openssl-vl.spec 38 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061
  1. %bcond_with fips
  2. %define build_compat32 %{?_with_compat32:1}%{!?_with_compat32:0}
  3. %{!?_pkgdocdir:%global _pkgdocdir %{_docdir}}
  4. # 1.0.0 soversion = 10
  5. # 1.1.0 soversion = 1.1 (same as upstream although presence of some symbols
  6. # depends on build configuration options)
  7. %define soversion 3
  8. %define srpmhash() %{lua:
  9. local files = rpm.expand("%_specdir/openssl.spec")
  10. for i, p in ipairs(patches) do
  11. files = files.." "..p
  12. end
  13. for i, p in ipairs(sources) do
  14. files = files.." "..p
  15. end
  16. local sha256sum = assert(io.popen("cat "..files.." 2>/dev/null | sha256sum"))
  17. local hash = sha256sum:read("*a")
  18. sha256sum:close()
  19. print(string.sub(hash, 0, 16))
  20. }
  21. Summary: Secure Sockets Layer Toolkit
  22. Name: openssl
  23. Version: 3.1.7
  24. Release: 1%{_dist_release}
  25. Group: system,security
  26. Vendor: Project Vine
  27. Distribution: Vine Linux
  28. Packager: daisuke, iwamoto
  29. License: BSDish
  30. URL: https://www.openssl.org/
  31. # https://www.openssl.org/source/openssl-%{version}.tar.gz
  32. Source: https://github.com/openssl/openssl/releases/download/openssl-%{version}/openssl-%{version}.tar.gz
  33. Source2: Makefile.certificate
  34. Source6: make-dummy-cert
  35. Source7: renew-dummy-cert
  36. Source9: configuration-switch.h
  37. Source10: configuration-prefix.h
  38. Source14: for-tests.patch
  39. # Patches exported from source git
  40. # # Aarch64 and ppc64le use lib64
  41. Patch1: 0001-Aarch64-and-ppc64le-use-lib64.patch
  42. # # Use more general default values in openssl.cnf
  43. Patch2: 0002-Use-more-general-default-values-in-openssl.cnf.patch
  44. # # Do not install html docs
  45. Patch3: 0003-Do-not-install-html-docs.patch
  46. # # Override default paths for the CA directory tree
  47. Patch4: 0004-Override-default-paths-for-the-CA-directory-tree.patch
  48. # # apps/ca: fix md option help text
  49. Patch5: 0005-apps-ca-fix-md-option-help-text.patch
  50. # # Disable signature verification with totally unsafe hash algorithms
  51. Patch6: 0006-Disable-signature-verification-with-totally-unsafe-h.patch
  52. # # Add support for PROFILE=SYSTEM system default cipherlist
  53. Patch7: 0007-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
  54. #Patch7: 0007-ossl_safe_getenv.patch
  55. # # Add FIPS_mode() compatibility macro
  56. Patch8: 0008-Add-FIPS_mode-compatibility-macro.patch
  57. # # Add check to see if fips flag is enabled in kernel
  58. Patch9: 0009-Add-Kernel-FIPS-mode-flag-support.patch
  59. # # Instead of replacing ectest.c and ec_curve.c, add the changes as a patch so
  60. # # that new modifications made to these files by upstream are not lost.
  61. Patch10: 0010-Add-changes-to-ectest-and-eccurve.patch
  62. # # remove unsupported EC curves
  63. Patch11: 0011-Remove-EC-curves.patch
  64. # # Disable explicit EC curves
  65. # # https://bugzilla.redhat.com/show_bug.cgi?id=2066412
  66. Patch12: 0012-Disable-explicit-ec.patch
  67. # # Skipped tests from former 0011-Remove-EC-curves.patch
  68. Patch13: 0013-skipped-tests-EC-curves.patch
  69. # # Instructions to load legacy provider in openssl.cnf
  70. #Patch24: 0024-load-legacy-prov.patch
  71. # # We load FIPS provider and set FIPS properties implicitly
  72. Patch32: 0032-Force-fips.patch
  73. # # Embed HMAC into the fips.so
  74. Patch33: 0033-FIPS-embed-hmac.patch
  75. # # Comment out fipsinstall command-line utility
  76. Patch34: 0034.fipsinstall_disable.patch
  77. # # Skip unavailable algorithms running `openssl speed`
  78. Patch35: 0035-speed-skip-unavailable-dgst.patch
  79. # # Extra public/private key checks required by FIPS-140-3
  80. Patch44: 0044-FIPS-140-3-keychecks.patch
  81. # # Minimize fips services
  82. Patch45: 0045-FIPS-services-minimize.patch
  83. # # Execute KATS before HMAC verification
  84. Patch47: 0047-FIPS-early-KATS.patch
  85. # # Selectively disallow SHA1 signatures rhbz#2070977
  86. Patch49: 0049-Allow-disabling-of-SHA1-signatures.patch
  87. # # Support SHA1 in TLS in LEGACY crypto-policy (which is SECLEVEL=1)
  88. Patch52: 0052-Allow-SHA1-in-seclevel-1-if-rh-allow-sha1-signatures.patch
  89. # # https://github.com/openssl/openssl/pull/18103
  90. # # The patch is incorporated in 3.0.3 but we provide this function since 3.0.1
  91. # # so the patch should persist
  92. Patch56: 0056-strcasecmp.patch
  93. # # https://bugzilla.redhat.com/show_bug.cgi?id=2053289
  94. Patch58: 0058-FIPS-limit-rsa-encrypt.patch
  95. # # https://bugzilla.redhat.com/show_bug.cgi?id=2087147
  96. Patch61: 0061-Deny-SHA-1-signature-verification-in-FIPS-provider.patch
  97. # 0062-fips-Expose-a-FIPS-indicator.patch
  98. Patch62: 0062-fips-Expose-a-FIPS-indicator.patch
  99. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102535
  100. Patch73: 0073-FIPS-Use-OAEP-in-KATs-support-fixed-OAEP-seed.patch
  101. # [PATCH 29/46]
  102. # 0074-FIPS-Use-digest_sign-digest_verify-in-self-test.patch
  103. Patch74: 0074-FIPS-Use-digest_sign-digest_verify-in-self-test.patch
  104. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102535
  105. Patch75: 0075-FIPS-Use-FFDHE2048-in-self-test.patch
  106. # # Downstream only. Reseed DRBG using getrandom(GRND_RANDOM)
  107. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102541
  108. Patch76: 0076-FIPS-140-3-DRBG.patch
  109. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102542
  110. Patch77: 0077-FIPS-140-3-zeroization.patch
  111. # # https://bugzilla.redhat.com/show_bug.cgi?id=2114772
  112. Patch78: 0078-Add-FIPS-indicator-parameter-to-HKDF.patch
  113. # # https://github.com/openssl/openssl/pull/13817
  114. Patch79: 0079-RSA-PKCS15-implicit-rejection.patch
  115. # # We believe that some changes present in CentOS are not necessary
  116. # # because ustream has a check for FIPS version
  117. Patch80: 0080-rand-Forbid-truncated-hashes-SHA-3-in-FIPS-prov.patch
  118. # [PATCH 36/46]
  119. # 0081-signature-Remove-X9.31-padding-from-FIPS-prov.patch
  120. Patch81: 0081-signature-Remove-X9.31-padding-from-FIPS-prov.patch
  121. # [PATCH 37/46]
  122. # 0083-hmac-Add-explicit-FIPS-indicator-for-key-length.patch
  123. Patch83: 0083-hmac-Add-explicit-FIPS-indicator-for-key-length.patch
  124. # [PATCH 38/46]
  125. # 0084-pbkdf2-Set-minimum-password-length-of-8-bytes.patch
  126. Patch84: 0084-pbkdf2-Set-minimum-password-length-of-8-bytes.patch
  127. # 0085-FIPS-RSA-disable-shake.patch
  128. Patch85: 0085-FIPS-RSA-disable-shake.patch
  129. # 0088-signature-Add-indicator-for-PSS-salt-length.patch
  130. Patch88: 0088-signature-Add-indicator-for-PSS-salt-length.patch
  131. # 0091-FIPS-RSA-encapsulate.patch
  132. Patch91: 0091-FIPS-RSA-encapsulate.patch
  133. # [PATCH 42/46]
  134. # 0093-DH-Disable-FIPS-186-4-type-parameters-in-FIPS-mode.patch
  135. Patch93: 0093-DH-Disable-FIPS-186-4-type-parameters-in-FIPS-mode.patch
  136. # [PATCH 43/46]
  137. # 0110-GCM-Implement-explicit-FIPS-indicator-for-IV-gen.patch
  138. Patch110: 0110-GCM-Implement-explicit-FIPS-indicator-for-IV-gen.patch
  139. # [PATCH 44/46]
  140. # 0112-pbdkf2-Set-indicator-if-pkcs5-param-disabled-checks.patch
  141. Patch112: 0112-pbdkf2-Set-indicator-if-pkcs5-param-disabled-checks.patch
  142. # 0113-asymciphers-kem-Add-explicit-FIPS-indicator.patch
  143. Patch113: 0113-asymciphers-kem-Add-explicit-FIPS-indicator.patch
  144. # # We believe that some changes present in CentOS are not necessary
  145. # # because ustream has a check for FIPS version
  146. Patch114: 0114-FIPS-enforce-EMS-support.patch
  147. # security fix
  148. # none
  149. BuildRoot: %{_tmppath}/%{name}-%{version}-root
  150. BuildRequires: perl, sed
  151. BuildRequires: pkgconfig(zlib), krb5-devel
  152. BuildRequires: lksctp-tools-devel
  153. Requires: mktemp
  154. Requires: ca-certificates
  155. Requires: %{name}-libs = %{version}-%{release}
  156. Obsoletes: openssl111 < 3.0.0
  157. %define solibbase %(echo %version | sed 's/[[:alpha:]]//g')
  158. %description
  159. The OpenSSL certificate management tool and the shared libraries that
  160. provide various cryptographic algorithms and protocols.
  161. %package libs
  162. Summary: A general purpose cryptography library with TLS implementation
  163. Group: system
  164. %description libs
  165. OpenSSL is a toolkit for supporting cryptography. The openssl-libs
  166. package contains the libraries that are used by various applications which
  167. support cryptographic algorithms and protocols.
  168. %package devel
  169. Summary: OpenSSL libraries and development headers.
  170. Group: programming
  171. Requires: %{name}-libs = %{version}-%{release}
  172. Requires: krb5-devel
  173. Conflicts: openssl111-devel < 3.0.0
  174. %description devel
  175. The static libraries and include files needed to compile apps
  176. with support for various the cryptographic algorithms and protocols
  177. supported by OpenSSL.
  178. Patches for many networking apps can be found at:
  179. ftp://ftp.psy.uq.oz.au/pub/Crypto/SSLapps/
  180. %package static
  181. Summary: Libraries for static linking of applications which will use OpenSSL
  182. Group: programming
  183. Requires: %{name}-devel = %{version}-%{release}
  184. Conflicts: openssl111-static < 3.0.0
  185. %description static
  186. OpenSSL is a toolkit for supporting cryptography. The openssl-static
  187. package contains static libraries needed for static linking of
  188. applications which support various cryptographic algorithms and
  189. protocols.
  190. %package perl
  191. Summary: OpenSSL scripts which require Perl.
  192. Group: security
  193. Requires: %{name}-libs = %{version}-%{release}
  194. Obsoletes: openssl111-perl < 3.0.0
  195. Requires: perl
  196. %description perl
  197. Perl scripts provided with OpenSSL for converting certificates and keys
  198. from other formats to those used by OpenSSL.
  199. ## to build compat32 for x86_64 architecture support
  200. %package -n compat32-%{name}
  201. Summary: Secure Sockets Layer Toolkit
  202. Group: system
  203. Requires: %{name} = %{version}-%{release}
  204. %description -n compat32-%{name}
  205. The OpenSSL certificate management tool and the shared libraries that
  206. provide various cryptographic algorithms and protocols.
  207. %package -n compat32-%{name}-devel
  208. Summary: OpenSSL libraries and development headers.
  209. Group: programming
  210. Requires: compat32-%{name} = %{version}-%{release}
  211. Requires: compat32-krb5-devel
  212. Conflicts: compat32-openssl111-devel < 3.0.0
  213. %description -n compat32-%{name}-devel
  214. The static libraries and include files needed to compile apps
  215. with support for various the cryptographic algorithms and protocols
  216. supported by OpenSSL.
  217. %debug_package
  218. %prep
  219. %autosetup -n %{name}-%{version} -p1
  220. %build
  221. # Figure out which flags we want to use.
  222. # default
  223. sslarch=%{_os}-%{_target_cpu}
  224. #
  225. %ifarch %ix86
  226. sslarch=linux-elf
  227. if ! echo %{_target} | grep -q i686 ; then
  228. sslflags="no-asm 386"
  229. fi
  230. %endif
  231. %ifarch x86_64
  232. sslflags=enable-ec_nistp_64_gcc_128
  233. %endif
  234. # Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
  235. # marked as not requiring an executable stack.
  236. # Also add -DPURIFY to make using valgrind with openssl easier as we do not
  237. # want to depend on the uninitialized memory as a source of entropy anyway.
  238. RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -Wa,--generate-missing-build-notes=yes -DPURIFY $RPM_LD_FLAGS"
  239. export HASHBANGPERL=/usr/bin/perl
  240. %define fips %{version}-%{srpmhash}
  241. # ia64, x86_64, ppc are OK by default
  242. # Configure the build tree. Override OpenSSL defaults with known-good defaults
  243. # usable on all platforms. The Configure script already knows to use -fPIC and
  244. # RPM_OPT_FLAGS, so we can skip specifiying them here.
  245. ./Configure \
  246. --prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
  247. --system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config \
  248. zlib enable-camellia enable-seed enable-rfc3779 enable-sctp \
  249. enable-cms enable-md2 enable-rc5 enable-ktls enable-fips \
  250. no-mdc2 no-ec2m no-sm2 no-sm4 enable-buildtest-c++ \
  251. shared ${sslarch} $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\"" -DREDHAT_FIPS_VERSION="\"%{fips}\""' \
  252. -Wl,--allow-multiple-definition
  253. # Do not run this in a production package the FIPS symbols must be patched-in
  254. #util/mkdef.pl crypto update
  255. make -s %{?_smp_mflags} all
  256. # Clean up the .pc files
  257. for i in libcrypto.pc libssl.pc openssl.pc ; do
  258. sed -i '/^Libs.private:/{s/-L[^ ]* //;s/-Wl[^ ]* //}' $i
  259. done
  260. %check
  261. # Verify that what was compiled actually works.
  262. # Hack - either enable SCTP AUTH chunks in kernel or disable sctp for check
  263. (sysctl net.sctp.addip_enable=1 && sysctl net.sctp.auth_enable=1) || \
  264. (echo 'Failed to enable SCTP AUTH chunks, disabling SCTP for tests...' &&
  265. sed '/"msan" => "default",/a\ \ "sctp" => "default",' configdata.pm > configdata.pm.new && \
  266. touch -r configdata.pm configdata.pm.new && \
  267. mv -f configdata.pm.new configdata.pm)
  268. # We must revert patch4 before tests otherwise they will fail
  269. patch -p1 -R < %{PATCH4}
  270. #We must disable default provider before tests otherwise they will fail
  271. patch -p1 < %{SOURCE14}
  272. LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
  273. export LD_LIBRARY_PATH
  274. OPENSSL_ENABLE_MD5_VERIFY=
  275. export OPENSSL_ENABLE_MD5_VERIFY
  276. OPENSSL_SYSTEM_CIPHERS_OVERRIDE=xyz_nonexistent_file
  277. export OPENSSL_SYSTEM_CIPHERS_OVERRIDE
  278. #embed HMAC into fips provider for test run
  279. OPENSSL_CONF=/dev/null LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < providers/fips.so > providers/fips.so.hmac
  280. objcopy --update-section .rodata1=providers/fips.so.hmac providers/fips.so providers/fips.so.mac
  281. mv providers/fips.so.mac providers/fips.so
  282. #run tests itself
  283. make test HARNESS_JOBS=8
  284. # Add generation of HMAC checksum of the final stripped library
  285. # We manually copy standard definition of __spec_install_post
  286. # and add hmac calculation/embedding to fips.so
  287. %define __spec_install_post \
  288. %{?__debug_package:%{__debug_install_post}} \
  289. %{__arch_install_post} \
  290. %{__os_install_post} \
  291. OPENSSL_CONF=/dev/null LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so > $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
  292. objcopy --update-section .rodata1=$RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac \
  293. mv $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so \
  294. rm $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
  295. %{nil}
  296. %define __provides_exclude_from %{_libdir}/openssl
  297. %install
  298. [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
  299. # Install OpenSSL.
  300. install -d $RPM_BUILD_ROOT{/%{_lib},%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl,%{_pkgdocdir}}
  301. make DESTDIR=$RPM_BUILD_ROOT install
  302. mv $RPM_BUILD_ROOT%{_libdir}/lib*.so.%{soversion} $RPM_BUILD_ROOT/%{_lib}/
  303. rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT/%{_lib}/*.so.%{soversion}
  304. for lib in $RPM_BUILD_ROOT/%{_lib}/*.so.%{version} ; do
  305. chmod 755 ${lib}
  306. ln -s -f ../../%{_lib}/`basename ${lib}` $RPM_BUILD_ROOT/%{_libdir}/`basename ${lib} .%{version}`
  307. ln -s -f `basename ${lib}` $RPM_BUILD_ROOT/%{_lib}/`basename ${lib} .%{version}`.%{soversion}
  308. done
  309. # Install a makefile for generating keys and self-signed certs, and a script
  310. # for generating them on the fly.
  311. mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
  312. install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_pkgdocdir}/Makefile.certificate
  313. install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/make-dummy-cert
  314. install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_bindir}/renew-dummy-cert
  315. # Move runable perl scripts to bindir
  316. mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/*.pl $RPM_BUILD_ROOT%{_bindir}
  317. mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/tsget $RPM_BUILD_ROOT%{_bindir}
  318. # Rename man pages so that they don't conflict with other system man pages.
  319. pushd $RPM_BUILD_ROOT%{_mandir}
  320. mv man5/config.5ossl man5/openssl.cnf.5
  321. popd
  322. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
  323. mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
  324. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
  325. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
  326. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
  327. # Ensure the config file timestamps are identical across builds to avoid
  328. # mulitlib conflicts and unnecessary renames on upgrade
  329. touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
  330. touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf
  331. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf.dist
  332. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf.dist
  333. %ifarch i686
  334. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/fipsmodule.cnf
  335. %endif
  336. # Determine which arch opensslconf.h is going to try to #include.
  337. basearch=%{_arch}
  338. %ifarch %{ix86}
  339. basearch=i386
  340. %endif
  341. # Next step of gradual disablement of SSL3.
  342. # Make SSL3 disappear to newly built dependencies.
  343. sed -i '/^\#ifndef OPENSSL_NO_SSL_TRACE/i\
  344. #ifndef OPENSSL_NO_SSL3\
  345. # define OPENSSL_NO_SSL3\
  346. #endif' $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
  347. %ifarch %{multilib_arches}
  348. # Do an opensslconf.h switcheroo to avoid file conflicts on systems where you
  349. # can have both a 32- and 64-bit version of the library, and they each need
  350. # their own correct-but-different versions of opensslconf.h to be usable.
  351. install -m644 %{SOURCE10} \
  352. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
  353. cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h >> \
  354. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
  355. install -m644 %{SOURCE9} \
  356. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h
  357. %endif
  358. %clean
  359. [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
  360. %files
  361. %defattr(-,root,root)
  362. %{!?_licensedir:%global license %%doc}
  363. %license LICENSE.txt
  364. %doc NEWS.md README.md
  365. %{_pkgdocdir}/Makefile.certificate
  366. %{_bindir}/make-dummy-cert
  367. %{_bindir}/renew-dummy-cert
  368. %{_bindir}/openssl
  369. %dir %{_mandir}/man1*
  370. %{_mandir}/man1*/*
  371. %dir %{_mandir}/man5*
  372. %{_mandir}/man5*/*
  373. %dir %{_mandir}/man7*
  374. %{_mandir}/man7*/*
  375. %exclude %{_mandir}/man1/*.pl*
  376. %exclude %{_mandir}/man1/tsget*
  377. %files libs
  378. %{!?_licensedir:%global license %%doc}
  379. %license LICENSE.txt
  380. %dir %{_sysconfdir}/pki/tls
  381. %dir %{_sysconfdir}/pki/tls/certs
  382. %dir %{_sysconfdir}/pki/tls/misc
  383. %dir %{_sysconfdir}/pki/tls/private
  384. %config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
  385. %config(noreplace) %{_sysconfdir}/pki/tls/ct_log_list.cnf
  386. %attr(0755,root,root) /%{_lib}/libcrypto.so.%{version}
  387. /%{_lib}/libcrypto.so.%{soversion}
  388. %attr(0755,root,root) /%{_lib}/libssl.so.%{version}
  389. /%{_lib}/libssl.so.%{soversion}
  390. %attr(0755,root,root) %{_libdir}/engines-%{soversion}
  391. %attr(0755,root,root) %{_libdir}/ossl-modules
  392. %ifnarch i686
  393. %config(noreplace) %{_sysconfdir}/pki/tls/fipsmodule.cnf
  394. %endif
  395. %files devel
  396. %doc CHANGES.md doc/dir-locals.example.el doc/openssl-c-indent.el
  397. %{_prefix}/include/openssl
  398. %exclude %{_libdir}/lib*.a
  399. %{_libdir}/*.so
  400. %attr(0644,root,root) %{_libdir}/pkgconfig/*.pc
  401. %dir %{_mandir}/man3*
  402. %{_mandir}/man3*/*
  403. %files static
  404. %defattr(-,root,root)
  405. %attr(0644,root,root) %{_libdir}/*.a
  406. %files perl
  407. %defattr(-,root,root)
  408. %{_bindir}/c_rehash
  409. %{_bindir}/*.pl
  410. %{_bindir}/tsget
  411. %{_mandir}/man1*/*.pl*
  412. %{_mandir}/man1*/tsget*
  413. %dir %{_sysconfdir}/pki/CA
  414. %dir %{_sysconfdir}/pki/CA/private
  415. %dir %{_sysconfdir}/pki/CA/certs
  416. %dir %{_sysconfdir}/pki/CA/crl
  417. %dir %{_sysconfdir}/pki/CA/newcerts
  418. ## to build compat32 for x86_64 architecture support
  419. %if %{build_compat32}
  420. %files -n compat32-%{name}
  421. %defattr(-,root,root)
  422. %attr(0755,root,root) /%{_lib}/*.so.*
  423. %files -n compat32-%{name}-devel
  424. %defattr(-,root,root)
  425. %exclude %{_libdir}/lib*.a
  426. %attr(0755,root,root) %{_libdir}/*.so
  427. %attr(0644,root,root) %{_libdir}/pkgconfig/*.pc
  428. %endif
  429. %changelog
  430. * Wed Sep 04 2024 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.7-1
  431. - new upstream release.
  432. * Mon Jun 10 2024 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.6-1
  433. - new upstream release.
  434. * Wed Jan 31 2024 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.5-1
  435. - new upstream release.
  436. * Wed Oct 25 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.4-1
  437. - new upstream release.
  438. * Wed Sep 20 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.3-1
  439. - new upstream release.
  440. * Wed Aug 02 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.10-1
  441. - new upstream release.
  442. * Tue Jul 11 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.9-1
  443. - new upstream release.
  444. * Wed Feb 08 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.8-1
  445. - new upstream release.
  446. * Wed Nov 02 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.7-1
  447. - new upstream release.
  448. * Wed Oct 12 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.6-1
  449. - new upstream release.
  450. * Wed Jul 06 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.5-1
  451. - new upstream release.
  452. * Wed Jun 22 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.4-1
  453. - new upstream release.
  454. * Wed Mar 16 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.2-1
  455. - new upstream release.
  456. * Wed Dec 15 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.1-1
  457. - new upstream release.
  458. * Thu Sep 30 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.0-1
  459. - new upstream release.
  460. * Wed Aug 25 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1l-1
  461. - new upstream release.
  462. * Fri Mar 26 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1k-1
  463. - new upstream release.
  464. - dropped ldconfig scriptlets.
  465. * Wed Feb 17 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1j-1
  466. - new upstream release.
  467. * Wed Dec 09 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1i-1
  468. - new upstream release.
  469. * Sat Nov 21 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1h-1
  470. - new upstream release.
  471. - dropped Patch43: fixed in upstream.
  472. - imported Patch55-70 from rawhide.
  473. - updated Source13.
  474. * Sat Apr 25 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1g-1
  475. - new upstream release.
  476. * Wed Apr 08 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1f-1
  477. - new upstream release.
  478. - updated Patch1.
  479. - dropped Patch54: fixed in upstream.
  480. * Wed Mar 18 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1e-1
  481. - new upstream release.
  482. - dropped Patch100 and 1000: fixed in upstream.
  483. * Fri Dec 20 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1d-2
  484. - imported Patch1000 from upstream.
  485. * Fri Sep 13 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1d-1
  486. - new upstream release.
  487. - updated Source12 and 13.
  488. - updated all patches.
  489. - imported Patch100 from upstream.
  490. * Sat Aug 24 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1c-1
  491. - new upstream release.
  492. - updated Patch37 and 41.
  493. - imported Patch52-54 from rawhide.
  494. * Mon May 06 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1b-2
  495. - fixed openssl.cnf
  496. * Sun May 05 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1b-1
  497. - new upstream release.
  498. - imported Patch36 from rawhide.
  499. - updated Patch32.
  500. * Sat Dec 08 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1a-1
  501. - new upstream release.
  502. - updated Patch2.
  503. - dropped Patch36 and 46: fixed in upstream.
  504. * Thu Nov 01 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1-2
  505. - fixed symlinks.
  506. * Thu Nov 01 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1-1
  507. - new upstream release (newest LTS version).
  508. - imported fedora stuff (except FIPS).
  509. * Sun Apr 1 2018 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2o-1
  510. - new upstream release with security fixes
  511. * Sun Jan 21 2018 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2n-1
  512. - new upstream release with security fixes
  513. * Wed Nov 15 2017 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2m-1
  514. - new upstream release with security fixes
  515. * Sun Jan 29 2017 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2k-1
  516. - new upstream release with security fixes
  517. * Thu May 5 2016 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2h-1
  518. - new upstream release with security fixes
  519. * Wed Mar 9 2016 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2g-1
  520. - new upstream release 1.0.2 with security fixes
  521. - Patch2 is merged into Patch0
  522. * Mon Dec 28 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1q-1
  523. - new upstream release with security fixes
  524. * Fri Jul 10 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1p-1
  525. - new upstream release with security fixes
  526. * Wed Jul 1 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1o-1
  527. - new upstream release
  528. * Sun Apr 12 2015 Yoji TOYODA <bsyamato@sea.plala.or.jp> 1.0.1m-1
  529. - merged into Vine6
  530. * Fri Mar 20 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1m-1
  531. - new upstream release with security fixes
  532. - update Patch2,5
  533. * Mon Jan 12 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1k-1
  534. - new upstream release with security fixes
  535. * Mon Oct 20 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1j-1
  536. - new upstream release with security fixes
  537. - add patch8 from fc21 (fix perl find.pl)
  538. * Fri Jun 6 2014 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.0.1h-1
  539. - new upstream release with security fixes.
  540. * Tue Apr 8 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1g-1
  541. - new upstream release with security fixes
  542. * Thu Jan 9 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1f-1
  543. - new upstream release with security fixes
  544. * Tue Sep 24 2013 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1e-2
  545. - move root CA bundle to ca-certificates package
  546. * Tue Feb 12 2013 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1e-1
  547. - update to 1.0.1e
  548. - 1.0.1d has major regressions from 1.0.1c
  549. * Sat Feb 9 2013 IWAI, Masaharu <iwai@alib.jp> 1.0.1d-2
  550. - remove tsget script to delete dependency perl(WWW::Curl::Easy)
  551. - openssl-perl package contains it in docdir
  552. * Fri Feb 08 2013 Toshiharu Kudoh <toshi.kd2@gmail.com> 1.0.1d-1
  553. - new upstream release with security fix (CVE-2012-2686, CVE-2013-0166, 0169)
  554. - fixed %%files
  555. * Tue May 29 2012 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1c-1
  556. - update to 1.0.1c
  557. - enable configure options:
  558. enable-camellia enable-seed enable-tlsext enable-rfc3779
  559. enable-cms enable-md2
  560. - remove no-asm option from ai64/x86_64/ppc/ppc64/i686
  561. - generate a table with the compile settings before configure
  562. * Fri Jan 20 2012 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0g-1
  563. - new upstream release with security fix (CVE-2012-0050)
  564. * Fri Jan 6 2012 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0f-1
  565. - new upstream release with security fix
  566. (CVE-2011-4108,09, CVE-2011-4576,77, CVE-2011-4619, CVE-2012-0027)
  567. * Wed Sep 7 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0e-1
  568. - new upstream release with security fix (CVE-2011-3207, 3210)
  569. * Sun Mar 20 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0d-2
  570. - rebuild with krb5-libs 1.8
  571. * Fri Feb 11 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0d-1
  572. - new upstream release with security fix
  573. * Sat Jan 15 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-4
  574. - use upstream openssl.pc instead of vine original one (SOURCE6)
  575. * Sun Jan 9 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-3
  576. - move tsget to docs to delete dependency perl(WWW::Curl::Easy)
  577. * Sat Jan 1 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-2
  578. - add R: krb5-devel into devel pkg
  579. - add R: compat32-krb5-devel into compat32-devel pkg
  580. * Fri Dec 31 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-1
  581. - new upstream release 1.0.0x
  582. - separate static libs into static package
  583. - change configure options
  584. - change so version 10
  585. - add tsget into perl package
  586. - update all patches
  587. * Thu Dec 30 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8q-2
  588. - fix changelog typo...
  589. * Tue Dec 7 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8q-1
  590. - new upstream release with security fix (CVE-2010-4180)
  591. * Wed Nov 17 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8p-1
  592. - new upstream release with security fix (CVE-2010-3864)
  593. - drop patches included in new release
  594. - update patch4
  595. * Sun Jan 17 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-5
  596. - add patch12 for fix CVE-2009-3555 (renegotiation)
  597. * Fri Jan 15 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-4
  598. - add patch11 for fix CVE-2009-4355 (memory leak)
  599. * Tue Jun 23 2009 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-3
  600. - add patch10 to fix CVE-2009-1377, 78, 79 (from fc11)
  601. * Mon Jun 22 2009 NAKAMURA Kenta <kenta@vinelinux.org> 0.9.8k-2
  602. - removed unnecessary %%if %{build_compat32} statements
  603. - removed lib*.a from devel package
  604. * Mon Mar 30 2009 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-1
  605. - new upstream release with security fix (CVE-2000-0590,0591,0789)
  606. * Sun Jan 11 2009 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8j-1
  607. - new upstream release with security fix (CVE-2008-5077)
  608. * Sat Sep 20 2008 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8i-1
  609. - new upstream release
  610. * Sat Jul 12 2008 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8h-1
  611. - new upstream release
  612. - new versioning policy
  613. * Sat Oct 27 2007 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8g-0vl1
  614. - new upstream release
  615. - drop patch10,20 which is merged in upstream
  616. * Fri Sep 28 2007 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.8e-0vl3
  617. - add security patch in advance for CVE-2007-5135
  618. http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded
  619. http://marc.info/?l=openssl-cvs&m=119020417919619&w=2
  620. * Fri Aug 10 2007 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.8e-0vl2
  621. - add security patch for CVE-2007-3108
  622. (http://openssl.org/news/patch-CVE-2007-3108.txt)
  623. * Tue May 15 2007 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8e-0vl1
  624. - new upstream release
  625. * Sun Dec 24 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7l-0vl2
  626. - update (fix) openssl.pc <BTS:437>
  627. * Fri Sep 29 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7l-0vl1
  628. - new upstream release (with security fix)
  629. * Mon Sep 11 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7k-0vl1
  630. - new upstream release
  631. - add patch2 to use RPM_OPT macro
  632. * Mon Feb 06 2006 Shu KONNO <owa@bg.wakwak.com> 0.9.7i-0vl3
  633. - moved macros _lib to /usr/lib/rpm/rpmrc or macros files
  634. * Fri Feb 03 2006 Shu KONNO <owa@bg.wakwak.com> 0.9.7i-0vl2
  635. - added compat32-* packages for x86_64 architecture support
  636. - added openssl-0.9.7i.Configure-compat32.patch
  637. - changed '/lib' to '/%{_lib}'
  638. * Mon Oct 17 2005 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.7i-0vl1
  639. - new upstream release
  640. * Mon Jan 31 2005 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.7d-0vl4
  641. - rebuild on VineSeed
  642. * Sun Jan 09 2005 IKEDA Katsumi <ikeda@webmasters.gr.jp> 0.9.7d-0vl3.1
  643. - added a security patch from Gentoo.
  644. - Patch1: openssl-0.9.7c-tempfile.patch
  645. * Sun Mar 28 2004 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.7d-0vl3
  646. - sslarch for ppc was missing... added.
  647. * Fri Mar 26 2004 Tomoya TAKA <taka@vinelinux.org> 0.9.7d-0vl2
  648. - use sslarch=linux-alpha-gcc instead of alpha-gcc
  649. * Mon Mar 22 2004 Satoshi MACHINO <machino@vinelinux.org> 0.9.7d-0vl1
  650. - new upstream version
  651. - clean up of spec file
  652. -- removed old patches
  653. * Sat Mar 20 2004 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6m-0vl1
  654. - new upstream release
  655. - SECURITY fix.
  656. - http://www.openssl.org/news/secadv_20040317.txt
  657. * Wed Oct 1 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6k-0vl1
  658. - new upstream release
  659. - [Security fix]
  660. - Vulnerabilities in ASN.1 parsing
  661. http://www.openssl.org/news/secadv_20030930.txt
  662. - see %{_docdir}/%{name}-%{version}/CHANGES for other changes
  663. * Wed Jun 04 2003 HOTTA Michihide <hotta@net-newbie.com> 0.9.6j-0vl2
  664. - add openssl.pc for pkgconfig
  665. * Tue Mar 11 2003 Satoshi MACHINO <machino@vinelinux.org> 0.9.6j-0vl1
  666. - New upstream version
  667. - dropped patch10, 11
  668. -- merged upstream version
  669. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl1
  670. - rebuild for VineSeed
  671. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl0.26.1
  672. - [Security Fix]
  673. - Timing-based attacks on RSA keys
  674. http://www.openssl.org/news/secadv_20030317.txt
  675. - Klima-Pokorny0Rosa attack on RSA in SSL/TLS
  676. http://www.openssl.org/news/secadv_20030317.txt
  677. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl0.26
  678. - new upstream release 0.9.6i
  679. - [Security Fix]
  680. - build for Vine Linux 2.6 errata
  681. * Mon Nov 18 2002 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6h-0vl1
  682. - new upstream release 0.9.6h
  683. * Mon Nov 18 2002 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6g-0vl1
  684. - new upstream release 0.9.6g
  685. * Mon Oct 28 2002 IWAI Masaharu <iwai@alib.jp> 0.9.6b-1vl6
  686. - SECURITY: CAN-2002-0659 fixed
  687. - added Patch101 from RedHat 7.2 updates 0.9.6b-28
  688. * Fri Aug 02 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-28
  689. - update asn patch to fix accidental reversal of a logic check
  690. * Thu Aug 01 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-27
  691. - update asn patch to reduce chance that compiler optimization will remove
  692. one of the added tests
  693. * Thu Aug 01 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-26
  694. - rebuild
  695. * Tue Jul 30 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-25
  696. - add patch to fix ASN.1 vulnerabilities
  697. * Wed Jul 31 2002 IWAI Masaharu <iwai@alib.jp> 0.9.6b-1vl5
  698. - rename spec file name
  699. - SECURITY: CA-2002-23 fixed
  700. - added Patch100 from RedHat 7.2 updates 0.9.6b-24
  701. * Thu Jul 25 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-24
  702. - add backport of Ben Laurie's patches for OpenSSL 0.9.6d
  703. * Mon Sep 10 2001 Satoshi MACHINO <machino@vinelinux.org> 0.9.6b-1vl4
  704. - added ${PATH} in LD_LIBRARY_PATH
  705. - added install -m 755 *.so.* $RPM_BUILD_ROOT%{_libdir} in %install
  706. * Sun Jul 15 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl3
  707. - remove --no-<cipher>
  708. * Sun Jul 15 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl2
  709. - add Patch10 for mipsel shared ( Configure )
  710. * Sat Jul 14 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl1
  711. - build for Vine Linux
  712. - use openssl-engine-0.9.6b.tar.gz
  713. * Wed Jul 11 2001 Nalin Dahyabhai <nalin@redhat.com>
  714. - update to 0.9.6b
  715. * Thu Jul 5 2001 Nalin Dahyabhai <nalin@redhat.com>
  716. - move .so symlinks back to %%{_libdir}
  717. * Tue Jul 3 2001 Nalin Dahyabhai <nalin@redhat.com>
  718. - move shared libraries to /lib (#38410)
  719. * Mon Jun 25 2001 Nalin Dahyabhai <nalin@redhat.com>
  720. - switch to engine code base
  721. * Mon Jun 18 2001 Nalin Dahyabhai <nalin@redhat.com>
  722. - add a script for creating dummy certificates
  723. - move man pages from %%{_mandir}/man?/foo.?ssl to %%{_mandir}/man?ssl/foo.?
  724. * Thu Jun 07 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  725. - add s390x support
  726. * Fri Jun 1 2001 Nalin Dahyabhai <nalin@redhat.com>
  727. - change two memcpy() calls to memmove()
  728. - don't define L_ENDIAN on alpha
  729. * Tue May 15 2001 Nalin Dahyabhai <nalin@redhat.com>
  730. - make subpackages depend on the main package
  731. * Tue May 1 2001 Nalin Dahyabhai <nalin@redhat.com>
  732. - adjust the hobble script to not disturb symlinks in include/ (fix from
  733. Joe Orton)
  734. * Thu Apr 26 2001 Nalin Dahyabhai <nalin@redhat.com>
  735. - drop the m2crypo patch we weren't using
  736. * Tue Apr 24 2001 Nalin Dahyabhai <nalin@redhat.com>
  737. - configure using "shared" as well
  738. * Sun Apr 8 2001 Nalin Dahyabhai <nalin@redhat.com>
  739. - update to 0.9.6a
  740. - use the build-shared target to build shared libraries
  741. - bump the soversion to 2 because we're no longer compatible with
  742. our 0.9.5a packages or our 0.9.6 packages
  743. - drop the patch for making rsatest a no-op when rsa null support is used
  744. - put all man pages into <section>ssl instead of <section>
  745. - break the m2crypto modules into a separate package
  746. * Tue Mar 13 2001 Nalin Dahyabhai <nalin@redhat.com>
  747. - use BN_LLONG on s390
  748. * Mon Mar 12 2001 Nalin Dahyabhai <nalin@redhat.com>
  749. - fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit)
  750. * Sat Mar 3 2001 Nalin Dahyabhai <nalin@redhat.com>
  751. - move c_rehash to the perl subpackage, because it's a perl script now
  752. * Fri Mar 2 2001 Nalin Dahyabhai <nalin@redhat.com>
  753. - update to 0.9.6
  754. - enable MD2
  755. - use the libcrypto.so and libssl.so targets to build shared libs with
  756. - bump the soversion to 1 because we're no longer compatible with any of
  757. the various 0.9.5a packages circulating around, which provide lib*.so.0
  758. * Wed Feb 28 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  759. - change hobble-openssl for disabling MD2 again
  760. * Tue Feb 27 2001 Nalin Dahyabhai <nalin@redhat.com>
  761. - re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152
  762. bytes or so, causing EVP_DigestInit() to zero out stack variables in
  763. apps built against a version of the library without it
  764. * Mon Feb 26 2001 Nalin Dahyabhai <nalin@redhat.com>
  765. - disable some inline assembly, which on x86 is Pentium-specific
  766. - re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all)
  767. * Thu Feb 08 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  768. - fix s390 patch
  769. * Fri Dec 8 2000 Than Ngo <than@redhat.com>
  770. - added support s390
  771. * Mon Nov 20 2000 Nalin Dahyabhai <nalin@redhat.com>
  772. - remove -Wa,* and -m* compiler flags from the default Configure file (#20656)
  773. - add the CA.pl man page to the perl subpackage
  774. * Thu Nov 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  775. - always build with -mcpu=ev5 on alpha
  776. * Tue Oct 31 2000 Nalin Dahyabhai <nalin@redhat.com>
  777. - add a symlink from cert.pem to ca-bundle.crt
  778. * Wed Oct 25 2000 Nalin Dahyabhai <nalin@redhat.com>
  779. - add a ca-bundle file for packages like Samba to reference for CA certificates
  780. * Tue Oct 24 2000 Nalin Dahyabhai <nalin@redhat.com>
  781. - remove libcrypto's crypt(), which doesn't handle md5crypt (#19295)
  782. * Mon Oct 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  783. - add unzip as a buildprereq (#17662)
  784. - update m2crypto to 0.05-snap4
  785. * Tue Sep 26 2000 Bill Nottingham <notting@redhat.com>
  786. - fix some issues in building when it's not installed
  787. * Wed Sep 6 2000 Nalin Dahyabhai <nalin@redhat.com>
  788. - make sure the headers we include are the ones we built with (aaaaarrgh!)
  789. * Fri Sep 1 2000 Nalin Dahyabhai <nalin@redhat.com>
  790. - add Richard Henderson's patch for BN on ia64
  791. - clean up the changelog
  792. * Tue Aug 29 2000 Nalin Dahyabhai <nalin@redhat.com>
  793. - fix the building of python modules without openssl-devel already installed
  794. * Wed Aug 23 2000 Nalin Dahyabhai <nalin@redhat.com>
  795. - byte-compile python extensions without the build-root
  796. - adjust the makefile to not remove temporary files (like .key files when
  797. building .csr files) by marking them as .PRECIOUS
  798. * Sat Aug 19 2000 Nalin Dahyabhai <nalin@redhat.com>
  799. - break out python extensions into a subpackage
  800. * Mon Jul 17 2000 Nalin Dahyabhai <nalin@redhat.com>
  801. - tweak the makefile some more
  802. * Tue Jul 11 2000 Nalin Dahyabhai <nalin@redhat.com>
  803. - disable MD2 support
  804. * Thu Jul 6 2000 Nalin Dahyabhai <nalin@redhat.com>
  805. - disable MDC2 support
  806. * Sun Jul 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  807. - tweak the disabling of RC5, IDEA support
  808. - tweak the makefile
  809. * Thu Jun 29 2000 Nalin Dahyabhai <nalin@redhat.com>
  810. - strip binaries and libraries
  811. - rework certificate makefile to have the right parts for Apache
  812. * Wed Jun 28 2000 Nalin Dahyabhai <nalin@redhat.com>
  813. - use %%{_perl} instead of /usr/bin/perl
  814. - disable alpha until it passes its own test suite
  815. * Fri Jun 9 2000 Nalin Dahyabhai <nalin@redhat.com>
  816. - move the passwd.1 man page out of the passwd package's way
  817. * Fri Jun 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  818. - update to 0.9.5a, modified for U.S.
  819. - add perl as a build-time requirement
  820. - move certificate makefile to another package
  821. - disable RC5, IDEA, RSA support
  822. - remove optimizations for now
  823. * Wed Mar 1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  824. - Bero told me to move the Makefile into this package
  825. * Wed Mar 1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  826. - add lib*.so symlinks to link dynamically against shared libs
  827. * Tue Feb 29 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  828. - update to 0.9.5
  829. - run ldconfig directly in post/postun
  830. - add FAQ
  831. * Sat Dec 18 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  832. - Fix build on non-x86 platforms
  833. * Fri Nov 12 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  834. - move /usr/share/ssl/* from -devel to main package
  835. * Tue Oct 26 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  836. - inital packaging
  837. - changes from base:
  838. - Move /usr/local/ssl to /usr/share/ssl for FHS compliance
  839. - handle RPM_OPT_FLAGS