summaryrefslogtreecommitdiff
path: root/security/ruby-rex-socket
AgeCommit message (Collapse)AuthorFilesLines
2022-09-18security/ruby-rex-socket: update to 0.1.43taca2-6/+6
0.1.43 (2022-09-16) * Land #52, Fix openssl3 unsafe legacy renegotiation disabled error
2022-09-04security/ruby-rex-socket: update to 0.1.42taca2-6/+6
0.1.42 (2022-08-31) * Land #51, Update Ubuntu 18.04 to 20.04 in Github CI script
2022-08-28security/ruby-rex-socket: update to 0.1.41taca2-6/+6
0.1.35 (2022-04-05) * Land #42, Add ruby 3.1.1 to test matrix 0.1.36 (2022-05-03) * Land #45, Allow explicitly setting peer hostname 0.1.37 (2022-05-03) * Land #46, fixes a bug caused by a missing require statement 0.1.38 (2022-05-03) * Land #44, Ignore trailing commas in range walker 0.1.39 (2022-05-09) * Land #48, Fix typo in ssl_tcp.rb Fixes #47 0.1.40 (2022-06-13) * Fix typo in README.md 0.1.41 (2022-08-02) * Land #50, Run ubuntu 22.04 in test matrix
2021-12-11security/ruby-rex-socket: update to 0.1.34taca2-6/+6
0.1.33 (2021-09-16) * Land #39, Update Ubuntu version & Ruby setup 0.1.34 (2021-10-28) * Land #41, Raise exception on nil hostname
2021-10-26security: Replace RMD160 checksums with BLAKE2s checksumsnia1-2/+2
All checksums have been double-checked against existing RMD160 and SHA512 hashes Unfetchable distfiles (fetched conditionally?): ./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
2021-10-07security: Remove SHA1 hashes for distfilesnia1-2/+1
2021-09-19security/ruby-rex-socket: update to 0.1.33taca2-7/+7
0.1.30 (2021-03-25) * Land #31, Consistently return nil as the failure indicator 0.1.31 (2021-08-05) * Land #37, Honor the SSLVersion for server sockets 0.1.32 (2021-08-05) * Land #36, Use getsockname to get the real local info 0.1.33 (2021-08-05) * Land #35, Fix Default IPv6 LocalHost
2021-06-01security/ruby-rex-socket: update to 0.1.29taca2-7/+7
Quote from commit logs: 0.1.29 (2021-03-25) * Land #31, Consistently return nil as the failure indicator 0.1.28 (2021-03-25) * Land #30, Fix Some RangeWalker issues 0.1.27 (2021-03-24) * Land #28, RangeWalker Updates To Return Hostnames When Available
2021-03-11security/ruby-rex-socket: update to 0.1.26taca3-9/+9
Quote from commit log: 0.1.25 (2020-11-30) * Allows bundle with latest bundler * Updates authors to reflect current maintainers * Update travis to test with 2.7.2 0.1.26 (2021-03-10) * Ruby 3 - update rex-socket * migrate to Addrinfo.getaddrinfo, and deprecate gethostname
2021-02-05security/ruby-rex-socket: update to 0.1.25taca2-7/+7
0.1.25 (2020-11-30) * relax dev bundle and update authors … - Allows bundle with latest bundler - Updates authors to reflect current maintainers - Update travis to test with 2.7.2 * Land #26, Update gemspec 0.1.24 (2020-09-23) * x509_certificate: Allow use of EC keys - Add new capability to allow the use of EC keys. Resolves issue with using EC keys in metasploit.
2020-03-24security/ruby-rex-socket: update to 0.1.23taca2-7/+9
Update ruby-rex-socket to 0.1.23. pkgsrc change: add "USE_LANGUAGES= # none". No release notes available.
2018-09-23security/ruby-rex-socket: update to 0.1.15taca2-7/+7
0.1.13 * add helper methods for determining supported SSL version methods 0.1.14 * Add IPv6 support to addr_atoc and addr_ctoa 0.1.15 * SSH socket registration removed
2018-03-23security/ruby-rex-socket: update to 0.1.12taca2-7/+7
0.1.12 (2018/03/21) * Land #9, improve SSL certificate generation * fix is_mac_addr to validate if something is _only_ a mac address * Improve SSL certificate generation 0.1.11 (2018/02/09) * Land #8, factor out SSL bits * Address Brent's comment - drop @@loaded_openssl * Implement a certificate provider pattern in Socket * Extract and mixin cert ops from server module
2018-03-21security/ruby-rex-socket: update to 0.1.10taca3-8/+9
0.1.10 2017/10/25 * improve cert generation
2017-10-13security/ruby-rex-socket: Update DESCRminskim1-3/+4
2017-10-13security/ruby-rex-socket: Import version 0.1.8minskim4-0/+53
Ruby Exploitation(Rex) Library which contains architecture specific information such as registers, opcodes, and stack manipulation routines.