Commit Graph

  • fb8fee4b43 FIPS RSA CRT tests must use correct parameters Dmitry Belyavskiy 2022-11-16 13:16:23 +0100
  • 474a112b98 Avoid memory leaks in TLS Dmitry Belyavskiy 2022-11-16 12:23:27 +0100
  • 6c57fc8dcc SHAKE-128/256 are not allowed with RSA in FIPS mode Dmitry Belyavskiy 2022-11-15 15:51:36 +0100
  • bb0cbcd0ab
    CVE-2022-3602, CVE-2022-3786: X.509 Email Address Buffer Overflow Dmitry Belyavskiy 2022-11-01 18:23:58 +0100
  • 39f800af50 CVE-2022-3602, CVE-2022-3786: X.509 Email Address Buffer Overflow Dmitry Belyavskiy 2022-11-01 18:23:58 +0100
  • 27a0195d18 Merge remote-tracking branch 'gitlab/c9s' into epel8 Michel Alexandre Salim 2022-09-27 15:54:39 -0500
  • ff78525169 .gitignore: Stop ignoring 000*.patch Clemens Lang 2022-09-12 15:52:16 +0200
  • 7c8235f8cd Zeroize public keys, add HKDF FIPS indicator Clemens Lang 2022-08-11 15:12:42 +0200
  • 730ccadf04 Extra zeroization related to FIPS-140-3 requirements Dmitry Belyavskiy 2022-08-05 14:26:10 +0200
  • fc45520150 Reseed all the parent DRBGs in chain on reseeding a DRBG Dmitry Belyavskiy 2022-08-02 18:32:36 +0200
  • a0907c129c Use signature for RSA pairwise test according FIPS-140-3 requirements Dmitry Belyavskiy 2022-07-25 17:57:38 +0200
  • f1dba9d301 Deal with ECDH keys in FIPS mode according FIPS-140-3 requirements Dmitry Belyavskiy 2022-07-25 14:41:43 +0200
  • 3f7cd79d02 Deal with DH keys in FIPS mode according FIPS-140-3 requirements Dmitry Belyavskiy 2022-07-20 15:20:48 +0200
  • 61f739868e FIPS: Fix memory leak in digest_sign self-test Clemens Lang 2022-08-03 18:04:36 +0200
  • 08d6c35051 FIPS self-test: RSA-OAEP, FFDHE2048, digest_sign Clemens Lang 2022-07-22 18:01:52 +0200
  • 3e6d5a385b Improve AES-GCM & ChaCha20 perf on Power9+ ppc64le Clemens Lang 2022-07-14 16:54:25 +0200
  • c64694b961 Fix segfault in EVP_PKEY_Q_keygen() Clemens Lang 2022-07-14 14:49:46 +0200
  • 5901637dea CVE-2022-2097: AES OCB fails to encrypt some bytes on 32-bit x86 Clemens Lang 2022-07-05 14:04:03 +0200
  • f3b52e907b CVE-2022-2068: the c_rehash script allows command injection Dmitry Belyavskiy 2022-06-22 13:49:46 +0200
  • fea833cb56 Strict certificates validation shouldn't allow explicit EC parameters Dmitry Belyavskiy 2022-06-22 12:52:57 +0200
  • ea75c725ee Fix PPC64 Montgomery multiplication bug Dmitry Belyavskiy 2022-06-22 12:35:27 +0200
  • f4e1bded66 Improve diagnostics when passing unsupported groups in TLS Dmitry Belyavskiy 2022-06-17 10:30:01 +0200
  • cbe5a9ff12 FIPS provider should block RSA encryption for key transport. Dmitry Belyavskiy 2022-06-16 15:11:40 +0200
  • 8638196167 Ciphersuites with RSAPSK KX should be filterd in FIPS mode Dmitry Belyavskiy 2022-06-16 15:06:45 +0200
  • 8b08b372c8 FIPS: Expose explicit indicator from fips.so Clemens Lang 2022-06-08 14:05:50 +0200
  • e859029ea0 Replace expired certificates Dmitry Belyavskiy 2022-06-03 15:31:56 +0200
  • a8a3a389ee Use KAT for ECDSA signature tests, s390 arch Dmitry Belyavskiy 2022-05-30 18:00:10 +0200
  • 96926ffe00 Revert "Disable EVP_PKEY_sign/EVP_PKEY_verify in FIPS mode" Clemens Lang 2022-05-25 18:17:35 +0200
  • 794d81540e CVE-2022-1292 openssl: c_rehash script allows command injection Dmitry Belyavskiy 2022-05-26 12:14:19 +0200
  • a63915eb2b CVE-2022-1343 openssl: inacurate verification when using OCSP_NOCHECKS Dmitry Belyavskiy 2022-05-26 12:07:22 +0200
  • ac312e8ff7 CVE-2022-1473 openssl: OPENSSL_LH_flush() breaks reuse of memory Dmitry Belyavskiy 2022-05-26 11:57:12 +0200
  • b5de6bd830 In FIPS mode limit key sizes for signature verification Dmitry Belyavskiy 2022-05-23 15:25:42 +0200
  • 7bc4f9f094 Ciphersuites with RSA KX should be filterd in FIPS mode Dmitry Belyavskiy 2022-05-19 14:29:23 +0200
  • b393177f7d `openssl ecparam -list_curves` lists only FIPS-approved curves in FIPS mode Dmitry Belyavskiy 2022-05-19 12:20:50 +0200
  • 389313b118 FIPS: Disable SHA1 signs and EVP_PKEY_{sign,verify} Clemens Lang 2022-05-23 14:53:37 +0200
  • 87f109e9fb Use KAT for ECDSA signature tests Dmitry Belyavskiy 2022-04-04 16:32:38 +0200
  • 69c1abb4df openssl req defaults on PKCS#8 encryption changed to AES-256-CBC Dmitry Belyavskiy 2022-05-12 13:45:42 +0200
  • b4d281e4de -config argument of openssl app should work properly Dmitry Belyavskiy 2022-05-12 13:24:59 +0200
  • 1b2d08b2c2 Adaptation of upstream patches disabling explicit EC parameters in FIPS mode Dmitry Belyavskiy 2022-04-01 12:53:17 +0200
  • 4dc19fe033 Reworked patch forbidding explicit EC parameters Dmitry Belyavskiy 2022-03-24 17:45:16 +0100
  • 1447e64bc3 Include hash in FIPS module version Clemens Lang 2022-05-05 17:05:35 +0200
  • ad863e9fc8 OpenSSL FIPS module should not build in non-approved algorithms Dmitry Belyavskiy 2022-05-05 17:34:49 +0200
  • 6ba0e5efa3 When FIPS provider is in use, we forbid only some padding modes - spec Dmitry Belyavskiy 2022-05-02 18:33:35 +0200
  • 067b6b249b When FIPS provider is in use, we forbid only some padding modes Dmitry Belyavskiy 2022-05-02 17:42:54 +0200
  • 02c75e5a65 We dont'want totally forbid RSA encryption. Dmitry Belyavskiy 2022-05-02 15:54:28 +0200
  • 9afaa3d1f4 Fix regression in evp_pkey_name2type caused by tr_TR locale fix Clemens Lang 2022-04-28 13:38:34 +0200
  • a711ac2e4f Fix openssl curl error with LANG=tr_TR.utf8 Dmitry Belyavskiy 2022-04-21 15:16:18 +0200
  • c0744a0cbf Temporary manual test Dmitry Belyavskiy 2022-04-21 13:20:27 +0200
  • 7a1c7b28bc FIPS provider doesn't block RSA encryption for key transport Dmitry Belyavskiy 2022-03-28 17:38:25 +0200
  • 93ff3f8fe5 Fix occasional internal error in TLS when DHE is used Clemens Lang 2022-03-22 13:04:16 +0100
  • 153f593fa6 Fix SHA1 certs in LEGACY without openssl lib ctxt Clemens Lang 2022-03-18 13:35:57 +0100
  • 4eb630f7d5 Fix TLS connections with SHA1 signatures if rh-allow-sha1-signatures = yes Clemens Lang 2022-03-17 13:36:33 +0100
  • 6bdddbaba4 Merge remote-tracking branch 'gitlab/c9s' into epel8 Michel Alexandre Salim 2022-03-16 14:14:41 -0700
  • 03697fff80 CVE-2022-0778 fix Dmitry Belyavskiy 2022-03-16 15:03:25 +0100
  • bc7dfd9722 Fix RSA PSS padding with SHA-1 disabled Clemens Lang 2022-03-10 12:47:01 +0100
  • 3c66c99bd5 Allow SHA1 in seclevel 2 if rh-allow-sha1-signatures = yes Clemens Lang 2022-03-01 15:58:48 +0100
  • ede38fcb54 Prevent use of SHA1 with ECDSA Clemens Lang 2022-02-25 14:36:41 +0100
  • ea9f0a5726 OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters Dmitry Belyavskiy 2022-02-25 12:37:01 +0100
  • 849a9965ee Support KBKDF (NIST SP800-108) with an R value of 8bits Resolves: rhbz#2027261 Peter Robinson 2022-02-24 10:07:39 +0000
  • 53f53fedec Allow SHA1 usage in MGF1 for RSASSA-PSS signatures Clemens Lang 2022-02-23 16:56:08 +0100
  • b33dfd3fc3 Spec bump Dmitry Belyavskiy 2022-02-23 11:47:25 +0100
  • 5a9ab1160e Allow SHA1 usage in HMAC in TLS Clemens Lang 2022-02-22 19:34:36 +0100
  • 53b85f538c OpenSSL will generate keys with prime192v1 curve if it is provided using explicit parameters Dmitry Belyavskiy 2022-02-22 15:20:01 +0100
  • d79f404164 Allows non-fips KDF for PKCS#12 Dmitry Belyavskiy 2022-02-21 14:33:38 +0100
  • 78fb78d307 Disable SHA1 signature creation and verification by default Clemens Lang 2022-02-22 12:21:06 +0100
  • 0a5c81da78 s_server: correctly handle 2^14 byte long records Resolves: rhbz#2042011 Sahana Prasad 2022-02-03 15:36:38 +0100
  • 922b5301ea Adjust FIPS provider version Dmitry Belyavskiy 2022-02-01 15:53:47 +0100
  • 8c3b745547 On the s390x, zeroize all the copies of TLS premaster secret Dmitry Belyavskiy 2022-01-26 16:50:19 +0100
  • 92e721fa5d Rebuild Dmitry Belyavskiy 2022-01-21 14:40:57 +0100
  • 691c22b61c Remove volatile attribute from HMAC to make annocheck happy Dmitry Belyavskiy 2022-01-21 13:10:45 +0100
  • d237e7f301 Restoring fips=yes to SHA-1 Dmitry Belyavskiy 2022-01-21 10:51:59 +0100
  • 9df33eabbe KATS self-tests should run before HMAC verifcation Dmitry Belyavskiy 2022-01-19 13:40:57 +0100
  • f5421022ee Adds enable-buildtest-c++ to the configure options. Related: rhbz#1990814 Sahana Prasad 2022-01-20 15:49:15 +0100
  • 78a467efcc Rebase to upstream version 3.0.1 Fixes CVE-2021-4044 Invalid handling of X509_verify_cert() internal errors in libssl Resolves: rhbz#2038910, rhbz#2035148 Sahana Prasad 2022-01-18 18:30:10 +0100
  • e63c4b68b2 Update spec file, remove fipsmodule.cnf Dmitry Belyavskiy 2022-01-13 13:35:22 +0100
  • 6cdaa527d8 Explicitly permit SHA1 HMAC Dmitry Belyavskiy 2022-01-13 13:34:38 +0100
  • cc37486d86 Minimize the list of services allowed for FIPS Dmitry Belyavskiy 2022-01-13 13:33:40 +0100
  • 225b6d37b9 openssl speed should run in FIPS mode Dmitry Belyavskiy 2021-12-21 16:16:07 +0100
  • 13dc3794cb Make rpminspect happy Dmitry Belyavskiy 2021-12-10 14:19:15 +0100
  • 4c1c00d6af Updated spec, some cleanup done Dmitry Belyavskiy 2021-11-24 13:44:25 +0100
  • 9422ae52de Always activate default provider via config Dmitry Belyavskiy 2021-11-23 14:45:25 +0100
  • 210c37e906 Disable fipsinstall application Dmitry Belyavskiy 2021-11-22 14:08:48 +0100
  • 3ff0db7558 Embed correct HMAC into fips provider Dmitry Belyavskiy 2021-11-22 11:20:40 +0100
  • 5c4e10ac26 FIPS provider auto activation Dmitry Belyavskiy 2021-11-15 11:38:37 +0100
  • 45d662c6cb Add instructions for keeping in sync with upstream repo Michel Alexandre Salim 2021-11-18 11:34:35 -0800
  • fb1a323c80 Merge remote-tracking branch 'fork/epel8-squashed' into epel8 Michel Alexandre Salim 2021-11-18 11:00:16 -0800
  • 910ecb6eaf Fork c9s' openssl to openssl3 for epel8 (and possibly Fedora <= 35) Michel Alexandre Salim 2021-11-10 14:57:16 -0800
  • 0317f8b363 Added the README Gwyn Ciesla 2021-11-18 16:48:03 +0000
  • 694c426faf Fix memory leak in s_client Dmitry Belyavskiy 2021-10-07 18:13:47 +0200
  • b76c2316a3 KTLS and FIPS may interfere, so tests need to be tuned Dmitry Belyavskiy 2021-09-22 12:09:15 +0200
  • 3edf474b5d Avoid double-free on error seeding the RNG. Dmitry Belyavskiy 2021-09-20 17:13:26 +0200
  • 34d46544a5 Rebase to upstream version 3.0.0 Related: rhbz#1990814 Sahana Prasad 2021-09-09 13:07:02 +0200
  • 07de966235 - Removes the dual-abi build as it not required anymore. The mass rebuild was completed and all packages are rebuilt against Beta version. Resolves: rhbz#1984097 Sahana Prasad 2021-08-25 17:02:52 +0200
  • ddd1eb3708 Correctly processing CMS reading from /dev/stdin Dmitry Belyavskiy 2021-08-23 10:45:49 +0200
  • 49de59749c Add instruction for loading legacy provider in openssl.cnf Resolves: rhbz#1975836 Sahana Prasad 2021-08-16 12:49:09 +0200
  • 03899fca38 Adds support for IDEA encryption. Resolves: rhbz#1990602 Sahana Prasad 2021-08-16 11:44:00 +0200
  • 0c6f4a599c - Fixes core dump in openssl req -modulus - Fixes 'openssl req' to not ask for password when non-encrypted private key is used - cms: Do not try to check binary format on stdin and -rctform fix - Resolves: rhbz#1988137, rhbz#1988468, rhbz#1988137 Sahana Prasad 2021-08-10 16:52:53 +0200
  • 2862adca42 Rebuilt for IMA sigs, glibc 2.34, aarch64 flags Mohan Boddu 2021-08-09 22:44:21 +0000
  • ecb6630fd3 When signature_algorithm extension is omitted, use more relevant alerts Dmitry Belyavskiy 2021-08-04 15:55:01 +0200
  • c5d8025ca8 Remove tier 0 functional test from gating.yaml. These tests are removed from dist-git and are executed as tier1 or higher tests already. Signed-off-by: Sahana Prasad <sahana@redhat.com> Sahana Prasad 2021-08-04 10:37:11 +0200