Commit Graph

530 Commits

Author SHA1 Message Date
Tomas Mraz 8f6be98bf7 reenable SSL2 in the build to avoid ABI break
(it does not make the openssl vulnerable to DROWN attack)
2016-03-02 09:33:35 +01:00
Tomas Mraz e7a0ff581f minor upstream release 1.0.2g fixing security issues 2016-03-01 17:22:06 +01:00
Fedora Release Engineering 843fdf0512 - Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild 2016-02-04 11:34:33 +00:00
Tomas Mraz 1004dabcc6 minor upstream release 1.0.2f fixing security issues
- add support for MIPS secondary architecture
2016-01-28 17:12:09 +01:00
Tomas Mraz 341f751fb7 Add missing buildrequires for SCTP 2016-01-15 14:43:57 +01:00
Tomas Mraz 0d8bb6ef41 document some options of openssl speed command 2016-01-15 14:19:55 +01:00
Tomas Mraz 41a5ee166a enable sctp support in DTLS 2015-12-18 13:52:00 +01:00
Tomas Mraz c79bed9e76 remove unimplemented EC method from header (#1289599) 2015-12-08 15:56:50 +01:00
Tomas Mraz 88482b2b4a the fast nistp implementation works only on little endian architectures 2015-12-07 15:02:57 +01:00
Tomas Mraz 6536aa4c73 Makefile.certificate should not set serial to 0 by default 2015-12-04 14:36:15 +01:00
Tomas Mraz 4240ecaa1b minor upstream release 1.0.2e fixing moderate severity security issues
- enable fast assembler implementation for NIST P-256 and P-521
  elliptic curves (#1164210)
- filter out unwanted link options from the .pc files (#1257836)
2015-12-04 14:13:59 +01:00
Tomas Mraz a83e4d7c4a fix sigill on some AMD CPUs (#1278194) 2015-11-16 17:47:54 +01:00
Tom Callaway 314b2359b8 BR: /usr/bin/pod2man 2015-08-12 17:16:04 -04:00
Tom Callaway 1417ec988d enable secp256k1 (bz1021898) 2015-08-12 17:07:46 -04:00
Tomas Mraz 5675d07a14 minor upstream release 1.0.2d fixing a high severity security issue 2015-07-09 17:25:58 +02:00
Tomas Mraz 7f0b164051 fix the aarch64 build 2015-07-07 09:47:17 +02:00
Dennis Gilmore 49a07018fb - Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild 2015-06-18 00:06:33 +00:00
Tomas Mraz 837dd04882 minor upstream release 1.0.2c fixing multiple security issues 2015-06-15 18:23:46 +02:00
Peter Robinson 18455c91c0 Add aarch64 sslarch details 2015-05-07 16:04:05 +01:00
Tomas Mraz e4bf425a79 fix some 64 bit build targets 2015-05-07 12:01:04 +02:00
Tomas Mraz d743a79756 add alternative certificate chain discovery support from upstream 2015-04-28 17:10:52 +02:00
Tomas Mraz a1fb602a95 rebase to 1.0.2 branch 2015-04-23 13:57:26 +02:00
Tomas Mraz 805c06e347 drop the AES-GCM restriction of 2^32 operations
The IV is always 96 bits (32 bit fixed field + 64 bit invocation field).
2015-04-09 13:10:25 +02:00
Tomas Mraz 729d2d0e11 Multiple security issues fixed.
- fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
- fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
- fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption
- fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
- fix CVE-2015-0293 - triggerable assert in SSLv2 server
2015-03-19 18:08:12 +01:00
Tomas Mraz 446f9bea43 fix bug in the CRYPTO_128_unwrap() 2015-03-16 18:02:06 +01:00
Tomas Mraz 303fb7be60 fix bug in the RFC 5649 support (#1185878) 2015-02-27 16:03:52 +01:00
Till Maas 1804d4c857 Rebuilt for Fedora 23 Change
https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
2015-02-21 22:15:20 +01:00
Tomas Mraz 6a450be963 test in the non-FIPS RSA keygen for minimal distance of p and q
similarly to the FIPS RSA keygen
2015-01-16 16:16:14 +01:00
Tomas Mraz 7e7e3f299f new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00
Tomas Mraz 8c1cdfe3ab Fix date in changelog. 2014-11-20 11:14:35 +01:00
Tomas Mraz 80b5477597 disable SSLv3 by default again
Mail servers and possibly LDAP servers should probably allow
it explicitly by SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv3) call
for buggy legacy clients on the smtps, imaps, and ldaps ports.
2014-11-20 10:25:56 +01:00
Tomas Mraz 3f43f7e93a update the FIPS RSA keygen to be FIPS 186-4 compliant 2014-10-21 16:02:25 +02:00
Tomas Mraz 0a961bb5e3 new upstream release fixing multiple security issues 2014-10-16 14:02:00 +02:00
Tomas Mraz 613f664141 new upstream release fixing multiple security issues 2014-10-16 13:50:08 +02:00
Tomas Mraz 1f162bf2ee copy negotiated digests when switching certs by SNI (#1150032) 2014-10-10 14:16:48 +02:00
Tomas Mraz 11aeae71ed add support for RFC 5649 2014-09-08 15:22:44 +02:00
Peter Robinson 58eec73ac0 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild 2014-08-17 14:08:44 +00:00
Tomas Mraz 0e8cc69f30 Make the fips_standalone_sha build on PPC. 2014-08-14 14:48:26 +02:00
Tomas Mraz a577400ed8 drop RSA X9.31 from RSA FIPS selftests
- add Power 8 optimalizations
2014-08-13 20:03:17 +02:00
Tomas Mraz 638098da51 Merge branch 'master' into f21
Conflicts:
	openssl.spec
2014-08-07 16:16:19 +02:00
Tomas Mraz a78828f786 new upstream release fixing multiple moderate security issues
- for now disable only SSLv2 by default
2014-08-07 16:00:47 +02:00
Tom Callaway a751492d12 fix license handling 2014-07-18 19:31:40 -04:00
Tom Callaway 6c0bfa087d fix license handling 2014-07-18 19:31:16 -04:00
Tomas Mraz c66230af31 Sign the test string in the pairwise check instead of empty data.
Author: Marcus Meissner <meissner@suse.de>
2014-07-04 17:08:44 +02:00
Tomas Mraz 6466466115 disable SSLv2 and SSLv3 protocols by default
(can be enabled via appropriate SSL_CTX_clear_options() call)
2014-06-30 14:21:11 +02:00
Tomas Mraz 873dc4a466 And never call fclose with NULL parameter. 2014-06-11 16:21:37 +02:00
Tomas Mraz 9c4f375672 Cannot use malloc with OPENSSL_free. 2014-06-11 15:30:49 +02:00
Tomas Mraz f550490681 use system profile for default cipher list 2014-06-11 15:07:06 +02:00
Tomas Mraz a98d99a503 fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
- make FIPS mode keygen bit length restriction enforced only when
  OPENSSL_ENFORCE_MODULUS_BITS is set
2014-06-10 16:38:56 +02:00
Dennis Gilmore 0a491cd9f2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild 2014-06-07 12:02:05 -05:00