Justin Coffman writes:
> I tried my hand at generating a patch, but the patched version didn't
> exhibit behavior any different than current. I guess my GnuTLS-fu is not
> strong enough.
> The gotcha (I think) is in the way GnuTLS shims the SSLv23_client_method
> in its OpenSSL compatibility lay
>> Justin Coffman writes:
>>
>> Package: tf5
>> Version: 5.0beta8-5+b1
>> Severity: important
>>
>> TinyFugue, when compiled from upstream source against OpenSSL, is
>> capable of the full set of expected ciphersuites (up to and including
>> TLSv1.2), such as those utilizing AES-GCM and EC Diffi
Control: tags -1 help
Justin Coffman writes:
> Package: tf5
> Version: 5.0beta8-5+b1
> Severity: important
> TinyFugue, when compiled from upstream source against OpenSSL, is
> capable of the full set of expected ciphersuites (up to and including
> TLSv1.2), such as those utilizing AES-GCM and
Package: tf5
Version: 5.0beta8-5+b1
Severity: important
TinyFugue, when compiled from upstream source against OpenSSL, is capable of
the full set of expected
ciphersuites (up to and including TLSv1.2), such as those utilizing AES-GCM and
EC Diffie-Hellman. The
version packaged in Debian, compi
4 matches
Mail list logo