Next | Query returned 146 messages, browsing 41 to 50 | Previous

History of commit frequency

CVS Commit History:


   2016-08-24 07:58:33 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.037.

2.037 2016/08/22
- fix session cache del_session: it freed the session but did not properly
  remove it from the cache. Further reuse causes crash.
   2016-08-19 17:26:23 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.036.

Changes for 2.036 not documented.

2.035 2016/08/11
- fixes for issues introduced in 2.034
  - return with error in configure_SSL if context creation failed. This
    might otherwise result in an segmentation fault later.
  - apply builtin defaults before any (user configurable) global settings
    (i.e. done with set_defaults, set_default_context...) so that builtins
    don't replace user settings
    Thanks to joel[DOT]a[DOT]berger[AT]gmail[DOT]com for reporting
   2016-08-09 00:33:26 by Makoto Fujiwara | Files touched by this commit (2)
Log message:
Updated security/p5-IO-Socket-SSL to 2.034
------------------------------------------
2.034 2016/08/08
- move handling of global SSL arguments into creation of context, so that these
  get also applied when creating a context only.
   2016-07-21 14:29:57 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.033.

2.033 2016/07/15
- support for session ticket reuse over multiple contexts and processes
  (if supported by Net::SSLeay)
- small optimizations, like saving various Net::SSLeay constants into variables
  and access variables instead of calling the constant sub all the time
- make t/dhe.t work with openssl 1.1.0
2.032 2016/07/12
- Set session id context only on the server side. Even if the documentation for
  SSL_CTX_set_session_id_context makes clear that this function is server side
  only it actually affects hndling of session reuse on the client side too and
  can result in error "SSL3_GET_SERVER_HELLO:attempt to reuse session in
  different context" at the client.
2.031 2016/07/08
- fix for bug in session handling introduced in 2.031, RT#115975
  Thanks to paul[AT]city-fan[DOT]org for reporting
2.030 2016/07/08
- Utils::CERT_create - don't add given extensions again if they were already
  added. Firefox croaks with sec_error_extension_value_invalid if (specific?)
  extensions are given twice.
- assume that Net::SSLeay::P_PKCS12_load_file will return the CA certificates
  with the reverse order as in the PKCS12 file, because that's what it does.
- support for creating ECC keys in Utils once supported by Net::SSLeay
- remove internal sub session_cache and access cache directly (faster)
   2016-06-30 19:44:18 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.029.

2.029 2016/07/26
- fix del_session method in case a single item was in the cache
- use SSL_session_key as the real key for the cache and not some derivate of it,
  so that it works to remove the entry using the same key
2.028 2016/07/26
- add del_session method to session cache
   2016-06-08 21:25:20 by Thomas Klausner | Files touched by this commit (2236)
Log message:
Bump PKGREVISION for perl-5.24.
   2016-04-24 08:30:22 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.027.

2.027 2016/04/20
- only added Changes for 2.026
2.026 2016/04/20
- update default server and client ciphers based on recommendation of
  Mozilla and what the current browsers use. Notably this finally disables
  RC4 for the client (was disabled for server long ago) and adds CHACHA20.
   2016-04-08 17:09:38 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update p5-IO-Socket-SSL to 2.025.

2.025 2016/04/04
- Resolved memleak if SSL_crl_file was used: RT#113257, RT#113530
  Thanks to avi[DOT]maslati[AT]forescout[DOT]com and
  mark[DOT]kurman[AT]gmail[DOT]com for reporting the problem
   2016-02-26 10:41:07 by Jonathan Perkin | Files touched by this commit (32)
Log message:
Use OPSYSVARS.
   2016-02-07 15:16:59 by Thomas Klausner | Files touched by this commit (2)
Log message:
Update p5-IO-Socket-SSL to 2.024:

2.024 2016/02/06
- Work around issue where the connect fails on systems having only a loopback
  interface and where IO::Socket::IP is used as super class (default when
  available). Since IO::Socket::IP sets AI_ADDRCONFIG by default connect to
  localhost would fail on this systems. This happened at least for the tests,
  see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813796
  Workaround is to explicitely set GetAddrInfoFlags to 0 if no GetAddrInfoFlags
  is set but the Family/Domain is given. In this case AI_ADDRCONFIG would not
  be useful anyway but would cause at most harm.

Next | Query returned 146 messages, browsing 41 to 50 | Previous