From 46a5435ffc32293ee8a53b57936b9844666798af Mon Sep 17 00:00:00 2001
From: Paul Howarth <[email protected]>
Date: Tue, 14 Feb 2017 11:52:13 +0000
Subject: Update to 2.045

- New upstream release 2.045
  - Fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
    objects (GH#55)
  - Optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD if
    perl is compiled without thread support
  - Small fix in t/protocol_version.t to use older versions of Net::SSLeay with
    openssl build without SSLv3 support
  - When setting SSL_keepSocketOnError to true the socket will not be closed on
    fatal error (GH#53, modified)
- Update patches as needed
---
 ...-SSL-2.044-use-system-default-SSL-version.patch | 36 --------
 ...-SSL-2.044-use-system-default-cipher-list.patch | 98 ----------------------
 ...-SSL-2.045-use-system-default-SSL-version.patch | 36 ++++++++
 ...-SSL-2.045-use-system-default-cipher-list.patch | 98 ++++++++++++++++++++++
 perl-IO-Socket-SSL.spec                            | 27 ++++--
 sources                                            |  2 +-
 6 files changed, 155 insertions(+), 142 deletions(-)
 delete mode 100644 IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
 delete mode 100644 IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
 create mode 100644 IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
 create mode 100644 IO-Socket-SSL-2.045-use-system-default-cipher-list.patch

diff --git a/IO-Socket-SSL-2.044-use-system-default-SSL-version.patch 
b/IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
deleted file mode 100644
index 90f98c0..0000000
--- a/IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
+++ /dev/null
@@ -1,36 +0,0 @@
---- lib/IO/Socket/SSL.pm
-+++ lib/IO/Socket/SSL.pm
-@@ -99,7 +99,7 @@ my $algo2digest = do {
- # global defaults
- my %DEFAULT_SSL_ARGS = (
-     SSL_check_crl => 0,
--    SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 
as broken
-+    SSL_version => '',
-     SSL_verify_callback => undef,
-     SSL_verifycn_scheme => undef,  # fallback cn verification
-     SSL_verifycn_publicsuffix => undef,  # fallback default list verification
-@@ -2227,7 +2227,7 @@ sub new {
- 
-     my $ssl_op = $DEFAULT_SSL_OP;
- 
--    my $ver;
-+    my $ver = '';
-     for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
-       m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
-       or croak("invalid SSL_version specified");
---- lib/IO/Socket/SSL.pod
-+++ lib/IO/Socket/SSL.pod
-@@ -960,11 +960,12 @@ protocol to the specified version.
- All values are case-insensitive.  Instead of 'TLSv1_1' and 'TLSv1_2' one can
- also use 'TLSv11' and 'TLSv12'.  Support for 'TLSv1_1' and 'TLSv1_2' requires
- recent versions of Net::SSLeay and openssl.
-+The default SSL_version is defined by the underlying cryptographic library.
- 
- Independent from the handshake format you can limit to set of accepted SSL
- versions by adding !version separated by ':'.
- 
--The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
-+For example, 'SSLv23:!SSLv3:!SSLv2' means that the
- handshake format is compatible to SSL2.0 and higher, but that the successful
- handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
- both of these versions have serious security issues and should not be used
diff --git a/IO-Socket-SSL-2.044-use-system-default-cipher-list.patch 
b/IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
deleted file mode 100644
index 8843f16..0000000
--- a/IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
+++ /dev/null
@@ -1,98 +0,0 @@
---- lib/IO/Socket/SSL.pm
-+++ lib/IO/Socket/SSL.pm
-@@ -107,10 +107,10 @@ my %DEFAULT_SSL_ARGS = (
-     SSL_npn_protocols => undef,    # meaning depends whether on server or 
client side
-     SSL_alpn_protocols => undef,   # list of protocols we'll accept/send, for 
example ['http/1.1','spdy/3.1']
- 
--    # https://wiki.mozilla.org/Security/Server_Side_TLS, 2016/04/20
--    # "Old backward compatibility" for best compatibility
--    # .. "Most ciphers that are not clearly broken and dangerous to use are 
supported"
--    SSL_cipher_list => 
'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP',
-+    # Use system-wide default cipher list to support use of system-wide
-+    # crypto policy (#1076390, #1127577, CPAN RT#97816)
-+    # https://fedoraproject.org/wiki/Changes/CryptoPolicy
-+    SSL_cipher_list => 'DEFAULT',
- );
- 
- my %DEFAULT_SSL_CLIENT_ARGS = (
-@@ -120,63 +120,6 @@ my %DEFAULT_SSL_CLIENT_ARGS = (
-     SSL_ca_file => undef,
-     SSL_ca_path => undef,
- 
--    # older versions of F5 BIG-IP hang when getting SSL client hello >255 
bytes
--    # http://support.f5.com/kb/en-us/solutions/public/13000/000/sol13037.html
--    # http://guest:[email protected]/Ticket/Display.html?id=2771
--    # Ubuntu worked around this by disabling TLSv1_2 on the client side for
--    # a while. Later a padding extension was added to OpenSSL to work around
--    # broken F5 but then IronPort croaked because it did not understand this
--    # extension so it was disabled again :(
--    # Firefox, Chrome and IE11 use TLSv1_2 but use only a few ciphers, so
--    # that packet stays small enough. We try the same here.
--
--    SSL_cipher_list => join(" ",
--
--      # SSLabs report for Chrome 48/OSX. 
--      # This also includes the fewer ciphers Firefox uses.
--      'ECDHE-ECDSA-AES128-GCM-SHA256',
--      'ECDHE-RSA-AES128-GCM-SHA256',
--      'DHE-RSA-AES128-GCM-SHA256',
--      'ECDHE-ECDSA-CHACHA20-POLY1305',
--      'ECDHE-RSA-CHACHA20-POLY1305',
--      'ECDHE-ECDSA-AES256-SHA',
--      'ECDHE-RSA-AES256-SHA',
--      'DHE-RSA-AES256-SHA',
--      'ECDHE-ECDSA-AES128-SHA',
--      'ECDHE-RSA-AES128-SHA',
--      'DHE-RSA-AES128-SHA',
--      'AES128-GCM-SHA256',
--      'AES256-SHA',
--      'AES128-SHA',
--      'DES-CBC3-SHA',
--
--      # IE11/Edge has some more ciphers, notably SHA384 and DSS
--      # we don't offer the *-AES128-SHA256 and *-AES256-SHA384 non-GCM
--      # ciphers IE/Edge offers because they look like a large mismatch
--      # between a very strong HMAC and a comparably weak (but sufficient)
--      # encryption. Similar all browsers which do SHA384 can do ECDHE
--      # so skip the DHE*SHA384 ciphers.
--      'ECDHE-RSA-AES256-GCM-SHA384',
--      'ECDHE-ECDSA-AES256-GCM-SHA384',
--      # 'ECDHE-RSA-AES256-SHA384',
--      # 'ECDHE-ECDSA-AES256-SHA384',
--      # 'ECDHE-RSA-AES128-SHA256',
--      # 'ECDHE-ECDSA-AES128-SHA256',
--      # 'DHE-RSA-AES256-GCM-SHA384',
--      # 'AES256-GCM-SHA384',
--      'AES256-SHA256',
--      # 'AES128-SHA256',
--      'DHE-DSS-AES256-SHA256',
--      # 'DHE-DSS-AES128-SHA256',
--      'DHE-DSS-AES256-SHA',
--      'DHE-DSS-AES128-SHA',
--      'EDH-DSS-DES-CBC3-SHA',
--
--      # Just to make sure, that we don't accidentally add bad ciphers above.
--      # This includes dropping RC4 which is no longer supported by modern
--      # browsers and also excluded in the SSL libraries of Python and Ruby.
--      "!EXP !MEDIUM !LOW !eNULL !aNULL !RC4 !DES !MD5 !PSK !SRP"
--    )
- );
- 
- # set values inside _init to work with perlcc, RT#95452
---- lib/IO/Socket/SSL.pod
-+++ lib/IO/Socket/SSL.pod
-@@ -986,12 +986,8 @@ documentation (L<http://www.openssl.org/
- for more details.
- 
- Unless you fail to contact your peer because of no shared ciphers it is
--recommended to leave this option at the default setting. The default setting
--prefers ciphers with forward secrecy, disables anonymous authentication and
--disables known insecure ciphers like MD5, DES etc. This gives a grade A result
--at the tests of SSL Labs.
--To use the less secure OpenSSL builtin default (whatever this is) set
--SSL_cipher_list to ''.
-+recommended to leave this option at the default setting, which honors the
-+system-wide DEFAULT cipher list.
- 
- In case different cipher lists are needed for different SNI hosts a hash can 
be
- given with the host as key and the cipher suite as value, similar to
diff --git a/IO-Socket-SSL-2.045-use-system-default-SSL-version.patch 
b/IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
new file mode 100644
index 0000000..6fb68cd
--- /dev/null
+++ b/IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
@@ -0,0 +1,36 @@
+--- lib/IO/Socket/SSL.pm
++++ lib/IO/Socket/SSL.pm
+@@ -102,7 +102,7 @@ my $algo2digest = do {
+ # global defaults
+ my %DEFAULT_SSL_ARGS = (
+     SSL_check_crl => 0,
+-    SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 
as broken
++    SSL_version => '',
+     SSL_verify_callback => undef,
+     SSL_verifycn_scheme => undef,  # fallback cn verification
+     SSL_verifycn_publicsuffix => undef,  # fallback default list verification
+@@ -2233,7 +2233,7 @@ sub new {
+ 
+     my $ssl_op = $DEFAULT_SSL_OP;
+ 
+-    my $ver;
++    my $ver = '';
+     for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
+       m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
+       or croak("invalid SSL_version specified");
+--- lib/IO/Socket/SSL.pod
++++ lib/IO/Socket/SSL.pod
+@@ -967,11 +967,12 @@ protocol to the specified version.
+ All values are case-insensitive.  Instead of 'TLSv1_1' and 'TLSv1_2' one can
+ also use 'TLSv11' and 'TLSv12'.  Support for 'TLSv1_1' and 'TLSv1_2' requires
+ recent versions of Net::SSLeay and openssl.
++The default SSL_version is defined by the underlying cryptographic library.
+ 
+ Independent from the handshake format you can limit to set of accepted SSL
+ versions by adding !version separated by ':'.
+ 
+-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
++For example, 'SSLv23:!SSLv3:!SSLv2' means that the
+ handshake format is compatible to SSL2.0 and higher, but that the successful
+ handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
+ both of these versions have serious security issues and should not be used
diff --git a/IO-Socket-SSL-2.045-use-system-default-cipher-list.patch 
b/IO-Socket-SSL-2.045-use-system-default-cipher-list.patch
new file mode 100644
index 0000000..1dd9c4d
--- /dev/null
+++ b/IO-Socket-SSL-2.045-use-system-default-cipher-list.patch
@@ -0,0 +1,98 @@
+--- lib/IO/Socket/SSL.pm
++++ lib/IO/Socket/SSL.pm
+@@ -110,10 +110,10 @@ my %DEFAULT_SSL_ARGS = (
+     SSL_npn_protocols => undef,    # meaning depends whether on server or 
client side
+     SSL_alpn_protocols => undef,   # list of protocols we'll accept/send, for 
example ['http/1.1','spdy/3.1']
+ 
+-    # https://wiki.mozilla.org/Security/Server_Side_TLS, 2016/04/20
+-    # "Old backward compatibility" for best compatibility
+-    # .. "Most ciphers that are not clearly broken and dangerous to use are 
supported"
+-    SSL_cipher_list => 
'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP',
++    # Use system-wide default cipher list to support use of system-wide
++    # crypto policy (#1076390, #1127577, CPAN RT#97816)
++    # https://fedoraproject.org/wiki/Changes/CryptoPolicy
++    SSL_cipher_list => 'DEFAULT',
+ );
+ 
+ my %DEFAULT_SSL_CLIENT_ARGS = (
+@@ -123,63 +123,6 @@ my %DEFAULT_SSL_CLIENT_ARGS = (
+     SSL_ca_file => undef,
+     SSL_ca_path => undef,
+ 
+-    # older versions of F5 BIG-IP hang when getting SSL client hello >255 
bytes
+-    # http://support.f5.com/kb/en-us/solutions/public/13000/000/sol13037.html
+-    # http://guest:[email protected]/Ticket/Display.html?id=2771
+-    # Ubuntu worked around this by disabling TLSv1_2 on the client side for
+-    # a while. Later a padding extension was added to OpenSSL to work around
+-    # broken F5 but then IronPort croaked because it did not understand this
+-    # extension so it was disabled again :(
+-    # Firefox, Chrome and IE11 use TLSv1_2 but use only a few ciphers, so
+-    # that packet stays small enough. We try the same here.
+-
+-    SSL_cipher_list => join(" ",
+-
+-      # SSLabs report for Chrome 48/OSX. 
+-      # This also includes the fewer ciphers Firefox uses.
+-      'ECDHE-ECDSA-AES128-GCM-SHA256',
+-      'ECDHE-RSA-AES128-GCM-SHA256',
+-      'DHE-RSA-AES128-GCM-SHA256',
+-      'ECDHE-ECDSA-CHACHA20-POLY1305',
+-      'ECDHE-RSA-CHACHA20-POLY1305',
+-      'ECDHE-ECDSA-AES256-SHA',
+-      'ECDHE-RSA-AES256-SHA',
+-      'DHE-RSA-AES256-SHA',
+-      'ECDHE-ECDSA-AES128-SHA',
+-      'ECDHE-RSA-AES128-SHA',
+-      'DHE-RSA-AES128-SHA',
+-      'AES128-GCM-SHA256',
+-      'AES256-SHA',
+-      'AES128-SHA',
+-      'DES-CBC3-SHA',
+-
+-      # IE11/Edge has some more ciphers, notably SHA384 and DSS
+-      # we don't offer the *-AES128-SHA256 and *-AES256-SHA384 non-GCM
+-      # ciphers IE/Edge offers because they look like a large mismatch
+-      # between a very strong HMAC and a comparably weak (but sufficient)
+-      # encryption. Similar all browsers which do SHA384 can do ECDHE
+-      # so skip the DHE*SHA384 ciphers.
+-      'ECDHE-RSA-AES256-GCM-SHA384',
+-      'ECDHE-ECDSA-AES256-GCM-SHA384',
+-      # 'ECDHE-RSA-AES256-SHA384',
+-      # 'ECDHE-ECDSA-AES256-SHA384',
+-      # 'ECDHE-RSA-AES128-SHA256',
+-      # 'ECDHE-ECDSA-AES128-SHA256',
+-      # 'DHE-RSA-AES256-GCM-SHA384',
+-      # 'AES256-GCM-SHA384',
+-      'AES256-SHA256',
+-      # 'AES128-SHA256',
+-      'DHE-DSS-AES256-SHA256',
+-      # 'DHE-DSS-AES128-SHA256',
+-      'DHE-DSS-AES256-SHA',
+-      'DHE-DSS-AES128-SHA',
+-      'EDH-DSS-DES-CBC3-SHA',
+-
+-      # Just to make sure, that we don't accidentally add bad ciphers above.
+-      # This includes dropping RC4 which is no longer supported by modern
+-      # browsers and also excluded in the SSL libraries of Python and Ruby.
+-      "!EXP !MEDIUM !LOW !eNULL !aNULL !RC4 !DES !MD5 !PSK !SRP"
+-    )
+ );
+ 
+ # set values inside _init to work with perlcc, RT#95452
+--- lib/IO/Socket/SSL.pod
++++ lib/IO/Socket/SSL.pod
+@@ -993,12 +993,8 @@ documentation (L<http://www.openssl.org/
+ for more details.
+ 
+ Unless you fail to contact your peer because of no shared ciphers it is
+-recommended to leave this option at the default setting. The default setting
+-prefers ciphers with forward secrecy, disables anonymous authentication and
+-disables known insecure ciphers like MD5, DES etc. This gives a grade A result
+-at the tests of SSL Labs.
+-To use the less secure OpenSSL builtin default (whatever this is) set
+-SSL_cipher_list to ''.
++recommended to leave this option at the default setting, which honors the
++system-wide DEFAULT cipher list.
+ 
+ In case different cipher lists are needed for different SNI hosts a hash can 
be
+ given with the host as key and the cipher suite as value, similar to
diff --git a/perl-IO-Socket-SSL.spec b/perl-IO-Socket-SSL.spec
index 78202c3..60788d6 100644
--- a/perl-IO-Socket-SSL.spec
+++ b/perl-IO-Socket-SSL.spec
@@ -1,13 +1,13 @@
 Name:          perl-IO-Socket-SSL
-Version:       2.044
-Release:       2%{?dist}
+Version:       2.045
+Release:       1%{?dist}
 Summary:       Perl library for transparent SSL
 Group:         Development/Libraries
 License:       GPL+ or Artistic
 URL:           http://search.cpan.org/dist/IO-Socket-SSL/
 Source0:       
http://search.cpan.org/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz
-Patch0:                IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
-Patch1:                IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
+Patch0:                IO-Socket-SSL-2.045-use-system-default-cipher-list.patch
+Patch1:                IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
 BuildRoot:     %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
 BuildArch:     noarch
 # Module Build
@@ -20,6 +20,7 @@ BuildRequires:        perl(ExtUtils::MakeMaker)
 # Module Runtime
 BuildRequires: openssl >= 0.9.8
 BuildRequires: perl(Carp)
+BuildRequires: perl(Config)
 BuildRequires: perl(constant)
 BuildRequires: perl(Errno)
 BuildRequires: perl(Exporter)
@@ -34,7 +35,6 @@ BuildRequires:        perl(strict)
 BuildRequires: perl(vars)
 BuildRequires: perl(warnings)
 # Test Suite
-BuildRequires: perl(Config)
 BuildRequires: perl(Data::Dumper)
 BuildRequires: perl(File::Temp)
 BuildRequires: perl(FindBin)
@@ -46,6 +46,7 @@ BuildRequires:        procps
 # Runtime
 Requires:      perl(:MODULE_COMPAT_%(eval "`perl -V:version`"; echo $version))
 Requires:      openssl >= 0.9.8
+Requires:      perl(Config)
 Requires:      perl(HTTP::Tiny)
 
 # Use IO::Socket::IP for IPv6 support where available, else IO::Socket::INET6
@@ -116,6 +117,18 @@ rm -rf %{buildroot}
 %{_mandir}/man3/IO::Socket::SSL::Utils.3*
 
 %changelog
+* Tue Feb 14 2017 Paul Howarth <[email protected]> - 2.045-1
+- Update to 2.045
+  - Fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
+    objects (GH#55)
+  - Optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD if
+    perl is compiled without thread support
+  - Small fix in t/protocol_version.t to use older versions of Net::SSLeay with
+    openssl build without SSLv3 support
+  - When setting SSL_keepSocketOnError to true the socket will not be closed on
+    fatal error (GH#53, modified)
+- Update patches as needed
+
 * Sat Feb 11 2017 Fedora Release Engineering <[email protected]> - 
2.044-2
 - Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
 
@@ -177,7 +190,7 @@ rm -rf %{buildroot}
 - Update to 2.035
   - Fixes for issues introduced in 2.034
     - Return with error in configure_SSL if context creation failed; this
-      might otherwise result in an segmentation fault later
+      might otherwise result in a segmentation fault later
     - Apply builtin defaults before any (user configurable) global settings
       (i.e. done with set_defaults, set_default_context...) so that builtins
       don't replace user settings
@@ -541,7 +554,7 @@ rm -rf %{buildroot}
     because of bad setup of the socket; otherwise we get an endless calling of
     the OCSP callback
   - Consider an OCSP response that is not yet or no longer valid a soft error
-    instead of an hard error
+    instead of a hard error
   - Fix skip in t/external/ocsp.t in case fingerprint does not match
   - Call EVP_PKEY_free not EVP_KEY_free in IO::Socket::SSL::Utils::KEY_free
     (CPAN RT#95633)
diff --git a/sources b/sources
index c833f8d..9dca4f2 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-SHA512 (IO-Socket-SSL-2.044.tar.gz) = 
2c92494f795a6dbad8636636e69131689512d6a4c5da68ee19f2fc807b9e7a368b62936a772c3b9aa0d3a1c6bbb7dcf118bb501a30ba91830edeb768b1ce556e
+SHA512 (IO-Socket-SSL-2.045.tar.gz) = 
fa2d1c9ad690965069a2f05a0bcecfd6c03fe3c2d38e50195933a9301c5c2374871eed3da637eaf3556df0c8e60ef8be26491d2d3ca453062079d69d2ce0ffa0
-- 
cgit v1.1


        
https://src.fedoraproject.org/cgit/perl-IO-Socket-SSL.git/commit/?h=master&id=46a5435ffc32293ee8a53b57936b9844666798af
_______________________________________________
perl-devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to