Fedora Release Engineering
898af7893c
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
...
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2020-01-29 20:25:04 +00:00
Tomas Mraz
b8a97dc1d8
allow zero length parameters in KDF_CTX_ctrl()
2019-11-21 14:49:21 +01:00
Tomas Mraz
0536b721ef
backport of SSKDF from master
2019-11-14 16:13:49 +01:00
Tomas Mraz
266efa3055
backport of KBKDF and KRB5KDF from master
2019-11-13 13:43:05 +01:00
Tomas Mraz
dc9d5caf5e
KBKDF for Kerberos 5
2019-11-12 16:38:11 +01:00
Tomas Mraz
f1c4ba61a3
Multiple fixes
...
re-enable the stitched AES-CBC-SHA implementations
make AES-GCM work in FIPS mode again
enable TLS-1.2 AES-CCM ciphers in FIPS mode
fix openssl speed errors in FIPS mode
2019-10-03 17:43:23 +02:00
Tomas Mraz
10c30b2322
Re-add one hunk of the fips patch accidentally dropped in the rebase.
2019-09-27 08:36:50 +02:00
Tomas Mraz
f6a62c4c2c
update to the 1.1.1d release
2019-09-13 17:25:44 +02:00
Tomas Mraz
c44b3f96fe
Bump release correctly
2019-09-06 17:18:46 +02:00
Tomas Mraz
45ebb7fdc2
upstream fix for status request extension non-compliance ( #1737471 )
2019-09-06 17:02:18 +02:00
Fedora Release Engineering
dba4c3b578
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
...
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2019-07-25 23:35:44 +00:00
Miro Hrončok
b395c9afd4
Fedora CI: Python: readd test_asyncio
2019-06-25 22:23:49 +02:00
Tomas Mraz
8419f769c7
Do not try to use EC groups disallowed in FIPS mode in TLS
...
Also fix Valgrind regression with constant-time code
2019-06-24 15:13:12 +02:00
Tomas Mraz
a71f5ae7ab
add upstream patch to defer sending KeyUpdate
...
(after pending writes are complete)
2019-06-03 16:05:45 +02:00
Tomas Mraz
4784e45765
fix use of uninitialized memory
2019-05-30 11:55:39 +02:00
Tomas Mraz
31d61b19d5
update to the 1.1.1c release
2019-05-29 17:23:31 +02:00
Tomas Mraz
b3060e5f2d
Another attempt at the AES-CCM regression fix
2019-05-10 16:27:24 +02:00
Tomas Mraz
22a821356e
Fix two small regressions
...
Change the ts application default hash to SHA256
2019-05-10 14:35:26 +02:00
Tomas Mraz
e18dcc63f4
FIPS compliance fixes
2019-05-07 10:30:26 +02:00
Tomas Mraz
65a11b2a90
Revert part of the s390x update
2019-05-06 11:58:45 +02:00
Tomas Mraz
569a3cb917
add S390x chacha20-poly1305 assembler support from master branch
2019-05-06 11:07:12 +02:00
Tomas Mraz
f5bba4a2a3
Drop patch merged into the upstream-sync patch
2019-05-03 11:16:08 +02:00
Tomas Mraz
5c7382cd79
apply new bugfixes from upstream 1.1.1 branch
2019-05-03 11:15:37 +02:00
Charalampos Stratakis
648a3cb985
Add testing of the python interpreter for the ssl related tests
2019-04-18 14:28:27 +00:00
Tomas Mraz
1aaf4073e3
fix for BIO_get_mem_ptr() regression in 1.1.1b ( #1691853 )
2019-04-16 12:13:00 +02:00
Tomas Mraz
7a654fc69c
drop unused BuildRequires and Requires in the -devel subpackage
2019-03-27 17:00:40 +01:00
Tomas Mraz
c99b8bf7f9
fix regression in EVP_PBE_scrypt() ( #1688284 )
...
fix incorrect help message in ca app (#1553206 )
2019-03-15 16:05:02 +01:00
Tomas Mraz
e2ea1027fe
use .include = syntax in the config file
...
to allow it to be parsed by 1.0.2 version (#1668916 )
2019-03-01 08:58:32 +01:00
Tomas Mraz
5cda1ca091
update to the 1.1.1b release
...
EVP_KDF API backport from master
SSH KDF implementation for EVP_KDF API backport from master
2019-02-28 17:01:40 +01:00
Tomas Mraz
757524ec00
Use SHA256 in the RSA pairwise key consistency check
2019-02-06 12:56:35 +01:00
Fedora Release Engineering
f565dfd7ec
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
...
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2019-02-01 17:32:16 +00:00
Igor Gnatenko
99d68c7f43
Remove obsolete Group tag
...
References: https://fedoraproject.org/wiki/Changes/Remove_Group_Tag
2019-01-28 20:24:24 +01:00
Igor Gnatenko
5ee230264d
Remove obsolete ldconfig scriptlets
...
References: https://fedoraproject.org/wiki/Changes/RemoveObsoleteScriptlets
Signed-off-by: Igor Gnatenko <ignatenkobrain@fedoraproject.org>
2019-01-22 18:40:36 +01:00
Tomas Mraz
301c642c7f
update to the 1.1.1a release
2019-01-15 15:07:49 +01:00
Tomas Mraz
06bb120ffb
use /dev/urandom for seeding the RNG in FIPS POST
2018-11-09 15:46:42 +01:00
Tomas Mraz
68f387b1c4
fix SECLEVEL 3 support
...
fix some issues found in Coverity scan
2018-10-12 17:35:34 +02:00
Tomas Mraz
a985e4b118
Drop obsolete re-copying of headers.
2018-10-01 14:41:25 +02:00
Charalampos Stratakis
3bfe874268
Correctly invoke sed for defining OPENSSL_NO_SSL3
2018-09-27 20:49:10 +02:00
Tomas Mraz
8574fb5150
define OPENSSL_NO_SSL3 so the newly built dependencies do not
...
have access to SSL3 API calls anymore
2018-09-27 16:53:06 +02:00
Tomas Mraz
33bd389ea8
reinstate accidentally dropped patch for weak ciphersuites
2018-09-17 12:56:19 +02:00
Tomas Mraz
746c76a1d7
Drop RANDFILE from default config file so it is not used by default
2018-09-14 13:10:14 +02:00
Tomas Mraz
143a3dae64
Adjust test_verify for the SHA1 allowement in SECLEVEL 2
2018-09-14 12:38:01 +02:00
Tomas Mraz
60efa7758e
Bump release
2018-09-14 10:57:22 +02:00
Tomas Mraz
1a7b91b472
for consistent support of security policies we build
...
RC4 support in TLS (not default) and allow SHA1 in SECLEVEL 2
2018-09-14 10:56:06 +02:00
Tomas Mraz
d2c08bab45
Upload the 1.1.1 sources
2018-09-13 09:45:00 +02:00
Tomas Mraz
a4bf4e1b65
update to the final 1.1.1 version
2018-09-13 09:43:22 +02:00
Tomas Mraz
90121b0c9d
Multiple fixes
...
do not try to initialize RNG in cleanup if it was not initialized
before (#1624554 )
use only /dev/urandom if getrandom() is not available
disable SM4
2018-09-06 13:48:54 +02:00
Tomas Mraz
cfeae6fcb3
Two minor fixes
...
fix dangling symlinks to manual pages
make SSLv3_method work
2018-08-29 18:25:29 +02:00
Tomas Mraz
62ec0f1fa9
update to the latest 1.1.1 beta version
2018-08-22 12:41:26 +02:00
Tomas Mraz
1186311ade
bidirectional shutdown fixes from upstream
2018-08-13 16:03:04 +02:00