2020-10-15 20:27:53 +00:00
|
|
|
# For the curious:
|
|
|
|
# 0.9.8jk + EAP-FAST soversion = 8
|
|
|
|
# 1.0.0 soversion = 10
|
|
|
|
# 1.1.0 soversion = 1.1 (same as upstream although presence of some symbols
|
|
|
|
# depends on build configuration options)
|
2021-04-09 20:24:41 +00:00
|
|
|
# 3.0.0 soversion = 3 (same as upstream)
|
|
|
|
%define soversion 3
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Arches on which we need to prevent arch conflicts on opensslconf.h, must
|
|
|
|
# also be handled in opensslconf-new.h.
|
|
|
|
%define multilib_arches %{ix86} ia64 %{mips} ppc ppc64 s390 s390x sparcv9 sparc64 x86_64
|
|
|
|
|
|
|
|
%global _performance_build 1
|
|
|
|
|
|
|
|
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
|
|
|
Name: openssl
|
2022-01-18 17:30:10 +00:00
|
|
|
Version: 3.0.1
|
2022-01-19 12:40:57 +00:00
|
|
|
Release: 3%{?dist}
|
2020-10-15 20:27:53 +00:00
|
|
|
Epoch: 1
|
|
|
|
# We have to remove certain patented algorithms from the openssl source
|
|
|
|
# tarball with the hobble-openssl script which is included below.
|
|
|
|
# The original openssl upstream tarball cannot be shipped in the .src.rpm.
|
|
|
|
Source: openssl-%{version}-hobbled.tar.xz
|
|
|
|
Source1: hobble-openssl
|
|
|
|
Source2: Makefile.certificate
|
2021-04-09 20:24:41 +00:00
|
|
|
Source3: genpatches
|
2020-10-15 20:27:53 +00:00
|
|
|
Source6: make-dummy-cert
|
|
|
|
Source7: renew-dummy-cert
|
2021-04-09 20:24:41 +00:00
|
|
|
Source9: configuration-switch.h
|
|
|
|
Source10: configuration-prefix.h
|
2020-10-15 20:27:53 +00:00
|
|
|
Source12: ec_curve.c
|
|
|
|
Source13: ectest.c
|
2021-11-23 13:45:25 +00:00
|
|
|
Source14: 0025-for-tests.patch
|
2021-02-11 17:09:01 +00:00
|
|
|
|
2021-04-09 20:24:41 +00:00
|
|
|
# Patches exported from source git
|
|
|
|
# Aarch64 and ppc64le use lib64
|
|
|
|
Patch1: 0001-Aarch64-and-ppc64le-use-lib64.patch
|
|
|
|
# Use more general default values in openssl.cnf
|
|
|
|
Patch2: 0002-Use-more-general-default-values-in-openssl.cnf.patch
|
|
|
|
# Do not install html docs
|
|
|
|
Patch3: 0003-Do-not-install-html-docs.patch
|
|
|
|
# Override default paths for the CA directory tree
|
|
|
|
Patch4: 0004-Override-default-paths-for-the-CA-directory-tree.patch
|
|
|
|
# apps/ca: fix md option help text
|
|
|
|
Patch5: 0005-apps-ca-fix-md-option-help-text.patch
|
|
|
|
# Disable signature verification with totally unsafe hash algorithms
|
|
|
|
Patch6: 0006-Disable-signature-verification-with-totally-unsafe-h.patch
|
|
|
|
# Add support for PROFILE=SYSTEM system default cipherlist
|
|
|
|
Patch7: 0007-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
|
|
|
|
# Add FIPS_mode() compatibility macro
|
2021-07-02 19:05:44 +00:00
|
|
|
Patch8: 0008-Add-FIPS_mode-compatibility-macro.patch
|
2021-04-09 20:24:41 +00:00
|
|
|
# Add check to see if fips flag is enabled in kernel
|
2021-11-22 10:20:40 +00:00
|
|
|
Patch9: 0009-Add-Kernel-FIPS-mode-flag-support.patch
|
2021-04-09 20:24:41 +00:00
|
|
|
# remove unsupported EC curves
|
|
|
|
Patch11: 0011-Remove-EC-curves.patch
|
2021-08-16 10:49:09 +00:00
|
|
|
# Instructions to load legacy provider in openssl.cnf
|
|
|
|
Patch24: 0024-load-legacy-prov.patch
|
2021-09-22 10:09:15 +00:00
|
|
|
# Tmp: test name change
|
|
|
|
Patch31: 0031-tmp-Fix-test-names.patch
|
2021-11-22 10:20:40 +00:00
|
|
|
# We load FIPS provider and set FIPS properties implicitly
|
|
|
|
Patch32: 0032-Force-fips.patch
|
|
|
|
# Embed HMAC into the fips.so
|
|
|
|
Patch33: 0033-FIPS-embed-hmac.patch
|
2021-11-22 13:08:48 +00:00
|
|
|
# Comment out fipsinstall command-line utility
|
|
|
|
Patch34: 0034.fipsinstall_disable.patch
|
2021-12-21 15:16:07 +00:00
|
|
|
# Skip unavailable algorithms running `openssl speed`
|
|
|
|
Patch35: 0035-speed-skip-unavailable-dgst.patch
|
2022-01-13 12:35:22 +00:00
|
|
|
# Minimize fips services
|
|
|
|
Patch45: 0045-FIPS-services-minimize.patch
|
2022-01-19 12:40:57 +00:00
|
|
|
# Execute KATS before HMAC verification
|
|
|
|
Patch47: 0047-FIPS-early-KATS.patch
|
2021-04-09 20:24:41 +00:00
|
|
|
|
2021-04-26 17:31:15 +00:00
|
|
|
License: ASL 2.0
|
2020-10-15 20:27:53 +00:00
|
|
|
URL: http://www.openssl.org/
|
2022-01-20 14:49:15 +00:00
|
|
|
BuildRequires: gcc g++
|
2020-10-15 20:27:53 +00:00
|
|
|
BuildRequires: coreutils, perl-interpreter, sed, zlib-devel, /usr/bin/cmp
|
|
|
|
BuildRequires: lksctp-tools-devel
|
|
|
|
BuildRequires: /usr/bin/rename
|
|
|
|
BuildRequires: /usr/bin/pod2man
|
|
|
|
BuildRequires: /usr/sbin/sysctl
|
|
|
|
BuildRequires: perl(Test::Harness), perl(Test::More), perl(Math::BigInt)
|
|
|
|
BuildRequires: perl(Module::Load::Conditional), perl(File::Temp)
|
2021-07-02 15:23:17 +00:00
|
|
|
BuildRequires: perl(Time::HiRes), perl(IPC::Cmd), perl(Pod::Html), perl(Digest::SHA)
|
2021-04-09 20:24:41 +00:00
|
|
|
BuildRequires: perl(FindBin), perl(lib), perl(File::Compare), perl(File::Copy), perl(bigint)
|
|
|
|
BuildRequires: git-core
|
2020-10-15 20:27:53 +00:00
|
|
|
Requires: coreutils
|
|
|
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
|
|
|
|
%description
|
|
|
|
The OpenSSL toolkit provides support for secure communications between
|
|
|
|
machines. OpenSSL includes a certificate management tool and shared
|
|
|
|
libraries which provide various cryptographic algorithms and
|
|
|
|
protocols.
|
|
|
|
|
|
|
|
%package libs
|
|
|
|
Summary: A general purpose cryptography library with TLS implementation
|
|
|
|
Requires: ca-certificates >= 2008-5
|
|
|
|
Requires: crypto-policies >= 20180730
|
|
|
|
Recommends: openssl-pkcs11%{?_isa}
|
|
|
|
|
|
|
|
%description libs
|
|
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-libs
|
|
|
|
package contains the libraries that are used by various applications which
|
|
|
|
support cryptographic algorithms and protocols.
|
|
|
|
|
|
|
|
%package devel
|
|
|
|
Summary: Files for development of applications which will use OpenSSL
|
|
|
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
Requires: pkgconfig
|
|
|
|
|
|
|
|
%description devel
|
|
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-devel
|
|
|
|
package contains include files needed to develop applications which
|
|
|
|
support various cryptographic algorithms and protocols.
|
|
|
|
|
|
|
|
%package perl
|
|
|
|
Summary: Perl scripts provided with OpenSSL
|
|
|
|
Requires: perl-interpreter
|
|
|
|
Requires: %{name}%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
|
|
|
|
%description perl
|
|
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-perl
|
|
|
|
package provides Perl scripts for converting certificates and keys
|
|
|
|
from other formats to the formats used by the OpenSSL toolkit.
|
|
|
|
|
|
|
|
%prep
|
2021-09-09 11:07:02 +00:00
|
|
|
%autosetup -S git -n %{name}-%{version}
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# The hobble_openssl is called here redundantly, just to be sure.
|
|
|
|
# The tarball has already the sources removed.
|
|
|
|
%{SOURCE1} > /dev/null
|
|
|
|
|
|
|
|
cp %{SOURCE12} crypto/ec/
|
|
|
|
cp %{SOURCE13} test/
|
|
|
|
|
|
|
|
%build
|
|
|
|
# Figure out which flags we want to use.
|
|
|
|
# default
|
|
|
|
sslarch=%{_os}-%{_target_cpu}
|
|
|
|
%ifarch %ix86
|
|
|
|
sslarch=linux-elf
|
|
|
|
if ! echo %{_target} | grep -q i686 ; then
|
|
|
|
sslflags="no-asm 386"
|
|
|
|
fi
|
|
|
|
%endif
|
|
|
|
%ifarch x86_64
|
|
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
|
|
%endif
|
|
|
|
%ifarch sparcv9
|
|
|
|
sslarch=linux-sparcv9
|
|
|
|
sslflags=no-asm
|
|
|
|
%endif
|
|
|
|
%ifarch sparc64
|
|
|
|
sslarch=linux64-sparcv9
|
|
|
|
sslflags=no-asm
|
|
|
|
%endif
|
|
|
|
%ifarch alpha alphaev56 alphaev6 alphaev67
|
|
|
|
sslarch=linux-alpha-gcc
|
|
|
|
%endif
|
|
|
|
%ifarch s390 sh3eb sh4eb
|
|
|
|
sslarch="linux-generic32 -DB_ENDIAN"
|
|
|
|
%endif
|
|
|
|
%ifarch s390x
|
|
|
|
sslarch="linux64-s390x"
|
|
|
|
%endif
|
|
|
|
%ifarch %{arm}
|
|
|
|
sslarch=linux-armv4
|
|
|
|
%endif
|
|
|
|
%ifarch aarch64
|
|
|
|
sslarch=linux-aarch64
|
|
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
|
|
%endif
|
|
|
|
%ifarch sh3 sh4
|
|
|
|
sslarch=linux-generic32
|
|
|
|
%endif
|
|
|
|
%ifarch ppc64 ppc64p7
|
|
|
|
sslarch=linux-ppc64
|
|
|
|
%endif
|
|
|
|
%ifarch ppc64le
|
|
|
|
sslarch="linux-ppc64le"
|
|
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
|
|
%endif
|
|
|
|
%ifarch mips mipsel
|
|
|
|
sslarch="linux-mips32 -mips32r2"
|
|
|
|
%endif
|
|
|
|
%ifarch mips64 mips64el
|
|
|
|
sslarch="linux64-mips64 -mips64r2"
|
|
|
|
%endif
|
|
|
|
%ifarch mips64el
|
|
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
|
|
%endif
|
|
|
|
%ifarch riscv64
|
|
|
|
sslarch=linux-generic64
|
|
|
|
%endif
|
|
|
|
|
|
|
|
# Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
|
|
|
|
# marked as not requiring an executable stack.
|
|
|
|
# Also add -DPURIFY to make using valgrind with openssl easier as we do not
|
|
|
|
# want to depend on the uninitialized memory as a source of entropy anyway.
|
|
|
|
RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -Wa,--generate-missing-build-notes=yes -DPURIFY $RPM_LD_FLAGS"
|
|
|
|
|
|
|
|
export HASHBANGPERL=/usr/bin/perl
|
|
|
|
|
|
|
|
# ia64, x86_64, ppc are OK by default
|
|
|
|
# Configure the build tree. Override OpenSSL defaults with known-good defaults
|
|
|
|
# usable on all platforms. The Configure script already knows to use -fPIC and
|
|
|
|
# RPM_OPT_FLAGS, so we can skip specifiying them here.
|
|
|
|
./Configure \
|
|
|
|
--prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
|
|
|
|
--system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config \
|
|
|
|
zlib enable-camellia enable-seed enable-rfc3779 enable-sctp \
|
2021-05-27 13:53:25 +00:00
|
|
|
enable-cms enable-md2 enable-rc5 enable-ktls enable-fips\
|
2022-01-20 14:49:15 +00:00
|
|
|
no-mdc2 no-ec2m no-sm2 no-sm4 enable-buildtest-c++\
|
2020-10-15 20:27:53 +00:00
|
|
|
shared ${sslarch} $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\""'
|
|
|
|
|
|
|
|
# Do not run this in a production package the FIPS symbols must be patched-in
|
|
|
|
#util/mkdef.pl crypto update
|
|
|
|
|
2022-01-21 09:51:59 +00:00
|
|
|
make %{?_smp_mflags} all
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Clean up the .pc files
|
|
|
|
for i in libcrypto.pc libssl.pc openssl.pc ; do
|
|
|
|
sed -i '/^Libs.private:/{s/-L[^ ]* //;s/-Wl[^ ]* //}' $i
|
|
|
|
done
|
|
|
|
|
|
|
|
%check
|
|
|
|
# Verify that what was compiled actually works.
|
|
|
|
|
|
|
|
# Hack - either enable SCTP AUTH chunks in kernel or disable sctp for check
|
|
|
|
(sysctl net.sctp.addip_enable=1 && sysctl net.sctp.auth_enable=1) || \
|
|
|
|
(echo 'Failed to enable SCTP AUTH chunks, disabling SCTP for tests...' &&
|
2021-04-09 20:24:41 +00:00
|
|
|
sed '/"msan" => "default",/a\ \ "sctp" => "default",' configdata.pm > configdata.pm.new && \
|
2020-10-15 20:27:53 +00:00
|
|
|
touch -r configdata.pm configdata.pm.new && \
|
|
|
|
mv -f configdata.pm.new configdata.pm)
|
|
|
|
|
2021-04-09 20:24:41 +00:00
|
|
|
# We must revert patch4 before tests otherwise they will fail
|
|
|
|
patch -p1 -R < %{PATCH4}
|
2021-11-23 13:45:25 +00:00
|
|
|
#We must disable default provider before tests otherwise they will fail
|
|
|
|
patch -p1 < %{SOURCE14}
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
OPENSSL_ENABLE_MD5_VERIFY=
|
|
|
|
export OPENSSL_ENABLE_MD5_VERIFY
|
|
|
|
OPENSSL_SYSTEM_CIPHERS_OVERRIDE=xyz_nonexistent_file
|
|
|
|
export OPENSSL_SYSTEM_CIPHERS_OVERRIDE
|
2021-11-22 10:20:40 +00:00
|
|
|
#embed HMAC into fips provider for test run
|
|
|
|
LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < providers/fips.so > providers/fips.so.hmac
|
|
|
|
objcopy --update-section .rodata1=providers/fips.so.hmac providers/fips.so providers/fips.so.mac
|
|
|
|
mv providers/fips.so.mac providers/fips.so
|
|
|
|
#run tests itself
|
2021-06-11 11:10:06 +00:00
|
|
|
make test HARNESS_JOBS=8
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Add generation of HMAC checksum of the final stripped library
|
2021-11-22 10:20:40 +00:00
|
|
|
# We manually copy standard definition of __spec_install_post
|
|
|
|
# and add hmac calculation/embedding to fips.so
|
|
|
|
%define __spec_install_post \
|
|
|
|
%{?__debug_package:%{__debug_install_post}} \
|
|
|
|
%{__arch_install_post} \
|
|
|
|
%{__os_install_post} \
|
|
|
|
LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so > $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
|
|
|
|
objcopy --update-section .rodata1=$RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac \
|
|
|
|
mv $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so \
|
|
|
|
rm $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
|
|
|
|
%{nil}
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
%define __provides_exclude_from %{_libdir}/openssl
|
|
|
|
|
|
|
|
%install
|
|
|
|
[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
|
|
|
|
# Install OpenSSL.
|
|
|
|
install -d $RPM_BUILD_ROOT{%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl,%{_pkgdocdir}}
|
|
|
|
%make_install
|
|
|
|
rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT%{_libdir}/*.so.%{soversion}
|
|
|
|
for lib in $RPM_BUILD_ROOT%{_libdir}/*.so.%{version} ; do
|
|
|
|
chmod 755 ${lib}
|
|
|
|
ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`
|
|
|
|
ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`.%{soversion}
|
|
|
|
done
|
|
|
|
|
2021-04-09 20:24:41 +00:00
|
|
|
# Remove static libraries
|
|
|
|
for lib in $RPM_BUILD_ROOT%{_libdir}/*.a ; do
|
|
|
|
rm -f ${lib}
|
|
|
|
done
|
|
|
|
|
2020-10-15 20:27:53 +00:00
|
|
|
# Install a makefile for generating keys and self-signed certs, and a script
|
|
|
|
# for generating them on the fly.
|
|
|
|
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
|
|
|
|
install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_pkgdocdir}/Makefile.certificate
|
|
|
|
install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/make-dummy-cert
|
|
|
|
install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_bindir}/renew-dummy-cert
|
|
|
|
|
|
|
|
# Move runable perl scripts to bindir
|
|
|
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/*.pl $RPM_BUILD_ROOT%{_bindir}
|
|
|
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/tsget $RPM_BUILD_ROOT%{_bindir}
|
|
|
|
|
|
|
|
# Rename man pages so that they don't conflict with other system man pages.
|
|
|
|
pushd $RPM_BUILD_ROOT%{_mandir}
|
2021-04-26 17:31:15 +00:00
|
|
|
mv man5/config.5ossl man5/openssl.cnf.5
|
2020-10-15 20:27:53 +00:00
|
|
|
popd
|
|
|
|
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
|
|
|
|
mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
|
|
|
|
|
|
|
|
# Ensure the config file timestamps are identical across builds to avoid
|
|
|
|
# mulitlib conflicts and unnecessary renames on upgrade
|
|
|
|
touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
|
|
|
|
touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf
|
|
|
|
|
|
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf.dist
|
|
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf.dist
|
2022-01-13 12:35:22 +00:00
|
|
|
#we don't use native fipsmodule.cnf because FIPS module is loaded automatically
|
2021-07-06 20:35:53 +00:00
|
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/fipsmodule.cnf
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
# Determine which arch opensslconf.h is going to try to #include.
|
|
|
|
basearch=%{_arch}
|
|
|
|
%ifarch %{ix86}
|
|
|
|
basearch=i386
|
|
|
|
%endif
|
|
|
|
%ifarch sparcv9
|
|
|
|
basearch=sparc
|
|
|
|
%endif
|
|
|
|
%ifarch sparc64
|
|
|
|
basearch=sparc64
|
|
|
|
%endif
|
|
|
|
|
|
|
|
# Next step of gradual disablement of SSL3.
|
|
|
|
# Make SSL3 disappear to newly built dependencies.
|
|
|
|
sed -i '/^\#ifndef OPENSSL_NO_SSL_TRACE/i\
|
|
|
|
#ifndef OPENSSL_NO_SSL3\
|
|
|
|
# define OPENSSL_NO_SSL3\
|
|
|
|
#endif' $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
|
|
|
|
|
|
|
|
%ifarch %{multilib_arches}
|
2021-04-09 20:24:41 +00:00
|
|
|
# Do an configuration.h switcheroo to avoid file conflicts on systems where you
|
2020-10-15 20:27:53 +00:00
|
|
|
# can have both a 32- and 64-bit version of the library, and they each need
|
|
|
|
# their own correct-but-different versions of opensslconf.h to be usable.
|
|
|
|
install -m644 %{SOURCE10} \
|
2021-04-09 20:24:41 +00:00
|
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
|
|
|
|
cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h >> \
|
|
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
|
2020-10-15 20:27:53 +00:00
|
|
|
install -m644 %{SOURCE9} \
|
2021-04-09 20:24:41 +00:00
|
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h
|
2020-10-15 20:27:53 +00:00
|
|
|
%endif
|
|
|
|
|
|
|
|
%files
|
|
|
|
%{!?_licensedir:%global license %%doc}
|
2021-04-09 20:24:41 +00:00
|
|
|
%license LICENSE.txt
|
|
|
|
%doc NEWS.md README.md
|
2020-10-15 20:27:53 +00:00
|
|
|
%{_bindir}/make-dummy-cert
|
|
|
|
%{_bindir}/renew-dummy-cert
|
|
|
|
%{_bindir}/openssl
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_mandir}/man1/*
|
|
|
|
%{_mandir}/man5/*
|
|
|
|
%{_mandir}/man7/*
|
2020-10-15 20:27:53 +00:00
|
|
|
%{_pkgdocdir}/Makefile.certificate
|
2021-04-09 20:24:41 +00:00
|
|
|
%exclude %{_mandir}/man1/*.pl*
|
|
|
|
%exclude %{_mandir}/man1/tsget*
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
%files libs
|
|
|
|
%{!?_licensedir:%global license %%doc}
|
2021-04-09 20:24:41 +00:00
|
|
|
%license LICENSE.txt
|
2020-10-15 20:27:53 +00:00
|
|
|
%dir %{_sysconfdir}/pki/tls
|
|
|
|
%dir %{_sysconfdir}/pki/tls/certs
|
|
|
|
%dir %{_sysconfdir}/pki/tls/misc
|
|
|
|
%dir %{_sysconfdir}/pki/tls/private
|
|
|
|
%config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
|
|
|
|
%config(noreplace) %{_sysconfdir}/pki/tls/ct_log_list.cnf
|
|
|
|
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{version}
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_libdir}/libcrypto.so.%{soversion}
|
2020-10-15 20:27:53 +00:00
|
|
|
%attr(0755,root,root) %{_libdir}/libssl.so.%{version}
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_libdir}/libssl.so.%{soversion}
|
2020-10-15 20:27:53 +00:00
|
|
|
%attr(0755,root,root) %{_libdir}/engines-%{soversion}
|
2021-04-09 20:24:41 +00:00
|
|
|
%attr(0755,root,root) %{_libdir}/ossl-modules
|
2020-10-15 20:27:53 +00:00
|
|
|
|
|
|
|
%files devel
|
2021-04-09 20:24:41 +00:00
|
|
|
%doc CHANGES.md doc/dir-locals.example.el doc/openssl-c-indent.el
|
2020-10-15 20:27:53 +00:00
|
|
|
%{_prefix}/include/openssl
|
|
|
|
%{_libdir}/*.so
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_mandir}/man3/*
|
2020-10-15 20:27:53 +00:00
|
|
|
%{_libdir}/pkgconfig/*.pc
|
|
|
|
|
|
|
|
%files perl
|
|
|
|
%{_bindir}/c_rehash
|
|
|
|
%{_bindir}/*.pl
|
|
|
|
%{_bindir}/tsget
|
2021-04-09 20:24:41 +00:00
|
|
|
%{_mandir}/man1/*.pl*
|
|
|
|
%{_mandir}/man1/tsget*
|
2020-10-15 20:27:53 +00:00
|
|
|
%dir %{_sysconfdir}/pki/CA
|
|
|
|
%dir %{_sysconfdir}/pki/CA/private
|
|
|
|
%dir %{_sysconfdir}/pki/CA/certs
|
|
|
|
%dir %{_sysconfdir}/pki/CA/crl
|
|
|
|
%dir %{_sysconfdir}/pki/CA/newcerts
|
|
|
|
|
|
|
|
%ldconfig_scriptlets libs
|
|
|
|
|
|
|
|
%changelog
|
2022-01-19 12:40:57 +00:00
|
|
|
* Fri Jan 21 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-3
|
|
|
|
- KATS tests should be executed before HMAC verification
|
|
|
|
- Restoring fips=yes for SHA1
|
|
|
|
- Related: rhbz#2026445, rhbz#2041994
|
|
|
|
|
2022-01-20 14:49:15 +00:00
|
|
|
* Thu Jan 20 2022 Sahana Prasad <sahana@redhat.com> - 1:3.0.1-2
|
|
|
|
- Add enable-buildtest-c++ to the configure options.
|
|
|
|
- Related: rhbz#1990814
|
|
|
|
|
2022-01-18 17:30:10 +00:00
|
|
|
* Tue Jan 18 2022 Sahana Prasad <sahana@redhat.com> - 1:3.0.1-1
|
|
|
|
- Rebase to upstream version 3.0.1
|
|
|
|
- Fixes CVE-2021-4044 Invalid handling of X509_verify_cert() internal errors in libssl
|
|
|
|
- Resolves: rhbz#2038910, rhbz#2035148
|
|
|
|
|
2022-01-13 12:35:22 +00:00
|
|
|
* Mon Jan 17 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-7
|
|
|
|
- Remove algorithms we don't plan to certify from fips module
|
|
|
|
- Remove native fipsmodule.cnf
|
|
|
|
- Related: rhbz#2026445
|
|
|
|
|
2021-12-21 15:16:07 +00:00
|
|
|
* Tue Dec 21 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-6
|
|
|
|
- openssl speed should run in FIPS mode
|
|
|
|
- Related: rhbz#1977318
|
|
|
|
|
2021-11-24 12:44:25 +00:00
|
|
|
* Wed Nov 24 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-5
|
|
|
|
- rebuilt for spec cleanup
|
|
|
|
- Related: rhbz#1985362
|
|
|
|
|
2021-11-22 10:20:40 +00:00
|
|
|
* Thu Nov 18 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-4
|
|
|
|
- Embed FIPS HMAC in fips.so
|
|
|
|
- Enforce loading FIPS provider when FIPS kernel flag is on
|
2021-11-24 12:44:25 +00:00
|
|
|
- Related: rhbz#1985362
|
2021-11-22 10:20:40 +00:00
|
|
|
|
2021-10-07 16:13:47 +00:00
|
|
|
* Thu Oct 07 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-3
|
|
|
|
- Fix memory leak in s_client
|
|
|
|
- Related: rhbz#1996092
|
|
|
|
|
2021-09-20 15:13:26 +00:00
|
|
|
* Mon Sep 20 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-2
|
|
|
|
- Avoid double-free on error seeding the RNG.
|
2021-09-22 10:09:15 +00:00
|
|
|
- KTLS and FIPS may interfere, so tests need to be tuned
|
|
|
|
- Resolves: rhbz#1952844, rhbz#1961643
|
2021-09-20 15:13:26 +00:00
|
|
|
|
2021-09-09 11:07:02 +00:00
|
|
|
* Thu Sep 09 2021 Sahana Prasad <sahana@redhat.com> - 1:3.0.0-1
|
|
|
|
- Rebase to upstream version 3.0.0
|
|
|
|
- Related: rhbz#1990814
|
|
|
|
|
2021-08-25 15:02:52 +00:00
|
|
|
* Wed Aug 25 2021 Sahana Prasad <sahana@redhat.com> - 1:3.0.0-0.beta2.7
|
|
|
|
- Removes the dual-abi build as it not required anymore. The mass rebuild
|
|
|
|
was completed and all packages are rebuilt against Beta version.
|
|
|
|
- Resolves: rhbz#1984097
|
|
|
|
|
2021-08-23 08:45:49 +00:00
|
|
|
* Mon Aug 23 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-0.beta2.6
|
|
|
|
- Correctly process CMS reading from /dev/stdin
|
|
|
|
- Resolves: rhbz#1986315
|
|
|
|
|
2021-08-16 10:49:09 +00:00
|
|
|
* Mon Aug 16 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.5
|
|
|
|
- Add instruction for loading legacy provider in openssl.cnf
|
|
|
|
- Resolves: rhbz#1975836
|
|
|
|
|
2021-08-16 09:44:00 +00:00
|
|
|
* Mon Aug 16 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.4
|
|
|
|
- Adds support for IDEA encryption.
|
|
|
|
- Resolves: rhbz#1990602
|
|
|
|
|
2021-08-10 14:52:53 +00:00
|
|
|
* Tue Aug 10 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.3
|
|
|
|
- Fixes core dump in openssl req -modulus
|
|
|
|
- Fixes 'openssl req' to not ask for password when non-encrypted private key
|
|
|
|
is used
|
|
|
|
- cms: Do not try to check binary format on stdin and -rctform fix
|
|
|
|
- Resolves: rhbz#1988137, rhbz#1988468, rhbz#1988137
|
|
|
|
|
2021-08-09 22:44:21 +00:00
|
|
|
* Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 1:3.0.0-0.beta2.2.1
|
|
|
|
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
|
|
|
|
Related: rhbz#1991688
|
|
|
|
|
2021-08-04 13:55:01 +00:00
|
|
|
* Wed Aug 04 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 3.0.0-0.beta2.2
|
|
|
|
- When signature_algorithm extension is omitted, use more relevant alerts
|
|
|
|
- Resolves: rhbz#1965017
|
|
|
|
|
2021-08-03 13:03:00 +00:00
|
|
|
* Tue Aug 03 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta2.1
|
|
|
|
- Rebase to upstream version beta2
|
|
|
|
- Related: rhbz#1903209
|
|
|
|
|
2021-07-22 13:38:17 +00:00
|
|
|
* Thu Jul 22 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.5
|
|
|
|
- Prevents creation of duplicate cert entries in PKCS #12 files
|
|
|
|
- Resolves: rhbz#1978670
|
|
|
|
|
2021-07-21 12:37:35 +00:00
|
|
|
* Wed Jul 21 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.4
|
|
|
|
- NVR bump to update to OpenSSL 3.0 Beta1
|
|
|
|
|
2021-07-19 11:59:36 +00:00
|
|
|
* Mon Jul 19 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.3
|
|
|
|
- Update patch dual-abi.patch to add the #define macros in implementation
|
|
|
|
files instead of public header files
|
|
|
|
|
2021-07-14 12:20:07 +00:00
|
|
|
* Wed Jul 14 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.2
|
|
|
|
- Removes unused patch dual-abi.patch
|
|
|
|
|
2021-07-02 15:23:17 +00:00
|
|
|
* Wed Jul 14 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.1
|
|
|
|
- Update to Beta1 version
|
|
|
|
- Includes a patch to support dual-ABI, as Beta1 brekas ABI with alpha16
|
|
|
|
|
2021-07-06 11:56:08 +00:00
|
|
|
* Tue Jul 06 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.7
|
|
|
|
- Fixes override of openssl_conf in openssl.cnf
|
2021-07-06 20:35:53 +00:00
|
|
|
- Use AI_ADDRCONFIG only when explicit host name is given
|
|
|
|
- Temporarily remove fipsmodule.cnf for arch i686
|
|
|
|
- Fixes segmentation fault in BN_lebin2bn
|
|
|
|
- Resolves: rhbz#1975847, rhbz#1976845, rhbz#1973477, rhbz#1975855
|
2021-07-06 11:56:08 +00:00
|
|
|
|
2021-07-02 19:05:44 +00:00
|
|
|
* Fri Jul 02 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.6
|
|
|
|
- Adds FIPS mode compatibility patch (sahana@redhat.com)
|
|
|
|
- Related: rhbz#1977318
|
|
|
|
|
2021-07-02 18:15:32 +00:00
|
|
|
* Fri Jul 02 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.5
|
|
|
|
- Fixes system hang issue when booted in FIPS mode (sahana@redhat.com)
|
|
|
|
- Temporarily disable downstream FIPS patches
|
|
|
|
- Related: rhbz#1977318
|
|
|
|
|
2021-06-11 20:55:52 +00:00
|
|
|
* Fri Jun 11 2021 Mohan Boddu <mboddu@redhat.com> 3.0.0-0.alpha16.4
|
|
|
|
- Speeding up building openssl (dbelyavs@redhat.com)
|
|
|
|
Resolves: rhbz#1903209
|
|
|
|
|
2021-06-04 08:37:32 +00:00
|
|
|
* Fri Jun 04 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.3
|
|
|
|
- Fix reading SPKAC data from stdin
|
|
|
|
- Fix incorrect OSSL_PKEY_PARAM_MAX_SIZE for ed25519 and ed448
|
|
|
|
- Return 0 after cleanup in OPENSSL_init_crypto()
|
|
|
|
- Cleanup the peer point formats on regotiation
|
|
|
|
- Fix default digest to SHA256
|
|
|
|
|
2021-05-27 13:53:25 +00:00
|
|
|
* Thu May 27 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.2
|
|
|
|
- Enable FIPS via config options
|
|
|
|
|
2021-05-17 09:30:32 +00:00
|
|
|
* Mon May 17 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.1
|
|
|
|
- Update to alpha 16 version
|
|
|
|
Resolves: rhbz#1952901 openssl sends alert after orderly connection close
|
|
|
|
|
2021-04-26 17:31:15 +00:00
|
|
|
* Mon Apr 26 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha15.1
|
|
|
|
- Update to alpha 15 version
|
|
|
|
Resolves: rhbz#1903209, rhbz#1952598,
|
|
|
|
|
2021-04-16 02:42:42 +00:00
|
|
|
* Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 1:3.0.0-0.alpha13.1.1
|
|
|
|
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
|
|
|
|
|
2021-04-09 20:24:41 +00:00
|
|
|
* Fri Apr 09 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha13.1
|
|
|
|
- Update to new major release OpenSSL 3.0.0 alpha 13
|
|
|
|
Resolves: rhbz#1903209
|