search for: suppported

Displaying 20 results from an estimated 101 matches for "suppported".

Did you mean: supported
2014 May 07
1
[Bug 922] New: iprange: --ports is not suppported
https://bugzilla.netfilter.org/show_bug.cgi?id=922 Summary: iprange: --ports is not suppported Product: nftables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: nft AssignedTo: pablo at netfilter.org ReportedBy: anarey at gma...
2015 Jul 23
0
[PULL 0/8] MultiFS suppport for BIOS and EFI
> The MultiFS syntax is basically "(hdX,Y)/path/to/file", where X is disk > number and Y is partition number. > Thank you. As a reminder, please note: _ There was a syntax discussion about "multifs", so additional syntax forms should be allowed too (please read the whole email thread): http://www.syslinux.org/archives/2014-June/022173.html Examples: __ Space
2015 Jul 24
0
[PULL 0/8] MultiFS suppport for BIOS and EFI
On 07/23/2015 02:09 PM, Raphael S Carvalho via Syslinux wrote: >> > My sincere opinion is to apply this patchset as-is, and incrementally > improve multifs. Lack of alternatives (additional features) *should not* be > a reason to block this patchset. Again, I really think that this patchset > should be applied unless a technical reason, e.g. some deficiency > introduced by one
2015 Aug 10
0
[PULL 0/8] MultiFS suppport for BIOS and EFI
Ady, Peter, et al. On Fri, July 24, 2015 5:28 pm, Ady via Syslinux wrote: > >> On 07/23/2015 02:09 PM, Raphael S Carvalho via Syslinux wrote: >> >> >> > My sincere opinion is to apply this patchset as-is, and incrementally >> > improve multifs. Lack of alternatives (additional features) *should >> not* be >> > a reason to block this patchset.
2015 Dec 20
0
[PULL 0/8] MultiFS suppport for BIOS and EFI
... Syslinux MultiFS test: - QEMU/KVM SeaBIOS: PASSED - Bare-metal BIOS: FAILED [1] - OVMF: FAILED [2] - Bare-metal UEFI: not tested [1] stalled: Loading (hd3,2)/vmlinuz-4.3.2-200.fc22.x86_64... [2] "failed: No such file or directory" http://git.zytor.com/users/pcacjr/syslinux.git/tree/core/include/multifs.h?h=multifs-for-upstream#n27 * MULTIFS SYNTAX: * (hd[disk
2016 Jan 05
0
[PULL 0/8] MultiFS suppport for BIOS and EFI
On 09/02/15 10:59, Gene Cumm via Syslinux wrote: > On Fri, Jul 24, 2015 at 3:56 PM, H. Peter Anvin via Syslinux > <syslinux at zytor.com> wrote: >> On 07/23/2015 02:09 PM, Raphael S Carvalho via Syslinux wrote: >>>> >>> My sincere opinion is to apply this patchset as-is, and incrementally >>> improve multifs. Lack of alternatives (additional
2018 Jul 29
2
2.3.2.1 - EC keys suppport?
Hi, facing [ no shared cipher ] error with EC private keys. This happens when the private key is generated with [ openssl ecparam -name brainpoolP512t1 -genkey ] with OpenSSL 1.1.0hh on the same machine Dovecot is running on. Tried some variations of [ ssl_cipher_list ] but to no avail - the [ no shared cipher ] error persists. Once the key is generated with [ openssl genpkey -algorithm RSA ]
2018 Jul 29
0
2.3.2.1 - EC keys suppport?
Am 29.07.2018 um 21:06 schrieb ?????: > facing [ no shared cipher ] error with EC private keys. the client connecting to your instance has to support ecdsa Andreas
2018 Jul 30
0
2.3.2.1 - EC keys suppport?
On 29.07.2018 23:39, ????? wrote: >>> facing [ no shared cipher ] error with EC private keys. >> the client connecting to your instance has to support ecdsa >> >> > It does - Thunderbird 60.0b10 (64-bit) > > [ security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384;true ] > > It seems there is a difference between the private key (rsa vs. ecc -> > SSL_CTX?)
2018 Jul 30
0
2.3.2.1 - EC keys suppport?
> On 29 July 2018 at 23:39 ????? <vtol at gmx.net> wrote: > > > > >> facing [ no shared cipher ] error with EC private keys. > > the client connecting to your instance has to support ecdsa > > > > > > It does - Thunderbird 60.0b10 (64-bit) > > [ security.ssl3.ecdhe_ecdsa_aes_256_gcm_sha384;true ] > > It seems there is a
2018 Jul 30
0
2.3.2.1 - EC keys suppport?
>> >>> I did some local testing and it seems that you are using a curve >>> that is not acceptable for openssl as a server key. >>> I tested with openssl s_server -cert ec-cert.pem -key ec-key.pem >>> -port 5555 >>> using cert generated with brainpool. Everything works if I use >>> prime256v1 or secp521r1. This is a limitation in OpenSSL
2018 Jul 31
0
2.3.2.1 - EC keys suppport?
> Perhaps for whose interested - IETF RFC 7027 specifies for TLS use: > > [ brainpoolP256r1 | brainpoolP384r1 | brainpoolP512r1 ] > > And thus t1 would not work anyway. However, having tested r1 the result > was just the same. > > A tcpdump during the openssl test [ s_server | s_client ] then revealed > (TLSv1.2 Record Layer: Handshake Protocol: Client Hello) : > >
2018 Jul 31
0
2.3.2.1 - EC keys suppport?
> >>> Perhaps for whose interested - IETF RFC 7027 specifies for TLS use: >>> >>> [ brainpoolP256r1 | brainpoolP384r1 | brainpoolP512r1 ] >>> >>> And thus t1 would not work anyway. However, having tested r1 the result >>> was just the same. >>> >>> A tcpdump during the openssl test [ s_server | s_client ] then revealed
2018 Jul 31
0
2.3.2.1 - EC keys suppport?
> Yeah, it needs to be recompiled to fix. > Sure, no worries.? Thanks for the quick turnaround on the patch. Downstream is notified and pending migration into their package. Meanwhile ssl_alt_key/certs does the trick. I am grateful that such option is even provisioned or else I would a be in rather bad spot with the CA. Other apps are rather ignorant on that matter.
2018 Jul 31
2
2.3.2.1 - EC keys suppport?
On 31.07.2018 09:30, ????? wrote: >>>> Perhaps for whose interested - IETF RFC 7027 specifies for TLS use: >>>> >>>> [ brainpoolP256r1 | brainpoolP384r1 | brainpoolP512r1 ] >>>> >>>> And thus t1 would not work anyway. However, having tested r1 the result >>>> was just the same. >>>> >>>> A tcpdump
2018 Jul 30
0
2.3.2.1 - EC keys suppport?
> On 30 July 2018 at 20:01 ????? <vtol at gmx.net> wrote: > > > > >>>> facing [ no shared cipher ] error with EC private keys. > >>> the client connecting to your instance has to support ecdsa > >>> > >>> > >> It does - Thunderbird 60.0b10 (64-bit) > >> > >> [
2015 Dec 20
1
[PULL 0/8] MultiFS suppport for BIOS and EFI
On 20.12.2015 09:55, poma wrote: > ... > > Syslinux MultiFS test: > > - QEMU/KVM SeaBIOS: PASSED > - Bare-metal BIOS: FAILED [1] > - OVMF: FAILED [2] > - Bare-metal UEFI: not tested > > > [1] stalled: > Loading (hd3,2)/vmlinuz-4.3.2-200.fc22.x86_64... > > > [2] "failed: No such file or directory" > >
2015 Sep 02
2
[PULL 0/8] MultiFS suppport for BIOS and EFI
On Fri, Jul 24, 2015 at 3:56 PM, H. Peter Anvin via Syslinux <syslinux at zytor.com> wrote: > On 07/23/2015 02:09 PM, Raphael S Carvalho via Syslinux wrote: >>> >> My sincere opinion is to apply this patchset as-is, and incrementally >> improve multifs. Lack of alternatives (additional features) *should not* be >> a reason to block this patchset. Again, I really
2018 Jul 30
2
2.3.2.1 - EC keys suppport?
>>>> I did some local testing and it seems that you are using a curve >>>> that is not acceptable for openssl as a server key. >>>> I tested with openssl s_server -cert ec-cert.pem -key ec-key.pem >>>> -port 5555 >>>> using cert generated with brainpool. Everything works if I use >>>> prime256v1 or secp521r1. This is a
2015 Jul 23
3
[PULL 0/8] MultiFS suppport for BIOS and EFI
On Wed, Jul 22, 2015 at 11:15 PM, Ady via Syslinux <syslinux at zytor.com> wrote: > > > The MultiFS syntax is basically "(hdX,Y)/path/to/file", where X is disk > > number and Y is partition number. > > > > Thank you. > > As a reminder, please note: > > _ There was a syntax discussion about "multifs", so additional syntax > forms