forked from pool/openssl-3
Pedro Monreal Gonzalez
6bc57d937f
* SHA-1 is not allowed anymore in FIPS 186-5 for signature verification operations. After 12/31/2030, NIST will disallow SHA-1 for all of its usages. * Add openssl-3-FIPS-Deny-SHA-1-sigver-in-FIPS-provider.patch - FIPS: RSA keygen PCT requirements. * Skip the rsa_keygen_pairwise_test() PCT in rsa_keygen() as the self-test requirements are covered by do_rsa_pct() for both RSA-OAEP and RSA signatures [bsc#1221760] * Enforce error state if rsa_keygen PCT is run and fails [bsc#1221753] * Add openssl-3-FIPS-PCT_rsa_keygen.patch - FIPS: Check that the fips provider is available before setting it as the default provider in FIPS mode. [bsc#1220523] * Rebase openssl-Force-FIPS.patch - FIPS: Port openssl to use jitterentropy [bsc#1220523] * Set the module in error state if the jitter RNG fails either on initialization or entropy gathering because health tests failed. * Add jitterentropy as a seeding source output also in crypto/info.c * Move the jitter entropy collector and the associated lock out of the header file to avoid redefinitions. * Add the fips_local.cnf symlink to the spec file. This simlink points to the openssl_fips.config file that is provided by the crypto-policies package. * Rebase openssl-3-jitterentropy-3.4.0.patch * Rebase openssl-FIPS-enforce-EMS-support.patch - FIPS: Block non-Approved Elliptic Curves [bsc#1221786] OBS-URL: https://build.opensuse.org/package/show/security:tls/openssl-3?expand=0&rev=110
33 lines
1.4 KiB
Diff
33 lines
1.4 KiB
Diff
Index: openssl-3.0.0-alpha5/util/perl/OpenSSL/config.pm
|
|
===================================================================
|
|
--- openssl-3.0.0-alpha5.orig/util/perl/OpenSSL/config.pm
|
|
+++ openssl-3.0.0-alpha5/util/perl/OpenSSL/config.pm
|
|
@@ -525,14 +525,19 @@ EOF
|
|
return { target => "linux-ppc64" } if $KERNEL_BITS eq '64';
|
|
|
|
my %config = ();
|
|
- if (!okrun('echo __LP64__',
|
|
- 'gcc -E -x c - 2>/dev/null',
|
|
- 'grep "^__LP64__" 2>&1 >/dev/null') ) {
|
|
- %config = ( cflags => [ '-m32' ],
|
|
- cxxflags => [ '-m32' ] );
|
|
- }
|
|
- return { target => "linux-ppc",
|
|
- %config };
|
|
+ # ##
|
|
+ # if (!okrun('echo __LP64__', 'gcc -E -x c - 2>/dev/null', 'grep "^__LP64__" 2>&1 >/dev/null') ) { %config = ( cflags => [ '-m32' ], cxxflags => [ '-m32' ] ); }
|
|
+ # return { target => "linux-ppc",
|
|
+ # %config };
|
|
+ # ##
|
|
+ if (okrun('echo __LP64__', 'gcc -E -x c - 2>/dev/null',
|
|
+ 'grep "^__LP64__" 2>&1 >/dev/null') )
|
|
+ {
|
|
+ return { target => "linux-ppc", %config };
|
|
+ } else {
|
|
+ return { target => "linux-ppc64", %config };
|
|
+ }
|
|
+ ##
|
|
}
|
|
],
|
|
[ 'ppc64le-.*-linux2', { target => "linux-ppc64le" } ],
|