Changelog for
perl-Net-SSLeay-1.92-4.fc37.x86_64.rpm :
* Fri Jul 22 2022 Fedora Release Engineering
- 1.92-4- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Tue May 31 2022 Jitka Plesnikova - 1.92-3- Perl 5.36 rebuild
* Fri Jan 21 2022 Fedora Release Engineering - 1.92-2- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Thu Jan 13 2022 Paul Howarth - 1.92-1- Update to 1.92 - Net::SSLeay now supports stable releases of OpenSSL 3.0 - OpenSSL 3.0.0 introduces the concept of \"providers\", which contain cryptographic algorithm implementations; many outdated, deprecated and/or insecure algorithms have been moved to the \"legacy\" provider, which may need to be loaded explicitly in order to use them with Net::SSLeay (see \"Low level API: OSSL_LIB_CTX and OSSL_PROVIDER related functions\" in the Net::SSLeay module documentation for details) - Net::SSLeay\'s built-in PEM_get_string_PrivateKey() function depends on algorithms that have moved to the legacy provider described above; if OpenSSL has been compiled without the legacy provider, the tests t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will fail when the test suite is run - TLS 1.1 and below may only be used at security level 0 as of OpenSSL 3.0.0; if a minimum required security level is imposed (e.g. in an OpenSSL configuration file managed by the operating system), the tests t/local/44_sess.t and t/local/45_exporter.t will fail when the test suite is run - Net::SSLeay now supports stable releases of LibreSSL from the 3.2-3.4 series (with the exception of 3.2.2 and 3.2.3 - see \"COMPATIBILITY\" in the Net::SSLeay module documentation for details) - The TLS 1.3 implementation in LibreSSL 3.1-3.3, parts of which are enabled by default, is not fully compatible with the libssl API and may not function as expected with Net::SSLeay; see \"KNOWN BUGS AND CAVEATS\" in the Net::SSLeay module documentation for details - A number of new libcrypto/libssl constants and functions are now exposed, including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(), which are helpful when debugging TLS handshakes; see the release notes for the 1.91 developer releases (in the Changes file) for a full list of newly-exposed constants and functions
* Tue Oct 05 2021 Paul Howarth - 1.90-7- Fixes for OpenSSL 3.0.0 are now entirely from upstream
* Wed Sep 15 2021 Paul Howarth - 1.90-6- Add fixes (mainly from upstream) for OpenSSL 3.0.0
* Tue Sep 14 2021 Sahana Prasad - 1.90-5- Rebuilt with OpenSSL 3.0.0
* Thu Jul 22 2021 Fedora Release Engineering - 1.90-4- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Fri May 21 2021 Jitka Plesnikova - 1.90-3- Perl 5.34 rebuild
* Wed Jan 27 2021 Fedora Release Engineering - 1.90-2- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Thu Jan 21 2021 Paul Howarth - 1.90-1- Update to 1.90 - Formalised libssl version support policy: all stable versions of OpenSSL in the 0.9.8-1.1.1 branches (with the exception of 0.9.8-0.9.8b) and all stable releases of LibreSSL in the 2.0-3.1 series are supported - The LibreSSL 3.2 series is not yet fully supported because its TLSv1.3 implementation is not currently libssl-compatible - Added support for LibreSSL on Windows when built with Visual C++ - Exposed P_X509_CRL_add_extensions, several SSL_CIPHER functions, and several stack functions - Fixed crashes in the callback functions CTX_set_next_proto_select_cb and CTX_set_alpn_select_cb - The test suite is now compatible with OpenSSL 1.1.1e onwards, as well as OpenSSL security level 2 (the default on many Linux distributions)
* Tue Jul 28 2020 Fedora Release Engineering - 1.88-9- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild