2016-06-08 21:25:20 by Thomas Klausner | Files touched by this commit (2236) |
Log message:
Bump PKGREVISION for perl-5.24.
|
2016-04-24 08:30:22 by Thomas Klausner | Files touched by this commit (2) | |
Log message:
Updated p5-IO-Socket-SSL to 2.027.
2.027 2016/04/20
- only added Changes for 2.026
2.026 2016/04/20
- update default server and client ciphers based on recommendation of
Mozilla and what the current browsers use. Notably this finally disables
RC4 for the client (was disabled for server long ago) and adds CHACHA20.
|
2016-04-08 17:09:38 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Update p5-IO-Socket-SSL to 2.025.
2.025 2016/04/04
- Resolved memleak if SSL_crl_file was used: RT#113257, RT#113530
Thanks to avi[DOT]maslati[AT]forescout[DOT]com and
mark[DOT]kurman[AT]gmail[DOT]com for reporting the problem
|
2016-02-26 10:41:07 by Jonathan Perkin | Files touched by this commit (32) |
Log message:
Use OPSYSVARS.
|
2016-02-07 15:16:59 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Update p5-IO-Socket-SSL to 2.024:
2.024 2016/02/06
- Work around issue where the connect fails on systems having only a loopback
interface and where IO::Socket::IP is used as super class (default when
available). Since IO::Socket::IP sets AI_ADDRCONFIG by default connect to
localhost would fail on this systems. This happened at least for the tests,
see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813796
Workaround is to explicitely set GetAddrInfoFlags to 0 if no GetAddrInfoFlags
is set but the Family/Domain is given. In this case AI_ADDRCONFIG would not
be useful anyway but would cause at most harm.
|
2016-01-31 03:49:08 by Makoto Fujiwara | Files touched by this commit (2) |
Log message:
Update to 2.023
---------------
2.023 2016/01/30
- OpenSSL 1.0.2f changed the behavior of SSL shutdown in case the TLS connection
was not fully established (commit: f73c737c7ac908c5d6407c419769123392a3b0a9).
This somehow resulted in Net::SSLeay::shutdown returning 0 (i.e. keep trying)
which caused an endless loop. It will now ignore this result in case the TLS
connection was not yet established and consider the TLS connection closed
instead.
|
2015-12-13 09:18:37 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Update p5-IO-Socket-SSL to 2.022:
2.022 2015/12/10
- fix stringification of IPv6 inside subjectAltNames in Utils::CERT_asHash.
Thanks to Mark.Martinec[AT]ijs[DOT]si for reporting in #110253
|
2015-12-06 11:51:37 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Update p5-IO-Socket-SSL to 2.021:
2.021 2015/12/02
- Fixes for documentation and typos thanks to DavsX and jwilk.
- Update PublicSuffx with latest version from publicsuffix.org
|
2015-11-04 02:18:12 by Alistair G. Crooks | Files touched by this commit (434) |
Log message:
Add SHA512 digests for distfiles for security category
Problems found locating distfiles:
Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
Package libidea: missing distfile libidea-0.8.2b.tar.gz
Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
Package uvscan: missing distfile vlp4510e.tar.Z
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
|
2015-09-30 22:25:05 by Thomas Klausner | Files touched by this commit (2) |
Log message:
Update to 2.020:
2.020 2015/09/20
- support multiple directories in SSL_ca_path as proposed in RT#106711
by dr1027[AT]evocat[DOT]ne. Directories can be given as array or as string
with a path separator, see documentation.
- typos fixed thanks to jwilk https://github.com/noxxi/p5-io-socket-ssl/pull/34
|