Hello community,

here is the log from the commit of package perl-Crypt-OpenSSL-Random for 
openSUSE:Factory checked in at 2017-09-05 15:13:12
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-Crypt-OpenSSL-Random (Old)
 and      /work/SRC/openSUSE:Factory/.perl-Crypt-OpenSSL-Random.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "perl-Crypt-OpenSSL-Random"

Tue Sep  5 15:13:12 2017 rev:19 rq:520418 version:0.11

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/perl-Crypt-OpenSSL-Random/perl-Crypt-OpenSSL-Random.changes
      2015-02-11 16:31:27.000000000 +0100
+++ 
/work/SRC/openSUSE:Factory/.perl-Crypt-OpenSSL-Random.new/perl-Crypt-OpenSSL-Random.changes
 2017-09-05 15:13:14.381940273 +0200
@@ -1,0 +2,7 @@
+Wed Aug 23 10:28:34 UTC 2017 - vci...@suse.com
+
+- update to 0.11
+  - add libressl support, unsupported random_egd() with libressl
+  - fixes testsuite failure with OpenSSL 1.1 (bsc#1055236)
+
+-------------------------------------------------------------------

Old:
----
  Crypt-OpenSSL-Random-0.10.tar.gz

New:
----
  Crypt-OpenSSL-Random-0.11.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ perl-Crypt-OpenSSL-Random.spec ++++++
--- /var/tmp/diff_new_pack.Wm2sGV/_old  2017-09-05 15:13:14.961858758 +0200
+++ /var/tmp/diff_new_pack.Wm2sGV/_new  2017-09-05 15:13:14.965858195 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package perl-Crypt-OpenSSL-Random
 #
-# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           perl-Crypt-OpenSSL-Random
-Version:        0.10
+Version:        0.11
 Release:        0
 %define cpan_name Crypt-OpenSSL-Random
 Summary:        Routines for accessing the OpenSSL pseudo-random number 
generator

++++++ Crypt-OpenSSL-Random-0.10.tar.gz -> Crypt-OpenSSL-Random-0.11.tar.gz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Changes 
new/Crypt-OpenSSL-Random-0.11/Changes
--- old/Crypt-OpenSSL-Random-0.10/Changes       2015-02-04 19:40:47.000000000 
+0100
+++ new/Crypt-OpenSSL-Random-0.11/Changes       2015-10-09 00:09:10.000000000 
+0200
@@ -1,5 +1,8 @@
 Revision history for Perl extension Crypt::OpenSSL::Random.
 
+0.11  2015-10-09 rurban
+        - add libressl support, unsupported random_egd() with libressl 
+
 0.10  2015-02-04 rurban
         - fix LIBS argument, fatal on Windows. thanks to kmx
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/META.json 
new/Crypt-OpenSSL-Random-0.11/META.json
--- old/Crypt-OpenSSL-Random-0.10/META.json     2015-02-04 19:43:39.000000000 
+0100
+++ new/Crypt-OpenSSL-Random-0.11/META.json     2015-10-09 00:16:09.000000000 
+0200
@@ -4,7 +4,7 @@
       "Ian Robertson"
    ],
    "dynamic_config" : 1,
-   "generated_by" : "ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter 
version 2.142060",
+   "generated_by" : "ExtUtils::MakeMaker version 7.1, CPAN::Meta::Converter 
version 2.150005",
    "license" : [
       "perl_5"
    ],
@@ -45,5 +45,6 @@
       },
       "x_MailingList" : "perl-openssl-us...@lists.sourceforge.net"
    },
-   "version" : "0.10"
+   "version" : "0.11",
+   "x_serialization_backend" : "JSON::PP version 2.27300"
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/META.yml 
new/Crypt-OpenSSL-Random-0.11/META.yml
--- old/Crypt-OpenSSL-Random-0.10/META.yml      2015-02-04 19:43:39.000000000 
+0100
+++ new/Crypt-OpenSSL-Random-0.11/META.yml      2015-10-09 00:16:09.000000000 
+0200
@@ -7,7 +7,7 @@
 configure_requires:
   ExtUtils::MakeMaker: '0'
 dynamic_config: 1
-generated_by: 'ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter version 
2.142060'
+generated_by: 'ExtUtils::MakeMaker version 7.1, CPAN::Meta::Converter version 
2.150005'
 license: perl
 meta-spec:
   url: http://module-build.sourceforge.net/META-spec-v1.4.html
@@ -23,4 +23,5 @@
   homepage: http://sourceforge.net/projects/perl-openssl/
   license: http://dev.perl.org/licenses/
   repository: https://github.com/rurban/Crypt-OpenSSL-Random
-version: '0.10'
+version: '0.11'
+x_serialization_backend: 'CPAN::Meta::YAML version 0.016'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/README 
new/Crypt-OpenSSL-Random-0.11/README
--- old/Crypt-OpenSSL-Random-0.10/README        2015-02-04 19:41:05.000000000 
+0100
+++ new/Crypt-OpenSSL-Random-0.11/README        2015-10-09 00:11:59.000000000 
+0200
@@ -1,6 +1,6 @@
 NAME
-    Crypt::OpenSSL::Random - Routines for accessing the OpenSSL
-    pseudo-random number generator using the openSSL libraries
+    Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator
+    access
 
 SYNOPSIS
       use Crypt::OpenSSL::Random;
@@ -14,8 +14,10 @@
       my $ten_ok_random_bytes = 
Crypt::OpenSSL::Random::random_pseudo_bytes(10);
 
 DESCRIPTION
-    Crypt::OpenSSL::Random provides the ability to seed and query the
-    OpenSSL library's pseudo-random number generator.
+    "Crypt::OpenSSL::Random" provides the ability to seed and query the
+    OpenSSL and LibreSSL library's pseudo-random number generators.
+
+    Note: On LibreSSL "random_egd()" is not defined.
 
   EXPORT
     None by default.
@@ -44,6 +46,9 @@
         on success, or -1 if not enough bytes were read, or if the
         connection to the daemon failed.
 
+        "libressl" considers this function insecure, so with libressl this
+        function does not exist.
+
     random_status ()
         This function returns true if the PRNG has sufficient seeding.
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Random.pm 
new/Crypt-OpenSSL-Random-0.11/Random.pm
--- old/Crypt-OpenSSL-Random-0.10/Random.pm     2015-02-04 19:40:03.000000000 
+0100
+++ new/Crypt-OpenSSL-Random-0.11/Random.pm     2015-10-09 00:10:29.000000000 
+0200
@@ -9,7 +9,7 @@
 @EXPORT_OK = qw( random_bytes random_pseudo_bytes random_seed
                  random_egd random_status );
 
-$VERSION = '0.10';
+$VERSION = '0.11';
 XSLoader::load( __PACKAGE__, $VERSION );
 
 1;
@@ -17,8 +17,7 @@
 
 =head1 NAME
 
-Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random 
number generator
-using the openSSL libraries
+Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator access
 
 =head1 SYNOPSIS
 
@@ -34,8 +33,10 @@
 
 =head1 DESCRIPTION
 
-Crypt::OpenSSL::Random provides the ability to seed and query the
-OpenSSL library's pseudo-random number generator.
+C<Crypt::OpenSSL::Random> provides the ability to seed and query the
+B<OpenSSL> and B<LibreSSL> library's pseudo-random number generators.
+
+Note: On B<LibreSSL> C<random_egd()> is not defined.
 
 =head2 EXPORT
 
@@ -72,6 +73,9 @@
 success, or C<-1> if not enough bytes were read, or if the connection to
 the daemon failed.
 
+C<libressl> considers this function insecure, so with libressl this
+function does not exist.
+
 =item random_status ()
 
 This function returns true if the PRNG has sufficient seeding.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Random.xs 
new/Crypt-OpenSSL-Random-0.11/Random.xs
--- old/Crypt-OpenSSL-Random-0.10/Random.xs     2013-04-02 21:30:02.000000000 
+0200
+++ new/Crypt-OpenSSL-Random-0.11/Random.xs     2015-10-09 00:07:28.000000000 
+0200
@@ -7,6 +7,8 @@
 #define PACKAGE_NAME "Crypt::OpenSSL::Random"
 
 MODULE = Crypt::OpenSSL::Random                PACKAGE = Crypt::OpenSSL::Random
+PROTOTYPES: DISABLE
+
 void
 random_bytes(num_bytes_SV)
     SV * num_bytes_SV;
@@ -76,6 +78,8 @@
  # returns the number of bytes gathered, or -1 if there was a
  # connection failure or if the PRNG is still insufficiently seeded.
 
+#ifndef OPENSSL_NO_EGD
+
 void
 random_egd(egd_SV)
     SV * egd_SV;
@@ -88,6 +92,8 @@
     XPUSHs( sv_2mortal( newSViv( status ) ) );
 }
 
+#endif
+
  # Returns true if the PRNG has enough seed data
 
 void
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/SIGNATURE 
new/Crypt-OpenSSL-Random-0.11/SIGNATURE
--- old/Crypt-OpenSSL-Random-0.10/SIGNATURE     2015-02-04 19:43:42.000000000 
+0100
+++ new/Crypt-OpenSSL-Random-0.11/SIGNATURE     2015-10-09 00:16:12.000000000 
+0200
@@ -1,5 +1,5 @@
 This file contains message digests of all files listed in MANIFEST,
-signed via the Module::Signature module, version 0.73.
+signed via the Module::Signature module, version 0.79.
 
 To verify the content in this distribution, first make sure you have
 Module::Signature installed, then type:
@@ -15,17 +15,17 @@
 Hash: SHA1
 
 SHA1 5dd03065ad95845ec70baa4c92c396dc3ef15efb .gitignore
-SHA1 2f1a06eb788d0cce3882d7a66f690ba548905a21 Changes
+SHA1 08abd75288dd37cd47759350231019971fac0ebe Changes
 SHA1 78f7d31b9283b034cf19e61bc70d24bb38581b1e LICENSE
 SHA1 d1b344f1315cebc307771957afb228ff85a5eb2c MANIFEST
-SHA1 9547956449e2a90dbfbbdc7a7af17bcb2f588148 META.json
-SHA1 92b3cec46c624cecc8e1cd33734a56d03f21ca36 META.yml
+SHA1 c1fda3f4031b9e29ba2db59cd48634a60c02c0a9 META.json
+SHA1 c23742068502cfe87a62eb8242537dc1aaaa9728 META.yml
 SHA1 2ddcb73e7e3c11d765bef06138bc39edef47de2d Makefile.PL
-SHA1 f9ca6e1da721ba27fea2de76ce154b4c04c24a27 README
-SHA1 4b366deb8487ce018daecc4da55c1ae0cacd004b Random.pm
-SHA1 fd2ed6100e3204315281a4ff74c7180a8841f27e Random.xs
+SHA1 8f52106f62863a9cf6476d203a73b80b6cabb884 README
+SHA1 b1d2bc41303dc9e99cff816c13ede60ea1e13aad Random.pm
+SHA1 96741e2c68170512e8fc38829466d1e041c3a3ec Random.xs
 SHA1 43295de162f592dd4ebfde6e424d22aedac03423 hints/MSWin32.pl
-SHA1 1e8812dab8110e4d887880444a3a19e10b1f7567 t/0-basic.t
+SHA1 fa94838ecdaeccd2bf162caf7014a624dc1e66a7 t/0-basic.t
 SHA1 7de5e8f63465d9711faa107972ebce8e1349ccd6 t/z_kwalitee.t
 SHA1 9eba44de180daef6319b2c4a75ab55c972844c0e t/z_manifest.t
 SHA1 993b3cef8c06a70d99829facf76140864eb57240 t/z_meta.t
@@ -35,7 +35,7 @@
 -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 
-iEYEARECAAYFAlTSaFsACgkQmm2SYo/9yUIeFgCeMWpukwwACf/BLmYYjfl3AnsE
-uCUAn3w+q8p7x3swGspxLVsqjhPUAHuX
-=hhvG
+iEYEARECAAYFAlYW6ykACgkQmm2SYo/9yULu0ACfYWNIctH936cviqVv09qYga4m
+JHAAn3eqbNM7tBiPjrZsrJ98A7xYRIur
+=seXL
 -----END PGP SIGNATURE-----
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/t/0-basic.t 
new/Crypt-OpenSSL-Random-0.11/t/0-basic.t
--- old/Crypt-OpenSSL-Random-0.10/t/0-basic.t   2013-04-02 18:30:58.000000000 
+0200
+++ new/Crypt-OpenSSL-Random-0.11/t/0-basic.t   2015-10-09 00:11:54.000000000 
+0200
@@ -8,7 +8,7 @@
 
 BEGIN { $| = 1; print "1..5\n"; }
 END {print "not ok 1\n" unless $loaded;}
-use Crypt::OpenSSL::Random;
+use Crypt::OpenSSL::Random qw(random_seed random_bytes random_status 
random_pseudo_bytes);
 $loaded = 1;
 print "ok 1\n";
 
@@ -34,11 +34,11 @@
     }
 }
 
-my_test(Crypt::OpenSSL::Random::random_seed
+my_test(random_seed
         ("OpenSSL needs at least 32 bytes."));
 
 # We should now be seeded, regardless.
-my_test(Crypt::OpenSSL::Random::random_status());
+my_test(random_status());
 
-my_test(length(Crypt::OpenSSL::Random::random_bytes(53)) == 53);
-my_test(length(Crypt::OpenSSL::Random::random_pseudo_bytes(53)) == 53);
+my_test(length(random_bytes(53)) == 53);
+my_test(length(random_pseudo_bytes(53)) == 53);


Reply via email to