![]() |
Re: TLS1.2 and N9 (polishing brass on a sinking ship)
Made sure date is correct, added latest CA certs from Ubuntu, skipped part about postinst, patched the certman_main manually and... Every working TLS 1.2 site loads without single warning on N9!!
|
Re: TLS1.2 and N9 (polishing brass on a sinking ship)
Turns out my c_rehash trick did the job! After changing date to correct one on fresh device and trying my packages WITHOUT c_rehash yet, websites complained. Then I put certs to /usr/local/ssl/certs, changed c_rehash to use my custom Perl, executed c_rehash, sites do not complain. I edited the postinst of my OpenSSL to do this.
Also, I managed to use a bit newer version (1.0.2u instead of 1.0.1t), looks like 1.1 changed too many things and Harmattan packages can't compile. Here is the package with everything (only for brave people willing to test). Read README.txt carefully. http://wunderwungiel.pl/MeeGo/files/...or%20N9.tar.gz |
All times are GMT. The time now is 10:19. |
vBulletin® Version 3.8.8