From 46a5435ffc32293ee8a53b57936b9844666798af Mon Sep 17 00:00:00 2001
From: Paul Howarth <[email protected]>
Date: Tue, 14 Feb 2017 11:52:13 +0000
Subject: Update to 2.045
- New upstream release 2.045
- Fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
objects (GH#55)
- Optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD if
perl is compiled without thread support
- Small fix in t/protocol_version.t to use older versions of Net::SSLeay with
openssl build without SSLv3 support
- When setting SSL_keepSocketOnError to true the socket will not be closed on
fatal error (GH#53, modified)
- Update patches as needed
---
...-SSL-2.044-use-system-default-SSL-version.patch | 36 --------
...-SSL-2.044-use-system-default-cipher-list.patch | 98 ----------------------
...-SSL-2.045-use-system-default-SSL-version.patch | 36 ++++++++
...-SSL-2.045-use-system-default-cipher-list.patch | 98 ++++++++++++++++++++++
perl-IO-Socket-SSL.spec | 27 ++++--
sources | 2 +-
6 files changed, 155 insertions(+), 142 deletions(-)
delete mode 100644 IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
delete mode 100644 IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
create mode 100644 IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
create mode 100644 IO-Socket-SSL-2.045-use-system-default-cipher-list.patch
diff --git a/IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
b/IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
deleted file mode 100644
index 90f98c0..0000000
--- a/IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
+++ /dev/null
@@ -1,36 +0,0 @@
---- lib/IO/Socket/SSL.pm
-+++ lib/IO/Socket/SSL.pm
-@@ -99,7 +99,7 @@ my $algo2digest = do {
- # global defaults
- my %DEFAULT_SSL_ARGS = (
- SSL_check_crl => 0,
-- SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0
as broken
-+ SSL_version => '',
- SSL_verify_callback => undef,
- SSL_verifycn_scheme => undef, # fallback cn verification
- SSL_verifycn_publicsuffix => undef, # fallback default list verification
-@@ -2227,7 +2227,7 @@ sub new {
-
- my $ssl_op = $DEFAULT_SSL_OP;
-
-- my $ver;
-+ my $ver = '';
- for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
- m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
- or croak("invalid SSL_version specified");
---- lib/IO/Socket/SSL.pod
-+++ lib/IO/Socket/SSL.pod
-@@ -960,11 +960,12 @@ protocol to the specified version.
- All values are case-insensitive. Instead of 'TLSv1_1' and 'TLSv1_2' one can
- also use 'TLSv11' and 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires
- recent versions of Net::SSLeay and openssl.
-+The default SSL_version is defined by the underlying cryptographic library.
-
- Independent from the handshake format you can limit to set of accepted SSL
- versions by adding !version separated by ':'.
-
--The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
-+For example, 'SSLv23:!SSLv3:!SSLv2' means that the
- handshake format is compatible to SSL2.0 and higher, but that the successful
- handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
- both of these versions have serious security issues and should not be used
diff --git a/IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
b/IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
deleted file mode 100644
index 8843f16..0000000
--- a/IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
+++ /dev/null
@@ -1,98 +0,0 @@
---- lib/IO/Socket/SSL.pm
-+++ lib/IO/Socket/SSL.pm
-@@ -107,10 +107,10 @@ my %DEFAULT_SSL_ARGS = (
- SSL_npn_protocols => undef, # meaning depends whether on server or
client side
- SSL_alpn_protocols => undef, # list of protocols we'll accept/send, for
example ['http/1.1','spdy/3.1']
-
-- # https://wiki.mozilla.org/Security/Server_Side_TLS, 2016/04/20
-- # "Old backward compatibility" for best compatibility
-- # .. "Most ciphers that are not clearly broken and dangerous to use are
supported"
-- SSL_cipher_list =>
'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP',
-+ # Use system-wide default cipher list to support use of system-wide
-+ # crypto policy (#1076390, #1127577, CPAN RT#97816)
-+ # https://fedoraproject.org/wiki/Changes/CryptoPolicy
-+ SSL_cipher_list => 'DEFAULT',
- );
-
- my %DEFAULT_SSL_CLIENT_ARGS = (
-@@ -120,63 +120,6 @@ my %DEFAULT_SSL_CLIENT_ARGS = (
- SSL_ca_file => undef,
- SSL_ca_path => undef,
-
-- # older versions of F5 BIG-IP hang when getting SSL client hello >255
bytes
-- # http://support.f5.com/kb/en-us/solutions/public/13000/000/sol13037.html
-- # http://guest:[email protected]/Ticket/Display.html?id=2771
-- # Ubuntu worked around this by disabling TLSv1_2 on the client side for
-- # a while. Later a padding extension was added to OpenSSL to work around
-- # broken F5 but then IronPort croaked because it did not understand this
-- # extension so it was disabled again :(
-- # Firefox, Chrome and IE11 use TLSv1_2 but use only a few ciphers, so
-- # that packet stays small enough. We try the same here.
--
-- SSL_cipher_list => join(" ",
--
-- # SSLabs report for Chrome 48/OSX.
-- # This also includes the fewer ciphers Firefox uses.
-- 'ECDHE-ECDSA-AES128-GCM-SHA256',
-- 'ECDHE-RSA-AES128-GCM-SHA256',
-- 'DHE-RSA-AES128-GCM-SHA256',
-- 'ECDHE-ECDSA-CHACHA20-POLY1305',
-- 'ECDHE-RSA-CHACHA20-POLY1305',
-- 'ECDHE-ECDSA-AES256-SHA',
-- 'ECDHE-RSA-AES256-SHA',
-- 'DHE-RSA-AES256-SHA',
-- 'ECDHE-ECDSA-AES128-SHA',
-- 'ECDHE-RSA-AES128-SHA',
-- 'DHE-RSA-AES128-SHA',
-- 'AES128-GCM-SHA256',
-- 'AES256-SHA',
-- 'AES128-SHA',
-- 'DES-CBC3-SHA',
--
-- # IE11/Edge has some more ciphers, notably SHA384 and DSS
-- # we don't offer the *-AES128-SHA256 and *-AES256-SHA384 non-GCM
-- # ciphers IE/Edge offers because they look like a large mismatch
-- # between a very strong HMAC and a comparably weak (but sufficient)
-- # encryption. Similar all browsers which do SHA384 can do ECDHE
-- # so skip the DHE*SHA384 ciphers.
-- 'ECDHE-RSA-AES256-GCM-SHA384',
-- 'ECDHE-ECDSA-AES256-GCM-SHA384',
-- # 'ECDHE-RSA-AES256-SHA384',
-- # 'ECDHE-ECDSA-AES256-SHA384',
-- # 'ECDHE-RSA-AES128-SHA256',
-- # 'ECDHE-ECDSA-AES128-SHA256',
-- # 'DHE-RSA-AES256-GCM-SHA384',
-- # 'AES256-GCM-SHA384',
-- 'AES256-SHA256',
-- # 'AES128-SHA256',
-- 'DHE-DSS-AES256-SHA256',
-- # 'DHE-DSS-AES128-SHA256',
-- 'DHE-DSS-AES256-SHA',
-- 'DHE-DSS-AES128-SHA',
-- 'EDH-DSS-DES-CBC3-SHA',
--
-- # Just to make sure, that we don't accidentally add bad ciphers above.
-- # This includes dropping RC4 which is no longer supported by modern
-- # browsers and also excluded in the SSL libraries of Python and Ruby.
-- "!EXP !MEDIUM !LOW !eNULL !aNULL !RC4 !DES !MD5 !PSK !SRP"
-- )
- );
-
- # set values inside _init to work with perlcc, RT#95452
---- lib/IO/Socket/SSL.pod
-+++ lib/IO/Socket/SSL.pod
-@@ -986,12 +986,8 @@ documentation (L<http://www.openssl.org/
- for more details.
-
- Unless you fail to contact your peer because of no shared ciphers it is
--recommended to leave this option at the default setting. The default setting
--prefers ciphers with forward secrecy, disables anonymous authentication and
--disables known insecure ciphers like MD5, DES etc. This gives a grade A result
--at the tests of SSL Labs.
--To use the less secure OpenSSL builtin default (whatever this is) set
--SSL_cipher_list to ''.
-+recommended to leave this option at the default setting, which honors the
-+system-wide DEFAULT cipher list.
-
- In case different cipher lists are needed for different SNI hosts a hash can
be
- given with the host as key and the cipher suite as value, similar to
diff --git a/IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
b/IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
new file mode 100644
index 0000000..6fb68cd
--- /dev/null
+++ b/IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
@@ -0,0 +1,36 @@
+--- lib/IO/Socket/SSL.pm
++++ lib/IO/Socket/SSL.pm
+@@ -102,7 +102,7 @@ my $algo2digest = do {
+ # global defaults
+ my %DEFAULT_SSL_ARGS = (
+ SSL_check_crl => 0,
+- SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0
as broken
++ SSL_version => '',
+ SSL_verify_callback => undef,
+ SSL_verifycn_scheme => undef, # fallback cn verification
+ SSL_verifycn_publicsuffix => undef, # fallback default list verification
+@@ -2233,7 +2233,7 @@ sub new {
+
+ my $ssl_op = $DEFAULT_SSL_OP;
+
+- my $ver;
++ my $ver = '';
+ for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
+ m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
+ or croak("invalid SSL_version specified");
+--- lib/IO/Socket/SSL.pod
++++ lib/IO/Socket/SSL.pod
+@@ -967,11 +967,12 @@ protocol to the specified version.
+ All values are case-insensitive. Instead of 'TLSv1_1' and 'TLSv1_2' one can
+ also use 'TLSv11' and 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires
+ recent versions of Net::SSLeay and openssl.
++The default SSL_version is defined by the underlying cryptographic library.
+
+ Independent from the handshake format you can limit to set of accepted SSL
+ versions by adding !version separated by ':'.
+
+-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
++For example, 'SSLv23:!SSLv3:!SSLv2' means that the
+ handshake format is compatible to SSL2.0 and higher, but that the successful
+ handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
+ both of these versions have serious security issues and should not be used
diff --git a/IO-Socket-SSL-2.045-use-system-default-cipher-list.patch
b/IO-Socket-SSL-2.045-use-system-default-cipher-list.patch
new file mode 100644
index 0000000..1dd9c4d
--- /dev/null
+++ b/IO-Socket-SSL-2.045-use-system-default-cipher-list.patch
@@ -0,0 +1,98 @@
+--- lib/IO/Socket/SSL.pm
++++ lib/IO/Socket/SSL.pm
+@@ -110,10 +110,10 @@ my %DEFAULT_SSL_ARGS = (
+ SSL_npn_protocols => undef, # meaning depends whether on server or
client side
+ SSL_alpn_protocols => undef, # list of protocols we'll accept/send, for
example ['http/1.1','spdy/3.1']
+
+- # https://wiki.mozilla.org/Security/Server_Side_TLS, 2016/04/20
+- # "Old backward compatibility" for best compatibility
+- # .. "Most ciphers that are not clearly broken and dangerous to use are
supported"
+- SSL_cipher_list =>
'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-DES-CBC3-SHA:ECDHE-ECDSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:DES-CBC3-SHA:HIGH:SEED:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!RSAPSK:!aDH:!aECDH:!EDH-DSS-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA:!SRP',
++ # Use system-wide default cipher list to support use of system-wide
++ # crypto policy (#1076390, #1127577, CPAN RT#97816)
++ # https://fedoraproject.org/wiki/Changes/CryptoPolicy
++ SSL_cipher_list => 'DEFAULT',
+ );
+
+ my %DEFAULT_SSL_CLIENT_ARGS = (
+@@ -123,63 +123,6 @@ my %DEFAULT_SSL_CLIENT_ARGS = (
+ SSL_ca_file => undef,
+ SSL_ca_path => undef,
+
+- # older versions of F5 BIG-IP hang when getting SSL client hello >255
bytes
+- # http://support.f5.com/kb/en-us/solutions/public/13000/000/sol13037.html
+- # http://guest:[email protected]/Ticket/Display.html?id=2771
+- # Ubuntu worked around this by disabling TLSv1_2 on the client side for
+- # a while. Later a padding extension was added to OpenSSL to work around
+- # broken F5 but then IronPort croaked because it did not understand this
+- # extension so it was disabled again :(
+- # Firefox, Chrome and IE11 use TLSv1_2 but use only a few ciphers, so
+- # that packet stays small enough. We try the same here.
+-
+- SSL_cipher_list => join(" ",
+-
+- # SSLabs report for Chrome 48/OSX.
+- # This also includes the fewer ciphers Firefox uses.
+- 'ECDHE-ECDSA-AES128-GCM-SHA256',
+- 'ECDHE-RSA-AES128-GCM-SHA256',
+- 'DHE-RSA-AES128-GCM-SHA256',
+- 'ECDHE-ECDSA-CHACHA20-POLY1305',
+- 'ECDHE-RSA-CHACHA20-POLY1305',
+- 'ECDHE-ECDSA-AES256-SHA',
+- 'ECDHE-RSA-AES256-SHA',
+- 'DHE-RSA-AES256-SHA',
+- 'ECDHE-ECDSA-AES128-SHA',
+- 'ECDHE-RSA-AES128-SHA',
+- 'DHE-RSA-AES128-SHA',
+- 'AES128-GCM-SHA256',
+- 'AES256-SHA',
+- 'AES128-SHA',
+- 'DES-CBC3-SHA',
+-
+- # IE11/Edge has some more ciphers, notably SHA384 and DSS
+- # we don't offer the *-AES128-SHA256 and *-AES256-SHA384 non-GCM
+- # ciphers IE/Edge offers because they look like a large mismatch
+- # between a very strong HMAC and a comparably weak (but sufficient)
+- # encryption. Similar all browsers which do SHA384 can do ECDHE
+- # so skip the DHE*SHA384 ciphers.
+- 'ECDHE-RSA-AES256-GCM-SHA384',
+- 'ECDHE-ECDSA-AES256-GCM-SHA384',
+- # 'ECDHE-RSA-AES256-SHA384',
+- # 'ECDHE-ECDSA-AES256-SHA384',
+- # 'ECDHE-RSA-AES128-SHA256',
+- # 'ECDHE-ECDSA-AES128-SHA256',
+- # 'DHE-RSA-AES256-GCM-SHA384',
+- # 'AES256-GCM-SHA384',
+- 'AES256-SHA256',
+- # 'AES128-SHA256',
+- 'DHE-DSS-AES256-SHA256',
+- # 'DHE-DSS-AES128-SHA256',
+- 'DHE-DSS-AES256-SHA',
+- 'DHE-DSS-AES128-SHA',
+- 'EDH-DSS-DES-CBC3-SHA',
+-
+- # Just to make sure, that we don't accidentally add bad ciphers above.
+- # This includes dropping RC4 which is no longer supported by modern
+- # browsers and also excluded in the SSL libraries of Python and Ruby.
+- "!EXP !MEDIUM !LOW !eNULL !aNULL !RC4 !DES !MD5 !PSK !SRP"
+- )
+ );
+
+ # set values inside _init to work with perlcc, RT#95452
+--- lib/IO/Socket/SSL.pod
++++ lib/IO/Socket/SSL.pod
+@@ -993,12 +993,8 @@ documentation (L<http://www.openssl.org/
+ for more details.
+
+ Unless you fail to contact your peer because of no shared ciphers it is
+-recommended to leave this option at the default setting. The default setting
+-prefers ciphers with forward secrecy, disables anonymous authentication and
+-disables known insecure ciphers like MD5, DES etc. This gives a grade A result
+-at the tests of SSL Labs.
+-To use the less secure OpenSSL builtin default (whatever this is) set
+-SSL_cipher_list to ''.
++recommended to leave this option at the default setting, which honors the
++system-wide DEFAULT cipher list.
+
+ In case different cipher lists are needed for different SNI hosts a hash can
be
+ given with the host as key and the cipher suite as value, similar to
diff --git a/perl-IO-Socket-SSL.spec b/perl-IO-Socket-SSL.spec
index 78202c3..60788d6 100644
--- a/perl-IO-Socket-SSL.spec
+++ b/perl-IO-Socket-SSL.spec
@@ -1,13 +1,13 @@
Name: perl-IO-Socket-SSL
-Version: 2.044
-Release: 2%{?dist}
+Version: 2.045
+Release: 1%{?dist}
Summary: Perl library for transparent SSL
Group: Development/Libraries
License: GPL+ or Artistic
URL: http://search.cpan.org/dist/IO-Socket-SSL/
Source0:
http://search.cpan.org/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz
-Patch0: IO-Socket-SSL-2.044-use-system-default-cipher-list.patch
-Patch1: IO-Socket-SSL-2.044-use-system-default-SSL-version.patch
+Patch0: IO-Socket-SSL-2.045-use-system-default-cipher-list.patch
+Patch1: IO-Socket-SSL-2.045-use-system-default-SSL-version.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
BuildArch: noarch
# Module Build
@@ -20,6 +20,7 @@ BuildRequires: perl(ExtUtils::MakeMaker)
# Module Runtime
BuildRequires: openssl >= 0.9.8
BuildRequires: perl(Carp)
+BuildRequires: perl(Config)
BuildRequires: perl(constant)
BuildRequires: perl(Errno)
BuildRequires: perl(Exporter)
@@ -34,7 +35,6 @@ BuildRequires: perl(strict)
BuildRequires: perl(vars)
BuildRequires: perl(warnings)
# Test Suite
-BuildRequires: perl(Config)
BuildRequires: perl(Data::Dumper)
BuildRequires: perl(File::Temp)
BuildRequires: perl(FindBin)
@@ -46,6 +46,7 @@ BuildRequires: procps
# Runtime
Requires: perl(:MODULE_COMPAT_%(eval "`perl -V:version`"; echo $version))
Requires: openssl >= 0.9.8
+Requires: perl(Config)
Requires: perl(HTTP::Tiny)
# Use IO::Socket::IP for IPv6 support where available, else IO::Socket::INET6
@@ -116,6 +117,18 @@ rm -rf %{buildroot}
%{_mandir}/man3/IO::Socket::SSL::Utils.3*
%changelog
+* Tue Feb 14 2017 Paul Howarth <[email protected]> - 2.045-1
+- Update to 2.045
+ - Fixed memory leak caused by not destroying CREATED_IN_THIS_THREAD for SSL
+ objects (GH#55)
+ - Optimization: don't track SSL objects and CTX in *CREATED_IN_THIS_THREAD if
+ perl is compiled without thread support
+ - Small fix in t/protocol_version.t to use older versions of Net::SSLeay with
+ openssl build without SSLv3 support
+ - When setting SSL_keepSocketOnError to true the socket will not be closed on
+ fatal error (GH#53, modified)
+- Update patches as needed
+
* Sat Feb 11 2017 Fedora Release Engineering <[email protected]> -
2.044-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
@@ -177,7 +190,7 @@ rm -rf %{buildroot}
- Update to 2.035
- Fixes for issues introduced in 2.034
- Return with error in configure_SSL if context creation failed; this
- might otherwise result in an segmentation fault later
+ might otherwise result in a segmentation fault later
- Apply builtin defaults before any (user configurable) global settings
(i.e. done with set_defaults, set_default_context...) so that builtins
don't replace user settings
@@ -541,7 +554,7 @@ rm -rf %{buildroot}
because of bad setup of the socket; otherwise we get an endless calling of
the OCSP callback
- Consider an OCSP response that is not yet or no longer valid a soft error
- instead of an hard error
+ instead of a hard error
- Fix skip in t/external/ocsp.t in case fingerprint does not match
- Call EVP_PKEY_free not EVP_KEY_free in IO::Socket::SSL::Utils::KEY_free
(CPAN RT#95633)
diff --git a/sources b/sources
index c833f8d..9dca4f2 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-SHA512 (IO-Socket-SSL-2.044.tar.gz) =
2c92494f795a6dbad8636636e69131689512d6a4c5da68ee19f2fc807b9e7a368b62936a772c3b9aa0d3a1c6bbb7dcf118bb501a30ba91830edeb768b1ce556e
+SHA512 (IO-Socket-SSL-2.045.tar.gz) =
fa2d1c9ad690965069a2f05a0bcecfd6c03fe3c2d38e50195933a9301c5c2374871eed3da637eaf3556df0c8e60ef8be26491d2d3ca453062079d69d2ce0ffa0
--
cgit v1.1
https://src.fedoraproject.org/cgit/perl-IO-Socket-SSL.git/commit/?h=master&id=46a5435ffc32293ee8a53b57936b9844666798af
_______________________________________________
perl-devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]