Secure Sockets and Transport Layer Security

Edit Package openssl

The OpenSSL Project is a collaborative effort to develop a robust,
commercial-grade, full-featured, and open source toolkit implementing
the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS
v1) protocols with full-strength cryptography. The project is managed
by a worldwide community of volunteers that use the Internet to
communicate, plan, and develop the OpenSSL toolkit and its related
documentation.

Derivation and License

OpenSSL is based on the excellent SSLeay library developed by Eric A.
Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an
Apache-style license, which basically means that you are free to get it
and to use it for commercial and noncommercial purposes.

Refresh
Refresh
Source Files
Filename Size Changed
0001-libcrypto-Hide-library-private-symbols.patch 0000021312 20.8 KB
0005-libssl-Hide-library-private-symbols.patch 0000001731 1.69 KB
CVE-2014-0076.patch 0000005441 5.31 KB
README-FIPS.txt 0000009637 9.41 KB
README.SuSE 0000000370 370 Bytes
VIA_padlock_support_on_64systems.patch 0000007419 7.25 KB
baselibs.conf 0000000295 295 Bytes
bug610223.patch 0000000428 428 Bytes
compression_methods_switch.patch 0000002044 2 KB
merge_from_0.9.8k.patch 0000002458 2.4 KB
openssl-1.0.0-c_rehash-compat.diff 0000001241 1.21 KB
openssl-1.0.1c-default-paths.patch 0000002876 2.81 KB
openssl-1.0.1c-ipv6-apps.patch 0000013610 13.3 KB
openssl-1.0.1e-fips-ctor.patch 0000004523 4.42 KB
openssl-1.0.1e-fips-ec.patch 0000056956 55.6 KB
openssl-1.0.1e-fips.patch 0000607646 593 KB
openssl-1.0.1e-new-fips-reqs.patch 0000034290 33.5 KB
openssl-1.0.1e-truststore.diff 0000000625 625 Bytes
openssl-1.0.1f.tar.gz 0004509212 4.3 MB
openssl-1.0.1f.tar.gz.asc 0000000482 482 Bytes
openssl-fix-pod-syntax.diff 0000020501 20 KB
openssl-ocloexec.patch 0000005039 4.92 KB
openssl-pkgconfig.patch 0000001255 1.23 KB
openssl.changes 0000063762 62.3 KB
openssl.keyring 0000006469 6.32 KB
openssl.spec 0000016049 15.7 KB
openssl.test 0000000063 63 Bytes
Revision 109 (latest revision is 171)
Stephan Kulow's avatar Stephan Kulow (coolo) accepted request 227508 from Stephan Kulow's avatar Stephan Kulow (coolo) (revision 109)
Fix bug[ bnc#869945] CVE-2014-0076: openssl: Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack; Add file: CVE-2014-0076.patch (forwarded request 227417 from shawn2012)
Comments 10

Thiru Shetty's avatar

Can anyone explain, openssl-1.0.2i-new-fips-reqs.patch is for what and which code based ? I'm unable to map to any code base either openssl-1.0.2i nor openssl-fips which found in https://www.openssl.org/


Marcus Meissner's avatar

It is from a seperate FIPS patchset which we used for FIPS certification of openssl in SLES 12 and SLES 12 SP2.


Thiru Shetty's avatar

Can i get the source copy of it ?


Marcus Meissner's avatar

check out these sources: SUSE:SLE-12-SP2:Update openssl


Thiru Shetty's avatar

I'm sorry, couldn't able to locate the exact link. If you don't mind can you help me to point the link ?



Thiru Shetty's avatar

Thanks a lot. anyway i can't find openssl-1.0.2i-new-fips-reqs.patch in this path of any updation. I think it's been deleted, prior to this can find openssl-1.0.1i-new-fips-reqs.patch.



Thiru Shetty's avatar

Thank you, got it. Basically the New requirements of FIPS 140-2 RSA/DSA were adopted from Red Hat Inc right ?


Marcus Meissner's avatar

The patchset is largely from Redhat, we did some small adaptions to even stricter FIPS requirements but I do not recall the details.

openSUSE Build Service is sponsored by