Hello community,
here is the log from the commit of package perl-IO-Socket-SSL for openSUSE:Factory checked in at 2015-05-16 07:13:03
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL (Old)
and /work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "perl-IO-Socket-SSL"
Changes:
--------
--- /work/SRC/openSUSE:Factory/perl-IO-Socket-SSL/perl-IO-Socket-SSL.changes 2015-05-05 00:54:35.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.perl-IO-Socket-SSL.new/perl-IO-Socket-SSL.changes 2015-05-16 07:13:04.000000000 +0200
@@ -1,0 +2,23 @@
+Thu May 14 08:16:17 UTC 2015 - coolo@suse.com
+
+- updated to 2.015
+ see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
+
+ 2.014 2015/05/13
+ - work around problem with IO::Socket::INET6 on windows, by explicitly using
+ Domain AF_INET in the tests.
+ Fixes RT#104226 reported by CHORNY
+
+-------------------------------------------------------------------
+Wed May 13 12:33:03 UTC 2015 - coolo@suse.com
+
+- updated to 2.014
+ see /usr/share/doc/packages/perl-IO-Socket-SSL/Changes
+
+ 2.014 2015/05/05
+ - Utils::CERT_create - work around problems with authorityInfoAccess, where
+ OpenSSL i2v does not create the same string as v2i expects
+ - Intercept - don't clone some specific extensions which make only sense with
+ the original certificate
+
+-------------------------------------------------------------------
Old:
----
IO-Socket-SSL-2.013.tar.gz
New:
----
IO-Socket-SSL-2.015.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ perl-IO-Socket-SSL.spec ++++++
--- /var/tmp/diff_new_pack.oxZ6ie/_old 2015-05-16 07:13:05.000000000 +0200
+++ /var/tmp/diff_new_pack.oxZ6ie/_new 2015-05-16 07:13:05.000000000 +0200
@@ -17,7 +17,7 @@
Name: perl-IO-Socket-SSL
-Version: 2.013
+Version: 2.015
Release: 0
%define cpan_name IO-Socket-SSL
Summary: Nearly transparent SSL encapsulation for IO::Socket::INET
++++++ IO-Socket-SSL-2.013.tar.gz -> IO-Socket-SSL-2.015.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/Changes new/IO-Socket-SSL-2.015/Changes
--- old/IO-Socket-SSL-2.013/Changes 2015-05-01 17:13:32.000000000 +0200
+++ new/IO-Socket-SSL-2.015/Changes 2015-05-13 22:40:15.000000000 +0200
@@ -1,3 +1,12 @@
+2.014 2015/05/13
+- work around problem with IO::Socket::INET6 on windows, by explicitly using
+ Domain AF_INET in the tests.
+ Fixes RT#104226 reported by CHORNY
+2.014 2015/05/05
+- Utils::CERT_create - work around problems with authorityInfoAccess, where
+ OpenSSL i2v does not create the same string as v2i expects
+- Intercept - don't clone some specific extensions which make only sense with
+ the original certificate
2.013 2015/05/01
- assign severities to internal error handling and make sure that follow-up
errors like "configuration failed" or "certificate verify error" don't
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/META.json new/IO-Socket-SSL-2.015/META.json
--- old/IO-Socket-SSL-2.013/META.json 2015-05-01 17:37:04.000000000 +0200
+++ new/IO-Socket-SSL-2.015/META.json 2015-05-13 22:43:17.000000000 +0200
@@ -4,7 +4,7 @@
"Steffen Ullrich , Peter Behroozi, Marko Asplund"
],
"dynamic_config" : 1,
- "generated_by" : "ExtUtils::MakeMaker version 6.66, CPAN::Meta::Converter version 2.120921",
+ "generated_by" : "ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter version 2.140640",
"license" : [
"perl_5"
],
@@ -50,5 +50,5 @@
"url" : "https://github.com/noxxi/p5-io-socket-ssl"
}
},
- "version" : "2.013"
+ "version" : "2.015"
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/META.yml new/IO-Socket-SSL-2.015/META.yml
--- old/IO-Socket-SSL-2.013/META.yml 2015-05-01 17:37:04.000000000 +0200
+++ new/IO-Socket-SSL-2.015/META.yml 2015-05-13 22:43:17.000000000 +0200
@@ -3,26 +3,26 @@
author:
- 'Steffen Ullrich , Peter Behroozi, Marko Asplund'
build_requires:
- ExtUtils::MakeMaker: 0
+ ExtUtils::MakeMaker: '0'
configure_requires:
- ExtUtils::MakeMaker: 0
+ ExtUtils::MakeMaker: '0'
dynamic_config: 1
-generated_by: 'ExtUtils::MakeMaker version 6.66, CPAN::Meta::Converter version 2.120921'
+generated_by: 'ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter version 2.140640'
license: perl
meta-spec:
url: http://module-build.sourceforge.net/META-spec-v1.4.html
- version: 1.4
+ version: '1.4'
name: IO-Socket-SSL
no_index:
directory:
- t
- inc
requires:
- Net::SSLeay: 1.46
- Scalar::Util: 0
+ Net::SSLeay: '1.46'
+ Scalar::Util: '0'
resources:
bugtracker: https://rt.cpan.org/Dist/Display.html?Queue=IO-Socket-SSL
homepage: https://github.com/noxxi/p5-io-socket-ssl
license: http://dev.perl.org/licenses/
repository: https://github.com/noxxi/p5-io-socket-ssl
-version: 2.013
+version: '2.015'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL/Intercept.pm new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL/Intercept.pm
--- old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL/Intercept.pm 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL/Intercept.pm 2015-05-05 08:26:36.000000000 +0200
@@ -6,7 +6,7 @@
use IO::Socket::SSL::Utils;
use Net::SSLeay;
-our $VERSION = '1.93';
+our $VERSION = '2.014';
sub new {
my ($class,%args) = @_;
@@ -73,8 +73,21 @@
}
# create new certificate based on original
+ # copy most but not all extensions
+ my $hash = CERT_asHash($old_cert);
+ if (my $ext = $hash->{ext}) {
+ @$ext = grep {
+ $_->{sn} !~m{^(?:
+ authorityInfoAccess |
+ subjectKeyIdentifier |
+ authorityKeyIdentifier |
+ certificatePolicies |
+ crlDistributionPoints
+ )$}x
+ } @$ext;
+ }
my ($clone,$key) = CERT_create(
- %{ CERT_asHash($old_cert) },
+ %$hash,
serial => $self->{serial}++,
issuer_cert => $self->{cacert},
issuer_key => $self->{cakey},
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL/Utils.pm new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL/Utils.pm
--- old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL/Utils.pm 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL/Utils.pm 2015-05-05 08:26:52.000000000 +0200
@@ -9,7 +9,7 @@
require Exporter;
*import = \&Exporter::import;
-our $VERSION = '0.031';
+our $VERSION = '2.014';
our @EXPORT = qw(
PEM_file2cert PEM_string2cert PEM_cert2file PEM_cert2string
PEM_file2key PEM_string2key PEM_key2file PEM_key2string
@@ -343,17 +343,27 @@
=> join(",",sort keys %cert_type) if %cert_type;
push @ext,&Net::SSLeay::NID_ext_key_usage
=> join(",",sort keys %ext_key_usage) if %ext_key_usage;
+ Net::SSLeay::P_X509_add_extensions($cert, $issuer_cert, @ext);
for my $ext (@{ $args{ext} || [] }) {
my $nid = $ext->{nid}
|| $ext->{sn} && Net::SSLeay::OBJ_sn2nid($ext->{sn})
|| croak "cannot determine NID of extension";
my $val = $ext->{data};
- $val = "critical,$val" if $ext->{critical};
- push @ext,($nid,$val);
+ if ($nid == 177) {
+ # authorityInfoAccess:
+ # OpenSSL i2v does not output the same way as expected by i2v :(
+ for (split(/\n/,$val)) {
+ s{ - }{;}; # "OCSP - URI:..." -> "OCSP;URI:..."
+ $_ = "critical,$_" if $ext->{critical};
+ Net::SSLeay::P_X509_add_extensions($cert,$issuer_cert,$nid,$_);
+ }
+ } else {
+ $val = "critical,$val" if $ext->{critical};
+ Net::SSLeay::P_X509_add_extensions($cert, $issuer_cert, $nid, $val);
+ }
}
- Net::SSLeay::P_X509_add_extensions($cert, $issuer_cert, @ext);
Net::SSLeay::X509_set_issuer_name($cert,
Net::SSLeay::X509_get_subject_name($issuer_cert));
Net::SSLeay::X509_sign($cert,$issuer_key,_digest($digest_name));
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL.pm new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL.pm
--- old/IO-Socket-SSL-2.013/lib/IO/Socket/SSL.pm 2015-05-01 17:32:36.000000000 +0200
+++ new/IO-Socket-SSL-2.015/lib/IO/Socket/SSL.pm 2015-05-13 22:37:34.000000000 +0200
@@ -13,7 +13,7 @@
package IO::Socket::SSL;
-our $VERSION = '2.013';
+our $VERSION = '2.015';
use IO::Socket;
use Net::SSLeay 1.46;
@@ -1600,6 +1600,7 @@
my $ipn;
if ( CAN_IPV6 and $identity =~m{:} ) {
# no IPv4 or hostname have ':' in it, try IPv6.
+ $identity =~m{[^\da-fA-F:\.]} and return; # invalid characters in name
$ipn = inet_pton(AF_INET6,$identity) or return; # invalid name
} elsif ( my @ip = $identity =~m{^(\d+)(?:\.(\d+)\.(\d+)\.(\d+)|[\d\.]*)$} ) {
# check for invalid IP/hostname
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/01loadmodule.t new/IO-Socket-SSL-2.015/t/01loadmodule.t
--- old/IO-Socket-SSL-2.013/t/01loadmodule.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/01loadmodule.t 2015-05-05 13:32:14.000000000 +0200
@@ -8,7 +8,9 @@
ok( eval { require IO::Socket::SSL },"loaded");
diag( sprintf( "openssl version=0x%0x", Net::SSLeay::OPENSSL_VERSION_NUMBER()));
-diag( sprintf( "Net::SSLeay::VERSION=%s", $Net::SSLeay::VERSION));
+diag( sprintf( "Net::SSLeay version=%s", $Net::SSLeay::VERSION));
+diag( sprintf( "parent %s version=%s", $_, $_->VERSION))
+ for (@IO::Socket::SSL::ISA);
IO::Socket::SSL->import(':debug1');
is( $IO::Socket::SSL::DEBUG,1, "IO::Socket::SSL::DEBUG 1");
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/acceptSSL-timeout.t new/IO-Socket-SSL-2.015/t/acceptSSL-timeout.t
--- old/IO-Socket-SSL-2.013/t/acceptSSL-timeout.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/acceptSSL-timeout.t 2015-05-13 22:37:21.000000000 +0200
@@ -1,5 +1,6 @@
use strict;
use warnings;
+use Socket;
use IO::Socket::SSL;
do './testlib.pl' || do './t/testlib.pl' || die "no testlib";
@@ -61,8 +62,11 @@
sub client_ssl {
my $saddr = shift;
- my $c = IO::Socket::SSL->new( PeerAddr => $saddr, SSL_verify_mode => 0 )
- || die "connect failed: $!|$SSL_ERROR";
+ my $c = IO::Socket::SSL->new(
+ PeerAddr => $saddr,
+ Domain => AF_INET,
+ SSL_verify_mode => 0
+ ) || die "connect failed: $!|$SSL_ERROR";
print "Connected\n";
while ( sysread( $c,my $buf,8000 )) { print $buf }
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/alpn.t new/IO-Socket-SSL-2.015/t/alpn.t
--- old/IO-Socket-SSL-2.013/t/alpn.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/alpn.t 2015-05-13 22:29:52.000000000 +0200
@@ -47,7 +47,8 @@
$ID = 'client';
close($server);
my $to_server = IO::Socket::SSL->new(
- PeerHost => $addr,
+ PeerAddr => $addr,
+ Domain => AF_INET,
SSL_verify_mode => 0,
SSL_alpn_protocols => [qw(two three)],
) or do {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/auto_verify_hostname.t new/IO-Socket-SSL-2.015/t/auto_verify_hostname.t
--- old/IO-Socket-SSL-2.013/t/auto_verify_hostname.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/auto_verify_hostname.t 2015-05-13 22:08:44.000000000 +0200
@@ -47,6 +47,7 @@
my ($name,$scheme,$result) = @tests[$i,$i+1,$i+2];
my $cl = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 1,
SSL_verifycn_scheme => $scheme,
SSL_verifycn_name => $name,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/cert_no_file.t new/IO-Socket-SSL-2.015/t/cert_no_file.t
--- old/IO-Socket-SSL-2.013/t/cert_no_file.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/cert_no_file.t 2015-05-13 22:09:04.000000000 +0200
@@ -73,6 +73,7 @@
my $to_server = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 0x00,
);
if ( $test == 3 ) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/core.t new/IO-Socket-SSL-2.015/t/core.t
--- old/IO-Socket-SSL-2.013/t/core.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/core.t 2015-05-13 22:09:46.000000000 +0200
@@ -76,6 +76,7 @@
$client = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 0x01,
SSL_ca_file => "certs/test-ca.pem",
SSL_use_cert => 1,
@@ -176,6 +177,7 @@
if ($CAN_NONBLOCK) {
my $client_3 = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 0x01,
SSL_version => 'TLSv1',
SSL_cipher_list => 'HIGH',
@@ -185,16 +187,17 @@
SSL_key_file => "certs/server-key.enc",
SSL_passwd_cb => sub { return "bluebell" },
Blocking => 0,
- );
+ );
ok( $client_3, "Client Nonblocking Check 1");
close $client_3;
my $client_4 = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_reuse_ctx => $client_3,
Blocking => 0
- );
+ );
ok( $client_4, "Client Nonblocking Check 2");
$client_3->close(SSL_ctx_free => 1);
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/dhe.t new/IO-Socket-SSL-2.015/t/dhe.t
--- old/IO-Socket-SSL-2.013/t/dhe.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/dhe.t 2015-05-13 22:09:56.000000000 +0200
@@ -51,6 +51,7 @@
close($server);
my $to_server = IO::Socket::SSL->new(
PeerAddr => $addr,
+ Domain => AF_INET,
SSL_cipher_list => 'ALL:RSA:!aRSA',
SSL_verify_mode => 0 ) || do {
notok( "connect failed: $SSL_ERROR" );
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/ecdhe.t new/IO-Socket-SSL-2.015/t/ecdhe.t
--- old/IO-Socket-SSL-2.013/t/ecdhe.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/ecdhe.t 2015-05-13 22:10:04.000000000 +0200
@@ -46,6 +46,7 @@
close($server);
my $to_server = IO::Socket::SSL->new(
PeerAddr => $addr,
+ Domain => AF_INET,
SSL_verify_mode => 0 ) || do {
notok( "connect failed: $SSL_ERROR" );
exit
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/io-socket-inet6.t new/IO-Socket-SSL-2.015/t/io-socket-inet6.t
--- old/IO-Socket-SSL-2.013/t/io-socket-inet6.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/io-socket-inet6.t 2015-05-13 22:27:06.000000000 +0200
@@ -77,8 +77,8 @@
$ID = 'client';
close($server);
my $to_server = IO::Socket::SSL->new(
- PeerAddr => $addr,
- SSL_verify_mode => 0,
+ PeerAddr => $addr,
+ SSL_verify_mode => 0,
) || do {
notok( "connect failed: ".IO::Socket::SSL->errstr() );
exit
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/io-socket-ip.t new/IO-Socket-SSL-2.015/t/io-socket-ip.t
--- old/IO-Socket-SSL-2.013/t/io-socket-ip.t 2015-05-01 17:15:15.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/io-socket-ip.t 2015-05-13 22:10:41.000000000 +0200
@@ -67,8 +67,9 @@
$ID = 'client';
close($server);
my $to_server = IO::Socket::SSL->new(
- PeerAddr => $addr,
- SSL_verify_mode => 0
+ PeerAddr => $addr,
+ Domain => AF_INET,
+ SSL_verify_mode => 0
) || do {
notok( "connect failed: ".IO::Socket::SSL->errstr() );
exit
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/mitm.t new/IO-Socket-SSL-2.015/t/mitm.t
--- old/IO-Socket-SSL-2.013/t/mitm.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/mitm.t 2015-05-13 22:23:16.000000000 +0200
@@ -43,6 +43,7 @@
# connect to server, check certificate
my $cl = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 1,
SSL_ca_file => 'certs/my-ca.pem',
);
@@ -54,6 +55,7 @@
# connect to proxy, check certificate
$cl = IO::Socket::SSL->new(
PeerAddr => $paddr,
+ Domain => AF_INET,
SSL_verify_mode => 1,
SSL_ca_file => 'certs/proxyca.pem',
);
@@ -79,6 +81,7 @@
my $toc = $proxy->accept or next;
my $tos = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 1,
SSL_ca_file => 'certs/my-ca.pem',
) or die "failed connect to server: $!, $SSL_ERROR";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/npn.t new/IO-Socket-SSL-2.015/t/npn.t
--- old/IO-Socket-SSL-2.013/t/npn.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/npn.t 2015-05-13 22:29:25.000000000 +0200
@@ -47,7 +47,8 @@
$ID = 'client';
close($server);
my $to_server = IO::Socket::SSL->new(
- PeerHost => $addr,
+ PeerAddr => $addr,
+ Domain => AF_INET,
SSL_verify_mode => 0,
SSL_npn_protocols => [qw(two three)],
) or do {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/plain_upgrade_downgrade.t new/IO-Socket-SSL-2.015/t/plain_upgrade_downgrade.t
--- old/IO-Socket-SSL-2.013/t/plain_upgrade_downgrade.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/plain_upgrade_downgrade.t 2015-05-13 22:11:02.000000000 +0200
@@ -1,5 +1,6 @@
use strict;
use warnings;
+use Socket;
use IO::Socket::SSL;
use IO::Socket::SSL::Utils;
use Test::More;
@@ -104,6 +105,7 @@
if ($act =~m{newSSL(?::(.*))?$} ) {
$cl = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
defined($1) ? (SSL_startHandshake => $1):(),
) or die "failed to connect: $!|$SSL_ERROR";
if ( ! defined($1) || $1 ) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/protocol_version.t new/IO-Socket-SSL-2.015/t/protocol_version.t
--- old/IO-Socket-SSL-2.013/t/protocol_version.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/protocol_version.t 2015-05-13 22:11:14.000000000 +0200
@@ -3,6 +3,7 @@
use strict;
use warnings;
use Test::More;
+use Socket;
use IO::Socket::SSL;
do './testlib.pl' || do './t/testlib.pl' || die "no testlib";
@@ -38,6 +39,7 @@
my $cl = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_startHandshake => 0,
SSL_verify_mode => 0,
SSL_version => $ver,
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/readline.t new/IO-Socket-SSL-2.015/t/readline.t
--- old/IO-Socket-SSL-2.013/t/readline.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/readline.t 2015-05-13 22:11:33.000000000 +0200
@@ -154,6 +154,7 @@
foreach my $test (@tests) {
my $to_server = IO::Socket::SSL->new(
PeerAddr => $addr,
+ Domain => AF_INET,
SSL_verify_mode => 0 ) || do {
notok( "connect failed: ".IO::Socket::SSL->errstr() );
exit
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/sessions.t new/IO-Socket-SSL-2.015/t/sessions.t
--- old/IO-Socket-SSL-2.013/t/sessions.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/sessions.t 2015-05-13 22:36:01.000000000 +0200
@@ -97,8 +97,8 @@
my $sock3 = IO::Socket::INET->new($saddr[2]);
my @clients = (
- IO::Socket::SSL->new($saddr[0]),
- IO::Socket::SSL->new($saddr[1]),
+ IO::Socket::SSL->new(PeerAddr => $saddr[0], Domain => AF_INET),
+ IO::Socket::SSL->new(PeerAddr => $saddr[1], Domain => AF_INET),
IO::Socket::SSL->start_SSL( $sock3 ),
);
@@ -140,7 +140,7 @@
}
@clients = map {
- IO::Socket::SSL->new($_)
+ IO::Socket::SSL->new(PeerAddr => $_, Domain => AF_INET)
} @saddr;
if (keys(%$cache) != 6) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/signal-readline.t new/IO-Socket-SSL-2.015/t/signal-readline.t
--- old/IO-Socket-SSL-2.013/t/signal-readline.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/signal-readline.t 2015-05-13 22:11:54.000000000 +0200
@@ -36,6 +36,7 @@
close($server);
my $client = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 0
) || print "not ";
ok( "client ssl connect" );
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/sni.t new/IO-Socket-SSL-2.015/t/sni.t
--- old/IO-Socket-SSL-2.013/t/sni.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/sni.t 2015-05-13 22:12:07.000000000 +0200
@@ -59,6 +59,7 @@
for my $host (@tests) {
my $client = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 1,
SSL_hostname => $host,
SSL_ca_file => 'certs/my-ca.pem',
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/sni_verify.t new/IO-Socket-SSL-2.015/t/sni_verify.t
--- old/IO-Socket-SSL-2.013/t/sni_verify.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/sni_verify.t 2015-05-13 22:12:14.000000000 +0200
@@ -60,6 +60,7 @@
for my $host (@tests) {
my $client = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 1,
SSL_hostname => $host,
SSL_ca_file => 'certs/my-ca.pem',
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/sysread_write.t new/IO-Socket-SSL-2.015/t/sysread_write.t
--- old/IO-Socket-SSL-2.013/t/sysread_write.t 2015-04-17 14:06:34.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/sysread_write.t 2015-05-13 22:12:22.000000000 +0200
@@ -47,6 +47,7 @@
my $to_server = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_ca_file => "certs/test-ca.pem",
) || do {
print "not ok: connect failed: $!\n";
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/IO-Socket-SSL-2.013/t/verify_hostname.t new/IO-Socket-SSL-2.015/t/verify_hostname.t
--- old/IO-Socket-SSL-2.013/t/verify_hostname.t 2015-05-01 17:13:41.000000000 +0200
+++ new/IO-Socket-SSL-2.015/t/verify_hostname.t 2015-05-13 22:12:37.000000000 +0200
@@ -39,6 +39,7 @@
close($server);
my $client = IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_verify_mode => 0
) || print "not ";
ok( "client ssl connect" );
@@ -109,6 +110,7 @@
if ( $pid == 0 ) {
IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_ca_file => "certs/test-ca.pem",
SSL_verify_mode => 1,
SSL_verifycn_scheme => 'www',
@@ -125,6 +127,7 @@
if ( $pid == 0 ) {
if (IO::Socket::SSL->new(
PeerAddr => $saddr,
+ Domain => AF_INET,
SSL_ca_file => "certs/test-ca.pem",
SSL_verify_mode => 1,
SSL_verifycn_scheme => 'www',