Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
spelling.patch | fix a spelling mistake | gregor herrmann <gregoa@debian.org> | yes | upstream | vendor | 2015-05-29 |
POE-Component-SSLify-1.012-Use-default-SSL-version-in-tests.patch | [PATCH] Use default SSL version in tests OpenSSL or distributor will remove support for SSLv3 soon or later. POE-Component-SSLify tests fail now because Net-SSLeay-0.68 has already removed the support. The patch replaces hard-coding any specific procol version to `default' value which should be future-proof. CPAN RT#104493 |
=?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= <ppisar@redhat.com> | no | 2015-05-18 | ||
POE-Component-SSLify-1.012-Adapt-to-OpenSSL-3.patch | [PATCH] Adapt to OpenSSL 3 OpenSSL 3 changed handling of I/O errors in SSL_accept(). That became visible when a client disconnected to early. As a result t/simple_parallel.t started failing randomly: # Failed test 'SERVER: SSLify_Options 156: private key # ' # at t/simple_parallel.t line 52. # Failed test 'SERVER: Server_SSLify Please do SSLify_Options() first ( or pass in a $ctx object ) at /builddir/build/BUILD/POE-Component -SSLify-1.012/blib/lib/POE/Component/SSLify.pm line 247. # ' # at t/simple_parallel.t line 55. Can't use an undefined value as a symbol reference at /builddir/build/BUILD/POE-Component-SSLify-1.012/blib/lib/POE/Component/SSLify.pm line 457. # Tests were run but no plan was declared and done_testing() was not seen. # Looks like your test exited with 22 just after 94. t/simple_parallel.t ........... Dubious, test returned 22 (wstat 5632, 0x1600) Failed 2/94 subtests This patch fixes these bugs in POE-Component-SSLify: TIEHANDLE() did not properly handled ERROR_WANT_READ/ERROR_WANT_WRITE soft errors of Net::SSLeay::accept(). Various Net::SSLeay calls inspected a global error stack instead of the actual return value. That lead to misreporting errors at a wrong place. Expecially after CTX_set_options() which cannot error. The test retried SSLify_Options() with wrong file paths. This patch should fix all of them. CPAN RT#139684 |
=?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= <ppisar@redhat.com> | no | 2021-10-13 | ||
0001-Disable-sessions-tickets-with-OpenSSL-1.1.1.patch | [PATCH] Disable sessions tickets with OpenSSL 1.1.1 This works around an OpenSSL SIGIPE issue causing server crash or SSL_accept() failure. CPAN RT#126976 |
=?UTF-8?q?Petr=20P=C3=ADsa=C5=99?= <ppisar@redhat.com> | no | 2018-08-28 |