Tomas Mraz
33bd389ea8
reinstate accidentally dropped patch for weak ciphersuites
2018-09-17 12:56:19 +02:00
Tomas Mraz
60efa7758e
Bump release
2018-09-14 10:57:22 +02:00
Tomas Mraz
1a7b91b472
for consistent support of security policies we build
...
RC4 support in TLS (not default) and allow SHA1 in SECLEVEL 2
2018-09-14 10:56:06 +02:00
Tomas Mraz
a4bf4e1b65
update to the final 1.1.1 version
2018-09-13 09:43:22 +02:00
Tomas Mraz
90121b0c9d
Multiple fixes
...
do not try to initialize RNG in cleanup if it was not initialized
before (#1624554 )
use only /dev/urandom if getrandom() is not available
disable SM4
2018-09-06 13:48:54 +02:00
Tomas Mraz
cfeae6fcb3
Two minor fixes
...
fix dangling symlinks to manual pages
make SSLv3_method work
2018-08-29 18:25:29 +02:00
Tomas Mraz
62ec0f1fa9
update to the latest 1.1.1 beta version
2018-08-22 12:41:26 +02:00
Tomas Mraz
1186311ade
bidirectional shutdown fixes from upstream
2018-08-13 16:03:04 +02:00
Tomas Mraz
f7a30f9a15
do not put error on stack when using fixed protocol version
...
(#1615098 )
2018-08-13 11:34:33 +02:00
Tomas Mraz
60357072e0
load crypto policy config file from the default config
2018-07-31 16:24:45 +02:00
Tomas Mraz
9189f03055
update to the latest 1.1.1 beta version
2018-07-25 18:15:19 +02:00
Fedora Release Engineering
7f74f219f1
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
...
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2018-07-13 15:12:04 +00:00
Tomas Mraz
98bbad839c
fix FIPS RSA key generation failure
2018-06-19 16:05:15 +02:00
Tomas Mraz
357b7a7e37
ppc64le is not multilib arch ( #1584994 )
2018-06-04 12:24:19 +02:00
Tomas Mraz
08db5cbcb9
fix regression of c_rehash ( #1562953 )
2018-04-03 13:03:32 +02:00
Tomas Mraz
5a93773172
fix FIPS symbol versions
2018-03-29 18:13:54 +02:00
Tomas Mraz
c6d0704d87
Add missing build dependencies.
2018-03-29 16:40:14 +02:00
Tomas Mraz
6eb8f62027
update to upstream version 1.1.0h
...
Add Recommends for openssl-pkcs11
2018-03-29 15:44:09 +02:00
Tomas Mraz
6d92af0099
one more try to apply RPM_LD_FLAGS properly ( #1541033 )
...
dropped unneeded starttls xmpp patch (#1417017 )
2018-02-23 17:01:58 +01:00
Igor Gnatenko
e688115b6d
Remove %clean section
...
None of currently supported distributions need that.
Last one was EL5 which is EOL for a while.
Signed-off-by: Igor Gnatenko <ignatenkobrain@fedoraproject.org>
2018-02-14 09:56:41 +01:00
Fedora Release Engineering
3a05f1f46a
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
...
Signed-off-by: Fedora Release Engineering <releng@fedoraproject.org>
2018-02-08 17:49:45 +00:00
Tomas Mraz
c11b1341c5
apply RPM_LD_FLAGS properly ( #1541033 )
2018-02-01 18:07:30 +01:00
Tomas Mraz
899f2baacb
silence the .rnd write failure as that is auxiliary functionality ( #1524833 )
2018-01-11 18:08:54 +01:00
Tomas Mraz
f20f5f466f
put the Makefile.certificate in pkgdocdir and drop the requirement on make
2017-12-14 16:26:05 +01:00
Tomas Mraz
e85d72778f
update to upstream version 1.1.0g
2017-11-03 16:57:03 +01:00
Fedora Release Engineering
50c1418e79
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
2017-08-03 04:36:41 +00:00
Fedora Release Engineering
c68da76796
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
2017-07-27 01:53:35 +00:00
Tomas Mraz
790567dc64
make s_client and s_server work with -ssl3 option ( #1471783 )
2017-07-17 15:05:28 +02:00
Petr Písař
f852080c72
perl dependency renamed to perl-interpreter < https://fedoraproject.org/wiki/Changes/perl_Package_to_Install_Core_Modules >
2017-07-13 11:16:32 +02:00
Tomas Mraz
7b595774f0
disable verification of all insecure hashes
2017-06-26 16:28:56 +02:00
Tomas Mraz
226b42827c
make DTLS work ( #1462541 )
2017-06-23 17:04:24 +02:00
Tomas Mraz
81258b6d2a
enable 3DES SSL ciphersuites, RC4 is kept disabled ( #1453066 )
2017-06-15 15:17:26 +02:00
Tomas Mraz
6b68d87d06
only release thread-local key if we created it (from upstream) ( #1458775 )
2017-06-05 17:20:12 +02:00
Tomas Mraz
1ff978b22e
update to upstream version 1.1.0f
...
SRP and GOST is now allowed, note that GOST support requires
adding GOST engine which is not part of openssl anymore
2017-06-02 15:32:15 +02:00
Tomas Mraz
c676ac32d5
update to upstream version 1.1.0e
...
add documentation of the PROFILE=SYSTEM special cipher string (#1420232 )
2017-02-16 16:59:27 +01:00
Fedora Release Engineering
f6b0040c3e
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
2017-02-11 00:58:36 +00:00
Tomas Mraz
d00e0a5904
applied upstream fixes (fix regression in X509_CRL_digest)
2017-02-01 15:56:59 +01:00
Tomas Mraz
c144665042
update to upstream version 1.1.0d
2017-01-26 16:24:24 +01:00
Tomas Mraz
fe449cd23c
preserve new line in fd BIO BIO_gets() as other BIOs do
2016-12-22 14:40:28 +01:00
Tomas Mraz
836560b322
FIPS mode fixes for TLS
2016-12-02 17:32:17 +01:00
Tomas Mraz
3a8593870a
apply properly revert SSL_read() behavior change - patch from upstream ( #1394677 )
...
- fix behavior on client certificate request in renegotiation (#1393579 )
2016-11-30 14:29:59 +01:00
Tomas Mraz
e443a79334
Add back EC NIST P-224 and revert SSL_read() change
...
- revert SSL_read() behavior change - patch from upstream (#1394677 )
- EC curve NIST P-224 is now allowed, still kept disabled in TLS due
to less than optimal security
2016-11-22 10:39:55 +01:00
Tomas Mraz
be56ae067b
update to upstream version 1.1.0c
2016-11-11 14:47:36 +01:00
Tomas Mraz
f655917cf7
use a random seed if the supplied one did not generate valid
...
parameters in dsa_builtin_paramgen2()
2016-11-04 12:10:01 +01:00
Tomas Mraz
c7fc8d6daa
do not break contract on return value when using dsa_builtin_paramgen2()
2016-10-17 13:06:36 +02:00
Tomas Mraz
d2220322f3
fix afalg failure on big endian
2016-10-12 14:47:08 +02:00
Tomas Mraz
4e52f8d3db
Use eventfd2 syscall instead of deprecated eventfd.
2016-10-11 10:58:08 +02:00
Tomas Mraz
510bcc2e3a
update to upstream version 1.1.0b
2016-10-11 10:31:54 +02:00
Richard W.M. Jones
d0c38b1fe6
Add flags for riscv64.
2016-10-07 20:44:34 +01:00
Tomas Mraz
e8261d1b72
minor upstream release 1.0.2j fixing regression from previous release
2016-09-26 12:56:04 +02:00
David Woodhouse
edc03c1b9b
Fix enginesdir in libcrypto.pc ( #1375361 )
2016-09-24 20:36:58 +01:00
Tomas Mraz
6e67274c62
minor upstream release 1.0.2i fixing security issues
...
- move man pages for perl based scripts to perl subpackage (#1377617 )
2016-09-22 14:16:05 +02:00
Tomas Mraz
9fc25c1d28
fix regression in Cisco AnyConnect VPN support ( #1354588 )
2016-08-10 13:50:49 +02:00
Tomas Mraz
a1b5b83ccd
require libcrypto in libssl.pc ( #1301301 )
2016-06-27 12:09:15 +02:00
Petr Písař
b7ec4eee2b
Mandatory Perl build-requires added < https://fedoraproject.org/wiki/Changes/Build_Root_Without_Perl >
2016-06-24 10:44:40 +02:00
Tomas Mraz
eeb6ac1a65
minor upstream release 1.0.2h fixing security issues
2016-05-03 18:23:18 +02:00
Tomas Mraz
0a6d0e5ddc
disable SSLv2 support altogether (without ABI break)
2016-03-29 15:47:40 +02:00
Tom Callaway
589d3ee15b
enable RC5 with permission from Legal
2016-03-07 21:56:55 -06:00
Tomas Mraz
8f6be98bf7
reenable SSL2 in the build to avoid ABI break
...
(it does not make the openssl vulnerable to DROWN attack)
2016-03-02 09:33:35 +01:00
Tomas Mraz
e7a0ff581f
minor upstream release 1.0.2g fixing security issues
2016-03-01 17:22:06 +01:00
Fedora Release Engineering
843fdf0512
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
2016-02-04 11:34:33 +00:00
Tomas Mraz
1004dabcc6
minor upstream release 1.0.2f fixing security issues
...
- add support for MIPS secondary architecture
2016-01-28 17:12:09 +01:00
Tomas Mraz
341f751fb7
Add missing buildrequires for SCTP
2016-01-15 14:43:57 +01:00
Tomas Mraz
0d8bb6ef41
document some options of openssl speed command
2016-01-15 14:19:55 +01:00
Tomas Mraz
41a5ee166a
enable sctp support in DTLS
2015-12-18 13:52:00 +01:00
Tomas Mraz
c79bed9e76
remove unimplemented EC method from header ( #1289599 )
2015-12-08 15:56:50 +01:00
Tomas Mraz
88482b2b4a
the fast nistp implementation works only on little endian architectures
2015-12-07 15:02:57 +01:00
Tomas Mraz
6536aa4c73
Makefile.certificate should not set serial to 0 by default
2015-12-04 14:36:15 +01:00
Tomas Mraz
4240ecaa1b
minor upstream release 1.0.2e fixing moderate severity security issues
...
- enable fast assembler implementation for NIST P-256 and P-521
elliptic curves (#1164210 )
- filter out unwanted link options from the .pc files (#1257836 )
2015-12-04 14:13:59 +01:00
Tomas Mraz
a83e4d7c4a
fix sigill on some AMD CPUs ( #1278194 )
2015-11-16 17:47:54 +01:00
Tom Callaway
314b2359b8
BR: /usr/bin/pod2man
2015-08-12 17:16:04 -04:00
Tom Callaway
1417ec988d
enable secp256k1 (bz1021898)
2015-08-12 17:07:46 -04:00
Tomas Mraz
5675d07a14
minor upstream release 1.0.2d fixing a high severity security issue
2015-07-09 17:25:58 +02:00
Tomas Mraz
7f0b164051
fix the aarch64 build
2015-07-07 09:47:17 +02:00
Dennis Gilmore
49a07018fb
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
2015-06-18 00:06:33 +00:00
Tomas Mraz
837dd04882
minor upstream release 1.0.2c fixing multiple security issues
2015-06-15 18:23:46 +02:00
Peter Robinson
18455c91c0
Add aarch64 sslarch details
2015-05-07 16:04:05 +01:00
Tomas Mraz
e4bf425a79
fix some 64 bit build targets
2015-05-07 12:01:04 +02:00
Tomas Mraz
d743a79756
add alternative certificate chain discovery support from upstream
2015-04-28 17:10:52 +02:00
Tomas Mraz
a1fb602a95
rebase to 1.0.2 branch
2015-04-23 13:57:26 +02:00
Tomas Mraz
805c06e347
drop the AES-GCM restriction of 2^32 operations
...
The IV is always 96 bits (32 bit fixed field + 64 bit invocation field).
2015-04-09 13:10:25 +02:00
Tomas Mraz
729d2d0e11
Multiple security issues fixed.
...
- fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
- fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
- fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption
- fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
- fix CVE-2015-0293 - triggerable assert in SSLv2 server
2015-03-19 18:08:12 +01:00
Tomas Mraz
446f9bea43
fix bug in the CRYPTO_128_unwrap()
2015-03-16 18:02:06 +01:00
Tomas Mraz
303fb7be60
fix bug in the RFC 5649 support ( #1185878 )
2015-02-27 16:03:52 +01:00
Till Maas
1804d4c857
Rebuilt for Fedora 23 Change
...
https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
2015-02-21 22:15:20 +01:00
Tomas Mraz
6a450be963
test in the non-FIPS RSA keygen for minimal distance of p and q
...
similarly to the FIPS RSA keygen
2015-01-16 16:16:14 +01:00
Tomas Mraz
7e7e3f299f
new upstream release fixing multiple security issues
2015-01-09 10:54:51 +01:00
Tomas Mraz
8c1cdfe3ab
Fix date in changelog.
2014-11-20 11:14:35 +01:00
Tomas Mraz
80b5477597
disable SSLv3 by default again
...
Mail servers and possibly LDAP servers should probably allow
it explicitly by SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv3) call
for buggy legacy clients on the smtps, imaps, and ldaps ports.
2014-11-20 10:25:56 +01:00
Tomas Mraz
3f43f7e93a
update the FIPS RSA keygen to be FIPS 186-4 compliant
2014-10-21 16:02:25 +02:00
Tomas Mraz
613f664141
new upstream release fixing multiple security issues
2014-10-16 13:50:08 +02:00
Tomas Mraz
1f162bf2ee
copy negotiated digests when switching certs by SNI ( #1150032 )
2014-10-10 14:16:48 +02:00
Tomas Mraz
11aeae71ed
add support for RFC 5649
2014-09-08 15:22:44 +02:00
Peter Robinson
58eec73ac0
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
2014-08-17 14:08:44 +00:00
Tomas Mraz
a577400ed8
drop RSA X9.31 from RSA FIPS selftests
...
- add Power 8 optimalizations
2014-08-13 20:03:17 +02:00
Tomas Mraz
a78828f786
new upstream release fixing multiple moderate security issues
...
- for now disable only SSLv2 by default
2014-08-07 16:00:47 +02:00
Tom Callaway
6c0bfa087d
fix license handling
2014-07-18 19:31:16 -04:00
Tomas Mraz
6466466115
disable SSLv2 and SSLv3 protocols by default
...
(can be enabled via appropriate SSL_CTX_clear_options() call)
2014-06-30 14:21:11 +02:00
Tomas Mraz
f550490681
use system profile for default cipher list
2014-06-11 15:07:06 +02:00
Tomas Mraz
a98d99a503
fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
...
- make FIPS mode keygen bit length restriction enforced only when
OPENSSL_ENFORCE_MODULUS_BITS is set
2014-06-10 16:38:56 +02:00
Dennis Gilmore
0a491cd9f2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
2014-06-07 12:02:05 -05:00
Tomas Mraz
360a4bb67c
new upstream release 1.0.1h
2014-06-05 15:05:17 +02:00
Peter Robinson
b5f54ff916
Drop obsolete and irrelevant docs, Move devel docs to appropriate package, they're all rather large and of little use for all but historical reference
2014-05-31 22:49:33 +01:00
Tomas Mraz
0376d8368c
new upstream release 1.0.1g
...
- do not include ECC ciphersuites in SSLv2 client hello (#1090952 )
- fail on hmac integrity check if the .hmac file is empty
2014-05-07 11:42:32 +02:00
Dennis Gilmore
e55cd2c0e4
pull in upstream patch for CVE-2014-0160
...
- removed CHANGES file portion from patch for expediency
2014-04-07 19:20:31 -05:00
Tomas Mraz
239d122765
add support for ppc64le architecture ( #1072633 )
2014-04-03 16:24:35 +02:00
Tomas Mraz
477d4a1758
properly detect encryption failure in BIO
...
- use 2048 bit RSA key in FIPS selftests
2014-03-17 17:22:08 +01:00
Tomas Mraz
423ab177c8
use the key length from configuration file if req -newkey rsa is invoked
2014-02-14 16:24:31 +01:00
Tomas Mraz
a9591c7f1f
Add macro for performance build on certain arches.
2014-02-12 16:58:49 +01:00
Tomas Mraz
24632bb1db
print ephemeral key size negotiated in TLS handshake ( #1057715 )
...
- add DH_compute_key_padded needed for FIPS CAVS testing
2014-02-12 16:20:03 +01:00
Tomas Mraz
abe62302b2
make expiration and key length changeable by DAYS and KEYLEN
...
variables in the certificate Makefile (#1058108 )
- change default hash to sha256 (#1062325 )
2014-02-06 18:07:59 +01:00
Tomas Mraz
40825564d8
make 3des strength to be 128 bits instead of 168 ( #1056616 )
2014-01-22 17:57:22 +01:00
Tomas Mraz
519fe2cc24
Two security fixes
...
- fix CVE-2013-4353 - Invalid TLS handshake crash
- fix CVE-2013-6450 - possible MiTM attack on DTLS1
2014-01-07 15:09:40 +01:00
Tomas Mraz
8978637f3b
fix CVE-2013-6449 - crash when version in SSL structure is incorrect
...
- more FIPS validation requirement changes
2013-12-20 14:14:15 +01:00
Tomas Mraz
dc728e2d8b
drop weak ciphers from the default TLS ciphersuite list
...
- add back some symbols that were dropped with update to 1.0.1 branch
- more FIPS validation requirement changes
2013-12-18 15:55:26 +01:00
Tomas Mraz
ad237d19e6
fix locking and reseeding problems with FIPS drbg
2013-11-19 14:52:30 +01:00
Tomas Mraz
e64d4ea7bb
additional changes required for FIPS validation
2013-11-15 16:13:44 +01:00
Tomas Mraz
dcd0fb1ec9
disable verification of certificate, CRL, and OCSP signatures using MD5
...
if OPENSSL_ENABLE_MD5_VERIFY environment variable is not set
2013-11-13 19:42:54 +01:00
Tomas Mraz
83d99a68af
add back support for secp521r1 EC curve
...
- add aarch64 to Configure (#969692 )
2013-11-08 18:16:49 +01:00
Tomas Mraz
5714047e75
fix misdetection of RDRAND support on Cyrix CPUS (from upstream) ( #1022346 )
2013-10-29 16:24:08 +01:00
Tomas Mraz
eca676db7a
do not advertise ECC curves we do not support ( #1022493 )
2013-10-24 10:40:18 +02:00
Tomas Mraz
b3551463ca
only ECC NIST Suite B curves support
...
- drop -fips subpackage
2013-10-16 14:37:51 +02:00
Tom Callaway
1f19ac14f9
resolve bugzilla 319901 (phew! only took 6 years & 9 days)
2013-10-15 02:08:35 +01:00
Tomas Mraz
7ae1dc1df9
Bump release
2013-09-27 15:46:03 +02:00
Tomas Mraz
4e423c3c50
make DTLS1 work in FIPS mode
...
- avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode
2013-09-27 15:43:51 +02:00
Tomas Mraz
df94661da5
avoid dlopening libssl.so from libcrypto ( #1010357 )
2013-09-23 18:30:01 +02:00
Tomas Mraz
372f3ac997
fix small memory leak in FIPS aes selftest
2013-09-20 16:04:50 +02:00
Tomas Mraz
8c28623e94
fix segfault in openssl speed hmac in the FIPS mode
2013-09-19 15:16:50 +02:00
Tomas Mraz
30ebb4d732
document the nextprotoneg option in manual pages
...
original patch by Hubert Kario
2013-09-12 10:39:33 +02:00
Tomas Mraz
ae08b15c89
document the nextprotoneg option in manual pages
...
original patch by Hubert Kario
2013-09-12 10:23:34 +02:00
Kyle McMartin
cb069618e7
arm: use auxv to figure out armcap.c instead of using signals ( #1006474 )
2013-09-11 10:36:42 -04:00
Tomas Mraz
eb63cc63df
try to avoid some races when updating the -fips subpackage
2013-09-04 13:53:38 +02:00
Tomas Mraz
850ca72b9a
use version-release in .hmac suffix to avoid overwrite during upgrade
2013-09-02 15:02:18 +02:00
Tomas Mraz
b5d2711ab6
allow deinitialization of the FIPS mode
2013-08-29 16:41:24 +02:00
Tomas Mraz
1465572e17
always perform the FIPS selftests in library constructor
...
if FIPS module is installed
2013-08-29 11:45:04 +02:00
Tomas Mraz
bb2f3882f2
add -fips subpackage that contains the FIPS module files
2013-08-27 16:03:43 +02:00
Tomas Mraz
9c324da28e
fix use of rdrand if available
...
- more commits cherry picked from upstream
- documentation fixes
2013-08-16 16:06:51 +02:00
Petr Písař
a254940dd1
Perl 5.18 rebuild
2013-08-03 12:05:42 +02:00
Tomas Mraz
acdf8a62f6
use symbol versioning also for the textual version
...
- additional manual page fix
2013-07-26 13:16:10 +02:00
Tomas Mraz
9b36f08da8
additional manual page fixes
2013-07-25 15:14:25 +02:00
Tomas Mraz
653e1efa34
use _prefix macro
2013-07-19 11:46:56 +02:00
Petr Písař
49a1fc761b
Perl 5.18 rebuild
2013-07-17 16:32:50 +02:00
Tomas Mraz
7ccde74773
add openssl.cnf.5 manpage symlink to config.5
2013-07-11 10:44:55 +02:00
Tomas Mraz
9555809e80
add relro linking flag
2013-07-10 17:54:24 +02:00
Tomas Mraz
30aa9303c7
add support for the -trusted_first option for certificate chain verification
2013-07-10 11:02:41 +02:00
Tomas Mraz
dad6e3ee78
fix build of manual pages with current pod2man ( #959439 )
2013-05-03 18:38:28 +02:00
Peter Robinson
6705192b85
Enable ARM optimised build
2013-04-21 14:33:34 +01:00
Tomas Mraz
64e30c5369
fix random bad record mac errors ( #918981 )
2013-03-18 21:34:18 +01:00
Tomas Mraz
9cf55df55b
fix up the SHLIB_VERSION_NUMBER
2013-02-19 20:35:16 +01:00
Tomas Mraz
169c3a0ddb
disable ZLIB loading by default (due to CRIME attack)
2013-02-19 16:41:14 +01:00