ID | 279990 |
Package Name | perl-Net-SSLeay |
Version | 1.94 |
Release | 1.fc40 |
Epoch | |
Source | git+https://src.fedoraproject.org/rpms/perl-Net-SSLeay.git#12381401f6f4e3d32f28f4c32276c65974441f67 |
Summary |
Description |
Built by | davidlt |
State |
complete
|
Volume |
DEFAULT |
Started | Mon, 08 Jan 2024 14:44:15 UTC |
Completed | Mon, 08 Jan 2024 15:13:06 UTC |
Task | build (f40, /rpms/perl-Net-SSLeay.git:12381401f6f4e3d32f28f4c32276c65974441f67) |
Extra | {'source': {'original_url': 'git+https://src.fedoraproject.org/rpms/perl-Net-SSLeay.git#12381401f6f4e3d32f28f4c32276c65974441f67'}} |
Tags |
|
RPMs |
src | |
|
perl-Net-SSLeay-1.94-1.fc40.src.rpm (info) (download) |
riscv64 |
|
perl-Net-SSLeay-1.94-1.fc40.riscv64.rpm (info) (download)
|
|
perl-Net-SSLeay-debuginfo-1.94-1.fc40.riscv64.rpm (info) (download)
|
|
perl-Net-SSLeay-debugsource-1.94-1.fc40.riscv64.rpm (info) (download)
|
|
Logs |
|
Changelog |
* Mon Jan 08 2024 Paul Howarth <paul@city-fan.org> - 1.94-1
- Update to 1.94
- Net::SSLeay now officially supports all stable releases of OpenSSL 3.1 and
3.2, and LibreSSL 3.5-3.8
- Many noisy compiler warnings have been silenced - if SSLeay.xs fails to
compile, it should now be much easier to identify the cause
- libcrypto's OPENSSL_init_crypto() function and libssl's OPENSSL_init_ssl()
function are now exposed, enabling fine-grained control over the
initialisation and configuration of both libraries
- libssl functions implementing TLS 1.3 PSK authentication are now exposed,
in particular SSL_CTX_set_psk_find_session_callback() (on the server side)
and SSL_CTX_set_psk_use_session_callback() (on the client side)
- libssl functions implementing server-side TLS 1.2 PSK authentication are
now exposed, in particular SSL_CTX_set_psk_server_callback()
- libssl's SSL_CTX_set_client_hello_cb() function is now exposed, allowing a
TLS server to set a callback function that is executed when the server
processes a ClientHello message
- Many more libcrypto/libssl constants and functions are now exposed; see the
release notes for the 1.93 developer releases for a full list
* Thu Aug 03 2023 Paul Howarth <paul@city-fan.org> - 1.92-10
- Rebuild for OpenSSL 3.1.1 in Rawhide
* Fri Jul 21 2023 Fedora Release Engineering <releng@fedoraproject.org> - 1.92-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
* Tue Jul 11 2023 Jitka Plesnikova <jplesnik@redhat.com> - 1.92-8
- Perl 5.38 rebuild
* Thu Apr 06 2023 Paul Howarth <paul@city-fan.org> - 1.92-7
- Update test suite to handle potential unavailability of sha1 algorithm
https://github.com/radiator-software/p5-net-ssleay/pull/433
- Avoid deprecated patch syntax
* Fri Mar 17 2023 Michal Josef Špaček <mspacek@redhat.com> - 1.92-6
- Update license to SPDX format
* Fri Jan 20 2023 Fedora Release Engineering <releng@fedoraproject.org> - 1.92-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
* Fri Jul 22 2022 Fedora Release Engineering <releng@fedoraproject.org> - 1.92-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Tue May 31 2022 Jitka Plesnikova <jplesnik@redhat.com> - 1.92-3
- Perl 5.36 rebuild
* Fri Jan 21 2022 Fedora Release Engineering <releng@fedoraproject.org> - 1.92-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Thu Jan 13 2022 Paul Howarth <paul@city-fan.org> - 1.92-1
- Update to 1.92
- Net::SSLeay now supports stable releases of OpenSSL 3.0
- OpenSSL 3.0.0 introduces the concept of "providers", which contain
cryptographic algorithm implementations; many outdated, deprecated
and/or insecure algorithms have been moved to the "legacy" provider,
which may need to be loaded explicitly in order to use them with
Net::SSLeay (see "Low level API: OSSL_LIB_CTX and OSSL_PROVIDER
related functions" in the Net::SSLeay module documentation for details)
- Net::SSLeay's built-in PEM_get_string_PrivateKey() function depends on
algorithms that have moved to the legacy provider described above; if
OpenSSL has been compiled without the legacy provider, the tests
t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will
fail when the test suite is run
- TLS 1.1 and below may only be used at security level 0 as of OpenSSL
3.0.0; if a minimum required security level is imposed (e.g. in an
OpenSSL configuration file managed by the operating system), the tests
t/local/44_sess.t and t/local/45_exporter.t will fail when the test
suite is run
- Net::SSLeay now supports stable releases of LibreSSL from the 3.2-3.4
series (with the exception of 3.2.2 and 3.2.3 - see "COMPATIBILITY" in
the Net::SSLeay module documentation for details)
- The TLS 1.3 implementation in LibreSSL 3.1-3.3, parts of which are
enabled by default, is not fully compatible with the libssl API and may
not function as expected with Net::SSLeay; see "KNOWN BUGS AND CAVEATS"
in the Net::SSLeay module documentation for details
- A number of new libcrypto/libssl constants and functions are now exposed,
including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(),
which are helpful when debugging TLS handshakes; see the release notes
for the 1.91 developer releases (in the Changes file) for a full list of
newly-exposed constants and functions
|