On 12/04/2016 03:19 PM, Bill Somerville wrote: > Hi Claude, > > thanks for testing that, clearly I need to do something smarter for > these certificate errors. I have committed another change r7361 which > should be better, if I have got it right. Can you try a build and test > of that please?
Hi Bill, I have tried it. First try: When pressing "refresh", the program crashes. Second try: The program crashes at the start. 3nd try: I'm running under gdb. Here is the interesting part of the output: Thread 1 "wsjtx" received signal SIGSEGV, Segmentation fault. 0xb7569073 in QWidget::setParent (this=<optimized out>, this@entry=0xbfffb9d8, parent=<optimized out>, parent@entry=0xb6c89b30 <_GLOBAL_OFFSET_TABLE_>, f=...) at kernel/qwidget.cpp:10452 10452 if (testAttribute(Qt::WA_NativeWindow) && !qApp->testAttribute(Qt::AA_DontCreateNativeWidgetSiblings)) Please allow me to ask why I can get the document using "curl", without any problems. Further, see here the output of: openssl s_client -connect netcologne.dl.sourceforge.net:443 -servername netcologne.dl.sourceforge.net CONNECTED(00000003) depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3 verify return:1 depth=0 CN = netcologne.dl.sourceforge.net verify return:1 --- Certificate chain 0 s:/CN=netcologne.dl.sourceforge.net i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3 1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3 i:/O=Digital Signature Trust Co./CN=DST Root CA X3 --- Server certificate -----BEGIN CERTIFICATE----- MIIFHjCCBAagAwIBAgISAzBKXWT+UnMelpy80czU217fMA0GCSqGSIb3DQEBCwUA MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0xNjExMDYxOTI3MDBaFw0x NzAyMDQxOTI3MDBaMCgxJjAkBgNVBAMTHW5ldGNvbG9nbmUuZGwuc291cmNlZm9y Z2UubmV0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3UKe17uu0JYY NTholg08EHuumG0cciPaWBOTMf/QOIfFXSJ1HpAE4Fv8VPQsPlTLUc6aQY7szbS+ EPGRzZeYMUh5EICJlOD4iQON7yDzIU5hELP067AH7hBoklOjSAh4h9gxREAWbQno VmEGvlobvHmZDWv0D5NOIvEyLKP+Uvg8iElst40tOa1/aYCz9vAti3b5O+DOkUwD gUpCkb7oct6KG4laTv4fGDopLkqUoaHgSGdIWmUAEgwr7W0iruZm3ahFxMOrgQkN /XOaoXZLF3fHvyrn4MGEBtap+09Z2ClIIhDNph9llJKo0SYctoYJvXup92Bd2HHX mKDwnkYPQQIDAQABo4ICHjCCAhowDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQG CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTLgyXZ yE1M7HE8ChCVjc4mErJy/TAfBgNVHSMEGDAWgBSoSmpjBH3duubRObemRWXv86js oTBwBggrBgEFBQcBAQRkMGIwLwYIKwYBBQUHMAGGI2h0dHA6Ly9vY3NwLmludC14 My5sZXRzZW5jcnlwdC5vcmcvMC8GCCsGAQUFBzAChiNodHRwOi8vY2VydC5pbnQt eDMubGV0c2VuY3J5cHQub3JnLzAoBgNVHREEITAfgh1uZXRjb2xvZ25lLmRsLnNv dXJjZWZvcmdlLm5ldDCB/gYDVR0gBIH2MIHzMAgGBmeBDAECATCB5gYLKwYBBAGC 3xMBAQEwgdYwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5cHQub3Jn MIGrBggrBgEFBQcCAjCBngyBm1RoaXMgQ2VydGlmaWNhdGUgbWF5IG9ubHkgYmUg cmVsaWVkIHVwb24gYnkgUmVseWluZyBQYXJ0aWVzIGFuZCBvbmx5IGluIGFjY29y ZGFuY2Ugd2l0aCB0aGUgQ2VydGlmaWNhdGUgUG9saWN5IGZvdW5kIGF0IGh0dHBz Oi8vbGV0c2VuY3J5cHQub3JnL3JlcG9zaXRvcnkvMA0GCSqGSIb3DQEBCwUAA4IB AQBUMzmpouopN1JKk82B4k2/WvgpHjHREvUOBY2dha627mzLSjxL8UKwjbCNi5re 69iSPZHMkkfW27mqBnugvuP89yq4J/VLthuRYuI4ThO212Z6GwUgbJcFBmHJ2khM DFPT4tfFspCyW4i78quA08KrsFhkjpeX9zZk+mJoQSSLNZiZprNoS1Xb+N0NqV2i kSI327xibacb5fNFETGPK7XLGTo4OSYtWri5p19nCm777UyCYPNjf9y2V6NoxHMj fUD9AAAw4rvGoYWzazGkcnhGanZtCMzZQ6AdV6bLXtxHFpFHDmOZstcqKC5aw7lZ S+tamJ4qEJR7nMttsHAWwbWF -----END CERTIFICATE----- subject=/CN=netcologne.dl.sourceforge.net issuer=/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3 --- No client certificate CA names sent Peer signing digest: SHA512 Server Temp Key: ECDH, P-256, 256 bits --- SSL handshake has read 3198 bytes and written 365 bytes --- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-GCM-SHA256 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES128-GCM-SHA256 Session-ID: C358E06C532A5F9860F463F3F5D0B1F441F6BC950D79DB1215EC4731A434D335 Session-ID-ctx: Master-Key: A8AABA31233BC1131695AD743ADBAB77AF8DB1549BBAD896064F5DB386D3157CB42DC87BF805409AEA07DA2560308385 Key-Arg : None Krb5 Principal: None PSK identity: None PSK identity hint: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - f7 b2 9b b5 48 68 44 19-fd 8d 1b dc 85 69 5a c1 ....HhD......iZ. 0010 - ee 1f 4a 5d e4 ac 68 25-8e 0a 88 5a 13 95 53 51 ..J]..h%...Z..SQ 0020 - 77 cd 46 de cb a7 ae 7e-51 4b b7 20 65 86 f1 51 w.F....~QK. e..Q 0030 - ec 7c 0c 57 18 ed b2 51-5d 3a 8b 1a 5d 82 60 af .|.W...Q]:..].`. 0040 - 56 4b a3 24 7d 0f d6 b0-32 9a ff fc b6 2a e7 35 VK.$}...2....*.5 0050 - 99 1e b4 1e 2e ec dc eb-b4 66 eb 9e f4 7d e3 cc .........f...}.. 0060 - e5 59 01 b1 ed 01 9b d3-f7 4f 79 d6 39 8e 7b de .Y.......Oy.9.{. 0070 - 6d 86 fc a0 5b 44 f4 6c-a4 72 ef 61 24 c3 12 90 m...[D.l.r.a$... 0080 - 40 e2 39 2d d3 fc 75 b6-11 fc 19 01 ae 24 b2 0f @.9-..u......$.. 0090 - 04 1b bf 80 94 a6 b1 2a-a5 db 0a b2 e6 8b c6 7a .......*.......z 00a0 - 1f 11 ce 6b ba 16 fd 67-c4 28 ba 22 68 5a 05 cf ...k...g.(."hZ.. 00b0 - 35 5d 81 cc c3 46 8e 5a-0f dc 7b 23 06 2f 42 42 5]...F.Z..{#./BB 00c0 - 66 92 46 8d 52 d8 6e a4-de 66 d0 0d 4c 5f b2 33 f.F.R.n..f..L_.3 Start Time: 1480868553 Timeout : 300 (sec) Verify return code: 0 (ok) --- GET / <html> <head><title>302 Found</title></head> <body bgcolor="white"> <center><h1>302 Found</h1></center> <hr><center>nginx/1.11.6</center> </body> </html> closed Are "curl" and "openssl s_client" using different modules as wsjtx or are the options different when calling the openssl modules ? Best 88 de Claude (DJ0OT) ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, SlashDot.org! http://sdm.link/slashdot _______________________________________________ wsjt-devel mailing list wsjt-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/wsjt-devel