Changelog for
perl-Net-SSLeay-debuginfo-1.92-10.fc39.x86_64.rpm :
* Thu Aug 03 2023 Paul Howarth
- 1.92-10- Rebuild for OpenSSL 3.1.1 in Rawhide
* Fri Jul 21 2023 Fedora Release Engineering - 1.92-9- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
* Tue Jul 11 2023 Jitka Plesnikova - 1.92-8- Perl 5.38 rebuild
* Thu Apr 06 2023 Paul Howarth - 1.92-7- Update test suite to handle potential unavailability of sha1 algorithm https://github.com/radiator-software/p5-net-ssleay/pull/433- Avoid deprecated patch syntax
* Fri Mar 17 2023 Michal Josef Špaček - 1.92-6- Update license to SPDX format
* Fri Jan 20 2023 Fedora Release Engineering - 1.92-5- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
* Fri Jul 22 2022 Fedora Release Engineering - 1.92-4- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Tue May 31 2022 Jitka Plesnikova - 1.92-3- Perl 5.36 rebuild
* Fri Jan 21 2022 Fedora Release Engineering - 1.92-2- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Thu Jan 13 2022 Paul Howarth - 1.92-1- Update to 1.92 - Net::SSLeay now supports stable releases of OpenSSL 3.0 - OpenSSL 3.0.0 introduces the concept of \"providers\", which contain cryptographic algorithm implementations; many outdated, deprecated and/or insecure algorithms have been moved to the \"legacy\" provider, which may need to be loaded explicitly in order to use them with Net::SSLeay (see \"Low level API: OSSL_LIB_CTX and OSSL_PROVIDER related functions\" in the Net::SSLeay module documentation for details) - Net::SSLeay\'s built-in PEM_get_string_PrivateKey() function depends on algorithms that have moved to the legacy provider described above; if OpenSSL has been compiled without the legacy provider, the tests t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will fail when the test suite is run - TLS 1.1 and below may only be used at security level 0 as of OpenSSL 3.0.0; if a minimum required security level is imposed (e.g. in an OpenSSL configuration file managed by the operating system), the tests t/local/44_sess.t and t/local/45_exporter.t will fail when the test suite is run - Net::SSLeay now supports stable releases of LibreSSL from the 3.2-3.4 series (with the exception of 3.2.2 and 3.2.3 - see \"COMPATIBILITY\" in the Net::SSLeay module documentation for details) - The TLS 1.3 implementation in LibreSSL 3.1-3.3, parts of which are enabled by default, is not fully compatible with the libssl API and may not function as expected with Net::SSLeay; see \"KNOWN BUGS AND CAVEATS\" in the Net::SSLeay module documentation for details - A number of new libcrypto/libssl constants and functions are now exposed, including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(), which are helpful when debugging TLS handshakes; see the release notes for the 1.91 developer releases (in the Changes file) for a full list of newly-exposed constants and functions
* Tue Oct 05 2021 Paul Howarth - 1.90-7- Fixes for OpenSSL 3.0.0 are now entirely from upstream
* Wed Sep 15 2021 Paul Howarth - 1.90-6- Add fixes (mainly from upstream) for OpenSSL 3.0.0
* Tue Sep 14 2021 Sahana Prasad - 1.90-5- Rebuilt with OpenSSL 3.0.0