Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libstrophe0-0.14.0-2.3 RPM for aarch64

From OpenSuSE Ports Tumbleweed for aarch64

Name: libstrophe0 Distribution: openSUSE Tumbleweed
Version: 0.14.0 Vendor: openSUSE
Release: 2.3 Build date: Tue Jul 22 00:14:40 2025
Group: System/Libraries Build host: reproducible
Size: 246298 Source RPM: libstrophe-0.14.0-2.3.src.rpm
Packager: http://bugs.opensuse.org
Url: https://strophe.im/libstrophe/
Summary: A XMPP library for C
The libstrophe library is a XMPP library written in C.

Provides

Requires

License

GPL-3.0-or-later OR MIT

Changelog

* Mon Jul 21 2025 Andreas Stieger <andreas.stieger@gmx.de>
  - fix gcc15 build, add libstrophe-0.14.0-gcc15.patch from upstream
  - add upstream signing key
  - do not bootstrap during build, and other spec file tweaks
* Thu Mar 13 2025 Michael Vetter <mvetter@suse.com>
  - Update to 0.14.0:
    * Add SM-state serialization mechanism (#239)
    * Add support for SCRAM-SHA-512-PLUS (da12298)
    * Add support for SSLKEYLOGFILE with OpenSSL (d82df12)
    * Fix some issues related to Stream Management (03d4313, 4359536)
    * Fix a potential segfault (9fef4b7)
    * New API:
      + xmpp_conn_set_sm_callback()
      + xmpp_conn_restore_sm_state()
* Wed Feb 21 2024 Michael Vetter <mvetter@suse.com>
  - Update to 0.13.1:
    * Fix SCRAM-*-PLUS SASL mechanisms with OpenSSL and TLS < v1.3 (40f2452)
    * Only signal "stream negotiation success" once (1cf09b1)
    * Fix sock_connect() not looping over all DNS records returned
      if no sockopt_cb is set (5edc480)
    * Replace usage of EBADFD, it's not in POSIX (#235)
* Thu Feb 01 2024 Michael Vetter <mvetter@suse.com>
  - Update to 0.13.0:
    * Fix connected/connecting signaling to user (#227)
    * Fix wording of licensing terms (#225)
    * Prepare for future changes in OpenSSL (#226)
    * Improve Stream Management (#227) (#230)
    * Add SCRAM-PLUS Variants (#228)
    * Introduce XEP-0138 stream compression (#231)
    * Deprecated the following API (#227):
    * xmpp_conn_disable_tls() - replaced by a flag set by xmpp_conn_set_flags()
* Wed Aug 02 2023 Michael Vetter <mvetter@suse.com>
  - Update to 0.12.3:
    * Improve TCP-connection establishment (#221)
    * Handle case where the server doesn't provide the bind feature (#224)
    * Fix configure script for non-bash shells (#218)
    * Parse JID's according to RFC7622 (#219)
    * Fix potential memory leak in internal DNS resolver (#219)
    * Fix potential memory leaks in xmpp_conn_set_cafile() and xmpp_conn_set_capath() (#219)
    * Internal improvements (#219)
* Mon Aug 08 2022 Michael Vetter <mvetter@suse.com>
  - Update to 0.12.2:
    * Fix reconnect issues when Stream Management is enabled (#211)
    * Fix resolver ... this time for real hopefully (fixup of #200) (#214)
    * Fix clearing of password cache on resumed connection (#214)
    * Improve detection&implementation of va_copy (#213)
    * Fix Valgrind CI builds against LibreSSL (#212)
    * Fix perf example on platforms where an rdtsc() equivalent
      isn't implemented (#212)
  - Drop patch contained in new release:
    * libstrophe-0.12-stream-management-fix.patch
* Mon Jul 11 2022 Michael Vetter <mvetter@suse.com>
  - Add libstrophe-0.12-stream-management-fix.patch:
    To fix connection issues with Stream Management
* Tue Jul 05 2022 Michael Vetter <mvetter@suse.com>
  - Update to 0.12.1:
    * Fix compilation in buildroot (#207)
    * Fixes regarding OpenSSL (#208)
    * Fix some build steps when builddir != srcdir (#208)
    * Allow the user to disable build of examples (#209)
    * CI builds against OpenSSL 3 (#206)
    * Change the call signature of the following API:
      xmpp_conn_set_client_cert() - the PKCS#12 file has now to be passed via the cert
      parameter. Originally it was via key. Currently both styles are supported,
      but in a future release only passing via cert will be accepted.
* Mon May 09 2022 Michael Vetter <mvetter@suse.com>
  - Update to 0.12.0:
    * Fix potential infinite loop in resolver (#200)
    * Prevent potential memory leak in