This was enabled during the rebase but it needs to be disabled until performance issues are resolved. Related: RHEL-80854 Signed-off-by: Simo Sorce <simo@redhat.com>
1127 lines
42 KiB
RPMSpec
1127 lines
42 KiB
RPMSpec
# For the curious:
|
|
# 0.9.8jk + EAP-FAST soversion = 8
|
|
# 1.0.0 soversion = 10
|
|
# 1.1.0 soversion = 1.1 (same as upstream although presence of some symbols
|
|
# depends on build configuration options)
|
|
# 3.0.0 soversion = 3 (same as upstream)
|
|
%define soversion 3
|
|
|
|
# Arches on which we need to prevent arch conflicts on opensslconf.h, must
|
|
# also be handled in opensslconf-new.h.
|
|
%define multilib_arches %{ix86} ia64 %{mips} ppc ppc64 s390 s390x sparcv9 sparc64 x86_64
|
|
|
|
%define srpmhash() %{lua:
|
|
local files = rpm.expand("%_specdir/openssl.spec")
|
|
for i, p in ipairs(patches) do
|
|
files = files.." "..p
|
|
end
|
|
for i, p in ipairs(sources) do
|
|
files = files.." "..p
|
|
end
|
|
local sha256sum = assert(io.popen("cat "..files.." 2>/dev/null | sha256sum"))
|
|
local hash = sha256sum:read("*a")
|
|
sha256sum:close()
|
|
print(string.sub(hash, 0, 16))
|
|
}
|
|
|
|
%global _performance_build 1
|
|
|
|
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
|
Name: openssl
|
|
Version: 3.5.1
|
|
Release: 1%{?dist}
|
|
Epoch: 1
|
|
Source0: openssl-%{version}.tar.gz
|
|
Source1: fips-hmacify.sh
|
|
Source3: genpatches
|
|
Source6: make-dummy-cert
|
|
Source7: renew-dummy-cert
|
|
Source9: configuration-switch.h
|
|
Source10: configuration-prefix.h
|
|
|
|
Patch0001: 0001-RH-Aarch64-and-ppc64le-use-lib64.patch
|
|
Patch0002: 0002-Add-a-separate-config-file-to-use-for-rpm-installs.patch
|
|
Patch0003: 0003-RH-Do-not-install-html-docs.patch
|
|
Patch0004: 0004-RH-apps-ca-fix-md-option-help-text.patch-DROP.patch
|
|
Patch0005: 0005-RH-Disable-signature-verification-with-bad-digests-R.patch
|
|
Patch0006: 0006-RH-Add-support-for-PROFILE-SYSTEM-system-default-cip.patch
|
|
Patch0007: 0007-RH-Add-FIPS_mode-compatibility-macro.patch
|
|
Patch0008: 0008-RH-Add-Kernel-FIPS-mode-flag-support-FIXSTYLE.patch
|
|
Patch0009: 0009-RH-Drop-weak-curve-definitions-RENAMED-SQUASHED.patch
|
|
Patch0010: 0010-RH-Disable-explicit-ec-curves.patch
|
|
Patch0011: 0011-RH-skipped-tests-EC-curves.patch
|
|
Patch0012: 0012-RH-skip-quic-pairwise.patch
|
|
Patch0013: 0013-RH-version-aliasing.patch
|
|
Patch0014: 0014-RH-Export-two-symbols-for-OPENSSL_str-n-casecmp.patch
|
|
Patch0015: 0015-RH-TMP-KTLS-test-skip.patch
|
|
Patch0016: 0016-RH-Allow-disabling-of-SHA1-signatures.patch
|
|
Patch0017: 0017-FIPS-Red-Hat-s-FIPS-module-name-and-version.patch
|
|
Patch0018: 0018-FIPS-disable-fipsinstall.patch
|
|
Patch0019: 0019-FIPS-Force-fips-provider-on.patch
|
|
Patch0020: 0020-FIPS-INTEG-CHECK-Embed-hmac-in-fips.so-NOTE.patch
|
|
Patch0021: 0021-FIPS-INTEG-CHECK-Add-script-to-hmac-ify-fips.so.patch
|
|
Patch0022: 0022-FIPS-INTEG-CHECK-Execute-KATS-before-HMAC-REVIEW.patch
|
|
Patch0023: 0023-FIPS-RSA-encrypt-limits-REVIEW.patch
|
|
Patch0024: 0024-FIPS-RSA-PCTs.patch
|
|
Patch0025: 0025-FIPS-RSA-encapsulate-limits.patch
|
|
Patch0026: 0026-FIPS-RSA-Disallow-SHAKE-in-OAEP-and-PSS.patch
|
|
Patch0027: 0027-FIPS-RSA-size-mode-restrictions.patch
|
|
Patch0028: 0028-FIPS-RSA-Mark-x931-as-not-approved-by-default.patch
|
|
Patch0029: 0029-FIPS-RSA-Remove-X9.31-padding-signatures-tests.patch
|
|
Patch0030: 0030-FIPS-RSA-NEEDS-REWORK-FIPS-Use-OAEP-in-KATs-support-.patch
|
|
Patch0031: 0031-FIPS-Deny-SHA-1-signature-verification.patch
|
|
Patch0032: 0032-FIPS-RAND-FIPS-140-3-DRBG-NEEDS-REVIEW.patch
|
|
Patch0033: 0033-FIPS-RAND-Forbid-truncated-hashes-SHA-3.patch
|
|
Patch0034: 0034-FIPS-PBKDF2-Set-minimum-password-length.patch
|
|
Patch0035: 0035-FIPS-DH-PCT.patch
|
|
Patch0036: 0036-FIPS-DH-Disable-FIPS-186-4-type-parameters.patch
|
|
Patch0037: 0037-FIPS-TLS-Enforce-EMS-in-TLS-1.2-NOTE.patch
|
|
Patch0038: 0038-FIPS-CMS-Set-default-padding-to-OAEP.patch
|
|
Patch0039: 0039-FIPS-PKCS12-PBMAC1-defaults.patch
|
|
Patch0040: 0040-FIPS-Fix-encoder-decoder-negative-test.patch
|
|
Patch0041: 0041-FIPS-EC-DH-DSA-PCTs.patch
|
|
Patch0042: 0042-FIPS-EC-disable-weak-curves.patch
|
|
Patch0043: 0043-FIPS-NO-DSA-Support.patch
|
|
Patch0044: 0044-FIPS-NO-DES-support.patch
|
|
Patch0045: 0045-FIPS-NO-Kmac.patch
|
|
Patch0046: 0046-FIPS-Fix-some-tests-due-to-our-versioning-change.patch
|
|
Patch0047: 0047-Current-Rebase-status.patch
|
|
Patch0048: 0048-FIPS-KDF-key-lenght-errors.patch
|
|
Patch0049: 0049-FIPS-fix-disallowed-digests-tests.patch
|
|
Patch0050: 0050-Make-openssl-speed-run-in-FIPS-mode.patch
|
|
Patch0051: 0051-Backport-upstream-27483-for-PKCS11-needs.patch
|
|
Patch0052: 0052-Red-Hat-9-FIPS-indicator-defines.patch
|
|
%if ( %{defined rhel} && (! %{defined centos}) )
|
|
Patch0053: 0053-Allow-hybrid-MLKEM-in-FIPS-mode.patch
|
|
%endif
|
|
Patch0054: 0054-Temporarily-disable-SLH-DSA-FIPS-self-tests.patch
|
|
|
|
#The patches that are different for RHEL9 and 10 start here
|
|
Patch0100: 0100-RHEL9-Allow-SHA1-in-seclevel-2-if-rh-allow-sha1-signatures.patch
|
|
Patch0101: 0101-FIPS-enable-pkcs12-mac.patch
|
|
|
|
License: Apache-2.0
|
|
URL: http://www.openssl.org/
|
|
BuildRequires: gcc g++
|
|
BuildRequires: coreutils, perl-interpreter, sed, zlib-devel, /usr/bin/cmp
|
|
BuildRequires: lksctp-tools-devel
|
|
BuildRequires: /usr/bin/rename
|
|
BuildRequires: /usr/bin/pod2man
|
|
BuildRequires: /usr/sbin/sysctl
|
|
BuildRequires: perl(Test::Harness), perl(Test::More), perl(Math::BigInt)
|
|
BuildRequires: perl(Module::Load::Conditional), perl(File::Temp)
|
|
BuildRequires: perl(Time::HiRes), perl(Time::Piece), perl(IPC::Cmd), perl(Pod::Html), perl(Digest::SHA)
|
|
BuildRequires: perl(FindBin), perl(lib), perl(File::Compare), perl(File::Copy), perl(bigint)
|
|
BuildRequires: git-core
|
|
Requires: coreutils
|
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
%description
|
|
The OpenSSL toolkit provides support for secure communications between
|
|
machines. OpenSSL includes a certificate management tool and shared
|
|
libraries which provide various cryptographic algorithms and
|
|
protocols.
|
|
|
|
%package libs
|
|
Summary: A general purpose cryptography library with TLS implementation
|
|
Requires: ca-certificates >= 2008-5
|
|
Requires: crypto-policies >= 20180730
|
|
%if %{defined rhel}
|
|
Requires: openssl-fips-provider
|
|
Suggests: openssl-fips-provider
|
|
%endif
|
|
|
|
%description libs
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-libs
|
|
package contains the libraries that are used by various applications which
|
|
support cryptographic algorithms and protocols.
|
|
|
|
%package devel
|
|
Summary: Files for development of applications which will use OpenSSL
|
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
|
Requires: pkgconfig
|
|
|
|
%description devel
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-devel
|
|
package contains include files needed to develop applications which
|
|
support various cryptographic algorithms and protocols.
|
|
|
|
%package perl
|
|
Summary: Perl scripts provided with OpenSSL
|
|
Requires: perl-interpreter
|
|
Requires: %{name}%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
%description perl
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-perl
|
|
package provides Perl scripts for converting certificates and keys
|
|
from other formats to the formats used by the OpenSSL toolkit.
|
|
|
|
%if %{defined centos}
|
|
%package fips-provider
|
|
Summary: The FIPS Provider module
|
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
|
|
|
%description fips-provider
|
|
OpenSSL is a toolkit for supporting cryptography. The openssl-fips-provider
|
|
package provides the fips.so provider, a cryptography provider that follows
|
|
FIPS requirements and provides FIPS approved algorithms.
|
|
%endif
|
|
|
|
%prep
|
|
%autosetup -S git -n %{name}-%{version}
|
|
|
|
%build
|
|
# Figure out which flags we want to use.
|
|
# default
|
|
sslarch=%{_os}-%{_target_cpu}
|
|
%ifarch %ix86
|
|
sslarch=linux-elf
|
|
if ! echo %{_target} | grep -q i686 ; then
|
|
sslflags="no-asm 386"
|
|
fi
|
|
%endif
|
|
%ifarch x86_64
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
%endif
|
|
%ifarch sparcv9
|
|
sslarch=linux-sparcv9
|
|
sslflags=no-asm
|
|
%endif
|
|
%ifarch sparc64
|
|
sslarch=linux64-sparcv9
|
|
sslflags=no-asm
|
|
%endif
|
|
%ifarch alpha alphaev56 alphaev6 alphaev67
|
|
sslarch=linux-alpha-gcc
|
|
%endif
|
|
%ifarch s390 sh3eb sh4eb
|
|
sslarch="linux-generic32 -DB_ENDIAN"
|
|
%endif
|
|
%ifarch s390x
|
|
sslarch="linux64-s390x"
|
|
%endif
|
|
%ifarch %{arm}
|
|
sslarch=linux-armv4
|
|
%endif
|
|
%ifarch aarch64
|
|
sslarch=linux-aarch64
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
%endif
|
|
%ifarch sh3 sh4
|
|
sslarch=linux-generic32
|
|
%endif
|
|
%ifarch ppc64 ppc64p7
|
|
sslarch=linux-ppc64
|
|
%endif
|
|
%ifarch ppc64le
|
|
sslarch="linux-ppc64le"
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
%endif
|
|
%ifarch mips mipsel
|
|
sslarch="linux-mips32 -mips32r2"
|
|
%endif
|
|
%ifarch mips64 mips64el
|
|
sslarch="linux64-mips64 -mips64r2"
|
|
%endif
|
|
%ifarch mips64el
|
|
sslflags=enable-ec_nistp_64_gcc_128
|
|
%endif
|
|
%ifarch riscv64
|
|
sslarch=linux-generic64
|
|
%endif
|
|
|
|
# Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
|
|
# marked as not requiring an executable stack.
|
|
# Also add -DPURIFY to make using valgrind with openssl easier as we do not
|
|
# want to depend on the uninitialized memory as a source of entropy anyway.
|
|
RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -Wa,--generate-missing-build-notes=yes -DPURIFY $RPM_LD_FLAGS"
|
|
|
|
export HASHBANGPERL=/usr/bin/perl
|
|
|
|
%define fips %{version}-%{srpmhash}
|
|
# ia64, x86_64, ppc are OK by default
|
|
# Configure the build tree. Override OpenSSL defaults with known-good defaults
|
|
# usable on all platforms. The Configure script already knows to use -fPIC and
|
|
# RPM_OPT_FLAGS, so we can skip specifiying them here.
|
|
./Configure \
|
|
--prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
|
|
--system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/opensslcnf.config \
|
|
zlib enable-camellia enable-seed enable-rfc3779 enable-sctp enable-sslkeylog \
|
|
enable-cms enable-md2 enable-rc5 enable-ktls enable-fips -D_GNU_SOURCE\
|
|
no-mdc2 no-ec2m no-sm2 no-sm4 no-atexit enable-buildtest-c++\
|
|
shared ${sslarch} $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\""' -DOPENSSL_PEDANTIC_ZEROIZATION\
|
|
-DREDHAT_FIPS_VENDOR='"\"Red Hat Enterprise Linux OpenSSL FIPS Provider\""' -DREDHAT_FIPS_VERSION='"\"%{fips}\""'\
|
|
-Wl,--allow-multiple-definition
|
|
|
|
# Do not run this in a production package the FIPS symbols must be patched-in
|
|
#util/mkdef.pl crypto update
|
|
|
|
make %{?_smp_mflags} all
|
|
|
|
# Clean up the .pc files
|
|
for i in libcrypto.pc libssl.pc openssl.pc ; do
|
|
sed -i '/^Libs.private:/{s/-L[^ ]* //;s/-Wl[^ ]* //}' $i
|
|
done
|
|
|
|
%check
|
|
# Verify that what was compiled actually works.
|
|
|
|
# Hack - either enable SCTP AUTH chunks in kernel or disable sctp for check
|
|
(sysctl net.sctp.addip_enable=1 && sysctl net.sctp.auth_enable=1) || \
|
|
(echo 'Failed to enable SCTP AUTH chunks, disabling SCTP for tests...' &&
|
|
sed '/"msan" => "default",/a\ \ "sctp" => "default",' configdata.pm > configdata.pm.new && \
|
|
touch -r configdata.pm configdata.pm.new && \
|
|
mv -f configdata.pm.new configdata.pm)
|
|
|
|
|
|
OPENSSL_ENABLE_MD5_VERIFY=
|
|
export OPENSSL_ENABLE_MD5_VERIFY
|
|
OPENSSL_ENABLE_SHA1_SIGNATURES=
|
|
export OPENSSL_ENABLE_SHA1_SIGNATURES
|
|
OPENSSL_SYSTEM_CIPHERS_OVERRIDE=xyz_nonexistent_file
|
|
export OPENSSL_SYSTEM_CIPHERS_OVERRIDE
|
|
#embed HMAC into fips provider for test run
|
|
%{SOURCE1} providers/fips.so
|
|
#run tests itself
|
|
make test HARNESS_JOBS=8
|
|
|
|
# Add generation of HMAC checksum of the final stripped library
|
|
# We manually copy standard definition of __spec_install_post
|
|
# and add hmac calculation/embedding to fips.so
|
|
%if ( %{defined rhel} && (! %{defined centos}) )
|
|
%define __spec_install_post \
|
|
rm -rf $RPM_BUILD_ROOT/%{_libdir}/ossl-modules/fips.so \
|
|
%{?__debug_package:%{__debug_install_post}} \
|
|
%{__arch_install_post} \
|
|
%{__os_install_post} \
|
|
%{nil}
|
|
%else
|
|
%define __spec_install_post \
|
|
%{?__debug_package:%{__debug_install_post}} \
|
|
%{__arch_install_post} \
|
|
%{__os_install_post} \
|
|
%{SOURCE1} $RPM_BUILD_ROOT/%{_libdir}/ossl-modules/fips.so \
|
|
%{nil}
|
|
%endif
|
|
|
|
%define __provides_exclude_from %{_libdir}/openssl
|
|
|
|
%install
|
|
[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
|
|
# Install OpenSSL.
|
|
install -d $RPM_BUILD_ROOT{%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl,%{_pkgdocdir}}
|
|
%make_install
|
|
rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT%{_libdir}/*.so.%{soversion}
|
|
for lib in $RPM_BUILD_ROOT%{_libdir}/*.so.%{version} ; do
|
|
chmod 755 ${lib}
|
|
ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`
|
|
ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`.%{soversion}
|
|
done
|
|
mv rh-openssl.cnf $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
|
|
|
|
# Remove static libraries
|
|
for lib in $RPM_BUILD_ROOT%{_libdir}/*.a ; do
|
|
rm -f ${lib}
|
|
done
|
|
|
|
# Install a makefile for generating keys and self-signed certs, and a script
|
|
# for generating them on the fly.
|
|
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
|
|
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.d
|
|
install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/make-dummy-cert
|
|
install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_bindir}/renew-dummy-cert
|
|
|
|
# Move runable perl scripts to bindir
|
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/*.pl $RPM_BUILD_ROOT%{_bindir}
|
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/tsget $RPM_BUILD_ROOT%{_bindir}
|
|
|
|
# Rename man pages so that they don't conflict with other system man pages.
|
|
pushd $RPM_BUILD_ROOT%{_mandir}
|
|
mv man5/config.5ossl man5/openssl.cnf.5
|
|
popd
|
|
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
|
|
mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
|
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
|
|
|
|
# Ensure the config file timestamps are identical across builds to avoid
|
|
# mulitlib conflicts and unnecessary renames on upgrade
|
|
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
|
|
touch -r %{SOURCE0} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf
|
|
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf.dist
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf.dist
|
|
#we don't use native fipsmodule.cnf because FIPS module is loaded automatically
|
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/fipsmodule.cnf
|
|
|
|
# Determine which arch opensslconf.h is going to try to #include.
|
|
basearch=%{_arch}
|
|
%ifarch %{ix86}
|
|
basearch=i386
|
|
%endif
|
|
%ifarch sparcv9
|
|
basearch=sparc
|
|
%endif
|
|
%ifarch sparc64
|
|
basearch=sparc64
|
|
%endif
|
|
|
|
# Next step of gradual disablement of SSL3.
|
|
# Make SSL3 disappear to newly built dependencies.
|
|
sed -i '/^\#ifndef OPENSSL_NO_SSL_TRACE/i\
|
|
#ifndef OPENSSL_NO_SSL3\
|
|
# define OPENSSL_NO_SSL3\
|
|
#endif' $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
|
|
|
|
%ifarch %{multilib_arches}
|
|
# Do an configuration.h switcheroo to avoid file conflicts on systems where you
|
|
# can have both a 32- and 64-bit version of the library, and they each need
|
|
# their own correct-but-different versions of opensslconf.h to be usable.
|
|
install -m644 %{SOURCE10} \
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
|
|
cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h >> \
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
|
|
install -m644 %{SOURCE9} \
|
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h
|
|
%endif
|
|
ln -s /etc/crypto-policies/back-ends/openssl_fips.config $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/fips_local.cnf
|
|
|
|
%files
|
|
%{!?_licensedir:%global license %%doc}
|
|
%license LICENSE.txt
|
|
%doc NEWS.md README.md
|
|
%{_bindir}/make-dummy-cert
|
|
%{_bindir}/renew-dummy-cert
|
|
%{_bindir}/openssl
|
|
%{_mandir}/man1/*
|
|
%{_mandir}/man5/*
|
|
%{_mandir}/man7/*
|
|
%exclude %{_mandir}/man1/*.pl*
|
|
%exclude %{_mandir}/man1/tsget*
|
|
|
|
%files libs
|
|
%{!?_licensedir:%global license %%doc}
|
|
%license LICENSE.txt
|
|
%dir %{_sysconfdir}/pki/tls
|
|
%dir %{_sysconfdir}/pki/tls/certs
|
|
%dir %{_sysconfdir}/pki/tls/misc
|
|
%dir %{_sysconfdir}/pki/tls/private
|
|
%dir %{_sysconfdir}/pki/tls/openssl.d
|
|
%config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
|
|
%config(noreplace) %{_sysconfdir}/pki/tls/ct_log_list.cnf
|
|
%config %{_sysconfdir}/pki/tls/fips_local.cnf
|
|
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{version}
|
|
%{_libdir}/libcrypto.so.%{soversion}
|
|
%attr(0755,root,root) %{_libdir}/libssl.so.%{version}
|
|
%{_libdir}/libssl.so.%{soversion}
|
|
%attr(0755,root,root) %{_libdir}/engines-%{soversion}
|
|
%attr(0755,root,root) %{_libdir}/ossl-modules/legacy.so
|
|
|
|
%files devel
|
|
%doc CHANGES.md doc/dir-locals.example.el doc/openssl-c-indent.el
|
|
%{_prefix}/include/openssl
|
|
%{_libdir}/*.so
|
|
%{_mandir}/man3/*
|
|
%{_libdir}/pkgconfig/*.pc
|
|
%{_libdir}/cmake/OpenSSL/OpenSSLConfig.cmake
|
|
%{_libdir}/cmake/OpenSSL/OpenSSLConfigVersion.cmake
|
|
|
|
%files perl
|
|
%{_bindir}/c_rehash
|
|
%{_bindir}/*.pl
|
|
%{_bindir}/tsget
|
|
%{_mandir}/man1/*.pl*
|
|
%{_mandir}/man1/tsget*
|
|
%dir %{_sysconfdir}/pki/CA
|
|
%dir %{_sysconfdir}/pki/CA/private
|
|
%dir %{_sysconfdir}/pki/CA/certs
|
|
%dir %{_sysconfdir}/pki/CA/crl
|
|
%dir %{_sysconfdir}/pki/CA/newcerts
|
|
|
|
%if %{defined centos}
|
|
%files fips-provider
|
|
%attr(0755,root,root) %{_libdir}/ossl-modules/fips.so
|
|
%endif
|
|
|
|
%ldconfig_scriptlets libs
|
|
|
|
%changelog
|
|
* Tue Jul 01 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.1-1
|
|
- Rebasing to OpenSSL 3.5.1
|
|
Resolves: RHEL-97797
|
|
Resolves: RHEL-98723
|
|
Resolves: RHEL-99352
|
|
|
|
* Mon Jun 02 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.0-4
|
|
- Compact patches for better maintainability
|
|
Related: RHEL-80854
|
|
- Make hybrid MLKEM work with our FIPS provider (3.0.7)
|
|
Resolves: RHEL-95239
|
|
|
|
* Thu May 22 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.0-3
|
|
- Fix regressions caused by rebase to OpenSSL 3.5
|
|
Related: RHEL-80854
|
|
|
|
* Fri May 02 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.0-2
|
|
- OpenSSL ignores "rh-allow-sha1-signatures = yes" option on RHEL-9
|
|
Resolves: RHEL-88910
|
|
- PKCS#12 should not default to pbmac1 in FIPS mode in RHEL-9
|
|
Resolves: RHEL-88912
|
|
- Fix `openssl speed` running in FIPS mode
|
|
Resolves: RHEL-89860
|
|
- pkeyutl ecdsa signature with sha1 shouldn't work by default
|
|
Resolves: RHEL-89861
|
|
- Expose settable params for EVP_SKEY
|
|
Resolves: RHEL-89862
|
|
- Restore RHEL9-style indicators defines
|
|
Resolves: RHEL-89859
|
|
- Enable sslkeylog support
|
|
Resolves: RHEL-90854
|
|
|
|
* Wed Apr 16 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.5.0-1
|
|
- Rebasing OpenSSL to 3.5
|
|
Resolves: RHEL-80854
|
|
Resolves: RHEL-50208
|
|
Resolves: RHEL-50210
|
|
Resolves: RHEL-50211
|
|
Resolves: RHEL-85954
|
|
|
|
* Wed Jan 29 2025 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.2.2-7
|
|
- RFC7250 handshakes with unauthenticated servers don't abort as expected (CVE-2024-12797)
|
|
Resolves: RHEL-76756
|
|
|
|
* Thu Sep 05 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.2.2-6
|
|
- rebuilt
|
|
Related: RHEL-55339
|
|
|
|
* Wed Sep 04 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.2.2-5
|
|
- Fix CVE-2024-6119: Possible denial of service in X.509 name checks
|
|
Resolves: RHEL-55339
|
|
|
|
* Wed Aug 21 2024 Clemens Lang <cllang@redhat.com> - 1:3.2.2-4
|
|
- Fix CVE-2024-5535: SSL_select_next_proto buffer overread
|
|
Resolves: RHEL-45657
|
|
|
|
* Sat Jun 22 2024 Daiki Ueno <dueno@redhat.com> - 1:3.2.2-3
|
|
- Replace HKDF backward compatibility patch with the official one
|
|
Related: RHEL-40823
|
|
|
|
* Wed Jun 12 2024 Daiki Ueno <dueno@redhat.com> - 1:3.2.2-2
|
|
- Add workaround for EVP_PKEY_CTX_add1_hkdf_info with older providers
|
|
Resolves: RHEL-40823
|
|
|
|
* Wed Jun 05 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.2.2-1
|
|
- Rebase to OpenSSL 3.2.2. Fixes CVE-2024-2511, CVE-2024-4603, CVE-2024-4741,
|
|
and Minerva attack.
|
|
Resolves: RHEL-32148
|
|
Resolves: RHEL-36792
|
|
Resolves: RHEL-38514
|
|
Resolves: RHEL-39111
|
|
|
|
* Thu May 23 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.2.1-2
|
|
- Update RNG changing for FIPS purpose
|
|
Resolves: RHEL-35380
|
|
|
|
* Wed Apr 03 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.2.1-1
|
|
- Rebasing OpenSSL to 3.2.1
|
|
Resolves: RHEL-26271
|
|
|
|
* Wed Feb 21 2024 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-27
|
|
- Use certified FIPS module instead of freshly built one in Red Hat distribution
|
|
Related: RHEL-23474
|
|
|
|
* Tue Nov 21 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-26
|
|
- Avoid implicit function declaration when building openssl
|
|
Related: RHEL-1780
|
|
- In FIPS mode, prevent any other operations when rsa_keygen_pairwise_test fails
|
|
Resolves: RHEL-17104
|
|
- Add a directory for OpenSSL providers configuration
|
|
Resolves: RHEL-17193
|
|
- Eliminate memory leak in OpenSSL when setting elliptic curves on SSL context
|
|
Resolves: RHEL-19515
|
|
- POLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129)
|
|
Resolves: RHEL-21151
|
|
- Excessive time spent checking invalid RSA public keys (CVE-2023-6237)
|
|
Resolves: RHEL-21654
|
|
- SSL ECDHE Kex fails when pkcs11 engine is set in config file
|
|
Resolves: RHEL-20249
|
|
- Denial of service via null dereference in PKCS#12
|
|
Resolves: RHEL-22486
|
|
- Use certified FIPS module instead of freshly built one in Red Hat distribution
|
|
Resolves: RHEL-23474
|
|
|
|
* Mon Oct 16 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-25
|
|
- Provide relevant diagnostics when FIPS checksum is corrupted
|
|
Resolves: RHEL-5317
|
|
- Don't limit using SHA1 in KDFs in non-FIPS mode.
|
|
Resolves: RHEL-5295
|
|
- Provide empty evp_properties section in main OpenSSL configuration file
|
|
Resolves: RHEL-11439
|
|
- Avoid implicit function declaration when building openssl
|
|
Resolves: RHEL-1780
|
|
- Forbid explicit curves when created via EVP_PKEY_fromdata
|
|
Resolves: RHEL-5304
|
|
- AES-SIV cipher implementation contains a bug that causes it to ignore empty
|
|
associated data entries (CVE-2023-2975)
|
|
Resolves: RHEL-5302
|
|
- Excessive time spent checking DH keys and parameters (CVE-2023-3446)
|
|
Resolves: RHEL-5306
|
|
- Excessive time spent checking DH q parameter value (CVE-2023-3817)
|
|
Resolves: RHEL-5308
|
|
- Fix incorrect cipher key and IV length processing (CVE-2023-5363)
|
|
Resolves: RHEL-13251
|
|
- Switch explicit FIPS indicator for RSA-OAEP to approved following
|
|
clarification with CMVP
|
|
Resolves: RHEL-14083
|
|
- Backport the check required by SP800-56Br2 6.4.1.2.1 (3.c)
|
|
Resolves: RHEL-14083
|
|
- Add missing ECDH Public Key Check in FIPS mode
|
|
Resolves: RHEL-15990
|
|
- Excessive time spent in DH check/generation with large Q parameter value (CVE-2023-5678)
|
|
Resolves: RHEL-15954
|
|
|
|
* Wed Jul 12 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-24
|
|
- Make FIPS module configuration more crypto-policies friendly
|
|
Related: rhbz#2216256
|
|
|
|
* Tue Jul 11 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-23
|
|
- Add a workaround for lack of EMS in FIPS mode
|
|
Resolves: rhbz#2216256
|
|
|
|
* Thu Jul 06 2023 Sahana Prasad <sahana@redhat.com> - 1:3.0.7-22
|
|
- Remove unsupported curves from nist_curves.
|
|
Resolves: rhbz#2069336
|
|
|
|
* Mon Jun 26 2023 Sahana Prasad <sahana@redhat.com> - 1:3.0.7-21
|
|
- Remove the listing of brainpool curves in FIPS mode.
|
|
Related: rhbz#2188180
|
|
|
|
* Tue May 30 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-20
|
|
- Fix possible DoS translating ASN.1 object identifiers
|
|
Resolves: CVE-2023-2650
|
|
- Release the DRBG in global default libctx early
|
|
Resolves: rhbz#2211340
|
|
|
|
* Mon May 22 2023 Clemens Lang <cllang@redhat.com> - 1:3.0.7-19
|
|
- Re-enable DHX keys in FIPS mode, disable FIPS 186-4 parameter validation and generation in FIPS mode
|
|
Resolves: rhbz#2169757
|
|
|
|
* Thu May 18 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-18
|
|
- Use OAEP padding and aes-128-cbc by default in cms command in FIPS mode
|
|
Resolves: rhbz#2160797
|
|
|
|
* Tue May 09 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-17
|
|
- Enforce using EMS in FIPS mode - better alerts
|
|
Related: rhbz#2157951
|
|
|
|
* Tue May 02 2023 Sahana Prasad <sahana@redhat.com> - 1:3.0.7-16
|
|
- Upload new upstream sources without manually hobbling them.
|
|
- Remove the hobbling script as it is redundant. It is now allowed to ship
|
|
the sources of patented EC curves, however it is still made unavailable to use
|
|
by compiling with the 'no-ec2m' Configure option. The additional forbidden
|
|
curves such as P-160, P-192, wap-tls curves are manually removed by updating
|
|
0011-Remove-EC-curves.patch.
|
|
- Enable Brainpool curves.
|
|
- Apply the changes to ec_curve.c and ectest.c as a new patch
|
|
0010-Add-changes-to-ectest-and-eccurve.patch instead of replacing them.
|
|
- Modify 0011-Remove-EC-curves.patch to allow Brainpool curves.
|
|
- Modify 0011-Remove-EC-curves.patch to allow code under macro OPENSSL_NO_EC2M.
|
|
Resolves: rhbz#2130618, rhbz#2188180
|
|
|
|
* Fri Apr 28 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-15
|
|
- Backport implicit rejection for RSA PKCS#1 v1.5 encryption
|
|
Resolves: rhbz#2153471
|
|
|
|
* Fri Apr 21 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-14
|
|
- Input buffer over-read in AES-XTS implementation on 64 bit ARM
|
|
Resolves: rhbz#2188554
|
|
|
|
* Tue Apr 18 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-13
|
|
- Enforce using EMS in FIPS mode
|
|
Resolves: rhbz#2157951
|
|
- Fix excessive resource usage in verifying X509 policy constraints
|
|
Resolves: rhbz#2186661
|
|
- Fix invalid certificate policies in leaf certificates check
|
|
Resolves: rhbz#2187429
|
|
- Certificate policy check not enabled
|
|
Resolves: rhbz#2187431
|
|
- OpenSSL rsa_verify_recover key length checks in FIPS mode
|
|
Resolves: rhbz#2186819
|
|
|
|
* Fri Mar 24 2023 Clemens Lang <cllang@redhat.com> - 1:3.0.7-12
|
|
- Change explicit FIPS indicator for RSA decryption to unapproved
|
|
Resolves: rhbz#2179379
|
|
|
|
* Mon Mar 20 2023 Clemens Lang <cllang@redhat.com> - 1:3.0.7-11
|
|
- Add missing reference to patchfile to add explicit FIPS indicator to RSA
|
|
encryption and RSASVE and fix the gettable parameter list for the RSA
|
|
asymmetric cipher implementation.
|
|
Resolves: rhbz#2179379
|
|
|
|
* Fri Mar 17 2023 Clemens Lang <cllang@redhat.com> - 1:3.0.7-10
|
|
- Add explicit FIPS indicator to RSA encryption and RSASVE
|
|
Resolves: rhbz#2179379
|
|
|
|
* Thu Mar 16 2023 Clemens Lang <cllang@redhat.com> - 1:3.0.7-9
|
|
- Fix explicit FIPS indicator for X9.42 KDF when used with output lengths < 14 bytes
|
|
Resolves: rhbz#2175864
|
|
|
|
* Thu Mar 16 2023 Clemens Lang <cllang@redhat.com> - 1:3.0.7-8
|
|
- Fix Wpointer-sign compiler warning
|
|
Resolves: rhbz#2178034
|
|
|
|
* Tue Mar 14 2023 Clemens Lang <cllang@redhat.com> - 1:3.0.7-7
|
|
- Add explicit FIPS indicators to key derivation functions
|
|
Resolves: rhbz#2175860 rhbz#2175864
|
|
- Zeroize FIPS module integrity check MAC after check
|
|
Resolves: rhbz#2175873
|
|
- Add explicit FIPS indicator for IV generation in AES-GCM
|
|
Resolves: rhbz#2175868
|
|
- Add explicit FIPS indicator for PBKDF2, use test vector with FIPS-compliant
|
|
salt in PBKDF2 FIPS self-test
|
|
Resolves: rhbz#2178137
|
|
- Limit RSA_NO_PADDING for encryption and signature in FIPS mode
|
|
Resolves: rhbz#2178029
|
|
- Pairwise consistency tests should use Digest+Sign/Verify
|
|
Resolves: rhbz#2178034
|
|
- Forbid DHX keys import in FIPS mode
|
|
Resolves: rhbz#2178030
|
|
- DH PCT should abort on failure
|
|
Resolves: rhbz#2178039
|
|
- Increase RNG seeding buffer size to 32
|
|
Related: rhbz#2168224
|
|
|
|
* Wed Mar 08 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-6
|
|
- Fixes RNG slowdown in FIPS mode
|
|
Resolves: rhbz#2168224
|
|
|
|
* Wed Feb 08 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-5
|
|
- Fixed X.509 Name Constraints Read Buffer Overflow
|
|
Resolves: CVE-2022-4203
|
|
- Fixed Timing Oracle in RSA Decryption
|
|
Resolves: CVE-2022-4304
|
|
- Fixed Double free after calling PEM_read_bio_ex
|
|
Resolves: CVE-2022-4450
|
|
- Fixed Use-after-free following BIO_new_NDEF
|
|
Resolves: CVE-2023-0215
|
|
- Fixed Invalid pointer dereference in d2i_PKCS7 functions
|
|
Resolves: CVE-2023-0216
|
|
- Fixed NULL dereference validating DSA public key
|
|
Resolves: CVE-2023-0217
|
|
- Fixed X.400 address type confusion in X.509 GeneralName
|
|
Resolves: CVE-2023-0286
|
|
- Fixed NULL dereference during PKCS7 data verification
|
|
Resolves: CVE-2023-0401
|
|
|
|
* Wed Jan 11 2023 Clemens Lang <cllang@redhat.com> - 1:3.0.7-4
|
|
- Disallow SHAKE in RSA-OAEP decryption in FIPS mode
|
|
Resolves: rhbz#2142121
|
|
|
|
* Thu Jan 05 2023 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-3
|
|
- Refactor OpenSSL fips module MAC verification
|
|
Resolves: rhbz#2157965
|
|
|
|
* Thu Nov 24 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-2
|
|
- Various provider-related imrovements necessary for PKCS#11 provider correct operations
|
|
Resolves: rhbz#2142517
|
|
- We should export 2 versions of OPENSSL_str[n]casecmp to be compatible with upstream
|
|
Resolves: rhbz#2133809
|
|
- Removed recommended package for openssl-libs
|
|
Resolves: rhbz#2093804
|
|
- Adjusting include for the FIPS_mode macro
|
|
Resolves: rhbz#2083879
|
|
- Backport of ppc64le Montgomery multiply enhancement
|
|
Resolves: rhbz#2130708
|
|
- Fix explicit indicator for PSS salt length in FIPS mode when used with
|
|
negative magic values
|
|
Resolves: rhbz#2142087
|
|
- Update change to default PSS salt length with patch state from upstream
|
|
Related: rhbz#2142087
|
|
|
|
* Tue Nov 22 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.7-1
|
|
- Rebasing to OpenSSL 3.0.7
|
|
Resolves: rhbz#2129063
|
|
|
|
* Mon Nov 14 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-44
|
|
- SHAKE-128/256 are not allowed with RSA in FIPS mode
|
|
Resolves: rhbz#2144010
|
|
- Avoid memory leaks in TLS
|
|
Resolves: rhbz#2144008
|
|
- FIPS RSA CRT tests must use correct parameters
|
|
Resolves: rhbz#2144006
|
|
- FIPS-140-3 permits only SHA1, SHA256, and SHA512 for DRBG-HASH/DRBG-HMAC
|
|
Resolves: rhbz#2144017
|
|
- Remove support for X9.31 signature padding in FIPS mode
|
|
Resolves: rhbz#2144015
|
|
- Add explicit indicator for SP 800-108 KDFs with short key lengths
|
|
Resolves: rhbz#2144019
|
|
- Add explicit indicator for HMAC with short key lengths
|
|
Resolves: rhbz#2144000
|
|
- Set minimum password length for PBKDF2 in FIPS mode
|
|
Resolves: rhbz#2144003
|
|
- Add explicit indicator for PSS salt length in FIPS mode
|
|
Resolves: rhbz#2144012
|
|
- Clamp default PSS salt length to digest size for FIPS 186-4 compliance
|
|
Related: rhbz#2144012
|
|
- Forbid short RSA keys for key encapsulation/decapsulation in FIPS mode
|
|
Resolves: rhbz#2145170
|
|
|
|
* Tue Nov 01 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-43
|
|
- CVE-2022-3602: X.509 Email Address Buffer Overflow
|
|
- CVE-2022-3786: X.509 Email Address Buffer Overflow
|
|
Resolves: CVE-2022-3602
|
|
|
|
* Wed Oct 26 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-42
|
|
- CVE-2022-3602: X.509 Email Address Buffer Overflow
|
|
Resolves: CVE-2022-3602 (rhbz#2137723)
|
|
|
|
* Thu Aug 11 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-41
|
|
- Zeroize public keys as required by FIPS 140-3
|
|
Related: rhbz#2102542
|
|
- Add FIPS indicator for HKDF
|
|
Related: rhbz#2114772
|
|
|
|
* Fri Aug 05 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-40
|
|
- Deal with DH keys in FIPS mode according FIPS-140-3 requirements
|
|
Related: rhbz#2102536
|
|
- Deal with ECDH keys in FIPS mode according FIPS-140-3 requirements
|
|
Related: rhbz#2102537
|
|
- Use signature for RSA pairwise test according FIPS-140-3 requirements
|
|
Related: rhbz#2102540
|
|
- Reseed all the parent DRBGs in chain on reseeding a DRBG
|
|
Related: rhbz#2102541
|
|
|
|
* Mon Aug 01 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-39
|
|
- Use RSA-OAEP in FIPS RSA encryption/decryption FIPS self-test
|
|
- Use Use digest_sign & digest_verify in FIPS signature self test
|
|
- Use FFDHE2048 in Diffie-Hellman FIPS self-test
|
|
Resolves: rhbz#2102535
|
|
|
|
* Thu Jul 14 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-38
|
|
- Fix segfault in EVP_PKEY_Q_keygen() when OpenSSL was not previously
|
|
initialized.
|
|
Resolves: rhbz#2103289
|
|
- Improve AES-GCM performance on Power9 and Power10 ppc64le
|
|
Resolves: rhbz#2051312
|
|
- Improve ChaCha20 performance on Power10 ppc64le
|
|
Resolves: rhbz#2051312
|
|
|
|
* Tue Jul 05 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-37
|
|
- CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86
|
|
Resolves: CVE-2022-2097
|
|
|
|
* Thu Jun 16 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-36
|
|
- Ciphersuites with RSAPSK KX should be filterd in FIPS mode
|
|
- Related: rhbz#2085088
|
|
- FIPS provider should block RSA encryption for key transport.
|
|
- Other RSA encryption options should still be available if key length is enough
|
|
- Related: rhbz#2053289
|
|
- Improve diagnostics when passing unsupported groups in TLS
|
|
- Related: rhbz#2070197
|
|
- Fix PPC64 Montgomery multiplication bug
|
|
- Related: rhbz#2098199
|
|
- Strict certificates validation shouldn't allow explicit EC parameters
|
|
- Related: rhbz#2058663
|
|
- CVE-2022-2068: the c_rehash script allows command injection
|
|
- Related: rhbz#2098277
|
|
|
|
* Wed Jun 08 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-35
|
|
- Add explicit indicators for signatures in FIPS mode and mark signature
|
|
primitives as unapproved.
|
|
Resolves: rhbz#2087147
|
|
|
|
* Fri Jun 03 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-34
|
|
- Some OpenSSL test certificates are expired, updating
|
|
- Resolves: rhbz#2092456
|
|
|
|
* Thu May 26 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-33
|
|
- CVE-2022-1473 openssl: OPENSSL_LH_flush() breaks reuse of memory
|
|
- Resolves: rhbz#2089444
|
|
- CVE-2022-1343 openssl: Signer certificate verification returned
|
|
inaccurate response when using OCSP_NOCHECKS
|
|
- Resolves: rhbz#2087911
|
|
- CVE-2022-1292 openssl: c_rehash script allows command injection
|
|
- Resolves: rhbz#2090362
|
|
- Revert "Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode"
|
|
Related: rhbz#2087147
|
|
- Use KAT for ECDSA signature tests, s390 arch
|
|
- Resolves: rhbz#2069235
|
|
|
|
* Thu May 19 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-32
|
|
- `openssl ecparam -list_curves` lists only FIPS-approved curves in FIPS mode
|
|
- Resolves: rhbz#2083240
|
|
- Ciphersuites with RSA KX should be filterd in FIPS mode
|
|
- Related: rhbz#2085088
|
|
- In FIPS mode, signature verification works with keys of arbitrary size
|
|
above 2048 bit, and only with 1024, 1280, 1536, 1792 bits for keys
|
|
below 2048 bits
|
|
- Resolves: rhbz#2077884
|
|
|
|
* Wed May 18 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-31
|
|
- Disable SHA-1 signature verification in FIPS mode
|
|
- Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode
|
|
Resolves: rhbz#2087147
|
|
|
|
* Mon May 16 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-30
|
|
- Use KAT for ECDSA signature tests
|
|
- Resolves: rhbz#2069235
|
|
|
|
* Thu May 12 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-29
|
|
- `-config` argument of openssl app should work properly in FIPS mode
|
|
- Resolves: rhbz#2083274
|
|
- openssl req defaults on PKCS#8 encryption changed to AES-256-CBC
|
|
- Resolves: rhbz#2063947
|
|
|
|
* Fri May 06 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-28
|
|
- OpenSSL should not accept custom elliptic curve parameters
|
|
- Resolves rhbz#2066412
|
|
- OpenSSL should not accept explicit curve parameters in FIPS mode
|
|
- Resolves rhbz#2058663
|
|
|
|
* Fri May 06 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-27
|
|
- Change FIPS module version to include hash of specfile, patches and sources
|
|
Resolves: rhbz#2070550
|
|
|
|
* Thu May 05 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-26
|
|
- OpenSSL FIPS module should not build in non-approved algorithms
|
|
- Resolves: rhbz#2081378
|
|
|
|
* Mon May 02 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-25
|
|
- FIPS provider should block RSA encryption for key transport.
|
|
- Other RSA encryption options should still be available
|
|
- Resolves: rhbz#2053289
|
|
|
|
* Thu Apr 28 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-24
|
|
- Fix regression in evp_pkey_name2type caused by tr_TR locale fix
|
|
Resolves: rhbz#2071631
|
|
|
|
* Wed Apr 20 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-23
|
|
- Fix openssl curl error with LANG=tr_TR.utf8
|
|
- Resolves: rhbz#2071631
|
|
|
|
* Mon Mar 28 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-22
|
|
- FIPS provider should block RSA encryption for key transport
|
|
- Resolves: rhbz#2053289
|
|
|
|
* Tue Mar 22 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-21
|
|
- Fix occasional internal error in TLS when DHE is used
|
|
- Resolves: rhbz#2004915
|
|
|
|
* Fri Mar 18 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-20
|
|
- Fix acceptance of SHA-1 certificates with rh-allow-sha1-signatures = yes when
|
|
no OpenSSL library context is set
|
|
- Resolves: rhbz#2065400
|
|
|
|
* Fri Mar 18 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-19
|
|
- Fix TLS connections with SHA1 signatures if rh-allow-sha1-signatures = yes
|
|
- Resolves: rhbz#2065400
|
|
|
|
* Wed Mar 16 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-18
|
|
- CVE-2022-0778 fix
|
|
- Resolves: rhbz#2062315
|
|
|
|
* Thu Mar 10 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-17
|
|
- Fix invocation of EVP_PKEY_CTX_set_rsa_padding(RSA_PKCS1_PSS_PADDING) before
|
|
setting an allowed digest with EVP_PKEY_CTX_set_signature_md()
|
|
- Skipping 3.0.1-16 due to version numbering confusion with the RHEL-9.0 branch
|
|
- Resolves: rhbz#2062640
|
|
|
|
* Tue Mar 01 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-15
|
|
- Allow SHA1 in SECLEVEL 2 if rh-allow-sha1-signatures = yes
|
|
- Resolves: rhbz#2060510
|
|
|
|
* Fri Feb 25 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-14
|
|
- Prevent use of SHA1 with ECDSA
|
|
- Resolves: rhbz#2031742
|
|
|
|
* Fri Feb 25 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-13
|
|
- OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
|
|
- Resolves: rhbz#1977867
|
|
|
|
* Thu Feb 24 2022 Peter Robinson <pbrobinson@fedoraproject.org> - 1:3.0.1-12
|
|
- Support KBKDF (NIST SP800-108) with an R value of 8bits
|
|
- Resolves: rhbz#2027261
|
|
|
|
* Wed Feb 23 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-11
|
|
- Allow SHA1 usage in MGF1 for RSASSA-PSS signatures
|
|
- Resolves: rhbz#2031742
|
|
|
|
* Wed Feb 23 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-10
|
|
- rebuilt
|
|
|
|
* Tue Feb 22 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-9
|
|
- Allow SHA1 usage in HMAC in TLS
|
|
- Resolves: rhbz#2031742
|
|
|
|
* Tue Feb 22 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-8
|
|
- OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters
|
|
- Resolves: rhbz#1977867
|
|
- pkcs12 export broken in FIPS mode
|
|
- Resolves: rhbz#2049265
|
|
|
|
* Tue Feb 22 2022 Clemens Lang <cllang@redhat.com> - 1:3.0.1-8
|
|
- Disable SHA1 signature creation and verification by default
|
|
- Set rh-allow-sha1-signatures = yes to re-enable
|
|
- Resolves: rhbz#2031742
|
|
|
|
* Thu Feb 03 2022 Sahana Prasad <sahana@redhat.com> - 1:3.0.1-7
|
|
- s_server: correctly handle 2^14 byte long records
|
|
- Resolves: rhbz#2042011
|
|
|
|
* Tue Feb 01 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-6
|
|
- Adjust FIPS provider version
|
|
- Related: rhbz#2026445
|
|
|
|
* Wed Jan 26 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-5
|
|
- On the s390x, zeroize all the copies of TLS premaster secret
|
|
- Related: rhbz#2040448
|
|
|
|
* Fri Jan 21 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-4
|
|
- rebuilt
|
|
|
|
* Fri Jan 21 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.1-3
|
|
- KATS tests should be executed before HMAC verification
|
|
- Restoring fips=yes for SHA1
|
|
- Related: rhbz#2026445, rhbz#2041994
|
|
|
|
* Thu Jan 20 2022 Sahana Prasad <sahana@redhat.com> - 1:3.0.1-2
|
|
- Add enable-buildtest-c++ to the configure options.
|
|
- Related: rhbz#1990814
|
|
|
|
* Tue Jan 18 2022 Sahana Prasad <sahana@redhat.com> - 1:3.0.1-1
|
|
- Rebase to upstream version 3.0.1
|
|
- Fixes CVE-2021-4044 Invalid handling of X509_verify_cert() internal errors in libssl
|
|
- Resolves: rhbz#2038910, rhbz#2035148
|
|
|
|
* Mon Jan 17 2022 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-7
|
|
- Remove algorithms we don't plan to certify from fips module
|
|
- Remove native fipsmodule.cnf
|
|
- Related: rhbz#2026445
|
|
|
|
* Tue Dec 21 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-6
|
|
- openssl speed should run in FIPS mode
|
|
- Related: rhbz#1977318
|
|
|
|
* Wed Nov 24 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-5
|
|
- rebuilt for spec cleanup
|
|
- Related: rhbz#1985362
|
|
|
|
* Thu Nov 18 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-4
|
|
- Embed FIPS HMAC in fips.so
|
|
- Enforce loading FIPS provider when FIPS kernel flag is on
|
|
- Related: rhbz#1985362
|
|
|
|
* Thu Oct 07 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-3
|
|
- Fix memory leak in s_client
|
|
- Related: rhbz#1996092
|
|
|
|
* Mon Sep 20 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-2
|
|
- Avoid double-free on error seeding the RNG.
|
|
- KTLS and FIPS may interfere, so tests need to be tuned
|
|
- Resolves: rhbz#1952844, rhbz#1961643
|
|
|
|
* Thu Sep 09 2021 Sahana Prasad <sahana@redhat.com> - 1:3.0.0-1
|
|
- Rebase to upstream version 3.0.0
|
|
- Related: rhbz#1990814
|
|
|
|
* Wed Aug 25 2021 Sahana Prasad <sahana@redhat.com> - 1:3.0.0-0.beta2.7
|
|
- Removes the dual-abi build as it not required anymore. The mass rebuild
|
|
was completed and all packages are rebuilt against Beta version.
|
|
- Resolves: rhbz#1984097
|
|
|
|
* Mon Aug 23 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 1:3.0.0-0.beta2.6
|
|
- Correctly process CMS reading from /dev/stdin
|
|
- Resolves: rhbz#1986315
|
|
|
|
* Mon Aug 16 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.5
|
|
- Add instruction for loading legacy provider in openssl.cnf
|
|
- Resolves: rhbz#1975836
|
|
|
|
* Mon Aug 16 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.4
|
|
- Adds support for IDEA encryption.
|
|
- Resolves: rhbz#1990602
|
|
|
|
* Tue Aug 10 2021 Sahana Prasad <sahana@redhat.com> - 3.0.0-0.beta2.3
|
|
- Fixes core dump in openssl req -modulus
|
|
- Fixes 'openssl req' to not ask for password when non-encrypted private key
|
|
is used
|
|
- cms: Do not try to check binary format on stdin and -rctform fix
|
|
- Resolves: rhbz#1988137, rhbz#1988468, rhbz#1988137
|
|
|
|
* Mon Aug 09 2021 Mohan Boddu <mboddu@redhat.com> - 1:3.0.0-0.beta2.2.1
|
|
- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags
|
|
Related: rhbz#1991688
|
|
|
|
* Wed Aug 04 2021 Dmitry Belyavskiy <dbelyavs@redhat.com> - 3.0.0-0.beta2.2
|
|
- When signature_algorithm extension is omitted, use more relevant alerts
|
|
- Resolves: rhbz#1965017
|
|
|
|
* Tue Aug 03 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta2.1
|
|
- Rebase to upstream version beta2
|
|
- Related: rhbz#1903209
|
|
|
|
* Thu Jul 22 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.5
|
|
- Prevents creation of duplicate cert entries in PKCS #12 files
|
|
- Resolves: rhbz#1978670
|
|
|
|
* Wed Jul 21 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.4
|
|
- NVR bump to update to OpenSSL 3.0 Beta1
|
|
|
|
* Mon Jul 19 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.3
|
|
- Update patch dual-abi.patch to add the #define macros in implementation
|
|
files instead of public header files
|
|
|
|
* Wed Jul 14 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.2
|
|
- Removes unused patch dual-abi.patch
|
|
|
|
* Wed Jul 14 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.beta1.1
|
|
- Update to Beta1 version
|
|
- Includes a patch to support dual-ABI, as Beta1 brekas ABI with alpha16
|
|
|
|
* Tue Jul 06 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.7
|
|
- Fixes override of openssl_conf in openssl.cnf
|
|
- Use AI_ADDRCONFIG only when explicit host name is given
|
|
- Temporarily remove fipsmodule.cnf for arch i686
|
|
- Fixes segmentation fault in BN_lebin2bn
|
|
- Resolves: rhbz#1975847, rhbz#1976845, rhbz#1973477, rhbz#1975855
|
|
|
|
* Fri Jul 02 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.6
|
|
- Adds FIPS mode compatibility patch (sahana@redhat.com)
|
|
- Related: rhbz#1977318
|
|
|
|
* Fri Jul 02 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.5
|
|
- Fixes system hang issue when booted in FIPS mode (sahana@redhat.com)
|
|
- Temporarily disable downstream FIPS patches
|
|
- Related: rhbz#1977318
|
|
|
|
* Fri Jun 11 2021 Mohan Boddu <mboddu@redhat.com> 3.0.0-0.alpha16.4
|
|
- Speeding up building openssl (dbelyavs@redhat.com)
|
|
Resolves: rhbz#1903209
|
|
|
|
* Fri Jun 04 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.3
|
|
- Fix reading SPKAC data from stdin
|
|
- Fix incorrect OSSL_PKEY_PARAM_MAX_SIZE for ed25519 and ed448
|
|
- Return 0 after cleanup in OPENSSL_init_crypto()
|
|
- Cleanup the peer point formats on regotiation
|
|
- Fix default digest to SHA256
|
|
|
|
* Thu May 27 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.2
|
|
- Enable FIPS via config options
|
|
|
|
* Mon May 17 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha16.1
|
|
- Update to alpha 16 version
|
|
Resolves: rhbz#1952901 openssl sends alert after orderly connection close
|
|
|
|
* Mon Apr 26 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha15.1
|
|
- Update to alpha 15 version
|
|
Resolves: rhbz#1903209, rhbz#1952598,
|
|
|
|
* Fri Apr 16 2021 Mohan Boddu <mboddu@redhat.com> - 1:3.0.0-0.alpha13.1.1
|
|
- Rebuilt for RHEL 9 BETA on Apr 15th 2021. Related: rhbz#1947937
|
|
|
|
* Fri Apr 09 2021 Sahana Prasad <sahana@redhat.com> 3.0.0-0.alpha13.1
|
|
- Update to new major release OpenSSL 3.0.0 alpha 13
|
|
Resolves: rhbz#1903209
|