cpan Net-SSLeay 1.93_02

latest releases: 1.94, 1.93_05, 1.93_04...
pre-release20 months ago
  • Update ppport.h to version 3.68. This eliminates thousands of
    compound-token-split-by-macro compiler warnings when building Net-SSLeay with
    Clang 12 or greater. Partially fixes GH-383.
  • Silence compound-token-split-by-macro warnings when building Net-SSLeay with
    Clang 12 or greater. Fixes the remainder of GH-383.
  • When building Net-SSLeay, search for the openssl binary in the same directory
    in which Perl is installed (i.e. $Config{prefix}/bin/). Thanks to Henrik
    Grimler for the patch.
  • Expose EVP_PKEY_security_bits. Thanks to Felipe Gasper.
  • Major update to Gihub Actions configuration. Thanks to Felipe Gasper.
    New testing targets are:
    • OpenSSL and LibreSSL on Alpine Linux on i386, x390x, arm32v6,
      ar32v7 and arm64v8 architectures.
    • OpenSSL and LibreSSL on Ubuntu on i386, x390x, ar32v7 and arm64v8
      architectures.
    • OpenSSL on FreeBSD 13.0, not enabled yet because of GH #272 and #394
    • LibreSSL on FreeBSD 13.0
    • LibreSSL on OpenBSD 6.9
    • LibreSSL on OpenBSD 7.1
    • Cygwin on x86_64
  • Fix compilation failure using cl. Microsoft cl compiler do
    not like when preprocessor directives are inside a
    macro. Fixes GH-403. Thanks to Jean-Damien Durand.
  • Update CTX_use_PKCS12_file() and CTX_use_PKCS12_file() to
    use BIO functions for avoiding "no OPENSSL_Applink" runtime
    errors. Fixes GH-281 and RT#101638. Thanks to Jean-Damien
    Durand.
  • Add to README.Win32 more information about OPENSSL_Applink
    and how it may be needed with FILE pointers and POSIX/Unix
    fds. Recommended method is to avoid them and use OpenSSL BIO
    functions instead. Update SSLeay.pod with alternatives to
    Net::SSLeay::SESSION_print_fp(). Closes GH-411.
  • Refactor variable declarations in RSA_generate_key to allow SSLeay.xs to
    compile under -Werror=declaration-after-statement. Fixes GH-407. Thanks to
    dharanlinux for the report.
  • Fix memory leaks after calls to X509_get_ext_d2i. Thanks to Anton Borowka.
  • Documentation fix: Correct CRL revocation reasons in
    P_X509_CRL_add_revoked_serial_hex(). Closes GH-397. Reported
    by Marc Reisner.
  • Support stable releases of LibreSSL 3.5 and 3.6.
  • Update callback set by SSL_set_session_secret_cb to adjust
    master secret's length. This is needed with OpenSSL 1.1.1
    and later that provide buffer that is now longer than 48
    octets. Fix Net::SSLeay::get_keyblock_size() size
    calculation with AEAD ciphers. These functions were
    originally added to OpenSSL and Net::SSLeay for
    EAP-FAST. These changes allow EAP-FAST to work with AEAD
    ciphers and with OpenSSL versions 1.1.1 and later.
  • Remove code guarded by obsolete
    SSL_F_SSL_SET_HELLO_EXTENSION #ifdef. This was used by the
    initial EAP-FAST related OpenSSL patch which was never part
    of the OpenSSL distribution.
  • PEM_get_string_PrivateKey() currently uses DES-CBC as its
    default encryption algorithm. Test 33_x509_create_cert.t now
    skips testing the default algorithm on systems that support
    providers but don't have the legacy provider available. One
    such system is FreeBSD 13.0 with OpenSSL which was added as
    disabled in GitHub actions by PR GH-402 but can now be
    enabled. Long term fix is to replace DES-CBC with a modern
    cipher. Allows closing GH-394.

Don't miss a new Net-SSLeay release

NewReleases is sending notifications on new releases.