Path to this page:
./
security/p5-IO-Socket-SSL,
Perl5 SSL socket interface class
Branch: CURRENT,
Version: 2.089nb1,
Package name: p5-IO-Socket-SSL-2.089nb1,
Maintainer: pkgsrc-usersIO::Socket::SSL is a class implementing an object-oriented interface
to SSL sockets. The class is a descendent of IO::Socket::INET and
provides a subset of the base class's interface methods as well as
SSL-specific methods.
Required to run:[
lang/perl5] [
security/p5-Net-SSLeay] [
net/p5-Net-LibIDN] [
net/p5-IO-Socket-INET6] [
security/p5-Mozilla-CA]
Required to build:[
pkgtools/cwrappers]
Master sites: (Expand)
Filesize: 265.08 KB
Version history: (Expand)
- (2024-11-16) Updated to version: p5-IO-Socket-SSL-2.089nb1
- (2024-09-01) Updated to version: p5-IO-Socket-SSL-2.089
- (2024-07-21) Updated to version: p5-IO-Socket-SSL-2.088
- (2024-07-14) Updated to version: p5-IO-Socket-SSL-2.087
- (2024-07-07) Updated to version: p5-IO-Socket-SSL-2.086
- (2024-01-28) Updated to version: p5-IO-Socket-SSL-2.085
CVS history: (Expand)
2024-01-28 12:48:10 by Thomas Klausner | Files touched by this commit (2) | |
Log message:
p5-IO-Socket-SSL: update to 2.085.
2.085 2024/01/22
- #147 fix test which failed due to behavior changes in OpenSSL 3.2
- update PublicSuffix
- add examples for TLS JA3/JA4 fingerprinting to tls_fingerprint/
|
2023-12-17 08:40:58 by Thomas Klausner | Files touched by this commit (2) | |
Log message:
p5-IO-Socket-SSL: update to 2.084.
2.084 2023/11/06
- various fixes for edge cases and build: #136, #141, #142, #143, #145
- update documentation to reflect default SSL_version
2.083 2023/05/18
- fix t/protocol_version.t for OpenSSL versions which don't support SECLEVEL
(regression from #122)
2.082 2023/05/17
- SSL_version default now TLS 1.2+ since TLS 1.1 and lower deprecated #122
- fix output of alert string when debugging #132
- improve regex for hostname validation #130, #126
- add can_ciphersuites subroutine for feature checking #127
- Utils::CERT_create - die if unexpected arguments are given instead of ignoring
these
|
2023-07-06 11:43:03 by Thomas Klausner | Files touched by this commit (2483) |
Log message:
*: recursive bump for perl 5.38
|
2023-05-20 09:08:12 by Thomas Klausner | Files touched by this commit (2) | |
Log message:
p5-IO-Socket-SSL: update to 2.081.
2.081 2023/01/25
- new function set_msg_callback for user defined callback on each SSL message
- showcase function in example/ssl_client.pl and example/ssl_server.pl for
computing JA3S/JA3 fingerprints
- fix tracing added in 2.076 to no longer include SSL3_RT_HEADER (noise)
2.080 2023/01/18
- move certs into t/ so that distributions like CentOS don't install the
test certificates as part of the documentation any longer.
2.079 2023/01/16
- properly extract IPv6 address for verification from PeerAddr if not explicitly
given as SSL_verifycn_name.
https://github.com/noxxi/p5-io-socket-ssl/issues/123
2.078 2022/12/11
- revert decision from 2014 to not verify hostname by default if hostname is
IP address but no explicit verification scheme given
https://github.com/noxxi/p5-io-socket-ssl/issues/121
2.077 2022/11/21
- fix memory leak in session cache, thanks to genuaboro
https://github.com/noxxi/p5-io-socket-ssl/pull/118
- more race conditions in tests fixed thanks to jddurand
https://github.com/noxxi/p5-io-socket-ssl/issues/97
2.076 2022/11/12
- added curl like tracing based on contribution from jddurand
https://github.com/noxxi/p5-io-socket-ssl/pull/117
- fixed race condition in t/sni_verify.t based on analysis from jddurand
https://github.com/noxxi/p5-io-socket-ssl/issues/97
2.075
- treat SSL_write returning 0 same as previously -1, as suggested by both
OpenSSL and LibreSSL documentation
- propagate error from SSL_shutdown, but if the shutdown is caused by an outer
SSL error keep the original error
- small tests fixes
|
2022-08-06 18:43:30 by Adrian Steinmann | Files touched by this commit (2) | |
Log message:
security/p5-IO-Socket-SSL update to 2.074
Changes from upstream:
- add SSL_ciphersuites option for TLS 1.3 ciphers
- no longer use own default for ciphers, instead use system default but disable
some weak ciphers which might still be enabled on older systems
- fix behavior and tests for openssl 3.0.1
- fix #110 - prevent internal error warning in some cases
|
2022-06-28 13:38:00 by Thomas Klausner | Files touched by this commit (3952) |
Log message:
*: recursive bump for perl 5.36
|
2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605) |
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
|
2021-10-07 16:54:50 by Nia Alarie | Files touched by this commit (606) |
Log message:
security: Remove SHA1 hashes for distfiles
|