pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/p5-Net-SSLeay
Module Name: pkgsrc
Committed By: sno
Date: Thu May 31 08:46:11 UTC 2012
Modified Files:
pkgsrc/security/p5-Net-SSLeay: Makefile distinfo
Log Message:
Updating package for CPAN module Net::SSLeay in security/p5-Net-SSLeay
from 1.45 to 1.48.
Upstream changes since 1.45:
1.48 2012-04-25
Removed unneeded Debian_CPANTS.txt from MANIFEST.
Fixed incorrect documentation about the best way to call CTX_set_options.
Fixed problem that caused Undefined subroutine utf8::encode @
t/local/33_x509_create_cert.t (on perl 5.6.2). Thanks to kmx.
In examples and pod documentations, changed #!/usr/local/bin/perl to
#!/usr/bin/perl.
t/local/06_tcpecho.t now tries a number of ports to bind to until
successful.
1.47 2012-04-04
Fixed overlong lines in pod, patch from Salvatore Bonaccorso, Debian Perl
Group
Fixed spelling errors in pod, patch from Salvatore Bonaccorso, Debian Perl
Group
Fixed extra "garbage" files in 1.46 tarball. Patch from kmx.
Fixed incorrect fail reports on some 64 bit platforms. Patch from paul.
Fix to avoid FAIL reports from cpantesters with missing openssl
Use my_snprintf from ppport.h to prevent link failures with perl 5.8 and
earlier when compiled with MSVC.
1.46 2012-04-03
Fixed a problem reported by Atoomic:
When bootstrapping Net::SSleay ( with DynaLoader ) if you override the
SIG{DIE} signal, using
Net::SSLeay will result in an error.
Recreated META.yml, added META.yml to dist
Fixed typo: the word "corresponding" was mis-spelled as "coresponding"
throughout the POD. Patched by kmx.
Updated META.yml to include repository and bugtracker
Constants cleanup - removing non existing constants (perhaps from
pre-0.9.6 era) - kmx
Automatic constants.c generation via
helper_script/regen_openssl_constants.pl - kmx
Future changes in constants now under better control via
t/local/21_constants.t - kmx
Added missing new files
Reordering @EXPORT_OK (constants first, functions next) - kmx
Adding missing 51 constants to @EXPORT_OK + test to keep it in sync - kmx
Instructions "howto add new constant" added to
helper_script/regen_openssl_constants.pl - kmx
NEWLY INTRODUCED CONSTANTS:
- Net::SSLeay::ASN1_STRFLGS_ESC_CTRL
- Net::SSLeay::ASN1_STRFLGS_ESC_MSB
- Net::SSLeay::ASN1_STRFLGS_ESC_QUOTE
- Net::SSLeay::ASN1_STRFLGS_RFC2253
- Net::SSLeay::ERROR_WANT_ACCEPT
- Net::SSLeay::EVP_PKS_DSA
- Net::SSLeay::EVP_PKS_EC
- Net::SSLeay::EVP_PKS_RSA
- Net::SSLeay::EVP_PKT_ENC
- Net::SSLeay::EVP_PKT_EXCH
- Net::SSLeay::EVP_PKT_EXP
- Net::SSLeay::EVP_PKT_SIGN
- Net::SSLeay::EVP_PK_DH
- Net::SSLeay::EVP_PK_DSA
- Net::SSLeay::EVP_PK_EC
- Net::SSLeay::EVP_PK_RSA
- Net::SSLeay::MBSTRING_ASC
- Net::SSLeay::MBSTRING_BMP
- Net::SSLeay::MBSTRING_FLAG
- Net::SSLeay::MBSTRING_UNIV
- Net::SSLeay::MBSTRING_UTF8
- Net::SSLeay::OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
- Net::SSLeay::OP_CISCO_ANYCONNECT
- Net::SSLeay::OP_CRYPTOPRO_TLSEXT_BUG
- Net::SSLeay::OP_LEGACY_SERVER_CONNECT
- Net::SSLeay::OP_NO_TLSv1_1
- Net::SSLeay::OP_NO_TLSv1_2
- Net::SSLeay::OP_SINGLE_ECDH_USE
- Net::SSLeay::OP_TLS_BLOCK_PADDING_BUG
- Net::SSLeay::X509_V_FLAG_CHECK_SS_SIGNATURE
- Net::SSLeay::X509_V_FLAG_EXTENDED_CRL_SUPPORT
- Net::SSLeay::X509_V_FLAG_POLICY_MASK
- Net::SSLeay::X509_V_FLAG_USE_DELTAS
- Net::SSLeay::X509_V_OK
- Net::SSLeay::XN_FLAG_COMPAT
- Net::SSLeay::XN_FLAG_DN_REV
- Net::SSLeay::XN_FLAG_DUMP_UNKNOWN_FIELDS
- Net::SSLeay::XN_FLAG_FN_ALIGN
- Net::SSLeay::XN_FLAG_FN_LN
- Net::SSLeay::XN_FLAG_FN_MASK
- Net::SSLeay::XN_FLAG_FN_NONE
- Net::SSLeay::XN_FLAG_FN_OID
- Net::SSLeay::XN_FLAG_FN_SN
- Net::SSLeay::XN_FLAG_MULTILINE
- Net::SSLeay::XN_FLAG_ONELINE
- Net::SSLeay::XN_FLAG_RFC2253
- Net::SSLeay::XN_FLAG_SEP_COMMA_PLUS
- Net::SSLeay::XN_FLAG_SEP_CPLUS_SPC
- Net::SSLeay::XN_FLAG_SEP_MASK
- Net::SSLeay::XN_FLAG_SEP_MULTILINE
- Net::SSLeay::XN_FLAG_SEP_SPLUS_SPC
- Net::SSLeay::XN_FLAG_SPC_EQ
A number of tests were present in svn, but missing from MANIFEST, and
were therefore not included in the dist. Added.
NEWLY INTRODUCED FUNCTIONS:
- Net::SSLeay::ASN1_INTEGER_free
- Net::SSLeay::ASN1_INTEGER_get
- Net::SSLeay::ASN1_INTEGER_new
- Net::SSLeay::ASN1_INTEGER_set
- Net::SSLeay::EVP_PKEY_assign_RSA
- Net::SSLeay::EVP_PKEY_bits
- Net::SSLeay::EVP_PKEY_free
- Net::SSLeay::EVP_PKEY_new
- Net::SSLeay::EVP_PKEY_size
- Net::SSLeay::EVP_get_cipherbyname
- Net::SSLeay::OPENSSL_add_all_algorithms_conf
- Net::SSLeay::OPENSSL_add_all_algorithms_noconf
- Net::SSLeay::OpenSSL_add_all_algorithms
- Net::SSLeay::PEM_get_string_PrivateKey
- Net::SSLeay::PEM_get_string_X509_CRL
- Net::SSLeay::PEM_get_string_X509_REQ
- Net::SSLeay::PEM_read_bio_PrivateKey
- Net::SSLeay::PEM_read_bio_X509
- Net::SSLeay::PEM_read_bio_X509_REQ
- Net::SSLeay::P_ASN1_INTEGER_get_dec
- Net::SSLeay::P_ASN1_INTEGER_get_hex
- Net::SSLeay::P_ASN1_INTEGER_set_dec
- Net::SSLeay::P_ASN1_INTEGER_set_hex
- Net::SSLeay::P_ASN1_STRING_get
- Net::SSLeay::P_X509_CRL_add_revoked_serial_hex
- Net::SSLeay::P_X509_CRL_get_serial
- Net::SSLeay::P_X509_CRL_set_serial
- Net::SSLeay::P_X509_REQ_add_extensions
- Net::SSLeay::P_X509_REQ_get_attr
- Net::SSLeay::P_X509_add_extensions
- Net::SSLeay::P_X509_copy_extensions
- Net::SSLeay::P_X509_get_crl_distribution_points
- Net::SSLeay::P_X509_get_ext_key_usage
- Net::SSLeay::P_X509_get_key_usage
- Net::SSLeay::P_X509_get_netscape_cert_type
- Net::SSLeay::P_X509_get_pubkey_alg
- Net::SSLeay::P_X509_get_signature_alg
- Net::SSLeay::P_PKCS12_load_file
- Net::SSLeay::X509V3_EXT_print
- Net::SSLeay::X509_CRL_digest
- Net::SSLeay::X509_CRL_free
- Net::SSLeay::X509_CRL_get_issuer
- Net::SSLeay::X509_CRL_get_lastUpdate
- Net::SSLeay::X509_CRL_get_nextUpdate
- Net::SSLeay::X509_CRL_get_version
- Net::SSLeay::X509_CRL_new
- Net::SSLeay::X509_CRL_set_issuer_name
- Net::SSLeay::X509_CRL_set_lastUpdate
- Net::SSLeay::X509_CRL_set_nextUpdate
- Net::SSLeay::X509_CRL_set_version
- Net::SSLeay::X509_CRL_sign
- Net::SSLeay::X509_CRL_sort
- Net::SSLeay::X509_CRL_verify
- Net::SSLeay::X509_EXTENSION_get_critical
- Net::SSLeay::X509_EXTENSION_get_data
- Net::SSLeay::X509_EXTENSION_get_object
- Net::SSLeay::X509_NAME_ENTRY_get_data
- Net::SSLeay::X509_NAME_ENTRY_get_object
- Net::SSLeay::X509_NAME_add_entry_by_NID
- Net::SSLeay::X509_NAME_add_entry_by_OBJ
- Net::SSLeay::X509_NAME_add_entry_by_txt
- Net::SSLeay::X509_NAME_cmp
- Net::SSLeay::X509_NAME_digest
- Net::SSLeay::X509_NAME_entry_count
- Net::SSLeay::X509_NAME_get_entry
- Net::SSLeay::X509_NAME_print_ex
- Net::SSLeay::X509_REQ_add1_attr_by_NID
- Net::SSLeay::X509_REQ_digest
- Net::SSLeay::X509_REQ_free
- Net::SSLeay::X509_REQ_get_attr_by_NID
- Net::SSLeay::X509_REQ_get_attr_by_OBJ
- Net::SSLeay::X509_REQ_get_attr_count
- Net::SSLeay::X509_REQ_get_pubkey
- Net::SSLeay::X509_REQ_get_subject_name
- Net::SSLeay::X509_REQ_get_version
- Net::SSLeay::X509_REQ_new
- Net::SSLeay::X509_REQ_set_pubkey
- Net::SSLeay::X509_REQ_set_subject_name
- Net::SSLeay::X509_REQ_set_version
- Net::SSLeay::X509_REQ_sign
- Net::SSLeay::X509_REQ_verify
- Net::SSLeay::X509_certificate_type
- Net::SSLeay::X509_digest
- Net::SSLeay::X509_get_ext_count
- Net::SSLeay::X509_get_pubkey
- Net::SSLeay::X509_get_serialNumber
- Net::SSLeay::X509_get_version
- Net::SSLeay::X509_issuer_and_serial_hash
- Net::SSLeay::X509_issuer_name_hash
- Net::SSLeay::X509_new
- Net::SSLeay::X509_pubkey_digest
- Net::SSLeay::X509_set_issuer_name
- Net::SSLeay::X509_set_pubkey
- Net::SSLeay::X509_set_serialNumber
- Net::SSLeay::X509_set_subject_name
- Net::SSLeay::X509_set_version
- Net::SSLeay::X509_sign
- Net::SSLeay::X509_subject_name_hash
- Net::SSLeay::X509_verify
- Net::SSLeay::d2i_X509_CRL_bio
- Net::SSLeay::d2i_X509_REQ_bio
- Net::SSLeay::d2i_X509_bio
- Net::SSLeay::set_tlsext_host_name
- Net::SSLeay::CTX_set_next_protos_advertised_cb
- Net::SSLeay::CTX_set_next_proto_select_cb
- Net::SSLeay::P_next_proto_negotiated
- Net::SSLeay::P_next_proto_last_status
Fixed a problem with multiple Safefree of GLOBAL_openssl_mutex when run
under apache2+mod_perl on recent Debain distros. Removed END and
openssl_threads_cleanup() since they can be called during thread
destruction, and not necessarily at process exit time.
Added missing helper_script/regen_openssl_constants.pl to MANIFEST. Add
MANIFEST to svn.
Fixed reported errors about try to plan twice in 21_constants.t on some
platforms.
Removed MANIFEST from svn, improve possibility to use Module::Install in
Net-SSleay
distribution in usual way. new target for make manifest
Fix 2 issues with CTX_use_PKCS12_file
1/ leaking memory - missing EVP_PKEY_free + X509_free
2/ pkcs12 filesize limitation
Fixed problems with regenerating scripts in Makefile.PL
Added missing dependencies for SSLeay.o to Makefile.PL
Added missing test files to svn
Fixed calling convention for Net::SSLeay::get_shared_ciphers + test + doc
update
Added coding guidelines to SSLeay.xs
Fix for serial number issue.
Major patch to refactor callback code to make it more extensible and
remove duplicate code. Thanks to kmx.
Fixed a problem in t/local/07_sslecho.t when running on
openssl-0.9.6
Fixed pod parsing errors reported by Olivier Mengué
Better prevention of leaking SVs in the new callback stuff
Debug messages in SSLeay.xs can be enabled by: perl Makefile.PL
DEFINE=-DSHOW_XS_DEBUG
Fixing X509_NAME_oneline (calling OPENSSL_free at the right place)
Fixed a problem with crashing when run under apache2+modssl+modperl on
Debian Wheezy. Now detects if it is running under ModPerl and uses ModSSLs
thread locking instead.
Added more debg printing. Enable with
perl Makefile.PL DEFINE=-DSHOW_XS_DEBUG
Added NPN support, thanks to kmx
Added t/local/40_npn_support.t tests for new NPN support
Fixed some compiler warnings. Courtesy kmx.
Fixed a problem with Win32 detection. Courtesy kmx.
To generate a diff of this commit:
cvs rdiff -u -r1.51 -r1.52 pkgsrc/security/p5-Net-SSLeay/Makefile
cvs rdiff -u -r1.24 -r1.25 pkgsrc/security/p5-Net-SSLeay/distinfo
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Home |
Main Index |
Thread Index |
Old Index