2016-08-24 07:58:33 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.037.
2.037 2016/08/22
- fix session cache del_session: it freed the session but did not properly
remove it from the cache. Further reuse causes crash.
|
2016-08-19 17:26:23 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.036.
Changes for 2.036 not documented.
2.035 2016/08/11
- fixes for issues introduced in 2.034
- return with error in configure_SSL if context creation failed. This
might otherwise result in an segmentation fault later.
- apply builtin defaults before any (user configurable) global settings
(i.e. done with set_defaults, set_default_context...) so that builtins
don't replace user settings
Thanks to joel[DOT]a[DOT]berger[AT]gmail[DOT]com for reporting
|
2016-08-09 00:33:26 by Makoto Fujiwara | Files touched by this commit (2) |
Log message:
Updated security/p5-IO-Socket-SSL to 2.034
------------------------------------------
2.034 2016/08/08
- move handling of global SSL arguments into creation of context, so that these
get also applied when creating a context only.
|
2016-07-21 14:29:57 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.033.
2.033 2016/07/15
- support for session ticket reuse over multiple contexts and processes
(if supported by Net::SSLeay)
- small optimizations, like saving various Net::SSLeay constants into variables
and access variables instead of calling the constant sub all the time
- make t/dhe.t work with openssl 1.1.0
2.032 2016/07/12
- Set session id context only on the server side. Even if the documentation for
SSL_CTX_set_session_id_context makes clear that this function is server side
only it actually affects hndling of session reuse on the client side too and
can result in error "SSL3_GET_SERVER_HELLO:attempt to reuse session in
different context" at the client.
2.031 2016/07/08
- fix for bug in session handling introduced in 2.031, RT#115975
Thanks to paul[AT]city-fan[DOT]org for reporting
2.030 2016/07/08
- Utils::CERT_create - don't add given extensions again if they were already
added. Firefox croaks with sec_error_extension_value_invalid if (specific?)
extensions are given twice.
- assume that Net::SSLeay::P_PKCS12_load_file will return the CA certificates
with the reverse order as in the PKCS12 file, because that's what it does.
- support for creating ECC keys in Utils once supported by Net::SSLeay
- remove internal sub session_cache and access cache directly (faster)
|
2016-06-30 19:44:18 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Updated p5-IO-Socket-SSL to 2.029.
2.029 2016/07/26
- fix del_session method in case a single item was in the cache
- use SSL_session_key as the real key for the cache and not some derivate of it,
so that it works to remove the entry using the same key
2.028 2016/07/26
- add del_session method to session cache
|
2016-06-08 21:25:20 by Thomas Klausner | Files touched by this commit (2236) |
Log message:
Bump PKGREVISION for perl-5.24.
|
2016-04-24 08:30:22 by Thomas Klausner | Files touched by this commit (2) |  |
Log message:
Updated p5-IO-Socket-SSL to 2.027.
2.027 2016/04/20
- only added Changes for 2.026
2.026 2016/04/20
- update default server and client ciphers based on recommendation of
Mozilla and what the current browsers use. Notably this finally disables
RC4 for the client (was disabled for server long ago) and adds CHACHA20.
|
2016-04-08 17:09:38 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Update p5-IO-Socket-SSL to 2.025.
2.025 2016/04/04
- Resolved memleak if SSL_crl_file was used: RT#113257, RT#113530
Thanks to avi[DOT]maslati[AT]forescout[DOT]com and
mark[DOT]kurman[AT]gmail[DOT]com for reporting the problem
|
2016-02-26 10:41:07 by Jonathan Perkin | Files touched by this commit (32) |
Log message:
Use OPSYSVARS.
|
2016-02-07 15:16:59 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Update p5-IO-Socket-SSL to 2.024:
2.024 2016/02/06
- Work around issue where the connect fails on systems having only a loopback
interface and where IO::Socket::IP is used as super class (default when
available). Since IO::Socket::IP sets AI_ADDRCONFIG by default connect to
localhost would fail on this systems. This happened at least for the tests,
see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813796
Workaround is to explicitely set GetAddrInfoFlags to 0 if no GetAddrInfoFlags
is set but the Family/Domain is given. In this case AI_ADDRCONFIG would not
be useful anyway but would cause at most harm.
|