Redefine sslarch for x86_64_v2 arch
This commit is contained in:
commit
ed94729646
1
.gitignore
vendored
1
.gitignore
vendored
@ -63,3 +63,4 @@ openssl-1.0.0a-usa.tar.bz2
|
|||||||
/openssl-3.2.1.tar.gz
|
/openssl-3.2.1.tar.gz
|
||||||
/openssl-3.2.2.tar.gz
|
/openssl-3.2.2.tar.gz
|
||||||
/openssl-3.5.0.tar.gz
|
/openssl-3.5.0.tar.gz
|
||||||
|
/openssl-3.5.1.tar.gz
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From fb792883f3ccc55997fdc21a9c1052f778dea1ac Mon Sep 17 00:00:00 2001
|
From bc8c037733c26d4c4a2a3dfd1e383be9855449b3 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||||
Subject: [PATCH 01/58] RH: Aarch64 and ppc64le use lib64
|
Subject: [PATCH 01/53] RH: Aarch64 and ppc64le use lib64
|
||||||
|
|
||||||
Patch-name: 0001-Aarch64-and-ppc64le-use-lib64.patch
|
Patch-name: 0001-Aarch64-and-ppc64le-use-lib64.patch
|
||||||
Patch-id: 1
|
Patch-id: 1
|
||||||
@ -34,5 +34,5 @@ index cba57b4127..3e327017ef 100644
|
|||||||
"linux-arm64ilp32" => { # https://wiki.linaro.org/Platform/arm64-ilp32
|
"linux-arm64ilp32" => { # https://wiki.linaro.org/Platform/arm64-ilp32
|
||||||
inherit_from => [ "linux-generic32" ],
|
inherit_from => [ "linux-generic32" ],
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 193d88dfd8d131d2057fc69b4e2abb66f51924d0 Mon Sep 17 00:00:00 2001
|
From 99e084a168125827163da87f3f1de3f05db99be1 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Thu, 6 Mar 2025 08:40:29 -0500
|
Date: Thu, 6 Mar 2025 08:40:29 -0500
|
||||||
Subject: [PATCH 02/58] Add a separate config file to use for rpm installs
|
Subject: [PATCH 02/53] Add a separate config file to use for rpm installs
|
||||||
|
|
||||||
In RHEL/Fedora systems we want to use a slightly different set
|
In RHEL/Fedora systems we want to use a slightly different set
|
||||||
of defaults, but we do not want to change the standard config file
|
of defaults, but we do not want to change the standard config file
|
||||||
@ -44,7 +44,7 @@ index e24ea0c595..39fa468320 100644
|
|||||||
If no providers are activated explicitly, the default one is activated implicitly.
|
If no providers are activated explicitly, the default one is activated implicitly.
|
||||||
diff --git a/rh-openssl.cnf b/rh-openssl.cnf
|
diff --git a/rh-openssl.cnf b/rh-openssl.cnf
|
||||||
new file mode 100644
|
new file mode 100644
|
||||||
index 0000000000..20f5962541
|
index 0000000000..fe2346eb2b
|
||||||
--- /dev/null
|
--- /dev/null
|
||||||
+++ b/rh-openssl.cnf
|
+++ b/rh-openssl.cnf
|
||||||
@@ -0,0 +1,403 @@
|
@@ -0,0 +1,403 @@
|
||||||
@ -66,7 +66,7 @@ index 0000000000..20f5962541
|
|||||||
+# Use this in order to automatically load providers.
|
+# Use this in order to automatically load providers.
|
||||||
+openssl_conf = openssl_init
|
+openssl_conf = openssl_init
|
||||||
+
|
+
|
||||||
+# Comment out the next line to ignore configuration errors
|
+# Ignore configuration errors
|
||||||
+config_diagnostics = 0
|
+config_diagnostics = 0
|
||||||
+
|
+
|
||||||
+# Extra OBJECT IDENTIFIER info:
|
+# Extra OBJECT IDENTIFIER info:
|
||||||
@ -452,5 +452,5 @@ index 0000000000..20f5962541
|
|||||||
+cmd = rr
|
+cmd = rr
|
||||||
+oldcert = $insta::certout # insta.cert.pem
|
+oldcert = $insta::certout # insta.cert.pem
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 786b3456ad2d3d37e9729b83d0ddce8794060fb1 Mon Sep 17 00:00:00 2001
|
From 371ef9d39cb5a54d7f22ef1abd6340dbadf88fcd Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||||
Subject: [PATCH 03/58] RH: Do not install html docs
|
Subject: [PATCH 03/53] RH: Do not install html docs
|
||||||
|
|
||||||
Patch-name: 0003-Do-not-install-html-docs.patch
|
Patch-name: 0003-Do-not-install-html-docs.patch
|
||||||
Patch-id: 3
|
Patch-id: 3
|
||||||
@ -13,7 +13,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
|||||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tmpl
|
diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tmpl
|
||||||
index e85763ccf8..8a829be037 100644
|
index a6f666957e..b1d8b00755 100644
|
||||||
--- a/Configurations/unix-Makefile.tmpl
|
--- a/Configurations/unix-Makefile.tmpl
|
||||||
+++ b/Configurations/unix-Makefile.tmpl
|
+++ b/Configurations/unix-Makefile.tmpl
|
||||||
@@ -658,7 +658,7 @@ install_sw: install_dev install_engines install_modules install_runtime ## Insta
|
@@ -658,7 +658,7 @@ install_sw: install_dev install_engines install_modules install_runtime ## Insta
|
||||||
@ -26,5 +26,5 @@ index e85763ccf8..8a829be037 100644
|
|||||||
uninstall_docs: uninstall_man_docs uninstall_html_docs ## Uninstall manpages and HTML documentation
|
uninstall_docs: uninstall_man_docs uninstall_html_docs ## Uninstall manpages and HTML documentation
|
||||||
$(RM) -r "$(DESTDIR)$(DOCDIR)"
|
$(RM) -r "$(DESTDIR)$(DOCDIR)"
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 9e410805cbd962214f0c0db785320f5fd594ea75 Mon Sep 17 00:00:00 2001
|
From 79787a5bb85fed3c6998bfe3aebcdff9ffa56edf Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||||
Subject: [PATCH 04/58] RH: apps ca fix md option help text.patch - DROP?
|
Subject: [PATCH 04/53] RH: apps ca fix md option help text.patch - DROP?
|
||||||
|
|
||||||
Patch-name: 0005-apps-ca-fix-md-option-help-text.patch
|
Patch-name: 0005-apps-ca-fix-md-option-help-text.patch
|
||||||
Patch-id: 5
|
Patch-id: 5
|
||||||
@ -26,5 +26,5 @@ index 6d1d1c0a6e..a7553ba609 100644
|
|||||||
{"keyform", OPT_KEYFORM, 'f',
|
{"keyform", OPT_KEYFORM, 'f',
|
||||||
"Private key file format (ENGINE, other values ignored)"},
|
"Private key file format (ENGINE, other values ignored)"},
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From fc8b2977d0b92f5a2e62131e398857ee431bff6e Mon Sep 17 00:00:00 2001
|
From c99e322d8f8ea6835f2d8aff4ca33d36410c4233 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||||
Subject: [PATCH 05/58] RH: Disable signature verification with bad digests -
|
Subject: [PATCH 05/53] RH: Disable signature verification with bad digests -
|
||||||
REVIEW
|
REVIEW
|
||||||
|
|
||||||
Patch-name: 0006-Disable-signature-verification-with-totally-unsafe-h.patch
|
Patch-name: 0006-Disable-signature-verification-with-totally-unsafe-h.patch
|
||||||
@ -30,5 +30,5 @@ index f6cac80962..fbc6ce6e30 100644
|
|||||||
const EVP_MD *type = NULL;
|
const EVP_MD *type = NULL;
|
||||||
|
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From e4f78101181c2a16343c0f281d218fde34b84637 Mon Sep 17 00:00:00 2001
|
From f54b7469e2525ea5f03113fad7169bd23fbcab50 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
Date: Wed, 6 Mar 2024 19:17:14 +0100
|
||||||
Subject: [PATCH 06/58] RH: Add support for PROFILE SYSTEM system default
|
Subject: [PATCH 06/53] RH: Add support for PROFILE SYSTEM system default
|
||||||
cipher
|
cipher
|
||||||
|
|
||||||
Patch-name: 0007-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
|
Patch-name: 0007-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
|
||||||
@ -20,7 +20,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
|||||||
7 files changed, 105 insertions(+), 14 deletions(-)
|
7 files changed, 105 insertions(+), 14 deletions(-)
|
||||||
|
|
||||||
diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tmpl
|
diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tmpl
|
||||||
index 8a829be037..ba1266659a 100644
|
index b1d8b00755..91fd703afa 100644
|
||||||
--- a/Configurations/unix-Makefile.tmpl
|
--- a/Configurations/unix-Makefile.tmpl
|
||||||
+++ b/Configurations/unix-Makefile.tmpl
|
+++ b/Configurations/unix-Makefile.tmpl
|
||||||
@@ -344,6 +344,10 @@ MANDIR=$(INSTALLTOP)/share/man
|
@@ -344,6 +344,10 @@ MANDIR=$(INSTALLTOP)/share/man
|
||||||
@ -43,7 +43,7 @@ index 8a829be037..ba1266659a 100644
|
|||||||
@{$config{CPPFLAGS}}) -}
|
@{$config{CPPFLAGS}}) -}
|
||||||
CFLAGS={- join(' ', @{$config{CFLAGS}}) -}
|
CFLAGS={- join(' ', @{$config{CFLAGS}}) -}
|
||||||
diff --git a/Configure b/Configure
|
diff --git a/Configure b/Configure
|
||||||
index 15054f9403..7945d6b750 100755
|
index 499585438a..e1b908fe13 100755
|
||||||
--- a/Configure
|
--- a/Configure
|
||||||
+++ b/Configure
|
+++ b/Configure
|
||||||
@@ -27,7 +27,7 @@ use OpenSSL::config;
|
@@ -27,7 +27,7 @@ use OpenSSL::config;
|
||||||
@ -66,7 +66,7 @@ index 15054f9403..7945d6b750 100755
|
|||||||
# --banner=".." Output specified text instead of default completion banner
|
# --banner=".." Output specified text instead of default completion banner
|
||||||
#
|
#
|
||||||
# -w Don't wait after showing a Configure warning
|
# -w Don't wait after showing a Configure warning
|
||||||
@@ -408,6 +412,7 @@ $config{prefix}="";
|
@@ -409,6 +413,7 @@ $config{prefix}="";
|
||||||
$config{openssldir}="";
|
$config{openssldir}="";
|
||||||
$config{processor}="";
|
$config{processor}="";
|
||||||
$config{libdir}="";
|
$config{libdir}="";
|
||||||
@ -74,7 +74,7 @@ index 15054f9403..7945d6b750 100755
|
|||||||
my $auto_threads=1; # enable threads automatically? true by default
|
my $auto_threads=1; # enable threads automatically? true by default
|
||||||
my $default_ranlib;
|
my $default_ranlib;
|
||||||
|
|
||||||
@@ -1104,6 +1109,10 @@ while (@argvcopy)
|
@@ -1105,6 +1110,10 @@ while (@argvcopy)
|
||||||
die "FIPS key too long (64 bytes max)\n"
|
die "FIPS key too long (64 bytes max)\n"
|
||||||
if length $1 > 64;
|
if length $1 > 64;
|
||||||
}
|
}
|
||||||
@ -106,7 +106,7 @@ index 69195bcdcb..a6e0ede570 100644
|
|||||||
|
|
||||||
"High" encryption cipher suites. This currently means those with key lengths
|
"High" encryption cipher suites. This currently means those with key lengths
|
||||||
diff --git a/include/openssl/ssl.h.in b/include/openssl/ssl.h.in
|
diff --git a/include/openssl/ssl.h.in b/include/openssl/ssl.h.in
|
||||||
index b342079968..0b2232b01c 100644
|
index 383c5bc411..d1b00e8454 100644
|
||||||
--- a/include/openssl/ssl.h.in
|
--- a/include/openssl/ssl.h.in
|
||||||
+++ b/include/openssl/ssl.h.in
|
+++ b/include/openssl/ssl.h.in
|
||||||
@@ -209,6 +209,11 @@ extern "C" {
|
@@ -209,6 +209,11 @@ extern "C" {
|
||||||
@ -281,10 +281,10 @@ index 6127cb7a4b..19420d6c6a 100644
|
|||||||
|
|
||||||
char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
|
char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
|
||||||
diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
|
diff --git a/ssl/ssl_lib.c b/ssl/ssl_lib.c
|
||||||
index 4c7b62e142..7af3f29cd8 100644
|
index 9696a4c55f..4bd3318407 100644
|
||||||
--- a/ssl/ssl_lib.c
|
--- a/ssl/ssl_lib.c
|
||||||
+++ b/ssl/ssl_lib.c
|
+++ b/ssl/ssl_lib.c
|
||||||
@@ -679,7 +679,7 @@ int SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *meth)
|
@@ -686,7 +686,7 @@ int SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *meth)
|
||||||
ctx->tls13_ciphersuites,
|
ctx->tls13_ciphersuites,
|
||||||
&(ctx->cipher_list),
|
&(ctx->cipher_list),
|
||||||
&(ctx->cipher_list_by_id),
|
&(ctx->cipher_list_by_id),
|
||||||
@ -293,7 +293,7 @@ index 4c7b62e142..7af3f29cd8 100644
|
|||||||
if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= 0)) {
|
if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= 0)) {
|
||||||
ERR_raise(ERR_LIB_SSL, SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS);
|
ERR_raise(ERR_LIB_SSL, SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS);
|
||||||
return 0;
|
return 0;
|
||||||
@@ -4099,7 +4099,7 @@ SSL_CTX *SSL_CTX_new_ex(OSSL_LIB_CTX *libctx, const char *propq,
|
@@ -4136,7 +4136,7 @@ SSL_CTX *SSL_CTX_new_ex(OSSL_LIB_CTX *libctx, const char *propq,
|
||||||
if (!ssl_create_cipher_list(ret,
|
if (!ssl_create_cipher_list(ret,
|
||||||
ret->tls13_ciphersuites,
|
ret->tls13_ciphersuites,
|
||||||
&ret->cipher_list, &ret->cipher_list_by_id,
|
&ret->cipher_list, &ret->cipher_list_by_id,
|
||||||
@ -317,5 +317,5 @@ index c46e431b00..19d05e860b 100644
|
|||||||
ADD_TEST(test_default_cipherlist_clear);
|
ADD_TEST(test_default_cipherlist_clear);
|
||||||
ADD_TEST(test_stdname_cipherlist);
|
ADD_TEST(test_stdname_cipherlist);
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 6778626185fb566b9b89f548ff18f481c10ce808 Mon Sep 17 00:00:00 2001
|
From 6a1b39542597be9a28f94dad23a8e93285368653 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 07/58] RH: Add FIPS_mode compatibility macro
|
Subject: [PATCH 07/53] RH: Add FIPS_mode compatibility macro
|
||||||
|
|
||||||
Patch-name: 0008-Add-FIPS_mode-compatibility-macro.patch
|
Patch-name: 0008-Add-FIPS_mode-compatibility-macro.patch
|
||||||
Patch-id: 8
|
Patch-id: 8
|
||||||
@ -79,5 +79,5 @@ index 18f8cc8740..6864b1a3c1 100644
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 9df43c7443d85c5685f87c132de448a7c4e652b5 Mon Sep 17 00:00:00 2001
|
From 15d44a4f1365532f8ebdf24a69c9da7220d5c704 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 08/58] RH: Add Kernel FIPS mode flag support - FIXSTYLE
|
Subject: [PATCH 08/53] RH: Add Kernel FIPS mode flag support - FIXSTYLE
|
||||||
|
|
||||||
Patch-name: 0009-Add-Kernel-FIPS-mode-flag-support.patch
|
Patch-name: 0009-Add-Kernel-FIPS-mode-flag-support.patch
|
||||||
Patch-id: 9
|
Patch-id: 9
|
||||||
@ -74,10 +74,10 @@ index f15bc3d755..614c8a2c88 100644
|
|||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
diff --git a/include/internal/provider.h b/include/internal/provider.h
|
diff --git a/include/internal/provider.h b/include/internal/provider.h
|
||||||
index 6909a1919c..9d2e355251 100644
|
index 7d94346155..c0f1d00da9 100644
|
||||||
--- a/include/internal/provider.h
|
--- a/include/internal/provider.h
|
||||||
+++ b/include/internal/provider.h
|
+++ b/include/internal/provider.h
|
||||||
@@ -111,6 +111,9 @@ int ossl_provider_init_as_child(OSSL_LIB_CTX *ctx,
|
@@ -114,6 +114,9 @@ int ossl_provider_init_as_child(OSSL_LIB_CTX *ctx,
|
||||||
const OSSL_DISPATCH *in);
|
const OSSL_DISPATCH *in);
|
||||||
void ossl_provider_deinit_child(OSSL_LIB_CTX *ctx);
|
void ossl_provider_deinit_child(OSSL_LIB_CTX *ctx);
|
||||||
|
|
||||||
@ -88,5 +88,5 @@ index 6909a1919c..9d2e355251 100644
|
|||||||
}
|
}
|
||||||
# endif
|
# endif
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From f9d74e58291461804defa0e2de9635aad76e5d57 Mon Sep 17 00:00:00 2001
|
From 68174cf923fbaaa95469e433c29992cd63f24f99 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 09/58] RH: Drop weak curve definitions - RENAMED/SQUASHED
|
Subject: [PATCH 09/53] RH: Drop weak curve definitions - RENAMED/SQUASHED
|
||||||
|
|
||||||
Patch-name: 0010-Add-changes-to-ectest-and-eccurve.patch
|
Patch-name: 0010-Add-changes-to-ectest-and-eccurve.patch
|
||||||
Patch-id: 10
|
Patch-id: 10
|
||||||
@ -28,7 +28,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
|||||||
8 files changed, 10 insertions(+), 1157 deletions(-)
|
8 files changed, 10 insertions(+), 1157 deletions(-)
|
||||||
|
|
||||||
diff --git a/apps/speed.c b/apps/speed.c
|
diff --git a/apps/speed.c b/apps/speed.c
|
||||||
index f52f2c839d..1edf9b8485 100644
|
index 6c1eb59e91..3307a9cb46 100644
|
||||||
--- a/apps/speed.c
|
--- a/apps/speed.c
|
||||||
+++ b/apps/speed.c
|
+++ b/apps/speed.c
|
||||||
@@ -405,7 +405,7 @@ static double ffdh_results[FFDH_NUM][1]; /* 1 op: derivation */
|
@@ -405,7 +405,7 @@ static double ffdh_results[FFDH_NUM][1]; /* 1 op: derivation */
|
||||||
@ -1161,7 +1161,7 @@ index 63fe319025..06b5c0aac5 100644
|
|||||||
{NID_secp224r1, NID_sha224,
|
{NID_secp224r1, NID_sha224,
|
||||||
"699325d6fc8fbbb4981a6ded3c3a54ad2e4e3db8a5669201912064c64e700c139248cdc1"
|
"699325d6fc8fbbb4981a6ded3c3a54ad2e4e3db8a5669201912064c64e700c139248cdc1"
|
||||||
diff --git a/test/ectest.c b/test/ectest.c
|
diff --git a/test/ectest.c b/test/ectest.c
|
||||||
index 70df89ee2f..0ddbba3b98 100644
|
index e1cb59d58d..b852381924 100644
|
||||||
--- a/test/ectest.c
|
--- a/test/ectest.c
|
||||||
+++ b/test/ectest.c
|
+++ b/test/ectest.c
|
||||||
@@ -175,184 +175,26 @@ static int prime_field_tests(void)
|
@@ -175,184 +175,26 @@ static int prime_field_tests(void)
|
||||||
@ -1356,7 +1356,7 @@ index 70df89ee2f..0ddbba3b98 100644
|
|||||||
"FFFFFFFF000000000000000000000001"))
|
"FFFFFFFF000000000000000000000001"))
|
||||||
|| !TEST_int_eq(1, BN_check_prime(p, ctx, NULL))
|
|| !TEST_int_eq(1, BN_check_prime(p, ctx, NULL))
|
||||||
|| !TEST_true(BN_hex2bn(&a, "FFFFFFFFFFFFFFFFFFFFFFFF"
|
|| !TEST_true(BN_hex2bn(&a, "FFFFFFFFFFFFFFFFFFFFFFFF"
|
||||||
@@ -3128,7 +2970,7 @@ int setup_tests(void)
|
@@ -3130,7 +2972,7 @@ int setup_tests(void)
|
||||||
|
|
||||||
ADD_TEST(parameter_test);
|
ADD_TEST(parameter_test);
|
||||||
ADD_TEST(ossl_parameter_test);
|
ADD_TEST(ossl_parameter_test);
|
||||||
@ -1425,5 +1425,5 @@ index e6a2c9eb59..861c01e177 100644
|
|||||||
Ctrl = key-check:0
|
Ctrl = key-check:0
|
||||||
+Result = KEYGEN_GENERATE_ERROR
|
+Result = KEYGEN_GENERATE_ERROR
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 27fc7dc53e31b3dcd7ff3df40db1060d7a72f126 Mon Sep 17 00:00:00 2001
|
From 6a2b78bca595435fcbf72d7b2c8bec004d555016 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 10/58] RH: Disable explicit ec curves
|
Subject: [PATCH 10/53] RH: Disable explicit ec curves
|
||||||
|
|
||||||
Patch-name: 0012-Disable-explicit-ec.patch
|
Patch-name: 0012-Disable-explicit-ec.patch
|
||||||
Patch-id: 12
|
Patch-id: 12
|
||||||
@ -80,7 +80,7 @@ index b55677fb1f..1df40018ac 100644
|
|||||||
EC_GROUP_free(group);
|
EC_GROUP_free(group);
|
||||||
group = named_group;
|
group = named_group;
|
||||||
diff --git a/test/ectest.c b/test/ectest.c
|
diff --git a/test/ectest.c b/test/ectest.c
|
||||||
index 0ddbba3b98..f736d13feb 100644
|
index b852381924..6eac5de4fa 100644
|
||||||
--- a/test/ectest.c
|
--- a/test/ectest.c
|
||||||
+++ b/test/ectest.c
|
+++ b/test/ectest.c
|
||||||
@@ -2413,10 +2413,11 @@ static int do_test_custom_explicit_fromdata(EC_GROUP *group, BN_CTX *ctx,
|
@@ -2413,10 +2413,11 @@ static int do_test_custom_explicit_fromdata(EC_GROUP *group, BN_CTX *ctx,
|
||||||
@ -134,7 +134,7 @@ index 0ddbba3b98..f736d13feb 100644
|
|||||||
/* Both sides should expect the same shared secret */
|
/* Both sides should expect the same shared secret */
|
||||||
if (!TEST_mem_eq(buf1, sslen, buf2, t))
|
if (!TEST_mem_eq(buf1, sslen, buf2, t))
|
||||||
goto err;
|
goto err;
|
||||||
@@ -2892,7 +2894,7 @@ static int custom_params_test(int id)
|
@@ -2893,7 +2895,7 @@ static int custom_params_test(int id)
|
||||||
/* compare with previous result */
|
/* compare with previous result */
|
||||||
|| !TEST_mem_eq(buf1, t, buf2, sslen))
|
|| !TEST_mem_eq(buf1, t, buf2, sslen))
|
||||||
goto err;
|
goto err;
|
||||||
@ -240,5 +240,5 @@ index 54b143bead..06ec905be0 100644
|
|||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MGMCAQAwEAYHKoZIzj0CAQYFK4EEAA8ETDBKAgEBBBUDnQW0mLiHVha/jqFznX/K
|
MGMCAQAwEAYHKoZIzj0CAQYFK4EEAA8ETDBKAgEBBBUDnQW0mLiHVha/jqFznX/K
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 2c8e302b4a2f9c4eeec718d2a9d5cef655c28153 Mon Sep 17 00:00:00 2001
|
From 60e56b8d5d031a7169aa4ad07b13bca15faf345b Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 11/58] RH: skipped tests EC curves
|
Subject: [PATCH 11/53] RH: skipped tests EC curves
|
||||||
|
|
||||||
Patch-name: 0013-skipped-tests-EC-curves.patch
|
Patch-name: 0013-skipped-tests-EC-curves.patch
|
||||||
Patch-id: 13
|
Patch-id: 13
|
||||||
@ -78,5 +78,5 @@ index f722800e27..26a01786bb 100644
|
|||||||
my @basic_cmd = ("cmp_vfy_test",
|
my @basic_cmd = ("cmp_vfy_test",
|
||||||
data_file("server.crt"), data_file("client.crt"),
|
data_file("server.crt"), data_file("client.crt"),
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From e87e9fbc6bcf90d43f6e09f7de46f1805e3e6674 Mon Sep 17 00:00:00 2001
|
From e15f0731f753c279a555c6d5d588dbac8dd3f1e4 Mon Sep 17 00:00:00 2001
|
||||||
From: Dmitry Belyavskiy <dbelyavs@redhat.com>
|
From: Dmitry Belyavskiy <dbelyavs@redhat.com>
|
||||||
Date: Thu, 7 Mar 2024 17:37:09 +0100
|
Date: Thu, 7 Mar 2024 17:37:09 +0100
|
||||||
Subject: [PATCH 12/58] RH: skip quic pairwise
|
Subject: [PATCH 12/53] RH: skip quic pairwise
|
||||||
|
|
||||||
Patch-name: 0115-skip-quic-pairwise.patch
|
Patch-name: 0115-skip-quic-pairwise.patch
|
||||||
Patch-id: 115
|
Patch-id: 115
|
||||||
@ -14,10 +14,10 @@ Patch-status: |
|
|||||||
3 files changed, 12 insertions(+), 3 deletions(-)
|
3 files changed, 12 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
diff --git a/test/quicapitest.c b/test/quicapitest.c
|
diff --git a/test/quicapitest.c b/test/quicapitest.c
|
||||||
index 38dd42c184..b2e18522ab 100644
|
index b98a940553..3d946ae93c 100644
|
||||||
--- a/test/quicapitest.c
|
--- a/test/quicapitest.c
|
||||||
+++ b/test/quicapitest.c
|
+++ b/test/quicapitest.c
|
||||||
@@ -2761,7 +2761,9 @@ int setup_tests(void)
|
@@ -2937,7 +2937,9 @@ int setup_tests(void)
|
||||||
ADD_TEST(test_cipher_find);
|
ADD_TEST(test_cipher_find);
|
||||||
ADD_TEST(test_version);
|
ADD_TEST(test_version);
|
||||||
#if defined(DO_SSL_TRACE_TEST)
|
#if defined(DO_SSL_TRACE_TEST)
|
||||||
@ -41,7 +41,7 @@ index 222b1886ae..7e2f65cccb 100644
|
|||||||
note "Duplicates:";
|
note "Duplicates:";
|
||||||
note join('\n', @duplicates);
|
note join('\n', @duplicates);
|
||||||
diff --git a/test/recipes/30-test_pairwise_fail.t b/test/recipes/30-test_pairwise_fail.t
|
diff --git a/test/recipes/30-test_pairwise_fail.t b/test/recipes/30-test_pairwise_fail.t
|
||||||
index a101a26fb1..43e5396766 100644
|
index eaf0dbbb42..21864ad319 100644
|
||||||
--- a/test/recipes/30-test_pairwise_fail.t
|
--- a/test/recipes/30-test_pairwise_fail.t
|
||||||
+++ b/test/recipes/30-test_pairwise_fail.t
|
+++ b/test/recipes/30-test_pairwise_fail.t
|
||||||
@@ -9,7 +9,7 @@
|
@@ -9,7 +9,7 @@
|
||||||
@ -82,5 +82,5 @@ index a101a26fb1..43e5396766 100644
|
|||||||
"-pairwise", "dsa", "-dsaparam", data_file("dsaparam.pem")])),
|
"-pairwise", "dsa", "-dsaparam", data_file("dsaparam.pem")])),
|
||||||
"fips provider dsa keygen pairwise failure test");
|
"fips provider dsa keygen pairwise failure test");
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From c63c81754bcf4bf3aeb4049fc5952368764fb303 Mon Sep 17 00:00:00 2001
|
From 293b5d1bca91e400a9042cc181d17b7facbed71c Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||||
Subject: [PATCH 13/58] RH: version aliasing
|
Subject: [PATCH 13/53] RH: version aliasing
|
||||||
|
|
||||||
Patch-name: 0116-version-aliasing.patch
|
Patch-name: 0116-version-aliasing.patch
|
||||||
Patch-id: 116
|
Patch-id: 116
|
||||||
@ -79,5 +79,5 @@ index ceb4948839..eab3987a6b 100644
|
|||||||
BN_signed_bn2bin 5568 3_2_0 EXIST::FUNCTION:
|
BN_signed_bn2bin 5568 3_2_0 EXIST::FUNCTION:
|
||||||
BN_signed_lebin2bn 5569 3_2_0 EXIST::FUNCTION:
|
BN_signed_lebin2bn 5569 3_2_0 EXIST::FUNCTION:
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From eeaa8125102427cedfda9a1d5bd663956acd8d63 Mon Sep 17 00:00:00 2001
|
From f267ed139ac29efc6d464827024eafb805f06ea2 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Thu, 13 Feb 2025 16:09:09 -0500
|
Date: Thu, 13 Feb 2025 16:09:09 -0500
|
||||||
Subject: [PATCH 14/58] RH: Export two symbols for OPENSSL_str[n]casecmp
|
Subject: [PATCH 14/53] RH: Export two symbols for OPENSSL_str[n]casecmp
|
||||||
|
|
||||||
We accidentally exported the symbols with the incorrect verison number
|
We accidentally exported the symbols with the incorrect verison number
|
||||||
in an early version of RHEL-9 so we need to keep the wrong symbols for
|
in an early version of RHEL-9 so we need to keep the wrong symbols for
|
||||||
@ -104,5 +104,5 @@ index eab3987a6b..d377d542db 100644
|
|||||||
RAND_set0_public 5559 3_1_0 EXIST::FUNCTION:
|
RAND_set0_public 5559 3_1_0 EXIST::FUNCTION:
|
||||||
RAND_set0_private 5560 3_1_0 EXIST::FUNCTION:
|
RAND_set0_private 5560 3_1_0 EXIST::FUNCTION:
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 601c308871191a17620ade34a9edcb8afe969c8d Mon Sep 17 00:00:00 2001
|
From 4badd5b30b1caec6c4fd3875cd4c5313ba6095b1 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Thu, 13 Feb 2025 18:11:19 -0500
|
Date: Thu, 13 Feb 2025 18:11:19 -0500
|
||||||
Subject: [PATCH 15/58] RH: TMP KTLS test skip
|
Subject: [PATCH 15/53] RH: TMP KTLS test skip
|
||||||
|
|
||||||
From-dist-git-commit: 83382cc2a09dfcc55d5740fd08fd95c2333a56c9
|
From-dist-git-commit: 83382cc2a09dfcc55d5740fd08fd95c2333a56c9
|
||||||
---
|
---
|
||||||
@ -9,7 +9,7 @@ From-dist-git-commit: 83382cc2a09dfcc55d5740fd08fd95c2333a56c9
|
|||||||
1 file changed, 3 insertions(+), 2 deletions(-)
|
1 file changed, 3 insertions(+), 2 deletions(-)
|
||||||
|
|
||||||
diff --git a/test/sslapitest.c b/test/sslapitest.c
|
diff --git a/test/sslapitest.c b/test/sslapitest.c
|
||||||
index 38d58e9387..39118a9162 100644
|
index b83dd6c552..250a439137 100644
|
||||||
--- a/test/sslapitest.c
|
--- a/test/sslapitest.c
|
||||||
+++ b/test/sslapitest.c
|
+++ b/test/sslapitest.c
|
||||||
@@ -1023,9 +1023,10 @@ static int execute_test_large_message(const SSL_METHOD *smeth,
|
@@ -1023,9 +1023,10 @@ static int execute_test_large_message(const SSL_METHOD *smeth,
|
||||||
@ -26,5 +26,5 @@ index 38d58e9387..39118a9162 100644
|
|||||||
|
|
||||||
static int ping_pong_query(SSL *clientssl, SSL *serverssl)
|
static int ping_pong_query(SSL *clientssl, SSL *serverssl)
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 84c7c05d38e96d003df43527e4e6abc6dbae2683 Mon Sep 17 00:00:00 2001
|
From 3e6196d5791ce3443f54a379a5fd679c1066c76a Mon Sep 17 00:00:00 2001
|
||||||
From: Dmitry Belyavskiy <dbelyavs@redhat.com>
|
From: Dmitry Belyavskiy <dbelyavs@redhat.com>
|
||||||
Date: Mon, 21 Aug 2023 13:07:07 +0200
|
Date: Mon, 21 Aug 2023 13:07:07 +0200
|
||||||
Subject: [PATCH 16/58] RH: Allow disabling of SHA1 signatures
|
Subject: [PATCH 16/53] RH: Allow disabling of SHA1 signatures
|
||||||
|
|
||||||
Patch-name: 0049-Allow-disabling-of-SHA1-signatures.patch
|
Patch-name: 0049-Allow-disabling-of-SHA1-signatures.patch
|
||||||
Patch-id: 49
|
Patch-id: 49
|
||||||
@ -11,7 +11,7 @@ From-dist-git-commit: 9409bc7044cf4b5773639cce20f51399888c45fd
|
|||||||
---
|
---
|
||||||
crypto/context.c | 70 +++++++++++++++++++
|
crypto/context.c | 70 +++++++++++++++++++
|
||||||
crypto/evp/evp_cnf.c | 13 ++++
|
crypto/evp/evp_cnf.c | 13 ++++
|
||||||
crypto/evp/m_sigver.c | 13 ++++
|
crypto/evp/m_sigver.c | 14 ++++
|
||||||
crypto/evp/pmeth_lib.c | 15 ++++
|
crypto/evp/pmeth_lib.c | 15 ++++
|
||||||
doc/man5/config.pod | 13 ++++
|
doc/man5/config.pod | 13 ++++
|
||||||
include/crypto/context.h | 8 +++
|
include/crypto/context.h | 8 +++
|
||||||
@ -25,7 +25,7 @@ From-dist-git-commit: 9409bc7044cf4b5773639cce20f51399888c45fd
|
|||||||
providers/implementations/signature/rsa_sig.c | 14 +++-
|
providers/implementations/signature/rsa_sig.c | 14 +++-
|
||||||
ssl/t1_lib.c | 8 +++
|
ssl/t1_lib.c | 8 +++
|
||||||
util/libcrypto.num | 2 +
|
util/libcrypto.num | 2 +
|
||||||
16 files changed, 182 insertions(+), 7 deletions(-)
|
16 files changed, 183 insertions(+), 7 deletions(-)
|
||||||
|
|
||||||
diff --git a/crypto/context.c b/crypto/context.c
|
diff --git a/crypto/context.c b/crypto/context.c
|
||||||
index 614c8a2c88..323615e300 100644
|
index 614c8a2c88..323615e300 100644
|
||||||
@ -172,7 +172,7 @@ index 0e7fe64cf9..b9d3b6d226 100644
|
|||||||
ERR_raise_data(ERR_LIB_EVP, EVP_R_UNKNOWN_OPTION,
|
ERR_raise_data(ERR_LIB_EVP, EVP_R_UNKNOWN_OPTION,
|
||||||
"name=%s, value=%s", oval->name, oval->value);
|
"name=%s, value=%s", oval->name, oval->value);
|
||||||
diff --git a/crypto/evp/m_sigver.c b/crypto/evp/m_sigver.c
|
diff --git a/crypto/evp/m_sigver.c b/crypto/evp/m_sigver.c
|
||||||
index 2d1839fedb..6e4685ecc0 100644
|
index d5df497da7..53044238a1 100644
|
||||||
--- a/crypto/evp/m_sigver.c
|
--- a/crypto/evp/m_sigver.c
|
||||||
+++ b/crypto/evp/m_sigver.c
|
+++ b/crypto/evp/m_sigver.c
|
||||||
@@ -15,6 +15,7 @@
|
@@ -15,6 +15,7 @@
|
||||||
@ -183,10 +183,11 @@ index 2d1839fedb..6e4685ecc0 100644
|
|||||||
|
|
||||||
static int update(EVP_MD_CTX *ctx, const void *data, size_t datalen)
|
static int update(EVP_MD_CTX *ctx, const void *data, size_t datalen)
|
||||||
{
|
{
|
||||||
@@ -251,6 +252,18 @@ static int do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx,
|
@@ -253,6 +254,19 @@ static int do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx,
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
desc = signature->description != NULL ? signature->description : "";
|
||||||
|
+
|
||||||
+ if (ctx->reqdigest != NULL
|
+ if (ctx->reqdigest != NULL
|
||||||
+ && !EVP_PKEY_is_a(locpctx->pkey, SN_hmac)
|
+ && !EVP_PKEY_is_a(locpctx->pkey, SN_hmac)
|
||||||
+ && !EVP_PKEY_is_a(locpctx->pkey, SN_tls1_prf)
|
+ && !EVP_PKEY_is_a(locpctx->pkey, SN_tls1_prf)
|
||||||
@ -201,9 +202,9 @@ index 2d1839fedb..6e4685ecc0 100644
|
|||||||
+
|
+
|
||||||
if (ver) {
|
if (ver) {
|
||||||
if (signature->digest_verify_init == NULL) {
|
if (signature->digest_verify_init == NULL) {
|
||||||
ERR_raise(ERR_LIB_EVP, EVP_R_INITIALIZATION_ERROR);
|
ERR_raise_data(ERR_LIB_EVP, EVP_R_PROVIDER_SIGNATURE_NOT_SUPPORTED,
|
||||||
diff --git a/crypto/evp/pmeth_lib.c b/crypto/evp/pmeth_lib.c
|
diff --git a/crypto/evp/pmeth_lib.c b/crypto/evp/pmeth_lib.c
|
||||||
index 665cafbc21..84fb95d4ca 100644
|
index 08c0d6a7b2..b936ad4447 100644
|
||||||
--- a/crypto/evp/pmeth_lib.c
|
--- a/crypto/evp/pmeth_lib.c
|
||||||
+++ b/crypto/evp/pmeth_lib.c
|
+++ b/crypto/evp/pmeth_lib.c
|
||||||
@@ -33,6 +33,7 @@
|
@@ -33,6 +33,7 @@
|
||||||
@ -214,7 +215,7 @@ index 665cafbc21..84fb95d4ca 100644
|
|||||||
#include "evp_local.h"
|
#include "evp_local.h"
|
||||||
|
|
||||||
#ifndef FIPS_MODULE
|
#ifndef FIPS_MODULE
|
||||||
@@ -954,6 +955,20 @@ static int evp_pkey_ctx_set_md(EVP_PKEY_CTX *ctx, const EVP_MD *md,
|
@@ -963,6 +964,20 @@ static int evp_pkey_ctx_set_md(EVP_PKEY_CTX *ctx, const EVP_MD *md,
|
||||||
return -2;
|
return -2;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -435,7 +436,7 @@ index e75b90840b..645304b951 100644
|
|||||||
if (pmgf1mdname != NULL
|
if (pmgf1mdname != NULL
|
||||||
&& !rsa_setup_mgf1_md(prsactx, pmgf1mdname, pmgf1mdprops))
|
&& !rsa_setup_mgf1_md(prsactx, pmgf1mdname, pmgf1mdprops))
|
||||||
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
|
diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
|
||||||
index 8d0c2647b7..f6117a1fc5 100644
|
index 2f71f95438..bea5cab253 100644
|
||||||
--- a/ssl/t1_lib.c
|
--- a/ssl/t1_lib.c
|
||||||
+++ b/ssl/t1_lib.c
|
+++ b/ssl/t1_lib.c
|
||||||
@@ -21,6 +21,7 @@
|
@@ -21,6 +21,7 @@
|
||||||
@ -446,7 +447,7 @@ index 8d0c2647b7..f6117a1fc5 100644
|
|||||||
#include "internal/nelem.h"
|
#include "internal/nelem.h"
|
||||||
#include "internal/sizes.h"
|
#include "internal/sizes.h"
|
||||||
#include "internal/tlsgroups.h"
|
#include "internal/tlsgroups.h"
|
||||||
@@ -2176,6 +2177,7 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
@@ -2178,6 +2179,7 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||||
EVP_PKEY *tmpkey = EVP_PKEY_new();
|
EVP_PKEY *tmpkey = EVP_PKEY_new();
|
||||||
int istls;
|
int istls;
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
@ -454,7 +455,7 @@ index 8d0c2647b7..f6117a1fc5 100644
|
|||||||
|
|
||||||
if (ctx == NULL)
|
if (ctx == NULL)
|
||||||
goto err;
|
goto err;
|
||||||
@@ -2193,6 +2195,7 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
@@ -2195,6 +2197,7 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
ERR_set_mark();
|
ERR_set_mark();
|
||||||
@ -462,7 +463,7 @@ index 8d0c2647b7..f6117a1fc5 100644
|
|||||||
/* First fill cache and tls12_sigalgs list from legacy algorithm list */
|
/* First fill cache and tls12_sigalgs list from legacy algorithm list */
|
||||||
for (i = 0, lu = sigalg_lookup_tbl;
|
for (i = 0, lu = sigalg_lookup_tbl;
|
||||||
i < OSSL_NELEM(sigalg_lookup_tbl); lu++, i++) {
|
i < OSSL_NELEM(sigalg_lookup_tbl); lu++, i++) {
|
||||||
@@ -2213,6 +2216,11 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
@@ -2215,6 +2218,11 @@ int ssl_setup_sigalgs(SSL_CTX *ctx)
|
||||||
cache[i].available = 0;
|
cache[i].available = 0;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
@ -485,5 +486,5 @@ index d377d542db..c2c55129ae 100644
|
|||||||
+ossl_ctx_legacy_digest_signatures_allowed ? 3_0_1 EXIST::FUNCTION:
|
+ossl_ctx_legacy_digest_signatures_allowed ? 3_0_1 EXIST::FUNCTION:
|
||||||
+ossl_ctx_legacy_digest_signatures_allowed_set ? 3_0_1 EXIST::FUNCTION:
|
+ossl_ctx_legacy_digest_signatures_allowed_set ? 3_0_1 EXIST::FUNCTION:
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 16fdb39036e7e8438c5b97359818cd9bc472196f Mon Sep 17 00:00:00 2001
|
From 7b1b68328f640d184d6ac769a07aa436b0c3f318 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Fri, 7 Mar 2025 18:12:33 -0500
|
Date: Fri, 7 Mar 2025 18:12:33 -0500
|
||||||
Subject: [PATCH 17/58] FIPS: Red Hat's FIPS module name and version
|
Subject: [PATCH 17/53] FIPS: Red Hat's FIPS module name and version
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -9,10 +9,10 @@ Signed-off-by: Simo Sorce <simo@redhat.com>
|
|||||||
1 file changed, 3 insertions(+), 3 deletions(-)
|
1 file changed, 3 insertions(+), 3 deletions(-)
|
||||||
|
|
||||||
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
||||||
index 373cd1c2e4..aa1ab85470 100644
|
index 4b9a057462..1e90f363af 100644
|
||||||
--- a/providers/fips/fipsprov.c
|
--- a/providers/fips/fipsprov.c
|
||||||
+++ b/providers/fips/fipsprov.c
|
+++ b/providers/fips/fipsprov.c
|
||||||
@@ -199,13 +199,13 @@ static int fips_get_params(void *provctx, OSSL_PARAM params[])
|
@@ -200,13 +200,13 @@ static int fips_get_params(void *provctx, OSSL_PARAM params[])
|
||||||
OSSL_LIB_CTX_FIPS_PROV_INDEX);
|
OSSL_LIB_CTX_FIPS_PROV_INDEX);
|
||||||
|
|
||||||
p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME);
|
p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME);
|
||||||
@ -30,5 +30,5 @@ index 373cd1c2e4..aa1ab85470 100644
|
|||||||
p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS);
|
p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_STATUS);
|
||||||
if (p != NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running()))
|
if (p != NULL && !OSSL_PARAM_set_int(p, ossl_prov_is_running()))
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From f40c27149fd5bb1864d069b3d116ffd88cca5f2f Mon Sep 17 00:00:00 2001
|
From 4e6b86b5130552bfee64c7ecaf045ec00749ecbd Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 18/58] FIPS: disable fipsinstall
|
Subject: [PATCH 18/53] FIPS: disable fipsinstall
|
||||||
|
|
||||||
Patch-name: 0034.fipsinstall_disable.patch
|
Patch-name: 0034.fipsinstall_disable.patch
|
||||||
Patch-id: 34
|
Patch-id: 34
|
||||||
@ -800,10 +800,10 @@ index a25ced3383..15748c5756 100644
|
|||||||
=head1 COPYRIGHT
|
=head1 COPYRIGHT
|
||||||
|
|
||||||
diff --git a/doc/man7/OSSL_PROVIDER-FIPS.pod b/doc/man7/OSSL_PROVIDER-FIPS.pod
|
diff --git a/doc/man7/OSSL_PROVIDER-FIPS.pod b/doc/man7/OSSL_PROVIDER-FIPS.pod
|
||||||
index 20d35fada8..f8f219d647 100644
|
index 571a1e99e0..1e384a4ff3 100644
|
||||||
--- a/doc/man7/OSSL_PROVIDER-FIPS.pod
|
--- a/doc/man7/OSSL_PROVIDER-FIPS.pod
|
||||||
+++ b/doc/man7/OSSL_PROVIDER-FIPS.pod
|
+++ b/doc/man7/OSSL_PROVIDER-FIPS.pod
|
||||||
@@ -575,7 +575,6 @@ want to operate in a FIPS approved manner. The algorithms are:
|
@@ -588,7 +588,6 @@ process.
|
||||||
|
|
||||||
=head1 SEE ALSO
|
=head1 SEE ALSO
|
||||||
|
|
||||||
@ -866,5 +866,5 @@ index 1f9110ef60..7e80637bd5
|
|||||||
|
|
||||||
# Compatible options for pedantic FIPS compliance
|
# Compatible options for pedantic FIPS compliance
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From ad031aa2b8ec4042b0081f4179b8a05131bd52df Mon Sep 17 00:00:00 2001
|
From a8e98667597d46e69e492779b9d5daa051f6b3b3 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 19/58] FIPS: Force fips provider on
|
Subject: [PATCH 19/53] FIPS: Force fips provider on
|
||||||
|
|
||||||
Patch-name: 0032-Force-fips.patch
|
Patch-name: 0032-Force-fips.patch
|
||||||
Patch-id: 32
|
Patch-id: 32
|
||||||
@ -13,7 +13,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
|||||||
1 file changed, 29 insertions(+), 1 deletion(-)
|
1 file changed, 29 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
diff --git a/crypto/provider_conf.c b/crypto/provider_conf.c
|
diff --git a/crypto/provider_conf.c b/crypto/provider_conf.c
|
||||||
index 5ec50f97e4..a2a9786e1c 100644
|
index 9649517dd2..1e5053cbce 100644
|
||||||
--- a/crypto/provider_conf.c
|
--- a/crypto/provider_conf.c
|
||||||
+++ b/crypto/provider_conf.c
|
+++ b/crypto/provider_conf.c
|
||||||
@@ -10,6 +10,8 @@
|
@@ -10,6 +10,8 @@
|
||||||
@ -75,5 +75,5 @@ index 5ec50f97e4..a2a9786e1c 100644
|
|||||||
}
|
}
|
||||||
|
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From ee1a3977388a9ec10aa4998beb67d8e3b4bfdd9e Mon Sep 17 00:00:00 2001
|
From fff4084252d07eb17e3b944c6438c00aec471c7f Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 20/58] FIPS: INTEG-CHECK: Embed hmac in fips.so - NOTE
|
Subject: [PATCH 20/53] FIPS: INTEG-CHECK: Embed hmac in fips.so - NOTE
|
||||||
|
|
||||||
Corrected by squashing in:
|
Corrected by squashing in:
|
||||||
0052-Restore-the-correct-verify_integrity-function.patch
|
0052-Restore-the-correct-verify_integrity-function.patch
|
||||||
@ -261,5 +261,5 @@ index 0000000000..f05d0dedbe
|
|||||||
+[fips_sect]
|
+[fips_sect]
|
||||||
+activate = 1
|
+activate = 1
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From c202200bda962300ebc7d19e62ea0df734488c0c Mon Sep 17 00:00:00 2001
|
From 9633d1339e383fdb008c25635baa86c58b3dcdc4 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Thu, 20 Feb 2025 15:30:32 -0500
|
Date: Thu, 20 Feb 2025 15:30:32 -0500
|
||||||
Subject: [PATCH 21/58] FIPS: INTEG-CHECK: Add script to hmac-ify fips.so
|
Subject: [PATCH 21/53] FIPS: INTEG-CHECK: Add script to hmac-ify fips.so
|
||||||
|
|
||||||
This script rewrites the fips.so binary to embed the hmac result into it
|
This script rewrites the fips.so binary to embed the hmac result into it
|
||||||
so that after a build it can be called to make the fips.so as modified
|
so that after a build it can be called to make the fips.so as modified
|
||||||
@ -28,5 +28,5 @@ index 0000000000..54ae60b07f
|
|||||||
+objcopy --update-section .rodata1=providers/fips.so.hmac providers/fips.so providers/fips.so.mac
|
+objcopy --update-section .rodata1=providers/fips.so.hmac providers/fips.so providers/fips.so.mac
|
||||||
+mv providers/fips.so.mac providers/fips.so
|
+mv providers/fips.so.mac providers/fips.so
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From d0ad196c07d223cbb1dd2419b1ec0b0e4458febb Mon Sep 17 00:00:00 2001
|
From 391ce06974d5efaf8485ac2386a857d7644db30a Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 22/58] FIPS: INTEG-CHECK: Execute KATS before HMAC - REVIEW
|
Subject: [PATCH 22/53] FIPS: INTEG-CHECK: Execute KATS before HMAC - REVIEW
|
||||||
|
|
||||||
Patch-name: 0047-FIPS-early-KATS.patch
|
Patch-name: 0047-FIPS-early-KATS.patch
|
||||||
Patch-id: 47
|
Patch-id: 47
|
||||||
@ -45,5 +45,5 @@ index 8b17b8ca94..0f5074936f 100644
|
|||||||
rng = ossl_rand_get0_private_noncreating(st->libctx);
|
rng = ossl_rand_get0_private_noncreating(st->libctx);
|
||||||
if (rng != NULL)
|
if (rng != NULL)
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 19617bb4a510d73e5080d026d22b06b637a6ad1a Mon Sep 17 00:00:00 2001
|
From 821f291d29bf73802287ed74922e1d22d840cb46 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 23/58] FIPS: RSA: encrypt limits - REVIEW
|
Subject: [PATCH 23/53] FIPS: RSA: encrypt limits - REVIEW
|
||||||
|
|
||||||
Patch-name: 0058-FIPS-limit-rsa-encrypt.patch
|
Patch-name: 0058-FIPS-limit-rsa-encrypt.patch
|
||||||
Patch-id: 58
|
Patch-id: 58
|
||||||
@ -981,5 +981,5 @@ index f7be2e1872..568a1ddba4
|
|||||||
}
|
}
|
||||||
next if $protocol eq "-tls1_3";
|
next if $protocol eq "-tls1_3";
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 7cb38d617ceb819a58ac14b266787ad3d71f6206 Mon Sep 17 00:00:00 2001
|
From 84dc66a182dba38876b2b519a8a5c9d38fd967a3 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Mon, 24 Mar 2025 10:50:37 -0400
|
Date: Mon, 24 Mar 2025 10:50:37 -0400
|
||||||
Subject: [PATCH 24/58] FIPS: RSA: PCTs
|
Subject: [PATCH 24/53] FIPS: RSA: PCTs
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -153,5 +153,5 @@ index 645304b951..3d5af1046a 100644
|
|||||||
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))rsa_newctx },
|
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))rsa_newctx },
|
||||||
{ OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))rsa_sign_init },
|
{ OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))rsa_sign_init },
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 158637448165abbde8d4b0c24bf4344744b79adc Mon Sep 17 00:00:00 2001
|
From 0e23d3fc43bf4ace817542443d772407a809dd19 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||||
Subject: [PATCH 25/58] FIPS: RSA: encapsulate limits
|
Subject: [PATCH 25/53] FIPS: RSA: encapsulate limits
|
||||||
|
|
||||||
Patch-name: 0091-FIPS-RSA-encapsulate.patch
|
Patch-name: 0091-FIPS-RSA-encapsulate.patch
|
||||||
Patch-id: 91
|
Patch-id: 91
|
||||||
@ -55,5 +55,5 @@ index ecab1454e7..8e5edd35fe 100644
|
|||||||
Op = RSASVE
|
Op = RSASVE
|
||||||
+Result = TEST_ENCAPSULATE_LEN_ERROR
|
+Result = TEST_ENCAPSULATE_LEN_ERROR
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 9595ceef9fe9a45fca1f970706077712dbb9287f Mon Sep 17 00:00:00 2001
|
From bb269a8f52e1be87144247772e2425b2f4911bee Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||||
Subject: [PATCH 26/58] FIPS: RSA: Disallow SHAKE in OAEP and PSS
|
Subject: [PATCH 26/53] FIPS: RSA: Disallow SHAKE in OAEP and PSS
|
||||||
|
|
||||||
According to FIPS 140-3 IG, section C.C, the SHAKE digest algorithms
|
According to FIPS 140-3 IG, section C.C, the SHAKE digest algorithms
|
||||||
must not be used in higher-level algorithms (such as RSA-OAEP and
|
must not be used in higher-level algorithms (such as RSA-OAEP and
|
||||||
@ -93,5 +93,5 @@ index a2bc198a89..2833ca50f3 100644
|
|||||||
if (hLen <= 0)
|
if (hLen <= 0)
|
||||||
goto err;
|
goto err;
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 47cf5bdab3a46ecffd3100330781e6c297e83d66 Mon Sep 17 00:00:00 2001
|
From f177c315c190537fe6a1bb0620024ae86bb95c8a Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Fri, 7 Mar 2025 18:20:30 -0500
|
Date: Fri, 7 Mar 2025 18:20:30 -0500
|
||||||
Subject: [PATCH 27/58] FIPS: RSA: size/mode restrictions
|
Subject: [PATCH 27/53] FIPS: RSA: size/mode restrictions
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -437,5 +437,5 @@ index 17ceb59148..972e90f32f 100644
|
|||||||
# Signing with SHA1 is not allowed in fips mode
|
# Signing with SHA1 is not allowed in fips mode
|
||||||
Availablein = fips
|
Availablein = fips
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From ae1fcbd1129fc53d4ac72148696efd126e574453 Mon Sep 17 00:00:00 2001
|
From bc8584fab56834724a8aa70aba1c1f56f1d794e2 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Mon, 24 Mar 2025 11:03:45 -0400
|
Date: Mon, 24 Mar 2025 11:03:45 -0400
|
||||||
Subject: [PATCH 28/58] FIPS: RSA: Mark x931 as not approved by default
|
Subject: [PATCH 28/53] FIPS: RSA: Mark x931 as not approved by default
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -22,5 +22,5 @@ index 6bd783eb0a..c1b029de86 100644
|
|||||||
OSSL_FIPS_PARAM(kbkdf_key_check, KBKDF_KEY_CHECK, 0)
|
OSSL_FIPS_PARAM(kbkdf_key_check, KBKDF_KEY_CHECK, 0)
|
||||||
OSSL_FIPS_PARAM(tls13_kdf_key_check, TLS13_KDF_KEY_CHECK, 0)
|
OSSL_FIPS_PARAM(tls13_kdf_key_check, TLS13_KDF_KEY_CHECK, 0)
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 4ce72cfe8d1e0b37e882766b449af109d9e7c3f8 Mon Sep 17 00:00:00 2001
|
From 7a34ce0dbb64dd29e412dffb0628815eed4a8b96 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
||||||
Subject: [PATCH 29/58] FIPS: RSA: Remove X9.31 padding signatures tests
|
Subject: [PATCH 29/53] FIPS: RSA: Remove X9.31 padding signatures tests
|
||||||
|
|
||||||
The current draft of FIPS 186-5 [1] no longer contains specifications
|
The current draft of FIPS 186-5 [1] no longer contains specifications
|
||||||
for X9.31 signature padding. Instead, it contains the following
|
for X9.31 signature padding. Instead, it contains the following
|
||||||
@ -278,5 +278,5 @@ index 97ec1ff3e5..31fa0eafc6 100644
|
|||||||
"pss",
|
"pss",
|
||||||
4096,
|
4096,
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 3a9f2ccf8120cbf5b854a403926dce2d772f5f78 Mon Sep 17 00:00:00 2001
|
From c031855ff636806e7811513779e494b92808a1e4 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Wed, 12 Feb 2025 17:12:02 -0500
|
Date: Wed, 12 Feb 2025 17:12:02 -0500
|
||||||
Subject: [PATCH 30/58] FIPS: RSA: NEEDS-REWORK:
|
Subject: [PATCH 30/53] FIPS: RSA: NEEDS-REWORK:
|
||||||
FIPS-Use-OAEP-in-KATs-support-fixed-OAEP-seed
|
FIPS-Use-OAEP-in-KATs-support-fixed-OAEP-seed
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
@ -383,5 +383,5 @@ index 0000000000..2833a383c1
|
|||||||
+--
|
+--
|
||||||
+
|
+
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 9b198c3634fd3871dd535389e7b7c2379f6934fb Mon Sep 17 00:00:00 2001
|
From 5fd8ab23690e661f785336b95799e74b39089790 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
Date: Wed, 6 Mar 2024 19:17:15 +0100
|
||||||
Subject: [PATCH 31/58] FIPS: Deny SHA-1 signature verification
|
Subject: [PATCH 31/53] FIPS: Deny SHA-1 signature verification
|
||||||
|
|
||||||
For RHEL, we already disable SHA-1 signatures by default in the default
|
For RHEL, we already disable SHA-1 signatures by default in the default
|
||||||
provider, so it is unexpected that the FIPS provider would have a more
|
provider, so it is unexpected that the FIPS provider would have a more
|
||||||
@ -704,5 +704,5 @@ index 568a1ddba4..6332aaec4b 100755
|
|||||||
SKIP: {
|
SKIP: {
|
||||||
skip "No IPv4 available on this machine", 4
|
skip "No IPv4 available on this machine", 4
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 39c7eb2e82b9df4ffe58d8e05fbdb9115dde50cc Mon Sep 17 00:00:00 2001
|
From 85acc91ca970f6509e67c93b46be12cf261bd3ad Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
||||||
Subject: [PATCH 32/58] FIPS: RAND: FIPS-140-3 DRBG - NEEDS REVIEW
|
Subject: [PATCH 32/53] FIPS: RAND: FIPS-140-3 DRBG - NEEDS REVIEW
|
||||||
|
|
||||||
providers/implementations/rands/crngt.c is gone
|
providers/implementations/rands/crngt.c is gone
|
||||||
|
|
||||||
@ -14,9 +14,8 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
|||||||
---
|
---
|
||||||
crypto/rand/prov_seed.c | 9 ++-
|
crypto/rand/prov_seed.c | 9 ++-
|
||||||
providers/implementations/rands/drbg.c | 11 ++-
|
providers/implementations/rands/drbg.c | 11 ++-
|
||||||
providers/implementations/rands/drbg_local.h | 2 +-
|
|
||||||
.../implementations/rands/seeding/rand_unix.c | 68 ++-----------------
|
.../implementations/rands/seeding/rand_unix.c | 68 ++-----------------
|
||||||
4 files changed, 23 insertions(+), 67 deletions(-)
|
3 files changed, 22 insertions(+), 66 deletions(-)
|
||||||
|
|
||||||
diff --git a/crypto/rand/prov_seed.c b/crypto/rand/prov_seed.c
|
diff --git a/crypto/rand/prov_seed.c b/crypto/rand/prov_seed.c
|
||||||
index 2985c7f2d8..3202a28226 100644
|
index 2985c7f2d8..3202a28226 100644
|
||||||
@ -68,19 +67,6 @@ index 4925a3b400..1cdb67b22c 100644
|
|||||||
|
|
||||||
if (reseed_required || prediction_resistance) {
|
if (reseed_required || prediction_resistance) {
|
||||||
if (!ossl_prov_drbg_reseed_unlocked(drbg, prediction_resistance, NULL,
|
if (!ossl_prov_drbg_reseed_unlocked(drbg, prediction_resistance, NULL,
|
||||||
diff --git a/providers/implementations/rands/drbg_local.h b/providers/implementations/rands/drbg_local.h
|
|
||||||
index e591e0b3d1..c7cafba1ea 100644
|
|
||||||
--- a/providers/implementations/rands/drbg_local.h
|
|
||||||
+++ b/providers/implementations/rands/drbg_local.h
|
|
||||||
@@ -39,7 +39,7 @@
|
|
||||||
*
|
|
||||||
* The value is in bytes.
|
|
||||||
*/
|
|
||||||
-#define CRNGT_BUFSIZ 16
|
|
||||||
+#define CRNGT_BUFSIZ 32
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Maximum input size for the DRBG (entropy, nonce, personalization string)
|
|
||||||
diff --git a/providers/implementations/rands/seeding/rand_unix.c b/providers/implementations/rands/seeding/rand_unix.c
|
diff --git a/providers/implementations/rands/seeding/rand_unix.c b/providers/implementations/rands/seeding/rand_unix.c
|
||||||
index c3a5d8b3bf..b7b34a9345 100644
|
index c3a5d8b3bf..b7b34a9345 100644
|
||||||
--- a/providers/implementations/rands/seeding/rand_unix.c
|
--- a/providers/implementations/rands/seeding/rand_unix.c
|
||||||
@ -168,5 +154,5 @@ index c3a5d8b3bf..b7b34a9345 100644
|
|||||||
# endif /* defined(OPENSSL_RAND_SEED_GETRANDOM) */
|
# endif /* defined(OPENSSL_RAND_SEED_GETRANDOM) */
|
||||||
|
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 92c90300747de60df2e805b9fe78fa016f5fd49e Mon Sep 17 00:00:00 2001
|
From d2369dfc75e2b121650bc51f5ac3e0e7c9b75a29 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
Date: Wed, 6 Mar 2024 19:17:16 +0100
|
||||||
Subject: [PATCH 33/58] FIPS: RAND: Forbid truncated hashes & SHA-3
|
Subject: [PATCH 33/53] FIPS: RAND: Forbid truncated hashes & SHA-3
|
||||||
|
|
||||||
Section D.R "Hash Functions Acceptable for Use in the SP 800-90A DRBGs"
|
Section D.R "Hash Functions Acceptable for Use in the SP 800-90A DRBGs"
|
||||||
of the Implementation Guidance for FIPS 140-3 [1] notes that there is no
|
of the Implementation Guidance for FIPS 140-3 [1] notes that there is no
|
||||||
@ -1191,5 +1191,5 @@ index 9756859c0e..9baecf6f31 100644
|
|||||||
+#Nonce.0 = 15e32abbae6b7433
|
+#Nonce.0 = 15e32abbae6b7433
|
||||||
+#Output.0 = ee9f
|
+#Output.0 = ee9f
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 5d5521b81a6714c88438e4f1fb0cf30096a0b0b6 Mon Sep 17 00:00:00 2001
|
From 1a83f0de8b9aaa1cf5727f0599b089346ffd89f4 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||||
Subject: [PATCH 34/58] FIPS: PBKDF2: Set minimum password length
|
Subject: [PATCH 34/53] FIPS: PBKDF2: Set minimum password length
|
||||||
MIME-Version: 1.0
|
MIME-Version: 1.0
|
||||||
Content-Type: text/plain; charset=UTF-8
|
Content-Type: text/plain; charset=UTF-8
|
||||||
Content-Transfer-Encoding: 8bit
|
Content-Transfer-Encoding: 8bit
|
||||||
@ -117,5 +117,5 @@ index b383314064..68f9355b7d 100644
|
|||||||
if (!passed) {
|
if (!passed) {
|
||||||
ERR_raise(ERR_LIB_PROV, error);
|
ERR_raise(ERR_LIB_PROV, error);
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 1f54210f4e4de1f2143d02f6d0b56cc388b617cd Mon Sep 17 00:00:00 2001
|
From 5276208d8cb9a1504ec5a4f9a9d554daf7918731 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Mon, 24 Mar 2025 10:49:00 -0400
|
Date: Mon, 24 Mar 2025 10:49:00 -0400
|
||||||
Subject: [PATCH 35/58] FIPS: DH: PCT
|
Subject: [PATCH 35/53] FIPS: DH: PCT
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -69,5 +69,5 @@ index 7132b9b68e..189bfc3e8b 100644
|
|||||||
ok = 1;
|
ok = 1;
|
||||||
err:
|
err:
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 863cb10f0add28b1d82ec3042d2e7b418169b48a Mon Sep 17 00:00:00 2001
|
From ad3ca70961e0067afd8c8b386fdcc61a576ac11b Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||||
Subject: [PATCH 36/58] FIPS: DH: Disable FIPS 186-4 type parameters
|
Subject: [PATCH 36/53] FIPS: DH: Disable FIPS 186-4 type parameters
|
||||||
|
|
||||||
For DH parameter and key pair generation/verification, the DSA
|
For DH parameter and key pair generation/verification, the DSA
|
||||||
procedures specified in FIPS 186-4 are used. With the release of FIPS
|
procedures specified in FIPS 186-4 are used. With the release of FIPS
|
||||||
@ -156,7 +156,7 @@ index 189bfc3e8b..023d628502 100644
|
|||||||
}
|
}
|
||||||
|
|
||||||
diff --git a/crypto/dh/dh_pmeth.c b/crypto/dh/dh_pmeth.c
|
diff --git a/crypto/dh/dh_pmeth.c b/crypto/dh/dh_pmeth.c
|
||||||
index c11ada9826..e279e9d60d 100644
|
index 3b75a537b3..6ea7a423d5 100644
|
||||||
--- a/crypto/dh/dh_pmeth.c
|
--- a/crypto/dh/dh_pmeth.c
|
||||||
+++ b/crypto/dh/dh_pmeth.c
|
+++ b/crypto/dh/dh_pmeth.c
|
||||||
@@ -303,13 +303,17 @@ static DH *ffc_params_generate(OSSL_LIB_CTX *libctx, DH_PKEY_CTX *dctx,
|
@@ -303,13 +303,17 @@ static DH *ffc_params_generate(OSSL_LIB_CTX *libctx, DH_PKEY_CTX *dctx,
|
||||||
@ -326,5 +326,5 @@ index 6332aaec4b..4d8c900c00 100755
|
|||||||
'test sslv2/sslv3 with 1024bit DHE via BIO pair');
|
'test sslv2/sslv3 with 1024bit DHE via BIO pair');
|
||||||
}
|
}
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 900d90fa1e34bfbbfcc91face57680c0424f2014 Mon Sep 17 00:00:00 2001
|
From 14cddfc71e0eae69aafdf84c1dfb073bb69942f1 Mon Sep 17 00:00:00 2001
|
||||||
From: rpm-build <rpm-build>
|
From: rpm-build <rpm-build>
|
||||||
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
Date: Wed, 6 Mar 2024 19:17:17 +0100
|
||||||
Subject: [PATCH 37/58] FIPS: TLS: Enforce EMS in TLS 1.2 - NOTE
|
Subject: [PATCH 37/53] FIPS: TLS: Enforce EMS in TLS 1.2 - NOTE
|
||||||
|
|
||||||
NOTE: Enforcement of EMS in non-FIPS mode has been dropped due to code
|
NOTE: Enforcement of EMS in non-FIPS mode has been dropped due to code
|
||||||
change the option to enforce it seem to be available only in FIPS build
|
change the option to enforce it seem to be available only in FIPS build
|
||||||
@ -25,7 +25,7 @@ From-dist-git-commit: 4334bc837fbc64d14890fdc51679a80770d498ce
|
|||||||
9 files changed, 46 insertions(+), 5 deletions(-)
|
9 files changed, 46 insertions(+), 5 deletions(-)
|
||||||
|
|
||||||
diff --git a/doc/man3/SSL_CONF_cmd.pod b/doc/man3/SSL_CONF_cmd.pod
|
diff --git a/doc/man3/SSL_CONF_cmd.pod b/doc/man3/SSL_CONF_cmd.pod
|
||||||
index e2c1e69847..009b683b27 100644
|
index 9338ffc01d..911ea21a68 100644
|
||||||
--- a/doc/man3/SSL_CONF_cmd.pod
|
--- a/doc/man3/SSL_CONF_cmd.pod
|
||||||
+++ b/doc/man3/SSL_CONF_cmd.pod
|
+++ b/doc/man3/SSL_CONF_cmd.pod
|
||||||
@@ -621,6 +621,9 @@ B<ExtendedMasterSecret>: use extended master secret extension, enabled by
|
@@ -621,6 +621,9 @@ B<ExtendedMasterSecret>: use extended master secret extension, enabled by
|
||||||
@ -63,7 +63,7 @@ index 15748c5756..34cbfbb2ad 100644
|
|||||||
|
|
||||||
Copyright 2019-2024 The OpenSSL Project Authors. All Rights Reserved.
|
Copyright 2019-2024 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
diff --git a/include/openssl/ssl.h.in b/include/openssl/ssl.h.in
|
diff --git a/include/openssl/ssl.h.in b/include/openssl/ssl.h.in
|
||||||
index 0b2232b01c..99b2ad4eb3 100644
|
index d1b00e8454..b815f25dae 100644
|
||||||
--- a/include/openssl/ssl.h.in
|
--- a/include/openssl/ssl.h.in
|
||||||
+++ b/include/openssl/ssl.h.in
|
+++ b/include/openssl/ssl.h.in
|
||||||
@@ -417,6 +417,7 @@ typedef int (*SSL_async_callback_fn)(SSL *s, void *arg);
|
@@ -417,6 +417,7 @@ typedef int (*SSL_async_callback_fn)(SSL *s, void *arg);
|
||||||
@ -175,7 +175,7 @@ index 50944328cb..edb2e81273 100644
|
|||||||
KDF = TLS1-PRF
|
KDF = TLS1-PRF
|
||||||
Ctrl.digest = digest:SHA256
|
Ctrl.digest = digest:SHA256
|
||||||
diff --git a/test/sslapitest.c b/test/sslapitest.c
|
diff --git a/test/sslapitest.c b/test/sslapitest.c
|
||||||
index 39118a9162..9522478ad2 100644
|
index 250a439137..acc4751095 100644
|
||||||
--- a/test/sslapitest.c
|
--- a/test/sslapitest.c
|
||||||
+++ b/test/sslapitest.c
|
+++ b/test/sslapitest.c
|
||||||
@@ -575,7 +575,7 @@ static int test_client_cert_verify_cb(void)
|
@@ -575,7 +575,7 @@ static int test_client_cert_verify_cb(void)
|
||||||
@ -188,5 +188,5 @@ index 39118a9162..9522478ad2 100644
|
|||||||
if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(),
|
if (!TEST_true(create_ssl_ctx_pair(libctx, TLS_server_method(),
|
||||||
TLS_client_method(), TLS1_VERSION, 0,
|
TLS_client_method(), TLS1_VERSION, 0,
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From a227572868569ba87b9aef722a8d981ad5feb11b Mon Sep 17 00:00:00 2001
|
From ecc156faf9f4d65fd73a8ef7d8ec87f5b4c0ab88 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Thu, 13 Feb 2025 18:08:34 -0500
|
Date: Thu, 13 Feb 2025 18:08:34 -0500
|
||||||
Subject: [PATCH 38/58] FIPS: CMS: Set default padding to OAEP
|
Subject: [PATCH 38/53] FIPS: CMS: Set default padding to OAEP
|
||||||
|
|
||||||
From-dist-git-commit: d508cbed930481c1960d6a6bc1e1a9593252dbbe
|
From-dist-git-commit: d508cbed930481c1960d6a6bc1e1a9593252dbbe
|
||||||
---
|
---
|
||||||
@ -57,5 +57,5 @@ index 375239c78d..e09ad03ece 100644
|
|||||||
|
|
||||||
if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0)
|
if (EVP_PKEY_encrypt(pctx, NULL, &eklen, ec->key, ec->keylen) <= 0)
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 6ca4910fa964f135e5a18b31502bddef3aef1304 Mon Sep 17 00:00:00 2001
|
From 16b5a03db729e5977ab88b3107f99586be34006b Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Thu, 13 Feb 2025 18:16:29 -0500
|
Date: Thu, 13 Feb 2025 18:16:29 -0500
|
||||||
Subject: [PATCH 39/58] FIPS: PKCS12: PBMAC1 defaults
|
Subject: [PATCH 39/53] FIPS: PKCS12: PBMAC1 defaults
|
||||||
|
|
||||||
From-dist-git-commit: 8fc2d4842385584094d57f6f66fcbc2a07865708
|
From-dist-git-commit: 8fc2d4842385584094d57f6f66fcbc2a07865708
|
||||||
---
|
---
|
||||||
@ -31,5 +31,5 @@ index 9964faf21a..59439a8cc0 100644
|
|||||||
if (!PKCS12_set_pbmac1_pbkdf2(p12, mpass, -1, NULL,
|
if (!PKCS12_set_pbmac1_pbkdf2(p12, mpass, -1, NULL,
|
||||||
macsaltlen, maciter,
|
macsaltlen, maciter,
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From fe12acbd953da37dd25e8abca64582c9bdeadf3c Mon Sep 17 00:00:00 2001
|
From eea9e6867012efa55d7ae48ab9a87fd0da382b6b Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Wed, 5 Mar 2025 13:22:03 -0500
|
Date: Wed, 5 Mar 2025 13:22:03 -0500
|
||||||
Subject: [PATCH 40/58] FIPS: Fix encoder/decoder negative test
|
Subject: [PATCH 40/53] FIPS: Fix encoder/decoder negative test
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -31,5 +31,5 @@ index 2acc980e90..660d4e1115
|
|||||||
my $conf2 = srctop_file("test", "default-and-fips.cnf");
|
my $conf2 = srctop_file("test", "default-and-fips.cnf");
|
||||||
ok(run(test(['decoder_propq_test', '-config', $conf2,
|
ok(run(test(['decoder_propq_test', '-config', $conf2,
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From a4fc741bd6e43b301121f01ef7c823a589faad39 Mon Sep 17 00:00:00 2001
|
From 1e029f27fe022949adaba959ac3fa3c3c1eccb0b Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Mon, 24 Mar 2025 10:50:06 -0400
|
Date: Mon, 24 Mar 2025 10:50:06 -0400
|
||||||
Subject: [PATCH 41/58] FIPS: EC: DH/DSA PCTs
|
Subject: [PATCH 41/53] FIPS: EC: DH/DSA PCTs
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -176,5 +176,5 @@ index 4e46eaf9bc..4d7c25728a 100644
|
|||||||
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))ecdsa_newctx },
|
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))ecdsa_newctx },
|
||||||
{ OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))ecdsa_sign_init },
|
{ OSSL_FUNC_SIGNATURE_SIGN_INIT, (void (*)(void))ecdsa_sign_init },
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From c3f3de074f9140dd8f5833f7fe3e751ac0838323 Mon Sep 17 00:00:00 2001
|
From 92b40ca85bbfa7acc9b16f2c7b370f2ea5fa3ffc Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Fri, 7 Mar 2025 18:06:36 -0500
|
Date: Fri, 7 Mar 2025 18:06:36 -0500
|
||||||
Subject: [PATCH 42/58] FIPS: EC: disable weak curves
|
Subject: [PATCH 42/53] FIPS: EC: disable weak curves
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -27,5 +27,5 @@ index f0879dfb11..a6042e7d2a 100644
|
|||||||
comment = "CURVE DESCRIPTION NOT AVAILABLE";
|
comment = "CURVE DESCRIPTION NOT AVAILABLE";
|
||||||
if (sname == NULL)
|
if (sname == NULL)
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From d923f8b4531718ede24814722a0c0f0f912dca7c Mon Sep 17 00:00:00 2001
|
From 2dbc4a1c31e66fd841a87f62834d8d60aff10d45 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Fri, 7 Mar 2025 18:10:52 -0500
|
Date: Fri, 7 Mar 2025 18:10:52 -0500
|
||||||
Subject: [PATCH 43/58] FIPS: NO DSA Support
|
Subject: [PATCH 43/53] FIPS: NO DSA Support
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -18,10 +18,10 @@ Signed-off-by: Simo Sorce <simo@redhat.com>
|
|||||||
mode change 100644 => 100755 test/recipes/30-test_evp.t
|
mode change 100644 => 100755 test/recipes/30-test_evp.t
|
||||||
|
|
||||||
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
||||||
index aa1ab85470..7999744b5a 100644
|
index 1e90f363af..84d8e897cc 100644
|
||||||
--- a/providers/fips/fipsprov.c
|
--- a/providers/fips/fipsprov.c
|
||||||
+++ b/providers/fips/fipsprov.c
|
+++ b/providers/fips/fipsprov.c
|
||||||
@@ -430,7 +430,8 @@ static const OSSL_ALGORITHM fips_keyexch[] = {
|
@@ -431,7 +431,8 @@ static const OSSL_ALGORITHM fips_keyexch[] = {
|
||||||
};
|
};
|
||||||
|
|
||||||
static const OSSL_ALGORITHM fips_signature[] = {
|
static const OSSL_ALGORITHM fips_signature[] = {
|
||||||
@ -31,7 +31,7 @@ index aa1ab85470..7999744b5a 100644
|
|||||||
{ PROV_NAMES_DSA, FIPS_DEFAULT_PROPERTIES, ossl_dsa_signature_functions },
|
{ PROV_NAMES_DSA, FIPS_DEFAULT_PROPERTIES, ossl_dsa_signature_functions },
|
||||||
{ PROV_NAMES_DSA_SHA1, FIPS_DEFAULT_PROPERTIES, ossl_dsa_sha1_signature_functions },
|
{ PROV_NAMES_DSA_SHA1, FIPS_DEFAULT_PROPERTIES, ossl_dsa_sha1_signature_functions },
|
||||||
{ PROV_NAMES_DSA_SHA224, FIPS_DEFAULT_PROPERTIES, ossl_dsa_sha224_signature_functions },
|
{ PROV_NAMES_DSA_SHA224, FIPS_DEFAULT_PROPERTIES, ossl_dsa_sha224_signature_functions },
|
||||||
@@ -560,8 +561,9 @@ static const OSSL_ALGORITHM fips_keymgmt[] = {
|
@@ -561,8 +562,9 @@ static const OSSL_ALGORITHM fips_keymgmt[] = {
|
||||||
PROV_DESCS_DHX },
|
PROV_DESCS_DHX },
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
@ -396,5 +396,5 @@ index ece29485f4..756f90c1bd 100644
|
|||||||
"-signer", $smrsa1,
|
"-signer", $smrsa1,
|
||||||
"-signer", catfile($smdir, "smrsa2.pem"),
|
"-signer", catfile($smdir, "smrsa2.pem"),
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From ca860bb5c16d9a96afb32e025b54db76e5f8cfd3 Mon Sep 17 00:00:00 2001
|
From 8774a96fde9355aa32c040c145e4f35d7c09a5bd Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Fri, 7 Mar 2025 18:15:13 -0500
|
Date: Fri, 7 Mar 2025 18:15:13 -0500
|
||||||
Subject: [PATCH 44/58] FIPS: NO DES support
|
Subject: [PATCH 44/53] FIPS: NO DES support
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -14,10 +14,10 @@ Signed-off-by: Simo Sorce <simo@redhat.com>
|
|||||||
6 files changed, 14 insertions(+), 23 deletions(-)
|
6 files changed, 14 insertions(+), 23 deletions(-)
|
||||||
|
|
||||||
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
||||||
index 7999744b5a..30f0c8ca14 100644
|
index 84d8e897cc..4b394c3e39 100644
|
||||||
--- a/providers/fips/fipsprov.c
|
--- a/providers/fips/fipsprov.c
|
||||||
+++ b/providers/fips/fipsprov.c
|
+++ b/providers/fips/fipsprov.c
|
||||||
@@ -354,7 +354,8 @@ static const OSSL_ALGORITHM_CAPABLE fips_ciphers[] = {
|
@@ -355,7 +355,8 @@ static const OSSL_ALGORITHM_CAPABLE fips_ciphers[] = {
|
||||||
ossl_cipher_capable_aes_cbc_hmac_sha256),
|
ossl_cipher_capable_aes_cbc_hmac_sha256),
|
||||||
ALGC(PROV_NAMES_AES_256_CBC_HMAC_SHA256, ossl_aes256cbc_hmac_sha256_functions,
|
ALGC(PROV_NAMES_AES_256_CBC_HMAC_SHA256, ossl_aes256cbc_hmac_sha256_functions,
|
||||||
ossl_cipher_capable_aes_cbc_hmac_sha256),
|
ossl_cipher_capable_aes_cbc_hmac_sha256),
|
||||||
@ -80,7 +80,7 @@ index 2838f343bd..19dd2c6c63 100644
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
diff --git a/test/recipes/30-test_evp_data/evpciph_des3_common.txt b/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
diff --git a/test/recipes/30-test_evp_data/evpciph_des3_common.txt b/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
||||||
index 1947e21f74..119b75d9ce 100644
|
index 6c74b65cef..8bcb78cd2d 100644
|
||||||
--- a/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
--- a/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
||||||
+++ b/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
+++ b/test/recipes/30-test_evp_data/evpciph_des3_common.txt
|
||||||
@@ -14,7 +14,7 @@
|
@@ -14,7 +14,7 @@
|
||||||
@ -132,7 +132,7 @@ index 1947e21f74..119b75d9ce 100644
|
|||||||
Ciphertext = 3FE301C962AC01D02213763C1CBD4CDC799657C064ECF5D41C673812CFDE9675
|
Ciphertext = 3FE301C962AC01D02213763C1CBD4CDC799657C064ECF5D41C673812CFDE9675
|
||||||
|
|
||||||
# Test that DES3 ECB mode encryption is not FIPS approved
|
# Test that DES3 ECB mode encryption is not FIPS approved
|
||||||
-Availablein = fipss
|
-Availablein = fips
|
||||||
-FIPSversion = >=3.4.0
|
-FIPSversion = >=3.4.0
|
||||||
+Availablein = none
|
+Availablein = none
|
||||||
Cipher = DES-EDE3-ECB
|
Cipher = DES-EDE3-ECB
|
||||||
@ -170,5 +170,5 @@ index 756f90c1bd..ac833d2a2f 100644
|
|||||||
"-des3", "-secretkey", "000102030405060708090A0B0C0D0E0F1011121314151617",
|
"-des3", "-secretkey", "000102030405060708090A0B0C0D0E0F1011121314151617",
|
||||||
"-stream", "-out", "{output}.cms" ],
|
"-stream", "-out", "{output}.cms" ],
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 3928272f2d86188ef8796c7d18b1ec7d617cae97 Mon Sep 17 00:00:00 2001
|
From e466bb4e4fa16481cbf44b410933e6dceb8d27d9 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Fri, 7 Mar 2025 18:22:07 -0500
|
Date: Fri, 7 Mar 2025 18:22:07 -0500
|
||||||
Subject: [PATCH 45/58] FIPS: NO Kmac
|
Subject: [PATCH 45/53] FIPS: NO Kmac
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -15,10 +15,10 @@ Signed-off-by: Simo Sorce <simo@redhat.com>
|
|||||||
7 files changed, 40 insertions(+), 86 deletions(-)
|
7 files changed, 40 insertions(+), 86 deletions(-)
|
||||||
|
|
||||||
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
|
||||||
index 30f0c8ca14..00b7d1e2aa 100644
|
index 4b394c3e39..8f00dfa0ef 100644
|
||||||
--- a/providers/fips/fipsprov.c
|
--- a/providers/fips/fipsprov.c
|
||||||
+++ b/providers/fips/fipsprov.c
|
+++ b/providers/fips/fipsprov.c
|
||||||
@@ -293,10 +293,11 @@ static const OSSL_ALGORITHM fips_digests[] = {
|
@@ -294,10 +294,11 @@ static const OSSL_ALGORITHM fips_digests[] = {
|
||||||
* KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for
|
* KECCAK-KMAC-128 and KECCAK-KMAC-256 as hashes are mostly useful for
|
||||||
* KMAC128 and KMAC256.
|
* KMAC128 and KMAC256.
|
||||||
*/
|
*/
|
||||||
@ -32,7 +32,7 @@ index 30f0c8ca14..00b7d1e2aa 100644
|
|||||||
{ NULL, NULL, NULL }
|
{ NULL, NULL, NULL }
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -369,8 +370,9 @@ static const OSSL_ALGORITHM fips_macs[] = {
|
@@ -370,8 +371,9 @@ static const OSSL_ALGORITHM fips_macs[] = {
|
||||||
#endif
|
#endif
|
||||||
{ PROV_NAMES_GMAC, FIPS_DEFAULT_PROPERTIES, ossl_gmac_functions },
|
{ PROV_NAMES_GMAC, FIPS_DEFAULT_PROPERTIES, ossl_gmac_functions },
|
||||||
{ PROV_NAMES_HMAC, FIPS_DEFAULT_PROPERTIES, ossl_hmac_functions },
|
{ PROV_NAMES_HMAC, FIPS_DEFAULT_PROPERTIES, ossl_hmac_functions },
|
||||||
@ -422,5 +422,5 @@ index 831eecbac9..af92ceea98 100644
|
|||||||
-Custom = ""
|
-Custom = ""
|
||||||
-Output = 75358CF39E41494E949707927CEE0AF20A3FF553904C86B08F21CC414BCFD691589D27CF5E15369CBBFF8B9A4C2EB17800855D0235FF635DA82533EC6B759B69
|
-Output = 75358CF39E41494E949707927CEE0AF20A3FF553904C86B08F21CC414BCFD691589D27CF5E15369CBBFF8B9A4C2EB17800855D0235FF635DA82533EC6B759B69
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
From 50c0087bdd6c15e2c63c8324f35221fd45a10518 Mon Sep 17 00:00:00 2001
|
From 0d1de1053dc1b4b9a1e14b622311d0449c64e19e Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Mon, 10 Mar 2025 13:52:50 -0400
|
Date: Mon, 10 Mar 2025 13:52:50 -0400
|
||||||
Subject: [PATCH 47/58] FIPS: Fix some tests due to our versioning change
|
Subject: [PATCH 46/53] FIPS: Fix some tests due to our versioning change
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -102,5 +102,5 @@ index af47842fd8..21c75033e8 100644
|
|||||||
|
|
||||||
my @tests_mldsa_tls_1_3 = (
|
my @tests_mldsa_tls_1_3 = (
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
@ -1,33 +0,0 @@
|
|||||||
From a6dce07d8e44e79dc3db9538d269bbbc903a8e15 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Simo Sorce <simo@redhat.com>
|
|
||||||
Date: Fri, 7 Mar 2025 18:24:36 -0500
|
|
||||||
Subject: [PATCH 46/58] FIPS: NO PQ (ML/SLH-DSA)
|
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
|
||||||
---
|
|
||||||
providers/fips/self_test_data.inc | 2 ++
|
|
||||||
1 file changed, 2 insertions(+)
|
|
||||||
|
|
||||||
diff --git a/providers/fips/self_test_data.inc b/providers/fips/self_test_data.inc
|
|
||||||
index f3059a8446..9659f10613 100644
|
|
||||||
--- a/providers/fips/self_test_data.inc
|
|
||||||
+++ b/providers/fips/self_test_data.inc
|
|
||||||
@@ -3037,6 +3037,7 @@ static const ST_KAT_SIGN st_kat_sign_tests[] = {
|
|
||||||
#endif /* OPENSSL_NO_DSA */
|
|
||||||
#endif
|
|
||||||
|
|
||||||
+#if 0
|
|
||||||
#ifndef OPENSSL_NO_ML_DSA
|
|
||||||
{
|
|
||||||
OSSL_SELF_TEST_DESC_SIGN_ML_DSA,
|
|
||||||
@@ -3081,6 +3082,7 @@ static const ST_KAT_SIGN st_kat_sign_tests[] = {
|
|
||||||
slh_dsa_sig_params, slh_dsa_sig_params
|
|
||||||
},
|
|
||||||
#endif /* OPENSSL_NO_SLH_DSA */
|
|
||||||
+#endif
|
|
||||||
};
|
|
||||||
|
|
||||||
#if !defined(OPENSSL_NO_ML_DSA)
|
|
||||||
--
|
|
||||||
2.49.0
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
From 3bc3a6514c078564ac8addbdf24172a5fb90f4d7 Mon Sep 17 00:00:00 2001
|
From e47db9280144065c4221537f1d44baa750a25d64 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Wed, 12 Feb 2025 17:25:47 -0500
|
Date: Wed, 12 Feb 2025 17:25:47 -0500
|
||||||
Subject: [PATCH 48/58] Current Rebase status
|
Subject: [PATCH 47/53] Current Rebase status
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -102,5 +102,5 @@ index 2833a383c1..c8f6c992a8 100644
|
|||||||
+./Configure --prefix=$HOME/tmp/openssl-rebase --openssldir=$HOME/tmp/openssl-rebase/etc/pki/tls enable-ec_nistp_64_gcc_128 --system-ciphers-file=$HOME/tmp/openssl-rebase/etc/crypto-policies/back-ends/opensslcnf.config zlib enable-camellia enable-seed enable-rfc3779 enable-sctp enable-cms enable-md2 enable-rc5 enable-ktls enable-fips no-mdc2 no-ec2m no-sm2 no-sm4 no-atexit enable-buildtest-c++ shared linux-x86_64 $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\"" -DOPENSSL_PEDANTIC_ZEROIZATION -DREDHAT_FIPS_VENDOR="\"Red Hat Enterprise Linux OpenSSL FIPS Provider\"" -DREDHAT_FIPS_VERSION="\"3.5.0-4c714d97fd77d1a8\""' -Wl,--allow-multiple-definition
|
+./Configure --prefix=$HOME/tmp/openssl-rebase --openssldir=$HOME/tmp/openssl-rebase/etc/pki/tls enable-ec_nistp_64_gcc_128 --system-ciphers-file=$HOME/tmp/openssl-rebase/etc/crypto-policies/back-ends/opensslcnf.config zlib enable-camellia enable-seed enable-rfc3779 enable-sctp enable-cms enable-md2 enable-rc5 enable-ktls enable-fips no-mdc2 no-ec2m no-sm2 no-sm4 no-atexit enable-buildtest-c++ shared linux-x86_64 $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\"" -DOPENSSL_PEDANTIC_ZEROIZATION -DREDHAT_FIPS_VENDOR="\"Red Hat Enterprise Linux OpenSSL FIPS Provider\"" -DREDHAT_FIPS_VERSION="\"3.5.0-4c714d97fd77d1a8\""' -Wl,--allow-multiple-definition
|
||||||
+
|
+
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
From 573cde99e796fbd76f9be7f6a553c681abbfb55a Mon Sep 17 00:00:00 2001
|
From d0063158bcf9321daec1ffcbfeb3d7b085aebce3 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Mon, 14 Apr 2025 15:25:40 -0400
|
Date: Mon, 14 Apr 2025 15:25:40 -0400
|
||||||
Subject: [PATCH 49/58] FIPS: KDF key lenght errors
|
Subject: [PATCH 48/53] FIPS: KDF key lenght errors
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -171,5 +171,5 @@ index 1fb2472001..93c07ede7c 100644
|
|||||||
|
|
||||||
# Test that the key whose length is shorter than 112 bits is reported as
|
# Test that the key whose length is shorter than 112 bits is reported as
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
From 48498bd445161f1d0fffb60bce8d9474acfe840b Mon Sep 17 00:00:00 2001
|
From 91000e60a38106701dd76deb37eafe165e7802a3 Mon Sep 17 00:00:00 2001
|
||||||
From: Simo Sorce <simo@redhat.com>
|
From: Simo Sorce <simo@redhat.com>
|
||||||
Date: Tue, 15 Apr 2025 13:41:42 -0400
|
Date: Tue, 15 Apr 2025 13:41:42 -0400
|
||||||
Subject: [PATCH 50/58] FIPS: fix disallowed digests tests
|
Subject: [PATCH 49/53] FIPS: fix disallowed digests tests
|
||||||
|
|
||||||
Signed-off-by: Simo Sorce <simo@redhat.com>
|
Signed-off-by: Simo Sorce <simo@redhat.com>
|
||||||
---
|
---
|
||||||
@ -47,5 +47,5 @@ index 6688c217aa..8347f773e6 100644
|
|||||||
# Test that the key whose length is shorter than 112 bits is reported as
|
# Test that the key whose length is shorter than 112 bits is reported as
|
||||||
# unapproved
|
# unapproved
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
@ -1,14 +1,14 @@
|
|||||||
From 0895e273cacec26a4bd027bef7ab07bae12d9741 Mon Sep 17 00:00:00 2001
|
From 99d3ce80ecf3252962a1b79dd57324f08b62cc18 Mon Sep 17 00:00:00 2001
|
||||||
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||||
Date: Fri, 9 May 2025 15:09:46 +0200
|
Date: Fri, 9 May 2025 15:09:46 +0200
|
||||||
Subject: [PATCH 51/58] Make `openssl speed` run in FIPS mode
|
Subject: [PATCH 50/53] Make `openssl speed` run in FIPS mode
|
||||||
|
|
||||||
---
|
---
|
||||||
apps/speed.c | 44 ++++++++++++++++++++++----------------------
|
apps/speed.c | 44 ++++++++++++++++++++++----------------------
|
||||||
1 file changed, 22 insertions(+), 22 deletions(-)
|
1 file changed, 22 insertions(+), 22 deletions(-)
|
||||||
|
|
||||||
diff --git a/apps/speed.c b/apps/speed.c
|
diff --git a/apps/speed.c b/apps/speed.c
|
||||||
index 1edf9b8485..d4e707074c 100644
|
index 3307a9cb46..ae2f166d24 100644
|
||||||
--- a/apps/speed.c
|
--- a/apps/speed.c
|
||||||
+++ b/apps/speed.c
|
+++ b/apps/speed.c
|
||||||
@@ -3172,18 +3172,18 @@ int speed_main(int argc, char **argv)
|
@@ -3172,18 +3172,18 @@ int speed_main(int argc, char **argv)
|
||||||
@ -72,5 +72,5 @@ index 1edf9b8485..d4e707074c 100644
|
|||||||
|
|
||||||
for (i = 0; i < loopargs_len; i++)
|
for (i = 0; i < loopargs_len; i++)
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
From 120558807e15d3cb2959020bacc928988e512a78 Mon Sep 17 00:00:00 2001
|
From 5b20574f75a2c525bf30ea304292ecd93eb72091 Mon Sep 17 00:00:00 2001
|
||||||
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||||
Date: Mon, 12 May 2025 14:34:39 +0200
|
Date: Mon, 12 May 2025 14:34:39 +0200
|
||||||
Subject: [PATCH 52/58] Backport upstream #27483 for PKCS11 needs
|
Subject: [PATCH 51/53] Backport upstream #27483 for PKCS11 needs
|
||||||
|
|
||||||
---
|
---
|
||||||
.../implementations/skeymgmt/aes_skmgmt.c | 2 +
|
.../implementations/skeymgmt/aes_skmgmt.c | 2 +
|
||||||
@ -142,5 +142,5 @@ index b81df9c8f8..e33bbbe003 100644
|
|||||||
ADD_TEST(test_aes_raw_skey);
|
ADD_TEST(test_aes_raw_skey);
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
From ee9a3d993eb82f98e4670adc9ccb015065b81555 Mon Sep 17 00:00:00 2001
|
From fcba6e3c26d76ce26ef140f3d07f9cc15e7d98fa Mon Sep 17 00:00:00 2001
|
||||||
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||||
Date: Mon, 12 May 2025 16:21:23 +0200
|
Date: Mon, 12 May 2025 16:21:23 +0200
|
||||||
Subject: [PATCH 53/58] Red Hat 9 FIPS indicator defines
|
Subject: [PATCH 52/53] Red Hat 9 FIPS indicator defines
|
||||||
|
|
||||||
---
|
---
|
||||||
include/openssl/evp.h | 15 +++++++++++++++
|
include/openssl/evp.h | 15 +++++++++++++++
|
||||||
@ -125,5 +125,5 @@ index 059b489735..5a1864309d 100644
|
|||||||
'KEM_PARAM_FIPS_KEY_CHECK' => '*PKEY_PARAM_FIPS_KEY_CHECK',
|
'KEM_PARAM_FIPS_KEY_CHECK' => '*PKEY_PARAM_FIPS_KEY_CHECK',
|
||||||
'KEM_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
|
'KEM_PARAM_FIPS_APPROVED_INDICATOR' => '*ALG_PARAM_FIPS_APPROVED_INDICATOR',
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
From 26ad3b905a6d4b1fa50b304f21f67aa0d35265e9 Mon Sep 17 00:00:00 2001
|
From 75c77ea5f36dbf6d21940ab5bf87dff6acd5b8d6 Mon Sep 17 00:00:00 2001
|
||||||
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
From: Dmitry Belyavskiy <beldmit@gmail.com>
|
||||||
Date: Fri, 30 May 2025 16:17:37 +0200
|
Date: Fri, 30 May 2025 16:17:37 +0200
|
||||||
Subject: [PATCH 58/58] Allow hybrid MLKEM in FIPS mode
|
Subject: [PATCH 53/53] Allow hybrid MLKEM in FIPS mode
|
||||||
|
|
||||||
---
|
---
|
||||||
crypto/ml_kem/ml_kem.c | 11 ++--
|
crypto/ml_kem/ml_kem.c | 11 ++--
|
||||||
@ -12,18 +12,18 @@ Subject: [PATCH 58/58] Allow hybrid MLKEM in FIPS mode
|
|||||||
5 files changed, 103 insertions(+), 12 deletions(-)
|
5 files changed, 103 insertions(+), 12 deletions(-)
|
||||||
|
|
||||||
diff --git a/crypto/ml_kem/ml_kem.c b/crypto/ml_kem/ml_kem.c
|
diff --git a/crypto/ml_kem/ml_kem.c b/crypto/ml_kem/ml_kem.c
|
||||||
index ec75233435..8d0cc1a82c 100644
|
index 4474af0f87..6eca7dc29d 100644
|
||||||
--- a/crypto/ml_kem/ml_kem.c
|
--- a/crypto/ml_kem/ml_kem.c
|
||||||
+++ b/crypto/ml_kem/ml_kem.c
|
+++ b/crypto/ml_kem/ml_kem.c
|
||||||
@@ -1581,6 +1581,7 @@ ML_KEM_KEY *ossl_ml_kem_key_new(OSSL_LIB_CTX *libctx, const char *properties,
|
@@ -1613,6 +1613,7 @@ ML_KEM_KEY *ossl_ml_kem_key_new(OSSL_LIB_CTX *libctx, const char *properties,
|
||||||
{
|
{
|
||||||
const ML_KEM_VINFO *vinfo = ossl_ml_kem_get_vinfo(evp_type);
|
const ML_KEM_VINFO *vinfo = ossl_ml_kem_get_vinfo(evp_type);
|
||||||
ML_KEM_KEY *key;
|
ML_KEM_KEY *key;
|
||||||
+ char *adjusted_propq = NULL;
|
+ char *adjusted_propq = NULL;
|
||||||
|
|
||||||
if (vinfo == NULL)
|
if (vinfo == NULL) {
|
||||||
return NULL;
|
ERR_raise_data(ERR_LIB_CRYPTO, ERR_R_PASSED_INVALID_ARGUMENT,
|
||||||
@@ -1588,15 +1589,17 @@ ML_KEM_KEY *ossl_ml_kem_key_new(OSSL_LIB_CTX *libctx, const char *properties,
|
@@ -1623,15 +1624,17 @@ ML_KEM_KEY *ossl_ml_kem_key_new(OSSL_LIB_CTX *libctx, const char *properties,
|
||||||
if ((key = OPENSSL_malloc(sizeof(*key))) == NULL)
|
if ((key = OPENSSL_malloc(sizeof(*key))) == NULL)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
@ -298,5 +298,5 @@ index bea8783276..aeef0c8f84 100644
|
|||||||
key->xinfo->algorithm_name,
|
key->xinfo->algorithm_name,
|
||||||
key->xinfo->group_name);
|
key->xinfo->group_name);
|
||||||
--
|
--
|
||||||
2.49.0
|
2.50.0
|
||||||
|
|
@ -1,58 +0,0 @@
|
|||||||
From 92e50723ae6aa29476b7ebb66d262f78677ee68d Mon Sep 17 00:00:00 2001
|
|
||||||
From: Gerd Hoffmann <kraxel@redhat.com>
|
|
||||||
Date: Mon, 7 Apr 2025 12:58:54 +0200
|
|
||||||
Subject: [PATCH 54/58] crypto: disable OSSL_PARAM_REAL on UEFI
|
|
||||||
MIME-Version: 1.0
|
|
||||||
Content-Type: text/plain; charset=UTF-8
|
|
||||||
Content-Transfer-Encoding: 8bit
|
|
||||||
|
|
||||||
Floating point types like double can't be used on UEFI.
|
|
||||||
Fix build on UEFI by disabling the OSSL_PARAM_REAL branch.
|
|
||||||
|
|
||||||
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
|
||||||
|
|
||||||
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
|
|
||||||
Reviewed-by: Tomas Mraz <tomas@openssl.org>
|
|
||||||
Reviewed-by: Matt Caswell <matt@openssl.org>
|
|
||||||
(Merged from https://github.com/openssl/openssl/pull/27284)
|
|
||||||
---
|
|
||||||
crypto/params_from_text.c | 6 +++---
|
|
||||||
1 file changed, 3 insertions(+), 3 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/crypto/params_from_text.c b/crypto/params_from_text.c
|
|
||||||
index 7532d4d439..fb25400dc1 100644
|
|
||||||
--- a/crypto/params_from_text.c
|
|
||||||
+++ b/crypto/params_from_text.c
|
|
||||||
@@ -220,9 +220,9 @@ int OSSL_PARAM_print_to_bio(const OSSL_PARAM *p, BIO *bio, int print_values)
|
|
||||||
BIGNUM *bn;
|
|
||||||
#ifndef OPENSSL_SYS_UEFI
|
|
||||||
double d;
|
|
||||||
+ int dok;
|
|
||||||
#endif
|
|
||||||
int ok = -1;
|
|
||||||
- int dok;
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Iterate through each key in the array printing its key and value
|
|
||||||
@@ -280,16 +280,16 @@ int OSSL_PARAM_print_to_bio(const OSSL_PARAM *p, BIO *bio, int print_values)
|
|
||||||
case OSSL_PARAM_OCTET_STRING:
|
|
||||||
ok = BIO_dump(bio, (char *)p->data, p->data_size);
|
|
||||||
break;
|
|
||||||
+#ifndef OPENSSL_SYS_UEFI
|
|
||||||
case OSSL_PARAM_REAL:
|
|
||||||
dok = 0;
|
|
||||||
-#ifndef OPENSSL_SYS_UEFI
|
|
||||||
dok = OSSL_PARAM_get_double(p, &d);
|
|
||||||
-#endif
|
|
||||||
if (dok == 1)
|
|
||||||
ok = BIO_printf(bio, "%f\n", d);
|
|
||||||
else
|
|
||||||
ok = BIO_printf(bio, "error getting value\n");
|
|
||||||
break;
|
|
||||||
+#endif
|
|
||||||
default:
|
|
||||||
ok = BIO_printf(bio, "unknown type (%u) of %zu bytes\n",
|
|
||||||
p->data_type, p->data_size);
|
|
||||||
--
|
|
||||||
2.49.0
|
|
||||||
|
|
@ -1,36 +0,0 @@
|
|||||||
From fb8649ec423277d50936a6a7848a1b6705e208cc Mon Sep 17 00:00:00 2001
|
|
||||||
From: Gerd Hoffmann <kraxel@redhat.com>
|
|
||||||
Date: Mon, 7 Apr 2025 13:29:36 +0200
|
|
||||||
Subject: [PATCH 55/58] hashfunc: add stddef.h include
|
|
||||||
MIME-Version: 1.0
|
|
||||||
Content-Type: text/plain; charset=UTF-8
|
|
||||||
Content-Transfer-Encoding: 8bit
|
|
||||||
|
|
||||||
size_t is declared in stddef.h, so include the header file to
|
|
||||||
make sure it is available. Fixes build on UEFI.
|
|
||||||
|
|
||||||
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
|
||||||
|
|
||||||
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
|
|
||||||
Reviewed-by: Tomas Mraz <tomas@openssl.org>
|
|
||||||
Reviewed-by: Matt Caswell <matt@openssl.org>
|
|
||||||
(Merged from https://github.com/openssl/openssl/pull/27284)
|
|
||||||
---
|
|
||||||
include/internal/hashfunc.h | 1 +
|
|
||||||
1 file changed, 1 insertion(+)
|
|
||||||
|
|
||||||
diff --git a/include/internal/hashfunc.h b/include/internal/hashfunc.h
|
|
||||||
index cabc7beed4..fae8a275fa 100644
|
|
||||||
--- a/include/internal/hashfunc.h
|
|
||||||
+++ b/include/internal/hashfunc.h
|
|
||||||
@@ -11,6 +11,7 @@
|
|
||||||
# define OPENSSL_HASHFUNC_H
|
|
||||||
|
|
||||||
# include <openssl/e_os2.h>
|
|
||||||
+# include <stddef.h>
|
|
||||||
/**
|
|
||||||
* Generalized fnv1a 64 bit hash function
|
|
||||||
*/
|
|
||||||
--
|
|
||||||
2.49.0
|
|
||||||
|
|
@ -1,73 +0,0 @@
|
|||||||
From 60699bc32870a3325a79234158740aac917b39a6 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Gerd Hoffmann <kraxel@redhat.com>
|
|
||||||
Date: Mon, 7 Apr 2025 14:06:28 +0200
|
|
||||||
Subject: [PATCH 56/58] rio: add RIO_POLL_METHOD_NONE
|
|
||||||
MIME-Version: 1.0
|
|
||||||
Content-Type: text/plain; charset=UTF-8
|
|
||||||
Content-Transfer-Encoding: 8bit
|
|
||||||
|
|
||||||
Fixes build on UEFI.
|
|
||||||
|
|
||||||
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
|
|
||||||
|
|
||||||
Reviewed-by: Saša Nedvědický <sashan@openssl.org>
|
|
||||||
Reviewed-by: Tomas Mraz <tomas@openssl.org>
|
|
||||||
Reviewed-by: Matt Caswell <matt@openssl.org>
|
|
||||||
(Merged from https://github.com/openssl/openssl/pull/27284)
|
|
||||||
---
|
|
||||||
ssl/rio/poll_builder.c | 4 +++-
|
|
||||||
ssl/rio/poll_builder.h | 4 +++-
|
|
||||||
ssl/rio/poll_method.h | 5 ++++-
|
|
||||||
3 files changed, 10 insertions(+), 3 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/ssl/rio/poll_builder.c b/ssl/rio/poll_builder.c
|
|
||||||
index 007e360d87..3cfbe3b0ac 100644
|
|
||||||
--- a/ssl/rio/poll_builder.c
|
|
||||||
+++ b/ssl/rio/poll_builder.c
|
|
||||||
@@ -16,7 +16,9 @@ OSSL_SAFE_MATH_UNSIGNED(size_t, size_t)
|
|
||||||
|
|
||||||
int ossl_rio_poll_builder_init(RIO_POLL_BUILDER *rpb)
|
|
||||||
{
|
|
||||||
-#if RIO_POLL_METHOD == RIO_POLL_METHOD_SELECT
|
|
||||||
+#if RIO_POLL_METHOD == RIO_POLL_METHOD_NONE
|
|
||||||
+ return 0;
|
|
||||||
+#elif RIO_POLL_METHOD == RIO_POLL_METHOD_SELECT
|
|
||||||
FD_ZERO(&rpb->rfd);
|
|
||||||
FD_ZERO(&rpb->wfd);
|
|
||||||
FD_ZERO(&rpb->efd);
|
|
||||||
diff --git a/ssl/rio/poll_builder.h b/ssl/rio/poll_builder.h
|
|
||||||
index ffc9bbf9fc..985e4713b2 100644
|
|
||||||
--- a/ssl/rio/poll_builder.h
|
|
||||||
+++ b/ssl/rio/poll_builder.h
|
|
||||||
@@ -23,7 +23,9 @@
|
|
||||||
* FDs.
|
|
||||||
*/
|
|
||||||
typedef struct rio_poll_builder_st {
|
|
||||||
-# if RIO_POLL_METHOD == RIO_POLL_METHOD_SELECT
|
|
||||||
+# if RIO_POLL_METHOD == RIO_POLL_METHOD_NONE
|
|
||||||
+ /* nothing */;
|
|
||||||
+# elif RIO_POLL_METHOD == RIO_POLL_METHOD_SELECT
|
|
||||||
fd_set rfd, wfd, efd;
|
|
||||||
int hwm_fd;
|
|
||||||
# elif RIO_POLL_METHOD == RIO_POLL_METHOD_POLL
|
|
||||||
diff --git a/ssl/rio/poll_method.h b/ssl/rio/poll_method.h
|
|
||||||
index 9a6de89270..d5af8663c2 100644
|
|
||||||
--- a/ssl/rio/poll_method.h
|
|
||||||
+++ b/ssl/rio/poll_method.h
|
|
||||||
@@ -14,9 +14,12 @@
|
|
||||||
|
|
||||||
# define RIO_POLL_METHOD_SELECT 1
|
|
||||||
# define RIO_POLL_METHOD_POLL 2
|
|
||||||
+# define RIO_POLL_METHOD_NONE 3
|
|
||||||
|
|
||||||
# ifndef RIO_POLL_METHOD
|
|
||||||
-# if !defined(OPENSSL_SYS_WINDOWS) && defined(POLLIN)
|
|
||||||
+# if defined(OPENSSL_SYS_UEFI)
|
|
||||||
+# define RIO_POLL_METHOD RIO_POLL_METHOD_NONE
|
|
||||||
+# elif !defined(OPENSSL_SYS_WINDOWS) && defined(POLLIN)
|
|
||||||
# define RIO_POLL_METHOD RIO_POLL_METHOD_POLL
|
|
||||||
# else
|
|
||||||
# define RIO_POLL_METHOD RIO_POLL_METHOD_SELECT
|
|
||||||
--
|
|
||||||
2.49.0
|
|
||||||
|
|
@ -1,62 +0,0 @@
|
|||||||
From d7ab338f85b55ed6aa6d0187123dbab8684551a5 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Tomas Mraz <tomas@openssl.org>
|
|
||||||
Date: Tue, 20 May 2025 16:34:10 +0200
|
|
||||||
Subject: [PATCH 57/58] apps/x509.c: Fix the -addreject option adding trust
|
|
||||||
instead of rejection
|
|
||||||
|
|
||||||
Fixes CVE-2025-4575
|
|
||||||
|
|
||||||
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
|
|
||||||
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
|
|
||||||
(Merged from https://github.com/openssl/openssl/pull/27672)
|
|
||||||
---
|
|
||||||
apps/x509.c | 2 +-
|
|
||||||
test/recipes/25-test_x509.t | 12 +++++++++++-
|
|
||||||
2 files changed, 12 insertions(+), 2 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/apps/x509.c b/apps/x509.c
|
|
||||||
index fdae8f383a..0c340c15b3 100644
|
|
||||||
--- a/apps/x509.c
|
|
||||||
+++ b/apps/x509.c
|
|
||||||
@@ -465,7 +465,7 @@ int x509_main(int argc, char **argv)
|
|
||||||
prog, opt_arg());
|
|
||||||
goto opthelp;
|
|
||||||
}
|
|
||||||
- if (!sk_ASN1_OBJECT_push(trust, objtmp))
|
|
||||||
+ if (!sk_ASN1_OBJECT_push(reject, objtmp))
|
|
||||||
goto end;
|
|
||||||
trustout = 1;
|
|
||||||
break;
|
|
||||||
diff --git a/test/recipes/25-test_x509.t b/test/recipes/25-test_x509.t
|
|
||||||
index 09b61708ff..dfa0a428f5 100644
|
|
||||||
--- a/test/recipes/25-test_x509.t
|
|
||||||
+++ b/test/recipes/25-test_x509.t
|
|
||||||
@@ -16,7 +16,7 @@ use OpenSSL::Test qw/:DEFAULT srctop_file/;
|
|
||||||
|
|
||||||
setup("test_x509");
|
|
||||||
|
|
||||||
-plan tests => 134;
|
|
||||||
+plan tests => 138;
|
|
||||||
|
|
||||||
# Prevent MSys2 filename munging for arguments that look like file paths but
|
|
||||||
# aren't
|
|
||||||
@@ -110,6 +110,16 @@ ok(run(app(["openssl", "x509", "-new", "-force_pubkey", $key, "-subj", "/CN=EE",
|
|
||||||
&& run(app(["openssl", "verify", "-no_check_time",
|
|
||||||
"-trusted", $ca, "-partial_chain", $caout])));
|
|
||||||
|
|
||||||
+# test trust decoration
|
|
||||||
+ok(run(app(["openssl", "x509", "-in", $ca, "-addtrust", "emailProtection",
|
|
||||||
+ "-out", "ca-trusted.pem"])));
|
|
||||||
+cert_contains("ca-trusted.pem", "Trusted Uses: E-mail Protection",
|
|
||||||
+ 1, 'trusted use - E-mail Protection');
|
|
||||||
+ok(run(app(["openssl", "x509", "-in", $ca, "-addreject", "emailProtection",
|
|
||||||
+ "-out", "ca-rejected.pem"])));
|
|
||||||
+cert_contains("ca-rejected.pem", "Rejected Uses: E-mail Protection",
|
|
||||||
+ 1, 'rejected use - E-mail Protection');
|
|
||||||
+
|
|
||||||
subtest 'x509 -- x.509 v1 certificate' => sub {
|
|
||||||
tconversion( -type => 'x509', -prefix => 'x509v1',
|
|
||||||
-in => srctop_file("test", "testx509.pem") );
|
|
||||||
--
|
|
||||||
2.49.0
|
|
||||||
|
|
35
openssl.spec
35
openssl.spec
@ -28,8 +28,8 @@ print(string.sub(hash, 0, 16))
|
|||||||
|
|
||||||
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
||||||
Name: openssl
|
Name: openssl
|
||||||
Version: 3.5.0
|
Version: 3.5.1
|
||||||
Release: 8%{?dist}.alma.1
|
Release: 1%{?dist}.alma.1
|
||||||
Epoch: 1
|
Epoch: 1
|
||||||
Source0: openssl-%{version}.tar.gz
|
Source0: openssl-%{version}.tar.gz
|
||||||
Source1: fips-hmacify.sh
|
Source1: fips-hmacify.sh
|
||||||
@ -85,20 +85,15 @@ Patch0042: 0042-FIPS-EC-disable-weak-curves.patch
|
|||||||
Patch0043: 0043-FIPS-NO-DSA-Support.patch
|
Patch0043: 0043-FIPS-NO-DSA-Support.patch
|
||||||
Patch0044: 0044-FIPS-NO-DES-support.patch
|
Patch0044: 0044-FIPS-NO-DES-support.patch
|
||||||
Patch0045: 0045-FIPS-NO-Kmac.patch
|
Patch0045: 0045-FIPS-NO-Kmac.patch
|
||||||
Patch0046: 0046-FIPS-NO-PQ-ML-SLH-DSA.patch
|
Patch0046: 0046-FIPS-Fix-some-tests-due-to-our-versioning-change.patch
|
||||||
Patch0047: 0047-FIPS-Fix-some-tests-due-to-our-versioning-change.patch
|
Patch0047: 0047-Current-Rebase-status.patch
|
||||||
Patch0048: 0048-Current-Rebase-status.patch
|
Patch0048: 0048-FIPS-KDF-key-lenght-errors.patch
|
||||||
Patch0049: 0049-FIPS-KDF-key-lenght-errors.patch
|
Patch0049: 0049-FIPS-fix-disallowed-digests-tests.patch
|
||||||
Patch0050: 0050-FIPS-fix-disallowed-digests-tests.patch
|
Patch0050: 0050-Make-openssl-speed-run-in-FIPS-mode.patch
|
||||||
Patch0051: 0051-Make-openssl-speed-run-in-FIPS-mode.patch
|
Patch0051: 0051-Backport-upstream-27483-for-PKCS11-needs.patch
|
||||||
Patch0052: 0052-Backport-upstream-27483-for-PKCS11-needs.patch
|
Patch0052: 0052-Red-Hat-9-FIPS-indicator-defines.patch
|
||||||
Patch0053: 0053-Red-Hat-9-FIPS-indicator-defines.patch
|
|
||||||
Patch0054: 0054-crypto-disable-OSSL_PARAM_REAL-on-UEFI.patch
|
|
||||||
Patch0055: 0055-hashfunc-add-stddef.h-include.patch
|
|
||||||
Patch0056: 0056-rio-add-RIO_POLL_METHOD_NONE.patch
|
|
||||||
Patch0057: 0057-apps-x509.c-Fix-the-addreject-option-adding-trust-in.patch
|
|
||||||
%if ( %{defined rhel} && (! %{defined centos}) )
|
%if ( %{defined rhel} && (! %{defined centos}) )
|
||||||
Patch0058: 0058-Allow-hybrid-MLKEM-in-FIPS-mode.patch
|
Patch0053: 0053-Allow-hybrid-MLKEM-in-FIPS-mode.patch
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
License: Apache-2.0
|
License: Apache-2.0
|
||||||
@ -441,9 +436,17 @@ touch $RPM_BUILD_ROOT/%{_prefix}/include/openssl/engine.h
|
|||||||
%ldconfig_scriptlets libs
|
%ldconfig_scriptlets libs
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Fri Jun 06 2025 Eduard Abdullin <eabdullin@almalinux.org> - 1:3.5.0-8.alma.1
|
* Wed Jul 02 2025 Eduard Abdullin <eabdullin@almalinux.org> - 1:3.5.1-1.alma.1
|
||||||
- Redefine sslarch for x86_64_v2 arch
|
- Redefine sslarch for x86_64_v2 arch
|
||||||
|
|
||||||
|
* Tue Jul 01 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.1-1
|
||||||
|
- Rebasing to OpenSSL 3.5.1
|
||||||
|
Resolves: RHEL-90350
|
||||||
|
Resolves: RHEL-95613
|
||||||
|
Resolves: RHEL-97796
|
||||||
|
Resolves: RHEL-99353
|
||||||
|
Resolves: RHEL-100168
|
||||||
|
|
||||||
* Thu Jun 05 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.0-8
|
* Thu Jun 05 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.0-8
|
||||||
- rebuilt
|
- rebuilt
|
||||||
Related: RHEL-80811
|
Related: RHEL-80811
|
||||||
|
2
sources
2
sources
@ -1 +1 @@
|
|||||||
SHA512 (openssl-3.5.0.tar.gz) = 39cc80e2843a2ee30f3f5de25cd9d0f759ad8de71b0b39f5a679afaaa74f4eb58d285ae50e29e4a27b139b49343ac91d1f05478f96fb0c6b150f16d7b634676f
|
SHA512 (openssl-3.5.1.tar.gz) = 0fa152ae59ab5ea066319de039dfb1d24cbb247172d7512feb5dd920db3740f219d76b0195ea562f84fe5eae36c23772302eddfbb3509df13761452b4dafb9d3
|
||||||
|
Loading…
Reference in New Issue
Block a user