|Index||index by Group||index by Distribution||index by Vendor||index by creation date||index by Name||Mirrors||Help||Search|
|Name: tls||Distribution: SUSE Linux Enterprise 15 SP3|
|Version: 1.7.14||Vendor: openSUSE|
|Release: bp153.1.18||Build date: Sat Mar 6 18:27:30 2021|
|Group: Development/Libraries/Tcl||Build host: obs-arm-2|
|Size: 119648||Source RPM: tls-1.7.14-bp153.1.18.src.rpm|
|Summary: Tcl Binding for the OpenSSL Library|
This Tcl extension provides a generic binding to OpenSSL, utilizing the Tcl_StackChannel API for Tcl 8.2 and higher. The sockets behave exactly the same as channels created using Tcl's built-in socket command with additional options for controlling the SSL session.
* Thu Feb 01 2018 email@example.com - Fix the logic to fail on unexpected testsuite failures. * Fri Dec 29 2017 firstname.lastname@example.org - Update to version 1.7.14 for compatibility with OpenSSL 1.1. - Add tls-fix-channel-state.patch to prevent implicit changes of encoding, translation and blocking mode when importing a socket. https://core.tcl.tk/tcltls/info/f798e2ea12 * Thu Oct 08 2015 email@example.com - Update to version 1.6.7 to incorporate the latest upstream fixes. This obsoletes tls-ciphers.patch and tls-enable-tls1.patch. * Wed Nov 26 2014 firstname.lastname@example.org - update to version 1.6.3 (from CVS): * tls.c (MiscObjCmd): Fixed non-static string array used in call of Tcl_GetIndexFromObj(). Memory smash waiting to happen. Thanks to Brian Griffin for alerting us all to the problem. * tls.c: Applied Jeff's patch from http://email@example.com/msg12356.html * tls.c (StatusObjCmd): memleak: free peer if loaded. [Bug 3041925] * tls.tcl (tls::socket): some socket implementations have a -type support (e.g. for inet6). - rebased tls-fix-ciphers.patch - modified tls-enable-tls1.patch to only enable tls1 by default and to update the documentation * Wed Nov 19 2014 firstname.lastname@example.org - disable test tlsIO-2.10, reading from a closed socket raises an exception with tcl >= 8.6.2 resulting in a timeout and failed test * Wed Jun 25 2014 email@example.com - Enable TLS1 by default to avoid problems with servers that reject anything else (tls-enable-tls1.patch). * Tue Aug 04 2009 firstname.lastname@example.org - Query openssl for the ciphers it supports instead of comparing against a hardcoded list to make the test independent of the openssl version. - Remove tls.h from the package. * Tue Apr 22 2008 email@example.com - Ignore test tlsIO-12.3, because it fails on loaded machines. * Thu Apr 03 2008 firstname.lastname@example.org - New version: 1.6 * Fix a memleak in tls.c * Use better Eval APIs, cleaner Tcl_Obj-handling * fix handshake on non-blocking sockets - Adjust to the new Tcl file system layout. * Fri Oct 20 2006 email@example.com - Patched cipher tests to match cipher list of openssl-0.98d.
/usr/lib64/tcl /usr/lib64/tcl/tcltls1.7.14 /usr/lib64/tcl/tcltls1.7.14/pkgIndex.tcl /usr/lib64/tcl/tcltls1.7.14/tcltls.so /usr/share/doc/packages/tls /usr/share/doc/packages/tls/ChangeLog /usr/share/doc/packages/tls/README.txt /usr/share/doc/packages/tls/license.terms /usr/share/doc/packages/tls/tls.htm
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Nov 9 18:27:03 2021