Next | Query returned 141 messages, browsing 21 to 30 | Previous

History of commit frequency

CVS Commit History:


   2018-02-25 19:47:31 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
p5-IO-Socket-SSL: update to 2.056.

2.056 2018/02/19
- Intercept - fix creation of serial number: base it on binary digest instead of
  treating hex fingerprint as binary. Allow use of own serial numbers again.
- t/io-socket-ip.t - skip test if no IPv6 support on system RT#124464
- update PublicSuffix
2.055 2018/02/15
- use SNI also if hostname was given all-uppercase
- Utils::CERT_create - don't add authority key for issuer since Chrome does
  not like this
- Intercept:
  - change behavior of code based cache to better support synchronizing
    within multiprocess/threaded setups
  - don't use counter for serial number but somehow base it on original
    certificate in order to avoid conflicts with reuse of serial numbers
    after restart
- RT#124431 - better support platforms w/o IPv6
- RT#124306 - spelling fixes in documentation
2.054 2018/01/22
- added missing test certificates to MANIFEST
2.053 2018/01/21
- small behavior fixes
  - if SSL_fingerprint is used and matches don't check for OCSP
  - Utils::CERT_create - small fixes to properly specific purpose, ability to
    use predefined complex purpose but disable some features
- update PublicSuffix
- updates for documentation, especially regarding pitfalls with forking or using
  non-blocking sockets. Spelling fixes.
- test fixes and improvements
  - stability improvements for live tests
  - regenerate certificate in certs/ and make sure they are limited to the
    correct purpose. Checkin program used to generate certificates.
  - adjust tests since certificates have changed and some tests used
    certificates intended for client authentication as server certificates,
    which now no longer works
   2017-11-08 22:07:32 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
p5-IO-Socket-SSL: update to 2.052.

2.052 2017/10/22
- disable NPN support if LibreSSL>=2.6.1 is detected since they've replaced the
  functions with dummies instead of removing NPN completly or setting
  OPENSSL_NO_NEXTPROTONEG
- t/01loadmodule.t shows more output helpful in debugging problems
- update fingerprints for extenal tests
- update documentation to make behavior of syswrite more clear
   2017-09-08 10:48:32 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.051.

2.051 2017/09/05
- syswrite: if SSL_write sets SSL_ERROR_SYSCALL but no $! (as seen with
  OpenSSL 1.1.0 on Windows) set $! to EPIPE to propagate a useful error up
  https://github.com/noxxi/p5-io-socket-ssl/issues/62
   2017-09-04 14:26:14 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.050.

2.050 2017/08/18
- removed unecessary settings of SSL_version and SSL_cipher_list from tests
- protocol_version.t can now deal when TLS 1.0 and/or TLS 1.1 are not supported
  as is the case with openssl versions in latest Debian (buster)
   2017-06-14 15:07:54 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated p5-IO-Socket-SSL to 2.049.

2.049 2017/06/12A
- fixed problem caused by typo in the context of session cache
  https://github.com/noxxi/p5-io-socket-ssl/issues/60
- update PublicSuffix information from publicsuffix.org
   2017-06-05 16:25:36 by Ryo ONODERA | Files touched by this commit (2298)
Log message:
Recursive revbump from lang/perl5 5.26.0
   2017-04-19 15:46:18 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.048.

2.048 2017/04/16
- fixed small memory leaks during destruction of socket and context, RT#120643
   2017-02-19 09:49:46 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.047.

2.047 2017/02/16
- better fix for problem which 2.046 tried to fix but broke LWP this way
2.046 2017/02/15
- cleanup everything in DESTROY and make sure to start with a fresh %{*self}
  in configure_SSL because it can happen that a GLOB gets used again without
  calling DESTROY (https://github.com/noxxi/p5-io-socket-ssl/issues/56)
   2017-02-16 16:07:03 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.045.

2.045 2017/02/13
- fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
  objects -> github pull#55
- optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD
  if perl is compiled w/o thread support
- small fix in t/protocol_version.t to use older versions of Net::SSLeay
  with openssl build w/o SSLv3 support
- when setting SSL_keepSocketOnError to true the socket will not be closed
  on fatal error. This is a modified version of
  https://github.com/noxxi/p5-io-socket-ssl/pull/53/
   2017-02-07 13:02:04 by Thomas Klausner | Files touched by this commit (2)
Log message:
Updated p5-IO-Socket-SSL to 2.044.

2.044 2017/01/26
- protect various 'eval'-based capability detections at startup with a localized
  __DIE__ handler. This way dynamically requiring IO::Socket::SSL as done by
  various third party software should cause less problems even if there is a
  global __DIE__ handler which does not properly deal with 'eval'.

Next | Query returned 141 messages, browsing 21 to 30 | Previous