv...@gnu.org writes:
[...]
we should also hide --rand-egd from wget --help and do not accept this
option when HAVE_RAND_EGD is not set.
I thought about that and took the lazy
The problem is that wget --security-protocol=auto and
wget --security-protocol=pfs are restricted to the use of TLSv1.0 only.
Sites that enforce the use of eg TLSv1.2 are unreachable by default.
The issue was reported by Mikolaj Kucharski, and I have already a fix in
the OpenBSD ports tree:
On Tuesday 02 December 2014 14:09:00 Jérémie Courrèges-Anglas wrote:
The problem is that wget --security-protocol=auto and
wget --security-protocol=pfs are restricted to the use of TLSv1.0 only.
Sites that enforce the use of eg TLSv1.2 are unreachable by default.
The issue was reported by
I'll push it in a while after adding the ChangeLog entry.
Though I noticed a Patch 1/2 in the git mail header. Is there any other
patch that we should know about?
Thanking You,
Darshit Shah
Sent from mobile device. Please excuse my brevity
On 02-Dec-2014 9:36 pm, Tim Ruehsen tim.rueh...@gmx.de
j...@wxcvbn.org (Jérémie Courrèges-Anglas) writes:
From 4142db8a2ba462cd2d764c09d0e4996e23ca13c2 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?J=C3=A9r=C3=A9mie=20Courr=C3=A8ges-Anglas?= j...@wxcvbn.org
Date: Mon, 1 Dec 2014 13:43:22 +0100
Subject: [PATCH 2/2] openssl backend: detect the
10 matches
Mail list logo