SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for xca-2.7.0-lp155.27.1.x86_64.rpm :

* Thu Sep 05 2024 Andrea Manzini - version update to 2.7.0
* Database Schema changed and is not backwards-compatible. Backup your database.
* Drivers for SQL Servers must be installed separately since 2.5.0
* full changelog at https://hohnstaedt.de/xca-doc/html/changelog.html#xca-2-7-0-tue-aug-27-2024- switched to QT6- added fdupes to handle duplicate files during package build
* Thu Apr 04 2024 ecsos - Fix build error in Leap.
* Wed Apr 03 2024 pgajdosAATTsuse.com- version update to 2.6.0
* Export certificates for ovpn file
* SHA1 based MAC for PKCS12
* Support legacy keys and automatically transform them if possible.
* Renew Certificate freeze XCA
* paste an encrypted private key results in a crash
* Fix crash when deleting CA certificates
* add flatpak build information and github action
* Subject Alternative Name not filled by all CN
* Improve import: Finish multi import when empty
* Add File extensions in Info.plist supported by XCA
* Quick view of certificates without trying to open XCA
* pass private key password
* Export PEM + Key in one File
* Impossible to import PKCS#12 (RC40_CBC)
* Make XCA AppStore compliant with -DAPPSTORE_COMPLIANT=ON- modified patches % xca-desktop.patch (refreshed)
* Thu Nov 16 2023 ecsos - Fix build error in Leap.
* Fri Oct 20 2023 Jonathan Brielmaier - Update to version 2.5.0:
* Multiple bug fixes
* Add Bulgarian, Indonesian and Persian translation
* Switch from autotools/qmake to cmake
* Add support for Qt6 and OpenSSL 3.x
* Drop support for Qt4
* Drop support for old XCA < 2.0.0 databases
* Drop support for OpenSSL < 1.1.0- Switch to cmake build system- Update URL- VERSION file got renamed to VERSION.txt- Improve Supplements syntax to conform with linter- Set buildrequires again to openssl as openSSL 3 is now supported
* Mon Feb 20 2023 roAATTsuse.de- change buildrequires for openssl on factory to use openssl-1.1 openSSL 3 is not supported in xca-2.4.0 yet
* Thu May 13 2021 Martin Hauke - Update to version 2.4.0
* Unify XCA icon (certificate) on all platforms
* Add Microsoft BitLocker extended key usage
* Disregard OpenSSL 0.9.8 compatibility
* Add bash completion script
* Add context sensitive help
* Convert documentation from linuxdoc/SGML to sphinxdoc
* Close #258: xca aborts on exit and on access to own templates
* Close #142: Support Ed25519 Import / Export private SSH2 key
* Close #142: Support Ed25519: Key-generation, import, export
* Close #251: AuthorityKeyIdentifier: use issuer:always
* Change language maintainer of brazilian portuguese
* Close #230: Change PKCS12 export extension from .p12 to .pfx
* Close #208: XCA hung when importing EC keys. For example prime256v1
* Close #210: Make dialog to edit SAN less strict
* Close #224: Store original path/filename on import
* Close #213: configure.ac: add description to AC_DEFINE_UNQUOTED
* Close #172 #46: Multiple OCSP Responders
* Store default database and recently opened file as UTF8
* Close #157 Generate and export CRLs from commandline
* Add command line support for creating CRLs, keys and analyzing items- Drop patch:
* xca-configure.patch (not longer needed)
* Sun Jul 26 2020 chrisAATTcomputersalat.de- xca 2.3.0 Wed Apr 29 2020
* Close #191 OID LN differs warning popups at startup
* Close #189 Database compaction #189
* Improve PKCS11 library loading for portable app
* Refactor native separators / and \\ on windows.
* Support TLS encrypted MariaDB and PostgreSQL connection
* Close #182: UI not using Windows native theme in 2.2.1 portable
* Close #70: cant open ics file in ical on macos mojave
* Close #72: Add checkbox for OCSP staple feature
* Use DESTDIR instead of destdir when installing. Follows autotools convention.
* Close #172 #46: Multiple OCSP Responders
* Close #170 xca-portable-2.2.1 cannot change language
* Fix certificate assignment when importing a CA certificate
* Close #163: Show key type/size on column of Certificates tab- rebase patches
* Thu Jan 30 2020 Martin Hauke - Update to version 2.2.1
* This is a patch release, fixing Issue #159: \"Opening existing database\" which prevented the current version opening databases of XCA 2.1.2
* Wed Jan 29 2020 Martin Hauke - Update to version 2.2.0
* Most notable improvements: + Support concurrent database access + Support ODBC database driver A detailled changelog can be found here: http://hohnstaedt.de/xca/index.php/software/changelog
* Mon Jan 20 2020 Martin Hauke - Run spec-cleaner
* Mon Feb 04 2019 Ismail Dönmez - Cleanup spec file- Use Qt5- Refresh patches
* Tue Jan 22 2019 liedkeAATTrz.uni-mannheim.de-Update to 2.1.2
* Close #40 macOS: Crash after xca v2.0.1 quit
* Close #37: XCA 2: EVP_DecryptFinal_ex:bad decrypt
* Close #74: Exiting XCA 2.1.1 corrupts database
* Make PKCS11 libs, working dir and main-window size host-dependent
* Support for XCA as portable App
* Close #69 Library not loaded: AATTrpath/ contains local directory
* Close #60: Fix MacOSX 2.1.1 binary
* Add new maintained languages: Polish, Spanish, Portuguese-Update to 2.1.1
* Allow manual override of the CSR signed flag
* Close #56: Duplicate Serials after Upgrade 2.1.0
* Close #57: SAN IP not working in 2.1.0
* Close #55: Calculate \"CSR signed\" information from legacy database
* Close #55: Add Certificate counter column for CSR
* Fix slovak translation
* Close #50: Hang while importing 1.4.1 database into 2.1.0-Update to 2.1.0
* Close #48: The SKI tickbox isn\'t generating an SKI extension for CSRs
* Fix translation of dates
* Add private key icon to the key name
* Inspired by #42: display dates relative (seconds ago, yesterday, ...) while column ordering is still strict by age. The ToolTip shows date and time.
* Related to #39: Dynamically adjust explicit DN entries
* Close #39: Subject entries shuffled
* Close #36: Support adding CN to X509v3 SAN automatically
* Close #35: Configurable size of serial number.
* Close #34: Improve Mac OSX installation
* Close #27: Configurable certificate expiry warning threshold
* Generate calender (.ics) files for certificate and CRL expiries-Update to 2.0.1
* Close #32: Version field contains \"Created by Qt/QMake\" on MacOSX
* Review and update russian ltranslation
* Close #31: Closing certificate details window toggles tree folding
* Close #25: Certificates are no longer coloured
* Close #24: Add LibreSSL support. Tested with LibreSSL 2.7.2
* Close #23: Improve limiting to pattern in certificate tree view
* Close #20: Unable to chose remote database type (dropdown empty)
* Close #19: Replace 3DES encryption by AES-256 during key export-Update to 2.0.0
* Open database before starting a transaction
* Fix default hash during startup
* Fix Importing PKCS#12 and PKCS#7 files
* Improve automatic setting of the certificate internal name
* Don\'t use remote DB descriptor as local database filename proposal
* Usability: Preset remote database input values with previous ones
* Add another missing windows postgres library
* xca 2.0.0-pre04 Thu Mar 22 2018
* Accept drivers that don\'t support transactions
* Install MySQL and PostgreSQL drivers on windows
* Closes #10: Warn if certificate without any extension is created
* Add table prefix to be prepended to each table for remote SQL DB
* Update translations
* xca 2.0.0-pre03 Thu Mar 15 2018
* Fix installation of sql plugins in the Windows installer
* Fix opening, importing and dropping databases
* xca 2.0.0-pre02 Tue Mar 13 2018
* Fix crash during PKCS#12 export
* Update HTTPS_server template and add example SAN
* Acceppt empty password for private key decryption
* Fix legacy database-without-password import
* xca 2.0.0-pre01 Sun Mar 11 2018
* Close GitHub Bug #5: Exporting a private key results in too-permissive permissions
* Close GitHub Bug #4: Workaround QT bug of editing in QDateTimeEdit
* Fix display of dates in the Certificate details (local time displayed a GMT)
* The internal name is not neccessarily unique anymore and can be edited in the details dialog as well as the comment.
* CSR signing is now statically stored in the database and the comment of the issued certificate.
* Private keys in the database are PKCS#8 encrypted and can be exported and decrypted without XCA.
* No more incrementing serials. Only unique random serial numbers.
* \"xca_db_stat\" application removed. Use the SQLite3 browser \"sqlitebrowser\".
* \"xca extract\" functionality removed. SQL views may be used instead.
* Each item may be commented. XCA itself comments important events in the item.
* Each item knows its time and origin of appearance.
* Change database format to SQL(ite) and support MySQL and PostgreSQL.
* Wed Oct 31 2018 Jan Engelhardt - Fix grammar in %description -l de.- Throw out old %__-type macro indirections and $RPM_ shell vars.
* Tue Oct 30 2018 Christian Wittmer - update to 1.4.1
* Replace links to XCA on Sourceforge in the software and
* documentation by links to my Site.
* SF Bug #122 isValid() tried to convert the serial to 64 bit
* Beautify mandatory distinguished name entry errors
* Support dragging certificates and other items as PEM text
* Show User settings and installation path in the about dialog
* Remove SPKAC support. Netscape is not of this world anymore.
* SF bug #124 Wrong assumptions about slots returned by PKCS11 library
* Cleanup and improve the OID text files, remove senseless aia.txt
* Update HTML documentation
* Refine and document Entropy gathering
* Indicate development and release version by git commit hash
* Fix dumping private keys during \"Dump database\"
* Fix Null pointer exception when importing PKCS#12 with OpenSSL 1.1.0
* SF Bug #110 Exported private key from 4096 bit SSH key is wrong
* SF Bug #109 Revoked.png isn\'t a valid image
* SF Bug #121 CA serial number is ignored in hierarchical view
* Improve speed of Bulk import.
* Fix starting xca with a database as first arg- xca 1.4.0
* Update OpenSSL version for MacOSX and W32 to 1.1.0g
* Change default hash to SHA-256 and
* add a warning if the default hash algorithm is SHA1 or less
* Switch to Qt5 for Windows build and installation
* Do not apply the default template when creating a similar cert
* Close SF #120 Crash when importing CA certificate
* Close SF #116 db_x509.cpp:521: Mismatching allocation and deallocation
* Add support for OpenSSL 1.1 (by Patrick Monnerat)
* Support generating an OpenSSL \"index.txt\" (by Adam Dawidowski)
* Thales nCipher key generation changes for EC and DSA keys
* Add Slovak translation- remove obsolete
* xca-1.3.2-openssl11.patch
* xca-doc_Makefile.patch- add xca-configure.patch
* fix sgml2html command- cleanup spec, fix deps
* Tue Dec 05 2017 roAATTsuse.de- add xca-1.3.2-openssl11.patch to fix build on factory with openssl-1.1
* Fri Jan 29 2016 chrisAATTcomputersalat.de- fix Changelog- fix deps
* openssl-devel >= 0.9.8
* openssl >= 0.9.8- fix missing help files- fix rpmlint
* spurious-executable-perm /usr/share/man/man1/xca.1.gz
* spurious-executable-perm /usr/share/man/man1/xca.1.gz- add xca-doc_Makefile.patch
* Fri Oct 16 2015 ecsosAATTopensuse.org- update to 1.3.2
* Gentoo Bug #562288 linking fails
* Add OID resolver, move some Menu items to \"Extra\"
* SF. Bug. #81 Make xca qt5 compatible
* SF. Bug. #107 error:0D0680A8:asn1 encoding
* Don\'t validate notBefore and notAfter if they are disabled.- xca 1.3.1
* Fix endless loop while searching for a signer of a CRL- xca 1.3.0
* Update to OpenSSL 1.0.2d for Windows and MAC
* SF Bug #105 1.2.0 OS X Retina Display Support
* Digitaly sign Windows and MAC binaries with a valid certificate
* Refactor the context menu. Exporting many selected items to the clipboard or a PEM file now works. Certificate renewal and revocation may now be performed on a batch of certificates.
* Feat. Reg. #83 Option to revoke old certificate when renewing
* Refactor revocation handling. All revocation information is stored with the CA and may be modified. Revoked certificates may now be deleted from the database
* Support nameConstraints, policyMappings, InhibitAnyPolicy, PolicyConstraint and (OSCP)noCheck when transforming certificates to templates or OpenSSL configs
* Fix SF Bug #104 Export to template introduces spaces
* Add option for disabling legacy Netscape extensions
* Support exporting SSH2 public key to the clipboard
* SF Bug #102 Weak entropy source used for key generation: Use /dev/random, mouse/kbd entropy, token RNG
* SF Feat. Req. #80 Create new certificate, based on existing certificate, same for requests
* Add Cert/Req Column for Signature Algorithm
* SF Feat. Req. #81 Show key size in New Certificate dialog
* Distinguish export from transform: - Export writes to an external file, - Transform generates another XCA item
* Tue Mar 31 2015 ecsosAATTopensuse.org- update to 1.2.0
* Update to OpenSSL 1.0.2a for Windows and MAC drop brainpool extra builds
* Use CTRL +/- to change the font size in the view
* Add Row numbering for easy item counting
* Support SSH2 public key format for import and export
* Add support for SHA-224
* add \"xca extract\" to export items from the database on the commandline
* Thu Nov 27 2014 chrisAATTcomputersalat.de- update to 1.1.0
* SF#xca#79 Template export from WinXP cannot be imported in Linux and Mac OS X
* Support for Brainpool windows and MacOSX binaries
* SF Feat. Req. #70 ability to search certificates
* SF Feat. Req. #75 show SHA-256 digest
* RedHat Bug #1164340 - segfault when viewing a RHEL entitlement certificate
* Database hardening
* Delete invalid items (on demand)
* Be more tolerant against database errors
* Gracefully handle and repair corrupt databases
* Add \"xca_db_stat(.exe)\" binary to all installations
* Translation updates
* Optionally allow hash algos not supported by the token
* Select whether to translate established x509 terms
* Finish Token EC and DSA support - generate, import, export, sign
* SF Feat. Req. #57 More options for Distinguished Name
* Switch to autoconf for the configure script
* SF Feature Req. #76 Export private keys to clipboard
* EC Keys: show Curve name in table
* Support EC key generation on PKCS#11 token
* PKCS#11: Make EC and RSA signatures work
* PKCS#11: Fix reading EC keys from card
* SF#xca#82 Certificate Creation out of Spec
* SF#xca#95 XCA 1.0 only runs in French on a UK English Mac- xca 1.0.0
* SF#xca#89 Validating CRL distribution point results in error
* SF Feature Req. #69 Create \"Recent databases...\" file menu item
* SF#xca#75 authorityInfoAccess set error
* SF#xca#88 Minor spelling error
* SF#xca#87 Unable to set default key length The Key generation dialog now allows to remember the current settings
* Do not interpret HTML tags in message boxes
* Overwite extensions from the PKCS#10 request by local extensions This avoids duplication errors and allows to overwrite some extensions from the request
* SF#xca#78 replace path separators in export filenames
* SF Feature Req. #71 Add KDC Authentication OIDs to default files
* SF#xca#82 Certificate Creation out of Spec
* Add Croatian translation
* SF#xca#83 Inappropriate gcc argument order in configure script- update dependencies
* qt >= 4.6.0- remove obsolete 0001-Fix-for-openssl-1.0.1i.patch- replace xca-configure.patch with xca-linuxdoc.patch- rebase xca-desktop.patch
 
ICM