Compare commits
No commits in common. "factory" and "factory" have entirely different histories.
@ -1,67 +0,0 @@
|
|||||||
From 7186bff3fa2a3dd939e1bc0fed48e733da4477a7 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
Date: Mon, 8 Jan 2024 08:52:24 +0100
|
|
||||||
Subject: [PATCH] engine: Enable external AES-GCM IV when libica is in FIPS
|
|
||||||
mode
|
|
||||||
|
|
||||||
When the system is in FIPS mode, newer libica versions may prevent AES-GCM
|
|
||||||
from being used with an external IV. FIPS requires that the AES-GCM IV is
|
|
||||||
created libica internally via an approved random source.
|
|
||||||
|
|
||||||
The IBMCA engine can not support the internal generation of the AES-GCM IV,
|
|
||||||
because the engine API for AES-GCM does not allow this. Applications using
|
|
||||||
OpenSSL to perform AES-GCM (e.g. the TLS protocol) may require to provide an
|
|
||||||
external IV.
|
|
||||||
|
|
||||||
Enable the use of external AES-GCM IVs for libica, if the used libica library
|
|
||||||
supports this. Newer libica versions support to allow external AES-GCM IVs via
|
|
||||||
function ica_allow_external_gcm_iv_in_fips_mode().
|
|
||||||
|
|
||||||
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
---
|
|
||||||
src/engine/e_ibmca.c | 12 +++++++++++-
|
|
||||||
src/engine/ibmca.h | 1 +
|
|
||||||
2 files changed, 12 insertions(+), 1 deletion(-)
|
|
||||||
|
|
||||||
diff --git a/src/engine/e_ibmca.c b/src/engine/e_ibmca.c
|
|
||||||
index 6cbf745..afed3fe 100644
|
|
||||||
--- a/src/engine/e_ibmca.c
|
|
||||||
+++ b/src/engine/e_ibmca.c
|
|
||||||
@@ -103,6 +103,8 @@ ica_aes_gcm_intermediate_t p_ica_aes_gcm_intermediate;
|
|
||||||
ica_aes_gcm_last_t p_ica_aes_gcm_last;
|
|
||||||
#endif
|
|
||||||
ica_cleanup_t p_ica_cleanup;
|
|
||||||
+ica_allow_external_gcm_iv_in_fips_mode_t
|
|
||||||
+ p_ica_allow_external_gcm_iv_in_fips_mode;
|
|
||||||
|
|
||||||
/* save libcrypto's default ec methods */
|
|
||||||
#ifndef NO_EC
|
|
||||||
@@ -825,7 +827,15 @@ static int ibmca_init(ENGINE *e)
|
|
||||||
BIND(ibmca_dso, ica_ed448_ctx_del);
|
|
||||||
|
|
||||||
/* ica_cleanup is not always present and only needed for newer libraries */
|
|
||||||
- p_ica_cleanup = (ica_cleanup_t)dlsym(ibmca_dso, "ica_cleanup");
|
|
||||||
+ BIND(ibmca_dso, ica_cleanup);
|
|
||||||
+
|
|
||||||
+ /*
|
|
||||||
+ * Allow external AES-GCM IV when libica runs in FIPS mode.
|
|
||||||
+ * ica_allow_external_gcm_iv_in_fips_mode() is not always present and only
|
|
||||||
+ * available with newer libraries.
|
|
||||||
+ */
|
|
||||||
+ if (BIND(ibmca_dso, ica_allow_external_gcm_iv_in_fips_mode))
|
|
||||||
+ p_ica_allow_external_gcm_iv_in_fips_mode(1);
|
|
||||||
|
|
||||||
/* disable fallbacks on Libica */
|
|
||||||
if (BIND(ibmca_dso, ica_set_fallback_mode))
|
|
||||||
diff --git a/src/engine/ibmca.h b/src/engine/ibmca.h
|
|
||||||
index 7281a5b..01465eb 100644
|
|
||||||
--- a/src/engine/ibmca.h
|
|
||||||
+++ b/src/engine/ibmca.h
|
|
||||||
@@ -617,6 +617,7 @@ typedef
|
|
||||||
int (*ica_ed448_ctx_del_t)(ICA_ED448_CTX **ctx);
|
|
||||||
|
|
||||||
typedef void (*ica_cleanup_t)(void);
|
|
||||||
+typedef void (*ica_allow_external_gcm_iv_in_fips_mode_t)(int allow);
|
|
||||||
|
|
||||||
/* entry points into libica, filled out at DSO load time */
|
|
||||||
extern ica_get_functionlist_t p_ica_get_functionlist;
|
|
@ -1,243 +0,0 @@
|
|||||||
From 2f420ff28cedfea2ca730d7e54dba39fa4e06cbc Mon Sep 17 00:00:00 2001
|
|
||||||
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
Date: Wed, 10 Jan 2024 15:08:47 +0100
|
|
||||||
Subject: [PATCH] test/provider: Do not link against libica use dlopen instead
|
|
||||||
|
|
||||||
When an application links against libica (via -lica), then the libica library
|
|
||||||
constructor runs before the program's main function. Libica's library
|
|
||||||
constructor does initialize OpenSSL and thus parses the config file.
|
|
||||||
|
|
||||||
However, the test programs set up some OpenSSL configuration related
|
|
||||||
environment variables within function check_libica() called from the
|
|
||||||
main function. If libica has already initialized OpenSSL prior to that,
|
|
||||||
OpenSSL won't initialize again, and thus these environment variables have
|
|
||||||
no effect.
|
|
||||||
|
|
||||||
Dynamically load libica (via dlopen) only after setting the environment
|
|
||||||
variables.
|
|
||||||
|
|
||||||
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
---
|
|
||||||
configure.ac | 2 ++
|
|
||||||
test/provider/Makefile.am | 15 +++++++++------
|
|
||||||
test/provider/dhkey.c | 24 ++++++++++++++++++++++--
|
|
||||||
test/provider/eckey.c | 24 ++++++++++++++++++++++--
|
|
||||||
test/provider/rsakey.c | 24 ++++++++++++++++++++++--
|
|
||||||
5 files changed, 77 insertions(+), 12 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/configure.ac b/configure.ac
|
|
||||||
index b43a659..09df230 100644
|
|
||||||
--- a/configure.ac
|
|
||||||
+++ b/configure.ac
|
|
||||||
@@ -116,6 +116,8 @@ AC_ARG_WITH([provider-libica-full],
|
|
||||||
[])
|
|
||||||
AM_CONDITIONAL([PROVIDER_FULL_LIBICA], [test "x$useproviderfulllibica" = xyes])
|
|
||||||
|
|
||||||
+AC_SUBST(libicaversion, "$libicaversion")
|
|
||||||
+
|
|
||||||
# If compiled against OpenSSL 3.0 or later, build the provider unless
|
|
||||||
# explicitely disabled.
|
|
||||||
# If build against OpenSSL 1.1.1, we can not build the provider.
|
|
||||||
diff --git a/test/provider/Makefile.am b/test/provider/Makefile.am
|
|
||||||
index 15a5466..fce06b3 100644
|
|
||||||
--- a/test/provider/Makefile.am
|
|
||||||
+++ b/test/provider/Makefile.am
|
|
||||||
@@ -24,24 +24,27 @@ TESTS = \
|
|
||||||
check_PROGRAMS = rsakey eckey dhkey threadtest
|
|
||||||
|
|
||||||
dhkey_SOURCES = dhkey.c
|
|
||||||
+dhkey_LDADD = -lcrypto -ldl
|
|
||||||
if PROVIDER_FULL_LIBICA
|
|
||||||
-dhkey_LDADD = -lcrypto -lica
|
|
||||||
+dhkey_CFLAGS = -DLIBICA_NAME=\"libica.so.@libicaversion@\"
|
|
||||||
else
|
|
||||||
-dhkey_LDADD = -lcrypto -lica-cex
|
|
||||||
+dhkey_CFLAGS = -DLIBICA_NAME=\"libica-cex.so.@libicaversion@\"
|
|
||||||
endif
|
|
||||||
|
|
||||||
eckey_SOURCES = eckey.c
|
|
||||||
+eckey_LDADD = -lcrypto -ldl
|
|
||||||
if PROVIDER_FULL_LIBICA
|
|
||||||
-eckey_LDADD = -lcrypto -lica
|
|
||||||
+eckey_CFLAGS = -DLIBICA_NAME=\"libica.so.@libicaversion@\"
|
|
||||||
else
|
|
||||||
-eckey_LDADD = -lcrypto -lica-cex
|
|
||||||
+eckey_CFLAGS = -DLIBICA_NAME=\"libica-cex.so.@libicaversion@\"
|
|
||||||
endif
|
|
||||||
|
|
||||||
rsakey_SOURCES = rsakey.c
|
|
||||||
+rsakey_LDADD = -lcrypto -ldl
|
|
||||||
if PROVIDER_FULL_LIBICA
|
|
||||||
-rsakey_LDADD = -lcrypto -lica
|
|
||||||
+rsakey_CFLAGS = -DLIBICA_NAME=\"libica.so.@libicaversion@\"
|
|
||||||
else
|
|
||||||
-rsakey_LDADD = -lcrypto -lica-cex
|
|
||||||
+rsakey_CFLAGS = -DLIBICA_NAME=\"libica-cex.so.@libicaversion@\"
|
|
||||||
endif
|
|
||||||
|
|
||||||
threadtest_SOURCES = threadtest.c
|
|
||||||
diff --git a/test/provider/dhkey.c b/test/provider/dhkey.c
|
|
||||||
index 8829ecc..0ec2c03 100644
|
|
||||||
--- a/test/provider/dhkey.c
|
|
||||||
+++ b/test/provider/dhkey.c
|
|
||||||
@@ -18,6 +18,7 @@
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <string.h>
|
|
||||||
+#include <dlfcn.h>
|
|
||||||
|
|
||||||
#include <openssl/conf.h>
|
|
||||||
#include <openssl/evp.h>
|
|
||||||
@@ -355,13 +356,32 @@ static const unsigned int required_ica_mechs[] = { RSA_ME };
|
|
||||||
static const unsigned int required_ica_mechs_len =
|
|
||||||
sizeof(required_ica_mechs) / sizeof(unsigned int);
|
|
||||||
|
|
||||||
+typedef unsigned int (*ica_get_functionlist_t)(libica_func_list_element *,
|
|
||||||
+ unsigned int *);
|
|
||||||
+
|
|
||||||
int check_libica()
|
|
||||||
{
|
|
||||||
unsigned int mech_len, i, k, found = 0;
|
|
||||||
libica_func_list_element *mech_list = NULL;
|
|
||||||
+ void *ibmca_dso;
|
|
||||||
+ ica_get_functionlist_t p_ica_get_functionlist;
|
|
||||||
int rc;
|
|
||||||
|
|
||||||
- rc = ica_get_functionlist(NULL, &mech_len);
|
|
||||||
+ ibmca_dso = dlopen(LIBICA_NAME, RTLD_NOW);
|
|
||||||
+ if (ibmca_dso == NULL) {
|
|
||||||
+ fprintf(stderr, "Failed to load libica '%s'!\n", LIBICA_NAME);
|
|
||||||
+ return 77;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ p_ica_get_functionlist =
|
|
||||||
+ (ica_get_functionlist_t)dlsym(ibmca_dso, "ica_get_functionlist");
|
|
||||||
+ if (p_ica_get_functionlist == NULL) {
|
|
||||||
+ fprintf(stderr, "Failed to get ica_get_functionlist from '%s'!\n",
|
|
||||||
+ LIBICA_NAME);
|
|
||||||
+ return 77;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ rc = p_ica_get_functionlist(NULL, &mech_len);
|
|
||||||
if (rc != 0) {
|
|
||||||
fprintf(stderr, "Failed to get function list from libica!\n");
|
|
||||||
return 77;
|
|
||||||
@@ -373,7 +393,7 @@ int check_libica()
|
|
||||||
return 77;
|
|
||||||
}
|
|
||||||
|
|
||||||
- rc = ica_get_functionlist(mech_list, &mech_len);
|
|
||||||
+ rc = p_ica_get_functionlist(mech_list, &mech_len);
|
|
||||||
if (rc != 0) {
|
|
||||||
fprintf(stderr, "Failed to get function list from libica!\n");
|
|
||||||
free(mech_list);
|
|
||||||
diff --git a/test/provider/eckey.c b/test/provider/eckey.c
|
|
||||||
index b2334d7..b8f47b7 100644
|
|
||||||
--- a/test/provider/eckey.c
|
|
||||||
+++ b/test/provider/eckey.c
|
|
||||||
@@ -18,6 +18,7 @@
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <string.h>
|
|
||||||
+#include <dlfcn.h>
|
|
||||||
|
|
||||||
#include <openssl/conf.h>
|
|
||||||
#include <openssl/evp.h>
|
|
||||||
@@ -788,13 +789,32 @@ static const unsigned int required_ica_mechs[] = { EC_DH, EC_DSA_SIGN,
|
|
||||||
static const unsigned int required_ica_mechs_len =
|
|
||||||
sizeof(required_ica_mechs) / sizeof(unsigned int);
|
|
||||||
|
|
||||||
+typedef unsigned int (*ica_get_functionlist_t)(libica_func_list_element *,
|
|
||||||
+ unsigned int *);
|
|
||||||
+
|
|
||||||
int check_libica()
|
|
||||||
{
|
|
||||||
unsigned int mech_len, i, k, found = 0;
|
|
||||||
libica_func_list_element *mech_list = NULL;
|
|
||||||
+ void *ibmca_dso;
|
|
||||||
+ ica_get_functionlist_t p_ica_get_functionlist;
|
|
||||||
int rc;
|
|
||||||
|
|
||||||
- rc = ica_get_functionlist(NULL, &mech_len);
|
|
||||||
+ ibmca_dso = dlopen(LIBICA_NAME, RTLD_NOW);
|
|
||||||
+ if (ibmca_dso == NULL) {
|
|
||||||
+ fprintf(stderr, "Failed to load libica '%s'!\n", LIBICA_NAME);
|
|
||||||
+ return 77;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ p_ica_get_functionlist =
|
|
||||||
+ (ica_get_functionlist_t)dlsym(ibmca_dso, "ica_get_functionlist");
|
|
||||||
+ if (p_ica_get_functionlist == NULL) {
|
|
||||||
+ fprintf(stderr, "Failed to get ica_get_functionlist from '%s'!\n",
|
|
||||||
+ LIBICA_NAME);
|
|
||||||
+ return 77;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ rc = p_ica_get_functionlist(NULL, &mech_len);
|
|
||||||
if (rc != 0) {
|
|
||||||
fprintf(stderr, "Failed to get function list from libica!\n");
|
|
||||||
return 77;
|
|
||||||
@@ -806,7 +826,7 @@ int check_libica()
|
|
||||||
return 77;
|
|
||||||
}
|
|
||||||
|
|
||||||
- rc = ica_get_functionlist(mech_list, &mech_len);
|
|
||||||
+ rc = p_ica_get_functionlist(mech_list, &mech_len);
|
|
||||||
if (rc != 0) {
|
|
||||||
fprintf(stderr, "Failed to get function list from libica!\n");
|
|
||||||
free(mech_list);
|
|
||||||
diff --git a/test/provider/rsakey.c b/test/provider/rsakey.c
|
|
||||||
index 366b503..9d6a618 100644
|
|
||||||
--- a/test/provider/rsakey.c
|
|
||||||
+++ b/test/provider/rsakey.c
|
|
||||||
@@ -18,6 +18,7 @@
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <string.h>
|
|
||||||
+#include <dlfcn.h>
|
|
||||||
|
|
||||||
#include <openssl/conf.h>
|
|
||||||
#include <openssl/evp.h>
|
|
||||||
@@ -735,13 +736,32 @@ static const unsigned int required_ica_mechs[] = { RSA_ME, RSA_CRT };
|
|
||||||
static const unsigned int required_ica_mechs_len =
|
|
||||||
sizeof(required_ica_mechs) / sizeof(unsigned int);
|
|
||||||
|
|
||||||
+typedef unsigned int (*ica_get_functionlist_t)(libica_func_list_element *,
|
|
||||||
+ unsigned int *);
|
|
||||||
+
|
|
||||||
int check_libica()
|
|
||||||
{
|
|
||||||
unsigned int mech_len, i, k, found = 0;
|
|
||||||
libica_func_list_element *mech_list = NULL;
|
|
||||||
+ void *ibmca_dso;
|
|
||||||
+ ica_get_functionlist_t p_ica_get_functionlist;
|
|
||||||
int rc;
|
|
||||||
|
|
||||||
- rc = ica_get_functionlist(NULL, &mech_len);
|
|
||||||
+ ibmca_dso = dlopen(LIBICA_NAME, RTLD_NOW);
|
|
||||||
+ if (ibmca_dso == NULL) {
|
|
||||||
+ fprintf(stderr, "Failed to load libica '%s'!\n", LIBICA_NAME);
|
|
||||||
+ return 77;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ p_ica_get_functionlist =
|
|
||||||
+ (ica_get_functionlist_t)dlsym(ibmca_dso, "ica_get_functionlist");
|
|
||||||
+ if (p_ica_get_functionlist == NULL) {
|
|
||||||
+ fprintf(stderr, "Failed to get ica_get_functionlist from '%s'!\n",
|
|
||||||
+ LIBICA_NAME);
|
|
||||||
+ return 77;
|
|
||||||
+ }
|
|
||||||
+
|
|
||||||
+ rc = p_ica_get_functionlist(NULL, &mech_len);
|
|
||||||
if (rc != 0) {
|
|
||||||
fprintf(stderr, "Failed to get function list from libica!\n");
|
|
||||||
return 77;
|
|
||||||
@@ -753,7 +773,7 @@ int check_libica()
|
|
||||||
return 77;
|
|
||||||
}
|
|
||||||
|
|
||||||
- rc = ica_get_functionlist(mech_list, &mech_len);
|
|
||||||
+ rc = p_ica_get_functionlist(mech_list, &mech_len);
|
|
||||||
if (rc != 0) {
|
|
||||||
fprintf(stderr, "Failed to get function list from libica!\n");
|
|
||||||
free(mech_list);
|
|
@ -1,61 +0,0 @@
|
|||||||
From d2254c6641b1cf34d5f735f335edf9a05ddfd67e Mon Sep 17 00:00:00 2001
|
|
||||||
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
Date: Thu, 18 Jan 2024 16:35:14 +0100
|
|
||||||
Subject: [PATCH] test/provider: Explicitly initialize OpenSSL after setting
|
|
||||||
env vars.
|
|
||||||
|
|
||||||
When running with a libica version without commit
|
|
||||||
https://github.com/opencryptoki/libica/commit/42e197f61b298c6e6992b080c1923e7e85edea5a
|
|
||||||
it is necessary to explicitly initialize OpenSSL before loading libica. Because
|
|
||||||
otherwise libica's library constructor will initialize OpenSSL the first time,
|
|
||||||
which in turn will load the IBMCA provider, and it will fall into the same
|
|
||||||
problem as fixed by above libica commit, i.e. the provider won't be able to
|
|
||||||
get the supported algorithms from libica an thus will not register any
|
|
||||||
algorithms.
|
|
||||||
|
|
||||||
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
---
|
|
||||||
test/provider/dhkey.c | 2 ++
|
|
||||||
test/provider/eckey.c | 2 ++
|
|
||||||
test/provider/rsakey.c | 2 ++
|
|
||||||
3 files changed, 6 insertions(+)
|
|
||||||
|
|
||||||
diff --git a/test/provider/dhkey.c b/test/provider/dhkey.c
|
|
||||||
index 0ec2c03..b1270f5 100644
|
|
||||||
--- a/test/provider/dhkey.c
|
|
||||||
+++ b/test/provider/dhkey.c
|
|
||||||
@@ -461,6 +461,8 @@ int main(int argc, char **argv)
|
|
||||||
return 77;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CONFIG, NULL);
|
|
||||||
+
|
|
||||||
ret = check_libica();
|
|
||||||
if (ret != 0)
|
|
||||||
return ret;
|
|
||||||
diff --git a/test/provider/eckey.c b/test/provider/eckey.c
|
|
||||||
index b8f47b7..a65bea5 100644
|
|
||||||
--- a/test/provider/eckey.c
|
|
||||||
+++ b/test/provider/eckey.c
|
|
||||||
@@ -895,6 +895,8 @@ int main(int argc, char **argv)
|
|
||||||
return 77;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CONFIG, NULL);
|
|
||||||
+
|
|
||||||
ret = check_libica();
|
|
||||||
if (ret != 0)
|
|
||||||
return ret;
|
|
||||||
diff --git a/test/provider/rsakey.c b/test/provider/rsakey.c
|
|
||||||
index 9d6a618..874de6d 100644
|
|
||||||
--- a/test/provider/rsakey.c
|
|
||||||
+++ b/test/provider/rsakey.c
|
|
||||||
@@ -839,6 +839,8 @@ int main(int argc, char **argv)
|
|
||||||
return 77;
|
|
||||||
}
|
|
||||||
|
|
||||||
+ OPENSSL_init_crypto(OPENSSL_INIT_LOAD_CONFIG, NULL);
|
|
||||||
+
|
|
||||||
ret = check_libica();
|
|
||||||
if (ret != 0)
|
|
||||||
return ret;
|
|
@ -1,36 +0,0 @@
|
|||||||
From 4ea48e0682ff9a58340421dc9d896c7ca06a2621 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
Date: Mon, 13 May 2024 08:53:56 +0200
|
|
||||||
Subject: [PATCH] engine: Fix compile error on Fedora 40
|
|
||||||
|
|
||||||
ibmca_pkey.c:627:47: error: passing argument 2 of 'EVP_PKEY_meth_set_copy'
|
|
||||||
from incompatible pointer type [-Wincompatible-pointer-types]
|
|
||||||
627 | EVP_PKEY_meth_set_copy(ibmca_ed448_pmeth, ibmca_ed448_copy);
|
|
||||||
|
|
||||||
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
---
|
|
||||||
src/engine/ibmca_pkey.c | 4 ++--
|
|
||||||
1 file changed, 2 insertions(+), 2 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/engine/ibmca_pkey.c b/src/engine/ibmca_pkey.c
|
|
||||||
index 9c8de94c..6cd8fcd9 100644
|
|
||||||
--- a/src/engine/ibmca_pkey.c
|
|
||||||
+++ b/src/engine/ibmca_pkey.c
|
|
||||||
@@ -258,7 +258,7 @@ static int ibmca_x448_derive(EVP_PKEY_CTX *pkey_ctx, unsigned char *key, size_t
|
|
||||||
|
|
||||||
/* ED25519 */
|
|
||||||
|
|
||||||
-static int ibmca_ed25519_copy(EVP_PKEY_CTX *to, EVP_PKEY_CTX *from)
|
|
||||||
+static int ibmca_ed25519_copy(EVP_PKEY_CTX *to, const EVP_PKEY_CTX *from)
|
|
||||||
{
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
@@ -402,7 +402,7 @@ static int ibmca_ed25519_verify(EVP_MD_CTX *md_ctx, const unsigned char *sig,
|
|
||||||
|
|
||||||
/* ED448 */
|
|
||||||
|
|
||||||
-static int ibmca_ed448_copy(EVP_PKEY_CTX *to, EVP_PKEY_CTX *from)
|
|
||||||
+static int ibmca_ed448_copy(EVP_PKEY_CTX *to, const EVP_PKEY_CTX *from)
|
|
||||||
{
|
|
||||||
return 1;
|
|
||||||
}
|
|
@ -1,170 +0,0 @@
|
|||||||
From e544577b41f22533d6e6188fc7fad22845d5e6ee Mon Sep 17 00:00:00 2001
|
|
||||||
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
Date: Mon, 3 Feb 2025 13:36:47 +0100
|
|
||||||
Subject: [PATCH] provider: Fix segfault with 'openssl list -key-managers
|
|
||||||
-verbose'
|
|
||||||
|
|
||||||
Command 'openssl list -key-managers -verbose' calls OpenSSL function
|
|
||||||
EVP_KEYMGMT_gen_settable_params() which in turn calls the provider's
|
|
||||||
gen_settable_params() function, but with NULL for the keygen operation
|
|
||||||
context. This causes segfaults in IBMCAs gen_settable_params() functions,
|
|
||||||
as they assume that the keygen operation context is not NULL.
|
|
||||||
|
|
||||||
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
---
|
|
||||||
src/provider/dh_keymgmt.c | 51 ++++++++++++++++++++++++++++++++++----
|
|
||||||
src/provider/rsa_keymgmt.c | 31 +++++++++++++++++------
|
|
||||||
2 files changed, 70 insertions(+), 12 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/provider/dh_keymgmt.c b/src/provider/dh_keymgmt.c
|
|
||||||
index d4d68bf..5e7e952 100644
|
|
||||||
--- a/src/provider/dh_keymgmt.c
|
|
||||||
+++ b/src/provider/dh_keymgmt.c
|
|
||||||
@@ -43,6 +43,8 @@ static OSSL_FUNC_keymgmt_gen_set_template_fn ibmca_keymgmt_dh_gen_set_template;
|
|
||||||
static OSSL_FUNC_keymgmt_gen_set_params_fn ibmca_keymgmt_dh_gen_set_params;
|
|
||||||
static OSSL_FUNC_keymgmt_gen_settable_params_fn
|
|
||||||
ibmca_keymgmt_dh_gen_settable_params;
|
|
||||||
+static OSSL_FUNC_keymgmt_gen_settable_params_fn
|
|
||||||
+ ibmca_keymgmt_dhx_gen_settable_params;
|
|
||||||
static OSSL_FUNC_keymgmt_gen_fn ibmca_keymgmt_dh_gen;
|
|
||||||
static OSSL_FUNC_keymgmt_has_fn ibmca_keymgmt_dh_has;
|
|
||||||
static OSSL_FUNC_keymgmt_match_fn ibmca_keymgmt_dh_match;
|
|
||||||
@@ -529,23 +531,62 @@ static int ibmca_keymgmt_dh_gen_set_params(void *vgenctx,
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
+static const OSSL_PARAM ibmca_dh_op_ctx_settable_params[] = {
|
|
||||||
+ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_TYPE, NULL, 0),
|
|
||||||
+ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0),
|
|
||||||
+ OSSL_PARAM_int(OSSL_PKEY_PARAM_DH_PRIV_LEN, NULL),
|
|
||||||
+ OSSL_PARAM_size_t(OSSL_PKEY_PARAM_FFC_PBITS, NULL),
|
|
||||||
+ OSSL_PARAM_int(OSSL_PKEY_PARAM_DH_GENERATOR, NULL),
|
|
||||||
+ OSSL_PARAM_END
|
|
||||||
+};
|
|
||||||
+
|
|
||||||
+static const OSSL_PARAM ibmca_dhx_op_ctx_settable_params[] = {
|
|
||||||
+ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_TYPE, NULL, 0),
|
|
||||||
+ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_GROUP_NAME, NULL, 0),
|
|
||||||
+ OSSL_PARAM_int(OSSL_PKEY_PARAM_DH_PRIV_LEN, NULL),
|
|
||||||
+ OSSL_PARAM_size_t(OSSL_PKEY_PARAM_FFC_PBITS, NULL),
|
|
||||||
+ OSSL_PARAM_size_t(OSSL_PKEY_PARAM_FFC_QBITS, NULL),
|
|
||||||
+ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_DIGEST, NULL, 0),
|
|
||||||
+ OSSL_PARAM_utf8_string(OSSL_PKEY_PARAM_FFC_DIGEST_PROPS, NULL, 0),
|
|
||||||
+ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_GINDEX, NULL),
|
|
||||||
+ OSSL_PARAM_octet_string(OSSL_PKEY_PARAM_FFC_SEED, NULL, 0),
|
|
||||||
+ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_PCOUNTER, NULL),
|
|
||||||
+ OSSL_PARAM_int(OSSL_PKEY_PARAM_FFC_H, NULL),
|
|
||||||
+ OSSL_PARAM_END
|
|
||||||
+};
|
|
||||||
+
|
|
||||||
static const OSSL_PARAM *ibmca_keymgmt_dh_gen_settable_params(void *vgenctx,
|
|
||||||
void *vprovctx)
|
|
||||||
{
|
|
||||||
const struct ibmca_op_ctx *genctx = vgenctx;
|
|
||||||
const struct ibmca_prov_ctx *provctx = vprovctx;
|
|
||||||
- const OSSL_PARAM *p, *params;
|
|
||||||
+ const OSSL_PARAM *params, *p;
|
|
||||||
|
|
||||||
UNUSED(genctx);
|
|
||||||
|
|
||||||
if (provctx == NULL)
|
|
||||||
return NULL;
|
|
||||||
|
|
||||||
- if (genctx->dh.gen.pctx == NULL)
|
|
||||||
- return NULL;
|
|
||||||
+ params = ibmca_dh_op_ctx_settable_params;
|
|
||||||
+ for (p = params; p != NULL && p->key != NULL; p++)
|
|
||||||
+ ibmca_debug_ctx(provctx, "param: %s", p->key);
|
|
||||||
|
|
||||||
- params = EVP_PKEY_CTX_settable_params(genctx->dh.gen.pctx);
|
|
||||||
+ return params;
|
|
||||||
+}
|
|
||||||
|
|
||||||
+static const OSSL_PARAM *ibmca_keymgmt_dhx_gen_settable_params(void *vgenctx,
|
|
||||||
+ void *vprovctx)
|
|
||||||
+{
|
|
||||||
+ const struct ibmca_op_ctx *genctx = vgenctx;
|
|
||||||
+ const struct ibmca_prov_ctx *provctx = vprovctx;
|
|
||||||
+ const OSSL_PARAM *params, *p;
|
|
||||||
+
|
|
||||||
+ UNUSED(genctx);
|
|
||||||
+
|
|
||||||
+ if (provctx == NULL)
|
|
||||||
+ return NULL;
|
|
||||||
+
|
|
||||||
+ params = ibmca_dhx_op_ctx_settable_params;
|
|
||||||
for (p = params; p != NULL && p->key != NULL; p++)
|
|
||||||
ibmca_debug_ctx(provctx, "param: %s", p->key);
|
|
||||||
|
|
||||||
@@ -1964,7 +2005,7 @@ static const OSSL_DISPATCH ibmca_dhx_keymgmt_functions[] = {
|
|
||||||
{ OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS,
|
|
||||||
(void (*)(void))ibmca_keymgmt_dh_gen_set_params },
|
|
||||||
{ OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS,
|
|
||||||
- (void (*)(void))ibmca_keymgmt_dh_gen_settable_params },
|
|
||||||
+ (void (*)(void))ibmca_keymgmt_dhx_gen_settable_params },
|
|
||||||
{ OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))ibmca_keymgmt_dh_gen },
|
|
||||||
{ OSSL_FUNC_KEYMGMT_GEN_CLEANUP,
|
|
||||||
(void (*)(void))ibmca_keymgmt_gen_cleanup },
|
|
||||||
diff --git a/src/provider/rsa_keymgmt.c b/src/provider/rsa_keymgmt.c
|
|
||||||
index ce49c88..2d7570a 100644
|
|
||||||
--- a/src/provider/rsa_keymgmt.c
|
|
||||||
+++ b/src/provider/rsa_keymgmt.c
|
|
||||||
@@ -53,6 +53,8 @@ static OSSL_FUNC_keymgmt_gen_set_template_fn ibmca_keymgmt_rsa_gen_set_template;
|
|
||||||
static OSSL_FUNC_keymgmt_gen_set_params_fn ibmca_keymgmt_rsa_gen_set_params;
|
|
||||||
static OSSL_FUNC_keymgmt_gen_settable_params_fn
|
|
||||||
ibmca_keymgmt_rsa_gen_settable_params;
|
|
||||||
+static OSSL_FUNC_keymgmt_gen_settable_params_fn
|
|
||||||
+ ibmca_keymgmt_rsa_pss_gen_settable_params;
|
|
||||||
static OSSL_FUNC_keymgmt_gen_fn ibmca_keymgmt_rsa_gen;
|
|
||||||
static OSSL_FUNC_keymgmt_has_fn ibmca_keymgmt_rsa_has;
|
|
||||||
static OSSL_FUNC_keymgmt_match_fn ibmca_keymgmt_rsa_match;
|
|
||||||
@@ -1071,19 +1073,34 @@ static const OSSL_PARAM *ibmca_keymgmt_rsa_gen_settable_params(void *vgenctx,
|
|
||||||
{
|
|
||||||
const struct ibmca_op_ctx *genctx = vgenctx;
|
|
||||||
const struct ibmca_prov_ctx *provctx = vprovctx;
|
|
||||||
-
|
|
||||||
const OSSL_PARAM *params, *p;
|
|
||||||
|
|
||||||
+ UNUSED(genctx);
|
|
||||||
+
|
|
||||||
if (provctx == NULL)
|
|
||||||
return NULL;
|
|
||||||
|
|
||||||
- ibmca_debug_ctx(provctx, "type: %d", genctx->type);
|
|
||||||
+ params = ibmca_rsa_op_ctx_settable_params;
|
|
||||||
+ for (p = params; p != NULL && p->key != NULL; p++)
|
|
||||||
+ ibmca_debug_ctx(provctx, "param: %s", p->key);
|
|
||||||
|
|
||||||
- if (genctx->type == EVP_PKEY_RSA_PSS)
|
|
||||||
- params = ibmca_rsa_pss_op_ctx_settable_params;
|
|
||||||
- else
|
|
||||||
- params = ibmca_rsa_op_ctx_settable_params;
|
|
||||||
+ return params;
|
|
||||||
+}
|
|
||||||
|
|
||||||
+static const OSSL_PARAM *ibmca_keymgmt_rsa_pss_gen_settable_params(
|
|
||||||
+ void *vgenctx,
|
|
||||||
+ void *vprovctx)
|
|
||||||
+{
|
|
||||||
+ const struct ibmca_op_ctx *genctx = vgenctx;
|
|
||||||
+ const struct ibmca_prov_ctx *provctx = vprovctx;
|
|
||||||
+ const OSSL_PARAM *params, *p;
|
|
||||||
+
|
|
||||||
+ UNUSED(genctx);
|
|
||||||
+
|
|
||||||
+ if (provctx == NULL)
|
|
||||||
+ return NULL;
|
|
||||||
+
|
|
||||||
+ params = ibmca_rsa_pss_op_ctx_settable_params;
|
|
||||||
for (p = params; p != NULL && p->key != NULL; p++)
|
|
||||||
ibmca_debug_ctx(provctx, "param: %s", p->key);
|
|
||||||
|
|
||||||
@@ -2256,7 +2273,7 @@ static const OSSL_DISPATCH ibmca_rsapss_keymgmt_functions[] = {
|
|
||||||
{ OSSL_FUNC_KEYMGMT_GEN_SET_PARAMS,
|
|
||||||
(void (*)(void))ibmca_keymgmt_rsa_gen_set_params },
|
|
||||||
{ OSSL_FUNC_KEYMGMT_GEN_SETTABLE_PARAMS,
|
|
||||||
- (void (*)(void))ibmca_keymgmt_rsa_gen_settable_params },
|
|
||||||
+ (void (*)(void))ibmca_keymgmt_rsa_pss_gen_settable_params },
|
|
||||||
{ OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))ibmca_keymgmt_rsa_gen },
|
|
||||||
{ OSSL_FUNC_KEYMGMT_GEN_CLEANUP,
|
|
||||||
(void (*)(void))ibmca_keymgmt_gen_cleanup },
|
|
@ -1,80 +0,0 @@
|
|||||||
From 85b8c528759df2ef09028bc49a5ec103142820fb Mon Sep 17 00:00:00 2001
|
|
||||||
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
Date: Wed, 5 Feb 2025 10:16:17 +0100
|
|
||||||
Subject: [PATCH] provider: Fix segfault with 'openssl list
|
|
||||||
-signature-algorithms -verbose'
|
|
||||||
|
|
||||||
Command 'openssl list -signature-algorithms -verbose' calls OpenSSL function
|
|
||||||
EVP_SIGNATURE_settable_ctx_params() which in turn calls the provider's
|
|
||||||
settable_ctx_params() function, but with NULL for the operation
|
|
||||||
context. This causes segfaults in IBMCAs settable_ctx_params() functions,
|
|
||||||
as they assume that the operation context is not NULL.
|
|
||||||
|
|
||||||
While at it, make sure that the settable/gettable_ctx_md_params() functions
|
|
||||||
do not crash if called with a NULL context.
|
|
||||||
|
|
||||||
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
---
|
|
||||||
src/provider/ec_signature.c | 2 +-
|
|
||||||
src/provider/p_context.c | 14 ++++++++------
|
|
||||||
src/provider/rsa_signature.c | 2 +-
|
|
||||||
3 files changed, 10 insertions(+), 8 deletions(-)
|
|
||||||
|
|
||||||
diff --git a/src/provider/ec_signature.c b/src/provider/ec_signature.c
|
|
||||||
index 8d87ddd9..069601e3 100644
|
|
||||||
--- a/src/provider/ec_signature.c
|
|
||||||
+++ b/src/provider/ec_signature.c
|
|
||||||
@@ -823,7 +823,7 @@ static const OSSL_PARAM *ibmca_signature_ec_settable_ctx_params(
|
|
||||||
|
|
||||||
ibmca_debug_ctx(provctx, "ctx: %p", ctx);
|
|
||||||
|
|
||||||
- if (ctx->ec.signature.set_md_allowed)
|
|
||||||
+ if (ctx == NULL || ctx->ec.signature.set_md_allowed)
|
|
||||||
params = ibmca_signature_ec_settable_params;
|
|
||||||
else
|
|
||||||
params = ibmca_signature_ec_settable_params_no_digest;
|
|
||||||
diff --git a/src/provider/p_context.c b/src/provider/p_context.c
|
|
||||||
index 135690e7..58285ba9 100644
|
|
||||||
--- a/src/provider/p_context.c
|
|
||||||
+++ b/src/provider/p_context.c
|
|
||||||
@@ -392,9 +392,10 @@ const OSSL_PARAM *ibmca_gettable_ctx_md_params(const struct ibmca_op_ctx *ctx,
|
|
||||||
ibmca_debug_op_ctx(ctx, "ctx: %p", ctx);
|
|
||||||
|
|
||||||
if (md == NULL) {
|
|
||||||
- put_error_op_ctx(ctx, IBMCA_ERR_INVALID_PARAM,
|
|
||||||
- "Digest sign/verify context not initialized");
|
|
||||||
- return 0;
|
|
||||||
+ if (ctx != NULL)
|
|
||||||
+ put_error_op_ctx(ctx, IBMCA_ERR_INVALID_PARAM,
|
|
||||||
+ "Digest sign/verify context not initialized");
|
|
||||||
+ return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
params = EVP_MD_gettable_ctx_params(md);
|
|
||||||
@@ -413,9 +414,10 @@ const OSSL_PARAM *ibmca_settable_ctx_md_params(const struct ibmca_op_ctx *ctx,
|
|
||||||
ibmca_debug_op_ctx(ctx, "ctx: %p", ctx);
|
|
||||||
|
|
||||||
if (md == NULL) {
|
|
||||||
- put_error_op_ctx(ctx, IBMCA_ERR_INVALID_PARAM,
|
|
||||||
- "Digest sign/verify context not initialized");
|
|
||||||
- return 0;
|
|
||||||
+ if (ctx != NULL)
|
|
||||||
+ put_error_op_ctx(ctx, IBMCA_ERR_INVALID_PARAM,
|
|
||||||
+ "Digest sign/verify context not initialized");
|
|
||||||
+ return NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
params = EVP_MD_settable_ctx_params(md);
|
|
||||||
diff --git a/src/provider/rsa_signature.c b/src/provider/rsa_signature.c
|
|
||||||
index f7a0a91b..617bb999 100644
|
|
||||||
--- a/src/provider/rsa_signature.c
|
|
||||||
+++ b/src/provider/rsa_signature.c
|
|
||||||
@@ -1814,7 +1814,7 @@ static const OSSL_PARAM *ibmca_signature_rsa_settable_ctx_params(
|
|
||||||
|
|
||||||
ibmca_debug_ctx(provctx, "ctx: %p", ctx);
|
|
||||||
|
|
||||||
- if (ctx->rsa.signature.set_md_allowed)
|
|
||||||
+ if (ctx == NULL || ctx->rsa.signature.set_md_allowed)
|
|
||||||
params = ibmca_signature_rsa_settable_params;
|
|
||||||
else
|
|
||||||
params = ibmca_signature_rsa_settable_params_no_digest;
|
|
@ -1,52 +0,0 @@
|
|||||||
From 6bc53d814762b24045bfd5bb6003949a163fa58b Mon Sep 17 00:00:00 2001
|
|
||||||
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
Date: Tue, 18 Feb 2025 09:00:59 +0100
|
|
||||||
Subject: [PATCH] engine: Do not report errors if libica does not support EC
|
|
||||||
key
|
|
||||||
|
|
||||||
In case EC key creation using libica fails (for whatever reason), and
|
|
||||||
the software fallback is used to perform the operation, do not report
|
|
||||||
the errors that have been put to the error stack by the failing attempt
|
|
||||||
to use libica.
|
|
||||||
|
|
||||||
Fixes: a462093d2478b287cb9a7a25131788eba16b7640
|
|
||||||
|
|
||||||
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
---
|
|
||||||
src/engine/ibmca_ec.c | 6 ++++++
|
|
||||||
1 file changed, 6 insertions(+)
|
|
||||||
|
|
||||||
diff --git a/src/engine/ibmca_ec.c b/src/engine/ibmca_ec.c
|
|
||||||
index 5206ae3..c264f32 100644
|
|
||||||
--- a/src/engine/ibmca_ec.c
|
|
||||||
+++ b/src/engine/ibmca_ec.c
|
|
||||||
@@ -337,7 +337,9 @@ int ibmca_ecdh_compute_key(unsigned char **pout, size_t *poutlen,
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Create ICA_EC_KEY object for private key */
|
|
||||||
+ ERR_set_mark();
|
|
||||||
ica_privkey = ibmca_ec_make_and_cache_ica_key((EC_KEY*)ecdh, &privlen);
|
|
||||||
+ ERR_pop_to_mark();
|
|
||||||
if (ica_privkey == NULL) {
|
|
||||||
/* This curve is not supported by libica. */
|
|
||||||
#ifdef OLDER_OPENSSL
|
|
||||||
@@ -502,7 +504,9 @@ ECDSA_SIG *ibmca_ecdsa_sign_sig(const unsigned char *dgst, int dgst_len,
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Create ICA_EC_KEY object */
|
|
||||||
+ ERR_set_mark();
|
|
||||||
icakey = ibmca_ec_make_and_cache_ica_key(eckey, &privlen);
|
|
||||||
+ ERR_pop_to_mark();
|
|
||||||
if (icakey == NULL) {
|
|
||||||
/* This curve is not supported by libica. */
|
|
||||||
#ifdef OLDER_OPENSSL
|
|
||||||
@@ -633,7 +637,9 @@ int ibmca_ecdsa_verify_sig(const unsigned char *dgst, int dgst_len,
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Create ICA_EC_KEY object */
|
|
||||||
+ ERR_set_mark();
|
|
||||||
icakey = ibmca_ec_make_and_cache_ica_key(eckey, &privlen);
|
|
||||||
+ ERR_pop_to_mark();
|
|
||||||
if (icakey == NULL) {
|
|
||||||
/* This curve is not supported by libica. */
|
|
||||||
#ifdef OLDER_OPENSSL
|
|
@ -1,29 +0,0 @@
|
|||||||
From 5cdcbf0d5b7169a60826c7c0893d7f59798fc409 Mon Sep 17 00:00:00 2001
|
|
||||||
From: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
Date: Wed, 19 Feb 2025 13:48:12 +0100
|
|
||||||
Subject: [PATCH] Fix compiler error for undefined ERR_pop_to_mark
|
|
||||||
|
|
||||||
ibmca_ec.c:342:5: error: implicit declaration of function
|
|
||||||
'ERR_pop_to_mark' [-Wimplicit-function-declaration]
|
|
||||||
342 | ERR_pop_to_mark();
|
|
||||||
| ^~~~~~~~~~~~~~~
|
|
||||||
|
|
||||||
Fixes: 6bc53d814762b24045bfd5bb6003949a163fa58b
|
|
||||||
|
|
||||||
Signed-off-by: Ingo Franzki <ifranzki@linux.ibm.com>
|
|
||||||
---
|
|
||||||
src/engine/ibmca_ec.c | 1 +
|
|
||||||
1 file changed, 1 insertion(+)
|
|
||||||
|
|
||||||
diff --git a/src/engine/ibmca_ec.c b/src/engine/ibmca_ec.c
|
|
||||||
index c264f32..1bbb37e 100644
|
|
||||||
--- a/src/engine/ibmca_ec.c
|
|
||||||
+++ b/src/engine/ibmca_ec.c
|
|
||||||
@@ -17,6 +17,7 @@
|
|
||||||
|
|
||||||
#include <stdlib.h>
|
|
||||||
#include <pthread.h>
|
|
||||||
+#include <openssl/err.h>
|
|
||||||
#include "ibmca.h"
|
|
||||||
#include "e_ibmca_err.h"
|
|
||||||
|
|
@ -1,40 +1,3 @@
|
|||||||
-------------------------------------------------------------------
|
|
||||||
Wed Feb 19 13:25:55 UTC 2025 - Nikolay Gueorguiev <nikolay.gueorguiev@suse.com>
|
|
||||||
|
|
||||||
- Applied additonal patches(bsc#1237344)
|
|
||||||
* openssl-ibmca-07-engine-Fix-Do-not-report-errors-if-libica-does-not-support-EC.patch
|
|
||||||
* openssl-ibmca-08-Fix-compiler-error-for-undefined-ERR_pop_to_mark.patch
|
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
Wed Feb 5 10:28:31 UTC 2025 - Nikolay Gueorguiev <nikolay.gueorguiev@suse.com>
|
|
||||||
|
|
||||||
- Applied additional patch (bsc#1236770)
|
|
||||||
* openssl-ibmca-06-Provider-Fix-segfault-with-openssl-list-signature-algorithms-verbose.patch
|
|
||||||
for Provider: Fix segfault with 'openssl list -signature-algorithms -verbose'
|
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
Tue Feb 4 09:00:25 UTC 2025 - Nikolay Gueorguiev <nikolay.gueorguiev@suse.com>
|
|
||||||
|
|
||||||
- Applied a patch (bsc#1236770)
|
|
||||||
* openssl-ibmca-05-provider-Fix-segfault-with-openssl-list-key-managers.patch
|
|
||||||
for openssl list -key-managers -verbose causes core dump
|
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
Wed Oct 30 08:35:12 UTC 2024 - Nikolay Gueorguiev <nikolay.gueorguiev@suse.com>
|
|
||||||
|
|
||||||
- Adapted the openssl-ibmca package for the openssl-1_1 removal(bsc#1232570)
|
|
||||||
- Removed obsolete patch
|
|
||||||
* openssl1-rename-libica-files.patch
|
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
|
||||||
Tue Oct 29 11:08:46 UTC 2024 - Nikolay Gueorguiev <nikolay.gueorguiev@suse.com>
|
|
||||||
|
|
||||||
- Applied patches(jsc#PED-10292)
|
|
||||||
* openssl-ibmca-01-engine-Enable-external-AES-GCM-IV-when-libica-is-in-FIPS-mode.patch
|
|
||||||
* openssl-ibmca-02-test-provider-Do-not-link-against-libica-use-dlopen-instead.patch
|
|
||||||
* openssl-ibmca-03-test-provider-Explicitly-initialize-OpenSSL-after-setting-env-vars.patch
|
|
||||||
* openssl-ibmca-04-engine-Fix-compile-error.patch
|
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue Jul 16 06:11:44 UTC 2024 - Nikolay Gueorguiev <nikolay.gueorguiev@suse.com>
|
Tue Jul 16 06:11:44 UTC 2024 - Nikolay Gueorguiev <nikolay.gueorguiev@suse.com>
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#
|
#
|
||||||
# spec file for package openssl-ibmca
|
# spec file for package openssl-ibmca
|
||||||
#
|
#
|
||||||
# Copyright (c) 2025 SUSE LLC
|
# Copyright (c) 2024 SUSE LLC
|
||||||
#
|
#
|
||||||
# All modifications and additions to the file contributed by third parties
|
# All modifications and additions to the file contributed by third parties
|
||||||
# remain the property of their copyright owners, unless otherwise agreed
|
# remain the property of their copyright owners, unless otherwise agreed
|
||||||
@ -36,6 +36,12 @@ Name: openssl-ibmca-engine
|
|||||||
Name: openssl-ibmca-provider
|
Name: openssl-ibmca-provider
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
|
%if "%{flavor}" == "openssl1_1"
|
||||||
|
%global sslengcnf %{_sysconfdir}/ssl/engines1.1.d
|
||||||
|
%global sslengdef %{_sysconfdir}/ssl/engdef1.1.d
|
||||||
|
Name: openssl1_1-ibmca
|
||||||
|
%endif
|
||||||
|
|
||||||
Version: 2.4.1
|
Version: 2.4.1
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: The IBMCA OpenSSL dynamic engine
|
Summary: The IBMCA OpenSSL dynamic engine
|
||||||
@ -50,25 +56,28 @@ BuildRequires: autoconf
|
|||||||
BuildRequires: automake
|
BuildRequires: automake
|
||||||
BuildRequires: libtool
|
BuildRequires: libtool
|
||||||
###
|
###
|
||||||
|
%if "%{flavor}" != "openssl1_1"
|
||||||
BuildRequires: libica-devel >= 4.0.0
|
BuildRequires: libica-devel >= 4.0.0
|
||||||
BuildRequires: libica-tools >= 4.0.0
|
BuildRequires: libica-tools >= 4.0.0
|
||||||
BuildRequires: libopenssl-3-devel
|
BuildRequires: libopenssl-3-devel
|
||||||
BuildRequires: libopenssl3
|
BuildRequires: libopenssl3
|
||||||
Requires: libica4 >= 4.0.0
|
Requires: libica4 >= 4.0.0
|
||||||
Requires: libopenssl3
|
Requires: libopenssl3
|
||||||
|
%else
|
||||||
|
BuildRequires: libica-openssl1_1-devel
|
||||||
|
BuildRequires: libica-openssl1_1-tools
|
||||||
|
BuildRequires: libopenssl-1_1-devel
|
||||||
|
BuildRequires: libopenssl1_1
|
||||||
|
BuildRequires: openssl
|
||||||
|
Requires: libica4-openssl1_1
|
||||||
|
Requires: libopenssl1_1
|
||||||
|
%endif
|
||||||
###
|
###
|
||||||
ExclusiveArch: s390x
|
ExclusiveArch: s390x
|
||||||
|
|
||||||
###
|
%if "%{flavor}" == "openssl1_1"
|
||||||
Patch10: openssl-ibmca-01-engine-Enable-external-AES-GCM-IV-when-libica-is-in-FIPS-mode.patch
|
Patch001: openssl1-rename-libica-files.patch
|
||||||
Patch11: openssl-ibmca-02-test-provider-Do-not-link-against-libica-use-dlopen-instead.patch
|
%endif
|
||||||
Patch12: openssl-ibmca-03-test-provider-Explicitly-initialize-OpenSSL-after-setting-env-vars.patch
|
|
||||||
Patch13: openssl-ibmca-04-engine-Fix-compile-error.patch
|
|
||||||
Patch14: openssl-ibmca-05-provider-Fix-segfault-with-openssl-list-key-managers.patch
|
|
||||||
Patch15: openssl-ibmca-06-Provider-Fix-segfault-with-openssl-list-signature-algorithms-verbose.patch
|
|
||||||
Patch16: openssl-ibmca-07-engine-Fix-Do-not-report-errors-if-libica-does-not-support-EC.patch
|
|
||||||
Patch17: openssl-ibmca-08-Fix-compiler-error-for-undefined-ERR_pop_to_mark.patch
|
|
||||||
###
|
|
||||||
|
|
||||||
%description
|
%description
|
||||||
This package contains a shared object OpenSSL dynamic engine which interfaces
|
This package contains a shared object OpenSSL dynamic engine which interfaces
|
||||||
@ -100,6 +109,11 @@ export CPPFLAGS="%{optflags}"
|
|||||||
--libdir=%{modulesdir}
|
--libdir=%{modulesdir}
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
|
%if "%{flavor}" == "openssl1_1"
|
||||||
|
%configure \
|
||||||
|
--libdir=%{enginesdir}
|
||||||
|
%endif
|
||||||
|
|
||||||
%make_build
|
%make_build
|
||||||
|
|
||||||
%install
|
%install
|
||||||
@ -111,6 +125,10 @@ sed -i -e "/^dynamic_path/s, = .*/, = %{enginesdir}/," src/engine/openssl.cnf.sa
|
|||||||
|
|
||||||
%make_install
|
%make_install
|
||||||
|
|
||||||
|
%if "%{flavor}" == "openssl1_1"
|
||||||
|
rm -f %{buildroot}/%{enginesdir}/ibmca-provider.*
|
||||||
|
%endif
|
||||||
|
|
||||||
%if "%{flavor}" == ""
|
%if "%{flavor}" == ""
|
||||||
mkdir -p %{buildroot}/%{enginesdir}
|
mkdir -p %{buildroot}/%{enginesdir}
|
||||||
mv %{buildroot}/%{modulesdir}/ibmca.* %{buildroot}/%{enginesdir}/
|
mv %{buildroot}/%{modulesdir}/ibmca.* %{buildroot}/%{enginesdir}/
|
||||||
@ -184,5 +202,10 @@ fi
|
|||||||
%{enginesdir}/ibmca.*
|
%{enginesdir}/ibmca.*
|
||||||
%{_mandir}/man5/ibmca.5%{?ext_man}
|
%{_mandir}/man5/ibmca.5%{?ext_man}
|
||||||
%endif
|
%endif
|
||||||
|
%if "%{flavor}" == "openssl1_1"
|
||||||
|
%doc src/engine/openssl.cnf.sample
|
||||||
|
%{enginesdir}/ibmca.*
|
||||||
|
%{_mandir}/man5/ibmca.5%{?ext_man}
|
||||||
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
65
openssl1-rename-libica-files.patch
Normal file
65
openssl1-rename-libica-files.patch
Normal file
@ -0,0 +1,65 @@
|
|||||||
|
--- openssl-ibmca-2.4.1/configure.ac 2023-09-21 08:52:43.000000000 +0200
|
||||||
|
+++ changed/configure.ac 2024-04-17 10:13:02.267582864 +0200
|
||||||
|
@@ -69,7 +69,7 @@
|
||||||
|
# Checks for header files.
|
||||||
|
AC_CHECK_HEADERS([arpa/inet.h fcntl.h malloc.h netdb.h netinet/in.h stddef.h stdlib.h \
|
||||||
|
string.h strings.h sys/ioctl.h sys/param.h sys/socket.h sys/time.h unistd.h])
|
||||||
|
-AC_CHECK_HEADER([ica_api.h], [], AC_MSG_ERROR([*** libica-devel >= 3.6.0 is required ***]))
|
||||||
|
+AC_CHECK_HEADER([ica_api.h], [], AC_MSG_ERROR([*** libica-openssl1_1-devel >= 3.6.0 is required ***]))
|
||||||
|
|
||||||
|
|
||||||
|
# Checks for typedefs, structures, and compiler characteristics.
|
||||||
|
@@ -81,15 +81,15 @@
|
||||||
|
# Checks for library functions.
|
||||||
|
AC_CHECK_FUNCS([gethostbyaddr gethostbyname memset strcasecmp strncasecmp strstr malloc])
|
||||||
|
AC_CHECK_DECLS([ICA_FLAG_DHW,DES_ECB], [],
|
||||||
|
- AC_MSG_ERROR([*** libica-devel >= 3.6.0 are required ***]),
|
||||||
|
+ AC_MSG_ERROR([*** libica-openssl1_1-devel >= 3.6.0 are required ***]),
|
||||||
|
[#include <ica_api.h>])
|
||||||
|
AC_CHECK_DECLS([OSSL_ASYM_CIPHER_PARAM_IMPLICIT_REJECTION],
|
||||||
|
[openssl_implicit_rejection="yes"], [openssl_implicit_rejection="no"],
|
||||||
|
[#include <openssl/core_names.h>])
|
||||||
|
AM_CONDITIONAL([OPENSSL_IMPLICIT_REJECTION], [test "x$openssl_implicit_rejection" = xyes])
|
||||||
|
|
||||||
|
-AC_ARG_WITH([libica-cex],
|
||||||
|
- [AS_HELP_STRING([--with-libica-cex],[Use libica-cex as default library for the IBMCA engine])],
|
||||||
|
+AC_ARG_WITH([libica-openssl1_1-cex],
|
||||||
|
+ [AS_HELP_STRING([--with-libica-openssl1_1-cex],[Use libica-openssl1_1-cex as default library for the IBMCA engine])],
|
||||||
|
[usecexonly=${withval}],
|
||||||
|
[])
|
||||||
|
|
||||||
|
@@ -99,11 +99,11 @@
|
||||||
|
[libicaversion=4])
|
||||||
|
|
||||||
|
if test "x$usecexonly" = xyes; then
|
||||||
|
- defaultlib="libica-cex.so.$libicaversion"
|
||||||
|
- ica="ica-cex"
|
||||||
|
+ defaultlib="libica-openssl1_1-cex.so.$libicaversion"
|
||||||
|
+ ica="ica-openssl1_1-cex"
|
||||||
|
else
|
||||||
|
- defaultlib="libica.so.$libicaversion"
|
||||||
|
- ica="ica"
|
||||||
|
+ defaultlib="libica-openssl1_1.so.$libicaversion"
|
||||||
|
+ ica="ica-openssl1_1"
|
||||||
|
fi
|
||||||
|
# In cex-only mode, testing the ciphers does not make any sense since
|
||||||
|
# they will fall back to OpenSSL without the engine. So remove these
|
||||||
|
@@ -135,7 +135,7 @@
|
||||||
|
|
||||||
|
|
||||||
|
AC_DEFINE_UNQUOTED([LIBICA_SHARED_LIB],["$defaultlib"])
|
||||||
|
-AC_SUBST([ICA],["$ica"])
|
||||||
|
+AC_SUBST([ICA],["$ica-openssl1_1"])
|
||||||
|
|
||||||
|
AC_CHECK_PROG([openssl_var],[openssl],[yes],[no])
|
||||||
|
if test "x$openssl_var" != xyes; then
|
||||||
|
@@ -169,7 +169,7 @@
|
||||||
|
echo " default library: $defaultlib"
|
||||||
|
echo "IBMCA provider: $enable_provider"
|
||||||
|
if test "x$useproviderfulllibica" = xyes; then
|
||||||
|
- echo " libica library: libica"
|
||||||
|
+ echo " libica library: libica-openssl1_1"
|
||||||
|
else
|
||||||
|
- echo " libica library: libica-cex"
|
||||||
|
+ echo " libica library: libica-openssl1_1-cex"
|
||||||
|
fi
|
Loading…
x
Reference in New Issue
Block a user