commit 294a8358c2486ef3f5ba71fb87154f9cf1273b28
Author: Adrian Schröter
Date: Fri Jan 19 16:36:07 2024 +0100
Sync from SUSE:ALP:Source:Standard:1.0 gnutls revision a3376efb8f91a7caca1aef66c58b169d
diff --git a/.gitattributes b/.gitattributes
new file mode 100644
index 0000000..fecc750
--- /dev/null
+++ b/.gitattributes
@@ -0,0 +1,23 @@
+## Default LFS
+*.7z filter=lfs diff=lfs merge=lfs -text
+*.bsp filter=lfs diff=lfs merge=lfs -text
+*.bz2 filter=lfs diff=lfs merge=lfs -text
+*.gem filter=lfs diff=lfs merge=lfs -text
+*.gz filter=lfs diff=lfs merge=lfs -text
+*.jar filter=lfs diff=lfs merge=lfs -text
+*.lz filter=lfs diff=lfs merge=lfs -text
+*.lzma filter=lfs diff=lfs merge=lfs -text
+*.obscpio filter=lfs diff=lfs merge=lfs -text
+*.oxt filter=lfs diff=lfs merge=lfs -text
+*.pdf filter=lfs diff=lfs merge=lfs -text
+*.png filter=lfs diff=lfs merge=lfs -text
+*.rpm filter=lfs diff=lfs merge=lfs -text
+*.tbz filter=lfs diff=lfs merge=lfs -text
+*.tbz2 filter=lfs diff=lfs merge=lfs -text
+*.tgz filter=lfs diff=lfs merge=lfs -text
+*.ttf filter=lfs diff=lfs merge=lfs -text
+*.txz filter=lfs diff=lfs merge=lfs -text
+*.whl filter=lfs diff=lfs merge=lfs -text
+*.xz filter=lfs diff=lfs merge=lfs -text
+*.zip filter=lfs diff=lfs merge=lfs -text
+*.zst filter=lfs diff=lfs merge=lfs -text
diff --git a/baselibs.conf b/baselibs.conf
new file mode 100644
index 0000000..551eca4
--- /dev/null
+++ b/baselibs.conf
@@ -0,0 +1,7 @@
+libgnutls30
+ obsoletes "gnutls-"
+ provides "libgnutls30-hmac- = -%release"
+ obsoletes "libgnutls30-hmac- < -%release"
+libgnutls-devel
+ requires -libgnutls-
+ requires "libgnutls30- = "
diff --git a/gnutls-3.5.11-skip-trust-store-tests.patch b/gnutls-3.5.11-skip-trust-store-tests.patch
new file mode 100644
index 0000000..c733e75
--- /dev/null
+++ b/gnutls-3.5.11-skip-trust-store-tests.patch
@@ -0,0 +1,31 @@
+From: Andreas Stieger
+Date: Thu, 18 May 2017 10:31:42 +0200
+References: https://build.opensuse.org/request/show/493998
+Upstream: never
+
+trust-store test added in
+https://gitlab.com/gnutls/gnutls/commit/8d740ae87fae9c1237421dd24825b78103c5da36
+need ca-certificates-mozilla to run.
+
+[ 242s] FAIL: trust-store
+[ 242s] =================
+[ 242s]
+[ 242s] doit:64: no certificates were found in system trust store!
+[ 242s] FAIL trust-store (exit status: 1)
+
+But this would create a build cycle. Skip test.
+
+Index: gnutls-3.6.15/tests/trust-store.c
+===================================================================
+--- gnutls-3.6.15.orig/tests/trust-store.c 2020-09-08 10:24:24.018094247 +0200
++++ gnutls-3.6.15/tests/trust-store.c 2020-09-08 10:24:25.534104346 +0200
+@@ -44,6 +44,9 @@ static void tls_log_func(int level, cons
+
+ void doit(void)
+ {
++ /* building without ca-certificates-mozilla, skip test */
++ exit(77);
++
+ gnutls_certificate_credentials_t x509_cred;
+ int ret;
+
diff --git a/gnutls-3.8.3.tar.xz b/gnutls-3.8.3.tar.xz
new file mode 100644
index 0000000..71b9144
--- /dev/null
+++ b/gnutls-3.8.3.tar.xz
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:f74fc5954b27d4ec6dfbb11dea987888b5b124289a3703afcada0ee520f4173e
+size 6463720
diff --git a/gnutls-3.8.3.tar.xz.sig b/gnutls-3.8.3.tar.xz.sig
new file mode 100644
index 0000000..f07c446
Binary files /dev/null and b/gnutls-3.8.3.tar.xz.sig differ
diff --git a/gnutls-FIPS-140-3-references.patch b/gnutls-FIPS-140-3-references.patch
new file mode 100644
index 0000000..335f936
--- /dev/null
+++ b/gnutls-FIPS-140-3-references.patch
@@ -0,0 +1,1198 @@
+Index: gnutls-3.8.3/configure.ac
+===================================================================
+--- gnutls-3.8.3.orig/configure.ac
++++ gnutls-3.8.3/configure.ac
+@@ -623,19 +623,19 @@ LT_INIT([disable-static,win32-dll,shared
+ AC_LIB_HAVE_LINKFLAGS(dl,, [#include ], [dladdr (0, 0);])
+
+ AC_ARG_ENABLE(fips140-mode,
+- AS_HELP_STRING([--enable-fips140-mode], [enable FIPS140-2 mode]),
++ AS_HELP_STRING([--enable-fips140-mode], [enable FIPS140-3 mode]),
+ enable_fips=$enableval, enable_fips=no)
+ AM_CONDITIONAL(ENABLE_FIPS140, test "$enable_fips" = "yes")
+ if [ test "$enable_fips" = "yes" ];then
+ if test "x$HAVE_LIBDL" = "xyes";then
+- AC_DEFINE([ENABLE_FIPS140], 1, [Enable FIPS140-2 mode])
++ AC_DEFINE([ENABLE_FIPS140], 1, [Enable FIPS140-3 mode])
+ AC_SUBST([FIPS140_LIBS], $LIBDL)
+ AC_ARG_WITH(fips140-key, AS_HELP_STRING([--with-fips140-key],
+ [specify the FIPS140 HMAC key for integrity]),
+ fips_key="$withval",
+ fips_key="orboDeJITITejsirpADONivirpUkvarP")
+
+- AC_DEFINE_UNQUOTED([FIPS_KEY], ["$fips_key"], [The FIPS140-2 integrity key])
++ AC_DEFINE_UNQUOTED([FIPS_KEY], ["$fips_key"], [The FIPS140-3 integrity key])
+
+ AC_ARG_WITH(fips140-module-name, AS_HELP_STRING([--with-fips140-module-name],
+ [specify the FIPS140 module name]),
+Index: gnutls-3.8.3/doc/cha-gtls-app.texi
+===================================================================
+--- gnutls-3.8.3.orig/doc/cha-gtls-app.texi
++++ gnutls-3.8.3/doc/cha-gtls-app.texi
+@@ -222,7 +222,7 @@ CPU. The currently available options are
+ @end itemize
+
+ @item @code{GNUTLS_FORCE_FIPS_MODE}
+-@tab In setups where GnuTLS is compiled with support for FIPS140-2 (see @ref{FIPS140-2 mode})
++@tab In setups where GnuTLS is compiled with support for FIPS140-3 (see @ref{FIPS140-3 mode})
+ if set to one it will force the FIPS mode enablement.
+
+ @end multitable
+Index: gnutls-3.8.3/doc/cha-internals.texi
+===================================================================
+--- gnutls-3.8.3.orig/doc/cha-internals.texi
++++ gnutls-3.8.3/doc/cha-internals.texi
+@@ -14,7 +14,7 @@ happens inside the black box.
+ * TLS Hello Extension Handling::
+ * Cryptographic Backend::
+ * Random Number Generators-internals::
+-* FIPS140-2 mode::
++* FIPS140-3 mode::
+ @end menu
+
+ @node The TLS Protocol
+@@ -529,7 +529,7 @@ For more information see @ref{Hardware s
+
+ GnuTLS provides two random generators. The default, and the AES-DRBG random
+ generator which is only used when the library is compiled with support for
+-FIPS140-2 and the system is in FIPS140-2 mode.
++FIPS140-3 and the system is in FIPS140-3 mode.
+
+ @subheading The default generator - inner workings
+
+@@ -659,23 +659,23 @@ two distinct times, and being able to re
+ after observing the output of the PRNG. Given the approach described
+ on the above paragraph, all levels are immune to such attack.
+
+-@node FIPS140-2 mode
+-@section FIPS140-2 mode
++@node FIPS140-3 mode
++@section FIPS140-3 mode
+
+-GnuTLS can operate in a special mode for FIPS140-2. That mode of operation
+-is for the conformance to NIST's FIPS140-2 publication, which consists of policies
++GnuTLS can operate in a special mode for FIPS140-3. That mode of operation
++is for the conformance to NIST's FIPS140-3 publication, which consists of policies
+ for cryptographic modules (such as software libraries). Its implementation in
+ GnuTLS is designed for Red Hat Enterprise Linux, and can only be enabled
+ when the library is explicitly compiled with the '--enable-fips140-mode'
+ configure option.
+
+-There are two distinct library states with regard to FIPS140-2: the FIPS140-2
++There are two distinct library states with regard to FIPS140-3: the FIPS140-3
+ mode is @emph{installed} if @code{/etc/system-fips} is present, and the
+-FIPS140-2 mode is @emph{enabled} if @code{/proc/sys/crypto/fips_enabled}
++FIPS140-3 mode is @emph{enabled} if @code{/proc/sys/crypto/fips_enabled}
+ contains '1', which is typically set with the ``fips=1'' kernel command line
+ option.
+
+-When the FIPS140-2 mode is installed, the operation of the library is modified
++When the FIPS140-3 mode is installed, the operation of the library is modified
+ as follows.
+
+ @itemize
+@@ -684,12 +684,12 @@ as follows.
+ @item Algorithm self-tests are run on library load
+ @end itemize
+
+-When the FIPS140-2 mode is enabled, The operation of the library is in addition
++When the FIPS140-3 mode is enabled, The operation of the library is in addition
+ modified as follows.
+
+ @itemize
+-@item Only approved by FIPS140-2 algorithms are enabled
+-@item Only approved by FIPS140-2 key lengths are allowed for key generation
++@item Only approved by FIPS140-3 algorithms are enabled
++@item Only approved by FIPS140-3 key lengths are allowed for key generation
+ @item Any cryptographic operation will be refused if any of the self-tests failed
+ @end itemize
+
+@@ -698,7 +698,7 @@ There are also few environment variables
+ environment variable @code{GNUTLS_SKIP_FIPS_INTEGRITY_CHECKS} will disable
+ the library integrity tests on startup, and the variable
+ @code{GNUTLS_FORCE_FIPS_MODE} can be set to force a value from
+-@ref{gnutls_fips_mode_t}, i.e., '1' will enable the FIPS140-2
++@ref{gnutls_fips_mode_t}, i.e., '1' will enable the FIPS140-3
+ mode, while '0' will disable it.
+
+ The integrity checks for the dependent libraries and GnuTLS are performed
+@@ -706,20 +706,20 @@ using '.hmac' files which are present at
+ key for the operations can be provided on compile-time with the configure
+ option '--with-fips140-key'. The MAC algorithm used is HMAC-SHA256.
+
+-On runtime an application can verify whether the library is in FIPS140-2
++On runtime an application can verify whether the library is in FIPS140-3
+ mode using the @funcref{gnutls_fips140_mode_enabled} function.
+
+-@subheading Relaxing FIPS140-2 requirements
++@subheading Relaxing FIPS140-3 requirements
+
+ The library by default operates in a strict enforcing mode, ensuring that
+-all constraints imposed by the FIPS140-2 specification are enforced. However
++all constraints imposed by the FIPS140-3 specification are enforced. However
+ the application can relax these requirements via @funcref{gnutls_fips140_set_mode}
+ which can switch to alternative modes as in @ref{gnutls_fips_mode_t}.
+
+ @showenumdesc{gnutls_fips_mode_t,The @code{gnutls_@-fips_@-mode_t} enumeration.}
+
+ The intention of this API is to be used by applications which may run in
+-FIPS140-2 mode, while they utilize few algorithms not in the allowed set,
++FIPS140-3 mode, while they utilize few algorithms not in the allowed set,
+ e.g., for non-security related purposes. In these cases applications should
+ wrap the non-compliant code within blocks like the following.
+
+@@ -748,9 +748,9 @@ if (gnutls_fips140_mode_enabled())
+ The reason of the @code{GNUTLS_FIPS140_SET_MODE_THREAD} flag in the
+ previous calls is to localize the change in the mode. Note also, that
+ such a block has no effect when the library is not operating
+-under FIPS140-2 mode, and thus it can be considered a no-op.
++under FIPS140-3 mode, and thus it can be considered a no-op.
+
+-Applications could also switch FIPS140-2 mode explicitly off, by calling
++Applications could also switch FIPS140-3 mode explicitly off, by calling
+ @example
+ gnutls_fips140_set_mode(GNUTLS_FIPS140_LAX, 0);
+ @end example
+@@ -768,7 +768,7 @@ performed within a given context.
+
+ @showfuncD{gnutls_fips140_context_init,gnutls_fips140_context_deinit,gnutls_fips140_push_context,gnutls_fips140_pop_context}
+
+-The @code{gnutls_fips140_context_t} represents the FIPS140-2 mode of
++The @code{gnutls_fips140_context_t} represents the FIPS140-3 mode of
+ operation. It can be attached to the current execution thread with
+ @funcref{gnutls_fips140_push_context} and its internal state will be
+ updated until it is detached with
+Index: gnutls-3.8.3/doc/enums.texi
+===================================================================
+--- gnutls-3.8.3.orig/doc/enums.texi
++++ gnutls-3.8.3/doc/enums.texi
+@@ -1188,7 +1188,7 @@ application traffic secret is installed
+ @c gnutls_fips_mode_t
+ @table @code
+ @item GNUTLS_@-FIPS140_@-DISABLED
+-The FIPS140-2 mode is disabled.
++The FIPS140-3 mode is disabled.
+ @item GNUTLS_@-FIPS140_@-STRICT
+ The default mode; all forbidden operations will cause an
+ operation failure via error code.
+@@ -1196,8 +1196,8 @@ operation failure via error code.
+ A transient state during library initialization. That state
+ cannot be set or seen by applications.
+ @item GNUTLS_@-FIPS140_@-LAX
+-The library still uses the FIPS140-2 relevant algorithms but all
+-forbidden by FIPS140-2 operations are allowed; this is useful when the
++The library still uses the FIPS140-3 relevant algorithms but all
++forbidden by FIPS140-3 operations are allowed; this is useful when the
+ application is aware of the followed security policy, and needs
+ to utilize disallowed operations for other reasons (e.g., compatibility).
+ @item GNUTLS_@-FIPS140_@-LOG
+Index: gnutls-3.8.3/doc/functions/gnutls_fips140_set_mode
+===================================================================
+--- gnutls-3.8.3.orig/doc/functions/gnutls_fips140_set_mode
++++ gnutls-3.8.3/doc/functions/gnutls_fips140_set_mode
+@@ -3,7 +3,7 @@
+
+
+ @deftypefun {void} {gnutls_fips140_set_mode} (gnutls_fips_mode_t @var{mode}, unsigned @var{flags})
+-@var{mode}: the FIPS140-2 mode to switch to
++@var{mode}: the FIPS140-3 mode to switch to
+
+ @var{flags}: should be zero or @code{GNUTLS_FIPS140_SET_MODE_THREAD}
+
+@@ -12,13 +12,13 @@ That function is not thread-safe when ch
+ behavior with no flags after threads are created is undefined.
+
+ When the flag @code{GNUTLS_FIPS140_SET_MODE_THREAD} is specified
+-then this call will change the FIPS140-2 mode for this particular
++then this call will change the FIPS140-3 mode for this particular
+ thread and not for the whole process. That way an application
+ can utilize this function to set and reset mode for specific
+ operations.
+
+ This function never fails but will be a no-op if used when
+-the library is not in FIPS140-2 mode. When asked to switch to unknown
++the library is not in FIPS140-3 mode. When asked to switch to unknown
+ values for @code{mode} or to @code{GNUTLS_FIPS140_SELFTESTS} mode, the library
+ switches to @code{GNUTLS_FIPS140_STRICT} mode.
+
+Index: gnutls-3.8.3/doc/gnutls.html
+===================================================================
+--- gnutls-3.8.3.orig/doc/gnutls.html
++++ gnutls-3.8.3/doc/gnutls.html
+@@ -484,7 +484,7 @@ Documentation License”.
+ 11.4 TLS Extension Handling
+ 11.5 Cryptographic Backend
+ 11.6 Random Number Generators
+- 11.7 FIPS140-2 mode
++ 11.7 FIPS140-3 mode
+
+ Appendix A Upgrading from previous versions
+ Appendix B Support
+@@ -9035,7 +9035,7 @@ CPU. The currently available options are
+ 0x200000: Enable VIA PHE
+ 0x400000: Enable VIA PHE SHA512
+
+-GNUTLS_FORCE_FIPS_MODE | In setups where GnuTLS is compiled with support for FIPS140-2 (see FIPS140-2 mode)
++ |
GNUTLS_FORCE_FIPS_MODE | In setups where GnuTLS is compiled with support for FIPS140-3 (see FIPS140-3 mode)
+ if set to one it will force the FIPS mode enablement. |
+
+
+@@ -18446,7 +18446,7 @@ None:
+ --inline-commands-prefix=str Change the default delimiter for inline commands
+ --provider=file Specify the PKCS #11 provider library
+ - file must pre-exist
+- --fips140-mode Reports the status of the FIPS140-2 mode in gnutls library
++ --fips140-mode Reports the status of the FIPS140-3 mode in gnutls library
+ --list-config Reports the configuration of the library
+ --logfile=str Redirect informational messages to a specific file
+ --keymatexport=str Label used for exporting keying material
+@@ -19468,7 +19468,7 @@ happens inside the black box.
+ TLS Extension Handling
+ Cryptographic Backend
+ Random Number Generators
+-FIPS140-2 mode
++FIPS140-3 mode
+
+
+
+-11.7 FIPS140-2 mode
++11.7 FIPS140-3 mode
+
+-GnuTLS can operate in a special mode for FIPS140-2. That mode of operation
+-is for the conformance to NIST’s FIPS140-2 publication, which consists of policies
++
GnuTLS can operate in a special mode for FIPS140-3. That mode of operation
++is for the conformance to NIST’s FIPS140-3 publication, which consists of policies
+ for cryptographic modules (such as software libraries). Its implementation in
+ GnuTLS is designed for Red Hat Enterprise Linux, and can only be enabled
+ when the library is explicitly compiled with the ’–enable-fips140-mode’
+ configure option.
+
+-There are two distinct library states with regard to FIPS140-2: the FIPS140-2
++
There are two distinct library states with regard to FIPS140-3: the FIPS140-3
+ mode is installed if /etc/system-fips
is present, and the
+-FIPS140-2 mode is enabled if /proc/sys/crypto/fips_enabled
++FIPS140-3 mode is enabled if /proc/sys/crypto/fips_enabled
+ contains ’1’, which is typically set with the “fips=1” kernel command line
+ option.
+
+-When the FIPS140-2 mode is installed, the operation of the library is modified
++
When the FIPS140-3 mode is installed, the operation of the library is modified
+ as follows.
+
+
+@@ -20166,12 +20166,12 @@ as follows.
+ - Algorithm self-tests are run on library load
+
+
+-When the FIPS140-2 mode is enabled, The operation of the library is in addition
++
When the FIPS140-3 mode is enabled, The operation of the library is in addition
+ modified as follows.
+
+
+-- Only approved by FIPS140-2 algorithms are enabled
+-
- Only approved by FIPS140-2 key lengths are allowed for key generation
++
- Only approved by FIPS140-3 algorithms are enabled
++
- Only approved by FIPS140-3 key lengths are allowed for key generation
+
- Any cryptographic operation will be refused if any of the self-tests failed
+
+
+@@ -20180,7 +20180,7 @@ modified as follows.
+ environment variable GNUTLS_SKIP_FIPS_INTEGRITY_CHECKS
will disable
+ the library integrity tests on startup, and the variable
+ GNUTLS_FORCE_FIPS_MODE
can be set to force a value from
+-Figure 11.5, i.e., ’1’ will enable the FIPS140-2
++Figure 11.5, i.e., ’1’ will enable the FIPS140-3
+ mode, while ’0’ will disable it.
+
+ The integrity checks for the dependent libraries and GnuTLS are performed
+@@ -20188,13 +20188,13 @@ using ’.hmac’ files which ar
+ key for the operations can be provided on compile-time with the configure
+ option ’–with-fips140-key’. The MAC algorithm used is HMAC-SHA256.
+
+-On runtime an application can verify whether the library is in FIPS140-2
++
On runtime an application can verify whether the library is in FIPS140-3
+ mode using the gnutls_fips140_mode_enabled function.
+
+-Relaxing FIPS140-2 requirements
++Relaxing FIPS140-3 requirements
+
+ The library by default operates in a strict enforcing mode, ensuring that
+-all constraints imposed by the FIPS140-2 specification are enforced. However
++all constraints imposed by the FIPS140-3 specification are enforced. However
+ the application can relax these requirements via gnutls_fips140_set_mode
+ which can switch to alternative modes as in Figure 11.5.
+
+@@ -20203,7 +20203,7 @@ which can switch to alternative modes as
+
+
+ GNUTLS_FIPS140_DISABLED
+-The FIPS140-2 mode is disabled.
++
The FIPS140-3 mode is disabled.
+
+ GNUTLS_FIPS140_STRICT
+ The default mode; all forbidden operations will cause an
+@@ -20214,8 +20214,8 @@ operation failure via error code.
+ cannot be set or seen by applications.
+
+ GNUTLS_FIPS140_LAX
+-The library still uses the FIPS140-2 relevant algorithms but all
+-forbidden by FIPS140-2 operations are allowed; this is useful when the
++
The library still uses the FIPS140-3 relevant algorithms but all
++forbidden by FIPS140-3 operations are allowed; this is useful when the
+ application is aware of the followed security policy, and needs
+ to utilize disallowed operations for other reasons (e.g., compatibility).
+
+@@ -20227,7 +20227,7 @@ to a message to the audit callback funct
+
+ Figure 11.5: The gnutls_fips_mode_t
enumeration.
+ The intention of this API is to be used by applications which may run in
+-FIPS140-2 mode, while they utilize few algorithms not in the allowed set,
++FIPS140-3 mode, while they utilize few algorithms not in the allowed set,
+ e.g., for non-security related purposes. In these cases applications should
+ wrap the non-compliant code within blocks like the following.
+
+@@ -20256,9 +20256,9 @@ if (gnutls_fips140_mode_enabled())
+ The reason of the GNUTLS_FIPS140_SET_MODE_THREAD
flag in the
+ previous calls is to localize the change in the mode. Note also, that
+ such a block has no effect when the library is not operating
+-under FIPS140-2 mode, and thus it can be considered a no-op.
++under FIPS140-3 mode, and thus it can be considered a no-op.
+
+-Applications could also switch FIPS140-2 mode explicitly off, by calling
++
Applications could also switch FIPS140-3 mode explicitly off, by calling
+
+
gnutls_fips140_set_mode(GNUTLS_FIPS140_LAX, 0);
+
+@@ -20281,7 +20281,7 @@ performed within a given context.
+ int gnutls_fips140_pop_context ( void)
+
+
+-The gnutls_fips140_context_t
represents the FIPS140-2 mode of
++
The gnutls_fips140_context_t
represents the FIPS140-3 mode of
+ operation. It can be attached to the current execution thread with
+ gnutls_fips140_push_context and its internal state will be
+ updated until it is detached with
+@@ -20654,8 +20654,8 @@ Previous:
+-GnuTLS has support for the FIPS 140-2 certification under Red Hat Enterprise Linux.
+-See FIPS140-2 mode for more information.
++
GnuTLS has support for the FIPS 140-3 certification under Red Hat Enterprise Linux.
++See FIPS140-3 mode for more information.
+
+
+
+@@ -24569,7 +24569,7 @@ unusable. This function is not thread-s
+ gnutls_fips140_set_mode
+
+ - Function:
void
gnutls_fips140_set_mode (gnutls_fips_mode_t mode, unsigned flags)
¶
+-mode: the FIPS140-2 mode to switch to
++
mode: the FIPS140-3 mode to switch to
+
+ flags: should be zero or GNUTLS_FIPS140_SET_MODE_THREAD
+
+@@ -24578,13 +24578,13 @@ unusable. This function is not thread-s
+ behavior with no flags after threads are created is undefined.
+
+ When the flag GNUTLS_FIPS140_SET_MODE_THREAD
is specified
+-then this call will change the FIPS140-2 mode for this particular
++then this call will change the FIPS140-3 mode for this particular
+ thread and not for the whole process. That way an application
+ can utilize this function to set and reset mode for specific
+ operations.
+
+ This function never fails but will be a no-op if used when
+-the library is not in FIPS140-2 mode. When asked to switch to unknown
++the library is not in FIPS140-3 mode. When asked to switch to unknown
+ values for mode
or to GNUTLS_FIPS140_SELFTESTS
mode, the library
+ switches to GNUTLS_FIPS140_STRICT
mode.
+
+@@ -46927,7 +46927,7 @@ Next: | gnutls_fingerprint : | | Core TLS API |
+ | gnutls_fips140_context_deinit : | | Core TLS API |
+ | gnutls_fips140_context_init : | | Core TLS API |
+- | gnutls_fips140_get_operation_state : | | FIPS140-2 mode |
++ | gnutls_fips140_get_operation_state : | | FIPS140-3 mode |
+ | gnutls_fips140_get_operation_state : | | Core TLS API |
+ | gnutls_fips140_mode_enabled : | | Core TLS API |
+ | gnutls_fips140_pop_context : | | Core TLS API |
+Index: gnutls-3.8.3/doc/gnutls.info-3
+===================================================================
+--- gnutls-3.8.3.orig/doc/gnutls.info-3
++++ gnutls-3.8.3/doc/gnutls.info-3
+@@ -2247,7 +2247,7 @@ to ‘more’. Both will exit with a st
+ --inline-commands-prefix=str Change the default delimiter for inline commands
+ --provider=file Specify the PKCS #11 provider library
+ - file must pre-exist
+- --fips140-mode Reports the status of the FIPS140-2 mode in gnutls library
++ --fips140-mode Reports the status of the FIPS140-3 mode in gnutls library
+ --list-config Reports the configuration of the library
+ --logfile=str Redirect informational messages to a specific file
+ --keymatexport=str Label used for exporting keying material
+@@ -3400,7 +3400,7 @@ to know what happens inside the black bo
+ * TLS Hello Extension Handling::
+ * Cryptographic Backend::
+ * Random Number Generators-internals::
+-* FIPS140-2 mode::
++* FIPS140-3 mode::
+
+
+ File: gnutls.info, Node: The TLS Protocol, Next: TLS Handshake Protocol, Up: Internal architecture of GnuTLS
+@@ -3932,7 +3932,7 @@ and abstract key types::.
+ kernel implementation of ‘/dev/crypto’.
+
+
+-File: gnutls.info, Node: Random Number Generators-internals, Next: FIPS140-2 mode, Prev: Cryptographic Backend, Up: Internal architecture of GnuTLS
++File: gnutls.info, Node: Random Number Generators-internals, Next: FIPS140-3 mode, Prev: Cryptographic Backend, Up: Internal architecture of GnuTLS
+
+ 11.6 Random Number Generators
+ =============================
+@@ -3942,7 +3942,7 @@ About the generators
+
+ GnuTLS provides two random generators. The default, and the AES-DRBG
+ random generator which is only used when the library is compiled with
+-support for FIPS140-2 and the system is in FIPS140-2 mode.
++support for FIPS140-3 and the system is in FIPS140-3 mode.
+
+ The default generator - inner workings
+ --------------------------------------
+@@ -4174,7 +4174,7 @@ in *note Figure 11.5: gnutls_fips_mode_t
+ Figure 11.5: The ‘gnutls_fips_mode_t’ enumeration.
+
+ The intention of this API is to be used by applications which may run in
+-FIPS140-2 mode, while they utilize few algorithms not in the allowed
++FIPS140-3 mode, while they utilize few algorithms not in the allowed
+ set, e.g., for non-security related purposes. In these cases
+ applications should wrap the non-compliant code within blocks like the
+ following.
+@@ -4198,10 +4198,10 @@ are macros to simplify the following seq
+
+ The reason of the ‘GNUTLS_FIPS140_SET_MODE_THREAD’ flag in the previous
+ calls is to localize the change in the mode. Note also, that such a
+-block has no effect when the library is not operating under FIPS140-2
++block has no effect when the library is not operating under FIPS140-3
+ mode, and thus it can be considered a no-op.
+
+-Applications could also switch FIPS140-2 mode explicitly off, by calling
++Applications could also switch FIPS140-3 mode explicitly off, by calling
+ gnutls_fips140_set_mode(GNUTLS_FIPS140_LAX, 0);
+
+ Service indicator
+@@ -4683,8 +4683,8 @@ There are certifications from national o
+ practices, such as unit testing and reliance on well known crypto
+ primitives.
+
+-GnuTLS has support for the FIPS 140-2 certification under Red Hat
+-Enterprise Linux. See *note FIPS140-2 mode:: for more information.
++GnuTLS has support for the FIPS 140-3 certification under Red Hat
++Enterprise Linux. See *note FIPS140-3 mode:: for more information.
+
+
+ File: gnutls.info, Node: Error codes, Next: Supported ciphersuites, Prev: Support, Up: Top
+@@ -9151,7 +9151,7 @@ gnutls_fips140_set_mode
+
+ -- Function: void gnutls_fips140_set_mode (gnutls_fips_mode_t MODE,
+ unsigned FLAGS)
+- MODE: the FIPS140-2 mode to switch to
++ MODE: the FIPS140-3 mode to switch to
+
+ FLAGS: should be zero or ‘GNUTLS_FIPS140_SET_MODE_THREAD’
+
+Index: gnutls-3.8.3/doc/invoke-gnutls-cli.texi
+===================================================================
+--- gnutls-3.8.3.orig/doc/invoke-gnutls-cli.texi
++++ gnutls-3.8.3/doc/invoke-gnutls-cli.texi
+@@ -102,7 +102,7 @@ None:
+ --inline-commands-prefix=str Change the default delimiter for inline commands
+ --provider=file Specify the PKCS #11 provider library
+ - file must pre-exist
+- --fips140-mode Reports the status of the FIPS140-2 mode in gnutls library
++ --fips140-mode Reports the status of the FIPS140-3 mode in gnutls library
+ --list-config Reports the configuration of the library
+ --logfile=str Redirect informational messages to a specific file
+ --keymatexport=str Label used for exporting keying material
+Index: gnutls-3.8.3/doc/manpages/gnutls-cli.1
+===================================================================
+--- gnutls-3.8.3.orig/doc/manpages/gnutls-cli.1
++++ gnutls-3.8.3/doc/manpages/gnutls-cli.1
+@@ -398,7 +398,7 @@ Specify the PKCS #11 provider library.
+ This will override the default options in /etc/gnutls/pkcs11.conf
+ .TP
+ .NOP \f\*[B-Font]\-\-fips140\-mode\f[]
+-Reports the status of the FIPS140-2 mode in gnutls library.
++Reports the status of the FIPS140-3 mode in gnutls library.
+ .sp
+ .TP
+ .NOP \f\*[B-Font]\-\-list\-config\f[]
+Index: gnutls-3.8.3/doc/reference/html/gnutls-gnutls.html
+===================================================================
+--- gnutls-3.8.3.orig/doc/reference/html/gnutls-gnutls.html
++++ gnutls-3.8.3/doc/reference/html/gnutls-gnutls.html
+@@ -20866,12 +20866,12 @@ gnutls_fips140_set_mode (GNUTLS_FIPS140_SET_MODE_THREAD
is specified
+-then this call will change the FIPS140-2 mode for this particular
++then this call will change the FIPS140-3 mode for this particular
+ thread and not for the whole process. That way an application
+ can utilize this function to set and reset mode for specific
+ operations.
+ This function never fails but will be a no-op if used when
+-the library is not in FIPS140-2 mode. When asked to switch to unknown
++the library is not in FIPS140-3 mode. When asked to switch to unknown
+ values for mode
+ or to GNUTLS_FIPS140_SELFTESTS
mode, the library
+ switches to GNUTLS_FIPS140_STRICT
mode.
+@@ -20886,7 +20886,7 @@ switches to mode
+-the FIPS140-2 mode to switch to |
++the FIPS140-3 mode to switch to |
+ |
+
+
+@@ -25904,7 +25904,7 @@ encryption
+
+
+
enum gnutls_fips_mode_t
+-
Enumeration of different operational modes under FIPS140-2.
++
Enumeration of different operational modes under FIPS140-3.
+