Go to file
Tomas Mraz bfc1772d6e Multiple security issues fixed.
- fix CVE-2016-2105 - possible overflow in base64 encoding
- fix CVE-2016-2106 - possible overflow in EVP_EncryptUpdate()
- fix CVE-2016-2107 - padding oracle in stitched AES-NI CBC-MAC
- fix CVE-2016-2108 - memory corruption in ASN.1 encoder
- fix CVE-2016-2109 - possible DoS when reading ASN.1 data from BIO
2016-05-03 18:29:16 +02:00
.gitignore new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00
Makefile.certificate make expiration and key length changeable by DAYS and KEYLEN 2014-02-06 18:07:59 +01:00
README.FIPS Remove obsolete sentence. 2014-02-13 16:17:58 +01:00
ec_curve.c add back support for secp521r1 EC curve 2013-11-08 18:16:49 +01:00
ectest.c add back support for secp521r1 EC curve 2013-11-08 18:23:00 +01:00
fixpatch New upstream release from the 1.0.1 branch, ABI compatible 2012-02-07 13:46:42 +01:00
hobble-openssl only ECC NIST Suite B curves support 2013-10-16 14:37:51 +02:00
make-dummy-cert - abort if selftests failed and random number generator is polled 2009-06-30 11:17:45 +00:00
openssl-0.9.6-x509.patch auto-import openssl-0.9.6b-18 from openssl-0.9.6b-18.src.rpm 2004-09-09 09:41:24 +00:00
openssl-0.9.8a-no-rpath.patch - don't set -rpath for openssl binary 2005-11-16 21:45:59 +00:00
openssl-0.9.8b-test-use-localhost.patch - use localhost in testsuite, hopefully fixes slow build in koji 2007-08-03 12:16:54 +00:00
openssl-0.9.8j-version-add-engines.patch - new upstream version with necessary soname bump (#455753) 2009-01-15 09:10:25 +00:00
openssl-1.0.0-beta4-ca-dir.patch - update to new upstream version, no soname bump needed 2009-11-12 15:51:40 +00:00
openssl-1.0.0-beta5-enginesdir.patch - new upstream release 2010-01-21 08:12:12 +00:00
openssl-1.0.0-beta5-readme-warning.patch - new upstream release 2010-01-21 08:12:12 +00:00
openssl-1.0.0-timezone.patch - set UTC timezone on pod2man run (#578842) 2010-04-06 14:35:57 +00:00
openssl-1.0.0c-rsa-x931.patch - add -x931 parameter to openssl genrsa command to use the ANSI X9.31 2011-02-04 15:14:18 +01:00
openssl-1.0.0d-apps-dgst.patch clarify apps help texts for available digest algorithms (#693858) 2011-04-05 21:24:01 +02:00
openssl-1.0.0d-xmpp-starttls.patch correct openssl cms help output (#636266) 2011-07-26 13:02:17 +02:00
openssl-1.0.0e-chil-fixes.patch fix missing initialization of variable in CHIL engine 2011-09-21 17:34:13 +02:00
openssl-1.0.1-beta2-fips-md5-allow.patch New upstream release from the 1.0.1 branch, ABI compatible 2012-02-07 13:46:42 +01:00
openssl-1.0.1-pkgconfig-krb5.patch add Kerberos 5 libraries to pkgconfig for static linking (#807050) 2012-04-11 16:33:03 +02:00
openssl-1.0.1c-aliasing.patch do not move libcrypto to /lib 2012-07-13 14:23:34 +02:00
openssl-1.0.1c-default-paths.patch s_time uses tm_ctx. 2012-12-07 10:01:17 +01:00
openssl-1.0.1c-dh-1024.patch use 1024 bit DH parameters in s_server as 512 bit is not allowed 2012-11-15 21:11:36 +01:00
openssl-1.0.1c-perlfind.patch Make it build with new Perl 2012-07-12 00:35:57 +02:00
openssl-1.0.1e-arm-use-elf-auxv-caps.patch arm: use auxv to figure out armcap.c instead of using signals (#1006474) 2013-09-11 10:36:42 -04:00
openssl-1.0.1e-cc-reqs.patch test in the non-FIPS RSA keygen for minimal distance of p and q 2015-01-16 16:16:14 +01:00
openssl-1.0.1e-compat-symbols.patch drop weak ciphers from the default TLS ciphersuite list 2013-12-18 15:55:26 +01:00
openssl-1.0.1e-cve-2015-0286.patch Multiple security issues fixed. 2015-03-19 18:08:12 +01:00
openssl-1.0.1e-cve-2015-0287.patch Multiple security issues fixed. 2015-03-19 18:08:12 +01:00
openssl-1.0.1e-cve-2015-0288.patch Multiple security issues fixed. 2015-03-19 18:08:12 +01:00
openssl-1.0.1e-cve-2015-0293.patch Multiple security issues fixed. 2015-03-19 18:08:12 +01:00
openssl-1.0.1e-cve-2015-1789.patch Fix multiple security issues. 2015-06-15 17:09:29 +02:00
openssl-1.0.1e-cve-2015-1790.patch Fix multiple security issues. 2015-06-15 17:09:29 +02:00
openssl-1.0.1e-cve-2015-1792.patch Fix multiple security issues. 2015-06-15 17:09:29 +02:00
openssl-1.0.1e-cve-2015-3194.patch Multiple security issues fixed 2015-12-04 16:38:05 +01:00
openssl-1.0.1e-cve-2015-3195.patch Multiple security issues fixed 2015-12-04 16:38:05 +01:00
openssl-1.0.1e-cve-2015-3197.patch Fix multiple security issues. 2016-03-02 11:00:13 +01:00
openssl-1.0.1e-cve-2016-0705.patch Add missing file. 2016-03-02 11:05:10 +01:00
openssl-1.0.1e-cve-2016-0797.patch Fix multiple security issues. 2016-03-02 11:00:13 +01:00
openssl-1.0.1e-cve-2016-2105.patch Multiple security issues fixed. 2016-05-03 18:29:16 +02:00
openssl-1.0.1e-cve-2016-2106.patch Multiple security issues fixed. 2016-05-03 18:29:16 +02:00
openssl-1.0.1e-cve-2016-2107.patch Multiple security issues fixed. 2016-05-03 18:29:16 +02:00
openssl-1.0.1e-cve-2016-2108.patch Multiple security issues fixed. 2016-05-03 18:29:16 +02:00
openssl-1.0.1e-cve-2016-2109.patch Multiple security issues fixed. 2016-05-03 18:29:16 +02:00
openssl-1.0.1e-defaults.patch make expiration and key length changeable by DAYS and KEYLEN 2014-02-06 18:07:59 +01:00
openssl-1.0.1e-enc-fail.patch properly detect encryption failure in BIO 2014-03-17 17:22:08 +01:00
openssl-1.0.1e-env-zlib.patch disable ZLIB loading by default (due to CRIME attack) 2013-02-19 16:41:14 +01:00
openssl-1.0.1e-fips-ctor.patch only ECC NIST Suite B curves support 2013-10-16 14:37:51 +02:00
openssl-1.0.1e-issuer-hash.patch new upstream version 2013-02-19 13:57:39 +01:00
openssl-1.0.1e-no-md5-verify.patch disable verification of certificate, CRL, and OCSP signatures using MD5 2013-11-13 20:06:28 +01:00
openssl-1.0.1e-ppc-asm-update.patch drop RSA X9.31 from RSA FIPS selftests 2014-08-13 20:03:17 +02:00
openssl-1.0.1e-rpmbuild.patch drop RSA X9.31 from RSA FIPS selftests 2014-08-13 20:03:17 +02:00
openssl-1.0.1e-secure-getenv.patch new upstream version 2013-02-19 13:57:39 +01:00
openssl-1.0.1e-version.patch use symbol versioning also for the textual version 2013-07-26 13:16:10 +02:00
openssl-1.0.1e-weak-ciphers.patch drop weak ciphers from the default TLS ciphersuite list 2013-12-18 15:55:26 +01:00
openssl-1.0.1h-disable-sslv2v3.patch Fix multiple security issues. 2016-03-02 11:00:13 +01:00
openssl-1.0.1h-ipv6-apps.patch new upstream release 1.0.1h 2014-06-05 15:05:17 +02:00
openssl-1.0.1h-system-cipherlist.patch And never call fclose with NULL parameter. 2014-06-11 16:21:37 +02:00
openssl-1.0.1i-algo-doc.patch new upstream release fixing multiple moderate security issues 2014-08-07 16:00:47 +02:00
openssl-1.0.1i-manfix.patch new upstream release fixing multiple moderate security issues 2014-08-07 16:00:47 +02:00
openssl-1.0.1i-new-fips-reqs.patch drop the AES-GCM restriction of 2^32 operations 2015-04-09 13:10:25 +02:00
openssl-1.0.1i-ppc-asm-update.patch drop RSA X9.31 from RSA FIPS selftests 2014-08-13 20:03:17 +02:00
openssl-1.0.1j-evp-wrap.patch fix bug in the CRYPTO_128_unwrap() 2015-03-16 18:02:06 +01:00
openssl-1.0.1j-fips-ec.patch new upstream release fixing multiple security issues 2014-10-16 13:50:08 +02:00
openssl-1.0.1k-alt-chains.patch fix CVE-2015-1793 - certificate verification forgery 2015-07-09 15:36:41 +02:00
openssl-1.0.1k-cve-2015-0209.patch Fix multiple security issues. 2015-06-15 17:09:29 +02:00
openssl-1.0.1k-cve-2015-0289.patch Multiple security issues fixed. 2015-03-19 18:08:12 +01:00
openssl-1.0.1k-cve-2015-1791.patch Fix multiple security issues. 2015-06-15 17:09:29 +02:00
openssl-1.0.1k-cve-2015-3196.patch Multiple security issues fixed 2015-12-04 16:38:05 +01:00
openssl-1.0.1k-cve-2015-4000.patch fix CVE-2015-4000 - prevent the logjam attack on client 2015-05-29 16:07:30 +02:00
openssl-1.0.1k-cve-2016-0702.patch Fix multiple security issues. 2016-03-02 11:00:13 +01:00
openssl-1.0.1k-cve-2016-0799.patch Fix multiple security issues. 2016-03-02 11:00:13 +01:00
openssl-1.0.1k-dtls1-abi.patch new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00
openssl-1.0.1k-ecc-suiteb.patch new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00
openssl-1.0.1k-ephemeral-key-size.patch new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00
openssl-1.0.1k-fips.patch new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00
openssl-1.0.1k-padlock64.patch new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00
openssl-1.0.1k-secp256k1.patch enable secp256k1 2015-08-13 08:09:25 -04:00
openssl-1.0.1k-trusted-first.patch new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00
openssl-fips.conf add -fips subpackage that contains the FIPS module files 2013-08-27 16:03:43 +02:00
openssl-thread-test.c - new upstream version 2005-11-08 13:52:29 +00:00
openssl.spec Multiple security issues fixed. 2016-05-03 18:29:16 +02:00
opensslconf-new-warning.h auto-import openssl-0.9.7a-34 from openssl-0.9.7a-34.src.rpm 2004-09-09 09:49:16 +00:00
opensslconf-new.h add support for ppc64le architecture (#1072633) 2014-04-03 16:24:35 +02:00
renew-dummy-cert add script for renewal of a self-signed cert by Philip Prindeville (#871566) 2012-12-21 17:21:50 +01:00
sources new upstream release fixing multiple security issues 2015-01-09 10:54:51 +01:00

README.FIPS

User guide for the FIPS Red Hat Enterprise Linux - OpenSSL Module
=================================================================

This package contains libraries which comprise the FIPS 140-2
Red Hat Enterprise Linux - OPENSSL Module.

The module files
================
/usr/lib[64]/libcrypto.so.1.0.1e
/usr/lib[64]/libssl.so.1.0.1e
/usr/lib[64]/.libcrypto.so.1.0.1e.hmac
/usr/lib[64]/.libssl.so.1.0.1e.hmac

Dependencies
============

The approved mode of operation requires kernel with /dev/urandom RNG running
with properties as defined in the security policy of the module. This is
provided by kernel packages with validated Red Hat Enterprise Linux - IPSec
Crytographic Module.

Installation
============

The RPM package of the module can be installed by standard tools recommended
for installation of RPM packages on the Red Hat Enterprise Linux system (yum,
rpm, RHN remote management tool).

For proper operation of the in-module integrity verification the prelink has to
be disabled. This can be done with setting PRELINKING=no in the
/etc/sysconfig/prelink configuration file. If the libraries were already
prelinked the prelink should be undone on all the system files with the
'prelink -u -a' command.

Usage and API
=============

The module respects kernel command line FIPS setting. If the kernel command
line contains option fips=1 the module will initialize in the FIPS approved
mode of operation automatically. To allow for the automatic initialization the
application using the module has to call one of the following API calls:

- void OPENSSL_init_library(void) - this will do only a basic initialization
of the library and does initialization of the FIPS approved mode without setting
up EVP API with supported algorithms.

- void OPENSSL_add_all_algorithms(void) - this API function calls
OPENSSL_init() implicitly and also adds all approved algorithms to the EVP API
in the approved mode 

- void SSL_library_init(void) - it calls OPENSSL_init() implicitly and also
adds algorithms which are necessary for TLS protocol support and initializes
the SSL library.

To explicitely put the library to the approved mode the application can call
the following function:

- int FIPS_mode_set(int on) - if called with 1 as a parameter it will switch
the library from the non-approved to the approved mode. If any of the selftests
and integrity verification tests fail, the library is put into the error state
and 0 is returned. If they succeed the return value is 1.

To query the module whether it is in the approved mode or not:

- int FIPS_mode(void) - returns 1 if the module is in the approved mode,
0 otherwise.

To query whether the module is in the error state:

- int FIPS_selftest_failed(void) - returns 1 if the module is in the error
state, 0 otherwise.

To zeroize the FIPS RNG key and internal state the application calls:

- void RAND_cleanup(void)