5d702ba Update to 1.92

Authored and Committed by pghmcfc 2 years ago
    Update to 1.92
    
    - New upstream release 1.92
      - Net::SSLeay now supports stable releases of OpenSSL 3.0
        - OpenSSL 3.0.0 introduces the concept of "providers", which contain
          cryptographic algorithm implementations; many outdated, deprecated
          and/or insecure algorithms have been moved to the "legacy" provider,
          which may need to be loaded explicitly in order to use them with
          Net::SSLeay (see "Low level API: OSSL_LIB_CTX and OSSL_PROVIDER
          related functions" in the Net::SSLeay module documentation for details)
        - Net::SSLeay's built-in PEM_get_string_PrivateKey() function depends on
          algorithms that have moved to the legacy provider described above; if
          OpenSSL has been compiled without the legacy provider, the tests
          t/local/33_x509_create_cert.t and t/local/63_ec_key_generate_key.t will
          fail when the test suite is run
        - TLS 1.1 and below may only be used at security level 0 as of OpenSSL
          3.0.0; if a minimum required security level is imposed (e.g. in an
          OpenSSL configuration file managed by the operating system), the tests
          t/local/44_sess.t and t/local/45_exporter.t will fail when the test
          suite is run
      - Net::SSLeay now supports stable releases of LibreSSL from the 3.2-3.4
        series (with the exception of 3.2.2 and 3.2.3 - see "COMPATIBILITY" in
        the Net::SSLeay module documentation for details)
        - The TLS 1.3 implementation in LibreSSL 3.1-3.3, parts of which are
          enabled by default, is not fully compatible with the libssl API and may
          not function as expected with Net::SSLeay; see "KNOWN BUGS AND CAVEATS"
          in the Net::SSLeay module documentation for details
      - A number of new libcrypto/libssl constants and functions are now exposed,
        including SSL_CTX_set_keylog_callback() and SSL_CTX_set_msg_callback(),
        which are helpful when debugging TLS handshakes; see the release notes
        for the 1.91 developer releases (in the Changes file) for a full list of
        newly-exposed constants and functions
    
        
file modified
+2 -2
file modified
+34 -6
file modified
+1 -1