summaryrefslogtreecommitdiff
path: root/openssl-freefilesync/openssl.spec
diff options
context:
space:
mode:
Diffstat (limited to 'openssl-freefilesync/openssl.spec')
-rw-r--r--openssl-freefilesync/openssl.spec2128
1 files changed, 0 insertions, 2128 deletions
diff --git a/openssl-freefilesync/openssl.spec b/openssl-freefilesync/openssl.spec
deleted file mode 100644
index 29cef89..0000000
--- a/openssl-freefilesync/openssl.spec
+++ /dev/null
@@ -1,2128 +0,0 @@
-# For the curious:
-# 0.9.5a soversion = 0
-# 0.9.6 soversion = 1
-# 0.9.6a soversion = 2
-# 0.9.6c soversion = 3
-# 0.9.7a soversion = 4
-# 0.9.7ef soversion = 5
-# 0.9.8ab soversion = 6
-# 0.9.8g soversion = 7
-# 0.9.8jk + EAP-FAST soversion = 8
-# 1.0.0 soversion = 10
-# 1.1.0 soversion = 1.1 (same as upstream although presence of some symbols
-# depends on build configuration options)
-%define soversion 1.1
-
-# for openssl-freefilesync
-%define fullname openssl-freefilesync
-%define shortname openssl
-
-# Arches on which we need to prevent arch conflicts on opensslconf.h, must
-# also be handled in opensslconf-new.h.
-%define multilib_arches %{ix86} ia64 %{mips} ppc ppc64 s390 s390x sparcv9 sparc64 x86_64
-
-%global _performance_build 1
-
-Summary: Utilities from the general purpose cryptography library with TLS implementation
-# for openssl-freefilesync
-Name: %{fullname}
-Version: 1.1.1c
-# for openssl-freefilesync
-Release: 6.stack%{?dist}
-Epoch: 1
-# We have to remove certain patented algorithms from the openssl source
-# tarball with the hobble-openssl script which is included below.
-# The original openssl upstream tarball cannot be shipped in the .src.rpm.
-Source: openssl-%{version}-hobbled.tar.xz
-Source1: hobble-openssl
-Source2: Makefile.certificate
-Source6: make-dummy-cert
-Source7: renew-dummy-cert
-Source9: opensslconf-new.h
-Source10: opensslconf-new-warning.h
-Source11: README.FIPS
-Source12: ec_curve.c
-Source13: ectest.c
-# Build changes
-Patch1: openssl-1.1.1-build.patch
-Patch2: openssl-1.1.1-defaults.patch
-Patch3: openssl-1.1.0-no-html.patch
-Patch4: openssl-1.1.1-man-rename.patch
-# Bug fixes
-Patch21: openssl-1.1.0-issuer-hash.patch
-# Functionality changes
-Patch31: openssl-1.1.1-conf-paths.patch
-Patch32: openssl-1.1.1-version-add-engines.patch
-Patch33: openssl-1.1.1-apps-dgst.patch
-Patch36: openssl-1.1.1-no-brainpool.patch
-Patch37: openssl-1.1.1-ec-curves.patch
-Patch38: openssl-1.1.1-no-weak-verify.patch
-Patch40: openssl-1.1.1-disable-ssl3.patch
-Patch41: openssl-1.1.1-system-cipherlist.patch
-Patch42: openssl-1.1.1-fips.patch
-Patch43: openssl-1.1.1-ignore-bound.patch
-Patch44: openssl-1.1.1-version-override.patch
-Patch45: openssl-1.1.1-weak-ciphers.patch
-Patch46: openssl-1.1.1-seclevel.patch
-Patch47: openssl-1.1.1-ts-sha256-default.patch
-Patch48: openssl-1.1.1-fips-post-rand.patch
-Patch49: openssl-1.1.1-evp-kdf.patch
-Patch50: openssl-1.1.1-ssh-kdf.patch
-# Backported fixes including security fixes
-Patch51: openssl-1.1.1-upstream-sync.patch
-Patch52: openssl-1.1.1-s390x-update.patch
-Patch53: openssl-1.1.1-fips-crng-test.patch
-Patch54: openssl-1.1.1-regression-fixes.patch
-
-License: OpenSSL
-URL: http://www.openssl.org/
-BuildRequires: gcc
-BuildRequires: coreutils, perl-interpreter, sed, zlib-devel, /usr/bin/cmp
-BuildRequires: lksctp-tools-devel
-BuildRequires: /usr/bin/rename
-BuildRequires: /usr/bin/pod2man
-BuildRequires: /usr/sbin/sysctl
-BuildRequires: perl(Test::Harness), perl(Test::More), perl(Math::BigInt)
-BuildRequires: perl(Module::Load::Conditional), perl(File::Temp)
-BuildRequires: perl(Time::HiRes)
-Requires: coreutils
-Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
-
-%description
-The OpenSSL toolkit provides support for secure communications between
-machines. OpenSSL includes a certificate management tool and shared
-libraries which provide various cryptographic algorithms and
-protocols.
-
-%package libs
-Summary: A general purpose cryptography library with TLS implementation
-Requires: ca-certificates >= 2008-5
-# for openssl-freefilesync
-#Requires: crypto-policies >= 20180730
-#Recommends: openssl-pkcs11%{?_isa}
-Provides: openssl-fips = %{epoch}:%{version}-%{release}
-
-%description libs
-OpenSSL is a toolkit for supporting cryptography. The openssl-libs
-package contains the libraries that are used by various applications which
-support cryptographic algorithms and protocols.
-
-%package devel
-Summary: Files for development of applications which will use OpenSSL
-Requires: %{name}-libs%{?_isa} = %{epoch}:%{version}-%{release}
-Requires: pkgconfig
-
-%description devel
-OpenSSL is a toolkit for supporting cryptography. The openssl-devel
-package contains include files needed to develop applications which
-support various cryptographic algorithms and protocols.
-
-%package static
-Summary: Libraries for static linking of applications which will use OpenSSL
-Requires: %{name}-devel%{?_isa} = %{epoch}:%{version}-%{release}
-
-%description static
-OpenSSL is a toolkit for supporting cryptography. The openssl-static
-package contains static libraries needed for static linking of
-applications which support various cryptographic algorithms and
-protocols.
-
-%package perl
-Summary: Perl scripts provided with OpenSSL
-Requires: perl-interpreter
-Requires: %{name}%{?_isa} = %{epoch}:%{version}-%{release}
-
-%description perl
-OpenSSL is a toolkit for supporting cryptography. The openssl-perl
-package provides Perl scripts for converting certificates and keys
-from other formats to the formats used by the OpenSSL toolkit.
-
-%prep
-# for openssl-freefilesync
-%setup -q -n %{shortname}-%{version}
-
-# The hobble_openssl is called here redundantly, just to be sure.
-# The tarball has already the sources removed.
-%{SOURCE1} > /dev/null
-
-cp %{SOURCE12} crypto/ec/
-cp %{SOURCE13} test/
-
-%patch1 -p1 -b .build %{?_rawbuild}
-%patch2 -p1 -b .defaults
-%patch3 -p1 -b .no-html %{?_rawbuild}
-%patch4 -p1 -b .man-rename
-
-%patch21 -p1 -b .issuer-hash
-
-%patch31 -p1 -b .conf-paths
-%patch32 -p1 -b .version-add-engines
-%patch33 -p1 -b .dgst
-%patch36 -p1 -b .no-brainpool
-%patch37 -p1 -b .curves
-%patch38 -p1 -b .no-weak-verify
-%patch40 -p1 -b .disable-ssl3
-%patch41 -p1 -b .system-cipherlist
-%patch42 -p1 -b .fips
-%patch43 -p1 -b .ignore-bound
-%patch44 -p1 -b .version-override
-%patch45 -p1 -b .weak-ciphers
-%patch46 -p1 -b .seclevel
-%patch47 -p1 -b .ts-sha256-default
-%patch48 -p1 -b .fips-post-rand
-# for openssl-freefilesync
-sed -i -r -e '/sys\/random\.h/s@sys/random\.h@/usr/include/linux/random.h@;' crypto/rand/rand_unix.c
-%patch49 -p1 -b .evp-kdf
-%patch50 -p1 -b .ssh-kdf
-%patch51 -p1 -b .upstream-sync
-%patch52 -p1 -b .s390x-update
-%patch53 -p1 -b .crng-test
-%patch54 -p1 -b .regression
-
-
-%build
-# Figure out which flags we want to use.
-# default
-sslarch=%{_os}-%{_target_cpu}
-%ifarch %ix86
-sslarch=linux-elf
-if ! echo %{_target} | grep -q i686 ; then
- sslflags="no-asm 386"
-fi
-%endif
-%ifarch x86_64
-sslflags=enable-ec_nistp_64_gcc_128
-%endif
-%ifarch sparcv9
-sslarch=linux-sparcv9
-sslflags=no-asm
-%endif
-%ifarch sparc64
-sslarch=linux64-sparcv9
-sslflags=no-asm
-%endif
-%ifarch alpha alphaev56 alphaev6 alphaev67
-sslarch=linux-alpha-gcc
-%endif
-%ifarch s390 sh3eb sh4eb
-sslarch="linux-generic32 -DB_ENDIAN"
-%endif
-%ifarch s390x
-sslarch="linux64-s390x"
-%endif
-%ifarch %{arm}
-sslarch=linux-armv4
-%endif
-%ifarch aarch64
-sslarch=linux-aarch64
-sslflags=enable-ec_nistp_64_gcc_128
-%endif
-%ifarch sh3 sh4
-sslarch=linux-generic32
-%endif
-%ifarch ppc64 ppc64p7
-sslarch=linux-ppc64
-%endif
-%ifarch ppc64le
-sslarch="linux-ppc64le"
-sslflags=enable-ec_nistp_64_gcc_128
-%endif
-%ifarch mips mipsel
-sslarch="linux-mips32 -mips32r2"
-%endif
-%ifarch mips64 mips64el
-sslarch="linux64-mips64 -mips64r2"
-%endif
-%ifarch mips64el
-sslflags=enable-ec_nistp_64_gcc_128
-%endif
-%ifarch riscv64
-sslarch=linux-generic64
-%endif
-
-# Add -Wa,--noexecstack here so that libcrypto's assembler modules will be
-# marked as not requiring an executable stack.
-# Also add -DPURIFY to make using valgrind with openssl easier as we do not
-# want to depend on the uninitialized memory as a source of entropy anyway.
-# for openssl-freefilesync
-RPM_OPT_FLAGS="$RPM_OPT_FLAGS -Wa,--noexecstack -DPURIFY $RPM_LD_FLAGS"
-
-export HASHBANGPERL=/usr/bin/perl
-
-# ia64, x86_64, ppc are OK by default
-# Configure the build tree. Override OpenSSL defaults with known-good defaults
-# usable on all platforms. The Configure script already knows to use -fPIC and
-# RPM_OPT_FLAGS, so we can skip specifiying them here.
-./Configure \
- --prefix=%{_prefix} --openssldir=%{_sysconfdir}/pki/tls ${sslflags} \
- --system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config \
- zlib enable-camellia enable-seed enable-rfc3779 enable-sctp \
- enable-cms enable-md2 enable-rc5 enable-ssl3 enable-ssl3-method \
- enable-weak-ssl-ciphers \
- no-mdc2 no-ec2m no-sm2 no-sm4 \
- shared ${sslarch} $RPM_OPT_FLAGS '-DDEVRANDOM="\"/dev/urandom\""'
-
-# Do not run this in a production package the FIPS symbols must be patched-in
-#util/mkdef.pl crypto update
-
-make all
-
-# Overwrite FIPS README
-cp -f %{SOURCE11} .
-
-# Clean up the .pc files
-for i in libcrypto.pc libssl.pc openssl.pc ; do
- sed -i '/^Libs.private:/{s/-L[^ ]* //;s/-Wl[^ ]* //}' $i
-done
-
-%check
-# Verify that what was compiled actually works.
-
-# Hack - either enable SCTP AUTH chunks in kernel or disable sctp for check
-(sysctl net.sctp.addip_enable=1 && sysctl net.sctp.auth_enable=1) || \
-(echo 'Failed to enable SCTP AUTH chunks, disabling SCTP for tests...' &&
- sed '/"zlib-dynamic" => "default",/a\ \ "sctp" => "default",' configdata.pm > configdata.pm.new && \
- touch -r configdata.pm configdata.pm.new && \
- mv -f configdata.pm.new configdata.pm)
-
-# We must revert patch31 before tests otherwise they will fail
-patch -p1 -R < %{PATCH31}
-
-LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
-export LD_LIBRARY_PATH
-crypto/fips/fips_standalone_hmac libcrypto.so.%{soversion} >.libcrypto.so.%{soversion}.hmac
-ln -s .libcrypto.so.%{soversion}.hmac .libcrypto.so.hmac
-crypto/fips/fips_standalone_hmac libssl.so.%{soversion} >.libssl.so.%{soversion}.hmac
-ln -s .libssl.so.%{soversion}.hmac .libssl.so.hmac
-OPENSSL_ENABLE_MD5_VERIFY=
-export OPENSSL_ENABLE_MD5_VERIFY
-OPENSSL_SYSTEM_CIPHERS_OVERRIDE=xyz_nonexistent_file
-export OPENSSL_SYSTEM_CIPHERS_OVERRIDE
-make test
-
-# Add generation of HMAC checksum of the final stripped library
-%define __spec_install_post \
- %{?__debug_package:%{__debug_install_post}} \
- %{__arch_install_post} \
- %{__os_install_post} \
- crypto/fips/fips_standalone_hmac $RPM_BUILD_ROOT%{_libdir}/libcrypto.so.%{version} >$RPM_BUILD_ROOT%{_libdir}/.libcrypto.so.%{version}.hmac \
- ln -sf .libcrypto.so.%{version}.hmac $RPM_BUILD_ROOT%{_libdir}/.libcrypto.so.%{soversion}.hmac \
- crypto/fips/fips_standalone_hmac $RPM_BUILD_ROOT%{_libdir}/libssl.so.%{version} >$RPM_BUILD_ROOT%{_libdir}/.libssl.so.%{version}.hmac \
- ln -sf .libssl.so.%{version}.hmac $RPM_BUILD_ROOT%{_libdir}/.libssl.so.%{soversion}.hmac \
-%{nil}
-
-%define __provides_exclude_from %{_libdir}/openssl
-
-%install
-[ "$RPM_BUILD_ROOT" != "/" ] && rm -rf $RPM_BUILD_ROOT
-# Install OpenSSL.
-install -d $RPM_BUILD_ROOT{%{_bindir},%{_includedir},%{_libdir},%{_mandir},%{_libdir}/openssl,%{_pkgdocdir}}
-make DESTDIR=$RPM_BUILD_ROOT install
-rename so.%{soversion} so.%{version} $RPM_BUILD_ROOT%{_libdir}/*.so.%{soversion}
-for lib in $RPM_BUILD_ROOT%{_libdir}/*.so.%{version} ; do
- chmod 755 ${lib}
- ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`
- ln -s -f `basename ${lib}` $RPM_BUILD_ROOT%{_libdir}/`basename ${lib} .%{version}`.%{soversion}
-done
-
-# Install a makefile for generating keys and self-signed certs, and a script
-# for generating them on the fly.
-mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/certs
-install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_pkgdocdir}/Makefile.certificate
-install -m755 %{SOURCE6} $RPM_BUILD_ROOT%{_bindir}/make-dummy-cert
-install -m755 %{SOURCE7} $RPM_BUILD_ROOT%{_bindir}/renew-dummy-cert
-
-# Move runable perl scripts to bindir
-mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/*.pl $RPM_BUILD_ROOT%{_bindir}
-mv $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/misc/tsget $RPM_BUILD_ROOT%{_bindir}
-
-# Rename man pages so that they don't conflict with other system man pages.
-pushd $RPM_BUILD_ROOT%{_mandir}
-ln -s -f config.5 man5/openssl.cnf.5
-for manpage in man*/* ; do
- if [ -L ${manpage} ]; then
- TARGET=`ls -l ${manpage} | awk '{ print $NF }'`
- ln -snf ${TARGET}ssl ${manpage}ssl
- rm -f ${manpage}
- else
- mv ${manpage} ${manpage}ssl
- fi
-done
-for conflict in passwd rand ; do
- rename ${conflict} ssl${conflict} man*/${conflict}*
-# Fix dangling symlinks
- manpage=man1/openssl-${conflict}.*
- if [ -L ${manpage} ] ; then
- ln -snf ssl${conflict}.1ssl ${manpage}
- fi
-done
-popd
-
-mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA
-mkdir -m700 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/private
-mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/certs
-mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/crl
-mkdir -m755 $RPM_BUILD_ROOT%{_sysconfdir}/pki/CA/newcerts
-
-# Ensure the config file timestamps are identical across builds to avoid
-# mulitlib conflicts and unnecessary renames on upgrade
-# for openssl-freefilesync
-touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf%{version}
-touch -r %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf%{version}
-
-rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/openssl.cnf{,.dist}
-rm -f $RPM_BUILD_ROOT%{_sysconfdir}/pki/tls/ct_log_list.cnf{,.dist}
-
-# Determine which arch opensslconf.h is going to try to #include.
-basearch=%{_arch}
-%ifarch %{ix86}
-basearch=i386
-%endif
-%ifarch sparcv9
-basearch=sparc
-%endif
-%ifarch sparc64
-basearch=sparc64
-%endif
-
-# Next step of gradual disablement of SSL3.
-# Make SSL3 disappear to newly built dependencies.
-sed -i '/^\#ifndef OPENSSL_NO_SSL_TRACE/i\
-#ifndef OPENSSL_NO_SSL3\
-# define OPENSSL_NO_SSL3\
-#endif' $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
-
-%ifarch %{multilib_arches}
-# Do an opensslconf.h switcheroo to avoid file conflicts on systems where you
-# can have both a 32- and 64-bit version of the library, and they each need
-# their own correct-but-different versions of opensslconf.h to be usable.
-install -m644 %{SOURCE10} \
- $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf-${basearch}.h
-cat $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h >> \
- $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf-${basearch}.h
-install -m644 %{SOURCE9} \
- $RPM_BUILD_ROOT/%{_prefix}/include/openssl/opensslconf.h
-%endif
-LD_LIBRARY_PATH=`pwd`${LD_LIBRARY_PATH:+:${LD_LIBRARY_PATH}}
-export LD_LIBRARY_PATH
-
-# for openssl-freefilesync
-pushd ${RPM_BUILD_ROOT}%{_mandir}
-for word in $( find . ! -type d -print ) ;
-do
- mv "${word}" "${word}-111c"
-done
-popd
-mv ${RPM_BUILD_ROOT}%{_bindir}/openssl{,-111c}
-
-%files
-%{!?_licensedir:%global license %%doc}
-%license LICENSE
-%doc FAQ NEWS README README.FIPS
-%{_bindir}/make-dummy-cert
-%{_bindir}/renew-dummy-cert
-# for openssl-freefilesync
-%{_bindir}/openssl-111c
-%{_mandir}/man1*/*
-%{_mandir}/man5*/*
-%{_mandir}/man7*/*
-%{_pkgdocdir}/Makefile.certificate
-%exclude %{_mandir}/man1*/*.pl*
-%exclude %{_mandir}/man1*/c_rehash*
-%exclude %{_mandir}/man1*/tsget*
-%exclude %{_mandir}/man1*/openssl-tsget*
-
-%files libs
-%{!?_licensedir:%global license %%doc}
-%license LICENSE
-%dir %{_sysconfdir}/pki/tls
-%dir %{_sysconfdir}/pki/tls/certs
-%dir %{_sysconfdir}/pki/tls/misc
-%dir %{_sysconfdir}/pki/tls/private
-# for openssl-freefilesync
-%config(noreplace) %{_sysconfdir}/pki/tls/openssl.cnf%{version}
-%config(noreplace) %{_sysconfdir}/pki/tls/ct_log_list.cnf%{version}
-%attr(0755,root,root) %{_libdir}/libcrypto.so.%{version}
-%attr(0755,root,root) %{_libdir}/libcrypto.so.%{soversion}
-%attr(0755,root,root) %{_libdir}/libssl.so.%{version}
-%attr(0755,root,root) %{_libdir}/libssl.so.%{soversion}
-%attr(0644,root,root) %{_libdir}/.libcrypto.so.*.hmac
-%attr(0644,root,root) %{_libdir}/.libssl.so.*.hmac
-%attr(0755,root,root) %{_libdir}/engines-%{soversion}
-
-%files devel
-%doc CHANGES doc/dir-locals.example.el doc/openssl-c-indent.el
-%{_prefix}/include/openssl
-%{_libdir}/*.so
-%{_mandir}/man3*/*
-%{_libdir}/pkgconfig/*.pc
-
-%files static
-%{_libdir}/*.a
-
-%files perl
-%{_bindir}/c_rehash
-%{_bindir}/*.pl
-%{_bindir}/tsget
-%{_mandir}/man1*/*.pl*
-%{_mandir}/man1*/c_rehash*
-%{_mandir}/man1*/tsget*
-%{_mandir}/man1*/openssl-tsget*
-%dir %{_sysconfdir}/pki/CA
-%dir %{_sysconfdir}/pki/CA/private
-%dir %{_sysconfdir}/pki/CA/certs
-%dir %{_sysconfdir}/pki/CA/crl
-%dir %{_sysconfdir}/pki/CA/newcerts
-
-# for openssl-freefilesync
-%post libs -p /sbin/ldconfig
-
-%postun libs -p /sbin/ldconfig
-
-%changelog
-* Wed Sep 18 2019 B Stack <bgstack15@gmail.com> 1.1.1c-6.stack
-- rebuild for el7 for freefilesync
-
-* Fri Sep 6 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-6
-- upstream fix for status request extension non-compliance (#1737471)
-
-* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1c-5
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
-
-* Mon Jun 24 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-4
-- do not try to use EC groups disallowed in FIPS mode
- in TLS
-- fix Valgrind regression with constant-time code
-
-* Mon Jun 3 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-3
-- add upstream patch to defer sending KeyUpdate after
- pending writes are complete
-
-* Thu May 30 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-2
-- fix use of uninitialized memory
-
-* Wed May 29 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1c-1
-- update to the 1.1.1c release
-
-* Fri May 10 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-10
-- Another attempt at the AES-CCM regression fix
-
-* Fri May 10 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-9
-- Fix two small regressions
-- Change the ts application default hash to SHA256
-
-* Tue May 7 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-8
-- FIPS compliance fixes
-
-* Mon May 6 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-7
-- add S390x chacha20-poly1305 assembler support from master branch
-
-* Fri May 3 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-6
-- apply new bugfixes from upstream 1.1.1 branch
-
-* Tue Apr 16 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-5
-- fix for BIO_get_mem_ptr() regression in 1.1.1b (#1691853)
-
-* Wed Mar 27 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-4
-- drop unused BuildRequires and Requires in the -devel subpackage
-
-* Fri Mar 15 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-3
-- fix regression in EVP_PBE_scrypt() (#1688284)
-- fix incorrect help message in ca app (#1553206)
-
-* Fri Mar 1 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-2
-- use .include = syntax in the config file to allow it
- to be parsed by 1.0.2 version (#1668916)
-
-* Thu Feb 28 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1b-1
-- update to the 1.1.1b release
-- EVP_KDF API backport from master
-- SSH KDF implementation for EVP_KDF API backport from master
-
-* Fri Feb 01 2019 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.1a-2
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
-
-* Tue Jan 15 2019 Tomáš Mráz <tmraz@redhat.com> 1.1.1a-1
-- update to the 1.1.1a release
-
-* Fri Nov 9 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-7
-- use /dev/urandom for seeding the RNG in FIPS POST
-
-* Fri Oct 12 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-6
-- fix SECLEVEL 3 support
-- fix some issues found in Coverity scan
-
-* Thu Sep 27 2018 Charalampos Stratakis <cstratak@redhat.com> - 1:1.1.1-5
-- Correctly invoke sed for defining OPENSSL_NO_SSL3
-
-* Thu Sep 27 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-4
-- define OPENSSL_NO_SSL3 so the newly built dependencies do not
- have access to SSL3 API calls anymore
-
-* Mon Sep 17 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-3
-- reinstate accidentally dropped patch for weak ciphersuites
-
-* Fri Sep 14 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-2
-- for consistent support of security policies we build
- RC4 support in TLS (not default) and allow SHA1 in SECLEVEL 2
-
-* Thu Sep 13 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-1
-- update to the final 1.1.1 version
-
-* Thu Sep 6 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre9.3
-- do not try to initialize RNG in cleanup if it was not initialized
- before (#1624554)
-- use only /dev/urandom if getrandom() is not available
-- disable SM4
-
-* Wed Aug 29 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre9.2
-- fix dangling symlinks to manual pages
-- make SSLv3_method work
-
-* Wed Aug 22 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre9.1
-- update to the latest 1.1.1 beta version
-
-* Mon Aug 13 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre8.4
-- bidirectional shutdown fixes from upstream
-
-* Mon Aug 13 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre8.3
-- do not put error on stack when using fixed protocol version
- with the default config (#1615098)
-
-* Fri Jul 27 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre8.2
-- load crypto policy config file from the default config
-
-* Wed Jul 25 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.1-0.pre8
-- update to the latest 1.1.1 beta version
-
-* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0h-6
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
-
-* Tue Jun 19 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-5
-- fix FIPS RSA key generation failure
-
-* Mon Jun 4 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-4
-- ppc64le is not multilib arch (#1584994)
-
-* Tue Apr 3 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-3
-- fix regression of c_rehash (#1562953)
-
-* Thu Mar 29 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-2
-- fix FIPS symbol versions
-
-* Thu Mar 29 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0h-1
-- update to upstream version 1.1.0h
-- add Recommends for openssl-pkcs11
-
-* Fri Feb 23 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-6
-- one more try to apply RPM_LD_FLAGS properly (#1541033)
-- dropped unneeded starttls xmpp patch (#1417017)
-
-* Thu Feb 08 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0g-5
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
-
-* Thu Feb 1 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-4
-- apply RPM_LD_FLAGS properly (#1541033)
-
-* Thu Jan 11 2018 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-3
-- silence the .rnd write failure as that is auxiliary functionality (#1524833)
-
-* Thu Dec 14 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-2
-- put the Makefile.certificate in pkgdocdir and drop the requirement on make
-
-* Fri Nov 3 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0g-1
-- update to upstream version 1.1.0g
-
-* Thu Aug 03 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0f-9
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
-
-* Thu Jul 27 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0f-8
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
-
-* Mon Jul 17 2017 Tomáš Mráz <tmraz@redhat.com> 1:1.1.0f-7
-- make s_client and s_server work with -ssl3 option (#1471783)
-
-* Thu Jul 13 2017 Petr Pisar <ppisar@redhat.com> - 1:1.1.0f-6
-- perl dependency renamed to perl-interpreter
- <https://fedoraproject.org/wiki/Changes/perl_Package_to_Install_Core_Modules>
-
-* Mon Jun 26 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-5
-- disable verification of all insecure hashes
-
-* Fri Jun 23 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-4
-- make DTLS work (#1462541)
-
-* Thu Jun 15 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-3
-- enable 3DES SSL ciphersuites, RC4 is kept disabled (#1453066)
-
-* Mon Jun 5 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-2
-- only release thread-local key if we created it (from upstream) (#1458775)
-
-* Fri Jun 2 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0f-1
-- update to upstream version 1.1.0f
-- SRP and GOST is now allowed, note that GOST support requires
- adding GOST engine which is not part of openssl anymore
-
-* Thu Feb 16 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0e-1
-- update to upstream version 1.1.0e
-- add documentation of the PROFILE=SYSTEM special cipher string (#1420232)
-
-* Sat Feb 11 2017 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.1.0d-3
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild
-
-* Wed Feb 1 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0d-2
-- applied upstream fixes (fix regression in X509_CRL_digest)
-
-* Thu Jan 26 2017 Tomáš Mráz <tmraz@redhat.com> 1.1.0d-1
-- update to upstream version 1.1.0d
-
-* Thu Dec 22 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-5
-- preserve new line in fd BIO BIO_gets() as other BIOs do
-
-* Fri Dec 2 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-4
-- FIPS mode fixes for TLS
-
-* Wed Nov 30 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-3
-- revert SSL_read() behavior change - patch from upstream (#1394677)
-- fix behavior on client certificate request in renegotiation (#1393579)
-
-* Tue Nov 22 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-2
-- EC curve NIST P-224 is now allowed, still kept disabled in TLS due
- to less than optimal security
-
-* Fri Nov 11 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0c-1
-- update to upstream version 1.1.0c
-
-* Fri Nov 4 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0b-4
-- use a random seed if the supplied one did not generate valid
- parameters in dsa_builtin_paramgen2()
-
-* Wed Oct 12 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0b-3
-- do not break contract on return value when using dsa_builtin_paramgen2()
-
-* Wed Oct 12 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0b-2
-- fix afalg failure on big endian
-
-* Tue Oct 11 2016 Tomáš Mráz <tmraz@redhat.com> 1.1.0b-1
-- update to upstream version 1.1.0b
-
-* Fri Oct 07 2016 Richard W.M. Jones <rjones@redhat.com> - 1:1.0.2j-2
-- Add flags for riscv64.
-
-* Mon Sep 26 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2j-1
-- minor upstream release 1.0.2j fixing regression from previous release
-
-* Sat Sep 24 2016 David Woodhouse <dwmw2@infradead.org> 1.0.2i-2
-- Fix enginesdir in libcrypto.c (#1375361)
-
-* Thu Sep 22 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2i-1
-- minor upstream release 1.0.2i fixing security issues
-- move man pages for perl based scripts to perl subpackage (#1377617)
-
-* Wed Aug 10 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2h-3
-- fix regression in Cisco AnyConnect VPN support (#1354588)
-
-* Mon Jun 27 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2h-2
-- require libcrypto in libssl.pc (#1301301)
-
-* Tue May 3 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2h-1
-- minor upstream release 1.0.2h fixing security issues
-
-* Tue Mar 29 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2g-4
-- disable SSLv2 support altogether (without ABI break)
-
-* Mon Mar 7 2016 Tom Callaway <spot@fedoraproject.org> - 1.0.2g-3
-- enable RC5
-
-* Wed Mar 2 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2g-2
-- reenable SSL2 in the build to avoid ABI break (it does not
- make the openssl vulnerable to DROWN attack)
-
-* Tue Mar 1 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2g-1
-- minor upstream release 1.0.2g fixing security issues
-
-* Thu Feb 04 2016 Fedora Release Engineering <releng@fedoraproject.org> - 1:1.0.2f-2
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
-
-* Thu Jan 28 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2f-1
-- minor upstream release 1.0.2f fixing security issues
-- add support for MIPS secondary architecture
-
-* Fri Jan 15 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.2e-5
-- document some options of openssl speed command
-
-* Fri Dec 18 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2e-4
-- enable sctp support in DTLS
-
-* Tue Dec 8 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2e-3
-- remove unimplemented EC method from header (#1289599)
-
-* Mon Dec 7 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2e-2
-- the fast nistp implementation works only on little endian architectures
-
-* Fri Dec 4 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2e-1
-- minor upstream release 1.0.2e fixing moderate severity security issues
-- enable fast assembler implementation for NIST P-256 and P-521
- elliptic curves (#1164210)
-- filter out unwanted link options from the .pc files (#1257836)
-- do not set serial to 0 in Makefile.certificate (#1135719)
-
-* Mon Nov 16 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2d-3
-- fix sigill on some AMD CPUs (#1278194)
-
-* Wed Aug 12 2015 Tom Callaway <spot@fedoraproject.org> 1.0.2d-2
-- re-enable secp256k1 (bz1021898)
-
-* Thu Jul 9 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2d-1
-- minor upstream release 1.0.2d fixing a high severity security issue
-
-* Tue Jul 7 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2c-3
-- fix the aarch64 build
-
-* Thu Jun 18 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.0.2c-2
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
-
-* Mon Jun 15 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2c-1
-- minor upstream release 1.0.2c fixing multiple security issues
-
-* Thu May 7 2015 Peter Robinson <pbrobinson@fedoraproject.org> 1.0.2a-4
-- Add aarch64 sslarch details
-
-* Thu May 7 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2a-3
-- fix some 64 bit build targets
-
-* Tue Apr 28 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2a-2
-- add alternative certificate chain discovery support from upstream
-
-* Thu Apr 23 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.2a-1
-- rebase to 1.0.2 branch
-
-* Thu Apr 9 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1k-7
-- drop the AES-GCM restriction of 2^32 operations because the IV is
- always 96 bits (32 bit fixed field + 64 bit invocation field)
-
-* Thu Mar 19 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1k-6
-- fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
-- fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
-- fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption
-- fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
-- fix CVE-2015-0293 - triggerable assert in SSLv2 server
-
-* Mon Mar 16 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1k-5
-- fix bug in the CRYPTO_128_unwrap()
-
-* Fri Feb 27 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1k-4
-- fix bug in the RFC 5649 support (#1185878)
-
-* Sat Feb 21 2015 Till Maas <opensource@till.name> - 1:1.0.1k-3
-- Rebuilt for Fedora 23 Change
- https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
-
-* Thu Jan 15 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1k-2
-- test in the non-FIPS RSA keygen for minimal distance of p and q
- similarly to the FIPS RSA keygen
-
-* Fri Jan 9 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1k-1
-- new upstream release fixing multiple security issues
-
-* Thu Nov 20 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1j-3
-- disable SSLv3 by default again (mail servers and possibly
- LDAP servers should probably allow it explicitly for legacy
- clients)
-
-* Tue Oct 21 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1j-2
-- update the FIPS RSA keygen to be FIPS 186-4 compliant
-
-* Thu Oct 16 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1j-1
-- new upstream release fixing multiple security issues
-
-* Fri Oct 10 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1i-5
-- copy negotiated digests when switching certs by SNI (#1150032)
-
-* Mon Sep 8 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1i-4
-- add support for RFC 5649
-
-* Sun Aug 17 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.0.1i-3
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
-
-* Wed Aug 13 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1i-2
-- drop RSA X9.31 from RSA FIPS selftests
-- add Power 8 optimalizations
-
-* Thu Aug 7 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1i-1
-- new upstream release fixing multiple moderate security issues
-- for now disable only SSLv2 by default
-
-* Fri Jul 18 2014 Tom Callaway <spot@fedoraproject.org> 1.0.1h-6
-- fix license handling
-
-* Mon Jun 30 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1h-5
-- disable SSLv2 and SSLv3 protocols by default (can be enabled
- via appropriate SSL_CTX_clear_options() call)
-
-* Wed Jun 11 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1h-4
-- use system profile for default cipher list
-
-* Tue Jun 10 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1h-3
-- make FIPS mode keygen bit length restriction enforced only when
- OPENSSL_ENFORCE_MODULUS_BITS is set
-- fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
-
-* Sat Jun 07 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.0.1h-2
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
-
-* Thu Jun 5 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1h-1
-- new upstream release 1.0.1h
-
-* Sat May 31 2014 Peter Robinson <pbrobinson@fedoraproject.org> 1.0.1g-2
-- Drop obsolete and irrelevant docs
-- Move devel docs to appropriate package
-
-* Wed May 7 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1g-1
-- new upstream release 1.0.1g
-- do not include ECC ciphersuites in SSLv2 client hello (#1090952)
-- fail on hmac integrity check if the .hmac file is empty
-
-* Mon Apr 07 2014 Dennis Gilmore <dennis@ausil.us> - 1.0.1e-44
-- pull in upstream patch for CVE-2014-0160
-- removed CHANGES file portion from patch for expediency
-
-* Thu Apr 3 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-43
-- add support for ppc64le architecture (#1072633)
-
-* Mon Mar 17 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-42
-- properly detect encryption failure in BIO
-- use 2048 bit RSA key in FIPS selftests
-
-* Fri Feb 14 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-41
-- use the key length from configuration file if req -newkey rsa is invoked
-
-* Thu Feb 13 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-40
-- print ephemeral key size negotiated in TLS handshake (#1057715)
-- add DH_compute_key_padded needed for FIPS CAVS testing
-
-* Thu Feb 6 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-39
-- make expiration and key length changeable by DAYS and KEYLEN
- variables in the certificate Makefile (#1058108)
-- change default hash to sha256 (#1062325)
-
-* Wed Jan 22 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-38
-- make 3des strength to be 128 bits instead of 168 (#1056616)
-
-* Tue Jan 7 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-37
-- fix CVE-2013-4353 - Invalid TLS handshake crash
-- fix CVE-2013-6450 - possible MiTM attack on DTLS1
-
-* Fri Dec 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-36
-- fix CVE-2013-6449 - crash when version in SSL structure is incorrect
-- more FIPS validation requirement changes
-
-* Wed Dec 18 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-35
-- drop weak ciphers from the default TLS ciphersuite list
-- add back some symbols that were dropped with update to 1.0.1 branch
-- more FIPS validation requirement changes
-
-* Tue Nov 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34
-- fix locking and reseeding problems with FIPS drbg
-
-* Fri Nov 15 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-33
-- additional changes required for FIPS validation
-
-* Wed Nov 13 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-32
-- disable verification of certificate, CRL, and OCSP signatures
- using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable
- is not set
-
-* Fri Nov 8 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-31
-- add back support for secp521r1 EC curve
-- add aarch64 to Configure (#969692)
-
-* Tue Oct 29 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-30
-- fix misdetection of RDRAND support on Cyrix CPUS (from upstream) (#1022346)
-
-* Thu Oct 24 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-29
-- do not advertise ECC curves we do not support (#1022493)
-
-* Wed Oct 16 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-28
-- only ECC NIST Suite B curves support
-- drop -fips subpackage
-
-* Mon Oct 14 2013 Tom Callaway <spot@fedoraproject.org> - 1.0.1e-27
-- resolve bugzilla 319901 (phew! only took 6 years & 9 days)
-
-* Fri Sep 27 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-26
-- make DTLS1 work in FIPS mode
-- avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode
-
-* Mon Sep 23 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-25
-- avoid dlopening libssl.so from libcrypto (#1010357)
-
-* Fri Sep 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-24
-- fix small memory leak in FIPS aes selftest
-
-* Thu Sep 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-23
-- fix segfault in openssl speed hmac in the FIPS mode
-
-* Thu Sep 12 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-22
-- document the nextprotoneg option in manual pages
- original patch by Hubert Kario
-
-* Tue Sep 10 2013 Kyle McMartin <kyle@redhat.com> 1.0.1e-21
-- [arm] use elf auxv to figure out armcap.c instead of playing silly
- games with SIGILL handlers. (#1006474)
-
-* Wed Sep 4 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-20
-- try to avoid some races when updating the -fips subpackage
-
-* Mon Sep 2 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-19
-- use version-release in .hmac suffix to avoid overwrite
- during upgrade
-
-* Thu Aug 29 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-18
-- allow deinitialization of the FIPS mode
-
-* Thu Aug 29 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-17
-- always perform the FIPS selftests in library constructor
- if FIPS module is installed
-
-* Tue Aug 27 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-16
-- add -fips subpackage that contains the FIPS module files
-
-* Fri Aug 16 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-15
-- fix use of rdrand if available
-- more commits cherry picked from upstream
-- documentation fixes
-
-* Sat Aug 03 2013 Petr Pisar <ppisar@redhat.com> - 1:1.0.1e-14
-- Perl 5.18 rebuild
-
-* Fri Jul 26 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-13
-- additional manual page fix
-- use symbol versioning also for the textual version
-
-* Thu Jul 25 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-12
-- additional manual page fixes
-
-* Fri Jul 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-11
-- use _prefix macro
-
-* Wed Jul 17 2013 Petr Pisar <ppisar@redhat.com> - 1:1.0.1e-10
-- Perl 5.18 rebuild
-
-* Thu Jul 11 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-9
-- add openssl.cnf.5 manpage symlink to config.5
-
-* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-8
-- add relro linking flag
-
-* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-7
-- add support for the -trusted_first option for certificate chain verification
-
-* Fri May 3 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-6
-- fix build of manual pages with current pod2man (#959439)
-
-* Sun Apr 21 2013 Peter Robinson <pbrobinson@fedoraproject.org> 1.0.1e-5
-- Enable ARM optimised build
-
-* Mon Mar 18 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-4
-- fix random bad record mac errors (#918981)
-
-* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-3
-- fix up the SHLIB_VERSION_NUMBER
-
-* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-2
-- disable ZLIB loading by default (due to CRIME attack)
-
-* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-1
-- new upstream version
-
-* Wed Jan 30 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1c-12
-- more fixes from upstream
-- fix errors in manual causing build failure (#904777)
-
-* Fri Dec 21 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-11
-- add script for renewal of a self-signed cert by Philip Prindeville (#871566)
-- allow X509_issuer_and_serial_hash() produce correct result in
- the FIPS mode (#881336)
-
-* Thu Dec 6 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-10
-- do not load default verify paths if CApath or CAfile specified (#884305)
-
-* Tue Nov 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-9
-- more fixes from upstream CVS
-- fix DSA key pairwise check (#878597)
-
-* Thu Nov 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-8
-- use 1024 bit DH parameters in s_server as 512 bit is not allowed
- in FIPS mode and it is quite weak anyway
-
-* Mon Sep 10 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-7
-- add missing initialization of str in aes_ccm_init_key (#853963)
-- add important patches from upstream CVS
-- use the secure_getenv() with new glibc
-
-* Fri Jul 20 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.0.1c-6
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
-
-* Fri Jul 13 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-5
-- use __getenv_secure() instead of __libc_enable_secure
-
-* Fri Jul 13 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-4
-- do not move libcrypto to /lib
-- do not use environment variables if __libc_enable_secure is on
-- fix strict aliasing problems in modes
-
-* Thu Jul 12 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-3
-- fix DSA key generation in FIPS mode (#833866)
-- allow duplicate FIPS_mode_set(1)
-- enable build on ppc64 subarch (#834652)
-
-* Wed Jul 11 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-2
-- fix s_server with new glibc when no global IPv6 address (#839031)
-- make it build with new Perl
-
-* Tue May 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-1
-- new upstream version
-
-* Thu Apr 26 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1b-1
-- new upstream version
-
-* Fri Apr 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1a-1
-- new upstream version fixing CVE-2012-2110
-
-* Wed Apr 11 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-3
-- add Kerberos 5 libraries to pkgconfig for static linking (#807050)
-
-* Thu Apr 5 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-2
-- backports from upstream CVS
-- fix segfault when /dev/urandom is not available (#809586)
-
-* Wed Mar 14 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-1
-- new upstream release
-
-* Mon Mar 5 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.3.beta3
-- add obsoletes to assist multilib updates (#799636)
-
-* Wed Feb 29 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.2.beta3
-- epoch bumped to 1 due to revert to 1.0.0g on Fedora 17
-- new upstream release from the 1.0.1 branch
-- fix s390x build (#798411)
-- versioning for the SSLeay symbol (#794950)
-- add -DPURIFY to build flags (#797323)
-- filter engine provides
-- split the libraries to a separate -libs package
-- add make to requires on the base package (#783446)
-
-* Tue Feb 7 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.1.beta2
-- new upstream release from the 1.0.1 branch, ABI compatible
-- add documentation for the -no_ign_eof option
-
-* Thu Jan 19 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0g-1
-- new upstream release fixing CVE-2012-0050 - DoS regression in
- DTLS support introduced by the previous release (#782795)
-
-* Thu Jan 5 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0f-1
-- new upstream release fixing multiple CVEs
-
-* Tue Nov 22 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-4
-- move the libraries needed for static linking to Libs.private
-
-* Thu Nov 3 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-3
-- do not use AVX instructions when osxsave bit not set
-- add direct known answer tests for SHA2 algorithms
-
-* Wed Sep 21 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-2
-- fix missing initialization of variable in CHIL engine
-
-* Wed Sep 7 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-1
-- new upstream release fixing CVE-2011-3207 (#736088)
-
-* Wed Aug 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-8
-- drop the separate engine for Intel acceleration improvements
- and merge in the AES-NI, SHA1, and RC4 optimizations
-- add support for OPENSSL_DISABLE_AES_NI environment variable
- that disables the AES-NI support
-
-* Tue Jul 26 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-7
-- correct openssl cms help output (#636266)
-- more tolerant starttls detection in XMPP protocol (#608239)
-
-* Wed Jul 20 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-6
-- add support for newest Intel acceleration improvements backported
- from upstream by Intel in form of a separate engine
-
-* Thu Jun 9 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-5
-- allow the AES-NI engine in the FIPS mode
-
-* Tue May 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-4
-- add API necessary for CAVS testing of the new DSA parameter generation
-
-* Thu Apr 28 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-3
-- add support for VIA Padlock on 64bit arch from upstream (#617539)
-- do not return bogus values from load_certs (#652286)
-
-* Tue Apr 5 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-2
-- clarify apps help texts for available digest algorithms (#693858)
-
-* Thu Feb 10 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-1
-- new upstream release fixing CVE-2011-0014 (OCSP stapling vulnerability)
-
-* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.0.0c-4
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
-
-* Fri Feb 4 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0c-3
-- add -x931 parameter to openssl genrsa command to use the ANSI X9.31
- key generation method
-- use FIPS-186-3 method for DSA parameter generation
-- add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable
- to allow using MD5 when the system is in the maintenance state
- even if the /proc fips flag is on
-- make openssl pkcs12 command work by default in the FIPS mode
-
-* Mon Jan 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0c-2
-- listen on ipv6 wildcard in s_server so we accept connections
- from both ipv4 and ipv6 (#601612)
-- fix openssl speed command so it can be used in the FIPS mode
- with FIPS allowed ciphers
-
-* Fri Dec 3 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0c-1
-- new upstream version fixing CVE-2010-4180
-
-* Tue Nov 23 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-3
-- replace the revert for the s390x bignum asm routines with
- fix from upstream
-
-* Mon Nov 22 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-2
-- revert upstream change in s390x bignum asm routines
-
-* Tue Nov 16 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-1
-- new upstream version fixing CVE-2010-3864 (#649304)
-
-* Tue Sep 7 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-3
-- make SHLIB_VERSION reflect the library suffix
-
-* Wed Jun 30 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-2
-- openssl man page fix (#609484)
-
-* Fri Jun 4 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-1
-- new upstream patch release, fixes CVE-2010-0742 (#598738)
- and CVE-2010-1633 (#598732)
-
-* Wed May 19 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-5
-- pkgconfig files now contain the correct libdir (#593723)
-
-* Tue May 18 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-4
-- make CA dir readable - the private keys are in private subdir (#584810)
-
-* Fri Apr 9 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-3
-- a few fixes from upstream CVS
-- move libcrypto to /lib (#559953)
-
-* Tue Apr 6 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-2
-- set UTC timezone on pod2man run (#578842)
-- make X509_NAME_hash_old work in FIPS mode
-
-* Tue Mar 30 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-1
-- update to final 1.0.0 upstream release
-
-* Tue Feb 16 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.22.beta5
-- make TLS work in the FIPS mode
-
-* Fri Feb 12 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.21.beta5
-- gracefully handle zero length in assembler implementations of
- OPENSSL_cleanse (#564029)
-- do not fail in s_server if client hostname not resolvable (#561260)
-
-* Wed Jan 20 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.20.beta5
-- new upstream release
-
-* Thu Jan 14 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.19.beta4
-- fix CVE-2009-4355 - leak in applications incorrectly calling
- CRYPTO_free_all_ex_data() before application exit (#546707)
-- upstream fix for future TLS protocol version handling
-
-* Wed Jan 13 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.18.beta4
-- add support for Intel AES-NI
-
-* Thu Jan 7 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.17.beta4
-- upstream fix compression handling on session resumption
-- various null checks and other small fixes from upstream
-- upstream changes for the renegotiation info according to the latest draft
-
-* Mon Nov 23 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.16.beta4
-- fix non-fips mingw build (patch by Kalev Lember)
-- add IPV6 fix for DTLS
-
-* Fri Nov 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.15.beta4
-- add better error reporting for the unsafe renegotiation
-
-* Fri Nov 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.14.beta4
-- fix build on s390x
-
-* Wed Nov 18 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.13.beta4
-- disable enforcement of the renegotiation extension on the client (#537962)
-- add fixes from the current upstream snapshot
-
-* Fri Nov 13 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.12.beta4
-- keep the beta status in version number at 3 so we do not have to rebuild
- openssh and possibly other dependencies with too strict version check
-
-* Thu Nov 12 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.11.beta4
-- update to new upstream version, no soname bump needed
-- fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used
- so the compatibility with unfixed clients is not broken. The
- protocol extension is also not final.
-
-* Fri Oct 16 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.10.beta3
-- fix use of freed memory if SSL_CTX_free() is called before
- SSL_free() (#521342)
-
-* Thu Oct 8 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.9.beta3
-- fix typo in DTLS1 code (#527015)
-- fix leak in error handling of d2i_SSL_SESSION()
-
-* Wed Sep 30 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.8.beta3
-- fix RSA and DSA FIPS selftests
-- reenable fixed x86_64 camellia assembler code (#521127)
-
-* Fri Sep 4 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.7.beta3
-- temporarily disable x86_64 camellia assembler code (#521127)
-
-* Mon Aug 31 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.6.beta3
-- fix openssl dgst -dss1 (#520152)
-
-* Wed Aug 26 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.5.beta3
-- drop the compat symlink hacks
-
-* Sat Aug 22 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.4.beta3
-- constify SSL_CIPHER_description()
-
-* Fri Aug 21 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.3.beta3
-- fix WWW:Curl:Easy reference in tsget
-
-* Fri Aug 21 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.2.beta3
-- enable MD-2
-
-* Thu Aug 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.1.beta3
-- update to new major upstream release
-
-* Sat Jul 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.9.8k-7
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
-
-* Wed Jul 22 2009 Bill Nottingham <notting@redhat.com>
-- do not build special 'optimized' versions for i686, as that's the base
- arch in Fedora now
-
-* Tue Jun 30 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-6
-- abort if selftests failed and random number generator is polled
-- mention EVP_aes and EVP_sha2xx routines in the manpages
-- add README.FIPS
-- make CA dir absolute path (#445344)
-- change default length for RSA key generation to 2048 (#484101)
-
-* Thu May 21 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-5
-- fix CVE-2009-1377 CVE-2009-1378 CVE-2009-1379
- (DTLS DoS problems) (#501253, #501254, #501572)
-
-* Tue Apr 21 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-4
-- support compatibility DTLS mode for CISCO AnyConnect (#464629)
-
-* Fri Apr 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-3
-- correct the SHLIB_VERSION define
-
-* Wed Apr 15 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-2
-- add support for multiple CRLs with same subject
-- load only dynamic engine support in FIPS mode
-
-* Wed Mar 25 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-1
-- update to new upstream release (minor bug fixes, security
- fixes and machine code optimizations only)
-
-* Thu Mar 19 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-10
-- move libraries to /usr/lib (#239375)
-
-* Fri Mar 13 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-9
-- add a static subpackage
-
-* Thu Feb 26 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.9.8j-8
-- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
-
-* Mon Feb 2 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-7
-- must also verify checksum of libssl.so in the FIPS mode
-- obtain the seed for FIPS rng directly from the kernel device
-- drop the temporary symlinks
-
-* Mon Jan 26 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-6
-- drop the temporary triggerpostun and symlinking in post
-- fix the pkgconfig files and drop the unnecessary buildrequires
- on pkgconfig as it is a rpmbuild dependency (#481419)
-
-* Sat Jan 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-5
-- add temporary triggerpostun to reinstate the symlinks
-
-* Sat Jan 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-4
-- no pairwise key tests in non-fips mode (#479817)
-
-* Fri Jan 16 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-3
-- even more robust test for the temporary symlinks
-
-* Fri Jan 16 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-2
-- try to ensure the temporary symlinks exist
-
-* Thu Jan 15 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-1
-- new upstream version with necessary soname bump (#455753)
-- temporarily provide symlink to old soname to make it possible to rebuild
- the dependent packages in rawhide
-- add eap-fast support (#428181)
-- add possibility to disable zlib by setting
-- add fips mode support for testing purposes
-- do not null dereference on some invalid smime files
-- add buildrequires pkgconfig (#479493)
-
-* Sun Aug 10 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-11
-- do not add tls extensions to server hello for SSLv3 either
-
-* Mon Jun 2 2008 Joe Orton <jorton@redhat.com> 0.9.8g-10
-- move root CA bundle to ca-certificates package
-
-* Wed May 28 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-9
-- fix CVE-2008-0891 - server name extension crash (#448492)
-- fix CVE-2008-1672 - server key exchange message omit crash (#448495)
-
-* Tue May 27 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-8
-- super-H arch support
-- drop workaround for bug 199604 as it should be fixed in gcc-4.3
-
-* Mon May 19 2008 Tom "spot" Callaway <tcallawa@redhat.com> 0.9.8g-7
-- sparc handling
-
-* Mon Mar 10 2008 Joe Orton <jorton@redhat.com> 0.9.8g-6
-- update to new root CA bundle from mozilla.org (r1.45)
-
-* Wed Feb 20 2008 Fedora Release Engineering <rel-eng@fedoraproject.org> - 0.9.8g-5
-- Autorebuild for GCC 4.3
-
-* Thu Jan 24 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-4
-- merge review fixes (#226220)
-- adjust the SHLIB_VERSION_NUMBER to reflect library name (#429846)
-
-* Thu Dec 13 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-3
-- set default paths when no explicit paths are set (#418771)
-- do not add tls extensions to client hello for SSLv3 (#422081)
-
-* Tue Dec 4 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-2
-- enable some new crypto algorithms and features
-- add some more important bug fixes from openssl CVS
-
-* Mon Dec 3 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-1
-- update to latest upstream release, SONAME bumped to 7
-
-* Mon Oct 15 2007 Joe Orton <jorton@redhat.com> 0.9.8b-17
-- update to new CA bundle from mozilla.org
-
-* Fri Oct 12 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-16
-- fix CVE-2007-5135 - off-by-one in SSL_get_shared_ciphers (#309801)
-- fix CVE-2007-4995 - out of order DTLS fragments buffer overflow (#321191)
-- add alpha sub-archs (#296031)
-
-* Tue Aug 21 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-15
-- rebuild
-
-* Fri Aug 3 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-14
-- use localhost in testsuite, hopefully fixes slow build in koji
-- CVE-2007-3108 - fix side channel attack on private keys (#250577)
-- make ssl session cache id matching strict (#233599)
-
-* Wed Jul 25 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-13
-- allow building on ARM architectures (#245417)
-- use reference timestamps to prevent multilib conflicts (#218064)
-- -devel package must require pkgconfig (#241031)
-
-* Mon Dec 11 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-12
-- detect duplicates in add_dir properly (#206346)
-
-* Thu Nov 30 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-11
-- the previous change still didn't make X509_NAME_cmp transitive
-
-* Thu Nov 23 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-10
-- make X509_NAME_cmp transitive otherwise certificate lookup
- is broken (#216050)
-
-* Thu Nov 2 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-9
-- aliasing bug in engine loading, patch by IBM (#213216)
-
-* Mon Oct 2 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-8
-- CVE-2006-2940 fix was incorrect (#208744)
-
-* Mon Sep 25 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-7
-- fix CVE-2006-2937 - mishandled error on ASN.1 parsing (#207276)
-- fix CVE-2006-2940 - parasitic public keys DoS (#207274)
-- fix CVE-2006-3738 - buffer overflow in SSL_get_shared_ciphers (#206940)
-- fix CVE-2006-4343 - sslv2 client DoS (#206940)
-
-* Tue Sep 5 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-6
-- fix CVE-2006-4339 - prevent attack on PKCS#1 v1.5 signatures (#205180)
-
-* Wed Aug 2 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-5
-- set buffering to none on stdio/stdout FILE when bufsize is set (#200580)
- patch by IBM
-
-* Fri Jul 28 2006 Alexandre Oliva <aoliva@redhat.com> - 0.9.8b-4.1
-- rebuild with new binutils (#200330)
-
-* Fri Jul 21 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-4
-- add a temporary workaround for sha512 test failure on s390 (#199604)
-
-* Thu Jul 20 2006 Tomas Mraz <tmraz@redhat.com>
-- add ipv6 support to s_client and s_server (by Jan Pazdziora) (#198737)
-- add patches for BN threadsafety, AES cache collision attack hazard fix and
- pkcs7 code memleak fix from upstream CVS
-
-* Wed Jul 12 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8b-3.1
-- rebuild
-
-* Wed Jun 21 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-3
-- dropped libica and ica engine from build
-
-* Wed Jun 21 2006 Joe Orton <jorton@redhat.com>
-- update to new CA bundle from mozilla.org; adds CA certificates
- from netlock.hu and startcom.org
-
-* Mon Jun 5 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-2
-- fixed a few rpmlint warnings
-- better fix for #173399 from upstream
-- upstream fix for pkcs12
-
-* Thu May 11 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-1
-- upgrade to new version, stays ABI compatible
-- there is no more linux/config.h (it was empty anyway)
-
-* Tue Apr 4 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8a-6
-- fix stale open handles in libica (#177155)
-- fix build if 'rand' or 'passwd' in buildroot path (#178782)
-- initialize VIA Padlock engine (#186857)
-
-* Fri Feb 10 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8a-5.2
-- bump again for double-long bug on ppc(64)
-
-* Tue Feb 07 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8a-5.1
-- rebuilt for new gcc4.1 snapshot and glibc changes
-
-* Thu Dec 15 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-5
-- don't include SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
- in SSL_OP_ALL (#175779)
-
-* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
-- rebuilt
-
-* Tue Nov 29 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-4
-- fix build (-lcrypto was erroneusly dropped) of the updated libica
-- updated ICA engine to 1.3.6-rc3
-
-* Tue Nov 22 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-3
-- disable builtin compression methods for now until they work
- properly (#173399)
-
-* Wed Nov 16 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-2
-- don't set -rpath for openssl binary
-
-* Tue Nov 8 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-1
-- new upstream version
-- patches partially renumbered
-
-* Fri Oct 21 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-11
-- updated IBM ICA engine library and patch to latest upstream version
-
-* Wed Oct 12 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-10
-- fix CAN-2005-2969 - remove SSL_OP_MSIE_SSLV2_RSA_PADDING which
- disables the countermeasure against man in the middle attack in SSLv2
- (#169863)
-- use sha1 as default for CA and cert requests - CAN-2005-2946 (#169803)
-
-* Tue Aug 23 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-9
-- add *.so.soversion as symlinks in /lib (#165264)
-- remove unpackaged symlinks (#159595)
-- fixes from upstream (constant time fixes for DSA,
- bn assembler div on ppc arch, initialize memory on realloc)
-
-* Thu Aug 11 2005 Phil Knirsch <pknirsch@redhat.com> 0.9.7f-8
-- Updated ICA engine IBM patch to latest upstream version.
-
-* Thu May 19 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-7
-- fix CAN-2005-0109 - use constant time/memory access mod_exp
- so bits of private key aren't leaked by cache eviction (#157631)
-- a few more fixes from upstream 0.9.7g
-
-* Wed Apr 27 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-6
-- use poll instead of select in rand (#128285)
-- fix Makefile.certificate to point to /etc/pki/tls
-- change the default string mask in ASN1 to PrintableString+UTF8String
-
-* Mon Apr 25 2005 Joe Orton <jorton@redhat.com> 0.9.7f-5
-- update to revision 1.37 of Mozilla CA bundle
-
-* Thu Apr 21 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-4
-- move certificates to _sysconfdir/pki/tls (#143392)
-- move CA directories to _sysconfdir/pki/CA
-- patch the CA script and the default config so it points to the
- CA directories
-
-* Fri Apr 1 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-3
-- uninitialized variable mustn't be used as input in inline
- assembly
-- reenable the x86_64 assembly again
-
-* Thu Mar 31 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-2
-- add back RC4_CHAR on ia64 and x86_64 so the ABI isn't broken
-- disable broken bignum assembly on x86_64
-
-* Wed Mar 30 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-1
-- reenable optimizations on ppc64 and assembly code on ia64
-- upgrade to new upstream version (no soname bump needed)
-- disable thread test - it was testing the backport of the
- RSA blinding - no longer needed
-- added support for changing serial number to
- Makefile.certificate (#151188)
-- make ca-bundle.crt a config file (#118903)
-
-* Tue Mar 1 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-3
-- libcrypto shouldn't depend on libkrb5 (#135961)
-
-* Mon Feb 28 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-2
-- rebuild
-
-* Mon Feb 28 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-1
-- new upstream source, updated patches
-- added patch so we are hopefully ABI compatible with upcoming
- 0.9.7f
-
-* Thu Feb 10 2005 Tomas Mraz <tmraz@redhat.com>
-- Support UTF-8 charset in the Makefile.certificate (#134944)
-- Added cmp to BuildPrereq
-
-* Thu Jan 27 2005 Joe Orton <jorton@redhat.com> 0.9.7a-46
-- generate new ca-bundle.crt from Mozilla certdata.txt (revision 1.32)
-
-* Thu Dec 23 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-45
-- Fixed and updated libica-1.3.4-urandom.patch patch (#122967)
-
-* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-44
-- rebuild
-
-* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-43
-- rebuild
-
-* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-42
-- rebuild
-
-* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-41
-- remove der_chop, as upstream cvs has done (CAN-2004-0975, #140040)
-
-* Tue Oct 05 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-40
-- Include latest libica version with important bugfixes
-
-* Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com>
-- rebuilt
-
-* Mon Jun 14 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-38
-- Updated ICA engine IBM patch to latest upstream version.
-
-* Mon Jun 7 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-37
-- build for linux-alpha-gcc instead of alpha-gcc on alpha (Jeff Garzik)
-
-* Tue May 25 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-36
-- handle %%{_arch}=i486/i586/i686/athlon cases in the intermediate
- header (#124303)
-
-* Thu Mar 25 2004 Joe Orton <jorton@redhat.com> 0.9.7a-35
-- add security fixes for CAN-2004-0079, CAN-2004-0112
-
-* Tue Mar 16 2004 Phil Knirsch <pknirsch@redhat.com>
-- Fixed libica filespec.
-
-* Thu Mar 11 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-34
-- ppc/ppc64 define __powerpc__/__powerpc64__, not __ppc__/__ppc64__, fix
- the intermediate header
-
-* Wed Mar 10 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-33
-- add an intermediate <openssl/opensslconf.h> which points to the right
- arch-specific opensslconf.h on multilib arches
-
-* Tue Mar 02 2004 Elliot Lee <sopwith@redhat.com>
-- rebuilt
-
-* Thu Feb 26 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-32
-- Updated libica to latest upstream version 1.3.5.
-
-* Tue Feb 17 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-31
-- Update ICA crypto engine patch from IBM to latest version.
-
-* Fri Feb 13 2004 Elliot Lee <sopwith@redhat.com>
-- rebuilt
-
-* Fri Feb 13 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-29
-- rebuilt
-
-* Wed Feb 11 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-28
-- Fixed libica build.
-
-* Wed Feb 4 2004 Nalin Dahyabhai <nalin@redhat.com>
-- add "-ldl" to link flags added for Linux-on-ARM (#99313)
-
-* Wed Feb 4 2004 Joe Orton <jorton@redhat.com> 0.9.7a-27
-- updated ca-bundle.crt: removed expired GeoTrust roots, added
- freessl.com root, removed trustcenter.de Class 0 root
-
-* Sun Nov 30 2003 Tim Waugh <twaugh@redhat.com> 0.9.7a-26
-- Fix link line for libssl (bug #111154).
-
-* Fri Oct 24 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-25
-- add dependency on zlib-devel for the -devel package, which depends on zlib
- symbols because we enable zlib for libssl (#102962)
-
-* Fri Oct 24 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-24
-- Use /dev/urandom instead of PRNG for libica.
-- Apply libica-1.3.5 fix for /dev/urandom in icalinux.c
-- Use latest ICA engine patch from IBM.
-
-* Sat Oct 4 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22.1
-- rebuild
-
-* Wed Oct 1 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22
-- rebuild (22 wasn't actually built, fun eh?)
-
-* Tue Sep 30 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-23
-- re-disable optimizations on ppc64
-
-* Tue Sep 30 2003 Joe Orton <jorton@redhat.com>
-- add a_mbstr.c fix for 64-bit platforms from CVS
-
-* Tue Sep 30 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22
-- add -Wa,--noexecstack to RPM_OPT_FLAGS so that assembled modules get tagged
- as not needing executable stacks
-
-* Mon Sep 29 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-21
-- rebuild
-
-* Thu Sep 25 2003 Nalin Dahyabhai <nalin@redhat.com>
-- re-enable optimizations on ppc64
-
-* Thu Sep 25 2003 Nalin Dahyabhai <nalin@redhat.com>
-- remove exclusivearch
-
-* Wed Sep 24 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-20
-- only parse a client cert if one was requested
-- temporarily exclusivearch for %%{ix86}
-
-* Tue Sep 23 2003 Nalin Dahyabhai <nalin@redhat.com>
-- add security fixes for protocol parsing bugs (CAN-2003-0543, CAN-2003-0544)
- and heap corruption (CAN-2003-0545)
-- update RHNS-CA-CERT files
-- ease back on the number of threads used in the threading test
-
-* Wed Sep 17 2003 Matt Wilson <msw@redhat.com> 0.9.7a-19
-- rebuild to fix gzipped file md5sums (#91211)
-
-* Mon Aug 25 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-18
-- Updated libica to version 1.3.4.
-
-* Thu Jul 17 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-17
-- rebuild
-
-* Tue Jul 15 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-10.9
-- free the kssl_ctx structure when we free an SSL structure (#99066)
-
-* Fri Jul 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-16
-- rebuild
-
-* Thu Jul 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-15
-- lower thread test count on s390x
-
-* Tue Jul 8 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-14
-- rebuild
-
-* Thu Jun 26 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-13
-- disable assembly on arches where it seems to conflict with threading
-
-* Thu Jun 26 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-12
-- Updated libica to latest upstream version 1.3.0
-
-* Wed Jun 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-9.9
-- rebuild
-
-* Wed Jun 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-11
-- rebuild
-
-* Tue Jun 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-10
-- ubsec: don't stomp on output data which might also be input data
-
-* Tue Jun 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-9
-- temporarily disable optimizations on ppc64
-
-* Mon Jun 9 2003 Nalin Dahyabhai <nalin@redhat.com>
-- backport fix for engine-used-for-everything from 0.9.7b
-- backport fix for prng not being seeded causing problems, also from 0.9.7b
-- add a check at build-time to ensure that RSA is thread-safe
-- keep perlpath from stomping on the libica configure scripts
-
-* Fri Jun 6 2003 Nalin Dahyabhai <nalin@redhat.com>
-- thread-safety fix for RSA blinding
-
-* Wed Jun 04 2003 Elliot Lee <sopwith@redhat.com> 0.9.7a-8
-- rebuilt
-
-* Fri May 30 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-7
-- Added libica-1.2 to openssl (featurerequest).
-
-* Wed Apr 16 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-6
-- fix building with incorrect flags on ppc64
-
-* Wed Mar 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-5
-- add patch to harden against Klima-Pokorny-Rosa extension of Bleichenbacher's
- attack (CAN-2003-0131)
-
-* Mon Mar 17 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-4
-- add patch to enable RSA blinding by default, closing a timing attack
- (CAN-2003-0147)
-
-* Wed Mar 5 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-3
-- disable use of BN assembly module on x86_64, but continue to allow inline
- assembly (#83403)
-
-* Thu Feb 27 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-2
-- disable EC algorithms
-
-* Wed Feb 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-1
-- update to 0.9.7a
-
-* Wed Feb 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-8
-- add fix to guard against attempts to allocate negative amounts of memory
-- add patch for CAN-2003-0078, fixing a timing attack
-
-* Thu Feb 13 2003 Elliot Lee <sopwith@redhat.com> 0.9.7-7
-- Add openssl-ppc64.patch
-
-* Mon Feb 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-6
-- EVP_DecryptInit should call EVP_CipherInit() instead of EVP_CipherInit_ex(),
- to get the right behavior when passed uninitialized context structures
- (#83766)
-- build with -mcpu=ev5 on alpha family (#83828)
-
-* Wed Jan 22 2003 Tim Powers <timp@redhat.com>
-- rebuilt
-
-* Fri Jan 17 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7-4
-- Added IBM hw crypto support patch.
-
-* Wed Jan 15 2003 Nalin Dahyabhai <nalin@redhat.com>
-- add missing builddep on sed
-
-* Thu Jan 9 2003 Bill Nottingham <notting@redhat.com> 0.9.7-3
-- debloat
-- fix broken manpage symlinks
-
-* Wed Jan 8 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-2
-- fix double-free in 'openssl ca'
-
-* Fri Jan 3 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-1
-- update to 0.9.7 final
-
-* Tue Dec 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-0
-- update to 0.9.7 beta6 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)
-
-* Wed Dec 11 2002 Nalin Dahyabhai <nalin@redhat.com>
-- update to 0.9.7 beta5 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)
-
-* Tue Oct 22 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-30
-- add configuration stanza for x86_64 and use it on x86_64
-- build for linux-ppc on ppc
-- start running the self-tests again
-
-* Wed Oct 02 2002 Elliot Lee <sopwith@redhat.com> 0.9.6b-29hammer.3
-- Merge fixes from previous hammer packages, including general x86-64 and
- multilib
-
-* Tue Aug 6 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-29
-- rebuild
-
-* Thu Aug 1 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-28
-- update asn patch to fix accidental reversal of a logic check
-
-* Wed Jul 31 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-27
-- update asn patch to reduce chance that compiler optimization will remove
- one of the added tests
-
-* Wed Jul 31 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-26
-- rebuild
-
-* Mon Jul 29 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-25
-- add patch to fix ASN.1 vulnerabilities
-
-* Thu Jul 25 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-24
-- add backport of Ben Laurie's patches for OpenSSL 0.9.6d
-
-* Wed Jul 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-23
-- own {_datadir}/ssl/misc
-
-* Fri Jun 21 2002 Tim Powers <timp@redhat.com>
-- automated rebuild
-
-* Sun May 26 2002 Tim Powers <timp@redhat.com>
-- automated rebuild
-
-* Fri May 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-20
-- free ride through the build system (whee!)
-
-* Thu May 16 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-19
-- rebuild in new environment
-
-* Thu Apr 4 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-17, 0.9.6b-18
-- merge RHL-specific bits into stronghold package, rename
-
-* Tue Apr 02 2002 Gary Benson <gbenson@redhat.com> stronghold-0.9.6c-2
-- add support for Chrysalis Luna token
-
-* Tue Mar 26 2002 Gary Benson <gbenson@redhat.com>
-- disable AEP random number generation, other AEP fixes
-
-* Fri Mar 15 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-15
-- only build subpackages on primary arches
-
-* Thu Mar 14 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-13
-- on ia32, only disable use of assembler on i386
-- enable assembly on ia64
-
-* Mon Jan 7 2002 Florian La Roche <Florian.LaRoche@redhat.de> 0.9.6b-11
-- fix sparcv9 entry
-
-* Mon Jan 7 2002 Gary Benson <gbenson@redhat.com> stronghold-0.9.6c-1
-- upgrade to 0.9.6c
-- bump BuildArch to i686 and enable assembler on all platforms
-- synchronise with shrimpy and rawhide
-- bump soversion to 3
-
-* Wed Oct 10 2001 Florian La Roche <Florian.LaRoche@redhat.de>
-- delete BN_LLONG for s390x, patch from Oliver Paukstadt
-
-* Mon Sep 17 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-9
-- update AEP driver patch
-
-* Mon Sep 10 2001 Nalin Dahyabhai <nalin@redhat.com>
-- adjust RNG disabling patch to match version of patch from Broadcom
-
-* Fri Sep 7 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-8
-- disable the RNG in the ubsec engine driver
-
-* Tue Aug 28 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-7
-- tweaks to the ubsec engine driver
-
-* Fri Aug 24 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-6
-- tweaks to the ubsec engine driver
-
-* Thu Aug 23 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-5
-- update ubsec engine driver from Broadcom
-
-* Fri Aug 10 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-4
-- move man pages back to %%{_mandir}/man?/foo.?ssl from
- %%{_mandir}/man?ssl/foo.?
-- add an [ engine ] section to the default configuration file
-
-* Thu Aug 9 2001 Nalin Dahyabhai <nalin@redhat.com>
-- add a patch for selecting a default engine in SSL_library_init()
-
-* Mon Jul 23 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-3
-- add patches for AEP hardware support
-- add patch to keep trying when we fail to load a cert from a file and
- there are more in the file
-- add missing prototype for ENGINE_ubsec() in engine_int.h
-
-* Wed Jul 18 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-2
-- actually add hw_ubsec to the engine list
-
-* Tue Jul 17 2001 Nalin Dahyabhai <nalin@redhat.com>
-- add in the hw_ubsec driver from CVS
-
-* Wed Jul 11 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-1
-- update to 0.9.6b
-
-* Thu Jul 5 2001 Nalin Dahyabhai <nalin@redhat.com>
-- move .so symlinks back to %%{_libdir}
-
-* Tue Jul 3 2001 Nalin Dahyabhai <nalin@redhat.com>
-- move shared libraries to /lib (#38410)
-
-* Mon Jun 25 2001 Nalin Dahyabhai <nalin@redhat.com>
-- switch to engine code base
-
-* Mon Jun 18 2001 Nalin Dahyabhai <nalin@redhat.com>
-- add a script for creating dummy certificates
-- move man pages from %%{_mandir}/man?/foo.?ssl to %%{_mandir}/man?ssl/foo.?
-
-* Thu Jun 07 2001 Florian La Roche <Florian.LaRoche@redhat.de>
-- add s390x support
-
-* Fri Jun 1 2001 Nalin Dahyabhai <nalin@redhat.com>
-- change two memcpy() calls to memmove()
-- don't define L_ENDIAN on alpha
-
-* Wed May 23 2001 Joe Orton <jorton@redhat.com> stronghold-0.9.6a-1
-- Add 'stronghold-' prefix to package names.
-- Obsolete standard openssl packages.
-
-* Wed May 16 2001 Joe Orton <jorton@redhat.com>
-- Add BuildArch: i586 as per Nalin's advice.
-
-* Tue May 15 2001 Joe Orton <jorton@redhat.com>
-- Enable assembler on ix86 (using new .tar.bz2 which does
- include the asm directories).
-
-* Tue May 15 2001 Nalin Dahyabhai <nalin@redhat.com>
-- make subpackages depend on the main package
-
-* Tue May 1 2001 Nalin Dahyabhai <nalin@redhat.com>
-- adjust the hobble script to not disturb symlinks in include/ (fix from
- Joe Orton)
-
-* Fri Apr 27 2001 Nalin Dahyabhai <nalin@redhat.com>
-- drop the m2crypo patch we weren't using
-
-* Tue Apr 24 2001 Nalin Dahyabhai <nalin@redhat.com>
-- configure using "shared" as well
-
-* Sun Apr 8 2001 Nalin Dahyabhai <nalin@redhat.com>
-- update to 0.9.6a
-- use the build-shared target to build shared libraries
-- bump the soversion to 2 because we're no longer compatible with
- our 0.9.5a packages or our 0.9.6 packages
-- drop the patch for making rsatest a no-op when rsa null support is used
-- put all man pages into <section>ssl instead of <section>
-- break the m2crypto modules into a separate package
-
-* Tue Mar 13 2001 Nalin Dahyabhai <nalin@redhat.com>
-- use BN_LLONG on s390
-
-* Mon Mar 12 2001 Nalin Dahyabhai <nalin@redhat.com>
-- fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit)
-
-* Sat Mar 3 2001 Nalin Dahyabhai <nalin@redhat.com>
-- move c_rehash to the perl subpackage, because it's a perl script now
-
-* Fri Mar 2 2001 Nalin Dahyabhai <nalin@redhat.com>
-- update to 0.9.6
-- enable MD2
-- use the libcrypto.so and libssl.so targets to build shared libs with
-- bump the soversion to 1 because we're no longer compatible with any of
- the various 0.9.5a packages circulating around, which provide lib*.so.0
-
-* Wed Feb 28 2001 Florian La Roche <Florian.LaRoche@redhat.de>
-- change hobble-openssl for disabling MD2 again
-
-* Tue Feb 27 2001 Nalin Dahyabhai <nalin@redhat.com>
-- re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152
- bytes or so, causing EVP_DigestInit() to zero out stack variables in
- apps built against a version of the library without it
-
-* Mon Feb 26 2001 Nalin Dahyabhai <nalin@redhat.com>
-- disable some inline assembly, which on x86 is Pentium-specific
-- re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all)
-
-* Thu Feb 08 2001 Florian La Roche <Florian.LaRoche@redhat.de>
-- fix s390 patch
-
-* Fri Dec 8 2000 Than Ngo <than@redhat.com>
-- added support s390
-
-* Mon Nov 20 2000 Nalin Dahyabhai <nalin@redhat.com>
-- remove -Wa,* and -m* compiler flags from the default Configure file (#20656)
-- add the CA.pl man page to the perl subpackage
-
-* Thu Nov 2 2000 Nalin Dahyabhai <nalin@redhat.com>
-- always build with -mcpu=ev5 on alpha
-
-* Tue Oct 31 2000 Nalin Dahyabhai <nalin@redhat.com>
-- add a symlink from cert.pem to ca-bundle.crt
-
-* Wed Oct 25 2000 Nalin Dahyabhai <nalin@redhat.com>
-- add a ca-bundle file for packages like Samba to reference for CA certificates
-
-* Tue Oct 24 2000 Nalin Dahyabhai <nalin@redhat.com>
-- remove libcrypto's crypt(), which doesn't handle md5crypt (#19295)
-
-* Mon Oct 2 2000 Nalin Dahyabhai <nalin@redhat.com>
-- add unzip as a buildprereq (#17662)
-- update m2crypto to 0.05-snap4
-
-* Tue Sep 26 2000 Bill Nottingham <notting@redhat.com>
-- fix some issues in building when it's not installed
-
-* Wed Sep 6 2000 Nalin Dahyabhai <nalin@redhat.com>
-- make sure the headers we include are the ones we built with (aaaaarrgh!)
-
-* Fri Sep 1 2000 Nalin Dahyabhai <nalin@redhat.com>
-- add Richard Henderson's patch for BN on ia64
-- clean up the changelog
-
-* Tue Aug 29 2000 Nalin Dahyabhai <nalin@redhat.com>
-- fix the building of python modules without openssl-devel already installed
-
-* Wed Aug 23 2000 Nalin Dahyabhai <nalin@redhat.com>
-- byte-compile python extensions without the build-root
-- adjust the makefile to not remove temporary files (like .key files when
- building .csr files) by marking them as .PRECIOUS
-
-* Sat Aug 19 2000 Nalin Dahyabhai <nalin@redhat.com>
-- break out python extensions into a subpackage
-
-* Mon Jul 17 2000 Nalin Dahyabhai <nalin@redhat.com>
-- tweak the makefile some more
-
-* Tue Jul 11 2000 Nalin Dahyabhai <nalin@redhat.com>
-- disable MD2 support
-
-* Thu Jul 6 2000 Nalin Dahyabhai <nalin@redhat.com>
-- disable MDC2 support
-
-* Sun Jul 2 2000 Nalin Dahyabhai <nalin@redhat.com>
-- tweak the disabling of RC5, IDEA support
-- tweak the makefile
-
-* Thu Jun 29 2000 Nalin Dahyabhai <nalin@redhat.com>
-- strip binaries and libraries
-- rework certificate makefile to have the right parts for Apache
-
-* Wed Jun 28 2000 Nalin Dahyabhai <nalin@redhat.com>
-- use %%{_perl} instead of /usr/bin/perl
-- disable alpha until it passes its own test suite
-
-* Fri Jun 9 2000 Nalin Dahyabhai <nalin@redhat.com>
-- move the passwd.1 man page out of the passwd package's way
-
-* Fri Jun 2 2000 Nalin Dahyabhai <nalin@redhat.com>
-- update to 0.9.5a, modified for U.S.
-- add perl as a build-time requirement
-- move certificate makefile to another package
-- disable RC5, IDEA, RSA support
-- remove optimizations for now
-
-* Wed Mar 1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
-- Bero told me to move the Makefile into this package
-
-* Wed Mar 1 2000 Florian La Roche <Florian.LaRoche@redhat.de>
-- add lib*.so symlinks to link dynamically against shared libs
-
-* Tue Feb 29 2000 Florian La Roche <Florian.LaRoche@redhat.de>
-- update to 0.9.5
-- run ldconfig directly in post/postun
-- add FAQ
-
-* Sat Dec 18 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
-- Fix build on non-x86 platforms
-
-* Fri Nov 12 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
-- move /usr/share/ssl/* from -devel to main package
-
-* Tue Oct 26 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
-- inital packaging
-- changes from base:
- - Move /usr/local/ssl to /usr/share/ssl for FHS compliance
- - handle RPM_OPT_FLAGS
bgstack15