# For the curious: # 0.9.5a soversion = 0 # 0.9.6 soversion = 1 # 0.9.6a soversion = 2 # 0.9.6c soversion = 3 # 0.9.7a soversion = 4 # 0.9.7ef soversion = 5 # 0.9.8ab soversion = 6 # 0.9.8g soversion = 7 # 0.9.8jk + EAP-FAST soversion = 8 # 1.0.0 soversion = 10 %define soversion 10 # Number of threads to spawn when testing some threading fixes. %define thread_test_threads %{?threads:%{threads}}%{!?threads:1} # Arches on which we need to prevent arch conflicts on opensslconf.h, must # also be handled in opensslconf-new.h. %define multilib_arches %{ix86} ia64 ppc ppc64 s390 s390x sparcv9 sparc64 x86_64 Summary: A general purpose cryptography library with TLS implementation Name: openssl101e Version: 1.0.1e Release: 11%{?dist}.art # We have to remove certain patented algorithms from the openssl source # tarball with the hobble-openssl script which is included below. # The original openssl upstream tarball cannot be shipped in the .src.rpm. Source: openssl-%{version}-hobbled.tar.xz Source1: hobble-openssl Source2: Makefile.certificate Source5: README.legacy-settings Source6: make-dummy-cert Source7: renew-dummy-cert Source8: openssl-thread-test.c Source9: opensslconf-new.h Source10: opensslconf-new-warning.h Source11: README.FIPS Source12: ec_curve.c Source13: ectest.c # Build changes Patch1: openssl-1.0.1-beta2-rpmbuild.patch Patch2: openssl-1.0.0f-defaults.patch Patch4: openssl-1.0.0-beta5-enginesdir.patch Patch5: openssl-0.9.8a-no-rpath.patch Patch6: openssl-0.9.8b-test-use-localhost.patch Patch7: openssl-1.0.0-timezone.patch Patch8: openssl-1.0.1c-perlfind.patch Patch9: openssl-1.0.1c-aliasing.patch # Bug fixes Patch23: openssl-1.0.1c-default-paths.patch Patch24: openssl-1.0.1e-issuer-hash.patch # Functionality changes Patch33: openssl-1.0.0-beta4-ca-dir.patch Patch34: openssl-0.9.6-x509.patch Patch35: openssl-0.9.8j-version-add-engines.patch Patch36: openssl-1.0.0e-doc-noeof.patch Patch38: openssl-1.0.1-beta2-ssl-op-all.patch Patch39: openssl-1.0.1c-ipv6-apps.patch Patch40: openssl-1.0.1e-fips.patch Patch43: openssl-1.0.1e-krb5keytab.patch Patch45: openssl-1.0.1e-env-zlib.patch Patch47: openssl-1.0.0-beta5-readme-warning.patch Patch49: openssl-1.0.1a-algo-doc.patch Patch50: openssl-1.0.1-beta2-dtls1-abi.patch Patch51: openssl-1.0.1e-version.patch Patch56: openssl-1.0.0c-rsa-x931.patch Patch58: openssl-1.0.1-beta2-fips-md5-allow.patch Patch60: openssl-1.0.0d-apps-dgst.patch Patch63: openssl-1.0.0d-xmpp-starttls.patch Patch65: openssl-1.0.0e-chil-fixes.patch Patch66: openssl-1.0.1-pkgconfig-krb5.patch Patch67: openssl-1.0.1e-disable-aesni.patch Patch68: openssl-1.0.1e-secure-getenv.patch Patch69: openssl-1.0.1c-dh-1024.patch Patch70: openssl-1.0.1e-fips-ec.patch Patch71: openssl-1.0.1e-manfix.patch Patch72: openssl-1.0.1e-fips-ctor.patch Patch73: openssl-1.0.1e-ecc-suiteb.patch Patch74: openssl-1.0.1e-compat-symbols.patch Patch76: openssl-1.0.1e-new-fips-reqs.patch Patch77: openssl-1.0.1e-weak-ciphers.patch Patch78: openssl-1.0.1e-3des-strength.patch Patch79: openssl-1.0.1e-req-keylen.patch Patch41: openssl-1.0.1e-ssl2-no-ec.patch Patch42: openssl-1.0.1e-enc-fail.patch # Backported fixes including security fixes Patch81: openssl-1.0.1-beta2-padlock64.patch Patch82: openssl-1.0.1e-backports.patch Patch83: openssl-1.0.1e-bad-mac.patch Patch84: openssl-1.0.1e-trusted-first.patch Patch85: openssl-1.0.1e-ephemeral-key-size.patch Patch86: openssl-1.0.1e-cve-2013-6449.patch Patch87: openssl-1.0.1e-cve-2013-6450.patch Patch88: openssl-1.0.1e-cve-2013-4353.patch Patch89: openssl-1.0.1e-cve-2014-0160.patch Patch90: openssl-1.0.1e-cve-2010-5298.patch Patch91: openssl-1.0.1e-cve-2014-0195.patch Patch92: openssl-1.0.1e-cve-2014-0198.patch Patch93: openssl-1.0.1e-cve-2014-0221.patch Patch94: openssl-1.0.1e-cve-2014-0224.patch Patch95: openssl-1.0.1e-cve-2014-3470.patch Patch96: openssl-1.0.1e-dtls-ecc-ext.patch Patch100: openssl-1.0.1e-cve-2014-3505.patch Patch101: openssl-1.0.1e-cve-2014-3506.patch Patch102: openssl-1.0.1e-cve-2014-3507.patch Patch103: openssl-1.0.1e-cve-2014-3508.patch Patch104: openssl-1.0.1e-cve-2014-3509.patch Patch105: openssl-1.0.1e-cve-2014-3510.patch Patch106: openssl-1.0.1e-cve-2014-3511.patch Patch107: openssl-1.0.1e-doc-ciphersuites.patch Patch110: openssl-1.0.1e-cve-2014-3567.patch Patch111: openssl-1.0.1e-cve-2014-3513.patch Patch112: openssl-1.0.1e-fallback-scsv.patch Patch113: openssl-1.0.1e-copy-algo.patch Patch114: openssl-1.0.1e-cve-2014-3570.patch Patch115: openssl-1.0.1e-cve-2014-3571.patch Patch116: openssl-1.0.1e-cve-2014-3572.patch Patch117: openssl-1.0.1e-cve-2014-8275.patch Patch118: openssl-1.0.1e-cve-2015-0204.patch Patch119: openssl-1.0.1e-cve-2015-0205.patch Patch120: openssl-1.0.1e-cve-2015-0206.patch Patch122: openssl-1.0.1e-cve-2015-0209.patch Patch123: openssl-1.0.1e-cve-2015-0286.patch Patch124: openssl-1.0.1e-cve-2015-0287.patch Patch125: openssl-1.0.1e-cve-2015-0288.patch Patch126: openssl-1.0.1e-cve-2015-0289.patch Patch127: openssl-1.0.1e-cve-2015-0292.patch Patch128: openssl-1.0.1e-cve-2015-0293.patch Patch129: openssl-1.0.1e-cve-2015-4000.patch Patch130: openssl-1.0.1e-cve-2014-8176.patch Patch131: openssl-1.0.1e-cve-2015-1789.patch Patch132: openssl-1.0.1e-cve-2015-1790.patch Patch133: openssl-1.0.1e-cve-2015-1791.patch Patch134: openssl-1.0.1e-cve-2015-1792.patch Patch135: openssl-1.0.1e-cve-2015-3194.patch Patch136: openssl-1.0.1e-cve-2015-3195.patch Patch137: openssl-1.0.1e-cve-2015-3196.patch Patch138: openssl-1.0.1e-cve-2015-7575.patch Patch139: openssl-1.0.1e-timestamp.patch Patch140: openssl-1.0.1e-pkcs12-memleak.patch Patch141: openssl-1.0.1e-speed-doc.patch Patch142: openssl-1.0.1e-cve-2015-3197.patch Patch143: openssl-1.0.1e-disable-sslv2.patch Patch144: openssl-1.0.1e-cve-2016-0702.patch Patch145: openssl-1.0.1e-cve-2016-0705.patch Patch146: openssl-1.0.1e-cve-2016-0797.patch Patch147: openssl-1.0.1e-cve-2016-0799.patch Patch149: openssl-1.0.1e-keymat-algo.patch Patch150: openssl-1.0.1e-cve-2016-2105.patch Patch151: openssl-1.0.1e-cve-2016-2106.patch Patch152: openssl-1.0.1e-cve-2016-2107.patch Patch153: openssl-1.0.1e-cve-2016-2108.patch Patch154: openssl-1.0.1e-cve-2016-2109.patch Patch155: openssl-1.0.1e-update-test-certs.patch Patch156: openssl-1.0.1e-cve-2016-2177.patch Patch157: openssl-1.0.1e-cve-2016-2178.patch Patch158: openssl-1.0.1e-cve-2016-2179.patch Patch159: openssl-1.0.1e-cve-2016-2180.patch Patch160: openssl-1.0.1e-cve-2016-2181.patch Patch161: openssl-1.0.1e-cve-2016-2182.patch Patch162: openssl-1.0.1e-cve-2016-6302.patch Patch163: openssl-1.0.1e-cve-2016-6304.patch Patch164: openssl-1.0.1e-cve-2016-6306.patch Patch165: openssl-1.0.1e-deprecate-algos.patch Patch166: openssl-1.0.1e-cve-2016-8610.patch Patch167: openssl-1.0.1e-cve-2017-3731.patch # EPEL specific changes Patch900: openssl-1.0.1e-c_rehash.patch Patch901: openssl-1.0.1e-cve-2016-7056.patch License: OpenSSL Group: System Environment/Libraries URL: http://www.openssl.org/ BuildRoot: %{_tmppath}/%{name}-%{version}-root BuildRequires: coreutils, krb5-devel, perl, sed, zlib-devel, /usr/bin/cmp BuildRequires: /usr/bin/rename Requires: coreutils, make Requires: openssl %description The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols. %package devel Summary: Files for development of applications which will use OpenSSL Group: Development/Libraries Requires: %{name} = %{version}-%{release}, krb5-devel, zlib-devel Requires: pkgconfig %description devel OpenSSL is a toolkit for supporting cryptography. The openssl101e-devel package contains include files needed to develop applications which support various cryptographic algorithms and protocols. %package static Summary: Libraries for static linking of applications which will use OpenSSL Group: Development/Libraries Requires: %{name}-devel = %{version}-%{release} %description static OpenSSL is a toolkit for supporting cryptography. The openssl101e-static package contains static libraries needed for static linking of applications which support various cryptographic algorithms and protocols. %package perl Summary: Perl scripts provided with OpenSSL Group: Applications/Internet Requires: perl Requires: %{name} = %{version}-%{release} %description perl OpenSSL is a toolkit for supporting cryptography. The openssl101e-perl package provides Perl scripts for converting certificates and keys from other formats to the formats used by the OpenSSL toolkit. %prep %setup -q -n openssl-%{version} # The hobble_openssl is called here redundantly, just to be sure. # The tarball has already the sources removed. sh %{SOURCE1} > /dev/null cp %{SOURCE12} %{SOURCE13} crypto/ec/ %patch1 -p1 -b .rpmbuild %patch2 -p1 -b .defaults %patch4 -p1 -b .enginesdir %{?_rawbuild} %patch5 -p1 -b .no-rpath %patch6 -p1 -b .use-localhost %patch7 -p1 -b .timezone %patch8 -p1 -b .perlfind %{?_rawbuild} %patch9 -p1 -b .aliasing %patch23 -p1 -b .default-paths %patch24 -p1 -b .issuer-hash %patch33 -p1 -b .ca-dir %patch34 -p1 -b .x509 %patch35 -p1 -b .version-add-engines %patch36 -p1 -b .doc-noeof %patch38 -p1 -b .op-all %patch39 -p1 -b .ipv6-apps %patch40 -p1 -b .fips %patch45 -p1 -b .env-zlib %patch47 -p1 -b .warning %patch49 -p1 -b .algo-doc %patch50 -p1 -b .dtls1-abi %patch51 -p1 -b .version %patch56 -p1 -b .x931 %patch58 -p1 -b .md5-allow %patch60 -p1 -b .dgst %patch63 -p1 -b .starttls %patch65 -p1 -b .chil %patch66 -p1 -b .krb5 %patch67 -p1 -b .disable-aesni %patch68 -p1 -b .secure-getenv %patch69 -p1 -b .dh1024 %patch70 -p1 -b .fips-ec %patch72 -p1 -b .fips-ctor %patch73 -p1 -b .suiteb %patch74 -p1 -b .compat %patch76 -p1 -b .fips-reqs %patch77 -p1 -b .weak-ciphers %patch78 -p1 -b .3des-strength %patch79 -p1 -b .keylen %patch41 -p1 -b .ephemeral %patch42 -p1 -b .enc-fail %patch81 -p1 -b .padlock64 %patch82 -p1 -b .backports %patch71 -p1 -b .manfix %patch83 -p1 -b .bad-mac %patch84 -p1 -b .trusted-first %patch85 -p1 -b .ephemeral %patch86 -p1 -b .hash-crash %patch87 -p1 -b .dtls1-mitm %patch88 -p1 -b .handshake-crash %patch89 -p1 -b .heartbeat %patch90 -p1 -b .freelist %patch91 -p1 -b .dtls1-overflow %patch92 -p1 -b .null-deref %patch93 -p1 -b .dtls1-dos %patch94 -p1 -b .keying-mitm %patch95 -p1 -b .anon-ecdh-dos %patch96 -p1 -b .dtls-ecc-ext %patch100 -p1 -b .dtls-doublefree %patch101 -p1 -b .dtls-sizechecks %patch102 -p1 -b .dtls-memleak %patch103 -p1 -b .oid-handling %patch104 -p1 -b .tlsext-race %patch105 -p1 -b .adh-dos %patch106 -p1 -b .frag-downgrade %patch107 -p1 -b .doc-ciphersuites %patch110 -p1 -b .ticket-leak %patch111 -p1 -b .srtp-leak %patch112 -p1 -b .fallback-scsv %patch113 -p1 -b .copy-algo %patch114 -p1 -b .bn-sqr %patch115 -p1 -b .dtls1-reads %patch116 -p1 -b .ecdh-downgrade %patch117 -p1 -b .cert-fingerprint %patch118 -p1 -b .rsa-ephemeral %patch119 -p1 -b .dh-unauthenticated %patch120 -p1 -b .dtls-rec-leak %patch43 -p1 -b .krb5keytab %patch122 -p1 -b .use-after-free %patch123 -p1 -b .bool-cmp %patch124 -p1 -b .item-reuse %patch125 -p1 -b .req-null-deref %patch126 -p1 -b .pkcs7-null-deref %patch127 -p1 -b .b64-underflow %patch128 -p1 -b .ssl2-assert %patch129 -p1 -b .logjam %patch130 -p1 -b .appdata-free %patch131 -p1 -b .oob-read %patch132 -p1 -b .missing-content %patch133 -p1 -b .ticket-race %patch134 -p1 -b .unknown-hash %patch135 -p1 -b .pss-check %patch136 -p1 -b .combine-leak %patch137 -p1 -b .psk-identity %patch138 -p1 -b .no-md5-tls %patch139 -p1 -b .timestamp %patch140 -p1 -b .memleak %patch141 -p1 -b .speed-doc %patch142 -p1 -b .ssl2-ciphers %patch143 -p1 -b .disable-sslv2 %patch144 -p1 -b .rsa-const %patch145 -p1 -b .dsa-doublefree %patch146 -p1 -b .bn-hex %patch147 -p1 -b .bio-printf %patch149 -p1 -b .keymat-algo %patch150 -p1 -b .b64-overflow %patch151 -p1 -b .enc-overflow %patch152 -p1 -b .padding-check %patch153 -p1 -b .asn1-negative %patch154 -p1 -b .asn1-bio-dos %patch155 -p1 -b .update-certs %patch156 -p1 -b .pointer-arithmetic %patch157 -p1 -b .dsa-consttime %patch158 -p1 -b .dtls1-dos2 %patch159 -p1 -b .ts-oob-read %patch160 -p1 -b .dtls1-replay %patch161 -p1 -b .bn-overflow %patch162 -p1 -b .ticket-length %patch163 -p1 -b .ocsp-memgrowth %patch164 -p1 -b .certmsg-len %patch165 -p1 -b .deprecate-algos %patch166 -p1 -b .many-alerts %patch167 -p1 -b .truncated %patch900 -p1 -b .c_rehash %patch901 -p1 -b .cve-2016-7056 sed -i 's/SHLIB_VERSION_NUMBER "1.0.0"/SHLIB_VERSION_NUMBER "%{version}"/' crypto/opensslv.h # Convert changelog file from ISO-8859-1 to UTF-8 iconv -f iso-8859-1 -t utf-8 -o CHANGES.utf8 CHANGES touch -c -r CHANGES CHANGES.utf8 mv -f CHANGES.utf8 CHANGES # Change permissions for rpmlint (644 rather 755) chmod 644 crypto/bn/bn_const.c # Modify the various perl scripts to reference perl in the right location. perl util/perlpath.pl `dirname %{__perl}` # Generate a table with the compile settings for my perusal. touch Makefile make TABLE PERL=%{__perl} %build # Figure out which flags we want to use. # default sslarch=%{_os}-%{_target_cpu} %ifarch %ix86 sslarch=linux-elf if ! echo %{_target} | grep -q i686 ; then sslflags="no-asm 386" fi %endif %ifarch sparcv9 sslarch=linux-sparcv9 sslflags=no-asm %endif %ifarch sparc64 sslarch=linux64-sparcv9 sslflags=no-asm %endif %ifarch alpha alphaev56 alphaev6 alphaev67 sslarch=linux-alpha-gcc %endif %ifarch s390 sh3eb sh4eb sslarch="linux-generic32 -DB_ENDIAN" %endif %ifarch s390x sslarch="linux64-s390x" %endif %ifarch %{arm} sslarch=linux-armv4 %endif %ifarch sh3 sh4 sslarch=linux-generic32 %endif %ifarch ppc64 sslarch=linux-ppc64 %endif # ia64, x86_64, ppc are OK by default # Configure the build tree. Override OpenSSL defaults with known-good defaults # usable on all platforms. The Configure script already knows to use -fPIC and # RPM_OPT_FLAGS, so we can skip specifiying them here. ./Configure \ --prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \ zlib enable-camellia enable-seed enable-tlsext enable-rfc3779 \ enable-cms enable-md2 no-mdc2 no-rc5 no-ec2m no-gost no-srp \ --with-krb5-flavor=MIT --enginesdir=%{_libdir}/%{name}/engines \ --with-krb5-dir=/usr shared ${sslarch} %{?!nofips:fips} # Add -Wa,--noexecstack here so that libcrypto's assembler modules will be # marked as not requiring an executable stack. # Also add -DPURIFY to make using valgrind with openssl easier as we do not # want to depend on the uninitialized memory as a source of entropy anyway. RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -DPURIFY" make depend make all # Generate hashes for the included certs. make rehash # Overwrite FIPS README and copy README.legacy-settings cp -f %{SOURCE5} %{SOURCE11} . %check # Verify that what was compiled actually works. # We must revert patch33 before tests otherwise they will fail patch -p1 -R < %{PATCH33} LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}} export LD_LIBRARY_PATH OPENSSL_ENABLE_MD5_VERIFY= export OPENSSL_ENABLE_MD5_VERIFY make -C test apps tests %{__cc} -o openssl-thread-test \ `krb5-config --cflags` \ -I./include \ $RPM_OPT_FLAGS \ %{SOURCE8} \ -L. \ -lssl -lcrypto \ `krb5-config --libs` \ -lpthread -lz -ldl ./openssl-thread-test --threads %{thread_test_threads} # Add generation of HMAC checksum of the final stripped library %define __spec_install_post \ %{?__debug_package:%{__debug_install_post}} \ %{__arch_install_post} \ %{__os_install_post} \ crypto/fips/fips_standalone_hmac $RPM_BUILD_ROOT%{_libdir}/libcrypto.so.%{version} >$RPM_BUILD_ROOT%{_libdir}/.libcrypto.so.%{version}.hmac \ ln -sf .libcrypto.so.%{version}.hmac $RPM_BUILD_ROOT%{_libdir}/.libcrypto.so.%{soversion}.hmac \ crypto/fips/fips_standalone_hmac $RPM_BUILD_ROOT%{_libdir}/libssl.so.%{version} >$RPM_BUILD_ROOT%{_libdir}/.libssl.so.%{version}.hmac \ ln -sf .libssl.so.%{version}.hmac $RPM_BUILD_ROOT%{_libdir}/.libssl.so.%{soversion}.hmac \ %{nil} %define __provides_exclude_from %{_libdir}/openssl %install [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT # Install OpenSSL. install -d $RPM_BUILD_ROOT{%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/%{name}} make INSTALL_PREFIX=$RPM_BUILD_ROOT install make INSTALL_PREFIX=$RPM_BUILD_ROOT install_docs mv $RPM_BUILD_ROOT%{_libdir}/engines $RPM_BUILD_ROOT%{_libdir}/%{name}/ mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/man/* $RPM_BUILD_ROOT%{_mandir}/ rmdir $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/man rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT%{_libdir}/*.so.%{soversion} mkdir $RPM_BUILD_ROOT/%{_lib} for lib in $RPM_BUILD_ROOT%{_libdir}/*.so.%{version} ; do chmod 755 ${lib} ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}` ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`.%{soversion} done # Install a makefile for generating keys and self-signed certs, and a script # for generating them on the fly. mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/Makefile install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/make-dummy-cert install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/renew-dummy-cert # Make sure we actually include the headers we built against. for header in $RPM_BUILD_ROOT%{_includedir}/openssl/* ; do if [ -f ${header} -a -f include/openssl/$(basename ${header}) ] ; then install -m644 include/openssl/`basename ${header}` ${header} fi done # Rename man pages so that they don't conflict with other system man pages. pushd $RPM_BUILD_ROOT%{_mandir} ln -s -f config.5 man5/openssl.cnf.5 for manpage in man*/* ; do if [ -L ${manpage} ]; then TARGET=`ls -l ${manpage} | awk '{ print $NF }'` ln -snf ${TARGET}ssl ${manpage}ssl rm -f ${manpage} else mv ${manpage} ${manpage}ssl fi done for conflict in passwd rand ; do rename ${conflict} ssl${conflict} man*/${conflict}* done popd # Pick a CA script. pushd $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc mv CA.sh CA popd mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts # Ensure the openssl.cnf timestamp is identical across builds to avoid # mulitlib conflicts and unnecessary renames on upgrade touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf # Determine which arch opensslconf.h is going to try to #include. basearch=%{_arch} %ifarch %{ix86} basearch=i386 %endif %ifarch sparcv9 basearch=sparc %endif %ifarch sparc64 basearch=sparc64 %endif %ifarch %{multilib_arches} # Do an opensslconf.h switcheroo to avoid file conflicts on systems where you # can have both a 32- and 64-bit version of the library, and they each need # their own correct-but-different versions of opensslconf.h to be usable. install -m644 %{SOURCE10} \ $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf-${basearch}.h cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h >> \ $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf-${basearch}.h install -m644 %{SOURCE9} \ $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h %endif # Remove unused files from upstream fips support rm -rf $RPM_BUILD_ROOT/%{_bindir}/openssl_fips_fingerprint rm -rf $RPM_BUILD_ROOT/%{_libdir}/fips_premain.* rm -rf $RPM_BUILD_ROOT/%{_libdir}/fipscanister.* # Transformation for openssl101e mkdir -p $RPM_BUILD_ROOT%{_includedir}/%{name}/ mv -f $RPM_BUILD_ROOT%{_mandir}/man1/openssl.1ssl . rm -rf $RPM_BUILD_ROOT{%{_mandir},%{_sysconfdir}/pki} rm -f $RPM_BUILD_ROOT%{_libdir}/*.so mv -f $RPM_BUILD_ROOT%{_includedir}/{openssl,%{name}/openssl}/ mv -f $RPM_BUILD_ROOT%{_bindir}/{openssl,%{name}} mv -f $RPM_BUILD_ROOT%{_libdir}/{*.a,%{name}} mv -f $RPM_BUILD_ROOT%{_bindir}/c_rehash{,101e} install -D -p -m 644 openssl.1ssl $RPM_BUILD_ROOT%{_mandir}/man1/%{name}.1 for pc in libcrypto libssl openssl; do sed -e 's@\(Libs: -L${libdir}\)@\1 -L${libdir}/%{name}@' \ -e 's@\(Cflags: -I${includedir}\)@\1 -I${includedir}/%{name}@' \ $RPM_BUILD_ROOT%{_libdir}/pkgconfig/${pc}.pc > $RPM_BUILD_ROOT%{_libdir}/pkgconfig/${pc}101e.pc touch -c -r $RPM_BUILD_ROOT%{_libdir}/pkgconfig/${pc}.pc $RPM_BUILD_ROOT%{_libdir}/pkgconfig/${pc}101e.pc rm -f $RPM_BUILD_ROOT%{_libdir}/pkgconfig/${pc}.pc done ln -s ../libcrypto.so.%{version} $RPM_BUILD_ROOT%{_libdir}/%{name}/libcrypto.so ln -s ../libssl.so.%{version} $RPM_BUILD_ROOT%{_libdir}/%{name}/libssl.so # Only run %%clean section on EPEL 5 if epel-rpm-macros RPM package is # not installed, otherwise %%{__spec_install_post} gets overwritten. %if !0%{?epel_macros_init:1} || 0%{?rhel} > 5 || 0%{?fedora} %clean [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT %endif %files %defattr(-,root,root) %doc FAQ LICENSE CHANGES NEWS README %doc doc/c-indentation.el doc/openssl.txt %doc doc/openssl_button.html doc/openssl_button.gif %doc doc/ssleay.txt %doc README.FIPS %doc README.legacy-settings %attr(0755,root,root) %{_bindir}/%{name} %attr(0644,root,root) %{_mandir}/man1/%{name}.1* %attr(0755,root,root) %{_libdir}/libcrypto.so.%{version} %attr(-,root,root) %{_libdir}/libcrypto.so.%{soversion} %attr(0755,root,root) %{_libdir}/libssl.so.%{version} %attr(-,root,root) %{_libdir}/libssl.so.%{soversion} %attr(0644,root,root) %{_libdir}/.libcrypto.so.%{version}.hmac %attr(-,root,root) %{_libdir}/.libcrypto.so.%{soversion}.hmac %attr(0644,root,root) %{_libdir}/.libssl.so.%{version}.hmac %attr(-,root,root) %{_libdir}/.libssl.so.%{soversion}.hmac %attr(0755,root,root) %{_libdir}/%{name} %exclude %{_libdir}/%{name}/*.a %exclude %{_libdir}/%{name}/*.so %files devel %defattr(-,root,root) %{_prefix}/include/%{name} %attr(0755,root,root) %{_libdir}/%{name}/*.so %attr(0644,root,root) %{_libdir}/pkgconfig/*.pc %files static %defattr(-,root,root) %attr(0644,root,root) %{_libdir}/%{name}/*.a %files perl %defattr(-,root,root) %attr(0755,root,root) %{_bindir}/c_rehash101e %post -p /sbin/ldconfig %postun -p /sbin/ldconfig %changelog * Tue Mar 21 2017 Robert Scheck 1.0.1e-11 - backport from 1.0.1e-57: fix handling of ciphersuites present after the FALLBACK_SCSV ciphersuite entry (#1386350) - backport from 1.0.1e-57: add README.legacy-settings - backport from 1.0.1e-57: deprecate and disable verification of insecure hash algorithms - backport from 1.0.1e-57: disallow DH keys with less than 1024 bits in TLS client - backport from 1.0.1e-57: remove support for weak and export ciphersuites - backport from 1.0.1e-57: use correct digest when exporting keying material in TLS1.2 (#1376741) * Tue Feb 21 2017 Robert Scheck 1.0.1e-10 - fix CVE-2016-7056 - ECDSA P-256 timing attack key recovery (#1412120, #1412123, #1412127) - backport from 1.0.1e-48.4: fix CVE-2017-3731 - DoS via truncated packets with RC4-MD5 cipher (#1416852, #1416866) - backport from 1.0.1e-48.4: fix CVE-2016-8610 - DoS of single- threaded servers via excessive alerts (#1384743, #1388727) * Tue Sep 27 2016 Robert Scheck 1.0.1e-9 - backport from 1.0.1e-48.3: fix CVE-2016-2177 - possible integer overflow (#1341705, #1341708) - backport from 1.0.1e-48.3: fix CVE-2016-2178 - non-constant time DSA operations (#1343400, #1343403) - backport from 1.0.1e-48.3: fix CVE-2016-2179 - further DoS issues in DTLS (#1369504, #1369507) - backport from 1.0.1e-48.3: fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio() (#1359615, #1359618) - backport from 1.0.1e-48.3: fix CVE-2016-2181 - DTLS1 replay protection and unprocessed records issue (#1369113, #1369116) - backport from 1.0.1e-48.3: fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec() (#1367340, #1367345) - backport from 1.0.1e-48.3: fix CVE-2016-6302 - insufficient TLS session ticket HMAC length check (#1369855, #1369861) - backport from 1.0.1e-48.3: fix CVE-2016-6304 - unbound memory growth with OCSP status request (#1377600, #1378409) - backport from 1.0.1e-48.3: fix CVE-2016-6306 - certificate message OOB reads (#1377594, #1378409) - backport from 1.0.1e-48.3: mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to 112 bit effective strength (#1369383) - backport from 1.0.1e-48.3: replace expired testing certificates (#1335097) * Wed May 11 2016 Robert Scheck 1.0.1e-8 - backport from 1.0.1e-45: fix high-precision timestamps in timestamping authority - backport from 1.0.1e-46: fix 1-byte memory leak in pkcs12 parse (#1229871) - backport from 1.0.1e-46: document some options of the speed command (#1197095) - backport from 1.0.1e-48.1: fix CVE-2016-2105 - possible overflow in base64 encoding - backport from 1.0.1e-48.1: fix CVE-2016-2106 - possible overflow in EVP_EncryptUpdate() - backport from 1.0.1e-48.1: fix CVE-2016-2107 - padding oracle in stitched AES-NI CBC-MAC - backport from 1.0.1e-48.1: fix CVE-2016-2108 - memory corruption in ASN.1 encoder - backport from 1.0.1e-48.1: fix CVE-2016-2109 - possible DoS when reading ASN.1 data from BIO - backport from 1.0.1e-48.1: fix CVE-2016-0799 - memory issues in BIO_printf - backport upstream commit to replace expired testing certificates for S/MIME tests (#1335097) * Tue Mar 01 2016 Robert Scheck 1.0.1e-7 - backport from 1.0.1e-42.3: fix CVE-2015-3197 - SSLv2 ciphersuite enforcement - backport from 1.0.1e-42.3: disable SSLv2 in generic TLS method - backport from 1.0.1e-42.4: fix CVE-2016-0702 - side channel attack on modular exponentiation - backport from 1.0.1e-42.4: fix CVE-2016-0705 - double-free in DSA private key parsing - backport from 1.0.1e-42.4: fix CVE-2016-0797 - heap corruption in BN_hex2bn and BN_dec2bn * Fri Jan 08 2016 Robert Scheck 1.0.1e-6 - backport from 1.0.1e-42.2: fix CVE-2015-7575 - disallow use of MD5 in TLS1.2 * Thu Dec 17 2015 Robert Scheck 1.0.1e-5 - backport from 1.0.1e-42.1: fix CVE-2015-3194 - certificate verify crash with missing PSS parameter - backport from 1.0.1e-42.1: fix CVE-2015-3195 - X509_ATTRIBUTE memory leak - backport from 1.0.1e-42.1: fix CVE-2015-3196 - race condition when handling PSK identity hint * Tue Sep 29 2015 Robert Scheck 1.0.1e-4 - remove %%doc INSTALL (#1223990 #c9) - add renamed man page openssl101e (#1223990 #c7) - correct strange/wrong file permissions (#1223990 #c4) * Tue Sep 15 2015 Robert Scheck 1.0.1e-3 - backport from 1.0.1e-42: fix regression caused by mistake in fix for CVE-2015-1791 - backport from 1.0.1e-41: improved fix for CVE-2015-1791 - backport from 1.0.1e-41: add missing parts of CVE-2015-0209 fix for corectness although unexploitable - backport from 1.0.1e-40: fix CVE-2014-8176 - invalid free in DTLS buffering code - backport from 1.0.1e-40: fix CVE-2015-1789 - out-of-bounds read in X509_cmp_time - backport from 1.0.1e-40: fix CVE-2015-1790 - PKCS7 crash with missing EncryptedContent - backport from 1.0.1e-40: fix CVE-2015-1791 - race condition handling NewSessionTicket - backport from 1.0.1e-40: fix CVE-2015-1792 - CMS verify infinite loop with unknown hash function - backport from 1.0.1e-39: fix CVE-2015-3216 - regression in RAND locking that can cause segfaults on read in multithreaded applications - backport from 1.0.1e-34: copy digest algorithm when handling SNI context switch - backport from 1.0.1e-34: improve documentation of ciphersuites - patch by Hubert Kario - backport from 1.0.1e-34: add support for setting Kerberos service and keytab in s_server and s_client * Sun Jul 12 2015 Robert Scheck 1.0.1e-2 - backport from 1.0.1e-30.9: fix CVE-2015-4000 - prevent the logjam attack on client - restrict the DH key size to at least 768 bits (limit will be increased in future) * Thu May 21 2015 Robert Scheck 1.0.1e-1 - transformed openssl-1.0.1e-30.el6.8 into openssl101e (#1223990) * Thu Mar 26 2015 Tomáš Mráz 1.0.1e-30.8 - drop the AES-GCM restriction of 2^32 operations because the IV is always 96 bits (32 bit fixed field + 64 bit invocation field) * Thu Mar 19 2015 Tomáš Mráz 1.0.1e-30.7 - update fix for CVE-2015-0287 to what was released upstream * Wed Mar 18 2015 Tomáš Mráz 1.0.1e-30.6 - fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey() - fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison - fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption - fix CVE-2015-0288 - X509_to_X509_REQ NULL pointer dereference - fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data - fix CVE-2015-0292 - integer underflow in base64 decoder - fix CVE-2015-0293 - triggerable assert in SSLv2 server * Tue Jan 13 2015 Tomáš Mráz 1.0.1e-30.5 - fix CVE-2014-3570 - incorrect computation in BN_sqr() - fix CVE-2014-3571 - possible crash in dtls1_get_record() - fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state - fix CVE-2014-8275 - various certificate fingerprint issues - fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export ciphersuites and on server - fix CVE-2015-0205 - do not allow unauthenticated client DH certificate - fix CVE-2015-0206 - possible memory leak when buffering DTLS records * Thu Oct 16 2014 Tomáš Mráz 1.0.1e-30.4 - use FIPS approved method for computation of d in RSA * Wed Oct 15 2014 Tomáš Mráz 1.0.1e-30.2 - fix CVE-2014-3567 - memory leak when handling session tickets - fix CVE-2014-3513 - memory leak in srtp support - add support for fallback SCSV to partially mitigate CVE-2014-3566 (padding attack on SSL3) * Fri Aug 15 2014 Tomáš Mráz 1.0.1e-30 - add ECC TLS extensions to DTLS (#1119800) * Fri Aug 8 2014 Tomáš Mráz 1.0.1e-29 - fix CVE-2014-3505 - doublefree in DTLS packet processing - fix CVE-2014-3506 - avoid memory exhaustion in DTLS - fix CVE-2014-3507 - avoid memory leak in DTLS - fix CVE-2014-3508 - fix OID handling to avoid information leak - fix CVE-2014-3509 - fix race condition when parsing server hello - fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS - fix CVE-2014-3511 - disallow protocol downgrade via fragmentation * Mon Jun 16 2014 Tomáš Mráz 1.0.1e-28 - fix CVE-2014-0224 fix that broke EAP-FAST session resumption support * Fri Jun 6 2014 Tomáš Mráz 1.0.1e-26 - drop EXPORT, RC2, and DES from the default cipher list (#1057520) - print ephemeral key size negotiated in TLS handshake (#1057715) - do not include ECC ciphersuites in SSLv2 client hello (#1090952) - properly detect encryption failure in BIO (#1100819) - fail on hmac integrity check if the .hmac file is empty (#1105567) - FIPS mode: make the limitations on DSA, DH, and RSA keygen length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment variable is set * Mon Jun 2 2014 Tomáš Mráz 1.0.1e-25 - fix CVE-2010-5298 - possible use of memory after free - fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment - fix CVE-2014-0198 - possible NULL pointer dereference - fix CVE-2014-0221 - DoS from invalid DTLS handshake packet - fix CVE-2014-0224 - SSL/TLS MITM vulnerability - fix CVE-2014-3470 - client-side DoS when using anonymous ECDH * Thu May 22 2014 Tomáš Mráz 1.0.1e-24 - add back support for secp521r1 EC curve * Mon Apr 7 2014 Tomáš Mráz 1.0.1e-23 - fix CVE-2014-0160 - information disclosure in TLS heartbeat extension * Mon Mar 17 2014 Tomáš Mráz 1.0.1e-22 - use 2048 bit RSA key in FIPS selftests * Wed Feb 19 2014 Tomáš Mráz 1.0.1e-21 - add DH_compute_key_padded needed for FIPS CAVS testing - make 3des strength to be 128 bits instead of 168 (#1056616) - FIPS mode: do not generate DSA keys and DH parameters < 2048 bits - FIPS mode: use approved RSA keygen (allows only 2048 and 3072 bit keys) - FIPS mode: add DH selftest - FIPS mode: reseed DRBG properly on RAND_add() - FIPS mode: add RSA encrypt/decrypt selftest - FIPS mode: add hard limit for 2^32 GCM block encryptions with the same key - use the key length from configuration file if req -newkey rsa is invoked * Tue Jan 7 2014 Tomáš Mráz 1.0.1e-20 - fix CVE-2013-4353 - Invalid TLS handshake crash * Mon Jan 6 2014 Tomáš Mráz 1.0.1e-19 - fix CVE-2013-6450 - possible MiTM attack on DTLS1 * Fri Dec 20 2013 Tomáš Mráz 1.0.1e-18 - fix CVE-2013-6449 - crash when version in SSL structure is incorrect * Thu Dec 12 2013 Tomáš Mráz 1.0.1e-17 - add back some no-op symbols that were inadvertently dropped * Thu Oct 31 2013 Tomáš Mráz 1.0.1e-16 - do not advertise ECC curves we do not support - fix CPU identification on Cyrix CPUs * Fri Sep 27 2013 Tomáš Mráz 1.0.1e-15 - make DTLS1 work in FIPS mode - avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode * Thu Sep 26 2013 Tomáš Mráz 1.0.1e-14 - installation of dracut-fips marks that the FIPS module is installed * Mon Sep 23 2013 Tomáš Mráz 1.0.1e-13 - avoid dlopening libssl.so from libcrypto * Fri Sep 20 2013 Tomáš Mráz 1.0.1e-12 - fix small memory leak in FIPS aes selftest - fix segfault in openssl speed hmac in the FIPS mode * Thu Sep 12 2013 Tomáš Mráz 1.0.1e-11 - document the nextprotoneg option in manual pages original patch by Hubert Kario * Thu Aug 29 2013 Tomas Mraz 1.0.1e-9 - always perform the FIPS selftests in library constructor if FIPS module is installed * Fri Aug 16 2013 Tomas Mraz 1.0.1e-8 - fix use of rdrand if available - more commits cherry picked from upstream - documentation fixes * Fri Jul 26 2013 Tomas Mraz 1.0.1e-7 - additional manual page fix - use symbol versioning also for the textual version * Thu Jul 25 2013 Tomas Mraz 1.0.1e-6 - additional manual page fixes - cleanup speed command output for ECDH ECDSA * Fri Jul 19 2013 Tomas Mraz 1.0.1e-5 - use _prefix macro * Wed Jul 10 2013 Tomas Mraz 1.0.1e-4 - add relro linking flag * Wed Jul 10 2013 Tomas Mraz 1.0.1e-2 - add support for the -trusted_first option for certificate chain verification * Fri May 31 2013 Tomas Mraz 1.0.1e-1 - rebase to the 1.0.1e upstream version * Mon Feb 25 2013 Tomas Mraz 1.0.0-28 - fix for CVE-2013-0169 - SSL/TLS CBC timing attack (#907589) - fix for CVE-2013-0166 - DoS in OCSP signatures checking (#908052) - enable compression only if explicitly asked for or OPENSSL_DEFAULT_ZLIB environment variable is set (fixes CVE-2012-4929 #857051) - use __secure_getenv() everywhere instead of getenv() (#839735) * Fri Oct 12 2012 Tomas Mraz 1.0.0-27 - fix sslrand(1) and sslpasswd(1) reference in openssl(1) manpage (#841645) - drop superfluous lib64 fixup in pkgconfig .pc files (#770872) - force BIO_accept_new(*:) to listen on IPv4 * Wed Aug 15 2012 Tomas Mraz 1.0.0-26 - use PKCS#8 when writing private keys in FIPS mode as the old PEM encryption mode is not FIPS compatible (#812348) * Tue May 15 2012 Tomas Mraz 1.0.0-25 - fix for CVE-2012-2333 - improper checking for record length in DTLS (#820686) - properly initialize tkeylen in the CVE-2012-0884 fix * Thu Apr 19 2012 Tomas Mraz 1.0.0-24 - fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185) * Mon Mar 19 2012 Tomas Mraz 1.0.0-23 - fix problem with the SGC restart patch that might terminate handshake incorrectly - fix for CVE-2012-0884 - MMA weakness in CMS and PKCS#7 code (#802725) - fix for CVE-2012-1165 - NULL read dereference on bad MIME headers (#802489) * Thu Mar 1 2012 Tomas Mraz 1.0.0-22 - fix incorrect encryption of unaligned chunks in CFB, OFB and CTR modes * Thu Jan 19 2012 Tomas Mraz 1.0.0-21 - fix for CVE-2011-4108 & CVE-2012-0050 - DTLS plaintext recovery vulnerability and additional DTLS fixes (#771770) - fix for CVE-2011-4576 - uninitialized SSL 3.0 padding (#771775) - fix for CVE-2011-4577 - possible DoS through malformed RFC 3779 data (#771778) - fix for CVE-2011-4619 - SGC restart DoS attack (#771780) * Mon Oct 31 2011 Tomas Mraz 1.0.0-20 - fix x86cpuid.pl - patch by Paolo Bonzini * Thu Sep 29 2011 Tomas Mraz 1.0.0-19 - add known answer test for SHA2 algorithms * Wed Sep 21 2011 Tomas Mraz 1.0.0-18 - fix missing initialization of a variable in the CHIL engine (#740188) * Mon Sep 12 2011 Tomas Mraz 1.0.0-17 - initialize the X509_STORE_CTX properly for CRL lookups - CVE-2011-3207 (#736087) * Wed Aug 24 2011 Tomas Mraz 1.0.0-16 - merge the optimizations for AES-NI, SHA1, and RC4 from the intelx engine to the internal implementations * Mon Aug 15 2011 Tomas Mraz 1.0.0-15 - better documentation of the available digests in apps (#693858) - backported CHIL engine fixes (#693863) - allow testing build without downstream patches (#708511) - enable partial RELRO when linking (#723994) - add intelx engine with improved performance on new Intel CPUs - add OPENSSL_DISABLE_AES_NI environment variable which disables the AES-NI support (does not affect the intelx engine) * Wed Jun 8 2011 Tomas Mraz 1.0.0-14 - use the AES-NI engine in the FIPS mode * Tue May 24 2011 Tomas Mraz 1.0.0-11 - add API necessary for CAVS testing of the new DSA parameter generation * Thu Feb 10 2011 Tomas Mraz 1.0.0-10 - fix OCSP stapling vulnerability - CVE-2011-0014 (#676063) - correct the README.FIPS document * Fri Feb 4 2011 Tomas Mraz 1.0.0-8 - add -x931 parameter to openssl genrsa command to use the ANSI X9.31 key generation method - use FIPS-186-3 method for DSA parameter generation - add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable to allow using MD5 when the system is in the maintenance state even if the /proc fips flag is on - make openssl pkcs12 command work by default in the FIPS mode * Mon Jan 24 2011 Tomas Mraz 1.0.0-7 - listen on ipv6 wildcard in s_server so we accept connections from both ipv4 and ipv6 (#601612) - fix openssl speed command so it can be used in the FIPS mode with FIPS allowed ciphers (#619762) * Tue Dec 7 2010 Tomas Mraz 1.0.0-6 - disable code for SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG - CVE-2010-3864 (#649304) * Fri Nov 5 2010 Tomas Mraz 1.0.0-5 - fix race in extension parsing code - CVE-2010-3864 (#649304) * Wed Jun 30 2010 Tomas Mraz 1.0.0-4 - openssl man page fix (#609484) * Fri Jun 4 2010 Tomas Mraz 1.0.0-3 - fix wrong ASN.1 definition of OriginatorInfo - CVE-2010-0742 (#598738) - fix information leak in rsa_verify_recover - CVE-2010-1633 (#598732) * Wed May 19 2010 Tomas Mraz 1.0.0-2 - make CA dir readable - the private keys are in private subdir (#584810) - a few fixes from upstream CVS - make X509_NAME_hash_old work in FIPS mode (#568395) * Tue Mar 30 2010 Tomas Mraz 1.0.0-1 - update to final 1.0.0 upstream release * Tue Feb 16 2010 Tomas Mraz 1.0.0-0.22.beta5 - make TLS work in the FIPS mode * Fri Feb 12 2010 Tomas Mraz 1.0.0-0.21.beta5 - gracefully handle zero length in assembler implementations of OPENSSL_cleanse (#564029) - do not fail in s_server if client hostname not resolvable (#561260) * Wed Jan 20 2010 Tomas Mraz 1.0.0-0.20.beta5 - new upstream release * Thu Jan 14 2010 Tomas Mraz 1.0.0-0.19.beta4 - fix CVE-2009-4355 - leak in applications incorrectly calling CRYPTO_free_all_ex_data() before application exit (#546707) - upstream fix for future TLS protocol version handling * Wed Jan 13 2010 Tomas Mraz 1.0.0-0.18.beta4 - add support for Intel AES-NI * Thu Jan 7 2010 Tomas Mraz 1.0.0-0.17.beta4 - upstream fix compression handling on session resumption - various null checks and other small fixes from upstream - upstream changes for the renegotiation info according to the latest draft * Mon Nov 23 2009 Tomas Mraz 1.0.0-0.16.beta4 - fix non-fips mingw build (patch by Kalev Lember) - add IPV6 fix for DTLS * Fri Nov 20 2009 Tomas Mraz 1.0.0-0.15.beta4 - add better error reporting for the unsafe renegotiation * Fri Nov 20 2009 Tomas Mraz 1.0.0-0.14.beta4 - fix build on s390x * Wed Nov 18 2009 Tomas Mraz 1.0.0-0.13.beta4 - disable enforcement of the renegotiation extension on the client (#537962) - add fixes from the current upstream snapshot * Fri Nov 13 2009 Tomas Mraz 1.0.0-0.12.beta4 - keep the beta status in version number at 3 so we do not have to rebuild openssh and possibly other dependencies with too strict version check * Thu Nov 12 2009 Tomas Mraz 1.0.0-0.11.beta4 - update to new upstream version, no soname bump needed - fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used so the compatibility with unfixed clients is not broken. The protocol extension is also not final. * Fri Oct 16 2009 Tomas Mraz 1.0.0-0.10.beta3 - fix use of freed memory if SSL_CTX_free() is called before SSL_free() (#521342) * Thu Oct 8 2009 Tomas Mraz 1.0.0-0.9.beta3 - fix typo in DTLS1 code (#527015) - fix leak in error handling of d2i_SSL_SESSION() * Wed Sep 30 2009 Tomas Mraz 1.0.0-0.8.beta3 - fix RSA and DSA FIPS selftests - reenable fixed x86_64 camellia assembler code (#521127) * Fri Sep 4 2009 Tomas Mraz 1.0.0-0.7.beta3 - temporarily disable x86_64 camellia assembler code (#521127) * Mon Aug 31 2009 Tomas Mraz 1.0.0-0.6.beta3 - fix openssl dgst -dss1 (#520152) * Wed Aug 26 2009 Tomas Mraz 1.0.0-0.5.beta3 - drop the compat symlink hacks * Sat Aug 22 2009 Tomas Mraz 1.0.0-0.4.beta3 - constify SSL_CIPHER_description() * Fri Aug 21 2009 Tomas Mraz 1.0.0-0.3.beta3 - fix WWW:Curl:Easy reference in tsget * Fri Aug 21 2009 Tomas Mraz 1.0.0-0.2.beta3 - enable MD-2 * Thu Aug 20 2009 Tomas Mraz 1.0.0-0.1.beta3 - update to new major upstream release * Sat Jul 25 2009 Fedora Release Engineering - 0.9.8k-7 - Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild * Wed Jul 22 2009 Bill Nottingham - do not build special 'optimized' versions for i686, as that's the base arch in Fedora now * Tue Jun 30 2009 Tomas Mraz 0.9.8k-6 - abort if selftests failed and random number generator is polled - mention EVP_aes and EVP_sha2xx routines in the manpages - add README.FIPS - make CA dir absolute path (#445344) - change default length for RSA key generation to 2048 (#484101) * Thu May 21 2009 Tomas Mraz 0.9.8k-5 - fix CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 (DTLS DoS problems) (#501253, #501254, #501572) * Tue Apr 21 2009 Tomas Mraz 0.9.8k-4 - support compatibility DTLS mode for CISCO AnyConnect (#464629) * Fri Apr 17 2009 Tomas Mraz 0.9.8k-3 - correct the SHLIB_VERSION define * Wed Apr 15 2009 Tomas Mraz 0.9.8k-2 - add support for multiple CRLs with same subject - load only dynamic engine support in FIPS mode * Wed Mar 25 2009 Tomas Mraz 0.9.8k-1 - update to new upstream release (minor bug fixes, security fixes and machine code optimizations only) * Thu Mar 19 2009 Tomas Mraz 0.9.8j-10 - move libraries to /usr/lib (#239375) * Fri Mar 13 2009 Tomas Mraz 0.9.8j-9 - add a static subpackage * Thu Feb 26 2009 Fedora Release Engineering - 0.9.8j-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild * Mon Feb 2 2009 Tomas Mraz 0.9.8j-7 - must also verify checksum of libssl.so in the FIPS mode - obtain the seed for FIPS rng directly from the kernel device - drop the temporary symlinks * Mon Jan 26 2009 Tomas Mraz 0.9.8j-6 - drop the temporary triggerpostun and symlinking in post - fix the pkgconfig files and drop the unnecessary buildrequires on pkgconfig as it is a rpmbuild dependency (#481419) * Sat Jan 17 2009 Tomas Mraz 0.9.8j-5 - add temporary triggerpostun to reinstate the symlinks * Sat Jan 17 2009 Tomas Mraz 0.9.8j-4 - no pairwise key tests in non-fips mode (#479817) * Fri Jan 16 2009 Tomas Mraz 0.9.8j-3 - even more robust test for the temporary symlinks * Fri Jan 16 2009 Tomas Mraz 0.9.8j-2 - try to ensure the temporary symlinks exist * Thu Jan 15 2009 Tomas Mraz 0.9.8j-1 - new upstream version with necessary soname bump (#455753) - temporarily provide symlink to old soname to make it possible to rebuild the dependent packages in rawhide - add eap-fast support (#428181) - add possibility to disable zlib by setting - add fips mode support for testing purposes - do not null dereference on some invalid smime files - add buildrequires pkgconfig (#479493) * Sun Aug 10 2008 Tomas Mraz 0.9.8g-11 - do not add tls extensions to server hello for SSLv3 either * Mon Jun 2 2008 Joe Orton 0.9.8g-10 - move root CA bundle to ca-certificates package * Wed May 28 2008 Tomas Mraz 0.9.8g-9 - fix CVE-2008-0891 - server name extension crash (#448492) - fix CVE-2008-1672 - server key exchange message omit crash (#448495) * Tue May 27 2008 Tomas Mraz 0.9.8g-8 - super-H arch support - drop workaround for bug 199604 as it should be fixed in gcc-4.3 * Mon May 19 2008 Tom "spot" Callaway 0.9.8g-7 - sparc handling * Mon Mar 10 2008 Joe Orton 0.9.8g-6 - update to new root CA bundle from mozilla.org (r1.45) * Wed Feb 20 2008 Fedora Release Engineering - 0.9.8g-5 - Autorebuild for GCC 4.3 * Thu Jan 24 2008 Tomas Mraz 0.9.8g-4 - merge review fixes (#226220) - adjust the SHLIB_VERSION_NUMBER to reflect library name (#429846) * Thu Dec 13 2007 Tomas Mraz 0.9.8g-3 - set default paths when no explicit paths are set (#418771) - do not add tls extensions to client hello for SSLv3 (#422081) * Tue Dec 4 2007 Tomas Mraz 0.9.8g-2 - enable some new crypto algorithms and features - add some more important bug fixes from openssl CVS * Mon Dec 3 2007 Tomas Mraz 0.9.8g-1 - update to latest upstream release, SONAME bumped to 7 * Mon Oct 15 2007 Joe Orton 0.9.8b-17 - update to new CA bundle from mozilla.org * Fri Oct 12 2007 Tomas Mraz 0.9.8b-16 - fix CVE-2007-5135 - off-by-one in SSL_get_shared_ciphers (#309801) - fix CVE-2007-4995 - out of order DTLS fragments buffer overflow (#321191) - add alpha sub-archs (#296031) * Tue Aug 21 2007 Tomas Mraz 0.9.8b-15 - rebuild * Fri Aug 3 2007 Tomas Mraz 0.9.8b-14 - use localhost in testsuite, hopefully fixes slow build in koji - CVE-2007-3108 - fix side channel attack on private keys (#250577) - make ssl session cache id matching strict (#233599) * Wed Jul 25 2007 Tomas Mraz 0.9.8b-13 - allow building on ARM architectures (#245417) - use reference timestamps to prevent multilib conflicts (#218064) - -devel package must require pkgconfig (#241031) * Mon Dec 11 2006 Tomas Mraz 0.9.8b-12 - detect duplicates in add_dir properly (#206346) * Thu Nov 30 2006 Tomas Mraz 0.9.8b-11 - the previous change still didn't make X509_NAME_cmp transitive * Thu Nov 23 2006 Tomas Mraz 0.9.8b-10 - make X509_NAME_cmp transitive otherwise certificate lookup is broken (#216050) * Thu Nov 2 2006 Tomas Mraz 0.9.8b-9 - aliasing bug in engine loading, patch by IBM (#213216) * Mon Oct 2 2006 Tomas Mraz 0.9.8b-8 - CVE-2006-2940 fix was incorrect (#208744) * Mon Sep 25 2006 Tomas Mraz 0.9.8b-7 - fix CVE-2006-2937 - mishandled error on ASN.1 parsing (#207276) - fix CVE-2006-2940 - parasitic public keys DoS (#207274) - fix CVE-2006-3738 - buffer overflow in SSL_get_shared_ciphers (#206940) - fix CVE-2006-4343 - sslv2 client DoS (#206940) * Tue Sep 5 2006 Tomas Mraz 0.9.8b-6 - fix CVE-2006-4339 - prevent attack on PKCS#1 v1.5 signatures (#205180) * Wed Aug 2 2006 Tomas Mraz - 0.9.8b-5 - set buffering to none on stdio/stdout FILE when bufsize is set (#200580) patch by IBM * Fri Jul 28 2006 Alexandre Oliva - 0.9.8b-4.1 - rebuild with new binutils (#200330) * Fri Jul 21 2006 Tomas Mraz - 0.9.8b-4 - add a temporary workaround for sha512 test failure on s390 (#199604) * Thu Jul 20 2006 Tomas Mraz - add ipv6 support to s_client and s_server (by Jan Pazdziora) (#198737) - add patches for BN threadsafety, AES cache collision attack hazard fix and pkcs7 code memleak fix from upstream CVS * Wed Jul 12 2006 Jesse Keating - 0.9.8b-3.1 - rebuild * Wed Jun 21 2006 Tomas Mraz - 0.9.8b-3 - dropped libica and ica engine from build * Wed Jun 21 2006 Joe Orton - update to new CA bundle from mozilla.org; adds CA certificates from netlock.hu and startcom.org * Mon Jun 5 2006 Tomas Mraz - 0.9.8b-2 - fixed a few rpmlint warnings - better fix for #173399 from upstream - upstream fix for pkcs12 * Thu May 11 2006 Tomas Mraz - 0.9.8b-1 - upgrade to new version, stays ABI compatible - there is no more linux/config.h (it was empty anyway) * Tue Apr 4 2006 Tomas Mraz - 0.9.8a-6 - fix stale open handles in libica (#177155) - fix build if 'rand' or 'passwd' in buildroot path (#178782) - initialize VIA Padlock engine (#186857) * Fri Feb 10 2006 Jesse Keating - 0.9.8a-5.2 - bump again for double-long bug on ppc(64) * Tue Feb 07 2006 Jesse Keating - 0.9.8a-5.1 - rebuilt for new gcc4.1 snapshot and glibc changes * Thu Dec 15 2005 Tomas Mraz 0.9.8a-5 - don't include SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG in SSL_OP_ALL (#175779) * Fri Dec 09 2005 Jesse Keating - rebuilt * Tue Nov 29 2005 Tomas Mraz 0.9.8a-4 - fix build (-lcrypto was erroneusly dropped) of the updated libica - updated ICA engine to 1.3.6-rc3 * Tue Nov 22 2005 Tomas Mraz 0.9.8a-3 - disable builtin compression methods for now until they work properly (#173399) * Wed Nov 16 2005 Tomas Mraz 0.9.8a-2 - don't set -rpath for openssl binary * Tue Nov 8 2005 Tomas Mraz 0.9.8a-1 - new upstream version - patches partially renumbered * Fri Oct 21 2005 Tomas Mraz 0.9.7f-11 - updated IBM ICA engine library and patch to latest upstream version * Wed Oct 12 2005 Tomas Mraz 0.9.7f-10 - fix CAN-2005-2969 - remove SSL_OP_MSIE_SSLV2_RSA_PADDING which disables the countermeasure against man in the middle attack in SSLv2 (#169863) - use sha1 as default for CA and cert requests - CAN-2005-2946 (#169803) * Tue Aug 23 2005 Tomas Mraz 0.9.7f-9 - add *.so.soversion as symlinks in /lib (#165264) - remove unpackaged symlinks (#159595) - fixes from upstream (constant time fixes for DSA, bn assembler div on ppc arch, initialize memory on realloc) * Thu Aug 11 2005 Phil Knirsch 0.9.7f-8 - Updated ICA engine IBM patch to latest upstream version. * Thu May 19 2005 Tomas Mraz 0.9.7f-7 - fix CAN-2005-0109 - use constant time/memory access mod_exp so bits of private key aren't leaked by cache eviction (#157631) - a few more fixes from upstream 0.9.7g * Wed Apr 27 2005 Tomas Mraz 0.9.7f-6 - use poll instead of select in rand (#128285) - fix Makefile.certificate to point to /etc/pki/tls - change the default string mask in ASN1 to PrintableString+UTF8String * Mon Apr 25 2005 Joe Orton 0.9.7f-5 - update to revision 1.37 of Mozilla CA bundle * Thu Apr 21 2005 Tomas Mraz 0.9.7f-4 - move certificates to _sysconfdir/pki/tls (#143392) - move CA directories to _sysconfdir/pki/CA - patch the CA script and the default config so it points to the CA directories * Fri Apr 1 2005 Tomas Mraz 0.9.7f-3 - uninitialized variable mustn't be used as input in inline assembly - reenable the x86_64 assembly again * Thu Mar 31 2005 Tomas Mraz 0.9.7f-2 - add back RC4_CHAR on ia64 and x86_64 so the ABI isn't broken - disable broken bignum assembly on x86_64 * Wed Mar 30 2005 Tomas Mraz 0.9.7f-1 - reenable optimizations on ppc64 and assembly code on ia64 - upgrade to new upstream version (no soname bump needed) - disable thread test - it was testing the backport of the RSA blinding - no longer needed - added support for changing serial number to Makefile.certificate (#151188) - make ca-bundle.crt a config file (#118903) * Tue Mar 1 2005 Tomas Mraz 0.9.7e-3 - libcrypto shouldn't depend on libkrb5 (#135961) * Mon Feb 28 2005 Tomas Mraz 0.9.7e-2 - rebuild * Mon Feb 28 2005 Tomas Mraz 0.9.7e-1 - new upstream source, updated patches - added patch so we are hopefully ABI compatible with upcoming 0.9.7f * Thu Feb 10 2005 Tomas Mraz - Support UTF-8 charset in the Makefile.certificate (#134944) - Added cmp to BuildPrereq * Thu Jan 27 2005 Joe Orton 0.9.7a-46 - generate new ca-bundle.crt from Mozilla certdata.txt (revision 1.32) * Thu Dec 23 2004 Phil Knirsch 0.9.7a-45 - Fixed and updated libica-1.3.4-urandom.patch patch (#122967) * Fri Nov 19 2004 Nalin Dahyabhai 0.9.7a-44 - rebuild * Fri Nov 19 2004 Nalin Dahyabhai 0.9.7a-43 - rebuild * Fri Nov 19 2004 Nalin Dahyabhai 0.9.7a-42 - rebuild * Fri Nov 19 2004 Nalin Dahyabhai 0.9.7a-41 - remove der_chop, as upstream cvs has done (CAN-2004-0975, #140040) * Tue Oct 05 2004 Phil Knirsch 0.9.7a-40 - Include latest libica version with important bugfixes * Tue Jun 15 2004 Elliot Lee - rebuilt * Mon Jun 14 2004 Phil Knirsch 0.9.7a-38 - Updated ICA engine IBM patch to latest upstream version. * Mon Jun 7 2004 Nalin Dahyabhai 0.9.7a-37 - build for linux-alpha-gcc instead of alpha-gcc on alpha (Jeff Garzik) * Tue May 25 2004 Nalin Dahyabhai 0.9.7a-36 - handle %%{_arch}=i486/i586/i686/athlon cases in the intermediate header (#124303) * Thu Mar 25 2004 Joe Orton 0.9.7a-35 - add security fixes for CAN-2004-0079, CAN-2004-0112 * Tue Mar 16 2004 Phil Knirsch - Fixed libica filespec. * Thu Mar 11 2004 Nalin Dahyabhai 0.9.7a-34 - ppc/ppc64 define __powerpc__/__powerpc64__, not __ppc__/__ppc64__, fix the intermediate header * Wed Mar 10 2004 Nalin Dahyabhai 0.9.7a-33 - add an intermediate which points to the right arch-specific opensslconf.h on multilib arches * Tue Mar 02 2004 Elliot Lee - rebuilt * Thu Feb 26 2004 Phil Knirsch 0.9.7a-32 - Updated libica to latest upstream version 1.3.5. * Tue Feb 17 2004 Phil Knirsch 0.9.7a-31 - Update ICA crypto engine patch from IBM to latest version. * Fri Feb 13 2004 Elliot Lee - rebuilt * Fri Feb 13 2004 Phil Knirsch 0.9.7a-29 - rebuilt * Wed Feb 11 2004 Phil Knirsch 0.9.7a-28 - Fixed libica build. * Wed Feb 4 2004 Nalin Dahyabhai - add "-ldl" to link flags added for Linux-on-ARM (#99313) * Wed Feb 4 2004 Joe Orton 0.9.7a-27 - updated ca-bundle.crt: removed expired GeoTrust roots, added freessl.com root, removed trustcenter.de Class 0 root * Sun Nov 30 2003 Tim Waugh 0.9.7a-26 - Fix link line for libssl (bug #111154). * Fri Oct 24 2003 Nalin Dahyabhai 0.9.7a-25 - add dependency on zlib-devel for the -devel package, which depends on zlib symbols because we enable zlib for libssl (#102962) * Fri Oct 24 2003 Phil Knirsch 0.9.7a-24 - Use /dev/urandom instead of PRNG for libica. - Apply libica-1.3.5 fix for /dev/urandom in icalinux.c - Use latest ICA engine patch from IBM. * Sat Oct 4 2003 Nalin Dahyabhai 0.9.7a-22.1 - rebuild * Wed Oct 1 2003 Nalin Dahyabhai 0.9.7a-22 - rebuild (22 wasn't actually built, fun eh?) * Tue Sep 30 2003 Nalin Dahyabhai 0.9.7a-23 - re-disable optimizations on ppc64 * Tue Sep 30 2003 Joe Orton - add a_mbstr.c fix for 64-bit platforms from CVS * Tue Sep 30 2003 Nalin Dahyabhai 0.9.7a-22 - add -Wa,--noexecstack to RPM_OPT_FLAGS so that assembled modules get tagged as not needing executable stacks * Mon Sep 29 2003 Nalin Dahyabhai 0.9.7a-21 - rebuild * Thu Sep 25 2003 Nalin Dahyabhai - re-enable optimizations on ppc64 * Thu Sep 25 2003 Nalin Dahyabhai - remove exclusivearch * Wed Sep 24 2003 Nalin Dahyabhai 0.9.7a-20 - only parse a client cert if one was requested - temporarily exclusivearch for %%{ix86} * Tue Sep 23 2003 Nalin Dahyabhai - add security fixes for protocol parsing bugs (CAN-2003-0543, CAN-2003-0544) and heap corruption (CAN-2003-0545) - update RHNS-CA-CERT files - ease back on the number of threads used in the threading test * Wed Sep 17 2003 Matt Wilson 0.9.7a-19 - rebuild to fix gzipped file md5sums (#91211) * Mon Aug 25 2003 Phil Knirsch 0.9.7a-18 - Updated libica to version 1.3.4. * Thu Jul 17 2003 Nalin Dahyabhai 0.9.7a-17 - rebuild * Tue Jul 15 2003 Nalin Dahyabhai 0.9.7a-10.9 - free the kssl_ctx structure when we free an SSL structure (#99066) * Fri Jul 11 2003 Nalin Dahyabhai 0.9.7a-16 - rebuild * Thu Jul 10 2003 Nalin Dahyabhai 0.9.7a-15 - lower thread test count on s390x * Tue Jul 8 2003 Nalin Dahyabhai 0.9.7a-14 - rebuild * Thu Jun 26 2003 Nalin Dahyabhai 0.9.7a-13 - disable assembly on arches where it seems to conflict with threading * Thu Jun 26 2003 Phil Knirsch 0.9.7a-12 - Updated libica to latest upstream version 1.3.0 * Wed Jun 11 2003 Nalin Dahyabhai 0.9.7a-9.9 - rebuild * Wed Jun 11 2003 Nalin Dahyabhai 0.9.7a-11 - rebuild * Tue Jun 10 2003 Nalin Dahyabhai 0.9.7a-10 - ubsec: don't stomp on output data which might also be input data * Tue Jun 10 2003 Nalin Dahyabhai 0.9.7a-9 - temporarily disable optimizations on ppc64 * Mon Jun 9 2003 Nalin Dahyabhai - backport fix for engine-used-for-everything from 0.9.7b - backport fix for prng not being seeded causing problems, also from 0.9.7b - add a check at build-time to ensure that RSA is thread-safe - keep perlpath from stomping on the libica configure scripts * Fri Jun 6 2003 Nalin Dahyabhai - thread-safety fix for RSA blinding * Wed Jun 04 2003 Elliot Lee 0.9.7a-8 - rebuilt * Fri May 30 2003 Phil Knirsch 0.9.7a-7 - Added libica-1.2 to openssl (featurerequest). * Wed Apr 16 2003 Nalin Dahyabhai 0.9.7a-6 - fix building with incorrect flags on ppc64 * Wed Mar 19 2003 Nalin Dahyabhai 0.9.7a-5 - add patch to harden against Klima-Pokorny-Rosa extension of Bleichenbacher's attack (CAN-2003-0131) * Mon Mar 17 2003 Nalin Dahyabhai 0.9.7a-4 - add patch to enable RSA blinding by default, closing a timing attack (CAN-2003-0147) * Wed Mar 5 2003 Nalin Dahyabhai 0.9.7a-3 - disable use of BN assembly module on x86_64, but continue to allow inline assembly (#83403) * Thu Feb 27 2003 Nalin Dahyabhai 0.9.7a-2 - disable EC algorithms * Wed Feb 19 2003 Nalin Dahyabhai 0.9.7a-1 - update to 0.9.7a * Wed Feb 19 2003 Nalin Dahyabhai 0.9.7-8 - add fix to guard against attempts to allocate negative amounts of memory - add patch for CAN-2003-0078, fixing a timing attack * Thu Feb 13 2003 Elliot Lee 0.9.7-7 - Add openssl-ppc64.patch * Mon Feb 10 2003 Nalin Dahyabhai 0.9.7-6 - EVP_DecryptInit should call EVP_CipherInit() instead of EVP_CipherInit_ex(), to get the right behavior when passed uninitialized context structures (#83766) - build with -mcpu=ev5 on alpha family (#83828) * Wed Jan 22 2003 Tim Powers - rebuilt * Fri Jan 17 2003 Phil Knirsch 0.9.7-4 - Added IBM hw crypto support patch. * Wed Jan 15 2003 Nalin Dahyabhai - add missing builddep on sed * Thu Jan 9 2003 Bill Nottingham 0.9.7-3 - debloat - fix broken manpage symlinks * Wed Jan 8 2003 Nalin Dahyabhai 0.9.7-2 - fix double-free in 'openssl ca' * Fri Jan 3 2003 Nalin Dahyabhai 0.9.7-1 - update to 0.9.7 final * Tue Dec 17 2002 Nalin Dahyabhai 0.9.7-0 - update to 0.9.7 beta6 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7) * Wed Dec 11 2002 Nalin Dahyabhai - update to 0.9.7 beta5 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7) * Tue Oct 22 2002 Nalin Dahyabhai 0.9.6b-30 - add configuration stanza for x86_64 and use it on x86_64 - build for linux-ppc on ppc - start running the self-tests again * Wed Oct 02 2002 Elliot Lee 0.9.6b-29hammer.3 - Merge fixes from previous hammer packages, including general x86-64 and multilib * Tue Aug 6 2002 Nalin Dahyabhai 0.9.6b-29 - rebuild * Thu Aug 1 2002 Nalin Dahyabhai 0.9.6b-28 - update asn patch to fix accidental reversal of a logic check * Wed Jul 31 2002 Nalin Dahyabhai 0.9.6b-27 - update asn patch to reduce chance that compiler optimization will remove one of the added tests * Wed Jul 31 2002 Nalin Dahyabhai 0.9.6b-26 - rebuild * Mon Jul 29 2002 Nalin Dahyabhai 0.9.6b-25 - add patch to fix ASN.1 vulnerabilities * Thu Jul 25 2002 Nalin Dahyabhai 0.9.6b-24 - add backport of Ben Laurie's patches for OpenSSL 0.9.6d * Wed Jul 17 2002 Nalin Dahyabhai 0.9.6b-23 - own {_datadir}/ssl/misc * Fri Jun 21 2002 Tim Powers - automated rebuild * Sun May 26 2002 Tim Powers - automated rebuild * Fri May 17 2002 Nalin Dahyabhai 0.9.6b-20 - free ride through the build system (whee!) * Thu May 16 2002 Nalin Dahyabhai 0.9.6b-19 - rebuild in new environment * Thu Apr 4 2002 Nalin Dahyabhai 0.9.6b-17, 0.9.6b-18 - merge RHL-specific bits into stronghold package, rename * Tue Apr 02 2002 Gary Benson stronghold-0.9.6c-2 - add support for Chrysalis Luna token * Tue Mar 26 2002 Gary Benson - disable AEP random number generation, other AEP fixes * Fri Mar 15 2002 Nalin Dahyabhai 0.9.6b-15 - only build subpackages on primary arches * Thu Mar 14 2002 Nalin Dahyabhai 0.9.6b-13 - on ia32, only disable use of assembler on i386 - enable assembly on ia64 * Mon Jan 7 2002 Florian La Roche 0.9.6b-11 - fix sparcv9 entry * Mon Jan 7 2002 Gary Benson stronghold-0.9.6c-1 - upgrade to 0.9.6c - bump BuildArch to i686 and enable assembler on all platforms - synchronise with shrimpy and rawhide - bump soversion to 3 * Wed Oct 10 2001 Florian La Roche - delete BN_LLONG for s390x, patch from Oliver Paukstadt * Mon Sep 17 2001 Nalin Dahyabhai 0.9.6b-9 - update AEP driver patch * Mon Sep 10 2001 Nalin Dahyabhai - adjust RNG disabling patch to match version of patch from Broadcom * Fri Sep 7 2001 Nalin Dahyabhai 0.9.6b-8 - disable the RNG in the ubsec engine driver * Tue Aug 28 2001 Nalin Dahyabhai 0.9.6b-7 - tweaks to the ubsec engine driver * Fri Aug 24 2001 Nalin Dahyabhai 0.9.6b-6 - tweaks to the ubsec engine driver * Thu Aug 23 2001 Nalin Dahyabhai 0.9.6b-5 - update ubsec engine driver from Broadcom * Fri Aug 10 2001 Nalin Dahyabhai 0.9.6b-4 - move man pages back to %%{_mandir}/man?/foo.?ssl from %%{_mandir}/man?ssl/foo.? - add an [ engine ] section to the default configuration file * Thu Aug 9 2001 Nalin Dahyabhai - add a patch for selecting a default engine in SSL_library_init() * Mon Jul 23 2001 Nalin Dahyabhai 0.9.6b-3 - add patches for AEP hardware support - add patch to keep trying when we fail to load a cert from a file and there are more in the file - add missing prototype for ENGINE_ubsec() in engine_int.h * Wed Jul 18 2001 Nalin Dahyabhai 0.9.6b-2 - actually add hw_ubsec to the engine list * Tue Jul 17 2001 Nalin Dahyabhai - add in the hw_ubsec driver from CVS * Wed Jul 11 2001 Nalin Dahyabhai 0.9.6b-1 - update to 0.9.6b * Thu Jul 5 2001 Nalin Dahyabhai - move .so symlinks back to %%{_libdir} * Tue Jul 3 2001 Nalin Dahyabhai - move shared libraries to /lib (#38410) * Mon Jun 25 2001 Nalin Dahyabhai - switch to engine code base * Mon Jun 18 2001 Nalin Dahyabhai - add a script for creating dummy certificates - move man pages from %%{_mandir}/man?/foo.?ssl to %%{_mandir}/man?ssl/foo.? * Thu Jun 07 2001 Florian La Roche - add s390x support * Fri Jun 1 2001 Nalin Dahyabhai - change two memcpy() calls to memmove() - don't define L_ENDIAN on alpha * Wed May 23 2001 Joe Orton stronghold-0.9.6a-1 - Add 'stronghold-' prefix to package names. - Obsolete standard openssl packages. * Wed May 16 2001 Joe Orton - Add BuildArch: i586 as per Nalin's advice. * Tue May 15 2001 Joe Orton - Enable assembler on ix86 (using new .tar.bz2 which does include the asm directories). * Tue May 15 2001 Nalin Dahyabhai - make subpackages depend on the main package * Tue May 1 2001 Nalin Dahyabhai - adjust the hobble script to not disturb symlinks in include/ (fix from Joe Orton) * Fri Apr 27 2001 Nalin Dahyabhai - drop the m2crypo patch we weren't using * Tue Apr 24 2001 Nalin Dahyabhai - configure using "shared" as well * Sun Apr 8 2001 Nalin Dahyabhai - update to 0.9.6a - use the build-shared target to build shared libraries - bump the soversion to 2 because we're no longer compatible with our 0.9.5a packages or our 0.9.6 packages - drop the patch for making rsatest a no-op when rsa null support is used - put all man pages into
ssl instead of
- break the m2crypto modules into a separate package * Tue Mar 13 2001 Nalin Dahyabhai - use BN_LLONG on s390 * Mon Mar 12 2001 Nalin Dahyabhai - fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit) * Sat Mar 3 2001 Nalin Dahyabhai - move c_rehash to the perl subpackage, because it's a perl script now * Fri Mar 2 2001 Nalin Dahyabhai - update to 0.9.6 - enable MD2 - use the libcrypto.so and libssl.so targets to build shared libs with - bump the soversion to 1 because we're no longer compatible with any of the various 0.9.5a packages circulating around, which provide lib*.so.0 * Wed Feb 28 2001 Florian La Roche - change hobble-openssl for disabling MD2 again * Tue Feb 27 2001 Nalin Dahyabhai - re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152 bytes or so, causing EVP_DigestInit() to zero out stack variables in apps built against a version of the library without it * Mon Feb 26 2001 Nalin Dahyabhai - disable some inline assembly, which on x86 is Pentium-specific - re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all) * Thu Feb 08 2001 Florian La Roche - fix s390 patch * Fri Dec 8 2000 Than Ngo - added support s390 * Mon Nov 20 2000 Nalin Dahyabhai - remove -Wa,* and -m* compiler flags from the default Configure file (#20656) - add the CA.pl man page to the perl subpackage * Thu Nov 2 2000 Nalin Dahyabhai - always build with -mcpu=ev5 on alpha * Tue Oct 31 2000 Nalin Dahyabhai - add a symlink from cert.pem to ca-bundle.crt * Wed Oct 25 2000 Nalin Dahyabhai - add a ca-bundle file for packages like Samba to reference for CA certificates * Tue Oct 24 2000 Nalin Dahyabhai - remove libcrypto's crypt(), which doesn't handle md5crypt (#19295) * Mon Oct 2 2000 Nalin Dahyabhai - add unzip as a buildprereq (#17662) - update m2crypto to 0.05-snap4 * Tue Sep 26 2000 Bill Nottingham - fix some issues in building when it's not installed * Wed Sep 6 2000 Nalin Dahyabhai - make sure the headers we include are the ones we built with (aaaaarrgh!) * Fri Sep 1 2000 Nalin Dahyabhai - add Richard Henderson's patch for BN on ia64 - clean up the changelog * Tue Aug 29 2000 Nalin Dahyabhai - fix the building of python modules without openssl-devel already installed * Wed Aug 23 2000 Nalin Dahyabhai - byte-compile python extensions without the build-root - adjust the makefile to not remove temporary files (like .key files when building .csr files) by marking them as .PRECIOUS * Sat Aug 19 2000 Nalin Dahyabhai - break out python extensions into a subpackage * Mon Jul 17 2000 Nalin Dahyabhai - tweak the makefile some more * Tue Jul 11 2000 Nalin Dahyabhai - disable MD2 support * Thu Jul 6 2000 Nalin Dahyabhai - disable MDC2 support * Sun Jul 2 2000 Nalin Dahyabhai - tweak the disabling of RC5, IDEA support - tweak the makefile * Thu Jun 29 2000 Nalin Dahyabhai - strip binaries and libraries - rework certificate makefile to have the right parts for Apache * Wed Jun 28 2000 Nalin Dahyabhai - use %%{_perl} instead of /usr/bin/perl - disable alpha until it passes its own test suite * Fri Jun 9 2000 Nalin Dahyabhai - move the passwd.1 man page out of the passwd package's way * Fri Jun 2 2000 Nalin Dahyabhai - update to 0.9.5a, modified for U.S. - add perl as a build-time requirement - move certificate makefile to another package - disable RC5, IDEA, RSA support - remove optimizations for now * Wed Mar 1 2000 Florian La Roche - Bero told me to move the Makefile into this package * Wed Mar 1 2000 Florian La Roche - add lib*.so symlinks to link dynamically against shared libs * Tue Feb 29 2000 Florian La Roche - update to 0.9.5 - run ldconfig directly in post/postun - add FAQ * Sat Dec 18 1999 Bernhard Rosenkrdnzer - Fix build on non-x86 platforms * Fri Nov 12 1999 Bernhard Rosenkrdnzer - move /usr/share/ssl/* from -devel to main package * Tue Oct 26 1999 Bernhard Rosenkrdnzer - inital packaging - changes from base: - Move /usr/local/ssl to /usr/share/ssl for FHS compliance - handle RPM_OPT_FLAGS