aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Remove OpenSSL migration warnings.Matthias Andree2021-12-122-11/+0
|
* Announce 6.4.25.Matthias Andree2021-12-101-21/+12
|
* Release fetchmail 6.4.25.Matthias Andree2021-12-103-272/+272
|
* Realign comments and variable names.Matthias Andree2021-12-052-5/+5
|
* Minor documentation tweaks around wolfSSL/LibreSSLMatthias Andree2021-12-053-4/+5
|
* Permit LibreSSL on OpenBSD.Matthias Andree2021-12-056-17/+30
| | | | | | | | On OpenBSD, libressl is "normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs" according to Stuart Henderson, so according to the GNU GPL v2 clause 3, we can permit LibreSSL for OpenBSD.
* README*: updateMatthias Andree2021-12-053-3/+53
|
* NEWS: wolfSSL: mention some diagnostics still read OpenSSL.Matthias Andree2021-12-031-0/+5
|
* website: Announce 6.4.25.rc4.Matthias Andree2021-12-031-6/+6
|
* Get ready for 6.4.25.rc4.Matthias Andree2021-12-033-223/+223
|
* Require C99 compiler for wolfSSLMatthias Andree2021-12-032-7/+8
|
* Makefile.am:import-translations: List PO updates.Matthias Andree2021-12-031-0/+1
|
* Fix wolfSSL compilation on 32-bit machines (i386).Matthias Andree2021-12-012-0/+4
| | | | Reported by Corey Halpin.
* wolfSSL support reporting detailsMatthias Andree2021-11-291-1/+5
| | | | | | when using wolfSSL: - avoid OpenSSL acknowledgment - use +WOLFSSL as version tag instead of +SSL-SSLv2
* configure.ac: Cosmetics.Matthias Andree2021-11-281-106/+105
|
* Get ready for 6.4.25.rc3.Matthias Andree2021-11-285-447/+208
|
* socket.c: SSL_peek/SSL_read consistency fixes.Matthias Andree2021-11-281-19/+16
|
* Further SSL configure tweaks.Matthias Andree2021-11-282-10/+21
|
* socket.c: SSL_CTX_set_mode(SSL_MODE_AUTO_RETRY)Matthias Andree2021-11-281-1/+3
| | | | | | | | This is the proper fix for wolfSSL 5.0 and OpenSSL before 1.1.1 to avoid the "SSL_peek()" not truly blocking issue. Only OpenSSL 1.1.1 enables this mode by default, so make this explicit.
* Revert "wolfSSL: workaround 5.0.0 SSL_peek() not truly blocking."Matthias Andree2021-11-281-2/+1
| | | | This reverts commit 0d32056e7b14bd029aa375f59230a3ad3e2bae51.
* NEWS: Credit cs translator.Matthias Andree2021-11-281-0/+1
|
* Update <cs> Czech translation to fetchmail 6.4.25.rc1Petr Pisar2021-11-281-415/+667
|
* website: Announce 6.4.25.rc2Matthias Andree2021-11-271-3/+8
|
* Get ready for 6.4.25.rc2.Matthias Andree2021-11-2710-2719/+1053
|
* NEWS: Mention contrib/systemd additionMatthias Andree2021-11-271-0/+5
|
* Document paths.Matthias Andree2021-11-271-0/+2
|
* contrib/systemd backgroundMatthias Andree2021-11-271-0/+3
|
* Add systemd example and instructions.Barak A. Pearlmutter2021-11-272-0/+34
|
* NEWS: Credit fr, eo translators.Matthias Andree2021-11-271-1/+4
|
* Update <eo> Esperanto translation to fetchmail 6.4.25.rc1Keith Bowes2021-11-271-409/+649
|
* Update <fr> French translation to fetchmail-6.4.25.rc1Frédéric Marchal2021-11-231-468/+824
|
* NEWS: Credit sv, sq, ja, pl translators.Matthias Andree2021-11-221-0/+6
|
* Update <sq> Albanian translation to fetchmail-6.4.25.rc1Besnik Bleta2021-11-221-569/+872
|
* Update <pl> Polish translation to fetchmail 6.4.25.rc1Jakub Bogusz2021-11-221-443/+741
|
* Update <ja> Japanese translation to fetchmail 6.4.25.rc1Takeshi Hamasaki2021-11-221-446/+754
|
* configure.ac: pkg-config related fixupsMatthias Andree2021-11-211-8/+9
|
* Update <sv> Swedish translation to fetchmail 6.4.25.rc1Göran Uddeborg2021-11-211-417/+670
|
* po/: record what went into tarballMatthias Andree2021-11-211-2/+4
|
* website: announce 6.4.25.Matthias Andree2021-11-211-2/+4
|
* Bump version to 6.4.25.rc1Matthias Andree2021-11-213-3/+3
|
* Update SSL configure instructions and license info.Matthias Andree2021-11-214-16/+53
|
* configure.ac: Improve pkg-config OpenSSL config.Matthias Andree2021-11-211-8/+30
|
* po/de.po: Update German translation.Matthias Andree2021-11-211-273/+288
|
* wolfSSL: support WOLFSSL_TRUST_FILE as default trust storeMatthias Andree2021-11-213-5/+52
| | | | | ...because wolfSSL 5.0.0 does not support a default trust store, unlike OpenSSL.
* getstats.py: count .am/.ac files.Matthias Andree2021-11-212-1/+2
|
* wolfSSL: workaround 5.0.0 SSL_peek() not truly blocking.Matthias Andree2021-11-211-1/+2
| | | | | | | | SSL_peek() may return 0 on blocking I/O with SSL_get_error() returning SSL_ERROR_WANT_READ. This should not occur on blocking I/O, and does not occur with OpenSSL 1.0.2, 1.1.1, 3.0. This caused a socket error right after SSL negotiation.
* wolfSSL: support 5.0.0+.Matthias Andree2021-11-2111-42/+174
|
* configure.ac: fix rpath, and duplicate library settingMatthias Andree2021-11-202-6/+6
|
* Fix X509_V_FLAG_TRUSTED_FIRST OpenSSL 1.0.2 workaroundMatthias Andree2021-11-202-5/+10
| | | | | | | | The original comparison contained a typo, 0x1000200fL == (ver & 0xfffff000L) and could never match. Fix, and also match at compile time to not even reference this flag on other OpenSSL versions.
* OpenSSL: bump minimum required version to 1.0.2fMatthias Andree2021-11-204-6/+10
| | | | | ...in order to safely remove the obsolete OpenSSL flag SSL_OP_SINGLE_DH_USE.