diff options
author | Matthias Andree <matthias.andree@gmx.de> | 2016-12-12 02:32:55 +0100 |
---|---|---|
committer | Matthias Andree <matthias.andree@gmx.de> | 2016-12-12 02:54:27 +0100 |
commit | 9f4c705e3832bf8d01e0069c2987ba7ae12b3ada (patch) | |
tree | 3c61d4d0abc2fff4535a251bf82682637519dea4 /po/sq.po | |
parent | f49b6dcc977dbb7537bd8b243e569c049f62d230 (diff) | |
download | fetchmail-9f4c705e3832bf8d01e0069c2987ba7ae12b3ada.tar.gz fetchmail-9f4c705e3832bf8d01e0069c2987ba7ae12b3ada.tar.bz2 fetchmail-9f4c705e3832bf8d01e0069c2987ba7ae12b3ada.zip |
Support for Debian/Ubuntu mutilated SSLv3 support.
Ubuntu 16.04 LTS, in a misguided attempt to avoid SSLv3 without breaking
the API, does not declare SSLv3 unsupported through the headers, so
applications can only detect this situation at run-time.
The symptom is that SSL_CTX_new errors out with
SSL_R_NULL_SSL_METHOD_PASSED on the error stack, issue an additional
note telling the user to select a newer version.
Diffstat (limited to 'po/sq.po')
0 files changed, 0 insertions, 0 deletions