On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
On Mon, Aug 29, 2011 at 08:32:40PM -0500, Raphael Geissert wrote:
On Monday 29 August 2011 20:19:11 Josh Triplett wrote:
Does OpenSSL not have any facility for a system-wide revocation
list?
No, I already checked that back when
codelite_2.8.0.4537~dfsg-4_amd64.changes uploaded successfully to localhost
along with the files:
codelite_2.8.0.4537~dfsg-4.dsc
codelite_2.8.0.4537~dfsg-4.debian.tar.gz
codelite_2.8.0.4537~dfsg-4_amd64.deb
codelite-plugins_2.8.0.4537~dfsg-4_amd64.deb
Greetings,
Your Debian queue
Accepted:
codelite-plugins_2.8.0.4537~dfsg-4_amd64.deb
to main/c/codelite/codelite-plugins_2.8.0.4537~dfsg-4_amd64.deb
codelite_2.8.0.4537~dfsg-4.debian.tar.gz
to main/c/codelite/codelite_2.8.0.4537~dfsg-4.debian.tar.gz
codelite_2.8.0.4537~dfsg-4.dsc
to
libast_0.7-6_amd64.changes uploaded successfully to localhost
along with the files:
libast_0.7-6.dsc
libast_0.7-6.debian.tar.gz
libast2_0.7-6_amd64.deb
libast2-dev_0.7-6_amd64.deb
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
--
To UNSUBSCRIBE, email
Your message dated Tue, 30 Aug 2011 13:17:23 +
with message-id e1qyobv-fv...@franck.debian.org
and subject line Bug#639560: fixed in libast 0.7-6
has caused the Debian Bug report #639560,
regarding symbol changes
to be marked as done.
This means that you claim that the problem has been
Accepted:
libast2-dev_0.7-6_amd64.deb
to main/liba/libast/libast2-dev_0.7-6_amd64.deb
libast2_0.7-6_amd64.deb
to main/liba/libast/libast2_0.7-6_amd64.deb
libast_0.7-6.debian.tar.gz
to main/liba/libast/libast_0.7-6.debian.tar.gz
libast_0.7-6.dsc
to main/liba/libast/libast_0.7-6.dsc
Hi Simon,
Recently I've started using cwcp program from unixcw package to learn
Morse code. I find it very useful, but I have also noticed that the
program has some problems. Some of them have been addressed by patches
created by Kamal Mostafa
On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
I understand that they'd have to manually load the lists, but perhaps it
would make sense to standardize a location from which they should load
them? Does OpenSSL or GnuTLS
tijmp_0.8+dfsg-5_amd64.changes uploaded successfully to localhost
along with the files:
tijmp_0.8+dfsg-5.dsc
tijmp_0.8+dfsg-5.debian.tar.gz
tijmp_0.8+dfsg-5_amd64.deb
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
--
To UNSUBSCRIBE, email to
Accepted:
tijmp_0.8+dfsg-5.debian.tar.gz
to main/t/tijmp/tijmp_0.8+dfsg-5.debian.tar.gz
tijmp_0.8+dfsg-5.dsc
to main/t/tijmp/tijmp_0.8+dfsg-5.dsc
tijmp_0.8+dfsg-5_amd64.deb
to main/t/tijmp/tijmp_0.8+dfsg-5_amd64.deb
Override entries for your package:
tijmp_0.8+dfsg-5.dsc - source devel
On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
I understand that they'd have to manually load the lists, but perhaps it
would make sense to standardize a
javatar_2.5+dfsg-5_amd64.changes uploaded successfully to localhost
along with the files:
javatar_2.5+dfsg-5.dsc
javatar_2.5+dfsg-5.debian.tar.gz
libjavatar-java_2.5+dfsg-5_all.deb
libjavatar-java-doc_2.5+dfsg-5_all.deb
Greetings,
Your Debian queue daemon (running on host
On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
On lun., 2011-08-29 at 20:24 -0700, Josh Triplett wrote:
I understand that they'd have to manually
On mar., 2011-08-30 at 22:48 +0200, Mike Hommey wrote:
1. Several fraudulent certificates whose fingerprint is unknown signed
with several different intermediate certs that are cross-signed by other
safe CAs (aiui).
I missed that. What is the source for that? (i looked at the mozilla bug
Accepted:
javatar_2.5+dfsg-5.debian.tar.gz
to main/j/javatar/javatar_2.5+dfsg-5.debian.tar.gz
javatar_2.5+dfsg-5.dsc
to main/j/javatar/javatar_2.5+dfsg-5.dsc
libjavatar-java-doc_2.5+dfsg-5_all.deb
to main/j/javatar/libjavatar-java-doc_2.5+dfsg-5_all.deb
libjavatar-java_2.5+dfsg-5_all.deb
We believe that the bug you reported is now fixed; the following
package(s) have been removed from unstable:
perlsgml | 1:19970918-13 | source, all
--- Reason ---
RoQA; orphaned
--
Note that the package(s) have simply
Package: apt-build
Version: 0.12.38
Severity: grave
Tags: sid wheezy patch
Justification: renders package unusable
Trying to install a package with apt-build, for example:
# apt-build install hello
it fails with:
W: Failed to fetch
file:/var/cache/apt-build/repository/dists/apt-build/Release
python-scientific_2.8-3_amd64.changes uploaded successfully to localhost
along with the files:
python-scientific_2.8-3.dsc
python-scientific_2.8-3.diff.gz
python-scientific_2.8-3_all.deb
python-scientific-doc_2.8-3_all.deb
python-mpi_2.8-3_all.deb
python-netcdf_2.8-3_amd64.deb
(new) mpich2python_2.8-3_amd64.deb optional python
MPI-enhanced Python interpreter (MPICH2 based version)
The package provides a python interpreter with MPI (Message Passing Interface,
message-based parallel programming) support.
(new) openmpipython_2.8-3_amd64.deb extra python
MPI-enhanced
Processing commands for cont...@bugs.debian.org:
reassign 637125 ca-certificates-java
Bug #637125 [ca-certificates] Exception in thread main
java.security.ProviderException: Could not initialize NSS
Bug reassigned from package 'ca-certificates' to 'ca-certificates-java'.
forcemerge 635571
ca-certificates_20110502+nmu1_i386.changes uploaded successfully to localhost
along with the files:
ca-certificates_20110502+nmu1.dsc
ca-certificates_20110502+nmu1.tar.gz
ca-certificates_20110502+nmu1_all.deb
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
Your message dated Wed, 31 Aug 2011 02:47:56 +
with message-id e1qyaqk-00045n...@franck.debian.org
and subject line Bug#639744: fixed in ca-certificates 20110502+nmu1
has caused the Debian Bug report #639744,
regarding Compromised certificates for *.google.com issued by DigiNotar Root CA
to be
Accepted:
ca-certificates_20110502+nmu1.dsc
to main/c/ca-certificates/ca-certificates_20110502+nmu1.dsc
ca-certificates_20110502+nmu1.tar.gz
to main/c/ca-certificates/ca-certificates_20110502+nmu1.tar.gz
ca-certificates_20110502+nmu1_all.deb
to
Hi,
You mentioned you were planning to adopt lgeneral after squeeze's release
and squeeze has been out for a couple of months now. I was just curious
about the status of this.
Thanks,
Drew Daniels
http://www.boxheap.net/ddaniels/blog
--
To UNSUBSCRIBE, email to
On Tuesday 30 August 2011 15:48:11 Mike Hommey wrote:
On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
What I can't tell for sure from the documentation is whether OpenSSL
and GnuTLS do check the CRL's validity
On Tue, Aug 30, 2011 at 10:48:11PM +0200, Mike Hommey wrote:
On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
On Tuesday 30 August 2011 01:08:29 Yves-Alexis Perez wrote:
On lun., 2011-08-29 at 20:24 -0700, Josh
On Wed, Aug 31, 2011 at 06:26:26AM +0200, Mike Hommey wrote:
On Tue, Aug 30, 2011 at 10:48:11PM +0200, Mike Hommey wrote:
On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
On Tuesday 30 August 2011 01:08:29
On Tue, Aug 30, 2011 at 10:49:04PM -0500, Raphael Geissert wrote:
On Tuesday 30 August 2011 15:48:11 Mike Hommey wrote:
On Tue, Aug 30, 2011 at 09:58:18PM +0200, Yves-Alexis Perez wrote:
On mar., 2011-08-30 at 12:29 -0500, Raphael Geissert wrote:
What I can't tell for sure from the
28 matches
Mail list logo