Hello community, here is the log from the commit of package perl-Crypt-OpenSSL-Random for openSUSE:Factory checked in at 2017-09-05 15:13:12 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/perl-Crypt-OpenSSL-Random (Old) and /work/SRC/openSUSE:Factory/.perl-Crypt-OpenSSL-Random.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "perl-Crypt-OpenSSL-Random" Tue Sep 5 15:13:12 2017 rev:19 rq:520418 version:0.11 Changes: -------- --- /work/SRC/openSUSE:Factory/perl-Crypt-OpenSSL-Random/perl-Crypt-OpenSSL-Random.changes 2015-02-11 16:31:27.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.perl-Crypt-OpenSSL-Random.new/perl-Crypt-OpenSSL-Random.changes 2017-09-05 15:13:14.381940273 +0200 @@ -1,0 +2,7 @@ +Wed Aug 23 10:28:34 UTC 2017 - vci...@suse.com + +- update to 0.11 + - add libressl support, unsupported random_egd() with libressl + - fixes testsuite failure with OpenSSL 1.1 (bsc#1055236) + +------------------------------------------------------------------- Old: ---- Crypt-OpenSSL-Random-0.10.tar.gz New: ---- Crypt-OpenSSL-Random-0.11.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ perl-Crypt-OpenSSL-Random.spec ++++++ --- /var/tmp/diff_new_pack.Wm2sGV/_old 2017-09-05 15:13:14.961858758 +0200 +++ /var/tmp/diff_new_pack.Wm2sGV/_new 2017-09-05 15:13:14.965858195 +0200 @@ -1,7 +1,7 @@ # # spec file for package perl-Crypt-OpenSSL-Random # -# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,7 +17,7 @@ Name: perl-Crypt-OpenSSL-Random -Version: 0.10 +Version: 0.11 Release: 0 %define cpan_name Crypt-OpenSSL-Random Summary: Routines for accessing the OpenSSL pseudo-random number generator ++++++ Crypt-OpenSSL-Random-0.10.tar.gz -> Crypt-OpenSSL-Random-0.11.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Changes new/Crypt-OpenSSL-Random-0.11/Changes --- old/Crypt-OpenSSL-Random-0.10/Changes 2015-02-04 19:40:47.000000000 +0100 +++ new/Crypt-OpenSSL-Random-0.11/Changes 2015-10-09 00:09:10.000000000 +0200 @@ -1,5 +1,8 @@ Revision history for Perl extension Crypt::OpenSSL::Random. +0.11 2015-10-09 rurban + - add libressl support, unsupported random_egd() with libressl + 0.10 2015-02-04 rurban - fix LIBS argument, fatal on Windows. thanks to kmx diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/META.json new/Crypt-OpenSSL-Random-0.11/META.json --- old/Crypt-OpenSSL-Random-0.10/META.json 2015-02-04 19:43:39.000000000 +0100 +++ new/Crypt-OpenSSL-Random-0.11/META.json 2015-10-09 00:16:09.000000000 +0200 @@ -4,7 +4,7 @@ "Ian Robertson" ], "dynamic_config" : 1, - "generated_by" : "ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter version 2.142060", + "generated_by" : "ExtUtils::MakeMaker version 7.1, CPAN::Meta::Converter version 2.150005", "license" : [ "perl_5" ], @@ -45,5 +45,6 @@ }, "x_MailingList" : "perl-openssl-us...@lists.sourceforge.net" }, - "version" : "0.10" + "version" : "0.11", + "x_serialization_backend" : "JSON::PP version 2.27300" } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/META.yml new/Crypt-OpenSSL-Random-0.11/META.yml --- old/Crypt-OpenSSL-Random-0.10/META.yml 2015-02-04 19:43:39.000000000 +0100 +++ new/Crypt-OpenSSL-Random-0.11/META.yml 2015-10-09 00:16:09.000000000 +0200 @@ -7,7 +7,7 @@ configure_requires: ExtUtils::MakeMaker: '0' dynamic_config: 1 -generated_by: 'ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter version 2.142060' +generated_by: 'ExtUtils::MakeMaker version 7.1, CPAN::Meta::Converter version 2.150005' license: perl meta-spec: url: http://module-build.sourceforge.net/META-spec-v1.4.html @@ -23,4 +23,5 @@ homepage: http://sourceforge.net/projects/perl-openssl/ license: http://dev.perl.org/licenses/ repository: https://github.com/rurban/Crypt-OpenSSL-Random -version: '0.10' +version: '0.11' +x_serialization_backend: 'CPAN::Meta::YAML version 0.016' diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/README new/Crypt-OpenSSL-Random-0.11/README --- old/Crypt-OpenSSL-Random-0.10/README 2015-02-04 19:41:05.000000000 +0100 +++ new/Crypt-OpenSSL-Random-0.11/README 2015-10-09 00:11:59.000000000 +0200 @@ -1,6 +1,6 @@ NAME - Crypt::OpenSSL::Random - Routines for accessing the OpenSSL - pseudo-random number generator using the openSSL libraries + Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator + access SYNOPSIS use Crypt::OpenSSL::Random; @@ -14,8 +14,10 @@ my $ten_ok_random_bytes = Crypt::OpenSSL::Random::random_pseudo_bytes(10); DESCRIPTION - Crypt::OpenSSL::Random provides the ability to seed and query the - OpenSSL library's pseudo-random number generator. + "Crypt::OpenSSL::Random" provides the ability to seed and query the + OpenSSL and LibreSSL library's pseudo-random number generators. + + Note: On LibreSSL "random_egd()" is not defined. EXPORT None by default. @@ -44,6 +46,9 @@ on success, or -1 if not enough bytes were read, or if the connection to the daemon failed. + "libressl" considers this function insecure, so with libressl this + function does not exist. + random_status () This function returns true if the PRNG has sufficient seeding. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Random.pm new/Crypt-OpenSSL-Random-0.11/Random.pm --- old/Crypt-OpenSSL-Random-0.10/Random.pm 2015-02-04 19:40:03.000000000 +0100 +++ new/Crypt-OpenSSL-Random-0.11/Random.pm 2015-10-09 00:10:29.000000000 +0200 @@ -9,7 +9,7 @@ @EXPORT_OK = qw( random_bytes random_pseudo_bytes random_seed random_egd random_status ); -$VERSION = '0.10'; +$VERSION = '0.11'; XSLoader::load( __PACKAGE__, $VERSION ); 1; @@ -17,8 +17,7 @@ =head1 NAME -Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random number generator -using the openSSL libraries +Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator access =head1 SYNOPSIS @@ -34,8 +33,10 @@ =head1 DESCRIPTION -Crypt::OpenSSL::Random provides the ability to seed and query the -OpenSSL library's pseudo-random number generator. +C<Crypt::OpenSSL::Random> provides the ability to seed and query the +B<OpenSSL> and B<LibreSSL> library's pseudo-random number generators. + +Note: On B<LibreSSL> C<random_egd()> is not defined. =head2 EXPORT @@ -72,6 +73,9 @@ success, or C<-1> if not enough bytes were read, or if the connection to the daemon failed. +C<libressl> considers this function insecure, so with libressl this +function does not exist. + =item random_status () This function returns true if the PRNG has sufficient seeding. diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Random.xs new/Crypt-OpenSSL-Random-0.11/Random.xs --- old/Crypt-OpenSSL-Random-0.10/Random.xs 2013-04-02 21:30:02.000000000 +0200 +++ new/Crypt-OpenSSL-Random-0.11/Random.xs 2015-10-09 00:07:28.000000000 +0200 @@ -7,6 +7,8 @@ #define PACKAGE_NAME "Crypt::OpenSSL::Random" MODULE = Crypt::OpenSSL::Random PACKAGE = Crypt::OpenSSL::Random +PROTOTYPES: DISABLE + void random_bytes(num_bytes_SV) SV * num_bytes_SV; @@ -76,6 +78,8 @@ # returns the number of bytes gathered, or -1 if there was a # connection failure or if the PRNG is still insufficiently seeded. +#ifndef OPENSSL_NO_EGD + void random_egd(egd_SV) SV * egd_SV; @@ -88,6 +92,8 @@ XPUSHs( sv_2mortal( newSViv( status ) ) ); } +#endif + # Returns true if the PRNG has enough seed data void diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/SIGNATURE new/Crypt-OpenSSL-Random-0.11/SIGNATURE --- old/Crypt-OpenSSL-Random-0.10/SIGNATURE 2015-02-04 19:43:42.000000000 +0100 +++ new/Crypt-OpenSSL-Random-0.11/SIGNATURE 2015-10-09 00:16:12.000000000 +0200 @@ -1,5 +1,5 @@ This file contains message digests of all files listed in MANIFEST, -signed via the Module::Signature module, version 0.73. +signed via the Module::Signature module, version 0.79. To verify the content in this distribution, first make sure you have Module::Signature installed, then type: @@ -15,17 +15,17 @@ Hash: SHA1 SHA1 5dd03065ad95845ec70baa4c92c396dc3ef15efb .gitignore -SHA1 2f1a06eb788d0cce3882d7a66f690ba548905a21 Changes +SHA1 08abd75288dd37cd47759350231019971fac0ebe Changes SHA1 78f7d31b9283b034cf19e61bc70d24bb38581b1e LICENSE SHA1 d1b344f1315cebc307771957afb228ff85a5eb2c MANIFEST -SHA1 9547956449e2a90dbfbbdc7a7af17bcb2f588148 META.json -SHA1 92b3cec46c624cecc8e1cd33734a56d03f21ca36 META.yml +SHA1 c1fda3f4031b9e29ba2db59cd48634a60c02c0a9 META.json +SHA1 c23742068502cfe87a62eb8242537dc1aaaa9728 META.yml SHA1 2ddcb73e7e3c11d765bef06138bc39edef47de2d Makefile.PL -SHA1 f9ca6e1da721ba27fea2de76ce154b4c04c24a27 README -SHA1 4b366deb8487ce018daecc4da55c1ae0cacd004b Random.pm -SHA1 fd2ed6100e3204315281a4ff74c7180a8841f27e Random.xs +SHA1 8f52106f62863a9cf6476d203a73b80b6cabb884 README +SHA1 b1d2bc41303dc9e99cff816c13ede60ea1e13aad Random.pm +SHA1 96741e2c68170512e8fc38829466d1e041c3a3ec Random.xs SHA1 43295de162f592dd4ebfde6e424d22aedac03423 hints/MSWin32.pl -SHA1 1e8812dab8110e4d887880444a3a19e10b1f7567 t/0-basic.t +SHA1 fa94838ecdaeccd2bf162caf7014a624dc1e66a7 t/0-basic.t SHA1 7de5e8f63465d9711faa107972ebce8e1349ccd6 t/z_kwalitee.t SHA1 9eba44de180daef6319b2c4a75ab55c972844c0e t/z_manifest.t SHA1 993b3cef8c06a70d99829facf76140864eb57240 t/z_meta.t @@ -35,7 +35,7 @@ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 -iEYEARECAAYFAlTSaFsACgkQmm2SYo/9yUIeFgCeMWpukwwACf/BLmYYjfl3AnsE -uCUAn3w+q8p7x3swGspxLVsqjhPUAHuX -=hhvG +iEYEARECAAYFAlYW6ykACgkQmm2SYo/9yULu0ACfYWNIctH936cviqVv09qYga4m +JHAAn3eqbNM7tBiPjrZsrJ98A7xYRIur +=seXL -----END PGP SIGNATURE----- diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/t/0-basic.t new/Crypt-OpenSSL-Random-0.11/t/0-basic.t --- old/Crypt-OpenSSL-Random-0.10/t/0-basic.t 2013-04-02 18:30:58.000000000 +0200 +++ new/Crypt-OpenSSL-Random-0.11/t/0-basic.t 2015-10-09 00:11:54.000000000 +0200 @@ -8,7 +8,7 @@ BEGIN { $| = 1; print "1..5\n"; } END {print "not ok 1\n" unless $loaded;} -use Crypt::OpenSSL::Random; +use Crypt::OpenSSL::Random qw(random_seed random_bytes random_status random_pseudo_bytes); $loaded = 1; print "ok 1\n"; @@ -34,11 +34,11 @@ } } -my_test(Crypt::OpenSSL::Random::random_seed +my_test(random_seed ("OpenSSL needs at least 32 bytes.")); # We should now be seeded, regardless. -my_test(Crypt::OpenSSL::Random::random_status()); +my_test(random_status()); -my_test(length(Crypt::OpenSSL::Random::random_bytes(53)) == 53); -my_test(length(Crypt::OpenSSL::Random::random_pseudo_bytes(53)) == 53); +my_test(length(random_bytes(53)) == 53); +my_test(length(random_pseudo_bytes(53)) == 53);