Blame SPECS/openssl.spec

fd2893
# For the curious:
fd2893
# 0.9.5a soversion = 0
fd2893
# 0.9.6  soversion = 1
fd2893
# 0.9.6a soversion = 2
fd2893
# 0.9.6c soversion = 3
fd2893
# 0.9.7a soversion = 4
fd2893
# 0.9.7ef soversion = 5
fd2893
# 0.9.8ab soversion = 6
fd2893
# 0.9.8g soversion = 7
fd2893
# 0.9.8jk + EAP-FAST soversion = 8
fd2893
# 1.0.0 soversion = 10
fd2893
%define soversion 10
fd2893
fd2893
# Number of threads to spawn when testing some threading fixes.
fd2893
%define thread_test_threads %{?threads:%{threads}}%{!?threads:1}
fd2893
fd2893
# Arches on which we need to prevent arch conflicts on opensslconf.h, must
fd2893
# also be handled in opensslconf-new.h.
bbd2dd
%define multilib_arches %{ix86} ia64 %{mips} ppc ppc64 s390 s390x sparcv9 sparc64 x86_64
fd2893
fd2893
%global _performance_build 1
fd2893
fd2893
Summary: Utilities from the general purpose cryptography library with TLS implementation
fd2893
Name: openssl
fd2893
Version: 1.0.2k
bbd2dd
Release: 16%{?dist}
fd2893
Epoch: 1
fd2893
# We have to remove certain patented algorithms from the openssl source
fd2893
# tarball with the hobble-openssl script which is included below.
fd2893
# The original openssl upstream tarball cannot be shipped in the .src.rpm.
fd2893
Source: openssl-%{version}-hobbled.tar.xz
fd2893
Source1: hobble-openssl
fd2893
Source2: Makefile.certificate
fd2893
Source5: README.legacy-settings
fd2893
Source6: make-dummy-cert
fd2893
Source7: renew-dummy-cert
fd2893
Source8: openssl-thread-test.c
fd2893
Source9: opensslconf-new.h
fd2893
Source10: opensslconf-new-warning.h
fd2893
Source11: README.FIPS
fd2893
Source12: ec_curve.c
fd2893
Source13: ectest.c
fd2893
# Build changes
fd2893
Patch1: openssl-1.0.2e-rpmbuild.patch
fd2893
Patch2: openssl-1.0.2a-defaults.patch
fd2893
Patch4: openssl-1.0.2i-enginesdir.patch
fd2893
Patch5: openssl-1.0.2a-no-rpath.patch
fd2893
Patch6: openssl-1.0.2a-test-use-localhost.patch
fd2893
Patch7: openssl-1.0.0-timezone.patch
fd2893
Patch8: openssl-1.0.1c-perlfind.patch
fd2893
Patch9: openssl-1.0.1c-aliasing.patch
fd2893
# Bug fixes
fd2893
Patch23: openssl-1.0.2c-default-paths.patch
fd2893
Patch24: openssl-1.0.2a-issuer-hash.patch
fd2893
# Functionality changes
fd2893
Patch33: openssl-1.0.0-beta4-ca-dir.patch
fd2893
Patch34: openssl-1.0.2a-x509.patch
fd2893
Patch35: openssl-1.0.2a-version-add-engines.patch
fd2893
Patch39: openssl-1.0.2a-ipv6-apps.patch
fd2893
Patch40: openssl-1.0.2i-fips.patch
fd2893
Patch43: openssl-1.0.2j-krb5keytab.patch
fd2893
Patch45: openssl-1.0.2a-env-zlib.patch
fd2893
Patch47: openssl-1.0.2a-readme-warning.patch
fd2893
Patch49: openssl-1.0.1i-algo-doc.patch
fd2893
Patch50: openssl-1.0.2a-dtls1-abi.patch
fd2893
Patch51: openssl-1.0.2a-version.patch
fd2893
Patch56: openssl-1.0.2a-rsa-x931.patch
fd2893
Patch58: openssl-1.0.2a-fips-md5-allow.patch
fd2893
Patch60: openssl-1.0.2a-apps-dgst.patch
fd2893
Patch63: openssl-1.0.2k-starttls.patch
fd2893
Patch65: openssl-1.0.2i-chil-fixes.patch
fd2893
Patch66: openssl-1.0.2h-pkgconfig.patch
fd2893
Patch68: openssl-1.0.2i-secure-getenv.patch
fd2893
Patch70: openssl-1.0.2a-fips-ec.patch
fd2893
Patch71: openssl-1.0.2g-manfix.patch
fd2893
Patch72: openssl-1.0.2a-fips-ctor.patch
fd2893
Patch73: openssl-1.0.2c-ecc-suiteb.patch
fd2893
Patch74: openssl-1.0.2j-deprecate-algos.patch
fd2893
Patch75: openssl-1.0.2a-compat-symbols.patch
fd2893
Patch76: openssl-1.0.2j-new-fips-reqs.patch
fd2893
Patch77: openssl-1.0.2j-downgrade-strength.patch
fd2893
Patch78: openssl-1.0.2k-cc-reqs.patch
fd2893
Patch90: openssl-1.0.2i-enc-fail.patch
fd2893
Patch94: openssl-1.0.2d-secp256k1.patch
fd2893
Patch95: openssl-1.0.2e-remove-nistp224.patch
fd2893
Patch96: openssl-1.0.2e-speed-doc.patch
fd2893
Patch97: openssl-1.0.2k-no-ssl2.patch
fd2893
Patch98: openssl-1.0.2k-long-hello.patch
fd2893
Patch99: openssl-1.0.2k-fips-randlock.patch
fd2893
# Backported fixes including security fixes
fd2893
Patch80: openssl-1.0.2e-wrap-pad.patch
fd2893
Patch81: openssl-1.0.2a-padlock64.patch
fd2893
Patch82: openssl-1.0.2i-trusted-first-doc.patch
fd2893
Patch83: openssl-1.0.2k-backports.patch
fd2893
Patch84: openssl-1.0.2k-ppc-update.patch
fd2893
Patch85: openssl-1.0.2k-req-x509.patch
fd2893
Patch86: openssl-1.0.2k-cve-2017-3736.patch
fd2893
Patch87: openssl-1.0.2k-cve-2017-3737.patch
fd2893
Patch88: openssl-1.0.2k-cve-2017-3738.patch
bbd2dd
Patch89: openssl-1.0.2k-s390x-update.patch
bbd2dd
Patch100: openssl-1.0.2k-name-sensitive.patch
bbd2dd
Patch101: openssl-1.0.2k-cve-2017-3735.patch
bbd2dd
Patch102: openssl-1.0.2k-cve-2018-0732.patch
bbd2dd
Patch103: openssl-1.0.2k-cve-2018-0737.patch
bbd2dd
Patch104: openssl-1.0.2k-cve-2018-0739.patch
bbd2dd
Patch105: openssl-1.0.2k-cve-2018-0495.patch
fd2893
fd2893
License: OpenSSL
fd2893
Group: System Environment/Libraries
fd2893
URL: http://www.openssl.org/
fd2893
BuildRoot: %{_tmppath}/%{name}-%{version}-root
fd2893
BuildRequires: coreutils, krb5-devel, perl, sed, zlib-devel, /usr/bin/cmp
fd2893
BuildRequires: lksctp-tools-devel
fd2893
BuildRequires: /usr/bin/rename
fd2893
BuildRequires: /usr/bin/pod2man
fd2893
Requires: coreutils, make
fd2893
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
fd2893
fd2893
%description
fd2893
The OpenSSL toolkit provides support for secure communications between
fd2893
machines. OpenSSL includes a certificate management tool and shared
fd2893
libraries which provide various cryptographic algorithms and
fd2893
protocols.
fd2893
fd2893
%package libs
fd2893
Summary: A general purpose cryptography library with TLS implementation
fd2893
Group: System Environment/Libraries
fd2893
Requires: ca-certificates >= 2008-5
fd2893
# Needed obsoletes due to the base/lib subpackage split
fd2893
Obsoletes: openssl < 1:1.0.1-0.3.beta3
fd2893
fd2893
%description libs
fd2893
OpenSSL is a toolkit for supporting cryptography. The openssl-libs
fd2893
package contains the libraries that are used by various applications which
fd2893
support cryptographic algorithms and protocols.
fd2893
fd2893
%package devel
fd2893
Summary: Files for development of applications which will use OpenSSL
fd2893
Group: Development/Libraries
fd2893
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
fd2893
Requires: krb5-devel%{?_isa}, zlib-devel%{?_isa}
fd2893
Requires: pkgconfig
fd2893
fd2893
%description devel
fd2893
OpenSSL is a toolkit for supporting cryptography. The openssl-devel
fd2893
package contains include files needed to develop applications which
fd2893
support various cryptographic algorithms and protocols.
fd2893
fd2893
%package static
fd2893
Summary:  Libraries for static linking of applications which will use OpenSSL
fd2893
Group: Development/Libraries
fd2893
Requires: %{name}-devel%{?_isa} = %{epoch}:%{version}-%{release}
fd2893
fd2893
%description static
fd2893
OpenSSL is a toolkit for supporting cryptography. The openssl-static
fd2893
package contains static libraries needed for static linking of
fd2893
applications which support various cryptographic algorithms and
fd2893
protocols.
fd2893
fd2893
%package perl
fd2893
Summary: Perl scripts provided with OpenSSL
fd2893
Group: Applications/Internet
fd2893
Requires: perl
fd2893
Requires: %{name}%{?_isa} = %{epoch}:%{version}-%{release}
fd2893
fd2893
%description perl
fd2893
OpenSSL is a toolkit for supporting cryptography. The openssl-perl
fd2893
package provides Perl scripts for converting certificates and keys
fd2893
from other formats to the formats used by the OpenSSL toolkit.
fd2893
fd2893
%prep
fd2893
%setup -q -n %{name}-%{version}
fd2893
fd2893
# The hobble_openssl is called here redundantly, just to be sure.
fd2893
# The tarball has already the sources removed.
fd2893
%{SOURCE1} > /dev/null
fd2893
fd2893
cp %{SOURCE12} %{SOURCE13} crypto/ec/
fd2893
fd2893
%patch1 -p1 -b .rpmbuild
fd2893
%patch2 -p1 -b .defaults
fd2893
%patch4 -p1 -b .enginesdir %{?_rawbuild}
fd2893
%patch5 -p1 -b .no-rpath
fd2893
%patch6 -p1 -b .use-localhost
fd2893
%patch7 -p1 -b .timezone
fd2893
%patch8 -p1 -b .perlfind %{?_rawbuild}
fd2893
%patch9 -p1 -b .aliasing
fd2893
fd2893
%patch23 -p1 -b .default-paths
fd2893
%patch24 -p1 -b .issuer-hash
fd2893
fd2893
%patch33 -p1 -b .ca-dir
fd2893
%patch34 -p1 -b .x509
fd2893
%patch35 -p1 -b .version-add-engines
fd2893
%patch39 -p1 -b .ipv6-apps
fd2893
%patch40 -p1 -b .fips
fd2893
%patch43 -p1 -b .krb5keytab 
fd2893
%patch45 -p1 -b .env-zlib
fd2893
%patch47 -p1 -b .warning
fd2893
%patch49 -p1 -b .algo-doc
fd2893
%patch50 -p1 -b .dtls1-abi
fd2893
%patch51 -p1 -b .version
fd2893
%patch56 -p1 -b .x931
fd2893
%patch58 -p1 -b .md5-allow
fd2893
%patch60 -p1 -b .dgst
fd2893
%patch63 -p1 -b .starttls
fd2893
%patch65 -p1 -b .chil
fd2893
%patch66 -p1 -b .pkgconfig
fd2893
%patch68 -p1 -b .secure-getenv
fd2893
%patch70 -p1 -b .fips-ec
fd2893
%patch71 -p1 -b .manfix
fd2893
%patch72 -p1 -b .fips-ctor
fd2893
%patch73 -p1 -b .suiteb
fd2893
%patch74 -p1 -b .deprecate-algos
fd2893
%patch75 -p1 -b .compat
fd2893
%patch76 -p1 -b .fips-reqs
fd2893
%patch77 -p1 -b .strength
fd2893
%patch78 -p1 -b .cc-reqs
fd2893
%patch90 -p1 -b .enc-fail
fd2893
%patch94 -p1 -b .secp256k1
fd2893
%patch95 -p1 -b .nistp224
fd2893
%patch96 -p1 -b .speed-doc
fd2893
%patch97 -p1 -b .no-ssl2
fd2893
%patch98 -p1 -b .long-hello
fd2893
%patch99 -p1 -b .randlock
fd2893
fd2893
%patch80 -p1 -b .wrap
fd2893
%patch81 -p1 -b .padlock64
fd2893
%patch82 -p1 -b .trusted-first
fd2893
%patch83 -p1 -b .backports
fd2893
%patch84 -p1 -b .ppc-update
fd2893
%patch85 -p1 -b .req-x509
fd2893
%patch86 -p1 -b .mont5-carry
fd2893
%patch87 -p1 -b .ssl-err
fd2893
%patch88 -p1 -b .rsaz-overflow
bbd2dd
%patch89 -p1 -b .s390x-update
bbd2dd
%patch100 -p1 -b .name-sensitive
bbd2dd
%patch101 -p1 -b .overread
bbd2dd
%patch102 -p1 -b .large-dh
bbd2dd
%patch103 -p1 -b .gen-timing
bbd2dd
%patch104 -p1 -b .asn1-recursive
bbd2dd
%patch105 -p1 -b .rohnp-fix
fd2893
fd2893
sed -i 's/SHLIB_VERSION_NUMBER "1.0.0"/SHLIB_VERSION_NUMBER "%{version}"/' crypto/opensslv.h
fd2893
fd2893
# Modify the various perl scripts to reference perl in the right location.
fd2893
perl util/perlpath.pl `dirname %{__perl}`
fd2893
fd2893
# Generate a table with the compile settings for my perusal.
fd2893
touch Makefile
fd2893
make TABLE PERL=%{__perl}
fd2893
fd2893
%build
fd2893
# Figure out which flags we want to use.
fd2893
# default
fd2893
sslarch=%{_os}-%{_target_cpu}
fd2893
%ifarch %ix86
fd2893
sslarch=linux-elf
fd2893
if ! echo %{_target} | grep -q i686 ; then
fd2893
	sslflags="no-asm 386"
fd2893
fi
fd2893
%endif
fd2893
%ifarch x86_64
fd2893
sslflags=enable-ec_nistp_64_gcc_128
fd2893
%endif
fd2893
%ifarch sparcv9
fd2893
sslarch=linux-sparcv9
fd2893
sslflags=no-asm
fd2893
%endif
fd2893
%ifarch sparc64
fd2893
sslarch=linux64-sparcv9
fd2893
sslflags=no-asm
fd2893
%endif
fd2893
%ifarch alpha alphaev56 alphaev6 alphaev67
fd2893
sslarch=linux-alpha-gcc
fd2893
%endif
fd2893
%ifarch s390 sh3eb sh4eb
fd2893
sslarch="linux-generic32 -DB_ENDIAN"
fd2893
%endif
fd2893
%ifarch s390x
fd2893
sslarch="linux64-s390x"
fd2893
%endif
fd2893
%ifarch %{arm}
fd2893
sslarch=linux-armv4
fd2893
%endif
fd2893
%ifarch aarch64
fd2893
sslarch=linux-aarch64
fd2893
sslflags=enable-ec_nistp_64_gcc_128
fd2893
%endif
fd2893
%ifarch sh3 sh4
fd2893
sslarch=linux-generic32
fd2893
%endif
fd2893
%ifarch ppc64 ppc64p7
fd2893
sslarch=linux-ppc64
fd2893
%endif
fd2893
%ifarch ppc64le
fd2893
sslarch="linux-ppc64le"
fd2893
sslflags=enable-ec_nistp_64_gcc_128
fd2893
%endif
fd2893
%ifarch mips mipsel
fd2893
sslarch="linux-mips32 -mips32r2"
fd2893
%endif
fd2893
%ifarch mips64 mips64el
fd2893
sslarch="linux64-mips64 -mips64r2"
fd2893
%endif
fd2893
%ifarch mips64el
fd2893
sslflags=enable-ec_nistp_64_gcc_128
fd2893
%endif
fd2893
%ifarch riscv64
fd2893
sslarch=linux-generic64
fd2893
%endif
fd2893
fd2893
# ia64, x86_64, ppc are OK by default
fd2893
# Configure the build tree.  Override OpenSSL defaults with known-good defaults
fd2893
# usable on all platforms.  The Configure script already knows to use -fPIC and
fd2893
# RPM_OPT_FLAGS, so we can skip specifiying them here.
fd2893
./Configure \
fd2893
	--prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
fd2893
	zlib sctp enable-camellia enable-seed enable-tlsext enable-rfc3779 \
fd2893
	enable-cms enable-md2 enable-rc5 \
fd2893
	no-mdc2 no-ec2m no-gost no-srp \
fd2893
	--with-krb5-flavor=MIT --enginesdir=%{_libdir}/openssl/engines \
fd2893
	--with-krb5-dir=/usr shared  ${sslarch} %{?!nofips:fips}
fd2893
fd2893
# Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
fd2893
# marked as not requiring an executable stack.
fd2893
# Also add -DPURIFY to make using valgrind with openssl easier as we do not
fd2893
# want to depend on the uninitialized memory as a source of entropy anyway.
fd2893
RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -DPURIFY"
fd2893
make depend
fd2893
make all
fd2893
fd2893
# Generate hashes for the included certs.
fd2893
make rehash
fd2893
fd2893
# Overwrite FIPS README and copy README.legacy-settings
fd2893
cp -f %{SOURCE5} %{SOURCE11} .
fd2893
fd2893
# Clean up the .pc files
fd2893
for i in libcrypto.pc libssl.pc openssl.pc ; do
fd2893
  sed -i '/^Libs.private:/{s/-L[^ ]* //;s/-Wl[^ ]* //}' $i
fd2893
done
fd2893
fd2893
%check
fd2893
# Verify that what was compiled actually works.
fd2893
fd2893
# We must revert patch33 before tests otherwise they will fail
fd2893
patch -p1 -R < %{PATCH33}
fd2893
fd2893
LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
fd2893
export LD_LIBRARY_PATH
fd2893
OPENSSL_ENABLE_MD5_VERIFY=
fd2893
export OPENSSL_ENABLE_MD5_VERIFY
fd2893
make -C test apps tests
fd2893
%{__cc} -o openssl-thread-test \
fd2893
	`krb5-config --cflags` \
fd2893
	-I./include \
fd2893
	$RPM_OPT_FLAGS \
fd2893
	%{SOURCE8} \
fd2893
	-L. \
fd2893
	-lssl -lcrypto \
fd2893
	`krb5-config --libs` \
fd2893
	-lpthread -lz -ldl
fd2893
./openssl-thread-test --threads %{thread_test_threads}
fd2893
fd2893
# Add generation of HMAC checksum of the final stripped library
fd2893
%define __spec_install_post \
fd2893
    %{?__debug_package:%{__debug_install_post}} \
fd2893
    %{__arch_install_post} \
fd2893
    %{__os_install_post} \
fd2893
    crypto/fips/fips_standalone_hmac $RPM_BUILD_ROOT%{_libdir}/libcrypto.so.%{version} >$RPM_BUILD_ROOT%{_libdir}/.libcrypto.so.%{version}.hmac \
fd2893
    ln -sf .libcrypto.so.%{version}.hmac $RPM_BUILD_ROOT%{_libdir}/.libcrypto.so.%{soversion}.hmac \
fd2893
    crypto/fips/fips_standalone_hmac $RPM_BUILD_ROOT%{_libdir}/libssl.so.%{version} >$RPM_BUILD_ROOT%{_libdir}/.libssl.so.%{version}.hmac \
fd2893
    ln -sf .libssl.so.%{version}.hmac $RPM_BUILD_ROOT%{_libdir}/.libssl.so.%{soversion}.hmac \
fd2893
%{nil}
fd2893
fd2893
%define __provides_exclude_from %{_libdir}/openssl
fd2893
fd2893
%install
fd2893
[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
fd2893
# Install OpenSSL.
fd2893
install -d $RPM_BUILD_ROOT{%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl}
fd2893
make INSTALL_PREFIX=$RPM_BUILD_ROOT install
fd2893
make INSTALL_PREFIX=$RPM_BUILD_ROOT install_docs
fd2893
mv $RPM_BUILD_ROOT%{_libdir}/engines $RPM_BUILD_ROOT%{_libdir}/openssl
fd2893
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/man/* $RPM_BUILD_ROOT%{_mandir}/
fd2893
rmdir $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/man
fd2893
rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT%{_libdir}/*.so.%{soversion}
fd2893
mkdir $RPM_BUILD_ROOT/%{_lib}
fd2893
for lib in $RPM_BUILD_ROOT%{_libdir}/*.so.%{version} ; do
fd2893
	chmod 755 ${lib}
fd2893
	ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`
fd2893
	ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`.%{soversion}
fd2893
done
fd2893
fd2893
# Install a makefile for generating keys and self-signed certs, and a script
fd2893
# for generating them on the fly.
fd2893
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
fd2893
install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/Makefile
fd2893
install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/make-dummy-cert
fd2893
install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/renew-dummy-cert
fd2893
fd2893
# Make sure we actually include the headers we built against.
fd2893
for header in $RPM_BUILD_ROOT%{_includedir}/openssl/* ; do
fd2893
	if [ -f ${header} -a -f include/openssl/$(basename ${header}) ] ; then
fd2893
		install -m644 include/openssl/`basename ${header}` ${header}
fd2893
	fi
fd2893
done
fd2893
fd2893
# Rename man pages so that they don't conflict with other system man pages.
fd2893
pushd $RPM_BUILD_ROOT%{_mandir}
fd2893
ln -s -f config.5 man5/openssl.cnf.5
fd2893
for manpage in man*/* ; do
fd2893
	if [ -L ${manpage} ]; then
fd2893
		TARGET=`ls -l ${manpage} | awk '{ print $NF }'`
fd2893
		ln -snf ${TARGET}ssl ${manpage}ssl
fd2893
		rm -f ${manpage}
fd2893
	else
fd2893
		mv ${manpage} ${manpage}ssl
fd2893
	fi
fd2893
done
fd2893
for conflict in passwd rand ; do
fd2893
	rename ${conflict} ssl${conflict} man*/${conflict}*
fd2893
done
fd2893
popd
fd2893
fd2893
# Pick a CA script.
fd2893
pushd  $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc
fd2893
mv CA.sh CA
fd2893
popd
fd2893
fd2893
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
fd2893
mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
fd2893
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
fd2893
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
fd2893
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
fd2893
fd2893
# Ensure the openssl.cnf timestamp is identical across builds to avoid
fd2893
# mulitlib conflicts and unnecessary renames on upgrade
fd2893
touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
fd2893
fd2893
# Determine which arch opensslconf.h is going to try to #include.
fd2893
basearch=%{_arch}
fd2893
%ifarch %{ix86}
fd2893
basearch=i386
fd2893
%endif
fd2893
%ifarch sparcv9
fd2893
basearch=sparc
fd2893
%endif
fd2893
%ifarch sparc64
fd2893
basearch=sparc64
fd2893
%endif
fd2893
fd2893
%ifarch %{multilib_arches}
fd2893
# Do an opensslconf.h switcheroo to avoid file conflicts on systems where you
fd2893
# can have both a 32- and 64-bit version of the library, and they each need
fd2893
# their own correct-but-different versions of opensslconf.h to be usable.
fd2893
install -m644 %{SOURCE10} \
fd2893
	$RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf-${basearch}.h
fd2893
cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h >> \
fd2893
	$RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf-${basearch}.h
fd2893
install -m644 %{SOURCE9} \
fd2893
	$RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
fd2893
%endif
fd2893
fd2893
# Remove unused files from upstream fips support
fd2893
rm -rf $RPM_BUILD_ROOT/%{_bindir}/openssl_fips_fingerprint
fd2893
rm -rf $RPM_BUILD_ROOT/%{_libdir}/fips_premain.*
fd2893
rm -rf $RPM_BUILD_ROOT/%{_libdir}/fipscanister.*
fd2893
fd2893
%clean
fd2893
[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
fd2893
fd2893
%files
fd2893
%defattr(-,root,root)
fd2893
%{!?_licensedir:%global license %%doc}
fd2893
%license LICENSE
fd2893
%doc FAQ NEWS README
fd2893
%doc README.FIPS
fd2893
%doc README.legacy-settings
fd2893
%{_sysconfdir}/pki/tls/certs/make-dummy-cert
fd2893
%{_sysconfdir}/pki/tls/certs/renew-dummy-cert
fd2893
%{_sysconfdir}/pki/tls/certs/Makefile
fd2893
%{_sysconfdir}/pki/tls/misc/CA
fd2893
%dir %{_sysconfdir}/pki/CA
fd2893
%dir %{_sysconfdir}/pki/CA/private
fd2893
%dir %{_sysconfdir}/pki/CA/certs
fd2893
%dir %{_sysconfdir}/pki/CA/crl
fd2893
%dir %{_sysconfdir}/pki/CA/newcerts
fd2893
%{_sysconfdir}/pki/tls/misc/c_*
fd2893
%attr(0755,root,root) %{_bindir}/openssl
fd2893
%attr(0644,root,root) %{_mandir}/man1*/*
fd2893
%exclude %{_mandir}/man1*/*.pl*
fd2893
%exclude %{_mandir}/man1*/c_rehash*
fd2893
%exclude %{_mandir}/man1*/tsget*
fd2893
%attr(0644,root,root) %{_mandir}/man5*/*
fd2893
%attr(0644,root,root) %{_mandir}/man7*/*
fd2893
fd2893
%files libs
fd2893
%defattr(-,root,root)
fd2893
%{!?_licensedir:%global license %%doc}
fd2893
%license LICENSE
fd2893
%dir %{_sysconfdir}/pki/tls
fd2893
%dir %{_sysconfdir}/pki/tls/certs
fd2893
%dir %{_sysconfdir}/pki/tls/misc
fd2893
%dir %{_sysconfdir}/pki/tls/private
fd2893
%config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
fd2893
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{version}
fd2893
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{soversion}
fd2893
%attr(0755,root,root) %{_libdir}/libssl.so.%{version}
fd2893
%attr(0755,root,root) %{_libdir}/libssl.so.%{soversion}
fd2893
%attr(0644,root,root) %{_libdir}/.libcrypto.so.*.hmac
fd2893
%attr(0644,root,root) %{_libdir}/.libssl.so.*.hmac
fd2893
%attr(0755,root,root) %{_libdir}/openssl
fd2893
fd2893
%files devel
fd2893
%defattr(-,root,root)
fd2893
%doc doc/c-indentation.el doc/openssl.txt CHANGES
fd2893
%{_prefix}/include/openssl
fd2893
%attr(0755,root,root) %{_libdir}/*.so
fd2893
%attr(0644,root,root) %{_mandir}/man3*/*
fd2893
%attr(0644,root,root) %{_libdir}/pkgconfig/*.pc
fd2893
fd2893
%files static
fd2893
%defattr(-,root,root)
fd2893
%attr(0644,root,root) %{_libdir}/*.a
fd2893
fd2893
%files perl
fd2893
%defattr(-,root,root)
fd2893
%attr(0755,root,root) %{_bindir}/c_rehash
fd2893
%attr(0644,root,root) %{_mandir}/man1*/*.pl*
fd2893
%attr(0644,root,root) %{_mandir}/man1*/c_rehash*
fd2893
%attr(0644,root,root) %{_mandir}/man1*/tsget*
fd2893
%{_sysconfdir}/pki/tls/misc/*.pl
fd2893
%{_sysconfdir}/pki/tls/misc/tsget
fd2893
fd2893
%post libs -p /sbin/ldconfig
fd2893
fd2893
%postun libs -p /sbin/ldconfig
fd2893
fd2893
%changelog
bbd2dd
* Tue Aug 14 2018 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-16
bbd2dd
- fix CVE-2018-0495 - ROHNP - Key Extraction Side Channel on DSA, ECDSA
bbd2dd
- fix incorrect error message on FIPS DSA parameter generation (#1603597)
bbd2dd
bbd2dd
* Tue Jun 19 2018 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-14
bbd2dd
- ppc64le is not multilib architecture (#1585004)
bbd2dd
bbd2dd
* Mon Jun 18 2018 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-13
bbd2dd
- add S390x assembler updates
bbd2dd
- make CA name list comparison function case sensitive (#1548401)
bbd2dd
- fix CVE-2017-3735 - possible one byte overread with X.509 IPAdressFamily
bbd2dd
- fix CVE-2018-0732 - large prime DH DoS of TLS client
bbd2dd
- fix CVE-2018-0737 - RSA key generation cache timing vulnerability
bbd2dd
- fix CVE-2018-0739 - stack overflow parsing recursive ASN.1 structure
bbd2dd
fd2893
* Wed Dec 13 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-12
fd2893
- fix CVE-2017-3737 - incorrect handling of fatal error state
fd2893
- fix CVE-2017-3738 - AVX2 Montgomery multiplication bug with 1024 bit modulus
fd2893
fd2893
* Wed Dec  6 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-11
fd2893
- fix deadlock in RNG in the FIPS mode in mariadb
fd2893
fd2893
* Tue Nov  7 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-9
fd2893
- fix CVE-2017-3736 - carry propagation bug in Montgomery multiplication
fd2893
fd2893
* Wed May 17 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-8
fd2893
- fix regression in openssl req -x509 command (#1450015)
fd2893
fd2893
* Thu Apr 13 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-7
fd2893
- handle incorrect size gracefully in aes_p8_cbc_encrypt()
fd2893
fd2893
* Mon Mar 27 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-6
fd2893
- allow long client hellos to be received by server
fd2893
fd2893
* Mon Mar 27 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-5
fd2893
- fix CPU features detection on new AMD processors
fd2893
fd2893
* Thu Mar  9 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-4
fd2893
- add support for additional STARTTLS protocols to s_client
fd2893
  original backported patch by Robert Scheck (#1396209)
fd2893
fd2893
* Wed Mar  1 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-3
fd2893
- properly document the SSLv2 support removal
fd2893
fd2893
* Mon Feb 20 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-2
fd2893
- add PPC assembler updates
fd2893
fd2893
* Tue Feb  7 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-1
fd2893
- minor upstream release 1.0.2k fixing security issues
fd2893
fd2893
* Tue Jan 10 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2j-2
fd2893
- deprecate and disable verification of insecure hash algorithms
fd2893
- add support for /etc/pki/tls/legacy-settings also for minimum DH length
fd2893
  accepted by SSL client
fd2893
- compare the encrypt and tweak key in XTS as required by FIPS
fd2893
fd2893
* Thu Jan  5 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2j-1
fd2893
- rebase to latest upstream release from the 1.0.2 branch, ABI compatible
fd2893
fd2893
* Thu Sep 22 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-60
fd2893
- fix CVE-2016-2177 - possible integer overflow
fd2893
- fix CVE-2016-2178 - non-constant time DSA operations
fd2893
- fix CVE-2016-2179 - further DoS issues in DTLS
fd2893
- fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio()
fd2893
- fix CVE-2016-2181 - DTLS1 replay protection and unprocessed records issue
fd2893
- fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec()
fd2893
- fix CVE-2016-6302 - insufficient TLS session ticket HMAC length check
fd2893
- fix CVE-2016-6304 - unbound memory growth with OCSP status request
fd2893
- fix CVE-2016-6306 - certificate message OOB reads
fd2893
- mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to
fd2893
  112 bit effective strength
fd2893
fd2893
* Tue Jun 21 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-58
fd2893
- replace expired testing certificates
fd2893
fd2893
* Fri Apr 29 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-57
fd2893
- fix CVE-2016-2105 - possible overflow in base64 encoding
fd2893
- fix CVE-2016-2106 - possible overflow in EVP_EncryptUpdate()
fd2893
- fix CVE-2016-2107 - padding oracle in stitched AES-NI CBC-MAC
fd2893
- fix CVE-2016-2108 - memory corruption in ASN.1 encoder
fd2893
- fix CVE-2016-2109 - possible DoS when reading ASN.1 data from BIO
fd2893
fd2893
* Thu Apr  7 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-56
fd2893
- fix 1-byte memory leak in pkcs12 parse (#1312112)
fd2893
- document some options of the speed command (#1312110)
fd2893
- fix high-precision timestamps in timestamping authority
fd2893
- enable SCTP support in DTLS 
fd2893
- use correct digest when exporting keying material in TLS1.2 (#1289620)
fd2893
- fix CVE-2016-0799 - memory issues in BIO_printf
fd2893
- add support for setting Kerberos service and keytab in
fd2893
  s_server and s_client
fd2893
fd2893
* Wed Feb 24 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-55
fd2893
- fix CVE-2016-0702 - side channel attack on modular exponentiation
fd2893
- fix CVE-2016-0705 - double-free in DSA private key parsing
fd2893
- fix CVE-2016-0797 - heap corruption in BN_hex2bn and BN_dec2bn
fd2893
fd2893
* Tue Feb 16 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-54
fd2893
- fix CVE-2015-3197 - SSLv2 ciphersuite enforcement
fd2893
- disable SSLv2 in the generic TLS method
fd2893
fd2893
* Mon Dec 21 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-53
fd2893
- fix CVE-2015-7575 - disallow use of MD5 in TLS1.2
fd2893
fd2893
* Fri Dec  4 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-52
fd2893
- fix CVE-2015-3194 - certificate verify crash with missing PSS parameter
fd2893
- fix CVE-2015-3195 - X509_ATTRIBUTE memory leak
fd2893
- fix CVE-2015-3196 - race condition when handling PSK identity hint
fd2893
fd2893
* Tue Jun 23 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-51
fd2893
- fix the CVE-2015-1791 fix (broken server side renegotiation)
fd2893
fd2893
* Thu Jun 11 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-50
fd2893
- improved fix for CVE-2015-1791
fd2893
- add missing parts of CVE-2015-0209 fix for corectness although unexploitable
fd2893
fd2893
* Tue Jun  9 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-49
fd2893
- fix CVE-2014-8176 - invalid free in DTLS buffering code
fd2893
- fix CVE-2015-1789 - out-of-bounds read in X509_cmp_time
fd2893
- fix CVE-2015-1790 - PKCS7 crash with missing EncryptedContent
fd2893
- fix CVE-2015-1791 - race condition handling NewSessionTicket
fd2893
- fix CVE-2015-1792 - CMS verify infinite loop with unknown hash function
fd2893
fd2893
* Wed Jun  3 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-48
fd2893
- fix CVE-2015-3216 - regression in RAND locking that can cause segfaults on
fd2893
  read in multithreaded applications
fd2893
fd2893
* Mon May 25 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-47
fd2893
- fix CVE-2015-4000 - prevent the logjam attack on client - restrict
fd2893
  the DH key size to at least 768 bits (limit will be increased in future)
fd2893
fd2893
* Wed Mar 25 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-46
fd2893
- drop the AES-GCM restriction of 2^32 operations because the IV is
fd2893
  always 96 bits (32 bit fixed field + 64 bit invocation field)
fd2893
fd2893
* Thu Mar 19 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-45
fd2893
- update fix for CVE-2015-0287 to what was released upstream
fd2893
fd2893
* Wed Mar 18 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-44
fd2893
- fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
fd2893
- fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
fd2893
- fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption
fd2893
- fix CVE-2015-0288 - X509_to_X509_REQ NULL pointer dereference
fd2893
- fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
fd2893
- fix CVE-2015-0292 - integer underflow in base64 decoder
fd2893
- fix CVE-2015-0293 - triggerable assert in SSLv2 server
fd2893
fd2893
* Mon Mar 16 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-43
fd2893
- fix broken error detection when unwrapping unpadded key
fd2893
fd2893
* Mon Mar  2 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-42.1
fd2893
- fix the RFC 5649 for key material that does not need padding
fd2893
fd2893
* Thu Jan 15 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-42
fd2893
- test in the non-FIPS RSA keygen for minimal distance of p and q
fd2893
  similarly to the FIPS RSA keygen
fd2893
fd2893
* Tue Jan 13 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-41
fd2893
- fix CVE-2014-3570 - incorrect computation in BN_sqr()
fd2893
- fix CVE-2014-3571 - possible crash in dtls1_get_record()
fd2893
- fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state
fd2893
- fix CVE-2014-8275 - various certificate fingerprint issues
fd2893
- fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export
fd2893
  ciphersuites and on server
fd2893
- fix CVE-2015-0205 - do not allow unauthenticated client DH certificate
fd2893
- fix CVE-2015-0206 - possible memory leak when buffering DTLS records
fd2893
fd2893
* Tue Oct 21 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-40
fd2893
- use FIPS approved method for computation of d in RSA
fd2893
- copy digest algorithm when handling SNI context switch
fd2893
fd2893
* Wed Oct 15 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-39
fd2893
- fix CVE-2014-3567 - memory leak when handling session tickets
fd2893
- fix CVE-2014-3513 - memory leak in srtp support
fd2893
- add support for fallback SCSV to partially mitigate CVE-2014-3566
fd2893
  (padding attack on SSL3)
fd2893
fd2893
* Wed Sep 24 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-38
fd2893
- do FIPS algorithm selftest before the integrity check
fd2893
fd2893
* Thu Sep 18 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-37
fd2893
- add support for RFC 5649 (#1119738)
fd2893
- do not pass the FIPS integrity check if the .hmac files are empty (#1128849)
fd2893
- add ECC TLS extensions to DTLS (#1119803)
fd2893
- do not send ECC ciphersuites in SSLv2 client hello (#1090955)
fd2893
- properly propagate encryption failure in BIO_f_cipher (#1072439)
fd2893
- fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
fd2893
- improve documentation of ciphersuites - patch by Hubert Kario (#1108026)
fd2893
- use case insensitive comparison for servername in s_server (#1081163)
fd2893
- add support for automatic ECDH curve selection on server (#1080128)
fd2893
- FIPS mode: make the limitations on DSA, DH, and RSA keygen
fd2893
  length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment
fd2893
  variable is set
fd2893
fd2893
* Wed Aug 13 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-36
fd2893
- add support for ppc64le architecture
fd2893
- add Power 8 optimalizations
fd2893
fd2893
* Fri Aug  8 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-35
fd2893
- fix CVE-2014-3505 - doublefree in DTLS packet processing
fd2893
- fix CVE-2014-3506 - avoid memory exhaustion in DTLS
fd2893
- fix CVE-2014-3507 - avoid memory leak in DTLS
fd2893
- fix CVE-2014-3508 - fix OID handling to avoid information leak
fd2893
- fix CVE-2014-3509 - fix race condition when parsing server hello
fd2893
- fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
fd2893
- fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
fd2893
fd2893
* Tue Jun  3 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34.3
fd2893
- fix CVE-2010-5298 - possible use of memory after free
fd2893
- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
fd2893
- fix CVE-2014-0198 - possible NULL pointer dereference
fd2893
- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
fd2893
- fix CVE-2014-0224 - SSL/TLS MITM vulnerability
fd2893
- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
fd2893
fd2893
* Tue Apr  8 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34
fd2893
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
fd2893
fd2893
* Fri Feb 14 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-33
fd2893
- use the key length from configuration file if req -newkey rsa is invoked
fd2893
fd2893
* Thu Feb 13 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-32
fd2893
- avoid unnecessary reseeding in BN_rand in the FIPS mode
fd2893
fd2893
* Wed Feb 12 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-31
fd2893
- print ephemeral key size negotiated in TLS handshake (#1057715)
fd2893
- add DH_compute_key_padded needed for FIPS CAVS testing
fd2893
- make expiration and key length changeable by DAYS and KEYLEN
fd2893
  variables in the certificate Makefile (#1058108)
fd2893
- change default hash to sha256 (#1062325)
fd2893
- lower the actual 3des strength so it is sorted behind aes128 (#1056616)
fd2893
fd2893
* Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 1:1.0.1e-30
fd2893
- Mass rebuild 2014-01-24
fd2893
fd2893
* Wed Jan 15 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-29
fd2893
- rebuild with -O3 on ppc64 architecture
fd2893
fd2893
* Tue Jan  7 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-28
fd2893
- fix CVE-2013-4353 - Invalid TLS handshake crash
fd2893
- fix CVE-2013-6450 - possible MiTM attack on DTLS1
fd2893
fd2893
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 1:1.0.1e-27
fd2893
- Mass rebuild 2013-12-27
fd2893
fd2893
* Fri Dec 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-26
fd2893
- fix CVE-2013-6449 - crash when version in SSL structure is incorrect
fd2893
- drop weak ciphers from the default TLS ciphersuite list
fd2893
- add back some symbols that were dropped with update to 1.0.1 branch
fd2893
- more FIPS validation requirement changes
fd2893
fd2893
* Tue Nov 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-25
fd2893
- fix locking and reseeding problems with FIPS drbg
fd2893
fd2893
* Fri Nov 15 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-24
fd2893
- additional changes required for FIPS validation
fd2893
- disable verification of certificate, CRL, and OCSP signatures
fd2893
  using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable
fd2893
  is not set
fd2893
fd2893
* Fri Nov  8 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-23
fd2893
- add back support for secp521r1 EC curve
fd2893
- add aarch64 to Configure (#969692)
fd2893
fd2893
* Thu Oct 24 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-22
fd2893
- do not advertise ECC curves we do not support (#1022493)
fd2893
fd2893
* Fri Oct  4 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-21
fd2893
- make DTLS1 work in FIPS mode
fd2893
- avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode
fd2893
- drop the -fips subpackage, installation of dracut-fips marks that the FIPS
fd2893
  module is installed
fd2893
- avoid dlopening libssl.so from libcrypto
fd2893
- fix small memory leak in FIPS aes selftest
fd2893
- fix segfault in openssl speed hmac in the FIPS mode
fd2893
fd2893
* Thu Sep 12 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-20
fd2893
- document the nextprotoneg option in manual pages
fd2893
  original patch by Hubert Kario
fd2893
- try to avoid some races when updating the -fips subpackage
fd2893
fd2893
* Mon Sep  2 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-19
fd2893
- use version-release in .hmac suffix to avoid overwrite
fd2893
  during upgrade
fd2893
fd2893
* Thu Aug 29 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-18
fd2893
- always perform the FIPS selftests in library constructor
fd2893
  if FIPS module is installed
fd2893
fd2893
* Tue Aug 27 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-16
fd2893
- add -fips subpackage that contains the FIPS module files
fd2893
fd2893
* Fri Aug 16 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-15
fd2893
- fix use of rdrand if available
fd2893
- more commits cherry picked from upstream
fd2893
- documentation fixes
fd2893
fd2893
* Fri Jul 26 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-14
fd2893
- additional manual page fix
fd2893
- use symbol versioning also for the textual version
fd2893
fd2893
* Thu Jul 25 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-13
fd2893
- additional manual page fixes
fd2893
- cleanup speed command output for ECDH ECDSA
fd2893
fd2893
* Fri Jul 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-12
fd2893
- use _prefix macro
fd2893
fd2893
* Thu Jul 11 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-11
fd2893
- add openssl.cnf.5 manpage symlink to config.5
fd2893
fd2893
* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-10
fd2893
- add relro linking flag
fd2893
fd2893
* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-9
fd2893
- add support for the -trusted_first option for certificate chain verification
fd2893
fd2893
* Fri May 10 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-8
fd2893
- disable GOST engine
fd2893
fd2893
* Thu May  9 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-7
fd2893
- add symbol version for ECC functions
fd2893
fd2893
* Fri May  3 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-6
fd2893
- update the FIPS selftests to use 256 bit curves
fd2893
fd2893
* Tue Apr 30 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-5
fd2893
- enabled NIST Suite B ECC curves and algorithms
fd2893
fd2893
* Mon Mar 18 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-4
fd2893
- fix random bad record mac errors (#918981)
fd2893
fd2893
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-3
fd2893
- fix up the SHLIB_VERSION_NUMBER
fd2893
fd2893
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-2
fd2893
- disable ZLIB loading by default (due to CRIME attack)
fd2893
fd2893
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-1
fd2893
- new upstream version
fd2893
fd2893
* Wed Jan 30 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1c-12
fd2893
- more fixes from upstream
fd2893
- fix errors in manual causing build failure (#904777)
fd2893
fd2893
* Fri Dec 21 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-11
fd2893
- add script for renewal of a self-signed cert by Philip Prindeville (#871566)
fd2893
- allow X509_issuer_and_serial_hash() produce correct result in
fd2893
  the FIPS mode (#881336)
fd2893
fd2893
* Thu Dec  6 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-10
fd2893
- do not load default verify paths if CApath or CAfile specified (#884305)
fd2893
fd2893
* Tue Nov 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-9
fd2893
- more fixes from upstream CVS
fd2893
- fix DSA key pairwise check (#878597)
fd2893
fd2893
* Thu Nov 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-8
fd2893
- use 1024 bit DH parameters in s_server as 512 bit is not allowed
fd2893
  in FIPS mode and it is quite weak anyway
fd2893
fd2893
* Mon Sep 10 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-7
fd2893
- add missing initialization of str in aes_ccm_init_key (#853963)
fd2893
- add important patches from upstream CVS
fd2893
- use the secure_getenv() with new glibc
fd2893
fd2893
* Fri Jul 20 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.0.1c-6
fd2893
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
fd2893
fd2893
* Fri Jul 13 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-5
fd2893
- use __getenv_secure() instead of __libc_enable_secure
fd2893
fd2893
* Fri Jul 13 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-4
fd2893
- do not move libcrypto to /lib
fd2893
- do not use environment variables if __libc_enable_secure is on
fd2893
- fix strict aliasing problems in modes
fd2893
fd2893
* Thu Jul 12 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-3
fd2893
- fix DSA key generation in FIPS mode (#833866)
fd2893
- allow duplicate FIPS_mode_set(1)
fd2893
- enable build on ppc64 subarch (#834652)
fd2893
fd2893
* Wed Jul 11 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-2
fd2893
- fix s_server with new glibc when no global IPv6 address (#839031)
fd2893
- make it build with new Perl
fd2893
fd2893
* Tue May 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-1
fd2893
- new upstream version
fd2893
fd2893
* Thu Apr 26 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1b-1
fd2893
- new upstream version
fd2893
fd2893
* Fri Apr 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1a-1
fd2893
- new upstream version fixing CVE-2012-2110
fd2893
fd2893
* Wed Apr 11 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-3
fd2893
- add Kerberos 5 libraries to pkgconfig for static linking (#807050)
fd2893
fd2893
* Thu Apr  5 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-2
fd2893
- backports from upstream CVS
fd2893
- fix segfault when /dev/urandom is not available (#809586)
fd2893
fd2893
* Wed Mar 14 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-1
fd2893
- new upstream release
fd2893
fd2893
* Mon Mar  5 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.3.beta3
fd2893
- add obsoletes to assist multilib updates (#799636)
fd2893
fd2893
* Wed Feb 29 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.2.beta3
fd2893
- epoch bumped to 1 due to revert to 1.0.0g on Fedora 17
fd2893
- new upstream release from the 1.0.1 branch
fd2893
- fix s390x build (#798411)
fd2893
- versioning for the SSLeay symbol (#794950)
fd2893
- add -DPURIFY to build flags (#797323)
fd2893
- filter engine provides
fd2893
- split the libraries to a separate -libs package
fd2893
- add make to requires on the base package (#783446)
fd2893
fd2893
* Tue Feb  7 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.1.beta2
fd2893
- new upstream release from the 1.0.1 branch, ABI compatible
fd2893
- add documentation for the -no_ign_eof option
fd2893
fd2893
* Thu Jan 19 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0g-1
fd2893
- new upstream release fixing CVE-2012-0050 - DoS regression in
fd2893
  DTLS support introduced by the previous release (#782795)
fd2893
fd2893
* Thu Jan  5 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0f-1
fd2893
- new upstream release fixing multiple CVEs
fd2893
fd2893
* Tue Nov 22 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-4
fd2893
- move the libraries needed for static linking to Libs.private
fd2893
fd2893
* Thu Nov  3 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-3
fd2893
- do not use AVX instructions when osxsave bit not set
fd2893
- add direct known answer tests for SHA2 algorithms
fd2893
fd2893
* Wed Sep 21 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-2
fd2893
- fix missing initialization of variable in CHIL engine
fd2893
fd2893
* Wed Sep  7 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-1
fd2893
- new upstream release fixing CVE-2011-3207 (#736088)
fd2893
fd2893
* Wed Aug 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-8
fd2893
- drop the separate engine for Intel acceleration improvements
fd2893
  and merge in the AES-NI, SHA1, and RC4 optimizations
fd2893
- add support for OPENSSL_DISABLE_AES_NI environment variable
fd2893
  that disables the AES-NI support
fd2893
fd2893
* Tue Jul 26 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-7
fd2893
- correct openssl cms help output (#636266)
fd2893
- more tolerant starttls detection in XMPP protocol (#608239)
fd2893
fd2893
* Wed Jul 20 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-6
fd2893
- add support for newest Intel acceleration improvements backported
fd2893
  from upstream by Intel in form of a separate engine
fd2893
fd2893
* Thu Jun  9 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-5
fd2893
- allow the AES-NI engine in the FIPS mode
fd2893
fd2893
* Tue May 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-4
fd2893
- add API necessary for CAVS testing of the new DSA parameter generation
fd2893
fd2893
* Thu Apr 28 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-3
fd2893
- add support for VIA Padlock on 64bit arch from upstream (#617539)
fd2893
- do not return bogus values from load_certs (#652286)
fd2893
fd2893
* Tue Apr  5 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-2
fd2893
- clarify apps help texts for available digest algorithms (#693858)
fd2893
fd2893
* Thu Feb 10 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-1
fd2893
- new upstream release fixing CVE-2011-0014 (OCSP stapling vulnerability)
fd2893
fd2893
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.0.0c-4
fd2893
- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
fd2893
fd2893
* Fri Feb  4 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0c-3
fd2893
- add -x931 parameter to openssl genrsa command to use the ANSI X9.31
fd2893
  key generation method
fd2893
- use FIPS-186-3 method for DSA parameter generation
fd2893
- add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable
fd2893
  to allow using MD5 when the system is in the maintenance state
fd2893
  even if the /proc fips flag is on
fd2893
- make openssl pkcs12 command work by default in the FIPS mode
fd2893
fd2893
* Mon Jan 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0c-2
fd2893
- listen on ipv6 wildcard in s_server so we accept connections
fd2893
  from both ipv4 and ipv6 (#601612)
fd2893
- fix openssl speed command so it can be used in the FIPS mode
fd2893
  with FIPS allowed ciphers
fd2893
fd2893
* Fri Dec  3 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0c-1
fd2893
- new upstream version fixing CVE-2010-4180
fd2893
fd2893
* Tue Nov 23 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-3
fd2893
- replace the revert for the s390x bignum asm routines with
fd2893
  fix from upstream
fd2893
fd2893
* Mon Nov 22 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-2
fd2893
- revert upstream change in s390x bignum asm routines
fd2893
fd2893
* Tue Nov 16 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-1
fd2893
- new upstream version fixing CVE-2010-3864 (#649304)
fd2893
fd2893
* Tue Sep  7 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-3
fd2893
- make SHLIB_VERSION reflect the library suffix
fd2893
fd2893
* Wed Jun 30 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-2
fd2893
- openssl man page fix (#609484)
fd2893
fd2893
* Fri Jun  4 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-1
fd2893
- new upstream patch release, fixes CVE-2010-0742 (#598738)
fd2893
  and CVE-2010-1633 (#598732)
fd2893
fd2893
* Wed May 19 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-5
fd2893
- pkgconfig files now contain the correct libdir (#593723)
fd2893
fd2893
* Tue May 18 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-4
fd2893
- make CA dir readable - the private keys are in private subdir (#584810)
fd2893
fd2893
* Fri Apr  9 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-3
fd2893
- a few fixes from upstream CVS
fd2893
- move libcrypto to /lib (#559953)
fd2893
fd2893
* Tue Apr  6 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-2
fd2893
- set UTC timezone on pod2man run (#578842)
fd2893
- make X509_NAME_hash_old work in FIPS mode
fd2893
fd2893
* Tue Mar 30 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-1
fd2893
- update to final 1.0.0 upstream release
fd2893
fd2893
* Tue Feb 16 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.22.beta5
fd2893
- make TLS work in the FIPS mode
fd2893
fd2893
* Fri Feb 12 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.21.beta5
fd2893
- gracefully handle zero length in assembler implementations of
fd2893
  OPENSSL_cleanse (#564029)
fd2893
- do not fail in s_server if client hostname not resolvable (#561260)
fd2893
fd2893
* Wed Jan 20 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.20.beta5
fd2893
- new upstream release
fd2893
fd2893
* Thu Jan 14 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.19.beta4
fd2893
- fix CVE-2009-4355 - leak in applications incorrectly calling
fd2893
  CRYPTO_free_all_ex_data() before application exit (#546707)
fd2893
- upstream fix for future TLS protocol version handling
fd2893
fd2893
* Wed Jan 13 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.18.beta4
fd2893
- add support for Intel AES-NI
fd2893
fd2893
* Thu Jan  7 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.17.beta4
fd2893
- upstream fix compression handling on session resumption
fd2893
- various null checks and other small fixes from upstream
fd2893
- upstream changes for the renegotiation info according to the latest draft
fd2893
fd2893
* Mon Nov 23 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.16.beta4
fd2893
- fix non-fips mingw build (patch by Kalev Lember)
fd2893
- add IPV6 fix for DTLS
fd2893
fd2893
* Fri Nov 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.15.beta4
fd2893
- add better error reporting for the unsafe renegotiation
fd2893
fd2893
* Fri Nov 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.14.beta4
fd2893
- fix build on s390x
fd2893
fd2893
* Wed Nov 18 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.13.beta4
fd2893
- disable enforcement of the renegotiation extension on the client (#537962)
fd2893
- add fixes from the current upstream snapshot
fd2893
fd2893
* Fri Nov 13 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.12.beta4
fd2893
- keep the beta status in version number at 3 so we do not have to rebuild
fd2893
  openssh and possibly other dependencies with too strict version check
fd2893
fd2893
* Thu Nov 12 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.11.beta4
fd2893
- update to new upstream version, no soname bump needed
fd2893
- fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used
fd2893
  so the compatibility with unfixed clients is not broken. The
fd2893
  protocol extension is also not final.
fd2893
fd2893
* Fri Oct 16 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.10.beta3
fd2893
- fix use of freed memory if SSL_CTX_free() is called before
fd2893
  SSL_free() (#521342)
fd2893
fd2893
* Thu Oct  8 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.9.beta3
fd2893
- fix typo in DTLS1 code (#527015)
fd2893
- fix leak in error handling of d2i_SSL_SESSION()
fd2893
fd2893
* Wed Sep 30 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.8.beta3
fd2893
- fix RSA and DSA FIPS selftests
fd2893
- reenable fixed x86_64 camellia assembler code (#521127)
fd2893
fd2893
* Fri Sep  4 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.7.beta3
fd2893
- temporarily disable x86_64 camellia assembler code (#521127)
fd2893
fd2893
* Mon Aug 31 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.6.beta3
fd2893
- fix openssl dgst -dss1 (#520152)
fd2893
fd2893
* Wed Aug 26 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.5.beta3
fd2893
- drop the compat symlink hacks
fd2893
fd2893
* Sat Aug 22 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.4.beta3
fd2893
- constify SSL_CIPHER_description()
fd2893
fd2893
* Fri Aug 21 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.3.beta3
fd2893
- fix WWW:Curl:Easy reference in tsget
fd2893
fd2893
* Fri Aug 21 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.2.beta3
fd2893
- enable MD-2
fd2893
fd2893
* Thu Aug 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.1.beta3
fd2893
- update to new major upstream release
fd2893
fd2893
* Sat Jul 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.9.8k-7
fd2893
- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
fd2893
fd2893
* Wed Jul 22 2009 Bill Nottingham <notting@redhat.com>
fd2893
- do not build special 'optimized' versions for i686, as that's the base
fd2893
  arch in Fedora now
fd2893
fd2893
* Tue Jun 30 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-6
fd2893
- abort if selftests failed and random number generator is polled
fd2893
- mention EVP_aes and EVP_sha2xx routines in the manpages
fd2893
- add README.FIPS
fd2893
- make CA dir absolute path (#445344)
fd2893
- change default length for RSA key generation to 2048 (#484101)
fd2893
fd2893
* Thu May 21 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-5
fd2893
- fix CVE-2009-1377 CVE-2009-1378 CVE-2009-1379
fd2893
  (DTLS DoS problems) (#501253, #501254, #501572)
fd2893
fd2893
* Tue Apr 21 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-4
fd2893
- support compatibility DTLS mode for CISCO AnyConnect (#464629)
fd2893
fd2893
* Fri Apr 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-3
fd2893
- correct the SHLIB_VERSION define
fd2893
fd2893
* Wed Apr 15 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-2
fd2893
- add support for multiple CRLs with same subject
fd2893
- load only dynamic engine support in FIPS mode
fd2893
fd2893
* Wed Mar 25 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-1
fd2893
- update to new upstream release (minor bug fixes, security
fd2893
  fixes and machine code optimizations only)
fd2893
fd2893
* Thu Mar 19 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-10
fd2893
- move libraries to /usr/lib (#239375)
fd2893
fd2893
* Fri Mar 13 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-9
fd2893
- add a static subpackage
fd2893
fd2893
* Thu Feb 26 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.9.8j-8
fd2893
- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
fd2893
fd2893
* Mon Feb  2 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-7
fd2893
- must also verify checksum of libssl.so in the FIPS mode
fd2893
- obtain the seed for FIPS rng directly from the kernel device
fd2893
- drop the temporary symlinks
fd2893
fd2893
* Mon Jan 26 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-6
fd2893
- drop the temporary triggerpostun and symlinking in post
fd2893
- fix the pkgconfig files and drop the unnecessary buildrequires
fd2893
  on pkgconfig as it is a rpmbuild dependency (#481419)
fd2893
fd2893
* Sat Jan 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-5
fd2893
- add temporary triggerpostun to reinstate the symlinks
fd2893
fd2893
* Sat Jan 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-4
fd2893
- no pairwise key tests in non-fips mode (#479817)
fd2893
fd2893
* Fri Jan 16 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-3
fd2893
- even more robust test for the temporary symlinks
fd2893
fd2893
* Fri Jan 16 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-2
fd2893
- try to ensure the temporary symlinks exist
fd2893
fd2893
* Thu Jan 15 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-1
fd2893
- new upstream version with necessary soname bump (#455753)
fd2893
- temporarily provide symlink to old soname to make it possible to rebuild
fd2893
  the dependent packages in rawhide
fd2893
- add eap-fast support (#428181)
fd2893
- add possibility to disable zlib by setting
fd2893
- add fips mode support for testing purposes
fd2893
- do not null dereference on some invalid smime files
fd2893
- add buildrequires pkgconfig (#479493)
fd2893
fd2893
* Sun Aug 10 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-11
fd2893
- do not add tls extensions to server hello for SSLv3 either
fd2893
fd2893
* Mon Jun  2 2008 Joe Orton <jorton@redhat.com> 0.9.8g-10
fd2893
- move root CA bundle to ca-certificates package
fd2893
fd2893
* Wed May 28 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-9
fd2893
- fix CVE-2008-0891 - server name extension crash (#448492)
fd2893
- fix CVE-2008-1672 - server key exchange message omit crash (#448495)
fd2893
fd2893
* Tue May 27 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-8
fd2893
- super-H arch support
fd2893
- drop workaround for bug 199604 as it should be fixed in gcc-4.3
fd2893
fd2893
* Mon May 19 2008 Tom "spot" Callaway <tcallawa@redhat.com> 0.9.8g-7
fd2893
- sparc handling
fd2893
fd2893
* Mon Mar 10 2008 Joe Orton <jorton@redhat.com> 0.9.8g-6
fd2893
- update to new root CA bundle from mozilla.org (r1.45)
fd2893
fd2893
* Wed Feb 20 2008 Fedora Release Engineering <rel-eng@fedoraproject.org> - 0.9.8g-5
fd2893
- Autorebuild for GCC 4.3
fd2893
fd2893
* Thu Jan 24 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-4
fd2893
- merge review fixes (#226220)
fd2893
- adjust the SHLIB_VERSION_NUMBER to reflect library name (#429846)
fd2893
fd2893
* Thu Dec 13 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-3
fd2893
- set default paths when no explicit paths are set (#418771)
fd2893
- do not add tls extensions to client hello for SSLv3 (#422081)
fd2893
fd2893
* Tue Dec  4 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-2
fd2893
- enable some new crypto algorithms and features
fd2893
- add some more important bug fixes from openssl CVS
fd2893
fd2893
* Mon Dec  3 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-1
fd2893
- update to latest upstream release, SONAME bumped to 7
fd2893
fd2893
* Mon Oct 15 2007 Joe Orton <jorton@redhat.com> 0.9.8b-17
fd2893
- update to new CA bundle from mozilla.org
fd2893
fd2893
* Fri Oct 12 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-16
fd2893
- fix CVE-2007-5135 - off-by-one in SSL_get_shared_ciphers (#309801)
fd2893
- fix CVE-2007-4995 - out of order DTLS fragments buffer overflow (#321191)
fd2893
- add alpha sub-archs (#296031)
fd2893
fd2893
* Tue Aug 21 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-15
fd2893
- rebuild
fd2893
fd2893
* Fri Aug  3 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-14
fd2893
- use localhost in testsuite, hopefully fixes slow build in koji
fd2893
- CVE-2007-3108 - fix side channel attack on private keys (#250577)
fd2893
- make ssl session cache id matching strict (#233599)
fd2893
fd2893
* Wed Jul 25 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-13
fd2893
- allow building on ARM architectures (#245417)
fd2893
- use reference timestamps to prevent multilib conflicts (#218064)
fd2893
- -devel package must require pkgconfig (#241031)
fd2893
fd2893
* Mon Dec 11 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-12
fd2893
- detect duplicates in add_dir properly (#206346)
fd2893
fd2893
* Thu Nov 30 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-11
fd2893
- the previous change still didn't make X509_NAME_cmp transitive
fd2893
fd2893
* Thu Nov 23 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-10
fd2893
- make X509_NAME_cmp transitive otherwise certificate lookup
fd2893
  is broken (#216050)
fd2893
fd2893
* Thu Nov  2 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-9
fd2893
- aliasing bug in engine loading, patch by IBM (#213216)
fd2893
fd2893
* Mon Oct  2 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-8
fd2893
- CVE-2006-2940 fix was incorrect (#208744)
fd2893
fd2893
* Mon Sep 25 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-7
fd2893
- fix CVE-2006-2937 - mishandled error on ASN.1 parsing (#207276)
fd2893
- fix CVE-2006-2940 - parasitic public keys DoS (#207274)
fd2893
- fix CVE-2006-3738 - buffer overflow in SSL_get_shared_ciphers (#206940)
fd2893
- fix CVE-2006-4343 - sslv2 client DoS (#206940)
fd2893
fd2893
* Tue Sep  5 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-6
fd2893
- fix CVE-2006-4339 - prevent attack on PKCS#1 v1.5 signatures (#205180)
fd2893
fd2893
* Wed Aug  2 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-5
fd2893
- set buffering to none on stdio/stdout FILE when bufsize is set (#200580)
fd2893
  patch by IBM
fd2893
fd2893
* Fri Jul 28 2006 Alexandre Oliva <aoliva@redhat.com> - 0.9.8b-4.1
fd2893
- rebuild with new binutils (#200330)
fd2893
fd2893
* Fri Jul 21 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-4
fd2893
- add a temporary workaround for sha512 test failure on s390 (#199604)
fd2893
fd2893
* Thu Jul 20 2006 Tomas Mraz <tmraz@redhat.com>
fd2893
- add ipv6 support to s_client and s_server (by Jan Pazdziora) (#198737)
fd2893
- add patches for BN threadsafety, AES cache collision attack hazard fix and
fd2893
  pkcs7 code memleak fix from upstream CVS
fd2893
fd2893
* Wed Jul 12 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8b-3.1
fd2893
- rebuild
fd2893
fd2893
* Wed Jun 21 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-3
fd2893
- dropped libica and ica engine from build
fd2893
fd2893
* Wed Jun 21 2006 Joe Orton <jorton@redhat.com>
fd2893
- update to new CA bundle from mozilla.org; adds CA certificates
fd2893
  from netlock.hu and startcom.org
fd2893
fd2893
* Mon Jun  5 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-2
fd2893
- fixed a few rpmlint warnings
fd2893
- better fix for #173399 from upstream
fd2893
- upstream fix for pkcs12
fd2893
fd2893
* Thu May 11 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-1
fd2893
- upgrade to new version, stays ABI compatible
fd2893
- there is no more linux/config.h (it was empty anyway)
fd2893
fd2893
* Tue Apr  4 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8a-6
fd2893
- fix stale open handles in libica (#177155)
fd2893
- fix build if 'rand' or 'passwd' in buildroot path (#178782)
fd2893
- initialize VIA Padlock engine (#186857)
fd2893
fd2893
* Fri Feb 10 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8a-5.2
fd2893
- bump again for double-long bug on ppc(64)
fd2893
fd2893
* Tue Feb 07 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8a-5.1
fd2893
- rebuilt for new gcc4.1 snapshot and glibc changes
fd2893
fd2893
* Thu Dec 15 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-5
fd2893
- don't include SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
fd2893
  in SSL_OP_ALL (#175779)
fd2893
fd2893
* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
fd2893
- rebuilt
fd2893
fd2893
* Tue Nov 29 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-4
fd2893
- fix build (-lcrypto was erroneusly dropped) of the updated libica
fd2893
- updated ICA engine to 1.3.6-rc3
fd2893
fd2893
* Tue Nov 22 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-3
fd2893
- disable builtin compression methods for now until they work
fd2893
  properly (#173399)
fd2893
fd2893
* Wed Nov 16 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-2
fd2893
- don't set -rpath for openssl binary
fd2893
fd2893
* Tue Nov  8 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-1
fd2893
- new upstream version
fd2893
- patches partially renumbered
fd2893
fd2893
* Fri Oct 21 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-11
fd2893
- updated IBM ICA engine library and patch to latest upstream version
fd2893
fd2893
* Wed Oct 12 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-10
fd2893
- fix CAN-2005-2969 - remove SSL_OP_MSIE_SSLV2_RSA_PADDING which
fd2893
  disables the countermeasure against man in the middle attack in SSLv2
fd2893
  (#169863)
fd2893
- use sha1 as default for CA and cert requests - CAN-2005-2946 (#169803)
fd2893
fd2893
* Tue Aug 23 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-9
fd2893
- add *.so.soversion as symlinks in /lib (#165264)
fd2893
- remove unpackaged symlinks (#159595)
fd2893
- fixes from upstream (constant time fixes for DSA,
fd2893
  bn assembler div on ppc arch, initialize memory on realloc)
fd2893
fd2893
* Thu Aug 11 2005 Phil Knirsch <pknirsch@redhat.com> 0.9.7f-8
fd2893
- Updated ICA engine IBM patch to latest upstream version.
fd2893
fd2893
* Thu May 19 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-7
fd2893
- fix CAN-2005-0109 - use constant time/memory access mod_exp
fd2893
  so bits of private key aren't leaked by cache eviction (#157631)
fd2893
- a few more fixes from upstream 0.9.7g
fd2893
fd2893
* Wed Apr 27 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-6
fd2893
- use poll instead of select in rand (#128285)
fd2893
- fix Makefile.certificate to point to /etc/pki/tls
fd2893
- change the default string mask in ASN1 to PrintableString+UTF8String
fd2893
fd2893
* Mon Apr 25 2005 Joe Orton <jorton@redhat.com> 0.9.7f-5
fd2893
- update to revision 1.37 of Mozilla CA bundle
fd2893
fd2893
* Thu Apr 21 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-4
fd2893
- move certificates to _sysconfdir/pki/tls (#143392)
fd2893
- move CA directories to _sysconfdir/pki/CA
fd2893
- patch the CA script and the default config so it points to the
fd2893
  CA directories
fd2893
fd2893
* Fri Apr  1 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-3
fd2893
- uninitialized variable mustn't be used as input in inline
fd2893
  assembly
fd2893
- reenable the x86_64 assembly again
fd2893
fd2893
* Thu Mar 31 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-2
fd2893
- add back RC4_CHAR on ia64 and x86_64 so the ABI isn't broken
fd2893
- disable broken bignum assembly on x86_64
fd2893
fd2893
* Wed Mar 30 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-1
fd2893
- reenable optimizations on ppc64 and assembly code on ia64
fd2893
- upgrade to new upstream version (no soname bump needed)
fd2893
- disable thread test - it was testing the backport of the
fd2893
  RSA blinding - no longer needed
fd2893
- added support for changing serial number to
fd2893
  Makefile.certificate (#151188)
fd2893
- make ca-bundle.crt a config file (#118903)
fd2893
fd2893
* Tue Mar  1 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-3
fd2893
- libcrypto shouldn't depend on libkrb5 (#135961)
fd2893
fd2893
* Mon Feb 28 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-2
fd2893
- rebuild
fd2893
fd2893
* Mon Feb 28 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-1
fd2893
- new upstream source, updated patches
fd2893
- added patch so we are hopefully ABI compatible with upcoming
fd2893
  0.9.7f
fd2893
fd2893
* Thu Feb 10 2005 Tomas Mraz <tmraz@redhat.com>
fd2893
- Support UTF-8 charset in the Makefile.certificate (#134944)
fd2893
- Added cmp to BuildPrereq
fd2893
fd2893
* Thu Jan 27 2005 Joe Orton <jorton@redhat.com> 0.9.7a-46
fd2893
- generate new ca-bundle.crt from Mozilla certdata.txt (revision 1.32)
fd2893
fd2893
* Thu Dec 23 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-45
fd2893
- Fixed and updated libica-1.3.4-urandom.patch patch (#122967)
fd2893
fd2893
* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-44
fd2893
- rebuild
fd2893
fd2893
* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-43
fd2893
- rebuild
fd2893
fd2893
* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-42
fd2893
- rebuild
fd2893
fd2893
* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-41
fd2893
- remove der_chop, as upstream cvs has done (CAN-2004-0975, #140040)
fd2893
fd2893
* Tue Oct 05 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-40
fd2893
- Include latest libica version with important bugfixes
fd2893
fd2893
* Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com>
fd2893
- rebuilt
fd2893
fd2893
* Mon Jun 14 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-38
fd2893
- Updated ICA engine IBM patch to latest upstream version.
fd2893
fd2893
* Mon Jun  7 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-37
fd2893
- build for linux-alpha-gcc instead of alpha-gcc on alpha (Jeff Garzik)
fd2893
fd2893
* Tue May 25 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-36
fd2893
- handle %%{_arch}=i486/i586/i686/athlon cases in the intermediate
fd2893
  header (#124303)
fd2893
fd2893
* Thu Mar 25 2004 Joe Orton <jorton@redhat.com> 0.9.7a-35
fd2893
- add security fixes for CAN-2004-0079, CAN-2004-0112
fd2893
fd2893
* Tue Mar 16 2004 Phil Knirsch <pknirsch@redhat.com>
fd2893
- Fixed libica filespec.
fd2893
fd2893
* Thu Mar 11 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-34
fd2893
- ppc/ppc64 define __powerpc__/__powerpc64__, not __ppc__/__ppc64__, fix
fd2893
  the intermediate header
fd2893
fd2893
* Wed Mar 10 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-33
fd2893
- add an intermediate <openssl/opensslconf.h> which points to the right
fd2893
  arch-specific opensslconf.h on multilib arches
fd2893
fd2893
* Tue Mar 02 2004 Elliot Lee <sopwith@redhat.com>
fd2893
- rebuilt
fd2893
fd2893
* Thu Feb 26 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-32
fd2893
- Updated libica to latest upstream version 1.3.5.
fd2893
fd2893
* Tue Feb 17 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-31
fd2893
- Update ICA crypto engine patch from IBM to latest version.
fd2893
fd2893
* Fri Feb 13 2004 Elliot Lee <sopwith@redhat.com>
fd2893
- rebuilt
fd2893
fd2893
* Fri Feb 13 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-29
fd2893
- rebuilt
fd2893
fd2893
* Wed Feb 11 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-28
fd2893
- Fixed libica build.
fd2893
fd2893
* Wed Feb  4 2004 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add "-ldl" to link flags added for Linux-on-ARM (#99313)
fd2893
fd2893
* Wed Feb  4 2004 Joe Orton <jorton@redhat.com> 0.9.7a-27
fd2893
- updated ca-bundle.crt: removed expired GeoTrust roots, added
fd2893
  freessl.com root, removed trustcenter.de Class 0 root
fd2893
fd2893
* Sun Nov 30 2003 Tim Waugh <twaugh@redhat.com> 0.9.7a-26
fd2893
- Fix link line for libssl (bug #111154).
fd2893
fd2893
* Fri Oct 24 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-25
fd2893
- add dependency on zlib-devel for the -devel package, which depends on zlib
fd2893
  symbols because we enable zlib for libssl (#102962)
fd2893
fd2893
* Fri Oct 24 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-24
fd2893
- Use /dev/urandom instead of PRNG for libica.
fd2893
- Apply libica-1.3.5 fix for /dev/urandom in icalinux.c
fd2893
- Use latest ICA engine patch from IBM.
fd2893
fd2893
* Sat Oct  4 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22.1
fd2893
- rebuild
fd2893
fd2893
* Wed Oct  1 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22
fd2893
- rebuild (22 wasn't actually built, fun eh?)
fd2893
fd2893
* Tue Sep 30 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-23
fd2893
- re-disable optimizations on ppc64
fd2893
fd2893
* Tue Sep 30 2003 Joe Orton <jorton@redhat.com>
fd2893
- add a_mbstr.c fix for 64-bit platforms from CVS
fd2893
fd2893
* Tue Sep 30 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22
fd2893
- add -Wa,--noexecstack to RPM_OPT_FLAGS so that assembled modules get tagged
fd2893
  as not needing executable stacks
fd2893
fd2893
* Mon Sep 29 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-21
fd2893
- rebuild
fd2893
fd2893
* Thu Sep 25 2003 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- re-enable optimizations on ppc64
fd2893
fd2893
* Thu Sep 25 2003 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- remove exclusivearch
fd2893
fd2893
* Wed Sep 24 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-20
fd2893
- only parse a client cert if one was requested
fd2893
- temporarily exclusivearch for %%{ix86}
fd2893
fd2893
* Tue Sep 23 2003 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add security fixes for protocol parsing bugs (CAN-2003-0543, CAN-2003-0544)
fd2893
  and heap corruption (CAN-2003-0545)
fd2893
- update RHNS-CA-CERT files
fd2893
- ease back on the number of threads used in the threading test
fd2893
fd2893
* Wed Sep 17 2003 Matt Wilson <msw@redhat.com> 0.9.7a-19
fd2893
- rebuild to fix gzipped file md5sums (#91211)
fd2893
fd2893
* Mon Aug 25 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-18
fd2893
- Updated libica to version 1.3.4.
fd2893
fd2893
* Thu Jul 17 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-17
fd2893
- rebuild
fd2893
fd2893
* Tue Jul 15 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-10.9
fd2893
- free the kssl_ctx structure when we free an SSL structure (#99066)
fd2893
fd2893
* Fri Jul 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-16
fd2893
- rebuild
fd2893
fd2893
* Thu Jul 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-15
fd2893
- lower thread test count on s390x
fd2893
fd2893
* Tue Jul  8 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-14
fd2893
- rebuild
fd2893
fd2893
* Thu Jun 26 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-13
fd2893
- disable assembly on arches where it seems to conflict with threading
fd2893
fd2893
* Thu Jun 26 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-12
fd2893
- Updated libica to latest upstream version 1.3.0
fd2893
fd2893
* Wed Jun 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-9.9
fd2893
- rebuild
fd2893
fd2893
* Wed Jun 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-11
fd2893
- rebuild
fd2893
fd2893
* Tue Jun 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-10
fd2893
- ubsec: don't stomp on output data which might also be input data
fd2893
fd2893
* Tue Jun 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-9
fd2893
- temporarily disable optimizations on ppc64
fd2893
fd2893
* Mon Jun  9 2003 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- backport fix for engine-used-for-everything from 0.9.7b
fd2893
- backport fix for prng not being seeded causing problems, also from 0.9.7b
fd2893
- add a check at build-time to ensure that RSA is thread-safe
fd2893
- keep perlpath from stomping on the libica configure scripts
fd2893
fd2893
* Fri Jun  6 2003 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- thread-safety fix for RSA blinding
fd2893
fd2893
* Wed Jun 04 2003 Elliot Lee <sopwith@redhat.com> 0.9.7a-8
fd2893
- rebuilt
fd2893
fd2893
* Fri May 30 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-7
fd2893
- Added libica-1.2 to openssl (featurerequest).
fd2893
fd2893
* Wed Apr 16 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-6
fd2893
- fix building with incorrect flags on ppc64
fd2893
fd2893
* Wed Mar 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-5
fd2893
- add patch to harden against Klima-Pokorny-Rosa extension of Bleichenbacher's
fd2893
  attack (CAN-2003-0131)
fd2893
fd2893
* Mon Mar 17 2003 Nalin Dahyabhai <nalin@redhat.com>  0.9.7a-4
fd2893
- add patch to enable RSA blinding by default, closing a timing attack
fd2893
  (CAN-2003-0147)
fd2893
fd2893
* Wed Mar  5 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-3
fd2893
- disable use of BN assembly module on x86_64, but continue to allow inline
fd2893
  assembly (#83403)
fd2893
fd2893
* Thu Feb 27 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-2
fd2893
- disable EC algorithms
fd2893
fd2893
* Wed Feb 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-1
fd2893
- update to 0.9.7a
fd2893
fd2893
* Wed Feb 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-8
fd2893
- add fix to guard against attempts to allocate negative amounts of memory
fd2893
- add patch for CAN-2003-0078, fixing a timing attack
fd2893
fd2893
* Thu Feb 13 2003 Elliot Lee <sopwith@redhat.com> 0.9.7-7
fd2893
- Add openssl-ppc64.patch
fd2893
fd2893
* Mon Feb 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-6
fd2893
- EVP_DecryptInit should call EVP_CipherInit() instead of EVP_CipherInit_ex(),
fd2893
  to get the right behavior when passed uninitialized context structures
fd2893
  (#83766)
fd2893
- build with -mcpu=ev5 on alpha family (#83828)
fd2893
fd2893
* Wed Jan 22 2003 Tim Powers <timp@redhat.com>
fd2893
- rebuilt
fd2893
fd2893
* Fri Jan 17 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7-4
fd2893
- Added IBM hw crypto support patch.
fd2893
fd2893
* Wed Jan 15 2003 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add missing builddep on sed
fd2893
fd2893
* Thu Jan  9 2003 Bill Nottingham <notting@redhat.com> 0.9.7-3
fd2893
- debloat
fd2893
- fix broken manpage symlinks
fd2893
fd2893
* Wed Jan  8 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-2
fd2893
- fix double-free in 'openssl ca'
fd2893
fd2893
* Fri Jan  3 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-1
fd2893
- update to 0.9.7 final
fd2893
fd2893
* Tue Dec 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-0
fd2893
- update to 0.9.7 beta6 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)
fd2893
fd2893
* Wed Dec 11 2002 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- update to 0.9.7 beta5 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)
fd2893
fd2893
* Tue Oct 22 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-30
fd2893
- add configuration stanza for x86_64 and use it on x86_64
fd2893
- build for linux-ppc on ppc
fd2893
- start running the self-tests again
fd2893
fd2893
* Wed Oct 02 2002 Elliot Lee <sopwith@redhat.com> 0.9.6b-29hammer.3
fd2893
- Merge fixes from previous hammer packages, including general x86-64 and
fd2893
  multilib
fd2893
fd2893
* Tue Aug  6 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-29
fd2893
- rebuild
fd2893
fd2893
* Thu Aug  1 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-28
fd2893
- update asn patch to fix accidental reversal of a logic check
fd2893
fd2893
* Wed Jul 31 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-27
fd2893
- update asn patch to reduce chance that compiler optimization will remove
fd2893
  one of the added tests
fd2893
fd2893
* Wed Jul 31 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-26
fd2893
- rebuild
fd2893
fd2893
* Mon Jul 29 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-25
fd2893
- add patch to fix ASN.1 vulnerabilities
fd2893
fd2893
* Thu Jul 25 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-24
fd2893
- add backport of Ben Laurie's patches for OpenSSL 0.9.6d
fd2893
fd2893
* Wed Jul 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-23
fd2893
- own {_datadir}/ssl/misc
fd2893
fd2893
* Fri Jun 21 2002 Tim Powers <timp@redhat.com>
fd2893
- automated rebuild
fd2893
fd2893
* Sun May 26 2002 Tim Powers <timp@redhat.com>
fd2893
- automated rebuild
fd2893
fd2893
* Fri May 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-20
fd2893
- free ride through the build system (whee!)
fd2893
fd2893
* Thu May 16 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-19
fd2893
- rebuild in new environment
fd2893
fd2893
* Thu Apr  4 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-17, 0.9.6b-18
fd2893
- merge RHL-specific bits into stronghold package, rename
fd2893
fd2893
* Tue Apr 02 2002 Gary Benson <gbenson@redhat.com> stronghold-0.9.6c-2
fd2893
- add support for Chrysalis Luna token
fd2893
fd2893
* Tue Mar 26 2002 Gary Benson <gbenson@redhat.com>
fd2893
- disable AEP random number generation, other AEP fixes
fd2893
fd2893
* Fri Mar 15 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-15
fd2893
- only build subpackages on primary arches
fd2893
fd2893
* Thu Mar 14 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-13
fd2893
- on ia32, only disable use of assembler on i386
fd2893
- enable assembly on ia64
fd2893
fd2893
* Mon Jan  7 2002 Florian La Roche <Florian.LaRoche@redhat.de> 0.9.6b-11
fd2893
- fix sparcv9 entry
fd2893
fd2893
* Mon Jan  7 2002 Gary Benson <gbenson@redhat.com> stronghold-0.9.6c-1
fd2893
- upgrade to 0.9.6c
fd2893
- bump BuildArch to i686 and enable assembler on all platforms
fd2893
- synchronise with shrimpy and rawhide
fd2893
- bump soversion to 3
fd2893
fd2893
* Wed Oct 10 2001 Florian La Roche <Florian.LaRoche@redhat.de>
fd2893
- delete BN_LLONG for s390x, patch from Oliver Paukstadt
fd2893
fd2893
* Mon Sep 17 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-9
fd2893
- update AEP driver patch
fd2893
fd2893
* Mon Sep 10 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- adjust RNG disabling patch to match version of patch from Broadcom
fd2893
fd2893
* Fri Sep  7 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-8
fd2893
- disable the RNG in the ubsec engine driver
fd2893
fd2893
* Tue Aug 28 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-7
fd2893
- tweaks to the ubsec engine driver
fd2893
fd2893
* Fri Aug 24 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-6
fd2893
- tweaks to the ubsec engine driver
fd2893
fd2893
* Thu Aug 23 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-5
fd2893
- update ubsec engine driver from Broadcom
fd2893
fd2893
* Fri Aug 10 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-4
fd2893
- move man pages back to %%{_mandir}/man?/foo.?ssl from
fd2893
  %%{_mandir}/man?ssl/foo.?
fd2893
- add an [ engine ] section to the default configuration file
fd2893
fd2893
* Thu Aug  9 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add a patch for selecting a default engine in SSL_library_init()
fd2893
fd2893
* Mon Jul 23 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-3
fd2893
- add patches for AEP hardware support
fd2893
- add patch to keep trying when we fail to load a cert from a file and
fd2893
  there are more in the file
fd2893
- add missing prototype for ENGINE_ubsec() in engine_int.h
fd2893
fd2893
* Wed Jul 18 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-2
fd2893
- actually add hw_ubsec to the engine list
fd2893
fd2893
* Tue Jul 17 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add in the hw_ubsec driver from CVS
fd2893
fd2893
* Wed Jul 11 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-1
fd2893
- update to 0.9.6b
fd2893
fd2893
* Thu Jul  5 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- move .so symlinks back to %%{_libdir}
fd2893
fd2893
* Tue Jul  3 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- move shared libraries to /lib (#38410)
fd2893
fd2893
* Mon Jun 25 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- switch to engine code base
fd2893
fd2893
* Mon Jun 18 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add a script for creating dummy certificates
fd2893
- move man pages from %%{_mandir}/man?/foo.?ssl to %%{_mandir}/man?ssl/foo.?
fd2893
fd2893
* Thu Jun 07 2001 Florian La Roche <Florian.LaRoche@redhat.de>
fd2893
- add s390x support
fd2893
fd2893
* Fri Jun  1 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- change two memcpy() calls to memmove()
fd2893
- don't define L_ENDIAN on alpha
fd2893
fd2893
* Wed May 23 2001 Joe Orton <jorton@redhat.com> stronghold-0.9.6a-1
fd2893
- Add 'stronghold-' prefix to package names.
fd2893
- Obsolete standard openssl packages.
fd2893
fd2893
* Wed May 16 2001 Joe Orton <jorton@redhat.com>
fd2893
- Add BuildArch: i586 as per Nalin's advice.
fd2893
fd2893
* Tue May 15 2001 Joe Orton <jorton@redhat.com>
fd2893
- Enable assembler on ix86 (using new .tar.bz2 which does
fd2893
  include the asm directories).
fd2893
fd2893
* Tue May 15 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- make subpackages depend on the main package
fd2893
fd2893
* Tue May  1 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- adjust the hobble script to not disturb symlinks in include/ (fix from
fd2893
  Joe Orton)
fd2893
fd2893
* Fri Apr 27 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- drop the m2crypo patch we weren't using
fd2893
fd2893
* Tue Apr 24 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- configure using "shared" as well
fd2893
fd2893
* Sun Apr  8 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- update to 0.9.6a
fd2893
- use the build-shared target to build shared libraries
fd2893
- bump the soversion to 2 because we're no longer compatible with
fd2893
  our 0.9.5a packages or our 0.9.6 packages
fd2893
- drop the patch for making rsatest a no-op when rsa null support is used
fd2893
- put all man pages into <section>ssl instead of <section>
fd2893
- break the m2crypto modules into a separate package
fd2893
fd2893
* Tue Mar 13 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- use BN_LLONG on s390
fd2893
fd2893
* Mon Mar 12 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit)
fd2893
fd2893
* Sat Mar  3 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- move c_rehash to the perl subpackage, because it's a perl script now
fd2893
fd2893
* Fri Mar  2 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- update to 0.9.6
fd2893
- enable MD2
fd2893
- use the libcrypto.so and libssl.so targets to build shared libs with
fd2893
- bump the soversion to 1 because we're no longer compatible with any of
fd2893
  the various 0.9.5a packages circulating around, which provide lib*.so.0
fd2893
fd2893
* Wed Feb 28 2001 Florian La Roche <Florian.LaRoche@redhat.de>
fd2893
- change hobble-openssl for disabling MD2 again
fd2893
fd2893
* Tue Feb 27 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152
fd2893
  bytes or so, causing EVP_DigestInit() to zero out stack variables in
fd2893
  apps built against a version of the library without it
fd2893
fd2893
* Mon Feb 26 2001 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- disable some inline assembly, which on x86 is Pentium-specific
fd2893
- re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all)
fd2893
fd2893
* Thu Feb 08 2001 Florian La Roche <Florian.LaRoche@redhat.de>
fd2893
- fix s390 patch
fd2893
fd2893
* Fri Dec 8 2000 Than Ngo <than@redhat.com>
fd2893
- added support s390
fd2893
fd2893
* Mon Nov 20 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- remove -Wa,* and -m* compiler flags from the default Configure file (#20656)
fd2893
- add the CA.pl man page to the perl subpackage
fd2893
fd2893
* Thu Nov  2 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- always build with -mcpu=ev5 on alpha
fd2893
fd2893
* Tue Oct 31 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add a symlink from cert.pem to ca-bundle.crt
fd2893
fd2893
* Wed Oct 25 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add a ca-bundle file for packages like Samba to reference for CA certificates
fd2893
fd2893
* Tue Oct 24 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- remove libcrypto's crypt(), which doesn't handle md5crypt (#19295)
fd2893
fd2893
* Mon Oct  2 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add unzip as a buildprereq (#17662)
fd2893
- update m2crypto to 0.05-snap4
fd2893
fd2893
* Tue Sep 26 2000 Bill Nottingham <notting@redhat.com>
fd2893
- fix some issues in building when it's not installed
fd2893
fd2893
* Wed Sep  6 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- make sure the headers we include are the ones we built with (aaaaarrgh!)
fd2893
fd2893
* Fri Sep  1 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- add Richard Henderson's patch for BN on ia64
fd2893
- clean up the changelog
fd2893
fd2893
* Tue Aug 29 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- fix the building of python modules without openssl-devel already installed
fd2893
fd2893
* Wed Aug 23 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- byte-compile python extensions without the build-root
fd2893
- adjust the makefile to not remove temporary files (like .key files when
fd2893
  building .csr files) by marking them as .PRECIOUS
fd2893
fd2893
* Sat Aug 19 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- break out python extensions into a subpackage
fd2893
fd2893
* Mon Jul 17 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- tweak the makefile some more
fd2893
fd2893
* Tue Jul 11 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- disable MD2 support
fd2893
fd2893
* Thu Jul  6 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- disable MDC2 support
fd2893
fd2893
* Sun Jul  2 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- tweak the disabling of RC5, IDEA support
fd2893
- tweak the makefile
fd2893
fd2893
* Thu Jun 29 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- strip binaries and libraries
fd2893
- rework certificate makefile to have the right parts for Apache
fd2893
fd2893
* Wed Jun 28 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- use %%{_perl} instead of /usr/bin/perl
fd2893
- disable alpha until it passes its own test suite
fd2893
fd2893
* Fri Jun  9 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- move the passwd.1 man page out of the passwd package's way
fd2893
fd2893
* Fri Jun  2 2000 Nalin Dahyabhai <nalin@redhat.com>
fd2893
- update to 0.9.5a, modified for U.S.
fd2893
- add perl as a build-time requirement
fd2893
- move certificate makefile to another package
fd2893
- disable RC5, IDEA, RSA support
fd2893
- remove optimizations for now
fd2893
fd2893
* Wed Mar  1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
fd2893
- Bero told me to move the Makefile into this package
fd2893
fd2893
* Wed Mar  1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
fd2893
- add lib*.so symlinks to link dynamically against shared libs
fd2893
fd2893
* Tue Feb 29 2000 Florian La Roche <Florian.LaRoche@redhat.de>
fd2893
- update to 0.9.5
fd2893
- run ldconfig directly in post/postun
fd2893
- add FAQ
fd2893
fd2893
* Sat Dec 18 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
fd2893
- Fix build on non-x86 platforms
fd2893
fd2893
* Fri Nov 12 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
fd2893
- move /usr/share/ssl/* from -devel to main package
fd2893
fd2893
* Tue Oct 26 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
fd2893
- inital packaging
fd2893
- changes from base:
fd2893
  - Move /usr/local/ssl to /usr/share/ssl for FHS compliance
fd2893
  - handle RPM_OPT_FLAGS