Fri, 22 Nov 2024 16:50:52 UTC | login

Information for build openssl-1.1.1k-1.0.riscv64.fc33

ID195688
Package Nameopenssl
Version1.1.1k
Release1.0.riscv64.fc33
Epoch1
Sourcegit+http://fedora.riscv.rocks:3000/rpms/openssl.git#278731bcc512ac48035c46c59c7d0858c43bf764
SummaryUtilities from the general purpose cryptography library with TLS implementation
DescriptionThe OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.
Built bydavidlt
State complete
Volume DEFAULT
StartedThu, 06 May 2021 06:56:38 UTC
CompletedThu, 06 May 2021 09:20:25 UTC
Taskbuild (f33, /rpms/openssl.git:278731bcc512ac48035c46c59c7d0858c43bf764)
Extra{'source': {'original_url': 'git+http://fedora.riscv.rocks:3000/rpms/openssl.git#278731bcc512ac48035c46c59c7d0858c43bf764'}}
Tags
f33
RPMs
src
openssl-1.1.1k-1.0.riscv64.fc33.src.rpm (info) (download)
riscv64
openssl-1.1.1k-1.0.riscv64.fc33.riscv64.rpm (info) (download)
openssl-devel-1.1.1k-1.0.riscv64.fc33.riscv64.rpm (info) (download)
openssl-libs-1.1.1k-1.0.riscv64.fc33.riscv64.rpm (info) (download)
openssl-perl-1.1.1k-1.0.riscv64.fc33.riscv64.rpm (info) (download)
openssl-static-1.1.1k-1.0.riscv64.fc33.riscv64.rpm (info) (download)
openssl-debuginfo-1.1.1k-1.0.riscv64.fc33.riscv64.rpm (info) (download)
openssl-debugsource-1.1.1k-1.0.riscv64.fc33.riscv64.rpm (info) (download)
openssl-libs-debuginfo-1.1.1k-1.0.riscv64.fc33.riscv64.rpm (info) (download)
Logs
riscv64
build.log
hw_info.log
mock_output.log
root.log
state.log
Changelog * Thu May 06 2021 David Abdurachmanov <david.abdurachmanov@gmail.com> - 1:1.1.1k-1.0.riscv64 - Add --libdir=lib64 for riscv64 (uses linux-generic64) * Fri Mar 26 2021 Sahana Prasad <sahana@redhat.com> - 1:1.1.1k-1 - Upgrade to version 1.1.1.k * Tue Feb 23 2021 Sahana Prasad <sahana@redhat.com> - 1:1.1.1j-1 - Upgrade to version 1.1.1.j * Wed Feb 10 2021 Sahana Prasad <sahana@redhat.com> - 1:1.1.1i-3 - Fix regression in X509_verify_cert() (bz1916594) * Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1i-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild * Wed Dec 09 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1i-1 - Update to the 1.1.1i release fixing CVE-2020-1971 * Mon Nov 09 2020 Sahana Prasad <sahana@redhat.com> - 1.1.1h-1 - Upgrade to version 1.1.1.h * Tue Jul 28 2020 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1g-15 - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Tue Jul 21 2020 Tom Stellard <tstellar@redhat.com> - 1:1.1.1g-14 - Use make macros - https://fedoraproject.org/wiki/Changes/UseMakeBuildInstallMacro * Mon Jul 20 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-13 - Additional FIPS mode check for EC key generation * Fri Jul 17 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-12 - Further changes for SP 800-56A rev3 requirements * Mon Jun 22 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-11 - Drop long ago obsolete part of the FIPS patch * Mon Jun 22 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-10 - Rewire FIPS_drbg API to use the RAND_DRBG * Fri Jun 05 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-9 - Disallow dropping Extended Master Secret extension on renegotiation - Return alert from s_server if ALPN protocol does not match - SHA1 is allowed in @SECLEVEL=2 only if allowed by TLS SigAlgs configuration * Wed Jun 03 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-8 - Add FIPS selftest for PBKDF2 and KBKDF * Tue May 26 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-7 - Use the well known DH groups in TLS * Mon May 25 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-6 - Allow only well known DH groups in the FIPS mode * Thu May 21 2020 Adam Williamson <awilliam@redhat.com> - 1.1.1g-5 - Re-apply the change from -2 now we have fixed nosync to work with it * Tue May 19 2020 Adam Williamson <awilliam@redhat.com> - 1.1.1g-4 - Revert the change from -2 as it seems to cause segfaults in systemd * Mon May 18 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-3 - pull some fixes and improvements from RHEL-8 * Fri May 15 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-2 - FIPS module installed state definition is modified * Thu Apr 23 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-1 - update to the 1.1.1g release * Tue Apr 07 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1f-1 - update to the 1.1.1f release * Thu Mar 26 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1e-2 - revert the unexpected EOF error reporting change as it is too disruptive for the stable release branch * Fri Mar 20 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1e-1 - update to the 1.1.1e release - add selftest of the RAND_DRBG implementation - fix incorrect error return value from FIPS_selftest_dsa * Mon Feb 17 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-7 - apply Intel CET support patches by hjl (#1788699) * Wed Jan 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1d-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild * Thu Nov 21 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-5 - allow zero length parameters in KDF_CTX_ctrl() * Thu Nov 14 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-4 - backport of SSKDF from master * Wed Nov 13 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-3 - backport of KBKDF and KRB5KDF from master * Thu Oct 03 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-2 - re-enable the stitched AES-CBC-SHA implementations - make AES-GCM work in FIPS mode again - enable TLS-1.2 AES-CCM ciphers in FIPS mode - fix openssl speed errors in FIPS mode * Fri Sep 13 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-1 - update to the 1.1.1d release * Fri Sep 06 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-6 - upstream fix for status request extension non-compliance (#1737471) * Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1c-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Mon Jun 24 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-4 - do not try to use EC groups disallowed in FIPS mode in TLS - fix Valgrind regression with constant-time code * Mon Jun 03 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-3 - add upstream patch to defer sending KeyUpdate after pending writes are complete * Thu May 30 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-2 - fix use of uninitialized memory * Wed May 29 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-1 - update to the 1.1.1c release * Fri May 10 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-10 - Another attempt at the AES-CCM regression fix * Fri May 10 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-9 - Fix two small regressions - Change the ts application default hash to SHA256 * Tue May 07 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-8 - FIPS compliance fixes