| Summary: | Net::SSLeay does not support setting elliptic curve parameters | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Karel Srot <ksrot> | ||||
| Component: | perl-Net-SSLeay | Assignee: | perl-maint-list | ||||
| Status: | CLOSED ERRATA | QA Contact: | Karel Srot <ksrot> | ||||
| Severity: | medium | Docs Contact: | Lenka Špačková <lkuprova> | ||||
| Priority: | high | ||||||
| Version: | 7.2 | CC: | jorton, jplesnik, lkuprova, lmiksik, ppisar, salmy, szidek, tmraz | ||||
| Target Milestone: | rc | Keywords: | FutureFeature, Patch | ||||
| Target Release: | --- | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Linux | ||||||
| URL: | http://cpansearch.perl.org/src/MIKEM/Net-SSLeay-1.56/Changes | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | perl-Net-SSLeay-1.55-4.el7 | Doc Type: | Enhancement | ||||
| Doc Text: |
Perl *Net:SSLeay* now supports elliptic curve parameters
Support for elliptic-curve parameters has been added to the Perl *Net:SSLeay* module, which contains bindings to the OpenSSL library. Namely, the `EC_KEY_new_by_curve_name()`, `EC_KEY_free*()`, `SSL_CTX_set_tmp_ecdh()`, and `OBJ_txt2nid()` subroutines have been ported from upstream. This is required for the support of the Elliptic Curve Diffie–Hellman Exchange (ECDHE) key exchange in the *IO::Socket::SSL* Perl module.
|
Story Points: | --- | ||||
| Clone Of: | 1044401 | Environment: | |||||
| Last Closed: | 2016-11-04 01:02:24 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | |||||||
| Bug Blocks: | 1316377 | ||||||
| Attachments: |
|
||||||
|
Description
Karel Srot
2016-03-10 06:35:15 UTC
Created attachment 1134888 [details]
Upstream ECDHE support ported to 1.55
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHEA-2016-2221.html |