Name: | perl-IO-Socket-SSL |
---|---|
Version: | 2.066 |
Release: | 3.el8 |
Architecture: | noarch |
Group: | Unspecified |
Size: | 618684 |
License: | (GPL+ or Artistic) and MPLv2.0 |
RPM: | perl-IO-Socket-SSL-2.066-3.el8.noarch.rpm |
Source RPM: | perl-IO-Socket-SSL-2.066-3.el8.src.rpm |
Build Date: | Sun Nov 10 2019 |
Build Host: | jenkins-10-147-72-125-5175330d-7169-4500-9dab-ee68de92c90a.appad1iad.osdevelopmeniad.oraclevcn.com |
Vendor: | Oracle America |
URL: | https://metacpan.org/release/IO-Socket-SSL |
Summary: | Perl library for transparent SSL |
Description: | This module is a true drop-in replacement for IO::Socket::INET that uses SSL to encrypt data before it is transferred to a remote server or client. IO::Socket::SSL supports all the extra features that one needs to write a full-featured SSL client or server application: multiple SSL contexts, cipher selection, certificate verification, and SSL version selection. As an extra bonus, it works perfectly with mod_perl. |
- PublicSuffix.pm is licensed MPLv2.0 (#1724434)
- Skip a PHA test if Net::SSLeay does not expose the PHA (bug #1633636)
- Update to 2.066 (bug #1632600)
- Client sends a post-handshake-authentication extension if a client key and a certificate are available (bug #1633636)
- Prevent tests from dying on SIGPIPE (bug #1610017)
- Update to 2.060 (bug #1610017) - Support for TLS 1.3 with OpenSSL 1.1.1 (needs Net::SSLeay ≥ 1.86); see also CPAN RT#126899 - TLS 1.3 support is not complete yet for session reuse
- Adapt to OpenSSL 1.1.1, it requires patched Net-SSLeay (bug #1610017) - Enable tests (bug #1610017)
- Update to 2.059 (bug #1610017) - Fix memory leak when CRLs are used (CPAN RT#125867) - Fix memory leak when using stop_SSL and threads (https://rt.cpan.org/Ticket/Display.html?id=125867#txn-1797132)
- Disable %check so package will build for Mass Rebuild - Related: bug#1614611
- Update to 2.058 - Fix memory leak that occurred with explicit stop_SSL in connection with non-blocking sockets or timeout (CPAN RT#125867) - Fix redefine warnings in case Socket6 is installed but neither IO::Socket::IP nor IO::Socket::INET6 (CPAN RT#124963) - IO::Socket::SSL::Intercept - optional 'serial' argument can be starting number or callback to create serial number based on the original certificate - New function get_session_reused to check if a session got reused - IO::Socket::SSL::Utils::CERT_asHash: fingerprint_xxx now set to the correct value - Fix t/session_ticket.t: It failed with OpenSSL 1.1.* since this version expects the extKeyUsage of clientAuth in the client cert also to be allowed by the CA if CA uses extKeyUsage