Hello community,

here is the log from the commit of package perl-IO-Socket-SSL for 
openSUSE:Factory checked in at 2015-05-16 07:13:03
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL (Old)
 and      /work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "perl-IO-Socket-SSL"

Changes:
--------
--- /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL/perl-IO-Socket-SSL.changes    
2015-05-05 00:54:35.000000000 +0200
+++ 
/work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new/perl-IO-Socket-SSL.changes   
    2015-05-16 07:13:04.000000000 +0200
@@ -1,0 +2,23 @@
+Thu May 14 08:16:17 UTC 2015 - [email protected]
+
+- updated to 2.015
+   see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
+
+  2.014 2015/05/13
+  - work around problem with IO::Socket::INET6 on windows, by explicitly using
+    Domain AF_INET in the tests. 
+    Fixes RT#104226 reported by CHORNY
+
+-------------------------------------------------------------------
+Wed May 13 12:33:03 UTC 2015 - [email protected]
+
+- updated to 2.014
+   see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
+
+  2.014 2015/05/05
+  - Utils::CERT_create - work around problems with authorityInfoAccess, where
+    OpenSSL i2v does not create the same string as v2i expects
+  - Intercept - don't clone some specific extensions which make only sense with
+    the original certificate
+
+-------------------------------------------------------------------

Old:
----
  IO-Socket-SSL-2.013.tar.gz

New:
----
  IO-Socket-SSL-2.015.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ perl-IO-Socket-SSL.spec ++++++
--- /var/tmp/diff_new_pack.oxZ6ie/_old  2015-05-16 07:13:05.000000000 +0200
+++ /var/tmp/diff_new_pack.oxZ6ie/_new  2015-05-16 07:13:05.000000000 +0200
@@ -17,7 +17,7 @@
 
 
 Name:           perl-IO-Socket-SSL
-Version:        2.013
+Version:        2.015
 Release:        0
 %define cpan_name IO-Socket-SSL
 Summary:        Nearly transparent SSL encapsulation for IO::Socket::INET

++++++ IO-Socket-SSL-2.013.tar.gz -> IO-Socket-SSL-2.015.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/Changes 
new/IO-Socket-SSL-2.015/Changes
--- old/IO-Socket-SSL-2.013/Changes     2015-05-01 17:13:32.000000000 +0200
+++ new/IO-Socket-SSL-2.015/Changes     2015-05-13 22:40:15.000000000 +0200
@@ -1,3 +1,12 @@
+2.014 2015/05/13
+- work around problem with IO::Socket::INET6 on windows, by explicitly using
+  Domain AF_INET in the tests. 
+  Fixes RT#104226 reported by CHORNY
+2.014 2015/05/05
+- Utils::CERT_create - work around problems with authorityInfoAccess, where
+  OpenSSL i2v does not create the same string as v2i expects
+- Intercept - don't clone some specific extensions which make only sense with
+  the original certificate
 2.013 2015/05/01
 - assign severities to internal error handling and make sure that follow-up
   errors like "configuration failed" or "certificate verify error" don't
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/META.json 
new/IO-Socket-SSL-2.015/META.json
--- old/IO-Socket-SSL-2.013/META.json   2015-05-01 17:37:04.000000000 +0200
+++ new/IO-Socket-SSL-2.015/META.json   2015-05-13 22:43:17.000000000 +0200
@@ -4,7 +4,7 @@
       "Steffen Ullrich <[email protected]>, Peter Behroozi, Marko Asplund"
    ],
    "dynamic_config" : 1,
-   "generated_by" : "ExtUtils::MakeMaker version 6.66, CPAN::Meta::Converter 
version 2.120921",
+   "generated_by" : "ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter 
version 2.140640",
    "license" : [
       "perl_5"
    ],
@@ -50,5 +50,5 @@
          "url" : "https://github.com/noxxi/p5-io-socket-ssl";
       }
    },
-   "version" : "2.013"
+   "version" : "2.015"
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/META.yml 
new/IO-Socket-SSL-2.015/META.yml
--- old/IO-Socket-SSL-2.013/META.yml    2015-05-01 17:37:04.000000000 +0200
+++ new/IO-Socket-SSL-2.015/META.yml    2015-05-13 22:43:17.000000000 +0200
@@ -3,26 +3,26 @@
 author:
   - 'Steffen Ullrich <[email protected]>, Peter Behroozi, Marko Asplund'
 build_requires:
-  ExtUtils::MakeMaker: 0
+  ExtUtils::MakeMaker: '0'
 configure_requires:
-  ExtUtils::MakeMaker: 0
+  ExtUtils::MakeMaker: '0'
 dynamic_config: 1
-generated_by: 'ExtUtils::MakeMaker version 6.66, CPAN::Meta::Converter version 
2.120921'
+generated_by: 'ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter version 
2.140640'
 license: perl
 meta-spec:
   url: http://module-build.sourceforge.net/META-spec-v1.4.html
-  version: 1.4
+  version: '1.4'
 name: IO-Socket-SSL
 no_index:
   directory:
     - t
     - inc
 requires:
-  Net::SSLeay: 1.46
-  Scalar::Util: 0
+  Net::SSLeay: '1.46'
+  Scalar::Util: '0'
 resources:
   bugtracker: https://rt.cpan.org/Dist/Display.html?Queue=IO-Socket-SSL
   homepage: https://github.com/noxxi/p5-io-socket-ssl
   license: http://dev.perl.org/licenses/
   repository: https://github.com/noxxi/p5-io-socket-ssl
-version: 2.013
+version: '2.015'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL/Intercept.pm 
new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL/Intercept.pm
--- old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL/Intercept.pm      2015-04-17 
14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL/Intercept.pm      2015-05-05 
08:26:36.000000000 +0200
@@ -6,7 +6,7 @@
 use IO::Socket::SSL::Utils;
 use Net::SSLeay;
 
-our $VERSION = '1.93';
+our $VERSION = '2.014';
 
 sub new {
     my ($class,%args) = @_;
@@ -73,8 +73,21 @@
     }
 
     # create new certificate based on original
+    # copy most but not all extensions
+    my $hash = CERT_asHash($old_cert);
+    if (my $ext = $hash->{ext}) {
+       @$ext = grep {
+           $_->{sn} !~m{^(?:
+               authorityInfoAccess    |
+               subjectKeyIdentifier   |
+               authorityKeyIdentifier |
+               certificatePolicies    |
+               crlDistributionPoints
+           )$}x
+       } @$ext;
+    }
     my ($clone,$key) = CERT_create(
-       %{ CERT_asHash($old_cert) },
+       %$hash,
        serial => $self->{serial}++,
        issuer_cert => $self->{cacert},
        issuer_key => $self->{cakey},
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL/Utils.pm 
new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL/Utils.pm
--- old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL/Utils.pm  2015-04-17 
14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL/Utils.pm  2015-05-05 
08:26:52.000000000 +0200
@@ -9,7 +9,7 @@
 require Exporter;
 *import = \&Exporter::import;
 
-our $VERSION = '0.031';
+our $VERSION = '2.014';
 our @EXPORT = qw(
     PEM_file2cert PEM_string2cert PEM_cert2file PEM_cert2string
     PEM_file2key PEM_string2key PEM_key2file PEM_key2string
@@ -343,17 +343,27 @@
        => join(",",sort keys %cert_type) if %cert_type;
     push @ext,&Net::SSLeay::NID_ext_key_usage
        => join(",",sort keys %ext_key_usage) if %ext_key_usage;
+    Net::SSLeay::P_X509_add_extensions($cert, $issuer_cert, @ext);
 
     for my $ext (@{ $args{ext} || [] }) {
        my $nid = $ext->{nid}
            || $ext->{sn} && Net::SSLeay::OBJ_sn2nid($ext->{sn})
            || croak "cannot determine NID of extension";
        my $val = $ext->{data};
-       $val = "critical,$val" if $ext->{critical};
-       push @ext,($nid,$val);
+       if ($nid == 177) {
+           # authorityInfoAccess:
+           # OpenSSL i2v does not output the same way as expected by i2v :(
+           for (split(/\n/,$val)) {
+               s{ - }{;}; # "OCSP - URI:..." -> "OCSP;URI:..."
+               $_ = "critical,$_" if $ext->{critical};
+               Net::SSLeay::P_X509_add_extensions($cert,$issuer_cert,$nid,$_);
+           }
+       } else {
+           $val = "critical,$val" if $ext->{critical};
+           Net::SSLeay::P_X509_add_extensions($cert, $issuer_cert, $nid, $val);
+       }
     }
 
-    Net::SSLeay::P_X509_add_extensions($cert, $issuer_cert, @ext);
     Net::SSLeay::X509_set_issuer_name($cert,
        Net::SSLeay::X509_get_subject_name($issuer_cert));
     Net::SSLeay::X509_sign($cert,$issuer_key,_digest($digest_name));
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL.pm 
new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL.pm
--- old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL.pm        2015-05-01 
17:32:36.000000000 +0200
+++ new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL.pm        2015-05-13 
22:37:34.000000000 +0200
@@ -13,7 +13,7 @@
 
 package IO::Socket::SSL;
 
-our $VERSION = '2.013';
+our $VERSION = '2.015';
 
 use IO::Socket;
 use Net::SSLeay 1.46;
@@ -1600,6 +1600,7 @@
        my $ipn;
        if ( CAN_IPV6 and $identity =~m{:} ) {
            # no IPv4 or hostname have ':'  in it, try IPv6.
+           $identity =~m{[^\da-fA-F:\.]} and return; # invalid characters in 
name
            $ipn = inet_pton(AF_INET6,$identity) or return; # invalid name
        } elsif ( my @ip = $identity 
=~m{^(\d+)(?:\.(\d+)\.(\d+)\.(\d+)|[\d\.]*)$} ) {
            # check for invalid IP/hostname
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/01loadmodule.t 
new/IO-Socket-SSL-2.015/t/01loadmodule.t
--- old/IO-Socket-SSL-2.013/t/01loadmodule.t    2015-04-17 14:06:34.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/01loadmodule.t    2015-05-05 13:32:14.000000000 
+0200
@@ -8,7 +8,9 @@
 ok( eval { require IO::Socket::SSL },"loaded");
 
 diag( sprintf( "openssl version=0x%0x", 
Net::SSLeay::OPENSSL_VERSION_NUMBER()));
-diag( sprintf( "Net::SSLeay::VERSION=%s", $Net::SSLeay::VERSION));
+diag( sprintf( "Net::SSLeay version=%s", $Net::SSLeay::VERSION));
+diag( sprintf( "parent %s version=%s", $_, $_->VERSION))
+    for (@IO::Socket::SSL::ISA);
 
 IO::Socket::SSL->import(':debug1');
 is( $IO::Socket::SSL::DEBUG,1, "IO::Socket::SSL::DEBUG 1");
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/acceptSSL-timeout.t 
new/IO-Socket-SSL-2.015/t/acceptSSL-timeout.t
--- old/IO-Socket-SSL-2.013/t/acceptSSL-timeout.t       2015-04-17 
14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/acceptSSL-timeout.t       2015-05-13 
22:37:21.000000000 +0200
@@ -1,5 +1,6 @@
 use strict;
 use warnings;
+use Socket;
 use IO::Socket::SSL;
 do './testlib.pl' || do './t/testlib.pl' || die "no testlib";
 
@@ -61,8 +62,11 @@
 
 sub client_ssl {
     my $saddr = shift;
-    my $c = IO::Socket::SSL->new( PeerAddr => $saddr, SSL_verify_mode => 0 )
-       || die "connect failed: $!|$SSL_ERROR";
+    my $c = IO::Socket::SSL->new(
+       PeerAddr => $saddr,
+       Domain => AF_INET,
+       SSL_verify_mode => 0
+    ) || die "connect failed: $!|$SSL_ERROR";
     print "Connected\n";
     while ( sysread( $c,my $buf,8000 )) { print $buf }
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/alpn.t 
new/IO-Socket-SSL-2.015/t/alpn.t
--- old/IO-Socket-SSL-2.013/t/alpn.t    2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/alpn.t    2015-05-13 22:29:52.000000000 +0200
@@ -47,7 +47,8 @@
     $ID = 'client';
     close($server);
     my $to_server = IO::Socket::SSL->new(
-       PeerHost => $addr,
+       PeerAddr => $addr,
+       Domain => AF_INET,
        SSL_verify_mode => 0,
        SSL_alpn_protocols => [qw(two three)],
     ) or do {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/auto_verify_hostname.t 
new/IO-Socket-SSL-2.015/t/auto_verify_hostname.t
--- old/IO-Socket-SSL-2.013/t/auto_verify_hostname.t    2015-04-17 
14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/auto_verify_hostname.t    2015-05-13 
22:08:44.000000000 +0200
@@ -47,6 +47,7 @@
     my ($name,$scheme,$result) = @tests[$i,$i+1,$i+2];
     my $cl = IO::Socket::SSL->new(
        PeerAddr => $saddr,
+       Domain => AF_INET,
        SSL_verify_mode => 1,
        SSL_verifycn_scheme => $scheme,
        SSL_verifycn_name => $name,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/cert_no_file.t 
new/IO-Socket-SSL-2.015/t/cert_no_file.t
--- old/IO-Socket-SSL-2.013/t/cert_no_file.t    2015-04-17 14:06:34.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/cert_no_file.t    2015-05-13 22:09:04.000000000 
+0200
@@ -73,6 +73,7 @@
 
        my $to_server = IO::Socket::SSL->new(
            PeerAddr => $saddr,
+           Domain => AF_INET,
            SSL_verify_mode => 0x00,
        );
        if ( $test == 3 ) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/core.t 
new/IO-Socket-SSL-2.015/t/core.t
--- old/IO-Socket-SSL-2.013/t/core.t    2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/core.t    2015-05-13 22:09:46.000000000 +0200
@@ -76,6 +76,7 @@
 
     $client = IO::Socket::SSL->new(
        PeerAddr => $saddr,
+       Domain => AF_INET,
        SSL_verify_mode => 0x01,
        SSL_ca_file => "certs/test-ca.pem",
        SSL_use_cert => 1,
@@ -176,6 +177,7 @@
     if ($CAN_NONBLOCK) {
        my $client_3 = IO::Socket::SSL->new(
            PeerAddr => $saddr,
+           Domain => AF_INET,
            SSL_verify_mode => 0x01,
            SSL_version => 'TLSv1',
            SSL_cipher_list => 'HIGH',
@@ -185,16 +187,17 @@
            SSL_key_file => "certs/server-key.enc",
            SSL_passwd_cb => sub { return "bluebell" },
            Blocking => 0,
-           );
+       );
 
        ok( $client_3, "Client Nonblocking Check 1");
        close $client_3;
 
        my $client_4 = IO::Socket::SSL->new(
            PeerAddr => $saddr,
+           Domain => AF_INET,
            SSL_reuse_ctx => $client_3,
            Blocking => 0
-           );
+       );
        ok( $client_4, "Client Nonblocking Check 2");
        $client_3->close(SSL_ctx_free => 1);
     }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/dhe.t 
new/IO-Socket-SSL-2.015/t/dhe.t
--- old/IO-Socket-SSL-2.013/t/dhe.t     2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/dhe.t     2015-05-13 22:09:56.000000000 +0200
@@ -51,6 +51,7 @@
     close($server);
     my $to_server = IO::Socket::SSL->new(
        PeerAddr => $addr,
+       Domain => AF_INET,
        SSL_cipher_list => 'ALL:RSA:!aRSA',
        SSL_verify_mode => 0 ) || do {
        notok( "connect failed: $SSL_ERROR" );
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/ecdhe.t 
new/IO-Socket-SSL-2.015/t/ecdhe.t
--- old/IO-Socket-SSL-2.013/t/ecdhe.t   2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/ecdhe.t   2015-05-13 22:10:04.000000000 +0200
@@ -46,6 +46,7 @@
     close($server);
     my $to_server = IO::Socket::SSL->new(
        PeerAddr => $addr,
+       Domain => AF_INET,
        SSL_verify_mode => 0 ) || do {
        notok( "connect failed: $SSL_ERROR" );
        exit
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/io-socket-inet6.t 
new/IO-Socket-SSL-2.015/t/io-socket-inet6.t
--- old/IO-Socket-SSL-2.013/t/io-socket-inet6.t 2015-04-17 14:06:34.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/io-socket-inet6.t 2015-05-13 22:27:06.000000000 
+0200
@@ -77,8 +77,8 @@
     $ID = 'client';
     close($server);
     my $to_server = IO::Socket::SSL->new(
-    PeerAddr => $addr,
-    SSL_verify_mode => 0,
+       PeerAddr => $addr,
+       SSL_verify_mode => 0,
     ) || do {
        notok( "connect failed: ".IO::Socket::SSL->errstr() );
        exit
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/io-socket-ip.t 
new/IO-Socket-SSL-2.015/t/io-socket-ip.t
--- old/IO-Socket-SSL-2.013/t/io-socket-ip.t    2015-05-01 17:15:15.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/io-socket-ip.t    2015-05-13 22:10:41.000000000 
+0200
@@ -67,8 +67,9 @@
     $ID = 'client';
     close($server);
     my $to_server = IO::Socket::SSL->new(
-    PeerAddr => $addr,
-    SSL_verify_mode => 0
+       PeerAddr => $addr,
+       Domain => AF_INET,
+       SSL_verify_mode => 0
     ) || do {
        notok( "connect failed: ".IO::Socket::SSL->errstr() );
        exit
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/mitm.t 
new/IO-Socket-SSL-2.015/t/mitm.t
--- old/IO-Socket-SSL-2.013/t/mitm.t    2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/mitm.t    2015-05-13 22:23:16.000000000 +0200
@@ -43,6 +43,7 @@
 # connect to server, check certificate
 my $cl = IO::Socket::SSL->new(
     PeerAddr => $saddr,
+    Domain => AF_INET,
     SSL_verify_mode => 1,
     SSL_ca_file => 'certs/my-ca.pem',
 );
@@ -54,6 +55,7 @@
 # connect to proxy, check certificate
 $cl = IO::Socket::SSL->new(
     PeerAddr => $paddr,
+    Domain => AF_INET,
     SSL_verify_mode => 1,
     SSL_ca_file => 'certs/proxyca.pem',
 );
@@ -79,6 +81,7 @@
        my $toc = $proxy->accept or next;
        my $tos = IO::Socket::SSL->new(
            PeerAddr => $saddr,
+           Domain => AF_INET,
            SSL_verify_mode => 1,
            SSL_ca_file => 'certs/my-ca.pem',
        ) or die "failed connect to server: $!, $SSL_ERROR";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/npn.t 
new/IO-Socket-SSL-2.015/t/npn.t
--- old/IO-Socket-SSL-2.013/t/npn.t     2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/npn.t     2015-05-13 22:29:25.000000000 +0200
@@ -47,7 +47,8 @@
     $ID = 'client';
     close($server);
     my $to_server = IO::Socket::SSL->new(
-       PeerHost => $addr,
+       PeerAddr => $addr,
+       Domain => AF_INET,
        SSL_verify_mode => 0,
        SSL_npn_protocols => [qw(two three)],
     ) or do {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/plain_upgrade_downgrade.t 
new/IO-Socket-SSL-2.015/t/plain_upgrade_downgrade.t
--- old/IO-Socket-SSL-2.013/t/plain_upgrade_downgrade.t 2015-04-17 
14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/plain_upgrade_downgrade.t 2015-05-13 
22:11:02.000000000 +0200
@@ -1,5 +1,6 @@
 use strict;
 use warnings;
+use Socket;
 use IO::Socket::SSL;
 use IO::Socket::SSL::Utils;
 use Test::More;
@@ -104,6 +105,7 @@
            if ($act =~m{newSSL(?::(.*))?$} ) {
                $cl = IO::Socket::SSL->new(
                    PeerAddr => $saddr,
+                   Domain => AF_INET,
                    defined($1) ? (SSL_startHandshake => $1):(),
                ) or die "failed to connect: $!|$SSL_ERROR";
                if ( ! defined($1) || $1 ) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/protocol_version.t 
new/IO-Socket-SSL-2.015/t/protocol_version.t
--- old/IO-Socket-SSL-2.013/t/protocol_version.t        2015-04-17 
14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/protocol_version.t        2015-05-13 
22:11:14.000000000 +0200
@@ -3,6 +3,7 @@
 use strict;
 use warnings;
 use Test::More;
+use Socket;
 use IO::Socket::SSL;
 do './testlib.pl' || do './t/testlib.pl' || die "no testlib";
 
@@ -38,6 +39,7 @@
 
        my $cl = IO::Socket::SSL->new(
            PeerAddr => $saddr,
+           Domain => AF_INET,
            SSL_startHandshake => 0,
            SSL_verify_mode => 0,
            SSL_version => $ver,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/readline.t 
new/IO-Socket-SSL-2.015/t/readline.t
--- old/IO-Socket-SSL-2.013/t/readline.t        2015-04-17 14:06:34.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/readline.t        2015-05-13 22:11:33.000000000 
+0200
@@ -154,6 +154,7 @@
 foreach my $test (@tests) {
     my $to_server = IO::Socket::SSL->new(
        PeerAddr => $addr,
+       Domain => AF_INET,
        SSL_verify_mode => 0 ) || do {
        notok( "connect failed: ".IO::Socket::SSL->errstr() );
        exit
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/sessions.t 
new/IO-Socket-SSL-2.015/t/sessions.t
--- old/IO-Socket-SSL-2.013/t/sessions.t        2015-04-17 14:06:34.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/sessions.t        2015-05-13 22:36:01.000000000 
+0200
@@ -97,8 +97,8 @@
 
     my $sock3 = IO::Socket::INET->new($saddr[2]);
     my @clients = (
-       IO::Socket::SSL->new($saddr[0]),
-       IO::Socket::SSL->new($saddr[1]),
+       IO::Socket::SSL->new(PeerAddr => $saddr[0], Domain => AF_INET),
+       IO::Socket::SSL->new(PeerAddr => $saddr[1], Domain => AF_INET),
        IO::Socket::SSL->start_SSL( $sock3 ),
     );
 
@@ -140,7 +140,7 @@
     }
 
     @clients = map {
-       IO::Socket::SSL->new($_)
+       IO::Socket::SSL->new(PeerAddr => $_, Domain => AF_INET)
     } @saddr;
 
     if (keys(%$cache) != 6) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/signal-readline.t 
new/IO-Socket-SSL-2.015/t/signal-readline.t
--- old/IO-Socket-SSL-2.013/t/signal-readline.t 2015-04-17 14:06:34.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/signal-readline.t 2015-05-13 22:11:54.000000000 
+0200
@@ -36,6 +36,7 @@
     close($server);
     my $client = IO::Socket::SSL->new(
        PeerAddr => $saddr,
+       Domain => AF_INET,
        SSL_verify_mode => 0
     ) || print "not ";
     ok( "client ssl connect" );
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/sni.t 
new/IO-Socket-SSL-2.015/t/sni.t
--- old/IO-Socket-SSL-2.013/t/sni.t     2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/sni.t     2015-05-13 22:12:07.000000000 +0200
@@ -59,6 +59,7 @@
     for my $host (@tests) {
        my $client = IO::Socket::SSL->new(
            PeerAddr => $saddr,
+           Domain => AF_INET,
            SSL_verify_mode => 1,
            SSL_hostname => $host,
            SSL_ca_file => 'certs/my-ca.pem',
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/sni_verify.t 
new/IO-Socket-SSL-2.015/t/sni_verify.t
--- old/IO-Socket-SSL-2.013/t/sni_verify.t      2015-04-17 14:06:34.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/sni_verify.t      2015-05-13 22:12:14.000000000 
+0200
@@ -60,6 +60,7 @@
     for my $host (@tests) {
        my $client = IO::Socket::SSL->new(
            PeerAddr => $saddr,
+           Domain => AF_INET,
            SSL_verify_mode => 1,
            SSL_hostname => $host,
            SSL_ca_file => 'certs/my-ca.pem',
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/sysread_write.t 
new/IO-Socket-SSL-2.015/t/sysread_write.t
--- old/IO-Socket-SSL-2.013/t/sysread_write.t   2015-04-17 14:06:34.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/sysread_write.t   2015-05-13 22:12:22.000000000 
+0200
@@ -47,6 +47,7 @@
 
     my $to_server = IO::Socket::SSL->new(
        PeerAddr => $saddr,
+       Domain => AF_INET,
        SSL_ca_file => "certs/test-ca.pem",
     ) || do {
        print "not ok: connect failed: $!\n";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/verify_hostname.t 
new/IO-Socket-SSL-2.015/t/verify_hostname.t
--- old/IO-Socket-SSL-2.013/t/verify_hostname.t 2015-05-01 17:13:41.000000000 
+0200
+++ new/IO-Socket-SSL-2.015/t/verify_hostname.t 2015-05-13 22:12:37.000000000 
+0200
@@ -39,6 +39,7 @@
     close($server);
     my $client = IO::Socket::SSL->new(
        PeerAddr => $saddr,
+       Domain => AF_INET,
        SSL_verify_mode => 0
     ) || print "not ";
     ok( "client ssl connect" );
@@ -109,6 +110,7 @@
 if ( $pid == 0 ) {
     IO::Socket::SSL->new(
        PeerAddr => $saddr,
+       Domain => AF_INET,
        SSL_ca_file => "certs/test-ca.pem",
        SSL_verify_mode => 1,
        SSL_verifycn_scheme => 'www',
@@ -125,6 +127,7 @@
 if ( $pid == 0 ) {
     if (IO::Socket::SSL->new(
        PeerAddr => $saddr,
+       Domain => AF_INET,
        SSL_ca_file => "certs/test-ca.pem",
        SSL_verify_mode => 1,
        SSL_verifycn_scheme => 'www',


Reply via email to