Drop openssl-fips-provider requirement, accidentally included due to incorrect gating
imports/epel8/openssl3-3.2.1-1.2.el8
Michel Lind
2024-05-02 10:34:21 -0500
8e5beb7708Use certified FIPS module instead of freshly built one in Red Hat distribution
Dmitry Belyavskiy
2024-02-21 11:36:30 +0100
b9f699b8a8Use certified FIPS module instead of freshly built one in Red Hat distribution
Dmitry Belyavskiy
2024-01-29 17:28:37 +0100
50997010d1Add a directory for OpenSSL providers configuration
Dmitry Belyavskiy
2024-01-31 16:39:33 +0100
e6e479521bDenial of service via null dereference in PKCS#12
Dmitry Belyavskiy
2024-01-29 13:30:00 +0100
08c722bcd1SSL ECDHE Kex fails when pkcs11 engine is set in config file
Dmitry Belyavskiy
2024-01-19 15:18:50 +0100
0707122b95Excessive time spent checking invalid RSA public keys (CVE-2023-6237)
Dmitry Belyavskiy
2024-01-19 15:07:58 +0100
3c49cf388aPOLY1305 MAC implementation corrupts vector registers on PowerPC (CVE-2023-6129)
Dmitry Belyavskiy
2024-01-19 14:59:04 +0100
6c9dd70b94Eliminate memory leak in OpenSSL when setting elliptic curves on SSL context
Dmitry Belyavskiy
2024-01-19 14:49:51 +0100
e7c35f0edeAdd a directory for OpenSSL providers configuration
Dmitry Belyavskiy
2023-11-24 16:16:54 +0100
db02879351FIPS: abort on rsa_keygen_pairwise_test failure
Clemens Lang
2023-11-21 12:16:05 +0100
67bb06894fAvoid implicit function declaration when building openssl
Dmitry Belyavskiy
2023-11-21 12:11:01 +0100
f1d5ccdb6eExcessive time spent in DH check/generation with large Q parameter value (CVE-2023-5678)
Dmitry Belyavskiy
2023-11-08 12:08:38 +0100
72772f737eAdd missing ECDH Public Key Check in FIPS mode
Dmitry Belyavskiy
2023-11-08 11:55:53 +0100
9a075c13c3Mark RSA-OAEP as approved in FIPS mode
Clemens Lang
2023-10-19 12:47:52 +0200
66dddb942cFix incorrect cipher key and IV length processing (CVE-2023-5363)
Dmitry Belyavskiy
2023-10-25 12:06:55 +0200
6e0d3b16e6Excessive time spent checking DH q parameter value
Dmitry Belyavskiy
2023-10-18 11:20:31 +0200
d6248f76c4Excessive time spent checking DH keys and parameters
Dmitry Belyavskiy
2023-10-18 11:17:41 +0200
6775e82636AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries
Dmitry Belyavskiy
2023-10-18 11:15:19 +0200
fa5df9d74bForbid explicit curves when created via EVP_PKEY_fromdata
Dmitry Belyavskiy
2023-10-17 13:26:14 +0200
92436854f9Avoid implicit function declaration when building openssl
Dmitry Belyavskiy
2023-10-17 13:09:34 +0200
ec6d7cf272Provide empty evp_properties section in main OpenSSL configuration file
Dmitry Belyavskiy
2023-10-17 12:56:38 +0200
223304543aDon't limit using SHA1 in KDFs in non-FIPS mode.
Dmitry Belyavskiy
2023-10-16 11:06:19 +0200
131e7d1602Provide relevant diagnostics when FIPS checksum is corrupted
Dmitry Belyavskiy
2023-10-12 14:07:54 +0200
d30c497ed1Make FIPS module configuration more crypto-policies friendly
Dmitry Belyavskiy
2023-07-12 17:59:35 +0200
217cd631e8Add a workaround for lack of EMS in FIPS mode
Dmitry Belyavskiy
2023-07-11 16:37:16 +0200
05b87f449dRemove the listing of brainpool curves in FIPS mode Related: rhbz#2188180 Signed-off-by: Sahana Prasad <sahana@redhat.com>
Sahana Prasad
2023-06-26 10:15:57 +0200
d1a87553bbRelease the DRBG in global default libctx early
Dmitry Belyavskiy
2023-05-31 16:21:07 +0200
df4dd7dd7fFix possible DoS translating ASN.1 object identifiers
Dmitry Belyavskiy
2023-05-30 16:29:57 +0200
34e7dd5be4Add interop rpm-tmt-tests
Peter Leitmann
2023-05-24 15:41:56 +0000
b1d3f019d4FIPS: Re-enable DHX, disable FIPS 186-4 groups
Clemens Lang
2023-05-23 14:01:14 +0200
57f6d8f4a4Use OAEP padding and aes-128-cbc by default in cms command in FIPS mode
Dmitry Belyavskiy
2023-05-19 17:47:59 +0200
032dc0839cEnforce using EMS in FIPS mode - better alerts
Dmitry Belyavskiy
2023-05-09 12:44:49 +0200
05bbcc9920- Upload new upstream sources without manually hobbling them. - Remove the hobbling script as it is redundant. It is now allowed to ship the sources of patented EC curves, however it is still made unavailable to use by compiling with the 'no-ec2m' Configure option. The additional forbidden curves such as P-160, P-192, wap-tls curves are manually removed by updating 0011-Remove-EC-curves.patch. - Enable Brainpool curves. - Apply the changes to ec_curve.c and ectest.c as a new patch 0010-Add-changes-to-ectest-and-eccurve.patch instead of replacing them. - Modify 0011-Remove-EC-curves.patch to allow Brainpool curves. - Modify 0011-Remove-EC-curves.patch to allow code under macro OPENSSL_NO_EC2M. Resolves: rhbz#2130618, rhbz#2188180
Sahana Prasad
2023-04-03 13:23:50 +0200