pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/p5-Net-SSLeay security/p5-Net-SSLeay update t...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/516e39848b61
branches:  trunk
changeset: 382830:516e39848b61
user:      ast <ast%pkgsrc.org@localhost>
date:      Sat Aug 06 17:05:46 2022 +0000

description:
security/p5-Net-SSLeay update to 1.92
Upstream changes:
1.92 2022-01-12
        - New stable release incorporating all changes from developer releases 1.91_01
          to 1.91_03.
        - Summary of major changes since version 1.90:
          - Net::SSLeay now supports stable releases of OpenSSL 3.0.
            - OpenSSL 3.0.0 introduces the concept of "providers", which contain
              cryptographic algorithm implementations. Many outdated, deprecated and/or
              insecure algorithms have been moved to the "legacy" provider, which may
              need to be loaded explicitly in order to use them with Net::SSLeay. See
              "Low level API: OSSL_LIB_CTX and OSSL_PROVIDER related functions" in the
              Net::SSLeay module documentation for details.
            - Net::SSLeay's built-in PEM_get_string_PrivateKey() function depends on
              algorithms that have moved to the legacy provider described above; if
              OpenSSL has been compiled without the legacy provider, the tests
              t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will
              fail when the test suite is run.
            - TLS 1.1 and below may only be used at security level 0 as of OpenSSL
              3.0.0; if a minimum required security level is imposed (e.g. in an
              OpenSSL configuration file managed by the operating system), the tests
              t/local/44_sess.t and t/local/45_exporter.t will fail when the test suite
              is run.
          - Net::SSLeay now supports stable releases of LibreSSL from the 3.2 - 3.4
            series (with the exception of 3.2.2 and 3.2.3 - see "COMPATIBILITY" in the
            Net::SSLeay module documentation for details).
            - The TLS 1.3 implementation in LibreSSL 3.1 - 3.3, parts of which are
              enabled by default, is not fully compatible with the libssl API and may
              not function as expected with Net::SSLeay; see "KNOWN BUGS AND CAVEATS"
              in the Net::SSLeay module documentation for details.
          - A number of new libcrypto/libssl constants and functions are now exposed,
            including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(),
            which are helpful when debugging TLS handshakes. See the release notes for
            the 1.91 developer releases below for a full list of newly-exposed
            constants and functions.
For details see https://metacpan.org/dist/Net-SSLeay/changes

diffstat:

 security/p5-Net-SSLeay/Makefile                                    |   7 +-
 security/p5-Net-SSLeay/distinfo                                    |  10 +-
 security/p5-Net-SSLeay/patches/patch-SSLeay.xs                     |  15 ----
 security/p5-Net-SSLeay/patches/patch-t_local_43__misc__functions.t |  33 ----------
 4 files changed, 6 insertions(+), 59 deletions(-)

diffs (94 lines):

diff -r 3a4050bd9ee7 -r 516e39848b61 security/p5-Net-SSLeay/Makefile
--- a/security/p5-Net-SSLeay/Makefile   Sat Aug 06 16:49:59 2022 +0000
+++ b/security/p5-Net-SSLeay/Makefile   Sat Aug 06 17:05:46 2022 +0000
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.100 2022/06/28 11:35:49 wiz Exp $
+# $NetBSD: Makefile,v 1.101 2022/08/06 17:05:46 ast Exp $
 
-DISTNAME=      Net-SSLeay-1.90
+DISTNAME=      Net-SSLeay-1.92
 PKGNAME=       p5-${DISTNAME}
-PKGREVISION=   2
 CATEGORIES=    security perl5
 MASTER_SITES=  ${MASTER_SITE_PERL_CPAN:=Net/}
 
@@ -15,8 +14,6 @@
 TEST_DEPENDS+= p5-Test-Warn-[0-9]*:../../devel/p5-Test-Warn
 TEST_DEPENDS+= p5-Test-NoWarnings-[0-9]*:../../devel/p5-Test-NoWarnings
 
-USE_LANGUAGES=         c
-
 PERL5_PACKLIST=                auto/Net/SSLeay/.packlist
 MAKE_ENV+=             OPENSSL_PREFIX=${SSLBASE}
 MAKE_ENV+=             PERL_MM_USE_DEFAULT=1   # avoid network question
diff -r 3a4050bd9ee7 -r 516e39848b61 security/p5-Net-SSLeay/distinfo
--- a/security/p5-Net-SSLeay/distinfo   Sat Aug 06 16:49:59 2022 +0000
+++ b/security/p5-Net-SSLeay/distinfo   Sat Aug 06 17:05:46 2022 +0000
@@ -1,7 +1,5 @@
-$NetBSD: distinfo,v 1.53 2021/10/26 11:17:33 nia Exp $
+$NetBSD: distinfo,v 1.54 2022/08/06 17:05:46 ast Exp $
 
-BLAKE2s (Net-SSLeay-1.90.tar.gz) = 882fd55d9216c31eddb69346ba98b0bceb1f0950fe9c168e40b65edd59711a09
-SHA512 (Net-SSLeay-1.90.tar.gz) = 8a5f251b5ef1d8c2d619d984594a7a22ddeed2e5e726fe683a45f299d7878f4ca8ffab00480ebf5ef7a94ae1fcf6be05dfdaa68b8bfe2ad68443150765adb891
-Size (Net-SSLeay-1.90.tar.gz) = 534246 bytes
-SHA1 (patch-SSLeay.xs) = f7937ae0c2dcf97462a44d6344ff20483cf07566
-SHA1 (patch-t_local_43__misc__functions.t) = 176e4993f9327237038312d2f23c5cfc065acc81
+BLAKE2s (Net-SSLeay-1.92.tar.gz) = 9b3c069a8ca4508f0ad613ded1c316da20e632103fe83df5a9754a392002376d
+SHA512 (Net-SSLeay-1.92.tar.gz) = e9d9161ebeb7be90f4c7a0ea98f1034892ce6d33aa72872683177b19daa1f4c5819f85ea9a052a076ec8d7c21705f6c344aef64680bc881bf3218d38e8b7b173
+Size (Net-SSLeay-1.92.tar.gz) = 555930 bytes
diff -r 3a4050bd9ee7 -r 516e39848b61 security/p5-Net-SSLeay/patches/patch-SSLeay.xs
--- a/security/p5-Net-SSLeay/patches/patch-SSLeay.xs    Sat Aug 06 16:49:59 2022 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,15 +0,0 @@
-$NetBSD: patch-SSLeay.xs,v 1.1 2021/10/16 14:02:56 schmonz Exp $
-
-Build with OpenBSD's LibreSSL (patch taken from OpenBSD ports).
-
---- SSLeay.xs.orig     Thu Jan 21 15:14:11 2021
-+++ SSLeay.xs
-@@ -6172,7 +6172,7 @@ SSL_total_renegotiations(ssl)
-   OUTPUT:
-   RETVAL
- 
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-+#if (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x2070000fL)
- void
- SSL_SESSION_get_master_key(s)
-      SSL_SESSION *   s
diff -r 3a4050bd9ee7 -r 516e39848b61 security/p5-Net-SSLeay/patches/patch-t_local_43__misc__functions.t
--- a/security/p5-Net-SSLeay/patches/patch-t_local_43__misc__functions.t        Sat Aug 06 16:49:59 2022 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,33 +0,0 @@
-$NetBSD: patch-t_local_43__misc__functions.t,v 1.1 2021/10/16 14:02:56 schmonz Exp $
-
-Patch taken from OpenBSD ports:
-
-LibreSSL uses different names for TLS 1.3 ciphers.
-
-LibreSSL does not define TLS1_3_VERSION, but test discovers TLS 1.3.
-
---- t/local/43_misc_functions.t.orig   Thu Jan 21 15:14:11 2021
-+++ t/local/43_misc_functions.t
-@@ -40,6 +40,10 @@ our %tls_1_3_aead_cipher_to_keyblock_size = (
-      'TLS_AES_128_GCM_SHA256' => 56,
-      'TLS_AES_256_GCM_SHA384' => 88,
-      'TLS_CHACHA20_POLY1305_SHA256' => 88,
-+     # LibreSSL uses different names
-+     'AEAD-AES128-GCM-SHA256' => 56,
-+     'AEAD-AES256-GCM-SHA384' => 88,
-+     'AEAD-CHACHA20-POLY1305-SHA256' => 88,
-     );
- 
- # Combine the AEAD hashes
-@@ -56,6 +60,11 @@ our %version_str2int =
-      'TLSv1.2' => sub {return eval {Net::SSLeay::TLS1_2_VERSION();}},
-      'TLSv1.3' => sub {return eval {Net::SSLeay::TLS1_3_VERSION();}},
-     );
-+
-+# LibreSSL does not define TLS1_3_VERSION
-+if (Net::SSLeay::constant("LIBRESSL_VERSION_NUMBER")) {
-+    $version_str2int{'TLSv1.3'} = sub {return 0x0304};
-+}
- 
- # Tests that don't need a connection
- client_test_ciphersuites();



Home | Main Index | Thread Index | Old Index