Update to 1.92

- New upstream release 1.92
  - Net::SSLeay now supports stable releases of OpenSSL 3.0
    - OpenSSL 3.0.0 introduces the concept of "providers", which contain
      cryptographic algorithm implementations; many outdated, deprecated
      and/or insecure algorithms have been moved to the "legacy" provider,
      which may need to be loaded explicitly in order to use them with
      Net::SSLeay (see "Low level API: OSSL_LIB_CTX and OSSL_PROVIDER
      related functions" in the Net::SSLeay module documentation for details)
    - Net::SSLeay's built-in PEM_get_string_PrivateKey() function depends on
      algorithms that have moved to the legacy provider described above; if
      OpenSSL has been compiled without the legacy provider, the tests
      t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will
      fail when the test suite is run
    - TLS 1.1 and below may only be used at security level 0 as of OpenSSL
      3.0.0; if a minimum required security level is imposed (e.g. in an
      OpenSSL configuration file managed by the operating system), the tests
      t/local/44_sess.t and t/local/45_exporter.t will fail when the test
      suite is run
  - Net::SSLeay now supports stable releases of LibreSSL from the 3.2-3.4
    series (with the exception of 3.2.2 and 3.2.3 - see "COMPATIBILITY" in
    the Net::SSLeay module documentation for details)
    - The TLS 1.3 implementation in LibreSSL 3.1-3.3, parts of which are
      enabled by default, is not fully compatible with the libssl API and may
      not function as expected with Net::SSLeay; see "KNOWN BUGS AND CAVEATS"
      in the Net::SSLeay module documentation for details
  - A number of new libcrypto/libssl constants and functions are now exposed,
    including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(),
    which are helpful when debugging TLS handshakes; see the release notes
    for the 1.91 developer releases (in the Changes file) for a full list of
    newly-exposed constants and functions
This commit is contained in:
Paul Howarth 2022-01-13 12:13:06 +00:00
parent 169a34f3d5
commit 5d702bae7c
4 changed files with 37 additions and 3346 deletions

File diff suppressed because it is too large Load Diff

View File

@ -1,4 +1,4 @@
from Config import *
addFilter("spelling-error %description -l en_US http -> ");
addFilter("spelling-error %description -l en_US sslcat -> ");
# SSL library allows user to set Crypto Policy
addFilter("crypto-policy-non-compliance-openssl /usr/lib64/perl5/vendor_perl/auto/Net/SSLeay/SSLeay.so SSL_CTX_set_cipher_list");

View File

@ -5,13 +5,12 @@
%endif
Name: perl-Net-SSLeay
Version: 1.90
Release: 7%{?dist}
Version: 1.92
Release: 1%{?dist}
Summary: Perl extension for using OpenSSL
License: Artistic 2.0
URL: https://metacpan.org/release/Net-SSLeay
Source0: https://cpan.metacpan.org/modules/by-module/Net/Net-SSLeay-%{version}.tar.gz
Patch0: Net-SSLeay-1.90-OpenSSL3.patch
Patch10: Net-SSLeay-1.90-pkgconfig.patch
# =========== Module Build ===========================
BuildRequires: coreutils
@ -85,9 +84,6 @@ so you can write servers or clients for more complicated applications.
%prep
%setup -q -n Net-SSLeay-%{version}
# Fixes from upstream for OpenSSL 3.0.0
%patch0 -p1
# Get libraries to link against from pkg-config
# https://github.com/radiator-software/p5-net-ssleay/pull/127
%patch10
@ -128,6 +124,38 @@ make test
%{_mandir}/man3/Net::SSLeay::Handle.3*
%changelog
* Thu Jan 13 2022 Paul Howarth <paul@city-fan.org> - 1.92-1
- Update to 1.92
- Net::SSLeay now supports stable releases of OpenSSL 3.0
- OpenSSL 3.0.0 introduces the concept of "providers", which contain
cryptographic algorithm implementations; many outdated, deprecated
and/or insecure algorithms have been moved to the "legacy" provider,
which may need to be loaded explicitly in order to use them with
Net::SSLeay (see "Low level API: OSSL_LIB_CTX and OSSL_PROVIDER
related functions" in the Net::SSLeay module documentation for details)
- Net::SSLeay's built-in PEM_get_string_PrivateKey() function depends on
algorithms that have moved to the legacy provider described above; if
OpenSSL has been compiled without the legacy provider, the tests
t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will
fail when the test suite is run
- TLS 1.1 and below may only be used at security level 0 as of OpenSSL
3.0.0; if a minimum required security level is imposed (e.g. in an
OpenSSL configuration file managed by the operating system), the tests
t/local/44_sess.t and t/local/45_exporter.t will fail when the test
suite is run
- Net::SSLeay now supports stable releases of LibreSSL from the 3.2-3.4
series (with the exception of 3.2.2 and 3.2.3 - see "COMPATIBILITY" in
the Net::SSLeay module documentation for details)
- The TLS 1.3 implementation in LibreSSL 3.1-3.3, parts of which are
enabled by default, is not fully compatible with the libssl API and may
not function as expected with Net::SSLeay; see "KNOWN BUGS AND CAVEATS"
in the Net::SSLeay module documentation for details
- A number of new libcrypto/libssl constants and functions are now exposed,
including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(),
which are helpful when debugging TLS handshakes; see the release notes
for the 1.91 developer releases (in the Changes file) for a full list of
newly-exposed constants and functions
* Tue Oct 5 2021 Paul Howarth <paul@city-fan.org> - 1.90-7
- Fixes for OpenSSL 3.0.0 are now entirely from upstream

View File

@ -1 +1 @@
SHA512 (Net-SSLeay-1.90.tar.gz) = 8a5f251b5ef1d8c2d619d984594a7a22ddeed2e5e726fe683a45f299d7878f4ca8ffab00480ebf5ef7a94ae1fcf6be05dfdaa68b8bfe2ad68443150765adb891
SHA512 (Net-SSLeay-1.92.tar.gz) = e9d9161ebeb7be90f4c7a0ea98f1034892ce6d33aa72872683177b19daa1f4c5819f85ea9a052a076ec8d7c21705f6c344aef64680bc881bf3218d38e8b7b173