librelp: update to 1.10.0

update 1.9.0 (2020-11-20) to 1.10.0 (2021-02-16)

Version 1.10.0 - 2021-02-16
- TLS handling bugfix
  When the client tried to conntect to the server, custom
  cipherstrings (Set by tlscommands feature) were not used. This
  could lead to the negotiation of different and potentially weaker
  ciphers. Other custom tlscommands settings like Protocol where not
  affected. We do not overwrite the custom ciphers anymore if they are
  set by tlscommands. Another problem only related to the relp
  receiver (server) was, that the custom tlscommands/priority string
  where not applied on the accepted client connections. This could
  lead to the same problem as the default ciphers were used.
  Besides the main problem, the following changes were applied:
  - Add new testcase for setting custom tls ciphers in tlscommand.
  - Add support to use semicolon (;) as tlscommand seperator (See new testcase)
  - Fix GCC9 "destination size" warning in offers.c
  closes: https://github.com/rsyslog/librelp/issues/224
This commit is contained in:
heitbaum 2021-02-17 07:06:14 +00:00
parent c9205b6c73
commit 56bda618d1

View File

@ -2,8 +2,8 @@
# Copyright (C) 2016-present Team LibreELEC (https://libreelec.tv)
PKG_NAME="librelp"
PKG_VERSION="1.9.0"
PKG_SHA256="24ee9e843960d1400a44ffaedb0b1ec91463df8f8acca869cc027ed25ee6bf33"
PKG_VERSION="1.10.0"
PKG_SHA256="148db4e4d1a23e8136e9ec08810929a55faf5d45e24c2e3186d5ab34355dab31"
PKG_LICENSE="GPL"
PKG_SITE="https://www.rsyslog.com/category/librelp/"
PKG_URL="http://download.rsyslog.com/librelp/${PKG_NAME}-${PKG_VERSION}.tar.gz"