* SHA-1 is not allowed anymore in FIPS 186-5 for signature verification operations. After 12/31/2030, NIST will disallow SHA-1 for all of its usages. * Add openssl-3-FIPS-Deny-SHA-1-sigver-in-FIPS-provider.patch - FIPS: RSA keygen PCT requirements. * Skip the rsa_keygen_pairwise_test() PCT in rsa_keygen() as the self-test requirements are covered by do_rsa_pct() for both RSA-OAEP and RSA signatures [bsc#1221760] * Enforce error state if rsa_keygen PCT is run and fails [bsc#1221753] * Add openssl-3-FIPS-PCT_rsa_keygen.patch - FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. [bsc#1220523] * Rebase openssl-Force-FIPS.patch - FIPS: Port openssl to use jitterentropy [bsc#1220523] * Set the module in error state if the jitter RNG fails either on initialization or entropy gathering because health tests failed. * Add jitterentropy as a seeding source output also in crypto/info.c * Move the jitter entropy collector and the associated lock out of the header file to avoid redefinitions. * Add the fips_local.cnf symlink to the spec file. This simlink points to the openssl_fips.config file that is provided by the crypto-policies package. * Rebase openssl-3-jitterentropy-3.4.0.patch * Rebase openssl-FIPS-enforce-EMS-support.patch - FIPS: Block non-Approved Elliptic Curves [bsc#1221786] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=110
29 lines
908 B
Diff
29 lines
908 B
Diff
@@ -, +, @@
|
|
---
|
|
ssl/record/methods/tls_common.c | 8 ++++++++
|
|
1 file changed, 8 insertions(+)
|
|
--- openssl-3.0.8/ssl/record/ssl3_buffer.c
|
|
+++ openssl-3.0.8/ssl/record/ssl3_buffer.c
|
|
@@ -186,5 +186,7 @@ int ssl3_release_read_buffer(SSL *s)
|
|
OPENSSL_cleanse(b->buf, b->len);
|
|
OPENSSL_free(b->buf);
|
|
b->buf = NULL;
|
|
+ s->rlayer.packet = NULL;
|
|
+ s->rlayer.packet_length = 0;
|
|
return 1;
|
|
}
|
|
--- openssl-3.0.8/ssl/record/rec_layer_s3.c
|
|
+++ openssl-3.0.8/ssl/record/rec_layer_s3.c
|
|
@@ -238,6 +238,11 @@ int ssl3_read_n(SSL *s, size_t n, size_t
|
|
s->rlayer.packet_length = 0;
|
|
/* ... now we can act as if 'extend' was set */
|
|
}
|
|
+ if (!ossl_assert(s->rlayer.packet != NULL)) {
|
|
+ /* does not happen */
|
|
+ SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
|
|
+ return -1;
|
|
+ }
|
|
|
|
len = s->rlayer.packet_length;
|
|
pkt = rb->buf + align;
|