Skip Menu |
 

This queue is for tickets about the Net-SSLeay CPAN distribution.

Report information
The Basics
Id: 54593
Status: resolved
Worked: 30 min
Priority: 0/
Queue: Net-SSLeay

People
Owner: MIKEM [...] cpan.org
Requestors: franck.mail [...] dthconnex.com.com
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



Subject: Patch to add access to peer certificate fingerprints
Date: Sat, 13 Feb 2010 18:56:33 +0100
To: bug-Net-SSLeay [...] rt.cpan.org
From: Franck Joncourt <franck.mail [...] dthconnex.com.com>
Download (untitled) / with headers
text/plain 500b
Hi, I am just forwarding a whishlist bug from the Debian BTS. ---> Here is a small patch to add the possibility for a Perl script to check the peer certificate fingerprints e.g. in a similar way fetchmail does. This adds the capability to strongly authenticate the peer when using Net::SSLeay <--- The main entry for the bug report can be seen at the following address: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414941 I have enclosed the patch anyway. Regards, -- Franck Joncourt

Message body is not shown because sender requested not to inline it.

Download signature.asc
application/pgp-signature 198b

Message body not shown because it is not plain text.

Download (untitled) / with headers
text/plain 305b
Thanks, this patch has been applied with a minor change: the original patch used stricmp, which is not available in all perls (eg OpenSUsE 5.10.0). Changed to use strcmp instead, which makes signature type required to be lowercase. Also add a test case to 07_sslecho.t SVN has been updated. Cheers.


This service is sponsored and maintained by Best Practical Solutions and runs on Perl.org infrastructure.

Please report any issues with rt.cpan.org to rt-cpan-admin@bestpractical.com.