2020-10-15 20:27:53 +00:00
|
|
|
# For the curious:
|
|
|
|
# 0.9.8jk + EAP-FAST soversion = 8
|
|
|
|
# 1.0.0 soversion = 10
|
|
|
|
# 1.1.0 soversion = 1.1 (same as upstream although presence of some symbols
|
|
|
|
# depends on build configuration options)
|
2021-04-09 20:24:41 +00:00
|
|
|
# 3.0.0 soversion = 3 (same as upstream)
|
|
|
|
%define soversion 3
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Arches on which we need to prevent arch conflicts on opensslconf.h, must
|
|
|
|
# also be handled in opensslconf-new.h.
|
|
|
|
%define multilib_arches %{ix86} ia64 %{mips} ppc ppc64 s390 s390x sparcv9 sparc64 x86_64
|
|
|
|
|
2022-05-05 15:05:35 +00:00
|
|
|
%define srpmhash() %{lua:
|
|
|
|
local files = rpm.expand("%_specdir/openssl.spec")
|
|
|
|
for i, p in ipairs(patches) do
|
|
|
|
files = files.." "..p
|
|
|
|
end
|
|
|
|
for i, p in ipairs(sources) do
|
|
|
|
files = files.." "..p
|
|
|
|
end
|
|
|
|
local sha256sum = assert(io.popen("cat "..files.." 2>/dev/null | sha256sum"))
|
|
|
|
local hash = sha256sum:read("*a")
|
|
|
|
sha256sum:close()
|
|
|
|
print(string.sub(hash, 0, 16))
|
|
|
|
}
|
|
|
|
|
2020-10-15 20:27:53 +00:00
|
|
|
%global _performance_build 1
|
|
|
|
|
|
|
|
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
|
|
|
Name: openssl
|
2022-01-18 17:30:10 +00:00
|
|
|
Version: 3.0.1
|
2022-11-15 14:51:36 +00:00
|
|
|
Release: 44%{?dist}
|
2020-10-15 20:27:53 +00:00
|
|
|
Epoch: 1
|
|
|
|
# We have to remove certain patented algorithms from the openssl source
|
|
|
|
# tarball with the hobble-openssl script which is included below.
|
|
|
|
# The original openssl upstream tarball cannot be shipped in the .src.rpm.
|
|
|
|
Source: openssl-%{version}-hobbled.tar.xz
|
|
|
|
Source1: hobble-openssl
|
|
|
|
Source2: Makefile.certificate
|
2021-04-09 20:24:41 +00:00
|
|
|
Source3: genpatches
|
2020-10-15 20:27:53 +00:00
|
|
|
Source6: make-dummy-cert
|
|
|
|
Source7: renew-dummy-cert
|
2021-04-09 20:24:41 +00:00
|
|
|
Source9: configuration-switch.h
|
|
|
|
Source10: configuration-prefix.h
|
2020-10-15 20:27:53 +00:00
|
|
|
Source12: ec_curve.c
|
|
|
|
Source13: ectest.c
|
2021-11-23 13:45:25 +00:00
|
|
|
Source14: 0025-for-tests.patch
|
2021-02-11 17:09:01 +00:00
|
|
|
|
2021-04-09 20:24:41 +00:00
|
|
|
# Patches exported from source git
|
|
|
|
# Aarch64 and ppc64le use lib64
|
|
|
|
Patch1: 0001-Aarch64-and-ppc64le-use-lib64.patch
|
|
|
|
# Use more general default values in openssl.cnf
|
|
|
|
Patch2: 0002-Use-more-general-default-values-in-openssl.cnf.patch
|
|
|
|
# Do not install html docs
|
|
|
|
Patch3: 0003-Do-not-install-html-docs.patch
|
|
|
|
# Override default paths for the CA directory tree
|
|
|
|
Patch4: 0004-Override-default-paths-for-the-CA-directory-tree.patch
|
|
|
|
# apps/ca: fix md option help text
|
|
|
|
Patch5: 0005-apps-ca-fix-md-option-help-text.patch
|
|
|
|
# Disable signature verification with totally unsafe hash algorithms
|
|
|
|
Patch6: 0006-Disable-signature-verification-with-totally-unsafe-h.patch
|
|
|
|
# Add support for PROFILE=SYSTEM system default cipherlist
|
|
|
|
Patch7: 0007-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
|
|
|
|
# Add FIPS_mode() compatibility macro
|
2021-07-02 19:05:44 +00:00
|
|
|
Patch8: 0008-Add-FIPS_mode-compatibility-macro.patch
|
2021-04-09 20:24:41 +00:00
|
|
|
# Add check to see if fips flag is enabled in kernel
|
2021-11-22 10:20:40 +00:00
|
|
|
Patch9: 0009-Add-Kernel-FIPS-mode-flag-support.patch
|
2021-04-09 20:24:41 +00:00
|
|
|
# remove unsupported EC curves
|
|
|
|
Patch11: 0011-Remove-EC-curves.patch
|
2022-02-22 14:20:01 +00:00
|
|
|
# Disable explicit EC curves
|
2022-04-01 10:53:17 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2066412
|
2022-02-22 14:20:01 +00:00
|
|
|
Patch12: 0012-Disable-explicit-ec.patch
|
2022-04-01 10:53:17 +00:00
|
|
|
# https://github.com/openssl/openssl/pull/17981
|
|
|
|
Patch13: 0013-FIPS-provider-explicit-ec.patch
|
|
|
|
# https://github.com/openssl/openssl/pull/17998
|
|
|
|
Patch14: 0014-FIPS-disable-explicit-ec.patch
|
2022-06-22 10:52:57 +00:00
|
|
|
# https://github.com/openssl/openssl/pull/18609
|
|
|
|
Patch15: 0015-FIPS-decoded-from-explicit.patch
|
2021-08-16 10:49:09 +00:00
|
|
|
# Instructions to load legacy provider in openssl.cnf
|
|
|
|
Patch24: 0024-load-legacy-prov.patch
|
2021-09-22 10:09:15 +00:00
|
|
|
# Tmp: test name change
|
|
|
|
Patch31: 0031-tmp-Fix-test-names.patch
|
2021-11-22 10:20:40 +00:00
|
|
|
# We load FIPS provider and set FIPS properties implicitly
|
|
|
|
Patch32: 0032-Force-fips.patch
|
|
|
|
# Embed HMAC into the fips.so
|
|
|
|
Patch33: 0033-FIPS-embed-hmac.patch
|
2021-11-22 13:08:48 +00:00
|
|
|
# Comment out fipsinstall command-line utility
|
|
|
|
Patch34: 0034.fipsinstall_disable.patch
|
2021-12-21 15:16:07 +00:00
|
|
|
# Skip unavailable algorithms running `openssl speed`
|
|
|
|
Patch35: 0035-speed-skip-unavailable-dgst.patch
|
2022-07-20 13:20:48 +00:00
|
|
|
# Extra public/private key checks required by FIPS-140-3
|
|
|
|
Patch44: 0044-FIPS-140-3-keychecks.patch
|
2022-01-13 12:35:22 +00:00
|
|
|
# Minimize fips services
|
|
|
|
Patch45: 0045-FIPS-services-minimize.patch
|
2022-01-26 15:50:19 +00:00
|
|
|
# Backport of s390x hardening, https://github.com/openssl/openssl/pull/17486
|
|
|
|
Patch46: 0046-FIPS-s390x-hardening.patch
|
2022-01-19 12:40:57 +00:00
|
|
|
# Execute KATS before HMAC verification
|
|
|
|
Patch47: 0047-FIPS-early-KATS.patch
|
2022-02-03 14:36:38 +00:00
|
|
|
# Backport of correctly handle 2^14 byte long records #17538
|
|
|
|
Patch48: 0048-correctly-handle-records.patch
|
2022-02-22 11:21:06 +00:00
|
|
|
# Selectively disallow SHA1 signatures
|
|
|
|
Patch49: 0049-Selectively-disallow-SHA1-signatures.patch
|
2022-02-22 14:20:01 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2049265
|
|
|
|
Patch50: 0050-FIPS-enable-pkcs12-mac.patch
|
2022-02-24 10:07:39 +00:00
|
|
|
# Backport of patch for RHEL for Edge rhbz #2027261
|
|
|
|
Patch51: 0051-Support-different-R_BITS-lengths-for-KBKDF.patch
|
2022-03-01 14:58:48 +00:00
|
|
|
# Allow SHA1 in seclevel 2 if rh-allow-sha1-signatures = yes
|
|
|
|
Patch52: 0052-Allow-SHA1-in-seclevel-2-if-rh-allow-sha1-signatures.patch
|
2022-03-16 14:03:25 +00:00
|
|
|
# CVE 2022-0778
|
|
|
|
Patch53: 0053-CVE-2022-0778.patch
|
2022-03-22 12:04:16 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2004915, backport of 2c0f7d46b8449423446cfe1e52fc1e1ecd506b62
|
|
|
|
Patch54: 0054-Replace-size-check-with-more-meaningful-pubkey-check.patch
|
2022-04-21 13:16:18 +00:00
|
|
|
# https://github.com/openssl/openssl/pull/17324
|
|
|
|
Patch55: 0055-nonlegacy-fetch-null-deref.patch
|
|
|
|
# https://github.com/openssl/openssl/pull/18103
|
|
|
|
Patch56: 0056-strcasecmp.patch
|
2022-04-28 11:38:34 +00:00
|
|
|
# https://github.com/openssl/openssl/pull/18175
|
|
|
|
Patch57: 0057-strcasecmp-fix.patch
|
2022-05-02 16:33:35 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2053289
|
|
|
|
Patch58: 0058-FIPS-limit-rsa-encrypt.patch
|
2022-04-04 14:32:38 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2069235
|
|
|
|
Patch60: 0060-FIPS-KAT-signature-tests.patch
|
FIPS: Disable SHA1 signs and EVP_PKEY_{sign,verify}
1. Deny SHA-1 signature verification in FIPS provider
For RHEL, we already disable SHA-1 signatures by default in the default
provider, so it is unexpected that the FIPS provider would have a more
lenient configuration in this regard. Additionally, we do not think
continuing to accept SHA-1 signatures is a good idea due to the
published chosen-prefix collision attacks.
As a consequence, disable verification of SHA-1 signatures in the FIPS
provider.
This requires adjusting a few tests that would otherwise fail:
- 30-test_acvp: Remove the test vectors that use SHA-1.
- 30-test_evp: Mark tests in evppkey_rsa_common.txt and
evppkey_ecdsa.txt that use SHA-1 digests as "Availablein = default",
which will not run them when the FIPS provider is enabled.
- 80-test_cms: Re-generate all certificates in test/smime-certificates
using the mksmime-certs.sh script, because most of them were signed
with SHA-1 and thus fail verification in the FIPS provider. Keep
smec3.pem, which was used to sign static test data in
test/recipes/80-test_cms_data/ciphertext_from_1_1_1.cms, which would
otherwise no longer verify. Note that smec3.pem was signed with
a smroot.pem, which was now re-generated. This does not affect the
test.
Fix some other tests by explicitly running them in the default
provider, where SHA-1 is available.
- 80-test_ssl_old: Skip tests that rely on SSLv3 and SHA-1 when run with
the FIPS provider.
2. Disable EVP_PKEY_{sign,verify} in FIPS provider
The APIs to compute both digest and signature in one step,
EVP_DigestSign*/EVP_DigestVerify* and EVP_Sign*/EVP_Verify*, should be
used instead. This ensures that the digest is computed inside of the
FIPS module, and that only approved digests are used.
Update documentation for EVP_PKEY_{sign,verify} to reflect this.
Since the KATs use EVP_PKEY_sign/EVP_PKEY_verify, modify the tests to
set the OSSL_SIGNATURE_PARAM_KAT parameter and use EVP_PKEY_sign_init_ex
and EVP_PKEY_verify_init_ex where these parameters can be passed on
creation and allow EVP_PKEY_sign/EVP_PKEY_verify when this parameter is
set and evaluates as true.
Move tests that use the EVP_PKEY API to only run in the default
provider, since they would fail in the FIPS provider. This also affects
a number of CMS tests where error handling is insufficient and failure
to sign would only show up when verifying the CMS structure due to
a parse error.
Resolves: rhbz#2087147
Signed-off-by: Clemens Lang <cllang@redhat.com>
2022-05-23 12:53:37 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2087147
|
|
|
|
Patch61: 0061-Deny-SHA-1-signature-verification-in-FIPS-provider.patch
|
FIPS: Expose explicit indicator from fips.so
FIPS 140-3 requires us to indicate whether an operation was using
approved services or not. The FIPS 140-3 implementation guidelines
provide two basic approaches to doing this: implicit indicators, and
explicit indicators.
Implicit indicators are basically the concept of "if the operation
passes, it was approved". We were originally aiming for implicit
indicators in our copy of OpenSSL. However, this proved to be a problem,
because we wanted to certify a signature service, and FIPS 140-3
requires that a signature service computes the digest to be signed
within the boundaries of the FIPS module. Since we were planning to
certify fips.so only, this means that EVP_PKEY_sign/EVP_PKEY_verify
would have to be blocked. Unfortunately, EVP_SignFinal uses
EVP_PKEY_sign internally, but outside of fips.so and thus outside of the
FIPS module boundary. This means that using implicit indicators in
combination with certifying only fips.so would require us to block both
EVP_PKEY_sign and EVP_SignFinal, which are the two APIs currently used
by most users of OpenSSL for signatures.
EVP_DigestSign would be acceptable, but has only been added in 3.0 and
is thus not yet widely used.
As a consequence, we've decided to introduce explicit indicators so that
EVP_PKEY_sign and EVP_SignFinal can continue to work for now, but
FIPS-aware applications can query the explicit indicator to check
whether the operation was approved.
To avoid affecting the ABI and public API too much, this is implemented
as an exported symbol in fips.so and a private header, so applications
that wish to use this will have to dlopen(3) fips.so, locate the
function using dlsym(3), and then call it. These applications will have
to build against the private header in order to use the returned
pointer.
Modify util/mkdef.pl to support exposing a symbol only for a specific
provider identified by its name and path.
Signed-off-by: Clemens Lang <cllang@redhat.com>
Resolves: rhbz#2087147
2022-06-08 12:05:50 +00:00
|
|
|
Patch62: 0062-fips-Expose-a-FIPS-indicator.patch
|
2022-05-26 09:57:12 +00:00
|
|
|
# https://github.com/openssl/openssl/pull/18141
|
|
|
|
Patch63: 0063-CVE-2022-1473.patch
|
2022-05-26 10:07:22 +00:00
|
|
|
# upstream commits 55c80c222293a972587004c185dc5653ae207a0e 2eda98790c5c2741d76d23cc1e74b0dc4f4b391a
|
|
|
|
Patch64: 0064-CVE-2022-1343.diff
|
2022-05-26 10:14:19 +00:00
|
|
|
# upstream commit 1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
|
|
|
|
Patch65: 0065-CVE-2022-1292.patch
|
2022-06-03 13:31:56 +00:00
|
|
|
# https://github.com/openssl/openssl/pull/18444
|
|
|
|
# https://github.com/openssl/openssl/pull/18467
|
|
|
|
Patch66: 0066-replace-expired-certs.patch
|
2022-06-22 10:35:27 +00:00
|
|
|
# https://github.com/openssl/openssl/pull/18512
|
|
|
|
Patch67: 0067-fix-ppc64-montgomery.patch
|
2022-06-22 11:49:46 +00:00
|
|
|
#https://github.com/openssl/openssl/commit/2c9c35870601b4a44d86ddbf512b38df38285cfa
|
|
|
|
#https://github.com/openssl/openssl/commit/8a3579a7b7067a983e69a4eda839ac408c120739
|
|
|
|
Patch68: 0068-CVE-2022-2068.patch
|
2022-07-05 12:04:03 +00:00
|
|
|
# https://github.com/openssl/openssl/commit/a98f339ddd7e8f487d6e0088d4a9a42324885a93
|
|
|
|
# https://github.com/openssl/openssl/commit/52d50d52c2f1f4b70d37696bfa74fe5e581e7ba8
|
|
|
|
Patch69: 0069-CVE-2022-2097.patch
|
2022-07-14 12:49:46 +00:00
|
|
|
# https://github.com/openssl/openssl/commit/edceec7fe0c9a5534ae155c8398c63dd7dd95483
|
|
|
|
Patch70: 0070-EVP_PKEY_Q_keygen-Call-OPENSSL_init_crypto-to-init-s.patch
|
2022-07-14 14:54:25 +00:00
|
|
|
# https://github.com/openssl/openssl/commit/44a563dde1584cd9284e80b6e45ee5019be8d36c
|
|
|
|
# https://github.com/openssl/openssl/commit/345c99b6654b8313c792d54f829943068911ddbd
|
|
|
|
Patch71: 0071-AES-GCM-performance-optimization.patch
|
|
|
|
# https://github.com/openssl/openssl/commit/f596bbe4da779b56eea34d96168b557d78e1149
|
|
|
|
# https://github.com/openssl/openssl/commit/7e1f3ffcc5bc15fb9a12b9e3bb202f544c6ed5aa
|
|
|
|
# hunks in crypto/ppccap.c from https://github.com/openssl/openssl/commit/f5485b97b6c9977c0d39c7669b9f97a879312447
|
|
|
|
Patch72: 0072-ChaCha20-performance-optimizations-for-ppc64le.patch
|
2022-07-22 16:01:52 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2102535
|
|
|
|
Patch73: 0073-FIPS-Use-OAEP-in-KATs-support-fixed-OAEP-seed.patch
|
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2102535
|
|
|
|
Patch74: 0074-FIPS-Use-digest_sign-digest_verify-in-self-test.patch
|
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2102535
|
|
|
|
Patch75: 0075-FIPS-Use-FFDHE2048-in-self-test.patch
|
2022-08-02 16:32:36 +00:00
|
|
|
# Downstream only. Reseed DRBG using getrandom(GRND_RANDOM)
|
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2102541
|
|
|
|
Patch76: 0076-FIPS-140-3-DRBG.patch
|
2022-08-11 13:12:42 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2102542
|
|
|
|
Patch77: 0077-FIPS-140-3-zeroization.patch
|
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2114772
|
|
|
|
Patch78: 0078-Add-FIPS-indicator-parameter-to-HKDF.patch
|
2022-11-01 17:23:58 +00:00
|
|
|
#https://bugzilla.redhat.com/show_bug.cgi?id=2137723
|
|
|
|
Patch79: 0079-CVE-2022-3602.patch
|
2022-11-16 14:55:08 +00:00
|
|
|
#https://bugzilla.redhat.com/show_bug.cgi?id=2141748
|
|
|
|
Patch80: 0080-rand-Forbid-truncated-hashes-SHA-3-in-FIPS-prov.patch
|
2022-11-17 13:04:50 +00:00
|
|
|
# https://bugzilla.redhat.com/show_bug.cgi?id=2142131
|
|
|
|
Patch81: 0081-signature-Remove-X9.31-padding-from-FIPS-prov.patch
|
2022-11-15 14:51:36 +00:00
|
|
|
#https://bugzilla.redhat.com/show_bug.cgi?id=2142121
|
|
|
|
Patch85: 0085-FIPS-RSA-disable-shake.patch
|
2022-11-16 11:23:27 +00:00
|
|
|
#https://github.com/openssl/openssl/pull/17546
|
|
|
|
Patch86: 0086-avoid-bio-memleak.patch
|
2022-11-16 12:16:23 +00:00
|
|
|
#https://github.com/openssl/openssl/pull/19501
|
|
|
|
Patch87: 0087-FIPS-RSA-selftest-params.patch
|
2021-04-09 20:24:41 +00:00
|
|
|
|
2021-04-26 17:31:15 +00:00
|
|
|
License: ASL 2.0
|
2020-10-15 20:27:53 +00:00
|
|
|
URL: http://www.openssl.org/
|
2022-01-20 14:49:15 +00:00
|
|
|
BuildRequires: gcc g++
|
2020-10-15 20:27:53 +00:00
|
|
|
BuildRequires: coreutils, perl-interpreter, sed, zlib-devel, /usr/bin/cmp
|
|
|
|
BuildRequires: lksctp-tools-devel
|
|
|
|
BuildRequires: /usr/bin/rename
|
|
|
|
BuildRequires: /usr/bin/pod2man
|
|
|
|
BuildRequires: /usr/sbin/sysctl
|
|
|
|
BuildRequires: perl(Test::Harness), perl(Test::More), perl(Math::BigInt)
|
|
|
|
BuildRequires: perl(Module::Load::Conditional), perl(File::Temp)
|
2021-07-02 15:23:17 +00:00
|
|
|
BuildRequires: perl(Time::HiRes), perl(IPC::Cmd), perl(Pod::Html), perl(Digest::SHA)
|
2021-04-09 20:24:41 +00:00
|
|
|
BuildRequires: perl(FindBin), perl(lib), perl(File::Compare), perl(File::Copy), perl(bigint)
|
|
|
|
BuildRequires: git-core
|
2020-10-15 20:27:53 +00:00
|
|
|
Requires: coreutils
|
|
|
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
|
|
|
|
%description
|
|
|
|
The OpenSSL toolkit provides support for secure communications between
|
|
|
|
machines. OpenSSL includes a certificate management tool and shared
|
|
|
|
libraries which provide various cryptographic algorithms and
|
|
|
|
protocols.
|
|
|
|
|
|
|
|
%package libs
|
|
|
|
Summary: A general purpose cryptography library with TLS implementation
|
|
|
|
Requires: ca-certificates >= 2008-5
|
|
|
|
Requires: crypto-policies >= 20180730
|
|
|
|
Recommends: openssl-pkcs11%{?_isa}
|
|
|
|
|
|
|
|
%description libs
|
|
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-libs
|
|
|
|
package contains the libraries that are used by various applications which
|
|
|
|
support cryptographic algorithms and protocols.
|
|
|
|
|
|
|
|
%package devel
|
|
|
|
Summary: Files for development of applications which will use OpenSSL
|
|
|
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
Requires: pkgconfig
|
|
|
|
|
|
|
|
%description devel
|
|
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-devel
|
|
|
|
package contains include files needed to develop applications which
|
|
|
|
support various cryptographic algorithms and protocols.
|
|
|
|
|
|
|
|
%package perl
|
|
|
|
Summary: Perl scripts provided with OpenSSL
|
|
|
|
Requires: perl-interpreter
|
|
|
|
Requires: %{name}%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
|
|
|
|
%description perl
|
|
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-perl
|
|
|
|
package provides Perl scripts for converting certificates and keys
|
|
|
|
from other formats to the formats used by the OpenSSL toolkit.
|
|
|
|
|
|
|
|
%prep
|
2021-09-09 11:07:02 +00:00
|
|
|
%autosetup -S git -n %{name}-%{version}
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# The hobble_openssl is called here redundantly, just to be sure.
|
|
|
|
# The tarball has already the sources removed.
|
|
|
|
%{SOURCE1} > /dev/null
|
|
|
|
|
|
|
|
cp %{SOURCE12} crypto/ec/
|
|
|
|
cp %{SOURCE13} test/
|
|
|
|
|
|
|
|
%build
|
|
|
|
# Figure out which flags we want to use.
|
|
|
|
# default
|
|
|
|
sslarch=%{_os}-%{_target_cpu}
|
|
|
|
%ifarch %ix86
|
|
|
|
sslarch=linux-elf
|
|
|
|
if ! echo %{_target} | grep -q i686 ; then
|
|
|
|
sslflags="no-asm 386"
|
|
|
|
fi
|
|
|
|
%endif
|
|
|
|
%ifarch x86_64
|
|
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
|
|
%endif
|
|
|
|
%ifarch sparcv9
|
|
|
|
sslarch=linux-sparcv9
|
|
|
|
sslflags=no-asm
|
|
|
|
%endif
|
|
|
|
%ifarch sparc64
|
|
|
|
sslarch=linux64-sparcv9
|
|
|
|
sslflags=no-asm
|
|
|
|
%endif
|
|
|
|
%ifarch alpha alphaev56 alphaev6 alphaev67
|
|
|
|
sslarch=linux-alpha-gcc
|
|
|
|
%endif
|
|
|
|
%ifarch s390 sh3eb sh4eb
|
|
|
|
sslarch="linux-generic32 -DB_ENDIAN"
|
|
|
|
%endif
|
|
|
|
%ifarch s390x
|
|
|
|
sslarch="linux64-s390x"
|
|
|
|
%endif
|
|
|
|
%ifarch %{arm}
|
|
|
|
sslarch=linux-armv4
|
|
|
|
%endif
|
|
|
|
%ifarch aarch64
|
|
|
|
sslarch=linux-aarch64
|
|
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
|
|
%endif
|
|
|
|
%ifarch sh3 sh4
|
|
|
|
sslarch=linux-generic32
|
|
|
|
%endif
|
|
|
|
%ifarch ppc64 ppc64p7
|
|
|
|
sslarch=linux-ppc64
|
|
|
|
%endif
|
|
|
|
%ifarch ppc64le
|
|
|
|
sslarch="linux-ppc64le"
|
|
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
|
|
%endif
|
|
|
|
%ifarch mips mipsel
|
|
|
|
sslarch="linux-mips32 -mips32r2"
|
|
|
|
%endif
|
|
|
|
%ifarch mips64 mips64el
|
|
|
|
sslarch="linux64-mips64 -mips64r2"
|
|
|
|
%endif
|
|
|
|
%ifarch mips64el
|
|
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
|
|
%endif
|
|
|
|
%ifarch riscv64
|
|
|
|
sslarch=linux-generic64
|
|
|
|
%endif
|
|
|
|
|
|
|
|
# Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
|
|
|
|
# marked as not requiring an executable stack.
|
|
|
|
# Also add -DPURIFY to make using valgrind with openssl easier as we do not
|
|
|
|
# want to depend on the uninitialized memory as a source of entropy anyway.
|
|
|
|
RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -Wa,--generate-missing-build-notes=yes -DPURIFY $RPM_LD_FLAGS"
|
|
|
|
|
|
|
|
export HASHBANGPERL=/usr/bin/perl
|
|
|
|
|
2022-05-05 15:05:35 +00:00
|
|
|
%define fips %{version}-%{srpmhash}
|
2020-10-15 20:27:53 +00:00
|
|
|
# ia64, x86_64, ppc are OK by default
|
|
|
|
# Configure the build tree. Override OpenSSL defaults with known-good defaults
|
|
|
|
# usable on all platforms. The Configure script already knows to use -fPIC and
|
|
|
|
# RPM_OPT_FLAGS, so we can skip specifiying them here.
|
|
|
|
./Configure \
|
|
|
|
--prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
|
|
|
|
--system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config \
|
|
|
|
zlib enable-camellia enable-seed enable-rfc3779 enable-sctp \
|
2021-05-27 13:53:25 +00:00
|
|
|
enable-cms enable-md2 enable-rc5 enable-ktls enable-fips\
|
2022-01-20 14:49:15 +00:00
|
|
|
no-mdc2 no-ec2m no-sm2 no-sm4 enable-buildtest-c++\
|
2022-02-01 14:53:47 +00:00
|
|
|
shared ${sslarch} $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\"" -DREDHAT_FIPS_VERSION="\"%{fips}\""'
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Do not run this in a production package the FIPS symbols must be patched-in
|
|
|
|
#util/mkdef.pl crypto update
|
|
|
|
|
2022-01-21 09:51:59 +00:00
|
|
|
make %{?_smp_mflags} all
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Clean up the .pc files
|
|
|
|
for i in libcrypto.pc libssl.pc openssl.pc ; do
|
|
|
|
sed -i '/^Libs.private:/{s/-L[^ ]* //;s/-Wl[^ ]* //}' $i
|
|
|
|
done
|
|
|
|
|
|
|
|
%check
|
|
|
|
# Verify that what was compiled actually works.
|
|
|
|
|
|
|
|
# Hack - either enable SCTP AUTH chunks in kernel or disable sctp for check
|
|
|
|
(sysctl net.sctp.addip_enable=1 && sysctl net.sctp.auth_enable=1) || \
|
|
|
|
(echo 'Failed to enable SCTP AUTH chunks, disabling SCTP for tests...' &&
|
2021-04-09 20:24:41 +00:00
|
|
|
sed '/"msan" => "default",/a\ \ "sctp" => "default",' configdata.pm > configdata.pm.new && \
|
2020-10-15 20:27:53 +00:00
|
|
|
touch -r configdata.pm configdata.pm.new && \
|
|
|
|
mv -f configdata.pm.new configdata.pm)
|
|
|
|
|
2021-04-09 20:24:41 +00:00
|
|
|
# We must revert patch4 before tests otherwise they will fail
|
|
|
|
patch -p1 -R < %{PATCH4}
|
2021-11-23 13:45:25 +00:00
|
|
|
#We must disable default provider before tests otherwise they will fail
|
|
|
|
patch -p1 < %{SOURCE14}
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
OPENSSL_ENABLE_MD5_VERIFY=
|
|
|
|
export OPENSSL_ENABLE_MD5_VERIFY
|
2022-02-22 11:21:06 +00:00
|
|
|
OPENSSL_ENABLE_SHA1_SIGNATURES=
|
|
|
|
export OPENSSL_ENABLE_SHA1_SIGNATURES
|
2020-10-15 20:27:53 +00:00
|
|
|
OPENSSL_SYSTEM_CIPHERS_OVERRIDE=xyz_nonexistent_file
|
|
|
|
export OPENSSL_SYSTEM_CIPHERS_OVERRIDE
|
2021-11-22 10:20:40 +00:00
|
|
|
#embed HMAC into fips provider for test run
|
|
|
|
LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < providers/fips.so > providers/fips.so.hmac
|
|
|
|
objcopy --update-section .rodata1=providers/fips.so.hmac providers/fips.so providers/fips.so.mac
|
|
|
|
mv providers/fips.so.mac providers/fips.so
|
|
|
|
#run tests itself
|
2021-06-11 11:10:06 +00:00
|
|
|
make test HARNESS_JOBS=8
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Add generation of HMAC checksum of the final stripped library
|
2021-11-22 10:20:40 +00:00
|
|
|
# We manually copy standard definition of __spec_install_post
|
|
|
|
# and add hmac calculation/embedding to fips.so
|
|
|
|
%define __spec_install_post \
|
|
|
|
%{?__debug_package:%{__debug_install_post}} \
|
|
|
|
%{__arch_install_post} \
|
|
|
|
%{__os_install_post} \
|
|
|
|
LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so > $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
|
|
|
|
objcopy --update-section .rodata1=$RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac \
|
|
|
|
mv $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so \
|
|
|
|
rm $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
|
|
|
|
%{nil}
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
%define __provides_exclude_from %{_libdir}/openssl
|
|
|
|
|
|
|
|
%install
|
|
|
|
[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
|
|
|
|
# Install OpenSSL.
|
|
|
|
install -d $RPM_BUILD_ROOT{%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl,%{_pkgdocdir}}
|
|
|
|
%make_install
|
|
|
|
rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT%{_libdir}/*.so.%{soversion}
|
|
|
|
for lib in $RPM_BUILD_ROOT%{_libdir}/*.so.%{version} ; do
|
|
|
|
chmod 755 ${lib}
|
|
|
|
ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`
|
|
|
|
ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`.%{soversion}
|
|
|
|
done
|
|
|
|
|
2021-04-09 20:24:41 +00:00
|
|
|
# Remove static libraries
|
|
|
|
for lib in $RPM_BUILD_ROOT%{_libdir}/*.a ; do
|
|
|
|
rm -f ${lib}
|
|
|
|
done
|
|
|
|
|
2020-10-15 20:27:53 +00:00
|
|
|
# Install a makefile for generating keys and self-signed certs, and a script
|
|
|
|
# for generating them on the fly.
|
|
|
|
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
|
|
|
|
install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_pkgdocdir}/Makefile.certificate
|
|
|
|
install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/make-dummy-cert
|
|
|
|
install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_bindir}/renew-dummy-cert
|
|
|
|
|
|
|
|
# Move runable perl scripts to bindir
|
|
|
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/*.pl $RPM_BUILD_ROOT%{_bindir}
|
|
|
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/tsget $RPM_BUILD_ROOT%{_bindir}
|
|
|
|
|
|
|
|
# Rename man pages so that they don't conflict with other system man pages.
|
|
|
|
pushd $RPM_BUILD_ROOT%{_mandir}
|
2021-04-26 17:31:15 +00:00
|
|
|
mv man5/config.5ossl man5/openssl.cnf.5
|
2020-10-15 20:27:53 +00:00
|
|
|
popd
|
|
|
|
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
|
|
|
|
mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
|
|
|
|
|
|
|
|
# Ensure the config file timestamps are identical across builds to avoid
|
|
|
|
# mulitlib conflicts and unnecessary renames on upgrade
|
|
|
|
touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
|
|
|
|
touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf
|
|
|
|
|
|
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf.dist
|
|
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf.dist
|
2022-01-13 12:35:22 +00:00
|
|
|
#we don't use native fipsmodule.cnf because FIPS module is loaded automatically
|
2021-07-06 20:35:53 +00:00
|
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/fipsmodule.cnf
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Determine which arch opensslconf.h is going to try to #include.
|
|
|
|
basearch=%{_arch}
|
|
|
|
%ifarch %{ix86}
|
|
|
|
basearch=i386
|
|
|
|
%endif
|
|
|
|
%ifarch sparcv9
|
|
|
|
basearch=sparc
|
|
|
|
%endif
|
|
|
|
%ifarch sparc64
|
|
|
|
basearch=sparc64
|
|
|
|
%endif
|
|
|
|
|
|
|
|
# Next step of gradual disablement of SSL3.
|
|
|
|
# Make SSL3 disappear to newly built dependencies.
|
|
|
|
sed -i '/^\#ifndef OPENSSL_NO_SSL_TRACE/i\
|
|
|
|
#ifndef OPENSSL_NO_SSL3\
|
|
|
|
# define OPENSSL_NO_SSL3\
|
|
|
|
#endif' $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
|
|
|
|
|
|
|
|
%ifarch %{multilib_arches}
|
2021-04-09 20:24:41 +00:00
|
|
|
# Do an configuration.h switcheroo to avoid file conflicts on systems where you
|
2020-10-15 20:27:53 +00:00
|
|
|
# can have both a 32- and 64-bit version of the library, and they each need
|
|
|
|
# their own correct-but-different versions of opensslconf.h to be usable.
|
|
|
|
install -m644 %{SOURCE10} \
|
2021-04-09 20:24:41 +00:00
|
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
|
|
|
|
cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h >> \
|
|
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
|
2020-10-15 20:27:53 +00:00
|
|
|
install -m644 %{SOURCE9} \
|
2021-04-09 20:24:41 +00:00
|
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h
|
2020-10-15 20:27:53 +00:00
|
|
|
%endif
|
|
|
|
|
|
|
|
%files
|
|
|
|
%{!?_licensedir:%global license %%doc}
|
2021-04-09 20:24:41 +00:00
|
|
|
%license LICENSE.txt
|
|
|
|
%doc NEWS.md README.md
|
2020-10-15 20:27:53 +00:00
|
|
|
%{_bindir}/make-dummy-cert
|
|
|
|
%{_bindir}/renew-dummy-cert
|
|
|
|
%{_bindir}/openssl
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_mandir}/man1/*
|
|
|
|
%{_mandir}/man5/*
|
|
|
|
%{_mandir}/man7/*
|
2020-10-15 20:27:53 +00:00
|
|
|
%{_pkgdocdir}/Makefile.certificate
|
2021-04-09 20:24:41 +00:00
|
|
|
%exclude %{_mandir}/man1/*.pl*
|
|
|
|
%exclude %{_mandir}/man1/tsget*
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
%files libs
|
|
|
|
%{!?_licensedir:%global license %%doc}
|
2021-04-09 20:24:41 +00:00
|
|
|
%license LICENSE.txt
|
2020-10-15 20:27:53 +00:00
|
|
|
%dir %{_sysconfdir}/pki/tls
|
|
|
|
%dir %{_sysconfdir}/pki/tls/certs
|
|
|
|
%dir %{_sysconfdir}/pki/tls/misc
|
|
|
|
%dir %{_sysconfdir}/pki/tls/private
|
|
|
|
%config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
|
|
|
|
%config(noreplace) %{_sysconfdir}/pki/tls/ct_log_list.cnf
|
|
|
|
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{version}
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_libdir}/libcrypto.so.%{soversion}
|
2020-10-15 20:27:53 +00:00
|
|
|
%attr(0755,root,root) %{_libdir}/libssl.so.%{version}
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_libdir}/libssl.so.%{soversion}
|
2020-10-15 20:27:53 +00:00
|
|
|
%attr(0755,root,root) %{_libdir}/engines-%{soversion}
|
2021-04-09 20:24:41 +00:00
|
|
|
%attr(0755,root,root) %{_libdir}/ossl-modules
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
%files devel
|
2021-04-09 20:24:41 +00:00
|
|
|
%doc CHANGES.md doc/dir-locals.example.el doc/openssl-c-indent.el
|
2020-10-15 20:27:53 +00:00
|
|
|
%{_prefix}/include/openssl
|
|
|
|
%{_libdir}/*.so
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_mandir}/man3/*
|
2020-10-15 20:27:53 +00:00
|
|
|
%{_libdir}/pkgconfig/*.pc
|
|
|
|
|
|
|
|
%files perl
|
|
|
|
%{_bindir}/c_rehash
|
|
|
|
%{_bindir}/*.pl
|
|
|
|
%{_bindir}/tsget
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_mandir}/man1/*.pl*
|
|
|
|
%{_mandir}/man1/tsget*
|
2020-10-15 20:27:53 +00:00
|
|
|
%dir %{_sysconfdir}/pki/CA
|
|
|
|
%dir %{_sysconfdir}/pki/CA/private
|
|
|
|
%dir %{_sysconfdir}/pki/CA/certs
|
|
|
|
%dir %{_sysconfdir}/pki/CA/crl
|
|
|
|
%dir %{_sysconfdir}/pki/CA/newcerts
|
|
|
|
|
|
|
|
%ldconfig_scriptlets libs
|
|
|
|
|
|
|
|
%changelog
|
2022-11-15 14:51:36 +00:00
|
|
|
* Mon Nov 14 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-44
|
|
|
|
- SHAKE-128/256 are not allowed with RSA in FIPS mode
|
|
|
|
Resolves: rhbz#2144010
|
2022-11-16 11:23:27 +00:00
|
|
|
- Avoid memory leaks in TLS
|
|
|
|
Resolves: rhbz#2144008
|
2022-11-16 12:16:23 +00:00
|
|
|
- FIPS RSA CRT tests must use correct parameters
|
|
|
|
Resolves: rhbz#2144006
|
2022-11-16 14:55:08 +00:00
|
|
|
- FIPS-140-3 permits only SHA1, SHA256, and SHA512 for DRBG-HASH/DRBG-HMAC
|
|
|
|
Resolves: rhbz#2144017
|
2022-11-17 13:04:50 +00:00
|
|
|
- Remove support for X9.31 signature padding in FIPS mode
|
|
|
|
Resolves: rhbz#2144015
|
2022-11-15 14:51:36 +00:00
|
|
|
|
2022-11-01 17:23:58 +00:00
|
|
|
* Tue Nov 01 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-43
|
|
|
|
- CVE-2022-3602: X.509 Email Address Buffer Overflow
|
|
|
|
- CVE-2022-3786: X.509 Email Address Buffer Overflow
|
|
|
|
Resolves: CVE-2022-3602
|
|
|
|
|
|
|
|
* Wed Oct 26 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-42
|
|
|
|
- CVE-2022-3602: X.509 Email Address Buffer Overflow
|
|
|
|
Resolves: CVE-2022-3602 (rhbz#2137723)
|
|
|
|
|
2022-08-11 13:12:42 +00:00
|
|
|
* Thu Aug 11 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-41
|
|
|
|
- Zeroize public keys as required by FIPS 140-3
|
|
|
|
Related: rhbz#2102542
|
|
|
|
- Add FIPS indicator for HKDF
|
|
|
|
Related: rhbz#2114772
|
|
|
|
|
2022-07-20 13:20:48 +00:00
|
|
|
* Fri Aug 05 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-40
|
|
|
|
- Deal with DH keys in FIPS mode according FIPS-140-3 requirements
|
|
|
|
Related: rhbz#2102536
|
2022-07-25 12:41:43 +00:00
|
|
|
- Deal with ECDH keys in FIPS mode according FIPS-140-3 requirements
|
|
|
|
Related: rhbz#2102537
|
2022-07-25 15:57:38 +00:00
|
|
|
- Use signature for RSA pairwise test according FIPS-140-3 requirements
|
|
|
|
Related: rhbz#2102540
|
2022-08-02 16:32:36 +00:00
|
|
|
- Reseed all the parent DRBGs in chain on reseeding a DRBG
|
|
|
|
Related: rhbz#2102541
|
2022-07-20 13:20:48 +00:00
|
|
|
|
2022-07-22 16:01:52 +00:00
|
|
|
* Mon Aug 01 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-39
|
|
|
|
- Use RSA-OAEP in FIPS RSA encryption/decryption FIPS self-test
|
|
|
|
- Use Use digest_sign & digest_verify in FIPS signature self test
|
|
|
|
- Use FFDHE2048 in Diffie-Hellman FIPS self-test
|
|
|
|
Resolves: rhbz#2102535
|
|
|
|
|
2022-07-14 12:49:46 +00:00
|
|
|
* Thu Jul 14 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-38
|
|
|
|
- Fix segfault in EVP_PKEY_Q_keygen() when OpenSSL was not previously
|
|
|
|
initialized.
|
|
|
|
Resolves: rhbz#2103289
|
2022-07-14 14:54:25 +00:00
|
|
|
- Improve AES-GCM performance on Power9 and Power10 ppc64le
|
|
|
|
Resolves: rhbz#2051312
|
|
|
|
- Improve ChaCha20 performance on Power10 ppc64le
|
|
|
|
Resolves: rhbz#2051312
|
2022-07-14 12:49:46 +00:00
|
|
|
|
2022-07-05 12:04:03 +00:00
|
|
|
* Tue Jul 05 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-37
|
|
|
|
- CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86
|
|
|
|
Resolves: CVE-2022-2097
|
|
|
|
|
2022-06-16 13:06:45 +00:00
|
|
|
* Thu Jun 16 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-36
|
|
|
|
- Ciphersuites with RSAPSK KX should be filterd in FIPS mode
|
|
|
|
- Related: rhbz#2085088
|
2022-06-16 13:11:40 +00:00
|
|
|
- FIPS provider should block RSA encryption for key transport.
|
|
|
|
- Other RSA encryption options should still be available if key length is enough
|
|
|
|
- Related: rhbz#2053289
|
2022-06-17 08:30:01 +00:00
|
|
|
- Improve diagnostics when passing unsupported groups in TLS
|
|
|
|
- Related: rhbz#2070197
|
2022-06-22 10:35:27 +00:00
|
|
|
- Fix PPC64 Montgomery multiplication bug
|
|
|
|
- Related: rhbz#2098199
|
2022-06-22 10:52:57 +00:00
|
|
|
- Strict certificates validation shouldn't allow explicit EC parameters
|
|
|
|
- Related: rhbz#2058663
|
2022-06-22 11:49:46 +00:00
|
|
|
- CVE-2022-2068: the c_rehash script allows command injection
|
|
|
|
- Related: rhbz#2098277
|
2022-06-16 13:06:45 +00:00
|
|
|
|
FIPS: Expose explicit indicator from fips.so
FIPS 140-3 requires us to indicate whether an operation was using
approved services or not. The FIPS 140-3 implementation guidelines
provide two basic approaches to doing this: implicit indicators, and
explicit indicators.
Implicit indicators are basically the concept of "if the operation
passes, it was approved". We were originally aiming for implicit
indicators in our copy of OpenSSL. However, this proved to be a problem,
because we wanted to certify a signature service, and FIPS 140-3
requires that a signature service computes the digest to be signed
within the boundaries of the FIPS module. Since we were planning to
certify fips.so only, this means that EVP_PKEY_sign/EVP_PKEY_verify
would have to be blocked. Unfortunately, EVP_SignFinal uses
EVP_PKEY_sign internally, but outside of fips.so and thus outside of the
FIPS module boundary. This means that using implicit indicators in
combination with certifying only fips.so would require us to block both
EVP_PKEY_sign and EVP_SignFinal, which are the two APIs currently used
by most users of OpenSSL for signatures.
EVP_DigestSign would be acceptable, but has only been added in 3.0 and
is thus not yet widely used.
As a consequence, we've decided to introduce explicit indicators so that
EVP_PKEY_sign and EVP_SignFinal can continue to work for now, but
FIPS-aware applications can query the explicit indicator to check
whether the operation was approved.
To avoid affecting the ABI and public API too much, this is implemented
as an exported symbol in fips.so and a private header, so applications
that wish to use this will have to dlopen(3) fips.so, locate the
function using dlsym(3), and then call it. These applications will have
to build against the private header in order to use the returned
pointer.
Modify util/mkdef.pl to support exposing a symbol only for a specific
provider identified by its name and path.
Signed-off-by: Clemens Lang <cllang@redhat.com>
Resolves: rhbz#2087147
2022-06-08 12:05:50 +00:00
|
|
|
* Wed Jun 08 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-35
|
|
|
|
- Add explicit indicators for signatures in FIPS mode and mark signature
|
|
|
|
primitives as unapproved.
|
|
|
|
Resolves: rhbz#2087147
|
|
|
|
|
2022-06-03 13:31:56 +00:00
|
|
|
* Fri Jun 03 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-34
|
|
|
|
- Some OpenSSL test certificates are expired, updating
|
|
|
|
- Resolves: rhbz#2092456
|
|
|
|
|
2022-05-26 09:57:12 +00:00
|
|
|
* Thu May 26 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-33
|
|
|
|
- CVE-2022-1473 openssl: OPENSSL_LH_flush() breaks reuse of memory
|
|
|
|
- Resolves: rhbz#2089444
|
2022-05-26 10:07:22 +00:00
|
|
|
- CVE-2022-1343 openssl: Signer certificate verification returned
|
|
|
|
inaccurate response when using OCSP_NOCHECKS
|
|
|
|
- Resolves: rhbz#2087911
|
2022-05-26 10:14:19 +00:00
|
|
|
- CVE-2022-1292 openssl: c_rehash script allows command injection
|
|
|
|
- Resolves: rhbz#2090362
|
2022-05-25 16:17:35 +00:00
|
|
|
- Revert "Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode"
|
|
|
|
Related: rhbz#2087147
|
2022-05-30 16:00:10 +00:00
|
|
|
- Use KAT for ECDSA signature tests, s390 arch
|
|
|
|
- Resolves: rhbz#2069235
|
2022-05-26 09:57:12 +00:00
|
|
|
|
2022-05-19 10:20:50 +00:00
|
|
|
* Thu May 19 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-32
|
|
|
|
- `openssl ecparam -list_curves` lists only FIPS-approved curves in FIPS mode
|
|
|
|
- Resolves: rhbz#2083240
|
2022-05-19 12:29:23 +00:00
|
|
|
- Ciphersuites with RSA KX should be filterd in FIPS mode
|
|
|
|
- Related: rhbz#2085088
|
2022-05-23 13:25:42 +00:00
|
|
|
- In FIPS mode, signature verification works with keys of arbitrary size
|
|
|
|
above 2048 bit, and only with 1024, 1280, 1536, 1792 bits for keys
|
|
|
|
below 2048 bits
|
|
|
|
- Resolves: rhbz#2077884
|
2022-05-19 10:20:50 +00:00
|
|
|
|
FIPS: Disable SHA1 signs and EVP_PKEY_{sign,verify}
1. Deny SHA-1 signature verification in FIPS provider
For RHEL, we already disable SHA-1 signatures by default in the default
provider, so it is unexpected that the FIPS provider would have a more
lenient configuration in this regard. Additionally, we do not think
continuing to accept SHA-1 signatures is a good idea due to the
published chosen-prefix collision attacks.
As a consequence, disable verification of SHA-1 signatures in the FIPS
provider.
This requires adjusting a few tests that would otherwise fail:
- 30-test_acvp: Remove the test vectors that use SHA-1.
- 30-test_evp: Mark tests in evppkey_rsa_common.txt and
evppkey_ecdsa.txt that use SHA-1 digests as "Availablein = default",
which will not run them when the FIPS provider is enabled.
- 80-test_cms: Re-generate all certificates in test/smime-certificates
using the mksmime-certs.sh script, because most of them were signed
with SHA-1 and thus fail verification in the FIPS provider. Keep
smec3.pem, which was used to sign static test data in
test/recipes/80-test_cms_data/ciphertext_from_1_1_1.cms, which would
otherwise no longer verify. Note that smec3.pem was signed with
a smroot.pem, which was now re-generated. This does not affect the
test.
Fix some other tests by explicitly running them in the default
provider, where SHA-1 is available.
- 80-test_ssl_old: Skip tests that rely on SSLv3 and SHA-1 when run with
the FIPS provider.
2. Disable EVP_PKEY_{sign,verify} in FIPS provider
The APIs to compute both digest and signature in one step,
EVP_DigestSign*/EVP_DigestVerify* and EVP_Sign*/EVP_Verify*, should be
used instead. This ensures that the digest is computed inside of the
FIPS module, and that only approved digests are used.
Update documentation for EVP_PKEY_{sign,verify} to reflect this.
Since the KATs use EVP_PKEY_sign/EVP_PKEY_verify, modify the tests to
set the OSSL_SIGNATURE_PARAM_KAT parameter and use EVP_PKEY_sign_init_ex
and EVP_PKEY_verify_init_ex where these parameters can be passed on
creation and allow EVP_PKEY_sign/EVP_PKEY_verify when this parameter is
set and evaluates as true.
Move tests that use the EVP_PKEY API to only run in the default
provider, since they would fail in the FIPS provider. This also affects
a number of CMS tests where error handling is insufficient and failure
to sign would only show up when verifying the CMS structure due to
a parse error.
Resolves: rhbz#2087147
Signed-off-by: Clemens Lang <cllang@redhat.com>
2022-05-23 12:53:37 +00:00
|
|
|
* Wed May 18 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-31
|
|
|
|
- Disable SHA-1 signature verification in FIPS mode
|
|
|
|
- Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode
|
|
|
|
Resolves: rhbz#2087147
|
|
|
|
|
2022-04-04 14:32:38 +00:00
|
|
|
* Mon May 16 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-30
|
|
|
|
- Use KAT for ECDSA signature tests
|
|
|
|
- Resolves: rhbz#2069235
|
|
|
|
|
2022-05-12 11:24:59 +00:00
|
|
|
* Thu May 12 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-29
|
|
|
|
- `-config` argument of openssl app should work properly in FIPS mode
|
|
|
|
- Resolves: rhbz#2083274
|
2022-05-12 11:45:42 +00:00
|
|
|
- openssl req defaults on PKCS#8 encryption changed to AES-256-CBC
|
|
|
|
- Resolves: rhbz#2063947
|
2022-05-12 11:24:59 +00:00
|
|
|
|
2022-04-01 10:53:17 +00:00
|
|
|
* Fri May 06 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-28
|
|
|
|
- OpenSSL should not accept custom elliptic curve parameters
|
|
|
|
- Resolves rhbz#2066412
|
|
|
|
- OpenSSL should not accept explicit curve parameters in FIPS mode
|
|
|
|
- Resolves rhbz#2058663
|
|
|
|
|
2022-05-05 15:05:35 +00:00
|
|
|
* Fri May 06 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-27
|
|
|
|
- Change FIPS module version to include hash of specfile, patches and sources
|
|
|
|
Resolves: rhbz#2070550
|
|
|
|
|
2022-05-05 15:34:49 +00:00
|
|
|
* Thu May 05 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-26
|
|
|
|
- OpenSSL FIPS module should not build in non-approved algorithms
|
|
|
|
- Resolves: rhbz#2081378
|
|
|
|
|
2022-05-02 16:33:35 +00:00
|
|
|
* Mon May 02 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-25
|
|
|
|
- FIPS provider should block RSA encryption for key transport.
|
|
|
|
- Other RSA encryption options should still be available
|
|
|
|
- Resolves: rhbz#2053289
|
|
|
|
|
2022-04-28 11:38:34 +00:00
|
|
|
* Thu Apr 28 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-24
|
|
|
|
- Fix regression in evp_pkey_name2type caused by tr_TR locale fix
|
|
|
|
Resolves: rhbz#2071631
|
|
|
|
|
2022-04-21 13:16:18 +00:00
|
|
|
* Wed Apr 20 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-23
|
|
|
|
- Fix openssl curl error with LANG=tr_TR.utf8
|
|
|
|
- Resolves: rhbz#2071631
|
|
|
|
|
2022-03-28 15:38:25 +00:00
|
|
|
* Mon Mar 28 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-22
|
|
|
|
- FIPS provider should block RSA encryption for key transport
|
|
|
|
- Resolves: rhbz#2053289
|
|
|
|
|
2022-03-22 12:04:16 +00:00
|
|
|
* Tue Mar 22 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-21
|
|
|
|
- Fix occasional internal error in TLS when DHE is used
|
|
|
|
- Resolves: rhbz#2004915
|
|
|
|
|
2022-03-18 12:35:57 +00:00
|
|
|
* Fri Mar 18 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-20
|
|
|
|
- Fix acceptance of SHA-1 certificates with rh-allow-sha1-signatures = yes when
|
|
|
|
no OpenSSL library context is set
|
|
|
|
- Resolves: rhbz#2065400
|
|
|
|
|
2022-03-17 12:36:33 +00:00
|
|
|
* Fri Mar 18 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-19
|
|
|
|
- Fix TLS connections with SHA1 signatures if rh-allow-sha1-signatures = yes
|
|
|
|
- Resolves: rhbz#2065400
|
|
|
|
|
2022-03-16 14:03:25 +00:00
|
|
|
* Wed Mar 16 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-18
|
|
|
|
- CVE-2022-0778 fix
|
|
|
|
- Resolves: rhbz#2062315
|
|
|
|
|
2022-03-10 11:47:01 +00:00
|
|
|
* Thu Mar 10 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-17
|
|
|
|
- Fix invocation of EVP_PKEY_CTX_set_rsa_padding(RSA_PKCS1_PSS_PADDING) before
|
|
|
|
setting an allowed digest with EVP_PKEY_CTX_set_signature_md()
|
|
|
|
- Skipping 3.0.1-16 due to version numbering confusion with the RHEL-9.0 branch
|
|
|
|
- Resolves: rhbz#2062640
|
|
|
|
|
2022-03-01 14:58:48 +00:00
|
|
|
* Tue Mar 01 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-15
|
|
|
|
- Allow SHA1 in SECLEVEL 2 if rh-allow-sha1-signatures = yes
|
|
|
|
- Resolves: rhbz#2060510
|
|
|
|
|
2022-02-25 13:36:41 +00:00
|
|
|
* Fri Feb 25 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-14
|
|
|
|
- Prevent use of SHA1 with ECDSA
|
|
|
|
- Resolves: rhbz#2031742
|
|
|
|
|
2022-02-25 11:37:01 +00:00
|
|
|
* Fri Feb 25 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-13
|
|
|
|
- OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
|
|
|
|
- Resolves: rhbz#1977867
|
|
|
|
|
2022-02-24 10:07:39 +00:00
|
|
|
* Thu Feb 24 2022 Peter Robinson <pbrobinson@fedoraproject.org> - 1:3.0.1-12
|
|
|
|
- Support KBKDF (NIST SP800-108) with an R value of 8bits
|
|
|
|
- Resolves: rhbz#2027261
|
|
|
|
|
2022-02-23 15:56:08 +00:00
|
|
|
* Wed Feb 23 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-11
|
|
|
|
- Allow SHA1 usage in MGF1 for RSASSA-PSS signatures
|
|
|
|
- Resolves: rhbz#2031742
|
|
|
|
|
2022-02-23 10:47:25 +00:00
|
|
|
* Wed Feb 23 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-10
|
|
|
|
- rebuilt
|
|
|
|
|
|
|
|
* Tue Feb 22 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-9
|
2022-02-22 18:34:36 +00:00
|
|
|
- Allow SHA1 usage in HMAC in TLS
|
|
|
|
- Resolves: rhbz#2031742
|
|
|
|
|
2022-02-22 14:20:01 +00:00
|
|
|
* Tue Feb 22 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-8
|
|
|
|
- OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
|
|
|
|
- Resolves: rhbz#1977867
|
|
|
|
- pkcs12 export broken in FIPS mode
|
|
|
|
- Resolves: rhbz#2049265
|
|
|
|
|
2022-02-22 11:21:06 +00:00
|
|
|
* Tue Feb 22 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-8
|
|
|
|
- Disable SHA1 signature creation and verification by default
|
|
|
|
- Set rh-allow-sha1-signatures = yes to re-enable
|
|
|
|
- Resolves: rhbz#2031742
|
|
|
|
|
2022-02-03 14:36:38 +00:00
|
|
|
* Thu Feb 03 2022 Sahana Prasad <sahana@redhat.com> - 1:3.0.1-7
|
|
|
|
- s_server: correctly handle 2^14 byte long records
|
|
|
|
- Resolves: rhbz#2042011
|
|
|
|
|
2022-02-01 14:53:47 +00:00
|
|
|
* Tue Feb 01 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-6
|
|
|
|
- Adjust FIPS provider version
|
|
|
|
- Related: rhbz#2026445
|
|
|
|
|
2022-01-26 15:50:19 +00:00
|
|
|
* Wed Jan 26 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-5
|
|
|
|
- On the s390x, zeroize all the copies of TLS premaster secret
|
|
|
|
- Related: rhbz#2040448
|
|
|
|
|
2022-01-21 13:40:57 +00:00
|
|
|
* Fri Jan 21 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-4
|
|
|
|
- rebuilt
|
|
|
|
|
2022-01-19 12:40:57 +00:00
|
|
|
* Fri Jan 21 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-3
|
|
|
|
- KATS tests should be executed before HMAC verification
|
|
|
|
- Restoring fips=yes for SHA1
|
|
|
|
- Related: rhbz#2026445, rhbz#2041994
|
|
|
|
|
2022-01-20 14:49:15 +00:00
|
|
|
* Thu Jan 20 2022 Sahana Prasad <sahana@redhat.com> - 1:3.0.1-2
|
|
|
|
- Add enable-buildtest-c++ to the configure options.
|
|
|
|
- Related: rhbz#1990814
|
|
|
|
|
2022-01-18 17:30:10 +00:00
|
|
|
* Tue Jan 18 2022 Sahana Prasad <sahana@redhat.com> - 1:3.0.1-1
|
|
|
|
- Rebase to upstream version 3.0.1
|
|
|
|
- Fixes CVE-2021-4044 Invalid handling of X509_verify_cert() internal errors in libssl
|
|
|
|
- Resolves: rhbz#2038910, rhbz#2035148
|
|
|
|
|
2022-01-13 12:35:22 +00:00
|
|
|
* Mon Jan 17 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-7
|
|
|
|
- Remove algorithms we don't plan to certify from fips module
|
|
|
|
- Remove native fipsmodule.cnf
|
|
|
|
- Related: rhbz#2026445
|
|
|
|
|
2021-12-21 15:16:07 +00:00
|
|
|
* Tue Dec 21 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-6
|
|
|
|
- openssl speed should run in FIPS mode
|
|
|
|
- Related: rhbz#1977318
|
|
|
|
|
2021-11-24 12:44:25 +00:00
|
|
|
* Wed Nov 24 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-5
|
|
|
|
- rebuilt for spec cleanup
|
|
|
|
- Related: rhbz#1985362
|
|
|
|
|
2021-11-22 10:20:40 +00:00
|
|
|
* Thu Nov 18 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-4
|
|
|
|
- Embed FIPS HMAC in fips.so
|
|
|
|
- Enforce loading FIPS provider when FIPS kernel flag is on
|
2021-11-24 12:44:25 +00:00
|
|
|
- Related: rhbz#1985362
|
2021-11-22 10:20:40 +00:00
|
|
|
|
2021-10-07 16:13:47 +00:00
|
|
|
* Thu Oct 07 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-3
|
|
|
|
- Fix memory leak in s_client
|
|
|
|
- Related: rhbz#1996092
|
|
|
|
|
2021-09-20 15:13:26 +00:00
|
|
|
* Mon Sep 20 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-2
|
|
|
|
- Avoid double-free on error seeding the RNG.
|
2021-09-22 10:09:15 +00:00
|
|
|
- KTLS and FIPS may interfere, so tests need to be tuned
|
|
|
|
- Resolves: rhbz#1952844, rhbz#1961643
|
2021-09-20 15:13:26 +00:00
|
|
|
|
2021-09-09 11:07:02 +00:00
|
|
|
* Thu Sep 09 2021 Sahana Prasad <sahana@redhat.com> - 1:3.0.0-1
|
|
|
|
- Rebase to upstream version 3.0.0
|
|
|
|
- Related: rhbz#1990814
|
|
|
|
|
2021-08-25 15:02:52 +00:00
|
|
|
* Wed Aug 25 2021 Sahana Prasad <sahana@redhat.com> - 1:3.0.0-0.beta2.7
|
|
|
|
- Removes the dual-abi build as it not required anymore. The mass rebuild
|
|
|
|
was completed and all packages are rebuilt against Beta version.
|
|
|
|
- Resolves: rhbz#1984097
|
|
|
|
|
2021-08-23 08:45:49 +00:00
|
|
|
* Mon Aug 23 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-0.beta2.6
|
|
|
|
- Correctly process CMS reading from /dev/stdin
|
|
|
|
- Resolves: rhbz#1986315
|
|
|
|
|
2021-08-16 10:49:09 +00:00
|
|
|
* Mon Aug 16 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.5
|
|
|
|
- Add instruction for loading legacy provider in openssl.cnf
|
|
|
|
- Resolves: rhbz#1975836
|
|
|
|
|
2021-08-16 09:44:00 +00:00
|
|
|
* Mon Aug 16 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.4
|
|
|
|
- Adds support for IDEA encryption.
|
|
|
|
- Resolves: rhbz#1990602
|
|
|
|
|
2021-08-10 14:52:53 +00:00
|
|
|
* Tue Aug 10 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.3
|
|
|
|
- Fixes core dump in openssl req -modulus
|
|
|
|
- Fixes 'openssl req' to not ask for password when non-encrypted private key
|
|
|
|
is used
|
|
|
|
- cms: Do not try to check binary format on stdin and -rctform fix
|
|
|
|
- Resolves: rhbz#1988137, rhbz#1988468, rhbz#1988137
|
|
|
|
|
2021-08-09 22:44:21 +00:00
|
|
|
* Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 1:3.0.0-0.beta2.2.1
|
|
|
|
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
|
|
|
|
Related: rhbz#1991688
|
|
|
|
|
2021-08-04 13:55:01 +00:00
|
|
|
* Wed Aug 04 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 3.0.0-0.beta2.2
|
|
|
|
- When signature_algorithm extension is omitted, use more relevant alerts
|
|
|
|
- Resolves: rhbz#1965017
|
|
|
|
|
2021-08-03 13:03:00 +00:00
|
|
|
* Tue Aug 03 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta2.1
|
|
|
|
- Rebase to upstream version beta2
|
|
|
|
- Related: rhbz#1903209
|
|
|
|
|
2021-07-22 13:38:17 +00:00
|
|
|
* Thu Jul 22 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.5
|
|
|
|
- Prevents creation of duplicate cert entries in PKCS #12 files
|
|
|
|
- Resolves: rhbz#1978670
|
|
|
|
|
2021-07-21 12:37:35 +00:00
|
|
|
* Wed Jul 21 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.4
|
|
|
|
- NVR bump to update to OpenSSL 3.0 Beta1
|
|
|
|
|
2021-07-19 11:59:36 +00:00
|
|
|
* Mon Jul 19 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.3
|
|
|
|
- Update patch dual-abi.patch to add the #define macros in implementation
|
|
|
|
files instead of public header files
|
|
|
|
|
2021-07-14 12:20:07 +00:00
|
|
|
* Wed Jul 14 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.2
|
|
|
|
- Removes unused patch dual-abi.patch
|
|
|
|
|
2021-07-02 15:23:17 +00:00
|
|
|
* Wed Jul 14 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.1
|
|
|
|
- Update to Beta1 version
|
|
|
|
- Includes a patch to support dual-ABI, as Beta1 brekas ABI with alpha16
|
|
|
|
|
2021-07-06 11:56:08 +00:00
|
|
|
* Tue Jul 06 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.7
|
|
|
|
- Fixes override of openssl_conf in openssl.cnf
|
2021-07-06 20:35:53 +00:00
|
|
|
- Use AI_ADDRCONFIG only when explicit host name is given
|
|
|
|
- Temporarily remove fipsmodule.cnf for arch i686
|
|
|
|
- Fixes segmentation fault in BN_lebin2bn
|
|
|
|
- Resolves: rhbz#1975847, rhbz#1976845, rhbz#1973477, rhbz#1975855
|
2021-07-06 11:56:08 +00:00
|
|
|
|
2021-07-02 19:05:44 +00:00
|
|
|
* Fri Jul 02 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.6
|
|
|
|
- Adds FIPS mode compatibility patch (sahana@redhat.com)
|
|
|
|
- Related: rhbz#1977318
|
|
|
|
|
2021-07-02 18:15:32 +00:00
|
|
|
* Fri Jul 02 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.5
|
|
|
|
- Fixes system hang issue when booted in FIPS mode (sahana@redhat.com)
|
|
|
|
- Temporarily disable downstream FIPS patches
|
|
|
|
- Related: rhbz#1977318
|
|
|
|
|
2021-06-11 20:55:52 +00:00
|
|
|
* Fri Jun 11 2021 Mohan Boddu <mboddu@redhat.com> 3.0.0-0.alpha16.4
|
|
|
|
- Speeding up building openssl (dbelyavs@redhat.com)
|
|
|
|
Resolves: rhbz#1903209
|
|
|
|
|
2021-06-04 08:37:32 +00:00
|
|
|
* Fri Jun 04 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.3
|
|
|
|
- Fix reading SPKAC data from stdin
|
|
|
|
- Fix incorrect OSSL_PKEY_PARAM_MAX_SIZE for ed25519 and ed448
|
|
|
|
- Return 0 after cleanup in OPENSSL_init_crypto()
|
|
|
|
- Cleanup the peer point formats on regotiation
|
|
|
|
- Fix default digest to SHA256
|
|
|
|
|
2021-05-27 13:53:25 +00:00
|
|
|
* Thu May 27 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.2
|
|
|
|
- Enable FIPS via config options
|
|
|
|
|
2021-05-17 09:30:32 +00:00
|
|
|
* Mon May 17 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.1
|
|
|
|
- Update to alpha 16 version
|
|
|
|
Resolves: rhbz#1952901 openssl sends alert after orderly connection close
|
|
|
|
|
2021-04-26 17:31:15 +00:00
|
|
|
* Mon Apr 26 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha15.1
|
|
|
|
- Update to alpha 15 version
|
|
|
|
Resolves: rhbz#1903209, rhbz#1952598,
|
|
|
|
|
2021-04-16 02:42:42 +00:00
|
|
|
* Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 1:3.0.0-0.alpha13.1.1
|
|
|
|
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
|
|
|
|
|
2021-04-09 20:24:41 +00:00
|
|
|
* Fri Apr 09 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha13.1
|
|
|
|
- Update to new major release OpenSSL 3.0.0 alpha 13
|
|
|
|
Resolves: rhbz#1903209
|