Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libssl60-4.2.1-1.2 RPM for ppc64le

From OpenSuSE Ports Tumbleweed for ppc64le

Name: libssl60 Distribution: openSUSE Tumbleweed
Version: 4.2.1 Vendor: openSUSE
Release: 1.2 Build date: Fri Jan 30 22:26:20 2026
Group: System/Libraries Build host: reproducible
Size: 526320 Source RPM: libressl-4.2.1-1.2.src.rpm
Packager: http://bugs.opensuse.org
Url: https://www.libressl.org/
Summary: An SSL/TLS protocol implementation
LibreSSL is an implementation of the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols. It derives from OpenSSL,
with refactorings.

Provides

Requires

License

OpenSSL

Changelog

* Fri Jan 30 2026 Jan Engelhardt <jengelh@inai.de>
  - Make the build succeed on s390x.
* Wed Jan 28 2026 Jan Engelhardt <jengelh@inai.de>
  - Update to release 4.2.1
    * Ensure the group selected by a TLSv1.3 server for a
      HelloRetryRequest is not one for which the client has already
      sent a key share.
* Wed Oct 15 2025 Jan Engelhardt <jengelh@inai.de>
  - Update to release 4.2.0
    * Removed the -msie_hack option from the openssl(1) ca
      subcommand.
    * Removed parameters of the 239-bit prime curves from X9.62,
      H.5.2: prime239v1, prime239v2, prime239v3.
    * Increased default MAC salt length used by PKCS12_set_mac(3) to
      16 per recommendation of NIST SP 800-132.
    * Encrypted PKCS#8 key files now use a default password-based key
      derivation function that is acceptable in the present
      millenium.
    * const corrected EVP_PKEY_get{0,1}_{DH,DSA,EC_KEY,RSA}().
    * X509_CRL_verify() now checks that the AlgorithmIdentifiers in
      the signature and the tbsCertList are identical.
    * Of the old *err() only PEMerr(), RSAerr(), and SSLerr() remain.
    * Removed BIO_s_log(), X509_PKEY_{new,free}(),
      PEM_X509_INFO_read() and PEM_X509_INFO_write_bio().
    * Re-expose the ASN.1 Boolean template items.
* Mon Sep 01 2025 Jan Engelhardt <jengelh@inai.de>
  - Move default config to /etc/libressl.
* Thu Aug 14 2025 Jan Engelhardt <jengelh@inai.de>
  - Update to release 4.1.0
    * New: libtls has a new tls_peer_cert_common_name() API call to
      retrieve the peer's common name without having to inspect the
      PEM.
    * Bugfix: Again allow the magic values -1, -2 and -3 for the salt
      length of an RSA-PSS key in the EVP_PKEY_CTX_ctrl_str()
      interface.
* Sat Mar 08 2025 Jan Engelhardt <jengelh@inai.de>
  - Document absence of openssl3 APIs in descriptions and a
    symbol list text file in %_docdir.
* Tue Oct 15 2024 Jan Engelhardt <jengelh@inai.de>
  - Update to release 4.0.0
    * Added CRLfile option to the cms command of openssl(1) to
      specify additional CRLs for use during verification.
    * Protocol parsing in libtls was changed. The unsupported
      TLSv1.1 and TLSv1.0 protocols are ignored and no longer
      enable or disable TLSv1.2 in surprising ways.
    * The dangerous EVP_PKEY*_check(3) family of functions was
      removed. The openssl(1) pkey and pkeyparam commands no longer
      support the -check and -pubcheck flags.
    * Support for Whirlpool was removed. Applications still using
      this should honor OPENSSL_NO_WHIRLPOOL.
    * Removed X509_REQ_{get,set}_extension_nids().
    * Removed typdefs for COMP_CTX, COMP_METHOD, X509_CRL_METHOD,
      STORE, STORE_METHOD, and SSL_AEAD_CTX.
    * i2d_ASN1_OBJECT() now returns -1 on error like most other
      i2d_*.
    * SPKAC support was removed from openssl(1).
    * Added TLS1-PRF support to the EVP interface.
    * SSL_CTX_set1_cert_store() and
      SSL_CIPHER_get_handshake_digest() were added to libssl.
    * The OpenSSL pkcs12 command and PKCS12_create() no longer
      support setting the Microsoft-specific Local Key Set and
      Cryptographic Service Provider attributes.
* Thu May 16 2024 Jan Engelhardt <jengelh@inai.de>
  - Update to release 3.9.2
    * A missing bounds check could lead to a crash due to
      dereferencing a zero-sized allocation.
* Sat Mar 30 2024 Jan Engelhardt <jengelh@inai.de>
  - Update to release 3.9.1
    * Updated tests with expiring certificates
    * CET-related build fixes for Windows and macOS targets
    * update libtls linker script to include libssl and
      libcrypto again
* Fri Mar 15 2024 Paolo Stivanin <info@paolostivanin.com>
  - Update to 3.8.3:
    * Improved control-flow enforcement (CET) support.
* Tue Nov 14 2023 Jan Engelhardt <jengelh@inai.de>
  - Rework conflicts again
* Fri Nov 03 2023 Jan Engelhardt <jengelh@inai.de>
  - Update to release 3.8.2
    * Added support for truncated SHA-2 and for SHA-3.
    * The BPSW primality test performs additional Miller-Rabin rounds
      with random bases to reduce the likelihood of composites passing.
    * Allow testing of ciphers and digests using badly aligned buffers
      in openssl speed.
    * Added a workaround for a poorly thought-out change in OpenSSL 3
      that broke privilege separation support in libtls.
    * Compatibility changes:
    * Removed most public symbols that were deprecated in OpenSSL
      0.9.8.
    * Security fixes:
    * Disabled TLSv1.0 and TLSv1.1 in libssl so that they may no
      longer be selected for use.
* Tue Jun 20 2023 Otto Hollmann <otto.hollmann@suse.com>
  - Improve cross-package provides/conflicts [boo#1210313]
    * Remove explicit conflicts with other devel-libraries
    * Remove Obsoletes: ssl
* Mon May 29 2023 Paolo Stivanin <info@paolostivanin.com>
  - Update to 3.7.3:
    * Bug fix: Hostflags in the verify parameters would not
      propagate from an SSL_CTX to newly created SSL.
    * Reliability fix: A double free or use after free could occur
      after SSL_clear(3).
* Sat Apr 08 2023 Jan Engelhardt <jengelh@inai.de>
  - Update to release 3.7.2
    * Updates to the build system
* Sat Mar 18 2023 Jan Engelhardt <jengelh@inai.de>
  - Add more conflicts between openssl<>libressl
* Thu Mar 16 2023 Jan Engelhardt <jengelh@inai.de>
  - Update to release 3.7.1
    * Added UI_null()
    * Added X509_STORE_*check_issued()
    * Added X509_CRL_get0_sigalg() and X509_get0_uids() accessors
    * Added EVP_CIPHER_meth_*() setter API

Files

/usr/lib64/libssl.so.60
/usr/lib64/libssl.so.60.0.1


Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Apr 20 23:08:27 2026