openssl-perl-1:1.0.2k-19.el7>t  DH`p]_ $ƨVϹV(n ?y՗jU:46'@knElY(WMaNI =8FznfWǡvWBYPHۢ$۵u_[挘ǀm7lq17cu]ٻ"^ns9/`\<2'. 7?1g&$f~{ 6ґ`j_Qo{%)R7SA,b ~ߩ-𵲨Z+Wшq.MYKDe # šLTc!T]2b[DgIE" PtDe֬@kSTEQQ9M3Ogh|˿Ӂ6u eeo KllBd|r[!24QNGK&aT#b}͕][]J8`-&~^s,F FN^44c687f30107c3d5396954b80d8875a678a463cb]_ $ƨu~j-cէ,fb(Bnba^ti[P+ ܨjQHݐK=?g4f&׼$Ob!W)iQ,k`P`g>+M }-%L=SzKjӵԅpy- {xױ{c9 R^ui;0GxL鳶\yp[ynkVˊ<0Jk' Up 3 aNQNW=^p|?I[ aj !W c:˔ֈh; '6دD{G0I!ug#"G$!Nt*2V[ {zP7溦v*n W[iZph/Cf7^ٶ5&-Ė^HH;6ѳ@[K#=_^ dM w|8}H<҄#֚Oͪۅ Rp0Pb\ цѐ9?d  $ G (,3; g}    r x( \ H (|8x9 dx:H,xG0HHI`XhYp\͐]ͨ^bdγeθfλlνtuvwψxϠyϸ Copenssl-perl1.0.2k19.el7Perl scripts provided with OpenSSLOpenSSL is a toolkit for supporting cryptography. The openssl-perl package provides Perl scripts for converting certificates and keys from other formats to the formats used by the OpenSSL toolkit.]Lx86-02.bsys.centos.orgoCentOSOpenSSLCentOS BuildSystem Applications/Internethttp://www.openssl.org/linuxx86_64;I 큤]Le]Le]Le]Lf]Lg]Lk4015dac0df9a835ff4c075a4acb6e1c73c1b31c750522c50082bde7fbdb5bd97eeb39d9e6c27f76b654d0c8eda2f534bfb40ff34175cb351a71b2ffe29b66937e2e274b5a682e42f821065d7edef475672c830d4603cf5d5fc14a5559a5c142b597da0fa5465c92dd19b4e4cdbe6f20c1f32dc2d2ff958f7c8937da796aaa6008533aff78f5326b734de92f60ec81e78c75e4836f8deb475a3d4661d9ece4a68bcdd74f471a0e5db535ee1a4f7c4feccdc2a03468157a0184aee646c821e0697rootrootrootrootrootrootrootrootrootrootrootrootopenssl-1.0.2k-19.el7.src.rpmopenssl-perlopenssl-perl(x86-64)@@@@@@@    /usr/bin/perlopenssl(x86-64)perlperl(File::Basename)perl(Getopt::Std)perl(IO::Handle)perl(WWW::Curl::Easy)perl(strict)perl(vars)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1:1.0.2k-19.el73.0.4-14.6.0-14.0-15.2-14.11.3\@\C@\Z@[r@[(@['Z1@Z'Z@Y;@Xh@XXXCXX@XXtXn5@WWi,@W#LWKV͛@V@VwVa@UJ@Uyx@Uv@Un@UcU@U @U hUTPTTTFJT>aT"@T@SS@SSSCR@RRb@RURx@R@RkR1@RRR R|@Ri RNR1R$}R7RR@QdQ@Q*@Qޞ@QLQLQ@QQQ@QGQ#i@Q#i@Q#i@Q @PO@PPpP@PM@P H@P P O@OjOE@O8OOOr@O}@O`@OTON@O1@OONˎN@NyNg\NTN.@N&@MM۝MVM@MS@MQ0@MK@M=iLLL[@Lr@L)@L+1LKK@KK"@KKzKuBKV@KO@KMKEK y@KKKJJ@JJ`@J@JH@J@J@J#JJ@J@J:JjJf@JI@JB@I@Io@I@II3IJI@I@I}Iq@Iq@IpvIpvIo%@H@HCH=I@H;H1kG"G@G}GaGUA@GSGV@GaFFF;@E}H@EnEe@EIE @EDfDГD@DDp@D@D4D4DDc'@D2_C@CCZCqCBC@C{@Cp@CX@CLC B=BBo~BlBgBM7BK@BJB$Y@B#B#B LAAʳ@A@A@A@A@Ab@@͓@@X@5@@b@V@@PT@O@@Dw@@=@2@@,@@,@@*@@ @ ??@?@?~@?z?yp@?yp@?yp@?x?r?r?q@?p5?hL?I@???? U@? @>@>@>>>@>@>v>@>@>G>E>x[>u>e>]>Sq>Sq>K>G@>.>'@>%M@>d@>>{@==(====O@=I"=G@=G@=E.@=?@=5\@=@<@<<@<@@<@ 1.0.2k-19Tomáš Mráz 1.0.2k-18Tomáš Mráz 1.0.2k-17Tomáš Mráz 1.0.2k-16Tomáš Mráz 1.0.2k-14Tomáš Mráz 1.0.2k-13Tomáš Mráz 1.0.2k-12Tomáš Mráz 1.0.2k-11Tomáš Mráz 1.0.2k-9Tomáš Mráz 1.0.2k-8Tomáš Mráz 1.0.2k-7Tomáš Mráz 1.0.2k-6Tomáš Mráz 1.0.2k-5Tomáš Mráz 1.0.2k-4Tomáš Mráz 1.0.2k-3Tomáš Mráz 1.0.2k-2Tomáš Mráz 1.0.2k-1Tomáš Mráz 1.0.2j-2Tomáš Mráz 1.0.2j-1Tomáš Mráz 1.0.1e-60Tomáš Mráz 1.0.1e-58Tomáš Mráz 1.0.1e-57Tomáš Mráz 1.0.1e-56Tomáš Mráz 1.0.1e-55Tomáš Mráz 1.0.1e-54Tomáš Mráz 1.0.1e-53Tomáš Mráz 1.0.1e-52Tomáš Mráz 1.0.1e-51Tomáš Mráz 1.0.1e-50Tomáš Mráz 1.0.1e-49Tomáš Mráz 1.0.1e-48Tomáš Mráz 1.0.1e-47Tomáš Mráz 1.0.1e-46Tomáš Mráz 1.0.1e-45Tomáš Mráz 1.0.1e-44Tomáš Mráz 1.0.1e-43Tomáš Mráz 1.0.1e-42.1Tomáš Mráz 1.0.1e-42Tomáš Mráz 1.0.1e-41Tomáš Mráz 1.0.1e-40Tomáš Mráz 1.0.1e-39Tomáš Mráz 1.0.1e-38Tomáš Mráz 1.0.1e-37Tomáš Mráz 1.0.1e-36Tomáš Mráz 1.0.1e-35Tomáš Mráz 1.0.1e-34.3Tomáš Mráz 1.0.1e-34Tomáš Mráz 1.0.1e-33Tomáš Mráz 1.0.1e-32Tomáš Mráz 1.0.1e-31Daniel Mach - 1:1.0.1e-30Tomáš Mráz 1.0.1e-29Tomáš Mráz 1.0.1e-28Daniel Mach - 1:1.0.1e-27Tomáš Mráz 1.0.1e-26Tomáš Mráz 1.0.1e-25Tomáš Mráz 1.0.1e-24Tomáš Mráz 1.0.1e-23Tomáš Mráz 1.0.1e-22Tomáš Mráz 1.0.1e-21Tomáš Mráz 1.0.1e-20Tomas Mraz 1.0.1e-19Tomas Mraz 1.0.1e-18Tomas Mraz 1.0.1e-16Tomas Mraz 1.0.1e-15Tomas Mraz 1.0.1e-14Tomas Mraz 1.0.1e-13Tomas Mraz 1.0.1e-12Tomas Mraz 1.0.1e-11Tomas Mraz 1.0.1e-10Tomas Mraz 1.0.1e-9Tomáš Mráz 1.0.1e-8Tomáš Mráz 1.0.1e-7Tomáš Mráz 1.0.1e-6Tomas Mraz 1.0.1e-5Tomas Mraz 1.0.1e-4Tomas Mraz 1.0.1e-3Tomas Mraz 1.0.1e-2Tomas Mraz 1.0.1e-1Tomas Mraz 1.0.1c-12Tomas Mraz 1.0.1c-11Tomas Mraz 1.0.1c-10Tomas Mraz 1.0.1c-9Tomas Mraz 1.0.1c-8Tomas Mraz 1.0.1c-7Fedora Release Engineering - 1:1.0.1c-6Tomas Mraz 1.0.1c-5Tomas Mraz 1.0.1c-4Tomas Mraz 1.0.1c-3Tomas Mraz 1.0.1c-2Tomas Mraz 1.0.1c-1Tomas Mraz 1.0.1b-1Tomas Mraz 1.0.1a-1Tomas Mraz 1.0.1-3Tomas Mraz 1.0.1-2Tomas Mraz 1.0.1-1Tomas Mraz 1.0.1-0.3.beta3Tomas Mraz 1.0.1-0.2.beta3Tomas Mraz 1.0.1-0.1.beta2Tomas Mraz 1.0.0g-1Tomas Mraz 1.0.0f-1Tomas Mraz 1.0.0e-4Tomas Mraz 1.0.0e-3Tomas Mraz 1.0.0e-2Tomas Mraz 1.0.0e-1Tomas Mraz 1.0.0d-8Tomas Mraz 1.0.0d-7Tomas Mraz 1.0.0d-6Tomas Mraz 1.0.0d-5Tomas Mraz 1.0.0d-4Tomas Mraz 1.0.0d-3Tomas Mraz 1.0.0d-2Tomas Mraz 1.0.0d-1Fedora Release Engineering - 1.0.0c-4Tomas Mraz 1.0.0c-3Tomas Mraz 1.0.0c-2Tomas Mraz 1.0.0c-1Tomas Mraz 1.0.0b-3Tomas Mraz 1.0.0b-2Tomas Mraz 1.0.0b-1Tomas Mraz 1.0.0a-3Tomas Mraz 1.0.0a-2Tomas Mraz 1.0.0a-1Tomas Mraz 1.0.0-5Tomas Mraz 1.0.0-4Tomas Mraz 1.0.0-3Tomas Mraz 1.0.0-2Tomas Mraz 1.0.0-1Tomas Mraz 1.0.0-0.22.beta5Tomas Mraz 1.0.0-0.21.beta5Tomas Mraz 1.0.0-0.20.beta5Tomas Mraz 1.0.0-0.19.beta4Tomas Mraz 1.0.0-0.18.beta4Tomas Mraz 1.0.0-0.17.beta4Tomas Mraz 1.0.0-0.16.beta4Tomas Mraz 1.0.0-0.15.beta4Tomas Mraz 1.0.0-0.14.beta4Tomas Mraz 1.0.0-0.13.beta4Tomas Mraz 1.0.0-0.12.beta4Tomas Mraz 1.0.0-0.11.beta4Tomas Mraz 1.0.0-0.10.beta3Tomas Mraz 1.0.0-0.9.beta3Tomas Mraz 1.0.0-0.8.beta3Tomas Mraz 1.0.0-0.7.beta3Tomas Mraz 1.0.0-0.6.beta3Tomas Mraz 1.0.0-0.5.beta3Tomas Mraz 1.0.0-0.4.beta3Tomas Mraz 1.0.0-0.3.beta3Tomas Mraz 1.0.0-0.2.beta3Tomas Mraz 1.0.0-0.1.beta3Fedora Release Engineering - 0.9.8k-7Bill Nottingham Tomas Mraz 0.9.8k-6Tomas Mraz 0.9.8k-5Tomas Mraz 0.9.8k-4Tomas Mraz 0.9.8k-3Tomas Mraz 0.9.8k-2Tomas Mraz 0.9.8k-1Tomas Mraz 0.9.8j-10Tomas Mraz 0.9.8j-9Fedora Release Engineering - 0.9.8j-8Tomas Mraz 0.9.8j-7Tomas Mraz 0.9.8j-6Tomas Mraz 0.9.8j-5Tomas Mraz 0.9.8j-4Tomas Mraz 0.9.8j-3Tomas Mraz 0.9.8j-2Tomas Mraz 0.9.8j-1Tomas Mraz 0.9.8g-11Joe Orton 0.9.8g-10Tomas Mraz 0.9.8g-9Tomas Mraz 0.9.8g-8Tom "spot" Callaway 0.9.8g-7Joe Orton 0.9.8g-6Fedora Release Engineering - 0.9.8g-5Tomas Mraz 0.9.8g-4Tomas Mraz 0.9.8g-3Tomas Mraz 0.9.8g-2Tomas Mraz 0.9.8g-1Joe Orton 0.9.8b-17Tomas Mraz 0.9.8b-16Tomas Mraz 0.9.8b-15Tomas Mraz 0.9.8b-14Tomas Mraz 0.9.8b-13Tomas Mraz 0.9.8b-12Tomas Mraz 0.9.8b-11Tomas Mraz 0.9.8b-10Tomas Mraz 0.9.8b-9Tomas Mraz 0.9.8b-8Tomas Mraz 0.9.8b-7Tomas Mraz 0.9.8b-6Tomas Mraz - 0.9.8b-5Alexandre Oliva - 0.9.8b-4.1Tomas Mraz - 0.9.8b-4Tomas Mraz Jesse Keating - 0.9.8b-3.1Tomas Mraz - 0.9.8b-3Joe Orton Tomas Mraz - 0.9.8b-2Tomas Mraz - 0.9.8b-1Tomas Mraz - 0.9.8a-6Jesse Keating - 0.9.8a-5.2Jesse Keating - 0.9.8a-5.1Tomas Mraz 0.9.8a-5Jesse Keating Tomas Mraz 0.9.8a-4Tomas Mraz 0.9.8a-3Tomas Mraz 0.9.8a-2Tomas Mraz 0.9.8a-1Tomas Mraz 0.9.7f-11Tomas Mraz 0.9.7f-10Tomas Mraz 0.9.7f-9Phil Knirsch 0.9.7f-8Tomas Mraz 0.9.7f-7Tomas Mraz 0.9.7f-6Joe Orton 0.9.7f-5Tomas Mraz 0.9.7f-4Tomas Mraz 0.9.7f-3Tomas Mraz 0.9.7f-2Tomas Mraz 0.9.7f-1Tomas Mraz 0.9.7e-3Tomas Mraz 0.9.7e-2Tomas Mraz 0.9.7e-1Tomas Mraz Joe Orton 0.9.7a-46Phil Knirsch 0.9.7a-45Nalin Dahyabhai 0.9.7a-44Nalin Dahyabhai 0.9.7a-43Nalin Dahyabhai 0.9.7a-42Nalin Dahyabhai 0.9.7a-41Phil Knirsch 0.9.7a-40Elliot Lee Phil Knirsch 0.9.7a-38Nalin Dahyabhai 0.9.7a-37Nalin Dahyabhai 0.9.7a-36Joe Orton 0.9.7a-35Phil Knirsch Nalin Dahyabhai 0.9.7a-34Nalin Dahyabhai 0.9.7a-33Elliot Lee Phil Knirsch 0.9.7a-32Phil Knirsch 0.9.7a-31Elliot Lee Phil Knirsch 0.9.7a-29Phil Knirsch 0.9.7a-28Nalin Dahyabhai Joe Orton 0.9.7a-27Tim Waugh 0.9.7a-26Nalin Dahyabhai 0.9.7a-25Phil Knirsch 0.9.7a-24Nalin Dahyabhai 0.9.7a-22.1Nalin Dahyabhai 0.9.7a-22Nalin Dahyabhai 0.9.7a-23Joe Orton Nalin Dahyabhai 0.9.7a-22Nalin Dahyabhai 0.9.7a-21Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai 0.9.7a-20Nalin Dahyabhai Matt Wilson 0.9.7a-19Phil Knirsch 0.9.7a-18Nalin Dahyabhai 0.9.7a-17Nalin Dahyabhai 0.9.7a-10.9Nalin Dahyabhai 0.9.7a-16Nalin Dahyabhai 0.9.7a-15Nalin Dahyabhai 0.9.7a-14Nalin Dahyabhai 0.9.7a-13Phil Knirsch 0.9.7a-12Nalin Dahyabhai 0.9.7a-9.9Nalin Dahyabhai 0.9.7a-11Nalin Dahyabhai 0.9.7a-10Nalin Dahyabhai 0.9.7a-9Nalin Dahyabhai Nalin Dahyabhai Elliot Lee 0.9.7a-8Phil Knirsch 0.9.7a-7Nalin Dahyabhai 0.9.7a-6Nalin Dahyabhai 0.9.7a-5Nalin Dahyabhai 0.9.7a-4Nalin Dahyabhai 0.9.7a-3Nalin Dahyabhai 0.9.7a-2Nalin Dahyabhai 0.9.7a-1Nalin Dahyabhai 0.9.7-8Elliot Lee 0.9.7-7Nalin Dahyabhai 0.9.7-6Tim Powers Phil Knirsch 0.9.7-4Nalin Dahyabhai Bill Nottingham 0.9.7-3Nalin Dahyabhai 0.9.7-2Nalin Dahyabhai 0.9.7-1Nalin Dahyabhai 0.9.7-0Nalin Dahyabhai Nalin Dahyabhai 0.9.6b-30Elliot Lee 0.9.6b-29hammer.3Nalin Dahyabhai 0.9.6b-29Nalin Dahyabhai 0.9.6b-28Nalin Dahyabhai 0.9.6b-27Nalin Dahyabhai 0.9.6b-26Nalin Dahyabhai 0.9.6b-25Nalin Dahyabhai 0.9.6b-24Nalin Dahyabhai 0.9.6b-23Tim Powers Tim Powers Nalin Dahyabhai 0.9.6b-20Nalin Dahyabhai 0.9.6b-19Nalin Dahyabhai 0.9.6b-17, 0.9.6b-18Gary Benson stronghold-0.9.6c-2Gary Benson Nalin Dahyabhai 0.9.6b-15Nalin Dahyabhai 0.9.6b-13Florian La Roche 0.9.6b-11Gary Benson stronghold-0.9.6c-1Florian La Roche Nalin Dahyabhai 0.9.6b-9Nalin Dahyabhai Nalin Dahyabhai 0.9.6b-8Nalin Dahyabhai 0.9.6b-7Nalin Dahyabhai 0.9.6b-6Nalin Dahyabhai 0.9.6b-5Nalin Dahyabhai 0.9.6b-4Nalin Dahyabhai Nalin Dahyabhai 0.9.6b-3Nalin Dahyabhai 0.9.6b-2Nalin Dahyabhai Nalin Dahyabhai 0.9.6b-1Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Florian La Roche Nalin Dahyabhai Joe Orton stronghold-0.9.6a-1Joe Orton Joe Orton Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Florian La Roche Nalin Dahyabhai Nalin Dahyabhai Florian La Roche Than Ngo Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Bill Nottingham Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Nalin Dahyabhai Florian La Roche Florian La Roche Florian La Roche Bernhard Rosenkrdnzer Bernhard Rosenkrdnzer Bernhard Rosenkrdnzer - close the RSA decryption 9 lives of Bleichenbacher cat timing side channel (#1649568)- fix CVE-2018-0734 - DSA signature local timing side channel - fix CVE-2019-1559 - 0-byte record padding oracle - close the RSA decryption One & done EM side channel (#1619558)- use SHA-256 in FIPS RSA pairwise key check - fix CVE-2018-5407 (and CVE-2018-0735) - EC signature local timing side-channel key extraction- fix CVE-2018-0495 - ROHNP - Key Extraction Side Channel on DSA, ECDSA - fix incorrect error message on FIPS DSA parameter generation (#1603597)- ppc64le is not multilib architecture (#1585004)- add S390x assembler updates - make CA name list comparison function case sensitive (#1548401) - fix CVE-2017-3735 - possible one byte overread with X.509 IPAdressFamily - fix CVE-2018-0732 - large prime DH DoS of TLS client - fix CVE-2018-0737 - RSA key generation cache timing vulnerability - fix CVE-2018-0739 - stack overflow parsing recursive ASN.1 structure- fix CVE-2017-3737 - incorrect handling of fatal error state - fix CVE-2017-3738 - AVX2 Montgomery multiplication bug with 1024 bit modulus- fix deadlock in RNG in the FIPS mode in mariadb- fix CVE-2017-3736 - carry propagation bug in Montgomery multiplication- fix regression in openssl req -x509 command (#1450015)- handle incorrect size gracefully in aes_p8_cbc_encrypt()- allow long client hellos to be received by server- fix CPU features detection on new AMD processors- add support for additional STARTTLS protocols to s_client original backported patch by Robert Scheck (#1396209)- properly document the SSLv2 support removal- add PPC assembler updates- minor upstream release 1.0.2k fixing security issues- deprecate and disable verification of insecure hash algorithms - add support for /etc/pki/tls/legacy-settings also for minimum DH length accepted by SSL client - compare the encrypt and tweak key in XTS as required by FIPS- rebase to latest upstream release from the 1.0.2 branch, ABI compatible- fix CVE-2016-2177 - possible integer overflow - fix CVE-2016-2178 - non-constant time DSA operations - fix CVE-2016-2179 - further DoS issues in DTLS - fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio() - fix CVE-2016-2181 - DTLS1 replay protection and unprocessed records issue - fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec() - fix CVE-2016-6302 - insufficient TLS session ticket HMAC length check - fix CVE-2016-6304 - unbound memory growth with OCSP status request - fix CVE-2016-6306 - certificate message OOB reads - mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to 112 bit effective strength- replace expired testing certificates- fix CVE-2016-2105 - possible overflow in base64 encoding - fix CVE-2016-2106 - possible overflow in EVP_EncryptUpdate() - fix CVE-2016-2107 - padding oracle in stitched AES-NI CBC-MAC - fix CVE-2016-2108 - memory corruption in ASN.1 encoder - fix CVE-2016-2109 - possible DoS when reading ASN.1 data from BIO- fix 1-byte memory leak in pkcs12 parse (#1312112) - document some options of the speed command (#1312110) - fix high-precision timestamps in timestamping authority - enable SCTP support in DTLS - use correct digest when exporting keying material in TLS1.2 (#1289620) - fix CVE-2016-0799 - memory issues in BIO_printf - add support for setting Kerberos service and keytab in s_server and s_client- fix CVE-2016-0702 - side channel attack on modular exponentiation - fix CVE-2016-0705 - double-free in DSA private key parsing - fix CVE-2016-0797 - heap corruption in BN_hex2bn and BN_dec2bn- fix CVE-2015-3197 - SSLv2 ciphersuite enforcement - disable SSLv2 in the generic TLS method- fix CVE-2015-7575 - disallow use of MD5 in TLS1.2- fix CVE-2015-3194 - certificate verify crash with missing PSS parameter - fix CVE-2015-3195 - X509_ATTRIBUTE memory leak - fix CVE-2015-3196 - race condition when handling PSK identity hint- fix the CVE-2015-1791 fix (broken server side renegotiation)- improved fix for CVE-2015-1791 - add missing parts of CVE-2015-0209 fix for corectness although unexploitable- fix CVE-2014-8176 - invalid free in DTLS buffering code - fix CVE-2015-1789 - out-of-bounds read in X509_cmp_time - fix CVE-2015-1790 - PKCS7 crash with missing EncryptedContent - fix CVE-2015-1791 - race condition handling NewSessionTicket - fix CVE-2015-1792 - CMS verify infinite loop with unknown hash function- fix CVE-2015-3216 - regression in RAND locking that can cause segfaults on read in multithreaded applications- fix CVE-2015-4000 - prevent the logjam attack on client - restrict the DH key size to at least 768 bits (limit will be increased in future)- drop the AES-GCM restriction of 2^32 operations because the IV is always 96 bits (32 bit fixed field + 64 bit invocation field)- update fix for CVE-2015-0287 to what was released upstream- fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey() - fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison - fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption - fix CVE-2015-0288 - X509_to_X509_REQ NULL pointer dereference - fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data - fix CVE-2015-0292 - integer underflow in base64 decoder - fix CVE-2015-0293 - triggerable assert in SSLv2 server- fix broken error detection when unwrapping unpadded key- fix the RFC 5649 for key material that does not need padding- test in the non-FIPS RSA keygen for minimal distance of p and q similarly to the FIPS RSA keygen- fix CVE-2014-3570 - incorrect computation in BN_sqr() - fix CVE-2014-3571 - possible crash in dtls1_get_record() - fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state - fix CVE-2014-8275 - various certificate fingerprint issues - fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export ciphersuites and on server - fix CVE-2015-0205 - do not allow unauthenticated client DH certificate - fix CVE-2015-0206 - possible memory leak when buffering DTLS records- use FIPS approved method for computation of d in RSA - copy digest algorithm when handling SNI context switch- fix CVE-2014-3567 - memory leak when handling session tickets - fix CVE-2014-3513 - memory leak in srtp support - add support for fallback SCSV to partially mitigate CVE-2014-3566 (padding attack on SSL3)- do FIPS algorithm selftest before the integrity check- add support for RFC 5649 (#1119738) - do not pass the FIPS integrity check if the .hmac files are empty (#1128849) - add ECC TLS extensions to DTLS (#1119803) - do not send ECC ciphersuites in SSLv2 client hello (#1090955) - properly propagate encryption failure in BIO_f_cipher (#1072439) - fix CVE-2014-0224 fix that broke EAP-FAST session resumption support - improve documentation of ciphersuites - patch by Hubert Kario (#1108026) - use case insensitive comparison for servername in s_server (#1081163) - add support for automatic ECDH curve selection on server (#1080128) - FIPS mode: make the limitations on DSA, DH, and RSA keygen length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment variable is set- add support for ppc64le architecture - add Power 8 optimalizations- fix CVE-2014-3505 - doublefree in DTLS packet processing - fix CVE-2014-3506 - avoid memory exhaustion in DTLS - fix CVE-2014-3507 - avoid memory leak in DTLS - fix CVE-2014-3508 - fix OID handling to avoid information leak - fix CVE-2014-3509 - fix race condition when parsing server hello - fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS - fix CVE-2014-3511 - disallow protocol downgrade via fragmentation- fix CVE-2010-5298 - possible use of memory after free - fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment - fix CVE-2014-0198 - possible NULL pointer dereference - fix CVE-2014-0221 - DoS from invalid DTLS handshake packet - fix CVE-2014-0224 - SSL/TLS MITM vulnerability - fix CVE-2014-3470 - client-side DoS when using anonymous ECDH- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension- use the key length from configuration file if req -newkey rsa is invoked- avoid unnecessary reseeding in BN_rand in the FIPS mode- print ephemeral key size negotiated in TLS handshake (#1057715) - add DH_compute_key_padded needed for FIPS CAVS testing - make expiration and key length changeable by DAYS and KEYLEN variables in the certificate Makefile (#1058108) - change default hash to sha256 (#1062325) - lower the actual 3des strength so it is sorted behind aes128 (#1056616)- Mass rebuild 2014-01-24- rebuild with -O3 on ppc64 architecture- fix CVE-2013-4353 - Invalid TLS handshake crash - fix CVE-2013-6450 - possible MiTM attack on DTLS1- Mass rebuild 2013-12-27- fix CVE-2013-6449 - crash when version in SSL structure is incorrect - drop weak ciphers from the default TLS ciphersuite list - add back some symbols that were dropped with update to 1.0.1 branch - more FIPS validation requirement changes- fix locking and reseeding problems with FIPS drbg- additional changes required for FIPS validation - disable verification of certificate, CRL, and OCSP signatures using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable is not set- add back support for secp521r1 EC curve - add aarch64 to Configure (#969692)- do not advertise ECC curves we do not support (#1022493)- make DTLS1 work in FIPS mode - avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode - drop the -fips subpackage, installation of dracut-fips marks that the FIPS module is installed - avoid dlopening libssl.so from libcrypto - fix small memory leak in FIPS aes selftest - fix segfault in openssl speed hmac in the FIPS mode- document the nextprotoneg option in manual pages original patch by Hubert Kario - try to avoid some races when updating the -fips subpackage- use version-release in .hmac suffix to avoid overwrite during upgrade- always perform the FIPS selftests in library constructor if FIPS module is installed- add -fips subpackage that contains the FIPS module files- fix use of rdrand if available - more commits cherry picked from upstream - documentation fixes- additional manual page fix - use symbol versioning also for the textual version- additional manual page fixes - cleanup speed command output for ECDH ECDSA- use _prefix macro- add openssl.cnf.5 manpage symlink to config.5- add relro linking flag- add support for the -trusted_first option for certificate chain verification- disable GOST engine- add symbol version for ECC functions- update the FIPS selftests to use 256 bit curves- enabled NIST Suite B ECC curves and algorithms- fix random bad record mac errors (#918981)- fix up the SHLIB_VERSION_NUMBER- disable ZLIB loading by default (due to CRIME attack)- new upstream version- more fixes from upstream - fix errors in manual causing build failure (#904777)- add script for renewal of a self-signed cert by Philip Prindeville (#871566) - allow X509_issuer_and_serial_hash() produce correct result in the FIPS mode (#881336)- do not load default verify paths if CApath or CAfile specified (#884305)- more fixes from upstream CVS - fix DSA key pairwise check (#878597)- use 1024 bit DH parameters in s_server as 512 bit is not allowed in FIPS mode and it is quite weak anyway- add missing initialization of str in aes_ccm_init_key (#853963) - add important patches from upstream CVS - use the secure_getenv() with new glibc- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- use __getenv_secure() instead of __libc_enable_secure- do not move libcrypto to /lib - do not use environment variables if __libc_enable_secure is on - fix strict aliasing problems in modes- fix DSA key generation in FIPS mode (#833866) - allow duplicate FIPS_mode_set(1) - enable build on ppc64 subarch (#834652)- fix s_server with new glibc when no global IPv6 address (#839031) - make it build with new Perl- new upstream version- new upstream version- new upstream version fixing CVE-2012-2110- add Kerberos 5 libraries to pkgconfig for static linking (#807050)- backports from upstream CVS - fix segfault when /dev/urandom is not available (#809586)- new upstream release- add obsoletes to assist multilib updates (#799636)- epoch bumped to 1 due to revert to 1.0.0g on Fedora 17 - new upstream release from the 1.0.1 branch - fix s390x build (#798411) - versioning for the SSLeay symbol (#794950) - add -DPURIFY to build flags (#797323) - filter engine provides - split the libraries to a separate -libs package - add make to requires on the base package (#783446)- new upstream release from the 1.0.1 branch, ABI compatible - add documentation for the -no_ign_eof option- new upstream release fixing CVE-2012-0050 - DoS regression in DTLS support introduced by the previous release (#782795)- new upstream release fixing multiple CVEs- move the libraries needed for static linking to Libs.private- do not use AVX instructions when osxsave bit not set - add direct known answer tests for SHA2 algorithms- fix missing initialization of variable in CHIL engine- new upstream release fixing CVE-2011-3207 (#736088)- drop the separate engine for Intel acceleration improvements and merge in the AES-NI, SHA1, and RC4 optimizations - add support for OPENSSL_DISABLE_AES_NI environment variable that disables the AES-NI support- correct openssl cms help output (#636266) - more tolerant starttls detection in XMPP protocol (#608239)- add support for newest Intel acceleration improvements backported from upstream by Intel in form of a separate engine- allow the AES-NI engine in the FIPS mode- add API necessary for CAVS testing of the new DSA parameter generation- add support for VIA Padlock on 64bit arch from upstream (#617539) - do not return bogus values from load_certs (#652286)- clarify apps help texts for available digest algorithms (#693858)- new upstream release fixing CVE-2011-0014 (OCSP stapling vulnerability)- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- add -x931 parameter to openssl genrsa command to use the ANSI X9.31 key generation method - use FIPS-186-3 method for DSA parameter generation - add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable to allow using MD5 when the system is in the maintenance state even if the /proc fips flag is on - make openssl pkcs12 command work by default in the FIPS mode- listen on ipv6 wildcard in s_server so we accept connections from both ipv4 and ipv6 (#601612) - fix openssl speed command so it can be used in the FIPS mode with FIPS allowed ciphers- new upstream version fixing CVE-2010-4180- replace the revert for the s390x bignum asm routines with fix from upstream- revert upstream change in s390x bignum asm routines- new upstream version fixing CVE-2010-3864 (#649304)- make SHLIB_VERSION reflect the library suffix- openssl man page fix (#609484)- new upstream patch release, fixes CVE-2010-0742 (#598738) and CVE-2010-1633 (#598732)- pkgconfig files now contain the correct libdir (#593723)- make CA dir readable - the private keys are in private subdir (#584810)- a few fixes from upstream CVS - move libcrypto to /lib (#559953)- set UTC timezone on pod2man run (#578842) - make X509_NAME_hash_old work in FIPS mode- update to final 1.0.0 upstream release- make TLS work in the FIPS mode- gracefully handle zero length in assembler implementations of OPENSSL_cleanse (#564029) - do not fail in s_server if client hostname not resolvable (#561260)- new upstream release- fix CVE-2009-4355 - leak in applications incorrectly calling CRYPTO_free_all_ex_data() before application exit (#546707) - upstream fix for future TLS protocol version handling- add support for Intel AES-NI- upstream fix compression handling on session resumption - various null checks and other small fixes from upstream - upstream changes for the renegotiation info according to the latest draft- fix non-fips mingw build (patch by Kalev Lember) - add IPV6 fix for DTLS- add better error reporting for the unsafe renegotiation- fix build on s390x- disable enforcement of the renegotiation extension on the client (#537962) - add fixes from the current upstream snapshot- keep the beta status in version number at 3 so we do not have to rebuild openssh and possibly other dependencies with too strict version check- update to new upstream version, no soname bump needed - fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used so the compatibility with unfixed clients is not broken. The protocol extension is also not final.- fix use of freed memory if SSL_CTX_free() is called before SSL_free() (#521342)- fix typo in DTLS1 code (#527015) - fix leak in error handling of d2i_SSL_SESSION()- fix RSA and DSA FIPS selftests - reenable fixed x86_64 camellia assembler code (#521127)- temporarily disable x86_64 camellia assembler code (#521127)- fix openssl dgst -dss1 (#520152)- drop the compat symlink hacks- constify SSL_CIPHER_description()- fix WWW:Curl:Easy reference in tsget- enable MD-2- update to new major upstream release- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- do not build special 'optimized' versions for i686, as that's the base arch in Fedora now- abort if selftests failed and random number generator is polled - mention EVP_aes and EVP_sha2xx routines in the manpages - add README.FIPS - make CA dir absolute path (#445344) - change default length for RSA key generation to 2048 (#484101)- fix CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 (DTLS DoS problems) (#501253, #501254, #501572)- support compatibility DTLS mode for CISCO AnyConnect (#464629)- correct the SHLIB_VERSION define- add support for multiple CRLs with same subject - load only dynamic engine support in FIPS mode- update to new upstream release (minor bug fixes, security fixes and machine code optimizations only)- move libraries to /usr/lib (#239375)- add a static subpackage- Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild- must also verify checksum of libssl.so in the FIPS mode - obtain the seed for FIPS rng directly from the kernel device - drop the temporary symlinks- drop the temporary triggerpostun and symlinking in post - fix the pkgconfig files and drop the unnecessary buildrequires on pkgconfig as it is a rpmbuild dependency (#481419)- add temporary triggerpostun to reinstate the symlinks- no pairwise key tests in non-fips mode (#479817)- even more robust test for the temporary symlinks- try to ensure the temporary symlinks exist- new upstream version with necessary soname bump (#455753) - temporarily provide symlink to old soname to make it possible to rebuild the dependent packages in rawhide - add eap-fast support (#428181) - add possibility to disable zlib by setting - add fips mode support for testing purposes - do not null dereference on some invalid smime files - add buildrequires pkgconfig (#479493)- do not add tls extensions to server hello for SSLv3 either- move root CA bundle to ca-certificates package- fix CVE-2008-0891 - server name extension crash (#448492) - fix CVE-2008-1672 - server key exchange message omit crash (#448495)- super-H arch support - drop workaround for bug 199604 as it should be fixed in gcc-4.3- sparc handling- update to new root CA bundle from mozilla.org (r1.45)- Autorebuild for GCC 4.3- merge review fixes (#226220) - adjust the SHLIB_VERSION_NUMBER to reflect library name (#429846)- set default paths when no explicit paths are set (#418771) - do not add tls extensions to client hello for SSLv3 (#422081)- enable some new crypto algorithms and features - add some more important bug fixes from openssl CVS- update to latest upstream release, SONAME bumped to 7- update to new CA bundle from mozilla.org- fix CVE-2007-5135 - off-by-one in SSL_get_shared_ciphers (#309801) - fix CVE-2007-4995 - out of order DTLS fragments buffer overflow (#321191) - add alpha sub-archs (#296031)- rebuild- use localhost in testsuite, hopefully fixes slow build in koji - CVE-2007-3108 - fix side channel attack on private keys (#250577) - make ssl session cache id matching strict (#233599)- allow building on ARM architectures (#245417) - use reference timestamps to prevent multilib conflicts (#218064) - -devel package must require pkgconfig (#241031)- detect duplicates in add_dir properly (#206346)- the previous change still didn't make X509_NAME_cmp transitive- make X509_NAME_cmp transitive otherwise certificate lookup is broken (#216050)- aliasing bug in engine loading, patch by IBM (#213216)- CVE-2006-2940 fix was incorrect (#208744)- fix CVE-2006-2937 - mishandled error on ASN.1 parsing (#207276) - fix CVE-2006-2940 - parasitic public keys DoS (#207274) - fix CVE-2006-3738 - buffer overflow in SSL_get_shared_ciphers (#206940) - fix CVE-2006-4343 - sslv2 client DoS (#206940)- fix CVE-2006-4339 - prevent attack on PKCS#1 v1.5 signatures (#205180)- set buffering to none on stdio/stdout FILE when bufsize is set (#200580) patch by IBM- rebuild with new binutils (#200330)- add a temporary workaround for sha512 test failure on s390 (#199604)- add ipv6 support to s_client and s_server (by Jan Pazdziora) (#198737) - add patches for BN threadsafety, AES cache collision attack hazard fix and pkcs7 code memleak fix from upstream CVS- rebuild- dropped libica and ica engine from build- update to new CA bundle from mozilla.org; adds CA certificates from netlock.hu and startcom.org- fixed a few rpmlint warnings - better fix for #173399 from upstream - upstream fix for pkcs12- upgrade to new version, stays ABI compatible - there is no more linux/config.h (it was empty anyway)- fix stale open handles in libica (#177155) - fix build if 'rand' or 'passwd' in buildroot path (#178782) - initialize VIA Padlock engine (#186857)- bump again for double-long bug on ppc(64)- rebuilt for new gcc4.1 snapshot and glibc changes- don't include SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG in SSL_OP_ALL (#175779)- rebuilt- fix build (-lcrypto was erroneusly dropped) of the updated libica - updated ICA engine to 1.3.6-rc3- disable builtin compression methods for now until they work properly (#173399)- don't set -rpath for openssl binary- new upstream version - patches partially renumbered- updated IBM ICA engine library and patch to latest upstream version- fix CAN-2005-2969 - remove SSL_OP_MSIE_SSLV2_RSA_PADDING which disables the countermeasure against man in the middle attack in SSLv2 (#169863) - use sha1 as default for CA and cert requests - CAN-2005-2946 (#169803)- add *.so.soversion as symlinks in /lib (#165264) - remove unpackaged symlinks (#159595) - fixes from upstream (constant time fixes for DSA, bn assembler div on ppc arch, initialize memory on realloc)- Updated ICA engine IBM patch to latest upstream version.- fix CAN-2005-0109 - use constant time/memory access mod_exp so bits of private key aren't leaked by cache eviction (#157631) - a few more fixes from upstream 0.9.7g- use poll instead of select in rand (#128285) - fix Makefile.certificate to point to /etc/pki/tls - change the default string mask in ASN1 to PrintableString+UTF8String- update to revision 1.37 of Mozilla CA bundle- move certificates to _sysconfdir/pki/tls (#143392) - move CA directories to _sysconfdir/pki/CA - patch the CA script and the default config so it points to the CA directories- uninitialized variable mustn't be used as input in inline assembly - reenable the x86_64 assembly again- add back RC4_CHAR on ia64 and x86_64 so the ABI isn't broken - disable broken bignum assembly on x86_64- reenable optimizations on ppc64 and assembly code on ia64 - upgrade to new upstream version (no soname bump needed) - disable thread test - it was testing the backport of the RSA blinding - no longer needed - added support for changing serial number to Makefile.certificate (#151188) - make ca-bundle.crt a config file (#118903)- libcrypto shouldn't depend on libkrb5 (#135961)- rebuild- new upstream source, updated patches - added patch so we are hopefully ABI compatible with upcoming 0.9.7f- Support UTF-8 charset in the Makefile.certificate (#134944) - Added cmp to BuildPrereq- generate new ca-bundle.crt from Mozilla certdata.txt (revision 1.32)- Fixed and updated libica-1.3.4-urandom.patch patch (#122967)- rebuild- rebuild- rebuild- remove der_chop, as upstream cvs has done (CAN-2004-0975, #140040)- Include latest libica version with important bugfixes- rebuilt- Updated ICA engine IBM patch to latest upstream version.- build for linux-alpha-gcc instead of alpha-gcc on alpha (Jeff Garzik)- handle %{_arch}=i486/i586/i686/athlon cases in the intermediate header (#124303)- add security fixes for CAN-2004-0079, CAN-2004-0112- Fixed libica filespec.- ppc/ppc64 define __powerpc__/__powerpc64__, not __ppc__/__ppc64__, fix the intermediate header- add an intermediate which points to the right arch-specific opensslconf.h on multilib arches- rebuilt- Updated libica to latest upstream version 1.3.5.- Update ICA crypto engine patch from IBM to latest version.- rebuilt- rebuilt- Fixed libica build.- add "-ldl" to link flags added for Linux-on-ARM (#99313)- updated ca-bundle.crt: removed expired GeoTrust roots, added freessl.com root, removed trustcenter.de Class 0 root- Fix link line for libssl (bug #111154).- add dependency on zlib-devel for the -devel package, which depends on zlib symbols because we enable zlib for libssl (#102962)- Use /dev/urandom instead of PRNG for libica. - Apply libica-1.3.5 fix for /dev/urandom in icalinux.c - Use latest ICA engine patch from IBM.- rebuild- rebuild (22 wasn't actually built, fun eh?)- re-disable optimizations on ppc64- add a_mbstr.c fix for 64-bit platforms from CVS- add -Wa,--noexecstack to RPM_OPT_FLAGS so that assembled modules get tagged as not needing executable stacks- rebuild- re-enable optimizations on ppc64- remove exclusivearch- only parse a client cert if one was requested - temporarily exclusivearch for %{ix86}- add security fixes for protocol parsing bugs (CAN-2003-0543, CAN-2003-0544) and heap corruption (CAN-2003-0545) - update RHNS-CA-CERT files - ease back on the number of threads used in the threading test- rebuild to fix gzipped file md5sums (#91211)- Updated libica to version 1.3.4.- rebuild- free the kssl_ctx structure when we free an SSL structure (#99066)- rebuild- lower thread test count on s390x- rebuild- disable assembly on arches where it seems to conflict with threading- Updated libica to latest upstream version 1.3.0- rebuild- rebuild- ubsec: don't stomp on output data which might also be input data- temporarily disable optimizations on ppc64- backport fix for engine-used-for-everything from 0.9.7b - backport fix for prng not being seeded causing problems, also from 0.9.7b - add a check at build-time to ensure that RSA is thread-safe - keep perlpath from stomping on the libica configure scripts- thread-safety fix for RSA blinding- rebuilt- Added libica-1.2 to openssl (featurerequest).- fix building with incorrect flags on ppc64- add patch to harden against Klima-Pokorny-Rosa extension of Bleichenbacher's attack (CAN-2003-0131)- add patch to enable RSA blinding by default, closing a timing attack (CAN-2003-0147)- disable use of BN assembly module on x86_64, but continue to allow inline assembly (#83403)- disable EC algorithms- update to 0.9.7a- add fix to guard against attempts to allocate negative amounts of memory - add patch for CAN-2003-0078, fixing a timing attack- Add openssl-ppc64.patch- EVP_DecryptInit should call EVP_CipherInit() instead of EVP_CipherInit_ex(), to get the right behavior when passed uninitialized context structures (#83766) - build with -mcpu=ev5 on alpha family (#83828)- rebuilt- Added IBM hw crypto support patch.- add missing builddep on sed- debloat - fix broken manpage symlinks- fix double-free in 'openssl ca'- update to 0.9.7 final- update to 0.9.7 beta6 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)- update to 0.9.7 beta5 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)- add configuration stanza for x86_64 and use it on x86_64 - build for linux-ppc on ppc - start running the self-tests again- Merge fixes from previous hammer packages, including general x86-64 and multilib- rebuild- update asn patch to fix accidental reversal of a logic check- update asn patch to reduce chance that compiler optimization will remove one of the added tests- rebuild- add patch to fix ASN.1 vulnerabilities- add backport of Ben Laurie's patches for OpenSSL 0.9.6d- own {_datadir}/ssl/misc- automated rebuild- automated rebuild- free ride through the build system (whee!)- rebuild in new environment- merge RHL-specific bits into stronghold package, rename- add support for Chrysalis Luna token- disable AEP random number generation, other AEP fixes- only build subpackages on primary arches- on ia32, only disable use of assembler on i386 - enable assembly on ia64- fix sparcv9 entry- upgrade to 0.9.6c - bump BuildArch to i686 and enable assembler on all platforms - synchronise with shrimpy and rawhide - bump soversion to 3- delete BN_LLONG for s390x, patch from Oliver Paukstadt- update AEP driver patch- adjust RNG disabling patch to match version of patch from Broadcom- disable the RNG in the ubsec engine driver- tweaks to the ubsec engine driver- tweaks to the ubsec engine driver- update ubsec engine driver from Broadcom- move man pages back to %{_mandir}/man?/foo.?ssl from %{_mandir}/man?ssl/foo.? - add an [ engine ] section to the default configuration file- add a patch for selecting a default engine in SSL_library_init()- add patches for AEP hardware support - add patch to keep trying when we fail to load a cert from a file and there are more in the file - add missing prototype for ENGINE_ubsec() in engine_int.h- actually add hw_ubsec to the engine list- add in the hw_ubsec driver from CVS- update to 0.9.6b- move .so symlinks back to %{_libdir}- move shared libraries to /lib (#38410)- switch to engine code base- add a script for creating dummy certificates - move man pages from %{_mandir}/man?/foo.?ssl to %{_mandir}/man?ssl/foo.?- add s390x support- change two memcpy() calls to memmove() - don't define L_ENDIAN on alpha- Add 'stronghold-' prefix to package names. - Obsolete standard openssl packages.- Add BuildArch: i586 as per Nalin's advice.- Enable assembler on ix86 (using new .tar.bz2 which does include the asm directories).- make subpackages depend on the main package- adjust the hobble script to not disturb symlinks in include/ (fix from Joe Orton)- drop the m2crypo patch we weren't using- configure using "shared" as well- update to 0.9.6a - use the build-shared target to build shared libraries - bump the soversion to 2 because we're no longer compatible with our 0.9.5a packages or our 0.9.6 packages - drop the patch for making rsatest a no-op when rsa null support is used - put all man pages into
ssl instead of
- break the m2crypto modules into a separate package- use BN_LLONG on s390- fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit)- move c_rehash to the perl subpackage, because it's a perl script now- update to 0.9.6 - enable MD2 - use the libcrypto.so and libssl.so targets to build shared libs with - bump the soversion to 1 because we're no longer compatible with any of the various 0.9.5a packages circulating around, which provide lib*.so.0- change hobble-openssl for disabling MD2 again- re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152 bytes or so, causing EVP_DigestInit() to zero out stack variables in apps built against a version of the library without it- disable some inline assembly, which on x86 is Pentium-specific - re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all)- fix s390 patch- added support s390- remove -Wa,* and -m* compiler flags from the default Configure file (#20656) - add the CA.pl man page to the perl subpackage- always build with -mcpu=ev5 on alpha- add a symlink from cert.pem to ca-bundle.crt- add a ca-bundle file for packages like Samba to reference for CA certificates- remove libcrypto's crypt(), which doesn't handle md5crypt (#19295)- add unzip as a buildprereq (#17662) - update m2crypto to 0.05-snap4- fix some issues in building when it's not installed- make sure the headers we include are the ones we built with (aaaaarrgh!)- add Richard Henderson's patch for BN on ia64 - clean up the changelog- fix the building of python modules without openssl-devel already installed- byte-compile python extensions without the build-root - adjust the makefile to not remove temporary files (like .key files when building .csr files) by marking them as .PRECIOUS- break out python extensions into a subpackage- tweak the makefile some more- disable MD2 support- disable MDC2 support- tweak the disabling of RC5, IDEA support - tweak the makefile- strip binaries and libraries - rework certificate makefile to have the right parts for Apache- use %{_perl} instead of /usr/bin/perl - disable alpha until it passes its own test suite- move the passwd.1 man page out of the passwd package's way- update to 0.9.5a, modified for U.S. - add perl as a build-time requirement - move certificate makefile to another package - disable RC5, IDEA, RSA support - remove optimizations for now- Bero told me to move the Makefile into this package- add lib*.so symlinks to link dynamically against shared libs- update to 0.9.5 - run ldconfig directly in post/postun - add FAQ- Fix build on non-x86 platforms- move /usr/share/ssl/* from -devel to main package- inital packaging - changes from base: - Move /usr/local/ssl to /usr/share/ssl for FHS compliance - handle RPM_OPT_FLAGS1:1.0.2k-19.el71:1.0.2k-19.el7CA.pltsgetc_rehashCA.pl.1ssl.gzc_rehash.1ssl.gztsget.1ssl.gz/etc/pki/tls/misc//usr/bin//usr/share/man/man1/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=genericcpioxz2x86_64-redhat-linux-gnuPerl script, ASCII text executabletroff or preprocessor input, ASCII text (gzip compressed data, from Unix, max compression)RRRRRRRRR?p7zXZ !#,skD] b2u y-iSqt!E93 \PRbI*CJ]gt-!H' N2Ҿ }iHהGRHƒ ċGFsH$BY&q@`9TNw=~$W !+MᎱѯ%E3Q)jX*ˋm 'y{b:3g`jv.#B>[(ڌ eofߔsVc1іh$;V JN=tƜ$u+C~ؙ6]Z" V+`73|ZfU;A5l}W%<\s{Jz]^t)8vƌ҇jo+Vx;G&JO?_=b`6ohU[͘E7U xB~\p2 =Tټ 5340urM"/x' 0e#45sj],o~ɏS&!՝< -`r8+R^+uQFFQ`Sw}CJ RgBTOCvn(_?<~3Ђ<եab\d)x! l6R#qڎ^SӘx$Q^%{rʓTmAeU*4_t`frqE]6E;"A#$<(".{㮤.ZOb<61b%QkSC֩b#k^w\}Lz!ˈ!?zl89٫Pmw4? RL=pGKĝ1oEYam,Cu]^m'r&kR&d7C2w1%<ҁ*7Kdƻh);5Gɗ8O.l}z.A'Wll?xZ62:b'+~_NQ= :{sӦ^ vfռ.B&e}R/1ZJ%]8]j+Q8H/?iq @FB5T)¶Gr(z[%Mv `6)%&.I_ZS4S,<zcpQu !0lR 屳#o$cs qyzN 7沇YIwWTGN#@lH?p) J!$MUqKsJ҆#i<ԗ'ys$)YI; LWBNCwHV>Y"8szϘ`ی+=I c=12ASBk(>',#e1$"&rA/=c$uOr_i )HPeSNxhkl_Q7C|~-4y,jYhRL}`Ge*N7OUmZFcخ:"<' ϐ1~ְDD6&6Ry+ <&N4/N]&p{5kЩ,NOrvB=Tw8]η =LzvC=aayJ<бW9-5.9(~EZ.<%Pe*].tOס:?4Uߝewyk `C~'-ŧ:x)S2{9*)Z5&^y1gEǝ88ㅡ* 16_HqFzPa\sj7BLĺ ”>meO `%Lk\%3VE=KL3xHQrwsĦS}цaVBHdbR,jӴMd> Ȥ25`X!;W:?D'X$l0~vcۣ^A<$:P@'g˄نbPRS:`t4ݱC >=-H=:6@B61bg"C)!@B}5nwrզߤ %qU zö[@aak.£|F \+mVEFm vөg)&GhxQd<ߠCߣ%b:J4a<`T `4:䊨J?X/S;0Sp5 %7h7[Q}Y++^=-cc;'W' li1s(sNɰR^B`v,Y Y@ EFzeR9pYtұ=A3dtKS;+2.KJ3PtMWؾGݘCᒼ3Ů[ѩX&'kQW-3gd@XK ӎ9H.t"C2Χo] &VXV=8T4s3fOjQ25XB:[:TxSGvZp谏 蠀/#or3!g (Vm/ic+YB%*L2. r&_s3=@ jjUt@7d:>zJ6Ƭ:=Lϊm+Яh3fA9 N+ɾ,9P(}^Ѕe[Ma?^+fɣW:CD}Na@/ɶf2RC+sXZI>89kJ2*Kš'um?Vr]Z wHCg§no ,t:; tI)14:bB5*7{&IkLqatݓW(VZIh{M9MJdޠT}".f\hX4K1)L;zN5r媚6&o6l醶ev*~69x{)B x#鑭McEM+L>e{-\ O|?xz rg1/!h)~a1=tP;?-qiYrë98# |νԔy!'&Y}0kVJ׆QdWN<7Z ȱ1[80RU,$,@Sp7 }lk'Hk 6Zq&uj }~r"?͂4󒯠[Rt//q0 d7h&<']C(݅Ejp14}"uT4ls|MR.$Pځ{G  J%L!$G`UǢtDTL\<)R*F |Ӂfƽ4Hi_Nuد-M:ԖrNy;-6 CaӃ2Mt/Աl0${^.fLϵbz(ê4>0VfK&ꑦܻ+B)W!h5gk9XRz,W:;|׷@Oa@^̰_C)fkp 1pDP0i`أr05W?7v DwH߁P} s g 1-}3%qրo'?2Z-.ې@x`CvthI+du;‹16C2SJo+&'"3 qA}b= ]T0W$[qOڇ!>(ijQۓ"ME_`c Dq3dgo2,4&ЏTIQyL?/dܺFƳr[iWcBB^b4"ꕁ_ \0VEѶi}Nʽn !v7?>NOu= L'rO;lJ5Kf[lޜ@ I^OPq!h'kƩ9qj1kfN18j-j؝抩; ,u7mFǛ*qu*evM…/1rQZ(.˵4n ^|(fpd1ELB Cx8W@!ok ,2`!d"i0GvNW4Ma>ڧٹv%)"՘P6UD,u28ib82ޓe0Wz %-9K:J S@+ 'C&I> mr7KC5<Ĥ1c-9E3.V68(gE-,hqw,p&s4;N}H JI" `:r<ƁS02TY&s{ qw.t\>ڍ&^6$k̹NDw8[?+$v(׾ǎhYe̲\ѮY#&&5SN%'q<: gA-.Ųvp:H}/Unl;R4M8*]~ T!?ƘnK:lw s18I0pLEQ >z6Ci2h #{_~N0-2&rۗb/xE,"=~ݸ*/$C؅ T:q&/,_ĝX {d<Ւ?.GnD5D|}ok0SLW2>[,=o:7/uPB` fC sNdH-@m.sp?~-'sJk奿ye gf&Jos(|(sޱ"אָN=T2+#Ҡ5``ߎyz4?WCq[ՠ'L۪ۛ(~lQ2- .7!ޑ/ws#Sw`%KU[wPff<~~[ gj PTfϮY w0byxfZyY}"^A~u[|\qk㍷ZT1S'HŴ =˖YêOO%oT=Tlv"3=Hx£)'([[gT9O `Q[p_l!N7a;#sGOV,*k~;yr7Re_  ~٤<2s`{7w Q:1o<`>Q|%\QT.곃^o` 49ahnLkGnnUOwvsJؗ0y <$8VOV>Ӭ ]wp5IJ*$U1sLAѵw%\nqs夤+ W+[/~¦pKeMegl B-CZdA=[utJ3;U=)a$1рw N+q@ҽ빦II/R!:Jpb5*哦F15@n'p۳/=^5{gΌ`w˧6*xkS/qѪǂAxHkk]D>_d 'jlSCVW TjCjF^&&T0\*GĝX3"~8ˇ$#yH@-K!RlQSLoh@9nxi!z'Z ;FRML&y9 0)MZ֪8$SH&oEܚE5\\"I:k -8d}3eD't!Cԋ٣/%23o?_щ7gM 3Xz! (ocA{'4z( h'ƧpXbkX [)Wᚴ/zؔFު 7tͿ v'R!Ѫ_M9ڋ;z:їmr^-KGW Xu CmRAT=j/;Dۛuҡ" 54H<2!c m&LEYs P]oIbݷA;"cyD*~3D\,\?# 8rbtMvM ~˲HF)\!fv}?5'GhN!YcGY,(>_Zw ˘gzǕD:4=F?%+:K<`uMkӒބ=׻lWuCER$t)_`$&qAgϚYpE_-eDBS]S Y&$!Lˆ.vI_-"AHbn 7mt.7ѬuۻEǍñT{M;l6^a UW޴J9l^&VBNbb,t3On#Ip[ΔYCeW>dܲ?[8v=_}j< R}•Ed  k8{*}]XA ,' m YUuYu[4ɍ3^s{Gi7i3,du+X +hA`ѝha>Rbq # ai^3"H Ďn.ݷ6W|X)}2PD ( sBAJ("́'T\R**R-:$[r7?J}|* '-okL fB:FS+^:A?09p`m4k%CX%D9j|[1X 8^~lm9F`D!=2{wx;oUVgP.kIy hWJL/wFY@~EɷS2m"pmkدf/`Ԕ&GlpdlJF~TƇUKJ)œ, o dElk*ѩ.~3Xϓ2ezp1]60³p@D>Zҭɐ1rlcO2Hc K^ BI둵U)׋;ӺSIu`xS$f9w -n)<7|A:MIǐ,:q`Jf1z:jًl 战yG@"up>5#:))'_/ Agqz%;XeY KLrJ`O|:4$ꓪ@c][o~IHǰT'¶CloאEHkNصj%NK/"zEsi X*z%|WD22zP*u7DL/AYj'E?Q^MnP2Ÿp:A3 A697/ "J=FS-7:rNS2 s v{T.0RJ5A8SN}Ʊ.TS-Čw4M=6ЁGxH QTl<ʌӧxxYs TAHoe[!/KbKLR9!+= fGd+ 3I"ubbW8Ll #㑹6@9Kbr Į_CoAq=0RYyKn})TS:Qf>Da +W:f|Gҕ/_%Moaʮ IP`:ۓU6̂L~{6VQտ Q/@`::WeslP Jh(6kj8ր_PdFf_u+׼\u>f1mkJ_ɽ2 V\=k; `5cqݯE(N=테/\.nQbpIp` g\z6aݜfl_wmF&#vlfw!õq$:-Q2/h8 k_*tI=4riO .2gU8FΑR+)ܙ=ڪϑ˚X|"m̸3 K|f1$Vދpi 9?Y\n룑R@Oۤє9D3.pc[KDZImd % +=5VھMr"JpZ4y^A(,( ozq({a.[-p91Zz pqLyw(O{5Y3|+F.BI8|b<=MI,,2mͬŶ{tDpʦjIjʱo"v8&mq7_m)t.#m_l$ ?oR[ γ׋ߺo Q';? _,5`WbkywN}R?jd4T[[<"SUxάi`; 3 '1e3G,ZQl⒐d75B$^X٣"α|,K.D00߯e!07񒈀}"jcdU[b,N;鑞0k2bY oVX',$%JMM_JexyyHwJ_ʆ 1JGmWdBgxHpe*du[)k~7w*+ а9:qYʍT^q-0[{9_X֙AiHVߠf7оH[MOuSYzm[90Us@::_PI QK&01]$~O*p;svC5vL> v{߉\ 5,RشpY[C(jVt=-d(_z$-ԃg C@'1W.?Cf6/40ܥ]!h),3dWv ~v$'sastOpLhY:hC2&\d,ZR LptFy剹ceoFZCA(]HoqR\ ^kUGKf,X{^fKpU}ulNZ.HtAHN}ǭ=&5^8 9LyPM=|&ԄJ$N'?>NpDR:LP80^4:$. d$V'tZXMT[1)K埉ah"AyA pt Yo42>BCs٥5Vzi$2XXKW\ncb绥@؈]Xёd?)08Kq|lM M `l J"a'B0ڰJZHLDR -m.Ő >q3AǿUxk/ܡ\¼F5ZzF C":[9L$ӶXߛfN.)Sg[U {Rz9{n/?u@X`$;]NRY]콾WB q|7e:[T#X?]lTْDsxk-@RH9tAǶ} ɉ#MGvtp`R1]@mC-)jS@I5IM}b.L;:y?(-723 8Uw?b;ACX;|`?Rk}F\znzv/'²ϩ<-!>jS7~&1:Kݟ`<wHmVtJ;輅 1YLG_i69 //Eө>ю^Y3mCgFfsXyx$,mQauo5Cڃ`UH< ]+'Ga*`t`Ps9[9&h1o_#";'U}Xw}7~IwhUKdsϋmE踒p_H-`E0Rΰ9_'(X}Jي{uhJqf+hӪEcPVޅ:sҎ7'%y v7:YV ư :]ݮȌaH(Z"&7Y_#q|ٝ9t+W՚&yfXoA(t 8Ŋ! g;޵iK:^@kے:+GZF0]Rk" K/-HH-dG^g8V5#Q+咷󫗥[WžCޓsFP)M*OXŪ0O_dA% =RY/,aE؎G^GVwL3FDPgsSw+פ뵹:KbX<|$P;R;z KV ~h>֫dؤNq?Q&[r6r%_RƄc~uy& uj ^&$H7eSc8-}TOj/Cu Ii>Gꝧ?F콌S_QS ֈj:g<<=.ҌL4 VFcq0"JH#[s@<^-Ta5a9 ?(+/." $(_(ΉiQZP'Pc80KPљvp('`e-KqCCM.YO'DE|/oŒ[JuΕHh 1P6>*IskX#/k.S}$``[ڈzIҾ(PEͮ*2lTUWKޭ$!MyS(T$8'`j%2)=Vt+ _څI'Qq_B$țօVfdza[_F9Nu:9h .Q1ǭkLji *k>}0zF2l29G'e\H6HN{iR>ggCw OjQPpLݟם#p%A8A ɠר? EGMr[ؐQU쳇*৕% ;&H\C|SZ b8#C=C "CS>וq]t+'۟RqGF_HjXƒ$F~ʖJ%ㅙ8UzqWWeS}T~dZC}_׌&.#TØvœksc9 ,JR3Fޘ 'Oabr2}َW #A征^BX8%jᢁm>ebiaIwo4I6TPRӼq.ole>r#<8>YX洡AIYX`]~& '4>d++TmL:p3f"Y1GXf+C*."ݢVnCu_`$'Ӷ?$b?nLn?qEoS]heS,%K&& n,:`\-5wh)+GaWQ:"1d `芾qTMŶQ=N(N)w2u=$F 6:&tEn]>0W@k@{!f-6 uz$ `SvY#/ت R"D0uGr$D2UYҵ/\sRY)D)徛ea,R~4$uuuAx?xԡBLK}~ :6%.ִ >'3 dBɒ0K{]4FY{)f^ ɱ߃Ϻfv`+(˟i1ڵvE\ʟzTdp%?90ga7~]Z"s/75p ʵYfDyMb5${GڈryO~i$O~'e 538-XO嘬_ۊsYHJ5V\wۋe H=!6I6 ;-`)K~@GbW4_~}oRX2߂rDnv1|Xh=Q|MHolfC+=Ja9H8@kicGJ@4EN|~[/prIMKdƺ\j'A98ՕVeUnsS|