From a6f663d8ce0d5de1a6d970585a822f554ce24f59 Mon Sep 17 00:00:00 2001
From: Paul Howarth <p...@city-fan.org>
Date: Sun, 18 Dec 2016 12:18:04 +0000
Subject: Update to 2.040

- New upstream release 2.040
  - Fix detection of default CA path for OpenSSL 1.1.x
  - Utils::CERT_asHash now includes the signature algorithm used
  - Utils::CERT_asHash can now deal with large serial numbers
- Update patches as needed
---
 ...-SSL-2.039-use-system-default-SSL-version.patch | 36 ----------------------
 ...-SSL-2.040-use-system-default-SSL-version.patch | 36 ++++++++++++++++++++++
 perl-IO-Socket-SSL.spec                            | 13 ++++++--
 sources                                            |  2 +-
 4 files changed, 47 insertions(+), 40 deletions(-)
 delete mode 100644 IO-Socket-SSL-2.039-use-system-default-SSL-version.patch
 create mode 100644 IO-Socket-SSL-2.040-use-system-default-SSL-version.patch

diff --git a/IO-Socket-SSL-2.039-use-system-default-SSL-version.patch 
b/IO-Socket-SSL-2.039-use-system-default-SSL-version.patch
deleted file mode 100644
index e3c16cc..0000000
--- a/IO-Socket-SSL-2.039-use-system-default-SSL-version.patch
+++ /dev/null
@@ -1,36 +0,0 @@
---- lib/IO/Socket/SSL.pm
-+++ lib/IO/Socket/SSL.pm
-@@ -97,7 +97,7 @@ my $algo2digest = do {
- # global defaults
- my %DEFAULT_SSL_ARGS = (
-     SSL_check_crl => 0,
--    SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 
as broken
-+    SSL_version => '',
-     SSL_verify_callback => undef,
-     SSL_verifycn_scheme => undef,  # fallback cn verification
-     SSL_verifycn_publicsuffix => undef,  # fallback default list verification
-@@ -2214,7 +2214,7 @@ sub new {
- 
-     my $ssl_op = $DEFAULT_SSL_OP;
- 
--    my $ver;
-+    my $ver = '';
-     for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
-       m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
-       or croak("invalid SSL_version specified");
---- lib/IO/Socket/SSL.pod
-+++ lib/IO/Socket/SSL.pod
-@@ -960,11 +960,12 @@ protocol to the specified version.
- All values are case-insensitive.  Instead of 'TLSv1_1' and 'TLSv1_2' one can
- also use 'TLSv11' and 'TLSv12'.  Support for 'TLSv1_1' and 'TLSv1_2' requires
- recent versions of Net::SSLeay and openssl.
-+The default SSL_version is defined by the underlying cryptographic library.
- 
- Independent from the handshake format you can limit to set of accepted SSL
- versions by adding !version separated by ':'.
- 
--The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
-+For example, 'SSLv23:!SSLv3:!SSLv2' means that the
- handshake format is compatible to SSL2.0 and higher, but that the successful
- handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
- both of these versions have serious security issues and should not be used
diff --git a/IO-Socket-SSL-2.040-use-system-default-SSL-version.patch 
b/IO-Socket-SSL-2.040-use-system-default-SSL-version.patch
new file mode 100644
index 0000000..406b4df
--- /dev/null
+++ b/IO-Socket-SSL-2.040-use-system-default-SSL-version.patch
@@ -0,0 +1,36 @@
+--- lib/IO/Socket/SSL.pm
++++ lib/IO/Socket/SSL.pm
+@@ -97,7 +97,7 @@ my $algo2digest = do {
+ # global defaults
+ my %DEFAULT_SSL_ARGS = (
+     SSL_check_crl => 0,
+-    SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 
as broken
++    SSL_version => '',
+     SSL_verify_callback => undef,
+     SSL_verifycn_scheme => undef,  # fallback cn verification
+     SSL_verifycn_publicsuffix => undef,  # fallback default list verification
+@@ -2219,7 +2219,7 @@ sub new {
+ 
+     my $ssl_op = $DEFAULT_SSL_OP;
+ 
+-    my $ver;
++    my $ver = '';
+     for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
+       m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[12])?))$}i
+       or croak("invalid SSL_version specified");
+--- lib/IO/Socket/SSL.pod
++++ lib/IO/Socket/SSL.pod
+@@ -960,11 +960,12 @@ protocol to the specified version.
+ All values are case-insensitive.  Instead of 'TLSv1_1' and 'TLSv1_2' one can
+ also use 'TLSv11' and 'TLSv12'.  Support for 'TLSv1_1' and 'TLSv1_2' requires
+ recent versions of Net::SSLeay and openssl.
++The default SSL_version is defined by the underlying cryptographic library.
+ 
+ Independent from the handshake format you can limit to set of accepted SSL
+ versions by adding !version separated by ':'.
+ 
+-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
++For example, 'SSLv23:!SSLv3:!SSLv2' means that the
+ handshake format is compatible to SSL2.0 and higher, but that the successful
+ handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
+ both of these versions have serious security issues and should not be used
diff --git a/perl-IO-Socket-SSL.spec b/perl-IO-Socket-SSL.spec
index 0c5cf34..ea34043 100644
--- a/perl-IO-Socket-SSL.spec
+++ b/perl-IO-Socket-SSL.spec
@@ -1,5 +1,5 @@
 Name:          perl-IO-Socket-SSL
-Version:       2.039
+Version:       2.040
 Release:       1%{?dist}
 Summary:       Perl library for transparent SSL
 Group:         Development/Libraries
@@ -7,7 +7,7 @@ License:        GPL+ or Artistic
 URL:           http://search.cpan.org/dist/IO-Socket-SSL/
 Source0:       
http://search.cpan.org/CPAN/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz
 Patch0:                IO-Socket-SSL-2.039-use-system-default-cipher-list.patch
-Patch1:                IO-Socket-SSL-2.039-use-system-default-SSL-version.patch
+Patch1:                IO-Socket-SSL-2.040-use-system-default-SSL-version.patch
 BuildRoot:     %{_tmppath}/%{name}-%{version}-%{release}-root-%(id -nu)
 BuildArch:     noarch
 # Module Build
@@ -95,7 +95,7 @@ make %{?_smp_mflags}
 rm -rf %{buildroot}
 make pure_install DESTDIR=%{buildroot}
 find %{buildroot} -type f -name .packlist -delete
-%{_fixperms} %{buildroot}
+%{_fixperms} -c %{buildroot}
 
 %check
 make test
@@ -116,6 +116,13 @@ rm -rf %{buildroot}
 %{_mandir}/man3/IO::Socket::SSL::Utils.3*
 
 %changelog
+* Sun Dec 18 2016 Paul Howarth <p...@city-fan.org> - 2.040-1
+- Update to 2.040
+  - Fix detection of default CA path for OpenSSL 1.1.x
+  - Utils::CERT_asHash now includes the signature algorithm used
+  - Utils::CERT_asHash can now deal with large serial numbers
+- Update patches as needed
+
 * Mon Nov 21 2016 Paul Howarth <p...@city-fan.org> - 2.039-1
 - Update to 2.039
   - OpenSSL 1.1.0c changed the behavior of SSL_read so that it now returns -1
diff --git a/sources b/sources
index fa37a4f..791077a 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-0c51aab41d8f3454e11198cf99ebdd82  IO-Socket-SSL-2.039.tar.gz
+SHA512 (IO-Socket-SSL-2.040.tar.gz) = 
827db6a8b9f2ca51c4dd934ed5cd296d271dc30deafd5e9630bfcc8907d4ada0a7d6e71cf689df9013c6f7333c9b2f3d07643ec94a9b2675138cc669e8a68925
-- 
cgit v0.12


        
http://pkgs.fedoraproject.org/cgit/perl-IO-Socket-SSL.git/commit/?h=master&id=a6f663d8ce0d5de1a6d970585a822f554ce24f59
_______________________________________________
perl-devel mailing list -- perl-devel@lists.fedoraproject.org
To unsubscribe send an email to perl-devel-le...@lists.fedoraproject.org

Reply via email to