2015-03-30 19:33:01 +02:00
|
|
|
#
|
|
|
|
# spec file for package mbedtls
|
|
|
|
#
|
Accepting request 1033587 from home:mia:branches:security:tls
- Update to 2.28.1: (CVE-2022-35409)
Default behavior changes
* mbedtls_cipher_set_iv will now fail with ChaCha20 and
ChaCha20+Poly1305 for IV lengths other than 12. The library was
silently overwriting this length with 12, but did not inform
the caller about it.
gh#Mbed-TLS/mbedtls#4301
Features
* When MBEDTLS_PSA_CRYPTO_CONFIG is enabled, you may list the PSA
crypto feature requirements in the file named by the new macro
MBEDTLS_PSA_CRYPTO_CONFIG_FILE instead of the default
psa/crypto_config.h. Furthermore you may name an additional
file to include after the main file with the macro
MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE.
Security
* Zeroize dynamically-allocated buffers used by the PSA Crypto
key storage module before freeing them. These buffers contain
secret key material, and could thus potentially leak the key
through freed heap.
* Fix a potential heap buffer overread in TLS 1.2 server-side
when MBEDTLS_USE_PSA_CRYPTO is enabled, an opaque key (created
with mbedtls_pk_setup_opaque()) is provisioned, and a static
ECDH ciphersuite is selected. This may result in an application
crash or potentially an information leak.
* Fix a buffer overread in DTLS ClientHello parsing in servers
with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled.
An unauthenticated client or a man-in-the-middle could cause a
DTLS server to read up to 255 bytes after the end of the SSL
input buffer. The buffer overread only happens when
MBEDTLS_SSL_IN_CONTENT_LEN is less than a threshold that
depends on the exact configuration: 258 bytes if using
mbedtls_ssl_cookie_check(), and possibly up to 571 bytes with
a custom cookie check function.
Reported by the Cybeats PSI Team.
Bugfix
* Fix a memory leak if mbedtls_ssl_config_defaults() is called
twice.
* Fix several bugs (warnings, compiler and linker errors, test
failures) in reduced configurations when MBEDTLS_USE_PSA_CRYPTO
is enabled.
* Fix a bug in (D)TLS curve negotiation: when
MBEDTLS_USE_PSA_CRYPTO was enabled and an ECDHE-ECDSA or
ECDHE-RSA key exchange was used, the client would fail to check
that the curve selected by the server for ECDHE was indeed one
that was offered. As a result, the client would accept any
curve that it supported, even if that curve was not allowed
according to its configuration.
gh#Mbed-TLS/mbedtls#5291
* Fix unit tests that used 0 as the file UID. This failed on some
implementations of PSA ITS.
gh#Mbed-TLS/mbedtls#3838
* Fix API violation in mbedtls_md_process() test by adding a call
to mbedtls_md_starts().
gh#Mbed-TLS/mbedtls#2227
* Fix compile errors when MBEDTLS_HAVE_TIME is not defined.
Add tests to catch bad uses of time.h.
* Fix bug in the alert sending function
mbedtls_ssl_send_alert_message() potentially leading to
corrupted alert messages being sent in case the function needs
to be re-called after initially returning
MBEDTLS_SSL_WANT_WRITE.
gh#Mbed-TLS/mbedtls#1916
* In configurations with MBEDTLS_SSL_DTLS_CONNECTION_ID enabled
but none of MBEDTLS_SSL_HW_RECORD_ACCEL,
MBEDTLS_SSL_EXPORT_KEYS or MBEDTLS_DEBUG_C, DTLS handshakes
using CID would crash due to a null pointer dereference.
Fix this.
gh#Mbed-TLS/mbedtls#3998
* Fix incorrect documentation of mbedtls_x509_crt_profile. The
previous documentation stated that the allowed_pks field
applies to signatures only, but in fact it does apply to the
public key type of the end entity certificate, too.
gh#Mbed-TLS/mbedtls#1992
* Fix PSA cipher multipart operations using ARC4. Previously, an
IV was required but discarded. Now, an IV is rejected, as it
should be.
* Fix undefined behavior in mbedtls_asn1_find_named_data(), where
val is not NULL and val_len is zero. psa_raw_key_agreement()
now returns PSA_ERROR_BUFFER_TOO_SMALL when applicable.
gh#Mbed-TLS/mbedtls#5735
* Fix a bug in the x25519 example program where the removal of
MBEDTLS_ECDH_LEGACY_CONTEXT caused the program not to run.
gh#Mbed-TLS/mbedtls#4901
gh#Mbed-TLS/mbedtls#3191
* Encode X.509 dates before 1/1/2000 as UTCTime rather than
GeneralizedTime.
gh#Mbed-TLS/mbedtls#5465
* Fix order value of curve x448.
* Fix string representation of DNs when outputting values
containing commas and other special characters, conforming to
RFC 1779.
gh#Mbed-TLS/mbedtls#769
* Silence a warning from GCC 12 in the selftest program.
gh#Mbed-TLS/mbedtls#5974
* Fix mbedtls_asn1_write_mpi() writing an incorrect encoding of
0.
* Fix resource leaks in mbedtls_pk_parse_public_key() in low
memory conditions.
* Fix server connection identifier setting for outgoing encrypted
records on DTLS 1.2 session resumption. After DTLS 1.2 session
resumption with connection identifier, the Mbed TLS client now
properly sends the server connection identifier in encrypted
record headers.
gh#Mbed-TLS/mbedtls#5872
* Fix a null pointer dereference when performing some operations
on zero represented with 0 limbs (specifically
mbedtls_mpi_mod_int() dividing by 2, and
mbedtls_mpi_write_string() in base 2).
* Fix record sizes larger than 16384 being sometimes accepted
despite being non-compliant. This could not lead to a buffer
overflow. In particular, application data size was already
checked correctly.
OBS-URL: https://build.opensuse.org/request/show/1033587
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=36
2022-11-04 21:48:59 +01:00
|
|
|
# Copyright (c) 2022 SUSE LLC
|
2015-03-30 19:33:01 +02:00
|
|
|
#
|
|
|
|
# All modifications and additions to the file contributed by third parties
|
|
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
|
|
# upon. The license for this file, and modifications and additions to the
|
|
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
|
|
# license for the pristine package is not an Open Source License, in which
|
|
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
|
|
# published by the Open Source Initiative.
|
|
|
|
|
Accepting request 657220 from home:pmonrealgonzalez:branches:security:tls
- Library package version bumped to libmbedtls12
- Update to version 2.14.1: [bsc#1118727, CVE-2018-19608]
Security
* Fix timing variations and memory access variations in RSA PKCS#1 v1.5
decryption that could lead to a Bleichenbacher-style padding oracle
attack. In TLS, this affects servers that accept ciphersuites based on
RSA decryption (i.e. ciphersuites whose name contains RSA but not
(EC)DH(E)). Discovered by Eyal Ronen (Weizmann Institute), Robert Gillham
(University of Adelaide), Daniel Genkin (University of Michigan),
Adi Shamir (Weizmann Institute), David Wong (NCC Group), and Yuval Yarom
(University of Adelaide, Data61). The attack is described in more detail
in the paper available here: http://cat.eyalro.net/cat.pdf CVE-2018-19608
* In mbedtls_mpi_write_binary(), don't leak the exact size of the number
via branching and memory access patterns. An attacker who could submit
a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
of the decryption and not its result could nonetheless decrypt RSA
plaintexts and forge RSA signatures. Other asymmetric algorithms may
have been similarly vulnerable. Reported by Eyal Ronen, Robert Gillham,
Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom.
* Wipe sensitive buffers on the stack in the CTR_DRBG and HMAC_DRBG
modules.
API Changes
* The new functions mbedtls_ctr_drbg_update_ret() and
mbedtls_hmac_drbg_update_ret() are similar to mbedtls_ctr_drbg_update()
and mbedtls_hmac_drbg_update() respectively, but the new functions
report errors whereas the old functions return void. We recommend that
applications use the new functions.
- Version 2.14.0:
Security
OBS-URL: https://build.opensuse.org/request/show/657220
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=4
2018-12-11 16:42:05 +01:00
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
2015-03-30 19:33:01 +02:00
|
|
|
#
|
|
|
|
|
2021-03-23 12:39:07 +01:00
|
|
|
|
2022-01-14 14:58:34 +01:00
|
|
|
%define lib_tls libmbedtls14
|
2021-08-03 13:25:35 +02:00
|
|
|
%define lib_crypto libmbedcrypto7
|
2020-08-17 12:36:14 +02:00
|
|
|
%define lib_x509 libmbedx509-1
|
2015-03-30 19:33:01 +02:00
|
|
|
Name: mbedtls
|
Accepting request 1044072 from home:abergmann:branches:security:tls
- Update to 2.28.2: (bsc#1206576, CVE-2022-46393)
Security:
* Fix potential heap buffer overread and overwrite in DTLS if
MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
old: security:tls/mbedtls
new: home:abergmann:branches:security:tls/mbedtls rev None
Index: mbedtls.changes
===================================================================
--- mbedtls.changes (revision 36)
+++ mbedtls.changes (revision 2)
@@ -1,4 +1,75 @@
-------------------------------------------------------------------
+Wed Dec 21 11:10:10 UTC 2022 - Alexander Bergmann <abergmann@suse.com>
+
+- Update to 2.28.2: (bsc#1206576, CVE-2022-46393)
+
+ Security:
+ * Fix potential heap buffer overread and overwrite in DTLS if
+ MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
+ MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
+ * An adversary with access to precise enough information about memory
+ accesses (typically, an untrusted operating system attacking a secure
+ enclave) could recover an RSA private key after observing the victim
+ performing a single private-key operation if the window size used for the
+ exponentiation was 3 or smaller. Found and reported by Zili KOU,
+ Wenjian HE, Sharad Sinha, and Wei ZHANG. See "Cache Side-channel Attacks
+ and Defenses of the Sliding Window Algorithm in TEEs" - Design, Automation
+ and Test in Europe 2023.
+
+ Bugfix:
+ * Fix a long-standing build failure when building x86 PIC code with old
+ gcc (4.x). The code will be slower, but will compile. We do however
+ recommend upgrading to a more recent compiler instead. Fixes #1910.
+ * Fix support for little-endian Microblaze when MBEDTLS_HAVE_ASM is defined.
+ Contributed by Kazuyuki Kimura to fix #2020.
+ * Use double quotes to include private header file psa_crypto_cipher.h.
+ Fixes 'file not found with include' error when building with Xcode.
+ * Fix handling of broken symlinks when loading certificates using
+ mbedtls_x509_crt_parse_path(). Instead of returning an error as soon as a
+ broken link is encountered, skip the broken link and continue parsing
+ other certificate files. Contributed by Eduardo Silva in #2602.
+ * Fix a compilation error when using CMake with an IAR toolchain.
+ Fixes #5964.
+ * Fix bugs and missing dependencies when building and testing
+ configurations with only one encryption type enabled in TLS 1.2.
+ * Provide the missing definition of mbedtls_setbuf() in some configurations
+ with MBEDTLS_PLATFORM_C disabled. Fixes #6118, #6196.
+ * Fix compilation errors when trying to build with
+ PSA drivers for AEAD (GCM, CCM, Chacha20-Poly1305).
+ * Fix memory leak in ssl_parse_certificate_request() caused by
+ mbedtls_x509_get_name() not freeing allocated objects in case of error.
+ Change mbedtls_x509_get_name() to clean up allocated objects on error.
+ * Fix checks on PK in check_config.h for builds with PSA and RSA. This does
+ not change which builds actually work, only moving a link-time error to
+ an early check.
+ * Fix ECDSA verification, where it was not always validating the
+ public key. This bug meant that it was possible to verify a
+ signature with an invalid public key, in some cases. Reported by
+ Guido Vranken using Cryptofuzz in #4420.
+ * Fix a possible null pointer dereference if a memory allocation fails
+ in TLS PRF code. Reported by Michael Madsen in #6516.
+ * Fix a bug in which mbedtls_x509_crt_info() would produce non-printable
+ bytes when parsing certificates containing a binary RFC 4108
+ HardwareModuleName as a Subject Alternative Name extension. Hardware
+ serial numbers are now rendered in hex format. Fixes #6262.
+ * Fix bug in error reporting in dh_genprime.c where upon failure,
+ the error code returned by mbedtls_mpi_write_file() is overwritten
+ and therefore not printed.
+ * In the bignum module, operations of the form (-A) - (+A) or (-A) - (-A)
+ with A > 0 created an unintended representation of the value 0 which was
+ not processed correctly by some bignum operations. Fix this. This had no
+ consequence on cryptography code, but might affect applications that call
+ bignum directly and use negative numbers.
+ * Fix undefined behavior (typically harmless in practice) of
+ mbedtls_mpi_add_mpi(), mbedtls_mpi_add_abs() and mbedtls_mpi_add_int()
+ when both operands are 0 and the left operand is represented with 0 limbs.
+ * Fix undefined behavior (typically harmless in practice) when some bignum
+ functions receive the most negative value of mbedtls_mpi_sint. Credit
+ to OSS-Fuzz. Fixes #6597.
+ * Fix undefined behavior (typically harmless in practice) in PSA ECB
+ encryption and decryption.
+
+-------------------------------------------------------------------
Fri Nov 4 16:53:36 UTC 2022 - Mia Herkt <mia@0x0.st>
- Update to 2.28.1: (CVE-2022-35409)
Index: mbedtls.spec
===================================================================
--- mbedtls.spec (revision 36)
+++ mbedtls.spec (revision 2)
@@ -20,7 +20,7 @@
%define lib_crypto libmbedcrypto7
%define lib_x509 libmbedx509-1
Name: mbedtls
-Version: 2.28.1
+Version: 2.28.2
Release: 0
Summary: Libraries for crypto and SSL/TLS protocols
License: Apache-2.0
Index: mbedtls-2.28.2.tar.gz
===================================================================
Binary file mbedtls-2.28.2.tar.gz (revision 2) added
Index: mbedtls-2.28.1.tar.gz
===================================================================
Binary file mbedtls-2.28.1.tar.gz (revision 36) deleted
OBS-URL: https://build.opensuse.org/request/show/1044072
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=37
2022-12-22 09:29:32 +01:00
|
|
|
Version: 2.28.2
|
2015-03-30 19:33:01 +02:00
|
|
|
Release: 0
|
2016-09-30 15:22:53 +02:00
|
|
|
Summary: Libraries for crypto and SSL/TLS protocols
|
|
|
|
License: Apache-2.0
|
2015-03-30 19:33:01 +02:00
|
|
|
Group: Development/Libraries/C and C++
|
2018-03-12 12:07:47 +01:00
|
|
|
URL: https://tls.mbed.org
|
2021-01-20 08:18:23 +01:00
|
|
|
Source: https://github.com/ARMmbed/mbedtls/archive/v%{version}.tar.gz#/%{name}-%{version}.tar.gz
|
2015-08-10 09:11:21 +02:00
|
|
|
Source99: baselibs.conf
|
2015-03-30 19:33:01 +02:00
|
|
|
BuildRequires: cmake
|
2019-09-03 17:04:20 +02:00
|
|
|
BuildRequires: ninja
|
2016-07-21 07:52:59 +02:00
|
|
|
BuildRequires: pkgconfig
|
2016-09-30 15:22:53 +02:00
|
|
|
BuildRequires: pkgconfig(libpkcs11-helper-1)
|
|
|
|
BuildRequires: pkgconfig(zlib)
|
2015-03-30 19:33:01 +02:00
|
|
|
|
|
|
|
%description
|
2016-09-30 15:22:53 +02:00
|
|
|
mbedtls implements the SSL3, TLS 1.0, 1.1 and 1.2 protocols. It
|
|
|
|
supports a number of extensions such as SSL Session Tickets (RFC
|
|
|
|
5077), Server Name Indication (SNI) (RFC 6066), Truncated HMAC (RFC
|
|
|
|
6066), Max Fragment Length (RFC 6066), Secure Renegotiation (RFC
|
|
|
|
5746) and Application Layer Protocol Negotiation (ALPN). It
|
|
|
|
understands the RSA, (EC)DH(E)-RSA, (EC)DH(E)-PSK and RSA-PSK key
|
|
|
|
exchanges.
|
|
|
|
|
|
|
|
%package -n %{lib_tls}
|
|
|
|
Summary: Transport Layer Security protocol suite
|
|
|
|
Group: System/Libraries
|
2015-03-30 19:33:01 +02:00
|
|
|
|
2016-09-30 15:22:53 +02:00
|
|
|
%description -n %{lib_tls}
|
|
|
|
mbedtls implements the SSL 3.0, TLS 1.0, 1.1 and 1.2 protocols. It
|
|
|
|
supports a number of extensions such as SSL Session Tickets (RFC
|
|
|
|
5077), Server Name Indication (SNI) (RFC 6066), Truncated HMAC (RFC
|
|
|
|
6066), Max Fragment Length (RFC 6066), Secure Renegotiation (RFC
|
|
|
|
5746) and Application Layer Protocol Negotiation (ALPN). It
|
|
|
|
understands the RSA, (EC)DH(E)-RSA, (EC)DH(E)-PSK and RSA-PSK key
|
|
|
|
exchanges.
|
|
|
|
|
|
|
|
%package -n %{lib_crypto}
|
|
|
|
Summary: Cryptographic base library for mbedtls
|
2015-03-30 19:33:01 +02:00
|
|
|
Group: System/Libraries
|
|
|
|
|
2016-09-30 15:22:53 +02:00
|
|
|
%description -n %{lib_crypto}
|
|
|
|
This subpackage of mbedtls contains a library that exposes
|
|
|
|
cryptographic ciphers, hashes, algorithms and format support such as
|
|
|
|
AES, MD5, SHA, Elliptic Curves, BigNum, PKCS, ASN.1, BASE64.
|
|
|
|
|
|
|
|
%package -n %{lib_x509}
|
|
|
|
Summary: Library to work with X.509 certificates
|
|
|
|
Group: System/Libraries
|
|
|
|
|
|
|
|
%description -n %{lib_x509}
|
|
|
|
This subpackage of mbedtls contains a library that can read, verify
|
|
|
|
and write X.509 certificates, read/write Certificate Signing Requests
|
|
|
|
and read Certificate Revocation Lists.
|
2015-03-30 19:33:01 +02:00
|
|
|
|
|
|
|
%package devel
|
2016-09-30 15:22:53 +02:00
|
|
|
Summary: Development files for mbedtls, a SSL/TLS library
|
2015-03-30 19:33:01 +02:00
|
|
|
Group: Development/Libraries/C and C++
|
2016-09-30 15:22:53 +02:00
|
|
|
Requires: %{lib_crypto} = %{version}
|
|
|
|
Requires: %{lib_tls} = %{version}
|
|
|
|
Requires: %{lib_x509} = %{version}
|
2015-03-30 19:33:01 +02:00
|
|
|
|
|
|
|
%description devel
|
2016-09-30 15:22:53 +02:00
|
|
|
This subpackage contains the development files for mbedtls,
|
|
|
|
a suite of libraries for cryptographic functions and the
|
|
|
|
SSL/TLS protocol suite.
|
2015-03-30 19:33:01 +02:00
|
|
|
|
|
|
|
%prep
|
2021-03-23 08:12:35 +01:00
|
|
|
%autosetup -p1
|
2016-09-30 15:22:53 +02:00
|
|
|
sed -i 's|//\(#define MBEDTLS_ZLIB_SUPPORT\)|\1|' include/mbedtls/config.h
|
|
|
|
sed -i 's|//\(#define MBEDTLS_HAVEGE_C\)|\1|' include/mbedtls/config.h
|
|
|
|
sed -i 's|//\(#define MBEDTLS_THREADING_C\)|\1|' include/mbedtls/config.h
|
|
|
|
sed -i 's|//\(#define MBEDTLS_THREADING_PTHREAD\)|\1|' include/mbedtls/config.h
|
2015-03-30 19:33:01 +02:00
|
|
|
|
|
|
|
%build
|
2019-09-03 17:04:20 +02:00
|
|
|
%define __builder ninja
|
2021-04-15 18:00:58 +02:00
|
|
|
export CFLAGS="%{optflags} -Wno-stringop-overflow -Wno-maybe-uninitialized"
|
|
|
|
export CXXLAGS="%{optflags} -Wno-stringop-overflow -Wno-maybe-uninitialized"
|
2015-03-30 19:33:01 +02:00
|
|
|
%cmake \
|
2021-04-15 18:00:58 +02:00
|
|
|
-DUNSAFE_BUILD=ON \
|
2016-09-30 15:22:53 +02:00
|
|
|
-DLINK_WITH_PTHREAD=ON \
|
|
|
|
-DUSE_PKCS11_HELPER_LIBRARY=ON \
|
|
|
|
-DENABLE_ZLIB_SUPPORT=ON \
|
|
|
|
-DINSTALL_MBEDTLS_HEADERS=ON \
|
2016-01-15 10:38:38 +01:00
|
|
|
-DUSE_SHARED_MBEDTLS_LIBRARY=ON \
|
|
|
|
-DUSE_STATIC_MBEDTLS_LIBRARY=OFF \
|
2020-09-07 08:46:16 +02:00
|
|
|
-DENABLE_PROGRAMS=OFF \
|
|
|
|
-DCMAKE_POLICY_DEFAULT_CMP0012=NEW
|
2019-09-03 17:04:20 +02:00
|
|
|
%cmake_build
|
2015-03-30 19:33:01 +02:00
|
|
|
|
|
|
|
%install
|
|
|
|
%cmake_install
|
|
|
|
|
|
|
|
%check
|
2020-08-31 12:41:37 +02:00
|
|
|
# parallel execution fails
|
|
|
|
# %%ctest
|
|
|
|
pushd build
|
2021-01-20 08:18:23 +01:00
|
|
|
LD_LIBRARY_PATH=%{buildroot}%{_libdir} \
|
|
|
|
%{_bindir}/ctest --output-on-failure --force-new-ctest-process -j1
|
2015-03-30 19:33:01 +02:00
|
|
|
|
2016-09-30 15:22:53 +02:00
|
|
|
%post -n %{lib_tls} -p /sbin/ldconfig
|
|
|
|
%post -n %{lib_crypto} -p /sbin/ldconfig
|
|
|
|
%post -n %{lib_x509} -p /sbin/ldconfig
|
|
|
|
%postun -n %{lib_tls} -p /sbin/ldconfig
|
|
|
|
%postun -n %{lib_crypto} -p /sbin/ldconfig
|
|
|
|
%postun -n %{lib_x509} -p /sbin/ldconfig
|
2015-03-30 19:33:01 +02:00
|
|
|
|
|
|
|
%files devel
|
2018-03-12 12:07:47 +01:00
|
|
|
%license LICENSE
|
|
|
|
%doc ChangeLog README.md
|
2016-09-30 15:22:53 +02:00
|
|
|
%dir %{_includedir}/mbedtls
|
2020-08-17 12:36:14 +02:00
|
|
|
%dir %{_includedir}/psa
|
2016-09-30 15:22:53 +02:00
|
|
|
%{_includedir}/mbedtls/*.h
|
2020-08-17 12:36:14 +02:00
|
|
|
%{_includedir}/psa/*.h
|
2015-03-30 19:33:01 +02:00
|
|
|
%{_libdir}/libmbedtls.so
|
2016-09-30 15:22:53 +02:00
|
|
|
%{_libdir}/libmbedcrypto.so
|
|
|
|
%{_libdir}/libmbedx509.so
|
2015-03-30 19:33:01 +02:00
|
|
|
|
2016-09-30 15:22:53 +02:00
|
|
|
%files -n %{lib_tls}
|
2018-03-12 12:07:47 +01:00
|
|
|
%license LICENSE
|
2015-03-30 19:33:01 +02:00
|
|
|
%{_libdir}/libmbedtls.so.*
|
|
|
|
|
2016-09-30 15:22:53 +02:00
|
|
|
%files -n %{lib_crypto}
|
2018-03-12 12:07:47 +01:00
|
|
|
%license LICENSE
|
2016-09-30 15:22:53 +02:00
|
|
|
%{_libdir}/libmbedcrypto.so.*
|
|
|
|
|
|
|
|
%files -n %{lib_x509}
|
2018-03-12 12:07:47 +01:00
|
|
|
%license LICENSE
|
2016-09-30 15:22:53 +02:00
|
|
|
%{_libdir}/libmbedx509.so.*
|
|
|
|
|
2015-03-30 19:33:01 +02:00
|
|
|
%changelog
|