Update to 1.56
- New upstream release 1.56
- fixed a typo in documentation of BEAST Attack
- added LICENSE file copied from OpenSSL distribution to prevent complaints
from various versions of kwalitee
- adjusted license: in META.yml to be 'openssl'
- adds support for the basic operations necessary to support ECDH for PFS,
e.g. EC_KEY_new_by_curve_name, EC_KEY_free and SSL_CTX_set_tmp_ecdh
- improvements to t/handle/external/50_external.t to handle the case when a
test connection was not possible
- added support for ALPN TLS extension
- fixed a use-after-free error
- fixed a problem with invalid comparison on OBJ_cmp result in
t/local/36_verify.t
- added support for get_peer_cert_chain()
- fixed a bug that could cause stack faults: mixed up PUTBACK with SPAGAIN in
ssleay_RSA_generate_key_cb_invoke(); a final PUTBACK is needed here
- fixed cb->data checks and wrong refcounts on &PL_sv_undef
- deleted support for SSL_get_tlsa_record_byname: it is not included in
OpenSSL git master
- Drop upstreamed patch for CPAN RT#91215
- Skip the Pod Coverage test, as there are naked subroutines in this release
- ECC support not available in Fedora/EL until OpenSSL 1.0.1e, so patch the
source accordingly to fix builds for F-12 .. F-17