Next | Query returned 146 messages, browsing 31 to 40 | Previous

History of commit frequency

CVS Commit History:


   2017-06-05 16:25:36 by Ryo ONODERA | Files touched by this commit (2298)
Log message:
Recursive revbump from lang/perl5 5.26.0
   2017-04-19 15:46:18 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.048.

2.048 2017/04/16
- fixed small memory leaks during destruction of socket and context, RT#120643
   2017-02-19 09:49:46 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.047.

2.047 2017/02/16
- better fix for problem which 2.046 tried to fix but broke LWP this way
2.046 2017/02/15
- cleanup everything in DESTROY and make sure to start with a fresh %{*self}
  in configure_SSL because it can happen that a GLOB gets used again without
  calling DESTROY (https://github.com/noxxi/p5-io-socket-ssl/issues/56)
   2017-02-16 16:07:03 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.045.

2.045 2017/02/13
- fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
  objects -> github pull#55
- optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD
  if perl is compiled w/o thread support
- small fix in t/protocol_version.t to use older versions of Net::SSLeay
  with openssl build w/o SSLv3 support
- when setting SSL_keepSocketOnError to true the socket will not be closed
  on fatal error. This is a modified version of
  https://github.com/noxxi/p5-io-socket-ssl/pull/53/
   2017-02-07 13:02:04 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.044.

2.044 2017/01/26
- protect various 'eval'-based capability detections at startup with a localized
  __DIE__ handler. This way dynamically requiring IO::Socket::SSL as done by
  various third party software should cause less problems even if there is a
  global __DIE__ handler which does not properly deal with 'eval'.
   2017-01-16 10:28:46 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.043.

2.043 2017/01/06
- make t/session_ticket.t work with OpenSSL 1.1.0. With this version the
  session does not get reused any longer if it was not properly closed which
  is now done using an explicit close by the client which causes a
  proper SSL_shutdown
2.042 2017/01/05
- enable session ticket callback with Net::SSLeay>=1.80
   2017-01-04 15:44:23 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.041.

2.041 2017/01/04
- leave session ticket callback off for now until the needed patch is
  included in Net::SSLeay. See
  https://rt.cpan.org/Ticket/Display.html?id=116118#txn-1696146
   2016-12-19 10:32:48 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.040.

2.040 2016/12/17
- fix detection of default CA path for OpenSSL 1.1.x
- Utils::CERT_asHash now includes the signature algorithm used
- Utils::CERT_asHash can now deal with large serial numbers
   2016-11-28 14:00:16 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.039.

2.039 2016/11/20
- OpenSSL 1.1.0c changed the behavior of SSL_read so that it now returns -1 on
  EOF without proper SSL shutdown. Since it looks like that this behavior will
  be kept at least for 1.1.1+ adapt to the changed API by treating errno=NOERR
  on SSL_ERROR_SYSCALL as EOF.
   2016-09-19 00:03:10 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.038.

2.038 2016/09/17
- restrict session ticket callback to Net::SSLeay 1.79+ since version before
  contains bug. Add test for session reuse
- extend SSL fingerprint to pubkey digest, i.e. 'sha1$pub$xxxxxx....'
- fix t/external/ocsp.t to use different server (under my control) to check
  OCSP stapling

Next | Query returned 146 messages, browsing 31 to 40 | Previous