https://bugzilla.redhat.com/show_bug.cgi?id=1630391 Bug ID: 1630391 Summary: expose SSL_CTX_set_post_handshake_auth Product: Fedora Version: 29 Component: perl-Net-SSLeay Assignee: paul@xxxxxxxxxxxx Reporter: jorton@xxxxxxxxxx QA Contact: extras-qa@xxxxxxxxxxxxxxxxx CC: jose.p.oliveira.oss@xxxxxxxxx, kasal@xxxxxx, paul@xxxxxxxxxxxx, perl-devel@xxxxxxxxxxxxxxxxxxxxxxx Created attachment 1484388 --> https://bugzilla.redhat.com/attachment.cgi?id=1484388&action=edit PoC patch Description of problem: Post-Handshake-Auth is disabled by default in OpenSSL 1.1.1. Can you expose SSL_CTX_set_post_handshake_auth so this can be re-enabled client side? Version-Release number of selected component (if applicable): perl-Net-SSLeay-1.85-7 How reproducible: always Steps to Reproduce: 1. use server requiring PHA Actual results: fail Expected results: success Additional info: httpd upstream test suite uses this, can give detailed repro case if required patch attached though is I assume not upstream-worthy without #ifdef version checks -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ perl-devel mailing list -- perl-devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to perl-devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/perl-devel@xxxxxxxxxxxxxxxxxxxxxxx