forked from pool/openssl-1_1
ea11949bb4
- Update to 1.1.1a * Added EVP_PKEY_ECDH_KDF_X9_63 and ecdh_KDF_X9_63() as replacements for the EVP_PKEY_ECDH_KDF_X9_62 KDF type and ECDH_KDF_X9_62(). The old names are retained for backwards compatibility. * Fixed the issue that RAND_add()/RAND_seed() silently discards random input if its length exceeds 4096 bytes. The limit has been raised to a buffer size of two gigabytes and the error handling improved. - drop upstream patches: * 0001-Add-a-constant-time-flag-to-one-of-the-bignums-to-av.patch * 0001-DSA-Check-for-sanity-of-input-parameters.patch * 0001-DSA-mod-inverse-fix.patch * openssl-CVE-2018-0734.patch * openssl-CVE-2018-0735.patch OBS-URL: https://build.opensuse.org/request/show/650515 OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=26 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
baselibs.conf | ||
openssl-1_1.changes | ||
openssl-1_1.spec | ||
openssl-1.1.0-no-html.patch | ||
openssl-1.1.1a.tar.gz | ||
openssl-1.1.1a.tar.gz.asc | ||
openssl-DEFAULT_SUSE_cipher.patch | ||
openssl-no-date.patch | ||
openssl-pkgconfig.patch | ||
openssl-ppc64-config.patch | ||
openssl-truststore.patch | ||
openssl.keyring | ||
showciphers.c |