Redefine sslarch for x86_64_v2 arch
This commit is contained in:
commit
ed94729646
1
.gitignore
vendored
1
.gitignore
vendored
@ -63,3 +63,4 @@ openssl-1.0.0a-usa.tar.bz2
|
||||
/openssl-3.2.1.tar.gz
|
||||
/openssl-3.2.2.tar.gz
|
||||
/openssl-3.5.0.tar.gz
|
||||
/openssl-3.5.1.tar.gz
|
||||
|
@ -1,7 +1,7 @@
|
||||
From fb792883f3ccc55997fdc21a9c1052f778dea1ac Mon Sep 17 00:00:00 2001
|
||||
From bc8c037733c26d4c4a2a3dfd1e383be9855449b3 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||
Subject: [PATCH 01/58] RH: Aarch64 and ppc64le use lib64
|
||||
Subject: [PATCH 01/53] RH: Aarch64 and ppc64le use lib64
|
||||
|
||||
Patch-name: 0001-Aarch64-and-ppc64le-use-lib64.patch
|
||||
Patch-id: 1
|
||||
@ -34,5 +34,5 @@ index cba57b4127..3e327017ef 100644
|
||||
"linux-arm64ilp32" => { # https://wiki.linaro.org/Platform/arm64-ilp32
|
||||
inherit_from => [ "linux-generic32" ],
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 193d88dfd8d131d2057fc69b4e2abb66f51924d0 Mon Sep 17 00:00:00 2001
|
||||
From 99e084a168125827163da87f3f1de3f05db99be1 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Thu, 6 Mar 2025 08:40:29 -0500
|
||||
Subject: [PATCH 02/58] Add a separate config file to use for rpm installs
|
||||
Subject: [PATCH 02/53] Add a separate config file to use for rpm installs
|
||||
|
||||
In RHEL/Fedora systems we want to use a slightly different set
|
||||
of defaults, but we do not want to change the standard config file
|
||||
@ -44,7 +44,7 @@ index e24ea0c595..39fa468320 100644
|
||||
If no providers are activated explicitly, the default one is activated implicitly.
|
||||
diff --git a/rh-openssl.cnf b/rh-openssl.cnf
|
||||
new file mode 100644
|
||||
index 0000000000..20f5962541
|
||||
index 0000000000..fe2346eb2b
|
||||
--- /dev/null
|
||||
+++ b/rh-openssl.cnf
|
||||
@@ -0,0 +1,403 @@
|
||||
@ -66,7 +66,7 @@ index 0000000000..20f5962541
|
||||
+# Use this in order to automatically load providers.
|
||||
+openssl_conf = openssl_init
|
||||
+
|
||||
+# Comment out the next line to ignore configuration errors
|
||||
+# Ignore configuration errors
|
||||
+config_diagnostics = 0
|
||||
+
|
||||
+# Extra OBJECT IDENTIFIER info:
|
||||
@ -452,5 +452,5 @@ index 0000000000..20f5962541
|
||||
+cmd = rr
|
||||
+oldcert = $insta::certout # insta.cert.pem
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 786b3456ad2d3d37e9729b83d0ddce8794060fb1 Mon Sep 17 00:00:00 2001
|
||||
From 371ef9d39cb5a54d7f22ef1abd6340dbadf88fcd Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||
Subject: [PATCH 03/58] RH: Do not install html docs
|
||||
Subject: [PATCH 03/53] RH: Do not install html docs
|
||||
|
||||
Patch-name: 0003-Do-not-install-html-docs.patch
|
||||
Patch-id: 3
|
||||
@ -13,7 +13,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||
|
||||
diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tmpl
|
||||
index e85763ccf8..8a829be037 100644
|
||||
index a6f666957e..b1d8b00755 100644
|
||||
--- a/Configurations/unix-Makefile.tmpl
|
||||
+++ b/Configurations/unix-Makefile.tmpl
|
||||
@@ -658,7 +658,7 @@ install_sw: install_dev install_engines install_modules install_runtime ## Insta
|
||||
@ -26,5 +26,5 @@ index e85763ccf8..8a829be037 100644
|
||||
uninstall_docs: uninstall_man_docs uninstall_html_docs ## Uninstall manpages and HTML documentation
|
||||
$(RM) -r "$(DESTDIR)$(DOCDIR)"
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 9e410805cbd962214f0c0db785320f5fd594ea75 Mon Sep 17 00:00:00 2001
|
||||
From 79787a5bb85fed3c6998bfe3aebcdff9ffa56edf Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||
Subject: [PATCH 04/58] RH: apps ca fix md option help text.patch - DROP?
|
||||
Subject: [PATCH 04/53] RH: apps ca fix md option help text.patch - DROP?
|
||||
|
||||
Patch-name: 0005-apps-ca-fix-md-option-help-text.patch
|
||||
Patch-id: 5
|
||||
@ -26,5 +26,5 @@ index 6d1d1c0a6e..a7553ba609 100644
|
||||
{"keyform", OPT_KEYFORM, 'f',
|
||||
"Private key file format (ENGINE, other values ignored)"},
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From fc8b2977d0b92f5a2e62131e398857ee431bff6e Mon Sep 17 00:00:00 2001
|
||||
From c99e322d8f8ea6835f2d8aff4ca33d36410c4233 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||
Subject: [PATCH 05/58] RH: Disable signature verification with bad digests -
|
||||
Subject: [PATCH 05/53] RH: Disable signature verification with bad digests -
|
||||
REVIEW
|
||||
|
||||
Patch-name: 0006-Disable-signature-verification-with-totally-unsafe-h.patch
|
||||
@ -30,5 +30,5 @@ index f6cac80962..fbc6ce6e30 100644
|
||||
const EVP_MD *type = NULL;
|
||||
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From e4f78101181c2a16343c0f281d218fde34b84637 Mon Sep 17 00:00:00 2001
|
||||
From f54b7469e2525ea5f03113fad7169bd23fbcab50 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||
Subject: [PATCH 06/58] RH: Add support for PROFILE SYSTEM system default
|
||||
Subject: [PATCH 06/53] RH: Add support for PROFILE SYSTEM system default
|
||||
cipher
|
||||
|
||||
Patch-name: 0007-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
|
||||
@ -20,7 +20,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
||||
7 files changed, 105 insertions(+), 14 deletions(-)
|
||||
|
||||
diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tmpl
|
||||
index 8a829be037..ba1266659a 100644
|
||||
index b1d8b00755..91fd703afa 100644
|
||||
--- a/Configurations/unix-Makefile.tmpl
|
||||
+++ b/Configurations/unix-Makefile.tmpl
|
||||
@@ -344,6 +344,10 @@ MANDIR=$(INSTALLTOP)/share/man
|
||||
@ -43,7 +43,7 @@ index 8a829be037..ba1266659a 100644
|
||||
@{$config{CPPFLAGS}}) -}
|
||||
CFLAGS={- join(' ', @{$config{CFLAGS}}) -}
|
||||
diff --git a/Configure b/Configure
|
||||
index 15054f9403..7945d6b750 100755
|
||||
index 499585438a..e1b908fe13 100755
|
||||
--- a/Configure
|
||||
+++ b/Configure
|
||||
@@ -27,7 +27,7 @@ use OpenSSL::config;
|
||||
@ -66,7 +66,7 @@ index 15054f9403..7945d6b750 100755
|
||||
# --banner=".." Output specified text instead of default completion banner
|
||||
#
|
||||
# -w Don't wait after showing a Configure warning
|
||||
@@ -408,6 +412,7 @@ $config{prefix}="";
|
||||
@@ -409,6 +413,7 @@ $config{prefix}="";
|
||||
$config{openssldir}="";
|
||||
$config{processor}="";
|
||||
$config{libdir}="";
|
||||
@ -74,7 +74,7 @@ index 15054f9403..7945d6b750 100755
|
||||
my $auto_threads=1; # enable threads automatically? true by default
|
||||
my $default_ranlib;
|
||||
|
||||
@@ -1104,6 +1109,10 @@ while (@argvcopy)
|
||||
@@ -1105,6 +1110,10 @@ while (@argvcopy)
|
||||
die "FIPS key too long (64 bytes max)\n"
|
||||
if length $1 > 64;
|
||||
}
|
||||
@ -106,7 +106,7 @@ index 69195bcdcb..a6e0ede570 100644
|
||||
|
||||
"High" encryption cipher suites. This currently means those with key lengths
|
||||
diff --git a/include/openssl/ssl.h.in b/include/openssl/ssl.h.in
|
||||
index b342079968..0b2232b01c 100644
|
||||
index 383c5bc411..d1b00e8454 100644
|
||||
--- a/include/openssl/ssl.h.in
|
||||
+++ b/include/openssl/ssl.h.in
|
||||
@@ -209,6 +209,11 @@ extern "C" {
|
||||
@ -281,10 +281,10 @@ index 6127cb7a4b..19420d6c6a 100644
|
||||
|
||||
char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
|
||||
diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
|
||||
index 4c7b62e142..7af3f29cd8 100644
|
||||
index 9696a4c55f..4bd3318407 100644
|
||||
--- a/ssl/ssl_lib.c
|
||||
+++ b/ssl/ssl_lib.c
|
||||
@@ -679,7 +679,7 @@ int SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *meth)
|
||||
@@ -686,7 +686,7 @@ int SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *meth)
|
||||
ctx->tls13_ciphersuites,
|
||||
&(ctx->cipher_list),
|
||||
&(ctx->cipher_list_by_id),
|
||||
@ -293,7 +293,7 @@ index 4c7b62e142..7af3f29cd8 100644
|
||||
if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= 0)) {
|
||||
ERR_raise(ERR_LIB_SSL, SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS);
|
||||
return 0;
|
||||
@@ -4099,7 +4099,7 @@ SSL_CTX *SSL_CTX_new_ex(OSSL_LIB_CTX *libctx, const char *propq,
|
||||
@@ -4136,7 +4136,7 @@ SSL_CTX *SSL_CTX_new_ex(OSSL_LIB_CTX *libctx, const char *propq,
|
||||
if (!ssl_create_cipher_list(ret,
|
||||
ret->tls13_ciphersuites,
|
||||
&ret->cipher_list, &ret->cipher_list_by_id,
|
||||
@ -317,5 +317,5 @@ index c46e431b00..19d05e860b 100644
|
||||
ADD_TEST(test_default_cipherlist_clear);
|
||||
ADD_TEST(test_stdname_cipherlist);
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 6778626185fb566b9b89f548ff18f481c10ce808 Mon Sep 17 00:00:00 2001
|
||||
From 6a1b39542597be9a28f94dad23a8e93285368653 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 07/58] RH: Add FIPS_mode compatibility macro
|
||||
Subject: [PATCH 07/53] RH: Add FIPS_mode compatibility macro
|
||||
|
||||
Patch-name: 0008-Add-FIPS_mode-compatibility-macro.patch
|
||||
Patch-id: 8
|
||||
@ -79,5 +79,5 @@ index 18f8cc8740..6864b1a3c1 100644
|
||||
return 1;
|
||||
}
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 9df43c7443d85c5685f87c132de448a7c4e652b5 Mon Sep 17 00:00:00 2001
|
||||
From 15d44a4f1365532f8ebdf24a69c9da7220d5c704 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 08/58] RH: Add Kernel FIPS mode flag support - FIXSTYLE
|
||||
Subject: [PATCH 08/53] RH: Add Kernel FIPS mode flag support - FIXSTYLE
|
||||
|
||||
Patch-name: 0009-Add-Kernel-FIPS-mode-flag-support.patch
|
||||
Patch-id: 9
|
||||
@ -74,10 +74,10 @@ index f15bc3d755..614c8a2c88 100644
|
||||
goto err;
|
||||
|
||||
diff --git a/include/internal/provider.h b/include/internal/provider.h
|
||||
index 6909a1919c..9d2e355251 100644
|
||||
index 7d94346155..c0f1d00da9 100644
|
||||
--- a/include/internal/provider.h
|
||||
+++ b/include/internal/provider.h
|
||||
@@ -111,6 +111,9 @@ int ossl_provider_init_as_child(OSSL_LIB_CTX *ctx,
|
||||
@@ -114,6 +114,9 @@ int ossl_provider_init_as_child(OSSL_LIB_CTX *ctx,
|
||||
const OSSL_DISPATCH *in);
|
||||
void ossl_provider_deinit_child(OSSL_LIB_CTX *ctx);
|
||||
|
||||
@ -88,5 +88,5 @@ index 6909a1919c..9d2e355251 100644
|
||||
}
|
||||
# endif
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From f9d74e58291461804defa0e2de9635aad76e5d57 Mon Sep 17 00:00:00 2001
|
||||
From 68174cf923fbaaa95469e433c29992cd63f24f99 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 09/58] RH: Drop weak curve definitions - RENAMED/SQUASHED
|
||||
Subject: [PATCH 09/53] RH: Drop weak curve definitions - RENAMED/SQUASHED
|
||||
|
||||
Patch-name: 0010-Add-changes-to-ectest-and-eccurve.patch
|
||||
Patch-id: 10
|
||||
@ -28,7 +28,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
||||
8 files changed, 10 insertions(+), 1157 deletions(-)
|
||||
|
||||
diff --git a/apps/speed.c b/apps/speed.c
|
||||
index f52f2c839d..1edf9b8485 100644
|
||||
index 6c1eb59e91..3307a9cb46 100644
|
||||
--- a/apps/speed.c
|
||||
+++ b/apps/speed.c
|
||||
@@ -405,7 +405,7 @@ static double ffdh_results[FFDH_NUM][1]; /* 1 op: derivation */
|
||||
@ -1161,7 +1161,7 @@ index 63fe319025..06b5c0aac5 100644
|
||||
{NID_secp224r1, NID_sha224,
|
||||
"699325d6fc8fbbb4981a6ded3c3a54ad2e4e3db8a5669201912064c64e700c139248cdc1"
|
||||
diff --git a/test/ectest.c b/test/ectest.c
|
||||
index 70df89ee2f..0ddbba3b98 100644
|
||||
index e1cb59d58d..b852381924 100644
|
||||
--- a/test/ectest.c
|
||||
+++ b/test/ectest.c
|
||||
@@ -175,184 +175,26 @@ static int prime_field_tests(void)
|
||||
@ -1356,7 +1356,7 @@ index 70df89ee2f..0ddbba3b98 100644
|
||||
"FFFFFFFF000000000000000000000001"))
|
||||
|| !TEST_int_eq(1, BN_check_prime(p, ctx, NULL))
|
||||
|| !TEST_true(BN_hex2bn(&a, "FFFFFFFFFFFFFFFFFFFFFFFF"
|
||||
@@ -3128,7 +2970,7 @@ int setup_tests(void)
|
||||
@@ -3130,7 +2972,7 @@ int setup_tests(void)
|
||||
|
||||
ADD_TEST(parameter_test);
|
||||
ADD_TEST(ossl_parameter_test);
|
||||
@ -1425,5 +1425,5 @@ index e6a2c9eb59..861c01e177 100644
|
||||
Ctrl = key-check:0
|
||||
+Result = KEYGEN_GENERATE_ERROR
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 27fc7dc53e31b3dcd7ff3df40db1060d7a72f126 Mon Sep 17 00:00:00 2001
|
||||
From 6a2b78bca595435fcbf72d7b2c8bec004d555016 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 10/58] RH: Disable explicit ec curves
|
||||
Subject: [PATCH 10/53] RH: Disable explicit ec curves
|
||||
|
||||
Patch-name: 0012-Disable-explicit-ec.patch
|
||||
Patch-id: 12
|
||||
@ -80,7 +80,7 @@ index b55677fb1f..1df40018ac 100644
|
||||
EC_GROUP_free(group);
|
||||
group = named_group;
|
||||
diff --git a/test/ectest.c b/test/ectest.c
|
||||
index 0ddbba3b98..f736d13feb 100644
|
||||
index b852381924..6eac5de4fa 100644
|
||||
--- a/test/ectest.c
|
||||
+++ b/test/ectest.c
|
||||
@@ -2413,10 +2413,11 @@ static int do_test_custom_explicit_fromdata(EC_GROUP *group, BN_CTX *ctx,
|
||||
@ -134,7 +134,7 @@ index 0ddbba3b98..f736d13feb 100644
|
||||
/* Both sides should expect the same shared secret */
|
||||
if (!TEST_mem_eq(buf1, sslen, buf2, t))
|
||||
goto err;
|
||||
@@ -2892,7 +2894,7 @@ static int custom_params_test(int id)
|
||||
@@ -2893,7 +2895,7 @@ static int custom_params_test(int id)
|
||||
/* compare with previous result */
|
||||
|| !TEST_mem_eq(buf1, t, buf2, sslen))
|
||||
goto err;
|
||||
@ -240,5 +240,5 @@ index 54b143bead..06ec905be0 100644
|
||||
-----BEGIN PRIVATE KEY-----
|
||||
MGMCAQAwEAYHKoZIzj0CAQYFK4EEAA8ETDBKAgEBBBUDnQW0mLiHVha/jqFznX/K
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 2c8e302b4a2f9c4eeec718d2a9d5cef655c28153 Mon Sep 17 00:00:00 2001
|
||||
From 60e56b8d5d031a7169aa4ad07b13bca15faf345b Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 11/58] RH: skipped tests EC curves
|
||||
Subject: [PATCH 11/53] RH: skipped tests EC curves
|
||||
|
||||
Patch-name: 0013-skipped-tests-EC-curves.patch
|
||||
Patch-id: 13
|
||||
@ -78,5 +78,5 @@ index f722800e27..26a01786bb 100644
|
||||
my @basic_cmd = ("cmp_vfy_test",
|
||||
data_file("server.crt"), data_file("client.crt"),
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From e87e9fbc6bcf90d43f6e09f7de46f1805e3e6674 Mon Sep 17 00:00:00 2001
|
||||
From e15f0731f753c279a555c6d5d588dbac8dd3f1e4 Mon Sep 17 00:00:00 2001
|
||||
From: Dmitry Belyavskiy <dbelyavs@redhat.com>
|
||||
Date: Thu, 7 Mar 2024 17:37:09 +0100
|
||||
Subject: [PATCH 12/58] RH: skip quic pairwise
|
||||
Subject: [PATCH 12/53] RH: skip quic pairwise
|
||||
|
||||
Patch-name: 0115-skip-quic-pairwise.patch
|
||||
Patch-id: 115
|
||||
@ -14,10 +14,10 @@ Patch-status: |
|
||||
3 files changed, 12 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/test/quicapitest.c b/test/quicapitest.c
|
||||
index 38dd42c184..b2e18522ab 100644
|
||||
index b98a940553..3d946ae93c 100644
|
||||
--- a/test/quicapitest.c
|
||||
+++ b/test/quicapitest.c
|
||||
@@ -2761,7 +2761,9 @@ int setup_tests(void)
|
||||
@@ -2937,7 +2937,9 @@ int setup_tests(void)
|
||||
ADD_TEST(test_cipher_find);
|
||||
ADD_TEST(test_version);
|
||||
#if defined(DO_SSL_TRACE_TEST)
|
||||
@ -41,7 +41,7 @@ index 222b1886ae..7e2f65cccb 100644
|
||||
note "Duplicates:";
|
||||
note join('\n', @duplicates);
|
||||
diff --git a/test/recipes/30-test_pairwise_fail.t b/test/recipes/30-test_pairwise_fail.t
|
||||
index a101a26fb1..43e5396766 100644
|
||||
index eaf0dbbb42..21864ad319 100644
|
||||
--- a/test/recipes/30-test_pairwise_fail.t
|
||||
+++ b/test/recipes/30-test_pairwise_fail.t
|
||||
@@ -9,7 +9,7 @@
|
||||
@ -82,5 +82,5 @@ index a101a26fb1..43e5396766 100644
|
||||
"-pairwise", "dsa", "-dsaparam", data_file("dsaparam.pem")])),
|
||||
"fips provider dsa keygen pairwise failure test");
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From c63c81754bcf4bf3aeb4049fc5952368764fb303 Mon Sep 17 00:00:00 2001
|
||||
From 293b5d1bca91e400a9042cc181d17b7facbed71c Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||
Subject: [PATCH 13/58] RH: version aliasing
|
||||
Subject: [PATCH 13/53] RH: version aliasing
|
||||
|
||||
Patch-name: 0116-version-aliasing.patch
|
||||
Patch-id: 116
|
||||
@ -79,5 +79,5 @@ index ceb4948839..eab3987a6b 100644
|
||||
BN_signed_bn2bin 5568 3_2_0 EXIST::FUNCTION:
|
||||
BN_signed_lebin2bn 5569 3_2_0 EXIST::FUNCTION:
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From eeaa8125102427cedfda9a1d5bd663956acd8d63 Mon Sep 17 00:00:00 2001
|
||||
From f267ed139ac29efc6d464827024eafb805f06ea2 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Thu, 13 Feb 2025 16:09:09 -0500
|
||||
Subject: [PATCH 14/58] RH: Export two symbols for OPENSSL_str[n]casecmp
|
||||
Subject: [PATCH 14/53] RH: Export two symbols for OPENSSL_str[n]casecmp
|
||||
|
||||
We accidentally exported the symbols with the incorrect verison number
|
||||
in an early version of RHEL-9 so we need to keep the wrong symbols for
|
||||
@ -104,5 +104,5 @@ index eab3987a6b..d377d542db 100644
|
||||
RAND_set0_public 5559 3_1_0 EXIST::FUNCTION:
|
||||
RAND_set0_private 5560 3_1_0 EXIST::FUNCTION:
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 601c308871191a17620ade34a9edcb8afe969c8d Mon Sep 17 00:00:00 2001
|
||||
From 4badd5b30b1caec6c4fd3875cd4c5313ba6095b1 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Thu, 13 Feb 2025 18:11:19 -0500
|
||||
Subject: [PATCH 15/58] RH: TMP KTLS test skip
|
||||
Subject: [PATCH 15/53] RH: TMP KTLS test skip
|
||||
|
||||
From-dist-git-commit: 83382cc2a09dfcc55d5740fd08fd95c2333a56c9
|
||||
---
|
||||
@ -9,7 +9,7 @@ From-dist-git-commit: 83382cc2a09dfcc55d5740fd08fd95c2333a56c9
|
||||
1 file changed, 3 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/test/sslapitest.c b/test/sslapitest.c
|
||||
index 38d58e9387..39118a9162 100644
|
||||
index b83dd6c552..250a439137 100644
|
||||
--- a/test/sslapitest.c
|
||||
+++ b/test/sslapitest.c
|
||||
@@ -1023,9 +1023,10 @@ static int execute_test_large_message(const SSL_METHOD *smeth,
|
||||
@ -26,5 +26,5 @@ index 38d58e9387..39118a9162 100644
|
||||
|
||||
static int ping_pong_query(SSL *clientssl, SSL *serverssl)
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 84c7c05d38e96d003df43527e4e6abc6dbae2683 Mon Sep 17 00:00:00 2001
|
||||
From 3e6196d5791ce3443f54a379a5fd679c1066c76a Mon Sep 17 00:00:00 2001
|
||||
From: Dmitry Belyavskiy <dbelyavs@redhat.com>
|
||||
Date: Mon, 21 Aug 2023 13:07:07 +0200
|
||||
Subject: [PATCH 16/58] RH: Allow disabling of SHA1 signatures
|
||||
Subject: [PATCH 16/53] RH: Allow disabling of SHA1 signatures
|
||||
|
||||
Patch-name: 0049-Allow-disabling-of-SHA1-signatures.patch
|
||||
Patch-id: 49
|
||||
@ -11,7 +11,7 @@ From-dist-git-commit: 9409bc7044cf4b5773639cce20f51399888c45fd
|
||||
---
|
||||
crypto/context.c | 70 +++++++++++++++++++
|
||||
crypto/evp/evp_cnf.c | 13 ++++
|
||||
crypto/evp/m_sigver.c | 13 ++++
|
||||
crypto/evp/m_sigver.c | 14 ++++
|
||||
crypto/evp/pmeth_lib.c | 15 ++++
|
||||
doc/man5/config.pod | 13 ++++
|
||||
include/crypto/context.h | 8 +++
|
||||
@ -25,7 +25,7 @@ From-dist-git-commit: 9409bc7044cf4b5773639cce20f51399888c45fd
|
||||
providers/implementations/signature/rsa_sig.c | 14 +++-
|
||||
ssl/t1_lib.c | 8 +++
|
||||
util/libcrypto.num | 2 +
|
||||
16 files changed, 182 insertions(+), 7 deletions(-)
|
||||
16 files changed, 183 insertions(+), 7 deletions(-)
|
||||
|
||||
diff --git a/crypto/context.c b/crypto/context.c
|
||||
index 614c8a2c88..323615e300 100644
|
||||
@ -172,7 +172,7 @@ index 0e7fe64cf9..b9d3b6d226 100644
|
||||
ERR_raise_data(ERR_LIB_EVP, EVP_R_UNKNOWN_OPTION,
|
||||
"name=%s, value=%s", oval->name, oval->value);
|
||||
diff --git a/crypto/evp/m_sigver.c b/crypto/evp/m_sigver.c
|
||||
index 2d1839fedb..6e4685ecc0 100644
|
||||
index d5df497da7..53044238a1 100644
|
||||
--- a/crypto/evp/m_sigver.c
|
||||
+++ b/crypto/evp/m_sigver.c
|
||||
@@ -15,6 +15,7 @@
|
||||
@ -183,10 +183,11 @@ index 2d1839fedb..6e4685ecc0 100644
|
||||
|
||||
static int update(EVP_MD_CTX *ctx, const void *data, size_t datalen)
|
||||
{
|
||||
@@ -251,6 +252,18 @@ static int do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx,
|
||||
}
|
||||
@@ -253,6 +254,19 @@ static int do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx,
|
||||
}
|
||||
|
||||
desc = signature->description != NULL ? signature->description : "";
|
||||
+
|
||||
+ if (ctx->reqdigest != NULL
|
||||
+ && !EVP_PKEY_is_a(locpctx->pkey, SN_hmac)
|
||||
+ && !EVP_PKEY_is_a(locpctx->pkey, SN_tls1_prf)
|
||||
@ -201,9 +202,9 @@ index 2d1839fedb..6e4685ecc0 100644
|
||||
+
|
||||
if (ver) {
|
||||
if (signature->digest_verify_init == NULL) {
|
||||
ERR_raise(ERR_LIB_EVP, EVP_R_INITIALIZATION_ERROR);
|
||||
ERR_raise_data(ERR_LIB_EVP, EVP_R_PROVIDER_SIGNATURE_NOT_SUPPORTED,
|
||||
diff --git a/crypto/evp/pmeth_lib.c b/crypto/evp/pmeth_lib.c
|
||||
index 665cafbc21..84fb95d4ca 100644
|
||||
index 08c0d6a7b2..b936ad4447 100644
|
||||
--- a/crypto/evp/pmeth_lib.c
|
||||
+++ b/crypto/evp/pmeth_lib.c
|
||||
@@ -33,6 +33,7 @@
|
||||
@ -214,7 +215,7 @@ index 665cafbc21..84fb95d4ca 100644
|
||||
#include "evp_local.h"
|
||||
|
||||
#ifndef FIPS_MODULE
|
||||
@@ -954,6 +955,20 @@ static int evp_pkey_ctx_set_md(EVP_PKEY_CTX *ctx, const EVP_MD *md,
|
||||
@@ -963,6 +964,20 @@ static int evp_pkey_ctx_set_md(EVP_PKEY_CTX *ctx, const EVP_MD *md,
|
||||
return -2;
|
||||
}
|
||||
|
||||
@ -435,7 +436,7 @@ index e75b90840b..645304b951 100644
|
||||
if (pmgf1mdname != NULL
|
||||
&& !rsa_setup_mgf1_md(prsactx, pmgf1mdname, pmgf1mdprops))
|
||||
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
|
||||
index 8d0c2647b7..f6117a1fc5 100644
|
||||
index 2f71f95438..bea5cab253 100644
|
||||
--- a/ssl/t1_lib.c
|
||||
+++ b/ssl/t1_lib.c
|
||||
@@ -21,6 +21,7 @@
|
||||
@ -446,7 +447,7 @@ index 8d0c2647b7..f6117a1fc5 100644
|
||||
#include "internal/nelem.h"
|
||||
#include "internal/sizes.h"
|
||||
#include "internal/tlsgroups.h"
|
||||
@@ -2176,6 +2177,7 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||
@@ -2178,6 +2179,7 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||
EVP_PKEY *tmpkey = EVP_PKEY_new();
|
||||
int istls;
|
||||
int ret = 0;
|
||||
@ -454,7 +455,7 @@ index 8d0c2647b7..f6117a1fc5 100644
|
||||
|
||||
if (ctx == NULL)
|
||||
goto err;
|
||||
@@ -2193,6 +2195,7 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||
@@ -2195,6 +2197,7 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||
goto err;
|
||||
|
||||
ERR_set_mark();
|
||||
@ -462,7 +463,7 @@ index 8d0c2647b7..f6117a1fc5 100644
|
||||
/* First fill cache and tls12_sigalgs list from legacy algorithm list */
|
||||
for (i = 0, lu = sigalg_lookup_tbl;
|
||||
i < OSSL_NELEM(sigalg_lookup_tbl); lu++, i++) {
|
||||
@@ -2213,6 +2216,11 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||
@@ -2215,6 +2218,11 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||
cache[i].available = 0;
|
||||
continue;
|
||||
}
|
||||
@ -485,5 +486,5 @@ index d377d542db..c2c55129ae 100644
|
||||
+ossl_ctx_legacy_digest_signatures_allowed ? 3_0_1 EXIST::FUNCTION:
|
||||
+ossl_ctx_legacy_digest_signatures_allowed_set ? 3_0_1 EXIST::FUNCTION:
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 16fdb39036e7e8438c5b97359818cd9bc472196f Mon Sep 17 00:00:00 2001
|
||||
From 7b1b68328f640d184d6ac769a07aa436b0c3f318 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Fri, 7 Mar 2025 18:12:33 -0500
|
||||
Subject: [PATCH 17/58] FIPS: Red Hat's FIPS module name and version
|
||||
Subject: [PATCH 17/53] FIPS: Red Hat's FIPS module name and version
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -9,10 +9,10 @@ Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
1 file changed, 3 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
||||
index 373cd1c2e4..aa1ab85470 100644
|
||||
index 4b9a057462..1e90f363af 100644
|
||||
--- a/providers/fips/fipsprov.c
|
||||
+++ b/providers/fips/fipsprov.c
|
||||
@@ -199,13 +199,13 @@ static int fips_get_params(void *provctx, OSSL_PARAM params[])
|
||||
@@ -200,13 +200,13 @@ static int fips_get_params(void *provctx, OSSL_PARAM params[])
|
||||
OSSL_LIB_CTX_FIPS_PROV_INDEX);
|
||||
|
||||
p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME);
|
||||
@ -30,5 +30,5 @@ index 373cd1c2e4..aa1ab85470 100644
|
||||
p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS);
|
||||
if (p != NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running()))
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From f40c27149fd5bb1864d069b3d116ffd88cca5f2f Mon Sep 17 00:00:00 2001
|
||||
From 4e6b86b5130552bfee64c7ecaf045ec00749ecbd Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 18/58] FIPS: disable fipsinstall
|
||||
Subject: [PATCH 18/53] FIPS: disable fipsinstall
|
||||
|
||||
Patch-name: 0034.fipsinstall_disable.patch
|
||||
Patch-id: 34
|
||||
@ -800,10 +800,10 @@ index a25ced3383..15748c5756 100644
|
||||
=head1 COPYRIGHT
|
||||
|
||||
diff --git a/doc/man7/OSSL_PROVIDER-FIPS.pod b/doc/man7/OSSL_PROVIDER-FIPS.pod
|
||||
index 20d35fada8..f8f219d647 100644
|
||||
index 571a1e99e0..1e384a4ff3 100644
|
||||
--- a/doc/man7/OSSL_PROVIDER-FIPS.pod
|
||||
+++ b/doc/man7/OSSL_PROVIDER-FIPS.pod
|
||||
@@ -575,7 +575,6 @@ want to operate in a FIPS approved manner. The algorithms are:
|
||||
@@ -588,7 +588,6 @@ process.
|
||||
|
||||
=head1 SEE ALSO
|
||||
|
||||
@ -866,5 +866,5 @@ index 1f9110ef60..7e80637bd5
|
||||
|
||||
# Compatible options for pedantic FIPS compliance
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From ad031aa2b8ec4042b0081f4179b8a05131bd52df Mon Sep 17 00:00:00 2001
|
||||
From a8e98667597d46e69e492779b9d5daa051f6b3b3 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 19/58] FIPS: Force fips provider on
|
||||
Subject: [PATCH 19/53] FIPS: Force fips provider on
|
||||
|
||||
Patch-name: 0032-Force-fips.patch
|
||||
Patch-id: 32
|
||||
@ -13,7 +13,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
||||
1 file changed, 29 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/crypto/provider_conf.c b/crypto/provider_conf.c
|
||||
index 5ec50f97e4..a2a9786e1c 100644
|
||||
index 9649517dd2..1e5053cbce 100644
|
||||
--- a/crypto/provider_conf.c
|
||||
+++ b/crypto/provider_conf.c
|
||||
@@ -10,6 +10,8 @@
|
||||
@ -75,5 +75,5 @@ index 5ec50f97e4..a2a9786e1c 100644
|
||||
}
|
||||
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From ee1a3977388a9ec10aa4998beb67d8e3b4bfdd9e Mon Sep 17 00:00:00 2001
|
||||
From fff4084252d07eb17e3b944c6438c00aec471c7f Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 20/58] FIPS: INTEG-CHECK: Embed hmac in fips.so - NOTE
|
||||
Subject: [PATCH 20/53] FIPS: INTEG-CHECK: Embed hmac in fips.so - NOTE
|
||||
|
||||
Corrected by squashing in:
|
||||
0052-Restore-the-correct-verify_integrity-function.patch
|
||||
@ -261,5 +261,5 @@ index 0000000000..f05d0dedbe
|
||||
+[fips_sect]
|
||||
+activate = 1
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From c202200bda962300ebc7d19e62ea0df734488c0c Mon Sep 17 00:00:00 2001
|
||||
From 9633d1339e383fdb008c25635baa86c58b3dcdc4 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Thu, 20 Feb 2025 15:30:32 -0500
|
||||
Subject: [PATCH 21/58] FIPS: INTEG-CHECK: Add script to hmac-ify fips.so
|
||||
Subject: [PATCH 21/53] FIPS: INTEG-CHECK: Add script to hmac-ify fips.so
|
||||
|
||||
This script rewrites the fips.so binary to embed the hmac result into it
|
||||
so that after a build it can be called to make the fips.so as modified
|
||||
@ -28,5 +28,5 @@ index 0000000000..54ae60b07f
|
||||
+objcopy --update-section .rodata1=providers/fips.so.hmac providers/fips.so providers/fips.so.mac
|
||||
+mv providers/fips.so.mac providers/fips.so
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From d0ad196c07d223cbb1dd2419b1ec0b0e4458febb Mon Sep 17 00:00:00 2001
|
||||
From 391ce06974d5efaf8485ac2386a857d7644db30a Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 22/58] FIPS: INTEG-CHECK: Execute KATS before HMAC - REVIEW
|
||||
Subject: [PATCH 22/53] FIPS: INTEG-CHECK: Execute KATS before HMAC - REVIEW
|
||||
|
||||
Patch-name: 0047-FIPS-early-KATS.patch
|
||||
Patch-id: 47
|
||||
@ -45,5 +45,5 @@ index 8b17b8ca94..0f5074936f 100644
|
||||
rng = ossl_rand_get0_private_noncreating(st->libctx);
|
||||
if (rng != NULL)
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 19617bb4a510d73e5080d026d22b06b637a6ad1a Mon Sep 17 00:00:00 2001
|
||||
From 821f291d29bf73802287ed74922e1d22d840cb46 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 23/58] FIPS: RSA: encrypt limits - REVIEW
|
||||
Subject: [PATCH 23/53] FIPS: RSA: encrypt limits - REVIEW
|
||||
|
||||
Patch-name: 0058-FIPS-limit-rsa-encrypt.patch
|
||||
Patch-id: 58
|
||||
@ -981,5 +981,5 @@ index f7be2e1872..568a1ddba4
|
||||
}
|
||||
next if $protocol eq "-tls1_3";
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 7cb38d617ceb819a58ac14b266787ad3d71f6206 Mon Sep 17 00:00:00 2001
|
||||
From 84dc66a182dba38876b2b519a8a5c9d38fd967a3 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Mon, 24 Mar 2025 10:50:37 -0400
|
||||
Subject: [PATCH 24/58] FIPS: RSA: PCTs
|
||||
Subject: [PATCH 24/53] FIPS: RSA: PCTs
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -153,5 +153,5 @@ index 645304b951..3d5af1046a 100644
|
||||
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))rsa_newctx },
|
||||
{ OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))rsa_sign_init },
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 158637448165abbde8d4b0c24bf4344744b79adc Mon Sep 17 00:00:00 2001
|
||||
From 0e23d3fc43bf4ace817542443d772407a809dd19 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||
Subject: [PATCH 25/58] FIPS: RSA: encapsulate limits
|
||||
Subject: [PATCH 25/53] FIPS: RSA: encapsulate limits
|
||||
|
||||
Patch-name: 0091-FIPS-RSA-encapsulate.patch
|
||||
Patch-id: 91
|
||||
@ -55,5 +55,5 @@ index ecab1454e7..8e5edd35fe 100644
|
||||
Op = RSASVE
|
||||
+Result = TEST_ENCAPSULATE_LEN_ERROR
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 9595ceef9fe9a45fca1f970706077712dbb9287f Mon Sep 17 00:00:00 2001
|
||||
From bb269a8f52e1be87144247772e2425b2f4911bee Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||
Subject: [PATCH 26/58] FIPS: RSA: Disallow SHAKE in OAEP and PSS
|
||||
Subject: [PATCH 26/53] FIPS: RSA: Disallow SHAKE in OAEP and PSS
|
||||
|
||||
According to FIPS 140-3 IG, section C.C, the SHAKE digest algorithms
|
||||
must not be used in higher-level algorithms (such as RSA-OAEP and
|
||||
@ -93,5 +93,5 @@ index a2bc198a89..2833ca50f3 100644
|
||||
if (hLen <= 0)
|
||||
goto err;
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 47cf5bdab3a46ecffd3100330781e6c297e83d66 Mon Sep 17 00:00:00 2001
|
||||
From f177c315c190537fe6a1bb0620024ae86bb95c8a Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Fri, 7 Mar 2025 18:20:30 -0500
|
||||
Subject: [PATCH 27/58] FIPS: RSA: size/mode restrictions
|
||||
Subject: [PATCH 27/53] FIPS: RSA: size/mode restrictions
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -437,5 +437,5 @@ index 17ceb59148..972e90f32f 100644
|
||||
# Signing with SHA1 is not allowed in fips mode
|
||||
Availablein = fips
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From ae1fcbd1129fc53d4ac72148696efd126e574453 Mon Sep 17 00:00:00 2001
|
||||
From bc8584fab56834724a8aa70aba1c1f56f1d794e2 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Mon, 24 Mar 2025 11:03:45 -0400
|
||||
Subject: [PATCH 28/58] FIPS: RSA: Mark x931 as not approved by default
|
||||
Subject: [PATCH 28/53] FIPS: RSA: Mark x931 as not approved by default
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -22,5 +22,5 @@ index 6bd783eb0a..c1b029de86 100644
|
||||
OSSL_FIPS_PARAM(kbkdf_key_check, KBKDF_KEY_CHECK, 0)
|
||||
OSSL_FIPS_PARAM(tls13_kdf_key_check, TLS13_KDF_KEY_CHECK, 0)
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 4ce72cfe8d1e0b37e882766b449af109d9e7c3f8 Mon Sep 17 00:00:00 2001
|
||||
From 7a34ce0dbb64dd29e412dffb0628815eed4a8b96 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
||||
Subject: [PATCH 29/58] FIPS: RSA: Remove X9.31 padding signatures tests
|
||||
Subject: [PATCH 29/53] FIPS: RSA: Remove X9.31 padding signatures tests
|
||||
|
||||
The current draft of FIPS 186-5 [1] no longer contains specifications
|
||||
for X9.31 signature padding. Instead, it contains the following
|
||||
@ -278,5 +278,5 @@ index 97ec1ff3e5..31fa0eafc6 100644
|
||||
"pss",
|
||||
4096,
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 3a9f2ccf8120cbf5b854a403926dce2d772f5f78 Mon Sep 17 00:00:00 2001
|
||||
From c031855ff636806e7811513779e494b92808a1e4 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Wed, 12 Feb 2025 17:12:02 -0500
|
||||
Subject: [PATCH 30/58] FIPS: RSA: NEEDS-REWORK:
|
||||
Subject: [PATCH 30/53] FIPS: RSA: NEEDS-REWORK:
|
||||
FIPS-Use-OAEP-in-KATs-support-fixed-OAEP-seed
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
@ -383,5 +383,5 @@ index 0000000000..2833a383c1
|
||||
+--
|
||||
+
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 9b198c3634fd3871dd535389e7b7c2379f6934fb Mon Sep 17 00:00:00 2001
|
||||
From 5fd8ab23690e661f785336b95799e74b39089790 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||
Subject: [PATCH 31/58] FIPS: Deny SHA-1 signature verification
|
||||
Subject: [PATCH 31/53] FIPS: Deny SHA-1 signature verification
|
||||
|
||||
For RHEL, we already disable SHA-1 signatures by default in the default
|
||||
provider, so it is unexpected that the FIPS provider would have a more
|
||||
@ -704,5 +704,5 @@ index 568a1ddba4..6332aaec4b 100755
|
||||
SKIP: {
|
||||
skip "No IPv4 available on this machine", 4
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 39c7eb2e82b9df4ffe58d8e05fbdb9115dde50cc Mon Sep 17 00:00:00 2001
|
||||
From 85acc91ca970f6509e67c93b46be12cf261bd3ad Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
||||
Subject: [PATCH 32/58] FIPS: RAND: FIPS-140-3 DRBG - NEEDS REVIEW
|
||||
Subject: [PATCH 32/53] FIPS: RAND: FIPS-140-3 DRBG - NEEDS REVIEW
|
||||
|
||||
providers/implementations/rands/crngt.c is gone
|
||||
|
||||
@ -14,9 +14,8 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
||||
---
|
||||
crypto/rand/prov_seed.c | 9 ++-
|
||||
providers/implementations/rands/drbg.c | 11 ++-
|
||||
providers/implementations/rands/drbg_local.h | 2 +-
|
||||
.../implementations/rands/seeding/rand_unix.c | 68 ++-----------------
|
||||
4 files changed, 23 insertions(+), 67 deletions(-)
|
||||
3 files changed, 22 insertions(+), 66 deletions(-)
|
||||
|
||||
diff --git a/crypto/rand/prov_seed.c b/crypto/rand/prov_seed.c
|
||||
index 2985c7f2d8..3202a28226 100644
|
||||
@ -68,19 +67,6 @@ index 4925a3b400..1cdb67b22c 100644
|
||||
|
||||
if (reseed_required || prediction_resistance) {
|
||||
if (!ossl_prov_drbg_reseed_unlocked(drbg, prediction_resistance, NULL,
|
||||
diff --git a/providers/implementations/rands/drbg_local.h b/providers/implementations/rands/drbg_local.h
|
||||
index e591e0b3d1..c7cafba1ea 100644
|
||||
--- a/providers/implementations/rands/drbg_local.h
|
||||
+++ b/providers/implementations/rands/drbg_local.h
|
||||
@@ -39,7 +39,7 @@
|
||||
*
|
||||
* The value is in bytes.
|
||||
*/
|
||||
-#define CRNGT_BUFSIZ 16
|
||||
+#define CRNGT_BUFSIZ 32
|
||||
|
||||
/*
|
||||
* Maximum input size for the DRBG (entropy, nonce, personalization string)
|
||||
diff --git a/providers/implementations/rands/seeding/rand_unix.c b/providers/implementations/rands/seeding/rand_unix.c
|
||||
index c3a5d8b3bf..b7b34a9345 100644
|
||||
--- a/providers/implementations/rands/seeding/rand_unix.c
|
||||
@ -168,5 +154,5 @@ index c3a5d8b3bf..b7b34a9345 100644
|
||||
# endif /* defined(OPENSSL_RAND_SEED_GETRANDOM) */
|
||||
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 92c90300747de60df2e805b9fe78fa016f5fd49e Mon Sep 17 00:00:00 2001
|
||||
From d2369dfc75e2b121650bc51f5ac3e0e7c9b75a29 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
||||
Subject: [PATCH 33/58] FIPS: RAND: Forbid truncated hashes & SHA-3
|
||||
Subject: [PATCH 33/53] FIPS: RAND: Forbid truncated hashes & SHA-3
|
||||
|
||||
Section D.R "Hash Functions Acceptable for Use in the SP 800-90A DRBGs"
|
||||
of the Implementation Guidance for FIPS 140-3 [1] notes that there is no
|
||||
@ -1191,5 +1191,5 @@ index 9756859c0e..9baecf6f31 100644
|
||||
+#Nonce.0 = 15e32abbae6b7433
|
||||
+#Output.0 = ee9f
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 5d5521b81a6714c88438e4f1fb0cf30096a0b0b6 Mon Sep 17 00:00:00 2001
|
||||
From 1a83f0de8b9aaa1cf5727f0599b089346ffd89f4 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||
Subject: [PATCH 34/58] FIPS: PBKDF2: Set minimum password length
|
||||
Subject: [PATCH 34/53] FIPS: PBKDF2: Set minimum password length
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
@ -117,5 +117,5 @@ index b383314064..68f9355b7d 100644
|
||||
if (!passed) {
|
||||
ERR_raise(ERR_LIB_PROV, error);
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 1f54210f4e4de1f2143d02f6d0b56cc388b617cd Mon Sep 17 00:00:00 2001
|
||||
From 5276208d8cb9a1504ec5a4f9a9d554daf7918731 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Mon, 24 Mar 2025 10:49:00 -0400
|
||||
Subject: [PATCH 35/58] FIPS: DH: PCT
|
||||
Subject: [PATCH 35/53] FIPS: DH: PCT
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -69,5 +69,5 @@ index 7132b9b68e..189bfc3e8b 100644
|
||||
ok = 1;
|
||||
err:
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 863cb10f0add28b1d82ec3042d2e7b418169b48a Mon Sep 17 00:00:00 2001
|
||||
From ad3ca70961e0067afd8c8b386fdcc61a576ac11b Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||
Subject: [PATCH 36/58] FIPS: DH: Disable FIPS 186-4 type parameters
|
||||
Subject: [PATCH 36/53] FIPS: DH: Disable FIPS 186-4 type parameters
|
||||
|
||||
For DH parameter and key pair generation/verification, the DSA
|
||||
procedures specified in FIPS 186-4 are used. With the release of FIPS
|
||||
@ -156,7 +156,7 @@ index 189bfc3e8b..023d628502 100644
|
||||
}
|
||||
|
||||
diff --git a/crypto/dh/dh_pmeth.c b/crypto/dh/dh_pmeth.c
|
||||
index c11ada9826..e279e9d60d 100644
|
||||
index 3b75a537b3..6ea7a423d5 100644
|
||||
--- a/crypto/dh/dh_pmeth.c
|
||||
+++ b/crypto/dh/dh_pmeth.c
|
||||
@@ -303,13 +303,17 @@ static DH *ffc_params_generate(OSSL_LIB_CTX *libctx, DH_PKEY_CTX *dctx,
|
||||
@ -326,5 +326,5 @@ index 6332aaec4b..4d8c900c00 100755
|
||||
'test sslv2/sslv3 with 1024bit DHE via BIO pair');
|
||||
}
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 900d90fa1e34bfbbfcc91face57680c0424f2014 Mon Sep 17 00:00:00 2001
|
||||
From 14cddfc71e0eae69aafdf84c1dfb073bb69942f1 Mon Sep 17 00:00:00 2001
|
||||
From: rpm-build <rpm-build>
|
||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||
Subject: [PATCH 37/58] FIPS: TLS: Enforce EMS in TLS 1.2 - NOTE
|
||||
Subject: [PATCH 37/53] FIPS: TLS: Enforce EMS in TLS 1.2 - NOTE
|
||||
|
||||
NOTE: Enforcement of EMS in non-FIPS mode has been dropped due to code
|
||||
change the option to enforce it seem to be available only in FIPS build
|
||||
@ -25,7 +25,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
||||
9 files changed, 46 insertions(+), 5 deletions(-)
|
||||
|
||||
diff --git a/doc/man3/SSL_CONF_cmd.pod b/doc/man3/SSL_CONF_cmd.pod
|
||||
index e2c1e69847..009b683b27 100644
|
||||
index 9338ffc01d..911ea21a68 100644
|
||||
--- a/doc/man3/SSL_CONF_cmd.pod
|
||||
+++ b/doc/man3/SSL_CONF_cmd.pod
|
||||
@@ -621,6 +621,9 @@ B<ExtendedMasterSecret>: use extended master secret extension, enabled by
|
||||
@ -63,7 +63,7 @@ index 15748c5756..34cbfbb2ad 100644
|
||||
|
||||
Copyright 2019-2024 The OpenSSL Project Authors. All Rights Reserved.
|
||||
diff --git a/include/openssl/ssl.h.in b/include/openssl/ssl.h.in
|
||||
index 0b2232b01c..99b2ad4eb3 100644
|
||||
index d1b00e8454..b815f25dae 100644
|
||||
--- a/include/openssl/ssl.h.in
|
||||
+++ b/include/openssl/ssl.h.in
|
||||
@@ -417,6 +417,7 @@ typedef int (*SSL_async_callback_fn)(SSL *s, void *arg);
|
||||
@ -175,7 +175,7 @@ index 50944328cb..edb2e81273 100644
|
||||
KDF = TLS1-PRF
|
||||
Ctrl.digest = digest:SHA256
|
||||
diff --git a/test/sslapitest.c b/test/sslapitest.c
|
||||
index 39118a9162..9522478ad2 100644
|
||||
index 250a439137..acc4751095 100644
|
||||
--- a/test/sslapitest.c
|
||||
+++ b/test/sslapitest.c
|
||||
@@ -575,7 +575,7 @@ static int test_client_cert_verify_cb(void)
|
||||
@ -188,5 +188,5 @@ index 39118a9162..9522478ad2 100644
|
||||
if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(),
|
||||
TLS_client_method(), TLS1_VERSION, 0,
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From a227572868569ba87b9aef722a8d981ad5feb11b Mon Sep 17 00:00:00 2001
|
||||
From ecc156faf9f4d65fd73a8ef7d8ec87f5b4c0ab88 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Thu, 13 Feb 2025 18:08:34 -0500
|
||||
Subject: [PATCH 38/58] FIPS: CMS: Set default padding to OAEP
|
||||
Subject: [PATCH 38/53] FIPS: CMS: Set default padding to OAEP
|
||||
|
||||
From-dist-git-commit: d508cbed930481c1960d6a6bc1e1a9593252dbbe
|
||||
---
|
||||
@ -57,5 +57,5 @@ index 375239c78d..e09ad03ece 100644
|
||||
|
||||
if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0)
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 6ca4910fa964f135e5a18b31502bddef3aef1304 Mon Sep 17 00:00:00 2001
|
||||
From 16b5a03db729e5977ab88b3107f99586be34006b Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Thu, 13 Feb 2025 18:16:29 -0500
|
||||
Subject: [PATCH 39/58] FIPS: PKCS12: PBMAC1 defaults
|
||||
Subject: [PATCH 39/53] FIPS: PKCS12: PBMAC1 defaults
|
||||
|
||||
From-dist-git-commit: 8fc2d4842385584094d57f6f66fcbc2a07865708
|
||||
---
|
||||
@ -31,5 +31,5 @@ index 9964faf21a..59439a8cc0 100644
|
||||
if (!PKCS12_set_pbmac1_pbkdf2(p12, mpass, -1, NULL,
|
||||
macsaltlen, maciter,
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From fe12acbd953da37dd25e8abca64582c9bdeadf3c Mon Sep 17 00:00:00 2001
|
||||
From eea9e6867012efa55d7ae48ab9a87fd0da382b6b Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Wed, 5 Mar 2025 13:22:03 -0500
|
||||
Subject: [PATCH 40/58] FIPS: Fix encoder/decoder negative test
|
||||
Subject: [PATCH 40/53] FIPS: Fix encoder/decoder negative test
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -31,5 +31,5 @@ index 2acc980e90..660d4e1115
|
||||
my $conf2 = srctop_file("test", "default-and-fips.cnf");
|
||||
ok(run(test(['decoder_propq_test', '-config', $conf2,
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From a4fc741bd6e43b301121f01ef7c823a589faad39 Mon Sep 17 00:00:00 2001
|
||||
From 1e029f27fe022949adaba959ac3fa3c3c1eccb0b Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Mon, 24 Mar 2025 10:50:06 -0400
|
||||
Subject: [PATCH 41/58] FIPS: EC: DH/DSA PCTs
|
||||
Subject: [PATCH 41/53] FIPS: EC: DH/DSA PCTs
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -176,5 +176,5 @@ index 4e46eaf9bc..4d7c25728a 100644
|
||||
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))ecdsa_newctx },
|
||||
{ OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))ecdsa_sign_init },
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From c3f3de074f9140dd8f5833f7fe3e751ac0838323 Mon Sep 17 00:00:00 2001
|
||||
From 92b40ca85bbfa7acc9b16f2c7b370f2ea5fa3ffc Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Fri, 7 Mar 2025 18:06:36 -0500
|
||||
Subject: [PATCH 42/58] FIPS: EC: disable weak curves
|
||||
Subject: [PATCH 42/53] FIPS: EC: disable weak curves
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -27,5 +27,5 @@ index f0879dfb11..a6042e7d2a 100644
|
||||
comment = "CURVE DESCRIPTION NOT AVAILABLE";
|
||||
if (sname == NULL)
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From d923f8b4531718ede24814722a0c0f0f912dca7c Mon Sep 17 00:00:00 2001
|
||||
From 2dbc4a1c31e66fd841a87f62834d8d60aff10d45 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Fri, 7 Mar 2025 18:10:52 -0500
|
||||
Subject: [PATCH 43/58] FIPS: NO DSA Support
|
||||
Subject: [PATCH 43/53] FIPS: NO DSA Support
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -18,10 +18,10 @@ Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
mode change 100644 => 100755 test/recipes/30-test_evp.t
|
||||
|
||||
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
||||
index aa1ab85470..7999744b5a 100644
|
||||
index 1e90f363af..84d8e897cc 100644
|
||||
--- a/providers/fips/fipsprov.c
|
||||
+++ b/providers/fips/fipsprov.c
|
||||
@@ -430,7 +430,8 @@ static const OSSL_ALGORITHM fips_keyexch[] = {
|
||||
@@ -431,7 +431,8 @@ static const OSSL_ALGORITHM fips_keyexch[] = {
|
||||
};
|
||||
|
||||
static const OSSL_ALGORITHM fips_signature[] = {
|
||||
@ -31,7 +31,7 @@ index aa1ab85470..7999744b5a 100644
|
||||
{ PROV_NAMES_DSA, FIPS_DEFAULT_PROPERTIES, ossl_dsa_signature_functions },
|
||||
{ PROV_NAMES_DSA_SHA1, FIPS_DEFAULT_PROPERTIES, ossl_dsa_sha1_signature_functions },
|
||||
{ PROV_NAMES_DSA_SHA224, FIPS_DEFAULT_PROPERTIES, ossl_dsa_sha224_signature_functions },
|
||||
@@ -560,8 +561,9 @@ static const OSSL_ALGORITHM fips_keymgmt[] = {
|
||||
@@ -561,8 +562,9 @@ static const OSSL_ALGORITHM fips_keymgmt[] = {
|
||||
PROV_DESCS_DHX },
|
||||
#endif
|
||||
#ifndef OPENSSL_NO_DSA
|
||||
@ -396,5 +396,5 @@ index ece29485f4..756f90c1bd 100644
|
||||
"-signer", $smrsa1,
|
||||
"-signer", catfile($smdir, "smrsa2.pem"),
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From ca860bb5c16d9a96afb32e025b54db76e5f8cfd3 Mon Sep 17 00:00:00 2001
|
||||
From 8774a96fde9355aa32c040c145e4f35d7c09a5bd Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Fri, 7 Mar 2025 18:15:13 -0500
|
||||
Subject: [PATCH 44/58] FIPS: NO DES support
|
||||
Subject: [PATCH 44/53] FIPS: NO DES support
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -14,10 +14,10 @@ Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
6 files changed, 14 insertions(+), 23 deletions(-)
|
||||
|
||||
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
||||
index 7999744b5a..30f0c8ca14 100644
|
||||
index 84d8e897cc..4b394c3e39 100644
|
||||
--- a/providers/fips/fipsprov.c
|
||||
+++ b/providers/fips/fipsprov.c
|
||||
@@ -354,7 +354,8 @@ static const OSSL_ALGORITHM_CAPABLE fips_ciphers[] = {
|
||||
@@ -355,7 +355,8 @@ static const OSSL_ALGORITHM_CAPABLE fips_ciphers[] = {
|
||||
ossl_cipher_capable_aes_cbc_hmac_sha256),
|
||||
ALGC(PROV_NAMES_AES_256_CBC_HMAC_SHA256, ossl_aes256cbc_hmac_sha256_functions,
|
||||
ossl_cipher_capable_aes_cbc_hmac_sha256),
|
||||
@ -80,7 +80,7 @@ index 2838f343bd..19dd2c6c63 100644
|
||||
return 1;
|
||||
}
|
||||
diff --git a/test/recipes/30-test_evp_data/evpciph_des3_common.txt b/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
||||
index 1947e21f74..119b75d9ce 100644
|
||||
index 6c74b65cef..8bcb78cd2d 100644
|
||||
--- a/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
||||
+++ b/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
||||
@@ -14,7 +14,7 @@
|
||||
@ -132,7 +132,7 @@ index 1947e21f74..119b75d9ce 100644
|
||||
Ciphertext = 3FE301C962AC01D02213763C1CBD4CDC799657C064ECF5D41C673812CFDE9675
|
||||
|
||||
# Test that DES3 ECB mode encryption is not FIPS approved
|
||||
-Availablein = fipss
|
||||
-Availablein = fips
|
||||
-FIPSversion = >=3.4.0
|
||||
+Availablein = none
|
||||
Cipher = DES-EDE3-ECB
|
||||
@ -170,5 +170,5 @@ index 756f90c1bd..ac833d2a2f 100644
|
||||
"-des3", "-secretkey", "000102030405060708090A0B0C0D0E0F1011121314151617",
|
||||
"-stream", "-out", "{output}.cms" ],
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 3928272f2d86188ef8796c7d18b1ec7d617cae97 Mon Sep 17 00:00:00 2001
|
||||
From e466bb4e4fa16481cbf44b410933e6dceb8d27d9 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Fri, 7 Mar 2025 18:22:07 -0500
|
||||
Subject: [PATCH 45/58] FIPS: NO Kmac
|
||||
Subject: [PATCH 45/53] FIPS: NO Kmac
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -15,10 +15,10 @@ Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
7 files changed, 40 insertions(+), 86 deletions(-)
|
||||
|
||||
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
||||
index 30f0c8ca14..00b7d1e2aa 100644
|
||||
index 4b394c3e39..8f00dfa0ef 100644
|
||||
--- a/providers/fips/fipsprov.c
|
||||
+++ b/providers/fips/fipsprov.c
|
||||
@@ -293,10 +293,11 @@ static const OSSL_ALGORITHM fips_digests[] = {
|
||||
@@ -294,10 +294,11 @@ static const OSSL_ALGORITHM fips_digests[] = {
|
||||
* KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for
|
||||
* KMAC128 and KMAC256.
|
||||
*/
|
||||
@ -32,7 +32,7 @@ index 30f0c8ca14..00b7d1e2aa 100644
|
||||
{ NULL, NULL, NULL }
|
||||
};
|
||||
|
||||
@@ -369,8 +370,9 @@ static const OSSL_ALGORITHM fips_macs[] = {
|
||||
@@ -370,8 +371,9 @@ static const OSSL_ALGORITHM fips_macs[] = {
|
||||
#endif
|
||||
{ PROV_NAMES_GMAC, FIPS_DEFAULT_PROPERTIES, ossl_gmac_functions },
|
||||
{ PROV_NAMES_HMAC, FIPS_DEFAULT_PROPERTIES, ossl_hmac_functions },
|
||||
@ -422,5 +422,5 @@ index 831eecbac9..af92ceea98 100644
|
||||
-Custom = ""
|
||||
-Output = 75358CF39E41494E949707927CEE0AF20A3FF553904C86B08F21CC414BCFD691589D27CF5E15369CBBFF8B9A4C2EB17800855D0235FF635DA82533EC6B759B69
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 50c0087bdd6c15e2c63c8324f35221fd45a10518 Mon Sep 17 00:00:00 2001
|
||||
From 0d1de1053dc1b4b9a1e14b622311d0449c64e19e Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Mon, 10 Mar 2025 13:52:50 -0400
|
||||
Subject: [PATCH 47/58] FIPS: Fix some tests due to our versioning change
|
||||
Subject: [PATCH 46/53] FIPS: Fix some tests due to our versioning change
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -102,5 +102,5 @@ index af47842fd8..21c75033e8 100644
|
||||
|
||||
my @tests_mldsa_tls_1_3 = (
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
@ -1,33 +0,0 @@
|
||||
From a6dce07d8e44e79dc3db9538d269bbbc903a8e15 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Fri, 7 Mar 2025 18:24:36 -0500
|
||||
Subject: [PATCH 46/58] FIPS: NO PQ (ML/SLH-DSA)
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
providers/fips/self_test_data.inc | 2 ++
|
||||
1 file changed, 2 insertions(+)
|
||||
|
||||
diff --git a/providers/fips/self_test_data.inc b/providers/fips/self_test_data.inc
|
||||
index f3059a8446..9659f10613 100644
|
||||
--- a/providers/fips/self_test_data.inc
|
||||
+++ b/providers/fips/self_test_data.inc
|
||||
@@ -3037,6 +3037,7 @@ static const ST_KAT_SIGN st_kat_sign_tests[] = {
|
||||
#endif /* OPENSSL_NO_DSA */
|
||||
#endif
|
||||
|
||||
+#if 0
|
||||
#ifndef OPENSSL_NO_ML_DSA
|
||||
{
|
||||
OSSL_SELF_TEST_DESC_SIGN_ML_DSA,
|
||||
@@ -3081,6 +3082,7 @@ static const ST_KAT_SIGN st_kat_sign_tests[] = {
|
||||
slh_dsa_sig_params, slh_dsa_sig_params
|
||||
},
|
||||
#endif /* OPENSSL_NO_SLH_DSA */
|
||||
+#endif
|
||||
};
|
||||
|
||||
#if !defined(OPENSSL_NO_ML_DSA)
|
||||
--
|
||||
2.49.0
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 3bc3a6514c078564ac8addbdf24172a5fb90f4d7 Mon Sep 17 00:00:00 2001
|
||||
From e47db9280144065c4221537f1d44baa750a25d64 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Wed, 12 Feb 2025 17:25:47 -0500
|
||||
Subject: [PATCH 48/58] Current Rebase status
|
||||
Subject: [PATCH 47/53] Current Rebase status
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -102,5 +102,5 @@ index 2833a383c1..c8f6c992a8 100644
|
||||
+./Configure --prefix=$HOME/tmp/openssl-rebase --openssldir=$HOME/tmp/openssl-rebase/etc/pki/tls enable-ec_nistp_64_gcc_128 --system-ciphers-file=$HOME/tmp/openssl-rebase/etc/crypto-policies/back-ends/opensslcnf.config zlib enable-camellia enable-seed enable-rfc3779 enable-sctp enable-cms enable-md2 enable-rc5 enable-ktls enable-fips no-mdc2 no-ec2m no-sm2 no-sm4 no-atexit enable-buildtest-c++ shared linux-x86_64 $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\"" -DOPENSSL_PEDANTIC_ZEROIZATION -DREDHAT_FIPS_VENDOR="\"Red Hat Enterprise Linux OpenSSL FIPS Provider\"" -DREDHAT_FIPS_VERSION="\"3.5.0-4c714d97fd77d1a8\""' -Wl,--allow-multiple-definition
|
||||
+
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 573cde99e796fbd76f9be7f6a553c681abbfb55a Mon Sep 17 00:00:00 2001
|
||||
From d0063158bcf9321daec1ffcbfeb3d7b085aebce3 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Mon, 14 Apr 2025 15:25:40 -0400
|
||||
Subject: [PATCH 49/58] FIPS: KDF key lenght errors
|
||||
Subject: [PATCH 48/53] FIPS: KDF key lenght errors
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -171,5 +171,5 @@ index 1fb2472001..93c07ede7c 100644
|
||||
|
||||
# Test that the key whose length is shorter than 112 bits is reported as
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 48498bd445161f1d0fffb60bce8d9474acfe840b Mon Sep 17 00:00:00 2001
|
||||
From 91000e60a38106701dd76deb37eafe165e7802a3 Mon Sep 17 00:00:00 2001
|
||||
From: Simo Sorce <simo@redhat.com>
|
||||
Date: Tue, 15 Apr 2025 13:41:42 -0400
|
||||
Subject: [PATCH 50/58] FIPS: fix disallowed digests tests
|
||||
Subject: [PATCH 49/53] FIPS: fix disallowed digests tests
|
||||
|
||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||
---
|
||||
@ -47,5 +47,5 @@ index 6688c217aa..8347f773e6 100644
|
||||
# Test that the key whose length is shorter than 112 bits is reported as
|
||||
# unapproved
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
@ -1,14 +1,14 @@
|
||||
From 0895e273cacec26a4bd027bef7ab07bae12d9741 Mon Sep 17 00:00:00 2001
|
||||
From 99d3ce80ecf3252962a1b79dd57324f08b62cc18 Mon Sep 17 00:00:00 2001
|
||||
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||
Date: Fri, 9 May 2025 15:09:46 +0200
|
||||
Subject: [PATCH 51/58] Make `openssl speed` run in FIPS mode
|
||||
Subject: [PATCH 50/53] Make `openssl speed` run in FIPS mode
|
||||
|
||||
---
|
||||
apps/speed.c | 44 ++++++++++++++++++++++----------------------
|
||||
1 file changed, 22 insertions(+), 22 deletions(-)
|
||||
|
||||
diff --git a/apps/speed.c b/apps/speed.c
|
||||
index 1edf9b8485..d4e707074c 100644
|
||||
index 3307a9cb46..ae2f166d24 100644
|
||||
--- a/apps/speed.c
|
||||
+++ b/apps/speed.c
|
||||
@@ -3172,18 +3172,18 @@ int speed_main(int argc, char **argv)
|
||||
@ -72,5 +72,5 @@ index 1edf9b8485..d4e707074c 100644
|
||||
|
||||
for (i = 0; i < loopargs_len; i++)
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 120558807e15d3cb2959020bacc928988e512a78 Mon Sep 17 00:00:00 2001
|
||||
From 5b20574f75a2c525bf30ea304292ecd93eb72091 Mon Sep 17 00:00:00 2001
|
||||
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||
Date: Mon, 12 May 2025 14:34:39 +0200
|
||||
Subject: [PATCH 52/58] Backport upstream #27483 for PKCS11 needs
|
||||
Subject: [PATCH 51/53] Backport upstream #27483 for PKCS11 needs
|
||||
|
||||
---
|
||||
.../implementations/skeymgmt/aes_skmgmt.c | 2 +
|
||||
@ -142,5 +142,5 @@ index b81df9c8f8..e33bbbe003 100644
|
||||
ADD_TEST(test_aes_raw_skey);
|
||||
#ifndef OPENSSL_NO_DES
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
@ -1,7 +1,7 @@
|
||||
From ee9a3d993eb82f98e4670adc9ccb015065b81555 Mon Sep 17 00:00:00 2001
|
||||
From fcba6e3c26d76ce26ef140f3d07f9cc15e7d98fa Mon Sep 17 00:00:00 2001
|
||||
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||
Date: Mon, 12 May 2025 16:21:23 +0200
|
||||
Subject: [PATCH 53/58] Red Hat 9 FIPS indicator defines
|
||||
Subject: [PATCH 52/53] Red Hat 9 FIPS indicator defines
|
||||
|
||||
---
|
||||
include/openssl/evp.h | 15 +++++++++++++++
|
||||
@ -125,5 +125,5 @@ index 059b489735..5a1864309d 100644
|
||||
'KEM_PARAM_FIPS_KEY_CHECK' => '*PKEY_PARAM_FIPS_KEY_CHECK',
|
||||
'KEM_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
@ -1,7 +1,7 @@
|
||||
From 26ad3b905a6d4b1fa50b304f21f67aa0d35265e9 Mon Sep 17 00:00:00 2001
|
||||
From 75c77ea5f36dbf6d21940ab5bf87dff6acd5b8d6 Mon Sep 17 00:00:00 2001
|
||||
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||
Date: Fri, 30 May 2025 16:17:37 +0200
|
||||
Subject: [PATCH 58/58] Allow hybrid MLKEM in FIPS mode
|
||||
Subject: [PATCH 53/53] Allow hybrid MLKEM in FIPS mode
|
||||
|
||||
---
|
||||
crypto/ml_kem/ml_kem.c | 11 ++--
|
||||
@ -12,18 +12,18 @@ Subject: [PATCH 58/58] Allow hybrid MLKEM in FIPS mode
|
||||
5 files changed, 103 insertions(+), 12 deletions(-)
|
||||
|
||||
diff --git a/crypto/ml_kem/ml_kem.c b/crypto/ml_kem/ml_kem.c
|
||||
index ec75233435..8d0cc1a82c 100644
|
||||
index 4474af0f87..6eca7dc29d 100644
|
||||
--- a/crypto/ml_kem/ml_kem.c
|
||||
+++ b/crypto/ml_kem/ml_kem.c
|
||||
@@ -1581,6 +1581,7 @@ ML_KEM_KEY *ossl_ml_kem_key_new(OSSL_LIB_CTX *libctx, const char *properties,
|
||||
@@ -1613,6 +1613,7 @@ ML_KEM_KEY *ossl_ml_kem_key_new(OSSL_LIB_CTX *libctx, const char *properties,
|
||||
{
|
||||
const ML_KEM_VINFO *vinfo = ossl_ml_kem_get_vinfo(evp_type);
|
||||
ML_KEM_KEY *key;
|
||||
+ char *adjusted_propq = NULL;
|
||||
|
||||
if (vinfo == NULL)
|
||||
return NULL;
|
||||
@@ -1588,15 +1589,17 @@ ML_KEM_KEY *ossl_ml_kem_key_new(OSSL_LIB_CTX *libctx, const char *properties,
|
||||
if (vinfo == NULL) {
|
||||
ERR_raise_data(ERR_LIB_CRYPTO, ERR_R_PASSED_INVALID_ARGUMENT,
|
||||
@@ -1623,15 +1624,17 @@ ML_KEM_KEY *ossl_ml_kem_key_new(OSSL_LIB_CTX *libctx, const char *properties,
|
||||
if ((key = OPENSSL_malloc(sizeof(*key))) == NULL)
|
||||
return NULL;
|
||||
|
||||
@ -298,5 +298,5 @@ index bea8783276..aeef0c8f84 100644
|
||||
key->xinfo->algorithm_name,
|
||||
key->xinfo->group_name);
|
||||
--
|
||||
2.49.0
|
||||
2.50.0
|
||||
|
@ -1,58 +0,0 @@
|
||||
From 92e50723ae6aa29476b7ebb66d262f78677ee68d Mon Sep 17 00:00:00 2001
|
||||
From: Gerd Hoffmann <kraxel@redhat.com>
|
||||
Date: Mon, 7 Apr 2025 12:58:54 +0200
|
||||
Subject: [PATCH 54/58] crypto: disable OSSL_PARAM_REAL on UEFI
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
Floating point types like double can't be used on UEFI.
|
||||
Fix build on UEFI by disabling the OSSL_PARAM_REAL branch.
|
||||
|
||||
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||
|
||||
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
|
||||
Reviewed-by: Tomas Mraz <tomas@openssl.org>
|
||||
Reviewed-by: Matt Caswell <matt@openssl.org>
|
||||
(Merged from https://github.com/openssl/openssl/pull/27284)
|
||||
---
|
||||
crypto/params_from_text.c | 6 +++---
|
||||
1 file changed, 3 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/crypto/params_from_text.c b/crypto/params_from_text.c
|
||||
index 7532d4d439..fb25400dc1 100644
|
||||
--- a/crypto/params_from_text.c
|
||||
+++ b/crypto/params_from_text.c
|
||||
@@ -220,9 +220,9 @@ int OSSL_PARAM_print_to_bio(const OSSL_PARAM *p, BIO *bio, int print_values)
|
||||
BIGNUM *bn;
|
||||
#ifndef OPENSSL_SYS_UEFI
|
||||
double d;
|
||||
+ int dok;
|
||||
#endif
|
||||
int ok = -1;
|
||||
- int dok;
|
||||
|
||||
/*
|
||||
* Iterate through each key in the array printing its key and value
|
||||
@@ -280,16 +280,16 @@ int OSSL_PARAM_print_to_bio(const OSSL_PARAM *p, BIO *bio, int print_values)
|
||||
case OSSL_PARAM_OCTET_STRING:
|
||||
ok = BIO_dump(bio, (char *)p->data, p->data_size);
|
||||
break;
|
||||
+#ifndef OPENSSL_SYS_UEFI
|
||||
case OSSL_PARAM_REAL:
|
||||
dok = 0;
|
||||
-#ifndef OPENSSL_SYS_UEFI
|
||||
dok = OSSL_PARAM_get_double(p, &d);
|
||||
-#endif
|
||||
if (dok == 1)
|
||||
ok = BIO_printf(bio, "%f\n", d);
|
||||
else
|
||||
ok = BIO_printf(bio, "error getting value\n");
|
||||
break;
|
||||
+#endif
|
||||
default:
|
||||
ok = BIO_printf(bio, "unknown type (%u) of %zu bytes\n",
|
||||
p->data_type, p->data_size);
|
||||
--
|
||||
2.49.0
|
||||
|
@ -1,36 +0,0 @@
|
||||
From fb8649ec423277d50936a6a7848a1b6705e208cc Mon Sep 17 00:00:00 2001
|
||||
From: Gerd Hoffmann <kraxel@redhat.com>
|
||||
Date: Mon, 7 Apr 2025 13:29:36 +0200
|
||||
Subject: [PATCH 55/58] hashfunc: add stddef.h include
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
size_t is declared in stddef.h, so include the header file to
|
||||
make sure it is available. Fixes build on UEFI.
|
||||
|
||||
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||
|
||||
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
|
||||
Reviewed-by: Tomas Mraz <tomas@openssl.org>
|
||||
Reviewed-by: Matt Caswell <matt@openssl.org>
|
||||
(Merged from https://github.com/openssl/openssl/pull/27284)
|
||||
---
|
||||
include/internal/hashfunc.h | 1 +
|
||||
1 file changed, 1 insertion(+)
|
||||
|
||||
diff --git a/include/internal/hashfunc.h b/include/internal/hashfunc.h
|
||||
index cabc7beed4..fae8a275fa 100644
|
||||
--- a/include/internal/hashfunc.h
|
||||
+++ b/include/internal/hashfunc.h
|
||||
@@ -11,6 +11,7 @@
|
||||
# define OPENSSL_HASHFUNC_H
|
||||
|
||||
# include <openssl/e_os2.h>
|
||||
+# include <stddef.h>
|
||||
/**
|
||||
* Generalized fnv1a 64 bit hash function
|
||||
*/
|
||||
--
|
||||
2.49.0
|
||||
|
@ -1,73 +0,0 @@
|
||||
From 60699bc32870a3325a79234158740aac917b39a6 Mon Sep 17 00:00:00 2001
|
||||
From: Gerd Hoffmann <kraxel@redhat.com>
|
||||
Date: Mon, 7 Apr 2025 14:06:28 +0200
|
||||
Subject: [PATCH 56/58] rio: add RIO_POLL_METHOD_NONE
|
||||
MIME-Version: 1.0
|
||||
Content-Type: text/plain; charset=UTF-8
|
||||
Content-Transfer-Encoding: 8bit
|
||||
|
||||
Fixes build on UEFI.
|
||||
|
||||
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
||||
|
||||
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
|
||||
Reviewed-by: Tomas Mraz <tomas@openssl.org>
|
||||
Reviewed-by: Matt Caswell <matt@openssl.org>
|
||||
(Merged from https://github.com/openssl/openssl/pull/27284)
|
||||
---
|
||||
ssl/rio/poll_builder.c | 4 +++-
|
||||
ssl/rio/poll_builder.h | 4 +++-
|
||||
ssl/rio/poll_method.h | 5 ++++-
|
||||
3 files changed, 10 insertions(+), 3 deletions(-)
|
||||
|
||||
diff --git a/ssl/rio/poll_builder.c b/ssl/rio/poll_builder.c
|
||||
index 007e360d87..3cfbe3b0ac 100644
|
||||
--- a/ssl/rio/poll_builder.c
|
||||
+++ b/ssl/rio/poll_builder.c
|
||||
@@ -16,7 +16,9 @@ OSSL_SAFE_MATH_UNSIGNED(size_t, size_t)
|
||||
|
||||
int ossl_rio_poll_builder_init(RIO_POLL_BUILDER *rpb)
|
||||
{
|
||||
-#if RIO_POLL_METHOD == RIO_POLL_METHOD_SELECT
|
||||
+#if RIO_POLL_METHOD == RIO_POLL_METHOD_NONE
|
||||
+ return 0;
|
||||
+#elif RIO_POLL_METHOD == RIO_POLL_METHOD_SELECT
|
||||
FD_ZERO(&rpb->rfd);
|
||||
FD_ZERO(&rpb->wfd);
|
||||
FD_ZERO(&rpb->efd);
|
||||
diff --git a/ssl/rio/poll_builder.h b/ssl/rio/poll_builder.h
|
||||
index ffc9bbf9fc..985e4713b2 100644
|
||||
--- a/ssl/rio/poll_builder.h
|
||||
+++ b/ssl/rio/poll_builder.h
|
||||
@@ -23,7 +23,9 @@
|
||||
* FDs.
|
||||
*/
|
||||
typedef struct rio_poll_builder_st {
|
||||
-# if RIO_POLL_METHOD == RIO_POLL_METHOD_SELECT
|
||||
+# if RIO_POLL_METHOD == RIO_POLL_METHOD_NONE
|
||||
+ /* nothing */;
|
||||
+# elif RIO_POLL_METHOD == RIO_POLL_METHOD_SELECT
|
||||
fd_set rfd, wfd, efd;
|
||||
int hwm_fd;
|
||||
# elif RIO_POLL_METHOD == RIO_POLL_METHOD_POLL
|
||||
diff --git a/ssl/rio/poll_method.h b/ssl/rio/poll_method.h
|
||||
index 9a6de89270..d5af8663c2 100644
|
||||
--- a/ssl/rio/poll_method.h
|
||||
+++ b/ssl/rio/poll_method.h
|
||||
@@ -14,9 +14,12 @@
|
||||
|
||||
# define RIO_POLL_METHOD_SELECT 1
|
||||
# define RIO_POLL_METHOD_POLL 2
|
||||
+# define RIO_POLL_METHOD_NONE 3
|
||||
|
||||
# ifndef RIO_POLL_METHOD
|
||||
-# if !defined(OPENSSL_SYS_WINDOWS) && defined(POLLIN)
|
||||
+# if defined(OPENSSL_SYS_UEFI)
|
||||
+# define RIO_POLL_METHOD RIO_POLL_METHOD_NONE
|
||||
+# elif !defined(OPENSSL_SYS_WINDOWS) && defined(POLLIN)
|
||||
# define RIO_POLL_METHOD RIO_POLL_METHOD_POLL
|
||||
# else
|
||||
# define RIO_POLL_METHOD RIO_POLL_METHOD_SELECT
|
||||
--
|
||||
2.49.0
|
||||
|
@ -1,62 +0,0 @@
|
||||
From d7ab338f85b55ed6aa6d0187123dbab8684551a5 Mon Sep 17 00:00:00 2001
|
||||
From: Tomas Mraz <tomas@openssl.org>
|
||||
Date: Tue, 20 May 2025 16:34:10 +0200
|
||||
Subject: [PATCH 57/58] apps/x509.c: Fix the -addreject option adding trust
|
||||
instead of rejection
|
||||
|
||||
Fixes CVE-2025-4575
|
||||
|
||||
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
|
||||
(Merged from https://github.com/openssl/openssl/pull/27672)
|
||||
---
|
||||
apps/x509.c | 2 +-
|
||||
test/recipes/25-test_x509.t | 12 +++++++++++-
|
||||
2 files changed, 12 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/apps/x509.c b/apps/x509.c
|
||||
index fdae8f383a..0c340c15b3 100644
|
||||
--- a/apps/x509.c
|
||||
+++ b/apps/x509.c
|
||||
@@ -465,7 +465,7 @@ int x509_main(int argc, char **argv)
|
||||
prog, opt_arg());
|
||||
goto opthelp;
|
||||
}
|
||||
- if (!sk_ASN1_OBJECT_push(trust, objtmp))
|
||||
+ if (!sk_ASN1_OBJECT_push(reject, objtmp))
|
||||
goto end;
|
||||
trustout = 1;
|
||||
break;
|
||||
diff --git a/test/recipes/25-test_x509.t b/test/recipes/25-test_x509.t
|
||||
index 09b61708ff..dfa0a428f5 100644
|
||||
--- a/test/recipes/25-test_x509.t
|
||||
+++ b/test/recipes/25-test_x509.t
|
||||
@@ -16,7 +16,7 @@ use OpenSSL::Test qw/:DEFAULT srctop_file/;
|
||||
|
||||
setup("test_x509");
|
||||
|
||||
-plan tests => 134;
|
||||
+plan tests => 138;
|
||||
|
||||
# Prevent MSys2 filename munging for arguments that look like file paths but
|
||||
# aren't
|
||||
@@ -110,6 +110,16 @@ ok(run(app(["openssl", "x509", "-new", "-force_pubkey", $key, "-subj", "/CN=EE",
|
||||
&& run(app(["openssl", "verify", "-no_check_time",
|
||||
"-trusted", $ca, "-partial_chain", $caout])));
|
||||
|
||||
+# test trust decoration
|
||||
+ok(run(app(["openssl", "x509", "-in", $ca, "-addtrust", "emailProtection",
|
||||
+ "-out", "ca-trusted.pem"])));
|
||||
+cert_contains("ca-trusted.pem", "Trusted Uses: E-mail Protection",
|
||||
+ 1, 'trusted use - E-mail Protection');
|
||||
+ok(run(app(["openssl", "x509", "-in", $ca, "-addreject", "emailProtection",
|
||||
+ "-out", "ca-rejected.pem"])));
|
||||
+cert_contains("ca-rejected.pem", "Rejected Uses: E-mail Protection",
|
||||
+ 1, 'rejected use - E-mail Protection');
|
||||
+
|
||||
subtest 'x509 -- x.509 v1 certificate' => sub {
|
||||
tconversion( -type => 'x509', -prefix => 'x509v1',
|
||||
-in => srctop_file("test", "testx509.pem") );
|
||||
--
|
||||
2.49.0
|
||||
|
35
openssl.spec
35
openssl.spec
@ -28,8 +28,8 @@ print(string.sub(hash, 0, 16))
|
||||
|
||||
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
||||
Name: openssl
|
||||
Version: 3.5.0
|
||||
Release: 8%{?dist}.alma.1
|
||||
Version: 3.5.1
|
||||
Release: 1%{?dist}.alma.1
|
||||
Epoch: 1
|
||||
Source0: openssl-%{version}.tar.gz
|
||||
Source1: fips-hmacify.sh
|
||||
@ -85,20 +85,15 @@ Patch0042: 0042-FIPS-EC-disable-weak-curves.patch
|
||||
Patch0043: 0043-FIPS-NO-DSA-Support.patch
|
||||
Patch0044: 0044-FIPS-NO-DES-support.patch
|
||||
Patch0045: 0045-FIPS-NO-Kmac.patch
|
||||
Patch0046: 0046-FIPS-NO-PQ-ML-SLH-DSA.patch
|
||||
Patch0047: 0047-FIPS-Fix-some-tests-due-to-our-versioning-change.patch
|
||||
Patch0048: 0048-Current-Rebase-status.patch
|
||||
Patch0049: 0049-FIPS-KDF-key-lenght-errors.patch
|
||||
Patch0050: 0050-FIPS-fix-disallowed-digests-tests.patch
|
||||
Patch0051: 0051-Make-openssl-speed-run-in-FIPS-mode.patch
|
||||
Patch0052: 0052-Backport-upstream-27483-for-PKCS11-needs.patch
|
||||
Patch0053: 0053-Red-Hat-9-FIPS-indicator-defines.patch
|
||||
Patch0054: 0054-crypto-disable-OSSL_PARAM_REAL-on-UEFI.patch
|
||||
Patch0055: 0055-hashfunc-add-stddef.h-include.patch
|
||||
Patch0056: 0056-rio-add-RIO_POLL_METHOD_NONE.patch
|
||||
Patch0057: 0057-apps-x509.c-Fix-the-addreject-option-adding-trust-in.patch
|
||||
Patch0046: 0046-FIPS-Fix-some-tests-due-to-our-versioning-change.patch
|
||||
Patch0047: 0047-Current-Rebase-status.patch
|
||||
Patch0048: 0048-FIPS-KDF-key-lenght-errors.patch
|
||||
Patch0049: 0049-FIPS-fix-disallowed-digests-tests.patch
|
||||
Patch0050: 0050-Make-openssl-speed-run-in-FIPS-mode.patch
|
||||
Patch0051: 0051-Backport-upstream-27483-for-PKCS11-needs.patch
|
||||
Patch0052: 0052-Red-Hat-9-FIPS-indicator-defines.patch
|
||||
%if ( %{defined rhel} && (! %{defined centos}) )
|
||||
Patch0058: 0058-Allow-hybrid-MLKEM-in-FIPS-mode.patch
|
||||
Patch0053: 0053-Allow-hybrid-MLKEM-in-FIPS-mode.patch
|
||||
%endif
|
||||
|
||||
License: Apache-2.0
|
||||
@ -441,9 +436,17 @@ touch $RPM_BUILD_ROOT/%{_prefix}/include/openssl/engine.h
|
||||
%ldconfig_scriptlets libs
|
||||
|
||||
%changelog
|
||||
* Fri Jun 06 2025 Eduard Abdullin <eabdullin@almalinux.org> - 1:3.5.0-8.alma.1
|
||||
* Wed Jul 02 2025 Eduard Abdullin <eabdullin@almalinux.org> - 1:3.5.1-1.alma.1
|
||||
- Redefine sslarch for x86_64_v2 arch
|
||||
|
||||
* Tue Jul 01 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.1-1
|
||||
- Rebasing to OpenSSL 3.5.1
|
||||
Resolves: RHEL-90350
|
||||
Resolves: RHEL-95613
|
||||
Resolves: RHEL-97796
|
||||
Resolves: RHEL-99353
|
||||
Resolves: RHEL-100168
|
||||
|
||||
* Thu Jun 05 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.0-8
|
||||
- rebuilt
|
||||
Related: RHEL-80811
|
||||
|
2
sources
2
sources
@ -1 +1 @@
|
||||
SHA512 (openssl-3.5.0.tar.gz) = 39cc80e2843a2ee30f3f5de25cd9d0f759ad8de71b0b39f5a679afaaa74f4eb58d285ae50e29e4a27b139b49343ac91d1f05478f96fb0c6b150f16d7b634676f
|
||||
SHA512 (openssl-3.5.1.tar.gz) = 0fa152ae59ab5ea066319de039dfb1d24cbb247172d7512feb5dd920db3740f219d76b0195ea562f84fe5eae36c23772302eddfbb3509df13761452b4dafb9d3
|
||||
|
Loading…
Reference in New Issue
Block a user