* Bugfixes
- Fixed TLS socket EOF handling with OpenSSL 3.x.
This bug caused major interoperability issues between
stunnel built with OpenSSL 3.x and Microsoft's
Schannel Security Support Provider (SSP).
- Fixed reading certificate chains from PKCS#12 files.
* Features
- Added configurable delay for the "retry" option.
Resolves: rhbz#2222467
Signed-off-by: Clemens Lang <cllang@redhat.com>
Avoid manually listing the patches by switching to %autosetup. Keep the
backup files by using the 'gendiff' version control system option of
%autosetup available in rpm >= 4.14.
All but two of the `%if 0%{?fedora} >= 15 || 0%{?rhel} >= 7`
conditionals were removed in 76c7fad (Fix systemd
executions/requirements, 2018-01-25). Remove the others.
Remove Fedora version from `%if 0%{?fedora} > 27 || 0%{?rhel} > 7`.
Fedora 27 has been EOL since 2018-11-30.
The || section after make test replaced the return value of the entire
statement with 0. This hides error in test execution.
Related: rhbz#2051083
Signed-off-by: Clemens Lang <cllang@redhat.com>
Fixes#1887204.
Update the default TLS version patch to no longer include a large amount
of whitespace in its "Using the default TLS version as specified in its
OpenSSL crypto policies. Not setting explicitly." message. The
whitespace was caused by a line continuation, which is now replaced by
string literal concatenation.
Patch the FIPS tests to be skipped when stunnel is compiled against an
OpenSSL 3.x configured with enable-fips, but without the required
configuration that would be installed by a system administrator using
openssl fipsinstall. This matches the behavior when compiled against
OpenSSL 3.x configured without enable-fips.
Switch to package URL to https. Upstream has done the same in the spec
file in the tarball.
Add build dependencies for python3 and the openssl command line tool.
Both are used in tests now.
Drop a sed expression applied to the configure script that no longer
does anything and remove environment variables from testing that are no
longer required to make the tests pass.
- Fixes#1925229 - client certificate not correctly verified
when redirect and verifyChain options are used.
Signed-off-by: Sahana Prasad <sahana@redhat.com>
With this patch, the stunnel defaults defined in sslVersionMin and sslVersionMax
cannot override the default versions defined in OpenSSL crypto policies.