Good point, I just tried with boringssl and compilation failed. Thanks for
pointing that out.

On Mon, Nov 30, 2020 at 8:28 PM Илья Шипицин <[email protected]> wrote:

> will it run on LibreSSL, BoringSSL ?
>
> вт, 1 дек. 2020 г. в 00:26, PR Bot <[email protected]>:
>
>> Dear list!
>>
>> Author: Marcoen Hirschberg <[email protected]>
>> Number of patches: 3
>>
>> This is an automated relay of the Github pull request:
>>    Skip unsupported ciphers for ecdsa cert
>>
>> Patch title(s):
>>    MINOR: ssl: variable renames for clarity
>>    MINOR: ssl: skip unknown client cipher
>>    BUG/MINOR: ssl: only choose ECDSA cert if server and client have
>> common ECDSA ciphers
>>
>> Link:
>>    https://github.com/haproxy/haproxy/pull/983
>>
>> Edit locally:
>>    wget https://github.com/haproxy/haproxy/pull/983.patch && vi 983.patch
>>
>> Apply locally:
>>    curl https://github.com/haproxy/haproxy/pull/983.patch | git am -
>>
>> Description:
>>
>>
>> Instructions:
>>    This github pull request will be closed automatically; patch should be
>>    reviewed on the haproxy mailing list ([email protected]). Everyone
>> is
>>    invited to comment, even the patch's author. Please keep the author and
>>    list CCed in replies. Please note that in absence of any response this
>>    pull request will be lost.
>>
>>

Reply via email to