Next | Query returned 141 messages, browsing 41 to 50 | Previous

History of commit frequency

CVS Commit History:


   2016-06-08 21:25:20 by Thomas Klausner | Files touched by this commit (2236)
Log message:
Bump PKGREVISION for perl-5.24.
   2016-04-24 08:30:22 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.027.

2.027 2016/04/20
- only added Changes for 2.026
2.026 2016/04/20
- update default server and client ciphers based on recommendation of
  Mozilla and what the current browsers use. Notably this finally disables
  RC4 for the client (was disabled for server long ago) and adds CHACHA20.
   2016-04-08 17:09:38 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update p5-IO-Socket-SSL to 2.025.

2.025 2016/04/04
- Resolved memleak if SSL_crl_file was used: RT#113257, RT#113530
  Thanks to avi[DOT]maslati[AT]forescout[DOT]com and
  mark[DOT]kurman[AT]gmail[DOT]com for reporting the problem
   2016-02-26 10:41:07 by Jonathan Perkin | Files touched by this commit (32)
Log message:
Use OPSYSVARS.
   2016-02-07 15:16:59 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update p5-IO-Socket-SSL to 2.024:

2.024 2016/02/06
- Work around issue where the connect fails on systems having only a loopback
  interface and where IO::Socket::IP is used as super class (default when
  available). Since IO::Socket::IP sets AI_ADDRCONFIG by default connect to
  localhost would fail on this systems. This happened at least for the tests,
  see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813796
  Workaround is to explicitely set GetAddrInfoFlags to 0 if no GetAddrInfoFlags
  is set but the Family/Domain is given. In this case AI_ADDRCONFIG would not
  be useful anyway but would cause at most harm.
   2016-01-31 03:49:08 by Makoto Fujiwara | Files touched by this commit (2)
Log message:
Update to 2.023
---------------
2.023 2016/01/30
- OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS connection
  was not fully established (commit: f73c737c7ac908c5d6407c419769123392a3b0a9).
  This somehow resulted in Net::SSLeay::shutdown returning 0 (i.e. keep trying)
  which caused an endless loop. It will now ignore this result in case the TLS
  connection was not yet established and consider the TLS connection closed
  instead.
   2015-12-13 09:18:37 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update p5-IO-Socket-SSL to 2.022:

2.022 2015/12/10
- fix stringification of IPv6 inside subjectAltNames in Utils::CERT_asHash.
  Thanks to Mark.Martinec[AT]ijs[DOT]si for reporting in #110253
   2015-12-06 11:51:37 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update p5-IO-Socket-SSL to 2.021:

2.021 2015/12/02
- Fixes for documentation and typos thanks to DavsX and jwilk.
- Update PublicSuffx with latest version from publicsuffix.org
   2015-11-04 02:18:12 by Alistair G. Crooks | Files touched by this commit (434)
Log message:
Add SHA512 digests for distfiles for security category

Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-09-30 22:25:05 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update to 2.020:

2.020 2015/09/20
- support multiple directories in SSL_ca_path as proposed in RT#106711
  by dr1027[AT]evocat[DOT]ne. Directories can be given as array or as string
  with a path separator, see documentation.
- typos fixed thanks to jwilk https://github.com/noxxi/p5-io-socket-ssl/pull/34

Next | Query returned 141 messages, browsing 41 to 50 | Previous