openssl-vl.spec 38 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055
  1. %bcond_with fips
  2. %define build_compat32 %{?_with_compat32:1}%{!?_with_compat32:0}
  3. %{!?_pkgdocdir:%global _pkgdocdir %{_docdir}}
  4. # 1.0.0 soversion = 10
  5. # 1.1.0 soversion = 1.1 (same as upstream although presence of some symbols
  6. # depends on build configuration options)
  7. %define soversion 3
  8. %define srpmhash() %{lua:
  9. local files = rpm.expand("%_specdir/openssl.spec")
  10. for i, p in ipairs(patches) do
  11. files = files.." "..p
  12. end
  13. for i, p in ipairs(sources) do
  14. files = files.." "..p
  15. end
  16. local sha256sum = assert(io.popen("cat "..files.." 2>/dev/null | sha256sum"))
  17. local hash = sha256sum:read("*a")
  18. sha256sum:close()
  19. print(string.sub(hash, 0, 16))
  20. }
  21. Summary: Secure Sockets Layer Toolkit
  22. Name: openssl
  23. Version: 3.1.4
  24. Release: 1%{_dist_release}
  25. Group: system,security
  26. Vendor: Project Vine
  27. Distribution: Vine Linux
  28. Packager: daisuke, iwamoto
  29. License: BSDish
  30. URL: https://www.openssl.org/
  31. # We have to remove certain patented algorithms from the openssl source
  32. # tarball with the hobble-openssl script which is included below.
  33. # The original openssl upstream tarball cannot be shipped in the .src.rpm.
  34. Source: https://www.openssl.org/source/openssl-%{version}.tar.gz
  35. Source2: Makefile.certificate
  36. Source6: make-dummy-cert
  37. Source7: renew-dummy-cert
  38. Source9: configuration-switch.h
  39. Source10: configuration-prefix.h
  40. Source14: for-tests.patch
  41. # Patches exported from source git
  42. # # Aarch64 and ppc64le use lib64
  43. Patch1: 0001-Aarch64-and-ppc64le-use-lib64.patch
  44. # # Use more general default values in openssl.cnf
  45. Patch2: 0002-Use-more-general-default-values-in-openssl.cnf.patch
  46. # # Do not install html docs
  47. Patch3: 0003-Do-not-install-html-docs.patch
  48. # # Override default paths for the CA directory tree
  49. Patch4: 0004-Override-default-paths-for-the-CA-directory-tree.patch
  50. # # apps/ca: fix md option help text
  51. Patch5: 0005-apps-ca-fix-md-option-help-text.patch
  52. # # Disable signature verification with totally unsafe hash algorithms
  53. Patch6: 0006-Disable-signature-verification-with-totally-unsafe-h.patch
  54. # # Add support for PROFILE=SYSTEM system default cipherlist
  55. Patch7: 0007-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
  56. #Patch7: 0007-ossl_safe_getenv.patch
  57. # # Add FIPS_mode() compatibility macro
  58. Patch8: 0008-Add-FIPS_mode-compatibility-macro.patch
  59. # # Add check to see if fips flag is enabled in kernel
  60. Patch9: 0009-Add-Kernel-FIPS-mode-flag-support.patch
  61. # # Instead of replacing ectest.c and ec_curve.c, add the changes as a patch so
  62. # # that new modifications made to these files by upstream are not lost.
  63. Patch10: 0010-Add-changes-to-ectest-and-eccurve.patch
  64. # # remove unsupported EC curves
  65. Patch11: 0011-Remove-EC-curves.patch
  66. # # Disable explicit EC curves
  67. # # https://bugzilla.redhat.com/show_bug.cgi?id=2066412
  68. Patch12: 0012-Disable-explicit-ec.patch
  69. # # Skipped tests from former 0011-Remove-EC-curves.patch
  70. Patch13: 0013-skipped-tests-EC-curves.patch
  71. # # Instructions to load legacy provider in openssl.cnf
  72. #Patch24: 0024-load-legacy-prov.patch
  73. # # We load FIPS provider and set FIPS properties implicitly
  74. Patch32: 0032-Force-fips.patch
  75. # # Embed HMAC into the fips.so
  76. Patch33: 0033-FIPS-embed-hmac.patch
  77. # # Comment out fipsinstall command-line utility
  78. Patch34: 0034.fipsinstall_disable.patch
  79. # # Skip unavailable algorithms running `openssl speed`
  80. Patch35: 0035-speed-skip-unavailable-dgst.patch
  81. # # Extra public/private key checks required by FIPS-140-3
  82. Patch44: 0044-FIPS-140-3-keychecks.patch
  83. # # Minimize fips services
  84. Patch45: 0045-FIPS-services-minimize.patch
  85. # # Execute KATS before HMAC verification
  86. Patch47: 0047-FIPS-early-KATS.patch
  87. # # Selectively disallow SHA1 signatures rhbz#2070977
  88. Patch49: 0049-Allow-disabling-of-SHA1-signatures.patch
  89. # # Support SHA1 in TLS in LEGACY crypto-policy (which is SECLEVEL=1)
  90. Patch52: 0052-Allow-SHA1-in-seclevel-1-if-rh-allow-sha1-signatures.patch
  91. # # https://github.com/openssl/openssl/pull/18103
  92. # # The patch is incorporated in 3.0.3 but we provide this function since 3.0.1
  93. # # so the patch should persist
  94. Patch56: 0056-strcasecmp.patch
  95. # # https://bugzilla.redhat.com/show_bug.cgi?id=2053289
  96. Patch58: 0058-FIPS-limit-rsa-encrypt.patch
  97. # # https://bugzilla.redhat.com/show_bug.cgi?id=2087147
  98. Patch61: 0061-Deny-SHA-1-signature-verification-in-FIPS-provider.patch
  99. # 0062-fips-Expose-a-FIPS-indicator.patch
  100. Patch62: 0062-fips-Expose-a-FIPS-indicator.patch
  101. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102535
  102. Patch73: 0073-FIPS-Use-OAEP-in-KATs-support-fixed-OAEP-seed.patch
  103. # [PATCH 29/46]
  104. # 0074-FIPS-Use-digest_sign-digest_verify-in-self-test.patch
  105. Patch74: 0074-FIPS-Use-digest_sign-digest_verify-in-self-test.patch
  106. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102535
  107. Patch75: 0075-FIPS-Use-FFDHE2048-in-self-test.patch
  108. # # Downstream only. Reseed DRBG using getrandom(GRND_RANDOM)
  109. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102541
  110. Patch76: 0076-FIPS-140-3-DRBG.patch
  111. # # https://bugzilla.redhat.com/show_bug.cgi?id=2102542
  112. Patch77: 0077-FIPS-140-3-zeroization.patch
  113. # # https://bugzilla.redhat.com/show_bug.cgi?id=2114772
  114. Patch78: 0078-Add-FIPS-indicator-parameter-to-HKDF.patch
  115. # # https://github.com/openssl/openssl/pull/13817
  116. Patch79: 0079-RSA-PKCS15-implicit-rejection.patch
  117. # # We believe that some changes present in CentOS are not necessary
  118. # # because ustream has a check for FIPS version
  119. Patch80: 0080-rand-Forbid-truncated-hashes-SHA-3-in-FIPS-prov.patch
  120. # [PATCH 36/46]
  121. # 0081-signature-Remove-X9.31-padding-from-FIPS-prov.patch
  122. Patch81: 0081-signature-Remove-X9.31-padding-from-FIPS-prov.patch
  123. # [PATCH 37/46]
  124. # 0083-hmac-Add-explicit-FIPS-indicator-for-key-length.patch
  125. Patch83: 0083-hmac-Add-explicit-FIPS-indicator-for-key-length.patch
  126. # [PATCH 38/46]
  127. # 0084-pbkdf2-Set-minimum-password-length-of-8-bytes.patch
  128. Patch84: 0084-pbkdf2-Set-minimum-password-length-of-8-bytes.patch
  129. # 0085-FIPS-RSA-disable-shake.patch
  130. Patch85: 0085-FIPS-RSA-disable-shake.patch
  131. # 0088-signature-Add-indicator-for-PSS-salt-length.patch
  132. Patch88: 0088-signature-Add-indicator-for-PSS-salt-length.patch
  133. # 0091-FIPS-RSA-encapsulate.patch
  134. Patch91: 0091-FIPS-RSA-encapsulate.patch
  135. # [PATCH 42/46]
  136. # 0093-DH-Disable-FIPS-186-4-type-parameters-in-FIPS-mode.patch
  137. Patch93: 0093-DH-Disable-FIPS-186-4-type-parameters-in-FIPS-mode.patch
  138. # [PATCH 43/46]
  139. # 0110-GCM-Implement-explicit-FIPS-indicator-for-IV-gen.patch
  140. Patch110: 0110-GCM-Implement-explicit-FIPS-indicator-for-IV-gen.patch
  141. # [PATCH 44/46]
  142. # 0112-pbdkf2-Set-indicator-if-pkcs5-param-disabled-checks.patch
  143. Patch112: 0112-pbdkf2-Set-indicator-if-pkcs5-param-disabled-checks.patch
  144. # 0113-asymciphers-kem-Add-explicit-FIPS-indicator.patch
  145. Patch113: 0113-asymciphers-kem-Add-explicit-FIPS-indicator.patch
  146. # # We believe that some changes present in CentOS are not necessary
  147. # # because ustream has a check for FIPS version
  148. Patch114: 0114-FIPS-enforce-EMS-support.patch
  149. # security fix
  150. # none
  151. BuildRoot: %{_tmppath}/%{name}-%{version}-root
  152. BuildRequires: perl, sed
  153. BuildRequires: zlib-devel, krb5-devel
  154. BuildRequires: lksctp-tools-devel
  155. Requires: mktemp
  156. Requires: ca-certificates
  157. Requires: %{name}-libs = %{version}-%{release}
  158. Obsoletes: openssl111 < 3.0.0
  159. %define solibbase %(echo %version | sed 's/[[:alpha:]]//g')
  160. %description
  161. The OpenSSL certificate management tool and the shared libraries that
  162. provide various cryptographic algorithms and protocols.
  163. %package libs
  164. Summary: A general purpose cryptography library with TLS implementation
  165. Group: system
  166. %description libs
  167. OpenSSL is a toolkit for supporting cryptography. The openssl-libs
  168. package contains the libraries that are used by various applications which
  169. support cryptographic algorithms and protocols.
  170. %package devel
  171. Summary: OpenSSL libraries and development headers.
  172. Group: programming
  173. Requires: %{name}-libs = %{version}-%{release}
  174. Requires: krb5-devel
  175. Conflicts: openssl111-devel < 3.0.0
  176. %description devel
  177. The static libraries and include files needed to compile apps
  178. with support for various the cryptographic algorithms and protocols
  179. supported by OpenSSL.
  180. Patches for many networking apps can be found at:
  181. ftp://ftp.psy.uq.oz.au/pub/Crypto/SSLapps/
  182. %package static
  183. Summary: Libraries for static linking of applications which will use OpenSSL
  184. Group: programming
  185. Requires: %{name}-devel = %{version}-%{release}
  186. Conflicts: openssl111-static < 3.0.0
  187. %description static
  188. OpenSSL is a toolkit for supporting cryptography. The openssl-static
  189. package contains static libraries needed for static linking of
  190. applications which support various cryptographic algorithms and
  191. protocols.
  192. %package perl
  193. Summary: OpenSSL scripts which require Perl.
  194. Group: security
  195. Requires: %{name}-libs = %{version}-%{release}
  196. Obsoletes: openssl111-perl < 3.0.0
  197. Requires: perl
  198. %description perl
  199. Perl scripts provided with OpenSSL for converting certificates and keys
  200. from other formats to those used by OpenSSL.
  201. ## to build compat32 for x86_64 architecture support
  202. %package -n compat32-%{name}
  203. Summary: Secure Sockets Layer Toolkit
  204. Group: system
  205. Requires: %{name} = %{version}-%{release}
  206. %description -n compat32-%{name}
  207. The OpenSSL certificate management tool and the shared libraries that
  208. provide various cryptographic algorithms and protocols.
  209. %package -n compat32-%{name}-devel
  210. Summary: OpenSSL libraries and development headers.
  211. Group: programming
  212. Requires: compat32-%{name} = %{version}-%{release}
  213. Requires: compat32-krb5-devel
  214. Conflicts: compat32-openssl111-devel < 3.0.0
  215. %description -n compat32-%{name}-devel
  216. The static libraries and include files needed to compile apps
  217. with support for various the cryptographic algorithms and protocols
  218. supported by OpenSSL.
  219. %debug_package
  220. %prep
  221. %setup -q -n %{name}-%{version}
  222. %autopatch -p1
  223. %build
  224. # Figure out which flags we want to use.
  225. # default
  226. sslarch=%{_os}-%{_target_cpu}
  227. #
  228. %ifarch %ix86
  229. sslarch=linux-elf
  230. if ! echo %{_target} | grep -q i686 ; then
  231. sslflags="no-asm 386"
  232. fi
  233. %endif
  234. %ifarch x86_64
  235. sslflags=enable-ec_nistp_64_gcc_128
  236. %endif
  237. # Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
  238. # marked as not requiring an executable stack.
  239. # Also add -DPURIFY to make using valgrind with openssl easier as we do not
  240. # want to depend on the uninitialized memory as a source of entropy anyway.
  241. RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -Wa,--generate-missing-build-notes=yes -DPURIFY $RPM_LD_FLAGS"
  242. export HASHBANGPERL=/usr/bin/perl
  243. %define fips %{version}-%{srpmhash}
  244. # ia64, x86_64, ppc are OK by default
  245. # Configure the build tree. Override OpenSSL defaults with known-good defaults
  246. # usable on all platforms. The Configure script already knows to use -fPIC and
  247. # RPM_OPT_FLAGS, so we can skip specifiying them here.
  248. ./Configure \
  249. --prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
  250. --system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config \
  251. zlib enable-camellia enable-seed enable-rfc3779 enable-sctp \
  252. enable-cms enable-md2 enable-rc5 enable-ktls enable-fips \
  253. no-mdc2 no-ec2m no-sm2 no-sm4 enable-buildtest-c++ \
  254. shared ${sslarch} $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\"" -DREDHAT_FIPS_VERSION="\"%{fips}\""' \
  255. -Wl,--allow-multiple-definition
  256. # Do not run this in a production package the FIPS symbols must be patched-in
  257. #util/mkdef.pl crypto update
  258. make -s %{?_smp_mflags} all
  259. # Clean up the .pc files
  260. for i in libcrypto.pc libssl.pc openssl.pc ; do
  261. sed -i '/^Libs.private:/{s/-L[^ ]* //;s/-Wl[^ ]* //}' $i
  262. done
  263. %check
  264. # Verify that what was compiled actually works.
  265. # Hack - either enable SCTP AUTH chunks in kernel or disable sctp for check
  266. (sysctl net.sctp.addip_enable=1 && sysctl net.sctp.auth_enable=1) || \
  267. (echo 'Failed to enable SCTP AUTH chunks, disabling SCTP for tests...' &&
  268. sed '/"msan" => "default",/a\ \ "sctp" => "default",' configdata.pm > configdata.pm.new && \
  269. touch -r configdata.pm configdata.pm.new && \
  270. mv -f configdata.pm.new configdata.pm)
  271. # We must revert patch4 before tests otherwise they will fail
  272. patch -p1 -R < %{PATCH4}
  273. #We must disable default provider before tests otherwise they will fail
  274. patch -p1 < %{SOURCE14}
  275. LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
  276. export LD_LIBRARY_PATH
  277. OPENSSL_ENABLE_MD5_VERIFY=
  278. export OPENSSL_ENABLE_MD5_VERIFY
  279. OPENSSL_SYSTEM_CIPHERS_OVERRIDE=xyz_nonexistent_file
  280. export OPENSSL_SYSTEM_CIPHERS_OVERRIDE
  281. #embed HMAC into fips provider for test run
  282. OPENSSL_CONF=/dev/null LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < providers/fips.so > providers/fips.so.hmac
  283. objcopy --update-section .rodata1=providers/fips.so.hmac providers/fips.so providers/fips.so.mac
  284. mv providers/fips.so.mac providers/fips.so
  285. #run tests itself
  286. make test HARNESS_JOBS=8
  287. # Add generation of HMAC checksum of the final stripped library
  288. # We manually copy standard definition of __spec_install_post
  289. # and add hmac calculation/embedding to fips.so
  290. %define __spec_install_post \
  291. %{?__debug_package:%{__debug_install_post}} \
  292. %{__arch_install_post} \
  293. %{__os_install_post} \
  294. OPENSSL_CONF=/dev/null LD_LIBRARY_PATH=. apps/openssl dgst -binary -sha256 -mac HMAC -macopt hexkey:f4556650ac31d35461610bac4ed81b1a181b2d8a43ea2854cbae22ca74560813 < $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so > $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
  295. objcopy --update-section .rodata1=$RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac \
  296. mv $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.mac $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so \
  297. rm $RPM_BUILD_ROOT%{_libdir}/ossl-modules/fips.so.hmac \
  298. %{nil}
  299. %define __provides_exclude_from %{_libdir}/openssl
  300. %install
  301. [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
  302. # Install OpenSSL.
  303. install -d $RPM_BUILD_ROOT{/%{_lib},%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl,%{_pkgdocdir}}
  304. make DESTDIR=$RPM_BUILD_ROOT install
  305. mv $RPM_BUILD_ROOT%{_libdir}/lib*.so.%{soversion} $RPM_BUILD_ROOT/%{_lib}/
  306. rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT/%{_lib}/*.so.%{soversion}
  307. for lib in $RPM_BUILD_ROOT/%{_lib}/*.so.%{version} ; do
  308. chmod 755 ${lib}
  309. ln -s -f ../../%{_lib}/`basename ${lib}` $RPM_BUILD_ROOT/%{_libdir}/`basename ${lib} .%{version}`
  310. ln -s -f `basename ${lib}` $RPM_BUILD_ROOT/%{_lib}/`basename ${lib} .%{version}`.%{soversion}
  311. done
  312. # Install a makefile for generating keys and self-signed certs, and a script
  313. # for generating them on the fly.
  314. mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
  315. install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_pkgdocdir}/Makefile.certificate
  316. install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/make-dummy-cert
  317. install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_bindir}/renew-dummy-cert
  318. # Move runable perl scripts to bindir
  319. mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/*.pl $RPM_BUILD_ROOT%{_bindir}
  320. mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/tsget $RPM_BUILD_ROOT%{_bindir}
  321. # Rename man pages so that they don't conflict with other system man pages.
  322. pushd $RPM_BUILD_ROOT%{_mandir}
  323. mv man5/config.5ossl man5/openssl.cnf.5
  324. popd
  325. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
  326. mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
  327. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
  328. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
  329. mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
  330. # Ensure the config file timestamps are identical across builds to avoid
  331. # mulitlib conflicts and unnecessary renames on upgrade
  332. touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf
  333. touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf
  334. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf.dist
  335. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf.dist
  336. %ifarch i686
  337. rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/fipsmodule.cnf
  338. %endif
  339. # Determine which arch opensslconf.h is going to try to #include.
  340. basearch=%{_arch}
  341. %ifarch %{ix86}
  342. basearch=i386
  343. %endif
  344. # Next step of gradual disablement of SSL3.
  345. # Make SSL3 disappear to newly built dependencies.
  346. sed -i '/^\#ifndef OPENSSL_NO_SSL_TRACE/i\
  347. #ifndef OPENSSL_NO_SSL3\
  348. # define OPENSSL_NO_SSL3\
  349. #endif' $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
  350. %ifarch %{multilib_arches}
  351. # Do an opensslconf.h switcheroo to avoid file conflicts on systems where you
  352. # can have both a 32- and 64-bit version of the library, and they each need
  353. # their own correct-but-different versions of opensslconf.h to be usable.
  354. install -m644 %{SOURCE10} \
  355. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
  356. cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h >> \
  357. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration-${basearch}.h
  358. install -m644 %{SOURCE9} \
  359. $RPM_BUILD_ROOT/%{_prefix}/include/openssl/configuration.h
  360. %endif
  361. %clean
  362. [ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
  363. %files
  364. %defattr(-,root,root)
  365. %{!?_licensedir:%global license %%doc}
  366. %license LICENSE.txt
  367. %doc NEWS.md README.md
  368. %{_pkgdocdir}/Makefile.certificate
  369. %{_bindir}/make-dummy-cert
  370. %{_bindir}/renew-dummy-cert
  371. %{_bindir}/openssl
  372. %dir %{_mandir}/man1*
  373. %{_mandir}/man1*/*
  374. %dir %{_mandir}/man5*
  375. %{_mandir}/man5*/*
  376. %dir %{_mandir}/man7*
  377. %{_mandir}/man7*/*
  378. %exclude %{_mandir}/man1/*.pl*
  379. %exclude %{_mandir}/man1/tsget*
  380. %files libs
  381. %{!?_licensedir:%global license %%doc}
  382. %license LICENSE.txt
  383. %dir %{_sysconfdir}/pki/tls
  384. %dir %{_sysconfdir}/pki/tls/certs
  385. %dir %{_sysconfdir}/pki/tls/misc
  386. %dir %{_sysconfdir}/pki/tls/private
  387. %config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf
  388. %config(noreplace) %{_sysconfdir}/pki/tls/ct_log_list.cnf
  389. %attr(0755,root,root) /%{_lib}/libcrypto.so.%{version}
  390. /%{_lib}/libcrypto.so.%{soversion}
  391. %attr(0755,root,root) /%{_lib}/libssl.so.%{version}
  392. /%{_lib}/libssl.so.%{soversion}
  393. %attr(0755,root,root) %{_libdir}/engines-%{soversion}
  394. %attr(0755,root,root) %{_libdir}/ossl-modules
  395. %ifnarch i686
  396. %config(noreplace) %{_sysconfdir}/pki/tls/fipsmodule.cnf
  397. %endif
  398. %files devel
  399. %doc CHANGES.md doc/dir-locals.example.el doc/openssl-c-indent.el
  400. %{_prefix}/include/openssl
  401. %exclude %{_libdir}/lib*.a
  402. %{_libdir}/*.so
  403. %attr(0644,root,root) %{_libdir}/pkgconfig/*.pc
  404. %dir %{_mandir}/man3*
  405. %{_mandir}/man3*/*
  406. %files static
  407. %defattr(-,root,root)
  408. %attr(0644,root,root) %{_libdir}/*.a
  409. %files perl
  410. %defattr(-,root,root)
  411. %{_bindir}/c_rehash
  412. %{_bindir}/*.pl
  413. %{_bindir}/tsget
  414. %{_mandir}/man1*/*.pl*
  415. %{_mandir}/man1*/tsget*
  416. %dir %{_sysconfdir}/pki/CA
  417. %dir %{_sysconfdir}/pki/CA/private
  418. %dir %{_sysconfdir}/pki/CA/certs
  419. %dir %{_sysconfdir}/pki/CA/crl
  420. %dir %{_sysconfdir}/pki/CA/newcerts
  421. ## to build compat32 for x86_64 architecture support
  422. %if %{build_compat32}
  423. %files -n compat32-%{name}
  424. %defattr(-,root,root)
  425. %attr(0755,root,root) /%{_lib}/*.so.*
  426. %files -n compat32-%{name}-devel
  427. %defattr(-,root,root)
  428. %exclude %{_libdir}/lib*.a
  429. %attr(0755,root,root) %{_libdir}/*.so
  430. %attr(0644,root,root) %{_libdir}/pkgconfig/*.pc
  431. %endif
  432. %changelog
  433. * Wed Oct 25 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.4-1
  434. - new upstream release.
  435. * Wed Sep 20 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.1.3-1
  436. - new upstream release.
  437. * Wed Aug 02 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.10-1
  438. - new upstream release.
  439. * Tue Jul 11 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.9-1
  440. - new upstream release.
  441. * Wed Feb 08 2023 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.8-1
  442. - new upstream release.
  443. * Wed Nov 02 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.7-1
  444. - new upstream release.
  445. * Wed Oct 12 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.6-1
  446. - new upstream release.
  447. * Wed Jul 06 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.5-1
  448. - new upstream release.
  449. * Wed Jun 22 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.4-1
  450. - new upstream release.
  451. * Wed Mar 16 2022 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.2-1
  452. - new upstream release.
  453. * Wed Dec 15 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.1-1
  454. - new upstream release.
  455. * Thu Sep 30 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 3.0.0-1
  456. - new upstream release.
  457. * Wed Aug 25 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1l-1
  458. - new upstream release.
  459. * Fri Mar 26 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1k-1
  460. - new upstream release.
  461. - dropped ldconfig scriptlets.
  462. * Wed Feb 17 2021 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1j-1
  463. - new upstream release.
  464. * Wed Dec 09 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1i-1
  465. - new upstream release.
  466. * Sat Nov 21 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1h-1
  467. - new upstream release.
  468. - dropped Patch43: fixed in upstream.
  469. - imported Patch55-70 from rawhide.
  470. - updated Source13.
  471. * Sat Apr 25 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1g-1
  472. - new upstream release.
  473. * Wed Apr 08 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1f-1
  474. - new upstream release.
  475. - updated Patch1.
  476. - dropped Patch54: fixed in upstream.
  477. * Wed Mar 18 2020 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1e-1
  478. - new upstream release.
  479. - dropped Patch100 and 1000: fixed in upstream.
  480. * Fri Dec 20 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1d-2
  481. - imported Patch1000 from upstream.
  482. * Fri Sep 13 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1d-1
  483. - new upstream release.
  484. - updated Source12 and 13.
  485. - updated all patches.
  486. - imported Patch100 from upstream.
  487. * Sat Aug 24 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1c-1
  488. - new upstream release.
  489. - updated Patch37 and 41.
  490. - imported Patch52-54 from rawhide.
  491. * Mon May 06 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1b-2
  492. - fixed openssl.cnf
  493. * Sun May 05 2019 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1b-1
  494. - new upstream release.
  495. - imported Patch36 from rawhide.
  496. - updated Patch32.
  497. * Sat Dec 08 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1a-1
  498. - new upstream release.
  499. - updated Patch2.
  500. - dropped Patch36 and 46: fixed in upstream.
  501. * Thu Nov 01 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1-2
  502. - fixed symlinks.
  503. * Thu Nov 01 2018 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.1.1-1
  504. - new upstream release (newest LTS version).
  505. - imported fedora stuff (except FIPS).
  506. * Sun Apr 1 2018 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2o-1
  507. - new upstream release with security fixes
  508. * Sun Jan 21 2018 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2n-1
  509. - new upstream release with security fixes
  510. * Wed Nov 15 2017 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2m-1
  511. - new upstream release with security fixes
  512. * Sun Jan 29 2017 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2k-1
  513. - new upstream release with security fixes
  514. * Thu May 5 2016 IWAI, Masaharu <iwaim.sub@gmail.com> 1.0.2h-1
  515. - new upstream release with security fixes
  516. * Wed Mar 9 2016 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.2g-1
  517. - new upstream release 1.0.2 with security fixes
  518. - Patch2 is merged into Patch0
  519. * Mon Dec 28 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1q-1
  520. - new upstream release with security fixes
  521. * Fri Jul 10 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1p-1
  522. - new upstream release with security fixes
  523. * Wed Jul 1 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1o-1
  524. - new upstream release
  525. * Sun Apr 12 2015 Yoji TOYODA <bsyamato@sea.plala.or.jp> 1.0.1m-1
  526. - merged into Vine6
  527. * Fri Mar 20 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1m-1
  528. - new upstream release with security fixes
  529. - update Patch2,5
  530. * Mon Jan 12 2015 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1k-1
  531. - new upstream release with security fixes
  532. * Mon Oct 20 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1j-1
  533. - new upstream release with security fixes
  534. - add patch8 from fc21 (fix perl find.pl)
  535. * Fri Jun 6 2014 Tomohiro "Tomo-p" KATO <tomop@teamgedoh.net> 1.0.1h-1
  536. - new upstream release with security fixes.
  537. * Tue Apr 8 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1g-1
  538. - new upstream release with security fixes
  539. * Thu Jan 9 2014 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.1f-1
  540. - new upstream release with security fixes
  541. * Tue Sep 24 2013 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1e-2
  542. - move root CA bundle to ca-certificates package
  543. * Tue Feb 12 2013 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1e-1
  544. - update to 1.0.1e
  545. - 1.0.1d has major regressions from 1.0.1c
  546. * Sat Feb 9 2013 IWAI, Masaharu <iwai@alib.jp> 1.0.1d-2
  547. - remove tsget script to delete dependency perl(WWW::Curl::Easy)
  548. - openssl-perl package contains it in docdir
  549. * Fri Feb 08 2013 Toshiharu Kudoh <toshi.kd2@gmail.com> 1.0.1d-1
  550. - new upstream release with security fix (CVE-2012-2686, CVE-2013-0166, 0169)
  551. - fixed %%files
  552. * Tue May 29 2012 Daisuke SUZUKI <daisuke@linux.or.jp> 1.0.1c-1
  553. - update to 1.0.1c
  554. - enable configure options:
  555. enable-camellia enable-seed enable-tlsext enable-rfc3779
  556. enable-cms enable-md2
  557. - remove no-asm option from ai64/x86_64/ppc/ppc64/i686
  558. - generate a table with the compile settings before configure
  559. * Fri Jan 20 2012 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0g-1
  560. - new upstream release with security fix (CVE-2012-0050)
  561. * Fri Jan 6 2012 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0f-1
  562. - new upstream release with security fix
  563. (CVE-2011-4108,09, CVE-2011-4576,77, CVE-2011-4619, CVE-2012-0027)
  564. * Wed Sep 7 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0e-1
  565. - new upstream release with security fix (CVE-2011-3207, 3210)
  566. * Sun Mar 20 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0d-2
  567. - rebuild with krb5-libs 1.8
  568. * Fri Feb 11 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0d-1
  569. - new upstream release with security fix
  570. * Sat Jan 15 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-4
  571. - use upstream openssl.pc instead of vine original one (SOURCE6)
  572. * Sun Jan 9 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-3
  573. - move tsget to docs to delete dependency perl(WWW::Curl::Easy)
  574. * Sat Jan 1 2011 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-2
  575. - add R: krb5-devel into devel pkg
  576. - add R: compat32-krb5-devel into compat32-devel pkg
  577. * Fri Dec 31 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 1.0.0c-1
  578. - new upstream release 1.0.0x
  579. - separate static libs into static package
  580. - change configure options
  581. - change so version 10
  582. - add tsget into perl package
  583. - update all patches
  584. * Thu Dec 30 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8q-2
  585. - fix changelog typo...
  586. * Tue Dec 7 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8q-1
  587. - new upstream release with security fix (CVE-2010-4180)
  588. * Wed Nov 17 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8p-1
  589. - new upstream release with security fix (CVE-2010-3864)
  590. - drop patches included in new release
  591. - update patch4
  592. * Sun Jan 17 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-5
  593. - add patch12 for fix CVE-2009-3555 (renegotiation)
  594. * Fri Jan 15 2010 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-4
  595. - add patch11 for fix CVE-2009-4355 (memory leak)
  596. * Tue Jun 23 2009 Satoshi IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-3
  597. - add patch10 to fix CVE-2009-1377, 78, 79 (from fc11)
  598. * Mon Jun 22 2009 NAKAMURA Kenta <kenta@vinelinux.org> 0.9.8k-2
  599. - removed unnecessary %%if %{build_compat32} statements
  600. - removed lib*.a from devel package
  601. * Mon Mar 30 2009 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8k-1
  602. - new upstream release with security fix (CVE-2000-0590,0591,0789)
  603. * Sun Jan 11 2009 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8j-1
  604. - new upstream release with security fix (CVE-2008-5077)
  605. * Sat Sep 20 2008 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8i-1
  606. - new upstream release
  607. * Sat Jul 12 2008 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.8h-1
  608. - new upstream release
  609. - new versioning policy
  610. * Sat Oct 27 2007 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8g-0vl1
  611. - new upstream release
  612. - drop patch10,20 which is merged in upstream
  613. * Fri Sep 28 2007 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.8e-0vl3
  614. - add security patch in advance for CVE-2007-5135
  615. http://www.securityfocus.com/archive/1/archive/1/480855/100/0/threaded
  616. http://marc.info/?l=openssl-cvs&m=119020417919619&w=2
  617. * Fri Aug 10 2007 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.8e-0vl2
  618. - add security patch for CVE-2007-3108
  619. (http://openssl.org/news/patch-CVE-2007-3108.txt)
  620. * Tue May 15 2007 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.8e-0vl1
  621. - new upstream release
  622. * Sun Dec 24 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7l-0vl2
  623. - update (fix) openssl.pc <BTS:437>
  624. * Fri Sep 29 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7l-0vl1
  625. - new upstream release (with security fix)
  626. * Mon Sep 11 2006 Satosh IWAMOTO <satoshi.iwamoto@nifty.ne.jp> 0.9.7k-0vl1
  627. - new upstream release
  628. - add patch2 to use RPM_OPT macro
  629. * Mon Feb 06 2006 Shu KONNO <owa@bg.wakwak.com> 0.9.7i-0vl3
  630. - moved macros _lib to /usr/lib/rpm/rpmrc or macros files
  631. * Fri Feb 03 2006 Shu KONNO <owa@bg.wakwak.com> 0.9.7i-0vl2
  632. - added compat32-* packages for x86_64 architecture support
  633. - added openssl-0.9.7i.Configure-compat32.patch
  634. - changed '/lib' to '/%{_lib}'
  635. * Mon Oct 17 2005 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.7i-0vl1
  636. - new upstream release
  637. * Mon Jan 31 2005 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.7d-0vl4
  638. - rebuild on VineSeed
  639. * Sun Jan 09 2005 IKEDA Katsumi <ikeda@webmasters.gr.jp> 0.9.7d-0vl3.1
  640. - added a security patch from Gentoo.
  641. - Patch1: openssl-0.9.7c-tempfile.patch
  642. * Sun Mar 28 2004 MATSUBAYASHI Kohji <shaolin@vinelinux.org> 0.9.7d-0vl3
  643. - sslarch for ppc was missing... added.
  644. * Fri Mar 26 2004 Tomoya TAKA <taka@vinelinux.org> 0.9.7d-0vl2
  645. - use sslarch=linux-alpha-gcc instead of alpha-gcc
  646. * Mon Mar 22 2004 Satoshi MACHINO <machino@vinelinux.org> 0.9.7d-0vl1
  647. - new upstream version
  648. - clean up of spec file
  649. -- removed old patches
  650. * Sat Mar 20 2004 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6m-0vl1
  651. - new upstream release
  652. - SECURITY fix.
  653. - http://www.openssl.org/news/secadv_20040317.txt
  654. * Wed Oct 1 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6k-0vl1
  655. - new upstream release
  656. - [Security fix]
  657. - Vulnerabilities in ASN.1 parsing
  658. http://www.openssl.org/news/secadv_20030930.txt
  659. - see %{_docdir}/%{name}-%{version}/CHANGES for other changes
  660. * Wed Jun 04 2003 HOTTA Michihide <hotta@net-newbie.com> 0.9.6j-0vl2
  661. - add openssl.pc for pkgconfig
  662. * Tue Mar 11 2003 Satoshi MACHINO <machino@vinelinux.org> 0.9.6j-0vl1
  663. - New upstream version
  664. - dropped patch10, 11
  665. -- merged upstream version
  666. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl1
  667. - rebuild for VineSeed
  668. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl0.26.1
  669. - [Security Fix]
  670. - Timing-based attacks on RSA keys
  671. http://www.openssl.org/news/secadv_20030317.txt
  672. - Klima-Pokorny0Rosa attack on RSA in SSL/TLS
  673. http://www.openssl.org/news/secadv_20030317.txt
  674. * Sun Feb 23 2003 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6i-0vl0.26
  675. - new upstream release 0.9.6i
  676. - [Security Fix]
  677. - build for Vine Linux 2.6 errata
  678. * Mon Nov 18 2002 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6h-0vl1
  679. - new upstream release 0.9.6h
  680. * Mon Nov 18 2002 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6g-0vl1
  681. - new upstream release 0.9.6g
  682. * Mon Oct 28 2002 IWAI Masaharu <iwai@alib.jp> 0.9.6b-1vl6
  683. - SECURITY: CAN-2002-0659 fixed
  684. - added Patch101 from RedHat 7.2 updates 0.9.6b-28
  685. * Fri Aug 02 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-28
  686. - update asn patch to fix accidental reversal of a logic check
  687. * Thu Aug 01 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-27
  688. - update asn patch to reduce chance that compiler optimization will remove
  689. one of the added tests
  690. * Thu Aug 01 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-26
  691. - rebuild
  692. * Tue Jul 30 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-25
  693. - add patch to fix ASN.1 vulnerabilities
  694. * Wed Jul 31 2002 IWAI Masaharu <iwai@alib.jp> 0.9.6b-1vl5
  695. - rename spec file name
  696. - SECURITY: CA-2002-23 fixed
  697. - added Patch100 from RedHat 7.2 updates 0.9.6b-24
  698. * Thu Jul 25 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-24
  699. - add backport of Ben Laurie's patches for OpenSSL 0.9.6d
  700. * Mon Sep 10 2001 Satoshi MACHINO <machino@vinelinux.org> 0.9.6b-1vl4
  701. - added ${PATH} in LD_LIBRARY_PATH
  702. - added install -m 755 *.so.* $RPM_BUILD_ROOT%{_libdir} in %install
  703. * Sun Jul 15 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl3
  704. - remove --no-<cipher>
  705. * Sun Jul 15 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl2
  706. - add Patch10 for mipsel shared ( Configure )
  707. * Sat Jul 14 2001 Daisuke SUZUKI <daisuke@linux.or.jp> 0.9.6b-1vl1
  708. - build for Vine Linux
  709. - use openssl-engine-0.9.6b.tar.gz
  710. * Wed Jul 11 2001 Nalin Dahyabhai <nalin@redhat.com>
  711. - update to 0.9.6b
  712. * Thu Jul 5 2001 Nalin Dahyabhai <nalin@redhat.com>
  713. - move .so symlinks back to %%{_libdir}
  714. * Tue Jul 3 2001 Nalin Dahyabhai <nalin@redhat.com>
  715. - move shared libraries to /lib (#38410)
  716. * Mon Jun 25 2001 Nalin Dahyabhai <nalin@redhat.com>
  717. - switch to engine code base
  718. * Mon Jun 18 2001 Nalin Dahyabhai <nalin@redhat.com>
  719. - add a script for creating dummy certificates
  720. - move man pages from %%{_mandir}/man?/foo.?ssl to %%{_mandir}/man?ssl/foo.?
  721. * Thu Jun 07 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  722. - add s390x support
  723. * Fri Jun 1 2001 Nalin Dahyabhai <nalin@redhat.com>
  724. - change two memcpy() calls to memmove()
  725. - don't define L_ENDIAN on alpha
  726. * Tue May 15 2001 Nalin Dahyabhai <nalin@redhat.com>
  727. - make subpackages depend on the main package
  728. * Tue May 1 2001 Nalin Dahyabhai <nalin@redhat.com>
  729. - adjust the hobble script to not disturb symlinks in include/ (fix from
  730. Joe Orton)
  731. * Thu Apr 26 2001 Nalin Dahyabhai <nalin@redhat.com>
  732. - drop the m2crypo patch we weren't using
  733. * Tue Apr 24 2001 Nalin Dahyabhai <nalin@redhat.com>
  734. - configure using "shared" as well
  735. * Sun Apr 8 2001 Nalin Dahyabhai <nalin@redhat.com>
  736. - update to 0.9.6a
  737. - use the build-shared target to build shared libraries
  738. - bump the soversion to 2 because we're no longer compatible with
  739. our 0.9.5a packages or our 0.9.6 packages
  740. - drop the patch for making rsatest a no-op when rsa null support is used
  741. - put all man pages into <section>ssl instead of <section>
  742. - break the m2crypto modules into a separate package
  743. * Tue Mar 13 2001 Nalin Dahyabhai <nalin@redhat.com>
  744. - use BN_LLONG on s390
  745. * Mon Mar 12 2001 Nalin Dahyabhai <nalin@redhat.com>
  746. - fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit)
  747. * Sat Mar 3 2001 Nalin Dahyabhai <nalin@redhat.com>
  748. - move c_rehash to the perl subpackage, because it's a perl script now
  749. * Fri Mar 2 2001 Nalin Dahyabhai <nalin@redhat.com>
  750. - update to 0.9.6
  751. - enable MD2
  752. - use the libcrypto.so and libssl.so targets to build shared libs with
  753. - bump the soversion to 1 because we're no longer compatible with any of
  754. the various 0.9.5a packages circulating around, which provide lib*.so.0
  755. * Wed Feb 28 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  756. - change hobble-openssl for disabling MD2 again
  757. * Tue Feb 27 2001 Nalin Dahyabhai <nalin@redhat.com>
  758. - re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152
  759. bytes or so, causing EVP_DigestInit() to zero out stack variables in
  760. apps built against a version of the library without it
  761. * Mon Feb 26 2001 Nalin Dahyabhai <nalin@redhat.com>
  762. - disable some inline assembly, which on x86 is Pentium-specific
  763. - re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all)
  764. * Thu Feb 08 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  765. - fix s390 patch
  766. * Fri Dec 8 2000 Than Ngo <than@redhat.com>
  767. - added support s390
  768. * Mon Nov 20 2000 Nalin Dahyabhai <nalin@redhat.com>
  769. - remove -Wa,* and -m* compiler flags from the default Configure file (#20656)
  770. - add the CA.pl man page to the perl subpackage
  771. * Thu Nov 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  772. - always build with -mcpu=ev5 on alpha
  773. * Tue Oct 31 2000 Nalin Dahyabhai <nalin@redhat.com>
  774. - add a symlink from cert.pem to ca-bundle.crt
  775. * Wed Oct 25 2000 Nalin Dahyabhai <nalin@redhat.com>
  776. - add a ca-bundle file for packages like Samba to reference for CA certificates
  777. * Tue Oct 24 2000 Nalin Dahyabhai <nalin@redhat.com>
  778. - remove libcrypto's crypt(), which doesn't handle md5crypt (#19295)
  779. * Mon Oct 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  780. - add unzip as a buildprereq (#17662)
  781. - update m2crypto to 0.05-snap4
  782. * Tue Sep 26 2000 Bill Nottingham <notting@redhat.com>
  783. - fix some issues in building when it's not installed
  784. * Wed Sep 6 2000 Nalin Dahyabhai <nalin@redhat.com>
  785. - make sure the headers we include are the ones we built with (aaaaarrgh!)
  786. * Fri Sep 1 2000 Nalin Dahyabhai <nalin@redhat.com>
  787. - add Richard Henderson's patch for BN on ia64
  788. - clean up the changelog
  789. * Tue Aug 29 2000 Nalin Dahyabhai <nalin@redhat.com>
  790. - fix the building of python modules without openssl-devel already installed
  791. * Wed Aug 23 2000 Nalin Dahyabhai <nalin@redhat.com>
  792. - byte-compile python extensions without the build-root
  793. - adjust the makefile to not remove temporary files (like .key files when
  794. building .csr files) by marking them as .PRECIOUS
  795. * Sat Aug 19 2000 Nalin Dahyabhai <nalin@redhat.com>
  796. - break out python extensions into a subpackage
  797. * Mon Jul 17 2000 Nalin Dahyabhai <nalin@redhat.com>
  798. - tweak the makefile some more
  799. * Tue Jul 11 2000 Nalin Dahyabhai <nalin@redhat.com>
  800. - disable MD2 support
  801. * Thu Jul 6 2000 Nalin Dahyabhai <nalin@redhat.com>
  802. - disable MDC2 support
  803. * Sun Jul 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  804. - tweak the disabling of RC5, IDEA support
  805. - tweak the makefile
  806. * Thu Jun 29 2000 Nalin Dahyabhai <nalin@redhat.com>
  807. - strip binaries and libraries
  808. - rework certificate makefile to have the right parts for Apache
  809. * Wed Jun 28 2000 Nalin Dahyabhai <nalin@redhat.com>
  810. - use %%{_perl} instead of /usr/bin/perl
  811. - disable alpha until it passes its own test suite
  812. * Fri Jun 9 2000 Nalin Dahyabhai <nalin@redhat.com>
  813. - move the passwd.1 man page out of the passwd package's way
  814. * Fri Jun 2 2000 Nalin Dahyabhai <nalin@redhat.com>
  815. - update to 0.9.5a, modified for U.S.
  816. - add perl as a build-time requirement
  817. - move certificate makefile to another package
  818. - disable RC5, IDEA, RSA support
  819. - remove optimizations for now
  820. * Wed Mar 1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  821. - Bero told me to move the Makefile into this package
  822. * Wed Mar 1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  823. - add lib*.so symlinks to link dynamically against shared libs
  824. * Tue Feb 29 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  825. - update to 0.9.5
  826. - run ldconfig directly in post/postun
  827. - add FAQ
  828. * Sat Dec 18 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  829. - Fix build on non-x86 platforms
  830. * Fri Nov 12 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  831. - move /usr/share/ssl/* from -devel to main package
  832. * Tue Oct 26 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  833. - inital packaging
  834. - changes from base:
  835. - Move /usr/local/ssl to /usr/share/ssl for FHS compliance
  836. - handle RPM_OPT_FLAGS