./security/erlang-fast_tls, TLS / SSL OpenSSL-based native driver for Erlang / Elixir

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 1.1.12nb1, Package name: erlang-fast_tls-1.1.12nb1, Maintainer: pkgsrc-users

Fast TLS is a native TLS / SSL driver for Erlang / Elixir. It is
based on OpenSSL, a proven and efficient TLS implementation. It
is designed for efficiency, speed and compliance.


Required to run:
[lang/erlang] [security/openssl] [misc/erlang-p1_utils]

Required to build:
[pkgtools/cwrappers] [devel/rebar]

Master sites:

Filesize: 78.972 KB

Version history: (Expand)


CVS history: (Expand)


   2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605)
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \ 
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
   2021-10-07 16:54:50 by Nia Alarie | Files touched by this commit (606)
Log message:
security: Remove SHA1 hashes for distfiles
   2021-05-21 12:48:56 by =?UTF-8?B?RnLDqWTDqXJpYyBGYXViZXJ0ZWF1?= | Files touched by this commit (1)
Log message:
erlang-fast_tls: Remove useless variable from MAKE_ENV

pkgsrc changes:
---------------
  * Actually REBAR is already defined in MAKE_FLAGS of lang/erlang/modules.
  * Bump revision.
   2021-05-21 09:49:52 by =?UTF-8?B?RnLDqWTDqXJpYyBGYXViZXJ0ZWF1?= | Files touched by this commit (3)
Log message:
erlang-fast_tls: Update to 1.1.12

pkgsrc changes:
---------------
  o Add a patch to localize the path of rebar by defining the REBAR
    variable in MAKE_ENV.

upstream changes:
-----------------
Version 1.1.12
  o Updating p1_utils to version 1.0.22.

Version 1.1.11
  o Add missing applicaitons in fast_tls.app
   2021-01-16 00:44:15 by =?UTF-8?B?RnLDqWTDqXJpYyBGYXViZXJ0ZWF1?= | Files touched by this commit (3)
Log message:
erlang-fast_tls: Update to 1.1.10

upstream changes:
-----------------
Version 1.1.10
  * Updating p1_utils to version 1.0.21.

Version 1.1.9
  * Exclude old OTP releases in Travis
  * Update hex to compile ejabberd with rebar3

Version 1.1.8
  * Updating p1_utils to version 1.0.20.

Version 1.1.7
  * Add fix and test with Erlang/OTP 23.0

Version 1.1.6
  * Updating p1_utils to version 1.0.19.
  * Change nif loading to make test more reliable

Version 1.1.5
  * Don't require providing client side certificate when acting as client.
  * Simplify code for loading nif component by using -on_load
  * Add API endpoint for retrieving information required for channel binding

Version 1.1.4
  * Updating p1_utils to version 1.0.18.
  * Update copyright year

Version 1.1.3
  * Updating p1_utils to version 1.0.17.
  * Do not report several other badly formed hello packets

Version 1.1.2
  * Updating p1_utils to version 1.0.16.
  * Remove warnings about unused functions on openssl 1.1
  * Make it possible to get DER-encoded certificate
  * Use thread-safe function to retrieve error reason

Version 1.1.1
  * Updating p1_utils to version 1.0.15.

Version 1.1.0
  * Updating p1_utils to version 1.0.14.
  * Add contribution guide
  * Make more processing to c code side
  * Properly handle partial procesing in SSL_read/write
  * Make recv() with non-zero length return shorted result when there is no \ 
connection error

Version 1.0.25
  * Updating p1_utils to version 1.0.13.

Version 1.0.24
  * Updating p1_utils to version 6ff85e8.
  * Add support for tls 1.1.1 and tls1.3
   2020-01-18 22:51:16 by Jonathan Perkin | Files touched by this commit (1836)
Log message:
*: Recursive revision bump for openssl 1.1.1.
   2018-07-20 11:02:12 by Filip Hajny | Files touched by this commit (2)
Log message:
security/erlang-fast_tls: Update to 1.0.23.

- Updating p1_utils to version 1.0.12.
- Add ability to get cipher user by connection
   2018-05-17 15:30:00 by Filip Hajny | Files touched by this commit (2) | Package updated
Log message:
security/erlang-fast_tld: Update to 1.0.22.

- Don't check mtime of certificates, and make cerificate update explicit.
- Add ability to specify CA for accepting client certificates.