Sync from SUSE:SLFO:Main perl-Net-SSLeay revision 40ca75d5d1873efcf5f74ca76f6495d9
This commit is contained in:
parent
955d3c8d48
commit
aa94feacd3
BIN
Net-SSLeay-1.92.tar.gz
(Stored with Git LFS)
BIN
Net-SSLeay-1.92.tar.gz
(Stored with Git LFS)
Binary file not shown.
BIN
Net-SSLeay-1.94.tar.gz
(Stored with Git LFS)
Normal file
BIN
Net-SSLeay-1.94.tar.gz
(Stored with Git LFS)
Normal file
Binary file not shown.
@ -1,72 +0,0 @@
|
||||
From 87e8d288e4ab42e0b9e934850195a3498e4de4be Mon Sep 17 00:00:00 2001
|
||||
From: Heikki Vatiainen <hvn@radiatorsoftware.com>
|
||||
Date: Wed, 6 Dec 2023 23:19:45 +0200
|
||||
Subject: [PATCH] GH-449 Use constants X509_VERSION_3 and X509_REQ_VERSION_1
|
||||
when available.
|
||||
|
||||
OpenSSL 3.2.0 no longer allows setting certificate version field value to 3
|
||||
because the highest current value is 2. The confusion likely arises from the
|
||||
definition of version field values in ASN.1 definitions where value 2 means
|
||||
version 3, value 1 is version 2, and so forth for certificate request and CRLs.
|
||||
|
||||
Test 33_x509_create_cert.t was directly setting certificate version to integer
|
||||
3 which no longer worked. Using a valid value allows all tests to pass with
|
||||
OpenSSL 3.2.0.
|
||||
---
|
||||
t/local/33_x509_create_cert.t | 15 +++++++++------
|
||||
1 file changed, 9 insertions(+), 6 deletions(-)
|
||||
|
||||
Index: Net-SSLeay-1.92/t/local/33_x509_create_cert.t
|
||||
===================================================================
|
||||
--- Net-SSLeay-1.92.orig/t/local/33_x509_create_cert.t
|
||||
+++ Net-SSLeay-1.92/t/local/33_x509_create_cert.t
|
||||
@@ -53,7 +53,8 @@ is(Net::SSLeay::X509_NAME_cmp($ca_issuer
|
||||
#set organizationName via add_entry_by_txt
|
||||
ok(Net::SSLeay::X509_NAME_add_entry_by_txt($name, "organizationName", MBSTRING_UTF8, "Company Name"), "X509_NAME_add_entry_by_txt");
|
||||
|
||||
- ok(Net::SSLeay::X509_set_version($x509, 3), "X509_set_version");
|
||||
+ my $x509_version_3 = (defined &Net::SSLeay::X509_VERSION_3) ? Net::SSLeay::X509_VERSION_3() : 2; # Note: X509_VERSION_3 is 2
|
||||
+ ok(Net::SSLeay::X509_set_version($x509, $x509_version_3), "X509_set_version");
|
||||
ok(my $sn = Net::SSLeay::X509_get_serialNumber($x509), "X509_get_serialNumber");
|
||||
|
||||
my $pubkey = Net::SSLeay::X509_get_X509_PUBKEY($x509);
|
||||
@@ -96,7 +97,7 @@ is(Net::SSLeay::X509_NAME_cmp($ca_issuer
|
||||
ok(my $sha1_digest = Net::SSLeay::EVP_get_digestbyname("sha1"), "EVP_get_digestbyname");
|
||||
ok(Net::SSLeay::X509_sign($x509, $ca_pk, $sha1_digest), "X509_sign");
|
||||
|
||||
- is(Net::SSLeay::X509_get_version($x509), 3, "X509_get_version");
|
||||
+ is(Net::SSLeay::X509_get_version($x509), $x509_version_3, "X509_get_version");
|
||||
is(Net::SSLeay::X509_verify($x509, Net::SSLeay::X509_get_pubkey($ca_cert)), 1, "X509_verify");
|
||||
|
||||
like(my $crt_pem = Net::SSLeay::PEM_get_string_X509($x509), qr/-----BEGIN CERTIFICATE-----/, "PEM_get_string_X509");
|
||||
@@ -183,8 +184,9 @@ is(Net::SSLeay::X509_NAME_cmp($ca_issuer
|
||||
ok(Net::SSLeay::X509_REQ_add1_attr_by_NID($req, 54, MBSTRING_ASC, 'password xyz'), "X509_REQ_add1_attr_by_NID");
|
||||
#49 = NID_pkcs9_unstructuredName - XXX-TODO add new constant
|
||||
ok(Net::SSLeay::X509_REQ_add1_attr_by_NID($req, 49, MBSTRING_ASC, 'Any Uns.name'), "X509_REQ_add1_attr_by_NID");
|
||||
-
|
||||
- ok(Net::SSLeay::X509_REQ_set_version($req, 2), "X509_REQ_set_version");
|
||||
+
|
||||
+ my $x509_req_version_1 = (defined &Net::SSLeay::X509_REQ_VERSION_1) ? Net::SSLeay::X509_REQ_VERSION_1() : 0; # Note: X509_REQ_VERSION_1 is 0
|
||||
+ ok(Net::SSLeay::X509_REQ_set_version($req, $x509_req_version_1), "X509_REQ_set_version");
|
||||
|
||||
ok(my $sha1_digest = Net::SSLeay::EVP_get_digestbyname("sha1"), "EVP_get_digestbyname");
|
||||
ok(Net::SSLeay::X509_REQ_sign($req, $pk, $sha1_digest), "X509_REQ_sign");
|
||||
@@ -192,7 +194,7 @@ is(Net::SSLeay::X509_NAME_cmp($ca_issuer
|
||||
ok(my $req_pubkey = Net::SSLeay::X509_REQ_get_pubkey($req), "X509_REQ_get_pubkey");
|
||||
is(Net::SSLeay::X509_REQ_verify($req, $req_pubkey), 1, "X509_REQ_verify");
|
||||
|
||||
- is(Net::SSLeay::X509_REQ_get_version($req), 2, "X509_REQ_get_version");
|
||||
+ is(Net::SSLeay::X509_REQ_get_version($req), $x509_req_version_1, "X509_REQ_get_version");
|
||||
ok(my $obj_challengePassword = Net::SSLeay::OBJ_txt2obj('1.2.840.113549.1.9.7'), "OBJ_txt2obj");
|
||||
ok(my $nid_challengePassword = Net::SSLeay::OBJ_obj2nid($obj_challengePassword), "OBJ_obj2nid");
|
||||
is(Net::SSLeay::X509_REQ_get_attr_count($req), 3, "X509_REQ_get_attr_count");
|
||||
@@ -214,7 +216,8 @@ is(Net::SSLeay::X509_NAME_cmp($ca_issuer
|
||||
|
||||
## PHASE2 - turn X509_REQ into X509 cert + sign with CA key
|
||||
ok(my $x509ss = Net::SSLeay::X509_new(), "X509_new");
|
||||
- ok(Net::SSLeay::X509_set_version($x509ss, 2), "X509_set_version");
|
||||
+ my $x509_version_3 = (defined &Net::SSLeay::X509_VERSION_3) ? Net::SSLeay::X509_VERSION_3() : 2; # Note: X509_VERSION_3 is 2
|
||||
+ ok(Net::SSLeay::X509_set_version($x509ss, $x509_version_3), "X509_set_version");
|
||||
ok(my $sn = Net::SSLeay::X509_get_serialNumber($x509ss), "X509_get_serialNumber");
|
||||
Net::SSLeay::P_ASN1_INTEGER_set_hex($sn, 'ABCDEF');
|
||||
Net::SSLeay::X509_set_issuer_name($x509ss, Net::SSLeay::X509_get_subject_name($ca_cert));
|
@ -1,3 +1,361 @@
|
||||
-------------------------------------------------------------------
|
||||
Fri Mar 22 19:08:41 UTC 2024 - Tina Müller <tina.mueller@suse.com>
|
||||
|
||||
- Remove Use-constants-X509_VERSION_3-and-X509_REQ_VERSION_1-when-available.patch
|
||||
(fixed upstream)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jan 8 03:06:42 UTC 2024 - Tina Müller <timueller+perl@suse.de>
|
||||
|
||||
- updated to 1.94
|
||||
see /usr/share/doc/packages/perl-Net-SSLeay/Changes
|
||||
|
||||
1.94 2024-01-08
|
||||
- New stable release incorporating all changes from developer releases 1.93_01
|
||||
to 1.93_05.
|
||||
- Summary of major changes since version 1.92:
|
||||
- Net::SSLeay now officially supports all stable releases of OpenSSL 3.1 and
|
||||
3.2, and LibreSSL 3.5 - 3.8.
|
||||
- Many noisy compiler warnings have been silenced - if SSLeay.xs fails to
|
||||
compile, it should now be much easier to identify the cause.
|
||||
- libcrypto's OPENSSL_init_crypto() function and libssl's OPENSSL_init_ssl()
|
||||
function are now exposed, enabling fine-grained control over the
|
||||
initialisation and configuration of both libraries.
|
||||
- libssl functions implementing TLS 1.3 PSK authentication are now exposed,
|
||||
in particular SSL_CTX_set_psk_find_session_callback() (on the server side)
|
||||
and SSL_CTX_set_psk_use_session_callback() (on the client side).
|
||||
- libssl functions implementing server-side TLS 1.2 PSK authentication are
|
||||
now exposed, in particular SSL_CTX_set_psk_server_callback().
|
||||
- libssl's SSL_CTX_set_client_hello_cb() function is now exposed, allowing a
|
||||
TLS server to set a callback function that is executed when the server
|
||||
processes a ClientHello message.
|
||||
- Many more libcrypto/libssl constants and functions are now exposed; see the
|
||||
release notes for the 1.93 developer releases for a full list.
|
||||
1.93_05 2024-01-06
|
||||
- Remove support for automatic detection of libssl/libcrypto via pkg-config
|
||||
with ExtUtils::PkgConfig if it is installed, due to the compiler and linker
|
||||
options provided by pkg-config being used unconditionally (which is
|
||||
incompatible with the OPENSSL_PREFIX detection method). The implementation of
|
||||
this was merged in time for developer release 1.93_03 and therefore hasn't
|
||||
been included in a stable release yet, so this doesn't represent a breaking
|
||||
change to the way in which libssl/libcrypto are detected by Makefile.PL. This
|
||||
is, however, a very useful feature, and we intend to bring it back in time
|
||||
for Net-SSLeay 1.96 after ironing out the remaining bugs.
|
||||
1.93_04 2024-01-05
|
||||
- Use -DOPENSSL_API_COMPAT=908 when compiling SSLeay.xs to
|
||||
suppress OpenSSL deprecation warnings.
|
||||
- Expose a number of functions that were added in recent
|
||||
LibreSSL releases or were not otherwise exposed before:
|
||||
- SSL(_CTX)_get/set_security_level in LibreSSL 3.6.0
|
||||
- SSL(_CTX)_get/set_num_tickets in LibreSSL 3.5.0
|
||||
- SSL(_CTX)_set_ciphersuites in LibreSSL 3.4.0
|
||||
- EVP_PKEY_security_bits in LibreSSL 3.6.0
|
||||
- SSL_CTX_set_keylog_callback in LibreSSL 3.5.0
|
||||
- SSL_is_dtls in LibreSSL 3.3.2
|
||||
- Remove Tuure Vartiainen as an active contributor. Tuure's contributions were
|
||||
instrumental in the transition from ad hoc testing to CI-based testing, which
|
||||
has greatly improved Net-SSLeay's stability, reliability and compatibility.
|
||||
Thanks for your contributions, Tuure!
|
||||
1.93_03 2024-01-02
|
||||
- Pass RAND_seed()'s sole argument to the underlying RAND_seed() function in
|
||||
libcrypto, rather than passing the value of a non-existent second argument.
|
||||
Fixes GH-427. Thanks to cgf1 for the report.
|
||||
- Avoid explicit and implicit use of weak hash algorithms,
|
||||
such as MD5 and SHA-1, in test suite. This allows tests
|
||||
44_sess.t and 45_exporter.t to correctly work on systems
|
||||
where crypto policies prohibit their direct use and TLS
|
||||
versions that require them. An example of such a system is
|
||||
Rocky Linux 9.2. Any Red Hat Enterprise Linux 9 and derived
|
||||
system is likely to have similar behaviour. Thanks to Paul
|
||||
Howarth for the investigation and patches.
|
||||
- LibreSSL 3.8.0 release notes state: The POLICY_TREE and its
|
||||
related structures and API were removed. The affected
|
||||
Net::SSLeay functions are:
|
||||
- X509_policy_level_get0_node
|
||||
- X509_policy_level_node_count
|
||||
- X509_policy_node_get0_parent
|
||||
- X509_policy_node_get0_policy
|
||||
- X509_policy_node_get0_qualifiers
|
||||
- X509_policy_tree_free
|
||||
- X509_policy_tree_get0_level
|
||||
- X509_policy_tree_get0_policies
|
||||
- X509_policy_tree_get0_user_policies
|
||||
- X509_policy_tree_level_count
|
||||
Patch by GitHub user orbea.
|
||||
- Add OpenSSL 3.1 and LibreSSL 3.7 minor releases to GitHub CI testing.
|
||||
Update the previous minor releases to their latest versions. Add
|
||||
NetBSD to BSDs job and update the other BSDs and Alpine Linux jobs to
|
||||
cover additional and latest releases. Use the latest MacOS runners.
|
||||
- Expose SSL_CTX_set_client_hello_cb for setting a callback
|
||||
the server calls when it processes a ClientHello. Expose the
|
||||
following functions that can be called only from the
|
||||
callback. None of these are available with LibreSSL.
|
||||
- SSL_client_hello_isv2
|
||||
- SSL_client_hello_get0_legacy_version
|
||||
- SSL_client_hello_get0_random
|
||||
- SSL_client_hello_get0_session_id
|
||||
- SSL_client_hello_get0_ciphers
|
||||
- SSL_client_hello_get0_compression_methods
|
||||
- SSL_client_hello_get1_extensions_present
|
||||
- SSL_client_hello_get_extension_order
|
||||
- SSL_client_hello_get0_ext
|
||||
- Expose constants used by SSL_CTX_set_client_hello_cb related
|
||||
functions.
|
||||
- AD_ prefixed constants naming TLS alert codes for
|
||||
returning from a ClientHello callback or where alert types
|
||||
are used
|
||||
- CLIENT_HELLO_ERROR, CLIENT_HELLO_RETRY and
|
||||
CLIENT_HELLO_SUCCESS for returning from a ClientHello
|
||||
callback
|
||||
- TLSEXT_TYPE_ prefixed contants for naming TLS extension
|
||||
types
|
||||
- Expose functions for setting up TLS PSK on the server
|
||||
side. Only SSL_CIPHER_find is available with LibreSSL.
|
||||
- SSL_use_psk_identity_hint
|
||||
- SSL_CTX_use_psk_identity_hint
|
||||
- SSL_set_psk_server_callback
|
||||
- SSL_CTX_set_psk_server_callback
|
||||
- SSL_set_psk_find_session_callback
|
||||
- SSL_CTX_set_psk_find_session_callback
|
||||
- SSL_SESSION_set1_master_key
|
||||
- SSL_SESSION_set_cipher
|
||||
- SSL_SESSION_set_protocol_version
|
||||
- SSL_CIPHER_find
|
||||
- Expose NID_shake128, NID_shake256 and the rest of NID_sha* constants.
|
||||
- Expose functions for setting up TLS 1.3 PSK authentication
|
||||
on the client side. Only SSL_SESSION_get0_cipher is
|
||||
available with LibreSSL.
|
||||
- SSL_set_psk_use_session_callback
|
||||
- SSL_CTX_set_psk_use_session_callback
|
||||
- SSL_CIPHER_get_handshake_digest
|
||||
- SSL_SESSION_get0_cipher
|
||||
- EVP_MD_get0_description
|
||||
- EVP_MD_get0_name
|
||||
- EVP_MD_get_type
|
||||
- Major documentation cleanup. Thanks to John Jetmore.
|
||||
- Add constants for specifying version field for certificates,
|
||||
certificate requests and CRLs. Available in OpenSSL 3.0:
|
||||
- X509_VERSION_1, X509_VERSION_2 and X509_VERSION_3
|
||||
- X509_REQ_VERSION_1, X509_REQ_VERSION_2 and X509_REQ_VERSION_3
|
||||
- X509_CRL_VERSION_1 and X509_CRL_VERSION_2
|
||||
- Remove conditional compilation checks from SSLeay.xs and
|
||||
compatilibty notes from SSLeay.pod for OpenSSL versions
|
||||
earlier than 0.9.8. This includes all 0.9.7 and earlier
|
||||
releases down to 0.9.3a. Update tests respectively.
|
||||
- Add OpenSSL 3.2 and LibreSSL 3.8 minor releases to GitHub CI
|
||||
testing. Update existing OpenSSL releases to 1.1.1w, 3.0.12
|
||||
and 3.1.4.
|
||||
- Support compiling SSLeay.xs with a C++ compiler. Thanks to
|
||||
James E Keenan and GitHub user twata1 for suggesting this,
|
||||
testing and providing detailed test reports. Tested with GCC
|
||||
13 g++, Clang 17 clang++ and Visual Studio Community 2022
|
||||
C++ compilers. Discussion in GH-425 and GH-438.
|
||||
- Add constants for OPENSSL_init_crypto and related functions:
|
||||
- CONF_MFLAGS_DEFAULT_SECTION
|
||||
- CONF_MFLAGS_IGNORE_ERRORS
|
||||
- CONF_MFLAGS_IGNORE_MISSING_FILE
|
||||
- CONF_MFLAGS_IGNORE_RETURN_CODES
|
||||
- CONF_MFLAGS_NO_DSO
|
||||
- CONF_MFLAGS_SILENT
|
||||
- OPENSSL_INIT_ADD_ALL_CIPHERS
|
||||
- OPENSSL_INIT_ADD_ALL_DIGESTS
|
||||
- OPENSSL_INIT_ASYNC
|
||||
- OPENSSL_INIT_ATFORK
|
||||
- OPENSSL_INIT_ENGINE_AFALG
|
||||
- OPENSSL_INIT_ENGINE_CAPI
|
||||
- OPENSSL_INIT_ENGINE_CRYPTODEV
|
||||
- OPENSSL_INIT_ENGINE_DYNAMIC
|
||||
- OPENSSL_INIT_ENGINE_OPENSSL
|
||||
- OPENSSL_INIT_ENGINE_PADLOCK
|
||||
- OPENSSL_INIT_ENGINE_RDRAND
|
||||
- OPENSSL_INIT_LOAD_CONFIG
|
||||
- OPENSSL_INIT_LOAD_CRYPTO_STRINGS
|
||||
- OPENSSL_INIT_LOAD_SSL_STRINGS
|
||||
- OPENSSL_INIT_NO_ADD_ALL_CIPHERS
|
||||
- OPENSSL_INIT_NO_ADD_ALL_DIGESTS
|
||||
- OPENSSL_INIT_NO_ATEXIT
|
||||
- OPENSSL_INIT_NO_LOAD_CONFIG
|
||||
- OPENSSL_INIT_NO_LOAD_CRYPTO_STRINGS
|
||||
- OPENSSL_INIT_NO_LOAD_SSL_STRINGS
|
||||
- Expose functions for OpenSSL libcrypto and libssl
|
||||
initialisation, configuration and deinitialisation.
|
||||
These are available in OpenSSL 1.1.0 and later:
|
||||
- OPENSSL_init_ssl and OPENSSL_init_crypto
|
||||
- OPENSSL_cleanup, also in LibreSSL 3.6.0
|
||||
- OPENSSL_INIT_new and OPENSSL_INIT_free
|
||||
- OPENSSL_INIT_set_config_filename
|
||||
- OPENSSL_INIT_set_config_appname
|
||||
- OPENSSL_INIT_set_config_file_flags
|
||||
- Add new test file 23_openssl_init.t for OPENSSL_init_ssl and
|
||||
related functions.
|
||||
- Support finding OpenSSL libraries using
|
||||
ExtUtils::PkgConfig. Thanks to Paul Howarth for the patch.
|
||||
- Fix a number of cases where variables were declared after
|
||||
code triggering Gcc and Clang warning
|
||||
-Wdeclaration-after-statement. This is supported by C
|
||||
language version C99 and used by Perl 5.35.5 and
|
||||
later. SSLeay.xs is likely compiled with compilers that do
|
||||
not support this, therefore such constructs are avoided in
|
||||
SSLeay.xs. Thanks to GitHub user bulk88 for the patch.
|
||||
- Fix _CRT_SECURE_NO_DEPRECATE warning on Windows. Fix OpenSSL
|
||||
library file path detection loop in Makefile.PL. Both thanks
|
||||
to bulk88.
|
||||
- Update Shining Light OpenSSL detection to work with OpenSSL
|
||||
1.1.1w, 3.0.12, 3.1.4 and 3.2.0 installers. Caveats: when
|
||||
both 32bit and 64bit versions are installed, OpenSSL library
|
||||
path detection may pick the wrong version. Static
|
||||
compilation needs seems not to work with the these
|
||||
versions. Thanks to bulk88 for the initial updates.
|
||||
- Tone down Makefile.PL and README warning against mixing
|
||||
compilers and flags when compiling OpenSSL, Perl and
|
||||
Net::SSLeay. This may still be a requirement on some
|
||||
platforms, but, for example, with Linux and macOS mixing
|
||||
clang and gcc appears to work.
|
||||
- Add general installation instructions in README. Thanks to
|
||||
GitHub user viviparous. Update README and README.OSX.
|
||||
1.93_02 2023-02-22
|
||||
- Update ppport.h to version 3.68. This eliminates thousands of
|
||||
compound-token-split-by-macro compiler warnings when building Net-SSLeay with
|
||||
Clang 12 or greater. Partially fixes GH-383.
|
||||
- Silence compound-token-split-by-macro warnings when building Net-SSLeay with
|
||||
Clang 12 or greater. Fixes the remainder of GH-383.
|
||||
- When building Net-SSLeay, search for the openssl binary in the same directory
|
||||
in which Perl is installed (i.e. $Config{prefix}/bin/). Thanks to Henrik
|
||||
Grimler for the patch.
|
||||
- Expose EVP_PKEY_security_bits. Thanks to Felipe Gasper.
|
||||
- Major update to Gihub Actions configuration. Thanks to Felipe Gasper.
|
||||
New testing targets are:
|
||||
- OpenSSL and LibreSSL on Alpine Linux on i386, x390x, arm32v6,
|
||||
ar32v7 and arm64v8 architectures.
|
||||
- OpenSSL and LibreSSL on Ubuntu on i386, x390x, ar32v7 and arm64v8
|
||||
architectures.
|
||||
- OpenSSL on FreeBSD 13.0, not enabled yet because of GH #272 and #394
|
||||
- LibreSSL on FreeBSD 13.0
|
||||
- LibreSSL on OpenBSD 6.9
|
||||
- LibreSSL on OpenBSD 7.1
|
||||
- Cygwin on x86_64
|
||||
- Fix compilation failure using cl. Microsoft cl compiler do
|
||||
not like when preprocessor directives are inside a
|
||||
macro. Fixes GH-403. Thanks to Jean-Damien Durand.
|
||||
- Update CTX_use_PKCS12_file() and CTX_use_PKCS12_file() to
|
||||
use BIO functions for avoiding "no OPENSSL_Applink" runtime
|
||||
errors. Fixes GH-281 and RT#101638. Thanks to Jean-Damien
|
||||
Durand.
|
||||
- Add to README.Win32 more information about OPENSSL_Applink
|
||||
and how it may be needed with FILE pointers and POSIX/Unix
|
||||
fds. Recommended method is to avoid them and use OpenSSL BIO
|
||||
functions instead. Update SSLeay.pod with alternatives to
|
||||
Net::SSLeay::SESSION_print_fp(). Closes GH-411.
|
||||
- Refactor variable declarations in RSA_generate_key to allow SSLeay.xs to
|
||||
compile under -Werror=declaration-after-statement. Fixes GH-407. Thanks to
|
||||
dharanlinux for the report.
|
||||
- Fix memory leaks after calls to X509_get_ext_d2i. Thanks to Anton Borowka.
|
||||
- Documentation fix: Correct CRL revocation reasons in
|
||||
P_X509_CRL_add_revoked_serial_hex(). Closes GH-397. Reported
|
||||
by Marc Reisner.
|
||||
- Support stable releases of LibreSSL 3.5 and 3.6.
|
||||
- Update callback set by SSL_set_session_secret_cb to adjust
|
||||
master secret's length. This is needed with OpenSSL 1.1.1
|
||||
and later that provide buffer that is now longer than 48
|
||||
octets. Fix Net::SSLeay::get_keyblock_size() size
|
||||
calculation with AEAD ciphers. These functions were
|
||||
originally added to OpenSSL and Net::SSLeay for
|
||||
EAP-FAST. These changes allow EAP-FAST to work with AEAD
|
||||
ciphers and with OpenSSL versions 1.1.1 and later.
|
||||
- Remove code guarded by obsolete
|
||||
SSL_F_SSL_SET_HELLO_EXTENSION #ifdef. This was used by the
|
||||
initial EAP-FAST related OpenSSL patch which was never part
|
||||
of the OpenSSL distribution.
|
||||
- PEM_get_string_PrivateKey() currently uses DES-CBC as its
|
||||
default encryption algorithm. Test 33_x509_create_cert.t now
|
||||
skips testing the default algorithm on systems that support
|
||||
providers but don't have the legacy provider available. One
|
||||
such system is FreeBSD 13.0 with OpenSSL which was added as
|
||||
disabled in GitHub actions by PR GH-402 but can now be
|
||||
enabled. Long term fix is to replace DES-CBC with a modern
|
||||
cipher. Allows closing GH-394.
|
||||
1.93_01 2022-03-20
|
||||
- LibreSSL 3.5.0 has removed access to internal data
|
||||
structures: Use X509_get0_tbs_sigalg() and
|
||||
OCSP_SINGLERESP_get0_id() like in OpenSSL 1.1. Also use
|
||||
RSA_get0... with RSA_get_key_parameters(). Thanks to
|
||||
Alexander Bluhm.
|
||||
- Expose SSL_CTX_get_min_proto_version(),
|
||||
SSL_CTX_get_max_proto_version(), SSL_get_min_proto_version()
|
||||
and SSL_get_max_proto_version() with LibresSSL 3.4.0 and
|
||||
later. Thanks to Alexander Bluhm.
|
||||
- Update tests 07_sslecho.t and 44_sess.t to work around
|
||||
failures seen on Windows with Perls earlier than 5.20. For
|
||||
the details, see GH-356 and look for CloseHandle() in Perl
|
||||
5.20.0 changelog. Thanks to GitHub user twata1 for the
|
||||
report and additional help.
|
||||
- Alexander's recent work with RSA_get_key_parameters(),
|
||||
allows to make it available with all OpenSSL versions. It
|
||||
was already available with versions earlier than 1.1.0.
|
||||
- Expose BN_dup(), BN_clear(), BN_clear_free() and BN_free().
|
||||
- Use PTR2IV instead of direct cast to IV to fix compilation
|
||||
warning with SSLeay.xs internal function bn2sv().
|
||||
- Expose X509_CRL_get0_lastUpdate(),
|
||||
X509_CRL_get0_nextUpdate(), X509_CRL_set1_lastUpdate() and
|
||||
X509_CRL_set1_nextUpdate() that became available with
|
||||
OpenSSL 1.1.0 and LibreSSL 2.7.0. These, and the respective
|
||||
deprecated _get/set_ aliases, are available with all OpenSSL
|
||||
and LibreSSL versions. Fixes part of RT#124371.
|
||||
- Note in documentation that the X509_CRL_get* functions
|
||||
return a pointer to time structure that should be considered
|
||||
read-only.
|
||||
- Use ASN1_STRING_get0_data() instead of ASN1_STRING_data() to
|
||||
avoid compile time deprecation warnings. Partly fixes
|
||||
RT#124371.
|
||||
- Add the following constants from Current OpenSSL master branch:
|
||||
- SSL_ASYNC_PAUSED
|
||||
- SSL_ASYNC_NO_JOBS
|
||||
- SSL_CLIENT_HELLO_CB
|
||||
- SSL_ERROR_WANT_ASYNC
|
||||
- SSL_ERROR_WANT_ASYNC_JOB
|
||||
- SSL_ERROR_WANT_CLIENT_HELLO_CB
|
||||
- SSL_ERROR_WANT_RETRY_VERIFY
|
||||
- SSL_MODE_ASYNC
|
||||
- SSL_MODE_NO_AUTO_CHAIN
|
||||
- SSL_OP_ALLOW_CLIENT_RENEGOTIATION
|
||||
- SSL_OP_CLEANSE_PLAINTEXT
|
||||
- SSL_OP_DISABLE_TLSEXT_CA_NAMES
|
||||
- SSL_OP_ENABLE_KTLS
|
||||
- SSL_OP_IGNORE_UNEXPECTED_EOF
|
||||
- SSL_OP_NO_EXTENDED_MASTER_SECRET
|
||||
- SSL_RETRY_VERIFY
|
||||
- SSL_SESS_CACHE_UPDATE_TIME
|
||||
- X509_TRUST_DEFAULT
|
||||
- X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL
|
||||
- X509_V_ERR_CA_BCONS_NOT_CRITICAL
|
||||
- X509_V_ERR_CA_CERT_MISSING_KEY_USAGE
|
||||
- X509_V_ERR_EC_KEY_EXPLICIT_PARAMS
|
||||
- X509_V_ERR_EMPTY_SUBJECT_ALT_NAME
|
||||
- X509_V_ERR_EMPTY_SUBJECT_SAN_NOT_CRITICAL
|
||||
- X509_V_ERR_EXTENSIONS_REQUIRE_VERSION_3
|
||||
- X509_V_ERR_ISSUER_NAME_EMPTY
|
||||
- X509_V_ERR_KU_KEY_CERT_SIGN_INVALID_FOR_NON_CA
|
||||
- X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER
|
||||
- X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER
|
||||
- X509_V_ERR_NO_ISSUER_PUBLIC_KEY
|
||||
- X509_V_ERR_PATHLEN_INVALID_FOR_NON_CA
|
||||
- X509_V_ERR_PATHLEN_WITHOUT_KU_KEY_CERT_SIGN
|
||||
- X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY
|
||||
- X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH
|
||||
- X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL
|
||||
- X509_V_ERR_SUBJECT_NAME_EMPTY
|
||||
- X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM
|
||||
- Expose X509_get0_notBefore(), X509_getm_notBefore()
|
||||
X509_get0_nextAfter() and X509_getm_nextAfter() that became
|
||||
available with OpenSSL 1.1.0 and LibreSSL 2.7.0. These, and
|
||||
the deprecated _get functions, are available, as aliases
|
||||
when needed, with all OpenSSL and LibreSSL versions. Fixes
|
||||
GH-367.
|
||||
- Only export the TLSv1*_method() functions when support for the respective TLS
|
||||
version is available in the underlying libssl library. This allows
|
||||
Net::SSLeay to be built against libssl libraries that were compiled without
|
||||
support for old TLS versions.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Dec 14 13:47:04 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
#
|
||||
# spec file for package perl-Net-SSLeay
|
||||
#
|
||||
# Copyright (c) 2023 SUSE LLC
|
||||
# Copyright (c) 2024 SUSE LLC
|
||||
#
|
||||
# All modifications and additions to the file contributed by third parties
|
||||
# remain the property of their copyright owners, unless otherwise agreed
|
||||
@ -18,17 +18,20 @@
|
||||
|
||||
%define cpan_name Net-SSLeay
|
||||
Name: perl-Net-SSLeay
|
||||
Version: 1.92
|
||||
Version: 1.940.0
|
||||
Release: 0
|
||||
Summary: Perl bindings for OpenSSL and LibreSSL
|
||||
# 1.94 -> normalize -> 1.940.0
|
||||
%define cpan_version 1.94
|
||||
License: Artistic-2.0
|
||||
Summary: Perl bindings for OpenSSL and LibreSSL
|
||||
URL: https://metacpan.org/release/%{cpan_name}
|
||||
Source0: https://cpan.metacpan.org/authors/id/C/CH/CHRISN/%{cpan_name}-%{version}.tar.gz
|
||||
Source0: https://cpan.metacpan.org/authors/id/C/CH/CHRISN/%{cpan_name}-%{cpan_version}.tar.gz
|
||||
Source1: cpanspec.yml
|
||||
# PATCH-FIX-UPSTREAM https://github.com/radiator-software/p5-net-ssleay/issues/449
|
||||
Patch0: Use-constants-X509_VERSION_3-and-X509_REQ_VERSION_1-when-available.patch
|
||||
BuildRequires: perl
|
||||
BuildRequires: perl-macros
|
||||
Provides: perl(Net::SSLeay) = %{version}
|
||||
Provides: perl(Net::SSLeay::Handle) = %{version}
|
||||
%undefine __perllib_provides
|
||||
%{perl_requires}
|
||||
# MANUAL BEGIN
|
||||
BuildRequires: libopenssl-devel
|
||||
@ -44,8 +47,9 @@ This module provides Perl bindings for libssl (an SSL/TLS API) and
|
||||
libcrypto (a cryptography API).
|
||||
|
||||
%prep
|
||||
%autosetup -n %{cpan_name}-%{version} -p1
|
||||
find . -type f ! -path "*/t/*" ! -name "*.pl" ! -path "*/bin/*" ! -path "*/script/*" ! -name "configure" -print0 | xargs -0 chmod 644
|
||||
%autosetup -n %{cpan_name}-%{cpan_version}
|
||||
|
||||
find . -type f ! -path "*/t/*" ! -name "*.pl" ! -path "*/bin/*" ! -path "*/script/*" ! -path "*/scripts/*" ! -name "configure" -print0 | xargs -0 chmod 644
|
||||
|
||||
%build
|
||||
perl Makefile.PL INSTALLDIRS=vendor OPTIMIZE="%{optflags}"
|
||||
|
Loading…
x
Reference in New Issue
Block a user