commit openssl for openSUSE:Factory

2020-10-18 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2020-10-18 16:17:46

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new.3486 (New)


Package is "openssl"

Sun Oct 18 16:17:46 2020 rev:151 rq:836221 version:1.1.1h

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2020-04-27 
23:27:45.698279863 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new.3486/openssl.changes
2020-10-18 16:17:48.672394416 +0200
@@ -1,0 +2,5 @@
+Tue Sep 22 20:41:09 UTC 2020 - Vítězslav Čížek 
+
+- Update to 1.1.1h release
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.zhO26p/_old  2020-10-18 16:17:49.484394778 +0200
+++ /var/tmp/diff_new_pack.zhO26p/_new  2020-10-18 16:17:49.488394780 +0200
@@ -18,7 +18,7 @@
 
 %define _sonum  1_1
 Name:   openssl
-Version:1.1.1g
+Version:1.1.1h
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2020-04-27 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2020-04-27 23:27:41

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new.2738 (New)


Package is "openssl"

Mon Apr 27 23:27:41 2020 rev:150 rq:796089 version:1.1.1g

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2020-04-02 
17:42:29.577355954 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new.2738/openssl.changes
2020-04-27 23:27:45.698279863 +0200
@@ -1,0 +2,5 @@
+Tue Apr 21 13:43:27 UTC 2020 - Vítězslav Čížek 
+
+- Update to 1.1.1g release
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.SSWAD5/_old  2020-04-27 23:27:47.438283260 +0200
+++ /var/tmp/diff_new_pack.SSWAD5/_new  2020-04-27 23:27:47.442283267 +0200
@@ -18,7 +18,7 @@
 
 %define _sonum  1_1
 Name:   openssl
-Version:1.1.1f
+Version:1.1.1g
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2020-04-02 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2020-04-02 17:42:28

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new.3248 (New)


Package is "openssl"

Thu Apr  2 17:42:28 2020 rev:149 rq:790185 version:1.1.1f

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2019-12-07 
15:15:18.991796451 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new.3248/openssl.changes
2020-04-02 17:42:29.577355954 +0200
@@ -1,0 +2,10 @@
+Tue Mar 31 14:04:29 UTC 2020 - Vítězslav Čížek 
+
+- Update to 1.1.1f release
+
+---
+Sun Mar 22 11:18:29 UTC 2020 - Vítězslav Čížek 
+
+- Update to 1.1.1e release
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.JyWeut/_old  2020-04-02 17:42:32.017357843 +0200
+++ /var/tmp/diff_new_pack.JyWeut/_new  2020-04-02 17:42:32.021357846 +0200
@@ -18,7 +18,7 @@
 
 %define _sonum  1_1
 Name:   openssl
-Version:1.1.1d
+Version:1.1.1f
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2019-12-07 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2019-12-07 15:13:41

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new.4691 (New)


Package is "openssl"

Sat Dec  7 15:13:41 2019 rev:148 rq:753239 version:1.1.1d

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2019-11-20 
13:42:25.520290146 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new.4691/openssl.changes
2019-12-07 15:15:18.991796451 +0100
@@ -1,0 +2,7 @@
+Tue Dec  3 12:57:07 UTC 2019 - Dominique Leuenberger 
+
+- Remove Obsoletes: pkgconfig(*): Only package names can be
+  obsoleted. Until RPM 4.15, those lines were simply ineffective
+  and being ignored, but with RPM 4.15 they result in an error.
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.qLpZcI/_old  2019-12-07 15:15:19.807796336 +0100
+++ /var/tmp/diff_new_pack.qLpZcI/_new  2019-12-07 15:15:19.811796335 +0100
@@ -52,13 +52,9 @@
 Obsoletes:  openssl-devel < %{version}
 Provides:   openssl-devel = %{version}
 Provides:   pkgconfig(libssl) = %{version}
-Obsoletes:  pkgconfig(libssl) < %{version}
 Provides:   pkgconfig(libopenssl) = %{version}
-Obsoletes:  pkgconfig(libopenssl) < %{version}
 Provides:   pkgconfig(libcrypto) = %{version}
-Obsoletes:  pkgconfig(libcrypto) < %{version}
 Provides:   pkgconfig(openssl) = %{version}
-Obsoletes:  pkgconfig(openssl) < %{version}
 
 %description -n libopenssl-devel
 This package contains all necessary include files and libraries needed




commit openssl for openSUSE:Factory

2019-11-20 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2019-11-20 13:42:24

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new.26869 (New)


Package is "openssl"

Wed Nov 20 13:42:24 2019 rev:147 rq:730207 version:1.1.1d

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2019-06-18 
14:44:31.733740590 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new.26869/openssl.changes   
2019-11-20 13:42:25.520290146 +0100
@@ -1,0 +2,5 @@
+Wed Sep 11 14:15:24 UTC 2019 - Vítězslav Čížek 
+
+- Update to 1.1.1d release
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.m2riSt/_old  2019-11-20 13:42:26.204289938 +0100
+++ /var/tmp/diff_new_pack.m2riSt/_new  2019-11-20 13:42:26.208289937 +0100
@@ -18,7 +18,7 @@
 
 %define _sonum  1_1
 Name:   openssl
-Version:1.1.1c
+Version:1.1.1d
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2019-06-18 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2019-06-18 14:44:27

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new.4811 (New)


Package is "openssl"

Tue Jun 18 14:44:27 2019 rev:146 rq:706515 version:1.1.1c

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2019-05-16 
21:54:53.898918143 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new.4811/openssl.changes
2019-06-18 14:44:31.733740590 +0200
@@ -1,0 +2,5 @@
+Thu May 30 13:18:44 UTC 2019 - Vítězslav Čížek 
+
+- Update to 1.1.1c release
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.fOJdJH/_old  2019-06-18 14:44:32.901740472 +0200
+++ /var/tmp/diff_new_pack.fOJdJH/_new  2019-06-18 14:44:32.905740472 +0200
@@ -18,7 +18,7 @@
 
 %define _sonum  1_1
 Name:   openssl
-Version:1.1.1b
+Version:1.1.1c
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2019-05-16 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2019-05-16 21:54:50

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new.5148 (New)


Package is "openssl"

Thu May 16 21:54:50 2019 rev:145 rq:681715 version:1.1.1b

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2018-03-30 
12:00:24.192963215 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new.5148/openssl.changes
2019-05-16 21:54:53.898918143 +0200
@@ -1,0 +2,25 @@
+Thu Feb 28 09:32:27 UTC 2019 - Pedro Monreal Gonzalez 

+
+- Update to 1.1.1b release
+
+---
+Tue Nov 20 14:36:29 UTC 2018 - Vítězslav Čížek 
+
+- Update to 1.1.1a release
+
+---
+Tue Sep 11 13:46:57 UTC 2018 - Vítězslav Čížek 
+
+- Update to 1.1.1 release
+
+---
+Fri Aug 24 10:32:43 UTC 2018 - vci...@suse.com
+
+- Update to 1.1.1~pre9 (Beta 7)
+
+---
+Tue Aug 14 14:11:48 UTC 2018 - vci...@suse.com
+
+- Update to 1.1.0i release
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.vmr8eA/_old  2019-05-16 21:54:54.522917877 +0200
+++ /var/tmp/diff_new_pack.vmr8eA/_new  2019-05-16 21:54:54.526917876 +0200
@@ -18,7 +18,7 @@
 
 %define _sonum  1_1
 Name:   openssl
-Version:1.1.0h
+Version:1.1.1b
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2018-03-30 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2018-03-30 12:00:06

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Fri Mar 30 12:00:06 2018 rev:144 rq:591688 version:1.1.0h

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2018-03-01 
12:04:43.732730080 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2018-03-30 
12:00:24.192963215 +0200
@@ -1,0 +2,5 @@
+Tue Mar 27 14:29:04 UTC 2018 - vci...@suse.com
+
+- Update to 1.1.0h release
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.I3dQcu/_old  2018-03-30 12:00:26.176891471 +0200
+++ /var/tmp/diff_new_pack.I3dQcu/_new  2018-03-30 12:00:26.180891327 +0200
@@ -18,7 +18,7 @@
 
 %define _sonum  1_1
 Name:   openssl
-Version:1.1.0g
+Version:1.1.0h
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2018-03-01 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2018-03-01 12:04:40

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Thu Mar  1 12:04:40 2018 rev:143 rq:578326 version:1.1.0g

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2017-11-26 
10:34:46.383267118 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2018-03-01 
12:04:43.732730080 +0100
@@ -1,0 +2,7 @@
+Fri Feb 16 11:55:28 UTC 2018 - vci...@suse.com
+
+- change the sonum to 1.1, as all the minor versions keep ABI
+  compatibility (bsc#1081335)
+- update baselibs.conf
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.5gKwWg/_old  2018-03-01 12:04:44.500702527 +0100
+++ /var/tmp/diff_new_pack.5gKwWg/_new  2018-03-01 12:04:44.500702527 +0100
@@ -16,7 +16,7 @@
 #
 
 
-%define _sonum  1_1_0
+%define _sonum  1_1
 Name:   openssl
 Version:1.1.0g
 Release:0

++ baselibs.conf ++
--- /var/tmp/diff_new_pack.5gKwWg/_old  2018-03-01 12:04:44.552700661 +0100
+++ /var/tmp/diff_new_pack.5gKwWg/_new  2018-03-01 12:04:44.552700661 +0100
@@ -1,6 +1,8 @@
 openssl
-  requires "openssl-1_0_0- = "
+  requires "openssl-1_1- = "
+  obsoletes "openssl-1_1_0-"
 libopenssl-devel
   requires "openssl- = "
-  requires "libopenssl1_0_0- = "
-  requires "libopenssl-1_0_0-devel- = "
+  requires "libopenssl1_1- = "
+  requires "libopenssl-1_1-devel- = "
+  obsoletes "libopenssl-1_1_0-devel-"




commit openssl for openSUSE:Factory

2017-11-26 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2017-11-26 10:34:40

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Sun Nov 26 10:34:40 2017 rev:142 rq:541546 version:1.1.0g

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2017-11-10 
14:37:24.579438384 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2017-11-26 
10:34:46.383267118 +0100
@@ -1,0 +2,5 @@
+Mon Nov  6 15:42:39 UTC 2017 - vci...@suse.com
+
+- Update to 1.1.0g release
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.OR8M01/_old  2017-11-26 10:34:47.923210964 +0100
+++ /var/tmp/diff_new_pack.OR8M01/_new  2017-11-26 10:34:47.923210964 +0100
@@ -16,9 +16,9 @@
 #
 
 
-%define _sonum  1_0_0
+%define _sonum  1_1_0
 Name:   openssl
-Version:1.0.2m
+Version:1.1.0g
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2017-11-10 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2017-11-10 14:37:17

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Fri Nov 10 14:37:17 2017 rev:141 rq:538750 version:1.0.2m

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2017-07-17 
09:01:55.633938948 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2017-11-10 
14:37:24.579438384 +0100
@@ -1,0 +2,12 @@
+Thu Nov  2 16:42:16 UTC 2017 - vci...@suse.com
+
+- Revert version back to 1.0.2m to get security fixes quickly to
+  Tumbleweed
+  * OpenSSL Security Advisory [02 Nov 2017] (bsc#1066242,bsc#1056058)
+
+---
+Mon Jul 31 11:16:45 UTC 2017 - tchva...@suse.com
+
+- Switch to 1.1.0f release as default again
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.GNZVmN/_old  2017-11-10 14:37:25.419408028 +0100
+++ /var/tmp/diff_new_pack.GNZVmN/_new  2017-11-10 14:37:25.423407883 +0100
@@ -18,7 +18,7 @@
 
 %define _sonum  1_0_0
 Name:   openssl
-Version:1.0.2l
+Version:1.0.2m
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2017-07-17 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2017-07-17 09:01:38

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Mon Jul 17 09:01:38 2017 rev:140 rq:509431 version:1.0.2l

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2017-06-27 
10:19:51.447193508 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2017-07-17 
09:01:55.633938948 +0200
@@ -1,0 +2,7 @@
+Tue Jul 11 11:46:56 UTC 2017 - vci...@suse.com
+
+- Obsolete openssl-debuginfo
+  * the package doesn't exist any more, has been replaced by
+openssl-{so_version}-debuginfo (bsc#1040172)
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.vxwzvb/_old  2017-07-17 09:01:56.193860103 +0200
+++ /var/tmp/diff_new_pack.vxwzvb/_new  2017-07-17 09:01:56.197859540 +0200
@@ -29,6 +29,8 @@
 Source99:   baselibs.conf
 BuildRequires:  libopenssl%{_sonum} = %{version}
 Requires:   openssl-%{_sonum} = %{version}
+# the debuginfo package is now openssl-%{_sonum}-debuginfo (boo#1040172)
+Obsoletes:  openssl-debuginfo
 BuildArch:  noarch
 
 %description




commit openssl for openSUSE:Factory

2017-06-27 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2017-06-27 10:19:50

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Tue Jun 27 10:19:50 2017 rev:139 rq:506205 version:1.0.2l

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2017-05-18 
20:46:41.389065383 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2017-06-27 
10:19:51.447193508 +0200
@@ -1,0 +2,16 @@
+Fri Jun 23 15:23:59 UTC 2017 - tchva...@suse.com
+
+- Revert back to 1.0.2l for now so we get new fixes of 1.0 openssl
+  to tumbleweed
+
+---
+Mon May 29 10:18:31 UTC 2017 - tchva...@suse.com
+
+- Update to 1.1.0f release
+
+---
+Wed May 24 08:06:58 UTC 2017 - tchva...@suse.com
+
+- Switch default to openssl-1.1.0
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.Jhnd2G/_old  2017-06-27 10:19:52.235082151 +0200
+++ /var/tmp/diff_new_pack.Jhnd2G/_new  2017-06-27 10:19:52.235082151 +0200
@@ -18,7 +18,7 @@
 
 %define _sonum  1_0_0
 Name:   openssl
-Version:1.0.2k
+Version:1.0.2l
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 # Yes there is no license but to not confuse people keep it aligned to the pkg




commit openssl for openSUSE:Factory

2017-05-18 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2017-05-18 20:46:33

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Thu May 18 20:46:33 2017 rev:138 rq:492985 version:1.0.2k

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2017-04-11 
09:29:35.117110729 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2017-05-18 
20:46:41.389065383 +0200
@@ -1,0 +2,75 @@
+Fri May  5 09:21:04 UTC 2017 - tchva...@suse.com
+
+- Provide pkgconfig(openssl)
+
+---
+Tue May  2 10:34:51 UTC 2017 - tchva...@suse.com
+
+- Provide basic baselibs.conf for 32bit subpackages
+- Specify this package as noarch (as we just provide README files)
+
+---
+Wed Apr 26 12:51:45 UTC 2017 - tchva...@suse.com
+
+- Fix typo in openssl requires
+- Add dependency on the branched devel package
+- Provide all pkgconfig symbols to hide them in versioned subpkgs
+- This allows us to propagate only the preffered version of openssl
+  while allowing us to add extra openssl only as additional dependency
+
+---
+Wed Apr 12 12:25:26 UTC 2017 - tchva...@suse.com
+
+- Remove the ssl provides as it is applicable for only those that
+  really provide it
+
+---
+Wed Apr 12 11:51:36 UTC 2017 - tchva...@suse.com
+
+- Prepare to split to various subpackages converting main one to
+  dummy package
+- Reduce to only provide main pkg and devel and depend on proper
+  soversioned package
+- Version in this package needs to be synced with the one provided
+  by the split package
+- Remove all the patches, now in the proper versioned namespace:
+  * merge_from_0.9.8k.patch
+  * openssl-1.0.0-c_rehash-compat.diff
+  * bug610223.patch
+  * openssl-ocloexec.patch
+  * openssl-1.0.2a-padlock64.patch
+  * openssl-fix-pod-syntax.diff
+  * openssl-truststore.patch
+  * compression_methods_switch.patch
+  * 0005-libssl-Hide-library-private-symbols.patch
+  * openssl-1.0.2a-default-paths.patch
+  * openssl-pkgconfig.patch
+  * openssl-1.0.2a-ipv6-apps.patch
+  * 0001-libcrypto-Hide-library-private-symbols.patch
+  * openssl-1.0.2i-fips.patch
+  * openssl-1.0.2a-fips-ec.patch
+  * openssl-1.0.2a-fips-ctor.patch
+  * openssl-1.0.2i-new-fips-reqs.patch
+  * openssl-gcc-attributes.patch
+  * 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
+  * openssl-no-egd.patch
+  * openssl-fips-hidden.patch
+  * openssl-1.0.1e-add-suse-default-cipher.patch
+  * openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
+  * openssl-missing_FIPS_ec_group_new_by_curve_name.patch
+  * openssl-fips-dont_run_FIPS_module_installed.patch
+  * openssl-fips_disallow_x931_rand_method.patch
+  * openssl-fips_disallow_ENGINE_loading.patch
+  * openssl-rsakeygen-minimum-distance.patch
+  * openssl-urandom-reseeding.patch
+  * openssl-fips-rsagen-d-bits.patch
+  * openssl-fips-selftests_in_nonfips_mode.patch
+  * openssl-fips-fix-odd-rsakeybits.patch
+  * openssl-fips-clearerror.patch
+  * openssl-fips-dont-fall-back-to-default-digest.patch
+  * openssl-fipslocking.patch
+  * openssl-print_notice-NULL_crash.patch
+  * openssl-randfile_fread_interrupt.patch
+
+
+---

Old:

  0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
  0001-libcrypto-Hide-library-private-symbols.patch
  0005-libssl-Hide-library-private-symbols.patch
  README-FIPS.txt
  bug610223.patch
  compression_methods_switch.patch
  merge_from_0.9.8k.patch
  openssl-1.0.0-c_rehash-compat.diff
  openssl-1.0.1e-add-suse-default-cipher.patch
  openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
  openssl-1.0.2a-default-paths.patch
  openssl-1.0.2a-fips-ctor.patch
  openssl-1.0.2a-fips-ec.patch
  openssl-1.0.2a-ipv6-apps.patch
  openssl-1.0.2a-padlock64.patch
  openssl-1.0.2i-fips.patch
  openssl-1.0.2i-new-fips-reqs.patch
  openssl-1.0.2k.tar.gz
  openssl-1.0.2k.tar.gz.asc
  openssl-fips-clearerror.patch
  openssl-fips-dont-fall-back-to-default-digest.patch
  openssl-fips-dont_run_FIPS_module_installed.patch
  openssl-fips-fix-odd-rsakeybits.patch
  openssl-fips-hidden.patch
  openssl-fips-rsagen-d-bits.patch
  openssl-fips-selftests_in_nonfips_mode.patch
  openssl-fips_disallow_ENGINE_loading.patch
  openssl-fips_disallow_x931_rand_method.patch
  openssl-fipslocking.patch
  openssl-fix-pod-syntax.diff
  openssl-gcc-attributes.patch
  openssl-missing_FIPS_ec_group_new_by_curve_name.patch
  openssl-no-egd.patch
  openssl-ocloexec.patch
  openssl-pkgconfig.patch
  

commit openssl for openSUSE:Factory

2017-04-11 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2017-04-11 09:29:32

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Tue Apr 11 09:29:32 2017 rev:137 rq:485219 version:1.0.2k

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2017-02-07 
11:57:30.416284045 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2017-04-11 
09:29:35.117110729 +0200
@@ -1,0 +2,8 @@
+Tue Apr  4 11:41:40 UTC 2017 - tchva...@suse.com
+
+- Remove O3 from optflags, no need to not rely on distro wide settings
+- Remove conditions for sle10 and sle11, we care only about sle12+
+- USE SUSE instead of SuSE in readme
+- Pass over with spec-cleaner
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.Jr4BMT/_old  2017-04-11 09:29:36.828868976 +0200
+++ /var/tmp/diff_new_pack.Jr4BMT/_new  2017-04-11 09:29:36.828868976 +0200
@@ -16,19 +16,10 @@
 #
 
 
-Name:   openssl
-BuildRequires:  bc
-BuildRequires:  ed
-BuildRequires:  pkg-config
-BuildRequires:  zlib-devel
 %define ssletcdir %{_sysconfdir}/ssl
 #%define num_version %(echo "%{version}" | sed -e "s+[a-zA-Z]++g; s+_.*++g")
 %define num_version 1.0.0
-Provides:   ssl
-# bug437293
-%ifarch ppc64
-Obsoletes:  openssl-64bit
-%endif
+Name:   openssl
 Version:1.0.2k
 Release:0
 Summary:Secure Sockets and Transport Layer Security
@@ -36,21 +27,19 @@
 Group:  Productivity/Networking/Security
 Url:https://www.openssl.org/
 Source: https://www.%{name}.org/source/%{name}-%{version}.tar.gz
-Source42:   https://www.%{name}.org/source/%{name}-%{version}.tar.gz.asc
-# https://www.openssl.org/about/
-# 
http://pgp.mit.edu:11371/pks/lookup?op=get=0xA2D29B7BF295C759#/%name.keyring
-Source43:   %name.keyring
 # to get mtime of file:
 Source1:openssl.changes
 Source2:baselibs.conf
 Source10:   README.SUSE
 Source11:   README-FIPS.txt
+Source42:   https://www.%{name}.org/source/%{name}-%{version}.tar.gz.asc
+# https://www.openssl.org/about/
+# 
http://pgp.mit.edu:11371/pks/lookup?op=get=0xA2D29B7BF295C759#/%name.keyring
+Source43:   %{name}.keyring
 Patch0: merge_from_0.9.8k.patch
 Patch1: openssl-1.0.0-c_rehash-compat.diff
 Patch2: bug610223.patch
-%if 0%{?suse_version} >= 1120
 Patch3: openssl-ocloexec.patch
-%endif
 Patch4: openssl-1.0.2a-padlock64.patch
 # PATCH-FIX-UPSTREAM http://rt.openssl.org/Ticket/Attachment/WithHeaders/20049
 Patch5: openssl-fix-pod-syntax.diff
@@ -84,11 +73,14 @@
 Patch57:openssl-fips-fix-odd-rsakeybits.patch
 Patch58:openssl-fips-clearerror.patch
 Patch59:openssl-fips-dont-fall-back-to-default-digest.patch
-
 Patch61:openssl-fipslocking.patch
 Patch62:openssl-print_notice-NULL_crash.patch
 Patch63:openssl-randfile_fread_interrupt.patch
-
+BuildRequires:  bc
+BuildRequires:  ed
+BuildRequires:  pkgconfig
+BuildRequires:  pkgconfig(zlib)
+Provides:   ssl
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -112,11 +104,6 @@
 License:OpenSSL
 Group:  Productivity/Networking/Security
 Recommends: ca-certificates-mozilla
-# bug437293
-%ifarch ppc64
-Obsoletes:  openssl-64bit
-%endif
-#
 
 %description -n libopenssl1_0_0
 The OpenSSL Project is a collaborative effort to develop a robust,
@@ -138,16 +125,11 @@
 Summary:Include Files and Libraries mandatory for Development
 License:OpenSSL
 Group:  Development/Libraries/C and C++
-Obsoletes:  openssl-devel < %{version}
-Requires:   %name = %version
+Requires:   %{name} = %{version}
 Requires:   libopenssl1_0_0 = %{version}
-Requires:   zlib-devel
+Requires:   pkgconfig(zlib)
+Obsoletes:  openssl-devel < %{version}
 Provides:   openssl-devel = %{version}
-# bug437293
-%ifarch ppc64
-Obsoletes:  openssl-devel-64bit
-%endif
-#
 
 %description -n libopenssl-devel
 This package contains all necessary include files and libraries needed
@@ -167,9 +149,7 @@
 Summary:Additional Package Documentation
 License:OpenSSL
 Group:  Productivity/Networking/Security
-%if 0%{?suse_version} >= 1140
 BuildArch:  noarch
-%endif
 
 %description doc
 This package contains optional documentation provided in addition to
@@ -211,13 +191,11 @@
 %patch61 -p1
 %patch62 -p1
 %patch63 -p1
-%if 0%{?suse_version} >= 1120
 %patch3
-%endif
 %patch8 -p1
 %patch14 -p1
-cp -p %{S:10} .
-cp -p %{S:11} .
+cp -p %{SOURCE10} .
+cp -p 

commit openssl for openSUSE:Factory

2017-02-07 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2017-02-07 11:57:29

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2017-02-03 
17:52:12.285698173 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2017-02-07 
11:57:30.416284045 +0100
@@ -1,0 +2,6 @@
+Thu Feb  2 15:19:15 UTC 2017 - vci...@suse.com
+
+- fix X509_CERT_FILE path (bsc#1022271) and rename
+  updated openssl-1.0.1e-truststore.diff to openssl-truststore.patch
+
+---

Old:

  openssl-1.0.1e-truststore.diff

New:

  openssl-truststore.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.hpOtbl/_old  2017-02-07 11:57:32.623971061 +0100
+++ /var/tmp/diff_new_pack.hpOtbl/_new  2017-02-07 11:57:32.623971061 +0100
@@ -54,7 +54,7 @@
 Patch4: openssl-1.0.2a-padlock64.patch
 # PATCH-FIX-UPSTREAM http://rt.openssl.org/Ticket/Attachment/WithHeaders/20049
 Patch5: openssl-fix-pod-syntax.diff
-Patch6: openssl-1.0.1e-truststore.diff
+Patch6: openssl-truststore.patch
 Patch7: compression_methods_switch.patch
 Patch8: 0005-libssl-Hide-library-private-symbols.patch
 Patch9: openssl-1.0.2a-default-paths.patch


++ openssl-truststore.patch ++
Don't use the legacy /etc/ssl/certs directory anymore but rather the
p11-kit generated /var/lib/ca-certificates/openssl one (fate#314991)
Index: openssl-1.0.2j/crypto/cryptlib.h
===
--- openssl-1.0.2j.orig/crypto/cryptlib.h   2017-02-01 16:50:51.103706760 
+0100
+++ openssl-1.0.2j/crypto/cryptlib.h2017-02-01 16:52:10.517058963 +0100
@@ -81,8 +81,8 @@ extern "C" {
 
 # ifndef OPENSSL_SYS_VMS
 #  define X509_CERT_AREA  OPENSSLDIR
-#  define X509_CERT_DIR   OPENSSLDIR "/certs"
-#  define X509_CERT_FILE  OPENSSLDIR "/cert.pem"
+#  define X509_CERT_DIR   "/var/lib/ca-certificates/openssl"
+#  define X509_CERT_FILE  "/var/lib/ca-certificates/ca-bundle.pem"
 #  define X509_PRIVATE_DIROPENSSLDIR "/private"
 # else
 #  define X509_CERT_AREA  "SSLROOT:[00]"




commit openssl for openSUSE:Factory

2017-02-03 Thread root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2017-01-31 12:37:40

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2016-10-10 
16:17:30.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2017-02-03 
17:52:12.285698173 +0100
@@ -1,0 +2,9 @@
+Fri Jan 27 10:21:42 UTC 2017 - meiss...@suse.com
+
+- Updated to openssl 1.0.2k
+  - bsc#1009528 / CVE-2016-7055: openssl: Montgomery multiplication may 
produce incorrect results
+  - bsc#1019334 / CVE-2016-7056: openssl: ECSDA P-256 timing attack key 
recovery
+  - bsc#1022085 / CVE-2017-3731: openssl: Truncated packet could crash via OOB 
read
+  - bsc#1022086 / CVE-2017-3732: openssl: BN_mod_exp may produce incorrect 
results on x86_64
+
+---

Old:

  openssl-1.0.2j.tar.gz
  openssl-1.0.2j.tar.gz.asc

New:

  openssl-1.0.2k.tar.gz
  openssl-1.0.2k.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.HBsxmc/_old  2017-02-03 17:52:13.821481630 +0100
+++ /var/tmp/diff_new_pack.HBsxmc/_new  2017-02-03 17:52:13.829480503 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package openssl
 #
-# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.2j
+Version:1.0.2k
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL

++ openssl-fips-dont-fall-back-to-default-digest.patch ++
--- /var/tmp/diff_new_pack.HBsxmc/_old  2017-02-03 17:52:14.057448359 +0100
+++ /var/tmp/diff_new_pack.HBsxmc/_new  2017-02-03 17:52:14.061447795 +0100
@@ -114,9 +114,9 @@
 +if (non_fips_allow)
 +FIPS_mode_set(0);
 +
- #ifndef OPENSSL_NO_ENGINE
- setup_engine(bio_err, engine, 0);
- #endif
+ e = setup_engine(bio_err, engine, 0);
+ 
+ if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) {
 @@ -338,7 +342,7 @@ int MAIN(int argc, char **argv)
  goto end;
  }





commit openssl for openSUSE:Factory

2016-10-10 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2016-10-10 16:17:30

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2016-09-28 
15:03:35.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2016-10-10 
16:17:30.0 +0200
@@ -1,0 +2,21 @@
+Fri Sep 30 10:53:56 UTC 2016 - vci...@suse.com
+
+- resume reading from /dev/urandom when interrupted by a signal
+  (bsc#995075)
+  * add openssl-randfile_fread_interrupt.patch
+
+---
+Fri Sep 30 10:53:06 UTC 2016 - vci...@suse.com
+
+- add FIPS changes from SP2:
+- fix problems with locking in FIPS mode (bsc#992120)
+  * duplicates: bsc#991877, bsc#991193, bsc#990392, bsc#990428
+and bsc#990207
+  * bring back openssl-fipslocking.patch
+- drop openssl-fips_RSA_compute_d_with_lcm.patch (upstream)
+  (bsc#984323)
+- don't check for /etc/system-fips (bsc#982268)
+  * add openssl-fips-dont_run_FIPS_module_installed.patch
+- refresh openssl-fips-rsagen-d-bits.patch
+
+---

Old:

  openssl-fips_RSA_compute_d_with_lcm.patch

New:

  openssl-fips-dont_run_FIPS_module_installed.patch
  openssl-fipslocking.patch
  openssl-randfile_fread_interrupt.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.xNi2BB/_old  2016-10-10 16:17:32.0 +0200
+++ /var/tmp/diff_new_pack.xNi2BB/_new  2016-10-10 16:17:32.0 +0200
@@ -74,9 +74,9 @@
 Patch37:openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
 Patch38:openssl-missing_FIPS_ec_group_new_by_curve_name.patch
 # FIPS patches from SLE-12
+Patch41:openssl-fips-dont_run_FIPS_module_installed.patch
 Patch50:openssl-fips_disallow_x931_rand_method.patch
 Patch51:openssl-fips_disallow_ENGINE_loading.patch
-Patch52:openssl-fips_RSA_compute_d_with_lcm.patch
 Patch53:openssl-rsakeygen-minimum-distance.patch
 Patch54:openssl-urandom-reseeding.patch
 Patch55:openssl-fips-rsagen-d-bits.patch
@@ -85,7 +85,9 @@
 Patch58:openssl-fips-clearerror.patch
 Patch59:openssl-fips-dont-fall-back-to-default-digest.patch
 
-Patch60:openssl-print_notice-NULL_crash.patch
+Patch61:openssl-fipslocking.patch
+Patch62:openssl-print_notice-NULL_crash.patch
+Patch63:openssl-randfile_fread_interrupt.patch
 
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
@@ -196,9 +198,9 @@
 %patch35 -p1
 %patch37 -p1
 %patch38 -p1
+%patch41 -p1
 %patch50 -p1
 %patch51 -p1
-%patch52 -p1
 %patch53 -p1
 %patch54 -p1
 %patch55 -p1
@@ -206,7 +208,9 @@
 %patch57 -p1
 %patch58 -p1
 %patch59 -p1
-%patch60 -p1
+%patch61 -p1
+%patch62 -p1
+%patch63 -p1
 %if 0%{?suse_version} >= 1120
 %patch3
 %endif


++ openssl-fips-dont_run_FIPS_module_installed.patch ++
Index: openssl-1.0.2h/crypto/o_init.c
===
--- openssl-1.0.2h.orig/crypto/o_init.c 2016-06-01 15:26:25.026937000 +0200
+++ openssl-1.0.2h/crypto/o_init.c  2016-06-01 16:23:24.980858697 +0200
@@ -111,9 +111,9 @@ void __attribute__ ((constructor)) OPENS
 return;
 done = 1;
 #ifdef OPENSSL_FIPS
-if (!FIPS_module_installed()) {
+/*if (!FIPS_module_installed()) {
 return;
-}
+}*/
 RAND_init_fips();
 init_fips_mode();
 if (!FIPS_mode()) {
++ openssl-fips-rsagen-d-bits.patch ++
--- /var/tmp/diff_new_pack.xNi2BB/_old  2016-10-10 16:17:32.0 +0200
+++ /var/tmp/diff_new_pack.xNi2BB/_new  2016-10-10 16:17:32.0 +0200
@@ -1,8 +1,8 @@
-Index: openssl-1.0.2g/crypto/rsa/rsa_gen.c
+Index: openssl-1.0.2h/crypto/rsa/rsa_gen.c
 ===
 openssl-1.0.2g.orig/crypto/rsa/rsa_gen.c   2016-04-14 10:23:50.941168136 
+0200
-+++ openssl-1.0.2g/crypto/rsa/rsa_gen.c2016-04-14 10:47:56.651757817 
+0200
-@@ -237,6 +237,12 @@ static int FIPS_rsa_builtin_keygen(RSA *
+--- openssl-1.0.2h.orig/crypto/rsa/rsa_gen.c   2016-07-14 15:25:28.640174922 
+0200
 openssl-1.0.2h/crypto/rsa/rsa_gen.c2016-07-14 15:27:41.330349764 
+0200
+@@ -234,6 +234,12 @@ static int FIPS_rsa_builtin_keygen(RSA *
  goto err;
  }
  
@@ -15,7 +15,7 @@
  /* prepare approximate minimum p and q */
  if (!BN_set_word(r0, 0xB504F334))
  goto err;
-@@ -249,12 +255,6 @@ static int FIPS_rsa_builtin_keygen(RSA *
+@@ -246,12 +252,6 @@ static int FIPS_rsa_builtin_keygen(RSA *
  if 

commit openssl for openSUSE:Factory

2016-09-28 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2016-09-28 15:03:33

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2016-05-08 
10:38:50.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2016-09-28 
15:03:35.0 +0200
@@ -1,0 +2,39 @@
+Tue Sep 27 06:20:03 UTC 2016 - mich...@stroeder.com
+
+- update to openssl-1.0.2j
+  * Missing CRL sanity check (CVE-2016-7052 bsc#1001148)
+
+---
+Fri Sep 23 08:22:01 UTC 2016 - vci...@suse.com
+
+- OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)
+  Severity: High
+  * OCSP Status Request extension unbounded memory growth
+(CVE-2016-6304) (bsc#999666)
+  Severity: Low
+  * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575)
+  * Constant time flag not preserved in DSA signing (CVE-2016-2178) 
(bsc#983249)
+  * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
+  * OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419)
+  * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
+  * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
+  * Birthday attack against 64-bit block ciphers (SWEET32)
+(CVE-2016-2183) (bsc#995359)
+  * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
+  * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
+  * Certificate message OOB reads (CVE-2016-6306) (bsc#999668)
+- update to openssl-1.0.2i
+  * remove patches:
+openssl-1.0.2a-new-fips-reqs.patch
+openssl-1.0.2e-fips.patch
+  * add patches:
+openssl-1.0.2i-fips.patch
+openssl-1.0.2i-new-fips-reqs.patch
+
+---
+Wed Aug  3 12:41:41 UTC 2016 - vci...@suse.com
+
+- fix crash in print_notice (bsc#998190)
+  * add openssl-print_notice-NULL_crash.patch
+
+---

Old:

  openssl-1.0.2a-new-fips-reqs.patch
  openssl-1.0.2e-fips.patch
  openssl-1.0.2h.tar.gz
  openssl-1.0.2h.tar.gz.asc

New:

  openssl-1.0.2i-fips.patch
  openssl-1.0.2i-new-fips-reqs.patch
  openssl-1.0.2j.tar.gz
  openssl-1.0.2j.tar.gz.asc
  openssl-print_notice-NULL_crash.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.aOxkbB/_old  2016-09-28 15:03:37.0 +0200
+++ /var/tmp/diff_new_pack.aOxkbB/_new  2016-09-28 15:03:37.0 +0200
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.2h
+Version:1.0.2j
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
@@ -62,10 +62,10 @@
 Patch13:openssl-1.0.2a-ipv6-apps.patch
 Patch14:0001-libcrypto-Hide-library-private-symbols.patch
 # FIPS patches:
-Patch15:openssl-1.0.2e-fips.patch
+Patch15:openssl-1.0.2i-fips.patch
 Patch16:openssl-1.0.2a-fips-ec.patch
 Patch17:openssl-1.0.2a-fips-ctor.patch
-Patch18:openssl-1.0.2a-new-fips-reqs.patch
+Patch18:openssl-1.0.2i-new-fips-reqs.patch
 Patch19:openssl-gcc-attributes.patch
 Patch26:0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
 Patch33:openssl-no-egd.patch
@@ -85,6 +85,8 @@
 Patch58:openssl-fips-clearerror.patch
 Patch59:openssl-fips-dont-fall-back-to-default-digest.patch
 
+Patch60:openssl-print_notice-NULL_crash.patch
+
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -204,6 +206,7 @@
 %patch57 -p1
 %patch58 -p1
 %patch59 -p1
+%patch60 -p1
 %if 0%{?suse_version} >= 1120
 %patch3
 %endif

++ 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch ++
--- /var/tmp/diff_new_pack.aOxkbB/_old  2016-09-28 15:03:37.0 +0200
+++ /var/tmp/diff_new_pack.aOxkbB/_new  2016-09-28 15:03:37.0 +0200
@@ -4,10 +4,10 @@
 Subject: [PATCH] Axe builtin printf implementation, use glibc instead
 
 
-Index: openssl-1.0.2g/crypto/bio/b_print.c
+Index: openssl-1.0.2i/crypto/bio/b_print.c
 ===
 openssl-1.0.2g.orig/crypto/bio/b_print.c   2016-03-01 14:35:05.0 
+0100
-+++ openssl-1.0.2g/crypto/bio/b_print.c2016-03-01 15:26:55.597307479 
+0100
+--- openssl-1.0.2i.orig/crypto/bio/b_print.c   2016-09-22 12:23:06.0 
+0200
 openssl-1.0.2i/crypto/bio/b_print.c2016-09-23 10:18:39.805097010 
+0200
 @@ -56,17 +56,10 @@
   * [including the GNU Public Licence.]
   */
@@ -28,7 +28,7 @@
  #include 
  #include 
  #include 
-@@ 

commit openssl for openSUSE:Factory

2016-05-08 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2016-05-08 10:38:49

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2016-04-22 
16:17:18.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2016-05-08 
10:38:50.0 +0200
@@ -1,0 +2,39 @@
+Tue May  3 14:43:47 UTC 2016 - vci...@suse.com
+
+- OpenSSL Security Advisory [3rd May 2016]
+- update to 1.0.2h (boo#977584, boo#977663)
+  * Prevent padding oracle in AES-NI CBC MAC check
+ A MITM attacker can use a padding oracle attack to decrypt traffic
+ when the connection uses an AES CBC cipher and the server support
+ AES-NI.
+ (CVE-2016-2107, boo#977616)
+  * Fix EVP_EncodeUpdate overflow
+ An overflow can occur in the EVP_EncodeUpdate() function which is used for
+ Base64 encoding of binary data. If an attacker is able to supply very 
large
+ amounts of input data then a length check can overflow resulting in a heap
+ corruption.
+ (CVE-2016-2105, boo#977614)
+  * Fix EVP_EncryptUpdate overflow
+ An overflow can occur in the EVP_EncryptUpdate() function. If an attacker
+ is able to supply very large amounts of input data after a previous call 
to
+ EVP_EncryptUpdate() with a partial block then a length check can overflow
+ resulting in a heap corruption.
+ (CVE-2016-2106, boo#977615)
+  * Prevent ASN.1 BIO excessive memory allocation
+ When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
+ a short invalid encoding can casuse allocation of large amounts of memory
+ potentially consuming excessive resources or exhausting memory.
+ (CVE-2016-2109, boo#976942)
+  * EBCDIC overread
+ ASN1 Strings that are over 1024 bytes can cause an overread in 
applications
+ using the X509_NAME_oneline() function on EBCDIC systems. This could 
result
+ in arbitrary stack data being returned in the buffer.
+ (CVE-2016-2176, boo#978224)
+  * Modify behavior of ALPN to invoke callback after SNI/servername
+ callback, such that updates to the SSL_CTX affect ALPN.
+  * Remove LOW from the DEFAULT cipher list.  This removes singles DES from the
+ default.
+  * Only remove the SSLv2 methods with the no-ssl2-method option. When the
+ methods are enabled and ssl2 is disabled the methods return NULL.
+
+---

Old:

  openssl-1.0.2g.tar.gz
  openssl-1.0.2g.tar.gz.asc

New:

  openssl-1.0.2h.tar.gz
  openssl-1.0.2h.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.RBup3R/_old  2016-05-08 10:38:52.0 +0200
+++ /var/tmp/diff_new_pack.RBup3R/_new  2016-05-08 10:38:52.0 +0200
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.2g
+Version:1.0.2h
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL

++ openssl-1.0.1e-add-suse-default-cipher.patch ++
--- /var/tmp/diff_new_pack.RBup3R/_old  2016-05-08 10:38:52.0 +0200
+++ /var/tmp/diff_new_pack.RBup3R/_new  2016-05-08 10:38:52.0 +0200
@@ -1,8 +1,8 @@
-Index: openssl-1.0.2a/ssl/ssl_ciph.c
+Index: openssl-1.0.2h/ssl/ssl_ciph.c
 ===
 openssl-1.0.2a.orig/ssl/ssl_ciph.c 2015-05-24 14:26:18.132243785 +0200
-+++ openssl-1.0.2a/ssl/ssl_ciph.c  2015-05-24 14:26:18.229245199 +0200
-@@ -1604,7 +1604,14 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
+--- openssl-1.0.2h.orig/ssl/ssl_ciph.c 2016-05-03 16:36:50.482900040 +0200
 openssl-1.0.2h/ssl/ssl_ciph.c  2016-05-03 16:36:51.951922883 +0200
+@@ -1608,7 +1608,14 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
   */
  ok = 1;
  rule_p = rule_str;
@@ -18,21 +18,20 @@
  ok = ssl_cipher_process_rulestr(SSL_DEFAULT_CIPHER_LIST,
  , , ca_list);
  rule_p += 7;
-Index: openssl-1.0.2a/ssl/ssl.h
+Index: openssl-1.0.2h/ssl/ssl.h
 ===
 openssl-1.0.2a.orig/ssl/ssl.h  2015-03-19 14:30:36.0 +0100
-+++ openssl-1.0.2a/ssl/ssl.h   2015-05-24 14:31:25.801726491 +0200
-@@ -338,7 +338,12 @@ extern "C" {
+--- openssl-1.0.2h.orig/ssl/ssl.h  2016-05-03 16:36:51.951922883 +0200
 openssl-1.0.2h/ssl/ssl.h   2016-05-03 16:41:00.024781841 +0200
+@@ -338,7 +338,11 @@ extern "C" {
   * The following cipher list is used by default. It also is substituted when
   * an 

commit openssl for openSUSE:Factory

2016-04-22 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2016-04-22 16:17:16

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2016-03-05 
11:21:19.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2016-04-22 
16:17:18.0 +0200
@@ -1,0 +2,27 @@
+Fri Apr 15 16:55:05 UTC 2016 - dval...@suse.com
+
+- Remove a hack for bsc#936563 
+- Drop bsc936563_hack.patch
+
+---
+Fri Apr 15 11:59:48 UTC 2016 - vci...@suse.com
+
+- import fips patches from SLE-12
+  * openssl-fips-clearerror.patch
+  * openssl-fips-dont-fall-back-to-default-digest.patch
+  * openssl-fips-fix-odd-rsakeybits.patch
+  * openssl-fips-rsagen-d-bits.patch
+  * openssl-fips-selftests_in_nonfips_mode.patch
+  * openssl-fips_RSA_compute_d_with_lcm.patch
+  * openssl-fips_disallow_ENGINE_loading.patch
+  * openssl-fips_disallow_x931_rand_method.patch
+  * openssl-rsakeygen-minimum-distance.patch
+  * openssl-urandom-reseeding.patch
+
+---
+Tue Mar  8 12:50:28 UTC 2016 - vci...@suse.com
+
+- add support for "ciphers" providing no encryption (bsc#937085)
+  * don't build with -DSSL_FORBID_ENULL
+
+---

Old:

  bsc936563_hack.patch

New:

  openssl-fips-clearerror.patch
  openssl-fips-dont-fall-back-to-default-digest.patch
  openssl-fips-fix-odd-rsakeybits.patch
  openssl-fips-rsagen-d-bits.patch
  openssl-fips-selftests_in_nonfips_mode.patch
  openssl-fips_RSA_compute_d_with_lcm.patch
  openssl-fips_disallow_ENGINE_loading.patch
  openssl-fips_disallow_x931_rand_method.patch
  openssl-rsakeygen-minimum-distance.patch
  openssl-urandom-reseeding.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.kAvHBL/_old  2016-04-22 16:17:20.0 +0200
+++ /var/tmp/diff_new_pack.kAvHBL/_new  2016-04-22 16:17:20.0 +0200
@@ -73,7 +73,17 @@
 Patch35:openssl-1.0.1e-add-suse-default-cipher.patch
 Patch37:openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
 Patch38:openssl-missing_FIPS_ec_group_new_by_curve_name.patch
-Patch40:bsc936563_hack.patch
+# FIPS patches from SLE-12
+Patch50:openssl-fips_disallow_x931_rand_method.patch
+Patch51:openssl-fips_disallow_ENGINE_loading.patch
+Patch52:openssl-fips_RSA_compute_d_with_lcm.patch
+Patch53:openssl-rsakeygen-minimum-distance.patch
+Patch54:openssl-urandom-reseeding.patch
+Patch55:openssl-fips-rsagen-d-bits.patch
+Patch56:openssl-fips-selftests_in_nonfips_mode.patch
+Patch57:openssl-fips-fix-odd-rsakeybits.patch
+Patch58:openssl-fips-clearerror.patch
+Patch59:openssl-fips-dont-fall-back-to-default-digest.patch
 
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
@@ -184,15 +194,21 @@
 %patch35 -p1
 %patch37 -p1
 %patch38 -p1
+%patch50 -p1
+%patch51 -p1
+%patch52 -p1
+%patch53 -p1
+%patch54 -p1
+%patch55 -p1
+%patch56 -p1
+%patch57 -p1
+%patch58 -p1
+%patch59 -p1
 %if 0%{?suse_version} >= 1120
 %patch3
 %endif
 %patch8 -p1
 %patch14 -p1
-#workaround https://gcc.gnu.org/bugzilla/show_bug.cgi?id=66728
-%ifarch ppc64le
-%patch40 -p1
-%endif
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo "adding/overwriting some entries in the 'table' hash in Configure"
@@ -264,7 +280,6 @@
 -fno-common \
 -DTERMIO \
 -DPURIFY \
--DSSL_FORBID_ENULL \
 -D_GNU_SOURCE \
 -DOPENSSL_NO_BUF_FREELISTS \
 $(getconf LFS_CFLAGS) \


++ openssl-fips-clearerror.patch ++
Index: openssl-1.0.2g/crypto/o_init.c
===
--- openssl-1.0.2g.orig/crypto/o_init.c 2016-04-14 10:54:05.763929573 +0200
+++ openssl-1.0.2g/crypto/o_init.c  2016-04-14 10:59:08.366168879 +0200
@@ -91,6 +91,7 @@ static void init_fips_mode(void)
 NONFIPS_selftest_check();
 /* drop down to non-FIPS mode if it is not requested */
 FIPS_mode_set(0);
+ERR_clear_error();
 } else {
 /* abort if selftest failed */
 FIPS_selftest_check();
++ openssl-fips-dont-fall-back-to-default-digest.patch ++
Index: openssl-1.0.2g/apps/dgst.c
===
--- openssl-1.0.2g.orig/apps/dgst.c 2016-03-01 14:35:53.0 +0100
+++ openssl-1.0.2g/apps/dgst.c  2016-04-14 11:04:21.706558132 +0200
@@ -147,7 +147,7 @@ int MAIN(int argc, char **argv)
 /* first check the program name */
 program_name(argv[0], 

commit openssl for openSUSE:Factory

2016-03-05 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2016-03-05 11:21:18

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2015-12-13 
09:36:20.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2016-03-05 
11:21:19.0 +0100
@@ -1,0 +2,55 @@
+Tue Mar  1 14:40:18 UTC 2016 - vci...@suse.com
+
+- update to 1.0.2g (bsc#968044)
+  * Disable weak ciphers in SSLv3 and up in default builds of OpenSSL.
+Builds that are not configured with "enable-weak-ssl-ciphers" will not
+provide any "EXPORT" or "LOW" strength ciphers.
+  * Disable SSLv2 default build, default negotiation and weak ciphers.  SSLv2
+is by default disabled at build-time.  Builds that are not configured with
+"enable-ssl2" will not support SSLv2.  Even if "enable-ssl2" is used,
+users who want to negotiate SSLv2 via the version-flexible SSLv23_method()
+will need to explicitly call either of:
+SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2);
+or
+SSL_clear_options(ssl, SSL_OP_NO_SSLv2);
+(CVE-2016-0800)
+  * Fix a double-free in DSA code
+ (CVE-2016-0705)
+  * Disable SRP fake user seed to address a server memory leak.
+ Add a new method SRP_VBASE_get1_by_user that handles the seed properly.
+ (CVE-2016-0798)
+  * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption
+ (CVE-2016-0797)
+  *) Side channel attack on modular exponentiation
+ http://cachebleed.info.
+ (CVE-2016-0702)
+  *) Change the req app to generate a 2048-bit RSA/DSA key by default,
+ if no keysize is specified with default_bits. This fixes an
+ omission in an earlier change that changed all RSA/DSA key generation
+ apps to use 2048 bits by default.
+
+---
+Thu Jan 28 15:10:38 UTC 2016 - vci...@suse.com
+
+- update to 1.0.2f (boo#963410)
+  *) DH small subgroups (boo#963413)
+ Historically OpenSSL only ever generated DH parameters based on "safe"
+ primes. More recently (in version 1.0.2) support was provided for
+ generating X9.42 style parameter files such as those required for RFC 5114
+ support. The primes used in such files may not be "safe". Where an
+ application is using DH configured with parameters based on primes that 
are
+ not "safe" then an attacker could use this fact to find a peer's private
+ DH exponent. This attack requires that the attacker complete multiple
+ handshakes in which the peer uses the same private DH exponent. For 
example
+ this could be used to discover a TLS server's private DH exponent if it's
+ reusing the private DH exponent or it's using a static DH ciphersuite.
+ (CVE-2016-0701)
+  *) SSLv2 doesn't block disabled ciphers (boo#963415)
+ A malicious client can negotiate SSLv2 ciphers that have been disabled on
+ the server and complete SSLv2 handshakes even if all SSLv2 ciphers have
+ been disabled, provided that the SSLv2 protocol was not also disabled via
+ SSL_OP_NO_SSLv2.
+ (CVE-2015-3197)
+  *) Reject DH handshakes with parameters shorter than 1024 bits.
+
+---

Old:

  openssl-1.0.2e.tar.gz
  openssl-1.0.2e.tar.gz.asc

New:

  openssl-1.0.2g.tar.gz
  openssl-1.0.2g.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.4dhzIu/_old  2016-03-05 11:21:21.0 +0100
+++ /var/tmp/diff_new_pack.4dhzIu/_new  2016-03-05 11:21:21.0 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package openssl
 #
-# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.2e
+Version:1.0.2g
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL

++ 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch ++
--- /var/tmp/diff_new_pack.4dhzIu/_old  2016-03-05 11:21:21.0 +0100
+++ /var/tmp/diff_new_pack.4dhzIu/_new  2016-03-05 11:21:21.0 +0100
@@ -4,10 +4,10 @@
 Subject: [PATCH] Axe builtin printf implementation, use glibc instead
 
 
-Index: openssl-1.0.2b/crypto/bio/b_print.c
+Index: openssl-1.0.2g/crypto/bio/b_print.c
 ===
 

commit openssl for openSUSE:Factory

2015-12-13 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2015-12-13 09:36:18

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is "openssl"

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2015-07-12 
22:51:56.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2015-12-13 
09:36:20.0 +0100
@@ -1,0 +2,20 @@
+Fri Dec  4 23:06:18 UTC 2015 - vci...@suse.com
+
+- update to 1.0.2e
+  * fixes five security vulnerabilities
+  * Anon DH ServerKeyExchange with 0 p parameter
+(CVE-2015-1794) (bsc#957984)
+  * BN_mod_exp may produce incorrect results on x86_64
+(CVE-2015-3193) (bsc#957814)
+  * Certificate verify crash with missing PSS parameter
+(CVE-2015-3194) (bsc#957815)
+  * X509_ATTRIBUTE memory leak
+(CVE-2015-3195) (bsc#957812)
+  * Race condition handling PSK identify hint
+(CVE-2015-3196) (bsc#957813)
+- pulled a refreshed fips patch from Fedora
+  * openssl-1.0.2a-fips.patch was replaced by
+openssl-1.0.2e-fips.patch
+- refresh openssl-ocloexec.patch
+
+---

Old:

  openssl-1.0.2a-fips.patch
  openssl-1.0.2d.tar.gz
  openssl-1.0.2d.tar.gz.asc

New:

  openssl-1.0.2e-fips.patch
  openssl-1.0.2e.tar.gz
  openssl-1.0.2e.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.sHSPAw/_old  2015-12-13 09:36:22.0 +0100
+++ /var/tmp/diff_new_pack.sHSPAw/_new  2015-12-13 09:36:22.0 +0100
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.2d
+Version:1.0.2e
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
@@ -62,7 +62,7 @@
 Patch13:openssl-1.0.2a-ipv6-apps.patch
 Patch14:0001-libcrypto-Hide-library-private-symbols.patch
 # FIPS patches:
-Patch15:openssl-1.0.2a-fips.patch
+Patch15:openssl-1.0.2e-fips.patch
 Patch16:openssl-1.0.2a-fips-ec.patch
 Patch17:openssl-1.0.2a-fips-ctor.patch
 Patch18:openssl-1.0.2a-new-fips-reqs.patch

++ openssl-1.0.2e-fips.patch ++
 13704 lines (skipped)

++ openssl-1.0.2d.tar.gz -> openssl-1.0.2e.tar.gz ++
 13069 lines of diff (skipped)

++ openssl-ocloexec.patch ++
--- /var/tmp/diff_new_pack.sHSPAw/_old  2015-12-13 09:36:25.0 +0100
+++ /var/tmp/diff_new_pack.sHSPAw/_new  2015-12-13 09:36:25.0 +0100
@@ -1,7 +1,7 @@
 Index: crypto/bio/b_sock.c
 ===
 crypto/bio/b_sock.c.orig   2015-05-29 11:54:57.219659682 +0200
-+++ crypto/bio/b_sock.c2015-05-29 11:56:47.059884761 +0200
+--- crypto/bio/b_sock.c.orig   2015-12-05 00:04:11.291027369 +0100
 crypto/bio/b_sock.c2015-12-05 00:04:13.283055286 +0100
 @@ -723,7 +723,7 @@ int BIO_get_accept_socket(char *host, in
  }
  
@@ -31,8 +31,8 @@
  sa.len.i = (int)sa.len.s;
 Index: crypto/bio/bss_conn.c
 ===
 crypto/bio/bss_conn.c.orig 2015-05-29 11:54:57.219659682 +0200
-+++ crypto/bio/bss_conn.c  2015-05-29 11:57:45.668538446 +0200
+--- crypto/bio/bss_conn.c.orig 2015-12-05 00:04:11.291027369 +0100
 crypto/bio/bss_conn.c  2015-12-05 00:04:13.283055286 +0100
 @@ -195,7 +195,7 @@ static int conn_state(BIO *b, BIO_CONNEC
  c->them.sin_addr.s_addr = htonl(l);
  c->state = BIO_CONN_S_CREATE_SOCKET;
@@ -44,9 +44,9 @@
  ERR_add_error_data(4, "host=", c->param_hostname,
 Index: crypto/bio/bss_dgram.c
 ===
 crypto/bio/bss_dgram.c.orig2015-05-29 11:54:57.221659705 +0200
-+++ crypto/bio/bss_dgram.c 2015-05-29 13:29:42.463696425 +0200
-@@ -1176,7 +1176,7 @@ static int dgram_sctp_read(BIO *b, char
+--- crypto/bio/bss_dgram.c.orig2015-12-05 00:04:11.292027383 +0100
 crypto/bio/bss_dgram.c 2015-12-05 00:04:13.284055300 +0100
+@@ -1177,7 +1177,7 @@ static int dgram_sctp_read(BIO *b, char
  msg.msg_control = cmsgbuf;
  msg.msg_controllen = 512;
  msg.msg_flags = 0;
@@ -55,7 +55,7 @@
  
  if (n <= 0) {
  if (n < 0)
-@@ -1801,7 +1801,7 @@ int BIO_dgram_sctp_wait_for_dry(BIO *b)
+@@ -1802,7 +1802,7 @@ int BIO_dgram_sctp_wait_for_dry(BIO *b)
  msg.msg_controllen = 0;
  msg.msg_flags = 0;
  
@@ -64,7 +64,7 @@
  if (n <= 0) {
  if ((n < 0) && (get_last_socket_error() != EAGAIN)
  && (get_last_socket_error() != EWOULDBLOCK))

commit openssl for openSUSE:Factory

2015-07-12 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2015-07-12 22:51:54

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2015-06-08 
08:25:59.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2015-07-12 
22:51:56.0 +0200
@@ -1,0 +2,63 @@
+Thu Jul  9 13:32:34 UTC 2015 - vci...@suse.com
+
+- update to 1.0.2d
+  * fixes CVE-2015-1793 (bsc#936746)
+
+  Alternate chains certificate forgery
+
+ During certificate verfification, OpenSSL will attempt to find an
+ alternative certificate chain if the first attempt to build such a chain
+ fails. An error in the implementation of this logic can mean that an
+ attacker could cause certain checks on untrusted certificates to be
+ bypassed, such as the CA flag, enabling them to use a valid leaf
+ certificate to act as a CA and issue an invalid certificate.
+- drop openssl-fix_invalid_manpage_name.patch (upstream)
+
+---
+Thu Jul  2 14:46:36 UTC 2015 - dval...@suse.com
+
+- Workaround debugit crash on ppc64le with gcc5
+  bsc936563_hack.patch (bsc#936563) 
+
+---
+Wed Jul  1 09:26:26 UTC 2015 - norm...@linux.vnet.ibm.com
+
+- update merge_from_0.9.8k.patch replacing __LP64__ by __LP64
+  this is a change versus previous request 309611
+  required to avoid build error for ppc64
+
+---
+Fri Jun 26 00:11:20 UTC 2015 - crrodrig...@opensuse.org
+
+- Build with no-ssl3, for details on why this is needed read 
+  rfc7568. Contrary to the no-ssl2 option, this does not
+  require us to patch dependant packages as the relevant 
+  functions are still available (SSLv3_(client|server)_method) 
+  but will fail to negotiate. if removing SSL3 methods is desired
+  at a later time, option no-ssl3-method needs to be used.
+
+---
+Fri Jun 12 21:22:45 UTC 2015 - vci...@suse.com
+
+- update to 1.0.2c
+  * Fix HMAC ABI incompatibility
+- refreshed openssl-1.0.2a-fips.patch
+
+---
+Thu Jun 11 15:50:44 UTC 2015 - vci...@suse.com
+
+- update to 1.0.2b
+  * Malformed ECParameters causes infinite loop (CVE-2015-1788)
+  * Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
+  * PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
+  * CMS verify infinite loop with unknown hash function (CVE-2015-1792)
+  * Race condition handling NewSessionTicket (CVE-2015-1791)
+- refreshed patches:
+  * 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
+  * 0001-libcrypto-Hide-library-private-symbols.patch
+  * openssl-1.0.2a-default-paths.patch
+  * openssl-1.0.2a-fips.patch
+  * compression_methods_switch.patch
+  * openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
+
+---

Old:

  openssl-1.0.2a.tar.gz
  openssl-1.0.2a.tar.gz.asc
  openssl-fix_invalid_manpage_name.patch

New:

  bsc936563_hack.patch
  openssl-1.0.2d.tar.gz
  openssl-1.0.2d.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.KRnmBc/_old  2015-07-12 22:51:59.0 +0200
+++ /var/tmp/diff_new_pack.KRnmBc/_new  2015-07-12 22:51:59.0 +0200
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.2a
+Version:1.0.2d
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
@@ -73,7 +73,7 @@
 Patch35:openssl-1.0.1e-add-suse-default-cipher.patch
 Patch37:openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
 Patch38:openssl-missing_FIPS_ec_group_new_by_curve_name.patch
-Patch39:openssl-fix_invalid_manpage_name.patch
+Patch40:bsc936563_hack.patch
 
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
@@ -184,12 +184,15 @@
 %patch35 -p1
 %patch37 -p1
 %patch38 -p1
-%patch39 -p1
 %if 0%{?suse_version} = 1120
 %patch3
 %endif
 %patch8 -p1
 %patch14 -p1
+#workaround https://gcc.gnu.org/bugzilla/show_bug.cgi?id=66728
+%ifarch ppc64le
+%patch40 -p1
+%endif
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -241,6 +244,7 @@
 fips \
 %if 0%{suse_version}  1310
 no-ssl2 \
+no-ssl3 \
 enable-rfc3779 \
 %endif
 %ifarch x86_64 aarch64 ppc64le

++ 0001-Axe-builtin-printf-implementation-use-glibc-instead.patch 

commit openssl for openSUSE:Factory

2015-03-23 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2015-03-23 12:16:06

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2015-02-06 
10:50:58.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2015-03-23 
12:16:07.0 +0100
@@ -1,0 +2,24 @@
+Thu Mar 19 14:26:01 UTC 2015 - vci...@suse.com
+
+- security update:
+ * CVE-2015-0209 (bnc#919648)
+   - Fix a failure to NULL a pointer freed on error
+ * CVE-2015-0286 (bnc#922496)
+   - Segmentation fault in ASN1_TYPE_cmp
+ * CVE-2015-0287 (bnc#922499)
+   - ASN.1 structure reuse memory corruption
+ * CVE-2015-0288 x509: (bnc#920236)
+   - added missing public key is not NULL check
+ * CVE-2015-0289 (bnc#922500)
+   - PKCS7 NULL pointer dereferences
+ * CVE-2015-0293 (bnc#922488)
+   - Fix reachable assert in SSLv2 servers
+ * added patches:
+   openssl-CVE-2015-0209.patch
+   openssl-CVE-2015-0286.patch
+   openssl-CVE-2015-0287.patch
+   openssl-CVE-2015-0288.patch
+   openssl-CVE-2015-0289.patch
+   openssl-CVE-2015-0293.patch
+
+---

New:

  openssl-CVE-2015-0209.patch
  openssl-CVE-2015-0286.patch
  openssl-CVE-2015-0287.patch
  openssl-CVE-2015-0288.patch
  openssl-CVE-2015-0289.patch
  openssl-CVE-2015-0293.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.1qYb6Y/_old  2015-03-23 12:16:08.0 +0100
+++ /var/tmp/diff_new_pack.1qYb6Y/_new  2015-03-23 12:16:08.0 +0100
@@ -75,6 +75,12 @@
 Patch35:openssl-1.0.1e-add-suse-default-cipher.patch 
 Patch36:openssl-1.0.1e-add-suse-default-cipher-header.patch
 Patch37:openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
+Patch52:openssl-CVE-2015-0209.patch
+Patch53:openssl-CVE-2015-0286.patch
+Patch54:openssl-CVE-2015-0287.patch
+Patch55:openssl-CVE-2015-0288.patch
+Patch56:openssl-CVE-2015-0289.patch
+Patch57:openssl-CVE-2015-0293.patch
 
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
@@ -191,6 +197,12 @@
 %patch35 -p1
 %patch36 -p1
 %patch37 -p1
+%patch52 -p1
+%patch53 -p1
+%patch54 -p1
+%patch55 -p1
+%patch56 -p1
+%patch57 -p1
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure


++ openssl-CVE-2015-0209.patch ++
commit 89117535f1bb3ea72a17933b703271587d7aaf0b
Author: Matt Caswell m...@openssl.org
Date:   Mon Feb 9 11:38:41 2015 +

Fix a failure to NULL a pointer freed on error.

Inspired by BoringSSL commit 517073cd4b by Eric Roman ero...@chromium.org

CVE-2015-0209

Reviewed-by: Emilia Käsper emi...@openssl.org

Index: openssl-1.0.1k/crypto/ec/ec_asn1.c
===
--- openssl-1.0.1k.orig/crypto/ec/ec_asn1.c 2015-03-19 15:58:22.021039425 
+0100
+++ openssl-1.0.1k/crypto/ec/ec_asn1.c  2015-03-19 15:58:26.431103852 +0100
@@ -1142,8 +1142,6 @@ EC_KEY *d2i_ECPrivateKey(EC_KEY **a, con
  ERR_R_MALLOC_FAILURE);
goto err;
}
-   if (a)
-   *a = ret;
}
else
ret = *a;
@@ -1225,11 +1223,13 @@ EC_KEY *d2i_ECPrivateKey(EC_KEY **a, con
ret-enc_flag |= EC_PKEY_NO_PUBKEY;
}
 
+   if (a)
+   *a = ret;
ok = 1;
 err:
if (!ok)
{
-   if (ret)
+   if (ret  (a == NULL || *a != ret))
EC_KEY_free(ret);
ret = NULL;
}
++ openssl-CVE-2015-0286.patch ++
commit ee5a1253285e5c9f406c8b57b0686319b70c07d8
Author: Dr. Stephen Henson st...@openssl.org
Date:   Mon Mar 9 23:11:45 2015 +

Fix ASN1_TYPE_cmp

Fix segmentation violation when ASN1_TYPE_cmp is passed a boolean type. This
can be triggered during certificate verification so could be a DoS attack
against a client or a server enabling client authentication.

CVE-2015-0286

Reviewed-by: Richard Levitte levi...@openssl.org

Index: openssl-1.0.1i/crypto/asn1/a_type.c
===
--- openssl-1.0.1i.orig/crypto/asn1/a_type.c2015-03-17 14:15:18.832332902 
+0100
+++ openssl-1.0.1i/crypto/asn1/a_type.c 2015-03-17 14:15:19.738346161 +0100
@@ -124,6 +124,9 @@ int ASN1_TYPE_cmp(const ASN1_TYPE *a, co
case V_ASN1_OBJECT:
result = OBJ_cmp(a-value.object, 

commit openssl for openSUSE:Factory

2015-02-06 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2015-02-06 10:50:56

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2015-01-20 
21:53:47.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2015-02-06 
10:50:58.0 +0100
@@ -1,0 +2,6 @@
+Wed Feb  4 08:08:27 UTC 2015 - meiss...@suse.com
+
+- The DATE stamp moved from crypto/Makefile to crypto/buildinf.h,
+  replace it there (bsc#915947)
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.hOF1LW/_old  2015-02-06 10:51:00.0 +0100
+++ /var/tmp/diff_new_pack.hOF1LW/_new  2015-02-06 10:51:00.0 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package openssl
 #
-# Copyright (c) 2015 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -223,9 +223,6 @@
 EOF_ED
 # fix ENGINESDIR path
 sed -i 's,/lib/engines,/%_lib/engines,' Configure
-# Record mtime of changes file instead of build time
-CHANGES=`stat --format=%y %SOURCE1`
-sed -i -e s|#define DATE \(.*\).LC_ALL.*date.|#define DATE \1$CHANGES| 
crypto/Makefile
 
 %build
 
@@ -296,6 +293,14 @@
linux64-sparcv9 \
 %endif
$config_flags
+
+   # Record mtime of changes file instead of build time to make 
build-compare work
+   make PERL=perl -C crypto buildinf.h
+   CHANGES=`stat --format=%y %SOURCE1`
+   cat crypto/buildinf.h
+   sed -i -e s|#define DATE .*|#define DATE \built on: $CHANGES\| 
crypto/buildinf.h
+   cat crypto/buildinf.h
+
make depend
make
LD_LIBRARY_PATH=`pwd` make rehash



-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2015-01-20 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2015-01-20 21:53:46

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-12-17 
19:17:04.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2015-01-20 
21:53:47.0 +0100
@@ -1,0 +2,24 @@
+Fri Jan  9 10:03:37 UTC 2015 - meiss...@suse.com
+
+- openssl 1.0.1k release
+  bsc#912294 CVE-2014-3571: Fix DTLS segmentation fault in dtls1_get_record.
+  bsc#912292 CVE-2015-0206: Fix DTLS memory leak in dtls1_buffer_record.
+  bsc#911399 CVE-2014-3569: Fix issue where no-ssl3 configuration sets method 
to NULL.
+  bsc#912015 CVE-2014-3572: Abort handshake if server key exchange
+message is omitted for ephemeral ECDH ciphersuites.
+  bsc#912014 CVE-2015-0204: Remove non-export ephemeral RSA code on client and 
server.
+  bsc#912293 CVE-2015-0205: Fixed issue where DH client certificates are 
accepted without verification.
+  bsc#912018 CVE-2014-8275: Fix various certificate fingerprint issues.
+  bsc#912296 CVE-2014-3570: Correct Bignum squaring.
+  and other bugfixes.
+- openssl.keyring: use Matt Caswells current key. 
+  pub  2048R/0E604491 2013-04-30
+  uidMatt Caswell fr...@baggins.org
+  uidMatt Caswell m...@openssl.org
+  sub  2048R/E3C21B70 2013-04-30
+
+- openssl-1.0.1e-fips.patch: rediffed
+- openssl-1.0.1i-noec2m-fix.patch: removed (upstream)
+- openssl-ocloexec.patch: rediffed
+
+---

Old:

  openssl-1.0.1i-noec2m-fix.patch
  openssl-1.0.1j.tar.gz
  openssl-1.0.1j.tar.gz.asc

New:

  openssl-1.0.1k.tar.gz
  openssl-1.0.1k.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.8uO0Vp/_old  2015-01-20 21:53:49.0 +0100
+++ /var/tmp/diff_new_pack.8uO0Vp/_new  2015-01-20 21:53:49.0 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package openssl
 #
-# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2015 SUSE LINUX Products GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.1j
+Version:1.0.1k
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
@@ -38,7 +38,8 @@
 Source: https://www.%{name}.org/source/%{name}-%{version}.tar.gz
 Source42:   https://www.%{name}.org/source/%{name}-%{version}.tar.gz.asc
 # https://www.openssl.org/about/
-Source43:   
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xA2D29B7BF295C759#/%name.keyring
+# 
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xA2D29B7BF295C759#/%name.keyring
+Source43:   %name.keyring
 # to get mtime of file:
 Source1:openssl.changes
 Source2:baselibs.conf
@@ -74,7 +75,6 @@
 Patch35:openssl-1.0.1e-add-suse-default-cipher.patch 
 Patch36:openssl-1.0.1e-add-suse-default-cipher-header.patch
 Patch37:openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
-Patch38:openssl-1.0.1i-noec2m-fix.patch
 
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
@@ -191,7 +191,6 @@
 %patch35 -p1
 %patch36 -p1
 %patch37 -p1
-%patch38 -p1
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure

++ VIA_padlock_support_on_64systems.patch ++
--- /var/tmp/diff_new_pack.8uO0Vp/_old  2015-01-20 21:53:49.0 +0100
+++ /var/tmp/diff_new_pack.8uO0Vp/_new  2015-01-20 21:53:49.0 +0100
@@ -1,7 +1,7 @@
-Index: openssl-1.0.1c/engines/e_padlock.c
+Index: openssl-1.0.1k/engines/e_padlock.c
 ===
 openssl-1.0.1c.orig/engines/e_padlock.c
-+++ openssl-1.0.1c/engines/e_padlock.c
+--- openssl-1.0.1k.orig/engines/e_padlock.c
 openssl-1.0.1k/engines/e_padlock.c
 @@ -101,7 +101,10 @@
 compiler choice is limited to GCC and Microsoft C. */
  #undef COMPILE_HW_PADLOCK
@@ -22,29 +22,7 @@
  /*
   * As for excessive push %ebx/pop %ebx found all over.
   * When generating position-independent code GCC won't let
-@@ -383,21 +387,6 @@ padlock_available(void)
-   return padlock_use_ace + padlock_use_rng;
- }
- 
--#ifndef OPENSSL_NO_AES
--/* Our own htonl()/ntohl() */
--static inline void
--padlock_bswapl(AES_KEY *ks)
--{
--  size_t i = 

commit openssl for openSUSE:Factory

2014-12-17 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-12-17 19:18:04

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-08-25 
11:03:36.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-12-17 
19:17:04.0 +0100
@@ -1,0 +2,25 @@
+Tue Nov 18 09:42:50 UTC 2014 - br...@aljex.com
+
+- suse_version 10.1  10.2 x86_64 can not enable-ec_nistp_64_gcc_128
+
+---
+Mon Nov 17 12:34:12 UTC 2014 - meiss...@suse.com
+
+- openssl-1.0.1i-noec2m-fix.patch: only report the Elliptic Curves
+  we actually support (not the binary ones) (bnc#905037)
+
+---
+Fri Nov  7 22:09:27 UTC 2014 - br...@aljex.com
+
+- openSUSE  11.2 doesn't have accept4()
+
+---
+Tue Oct 21 19:58:31 UTC 2014 - crrodrig...@opensuse.org
+
+- openSSL 1.0.1j 
+* Fix SRTP Memory Leak (CVE-2014-3513)
+* Session Ticket Memory Leak (CVE-2014-3567)
+* Add SSL 3.0 Fallback protection (TLS_FALLBACK_SCSV)
+* Build option no-ssl3 is incomplete (CVE-2014-3568)
+
+---

Old:

  openssl-1.0.1i.tar.gz
  openssl-1.0.1i.tar.gz.asc

New:

  openssl-1.0.1i-noec2m-fix.patch
  openssl-1.0.1j.tar.gz
  openssl-1.0.1j.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.p3p8Ac/_old  2014-12-17 19:17:06.0 +0100
+++ /var/tmp/diff_new_pack.p3p8Ac/_new  2014-12-17 19:17:06.0 +0100
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.1i
+Version:1.0.1j
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
@@ -47,7 +47,9 @@
 Patch0: merge_from_0.9.8k.patch
 Patch1: openssl-1.0.0-c_rehash-compat.diff
 Patch2: bug610223.patch
+%if 0%{?suse_version} = 1120
 Patch3: openssl-ocloexec.patch
+%endif
 Patch4: VIA_padlock_support_on_64systems.patch
 # PATCH-FIX-UPSTREAM http://rt.openssl.org/Ticket/Attachment/WithHeaders/20049
 Patch5: openssl-fix-pod-syntax.diff
@@ -72,6 +74,7 @@
 Patch35:openssl-1.0.1e-add-suse-default-cipher.patch 
 Patch36:openssl-1.0.1e-add-suse-default-cipher-header.patch
 Patch37:openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
+Patch38:openssl-1.0.1i-noec2m-fix.patch
 
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
@@ -164,7 +167,9 @@
 %patch0 -p1
 %patch1 -p1
 %patch2 -p1
+%if 0%{?suse_version} = 1120
 %patch3
+%endif
 %patch4 -p1
 %patch5 -p1
 %patch6 -p1
@@ -186,6 +191,7 @@
 %patch35 -p1
 %patch36 -p1
 %patch37 -p1
+%patch38 -p1
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -243,8 +249,10 @@
 enable-rfc3779 \
 %endif
 %ifarch x86_64 aarch64 ppc64le
+%if 0%{?suse_version}  1010 || 0%{?suse_version}  1020
 enable-ec_nistp_64_gcc_128 \
 %endif
+%endif
 enable-camellia \
 zlib \
 no-ec2m \

++ 0001-libcrypto-Hide-library-private-symbols.patch ++
 715 lines (skipped)
 between 
/work/SRC/openSUSE:Factory/openssl/0001-libcrypto-Hide-library-private-symbols.patch
 and 
/work/SRC/openSUSE:Factory/.openssl.new/0001-libcrypto-Hide-library-private-symbols.patch

++ openssl-1.0.1e-fips-ec.patch ++
--- /var/tmp/diff_new_pack.p3p8Ac/_old  2014-12-17 19:17:06.0 +0100
+++ /var/tmp/diff_new_pack.p3p8Ac/_new  2014-12-17 19:17:06.0 +0100
@@ -1,7 +1,5 @@
-Index: openssl-1.0.1g/crypto/ecdh/ecdh.h
-===
 openssl-1.0.1g.orig/crypto/ecdh/ecdh.h
-+++ openssl-1.0.1g/crypto/ecdh/ecdh.h
+--- openssl-1.0.1j.orig/crypto/ecdh/ecdh.h
 openssl-1.0.1j/crypto/ecdh/ecdh.h
 @@ -85,6 +85,8 @@
  extern C {
  #endif
@@ -11,10 +9,8 @@
  const ECDH_METHOD *ECDH_OpenSSL(void);
  
  voidECDH_set_default_method(const ECDH_METHOD *);
-Index: openssl-1.0.1g/crypto/ecdh/ecdhtest.c
-===
 openssl-1.0.1g.orig/crypto/ecdh/ecdhtest.c
-+++ openssl-1.0.1g/crypto/ecdh/ecdhtest.c
+--- openssl-1.0.1j.orig/crypto/ecdh/ecdhtest.c
 openssl-1.0.1j/crypto/ecdh/ecdhtest.c
 @@ -323,11 +323,15 @@ int main(int argc, char *argv[])
if ((ctx=BN_CTX_new()) == NULL) goto err;
  
@@ -31,10 +27,8 @@
  #ifndef OPENSSL_NO_EC2M
/* NIST BINARY CURVES TESTS */
if (!test_ecdh_curve(NID_sect163k1, 

commit openssl for openSUSE:Factory

2014-08-25 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-08-25 11:03:07

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-07-27 
08:25:53.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-08-25 
11:03:36.0 +0200
@@ -1,0 +2,63 @@
+Thu Aug 21 15:05:43 UTC 2014 - meiss...@suse.com
+
+- openssl.keyring: the 1.0.1i release was done by 
+  Matt Caswell m...@openssl.org UK 0E604491
+
+---
+Thu Aug 14 10:27:07 UTC 2014 - vci...@suse.com
+
+- rename README.SuSE (old spelling) to README.SUSE (bnc#889013)
+
+---
+Wed Aug 13 17:43:21 UTC 2014 - vci...@suse.com
+
+- update to 1.0.1i
+  * Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
+SRP code can be overrun an internal buffer. Add sanity check that
+g, A, B  N to SRP code.
+(CVE-2014-3512)
+  * A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
+TLS 1.0 instead of higher protocol versions when the ClientHello message
+is badly fragmented. This allows a man-in-the-middle attacker to force a
+downgrade to TLS 1.0 even if both the server and the client support a
+higher protocol version, by modifying the client's TLS records.
+(CVE-2014-3511)
+  * OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
+to a denial of service attack. A malicious server can crash the client
+with a null pointer dereference (read) by specifying an anonymous (EC)DH
+ciphersuite and sending carefully crafted handshake messages.
+(CVE-2014-3510)
+  * By sending carefully crafted DTLS packets an attacker could cause openssl
+to leak memory. This can be exploited through a Denial of Service attack.
+(CVE-2014-3507)
+  * An attacker can force openssl to consume large amounts of memory whilst
+processing DTLS handshake messages. This can be exploited through a
+Denial of Service attack.
+(CVE-2014-3506)
+  * An attacker can force an error condition which causes openssl to crash
+whilst processing DTLS packets due to memory being freed twice. This
+can be exploited through a Denial of Service attack.
+(CVE-2014-3505)
+  * If a multithreaded client connects to a malicious server using a resumed
+session and the server sends an ec point format extension it could write
+up to 255 bytes to freed memory.
+(CVE-2014-3509)
+  * A malicious server can crash an OpenSSL client with a null pointer
+dereference (read) by specifying an SRP ciphersuite even though it was not
+properly negotiated with the client. This can be exploited through a
+Denial of Service attack.
+(CVE-2014-5139)
+  * A flaw in OBJ_obj2txt may cause pretty printing functions such as
+X509_name_oneline, X509_name_print_ex et al. to leak some information
+from the stack. Applications may be affected if they echo pretty printing
+output to the attacker.
+(CVE-2014-3508)
+  * Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.)
+for corner cases. (Certain input points at infinity could lead to
+bogus results, with non-infinity inputs mapped to infinity too.)
+- refreshed patches:
+  * openssl-1.0.1e-new-fips-reqs.patch
+  * 0005-libssl-Hide-library-private-symbols.patch
+(thanks to Marcus Meissner)
+
+---

Old:

  README.SuSE
  openssl-1.0.1h.tar.gz
  openssl-1.0.1h.tar.gz.asc

New:

  README.SUSE
  openssl-1.0.1i.tar.gz
  openssl-1.0.1i.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.enj1Ob/_old  2014-08-25 11:03:37.0 +0200
+++ /var/tmp/diff_new_pack.enj1Ob/_new  2014-08-25 11:03:37.0 +0200
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.1h
+Version:1.0.1i
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
@@ -42,7 +42,7 @@
 # to get mtime of file:
 Source1:openssl.changes
 Source2:baselibs.conf
-Source10:   README.SuSE
+Source10:   README.SUSE
 Source11:   README-FIPS.txt
 Patch0: merge_from_0.9.8k.patch
 Patch1: openssl-1.0.0-c_rehash-compat.diff
@@ -467,7 +467,7 @@
 %files -f filelist
 %defattr(-, root, root)
 %doc CHANGE* INSTAL* AVAILABLE_CIPHERS
-%doc LICENSE NEWS README README.SuSE README-FIPS.txt
+%doc LICENSE NEWS README README.SUSE 

commit openssl for openSUSE:Factory

2014-07-27 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-07-27 08:25:44

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-06-25 
15:24:32.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-07-27 
08:25:53.0 +0200
@@ -1,0 +2,7 @@
+Mon Jul 21 10:49:35 UTC 2014 - jeng...@inai.de
+
+- Move manpages around: *.1ssl should be in openssl
+  (e.g. ciphers(1ssl) is also referenced by openssl(1)),
+  and *.3ssl should be in openssl-doc.
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.0m6JVV/_old  2014-07-27 08:25:54.0 +0200
+++ /var/tmp/diff_new_pack.0m6JVV/_new  2014-07-27 08:25:54.0 +0200
@@ -336,8 +336,8 @@
else
mv $i ${i}ssl
 fi
-   case `basename ${i%.*}` in 
-   
asn1parse|ca|config|crl|crl2pkcs7|crypto|dgst|dhparam|dsa|dsaparam|enc|gendsa|genrsa|nseq|openssl|passwd|pkcs12|pkcs7|pkcs8|rand|req|rsa|rsautl|s_client|s_server|smime|spkac|ssl|verify|version|x509)
+   case $i in
+   *.1)
# these are the pages mentioned in openssl(1). They go into the 
main package.
echo %doc %{_mandir}/${i}ssl.gz  $OLDPWD/filelist;;
*)  



-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2014-06-25 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-06-25 15:24:16

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-06-18 
07:47:43.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-06-25 
15:24:32.0 +0200
@@ -1,0 +2,5 @@
+Tue Jun 24 08:22:24 UTC 2014 - meiss...@suse.com
+
+- recommend: ca-certificates-mozilla instead of openssl-certs
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.8LGSDw/_old  2014-06-25 15:24:33.0 +0200
+++ /var/tmp/diff_new_pack.8LGSDw/_new  2014-06-25 15:24:33.0 +0200
@@ -95,7 +95,7 @@
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
 Group:  Productivity/Networking/Security
-Recommends: openssl-certs
+Recommends: ca-certificates-mozilla
 # bug437293
 %ifarch ppc64
 Obsoletes:  openssl-64bit



-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2014-06-17 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-06-18 07:47:41

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-05-14 
10:26:09.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-06-18 
07:47:43.0 +0200
@@ -1,0 +2,40 @@
+Thu Jun  5 14:37:19 UTC 2014 - meiss...@suse.com
+
+- updated openssl to 1.0.1h (bnc#880891):
+  - CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully 
crafted
+handshake can force the use of weak keying material in OpenSSL
+SSL/TLS clients and servers.
+  - CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS 
handshake to an
+OpenSSL DTLS client the code can be made to recurse eventually crashing
+in a DoS attack.
+  - CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer
+overrun attack can be triggered by sending invalid DTLS fragments to
+an OpenSSL DTLS client or server. This is potentially exploitable to
+run arbitrary code on a vulnerable client or server.
+  - CVE-2014-3470: Fix bug in TLS code where clients enable anonymous
+ECDH ciphersuites are subject to a denial of service attack.
+- openssl-buffreelistbug-aka-CVE-2010-5298.patch: removed, upstream
+- CVE-2014-0198.patch: removed, upstream
+- 0009-Fix-double-frees.patch: removed, upstream
+- 0012-Fix-eckey_priv_encode.patch: removed, upstream
+- 0017-Double-free-in-i2o_ECPublicKey.patch: removed, upstream
+- 0018-fix-coverity-issues-966593-966596.patch: removed, upstream
+- 0020-Initialize-num-properly.patch: removed, upstream
+- 0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch: removed, upstream
+- 0023-evp-prevent-underflow-in-base64-decoding.patch: removed, upstream
+- 0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch: removed, 
upstream
+- 0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch: removed, 
upstream
+
+- 0001-libcrypto-Hide-library-private-symbols.patch: disabled heartbeat 
testcase
+- openssl-1.0.1c-ipv6-apps.patch: refreshed
+- openssl-fix-pod-syntax.diff: some stuff merged upstream, refreshed
+
+---
+Wed May 21 12:19:53 UTC 2014 - vpere...@novell.com
+
+- Added new SUSE default cipher suite
+  openssl-1.0.1e-add-suse-default-cipher.patch
+  openssl-1.0.1e-add-suse-default-cipher-header.patch
+  openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
+
+---

Old:

  0009-Fix-double-frees.patch
  0012-Fix-eckey_priv_encode.patch
  0017-Double-free-in-i2o_ECPublicKey.patch
  0018-fix-coverity-issues-966593-966596.patch
  0020-Initialize-num-properly.patch
  0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch
  0023-evp-prevent-underflow-in-base64-decoding.patch
  0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch
  0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch
  CVE-2014-0198.patch
  openssl-1.0.1g.tar.gz
  openssl-1.0.1g.tar.gz.asc
  openssl-buffreelistbug-aka-CVE-2010-5298.patch

New:

  openssl-1.0.1e-add-suse-default-cipher-header.patch
  openssl-1.0.1e-add-suse-default-cipher.patch
  openssl-1.0.1e-add-test-suse-default-cipher-suite.patch
  openssl-1.0.1h.tar.gz
  openssl-1.0.1h.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.Ma4WJG/_old  2014-06-18 07:47:45.0 +0200
+++ /var/tmp/diff_new_pack.Ma4WJG/_new  2014-06-18 07:47:45.0 +0200
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.1g
+Version:1.0.1h
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
@@ -65,21 +65,14 @@
 Patch17:openssl-1.0.1e-fips-ctor.patch
 Patch18:openssl-1.0.1e-new-fips-reqs.patch
 Patch19:openssl-gcc-attributes.patch
-Patch20:openssl-buffreelistbug-aka-CVE-2010-5298.patch
 Patch21:openssl-libssl-noweakciphers.patch
-Patch22:CVE-2014-0198.patch
-Patch23:0009-Fix-double-frees.patch
-Patch24:0012-Fix-eckey_priv_encode.patch
-Patch25:0017-Double-free-in-i2o_ECPublicKey.patch
 Patch26:0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
-Patch27:0018-fix-coverity-issues-966593-966596.patch
-Patch28:0020-Initialize-num-properly.patch
-Patch29:0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch
-Patch30:0023-evp-prevent-underflow-in-base64-decoding.patch
-Patch31:

commit openssl for openSUSE:Factory

2014-05-14 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-05-14 10:26:07

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-05-09 
06:57:36.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-05-14 
10:26:09.0 +0200
@@ -1,0 +2,25 @@
+Fri May  9 04:42:46 UTC 2014 - crrodrig...@opensuse.org
+
+- Add upstream patches fixing coverity scan issues:
+* 0018-fix-coverity-issues-966593-966596.patch
+* 0020-Initialize-num-properly.patch
+* 0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch
+* 0023-evp-prevent-underflow-in-base64-decoding.patch
+* 0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch
+* 0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch
+
+- Update 0001-libcrypto-Hide-library-private-symbols.patch
+  to cover more private symbols, now 98% complete and probably
+  not much more can be done to fix the rest of the ill-defined API.
+
+- openssl-fips-hidden.patch new, hides private symbols added by the
+  FIPS patches.
+
+- openssl-no-egd.patch disable the EGD (entropy gathering daemon)
+  interface, we have no EGD in the distro and obtaining entropy from
+  a place other than /dev/*random, the hardware rng or the openSSL
+  internal PRNG is an extremely bad  dangerous idea.
+
+- use secure_getenv instead of getenv everywhere.
+
+---

New:

  0018-fix-coverity-issues-966593-966596.patch
  0020-Initialize-num-properly.patch
  0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch
  0023-evp-prevent-underflow-in-base64-decoding.patch
  0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch
  0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch
  openssl-fips-hidden.patch
  openssl-no-egd.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.9ImmWn/_old  2014-05-14 10:26:11.0 +0200
+++ /var/tmp/diff_new_pack.9ImmWn/_new  2014-05-14 10:26:11.0 +0200
@@ -72,6 +72,14 @@
 Patch24:0012-Fix-eckey_priv_encode.patch
 Patch25:0017-Double-free-in-i2o_ECPublicKey.patch
 Patch26:0001-Axe-builtin-printf-implementation-use-glibc-instead.patch
+Patch27:0018-fix-coverity-issues-966593-966596.patch
+Patch28:0020-Initialize-num-properly.patch
+Patch29:0022-bignum-allow-concurrent-BN_MONT_CTX_set_locked.patch
+Patch30:0023-evp-prevent-underflow-in-base64-decoding.patch
+Patch31:0024-Fixed-NULL-pointer-dereference-in-PKCS7_dataDecode-r.patch
+Patch32:0025-fix-coverity-issue-966597-error-line-is-not-always-i.patch
+Patch33:openssl-no-egd.patch
+Patch34:openssl-fips-hidden.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -185,6 +193,14 @@
 %patch24 -p1
 %patch25 -p1
 %patch26 -p1
+%patch27 -p1
+%patch28 -p1
+%patch29 -p1
+%patch30 -p1
+%patch31 -p1
+%patch32 -p1
+%patch33 -p1
+%patch34 -p1
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -222,6 +238,11 @@
 sed -i -e s|#define DATE \(.*\).LC_ALL.*date.|#define DATE \1$CHANGES| 
crypto/Makefile
 
 %build
+
+%if 0%{suse_version} = 1230
+find -type f -name *.c -exec sed -i -e s@getenv@secure_getenv@g {} +
+%endif
+
 %ifarch armv5el armv5tel
 export MACHINE=armv5el
 %endif
@@ -236,7 +257,7 @@
 no-ssl2 \
 enable-rfc3779 \
 %endif
-%ifarch x86_64 
+%ifarch x86_64 aarch64 ppc64le
 enable-ec_nistp_64_gcc_128 \
 %endif
 enable-camellia \

++ 0001-libcrypto-Hide-library-private-symbols.patch ++
--- /var/tmp/diff_new_pack.9ImmWn/_old  2014-05-14 10:26:11.0 +0200
+++ /var/tmp/diff_new_pack.9ImmWn/_new  2014-05-14 10:26:11.0 +0200
@@ -37,8 +37,6 @@
  crypto/x509v3/pcy_int.h  |  3 +++
  31 files changed, 85 insertions(+), 17 deletions(-)
 
-Index: openssl-1.0.1g/apps/Makefile
-===
 --- openssl-1.0.1g.orig/apps/Makefile
 +++ openssl-1.0.1g/apps/Makefile
 @@ -20,7 +20,7 @@ EXE_EXT=
@@ -50,8 +48,6 @@
  
  GENERAL=Makefile makeapps.com install.com
  
-Index: openssl-1.0.1g/crypto/asn1/asn1_locl.h
-===
 --- openssl-1.0.1g.orig/crypto/asn1/asn1_locl.h
 +++ openssl-1.0.1g/crypto/asn1/asn1_locl.h
 @@ -58,6 +58,8 @@
@@ -69,8 +65,6 @@
};
 +
 +#pragma GCC visibility pop
-Index: openssl-1.0.1g/crypto/bn/bn_lcl.h
-===
 --- openssl-1.0.1g.orig/crypto/bn/bn_lcl.h
 +++ 

commit openssl for openSUSE:Factory

2014-04-26 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-04-26 17:01:45

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-04-18 
11:07:27.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-04-26 
17:01:46.0 +0200
@@ -1,0 +2,47 @@
+Sun Apr 20 00:53:34 UTC 2014 - crrodrig...@opensuse.org
+
+- Build everything with full RELRO (-Wl,-z,relro,-z,now)
+- Remove -fstack-protector from the hardcoded build options
+  it is already in RPM_OPT_FLAGS and is replaced by 
+  -fstack-protector-strong with gcc 4.9
+
+---
+Sun Apr 20 00:49:25 UTC 2014 - crrodrig...@opensuse.org
+
+- Remove the gmp and capi shared engines, nobody noticed 
+  but they are just dummies that do nothing. 
+
+---
+Sat Apr 19 22:29:10 UTC 2014 - crrodrig...@opensuse.org
+
+- Use enable-rfc3779 to allow projects such as rpki.net 
+  to work in openSUSE and match the functionality
+  available in Debian/Fedora/etc
+
+---
+Sat Apr 19 22:22:01 UTC 2014 - crrodrig...@opensuse.org
+
+- openssl-buffreelistbug-aka-CVE-2010-5298.patch fix 
+  CVE-2010-5298 and disable the internal BUF_FREELISTS
+  functionality. it hides bugs like heartbleed and is
+  there only for systems on which malloc() free() are slow.
+
+- ensure we export MALLOC_CHECK and PERTURB during the test
+  suite, now that the freelist functionality is disabled it
+  will help to catch bugs before they hit users.
+
+---
+Sat Apr 19 03:45:20 UTC 2014 - crrodrig...@opensuse.org
+
+- openssl-libssl-noweakciphers.patch do not offer export
+  or low quality ciphers by default. using such ciphers
+  is not forbidden but requires an explicit request
+
+---
+Fri Apr 18 14:07:47 UTC 2014 - crrodrig...@opensuse.org
+
+- openssl-gcc-attributes.patch: fix thinko, CRYPTO_realloc_clean does 
+  not return memory of num * old_num but only num size
+  fortunately this function is currently unused.
+
+---

New:

  openssl-buffreelistbug-aka-CVE-2010-5298.patch
  openssl-libssl-noweakciphers.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.Nrfoy5/_old  2014-04-26 17:01:47.0 +0200
+++ /var/tmp/diff_new_pack.Nrfoy5/_new  2014-04-26 17:01:47.0 +0200
@@ -65,6 +65,8 @@
 Patch17:openssl-1.0.1e-fips-ctor.patch
 Patch18:openssl-1.0.1e-new-fips-reqs.patch
 Patch19:openssl-gcc-attributes.patch
+Patch20:openssl-buffreelistbug-aka-CVE-2010-5298.patch
+Patch21:openssl-libssl-noweakciphers.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -171,6 +173,8 @@
 %patch17 -p1
 %patch18 -p1
 %patch19 -p1
+%patch20 -p1
+%patch21 -p1
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -220,6 +224,7 @@
 fips \
 %if 0%{suse_version}  1310
 no-ssl2 \
+enable-rfc3779 \
 %endif
 %ifarch x86_64 
 enable-ec_nistp_64_gcc_128 \
@@ -232,18 +237,16 @@
 --openssldir=%{ssletcdir} \
 $RPM_OPT_FLAGS -O3 -std=gnu99 \
 -Wa,--noexecstack \
+-Wl,-z,relro,-z,now \
 -fomit-frame-pointer \
 -DTERMIO \
 -DPURIFY \
 -DSSL_FORBID_ENULL \
 -D_GNU_SOURCE \
+-DOPENSSL_NO_BUF_FREELISTS \
 $(getconf LFS_CFLAGS) \
-%ifnarch hppa aarch64
--Wall \
--fstack-protector 
-%else
 -Wall 
-%endif
+
 #
 #%{!?do_profiling:%define do_profiling 0}
 #%if %do_profiling
@@ -278,7 +281,8 @@
 # These files are just there for the make test below...
 crypto/fips/fips_standalone_hmac libcrypto.so.1.0.0  .libcrypto.so.1.0.0.hmac
 crypto/fips/fips_standalone_hmac libssl.so.1.0.0  .libssl.so.1.0.0.hmac
-
+export MALLOC_CHECK_=3
+export MALLOC_PERTURB_=$(($RANDOM % 255 + 1))
 LD_LIBRARY_PATH=`pwd` make test FIPSCANLIB=
%ifnarch armv4l
LD_LIBRARY_PATH=`pwd` make test
@@ -401,7 +405,7 @@
 ln -sf /%{_lib}/libssl.so.%{num_version} ./libssl.so
 ln -sf /%{_lib}/libcrypto.so.%{num_version} ./libcrypto.so
 
-for engine in 4758cca atalla nuron sureware ubsec cswift chil aep; do
+for engine in 4758cca atalla nuron sureware ubsec cswift chil aep gmp capi; do
 rm %{buildroot}/%{_lib}/engines/lib$engine.so
 done
 


++ openssl-buffreelistbug-aka-CVE-2010-5298.patch ++
--- openssl-1.0.1g.orig/ssl/s3_pkt.c
+++ openssl-1.0.1g/ssl/s3_pkt.c
@@ 

commit openssl for openSUSE:Factory

2014-04-18 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-04-18 11:07:25

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-04-17 
14:35:57.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-04-18 
11:07:27.0 +0200
@@ -1,0 +2,14 @@
+Fri Apr 11 02:40:34 UTC 2014 - crrodrig...@opensuse.org
+
+- openssl-gcc-attributes.patch 
+  * annotate memory allocation wrappers with attribute(alloc_size)
+so the compiler can tell us if it knows they are being misused
+  * OPENSSL_showfatal is annotated with attribute printf to detect
+format string problems.
+
+- It is time to try to disable SSLv2 again, it was tried a while
+  ago but broke too many things, nowadays Debian, Ubuntu, the BSDs
+  all have disabled it, most components are already fixed.
+  I will fix the remaining fallout if any. (email me)
+
+---

New:

  openssl-gcc-attributes.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.RuN2pa/_old  2014-04-18 11:25:05.0 +0200
+++ /var/tmp/diff_new_pack.RuN2pa/_new  2014-04-18 11:25:05.0 +0200
@@ -64,6 +64,7 @@
 Patch16:openssl-1.0.1e-fips-ec.patch
 Patch17:openssl-1.0.1e-fips-ctor.patch
 Patch18:openssl-1.0.1e-new-fips-reqs.patch
+Patch19:openssl-gcc-attributes.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -169,7 +170,7 @@
 %patch16 -p1
 %patch17 -p1
 %patch18 -p1
-
+%patch19 -p1
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -217,6 +218,9 @@
 #
 config_flags=threads shared no-rc5 no-idea \
 fips \
+%if 0%{suse_version}  1310
+no-ssl2 \
+%endif
 %ifarch x86_64 
 enable-ec_nistp_64_gcc_128 \
 %endif


++ openssl-gcc-attributes.patch ++
--- openssl-1.0.1g.orig/crypto/cryptlib.h
+++ openssl-1.0.1g/crypto/cryptlib.h
@@ -100,7 +100,7 @@ extern C {
 
 void OPENSSL_cpuid_setup(void);
 extern unsigned int OPENSSL_ia32cap_P[];
-void OPENSSL_showfatal(const char *fmta,...);
+void OPENSSL_showfatal(const char *fmta,...) __attribute__ ((format (printf, 
1, 2)));
 void *OPENSSL_stderr(void);
 extern int OPENSSL_NONPIC_relocated;
 
--- openssl-1.0.1g.orig/crypto/crypto.h
+++ openssl-1.0.1g/crypto/crypto.h
@@ -487,15 +487,15 @@ void CRYPTO_get_mem_debug_functions(void
void (**so)(long),
long (**go)(void));
 
-void *CRYPTO_malloc_locked(int num, const char *file, int line);
+void *CRYPTO_malloc_locked(int num, const char *file, int line) 
__attribute__((alloc_size(1)));
 void CRYPTO_free_locked(void *ptr);
-void *CRYPTO_malloc(int num, const char *file, int line);
+void *CRYPTO_malloc(int num, const char *file, int line) 
__attribute__((alloc_size(1)));
 char *CRYPTO_strdup(const char *str, const char *file, int line);
 void CRYPTO_free(void *ptr);
-void *CRYPTO_realloc(void *addr,int num, const char *file, int line);
+void *CRYPTO_realloc(void *addr,int num, const char *file, int line) 
__attribute__((alloc_size(2)));
 void *CRYPTO_realloc_clean(void *addr,int old_num,int num,const char *file,
-  int line);
-void *CRYPTO_remalloc(void *addr,int num, const char *file, int line);
+  int line) __attribute__((alloc_size(2, 3)));
+void *CRYPTO_remalloc(void *addr,int num, const char *file, int line) 
__attribute__((alloc_size(2)));
 
 void OPENSSL_cleanse(void *ptr, size_t len);
 

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2014-04-17 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-04-17 14:35:56

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-04-15 
07:34:11.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-04-17 
14:35:57.0 +0200
@@ -2,14 +1,0 @@
-Fri Apr 11 02:40:34 UTC 2014 - crrodrig...@opensuse.org
-
-- openssl-gcc-attributes.patch 
-  * annotate memory allocation wrappers with attribute(alloc_size)
-so the compiler can tell us if it knows they are being misused
-  * OPENSSL_showfatal is annotated with attribute printf to detect
-format string problems.
-
-- It is time to try to disable SSLv2 again, it was tried a while
-  ago but broke too many things, nowadays Debian, Ubuntu, the BSDs
-  all have disabled it, most components are already fixed.
-  I will fix the remaining fallout if any. (email me)
-


Old:

  openssl-gcc-attributes.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.rrt9Eu/_old  2014-04-17 14:35:58.0 +0200
+++ /var/tmp/diff_new_pack.rrt9Eu/_new  2014-04-17 14:35:58.0 +0200
@@ -64,7 +64,6 @@
 Patch16:openssl-1.0.1e-fips-ec.patch
 Patch17:openssl-1.0.1e-fips-ctor.patch
 Patch18:openssl-1.0.1e-new-fips-reqs.patch
-Patch19:openssl-gcc-attributes.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -170,7 +169,7 @@
 %patch16 -p1
 %patch17 -p1
 %patch18 -p1
-%patch19 -p1
+
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -218,9 +217,6 @@
 #
 config_flags=threads shared no-rc5 no-idea \
 fips \
-%if 0%{suse_version}  1310
-no-ssl2 \
-%endif
 %ifarch x86_64 
 enable-ec_nistp_64_gcc_128 \
 %endif



-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2014-04-14 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-04-15 07:34:09

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-04-09 
18:17:29.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-04-15 
07:34:11.0 +0200
@@ -1,0 +2,14 @@
+Fri Apr 11 02:40:34 UTC 2014 - crrodrig...@opensuse.org
+
+- openssl-gcc-attributes.patch 
+  * annotate memory allocation wrappers with attribute(alloc_size)
+so the compiler can tell us if it knows they are being misused
+  * OPENSSL_showfatal is annotated with attribute printf to detect
+format string problems.
+
+- It is time to try to disable SSLv2 again, it was tried a while
+  ago but broke too many things, nowadays Debian, Ubuntu, the BSDs
+  all have disabled it, most components are already fixed.
+  I will fix the remaining fallout if any. (email me)
+
+---

New:

  openssl-gcc-attributes.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.Tl15V8/_old  2014-04-15 07:34:12.0 +0200
+++ /var/tmp/diff_new_pack.Tl15V8/_new  2014-04-15 07:34:12.0 +0200
@@ -64,6 +64,7 @@
 Patch16:openssl-1.0.1e-fips-ec.patch
 Patch17:openssl-1.0.1e-fips-ctor.patch
 Patch18:openssl-1.0.1e-new-fips-reqs.patch
+Patch19:openssl-gcc-attributes.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -169,7 +170,7 @@
 %patch16 -p1
 %patch17 -p1
 %patch18 -p1
-
+%patch19 -p1
 cp -p %{S:10} .
 cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -217,6 +218,9 @@
 #
 config_flags=threads shared no-rc5 no-idea \
 fips \
+%if 0%{suse_version}  1310
+no-ssl2 \
+%endif
 %ifarch x86_64 
 enable-ec_nistp_64_gcc_128 \
 %endif


++ openssl-gcc-attributes.patch ++
--- openssl-1.0.1g.orig/crypto/cryptlib.h
+++ openssl-1.0.1g/crypto/cryptlib.h
@@ -100,7 +100,7 @@ extern C {
 
 void OPENSSL_cpuid_setup(void);
 extern unsigned int OPENSSL_ia32cap_P[];
-void OPENSSL_showfatal(const char *fmta,...);
+void OPENSSL_showfatal(const char *fmta,...) __attribute__ ((format (printf, 
1, 2)));
 void *OPENSSL_stderr(void);
 extern int OPENSSL_NONPIC_relocated;
 
--- openssl-1.0.1g.orig/crypto/crypto.h
+++ openssl-1.0.1g/crypto/crypto.h
@@ -487,15 +487,15 @@ void CRYPTO_get_mem_debug_functions(void
void (**so)(long),
long (**go)(void));
 
-void *CRYPTO_malloc_locked(int num, const char *file, int line);
+void *CRYPTO_malloc_locked(int num, const char *file, int line) 
__attribute__((alloc_size(1)));
 void CRYPTO_free_locked(void *ptr);
-void *CRYPTO_malloc(int num, const char *file, int line);
+void *CRYPTO_malloc(int num, const char *file, int line) 
__attribute__((alloc_size(1)));
 char *CRYPTO_strdup(const char *str, const char *file, int line);
 void CRYPTO_free(void *ptr);
-void *CRYPTO_realloc(void *addr,int num, const char *file, int line);
+void *CRYPTO_realloc(void *addr,int num, const char *file, int line) 
__attribute__((alloc_size(2)));
 void *CRYPTO_realloc_clean(void *addr,int old_num,int num,const char *file,
-  int line);
-void *CRYPTO_remalloc(void *addr,int num, const char *file, int line);
+  int line) __attribute__((alloc_size(2, 3)));
+void *CRYPTO_remalloc(void *addr,int num, const char *file, int line) 
__attribute__((alloc_size(2)));
 
 void OPENSSL_cleanse(void *ptr, size_t len);
 

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2014-04-03 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-04-03 16:38:28

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-03-06 
19:29:26.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-04-03 
16:38:30.0 +0200
@@ -1,0 +2,6 @@
+Tue Mar 25 08:11:11 UTC 2014 - shch...@suse.com
+
+- Fix bug[ bnc#869945] CVE-2014-0076: openssl: Recovering OpenSSL ECDSA Nonces 
Using the FLUSH+RELOAD Cache Side-channel Attack
+  Add file: CVE-2014-0076.patch
+
+---

New:

  CVE-2014-0076.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.dXu0c4/_old  2014-04-03 16:38:31.0 +0200
+++ /var/tmp/diff_new_pack.dXu0c4/_new  2014-04-03 16:38:31.0 +0200
@@ -64,6 +64,7 @@
 Patch16:openssl-1.0.1e-fips-ec.patch
 Patch17:openssl-1.0.1e-fips-ctor.patch
 Patch18:openssl-1.0.1e-new-fips-reqs.patch
+Patch19:CVE-2014-0076.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -169,6 +170,7 @@
 %patch16 -p1
 %patch17 -p1
 %patch18 -p1
+%patch19 -p1
 
 cp -p %{S:10} .
 cp -p %{S:11} .

++ CVE-2014-0076.patch ++
Index: openssl-1.0.1f/crypto/bn/bn.h
===
--- openssl-1.0.1f.orig/crypto/bn/bn.h
+++ openssl-1.0.1f/crypto/bn/bn.h
@@ -538,6 +538,8 @@ BIGNUM *BN_mod_inverse(BIGNUM *ret,
 BIGNUM *BN_mod_sqrt(BIGNUM *ret,
const BIGNUM *a, const BIGNUM *n,BN_CTX *ctx);
 
+void   BN_consttime_swap(BN_ULONG swap, BIGNUM *a, BIGNUM *b, int nwords);
+
 /* Deprecated versions */
 #ifndef OPENSSL_NO_DEPRECATED
 BIGNUM *BN_generate_prime(BIGNUM *ret,int bits,int safe,
@@ -774,12 +776,22 @@ int RAND_pseudo_bytes(unsigned char *buf
 
 #define bn_fix_top(a)  bn_check_top(a)
 
+#define bn_check_size(bn, bits) bn_wcheck_size(bn, 
((bits+BN_BITS2-1))/BN_BITS2)
+#define bn_wcheck_size(bn, words) \
+   do { \
+   const BIGNUM *_bnum2 = (bn); \
+   assert(words = (_bnum2)-dmax  words = (_bnum2)-top); \
+   } while(0)
+
 #else /* !BN_DEBUG */
 
 #define bn_pollute(a)
 #define bn_check_top(a)
 #define bn_fix_top(a)  bn_correct_top(a)
 
+#define bn_check_size(bn, bits)
+#define bn_wcheck_size(bn, words)
+
 #endif
 
 #define bn_correct_top(a) \
Index: openssl-1.0.1f/crypto/bn/bn_lib.c
===
--- openssl-1.0.1f.orig/crypto/bn/bn_lib.c
+++ openssl-1.0.1f/crypto/bn/bn_lib.c
@@ -824,3 +824,56 @@ int bn_cmp_part_words(const BN_ULONG *a,
}
return bn_cmp_words(a,b,cl);
}
+
+/* 
+ * Constant-time conditional swap of a and b.  
+ * a and b are swapped if condition is not 0.  The code assumes that at most 
one bit of condition is set.
+ * nwords is the number of words to swap.  The code assumes that at least 
nwords are allocated in both a and b,
+ * and that no more than nwords are used by either a or b.
+ * a and b cannot be the same number
+ */
+void BN_consttime_swap(BN_ULONG condition, BIGNUM *a, BIGNUM *b, int nwords)
+   {
+   BN_ULONG t;
+   int i;
+
+   bn_wcheck_size(a, nwords);
+   bn_wcheck_size(b, nwords);
+
+   assert(a != b);
+   assert((condition  (condition - 1)) == 0);
+   assert(sizeof(BN_ULONG) = sizeof(int));
+
+   condition = ((condition - 1)  (BN_BITS2 - 1)) - 1;
+
+   t = (a-top^b-top)  condition;
+   a-top ^= t;
+   b-top ^= t;
+
+#define BN_CONSTTIME_SWAP(ind) \
+   do { \
+   t = (a-d[ind] ^ b-d[ind])  condition; \
+   a-d[ind] ^= t; \
+   b-d[ind] ^= t; \
+   } while (0)
+
+
+   switch (nwords) {
+   default:
+   for (i = 10; i  nwords; i++) 
+   BN_CONSTTIME_SWAP(i);
+   /* Fallthrough */
+   case 10: BN_CONSTTIME_SWAP(9); /* Fallthrough */
+   case 9: BN_CONSTTIME_SWAP(8); /* Fallthrough */
+   case 8: BN_CONSTTIME_SWAP(7); /* Fallthrough */
+   case 7: BN_CONSTTIME_SWAP(6); /* Fallthrough */
+   case 6: BN_CONSTTIME_SWAP(5); /* Fallthrough */
+   case 5: BN_CONSTTIME_SWAP(4); /* Fallthrough */
+   case 4: BN_CONSTTIME_SWAP(3); /* Fallthrough */
+   case 3: BN_CONSTTIME_SWAP(2); /* Fallthrough */
+   case 2: BN_CONSTTIME_SWAP(1); /* Fallthrough */
+   case 1: BN_CONSTTIME_SWAP(0);
+   }
+#undef BN_CONSTTIME_SWAP
+}
+
Index: openssl-1.0.1f/crypto/ec/ec2_mult.c

commit openssl for openSUSE:Factory

2014-03-06 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-03-06 19:29:26

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-01-23 
15:50:23.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-03-06 
19:29:26.0 +0100
@@ -1,0 +2,6 @@
+Mon Mar  3 06:44:52 UTC 2014 - shch...@suse.com
+
+- additional changes required for FIPS validation( from Fedora repo) 
+  Add patch file: openssl-1.0.1e-new-fips-reqs.patch
+
+---

New:

  openssl-1.0.1e-new-fips-reqs.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.VEnGIt/_old  2014-03-06 19:29:28.0 +0100
+++ /var/tmp/diff_new_pack.VEnGIt/_new  2014-03-06 19:29:28.0 +0100
@@ -63,6 +63,7 @@
 Patch15:openssl-1.0.1e-fips.patch
 Patch16:openssl-1.0.1e-fips-ec.patch
 Patch17:openssl-1.0.1e-fips-ctor.patch
+Patch18:openssl-1.0.1e-new-fips-reqs.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -167,6 +168,7 @@
 %patch15 -p1
 %patch16 -p1
 %patch17 -p1
+%patch18 -p1
 
 cp -p %{S:10} .
 cp -p %{S:11} .

++ openssl-1.0.1e-new-fips-reqs.patch ++
 1113 lines (skipped)



-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2014-01-23 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-01-17 11:05:16

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-01-09 
17:25:39.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-01-23 
15:50:23.0 +0100
@@ -1,0 +2,34 @@
+Sat Jan 11 08:42:54 UTC 2014 - shch...@suse.com
+
+- Remove GCC option -O3 for compiliation issue of ARM version 
+  Modify: openssl.spec
+
+---
+Fri Jan 10 14:43:20 UTC 2014 - shch...@suse.com
+
+- Adjust the installation path( libopenssl/hmac into /lib or /lib64)
+  Modify files: README-FIPS.txt openssl.spec 
+
+---
+Thu Jan  9 23:08:29 UTC 2014 - andreas.stie...@gmx.de
+
+- 1.0.1f:
+  * Fix for TLS record tampering bug CVE-2013-4353
+- already included:
+  * Fix for TLS version checking bug CVE-2013-6449
+  * Fix for DTLS retransmission bug CVE-2013-6450
+- removed patches:
+  * CVE-2013-6449.patch, committed upstream
+  * CVE-2013-6450.patch, committed upstream
+  * SSL_get_certificate-broken.patch, committed upstream
+  * openssl-1.0.1e-bnc822642.patch, committed upstream
+- modified patches:
+  * openssl-1.0.1e-fips.patch, adjust for upstream changes
+  * openssl-fix-pod-syntax.diff, adjust for upstream changes
+
+---
+Wed Jan  8 22:01:36 UTC 2014 - andreas.stie...@gmx.de
+
+- add a gpg keyring for source tarball
+
+---

Old:

  CVE-2013-6449.patch
  CVE-2013-6450.patch
  SSL_get_certificate-broken.patch
  openssl-1.0.1e-bnc822642.patch
  openssl-1.0.1e.tar.gz
  openssl-1.0.1e.tar.gz.asc

New:

  openssl-1.0.1f.tar.gz
  openssl-1.0.1f.tar.gz.asc
  openssl.keyring



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.BTHegN/_old  2014-01-23 15:50:23.0 +0100
+++ /var/tmp/diff_new_pack.BTHegN/_new  2014-01-23 15:50:23.0 +0100
@@ -29,14 +29,16 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.1e
+Version:1.0.1f
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
 Group:  Productivity/Networking/Security
-Url:http://www.openssl.org/
-Source: http://www.%{name}.org/source/%{name}-%{version}.tar.gz
-Source42:   http://www.%{name}.org/source/%{name}-%{version}.tar.gz.asc
+Url:https://www.openssl.org/
+Source: https://www.%{name}.org/source/%{name}-%{version}.tar.gz
+Source42:   https://www.%{name}.org/source/%{name}-%{version}.tar.gz.asc
+# https://www.openssl.org/about/
+Source43:   
http://pgp.mit.edu:11371/pks/lookup?op=getsearch=0xA2D29B7BF295C759#/%name.keyring
 # to get mtime of file:
 Source1:openssl.changes
 Source2:baselibs.conf
@@ -54,8 +56,6 @@
 Patch8: 0005-libssl-Hide-library-private-symbols.patch
 Patch9: openssl-1.0.1c-default-paths.patch
 Patch10:openssl-pkgconfig.patch
-Patch11:SSL_get_certificate-broken.patch
-Patch12:openssl-1.0.1e-bnc822642.patch
 # From Fedora openssl.
 Patch13:openssl-1.0.1c-ipv6-apps.patch
 Patch14:0001-libcrypto-Hide-library-private-symbols.patch
@@ -63,8 +63,6 @@
 Patch15:openssl-1.0.1e-fips.patch
 Patch16:openssl-1.0.1e-fips-ec.patch
 Patch17:openssl-1.0.1e-fips-ctor.patch
-Patch18:CVE-2013-6449.patch
-Patch19:CVE-2013-6450.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -164,15 +162,11 @@
 %patch8 -p1
 %patch9 -p1
 %patch10 -p1
-%patch11 -p1
-%patch12 -p1
 %patch13 -p1
 %patch14 -p1
 %patch15 -p1
 %patch16 -p1
 %patch17 -p1
-%patch18 -p1
-%patch19 -p1
 
 cp -p %{S:10} .
 cp -p %{S:11} .
@@ -230,7 +224,7 @@
 --prefix=%{_prefix} \
 --libdir=%{_lib} \
 --openssldir=%{ssletcdir} \
-$RPM_OPT_FLAGS -O3 -std=gnu99 \
+$RPM_OPT_FLAGS -std=gnu99 \
 -Wa,--noexecstack \
 -fomit-frame-pointer \
 -DTERMIO \
@@ -383,25 +377,23 @@
 %{expand:%%global __os_install_post {%__os_install_post
 
 $RPM_BUILD_ROOT/usr/bin/fips_standalone_hmac \
-  $RPM_BUILD_ROOT/%{_libdir}/libssl.so.%{num_version}  \
-$RPM_BUILD_ROOT/%{_libdir}/.libssl.so.%{num_version}.hmac
+  $RPM_BUILD_ROOT/%{_lib}/libssl.so.%{num_version}  \
+$RPM_BUILD_ROOT/%{_lib}/.libssl.so.%{num_version}.hmac
 
 $RPM_BUILD_ROOT/usr/bin/fips_standalone_hmac \
-  $RPM_BUILD_ROOT/%{_libdir}/libcrypto.so.%{num_version}  \
-

commit openssl for openSUSE:Factory

2014-01-09 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-01-09 17:25:37

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2014-01-03 
14:57:37.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-01-09 
17:25:39.0 +0100
@@ -1,0 +2,6 @@
+Wed Jan  8 10:57:24 UTC 2014 - shch...@suse.com
+
+- Fixed bnc#857850, openssl doesn't load engine
+  Modify file: openssl.spec
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.Lj2pim/_old  2014-01-09 17:25:40.0 +0100
+++ /var/tmp/diff_new_pack.Lj2pim/_new  2014-01-09 17:25:40.0 +0100
@@ -396,7 +396,7 @@
 mkdir $RPM_BUILD_ROOT/%{_lib}
 #mv $RPM_BUILD_ROOT%{_libdir}/libssl.so.%{num_version} $RPM_BUILD_ROOT/%{_lib}/
 #mv $RPM_BUILD_ROOT%{_libdir}/libcrypto.so.%{num_version} 
$RPM_BUILD_ROOT/%{_lib}/
-#mv $RPM_BUILD_ROOT%{_libdir}/engines $RPM_BUILD_ROOT/%{_lib}/
+mv $RPM_BUILD_ROOT%{_libdir}/engines $RPM_BUILD_ROOT/%{_lib}/
 cd $RPM_BUILD_ROOT%{_libdir}/
 ln -sf /%{_libdir}/libssl.so.%{num_version} ./libssl.so
 #ln -sf /%{_lib}/libssl.so.%{num_version} ./libssl.so.%{num_version}
@@ -404,11 +404,11 @@
 #ln -sf /%{_lib}/libcrypto.so.%{num_version} ./libcrypto.so.%{num_version}
 
 for engine in 4758cca atalla nuron sureware ubsec cswift chil aep; do
-rm %{buildroot}/%{_libdir}/engines/lib$engine.so
+rm %{buildroot}/%{_lib}/engines/lib$engine.so
 done
 
 %ifnarch %{ix86} x86_64
-rm %{buildroot}/%{_libdir}/engines/libpadlock.so
+rm %{buildroot}/%{_lib}/engines/libpadlock.so
 %endif
 
 %clean
@@ -422,7 +422,7 @@
 %defattr(-, root, root)
 /%{_libdir}/libssl.so.%{num_version}
 /%{_libdir}/libcrypto.so.%{num_version}
-/%{_libdir}/engines
+/%{_lib}/engines
 
 %files -n libopenssl1_0_0-hmac
 %defattr(-, root, root)


-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2014-01-03 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2014-01-03 14:57:36

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-12-23 
22:16:57.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2014-01-03 
14:57:37.0 +0100
@@ -1,0 +2,6 @@
+Thu Jan  2 17:28:41 UTC 2014 - shch...@suse.com
+
+- Fixed bnc#857203, openssl: crash in DTLS renegotiation after packet loss
+  Add file: CVE-2013-6450.patch 
+
+---

New:

  CVE-2013-6450.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.2RQeA6/_old  2014-01-03 14:57:38.0 +0100
+++ /var/tmp/diff_new_pack.2RQeA6/_new  2014-01-03 14:57:38.0 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package openssl
 #
-# Copyright (c) 2013 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -64,6 +64,7 @@
 Patch16:openssl-1.0.1e-fips-ec.patch
 Patch17:openssl-1.0.1e-fips-ctor.patch
 Patch18:CVE-2013-6449.patch
+Patch19:CVE-2013-6450.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -171,6 +172,7 @@
 %patch16 -p1
 %patch17 -p1
 %patch18 -p1
+%patch19 -p1
 
 cp -p %{S:10} .
 cp -p %{S:11} .

++ CVE-2013-6450.patch ++
Index: openssl-1.0.1e/ssl/d1_both.c
===
--- openssl-1.0.1e.orig/ssl/d1_both.c
+++ openssl-1.0.1e/ssl/d1_both.c
@@ -214,6 +214,11 @@ dtls1_hm_fragment_new(unsigned long frag
 static void
 dtls1_hm_fragment_free(hm_fragment *frag)
{
+   if (frag-msg_header.is_ccs)
+   {
+   
EVP_CIPHER_CTX_free(frag-msg_header.saved_retransmit_state.enc_write_ctx);
+   
EVP_MD_CTX_destroy(frag-msg_header.saved_retransmit_state.write_hash);
+   }
if (frag-fragment) OPENSSL_free(frag-fragment);
if (frag-reassembly) OPENSSL_free(frag-reassembly);
OPENSSL_free(frag);
Index: openssl-1.0.1e/ssl/ssl_locl.h
===
--- openssl-1.0.1e.orig/ssl/ssl_locl.h
+++ openssl-1.0.1e/ssl/ssl_locl.h
@@ -625,6 +625,8 @@ extern SSL3_ENC_METHOD TLSv1_enc_data;
 extern SSL3_ENC_METHOD SSLv3_enc_data;
 extern SSL3_ENC_METHOD DTLSv1_enc_data;
 
+#define SSL_IS_DTLS(s) (s-method-version == DTLS1_VERSION)
+
 #define IMPLEMENT_tls_meth_func(version, func_name, s_accept, s_connect, \
s_get_meth) \
 const SSL_METHOD *func_name(void)  \
Index: openssl-1.0.1e/ssl/t1_enc.c
===
--- openssl-1.0.1e.orig/ssl/t1_enc.c
+++ openssl-1.0.1e/ssl/t1_enc.c
@@ -414,15 +414,20 @@ int tls1_change_cipher_state(SSL *s, int
s-mac_flags |= SSL_MAC_FLAG_WRITE_MAC_STREAM;
else
s-mac_flags = ~SSL_MAC_FLAG_WRITE_MAC_STREAM;
-   if (s-enc_write_ctx != NULL)
+if (s-enc_write_ctx != NULL  !SSL_IS_DTLS(s))
reuse_dd = 1;
-   else if 
((s-enc_write_ctx=OPENSSL_malloc(sizeof(EVP_CIPHER_CTX))) == NULL)
+else if ((s-enc_write_ctx=EVP_CIPHER_CTX_new()) == NULL)
goto err;
-   else
-   /* make sure it's intialized in case we exit later with 
an error */
-   EVP_CIPHER_CTX_init(s-enc_write_ctx);
dd= s-enc_write_ctx;
-   mac_ctx = ssl_replace_hash(s-write_hash,NULL);
+   if (SSL_IS_DTLS(s))
+   {
+   mac_ctx = EVP_MD_CTX_create();
+   if (!mac_ctx)
+   goto err;
+   s-write_hash = mac_ctx;
+   }
+   else
+   mac_ctx = ssl_replace_hash(s-write_hash,NULL);
 #ifndef OPENSSL_NO_COMP
if (s-compress != NULL)
{

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-12-23 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-12-23 22:16:55

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-12-19 
13:34:53.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-12-23 
22:16:57.0 +0100
@@ -1,0 +2,6 @@
+Sun Dec 22 08:10:55 UTC 2013 - shch...@suse.com
+
+- Fixed bnc#856687, openssl: crash when using TLS 1.2 
+  Add file: CVE-2013-6449.patch 
+
+---

New:

  CVE-2013-6449.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.cq8NAA/_old  2013-12-23 22:16:58.0 +0100
+++ /var/tmp/diff_new_pack.cq8NAA/_new  2013-12-23 22:16:58.0 +0100
@@ -63,6 +63,7 @@
 Patch15:openssl-1.0.1e-fips.patch
 Patch16:openssl-1.0.1e-fips-ec.patch
 Patch17:openssl-1.0.1e-fips-ctor.patch
+Patch18:CVE-2013-6449.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -169,6 +170,7 @@
 %patch15 -p1
 %patch16 -p1
 %patch17 -p1
+%patch18 -p1
 
 cp -p %{S:10} .
 cp -p %{S:11} .

++ CVE-2013-6449.patch ++
Index: openssl-1.0.1e/ssl/s3_lib.c
===
--- openssl-1.0.1e.orig/ssl/s3_lib.c
+++ openssl-1.0.1e/ssl/s3_lib.c
@@ -4274,7 +4274,7 @@ need to go to SSL_ST_ACCEPT.
 long ssl_get_algorithm2(SSL *s)
{
long alg2 = s-s3-tmp.new_cipher-algorithm2;
-   if (TLS1_get_version(s) = TLS1_2_VERSION 
+   if (s-method-version == TLS1_2_VERSION 
alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))
return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
return alg2;
Index: openssl-1.0.1e/ssl/s3_both.c
===
--- openssl-1.0.1e.orig/ssl/s3_both.c
+++ openssl-1.0.1e/ssl/s3_both.c
@@ -161,6 +161,10 @@ int ssl3_send_finished(SSL *s, int a, in
 
i=s-method-ssl3_enc-final_finish_mac(s,
sender,slen,s-s3-tmp.finish_md);
+
+   if (i == 0)
+   return 0;
+
s-s3-tmp.finish_md_len = i;
memcpy(p, s-s3-tmp.finish_md, i);
p+=i;
Index: openssl-1.0.1e/ssl/s3_pkt.c
===
--- openssl-1.0.1e.orig/ssl/s3_pkt.c
+++ openssl-1.0.1e/ssl/s3_pkt.c
@@ -1459,8 +1459,14 @@ int ssl3_do_change_cipher_spec(SSL *s)
slen=s-method-ssl3_enc-client_finished_label_len;
}
 
-   s-s3-tmp.peer_finish_md_len = s-method-ssl3_enc-final_finish_mac(s,
+   i = s-method-ssl3_enc-final_finish_mac(s,
sender,slen,s-s3-tmp.peer_finish_md);
+   if (i == 0)
+   {
+   SSLerr(SSL_F_SSL3_DO_CHANGE_CIPHER_SPEC, ERR_R_INTERNAL_ERROR);
+   return 0;
+   }
+   s-s3-tmp.peer_finish_md_len = i;
 
return(1);
}
Index: openssl-1.0.1e/ssl/t1_enc.c
===
--- openssl-1.0.1e.orig/ssl/t1_enc.c
+++ openssl-1.0.1e/ssl/t1_enc.c
@@ -915,18 +915,19 @@ int tls1_final_finish_mac(SSL *s,
if (mask  ssl_get_algorithm2(s))
{
int hashsize = EVP_MD_size(md);
-   if (hashsize  0 || hashsize  (int)(sizeof buf - 
(size_t)(q-buf)))
+   EVP_MD_CTX *hdgst = s-s3-handshake_dgst[idx];
+   if (!hdgst || hashsize  0 || hashsize  (int)(sizeof 
buf - (size_t)(q-buf)))
{
/* internal error: 'buf' is too small for this 
cipersuite! */
err = 1;
}
else
{
-   
EVP_MD_CTX_copy_ex(ctx,s-s3-handshake_dgst[idx]);
-   EVP_DigestFinal_ex(ctx,q,i);
-   if (i != (unsigned int)hashsize) /* can't 
really happen */
+   if (!EVP_MD_CTX_copy_ex(ctx, hdgst) ||
+   !EVP_DigestFinal_ex(ctx,q,i) ||
+   (i != (unsigned int)hashsize))
err = 1;
-   q+=i;
+   q+=hashsize;
}
}
}

-- 
To unsubscribe, e-mail: 

commit openssl for openSUSE:Factory

2013-12-19 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-12-19 13:34:52

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-12-17 
10:02:18.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-12-19 
13:34:53.0 +0100
@@ -1,0 +2,8 @@
+Tue Dec 17 13:57:40 UTC 2013 - meiss...@suse.com
+
+- compression_methods_switch.patch: setenv might not be successful
+  if a surrounding library or application filters it, like e.g. sudo.
+  As setenv() does not seem to be useful anyway, remove it.
+  bnc#849377
+
+---



Other differences:
--
++ compression_methods_switch.patch ++
--- /var/tmp/diff_new_pack.T49vxA/_old  2013-12-19 13:34:54.0 +0100
+++ /var/tmp/diff_new_pack.T49vxA/_new  2013-12-19 13:34:54.0 +0100
@@ -31,16 +31,21 @@
 ===
 --- openssl-1.0.1e.orig/ssl/ssl_ciph.c
 +++ openssl-1.0.1e/ssl/ssl_ciph.c
-@@ -455,7 +455,11 @@ static void load_builtin_compressions(vo
+@@ -452,10 +452,16 @@ static void load_builtin_compressions(vo
+   if (ssl_comp_methods == NULL)
+   {
+   SSL_COMP *comp = NULL;
++  const char *nodefaultzlib;
  
MemCheck_off();
ssl_comp_methods=sk_SSL_COMP_new(sk_comp_cmp);
 -  if (ssl_comp_methods != NULL)
 +
-+  if( getenv(OPENSSL_NO_DEFAULT_ZLIB) == NULL)
-+  setenv(OPENSSL_NO_DEFAULT_ZLIB, yes, 1);
-+
-+  if (ssl_comp_methods != NULL  strncmp( 
getenv(OPENSSL_NO_DEFAULT_ZLIB), no, 2) == 0)
++  /* The default is no compression to avoid CRIME/BEAST 
*/
++  nodefaultzlib = getenv(OPENSSL_NO_DEFAULT_ZLIB);
++  if (ssl_comp_methods != NULL 
++  nodefaultzlib 
++  strncmp( nodefaultzlib, no, 2) == 0)
{
comp=(SSL_COMP 
*)OPENSSL_malloc(sizeof(SSL_COMP));
if (comp != NULL)


-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-12-17 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-12-17 10:02:17

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-11-30 
18:01:22.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-12-17 
10:02:18.0 +0100
@@ -1,0 +2,31 @@
+Mon Dec 16 04:28:09 UTC 2013 - shch...@suse.com
+
+- Adjust the installation path.
+  Modify files: README-FIPS.txt openssl.spec
+
+---
+Fri Dec  6 08:07:06 UTC 2013 - lnus...@suse.de
+
+- don't own /etc/ssl/certs, it's owned by ca-certificates
+
+---
+Tue Dec  3 12:51:15 UTC 2013 - meiss...@suse.com
+
+- Actually enable it (in a building way) for openSUSE and SLES,
+  as we intended.
+- Add README-FIPS.txt from SLE 11.
+
+---
+Mon Dec  2 21:15:41 UTC 2013 - crrodrig...@opensuse.org
+
+- Restrict the (broken beyond build) FIPS certification code
+  to SLE releases only, it has no value in openSUSE at all.
+
+---
+Sat Nov 23 08:23:59 UTC 2013 - shch...@suse.com
+
+- Patches for OpenSSL FIPS-140-2/3 certification
+  Add patch files: openssl-1.0.1e-fips.patch, openssl-1.0.1e-fips-ec.patch,
+  openssl-1.0.1e-fips-ctor.patch
+
+---

New:

  README-FIPS.txt
  openssl-1.0.1e-fips-ctor.patch
  openssl-1.0.1e-fips-ec.patch
  openssl-1.0.1e-fips.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.ZUW3ST/_old  2013-12-17 10:02:19.0 +0100
+++ /var/tmp/diff_new_pack.ZUW3ST/_new  2013-12-17 10:02:19.0 +0100
@@ -41,6 +41,7 @@
 Source1:openssl.changes
 Source2:baselibs.conf
 Source10:   README.SuSE
+Source11:   README-FIPS.txt
 Patch0: merge_from_0.9.8k.patch
 Patch1: openssl-1.0.0-c_rehash-compat.diff
 Patch2: bug610223.patch
@@ -58,6 +59,10 @@
 # From Fedora openssl.
 Patch13:openssl-1.0.1c-ipv6-apps.patch
 Patch14:0001-libcrypto-Hide-library-private-symbols.patch
+# FIPS patches:
+Patch15:openssl-1.0.1e-fips.patch
+Patch16:openssl-1.0.1e-fips-ec.patch
+Patch17:openssl-1.0.1e-fips-ctor.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -78,6 +83,7 @@
 
 %package -n libopenssl1_0_0
 Summary:Secure Sockets and Transport Layer Security
+License:OpenSSL
 Group:  Productivity/Networking/Security
 Recommends: openssl-certs
 # bug437293
@@ -104,6 +110,7 @@
 
 %package -n libopenssl-devel
 Summary:Include Files and Libraries mandatory for Development
+License:OpenSSL
 Group:  Development/Libraries/C and C++
 Obsoletes:  openssl-devel  %{version}
 Requires:   %name = %version
@@ -120,8 +127,19 @@
 This package contains all necessary include files and libraries needed
 to develop applications that require these.
 
+%package -n libopenssl1_0_0-hmac
+Summary:HMAC files for FIPS-140-2 integrity checking of the openssl 
shared libraries
+License:BSD-3-Clause
+Group:  Productivity/Networking/Security
+Requires:   libopenssl1_0_0 = %{version}-%{release}
+
+%description -n libopenssl1_0_0-hmac
+The FIPS compliant operation of the openssl shared libraries is NOT
+possible without the HMAC hashes contained in this package!
+
 %package doc
 Summary:Additional Package Documentation
+License:OpenSSL
 Group:  Productivity/Networking/Security
 %if 0%{?suse_version} = 1140
 BuildArch:  noarch
@@ -148,8 +166,12 @@
 %patch12 -p1
 %patch13 -p1
 %patch14 -p1
+%patch15 -p1
+%patch16 -p1
+%patch17 -p1
 
 cp -p %{S:10} .
+cp -p %{S:11} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags
 export 
DSO_SCHEME='dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)::'
@@ -194,11 +216,13 @@
 ./config --test-sanity 
 #
 config_flags=threads shared no-rc5 no-idea \
+fips \
 %ifarch x86_64 
 enable-ec_nistp_64_gcc_128 \
 %endif
 enable-camellia \
 zlib \
+no-ec2m \
 --prefix=%{_prefix} \
 --libdir=%{_lib} \
 --openssldir=%{ssletcdir} \
@@ -245,6 +269,13 @@
make depend
make
LD_LIBRARY_PATH=`pwd` make rehash
+# for FIPS mode testing; the same hashes are being created later just before
+# the wrap-up of the files into 

commit openssl for openSUSE:Factory

2013-11-30 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-11-30 17:59:30

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-11-29 
07:03:10.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-11-30 
18:01:22.0 +0100
@@ -2,7 +1,0 @@
-Sat Nov 23 08:23:59 UTC 2013 - shch...@suse.com
-
-- Patches for OpenSSL FIPS-140-2/3 certification
-  Add patch files: openssl-1.0.1e-fips.patch, openssl-1.0.1e-fips-ec.patch,
-  openssl-1.0.1e-fips-ctor.patch
-


Old:

  openssl-1.0.1e-fips-ctor.patch
  openssl-1.0.1e-fips-ec.patch
  openssl-1.0.1e-fips.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.jxpxcJ/_old  2013-11-30 18:01:23.0 +0100
+++ /var/tmp/diff_new_pack.jxpxcJ/_new  2013-11-30 18:01:23.0 +0100
@@ -58,10 +58,6 @@
 # From Fedora openssl.
 Patch13:openssl-1.0.1c-ipv6-apps.patch
 Patch14:0001-libcrypto-Hide-library-private-symbols.patch
-# FIPS patches
-Patch15:openssl-1.0.1e-fips.patch
-Patch16:openssl-1.0.1e-fips-ec.patch
-Patch17:openssl-1.0.1e-fips-ctor.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -82,7 +78,6 @@
 
 %package -n libopenssl1_0_0
 Summary:Secure Sockets and Transport Layer Security
-License:OpenSSL
 Group:  Productivity/Networking/Security
 Recommends: openssl-certs
 # bug437293
@@ -109,7 +104,6 @@
 
 %package -n libopenssl-devel
 Summary:Include Files and Libraries mandatory for Development
-License:OpenSSL
 Group:  Development/Libraries/C and C++
 Obsoletes:  openssl-devel  %{version}
 Requires:   %name = %version
@@ -126,19 +120,8 @@
 This package contains all necessary include files and libraries needed
 to develop applications that require these.
 
-%package -n libopenssl1_0_0-hmac
-Summary:HMAC files for FIPS-140-2 integrity checking of the openssl 
shared libraries
-License:BSD-3-Clause
-Group:  Productivity/Networking/Security
-Requires:   libopenssl1_0_0 = %{version}-%{release}
-
-%description -n libopenssl1_0_0-hmac
-The FIPS compliant operation of the openssl shared libraries is NOT
-possible without the HMAC hashes contained in this package!
-
 %package doc
 Summary:Additional Package Documentation
-License:OpenSSL
 Group:  Productivity/Networking/Security
 %if 0%{?suse_version} = 1140
 BuildArch:  noarch
@@ -165,9 +148,6 @@
 %patch12 -p1
 %patch13 -p1
 %patch14 -p1
-%patch15 -p1
-%patch16 -p1
-%patch17 -p1
 
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -213,13 +193,12 @@
 %endif
 ./config --test-sanity 
 #
-config_flags=threads shared no-rc5 no-idea fips \
+config_flags=threads shared no-rc5 no-idea \
 %ifarch x86_64 
 enable-ec_nistp_64_gcc_128 \
 %endif
 enable-camellia \
 zlib \
-no-ec2m \
 --prefix=%{_prefix} \
 --libdir=%{_lib} \
 --openssldir=%{ssletcdir} \
@@ -266,15 +245,6 @@
make depend
make
LD_LIBRARY_PATH=`pwd` make rehash
-
-# for FIPS mode testing; the same hashes are being created later just before
-# the wrap-up of the files into the package.
-# These files are just there for the make test below...
-crypto/fips/fips_standalone_hmac libcrypto.so.1.0.0  .libcrypto.so.1.0.0.hmac
-crypto/fips/fips_standalone_hmac libssl.so.1.0.0  .libssl.so.1.0.0.hmac
-
-LD_LIBRARY_PATH=`pwd` make test FIPSCANLIB=
-
%ifnarch armv4l
LD_LIBRARY_PATH=`pwd` make test
%endif
@@ -288,7 +258,6 @@
 %install
 rm -rf $RPM_BUILD_ROOT
 make MANDIR=%{_mandir} INSTALL_PREFIX=$RPM_BUILD_ROOT install
-cp -a crypto/fips/fips_standalone_hmac 
$RPM_BUILD_ROOT/usr/bin/fips_standalone_hmac
 install -d -m755 $RPM_BUILD_ROOT%{ssletcdir}/certs
 ln -sf ./%{name} $RPM_BUILD_ROOT/%{_includedir}/ssl
 mkdir $RPM_BUILD_ROOT/%{_datadir}/ssl
@@ -366,29 +335,6 @@
 # Do not install demo scripts executable under /usr/share/doc
 find demos -type f -perm /111 -exec chmod 644 {} \;
 
-# the hmac hashes:
-#
-# this is a hack that re-defines the __os_install_post macro
-# for a simple reason: the macro strips the binaries and thereby
-# invalidates a HMAC that may have been created earlier.
-# solution: create the hashes _after_ the macro runs.
-#
-# this shows up earlier because otherwise the %expand of
-# the macro is too late.
-# remark: This is the same as running
-#   openssl dgst -sha256 -hmac 'ppaksykemnsecgtsttplmamstKMEs'
-%{expand:%%global 

commit openssl for openSUSE:Factory

2013-11-28 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-11-29 07:03:09

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-10-24 
14:10:46.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-11-29 
07:03:10.0 +0100
@@ -1,0 +2,7 @@
+Sat Nov 23 08:23:59 UTC 2013 - shch...@suse.com
+
+- Patches for OpenSSL FIPS-140-2/3 certification
+  Add patch files: openssl-1.0.1e-fips.patch, openssl-1.0.1e-fips-ec.patch,
+  openssl-1.0.1e-fips-ctor.patch
+
+---

New:

  openssl-1.0.1e-fips-ctor.patch
  openssl-1.0.1e-fips-ec.patch
  openssl-1.0.1e-fips.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.EWFA2J/_old  2013-11-29 07:03:11.0 +0100
+++ /var/tmp/diff_new_pack.EWFA2J/_new  2013-11-29 07:03:11.0 +0100
@@ -58,6 +58,10 @@
 # From Fedora openssl.
 Patch13:openssl-1.0.1c-ipv6-apps.patch
 Patch14:0001-libcrypto-Hide-library-private-symbols.patch
+# FIPS patches
+Patch15:openssl-1.0.1e-fips.patch
+Patch16:openssl-1.0.1e-fips-ec.patch
+Patch17:openssl-1.0.1e-fips-ctor.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -78,6 +82,7 @@
 
 %package -n libopenssl1_0_0
 Summary:Secure Sockets and Transport Layer Security
+License:OpenSSL
 Group:  Productivity/Networking/Security
 Recommends: openssl-certs
 # bug437293
@@ -104,6 +109,7 @@
 
 %package -n libopenssl-devel
 Summary:Include Files and Libraries mandatory for Development
+License:OpenSSL
 Group:  Development/Libraries/C and C++
 Obsoletes:  openssl-devel  %{version}
 Requires:   %name = %version
@@ -120,8 +126,19 @@
 This package contains all necessary include files and libraries needed
 to develop applications that require these.
 
+%package -n libopenssl1_0_0-hmac
+Summary:HMAC files for FIPS-140-2 integrity checking of the openssl 
shared libraries
+License:BSD-3-Clause
+Group:  Productivity/Networking/Security
+Requires:   libopenssl1_0_0 = %{version}-%{release}
+
+%description -n libopenssl1_0_0-hmac
+The FIPS compliant operation of the openssl shared libraries is NOT
+possible without the HMAC hashes contained in this package!
+
 %package doc
 Summary:Additional Package Documentation
+License:OpenSSL
 Group:  Productivity/Networking/Security
 %if 0%{?suse_version} = 1140
 BuildArch:  noarch
@@ -148,6 +165,9 @@
 %patch12 -p1
 %patch13 -p1
 %patch14 -p1
+%patch15 -p1
+%patch16 -p1
+%patch17 -p1
 
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -193,12 +213,13 @@
 %endif
 ./config --test-sanity 
 #
-config_flags=threads shared no-rc5 no-idea \
+config_flags=threads shared no-rc5 no-idea fips \
 %ifarch x86_64 
 enable-ec_nistp_64_gcc_128 \
 %endif
 enable-camellia \
 zlib \
+no-ec2m \
 --prefix=%{_prefix} \
 --libdir=%{_lib} \
 --openssldir=%{ssletcdir} \
@@ -245,6 +266,15 @@
make depend
make
LD_LIBRARY_PATH=`pwd` make rehash
+
+# for FIPS mode testing; the same hashes are being created later just before
+# the wrap-up of the files into the package.
+# These files are just there for the make test below...
+crypto/fips/fips_standalone_hmac libcrypto.so.1.0.0  .libcrypto.so.1.0.0.hmac
+crypto/fips/fips_standalone_hmac libssl.so.1.0.0  .libssl.so.1.0.0.hmac
+
+LD_LIBRARY_PATH=`pwd` make test FIPSCANLIB=
+
%ifnarch armv4l
LD_LIBRARY_PATH=`pwd` make test
%endif
@@ -258,6 +288,7 @@
 %install
 rm -rf $RPM_BUILD_ROOT
 make MANDIR=%{_mandir} INSTALL_PREFIX=$RPM_BUILD_ROOT install
+cp -a crypto/fips/fips_standalone_hmac 
$RPM_BUILD_ROOT/usr/bin/fips_standalone_hmac
 install -d -m755 $RPM_BUILD_ROOT%{ssletcdir}/certs
 ln -sf ./%{name} $RPM_BUILD_ROOT/%{_includedir}/ssl
 mkdir $RPM_BUILD_ROOT/%{_datadir}/ssl
@@ -335,6 +366,29 @@
 # Do not install demo scripts executable under /usr/share/doc
 find demos -type f -perm /111 -exec chmod 644 {} \;
 
+# the hmac hashes:
+#
+# this is a hack that re-defines the __os_install_post macro
+# for a simple reason: the macro strips the binaries and thereby
+# invalidates a HMAC that may have been created earlier.
+# solution: create the hashes _after_ the macro runs.
+#
+# this shows up earlier because otherwise the %expand of
+# the macro is too late.
+# remark: This is the same as running
+#   openssl dgst -sha256 -hmac 'ppaksykemnsecgtsttplmamstKMEs'
+%{expand:%%global 

commit openssl for openSUSE:Factory

2013-10-24 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-10-24 14:10:45

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-10-17 
17:42:54.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-10-24 
14:10:46.0 +0200
@@ -1,0 +2,13 @@
+Wed Oct 23 02:59:05 UTC 2013 - crrodrig...@opensuse.org
+
+- 0001-libcrypto-Hide-library-private-symbols.patch 
+  This patch implements the libcrpto part complimentary to
+  0005-libssl-Hide-library-private-symbols.patch.
+  This patch is however not 100% complete, as some private library 
+  symbols are declared in public headers that shall not be touched 
+  or are defined/declared in perlasm. (tested in 13.1, 12.3, factory)
+
+- openSSL defaults to -O3 optimization level but we override
+  it with RPM_OPT_FLAGS, ensure we use -O3 like upstream.
+
+---

New:

  0001-libcrypto-Hide-library-private-symbols.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.YNTzMM/_old  2013-10-24 14:10:47.0 +0200
+++ /var/tmp/diff_new_pack.YNTzMM/_new  2013-10-24 14:10:47.0 +0200
@@ -57,6 +57,7 @@
 Patch12:openssl-1.0.1e-bnc822642.patch
 # From Fedora openssl.
 Patch13:openssl-1.0.1c-ipv6-apps.patch
+Patch14:0001-libcrypto-Hide-library-private-symbols.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -146,6 +147,7 @@
 %patch11 -p1
 %patch12 -p1
 %patch13 -p1
+%patch14 -p1
 
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
@@ -200,7 +202,7 @@
 --prefix=%{_prefix} \
 --libdir=%{_lib} \
 --openssldir=%{ssletcdir} \
-$RPM_OPT_FLAGS -std=gnu99 \
+$RPM_OPT_FLAGS -O3 -std=gnu99 \
 -Wa,--noexecstack \
 -fomit-frame-pointer \
 -DTERMIO \

++ 0001-libcrypto-Hide-library-private-symbols.patch ++
 622 lines (skipped)


-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-10-17 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-10-17 14:24:04

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-09-27 
19:48:22.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-10-17 
17:42:54.0 +0200
@@ -1,0 +2,6 @@
+Fri Oct 11 12:24:14 UTC 2013 - meiss...@suse.com
+
+- openssl-1.0.1c-ipv6-apps.patch: 
+  Support ipv6 in the openssl s_client / s_server commandline app.
+
+---

New:

  openssl-1.0.1c-ipv6-apps.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.Nx2Drp/_old  2013-10-17 17:43:01.0 +0200
+++ /var/tmp/diff_new_pack.Nx2Drp/_new  2013-10-17 17:43:01.0 +0200
@@ -55,6 +55,8 @@
 Patch10:openssl-pkgconfig.patch
 Patch11:SSL_get_certificate-broken.patch
 Patch12:openssl-1.0.1e-bnc822642.patch
+# From Fedora openssl.
+Patch13:openssl-1.0.1c-ipv6-apps.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -143,6 +145,7 @@
 %patch10 -p1
 %patch11 -p1
 %patch12 -p1
+%patch13 -p1
 
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure

++ openssl-1.0.1c-ipv6-apps.patch ++
diff -up openssl-1.0.1c/apps/s_apps.h.ipv6-apps openssl-1.0.1c/apps/s_apps.h
--- openssl-1.0.1c/apps/s_apps.h.ipv6-apps  2012-07-11 22:46:02.409221206 
+0200
+++ openssl-1.0.1c/apps/s_apps.h2012-07-11 22:46:02.451222165 +0200
@@ -148,7 +148,7 @@ typedef fd_mask fd_set;
 #define PORT_STR4433
 #define PROTOCOLtcp
 
-int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, 
unsigned char *context), unsigned char *context);
+int do_server(char *port, int type, int *ret, int (*cb) (char *hostname, int 
s, unsigned char *context), unsigned char *context);
 #ifdef HEADER_X509_H
 int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
 #endif
@@ -156,10 +156,9 @@ int MS_CALLBACK verify_callback(int ok,
 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
 int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
 #endif
-int init_client(int *sock, char *server, int port, int type);
+int init_client(int *sock, char *server, char *port, int type);
 int should_retry(int i);
-int extract_port(char *str, short *port_ptr);
-int extract_host_port(char *str,char **host_ptr,unsigned char *ip,short *p);
+int extract_host_port(char *str,char **host_ptr,char **port_ptr);
 
 long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
   int argi, long argl, long ret);
diff -up openssl-1.0.1c/apps/s_client.c.ipv6-apps openssl-1.0.1c/apps/s_client.c
--- openssl-1.0.1c/apps/s_client.c.ipv6-apps2012-07-11 22:46:02.433221754 
+0200
+++ openssl-1.0.1c/apps/s_client.c  2012-07-11 22:46:02.45187 +0200
@@ -563,7 +563,7 @@ int MAIN(int argc, char **argv)
int cbuf_len,cbuf_off;
int sbuf_len,sbuf_off;
fd_set readfds,writefds;
-   short port=PORT;
+   char *port_str = PORT_STR;
int full_log=1;
char *host=SSL_HOST_NAME;
char *cert_file=NULL,*key_file=NULL;
@@ -664,13 +664,12 @@ int MAIN(int argc, char **argv)
else if (strcmp(*argv,-port) == 0)
{
if (--argc  1) goto bad;
-   port=atoi(*(++argv));
-   if (port == 0) goto bad;
+   port_str= *(++argv);
}
else if (strcmp(*argv,-connect) == 0)
{
if (--argc  1) goto bad;
-   if (!extract_host_port(*(++argv),host,NULL,port))
+   if (!extract_host_port(*(++argv),host,port_str))
goto bad;
}
else if (strcmp(*argv,-verify) == 0)
@@ -1253,7 +1252,7 @@ bad:
 
 re_start:
 
-   if (init_client(s,host,port,socket_type) == 0)
+   if (init_client(s,host,port_str,socket_type) == 0)
{

BIO_printf(bio_err,connect:errno=%d\n,get_last_socket_error());
SHUTDOWN(s);
diff -up openssl-1.0.1c/apps/s_server.c.ipv6-apps openssl-1.0.1c/apps/s_server.c
--- openssl-1.0.1c/apps/s_server.c.ipv6-apps2012-07-11 22:46:02.434221777 
+0200
+++ openssl-1.0.1c/apps/s_server.c  2012-07-11 22:46:02.45310 +0200
@@ -929,7 +929,7 @@ int MAIN(int argc, char *argv[])
{

commit openssl for openSUSE:Factory

2013-09-27 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-09-27 19:48:21

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-09-05 
23:22:31.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-09-27 
19:48:22.0 +0200
@@ -1,0 +2,6 @@
+Fri Sep 27 10:26:43 UTC 2013 - dmacvi...@suse.de
+
+- VPN openconnect problem (DTLS handshake failed)
+  (git 9fe4603b8, bnc#822642, openssl ticket#2984)
+
+---

New:

  openssl-1.0.1e-bnc822642.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.pNoTxw/_old  2013-09-27 19:48:23.0 +0200
+++ /var/tmp/diff_new_pack.pNoTxw/_new  2013-09-27 19:48:23.0 +0200
@@ -54,6 +54,7 @@
 Patch9: openssl-1.0.1c-default-paths.patch
 Patch10:openssl-pkgconfig.patch
 Patch11:SSL_get_certificate-broken.patch
+Patch12:openssl-1.0.1e-bnc822642.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -141,6 +142,7 @@
 %patch9 -p1
 %patch10 -p1
 %patch11 -p1
+%patch12 -p1
 
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure

++ openssl-1.0.1e-bnc822642.patch ++
commit 9fe4603b8245425a4c46986ed000fca054231253
Author: David Woodhouse dw...@infradead.org
Date:   Tue Feb 12 14:55:32 2013 +

Check DTLS_BAD_VER for version number.

The version check for DTLS1_VERSION was redundant as
DTLS1_VERSION  TLS1_1_VERSION, however we do need to
check for DTLS1_BAD_VER for compatibility.

PR:2984
(cherry picked from commit d980abb22e22661e98e5cee33d760ab0c7584ecc)

diff --git a/ssl/s3_cbc.c b/ssl/s3_cbc.c
index 02edf3f..443a31e 100644
--- a/ssl/s3_cbc.c
+++ b/ssl/s3_cbc.c
@@ -148,7 +148,7 @@ int tls1_cbc_remove_padding(const SSL* s,
unsigned padding_length, good, to_check, i;
const unsigned overhead = 1 /* padding length byte */ + mac_size;
/* Check if version requires explicit IV */
-   if (s-version = TLS1_1_VERSION || s-version == DTLS1_VERSION)
+   if (s-version = TLS1_1_VERSION || s-version == DTLS1_BAD_VER)
{
/* These lengths are all public so we can test them in
 * non-constant time.

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-09-05 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-09-05 23:22:31

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-08-13 
11:00:55.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-09-05 
23:22:31.0 +0200
@@ -1,0 +2,6 @@
+Wed Sep  4 18:56:38 UTC 2013 - guilla...@opensuse.org
+
+- Fix armv6l arch (armv7 was previously used to build armv6 which 
+  lead to illegal instruction when used)
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.B9tJU2/_old  2013-09-05 23:22:33.0 +0200
+++ /var/tmp/diff_new_pack.B9tJU2/_new  2013-09-05 23:22:33.0 +0200
@@ -181,6 +181,9 @@
 %ifarch armv5el armv5tel
 export MACHINE=armv5el
 %endif
+%ifarch armv6l armv6hl
+export MACHINE=armv6l
+%endif
 ./config --test-sanity 
 #
 config_flags=threads shared no-rc5 no-idea \


-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-08-13 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-08-13 11:00:53

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-08-04 
16:59:22.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-08-13 
11:00:55.0 +0200
@@ -1,0 +2,47 @@
+Mon Aug 12 06:05:03 UTC 2013 - shch...@suse.com
+
+- Fix bug[ bnc#832833] openssl ssl_set_cert_masks() is broken
+  modify patch file: SSL_get_certificate-broken.patch
+
+---
+Fri Aug  9 23:24:14 UTC 2013 - crrodrig...@opensuse.org
+
+- Via padlock is only found in x86 and x86_64 CPUs, remove 
+  the shared module for other archs.
+
+---
+Wed Aug  7 18:30:45 UTC 2013 - crrodrig...@opensuse.org
+
+- Cleanup engines that are of no use in a modern linux distro
+- The following engines stay:
+* libcapi.so -- usable in case you have third party /dev/crypto
+* libgmp.so -- may help to doing some maths using GMP
+* libgost.so -- implements the GOST block cipher
+* libpadlock.so -- VIA padlock support
+- Al other are removed because they require third party propietary 
+ shared libraries nowhere to be found or that we can test.
+
+---
+Wed Aug  7 18:30:23 UTC 2013 - crrodrig...@opensuse.org
+
+- openssl-pkgconfig.patch: Here we go.. For applications 
+to benefit fully of features provided by openSSL engines 
+(rdrand, aes-ni..etc) either builtin or in DSO form applications 
+have to call ENGINE_load_builtin_engines() or OPENSSL_config()
+unfortunately from a total of 68 apps/libraries linked to libcrypto
+in a desktop system, only 4 do so, and there is a sea of buggy
+code that I dont feel like fixing.
+Instead we can pass -DOPENSSL_LOAD_CONF in the pkgconfig files
+so the needed operation becomes implicit the next time such apps
+are recompiled, see OPENSSL_config(3)
+Unfortunately this does not fix everything, because there are apps
+not using pkgconfig or using it incorrectly, but it is a good start.
+
+---
+Wed Aug  7 09:33:55 UTC 2013 - dmuel...@suse.com
+
+- add openssl-1.0.1c-default-paths.patch:
+  Fix from Fedora for openssl s_client not setting 
+  CApath by default
+
+---

New:

  SSL_get_certificate-broken.patch
  openssl-1.0.1c-default-paths.patch
  openssl-pkgconfig.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.VltZDx/_old  2013-08-13 11:00:56.0 +0200
+++ /var/tmp/diff_new_pack.VltZDx/_new  2013-08-13 11:00:56.0 +0200
@@ -51,6 +51,9 @@
 Patch6: openssl-1.0.1e-truststore.diff
 Patch7: compression_methods_switch.patch
 Patch8: 0005-libssl-Hide-library-private-symbols.patch
+Patch9: openssl-1.0.1c-default-paths.patch
+Patch10:openssl-pkgconfig.patch
+Patch11:SSL_get_certificate-broken.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -135,6 +138,10 @@
 %patch6 -p1
 %patch7 -p1
 %patch8 -p1
+%patch9 -p1
+%patch10 -p1
+%patch11 -p1
+
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags
@@ -327,6 +334,14 @@
 ln -sf /%{_lib}/libssl.so.%{num_version} ./libssl.so
 ln -sf /%{_lib}/libcrypto.so.%{num_version} ./libcrypto.so
 
+for engine in 4758cca atalla nuron sureware ubsec cswift chil aep; do
+rm %{buildroot}/%{_lib}/engines/lib$engine.so
+done
+
+%ifnarch %{ix86} x86_64
+rm %{buildroot}/%{_lib}/engines/libpadlock.so
+%endif
+
 %clean
 if ! test -f /.buildenv; then rm -rf $RPM_BUILD_ROOT; fi
 

++ SSL_get_certificate-broken.patch ++
Index: openssl-1.0.1e/ssl/ssl_lib.c
===
--- openssl-1.0.1e.orig/ssl/ssl_lib.c
+++ openssl-1.0.1e/ssl/ssl_lib.c
@@ -2792,9 +2792,7 @@ void ssl_clear_cipher_ctx(SSL *s)
 /* Fix this function so that it takes an optional type parameter */
 X509 *SSL_get_certificate(const SSL *s)
{
-   if (s-server)
-   return(ssl_get_server_send_cert(s));
-   else if (s-cert != NULL)
+   if (s-cert != NULL)
return(s-cert-key-x509);
else
return(NULL);
++ openssl-1.0.1c-default-paths.patch ++
diff -up openssl-1.0.1c/apps/s_client.c.default-paths 

commit openssl for openSUSE:Factory

2013-08-04 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-08-04 16:59:21

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-07-30 
18:42:59.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-08-04 
16:59:22.0 +0200
@@ -1,0 +2,12 @@
+Sat Aug  3 21:15:07 UTC 2013 - crrodrig...@opensuse.org
+
+- 0005-libssl-Hide-library-private-symbols.patch: hide 
+  private symbols, this *only* applies to libssl where
+  it is straightforward to do so as applications should
+  not be using any of the symbols declared/defined in headers
+  that the library does not install.
+  A separate patch MAY be provided in the future for libcrypto
+  where things are much more complicated and threfore requires
+  careful testing.
+
+---

New:

  0005-libssl-Hide-library-private-symbols.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.0wLKXM/_old  2013-08-04 16:59:23.0 +0200
+++ /var/tmp/diff_new_pack.0wLKXM/_new  2013-08-04 16:59:23.0 +0200
@@ -50,6 +50,7 @@
 Patch5: openssl-fix-pod-syntax.diff
 Patch6: openssl-1.0.1e-truststore.diff
 Patch7: compression_methods_switch.patch
+Patch8: 0005-libssl-Hide-library-private-symbols.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -133,6 +134,7 @@
 %patch5 -p1
 %patch6 -p1
 %patch7 -p1
+%patch8 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ 0005-libssl-Hide-library-private-symbols.patch ++
From 89d5aecbc62842651cf22e48c405eb435feb0df3 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Cristian=20Rodr=C3=ADguez?= crrodrig...@opensuse.org
Date: Wed, 24 Jul 2013 23:29:05 -0400
Subject: [PATCH 5/5] libssl: Hide library private symbols

This patch only contains the libssl part (the easy one)
patch to libcrypto will follow after it is complete and good enough.

It hides all the library symbols that are not part of the public
API/ABI when GCC 4 or later is used.
---
 ssl/kssl_lcl.h | 9 +
 ssl/ssl_locl.h | 8 
 2 files changed, 17 insertions(+)

diff --git a/ssl/kssl_lcl.h b/ssl/kssl_lcl.h
index c039c91..69972b1 100644
--- a/ssl/kssl_lcl.h
+++ b/ssl/kssl_lcl.h
@@ -61,6 +61,10 @@
 
 #include openssl/kssl.h
 
+#if defined(__GNUC__)  __GNUC__ = 4
+#pragma GCC visibility push(hidden)
+#endif
+
 #ifndef OPENSSL_NO_KRB5
 
 #ifdef  __cplusplus
@@ -84,4 +88,9 @@ int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
 }
 #endif
 #endif /* OPENSSL_NO_KRB5  */
+
+#if defined(__GNUC__)  __GNUC__ = 4
+#pragma GCC visibility pop
+#endif
+
 #endif /* KSSL_LCL_H   */
diff --git a/ssl/ssl_locl.h b/ssl/ssl_locl.h
index 56f9b4b..dde4e3e 100644
--- a/ssl/ssl_locl.h
+++ b/ssl/ssl_locl.h
@@ -165,6 +165,10 @@
 #include openssl/ssl.h
 #include openssl/symhacks.h
 
+#if defined(__GNUC__)  __GNUC__ = 4
+#pragma GCC visibility push(hidden)
+#endif
+
 #ifdef OPENSSL_BUILD_SHLIBSSL
 # undef OPENSSL_EXTERN
 # define OPENSSL_EXTERN OPENSSL_EXPORT
@@ -1357,4 +1361,8 @@ void tls_fips_digest_extra(
const EVP_CIPHER_CTX *cipher_ctx, EVP_MD_CTX *mac_ctx,
const unsigned char *data, size_t data_len, size_t orig_len);
 
+#if defined(__GNUC__)  __GNUC__ = 4
+#pragma GCC visibility pop
+#endif
+
 #endif
-- 
1.8.3.1


-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-07-30 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-07-30 18:42:57

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-07-04 
18:04:59.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-07-30 
18:42:59.0 +0200
@@ -1,0 +2,9 @@
+Mon Jul 29 08:06:48 UTC 2013 - meiss...@suse.com
+
+- compression_methods_switch.patch: Disable compression by default to
+  avoid the CRIME attack (CVE-2012-4929 bnc#793420)
+
+  Can be override by setting environment variable
+  OPENSSL_NO_DEFAULT_ZLIB=no
+
+---

New:

  compression_methods_switch.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.UNlkbn/_old  2013-07-30 18:43:00.0 +0200
+++ /var/tmp/diff_new_pack.UNlkbn/_new  2013-07-30 18:43:00.0 +0200
@@ -49,6 +49,7 @@
 # PATCH-FIX-UPSTREAM http://rt.openssl.org/Ticket/Attachment/WithHeaders/20049
 Patch5: openssl-fix-pod-syntax.diff
 Patch6: openssl-1.0.1e-truststore.diff
+Patch7: compression_methods_switch.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -131,6 +132,7 @@
 %patch4 -p1
 %patch5 -p1
 %patch6 -p1
+%patch7 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ compression_methods_switch.patch ++
Index: openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod
===
--- openssl-1.0.1e.orig/doc/ssl/SSL_COMP_add_compression_method.pod
+++ openssl-1.0.1e/doc/ssl/SSL_COMP_add_compression_method.pod
@@ -41,6 +41,24 @@ of compression methods supported on a pe
 The OpenSSL library has the compression methods BCOMP_rle() and (when
 especially enabled during compilation) BCOMP_zlib() available.
 
+And, there is an environment variable to switch the compression
+methods off and on. In default the compression is off to mitigate 
+the so called CRIME attack ( CVE-2012-4929). If you want to enable 
+compression again set OPENSSL_NO_DEFAULT_ZLIB to no.
+
+The variable can be switched on and off at runtime; when this variable
+is set no compression is enabled, otherwise no, for example:
+
+in shell 'export OPENSSL_NO_DEFAULT_ZLIB=no'
+or in C to call
+int setenv(const char *name, const char *value, int overwrite); and
+int unsetenv(const char *name);
+
+Note: This reverts the behavior of the variable as it was before!
+
+And pay attention that this freaure is temporary, it maybe changed by
+the following updates.
+
 =head1 WARNINGS
 
 Once the identities of the compression methods for the TLS protocol have
Index: openssl-1.0.1e/ssl/ssl_ciph.c
===
--- openssl-1.0.1e.orig/ssl/ssl_ciph.c
+++ openssl-1.0.1e/ssl/ssl_ciph.c
@@ -455,7 +455,11 @@ static void load_builtin_compressions(vo
 
MemCheck_off();
ssl_comp_methods=sk_SSL_COMP_new(sk_comp_cmp);
-   if (ssl_comp_methods != NULL)
+
+   if( getenv(OPENSSL_NO_DEFAULT_ZLIB) == NULL)
+   setenv(OPENSSL_NO_DEFAULT_ZLIB, yes, 1);
+
+   if (ssl_comp_methods != NULL  strncmp( 
getenv(OPENSSL_NO_DEFAULT_ZLIB), no, 2) == 0)
{
comp=(SSL_COMP 
*)OPENSSL_malloc(sizeof(SSL_COMP));
if (comp != NULL)

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-07-04 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-07-04 18:04:58

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-07-02 
07:40:13.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-07-04 
18:04:59.0 +0200
@@ -1,0 +2,7 @@
+Tue Jul  2 09:02:59 UTC 2013 - lnus...@suse.de
+
+- Don't use the legacy /etc/ssl/certs directory anymore but rather
+  the p11-kit generated /var/lib/ca-certificates/openssl one
+  (fate#314991, openssl-1.0.1e-truststore.diff)
+
+---

New:

  openssl-1.0.1e-truststore.diff



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.8eo3MA/_old  2013-07-04 18:05:01.0 +0200
+++ /var/tmp/diff_new_pack.8eo3MA/_new  2013-07-04 18:05:01.0 +0200
@@ -48,6 +48,7 @@
 Patch4: VIA_padlock_support_on_64systems.patch
 # PATCH-FIX-UPSTREAM http://rt.openssl.org/Ticket/Attachment/WithHeaders/20049
 Patch5: openssl-fix-pod-syntax.diff
+Patch6: openssl-1.0.1e-truststore.diff
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -129,6 +130,7 @@
 %patch3
 %patch4 -p1
 %patch5 -p1
+%patch6 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ openssl-1.0.1e-truststore.diff ++
Don't use the legacy /etc/ssl/certs directory anymore but rather the
p11-kit generated /var/lib/ca-certificates/openssl one (fate#314991)
Index: openssl-1.0.1e/crypto/cryptlib.h
===
--- openssl-1.0.1e.orig/crypto/cryptlib.h
+++ openssl-1.0.1e/crypto/cryptlib.h
@@ -81,7 +81,7 @@ extern C {
 
 #ifndef OPENSSL_SYS_VMS
 #define X509_CERT_AREA OPENSSLDIR
-#define X509_CERT_DIR  OPENSSLDIR /certs
+#define X509_CERT_DIR  /var/lib/ca-certificates/openssl
 #define X509_CERT_FILE OPENSSLDIR /cert.pem
 #define X509_PRIVATE_DIR   OPENSSLDIR /private
 #else

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-07-01 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-07-02 07:40:12

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-06-25 
14:43:15.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-07-02 
07:40:13.0 +0200
@@ -1,0 +2,12 @@
+Sat Jun 29 22:47:54 UTC 2013 - crrodrig...@opensuse.org
+
+- Build enable-ec_nistp_64_gcc_128, ecdh is many times faster
+  but only works in x86_64.
+  According to the openSSL team
+it is superior to the default in multiple regards (speed, and also
+security as the new implementations are secure against timing
+attacks)
+It is not enabled by default due to the build system being unable
+to detect if the compiler supports __uint128_t. 
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.FOYYz9/_old  2013-07-02 07:40:14.0 +0200
+++ /var/tmp/diff_new_pack.FOYYz9/_new  2013-07-02 07:40:14.0 +0200
@@ -171,6 +171,9 @@
 ./config --test-sanity 
 #
 config_flags=threads shared no-rc5 no-idea \
+%ifarch x86_64 
+enable-ec_nistp_64_gcc_128 \
+%endif
 enable-camellia \
 zlib \
 --prefix=%{_prefix} \


-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-06-25 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-06-25 07:43:23

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-06-05 
13:05:48.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-06-25 
14:43:15.0 +0200
@@ -1,0 +2,6 @@
+Thu Jun 20 07:58:33 UTC 2013 - co...@suse.com
+
+- pick openssl-fix-pod-syntax.diff out of the upstream RT to fix
+  build with perl 5.18
+
+---

New:

  openssl-fix-pod-syntax.diff



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.xfum3F/_old  2013-06-25 14:43:16.0 +0200
+++ /var/tmp/diff_new_pack.xfum3F/_new  2013-06-25 14:43:16.0 +0200
@@ -46,6 +46,8 @@
 Patch2: bug610223.patch
 Patch3: openssl-ocloexec.patch
 Patch4: VIA_padlock_support_on_64systems.patch
+# PATCH-FIX-UPSTREAM http://rt.openssl.org/Ticket/Attachment/WithHeaders/20049
+Patch5: openssl-fix-pod-syntax.diff
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -64,19 +66,6 @@
 Apache-style license, which basically means that you are free to get it
 and to use it for commercial and noncommercial purposes.
 
-
-
-Authors:
-
-Mark J. Cox m...@openssl.org
-Ralf S. Engelschall r...@openssl.org
-Dr. Stephen Henson st...@openssl.org
-Ben Laurie b...@openssl.org
-Bodo Moeller b...@openssl.org
-Ulf Moeller u...@openssl.org
-Holger Reif hol...@openssl.org
-Paul C. Sutton p...@openssl.org
-
 %package -n libopenssl1_0_0
 Summary:Secure Sockets and Transport Layer Security
 Group:  Productivity/Networking/Security
@@ -103,19 +92,6 @@
 Apache-style license, which basically means that you are free to get it
 and to use it for commercial and noncommercial purposes.
 
-
-
-Authors:
-
-Mark J. Cox m...@openssl.org
-Ralf S. Engelschall r...@openssl.org
-Dr. Stephen Henson st...@openssl.org
-Ben Laurie b...@openssl.org
-Bodo Moeller b...@openssl.org
-Ulf Moeller u...@openssl.org
-Holger Reif hol...@openssl.org
-Paul C. Sutton p...@openssl.org
-
 %package -n libopenssl-devel
 Summary:Include Files and Libraries mandatory for Development
 Group:  Development/Libraries/C and C++
@@ -134,19 +110,6 @@
 This package contains all necessary include files and libraries needed
 to develop applications that require these.
 
-
-
-Authors:
-
-Mark J. Cox m...@openssl.org
-Ralf S. Engelschall r...@openssl.org
-Dr. Stephen Henson st...@openssl.org
-Ben Laurie b...@openssl.org
-Bodo Moeller b...@openssl.org
-Ulf Moeller u...@openssl.org
-Holger Reif hol...@openssl.org
-Paul C. Sutton p...@openssl.org
-
 %package doc
 Summary:Additional Package Documentation
 Group:  Productivity/Networking/Security
@@ -158,19 +121,6 @@
 This package contains optional documentation provided in addition to
 this package's base documentation.
 
-
-
-Authors:
-
-Mark J. Cox m...@openssl.org
-Ralf S. Engelschall r...@openssl.org
-Dr. Stephen Henson st...@openssl.org
-Ben Laurie b...@openssl.org
-Bodo Moeller b...@openssl.org
-Ulf Moeller u...@openssl.org
-Holger Reif hol...@openssl.org
-Paul C. Sutton p...@openssl.org
-
 %prep
 %setup -q 
 %patch0 -p1
@@ -178,6 +128,7 @@
 %patch2 -p1
 %patch3
 %patch4 -p1
+%patch5 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags


++ openssl-fix-pod-syntax.diff ++
From jaeni...@openssl.net  Thu May 30 09:46:58 2013
CC: Jonathan Liu net...@gmail.com
Resent-Date: Thu, 30 May 2013 09:46:58 +0200
X-Spam-Status: No, score=-2.3 required=5.0 tests=FREEMAIL_FROM, 
RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_TO_NO_BRKTS_FREEMAIL autolearn=ham 
version=3.3.2
X-Mailer: git-send-email 1.8.3
Message-ID: 1369887573-10819-1-git-send-email-net...@gmail.com
X-Received: by 10.68.65.134 with SMTP id x6mr5859535pbs.219.1369886755138; Wed, 
29 May 2013 21:05:55 -0700 (PDT)
Resent-To: rt-...@openssl.net
Received: by openssl.net (Postfix, from userid 29209) id 1548C1E0128; Thu, 30 
May 2013 09:46:58 +0200 (CEST)
Received: by openssl.net (Postfix, from userid 65534) id 852471E12CB; Thu, 30 
May 2013 06:14:07 +0200 (CEST)
Received: by openssl.net (Postfix, from userid 30009) id 6FF4D1E12CF; Thu, 30 
May 2013 06:14:07 +0200 (CEST)
Received: from master.openssl.org (openssl.org 

commit openssl for openSUSE:Factory

2013-06-05 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-06-05 13:05:48

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-02-23 
16:39:09.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-06-05 
13:05:48.0 +0200
@@ -1,0 +2,5 @@
+Sat May 25 10:10:07 UTC 2013 - i...@marguerite.su
+
+- add %if tag for BuildArch. sles may also need latest openssl.
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.5yktdO/_old  2013-06-05 13:05:49.0 +0200
+++ /var/tmp/diff_new_pack.5yktdO/_new  2013-06-05 13:05:49.0 +0200
@@ -150,7 +150,9 @@
 %package doc
 Summary:Additional Package Documentation
 Group:  Productivity/Networking/Security
+%if 0%{?suse_version} = 1140
 BuildArch:  noarch
+%endif
 
 %description doc
 This package contains optional documentation provided in addition to


-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-02-23 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-02-23 16:39:08

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-02-12 
16:41:42.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-02-23 
16:39:09.0 +0100
@@ -1,0 +2,5 @@
+Fri Feb 22 16:00:16 UTC 2013 - dmuel...@suse.com
+
+- disable fstack-protector on aarch64
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.pa06pt/_old  2013-02-23 16:39:10.0 +0100
+++ /var/tmp/diff_new_pack.pa06pt/_new  2013-02-23 16:39:10.0 +0100
@@ -231,7 +231,7 @@
 -DSSL_FORBID_ENULL \
 -D_GNU_SOURCE \
 $(getconf LFS_CFLAGS) \
-%ifnarch hppa
+%ifnarch hppa aarch64
 -Wall \
 -fstack-protector 
 %else


-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-02-12 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-02-12 16:41:40

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-02-11 
11:07:27.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-02-12 
16:41:42.0 +0100
@@ -1,0 +2,7 @@
+Tue Feb 12 00:08:06 UTC 2013 - hrvoje.sen...@gmail.com
+
+- Update to 1.0.1e
+  o Bugfix release (bnc#803004)
+- Drop openssl-1.0.1d-s3-packet.patch, included upstream
+
+---

Old:

  openssl-1.0.1d-s3-packet.patch
  openssl-1.0.1d.tar.gz
  openssl-1.0.1d.tar.gz.asc

New:

  openssl-1.0.1e.tar.gz
  openssl-1.0.1e.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.CRWuMj/_old  2013-02-12 16:41:44.0 +0100
+++ /var/tmp/diff_new_pack.CRWuMj/_new  2013-02-12 16:41:44.0 +0100
@@ -29,7 +29,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.1d
+Version:1.0.1e
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
@@ -46,8 +46,6 @@
 Patch2: bug610223.patch
 Patch3: openssl-ocloexec.patch
 Patch4: VIA_padlock_support_on_64systems.patch
-# PATCH-FIX-UPSTREAM openssl-1.0.1d-s3-packet.patch Fix the calculation that 
checks there is enough room in a record after removing padding and optional 
explicit IV bnc#803004, openssl ticket#2975
-Patch5: openssl-1.0.1d-s3-packet.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -178,7 +176,6 @@
 %patch2 -p1
 %patch3
 %patch4 -p1
-%patch5 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ openssl-1.0.1d.tar.gz - openssl-1.0.1e.tar.gz ++
 1697 lines of diff (skipped)

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2013-02-11 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-02-11 11:07:26

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2013-02-07 
10:44:03.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-02-11 
11:07:27.0 +0100
@@ -1,0 +2,6 @@
+Sun Feb 10 20:33:51 UTC 2013 - hrvoje.sen...@gmail.com
+
+- Added openssl-1.0.1d-s3-packet.patch from upstream, fixes 
+  bnc#803004, openssl ticket#2975
+
+---

New:

  openssl-1.0.1d-s3-packet.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.mXrCuc/_old  2013-02-11 11:07:29.0 +0100
+++ /var/tmp/diff_new_pack.mXrCuc/_new  2013-02-11 11:07:29.0 +0100
@@ -46,6 +46,8 @@
 Patch2: bug610223.patch
 Patch3: openssl-ocloexec.patch
 Patch4: VIA_padlock_support_on_64systems.patch
+# PATCH-FIX-UPSTREAM openssl-1.0.1d-s3-packet.patch Fix the calculation that 
checks there is enough room in a record after removing padding and optional 
explicit IV bnc#803004, openssl ticket#2975
+Patch5: openssl-1.0.1d-s3-packet.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -176,6 +178,7 @@
 %patch2 -p1
 %patch3
 %patch4 -p1
+%patch5 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ openssl-1.0.1d-s3-packet.patch ++
https://bugs.gentoo.org/456108

taken from upstream

From 32cc2479b473c49ce869e57fded7e9a77b695c0d Mon Sep 17 00:00:00 2001
From: Dr. Stephen Henson st...@openssl.org
Date: Thu, 7 Feb 2013 21:06:37 +
Subject: [PATCH] Fix IV check and padding removal.

Fix the calculation that checks there is enough room in a record
after removing padding and optional explicit IV. (by Steve)

For AEAD remove the correct number of padding bytes (by Andy)
---
 ssl/s3_cbc.c | 33 -
 1 file changed, 12 insertions(+), 21 deletions(-)

diff --git a/ssl/s3_cbc.c b/ssl/s3_cbc.c
index ce77acd..0f60507 100644
--- a/ssl/s3_cbc.c
+++ b/ssl/s3_cbc.c
@@ -139,31 +139,22 @@ int tls1_cbc_remove_padding(const SSL* s,
unsigned mac_size)
{
unsigned padding_length, good, to_check, i;
-   const char has_explicit_iv =
-   s-version = TLS1_1_VERSION || s-version == DTLS1_VERSION;
-   const unsigned overhead = 1 /* padding length byte */ +
- mac_size +
- (has_explicit_iv ? block_size : 0);
-
-   /* These lengths are all public so we can test them in non-constant
-* time. */
-   if (overhead  rec-length)
-   return 0;
-
-   /* We can always safely skip the explicit IV. We check at the beginning
-* of this function that the record has at least enough space for the
-* IV, MAC and padding length byte. (These can be checked in
-* non-constant time because it's all public information.) So, if the
-* padding was invalid, then we didn't change |rec-length| and this is
-* safe. If the padding was valid then we know that we have at least
-* overhead+padding_length bytes of space and so this is still safe
-* because overhead accounts for the explicit IV. */
-   if (has_explicit_iv)
+   const unsigned overhead = 1 /* padding length byte */ + mac_size;
+   /* Check if version requires explicit IV */
+   if (s-version = TLS1_1_VERSION || s-version == DTLS1_VERSION)
{
+   /* These lengths are all public so we can test them in
+* non-constant time.
+*/
+   if (overhead + block_size  rec-length)
+   return 0;
+   /* We can now safely skip explicit IV */
rec-data += block_size;
rec-input += block_size;
rec-length -= block_size;
}
+   else if (overhead  rec-length)
+   return 0;
 
padding_length = rec-data[rec-length-1];
 
@@ -190,7 +181,7 @@ int tls1_cbc_remove_padding(const SSL* s,
if (EVP_CIPHER_flags(s-enc_read_ctx-cipher)EVP_CIPH_FLAG_AEAD_CIPHER)
{
/* padding is already verified */
-   rec-length -= padding_length;
+   rec-length -= padding_length + 1;
return 1;
}
 
-- 

commit openssl for openSUSE:Factory

2013-02-07 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2013-02-07 10:44:00

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-11-22 
16:51:35.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2013-02-07 
10:44:03.0 +0100
@@ -1,0 +2,11 @@
+Tue Feb  5 16:00:17 UTC 2013 - meiss...@suse.com
+
+- update to version 1.0.1d, fixing security issues
+  o Fix renegotiation in TLS 1.1, 1.2 by using the correct TLS version.
+  o Include the fips configuration module.
+  o Fix OCSP bad key DoS attack CVE-2013-0166
+  o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
+bnc#802184
+  o Fix for TLS AESNI record handling flaw CVE-2012-2686
+
+---

Old:

  openssl-1.0.1c.tar.gz

New:

  openssl-1.0.1d.tar.gz
  openssl-1.0.1d.tar.gz.asc



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.WYIxsS/_old  2013-02-07 10:44:05.0 +0100
+++ /var/tmp/diff_new_pack.WYIxsS/_new  2013-02-07 10:44:05.0 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package openssl
 #
-# Copyright (c) 2012 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2013 SUSE LINUX Products GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -16,7 +16,6 @@
 #
 
 
-
 Name:   openssl
 BuildRequires:  bc
 BuildRequires:  ed
@@ -30,13 +29,14 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.1c
+Version:1.0.1d
 Release:0
 Summary:Secure Sockets and Transport Layer Security
 License:OpenSSL
 Group:  Productivity/Networking/Security
 Url:http://www.openssl.org/
 Source: http://www.%{name}.org/source/%{name}-%{version}.tar.gz
+Source42:   http://www.%{name}.org/source/%{name}-%{version}.tar.gz.asc
 # to get mtime of file:
 Source1:openssl.changes
 Source2:baselibs.conf

++ openssl-1.0.1c.tar.gz - openssl-1.0.1d.tar.gz ++
 7948 lines of diff (skipped)

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2012-11-22 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-11-22 16:51:34

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-08-26 
14:22:13.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-11-22 
16:51:35.0 +0100
@@ -1,0 +2,6 @@
+Mon Nov 12 08:39:31 UTC 2012 - g...@suse.com
+
+- fix bug[bnc#784994] - VIA padlock support on 64 systems
+  e_padlock: add support for x86_64 gcc
+
+---

New:

  VIA_padlock_support_on_64systems.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.PXQ5W6/_old  2012-11-22 16:51:37.0 +0100
+++ /var/tmp/diff_new_pack.PXQ5W6/_new  2012-11-22 16:51:37.0 +0100
@@ -16,8 +16,6 @@
 #
 
 
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
-#
 
 Name:   openssl
 BuildRequires:  bc
@@ -47,6 +45,7 @@
 Patch1: openssl-1.0.0-c_rehash-compat.diff
 Patch2: bug610223.patch
 Patch3: openssl-ocloexec.patch
+Patch4: VIA_padlock_support_on_64systems.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -176,6 +175,7 @@
 %patch1 -p1
 %patch2 -p1
 %patch3
+%patch4 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ VIA_padlock_support_on_64systems.patch ++
Index: openssl-1.0.1c/engines/e_padlock.c
===
--- openssl-1.0.1c.orig/engines/e_padlock.c
+++ openssl-1.0.1c/engines/e_padlock.c
@@ -101,7 +101,10 @@
compiler choice is limited to GCC and Microsoft C. */
 #undef COMPILE_HW_PADLOCK
 #if !defined(I386_ONLY)  !defined(OPENSSL_NO_INLINE_ASM)
-# if (defined(__GNUC__)  (defined(__i386__) || defined(__i386))) || \
+# if (defined(__GNUC__)  __GNUC__=2  \
+   (defined(__i386__) || defined(__i386) || \
+defined(__x86_64__) || defined(__x86_64)) \
+ ) || \
  (defined(_MSC_VER)  defined(_M_IX86))
 #  define COMPILE_HW_PADLOCK
 # endif
@@ -304,6 +307,7 @@ static volatile struct padlock_cipher_da
  * ===
  */
 #if defined(__GNUC__)  __GNUC__=2
+#if defined(__i386__) || defined(__i386)
 /*
  * As for excessive push %ebx/pop %ebx found all over.
  * When generating position-independent code GCC won't let
@@ -383,21 +387,6 @@ padlock_available(void)
return padlock_use_ace + padlock_use_rng;
 }
 
-#ifndef OPENSSL_NO_AES
-/* Our own htonl()/ntohl() */
-static inline void
-padlock_bswapl(AES_KEY *ks)
-{
-   size_t i = sizeof(ks-rd_key)/sizeof(ks-rd_key[0]);
-   unsigned int *key = ks-rd_key;
-
-   while (i--) {
-   asm volatile (bswapl %0 : +r(*key));
-   key++;
-   }
-}
-#endif
-
 /* Force key reload from memory to the CPU microcode.
Loading EFLAGS from the stack clears EFLAGS[30] 
which does the trick. */
@@ -456,11 +445,130 @@ static inline void *name(size_t cnt, \
return iv;  \
 }
 
+
+#endif
+
+#elif defined(__x86_64__) || defined(__x86_64)
+
+/* Load supported features of the CPU to see if
+   the PadLock is available. */
+   static int
+padlock_available(void)
+{
+   char vendor_string[16];
+   unsigned int eax, edx;
+
+   /* Are we running on the Centaur (VIA) CPU? */
+   eax = 0x;
+   vendor_string[12] = 0;
+   asm volatile (
+   cpuid\n
+   movl   %%ebx,(%1)\n
+   movl   %%edx,4(%1)\n
+   movl   %%ecx,8(%1)\n
+   : +a(eax) : r(vendor_string) : rbx, rcx, rdx);
+   if (strcmp(vendor_string, CentaurHauls) != 0)
+   return 0;
+
+   /* Check for Centaur Extended Feature Flags presence */
+   eax = 0xC000;
+   asm volatile (cpuid
+   : +a(eax) : : rbx, rcx, rdx);
+   if (eax  0xC001)
+   return 0;
+
+   /* Read the Centaur Extended Feature Flags */
+   eax = 0xC001;
+   asm volatile (cpuid
+   : +a(eax), =d(edx) : : rbx, rcx);
+
+   /* Fill up some flags */
+   padlock_use_ace = ((edx  (0x36)) == (0x36));
+   padlock_use_rng = ((edx  (0x32)) == (0x32));
+
+   return padlock_use_ace + padlock_use_rng;
+}
+
+/* Force key reload from memory to the CPU microcode.
+   Loading EFLAGS 

commit openssl for openSUSE:Factory

2012-08-26 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-08-26 14:22:07

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-08-08 
11:18:04.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-08-26 
14:22:13.0 +0200
@@ -1,0 +2,7 @@
+Sun Aug 19 23:38:32 UTC 2012 - crrodrig...@opensuse.org
+
+- Open Internal file descriptors with O_CLOEXEC, leaving
+  those open across fork()..execve() makes a perfect
+  vector for a side-channel attack... 
+
+---

New:

  openssl-ocloexec.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.ncRTax/_old  2012-08-26 14:22:14.0 +0200
+++ /var/tmp/diff_new_pack.ncRTax/_new  2012-08-26 14:22:14.0 +0200
@@ -46,6 +46,7 @@
 Patch0: merge_from_0.9.8k.patch
 Patch1: openssl-1.0.0-c_rehash-compat.diff
 Patch2: bug610223.patch
+Patch3: openssl-ocloexec.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -174,6 +175,7 @@
 %patch0 -p1
 %patch1 -p1
 %patch2 -p1
+%patch3
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags
@@ -366,11 +368,9 @@
 %clean
 if ! test -f /.buildenv; then rm -rf $RPM_BUILD_ROOT; fi
 
-%post -n libopenssl1_0_0
-/sbin/ldconfig
+%post -n libopenssl1_0_0 -p /sbin/ldconfig
 
-%postun -n libopenssl1_0_0
-/sbin/ldconfig
+%postun -n libopenssl1_0_0 -p /sbin/ldconfig
 
 %files -n libopenssl1_0_0
 %defattr(-, root, root)

++ openssl-ocloexec.patch ++
--- crypto/bio/b_sock.c.orig
+++ crypto/bio/b_sock.c
@@ -735,7 +735,7 @@ int BIO_get_accept_socket(char *host, in
}
 
 again:
-   s=socket(server.sa.sa_family,SOCK_STREAM,SOCKET_PROTOCOL);
+   s=socket(server.sa.sa_family,SOCK_STREAM|SOCK_CLOEXEC,SOCKET_PROTOCOL);
if (s == INVALID_SOCKET)
{
SYSerr(SYS_F_SOCKET,get_last_socket_error());
@@ -784,7 +784,7 @@ again:
}
elsegoto err;
}
-   
cs=socket(client.sa.sa_family,SOCK_STREAM,SOCKET_PROTOCOL);
+   
cs=socket(client.sa.sa_family,SOCK_STREAM|SOCK_CLOEXEC,SOCKET_PROTOCOL);
if (cs != INVALID_SOCKET)
{
int ii;
--- crypto/bio/bss_conn.c.orig
+++ crypto/bio/bss_conn.c
@@ -209,7 +209,7 @@ static int conn_state(BIO *b, BIO_CONNEC
c-them.sin_addr.s_addr=htonl(l);
c-state=BIO_CONN_S_CREATE_SOCKET;
 
-   ret=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
+   
ret=socket(AF_INET,SOCK_STREAM|SOCK_CLOEXEC,SOCKET_PROTOCOL);
if (ret == INVALID_SOCKET)
{
SYSerr(SYS_F_SOCKET,get_last_socket_error());
--- crypto/bio/bss_dgram.c.orig
+++ crypto/bio/bss_dgram.c
@@ -999,7 +999,7 @@ static int dgram_sctp_read(BIO *b, char
msg.msg_control = cmsgbuf;
msg.msg_controllen = 512;
msg.msg_flags = 0;
-   n = recvmsg(b-num, msg, 0);
+   n = recvmsg(b-num, msg, MSG_CMSG_CLOEXEC);
 
if (msg.msg_controllen  0)
{
@@ -1560,7 +1560,7 @@ int BIO_dgram_sctp_wait_for_dry(BIO *b)
msg.msg_controllen = 0;
msg.msg_flags = 0;
 
-   n = recvmsg(b-num, msg, MSG_PEEK);
+   n = recvmsg(b-num, msg, MSG_PEEK| MSG_CMSG_CLOEXEC);
if (n = 0)
{
if ((n  0)  (get_last_socket_error() != EAGAIN)  
(get_last_socket_error() != EWOULDBLOCK))
@@ -1583,7 +1583,7 @@ int BIO_dgram_sctp_wait_for_dry(BIO *b)
msg.msg_controllen = 0;
msg.msg_flags = 0;
 
-   n = recvmsg(b-num, msg, 0);
+   n = recvmsg(b-num, msg, MSG_CMSG_CLOEXEC);
if (n = 0)
{
if ((n  0)  (get_last_socket_error() != EAGAIN)  
(get_last_socket_error() != EWOULDBLOCK))
@@ -1644,7 +1644,7 @@ int BIO_dgram_sctp_wait_for_dry(BIO *b)
fcntl(b-num, F_SETFL, O_NONBLOCK);
}
 
-   n = recvmsg(b-num, msg, 

commit openssl for openSUSE:Factory

2012-08-08 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-08-08 11:18:03

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-05-21 
10:00:44.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-08-08 
11:18:04.0 +0200
@@ -1,0 +2,5 @@
+Tue Aug  7 17:17:34 UTC 2012 - dmuel...@suse.com
+
+- fix build on armv5 (bnc#774710)
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.JIc8BB/_old  2012-08-08 11:18:06.0 +0200
+++ /var/tmp/diff_new_pack.JIc8BB/_new  2012-08-08 11:18:06.0 +0200
@@ -210,6 +210,9 @@
 sed -i -e s|#define DATE \(.*\).LC_ALL.*date.|#define DATE \1$CHANGES| 
crypto/Makefile
 
 %build
+%ifarch armv5el armv5tel
+export MACHINE=armv5el
+%endif
 ./config --test-sanity 
 #
 config_flags=threads shared no-rc5 no-idea \

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2012-05-21 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-05-21 10:00:42

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-05-08 
12:28:29.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-05-21 
10:00:44.0 +0200
@@ -1,0 +2,10 @@
+Thu May 10 19:18:06 UTC 2012 - crrodrig...@opensuse.org
+
+- Update to version 1.0.1c for the complete list of changes see
+  NEWS, this only list packaging changes.
+- Drop aes-ni patch, no longer needed as it is builtin in openssl
+  now.
+- Define GNU_SOURCE and use -std=gnu99 to build the package.
+- Use LFS_CFLAGS in platforms where it matters.
+
+---

Old:

  openssl-1.0.0b-aesni.patch
  openssl-1.0.0i.tar.bz2
  openssl-call-engine-reg-comp.patch

New:

  openssl-1.0.1c.tar.gz



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.oC9s96/_old  2012-05-21 10:00:47.0 +0200
+++ /var/tmp/diff_new_pack.oC9s96/_new  2012-05-21 10:00:47.0 +0200
@@ -15,26 +15,30 @@
 # Please submit bugfixes or comments via http://bugs.opensuse.org/
 #
 
-# norootforbuild
 
+# Please submit bugfixes or comments via http://bugs.opensuse.org/
+#
 
 Name:   openssl
-BuildRequires:  bc ed pkg-config zlib-devel
+BuildRequires:  bc
+BuildRequires:  ed
+BuildRequires:  pkg-config
+BuildRequires:  zlib-devel
 %define ssletcdir %{_sysconfdir}/ssl
-%define num_version %(echo %{version} | sed -e s+[a-zA-Z]++g; s+_.*++g)
-License:OpenSSL
-Group:  Productivity/Networking/Security
+#%define num_version %(echo %{version} | sed -e s+[a-zA-Z]++g; s+_.*++g)
+%define num_version 1.0.0
 Provides:   ssl
-AutoReqProv:on
 # bug437293
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.0i
-Release:1
+Version:1.0.1c
+Release:0
 Summary:Secure Sockets and Transport Layer Security
+License:OpenSSL
+Group:  Productivity/Networking/Security
 Url:http://www.openssl.org/
-Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
+Source: http://www.%{name}.org/source/%{name}-%{version}.tar.gz
 # to get mtime of file:
 Source1:openssl.changes
 Source2:baselibs.conf
@@ -42,19 +46,6 @@
 Patch0: merge_from_0.9.8k.patch
 Patch1: openssl-1.0.0-c_rehash-compat.diff
 Patch2: bug610223.patch
-#Patch3: CVE-2010-1633_and_CVE-2010-0742.patch
-#Patch4: patchset-19727.diff
-#Patch5: CVE-2010-2939.patch
-#Patch6: CVE-2010-3864.patch
-Patch7: openssl-1.0.0b-aesni.patch
-#Patch8: CVE-2011-0014.patch
-Patch10:openssl-call-engine-reg-comp.patch
-#Patch11:Bug748738_Tolerate_bad_MIME_headers.patch
-#Patch12:bug749213-Free-headers-after-use.patch
-#Patch13:bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch
-#Patch14:CVE-2012-1165.patch
-#Patch15:CVE-2012-0884.patch
-#Patch16:bug749735.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -87,7 +78,6 @@
 Paul C. Sutton p...@openssl.org
 
 %package -n libopenssl1_0_0
-License:OpenSSL
 Summary:Secure Sockets and Transport Layer Security
 Group:  Productivity/Networking/Security
 Recommends: openssl-certs
@@ -127,12 +117,12 @@
 Paul C. Sutton p...@openssl.org
 
 %package -n libopenssl-devel
-License:OpenSSL
 Summary:Include Files and Libraries mandatory for Development
 Group:  Development/Libraries/C and C++
 Obsoletes:  openssl-devel  %{version}
-Requires:   libopenssl1_0_0 = %{version} zlib-devel
 Requires:   %name = %version
+Requires:   libopenssl1_0_0 = %{version}
+Requires:   zlib-devel
 Provides:   openssl-devel = %{version}
 # bug437293
 %ifarch ppc64
@@ -158,7 +148,6 @@
 Paul C. Sutton p...@openssl.org
 
 %package doc
-License:OpenSSL
 Summary:Additional Package Documentation
 Group:  Productivity/Networking/Security
 BuildArch:  noarch
@@ -185,19 +174,6 @@
 %patch0 -p1
 %patch1 -p1
 %patch2 -p1
-#%patch3 -p1
-#%patch4 -p1
-#%patch5 -p1
-#%patch6 -p1
-%patch7
-#%patch8 -p1
-%patch10
-#%patch11 -p1
-#%patch12 -p1
-#%patch13 -p1
-#%patch14 -p1
-#%patch15 -p1
-#%patch16 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags
@@ 

commit openssl for openSUSE:Factory

2012-05-08 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-05-08 12:28:22

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-04-23 
17:40:11.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-05-08 
12:28:29.0 +0200
@@ -1,0 +2,5 @@
+Fri May  4 12:09:57 UTC 2012 - lnus...@suse.de
+
+- don't install any demo or expired certs at all
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.H7uZqm/_old  2012-05-08 12:28:31.0 +0200
+++ /var/tmp/diff_new_pack.H7uZqm/_new  2012-05-08 12:28:31.0 +0200
@@ -296,8 +296,7 @@
 %install
 rm -rf $RPM_BUILD_ROOT
 make MANDIR=%{_mandir} INSTALL_PREFIX=$RPM_BUILD_ROOT install
-# install standard root certificates
-cp -pr certs/* $RPM_BUILD_ROOT%{ssletcdir}/certs
+install -d -m755 $RPM_BUILD_ROOT%{ssletcdir}/certs
 ln -sf ./%{name} $RPM_BUILD_ROOT/%{_includedir}/ssl
 mkdir $RPM_BUILD_ROOT/%{_datadir}/ssl
 mv $RPM_BUILD_ROOT/%{ssletcdir}/misc $RPM_BUILD_ROOT/%{_datadir}/ssl/
@@ -421,7 +420,6 @@
 %doc LICENSE NEWS README README.SuSE
 %dir %{ssletcdir}
 %dir %{ssletcdir}/certs
-%{ssletcdir}/certs/*
 %config (noreplace) %{ssletcdir}/openssl.cnf
 %attr(700,root,root) %{ssletcdir}/private
 %dir %{_datadir}/ssl

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2012-04-23 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-04-23 17:40:09

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-04-17 
22:00:29.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-04-23 
17:40:11.0 +0200
@@ -1,0 +2,13 @@
+Mon Apr 23 05:57:35 UTC 2012 - g...@suse.com
+
+- update to latest stable verison 1.0.0i
+  including the following patches:
+  CVE-2012-2110.path
+  Bug748738_Tolerate_bad_MIME_headers.patch
+  bug749213-Free-headers-after-use.patch
+  bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch
+  CVE-2012-1165.patch
+  CVE-2012-0884.patch
+  bug749735.patch
+
+---

Old:

  Bug748738_Tolerate_bad_MIME_headers.patch
  CVE-2012-0884.patch
  CVE-2012-1165.patch
  bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch
  bug749213-Free-headers-after-use.patch
  bug749735.patch
  openssl-1.0.0g.tar.bz2

New:

  openssl-1.0.0i.tar.bz2



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.0yOMFp/_old  2012-04-23 17:40:13.0 +0200
+++ /var/tmp/diff_new_pack.0yOMFp/_new  2012-04-23 17:40:13.0 +0200
@@ -30,7 +30,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-Version:1.0.0g
+Version:1.0.0i
 Release:1
 Summary:Secure Sockets and Transport Layer Security
 Url:http://www.openssl.org/
@@ -49,12 +49,12 @@
 Patch7: openssl-1.0.0b-aesni.patch
 #Patch8: CVE-2011-0014.patch
 Patch10:openssl-call-engine-reg-comp.patch
-Patch11:Bug748738_Tolerate_bad_MIME_headers.patch
-Patch12:bug749213-Free-headers-after-use.patch
-Patch13:bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch
-Patch14:CVE-2012-1165.patch
-Patch15:CVE-2012-0884.patch
-Patch16:bug749735.patch
+#Patch11:Bug748738_Tolerate_bad_MIME_headers.patch
+#Patch12:bug749213-Free-headers-after-use.patch
+#Patch13:bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch
+#Patch14:CVE-2012-1165.patch
+#Patch15:CVE-2012-0884.patch
+#Patch16:bug749735.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -192,12 +192,12 @@
 %patch7
 #%patch8 -p1
 %patch10
-%patch11 -p1
-%patch12 -p1
-%patch13 -p1
-%patch14 -p1
-%patch15 -p1
-%patch16 -p1
+#%patch11 -p1
+#%patch12 -p1
+#%patch13 -p1
+#%patch14 -p1
+#%patch15 -p1
+#%patch16 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2012-04-17 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-04-17 22:00:24

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-03-20 
17:49:17.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-04-17 
22:00:29.0 +0200
@@ -1,0 +2,19 @@
+Tue Mar 27 09:16:37 UTC 2012 - g...@suse.com
+
+- fix bug[bnc#749735] - Memory leak when creating public keys.
+  fix bug[bnc#751977] - CMS and S/MIME Bleichenbacher attack
+  CVE-2012-0884
+
+---
+Thu Mar 22 03:24:20 UTC 2012 - g...@suse.com
+
+- fix bug[bnc#751946] - S/MIME verification may erroneously fail
+  CVE-2012-1165
+
+---
+Wed Mar 21 02:44:41 UTC 2012 - g...@suse.com
+
+- fix bug[bnc#749213]-Free headers after use in error message
+  and bug[bnc#749210]-Symmetric crypto errors in PKCS7_decrypt
+
+---
@@ -6 +24,0 @@
-
@@ -11,0 +30 @@
+  CVE-2006-7250

New:

  CVE-2012-0884.patch
  CVE-2012-1165.patch
  bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch
  bug749213-Free-headers-after-use.patch
  bug749735.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.WvLsxJ/_old  2012-04-17 22:00:31.0 +0200
+++ /var/tmp/diff_new_pack.WvLsxJ/_new  2012-04-17 22:00:31.0 +0200
@@ -50,6 +50,11 @@
 #Patch8: CVE-2011-0014.patch
 Patch10:openssl-call-engine-reg-comp.patch
 Patch11:Bug748738_Tolerate_bad_MIME_headers.patch
+Patch12:bug749213-Free-headers-after-use.patch
+Patch13:bug749210-Symmetric-crypto-errors-in-PKCS7_decrypt.patch
+Patch14:CVE-2012-1165.patch
+Patch15:CVE-2012-0884.patch
+Patch16:bug749735.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -188,6 +193,11 @@
 #%patch8 -p1
 %patch10
 %patch11 -p1
+%patch12 -p1
+%patch13 -p1
+%patch14 -p1
+%patch15 -p1
+%patch16 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ CVE-2012-0884.patch ++
Index: openssl-1.0.0c/crypto/cms/cms.h
===
--- openssl-1.0.0c.orig/crypto/cms/cms.h
+++ openssl-1.0.0c/crypto/cms/cms.h
@@ -111,6 +111,7 @@ DECLARE_ASN1_PRINT_FUNCTION(CMS_ContentI
 #define CMS_PARTIAL0x4000
 #define CMS_REUSE_DIGEST   0x8000
 #define CMS_USE_KEYID  0x1
+#define CMS_DEBUG_DECRYPT  0x2
 
 const ASN1_OBJECT *CMS_get0_type(CMS_ContentInfo *cms);
 
Index: openssl-1.0.0c/crypto/cms/cms_enc.c
===
--- openssl-1.0.0c.orig/crypto/cms/cms_enc.c
+++ openssl-1.0.0c/crypto/cms/cms_enc.c
@@ -73,6 +73,8 @@ BIO *cms_EncryptedContent_init_bio(CMS_E
const EVP_CIPHER *ciph;
X509_ALGOR *calg = ec-contentEncryptionAlgorithm;
unsigned char iv[EVP_MAX_IV_LENGTH], *piv = NULL;
+   unsigned char *tkey = NULL;
+   size_t tkeylen;
 
int ok = 0;
 
@@ -139,30 +141,55 @@ BIO *cms_EncryptedContent_init_bio(CMS_E
}
 
 
-   if (enc  !ec-key)
+   /* Generate random session key */
+   if (!enc || !ec-key)
{
-   /* Generate random key */
-   if (!ec-keylen)
-   ec-keylen = EVP_CIPHER_CTX_key_length(ctx);
-   ec-key = OPENSSL_malloc(ec-keylen);
-   if (!ec-key)
+   tkeylen = EVP_CIPHER_CTX_key_length(ctx);
+   tkey = OPENSSL_malloc(tkeylen);
+   if (!tkey)
{
CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_INIT_BIO,
ERR_R_MALLOC_FAILURE);
goto err;
}
-   if (EVP_CIPHER_CTX_rand_key(ctx, ec-key) = 0)
+   if (EVP_CIPHER_CTX_rand_key(ctx, tkey) = 0)
goto err;
-   keep_key = 1;
}
-   else if (ec-keylen != (unsigned int)EVP_CIPHER_CTX_key_length(ctx))
+   if (!ec-key)
+   {
+   ec-key = tkey;
+   ec-keylen = tkeylen;
+   tkey = NULL;
+   if (enc)
+   keep_key = 1;
+   else
+  

commit openssl for openSUSE:Factory

2012-03-20 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-03-20 17:49:15

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-03-07 
20:09:59.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-03-20 
17:49:17.0 +0100
@@ -1,0 +2,6 @@
+Tue Mar 20 14:29:24 UTC 2012 - cfarr...@suse.com
+
+- license update: OpenSSL
+
+
+---



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.XMQ0rp/_old  2012-03-20 17:49:19.0 +0100
+++ /var/tmp/diff_new_pack.XMQ0rp/_new  2012-03-20 17:49:19.0 +0100
@@ -22,7 +22,7 @@
 BuildRequires:  bc ed pkg-config zlib-devel
 %define ssletcdir %{_sysconfdir}/ssl
 %define num_version %(echo %{version} | sed -e s+[a-zA-Z]++g; s+_.*++g)
-License:BSD-3-Clause
+License:OpenSSL
 Group:  Productivity/Networking/Security
 Provides:   ssl
 AutoReqProv:on
@@ -82,7 +82,7 @@
 Paul C. Sutton p...@openssl.org
 
 %package -n libopenssl1_0_0
-License:BSD-3-Clause
+License:OpenSSL
 Summary:Secure Sockets and Transport Layer Security
 Group:  Productivity/Networking/Security
 Recommends: openssl-certs
@@ -122,7 +122,7 @@
 Paul C. Sutton p...@openssl.org
 
 %package -n libopenssl-devel
-License:BSD-3-Clause
+License:OpenSSL
 Summary:Include Files and Libraries mandatory for Development
 Group:  Development/Libraries/C and C++
 Obsoletes:  openssl-devel  %{version}
@@ -153,7 +153,7 @@
 Paul C. Sutton p...@openssl.org
 
 %package doc
-License:BSD-3-Clause
+License:OpenSSL
 Summary:Additional Package Documentation
 Group:  Productivity/Networking/Security
 BuildArch:  noarch

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2012-03-07 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-03-07 20:09:51

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2012-02-03 
10:25:02.0 +0100
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-03-07 
20:09:59.0 +0100
@@ -1,0 +2,6 @@
+Fri Feb 24 02:33:22 UTC 2012 - g...@suse.com
+
+- fix bug[bnc#748738] - Tolerate bad MIME headers in openssl's 
+  asn1 parser.
+
+---

New:

  Bug748738_Tolerate_bad_MIME_headers.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.cUqlj4/_old  2012-03-07 20:10:00.0 +0100
+++ /var/tmp/diff_new_pack.cUqlj4/_new  2012-03-07 20:10:00.0 +0100
@@ -49,6 +49,7 @@
 Patch7: openssl-1.0.0b-aesni.patch
 #Patch8: CVE-2011-0014.patch
 Patch10:openssl-call-engine-reg-comp.patch
+Patch11:Bug748738_Tolerate_bad_MIME_headers.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -186,6 +187,7 @@
 %patch7
 #%patch8 -p1
 %patch10
+%patch11 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ Bug748738_Tolerate_bad_MIME_headers.patch ++
Index: openssl-1.0.0g/crypto/asn1/asn_mime.c
===
--- openssl-1.0.0g.orig/crypto/asn1/asn_mime.c
+++ openssl-1.0.0g/crypto/asn1/asn_mime.c
@@ -858,6 +858,10 @@ static int mime_hdr_addparam(MIME_HEADER
 static int mime_hdr_cmp(const MIME_HEADER * const *a,
const MIME_HEADER * const *b)
 {
+   if ((*a)-name == NULL || (*b)-name == NULL)
+   return (*a)-name - (*b)-name  0 ? -1 :
+   (*a)-name - (*b)-name  0 ? 1 : 0;
+
return(strcmp((*a)-name, (*b)-name));
 }
 
-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2012-02-03 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2012-02-03 10:24:53

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:

--- /work/SRC/openSUSE:Factory/openssl/openssl.changes  2011-10-19 
13:42:11.0 +0200
+++ /work/SRC/openSUSE:Factory/.openssl.new/openssl.changes 2012-02-03 
10:25:02.0 +0100
@@ -1,0 +2,16 @@
+Thu Feb  2 06:55:12 UTC 2012 - g...@suse.com
+
+- Update to version 1.0.0g fix the following:
+  DTLS DoS attack (CVE-2012-0050)
+
+---
+Wed Jan 11 05:35:18 UTC 2012 - g...@suse.com
+
+- Update to version 1.0.0f fix the following:
+  DTLS Plaintext Recovery Attack (CVE-2011-4108)
+  Uninitialized SSL 3.0 Padding (CVE-2011-4576)
+  Malformed RFC 3779 Data Can Cause Assertion Failures (CVE-2011-4577)
+  SGC Restart DoS Attack (CVE-2011-4619)
+  Invalid GOST parameters DoS Attack (CVE-2012-0027) 
+
+---

Old:

  openssl-1.0.0e.tar.bz2

New:

  openssl-1.0.0g.tar.bz2



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.Ij5yxf/_old  2012-02-03 10:25:03.0 +0100
+++ /var/tmp/diff_new_pack.Ij5yxf/_new  2012-02-03 10:25:03.0 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package openssl
 #
-# Copyright (c) 2011 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2012 SUSE LINUX Products GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -30,9 +30,7 @@
 %ifarch ppc64
 Obsoletes:  openssl-64bit
 %endif
-#
-#Version:1.0.0
-Version:1.0.0e
+Version:1.0.0g
 Release:1
 Summary:Secure Sockets and Transport Layer Security
 Url:http://www.openssl.org/

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2011-12-06 Thread h_root
Hello community,

here is the log from the commit of package openssl for openSUSE:Factory checked 
in at 2011-12-06 18:34:43

Comparing /work/SRC/openSUSE:Factory/openssl (Old)
 and  /work/SRC/openSUSE:Factory/.openssl.new (New)


Package is openssl, Maintainer is g...@suse.com

Changes:




Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.lcta5C/_old  2011-12-06 18:56:18.0 +0100
+++ /var/tmp/diff_new_pack.lcta5C/_new  2011-12-06 18:56:18.0 +0100
@@ -22,7 +22,7 @@
 BuildRequires:  bc ed pkg-config zlib-devel
 %define ssletcdir %{_sysconfdir}/ssl
 %define num_version %(echo %{version} | sed -e s+[a-zA-Z]++g; s+_.*++g)
-License:BSD3c(or similar)
+License:BSD-3-Clause
 Group:  Productivity/Networking/Security
 Provides:   ssl
 AutoReqProv:on
@@ -83,7 +83,7 @@
 Paul C. Sutton p...@openssl.org
 
 %package -n libopenssl1_0_0
-License:BSD3c(or similar)
+License:BSD-3-Clause
 Summary:Secure Sockets and Transport Layer Security
 Group:  Productivity/Networking/Security
 Recommends: openssl-certs
@@ -123,7 +123,7 @@
 Paul C. Sutton p...@openssl.org
 
 %package -n libopenssl-devel
-License:BSD3c(or similar)
+License:BSD-3-Clause
 Summary:Include Files and Libraries mandatory for Development
 Group:  Development/Libraries/C and C++
 Obsoletes:  openssl-devel  %{version}
@@ -154,7 +154,7 @@
 Paul C. Sutton p...@openssl.org
 
 %package doc
-License:BSD3c(or similar)
+License:BSD-3-Clause
 Summary:Additional Package Documentation
 Group:  Productivity/Networking/Security
 BuildArch:  noarch

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2011-09-09 Thread h_root

Hello community,

here is the log from the commit of package openssl for openSUSE:Factory
checked in at Fri Sep 9 11:49:18 CEST 2011.




--- openssl/openssl.changes 2011-08-06 02:37:39.0 +0200
+++ /mounts/work_src_done/STABLE/openssl/openssl.changes2011-09-07 
16:32:25.0 +0200
@@ -1,0 +2,6 @@
+Wed Sep  7 14:29:41 UTC 2011 - crrodrig...@opensuse.org
+
+- Update to openssl 1.0.0e fixes CVE-2011-3207 and CVE-2011-3210
+  see http://openssl.org/news/secadv_20110906.txt for details.
+
+---

calling whatdependson for head-i586


Old:

  ECDSA_signatures_timing_attack.patch
  openssl-1.0.0d.tar.bz2

New:

  openssl-1.0.0e.tar.bz2



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.ThJV88/_old  2011-09-09 11:49:11.0 +0200
+++ /var/tmp/diff_new_pack.ThJV88/_new  2011-09-09 11:49:11.0 +0200
@@ -32,8 +32,8 @@
 %endif
 #
 #Version:1.0.0
-Version:1.0.0d
-Release:31
+Version:1.0.0e
+Release:1
 Summary:Secure Sockets and Transport Layer Security
 Url:http://www.openssl.org/
 Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
@@ -50,7 +50,6 @@
 #Patch6: CVE-2010-3864.patch
 Patch7: openssl-1.0.0b-aesni.patch
 #Patch8: CVE-2011-0014.patch
-Patch9: ECDSA_signatures_timing_attack.patch
 Patch10:openssl-call-engine-reg-comp.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
@@ -188,7 +187,6 @@
 #%patch6 -p1
 %patch7 -p1
 #%patch8 -p1
-%patch9 -p1
 %patch10
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure

++ openssl-1.0.0d.tar.bz2 - openssl-1.0.0e.tar.bz2 ++
 9639 lines of diff (skipped)






Remember to have fun...

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2011-08-15 Thread h_root

Hello community,

here is the log from the commit of package openssl for openSUSE:Factory
checked in at Mon Aug 15 09:41:59 CEST 2011.




--- openssl/openssl.changes 2011-08-05 21:10:43.0 +0200
+++ /mounts/work_src_done/STABLE/openssl/openssl.changes2011-08-06 
02:37:39.0 +0200
@@ -1,0 +2,7 @@
+Sat Aug  6 00:33:47 UTC 2011 - crrodrig...@opensuse.org
+
+- Add upstream patch that calls ENGINE_register_all_complete()
+  in ENGINE_load_builtin_engines() saving us from adding dozens
+  of calls to such function to calling applications. 
+
+---

calling whatdependson for head-i586


New:

  openssl-call-engine-reg-comp.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.w6LUgZ/_old  2011-08-15 09:41:26.0 +0200
+++ /var/tmp/diff_new_pack.w6LUgZ/_new  2011-08-15 09:41:26.0 +0200
@@ -33,7 +33,7 @@
 #
 #Version:1.0.0
 Version:1.0.0d
-Release:29
+Release:31
 Summary:Secure Sockets and Transport Layer Security
 Url:http://www.openssl.org/
 Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
@@ -51,6 +51,7 @@
 Patch7: openssl-1.0.0b-aesni.patch
 #Patch8: CVE-2011-0014.patch
 Patch9: ECDSA_signatures_timing_attack.patch
+Patch10:openssl-call-engine-reg-comp.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -188,6 +189,7 @@
 %patch7 -p1
 #%patch8 -p1
 %patch9 -p1
+%patch10
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ openssl-call-engine-reg-comp.patch ++
Add call to ENGINE_register_all_complete() to ENGINE_load_builtin_engines(), 
this means that some implementations will be used automatically, e.g. aesni,
Setup cpuid in ENGINE_load_builtin_engines() too as some ENGINEs use it.
Origin: UPSTREAM
URL: http://cvs.openssl.org/chngview?cn=19781

--- crypto/engine/eng_all.c.orig
+++ crypto/engine/eng_all.c
@@ -61,6 +61,8 @@
 
 void ENGINE_load_builtin_engines(void)
{
+   /* Some ENGINEs need this */
+   OPENSSL_cpuid_setup();
 #if 0
/* There's no longer any need for an openssl ENGINE unless, one day,
 * it is the *only* way for standard builtin implementations to be be
@@ -115,6 +117,7 @@ void ENGINE_load_builtin_engines(void)
ENGINE_load_capi();
 #endif
 #endif
+ENGINE_register_all_complete();
}
 
 #if defined(__OpenBSD__) || defined(__FreeBSD__) || defined(HAVE_CRYPTODEV)





Remember to have fun...

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2011-08-06 Thread h_root

Hello community,

here is the log from the commit of package openssl for openSUSE:Factory
checked in at Sat Aug 6 19:08:57 CEST 2011.




--- openssl/openssl.changes 2011-07-25 21:07:45.0 +0200
+++ /mounts/work_src_done/STABLE/openssl/openssl.changes2011-08-05 
21:10:43.0 +0200
@@ -1,0 +2,6 @@
+Fri Aug  5 19:09:42 UTC 2011 - crrodrig...@opensuse.org
+
+- remove -fno-strict-aliasing from CFLAGS no longer needed 
+  and is likely to slow down stuff.
+
+---

calling whatdependson for head-i586




Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.SCyvo8/_old  2011-08-06 19:08:39.0 +0200
+++ /var/tmp/diff_new_pack.SCyvo8/_new  2011-08-06 19:08:39.0 +0200
@@ -33,7 +33,7 @@
 #
 #Version:1.0.0
 Version:1.0.0d
-Release:27
+Release:29
 Summary:Secure Sockets and Transport Layer Security
 Url:http://www.openssl.org/
 Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
@@ -235,7 +235,6 @@
 $RPM_OPT_FLAGS \
 -Wa,--noexecstack \
 -fomit-frame-pointer \
--fno-strict-aliasing \
 -DTERMIO \
 -DPURIFY \
 %ifnarch hppa
@@ -340,7 +339,7 @@
 SSL_CTX *ctx;
 SSL *ssl;
 SSL_METHOD *meth;
-  meth = SSLv2_client_method();
+  meth = SSLv23_client_method();
   SSLeay_add_ssl_algorithms();
   ctx = SSL_CTX_new(meth);
   if (ctx == NULL) return 0;






Remember to have fun...

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2011-06-28 Thread h_root

Hello community,

here is the log from the commit of package openssl for openSUSE:Factory
checked in at Tue Jun 28 10:06:37 CEST 2011.




--- openssl/openssl.changes 2011-05-16 16:38:57.0 +0200
+++ /mounts/work_src_done/STABLE/openssl/openssl.changes2011-06-24 
07:11:45.0 +0200
@@ -1,0 +2,18 @@
+Fri Jun 24 04:51:50 UTC 2011 - g...@novell.com
+
+- update to latest stable version 1.0.0d.
+  patch removed(already in the new package):
+  CVE-2011-0014
+  patch added:
+  ECDSA_signatures_timing_attack.patch
+
+---
+Tue May 31 07:07:49 UTC 2011 - g...@novell.com
+
+- fix bug[bnc#693027].
+  Add protection against ECDSA timing attacks as mentioned in the paper
+  by Billy Bob Brumley and Nicola Tuveri, see:
+  http://eprint.iacr.org/2011/232.pdf
+  [Billy Bob Brumley and Nicola Tuveri]
+
+---

calling whatdependson for head-i586


Old:

  CVE-2011-0014.patch
  openssl-1.0.0c.tar.bz2

New:

  ECDSA_signatures_timing_attack.patch
  openssl-1.0.0d.tar.bz2



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.PF5Mos/_old  2011-06-28 10:04:13.0 +0200
+++ /var/tmp/diff_new_pack.PF5Mos/_new  2011-06-28 10:04:13.0 +0200
@@ -32,8 +32,8 @@
 %endif
 #
 #Version:1.0.0
-Version:1.0.0c
-Release:25
+Version:1.0.0d
+Release:22
 Summary:Secure Sockets and Transport Layer Security
 Url:http://www.openssl.org/
 Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
@@ -49,7 +49,8 @@
 #Patch5: CVE-2010-2939.patch
 #Patch6: CVE-2010-3864.patch
 Patch7: openssl-1.0.0b-aesni.patch
-Patch8: CVE-2011-0014.patch
+#Patch8: CVE-2011-0014.patch
+Patch9: ECDSA_signatures_timing_attack.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -185,7 +186,8 @@
 #%patch5 -p1
 #%patch6 -p1
 %patch7 -p1
-%patch8 -p1
+#%patch8 -p1
+%patch9 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ ECDSA_signatures_timing_attack.patch ++
Index: openssl-1.0.0c/crypto/ecdsa/ecs_ossl.c
===
--- openssl-1.0.0c.orig/crypto/ecdsa/ecs_ossl.c
+++ openssl-1.0.0c/crypto/ecdsa/ecs_ossl.c
@@ -144,6 +144,16 @@ static int ecdsa_sign_setup(EC_KEY *ecke
}
while (BN_is_zero(k));
 
+#ifdef ECDSA_POINT_MUL_NO_CONSTTIME
+   /* We do not want timing information to leak the length of k,
+* so we compute G*k using an equivalent scalar of fixed
+* bit-length. */
+
+   if (!BN_add(k, k, order)) goto err;
+   if (BN_num_bits(k) = BN_num_bits(order))
+   if (!BN_add(k, k, order)) goto err;
+#endif /* def(ECDSA_POINT_MUL_NO_CONSTTIME) */
+
/* compute r the x-coordinate of generator * k */
if (!EC_POINT_mul(group, tmp_point, k, NULL, NULL, ctx))
{
Index: openssl-1.0.0c/crypto/ocsp/ocsp_lib.c
===
--- openssl-1.0.0c.orig/crypto/ocsp/ocsp_lib.c
+++ openssl-1.0.0c/crypto/ocsp/ocsp_lib.c
@@ -170,13 +170,14 @@ int OCSP_parse_url(char *url, char **pho
 
char *host, *port;
 
+   *phost = NULL;
+   *pport = NULL;
+   *ppath = NULL;
+
/* dup the buffer since we are going to mess with it */
buf = BUF_strdup(url);
if (!buf) goto mem_err;
 
-   *phost = NULL;
-   *pport = NULL;
-   *ppath = NULL;
 
/* Check for initial colon */
p = strchr(buf, ':');
++ openssl-1.0.0c.tar.bz2 - openssl-1.0.0d.tar.bz2 ++
 1724 lines of diff (skipped)






Remember to have fun...

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2011-05-30 Thread h_root

Hello community,

here is the log from the commit of package openssl for openSUSE:Factory
checked in at Mon May 30 09:05:51 CEST 2011.




--- openssl/openssl.changes 2011-02-10 08:45:42.0 +0100
+++ /mounts/work_src_done/STABLE/openssl/openssl.changes2011-05-16 
16:38:57.0 +0200
@@ -1,0 +2,5 @@
+Mon May 16 14:38:26 UTC 2011 - and...@opensuse.org
+
+- added openssl as dependency in the devel package 
+
+---

calling whatdependson for head-i586




Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.VcMGII/_old  2011-05-30 09:05:09.0 +0200
+++ /var/tmp/diff_new_pack.VcMGII/_new  2011-05-30 09:05:09.0 +0200
@@ -33,7 +33,7 @@
 #
 #Version:1.0.0
 Version:1.0.0c
-Release:21
+Release:25
 Summary:Secure Sockets and Transport Layer Security
 Url:http://www.openssl.org/
 Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
@@ -127,6 +127,7 @@
 Group:  Development/Libraries/C and C++
 Obsoletes:  openssl-devel  %{version}
 Requires:   libopenssl1_0_0 = %{version} zlib-devel
+Requires:   %name = %version
 Provides:   openssl-devel = %{version}
 # bug437293
 %ifarch ppc64






Remember to have fun...

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org



commit openssl for openSUSE:Factory

2011-03-15 Thread h_root

Hello community,

here is the log from the commit of package openssl for openSUSE:Factory
checked in at Tue Mar 15 09:28:50 CET 2011.




--- openssl/openssl.changes 2011-01-15 21:02:09.0 +0100
+++ /mounts/work_src_done/STABLE/openssl/openssl.changes2011-02-10 
08:45:42.0 +0100
@@ -1,0 +2,6 @@
+Thu Feb 10 07:42:01 UTC 2011 - g...@novell.com
+
+- fix bug [bnc#670526]
+  CVE-2011-0014,OCSP stapling vulnerability
+
+---

calling whatdependson for head-i586


New:

  CVE-2011-0014.patch



Other differences:
--
++ openssl.spec ++
--- /var/tmp/diff_new_pack.N472WH/_old  2011-03-15 09:28:46.0 +0100
+++ /var/tmp/diff_new_pack.N472WH/_new  2011-03-15 09:28:46.0 +0100
@@ -33,7 +33,7 @@
 #
 #Version:1.0.0
 Version:1.0.0c
-Release:3
+Release:20
 Summary:Secure Sockets and Transport Layer Security
 Url:http://www.openssl.org/
 Source: http://www.%{name}.org/source/%{name}-%{version}.tar.bz2
@@ -49,6 +49,7 @@
 #Patch5: CVE-2010-2939.patch
 #Patch6: CVE-2010-3864.patch
 Patch7: openssl-1.0.0b-aesni.patch
+Patch8: CVE-2011-0014.patch
 BuildRoot:  %{_tmppath}/%{name}-%{version}-build
 
 %description
@@ -183,6 +184,7 @@
 #%patch5 -p1
 #%patch6 -p1
 %patch7 -p1
+%patch8 -p1
 cp -p %{S:10} .
 echo adding/overwriting some entries in the 'table' hash in Configure
 # 
$dso_scheme:$shared_target:$shared_cflag:$shared_ldflag:$shared_extension:$ranlib:$arflags

++ CVE-2011-0014.patch ++
Index: openssl-1.0.0c/ssl/t1_lib.c
===
--- openssl-1.0.0c.orig/ssl/t1_lib.c
+++ openssl-1.0.0c/ssl/t1_lib.c
@@ -917,6 +917,7 @@ int ssl_parse_clienthello_tlsext(SSL *s,
}
n2s(data, idsize);
dsize -= 2 + idsize;
+   size -= 2 + idsize;
if (dsize  0)
{
*al = SSL_AD_DECODE_ERROR;
@@ -955,9 +956,14 @@ int ssl_parse_clienthello_tlsext(SSL *s,
}
 
/* Read in request_extensions */
+   if (size  2)
+   {
+   *al = SSL_AD_DECODE_ERROR;
+   return 0;
+   }
n2s(data,dsize);
size -= 2;
-   if (dsize  size) 
+   if (dsize != size) 
{
*al = SSL_AD_DECODE_ERROR;
return 0;





Remember to have fun...

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org