Commit Graph

124 Commits

Author SHA256 Message Date
Otto Hollmann
69a932c2a0 Accepting request 1120051 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/1120051
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=76
2023-10-24 16:01:48 +00:00
Ana Guerrero
75ca6a87ba Accepting request 1118892 from security:tls
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1118892
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=16
2023-10-20 21:17:16 +00:00
Otto Hollmann
6fa380a834 Accepting request 1117440 from home:jengelh:man
spin large manpage set off to -doc package

OBS-URL: https://build.opensuse.org/request/show/1117440
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=74
2023-10-19 09:40:34 +00:00
Ana Guerrero
4500e3f99f Accepting request 1113690 from security:tls
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/1113690
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=15
2023-09-29 19:12:21 +00:00
Otto Hollmann
dff8b6b524 Accepting request 1112471 from home:ohollmann:branches:security:tls
- Update to 3.1.3:
  * Fix POLY1305 MAC implementation corrupting XMM registers on
    Windows (CVE-2023-4807)

OBS-URL: https://build.opensuse.org/request/show/1112471
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=72
2023-09-20 07:23:48 +00:00
Dominique Leuenberger
26aeca1040 Accepting request 1101934 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1101934
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=14
2023-08-04 13:02:42 +00:00
ae873c4025 Accepting request 1101930 from home:pmonrealgonzalez:branches:security:tls
- Update to 3.1.2:
  * Fix excessive time spent checking DH q parameter value
    (bsc#1213853, CVE-2023-3817). The function DH_check() performs
    various checks on DH parameters. After fixing CVE-2023-3446 it
    was discovered that a large q parameter value can also trigger
    an overly long computation during some of these checks. A
    correct q value, if present, cannot be larger than the modulus
    p parameter, thus it is unnecessary to perform these checks if
    q is larger than p. If DH_check() is called with such q parameter
    value, DH_CHECK_INVALID_Q_VALUE return flag is set and the
    computationally intensive checks are skipped.
  * Fix DH_check() excessive time with over sized modulus
    (bsc#1213487, CVE-2023-3446). The function DH_check() performs
    various checks on DH parameters. One of those checks confirms
    that the modulus ("p" parameter) is not too large. Trying to use
    a very large modulus is slow and OpenSSL will not normally use
    a modulus which is over 10,000 bits in length. However the
    DH_check() function checks numerous aspects of the key or
    parameters that have been supplied. Some of those checks use the
    supplied modulus value even if it has already been found to be
    too large. A new limit has been added to DH_check of 32,768 bits.
    Supplying a key/parameters with a modulus over this size will
    simply cause DH_check() to fail.
  * Do not ignore empty associated data entries with AES-SIV
    (bsc#1213383, CVE-2023-2975). The AES-SIV algorithm allows for
    authentication of multiple associated data entries along with the
    encryption. To authenticate empty data the application has to call
    EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as
    the output buffer and 0 as the input buffer length. The AES-SIV
    implementation in OpenSSL just returns success for such call

OBS-URL: https://build.opensuse.org/request/show/1101930
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=70
2023-08-02 10:04:19 +00:00
Ana Guerrero
a9ef9b6a79 Accepting request 1099669 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1099669
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=13
2023-07-24 16:11:36 +00:00
79c28ad03b Accepting request 1099662 from home:pmonrealgonzalez:branches:security:tls
- Security fix: [bsc#1213487, CVE-2023-3446]
  * Fix DH_check() excessive time with over sized modulus.
  * The function DH_check() performs various checks on DH parameters.
    One of those checks confirms that the modulus ("p" parameter) is
    not too large. Trying to use a very large modulus is slow and
    OpenSSL will not normally use a modulus which is over 10,000 bits
    in length.
    However the DH_check() function checks numerous aspects of the
    key or parameters that have been supplied. Some of those checks
    use the supplied modulus value even if it has already been found
    to be too large.
    A new limit has been added to DH_check of 32,768 bits. Supplying
    a key/parameters with a modulus over this size will simply cause
    DH_check() to fail.
  * Add openssl-CVE-2023-3446.patch openssl-CVE-2023-3446-test.patch

OBS-URL: https://build.opensuse.org/request/show/1099662
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=68
2023-07-20 08:41:29 +00:00
0ed0686753 Accepting request 1099214 from home:pmonrealgonzalez:branches:security:tls
- Security fix: [bsc#1213383, CVE-2023-2975]
  * AES-SIV implementation ignores empty associated data entries
  * Add openssl-CVE-2023-2975.patch

OBS-URL: https://build.opensuse.org/request/show/1099214
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=67
2023-07-18 09:07:15 +00:00
Dominique Leuenberger
a48883733f Accepting request 1095607 from security:tls
- Improve cross-package provides/conflicts [boo#1210313]
  * Add Provides/Conflicts: ssl-devel
  * Remove explicit conflicts with other devel-libraries
  * Remove Provides: openssl(cli) - it's managed by meta package

OBS-URL: https://build.opensuse.org/request/show/1095607
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=12
2023-06-29 15:27:49 +00:00
Otto Hollmann
b496b916bd - Improve cross-package provides/conflicts [boo#1210313]
* Add Provides/Conflicts: ssl-devel
  * Remove explicit conflicts with other devel-libraries
  * Remove Provides: openssl(cli) - it's managed by meta package

OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=65
2023-06-21 13:05:11 +00:00
Dominique Leuenberger
ad1bcf2871 Accepting request 1089933 from security:tls
- Update to 3.1.1:
  * Restrict the size of OBJECT IDENTIFIERs that OBJ_obj2txt will translate
    (CVE-2023-2650, bsc#1211430)
  * Multiple algorithm implementation fixes for ARM BE platforms.
  * Added a -pedantic option to fipsinstall that adjusts the various settings
    to ensure strict FIPS compliance rather than backwards compatibility.
  * Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which
    happens if the buffer size is 4 mod 5 in 16 byte AES blocks. This can
    trigger a crash of an application using AES-XTS decryption if the memory
    just after the buffer being decrypted is not mapped. Thanks to Anton
    Romanov (Amazon) for discovering the issue. (CVE-2023-1255, bsc#1210714)
  * Add FIPS provider configuration option to disallow the use of truncated
    digests with Hash and HMAC DRBGs (q.v. FIPS 140-3 IG D.R.). The
    option '-no_drbg_truncated_digests' can optionally be supplied
    to 'openssl fipsinstall'.
  * Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention that
    it does not enable policy checking. Thanks to David Benjamin for
    discovering this issue. (CVE-2023-0466, bsc#1209873)
  * Fixed an issue where invalid certificate policies in leaf certificates are
    silently ignored by OpenSSL and other certificate policy checks are
    skipped for that certificate. A malicious CA could use this to
    deliberately assert invalid certificate policies in order to circumvent
    policy checking on the certificate altogether. (CVE-2023-0465, bsc#1209878)
  * Limited the number of nodes created in a policy tree to mitigate against
    CVE-2023-0464. The default limit is set to 1000 nodes, which should be
    sufficient for most installations. If required, the limit can be adjusted
    by setting the OPENSSL_POLICY_TREE_NODES_MAX build time define to a
    desired maximum number of nodes or zero to allow unlimited growth.
    (CVE-2023-0464, bsc#1209624)
  * Update openssl.keyring with key

OBS-URL: https://build.opensuse.org/request/show/1089933
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=11
2023-06-01 15:18:42 +00:00
Otto Hollmann
e5f5639ff0 Accepting request 1089931 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/1089931
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=63
2023-05-31 07:04:29 +00:00
Otto Hollmann
a451b8be27 Accepting request 1089847 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/1089847
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=62
2023-05-30 16:00:51 +00:00
Otto Hollmann
0ddca788f5 Accepting request 1075338 from home:ohollmann:branches:security:tls
- Security Fix: [CVE-2023-0465, bsc#1209878]
  * Invalid certificate policies in leaf certificates are silently ignored
  * Add openssl-CVE-2023-0465.patch
- Security Fix: [CVE-2023-0466, bsc#1209873]
  * Certificate policy check not enabled
  * Add openssl-CVE-2023-0466.patch

OBS-URL: https://build.opensuse.org/request/show/1075338
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=61
2023-03-29 19:28:53 +00:00
Otto Hollmann
835b3ad63f Accepting request 1075073 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/1075073
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=60
2023-03-29 07:57:50 +00:00
Otto Hollmann
e4ef647823 Accepting request 1074731 from home:ohollmann:branches:security:tls
- Fix compiler error "initializer element is not constant" on s390
  * Add openssl-z16-s390x.patch

OBS-URL: https://build.opensuse.org/request/show/1074731
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=59
2023-03-27 15:13:59 +00:00
Otto Hollmann
bcd1eb4d85 Accepting request 1074653 from home:ohollmann:branches:security:tls
- Security Fix: [CVE-2023-0464, bsc#1209624]
  * Excessive Resource Usage Verifying X.509 Policy Constraints
  * Add openssl-CVE-2023-0464.patch

- Pass over with spec-cleaner

OBS-URL: https://build.opensuse.org/request/show/1074653
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=58
2023-03-27 11:56:02 +00:00
Otto Hollmann
b14bb06ffe Accepting request 1071820 from security:tls:unstable
- Update to 3.1.0:
  * Add FIPS provider configuration option to enforce the Extended Master
    Secret (EMS) check during the TLS1_PRF KDF. The option '-ems-check' can
    optionally be supplied to 'openssl fipsinstall'.
  * The FIPS provider includes a few non-approved algorithms for backward
    compatibility purposes and the "fips=yes" property query must be used for
    all algorithm fetches to ensure FIPS compliance. The algorithms that are
    included but not approved are Triple DES ECB, Triple DES CBC and EdDSA.
  * Added support for KMAC in KBKDF.
  * RNDR and RNDRRS support in provider functions to provide random number
    generation for Arm CPUs (aarch64).
  * s_client and s_server apps now explicitly say when the TLS version does not
    include the renegotiation mechanism. This avoids confusion between that
    scenario versus when the TLS version includes secure renegotiation but the
    peer lacks support for it.
  * AES-GCM enabled with AVX512 vAES and vPCLMULQDQ.
  * The various OBJ_* functions have been made thread safe.
  * Parallel dual-prime 1536/2048-bit modular exponentiation for AVX512_IFMA
    capable processors.
  * The functions OPENSSL_LH_stats, OPENSSL_LH_node_stats,
    OPENSSL_LH_node_usage_stats, OPENSSL_LH_stats_bio,
    OPENSSL_LH_node_stats_bio and OPENSSL_LH_node_usage_stats_bio are now
    marked deprecated from OpenSSL 3.1 onwards and can be disabled by defining
    OPENSSL_NO_DEPRECATED_3_1. The macro DEFINE_LHASH_OF is now deprecated in
    favour of the macro DEFINE_LHASH_OF_EX, which omits the corresponding
    type-specific function definitions for these functions regardless of
    whether OPENSSL_NO_DEPRECATED_3_1 is defined. Users of DEFINE_LHASH_OF may
    start receiving deprecation warnings for these functions regardless of
    whether they are using them. It is recommended that users transition to the
    new macro, DEFINE_LHASH_OF_EX.

OBS-URL: https://build.opensuse.org/request/show/1071820
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=57
2023-03-14 16:01:30 +00:00
Dominique Leuenberger
7fbc471cd4 Accepting request 1070585 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1070585
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=10
2023-03-12 15:22:18 +00:00
Otto Hollmann
56c4e29a8b Accepting request 1070146 from home:pluskalm:branches:security:tls
- Build AVX2 enabled hwcaps library for x86_64-v3

OBS-URL: https://build.opensuse.org/request/show/1070146
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=55
2023-03-10 05:38:15 +00:00
Dominique Leuenberger
f22f0fb79f Accepting request 1063740 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1063740
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=9
2023-02-20 16:45:03 +00:00
Martin Pluskal
0620c0c33d Accepting request 1063662 from home:ohollmann:branches:security:tls
- Update to 3.0.8:
  * Fixed NULL dereference during PKCS7 data verification.
    A NULL pointer can be dereferenced when signatures are being
    verified on PKCS7 signed or signedAndEnveloped data. In case the hash
    algorithm used for the signature is known to the OpenSSL library but
    the implementation of the hash algorithm is not available the digest
    initialization will fail. There is a missing check for the return
    value from the initialization function which later leads to invalid
    usage of the digest API most likely leading to a crash.
    ([bsc#1207541, CVE-2023-0401])
    PKCS7 data is processed by the SMIME library calls and also by the
    time stamp (TS) library calls. The TLS implementation in OpenSSL does
    not call these functions however third party applications would be
    affected if they call these functions to verify signatures on untrusted
    data.
  * Fixed X.400 address type confusion in X.509 GeneralName.
    There is a type confusion vulnerability relating to X.400 address processing
    inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING
    but the public structure definition for GENERAL_NAME incorrectly specified
    the type of the x400Address field as ASN1_TYPE. This field is subsequently
    interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather
    than an ASN1_STRING.
    When CRL checking is enabled (i.e. the application sets the
    X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to
    pass arbitrary pointers to a memcmp call, enabling them to read memory
    contents or enact a denial of service.
    ([bsc#1207533, CVE-2023-0286])
  * Fixed NULL dereference validating DSA public key.
    An invalid pointer dereference on read can be triggered when an
    application tries to check a malformed DSA public key by the

OBS-URL: https://build.opensuse.org/request/show/1063662
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=53
2023-02-08 08:07:42 +00:00
Dominique Leuenberger
8042c39fa8 Accepting request 1062224 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1062224
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=8
2023-02-02 17:08:02 +00:00
9250deebcd Accepting request 1062222 from security:tls:unstable
- Relax the crypto-policies requirements for the regression tests

- Set OpenSSL 3.0.7 as the default openssl [bsc#1205042]
  * Rename openssl-1.1.0-no-html.patch to openssl-no-html-docs.patch
  * Rebase openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
  * Package a copy of the original default config file called
    openssl.cnf and name it as openssl-orig.cnf and warn the user
    if the files differ.
  * Add openssl-3-devel as conflicting with libopenssl-1_1-devel
  * Remove patches:
    - fix-config-in-tests.patch
    - openssl-use-versioned-config.patch

- Create the openssl ca-certificates directory in case the
  ca-certificates package is not installed. This directory is
  required by the nodejs regression tests. [bsc#1207484]

- Compute the hmac files for FIPS 140-3 integrity checking of the
  openssl shared libraries using the brp-50-generate-fips-hmac
  script. Also computed for the 32bit package.

OBS-URL: https://build.opensuse.org/request/show/1062222
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=51
2023-01-31 12:15:10 +00:00
Dominique Leuenberger
2eb8c9a8d3 Accepting request 1042989 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1042989
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=7
2022-12-16 16:50:53 +00:00
0028006287 Accepting request 1042985 from home:ohollmann:branches:security:tls
- Fix X.509 Policy Constraints Double Locking [bsc#1206374, CVE-2022-3996]
  * Add patch: openssl-3-Fix-double-locking-problem.patch

OBS-URL: https://build.opensuse.org/request/show/1042985
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=49
2022-12-14 20:21:17 +00:00
Dominique Leuenberger
984a274482 Accepting request 1032748 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1032748
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=6
2022-11-03 18:13:01 +00:00
c7c7fd87d3 Accepting request 1032747 from home:ohollmann:branches:security:tls
- Temporary disable tests test_ssl_new and test_sslapi because they are
  failing in openSUSE_Tumbleweed

- Update to 3.0.7: [bsc#1204714, CVE-2022-3602,CVE-2022-3786]
  * Fixed two buffer overflows in punycode decoding functions.
    A buffer overrun can be triggered in X.509 certificate verification,
    specifically in name constraint checking. Note that this occurs after
    certificate chain signature verification and requires either a CA to
    have signed the malicious certificate or for the application to continue
    certificate verification despite failure to construct a path to a trusted
    issuer.
    In a TLS client, this can be triggered by connecting to a malicious
    server.  In a TLS server, this can be triggered if the server requests
    client authentication and a malicious client connects.
    An attacker can craft a malicious email address to overflow
    an arbitrary number of bytes containing the `.`  character (decimal 46)
    on the stack.  This buffer overflow could result in a crash (causing a
    denial of service).
    ([CVE-2022-3786])
    An attacker can craft a malicious email address to overflow four
    attacker-controlled bytes on the stack.  This buffer overflow could
    result in a crash (causing a denial of service) or potentially remote code
    execution depending on stack layout for any given platform/compiler.
    ([CVE-2022-3602])
  * Removed all references to invalid OSSL_PKEY_PARAM_RSA names for CRT
    parameters in OpenSSL code.
    Applications should not use the names OSSL_PKEY_PARAM_RSA_FACTOR,
    OSSL_PKEY_PARAM_RSA_EXPONENT and OSSL_PKEY_PARAM_RSA_COEFFICIENT.
    Use the numbered names such as OSSL_PKEY_PARAM_RSA_FACTOR1 instead.
    Using these invalid names may cause algorithms to use slower methods

OBS-URL: https://build.opensuse.org/request/show/1032747
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=47
2022-11-01 20:31:17 +00:00
Dominique Leuenberger
5c0b2f75a9 Accepting request 1003956 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1003956
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=5
2022-09-15 21:00:15 +00:00
2e9643fcf8 Accepting request 1003954 from home:pmonrealgonzalez:branches:security:tls
OBS-URL: https://build.opensuse.org/request/show/1003954
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=45
2022-09-15 18:27:20 +00:00
07571e5415 Accepting request 1003620 from home:dziobian
- Do not make libopenssl3-32bit obsolete libopenssl1_1-32bit.
  They are independent libraries and can be installed simultaneously.

OBS-URL: https://build.opensuse.org/request/show/1003620
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=44
2022-09-15 18:24:37 +00:00
Richard Brown
249602c696 Accepting request 990536 from security:tls
OBS-URL: https://build.opensuse.org/request/show/990536
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=4
2022-07-22 17:20:36 +00:00
9bc98986ac Accepting request 990534 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/990534
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=42
2022-07-21 11:29:20 +00:00
Dominique Leuenberger
896b1d2d57 Accepting request 964296 from security:tls
OBS-URL: https://build.opensuse.org/request/show/964296
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=3
2022-03-23 19:19:11 +00:00
455c14e4eb Accepting request 963758 from home:pmonrealgonzalez:branches:security:tls
- Enable zlib compression support [bsc#1195149]

- Add crypto-policies support.
  * Fix some tests that couldn't find the openssl3.cnf location
  * Rebase patch:
    openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch

OBS-URL: https://build.opensuse.org/request/show/963758
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=40
2022-03-23 12:54:06 +00:00
Dominique Leuenberger
7eec039543 Accepting request 962004 from security:tls
OBS-URL: https://build.opensuse.org/request/show/962004
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=2
2022-03-16 19:20:36 +00:00
2f2f23d69b Accepting request 962003 from home:pmonrealgonzalez:branches:security:tls
- Update to 3.0.2: [bsc#1196877, CVE-2022-0778]
  * Security fix [CVE-2022-0778]: Infinite loop for non-prime moduli
    in BN_mod_sqrt() reachable when parsing certificates.
  * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK
    (RFC 5489) to the list of ciphersuites providing Perfect Forward
    Secrecy as required by SECLEVEL >= 3.
  * Made the AES constant time code for no-asm configurations
    optional due to the resulting 95% performance degradation.
    The AES constant time code can be enabled, for no assembly
    builds, with: ./config no-asm -DOPENSSL_AES_CONST_TIME
  * Fixed PEM_write_bio_PKCS8PrivateKey() to make it possible to
    use empty passphrase strings.
  * The negative return value handling of the certificate
    verification callback was reverted. The replacement is to set
    the verification retry state with the SSL_set_retry_verify()
    function.
  * Rebase openssl-use-versioned-config.patch

- Keep CA_default and tsa_config1 default paths in openssl3.cnf
- Rebase patches:
  * openssl-Override-default-paths-for-the-CA-directory-tree.patch
  * openssl-use-versioned-config.patch

OBS-URL: https://build.opensuse.org/request/show/962003
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=38
2022-03-15 19:28:22 +00:00
Dominique Leuenberger
82eca4c62a Accepting request 950776 from security:tls
OBS-URL: https://build.opensuse.org/request/show/950776
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl-3?expand=0&rev=1
2022-02-02 21:40:04 +00:00
718b16a5a2 Accepting request 950770 from home:dspinella:branches:security:tls
OBS-URL: https://build.opensuse.org/request/show/950770
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=36
2022-02-02 15:43:26 +00:00
cc146bda3a Accepting request 950769 from home:dspinella:branches:security:tls
OBS-URL: https://build.opensuse.org/request/show/950769
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=35
2022-02-02 15:34:23 +00:00
3453bdccd1 Accepting request 950451 from home:dspinella:branches:security:tls
- Fix conflict with openssl and libressl

OBS-URL: https://build.opensuse.org/request/show/950451
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=34
2022-02-01 15:09:19 +00:00
c3d5c867a1 Accepting request 949760 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/949760
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=33
2022-01-28 19:30:29 +00:00
0a6677bc99 Accepting request 947645 from security:tls:unstable
- Update to 3.0.1: [bsc#1193740, CVE-2021-4044]

OBS-URL: https://build.opensuse.org/request/show/947645
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=32
2022-01-20 12:28:06 +00:00
38921057de Accepting request 946113 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/946113
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=31
2022-01-13 17:50:59 +00:00
68b1d788c0 Accepting request 917522 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/917522
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=30
2021-09-08 09:17:59 +00:00
278e4a3148 Accepting request 909235 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/909235
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=29
2021-07-29 18:29:14 +00:00
dac9bbe2ba Accepting request 908852 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/908852
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=28
2021-07-28 10:42:52 +00:00
687459c580 Accepting request 906781 from security:tls:unstable
OBS-URL: https://build.opensuse.org/request/show/906781
OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=27
2021-07-17 09:30:23 +00:00