Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libxmlsec1-1-1.2.37-150600.19.3 RPM for s390x

From OpenSuSE Leap 15.6 for s390x

Name: libxmlsec1-1 Distribution: SUSE Linux Enterprise 15
Version: 1.2.37 Vendor: SUSE LLC <>
Release: 150600.19.3 Build date: Thu May 9 16:43:46 2024
Group: Unspecified Build host: s390zl33
Size: 657479 Source RPM: xmlsec1-1.2.37-150600.19.3.src.rpm
Summary: Library providing support for "XML Signature" and "XML Encryption" standards
XML Security Library is a C library based on LibXML2  and OpenSSL.
The library was created with a goal to support major XML security
standards "XML Digital Signature" and "XML Encryption".






* Wed Feb 01 2023
  - switch to pkgconfig(zlib) to allow alternative providers as well
* Sat Dec 03 2022
  - update to 1.2.37:
    Fixed two regressions from 1.2.36 release
* Fri Nov 04 2022
  - Update to 1.2.36:
    * Retired the XMLSec mailing list "" and the
      XMLSec Online Signature Verifier.
  - Update to 1.2.35:
    * Migration to OpenSSL 3.0 API (based on PR by @snargit). Note
      that OpenSSL engines are disabled by default when XMLSec
      library is compiled against OpenSSL 3.0. To re-enable OpenSSL
      engines, use "--enable-openssl3-engines" configure flag (there
      will be a lot of deprecation warnings).
    * The OpenSSL before 1.1.0 and LibreSSL before 2.7.0 are now
      deprecated and will be removed in the future versions of
      XMLSec Library.
    * Refactored all the integer casts to ensure cast-safety. Fixed
      all warnings and enabled "-Werror" and "-pedantic" flags on
      CI builds.
    * Added configure flag to use size_t for xmlSecSize (currently
      disabled by default for backward compatibility).
    * Moved all CI builds to GitHub actions.
* Thu Sep 08 2022
  - Add export CFLAGS/CXXFLAGS="-Wno-error=deprecated-declarations"
    inbefore configure. We pass --enable-werror to configure, and
    that leads to warnings about deprecations failing build. As
    deprecations is mainly a consern for upstream, stop failing on
* Mon May 23 2022
  - update to 1.2.34:
    * Support for OpenSSL compiled with OPENSSL_NO_ERR.
    * Full support for LibreSSL 3.5.0 and above
    * Several other small fixes
* Sun Nov 28 2021
  - update to 1.2.33:
    * Fix decrypting session key for two recipients
    * Added --privkey-openssl-engine option to enhance openssl engine support
* Sun May 09 2021
  - update to 1.2.32:
    + Remove MD5 for NSS 3.59 and above
    + Fix PKCS12_parse return code handling
    + Fix OpenSSL lookup
    + xmlSecX509DataGetNodeContent(): don't return 0 for non-empty
      elements - fix for LibreOffice
  - add upstream signing key and validate source signature
  - put license text into all subpackages
  - treat all compiler warnings as errors
* Wed Feb 17 2021
  - Relax the crypto policies for the test-suite. This allows the
    tests using certificates with small key lengths to pass.
* Thu Dec 17 2020
  - Update to version 1.2.31:
    + Unload error strings in OpenSSL shutdown.
    + Make userData available when executing preExecCallback
    + Add an option to use secure memset.
  - Pass --disable-md5 to configure: The cryptographic strength of
    the MD5 algorithm is sufficiently doubtful that its use is
    discouraged at this time. It is not listed as an algorithm in
* Thu Jun 18 2020
  - Update to 1.2.30:
    * Enabled XML_PARSE_HUGE for all xml parsers.
    * Various build and tests fixes and improvements.
    * Move remaining private header files away from xmlsec/include/ folder.
* Thu Apr 25 2019
  - Update to 1.2.28:
    * Added BoringSSL support (chenbd).
    * Added gnutls-3.6.x support (alonbl).
    * Added DSA and ECDSA key size getter for MSCNG (vmiklos).
    * Added --enable-mans configuration option (alonbl).
    * Added coninuous build integration for MacOSX (vmiklos).
    * Several other small fixes (more details).
* Fri Dec 07 2018
  - Make sure to recommend at least one backend when you install
    just xmlsec1
* Wed Oct 31 2018
  - Drop the gnutls backend as based on the tests it is quite borked:
    * We still have nss and openssl backend for people to use
* Wed Oct 31 2018
  - Version update to 1.2.27:
    * Added AES-GCM support for OpenSSL and MSCNG (snargit).
    * Added DSA-SHA256 and ECDSA-SHA384 support for NSS (vmiklos).
    * Added RSA-OAEP support for MSCNG (vmiklos).
    * Continuous build integration in Travis and Appveyor.
    * Several other small fixes (more details).
* Thu Aug 16 2018
  - Add rplintrc to avoid bogus errors:
    * xmlsec1-rpmlintrc
* Tue Aug 14 2018
  - Fixed (bsc#1104876).  Added: Requires: %{libname} = %{version} to each module
    in the spec file. This will ensure that when one of the modules is installed
    the corresponding version of libxmlsec1-1 will also be installed/upgraded.
* Tue Jun 05 2018
  - Version update to 1.2.26:
    * Added xmlsec-mscng module based on Microsoft Cryptography API: Next
    * Added support for GOST 2012 and fixed CryptoPro CSP provider for GOST R
      34.10-2001 in xmlsec-mscrypto
    * Added LibreSSL 2.7 support
    * Upgraded documentation build process to support the latest gtk-doc
* Thu Nov 30 2017
  - Version update to 1.2.25:
    * Various small fixes
    * Coverity cleanups
    * Removed support for old openssl
* Thu Apr 20 2017
  - Version update to 1.2.24:
    * Added ECDSA-SHA1, ECDSA-SHA256, ECDSA-SHA512 support
    for xmlsec-nss.
    * Disabled external entities loading by xmlsec utility app by
    default to prevent XXE attacks.
    * Improved OpenSSL version and features detection.
    * Cleaned up, simplified, and standardized internal error
    * Fixed a few Coverity-discovered bugs.
    * Marked as deprecated all the functions in xmlsec/soap.h file
    and a couple other functions no longer required by xmlsec.
    These functions will be removed in the future releases.
    * Several other small fixes (see commit log for more details).
* Thu Mar 23 2017
  - Fixed dependencies with libraries (bsc#1012246):
* Mon Nov 28 2016
  - Version update to 1.2.23:
    * Full support for OpenSSL 1.1.0
    * Several other small fixes
* Wed May 25 2016
  - Version update to 1.2.22 (fate#320861):
    * see the ChangeLog for most detailed output
    * openssl 1.1 support
    * Few features from libreoffice for integrated
    * Run the testsuite
* Thu Sep 03 2015
  - update to 1.2.20:
    * fix a number of miscellaneous bugs
    * update expired or soon-to-be-expired certificates in test suite



Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Jun 22 00:08:52 2024