Path to this page:
./
security/p5-Net-SSLeay,
Perl5 module for using OpenSSL
Branch: CURRENT,
Version: 1.94nb1,
Package name: p5-Net-SSLeay-1.94nb1,
Maintainer: pkgsrc-usersNet::SSLeay.pm is a perl module that allows you to call Secure
Sockets Layer (SSL) functions of the SSLeay library directly from
your perl scripts. It is useful if you want to program robots that
access secure web servers or if you want to build your own applications
over SSL encrypted tunnels.
Required to run:[
lang/perl5] [
security/openssl]
Required to build:[
pkgtools/cwrappers]
Master sites: (Expand)
Filesize: 648.387 KB
Version history: (Expand)
- (2024-11-16) Updated to version: p5-Net-SSLeay-1.94nb1
- (2024-01-14) Updated to version: p5-Net-SSLeay-1.94
- (2023-10-25) Updated to version: p5-Net-SSLeay-1.92nb2
- (2023-07-06) Updated to version: p5-Net-SSLeay-1.92nb1
- (2022-08-06) Updated to version: p5-Net-SSLeay-1.92
- (2022-06-28) Updated to version: p5-Net-SSLeay-1.90nb2
CVS history: (Expand)
2024-11-16 13:08:07 by Thomas Klausner | Files touched by this commit (2504) |
Log message:
*: recursive bump for perl 5.40
|
2024-01-14 21:37:58 by Thomas Klausner | Files touched by this commit (2) | |
Log message:
p5-Net-SSLeay: update to 1.94.
1.94 2024-01-08
- New stable release incorporating all changes from developer releases 1.93_01
to 1.93_05.
- Summary of major changes since version 1.92:
- Net::SSLeay now officially supports all stable releases of OpenSSL 3.1 and
3.2, and LibreSSL 3.5 - 3.8.
- Many noisy compiler warnings have been silenced - if SSLeay.xs fails to
compile, it should now be much easier to identify the cause.
- libcrypto's OPENSSL_init_crypto() function and libssl's OPENSSL_init_ssl()
function are now exposed, enabling fine-grained control over the
initialisation and configuration of both libraries.
- libssl functions implementing TLS 1.3 PSK authentication are now exposed,
in particular SSL_CTX_set_psk_find_session_callback() (on the server side)
and SSL_CTX_set_psk_use_session_callback() (on the client side).
- libssl functions implementing server-side TLS 1.2 PSK authentication are
now exposed, in particular SSL_CTX_set_psk_server_callback().
- libssl's SSL_CTX_set_client_hello_cb() function is now exposed, allowing a
TLS server to set a callback function that is executed when the server
processes a ClientHello message.
- Many more libcrypto/libssl constants and functions are now exposed; see the
release notes for the 1.93 developer releases for a full list.
|
2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298) |
Log message:
*: bump for openssl 3
|
2023-07-06 11:43:03 by Thomas Klausner | Files touched by this commit (2483) |
Log message:
*: recursive bump for perl 5.38
|
2022-08-06 19:05:46 by Adrian Steinmann | Files touched by this commit (4) | |
Log message:
security/p5-Net-SSLeay update to 1.92
Upstream changes:
1.92 2022-01-12
- New stable release incorporating all changes from developer releases \
1.91_01
to 1.91_03.
- Summary of major changes since version 1.90:
- Net::SSLeay now supports stable releases of OpenSSL 3.0.
- OpenSSL 3.0.0 introduces the concept of "providers", \
which contain
cryptographic algorithm implementations. Many outdated, deprecated \
and/or
insecure algorithms have been moved to the "legacy" \
provider, which may
need to be loaded explicitly in order to use them with Net::SSLeay. See
"Low level API: OSSL_LIB_CTX and OSSL_PROVIDER related \
functions" in the
Net::SSLeay module documentation for details.
- Net::SSLeay's built-in PEM_get_string_PrivateKey() function depends on
algorithms that have moved to the legacy provider described above; if
OpenSSL has been compiled without the legacy provider, the tests
t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will
fail when the test suite is run.
- TLS 1.1 and below may only be used at security level 0 as of OpenSSL
3.0.0; if a minimum required security level is imposed (e.g. in an
OpenSSL configuration file managed by the operating system), the tests
t/local/44_sess.t and t/local/45_exporter.t will fail when the \
test suite
is run.
- Net::SSLeay now supports stable releases of LibreSSL from the 3.2 - 3.4
series (with the exception of 3.2.2 and 3.2.3 - see \
"COMPATIBILITY" in the
Net::SSLeay module documentation for details).
- The TLS 1.3 implementation in LibreSSL 3.1 - 3.3, parts of which are
enabled by default, is not fully compatible with the libssl API and may
not function as expected with Net::SSLeay; see "KNOWN BUGS \
AND CAVEATS"
in the Net::SSLeay module documentation for details.
- A number of new libcrypto/libssl constants and functions are now exposed,
including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(),
which are helpful when debugging TLS handshakes. See the release \
notes for
the 1.91 developer releases below for a full list of newly-exposed
constants and functions.
For details see https://metacpan.org/dist/Net-SSLeay/changes
|
2022-06-28 13:38:00 by Thomas Klausner | Files touched by this commit (3952) |
Log message:
*: recursive bump for perl 5.36
|
2021-11-21 21:51:37 by Hubert Feyrer | Files touched by this commit (1) |
Log message:
Fix building on Mac OS X
For defails, see http://mail-index.netbsd.org/tech-pkg/2021/11/20/msg025792.html
|
2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605) |
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
|