- Update to 3.8.10:

* libgnutls: Fix NULL pointer dereference when 2nd Client Hello omits PSK
    Reported by Stefan Bühler. [GNUTLS-SA-2025-07-07-4, CVSS: medium]
    [bsc#1246299, CVE-2025-6395]
  * libgnutls: Fix heap read buffer overrun in parsing X.509 SCTS timestamps
    Spotted by oss-fuzz and reported by OpenAI Security Research Team,
    and fix developed by Andrew Hamilton. [GNUTLS-SA-2025-07-07-1,
    CVSS: medium] [bsc#1246233, CVE-2025-32989]
  * libgnutls: Fix double-free upon error when exporting otherName in SAN
    Reported by OpenAI Security Research Team. [GNUTLS-SA-2025-07-07-2,
    CVSS: low] [bsc#1246232, CVE-2025-32988]
  * certtool: Fix 1-byte write buffer overrun when parsing template
    Reported by David Aitel. [GNUTLS-SA-2025-07-07-3,
    CVSS: low] [bsc#1246267, CVE-2025-32990]
  * libgnutls: PKCS#11 modules can now be used to override the default
    cryptographic backend. Use the [provider] section in the system-wide config
    to specify path and pin to the module (see system-wide config Documentation).
  * libgnutls: Linux kernel version 6.14 brings a Kernel TLS (kTLS) key update
    support. The library running on the aforementioned version now utilizes the
    kernel’s key update mechanism when kTLS is enabled, allowing uninterrupted
    TLS session. The --enable-ktls configure option as well as the system-wide
    kTLS configuration(see GnuTLS Documentation) are still required to enable
    this feature.
  * libgnutls: liboqs support for PQC has been removed
    For maintenance purposes, support for post-quantum cryptography
    (PQC) is now only provided through leancrypto. The experimental key
    exchange algorithm, X25519Kyber768Draft00, which is based on the
    round 3 candidate of Kyber and only supported through liboqs has
    also been removed altogether.
  * libgnutls: TLS certificate compression methods can now be set with

OBS-URL: https://build.opensuse.org/package/show/security:tls/gnutls?expand=0&rev=129
This commit is contained in:
2025-07-15 07:34:08 +00:00
committed by Git OBS Bridge
parent 20f38b1453
commit 81f2d36642
11 changed files with 442 additions and 447 deletions

View File

@@ -0,0 +1,24 @@
Index: gnutls-3.8.10/tests/Makefile.am
===================================================================
--- gnutls-3.8.10.orig/tests/Makefile.am
+++ gnutls-3.8.10/tests/Makefile.am
@@ -527,13 +527,13 @@ if !WINDOWS
#
if ENABLE_KTLS
-indirect_tests += gnutls_ktls
-dist_check_SCRIPTS += ktls.sh
+#indirect_tests += gnutls_ktls
+#dist_check_SCRIPTS += ktls.sh
-indirect_tests += ktls_keyupdate
-ktls_keyupdate_SOURCES = tls13/key_update.c
-ktls_keyupdate_CFLAGS = -DUSE_KTLS
-dist_check_SCRIPTS += ktls_keyupdate.sh
+#indirect_tests += ktls_keyupdate
+#ktls_keyupdate_SOURCES = tls13/key_update.c
+#ktls_keyupdate_CFLAGS = -DUSE_KTLS
+#dist_check_SCRIPTS += ktls_keyupdate.sh
endif
dist_check_SCRIPTS += dtls/dtls.sh #dtls/dtls-resume.sh #dtls/dtls-nb

BIN
gnutls-3.8.10.tar.xz (Stored with Git LFS) Normal file

Binary file not shown.

BIN
gnutls-3.8.10.tar.xz.sig Normal file

Binary file not shown.

BIN
gnutls-3.8.9.tar.xz (Stored with Git LFS)

Binary file not shown.

Binary file not shown.

View File

@@ -1,7 +1,7 @@
Index: gnutls-3.8.9/configure.ac
Index: gnutls-3.8.10/configure.ac
===================================================================
--- gnutls-3.8.9.orig/configure.ac
+++ gnutls-3.8.9/configure.ac
--- gnutls-3.8.10.orig/configure.ac
+++ gnutls-3.8.10/configure.ac
@@ -665,19 +665,19 @@ LT_INIT([disable-static,win32-dll,shared
AC_LIB_HAVE_LINKFLAGS(dl,, [#include <dlfcn.h>], [dladdr (0, 0);])
@@ -25,10 +25,10 @@ Index: gnutls-3.8.9/configure.ac
AC_ARG_WITH(fips140-module-name, AS_HELP_STRING([--with-fips140-module-name],
[specify the FIPS140 module name]),
Index: gnutls-3.8.9/doc/cha-gtls-app.texi
Index: gnutls-3.8.10/doc/cha-gtls-app.texi
===================================================================
--- gnutls-3.8.9.orig/doc/cha-gtls-app.texi
+++ gnutls-3.8.9/doc/cha-gtls-app.texi
--- gnutls-3.8.10.orig/doc/cha-gtls-app.texi
+++ gnutls-3.8.10/doc/cha-gtls-app.texi
@@ -222,7 +222,7 @@ CPU. The currently available options are
@end itemize
@@ -38,10 +38,10 @@ Index: gnutls-3.8.9/doc/cha-gtls-app.texi
if set to one it will force the FIPS mode enablement.
@end multitable
Index: gnutls-3.8.9/doc/cha-internals.texi
Index: gnutls-3.8.10/doc/cha-internals.texi
===================================================================
--- gnutls-3.8.9.orig/doc/cha-internals.texi
+++ gnutls-3.8.9/doc/cha-internals.texi
--- gnutls-3.8.10.orig/doc/cha-internals.texi
+++ gnutls-3.8.10/doc/cha-internals.texi
@@ -14,7 +14,7 @@ happens inside the black box.
* TLS Hello Extension Handling::
* Cryptographic Backend::
@@ -162,10 +162,10 @@ Index: gnutls-3.8.9/doc/cha-internals.texi
operation. It can be attached to the current execution thread with
@funcref{gnutls_fips140_push_context} and its internal state will be
updated until it is detached with
Index: gnutls-3.8.9/doc/enums.texi
Index: gnutls-3.8.10/doc/enums.texi
===================================================================
--- gnutls-3.8.9.orig/doc/enums.texi
+++ gnutls-3.8.9/doc/enums.texi
--- gnutls-3.8.10.orig/doc/enums.texi
+++ gnutls-3.8.10/doc/enums.texi
@@ -1230,7 +1230,7 @@ application traffic secret is installed
@c gnutls_fips_mode_t
@table @code
@@ -186,10 +186,10 @@ Index: gnutls-3.8.9/doc/enums.texi
application is aware of the followed security policy, and needs
to utilize disallowed operations for other reasons (e.g., compatibility).
@item GNUTLS_@-FIPS140_@-LOG
Index: gnutls-3.8.9/doc/functions/gnutls_fips140_set_mode
Index: gnutls-3.8.10/doc/functions/gnutls_fips140_set_mode
===================================================================
--- gnutls-3.8.9.orig/doc/functions/gnutls_fips140_set_mode
+++ gnutls-3.8.9/doc/functions/gnutls_fips140_set_mode
--- gnutls-3.8.10.orig/doc/functions/gnutls_fips140_set_mode
+++ gnutls-3.8.10/doc/functions/gnutls_fips140_set_mode
@@ -3,7 +3,7 @@
@@ -215,11 +215,11 @@ Index: gnutls-3.8.9/doc/functions/gnutls_fips140_set_mode
values for @code{mode} or to @code{GNUTLS_FIPS140_SELFTESTS} mode, the library
switches to @code{GNUTLS_FIPS140_STRICT} mode.
Index: gnutls-3.8.9/doc/gnutls.html
Index: gnutls-3.8.10/doc/gnutls.html
===================================================================
--- gnutls-3.8.9.orig/doc/gnutls.html
+++ gnutls-3.8.9/doc/gnutls.html
@@ -485,7 +485,7 @@ Documentation License&rdquo;.
--- gnutls-3.8.10.orig/doc/gnutls.html
+++ gnutls-3.8.10/doc/gnutls.html
@@ -490,7 +490,7 @@ Documentation License&rdquo;.
<li><a id="toc-TLS-Extension-Handling" href="#TLS-Hello-Extension-Handling">11.4 TLS Extension Handling</a></li>
<li><a id="toc-Cryptographic-Backend-1" href="#Cryptographic-Backend">11.5 Cryptographic Backend</a></li>
<li><a id="toc-Random-Number-Generators" href="#Random-Number-Generators_002dinternals">11.6 Random Number Generators</a></li>
@@ -228,7 +228,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</ul></li>
<li><a id="toc-Upgrading-from-previous-versions-1" href="#Upgrading-from-previous-versions">Appendix A Upgrading from previous versions</a></li>
<li><a id="toc-Support-1" href="#Support">Appendix B Support</a>
@@ -9028,7 +9028,7 @@ CPU. The currently available options are
@@ -9050,7 +9050,7 @@ CPU. The currently available options are
</li><li>0x200000: Enable VIA PHE
</li><li>0x400000: Enable VIA PHE SHA512
</li></ul></td></tr>
@@ -237,7 +237,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
if set to one it will force the FIPS mode enablement.</td></tr>
</tbody>
</table>
@@ -18452,7 +18452,7 @@ None:
@@ -18547,7 +18547,7 @@ None:
--inline-commands-prefix=str Change the default delimiter for inline commands
--provider=file Specify the PKCS #11 provider library
- file must pre-exist
@@ -246,7 +246,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
--list-config Reports the configuration of the library
--logfile=str Redirect informational messages to a specific file
--keymatexport=str Label used for exporting keying material
@@ -19472,7 +19472,7 @@ happens inside the black box.
@@ -19567,7 +19567,7 @@ happens inside the black box.
<li><a href="#TLS-Hello-Extension-Handling" accesskey="4">TLS Extension Handling</a></li>
<li><a href="#Cryptographic-Backend" accesskey="5">Cryptographic Backend</a></li>
<li><a href="#Random-Number-Generators_002dinternals" accesskey="6">Random Number Generators</a></li>
@@ -255,7 +255,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</ul>
<hr>
<div class="section-level-extent" id="The-TLS-Protocol">
@@ -19997,7 +19997,7 @@ For more information see <a class="ref"
@@ -20092,7 +20092,7 @@ For more information see <a class="ref"
<div class="section-level-extent" id="Random-Number-Generators_002dinternals">
<div class="nav-panel">
<p>
@@ -264,7 +264,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</div>
<h3 class="section" id="Random-Number-Generators"><span>11.6 Random Number Generators<a class="copiable-link" href="#Random-Number-Generators"> &para;</a></span></h3>
@@ -20005,7 +20005,7 @@ Next: <a href="#FIPS140_002d2-mode" acce
@@ -20100,7 +20100,7 @@ Next: <a href="#FIPS140_002d2-mode" acce
<p>GnuTLS provides two random generators. The default, and the AES-DRBG random
generator which is only used when the library is compiled with support for
@@ -273,7 +273,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</p>
<h4 class="subheading" id="The-default-generator-_002d-inner-workings"><span>The default generator - inner workings<a class="copiable-link" href="#The-default-generator-_002d-inner-workings"> &para;</a></span></h4>
@@ -20142,22 +20142,22 @@ on the above paragraph, all levels are i
@@ -20237,22 +20237,22 @@ on the above paragraph, all levels are i
<p>
Previous: <a href="#Random-Number-Generators_002dinternals" accesskey="p" rel="prev">Random Number Generators</a>, Up: <a href="#Internal-architecture-of-GnuTLS" accesskey="u" rel="up">Internal Architecture of GnuTLS</a> &nbsp; [<a href="#SEC_Contents" title="Table of contents" rel="contents">Contents</a>][<a href="#Function-and-Data-Index" title="Index" rel="index">Index</a>]</p>
</div>
@@ -302,7 +302,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
as follows.
</p>
<ul class="itemize mark-bullet">
@@ -20166,12 +20166,12 @@ as follows.
@@ -20261,12 +20261,12 @@ as follows.
</li><li>Algorithm self-tests are run on library load
</li></ul>
@@ -318,7 +318,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</li><li>Any cryptographic operation will be refused if any of the self-tests failed
</li></ul>
@@ -20180,7 +20180,7 @@ modified as follows.
@@ -20275,7 +20275,7 @@ modified as follows.
environment variable <code class="code">GNUTLS_SKIP_FIPS_INTEGRITY_CHECKS</code> will disable
the library integrity tests on startup, and the variable
<code class="code">GNUTLS_FORCE_FIPS_MODE</code> can be set to force a value from
@@ -327,7 +327,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
mode, while &rsquo;0&rsquo; will disable it.
</p>
<p>The integrity checks for the dependent libraries and GnuTLS are performed
@@ -20188,13 +20188,13 @@ using &rsquo;.hmac&rsquo; files which ar
@@ -20283,13 +20283,13 @@ using &rsquo;.hmac&rsquo; files which ar
key for the operations can be provided on compile-time with the configure
option &rsquo;&ndash;with-fips140-key&rsquo;. The MAC algorithm used is HMAC-SHA256.
</p>
@@ -344,7 +344,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
the application can relax these requirements via <a class="ref" href="#gnutls_005ffips140_005fset_005fmode">gnutls_fips140_set_mode</a>
which can switch to alternative modes as in <a class="ref" href="#gnutls_005ffips_005fmode_005ft">Figure 11.5</a>.
</p>
@@ -20203,7 +20203,7 @@ which can switch to alternative modes as
@@ -20298,7 +20298,7 @@ which can switch to alternative modes as
<dl class="table">
<dt><code class="code">GNUTLS_FIPS140_DISABLED</code></dt>
@@ -353,7 +353,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</p></dd>
<dt><code class="code">GNUTLS_FIPS140_STRICT</code></dt>
<dd><p>The default mode; all forbidden operations will cause an
@@ -20214,8 +20214,8 @@ operation failure via error code.
@@ -20309,8 +20309,8 @@ operation failure via error code.
cannot be set or seen by applications.
</p></dd>
<dt><code class="code">GNUTLS_FIPS140_LAX</code></dt>
@@ -364,7 +364,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
application is aware of the followed security policy, and needs
to utilize disallowed operations for other reasons (e.g., compatibility).
</p></dd>
@@ -20226,7 +20226,7 @@ to a message to the audit callback funct
@@ -20321,7 +20321,7 @@ to a message to the audit callback funct
</dl>
<div class="caption"><p><strong class="strong">Figure 11.5: </strong>The <code class="code">gnutls_fips_mode_t</code> enumeration.</p></div></div>
<p>The intention of this API is to be used by applications which may run in
@@ -373,7 +373,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
e.g., for non-security related purposes. In these cases applications should
wrap the non-compliant code within blocks like the following.
</p>
@@ -20255,9 +20255,9 @@ if (gnutls_fips140_mode_enabled())
@@ -20350,9 +20350,9 @@ if (gnutls_fips140_mode_enabled())
<p>The reason of the <code class="code">GNUTLS_FIPS140_SET_MODE_THREAD</code> flag in the
previous calls is to localize the change in the mode. Note also, that
such a block has no effect when the library is not operating
@@ -385,7 +385,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</p><div class="example">
<pre class="example-preformatted">gnutls_fips140_set_mode(GNUTLS_FIPS140_LAX, 0);
</pre></div>
@@ -20280,7 +20280,7 @@ performed within a given context.
@@ -20375,7 +20375,7 @@ performed within a given context.
<dt><code class="code"><var class="var">int</var> <a class="ref" href="#gnutls_005ffips140_005fpop_005fcontext">gnutls_fips140_pop_context</a> ( <var class="var">void</var>)</code></dt>
</dl>
@@ -394,7 +394,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
operation. It can be attached to the current execution thread with
<a class="ref" href="#gnutls_005ffips140_005fpush_005fcontext">gnutls_fips140_push_context</a> and its internal state will be
updated until it is detached with
@@ -20653,8 +20653,8 @@ Previous: <a href="#Contributing" access
@@ -20748,8 +20748,8 @@ Previous: <a href="#Contributing" access
to an auditor that the crypto component follows some best practices, such
as unit testing and reliance on well known crypto primitives.
</p>
@@ -405,7 +405,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</p>
<hr>
</div>
@@ -24575,7 +24575,7 @@ unusable. This function is not thread-s
@@ -24680,7 +24680,7 @@ unusable. This function is not thread-s
<h4 class="subheading" id="gnutls_005ffips140_005fset_005fmode-1"><span>gnutls_fips140_set_mode<a class="copiable-link" href="#gnutls_005ffips140_005fset_005fmode-1"> &para;</a></span></h4>
<a class="anchor" id="gnutls_005ffips140_005fset_005fmode"></a><dl class="first-deftypefn first-deftypefun-alias-first-deftypefn">
<dt class="deftypefn deftypefun-alias-deftypefn" id="index-gnutls_005ffips140_005fset_005fmode"><span class="category-def">Function: </span><span><code class="def-type">void</code> <strong class="def-name">gnutls_fips140_set_mode</strong> <code class="def-code-arguments">(gnutls_fips_mode_t <var class="var">mode</var>, unsigned <var class="var">flags</var>)</code><a class="copiable-link" href="#index-gnutls_005ffips140_005fset_005fmode"> &para;</a></span></dt>
@@ -414,7 +414,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
</p>
<p><var class="var">flags</var>: should be zero or <code class="code">GNUTLS_FIPS140_SET_MODE_THREAD</code>
</p>
@@ -24584,13 +24584,13 @@ unusable. This function is not thread-s
@@ -24689,13 +24689,13 @@ unusable. This function is not thread-s
behavior with no flags after threads are created is undefined.
</p>
<p>When the flag <code class="code">GNUTLS_FIPS140_SET_MODE_THREAD</code> is specified
@@ -430,7 +430,7 @@ Index: gnutls-3.8.9/doc/gnutls.html
values for <code class="code">mode</code> or to <code class="code">GNUTLS_FIPS140_SELFTESTS</code> mode, the library
switches to <code class="code">GNUTLS_FIPS140_STRICT</code> mode.
</p>
@@ -47011,7 +47011,7 @@ Next: <a href="#Concept-Index" accesskey
@@ -47153,7 +47153,7 @@ Next: <a href="#Concept-Index" accesskey
<tr><td></td><td class="printindex-index-entry"><a href="#index-gnutls_005ffingerprint"><code>gnutls_fingerprint</code></a></td><td class="printindex-index-section"><a href="#Core-TLS-API">Core TLS API</a></td></tr>
<tr><td></td><td class="printindex-index-entry"><a href="#index-gnutls_005ffips140_005fcontext_005fdeinit"><code>gnutls_fips140_context_deinit</code></a></td><td class="printindex-index-section"><a href="#Core-TLS-API">Core TLS API</a></td></tr>
<tr><td></td><td class="printindex-index-entry"><a href="#index-gnutls_005ffips140_005fcontext_005finit"><code>gnutls_fips140_context_init</code></a></td><td class="printindex-index-section"><a href="#Core-TLS-API">Core TLS API</a></td></tr>
@@ -439,11 +439,11 @@ Index: gnutls-3.8.9/doc/gnutls.html
<tr><td></td><td class="printindex-index-entry"><a href="#index-gnutls_005ffips140_005fget_005foperation_005fstate-1"><code>gnutls_fips140_get_operation_state</code></a></td><td class="printindex-index-section"><a href="#Core-TLS-API">Core TLS API</a></td></tr>
<tr><td></td><td class="printindex-index-entry"><a href="#index-gnutls_005ffips140_005fmode_005fenabled"><code>gnutls_fips140_mode_enabled</code></a></td><td class="printindex-index-section"><a href="#Core-TLS-API">Core TLS API</a></td></tr>
<tr><td></td><td class="printindex-index-entry"><a href="#index-gnutls_005ffips140_005fpop_005fcontext"><code>gnutls_fips140_pop_context</code></a></td><td class="printindex-index-section"><a href="#Core-TLS-API">Core TLS API</a></td></tr>
Index: gnutls-3.8.9/doc/gnutls.info-3
Index: gnutls-3.8.10/doc/gnutls.info-3
===================================================================
--- gnutls-3.8.9.orig/doc/gnutls.info-3
+++ gnutls-3.8.9/doc/gnutls.info-3
@@ -2108,7 +2108,7 @@ to more. Both will exit with a st
--- gnutls-3.8.10.orig/doc/gnutls.info-3
+++ gnutls-3.8.10/doc/gnutls.info-3
@@ -2319,7 +2319,7 @@ to more. Both will exit with a st
--inline-commands-prefix=str Change the default delimiter for inline commands
--provider=file Specify the PKCS #11 provider library
- file must pre-exist
@@ -452,7 +452,7 @@ Index: gnutls-3.8.9/doc/gnutls.info-3
--list-config Reports the configuration of the library
--logfile=str Redirect informational messages to a specific file
--keymatexport=str Label used for exporting keying material
@@ -3261,7 +3261,7 @@ to know what happens inside the black bo
@@ -3472,7 +3472,7 @@ to know what happens inside the black bo
* TLS Hello Extension Handling::
* Cryptographic Backend::
* Random Number Generators-internals::
@@ -461,7 +461,7 @@ Index: gnutls-3.8.9/doc/gnutls.info-3

File: gnutls.info, Node: The TLS Protocol, Next: TLS Handshake Protocol, Up: Internal architecture of GnuTLS
@@ -3789,7 +3789,7 @@ and abstract key types::.
@@ -4000,7 +4000,7 @@ and abstract key types::.
kernel implementation of /dev/crypto.

@@ -470,7 +470,7 @@ Index: gnutls-3.8.9/doc/gnutls.info-3
11.6 Random Number Generators
=============================
@@ -3799,7 +3799,7 @@ About the generators
@@ -4010,7 +4010,7 @@ About the generators
GnuTLS provides two random generators. The default, and the AES-DRBG
random generator which is only used when the library is compiled with
@@ -479,7 +479,7 @@ Index: gnutls-3.8.9/doc/gnutls.info-3
The default generator - inner workings
--------------------------------------
@@ -4030,7 +4030,7 @@ in *note Figure 11.5: gnutls_fips_mode_t
@@ -4241,7 +4241,7 @@ in *note Figure 11.5: gnutls_fips_mode_t
Figure 11.5: The gnutls_fips_mode_t enumeration.
The intention of this API is to be used by applications which may run in
@@ -488,7 +488,7 @@ Index: gnutls-3.8.9/doc/gnutls.info-3
set, e.g., for non-security related purposes. In these cases
applications should wrap the non-compliant code within blocks like the
following.
@@ -4054,10 +4054,10 @@ are macros to simplify the following seq
@@ -4265,10 +4265,10 @@ are macros to simplify the following seq
The reason of the GNUTLS_FIPS140_SET_MODE_THREAD flag in the previous
calls is to localize the change in the mode. Note also, that such a
@@ -501,7 +501,7 @@ Index: gnutls-3.8.9/doc/gnutls.info-3
gnutls_fips140_set_mode(GNUTLS_FIPS140_LAX, 0);
Service indicator
@@ -4539,8 +4539,8 @@ There are certifications from national o
@@ -4750,8 +4750,8 @@ There are certifications from national o
practices, such as unit testing and reliance on well known crypto
primitives.
@@ -512,7 +512,7 @@ Index: gnutls-3.8.9/doc/gnutls.info-3

File: gnutls.info, Node: Error codes, Next: Supported ciphersuites, Prev: Support, Up: Top
@@ -9015,7 +9015,7 @@ gnutls_fips140_set_mode
@@ -9236,7 +9236,7 @@ gnutls_fips140_set_mode
-- Function: void gnutls_fips140_set_mode (gnutls_fips_mode_t MODE,
unsigned FLAGS)
@@ -521,10 +521,10 @@ Index: gnutls-3.8.9/doc/gnutls.info-3
FLAGS: should be zero or GNUTLS_FIPS140_SET_MODE_THREAD
Index: gnutls-3.8.9/doc/invoke-gnutls-cli.texi
Index: gnutls-3.8.10/doc/invoke-gnutls-cli.texi
===================================================================
--- gnutls-3.8.9.orig/doc/invoke-gnutls-cli.texi
+++ gnutls-3.8.9/doc/invoke-gnutls-cli.texi
--- gnutls-3.8.10.orig/doc/invoke-gnutls-cli.texi
+++ gnutls-3.8.10/doc/invoke-gnutls-cli.texi
@@ -102,7 +102,7 @@ None:
--inline-commands-prefix=str Change the default delimiter for inline commands
--provider=file Specify the PKCS #11 provider library
@@ -534,10 +534,10 @@ Index: gnutls-3.8.9/doc/invoke-gnutls-cli.texi
--list-config Reports the configuration of the library
--logfile=str Redirect informational messages to a specific file
--keymatexport=str Label used for exporting keying material
Index: gnutls-3.8.9/doc/manpages/gnutls-cli.1
Index: gnutls-3.8.10/doc/manpages/gnutls-cli.1
===================================================================
--- gnutls-3.8.9.orig/doc/manpages/gnutls-cli.1
+++ gnutls-3.8.9/doc/manpages/gnutls-cli.1
--- gnutls-3.8.10.orig/doc/manpages/gnutls-cli.1
+++ gnutls-3.8.10/doc/manpages/gnutls-cli.1
@@ -398,7 +398,7 @@ Specify the PKCS #11 provider library.
This will override the default options in /etc/gnutls/pkcs11.conf
.TP
@@ -547,10 +547,10 @@ Index: gnutls-3.8.9/doc/manpages/gnutls-cli.1
.sp
.TP
.NOP \f\*[B-Font]\-\-list\-config\f[]
Index: gnutls-3.8.9/doc/reference/html/gnutls-gnutls.html
Index: gnutls-3.8.10/doc/reference/html/gnutls-gnutls.html
===================================================================
--- gnutls-3.8.9.orig/doc/reference/html/gnutls-gnutls.html
+++ gnutls-3.8.9/doc/reference/html/gnutls-gnutls.html
--- gnutls-3.8.10.orig/doc/reference/html/gnutls-gnutls.html
+++ gnutls-3.8.10/doc/reference/html/gnutls-gnutls.html
@@ -20874,12 +20874,12 @@ gnutls_fips140_set_mode (<em class="para
(globally), and should be called prior to creating any threads. Its
behavior with no flags after threads are created is undefined.</p>
@@ -611,10 +611,10 @@ Index: gnutls-3.8.9/doc/reference/html/gnutls-gnutls.html
-</html>
\ No newline at end of file
+</html>
Index: gnutls-3.8.9/lib/fips.c
Index: gnutls-3.8.10/lib/fips.c
===================================================================
--- gnutls-3.8.9.orig/lib/fips.c
+++ gnutls-3.8.9/lib/fips.c
--- gnutls-3.8.10.orig/lib/fips.c
+++ gnutls-3.8.10/lib/fips.c
@@ -121,7 +121,7 @@ unsigned _gnutls_fips_mode_enabled(void)
}
@@ -734,11 +734,11 @@ Index: gnutls-3.8.9/lib/fips.c
}
gnutls_fips140_context_deinit(fips_context);
}
Index: gnutls-3.8.9/lib/fips.h
Index: gnutls-3.8.10/lib/fips.h
===================================================================
--- gnutls-3.8.9.orig/lib/fips.h
+++ gnutls-3.8.9/lib/fips.h
@@ -163,7 +163,7 @@ is_cipher_algo_allowed_in_fips(gnutls_ci
--- gnutls-3.8.10.orig/lib/fips.h
+++ gnutls-3.8.10/lib/fips.h
@@ -161,7 +161,7 @@ is_cipher_algo_allowed_in_fips(gnutls_ci
}
#ifdef ENABLE_FIPS140
@@ -747,7 +747,7 @@ Index: gnutls-3.8.9/lib/fips.h
* and return an error if necessary or ignore */
#define FIPS_RULE(condition, ret_error, ...) \
{ \
@@ -173,10 +173,10 @@ is_cipher_algo_allowed_in_fips(gnutls_ci
@@ -171,10 +171,10 @@ is_cipher_algo_allowed_in_fips(gnutls_ci
if (_mode == GNUTLS_FIPS140_LOG) { \
_gnutls_audit_log( \
NULL, \
@@ -760,7 +760,7 @@ Index: gnutls-3.8.9/lib/fips.h
return ret_error; \
} \
} \
@@ -191,7 +191,7 @@ inline static bool is_mac_algo_allowed(g
@@ -189,7 +189,7 @@ inline static bool is_mac_algo_allowed(g
switch (mode) {
case GNUTLS_FIPS140_LOG:
_gnutls_audit_log(NULL,
@@ -769,7 +769,7 @@ Index: gnutls-3.8.9/lib/fips.h
gnutls_mac_get_name(algo));
FALLTHROUGH;
case GNUTLS_FIPS140_DISABLED:
@@ -213,7 +213,7 @@ inline static bool is_cipher_algo_allowe
@@ -211,7 +211,7 @@ inline static bool is_cipher_algo_allowe
switch (mode) {
case GNUTLS_FIPS140_LOG:
_gnutls_audit_log(NULL,
@@ -778,11 +778,11 @@ Index: gnutls-3.8.9/lib/fips.h
gnutls_cipher_get_name(algo));
FALLTHROUGH;
case GNUTLS_FIPS140_DISABLED:
Index: gnutls-3.8.9/lib/global.c
Index: gnutls-3.8.10/lib/global.c
===================================================================
--- gnutls-3.8.9.orig/lib/global.c
+++ gnutls-3.8.9/lib/global.c
@@ -339,12 +339,12 @@ static int _gnutls_global_init(unsigned
--- gnutls-3.8.10.orig/lib/global.c
+++ gnutls-3.8.10/lib/global.c
@@ -349,12 +349,12 @@ static int _gnutls_global_init(unsigned
#ifdef ENABLE_FIPS140
res = _gnutls_fips_mode_enabled();
@@ -797,7 +797,7 @@ Index: gnutls-3.8.9/lib/global.c
_gnutls_priority_update_fips();
/* first round of self checks, these are done on the
@@ -354,7 +354,7 @@ static int _gnutls_global_init(unsigned
@@ -364,7 +364,7 @@ static int _gnutls_global_init(unsigned
if (ret < 0) {
_gnutls_switch_lib_state(LIB_STATE_ERROR);
_gnutls_audit_log(
@@ -806,7 +806,7 @@ Index: gnutls-3.8.9/lib/global.c
if (res != 2) {
gnutls_assert();
goto out;
@@ -377,7 +377,7 @@ static int _gnutls_global_init(unsigned
@@ -390,7 +390,7 @@ static int _gnutls_global_init(unsigned
if (ret < 0) {
_gnutls_switch_lib_state(LIB_STATE_ERROR);
_gnutls_audit_log(
@@ -815,10 +815,10 @@ Index: gnutls-3.8.9/lib/global.c
if (res != 2) {
gnutls_assert();
goto out;
Index: gnutls-3.8.9/lib/includes/gnutls/gnutls.h.in
Index: gnutls-3.8.10/lib/includes/gnutls/gnutls.h.in
===================================================================
--- gnutls-3.8.9.orig/lib/includes/gnutls/gnutls.h.in
+++ gnutls-3.8.9/lib/includes/gnutls/gnutls.h.in
--- gnutls-3.8.10.orig/lib/includes/gnutls/gnutls.h.in
+++ gnutls-3.8.10/lib/includes/gnutls/gnutls.h.in
@@ -3236,16 +3236,16 @@ typedef int (*gnutls_alert_read_func)(gn
void gnutls_alert_set_read_function(gnutls_session_t session,
gnutls_alert_read_func func);
@@ -849,10 +849,10 @@ Index: gnutls-3.8.9/lib/includes/gnutls/gnutls.h.in
*/
typedef enum gnutls_fips_mode_t {
GNUTLS_FIPS140_DISABLED = 0,
Index: gnutls-3.8.9/src/cli.c
Index: gnutls-3.8.10/src/cli.c
===================================================================
--- gnutls-3.8.9.orig/src/cli.c
+++ gnutls-3.8.9/src/cli.c
--- gnutls-3.8.10.orig/src/cli.c
+++ gnutls-3.8.10/src/cli.c
@@ -1635,10 +1635,10 @@ static void cmd_parser(int argc, char **
if (HAVE_OPT(FIPS140_MODE)) {
@@ -866,10 +866,10 @@ Index: gnutls-3.8.9/src/cli.c
exit(1);
}
Index: gnutls-3.8.9/src/gnutls-cli-options.c
Index: gnutls-3.8.10/src/gnutls-cli-options.c
===================================================================
--- gnutls-3.8.9.orig/src/gnutls-cli-options.c
+++ gnutls-3.8.9/src/gnutls-cli-options.c
--- gnutls-3.8.10.orig/src/gnutls-cli-options.c
+++ gnutls-3.8.10/src/gnutls-cli-options.c
@@ -843,7 +843,7 @@ usage (FILE *out, int status)
" --inline-commands-prefix=str Change the default delimiter for inline commands\n"
" --provider=file Specify the PKCS #11 provider library\n"
@@ -879,10 +879,10 @@ Index: gnutls-3.8.9/src/gnutls-cli-options.c
" --list-config Reports the configuration of the library\n"
" --logfile=str Redirect informational messages to a specific file\n"
" --keymatexport=str Label used for exporting keying material\n"
Index: gnutls-3.8.9/tests/cert-tests/gost.sh
Index: gnutls-3.8.10/tests/cert-tests/gost.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/gost.sh
+++ gnutls-3.8.9/tests/cert-tests/gost.sh
--- gnutls-3.8.10.orig/tests/cert-tests/gost.sh
+++ gnutls-3.8.10/tests/cert-tests/gost.sh
@@ -38,7 +38,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -892,10 +892,10 @@ Index: gnutls-3.8.9/tests/cert-tests/gost.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cert-tests/pkcs12-corner-cases.sh
Index: gnutls-3.8.10/tests/cert-tests/pkcs12-corner-cases.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/pkcs12-corner-cases.sh
+++ gnutls-3.8.9/tests/cert-tests/pkcs12-corner-cases.sh
--- gnutls-3.8.10.orig/tests/cert-tests/pkcs12-corner-cases.sh
+++ gnutls-3.8.10/tests/cert-tests/pkcs12-corner-cases.sh
@@ -28,7 +28,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -905,10 +905,10 @@ Index: gnutls-3.8.9/tests/cert-tests/pkcs12-corner-cases.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cert-tests/pkcs12-encode.sh
Index: gnutls-3.8.10/tests/cert-tests/pkcs12-encode.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/pkcs12-encode.sh
+++ gnutls-3.8.9/tests/cert-tests/pkcs12-encode.sh
--- gnutls-3.8.10.orig/tests/cert-tests/pkcs12-encode.sh
+++ gnutls-3.8.10/tests/cert-tests/pkcs12-encode.sh
@@ -28,7 +28,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -918,10 +918,10 @@ Index: gnutls-3.8.9/tests/cert-tests/pkcs12-encode.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cert-tests/pkcs12-gost.sh
Index: gnutls-3.8.10/tests/cert-tests/pkcs12-gost.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/pkcs12-gost.sh
+++ gnutls-3.8.9/tests/cert-tests/pkcs12-gost.sh
--- gnutls-3.8.10.orig/tests/cert-tests/pkcs12-gost.sh
+++ gnutls-3.8.10/tests/cert-tests/pkcs12-gost.sh
@@ -29,7 +29,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -931,10 +931,10 @@ Index: gnutls-3.8.9/tests/cert-tests/pkcs12-gost.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cert-tests/pkcs12.sh
Index: gnutls-3.8.10/tests/cert-tests/pkcs12.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/pkcs12.sh
+++ gnutls-3.8.9/tests/cert-tests/pkcs12.sh
--- gnutls-3.8.10.orig/tests/cert-tests/pkcs12.sh
+++ gnutls-3.8.10/tests/cert-tests/pkcs12.sh
@@ -28,7 +28,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -944,10 +944,10 @@ Index: gnutls-3.8.9/tests/cert-tests/pkcs12.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cert-tests/pkcs8-decode.sh
Index: gnutls-3.8.10/tests/cert-tests/pkcs8-decode.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/pkcs8-decode.sh
+++ gnutls-3.8.9/tests/cert-tests/pkcs8-decode.sh
--- gnutls-3.8.10.orig/tests/cert-tests/pkcs8-decode.sh
+++ gnutls-3.8.10/tests/cert-tests/pkcs8-decode.sh
@@ -29,7 +29,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -957,10 +957,10 @@ Index: gnutls-3.8.9/tests/cert-tests/pkcs8-decode.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cert-tests/pkcs8-eddsa.sh
Index: gnutls-3.8.10/tests/cert-tests/pkcs8-eddsa.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/pkcs8-eddsa.sh
+++ gnutls-3.8.9/tests/cert-tests/pkcs8-eddsa.sh
--- gnutls-3.8.10.orig/tests/cert-tests/pkcs8-eddsa.sh
+++ gnutls-3.8.10/tests/cert-tests/pkcs8-eddsa.sh
@@ -29,7 +29,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -970,10 +970,10 @@ Index: gnutls-3.8.9/tests/cert-tests/pkcs8-eddsa.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cert-tests/pkcs8-gost.sh
Index: gnutls-3.8.10/tests/cert-tests/pkcs8-gost.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/pkcs8-gost.sh
+++ gnutls-3.8.9/tests/cert-tests/pkcs8-gost.sh
--- gnutls-3.8.10.orig/tests/cert-tests/pkcs8-gost.sh
+++ gnutls-3.8.10/tests/cert-tests/pkcs8-gost.sh
@@ -28,7 +28,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -983,10 +983,10 @@ Index: gnutls-3.8.9/tests/cert-tests/pkcs8-gost.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cert-tests/pkcs8.sh
Index: gnutls-3.8.10/tests/cert-tests/pkcs8.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cert-tests/pkcs8.sh
+++ gnutls-3.8.9/tests/cert-tests/pkcs8.sh
--- gnutls-3.8.10.orig/tests/cert-tests/pkcs8.sh
+++ gnutls-3.8.10/tests/cert-tests/pkcs8.sh
@@ -28,7 +28,7 @@ if ! test -x "${CERTTOOL}"; then
fi
@@ -996,10 +996,10 @@ Index: gnutls-3.8.9/tests/cert-tests/pkcs8.sh
exit 77
fi
Index: gnutls-3.8.9/tests/cipher-listings.sh
Index: gnutls-3.8.10/tests/cipher-listings.sh
===================================================================
--- gnutls-3.8.9.orig/tests/cipher-listings.sh
+++ gnutls-3.8.9/tests/cipher-listings.sh
--- gnutls-3.8.10.orig/tests/cipher-listings.sh
+++ gnutls-3.8.10/tests/cipher-listings.sh
@@ -63,7 +63,7 @@ check()
${CLI} --fips140-mode
@@ -1009,10 +1009,10 @@ Index: gnutls-3.8.9/tests/cipher-listings.sh
exit 77
fi
Index: gnutls-3.8.9/tests/testpkcs11.sh
Index: gnutls-3.8.10/tests/testpkcs11.sh
===================================================================
--- gnutls-3.8.9.orig/tests/testpkcs11.sh
+++ gnutls-3.8.9/tests/testpkcs11.sh
--- gnutls-3.8.10.orig/tests/testpkcs11.sh
+++ gnutls-3.8.10/tests/testpkcs11.sh
@@ -26,7 +26,7 @@
RETCODE=0
@@ -1022,10 +1022,10 @@ Index: gnutls-3.8.9/tests/testpkcs11.sh
exit 77
fi
Index: gnutls-3.8.9/doc/enums/gnutls_fips_mode_t
Index: gnutls-3.8.10/doc/enums/gnutls_fips_mode_t
===================================================================
--- gnutls-3.8.9.orig/doc/enums/gnutls_fips_mode_t
+++ gnutls-3.8.9/doc/enums/gnutls_fips_mode_t
--- gnutls-3.8.10.orig/doc/enums/gnutls_fips_mode_t
+++ gnutls-3.8.10/doc/enums/gnutls_fips_mode_t
@@ -3,7 +3,7 @@
@c gnutls_fips_mode_t
@table @code
@@ -1046,10 +1046,10 @@ Index: gnutls-3.8.9/doc/enums/gnutls_fips_mode_t
application is aware of the followed security policy, and needs
to utilize disallowed operations for other reasons (e.g., compatibility).
@item GNUTLS_@-FIPS140_@-LOG
Index: gnutls-3.8.9/doc/gnutls-api.texi
Index: gnutls-3.8.10/doc/gnutls-api.texi
===================================================================
--- gnutls-3.8.9.orig/doc/gnutls-api.texi
+++ gnutls-3.8.9/doc/gnutls-api.texi
--- gnutls-3.8.10.orig/doc/gnutls-api.texi
+++ gnutls-3.8.10/doc/gnutls-api.texi
@@ -3279,7 +3279,7 @@ unusable. This function is not thread-s
@subheading gnutls_fips140_set_mode
@anchor{gnutls_fips140_set_mode}
@@ -1075,10 +1075,10 @@ Index: gnutls-3.8.9/doc/gnutls-api.texi
values for @code{mode} or to @code{GNUTLS_FIPS140_SELFTESTS} mode, the library
switches to @code{GNUTLS_FIPS140_STRICT} mode.
Index: gnutls-3.8.9/lib/ext/session_ticket.c
Index: gnutls-3.8.10/lib/ext/session_ticket.c
===================================================================
--- gnutls-3.8.9.orig/lib/ext/session_ticket.c
+++ gnutls-3.8.9/lib/ext/session_ticket.c
--- gnutls-3.8.10.orig/lib/ext/session_ticket.c
+++ gnutls-3.8.10/lib/ext/session_ticket.c
@@ -517,7 +517,7 @@ int gnutls_session_ticket_key_generate(g
{
if (_gnutls_fips_mode_enabled()) {
@@ -1088,10 +1088,10 @@ Index: gnutls-3.8.9/lib/ext/session_ticket.c
* some limits on allowed key size, thus it is not
* used. These limits do not affect this function as
* it does not generate a "key" but rather key material
Index: gnutls-3.8.9/lib/libgnutls.map
Index: gnutls-3.8.10/lib/libgnutls.map
===================================================================
--- gnutls-3.8.9.orig/lib/libgnutls.map
+++ gnutls-3.8.9/lib/libgnutls.map
--- gnutls-3.8.10.orig/lib/libgnutls.map
+++ gnutls-3.8.10/lib/libgnutls.map
@@ -1459,7 +1459,7 @@ GNUTLS_FIPS140_3_4 {
gnutls_hkdf_self_test;
gnutls_pbkdf2_self_test;
@@ -1101,10 +1101,10 @@ Index: gnutls-3.8.9/lib/libgnutls.map
drbg_aes_reseed;
drbg_aes_init;
drbg_aes_generate;
Index: gnutls-3.8.9/lib/nettle/mac.c
Index: gnutls-3.8.10/lib/nettle/mac.c
===================================================================
--- gnutls-3.8.9.orig/lib/nettle/mac.c
+++ gnutls-3.8.9/lib/nettle/mac.c
--- gnutls-3.8.10.orig/lib/nettle/mac.c
+++ gnutls-3.8.10/lib/nettle/mac.c
@@ -292,7 +292,7 @@ static void _wrap_gmac_digest(void *_ctx
static int _mac_ctx_init(gnutls_mac_algorithm_t algo,
struct nettle_mac_ctx *ctx)
@@ -1123,10 +1123,10 @@ Index: gnutls-3.8.9/lib/nettle/mac.c
* gnutls_hash_init() and gnutls_hmac_init() */
ctx->finished = NULL;
Index: gnutls-3.8.9/config.h.in
Index: gnutls-3.8.10/config.h.in
===================================================================
--- gnutls-3.8.9.orig/config.h.in
+++ gnutls-3.8.9/config.h.in
--- gnutls-3.8.10.orig/config.h.in
+++ gnutls-3.8.10/config.h.in
@@ -104,7 +104,7 @@
/* enable DHE */
#undef ENABLE_ECDHE
@@ -1145,11 +1145,11 @@ Index: gnutls-3.8.9/config.h.in
#undef FIPS_KEY
/* The FIPS140 module name */
Index: gnutls-3.8.9/configure
Index: gnutls-3.8.10/configure
===================================================================
--- gnutls-3.8.9.orig/configure
+++ gnutls-3.8.9/configure
@@ -4493,7 +4493,7 @@ Optional Features:
--- gnutls-3.8.10.orig/configure
+++ gnutls-3.8.10/configure
@@ -4484,7 +4484,7 @@ Optional Features:
--enable-fast-install[=PKGS]
optimize for fast installation [default=yes]
--disable-libtool-lock avoid locking (might break parallel builds)
@@ -1158,10 +1158,10 @@ Index: gnutls-3.8.9/configure
--enable-strict-x509 enable stricter sanity checks for x509 certificates
--disable-non-suiteb-curves
disable curves not in SuiteB
Index: gnutls-3.8.9/doc/cha-support.texi
Index: gnutls-3.8.10/doc/cha-support.texi
===================================================================
--- gnutls-3.8.9.orig/doc/cha-support.texi
+++ gnutls-3.8.9/doc/cha-support.texi
--- gnutls-3.8.10.orig/doc/cha-support.texi
+++ gnutls-3.8.10/doc/cha-support.texi
@@ -134,5 +134,5 @@ There are certifications from national o
to an auditor that the crypto component follows some best practices, such
as unit testing and reliance on well known crypto primitives.
@@ -1170,10 +1170,10 @@ Index: gnutls-3.8.9/doc/cha-support.texi
-See @ref{FIPS140-2 mode} for more information.
+GnuTLS has support for the FIPS 140-3 certification under Red Hat Enterprise Linux.
+See @ref{FIPS140-3 mode} for more information.
Index: gnutls-3.8.9/src/gnutls-cli-options.json
Index: gnutls-3.8.10/src/gnutls-cli-options.json
===================================================================
--- gnutls-3.8.9.orig/src/gnutls-cli-options.json
+++ gnutls-3.8.9/src/gnutls-cli-options.json
--- gnutls-3.8.10.orig/src/gnutls-cli-options.json
+++ gnutls-3.8.10/src/gnutls-cli-options.json
@@ -384,7 +384,7 @@
},
{
@@ -1183,10 +1183,10 @@ Index: gnutls-3.8.9/src/gnutls-cli-options.json
},
{
"long-option": "list-config",
Index: gnutls-3.8.9/tests/pkcs11-tool.sh
Index: gnutls-3.8.10/tests/pkcs11-tool.sh
===================================================================
--- gnutls-3.8.9.orig/tests/pkcs11-tool.sh
+++ gnutls-3.8.9/tests/pkcs11-tool.sh
--- gnutls-3.8.10.orig/tests/pkcs11-tool.sh
+++ gnutls-3.8.10/tests/pkcs11-tool.sh
@@ -30,7 +30,7 @@ set -x
: ${DIFF=diff}
@@ -1196,10 +1196,10 @@ Index: gnutls-3.8.9/tests/pkcs11-tool.sh
exit 77
fi
Index: gnutls-3.8.9/doc/manpages/gnutls_fips140_set_mode.3
Index: gnutls-3.8.10/doc/manpages/gnutls_fips140_set_mode.3
===================================================================
--- gnutls-3.8.9.orig/doc/manpages/gnutls_fips140_set_mode.3
+++ gnutls-3.8.9/doc/manpages/gnutls_fips140_set_mode.3
--- gnutls-3.8.10.orig/doc/manpages/gnutls_fips140_set_mode.3
+++ gnutls-3.8.10/doc/manpages/gnutls_fips140_set_mode.3
@@ -8,7 +8,7 @@ gnutls_fips140_set_mode \- API function
.BI "void gnutls_fips140_set_mode(gnutls_fips_mode_t " mode ", unsigned " flags ");"
.SH ARGUMENTS
@@ -1225,16 +1225,16 @@ Index: gnutls-3.8.9/doc/manpages/gnutls_fips140_set_mode.3
values for \fImode\fP or to \fBGNUTLS_FIPS140_SELFTESTS\fP mode, the library
switches to \fBGNUTLS_FIPS140_STRICT\fP mode.
.SH "SINCE"
Index: gnutls-3.8.9/doc/gnutls.info
Index: gnutls-3.8.10/doc/gnutls.info
===================================================================
--- gnutls-3.8.9.orig/doc/gnutls.info
+++ gnutls-3.8.9/doc/gnutls.info
@@ -619,7 +619,7 @@ Ref: fig-crypto-layers743671
Ref: Cryptographic Backend-Footnote-1746978
Ref: Cryptographic Backend-Footnote-2747063
Node: Random Number Generators-internals747175
-Node: FIPS140-2 mode754631
+Node: FIPS140-3 mode754631
Ref: gnutls_fips_mode_t757295
Node: Upgrading from previous versions760963
Node: Support775201
--- gnutls-3.8.10.orig/doc/gnutls.info
+++ gnutls-3.8.10/doc/gnutls.info
@@ -624,7 +624,7 @@ Ref: fig-crypto-layers746569
Ref: Cryptographic Backend-Footnote-1749876
Ref: Cryptographic Backend-Footnote-2749961
Node: Random Number Generators-internals750073
-Node: FIPS140-2 mode757529
+Node: FIPS140-3 mode757529
Ref: gnutls_fips_mode_t760193
Node: Upgrading from previous versions763861
Node: Support778099

View File

@@ -7,10 +7,10 @@ Date: Thu Nov 28 11:02:07 2024 +0200
Signed-off-by: Angel Yankov <angel.yankov@suse.com>
diff --git a/lib/crypto-api.c b/lib/crypto-api.c
index 0abbd7f69..f25ee0b14 100644
--- a/lib/crypto-api.c
+++ b/lib/crypto-api.c
Index: gnutls-3.8.10/lib/crypto-api.c
===================================================================
--- gnutls-3.8.10.orig/lib/crypto-api.c
+++ gnutls-3.8.10/lib/crypto-api.c
@@ -33,6 +33,7 @@
#include "crypto-api.h"
#include "iov.h"
@@ -19,7 +19,7 @@ index 0abbd7f69..f25ee0b14 100644
typedef struct api_cipher_hd_st {
cipher_hd_st ctx_enc;
@@ -597,7 +598,9 @@ int gnutls_hmac_init(gnutls_hmac_hd_t *dig, gnutls_mac_algorithm_t algorithm,
@@ -597,7 +598,9 @@ int gnutls_hmac_init(gnutls_hmac_hd_t *d
bool not_approved = false;
/* MD5 is only allowed internally for TLS */
@@ -30,7 +30,7 @@ index 0abbd7f69..f25ee0b14 100644
_gnutls_switch_fips_state(GNUTLS_FIPS140_OP_ERROR);
return gnutls_assert_val(GNUTLS_E_UNWANTED_ALGORITHM);
} else if (!is_mac_algo_approved_in_fips(algorithm)) {
@@ -757,8 +760,9 @@ int gnutls_hmac_fast(gnutls_mac_algorithm_t algorithm, const void *key,
@@ -757,8 +760,9 @@ int gnutls_hmac_fast(gnutls_mac_algorith
{
int ret;
bool not_approved = false;
@@ -42,7 +42,7 @@ index 0abbd7f69..f25ee0b14 100644
_gnutls_switch_fips_state(GNUTLS_FIPS140_OP_ERROR);
return gnutls_assert_val(GNUTLS_E_UNWANTED_ALGORITHM);
} else if (!is_mac_algo_approved_in_fips(algorithm)) {
@@ -839,8 +843,9 @@ int gnutls_hash_init(gnutls_hash_hd_t *dig, gnutls_digest_algorithm_t algorithm)
@@ -839,8 +843,9 @@ int gnutls_hash_init(gnutls_hash_hd_t *d
{
int ret;
bool not_approved = false;
@@ -54,7 +54,7 @@ index 0abbd7f69..f25ee0b14 100644
_gnutls_switch_fips_state(GNUTLS_FIPS140_OP_ERROR);
return gnutls_assert_val(GNUTLS_E_UNWANTED_ALGORITHM);
} else if (!is_mac_algo_approved_in_fips(DIG_TO_MAC(algorithm))) {
@@ -957,8 +962,9 @@ int gnutls_hash_fast(gnutls_digest_algorithm_t algorithm, const void *ptext,
@@ -957,8 +962,9 @@ int gnutls_hash_fast(gnutls_digest_algor
{
int ret;
bool not_approved = false;
@@ -66,7 +66,7 @@ index 0abbd7f69..f25ee0b14 100644
_gnutls_switch_fips_state(GNUTLS_FIPS140_OP_ERROR);
return gnutls_assert_val(GNUTLS_E_UNWANTED_ALGORITHM);
} else if (!is_mac_algo_approved_in_fips(DIG_TO_MAC(algorithm))) {
@@ -2174,7 +2180,9 @@ int gnutls_pbkdf2(gnutls_mac_algorithm_t mac, const gnutls_datum_t *key,
@@ -2173,7 +2179,9 @@ int gnutls_pbkdf2(gnutls_mac_algorithm_t
bool not_approved = false;
/* MD5 is only allowed internally for TLS */
@@ -77,11 +77,11 @@ index 0abbd7f69..f25ee0b14 100644
_gnutls_switch_fips_state(GNUTLS_FIPS140_OP_ERROR);
return gnutls_assert_val(GNUTLS_E_UNWANTED_ALGORITHM);
} else if (!is_mac_algo_hmac_approved_in_fips(mac)) {
diff --git a/lib/crypto-selftests.c b/lib/crypto-selftests.c
index f6505f7fe..f3b5cc870 100644
--- a/lib/crypto-selftests.c
+++ b/lib/crypto-selftests.c
@@ -2891,7 +2891,7 @@ int gnutls_mac_self_test(unsigned flags, gnutls_mac_algorithm_t mac)
Index: gnutls-3.8.10/lib/crypto-selftests.c
===================================================================
--- gnutls-3.8.10.orig/lib/crypto-selftests.c
+++ gnutls-3.8.10/lib/crypto-selftests.c
@@ -2891,7 +2891,7 @@ int gnutls_mac_self_test(unsigned flags,
case GNUTLS_MAC_UNKNOWN:
NON_FIPS_CASE(GNUTLS_MAC_MD5, test_mac, hmac_md5_vectors);
FALLTHROUGH;
@@ -90,11 +90,11 @@ index f6505f7fe..f3b5cc870 100644
FALLTHROUGH;
CASE(GNUTLS_MAC_SHA224, test_mac, hmac_sha224_vectors);
FALLTHROUGH;
diff --git a/lib/fips.h b/lib/fips.h
index 60a4e5f67..76b746253 100644
--- a/lib/fips.h
+++ b/lib/fips.h
@@ -81,7 +81,6 @@ inline static bool
Index: gnutls-3.8.10/lib/fips.h
===================================================================
--- gnutls-3.8.10.orig/lib/fips.h
+++ gnutls-3.8.10/lib/fips.h
@@ -79,7 +79,6 @@ inline static bool
is_mac_algo_hmac_approved_in_fips(gnutls_mac_algorithm_t algo)
{
switch (algo) {
@@ -102,58 +102,10 @@ index 60a4e5f67..76b746253 100644
case GNUTLS_MAC_SHA256:
case GNUTLS_MAC_SHA384:
case GNUTLS_MAC_SHA512:
diff --git a/lib/nettle/pk.c b/lib/nettle/pk.c
index 91eaffd68..da8783b95 100644
--- a/lib/nettle/pk.c
+++ b/lib/nettle/pk.c
@@ -2784,10 +2784,7 @@ static int _wrap_nettle_pk_verify(gnutls_pk_algorithm_t algo,
if (hash_len > vdata->size)
hash_len = vdata->size;
- /* SHA-1 is allowed for SigVer in FIPS 140-3 in legacy
- * mode */
switch (DIG_TO_MAC(sign_params->dsa_dig)) {
- case GNUTLS_MAC_SHA1:
case GNUTLS_MAC_SHA256:
case GNUTLS_MAC_SHA384:
case GNUTLS_MAC_SHA512:
@@ -2857,7 +2854,7 @@ static int _wrap_nettle_pk_verify(gnutls_pk_algorithm_t algo,
bits = mpz_sizeinbase(pub.n, 2);
/* In FIPS 140-3, RSA key size should be larger than 2048-bit.
- * In addition to this, only SHA-1 and SHA-2 are allowed
+ * In addition to this, only SHA-2 is allowed
* for SigVer; it is checked in _pkcs1_rsa_verify_sig in
* lib/pubkey.c.
*/
@@ -2903,7 +2900,7 @@ static int _wrap_nettle_pk_verify(gnutls_pk_algorithm_t algo,
}
/* RSA modulus size should be 2048-bit or larger in FIPS
- * 140-3. In addition to this, only SHA-1 and SHA-2 are
+ * 140-3. In addition to this, only SHA-2 are
* allowed for SigVer, while Nettle only supports
* SHA256, SHA384, and SHA512 for RSA-PSS (see
* _rsa_pss_verify_digest in this file for the details).
diff --git a/lib/pubkey.c b/lib/pubkey.c
index 1e5ecf31c..811e5310b 100644
--- a/lib/pubkey.c
+++ b/lib/pubkey.c
@@ -2516,10 +2516,7 @@ static int _pkcs1_rsa_verify_sig(gnutls_pk_algorithm_t pk,
d.size = digest_size;
if (pk == GNUTLS_PK_RSA) {
- /* SHA-1 is allowed for SigVer in FIPS 140-3 in legacy
- * mode */
switch (me->id) {
- case GNUTLS_MAC_SHA1:
case GNUTLS_MAC_SHA256:
case GNUTLS_MAC_SHA384:
case GNUTLS_MAC_SHA512:
diff --git a/tests/fips-test.c b/tests/fips-test.c
index 3af4df719..d3fab9dfb 100644
--- a/tests/fips-test.c
+++ b/tests/fips-test.c
Index: gnutls-3.8.10/tests/fips-test.c
===================================================================
--- gnutls-3.8.10.orig/tests/fips-test.c
+++ gnutls-3.8.10/tests/fips-test.c
@@ -397,11 +397,12 @@ void doit(void)
}
FIPS_POP_CONTEXT(ERROR);
@@ -169,42 +121,6 @@ index 3af4df719..d3fab9dfb 100644
ret = gnutls_hmac_init(&mh, GNUTLS_MAC_MD5, key.data, key.size);
if (ret != GNUTLS_E_UNWANTED_ALGORITHM) {
@@ -596,7 +597,7 @@ void doit(void)
}
FIPS_POP_CONTEXT(NOT_APPROVED);
- /* Verify a signature created with 2432-bit RSA and SHA-1; approved */
+ /* Verify a signature created with 2432-bit RSA and SHA-1; not approved */
FIPS_PUSH_CONTEXT();
ret = gnutls_pubkey_verify_data2(pubkey, GNUTLS_SIGN_RSA_SHA1,
GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1,
@@ -604,7 +605,7 @@ void doit(void)
if (ret < 0) {
fail("gnutls_pubkey_verify_data2 failed\n");
}
- FIPS_POP_CONTEXT(APPROVED);
+ FIPS_POP_CONTEXT(NOT_APPROVED);
gnutls_free(signature.data);
gnutls_pubkey_deinit(pubkey);
gnutls_privkey_deinit(privkey);
@@ -707,7 +708,7 @@ void doit(void)
}
FIPS_POP_CONTEXT(NOT_APPROVED);
- /* Verify a signature created with ECDSA and SHA-1; approved */
+ /* Verify a signature created with ECDSA and SHA-1; not approved */
FIPS_PUSH_CONTEXT();
ret = gnutls_pubkey_verify_data2(pubkey, GNUTLS_SIGN_ECDSA_SHA1,
GNUTLS_VERIFY_ALLOW_SIGN_WITH_SHA1,
@@ -715,7 +716,7 @@ void doit(void)
if (ret < 0) {
fail("gnutls_pubkey_verify_data2 failed\n");
}
- FIPS_POP_CONTEXT(APPROVED);
+ FIPS_POP_CONTEXT(NOT_APPROVED);
gnutls_free(signature.data);
/* Create a signature with ECDSA and SHA-1 (old API); not approved */
@@ -736,7 +737,7 @@ void doit(void)
}
hashed_data.data = hash;
@@ -214,10 +130,10 @@ index 3af4df719..d3fab9dfb 100644
/* Create a signature with ECDSA and SHA1 (2-pass API); not-approved */
FIPS_PUSH_CONTEXT();
diff --git a/tests/gnutls_hmac_fast.c b/tests/gnutls_hmac_fast.c
index e092bdd95..b54e64569 100644
--- a/tests/gnutls_hmac_fast.c
+++ b/tests/gnutls_hmac_fast.c
Index: gnutls-3.8.10/tests/gnutls_hmac_fast.c
===================================================================
--- gnutls-3.8.10.orig/tests/gnutls_hmac_fast.c
+++ gnutls-3.8.10/tests/gnutls_hmac_fast.c
@@ -42,6 +42,11 @@ void doit(void)
if (debug)
gnutls_global_set_log_level(4711);
@@ -242,10 +158,10 @@ index e092bdd95..b54e64569 100644
err = gnutls_hmac_fast(GNUTLS_MAC_MD5, "keykeykey", 9, "abcdefgh", 8,
digest);
if (err < 0)
diff --git a/tests/kdf-api.c b/tests/kdf-api.c
index d476482fa..45c6d60de 100644
--- a/tests/kdf-api.c
+++ b/tests/kdf-api.c
Index: gnutls-3.8.10/tests/kdf-api.c
===================================================================
--- gnutls-3.8.10.orig/tests/kdf-api.c
+++ gnutls-3.8.10/tests/kdf-api.c
@@ -108,7 +108,6 @@ inline static bool
is_mac_algo_hmac_approved_in_fips(gnutls_mac_algorithm_t algo)
{
@@ -254,7 +170,7 @@ index d476482fa..45c6d60de 100644
case GNUTLS_MAC_SHA256:
case GNUTLS_MAC_SHA384:
case GNUTLS_MAC_SHA512:
@@ -145,7 +144,7 @@ static void test_pbkdf2(gnutls_mac_algorithm_t mac, const char *ikm_hex,
@@ -145,7 +144,7 @@ static void test_pbkdf2(gnutls_mac_algor
assert(gnutls_hex_decode2(&hex, &salt) >= 0);
fips_push_context(fips_context);

View File

@@ -1,10 +1,10 @@
Index: gnutls-3.8.9/tests/Makefile.am
Index: gnutls-3.8.10/tests/Makefile.am
===================================================================
--- gnutls-3.8.9.orig/tests/Makefile.am
+++ gnutls-3.8.9/tests/Makefile.am
@@ -530,7 +530,7 @@ if !WINDOWS
# List of tests not available/functional under windows
#
--- gnutls-3.8.10.orig/tests/Makefile.am
+++ gnutls-3.8.10/tests/Makefile.am
@@ -536,7 +536,7 @@ ktls_keyupdate_CFLAGS = -DUSE_KTLS
dist_check_SCRIPTS += ktls_keyupdate.sh
endif
-dist_check_SCRIPTS += dtls/dtls.sh dtls/dtls-resume.sh #dtls/dtls-nb
+dist_check_SCRIPTS += dtls/dtls.sh #dtls/dtls-resume.sh #dtls/dtls-nb

View File

@@ -1,8 +1,8 @@
Index: gnutls-3.8.9/tests/Makefile.am
Index: gnutls-3.8.10/tests/Makefile.am
===================================================================
--- gnutls-3.8.9.orig/tests/Makefile.am
+++ gnutls-3.8.9/tests/Makefile.am
@@ -603,8 +603,6 @@ ctests += win32-certopenstore
--- gnutls-3.8.10.orig/tests/Makefile.am
+++ gnutls-3.8.10/tests/Makefile.am
@@ -628,8 +628,6 @@ ctests += win32-certopenstore
endif
@@ -11,11 +11,11 @@ Index: gnutls-3.8.9/tests/Makefile.am
cpptests =
if ENABLE_CXX
if HAVE_CMOCKA
Index: gnutls-3.8.9/tests/Makefile.in
Index: gnutls-3.8.10/tests/Makefile.in
===================================================================
--- gnutls-3.8.9.orig/tests/Makefile.in
+++ gnutls-3.8.9/tests/Makefile.in
@@ -3236,7 +3236,7 @@ am__dist_check_SCRIPTS_DIST = rfc2253-es
--- gnutls-3.8.10.orig/tests/Makefile.in
+++ gnutls-3.8.10/tests/Makefile.in
@@ -3293,7 +3293,7 @@ am__dist_check_SCRIPTS_DIST = rfc2253-es
gnutls-cli-self-signed.sh gnutls-cli-invalid-crl.sh \
gnutls-cli-rawpk.sh dh-fips-approved.sh p11-kit-trust.sh \
testpkcs11.sh certtool-pkcs11.sh pkcs11-tool.sh \
@@ -24,11 +24,11 @@ Index: gnutls-3.8.9/tests/Makefile.in
AM_V_P = $(am__v_P_@AM_V@)
am__v_P_ = $(am__v_P_@AM_DEFAULT_V@)
am__v_P_0 = false
@@ -7106,7 +7106,6 @@ dist_check_SCRIPTS = rfc2253-escape-test
@@ -7178,7 +7178,6 @@ dist_check_SCRIPTS = rfc2253-escape-test
$(am__append_18) $(am__append_20) $(am__append_21) \
$(am__append_23) $(am__append_25) $(am__append_26) \
$(am__append_27) $(am__append_29) $(am__append_30) \
- pqc-hybrid-kx.sh
@ENABLE_KTLS_TRUE@@WINDOWS_FALSE@ktls_keyupdate_SOURCES = tls13/key_update.c
@ENABLE_KTLS_TRUE@@WINDOWS_FALSE@ktls_keyupdate_CFLAGS = -DUSE_KTLS
@WINDOWS_FALSE@dtls_stress_SOURCES = dtls/dtls-stress.c
@WINDOWS_FALSE@dtls_stress_LDADD = $(COMMON_GNUTLS_LDADD) \
@WINDOWS_FALSE@ $(COMMON_DEPS_LDADD)

View File

@@ -1,3 +1,56 @@
-------------------------------------------------------------------
Mon Jul 14 17:00:21 UTC 2025 - Lucas Mulling <lucas.mulling@suse.com>
- Update to 3.8.10:
* libgnutls: Fix NULL pointer dereference when 2nd Client Hello omits PSK
Reported by Stefan Bühler. [GNUTLS-SA-2025-07-07-4, CVSS: medium]
[bsc#1246299, CVE-2025-6395]
* libgnutls: Fix heap read buffer overrun in parsing X.509 SCTS timestamps
Spotted by oss-fuzz and reported by OpenAI Security Research Team,
and fix developed by Andrew Hamilton. [GNUTLS-SA-2025-07-07-1,
CVSS: medium] [bsc#1246233, CVE-2025-32989]
* libgnutls: Fix double-free upon error when exporting otherName in SAN
Reported by OpenAI Security Research Team. [GNUTLS-SA-2025-07-07-2,
CVSS: low] [bsc#1246232, CVE-2025-32988]
* certtool: Fix 1-byte write buffer overrun when parsing template
Reported by David Aitel. [GNUTLS-SA-2025-07-07-3,
CVSS: low] [bsc#1246267, CVE-2025-32990]
* libgnutls: PKCS#11 modules can now be used to override the default
cryptographic backend. Use the [provider] section in the system-wide config
to specify path and pin to the module (see system-wide config Documentation).
* libgnutls: Linux kernel version 6.14 brings a Kernel TLS (kTLS) key update
support. The library running on the aforementioned version now utilizes the
kernels key update mechanism when kTLS is enabled, allowing uninterrupted
TLS session. The --enable-ktls configure option as well as the system-wide
kTLS configuration(see GnuTLS Documentation) are still required to enable
this feature.
* libgnutls: liboqs support for PQC has been removed
For maintenance purposes, support for post-quantum cryptography
(PQC) is now only provided through leancrypto. The experimental key
exchange algorithm, X25519Kyber768Draft00, which is based on the
round 3 candidate of Kyber and only supported through liboqs has
also been removed altogether.
* libgnutls: TLS certificate compression methods can now be set with
cert-compression-alg configuration option in the gnutls priority file.
* libgnutls: All variants of ML-DSA private key formats are supported
While the previous implementation of ML-DSA was based on
draft-ietf-lamps-dilithium-certificates-04, this updates it to
draft-ietf-lamps-dilithium-certificates-12 with support for all 3
variants of private key formats: "seed", "expandedKey", and "both".
* libgnutls: ML-DSA signatures can now be used in TLS
The ML-DSA signature algorithms, ML-DSA-44, ML-DSA-65, and
ML-DSA-87, can now be used to digitally sign TLS handshake
messages.
* API and ABI modifications:
- GNUTLS_PKCS_MLDSA_SEED: New enum member of gnutls_pkcs_encrypt_flags_t
- GNUTLS_PKCS_MLDSA_EXPANDED: New enum member of gnutls_pkcs_encrypt_flags_t
- Add patch gnutls-3.8.10-disable-ktls_test.patch
- Rebased patches:
* gnutls-FIPS-140-3-references.patch
* gnutls-FIPS-disable-mac-sha1.patch
* gnutls-disable-flaky-test-dtls-resume.patch
* gnutls-skip-pqx-test.patch
-------------------------------------------------------------------
Sun Jul 13 18:54:51 UTC 2025 - Andreas Stieger <andreas.stieger@gmx.de>
@@ -10,7 +63,7 @@ Mon Apr 28 12:49:45 UTC 2025 - Angel Yankov <angel.yankov@suse.com>
- Fix FIPS mode running on Tumbleweed [bsc#1237101]
* When nettle or libhogweed are installed with glbic-hwcaps for x86_64-v3,
some paths differ and we are unable to match the hmac file for the lib.
* Add gnutls-FIPS-HMAC-x86_64-v3-opt.patch
* Add gnutls-FIPS-HMAC-x86_64-v3-opt.patch
-------------------------------------------------------------------
Thu Apr 3 10:19:59 UTC 2025 - Guillaume GARDET <guillaume.gardet@opensuse.org>
@@ -28,12 +81,12 @@ Tue Mar 18 07:56:18 UTC 2025 - Angel Yankov <angel.yankov@suse.com>
- bsc#1237101, FIPS selfcheck fails on tumbleweed
* Match dependent library names ( nettle, gmp, hogweed ) even when they include full verison in soname
* Add gnutls-fips-sonames-check.patch
* Add gnutls-fips-sonames-check.patch
-------------------------------------------------------------------
Mon Feb 24 11:15:52 UTC 2025 - Angel Yankov <angel.yankov@suse.com>
- Update to 3.8.9
- Update to 3.8.9
- libgnutls: leancrypto was added as an interim option for PQC
The library can now be built with leancrypto instead of liboqs for
post-quantum cryptography (PQC), when configured with
@@ -700,7 +753,7 @@ Sun Feb 27 07:52:30 UTC 2022 - Dirk Müller <dmueller@suse.com>
- build with lto
- build with -Wl,-z,now -Wl,-z,relro
- build without -fanalyzer, which cuts build time in ~ half
- build without -fanalyzer, which cuts build time in ~ half
-------------------------------------------------------------------
Tue Jan 18 15:59:11 UTC 2022 - Pedro Monreal <pmonreal@suse.com>
@@ -854,7 +907,7 @@ Tue Jun 1 01:00:34 UTC 2021 - Ferdinand Thiessen <rpm@fthiessen.de>
* The priority string option DISABLE_TLS13_COMPAT_MODE was added
to disable TLS 1.3 middlebox compatibility mode
* The GNUTLS_NO_EXPLICIT_INIT envvar has been renamed to
GNUTLS_NO_IMPLICIT_INIT to reflect the purpose
GNUTLS_NO_IMPLICIT_INIT to reflect the purpose
* certtool:
* When signing a CSR, CRL distribution point (CDP) is no
longer copied from the signing CA by default
@@ -1591,7 +1644,7 @@ Mon Sep 18 11:47:23 UTC 2017 - astieger@suse.com
* certtool: The option '--load-crl' can now be used when
generating PKCS#12 files (i.e., in conjunction with '--to-p12' option).
* certtool: Keys with provable RSA and DSA parameters are now
only read and exported from PKCS#8 form, following
only read and exported from PKCS#8 form, following
draft-mavrogiannopoulos-pkcs8-validated-parameters-00.txt.
This removes support for the previous a non-standard key format.
* certtool: Added support for generating, printing and handling
@@ -1820,7 +1873,7 @@ Sun Dec 18 12:56:15 UTC 2016 - astieger@suse.com
- GnuTLS 3.4.17:
* libgnutls: Introduced time and constraints checks in the end
certificate in the gnutls_x509_crt_verify_data2() and
certificate in the gnutls_x509_crt_verify_data2() and
gnutls_pkcs7_verify_direct() functions.
* libgnutls: Set limits on the maximum number of alerts handled.
That is, applications using gnutls could be tricked into an
@@ -1862,24 +1915,24 @@ Sun Dec 18 12:56:15 UTC 2016 - astieger@suse.com
Sun Oct 2 16:13:59 UTC 2016 - ecsos@opensuse.org
- GnuTLS 3.4.15:
* libgnutls: Corrected the comparison of the serial size in OCSP
response. Previously the OCSP certificate check wouldn't verify
the serial length and could succeed in cases it shouldn't
* libgnutls: Corrected the comparison of the serial size in OCSP
response. Previously the OCSP certificate check wouldn't verify
the serial length and could succeed in cases it shouldn't
(GNUTLS-SA-2016-3).
* libgnutls: Fixes in gnutls_x509_crt_list_import2, which was
ignoring flags if all certificates in the list fit within the
initially allocated memory.
* libgnutls: Corrected issue which made
gnutls_certificate_get_x509_crt() to return invalid pointers
* libgnutls: Corrected issue which made
gnutls_certificate_get_x509_crt() to return invalid pointers
when returned more than a single certificate.
* libgnutls: Fix gnutls_pkcs12_simple_parse to always extract the
complete chain.
* libgnutls: Added support for decrypting PKCS#8 files which use
* libgnutls: Added support for decrypting PKCS#8 files which use
the HMAC-SHA256 as PRF.
* libgnutls: Addressed issue with PKCS#11 signature generation on
ECDSA keys. The signature is now written as unsigned integers
into the DSASignatureValue structure. Previously signed
integers could be written depending on what the underlying
* libgnutls: Addressed issue with PKCS#11 signature generation on
ECDSA keys. The signature is now written as unsigned integers
into the DSASignatureValue structure. Previously signed
integers could be written depending on what the underlying
module would produce. Addresses #122.
- fix build error for 13.2, 42.1 and 42.2
@@ -1946,13 +1999,13 @@ Mon Apr 11 09:18:26 UTC 2016 - meissner@suse.com
- Updated to 3.4.11
* Version 3.4.11 (released 2016-04-11)
** libgnutls: Fixes in gnutls_record_get/set_state() with DTLS.
** libgnutls: Fixes in gnutls_record_get/set_state() with DTLS.
Reported by Fridolin Pokorny.
** libgnutls: Fixes in DSA key generation under PKCS #11. Report and
patches by Jan Vcelak.
** libgnutls: Corrected behavior of ALPN extension parsing during
session resumption. Report and patches by Yuriy M. Kaminskiy.
** libgnutls: Corrected regression (since 3.4.0) in
** libgnutls: Corrected regression (since 3.4.0) in
gnutls_server_name_set() which caused it not to accept non-null-
terminated hostnames. Reported by Tim Ruehsen.
** libgnutls: Corrected printing of the IP Adress name constraints.
@@ -1969,16 +2022,16 @@ Mon Apr 11 09:18:26 UTC 2016 - meissner@suse.com
to be used with hashing functions.
** libgnutls: Corrected leaks and other issues in
gnutls_x509_crt_list_import().
** libgnutls: Fixes in DSA key handling for PKCS #11. Report and
** libgnutls: Fixes in DSA key handling for PKCS #11. Report and
patches by Jan Vcelak.
** libgnutls: Several fixes to prevent relying on undefined behavior
of C (found with libubsan).
* Version 3.4.9 (released 2016-02-03)
** libgnutls: Corrected ALPN protocol negotiation. Before GnuTLS would
negotiate the last commonly supported protocol, rather than the
negotiate the last commonly supported protocol, rather than the
first. Reported by Remi Denis-Courmont (#63).
** libgnutls: Tolerate empty DN fields in informational output
** libgnutls: Tolerate empty DN fields in informational output
functions.
** libgnutls: Corrected regression causes by incorrect fix in
gnutls_x509_ext_export_key_usage() at 3.4.8 release.
@@ -2009,22 +2062,22 @@ Mon Jan 18 13:25:54 UTC 2016 - idonmez@suse.com
parameters for a direct import.
* libgnutls: Fixed issue when writing ECDSA private keys in PKCS #11
tokens.
* libgnutls: Fixed out-of-bounds read in
* libgnutls: Fixed out-of-bounds read in
gnutls_x509_ext_export_key_usage()
* libgnutls: The CHACHA20-POLY1305 ciphersuites were updated to
* libgnutls: The CHACHA20-POLY1305 ciphersuites were updated to
conform to draft-ietf-tls-chacha20-poly1305-02.
* libgnutls: Several fixes in PKCS #7 signing which improve
* libgnutls: Several fixes in PKCS #7 signing which improve
compatibility with the MacOSX tools.
* libgnutls: The max-record extension not negotiated on DTLS. This
resolves issue with the max-record being negotiated but ignored.
* certtool: Added the --p7-include-cert and --p7-show-data options.
* libgnutls: Properly require TLS 1.2 in all CBC-SHA256 and CBC-SHA384
ciphersuites. This solves an interoperability issue with openssl.
* libgnutls: Corrected the setting of salt size in
* libgnutls: Corrected the setting of salt size in
gnutls_pkcs12_mac_info().
* libgnutls: On a rehandshake allow switching from anonymous to ECDHE
* libgnutls: On a rehandshake allow switching from anonymous to ECDHE
and DHE ciphersuites.
* libgnutls: Corrected regression from 3.3.x which prevented
* libgnutls: Corrected regression from 3.3.x which prevented
ARCFOUR128 from using arbitrary key sizes.
* libgnutls: Added GNUTLS_SKIP_GLOBAL_INIT macro to allow programs
skipping the implicit global initialization.
@@ -2034,14 +2087,14 @@ Mon Jan 18 13:25:54 UTC 2016 - idonmez@suse.com
need to install a callback to perform certificate verification. See
doc/examples/ex-client-x509.c for usage.
* libgnutls: Introduced the security parameter 'future' which is at
the 256-bit level of security, and 'ultra' was aligned to its
the 256-bit level of security, and 'ultra' was aligned to its
documented size at 192-bits.
* libgnutls: When writing a certificate into a PKCS #11 token, ensure
that CKA_SERIAL_NUMBER and CKA_ISSUER are written.
* libgnutls: Allow the presence of legacy ciphers and key exchanges in
priority strings and consider them a no-op.
* libgnutls: Handle the extended master secret as a mandatory
extension. That fixes incompatibility issues with Chromium (#45).
* libgnutls: Handle the extended master secret as a mandatory
extension. That fixes incompatibility issues with Chromium (#45).
* libgnutls: Added the ability to copy a public key into a PKCS #11
token.
* tools: Added support for LDAP and XMPP negotiation for STARTTLS.
@@ -2095,10 +2148,10 @@ Thu Jul 30 15:39:34 UTC 2015 - vcizek@suse.com
was done only when cryptodev was enabled).
** libgnutls: Removed support for pthread_atfork() as it has undefined
semantics when used with dlopen(), and may lead to a crash.
** libgnutls: corrected failure when importing plain files
** libgnutls: corrected failure when importing plain files
with gnutls_x509_privkey_import2(), and a password was provided.
** libgnutls: Don't reject certificates if a CA has the URI or IP address
name constraints, and the end certificate doesn't have an IP address
name constraints, and the end certificate doesn't have an IP address
name or a URI set.
** libgnutls: set and read the hint in DHE-PSK and ECDHE-PSK ciphersuites.
** p11tool: Added --list-token-urls option, and print the token module name
@@ -2127,7 +2180,7 @@ Thu Jul 30 15:39:34 UTC 2015 - vcizek@suse.com
-------------------------------------------------------------------
Tue May 5 19:06:29 UTC 2015 - dmueller@suse.com
- disable testsuite run against valgrind on aarch64
- disable testsuite run against valgrind on aarch64
-------------------------------------------------------------------
Tue May 5 12:40:11 UTC 2015 - meissner@suse.com
@@ -2170,7 +2223,7 @@ Sun Apr 12 10:16:33 UTC 2015 - meissner@suse.com
** libgnutls: Added support for Chacha20-Poly1305 ciphersuites following
draft-mavrogiannopoulos-chacha-tls-05 and draft-irtf-cfrg-chacha20-poly1305-10.
That is currently provided as technology preview and is not enabled by
default, since there are no assigned ciphersuite points by IETF and there
default, since there are no assigned ciphersuite points by IETF and there
is no guarrantee of compatibility between draft versions. The ciphersuite
priority string to enable it is "+CHACHA20-POLY1305".
@@ -2225,14 +2278,14 @@ Sun Apr 12 10:16:33 UTC 2015 - meissner@suse.com
** libgnutls: If a key purpose (extended key usage) is specified for verification,
it is applied into intermediate certificates. The verification result
GNUTLS_CERT_PURPOSE_MISMATCH is also introduced.
GNUTLS_CERT_PURPOSE_MISMATCH is also introduced.
** libgnutls: When gnutls_certificate_set_x509_key_file2() is used in
combination with PKCS #11, or TPM URLs, it will utilize the provided
password as PIN if required. That removes the requirement for the
application to set a callback for PINs in that case.
** libgnutls: priority strings VERS-TLS-ALL and VERS-DTLS-ALL are
** libgnutls: priority strings VERS-TLS-ALL and VERS-DTLS-ALL are
restricted to the corresponding protocols only, and the VERS-ALL
string is introduced to catch all possible protocols.
@@ -2284,14 +2337,14 @@ Sun Apr 12 10:16:33 UTC 2015 - meissner@suse.com
** gnutls-cli: added options --priority-list and --save-cert.
** guile: Deprecated priority API has been removed. The old priority API,
** guile: Deprecated priority API has been removed. The old priority API,
which had been deprecated for some time, is now gone; use 'set-session-priorities!'
instead.
** guile: Remove RSA parameters and related procedures. This API had been
deprecated.
** guile: Remove RSA parameters and related procedures. This API had been
deprecated.
** guile: Fix compilation on MinGW. Previously only the static version of the
** guile: Fix compilation on MinGW. Previously only the static version of the
'guile-gnutls-v-2' library would be built, preventing dynamic loading from Guile.
-------------------------------------------------------------------
@@ -2446,7 +2499,7 @@ Sat Mar 21 07:17:50 UTC 2015 - meissner@suse.com
handshake's hash buffer, in applications using the heartbeat extension
or DTLS. Reported by Joeri de Ruiter.
** libgnutls: When both a trust module and additional CAs are present
** libgnutls: When both a trust module and additional CAs are present
account the latter as well; reported by David Woodhouse.
** libgnutls: added GNUTLS_TL_GET_COPY flag for
@@ -2581,7 +2634,7 @@ Sat Mar 21 07:17:50 UTC 2015 - meissner@suse.com
** libgnutls: fixed PKCS #11 ECDSA key generation.
** libgnutls: The GNUTLS_CPUID_OVERRIDE environment variable can be used to
** libgnutls: The GNUTLS_CPUID_OVERRIDE environment variable can be used to
explicitly enable/disable the use of certain CPU capabilities. Note that CPU
detection cannot be overriden, i.e., VIA options cannot be enabled on an Intel
CPU. The currently available options are:
@@ -2721,7 +2774,7 @@ Sat Mar 21 07:17:50 UTC 2015 - meissner@suse.com
different recv and send pointers have been specified. Reported and
investigated by JMRecio.
** libgnutls: Fixed issue in the RSA-PSK key exchange, which would
** libgnutls: Fixed issue in the RSA-PSK key exchange, which would
result to illegal memory access if a server hint was provided. Reported
by André Klitzing.
@@ -2744,7 +2797,7 @@ Sat Mar 21 07:17:50 UTC 2015 - meissner@suse.com
modules.
** libgnutls: The PKCS #11 subsystem is re-initialized "automatically"
on the first PKCS #11 API call after a fork.
on the first PKCS #11 API call after a fork.
** libgnutls: certificate verification profiles were introduced
that can be specified as flags to verification functions. They
@@ -2758,15 +2811,15 @@ Sat Mar 21 07:17:50 UTC 2015 - meissner@suse.com
strings from. That can be used to impose system specific policies.
** libgnutls: Increased the default security level of priority
strings (NORMAL and PFS strings require at minimum a 1008 DH prime),
and set a verification profile by default. The LEGACY keyword is
strings (NORMAL and PFS strings require at minimum a 1008 DH prime),
and set a verification profile by default. The LEGACY keyword is
introduced to set the old defaults.
** libgnutls: Added support for the name constraints PKIX extension.
Currently only DNS names and e-mails are supported (no URIs, IPs
or DNs).
** libgnutls: Security parameter SEC_PARAM_NORMAL was renamed to
** libgnutls: Security parameter SEC_PARAM_NORMAL was renamed to
SEC_PARAM_MEDIUM to avoid confusion with the priority string NORMAL.
** libgnutls: Added new API in x509-ext.h to handle X.509 extensions.
@@ -2823,7 +2876,7 @@ Sat Mar 21 07:17:50 UTC 2015 - meissner@suse.com
That option enables (when running on FIPS140-enabled system):
o RSA, DSA and DH key generation as in FIPS-186-4 (using provable primes)
o The DRBG-CTR-AES256 deterministic random generator from SP800-90A.
o Self-tests on initialization on ciphers/MACs, public key algorithms
o Self-tests on initialization on ciphers/MACs, public key algorithms
and the random generator.
o HMAC-SHA256 verification of the library on load.
o MD5 is included for TLS purposes but cannot be used by the high level
@@ -2889,7 +2942,7 @@ the original. Issue found and reported by Antti Karjalainen and Matti Kamunen fr
Codenomicon.
** API and ABI modifications:
No changes since last version.
No changes since last version.
Delete files: gnutls-3.2.17.tar.xz, gnutls-3.2.17.tar.xz.sig
Add files: gnutls-3.2.18.tar.xz, gnutls-3.2.18.tar.xz.sig
@@ -2897,7 +2950,7 @@ Add files: gnutls-3.2.18.tar.xz, gnutls-3.2.18.tar.xz.sig
-------------------------------------------------------------------
Fri Sep 19 09:27:47 UTC 2014 - dmueller@suse.com
- update list of available architectures for valgrind
- update list of available architectures for valgrind
-------------------------------------------------------------------
Sun Aug 31 07:01:32 UTC 2014 - citypw@gmail.com
@@ -2952,7 +3005,7 @@ types.
** API and ABI modifications:
No changes since last version.
delete files: gnutls-3.2.15.tar.xz, gnutls-3.2.15.tar.xz.sig,
delete files: gnutls-3.2.15.tar.xz, gnutls-3.2.15.tar.xz.sig,
audit-improve.patch( already in upstream)
Add files: gnutls-3.2.16.tar.xz, gnutls-3.2.16.tar.xz.sig
@@ -2961,7 +3014,7 @@ Add files: gnutls-3.2.16.tar.xz, gnutls-3.2.16.tar.xz.sig
Tue Jun 3 07:48:04 UTC 2014 - meissner@suse.com
- Version 3.2.15 (released 2014-05-30)
** libgnutls: Eliminated memory corruption issue in Server Hello parsing.
Issue reported by Joonas Kuorilehto of Codenomicon. (CVE-2014-3466 / bnc#880730)
** libgnutls: Several memory leaks caused by error conditions were
@@ -2982,14 +3035,14 @@ Tue Jun 3 07:48:04 UTC 2014 - meissner@suse.com
** libgnutls: Fixed issue with the check of incoming data when two
different recv and send pointers have been specified. Reported and
investigated by JMRecio.
** libgnutls: Fixed issue in the RSA-PSK key exchange, which would
** libgnutls: Fixed issue in the RSA-PSK key exchange, which would
result to illegal memory access if a server hint was provided.
** libgnutls: Fixed client memory leak in the PSK key exchange, if a
server hint was provided.
** libgnutls: Several small bug fixes identified using valgrind and
the Codenomicon TLS test suite.
** libgnutls: Several small bug fixes found by coverity.
** libgnutls-dane: Accept a certificate using DANE if there is at least one
** libgnutls-dane: Accept a certificate using DANE if there is at least one
entry that matches the certificate. Patch by simon [at] arlott.org.
** configure: Added --with-nettle-mini option, which allows linking
with a libnettle that contains gmp.
@@ -3043,7 +3096,7 @@ Wed Apr 9 17:23:15 UTC 2014 - shchang@suse.com
-------------------------------------------------------------------
Wed Mar 5 15:30:54 UTC 2014 - shchang@suse.com
- Upgrade to 3.2.12.1;
- Upgrade to 3.2.12.1;
** libgnutls: Reverted change that broke ABI. Reported by Andreas
Metzler.
@@ -3073,7 +3126,7 @@ in the OCSP response.
** gnutls-cli: Added --strict-tofu option; contributed by Jens
Lechtenboerger.
Delete files: CVE-2014-0092.patch( upstreamed), gnutls-3.2.11.tar.xz.sig, gnutls-3.2.11.tar.xz;
Delete files: CVE-2014-0092.patch( upstreamed), gnutls-3.2.11.tar.xz.sig, gnutls-3.2.11.tar.xz;
Add files: gnutls-3.2.12.1.tar.xz, gnutls-3.2.12.1.tar.xz.sig
-------------------------------------------------------------------
@@ -3235,7 +3288,7 @@ previous fix. Reported by Tomas Mraz.
** p11tool: Added option generate-random.
** API and ABI modifications:
gnutls_pkcs11_token_get_random: Added
gnutls_pkcs11_token_get_random: Added
Add: gnutls-3.2.6-noecc.patch, gnutls-3.2.6.tar.xz, gnutls-3.2.6.tar.xz.sig
@@ -3264,7 +3317,7 @@ fix by Christian Grothoff.
** srptool: Fixed index command line option. Patch by Attila Molnar.
** gnutls-cli: Added support for inline commands, using the
--inline-commands-prefix and --inline-commands options. Patch by Raj Raman.
--inline-commands-prefix and --inline-commands options. Patch by Raj Raman.
** certtool: pathlen constraint is now read correctly. Reported by
Christoph Seitz.
@@ -3272,12 +3325,12 @@ Christoph Seitz.
** API and ABI modifications:
gnutls_certificate_get_crt_raw: Added
dane_verify_crt_raw: Added
dane_raw_tlsa: Added
dane_raw_tlsa: Added
Add files: make-obs-happy-with-gnutls_3.2.5.patch, gnutls-3.2.5.tar.xz,
gnutls-3.2.5.tar.xz.sig, gnutls-3.2.5-noecc.patch
Delete files: gnutls-3.2.4.tar.xz, gnutls-3.2.4.tar.xz.sig,
Delete files: gnutls-3.2.4.tar.xz, gnutls-3.2.4.tar.xz.sig,
make-obs-happy-with-gnutls_3.2.4.patch, gnutls-3.2.4-noecc.patch
-------------------------------------------------------------------
@@ -3306,7 +3359,7 @@ by Stefan Buehler.
Reported by Petr Pisar.
** API and ABI modifications:
gnutls_record_set_timeout: Exported
gnutls_record_set_timeout: Exported
Add files:gnutls-3.2.4.tar.xz.sig, gnutls-3.2.4.tar.xz, gnutls-3.2.4-noecc.patch
Delete file: gnutls-3.2.3-noecc.patch
@@ -3314,7 +3367,7 @@ Delete file: gnutls-3.2.3-noecc.patch
-------------------------------------------------------------------
Fri Aug 30 00:31:19 CEST 2013 - ro@suse.de
- buildrequire valgrind on the same arch list that valgrind builds
- buildrequire valgrind on the same arch list that valgrind builds
-------------------------------------------------------------------
Thu Aug 1 13:42:11 UTC 2013 - meissner@suse.com
@@ -3405,7 +3458,7 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
linking to pthreads if p11-kit isn't used).
- Updated to GnuTLS 3.1.10 (released 2013-03-22)
** certtool: When generating PKCS #12 files use by default the
** certtool: When generating PKCS #12 files use by default the
ARCFOUR (RC4) cipher to be compatible with devices that don't
support AES with PKCS #12.
** libgnutls: Load CA certificates in android 4.x systems.
@@ -3416,16 +3469,16 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
cards are present.
** libgnutls: Corrected issue in the (deprecated) external key
signing interface, when used with TLS 1.2. Reported by Bjorn H. Christensen.
** libgnutls: Fixes in openpgp handshake with fingerprints. Reported by
** libgnutls: Fixes in openpgp handshake with fingerprints. Reported by
Joke de Buhr.
** libgnutls-dane: Updated DANE verification options.
** configure: Trust store file must be explicitly set or unset when
** configure: Trust store file must be explicitly set or unset when
cross compiling.
- Updated to GnuTLS 3.1.9 (released 2013-02-27)
- Updated to GnuTLS 3.1.9 (released 2013-02-27)
** certtool: Option --to-p12 will now ask for a password to generate
a PKCS #12 file from an encrypted key file. Reported by Yan Fiz.
** libgnutls: Corrected issue in gnutls_pubkey_verify_data().
** libgnutls: Corrected parsing issue in XMPP within a subject
** libgnutls: Corrected parsing issue in XMPP within a subject
alternative name. Reported by James Cloos.
** libgnutls: gnutls_pkcs11_reinit() will reinitialize all PKCS #11
modules, and not only the ones loaded via p11-kit.
@@ -3440,7 +3493,7 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
** libgnutls: The minimum DH bits accepted by priorities NORMAL and
PERFORMANCE was set to previous defaults 727 bits. Reported by Diego
Elio Petteno.
** libgnutls: Corrected issue which prevented gnutls_pubkey_verify_hash()
** libgnutls: Corrected issue which prevented gnutls_pubkey_verify_hash()
to operate with long keys. Reported by Erik A Jensen.
- Updated to GnuTLS 3.1.7 (released 2013-02-04)
@@ -3449,10 +3502,10 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
** danetool: Added options: --dlv and --insecure. Suggested by Paul Wouters.
** libgnutls-xssl: Added a new library to simplify GnuTLS usage.
** libgnutls-dane: Added function to specify a DLV file.
** libgnutls: Heartbeat code was made optional.
** libgnutls: Heartbeat code was made optional.
** libgnutls: Fixes in server side of DTLS-0.9.
** libgnutls: DN variable 'T' was expanded to 'title'.
** libgnutls: Fixes in record padding parsing to prevent a timing attack.
** libgnutls: Fixes in record padding parsing to prevent a timing attack.
Issue reported by Kenny Paterson and Nadhem Alfardan.
** libgnutls: Added functions to directly set the DN in a certificate
or request from an RFC4514 string.
@@ -3463,15 +3516,15 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
by the specified priority string. The current values correspond to the
previous defaults (727 bits), except for the SECURE128 and SECURE192
strings which increase the minimum to 1248 and 1776 respectively.
** libgnutls: Added the gnutls_record_cork() and uncork API to enable
** libgnutls: Added the gnutls_record_cork() and uncork API to enable
buffering in sending application data.
** libgnutls: Removed default random padding, and added a length-hiding interface
instead. Both the server and the client must support this extension. Whether
** libgnutls: Removed default random padding, and added a length-hiding interface
instead. Both the server and the client must support this extension. Whether
length-hiding can be used on a given session can be checked using
gnutls_record_can_use_length_hiding(). Contributed by Alfredo Pironti.
** libgnutls: Added the experimental %NEW_PADDING priority string. It enables
** libgnutls: Added the experimental %NEW_PADDING priority string. It enables
a new padding mechanism in TLS allowing arbitrary padding in TLS records
in all ciphersuites, which makes length-hiding more efficient and solves
in all ciphersuites, which makes length-hiding more efficient and solves
the issues with timing attacks on CBC ciphersuites.
** libgnutls: Corrected gnutls_cipher_decrypt2() when used with AEAD
ciphers (i.e., AES-GCM). Reported by William McGovern.
@@ -3500,12 +3553,12 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
iconv).
** libgnutls: Added PKCS #11 key generation function that returns the
public key on generation.
** libgnutls: Corrected bug in priority string parsing, that mostly
** libgnutls: Corrected bug in priority string parsing, that mostly
affected combined levels. Patch by Tim Kosse.
** certtool: The --pubkey-info option can be combined with the
--load-privkey or --load-request to print the corresponding public keys.
** certtool: It is able to set certificate policies via a template.
** certtool: Added --hex-numbers option which prints big numbers in
** certtool: Added --hex-numbers option which prints big numbers in
an easier to parse format.
** p11tool: After key generation, outputs the public key (useful in
tokens that do not store the public key).
@@ -3523,7 +3576,7 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
** libgnutls: Added support for extension to establish keys for SRTP.
Contributed by Martin Storsjo.
** libgnutls: The X.509 verification functions check the key
usage bits and pathlen constraints and on failure output
usage bits and pathlen constraints and on failure output
GNUTLS_CERT_SIGNER_CONSTRAINTS_FAILURE.
** libgnutls: gnutls_x509_crl_verify() includes the time checks.
** libgnutls: Added verification flag GNUTLS_VERIFY_DO_NOT_ALLOW_UNSORTED_CHAIN
@@ -3555,7 +3608,7 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
** libgnutls: Several updates in the OpenPGP code. The generating code
is fully RFC6091 compliant and RFC5081 support is only supported in client
mode.
** libgnutls-dane: Added. It is a library to provide DANE with DNSSEC
** libgnutls-dane: Added. It is a library to provide DANE with DNSSEC
certificate verification.
** gnutls-cli: Added --dane option to enable DANE certificate verification.
** danetool: Added tool to generate DANE TLSA Resource Records (RR).
@@ -3567,10 +3620,10 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
** libgnutls: Corrected bug in OpenPGP subpacket encoding.
** libgnutls: Added support for DTLS/TLS heartbeats by Olga Smolenchuk.
(the work was done during Google Summer of Code).
** libgnutls: Added X.509 certificate verification flag
** libgnutls: Added X.509 certificate verification flag
GNUTLS_VERIFY_ALLOW_UNSORTED_CHAIN. This flag allows the verification
of unsorted certificate chains and is enabled by default for
TLS certificate verification (if gnutls_certificate_set_verify_flags()
TLS certificate verification (if gnutls_certificate_set_verify_flags()
does not override it).
** libgnutls: Prints warning on certificates that contain keys of
an insecure level. If the %COMPAT priority flag is not specified
@@ -3592,7 +3645,7 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
** gnutls-serv: Listens on IPv6. Patch by Bernhard R. Link.
** certtool: Changes in password handling of certtool.
Ask password when required and only if the '--password' option is not
given. If the '--password' option is given during key generation then
given. If the '--password' option is given during key generation then
assume the PKCS #8 file format, instead of ignoring the password.
** tpmtool: No longer asks for key password in registered keys.
** libgnutls: Elliptic curve code was optimized by Ilya Tumaykin.
@@ -3609,7 +3662,7 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
me with ECDSA capable smart cards.
- Updated to GnuTLS 3.1.0 (released 2012-08-15)
** libgnutls: Added direct support for TPM as a cryptographic module
** libgnutls: Added direct support for TPM as a cryptographic module
in gnutls/tpm.h. TPM keys can be used in functions accepting files
using URLs of the following types:
tpmkey:file=/path/to/file
@@ -3629,8 +3682,8 @@ Thu Jun 27 13:44:12 UTC 2013 - meissner@suse.com
the whole certificate chain (if any) to the credentials structure, instead
of only the end-user certificate.
** libgnutls: Key import functions such as gnutls_pkcs12_simple_parse()
and gnutls_x509_privkey_import_pkcs8(), return consistently
GNUTLS_E_DECRYPTION_FAILED if the input structure is encrypted but no
and gnutls_x509_privkey_import_pkcs8(), return consistently
GNUTLS_E_DECRYPTION_FAILED if the input structure is encrypted but no
password was provided.
** libgnutls: Added gnutls_handshake_set_timeout() a function that
allows to set the maximum time spent in a handshake.
@@ -3662,7 +3715,7 @@ Tue Feb 5 17:03:26 UTC 2013 - meissner@suse.com
ciphers (i.e., AES-GCM).
- libgnutls: Fixes in record padding parsing to prevent a timing
attack. Issue reported by Kenny Patterson and Nadhem Alfardan.
bnc#802184
bnc#802184
- libgnutls: DN variable 'T' was expanded to 'title'.
-------------------------------------------------------------------
@@ -3677,7 +3730,7 @@ Thu Jan 24 10:14:13 UTC 2013 - meissner@suse.com
-------------------------------------------------------------------
Tue Nov 27 20:31:26 UTC 2012 - crrodriguez@opensuse.org
- Test suite breaks on qemu-arm some calls not implemented.
- Test suite breaks on qemu-arm some calls not implemented.
-------------------------------------------------------------------
Sun Nov 25 10:52:46 UTC 2012 - andreas.stieger@gmx.de
@@ -3685,7 +3738,7 @@ Sun Nov 25 10:52:46 UTC 2012 - andreas.stieger@gmx.de
- include LGPL-3.0+ text in COPYING.LESSER
- run regression tests, but move "make check" to %check section
- add gnutls-3.0.26-skip-test-fwrite.patch to skip a failing test
- no longer manipulate doc/examples tree in %install section, the
- no longer manipulate doc/examples tree in %install section, the
deletion of Makefiles breaks "make check" in %check
- install documentation, reference and examples in %install section
to fetch them for the package without unneccessary files
@@ -3694,7 +3747,7 @@ Sun Nov 25 10:52:46 UTC 2012 - andreas.stieger@gmx.de
Fri Nov 16 23:30:09 UTC 2012 - andreas.stieger@gmx.de
- updated to GnuTLS 3.0.26:
- libgnutls: Always tolerate key usage violation errors from the
- libgnutls: Always tolerate key usage violation errors from the
side of the peer, but also notify via an audit message.
- libgnutls: gnutls_x509_crl_verify() includes time checks.
- libgnutls: Increased maximum password length in the PKCS #12
@@ -3704,12 +3757,12 @@ Fri Nov 16 23:30:09 UTC 2012 - andreas.stieger@gmx.de
GNUTLS_CERT_REVOCATION_DATA_ISSUED_IN_FUTURE: Added
- includes changes from 3.0.25:
- libgnutls: Fixed the receipt of session tickets during session
- libgnutls: Fixed the receipt of session tickets during session
resumption.
- libgnutls: Added gnutls_ocsp_resp_check_crt() to check whether the
- libgnutls: Added gnutls_ocsp_resp_check_crt() to check whether the
OCSP response corresponds to the given certificate.
- libgnutls: Several updates in the OpenPGP code. The generating code
is fully RFC6091 compliant and RFC5081 support is only supported in
is fully RFC6091 compliant and RFC5081 support is only supported in
client mode.
- API and ABI modifications:
gnutls_ocsp_resp_check_crt: Added
@@ -3718,10 +3771,10 @@ Fri Nov 16 23:30:09 UTC 2012 - andreas.stieger@gmx.de
- libgnutls: The %COMPAT keyword, if specified, will tolerate
key usage violation errors (they are far too common to ignore).
- libgnutls: Corrected bug in OpenPGP subpacket encoding.
- libgnutls: Added X.509 certificate verification flag
- libgnutls: Added X.509 certificate verification flag
- GNUTLS_VERIFY_ALLOW_UNSORTED_CHAIN. This flag allows the verification
of unsorted certificate chains and is enabled by default for
TLS certificate verification (if gnutls_certificate_set_verify_flags()
TLS certificate verification (if gnutls_certificate_set_verify_flags()
does not override it).
- libgnutls: Correctly restore gnutls_record_recv() in DTLS mode
if interrupted during the retrasmition of handshake data.
@@ -3747,7 +3800,7 @@ Fri Nov 16 23:30:09 UTC 2012 - andreas.stieger@gmx.de
- certtool: Allow the user to choose the hash algorithm
when signing certificate request or certificate revocation list.
- Refresh gnutls-implement-trust-store-dir.diff, some parts are in
- Refresh gnutls-implement-trust-store-dir.diff, some parts are in
upstream sources
-------------------------------------------------------------------
@@ -3790,7 +3843,7 @@ Sun Jul 1 20:00:33 UTC 2012 - coolo@suse.com
Sat Jun 30 17:24:48 UTC 2012 - i@marguerite.su
- fix 12.2 builds.
* replace depreciated am_prog_mkdir_p with ac_prog_mkdir_p.
* replace depreciated am_prog_mkdir_p with ac_prog_mkdir_p.
-------------------------------------------------------------------
Thu Jun 21 08:02:43 UTC 2012 - meissner@suse.com
@@ -3813,7 +3866,7 @@ Thu Jun 21 08:02:43 UTC 2012 - meissner@suse.com
certtool: Increase to 128 the maximum number of distinct options
(e.g. dns_names) allowed.
gnutls-cli: If --print-cert is given, print the certificate,
gnutls-cli: If --print-cert is given, print the certificate,
even on verification failure.
** API and ABI modifications:
@@ -4061,7 +4114,7 @@ Sun May 13 02:44:30 UTC 2012 - Nico.Laus.2001@gmx.de
- gnutls_ocsp_resp_import: Added.
- gnutls_ocsp_resp_init: Added.
- gnutls_ocsp_resp_print: Added.
- gnutls_ocsp_resp_verify: Added.
- gnutls_ocsp_resp_verify: Added.
- Changes from version 3.0.11:
+ libgnutls:
- Corrected functionality of
@@ -4215,7 +4268,7 @@ in Linux as well as in BSD.
-------------------------------------------------------------------
Thu Apr 12 05:17:04 UTC 2012 - gjhe@suse.com
- fix bug[bnc#753301] - VUL-0: gnutls/libtasn1
- fix bug[bnc#753301] - VUL-0: gnutls/libtasn1
"asn1_get_length_der()" DER decoding issue
CVE-2012-1569
and bug[bnc#754223] - GenericBlockCipher heap corruption DoS
@@ -4224,7 +4277,7 @@ Thu Apr 12 05:17:04 UTC 2012 - gjhe@suse.com
-------------------------------------------------------------------
Mon Feb 13 06:09:57 UTC 2012 - gjhe@suse.com
- fix Bug[bnc#739898] - VUL-1: CVE-2012-0390: GnuTLS DTLS plaintext
- fix Bug[bnc#739898] - VUL-1: CVE-2012-0390: GnuTLS DTLS plaintext
recovery attack.
-------------------------------------------------------------------
@@ -4351,7 +4404,7 @@ Wed Aug 17 22:29:31 UTC 2011 - crrodriguez@opensuse.org
* Main reason for update is to support Intel AES-NI CPU extensions.
* Bump sonames in the library package accordingly
* C++ apps must now buildrequire libgnutls++-devel
* Software using the openssl emulation must buildrequire
* Software using the openssl emulation must buildrequire
libgnutls-openssl-devel or better use openssl directly.
* Upstream no longer uses libgcrypt but libnettle.
* Upstream now requires the use of p11-kit
@@ -4373,24 +4426,24 @@ Thu Jun 23 07:09:28 UTC 2011 - gjhe@novell.com
instead of Libs.private. From Andreas Metzler.
** gnutls-serv: Corrected a buffer overflow. Reported and patch by Tomas Mraz.
** libgnutls: Use ASN1_NULL when writing parameters for RSA signatures.
This makes us comply with RFC3279. Reported by Michael Rommel.
** libgnutls: Reverted default behavior for verification and
introduced GNUTLS_VERIFY_DO_NOT_ALLOW_X509_V1_CA_CRT. Thus by default
V1 trusted CAs are allowed, unless the new flag is specified.
** minitasn1: Updated to Libtasn1 2.9.
** bgnutls: Correctly add leading zero to PKCS #8 encoded DSA key.
Reported by Jeffrey Walton.
** libgnutls: Corrected memory leak in extension data calculation.
Reported by Mike Blumenkrantz.
** libgnutls: Remove trailing comma in enums in gnutls.h and x509.h.
** API and ABI modifications:
No changes since last version.
@@ -4410,7 +4463,7 @@ Thu Apr 15 16:47:31 CEST 2010 - meissner@suse.de
- updated to stable 2.8.6
** libgnutls: For CSRs, don't null pad integers for RSA/DSA value.
VeriSign rejected CSRs with this padding.
VeriSign rejected CSRs with this padding.
Note: As a side effect of this change, the "public key identifier"
value computed for a certificate using this version of GnuTLS will be
@@ -4420,7 +4473,7 @@ Thu Apr 15 16:47:31 CEST 2010 - meissner@suse.de
optional SignatureAlgorithm parameter field.
VeriSign rejected these CSRs. They are stricly speaking not needed
since you need the signer's certificate to verify the certificate
signature anyway.
signature anyway.
** libgnutls: When checking openpgp self signature also check the signatures
of all subkeys.
@@ -4442,7 +4495,7 @@ Thu Apr 15 16:47:31 CEST 2010 - meissner@suse.de
-------------------------------------------------------------------
Tue Apr 6 19:15:22 UTC 2010 - crrodriguez@opensuse.org
- use system libtasn1 instead of the bundled copy
- use system libtasn1 instead of the bundled copy
-------------------------------------------------------------------
Thu Feb 4 16:46:45 CET 2010 - meissner@suse.de
@@ -4464,7 +4517,7 @@ Fri Dec 25 22:11:03 CET 2009 - jengelh@medozas.de
Wed Sep 2 05:52:45 CEST 2009 - gjhe@novell.com
- update to lastest stable version 2.8.3
[bnc#532750]
[bnc#532750]
-------------------------------------------------------------------
Fri Mar 13 13:37:15 CET 2009 - jshi@suse.de
@@ -4511,7 +4564,7 @@ Thu Jul 17 15:27:42 CEST 2008 - mkoenig@suse.de
-------------------------------------------------------------------
Wed Jul 2 15:49:50 CEST 2008 - mkoenig@suse.de
- remove gnutls main package from baselibs.conf
- remove gnutls main package from baselibs.conf
-------------------------------------------------------------------
Thu Jun 26 15:08:38 CEST 2008 - mkoenig@suse.de
@@ -4519,7 +4572,7 @@ Thu Jun 26 15:08:38 CEST 2008 - mkoenig@suse.de
- update to version 2.4.0
* The OpenPGP sub-system has been improved and now supports subkeys
* The PSK sub-system has been improved and now supports password
derivation and PSK identity hints
derivation and PSK identity hints
* The certtool --inder and --outder has been replaced
by --inraw and --outraw
* New APIs to access the raw X.509 Subject and Issuer DN's and
@@ -4529,7 +4582,7 @@ Thu Jun 26 15:08:38 CEST 2008 - mkoenig@suse.de
* The function gnutls_openpgp_privkey_get_id has been renamed to
gnutls_openpgp_privkey_get_key_id
* API/ABI changes in GnuTLS 2.4
All OpenPGP related functions have been moved from
All OpenPGP related functions have been moved from
libgnutls-extra to libgnutls, and several new functions have
been added
- remove SRP functionality from C++ wrapper, otherwise it cannot
@@ -4542,7 +4595,7 @@ Thu Jun 26 15:08:38 CEST 2008 - mkoenig@suse.de
-------------------------------------------------------------------
Mon Jun 23 10:53:20 CEST 2008 - mkoenig@suse.de
- disable SRP [bnc#65192]
- disable SRP [bnc#65192]
-------------------------------------------------------------------
Wed May 21 16:32:26 CEST 2008 - mkoenig@suse.de
@@ -4558,12 +4611,12 @@ Wed May 21 16:32:26 CEST 2008 - mkoenig@suse.de
-------------------------------------------------------------------
Thu May 8 14:17:41 CEST 2008 - mkoenig@suse.de
- fix build
- fix build
-------------------------------------------------------------------
Tue Apr 29 17:43:46 CEST 2008 - cthiel@suse.de
- obsolete gnutls-<arch> via baselibs.conf
- obsolete gnutls-<arch> via baselibs.conf
-------------------------------------------------------------------
Thu Apr 10 12:54:45 CEST 2008 - ro@suse.de
@@ -4576,9 +4629,9 @@ Thu Apr 3 17:40:32 CEST 2008 - mkoenig@suse.de
- update to version 2.2.2
* Cipher priority string handling now handle strings that
starts with NULL
starts with NULL
* Corrected memory leaks in session resuming and DHE ciphersuites
* Increased the default certificate verification chain limits and
* Increased the default certificate verification chain limits and
allowed for checks without limitation
* Corrected the behaviour of gnutls_x509_crt_get_subject_alt_name()
and gnutls_x509_crt_get_subject_alt_name() to not null terminate
@@ -4639,7 +4692,7 @@ Thu Jan 31 11:12:46 CET 2008 - mkoenig@suse.de
- API and ABI modifications, library soname switch from 13 to 26
- change package structure:
* branch off libgnutls-extra
since this is now GPLv3 or later while libgnutls remains
since this is now GPLv3 or later while libgnutls remains
LGPLv2.1 or later
* gnutls license change to GPLv3
- build without lzo support to avoid license problems
@@ -4661,7 +4714,7 @@ Tue Oct 23 13:59:25 CEST 2007 - mkoenig@suse.de
-------------------------------------------------------------------
Thu Aug 30 12:35:34 CEST 2007 - mkoenig@suse.de
- fix srptool [#208227]
- fix srptool [#208227]
- fix some compiler warnings
-------------------------------------------------------------------
@@ -4672,7 +4725,7 @@ Fri Aug 3 13:54:37 CEST 2007 - hvogel@suse.de
-------------------------------------------------------------------
Thu May 10 17:21:59 CEST 2007 - mkoenig@suse.de
- Fix segfault on s390x [#97441]
- Fix segfault on s390x [#97441]
gnutls-fix_size_t.patch
-------------------------------------------------------------------
@@ -4680,7 +4733,7 @@ Tue Jan 23 17:29:00 CET 2007 - mkoenig@suse.de
- update to new stable branch 1.6.1:
* Fix the list of trusted CAs that server's send to clients.
* Fix gnutls_certificate_set_x509_crl to initialize the CRL
* Fix gnutls_certificate_set_x509_crl to initialize the CRL
before using it.
* Encode UID fields in DN's as DirectoryString.
* Fix ./configure failure with non-GCC compilers.
@@ -4691,7 +4744,7 @@ Tue Jan 23 17:29:00 CET 2007 - mkoenig@suse.de
Tue Oct 24 19:08:36 CEST 2006 - mkoenig@suse.de
- move developer related docs to devel package and remove
binary stuff from docs [#212454]
binary stuff from docs [#212454]
-------------------------------------------------------------------
Tue Sep 19 11:06:39 CEST 2006 - mkoenig@suse.de
@@ -4705,7 +4758,7 @@ Thu Aug 31 17:40:43 CEST 2006 - mkoenig@suse.de
- update to new stable branch 1.4.1:
* The command line tools now use getaddrinfo and support IPv6.
* gnutls-cli can now recognize services and port numbers with
* gnutls-cli can now recognize services and port numbers with
the -p option.
* Error messages are now translated using GNU Gettext.
* GnuTLS now support TLS Inner application (TLS/IA).
@@ -4713,21 +4766,21 @@ Thu Aug 31 17:40:43 CEST 2006 - mkoenig@suse.de
+ Support for DHE-PSK cipher suites has been added.
+ Removed the RIPEMD ciphersuites.
+ Remove GnuTLS 0.8.x compatibility functions.
+ Support for TLS Pre-Shared Key (TLS-PSK) ciphersuites have
+ Support for TLS Pre-Shared Key (TLS-PSK) ciphersuites have
been added.
+ Certtool now generate keys in unencrypted PKCS#8 format for
+ Certtool now generate keys in unencrypted PKCS#8 format for
empty passwords.
+ Certtool now accept --password for --key-info and encrypted
+ Certtool now accept --password for --key-info and encrypted
PKCS#8 keys.
+ gnutls_x509_privkey_import_pkcs8 now accept unencrypted
+ gnutls_x509_privkey_import_pkcs8 now accept unencrypted
PEM PKCS#8 keys,
+ New function to set a X.509 private key and certificate
+ New function to set a X.509 private key and certificate
pairs, and/or CRLs, from an PKCS#12 file.
+ New APIs to acceess the client and server random fields in
+ New APIs to acceess the client and server random fields in
a session.
+ New APIs to access the TLS Pseudo-Random-Function (PRF).
+ New API to access the TLS master secret.
+ The function gnutls_x509_crt_to_xml now return an internal
+ The function gnutls_x509_crt_to_xml now return an internal
error.
* Several bugfixes:
+ Corrected a bug in certtool for 64 bit machines.
@@ -4742,14 +4795,14 @@ Thu Aug 31 17:40:43 CEST 2006 - mkoenig@suse.de
-------------------------------------------------------------------
Sat Feb 18 00:18:33 CET 2006 - ro@suse.de
- cleanup doc directory (.deps,.libs)
- cleanup doc directory (.deps,.libs)
-------------------------------------------------------------------
Fri Feb 10 13:01:55 CET 2006 - hvogel@suse.de
- Update to version 1.2.10. This release fixes several serious
bugs that would make the DER decoder in libtasn1 crash on
invalid input [#149897]. Including:
invalid input [#149897]. Including:
* Corrected a bug in certtool for 64 bit machines.
@@ -4771,7 +4824,7 @@ Wed Jan 25 21:36:17 CET 2006 - mls@suse.de
-------------------------------------------------------------------
Tue Dec 20 15:04:31 CET 2005 - ro@suse.de
- do not package /usr/share/info/dir
- do not package /usr/share/info/dir
-------------------------------------------------------------------
Fri Dec 9 14:26:44 CET 2005 - hvogel@suse.de
@@ -4811,7 +4864,7 @@ Tue Jun 7 12:50:53 CEST 2005 - hvogel@suse.de
-------------------------------------------------------------------
Fri Jun 3 01:13:12 CEST 2005 - ro@suse.de
- fix specfile (don't apply non-existant patch1)
- fix specfile (don't apply non-existant patch1)
-------------------------------------------------------------------
Thu Jun 2 18:03:17 CEST 2005 - hvogel@suse.de
@@ -4846,7 +4899,7 @@ Mon Dec 13 20:07:38 CET 2004 - hvogel@suse.de
-------------------------------------------------------------------
Sat Oct 23 19:41:07 CEST 2004 - hvogel@suse.de
- move config script to the devel package
- move config script to the devel package
-------------------------------------------------------------------
Thu Oct 14 17:08:56 CEST 2004 - hvogel@suse.de
@@ -4881,7 +4934,7 @@ Thu Jul 15 18:54:57 CEST 2004 - hvogel@suse.de
-------------------------------------------------------------------
Wed May 19 14:58:13 CEST 2004 - hvogel@suse.de
- update to version 1.0.13
- update to version 1.0.13
-------------------------------------------------------------------
Fri May 14 08:48:26 CEST 2004 - mmj@suse.de
@@ -4892,16 +4945,16 @@ Fri May 14 08:48:26 CEST 2004 - mmj@suse.de
-------------------------------------------------------------------
Mon Mar 1 18:44:58 CET 2004 - hvogel@suse.de
- update to version 1.0.8
- update to version 1.0.8
-------------------------------------------------------------------
Tue Feb 17 15:57:15 CET 2004 - hvogel@suse.de
- update to version 1.0.6
- update to version 1.0.6
- fix autoconf quotations
-------------------------------------------------------------------
Wed May 14 18:31:12 CEST 2003 - schubi@suse.de
- initial; Sourcecode received from XIMIAN
- initial; Sourcecode received from XIMIAN

View File

@@ -47,7 +47,7 @@
%endif
%bcond_with tpm
Name: gnutls
Version: 3.8.9
Version: 3.8.10
Release: 0
Summary: The GNU Transport Layer Security Library
License: GPL-3.0-or-later AND LGPL-2.1-or-later
@@ -70,6 +70,12 @@ Patch3: gnutls-srp-test-SIGPIPE.patch
Patch100: gnutls-FIPS-140-3-references.patch
#PATCH-FIX-SUSE bsc#1211476 FIPS: Skip fixed HMAC verification for nettle, hogweed and gmp
Patch101: gnutls-FIPS-HMAC-nettle-hogweed-gmp.patch
%if 0%{?suse_version} >= 1550 || 0%{?sle_version} >= 150400
#PATCH-FIX-SUSE bsc#1202146 FIPS: Port gnutls to use jitterentropy
Patch102: gnutls-FIPS-jitterentropy.patch
#PATCH-FIX-SUSE bsc#1221242 Fix memleak in gnutls' jitterentropy collector
Patch103: gnutls-FIPS-jitterentropy-deinit-threads.patch
%endif
Patch104: gnutls-set-cligen-python-interp.patch
Patch105: gnutls-skip-pqx-test.patch
Patch106: gnutls-fips-sonames-check.patch
@@ -77,6 +83,8 @@ Patch106: gnutls-fips-sonames-check.patch
Patch107: gnutls-FIPS-disable-mac-sha1.patch
# PATCH-FIX-SUSE bsc#1237101 GNUTLS FIPS selfcheck is failing again on tumbleweed
Patch108: gnutls-FIPS-HMAC-x86_64-v3-opt.patch
# PATCH-FIX-SUSE Disable test
Patch109: gnutls-3.8.10-disable-ktls_test.patch
BuildRequires: autogen
BuildRequires: automake
BuildRequires: datefudge
@@ -99,12 +107,6 @@ BuildRequires: pkgconfig(libbrotlidec)
BuildRequires: pkgconfig(libbrotlienc)
BuildRequires: pkgconfig(libzstd)
BuildRequires: pkgconfig(zlib)
%if 0%{?suse_version} >= 1550 || 0%{?sle_version} >= 150400
#PATCH-FIX-SUSE bsc#1202146 FIPS: Port gnutls to use jitterentropy
Patch102: gnutls-FIPS-jitterentropy.patch
#PATCH-FIX-SUSE bsc#1221242 Fix memleak in gnutls' jitterentropy collector
Patch103: gnutls-FIPS-jitterentropy-deinit-threads.patch
%endif
%if %{with kcapi}
BuildRequires: pkgconfig(libkcapi)
%endif