(respline);
return FTPINVPASV;
Thanks very much (and happy new year!),
--
Adam Sampson a...@offog.org http://offog.org/
immediately afterwards, so just removing the check entirely should be
fine.
Cheers,
--
Adam Sampson a...@offog.org http://offog.org/
pgpwKBD_KaQOD.pgp
Description: PGP signature
bit of behaviour.
Thanks,
--
Adam Sampson a...@offog.org http://offog.org/
DEBUG output created by Wget 1.16.3 on linux-gnu.
URI encoding = 'ANSI_X3.4-1968'
converted 'https://bitbucket.org/pypy/pypy/downloads/pypy-2.5.0-src.tar.bz2'
(ANSI_X3.4-1968) -
'https
eeding and failing with the patch applied (it's
exactly the same behaviour as before).
Thanks,
--
Adam Sampson <a...@offog.org> <http://offog.org/>
15:55:59.755307 IP 127.0.0.1.53158 > 127.0.0.1.35611: Flags [S], seq 756350460,
win 43690, options [mss 65495,s
On Tue, Feb 14, 2017 at 04:03:13PM +, Adam Sampson wrote:
> Your patch compiles, but doesn't fix the broken test. tcpdump traces
> attached of the test succeeding and failing with the patch applied (it's
> exactly the same behaviour as before).
If it helps: here's a patch to the te
it times out.
I think the right fix here is to have the test server send a proper
Content-Length header in its 504 response?
Thanks,
--
Adam Sampson <a...@offog.org> <http://offog.org/>
13:52:10.061779 IP 127.0.0.1.50630 > 127.0.0.1.39501: Flags [S], seq
with a body.
That patch works fine for me now -- I've just built it on my slow ARM
machine, and left the test running in a loop for 20 minutes or so, and
it passed every time. :-)
Thanks very much,
--
Adam Sampson <a...@offog.org> <http://offog.org/>
signature.asc
Description: PGP signature