Compare commits
132 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
3413ff9700 | ||
|
261f10a200 | ||
|
7ae2c9cd85 | ||
|
a75e581407 | ||
|
067d5800f2 | ||
|
04d5ef4d72 | ||
|
7f27ca925c | ||
|
f023424321 | ||
|
ef93cf994d | ||
|
b9c80ecf85 | ||
|
9833eff277 | ||
|
8746bcba4c | ||
|
7396eb055e | ||
|
6e23655506 | ||
|
87eaf879ac | ||
|
1bc9545b38 | ||
|
1e6a98d9e9 | ||
|
d902645d90 | ||
|
89a24d69fc | ||
|
0f4ce87941 | ||
|
5888d1863e | ||
|
5004ccfb25 | ||
|
ea310218f3 | ||
|
c9936c55c2 | ||
|
30d45eb047 | ||
|
c11b71fd2f | ||
|
c77593a912 | ||
|
b9b156fb97 | ||
|
d742997a1e | ||
|
898af7893c | ||
|
b8a97dc1d8 | ||
|
0536b721ef | ||
|
266efa3055 | ||
|
dc9d5caf5e | ||
|
f1c4ba61a3 | ||
|
10c30b2322 | ||
|
f6a62c4c2c | ||
|
c44b3f96fe | ||
|
45ebb7fdc2 | ||
|
dba4c3b578 | ||
|
b395c9afd4 | ||
|
8419f769c7 | ||
|
a71f5ae7ab | ||
|
4784e45765 | ||
|
31d61b19d5 | ||
|
b3060e5f2d | ||
|
22a821356e | ||
|
e18dcc63f4 | ||
|
65a11b2a90 | ||
|
569a3cb917 | ||
|
f5bba4a2a3 | ||
|
5c7382cd79 | ||
|
648a3cb985 | ||
|
1aaf4073e3 | ||
|
7a654fc69c | ||
|
c99b8bf7f9 | ||
|
e2ea1027fe | ||
|
5cda1ca091 | ||
|
757524ec00 | ||
|
f565dfd7ec | ||
|
99d68c7f43 | ||
|
5ee230264d | ||
|
301c642c7f | ||
|
06bb120ffb | ||
|
68f387b1c4 | ||
|
a985e4b118 | ||
|
3bfe874268 | ||
|
8574fb5150 | ||
|
33bd389ea8 | ||
|
746c76a1d7 | ||
|
143a3dae64 | ||
|
60efa7758e | ||
|
1a7b91b472 | ||
|
d2c08bab45 | ||
|
a4bf4e1b65 | ||
|
90121b0c9d | ||
|
cfeae6fcb3 | ||
|
62ec0f1fa9 | ||
|
1186311ade | ||
|
f7a30f9a15 | ||
|
60357072e0 | ||
|
4bff11d832 | ||
|
9189f03055 | ||
|
7f74f219f1 | ||
|
5ec63a5ce1 | ||
|
86c97f4f4b | ||
|
98bbad839c | ||
|
357b7a7e37 | ||
|
73ef787803 | ||
|
5d5075d4c9 | ||
|
08db5cbcb9 | ||
|
5a93773172 | ||
|
c6d0704d87 | ||
|
6eb8f62027 | ||
|
6d92af0099 | ||
|
e688115b6d | ||
|
3a05f1f46a | ||
|
c11b1341c5 | ||
|
899f2baacb | ||
|
f20f5f466f | ||
|
0ac4eaaf93 | ||
|
8e2fdfb52a | ||
|
e85d72778f | ||
|
50c1418e79 | ||
|
c68da76796 | ||
|
790567dc64 | ||
|
f852080c72 | ||
|
7b595774f0 | ||
|
226b42827c | ||
|
81258b6d2a | ||
|
6b68d87d06 | ||
|
1ff978b22e | ||
|
c676ac32d5 | ||
|
f6b0040c3e | ||
|
d00e0a5904 | ||
|
c144665042 | ||
|
fe449cd23c | ||
|
836560b322 | ||
|
21909a4d4c | ||
|
3a8593870a | ||
|
e443a79334 | ||
|
be56ae067b | ||
|
a416cba2f4 | ||
|
648a4e2db0 | ||
|
f655917cf7 | ||
|
c7fc8d6daa | ||
|
d2220322f3 | ||
|
0e04498302 | ||
|
635f6a80a8 | ||
|
4e52f8d3db | ||
|
510bcc2e3a | ||
|
d0c38b1fe6 |
18
.gitignore
vendored
18
.gitignore
vendored
@ -31,3 +31,21 @@ openssl-1.0.0a-usa.tar.bz2
|
|||||||
/openssl-1.0.2h-hobbled.tar.xz
|
/openssl-1.0.2h-hobbled.tar.xz
|
||||||
/openssl-1.0.2i-hobbled.tar.xz
|
/openssl-1.0.2i-hobbled.tar.xz
|
||||||
/openssl-1.0.2j-hobbled.tar.xz
|
/openssl-1.0.2j-hobbled.tar.xz
|
||||||
|
/openssl-1.1.0b-hobbled.tar.xz
|
||||||
|
/openssl-1.1.0c-hobbled.tar.xz
|
||||||
|
/openssl-1.1.0d-hobbled.tar.xz
|
||||||
|
/openssl-1.1.0e-hobbled.tar.xz
|
||||||
|
/openssl-1.1.0f-hobbled.tar.xz
|
||||||
|
/openssl-1.1.0g-hobbled.tar.xz
|
||||||
|
/openssl-1.1.0h-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1-pre8-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1-pre9-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1a-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1b-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1c-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1d-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1e-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1f-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1g-hobbled.tar.xz
|
||||||
|
/openssl-1.1.1h-hobbled.tar.xz
|
||||||
|
17
README.FIPS
17
README.FIPS
@ -6,17 +6,17 @@ Red Hat Enterprise Linux - OPENSSL Module.
|
|||||||
|
|
||||||
The module files
|
The module files
|
||||||
================
|
================
|
||||||
/usr/lib[64]/libcrypto.so.1.0.1e
|
/usr/lib[64]/libcrypto.so.1.1.0
|
||||||
/usr/lib[64]/libssl.so.1.0.1e
|
/usr/lib[64]/libssl.so.1.1.0
|
||||||
/usr/lib[64]/.libcrypto.so.1.0.1e.hmac
|
/usr/lib[64]/.libcrypto.so.1.1.0.hmac
|
||||||
/usr/lib[64]/.libssl.so.1.0.1e.hmac
|
/usr/lib[64]/.libssl.so.1.1.0.hmac
|
||||||
|
|
||||||
Dependencies
|
Dependencies
|
||||||
============
|
============
|
||||||
|
|
||||||
The approved mode of operation requires kernel with /dev/urandom RNG running
|
The approved mode of operation requires kernel with /dev/urandom RNG running
|
||||||
with properties as defined in the security policy of the module. This is
|
with properties as defined in the security policy of the module. This is
|
||||||
provided by kernel packages with validated Red Hat Enterprise Linux - IPSec
|
provided by kernel packages with validated Red Hat Enterprise Linux Kernel
|
||||||
Crytographic Module.
|
Crytographic Module.
|
||||||
|
|
||||||
Installation
|
Installation
|
||||||
@ -26,11 +26,8 @@ The RPM package of the module can be installed by standard tools recommended
|
|||||||
for installation of RPM packages on the Red Hat Enterprise Linux system (yum,
|
for installation of RPM packages on the Red Hat Enterprise Linux system (yum,
|
||||||
rpm, RHN remote management tool).
|
rpm, RHN remote management tool).
|
||||||
|
|
||||||
For proper operation of the in-module integrity verification the prelink has to
|
The RPM package dracut-fips must be installed for the approved mode of
|
||||||
be disabled. This can be done with setting PRELINKING=no in the
|
operation.
|
||||||
/etc/sysconfig/prelink configuration file. If the libraries were already
|
|
||||||
prelinked the prelink should be undone on all the system files with the
|
|
||||||
'prelink -u -a' command.
|
|
||||||
|
|
||||||
Usage and API
|
Usage and API
|
||||||
=============
|
=============
|
||||||
|
329
ec_curve.c
329
ec_curve.c
@ -1,83 +1,19 @@
|
|||||||
/* crypto/ec/ec_curve.c */
|
|
||||||
/*
|
/*
|
||||||
* Written by Nils Larsch for the OpenSSL project.
|
* Copyright 2002-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
*/
|
* Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
|
||||||
/* ====================================================================
|
|
||||||
* Copyright (c) 1998-2010 The OpenSSL Project. All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
*
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
*
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in
|
|
||||||
* the documentation and/or other materials provided with the
|
|
||||||
* distribution.
|
|
||||||
*
|
|
||||||
* 3. All advertising materials mentioning features or use of this
|
|
||||||
* software must display the following acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
|
||||||
*
|
|
||||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
||||||
* endorse or promote products derived from this software without
|
|
||||||
* prior written permission. For written permission, please contact
|
|
||||||
* openssl-core@openssl.org.
|
|
||||||
*
|
|
||||||
* 5. Products derived from this software may not be called "OpenSSL"
|
|
||||||
* nor may "OpenSSL" appear in their names without prior written
|
|
||||||
* permission of the OpenSSL Project.
|
|
||||||
*
|
|
||||||
* 6. Redistributions of any form whatsoever must retain the following
|
|
||||||
* acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
||||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
||||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
||||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
||||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
||||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
||||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
||||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
||||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
||||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
* ====================================================================
|
|
||||||
*
|
|
||||||
* This product includes cryptographic software written by Eric Young
|
|
||||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
||||||
* Hudson (tjh@cryptsoft.com).
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
/* ====================================================================
|
|
||||||
* Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
|
|
||||||
*
|
|
||||||
* Portions of the attached software ("Contribution") are developed by
|
|
||||||
* SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
|
|
||||||
*
|
|
||||||
* The Contribution is licensed pursuant to the OpenSSL open source
|
|
||||||
* license provided above.
|
|
||||||
*
|
|
||||||
* The elliptic curve binary polynomial software is originally written by
|
|
||||||
* Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
|
|
||||||
*
|
*
|
||||||
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
||||||
|
* this file except in compliance with the License. You can obtain a copy
|
||||||
|
* in the file LICENSE in the source distribution or at
|
||||||
|
* https://www.openssl.org/source/license.html
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include "ec_lcl.h"
|
#include "ec_local.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#include <openssl/obj_mac.h>
|
#include <openssl/obj_mac.h>
|
||||||
#include <openssl/opensslconf.h>
|
#include <openssl/opensslconf.h>
|
||||||
|
#include "internal/nelem.h"
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
# include <openssl/fips.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int field_type, /* either NID_X9_62_prime_field or
|
int field_type, /* either NID_X9_62_prime_field or
|
||||||
@ -87,6 +23,44 @@ typedef struct {
|
|||||||
} EC_CURVE_DATA;
|
} EC_CURVE_DATA;
|
||||||
|
|
||||||
/* the nist prime curves */
|
/* the nist prime curves */
|
||||||
|
static const struct {
|
||||||
|
EC_CURVE_DATA h;
|
||||||
|
unsigned char data[20 + 28 * 6];
|
||||||
|
} _EC_NIST_PRIME_224 = {
|
||||||
|
{
|
||||||
|
NID_X9_62_prime_field, 20, 28, 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
/* seed */
|
||||||
|
0xBD, 0x71, 0x34, 0x47, 0x99, 0xD5, 0xC7, 0xFC, 0xDC, 0x45, 0xB5, 0x9F,
|
||||||
|
0xA3, 0xB9, 0xAB, 0x8F, 0x6A, 0x94, 0x8B, 0xC5,
|
||||||
|
/* p */
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
0x00, 0x00, 0x00, 0x01,
|
||||||
|
/* a */
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFE,
|
||||||
|
/* b */
|
||||||
|
0xB4, 0x05, 0x0A, 0x85, 0x0C, 0x04, 0xB3, 0xAB, 0xF5, 0x41, 0x32, 0x56,
|
||||||
|
0x50, 0x44, 0xB0, 0xB7, 0xD7, 0xBF, 0xD8, 0xBA, 0x27, 0x0B, 0x39, 0x43,
|
||||||
|
0x23, 0x55, 0xFF, 0xB4,
|
||||||
|
/* x */
|
||||||
|
0xB7, 0x0E, 0x0C, 0xBD, 0x6B, 0xB4, 0xBF, 0x7F, 0x32, 0x13, 0x90, 0xB9,
|
||||||
|
0x4A, 0x03, 0xC1, 0xD3, 0x56, 0xC2, 0x11, 0x22, 0x34, 0x32, 0x80, 0xD6,
|
||||||
|
0x11, 0x5C, 0x1D, 0x21,
|
||||||
|
/* y */
|
||||||
|
0xbd, 0x37, 0x63, 0x88, 0xb5, 0xf7, 0x23, 0xfb, 0x4c, 0x22, 0xdf, 0xe6,
|
||||||
|
0xcd, 0x43, 0x75, 0xa0, 0x5a, 0x07, 0x47, 0x64, 0x44, 0xd5, 0x81, 0x99,
|
||||||
|
0x85, 0x00, 0x7e, 0x34,
|
||||||
|
/* order */
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0x16, 0xA2, 0xE0, 0xB8, 0xF0, 0x3E, 0x13, 0xDD, 0x29, 0x45,
|
||||||
|
0x5C, 0x5C, 0x2A, 0x3D
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
static const struct {
|
static const struct {
|
||||||
EC_CURVE_DATA h;
|
EC_CURVE_DATA h;
|
||||||
unsigned char data[20 + 48 * 6];
|
unsigned char data[20 + 48 * 6];
|
||||||
@ -225,6 +199,42 @@ static const struct {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static const struct {
|
||||||
|
EC_CURVE_DATA h;
|
||||||
|
unsigned char data[0 + 32 * 6];
|
||||||
|
} _EC_SECG_PRIME_256K1 = {
|
||||||
|
{
|
||||||
|
NID_X9_62_prime_field, 0, 32, 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
/* no seed */
|
||||||
|
/* p */
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFC, 0x2F,
|
||||||
|
/* a */
|
||||||
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
/* b */
|
||||||
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x07,
|
||||||
|
/* x */
|
||||||
|
0x79, 0xBE, 0x66, 0x7E, 0xF9, 0xDC, 0xBB, 0xAC, 0x55, 0xA0, 0x62, 0x95,
|
||||||
|
0xCE, 0x87, 0x0B, 0x07, 0x02, 0x9B, 0xFC, 0xDB, 0x2D, 0xCE, 0x28, 0xD9,
|
||||||
|
0x59, 0xF2, 0x81, 0x5B, 0x16, 0xF8, 0x17, 0x98,
|
||||||
|
/* y */
|
||||||
|
0x48, 0x3a, 0xda, 0x77, 0x26, 0xa3, 0xc4, 0x65, 0x5d, 0xa4, 0xfb, 0xfc,
|
||||||
|
0x0e, 0x11, 0x08, 0xa8, 0xfd, 0x17, 0xb4, 0x48, 0xa6, 0x85, 0x54, 0x19,
|
||||||
|
0x9c, 0x47, 0xd0, 0x8f, 0xfb, 0x10, 0xd4, 0xb8,
|
||||||
|
/* order */
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
||||||
|
0xFF, 0xFF, 0xFF, 0xFE, 0xBA, 0xAE, 0xDC, 0xE6, 0xAF, 0x48, 0xA0, 0x3B,
|
||||||
|
0xBF, 0xD2, 0x5E, 0x8C, 0xD0, 0x36, 0x41, 0x41
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
typedef struct _ec_list_element_st {
|
typedef struct _ec_list_element_st {
|
||||||
int nid;
|
int nid;
|
||||||
const EC_CURVE_DATA *data;
|
const EC_CURVE_DATA *data;
|
||||||
@ -235,6 +245,15 @@ typedef struct _ec_list_element_st {
|
|||||||
static const ec_list_element curve_list[] = {
|
static const ec_list_element curve_list[] = {
|
||||||
/* prime field curves */
|
/* prime field curves */
|
||||||
/* secg curves */
|
/* secg curves */
|
||||||
|
#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
|
||||||
|
{NID_secp224r1, &_EC_NIST_PRIME_224.h, EC_GFp_nistp224_method,
|
||||||
|
"NIST/SECG curve over a 224 bit prime field"},
|
||||||
|
#else
|
||||||
|
{NID_secp224r1, &_EC_NIST_PRIME_224.h, 0,
|
||||||
|
"NIST/SECG curve over a 224 bit prime field"},
|
||||||
|
#endif
|
||||||
|
{NID_secp256k1, &_EC_SECG_PRIME_256K1.h, 0,
|
||||||
|
"SECG curve over a 256 bit prime field"},
|
||||||
/* SECG secp256r1 is the same as X9.62 prime256v1 and hence omitted */
|
/* SECG secp256r1 is the same as X9.62 prime256v1 and hence omitted */
|
||||||
{NID_secp384r1, &_EC_NIST_PRIME_384.h, 0,
|
{NID_secp384r1, &_EC_NIST_PRIME_384.h, 0,
|
||||||
"NIST/SECG curve over a 384 bit prime field"},
|
"NIST/SECG curve over a 384 bit prime field"},
|
||||||
@ -257,7 +276,7 @@ static const ec_list_element curve_list[] = {
|
|||||||
"X9.62/SECG curve over a 256 bit prime field"},
|
"X9.62/SECG curve over a 256 bit prime field"},
|
||||||
};
|
};
|
||||||
|
|
||||||
#define curve_list_length (sizeof(curve_list)/sizeof(ec_list_element))
|
#define curve_list_length OSSL_NELEM(curve_list)
|
||||||
|
|
||||||
static EC_GROUP *ec_group_new_from_data(const ec_list_element curve)
|
static EC_GROUP *ec_group_new_from_data(const ec_list_element curve)
|
||||||
{
|
{
|
||||||
@ -272,6 +291,10 @@ static EC_GROUP *ec_group_new_from_data(const ec_list_element curve)
|
|||||||
const EC_CURVE_DATA *data;
|
const EC_CURVE_DATA *data;
|
||||||
const unsigned char *params;
|
const unsigned char *params;
|
||||||
|
|
||||||
|
/* If no curve data curve method must handle everything */
|
||||||
|
if (curve.data == NULL)
|
||||||
|
return EC_GROUP_new(curve.meth != NULL ? curve.meth() : NULL);
|
||||||
|
|
||||||
if ((ctx = BN_CTX_new()) == NULL) {
|
if ((ctx = BN_CTX_new()) == NULL) {
|
||||||
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_MALLOC_FAILURE);
|
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_MALLOC_FAILURE);
|
||||||
goto err;
|
goto err;
|
||||||
@ -283,9 +306,9 @@ static EC_GROUP *ec_group_new_from_data(const ec_list_element curve)
|
|||||||
params = (const unsigned char *)(data + 1); /* skip header */
|
params = (const unsigned char *)(data + 1); /* skip header */
|
||||||
params += seed_len; /* skip seed */
|
params += seed_len; /* skip seed */
|
||||||
|
|
||||||
if (!(p = BN_bin2bn(params + 0 * param_len, param_len, NULL))
|
if ((p = BN_bin2bn(params + 0 * param_len, param_len, NULL)) == NULL
|
||||||
|| !(a = BN_bin2bn(params + 1 * param_len, param_len, NULL))
|
|| (a = BN_bin2bn(params + 1 * param_len, param_len, NULL)) == NULL
|
||||||
|| !(b = BN_bin2bn(params + 2 * param_len, param_len, NULL))) {
|
|| (b = BN_bin2bn(params + 2 * param_len, param_len, NULL)) == NULL) {
|
||||||
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB);
|
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
@ -314,21 +337,23 @@ static EC_GROUP *ec_group_new_from_data(const ec_list_element curve)
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
EC_GROUP_set_curve_name(group, curve.nid);
|
||||||
|
|
||||||
if ((P = EC_POINT_new(group)) == NULL) {
|
if ((P = EC_POINT_new(group)) == NULL) {
|
||||||
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB);
|
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!(x = BN_bin2bn(params + 3 * param_len, param_len, NULL))
|
if ((x = BN_bin2bn(params + 3 * param_len, param_len, NULL)) == NULL
|
||||||
|| !(y = BN_bin2bn(params + 4 * param_len, param_len, NULL))) {
|
|| (y = BN_bin2bn(params + 4 * param_len, param_len, NULL)) == NULL) {
|
||||||
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB);
|
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
if (!EC_POINT_set_affine_coordinates_GFp(group, P, x, y, ctx)) {
|
if (!EC_POINT_set_affine_coordinates(group, P, x, y, ctx)) {
|
||||||
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB);
|
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_EC_LIB);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
if (!(order = BN_bin2bn(params + 5 * param_len, param_len, NULL))
|
if ((order = BN_bin2bn(params + 5 * param_len, param_len, NULL)) == NULL
|
||||||
|| !BN_set_word(x, (BN_ULONG)data->cofactor)) {
|
|| !BN_set_word(x, (BN_ULONG)data->cofactor)) {
|
||||||
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB);
|
ECerr(EC_F_EC_GROUP_NEW_FROM_DATA, ERR_R_BN_LIB);
|
||||||
goto err;
|
goto err;
|
||||||
@ -349,22 +374,14 @@ static EC_GROUP *ec_group_new_from_data(const ec_list_element curve)
|
|||||||
EC_GROUP_free(group);
|
EC_GROUP_free(group);
|
||||||
group = NULL;
|
group = NULL;
|
||||||
}
|
}
|
||||||
if (P)
|
EC_POINT_free(P);
|
||||||
EC_POINT_free(P);
|
BN_CTX_free(ctx);
|
||||||
if (ctx)
|
BN_free(p);
|
||||||
BN_CTX_free(ctx);
|
BN_free(a);
|
||||||
if (p)
|
BN_free(b);
|
||||||
BN_free(p);
|
BN_free(order);
|
||||||
if (a)
|
BN_free(x);
|
||||||
BN_free(a);
|
BN_free(y);
|
||||||
if (b)
|
|
||||||
BN_free(b);
|
|
||||||
if (order)
|
|
||||||
BN_free(order);
|
|
||||||
if (x)
|
|
||||||
BN_free(x);
|
|
||||||
if (y)
|
|
||||||
BN_free(y);
|
|
||||||
return group;
|
return group;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -387,8 +404,6 @@ EC_GROUP *EC_GROUP_new_by_curve_name(int nid)
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
EC_GROUP_set_curve_name(ret, nid);
|
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -437,7 +452,7 @@ static EC_NIST_NAME nist_curves[] = {
|
|||||||
const char *EC_curve_nid2nist(int nid)
|
const char *EC_curve_nid2nist(int nid)
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
for (i = 0; i < sizeof(nist_curves) / sizeof(EC_NIST_NAME); i++) {
|
for (i = 0; i < OSSL_NELEM(nist_curves); i++) {
|
||||||
if (nist_curves[i].nid == nid)
|
if (nist_curves[i].nid == nid)
|
||||||
return nist_curves[i].name;
|
return nist_curves[i].name;
|
||||||
}
|
}
|
||||||
@ -447,9 +462,121 @@ const char *EC_curve_nid2nist(int nid)
|
|||||||
int EC_curve_nist2nid(const char *name)
|
int EC_curve_nist2nid(const char *name)
|
||||||
{
|
{
|
||||||
size_t i;
|
size_t i;
|
||||||
for (i = 0; i < sizeof(nist_curves) / sizeof(EC_NIST_NAME); i++) {
|
for (i = 0; i < OSSL_NELEM(nist_curves); i++) {
|
||||||
if (!strcmp(nist_curves[i].name, name))
|
if (strcmp(nist_curves[i].name, name) == 0)
|
||||||
return nist_curves[i].nid;
|
return nist_curves[i].nid;
|
||||||
}
|
}
|
||||||
return NID_undef;
|
return NID_undef;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#define NUM_BN_FIELDS 6
|
||||||
|
/*
|
||||||
|
* Validates EC domain parameter data for known named curves.
|
||||||
|
* This can be used when a curve is loaded explicitly (without a curve
|
||||||
|
* name) or to validate that domain parameters have not been modified.
|
||||||
|
*
|
||||||
|
* Returns: The nid associated with the found named curve, or NID_undef
|
||||||
|
* if not found. If there was an error it returns -1.
|
||||||
|
*/
|
||||||
|
int ec_curve_nid_from_params(const EC_GROUP *group, BN_CTX *ctx)
|
||||||
|
{
|
||||||
|
int ret = -1, nid, len, field_type, param_len;
|
||||||
|
size_t i, seed_len;
|
||||||
|
const unsigned char *seed, *params_seed, *params;
|
||||||
|
unsigned char *param_bytes = NULL;
|
||||||
|
const EC_CURVE_DATA *data;
|
||||||
|
const EC_POINT *generator = NULL;
|
||||||
|
const EC_METHOD *meth;
|
||||||
|
const BIGNUM *cofactor = NULL;
|
||||||
|
/* An array of BIGNUMs for (p, a, b, x, y, order) */
|
||||||
|
BIGNUM *bn[NUM_BN_FIELDS] = {NULL, NULL, NULL, NULL, NULL, NULL};
|
||||||
|
|
||||||
|
meth = EC_GROUP_method_of(group);
|
||||||
|
if (meth == NULL)
|
||||||
|
return -1;
|
||||||
|
/* Use the optional named curve nid as a search field */
|
||||||
|
nid = EC_GROUP_get_curve_name(group);
|
||||||
|
field_type = EC_METHOD_get_field_type(meth);
|
||||||
|
seed_len = EC_GROUP_get_seed_len(group);
|
||||||
|
seed = EC_GROUP_get0_seed(group);
|
||||||
|
cofactor = EC_GROUP_get0_cofactor(group);
|
||||||
|
|
||||||
|
BN_CTX_start(ctx);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The built-in curves contains data fields (p, a, b, x, y, order) that are
|
||||||
|
* all zero-padded to be the same size. The size of the padding is
|
||||||
|
* determined by either the number of bytes in the field modulus (p) or the
|
||||||
|
* EC group order, whichever is larger.
|
||||||
|
*/
|
||||||
|
param_len = BN_num_bytes(group->order);
|
||||||
|
len = BN_num_bytes(group->field);
|
||||||
|
if (len > param_len)
|
||||||
|
param_len = len;
|
||||||
|
|
||||||
|
/* Allocate space to store the padded data for (p, a, b, x, y, order) */
|
||||||
|
param_bytes = OPENSSL_malloc(param_len * NUM_BN_FIELDS);
|
||||||
|
if (param_bytes == NULL)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
/* Create the bignums */
|
||||||
|
for (i = 0; i < NUM_BN_FIELDS; ++i) {
|
||||||
|
if ((bn[i] = BN_CTX_get(ctx)) == NULL)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
/*
|
||||||
|
* Fill in the bn array with the same values as the internal curves
|
||||||
|
* i.e. the values are p, a, b, x, y, order.
|
||||||
|
*/
|
||||||
|
/* Get p, a & b */
|
||||||
|
if (!(EC_GROUP_get_curve(group, bn[0], bn[1], bn[2], ctx)
|
||||||
|
&& ((generator = EC_GROUP_get0_generator(group)) != NULL)
|
||||||
|
/* Get x & y */
|
||||||
|
&& EC_POINT_get_affine_coordinates(group, generator, bn[3], bn[4], ctx)
|
||||||
|
/* Get order */
|
||||||
|
&& EC_GROUP_get_order(group, bn[5], ctx)))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Convert the bignum array to bytes that are joined together to form
|
||||||
|
* a single buffer that contains data for all fields.
|
||||||
|
* (p, a, b, x, y, order) are all zero padded to be the same size.
|
||||||
|
*/
|
||||||
|
for (i = 0; i < NUM_BN_FIELDS; ++i) {
|
||||||
|
if (BN_bn2binpad(bn[i], ¶m_bytes[i*param_len], param_len) <= 0)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (i = 0; i < curve_list_length; i++) {
|
||||||
|
const ec_list_element curve = curve_list[i];
|
||||||
|
|
||||||
|
data = curve.data;
|
||||||
|
/* Get the raw order byte data */
|
||||||
|
params_seed = (const unsigned char *)(data + 1); /* skip header */
|
||||||
|
params = params_seed + data->seed_len;
|
||||||
|
|
||||||
|
/* Look for unique fields in the fixed curve data */
|
||||||
|
if (data->field_type == field_type
|
||||||
|
&& param_len == data->param_len
|
||||||
|
&& (nid <= 0 || nid == curve.nid)
|
||||||
|
/* check the optional cofactor (ignore if its zero) */
|
||||||
|
&& (BN_is_zero(cofactor)
|
||||||
|
|| BN_is_word(cofactor, (const BN_ULONG)curve.data->cofactor))
|
||||||
|
/* Check the optional seed (ignore if its not set) */
|
||||||
|
&& (data->seed_len == 0 || seed_len == 0
|
||||||
|
|| ((size_t)data->seed_len == seed_len
|
||||||
|
&& memcmp(params_seed, seed, seed_len) == 0))
|
||||||
|
/* Check that the groups params match the built-in curve params */
|
||||||
|
&& memcmp(param_bytes, params, param_len * NUM_BN_FIELDS)
|
||||||
|
== 0) {
|
||||||
|
ret = curve.nid;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
/* Gets here if the group was not found */
|
||||||
|
ret = NID_undef;
|
||||||
|
end:
|
||||||
|
OPENSSL_free(param_bytes);
|
||||||
|
BN_CTX_end(ctx);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
@ -8,40 +8,33 @@ set -e
|
|||||||
# IDEA: 5,214,703 07/01/2012 - expired, we do not remove it anymore
|
# IDEA: 5,214,703 07/01/2012 - expired, we do not remove it anymore
|
||||||
# RC5: 5,724,428 01/11/2015 - expired, we do not remove it anymore
|
# RC5: 5,724,428 01/11/2015 - expired, we do not remove it anymore
|
||||||
# EC: ????????? ??/??/2020
|
# EC: ????????? ??/??/2020
|
||||||
# SRP: ????????? ??/??/20??
|
# SRP: ????????? ??/??/2017 - expired, we do not remove it anymore
|
||||||
|
|
||||||
# Remove assembler portions of IDEA, MDC2, and RC5.
|
# Remove assembler portions of IDEA, MDC2, and RC5.
|
||||||
# (find crypto/rc5/asm -type f | xargs -r rm -fv)
|
# (find crypto/rc5/asm -type f | xargs -r rm -fv)
|
||||||
|
|
||||||
# SRP.
|
|
||||||
for a in srp; do
|
|
||||||
for c in `find crypto/$a -name "*.c" -a \! -name "*test*" -type f` ; do
|
|
||||||
echo Destroying $c
|
|
||||||
> $c
|
|
||||||
done
|
|
||||||
done
|
|
||||||
|
|
||||||
for c in `find crypto/bn -name "*gf2m.c"`; do
|
for c in `find crypto/bn -name "*gf2m.c"`; do
|
||||||
echo Destroying $c
|
echo Destroying $c
|
||||||
> $c
|
> $c
|
||||||
done
|
done
|
||||||
|
|
||||||
for c in `find crypto/ec -name "ec2*.c" -o -name "ec_curve.c" -o -name "ecp_nistp22?.c" -o -name "ectest.c"`; do
|
for c in `find crypto/ec -name "ec2*.c" -o -name "ec_curve.c"`; do
|
||||||
|
echo Destroying $c
|
||||||
|
> $c
|
||||||
|
done
|
||||||
|
|
||||||
|
for c in `find test -name "ectest.c"`; do
|
||||||
echo Destroying $c
|
echo Destroying $c
|
||||||
> $c
|
> $c
|
||||||
done
|
done
|
||||||
|
|
||||||
for h in `find crypto ssl apps test -name "*.h"` ; do
|
for h in `find crypto ssl apps test -name "*.h"` ; do
|
||||||
echo Removing SRP and EC2M references from $h
|
echo Removing EC2M references from $h
|
||||||
cat $h | \
|
cat $h | \
|
||||||
awk 'BEGIN {ech=1;} \
|
awk 'BEGIN {ech=1;} \
|
||||||
/^#[ \t]*ifndef.*NO_SRP/ {ech--; next;} \
|
|
||||||
/^#[ \t]*ifndef.*NO_EC2M/ {ech--; next;} \
|
/^#[ \t]*ifndef.*NO_EC2M/ {ech--; next;} \
|
||||||
/^#[ \t]*if/ {if(ech < 1) ech--;} \
|
/^#[ \t]*if/ {if(ech < 1) ech--;} \
|
||||||
{if(ech>0) {;print $0};} \
|
{if(ech>0) {;print $0};} \
|
||||||
/^#[ \t]*endif/ {if(ech < 1) ech++;}' > $h.hobbled && \
|
/^#[ \t]*endif/ {if(ech < 1) ech++;}' > $h.hobbled && \
|
||||||
mv $h.hobbled $h
|
mv $h.hobbled $h
|
||||||
done
|
done
|
||||||
|
|
||||||
# Make the makefiles happy.
|
|
||||||
# touch crypto/rc5/asm/rc5-586.pl
|
|
||||||
|
@ -1,36 +0,0 @@
|
|||||||
diff -up openssl-1.0.0-beta4/apps/CA.pl.in.ca-dir openssl-1.0.0-beta4/apps/CA.pl.in
|
|
||||||
--- openssl-1.0.0-beta4/apps/CA.pl.in.ca-dir 2006-04-28 02:30:49.000000000 +0200
|
|
||||||
+++ openssl-1.0.0-beta4/apps/CA.pl.in 2009-11-12 12:33:13.000000000 +0100
|
|
||||||
@@ -53,7 +53,7 @@ $VERIFY="$openssl verify";
|
|
||||||
$X509="$openssl x509";
|
|
||||||
$PKCS12="$openssl pkcs12";
|
|
||||||
|
|
||||||
-$CATOP="./demoCA";
|
|
||||||
+$CATOP="/etc/pki/CA";
|
|
||||||
$CAKEY="cakey.pem";
|
|
||||||
$CAREQ="careq.pem";
|
|
||||||
$CACERT="cacert.pem";
|
|
||||||
diff -up openssl-1.0.0-beta4/apps/CA.sh.ca-dir openssl-1.0.0-beta4/apps/CA.sh
|
|
||||||
--- openssl-1.0.0-beta4/apps/CA.sh.ca-dir 2009-10-15 19:27:47.000000000 +0200
|
|
||||||
+++ openssl-1.0.0-beta4/apps/CA.sh 2009-11-12 12:35:14.000000000 +0100
|
|
||||||
@@ -68,7 +68,7 @@ VERIFY="$OPENSSL verify"
|
|
||||||
X509="$OPENSSL x509"
|
|
||||||
PKCS12="openssl pkcs12"
|
|
||||||
|
|
||||||
-if [ -z "$CATOP" ] ; then CATOP=./demoCA ; fi
|
|
||||||
+if [ -z "$CATOP" ] ; then CATOP=/etc/pki/CA ; fi
|
|
||||||
CAKEY=./cakey.pem
|
|
||||||
CAREQ=./careq.pem
|
|
||||||
CACERT=./cacert.pem
|
|
||||||
diff -up openssl-1.0.0-beta4/apps/openssl.cnf.ca-dir openssl-1.0.0-beta4/apps/openssl.cnf
|
|
||||||
--- openssl-1.0.0-beta4/apps/openssl.cnf.ca-dir 2009-11-12 12:33:13.000000000 +0100
|
|
||||||
+++ openssl-1.0.0-beta4/apps/openssl.cnf 2009-11-12 12:33:13.000000000 +0100
|
|
||||||
@@ -39,7 +39,7 @@ default_ca = CA_default # The default c
|
|
||||||
####################################################################
|
|
||||||
[ CA_default ]
|
|
||||||
|
|
||||||
-dir = ./demoCA # Where everything is kept
|
|
||||||
+dir = /etc/pki/CA # Where everything is kept
|
|
||||||
certs = $dir/certs # Where the issued certs are kept
|
|
||||||
crl_dir = $dir/crl # Where the issued crl are kept
|
|
||||||
database = $dir/index.txt # database index file.
|
|
@ -1,21 +0,0 @@
|
|||||||
diff -up openssl-1.0.0/Makefile.org.timezone openssl-1.0.0/Makefile.org
|
|
||||||
--- openssl-1.0.0/Makefile.org.timezone 2010-03-30 11:08:40.000000000 +0200
|
|
||||||
+++ openssl-1.0.0/Makefile.org 2010-04-06 12:49:21.000000000 +0200
|
|
||||||
@@ -609,7 +609,7 @@ install_docs:
|
|
||||||
sec=`$(PERL) util/extract-section.pl 1 < $$i`; \
|
|
||||||
echo "installing man$$sec/$$fn.$${sec}$(MANSUFFIX)"; \
|
|
||||||
(cd `$(PERL) util/dirname.pl $$i`; \
|
|
||||||
- sh -c "$$pod2man \
|
|
||||||
+ sh -c "TZ=UTC $$pod2man \
|
|
||||||
--section=$$sec --center=OpenSSL \
|
|
||||||
--release=$(VERSION) `basename $$i`") \
|
|
||||||
> $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$fn.$${sec}$(MANSUFFIX); \
|
|
||||||
@@ -626,7 +626,7 @@ install_docs:
|
|
||||||
sec=`$(PERL) util/extract-section.pl 3 < $$i`; \
|
|
||||||
echo "installing man$$sec/$$fn.$${sec}$(MANSUFFIX)"; \
|
|
||||||
(cd `$(PERL) util/dirname.pl $$i`; \
|
|
||||||
- sh -c "$$pod2man \
|
|
||||||
+ sh -c "TZ=UTC $$pod2man \
|
|
||||||
--section=$$sec --center=OpenSSL \
|
|
||||||
--release=$(VERSION) `basename $$i`") \
|
|
||||||
> $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$fn.$${sec}$(MANSUFFIX); \
|
|
@ -1,12 +0,0 @@
|
|||||||
diff -up openssl-1.0.1c/crypto/modes/Makefile.aliasing openssl-1.0.1c/crypto/modes/Makefile
|
|
||||||
--- openssl-1.0.1c/crypto/modes/Makefile.aliasing 2011-08-12 00:36:17.000000000 +0200
|
|
||||||
+++ openssl-1.0.1c/crypto/modes/Makefile 2012-07-13 11:32:10.767829077 +0200
|
|
||||||
@@ -12,7 +12,7 @@ AR= ar r
|
|
||||||
|
|
||||||
MODES_ASM_OBJ=
|
|
||||||
|
|
||||||
-CFLAGS= $(INCLUDES) $(CFLAG)
|
|
||||||
+CFLAGS= $(INCLUDES) $(CFLAG) -fno-strict-aliasing
|
|
||||||
ASFLAGS= $(INCLUDES) $(ASFLAG)
|
|
||||||
AFLAGS= $(ASFLAGS)
|
|
||||||
|
|
@ -1,16 +0,0 @@
|
|||||||
diff -up openssl-1.0.1c/util/perlpath.pl.perlfind openssl-1.0.1c/util/perlpath.pl
|
|
||||||
--- openssl-1.0.1c/util/perlpath.pl.perlfind 2012-07-11 22:57:33.000000000 +0200
|
|
||||||
+++ openssl-1.0.1c/util/perlpath.pl 2012-07-12 00:31:12.102156275 +0200
|
|
||||||
@@ -4,10 +4,10 @@
|
|
||||||
# line in all scripts that rely on perl.
|
|
||||||
#
|
|
||||||
|
|
||||||
-require "find.pl";
|
|
||||||
+use File::Find;
|
|
||||||
|
|
||||||
$#ARGV == 0 || print STDERR "usage: perlpath newpath (eg /usr/bin)\n";
|
|
||||||
-&find(".");
|
|
||||||
+find(\&wanted, ".");
|
|
||||||
|
|
||||||
sub wanted
|
|
||||||
{
|
|
@ -1,77 +0,0 @@
|
|||||||
diff -up openssl-1.0.1i/doc/crypto/EVP_DigestInit.pod.algo-doc openssl-1.0.1i/doc/crypto/EVP_DigestInit.pod
|
|
||||||
--- openssl-1.0.1i/doc/crypto/EVP_DigestInit.pod.algo-doc 2014-08-06 23:10:56.000000000 +0200
|
|
||||||
+++ openssl-1.0.1i/doc/crypto/EVP_DigestInit.pod 2014-08-07 11:18:01.290773970 +0200
|
|
||||||
@@ -75,7 +75,7 @@ EVP_MD_CTX_create() allocates, initializ
|
|
||||||
|
|
||||||
EVP_DigestInit_ex() sets up digest context B<ctx> to use a digest
|
|
||||||
B<type> from ENGINE B<impl>. B<ctx> must be initialized before calling this
|
|
||||||
-function. B<type> will typically be supplied by a functionsuch as EVP_sha1().
|
|
||||||
+function. B<type> will typically be supplied by a function such as EVP_sha1().
|
|
||||||
If B<impl> is NULL then the default implementation of digest B<type> is used.
|
|
||||||
|
|
||||||
EVP_DigestUpdate() hashes B<cnt> bytes of data at B<d> into the
|
|
||||||
@@ -164,7 +164,8 @@ corresponding OBJECT IDENTIFIER or NID_u
|
|
||||||
EVP_MD_size(), EVP_MD_block_size(), EVP_MD_CTX_size() and
|
|
||||||
EVP_MD_CTX_block_size() return the digest or block size in bytes.
|
|
||||||
|
|
||||||
-EVP_md_null(), EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(), EVP_dss(),
|
|
||||||
+EVP_md_null(), EVP_md2(), EVP_md5(), EVP_sha(), EVP_sha1(),
|
|
||||||
+EVP_sha224(), EVP_sha256(), EVP_sha384(), EVP_sha512(), EVP_dss(),
|
|
||||||
EVP_dss1(), EVP_mdc2() and EVP_ripemd160() return pointers to the
|
|
||||||
corresponding EVP_MD structures.
|
|
||||||
|
|
||||||
diff -up openssl-1.0.1i/doc/crypto/EVP_EncryptInit.pod.algo-doc openssl-1.0.1i/doc/crypto/EVP_EncryptInit.pod
|
|
||||||
--- openssl-1.0.1i/doc/crypto/EVP_EncryptInit.pod.algo-doc 2014-08-06 23:10:56.000000000 +0200
|
|
||||||
+++ openssl-1.0.1i/doc/crypto/EVP_EncryptInit.pod 2014-08-07 10:55:25.100638252 +0200
|
|
||||||
@@ -91,6 +91,32 @@ EVP_CIPHER_CTX_set_padding - EVP cipher
|
|
||||||
int EVP_CIPHER_param_to_asn1(EVP_CIPHER_CTX *c, ASN1_TYPE *type);
|
|
||||||
int EVP_CIPHER_asn1_to_param(EVP_CIPHER_CTX *c, ASN1_TYPE *type);
|
|
||||||
|
|
||||||
+ const EVP_CIPHER *EVP_des_ede3(void);
|
|
||||||
+ const EVP_CIPHER *EVP_des_ede3_ecb(void);
|
|
||||||
+ const EVP_CIPHER *EVP_des_ede3_cfb64(void);
|
|
||||||
+ const EVP_CIPHER *EVP_des_ede3_cfb1(void);
|
|
||||||
+ const EVP_CIPHER *EVP_des_ede3_cfb8(void);
|
|
||||||
+ const EVP_CIPHER *EVP_des_ede3_ofb(void);
|
|
||||||
+ const EVP_CIPHER *EVP_des_ede3_cbc(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_128_ecb(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_128_cbc(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_128_cfb1(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_128_cfb8(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_128_cfb128(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_128_ofb(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_192_ecb(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_192_cbc(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_192_cfb1(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_192_cfb8(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_192_cfb128(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_192_ofb(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_256_ecb(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_256_cbc(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_256_cfb1(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_256_cfb8(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_256_cfb128(void);
|
|
||||||
+ const EVP_CIPHER *EVP_aes_256_ofb(void);
|
|
||||||
+
|
|
||||||
=head1 DESCRIPTION
|
|
||||||
|
|
||||||
The EVP cipher routines are a high level interface to certain
|
|
||||||
@@ -297,6 +323,18 @@ Three key triple DES in CBC, ECB, CFB an
|
|
||||||
|
|
||||||
DESX algorithm in CBC mode.
|
|
||||||
|
|
||||||
+=item EVP_aes_128_cbc(void), EVP_aes_128_ecb(), EVP_aes_128_ofb(void), EVP_aes_128_cfb1(void), EVP_aes_128_cfb8(void), EVP_aes_128_cfb128(void)
|
|
||||||
+
|
|
||||||
+AES with 128 bit key length in CBC, ECB, OFB and CFB modes respectively.
|
|
||||||
+
|
|
||||||
+=item EVP_aes_192_cbc(void), EVP_aes_192_ecb(), EVP_aes_192_ofb(void), EVP_aes_192_cfb1(void), EVP_aes_192_cfb8(void), EVP_aes_192_cfb128(void)
|
|
||||||
+
|
|
||||||
+AES with 192 bit key length in CBC, ECB, OFB and CFB modes respectively.
|
|
||||||
+
|
|
||||||
+=item EVP_aes_256_cbc(void), EVP_aes_256_ecb(), EVP_aes_256_ofb(void), EVP_aes_256_cfb1(void), EVP_aes_256_cfb8(void), EVP_aes_256_cfb128(void)
|
|
||||||
+
|
|
||||||
+AES with 256 bit key length in CBC, ECB, OFB and CFB modes respectively.
|
|
||||||
+
|
|
||||||
=item EVP_rc4(void)
|
|
||||||
|
|
||||||
RC4 stream cipher. This is a variable key length cipher with default key length 128 bits.
|
|
@ -1,110 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/apps/ca.c.dgst openssl-1.0.2a/apps/ca.c
|
|
||||||
--- openssl-1.0.2a/apps/ca.c.dgst 2015-03-19 14:30:36.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/apps/ca.c 2015-04-21 17:01:38.841551616 +0200
|
|
||||||
@@ -157,7 +157,7 @@ static const char *ca_usage[] = {
|
|
||||||
" -startdate YYMMDDHHMMSSZ - certificate validity notBefore\n",
|
|
||||||
" -enddate YYMMDDHHMMSSZ - certificate validity notAfter (overrides -days)\n",
|
|
||||||
" -days arg - number of days to certify the certificate for\n",
|
|
||||||
- " -md arg - md to use, one of md2, md5, sha or sha1\n",
|
|
||||||
+ " -md arg - md to use, see openssl dgst -h for list\n",
|
|
||||||
" -policy arg - The CA 'policy' to support\n",
|
|
||||||
" -keyfile arg - private key file\n",
|
|
||||||
" -keyform arg - private key file format (PEM or ENGINE)\n",
|
|
||||||
diff -up openssl-1.0.2a/apps/enc.c.dgst openssl-1.0.2a/apps/enc.c
|
|
||||||
--- openssl-1.0.2a/apps/enc.c.dgst 2015-03-19 14:19:00.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/apps/enc.c 2015-04-21 17:01:38.841551616 +0200
|
|
||||||
@@ -294,7 +294,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
"%-14s the next argument is the md to use to create a key\n",
|
|
||||||
"-md");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
- "%-14s from a passphrase. One of md2, md5, sha or sha1\n",
|
|
||||||
+ "%-14s from a passphrase. See openssl dgst -h for list.\n",
|
|
||||||
"");
|
|
||||||
BIO_printf(bio_err, "%-14s salt in hex is the next argument\n",
|
|
||||||
"-S");
|
|
||||||
diff -up openssl-1.0.2a/apps/req.c.dgst openssl-1.0.2a/apps/req.c
|
|
||||||
--- openssl-1.0.2a/apps/req.c.dgst 2015-03-19 14:19:00.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/apps/req.c 2015-04-21 17:01:38.842551640 +0200
|
|
||||||
@@ -414,7 +414,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
" -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
- " -[digest] Digest to sign with (md5, sha1, md2, mdc2, md4)\n");
|
|
||||||
+ " -[digest] Digest to sign with (see openssl dgst -h for list)\n");
|
|
||||||
BIO_printf(bio_err, " -config file request template file.\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
" -subj arg set or modify request subject\n");
|
|
||||||
diff -up openssl-1.0.2a/apps/ts.c.dgst openssl-1.0.2a/apps/ts.c
|
|
||||||
--- openssl-1.0.2a/apps/ts.c.dgst 2015-03-19 14:19:00.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/apps/ts.c 2015-04-21 17:01:38.842551640 +0200
|
|
||||||
@@ -337,7 +337,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
BIO_printf(bio_err, "usage:\n"
|
|
||||||
"ts -query [-rand file%cfile%c...] [-config configfile] "
|
|
||||||
"[-data file_to_hash] [-digest digest_bytes]"
|
|
||||||
- "[-md2|-md4|-md5|-sha|-sha1|-mdc2|-ripemd160] "
|
|
||||||
+ "[-<hashalg>] "
|
|
||||||
"[-policy object_id] [-no_nonce] [-cert] "
|
|
||||||
"[-in request.tsq] [-out request.tsq] [-text]\n",
|
|
||||||
LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
|
||||||
diff -up openssl-1.0.2a/apps/x509.c.dgst openssl-1.0.2a/apps/x509.c
|
|
||||||
--- openssl-1.0.2a/apps/x509.c.dgst 2015-03-19 14:30:36.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/apps/x509.c 2015-04-21 17:01:38.842551640 +0200
|
|
||||||
@@ -141,7 +141,7 @@ static const char *x509_usage[] = {
|
|
||||||
" -set_serial - serial number to use\n",
|
|
||||||
" -text - print the certificate in text form\n",
|
|
||||||
" -C - print out C code forms\n",
|
|
||||||
- " -md2/-md5/-sha1/-mdc2 - digest to use\n",
|
|
||||||
+ " -<dgst> - digest to use, see openssl dgst -h output for list\n",
|
|
||||||
" -extfile - configuration file with X509V3 extensions to add\n",
|
|
||||||
" -extensions - section from config file with X509V3 extensions to add\n",
|
|
||||||
" -clrext - delete extensions before signing and input certificate\n",
|
|
||||||
diff -up openssl-1.0.2a/doc/apps/ca.pod.dgst openssl-1.0.2a/doc/apps/ca.pod
|
|
||||||
--- openssl-1.0.2a/doc/apps/ca.pod.dgst 2015-01-20 13:33:36.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/doc/apps/ca.pod 2015-04-21 17:01:38.842551640 +0200
|
|
||||||
@@ -168,7 +168,8 @@ the number of days to certify the certif
|
|
||||||
=item B<-md alg>
|
|
||||||
|
|
||||||
the message digest to use. Possible values include md5, sha1 and mdc2.
|
|
||||||
-This option also applies to CRLs.
|
|
||||||
+For full list of digests see openssl dgst -h output. This option also
|
|
||||||
+applies to CRLs.
|
|
||||||
|
|
||||||
=item B<-policy arg>
|
|
||||||
|
|
||||||
diff -up openssl-1.0.2a/doc/apps/ocsp.pod.dgst openssl-1.0.2a/doc/apps/ocsp.pod
|
|
||||||
--- openssl-1.0.2a/doc/apps/ocsp.pod.dgst 2015-03-19 14:19:00.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/doc/apps/ocsp.pod 2015-04-21 17:01:38.842551640 +0200
|
|
||||||
@@ -219,7 +219,8 @@ check is not performed.
|
|
||||||
=item B<-md5|-sha1|-sha256|-ripemod160|...>
|
|
||||||
|
|
||||||
this option sets digest algorithm to use for certificate identification
|
|
||||||
-in the OCSP request. By default SHA-1 is used.
|
|
||||||
+in the OCSP request. By default SHA-1 is used. See openssl dgst -h output for
|
|
||||||
+the list of available algorithms.
|
|
||||||
|
|
||||||
=back
|
|
||||||
|
|
||||||
diff -up openssl-1.0.2a/doc/apps/req.pod.dgst openssl-1.0.2a/doc/apps/req.pod
|
|
||||||
--- openssl-1.0.2a/doc/apps/req.pod.dgst 2015-03-19 14:30:36.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/doc/apps/req.pod 2015-04-21 17:01:38.843551664 +0200
|
|
||||||
@@ -201,7 +201,8 @@ will not be encrypted.
|
|
||||||
|
|
||||||
this specifies the message digest to sign the request with (such as
|
|
||||||
B<-md5>, B<-sha1>). This overrides the digest algorithm specified in
|
|
||||||
-the configuration file.
|
|
||||||
+the configuration file. For full list of possible digests see openssl
|
|
||||||
+dgst -h output.
|
|
||||||
|
|
||||||
Some public key algorithms may override this choice. For instance, DSA
|
|
||||||
signatures always use SHA1, GOST R 34.10 signatures always use
|
|
||||||
diff -up openssl-1.0.2a/doc/apps/x509.pod.dgst openssl-1.0.2a/doc/apps/x509.pod
|
|
||||||
--- openssl-1.0.2a/doc/apps/x509.pod.dgst 2015-03-19 14:30:36.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/doc/apps/x509.pod 2015-04-21 17:01:38.843551664 +0200
|
|
||||||
@@ -107,6 +107,7 @@ the digest to use. This affects any sign
|
|
||||||
digest, such as the B<-fingerprint>, B<-signkey> and B<-CA> options. If not
|
|
||||||
specified then SHA1 is used. If the key being used to sign with is a DSA key
|
|
||||||
then this option has no effect: SHA1 is always used with DSA keys.
|
|
||||||
+For full list of digests see openssl dgst -h output.
|
|
||||||
|
|
||||||
=item B<-engine id>
|
|
||||||
|
|
@ -1,27 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/crypto/rsa/rsa_gen.c.cc-reqs openssl-1.0.2a/crypto/rsa/rsa_gen.c
|
|
||||||
--- openssl-1.0.2a/crypto/rsa/rsa_gen.c.cc-reqs 2015-04-09 18:22:58.638448432 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/rsa/rsa_gen.c 2015-04-09 18:22:57.264416692 +0200
|
|
||||||
@@ -474,6 +474,12 @@ static int rsa_builtin_keygen(RSA *rsa,
|
|
||||||
if (!rsa->iqmp && ((rsa->iqmp = BN_new()) == NULL))
|
|
||||||
goto err;
|
|
||||||
|
|
||||||
+ /* prepare minimum p and q difference */
|
|
||||||
+ if (!BN_one(r3))
|
|
||||||
+ goto err;
|
|
||||||
+ if (bitsp > 100 && !BN_lshift(r3, r3, bitsp - 100))
|
|
||||||
+ goto err;
|
|
||||||
+
|
|
||||||
BN_copy(rsa->e, e_value);
|
|
||||||
|
|
||||||
/* generate p and q */
|
|
||||||
@@ -501,7 +507,9 @@ static int rsa_builtin_keygen(RSA *rsa,
|
|
||||||
do {
|
|
||||||
if (!BN_generate_prime_ex(rsa->q, bitsq, 0, NULL, NULL, cb))
|
|
||||||
goto err;
|
|
||||||
- } while ((BN_cmp(rsa->p, rsa->q) == 0) && (++degenerate < 3));
|
|
||||||
+ if (!BN_sub(r2, rsa->q, rsa->p))
|
|
||||||
+ goto err;
|
|
||||||
+ } while ((BN_ucmp(r2, r3) <= 0) && (++degenerate < 3));
|
|
||||||
if (degenerate == 3) {
|
|
||||||
ok = 0; /* we set our own err */
|
|
||||||
RSAerr(RSA_F_RSA_BUILTIN_KEYGEN, RSA_R_KEY_SIZE_TOO_SMALL);
|
|
@ -1,46 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/crypto/dsa/dsa_key.c.compat openssl-1.0.2a/crypto/dsa/dsa_key.c
|
|
||||||
--- openssl-1.0.2a/crypto/dsa/dsa_key.c.compat 2015-04-09 18:21:11.687977858 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/dsa/dsa_key.c 2015-04-09 18:21:07.869889659 +0200
|
|
||||||
@@ -68,6 +68,11 @@
|
|
||||||
# include <openssl/fips.h>
|
|
||||||
# include <openssl/evp.h>
|
|
||||||
|
|
||||||
+/* just a compatibility symbol - no-op */
|
|
||||||
+void FIPS_corrupt_dsa_keygen(void)
|
|
||||||
+{
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
static int fips_check_dsa(DSA *dsa)
|
|
||||||
{
|
|
||||||
EVP_PKEY *pk;
|
|
||||||
diff -up openssl-1.0.2a/crypto/engine/eng_all.c.compat openssl-1.0.2a/crypto/engine/eng_all.c
|
|
||||||
--- openssl-1.0.2a/crypto/engine/eng_all.c.compat 2015-04-09 18:21:11.688977881 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/engine/eng_all.c 2015-04-09 18:21:09.159919459 +0200
|
|
||||||
@@ -63,6 +63,11 @@
|
|
||||||
# include <openssl/fips.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
+/* just backwards compatibility symbol - no-op */
|
|
||||||
+void ENGINE_load_aesni(void)
|
|
||||||
+{
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
void ENGINE_load_builtin_engines(void)
|
|
||||||
{
|
|
||||||
/* Some ENGINEs need this */
|
|
||||||
diff -up openssl-1.0.2a/crypto/fips/fips.c.compat openssl-1.0.2a/crypto/fips/fips.c
|
|
||||||
--- openssl-1.0.2a/crypto/fips/fips.c.compat 2015-04-09 18:21:11.689977904 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/fips/fips.c 2015-04-09 18:21:09.925937154 +0200
|
|
||||||
@@ -113,6 +113,12 @@ int FIPS_module_mode(void)
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
+/* just a compat symbol - return NULL */
|
|
||||||
+const void *FIPS_rand_check(void)
|
|
||||||
+{
|
|
||||||
+ return NULL;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
int FIPS_selftest_failed(void)
|
|
||||||
{
|
|
||||||
int ret = 0;
|
|
@ -1,23 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/ssl/dtls1.h.dtls1-abi openssl-1.0.2a/ssl/dtls1.h
|
|
||||||
--- openssl-1.0.2a/ssl/dtls1.h.dtls1-abi 2015-04-21 10:49:57.984781143 +0200
|
|
||||||
+++ openssl-1.0.2a/ssl/dtls1.h 2015-04-21 16:41:37.835164264 +0200
|
|
||||||
@@ -214,9 +214,6 @@ typedef struct dtls1_state_st {
|
|
||||||
* loss.
|
|
||||||
*/
|
|
||||||
record_pqueue buffered_app_data;
|
|
||||||
- /* Is set when listening for new connections with dtls1_listen() */
|
|
||||||
- unsigned int listen;
|
|
||||||
- unsigned int link_mtu; /* max on-the-wire DTLS packet size */
|
|
||||||
unsigned int mtu; /* max DTLS packet size */
|
|
||||||
struct hm_header_st w_msg_hdr;
|
|
||||||
struct hm_header_st r_msg_hdr;
|
|
||||||
@@ -241,6 +238,9 @@ typedef struct dtls1_state_st {
|
|
||||||
* Cleared after the message has been processed.
|
|
||||||
*/
|
|
||||||
unsigned int change_cipher_spec_ok;
|
|
||||||
+ /* Is set when listening for new connections with dtls1_listen() */
|
|
||||||
+ unsigned int listen;
|
|
||||||
+ unsigned int link_mtu; /* max on-the-wire DTLS packet size */
|
|
||||||
# ifndef OPENSSL_NO_SCTP
|
|
||||||
/* used when SSL_ST_XX_FLUSH is entered */
|
|
||||||
int next_state;
|
|
@ -1,39 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/doc/ssl/SSL_COMP_add_compression_method.pod.env-zlib openssl-1.0.2a/doc/ssl/SSL_COMP_add_compression_method.pod
|
|
||||||
--- openssl-1.0.2a/doc/ssl/SSL_COMP_add_compression_method.pod.env-zlib 2015-04-09 18:17:20.509637597 +0200
|
|
||||||
+++ openssl-1.0.2a/doc/ssl/SSL_COMP_add_compression_method.pod 2015-04-09 18:17:14.767504953 +0200
|
|
||||||
@@ -47,6 +47,13 @@ Once the identities of the compression m
|
|
||||||
been standardized, the compression API will most likely be changed. Using
|
|
||||||
it in the current state is not recommended.
|
|
||||||
|
|
||||||
+It is also not recommended to use compression if data transfered contain
|
|
||||||
+untrusted parts that can be manipulated by an attacker as he could then
|
|
||||||
+get information about the encrypted data. See the CRIME attack. For
|
|
||||||
+that reason the default loading of the zlib compression method is
|
|
||||||
+disabled and enabled only if the environment variable B<OPENSSL_DEFAULT_ZLIB>
|
|
||||||
+is present during the library initialization.
|
|
||||||
+
|
|
||||||
=head1 RETURN VALUES
|
|
||||||
|
|
||||||
SSL_COMP_add_compression_method() may return the following values:
|
|
||||||
diff -up openssl-1.0.2a/ssl/ssl_ciph.c.env-zlib openssl-1.0.2a/ssl/ssl_ciph.c
|
|
||||||
--- openssl-1.0.2a/ssl/ssl_ciph.c.env-zlib 2015-04-09 18:17:20.510637620 +0200
|
|
||||||
+++ openssl-1.0.2a/ssl/ssl_ciph.c 2015-04-09 18:17:20.264631937 +0200
|
|
||||||
@@ -140,6 +140,8 @@
|
|
||||||
* OTHERWISE.
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <openssl/objects.h>
|
|
||||||
#ifndef OPENSSL_NO_COMP
|
|
||||||
@@ -450,7 +452,8 @@ static void load_builtin_compressions(vo
|
|
||||||
|
|
||||||
MemCheck_off();
|
|
||||||
ssl_comp_methods = sk_SSL_COMP_new(sk_comp_cmp);
|
|
||||||
- if (ssl_comp_methods != NULL) {
|
|
||||||
+ if (ssl_comp_methods != NULL
|
|
||||||
+ && secure_getenv("OPENSSL_DEFAULT_ZLIB") != NULL) {
|
|
||||||
comp = (SSL_COMP *)OPENSSL_malloc(sizeof(SSL_COMP));
|
|
||||||
if (comp != NULL) {
|
|
||||||
comp->method = COMP_zlib();
|
|
@ -1,174 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/crypto/fips/fips.c.fips-ctor openssl-1.0.2a/crypto/fips/fips.c
|
|
||||||
--- openssl-1.0.2a/crypto/fips/fips.c.fips-ctor 2015-04-21 17:42:18.702765856 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/fips/fips.c 2015-04-21 17:42:18.742766794 +0200
|
|
||||||
@@ -60,6 +60,8 @@
|
|
||||||
#include <dlfcn.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
+#include <unistd.h>
|
|
||||||
+#include <errno.h>
|
|
||||||
#include "fips_locl.h"
|
|
||||||
|
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
@@ -201,7 +203,9 @@ static char *bin2hex(void *buf, size_t l
|
|
||||||
}
|
|
||||||
|
|
||||||
# define HMAC_PREFIX "."
|
|
||||||
-# define HMAC_SUFFIX ".hmac"
|
|
||||||
+# ifndef HMAC_SUFFIX
|
|
||||||
+# define HMAC_SUFFIX ".hmac"
|
|
||||||
+# endif
|
|
||||||
# define READ_BUFFER_LENGTH 16384
|
|
||||||
|
|
||||||
static char *make_hmac_path(const char *origpath)
|
|
||||||
@@ -279,20 +283,14 @@ static int compute_file_hmac(const char
|
|
||||||
return rv;
|
|
||||||
}
|
|
||||||
|
|
||||||
-static int FIPSCHECK_verify(const char *libname, const char *symbolname)
|
|
||||||
+static int FIPSCHECK_verify(const char *path)
|
|
||||||
{
|
|
||||||
- char path[PATH_MAX + 1];
|
|
||||||
- int rv;
|
|
||||||
+ int rv = 0;
|
|
||||||
FILE *hf;
|
|
||||||
char *hmacpath, *p;
|
|
||||||
char *hmac = NULL;
|
|
||||||
size_t n;
|
|
||||||
|
|
||||||
- rv = get_library_path(libname, symbolname, path, sizeof(path));
|
|
||||||
-
|
|
||||||
- if (rv < 0)
|
|
||||||
- return 0;
|
|
||||||
-
|
|
||||||
hmacpath = make_hmac_path(path);
|
|
||||||
if (hmacpath == NULL)
|
|
||||||
return 0;
|
|
||||||
@@ -343,6 +341,51 @@ static int FIPSCHECK_verify(const char *
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
+static int verify_checksums(void)
|
|
||||||
+{
|
|
||||||
+ int rv;
|
|
||||||
+ char path[PATH_MAX + 1];
|
|
||||||
+ char *p;
|
|
||||||
+
|
|
||||||
+ /* we need to avoid dlopening libssl, assume both libcrypto and libssl
|
|
||||||
+ are in the same directory */
|
|
||||||
+
|
|
||||||
+ rv = get_library_path("libcrypto.so." SHLIB_VERSION_NUMBER,
|
|
||||||
+ "FIPS_mode_set", path, sizeof(path));
|
|
||||||
+ if (rv < 0)
|
|
||||||
+ return 0;
|
|
||||||
+
|
|
||||||
+ rv = FIPSCHECK_verify(path);
|
|
||||||
+ if (!rv)
|
|
||||||
+ return 0;
|
|
||||||
+
|
|
||||||
+ /* replace libcrypto with libssl */
|
|
||||||
+ while ((p = strstr(path, "libcrypto.so")) != NULL) {
|
|
||||||
+ p = stpcpy(p, "libssl");
|
|
||||||
+ memmove(p, p + 3, strlen(p + 2));
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ rv = FIPSCHECK_verify(path);
|
|
||||||
+ if (!rv)
|
|
||||||
+ return 0;
|
|
||||||
+ return 1;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+# ifndef FIPS_MODULE_PATH
|
|
||||||
+# define FIPS_MODULE_PATH "/etc/system-fips"
|
|
||||||
+# endif
|
|
||||||
+
|
|
||||||
+int FIPS_module_installed(void)
|
|
||||||
+{
|
|
||||||
+ int rv;
|
|
||||||
+ rv = access(FIPS_MODULE_PATH, F_OK);
|
|
||||||
+ if (rv < 0 && errno != ENOENT)
|
|
||||||
+ rv = 0;
|
|
||||||
+
|
|
||||||
+ /* Installed == true */
|
|
||||||
+ return !rv;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
int FIPS_module_mode_set(int onoff, const char *auth)
|
|
||||||
{
|
|
||||||
int ret = 0;
|
|
||||||
@@ -380,17 +423,7 @@ int FIPS_module_mode_set(int onoff, cons
|
|
||||||
}
|
|
||||||
# endif
|
|
||||||
|
|
||||||
- if (!FIPSCHECK_verify
|
|
||||||
- ("libcrypto.so." SHLIB_VERSION_NUMBER, "FIPS_mode_set")) {
|
|
||||||
- FIPSerr(FIPS_F_FIPS_MODULE_MODE_SET,
|
|
||||||
- FIPS_R_FINGERPRINT_DOES_NOT_MATCH);
|
|
||||||
- fips_selftest_fail = 1;
|
|
||||||
- ret = 0;
|
|
||||||
- goto end;
|
|
||||||
- }
|
|
||||||
-
|
|
||||||
- if (!FIPSCHECK_verify
|
|
||||||
- ("libssl.so." SHLIB_VERSION_NUMBER, "SSL_CTX_new")) {
|
|
||||||
+ if (!verify_checksums()) {
|
|
||||||
FIPSerr(FIPS_F_FIPS_MODULE_MODE_SET,
|
|
||||||
FIPS_R_FINGERPRINT_DOES_NOT_MATCH);
|
|
||||||
fips_selftest_fail = 1;
|
|
||||||
diff -up openssl-1.0.2a/crypto/fips/fips.h.fips-ctor openssl-1.0.2a/crypto/fips/fips.h
|
|
||||||
--- openssl-1.0.2a/crypto/fips/fips.h.fips-ctor 2015-04-21 17:42:18.739766724 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/fips/fips.h 2015-04-21 17:42:18.743766818 +0200
|
|
||||||
@@ -74,6 +74,7 @@ extern "C" {
|
|
||||||
|
|
||||||
int FIPS_module_mode_set(int onoff, const char *auth);
|
|
||||||
int FIPS_module_mode(void);
|
|
||||||
+ int FIPS_module_installed(void);
|
|
||||||
const void *FIPS_rand_check(void);
|
|
||||||
int FIPS_selftest(void);
|
|
||||||
int FIPS_selftest_failed(void);
|
|
||||||
diff -up openssl-1.0.2a/crypto/o_init.c.fips-ctor openssl-1.0.2a/crypto/o_init.c
|
|
||||||
--- openssl-1.0.2a/crypto/o_init.c.fips-ctor 2015-04-21 17:42:18.732766559 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/o_init.c 2015-04-21 17:45:02.662613173 +0200
|
|
||||||
@@ -74,6 +74,9 @@ static void init_fips_mode(void)
|
|
||||||
char buf[2] = "0";
|
|
||||||
int fd;
|
|
||||||
|
|
||||||
+ /* Ensure the selftests always run */
|
|
||||||
+ FIPS_mode_set(1);
|
|
||||||
+
|
|
||||||
if (secure_getenv("OPENSSL_FORCE_FIPS_MODE") != NULL) {
|
|
||||||
buf[0] = '1';
|
|
||||||
} else if ((fd = open(FIPS_MODE_SWITCH_FILE, O_RDONLY)) >= 0) {
|
|
||||||
@@ -85,8 +88,12 @@ static void init_fips_mode(void)
|
|
||||||
* otherwise..
|
|
||||||
*/
|
|
||||||
|
|
||||||
- if (buf[0] == '1') {
|
|
||||||
- FIPS_mode_set(1);
|
|
||||||
+ if (buf[0] != '1') {
|
|
||||||
+ /* drop down to non-FIPS mode if it is not requested */
|
|
||||||
+ FIPS_mode_set(0);
|
|
||||||
+ } else {
|
|
||||||
+ /* abort if selftest failed */
|
|
||||||
+ FIPS_selftest_check();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
@@ -96,13 +103,16 @@ static void init_fips_mode(void)
|
|
||||||
* sets FIPS callbacks
|
|
||||||
*/
|
|
||||||
|
|
||||||
-void OPENSSL_init_library(void)
|
|
||||||
+void __attribute__ ((constructor)) OPENSSL_init_library(void)
|
|
||||||
{
|
|
||||||
static int done = 0;
|
|
||||||
if (done)
|
|
||||||
return;
|
|
||||||
done = 1;
|
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
+ if (!FIPS_module_installed()) {
|
|
||||||
+ return;
|
|
||||||
+ }
|
|
||||||
RAND_init_fips();
|
|
||||||
init_fips_mode();
|
|
||||||
if (!FIPS_mode()) {
|
|
File diff suppressed because it is too large
Load Diff
@ -1,21 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/crypto/md5/md5_dgst.c.md5-allow openssl-1.0.2a/crypto/md5/md5_dgst.c
|
|
||||||
--- openssl-1.0.2a/crypto/md5/md5_dgst.c.md5-allow 2015-04-09 18:18:36.505393113 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/md5/md5_dgst.c 2015-04-09 18:18:32.408298469 +0200
|
|
||||||
@@ -72,7 +72,16 @@ const char MD5_version[] = "MD5" OPENSSL
|
|
||||||
#define INIT_DATA_C (unsigned long)0x98badcfeL
|
|
||||||
#define INIT_DATA_D (unsigned long)0x10325476L
|
|
||||||
|
|
||||||
-nonfips_md_init(MD5)
|
|
||||||
+int MD5_Init(MD5_CTX *c)
|
|
||||||
+#ifdef OPENSSL_FIPS
|
|
||||||
+{
|
|
||||||
+ if (FIPS_mode() && getenv("OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW") == NULL)
|
|
||||||
+ OpenSSLDie(__FILE__, __LINE__, "Digest MD5 forbidden in FIPS mode!");
|
|
||||||
+ return private_MD5_Init(c);
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+int private_MD5_Init(MD5_CTX *c)
|
|
||||||
+#endif
|
|
||||||
{
|
|
||||||
memset(c, 0, sizeof(*c));
|
|
||||||
c->A = INIT_DATA_A;
|
|
@ -1,525 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/apps/s_apps.h.ipv6-apps openssl-1.0.2a/apps/s_apps.h
|
|
||||||
--- openssl-1.0.2a/apps/s_apps.h.ipv6-apps 2015-04-20 15:01:24.029120104 +0200
|
|
||||||
+++ openssl-1.0.2a/apps/s_apps.h 2015-04-20 15:05:00.353137701 +0200
|
|
||||||
@@ -151,7 +151,7 @@ typedef fd_mask fd_set;
|
|
||||||
#define PORT_STR "4433"
|
|
||||||
#define PROTOCOL "tcp"
|
|
||||||
|
|
||||||
-int do_server(int port, int type, int *ret,
|
|
||||||
+int do_server(char *port, int type, int *ret,
|
|
||||||
int (*cb) (char *hostname, int s, int stype,
|
|
||||||
unsigned char *context), unsigned char *context,
|
|
||||||
int naccept);
|
|
||||||
@@ -167,11 +167,10 @@ int ssl_print_point_formats(BIO *out, SS
|
|
||||||
int ssl_print_curves(BIO *out, SSL *s, int noshared);
|
|
||||||
#endif
|
|
||||||
int ssl_print_tmp_key(BIO *out, SSL *s);
|
|
||||||
-int init_client(int *sock, char *server, int port, int type);
|
|
||||||
+int init_client(int *sock, char *server, char *port, int type);
|
|
||||||
int should_retry(int i);
|
|
||||||
int extract_port(char *str, short *port_ptr);
|
|
||||||
-int extract_host_port(char *str, char **host_ptr, unsigned char *ip,
|
|
||||||
- short *p);
|
|
||||||
+int extract_host_port(char *str, char **host_ptr, char **port_ptr);
|
|
||||||
|
|
||||||
long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
|
|
||||||
int argi, long argl, long ret);
|
|
||||||
diff -up openssl-1.0.2a/apps/s_client.c.ipv6-apps openssl-1.0.2a/apps/s_client.c
|
|
||||||
--- openssl-1.0.2a/apps/s_client.c.ipv6-apps 2015-04-20 15:01:24.022119942 +0200
|
|
||||||
+++ openssl-1.0.2a/apps/s_client.c 2015-04-20 15:06:42.338503234 +0200
|
|
||||||
@@ -662,7 +662,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
int cbuf_len, cbuf_off;
|
|
||||||
int sbuf_len, sbuf_off;
|
|
||||||
fd_set readfds, writefds;
|
|
||||||
- short port = PORT;
|
|
||||||
+ char *port_str = PORT_STR;
|
|
||||||
int full_log = 1;
|
|
||||||
char *host = SSL_HOST_NAME;
|
|
||||||
char *cert_file = NULL, *key_file = NULL, *chain_file = NULL;
|
|
||||||
@@ -785,13 +785,11 @@ int MAIN(int argc, char **argv)
|
|
||||||
} else if (strcmp(*argv, "-port") == 0) {
|
|
||||||
if (--argc < 1)
|
|
||||||
goto bad;
|
|
||||||
- port = atoi(*(++argv));
|
|
||||||
- if (port == 0)
|
|
||||||
- goto bad;
|
|
||||||
+ port_str = *(++argv);
|
|
||||||
} else if (strcmp(*argv, "-connect") == 0) {
|
|
||||||
if (--argc < 1)
|
|
||||||
goto bad;
|
|
||||||
- if (!extract_host_port(*(++argv), &host, NULL, &port))
|
|
||||||
+ if (!extract_host_port(*(++argv), &host, &port_str))
|
|
||||||
goto bad;
|
|
||||||
} else if (strcmp(*argv, "-verify") == 0) {
|
|
||||||
verify = SSL_VERIFY_PEER;
|
|
||||||
@@ -1417,7 +1415,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
|
|
||||||
re_start:
|
|
||||||
|
|
||||||
- if (init_client(&s, host, port, socket_type) == 0) {
|
|
||||||
+ if (init_client(&s, host, port_str, socket_type) == 0) {
|
|
||||||
BIO_printf(bio_err, "connect:errno=%d\n", get_last_socket_error());
|
|
||||||
SHUTDOWN(s);
|
|
||||||
goto end;
|
|
||||||
diff -up openssl-1.0.2a/apps/s_server.c.ipv6-apps openssl-1.0.2a/apps/s_server.c
|
|
||||||
--- openssl-1.0.2a/apps/s_server.c.ipv6-apps 2015-04-20 15:01:24.030120127 +0200
|
|
||||||
+++ openssl-1.0.2a/apps/s_server.c 2015-04-20 15:10:47.245187746 +0200
|
|
||||||
@@ -1061,7 +1061,7 @@ int MAIN(int argc, char *argv[])
|
|
||||||
{
|
|
||||||
X509_VERIFY_PARAM *vpm = NULL;
|
|
||||||
int badarg = 0;
|
|
||||||
- short port = PORT;
|
|
||||||
+ char *port_str = PORT_STR;
|
|
||||||
char *CApath = NULL, *CAfile = NULL;
|
|
||||||
char *chCApath = NULL, *chCAfile = NULL;
|
|
||||||
char *vfyCApath = NULL, *vfyCAfile = NULL;
|
|
||||||
@@ -1148,7 +1148,8 @@ int MAIN(int argc, char *argv[])
|
|
||||||
if ((strcmp(*argv, "-port") == 0) || (strcmp(*argv, "-accept") == 0)) {
|
|
||||||
if (--argc < 1)
|
|
||||||
goto bad;
|
|
||||||
- if (!extract_port(*(++argv), &port))
|
|
||||||
+ port_str = *(++argv);
|
|
||||||
+ if (port_str == NULL || *port_str == '\0')
|
|
||||||
goto bad;
|
|
||||||
} else if (strcmp(*argv, "-naccept") == 0) {
|
|
||||||
if (--argc < 1)
|
|
||||||
@@ -2020,13 +2021,13 @@ int MAIN(int argc, char *argv[])
|
|
||||||
BIO_printf(bio_s_out, "ACCEPT\n");
|
|
||||||
(void)BIO_flush(bio_s_out);
|
|
||||||
if (rev)
|
|
||||||
- do_server(port, socket_type, &accept_socket, rev_body, context,
|
|
||||||
+ do_server(port_str, socket_type, &accept_socket, rev_body, context,
|
|
||||||
naccept);
|
|
||||||
else if (www)
|
|
||||||
- do_server(port, socket_type, &accept_socket, www_body, context,
|
|
||||||
+ do_server(port_str, socket_type, &accept_socket, www_body, context,
|
|
||||||
naccept);
|
|
||||||
else
|
|
||||||
- do_server(port, socket_type, &accept_socket, sv_body, context,
|
|
||||||
+ do_server(port_str, socket_type, &accept_socket, sv_body, context,
|
|
||||||
naccept);
|
|
||||||
print_stats(bio_s_out, ctx);
|
|
||||||
ret = 0;
|
|
||||||
diff -up openssl-1.0.2a/apps/s_socket.c.ipv6-apps openssl-1.0.2a/apps/s_socket.c
|
|
||||||
--- openssl-1.0.2a/apps/s_socket.c.ipv6-apps 2015-03-19 14:30:36.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/apps/s_socket.c 2015-04-20 15:32:53.960079507 +0200
|
|
||||||
@@ -106,9 +106,7 @@ static struct hostent *GetHostByName(cha
|
|
||||||
static void ssl_sock_cleanup(void);
|
|
||||||
# endif
|
|
||||||
static int ssl_sock_init(void);
|
|
||||||
-static int init_client_ip(int *sock, unsigned char ip[4], int port, int type);
|
|
||||||
-static int init_server(int *sock, int port, int type);
|
|
||||||
-static int init_server_long(int *sock, int port, char *ip, int type);
|
|
||||||
+static int init_server(int *sock, char *port, int type);
|
|
||||||
static int do_accept(int acc_sock, int *sock, char **host);
|
|
||||||
static int host_ip(char *str, unsigned char ip[4]);
|
|
||||||
|
|
||||||
@@ -231,65 +229,66 @@ static int ssl_sock_init(void)
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
|
|
||||||
-int init_client(int *sock, char *host, int port, int type)
|
|
||||||
+int init_client(int *sock, char *host, char *port, int type)
|
|
||||||
{
|
|
||||||
- unsigned char ip[4];
|
|
||||||
-
|
|
||||||
- memset(ip, '\0', sizeof ip);
|
|
||||||
- if (!host_ip(host, &(ip[0])))
|
|
||||||
- return 0;
|
|
||||||
- return init_client_ip(sock, ip, port, type);
|
|
||||||
-}
|
|
||||||
-
|
|
||||||
-static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
|
|
||||||
-{
|
|
||||||
- unsigned long addr;
|
|
||||||
- struct sockaddr_in them;
|
|
||||||
- int s, i;
|
|
||||||
+ struct addrinfo *res, *res0, hints;
|
|
||||||
+ char *failed_call = NULL;
|
|
||||||
+ int s;
|
|
||||||
+ int e;
|
|
||||||
|
|
||||||
if (!ssl_sock_init())
|
|
||||||
return (0);
|
|
||||||
|
|
||||||
- memset((char *)&them, 0, sizeof(them));
|
|
||||||
- them.sin_family = AF_INET;
|
|
||||||
- them.sin_port = htons((unsigned short)port);
|
|
||||||
- addr = (unsigned long)
|
|
||||||
- ((unsigned long)ip[0] << 24L) |
|
|
||||||
- ((unsigned long)ip[1] << 16L) |
|
|
||||||
- ((unsigned long)ip[2] << 8L) | ((unsigned long)ip[3]);
|
|
||||||
- them.sin_addr.s_addr = htonl(addr);
|
|
||||||
-
|
|
||||||
- if (type == SOCK_STREAM)
|
|
||||||
- s = socket(AF_INET, SOCK_STREAM, SOCKET_PROTOCOL);
|
|
||||||
- else /* ( type == SOCK_DGRAM) */
|
|
||||||
- s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
||||||
-
|
|
||||||
- if (s == INVALID_SOCKET) {
|
|
||||||
- perror("socket");
|
|
||||||
+ memset(&hints, '\0', sizeof(hints));
|
|
||||||
+ hints.ai_socktype = type;
|
|
||||||
+ hints.ai_flags = AI_ADDRCONFIG;
|
|
||||||
+
|
|
||||||
+ e = getaddrinfo(host, port, &hints, &res);
|
|
||||||
+ if (e) {
|
|
||||||
+ fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(e));
|
|
||||||
+ if (e == EAI_SYSTEM)
|
|
||||||
+ perror("getaddrinfo");
|
|
||||||
return (0);
|
|
||||||
}
|
|
||||||
+
|
|
||||||
+ res0 = res;
|
|
||||||
+ while (res) {
|
|
||||||
+ s = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
|
|
||||||
+ if (s == INVALID_SOCKET) {
|
|
||||||
+ failed_call = "socket";
|
|
||||||
+ goto nextres;
|
|
||||||
+ }
|
|
||||||
# if defined(SO_KEEPALIVE) && !defined(OPENSSL_SYS_MPE)
|
|
||||||
- if (type == SOCK_STREAM) {
|
|
||||||
- i = 0;
|
|
||||||
- i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, (char *)&i, sizeof(i));
|
|
||||||
- if (i < 0) {
|
|
||||||
- closesocket(s);
|
|
||||||
- perror("keepalive");
|
|
||||||
- return (0);
|
|
||||||
+ if (type == SOCK_STREAM) {
|
|
||||||
+ int i = 0;
|
|
||||||
+ i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE,
|
|
||||||
+ (char *)&i, sizeof(i));
|
|
||||||
+ if (i < 0) {
|
|
||||||
+ failed_call = "keepalive";
|
|
||||||
+ goto nextres;
|
|
||||||
+ }
|
|
||||||
}
|
|
||||||
- }
|
|
||||||
# endif
|
|
||||||
-
|
|
||||||
- if (connect(s, (struct sockaddr *)&them, sizeof(them)) == -1) {
|
|
||||||
- closesocket(s);
|
|
||||||
- perror("connect");
|
|
||||||
- return (0);
|
|
||||||
+ if (connect(s, (struct sockaddr *)res->ai_addr, res->ai_addrlen) == 0) {
|
|
||||||
+ freeaddrinfo(res0);
|
|
||||||
+ *sock = s;
|
|
||||||
+ return (1);
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ failed_call = "socket";
|
|
||||||
+ nextres:
|
|
||||||
+ if (s != INVALID_SOCKET)
|
|
||||||
+ close(s);
|
|
||||||
+ res = res->ai_next;
|
|
||||||
}
|
|
||||||
- *sock = s;
|
|
||||||
- return (1);
|
|
||||||
+ freeaddrinfo(res0);
|
|
||||||
+ closesocket(s);
|
|
||||||
+
|
|
||||||
+ perror(failed_call);
|
|
||||||
+ return (0);
|
|
||||||
}
|
|
||||||
|
|
||||||
-int do_server(int port, int type, int *ret,
|
|
||||||
+int do_server(char *port, int type, int *ret,
|
|
||||||
int (*cb) (char *hostname, int s, int stype,
|
|
||||||
unsigned char *context), unsigned char *context,
|
|
||||||
int naccept)
|
|
||||||
@@ -328,69 +327,89 @@ int do_server(int port, int type, int *r
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
-static int init_server_long(int *sock, int port, char *ip, int type)
|
|
||||||
+static int init_server(int *sock, char *port, int type)
|
|
||||||
{
|
|
||||||
- int ret = 0;
|
|
||||||
- struct sockaddr_in server;
|
|
||||||
- int s = -1;
|
|
||||||
+ struct addrinfo *res, *res0 = NULL, hints;
|
|
||||||
+ char *failed_call = NULL;
|
|
||||||
+ int s = INVALID_SOCKET;
|
|
||||||
+ int e;
|
|
||||||
|
|
||||||
if (!ssl_sock_init())
|
|
||||||
return (0);
|
|
||||||
|
|
||||||
- memset((char *)&server, 0, sizeof(server));
|
|
||||||
- server.sin_family = AF_INET;
|
|
||||||
- server.sin_port = htons((unsigned short)port);
|
|
||||||
- if (ip == NULL)
|
|
||||||
- server.sin_addr.s_addr = INADDR_ANY;
|
|
||||||
- else
|
|
||||||
-/* Added for T3E, address-of fails on bit field (beckman@acl.lanl.gov) */
|
|
||||||
-# ifndef BIT_FIELD_LIMITS
|
|
||||||
- memcpy(&server.sin_addr.s_addr, ip, 4);
|
|
||||||
-# else
|
|
||||||
- memcpy(&server.sin_addr, ip, 4);
|
|
||||||
-# endif
|
|
||||||
-
|
|
||||||
- if (type == SOCK_STREAM)
|
|
||||||
- s = socket(AF_INET, SOCK_STREAM, SOCKET_PROTOCOL);
|
|
||||||
- else /* type == SOCK_DGRAM */
|
|
||||||
- s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
||||||
+ memset(&hints, '\0', sizeof(hints));
|
|
||||||
+ hints.ai_family = AF_INET6;
|
|
||||||
+ tryipv4:
|
|
||||||
+ hints.ai_socktype = type;
|
|
||||||
+ hints.ai_flags = AI_PASSIVE;
|
|
||||||
+
|
|
||||||
+ e = getaddrinfo(NULL, port, &hints, &res);
|
|
||||||
+ if (e) {
|
|
||||||
+ if (hints.ai_family == AF_INET) {
|
|
||||||
+ fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(e));
|
|
||||||
+ if (e == EAI_SYSTEM)
|
|
||||||
+ perror("getaddrinfo");
|
|
||||||
+ return (0);
|
|
||||||
+ } else
|
|
||||||
+ res = NULL;
|
|
||||||
+ }
|
|
||||||
|
|
||||||
- if (s == INVALID_SOCKET)
|
|
||||||
- goto err;
|
|
||||||
+ res0 = res;
|
|
||||||
+ while (res) {
|
|
||||||
+ s = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
|
|
||||||
+ if (s == INVALID_SOCKET) {
|
|
||||||
+ failed_call = "socket";
|
|
||||||
+ goto nextres;
|
|
||||||
+ }
|
|
||||||
+ if (hints.ai_family == AF_INET6) {
|
|
||||||
+ int j = 0;
|
|
||||||
+ setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, (void *)&j, sizeof j);
|
|
||||||
+ }
|
|
||||||
# if defined SOL_SOCKET && defined SO_REUSEADDR
|
|
||||||
- {
|
|
||||||
- int j = 1;
|
|
||||||
- setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void *)&j, sizeof j);
|
|
||||||
- }
|
|
||||||
-# endif
|
|
||||||
- if (bind(s, (struct sockaddr *)&server, sizeof(server)) == -1) {
|
|
||||||
-# ifndef OPENSSL_SYS_WINDOWS
|
|
||||||
- perror("bind");
|
|
||||||
+ {
|
|
||||||
+ int j = 1;
|
|
||||||
+ setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (void *)&j, sizeof j);
|
|
||||||
+ }
|
|
||||||
# endif
|
|
||||||
- goto err;
|
|
||||||
+
|
|
||||||
+ if (bind(s, (struct sockaddr *)res->ai_addr, res->ai_addrlen) == -1) {
|
|
||||||
+ failed_call = "bind";
|
|
||||||
+ goto nextres;
|
|
||||||
+ }
|
|
||||||
+ if (type == SOCK_STREAM && listen(s, 128) == -1) {
|
|
||||||
+ failed_call = "listen";
|
|
||||||
+ goto nextres;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ *sock = s;
|
|
||||||
+ return (1);
|
|
||||||
+
|
|
||||||
+ nextres:
|
|
||||||
+ if (s != INVALID_SOCKET)
|
|
||||||
+ close(s);
|
|
||||||
+ res = res->ai_next;
|
|
||||||
}
|
|
||||||
- /* Make it 128 for linux */
|
|
||||||
- if (type == SOCK_STREAM && listen(s, 128) == -1)
|
|
||||||
- goto err;
|
|
||||||
- *sock = s;
|
|
||||||
- ret = 1;
|
|
||||||
- err:
|
|
||||||
- if ((ret == 0) && (s != -1)) {
|
|
||||||
- SHUTDOWN(s);
|
|
||||||
+ if (res0)
|
|
||||||
+ freeaddrinfo(res0);
|
|
||||||
+
|
|
||||||
+ if (s == INVALID_SOCKET) {
|
|
||||||
+ if (hints.ai_family == AF_INET6) {
|
|
||||||
+ hints.ai_family = AF_INET;
|
|
||||||
+ goto tryipv4;
|
|
||||||
+ }
|
|
||||||
+ perror("socket");
|
|
||||||
+ return (0);
|
|
||||||
}
|
|
||||||
- return (ret);
|
|
||||||
-}
|
|
||||||
|
|
||||||
-static int init_server(int *sock, int port, int type)
|
|
||||||
-{
|
|
||||||
- return (init_server_long(sock, port, NULL, type));
|
|
||||||
+ perror(failed_call);
|
|
||||||
+ return (0);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int do_accept(int acc_sock, int *sock, char **host)
|
|
||||||
{
|
|
||||||
+ static struct sockaddr_storage from;
|
|
||||||
+ char buffer[NI_MAXHOST];
|
|
||||||
int ret;
|
|
||||||
- struct hostent *h1, *h2;
|
|
||||||
- static struct sockaddr_in from;
|
|
||||||
int len;
|
|
||||||
/* struct linger ling; */
|
|
||||||
|
|
||||||
@@ -432,134 +451,60 @@ static int do_accept(int acc_sock, int *
|
|
||||||
ling.l_onoff=1;
|
|
||||||
ling.l_linger=0;
|
|
||||||
i=setsockopt(ret,SOL_SOCKET,SO_LINGER,(char *)&ling,sizeof(ling));
|
|
||||||
- if (i < 0) { perror("linger"); return(0); }
|
|
||||||
+ if (i < 0) { closesocket(ret); perror("linger"); return(0); }
|
|
||||||
i=0;
|
|
||||||
i=setsockopt(ret,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
|
|
||||||
- if (i < 0) { perror("keepalive"); return(0); }
|
|
||||||
+ if (i < 0) { closesocket(ret); perror("keepalive"); return(0); }
|
|
||||||
*/
|
|
||||||
|
|
||||||
if (host == NULL)
|
|
||||||
goto end;
|
|
||||||
-# ifndef BIT_FIELD_LIMITS
|
|
||||||
- /* I should use WSAAsyncGetHostByName() under windows */
|
|
||||||
- h1 = gethostbyaddr((char *)&from.sin_addr.s_addr,
|
|
||||||
- sizeof(from.sin_addr.s_addr), AF_INET);
|
|
||||||
-# else
|
|
||||||
- h1 = gethostbyaddr((char *)&from.sin_addr,
|
|
||||||
- sizeof(struct in_addr), AF_INET);
|
|
||||||
-# endif
|
|
||||||
- if (h1 == NULL) {
|
|
||||||
- BIO_printf(bio_err, "bad gethostbyaddr\n");
|
|
||||||
+
|
|
||||||
+ if (getnameinfo((struct sockaddr *)&from, sizeof(from),
|
|
||||||
+ buffer, sizeof(buffer), NULL, 0, 0)) {
|
|
||||||
+ BIO_printf(bio_err, "getnameinfo failed\n");
|
|
||||||
*host = NULL;
|
|
||||||
/* return(0); */
|
|
||||||
} else {
|
|
||||||
- if ((*host = (char *)OPENSSL_malloc(strlen(h1->h_name) + 1)) == NULL) {
|
|
||||||
+ if ((*host = (char *)OPENSSL_malloc(strlen(buffer) + 1)) == NULL) {
|
|
||||||
perror("OPENSSL_malloc");
|
|
||||||
closesocket(ret);
|
|
||||||
return (0);
|
|
||||||
}
|
|
||||||
- BUF_strlcpy(*host, h1->h_name, strlen(h1->h_name) + 1);
|
|
||||||
-
|
|
||||||
- h2 = GetHostByName(*host);
|
|
||||||
- if (h2 == NULL) {
|
|
||||||
- BIO_printf(bio_err, "gethostbyname failure\n");
|
|
||||||
- closesocket(ret);
|
|
||||||
- return (0);
|
|
||||||
- }
|
|
||||||
- if (h2->h_addrtype != AF_INET) {
|
|
||||||
- BIO_printf(bio_err, "gethostbyname addr is not AF_INET\n");
|
|
||||||
- closesocket(ret);
|
|
||||||
- return (0);
|
|
||||||
- }
|
|
||||||
+ strcpy(*host, buffer);
|
|
||||||
}
|
|
||||||
end:
|
|
||||||
*sock = ret;
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
|
|
||||||
-int extract_host_port(char *str, char **host_ptr, unsigned char *ip,
|
|
||||||
- short *port_ptr)
|
|
||||||
+int extract_host_port(char *str, char **host_ptr, char **port_ptr)
|
|
||||||
{
|
|
||||||
- char *h, *p;
|
|
||||||
+ char *h, *p, *x;
|
|
||||||
|
|
||||||
- h = str;
|
|
||||||
- p = strchr(str, ':');
|
|
||||||
+ x = h = str;
|
|
||||||
+ if (*h == '[') {
|
|
||||||
+ h++;
|
|
||||||
+ p = strchr(h, ']');
|
|
||||||
+ if (p == NULL) {
|
|
||||||
+ BIO_printf(bio_err, "no ending bracket for IPv6 address\n");
|
|
||||||
+ return (0);
|
|
||||||
+ }
|
|
||||||
+ *(p++) = '\0';
|
|
||||||
+ x = p;
|
|
||||||
+ }
|
|
||||||
+ p = strchr(x, ':');
|
|
||||||
if (p == NULL) {
|
|
||||||
BIO_printf(bio_err, "no port defined\n");
|
|
||||||
return (0);
|
|
||||||
}
|
|
||||||
*(p++) = '\0';
|
|
||||||
|
|
||||||
- if ((ip != NULL) && !host_ip(str, ip))
|
|
||||||
- goto err;
|
|
||||||
if (host_ptr != NULL)
|
|
||||||
*host_ptr = h;
|
|
||||||
+ if (port_ptr != NULL)
|
|
||||||
+ *port_ptr = p;
|
|
||||||
|
|
||||||
- if (!extract_port(p, port_ptr))
|
|
||||||
- goto err;
|
|
||||||
- return (1);
|
|
||||||
- err:
|
|
||||||
- return (0);
|
|
||||||
-}
|
|
||||||
-
|
|
||||||
-static int host_ip(char *str, unsigned char ip[4])
|
|
||||||
-{
|
|
||||||
- unsigned int in[4];
|
|
||||||
- int i;
|
|
||||||
-
|
|
||||||
- if (sscanf(str, "%u.%u.%u.%u", &(in[0]), &(in[1]), &(in[2]), &(in[3])) ==
|
|
||||||
- 4) {
|
|
||||||
- for (i = 0; i < 4; i++)
|
|
||||||
- if (in[i] > 255) {
|
|
||||||
- BIO_printf(bio_err, "invalid IP address\n");
|
|
||||||
- goto err;
|
|
||||||
- }
|
|
||||||
- ip[0] = in[0];
|
|
||||||
- ip[1] = in[1];
|
|
||||||
- ip[2] = in[2];
|
|
||||||
- ip[3] = in[3];
|
|
||||||
- } else { /* do a gethostbyname */
|
|
||||||
- struct hostent *he;
|
|
||||||
-
|
|
||||||
- if (!ssl_sock_init())
|
|
||||||
- return (0);
|
|
||||||
-
|
|
||||||
- he = GetHostByName(str);
|
|
||||||
- if (he == NULL) {
|
|
||||||
- BIO_printf(bio_err, "gethostbyname failure\n");
|
|
||||||
- goto err;
|
|
||||||
- }
|
|
||||||
- /* cast to short because of win16 winsock definition */
|
|
||||||
- if ((short)he->h_addrtype != AF_INET) {
|
|
||||||
- BIO_printf(bio_err, "gethostbyname addr is not AF_INET\n");
|
|
||||||
- return (0);
|
|
||||||
- }
|
|
||||||
- ip[0] = he->h_addr_list[0][0];
|
|
||||||
- ip[1] = he->h_addr_list[0][1];
|
|
||||||
- ip[2] = he->h_addr_list[0][2];
|
|
||||||
- ip[3] = he->h_addr_list[0][3];
|
|
||||||
- }
|
|
||||||
- return (1);
|
|
||||||
- err:
|
|
||||||
- return (0);
|
|
||||||
-}
|
|
||||||
-
|
|
||||||
-int extract_port(char *str, short *port_ptr)
|
|
||||||
-{
|
|
||||||
- int i;
|
|
||||||
- struct servent *s;
|
|
||||||
-
|
|
||||||
- i = atoi(str);
|
|
||||||
- if (i != 0)
|
|
||||||
- *port_ptr = (unsigned short)i;
|
|
||||||
- else {
|
|
||||||
- s = getservbyname(str, "tcp");
|
|
||||||
- if (s == NULL) {
|
|
||||||
- BIO_printf(bio_err, "getservbyname failure for %s\n", str);
|
|
||||||
- return (0);
|
|
||||||
- }
|
|
||||||
- *port_ptr = ntohs((unsigned short)s->s_port);
|
|
||||||
- }
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
|
|
@ -1,11 +0,0 @@
|
|||||||
diff -up openssl-1.0.1k/crypto/x509/x509_cmp.c.issuer-hash openssl-1.0.1k/crypto/x509/x509_cmp.c
|
|
||||||
--- openssl-1.0.1k/crypto/x509/x509_cmp.c.issuer-hash 2015-04-09 18:16:03.349855193 +0200
|
|
||||||
+++ openssl-1.0.1k/crypto/x509/x509_cmp.c 2015-04-09 18:16:00.616792058 +0200
|
|
||||||
@@ -86,6 +86,7 @@ unsigned long X509_issuer_and_serial_has
|
|
||||||
char *f;
|
|
||||||
|
|
||||||
EVP_MD_CTX_init(&ctx);
|
|
||||||
+ EVP_MD_CTX_set_flags(&ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
|
|
||||||
f = X509_NAME_oneline(a->cert_info->issuer, NULL, 0);
|
|
||||||
if (!EVP_DigestInit_ex(&ctx, EVP_md5(), NULL))
|
|
||||||
goto err;
|
|
@ -1,25 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/crypto/asn1/a_verify.c.no-md5-verify openssl-1.0.2a/crypto/asn1/a_verify.c
|
|
||||||
--- openssl-1.0.2a/crypto/asn1/a_verify.c.no-md5-verify 2015-04-09 18:20:58.829680829 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/asn1/a_verify.c 2015-04-09 18:20:54.495580710 +0200
|
|
||||||
@@ -56,6 +56,9 @@
|
|
||||||
* [including the GNU Public Licence.]
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
+
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <time.h>
|
|
||||||
|
|
||||||
@@ -171,6 +174,11 @@ int ASN1_item_verify(const ASN1_ITEM *it
|
|
||||||
if (ret != 2)
|
|
||||||
goto err;
|
|
||||||
ret = -1;
|
|
||||||
+ } else if (mdnid == NID_md5
|
|
||||||
+ && secure_getenv("OPENSSL_ENABLE_MD5_VERIFY") == NULL) {
|
|
||||||
+ ASN1err(ASN1_F_ASN1_ITEM_VERIFY,
|
|
||||||
+ ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM);
|
|
||||||
+ goto err;
|
|
||||||
} else {
|
|
||||||
const EVP_MD *type;
|
|
||||||
type = EVP_get_digestbynid(mdnid);
|
|
@ -1,12 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/Makefile.shared.no-rpath openssl-1.0.2a/Makefile.shared
|
|
||||||
--- openssl-1.0.2a/Makefile.shared.no-rpath 2015-04-09 18:14:39.647921663 +0200
|
|
||||||
+++ openssl-1.0.2a/Makefile.shared 2015-04-09 18:14:34.423800985 +0200
|
|
||||||
@@ -153,7 +153,7 @@ DO_GNU_SO=$(CALC_VERSIONS); \
|
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"
|
|
||||||
|
|
||||||
-DO_GNU_APP=LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBRPATH)"
|
|
||||||
+DO_GNU_APP=LDFLAGS="$(CFLAGS)"
|
|
||||||
|
|
||||||
#This is rather special. It's a special target with which one can link
|
|
||||||
#applications without bothering with any features that have anything to
|
|
@ -1,198 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/engines/e_padlock.c.padlock64 openssl-1.0.2a/engines/e_padlock.c
|
|
||||||
--- openssl-1.0.2a/engines/e_padlock.c.padlock64 2015-03-19 14:19:00.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/engines/e_padlock.c 2015-04-22 16:23:44.105617468 +0200
|
|
||||||
@@ -101,7 +101,10 @@
|
|
||||||
*/
|
|
||||||
# undef COMPILE_HW_PADLOCK
|
|
||||||
# if !defined(I386_ONLY) && !defined(OPENSSL_NO_INLINE_ASM)
|
|
||||||
-# if (defined(__GNUC__) && (defined(__i386__) || defined(__i386))) || \
|
|
||||||
+# if (defined(__GNUC__) && __GNUC__>=2 && \
|
|
||||||
+ (defined(__i386__) || defined(__i386) || \
|
|
||||||
+ defined(__x86_64__) || defined(__x86_64)) \
|
|
||||||
+ ) || \
|
|
||||||
(defined(_MSC_VER) && defined(_M_IX86))
|
|
||||||
# define COMPILE_HW_PADLOCK
|
|
||||||
# endif
|
|
||||||
@@ -140,7 +143,7 @@ void ENGINE_load_padlock(void)
|
|
||||||
# endif
|
|
||||||
# elif defined(__GNUC__)
|
|
||||||
# ifndef alloca
|
|
||||||
-# define alloca(s) __builtin_alloca(s)
|
|
||||||
+# define alloca(s) __builtin_alloca((s))
|
|
||||||
# endif
|
|
||||||
# endif
|
|
||||||
|
|
||||||
@@ -303,6 +306,7 @@ static volatile struct padlock_cipher_da
|
|
||||||
* =======================================================
|
|
||||||
*/
|
|
||||||
# if defined(__GNUC__) && __GNUC__>=2
|
|
||||||
+# if defined(__i386__) || defined(__i386)
|
|
||||||
/*
|
|
||||||
* As for excessive "push %ebx"/"pop %ebx" found all over.
|
|
||||||
* When generating position-independent code GCC won't let
|
|
||||||
@@ -379,22 +383,6 @@ static int padlock_available(void)
|
|
||||||
return padlock_use_ace + padlock_use_rng;
|
|
||||||
}
|
|
||||||
|
|
||||||
-# ifndef OPENSSL_NO_AES
|
|
||||||
-# ifndef AES_ASM
|
|
||||||
-/* Our own htonl()/ntohl() */
|
|
||||||
-static inline void padlock_bswapl(AES_KEY *ks)
|
|
||||||
-{
|
|
||||||
- size_t i = sizeof(ks->rd_key) / sizeof(ks->rd_key[0]);
|
|
||||||
- unsigned int *key = ks->rd_key;
|
|
||||||
-
|
|
||||||
- while (i--) {
|
|
||||||
- asm volatile ("bswapl %0":"+r" (*key));
|
|
||||||
- key++;
|
|
||||||
- }
|
|
||||||
-}
|
|
||||||
-# endif
|
|
||||||
-# endif
|
|
||||||
-
|
|
||||||
/*
|
|
||||||
* Force key reload from memory to the CPU microcode. Loading EFLAGS from the
|
|
||||||
* stack clears EFLAGS[30] which does the trick.
|
|
||||||
@@ -404,7 +392,7 @@ static inline void padlock_reload_key(vo
|
|
||||||
asm volatile ("pushfl; popfl");
|
|
||||||
}
|
|
||||||
|
|
||||||
-# ifndef OPENSSL_NO_AES
|
|
||||||
+# ifndef OPENSSL_NO_AES
|
|
||||||
/*
|
|
||||||
* This is heuristic key context tracing. At first one
|
|
||||||
* believes that one should use atomic swap instructions,
|
|
||||||
@@ -448,6 +436,101 @@ static inline void *name(size_t cnt,
|
|
||||||
: "edx", "cc", "memory"); \
|
|
||||||
return iv; \
|
|
||||||
}
|
|
||||||
+# endif
|
|
||||||
+
|
|
||||||
+# elif defined(__x86_64__) || defined(__x86_64)
|
|
||||||
+
|
|
||||||
+/* Load supported features of the CPU to see if
|
|
||||||
+ the PadLock is available. */
|
|
||||||
+static int padlock_available(void)
|
|
||||||
+{
|
|
||||||
+ char vendor_string[16];
|
|
||||||
+ unsigned int eax, edx;
|
|
||||||
+
|
|
||||||
+ /* Are we running on the Centaur (VIA) CPU? */
|
|
||||||
+ eax = 0x00000000;
|
|
||||||
+ vendor_string[12] = 0;
|
|
||||||
+ asm volatile ("cpuid\n"
|
|
||||||
+ "movl %%ebx,(%1)\n"
|
|
||||||
+ "movl %%edx,4(%1)\n"
|
|
||||||
+ "movl %%ecx,8(%1)\n":"+a" (eax):"r"(vendor_string):"rbx",
|
|
||||||
+ "rcx", "rdx");
|
|
||||||
+ if (strcmp(vendor_string, "CentaurHauls") != 0)
|
|
||||||
+ return 0;
|
|
||||||
+
|
|
||||||
+ /* Check for Centaur Extended Feature Flags presence */
|
|
||||||
+ eax = 0xC0000000;
|
|
||||||
+ asm volatile ("cpuid":"+a" (eax)::"rbx", "rcx", "rdx");
|
|
||||||
+ if (eax < 0xC0000001)
|
|
||||||
+ return 0;
|
|
||||||
+
|
|
||||||
+ /* Read the Centaur Extended Feature Flags */
|
|
||||||
+ eax = 0xC0000001;
|
|
||||||
+ asm volatile ("cpuid":"+a" (eax), "=d"(edx)::"rbx", "rcx");
|
|
||||||
+
|
|
||||||
+ /* Fill up some flags */
|
|
||||||
+ padlock_use_ace = ((edx & (0x3 << 6)) == (0x3 << 6));
|
|
||||||
+ padlock_use_rng = ((edx & (0x3 << 2)) == (0x3 << 2));
|
|
||||||
+
|
|
||||||
+ return padlock_use_ace + padlock_use_rng;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+/* Force key reload from memory to the CPU microcode.
|
|
||||||
+ Loading EFLAGS from the stack clears EFLAGS[30]
|
|
||||||
+ which does the trick. */
|
|
||||||
+static inline void padlock_reload_key(void)
|
|
||||||
+{
|
|
||||||
+ asm volatile ("pushfq; popfq");
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+# ifndef OPENSSL_NO_AES
|
|
||||||
+/*
|
|
||||||
+ * This is heuristic key context tracing. At first one
|
|
||||||
+ * believes that one should use atomic swap instructions,
|
|
||||||
+ * but it's not actually necessary. Point is that if
|
|
||||||
+ * padlock_saved_context was changed by another thread
|
|
||||||
+ * after we've read it and before we compare it with cdata,
|
|
||||||
+ * our key *shall* be reloaded upon thread context switch
|
|
||||||
+ * and we are therefore set in either case...
|
|
||||||
+ */
|
|
||||||
+static inline void padlock_verify_context(struct padlock_cipher_data *cdata)
|
|
||||||
+{
|
|
||||||
+ asm volatile ("pushfq\n"
|
|
||||||
+ " btl $30,(%%rsp)\n"
|
|
||||||
+ " jnc 1f\n"
|
|
||||||
+ " cmpq %2,%1\n"
|
|
||||||
+ " je 1f\n"
|
|
||||||
+ " popfq\n"
|
|
||||||
+ " subq $8,%%rsp\n"
|
|
||||||
+ "1: addq $8,%%rsp\n"
|
|
||||||
+ " movq %2,%0":"+m" (padlock_saved_context)
|
|
||||||
+ :"r"(padlock_saved_context), "r"(cdata):"cc");
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+/* Template for padlock_xcrypt_* modes */
|
|
||||||
+/* BIG FAT WARNING:
|
|
||||||
+ * The offsets used with 'leal' instructions
|
|
||||||
+ * describe items of the 'padlock_cipher_data'
|
|
||||||
+ * structure.
|
|
||||||
+ */
|
|
||||||
+# define PADLOCK_XCRYPT_ASM(name,rep_xcrypt) \
|
|
||||||
+static inline void *name(size_t cnt, \
|
|
||||||
+ struct padlock_cipher_data *cdata, \
|
|
||||||
+ void *out, const void *inp) \
|
|
||||||
+{ void *iv; \
|
|
||||||
+ asm volatile ( "leaq 16(%0),%%rdx\n" \
|
|
||||||
+ " leaq 32(%0),%%rbx\n" \
|
|
||||||
+ rep_xcrypt "\n" \
|
|
||||||
+ : "=a"(iv), "=c"(cnt), "=D"(out), "=S"(inp) \
|
|
||||||
+ : "0"(cdata), "1"(cnt), "2"(out), "3"(inp) \
|
|
||||||
+ : "rbx", "rdx", "cc", "memory"); \
|
|
||||||
+ return iv; \
|
|
||||||
+}
|
|
||||||
+# endif
|
|
||||||
+
|
|
||||||
+# endif /* cpu */
|
|
||||||
+
|
|
||||||
+# ifndef OPENSSL_NO_AES
|
|
||||||
|
|
||||||
/* Generate all functions with appropriate opcodes */
|
|
||||||
/* rep xcryptecb */
|
|
||||||
@@ -458,6 +541,20 @@ PADLOCK_XCRYPT_ASM(padlock_xcrypt_ecb, "
|
|
||||||
PADLOCK_XCRYPT_ASM(padlock_xcrypt_cfb, ".byte 0xf3,0x0f,0xa7,0xe0")
|
|
||||||
/* rep xcryptofb */
|
|
||||||
PADLOCK_XCRYPT_ASM(padlock_xcrypt_ofb, ".byte 0xf3,0x0f,0xa7,0xe8")
|
|
||||||
+
|
|
||||||
+# ifndef AES_ASM
|
|
||||||
+/* Our own htonl()/ntohl() */
|
|
||||||
+static inline void padlock_bswapl(AES_KEY *ks)
|
|
||||||
+{
|
|
||||||
+ size_t i = sizeof(ks->rd_key) / sizeof(ks->rd_key[0]);
|
|
||||||
+ unsigned int *key = ks->rd_key;
|
|
||||||
+
|
|
||||||
+ while (i--) {
|
|
||||||
+ asm volatile ("bswapl %0":"+r" (*key));
|
|
||||||
+ key++;
|
|
||||||
+ }
|
|
||||||
+}
|
|
||||||
+# endif
|
|
||||||
# endif
|
|
||||||
/* The RNG call itself */
|
|
||||||
static inline unsigned int padlock_xstore(void *addr, unsigned int edx_in)
|
|
||||||
@@ -485,8 +582,8 @@ static inline unsigned int padlock_xstor
|
|
||||||
static inline unsigned char *padlock_memcpy(void *dst, const void *src,
|
|
||||||
size_t n)
|
|
||||||
{
|
|
||||||
- long *d = dst;
|
|
||||||
- const long *s = src;
|
|
||||||
+ size_t *d = dst;
|
|
||||||
+ const size_t *s = src;
|
|
||||||
|
|
||||||
n /= sizeof(*d);
|
|
||||||
do {
|
|
@ -1,50 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/README.warning openssl-1.0.2a/README
|
|
||||||
--- openssl-1.0.2a/README.warning 2015-03-20 16:00:47.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/README 2015-03-21 09:06:11.000000000 +0100
|
|
||||||
@@ -5,6 +5,46 @@
|
|
||||||
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
|
||||||
All rights reserved.
|
|
||||||
|
|
||||||
+ WARNING
|
|
||||||
+ -------
|
|
||||||
+
|
|
||||||
+ This version of OpenSSL is built in a way that supports operation in
|
|
||||||
+ the so called FIPS mode. Note though that the library as we build it
|
|
||||||
+ is not FIPS 140-2 validated and the FIPS mode is present for testing
|
|
||||||
+ purposes only.
|
|
||||||
+
|
|
||||||
+ This version also contains a few differences from the upstream code
|
|
||||||
+ some of which are:
|
|
||||||
+ * The FIPS validation support is significantly different from the
|
|
||||||
+ upstream FIPS support. For example the FIPS integrity verification
|
|
||||||
+ check is implemented differently as the FIPS module is built inside
|
|
||||||
+ the shared library. The HMAC-SHA256 checksums of the whole shared
|
|
||||||
+ libraries are verified. Also note that the FIPS integrity
|
|
||||||
+ verification check requires that the libcrypto and libssl shared
|
|
||||||
+ library files are unmodified which means that it will fail if these
|
|
||||||
+ files are changed for example by prelink.
|
|
||||||
+ * If the file /etc/system-fips is present the integrity verification
|
|
||||||
+ and selftests of the crypto algorithms are run inside the library
|
|
||||||
+ constructor code.
|
|
||||||
+ * With the /etc/system-fips present the module respects the kernel
|
|
||||||
+ FIPS flag /proc/sys/crypto/fips and tries to initialize the FIPS mode
|
|
||||||
+ if it is set to 1 aborting if the FIPS mode could not be initialized.
|
|
||||||
+ With the /etc/system-fips present it is also possible to force the
|
|
||||||
+ OpenSSL library to FIPS mode especially for debugging purposes by
|
|
||||||
+ setting the environment variable OPENSSL_FORCE_FIPS_MODE.
|
|
||||||
+ * If the environment variable OPENSSL_NO_DEFAULT_ZLIB is set the module
|
|
||||||
+ will not automatically load the built in compression method ZLIB
|
|
||||||
+ when initialized. Applications can still explicitely ask for ZLIB
|
|
||||||
+ compression method.
|
|
||||||
+ * The library was patched so the certificates, CRLs and other objects
|
|
||||||
+ signed with use of MD5 fail verification as the MD5 is too insecure
|
|
||||||
+ to be used for signatures. If the environment variable
|
|
||||||
+ OPENSSL_ENABLE_MD5_VERIFY is set, the verification can proceed
|
|
||||||
+ normally.
|
|
||||||
+ * If the OPENSSL_ENFORCE_MODULUS_BITS environment variable is set,
|
|
||||||
+ the library will not allow generation of DSA and RSA keys with
|
|
||||||
+ other lengths than specified in the FIPS 186-4 standard.
|
|
||||||
+
|
|
||||||
DESCRIPTION
|
|
||||||
-----------
|
|
||||||
|
|
@ -1,35 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/apps/genrsa.c.x931 openssl-1.0.2a/apps/genrsa.c
|
|
||||||
--- openssl-1.0.2a/apps/genrsa.c.x931 2015-04-09 18:18:24.132107287 +0200
|
|
||||||
+++ openssl-1.0.2a/apps/genrsa.c 2015-04-09 18:18:18.852985339 +0200
|
|
||||||
@@ -97,6 +97,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
int ret = 1;
|
|
||||||
int i, num = DEFBITS;
|
|
||||||
long l;
|
|
||||||
+ int use_x931 = 0;
|
|
||||||
const EVP_CIPHER *enc = NULL;
|
|
||||||
unsigned long f4 = RSA_F4;
|
|
||||||
char *outfile = NULL;
|
|
||||||
@@ -139,6 +140,8 @@ int MAIN(int argc, char **argv)
|
|
||||||
f4 = 3;
|
|
||||||
else if (strcmp(*argv, "-F4") == 0 || strcmp(*argv, "-f4") == 0)
|
|
||||||
f4 = RSA_F4;
|
|
||||||
+ else if (strcmp(*argv, "-x931") == 0)
|
|
||||||
+ use_x931 = 1;
|
|
||||||
# ifndef OPENSSL_NO_ENGINE
|
|
||||||
else if (strcmp(*argv, "-engine") == 0) {
|
|
||||||
if (--argc < 1)
|
|
||||||
@@ -278,7 +281,13 @@ int MAIN(int argc, char **argv)
|
|
||||||
if (!rsa)
|
|
||||||
goto err;
|
|
||||||
|
|
||||||
- if (!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
|
|
||||||
+ if (use_x931) {
|
|
||||||
+ if (!BN_set_word(bn, f4))
|
|
||||||
+ goto err;
|
|
||||||
+ if (!RSA_X931_generate_key_ex(rsa, num, bn, &cb))
|
|
||||||
+ goto err;
|
|
||||||
+ } else if (!BN_set_word(bn, f4)
|
|
||||||
+ || !RSA_generate_key_ex(rsa, num, bn, &cb))
|
|
||||||
goto err;
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
|
@ -1,285 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/Configure.system openssl-1.0.2a/Configure
|
|
||||||
--- openssl-1.0.2a/Configure.system 2015-04-22 15:23:47.970633650 +0200
|
|
||||||
+++ openssl-1.0.2a/Configure 2015-04-22 15:23:48.042635407 +0200
|
|
||||||
@@ -10,7 +10,7 @@ use strict;
|
|
||||||
|
|
||||||
# see INSTALL for instructions.
|
|
||||||
|
|
||||||
-my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [experimental-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-dso] [no-krb5] [sctp] [386] [--prefix=DIR] [--openssldir=OPENSSLDIR] [--with-xxx[=vvv]] [--test-sanity] os/compiler[:flags]\n";
|
|
||||||
+my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [experimental-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-dso] [no-krb5] [sctp] [386] [--prefix=DIR] [--openssldir=OPENSSLDIR] [--system-ciphers-file=SYSTEMCIPHERFILE] [--with-xxx[=vvv]] [--test-sanity] os/compiler[:flags]\n";
|
|
||||||
|
|
||||||
# Options:
|
|
||||||
#
|
|
||||||
@@ -35,6 +35,9 @@ my $usage="Usage: Configure [no-<cipher>
|
|
||||||
# --with-krb5-flavor Declare what flavor of Kerberos 5 is used. Currently
|
|
||||||
# supported values are "MIT" and "Heimdal". A value is required.
|
|
||||||
#
|
|
||||||
+# --system-ciphers-file A file to read cipher string from when the PROFILE=SYSTEM
|
|
||||||
+# cipher is specified (default).
|
|
||||||
+#
|
|
||||||
# --test-sanity Make a number of sanity checks on the data in this file.
|
|
||||||
# This is a debugging tool for OpenSSL developers.
|
|
||||||
#
|
|
||||||
@@ -703,6 +706,7 @@ my $prefix="";
|
|
||||||
my $libdir="";
|
|
||||||
my $openssldir="";
|
|
||||||
my $enginesdir="";
|
|
||||||
+my $system_ciphers_file="";
|
|
||||||
my $exe_ext="";
|
|
||||||
my $install_prefix= "$ENV{'INSTALL_PREFIX'}";
|
|
||||||
my $cross_compile_prefix="";
|
|
||||||
@@ -934,6 +938,10 @@ PROCESS_ARGS:
|
|
||||||
{
|
|
||||||
$enginesdir=$1;
|
|
||||||
}
|
|
||||||
+ elsif (/^--system-ciphers-file=(.*)$/)
|
|
||||||
+ {
|
|
||||||
+ $system_ciphers_file=$1;
|
|
||||||
+ }
|
|
||||||
elsif (/^--install.prefix=(.*)$/)
|
|
||||||
{
|
|
||||||
$install_prefix=$1;
|
|
||||||
@@ -1096,6 +1104,7 @@ print "Configuring for $target\n";
|
|
||||||
|
|
||||||
&usage if (!defined($table{$target}));
|
|
||||||
|
|
||||||
+chop $system_ciphers_file if $system_ciphers_file =~ /\/$/;
|
|
||||||
|
|
||||||
foreach (sort (keys %disabled))
|
|
||||||
{
|
|
||||||
@@ -1668,6 +1677,7 @@ while (<IN>)
|
|
||||||
s/^MULTILIB=.*$/MULTILIB=$multilib/;
|
|
||||||
s/^OPENSSLDIR=.*$/OPENSSLDIR=$openssldir/;
|
|
||||||
s/^ENGINESDIR=.*$/ENGINESDIR=$enginesdir/;
|
|
||||||
+ s/^SYSTEM_CIPHERS_FILE=.*$/SYSTEM_CIPHERS_FILE=$system_ciphers_file/;
|
|
||||||
s/^LIBDIR=.*$/LIBDIR=$libdir/;
|
|
||||||
s/^INSTALL_PREFIX=.*$/INSTALL_PREFIX=$install_prefix/;
|
|
||||||
s/^PLATFORM=.*$/PLATFORM=$target/;
|
|
||||||
@@ -1877,6 +1887,14 @@ while (<IN>)
|
|
||||||
$foo =~ s/\\/\\\\/g;
|
|
||||||
print OUT "#define ENGINESDIR \"$foo\"\n";
|
|
||||||
}
|
|
||||||
+ elsif (/^#((define)|(undef))\s+SYSTEM_CIPHERS_FILE/)
|
|
||||||
+ {
|
|
||||||
+ my $foo = "$system_ciphers_file";
|
|
||||||
+ if ($foo ne '') {
|
|
||||||
+ $foo =~ s/\\/\\\\/g;
|
|
||||||
+ print OUT "#define SYSTEM_CIPHERS_FILE \"$foo\"\n";
|
|
||||||
+ }
|
|
||||||
+ }
|
|
||||||
elsif (/^#((define)|(undef))\s+OPENSSL_EXPORT_VAR_AS_FUNCTION/)
|
|
||||||
{ printf OUT "#undef OPENSSL_EXPORT_VAR_AS_FUNCTION\n"
|
|
||||||
if $export_var_as_fn;
|
|
||||||
diff -up openssl-1.0.2a/crypto/opensslconf.h.in.system openssl-1.0.2a/crypto/opensslconf.h.in
|
|
||||||
--- openssl-1.0.2a/crypto/opensslconf.h.in.system 2015-04-22 15:23:47.988634089 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/opensslconf.h.in 2015-04-22 15:23:48.042635407 +0200
|
|
||||||
@@ -25,6 +25,8 @@
|
|
||||||
#endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
+#undef SYSTEM_CIPHERS_FILE
|
|
||||||
+
|
|
||||||
#undef OPENSSL_UNISTD
|
|
||||||
#define OPENSSL_UNISTD <unistd.h>
|
|
||||||
|
|
||||||
diff -up openssl-1.0.2a/ssl/ssl_ciph.c.system openssl-1.0.2a/ssl/ssl_ciph.c
|
|
||||||
--- openssl-1.0.2a/ssl/ssl_ciph.c.system 2015-04-22 15:23:47.993634211 +0200
|
|
||||||
+++ openssl-1.0.2a/ssl/ssl_ciph.c 2015-04-22 15:29:30.185982356 +0200
|
|
||||||
@@ -1463,6 +1463,50 @@ static int check_suiteb_cipher_list(cons
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
+#ifdef SYSTEM_CIPHERS_FILE
|
|
||||||
+static char *load_system_str(const char *suffix)
|
|
||||||
+{
|
|
||||||
+ FILE *fp;
|
|
||||||
+ char buf[1024];
|
|
||||||
+ char *new_rules;
|
|
||||||
+ unsigned len, slen;
|
|
||||||
+
|
|
||||||
+ fp = fopen(SYSTEM_CIPHERS_FILE, "r");
|
|
||||||
+ if (fp == NULL || fgets(buf, sizeof(buf), fp) == NULL) {
|
|
||||||
+ /* cannot open or file is empty */
|
|
||||||
+ snprintf(buf, sizeof(buf), "%s", SSL_DEFAULT_CIPHER_LIST);
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ if (fp)
|
|
||||||
+ fclose(fp);
|
|
||||||
+
|
|
||||||
+ slen = strlen(suffix);
|
|
||||||
+ len = strlen(buf);
|
|
||||||
+
|
|
||||||
+ if (buf[len - 1] == '\n') {
|
|
||||||
+ len--;
|
|
||||||
+ buf[len] = 0;
|
|
||||||
+ }
|
|
||||||
+ if (buf[len - 1] == '\r') {
|
|
||||||
+ len--;
|
|
||||||
+ buf[len] = 0;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ new_rules = OPENSSL_malloc(len + slen + 1);
|
|
||||||
+ if (new_rules == 0)
|
|
||||||
+ return NULL;
|
|
||||||
+
|
|
||||||
+ memcpy(new_rules, buf, len);
|
|
||||||
+ if (slen > 0) {
|
|
||||||
+ memcpy(&new_rules[len], suffix, slen);
|
|
||||||
+ len += slen;
|
|
||||||
+ }
|
|
||||||
+ new_rules[len] = 0;
|
|
||||||
+
|
|
||||||
+ return new_rules;
|
|
||||||
+}
|
|
||||||
+#endif
|
|
||||||
+
|
|
||||||
STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *ssl_method, STACK_OF(SSL_CIPHER)
|
|
||||||
**cipher_list, STACK_OF(SSL_CIPHER)
|
|
||||||
**cipher_list_by_id,
|
|
||||||
@@ -1471,19 +1515,29 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
|
||||||
int ok, num_of_ciphers, num_of_alias_max, num_of_group_aliases;
|
|
||||||
unsigned long disabled_mkey, disabled_auth, disabled_enc, disabled_mac,
|
|
||||||
disabled_ssl;
|
|
||||||
- STACK_OF(SSL_CIPHER) *cipherstack, *tmp_cipher_list;
|
|
||||||
+ STACK_OF(SSL_CIPHER) *cipherstack = NULL, *tmp_cipher_list;
|
|
||||||
const char *rule_p;
|
|
||||||
CIPHER_ORDER *co_list = NULL, *head = NULL, *tail = NULL, *curr;
|
|
||||||
const SSL_CIPHER **ca_list = NULL;
|
|
||||||
+#ifdef SYSTEM_CIPHERS_FILE
|
|
||||||
+ char *new_rules = NULL;
|
|
||||||
+
|
|
||||||
+ if (rule_str != NULL && strncmp(rule_str, "PROFILE=SYSTEM", 14) == 0) {
|
|
||||||
+ char *p = rule_str + 14;
|
|
||||||
+
|
|
||||||
+ new_rules = load_system_str(p);
|
|
||||||
+ rule_str = new_rules;
|
|
||||||
+ }
|
|
||||||
+#endif
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Return with error if nothing to do.
|
|
||||||
*/
|
|
||||||
if (rule_str == NULL || cipher_list == NULL || cipher_list_by_id == NULL)
|
|
||||||
- return NULL;
|
|
||||||
+ goto end;
|
|
||||||
#ifndef OPENSSL_NO_EC
|
|
||||||
if (!check_suiteb_cipher_list(ssl_method, c, &rule_str))
|
|
||||||
- return NULL;
|
|
||||||
+ goto end;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/*
|
|
||||||
@@ -1507,7 +1561,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
|
||||||
(CIPHER_ORDER *)OPENSSL_malloc(sizeof(CIPHER_ORDER) * num_of_ciphers);
|
|
||||||
if (co_list == NULL) {
|
|
||||||
SSLerr(SSL_F_SSL_CREATE_CIPHER_LIST, ERR_R_MALLOC_FAILURE);
|
|
||||||
- return (NULL); /* Failure */
|
|
||||||
+ goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
ssl_cipher_collect_ciphers(ssl_method, num_of_ciphers,
|
|
||||||
@@ -1568,8 +1622,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
|
||||||
* in force within each class
|
|
||||||
*/
|
|
||||||
if (!ssl_cipher_strength_sort(&head, &tail)) {
|
|
||||||
- OPENSSL_free(co_list);
|
|
||||||
- return NULL;
|
|
||||||
+ goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Now disable everything (maintaining the ordering!) */
|
|
||||||
@@ -1587,9 +1640,8 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
|
||||||
num_of_alias_max = num_of_ciphers + num_of_group_aliases + 1;
|
|
||||||
ca_list = OPENSSL_malloc(sizeof(SSL_CIPHER *) * num_of_alias_max);
|
|
||||||
if (ca_list == NULL) {
|
|
||||||
- OPENSSL_free(co_list);
|
|
||||||
SSLerr(SSL_F_SSL_CREATE_CIPHER_LIST, ERR_R_MALLOC_FAILURE);
|
|
||||||
- return (NULL); /* Failure */
|
|
||||||
+ goto end;
|
|
||||||
}
|
|
||||||
ssl_cipher_collect_aliases(ca_list, num_of_group_aliases,
|
|
||||||
disabled_mkey, disabled_auth, disabled_enc,
|
|
||||||
@@ -1615,8 +1667,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
|
||||||
OPENSSL_free((void *)ca_list); /* Not needed anymore */
|
|
||||||
|
|
||||||
if (!ok) { /* Rule processing failure */
|
|
||||||
- OPENSSL_free(co_list);
|
|
||||||
- return (NULL);
|
|
||||||
+ goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
@@ -1624,8 +1675,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
|
||||||
* if we cannot get one.
|
|
||||||
*/
|
|
||||||
if ((cipherstack = sk_SSL_CIPHER_new_null()) == NULL) {
|
|
||||||
- OPENSSL_free(co_list);
|
|
||||||
- return (NULL);
|
|
||||||
+ goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/*
|
|
||||||
@@ -1646,12 +1696,12 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
}
|
|
||||||
- OPENSSL_free(co_list); /* Not needed any longer */
|
|
||||||
|
|
||||||
tmp_cipher_list = sk_SSL_CIPHER_dup(cipherstack);
|
|
||||||
if (tmp_cipher_list == NULL) {
|
|
||||||
sk_SSL_CIPHER_free(cipherstack);
|
|
||||||
- return NULL;
|
|
||||||
+ cipherstack = NULL;
|
|
||||||
+ goto end;
|
|
||||||
}
|
|
||||||
if (*cipher_list != NULL)
|
|
||||||
sk_SSL_CIPHER_free(*cipher_list);
|
|
||||||
@@ -1663,6 +1713,12 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
|
||||||
ssl_cipher_ptr_id_cmp);
|
|
||||||
|
|
||||||
sk_SSL_CIPHER_sort(*cipher_list_by_id);
|
|
||||||
+
|
|
||||||
+ end:
|
|
||||||
+ OPENSSL_free(co_list);
|
|
||||||
+#ifdef SYSTEM_CIPHERS_FILE
|
|
||||||
+ OPENSSL_free(new_rules);
|
|
||||||
+#endif
|
|
||||||
return (cipherstack);
|
|
||||||
}
|
|
||||||
|
|
||||||
diff -up openssl-1.0.2a/ssl/ssl.h.system openssl-1.0.2a/ssl/ssl.h
|
|
||||||
--- openssl-1.0.2a/ssl/ssl.h.system 2015-04-22 15:23:48.043635431 +0200
|
|
||||||
+++ openssl-1.0.2a/ssl/ssl.h 2015-04-22 15:35:43.666093799 +0200
|
|
||||||
@@ -345,6 +345,11 @@ extern "C" {
|
|
||||||
* throwing out anonymous and unencrypted ciphersuites! (The latter are not
|
|
||||||
* actually enabled by ALL, but "ALL:RSA" would enable some of them.)
|
|
||||||
*/
|
|
||||||
+# ifdef SYSTEM_CIPHERS_FILE
|
|
||||||
+# define SSL_SYSTEM_DEFAULT_CIPHER_LIST "PROFILE=SYSTEM"
|
|
||||||
+# else
|
|
||||||
+# define SSL_SYSTEM_DEFAULT_CIPHER_LIST SSL_DEFAULT_CIPHER_LIST
|
|
||||||
+# endif
|
|
||||||
|
|
||||||
/* Used in SSL_set_shutdown()/SSL_get_shutdown(); */
|
|
||||||
# define SSL_SENT_SHUTDOWN 1
|
|
||||||
diff -up openssl-1.0.2a/ssl/ssl_lib.c.system openssl-1.0.2a/ssl/ssl_lib.c
|
|
||||||
--- openssl-1.0.2a/ssl/ssl_lib.c.system 2015-04-22 15:23:48.044635455 +0200
|
|
||||||
+++ openssl-1.0.2a/ssl/ssl_lib.c 2015-04-22 15:31:55.794534631 +0200
|
|
||||||
@@ -273,7 +273,7 @@ int SSL_CTX_set_ssl_version(SSL_CTX *ctx
|
|
||||||
&(ctx->cipher_list_by_id),
|
|
||||||
meth->version ==
|
|
||||||
SSL2_VERSION ? "SSLv2" :
|
|
||||||
- SSL_DEFAULT_CIPHER_LIST, ctx->cert);
|
|
||||||
+ SSL_SYSTEM_DEFAULT_CIPHER_LIST, ctx->cert);
|
|
||||||
if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= 0)) {
|
|
||||||
SSLerr(SSL_F_SSL_CTX_SET_SSL_VERSION,
|
|
||||||
SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS);
|
|
||||||
@@ -1945,7 +1945,7 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *m
|
|
||||||
ssl_create_cipher_list(ret->method,
|
|
||||||
&ret->cipher_list, &ret->cipher_list_by_id,
|
|
||||||
meth->version ==
|
|
||||||
- SSL2_VERSION ? "SSLv2" : SSL_DEFAULT_CIPHER_LIST,
|
|
||||||
+ SSL2_VERSION ? "SSLv2" : SSL_SYSTEM_DEFAULT_CIPHER_LIST,
|
|
||||||
ret->cert);
|
|
||||||
if (ret->cipher_list == NULL || sk_SSL_CIPHER_num(ret->cipher_list) <= 0) {
|
|
||||||
SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_LIBRARY_HAS_NO_CIPHERS);
|
|
@ -1,21 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/ssl/ssltest.c.use-localhost openssl-1.0.2a/ssl/ssltest.c
|
|
||||||
--- openssl-1.0.2a/ssl/ssltest.c.use-localhost 2015-04-20 14:43:07.172601663 +0200
|
|
||||||
+++ openssl-1.0.2a/ssl/ssltest.c 2015-04-20 14:45:02.831299849 +0200
|
|
||||||
@@ -1516,16 +1516,7 @@ int main(int argc, char *argv[])
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_KRB5
|
|
||||||
if (c_ssl && c_ssl->kssl_ctx) {
|
|
||||||
- char localhost[MAXHOSTNAMELEN + 2];
|
|
||||||
-
|
|
||||||
- if (gethostname(localhost, sizeof localhost - 1) == 0) {
|
|
||||||
- localhost[sizeof localhost - 1] = '\0';
|
|
||||||
- if (strlen(localhost) == sizeof localhost - 1) {
|
|
||||||
- BIO_printf(bio_err, "localhost name too long\n");
|
|
||||||
- goto end;
|
|
||||||
- }
|
|
||||||
- kssl_ctx_setstring(c_ssl->kssl_ctx, KSSL_SERVER, localhost);
|
|
||||||
- }
|
|
||||||
+ kssl_ctx_setstring(c_ssl->kssl_ctx, KSSL_SERVER, "localhost");
|
|
||||||
}
|
|
||||||
#endif /* OPENSSL_NO_KRB5 */
|
|
||||||
|
|
@ -1,47 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/apps/version.c.version-add-engines openssl-1.0.2a/apps/version.c
|
|
||||||
--- openssl-1.0.2a/apps/version.c.version-add-engines 2015-04-09 18:16:42.345756005 +0200
|
|
||||||
+++ openssl-1.0.2a/apps/version.c 2015-04-09 18:16:36.573622667 +0200
|
|
||||||
@@ -131,6 +131,7 @@
|
|
||||||
#ifndef OPENSSL_NO_BF
|
|
||||||
# include <openssl/blowfish.h>
|
|
||||||
#endif
|
|
||||||
+#include <openssl/engine.h>
|
|
||||||
|
|
||||||
#undef PROG
|
|
||||||
#define PROG version_main
|
|
||||||
@@ -140,7 +141,8 @@ int MAIN(int, char **);
|
|
||||||
int MAIN(int argc, char **argv)
|
|
||||||
{
|
|
||||||
int i, ret = 0;
|
|
||||||
- int cflags = 0, version = 0, date = 0, options = 0, platform = 0, dir = 0;
|
|
||||||
+ int cflags = 0, version = 0, date = 0, options = 0, platform = 0, dir =
|
|
||||||
+ 0, engines = 0;
|
|
||||||
|
|
||||||
apps_startup();
|
|
||||||
|
|
||||||
@@ -164,7 +166,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
else if (strcmp(argv[i], "-d") == 0)
|
|
||||||
dir = 1;
|
|
||||||
else if (strcmp(argv[i], "-a") == 0)
|
|
||||||
- date = version = cflags = options = platform = dir = 1;
|
|
||||||
+ date = version = cflags = options = platform = dir = engines = 1;
|
|
||||||
else {
|
|
||||||
BIO_printf(bio_err, "usage:version -[avbofpd]\n");
|
|
||||||
ret = 1;
|
|
||||||
@@ -208,6 +210,16 @@ int MAIN(int argc, char **argv)
|
|
||||||
printf("%s\n", SSLeay_version(SSLEAY_CFLAGS));
|
|
||||||
if (dir)
|
|
||||||
printf("%s\n", SSLeay_version(SSLEAY_DIR));
|
|
||||||
+ if (engines) {
|
|
||||||
+ ENGINE *e;
|
|
||||||
+ printf("engines: ");
|
|
||||||
+ e = ENGINE_get_first();
|
|
||||||
+ while (e) {
|
|
||||||
+ printf("%s ", ENGINE_get_id(e));
|
|
||||||
+ e = ENGINE_get_next(e);
|
|
||||||
+ }
|
|
||||||
+ printf("\n");
|
|
||||||
+ }
|
|
||||||
end:
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
@ -1,83 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/crypto/cversion.c.version openssl-1.0.2a/crypto/cversion.c
|
|
||||||
--- openssl-1.0.2a/crypto/cversion.c.version 2015-03-19 14:30:36.000000000 +0100
|
|
||||||
+++ openssl-1.0.2a/crypto/cversion.c 2015-04-21 16:48:56.285535316 +0200
|
|
||||||
@@ -62,7 +62,7 @@
|
|
||||||
# include "buildinf.h"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
-const char *SSLeay_version(int t)
|
|
||||||
+const char *_current_SSLeay_version(int t)
|
|
||||||
{
|
|
||||||
if (t == SSLEAY_VERSION)
|
|
||||||
return OPENSSL_VERSION_TEXT;
|
|
||||||
@@ -101,7 +101,40 @@ const char *SSLeay_version(int t)
|
|
||||||
return ("not available");
|
|
||||||
}
|
|
||||||
|
|
||||||
-unsigned long SSLeay(void)
|
|
||||||
+const char *_original_SSLeay_version(int t)
|
|
||||||
+{
|
|
||||||
+ if (t == SSLEAY_VERSION)
|
|
||||||
+ return "OpenSSL 1.0.0-fips 29 Mar 2010";
|
|
||||||
+ else
|
|
||||||
+ return _current_SSLeay_version(t);
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+const char *_original101_SSLeay_version(int t)
|
|
||||||
+{
|
|
||||||
+ if (t == SSLEAY_VERSION)
|
|
||||||
+ return "OpenSSL 1.0.1e-fips 11 Feb 2013";
|
|
||||||
+ else
|
|
||||||
+ return _current_SSLeay_version(t);
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+unsigned long _original_SSLeay(void)
|
|
||||||
+{
|
|
||||||
+ return (0x10000003L);
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+unsigned long _original101_SSLeay(void)
|
|
||||||
+{
|
|
||||||
+ return (0x1000105fL);
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+unsigned long _current_SSLeay(void)
|
|
||||||
{
|
|
||||||
return (SSLEAY_VERSION_NUMBER);
|
|
||||||
}
|
|
||||||
+
|
|
||||||
+__asm__(".symver _original_SSLeay,SSLeay@");
|
|
||||||
+__asm__(".symver _original_SSLeay_version,SSLeay_version@");
|
|
||||||
+__asm__(".symver _original101_SSLeay,SSLeay@OPENSSL_1.0.1");
|
|
||||||
+__asm__(".symver _original101_SSLeay_version,SSLeay_version@OPENSSL_1.0.1");
|
|
||||||
+__asm__(".symver _current_SSLeay,SSLeay@@OPENSSL_1.0.2");
|
|
||||||
+__asm__(".symver _current_SSLeay_version,SSLeay_version@@OPENSSL_1.0.2");
|
|
||||||
diff -up openssl-1.0.2a/Makefile.shared.version openssl-1.0.2a/Makefile.shared
|
|
||||||
--- openssl-1.0.2a/Makefile.shared.version 2015-04-21 16:43:02.624170648 +0200
|
|
||||||
+++ openssl-1.0.2a/Makefile.shared 2015-04-21 16:43:02.676171879 +0200
|
|
||||||
@@ -151,7 +151,7 @@ DO_GNU_SO=$(CALC_VERSIONS); \
|
|
||||||
SHLIB_SUFFIX=; \
|
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
|
||||||
- SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"
|
|
||||||
+ SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,--default-symver,--version-script=version.map -Wl,-soname=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"
|
|
||||||
|
|
||||||
DO_GNU_APP=LDFLAGS="$(CFLAGS)"
|
|
||||||
|
|
||||||
diff -up openssl-1.0.2a/version.map.version openssl-1.0.2a/version.map
|
|
||||||
--- openssl-1.0.2a/version.map.version 2015-04-21 16:43:02.676171879 +0200
|
|
||||||
+++ openssl-1.0.2a/version.map 2015-04-21 16:51:49.621630589 +0200
|
|
||||||
@@ -0,0 +1,13 @@
|
|
||||||
+OPENSSL_1.0.1 {
|
|
||||||
+ global:
|
|
||||||
+ SSLeay;
|
|
||||||
+ SSLeay_version;
|
|
||||||
+ local:
|
|
||||||
+ _original*;
|
|
||||||
+ _current*;
|
|
||||||
+};
|
|
||||||
+OPENSSL_1.0.2 {
|
|
||||||
+ global:
|
|
||||||
+ SSLeay;
|
|
||||||
+ SSLeay_version;
|
|
||||||
+} OPENSSL_1.0.1;
|
|
@ -1,28 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/crypto/x509/by_file.c.x509 openssl-1.0.2a/crypto/x509/by_file.c
|
|
||||||
--- openssl-1.0.2a/crypto/x509/by_file.c.x509 2015-04-09 18:16:29.365456157 +0200
|
|
||||||
+++ openssl-1.0.2a/crypto/x509/by_file.c 2015-04-09 18:16:26.398387618 +0200
|
|
||||||
@@ -152,9 +152,12 @@ int X509_load_cert_file(X509_LOOKUP *ctx
|
|
||||||
}
|
|
||||||
}
|
|
||||||
i = X509_STORE_add_cert(ctx->store_ctx, x);
|
|
||||||
- if (!i)
|
|
||||||
- goto err;
|
|
||||||
- count++;
|
|
||||||
+ /* ignore any problems with current certificate
|
|
||||||
+ and continue with the next one */
|
|
||||||
+ if (i)
|
|
||||||
+ count++;
|
|
||||||
+ else
|
|
||||||
+ ERR_clear_error();
|
|
||||||
X509_free(x);
|
|
||||||
x = NULL;
|
|
||||||
}
|
|
||||||
@@ -167,7 +170,7 @@ int X509_load_cert_file(X509_LOOKUP *ctx
|
|
||||||
}
|
|
||||||
i = X509_STORE_add_cert(ctx->store_ctx, x);
|
|
||||||
if (!i)
|
|
||||||
- goto err;
|
|
||||||
+ ERR_clear_error();
|
|
||||||
ret = i;
|
|
||||||
} else {
|
|
||||||
X509err(X509_F_X509_LOAD_CERT_FILE, X509_R_BAD_X509_FILETYPE);
|
|
@ -1,27 +0,0 @@
|
|||||||
diff -up openssl-1.0.2a/apps/s_client.c.starttls openssl-1.0.2a/apps/s_client.c
|
|
||||||
--- openssl-1.0.2a/apps/s_client.c.starttls 2015-04-22 18:23:12.964387157 +0200
|
|
||||||
+++ openssl-1.0.2a/apps/s_client.c 2015-04-22 18:23:56.496414820 +0200
|
|
||||||
@@ -134,7 +134,8 @@
|
|
||||||
* OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
|
|
||||||
* OTHERWISE.
|
|
||||||
*/
|
|
||||||
-
|
|
||||||
+/* for strcasestr */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <assert.h>
|
|
||||||
#include <ctype.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
@@ -1626,8 +1627,11 @@ int MAIN(int argc, char **argv)
|
|
||||||
"xmlns='jabber:client' to='%s' version='1.0'>", host);
|
|
||||||
seen = BIO_read(sbio, mbuf, BUFSIZZ);
|
|
||||||
mbuf[seen] = 0;
|
|
||||||
- while (!strstr
|
|
||||||
- (mbuf, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'")) {
|
|
||||||
+ while (!strcasestr
|
|
||||||
+ (mbuf, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'")
|
|
||||||
+ && !strcasestr(mbuf,
|
|
||||||
+ "<starttls xmlns=\"urn:ietf:params:xml:ns:xmpp-tls\""))
|
|
||||||
+ {
|
|
||||||
if (strstr(mbuf, "/stream:features>"))
|
|
||||||
goto shut;
|
|
||||||
seen = BIO_read(sbio, mbuf, BUFSIZZ);
|
|
@ -1,63 +0,0 @@
|
|||||||
diff -up openssl-1.0.2c/apps/s_server.c.default-paths openssl-1.0.2c/apps/s_server.c
|
|
||||||
--- openssl-1.0.2c/apps/s_server.c.default-paths 2015-06-12 16:51:21.000000000 +0200
|
|
||||||
+++ openssl-1.0.2c/apps/s_server.c 2015-06-15 17:24:17.747446515 +0200
|
|
||||||
@@ -1788,12 +1788,16 @@ int MAIN(int argc, char *argv[])
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
- if ((!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) ||
|
|
||||||
- (!SSL_CTX_set_default_verify_paths(ctx))) {
|
|
||||||
- /* BIO_printf(bio_err,"X509_load_verify_locations\n"); */
|
|
||||||
- ERR_print_errors(bio_err);
|
|
||||||
- /* goto end; */
|
|
||||||
+ if (CAfile == NULL && CApath == NULL) {
|
|
||||||
+ if (!SSL_CTX_set_default_verify_paths(ctx)) {
|
|
||||||
+ ERR_print_errors(bio_err);
|
|
||||||
+ }
|
|
||||||
+ } else {
|
|
||||||
+ if (!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) {
|
|
||||||
+ ERR_print_errors(bio_err);
|
|
||||||
+ }
|
|
||||||
}
|
|
||||||
+
|
|
||||||
if (vpm)
|
|
||||||
SSL_CTX_set1_param(ctx, vpm);
|
|
||||||
|
|
||||||
@@ -1850,8 +1854,10 @@ int MAIN(int argc, char *argv[])
|
|
||||||
else
|
|
||||||
SSL_CTX_sess_set_cache_size(ctx2, 128);
|
|
||||||
|
|
||||||
- if ((!SSL_CTX_load_verify_locations(ctx2, CAfile, CApath)) ||
|
|
||||||
- (!SSL_CTX_set_default_verify_paths(ctx2))) {
|
|
||||||
+ if (!SSL_CTX_load_verify_locations(ctx2, CAfile, CApath)) {
|
|
||||||
+ ERR_print_errors(bio_err);
|
|
||||||
+ }
|
|
||||||
+ if (!SSL_CTX_set_default_verify_paths(ctx2)) {
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
if (vpm)
|
|
||||||
diff -up openssl-1.0.2c/apps/s_time.c.default-paths openssl-1.0.2c/apps/s_time.c
|
|
||||||
--- openssl-1.0.2c/apps/s_time.c.default-paths 2015-06-12 16:51:21.000000000 +0200
|
|
||||||
+++ openssl-1.0.2c/apps/s_time.c 2015-06-15 17:24:17.747446515 +0200
|
|
||||||
@@ -381,13 +381,14 @@ int MAIN(int argc, char **argv)
|
|
||||||
|
|
||||||
SSL_load_error_strings();
|
|
||||||
|
|
||||||
- if ((!SSL_CTX_load_verify_locations(tm_ctx, CAfile, CApath)) ||
|
|
||||||
- (!SSL_CTX_set_default_verify_paths(tm_ctx))) {
|
|
||||||
- /*
|
|
||||||
- * BIO_printf(bio_err,"error setting default verify locations\n");
|
|
||||||
- */
|
|
||||||
- ERR_print_errors(bio_err);
|
|
||||||
- /* goto end; */
|
|
||||||
+ if (CAfile == NULL && CApath == NULL) {
|
|
||||||
+ if (!SSL_CTX_set_default_verify_paths(tm_ctx)) {
|
|
||||||
+ ERR_print_errors(bio_err);
|
|
||||||
+ }
|
|
||||||
+ } else {
|
|
||||||
+ if (!SSL_CTX_load_verify_locations(tm_ctx, CAfile, CApath)) {
|
|
||||||
+ ERR_print_errors(bio_err);
|
|
||||||
+ }
|
|
||||||
}
|
|
||||||
|
|
||||||
if (tm_cipher == NULL)
|
|
@ -1,195 +0,0 @@
|
|||||||
diff -up openssl-1.0.2c/apps/speed.c.suiteb openssl-1.0.2c/apps/speed.c
|
|
||||||
--- openssl-1.0.2c/apps/speed.c.suiteb 2015-06-15 17:37:06.285083685 +0200
|
|
||||||
+++ openssl-1.0.2c/apps/speed.c 2015-06-15 17:37:06.335084836 +0200
|
|
||||||
@@ -996,78 +996,26 @@ int MAIN(int argc, char **argv)
|
|
||||||
} else
|
|
||||||
# endif
|
|
||||||
# ifndef OPENSSL_NO_ECDSA
|
|
||||||
- if (strcmp(*argv, "ecdsap160") == 0)
|
|
||||||
- ecdsa_doit[R_EC_P160] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsap192") == 0)
|
|
||||||
- ecdsa_doit[R_EC_P192] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsap224") == 0)
|
|
||||||
- ecdsa_doit[R_EC_P224] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsap256") == 0)
|
|
||||||
+ if (strcmp(*argv, "ecdsap256") == 0)
|
|
||||||
ecdsa_doit[R_EC_P256] = 2;
|
|
||||||
else if (strcmp(*argv, "ecdsap384") == 0)
|
|
||||||
ecdsa_doit[R_EC_P384] = 2;
|
|
||||||
else if (strcmp(*argv, "ecdsap521") == 0)
|
|
||||||
ecdsa_doit[R_EC_P521] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsak163") == 0)
|
|
||||||
- ecdsa_doit[R_EC_K163] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsak233") == 0)
|
|
||||||
- ecdsa_doit[R_EC_K233] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsak283") == 0)
|
|
||||||
- ecdsa_doit[R_EC_K283] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsak409") == 0)
|
|
||||||
- ecdsa_doit[R_EC_K409] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsak571") == 0)
|
|
||||||
- ecdsa_doit[R_EC_K571] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsab163") == 0)
|
|
||||||
- ecdsa_doit[R_EC_B163] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsab233") == 0)
|
|
||||||
- ecdsa_doit[R_EC_B233] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsab283") == 0)
|
|
||||||
- ecdsa_doit[R_EC_B283] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsab409") == 0)
|
|
||||||
- ecdsa_doit[R_EC_B409] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdsab571") == 0)
|
|
||||||
- ecdsa_doit[R_EC_B571] = 2;
|
|
||||||
else if (strcmp(*argv, "ecdsa") == 0) {
|
|
||||||
- for (i = 0; i < EC_NUM; i++)
|
|
||||||
+ for (i = R_EC_P256; i <= R_EC_P521; i++)
|
|
||||||
ecdsa_doit[i] = 1;
|
|
||||||
} else
|
|
||||||
# endif
|
|
||||||
# ifndef OPENSSL_NO_ECDH
|
|
||||||
- if (strcmp(*argv, "ecdhp160") == 0)
|
|
||||||
- ecdh_doit[R_EC_P160] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhp192") == 0)
|
|
||||||
- ecdh_doit[R_EC_P192] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhp224") == 0)
|
|
||||||
- ecdh_doit[R_EC_P224] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhp256") == 0)
|
|
||||||
+ if (strcmp(*argv, "ecdhp256") == 0)
|
|
||||||
ecdh_doit[R_EC_P256] = 2;
|
|
||||||
else if (strcmp(*argv, "ecdhp384") == 0)
|
|
||||||
ecdh_doit[R_EC_P384] = 2;
|
|
||||||
else if (strcmp(*argv, "ecdhp521") == 0)
|
|
||||||
ecdh_doit[R_EC_P521] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhk163") == 0)
|
|
||||||
- ecdh_doit[R_EC_K163] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhk233") == 0)
|
|
||||||
- ecdh_doit[R_EC_K233] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhk283") == 0)
|
|
||||||
- ecdh_doit[R_EC_K283] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhk409") == 0)
|
|
||||||
- ecdh_doit[R_EC_K409] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhk571") == 0)
|
|
||||||
- ecdh_doit[R_EC_K571] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhb163") == 0)
|
|
||||||
- ecdh_doit[R_EC_B163] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhb233") == 0)
|
|
||||||
- ecdh_doit[R_EC_B233] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhb283") == 0)
|
|
||||||
- ecdh_doit[R_EC_B283] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhb409") == 0)
|
|
||||||
- ecdh_doit[R_EC_B409] = 2;
|
|
||||||
- else if (strcmp(*argv, "ecdhb571") == 0)
|
|
||||||
- ecdh_doit[R_EC_B571] = 2;
|
|
||||||
else if (strcmp(*argv, "ecdh") == 0) {
|
|
||||||
- for (i = 0; i < EC_NUM; i++)
|
|
||||||
+ for (i = R_EC_P256; i <= R_EC_P521; i++)
|
|
||||||
ecdh_doit[i] = 1;
|
|
||||||
} else
|
|
||||||
# endif
|
|
||||||
@@ -1156,21 +1104,11 @@ int MAIN(int argc, char **argv)
|
|
||||||
BIO_printf(bio_err, "dsa512 dsa1024 dsa2048\n");
|
|
||||||
# endif
|
|
||||||
# ifndef OPENSSL_NO_ECDSA
|
|
||||||
- BIO_printf(bio_err, "ecdsap160 ecdsap192 ecdsap224 "
|
|
||||||
- "ecdsap256 ecdsap384 ecdsap521\n");
|
|
||||||
- BIO_printf(bio_err,
|
|
||||||
- "ecdsak163 ecdsak233 ecdsak283 ecdsak409 ecdsak571\n");
|
|
||||||
- BIO_printf(bio_err,
|
|
||||||
- "ecdsab163 ecdsab233 ecdsab283 ecdsab409 ecdsab571\n");
|
|
||||||
+ BIO_printf(bio_err, "ecdsap256 ecdsap384 ecdsap521\n");
|
|
||||||
BIO_printf(bio_err, "ecdsa\n");
|
|
||||||
# endif
|
|
||||||
# ifndef OPENSSL_NO_ECDH
|
|
||||||
- BIO_printf(bio_err, "ecdhp160 ecdhp192 ecdhp224 "
|
|
||||||
- "ecdhp256 ecdhp384 ecdhp521\n");
|
|
||||||
- BIO_printf(bio_err,
|
|
||||||
- "ecdhk163 ecdhk233 ecdhk283 ecdhk409 ecdhk571\n");
|
|
||||||
- BIO_printf(bio_err,
|
|
||||||
- "ecdhb163 ecdhb233 ecdhb283 ecdhb409 ecdhb571\n");
|
|
||||||
+ BIO_printf(bio_err, "ecdhp256 ecdhp384 ecdhp521\n");
|
|
||||||
BIO_printf(bio_err, "ecdh\n");
|
|
||||||
# endif
|
|
||||||
|
|
||||||
@@ -1255,11 +1193,11 @@ int MAIN(int argc, char **argv)
|
|
||||||
if (!FIPS_mode() || i != R_DSA_512)
|
|
||||||
dsa_doit[i] = 1;
|
|
||||||
# ifndef OPENSSL_NO_ECDSA
|
|
||||||
- for (i = 0; i < EC_NUM; i++)
|
|
||||||
+ for (i = R_EC_P256; i <= R_EC_P521; i++)
|
|
||||||
ecdsa_doit[i] = 1;
|
|
||||||
# endif
|
|
||||||
# ifndef OPENSSL_NO_ECDH
|
|
||||||
- for (i = 0; i < EC_NUM; i++)
|
|
||||||
+ for (i = R_EC_P256; i <= R_EC_P521; i++)
|
|
||||||
ecdh_doit[i] = 1;
|
|
||||||
# endif
|
|
||||||
}
|
|
||||||
diff -up openssl-1.0.2c/ssl/t1_lib.c.suiteb openssl-1.0.2c/ssl/t1_lib.c
|
|
||||||
--- openssl-1.0.2c/ssl/t1_lib.c.suiteb 2015-06-12 16:51:27.000000000 +0200
|
|
||||||
+++ openssl-1.0.2c/ssl/t1_lib.c 2015-06-15 17:44:03.578681271 +0200
|
|
||||||
@@ -268,11 +268,7 @@ static const unsigned char eccurves_auto
|
|
||||||
0, 23, /* secp256r1 (23) */
|
|
||||||
/* Other >= 256-bit prime curves. */
|
|
||||||
0, 25, /* secp521r1 (25) */
|
|
||||||
- 0, 28, /* brainpool512r1 (28) */
|
|
||||||
- 0, 27, /* brainpoolP384r1 (27) */
|
|
||||||
0, 24, /* secp384r1 (24) */
|
|
||||||
- 0, 26, /* brainpoolP256r1 (26) */
|
|
||||||
- 0, 22, /* secp256k1 (22) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
/* >= 256-bit binary curves. */
|
|
||||||
0, 14, /* sect571r1 (14) */
|
|
||||||
@@ -289,11 +285,7 @@ static const unsigned char eccurves_all[
|
|
||||||
0, 23, /* secp256r1 (23) */
|
|
||||||
/* Other >= 256-bit prime curves. */
|
|
||||||
0, 25, /* secp521r1 (25) */
|
|
||||||
- 0, 28, /* brainpool512r1 (28) */
|
|
||||||
- 0, 27, /* brainpoolP384r1 (27) */
|
|
||||||
0, 24, /* secp384r1 (24) */
|
|
||||||
- 0, 26, /* brainpoolP256r1 (26) */
|
|
||||||
- 0, 22, /* secp256k1 (22) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
/* >= 256-bit binary curves. */
|
|
||||||
0, 14, /* sect571r1 (14) */
|
|
||||||
@@ -307,13 +299,6 @@ static const unsigned char eccurves_all[
|
|
||||||
* Remaining curves disabled by default but still permitted if set
|
|
||||||
* via an explicit callback or parameters.
|
|
||||||
*/
|
|
||||||
- 0, 20, /* secp224k1 (20) */
|
|
||||||
- 0, 21, /* secp224r1 (21) */
|
|
||||||
- 0, 18, /* secp192k1 (18) */
|
|
||||||
- 0, 19, /* secp192r1 (19) */
|
|
||||||
- 0, 15, /* secp160k1 (15) */
|
|
||||||
- 0, 16, /* secp160r1 (16) */
|
|
||||||
- 0, 17, /* secp160r2 (17) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
0, 8, /* sect239k1 (8) */
|
|
||||||
0, 6, /* sect233k1 (6) */
|
|
||||||
@@ -348,29 +333,21 @@ static const unsigned char fips_curves_d
|
|
||||||
0, 9, /* sect283k1 (9) */
|
|
||||||
0, 10, /* sect283r1 (10) */
|
|
||||||
# endif
|
|
||||||
- 0, 22, /* secp256k1 (22) */
|
|
||||||
0, 23, /* secp256r1 (23) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
0, 8, /* sect239k1 (8) */
|
|
||||||
0, 6, /* sect233k1 (6) */
|
|
||||||
0, 7, /* sect233r1 (7) */
|
|
||||||
# endif
|
|
||||||
- 0, 20, /* secp224k1 (20) */
|
|
||||||
- 0, 21, /* secp224r1 (21) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
0, 4, /* sect193r1 (4) */
|
|
||||||
0, 5, /* sect193r2 (5) */
|
|
||||||
# endif
|
|
||||||
- 0, 18, /* secp192k1 (18) */
|
|
||||||
- 0, 19, /* secp192r1 (19) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
0, 1, /* sect163k1 (1) */
|
|
||||||
0, 2, /* sect163r1 (2) */
|
|
||||||
0, 3, /* sect163r2 (3) */
|
|
||||||
# endif
|
|
||||||
- 0, 15, /* secp160k1 (15) */
|
|
||||||
- 0, 16, /* secp160r1 (16) */
|
|
||||||
- 0, 17, /* secp160r2 (17) */
|
|
||||||
};
|
|
||||||
# endif
|
|
||||||
|
|
@ -1,82 +0,0 @@
|
|||||||
diff -up openssl-1.0.2d/crypto/ec/ec_curve.c.secp256k1 openssl-1.0.2d/crypto/ec/ec_curve.c
|
|
||||||
--- openssl-1.0.2d/crypto/ec/ec_curve.c.secp256k1 2015-08-12 14:55:15.203415420 -0400
|
|
||||||
+++ openssl-1.0.2d/crypto/ec/ec_curve.c 2015-08-12 15:07:12.659113262 -0400
|
|
||||||
@@ -86,6 +86,42 @@ typedef struct {
|
|
||||||
unsigned int cofactor; /* promoted to BN_ULONG */
|
|
||||||
} EC_CURVE_DATA;
|
|
||||||
|
|
||||||
+static const struct {
|
|
||||||
+ EC_CURVE_DATA h;
|
|
||||||
+ unsigned char data[0 + 32 * 6];
|
|
||||||
+} _EC_SECG_PRIME_256K1 = {
|
|
||||||
+ {
|
|
||||||
+ NID_X9_62_prime_field, 0, 32, 1
|
|
||||||
+ },
|
|
||||||
+ {
|
|
||||||
+ /* no seed */
|
|
||||||
+ /* p */
|
|
||||||
+ 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
||||||
+ 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
||||||
+ 0xFF, 0xFF, 0xFF, 0xFE, 0xFF, 0xFF, 0xFC, 0x2F,
|
|
||||||
+ /* a */
|
|
||||||
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
||||||
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
||||||
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
||||||
+ /* b */
|
|
||||||
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
||||||
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
||||||
+ 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x07,
|
|
||||||
+ /* x */
|
|
||||||
+ 0x79, 0xBE, 0x66, 0x7E, 0xF9, 0xDC, 0xBB, 0xAC, 0x55, 0xA0, 0x62, 0x95,
|
|
||||||
+ 0xCE, 0x87, 0x0B, 0x07, 0x02, 0x9B, 0xFC, 0xDB, 0x2D, 0xCE, 0x28, 0xD9,
|
|
||||||
+ 0x59, 0xF2, 0x81, 0x5B, 0x16, 0xF8, 0x17, 0x98,
|
|
||||||
+ /* y */
|
|
||||||
+ 0x48, 0x3a, 0xda, 0x77, 0x26, 0xa3, 0xc4, 0x65, 0x5d, 0xa4, 0xfb, 0xfc,
|
|
||||||
+ 0x0e, 0x11, 0x08, 0xa8, 0xfd, 0x17, 0xb4, 0x48, 0xa6, 0x85, 0x54, 0x19,
|
|
||||||
+ 0x9c, 0x47, 0xd0, 0x8f, 0xfb, 0x10, 0xd4, 0xb8,
|
|
||||||
+ /* order */
|
|
||||||
+ 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
|
|
||||||
+ 0xFF, 0xFF, 0xFF, 0xFE, 0xBA, 0xAE, 0xDC, 0xE6, 0xAF, 0x48, 0xA0, 0x3B,
|
|
||||||
+ 0xBF, 0xD2, 0x5E, 0x8C, 0xD0, 0x36, 0x41, 0x41
|
|
||||||
+ }
|
|
||||||
+};
|
|
||||||
+
|
|
||||||
/* the nist prime curves */
|
|
||||||
static const struct {
|
|
||||||
EC_CURVE_DATA h;
|
|
||||||
@@ -235,6 +271,8 @@ typedef struct _ec_list_element_st {
|
|
||||||
static const ec_list_element curve_list[] = {
|
|
||||||
/* prime field curves */
|
|
||||||
/* secg curves */
|
|
||||||
+ {NID_secp256k1, &_EC_SECG_PRIME_256K1.h, 0,
|
|
||||||
+ "SECG curve over a 256 bit prime field"},
|
|
||||||
/* SECG secp256r1 is the same as X9.62 prime256v1 and hence omitted */
|
|
||||||
{NID_secp384r1, &_EC_NIST_PRIME_384.h, 0,
|
|
||||||
"NIST/SECG curve over a 384 bit prime field"},
|
|
||||||
diff -up openssl-1.0.2d/ssl/t1_lib.c.secp256k1 openssl-1.0.2d/ssl/t1_lib.c
|
|
||||||
--- openssl-1.0.2d/ssl/t1_lib.c.secp256k1 2015-08-12 15:04:42.876925441 -0400
|
|
||||||
+++ openssl-1.0.2d/ssl/t1_lib.c 2015-08-12 15:04:47.837699822 -0400
|
|
||||||
@@ -269,6 +269,7 @@ static const unsigned char eccurves_auto
|
|
||||||
/* Other >= 256-bit prime curves. */
|
|
||||||
0, 25, /* secp521r1 (25) */
|
|
||||||
0, 24, /* secp384r1 (24) */
|
|
||||||
+ 0, 22, /* secp256k1 (22) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
/* >= 256-bit binary curves. */
|
|
||||||
0, 14, /* sect571r1 (14) */
|
|
||||||
@@ -286,6 +287,7 @@ static const unsigned char eccurves_all[
|
|
||||||
/* Other >= 256-bit prime curves. */
|
|
||||||
0, 25, /* secp521r1 (25) */
|
|
||||||
0, 24, /* secp384r1 (24) */
|
|
||||||
+ 0, 22, /* secp256k1 (22) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
/* >= 256-bit binary curves. */
|
|
||||||
0, 14, /* sect571r1 (14) */
|
|
||||||
@@ -333,6 +335,7 @@ static const unsigned char fips_curves_d
|
|
||||||
0, 9, /* sect283k1 (9) */
|
|
||||||
0, 10, /* sect283r1 (10) */
|
|
||||||
# endif
|
|
||||||
+ 0, 22, /* secp256k1 (22) */
|
|
||||||
0, 23, /* secp256r1 (23) */
|
|
||||||
# ifndef OPENSSL_NO_EC2M
|
|
||||||
0, 8, /* sect239k1 (8) */
|
|
@ -1,15 +0,0 @@
|
|||||||
diff -up openssl-1.0.2e/crypto/ec/ec.h.nistp224 openssl-1.0.2e/crypto/ec/ec.h
|
|
||||||
--- openssl-1.0.2e/crypto/ec/ec.h.nistp224 2015-12-04 14:00:57.000000000 +0100
|
|
||||||
+++ openssl-1.0.2e/crypto/ec/ec.h 2015-12-08 15:51:37.046747916 +0100
|
|
||||||
@@ -149,11 +149,6 @@ const EC_METHOD *EC_GFp_mont_method(void
|
|
||||||
const EC_METHOD *EC_GFp_nist_method(void);
|
|
||||||
|
|
||||||
# ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
|
|
||||||
-/** Returns 64-bit optimized methods for nistp224
|
|
||||||
- * \return EC_METHOD object
|
|
||||||
- */
|
|
||||||
-const EC_METHOD *EC_GFp_nistp224_method(void);
|
|
||||||
-
|
|
||||||
/** Returns 64-bit optimized methods for nistp256
|
|
||||||
* \return EC_METHOD object
|
|
||||||
*/
|
|
@ -1,115 +0,0 @@
|
|||||||
diff -up openssl-1.0.2e/Configure.rpmbuild openssl-1.0.2e/Configure
|
|
||||||
--- openssl-1.0.2e/Configure.rpmbuild 2015-12-03 15:04:23.000000000 +0100
|
|
||||||
+++ openssl-1.0.2e/Configure 2015-12-04 13:20:22.996835604 +0100
|
|
||||||
@@ -365,8 +365,8 @@ my %table=(
|
|
||||||
####
|
|
||||||
# *-generic* is endian-neutral target, but ./config is free to
|
|
||||||
# throw in -D[BL]_ENDIAN, whichever appropriate...
|
|
||||||
-"linux-generic32","gcc:-O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
-"linux-ppc", "gcc:-DB_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${ppc32_asm}:linux32:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
+"linux-generic32","gcc:-Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER)",
|
|
||||||
+"linux-ppc", "gcc:-DB_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${ppc32_asm}:linux32:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER)",
|
|
||||||
|
|
||||||
#######################################################################
|
|
||||||
# Note that -march is not among compiler options in below linux-armv4
|
|
||||||
@@ -395,31 +395,31 @@ my %table=(
|
|
||||||
#
|
|
||||||
# ./Configure linux-armv4 -march=armv6 -D__ARM_MAX_ARCH__=8
|
|
||||||
#
|
|
||||||
-"linux-armv4", "gcc: -O3 -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${armv4_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
-"linux-aarch64","gcc: -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${aarch64_asm}:linux64:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
+"linux-armv4", "gcc:-Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${armv4_asm}:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER)",
|
|
||||||
+"linux-aarch64","gcc:-DL_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${aarch64_asm}:linux64:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::64",
|
|
||||||
# Configure script adds minimally required -march for assembly support,
|
|
||||||
# if no -march was specified at command line. mips32 and mips64 below
|
|
||||||
# refer to contemporary MIPS Architecture specifications, MIPS32 and
|
|
||||||
# MIPS64, rather than to kernel bitness.
|
|
||||||
-"linux-mips32", "gcc:-mabi=32 -O3 -Wall -DBN_DIV3W::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${mips32_asm}:o32:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
-"linux-mips64", "gcc:-mabi=n32 -O3 -Wall -DBN_DIV3W::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${mips64_asm}:n32:dlfcn:linux-shared:-fPIC:-mabi=n32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::32",
|
|
||||||
-"linux64-mips64", "gcc:-mabi=64 -O3 -Wall -DBN_DIV3W::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${mips64_asm}:64:dlfcn:linux-shared:-fPIC:-mabi=64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
|
|
||||||
+"linux-mips32", "gcc:-mabi=32 -Wall \$(RPM_OPT_FLAGS) -DBN_DIV3W::-D_REENTRANT::-Wl,-z,relro -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${mips32_asm}:o32:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER)",
|
|
||||||
+"linux-mips64", "gcc:-mabi=n32 -Wall \$(RPM_OPT_FLAGS) -DBN_DIV3W::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${mips64_asm}:n32:dlfcn:linux-shared:-fPIC:-mabi=n32 \$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::32",
|
|
||||||
+"linux64-mips64", "gcc:-mabi=64 -Wall \$(RPM_OPT_FLAGS) -DBN_DIV3W::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${mips64_asm}:64:dlfcn:linux-shared:-fPIC:-mabi=64 \$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::64",
|
|
||||||
#### IA-32 targets...
|
|
||||||
"linux-ia32-icc", "icc:-DL_ENDIAN -O2::-D_REENTRANT::-ldl -no_cpprt:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-KPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
-"linux-elf", "gcc:-DL_ENDIAN -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::-ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
+"linux-elf", "gcc:-DL_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER)",
|
|
||||||
"linux-aout", "gcc:-DL_ENDIAN -O3 -fomit-frame-pointer -march=i486 -Wall::(unknown):::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_asm}:a.out",
|
|
||||||
####
|
|
||||||
-"linux-generic64","gcc:-O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
-"linux-ppc64", "gcc:-m64 -DB_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${ppc64_asm}:linux64:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
|
|
||||||
-"linux-ppc64le","gcc:-m64 -DL_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:$ppc64_asm:linux64le:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::",
|
|
||||||
-"linux-ia64", "gcc:-DL_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_UNROLL DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
+"linux-generic64","gcc:-Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::64",
|
|
||||||
+"linux-ppc64", "gcc:-m64 -DB_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:${ppc64_asm}:linux64:dlfcn:linux-shared:-fPIC:-m64 \$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::64",
|
|
||||||
+"linux-ppc64le","gcc:-m64 -DL_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL:$ppc64_asm:linux64le:dlfcn:linux-shared:-fPIC:-m64 \$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::64",
|
|
||||||
+"linux-ia64", "gcc:-DL_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_UNROLL DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER)",
|
|
||||||
"linux-ia64-icc","icc:-DL_ENDIAN -O2 -Wall::-D_REENTRANT::-ldl -no_cpprt:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_RISC1 DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
-"linux-x86_64", "gcc:-m64 -DL_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
|
|
||||||
+"linux-x86_64", "gcc:-m64 -DL_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64 \$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::64",
|
|
||||||
"linux-x86_64-clang", "clang: -m64 -DL_ENDIAN -O3 -Wall -Wextra $clang_disabled_warnings -Qunused-arguments::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
|
|
||||||
"debug-linux-x86_64-clang", "clang: -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -m64 -DL_ENDIAN -g -Wall -Wextra $clang_disabled_warnings -Qunused-arguments::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
|
|
||||||
"linux-x86_64-icc", "icc:-DL_ENDIAN -O2::-D_REENTRANT::-ldl -no_cpprt:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
|
|
||||||
"linux-x32", "gcc:-mx32 -DL_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-mx32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::x32",
|
|
||||||
-"linux64-s390x", "gcc:-m64 -DB_ENDIAN -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:${s390x_asm}:64:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
|
|
||||||
+"linux64-s390x", "gcc:-m64 -DB_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT::-Wl,-z,relro -ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:${s390x_asm}:64:dlfcn:linux-shared:-fPIC:-m64 \$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::64",
|
|
||||||
#### So called "highgprs" target for z/Architecture CPUs
|
|
||||||
# "Highgprs" is kernel feature first implemented in Linux 2.6.32, see
|
|
||||||
# /proc/cpuinfo. The idea is to preserve most significant bits of
|
|
||||||
@@ -437,12 +437,12 @@ my %table=(
|
|
||||||
#### SPARC Linux setups
|
|
||||||
# Ray Miller <ray.miller@computing-services.oxford.ac.uk> has patiently
|
|
||||||
# assisted with debugging of following two configs.
|
|
||||||
-"linux-sparcv8","gcc:-mcpu=v8 -DB_ENDIAN -O3 -fomit-frame-pointer -Wall -DBN_DIV2W::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
+"linux-sparcv8","gcc:-mcpu=v8 -DB_ENDIAN -Wall \$(RPM_OPT_FLAGS) -DBN_DIV2W::-D_REENTRANT::-Wl,-z,relro -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv8_asm}:dlfcn:linux-shared:-fPIC:\$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER)",
|
|
||||||
# it's a real mess with -mcpu=ultrasparc option under Linux, but
|
|
||||||
# -Wa,-Av8plus should do the trick no matter what.
|
|
||||||
-"linux-sparcv9","gcc:-m32 -mcpu=ultrasparc -DB_ENDIAN -O3 -fomit-frame-pointer -Wall -Wa,-Av8plus -DBN_DIV2W::-D_REENTRANT:ULTRASPARC:-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:linux-shared:-fPIC:-m32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)",
|
|
||||||
+"linux-sparcv9","gcc:-m32 -mcpu=ultrasparc -DB_ENDIAN -Wall \$(RPM_OPT_FLAGS) -Wa,-Av8plus -DBN_DIV2W::-D_REENTRANT:ULTRASPARC:-Wl,-z,relro -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:linux-shared:-fPIC:-m32 \$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER)",
|
|
||||||
# GCC 3.1 is a requirement
|
|
||||||
-"linux64-sparcv9","gcc:-m64 -mcpu=ultrasparc -DB_ENDIAN -O3 -fomit-frame-pointer -Wall::-D_REENTRANT:ULTRASPARC:-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64",
|
|
||||||
+"linux64-sparcv9","gcc:-m64 -mcpu=ultrasparc -DB_ENDIAN -Wall \$(RPM_OPT_FLAGS)::-D_REENTRANT:ULTRASPARC:-Wl,-z,relro -ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_PTR DES_RISC1 DES_UNROLL BF_PTR:${sparcv9_asm}:dlfcn:linux-shared:-fPIC:-m64 \$(RPM_OPT_FLAGS):.so.\$(SHLIB_SONAMEVER):::64",
|
|
||||||
#### Alpha Linux with GNU C and Compaq C setups
|
|
||||||
# Special notes:
|
|
||||||
# - linux-alpha+bwx-gcc is ment to be used from ./config only. If you
|
|
||||||
@@ -1767,7 +1767,7 @@ while (<IN>)
|
|
||||||
elsif ($shared_extension ne "" && $shared_extension =~ /^\.s([ol])\.[^\.]*\.[^\.]*$/)
|
|
||||||
{
|
|
||||||
my $sotmp = $1;
|
|
||||||
- s/^SHARED_LIBS_LINK_EXTS=.*/SHARED_LIBS_LINK_EXTS=.s$sotmp.\$(SHLIB_MAJOR) .s$sotmp/;
|
|
||||||
+ s/^SHARED_LIBS_LINK_EXTS=.*/SHARED_LIBS_LINK_EXTS=.s$sotmp.\$(SHLIB_SONAMEVER) .s$sotmp/;
|
|
||||||
}
|
|
||||||
elsif ($shared_extension ne "" && $shared_extension =~ /^\.[^\.]*\.[^\.]*\.dylib$/)
|
|
||||||
{
|
|
||||||
diff -up openssl-1.0.2e/Makefile.org.rpmbuild openssl-1.0.2e/Makefile.org
|
|
||||||
--- openssl-1.0.2e/Makefile.org.rpmbuild 2015-12-03 15:04:23.000000000 +0100
|
|
||||||
+++ openssl-1.0.2e/Makefile.org 2015-12-04 13:18:44.913538616 +0100
|
|
||||||
@@ -10,6 +10,7 @@ SHLIB_VERSION_HISTORY=
|
|
||||||
SHLIB_MAJOR=
|
|
||||||
SHLIB_MINOR=
|
|
||||||
SHLIB_EXT=
|
|
||||||
+SHLIB_SONAMEVER=10
|
|
||||||
PLATFORM=dist
|
|
||||||
OPTIONS=
|
|
||||||
CONFIGURE_ARGS=
|
|
||||||
@@ -341,10 +342,9 @@ clean-shared:
|
|
||||||
link-shared:
|
|
||||||
@ set -e; for i in $(SHLIBDIRS); do \
|
|
||||||
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
|
||||||
- LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
|
||||||
+ LIBNAME=$$i LIBVERSION=$(SHLIB_SONAMEVER) \
|
|
||||||
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
|
||||||
symlink.$(SHLIB_TARGET); \
|
|
||||||
- libs="$$libs -l$$i"; \
|
|
||||||
done
|
|
||||||
|
|
||||||
build-shared: do_$(SHLIB_TARGET) link-shared
|
|
||||||
@@ -355,7 +355,7 @@ do_$(SHLIB_TARGET):
|
|
||||||
libs="$(LIBKRB5) $$libs"; \
|
|
||||||
fi; \
|
|
||||||
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
|
||||||
- LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
|
||||||
+ LIBNAME=$$i LIBVERSION=$(SHLIB_SONAMEVER) \
|
|
||||||
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
|
||||||
LIBDEPS="$$libs $(EX_LIBS)" \
|
|
||||||
link_a.$(SHLIB_TARGET); \
|
|
@ -1,58 +0,0 @@
|
|||||||
diff -up openssl-1.0.2e/apps/speed.c.speed-doc openssl-1.0.2e/apps/speed.c
|
|
||||||
--- openssl-1.0.2e/apps/speed.c.speed-doc 2015-12-04 14:00:58.000000000 +0100
|
|
||||||
+++ openssl-1.0.2e/apps/speed.c 2016-01-15 14:15:56.482343557 +0100
|
|
||||||
@@ -648,10 +648,6 @@ int MAIN(int argc, char **argv)
|
|
||||||
# endif
|
|
||||||
int multiblock = 0;
|
|
||||||
|
|
||||||
-# ifndef TIMES
|
|
||||||
- usertime = -1;
|
|
||||||
-# endif
|
|
||||||
-
|
|
||||||
apps_startup();
|
|
||||||
memset(results, 0, sizeof(results));
|
|
||||||
# ifndef OPENSSL_NO_DSA
|
|
||||||
@@ -1145,10 +1141,8 @@ int MAIN(int argc, char **argv)
|
|
||||||
|
|
||||||
BIO_printf(bio_err, "\n");
|
|
||||||
BIO_printf(bio_err, "Available options:\n");
|
|
||||||
-# if defined(TIMES) || defined(USE_TOD)
|
|
||||||
BIO_printf(bio_err, "-elapsed "
|
|
||||||
"measure time in real time instead of CPU user time.\n");
|
|
||||||
-# endif
|
|
||||||
# ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"-engine e "
|
|
||||||
diff -up openssl-1.0.2e/doc/apps/speed.pod.speed-doc openssl-1.0.2e/doc/apps/speed.pod
|
|
||||||
--- openssl-1.0.2e/doc/apps/speed.pod.speed-doc 2015-12-03 14:42:07.000000000 +0100
|
|
||||||
+++ openssl-1.0.2e/doc/apps/speed.pod 2016-01-15 14:05:23.044222376 +0100
|
|
||||||
@@ -8,6 +8,9 @@ speed - test library performance
|
|
||||||
|
|
||||||
B<openssl speed>
|
|
||||||
[B<-engine id>]
|
|
||||||
+[B<-elapsed>]
|
|
||||||
+[B<-evp algo>]
|
|
||||||
+[B<-decrypt>]
|
|
||||||
[B<md2>]
|
|
||||||
[B<mdc2>]
|
|
||||||
[B<md5>]
|
|
||||||
@@ -49,6 +52,19 @@ to attempt to obtain a functional refere
|
|
||||||
thus initialising it if needed. The engine will then be set as the default
|
|
||||||
for all available algorithms.
|
|
||||||
|
|
||||||
+=item B<-elapsed>
|
|
||||||
+
|
|
||||||
+Measure time in real time instead of CPU time. It can be useful when testing
|
|
||||||
+speed of hardware engines.
|
|
||||||
+
|
|
||||||
+=item B<-evp algo>
|
|
||||||
+
|
|
||||||
+Use the specified cipher or message digest algorithm via the EVP interface.
|
|
||||||
+
|
|
||||||
+=item B<-decrypt>
|
|
||||||
+
|
|
||||||
+Time the decryption instead of encryption. Affects only the EVP testing.
|
|
||||||
+
|
|
||||||
=item B<[zero or more test algorithms]>
|
|
||||||
|
|
||||||
If any options are given, B<speed> tests those algorithms, otherwise all of
|
|
@ -1,541 +0,0 @@
|
|||||||
diff -up openssl-1.0.2e/crypto/evp/c_allc.c.wrap openssl-1.0.2e/crypto/evp/c_allc.c
|
|
||||||
--- openssl-1.0.2e/crypto/evp/c_allc.c.wrap 2015-12-04 13:33:42.118550036 +0100
|
|
||||||
+++ openssl-1.0.2e/crypto/evp/c_allc.c 2015-12-04 13:33:42.190551722 +0100
|
|
||||||
@@ -179,6 +179,7 @@ void OpenSSL_add_all_ciphers(void)
|
|
||||||
EVP_add_cipher(EVP_aes_128_xts());
|
|
||||||
EVP_add_cipher(EVP_aes_128_ccm());
|
|
||||||
EVP_add_cipher(EVP_aes_128_wrap());
|
|
||||||
+ EVP_add_cipher(EVP_aes_128_wrap_pad());
|
|
||||||
EVP_add_cipher_alias(SN_aes_128_cbc, "AES128");
|
|
||||||
EVP_add_cipher_alias(SN_aes_128_cbc, "aes128");
|
|
||||||
EVP_add_cipher(EVP_aes_192_ecb());
|
|
||||||
@@ -191,6 +192,7 @@ void OpenSSL_add_all_ciphers(void)
|
|
||||||
EVP_add_cipher(EVP_aes_192_gcm());
|
|
||||||
EVP_add_cipher(EVP_aes_192_ccm());
|
|
||||||
EVP_add_cipher(EVP_aes_192_wrap());
|
|
||||||
+ EVP_add_cipher(EVP_aes_192_wrap_pad());
|
|
||||||
EVP_add_cipher_alias(SN_aes_192_cbc, "AES192");
|
|
||||||
EVP_add_cipher_alias(SN_aes_192_cbc, "aes192");
|
|
||||||
EVP_add_cipher(EVP_aes_256_ecb());
|
|
||||||
@@ -204,6 +206,7 @@ void OpenSSL_add_all_ciphers(void)
|
|
||||||
EVP_add_cipher(EVP_aes_256_xts());
|
|
||||||
EVP_add_cipher(EVP_aes_256_ccm());
|
|
||||||
EVP_add_cipher(EVP_aes_256_wrap());
|
|
||||||
+ EVP_add_cipher(EVP_aes_256_wrap_pad());
|
|
||||||
EVP_add_cipher_alias(SN_aes_256_cbc, "AES256");
|
|
||||||
EVP_add_cipher_alias(SN_aes_256_cbc, "aes256");
|
|
||||||
# if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA1)
|
|
||||||
@@ -258,6 +261,7 @@ void OpenSSL_add_all_ciphers(void)
|
|
||||||
|
|
||||||
EVP_add_cipher(EVP_des_ede());
|
|
||||||
EVP_add_cipher(EVP_des_ede3());
|
|
||||||
+ EVP_add_cipher(EVP_des_ede3_wrap());
|
|
||||||
# endif
|
|
||||||
|
|
||||||
# ifndef OPENSSL_NO_AES
|
|
||||||
@@ -272,6 +276,7 @@ void OpenSSL_add_all_ciphers(void)
|
|
||||||
EVP_add_cipher(EVP_aes_128_xts());
|
|
||||||
EVP_add_cipher(EVP_aes_128_ccm());
|
|
||||||
EVP_add_cipher(EVP_aes_128_wrap());
|
|
||||||
+ EVP_add_cipher(EVP_aes_128_wrap_pad());
|
|
||||||
EVP_add_cipher_alias(SN_aes_128_cbc, "AES128");
|
|
||||||
EVP_add_cipher_alias(SN_aes_128_cbc, "aes128");
|
|
||||||
EVP_add_cipher(EVP_aes_192_ecb());
|
|
||||||
@@ -284,6 +289,7 @@ void OpenSSL_add_all_ciphers(void)
|
|
||||||
EVP_add_cipher(EVP_aes_192_gcm());
|
|
||||||
EVP_add_cipher(EVP_aes_192_ccm());
|
|
||||||
EVP_add_cipher(EVP_aes_192_wrap());
|
|
||||||
+ EVP_add_cipher(EVP_aes_192_wrap_pad());
|
|
||||||
EVP_add_cipher_alias(SN_aes_192_cbc, "AES192");
|
|
||||||
EVP_add_cipher_alias(SN_aes_192_cbc, "aes192");
|
|
||||||
EVP_add_cipher(EVP_aes_256_ecb());
|
|
||||||
@@ -297,6 +303,7 @@ void OpenSSL_add_all_ciphers(void)
|
|
||||||
EVP_add_cipher(EVP_aes_256_xts());
|
|
||||||
EVP_add_cipher(EVP_aes_256_ccm());
|
|
||||||
EVP_add_cipher(EVP_aes_256_wrap());
|
|
||||||
+ EVP_add_cipher(EVP_aes_256_wrap_pad());
|
|
||||||
EVP_add_cipher_alias(SN_aes_256_cbc, "AES256");
|
|
||||||
EVP_add_cipher_alias(SN_aes_256_cbc, "aes256");
|
|
||||||
# endif
|
|
||||||
diff -up openssl-1.0.2e/crypto/evp/e_aes.c.wrap openssl-1.0.2e/crypto/evp/e_aes.c
|
|
||||||
--- openssl-1.0.2e/crypto/evp/e_aes.c.wrap 2015-12-04 13:33:42.119550059 +0100
|
|
||||||
+++ openssl-1.0.2e/crypto/evp/e_aes.c 2015-12-04 13:33:42.190551722 +0100
|
|
||||||
@@ -1,5 +1,5 @@
|
|
||||||
/* ====================================================================
|
|
||||||
- * Copyright (c) 2001-2011 The OpenSSL Project. All rights reserved.
|
|
||||||
+ * Copyright (c) 2001-2014 The OpenSSL Project. All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
@@ -1953,7 +1953,7 @@ static int aes_wrap_init_key(EVP_CIPHER_
|
|
||||||
wctx->iv = NULL;
|
|
||||||
}
|
|
||||||
if (iv) {
|
|
||||||
- memcpy(ctx->iv, iv, 8);
|
|
||||||
+ memcpy(ctx->iv, iv, EVP_CIPHER_CTX_iv_length(ctx));
|
|
||||||
wctx->iv = ctx->iv;
|
|
||||||
}
|
|
||||||
return 1;
|
|
||||||
@@ -1964,30 +1964,57 @@ static int aes_wrap_cipher(EVP_CIPHER_CT
|
|
||||||
{
|
|
||||||
EVP_AES_WRAP_CTX *wctx = ctx->cipher_data;
|
|
||||||
size_t rv;
|
|
||||||
+ /* AES wrap with padding has IV length of 4, without padding 8 */
|
|
||||||
+ int pad = EVP_CIPHER_CTX_iv_length(ctx) == 4;
|
|
||||||
+ /* No final operation so always return zero length */
|
|
||||||
if (!in)
|
|
||||||
return 0;
|
|
||||||
- if (inlen % 8)
|
|
||||||
+ /* Input length must always be non-zero */
|
|
||||||
+ if (!inlen)
|
|
||||||
return -1;
|
|
||||||
- if (ctx->encrypt && inlen < 8)
|
|
||||||
+ /* If decrypting need at least 16 bytes and multiple of 8 */
|
|
||||||
+ if (!ctx->encrypt && (inlen < 16 || inlen & 0x7))
|
|
||||||
return -1;
|
|
||||||
- if (!ctx->encrypt && inlen < 16)
|
|
||||||
+ /* If not padding input must be multiple of 8 */
|
|
||||||
+ if (!pad && inlen & 0x7)
|
|
||||||
return -1;
|
|
||||||
if (!out) {
|
|
||||||
- if (ctx->encrypt)
|
|
||||||
+ if (ctx->encrypt) {
|
|
||||||
+ /* If padding round up to multiple of 8 */
|
|
||||||
+ if (pad)
|
|
||||||
+ inlen = (inlen + 7) / 8 * 8;
|
|
||||||
+ /* 8 byte prefix */
|
|
||||||
return inlen + 8;
|
|
||||||
- else
|
|
||||||
+ } else {
|
|
||||||
+ /* If not padding output will be exactly 8 bytes
|
|
||||||
+ * smaller than input. If padding it will be at
|
|
||||||
+ * least 8 bytes smaller but we don't know how
|
|
||||||
+ * much.
|
|
||||||
+ */
|
|
||||||
return inlen - 8;
|
|
||||||
}
|
|
||||||
+ }
|
|
||||||
+ if (pad) {
|
|
||||||
if (ctx->encrypt)
|
|
||||||
- rv = CRYPTO_128_wrap(&wctx->ks.ks, wctx->iv, out, in, inlen,
|
|
||||||
+ rv = CRYPTO_128_wrap_pad(&wctx->ks.ks, wctx->iv,
|
|
||||||
+ out, in, inlen,
|
|
||||||
(block128_f) AES_encrypt);
|
|
||||||
else
|
|
||||||
- rv = CRYPTO_128_unwrap(&wctx->ks.ks, wctx->iv, out, in, inlen,
|
|
||||||
+ rv = CRYPTO_128_unwrap_pad(&wctx->ks.ks, wctx->iv,
|
|
||||||
+ out, in, inlen,
|
|
||||||
(block128_f) AES_decrypt);
|
|
||||||
+ } else {
|
|
||||||
+ if (ctx->encrypt)
|
|
||||||
+ rv = CRYPTO_128_wrap(&wctx->ks.ks, wctx->iv,
|
|
||||||
+ out, in, inlen, (block128_f) AES_encrypt);
|
|
||||||
+ else
|
|
||||||
+ rv = CRYPTO_128_unwrap(&wctx->ks.ks, wctx->iv,
|
|
||||||
+ out, in, inlen, (block128_f) AES_decrypt);
|
|
||||||
+ }
|
|
||||||
return rv ? (int)rv : -1;
|
|
||||||
}
|
|
||||||
|
|
||||||
-#define WRAP_FLAGS (EVP_CIPH_WRAP_MODE \
|
|
||||||
+# define WRAP_FLAGS (EVP_CIPH_WRAP_MODE | EVP_CIPH_FLAG_FIPS \
|
|
||||||
| EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER \
|
|
||||||
| EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_FLAG_DEFAULT_ASN1)
|
|
||||||
|
|
||||||
@@ -2032,3 +2059,45 @@ const EVP_CIPHER *EVP_aes_256_wrap(void)
|
|
||||||
{
|
|
||||||
return &aes_256_wrap;
|
|
||||||
}
|
|
||||||
+
|
|
||||||
+static const EVP_CIPHER aes_128_wrap_pad = {
|
|
||||||
+ NID_id_aes128_wrap_pad,
|
|
||||||
+ 8, 16, 4, WRAP_FLAGS,
|
|
||||||
+ aes_wrap_init_key, aes_wrap_cipher,
|
|
||||||
+ NULL,
|
|
||||||
+ sizeof(EVP_AES_WRAP_CTX),
|
|
||||||
+ NULL, NULL, NULL, NULL
|
|
||||||
+};
|
|
||||||
+
|
|
||||||
+const EVP_CIPHER *EVP_aes_128_wrap_pad(void)
|
|
||||||
+{
|
|
||||||
+ return &aes_128_wrap_pad;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+static const EVP_CIPHER aes_192_wrap_pad = {
|
|
||||||
+ NID_id_aes192_wrap_pad,
|
|
||||||
+ 8, 24, 4, WRAP_FLAGS,
|
|
||||||
+ aes_wrap_init_key, aes_wrap_cipher,
|
|
||||||
+ NULL,
|
|
||||||
+ sizeof(EVP_AES_WRAP_CTX),
|
|
||||||
+ NULL, NULL, NULL, NULL
|
|
||||||
+};
|
|
||||||
+
|
|
||||||
+const EVP_CIPHER *EVP_aes_192_wrap_pad(void)
|
|
||||||
+{
|
|
||||||
+ return &aes_192_wrap_pad;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+static const EVP_CIPHER aes_256_wrap_pad = {
|
|
||||||
+ NID_id_aes256_wrap_pad,
|
|
||||||
+ 8, 32, 4, WRAP_FLAGS,
|
|
||||||
+ aes_wrap_init_key, aes_wrap_cipher,
|
|
||||||
+ NULL,
|
|
||||||
+ sizeof(EVP_AES_WRAP_CTX),
|
|
||||||
+ NULL, NULL, NULL, NULL
|
|
||||||
+};
|
|
||||||
+
|
|
||||||
+const EVP_CIPHER *EVP_aes_256_wrap_pad(void)
|
|
||||||
+{
|
|
||||||
+ return &aes_256_wrap_pad;
|
|
||||||
+}
|
|
||||||
diff -up openssl-1.0.2e/crypto/evp/e_des3.c.wrap openssl-1.0.2e/crypto/evp/e_des3.c
|
|
||||||
--- openssl-1.0.2e/crypto/evp/e_des3.c.wrap 2015-12-04 13:33:42.119550059 +0100
|
|
||||||
+++ openssl-1.0.2e/crypto/evp/e_des3.c 2015-12-04 13:33:42.191551745 +0100
|
|
||||||
@@ -474,7 +474,7 @@ static const EVP_CIPHER des3_wrap = {
|
|
||||||
NID_id_smime_alg_CMS3DESwrap,
|
|
||||||
8, 24, 0,
|
|
||||||
EVP_CIPH_WRAP_MODE | EVP_CIPH_CUSTOM_IV | EVP_CIPH_FLAG_CUSTOM_CIPHER
|
|
||||||
- | EVP_CIPH_FLAG_DEFAULT_ASN1,
|
|
||||||
+ | EVP_CIPH_FLAG_DEFAULT_ASN1 | EVP_CIPH_FLAG_FIPS,
|
|
||||||
des_ede3_init_key, des_ede3_wrap_cipher,
|
|
||||||
NULL,
|
|
||||||
sizeof(DES_EDE_KEY),
|
|
||||||
diff -up openssl-1.0.2e/crypto/evp/evp.h.wrap openssl-1.0.2e/crypto/evp/evp.h
|
|
||||||
--- openssl-1.0.2e/crypto/evp/evp.h.wrap 2015-12-04 13:33:42.120550083 +0100
|
|
||||||
+++ openssl-1.0.2e/crypto/evp/evp.h 2015-12-04 13:33:42.191551745 +0100
|
|
||||||
@@ -834,6 +834,7 @@ const EVP_CIPHER *EVP_aes_128_ccm(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_128_gcm(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_128_xts(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_128_wrap(void);
|
|
||||||
+const EVP_CIPHER *EVP_aes_128_wrap_pad(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_192_ecb(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_192_cbc(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_192_cfb1(void);
|
|
||||||
@@ -845,6 +846,7 @@ const EVP_CIPHER *EVP_aes_192_ctr(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_192_ccm(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_192_gcm(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_192_wrap(void);
|
|
||||||
+const EVP_CIPHER *EVP_aes_192_wrap_pad(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_256_ecb(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_256_cbc(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_256_cfb1(void);
|
|
||||||
@@ -857,6 +859,7 @@ const EVP_CIPHER *EVP_aes_256_ccm(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_256_gcm(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_256_xts(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_256_wrap(void);
|
|
||||||
+const EVP_CIPHER *EVP_aes_256_wrap_pad(void);
|
|
||||||
# if !defined(OPENSSL_NO_SHA) && !defined(OPENSSL_NO_SHA1)
|
|
||||||
const EVP_CIPHER *EVP_aes_128_cbc_hmac_sha1(void);
|
|
||||||
const EVP_CIPHER *EVP_aes_256_cbc_hmac_sha1(void);
|
|
||||||
diff -up openssl-1.0.2e/crypto/evp/evptests.txt.wrap openssl-1.0.2e/crypto/evp/evptests.txt
|
|
||||||
--- openssl-1.0.2e/crypto/evp/evptests.txt.wrap 2015-12-03 15:04:23.000000000 +0100
|
|
||||||
+++ openssl-1.0.2e/crypto/evp/evptests.txt 2015-12-04 13:33:42.191551745 +0100
|
|
||||||
@@ -399,3 +399,7 @@ id-aes256-wrap:000102030405060708090A0B0
|
|
||||||
id-aes192-wrap:000102030405060708090A0B0C0D0E0F1011121314151617::00112233445566778899AABBCCDDEEFF0001020304050607:031D33264E15D33268F24EC260743EDCE1C6C7DDEE725A936BA814915C6762D2
|
|
||||||
id-aes256-wrap:000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F::00112233445566778899AABBCCDDEEFF0001020304050607:A8F9BC1612C68B3FF6E6F4FBE30E71E4769C8B80A32CB8958CD5D17D6B254DA1
|
|
||||||
id-aes256-wrap:000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F::00112233445566778899AABBCCDDEEFF000102030405060708090A0B0C0D0E0F:28C9F404C4B810F4CBCCB35CFB87F8263F5786E2D80ED326CBC7F0E71A99F43BFB988B9B7A02DD21
|
|
||||||
+# AES wrap tests from RFC5649
|
|
||||||
+id-aes192-wrap-pad:5840df6e29b02af1ab493b705bf16ea1ae8338f4dcc176a8::c37b7e6492584340bed12207808941155068f738:138bdeaa9b8fa7fc61f97742e72248ee5ae6ae5360d1ae6a5f54f373fa543b6a
|
|
||||||
+id-aes192-wrap-pad:5840df6e29b02af1ab493b705bf16ea1ae8338f4dcc176a8::466f7250617369:afbeb0f07dfbf5419200f2ccb50bb24f
|
|
||||||
+
|
|
||||||
diff -up openssl-1.0.2e/crypto/modes/modes.h.wrap openssl-1.0.2e/crypto/modes/modes.h
|
|
||||||
--- openssl-1.0.2e/crypto/modes/modes.h.wrap 2015-12-04 13:33:41.770541886 +0100
|
|
||||||
+++ openssl-1.0.2e/crypto/modes/modes.h 2015-12-04 13:33:42.191551745 +0100
|
|
||||||
@@ -157,6 +157,12 @@ size_t CRYPTO_128_unwrap(void *key, cons
|
|
||||||
unsigned char *out,
|
|
||||||
const unsigned char *in, size_t inlen,
|
|
||||||
block128_f block);
|
|
||||||
+size_t CRYPTO_128_wrap_pad(void *key, const unsigned char *icv,
|
|
||||||
+ unsigned char *out, const unsigned char *in,
|
|
||||||
+ size_t inlen, block128_f block);
|
|
||||||
+size_t CRYPTO_128_unwrap_pad(void *key, const unsigned char *icv,
|
|
||||||
+ unsigned char *out, const unsigned char *in,
|
|
||||||
+ size_t inlen, block128_f block);
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
|
||||||
}
|
|
||||||
diff -up openssl-1.0.2e/crypto/modes/wrap128.c.wrap openssl-1.0.2e/crypto/modes/wrap128.c
|
|
||||||
--- openssl-1.0.2e/crypto/modes/wrap128.c.wrap 2015-12-03 15:04:23.000000000 +0100
|
|
||||||
+++ openssl-1.0.2e/crypto/modes/wrap128.c 2015-12-04 13:37:51.486366984 +0100
|
|
||||||
@@ -2,6 +2,7 @@
|
|
||||||
/*
|
|
||||||
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
|
||||||
* project.
|
|
||||||
+ * Mode with padding contributed by Petr Spacek (pspacek@redhat.com).
|
|
||||||
*/
|
|
||||||
/* ====================================================================
|
|
||||||
* Copyright (c) 2013 The OpenSSL Project. All rights reserved.
|
|
||||||
@@ -52,19 +53,44 @@
|
|
||||||
* ====================================================================
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/** Beware!
|
|
||||||
+ *
|
|
||||||
+ * Following wrapping modes were designed for AES but this implementation
|
|
||||||
+ * allows you to use them for any 128 bit block cipher.
|
|
||||||
+ */
|
|
||||||
+
|
|
||||||
#include "cryptlib.h"
|
|
||||||
#include <openssl/modes.h>
|
|
||||||
|
|
||||||
+/** RFC 3394 section 2.2.3.1 Default Initial Value */
|
|
||||||
static const unsigned char default_iv[] = {
|
|
||||||
0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6, 0xA6,
|
|
||||||
};
|
|
||||||
|
|
||||||
-/*
|
|
||||||
- * Input size limit: lower than maximum of standards but far larger than
|
|
||||||
+/** RFC 5649 section 3 Alternative Initial Value 32-bit constant */
|
|
||||||
+static const unsigned char default_aiv[] = {
|
|
||||||
+ 0xA6, 0x59, 0x59, 0xA6
|
|
||||||
+};
|
|
||||||
+
|
|
||||||
+/** Input size limit: lower than maximum of standards but far larger than
|
|
||||||
* anything that will be used in practice.
|
|
||||||
*/
|
|
||||||
#define CRYPTO128_WRAP_MAX (1UL << 31)
|
|
||||||
|
|
||||||
+/** Wrapping according to RFC 3394 section 2.2.1.
|
|
||||||
+ *
|
|
||||||
+ * @param[in] key Key value.
|
|
||||||
+ * @param[in] iv IV value. Length = 8 bytes. NULL = use default_iv.
|
|
||||||
+ * @param[in] in Plain text as n 64-bit blocks, n >= 2.
|
|
||||||
+ * @param[in] inlen Length of in.
|
|
||||||
+ * @param[out] out Cipher text. Minimal buffer length = (inlen + 8) bytes.
|
|
||||||
+ * Input and output buffers can overlap if block function
|
|
||||||
+ * supports that.
|
|
||||||
+ * @param[in] block Block processing function.
|
|
||||||
+ * @return 0 if inlen does not consist of n 64-bit blocks, n >= 2.
|
|
||||||
+ * or if inlen > CRYPTO128_WRAP_MAX.
|
|
||||||
+ * Output length if wrapping succeeded.
|
|
||||||
+ */
|
|
||||||
size_t CRYPTO_128_wrap(void *key, const unsigned char *iv,
|
|
||||||
unsigned char *out,
|
|
||||||
const unsigned char *in, size_t inlen,
|
|
||||||
@@ -72,7 +98,7 @@ size_t CRYPTO_128_wrap(void *key, const
|
|
||||||
{
|
|
||||||
unsigned char *A, B[16], *R;
|
|
||||||
size_t i, j, t;
|
|
||||||
- if ((inlen & 0x7) || (inlen < 8) || (inlen > CRYPTO128_WRAP_MAX))
|
|
||||||
+ if ((inlen & 0x7) || (inlen < 16) || (inlen > CRYPTO128_WRAP_MAX))
|
|
||||||
return 0;
|
|
||||||
A = B;
|
|
||||||
t = 1;
|
|
||||||
@@ -100,7 +126,23 @@ size_t CRYPTO_128_wrap(void *key, const
|
|
||||||
return inlen + 8;
|
|
||||||
}
|
|
||||||
|
|
||||||
-size_t CRYPTO_128_unwrap(void *key, const unsigned char *iv,
|
|
||||||
+/** Unwrapping according to RFC 3394 section 2.2.2 steps 1-2.
|
|
||||||
+ * IV check (step 3) is responsibility of the caller.
|
|
||||||
+ *
|
|
||||||
+ * @param[in] key Key value.
|
|
||||||
+ * @param[out] iv Unchecked IV value. Minimal buffer length = 8 bytes.
|
|
||||||
+ * @param[out] out Plain text without IV.
|
|
||||||
+ * Minimal buffer length = (inlen - 8) bytes.
|
|
||||||
+ * Input and output buffers can overlap if block function
|
|
||||||
+ * supports that.
|
|
||||||
+ * @param[in] in Ciphertext text as n 64-bit blocks
|
|
||||||
+ * @param[in] inlen Length of in.
|
|
||||||
+ * @param[in] block Block processing function.
|
|
||||||
+ * @return 0 if inlen is out of range [24, CRYPTO128_WRAP_MAX]
|
|
||||||
+ * or if inlen is not multiply of 8.
|
|
||||||
+ * Output length otherwise.
|
|
||||||
+ */
|
|
||||||
+static size_t crypto_128_unwrap_raw(void *key, unsigned char *iv,
|
|
||||||
unsigned char *out,
|
|
||||||
const unsigned char *in, size_t inlen,
|
|
||||||
block128_f block)
|
|
||||||
@@ -128,11 +170,190 @@ size_t CRYPTO_128_unwrap(void *key, cons
|
|
||||||
memcpy(R, B + 8, 8);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
+ memcpy(iv, A, 8);
|
|
||||||
+ return inlen;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+/** Unwrapping according to RFC 3394 section 2.2.2 including IV check.
|
|
||||||
+ * First block of plain text have to match supplied IV otherwise an error is
|
|
||||||
+ * returned.
|
|
||||||
+ *
|
|
||||||
+ * @param[in] key Key value.
|
|
||||||
+ * @param[out] iv Unchecked IV value. Minimal buffer length = 8 bytes.
|
|
||||||
+ * @param[out] out Plain text without IV.
|
|
||||||
+ * Minimal buffer length = (inlen - 8) bytes.
|
|
||||||
+ * Input and output buffers can overlap if block function
|
|
||||||
+ * supports that.
|
|
||||||
+ * @param[in] in Ciphertext text as n 64-bit blocks
|
|
||||||
+ * @param[in] inlen Length of in.
|
|
||||||
+ * @param[in] block Block processing function.
|
|
||||||
+ * @return 0 if inlen is out of range [24, CRYPTO128_WRAP_MAX]
|
|
||||||
+ * or if inlen is not multiply of 8
|
|
||||||
+ * or if IV doesn't match expected value.
|
|
||||||
+ * Output length otherwise.
|
|
||||||
+ */
|
|
||||||
+size_t CRYPTO_128_unwrap(void *key, const unsigned char *iv,
|
|
||||||
+ unsigned char *out, const unsigned char *in,
|
|
||||||
+ size_t inlen, block128_f block)
|
|
||||||
+{
|
|
||||||
+ size_t ret;
|
|
||||||
+ unsigned char got_iv[8];
|
|
||||||
+
|
|
||||||
+ ret = crypto_128_unwrap_raw(key, got_iv, out, in, inlen, block);
|
|
||||||
+ if (ret == 0)
|
|
||||||
+ return 0;
|
|
||||||
+
|
|
||||||
if (!iv)
|
|
||||||
iv = default_iv;
|
|
||||||
- if (memcmp(A, iv, 8)) {
|
|
||||||
+ if (CRYPTO_memcmp(got_iv, iv, 8)) {
|
|
||||||
+ OPENSSL_cleanse(out, ret);
|
|
||||||
+ return 0;
|
|
||||||
+ }
|
|
||||||
+ return ret;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+/** Wrapping according to RFC 5649 section 4.1.
|
|
||||||
+ *
|
|
||||||
+ * @param[in] key Key value.
|
|
||||||
+ * @param[in] icv (Non-standard) IV, 4 bytes. NULL = use default_aiv.
|
|
||||||
+ * @param[out] out Cipher text. Minimal buffer length = (inlen + 15) bytes.
|
|
||||||
+ * Input and output buffers can overlap if block function
|
|
||||||
+ * supports that.
|
|
||||||
+ * @param[in] in Plain text as n 64-bit blocks, n >= 2.
|
|
||||||
+ * @param[in] inlen Length of in.
|
|
||||||
+ * @param[in] block Block processing function.
|
|
||||||
+ * @return 0 if inlen is out of range [1, CRYPTO128_WRAP_MAX].
|
|
||||||
+ * Output length if wrapping succeeded.
|
|
||||||
+ */
|
|
||||||
+size_t CRYPTO_128_wrap_pad(void *key, const unsigned char *icv,
|
|
||||||
+ unsigned char *out,
|
|
||||||
+ const unsigned char *in, size_t inlen,
|
|
||||||
+ block128_f block)
|
|
||||||
+{
|
|
||||||
+ /* n: number of 64-bit blocks in the padded key data */
|
|
||||||
+ const size_t blocks_padded = (inlen + 7) / 8;
|
|
||||||
+ const size_t padded_len = blocks_padded * 8;
|
|
||||||
+ const size_t padding_len = padded_len - inlen;
|
|
||||||
+ /* RFC 5649 section 3: Alternative Initial Value */
|
|
||||||
+ unsigned char aiv[8];
|
|
||||||
+ int ret;
|
|
||||||
+
|
|
||||||
+ /* Section 1: use 32-bit fixed field for plaintext octet length */
|
|
||||||
+ if (inlen == 0 || inlen >= CRYPTO128_WRAP_MAX)
|
|
||||||
+ return 0;
|
|
||||||
+
|
|
||||||
+ /* Section 3: Alternative Initial Value */
|
|
||||||
+ if (!icv)
|
|
||||||
+ memcpy(aiv, default_aiv, 4);
|
|
||||||
+ else
|
|
||||||
+ memcpy(aiv, icv, 4); /* Standard doesn't mention this. */
|
|
||||||
+
|
|
||||||
+ aiv[4] = (inlen >> 24) & 0xFF;
|
|
||||||
+ aiv[5] = (inlen >> 16) & 0xFF;
|
|
||||||
+ aiv[6] = (inlen >> 8) & 0xFF;
|
|
||||||
+ aiv[7] = inlen & 0xFF;
|
|
||||||
+
|
|
||||||
+ if (padded_len == 8) {
|
|
||||||
+ /* Section 4.1 - special case in step 2:
|
|
||||||
+ * If the padded plaintext contains exactly eight octets, then
|
|
||||||
+ * prepend the AIV and encrypt the resulting 128-bit block
|
|
||||||
+ * using AES in ECB mode. */
|
|
||||||
+ memmove(out + 8, in, inlen);
|
|
||||||
+ memcpy(out, aiv, 8);
|
|
||||||
+ memset(out + 8 + inlen, 0, padding_len);
|
|
||||||
+ block(out, out, key);
|
|
||||||
+ ret = 16; /* AIV + padded input */
|
|
||||||
+ } else {
|
|
||||||
+ memmove(out, in, inlen);
|
|
||||||
+ memset(out + inlen, 0, padding_len); /* Section 4.1 step 1 */
|
|
||||||
+ ret = CRYPTO_128_wrap(key, aiv, out, out, padded_len, block);
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ return ret;
|
|
||||||
+}
|
|
||||||
+
|
|
||||||
+/** Unwrapping according to RFC 5649 section 4.2.
|
|
||||||
+ *
|
|
||||||
+ * @param[in] key Key value.
|
|
||||||
+ * @param[in] icv (Non-standard) IV, 4 bytes. NULL = use default_aiv.
|
|
||||||
+ * @param[out] out Plain text. Minimal buffer length = inlen bytes.
|
|
||||||
+ * Input and output buffers can overlap if block function
|
|
||||||
+ * supports that.
|
|
||||||
+ * @param[in] in Ciphertext text as n 64-bit blocks
|
|
||||||
+ * @param[in] inlen Length of in.
|
|
||||||
+ * @param[in] block Block processing function.
|
|
||||||
+ * @return 0 if inlen is out of range [16, CRYPTO128_WRAP_MAX],
|
|
||||||
+ * or if inlen is not multiply of 8
|
|
||||||
+ * or if IV and message length indicator doesn't match.
|
|
||||||
+ * Output length if unwrapping succeeded and IV matches.
|
|
||||||
+ */
|
|
||||||
+size_t CRYPTO_128_unwrap_pad(void *key, const unsigned char *icv,
|
|
||||||
+ unsigned char *out,
|
|
||||||
+ const unsigned char *in, size_t inlen,
|
|
||||||
+ block128_f block)
|
|
||||||
+{
|
|
||||||
+ /* n: number of 64-bit blocks in the padded key data */
|
|
||||||
+ size_t n = inlen / 8 - 1;
|
|
||||||
+ size_t padded_len;
|
|
||||||
+ size_t padding_len;
|
|
||||||
+ size_t ptext_len;
|
|
||||||
+ /* RFC 5649 section 3: Alternative Initial Value */
|
|
||||||
+ unsigned char aiv[8];
|
|
||||||
+ static unsigned char zeros[8] = { 0x0 };
|
|
||||||
+ size_t ret;
|
|
||||||
+
|
|
||||||
+ /* Section 4.2: Cipher text length has to be (n+1) 64-bit blocks. */
|
|
||||||
+ if ((inlen & 0x7) != 0 || inlen < 16 || inlen >= CRYPTO128_WRAP_MAX)
|
|
||||||
+ return 0;
|
|
||||||
+
|
|
||||||
+ memmove(out, in, inlen);
|
|
||||||
+ if (inlen == 16) {
|
|
||||||
+ /* Section 4.2 - special case in step 1:
|
|
||||||
+ * When n=1, the ciphertext contains exactly two 64-bit
|
|
||||||
+ * blocks and they are decrypted as a single AES
|
|
||||||
+ * block using AES in ECB mode:
|
|
||||||
+ * AIV | P[1] = DEC(K, C[0] | C[1])
|
|
||||||
+ */
|
|
||||||
+ block(out, out, key);
|
|
||||||
+ memcpy(aiv, out, 8);
|
|
||||||
+ /* Remove AIV */
|
|
||||||
+ memmove(out, out + 8, 8);
|
|
||||||
+ padded_len = 8;
|
|
||||||
+ } else {
|
|
||||||
+ padded_len = inlen - 8;
|
|
||||||
+ ret = crypto_128_unwrap_raw(key, aiv, out, out, inlen, block);
|
|
||||||
+ if (padded_len != ret) {
|
|
||||||
OPENSSL_cleanse(out, inlen);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
- return inlen;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ /* Section 3: AIV checks: Check that MSB(32,A) = A65959A6.
|
|
||||||
+ * Optionally a user-supplied value can be used
|
|
||||||
+ * (even if standard doesn't mention this). */
|
|
||||||
+ if ((!icv && CRYPTO_memcmp(aiv, default_aiv, 4))
|
|
||||||
+ || (icv && CRYPTO_memcmp(aiv, icv, 4))) {
|
|
||||||
+ OPENSSL_cleanse(out, inlen);
|
|
||||||
+ return 0;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ /* Check that 8*(n-1) < LSB(32,AIV) <= 8*n.
|
|
||||||
+ * If so, let ptext_len = LSB(32,AIV). */
|
|
||||||
+
|
|
||||||
+ ptext_len = (aiv[4] << 24) | (aiv[5] << 16) | (aiv[6] << 8) | aiv[7];
|
|
||||||
+ if (8 * (n - 1) >= ptext_len || ptext_len > 8 * n) {
|
|
||||||
+ OPENSSL_cleanse(out, inlen);
|
|
||||||
+ return 0;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ /* Check that the rightmost padding_len octets of the output data
|
|
||||||
+ * are zero. */
|
|
||||||
+ padding_len = padded_len - ptext_len;
|
|
||||||
+ if (CRYPTO_memcmp(out + ptext_len, zeros, padding_len) != 0) {
|
|
||||||
+ OPENSSL_cleanse(out, inlen);
|
|
||||||
+ return 0;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ /* Section 4.2 step 3: Remove padding */
|
|
||||||
+ return ptext_len;
|
|
||||||
}
|
|
@ -1,18 +0,0 @@
|
|||||||
diff -up openssl-1.0.2g/ssl/ssl_lib.c.v2v3 openssl-1.0.2g/ssl/ssl_lib.c
|
|
||||||
--- openssl-1.0.2g/ssl/ssl_lib.c.v2v3 2016-03-01 16:38:26.879142021 +0100
|
|
||||||
+++ openssl-1.0.2g/ssl/ssl_lib.c 2016-03-01 16:41:32.977353769 +0100
|
|
||||||
@@ -2055,11 +2055,11 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *m
|
|
||||||
ret->options |= SSL_OP_LEGACY_SERVER_CONNECT;
|
|
||||||
|
|
||||||
/*
|
|
||||||
- * Disable SSLv2 by default, callers that want to enable SSLv2 will have to
|
|
||||||
- * explicitly clear this option via either of SSL_CTX_clear_options() or
|
|
||||||
+ * Disable SSLv2 and SSLv3 by default, callers that want to enable these will have to
|
|
||||||
+ * explicitly clear these options via either of SSL_CTX_clear_options() or
|
|
||||||
* SSL_clear_options().
|
|
||||||
*/
|
|
||||||
- ret->options |= SSL_OP_NO_SSLv2;
|
|
||||||
+ ret->options |= SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3;
|
|
||||||
|
|
||||||
return (ret);
|
|
||||||
err:
|
|
@ -1,90 +0,0 @@
|
|||||||
diff -up openssl-1.0.2g/doc/apps/ec.pod.manfix openssl-1.0.2g/doc/apps/ec.pod
|
|
||||||
--- openssl-1.0.2g/doc/apps/ec.pod.manfix 2016-03-01 14:35:05.000000000 +0100
|
|
||||||
+++ openssl-1.0.2g/doc/apps/ec.pod 2016-03-01 16:47:35.331568290 +0100
|
|
||||||
@@ -93,10 +93,6 @@ prints out the public, private key compo
|
|
||||||
|
|
||||||
this option prevents output of the encoded version of the key.
|
|
||||||
|
|
||||||
-=item B<-modulus>
|
|
||||||
-
|
|
||||||
-this option prints out the value of the public key component of the key.
|
|
||||||
-
|
|
||||||
=item B<-pubin>
|
|
||||||
|
|
||||||
by default a private key is read from the input file: with this option a
|
|
||||||
diff -up openssl-1.0.2g/doc/apps/openssl.pod.manfix openssl-1.0.2g/doc/apps/openssl.pod
|
|
||||||
--- openssl-1.0.2g/doc/apps/openssl.pod.manfix 2016-03-01 14:35:05.000000000 +0100
|
|
||||||
+++ openssl-1.0.2g/doc/apps/openssl.pod 2016-03-01 16:47:35.331568290 +0100
|
|
||||||
@@ -163,7 +163,7 @@ Create or examine a netscape certificate
|
|
||||||
|
|
||||||
Online Certificate Status Protocol utility.
|
|
||||||
|
|
||||||
-=item L<B<passwd>|passwd(1)>
|
|
||||||
+=item L<B<passwd>|sslpasswd(1)>
|
|
||||||
|
|
||||||
Generation of hashed passwords.
|
|
||||||
|
|
||||||
@@ -187,7 +187,7 @@ Public key algorithm parameter managemen
|
|
||||||
|
|
||||||
Public key algorithm cryptographic operation utility.
|
|
||||||
|
|
||||||
-=item L<B<rand>|rand(1)>
|
|
||||||
+=item L<B<rand>|sslrand(1)>
|
|
||||||
|
|
||||||
Generate pseudo-random bytes.
|
|
||||||
|
|
||||||
@@ -401,9 +401,9 @@ L<crl(1)|crl(1)>, L<crl2pkcs7(1)|crl2pkc
|
|
||||||
L<dhparam(1)|dhparam(1)>, L<dsa(1)|dsa(1)>, L<dsaparam(1)|dsaparam(1)>,
|
|
||||||
L<enc(1)|enc(1)>, L<gendsa(1)|gendsa(1)>, L<genpkey(1)|genpkey(1)>,
|
|
||||||
L<genrsa(1)|genrsa(1)>, L<nseq(1)|nseq(1)>, L<openssl(1)|openssl(1)>,
|
|
||||||
-L<passwd(1)|passwd(1)>,
|
|
||||||
+L<sslpasswd(1)|sslpasswd(1)>,
|
|
||||||
L<pkcs12(1)|pkcs12(1)>, L<pkcs7(1)|pkcs7(1)>, L<pkcs8(1)|pkcs8(1)>,
|
|
||||||
-L<rand(1)|rand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>,
|
|
||||||
+L<sslrand(1)|sslrand(1)>, L<req(1)|req(1)>, L<rsa(1)|rsa(1)>,
|
|
||||||
L<rsautl(1)|rsautl(1)>, L<s_client(1)|s_client(1)>,
|
|
||||||
L<s_server(1)|s_server(1)>, L<s_time(1)|s_time(1)>,
|
|
||||||
L<smime(1)|smime(1)>, L<spkac(1)|spkac(1)>,
|
|
||||||
diff -up openssl-1.0.2g/doc/apps/s_client.pod.manfix openssl-1.0.2g/doc/apps/s_client.pod
|
|
||||||
--- openssl-1.0.2g/doc/apps/s_client.pod.manfix 2016-03-01 14:35:53.000000000 +0100
|
|
||||||
+++ openssl-1.0.2g/doc/apps/s_client.pod 2016-03-01 16:47:35.358568902 +0100
|
|
||||||
@@ -35,6 +35,9 @@ B<openssl> B<s_client>
|
|
||||||
[B<-ssl2>]
|
|
||||||
[B<-ssl3>]
|
|
||||||
[B<-tls1>]
|
|
||||||
+[B<-tls1_1>]
|
|
||||||
+[B<-tls1_2>]
|
|
||||||
+[B<-dtls1>]
|
|
||||||
[B<-no_ssl2>]
|
|
||||||
[B<-no_ssl3>]
|
|
||||||
[B<-no_tls1>]
|
|
||||||
@@ -201,7 +204,7 @@ Use the PSK key B<key> when using a PSK
|
|
||||||
given as a hexadecimal number without leading 0x, for example -psk
|
|
||||||
1a2b3c4d.
|
|
||||||
|
|
||||||
-=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
|
|
||||||
+=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-dtls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
|
|
||||||
|
|
||||||
These options require or disable the use of the specified SSL or TLS protocols.
|
|
||||||
By default the initial handshake uses a I<version-flexible> method which will
|
|
||||||
diff -up openssl-1.0.2g/doc/apps/s_server.pod.manfix openssl-1.0.2g/doc/apps/s_server.pod
|
|
||||||
--- openssl-1.0.2g/doc/apps/s_server.pod.manfix 2016-03-01 14:35:53.000000000 +0100
|
|
||||||
+++ openssl-1.0.2g/doc/apps/s_server.pod 2016-03-01 16:47:35.359568925 +0100
|
|
||||||
@@ -42,6 +42,8 @@ B<openssl> B<s_server>
|
|
||||||
[B<-ssl2>]
|
|
||||||
[B<-ssl3>]
|
|
||||||
[B<-tls1>]
|
|
||||||
+[B<-tls1_1>]
|
|
||||||
+[B<-tls1_2>]
|
|
||||||
[B<-no_ssl2>]
|
|
||||||
[B<-no_ssl3>]
|
|
||||||
[B<-no_tls1>]
|
|
||||||
@@ -217,7 +219,7 @@ Use the PSK key B<key> when using a PSK
|
|
||||||
given as a hexadecimal number without leading 0x, for example -psk
|
|
||||||
1a2b3c4d.
|
|
||||||
|
|
||||||
-=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
|
|
||||||
+=item B<-ssl2>, B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-dtls1>, B<-no_ssl2>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>
|
|
||||||
|
|
||||||
These options require or disable the use of the specified SSL or TLS protocols.
|
|
||||||
By default the initial handshake uses a I<version-flexible> method which will
|
|
@ -1,24 +0,0 @@
|
|||||||
diff -up openssl-1.0.2h/Makefile.org.pkgconfig openssl-1.0.2h/Makefile.org
|
|
||||||
--- openssl-1.0.2h/Makefile.org.pkgconfig 2016-05-03 18:06:45.869834730 +0200
|
|
||||||
+++ openssl-1.0.2h/Makefile.org 2016-06-27 12:04:15.444245018 +0200
|
|
||||||
@@ -377,7 +377,7 @@ libcrypto.pc: Makefile
|
|
||||||
echo 'Requires: '; \
|
|
||||||
echo 'Libs: -L$${libdir} -lcrypto'; \
|
|
||||||
echo 'Libs.private: $(EX_LIBS)'; \
|
|
||||||
- echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libcrypto.pc
|
|
||||||
+ echo 'Cflags: -I$${includedir}' ) > libcrypto.pc
|
|
||||||
|
|
||||||
libssl.pc: Makefile
|
|
||||||
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
|
||||||
@@ -388,9 +388,9 @@ libssl.pc: Makefile
|
|
||||||
echo 'Name: OpenSSL-libssl'; \
|
|
||||||
echo 'Description: Secure Sockets Layer and cryptography libraries'; \
|
|
||||||
echo 'Version: '$(VERSION); \
|
|
||||||
- echo 'Requires.private: libcrypto'; \
|
|
||||||
+ echo 'Requires: libcrypto'; \
|
|
||||||
echo 'Libs: -L$${libdir} -lssl'; \
|
|
||||||
- echo 'Libs.private: $(EX_LIBS)'; \
|
|
||||||
+ echo 'Libs.private: $(EX_LIBS) $(LIBKRB5)'; \
|
|
||||||
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libssl.pc
|
|
||||||
|
|
||||||
openssl.pc: Makefile
|
|
@ -1,15 +0,0 @@
|
|||||||
diff -up openssl-1.0.2i/engines/e_chil.c.chil openssl-1.0.2i/engines/e_chil.c
|
|
||||||
--- openssl-1.0.2i/engines/e_chil.c.chil 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/engines/e_chil.c 2016-09-22 13:49:32.532017102 +0200
|
|
||||||
@@ -1274,6 +1274,11 @@ static int hwcrhk_insert_card(const char
|
|
||||||
UI *ui;
|
|
||||||
void *callback_data = NULL;
|
|
||||||
UI_METHOD *ui_method = NULL;
|
|
||||||
+ /* Despite what the documentation says prompt_info can be
|
|
||||||
+ * an empty string.
|
|
||||||
+ */
|
|
||||||
+ if (prompt_info && !*prompt_info)
|
|
||||||
+ prompt_info = NULL;
|
|
||||||
|
|
||||||
if (cactx) {
|
|
||||||
if (cactx->ui_method)
|
|
@ -1,25 +0,0 @@
|
|||||||
diff -up openssl-1.0.2i/crypto/evp/bio_enc.c.enc-fail openssl-1.0.2i/crypto/evp/bio_enc.c
|
|
||||||
--- openssl-1.0.2i/crypto/evp/bio_enc.c.enc-fail 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/evp/bio_enc.c 2016-09-22 13:58:24.592381002 +0200
|
|
||||||
@@ -307,8 +307,9 @@ static long enc_ctrl(BIO *b, int cmd, lo
|
|
||||||
case BIO_CTRL_RESET:
|
|
||||||
ctx->ok = 1;
|
|
||||||
ctx->finished = 0;
|
|
||||||
- EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL,
|
|
||||||
- ctx->cipher.encrypt);
|
|
||||||
+ if (!EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL,
|
|
||||||
+ ctx->cipher.encrypt))
|
|
||||||
+ ctx->ok = 0;
|
|
||||||
ret = BIO_ctrl(b->next_bio, cmd, num, ptr);
|
|
||||||
break;
|
|
||||||
case BIO_CTRL_EOF: /* More to read */
|
|
||||||
@@ -430,7 +431,8 @@ void BIO_set_cipher(BIO *b, const EVP_CI
|
|
||||||
|
|
||||||
b->init = 1;
|
|
||||||
ctx = (BIO_ENC_CTX *)b->ptr;
|
|
||||||
- EVP_CipherInit_ex(&(ctx->cipher), c, NULL, k, i, e);
|
|
||||||
+ if (!EVP_CipherInit_ex(&(ctx->cipher), c, NULL, k, i, e))
|
|
||||||
+ ctx->ok = 0;
|
|
||||||
|
|
||||||
if (b->callback != NULL)
|
|
||||||
b->callback(b, BIO_CB_CTRL, (const char *)c, BIO_CTRL_SET, e, 1L);
|
|
@ -1,83 +0,0 @@
|
|||||||
diff --git a/Configure b/Configure
|
|
||||||
index c39f71a..7f3d905 100755
|
|
||||||
--- a/Configure
|
|
||||||
+++ b/Configure
|
|
||||||
@@ -727,6 +727,7 @@ my $idx_multilib = $idx++;
|
|
||||||
my $prefix="";
|
|
||||||
my $libdir="";
|
|
||||||
my $openssldir="";
|
|
||||||
+my $enginesdir="";
|
|
||||||
my $exe_ext="";
|
|
||||||
my $install_prefix= "$ENV{'INSTALL_PREFIX'}";
|
|
||||||
my $cross_compile_prefix="";
|
|
||||||
@@ -956,6 +957,10 @@ PROCESS_ARGS:
|
|
||||||
{
|
|
||||||
$openssldir=$1;
|
|
||||||
}
|
|
||||||
+ elsif (/^--enginesdir=(.*)$/)
|
|
||||||
+ {
|
|
||||||
+ $enginesdir=$1;
|
|
||||||
+ }
|
|
||||||
elsif (/^--install.prefix=(.*)$/)
|
|
||||||
{
|
|
||||||
$install_prefix=$1;
|
|
||||||
@@ -1207,7 +1212,7 @@ chop $prefix if $prefix =~ /.\/$/;
|
|
||||||
|
|
||||||
$openssldir=$prefix . "/ssl" if $openssldir eq "";
|
|
||||||
$openssldir=$prefix . "/" . $openssldir if $openssldir !~ /(^\/|^[a-zA-Z]:[\\\/])/;
|
|
||||||
-
|
|
||||||
+$enginesdir="$prefix/lib/engines" if $enginesdir eq "";
|
|
||||||
|
|
||||||
print "IsMK1MF=$IsMK1MF\n";
|
|
||||||
|
|
||||||
@@ -1709,6 +1714,7 @@ while (<IN>)
|
|
||||||
s/^INSTALLTOP=.*$/INSTALLTOP=$prefix/;
|
|
||||||
s/^MULTILIB=.*$/MULTILIB=$multilib/;
|
|
||||||
s/^OPENSSLDIR=.*$/OPENSSLDIR=$openssldir/;
|
|
||||||
+ s/^ENGINESDIR=.*$/ENGINESDIR=$enginesdir/;
|
|
||||||
s/^LIBDIR=.*$/LIBDIR=$libdir/;
|
|
||||||
s/^INSTALL_PREFIX=.*$/INSTALL_PREFIX=$install_prefix/;
|
|
||||||
s/^PLATFORM=.*$/PLATFORM=$target/;
|
|
||||||
@@ -1915,7 +1921,7 @@ while (<IN>)
|
|
||||||
}
|
|
||||||
elsif (/^#define\s+ENGINESDIR/)
|
|
||||||
{
|
|
||||||
- my $foo = "$prefix/$libdir/engines";
|
|
||||||
+ my $foo = "$enginesdir";
|
|
||||||
$foo =~ s/\\/\\\\/g;
|
|
||||||
print OUT "#define ENGINESDIR \"$foo\"\n";
|
|
||||||
}
|
|
||||||
diff --git a/Makefile.org b/Makefile.org
|
|
||||||
index 2377f50..fe8d54c 100644
|
|
||||||
--- a/Makefile.org
|
|
||||||
+++ b/Makefile.org
|
|
||||||
@@ -28,6 +28,7 @@ INSTALLTOP=/usr/local/ssl
|
|
||||||
|
|
||||||
# Do not edit this manually. Use Configure --openssldir=DIR do change this!
|
|
||||||
OPENSSLDIR=/usr/local/ssl
|
|
||||||
+ENGINESDIR=$${libdir}/engines
|
|
||||||
|
|
||||||
# NO_IDEA - Define to build without the IDEA algorithm
|
|
||||||
# NO_RC4 - Define to build without the RC4 algorithm
|
|
||||||
@@ -368,7 +369,7 @@ libcrypto.pc: Makefile
|
|
||||||
echo 'exec_prefix=$${prefix}'; \
|
|
||||||
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
|
||||||
echo 'includedir=$${prefix}/include'; \
|
|
||||||
- echo 'enginesdir=$${libdir}/engines'; \
|
|
||||||
+ echo 'enginesdir=$(ENGINESDIR)'; \
|
|
||||||
echo ''; \
|
|
||||||
echo 'Name: OpenSSL-libcrypto'; \
|
|
||||||
echo 'Description: OpenSSL cryptography library'; \
|
|
||||||
diff --git a/engines/Makefile b/engines/Makefile
|
|
||||||
index 2058ff4..a2c407b 100644
|
|
||||||
--- a/engines/Makefile
|
|
||||||
+++ b/engines/Makefile
|
|
||||||
@@ -124,7 +124,7 @@ install:
|
|
||||||
esac; \
|
|
||||||
cp $$pfx$$l$$sfx $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx.new; \
|
|
||||||
fi; \
|
|
||||||
- chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx.new; \
|
|
||||||
+ chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx.new; \
|
|
||||||
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx ); \
|
|
||||||
done; \
|
|
||||||
fi
|
|
File diff suppressed because it is too large
Load Diff
@ -1,241 +0,0 @@
|
|||||||
diff -up openssl-1.0.2i/crypto/conf/conf_api.c.secure-getenv openssl-1.0.2i/crypto/conf/conf_api.c
|
|
||||||
--- openssl-1.0.2i/crypto/conf/conf_api.c.secure-getenv 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/conf/conf_api.c 2016-09-22 13:51:29.847742209 +0200
|
|
||||||
@@ -63,6 +63,8 @@
|
|
||||||
# define NDEBUG
|
|
||||||
#endif
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <assert.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <string.h>
|
|
||||||
@@ -141,7 +143,7 @@ char *_CONF_get_string(const CONF *conf,
|
|
||||||
if (v != NULL)
|
|
||||||
return (v->value);
|
|
||||||
if (strcmp(section, "ENV") == 0) {
|
|
||||||
- p = getenv(name);
|
|
||||||
+ p = secure_getenv(name);
|
|
||||||
if (p != NULL)
|
|
||||||
return (p);
|
|
||||||
}
|
|
||||||
@@ -154,7 +156,7 @@ char *_CONF_get_string(const CONF *conf,
|
|
||||||
else
|
|
||||||
return (NULL);
|
|
||||||
} else
|
|
||||||
- return (getenv(name));
|
|
||||||
+ return (secure_getenv(name));
|
|
||||||
}
|
|
||||||
|
|
||||||
#if 0 /* There's no way to provide error checking
|
|
||||||
diff -up openssl-1.0.2i/crypto/conf/conf_mod.c.secure-getenv openssl-1.0.2i/crypto/conf/conf_mod.c
|
|
||||||
--- openssl-1.0.2i/crypto/conf/conf_mod.c.secure-getenv 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/conf/conf_mod.c 2016-09-22 13:51:29.847742209 +0200
|
|
||||||
@@ -57,6 +57,8 @@
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <ctype.h>
|
|
||||||
#include <openssl/crypto.h>
|
|
||||||
@@ -530,7 +532,7 @@ char *CONF_get1_default_config_file(void
|
|
||||||
char *file;
|
|
||||||
int len;
|
|
||||||
|
|
||||||
- file = getenv("OPENSSL_CONF");
|
|
||||||
+ file = secure_getenv("OPENSSL_CONF");
|
|
||||||
if (file)
|
|
||||||
return BUF_strdup(file);
|
|
||||||
|
|
||||||
diff -up openssl-1.0.2i/crypto/engine/eng_list.c.secure-getenv openssl-1.0.2i/crypto/engine/eng_list.c
|
|
||||||
--- openssl-1.0.2i/crypto/engine/eng_list.c.secure-getenv 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/engine/eng_list.c 2016-09-22 13:51:29.847742209 +0200
|
|
||||||
@@ -62,6 +62,8 @@
|
|
||||||
* SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include "eng_int.h"
|
|
||||||
|
|
||||||
/*
|
|
||||||
@@ -369,10 +371,10 @@ ENGINE *ENGINE_by_id(const char *id)
|
|
||||||
*/
|
|
||||||
if (strcmp(id, "dynamic")) {
|
|
||||||
# ifdef OPENSSL_SYS_VMS
|
|
||||||
- if ((load_dir = getenv("OPENSSL_ENGINES")) == 0)
|
|
||||||
+ if (OPENSSL_issetugid() || (load_dir = getenv("OPENSSL_ENGINES")) == 0)
|
|
||||||
load_dir = "SSLROOT:[ENGINES]";
|
|
||||||
# else
|
|
||||||
- if ((load_dir = getenv("OPENSSL_ENGINES")) == 0)
|
|
||||||
+ if ((load_dir = secure_getenv("OPENSSL_ENGINES")) == 0)
|
|
||||||
load_dir = ENGINESDIR;
|
|
||||||
# endif
|
|
||||||
iterator = ENGINE_by_id("dynamic");
|
|
||||||
diff -up openssl-1.0.2i/crypto/md5/md5_dgst.c.secure-getenv openssl-1.0.2i/crypto/md5/md5_dgst.c
|
|
||||||
--- openssl-1.0.2i/crypto/md5/md5_dgst.c.secure-getenv 2016-09-22 13:51:29.840742047 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/md5/md5_dgst.c 2016-09-22 13:51:29.847742209 +0200
|
|
||||||
@@ -56,6 +56,8 @@
|
|
||||||
* [including the GNU Public Licence.]
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <stdio.h>
|
|
||||||
#include "md5_locl.h"
|
|
||||||
#include <openssl/opensslv.h>
|
|
||||||
@@ -75,7 +77,8 @@ const char MD5_version[] = "MD5" OPENSSL
|
|
||||||
int MD5_Init(MD5_CTX *c)
|
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
{
|
|
||||||
- if (FIPS_mode() && getenv("OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW") == NULL)
|
|
||||||
+ if (FIPS_mode()
|
|
||||||
+ && secure_getenv("OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW") == NULL)
|
|
||||||
OpenSSLDie(__FILE__, __LINE__, "Digest MD5 forbidden in FIPS mode!");
|
|
||||||
return private_MD5_Init(c);
|
|
||||||
}
|
|
||||||
diff -up openssl-1.0.2i/crypto/o_init.c.secure-getenv openssl-1.0.2i/crypto/o_init.c
|
|
||||||
--- openssl-1.0.2i/crypto/o_init.c.secure-getenv 2016-09-22 13:51:29.830741814 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/o_init.c 2016-09-22 13:51:30.046746834 +0200
|
|
||||||
@@ -53,6 +53,8 @@
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <e_os.h>
|
|
||||||
#include <openssl/err.h>
|
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
@@ -72,7 +74,7 @@ static void init_fips_mode(void)
|
|
||||||
char buf[2] = "0";
|
|
||||||
int fd;
|
|
||||||
|
|
||||||
- if (getenv("OPENSSL_FORCE_FIPS_MODE") != NULL) {
|
|
||||||
+ if (secure_getenv("OPENSSL_FORCE_FIPS_MODE") != NULL) {
|
|
||||||
buf[0] = '1';
|
|
||||||
} else if ((fd = open(FIPS_MODE_SWITCH_FILE, O_RDONLY)) >= 0) {
|
|
||||||
while (read(fd, buf, sizeof(buf)) < 0 && errno == EINTR) ;
|
|
||||||
diff -up openssl-1.0.2i/crypto/rand/randfile.c.secure-getenv openssl-1.0.2i/crypto/rand/randfile.c
|
|
||||||
--- openssl-1.0.2i/crypto/rand/randfile.c.secure-getenv 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/rand/randfile.c 2016-09-22 13:53:17.222237626 +0200
|
|
||||||
@@ -55,6 +55,8 @@
|
|
||||||
* copied and put under another distribution licence
|
|
||||||
* [including the GNU Public Licence.]
|
|
||||||
*/
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
|
|
||||||
#include <errno.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
@@ -327,14 +329,12 @@ const char *RAND_file_name(char *buf, si
|
|
||||||
struct stat sb;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
- if (OPENSSL_issetugid() == 0)
|
|
||||||
- s = getenv("RANDFILE");
|
|
||||||
+ s = secure_getenv("RANDFILE");
|
|
||||||
if (s != NULL && *s && strlen(s) + 1 < size) {
|
|
||||||
if (BUF_strlcpy(buf, s, size) >= size)
|
|
||||||
return NULL;
|
|
||||||
} else {
|
|
||||||
- if (OPENSSL_issetugid() == 0)
|
|
||||||
- s = getenv("HOME");
|
|
||||||
+ s = secure_getenv("HOME");
|
|
||||||
#ifdef DEFAULT_HOME
|
|
||||||
if (s == NULL) {
|
|
||||||
s = DEFAULT_HOME;
|
|
||||||
diff -up openssl-1.0.2i/crypto/x509/by_dir.c.secure-getenv openssl-1.0.2i/crypto/x509/by_dir.c
|
|
||||||
--- openssl-1.0.2i/crypto/x509/by_dir.c.secure-getenv 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/x509/by_dir.c 2016-09-22 13:51:30.047746858 +0200
|
|
||||||
@@ -56,6 +56,8 @@
|
|
||||||
* [including the GNU Public Licence.]
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <time.h>
|
|
||||||
#include <errno.h>
|
|
||||||
@@ -128,7 +130,7 @@ static int dir_ctrl(X509_LOOKUP *ctx, in
|
|
||||||
switch (cmd) {
|
|
||||||
case X509_L_ADD_DIR:
|
|
||||||
if (argl == X509_FILETYPE_DEFAULT) {
|
|
||||||
- dir = (char *)getenv(X509_get_default_cert_dir_env());
|
|
||||||
+ dir = (char *)secure_getenv(X509_get_default_cert_dir_env());
|
|
||||||
if (dir)
|
|
||||||
ret = add_cert_dir(ld, dir, X509_FILETYPE_PEM);
|
|
||||||
else
|
|
||||||
diff -up openssl-1.0.2i/crypto/x509/by_file.c.secure-getenv openssl-1.0.2i/crypto/x509/by_file.c
|
|
||||||
--- openssl-1.0.2i/crypto/x509/by_file.c.secure-getenv 2016-09-22 13:51:29.812741396 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/x509/by_file.c 2016-09-22 13:51:30.047746858 +0200
|
|
||||||
@@ -56,6 +56,8 @@
|
|
||||||
* [including the GNU Public Licence.]
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <time.h>
|
|
||||||
#include <errno.h>
|
|
||||||
@@ -97,7 +99,7 @@ static int by_file_ctrl(X509_LOOKUP *ctx
|
|
||||||
switch (cmd) {
|
|
||||||
case X509_L_FILE_LOAD:
|
|
||||||
if (argl == X509_FILETYPE_DEFAULT) {
|
|
||||||
- file = (char *)getenv(X509_get_default_cert_file_env());
|
|
||||||
+ file = (char *)secure_getenv(X509_get_default_cert_file_env());
|
|
||||||
if (file)
|
|
||||||
ok = (X509_load_cert_crl_file(ctx, file,
|
|
||||||
X509_FILETYPE_PEM) != 0);
|
|
||||||
diff -up openssl-1.0.2i/crypto/x509/x509_vfy.c.secure-getenv openssl-1.0.2i/crypto/x509/x509_vfy.c
|
|
||||||
--- openssl-1.0.2i/crypto/x509/x509_vfy.c.secure-getenv 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/crypto/x509/x509_vfy.c 2016-09-22 13:51:30.048746881 +0200
|
|
||||||
@@ -56,6 +56,8 @@
|
|
||||||
* [including the GNU Public Licence.]
|
|
||||||
*/
|
|
||||||
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <time.h>
|
|
||||||
#include <errno.h>
|
|
||||||
@@ -620,7 +622,7 @@ static int check_chain_extensions(X509_S
|
|
||||||
* A hack to keep people who don't want to modify their software
|
|
||||||
* happy
|
|
||||||
*/
|
|
||||||
- if (getenv("OPENSSL_ALLOW_PROXY_CERTS"))
|
|
||||||
+ if (secure_getenv("OPENSSL_ALLOW_PROXY_CERTS"))
|
|
||||||
allow_proxy_certs = 1;
|
|
||||||
purpose = ctx->param->purpose;
|
|
||||||
}
|
|
||||||
diff -up openssl-1.0.2i/engines/ccgost/gost_ctl.c.secure-getenv openssl-1.0.2i/engines/ccgost/gost_ctl.c
|
|
||||||
--- openssl-1.0.2i/engines/ccgost/gost_ctl.c.secure-getenv 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/engines/ccgost/gost_ctl.c 2016-09-22 13:51:30.048746881 +0200
|
|
||||||
@@ -6,6 +6,8 @@
|
|
||||||
* Implementation of control commands for GOST engine *
|
|
||||||
* OpenSSL 0.9.9 libraries required *
|
|
||||||
**********************************************************************/
|
|
||||||
+/* for secure_getenv */
|
|
||||||
+#define _GNU_SOURCE
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <string.h>
|
|
||||||
#include <openssl/crypto.h>
|
|
||||||
@@ -64,7 +66,7 @@ const char *get_gost_engine_param(int pa
|
|
||||||
if (gost_params[param] != NULL) {
|
|
||||||
return gost_params[param];
|
|
||||||
}
|
|
||||||
- tmp = getenv(gost_envnames[param]);
|
|
||||||
+ tmp = secure_getenv(gost_envnames[param]);
|
|
||||||
if (tmp) {
|
|
||||||
if (gost_params[param])
|
|
||||||
OPENSSL_free(gost_params[param]);
|
|
||||||
@@ -79,7 +81,7 @@ int gost_set_default_param(int param, co
|
|
||||||
const char *tmp;
|
|
||||||
if (param < 0 || param > GOST_PARAM_MAX)
|
|
||||||
return 0;
|
|
||||||
- tmp = getenv(gost_envnames[param]);
|
|
||||||
+ tmp = secure_getenv(gost_envnames[param]);
|
|
||||||
/*
|
|
||||||
* if there is value in the environment, use it, else -passed string *
|
|
||||||
*/
|
|
@ -1,286 +0,0 @@
|
|||||||
diff -up openssl-1.0.2i/apps/cms.c.trusted-first openssl-1.0.2i/apps/cms.c
|
|
||||||
--- openssl-1.0.2i/apps/cms.c.trusted-first 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/apps/cms.c 2016-09-22 14:01:27.436630359 +0200
|
|
||||||
@@ -646,6 +646,8 @@ int MAIN(int argc, char **argv)
|
|
||||||
"-CApath dir trusted certificates directory\n");
|
|
||||||
BIO_printf(bio_err, "-CAfile file trusted certificates file\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
+ "-trusted_first use trusted certificates first when building the trust chain\n");
|
|
||||||
+ BIO_printf(bio_err,
|
|
||||||
"-no_alt_chains only ever use the first certificate chain found\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"-crl_check check revocation status of signer's certificate using CRLs\n");
|
|
||||||
diff -up openssl-1.0.2i/apps/ocsp.c.trusted-first openssl-1.0.2i/apps/ocsp.c
|
|
||||||
--- openssl-1.0.2i/apps/ocsp.c.trusted-first 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/apps/ocsp.c 2016-09-22 14:01:27.436630359 +0200
|
|
||||||
@@ -537,6 +537,8 @@ int MAIN(int argc, char **argv)
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"-CAfile file trusted certificates file\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
+ "-trusted_first use trusted certificates first when building the trust chain\n");
|
|
||||||
+ BIO_printf(bio_err,
|
|
||||||
"-no_alt_chains only ever use the first certificate chain found\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"-VAfile file validator certificates file\n");
|
|
||||||
diff -up openssl-1.0.2i/apps/s_client.c.trusted-first openssl-1.0.2i/apps/s_client.c
|
|
||||||
--- openssl-1.0.2i/apps/s_client.c.trusted-first 2016-09-22 14:01:27.402629569 +0200
|
|
||||||
+++ openssl-1.0.2i/apps/s_client.c 2016-09-22 14:01:27.436630359 +0200
|
|
||||||
@@ -330,6 +330,8 @@ static void sc_usage(void)
|
|
||||||
BIO_printf(bio_err, " -CApath arg - PEM format directory of CA's\n");
|
|
||||||
BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
+ " -trusted_first - Use trusted CA's first when building the trust chain\n");
|
|
||||||
+ BIO_printf(bio_err,
|
|
||||||
" -no_alt_chains - only ever use the first certificate chain found\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
" -reconnect - Drop and re-make the connection with the same Session-ID\n");
|
|
||||||
diff -up openssl-1.0.2i/apps/smime.c.trusted-first openssl-1.0.2i/apps/smime.c
|
|
||||||
--- openssl-1.0.2i/apps/smime.c.trusted-first 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/apps/smime.c 2016-09-22 14:01:27.436630359 +0200
|
|
||||||
@@ -442,6 +442,8 @@ int MAIN(int argc, char **argv)
|
|
||||||
"-CApath dir trusted certificates directory\n");
|
|
||||||
BIO_printf(bio_err, "-CAfile file trusted certificates file\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
+ "-trusted_first use trusted certificates first when building the trust chain\n");
|
|
||||||
+ BIO_printf(bio_err,
|
|
||||||
"-no_alt_chains only ever use the first certificate chain found\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"-crl_check check revocation status of signer's certificate using CRLs\n");
|
|
||||||
diff -up openssl-1.0.2i/apps/s_server.c.trusted-first openssl-1.0.2i/apps/s_server.c
|
|
||||||
--- openssl-1.0.2i/apps/s_server.c.trusted-first 2016-09-22 14:01:27.374628918 +0200
|
|
||||||
+++ openssl-1.0.2i/apps/s_server.c 2016-09-22 14:01:27.437630382 +0200
|
|
||||||
@@ -571,6 +571,8 @@ static void sv_usage(void)
|
|
||||||
BIO_printf(bio_err, " -CApath arg - PEM format directory of CA's\n");
|
|
||||||
BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
+ " -trusted_first - Use trusted CA's first when building the trust chain\n");
|
|
||||||
+ BIO_printf(bio_err,
|
|
||||||
" -no_alt_chains - only ever use the first certificate chain found\n");
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
" -nocert - Don't use any certificates (Anon-DH)\n");
|
|
||||||
diff -up openssl-1.0.2i/apps/s_time.c.trusted-first openssl-1.0.2i/apps/s_time.c
|
|
||||||
--- openssl-1.0.2i/apps/s_time.c.trusted-first 2016-09-22 14:01:27.368628779 +0200
|
|
||||||
+++ openssl-1.0.2i/apps/s_time.c 2016-09-22 14:01:27.437630382 +0200
|
|
||||||
@@ -182,6 +182,7 @@ static void s_time_usage(void)
|
|
||||||
file if not specified by this option\n\
|
|
||||||
-CApath arg - PEM format directory of CA's\n\
|
|
||||||
-CAfile arg - PEM format file of CA's\n\
|
|
||||||
+-trusted_first - Use trusted CA's first when building the trust chain\n\
|
|
||||||
-cipher - preferred cipher to use, play with 'openssl ciphers'\n\n";
|
|
||||||
|
|
||||||
printf("usage: s_time <args>\n\n");
|
|
||||||
diff -up openssl-1.0.2i/apps/ts.c.trusted-first openssl-1.0.2i/apps/ts.c
|
|
||||||
--- openssl-1.0.2i/apps/ts.c.trusted-first 2016-09-22 14:01:27.400629522 +0200
|
|
||||||
+++ openssl-1.0.2i/apps/ts.c 2016-09-22 14:01:27.437630382 +0200
|
|
||||||
@@ -352,7 +352,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
"ts -verify [-data file_to_hash] [-digest digest_bytes] "
|
|
||||||
"[-queryfile request.tsq] "
|
|
||||||
"-in response.tsr [-token_in] "
|
|
||||||
- "-CApath ca_path -CAfile ca_file.pem "
|
|
||||||
+ "-CApath ca_path -CAfile ca_file.pem -trusted_first"
|
|
||||||
"-untrusted cert_file.pem\n");
|
|
||||||
cleanup:
|
|
||||||
/* Clean up. */
|
|
||||||
diff -up openssl-1.0.2i/apps/verify.c.trusted-first openssl-1.0.2i/apps/verify.c
|
|
||||||
--- openssl-1.0.2i/apps/verify.c.trusted-first 2016-09-22 14:01:27.438630405 +0200
|
|
||||||
+++ openssl-1.0.2i/apps/verify.c 2016-09-22 14:02:37.951269140 +0200
|
|
||||||
@@ -231,7 +231,7 @@ int MAIN(int argc, char **argv)
|
|
||||||
usage:
|
|
||||||
if (ret == 1) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
- "usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
|
|
||||||
+ "usage: verify [-verbose] [-CApath path] [-CAfile file] [-trusted_first] [-purpose purpose] [-crl_check]");
|
|
||||||
BIO_printf(bio_err, " [-no_alt_chains] [-attime timestamp]");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err, " [-engine e]");
|
|
||||||
diff -up openssl-1.0.2i/doc/apps/cms.pod.trusted-first openssl-1.0.2i/doc/apps/cms.pod
|
|
||||||
--- openssl-1.0.2i/doc/apps/cms.pod.trusted-first 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/doc/apps/cms.pod 2016-09-22 14:01:27.438630405 +0200
|
|
||||||
@@ -35,6 +35,7 @@ B<openssl> B<cms>
|
|
||||||
[B<-print>]
|
|
||||||
[B<-CAfile file>]
|
|
||||||
[B<-CApath dir>]
|
|
||||||
+[B<-trusted_first>]
|
|
||||||
[B<-no_alt_chains>]
|
|
||||||
[B<-md digest>]
|
|
||||||
[B<-[cipher]>]
|
|
||||||
@@ -248,6 +249,12 @@ B<-verify>. This directory must be a sta
|
|
||||||
is a hash of each subject name (using B<x509 -hash>) should be linked
|
|
||||||
to each certificate.
|
|
||||||
|
|
||||||
+=item B<-trusted_first>
|
|
||||||
+
|
|
||||||
+Use certificates in CA file or CA directory before untrusted certificates
|
|
||||||
+from the message when building the trust chain to verify certificates.
|
|
||||||
+This is mainly useful in environments with Bridge CA or Cross-Certified CAs.
|
|
||||||
+
|
|
||||||
=item B<-md digest>
|
|
||||||
|
|
||||||
digest algorithm to use when signing or resigning. If not present then the
|
|
||||||
diff -up openssl-1.0.2i/doc/apps/ocsp.pod.trusted-first openssl-1.0.2i/doc/apps/ocsp.pod
|
|
||||||
--- openssl-1.0.2i/doc/apps/ocsp.pod.trusted-first 2016-09-22 14:01:27.401629545 +0200
|
|
||||||
+++ openssl-1.0.2i/doc/apps/ocsp.pod 2016-09-22 14:01:27.438630405 +0200
|
|
||||||
@@ -29,6 +29,7 @@ B<openssl> B<ocsp>
|
|
||||||
[B<-path>]
|
|
||||||
[B<-CApath dir>]
|
|
||||||
[B<-CAfile file>]
|
|
||||||
+[B<-trusted_first>]
|
|
||||||
[B<-no_alt_chains>]
|
|
||||||
[B<-VAfile file>]
|
|
||||||
[B<-validity_period n>]
|
|
||||||
@@ -144,6 +145,13 @@ connection timeout to the OCSP responder
|
|
||||||
file or pathname containing trusted CA certificates. These are used to verify
|
|
||||||
the signature on the OCSP response.
|
|
||||||
|
|
||||||
+=item B<-trusted_first>
|
|
||||||
+
|
|
||||||
+Use certificates in CA file or CA directory over certificates provided
|
|
||||||
+in the response or residing in other certificates file when building the trust
|
|
||||||
+chain to verify responder certificate.
|
|
||||||
+This is mainly useful in environments with Bridge CA or Cross-Certified CAs.
|
|
||||||
+
|
|
||||||
=item B<-no_alt_chains>
|
|
||||||
|
|
||||||
See L<B<verify>|verify(1)> manual page for details.
|
|
||||||
diff -up openssl-1.0.2i/doc/apps/s_client.pod.trusted-first openssl-1.0.2i/doc/apps/s_client.pod
|
|
||||||
--- openssl-1.0.2i/doc/apps/s_client.pod.trusted-first 2016-09-22 14:01:27.412629801 +0200
|
|
||||||
+++ openssl-1.0.2i/doc/apps/s_client.pod 2016-09-22 14:01:27.438630405 +0200
|
|
||||||
@@ -19,6 +19,7 @@ B<openssl> B<s_client>
|
|
||||||
[B<-pass arg>]
|
|
||||||
[B<-CApath directory>]
|
|
||||||
[B<-CAfile filename>]
|
|
||||||
+[B<-trusted_first>]
|
|
||||||
[B<-no_alt_chains>]
|
|
||||||
[B<-reconnect>]
|
|
||||||
[B<-pause>]
|
|
||||||
@@ -125,7 +126,7 @@ also used when building the client certi
|
|
||||||
A file containing trusted certificates to use during server authentication
|
|
||||||
and to use when attempting to build the client certificate chain.
|
|
||||||
|
|
||||||
-=item B<-purpose, -ignore_critical, -issuer_checks, -crl_check, -crl_check_all, -policy_check, -extended_crl, -x509_strict, -policy -check_ss_sig -no_alt_chains>
|
|
||||||
+=item B<-purpose, -ignore_critical, -issuer_checks, -crl_check, -crl_check_all, -policy_check, -extended_crl, -x509_strict, -policy -check_ss_sig, -trusted_first -no_alt_chains>
|
|
||||||
|
|
||||||
Set various certificate chain valiadition option. See the
|
|
||||||
L<B<verify>|verify(1)> manual page for details.
|
|
||||||
diff -up openssl-1.0.2i/doc/apps/smime.pod.trusted-first openssl-1.0.2i/doc/apps/smime.pod
|
|
||||||
--- openssl-1.0.2i/doc/apps/smime.pod.trusted-first 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/doc/apps/smime.pod 2016-09-22 14:01:27.438630405 +0200
|
|
||||||
@@ -15,6 +15,9 @@ B<openssl> B<smime>
|
|
||||||
[B<-pk7out>]
|
|
||||||
[B<-[cipher]>]
|
|
||||||
[B<-in file>]
|
|
||||||
+[B<-CAfile file>]
|
|
||||||
+[B<-CApath dir>]
|
|
||||||
+[B<-trusted_first>]
|
|
||||||
[B<-no_alt_chains>]
|
|
||||||
[B<-certfile file>]
|
|
||||||
[B<-signer file>]
|
|
||||||
@@ -150,6 +153,12 @@ B<-verify>. This directory must be a sta
|
|
||||||
is a hash of each subject name (using B<x509 -hash>) should be linked
|
|
||||||
to each certificate.
|
|
||||||
|
|
||||||
+=item B<-trusted_first>
|
|
||||||
+
|
|
||||||
+Use certificates in CA file or CA directory over certificates provided
|
|
||||||
+in the message when building the trust chain to verify a certificate.
|
|
||||||
+This is mainly useful in environments with Bridge CA or Cross-Certified CAs.
|
|
||||||
+
|
|
||||||
=item B<-md digest>
|
|
||||||
|
|
||||||
digest algorithm to use when signing or resigning. If not present then the
|
|
||||||
diff -up openssl-1.0.2i/doc/apps/s_server.pod.trusted-first openssl-1.0.2i/doc/apps/s_server.pod
|
|
||||||
--- openssl-1.0.2i/doc/apps/s_server.pod.trusted-first 2016-09-22 14:01:27.412629801 +0200
|
|
||||||
+++ openssl-1.0.2i/doc/apps/s_server.pod 2016-09-22 14:01:27.438630405 +0200
|
|
||||||
@@ -33,6 +33,7 @@ B<openssl> B<s_server>
|
|
||||||
[B<-state>]
|
|
||||||
[B<-CApath directory>]
|
|
||||||
[B<-CAfile filename>]
|
|
||||||
+[B<-trusted_first>]
|
|
||||||
[B<-no_alt_chains>]
|
|
||||||
[B<-nocert>]
|
|
||||||
[B<-cipher cipherlist>]
|
|
||||||
@@ -178,6 +179,12 @@ and to use when attempting to build the
|
|
||||||
is also used in the list of acceptable client CAs passed to the client when
|
|
||||||
a certificate is requested.
|
|
||||||
|
|
||||||
+=item B<-trusted_first>
|
|
||||||
+
|
|
||||||
+Use certificates in CA file or CA directory before other certificates
|
|
||||||
+when building the trust chain to verify client certificates.
|
|
||||||
+This is mainly useful in environments with Bridge CA or Cross-Certified CAs.
|
|
||||||
+
|
|
||||||
=item B<-no_alt_chains>
|
|
||||||
|
|
||||||
See the L<B<verify>|verify(1)> manual page for details.
|
|
||||||
diff -up openssl-1.0.2i/doc/apps/s_time.pod.trusted-first openssl-1.0.2i/doc/apps/s_time.pod
|
|
||||||
--- openssl-1.0.2i/doc/apps/s_time.pod.trusted-first 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/doc/apps/s_time.pod 2016-09-22 14:01:27.439630429 +0200
|
|
||||||
@@ -14,6 +14,7 @@ B<openssl> B<s_time>
|
|
||||||
[B<-key filename>]
|
|
||||||
[B<-CApath directory>]
|
|
||||||
[B<-CAfile filename>]
|
|
||||||
+[B<-trusted_first>]
|
|
||||||
[B<-reuse>]
|
|
||||||
[B<-new>]
|
|
||||||
[B<-verify depth>]
|
|
||||||
@@ -76,6 +77,12 @@ also used when building the client certi
|
|
||||||
A file containing trusted certificates to use during server authentication
|
|
||||||
and to use when attempting to build the client certificate chain.
|
|
||||||
|
|
||||||
+=item B<-trusted_first>
|
|
||||||
+
|
|
||||||
+Use certificates in CA file or CA directory over the certificates provided
|
|
||||||
+by the server when building the trust chain to verify server certificate.
|
|
||||||
+This is mainly useful in environments with Bridge CA or Cross-Certified CAs.
|
|
||||||
+
|
|
||||||
=item B<-new>
|
|
||||||
|
|
||||||
performs the timing test using a new session ID for each connection.
|
|
||||||
diff -up openssl-1.0.2i/doc/apps/ts.pod.trusted-first openssl-1.0.2i/doc/apps/ts.pod
|
|
||||||
--- openssl-1.0.2i/doc/apps/ts.pod.trusted-first 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/doc/apps/ts.pod 2016-09-22 14:01:27.439630429 +0200
|
|
||||||
@@ -46,6 +46,7 @@ B<-verify>
|
|
||||||
[B<-token_in>]
|
|
||||||
[B<-CApath> trusted_cert_path]
|
|
||||||
[B<-CAfile> trusted_certs.pem]
|
|
||||||
+[B<-trusted_first>]
|
|
||||||
[B<-untrusted> cert_file.pem]
|
|
||||||
|
|
||||||
=head1 DESCRIPTION
|
|
||||||
@@ -324,6 +325,12 @@ L<verify(1)|verify(1)> for additional de
|
|
||||||
or B<-CApath> must be specified.
|
|
||||||
(Optional)
|
|
||||||
|
|
||||||
+=item B<-trusted_first>
|
|
||||||
+
|
|
||||||
+Use certificates in CA file or CA directory before other certificates
|
|
||||||
+when building the trust chain to verify certificates.
|
|
||||||
+This is mainly useful in environments with Bridge CA or Cross-Certified CAs.
|
|
||||||
+
|
|
||||||
=item B<-untrusted> cert_file.pem
|
|
||||||
|
|
||||||
Set of additional untrusted certificates in PEM format which may be
|
|
||||||
diff -up openssl-1.0.2i/doc/apps/verify.pod.trusted-first openssl-1.0.2i/doc/apps/verify.pod
|
|
||||||
--- openssl-1.0.2i/doc/apps/verify.pod.trusted-first 2016-09-22 12:23:06.000000000 +0200
|
|
||||||
+++ openssl-1.0.2i/doc/apps/verify.pod 2016-09-22 14:01:27.439630429 +0200
|
|
||||||
@@ -9,6 +9,7 @@ verify - Utility to verify certificates.
|
|
||||||
B<openssl> B<verify>
|
|
||||||
[B<-CApath directory>]
|
|
||||||
[B<-CAfile file>]
|
|
||||||
+[B<-trusted_first>]
|
|
||||||
[B<-purpose purpose>]
|
|
||||||
[B<-policy arg>]
|
|
||||||
[B<-ignore_critical>]
|
|
||||||
@@ -86,6 +87,12 @@ If a valid CRL cannot be found an error
|
|
||||||
A file of untrusted certificates. The file should contain multiple certificates
|
|
||||||
in PEM format concatenated together.
|
|
||||||
|
|
||||||
+=item B<-trusted_first>
|
|
||||||
+
|
|
||||||
+Use certificates in CA file or CA directory before the certificates in the untrusted
|
|
||||||
+file when building the trust chain to verify certificates.
|
|
||||||
+This is mainly useful in environments with Bridge CA or Cross-Certified CAs.
|
|
||||||
+
|
|
||||||
=item B<-purpose purpose>
|
|
||||||
|
|
||||||
The intended use for the certificate. If this option is not specified,
|
|
11
openssl-1.1.0-issuer-hash.patch
Normal file
11
openssl-1.1.0-issuer-hash.patch
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
diff -up openssl-1.1.0-pre5/crypto/x509/x509_cmp.c.issuer-hash openssl-1.1.0-pre5/crypto/x509/x509_cmp.c
|
||||||
|
--- openssl-1.1.0-pre5/crypto/x509/x509_cmp.c.issuer-hash 2016-07-18 15:16:32.788881100 +0200
|
||||||
|
+++ openssl-1.1.0-pre5/crypto/x509/x509_cmp.c 2016-07-18 15:17:16.671871840 +0200
|
||||||
|
@@ -87,6 +87,7 @@ unsigned long X509_issuer_and_serial_has
|
||||||
|
|
||||||
|
if (ctx == NULL)
|
||||||
|
goto err;
|
||||||
|
+ EVP_MD_CTX_set_flags(ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
|
||||||
|
f = X509_NAME_oneline(a->cert_info.issuer, NULL, 0);
|
||||||
|
if (!EVP_DigestInit_ex(ctx, EVP_md5(), NULL))
|
||||||
|
goto err;
|
27
openssl-1.1.1-alpn-cb.patch
Normal file
27
openssl-1.1.1-alpn-cb.patch
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
commit 9e885a707d604e9528b5491b78fb9c00f41193fc
|
||||||
|
Author: Tomas Mraz <tmraz@fedoraproject.org>
|
||||||
|
Date: Thu Mar 26 15:59:00 2020 +0100
|
||||||
|
|
||||||
|
s_server: Properly indicate ALPN protocol mismatch
|
||||||
|
|
||||||
|
Return SSL_TLSEXT_ERR_ALERT_FATAL from alpn_select_cb so that
|
||||||
|
an alert is sent to the client on ALPN protocol mismatch.
|
||||||
|
|
||||||
|
Fixes: #2708
|
||||||
|
|
||||||
|
Reviewed-by: Matt Caswell <matt@openssl.org>
|
||||||
|
(Merged from https://github.com/openssl/openssl/pull/11415)
|
||||||
|
|
||||||
|
diff --git a/apps/s_server.c b/apps/s_server.c
|
||||||
|
index bcc83e562c..591c6c19c5 100644
|
||||||
|
--- a/apps/s_server.c
|
||||||
|
+++ b/apps/s_server.c
|
||||||
|
@@ -707,7 +707,7 @@ static int alpn_cb(SSL *s, const unsigned char **out, unsigned char *outlen,
|
||||||
|
if (SSL_select_next_proto
|
||||||
|
((unsigned char **)out, outlen, alpn_ctx->data, alpn_ctx->len, in,
|
||||||
|
inlen) != OPENSSL_NPN_NEGOTIATED) {
|
||||||
|
- return SSL_TLSEXT_ERR_NOACK;
|
||||||
|
+ return SSL_TLSEXT_ERR_ALERT_FATAL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!s_quiet) {
|
12
openssl-1.1.1-apps-dgst.patch
Normal file
12
openssl-1.1.1-apps-dgst.patch
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
diff -up openssl-1.1.1b/apps/ca.c.dgst openssl-1.1.1b/apps/ca.c
|
||||||
|
--- openssl-1.1.1b/apps/ca.c.dgst 2019-02-26 15:15:30.000000000 +0100
|
||||||
|
+++ openssl-1.1.1b/apps/ca.c 2019-03-15 15:53:46.622267688 +0100
|
||||||
|
@@ -169,7 +169,7 @@ const OPTIONS ca_options[] = {
|
||||||
|
{"enddate", OPT_ENDDATE, 's',
|
||||||
|
"YYMMDDHHMMSSZ cert notAfter (overrides -days)"},
|
||||||
|
{"days", OPT_DAYS, 'p', "Number of days to certify the cert for"},
|
||||||
|
- {"md", OPT_MD, 's', "md to use; one of md2, md5, sha or sha1"},
|
||||||
|
+ {"md", OPT_MD, 's', "md to use; see openssl help for list"},
|
||||||
|
{"policy", OPT_POLICY, 's', "The CA 'policy' to support"},
|
||||||
|
{"keyfile", OPT_KEYFILE, 's', "Private key"},
|
||||||
|
{"keyform", OPT_KEYFORM, 'f', "Private key file format (PEM or ENGINE)"},
|
1434
openssl-1.1.1-arm-update.patch
Normal file
1434
openssl-1.1.1-arm-update.patch
Normal file
File diff suppressed because it is too large
Load Diff
40
openssl-1.1.1-build.patch
Normal file
40
openssl-1.1.1-build.patch
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
diff -up openssl-1.1.1f/Configurations/10-main.conf.build openssl-1.1.1f/Configurations/10-main.conf
|
||||||
|
--- openssl-1.1.1f/Configurations/10-main.conf.build 2020-03-31 14:17:45.000000000 +0200
|
||||||
|
+++ openssl-1.1.1f/Configurations/10-main.conf 2020-04-07 16:42:10.920546387 +0200
|
||||||
|
@@ -678,6 +678,7 @@ my %targets = (
|
||||||
|
cxxflags => add("-m64"),
|
||||||
|
lib_cppflags => add("-DL_ENDIAN"),
|
||||||
|
perlasm_scheme => "linux64le",
|
||||||
|
+ multilib => "64",
|
||||||
|
},
|
||||||
|
|
||||||
|
"linux-armv4" => {
|
||||||
|
@@ -718,6 +719,7 @@ my %targets = (
|
||||||
|
"linux-aarch64" => {
|
||||||
|
inherit_from => [ "linux-generic64", asm("aarch64_asm") ],
|
||||||
|
perlasm_scheme => "linux64",
|
||||||
|
+ multilib => "64",
|
||||||
|
},
|
||||||
|
"linux-arm64ilp32" => { # https://wiki.linaro.org/Platform/arm64-ilp32
|
||||||
|
inherit_from => [ "linux-generic32", asm("aarch64_asm") ],
|
||||||
|
diff -up openssl-1.1.1f/Configurations/unix-Makefile.tmpl.build openssl-1.1.1f/Configurations/unix-Makefile.tmpl
|
||||||
|
--- openssl-1.1.1f/Configurations/unix-Makefile.tmpl.build 2020-04-07 16:42:10.920546387 +0200
|
||||||
|
+++ openssl-1.1.1f/Configurations/unix-Makefile.tmpl 2020-04-07 16:44:23.539142108 +0200
|
||||||
|
@@ -823,7 +823,7 @@ uninstall_runtime_libs:
|
||||||
|
install_man_docs:
|
||||||
|
@[ -n "$(INSTALLTOP)" ] || (echo INSTALLTOP should not be empty; exit 1)
|
||||||
|
@$(ECHO) "*** Installing manpages"
|
||||||
|
- $(PERL) $(SRCDIR)/util/process_docs.pl \
|
||||||
|
+ TZ=UTC $(PERL) $(SRCDIR)/util/process_docs.pl \
|
||||||
|
"--destdir=$(DESTDIR)$(MANDIR)" --type=man --suffix=$(MANSUFFIX)
|
||||||
|
|
||||||
|
uninstall_man_docs:
|
||||||
|
@@ -835,7 +835,7 @@ uninstall_man_docs:
|
||||||
|
install_html_docs:
|
||||||
|
@[ -n "$(INSTALLTOP)" ] || (echo INSTALLTOP should not be empty; exit 1)
|
||||||
|
@$(ECHO) "*** Installing HTML manpages"
|
||||||
|
- $(PERL) $(SRCDIR)/util/process_docs.pl \
|
||||||
|
+ TZ=UTC $(PERL) $(SRCDIR)/util/process_docs.pl \
|
||||||
|
"--destdir=$(DESTDIR)$(HTMLDIR)" --type=html
|
||||||
|
|
||||||
|
uninstall_html_docs:
|
56
openssl-1.1.1-conf-paths.patch
Normal file
56
openssl-1.1.1-conf-paths.patch
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
diff -up openssl-1.1.1-pre8/apps/CA.pl.in.conf-paths openssl-1.1.1-pre8/apps/CA.pl.in
|
||||||
|
--- openssl-1.1.1-pre8/apps/CA.pl.in.conf-paths 2018-06-20 16:48:09.000000000 +0200
|
||||||
|
+++ openssl-1.1.1-pre8/apps/CA.pl.in 2018-07-25 17:26:58.388624296 +0200
|
||||||
|
@@ -33,7 +33,7 @@ my $X509 = "$openssl x509";
|
||||||
|
my $PKCS12 = "$openssl pkcs12";
|
||||||
|
|
||||||
|
# default openssl.cnf file has setup as per the following
|
||||||
|
-my $CATOP = "./demoCA";
|
||||||
|
+my $CATOP = "/etc/pki/CA";
|
||||||
|
my $CAKEY = "cakey.pem";
|
||||||
|
my $CAREQ = "careq.pem";
|
||||||
|
my $CACERT = "cacert.pem";
|
||||||
|
diff -up openssl-1.1.1-pre8/apps/openssl.cnf.conf-paths openssl-1.1.1-pre8/apps/openssl.cnf
|
||||||
|
--- openssl-1.1.1-pre8/apps/openssl.cnf.conf-paths 2018-07-25 17:26:58.378624057 +0200
|
||||||
|
+++ openssl-1.1.1-pre8/apps/openssl.cnf 2018-07-27 13:20:08.198513471 +0200
|
||||||
|
@@ -23,6 +23,22 @@ oid_section = new_oids
|
||||||
|
# (Alternatively, use a configuration file that has only
|
||||||
|
# X.509v3 extensions in its main [= default] section.)
|
||||||
|
|
||||||
|
+# Load default TLS policy configuration
|
||||||
|
+
|
||||||
|
+openssl_conf = default_modules
|
||||||
|
+
|
||||||
|
+[ default_modules ]
|
||||||
|
+
|
||||||
|
+ssl_conf = ssl_module
|
||||||
|
+
|
||||||
|
+[ ssl_module ]
|
||||||
|
+
|
||||||
|
+system_default = crypto_policy
|
||||||
|
+
|
||||||
|
+[ crypto_policy ]
|
||||||
|
+
|
||||||
|
+.include = /etc/crypto-policies/back-ends/opensslcnf.config
|
||||||
|
+
|
||||||
|
[ new_oids ]
|
||||||
|
|
||||||
|
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||||
|
@@ -43,7 +59,7 @@ default_ca = CA_default # The default c
|
||||||
|
####################################################################
|
||||||
|
[ CA_default ]
|
||||||
|
|
||||||
|
-dir = ./demoCA # Where everything is kept
|
||||||
|
+dir = /etc/pki/CA # Where everything is kept
|
||||||
|
certs = $dir/certs # Where the issued certs are kept
|
||||||
|
crl_dir = $dir/crl # Where the issued crl are kept
|
||||||
|
database = $dir/index.txt # database index file.
|
||||||
|
@@ -329,7 +345,7 @@ default_tsa = tsa_config1 # the default
|
||||||
|
[ tsa_config1 ]
|
||||||
|
|
||||||
|
# These are used by the TSA reply generation only.
|
||||||
|
-dir = ./demoCA # TSA root directory
|
||||||
|
+dir = /etc/pki/CA # TSA root directory
|
||||||
|
serial = $dir/tsaserial # The current serial number (mandatory)
|
||||||
|
crypto_device = builtin # OpenSSL engine to use for signing
|
||||||
|
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
@ -1,7 +1,7 @@
|
|||||||
diff -up openssl-1.0.2a/apps/openssl.cnf.defaults openssl-1.0.2a/apps/openssl.cnf
|
diff -up openssl-1.1.1a/apps/openssl.cnf.defaults openssl-1.1.1a/apps/openssl.cnf
|
||||||
--- openssl-1.0.2a/apps/openssl.cnf.defaults 2015-03-19 14:30:36.000000000 +0100
|
--- openssl-1.1.1a/apps/openssl.cnf.defaults 2018-11-20 14:35:37.000000000 +0100
|
||||||
+++ openssl-1.0.2a/apps/openssl.cnf 2015-04-20 14:37:10.112271850 +0200
|
+++ openssl-1.1.1a/apps/openssl.cnf 2019-01-15 13:56:50.841719776 +0100
|
||||||
@@ -72,7 +72,7 @@ cert_opt = ca_default # Certificate fi
|
@@ -74,7 +74,7 @@ cert_opt = ca_default # Certificate fi
|
||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
@ -10,7 +10,7 @@ diff -up openssl-1.0.2a/apps/openssl.cnf.defaults openssl-1.0.2a/apps/openssl.cn
|
|||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -104,6 +104,7 @@ emailAddress = optional
|
@@ -106,6 +106,7 @@ emailAddress = optional
|
||||||
####################################################################
|
####################################################################
|
||||||
[ req ]
|
[ req ]
|
||||||
default_bits = 2048
|
default_bits = 2048
|
||||||
@ -18,7 +18,7 @@ diff -up openssl-1.0.2a/apps/openssl.cnf.defaults openssl-1.0.2a/apps/openssl.cn
|
|||||||
default_keyfile = privkey.pem
|
default_keyfile = privkey.pem
|
||||||
distinguished_name = req_distinguished_name
|
distinguished_name = req_distinguished_name
|
||||||
attributes = req_attributes
|
attributes = req_attributes
|
||||||
@@ -126,17 +127,18 @@ string_mask = utf8only
|
@@ -128,17 +129,18 @@ string_mask = utf8only
|
||||||
|
|
||||||
[ req_distinguished_name ]
|
[ req_distinguished_name ]
|
||||||
countryName = Country Name (2 letter code)
|
countryName = Country Name (2 letter code)
|
||||||
@ -40,7 +40,7 @@ diff -up openssl-1.0.2a/apps/openssl.cnf.defaults openssl-1.0.2a/apps/openssl.cn
|
|||||||
|
|
||||||
# we can do this but it is not needed normally :-)
|
# we can do this but it is not needed normally :-)
|
||||||
#1.organizationName = Second Organization Name (eg, company)
|
#1.organizationName = Second Organization Name (eg, company)
|
||||||
@@ -145,7 +147,7 @@ localityName = Locality Name (eg, city
|
@@ -147,7 +149,7 @@ localityName = Locality Name (eg, city
|
||||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||||
#organizationalUnitName_default =
|
#organizationalUnitName_default =
|
||||||
|
|
||||||
@ -49,12 +49,3 @@ diff -up openssl-1.0.2a/apps/openssl.cnf.defaults openssl-1.0.2a/apps/openssl.cn
|
|||||||
commonName_max = 64
|
commonName_max = 64
|
||||||
|
|
||||||
emailAddress = Email Address
|
emailAddress = Email Address
|
||||||
@@ -339,7 +341,7 @@ signer_key = $dir/private/tsakey.pem # T
|
|
||||||
default_policy = tsa_policy1 # Policy if request did not specify it
|
|
||||||
# (optional)
|
|
||||||
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
|
||||||
-digests = md5, sha1 # Acceptable message digests (mandatory)
|
|
||||||
+digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
|
|
||||||
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
|
||||||
clock_precision_digits = 0 # number of digits after dot. (optional)
|
|
||||||
ordering = yes # Is ordering defined for timestamps?
|
|
91
openssl-1.1.1-disable-ssl3.patch
Normal file
91
openssl-1.1.1-disable-ssl3.patch
Normal file
@ -0,0 +1,91 @@
|
|||||||
|
diff -up openssl-1.1.1-pre8/apps/s_client.c.disable-ssl3 openssl-1.1.1-pre8/apps/s_client.c
|
||||||
|
--- openssl-1.1.1-pre8/apps/s_client.c.disable-ssl3 2018-07-16 18:08:20.000487628 +0200
|
||||||
|
+++ openssl-1.1.1-pre8/apps/s_client.c 2018-07-16 18:16:40.070186323 +0200
|
||||||
|
@@ -1681,6 +1681,9 @@ int s_client_main(int argc, char **argv)
|
||||||
|
if (sdebug)
|
||||||
|
ssl_ctx_security_debug(ctx, sdebug);
|
||||||
|
|
||||||
|
+ if (min_version == SSL3_VERSION && max_version == SSL3_VERSION)
|
||||||
|
+ SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv3);
|
||||||
|
+
|
||||||
|
if (!config_ctx(cctx, ssl_args, ctx))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1-pre8/apps/s_server.c.disable-ssl3 openssl-1.1.1-pre8/apps/s_server.c
|
||||||
|
--- openssl-1.1.1-pre8/apps/s_server.c.disable-ssl3 2018-07-16 18:08:20.000487628 +0200
|
||||||
|
+++ openssl-1.1.1-pre8/apps/s_server.c 2018-07-16 18:17:17.300055551 +0200
|
||||||
|
@@ -1760,6 +1760,9 @@ int s_server_main(int argc, char *argv[]
|
||||||
|
if (sdebug)
|
||||||
|
ssl_ctx_security_debug(ctx, sdebug);
|
||||||
|
|
||||||
|
+ if (min_version == SSL3_VERSION && max_version == SSL3_VERSION)
|
||||||
|
+ SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv3);
|
||||||
|
+
|
||||||
|
if (!config_ctx(cctx, ssl_args, ctx))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1-pre8/ssl/ssl_lib.c.disable-ssl3 openssl-1.1.1-pre8/ssl/ssl_lib.c
|
||||||
|
--- openssl-1.1.1-pre8/ssl/ssl_lib.c.disable-ssl3 2018-06-20 16:48:13.000000000 +0200
|
||||||
|
+++ openssl-1.1.1-pre8/ssl/ssl_lib.c 2018-07-16 18:08:20.001487652 +0200
|
||||||
|
@@ -3016,6 +3016,16 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *m
|
||||||
|
*/
|
||||||
|
ret->options |= SSL_OP_NO_COMPRESSION | SSL_OP_ENABLE_MIDDLEBOX_COMPAT;
|
||||||
|
|
||||||
|
+ if (meth->version != SSL3_VERSION) {
|
||||||
|
+ /*
|
||||||
|
+ * Disable SSLv3 by default. Applications can
|
||||||
|
+ * re-enable it by configuring
|
||||||
|
+ * SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv3);
|
||||||
|
+ * or by using the SSL_CONF API.
|
||||||
|
+ */
|
||||||
|
+ ret->options |= SSL_OP_NO_SSLv3;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
ret->ext.status_type = TLSEXT_STATUSTYPE_nothing;
|
||||||
|
|
||||||
|
/*
|
||||||
|
diff -up openssl-1.1.1-pre8/test/ssl_test.c.disable-ssl3 openssl-1.1.1-pre8/test/ssl_test.c
|
||||||
|
--- openssl-1.1.1-pre8/test/ssl_test.c.disable-ssl3 2018-06-20 16:48:15.000000000 +0200
|
||||||
|
+++ openssl-1.1.1-pre8/test/ssl_test.c 2018-07-16 18:18:34.806865121 +0200
|
||||||
|
@@ -443,6 +443,7 @@ static int test_handshake(int idx)
|
||||||
|
SSL_TEST_SERVERNAME_CB_NONE) {
|
||||||
|
if (!TEST_ptr(server2_ctx = SSL_CTX_new(TLS_server_method())))
|
||||||
|
goto err;
|
||||||
|
+ SSL_CTX_clear_options(server2_ctx, SSL_OP_NO_SSLv3);
|
||||||
|
if (!TEST_true(SSL_CTX_set_max_proto_version(server2_ctx,
|
||||||
|
TLS_MAX_VERSION)))
|
||||||
|
goto err;
|
||||||
|
@@ -464,6 +465,8 @@ static int test_handshake(int idx)
|
||||||
|
if (!TEST_ptr(resume_server_ctx)
|
||||||
|
|| !TEST_ptr(resume_client_ctx))
|
||||||
|
goto err;
|
||||||
|
+ SSL_CTX_clear_options(resume_server_ctx, SSL_OP_NO_SSLv3);
|
||||||
|
+ SSL_CTX_clear_options(resume_client_ctx, SSL_OP_NO_SSLv3);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -477,6 +480,9 @@ static int test_handshake(int idx)
|
||||||
|
|| !TEST_int_gt(CONF_modules_load(conf, test_app, 0), 0))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
+ SSL_CTX_clear_options(server_ctx, SSL_OP_NO_SSLv3);
|
||||||
|
+ SSL_CTX_clear_options(client_ctx, SSL_OP_NO_SSLv3);
|
||||||
|
+
|
||||||
|
if (!SSL_CTX_config(server_ctx, "server")
|
||||||
|
|| !SSL_CTX_config(client_ctx, "client")) {
|
||||||
|
goto err;
|
||||||
|
diff -up openssl-1.1.1-pre8/test/ssltest_old.c.disable-ssl3 openssl-1.1.1-pre8/test/ssltest_old.c
|
||||||
|
--- openssl-1.1.1-pre8/test/ssltest_old.c.disable-ssl3 2018-06-20 16:48:15.000000000 +0200
|
||||||
|
+++ openssl-1.1.1-pre8/test/ssltest_old.c 2018-07-16 18:08:20.002487676 +0200
|
||||||
|
@@ -1358,6 +1358,11 @@ int main(int argc, char *argv[])
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
+
|
||||||
|
+ SSL_CTX_clear_options(c_ctx, SSL_OP_NO_SSLv3);
|
||||||
|
+ SSL_CTX_clear_options(s_ctx, SSL_OP_NO_SSLv3);
|
||||||
|
+ SSL_CTX_clear_options(s_ctx2, SSL_OP_NO_SSLv3);
|
||||||
|
+
|
||||||
|
/*
|
||||||
|
* Since we will use low security ciphersuites and keys for testing set
|
||||||
|
* security level to zero by default. Tests can override this by adding
|
266
openssl-1.1.1-ec-curves.patch
Normal file
266
openssl-1.1.1-ec-curves.patch
Normal file
@ -0,0 +1,266 @@
|
|||||||
|
diff -up openssl-1.1.1h/apps/speed.c.curves openssl-1.1.1h/apps/speed.c
|
||||||
|
--- openssl-1.1.1h/apps/speed.c.curves 2020-09-22 14:55:07.000000000 +0200
|
||||||
|
+++ openssl-1.1.1h/apps/speed.c 2020-11-06 13:27:15.659288431 +0100
|
||||||
|
@@ -490,90 +490,30 @@ static double rsa_results[RSA_NUM][2];
|
||||||
|
#endif /* OPENSSL_NO_RSA */
|
||||||
|
|
||||||
|
enum {
|
||||||
|
- R_EC_P160,
|
||||||
|
- R_EC_P192,
|
||||||
|
R_EC_P224,
|
||||||
|
R_EC_P256,
|
||||||
|
R_EC_P384,
|
||||||
|
R_EC_P521,
|
||||||
|
-#ifndef OPENSSL_NO_EC2M
|
||||||
|
- R_EC_K163,
|
||||||
|
- R_EC_K233,
|
||||||
|
- R_EC_K283,
|
||||||
|
- R_EC_K409,
|
||||||
|
- R_EC_K571,
|
||||||
|
- R_EC_B163,
|
||||||
|
- R_EC_B233,
|
||||||
|
- R_EC_B283,
|
||||||
|
- R_EC_B409,
|
||||||
|
- R_EC_B571,
|
||||||
|
-#endif
|
||||||
|
- R_EC_BRP256R1,
|
||||||
|
- R_EC_BRP256T1,
|
||||||
|
- R_EC_BRP384R1,
|
||||||
|
- R_EC_BRP384T1,
|
||||||
|
- R_EC_BRP512R1,
|
||||||
|
- R_EC_BRP512T1,
|
||||||
|
R_EC_X25519,
|
||||||
|
R_EC_X448
|
||||||
|
};
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_EC
|
||||||
|
static OPT_PAIR ecdsa_choices[] = {
|
||||||
|
- {"ecdsap160", R_EC_P160},
|
||||||
|
- {"ecdsap192", R_EC_P192},
|
||||||
|
{"ecdsap224", R_EC_P224},
|
||||||
|
{"ecdsap256", R_EC_P256},
|
||||||
|
{"ecdsap384", R_EC_P384},
|
||||||
|
{"ecdsap521", R_EC_P521},
|
||||||
|
-# ifndef OPENSSL_NO_EC2M
|
||||||
|
- {"ecdsak163", R_EC_K163},
|
||||||
|
- {"ecdsak233", R_EC_K233},
|
||||||
|
- {"ecdsak283", R_EC_K283},
|
||||||
|
- {"ecdsak409", R_EC_K409},
|
||||||
|
- {"ecdsak571", R_EC_K571},
|
||||||
|
- {"ecdsab163", R_EC_B163},
|
||||||
|
- {"ecdsab233", R_EC_B233},
|
||||||
|
- {"ecdsab283", R_EC_B283},
|
||||||
|
- {"ecdsab409", R_EC_B409},
|
||||||
|
- {"ecdsab571", R_EC_B571},
|
||||||
|
-# endif
|
||||||
|
- {"ecdsabrp256r1", R_EC_BRP256R1},
|
||||||
|
- {"ecdsabrp256t1", R_EC_BRP256T1},
|
||||||
|
- {"ecdsabrp384r1", R_EC_BRP384R1},
|
||||||
|
- {"ecdsabrp384t1", R_EC_BRP384T1},
|
||||||
|
- {"ecdsabrp512r1", R_EC_BRP512R1},
|
||||||
|
- {"ecdsabrp512t1", R_EC_BRP512T1}
|
||||||
|
};
|
||||||
|
# define ECDSA_NUM OSSL_NELEM(ecdsa_choices)
|
||||||
|
|
||||||
|
static double ecdsa_results[ECDSA_NUM][2]; /* 2 ops: sign then verify */
|
||||||
|
|
||||||
|
static const OPT_PAIR ecdh_choices[] = {
|
||||||
|
- {"ecdhp160", R_EC_P160},
|
||||||
|
- {"ecdhp192", R_EC_P192},
|
||||||
|
{"ecdhp224", R_EC_P224},
|
||||||
|
{"ecdhp256", R_EC_P256},
|
||||||
|
{"ecdhp384", R_EC_P384},
|
||||||
|
{"ecdhp521", R_EC_P521},
|
||||||
|
-# ifndef OPENSSL_NO_EC2M
|
||||||
|
- {"ecdhk163", R_EC_K163},
|
||||||
|
- {"ecdhk233", R_EC_K233},
|
||||||
|
- {"ecdhk283", R_EC_K283},
|
||||||
|
- {"ecdhk409", R_EC_K409},
|
||||||
|
- {"ecdhk571", R_EC_K571},
|
||||||
|
- {"ecdhb163", R_EC_B163},
|
||||||
|
- {"ecdhb233", R_EC_B233},
|
||||||
|
- {"ecdhb283", R_EC_B283},
|
||||||
|
- {"ecdhb409", R_EC_B409},
|
||||||
|
- {"ecdhb571", R_EC_B571},
|
||||||
|
-# endif
|
||||||
|
- {"ecdhbrp256r1", R_EC_BRP256R1},
|
||||||
|
- {"ecdhbrp256t1", R_EC_BRP256T1},
|
||||||
|
- {"ecdhbrp384r1", R_EC_BRP384R1},
|
||||||
|
- {"ecdhbrp384t1", R_EC_BRP384T1},
|
||||||
|
- {"ecdhbrp512r1", R_EC_BRP512R1},
|
||||||
|
- {"ecdhbrp512t1", R_EC_BRP512T1},
|
||||||
|
{"ecdhx25519", R_EC_X25519},
|
||||||
|
{"ecdhx448", R_EC_X448}
|
||||||
|
};
|
||||||
|
@@ -1502,31 +1442,10 @@ int speed_main(int argc, char **argv)
|
||||||
|
unsigned int bits;
|
||||||
|
} test_curves[] = {
|
||||||
|
/* Prime Curves */
|
||||||
|
- {"secp160r1", NID_secp160r1, 160},
|
||||||
|
- {"nistp192", NID_X9_62_prime192v1, 192},
|
||||||
|
{"nistp224", NID_secp224r1, 224},
|
||||||
|
{"nistp256", NID_X9_62_prime256v1, 256},
|
||||||
|
{"nistp384", NID_secp384r1, 384},
|
||||||
|
{"nistp521", NID_secp521r1, 521},
|
||||||
|
-# ifndef OPENSSL_NO_EC2M
|
||||||
|
- /* Binary Curves */
|
||||||
|
- {"nistk163", NID_sect163k1, 163},
|
||||||
|
- {"nistk233", NID_sect233k1, 233},
|
||||||
|
- {"nistk283", NID_sect283k1, 283},
|
||||||
|
- {"nistk409", NID_sect409k1, 409},
|
||||||
|
- {"nistk571", NID_sect571k1, 571},
|
||||||
|
- {"nistb163", NID_sect163r2, 163},
|
||||||
|
- {"nistb233", NID_sect233r1, 233},
|
||||||
|
- {"nistb283", NID_sect283r1, 283},
|
||||||
|
- {"nistb409", NID_sect409r1, 409},
|
||||||
|
- {"nistb571", NID_sect571r1, 571},
|
||||||
|
-# endif
|
||||||
|
- {"brainpoolP256r1", NID_brainpoolP256r1, 256},
|
||||||
|
- {"brainpoolP256t1", NID_brainpoolP256t1, 256},
|
||||||
|
- {"brainpoolP384r1", NID_brainpoolP384r1, 384},
|
||||||
|
- {"brainpoolP384t1", NID_brainpoolP384t1, 384},
|
||||||
|
- {"brainpoolP512r1", NID_brainpoolP512r1, 512},
|
||||||
|
- {"brainpoolP512t1", NID_brainpoolP512t1, 512},
|
||||||
|
/* Other and ECDH only ones */
|
||||||
|
{"X25519", NID_X25519, 253},
|
||||||
|
{"X448", NID_X448, 448}
|
||||||
|
@@ -2026,9 +1945,9 @@ int speed_main(int argc, char **argv)
|
||||||
|
# endif
|
||||||
|
|
||||||
|
# ifndef OPENSSL_NO_EC
|
||||||
|
- ecdsa_c[R_EC_P160][0] = count / 1000;
|
||||||
|
- ecdsa_c[R_EC_P160][1] = count / 1000 / 2;
|
||||||
|
- for (i = R_EC_P192; i <= R_EC_P521; i++) {
|
||||||
|
+ ecdsa_c[R_EC_P224][0] = count / 1000;
|
||||||
|
+ ecdsa_c[R_EC_P224][1] = count / 1000 / 2;
|
||||||
|
+ for (i = R_EC_P256; i <= R_EC_P521; i++) {
|
||||||
|
ecdsa_c[i][0] = ecdsa_c[i - 1][0] / 2;
|
||||||
|
ecdsa_c[i][1] = ecdsa_c[i - 1][1] / 2;
|
||||||
|
if (ecdsa_doit[i] <= 1 && ecdsa_c[i][0] == 0)
|
||||||
|
@@ -2040,7 +1959,7 @@ int speed_main(int argc, char **argv)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
-# ifndef OPENSSL_NO_EC2M
|
||||||
|
+# if 0
|
||||||
|
ecdsa_c[R_EC_K163][0] = count / 1000;
|
||||||
|
ecdsa_c[R_EC_K163][1] = count / 1000 / 2;
|
||||||
|
for (i = R_EC_K233; i <= R_EC_K571; i++) {
|
||||||
|
@@ -2071,8 +1990,8 @@ int speed_main(int argc, char **argv)
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
|
||||||
|
- ecdh_c[R_EC_P160][0] = count / 1000;
|
||||||
|
- for (i = R_EC_P192; i <= R_EC_P521; i++) {
|
||||||
|
+ ecdh_c[R_EC_P224][0] = count / 1000;
|
||||||
|
+ for (i = R_EC_P256; i <= R_EC_P521; i++) {
|
||||||
|
ecdh_c[i][0] = ecdh_c[i - 1][0] / 2;
|
||||||
|
if (ecdh_doit[i] <= 1 && ecdh_c[i][0] == 0)
|
||||||
|
ecdh_doit[i] = 0;
|
||||||
|
@@ -2082,7 +2001,7 @@ int speed_main(int argc, char **argv)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
-# ifndef OPENSSL_NO_EC2M
|
||||||
|
+# if 0
|
||||||
|
ecdh_c[R_EC_K163][0] = count / 1000;
|
||||||
|
for (i = R_EC_K233; i <= R_EC_K571; i++) {
|
||||||
|
ecdh_c[i][0] = ecdh_c[i - 1][0] / 2;
|
||||||
|
diff -up openssl-1.1.1h/crypto/ec/ecp_smpl.c.curves openssl-1.1.1h/crypto/ec/ecp_smpl.c
|
||||||
|
--- openssl-1.1.1h/crypto/ec/ecp_smpl.c.curves 2020-09-22 14:55:07.000000000 +0200
|
||||||
|
+++ openssl-1.1.1h/crypto/ec/ecp_smpl.c 2020-11-06 13:27:15.659288431 +0100
|
||||||
|
@@ -145,6 +145,11 @@ int ec_GFp_simple_group_set_curve(EC_GRO
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if (BN_num_bits(p) < 224) {
|
||||||
|
+ ECerr(EC_F_EC_GFP_SIMPLE_GROUP_SET_CURVE, EC_R_UNSUPPORTED_FIELD);
|
||||||
|
+ return 0;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
if (ctx == NULL) {
|
||||||
|
ctx = new_ctx = BN_CTX_new();
|
||||||
|
if (ctx == NULL)
|
||||||
|
diff -up openssl-1.1.1h/test/ecdsatest.h.curves openssl-1.1.1h/test/ecdsatest.h
|
||||||
|
--- openssl-1.1.1h/test/ecdsatest.h.curves 2020-11-06 13:27:15.627288114 +0100
|
||||||
|
+++ openssl-1.1.1h/test/ecdsatest.h 2020-11-06 13:27:15.660288441 +0100
|
||||||
|
@@ -32,23 +32,6 @@ typedef struct {
|
||||||
|
} ecdsa_cavs_kat_t;
|
||||||
|
|
||||||
|
static const ecdsa_cavs_kat_t ecdsa_cavs_kats[] = {
|
||||||
|
- /* prime KATs from X9.62 */
|
||||||
|
- {NID_X9_62_prime192v1, NID_sha1,
|
||||||
|
- "616263", /* "abc" */
|
||||||
|
- "1a8d598fc15bf0fd89030b5cb1111aeb92ae8baf5ea475fb",
|
||||||
|
- "0462b12d60690cdcf330babab6e69763b471f994dd702d16a563bf5ec08069705ffff65e"
|
||||||
|
- "5ca5c0d69716dfcb3474373902",
|
||||||
|
- "fa6de29746bbeb7f8bb1e761f85f7dfb2983169d82fa2f4e",
|
||||||
|
- "885052380ff147b734c330c43d39b2c4a89f29b0f749fead",
|
||||||
|
- "e9ecc78106def82bf1070cf1d4d804c3cb390046951df686"},
|
||||||
|
- {NID_X9_62_prime239v1, NID_sha1,
|
||||||
|
- "616263", /* "abc" */
|
||||||
|
- "7ef7c6fabefffdea864206e80b0b08a9331ed93e698561b64ca0f7777f3d",
|
||||||
|
- "045b6dc53bc61a2548ffb0f671472de6c9521a9d2d2534e65abfcbd5fe0c707fd9f1ed2e"
|
||||||
|
- "65f09f6ce0893baf5e8e31e6ae82ea8c3592335be906d38dee",
|
||||||
|
- "656c7196bf87dcc5d1f1020906df2782360d36b2de7a17ece37d503784af",
|
||||||
|
- "2cb7f36803ebb9c427c58d8265f11fc5084747133078fc279de874fbecb0",
|
||||||
|
- "2eeae988104e9c2234a3c2beb1f53bfa5dc11ff36a875d1e3ccb1f7e45cf"},
|
||||||
|
/* prime KATs from NIST CAVP */
|
||||||
|
{NID_secp224r1, NID_sha224,
|
||||||
|
"699325d6fc8fbbb4981a6ded3c3a54ad2e4e3db8a5669201912064c64e700c139248cdc1"
|
||||||
|
--- openssl-1.1.1h/test/recipes/15-test_genec.t.ec-curves 2020-11-06 13:58:36.402895540 +0100
|
||||||
|
+++ openssl-1.1.1h/test/recipes/15-test_genec.t 2020-11-06 13:59:38.508484498 +0100
|
||||||
|
@@ -20,45 +20,11 @@ plan skip_all => "This test is unsupport
|
||||||
|
if disabled("ec");
|
||||||
|
|
||||||
|
my @prime_curves = qw(
|
||||||
|
- secp112r1
|
||||||
|
- secp112r2
|
||||||
|
- secp128r1
|
||||||
|
- secp128r2
|
||||||
|
- secp160k1
|
||||||
|
- secp160r1
|
||||||
|
- secp160r2
|
||||||
|
- secp192k1
|
||||||
|
- secp224k1
|
||||||
|
secp224r1
|
||||||
|
secp256k1
|
||||||
|
secp384r1
|
||||||
|
secp521r1
|
||||||
|
- prime192v1
|
||||||
|
- prime192v2
|
||||||
|
- prime192v3
|
||||||
|
- prime239v1
|
||||||
|
- prime239v2
|
||||||
|
- prime239v3
|
||||||
|
prime256v1
|
||||||
|
- wap-wsg-idm-ecid-wtls6
|
||||||
|
- wap-wsg-idm-ecid-wtls7
|
||||||
|
- wap-wsg-idm-ecid-wtls8
|
||||||
|
- wap-wsg-idm-ecid-wtls9
|
||||||
|
- wap-wsg-idm-ecid-wtls12
|
||||||
|
- brainpoolP160r1
|
||||||
|
- brainpoolP160t1
|
||||||
|
- brainpoolP192r1
|
||||||
|
- brainpoolP192t1
|
||||||
|
- brainpoolP224r1
|
||||||
|
- brainpoolP224t1
|
||||||
|
- brainpoolP256r1
|
||||||
|
- brainpoolP256t1
|
||||||
|
- brainpoolP320r1
|
||||||
|
- brainpoolP320t1
|
||||||
|
- brainpoolP384r1
|
||||||
|
- brainpoolP384t1
|
||||||
|
- brainpoolP512r1
|
||||||
|
- brainpoolP512t1
|
||||||
|
);
|
||||||
|
|
||||||
|
my @binary_curves = qw(
|
||||||
|
@@ -115,7 +81,6 @@ push(@other_curves, 'SM2')
|
||||||
|
if !disabled("sm2");
|
||||||
|
|
||||||
|
my @curve_aliases = qw(
|
||||||
|
- P-192
|
||||||
|
P-224
|
||||||
|
P-256
|
||||||
|
P-384
|
57
openssl-1.1.1-edk2-build.patch
Normal file
57
openssl-1.1.1-edk2-build.patch
Normal file
@ -0,0 +1,57 @@
|
|||||||
|
diff -up openssl-1.1.1g/crypto/evp/pkey_kdf.c.edk2-build openssl-1.1.1g/crypto/evp/pkey_kdf.c
|
||||||
|
--- openssl-1.1.1g/crypto/evp/pkey_kdf.c.edk2-build 2020-05-18 12:55:53.299548432 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/evp/pkey_kdf.c 2020-05-18 12:55:53.340548788 +0200
|
||||||
|
@@ -12,6 +12,7 @@
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/kdf.h>
|
||||||
|
+#include "internal/numbers.h"
|
||||||
|
#include "crypto/evp.h"
|
||||||
|
|
||||||
|
static int pkey_kdf_init(EVP_PKEY_CTX *ctx)
|
||||||
|
diff -up openssl-1.1.1g/crypto/kdf/hkdf.c.edk2-build openssl-1.1.1g/crypto/kdf/hkdf.c
|
||||||
|
--- openssl-1.1.1g/crypto/kdf/hkdf.c.edk2-build 2020-05-18 12:55:53.340548788 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/kdf/hkdf.c 2020-05-18 12:57:18.648288904 +0200
|
||||||
|
@@ -13,6 +13,7 @@
|
||||||
|
#include <openssl/hmac.h>
|
||||||
|
#include <openssl/kdf.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
+#include "internal/numbers.h"
|
||||||
|
#include "internal/cryptlib.h"
|
||||||
|
#include "crypto/evp.h"
|
||||||
|
#include "kdf_local.h"
|
||||||
|
diff -up openssl-1.1.1g/crypto/rand/rand_unix.c.edk2-build openssl-1.1.1g/crypto/rand/rand_unix.c
|
||||||
|
--- openssl-1.1.1g/crypto/rand/rand_unix.c.edk2-build 2020-05-18 12:56:05.646655554 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/rand/rand_unix.c 2020-05-18 12:58:51.088090896 +0200
|
||||||
|
@@ -20,7 +20,7 @@
|
||||||
|
#include "crypto/fips.h"
|
||||||
|
#include <stdio.h>
|
||||||
|
#include "internal/dso.h"
|
||||||
|
-#ifdef __linux
|
||||||
|
+#if defined(__linux) && !defined(OPENSSL_SYS_UEFI)
|
||||||
|
# include <sys/syscall.h>
|
||||||
|
# include <sys/random.h>
|
||||||
|
# ifdef DEVRANDOM_WAIT
|
||||||
|
diff -up openssl-1.1.1g/include/crypto/fips.h.edk2-build openssl-1.1.1g/include/crypto/fips.h
|
||||||
|
--- openssl-1.1.1g/include/crypto/fips.h.edk2-build 2020-05-18 12:55:53.296548406 +0200
|
||||||
|
+++ openssl-1.1.1g/include/crypto/fips.h 2020-05-18 12:55:53.340548788 +0200
|
||||||
|
@@ -50,10 +50,6 @@
|
||||||
|
#include <openssl/opensslconf.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
-#ifndef OPENSSL_FIPS
|
||||||
|
-# error FIPS is disabled.
|
||||||
|
-#endif
|
||||||
|
-
|
||||||
|
#ifdef OPENSSL_FIPS
|
||||||
|
|
||||||
|
int FIPS_module_mode_set(int onoff);
|
||||||
|
@@ -97,4 +93,8 @@ void fips_set_selftest_fail(void);
|
||||||
|
|
||||||
|
void FIPS_get_timevec(unsigned char *buf, unsigned long *pctr);
|
||||||
|
|
||||||
|
+#else
|
||||||
|
+
|
||||||
|
+# define fips_in_post() 0
|
||||||
|
+
|
||||||
|
#endif
|
5238
openssl-1.1.1-evp-kdf.patch
Normal file
5238
openssl-1.1.1-evp-kdf.patch
Normal file
File diff suppressed because it is too large
Load Diff
408
openssl-1.1.1-fips-crng-test.patch
Normal file
408
openssl-1.1.1-fips-crng-test.patch
Normal file
@ -0,0 +1,408 @@
|
|||||||
|
diff -up openssl-1.1.1g/crypto/rand/build.info.crng-test openssl-1.1.1g/crypto/rand/build.info
|
||||||
|
--- openssl-1.1.1g/crypto/rand/build.info.crng-test 2020-04-23 13:30:45.863389837 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/rand/build.info 2020-04-23 13:31:55.847069892 +0200
|
||||||
|
@@ -1,6 +1,6 @@
|
||||||
|
LIBS=../../libcrypto
|
||||||
|
SOURCE[../../libcrypto]=\
|
||||||
|
- randfile.c rand_lib.c rand_err.c rand_egd.c \
|
||||||
|
+ randfile.c rand_lib.c rand_err.c rand_crng_test.c rand_egd.c \
|
||||||
|
rand_win.c rand_unix.c rand_vms.c drbg_lib.c drbg_ctr.c
|
||||||
|
|
||||||
|
INCLUDE[drbg_ctr.o]=../modes
|
||||||
|
diff -up openssl-1.1.1g/crypto/rand/drbg_lib.c.crng-test openssl-1.1.1g/crypto/rand/drbg_lib.c
|
||||||
|
--- openssl-1.1.1g/crypto/rand/drbg_lib.c.crng-test 2020-04-23 13:30:45.818390686 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/rand/drbg_lib.c 2020-04-23 13:30:45.864389819 +0200
|
||||||
|
@@ -67,7 +67,7 @@ static CRYPTO_THREAD_LOCAL private_drbg;
|
||||||
|
|
||||||
|
|
||||||
|
/* NIST SP 800-90A DRBG recommends the use of a personalization string. */
|
||||||
|
-static const char ossl_pers_string[] = "OpenSSL NIST SP 800-90A DRBG";
|
||||||
|
+static const char ossl_pers_string[] = DRBG_DEFAULT_PERS_STRING;
|
||||||
|
|
||||||
|
static CRYPTO_ONCE rand_drbg_init = CRYPTO_ONCE_STATIC_INIT;
|
||||||
|
|
||||||
|
@@ -201,8 +201,13 @@ static RAND_DRBG *rand_drbg_new(int secu
|
||||||
|
drbg->parent = parent;
|
||||||
|
|
||||||
|
if (parent == NULL) {
|
||||||
|
+#ifdef OPENSSL_FIPS
|
||||||
|
+ drbg->get_entropy = rand_crngt_get_entropy;
|
||||||
|
+ drbg->cleanup_entropy = rand_crngt_cleanup_entropy;
|
||||||
|
+#else
|
||||||
|
drbg->get_entropy = rand_drbg_get_entropy;
|
||||||
|
drbg->cleanup_entropy = rand_drbg_cleanup_entropy;
|
||||||
|
+#endif
|
||||||
|
#ifndef RAND_DRBG_GET_RANDOM_NONCE
|
||||||
|
drbg->get_nonce = rand_drbg_get_nonce;
|
||||||
|
drbg->cleanup_nonce = rand_drbg_cleanup_nonce;
|
||||||
|
diff -up openssl-1.1.1g/crypto/rand/rand_crng_test.c.crng-test openssl-1.1.1g/crypto/rand/rand_crng_test.c
|
||||||
|
--- openssl-1.1.1g/crypto/rand/rand_crng_test.c.crng-test 2020-04-23 13:30:45.864389819 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/rand/rand_crng_test.c 2020-04-23 13:30:45.864389819 +0200
|
||||||
|
@@ -0,0 +1,118 @@
|
||||||
|
+/*
|
||||||
|
+ * Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
+ * Copyright (c) 2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
|
+ *
|
||||||
|
+ * Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
+ * this file except in compliance with the License. You can obtain a copy
|
||||||
|
+ * in the file LICENSE in the source distribution or at
|
||||||
|
+ * https://www.openssl.org/source/license.html
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
+/*
|
||||||
|
+ * Implementation of the FIPS 140-2 section 4.9.2 Conditional Tests.
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
+#include <string.h>
|
||||||
|
+#include <openssl/evp.h>
|
||||||
|
+#include "crypto/rand.h"
|
||||||
|
+#include "internal/thread_once.h"
|
||||||
|
+#include "rand_local.h"
|
||||||
|
+
|
||||||
|
+static RAND_POOL *crngt_pool;
|
||||||
|
+static unsigned char crngt_prev[EVP_MAX_MD_SIZE];
|
||||||
|
+
|
||||||
|
+int (*crngt_get_entropy)(unsigned char *, unsigned char *, unsigned int *)
|
||||||
|
+ = &rand_crngt_get_entropy_cb;
|
||||||
|
+
|
||||||
|
+int rand_crngt_get_entropy_cb(unsigned char *buf, unsigned char *md,
|
||||||
|
+ unsigned int *md_size)
|
||||||
|
+{
|
||||||
|
+ int r;
|
||||||
|
+ size_t n;
|
||||||
|
+ unsigned char *p;
|
||||||
|
+
|
||||||
|
+ n = rand_pool_acquire_entropy(crngt_pool);
|
||||||
|
+ if (n >= CRNGT_BUFSIZ) {
|
||||||
|
+ p = rand_pool_detach(crngt_pool);
|
||||||
|
+ r = EVP_Digest(p, CRNGT_BUFSIZ, md, md_size, EVP_sha256(), NULL);
|
||||||
|
+ if (r != 0)
|
||||||
|
+ memcpy(buf, p, CRNGT_BUFSIZ);
|
||||||
|
+ rand_pool_reattach(crngt_pool, p);
|
||||||
|
+ return r;
|
||||||
|
+ }
|
||||||
|
+ return 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+void rand_crngt_cleanup(void)
|
||||||
|
+{
|
||||||
|
+ rand_pool_free(crngt_pool);
|
||||||
|
+ crngt_pool = NULL;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+int rand_crngt_init(void)
|
||||||
|
+{
|
||||||
|
+ unsigned char buf[CRNGT_BUFSIZ];
|
||||||
|
+
|
||||||
|
+ if ((crngt_pool = rand_pool_new(0, 1, CRNGT_BUFSIZ, CRNGT_BUFSIZ)) == NULL)
|
||||||
|
+ return 0;
|
||||||
|
+ if (crngt_get_entropy(buf, crngt_prev, NULL)) {
|
||||||
|
+ OPENSSL_cleanse(buf, sizeof(buf));
|
||||||
|
+ return 1;
|
||||||
|
+ }
|
||||||
|
+ rand_crngt_cleanup();
|
||||||
|
+ return 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+static CRYPTO_ONCE rand_crngt_init_flag = CRYPTO_ONCE_STATIC_INIT;
|
||||||
|
+DEFINE_RUN_ONCE_STATIC(do_rand_crngt_init)
|
||||||
|
+{
|
||||||
|
+ return OPENSSL_init_crypto(0, NULL)
|
||||||
|
+ && rand_crngt_init()
|
||||||
|
+ && OPENSSL_atexit(&rand_crngt_cleanup);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+int rand_crngt_single_init(void)
|
||||||
|
+{
|
||||||
|
+ return RUN_ONCE(&rand_crngt_init_flag, do_rand_crngt_init);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+size_t rand_crngt_get_entropy(RAND_DRBG *drbg,
|
||||||
|
+ unsigned char **pout,
|
||||||
|
+ int entropy, size_t min_len, size_t max_len,
|
||||||
|
+ int prediction_resistance)
|
||||||
|
+{
|
||||||
|
+ unsigned char buf[CRNGT_BUFSIZ], md[EVP_MAX_MD_SIZE];
|
||||||
|
+ unsigned int sz;
|
||||||
|
+ RAND_POOL *pool;
|
||||||
|
+ size_t q, r = 0, s, t = 0;
|
||||||
|
+ int attempts = 3;
|
||||||
|
+
|
||||||
|
+ if (!RUN_ONCE(&rand_crngt_init_flag, do_rand_crngt_init))
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
+ if ((pool = rand_pool_new(entropy, 1, min_len, max_len)) == NULL)
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
+ while ((q = rand_pool_bytes_needed(pool, 1)) > 0 && attempts-- > 0) {
|
||||||
|
+ s = q > sizeof(buf) ? sizeof(buf) : q;
|
||||||
|
+ if (!crngt_get_entropy(buf, md, &sz)
|
||||||
|
+ || memcmp(crngt_prev, md, sz) == 0
|
||||||
|
+ || !rand_pool_add(pool, buf, s, s * 8))
|
||||||
|
+ goto err;
|
||||||
|
+ memcpy(crngt_prev, md, sz);
|
||||||
|
+ t += s;
|
||||||
|
+ attempts++;
|
||||||
|
+ }
|
||||||
|
+ r = t;
|
||||||
|
+ *pout = rand_pool_detach(pool);
|
||||||
|
+err:
|
||||||
|
+ OPENSSL_cleanse(buf, sizeof(buf));
|
||||||
|
+ rand_pool_free(pool);
|
||||||
|
+ return r;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+void rand_crngt_cleanup_entropy(RAND_DRBG *drbg,
|
||||||
|
+ unsigned char *out, size_t outlen)
|
||||||
|
+{
|
||||||
|
+ OPENSSL_secure_clear_free(out, outlen);
|
||||||
|
+}
|
||||||
|
diff -up openssl-1.1.1g/crypto/rand/rand_local.h.crng-test openssl-1.1.1g/crypto/rand/rand_local.h
|
||||||
|
--- openssl-1.1.1g/crypto/rand/rand_local.h.crng-test 2020-04-23 13:30:45.470397250 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/rand/rand_local.h 2020-04-23 13:30:45.864389819 +0200
|
||||||
|
@@ -33,7 +33,15 @@
|
||||||
|
# define MASTER_RESEED_TIME_INTERVAL (60*60) /* 1 hour */
|
||||||
|
# define SLAVE_RESEED_TIME_INTERVAL (7*60) /* 7 minutes */
|
||||||
|
|
||||||
|
-
|
||||||
|
+/*
|
||||||
|
+ * The number of bytes that constitutes an atomic lump of entropy with respect
|
||||||
|
+ * to the FIPS 140-2 section 4.9.2 Conditional Tests. The size is somewhat
|
||||||
|
+ * arbitrary, the smaller the value, the less entropy is consumed on first
|
||||||
|
+ * read but the higher the probability of the test failing by accident.
|
||||||
|
+ *
|
||||||
|
+ * The value is in bytes.
|
||||||
|
+ */
|
||||||
|
+#define CRNGT_BUFSIZ 16
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Maximum input size for the DRBG (entropy, nonce, personalization string)
|
||||||
|
@@ -44,6 +52,8 @@
|
||||||
|
*/
|
||||||
|
# define DRBG_MAX_LENGTH INT32_MAX
|
||||||
|
|
||||||
|
+/* The default nonce */
|
||||||
|
+# define DRBG_DEFAULT_PERS_STRING "OpenSSL NIST SP 800-90A DRBG"
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Maximum allocation size for RANDOM_POOL buffers
|
||||||
|
@@ -296,4 +306,22 @@ int rand_drbg_enable_locking(RAND_DRBG *
|
||||||
|
/* initializes the AES-CTR DRBG implementation */
|
||||||
|
int drbg_ctr_init(RAND_DRBG *drbg);
|
||||||
|
|
||||||
|
+/*
|
||||||
|
+ * Entropy call back for the FIPS 140-2 section 4.9.2 Conditional Tests.
|
||||||
|
+ * These need to be exposed for the unit tests.
|
||||||
|
+ */
|
||||||
|
+int rand_crngt_get_entropy_cb(unsigned char *buf, unsigned char *md,
|
||||||
|
+ unsigned int *md_size);
|
||||||
|
+extern int (*crngt_get_entropy)(unsigned char *buf, unsigned char *md,
|
||||||
|
+ unsigned int *md_size);
|
||||||
|
+int rand_crngt_init(void);
|
||||||
|
+void rand_crngt_cleanup(void);
|
||||||
|
+
|
||||||
|
+/*
|
||||||
|
+ * Expose the run once initialisation function for the unit tests because.
|
||||||
|
+ * they need to restart from scratch to validate the first block is skipped
|
||||||
|
+ * properly.
|
||||||
|
+ */
|
||||||
|
+int rand_crngt_single_init(void);
|
||||||
|
+
|
||||||
|
#endif
|
||||||
|
diff -up openssl-1.1.1g/include/crypto/rand.h.crng-test openssl-1.1.1g/include/crypto/rand.h
|
||||||
|
--- openssl-1.1.1g/include/crypto/rand.h.crng-test 2020-04-23 13:30:45.824390573 +0200
|
||||||
|
+++ openssl-1.1.1g/include/crypto/rand.h 2020-04-23 13:30:45.864389819 +0200
|
||||||
|
@@ -49,6 +49,14 @@ size_t rand_drbg_get_additional_data(RAN
|
||||||
|
|
||||||
|
void rand_drbg_cleanup_additional_data(RAND_POOL *pool, unsigned char *out);
|
||||||
|
|
||||||
|
+/* CRNG test entropy filter callbacks. */
|
||||||
|
+size_t rand_crngt_get_entropy(RAND_DRBG *drbg,
|
||||||
|
+ unsigned char **pout,
|
||||||
|
+ int entropy, size_t min_len, size_t max_len,
|
||||||
|
+ int prediction_resistance);
|
||||||
|
+void rand_crngt_cleanup_entropy(RAND_DRBG *drbg,
|
||||||
|
+ unsigned char *out, size_t outlen);
|
||||||
|
+
|
||||||
|
/*
|
||||||
|
* RAND_POOL functions
|
||||||
|
*/
|
||||||
|
diff -up openssl-1.1.1g/test/drbgtest.c.crng-test openssl-1.1.1g/test/drbgtest.c
|
||||||
|
--- openssl-1.1.1g/test/drbgtest.c.crng-test 2020-04-21 14:22:39.000000000 +0200
|
||||||
|
+++ openssl-1.1.1g/test/drbgtest.c 2020-04-23 13:30:45.865389800 +0200
|
||||||
|
@@ -150,6 +150,31 @@ static size_t kat_nonce(RAND_DRBG *drbg,
|
||||||
|
return t->noncelen;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ /*
|
||||||
|
+ * Disable CRNG testing if it is enabled.
|
||||||
|
+ * If the DRBG is ready or in an error state, this means an instantiate cycle
|
||||||
|
+ * for which the default personalisation string is used.
|
||||||
|
+ */
|
||||||
|
+static int disable_crngt(RAND_DRBG *drbg)
|
||||||
|
+{
|
||||||
|
+ static const char pers[] = DRBG_DEFAULT_PERS_STRING;
|
||||||
|
+ const int instantiate = drbg->state != DRBG_UNINITIALISED;
|
||||||
|
+
|
||||||
|
+ if (drbg->get_entropy != rand_crngt_get_entropy)
|
||||||
|
+ return 1;
|
||||||
|
+
|
||||||
|
+ if ((instantiate && !RAND_DRBG_uninstantiate(drbg))
|
||||||
|
+ || !TEST_true(RAND_DRBG_set_callbacks(drbg, &rand_drbg_get_entropy,
|
||||||
|
+ &rand_drbg_cleanup_entropy,
|
||||||
|
+ &rand_drbg_get_nonce,
|
||||||
|
+ &rand_drbg_cleanup_nonce))
|
||||||
|
+ || (instantiate
|
||||||
|
+ && !RAND_DRBG_instantiate(drbg, (const unsigned char *)pers,
|
||||||
|
+ sizeof(pers) - 1)))
|
||||||
|
+ return 0;
|
||||||
|
+ return 1;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
static int uninstantiate(RAND_DRBG *drbg)
|
||||||
|
{
|
||||||
|
int ret = drbg == NULL ? 1 : RAND_DRBG_uninstantiate(drbg);
|
||||||
|
@@ -175,7 +200,8 @@ static int single_kat(DRBG_SELFTEST_DATA
|
||||||
|
if (!TEST_ptr(drbg = RAND_DRBG_new(td->nid, td->flags, NULL)))
|
||||||
|
return 0;
|
||||||
|
if (!TEST_true(RAND_DRBG_set_callbacks(drbg, kat_entropy, NULL,
|
||||||
|
- kat_nonce, NULL))) {
|
||||||
|
+ kat_nonce, NULL))
|
||||||
|
+ || !TEST_true(disable_crngt(drbg))) {
|
||||||
|
failures++;
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
@@ -293,7 +319,8 @@ static int error_check(DRBG_SELFTEST_DAT
|
||||||
|
unsigned int reseed_counter_tmp;
|
||||||
|
int ret = 0;
|
||||||
|
|
||||||
|
- if (!TEST_ptr(drbg = RAND_DRBG_new(0, 0, NULL)))
|
||||||
|
+ if (!TEST_ptr(drbg = RAND_DRBG_new(0, 0, NULL))
|
||||||
|
+ || !TEST_true(disable_crngt(drbg)))
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -740,6 +767,10 @@ static int test_rand_drbg_reseed(void)
|
||||||
|
|| !TEST_ptr_eq(private->parent, master))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
+ /* Disable CRNG testing for the master DRBG */
|
||||||
|
+ if (!TEST_true(disable_crngt(master)))
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
/* uninstantiate the three global DRBGs */
|
||||||
|
RAND_DRBG_uninstantiate(private);
|
||||||
|
RAND_DRBG_uninstantiate(public);
|
||||||
|
@@ -964,7 +995,8 @@ static int test_rand_seed(void)
|
||||||
|
size_t rand_buflen;
|
||||||
|
size_t required_seed_buflen = 0;
|
||||||
|
|
||||||
|
- if (!TEST_ptr(master = RAND_DRBG_get0_master()))
|
||||||
|
+ if (!TEST_ptr(master = RAND_DRBG_get0_master())
|
||||||
|
+ || !TEST_true(disable_crngt(master)))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
#ifdef OPENSSL_RAND_SEED_NONE
|
||||||
|
@@ -1013,6 +1045,95 @@ static int test_rand_add(void)
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
+/*
|
||||||
|
+ * A list of the FIPS DRGB types.
|
||||||
|
+ */
|
||||||
|
+static const struct s_drgb_types {
|
||||||
|
+ int nid;
|
||||||
|
+ int flags;
|
||||||
|
+} drgb_types[] = {
|
||||||
|
+ { NID_aes_128_ctr, 0 },
|
||||||
|
+ { NID_aes_192_ctr, 0 },
|
||||||
|
+ { NID_aes_256_ctr, 0 },
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+/* Six cases for each covers seed sizes up to 32 bytes */
|
||||||
|
+static const size_t crngt_num_cases = 6;
|
||||||
|
+
|
||||||
|
+static size_t crngt_case, crngt_idx;
|
||||||
|
+
|
||||||
|
+static int crngt_entropy_cb(unsigned char *buf, unsigned char *md,
|
||||||
|
+ unsigned int *md_size)
|
||||||
|
+{
|
||||||
|
+ size_t i, z;
|
||||||
|
+
|
||||||
|
+ if (!TEST_int_lt(crngt_idx, crngt_num_cases))
|
||||||
|
+ return 0;
|
||||||
|
+ /* Generate a block of unique data unless this is the duplication point */
|
||||||
|
+ z = crngt_idx++;
|
||||||
|
+ if (z > 0 && crngt_case == z)
|
||||||
|
+ z--;
|
||||||
|
+ for (i = 0; i < CRNGT_BUFSIZ; i++)
|
||||||
|
+ buf[i] = (unsigned char)(i + 'A' + z);
|
||||||
|
+ return EVP_Digest(buf, CRNGT_BUFSIZ, md, md_size, EVP_sha256(), NULL);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+static int test_crngt(int n)
|
||||||
|
+{
|
||||||
|
+ const struct s_drgb_types *dt = drgb_types + n / crngt_num_cases;
|
||||||
|
+ RAND_DRBG *drbg = NULL;
|
||||||
|
+ unsigned char buff[100];
|
||||||
|
+ size_t ent;
|
||||||
|
+ int res = 0;
|
||||||
|
+ int expect;
|
||||||
|
+
|
||||||
|
+ if (!TEST_true(rand_crngt_single_init()))
|
||||||
|
+ return 0;
|
||||||
|
+ rand_crngt_cleanup();
|
||||||
|
+
|
||||||
|
+ if (!TEST_ptr(drbg = RAND_DRBG_new(dt->nid, dt->flags, NULL)))
|
||||||
|
+ return 0;
|
||||||
|
+ ent = (drbg->min_entropylen + CRNGT_BUFSIZ - 1) / CRNGT_BUFSIZ;
|
||||||
|
+ crngt_case = n % crngt_num_cases;
|
||||||
|
+ crngt_idx = 0;
|
||||||
|
+ crngt_get_entropy = &crngt_entropy_cb;
|
||||||
|
+ if (!TEST_true(rand_crngt_init()))
|
||||||
|
+ goto err;
|
||||||
|
+#ifndef OPENSSL_FIPS
|
||||||
|
+ if (!TEST_true(RAND_DRBG_set_callbacks(drbg, &rand_crngt_get_entropy,
|
||||||
|
+ &rand_crngt_cleanup_entropy,
|
||||||
|
+ &rand_drbg_get_nonce,
|
||||||
|
+ &rand_drbg_cleanup_nonce)))
|
||||||
|
+ goto err;
|
||||||
|
+#endif
|
||||||
|
+ expect = crngt_case == 0 || crngt_case > ent;
|
||||||
|
+ if (!TEST_int_eq(RAND_DRBG_instantiate(drbg, NULL, 0), expect))
|
||||||
|
+ goto err;
|
||||||
|
+ if (!expect)
|
||||||
|
+ goto fin;
|
||||||
|
+ if (!TEST_true(RAND_DRBG_generate(drbg, buff, sizeof(buff), 0, NULL, 0)))
|
||||||
|
+ goto err;
|
||||||
|
+
|
||||||
|
+ expect = crngt_case == 0 || crngt_case > 2 * ent;
|
||||||
|
+ if (!TEST_int_eq(RAND_DRBG_reseed(drbg, NULL, 0, 0), expect))
|
||||||
|
+ goto err;
|
||||||
|
+ if (!expect)
|
||||||
|
+ goto fin;
|
||||||
|
+ if (!TEST_true(RAND_DRBG_generate(drbg, buff, sizeof(buff), 0, NULL, 0)))
|
||||||
|
+ goto err;
|
||||||
|
+
|
||||||
|
+fin:
|
||||||
|
+ res = 1;
|
||||||
|
+err:
|
||||||
|
+ if (!res)
|
||||||
|
+ TEST_note("DRBG %zd case %zd block %zd", n / crngt_num_cases,
|
||||||
|
+ crngt_case, crngt_idx);
|
||||||
|
+ uninstantiate(drbg);
|
||||||
|
+ RAND_DRBG_free(drbg);
|
||||||
|
+ crngt_get_entropy = &rand_crngt_get_entropy_cb;
|
||||||
|
+ return res;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
int setup_tests(void)
|
||||||
|
{
|
||||||
|
app_data_index = RAND_DRBG_get_ex_new_index(0L, NULL, NULL, NULL, NULL);
|
||||||
|
@@ -1025,5 +1146,6 @@ int setup_tests(void)
|
||||||
|
#if defined(OPENSSL_THREADS)
|
||||||
|
ADD_TEST(test_multi_thread);
|
||||||
|
#endif
|
||||||
|
+ ADD_ALL_TESTS(test_crngt, crngt_num_cases * OSSL_NELEM(drgb_types));
|
||||||
|
return 1;
|
||||||
|
}
|
200
openssl-1.1.1-fips-curves.patch
Normal file
200
openssl-1.1.1-fips-curves.patch
Normal file
@ -0,0 +1,200 @@
|
|||||||
|
diff -up openssl-1.1.1g/crypto/ec/ec_curve.c.fips-curves openssl-1.1.1g/crypto/ec/ec_curve.c
|
||||||
|
--- openssl-1.1.1g/crypto/ec/ec_curve.c.fips-curves 2020-05-18 12:59:54.839643980 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/ec/ec_curve.c 2020-05-18 12:59:54.852644093 +0200
|
||||||
|
@@ -13,6 +13,7 @@
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/obj_mac.h>
|
||||||
|
#include <openssl/opensslconf.h>
|
||||||
|
+#include <openssl/crypto.h>
|
||||||
|
#include "internal/nelem.h"
|
||||||
|
|
||||||
|
typedef struct {
|
||||||
|
@@ -237,6 +238,7 @@ static const struct {
|
||||||
|
|
||||||
|
typedef struct _ec_list_element_st {
|
||||||
|
int nid;
|
||||||
|
+ int fips_allowed;
|
||||||
|
const EC_CURVE_DATA *data;
|
||||||
|
const EC_METHOD *(*meth) (void);
|
||||||
|
const char *comment;
|
||||||
|
@@ -246,23 +248,23 @@ static const ec_list_element curve_list[
|
||||||
|
/* prime field curves */
|
||||||
|
/* secg curves */
|
||||||
|
#ifndef OPENSSL_NO_EC_NISTP_64_GCC_128
|
||||||
|
- {NID_secp224r1, &_EC_NIST_PRIME_224.h, EC_GFp_nistp224_method,
|
||||||
|
+ {NID_secp224r1, 1, &_EC_NIST_PRIME_224.h, EC_GFp_nistp224_method,
|
||||||
|
"NIST/SECG curve over a 224 bit prime field"},
|
||||||
|
#else
|
||||||
|
- {NID_secp224r1, &_EC_NIST_PRIME_224.h, 0,
|
||||||
|
+ {NID_secp224r1, 1, &_EC_NIST_PRIME_224.h, 0,
|
||||||
|
"NIST/SECG curve over a 224 bit prime field"},
|
||||||
|
#endif
|
||||||
|
- {NID_secp256k1, &_EC_SECG_PRIME_256K1.h, 0,
|
||||||
|
+ {NID_secp256k1, 0, &_EC_SECG_PRIME_256K1.h, 0,
|
||||||
|
"SECG curve over a 256 bit prime field"},
|
||||||
|
/* SECG secp256r1 is the same as X9.62 prime256v1 and hence omitted */
|
||||||
|
- {NID_secp384r1, &_EC_NIST_PRIME_384.h,
|
||||||
|
+ {NID_secp384r1, 1, &_EC_NIST_PRIME_384.h,
|
||||||
|
# if defined(S390X_EC_ASM)
|
||||||
|
EC_GFp_s390x_nistp384_method,
|
||||||
|
# else
|
||||||
|
0,
|
||||||
|
# endif
|
||||||
|
"NIST/SECG curve over a 384 bit prime field"},
|
||||||
|
- {NID_secp521r1, &_EC_NIST_PRIME_521.h,
|
||||||
|
+ {NID_secp521r1, 1, &_EC_NIST_PRIME_521.h,
|
||||||
|
# if defined(S390X_EC_ASM)
|
||||||
|
EC_GFp_s390x_nistp521_method,
|
||||||
|
# elif !defined(OPENSSL_NO_EC_NISTP_64_GCC_128)
|
||||||
|
@@ -272,7 +274,7 @@ static const ec_list_element curve_list[
|
||||||
|
# endif
|
||||||
|
"NIST/SECG curve over a 521 bit prime field"},
|
||||||
|
/* X9.62 curves */
|
||||||
|
- {NID_X9_62_prime256v1, &_EC_X9_62_PRIME_256V1.h,
|
||||||
|
+ {NID_X9_62_prime256v1, 1, &_EC_X9_62_PRIME_256V1.h,
|
||||||
|
#if defined(ECP_NISTZ256_ASM)
|
||||||
|
EC_GFp_nistz256_method,
|
||||||
|
# elif defined(S390X_EC_ASM)
|
||||||
|
@@ -404,6 +406,10 @@ EC_GROUP *EC_GROUP_new_by_curve_name(int
|
||||||
|
|
||||||
|
for (i = 0; i < curve_list_length; i++)
|
||||||
|
if (curve_list[i].nid == nid) {
|
||||||
|
+ if (!curve_list[i].fips_allowed && FIPS_mode()) {
|
||||||
|
+ ECerr(EC_F_EC_GROUP_NEW_BY_CURVE_NAME, EC_R_NOT_A_NIST_PRIME);
|
||||||
|
+ return NULL;
|
||||||
|
+ }
|
||||||
|
ret = ec_group_new_from_data(curve_list[i]);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
@@ -418,19 +424,31 @@ EC_GROUP *EC_GROUP_new_by_curve_name(int
|
||||||
|
|
||||||
|
size_t EC_get_builtin_curves(EC_builtin_curve *r, size_t nitems)
|
||||||
|
{
|
||||||
|
- size_t i, min;
|
||||||
|
+ size_t i, j, num;
|
||||||
|
+ int fips_mode = FIPS_mode();
|
||||||
|
|
||||||
|
- if (r == NULL || nitems == 0)
|
||||||
|
- return curve_list_length;
|
||||||
|
+ num = curve_list_length;
|
||||||
|
+ if (fips_mode)
|
||||||
|
+ for (i = 0; i < curve_list_length; i++) {
|
||||||
|
+ if (!curve_list[i].fips_allowed)
|
||||||
|
+ --num;
|
||||||
|
+ }
|
||||||
|
|
||||||
|
- min = nitems < curve_list_length ? nitems : curve_list_length;
|
||||||
|
+ if (r == NULL || nitems == 0) {
|
||||||
|
+ return num;
|
||||||
|
+ }
|
||||||
|
|
||||||
|
- for (i = 0; i < min; i++) {
|
||||||
|
- r[i].nid = curve_list[i].nid;
|
||||||
|
- r[i].comment = curve_list[i].comment;
|
||||||
|
+ for (i = 0, j = 0; i < curve_list_length; i++) {
|
||||||
|
+ if (j >= nitems)
|
||||||
|
+ break;
|
||||||
|
+ if (!fips_mode || curve_list[i].fips_allowed) {
|
||||||
|
+ r[j].nid = curve_list[i].nid;
|
||||||
|
+ r[j].comment = curve_list[i].comment;
|
||||||
|
+ ++j;
|
||||||
|
+ }
|
||||||
|
}
|
||||||
|
|
||||||
|
- return curve_list_length;
|
||||||
|
+ return num;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Functions to translate between common NIST curve names and NIDs */
|
||||||
|
diff -up openssl-1.1.1g/ssl/t1_lib.c.fips-curves openssl-1.1.1g/ssl/t1_lib.c
|
||||||
|
--- openssl-1.1.1g/ssl/t1_lib.c.fips-curves 2020-05-18 12:59:54.797643616 +0200
|
||||||
|
+++ openssl-1.1.1g/ssl/t1_lib.c 2020-05-18 13:03:54.748725463 +0200
|
||||||
|
@@ -678,6 +678,36 @@ static const uint16_t tls12_sigalgs[] =
|
||||||
|
#endif
|
||||||
|
};
|
||||||
|
|
||||||
|
+static const uint16_t tls12_fips_sigalgs[] = {
|
||||||
|
+#ifndef OPENSSL_NO_EC
|
||||||
|
+ TLSEXT_SIGALG_ecdsa_secp256r1_sha256,
|
||||||
|
+ TLSEXT_SIGALG_ecdsa_secp384r1_sha384,
|
||||||
|
+ TLSEXT_SIGALG_ecdsa_secp521r1_sha512,
|
||||||
|
+#endif
|
||||||
|
+
|
||||||
|
+ TLSEXT_SIGALG_rsa_pss_pss_sha256,
|
||||||
|
+ TLSEXT_SIGALG_rsa_pss_pss_sha384,
|
||||||
|
+ TLSEXT_SIGALG_rsa_pss_pss_sha512,
|
||||||
|
+ TLSEXT_SIGALG_rsa_pss_rsae_sha256,
|
||||||
|
+ TLSEXT_SIGALG_rsa_pss_rsae_sha384,
|
||||||
|
+ TLSEXT_SIGALG_rsa_pss_rsae_sha512,
|
||||||
|
+
|
||||||
|
+ TLSEXT_SIGALG_rsa_pkcs1_sha256,
|
||||||
|
+ TLSEXT_SIGALG_rsa_pkcs1_sha384,
|
||||||
|
+ TLSEXT_SIGALG_rsa_pkcs1_sha512,
|
||||||
|
+
|
||||||
|
+#ifndef OPENSSL_NO_EC
|
||||||
|
+ TLSEXT_SIGALG_ecdsa_sha224,
|
||||||
|
+#endif
|
||||||
|
+ TLSEXT_SIGALG_rsa_pkcs1_sha224,
|
||||||
|
+#ifndef OPENSSL_NO_DSA
|
||||||
|
+ TLSEXT_SIGALG_dsa_sha224,
|
||||||
|
+ TLSEXT_SIGALG_dsa_sha256,
|
||||||
|
+ TLSEXT_SIGALG_dsa_sha384,
|
||||||
|
+ TLSEXT_SIGALG_dsa_sha512,
|
||||||
|
+#endif
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
#ifndef OPENSSL_NO_EC
|
||||||
|
static const uint16_t suiteb_sigalgs[] = {
|
||||||
|
TLSEXT_SIGALG_ecdsa_secp256r1_sha256,
|
||||||
|
@@ -894,6 +924,8 @@ static const SIGALG_LOOKUP *tls1_get_leg
|
||||||
|
}
|
||||||
|
if (idx < 0 || idx >= (int)OSSL_NELEM(tls_default_sigalg))
|
||||||
|
return NULL;
|
||||||
|
+ if (FIPS_mode()) /* We do not allow legacy SHA1 signatures in FIPS mode */
|
||||||
|
+ return NULL;
|
||||||
|
if (SSL_USE_SIGALGS(s) || idx != SSL_PKEY_RSA) {
|
||||||
|
const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(tls_default_sigalg[idx]);
|
||||||
|
|
||||||
|
@@ -954,6 +986,9 @@ size_t tls12_get_psigalgs(SSL *s, int se
|
||||||
|
} else if (s->cert->conf_sigalgs) {
|
||||||
|
*psigs = s->cert->conf_sigalgs;
|
||||||
|
return s->cert->conf_sigalgslen;
|
||||||
|
+ } else if (FIPS_mode()) {
|
||||||
|
+ *psigs = tls12_fips_sigalgs;
|
||||||
|
+ return OSSL_NELEM(tls12_fips_sigalgs);
|
||||||
|
} else {
|
||||||
|
*psigs = tls12_sigalgs;
|
||||||
|
return OSSL_NELEM(tls12_sigalgs);
|
||||||
|
@@ -973,6 +1008,9 @@ int tls_check_sigalg_curve(const SSL *s,
|
||||||
|
if (s->cert->conf_sigalgs) {
|
||||||
|
sigs = s->cert->conf_sigalgs;
|
||||||
|
siglen = s->cert->conf_sigalgslen;
|
||||||
|
+ } else if (FIPS_mode()) {
|
||||||
|
+ sigs = tls12_fips_sigalgs;
|
||||||
|
+ siglen = OSSL_NELEM(tls12_fips_sigalgs);
|
||||||
|
} else {
|
||||||
|
sigs = tls12_sigalgs;
|
||||||
|
siglen = OSSL_NELEM(tls12_sigalgs);
|
||||||
|
@@ -1617,6 +1655,8 @@ static int tls12_sigalg_allowed(const SS
|
||||||
|
if (lu->sig == NID_id_GostR3410_2012_256
|
||||||
|
|| lu->sig == NID_id_GostR3410_2012_512
|
||||||
|
|| lu->sig == NID_id_GostR3410_2001) {
|
||||||
|
+ if (FIPS_mode())
|
||||||
|
+ return 0;
|
||||||
|
/* We never allow GOST sig algs on the server with TLSv1.3 */
|
||||||
|
if (s->server && SSL_IS_TLS13(s))
|
||||||
|
return 0;
|
||||||
|
@@ -2842,6 +2882,13 @@ int tls_choose_sigalg(SSL *s, int fatale
|
||||||
|
const uint16_t *sent_sigs;
|
||||||
|
size_t sent_sigslen;
|
||||||
|
|
||||||
|
+ if (fatalerrs && FIPS_mode()) {
|
||||||
|
+ /* There are no suitable legacy algorithms in FIPS mode */
|
||||||
|
+ SSLfatal(s, SSL_AD_HANDSHAKE_FAILURE,
|
||||||
|
+ SSL_F_TLS_CHOOSE_SIGALG,
|
||||||
|
+ SSL_R_NO_SUITABLE_SIGNATURE_ALGORITHM);
|
||||||
|
+ return 0;
|
||||||
|
+ }
|
||||||
|
if ((lu = tls1_get_legacy_sigalg(s, -1)) == NULL) {
|
||||||
|
if (!fatalerrs)
|
||||||
|
return 1;
|
2731
openssl-1.1.1-fips-dh.patch
Normal file
2731
openssl-1.1.1-fips-dh.patch
Normal file
File diff suppressed because it is too large
Load Diff
587
openssl-1.1.1-fips-drbg-selftest.patch
Normal file
587
openssl-1.1.1-fips-drbg-selftest.patch
Normal file
@ -0,0 +1,587 @@
|
|||||||
|
diff -up openssl-1.1.1g/crypto/fips/fips_post.c.drbg-selftest openssl-1.1.1g/crypto/fips/fips_post.c
|
||||||
|
--- openssl-1.1.1g/crypto/fips/fips_post.c.drbg-selftest 2020-04-23 13:33:12.500624151 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/fips_post.c 2020-04-23 13:33:12.618621925 +0200
|
||||||
|
@@ -67,12 +67,18 @@
|
||||||
|
|
||||||
|
# include <openssl/fips.h>
|
||||||
|
# include "crypto/fips.h"
|
||||||
|
+# include "crypto/rand.h"
|
||||||
|
# include "fips_locl.h"
|
||||||
|
|
||||||
|
/* Run all selftests */
|
||||||
|
int FIPS_selftest(void)
|
||||||
|
{
|
||||||
|
int rv = 1;
|
||||||
|
+ if (!rand_drbg_selftest()) {
|
||||||
|
+ FIPSerr(FIPS_F_FIPS_SELFTEST, FIPS_R_TEST_FAILURE);
|
||||||
|
+ ERR_add_error_data(2, "Type=", "rand_drbg_selftest");
|
||||||
|
+ rv = 0;
|
||||||
|
+ }
|
||||||
|
if (!FIPS_selftest_drbg())
|
||||||
|
rv = 0;
|
||||||
|
if (!FIPS_selftest_sha1())
|
||||||
|
diff -up openssl-1.1.1g/crypto/rand/build.info.drbg-selftest openssl-1.1.1g/crypto/rand/build.info
|
||||||
|
--- openssl-1.1.1g/crypto/rand/build.info.drbg-selftest 2020-04-23 13:33:12.619621907 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/rand/build.info 2020-04-23 13:34:10.857523497 +0200
|
||||||
|
@@ -1,6 +1,6 @@
|
||||||
|
LIBS=../../libcrypto
|
||||||
|
SOURCE[../../libcrypto]=\
|
||||||
|
randfile.c rand_lib.c rand_err.c rand_crng_test.c rand_egd.c \
|
||||||
|
- rand_win.c rand_unix.c rand_vms.c drbg_lib.c drbg_ctr.c
|
||||||
|
+ rand_win.c rand_unix.c rand_vms.c drbg_lib.c drbg_ctr.c drbg_selftest.c
|
||||||
|
|
||||||
|
INCLUDE[drbg_ctr.o]=../modes
|
||||||
|
diff -up openssl-1.1.1g/crypto/rand/drbg_selftest.c.drbg-selftest openssl-1.1.1g/crypto/rand/drbg_selftest.c
|
||||||
|
--- openssl-1.1.1g/crypto/rand/drbg_selftest.c.drbg-selftest 2020-04-23 13:33:12.619621907 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/rand/drbg_selftest.c 2020-04-23 13:33:12.619621907 +0200
|
||||||
|
@@ -0,0 +1,537 @@
|
||||||
|
+/*
|
||||||
|
+ * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
+ *
|
||||||
|
+ * Licensed under the OpenSSL license (the "License"). You may not use
|
||||||
|
+ * this file except in compliance with the License. You can obtain a copy
|
||||||
|
+ * in the file LICENSE in the source distribution or at
|
||||||
|
+ * https://www.openssl.org/source/license.html
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
+#include <string.h>
|
||||||
|
+#include <stddef.h>
|
||||||
|
+#include "internal/nelem.h"
|
||||||
|
+#include <openssl/crypto.h>
|
||||||
|
+#include <openssl/err.h>
|
||||||
|
+#include <openssl/rand_drbg.h>
|
||||||
|
+#include <openssl/obj_mac.h>
|
||||||
|
+#include "internal/thread_once.h"
|
||||||
|
+#include "crypto/rand.h"
|
||||||
|
+
|
||||||
|
+typedef struct test_ctx_st {
|
||||||
|
+ const unsigned char *entropy;
|
||||||
|
+ size_t entropylen;
|
||||||
|
+ int entropycnt;
|
||||||
|
+ const unsigned char *nonce;
|
||||||
|
+ size_t noncelen;
|
||||||
|
+ int noncecnt;
|
||||||
|
+} TEST_CTX;
|
||||||
|
+
|
||||||
|
+static int app_data_index = -1;
|
||||||
|
+static CRYPTO_ONCE get_index_once = CRYPTO_ONCE_STATIC_INIT;
|
||||||
|
+DEFINE_RUN_ONCE_STATIC(drbg_app_data_index_init)
|
||||||
|
+{
|
||||||
|
+ app_data_index = RAND_DRBG_get_ex_new_index(0L, NULL, NULL, NULL, NULL);
|
||||||
|
+
|
||||||
|
+ return 1;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+enum drbg_kat_type {
|
||||||
|
+ NO_RESEED,
|
||||||
|
+ PR_FALSE,
|
||||||
|
+ PR_TRUE
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+enum drbg_df {
|
||||||
|
+ USE_DF,
|
||||||
|
+ NO_DF,
|
||||||
|
+ NA
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+struct drbg_kat_no_reseed {
|
||||||
|
+ size_t count;
|
||||||
|
+ const unsigned char *entropyin;
|
||||||
|
+ const unsigned char *nonce;
|
||||||
|
+ const unsigned char *persstr;
|
||||||
|
+ const unsigned char *addin1;
|
||||||
|
+ const unsigned char *addin2;
|
||||||
|
+ const unsigned char *retbytes;
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+struct drbg_kat_pr_false {
|
||||||
|
+ size_t count;
|
||||||
|
+ const unsigned char *entropyin;
|
||||||
|
+ const unsigned char *nonce;
|
||||||
|
+ const unsigned char *persstr;
|
||||||
|
+ const unsigned char *entropyinreseed;
|
||||||
|
+ const unsigned char *addinreseed;
|
||||||
|
+ const unsigned char *addin1;
|
||||||
|
+ const unsigned char *addin2;
|
||||||
|
+ const unsigned char *retbytes;
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+struct drbg_kat_pr_true {
|
||||||
|
+ size_t count;
|
||||||
|
+ const unsigned char *entropyin;
|
||||||
|
+ const unsigned char *nonce;
|
||||||
|
+ const unsigned char *persstr;
|
||||||
|
+ const unsigned char *entropyinpr1;
|
||||||
|
+ const unsigned char *addin1;
|
||||||
|
+ const unsigned char *entropyinpr2;
|
||||||
|
+ const unsigned char *addin2;
|
||||||
|
+ const unsigned char *retbytes;
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+struct drbg_kat {
|
||||||
|
+ enum drbg_kat_type type;
|
||||||
|
+ enum drbg_df df;
|
||||||
|
+ int nid;
|
||||||
|
+
|
||||||
|
+ size_t entropyinlen;
|
||||||
|
+ size_t noncelen;
|
||||||
|
+ size_t persstrlen;
|
||||||
|
+ size_t addinlen;
|
||||||
|
+ size_t retbyteslen;
|
||||||
|
+
|
||||||
|
+ const void *t;
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+/*
|
||||||
|
+ * Excerpt from test/drbg_cavs_data.c
|
||||||
|
+ * DRBG test vectors from:
|
||||||
|
+ * https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
+static const unsigned char kat1308_entropyin[] = {
|
||||||
|
+ 0x7c, 0x5d, 0x90, 0x70, 0x3b, 0x8a, 0xc7, 0x0f, 0x23, 0x73, 0x24, 0x9c,
|
||||||
|
+ 0xa7, 0x15, 0x41, 0x71, 0x7a, 0x31, 0xea, 0x32, 0xfc, 0x28, 0x0d, 0xd7,
|
||||||
|
+ 0x5b, 0x09, 0x01, 0x98, 0x1b, 0xe2, 0xa5, 0x53, 0xd9, 0x05, 0x32, 0x97,
|
||||||
|
+ 0xec, 0xbe, 0x86, 0xfd, 0x1c, 0x1c, 0x71, 0x4c, 0x52, 0x29, 0x9e, 0x52,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1308_nonce[] = {0};
|
||||||
|
+static const unsigned char kat1308_persstr[] = {
|
||||||
|
+ 0xdc, 0x07, 0x2f, 0x68, 0xfa, 0x77, 0x03, 0x23, 0x42, 0xb0, 0xf5, 0xa2,
|
||||||
|
+ 0xd9, 0xad, 0xa1, 0xd0, 0xad, 0xa2, 0x14, 0xb4, 0xd0, 0x8e, 0xfb, 0x39,
|
||||||
|
+ 0xdd, 0xc2, 0xac, 0xfb, 0x98, 0xdf, 0x7f, 0xce, 0x4c, 0x75, 0x56, 0x45,
|
||||||
|
+ 0xcd, 0x86, 0x93, 0x74, 0x90, 0x6e, 0xf6, 0x9e, 0x85, 0x7e, 0xfb, 0xc3,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1308_addin0[] = {
|
||||||
|
+ 0x52, 0x25, 0xc4, 0x2f, 0x03, 0xce, 0x29, 0x71, 0xc5, 0x0b, 0xc3, 0x4e,
|
||||||
|
+ 0xad, 0x8d, 0x6f, 0x17, 0x82, 0xe1, 0xf3, 0xfd, 0xfd, 0x9b, 0x94, 0x9a,
|
||||||
|
+ 0x1d, 0xac, 0xd0, 0xd4, 0x3f, 0x2b, 0xe3, 0xab, 0x7c, 0x3d, 0x3e, 0x5a,
|
||||||
|
+ 0x68, 0xbb, 0xa4, 0x74, 0x68, 0x1a, 0xc6, 0x27, 0xff, 0xe0, 0xc0, 0x6c,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1308_addin1[] = {
|
||||||
|
+ 0xdc, 0x91, 0xd7, 0xb7, 0xb9, 0x94, 0x79, 0x0f, 0x06, 0xc4, 0x70, 0x19,
|
||||||
|
+ 0x33, 0x25, 0x7c, 0x96, 0x01, 0xa0, 0x62, 0xb0, 0x50, 0xe6, 0xc0, 0x3a,
|
||||||
|
+ 0x56, 0x8f, 0xc5, 0x50, 0x48, 0xc6, 0xf4, 0x49, 0xe5, 0x70, 0x16, 0x2e,
|
||||||
|
+ 0xae, 0xf2, 0x99, 0xb4, 0x2d, 0x70, 0x18, 0x16, 0xcd, 0xe0, 0x24, 0xe4,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1308_retbits[] = {
|
||||||
|
+ 0xde, 0xf8, 0x91, 0x1b, 0xf1, 0xe1, 0xa9, 0x97, 0xd8, 0x61, 0x84, 0xe2,
|
||||||
|
+ 0xdb, 0x83, 0x3e, 0x60, 0x45, 0xcd, 0xc8, 0x66, 0x93, 0x28, 0xc8, 0x92,
|
||||||
|
+ 0xbc, 0x25, 0xae, 0xe8, 0xb0, 0xed, 0xed, 0x16, 0x3d, 0xa5, 0xf9, 0x0f,
|
||||||
|
+ 0xb3, 0x72, 0x08, 0x84, 0xac, 0x3c, 0x3b, 0xaa, 0x5f, 0xf9, 0x7d, 0x63,
|
||||||
|
+ 0x3e, 0xde, 0x59, 0x37, 0x0e, 0x40, 0x12, 0x2b, 0xbc, 0x6c, 0x96, 0x53,
|
||||||
|
+ 0x26, 0x32, 0xd0, 0xb8,
|
||||||
|
+};
|
||||||
|
+static const struct drbg_kat_no_reseed kat1308_t = {
|
||||||
|
+ 2, kat1308_entropyin, kat1308_nonce, kat1308_persstr,
|
||||||
|
+ kat1308_addin0, kat1308_addin1, kat1308_retbits
|
||||||
|
+};
|
||||||
|
+static const struct drbg_kat kat1308 = {
|
||||||
|
+ NO_RESEED, NO_DF, NID_aes_256_ctr, 48, 0, 48, 48, 64, &kat1308_t
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+static const unsigned char kat1465_entropyin[] = {
|
||||||
|
+ 0xc9, 0x96, 0x3a, 0x15, 0x51, 0x76, 0x4f, 0xe0, 0x45, 0x82, 0x8a, 0x64,
|
||||||
|
+ 0x87, 0xbe, 0xaa, 0xc0,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1465_nonce[] = {
|
||||||
|
+ 0x08, 0xcd, 0x69, 0x39, 0xf8, 0x58, 0x9a, 0x85,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1465_persstr[] = {0};
|
||||||
|
+static const unsigned char kat1465_entropyinreseed[] = {
|
||||||
|
+ 0x16, 0xcc, 0x35, 0x15, 0xb1, 0x17, 0xf5, 0x33, 0x80, 0x9a, 0x80, 0xc5,
|
||||||
|
+ 0x1f, 0x4b, 0x7b, 0x51,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1465_addinreseed[] = {
|
||||||
|
+ 0xf5, 0x3d, 0xf1, 0x2e, 0xdb, 0x28, 0x1c, 0x00, 0x7b, 0xcb, 0xb6, 0x12,
|
||||||
|
+ 0x61, 0x9f, 0x26, 0x5f,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1465_addin0[] = {
|
||||||
|
+ 0xe2, 0x67, 0x06, 0x62, 0x09, 0xa7, 0xcf, 0xd6, 0x84, 0x8c, 0x20, 0xf6,
|
||||||
|
+ 0x10, 0x5a, 0x73, 0x9c,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1465_addin1[] = {
|
||||||
|
+ 0x26, 0xfa, 0x50, 0xe1, 0xb3, 0xcb, 0x65, 0xed, 0xbc, 0x6d, 0xda, 0x18,
|
||||||
|
+ 0x47, 0x99, 0x1f, 0xeb,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat1465_retbits[] = {
|
||||||
|
+ 0xf9, 0x47, 0xc6, 0xb0, 0x58, 0xa8, 0x66, 0x8a, 0xf5, 0x2b, 0x2a, 0x6d,
|
||||||
|
+ 0x4e, 0x24, 0x6f, 0x65, 0xbf, 0x51, 0x22, 0xbf, 0xe8, 0x8d, 0x6c, 0xeb,
|
||||||
|
+ 0xf9, 0x68, 0x7f, 0xed, 0x3b, 0xdd, 0x6b, 0xd5, 0x28, 0x47, 0x56, 0x52,
|
||||||
|
+ 0xda, 0x50, 0xf0, 0x90, 0x73, 0x95, 0x06, 0x58, 0xaf, 0x08, 0x98, 0x6e,
|
||||||
|
+ 0x24, 0x18, 0xfd, 0x2f, 0x48, 0x72, 0x57, 0xd6, 0x59, 0xab, 0xe9, 0x41,
|
||||||
|
+ 0x58, 0xdb, 0x27, 0xba,
|
||||||
|
+};
|
||||||
|
+static const struct drbg_kat_pr_false kat1465_t = {
|
||||||
|
+ 9, kat1465_entropyin, kat1465_nonce, kat1465_persstr,
|
||||||
|
+ kat1465_entropyinreseed, kat1465_addinreseed, kat1465_addin0,
|
||||||
|
+ kat1465_addin1, kat1465_retbits
|
||||||
|
+};
|
||||||
|
+static const struct drbg_kat kat1465 = {
|
||||||
|
+ PR_FALSE, USE_DF, NID_aes_128_ctr, 16, 8, 0, 16, 64, &kat1465_t
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+static const unsigned char kat3146_entropyin[] = {
|
||||||
|
+ 0xd7, 0x08, 0x42, 0x82, 0xc2, 0xd2, 0xd1, 0xde, 0x01, 0xb4, 0x36, 0xb3,
|
||||||
|
+ 0x7f, 0xbd, 0xd3, 0xdd, 0xb3, 0xc4, 0x31, 0x4f, 0x8f, 0xa7, 0x10, 0xf4,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat3146_nonce[] = {
|
||||||
|
+ 0x7b, 0x9e, 0xcd, 0x49, 0x4f, 0x46, 0xa0, 0x08, 0x32, 0xff, 0x2e, 0xc3,
|
||||||
|
+ 0x50, 0x86, 0xca, 0xca,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat3146_persstr[] = {0};
|
||||||
|
+static const unsigned char kat3146_entropyinpr1[] = {
|
||||||
|
+ 0x68, 0xd0, 0x7b, 0xa4, 0xe7, 0x22, 0x19, 0xe6, 0xb6, 0x46, 0x6a, 0xda,
|
||||||
|
+ 0x8e, 0x67, 0xea, 0x63, 0x3f, 0xaf, 0x2f, 0x6c, 0x9d, 0x5e, 0x48, 0x15,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat3146_addinpr1[] = {
|
||||||
|
+ 0x70, 0x0f, 0x54, 0xf4, 0x53, 0xde, 0xca, 0x61, 0x5c, 0x49, 0x51, 0xd1,
|
||||||
|
+ 0x41, 0xc4, 0xf1, 0x2f, 0x65, 0xfb, 0x7e, 0xbc, 0x9b, 0x14, 0xba, 0x90,
|
||||||
|
+ 0x05, 0x33, 0x7e, 0x64, 0xb7, 0x2b, 0xaf, 0x99,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat3146_entropyinpr2[] = {
|
||||||
|
+ 0xeb, 0x77, 0xb0, 0xe9, 0x2d, 0x31, 0xc8, 0x66, 0xc5, 0xc4, 0xa7, 0xf7,
|
||||||
|
+ 0x6c, 0xb2, 0x74, 0x36, 0x4b, 0x25, 0x78, 0x04, 0xd8, 0xd7, 0xd2, 0x34,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat3146_addinpr2[] = {
|
||||||
|
+ 0x05, 0xcd, 0x2a, 0x97, 0x5a, 0x5d, 0xfb, 0x98, 0xc1, 0xf1, 0x00, 0x0c,
|
||||||
|
+ 0xed, 0xe6, 0x2a, 0xba, 0xf0, 0x89, 0x1f, 0x5a, 0x4f, 0xd7, 0x48, 0xb3,
|
||||||
|
+ 0x24, 0xc0, 0x8a, 0x3d, 0x60, 0x59, 0x5d, 0xb6,
|
||||||
|
+};
|
||||||
|
+static const unsigned char kat3146_retbits[] = {
|
||||||
|
+ 0x29, 0x94, 0xa4, 0xa8, 0x17, 0x3e, 0x62, 0x2f, 0x94, 0xdd, 0x40, 0x1f,
|
||||||
|
+ 0xe3, 0x7e, 0x77, 0xd4, 0x38, 0xbc, 0x0e, 0x49, 0x46, 0xf6, 0x0e, 0x28,
|
||||||
|
+ 0x91, 0xc6, 0x9c, 0xc4, 0xa6, 0xa1, 0xf8, 0x9a, 0x64, 0x5e, 0x99, 0x76,
|
||||||
|
+ 0xd0, 0x2d, 0xee, 0xde, 0xe1, 0x2c, 0x93, 0x29, 0x4b, 0x12, 0xcf, 0x87,
|
||||||
|
+ 0x03, 0x98, 0xb9, 0x74, 0x41, 0xdb, 0x3a, 0x49, 0x9f, 0x92, 0xd0, 0x45,
|
||||||
|
+ 0xd4, 0x30, 0x73, 0xbb,
|
||||||
|
+};
|
||||||
|
+static const struct drbg_kat_pr_true kat3146_t = {
|
||||||
|
+ 10, kat3146_entropyin, kat3146_nonce, kat3146_persstr,
|
||||||
|
+ kat3146_entropyinpr1, kat3146_addinpr1, kat3146_entropyinpr2,
|
||||||
|
+ kat3146_addinpr2, kat3146_retbits
|
||||||
|
+};
|
||||||
|
+static const struct drbg_kat kat3146 = {
|
||||||
|
+ PR_TRUE, USE_DF, NID_aes_192_ctr, 24, 16, 0, 32, 64, &kat3146_t
|
||||||
|
+};
|
||||||
|
+
|
||||||
|
+static const struct drbg_kat *drbg_test[] = { &kat1308, &kat1465, &kat3146 };
|
||||||
|
+
|
||||||
|
+static const size_t drbg_test_nelem = OSSL_NELEM(drbg_test);
|
||||||
|
+
|
||||||
|
+static size_t kat_entropy(RAND_DRBG *drbg, unsigned char **pout,
|
||||||
|
+ int entropy, size_t min_len, size_t max_len,
|
||||||
|
+ int prediction_resistance)
|
||||||
|
+{
|
||||||
|
+ TEST_CTX *t = (TEST_CTX *)RAND_DRBG_get_ex_data(drbg, app_data_index);
|
||||||
|
+
|
||||||
|
+ t->entropycnt++;
|
||||||
|
+ *pout = (unsigned char *)t->entropy;
|
||||||
|
+ return t->entropylen;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+static size_t kat_nonce(RAND_DRBG *drbg, unsigned char **pout,
|
||||||
|
+ int entropy, size_t min_len, size_t max_len)
|
||||||
|
+{
|
||||||
|
+ TEST_CTX *t = (TEST_CTX *)RAND_DRBG_get_ex_data(drbg, app_data_index);
|
||||||
|
+
|
||||||
|
+ t->noncecnt++;
|
||||||
|
+ *pout = (unsigned char *)t->nonce;
|
||||||
|
+ return t->noncelen;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/*
|
||||||
|
+ * Do a single NO_RESEED KAT:
|
||||||
|
+ *
|
||||||
|
+ * Instantiate
|
||||||
|
+ * Generate Random Bits (pr=false)
|
||||||
|
+ * Generate Random Bits (pr=false)
|
||||||
|
+ * Uninstantiate
|
||||||
|
+ *
|
||||||
|
+ * Return 0 on failure.
|
||||||
|
+ */
|
||||||
|
+static int single_kat_no_reseed(const struct drbg_kat *td)
|
||||||
|
+{
|
||||||
|
+ struct drbg_kat_no_reseed *data = (struct drbg_kat_no_reseed *)td->t;
|
||||||
|
+ RAND_DRBG *drbg = NULL;
|
||||||
|
+ unsigned char *buff = NULL;
|
||||||
|
+ unsigned int flags = 0;
|
||||||
|
+ int failures = 0;
|
||||||
|
+ TEST_CTX t;
|
||||||
|
+
|
||||||
|
+ if (td->df != USE_DF)
|
||||||
|
+ flags |= RAND_DRBG_FLAG_CTR_NO_DF;
|
||||||
|
+
|
||||||
|
+ if ((drbg = RAND_DRBG_new(td->nid, flags, NULL)) == NULL)
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_set_callbacks(drbg, kat_entropy, NULL,
|
||||||
|
+ kat_nonce, NULL)) {
|
||||||
|
+ failures++;
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ memset(&t, 0, sizeof(t));
|
||||||
|
+ t.entropy = data->entropyin;
|
||||||
|
+ t.entropylen = td->entropyinlen;
|
||||||
|
+ t.nonce = data->nonce;
|
||||||
|
+ t.noncelen = td->noncelen;
|
||||||
|
+ RAND_DRBG_set_ex_data(drbg, app_data_index, &t);
|
||||||
|
+
|
||||||
|
+ buff = OPENSSL_malloc(td->retbyteslen);
|
||||||
|
+ if (buff == NULL) {
|
||||||
|
+ failures++;
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_instantiate(drbg, data->persstr, td->persstrlen)
|
||||||
|
+ || !RAND_DRBG_generate(drbg, buff, td->retbyteslen, 0,
|
||||||
|
+ data->addin1, td->addinlen)
|
||||||
|
+ || !RAND_DRBG_generate(drbg, buff, td->retbyteslen, 0,
|
||||||
|
+ data->addin2, td->addinlen)
|
||||||
|
+ || memcmp(data->retbytes, buff,
|
||||||
|
+ td->retbyteslen) != 0)
|
||||||
|
+ failures++;
|
||||||
|
+
|
||||||
|
+err:
|
||||||
|
+ OPENSSL_free(buff);
|
||||||
|
+ RAND_DRBG_uninstantiate(drbg);
|
||||||
|
+ RAND_DRBG_free(drbg);
|
||||||
|
+ return failures == 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/*-
|
||||||
|
+ * Do a single PR_FALSE KAT:
|
||||||
|
+ *
|
||||||
|
+ * Instantiate
|
||||||
|
+ * Reseed
|
||||||
|
+ * Generate Random Bits (pr=false)
|
||||||
|
+ * Generate Random Bits (pr=false)
|
||||||
|
+ * Uninstantiate
|
||||||
|
+ *
|
||||||
|
+ * Return 0 on failure.
|
||||||
|
+ */
|
||||||
|
+static int single_kat_pr_false(const struct drbg_kat *td)
|
||||||
|
+{
|
||||||
|
+ struct drbg_kat_pr_false *data = (struct drbg_kat_pr_false *)td->t;
|
||||||
|
+ RAND_DRBG *drbg = NULL;
|
||||||
|
+ unsigned char *buff = NULL;
|
||||||
|
+ unsigned int flags = 0;
|
||||||
|
+ int failures = 0;
|
||||||
|
+ TEST_CTX t;
|
||||||
|
+
|
||||||
|
+ if (td->df != USE_DF)
|
||||||
|
+ flags |= RAND_DRBG_FLAG_CTR_NO_DF;
|
||||||
|
+
|
||||||
|
+ if ((drbg = RAND_DRBG_new(td->nid, flags, NULL)) == NULL)
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_set_callbacks(drbg, kat_entropy, NULL,
|
||||||
|
+ kat_nonce, NULL)) {
|
||||||
|
+ failures++;
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ memset(&t, 0, sizeof(t));
|
||||||
|
+ t.entropy = data->entropyin;
|
||||||
|
+ t.entropylen = td->entropyinlen;
|
||||||
|
+ t.nonce = data->nonce;
|
||||||
|
+ t.noncelen = td->noncelen;
|
||||||
|
+ RAND_DRBG_set_ex_data(drbg, app_data_index, &t);
|
||||||
|
+
|
||||||
|
+ buff = OPENSSL_malloc(td->retbyteslen);
|
||||||
|
+ if (buff == NULL) {
|
||||||
|
+ failures++;
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_instantiate(drbg, data->persstr, td->persstrlen))
|
||||||
|
+ failures++;
|
||||||
|
+
|
||||||
|
+ t.entropy = data->entropyinreseed;
|
||||||
|
+ t.entropylen = td->entropyinlen;
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_reseed(drbg, data->addinreseed, td->addinlen, 0)
|
||||||
|
+ || !RAND_DRBG_generate(drbg, buff, td->retbyteslen, 0,
|
||||||
|
+ data->addin1, td->addinlen)
|
||||||
|
+ || !RAND_DRBG_generate(drbg, buff, td->retbyteslen, 0,
|
||||||
|
+ data->addin2, td->addinlen)
|
||||||
|
+ || memcmp(data->retbytes, buff,
|
||||||
|
+ td->retbyteslen) != 0)
|
||||||
|
+ failures++;
|
||||||
|
+
|
||||||
|
+err:
|
||||||
|
+ OPENSSL_free(buff);
|
||||||
|
+ RAND_DRBG_uninstantiate(drbg);
|
||||||
|
+ RAND_DRBG_free(drbg);
|
||||||
|
+ return failures == 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/*-
|
||||||
|
+ * Do a single PR_TRUE KAT:
|
||||||
|
+ *
|
||||||
|
+ * Instantiate
|
||||||
|
+ * Generate Random Bits (pr=true)
|
||||||
|
+ * Generate Random Bits (pr=true)
|
||||||
|
+ * Uninstantiate
|
||||||
|
+ *
|
||||||
|
+ * Return 0 on failure.
|
||||||
|
+ */
|
||||||
|
+static int single_kat_pr_true(const struct drbg_kat *td)
|
||||||
|
+{
|
||||||
|
+ struct drbg_kat_pr_true *data = (struct drbg_kat_pr_true *)td->t;
|
||||||
|
+ RAND_DRBG *drbg = NULL;
|
||||||
|
+ unsigned char *buff = NULL;
|
||||||
|
+ unsigned int flags = 0;
|
||||||
|
+ int failures = 0;
|
||||||
|
+ TEST_CTX t;
|
||||||
|
+
|
||||||
|
+ if (td->df != USE_DF)
|
||||||
|
+ flags |= RAND_DRBG_FLAG_CTR_NO_DF;
|
||||||
|
+
|
||||||
|
+ if ((drbg = RAND_DRBG_new(td->nid, flags, NULL)) == NULL)
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_set_callbacks(drbg, kat_entropy, NULL,
|
||||||
|
+ kat_nonce, NULL)) {
|
||||||
|
+ failures++;
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ memset(&t, 0, sizeof(t));
|
||||||
|
+ t.nonce = data->nonce;
|
||||||
|
+ t.noncelen = td->noncelen;
|
||||||
|
+ t.entropy = data->entropyin;
|
||||||
|
+ t.entropylen = td->entropyinlen;
|
||||||
|
+ RAND_DRBG_set_ex_data(drbg, app_data_index, &t);
|
||||||
|
+
|
||||||
|
+ buff = OPENSSL_malloc(td->retbyteslen);
|
||||||
|
+ if (buff == NULL) {
|
||||||
|
+ failures++;
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_instantiate(drbg, data->persstr, td->persstrlen))
|
||||||
|
+ failures++;
|
||||||
|
+
|
||||||
|
+ t.entropy = data->entropyinpr1;
|
||||||
|
+ t.entropylen = td->entropyinlen;
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_generate(drbg, buff, td->retbyteslen, 1,
|
||||||
|
+ data->addin1, td->addinlen))
|
||||||
|
+ failures++;
|
||||||
|
+
|
||||||
|
+ t.entropy = data->entropyinpr2;
|
||||||
|
+ t.entropylen = td->entropyinlen;
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_generate(drbg, buff, td->retbyteslen, 1,
|
||||||
|
+ data->addin2, td->addinlen)
|
||||||
|
+ || memcmp(data->retbytes, buff,
|
||||||
|
+ td->retbyteslen) != 0)
|
||||||
|
+ failures++;
|
||||||
|
+
|
||||||
|
+err:
|
||||||
|
+ OPENSSL_free(buff);
|
||||||
|
+ RAND_DRBG_uninstantiate(drbg);
|
||||||
|
+ RAND_DRBG_free(drbg);
|
||||||
|
+ return failures == 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+static int test_kats(int i)
|
||||||
|
+{
|
||||||
|
+ const struct drbg_kat *td = drbg_test[i];
|
||||||
|
+ int rv = 0;
|
||||||
|
+
|
||||||
|
+ switch (td->type) {
|
||||||
|
+ case NO_RESEED:
|
||||||
|
+ if (!single_kat_no_reseed(td))
|
||||||
|
+ goto err;
|
||||||
|
+ break;
|
||||||
|
+ case PR_FALSE:
|
||||||
|
+ if (!single_kat_pr_false(td))
|
||||||
|
+ goto err;
|
||||||
|
+ break;
|
||||||
|
+ case PR_TRUE:
|
||||||
|
+ if (!single_kat_pr_true(td))
|
||||||
|
+ goto err;
|
||||||
|
+ break;
|
||||||
|
+ default: /* cant happen */
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ rv = 1;
|
||||||
|
+err:
|
||||||
|
+ return rv;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/*-
|
||||||
|
+ * Do one expected-error test:
|
||||||
|
+ *
|
||||||
|
+ * Instantiate with no entropy supplied
|
||||||
|
+ *
|
||||||
|
+ * Return 0 on failure.
|
||||||
|
+ */
|
||||||
|
+static int test_drbg_sanity(const struct drbg_kat *td)
|
||||||
|
+{
|
||||||
|
+ struct drbg_kat_pr_false *data = (struct drbg_kat_pr_false *)td->t;
|
||||||
|
+ RAND_DRBG *drbg = NULL;
|
||||||
|
+ unsigned int flags = 0;
|
||||||
|
+ int failures = 0;
|
||||||
|
+ TEST_CTX t;
|
||||||
|
+
|
||||||
|
+ if (td->df != USE_DF)
|
||||||
|
+ flags |= RAND_DRBG_FLAG_CTR_NO_DF;
|
||||||
|
+
|
||||||
|
+ if ((drbg = RAND_DRBG_new(td->nid, flags, NULL)) == NULL)
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
+ if (!RAND_DRBG_set_callbacks(drbg, kat_entropy, NULL,
|
||||||
|
+ kat_nonce, NULL)) {
|
||||||
|
+ failures++;
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ memset(&t, 0, sizeof(t));
|
||||||
|
+ t.entropy = data->entropyin;
|
||||||
|
+ t.entropylen = 0; /* No entropy */
|
||||||
|
+ t.nonce = data->nonce;
|
||||||
|
+ t.noncelen = td->noncelen;
|
||||||
|
+ RAND_DRBG_set_ex_data(drbg, app_data_index, &t);
|
||||||
|
+
|
||||||
|
+ ERR_set_mark();
|
||||||
|
+ /* This must fail. */
|
||||||
|
+ if (RAND_DRBG_instantiate(drbg, data->persstr, td->persstrlen))
|
||||||
|
+ failures++;
|
||||||
|
+ RAND_DRBG_uninstantiate(drbg);
|
||||||
|
+ ERR_pop_to_mark();
|
||||||
|
+
|
||||||
|
+err:
|
||||||
|
+ RAND_DRBG_free(drbg);
|
||||||
|
+ return failures == 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+int rand_drbg_selftest(void)
|
||||||
|
+{
|
||||||
|
+ int i;
|
||||||
|
+
|
||||||
|
+ if (!RUN_ONCE(&get_index_once, drbg_app_data_index_init))
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
+ for (i = 0; i < drbg_test_nelem; i++) {
|
||||||
|
+ if (test_kats(i) <= 0)
|
||||||
|
+ return 0;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (test_drbg_sanity(&kat1465) <= 0)
|
||||||
|
+ return 0;
|
||||||
|
+
|
||||||
|
+ return 1;
|
||||||
|
+}
|
||||||
|
diff -up openssl-1.1.1g/include/crypto/rand.h.drbg-selftest openssl-1.1.1g/include/crypto/rand.h
|
||||||
|
--- openssl-1.1.1g/include/crypto/rand.h.drbg-selftest 2020-04-23 13:33:12.587622510 +0200
|
||||||
|
+++ openssl-1.1.1g/include/crypto/rand.h 2020-04-23 13:33:12.619621907 +0200
|
||||||
|
@@ -140,4 +140,9 @@ void rand_pool_cleanup(void);
|
||||||
|
*/
|
||||||
|
void rand_pool_keep_random_devices_open(int keep);
|
||||||
|
|
||||||
|
+/*
|
||||||
|
+ * Perform the DRBG KAT selftests
|
||||||
|
+ */
|
||||||
|
+int rand_drbg_selftest(void);
|
||||||
|
+
|
||||||
|
#endif
|
189
openssl-1.1.1-fips-post-rand.patch
Normal file
189
openssl-1.1.1-fips-post-rand.patch
Normal file
@ -0,0 +1,189 @@
|
|||||||
|
diff -up openssl-1.1.1e/crypto/fips/fips.c.fips-post-rand openssl-1.1.1e/crypto/fips/fips.c
|
||||||
|
--- openssl-1.1.1e/crypto/fips/fips.c.fips-post-rand 2020-03-17 18:06:16.822418854 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/fips/fips.c 2020-03-17 18:06:16.861418172 +0100
|
||||||
|
@@ -68,6 +68,7 @@
|
||||||
|
|
||||||
|
# include <openssl/fips.h>
|
||||||
|
# include "internal/thread_once.h"
|
||||||
|
+# include "crypto/rand.h"
|
||||||
|
|
||||||
|
# ifndef PATH_MAX
|
||||||
|
# define PATH_MAX 1024
|
||||||
|
@@ -76,6 +77,7 @@
|
||||||
|
static int fips_selftest_fail = 0;
|
||||||
|
static int fips_mode = 0;
|
||||||
|
static int fips_started = 0;
|
||||||
|
+static int fips_post = 0;
|
||||||
|
|
||||||
|
static int fips_is_owning_thread(void);
|
||||||
|
static int fips_set_owning_thread(void);
|
||||||
|
@@ -158,6 +160,11 @@ void fips_set_selftest_fail(void)
|
||||||
|
fips_selftest_fail = 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
+int fips_in_post(void)
|
||||||
|
+{
|
||||||
|
+ return fips_post;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
/* we implement what libfipscheck does ourselves */
|
||||||
|
|
||||||
|
static int
|
||||||
|
@@ -445,6 +452,8 @@ int FIPS_module_mode_set(int onoff)
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
|
||||||
|
+ fips_post = 1;
|
||||||
|
+
|
||||||
|
if (!FIPS_selftest()) {
|
||||||
|
fips_selftest_fail = 1;
|
||||||
|
ret = 0;
|
||||||
|
@@ -459,7 +468,12 @@ int FIPS_module_mode_set(int onoff)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ fips_post = 0;
|
||||||
|
+
|
||||||
|
fips_set_mode(onoff);
|
||||||
|
+ /* force RNG reseed with entropy from getrandom() on next call */
|
||||||
|
+ rand_force_reseed();
|
||||||
|
+
|
||||||
|
ret = 1;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
diff -up openssl-1.1.1e/crypto/rand/drbg_lib.c.fips-post-rand openssl-1.1.1e/crypto/rand/drbg_lib.c
|
||||||
|
--- openssl-1.1.1e/crypto/rand/drbg_lib.c.fips-post-rand 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/rand/drbg_lib.c 2020-03-17 18:07:35.305045521 +0100
|
||||||
|
@@ -1009,6 +1009,20 @@ size_t rand_drbg_seedlen(RAND_DRBG *drbg
|
||||||
|
return min_entropy > min_entropylen ? min_entropy : min_entropylen;
|
||||||
|
}
|
||||||
|
|
||||||
|
+void rand_force_reseed(void)
|
||||||
|
+{
|
||||||
|
+ RAND_DRBG *drbg;
|
||||||
|
+
|
||||||
|
+ drbg = RAND_DRBG_get0_master();
|
||||||
|
+ drbg->fork_id = 0;
|
||||||
|
+
|
||||||
|
+ drbg = RAND_DRBG_get0_private();
|
||||||
|
+ drbg->fork_id = 0;
|
||||||
|
+
|
||||||
|
+ drbg = RAND_DRBG_get0_public();
|
||||||
|
+ drbg->fork_id = 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
/* Implements the default OpenSSL RAND_add() method */
|
||||||
|
static int drbg_add(const void *buf, int num, double randomness)
|
||||||
|
{
|
||||||
|
diff -up openssl-1.1.1e/crypto/rand/rand_unix.c.fips-post-rand openssl-1.1.1e/crypto/rand/rand_unix.c
|
||||||
|
--- openssl-1.1.1e/crypto/rand/rand_unix.c.fips-post-rand 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/rand/rand_unix.c 2020-03-17 18:09:01.503537189 +0100
|
||||||
|
@@ -17,10 +17,12 @@
|
||||||
|
#include <openssl/crypto.h>
|
||||||
|
#include "rand_local.h"
|
||||||
|
#include "crypto/rand.h"
|
||||||
|
+#include "crypto/fips.h"
|
||||||
|
#include <stdio.h>
|
||||||
|
#include "internal/dso.h"
|
||||||
|
#ifdef __linux
|
||||||
|
# include <sys/syscall.h>
|
||||||
|
+# include <sys/random.h>
|
||||||
|
# ifdef DEVRANDOM_WAIT
|
||||||
|
# include <sys/shm.h>
|
||||||
|
# include <sys/utsname.h>
|
||||||
|
@@ -342,7 +344,7 @@ static ssize_t sysctl_random(char *buf,
|
||||||
|
* syscall_random(): Try to get random data using a system call
|
||||||
|
* returns the number of bytes returned in buf, or < 0 on error.
|
||||||
|
*/
|
||||||
|
-static ssize_t syscall_random(void *buf, size_t buflen)
|
||||||
|
+static ssize_t syscall_random(void *buf, size_t buflen, int nonblock)
|
||||||
|
{
|
||||||
|
/*
|
||||||
|
* Note: 'buflen' equals the size of the buffer which is used by the
|
||||||
|
@@ -364,6 +366,7 @@ static ssize_t syscall_random(void *buf,
|
||||||
|
* - Linux since 3.17 with glibc 2.25
|
||||||
|
* - FreeBSD since 12.0 (1200061)
|
||||||
|
*/
|
||||||
|
+# if 0
|
||||||
|
# if defined(__GNUC__) && __GNUC__>=2 && defined(__ELF__) && !defined(__hpux)
|
||||||
|
extern int getentropy(void *buffer, size_t length) __attribute__((weak));
|
||||||
|
|
||||||
|
@@ -385,10 +388,10 @@ static ssize_t syscall_random(void *buf,
|
||||||
|
if (p_getentropy.p != NULL)
|
||||||
|
return p_getentropy.f(buf, buflen) == 0 ? (ssize_t)buflen : -1;
|
||||||
|
# endif
|
||||||
|
-
|
||||||
|
+# endif
|
||||||
|
/* Linux supports this since version 3.17 */
|
||||||
|
-# if defined(__linux) && defined(__NR_getrandom)
|
||||||
|
- return syscall(__NR_getrandom, buf, buflen, 0);
|
||||||
|
+# if defined(__linux) && defined(SYS_getrandom)
|
||||||
|
+ return syscall(SYS_getrandom, buf, buflen, nonblock?GRND_NONBLOCK:0);
|
||||||
|
# elif (defined(__FreeBSD__) || defined(__NetBSD__)) && defined(KERN_ARND)
|
||||||
|
return sysctl_random(buf, buflen);
|
||||||
|
# else
|
||||||
|
@@ -623,6 +626,9 @@ size_t rand_pool_acquire_entropy(RAND_PO
|
||||||
|
size_t entropy_available;
|
||||||
|
|
||||||
|
# if defined(OPENSSL_RAND_SEED_GETRANDOM)
|
||||||
|
+ int in_post;
|
||||||
|
+
|
||||||
|
+ for (in_post = fips_in_post(); in_post >= 0; --in_post) {
|
||||||
|
{
|
||||||
|
size_t bytes_needed;
|
||||||
|
unsigned char *buffer;
|
||||||
|
@@ -633,7 +639,7 @@ size_t rand_pool_acquire_entropy(RAND_PO
|
||||||
|
bytes_needed = rand_pool_bytes_needed(pool, 1 /*entropy_factor*/);
|
||||||
|
while (bytes_needed != 0 && attempts-- > 0) {
|
||||||
|
buffer = rand_pool_add_begin(pool, bytes_needed);
|
||||||
|
- bytes = syscall_random(buffer, bytes_needed);
|
||||||
|
+ bytes = syscall_random(buffer, bytes_needed, in_post);
|
||||||
|
if (bytes > 0) {
|
||||||
|
rand_pool_add_end(pool, bytes, 8 * bytes);
|
||||||
|
bytes_needed -= bytes;
|
||||||
|
@@ -668,8 +674,10 @@ size_t rand_pool_acquire_entropy(RAND_PO
|
||||||
|
int attempts = 3;
|
||||||
|
const int fd = get_random_device(i);
|
||||||
|
|
||||||
|
- if (fd == -1)
|
||||||
|
+ if (fd == -1) {
|
||||||
|
+ OPENSSL_showfatal("Random device %s cannot be opened.\n", random_device_paths[i]);
|
||||||
|
continue;
|
||||||
|
+ }
|
||||||
|
|
||||||
|
while (bytes_needed != 0 && attempts-- > 0) {
|
||||||
|
buffer = rand_pool_add_begin(pool, bytes_needed);
|
||||||
|
@@ -732,7 +740,9 @@ size_t rand_pool_acquire_entropy(RAND_PO
|
||||||
|
return entropy_available;
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
-
|
||||||
|
+# ifdef OPENSSL_RAND_SEED_GETRANDOM
|
||||||
|
+ }
|
||||||
|
+# endif
|
||||||
|
return rand_pool_entropy_available(pool);
|
||||||
|
# endif
|
||||||
|
}
|
||||||
|
diff -up openssl-1.1.1e/include/crypto/fips.h.fips-post-rand openssl-1.1.1e/include/crypto/fips.h
|
||||||
|
--- openssl-1.1.1e/include/crypto/fips.h.fips-post-rand 2020-03-17 18:06:16.831418696 +0100
|
||||||
|
+++ openssl-1.1.1e/include/crypto/fips.h 2020-03-17 18:06:16.861418172 +0100
|
||||||
|
@@ -77,6 +77,8 @@ int FIPS_selftest_hmac(void);
|
||||||
|
int FIPS_selftest_drbg(void);
|
||||||
|
int FIPS_selftest_cmac(void);
|
||||||
|
|
||||||
|
+int fips_in_post(void);
|
||||||
|
+
|
||||||
|
int fips_pkey_signature_test(EVP_PKEY *pkey,
|
||||||
|
const unsigned char *tbs, int tbslen,
|
||||||
|
const unsigned char *kat,
|
||||||
|
diff -up openssl-1.1.1e/include/crypto/rand.h.fips-post-rand openssl-1.1.1e/include/crypto/rand.h
|
||||||
|
--- openssl-1.1.1e/include/crypto/rand.h.fips-post-rand 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/include/crypto/rand.h 2020-03-17 18:07:35.303045555 +0100
|
||||||
|
@@ -24,6 +24,7 @@
|
||||||
|
typedef struct rand_pool_st RAND_POOL;
|
||||||
|
|
||||||
|
void rand_cleanup_int(void);
|
||||||
|
+void rand_force_reseed(void);
|
||||||
|
void rand_drbg_cleanup_int(void);
|
||||||
|
void drbg_delete_thread_state(void);
|
||||||
|
|
File diff suppressed because it is too large
Load Diff
500
openssl-1.1.1-intel-cet.patch
Normal file
500
openssl-1.1.1-intel-cet.patch
Normal file
@ -0,0 +1,500 @@
|
|||||||
|
diff -up openssl-1.1.1e/crypto/aes/asm/aesni-x86_64.pl.intel-cet openssl-1.1.1e/crypto/aes/asm/aesni-x86_64.pl
|
||||||
|
--- openssl-1.1.1e/crypto/aes/asm/aesni-x86_64.pl.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/aes/asm/aesni-x86_64.pl 2020-03-19 17:07:02.626522694 +0100
|
||||||
|
@@ -275,6 +275,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
${PREFIX}_encrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
movups ($inp),$inout0 # load input
|
||||||
|
mov 240($key),$rounds # key->rounds
|
||||||
|
___
|
||||||
|
@@ -293,6 +294,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
${PREFIX}_decrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
movups ($inp),$inout0 # load input
|
||||||
|
mov 240($key),$rounds # key->rounds
|
||||||
|
___
|
||||||
|
@@ -613,6 +615,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
aesni_ecb_encrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
___
|
||||||
|
$code.=<<___ if ($win64);
|
||||||
|
lea -0x58(%rsp),%rsp
|
||||||
|
@@ -985,6 +988,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
aesni_ccm64_encrypt_blocks:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
___
|
||||||
|
$code.=<<___ if ($win64);
|
||||||
|
lea -0x58(%rsp),%rsp
|
||||||
|
@@ -1077,6 +1081,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
aesni_ccm64_decrypt_blocks:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
___
|
||||||
|
$code.=<<___ if ($win64);
|
||||||
|
lea -0x58(%rsp),%rsp
|
||||||
|
@@ -1203,6 +1208,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
aesni_ctr32_encrypt_blocks:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
cmp \$1,$len
|
||||||
|
jne .Lctr32_bulk
|
||||||
|
|
||||||
|
@@ -1775,6 +1781,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
aesni_xts_encrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
lea (%rsp),%r11 # frame pointer
|
||||||
|
.cfi_def_cfa_register %r11
|
||||||
|
push %rbp
|
||||||
|
@@ -2258,6 +2265,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
aesni_xts_decrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
lea (%rsp),%r11 # frame pointer
|
||||||
|
.cfi_def_cfa_register %r11
|
||||||
|
push %rbp
|
||||||
|
@@ -2783,6 +2791,7 @@ $code.=<<___;
|
||||||
|
.align 32
|
||||||
|
aesni_ocb_encrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
lea (%rsp),%rax
|
||||||
|
push %rbx
|
||||||
|
.cfi_push %rbx
|
||||||
|
@@ -3249,6 +3258,7 @@ __ocb_encrypt1:
|
||||||
|
.align 32
|
||||||
|
aesni_ocb_decrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
lea (%rsp),%rax
|
||||||
|
push %rbx
|
||||||
|
.cfi_push %rbx
|
||||||
|
@@ -3737,6 +3747,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
${PREFIX}_cbc_encrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
test $len,$len # check length
|
||||||
|
jz .Lcbc_ret
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1e/crypto/aes/asm/vpaes-x86_64.pl.intel-cet openssl-1.1.1e/crypto/aes/asm/vpaes-x86_64.pl
|
||||||
|
--- openssl-1.1.1e/crypto/aes/asm/vpaes-x86_64.pl.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/aes/asm/vpaes-x86_64.pl 2020-03-19 17:00:15.974621757 +0100
|
||||||
|
@@ -696,6 +696,7 @@ _vpaes_schedule_mangle:
|
||||||
|
.align 16
|
||||||
|
${PREFIX}_set_encrypt_key:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
___
|
||||||
|
$code.=<<___ if ($win64);
|
||||||
|
lea -0xb8(%rsp),%rsp
|
||||||
|
@@ -746,6 +747,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
${PREFIX}_set_decrypt_key:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
___
|
||||||
|
$code.=<<___ if ($win64);
|
||||||
|
lea -0xb8(%rsp),%rsp
|
||||||
|
@@ -801,6 +803,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
${PREFIX}_encrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
___
|
||||||
|
$code.=<<___ if ($win64);
|
||||||
|
lea -0xb8(%rsp),%rsp
|
||||||
|
@@ -846,6 +849,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
${PREFIX}_decrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
___
|
||||||
|
$code.=<<___ if ($win64);
|
||||||
|
lea -0xb8(%rsp),%rsp
|
||||||
|
@@ -897,6 +901,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
${PREFIX}_cbc_encrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
xchg $key,$len
|
||||||
|
___
|
||||||
|
($len,$key)=($key,$len);
|
||||||
|
diff -up openssl-1.1.1e/crypto/async/arch/async_posix.c.intel-cet openssl-1.1.1e/crypto/async/arch/async_posix.c
|
||||||
|
--- openssl-1.1.1e/crypto/async/arch/async_posix.c.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/async/arch/async_posix.c 2020-03-19 17:00:15.974621757 +0100
|
||||||
|
@@ -34,7 +34,9 @@ void async_local_cleanup(void)
|
||||||
|
|
||||||
|
int async_fibre_makecontext(async_fibre *fibre)
|
||||||
|
{
|
||||||
|
+#ifndef USE_SWAPCONTEXT
|
||||||
|
fibre->env_init = 0;
|
||||||
|
+#endif
|
||||||
|
if (getcontext(&fibre->fibre) == 0) {
|
||||||
|
fibre->fibre.uc_stack.ss_sp = OPENSSL_malloc(STACKSIZE);
|
||||||
|
if (fibre->fibre.uc_stack.ss_sp != NULL) {
|
||||||
|
diff -up openssl-1.1.1e/crypto/async/arch/async_posix.h.intel-cet openssl-1.1.1e/crypto/async/arch/async_posix.h
|
||||||
|
--- openssl-1.1.1e/crypto/async/arch/async_posix.h.intel-cet 2020-03-19 17:00:15.435631166 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/async/arch/async_posix.h 2020-03-19 17:00:15.975621739 +0100
|
||||||
|
@@ -25,17 +25,33 @@
|
||||||
|
# define ASYNC_POSIX
|
||||||
|
# define ASYNC_ARCH
|
||||||
|
|
||||||
|
+# ifdef __CET__
|
||||||
|
+/*
|
||||||
|
+ * When Intel CET is enabled, makecontext will create a different
|
||||||
|
+ * shadow stack for each context. async_fibre_swapcontext cannot
|
||||||
|
+ * use _longjmp. It must call swapcontext to swap shadow stack as
|
||||||
|
+ * well as normal stack.
|
||||||
|
+ */
|
||||||
|
+# define USE_SWAPCONTEXT
|
||||||
|
+# endif
|
||||||
|
# include <ucontext.h>
|
||||||
|
-# include <setjmp.h>
|
||||||
|
+# ifndef USE_SWAPCONTEXT
|
||||||
|
+# include <setjmp.h>
|
||||||
|
+# endif
|
||||||
|
|
||||||
|
typedef struct async_fibre_st {
|
||||||
|
ucontext_t fibre;
|
||||||
|
+# ifndef USE_SWAPCONTEXT
|
||||||
|
jmp_buf env;
|
||||||
|
int env_init;
|
||||||
|
+# endif
|
||||||
|
} async_fibre;
|
||||||
|
|
||||||
|
static ossl_inline int async_fibre_swapcontext(async_fibre *o, async_fibre *n, int r)
|
||||||
|
{
|
||||||
|
+# ifdef USE_SWAPCONTEXT
|
||||||
|
+ swapcontext(&o->fibre, &n->fibre);
|
||||||
|
+# else
|
||||||
|
o->env_init = 1;
|
||||||
|
|
||||||
|
if (!r || !_setjmp(o->env)) {
|
||||||
|
@@ -44,6 +60,7 @@ static ossl_inline int async_fibre_swapc
|
||||||
|
else
|
||||||
|
setcontext(&n->fibre);
|
||||||
|
}
|
||||||
|
+# endif
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
diff -up openssl-1.1.1e/crypto/camellia/asm/cmll-x86_64.pl.intel-cet openssl-1.1.1e/crypto/camellia/asm/cmll-x86_64.pl
|
||||||
|
--- openssl-1.1.1e/crypto/camellia/asm/cmll-x86_64.pl.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/camellia/asm/cmll-x86_64.pl 2020-03-19 17:00:15.975621739 +0100
|
||||||
|
@@ -685,6 +685,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
Camellia_cbc_encrypt:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
cmp \$0,%rdx
|
||||||
|
je .Lcbc_abort
|
||||||
|
push %rbx
|
||||||
|
diff -up openssl-1.1.1e/crypto/modes/asm/ghash-x86_64.pl.intel-cet openssl-1.1.1e/crypto/modes/asm/ghash-x86_64.pl
|
||||||
|
--- openssl-1.1.1e/crypto/modes/asm/ghash-x86_64.pl.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/modes/asm/ghash-x86_64.pl 2020-03-19 17:00:15.975621739 +0100
|
||||||
|
@@ -239,6 +239,7 @@ $code=<<___;
|
||||||
|
.align 16
|
||||||
|
gcm_gmult_4bit:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
push %rbx
|
||||||
|
.cfi_push %rbx
|
||||||
|
push %rbp # %rbp and others are pushed exclusively in
|
||||||
|
@@ -286,6 +287,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
gcm_ghash_4bit:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
push %rbx
|
||||||
|
.cfi_push %rbx
|
||||||
|
push %rbp
|
||||||
|
@@ -612,6 +614,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
gcm_gmult_clmul:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
.L_gmult_clmul:
|
||||||
|
movdqu ($Xip),$Xi
|
||||||
|
movdqa .Lbswap_mask(%rip),$T3
|
||||||
|
@@ -663,6 +666,7 @@ $code.=<<___;
|
||||||
|
.align 32
|
||||||
|
gcm_ghash_clmul:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
.L_ghash_clmul:
|
||||||
|
___
|
||||||
|
$code.=<<___ if ($win64);
|
||||||
|
@@ -1166,6 +1170,7 @@ $code.=<<___;
|
||||||
|
.align 32
|
||||||
|
gcm_gmult_avx:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
jmp .L_gmult_clmul
|
||||||
|
.cfi_endproc
|
||||||
|
.size gcm_gmult_avx,.-gcm_gmult_avx
|
||||||
|
@@ -1177,6 +1182,7 @@ $code.=<<___;
|
||||||
|
.align 32
|
||||||
|
gcm_ghash_avx:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
___
|
||||||
|
if ($avx) {
|
||||||
|
my ($Xip,$Htbl,$inp,$len)=@_4args;
|
||||||
|
diff -up openssl-1.1.1e/crypto/perlasm/cbc.pl.intel-cet openssl-1.1.1e/crypto/perlasm/cbc.pl
|
||||||
|
--- openssl-1.1.1e/crypto/perlasm/cbc.pl.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/perlasm/cbc.pl 2020-03-19 17:00:15.976621722 +0100
|
||||||
|
@@ -165,21 +165,28 @@ sub cbc
|
||||||
|
&jmp_ptr($count);
|
||||||
|
|
||||||
|
&set_label("ej7");
|
||||||
|
+ &endbranch()
|
||||||
|
&movb(&HB("edx"), &BP(6,$in,"",0));
|
||||||
|
&shl("edx",8);
|
||||||
|
&set_label("ej6");
|
||||||
|
+ &endbranch()
|
||||||
|
&movb(&HB("edx"), &BP(5,$in,"",0));
|
||||||
|
&set_label("ej5");
|
||||||
|
+ &endbranch()
|
||||||
|
&movb(&LB("edx"), &BP(4,$in,"",0));
|
||||||
|
&set_label("ej4");
|
||||||
|
+ &endbranch()
|
||||||
|
&mov("ecx", &DWP(0,$in,"",0));
|
||||||
|
&jmp(&label("ejend"));
|
||||||
|
&set_label("ej3");
|
||||||
|
+ &endbranch()
|
||||||
|
&movb(&HB("ecx"), &BP(2,$in,"",0));
|
||||||
|
&shl("ecx",8);
|
||||||
|
&set_label("ej2");
|
||||||
|
+ &endbranch()
|
||||||
|
&movb(&HB("ecx"), &BP(1,$in,"",0));
|
||||||
|
&set_label("ej1");
|
||||||
|
+ &endbranch()
|
||||||
|
&movb(&LB("ecx"), &BP(0,$in,"",0));
|
||||||
|
&set_label("ejend");
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1e/crypto/perlasm/x86_64-xlate.pl.intel-cet openssl-1.1.1e/crypto/perlasm/x86_64-xlate.pl
|
||||||
|
--- openssl-1.1.1e/crypto/perlasm/x86_64-xlate.pl.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/perlasm/x86_64-xlate.pl 2020-03-19 17:00:15.984621582 +0100
|
||||||
|
@@ -101,6 +101,33 @@ elsif (!$gas)
|
||||||
|
$decor="\$L\$";
|
||||||
|
}
|
||||||
|
|
||||||
|
+my $cet_property;
|
||||||
|
+if ($flavour =~ /elf/) {
|
||||||
|
+ # Always generate .note.gnu.property section for ELF outputs to
|
||||||
|
+ # mark Intel CET support since all input files must be marked
|
||||||
|
+ # with Intel CET support in order for linker to mark output with
|
||||||
|
+ # Intel CET support.
|
||||||
|
+ my $p2align=3; $p2align=2 if ($flavour eq "elf32");
|
||||||
|
+ $cet_property = <<_____;
|
||||||
|
+ .section ".note.gnu.property", "a"
|
||||||
|
+ .p2align $p2align
|
||||||
|
+ .long 1f - 0f
|
||||||
|
+ .long 4f - 1f
|
||||||
|
+ .long 5
|
||||||
|
+0:
|
||||||
|
+ .asciz "GNU"
|
||||||
|
+1:
|
||||||
|
+ .p2align $p2align
|
||||||
|
+ .long 0xc0000002
|
||||||
|
+ .long 3f - 2f
|
||||||
|
+2:
|
||||||
|
+ .long 3
|
||||||
|
+3:
|
||||||
|
+ .p2align $p2align
|
||||||
|
+4:
|
||||||
|
+_____
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
my $current_segment;
|
||||||
|
my $current_function;
|
||||||
|
my %globals;
|
||||||
|
@@ -1213,6 +1240,7 @@ while(defined(my $line=<>)) {
|
||||||
|
print $line,"\n";
|
||||||
|
}
|
||||||
|
|
||||||
|
+print "$cet_property" if ($cet_property);
|
||||||
|
print "\n$current_segment\tENDS\n" if ($current_segment && $masm);
|
||||||
|
print "END\n" if ($masm);
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1e/crypto/perlasm/x86gas.pl.intel-cet openssl-1.1.1e/crypto/perlasm/x86gas.pl
|
||||||
|
--- openssl-1.1.1e/crypto/perlasm/x86gas.pl.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/perlasm/x86gas.pl 2020-03-19 17:00:15.985621565 +0100
|
||||||
|
@@ -124,6 +124,7 @@ sub ::function_begin_B
|
||||||
|
push(@out,".align\t$align\n");
|
||||||
|
push(@out,"$func:\n");
|
||||||
|
push(@out,"$begin:\n") if ($global);
|
||||||
|
+ &::endbranch();
|
||||||
|
$::stack=4;
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -172,6 +173,26 @@ sub ::file_end
|
||||||
|
else { push (@out,"$tmp\n"); }
|
||||||
|
}
|
||||||
|
push(@out,$initseg) if ($initseg);
|
||||||
|
+ if ($::elf) {
|
||||||
|
+ push(@out,"
|
||||||
|
+ .section \".note.gnu.property\", \"a\"
|
||||||
|
+ .p2align 2
|
||||||
|
+ .long 1f - 0f
|
||||||
|
+ .long 4f - 1f
|
||||||
|
+ .long 5
|
||||||
|
+0:
|
||||||
|
+ .asciz \"GNU\"
|
||||||
|
+1:
|
||||||
|
+ .p2align 2
|
||||||
|
+ .long 0xc0000002
|
||||||
|
+ .long 3f - 2f
|
||||||
|
+2:
|
||||||
|
+ .long 3
|
||||||
|
+3:
|
||||||
|
+ .p2align 2
|
||||||
|
+4:
|
||||||
|
+");
|
||||||
|
+ }
|
||||||
|
}
|
||||||
|
|
||||||
|
sub ::data_byte { push(@out,".byte\t".join(',',@_)."\n"); }
|
||||||
|
diff -up openssl-1.1.1e/crypto/poly1305/asm/poly1305-x86_64.pl.intel-cet openssl-1.1.1e/crypto/poly1305/asm/poly1305-x86_64.pl
|
||||||
|
--- openssl-1.1.1e/crypto/poly1305/asm/poly1305-x86_64.pl.intel-cet 2020-03-19 17:00:38.185234015 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/poly1305/asm/poly1305-x86_64.pl 2020-03-19 17:05:46.575850341 +0100
|
||||||
|
@@ -2806,6 +2806,7 @@ $code.=<<___;
|
||||||
|
.align 32
|
||||||
|
poly1305_blocks_vpmadd52:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
shr \$4,$len
|
||||||
|
jz .Lno_data_vpmadd52 # too short
|
||||||
|
|
||||||
|
@@ -3739,6 +3740,7 @@ $code.=<<___;
|
||||||
|
.align 32
|
||||||
|
poly1305_emit_base2_44:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
mov 0($ctx),%r8 # load hash value
|
||||||
|
mov 8($ctx),%r9
|
||||||
|
mov 16($ctx),%r10
|
||||||
|
diff -up openssl-1.1.1e/crypto/rc4/asm/rc4-x86_64.pl.intel-cet openssl-1.1.1e/crypto/rc4/asm/rc4-x86_64.pl
|
||||||
|
--- openssl-1.1.1e/crypto/rc4/asm/rc4-x86_64.pl.intel-cet 2020-03-19 17:00:38.190233928 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/rc4/asm/rc4-x86_64.pl 2020-03-19 17:05:02.598618064 +0100
|
||||||
|
@@ -140,6 +140,7 @@ $code=<<___;
|
||||||
|
.align 16
|
||||||
|
RC4:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
or $len,$len
|
||||||
|
jne .Lentry
|
||||||
|
ret
|
||||||
|
@@ -455,6 +456,7 @@ $code.=<<___;
|
||||||
|
.align 16
|
||||||
|
RC4_set_key:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
lea 8($dat),$dat
|
||||||
|
lea ($inp,$len),$inp
|
||||||
|
neg $len
|
||||||
|
@@ -529,6 +531,7 @@ RC4_set_key:
|
||||||
|
.align 16
|
||||||
|
RC4_options:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
lea .Lopts(%rip),%rax
|
||||||
|
mov OPENSSL_ia32cap_P(%rip),%edx
|
||||||
|
bt \$20,%edx
|
||||||
|
diff -up openssl-1.1.1e/crypto/x86_64cpuid.pl.intel-cet openssl-1.1.1e/crypto/x86_64cpuid.pl
|
||||||
|
--- openssl-1.1.1e/crypto/x86_64cpuid.pl.intel-cet 2020-03-17 15:31:17.000000000 +0100
|
||||||
|
+++ openssl-1.1.1e/crypto/x86_64cpuid.pl 2020-03-19 17:03:58.172742775 +0100
|
||||||
|
@@ -40,6 +40,7 @@ print<<___;
|
||||||
|
.align 16
|
||||||
|
OPENSSL_atomic_add:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
movl ($arg1),%eax
|
||||||
|
.Lspin: leaq ($arg2,%rax),%r8
|
||||||
|
.byte 0xf0 # lock
|
||||||
|
@@ -56,6 +57,7 @@ OPENSSL_atomic_add:
|
||||||
|
.align 16
|
||||||
|
OPENSSL_rdtsc:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
rdtsc
|
||||||
|
shl \$32,%rdx
|
||||||
|
or %rdx,%rax
|
||||||
|
@@ -68,6 +70,7 @@ OPENSSL_rdtsc:
|
||||||
|
.align 16
|
||||||
|
OPENSSL_ia32_cpuid:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
mov %rbx,%r8 # save %rbx
|
||||||
|
.cfi_register %rbx,%r8
|
||||||
|
|
||||||
|
@@ -237,6 +240,7 @@ OPENSSL_ia32_cpuid:
|
||||||
|
.align 16
|
||||||
|
OPENSSL_cleanse:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
xor %rax,%rax
|
||||||
|
cmp \$15,$arg2
|
||||||
|
jae .Lot
|
||||||
|
@@ -274,6 +278,7 @@ OPENSSL_cleanse:
|
||||||
|
.align 16
|
||||||
|
CRYPTO_memcmp:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
xor %rax,%rax
|
||||||
|
xor %r10,%r10
|
||||||
|
cmp \$0,$arg3
|
||||||
|
@@ -312,6 +317,7 @@ print<<___ if (!$win64);
|
||||||
|
.align 16
|
||||||
|
OPENSSL_wipe_cpu:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
pxor %xmm0,%xmm0
|
||||||
|
pxor %xmm1,%xmm1
|
||||||
|
pxor %xmm2,%xmm2
|
||||||
|
@@ -346,6 +352,8 @@ print<<___ if ($win64);
|
||||||
|
.type OPENSSL_wipe_cpu,\@abi-omnipotent
|
||||||
|
.align 16
|
||||||
|
OPENSSL_wipe_cpu:
|
||||||
|
+.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
pxor %xmm0,%xmm0
|
||||||
|
pxor %xmm1,%xmm1
|
||||||
|
pxor %xmm2,%xmm2
|
||||||
|
@@ -376,6 +384,7 @@ print<<___;
|
||||||
|
.align 16
|
||||||
|
OPENSSL_instrument_bus:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
mov $arg1,$out # tribute to Win64
|
||||||
|
mov $arg2,$cnt
|
||||||
|
mov $arg2,$max
|
||||||
|
@@ -410,6 +419,7 @@ OPENSSL_instrument_bus:
|
||||||
|
.align 16
|
||||||
|
OPENSSL_instrument_bus2:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
mov $arg1,$out # tribute to Win64
|
||||||
|
mov $arg2,$cnt
|
||||||
|
mov $arg3,$max
|
||||||
|
@@ -465,6 +475,7 @@ print<<___;
|
||||||
|
.align 16
|
||||||
|
OPENSSL_ia32_${rdop}_bytes:
|
||||||
|
.cfi_startproc
|
||||||
|
+ endbranch
|
||||||
|
xor %rax, %rax # return value
|
||||||
|
cmp \$0,$arg2
|
||||||
|
je .Ldone_${rdop}_bytes
|
170
openssl-1.1.1-kdf-selftest.patch
Normal file
170
openssl-1.1.1-kdf-selftest.patch
Normal file
@ -0,0 +1,170 @@
|
|||||||
|
diff -up openssl-1.1.1g/crypto/fips/build.info.kdf-selftest openssl-1.1.1g/crypto/fips/build.info
|
||||||
|
--- openssl-1.1.1g/crypto/fips/build.info.kdf-selftest 2020-06-03 16:08:36.274849058 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/build.info 2020-06-03 16:11:05.609079372 +0200
|
||||||
|
@@ -5,7 +5,7 @@ SOURCE[../../libcrypto]=\
|
||||||
|
fips_post.c fips_drbg_ctr.c fips_drbg_hash.c fips_drbg_hmac.c \
|
||||||
|
fips_drbg_lib.c fips_drbg_rand.c fips_drbg_selftest.c fips_rand_lib.c \
|
||||||
|
fips_cmac_selftest.c fips_ecdh_selftest.c fips_ecdsa_selftest.c \
|
||||||
|
- fips_dh_selftest.c fips_ers.c
|
||||||
|
+ fips_dh_selftest.c fips_kdf_selftest.c fips_ers.c
|
||||||
|
|
||||||
|
PROGRAMS_NO_INST=\
|
||||||
|
fips_standalone_hmac
|
||||||
|
diff -up openssl-1.1.1g/crypto/fips/fips_kdf_selftest.c.kdf-selftest openssl-1.1.1g/crypto/fips/fips_kdf_selftest.c
|
||||||
|
--- openssl-1.1.1g/crypto/fips/fips_kdf_selftest.c.kdf-selftest 2020-06-03 16:08:36.337849577 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/fips_kdf_selftest.c 2020-06-03 16:08:36.337849577 +0200
|
||||||
|
@@ -0,0 +1,117 @@
|
||||||
|
+/*
|
||||||
|
+ * Copyright 2018-2019 The OpenSSL Project Authors. All Rights Reserved.
|
||||||
|
+ * Copyright (c) 2018-2019, Oracle and/or its affiliates. All rights reserved.
|
||||||
|
+ *
|
||||||
|
+ * Licensed under the Apache License 2.0 (the "License"). You may not use
|
||||||
|
+ * this file except in compliance with the License. You can obtain a copy
|
||||||
|
+ * in the file LICENSE in the source distribution or at
|
||||||
|
+ * https://www.openssl.org/source/license.html
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
+#include <string.h>
|
||||||
|
+#include <openssl/err.h>
|
||||||
|
+#include <openssl/fips.h>
|
||||||
|
+#include "crypto/fips.h"
|
||||||
|
+
|
||||||
|
+#include <openssl/evp.h>
|
||||||
|
+#include <openssl/kdf.h>
|
||||||
|
+
|
||||||
|
+#ifdef OPENSSL_FIPS
|
||||||
|
+int FIPS_selftest_pbkdf2(void)
|
||||||
|
+{
|
||||||
|
+ int ret = 0;
|
||||||
|
+ EVP_KDF_CTX *kctx;
|
||||||
|
+ unsigned char out[32];
|
||||||
|
+
|
||||||
|
+ if ((kctx = EVP_KDF_CTX_new_id(EVP_KDF_PBKDF2)) == NULL) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_PASS, "password", (size_t)8) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SALT, "salt", (size_t)4) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_ITER, 2) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_MD, EVP_sha256()) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_derive(kctx, out, sizeof(out)) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ {
|
||||||
|
+ const unsigned char expected[sizeof(out)] = {
|
||||||
|
+ 0xae, 0x4d, 0x0c, 0x95, 0xaf, 0x6b, 0x46, 0xd3,
|
||||||
|
+ 0x2d, 0x0a, 0xdf, 0xf9, 0x28, 0xf0, 0x6d, 0xd0,
|
||||||
|
+ 0x2a, 0x30, 0x3f, 0x8e, 0xf3, 0xc2, 0x51, 0xdf,
|
||||||
|
+ 0xd6, 0xe2, 0xd8, 0x5a, 0x95, 0x47, 0x4c, 0x43
|
||||||
|
+ };
|
||||||
|
+ if (memcmp(out, expected, sizeof(expected))) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ }
|
||||||
|
+ ret = 1;
|
||||||
|
+
|
||||||
|
+err:
|
||||||
|
+ if (!ret)
|
||||||
|
+ FIPSerr(FIPS_F_FIPS_SELFTEST_PBKDF2, FIPS_R_SELFTEST_FAILED);
|
||||||
|
+ EVP_KDF_CTX_free(kctx);
|
||||||
|
+ return ret;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+/* Test vector from RFC 8009 (AES Encryption with HMAC-SHA2 for Kerberos
|
||||||
|
+ * 5) appendix A. */
|
||||||
|
+int FIPS_selftest_kbkdf(void)
|
||||||
|
+{
|
||||||
|
+ int ret = 0;
|
||||||
|
+ EVP_KDF_CTX *kctx;
|
||||||
|
+ char *label = "prf", *prf_input = "test";
|
||||||
|
+ static unsigned char input_key[] = {
|
||||||
|
+ 0x37, 0x05, 0xD9, 0x60, 0x80, 0xC1, 0x77, 0x28,
|
||||||
|
+ 0xA0, 0xE8, 0x00, 0xEA, 0xB6, 0xE0, 0xD2, 0x3C,
|
||||||
|
+ };
|
||||||
|
+ static unsigned char output[] = {
|
||||||
|
+ 0x9D, 0x18, 0x86, 0x16, 0xF6, 0x38, 0x52, 0xFE,
|
||||||
|
+ 0x86, 0x91, 0x5B, 0xB8, 0x40, 0xB4, 0xA8, 0x86,
|
||||||
|
+ 0xFF, 0x3E, 0x6B, 0xB0, 0xF8, 0x19, 0xB4, 0x9B,
|
||||||
|
+ 0x89, 0x33, 0x93, 0xD3, 0x93, 0x85, 0x42, 0x95,
|
||||||
|
+ };
|
||||||
|
+ unsigned char result[sizeof(output)] = { 0 };
|
||||||
|
+
|
||||||
|
+ if ((kctx = EVP_KDF_CTX_new_id(EVP_KDF_KB)) == NULL) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_MAC_TYPE, EVP_KDF_KB_MAC_TYPE_HMAC) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_MD, EVP_sha256()) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KEY, input_key, sizeof(input_key)) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_SALT, label, strlen(label)) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ if (EVP_KDF_ctrl(kctx, EVP_KDF_CTRL_SET_KB_INFO, prf_input, strlen(prf_input)) <= 0) {
|
||||||
|
+ goto err;
|
||||||
|
+ }
|
||||||
|
+ ret = EVP_KDF_derive(kctx, result, sizeof(result)) > 0
|
||||||
|
+ && memcmp(result, output, sizeof(output)) == 0;
|
||||||
|
+err:
|
||||||
|
+
|
||||||
|
+ if (!ret)
|
||||||
|
+ FIPSerr(FIPS_F_FIPS_SELFTEST_KBKDF, FIPS_R_SELFTEST_FAILED);
|
||||||
|
+ EVP_KDF_CTX_free(kctx);
|
||||||
|
+ return ret;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+int FIPS_selftest_kdf(void)
|
||||||
|
+{
|
||||||
|
+ return FIPS_selftest_pbkdf2() && FIPS_selftest_kbkdf();
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+#endif
|
||||||
|
diff -up openssl-1.1.1g/crypto/fips/fips_post.c.kdf-selftest openssl-1.1.1g/crypto/fips/fips_post.c
|
||||||
|
--- openssl-1.1.1g/crypto/fips/fips_post.c.kdf-selftest 2020-06-03 16:08:36.332849536 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/fips_post.c 2020-06-03 16:08:36.338849585 +0200
|
||||||
|
@@ -111,6 +111,8 @@ int FIPS_selftest(void)
|
||||||
|
rv = 0;
|
||||||
|
if (!FIPS_selftest_ecdh())
|
||||||
|
rv = 0;
|
||||||
|
+ if (!FIPS_selftest_kdf())
|
||||||
|
+ rv = 0;
|
||||||
|
return rv;
|
||||||
|
}
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1g/include/crypto/fips.h.kdf-selftest openssl-1.1.1g/include/crypto/fips.h
|
||||||
|
--- openssl-1.1.1g/include/crypto/fips.h.kdf-selftest 2020-06-03 16:08:36.330849519 +0200
|
||||||
|
+++ openssl-1.1.1g/include/crypto/fips.h 2020-06-03 16:08:36.338849585 +0200
|
||||||
|
@@ -72,6 +72,9 @@ void FIPS_drbg_stick(int onoff);
|
||||||
|
int FIPS_selftest_hmac(void);
|
||||||
|
int FIPS_selftest_drbg(void);
|
||||||
|
int FIPS_selftest_cmac(void);
|
||||||
|
+int FIPS_selftest_kbkdf(void);
|
||||||
|
+int FIPS_selftest_pbkdf2(void);
|
||||||
|
+int FIPS_selftest_kdf(void);
|
||||||
|
|
||||||
|
int fips_in_post(void);
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1g/include/openssl/fips.h.kdf-selftest openssl-1.1.1g/include/openssl/fips.h
|
||||||
|
--- openssl-1.1.1g/include/openssl/fips.h.kdf-selftest 2020-06-03 16:08:36.282849124 +0200
|
||||||
|
+++ openssl-1.1.1g/include/openssl/fips.h 2020-06-03 16:08:36.338849585 +0200
|
||||||
|
@@ -123,6 +123,8 @@ extern "C" {
|
||||||
|
# define FIPS_F_FIPS_SELFTEST_DSA 112
|
||||||
|
# define FIPS_F_FIPS_SELFTEST_ECDSA 133
|
||||||
|
# define FIPS_F_FIPS_SELFTEST_HMAC 113
|
||||||
|
+# define FIPS_F_FIPS_SELFTEST_KBKDF 151
|
||||||
|
+# define FIPS_F_FIPS_SELFTEST_PBKDF2 152
|
||||||
|
# define FIPS_F_FIPS_SELFTEST_SHA1 115
|
||||||
|
# define FIPS_F_FIPS_SELFTEST_SHA2 105
|
||||||
|
# define FIPS_F_OSSL_ECDSA_SIGN_SIG 143
|
3030
openssl-1.1.1-krb5-kdf.patch
Normal file
3030
openssl-1.1.1-krb5-kdf.patch
Normal file
File diff suppressed because it is too large
Load Diff
19
openssl-1.1.1-man-rename.patch
Normal file
19
openssl-1.1.1-man-rename.patch
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
diff -up openssl-1.1.1-pre9/doc/man1/openssl.pod.man-rename openssl-1.1.1-pre9/doc/man1/openssl.pod
|
||||||
|
--- openssl-1.1.1-pre9/doc/man1/openssl.pod.man-rename 2018-08-21 14:14:13.000000000 +0200
|
||||||
|
+++ openssl-1.1.1-pre9/doc/man1/openssl.pod 2018-08-22 12:13:04.092568064 +0200
|
||||||
|
@@ -482,13 +482,13 @@ L<dhparam(1)>, L<dsa(1)>, L<dsaparam(1)>
|
||||||
|
L<ec(1)>, L<ecparam(1)>,
|
||||||
|
L<enc(1)>, L<engine(1)>, L<errstr(1)>, L<gendsa(1)>, L<genpkey(1)>,
|
||||||
|
L<genrsa(1)>, L<nseq(1)>, L<ocsp(1)>,
|
||||||
|
-L<passwd(1)>,
|
||||||
|
L<pkcs12(1)>, L<pkcs7(1)>, L<pkcs8(1)>,
|
||||||
|
L<pkey(1)>, L<pkeyparam(1)>, L<pkeyutl(1)>, L<prime(1)>,
|
||||||
|
-L<rand(1)>, L<rehash(1)>, L<req(1)>, L<rsa(1)>,
|
||||||
|
+L<rehash(1)>, L<req(1)>, L<rsa(1)>,
|
||||||
|
L<rsautl(1)>, L<s_client(1)>,
|
||||||
|
L<s_server(1)>, L<s_time(1)>, L<sess_id(1)>,
|
||||||
|
L<smime(1)>, L<speed(1)>, L<spkac(1)>, L<srp(1)>, L<storeutl(1)>,
|
||||||
|
+L<sslpasswd(1)>, L<sslrand(1)>,
|
||||||
|
L<ts(1)>,
|
||||||
|
L<verify(1)>, L<version(1)>, L<x509(1)>,
|
||||||
|
L<crypto(7)>, L<ssl(7)>, L<x509v3_config(5)>
|
112
openssl-1.1.1-no-brainpool.patch
Normal file
112
openssl-1.1.1-no-brainpool.patch
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
diff -up openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in.no-brainpool openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in
|
||||||
|
--- openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in.no-brainpool 2019-09-10 15:13:07.000000000 +0200
|
||||||
|
+++ openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in 2019-09-13 15:11:07.358687169 +0200
|
||||||
|
@@ -147,22 +147,22 @@ our @tests = (
|
||||||
|
{
|
||||||
|
name => "ECDSA with brainpool",
|
||||||
|
server => {
|
||||||
|
- "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
|
||||||
|
- "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
|
||||||
|
- "Groups" => "brainpoolP256r1",
|
||||||
|
+ "Certificate" => test_pem("server-ecdsa-cert.pem"),
|
||||||
|
+ "PrivateKey" => test_pem("server-ecdsa-key.pem"),
|
||||||
|
+# "Groups" => "brainpoolP256r1",
|
||||||
|
},
|
||||||
|
client => {
|
||||||
|
#We don't restrict this to TLSv1.2, although use of brainpool
|
||||||
|
#should force this anyway so that this should succeed
|
||||||
|
"CipherString" => "aECDSA",
|
||||||
|
"RequestCAFile" => test_pem("root-cert.pem"),
|
||||||
|
- "Groups" => "brainpoolP256r1",
|
||||||
|
+# "Groups" => "brainpoolP256r1",
|
||||||
|
},
|
||||||
|
test => {
|
||||||
|
- "ExpectedServerCertType" =>, "brainpoolP256r1",
|
||||||
|
- "ExpectedServerSignType" =>, "EC",
|
||||||
|
+# "ExpectedServerCertType" =>, "brainpoolP256r1",
|
||||||
|
+# "ExpectedServerSignType" =>, "EC",
|
||||||
|
# Note: certificate_authorities not sent for TLS < 1.3
|
||||||
|
- "ExpectedServerCANames" =>, "empty",
|
||||||
|
+# "ExpectedServerCANames" =>, "empty",
|
||||||
|
"ExpectedResult" => "Success"
|
||||||
|
},
|
||||||
|
},
|
||||||
|
@@ -853,18 +853,18 @@ my @tests_tls_1_3 = (
|
||||||
|
{
|
||||||
|
name => "TLS 1.3 ECDSA with brainpool",
|
||||||
|
server => {
|
||||||
|
- "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
|
||||||
|
- "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
|
||||||
|
- "Groups" => "brainpoolP256r1",
|
||||||
|
+ "Certificate" => test_pem("server-ecdsa-cert.pem"),
|
||||||
|
+ "PrivateKey" => test_pem("server-ecdsa-key.pem"),
|
||||||
|
+# "Groups" => "brainpoolP256r1",
|
||||||
|
},
|
||||||
|
client => {
|
||||||
|
"RequestCAFile" => test_pem("root-cert.pem"),
|
||||||
|
- "Groups" => "brainpoolP256r1",
|
||||||
|
+# "Groups" => "brainpoolP256r1",
|
||||||
|
"MinProtocol" => "TLSv1.3",
|
||||||
|
"MaxProtocol" => "TLSv1.3"
|
||||||
|
},
|
||||||
|
test => {
|
||||||
|
- "ExpectedResult" => "ServerFail"
|
||||||
|
+ "ExpectedResult" => "Success"
|
||||||
|
},
|
||||||
|
},
|
||||||
|
);
|
||||||
|
diff -up openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.no-brainpool openssl-1.1.1d/test/ssl-tests/20-cert-select.conf
|
||||||
|
--- openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.no-brainpool 2019-09-10 15:13:07.000000000 +0200
|
||||||
|
+++ openssl-1.1.1d/test/ssl-tests/20-cert-select.conf 2019-09-13 15:12:27.380288469 +0200
|
||||||
|
@@ -238,23 +238,18 @@ server = 5-ECDSA with brainpool-server
|
||||||
|
client = 5-ECDSA with brainpool-client
|
||||||
|
|
||||||
|
[5-ECDSA with brainpool-server]
|
||||||
|
-Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-cert.pem
|
||||||
|
+Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
|
||||||
|
CipherString = DEFAULT
|
||||||
|
-Groups = brainpoolP256r1
|
||||||
|
-PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-key.pem
|
||||||
|
+PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
|
||||||
|
|
||||||
|
[5-ECDSA with brainpool-client]
|
||||||
|
CipherString = aECDSA
|
||||||
|
-Groups = brainpoolP256r1
|
||||||
|
RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
|
VerifyMode = Peer
|
||||||
|
|
||||||
|
[test-5]
|
||||||
|
ExpectedResult = Success
|
||||||
|
-ExpectedServerCANames = empty
|
||||||
|
-ExpectedServerCertType = brainpoolP256r1
|
||||||
|
-ExpectedServerSignType = EC
|
||||||
|
|
||||||
|
|
||||||
|
# ===========================================================
|
||||||
|
@@ -1713,14 +1708,12 @@ server = 52-TLS 1.3 ECDSA with brainpool
|
||||||
|
client = 52-TLS 1.3 ECDSA with brainpool-client
|
||||||
|
|
||||||
|
[52-TLS 1.3 ECDSA with brainpool-server]
|
||||||
|
-Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-cert.pem
|
||||||
|
+Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
|
||||||
|
CipherString = DEFAULT
|
||||||
|
-Groups = brainpoolP256r1
|
||||||
|
-PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-key.pem
|
||||||
|
+PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
|
||||||
|
|
||||||
|
[52-TLS 1.3 ECDSA with brainpool-client]
|
||||||
|
CipherString = DEFAULT
|
||||||
|
-Groups = brainpoolP256r1
|
||||||
|
MaxProtocol = TLSv1.3
|
||||||
|
MinProtocol = TLSv1.3
|
||||||
|
RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
|
@@ -1728,7 +1721,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/ro
|
||||||
|
VerifyMode = Peer
|
||||||
|
|
||||||
|
[test-52]
|
||||||
|
-ExpectedResult = ServerFail
|
||||||
|
+ExpectedResult = Success
|
||||||
|
|
||||||
|
|
||||||
|
# ===========================================================
|
12
openssl-1.1.1-no-html.patch
Normal file
12
openssl-1.1.1-no-html.patch
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
diff -up openssl-1.1.1f/Configurations/unix-Makefile.tmpl.no-html openssl-1.1.1f/Configurations/unix-Makefile.tmpl
|
||||||
|
--- openssl-1.1.1f/Configurations/unix-Makefile.tmpl.no-html 2020-04-07 16:45:21.904083989 +0200
|
||||||
|
+++ openssl-1.1.1f/Configurations/unix-Makefile.tmpl 2020-04-07 16:45:56.218461895 +0200
|
||||||
|
@@ -544,7 +544,7 @@ install_sw: install_dev install_engines
|
||||||
|
|
||||||
|
uninstall_sw: uninstall_runtime uninstall_engines uninstall_dev
|
||||||
|
|
||||||
|
-install_docs: install_man_docs install_html_docs
|
||||||
|
+install_docs: install_man_docs
|
||||||
|
|
||||||
|
uninstall_docs: uninstall_man_docs uninstall_html_docs
|
||||||
|
$(RM) -r "$(DESTDIR)$(DOCDIR)"
|
26
openssl-1.1.1-no-weak-verify.patch
Normal file
26
openssl-1.1.1-no-weak-verify.patch
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
diff -up openssl-1.1.1b/crypto/asn1/a_verify.c.no-weak-verify openssl-1.1.1b/crypto/asn1/a_verify.c
|
||||||
|
--- openssl-1.1.1b/crypto/asn1/a_verify.c.no-weak-verify 2019-02-26 15:15:30.000000000 +0100
|
||||||
|
+++ openssl-1.1.1b/crypto/asn1/a_verify.c 2019-02-28 11:25:31.531862873 +0100
|
||||||
|
@@ -7,6 +7,9 @@
|
||||||
|
* https://www.openssl.org/source/license.html
|
||||||
|
*/
|
||||||
|
|
||||||
|
+/* for secure_getenv */
|
||||||
|
+#define _GNU_SOURCE
|
||||||
|
+
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <time.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
@@ -130,6 +133,12 @@ int ASN1_item_verify(const ASN1_ITEM *it
|
||||||
|
if (ret != 2)
|
||||||
|
goto err;
|
||||||
|
ret = -1;
|
||||||
|
+ } else if ((mdnid == NID_md5
|
||||||
|
+ && secure_getenv("OPENSSL_ENABLE_MD5_VERIFY") == NULL) ||
|
||||||
|
+ mdnid == NID_md4 || mdnid == NID_md2 || mdnid == NID_sha) {
|
||||||
|
+ ASN1err(ASN1_F_ASN1_ITEM_VERIFY,
|
||||||
|
+ ASN1_R_UNKNOWN_MESSAGE_DIGEST_ALGORITHM);
|
||||||
|
+ goto err;
|
||||||
|
} else {
|
||||||
|
const EVP_MD *type = EVP_get_digestbynid(mdnid);
|
||||||
|
|
170
openssl-1.1.1-rewire-fips-drbg.patch
Normal file
170
openssl-1.1.1-rewire-fips-drbg.patch
Normal file
@ -0,0 +1,170 @@
|
|||||||
|
diff -up openssl-1.1.1g/crypto/fips/fips_drbg_lib.c.rewire-fips-drbg openssl-1.1.1g/crypto/fips/fips_drbg_lib.c
|
||||||
|
--- openssl-1.1.1g/crypto/fips/fips_drbg_lib.c.rewire-fips-drbg 2020-06-22 13:32:47.611852927 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/fips_drbg_lib.c 2020-06-22 13:32:47.675852917 +0200
|
||||||
|
@@ -337,6 +337,19 @@ static int drbg_reseed(DRBG_CTX *dctx,
|
||||||
|
int FIPS_drbg_reseed(DRBG_CTX *dctx,
|
||||||
|
const unsigned char *adin, size_t adinlen)
|
||||||
|
{
|
||||||
|
+ int len = (int)adinlen;
|
||||||
|
+
|
||||||
|
+ if (len < 0 || (size_t)len != adinlen) {
|
||||||
|
+ FIPSerr(FIPS_F_DRBG_RESEED, FIPS_R_ADDITIONAL_INPUT_TOO_LONG);
|
||||||
|
+ return 0;
|
||||||
|
+ }
|
||||||
|
+ RAND_seed(adin, len);
|
||||||
|
+ return 1;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+int FIPS_drbg_reseed_internal(DRBG_CTX *dctx,
|
||||||
|
+ const unsigned char *adin, size_t adinlen)
|
||||||
|
+{
|
||||||
|
return drbg_reseed(dctx, adin, adinlen, 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
@@ -358,6 +371,19 @@ int FIPS_drbg_generate(DRBG_CTX *dctx, u
|
||||||
|
int prediction_resistance,
|
||||||
|
const unsigned char *adin, size_t adinlen)
|
||||||
|
{
|
||||||
|
+ int len = (int)outlen;
|
||||||
|
+
|
||||||
|
+ if (len < 0 || (size_t)len != outlen) {
|
||||||
|
+ FIPSerr(FIPS_F_FIPS_DRBG_GENERATE, FIPS_R_REQUEST_TOO_LARGE_FOR_DRBG);
|
||||||
|
+ return 0;
|
||||||
|
+ }
|
||||||
|
+ return RAND_bytes(out, len);
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+int FIPS_drbg_generate_internal(DRBG_CTX *dctx, unsigned char *out, size_t outlen,
|
||||||
|
+ int prediction_resistance,
|
||||||
|
+ const unsigned char *adin, size_t adinlen)
|
||||||
|
+{
|
||||||
|
int r = 0;
|
||||||
|
|
||||||
|
if (FIPS_selftest_failed()) {
|
||||||
|
diff -up openssl-1.1.1g/crypto/fips/fips_drbg_rand.c.rewire-fips-drbg openssl-1.1.1g/crypto/fips/fips_drbg_rand.c
|
||||||
|
--- openssl-1.1.1g/crypto/fips/fips_drbg_rand.c.rewire-fips-drbg 2020-06-22 13:32:47.611852927 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/fips_drbg_rand.c 2020-06-22 13:32:47.675852917 +0200
|
||||||
|
@@ -57,6 +57,8 @@
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/rand.h>
|
||||||
|
#include <openssl/fips.h>
|
||||||
|
+#define FIPS_DRBG_generate FIPS_DRBG_generate_internal
|
||||||
|
+#define FIPS_DRBG_reseed FIPS_DRBG_reseed_internal
|
||||||
|
#include <openssl/fips_rand.h>
|
||||||
|
#include "fips_rand_lcl.h"
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1g/crypto/fips/fips_drbg_selftest.c.rewire-fips-drbg openssl-1.1.1g/crypto/fips/fips_drbg_selftest.c
|
||||||
|
--- openssl-1.1.1g/crypto/fips/fips_drbg_selftest.c.rewire-fips-drbg 2020-06-22 13:32:47.612852927 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/fips_drbg_selftest.c 2020-06-22 13:32:47.675852917 +0200
|
||||||
|
@@ -55,6 +55,8 @@
|
||||||
|
#include <openssl/crypto.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/fips.h>
|
||||||
|
+#define FIPS_DRBG_generate FIPS_DRBG_generate_internal
|
||||||
|
+#define FIPS_DRBG_reseed FIPS_DRBG_reseed_internal
|
||||||
|
#include <openssl/fips_rand.h>
|
||||||
|
#include "fips_rand_lcl.h"
|
||||||
|
#include "fips_locl.h"
|
||||||
|
diff -up openssl-1.1.1g/crypto/fips/fips_post.c.rewire-fips-drbg openssl-1.1.1g/crypto/fips/fips_post.c
|
||||||
|
--- openssl-1.1.1g/crypto/fips/fips_post.c.rewire-fips-drbg 2020-06-22 13:32:47.672852918 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/fips_post.c 2020-06-22 13:32:47.675852917 +0200
|
||||||
|
@@ -79,8 +79,6 @@ int FIPS_selftest(void)
|
||||||
|
ERR_add_error_data(2, "Type=", "rand_drbg_selftest");
|
||||||
|
rv = 0;
|
||||||
|
}
|
||||||
|
- if (!FIPS_selftest_drbg())
|
||||||
|
- rv = 0;
|
||||||
|
if (!FIPS_selftest_sha1())
|
||||||
|
rv = 0;
|
||||||
|
if (!FIPS_selftest_sha2())
|
||||||
|
diff -up openssl-1.1.1g/crypto/fips/fips_rand_lib.c.rewire-fips-drbg openssl-1.1.1g/crypto/fips/fips_rand_lib.c
|
||||||
|
--- openssl-1.1.1g/crypto/fips/fips_rand_lib.c.rewire-fips-drbg 2020-06-22 13:32:47.613852927 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/fips/fips_rand_lib.c 2020-06-22 13:36:28.722817967 +0200
|
||||||
|
@@ -120,6 +120,7 @@ void FIPS_rand_reset(void)
|
||||||
|
|
||||||
|
int FIPS_rand_seed(const void *buf, int num)
|
||||||
|
{
|
||||||
|
+#if 0
|
||||||
|
if (!fips_approved_rand_meth && FIPS_module_mode()) {
|
||||||
|
FIPSerr(FIPS_F_FIPS_RAND_SEED, FIPS_R_NON_FIPS_METHOD);
|
||||||
|
return 0;
|
||||||
|
@@ -127,10 +128,15 @@ int FIPS_rand_seed(const void *buf, int
|
||||||
|
if (fips_rand_meth && fips_rand_meth->seed)
|
||||||
|
fips_rand_meth->seed(buf, num);
|
||||||
|
return 1;
|
||||||
|
+#else
|
||||||
|
+ RAND_seed(buf, num);
|
||||||
|
+ return 1;
|
||||||
|
+#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
int FIPS_rand_bytes(unsigned char *buf, int num)
|
||||||
|
{
|
||||||
|
+#if 0
|
||||||
|
if (!fips_approved_rand_meth && FIPS_module_mode()) {
|
||||||
|
FIPSerr(FIPS_F_FIPS_RAND_BYTES, FIPS_R_NON_FIPS_METHOD);
|
||||||
|
return 0;
|
||||||
|
@@ -138,10 +144,14 @@ int FIPS_rand_bytes(unsigned char *buf,
|
||||||
|
if (fips_rand_meth && fips_rand_meth->bytes)
|
||||||
|
return fips_rand_meth->bytes(buf, num);
|
||||||
|
return 0;
|
||||||
|
+#else
|
||||||
|
+ return RAND_bytes(buf, num);
|
||||||
|
+#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
int FIPS_rand_status(void)
|
||||||
|
{
|
||||||
|
+#if 0
|
||||||
|
if (!fips_approved_rand_meth && FIPS_module_mode()) {
|
||||||
|
FIPSerr(FIPS_F_FIPS_RAND_STATUS, FIPS_R_NON_FIPS_METHOD);
|
||||||
|
return 0;
|
||||||
|
@@ -149,6 +159,9 @@ int FIPS_rand_status(void)
|
||||||
|
if (fips_rand_meth && fips_rand_meth->status)
|
||||||
|
return fips_rand_meth->status();
|
||||||
|
return 0;
|
||||||
|
+#else
|
||||||
|
+ return RAND_status();
|
||||||
|
+#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Return instantiated strength of PRNG. For DRBG this is an internal
|
||||||
|
diff -up openssl-1.1.1g/include/openssl/fips.h.rewire-fips-drbg openssl-1.1.1g/include/openssl/fips.h
|
||||||
|
--- openssl-1.1.1g/include/openssl/fips.h.rewire-fips-drbg 2020-06-22 13:32:47.672852918 +0200
|
||||||
|
+++ openssl-1.1.1g/include/openssl/fips.h 2020-06-22 13:32:47.675852917 +0200
|
||||||
|
@@ -64,6 +64,11 @@ extern "C" {
|
||||||
|
|
||||||
|
int FIPS_selftest(void);
|
||||||
|
int FIPS_selftest_failed(void);
|
||||||
|
+
|
||||||
|
+ /*
|
||||||
|
+ * This function is deprecated as it performs selftest of the old FIPS drbg
|
||||||
|
+ * implementation that is not validated.
|
||||||
|
+ */
|
||||||
|
int FIPS_selftest_drbg_all(void);
|
||||||
|
|
||||||
|
int FIPS_dsa_builtin_paramgen2(DSA *ret, size_t L, size_t N,
|
||||||
|
diff -up openssl-1.1.1g/include/openssl/fips_rand.h.rewire-fips-drbg openssl-1.1.1g/include/openssl/fips_rand.h
|
||||||
|
--- openssl-1.1.1g/include/openssl/fips_rand.h.rewire-fips-drbg 2020-06-22 13:32:47.617852926 +0200
|
||||||
|
+++ openssl-1.1.1g/include/openssl/fips_rand.h 2020-06-22 13:32:47.675852917 +0200
|
||||||
|
@@ -60,6 +60,20 @@
|
||||||
|
# ifdef __cplusplus
|
||||||
|
extern "C" {
|
||||||
|
# endif
|
||||||
|
+
|
||||||
|
+/*
|
||||||
|
+ * IMPORTANT NOTE:
|
||||||
|
+ * All functions in this header file are deprecated and should not be used
|
||||||
|
+ * as they use the old FIPS_drbg implementation that is not FIPS validated
|
||||||
|
+ * anymore.
|
||||||
|
+ * To provide backwards compatibility for applications that need FIPS compliant
|
||||||
|
+ * RNG number generation and use FIPS_drbg_generate, this function was
|
||||||
|
+ * re-wired to call the FIPS validated DRBG instance instead through
|
||||||
|
+ * the RAND_bytes() call.
|
||||||
|
+ *
|
||||||
|
+ * All these functions will be removed in future.
|
||||||
|
+ */
|
||||||
|
+
|
||||||
|
typedef struct drbg_ctx_st DRBG_CTX;
|
||||||
|
/* DRBG external flags */
|
||||||
|
/* Flag for CTR mode only: use derivation function ctr_df */
|
2306
openssl-1.1.1-s390x-ecc.patch
Normal file
2306
openssl-1.1.1-s390x-ecc.patch
Normal file
File diff suppressed because it is too large
Load Diff
5502
openssl-1.1.1-s390x-update.patch
Normal file
5502
openssl-1.1.1-s390x-update.patch
Normal file
File diff suppressed because it is too large
Load Diff
160
openssl-1.1.1-seclevel.patch
Normal file
160
openssl-1.1.1-seclevel.patch
Normal file
@ -0,0 +1,160 @@
|
|||||||
|
diff -up openssl-1.1.1g/crypto/x509/x509_vfy.c.seclevel openssl-1.1.1g/crypto/x509/x509_vfy.c
|
||||||
|
--- openssl-1.1.1g/crypto/x509/x509_vfy.c.seclevel 2020-04-21 14:22:39.000000000 +0200
|
||||||
|
+++ openssl-1.1.1g/crypto/x509/x509_vfy.c 2020-06-05 17:16:54.835536823 +0200
|
||||||
|
@@ -3225,6 +3225,7 @@ static int build_chain(X509_STORE_CTX *c
|
||||||
|
}
|
||||||
|
|
||||||
|
static const int minbits_table[] = { 80, 112, 128, 192, 256 };
|
||||||
|
+static const int minbits_digest_table[] = { 80, 80, 128, 192, 256 };
|
||||||
|
static const int NUM_AUTH_LEVELS = OSSL_NELEM(minbits_table);
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -3276,6 +3277,11 @@ static int check_sig_level(X509_STORE_CT
|
||||||
|
|
||||||
|
if (!X509_get_signature_info(cert, NULL, NULL, &secbits, NULL))
|
||||||
|
return 0;
|
||||||
|
-
|
||||||
|
- return secbits >= minbits_table[level - 1];
|
||||||
|
+ /*
|
||||||
|
+ * Allow SHA1 in SECLEVEL 2 in non-FIPS mode or when the magic
|
||||||
|
+ * disable SHA1 flag is not set.
|
||||||
|
+ */
|
||||||
|
+ if ((ctx->param->flags & 0x40000000) || FIPS_mode())
|
||||||
|
+ return secbits >= minbits_table[level - 1];
|
||||||
|
+ return secbits >= minbits_digest_table[level - 1];
|
||||||
|
}
|
||||||
|
diff -up openssl-1.1.1g/doc/man3/SSL_CTX_set_security_level.pod.seclevel openssl-1.1.1g/doc/man3/SSL_CTX_set_security_level.pod
|
||||||
|
--- openssl-1.1.1g/doc/man3/SSL_CTX_set_security_level.pod.seclevel 2020-04-21 14:22:39.000000000 +0200
|
||||||
|
+++ openssl-1.1.1g/doc/man3/SSL_CTX_set_security_level.pod 2020-06-04 15:48:01.608178833 +0200
|
||||||
|
@@ -81,8 +81,10 @@ using MD5 for the MAC is also prohibited
|
||||||
|
|
||||||
|
=item B<Level 2>
|
||||||
|
|
||||||
|
-Security level set to 112 bits of security. As a result RSA, DSA and DH keys
|
||||||
|
-shorter than 2048 bits and ECC keys shorter than 224 bits are prohibited.
|
||||||
|
+Security level set to 112 bits of security with the exception of SHA1 allowed
|
||||||
|
+for signatures.
|
||||||
|
+As a result RSA, DSA and DH keys shorter than 2048 bits and ECC keys
|
||||||
|
+shorter than 224 bits are prohibited.
|
||||||
|
In addition to the level 1 exclusions any cipher suite using RC4 is also
|
||||||
|
prohibited. SSL version 3 is also not allowed. Compression is disabled.
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1g/ssl/ssl_cert.c.seclevel openssl-1.1.1g/ssl/ssl_cert.c
|
||||||
|
--- openssl-1.1.1g/ssl/ssl_cert.c.seclevel 2020-04-21 14:22:39.000000000 +0200
|
||||||
|
+++ openssl-1.1.1g/ssl/ssl_cert.c 2020-06-05 17:10:11.842198401 +0200
|
||||||
|
@@ -27,6 +27,7 @@
|
||||||
|
static int ssl_security_default_callback(const SSL *s, const SSL_CTX *ctx,
|
||||||
|
int op, int bits, int nid, void *other,
|
||||||
|
void *ex);
|
||||||
|
+static unsigned long sha1_disable(const SSL *s, const SSL_CTX *ctx);
|
||||||
|
|
||||||
|
static CRYPTO_ONCE ssl_x509_store_ctx_once = CRYPTO_ONCE_STATIC_INIT;
|
||||||
|
static volatile int ssl_x509_store_ctx_idx = -1;
|
||||||
|
@@ -396,7 +397,7 @@ int ssl_verify_cert_chain(SSL *s, STACK_
|
||||||
|
X509_VERIFY_PARAM_set_auth_level(param, SSL_get_security_level(s));
|
||||||
|
|
||||||
|
/* Set suite B flags if needed */
|
||||||
|
- X509_STORE_CTX_set_flags(ctx, tls1_suiteb(s));
|
||||||
|
+ X509_STORE_CTX_set_flags(ctx, tls1_suiteb(s) | sha1_disable(s, NULL));
|
||||||
|
if (!X509_STORE_CTX_set_ex_data
|
||||||
|
(ctx, SSL_get_ex_data_X509_STORE_CTX_idx(), s)) {
|
||||||
|
goto end;
|
||||||
|
@@ -953,12 +954,33 @@ static int ssl_security_default_callback
|
||||||
|
return 0;
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
+ /* allow SHA1 in SECLEVEL 2 in non FIPS mode */
|
||||||
|
+ if (nid == NID_sha1 && minbits == 112 && !sha1_disable(s, ctx))
|
||||||
|
+ break;
|
||||||
|
if (bits < minbits)
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
+static unsigned long sha1_disable(const SSL *s, const SSL_CTX *ctx)
|
||||||
|
+{
|
||||||
|
+ unsigned long ret = 0x40000000; /* a magical internal value used by X509_VERIFY_PARAM */
|
||||||
|
+ const CERT *c;
|
||||||
|
+
|
||||||
|
+ if (FIPS_mode())
|
||||||
|
+ return ret;
|
||||||
|
+
|
||||||
|
+ if (ctx != NULL) {
|
||||||
|
+ c = ctx->cert;
|
||||||
|
+ } else {
|
||||||
|
+ c = s->cert;
|
||||||
|
+ }
|
||||||
|
+ if (tls1_cert_sigalgs_have_sha1(c))
|
||||||
|
+ return 0;
|
||||||
|
+ return ret;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
int ssl_security(const SSL *s, int op, int bits, int nid, void *other)
|
||||||
|
{
|
||||||
|
return s->cert->sec_cb(s, NULL, op, bits, nid, other, s->cert->sec_ex);
|
||||||
|
diff -up openssl-1.1.1g/ssl/ssl_local.h.seclevel openssl-1.1.1g/ssl/ssl_local.h
|
||||||
|
--- openssl-1.1.1g/ssl/ssl_local.h.seclevel 2020-06-04 15:48:01.602178783 +0200
|
||||||
|
+++ openssl-1.1.1g/ssl/ssl_local.h 2020-06-05 17:02:22.666313410 +0200
|
||||||
|
@@ -2576,6 +2576,7 @@ __owur int tls1_save_sigalgs(SSL *s, PAC
|
||||||
|
__owur int tls1_process_sigalgs(SSL *s);
|
||||||
|
__owur int tls1_set_peer_legacy_sigalg(SSL *s, const EVP_PKEY *pkey);
|
||||||
|
__owur int tls1_lookup_md(const SIGALG_LOOKUP *lu, const EVP_MD **pmd);
|
||||||
|
+int tls1_cert_sigalgs_have_sha1(const CERT *c);
|
||||||
|
__owur size_t tls12_get_psigalgs(SSL *s, int sent, const uint16_t **psigs);
|
||||||
|
# ifndef OPENSSL_NO_EC
|
||||||
|
__owur int tls_check_sigalg_curve(const SSL *s, int curve);
|
||||||
|
diff -up openssl-1.1.1g/ssl/t1_lib.c.seclevel openssl-1.1.1g/ssl/t1_lib.c
|
||||||
|
--- openssl-1.1.1g/ssl/t1_lib.c.seclevel 2020-06-04 15:48:01.654179221 +0200
|
||||||
|
+++ openssl-1.1.1g/ssl/t1_lib.c 2020-06-05 17:02:40.268459157 +0200
|
||||||
|
@@ -2145,6 +2145,36 @@ int tls1_set_sigalgs(CERT *c, const int
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
+static int tls1_sigalgs_have_sha1(const uint16_t *sigalgs, size_t sigalgslen)
|
||||||
|
+{
|
||||||
|
+ size_t i;
|
||||||
|
+
|
||||||
|
+ for (i = 0; i < sigalgslen; i++, sigalgs++) {
|
||||||
|
+ const SIGALG_LOOKUP *lu = tls1_lookup_sigalg(*sigalgs);
|
||||||
|
+
|
||||||
|
+ if (lu == NULL)
|
||||||
|
+ continue;
|
||||||
|
+ if (lu->hash == NID_sha1)
|
||||||
|
+ return 1;
|
||||||
|
+ }
|
||||||
|
+ return 0;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
+
|
||||||
|
+int tls1_cert_sigalgs_have_sha1(const CERT *c)
|
||||||
|
+{
|
||||||
|
+ if (c->client_sigalgs != NULL) {
|
||||||
|
+ if (tls1_sigalgs_have_sha1(c->client_sigalgs, c->client_sigalgslen))
|
||||||
|
+ return 1;
|
||||||
|
+ }
|
||||||
|
+ if (c->conf_sigalgs != NULL) {
|
||||||
|
+ if (tls1_sigalgs_have_sha1(c->conf_sigalgs, c->conf_sigalgslen))
|
||||||
|
+ return 1;
|
||||||
|
+ return 0;
|
||||||
|
+ }
|
||||||
|
+ return 1;
|
||||||
|
+}
|
||||||
|
+
|
||||||
|
static int tls1_check_sig_alg(SSL *s, X509 *x, int default_nid)
|
||||||
|
{
|
||||||
|
int sig_nid, use_pc_sigalgs = 0;
|
||||||
|
diff -up openssl-1.1.1g/test/recipes/25-test_verify.t.seclevel openssl-1.1.1g/test/recipes/25-test_verify.t
|
||||||
|
--- openssl-1.1.1g/test/recipes/25-test_verify.t.seclevel 2020-04-21 14:22:39.000000000 +0200
|
||||||
|
+++ openssl-1.1.1g/test/recipes/25-test_verify.t 2020-06-04 15:48:01.608178833 +0200
|
||||||
|
@@ -346,8 +346,8 @@ ok(verify("ee-pss-sha1-cert", "sslserver
|
||||||
|
ok(verify("ee-pss-sha256-cert", "sslserver", ["root-cert"], ["ca-cert"], ),
|
||||||
|
"CA with PSS signature using SHA256");
|
||||||
|
|
||||||
|
-ok(!verify("ee-pss-sha1-cert", "sslserver", ["root-cert"], ["ca-cert"], "-auth_level", "2"),
|
||||||
|
- "Reject PSS signature using SHA1 and auth level 2");
|
||||||
|
+ok(!verify("ee-pss-sha1-cert", "sslserver", ["root-cert"], ["ca-cert"], "-auth_level", "3"),
|
||||||
|
+ "Reject PSS signature using SHA1 and auth level 3");
|
||||||
|
|
||||||
|
ok(verify("ee-pss-sha256-cert", "sslserver", ["root-cert"], ["ca-cert"], "-auth_level", "2"),
|
||||||
|
"PSS signature using SHA256 and auth level 2");
|
5612
openssl-1.1.1-ssh-kdf.patch
Normal file
5612
openssl-1.1.1-ssh-kdf.patch
Normal file
File diff suppressed because it is too large
Load Diff
310
openssl-1.1.1-system-cipherlist.patch
Normal file
310
openssl-1.1.1-system-cipherlist.patch
Normal file
@ -0,0 +1,310 @@
|
|||||||
|
diff -up openssl-1.1.1c/Configurations/unix-Makefile.tmpl.system-cipherlist openssl-1.1.1c/Configurations/unix-Makefile.tmpl
|
||||||
|
--- openssl-1.1.1c/Configurations/unix-Makefile.tmpl.system-cipherlist 2019-05-29 15:42:27.951329271 +0200
|
||||||
|
+++ openssl-1.1.1c/Configurations/unix-Makefile.tmpl 2019-05-29 15:42:27.974328867 +0200
|
||||||
|
@@ -180,6 +180,10 @@ MANDIR=$(INSTALLTOP)/share/man
|
||||||
|
DOCDIR=$(INSTALLTOP)/share/doc/$(BASENAME)
|
||||||
|
HTMLDIR=$(DOCDIR)/html
|
||||||
|
|
||||||
|
+{- output_off() if $config{system_ciphers_file} eq ""; "" -}
|
||||||
|
+SYSTEM_CIPHERS_FILE_DEFINE=-DSYSTEM_CIPHERS_FILE="\"{- $config{system_ciphers_file} -}\""
|
||||||
|
+{- output_on() if $config{system_ciphers_file} eq ""; "" -}
|
||||||
|
+
|
||||||
|
# MANSUFFIX is for the benefit of anyone who may want to have a suffix
|
||||||
|
# appended after the manpage file section number. "ssl" is popular,
|
||||||
|
# resulting in files such as config.5ssl rather than config.5.
|
||||||
|
@@ -203,6 +207,7 @@ CC=$(CROSS_COMPILE){- $config{CC} -}
|
||||||
|
CXX={- $config{CXX} ? "\$(CROSS_COMPILE)$config{CXX}" : '' -}
|
||||||
|
CPPFLAGS={- our $cppflags1 = join(" ",
|
||||||
|
(map { "-D".$_} @{$config{CPPDEFINES}}),
|
||||||
|
+ "\$(SYSTEM_CIPHERS_FILE_DEFINE)",
|
||||||
|
(map { "-I".$_} @{$config{CPPINCLUDES}}),
|
||||||
|
@{$config{CPPFLAGS}}) -}
|
||||||
|
CFLAGS={- join(' ', @{$config{CFLAGS}}) -}
|
||||||
|
diff -up openssl-1.1.1c/Configure.system-cipherlist openssl-1.1.1c/Configure
|
||||||
|
--- openssl-1.1.1c/Configure.system-cipherlist 2019-05-28 15:12:21.000000000 +0200
|
||||||
|
+++ openssl-1.1.1c/Configure 2019-05-29 15:45:10.465469533 +0200
|
||||||
|
@@ -24,7 +24,7 @@ use OpenSSL::Glob;
|
||||||
|
my $orig_death_handler = $SIG{__DIE__};
|
||||||
|
$SIG{__DIE__} = \&death_handler;
|
||||||
|
|
||||||
|
-my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-egd] [sctp] [386] [--prefix=DIR] [--openssldir=OPENSSLDIR] [--with-xxx[=vvv]] [--config=FILE] os/compiler[:flags]\n";
|
||||||
|
+my $usage="Usage: Configure [no-<cipher> ...] [enable-<cipher> ...] [-Dxxx] [-lxxx] [-Lxxx] [-fxxx] [-Kxxx] [no-hw-xxx|no-hw] [[no-]threads] [[no-]shared] [[no-]zlib|zlib-dynamic] [no-asm] [no-egd] [sctp] [386] [--prefix=DIR] [--openssldir=OPENSSLDIR] [--system-ciphers-file=SYSTEMCIPHERFILE] [--with-xxx[=vvv]] [--config=FILE] os/compiler[:flags]\n";
|
||||||
|
|
||||||
|
# Options:
|
||||||
|
#
|
||||||
|
@@ -41,6 +41,9 @@ my $usage="Usage: Configure [no-<cipher>
|
||||||
|
# This becomes the value of OPENSSLDIR in Makefile and in C.
|
||||||
|
# (Default: PREFIX/ssl)
|
||||||
|
#
|
||||||
|
+# --system-ciphers-file A file to read cipher string from when the PROFILE=SYSTEM
|
||||||
|
+# cipher is specified (default).
|
||||||
|
+#
|
||||||
|
# --cross-compile-prefix Add specified prefix to binutils components.
|
||||||
|
#
|
||||||
|
# --api One of 0.9.8, 1.0.0 or 1.1.0. Do not compile support for
|
||||||
|
@@ -295,6 +298,7 @@ $config{prefix}="";
|
||||||
|
$config{openssldir}="";
|
||||||
|
$config{processor}="";
|
||||||
|
$config{libdir}="";
|
||||||
|
+$config{system_ciphers_file}="";
|
||||||
|
my $auto_threads=1; # enable threads automatically? true by default
|
||||||
|
my $default_ranlib;
|
||||||
|
|
||||||
|
@@ -824,6 +828,10 @@ while (@argvcopy)
|
||||||
|
push @seed_sources, $x;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
+ elsif (/^--system-ciphers-file=(.*)$/)
|
||||||
|
+ {
|
||||||
|
+ $config{system_ciphers_file}=$1;
|
||||||
|
+ }
|
||||||
|
elsif (/^--cross-compile-prefix=(.*)$/)
|
||||||
|
{
|
||||||
|
$user{CROSS_COMPILE}=$1;
|
||||||
|
@@ -1016,6 +1024,8 @@ if ($target eq "HASH") {
|
||||||
|
exit 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
+chop $config{system_ciphers_file} if $config{system_ciphers_file} =~ /\/$/;
|
||||||
|
+
|
||||||
|
print "Configuring OpenSSL version $config{version} ($config{version_num}) ";
|
||||||
|
print "for $target\n";
|
||||||
|
|
||||||
|
diff -up openssl-1.1.1c/doc/man1/ciphers.pod.system-cipherlist openssl-1.1.1c/doc/man1/ciphers.pod
|
||||||
|
--- openssl-1.1.1c/doc/man1/ciphers.pod.system-cipherlist 2019-05-28 15:12:21.000000000 +0200
|
||||||
|
+++ openssl-1.1.1c/doc/man1/ciphers.pod 2019-05-29 15:42:27.975328849 +0200
|
||||||
|
@@ -182,6 +182,15 @@ As of OpenSSL 1.0.0, the B<ALL> cipher s
|
||||||
|
|
||||||
|
The cipher suites not enabled by B<ALL>, currently B<eNULL>.
|
||||||
|
|
||||||
|
+=item B<PROFILE=SYSTEM>
|
||||||
|
+
|
||||||
|
+The list of enabled cipher suites will be loaded from the system crypto policy
|
||||||
|
+configuration file B</etc/crypto-policies/back-ends/openssl.config>.
|
||||||
|
+See also L<update-crypto-policies(8)>.
|
||||||
|
+This is the default behavior unless an application explicitly sets a cipher
|
||||||
|
+list. If used in a cipher list configuration value this string must be at the
|
||||||
|
+beginning of the cipher list, otherwise it will not be recognized.
|
||||||
|
+
|
||||||
|
=item B<HIGH>
|
||||||
|
|
||||||
|
"High" encryption cipher suites. This currently means those with key lengths
|
||||||
|
diff -up openssl-1.1.1c/include/openssl/ssl.h.system-cipherlist openssl-1.1.1c/include/openssl/ssl.h
|
||||||
|
--- openssl-1.1.1c/include/openssl/ssl.h.system-cipherlist 2019-05-28 15:12:21.000000000 +0200
|
||||||
|
+++ openssl-1.1.1c/include/openssl/ssl.h 2019-05-29 15:42:27.975328849 +0200
|
||||||
|
@@ -186,6 +186,11 @@ extern "C" {
|
||||||
|
* throwing out anonymous and unencrypted ciphersuites! (The latter are not
|
||||||
|
* actually enabled by ALL, but "ALL:RSA" would enable some of them.)
|
||||||
|
*/
|
||||||
|
+# ifdef SYSTEM_CIPHERS_FILE
|
||||||
|
+# define SSL_SYSTEM_DEFAULT_CIPHER_LIST "PROFILE=SYSTEM"
|
||||||
|
+# else
|
||||||
|
+# define SSL_SYSTEM_DEFAULT_CIPHER_LIST SSL_DEFAULT_CIPHER_LIST
|
||||||
|
+# endif
|
||||||
|
|
||||||
|
/* Used in SSL_set_shutdown()/SSL_get_shutdown(); */
|
||||||
|
# define SSL_SENT_SHUTDOWN 1
|
||||||
|
diff -up openssl-1.1.1c/ssl/ssl_ciph.c.system-cipherlist openssl-1.1.1c/ssl/ssl_ciph.c
|
||||||
|
--- openssl-1.1.1c/ssl/ssl_ciph.c.system-cipherlist 2019-05-28 15:12:21.000000000 +0200
|
||||||
|
+++ openssl-1.1.1c/ssl/ssl_ciph.c 2019-05-29 15:42:27.976328831 +0200
|
||||||
|
@@ -9,6 +9,8 @@
|
||||||
|
* https://www.openssl.org/source/license.html
|
||||||
|
*/
|
||||||
|
|
||||||
|
+/* for secure_getenv */
|
||||||
|
+#define _GNU_SOURCE
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <ctype.h>
|
||||||
|
#include <openssl/objects.h>
|
||||||
|
@@ -1399,6 +1401,53 @@ int SSL_set_ciphersuites(SSL *s, const c
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
+#ifdef SYSTEM_CIPHERS_FILE
|
||||||
|
+static char *load_system_str(const char *suffix)
|
||||||
|
+{
|
||||||
|
+ FILE *fp;
|
||||||
|
+ char buf[1024];
|
||||||
|
+ char *new_rules;
|
||||||
|
+ const char *ciphers_path;
|
||||||
|
+ unsigned len, slen;
|
||||||
|
+
|
||||||
|
+ if ((ciphers_path = secure_getenv("OPENSSL_SYSTEM_CIPHERS_OVERRIDE")) == NULL)
|
||||||
|
+ ciphers_path = SYSTEM_CIPHERS_FILE;
|
||||||
|
+ fp = fopen(ciphers_path, "r");
|
||||||
|
+ if (fp == NULL || fgets(buf, sizeof(buf), fp) == NULL) {
|
||||||
|
+ /* cannot open or file is empty */
|
||||||
|
+ snprintf(buf, sizeof(buf), "%s", SSL_DEFAULT_CIPHER_LIST);
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ if (fp)
|
||||||
|
+ fclose(fp);
|
||||||
|
+
|
||||||
|
+ slen = strlen(suffix);
|
||||||
|
+ len = strlen(buf);
|
||||||
|
+
|
||||||
|
+ if (buf[len - 1] == '\n') {
|
||||||
|
+ len--;
|
||||||
|
+ buf[len] = 0;
|
||||||
|
+ }
|
||||||
|
+ if (buf[len - 1] == '\r') {
|
||||||
|
+ len--;
|
||||||
|
+ buf[len] = 0;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
+ new_rules = OPENSSL_malloc(len + slen + 1);
|
||||||
|
+ if (new_rules == 0)
|
||||||
|
+ return NULL;
|
||||||
|
+
|
||||||
|
+ memcpy(new_rules, buf, len);
|
||||||
|
+ if (slen > 0) {
|
||||||
|
+ memcpy(&new_rules[len], suffix, slen);
|
||||||
|
+ len += slen;
|
||||||
|
+ }
|
||||||
|
+ new_rules[len] = 0;
|
||||||
|
+
|
||||||
|
+ return new_rules;
|
||||||
|
+}
|
||||||
|
+#endif
|
||||||
|
+
|
||||||
|
STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *ssl_method,
|
||||||
|
STACK_OF(SSL_CIPHER) *tls13_ciphersuites,
|
||||||
|
STACK_OF(SSL_CIPHER) **cipher_list,
|
||||||
|
@@ -1412,15 +1461,25 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
||||||
|
const char *rule_p;
|
||||||
|
CIPHER_ORDER *co_list = NULL, *head = NULL, *tail = NULL, *curr;
|
||||||
|
const SSL_CIPHER **ca_list = NULL;
|
||||||
|
+#ifdef SYSTEM_CIPHERS_FILE
|
||||||
|
+ char *new_rules = NULL;
|
||||||
|
+
|
||||||
|
+ if (rule_str != NULL && strncmp(rule_str, "PROFILE=SYSTEM", 14) == 0) {
|
||||||
|
+ char *p = rule_str + 14;
|
||||||
|
+
|
||||||
|
+ new_rules = load_system_str(p);
|
||||||
|
+ rule_str = new_rules;
|
||||||
|
+ }
|
||||||
|
+#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Return with error if nothing to do.
|
||||||
|
*/
|
||||||
|
if (rule_str == NULL || cipher_list == NULL || cipher_list_by_id == NULL)
|
||||||
|
- return NULL;
|
||||||
|
+ goto err;
|
||||||
|
#ifndef OPENSSL_NO_EC
|
||||||
|
if (!check_suiteb_cipher_list(ssl_method, c, &rule_str))
|
||||||
|
- return NULL;
|
||||||
|
+ goto err;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -1443,7 +1502,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
||||||
|
co_list = OPENSSL_malloc(sizeof(*co_list) * num_of_ciphers);
|
||||||
|
if (co_list == NULL) {
|
||||||
|
SSLerr(SSL_F_SSL_CREATE_CIPHER_LIST, ERR_R_MALLOC_FAILURE);
|
||||||
|
- return NULL; /* Failure */
|
||||||
|
+ goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl_cipher_collect_ciphers(ssl_method, num_of_ciphers,
|
||||||
|
@@ -1509,8 +1568,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
||||||
|
* in force within each class
|
||||||
|
*/
|
||||||
|
if (!ssl_cipher_strength_sort(&head, &tail)) {
|
||||||
|
- OPENSSL_free(co_list);
|
||||||
|
- return NULL;
|
||||||
|
+ goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -1555,9 +1613,8 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
||||||
|
num_of_alias_max = num_of_ciphers + num_of_group_aliases + 1;
|
||||||
|
ca_list = OPENSSL_malloc(sizeof(*ca_list) * num_of_alias_max);
|
||||||
|
if (ca_list == NULL) {
|
||||||
|
- OPENSSL_free(co_list);
|
||||||
|
SSLerr(SSL_F_SSL_CREATE_CIPHER_LIST, ERR_R_MALLOC_FAILURE);
|
||||||
|
- return NULL; /* Failure */
|
||||||
|
+ goto err;
|
||||||
|
}
|
||||||
|
ssl_cipher_collect_aliases(ca_list, num_of_group_aliases,
|
||||||
|
disabled_mkey, disabled_auth, disabled_enc,
|
||||||
|
@@ -1583,8 +1640,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
||||||
|
OPENSSL_free(ca_list); /* Not needed anymore */
|
||||||
|
|
||||||
|
if (!ok) { /* Rule processing failure */
|
||||||
|
- OPENSSL_free(co_list);
|
||||||
|
- return NULL;
|
||||||
|
+ goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
@@ -1592,14 +1648,18 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
||||||
|
* if we cannot get one.
|
||||||
|
*/
|
||||||
|
if ((cipherstack = sk_SSL_CIPHER_new_null()) == NULL) {
|
||||||
|
- OPENSSL_free(co_list);
|
||||||
|
- return NULL;
|
||||||
|
+ goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
+#ifdef SYSTEM_CIPHERS_FILE
|
||||||
|
+ OPENSSL_free(new_rules); /* Not needed anymore */
|
||||||
|
+#endif
|
||||||
|
+
|
||||||
|
/* Add TLSv1.3 ciphers first - we always prefer those if possible */
|
||||||
|
for (i = 0; i < sk_SSL_CIPHER_num(tls13_ciphersuites); i++) {
|
||||||
|
if (!sk_SSL_CIPHER_push(cipherstack,
|
||||||
|
sk_SSL_CIPHER_value(tls13_ciphersuites, i))) {
|
||||||
|
+ OPENSSL_free(co_list);
|
||||||
|
sk_SSL_CIPHER_free(cipherstack);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
@@ -1631,6 +1691,14 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
|
||||||
|
*cipher_list = cipherstack;
|
||||||
|
|
||||||
|
return cipherstack;
|
||||||
|
+
|
||||||
|
+err:
|
||||||
|
+ OPENSSL_free(co_list);
|
||||||
|
+#ifdef SYSTEM_CIPHERS_FILE
|
||||||
|
+ OPENSSL_free(new_rules);
|
||||||
|
+#endif
|
||||||
|
+ return NULL;
|
||||||
|
+
|
||||||
|
}
|
||||||
|
|
||||||
|
char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
|
||||||
|
diff -up openssl-1.1.1c/ssl/ssl_lib.c.system-cipherlist openssl-1.1.1c/ssl/ssl_lib.c
|
||||||
|
--- openssl-1.1.1c/ssl/ssl_lib.c.system-cipherlist 2019-05-29 15:42:27.970328937 +0200
|
||||||
|
+++ openssl-1.1.1c/ssl/ssl_lib.c 2019-05-29 15:42:27.977328814 +0200
|
||||||
|
@@ -662,7 +662,7 @@ int SSL_CTX_set_ssl_version(SSL_CTX *ctx
|
||||||
|
ctx->tls13_ciphersuites,
|
||||||
|
&(ctx->cipher_list),
|
||||||
|
&(ctx->cipher_list_by_id),
|
||||||
|
- SSL_DEFAULT_CIPHER_LIST, ctx->cert);
|
||||||
|
+ SSL_SYSTEM_DEFAULT_CIPHER_LIST, ctx->cert);
|
||||||
|
if ((sk == NULL) || (sk_SSL_CIPHER_num(sk) <= 0)) {
|
||||||
|
SSLerr(SSL_F_SSL_CTX_SET_SSL_VERSION, SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS);
|
||||||
|
return 0;
|
||||||
|
@@ -2954,7 +2954,7 @@ SSL_CTX *SSL_CTX_new(const SSL_METHOD *m
|
||||||
|
if (!ssl_create_cipher_list(ret->method,
|
||||||
|
ret->tls13_ciphersuites,
|
||||||
|
&ret->cipher_list, &ret->cipher_list_by_id,
|
||||||
|
- SSL_DEFAULT_CIPHER_LIST, ret->cert)
|
||||||
|
+ SSL_SYSTEM_DEFAULT_CIPHER_LIST, ret->cert)
|
||||||
|
|| sk_SSL_CIPHER_num(ret->cipher_list) <= 0) {
|
||||||
|
SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_LIBRARY_HAS_NO_CIPHERS);
|
||||||
|
goto err2;
|
||||||
|
diff -up openssl-1.1.1c/test/cipherlist_test.c.system-cipherlist openssl-1.1.1c/test/cipherlist_test.c
|
||||||
|
--- openssl-1.1.1c/test/cipherlist_test.c.system-cipherlist 2019-05-28 15:12:21.000000000 +0200
|
||||||
|
+++ openssl-1.1.1c/test/cipherlist_test.c 2019-05-29 15:42:27.977328814 +0200
|
||||||
|
@@ -251,7 +251,9 @@ end:
|
||||||
|
|
||||||
|
int setup_tests(void)
|
||||||
|
{
|
||||||
|
+#ifndef SYSTEM_CIPHERS_FILE
|
||||||
|
ADD_TEST(test_default_cipherlist_implicit);
|
||||||
|
+#endif
|
||||||
|
ADD_TEST(test_default_cipherlist_explicit);
|
||||||
|
ADD_TEST(test_default_cipherlist_clear);
|
||||||
|
return 1;
|
70
openssl-1.1.1-ts-sha256-default.patch
Normal file
70
openssl-1.1.1-ts-sha256-default.patch
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
diff -up openssl-1.1.1h/apps/openssl.cnf.ts-sha256-default openssl-1.1.1h/apps/openssl.cnf
|
||||||
|
--- openssl-1.1.1h/apps/openssl.cnf.ts-sha256-default 2020-11-06 11:07:28.850100899 +0100
|
||||||
|
+++ openssl-1.1.1h/apps/openssl.cnf 2020-11-06 11:11:28.042913791 +0100
|
||||||
|
@@ -364,5 +348,5 @@ tsa_name = yes # Must the TSA name be i
|
||||||
|
# (optional, default: no)
|
||||||
|
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||||
|
# (optional, default: no)
|
||||||
|
-ess_cert_id_alg = sha1 # algorithm to compute certificate
|
||||||
|
+ess_cert_id_alg = sha256 # algorithm to compute certificate
|
||||||
|
# identifier (optional, default: sha1)
|
||||||
|
diff -up openssl-1.1.1h/apps/ts.c.ts-sha256-default openssl-1.1.1h/apps/ts.c
|
||||||
|
--- openssl-1.1.1h/apps/ts.c.ts-sha256-default 2020-09-22 14:55:07.000000000 +0200
|
||||||
|
+++ openssl-1.1.1h/apps/ts.c 2020-11-06 11:07:28.883101220 +0100
|
||||||
|
@@ -423,7 +423,7 @@ static TS_REQ *create_query(BIO *data_bi
|
||||||
|
ASN1_OBJECT *policy_obj = NULL;
|
||||||
|
ASN1_INTEGER *nonce_asn1 = NULL;
|
||||||
|
|
||||||
|
- if (md == NULL && (md = EVP_get_digestbyname("sha1")) == NULL)
|
||||||
|
+ if (md == NULL && (md = EVP_get_digestbyname("sha256")) == NULL)
|
||||||
|
goto err;
|
||||||
|
if ((ts_req = TS_REQ_new()) == NULL)
|
||||||
|
goto err;
|
||||||
|
diff -up openssl-1.1.1h/crypto/ts/ts_conf.c.ts-sha256-default openssl-1.1.1h/crypto/ts/ts_conf.c
|
||||||
|
--- openssl-1.1.1h/crypto/ts/ts_conf.c.ts-sha256-default 2020-11-06 12:03:51.226372867 +0100
|
||||||
|
+++ openssl-1.1.1h/crypto/ts/ts_conf.c 2020-11-06 12:04:01.713488990 +0100
|
||||||
|
@@ -476,7 +476,7 @@ int TS_CONF_set_ess_cert_id_digest(CONF
|
||||||
|
const char *md = NCONF_get_string(conf, section, ENV_ESS_CERT_ID_ALG);
|
||||||
|
|
||||||
|
if (md == NULL)
|
||||||
|
- md = "sha1";
|
||||||
|
+ md = "sha256";
|
||||||
|
|
||||||
|
cert_md = EVP_get_digestbyname(md);
|
||||||
|
if (cert_md == NULL) {
|
||||||
|
diff -up openssl-1.1.1h/doc/man1/ts.pod.ts-sha256-default openssl-1.1.1h/doc/man1/ts.pod
|
||||||
|
--- openssl-1.1.1h/doc/man1/ts.pod.ts-sha256-default 2020-09-22 14:55:07.000000000 +0200
|
||||||
|
+++ openssl-1.1.1h/doc/man1/ts.pod 2020-11-06 11:07:28.883101220 +0100
|
||||||
|
@@ -518,7 +518,7 @@ included. Default is no. (Optional)
|
||||||
|
=item B<ess_cert_id_alg>
|
||||||
|
|
||||||
|
This option specifies the hash function to be used to calculate the TSA's
|
||||||
|
-public key certificate identifier. Default is sha1. (Optional)
|
||||||
|
+public key certificate identifier. Default is sha256. (Optional)
|
||||||
|
|
||||||
|
=back
|
||||||
|
|
||||||
|
@@ -530,7 +530,7 @@ openssl/apps/openssl.cnf will do.
|
||||||
|
|
||||||
|
=head2 Time Stamp Request
|
||||||
|
|
||||||
|
-To create a timestamp request for design1.txt with SHA-1
|
||||||
|
+To create a timestamp request for design1.txt with SHA-256
|
||||||
|
without nonce and policy and no certificate is required in the response:
|
||||||
|
|
||||||
|
openssl ts -query -data design1.txt -no_nonce \
|
||||||
|
@@ -546,12 +546,12 @@ To print the content of the previous req
|
||||||
|
|
||||||
|
openssl ts -query -in design1.tsq -text
|
||||||
|
|
||||||
|
-To create a timestamp request which includes the MD-5 digest
|
||||||
|
+To create a timestamp request which includes the SHA-512 digest
|
||||||
|
of design2.txt, requests the signer certificate and nonce,
|
||||||
|
specifies a policy id (assuming the tsa_policy1 name is defined in the
|
||||||
|
OID section of the config file):
|
||||||
|
|
||||||
|
- openssl ts -query -data design2.txt -md5 \
|
||||||
|
+ openssl ts -query -data design2.txt -sha512 \
|
||||||
|
-tspolicy tsa_policy1 -cert -out design2.tsq
|
||||||
|
|
||||||
|
=head2 Time Stamp Response
|
38
openssl-1.1.1-version-add-engines.patch
Normal file
38
openssl-1.1.1-version-add-engines.patch
Normal file
@ -0,0 +1,38 @@
|
|||||||
|
diff -up openssl-1.1.1-pre8/apps/version.c.version-add-engines openssl-1.1.1-pre8/apps/version.c
|
||||||
|
--- openssl-1.1.1-pre8/apps/version.c.version-add-engines 2018-06-20 16:48:09.000000000 +0200
|
||||||
|
+++ openssl-1.1.1-pre8/apps/version.c 2018-07-16 18:00:40.608624346 +0200
|
||||||
|
@@ -64,7 +64,7 @@ int version_main(int argc, char **argv)
|
||||||
|
{
|
||||||
|
int ret = 1, dirty = 0, seed = 0;
|
||||||
|
int cflags = 0, version = 0, date = 0, options = 0, platform = 0, dir = 0;
|
||||||
|
- int engdir = 0;
|
||||||
|
+ int engdir = 0, engines = 0;
|
||||||
|
char *prog;
|
||||||
|
OPTION_CHOICE o;
|
||||||
|
|
||||||
|
@@ -106,7 +106,7 @@ opthelp:
|
||||||
|
break;
|
||||||
|
case OPT_A:
|
||||||
|
seed = options = cflags = version = date = platform = dir = engdir
|
||||||
|
- = 1;
|
||||||
|
+ = engines = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@@ -188,6 +188,16 @@ opthelp:
|
||||||
|
#endif
|
||||||
|
printf("\n");
|
||||||
|
}
|
||||||
|
+ if (engines) {
|
||||||
|
+ ENGINE *e;
|
||||||
|
+ printf("engines: ");
|
||||||
|
+ e = ENGINE_get_first();
|
||||||
|
+ while (e) {
|
||||||
|
+ printf("%s ", ENGINE_get_id(e));
|
||||||
|
+ e = ENGINE_get_next(e);
|
||||||
|
+ }
|
||||||
|
+ printf("\n");
|
||||||
|
+ }
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
return ret;
|
12
openssl-1.1.1-version-override.patch
Normal file
12
openssl-1.1.1-version-override.patch
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
diff -up openssl-1.1.1g/include/openssl/opensslv.h.version-override openssl-1.1.1g/include/openssl/opensslv.h
|
||||||
|
--- openssl-1.1.1g/include/openssl/opensslv.h.version-override 2020-04-23 13:29:37.802673513 +0200
|
||||||
|
+++ openssl-1.1.1g/include/openssl/opensslv.h 2020-04-23 13:30:13.064008458 +0200
|
||||||
|
@@ -40,7 +40,7 @@ extern "C" {
|
||||||
|
* major minor fix final patch/beta)
|
||||||
|
*/
|
||||||
|
# define OPENSSL_VERSION_NUMBER 0x1010108fL
|
||||||
|
-# define OPENSSL_VERSION_TEXT "OpenSSL 1.1.1h 22 Sep 2020"
|
||||||
|
+# define OPENSSL_VERSION_TEXT "OpenSSL 1.1.1h FIPS 22 Sep 2020"
|
||||||
|
|
||||||
|
/*-
|
||||||
|
* The macros below are to be used for shared library (.so, .dll, ...)
|
57
openssl-1.1.1-weak-ciphers.patch
Normal file
57
openssl-1.1.1-weak-ciphers.patch
Normal file
@ -0,0 +1,57 @@
|
|||||||
|
diff -up openssl-1.1.1/ssl/s3_lib.c.weak-ciphers openssl-1.1.1/ssl/s3_lib.c
|
||||||
|
--- openssl-1.1.1/ssl/s3_lib.c.weak-ciphers 2018-09-11 14:48:23.000000000 +0200
|
||||||
|
+++ openssl-1.1.1/ssl/s3_lib.c 2018-09-17 12:53:33.850637181 +0200
|
||||||
|
@@ -2612,7 +2612,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
||||||
|
SSL_GOST89MAC,
|
||||||
|
TLS1_VERSION, TLS1_2_VERSION,
|
||||||
|
0, 0,
|
||||||
|
- SSL_HIGH,
|
||||||
|
+ SSL_MEDIUM,
|
||||||
|
SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94 | TLS1_STREAM_MAC,
|
||||||
|
256,
|
||||||
|
256,
|
||||||
|
@@ -2644,7 +2644,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
||||||
|
SSL_GOST89MAC12,
|
||||||
|
TLS1_VERSION, TLS1_2_VERSION,
|
||||||
|
0, 0,
|
||||||
|
- SSL_HIGH,
|
||||||
|
+ SSL_MEDIUM,
|
||||||
|
SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
|
||||||
|
256,
|
||||||
|
256,
|
||||||
|
@@ -2753,7 +2753,7 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
||||||
|
},
|
||||||
|
#endif /* OPENSSL_NO_SEED */
|
||||||
|
|
||||||
|
-#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
|
||||||
|
+#if 0 /* No MD5 ciphersuites */
|
||||||
|
{
|
||||||
|
1,
|
||||||
|
SSL3_TXT_RSA_RC4_128_MD5,
|
||||||
|
@@ -2770,6 +2770,8 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
||||||
|
128,
|
||||||
|
128,
|
||||||
|
},
|
||||||
|
+#endif
|
||||||
|
+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
|
||||||
|
{
|
||||||
|
1,
|
||||||
|
SSL3_TXT_RSA_RC4_128_SHA,
|
||||||
|
@@ -2786,6 +2788,8 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
||||||
|
128,
|
||||||
|
128,
|
||||||
|
},
|
||||||
|
+#endif
|
||||||
|
+#if 0
|
||||||
|
{
|
||||||
|
1,
|
||||||
|
SSL3_TXT_ADH_RC4_128_MD5,
|
||||||
|
@@ -2802,6 +2806,8 @@ static SSL_CIPHER ssl3_ciphers[] = {
|
||||||
|
128,
|
||||||
|
128,
|
||||||
|
},
|
||||||
|
+#endif
|
||||||
|
+#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
|
||||||
|
{
|
||||||
|
1,
|
||||||
|
TLS1_TXT_ECDHE_PSK_WITH_RC4_128_SHA,
|
@ -1,2 +0,0 @@
|
|||||||
-b /usr/lib{,64}/libcrypto.so.*
|
|
||||||
-b /usr/lib{,64}/libssl.so.*
|
|
@ -1,400 +0,0 @@
|
|||||||
/* Test program to verify that RSA signing is thread-safe in OpenSSL. */
|
|
||||||
|
|
||||||
#include <assert.h>
|
|
||||||
#include <errno.h>
|
|
||||||
#include <fcntl.h>
|
|
||||||
#include <limits.h>
|
|
||||||
#include <pthread.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <string.h>
|
|
||||||
#include <unistd.h>
|
|
||||||
|
|
||||||
#include <openssl/crypto.h>
|
|
||||||
#include <openssl/err.h>
|
|
||||||
#include <openssl/objects.h>
|
|
||||||
#include <openssl/rand.h>
|
|
||||||
#include <openssl/rsa.h>
|
|
||||||
#include <openssl/md5.h>
|
|
||||||
#include <openssl/ssl.h>
|
|
||||||
|
|
||||||
/* Just assume we want to do engine stuff if we're using 0.9.6b or
|
|
||||||
* higher. This assumption is only valid for versions bundled with RHL. */
|
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x0090602fL
|
|
||||||
#include <openssl/engine.h>
|
|
||||||
#define USE_ENGINE
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#define MAX_THREAD_COUNT 10000
|
|
||||||
#define ITERATION_COUNT 10
|
|
||||||
#define MAIN_COUNT 100
|
|
||||||
|
|
||||||
/* OpenSSL requires us to provide thread ID and locking primitives. */
|
|
||||||
pthread_mutex_t *mutex_locks = NULL;
|
|
||||||
static unsigned long
|
|
||||||
thread_id_cb(void)
|
|
||||||
{
|
|
||||||
return (unsigned long) pthread_self();
|
|
||||||
}
|
|
||||||
static void
|
|
||||||
lock_cb(int mode, int n, const char *file, int line)
|
|
||||||
{
|
|
||||||
if (mode & CRYPTO_LOCK) {
|
|
||||||
pthread_mutex_lock(&mutex_locks[n]);
|
|
||||||
} else {
|
|
||||||
pthread_mutex_unlock(&mutex_locks[n]);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
struct thread_args {
|
|
||||||
RSA *rsa;
|
|
||||||
int digest_type;
|
|
||||||
unsigned char *digest;
|
|
||||||
unsigned int digest_len;
|
|
||||||
unsigned char *signature;
|
|
||||||
unsigned int signature_len;
|
|
||||||
pthread_t main_thread;
|
|
||||||
};
|
|
||||||
|
|
||||||
static int print = 0;
|
|
||||||
|
|
||||||
pthread_mutex_t sign_lock = PTHREAD_MUTEX_INITIALIZER;
|
|
||||||
static int locked_sign = 0;
|
|
||||||
static void SIGN_LOCK() {if (locked_sign) pthread_mutex_lock(&sign_lock);}
|
|
||||||
static void SIGN_UNLOCK() {if (locked_sign) pthread_mutex_unlock(&sign_lock);}
|
|
||||||
|
|
||||||
pthread_mutex_t verify_lock = PTHREAD_MUTEX_INITIALIZER;
|
|
||||||
static int locked_verify = 0;
|
|
||||||
static void VERIFY_LOCK() {if (locked_verify) pthread_mutex_lock(&verify_lock);}
|
|
||||||
static void VERIFY_UNLOCK() {if (locked_verify) pthread_mutex_unlock(&verify_lock);}
|
|
||||||
|
|
||||||
pthread_mutex_t failure_count_lock = PTHREAD_MUTEX_INITIALIZER;
|
|
||||||
long failure_count = 0;
|
|
||||||
static void
|
|
||||||
failure()
|
|
||||||
{
|
|
||||||
pthread_mutex_lock(&failure_count_lock);
|
|
||||||
failure_count++;
|
|
||||||
pthread_mutex_unlock(&failure_count_lock);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void *
|
|
||||||
thread_main(void *argp)
|
|
||||||
{
|
|
||||||
struct thread_args *args = argp;
|
|
||||||
unsigned char *signature;
|
|
||||||
unsigned int signature_len, signature_alloc_len;
|
|
||||||
int ret, i;
|
|
||||||
|
|
||||||
signature_alloc_len = args->signature_len;
|
|
||||||
if (RSA_size(args->rsa) > signature_alloc_len) {
|
|
||||||
signature_alloc_len = RSA_size(args->rsa);
|
|
||||||
}
|
|
||||||
signature = malloc(signature_alloc_len);
|
|
||||||
if (signature == NULL) {
|
|
||||||
fprintf(stderr, "Skipping checks in thread %lu -- %s.\n",
|
|
||||||
(unsigned long) pthread_self(), strerror(errno));
|
|
||||||
pthread_exit(0);
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
for (i = 0; i < ITERATION_COUNT; i++) {
|
|
||||||
signature_len = signature_alloc_len;
|
|
||||||
SIGN_LOCK();
|
|
||||||
ret = RSA_check_key(args->rsa);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
if (ret != 1) {
|
|
||||||
failure();
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
ret = RSA_sign(args->digest_type,
|
|
||||||
args->digest,
|
|
||||||
args->digest_len,
|
|
||||||
signature, &signature_len,
|
|
||||||
args->rsa);
|
|
||||||
SIGN_UNLOCK();
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
if (ret != 1) {
|
|
||||||
failure();
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
VERIFY_LOCK();
|
|
||||||
ret = RSA_verify(args->digest_type,
|
|
||||||
args->digest,
|
|
||||||
args->digest_len,
|
|
||||||
signature, signature_len,
|
|
||||||
args->rsa);
|
|
||||||
VERIFY_UNLOCK();
|
|
||||||
if (ret != 1) {
|
|
||||||
fprintf(stderr,
|
|
||||||
"Signature from thread %lu(%d) fails "
|
|
||||||
"verification (passed in thread #%lu)!\n",
|
|
||||||
(long) pthread_self(), i,
|
|
||||||
(long) args->main_thread);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
failure();
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, ">%d\n", i);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
free(signature);
|
|
||||||
|
|
||||||
pthread_exit(0);
|
|
||||||
|
|
||||||
return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
unsigned char *
|
|
||||||
xmemdup(unsigned char *s, size_t len)
|
|
||||||
{
|
|
||||||
unsigned char *r;
|
|
||||||
r = malloc(len);
|
|
||||||
if (r == NULL) {
|
|
||||||
fprintf(stderr, "Out of memory.\n");
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
assert(r != NULL);
|
|
||||||
}
|
|
||||||
memcpy(r, s, len);
|
|
||||||
return r;
|
|
||||||
}
|
|
||||||
|
|
||||||
int
|
|
||||||
main(int argc, char **argv)
|
|
||||||
{
|
|
||||||
RSA *rsa;
|
|
||||||
MD5_CTX md5;
|
|
||||||
int fd, i;
|
|
||||||
pthread_t threads[MAX_THREAD_COUNT];
|
|
||||||
int thread_count = 1000;
|
|
||||||
unsigned char *message, *digest;
|
|
||||||
unsigned int message_len, digest_len;
|
|
||||||
unsigned char *correct_signature;
|
|
||||||
unsigned int correct_siglen, ret;
|
|
||||||
struct thread_args master_args, *args;
|
|
||||||
int sync = 0, seed = 0;
|
|
||||||
int again = 1;
|
|
||||||
#ifdef USE_ENGINE
|
|
||||||
char *engine = NULL;
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
pthread_mutex_init(&failure_count_lock, NULL);
|
|
||||||
|
|
||||||
for (i = 1; i < argc; i++) {
|
|
||||||
if (strcmp(argv[i], "--seed") == 0) {
|
|
||||||
printf("Seeding PRNG.\n");
|
|
||||||
seed++;
|
|
||||||
} else
|
|
||||||
if (strcmp(argv[i], "--sync") == 0) {
|
|
||||||
printf("Running synchronized.\n");
|
|
||||||
sync++;
|
|
||||||
} else
|
|
||||||
if ((strcmp(argv[i], "--threads") == 0) && (i < argc - 1)) {
|
|
||||||
i++;
|
|
||||||
thread_count = atol(argv[i]);
|
|
||||||
if (thread_count > MAX_THREAD_COUNT) {
|
|
||||||
thread_count = MAX_THREAD_COUNT;
|
|
||||||
}
|
|
||||||
printf("Starting %d threads.\n", thread_count);
|
|
||||||
sync++;
|
|
||||||
} else
|
|
||||||
if (strcmp(argv[i], "--sign") == 0) {
|
|
||||||
printf("Locking signing.\n");
|
|
||||||
locked_sign++;
|
|
||||||
} else
|
|
||||||
if (strcmp(argv[i], "--verify") == 0) {
|
|
||||||
printf("Locking verifies.\n");
|
|
||||||
locked_verify++;
|
|
||||||
} else
|
|
||||||
if (strcmp(argv[i], "--print") == 0) {
|
|
||||||
printf("Tracing.\n");
|
|
||||||
print++;
|
|
||||||
#ifdef USE_ENGINE
|
|
||||||
} else
|
|
||||||
if ((strcmp(argv[i], "--engine") == 0) && (i < argc - 1)) {
|
|
||||||
printf("Using engine \"%s\".\n", argv[i + 1]);
|
|
||||||
engine = argv[i + 1];
|
|
||||||
i++;
|
|
||||||
#endif
|
|
||||||
} else {
|
|
||||||
printf("Bad argument: %s\n", argv[i]);
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Get some random data to sign. */
|
|
||||||
fd = open("/dev/urandom", O_RDONLY);
|
|
||||||
if (fd == -1) {
|
|
||||||
fprintf(stderr, "Error opening /dev/urandom: %s\n",
|
|
||||||
strerror(errno));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "Reading random data.\n");
|
|
||||||
}
|
|
||||||
message = malloc(message_len = 9371);
|
|
||||||
read(fd, message, message_len);
|
|
||||||
close(fd);
|
|
||||||
|
|
||||||
/* Initialize the SSL library and set up thread-safe locking. */
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
SSL_library_init();
|
|
||||||
mutex_locks = malloc(sizeof(pthread_mutex_t) * CRYPTO_num_locks());
|
|
||||||
for (i = 0; i < CRYPTO_num_locks(); i++) {
|
|
||||||
pthread_mutex_init(&mutex_locks[i], NULL);
|
|
||||||
}
|
|
||||||
CRYPTO_set_id_callback(thread_id_cb);
|
|
||||||
CRYPTO_set_locking_callback(lock_cb);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
|
|
||||||
/* Seed the PRNG if we were asked to do so. */
|
|
||||||
if (seed) {
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "Seeding PRNG.\n");
|
|
||||||
}
|
|
||||||
RAND_add(message, message_len, message_len);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Turn on a hardware crypto device if asked to do so. */
|
|
||||||
#ifdef USE_ENGINE
|
|
||||||
if (engine) {
|
|
||||||
#if OPENSSL_VERSION_NUMBER >= 0x0090700fL
|
|
||||||
ENGINE_load_builtin_engines();
|
|
||||||
#endif
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "Initializing \"%s\" engine.\n",
|
|
||||||
engine);
|
|
||||||
}
|
|
||||||
e = ENGINE_by_id(engine);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
if (e) {
|
|
||||||
i = ENGINE_init(e);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
i = ENGINE_set_default_RSA(e);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Compute the digest for the signature. */
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "Computing digest.\n");
|
|
||||||
}
|
|
||||||
digest = malloc(digest_len = MD5_DIGEST_LENGTH);
|
|
||||||
MD5_Init(&md5);
|
|
||||||
MD5_Update(&md5, message, message_len);
|
|
||||||
MD5_Final(digest, &md5);
|
|
||||||
|
|
||||||
/* Generate a signing key. */
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "Generating key.\n");
|
|
||||||
}
|
|
||||||
rsa = RSA_generate_key(4096, 3, NULL, NULL);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
if (rsa == NULL) {
|
|
||||||
_exit(1);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Sign the data. */
|
|
||||||
correct_siglen = RSA_size(rsa);
|
|
||||||
correct_signature = malloc(correct_siglen);
|
|
||||||
for (i = 0; i < MAIN_COUNT; i++) {
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "Signing data (%d).\n", i);
|
|
||||||
}
|
|
||||||
ret = RSA_check_key(rsa);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
if (ret != 1) {
|
|
||||||
failure();
|
|
||||||
}
|
|
||||||
correct_siglen = RSA_size(rsa);
|
|
||||||
ret = RSA_sign(NID_md5, digest, digest_len,
|
|
||||||
correct_signature, &correct_siglen,
|
|
||||||
rsa);
|
|
||||||
ERR_print_errors_fp(stdout);
|
|
||||||
if (ret != 1) {
|
|
||||||
_exit(2);
|
|
||||||
}
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "Verifying data (%d).\n", i);
|
|
||||||
}
|
|
||||||
ret = RSA_verify(NID_md5, digest, digest_len,
|
|
||||||
correct_signature, correct_siglen,
|
|
||||||
rsa);
|
|
||||||
if (ret != 1) {
|
|
||||||
_exit(2);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Collect up the inforamtion which other threads will need for
|
|
||||||
* comparing their signature results with ours. */
|
|
||||||
master_args.rsa = rsa;
|
|
||||||
master_args.digest_type = NID_md5;
|
|
||||||
master_args.digest = digest;
|
|
||||||
master_args.digest_len = digest_len;
|
|
||||||
master_args.signature = correct_signature;
|
|
||||||
master_args.signature_len = correct_siglen;
|
|
||||||
master_args.main_thread = pthread_self();
|
|
||||||
|
|
||||||
fprintf(stdout, "Performing %d signatures in each of %d threads "
|
|
||||||
"(%d, %d).\n", ITERATION_COUNT, thread_count,
|
|
||||||
digest_len, correct_siglen);
|
|
||||||
fflush(NULL);
|
|
||||||
|
|
||||||
/* Start up all of the threads. */
|
|
||||||
for (i = 0; i < thread_count; i++) {
|
|
||||||
args = malloc(sizeof(struct thread_args));
|
|
||||||
args->rsa = RSAPrivateKey_dup(master_args.rsa);
|
|
||||||
args->digest_type = master_args.digest_type;
|
|
||||||
args->digest_len = master_args.digest_len;
|
|
||||||
args->digest = xmemdup(master_args.digest, args->digest_len);
|
|
||||||
args->signature_len = master_args.signature_len;
|
|
||||||
args->signature = xmemdup(master_args.signature,
|
|
||||||
args->signature_len);
|
|
||||||
args->main_thread = pthread_self();
|
|
||||||
ret = pthread_create(&threads[i], NULL, thread_main, args);
|
|
||||||
while ((ret != 0) && (errno == EAGAIN)) {
|
|
||||||
ret = pthread_create(&threads[i], NULL,
|
|
||||||
thread_main, &args);
|
|
||||||
fprintf(stderr, "Thread limit hit at %d.\n", i);
|
|
||||||
}
|
|
||||||
if (ret != 0) {
|
|
||||||
fprintf(stderr, "Unable to create thread %d: %s.\n",
|
|
||||||
i, strerror(errno));
|
|
||||||
threads[i] = -1;
|
|
||||||
} else {
|
|
||||||
if (sync) {
|
|
||||||
ret = pthread_join(threads[i], NULL);
|
|
||||||
assert(ret == 0);
|
|
||||||
}
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "%d\n", i);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Wait for all threads to complete. So long as we can find an
|
|
||||||
* unjoined thread, keep joining threads. */
|
|
||||||
do {
|
|
||||||
again = 0;
|
|
||||||
for (i = 0; i < thread_count; i++) {
|
|
||||||
/* If we have an unterminated thread, join it. */
|
|
||||||
if (threads[i] != -1) {
|
|
||||||
again = 1;
|
|
||||||
if (print) {
|
|
||||||
fprintf(stderr, "Joining thread %d.\n",
|
|
||||||
i);
|
|
||||||
}
|
|
||||||
pthread_join(threads[i], NULL);
|
|
||||||
threads[i] = -1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} while (again == 1);
|
|
||||||
|
|
||||||
fprintf(stderr, "%ld failures\n", failure_count);
|
|
||||||
|
|
||||||
return (failure_count != 0);
|
|
||||||
}
|
|
703
openssl.spec
703
openssl.spec
@ -9,20 +9,19 @@
|
|||||||
# 0.9.8g soversion = 7
|
# 0.9.8g soversion = 7
|
||||||
# 0.9.8jk + EAP-FAST soversion = 8
|
# 0.9.8jk + EAP-FAST soversion = 8
|
||||||
# 1.0.0 soversion = 10
|
# 1.0.0 soversion = 10
|
||||||
%define soversion 10
|
# 1.1.0 soversion = 1.1 (same as upstream although presence of some symbols
|
||||||
|
# depends on build configuration options)
|
||||||
# Number of threads to spawn when testing some threading fixes.
|
%define soversion 1.1
|
||||||
%define thread_test_threads %{?threads:%{threads}}%{!?threads:1}
|
|
||||||
|
|
||||||
# Arches on which we need to prevent arch conflicts on opensslconf.h, must
|
# Arches on which we need to prevent arch conflicts on opensslconf.h, must
|
||||||
# also be handled in opensslconf-new.h.
|
# also be handled in opensslconf-new.h.
|
||||||
%define multilib_arches %{ix86} ia64 %{mips} ppc %{power64} s390 s390x sparcv9 sparc64 x86_64
|
%define multilib_arches %{ix86} ia64 %{mips} ppc ppc64 s390 s390x sparcv9 sparc64 x86_64
|
||||||
|
|
||||||
%global _performance_build 1
|
%global _performance_build 1
|
||||||
|
|
||||||
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
Summary: Utilities from the general purpose cryptography library with TLS implementation
|
||||||
Name: openssl
|
Name: openssl
|
||||||
Version: 1.0.2j
|
Version: 1.1.1h
|
||||||
Release: 1%{?dist}
|
Release: 1%{?dist}
|
||||||
Epoch: 1
|
Epoch: 1
|
||||||
# We have to remove certain patented algorithms from the openssl source
|
# We have to remove certain patented algorithms from the openssl source
|
||||||
@ -33,70 +32,63 @@ Source1: hobble-openssl
|
|||||||
Source2: Makefile.certificate
|
Source2: Makefile.certificate
|
||||||
Source6: make-dummy-cert
|
Source6: make-dummy-cert
|
||||||
Source7: renew-dummy-cert
|
Source7: renew-dummy-cert
|
||||||
Source8: openssl-thread-test.c
|
|
||||||
Source9: opensslconf-new.h
|
Source9: opensslconf-new.h
|
||||||
Source10: opensslconf-new-warning.h
|
Source10: opensslconf-new-warning.h
|
||||||
Source11: README.FIPS
|
Source11: README.FIPS
|
||||||
Source12: ec_curve.c
|
Source12: ec_curve.c
|
||||||
Source13: ectest.c
|
Source13: ectest.c
|
||||||
# Build changes
|
# Build changes
|
||||||
Patch1: openssl-1.0.2e-rpmbuild.patch
|
Patch1: openssl-1.1.1-build.patch
|
||||||
Patch2: openssl-1.0.2a-defaults.patch
|
Patch2: openssl-1.1.1-defaults.patch
|
||||||
Patch4: openssl-1.0.2i-enginesdir.patch
|
Patch3: openssl-1.1.1-no-html.patch
|
||||||
Patch5: openssl-1.0.2a-no-rpath.patch
|
Patch4: openssl-1.1.1-man-rename.patch
|
||||||
Patch6: openssl-1.0.2a-test-use-localhost.patch
|
|
||||||
Patch7: openssl-1.0.0-timezone.patch
|
|
||||||
Patch8: openssl-1.0.1c-perlfind.patch
|
|
||||||
Patch9: openssl-1.0.1c-aliasing.patch
|
|
||||||
# Bug fixes
|
# Bug fixes
|
||||||
Patch23: openssl-1.0.2c-default-paths.patch
|
Patch21: openssl-1.1.0-issuer-hash.patch
|
||||||
Patch24: openssl-1.0.2a-issuer-hash.patch
|
|
||||||
# Functionality changes
|
# Functionality changes
|
||||||
Patch33: openssl-1.0.0-beta4-ca-dir.patch
|
Patch31: openssl-1.1.1-conf-paths.patch
|
||||||
Patch34: openssl-1.0.2a-x509.patch
|
Patch32: openssl-1.1.1-version-add-engines.patch
|
||||||
Patch35: openssl-1.0.2a-version-add-engines.patch
|
Patch33: openssl-1.1.1-apps-dgst.patch
|
||||||
Patch39: openssl-1.0.2a-ipv6-apps.patch
|
Patch36: openssl-1.1.1-no-brainpool.patch
|
||||||
Patch40: openssl-1.0.2i-fips.patch
|
Patch37: openssl-1.1.1-ec-curves.patch
|
||||||
Patch45: openssl-1.0.2a-env-zlib.patch
|
Patch38: openssl-1.1.1-no-weak-verify.patch
|
||||||
Patch47: openssl-1.0.2a-readme-warning.patch
|
Patch40: openssl-1.1.1-disable-ssl3.patch
|
||||||
Patch49: openssl-1.0.1i-algo-doc.patch
|
Patch41: openssl-1.1.1-system-cipherlist.patch
|
||||||
Patch50: openssl-1.0.2a-dtls1-abi.patch
|
Patch42: openssl-1.1.1-fips.patch
|
||||||
Patch51: openssl-1.0.2a-version.patch
|
Patch44: openssl-1.1.1-version-override.patch
|
||||||
Patch56: openssl-1.0.2a-rsa-x931.patch
|
Patch45: openssl-1.1.1-weak-ciphers.patch
|
||||||
Patch58: openssl-1.0.2a-fips-md5-allow.patch
|
Patch46: openssl-1.1.1-seclevel.patch
|
||||||
Patch60: openssl-1.0.2a-apps-dgst.patch
|
Patch47: openssl-1.1.1-ts-sha256-default.patch
|
||||||
Patch63: openssl-1.0.2a-xmpp-starttls.patch
|
Patch48: openssl-1.1.1-fips-post-rand.patch
|
||||||
Patch65: openssl-1.0.2i-chil-fixes.patch
|
Patch49: openssl-1.1.1-evp-kdf.patch
|
||||||
Patch66: openssl-1.0.2h-pkgconfig.patch
|
Patch50: openssl-1.1.1-ssh-kdf.patch
|
||||||
Patch68: openssl-1.0.2i-secure-getenv.patch
|
Patch51: openssl-1.1.1-intel-cet.patch
|
||||||
Patch70: openssl-1.0.2a-fips-ec.patch
|
Patch60: openssl-1.1.1-krb5-kdf.patch
|
||||||
Patch71: openssl-1.0.2g-manfix.patch
|
Patch61: openssl-1.1.1-edk2-build.patch
|
||||||
Patch72: openssl-1.0.2a-fips-ctor.patch
|
Patch62: openssl-1.1.1-fips-curves.patch
|
||||||
Patch73: openssl-1.0.2c-ecc-suiteb.patch
|
Patch65: openssl-1.1.1-fips-drbg-selftest.patch
|
||||||
Patch74: openssl-1.0.2a-no-md5-verify.patch
|
Patch66: openssl-1.1.1-fips-dh.patch
|
||||||
Patch75: openssl-1.0.2a-compat-symbols.patch
|
Patch67: openssl-1.1.1-kdf-selftest.patch
|
||||||
Patch76: openssl-1.0.2i-new-fips-reqs.patch
|
Patch69: openssl-1.1.1-alpn-cb.patch
|
||||||
Patch78: openssl-1.0.2a-cc-reqs.patch
|
Patch70: openssl-1.1.1-rewire-fips-drbg.patch
|
||||||
Patch90: openssl-1.0.2i-enc-fail.patch
|
|
||||||
Patch92: openssl-1.0.2a-system-cipherlist.patch
|
|
||||||
Patch93: openssl-1.0.2g-disable-sslv2v3.patch
|
|
||||||
Patch94: openssl-1.0.2d-secp256k1.patch
|
|
||||||
Patch95: openssl-1.0.2e-remove-nistp224.patch
|
|
||||||
Patch96: openssl-1.0.2e-speed-doc.patch
|
|
||||||
# Backported fixes including security fixes
|
# Backported fixes including security fixes
|
||||||
Patch80: openssl-1.0.2e-wrap-pad.patch
|
Patch52: openssl-1.1.1-s390x-update.patch
|
||||||
Patch81: openssl-1.0.2a-padlock64.patch
|
Patch53: openssl-1.1.1-fips-crng-test.patch
|
||||||
Patch82: openssl-1.0.2i-trusted-first-doc.patch
|
Patch55: openssl-1.1.1-arm-update.patch
|
||||||
|
Patch56: openssl-1.1.1-s390x-ecc.patch
|
||||||
|
|
||||||
License: OpenSSL
|
License: OpenSSL and ASL 2.0
|
||||||
Group: System Environment/Libraries
|
|
||||||
URL: http://www.openssl.org/
|
URL: http://www.openssl.org/
|
||||||
BuildRoot: %{_tmppath}/%{name}-%{version}-root
|
BuildRequires: gcc
|
||||||
BuildRequires: coreutils, krb5-devel, perl, perl-generators, sed, zlib-devel, /usr/bin/cmp
|
BuildRequires: coreutils, perl-interpreter, sed, zlib-devel, /usr/bin/cmp
|
||||||
BuildRequires: lksctp-tools-devel
|
BuildRequires: lksctp-tools-devel
|
||||||
BuildRequires: /usr/bin/rename
|
BuildRequires: /usr/bin/rename
|
||||||
BuildRequires: /usr/bin/pod2man
|
BuildRequires: /usr/bin/pod2man
|
||||||
Requires: coreutils, make
|
BuildRequires: /usr/sbin/sysctl
|
||||||
|
BuildRequires: perl(Test::Harness), perl(Test::More), perl(Math::BigInt)
|
||||||
|
BuildRequires: perl(Module::Load::Conditional), perl(File::Temp)
|
||||||
|
BuildRequires: perl(Time::HiRes)
|
||||||
|
BuildRequires: perl(FindBin), perl(lib), perl(File::Compare), perl(File::Copy)
|
||||||
|
Requires: coreutils
|
||||||
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
||||||
|
|
||||||
%description
|
%description
|
||||||
@ -107,12 +99,9 @@ protocols.
|
|||||||
|
|
||||||
%package libs
|
%package libs
|
||||||
Summary: A general purpose cryptography library with TLS implementation
|
Summary: A general purpose cryptography library with TLS implementation
|
||||||
Group: System Environment/Libraries
|
|
||||||
Requires: ca-certificates >= 2008-5
|
Requires: ca-certificates >= 2008-5
|
||||||
Requires: crypto-policies
|
Requires: crypto-policies >= 20180730
|
||||||
# Needed obsoletes due to the base/lib subpackage split
|
Recommends: openssl-pkcs11%{?_isa}
|
||||||
Obsoletes: openssl < 1:1.0.1-0.3.beta3
|
|
||||||
Obsoletes: openssl-fips < 1:1.0.1e-28
|
|
||||||
Provides: openssl-fips = %{epoch}:%{version}-%{release}
|
Provides: openssl-fips = %{epoch}:%{version}-%{release}
|
||||||
|
|
||||||
%description libs
|
%description libs
|
||||||
@ -122,9 +111,7 @@ support cryptographic algorithms and protocols.
|
|||||||
|
|
||||||
%package devel
|
%package devel
|
||||||
Summary: Files for development of applications which will use OpenSSL
|
Summary: Files for development of applications which will use OpenSSL
|
||||||
Group: Development/Libraries
|
|
||||||
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
|
||||||
Requires: krb5-devel%{?_isa}, zlib-devel%{?_isa}
|
|
||||||
Requires: pkgconfig
|
Requires: pkgconfig
|
||||||
|
|
||||||
%description devel
|
%description devel
|
||||||
@ -134,7 +121,6 @@ support various cryptographic algorithms and protocols.
|
|||||||
|
|
||||||
%package static
|
%package static
|
||||||
Summary: Libraries for static linking of applications which will use OpenSSL
|
Summary: Libraries for static linking of applications which will use OpenSSL
|
||||||
Group: Development/Libraries
|
|
||||||
Requires: %{name}-devel%{?_isa} = %{epoch}:%{version}-%{release}
|
Requires: %{name}-devel%{?_isa} = %{epoch}:%{version}-%{release}
|
||||||
|
|
||||||
%description static
|
%description static
|
||||||
@ -145,8 +131,7 @@ protocols.
|
|||||||
|
|
||||||
%package perl
|
%package perl
|
||||||
Summary: Perl scripts provided with OpenSSL
|
Summary: Perl scripts provided with OpenSSL
|
||||||
Group: Applications/Internet
|
Requires: perl-interpreter
|
||||||
Requires: perl
|
|
||||||
Requires: %{name}%{?_isa} = %{epoch}:%{version}-%{release}
|
Requires: %{name}%{?_isa} = %{epoch}:%{version}-%{release}
|
||||||
|
|
||||||
%description perl
|
%description perl
|
||||||
@ -161,64 +146,46 @@ from other formats to the formats used by the OpenSSL toolkit.
|
|||||||
# The tarball has already the sources removed.
|
# The tarball has already the sources removed.
|
||||||
%{SOURCE1} > /dev/null
|
%{SOURCE1} > /dev/null
|
||||||
|
|
||||||
cp %{SOURCE12} %{SOURCE13} crypto/ec/
|
cp %{SOURCE12} crypto/ec/
|
||||||
|
cp %{SOURCE13} test/
|
||||||
|
|
||||||
%patch1 -p1 -b .rpmbuild
|
%patch1 -p1 -b .build %{?_rawbuild}
|
||||||
%patch2 -p1 -b .defaults
|
%patch2 -p1 -b .defaults
|
||||||
%patch4 -p1 -b .enginesdir %{?_rawbuild}
|
%patch3 -p1 -b .no-html %{?_rawbuild}
|
||||||
%patch5 -p1 -b .no-rpath
|
%patch4 -p1 -b .man-rename
|
||||||
%patch6 -p1 -b .use-localhost
|
|
||||||
%patch7 -p1 -b .timezone
|
|
||||||
%patch8 -p1 -b .perlfind %{?_rawbuild}
|
|
||||||
%patch9 -p1 -b .aliasing
|
|
||||||
|
|
||||||
%patch23 -p1 -b .default-paths
|
%patch21 -p1 -b .issuer-hash
|
||||||
%patch24 -p1 -b .issuer-hash
|
|
||||||
|
|
||||||
%patch33 -p1 -b .ca-dir
|
%patch31 -p1 -b .conf-paths
|
||||||
%patch34 -p1 -b .x509
|
%patch32 -p1 -b .version-add-engines
|
||||||
%patch35 -p1 -b .version-add-engines
|
%patch33 -p1 -b .dgst
|
||||||
%patch39 -p1 -b .ipv6-apps
|
%patch36 -p1 -b .no-brainpool
|
||||||
%patch40 -p1 -b .fips
|
%patch37 -p1 -b .curves
|
||||||
%patch45 -p1 -b .env-zlib
|
%patch38 -p1 -b .no-weak-verify
|
||||||
%patch47 -p1 -b .warning
|
%patch40 -p1 -b .disable-ssl3
|
||||||
%patch49 -p1 -b .algo-doc
|
%patch41 -p1 -b .system-cipherlist
|
||||||
%patch50 -p1 -b .dtls1-abi
|
%patch42 -p1 -b .fips
|
||||||
%patch51 -p1 -b .version
|
%patch44 -p1 -b .version-override
|
||||||
%patch56 -p1 -b .x931
|
%patch45 -p1 -b .weak-ciphers
|
||||||
%patch58 -p1 -b .md5-allow
|
%patch46 -p1 -b .seclevel
|
||||||
%patch60 -p1 -b .dgst
|
%patch47 -p1 -b .ts-sha256-default
|
||||||
%patch63 -p1 -b .starttls
|
%patch48 -p1 -b .fips-post-rand
|
||||||
%patch65 -p1 -b .chil
|
%patch49 -p1 -b .evp-kdf
|
||||||
%patch66 -p1 -b .pkgconfig
|
%patch50 -p1 -b .ssh-kdf
|
||||||
%patch68 -p1 -b .secure-getenv
|
%patch51 -p1 -b .intel-cet
|
||||||
%patch70 -p1 -b .fips-ec
|
%patch52 -p1 -b .s390x-update
|
||||||
%patch71 -p1 -b .manfix
|
%patch53 -p1 -b .crng-test
|
||||||
%patch72 -p1 -b .fips-ctor
|
%patch55 -p1 -b .arm-update
|
||||||
%patch73 -p1 -b .suiteb
|
%patch56 -p1 -b .s390x-ecc
|
||||||
%patch74 -p1 -b .no-md5-verify
|
%patch60 -p1 -b .krb5-kdf
|
||||||
%patch75 -p1 -b .compat
|
%patch61 -p1 -b .edk2-build
|
||||||
%patch76 -p1 -b .fips-reqs
|
%patch62 -p1 -b .fips-curves
|
||||||
%patch78 -p1 -b .cc-reqs
|
%patch65 -p1 -b .drbg-selftest
|
||||||
%patch90 -p1 -b .enc-fail
|
%patch66 -p1 -b .fips-dh
|
||||||
%patch92 -p1 -b .system
|
%patch67 -p1 -b .kdf-selftest
|
||||||
%patch93 -p1 -b .v2v3
|
%patch69 -p1 -b .alpn-cb
|
||||||
%patch94 -p1 -b .secp256k1
|
%patch70 -p1 -b .rewire-fips-drbg
|
||||||
%patch95 -p1 -b .nistp224
|
|
||||||
%patch96 -p1 -b .speed-doc
|
|
||||||
|
|
||||||
%patch80 -p1 -b .wrap
|
|
||||||
%patch81 -p1 -b .padlock64
|
|
||||||
%patch82 -p1 -b .trusted-first
|
|
||||||
|
|
||||||
sed -i 's/SHLIB_VERSION_NUMBER "1.0.0"/SHLIB_VERSION_NUMBER "%{version}"/' crypto/opensslv.h
|
|
||||||
|
|
||||||
# Modify the various perl scripts to reference perl in the right location.
|
|
||||||
perl util/perlpath.pl `dirname %{__perl}`
|
|
||||||
|
|
||||||
# Generate a table with the compile settings for my perusal.
|
|
||||||
touch Makefile
|
|
||||||
make TABLE PERL=%{__perl}
|
|
||||||
|
|
||||||
%build
|
%build
|
||||||
# Figure out which flags we want to use.
|
# Figure out which flags we want to use.
|
||||||
@ -276,6 +243,17 @@ sslarch="linux64-mips64 -mips64r2"
|
|||||||
%ifarch mips64el
|
%ifarch mips64el
|
||||||
sslflags=enable-ec_nistp_64_gcc_128
|
sslflags=enable-ec_nistp_64_gcc_128
|
||||||
%endif
|
%endif
|
||||||
|
%ifarch riscv64
|
||||||
|
sslarch=linux-generic64
|
||||||
|
%endif
|
||||||
|
|
||||||
|
# Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
|
||||||
|
# marked as not requiring an executable stack.
|
||||||
|
# Also add -DPURIFY to make using valgrind with openssl easier as we do not
|
||||||
|
# want to depend on the uninitialized memory as a source of entropy anyway.
|
||||||
|
RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -Wa,--generate-missing-build-notes=yes -DPURIFY $RPM_LD_FLAGS"
|
||||||
|
|
||||||
|
export HASHBANGPERL=/usr/bin/perl
|
||||||
|
|
||||||
# ia64, x86_64, ppc are OK by default
|
# ia64, x86_64, ppc are OK by default
|
||||||
# Configure the build tree. Override OpenSSL defaults with known-good defaults
|
# Configure the build tree. Override OpenSSL defaults with known-good defaults
|
||||||
@ -284,23 +262,17 @@ sslflags=enable-ec_nistp_64_gcc_128
|
|||||||
./Configure \
|
./Configure \
|
||||||
--prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
|
--prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
|
||||||
--system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config \
|
--system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config \
|
||||||
zlib sctp enable-camellia enable-seed enable-tlsext enable-rfc3779 \
|
zlib enable-camellia enable-seed enable-rfc3779 enable-sctp \
|
||||||
enable-cms enable-md2 enable-rc5 \
|
enable-cms enable-md2 enable-rc5 enable-ssl3 enable-ssl3-method \
|
||||||
no-mdc2 no-ec2m no-gost no-srp \
|
enable-weak-ssl-ciphers \
|
||||||
--with-krb5-flavor=MIT --enginesdir=%{_libdir}/openssl/engines \
|
no-mdc2 no-ec2m no-sm2 no-sm4 \
|
||||||
--with-krb5-dir=/usr shared ${sslarch} %{?!nofips:fips}
|
shared ${sslarch} $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\""'
|
||||||
|
|
||||||
|
# Do not run this in a production package the FIPS symbols must be patched-in
|
||||||
|
#util/mkdef.pl crypto update
|
||||||
|
|
||||||
# Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
|
|
||||||
# marked as not requiring an executable stack.
|
|
||||||
# Also add -DPURIFY to make using valgrind with openssl easier as we do not
|
|
||||||
# want to depend on the uninitialized memory as a source of entropy anyway.
|
|
||||||
RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -DPURIFY"
|
|
||||||
make depend
|
|
||||||
make all
|
make all
|
||||||
|
|
||||||
# Generate hashes for the included certs.
|
|
||||||
make rehash
|
|
||||||
|
|
||||||
# Overwrite FIPS README
|
# Overwrite FIPS README
|
||||||
cp -f %{SOURCE11} .
|
cp -f %{SOURCE11} .
|
||||||
|
|
||||||
@ -312,24 +284,27 @@ done
|
|||||||
%check
|
%check
|
||||||
# Verify that what was compiled actually works.
|
# Verify that what was compiled actually works.
|
||||||
|
|
||||||
# We must revert patch33 before tests otherwise they will fail
|
# Hack - either enable SCTP AUTH chunks in kernel or disable sctp for check
|
||||||
patch -p1 -R < %{PATCH33}
|
(sysctl net.sctp.addip_enable=1 && sysctl net.sctp.auth_enable=1) || \
|
||||||
|
(echo 'Failed to enable SCTP AUTH chunks, disabling SCTP for tests...' &&
|
||||||
|
sed '/"zlib-dynamic" => "default",/a\ \ "sctp" => "default",' configdata.pm > configdata.pm.new && \
|
||||||
|
touch -r configdata.pm configdata.pm.new && \
|
||||||
|
mv -f configdata.pm.new configdata.pm)
|
||||||
|
|
||||||
|
# We must revert patch31 before tests otherwise they will fail
|
||||||
|
patch -p1 -R < %{PATCH31}
|
||||||
|
|
||||||
LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
|
LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
|
||||||
export LD_LIBRARY_PATH
|
export LD_LIBRARY_PATH
|
||||||
|
crypto/fips/fips_standalone_hmac libcrypto.so.%{soversion} >.libcrypto.so.%{soversion}.hmac
|
||||||
|
ln -s .libcrypto.so.%{soversion}.hmac .libcrypto.so.hmac
|
||||||
|
crypto/fips/fips_standalone_hmac libssl.so.%{soversion} >.libssl.so.%{soversion}.hmac
|
||||||
|
ln -s .libssl.so.%{soversion}.hmac .libssl.so.hmac
|
||||||
OPENSSL_ENABLE_MD5_VERIFY=
|
OPENSSL_ENABLE_MD5_VERIFY=
|
||||||
export OPENSSL_ENABLE_MD5_VERIFY
|
export OPENSSL_ENABLE_MD5_VERIFY
|
||||||
make -C test apps tests
|
OPENSSL_SYSTEM_CIPHERS_OVERRIDE=xyz_nonexistent_file
|
||||||
%{__cc} -o openssl-thread-test \
|
export OPENSSL_SYSTEM_CIPHERS_OVERRIDE
|
||||||
`krb5-config --cflags` \
|
make test
|
||||||
-I./include \
|
|
||||||
$RPM_OPT_FLAGS \
|
|
||||||
%{SOURCE8} \
|
|
||||||
-L. \
|
|
||||||
-lssl -lcrypto \
|
|
||||||
`krb5-config --libs` \
|
|
||||||
-lpthread -lz -ldl
|
|
||||||
./openssl-thread-test --threads %{thread_test_threads}
|
|
||||||
|
|
||||||
# Add generation of HMAC checksum of the final stripped library
|
# Add generation of HMAC checksum of the final stripped library
|
||||||
%define __spec_install_post \
|
%define __spec_install_post \
|
||||||
@ -347,14 +322,9 @@ make -C test apps tests
|
|||||||
%install
|
%install
|
||||||
[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
|
[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
|
||||||
# Install OpenSSL.
|
# Install OpenSSL.
|
||||||
install -d $RPM_BUILD_ROOT{%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl}
|
install -d $RPM_BUILD_ROOT{%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl,%{_pkgdocdir}}
|
||||||
make INSTALL_PREFIX=$RPM_BUILD_ROOT install
|
%make_install
|
||||||
make INSTALL_PREFIX=$RPM_BUILD_ROOT install_docs
|
|
||||||
mv $RPM_BUILD_ROOT%{_libdir}/engines $RPM_BUILD_ROOT%{_libdir}/openssl
|
|
||||||
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/man/* $RPM_BUILD_ROOT%{_mandir}/
|
|
||||||
rmdir $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/man
|
|
||||||
rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT%{_libdir}/*.so.%{soversion}
|
rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT%{_libdir}/*.so.%{soversion}
|
||||||
mkdir $RPM_BUILD_ROOT/%{_lib}
|
|
||||||
for lib in $RPM_BUILD_ROOT%{_libdir}/*.so.%{version} ; do
|
for lib in $RPM_BUILD_ROOT%{_libdir}/*.so.%{version} ; do
|
||||||
chmod 755 ${lib}
|
chmod 755 ${lib}
|
||||||
ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`
|
ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`
|
||||||
@ -364,16 +334,13 @@ done
|
|||||||
# Install a makefile for generating keys and self-signed certs, and a script
|
# Install a makefile for generating keys and self-signed certs, and a script
|
||||||
# for generating them on the fly.
|
# for generating them on the fly.
|
||||||
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
|
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
|
||||||
install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/Makefile
|
install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_pkgdocdir}/Makefile.certificate
|
||||||
install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/make-dummy-cert
|
install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/make-dummy-cert
|
||||||
install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs/renew-dummy-cert
|
install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_bindir}/renew-dummy-cert
|
||||||
|
|
||||||
# Make sure we actually include the headers we built against.
|
# Move runable perl scripts to bindir
|
||||||
for header in $RPM_BUILD_ROOT%{_includedir}/openssl/* ; do
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/*.pl $RPM_BUILD_ROOT%{_bindir}
|
||||||
if [ -f ${header} -a -f include/openssl/$(basename ${header}) ] ; then
|
mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/tsget $RPM_BUILD_ROOT%{_bindir}
|
||||||
install -m644 include/openssl/`basename ${header}` ${header}
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
|
|
||||||
# Rename man pages so that they don't conflict with other system man pages.
|
# Rename man pages so that they don't conflict with other system man pages.
|
||||||
pushd $RPM_BUILD_ROOT%{_mandir}
|
pushd $RPM_BUILD_ROOT%{_mandir}
|
||||||
@ -389,23 +356,27 @@ for manpage in man*/* ; do
|
|||||||
done
|
done
|
||||||
for conflict in passwd rand ; do
|
for conflict in passwd rand ; do
|
||||||
rename ${conflict} ssl${conflict} man*/${conflict}*
|
rename ${conflict} ssl${conflict} man*/${conflict}*
|
||||||
|
# Fix dangling symlinks
|
||||||
|
manpage=man1/openssl-${conflict}.*
|
||||||
|
if [ -L ${manpage} ] ; then
|
||||||
|
ln -snf ssl${conflict}.1ssl ${manpage}
|
||||||
|
fi
|
||||||
done
|
done
|
||||||
popd
|
popd
|
||||||
|
|
||||||
# Pick a CA script.
|
|
||||||
pushd $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc
|
|
||||||
mv CA.sh CA
|
|
||||||
popd
|
|
||||||
|
|
||||||
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
|
||||||
mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
|
mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
|
||||||
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
|
||||||
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
|
||||||
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
|
mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
|
||||||
|
|
||||||
# Ensure the openssl.cnf timestamp is identical across builds to avoid
|
# Ensure the config file timestamps are identical across builds to avoid
|
||||||
# mulitlib conflicts and unnecessary renames on upgrade
|
# mulitlib conflicts and unnecessary renames on upgrade
|
||||||
touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
|
touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
|
||||||
|
touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf
|
||||||
|
|
||||||
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf.dist
|
||||||
|
rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf.dist
|
||||||
|
|
||||||
# Determine which arch opensslconf.h is going to try to #include.
|
# Determine which arch opensslconf.h is going to try to #include.
|
||||||
basearch=%{_arch}
|
basearch=%{_arch}
|
||||||
@ -419,6 +390,13 @@ basearch=sparc
|
|||||||
basearch=sparc64
|
basearch=sparc64
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
|
# Next step of gradual disablement of SSL3.
|
||||||
|
# Make SSL3 disappear to newly built dependencies.
|
||||||
|
sed -i '/^\#ifndef OPENSSL_NO_SSL_TRACE/i\
|
||||||
|
#ifndef OPENSSL_NO_SSL3\
|
||||||
|
# define OPENSSL_NO_SSL3\
|
||||||
|
#endif' $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
|
||||||
|
|
||||||
%ifarch %{multilib_arches}
|
%ifarch %{multilib_arches}
|
||||||
# Do an opensslconf.h switcheroo to avoid file conflicts on systems where you
|
# Do an opensslconf.h switcheroo to avoid file conflicts on systems where you
|
||||||
# can have both a 32- and 64-bit version of the library, and they each need
|
# can have both a 32- and 64-bit version of the library, and they each need
|
||||||
@ -430,40 +408,27 @@ cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h >> \
|
|||||||
install -m644 %{SOURCE9} \
|
install -m644 %{SOURCE9} \
|
||||||
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
|
$RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
|
||||||
%endif
|
%endif
|
||||||
|
LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
|
||||||
# Remove unused files from upstream fips support
|
export LD_LIBRARY_PATH
|
||||||
rm -rf $RPM_BUILD_ROOT/%{_bindir}/openssl_fips_fingerprint
|
|
||||||
rm -rf $RPM_BUILD_ROOT/%{_libdir}/fips_premain.*
|
|
||||||
rm -rf $RPM_BUILD_ROOT/%{_libdir}/fipscanister.*
|
|
||||||
|
|
||||||
%clean
|
|
||||||
[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
|
|
||||||
|
|
||||||
%files
|
%files
|
||||||
%defattr(-,root,root)
|
|
||||||
%{!?_licensedir:%global license %%doc}
|
%{!?_licensedir:%global license %%doc}
|
||||||
%license LICENSE
|
%license LICENSE
|
||||||
%doc FAQ NEWS README README.FIPS
|
%doc FAQ NEWS README README.FIPS
|
||||||
%{_sysconfdir}/pki/tls/certs/make-dummy-cert
|
%{_bindir}/make-dummy-cert
|
||||||
%{_sysconfdir}/pki/tls/certs/renew-dummy-cert
|
%{_bindir}/renew-dummy-cert
|
||||||
%{_sysconfdir}/pki/tls/certs/Makefile
|
%{_bindir}/openssl
|
||||||
%{_sysconfdir}/pki/tls/misc/CA
|
%{_mandir}/man1*/*
|
||||||
%dir %{_sysconfdir}/pki/CA
|
%{_mandir}/man5*/*
|
||||||
%dir %{_sysconfdir}/pki/CA/private
|
%{_mandir}/man7*/*
|
||||||
%dir %{_sysconfdir}/pki/CA/certs
|
%{_pkgdocdir}/Makefile.certificate
|
||||||
%dir %{_sysconfdir}/pki/CA/crl
|
|
||||||
%dir %{_sysconfdir}/pki/CA/newcerts
|
|
||||||
%{_sysconfdir}/pki/tls/misc/c_*
|
|
||||||
%attr(0755,root,root) %{_bindir}/openssl
|
|
||||||
%attr(0644,root,root) %{_mandir}/man1*/*
|
|
||||||
%exclude %{_mandir}/man1*/*.pl*
|
%exclude %{_mandir}/man1*/*.pl*
|
||||||
%exclude %{_mandir}/man1*/c_rehash*
|
%exclude %{_mandir}/man1*/c_rehash*
|
||||||
|
%exclude %{_mandir}/man1*/openssl-c_rehash*
|
||||||
%exclude %{_mandir}/man1*/tsget*
|
%exclude %{_mandir}/man1*/tsget*
|
||||||
%attr(0644,root,root) %{_mandir}/man5*/*
|
%exclude %{_mandir}/man1*/openssl-tsget*
|
||||||
%attr(0644,root,root) %{_mandir}/man7*/*
|
|
||||||
|
|
||||||
%files libs
|
%files libs
|
||||||
%defattr(-,root,root)
|
|
||||||
%{!?_licensedir:%global license %%doc}
|
%{!?_licensedir:%global license %%doc}
|
||||||
%license LICENSE
|
%license LICENSE
|
||||||
%dir %{_sysconfdir}/pki/tls
|
%dir %{_sysconfdir}/pki/tls
|
||||||
@ -471,40 +436,358 @@ rm -rf $RPM_BUILD_ROOT/%{_libdir}/fipscanister.*
|
|||||||
%dir %{_sysconfdir}/pki/tls/misc
|
%dir %{_sysconfdir}/pki/tls/misc
|
||||||
%dir %{_sysconfdir}/pki/tls/private
|
%dir %{_sysconfdir}/pki/tls/private
|
||||||
%config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
|
%config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
|
||||||
|
%config(noreplace) %{_sysconfdir}/pki/tls/ct_log_list.cnf
|
||||||
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{version}
|
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{version}
|
||||||
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{soversion}
|
%attr(0755,root,root) %{_libdir}/libcrypto.so.%{soversion}
|
||||||
%attr(0755,root,root) %{_libdir}/libssl.so.%{version}
|
%attr(0755,root,root) %{_libdir}/libssl.so.%{version}
|
||||||
%attr(0755,root,root) %{_libdir}/libssl.so.%{soversion}
|
%attr(0755,root,root) %{_libdir}/libssl.so.%{soversion}
|
||||||
%attr(0644,root,root) %{_libdir}/.libcrypto.so.*.hmac
|
%attr(0644,root,root) %{_libdir}/.libcrypto.so.*.hmac
|
||||||
%attr(0644,root,root) %{_libdir}/.libssl.so.*.hmac
|
%attr(0644,root,root) %{_libdir}/.libssl.so.*.hmac
|
||||||
%attr(0755,root,root) %{_libdir}/openssl
|
%attr(0755,root,root) %{_libdir}/engines-%{soversion}
|
||||||
|
|
||||||
%files devel
|
%files devel
|
||||||
%defattr(-,root,root)
|
%doc CHANGES doc/dir-locals.example.el doc/openssl-c-indent.el
|
||||||
%doc doc/c-indentation.el doc/openssl.txt CHANGES
|
|
||||||
%{_prefix}/include/openssl
|
%{_prefix}/include/openssl
|
||||||
%attr(0755,root,root) %{_libdir}/*.so
|
%{_libdir}/*.so
|
||||||
%attr(0644,root,root) %{_mandir}/man3*/*
|
%{_mandir}/man3*/*
|
||||||
%attr(0644,root,root) %{_libdir}/pkgconfig/*.pc
|
%{_libdir}/pkgconfig/*.pc
|
||||||
|
|
||||||
%files static
|
%files static
|
||||||
%defattr(-,root,root)
|
%{_libdir}/*.a
|
||||||
%attr(0644,root,root) %{_libdir}/*.a
|
|
||||||
|
|
||||||
%files perl
|
%files perl
|
||||||
%defattr(-,root,root)
|
%{_bindir}/c_rehash
|
||||||
%attr(0755,root,root) %{_bindir}/c_rehash
|
%{_bindir}/*.pl
|
||||||
%attr(0644,root,root) %{_mandir}/man1*/*.pl*
|
%{_bindir}/tsget
|
||||||
%attr(0644,root,root) %{_mandir}/man1*/c_rehash*
|
%{_mandir}/man1*/*.pl*
|
||||||
%attr(0644,root,root) %{_mandir}/man1*/tsget*
|
%{_mandir}/man1*/c_rehash*
|
||||||
%{_sysconfdir}/pki/tls/misc/*.pl
|
%{_mandir}/man1*/openssl-c_rehash*
|
||||||
%{_sysconfdir}/pki/tls/misc/tsget
|
%{_mandir}/man1*/tsget*
|
||||||
|
%{_mandir}/man1*/openssl-tsget*
|
||||||
|
%dir %{_sysconfdir}/pki/CA
|
||||||
|
%dir %{_sysconfdir}/pki/CA/private
|
||||||
|
%dir %{_sysconfdir}/pki/CA/certs
|
||||||
|
%dir %{_sysconfdir}/pki/CA/crl
|
||||||
|
%dir %{_sysconfdir}/pki/CA/newcerts
|
||||||
|
|
||||||
%post libs -p /sbin/ldconfig
|
%ldconfig_scriptlets libs
|
||||||
|
|
||||||
%postun libs -p /sbin/ldconfig
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Nov 9 2020 Sahana Prasad <sahana@redhat.com> - 1.1.1h-1
|
||||||
|
- Upgrade to version 1.1.1.h
|
||||||
|
|
||||||
|
* Tue Jul 28 2020 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1g-15
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Jul 21 2020 Tom Stellard <tstellar@redhat.com> - 1:1.1.1g-14
|
||||||
|
- Use make macros
|
||||||
|
- https://fedoraproject.org/wiki/Changes/UseMakeBuildInstallMacro
|
||||||
|
|
||||||
|
* Mon Jul 20 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-13
|
||||||
|
- Additional FIPS mode check for EC key generation
|
||||||
|
|
||||||
|
* Fri Jul 17 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-12
|
||||||
|
- Further changes for SP 800-56A rev3 requirements
|
||||||
|
|
||||||
|
* Mon Jun 22 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-11
|
||||||
|
- Drop long ago obsolete part of the FIPS patch
|
||||||
|
|
||||||
|
* Mon Jun 22 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-10
|
||||||
|
- Rewire FIPS_drbg API to use the RAND_DRBG
|
||||||
|
|
||||||
|
* Fri Jun 5 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-9
|
||||||
|
- Disallow dropping Extended Master Secret extension
|
||||||
|
on renegotiation
|
||||||
|
- Return alert from s_server if ALPN protocol does not match
|
||||||
|
- SHA1 is allowed in @SECLEVEL=2 only if allowed by
|
||||||
|
TLS SigAlgs configuration
|
||||||
|
|
||||||
|
* Wed Jun 3 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-8
|
||||||
|
- Add FIPS selftest for PBKDF2 and KBKDF
|
||||||
|
|
||||||
|
* Tue May 26 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-7
|
||||||
|
- Use the well known DH groups in TLS
|
||||||
|
|
||||||
|
* Mon May 25 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-6
|
||||||
|
- Allow only well known DH groups in the FIPS mode
|
||||||
|
|
||||||
|
* Thu May 21 2020 Adam Williamson <awilliam@redhat.com> - 1.1.1g-5
|
||||||
|
- Re-apply the change from -2 now we have fixed nosync to work with it
|
||||||
|
|
||||||
|
* Tue May 19 2020 Adam Williamson <awilliam@redhat.com> - 1.1.1g-4
|
||||||
|
- Revert the change from -2 as it seems to cause segfaults in systemd
|
||||||
|
|
||||||
|
* Mon May 18 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-3
|
||||||
|
- pull some fixes and improvements from RHEL-8
|
||||||
|
|
||||||
|
* Fri May 15 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-2
|
||||||
|
- FIPS module installed state definition is modified
|
||||||
|
|
||||||
|
* Thu Apr 23 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1g-1
|
||||||
|
- update to the 1.1.1g release
|
||||||
|
|
||||||
|
* Tue Apr 7 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1f-1
|
||||||
|
- update to the 1.1.1f release
|
||||||
|
|
||||||
|
* Thu Mar 26 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1e-2
|
||||||
|
- revert the unexpected EOF error reporting change as it is
|
||||||
|
too disruptive for the stable release branch
|
||||||
|
|
||||||
|
* Fri Mar 20 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1e-1
|
||||||
|
- update to the 1.1.1e release
|
||||||
|
- add selftest of the RAND_DRBG implementation
|
||||||
|
- fix incorrect error return value from FIPS_selftest_dsa
|
||||||
|
|
||||||
|
* Mon Feb 17 2020 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-7
|
||||||
|
- apply Intel CET support patches by hjl (#1788699)
|
||||||
|
|
||||||
|
* Wed Jan 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1d-6
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Nov 21 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-5
|
||||||
|
- allow zero length parameters in KDF_CTX_ctrl()
|
||||||
|
|
||||||
|
* Thu Nov 14 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-4
|
||||||
|
- backport of SSKDF from master
|
||||||
|
|
||||||
|
* Wed Nov 13 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-3
|
||||||
|
- backport of KBKDF and KRB5KDF from master
|
||||||
|
|
||||||
|
* Thu Oct 3 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-2
|
||||||
|
- re-enable the stitched AES-CBC-SHA implementations
|
||||||
|
- make AES-GCM work in FIPS mode again
|
||||||
|
- enable TLS-1.2 AES-CCM ciphers in FIPS mode
|
||||||
|
- fix openssl speed errors in FIPS mode
|
||||||
|
|
||||||
|
* Fri Sep 13 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1d-1
|
||||||
|
- update to the 1.1.1d release
|
||||||
|
|
||||||
|
* Fri Sep 6 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-6
|
||||||
|
- upstream fix for status request extension non-compliance (#1737471)
|
||||||
|
|
||||||
|
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1c-5
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
|
||||||
|
|
||||||
|
* Mon Jun 24 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-4
|
||||||
|
- do not try to use EC groups disallowed in FIPS mode
|
||||||
|
in TLS
|
||||||
|
- fix Valgrind regression with constant-time code
|
||||||
|
|
||||||
|
* Mon Jun 3 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-3
|
||||||
|
- add upstream patch to defer sending KeyUpdate after
|
||||||
|
pending writes are complete
|
||||||
|
|
||||||
|
* Thu May 30 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-2
|
||||||
|
- fix use of uninitialized memory
|
||||||
|
|
||||||
|
* Wed May 29 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-1
|
||||||
|
- update to the 1.1.1c release
|
||||||
|
|
||||||
|
* Fri May 10 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-10
|
||||||
|
- Another attempt at the AES-CCM regression fix
|
||||||
|
|
||||||
|
* Fri May 10 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-9
|
||||||
|
- Fix two small regressions
|
||||||
|
- Change the ts application default hash to SHA256
|
||||||
|
|
||||||
|
* Tue May 7 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-8
|
||||||
|
- FIPS compliance fixes
|
||||||
|
|
||||||
|
* Mon May 6 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-7
|
||||||
|
- add S390x chacha20-poly1305 assembler support from master branch
|
||||||
|
|
||||||
|
* Fri May 3 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-6
|
||||||
|
- apply new bugfixes from upstream 1.1.1 branch
|
||||||
|
|
||||||
|
* Tue Apr 16 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-5
|
||||||
|
- fix for BIO_get_mem_ptr() regression in 1.1.1b (#1691853)
|
||||||
|
|
||||||
|
* Wed Mar 27 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-4
|
||||||
|
- drop unused BuildRequires and Requires in the -devel subpackage
|
||||||
|
|
||||||
|
* Fri Mar 15 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-3
|
||||||
|
- fix regression in EVP_PBE_scrypt() (#1688284)
|
||||||
|
- fix incorrect help message in ca app (#1553206)
|
||||||
|
|
||||||
|
* Fri Mar 1 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-2
|
||||||
|
- use .include = syntax in the config file to allow it
|
||||||
|
to be parsed by 1.0.2 version (#1668916)
|
||||||
|
|
||||||
|
* Thu Feb 28 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-1
|
||||||
|
- update to the 1.1.1b release
|
||||||
|
- EVP_KDF API backport from master
|
||||||
|
- SSH KDF implementation for EVP_KDF API backport from master
|
||||||
|
|
||||||
|
* Fri Feb 01 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1a-2
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Jan 15 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1a-1
|
||||||
|
- update to the 1.1.1a release
|
||||||
|
|
||||||
|
* Fri Nov 9 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-7
|
||||||
|
- use /dev/urandom for seeding the RNG in FIPS POST
|
||||||
|
|
||||||
|
* Fri Oct 12 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-6
|
||||||
|
- fix SECLEVEL 3 support
|
||||||
|
- fix some issues found in Coverity scan
|
||||||
|
|
||||||
|
* Thu Sep 27 2018 Charalampos Stratakis <cstratak@redhat.com> - 1:1.1.1-5
|
||||||
|
- Correctly invoke sed for defining OPENSSL_NO_SSL3
|
||||||
|
|
||||||
|
* Thu Sep 27 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-4
|
||||||
|
- define OPENSSL_NO_SSL3 so the newly built dependencies do not
|
||||||
|
have access to SSL3 API calls anymore
|
||||||
|
|
||||||
|
* Mon Sep 17 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-3
|
||||||
|
- reinstate accidentally dropped patch for weak ciphersuites
|
||||||
|
|
||||||
|
* Fri Sep 14 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-2
|
||||||
|
- for consistent support of security policies we build
|
||||||
|
RC4 support in TLS (not default) and allow SHA1 in SECLEVEL 2
|
||||||
|
|
||||||
|
* Thu Sep 13 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-1
|
||||||
|
- update to the final 1.1.1 version
|
||||||
|
|
||||||
|
* Thu Sep 6 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre9.3
|
||||||
|
- do not try to initialize RNG in cleanup if it was not initialized
|
||||||
|
before (#1624554)
|
||||||
|
- use only /dev/urandom if getrandom() is not available
|
||||||
|
- disable SM4
|
||||||
|
|
||||||
|
* Wed Aug 29 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre9.2
|
||||||
|
- fix dangling symlinks to manual pages
|
||||||
|
- make SSLv3_method work
|
||||||
|
|
||||||
|
* Wed Aug 22 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre9.1
|
||||||
|
- update to the latest 1.1.1 beta version
|
||||||
|
|
||||||
|
* Mon Aug 13 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre8.4
|
||||||
|
- bidirectional shutdown fixes from upstream
|
||||||
|
|
||||||
|
* Mon Aug 13 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre8.3
|
||||||
|
- do not put error on stack when using fixed protocol version
|
||||||
|
with the default config (#1615098)
|
||||||
|
|
||||||
|
* Fri Jul 27 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre8.2
|
||||||
|
- load crypto policy config file from the default config
|
||||||
|
|
||||||
|
* Wed Jul 25 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre8
|
||||||
|
- update to the latest 1.1.1 beta version
|
||||||
|
|
||||||
|
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0h-6
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
|
||||||
|
|
||||||
|
* Tue Jun 19 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-5
|
||||||
|
- fix FIPS RSA key generation failure
|
||||||
|
|
||||||
|
* Mon Jun 4 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-4
|
||||||
|
- ppc64le is not multilib arch (#1584994)
|
||||||
|
|
||||||
|
* Tue Apr 3 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-3
|
||||||
|
- fix regression of c_rehash (#1562953)
|
||||||
|
|
||||||
|
* Thu Mar 29 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-2
|
||||||
|
- fix FIPS symbol versions
|
||||||
|
|
||||||
|
* Thu Mar 29 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-1
|
||||||
|
- update to upstream version 1.1.0h
|
||||||
|
- add Recommends for openssl-pkcs11
|
||||||
|
|
||||||
|
* Fri Feb 23 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-6
|
||||||
|
- one more try to apply RPM_LD_FLAGS properly (#1541033)
|
||||||
|
- dropped unneeded starttls xmpp patch (#1417017)
|
||||||
|
|
||||||
|
* Thu Feb 08 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0g-5
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Feb 1 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-4
|
||||||
|
- apply RPM_LD_FLAGS properly (#1541033)
|
||||||
|
|
||||||
|
* Thu Jan 11 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-3
|
||||||
|
- silence the .rnd write failure as that is auxiliary functionality (#1524833)
|
||||||
|
|
||||||
|
* Thu Dec 14 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-2
|
||||||
|
- put the Makefile.certificate in pkgdocdir and drop the requirement on make
|
||||||
|
|
||||||
|
* Fri Nov 3 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-1
|
||||||
|
- update to upstream version 1.1.0g
|
||||||
|
|
||||||
|
* Thu Aug 03 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0f-9
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
|
||||||
|
|
||||||
|
* Thu Jul 27 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0f-8
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
|
||||||
|
|
||||||
|
* Mon Jul 17 2017 Tomáš Mráz <tmraz@redhat.com> 1:1.1.0f-7
|
||||||
|
- make s_client and s_server work with -ssl3 option (#1471783)
|
||||||
|
|
||||||
|
* Thu Jul 13 2017 Petr Pisar <ppisar@redhat.com> - 1:1.1.0f-6
|
||||||
|
- perl dependency renamed to perl-interpreter
|
||||||
|
<https://fedoraproject.org/wiki/Changes/perl_Package_to_Install_Core_Modules>
|
||||||
|
|
||||||
|
* Mon Jun 26 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-5
|
||||||
|
- disable verification of all insecure hashes
|
||||||
|
|
||||||
|
* Fri Jun 23 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-4
|
||||||
|
- make DTLS work (#1462541)
|
||||||
|
|
||||||
|
* Thu Jun 15 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-3
|
||||||
|
- enable 3DES SSL ciphersuites, RC4 is kept disabled (#1453066)
|
||||||
|
|
||||||
|
* Mon Jun 5 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-2
|
||||||
|
- only release thread-local key if we created it (from upstream) (#1458775)
|
||||||
|
|
||||||
|
* Fri Jun 2 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-1
|
||||||
|
- update to upstream version 1.1.0f
|
||||||
|
- SRP and GOST is now allowed, note that GOST support requires
|
||||||
|
adding GOST engine which is not part of openssl anymore
|
||||||
|
|
||||||
|
* Thu Feb 16 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0e-1
|
||||||
|
- update to upstream version 1.1.0e
|
||||||
|
- add documentation of the PROFILE=SYSTEM special cipher string (#1420232)
|
||||||
|
|
||||||
|
* Sat Feb 11 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0d-3
|
||||||
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
|
||||||
|
|
||||||
|
* Wed Feb 1 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0d-2
|
||||||
|
- applied upstream fixes (fix regression in X509_CRL_digest)
|
||||||
|
|
||||||
|
* Thu Jan 26 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0d-1
|
||||||
|
- update to upstream version 1.1.0d
|
||||||
|
|
||||||
|
* Thu Dec 22 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-5
|
||||||
|
- preserve new line in fd BIO BIO_gets() as other BIOs do
|
||||||
|
|
||||||
|
* Fri Dec 2 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-4
|
||||||
|
- FIPS mode fixes for TLS
|
||||||
|
|
||||||
|
* Wed Nov 30 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-3
|
||||||
|
- revert SSL_read() behavior change - patch from upstream (#1394677)
|
||||||
|
- fix behavior on client certificate request in renegotiation (#1393579)
|
||||||
|
|
||||||
|
* Tue Nov 22 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-2
|
||||||
|
- EC curve NIST P-224 is now allowed, still kept disabled in TLS due
|
||||||
|
to less than optimal security
|
||||||
|
|
||||||
|
* Fri Nov 11 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-1
|
||||||
|
- update to upstream version 1.1.0c
|
||||||
|
|
||||||
|
* Fri Nov 4 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0b-4
|
||||||
|
- use a random seed if the supplied one did not generate valid
|
||||||
|
parameters in dsa_builtin_paramgen2()
|
||||||
|
|
||||||
|
* Wed Oct 12 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0b-3
|
||||||
|
- do not break contract on return value when using dsa_builtin_paramgen2()
|
||||||
|
|
||||||
|
* Wed Oct 12 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0b-2
|
||||||
|
- fix afalg failure on big endian
|
||||||
|
|
||||||
|
* Tue Oct 11 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0b-1
|
||||||
|
- update to upstream version 1.1.0b
|
||||||
|
|
||||||
|
* Fri Oct 07 2016 Richard W.M. Jones <rjones@redhat.com> - 1:1.0.2j-2
|
||||||
|
- Add flags for riscv64.
|
||||||
|
|
||||||
* Mon Sep 26 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2j-1
|
* Mon Sep 26 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2j-1
|
||||||
- minor upstream release 1.0.2j fixing regression from previous release
|
- minor upstream release 1.0.2j fixing regression from previous release
|
||||||
|
|
||||||
|
@ -18,16 +18,13 @@ if [ ! -f $PEM ]; then
|
|||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
let -a SERIAL=0x$(openssl x509 -in $PEM -noout -serial | cut -d= -f2)
|
|
||||||
let SERIAL++
|
|
||||||
|
|
||||||
umask 077
|
umask 077
|
||||||
|
|
||||||
OWNER=`ls -l $PEM | awk '{ printf "%s.%s", $3, $4; }'`
|
OWNER=`ls -l $PEM | awk '{ printf "%s.%s", $3, $4; }'`
|
||||||
|
|
||||||
openssl rsa -inform pem -in $PEM -out $KEY
|
openssl rsa -inform pem -in $PEM -out $KEY
|
||||||
openssl x509 -x509toreq -in $PEM -signkey $KEY -out $REQ
|
openssl x509 -x509toreq -in $PEM -signkey $KEY -out $REQ
|
||||||
openssl x509 -req -in $REQ -signkey $KEY -set_serial $SERIAL -days 365 \
|
openssl x509 -req -in $REQ -signkey $KEY -days 365 \
|
||||||
-extfile /etc/pki/tls/openssl.cnf -extensions v3_ca -out $CRT
|
-extfile /etc/pki/tls/openssl.cnf -extensions v3_ca -out $CRT
|
||||||
|
|
||||||
(cat $KEY ; echo "" ; cat $CRT) > $NEW
|
(cat $KEY ; echo "" ; cat $CRT) > $NEW
|
||||||
|
2
sources
2
sources
@ -1 +1 @@
|
|||||||
088e893a390e253a8897c3cb1b488a83 openssl-1.0.2j-hobbled.tar.xz
|
SHA512 (openssl-1.1.1h-hobbled.tar.xz) = 75e1d3f34f93462b97db92aa6538fd4f2f091ad717438e51d147508738be720d7d0bf4a9b1fda3a1943a4c13aae2a39da3add05f7da833b3c6de40a97bc97908
|
||||||
|
63
tests/simple-rsapss-test/Makefile
Normal file
63
tests/simple-rsapss-test/Makefile
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Makefile of /CoreOS/openssl/Sanity/simple-rsapss-test
|
||||||
|
# Description: Test if RSA-PSS signature scheme is supported
|
||||||
|
# Author: Hubert Kario <hkario@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
export TEST=/CoreOS/openssl/Sanity/simple-rsapss-test
|
||||||
|
export TESTVERSION=1.0
|
||||||
|
|
||||||
|
BUILT_FILES=
|
||||||
|
|
||||||
|
FILES=$(METADATA) runtest.sh Makefile PURPOSE
|
||||||
|
|
||||||
|
.PHONY: all install download clean
|
||||||
|
|
||||||
|
run: $(FILES) build
|
||||||
|
./runtest.sh
|
||||||
|
|
||||||
|
build: $(BUILT_FILES)
|
||||||
|
test -x runtest.sh || chmod a+x runtest.sh
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f *~ $(BUILT_FILES)
|
||||||
|
|
||||||
|
|
||||||
|
-include /usr/share/rhts/lib/rhts-make.include
|
||||||
|
|
||||||
|
$(METADATA): Makefile
|
||||||
|
@echo "Owner: Hubert Kario <hkario@redhat.com>" > $(METADATA)
|
||||||
|
@echo "Name: $(TEST)" >> $(METADATA)
|
||||||
|
@echo "TestVersion: $(TESTVERSION)" >> $(METADATA)
|
||||||
|
@echo "Path: $(TEST_DIR)" >> $(METADATA)
|
||||||
|
@echo "Description: Test if RSA-PSS signature scheme is supported" >> $(METADATA)
|
||||||
|
@echo "Type: Sanity" >> $(METADATA)
|
||||||
|
@echo "TestTime: 1m" >> $(METADATA)
|
||||||
|
@echo "RunFor: openssl" >> $(METADATA)
|
||||||
|
@echo "Requires: openssl man man-db" >> $(METADATA)
|
||||||
|
@echo "Priority: Normal" >> $(METADATA)
|
||||||
|
@echo "License: GPLv2" >> $(METADATA)
|
||||||
|
@echo "Confidential: no" >> $(METADATA)
|
||||||
|
@echo "Destructive: no" >> $(METADATA)
|
||||||
|
|
||||||
|
rhts-lint $(METADATA)
|
3
tests/simple-rsapss-test/PURPOSE
Normal file
3
tests/simple-rsapss-test/PURPOSE
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
PURPOSE of /CoreOS/openssl/Sanity/simple-rsapss-test
|
||||||
|
Description: Test if RSA-PSS signature scheme is supported
|
||||||
|
Author: Hubert Kario <hkario@redhat.com>
|
74
tests/simple-rsapss-test/runtest.sh
Executable file
74
tests/simple-rsapss-test/runtest.sh
Executable file
@ -0,0 +1,74 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# runtest.sh of /CoreOS/openssl/Sanity/simple-rsapss-test
|
||||||
|
# Description: Test if RSA-PSS signature scheme is supported
|
||||||
|
# Author: Hubert Kario <hkario@redhat.com>
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
#
|
||||||
|
# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
|
||||||
|
#
|
||||||
|
# This copyrighted material is made available to anyone wishing
|
||||||
|
# to use, modify, copy, or redistribute it subject to the terms
|
||||||
|
# and conditions of the GNU General Public License version 2.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be
|
||||||
|
# useful, but WITHOUT ANY WARRANTY; without even the implied
|
||||||
|
# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
|
||||||
|
# PURPOSE. See the GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public
|
||||||
|
# License along with this program; if not, write to the Free
|
||||||
|
# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
||||||
|
# Boston, MA 02110-1301, USA.
|
||||||
|
#
|
||||||
|
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
|
# Include Beaker environment
|
||||||
|
. /usr/share/beakerlib/beakerlib.sh || exit 1
|
||||||
|
|
||||||
|
PACKAGE="openssl"
|
||||||
|
|
||||||
|
PUB_KEY="rsa_pubkey.pem"
|
||||||
|
PRIV_KEY="rsa_key.pem"
|
||||||
|
FILE="text.txt"
|
||||||
|
SIG="text.sig"
|
||||||
|
|
||||||
|
rlJournalStart
|
||||||
|
rlPhaseStartSetup
|
||||||
|
rlAssertRpm $PACKAGE
|
||||||
|
rlRun "TmpDir=\$(mktemp -d)" 0 "Creating tmp directory"
|
||||||
|
rlRun "pushd $TmpDir"
|
||||||
|
rlRun "openssl genrsa -out $PRIV_KEY 2048" 0 "Generate RSA key"
|
||||||
|
rlRun "openssl rsa -in $PRIV_KEY -out $PUB_KEY -pubout" 0 "Split the public key from private key"
|
||||||
|
rlRun "echo 'sign me!' > $FILE" 0 "Create file for signing"
|
||||||
|
rlAssertExists $FILE
|
||||||
|
rlAssertExists $PRIV_KEY
|
||||||
|
rlAssertExists $PUB_KEY
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest "Test RSA-PSS padding mode"
|
||||||
|
set -o pipefail
|
||||||
|
rlRun "openssl dgst -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:32 -out $SIG -sign $PRIV_KEY $FILE" 0 "Sign the file"
|
||||||
|
rlRun "openssl dgst -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:32 -prverify $PRIV_KEY -signature $SIG $FILE | grep 'Verified OK'" 0 "Verify the signature using the private key file"
|
||||||
|
rlRun "openssl dgst -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:32 -verify $PUB_KEY -signature $SIG $FILE | grep 'Verified OK'" 0 "Verify the signature using public key file"
|
||||||
|
rlRun "openssl dgst -sha256 -sigopt rsa_padding_mode:pss -prverify $PRIV_KEY -signature $SIG $FILE | grep 'Verified OK'" 0 "Verify the signature using the private key file without specifying salt length"
|
||||||
|
rlRun "openssl dgst -sha256 -sigopt rsa_padding_mode:pss -verify $PUB_KEY -signature $SIG $FILE | grep 'Verified OK'" 0 "Verify the signature using public key file without specifying salt length"
|
||||||
|
set +o pipefail
|
||||||
|
rlRun "sed -i 's/sign/Sign/' $FILE" 0 "Modify signed file"
|
||||||
|
rlRun "openssl dgst -sha256 -sigopt rsa_padding_mode:pss -verify $PUB_KEY -signature $SIG $FILE | grep 'Verification Failure'" 0 "Verify that the signature is no longer valid"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartTest "Documentation check"
|
||||||
|
[ -e "$(rpm -ql openssl | grep dgst)"] && rlRun "man dgst | col -b | grep -- -sigopt" 0 "Check if -sigopt option is described in man page"
|
||||||
|
rlRun "openssl dgst -help 2>&1 | grep -- -sigopt" 0 "Check if -sigopt option is present in help message"
|
||||||
|
rlPhaseEnd
|
||||||
|
|
||||||
|
rlPhaseStartCleanup
|
||||||
|
rlRun "popd"
|
||||||
|
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
|
||||||
|
rlPhaseEnd
|
||||||
|
rlJournalPrintText
|
||||||
|
rlJournalEnd
|
15
tests/tests.yml
Normal file
15
tests/tests.yml
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
---
|
||||||
|
# This first play always runs on the local staging system
|
||||||
|
- hosts: localhost
|
||||||
|
roles:
|
||||||
|
- role: standard-test-beakerlib
|
||||||
|
tags:
|
||||||
|
- classic
|
||||||
|
- container
|
||||||
|
tests:
|
||||||
|
- simple-rsapss-test
|
||||||
|
required_packages:
|
||||||
|
- findutils # beakerlib needs find command
|
||||||
|
- man # needed by simple-rsapss-test
|
||||||
|
- man-db # needed by simple-rsapss-test
|
||||||
|
- openssl # needed by simple-rsapss-test
|
18
tests/tests_python.yml
Normal file
18
tests/tests_python.yml
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
---
|
||||||
|
- hosts: localhost
|
||||||
|
roles:
|
||||||
|
- role: standard-test-basic
|
||||||
|
tags:
|
||||||
|
- classic
|
||||||
|
repositories:
|
||||||
|
- repo: "https://src.fedoraproject.org/tests/python.git"
|
||||||
|
dest: "python"
|
||||||
|
tests:
|
||||||
|
- python_selftest:
|
||||||
|
dir: python/selftest
|
||||||
|
run: X="test_ssl test_asyncio test_hashlib test_ftplib test_httplib test_imaplib test_logging test_nntplib test_poplib test_urllib2_localnet test_urllib test_xmlrpc" ./parallel.sh
|
||||||
|
required_packages:
|
||||||
|
- gcc # for extension building in venv and selftest
|
||||||
|
- python3-tkinter # for selftest
|
||||||
|
- python3-test # for selftest
|
||||||
|
- python3-rpm-macros # for dynamic python version
|
Loading…
Reference in New Issue
Block a user