2017-06-05 16:25:36 by Ryo ONODERA | Files touched by this commit (2298) |
Log message:
Recursive revbump from lang/perl5 5.26.0
|
2017-04-19 15:46:18 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.048.
2.048 2017/04/16
- fixed small memory leaks during destruction of socket and context, RT#120643
|
2017-02-19 09:49:46 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.047.
2.047 2017/02/16
- better fix for problem which 2.046 tried to fix but broke LWP this way
2.046 2017/02/15
- cleanup everything in DESTROY and make sure to start with a fresh %{*self}
in configure_SSL because it can happen that a GLOB gets used again without
calling DESTROY (https://github.com/noxxi/p5-io-socket-ssl/issues/56)
|
2017-02-16 16:07:03 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.045.
2.045 2017/02/13
- fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
objects -> github pull#55
- optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD
if perl is compiled w/o thread support
- small fix in t/protocol_version.t to use older versions of Net::SSLeay
with openssl build w/o SSLv3 support
- when setting SSL_keepSocketOnError to true the socket will not be closed
on fatal error. This is a modified version of
https://github.com/noxxi/p5-io-socket-ssl/pull/53/
|
2017-02-07 13:02:04 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.044.
2.044 2017/01/26
- protect various 'eval'-based capability detections at startup with a localized
__DIE__ handler. This way dynamically requiring IO::Socket::SSL as done by
various third party software should cause less problems even if there is a
global __DIE__ handler which does not properly deal with 'eval'.
|
2017-01-16 10:28:46 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.043.
2.043 2017/01/06
- make t/session_ticket.t work with OpenSSL 1.1.0. With this version the
session does not get reused any longer if it was not properly closed which
is now done using an explicit close by the client which causes a
proper SSL_shutdown
2.042 2017/01/05
- enable session ticket callback with Net::SSLeay>=1.80
|
2017-01-04 15:44:23 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.041.
2.041 2017/01/04
- leave session ticket callback off for now until the needed patch is
included in Net::SSLeay. See
https://rt.cpan.org/Ticket/Display.html?id=116118#txn-1696146
|
2016-12-19 10:32:48 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.040.
2.040 2016/12/17
- fix detection of default CA path for OpenSSL 1.1.x
- Utils::CERT_asHash now includes the signature algorithm used
- Utils::CERT_asHash can now deal with large serial numbers
|
2016-11-28 14:00:16 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.039.
2.039 2016/11/20
- OpenSSL 1.1.0c changed the behavior of SSL_read so that it now returns -1 on
EOF without proper SSL shutdown. Since it looks like that this behavior will
be kept at least for 1.1.1+ adapt to the changed API by treating errno=NOERR
on SSL_ERROR_SYSCALL as EOF.
|
2016-09-19 00:03:10 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.038.
2.038 2016/09/17
- restrict session ticket callback to Net::SSLeay 1.79+ since version before
contains bug. Add test for session reuse
- extend SSL fingerprint to pubkey digest, i.e. 'sha1$pub$xxxxxx....'
- fix t/external/ocsp.t to use different server (under my control) to check
OCSP stapling
|