Hello community,
here is the log from the commit of package perl-Crypt-OpenSSL-Random for
openSUSE:Factory checked in at 2017-09-05 15:13:12
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/perl-Crypt-OpenSSL-Random (Old)
and /work/SRC/openSUSE:Factory/.perl-Crypt-OpenSSL-Random.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "perl-Crypt-OpenSSL-Random"
Tue Sep 5 15:13:12 2017 rev:19 rq:520418 version:0.11
Changes:
--------
---
/work/SRC/openSUSE:Factory/perl-Crypt-OpenSSL-Random/perl-Crypt-OpenSSL-Random.changes
2015-02-11 16:31:27.000000000 +0100
+++
/work/SRC/openSUSE:Factory/.perl-Crypt-OpenSSL-Random.new/perl-Crypt-OpenSSL-Random.changes
2017-09-05 15:13:14.381940273 +0200
@@ -1,0 +2,7 @@
+Wed Aug 23 10:28:34 UTC 2017 - [email protected]
+
+- update to 0.11
+ - add libressl support, unsupported random_egd() with libressl
+ - fixes testsuite failure with OpenSSL 1.1 (bsc#1055236)
+
+-------------------------------------------------------------------
Old:
----
Crypt-OpenSSL-Random-0.10.tar.gz
New:
----
Crypt-OpenSSL-Random-0.11.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ perl-Crypt-OpenSSL-Random.spec ++++++
--- /var/tmp/diff_new_pack.Wm2sGV/_old 2017-09-05 15:13:14.961858758 +0200
+++ /var/tmp/diff_new_pack.Wm2sGV/_new 2017-09-05 15:13:14.965858195 +0200
@@ -1,7 +1,7 @@
#
# spec file for package perl-Crypt-OpenSSL-Random
#
-# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
Name: perl-Crypt-OpenSSL-Random
-Version: 0.10
+Version: 0.11
Release: 0
%define cpan_name Crypt-OpenSSL-Random
Summary: Routines for accessing the OpenSSL pseudo-random number
generator
++++++ Crypt-OpenSSL-Random-0.10.tar.gz -> Crypt-OpenSSL-Random-0.11.tar.gz
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Changes
new/Crypt-OpenSSL-Random-0.11/Changes
--- old/Crypt-OpenSSL-Random-0.10/Changes 2015-02-04 19:40:47.000000000
+0100
+++ new/Crypt-OpenSSL-Random-0.11/Changes 2015-10-09 00:09:10.000000000
+0200
@@ -1,5 +1,8 @@
Revision history for Perl extension Crypt::OpenSSL::Random.
+0.11 2015-10-09 rurban
+ - add libressl support, unsupported random_egd() with libressl
+
0.10 2015-02-04 rurban
- fix LIBS argument, fatal on Windows. thanks to kmx
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/META.json
new/Crypt-OpenSSL-Random-0.11/META.json
--- old/Crypt-OpenSSL-Random-0.10/META.json 2015-02-04 19:43:39.000000000
+0100
+++ new/Crypt-OpenSSL-Random-0.11/META.json 2015-10-09 00:16:09.000000000
+0200
@@ -4,7 +4,7 @@
"Ian Robertson"
],
"dynamic_config" : 1,
- "generated_by" : "ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter
version 2.142060",
+ "generated_by" : "ExtUtils::MakeMaker version 7.1, CPAN::Meta::Converter
version 2.150005",
"license" : [
"perl_5"
],
@@ -45,5 +45,6 @@
},
"x_MailingList" : "[email protected]"
},
- "version" : "0.10"
+ "version" : "0.11",
+ "x_serialization_backend" : "JSON::PP version 2.27300"
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/META.yml
new/Crypt-OpenSSL-Random-0.11/META.yml
--- old/Crypt-OpenSSL-Random-0.10/META.yml 2015-02-04 19:43:39.000000000
+0100
+++ new/Crypt-OpenSSL-Random-0.11/META.yml 2015-10-09 00:16:09.000000000
+0200
@@ -7,7 +7,7 @@
configure_requires:
ExtUtils::MakeMaker: '0'
dynamic_config: 1
-generated_by: 'ExtUtils::MakeMaker version 6.98, CPAN::Meta::Converter version
2.142060'
+generated_by: 'ExtUtils::MakeMaker version 7.1, CPAN::Meta::Converter version
2.150005'
license: perl
meta-spec:
url: http://module-build.sourceforge.net/META-spec-v1.4.html
@@ -23,4 +23,5 @@
homepage: http://sourceforge.net/projects/perl-openssl/
license: http://dev.perl.org/licenses/
repository: https://github.com/rurban/Crypt-OpenSSL-Random
-version: '0.10'
+version: '0.11'
+x_serialization_backend: 'CPAN::Meta::YAML version 0.016'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/README
new/Crypt-OpenSSL-Random-0.11/README
--- old/Crypt-OpenSSL-Random-0.10/README 2015-02-04 19:41:05.000000000
+0100
+++ new/Crypt-OpenSSL-Random-0.11/README 2015-10-09 00:11:59.000000000
+0200
@@ -1,6 +1,6 @@
NAME
- Crypt::OpenSSL::Random - Routines for accessing the OpenSSL
- pseudo-random number generator using the openSSL libraries
+ Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator
+ access
SYNOPSIS
use Crypt::OpenSSL::Random;
@@ -14,8 +14,10 @@
my $ten_ok_random_bytes =
Crypt::OpenSSL::Random::random_pseudo_bytes(10);
DESCRIPTION
- Crypt::OpenSSL::Random provides the ability to seed and query the
- OpenSSL library's pseudo-random number generator.
+ "Crypt::OpenSSL::Random" provides the ability to seed and query the
+ OpenSSL and LibreSSL library's pseudo-random number generators.
+
+ Note: On LibreSSL "random_egd()" is not defined.
EXPORT
None by default.
@@ -44,6 +46,9 @@
on success, or -1 if not enough bytes were read, or if the
connection to the daemon failed.
+ "libressl" considers this function insecure, so with libressl this
+ function does not exist.
+
random_status ()
This function returns true if the PRNG has sufficient seeding.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Random.pm
new/Crypt-OpenSSL-Random-0.11/Random.pm
--- old/Crypt-OpenSSL-Random-0.10/Random.pm 2015-02-04 19:40:03.000000000
+0100
+++ new/Crypt-OpenSSL-Random-0.11/Random.pm 2015-10-09 00:10:29.000000000
+0200
@@ -9,7 +9,7 @@
@EXPORT_OK = qw( random_bytes random_pseudo_bytes random_seed
random_egd random_status );
-$VERSION = '0.10';
+$VERSION = '0.11';
XSLoader::load( __PACKAGE__, $VERSION );
1;
@@ -17,8 +17,7 @@
=head1 NAME
-Crypt::OpenSSL::Random - Routines for accessing the OpenSSL pseudo-random
number generator
-using the openSSL libraries
+Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator access
=head1 SYNOPSIS
@@ -34,8 +33,10 @@
=head1 DESCRIPTION
-Crypt::OpenSSL::Random provides the ability to seed and query the
-OpenSSL library's pseudo-random number generator.
+C<Crypt::OpenSSL::Random> provides the ability to seed and query the
+B<OpenSSL> and B<LibreSSL> library's pseudo-random number generators.
+
+Note: On B<LibreSSL> C<random_egd()> is not defined.
=head2 EXPORT
@@ -72,6 +73,9 @@
success, or C<-1> if not enough bytes were read, or if the connection to
the daemon failed.
+C<libressl> considers this function insecure, so with libressl this
+function does not exist.
+
=item random_status ()
This function returns true if the PRNG has sufficient seeding.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/Random.xs
new/Crypt-OpenSSL-Random-0.11/Random.xs
--- old/Crypt-OpenSSL-Random-0.10/Random.xs 2013-04-02 21:30:02.000000000
+0200
+++ new/Crypt-OpenSSL-Random-0.11/Random.xs 2015-10-09 00:07:28.000000000
+0200
@@ -7,6 +7,8 @@
#define PACKAGE_NAME "Crypt::OpenSSL::Random"
MODULE = Crypt::OpenSSL::Random PACKAGE = Crypt::OpenSSL::Random
+PROTOTYPES: DISABLE
+
void
random_bytes(num_bytes_SV)
SV * num_bytes_SV;
@@ -76,6 +78,8 @@
# returns the number of bytes gathered, or -1 if there was a
# connection failure or if the PRNG is still insufficiently seeded.
+#ifndef OPENSSL_NO_EGD
+
void
random_egd(egd_SV)
SV * egd_SV;
@@ -88,6 +92,8 @@
XPUSHs( sv_2mortal( newSViv( status ) ) );
}
+#endif
+
# Returns true if the PRNG has enough seed data
void
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/SIGNATURE
new/Crypt-OpenSSL-Random-0.11/SIGNATURE
--- old/Crypt-OpenSSL-Random-0.10/SIGNATURE 2015-02-04 19:43:42.000000000
+0100
+++ new/Crypt-OpenSSL-Random-0.11/SIGNATURE 2015-10-09 00:16:12.000000000
+0200
@@ -1,5 +1,5 @@
This file contains message digests of all files listed in MANIFEST,
-signed via the Module::Signature module, version 0.73.
+signed via the Module::Signature module, version 0.79.
To verify the content in this distribution, first make sure you have
Module::Signature installed, then type:
@@ -15,17 +15,17 @@
Hash: SHA1
SHA1 5dd03065ad95845ec70baa4c92c396dc3ef15efb .gitignore
-SHA1 2f1a06eb788d0cce3882d7a66f690ba548905a21 Changes
+SHA1 08abd75288dd37cd47759350231019971fac0ebe Changes
SHA1 78f7d31b9283b034cf19e61bc70d24bb38581b1e LICENSE
SHA1 d1b344f1315cebc307771957afb228ff85a5eb2c MANIFEST
-SHA1 9547956449e2a90dbfbbdc7a7af17bcb2f588148 META.json
-SHA1 92b3cec46c624cecc8e1cd33734a56d03f21ca36 META.yml
+SHA1 c1fda3f4031b9e29ba2db59cd48634a60c02c0a9 META.json
+SHA1 c23742068502cfe87a62eb8242537dc1aaaa9728 META.yml
SHA1 2ddcb73e7e3c11d765bef06138bc39edef47de2d Makefile.PL
-SHA1 f9ca6e1da721ba27fea2de76ce154b4c04c24a27 README
-SHA1 4b366deb8487ce018daecc4da55c1ae0cacd004b Random.pm
-SHA1 fd2ed6100e3204315281a4ff74c7180a8841f27e Random.xs
+SHA1 8f52106f62863a9cf6476d203a73b80b6cabb884 README
+SHA1 b1d2bc41303dc9e99cff816c13ede60ea1e13aad Random.pm
+SHA1 96741e2c68170512e8fc38829466d1e041c3a3ec Random.xs
SHA1 43295de162f592dd4ebfde6e424d22aedac03423 hints/MSWin32.pl
-SHA1 1e8812dab8110e4d887880444a3a19e10b1f7567 t/0-basic.t
+SHA1 fa94838ecdaeccd2bf162caf7014a624dc1e66a7 t/0-basic.t
SHA1 7de5e8f63465d9711faa107972ebce8e1349ccd6 t/z_kwalitee.t
SHA1 9eba44de180daef6319b2c4a75ab55c972844c0e t/z_manifest.t
SHA1 993b3cef8c06a70d99829facf76140864eb57240 t/z_meta.t
@@ -35,7 +35,7 @@
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
-iEYEARECAAYFAlTSaFsACgkQmm2SYo/9yUIeFgCeMWpukwwACf/BLmYYjfl3AnsE
-uCUAn3w+q8p7x3swGspxLVsqjhPUAHuX
-=hhvG
+iEYEARECAAYFAlYW6ykACgkQmm2SYo/9yULu0ACfYWNIctH936cviqVv09qYga4m
+JHAAn3eqbNM7tBiPjrZsrJ98A7xYRIur
+=seXL
-----END PGP SIGNATURE-----
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/Crypt-OpenSSL-Random-0.10/t/0-basic.t
new/Crypt-OpenSSL-Random-0.11/t/0-basic.t
--- old/Crypt-OpenSSL-Random-0.10/t/0-basic.t 2013-04-02 18:30:58.000000000
+0200
+++ new/Crypt-OpenSSL-Random-0.11/t/0-basic.t 2015-10-09 00:11:54.000000000
+0200
@@ -8,7 +8,7 @@
BEGIN { $| = 1; print "1..5\n"; }
END {print "not ok 1\n" unless $loaded;}
-use Crypt::OpenSSL::Random;
+use Crypt::OpenSSL::Random qw(random_seed random_bytes random_status
random_pseudo_bytes);
$loaded = 1;
print "ok 1\n";
@@ -34,11 +34,11 @@
}
}
-my_test(Crypt::OpenSSL::Random::random_seed
+my_test(random_seed
("OpenSSL needs at least 32 bytes."));
# We should now be seeded, regardless.
-my_test(Crypt::OpenSSL::Random::random_status());
+my_test(random_status());
-my_test(length(Crypt::OpenSSL::Random::random_bytes(53)) == 53);
-my_test(length(Crypt::OpenSSL::Random::random_pseudo_bytes(53)) == 53);
+my_test(length(random_bytes(53)) == 53);
+my_test(length(random_pseudo_bytes(53)) == 53);