forked from pool/openssl-1_1
ea11949bb4
- Update to 1.1.1a * Added EVP_PKEY_ECDH_KDF_X9_63 and ecdh_KDF_X9_63() as replacements for the EVP_PKEY_ECDH_KDF_X9_62 KDF type and ECDH_KDF_X9_62(). The old names are retained for backwards compatibility. * Fixed the issue that RAND_add()/RAND_seed() silently discards random input if its length exceeds 4096 bytes. The limit has been raised to a buffer size of two gigabytes and the error handling improved. - drop upstream patches: * 0001-Add-a-constant-time-flag-to-one-of-the-bignums-to-av.patch * 0001-DSA-Check-for-sanity-of-input-parameters.patch * 0001-DSA-mod-inverse-fix.patch * openssl-CVE-2018-0734.patch * openssl-CVE-2018-0735.patch OBS-URL: https://build.opensuse.org/request/show/650515 OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-1_1?expand=0&rev=26
12 lines
488 B
Plaintext
12 lines
488 B
Plaintext
-----BEGIN PGP SIGNATURE-----
|
|
|
|
iQEzBAABCgAdFiEEhlersmDwVrHlGQg52cTSbQ5gRJEFAlv0DbMACgkQ2cTSbQ5g
|
|
RJGUbggAl++4r/VsG6AN1h+yvJZuUtwE9mhTkiYvywhWOUOTdIJLzTUDaEhpgu6R
|
|
uFCbdL2wazXWYVFvCl5MRX9wHkSPWoC9WB6SJe7fMC+NngnPHjcfw9jGSLJneEFn
|
|
JaGyZMVaoiKelQpmlGRk8X2kLcdAe/c/L6WRvv89thxvlq2zJnjSH0UfqS9LOlP0
|
|
5tVeSz85JhyVoRSxGl/2GhYN2WrI0cY8JN2tz62ijnC/J/LX5KhP0y4Qvh9nqW+m
|
|
0apP+iabyUKdCabSjElEmLVg2CwieQYdN/gAQhpae4P6Qk0tC155xNbgDMgxVD+d
|
|
/rgBC9pXpM1za7WxAq4iQ6C9zFYapA==
|
|
=D+/A
|
|
-----END PGP SIGNATURE-----
|