Update to 1.92
- New upstream release 1.92
- Net::SSLeay now supports stable releases of OpenSSL 3.0
- OpenSSL 3.0.0 introduces the concept of "providers", which contain
cryptographic algorithm implementations; many outdated, deprecated
and/or insecure algorithms have been moved to the "legacy" provider,
which may need to be loaded explicitly in order to use them with
Net::SSLeay (see "Low level API: OSSL_LIB_CTX and OSSL_PROVIDER
related functions" in the Net::SSLeay module documentation for details)
- Net::SSLeay's built-in PEM_get_string_PrivateKey() function depends on
algorithms that have moved to the legacy provider described above; if
OpenSSL has been compiled without the legacy provider, the tests
t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will
fail when the test suite is run
- TLS 1.1 and below may only be used at security level 0 as of OpenSSL
3.0.0; if a minimum required security level is imposed (e.g. in an
OpenSSL configuration file managed by the operating system), the tests
t/local/44_sess.t and t/local/45_exporter.t will fail when the test
suite is run
- Net::SSLeay now supports stable releases of LibreSSL from the 3.2-3.4
series (with the exception of 3.2.2 and 3.2.3 - see "COMPATIBILITY" in
the Net::SSLeay module documentation for details)
- The TLS 1.3 implementation in LibreSSL 3.1-3.3, parts of which are
enabled by default, is not fully compatible with the libssl API and may
not function as expected with Net::SSLeay; see "KNOWN BUGS AND CAVEATS"
in the Net::SSLeay module documentation for details
- A number of new libcrypto/libssl constants and functions are now exposed,
including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(),
which are helpful when debugging TLS handshakes; see the release notes
for the 1.91 developer releases (in the Changes file) for a full list of
newly-exposed constants and functions
This commit is contained in:
parent
169a34f3d5
commit
5d702bae7c
File diff suppressed because it is too large
Load Diff
@ -1,4 +1,4 @@
|
||||
from Config import *
|
||||
addFilter("spelling-error %description -l en_US http -> ");
|
||||
addFilter("spelling-error %description -l en_US sslcat -> ");
|
||||
|
||||
# SSL library allows user to set Crypto Policy
|
||||
addFilter("crypto-policy-non-compliance-openssl /usr/lib64/perl5/vendor_perl/auto/Net/SSLeay/SSLeay.so SSL_CTX_set_cipher_list");
|
||||
|
||||
@ -5,13 +5,12 @@
|
||||
%endif
|
||||
|
||||
Name: perl-Net-SSLeay
|
||||
Version: 1.90
|
||||
Release: 7%{?dist}
|
||||
Version: 1.92
|
||||
Release: 1%{?dist}
|
||||
Summary: Perl extension for using OpenSSL
|
||||
License: Artistic 2.0
|
||||
URL: https://metacpan.org/release/Net-SSLeay
|
||||
Source0: https://cpan.metacpan.org/modules/by-module/Net/Net-SSLeay-%{version}.tar.gz
|
||||
Patch0: Net-SSLeay-1.90-OpenSSL3.patch
|
||||
Patch10: Net-SSLeay-1.90-pkgconfig.patch
|
||||
# =========== Module Build ===========================
|
||||
BuildRequires: coreutils
|
||||
@ -85,9 +84,6 @@ so you can write servers or clients for more complicated applications.
|
||||
%prep
|
||||
%setup -q -n Net-SSLeay-%{version}
|
||||
|
||||
# Fixes from upstream for OpenSSL 3.0.0
|
||||
%patch0 -p1
|
||||
|
||||
# Get libraries to link against from pkg-config
|
||||
# https://github.com/radiator-software/p5-net-ssleay/pull/127
|
||||
%patch10
|
||||
@ -128,6 +124,38 @@ make test
|
||||
%{_mandir}/man3/Net::SSLeay::Handle.3*
|
||||
|
||||
%changelog
|
||||
* Thu Jan 13 2022 Paul Howarth <paul@city-fan.org> - 1.92-1
|
||||
- Update to 1.92
|
||||
- Net::SSLeay now supports stable releases of OpenSSL 3.0
|
||||
- OpenSSL 3.0.0 introduces the concept of "providers", which contain
|
||||
cryptographic algorithm implementations; many outdated, deprecated
|
||||
and/or insecure algorithms have been moved to the "legacy" provider,
|
||||
which may need to be loaded explicitly in order to use them with
|
||||
Net::SSLeay (see "Low level API: OSSL_LIB_CTX and OSSL_PROVIDER
|
||||
related functions" in the Net::SSLeay module documentation for details)
|
||||
- Net::SSLeay's built-in PEM_get_string_PrivateKey() function depends on
|
||||
algorithms that have moved to the legacy provider described above; if
|
||||
OpenSSL has been compiled without the legacy provider, the tests
|
||||
t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will
|
||||
fail when the test suite is run
|
||||
- TLS 1.1 and below may only be used at security level 0 as of OpenSSL
|
||||
3.0.0; if a minimum required security level is imposed (e.g. in an
|
||||
OpenSSL configuration file managed by the operating system), the tests
|
||||
t/local/44_sess.t and t/local/45_exporter.t will fail when the test
|
||||
suite is run
|
||||
- Net::SSLeay now supports stable releases of LibreSSL from the 3.2-3.4
|
||||
series (with the exception of 3.2.2 and 3.2.3 - see "COMPATIBILITY" in
|
||||
the Net::SSLeay module documentation for details)
|
||||
- The TLS 1.3 implementation in LibreSSL 3.1-3.3, parts of which are
|
||||
enabled by default, is not fully compatible with the libssl API and may
|
||||
not function as expected with Net::SSLeay; see "KNOWN BUGS AND CAVEATS"
|
||||
in the Net::SSLeay module documentation for details
|
||||
- A number of new libcrypto/libssl constants and functions are now exposed,
|
||||
including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(),
|
||||
which are helpful when debugging TLS handshakes; see the release notes
|
||||
for the 1.91 developer releases (in the Changes file) for a full list of
|
||||
newly-exposed constants and functions
|
||||
|
||||
* Tue Oct 5 2021 Paul Howarth <paul@city-fan.org> - 1.90-7
|
||||
- Fixes for OpenSSL 3.0.0 are now entirely from upstream
|
||||
|
||||
|
||||
2
sources
2
sources
@ -1 +1 @@
|
||||
SHA512 (Net-SSLeay-1.90.tar.gz) = 8a5f251b5ef1d8c2d619d984594a7a22ddeed2e5e726fe683a45f299d7878f4ca8ffab00480ebf5ef7a94ae1fcf6be05dfdaa68b8bfe2ad68443150765adb891
|
||||
SHA512 (Net-SSLeay-1.92.tar.gz) = e9d9161ebeb7be90f4c7a0ea98f1034892ce6d33aa72872683177b19daa1f4c5819f85ea9a052a076ec8d7c21705f6c344aef64680bc881bf3218d38e8b7b173
|
||||
|
||||
Loading…
Reference in New Issue
Block a user