Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

openssl-static-1.0.2k-22.el7_9 RPM for x86_64

From Updates for CentOS 7.9.2009 for x86_64 / Packages

Name: openssl-static Distribution: Unknown
Version: 1.0.2k Vendor: CentOS
Release: 22.el7_9 Build date: Thu Oct 14 14:32:10 2021
Group: Development/Libraries Build host: x86-02.bsys.centos.org
Size: 5458778 Source RPM: openssl-1.0.2k-22.el7_9.src.rpm
Packager: CentOS BuildSystem <http://bugs.centos.org>
Url: http://www.openssl.org/
Summary: Libraries for static linking of applications which will use OpenSSL
OpenSSL is a toolkit for supporting cryptography. The openssl-static
package contains static libraries needed for static linking of
applications which support various cryptographic algorithms and
protocols.

Provides

Requires

License

OpenSSL

Changelog

* Wed Sep 01 2021 Sahana Prasad <sahana@redhat.com> 1.0.2k-22
  - fix CVE-2021-23841 openssl: NULL pointer dereference
    in X509_issuer_and_serial_hash()
  - fix CVE-2021-23840 openssl: integer overflow in CipherUpdate
  - Resolves: rhbz#1932132, rhbz#1932126
* Fri Dec 04 2020 Sahana Prasad <sahana@redhat.com> 1.0.2k-21
  - remove ASN1_F_ASN1_ITEM_EMBED_D2I from openssl-1.0.2k-cve-2020-1971.patch
* Fri Dec 04 2020 Sahana Prasad <sahana@redhat.com> 1.0.2k-20
  - fix CVE-2020-1971 openssl: EDIPARTYNAME NULL pointer de-reference
* Tue Apr 09 2019 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-19
  - close the RSA decryption 9 lives of Bleichenbacher cat
    timing side channel (#1649568)
* Fri Apr 05 2019 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-18
  - fix CVE-2018-0734 - DSA signature local timing side channel
  - fix CVE-2019-1559 - 0-byte record padding oracle
  - close the RSA decryption One & done EM side channel (#1619558)
* Wed Feb 06 2019 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-17
  - use SHA-256 in FIPS RSA pairwise key check
  - fix CVE-2018-5407 (and CVE-2018-0735) - EC signature local
    timing side-channel key extraction
* Tue Aug 14 2018 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-16
  - fix CVE-2018-0495 - ROHNP - Key Extraction Side Channel on DSA, ECDSA
  - fix incorrect error message on FIPS DSA parameter generation (#1603597)
* Tue Jun 19 2018 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-14
  - ppc64le is not multilib architecture (#1585004)
* Mon Jun 18 2018 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-13
  - add S390x assembler updates
  - make CA name list comparison function case sensitive (#1548401)
  - fix CVE-2017-3735 - possible one byte overread with X.509 IPAdressFamily
  - fix CVE-2018-0732 - large prime DH DoS of TLS client
  - fix CVE-2018-0737 - RSA key generation cache timing vulnerability
  - fix CVE-2018-0739 - stack overflow parsing recursive ASN.1 structure
* Wed Dec 13 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-12
  - fix CVE-2017-3737 - incorrect handling of fatal error state
  - fix CVE-2017-3738 - AVX2 Montgomery multiplication bug with 1024 bit modulus
* Wed Dec 06 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-11
  - fix deadlock in RNG in the FIPS mode in mariadb
* Tue Nov 07 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-9
  - fix CVE-2017-3736 - carry propagation bug in Montgomery multiplication
* Wed May 17 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-8
  - fix regression in openssl req -x509 command (#1450015)
* Thu Apr 13 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-7
  - handle incorrect size gracefully in aes_p8_cbc_encrypt()
* Mon Mar 27 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-6
  - allow long client hellos to be received by server
* Mon Mar 27 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-5
  - fix CPU features detection on new AMD processors
* Thu Mar 09 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-4
  - add support for additional STARTTLS protocols to s_client
    original backported patch by Robert Scheck (#1396209)
* Wed Mar 01 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-3
  - properly document the SSLv2 support removal
* Mon Feb 20 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-2
  - add PPC assembler updates
* Tue Feb 07 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2k-1
  - minor upstream release 1.0.2k fixing security issues
* Tue Jan 10 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2j-2
  - deprecate and disable verification of insecure hash algorithms
  - add support for /etc/pki/tls/legacy-settings also for minimum DH length
    accepted by SSL client
  - compare the encrypt and tweak key in XTS as required by FIPS
* Thu Jan 05 2017 Tomáš Mráz <tmraz@redhat.com> 1.0.2j-1
  - rebase to latest upstream release from the 1.0.2 branch, ABI compatible
* Thu Sep 22 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-60
  - fix CVE-2016-2177 - possible integer overflow
  - fix CVE-2016-2178 - non-constant time DSA operations
  - fix CVE-2016-2179 - further DoS issues in DTLS
  - fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio()
  - fix CVE-2016-2181 - DTLS1 replay protection and unprocessed records issue
  - fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec()
  - fix CVE-2016-6302 - insufficient TLS session ticket HMAC length check
  - fix CVE-2016-6304 - unbound memory growth with OCSP status request
  - fix CVE-2016-6306 - certificate message OOB reads
  - mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to
    112 bit effective strength
* Tue Jun 21 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-58
  - replace expired testing certificates
* Fri Apr 29 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-57
  - fix CVE-2016-2105 - possible overflow in base64 encoding
  - fix CVE-2016-2106 - possible overflow in EVP_EncryptUpdate()
  - fix CVE-2016-2107 - padding oracle in stitched AES-NI CBC-MAC
  - fix CVE-2016-2108 - memory corruption in ASN.1 encoder
  - fix CVE-2016-2109 - possible DoS when reading ASN.1 data from BIO
* Thu Apr 07 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-56
  - fix 1-byte memory leak in pkcs12 parse (#1312112)
  - document some options of the speed command (#1312110)
  - fix high-precision timestamps in timestamping authority
  - enable SCTP support in DTLS 
  - use correct digest when exporting keying material in TLS1.2 (#1289620)
  - fix CVE-2016-0799 - memory issues in BIO_printf
  - add support for setting Kerberos service and keytab in
    s_server and s_client
* Wed Feb 24 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-55
  - fix CVE-2016-0702 - side channel attack on modular exponentiation
  - fix CVE-2016-0705 - double-free in DSA private key parsing
  - fix CVE-2016-0797 - heap corruption in BN_hex2bn and BN_dec2bn
* Tue Feb 16 2016 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-54
  - fix CVE-2015-3197 - SSLv2 ciphersuite enforcement
  - disable SSLv2 in the generic TLS method
* Mon Dec 21 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-53
  - fix CVE-2015-7575 - disallow use of MD5 in TLS1.2
* Fri Dec 04 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-52
  - fix CVE-2015-3194 - certificate verify crash with missing PSS parameter
  - fix CVE-2015-3195 - X509_ATTRIBUTE memory leak
  - fix CVE-2015-3196 - race condition when handling PSK identity hint
* Tue Jun 23 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-51
  - fix the CVE-2015-1791 fix (broken server side renegotiation)
* Thu Jun 11 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-50
  - improved fix for CVE-2015-1791
  - add missing parts of CVE-2015-0209 fix for corectness although unexploitable
* Tue Jun 09 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-49
  - fix CVE-2014-8176 - invalid free in DTLS buffering code
  - fix CVE-2015-1789 - out-of-bounds read in X509_cmp_time
  - fix CVE-2015-1790 - PKCS7 crash with missing EncryptedContent
  - fix CVE-2015-1791 - race condition handling NewSessionTicket
  - fix CVE-2015-1792 - CMS verify infinite loop with unknown hash function
* Wed Jun 03 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-48
  - fix CVE-2015-3216 - regression in RAND locking that can cause segfaults on
    read in multithreaded applications
* Mon May 25 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-47
  - fix CVE-2015-4000 - prevent the logjam attack on client - restrict
    the DH key size to at least 768 bits (limit will be increased in future)
* Wed Mar 25 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-46
  - drop the AES-GCM restriction of 2^32 operations because the IV is
    always 96 bits (32 bit fixed field + 64 bit invocation field)
* Thu Mar 19 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-45
  - update fix for CVE-2015-0287 to what was released upstream
* Wed Mar 18 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-44
  - fix CVE-2015-0209 - potential use after free in d2i_ECPrivateKey()
  - fix CVE-2015-0286 - improper handling of ASN.1 boolean comparison
  - fix CVE-2015-0287 - ASN.1 structure reuse decoding memory corruption
  - fix CVE-2015-0288 - X509_to_X509_REQ NULL pointer dereference
  - fix CVE-2015-0289 - NULL dereference decoding invalid PKCS#7 data
  - fix CVE-2015-0292 - integer underflow in base64 decoder
  - fix CVE-2015-0293 - triggerable assert in SSLv2 server
* Mon Mar 16 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-43
  - fix broken error detection when unwrapping unpadded key
* Mon Mar 02 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-42.1
  - fix the RFC 5649 for key material that does not need padding
* Thu Jan 15 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-42
  - test in the non-FIPS RSA keygen for minimal distance of p and q
    similarly to the FIPS RSA keygen
* Tue Jan 13 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-41
  - fix CVE-2014-3570 - incorrect computation in BN_sqr()
  - fix CVE-2014-3571 - possible crash in dtls1_get_record()
  - fix CVE-2014-3572 - possible downgrade of ECDH ciphersuite to non-PFS state
  - fix CVE-2014-8275 - various certificate fingerprint issues
  - fix CVE-2015-0204 - remove support for RSA ephemeral keys for non-export
    ciphersuites and on server
  - fix CVE-2015-0205 - do not allow unauthenticated client DH certificate
  - fix CVE-2015-0206 - possible memory leak when buffering DTLS records
* Tue Oct 21 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-40
  - use FIPS approved method for computation of d in RSA
  - copy digest algorithm when handling SNI context switch
* Wed Oct 15 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-39
  - fix CVE-2014-3567 - memory leak when handling session tickets
  - fix CVE-2014-3513 - memory leak in srtp support
  - add support for fallback SCSV to partially mitigate CVE-2014-3566
    (padding attack on SSL3)
* Wed Sep 24 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-38
  - do FIPS algorithm selftest before the integrity check
* Thu Sep 18 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-37
  - add support for RFC 5649 (#1119738)
  - do not pass the FIPS integrity check if the .hmac files are empty (#1128849)
  - add ECC TLS extensions to DTLS (#1119803)
  - do not send ECC ciphersuites in SSLv2 client hello (#1090955)
  - properly propagate encryption failure in BIO_f_cipher (#1072439)
  - fix CVE-2014-0224 fix that broke EAP-FAST session resumption support
  - improve documentation of ciphersuites - patch by Hubert Kario (#1108026)
  - use case insensitive comparison for servername in s_server (#1081163)
  - add support for automatic ECDH curve selection on server (#1080128)
  - FIPS mode: make the limitations on DSA, DH, and RSA keygen
    length enforced only if OPENSSL_ENFORCE_MODULUS_BITS environment
    variable is set
* Wed Aug 13 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-36
  - add support for ppc64le architecture
  - add Power 8 optimalizations
* Fri Aug 08 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-35
  - fix CVE-2014-3505 - doublefree in DTLS packet processing
  - fix CVE-2014-3506 - avoid memory exhaustion in DTLS
  - fix CVE-2014-3507 - avoid memory leak in DTLS
  - fix CVE-2014-3508 - fix OID handling to avoid information leak
  - fix CVE-2014-3509 - fix race condition when parsing server hello
  - fix CVE-2014-3510 - fix DoS in anonymous (EC)DH handling in DTLS
  - fix CVE-2014-3511 - disallow protocol downgrade via fragmentation
* Tue Jun 03 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34.3
  - fix CVE-2010-5298 - possible use of memory after free
  - fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment
  - fix CVE-2014-0198 - possible NULL pointer dereference
  - fix CVE-2014-0221 - DoS from invalid DTLS handshake packet
  - fix CVE-2014-0224 - SSL/TLS MITM vulnerability
  - fix CVE-2014-3470 - client-side DoS when using anonymous ECDH
* Tue Apr 08 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34
  - fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
* Fri Feb 14 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-33
  - use the key length from configuration file if req -newkey rsa is invoked
* Thu Feb 13 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-32
  - avoid unnecessary reseeding in BN_rand in the FIPS mode
* Wed Feb 12 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-31
  - print ephemeral key size negotiated in TLS handshake (#1057715)
  - add DH_compute_key_padded needed for FIPS CAVS testing
  - make expiration and key length changeable by DAYS and KEYLEN
    variables in the certificate Makefile (#1058108)
  - change default hash to sha256 (#1062325)
  - lower the actual 3des strength so it is sorted behind aes128 (#1056616)
* Fri Jan 24 2014 Daniel Mach <dmach@redhat.com> - 1:1.0.1e-30
  - Mass rebuild 2014-01-24
* Wed Jan 15 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-29
  - rebuild with -O3 on ppc64 architecture
* Tue Jan 07 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-28
  - fix CVE-2013-4353 - Invalid TLS handshake crash
  - fix CVE-2013-6450 - possible MiTM attack on DTLS1
* Fri Dec 27 2013 Daniel Mach <dmach@redhat.com> - 1:1.0.1e-27
  - Mass rebuild 2013-12-27
* Fri Dec 20 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-26
  - fix CVE-2013-6449 - crash when version in SSL structure is incorrect
  - drop weak ciphers from the default TLS ciphersuite list
  - add back some symbols that were dropped with update to 1.0.1 branch
  - more FIPS validation requirement changes
* Tue Nov 19 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-25
  - fix locking and reseeding problems with FIPS drbg
* Fri Nov 15 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-24
  - additional changes required for FIPS validation
  - disable verification of certificate, CRL, and OCSP signatures
    using MD5 if OPENSSL_ENABLE_MD5_VERIFY environment variable
    is not set
* Fri Nov 08 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-23
  - add back support for secp521r1 EC curve
  - add aarch64 to Configure (#969692)
* Thu Oct 24 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-22
  - do not advertise ECC curves we do not support (#1022493)
* Fri Oct 04 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-21
  - make DTLS1 work in FIPS mode
  - avoid RSA and DSA 512 bits and Whirlpool in 'openssl speed' in FIPS mode
  - drop the -fips subpackage, installation of dracut-fips marks that the FIPS
    module is installed
  - avoid dlopening libssl.so from libcrypto
  - fix small memory leak in FIPS aes selftest
  - fix segfault in openssl speed hmac in the FIPS mode
* Thu Sep 12 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-20
  - document the nextprotoneg option in manual pages
    original patch by Hubert Kario
  - try to avoid some races when updating the -fips subpackage
* Mon Sep 02 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-19
  - use version-release in .hmac suffix to avoid overwrite
    during upgrade
* Thu Aug 29 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-18
  - always perform the FIPS selftests in library constructor
    if FIPS module is installed
* Tue Aug 27 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-16
  - add -fips subpackage that contains the FIPS module files
* Fri Aug 16 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-15
  - fix use of rdrand if available
  - more commits cherry picked from upstream
  - documentation fixes
* Fri Jul 26 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-14
  - additional manual page fix
  - use symbol versioning also for the textual version
* Thu Jul 25 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-13
  - additional manual page fixes
  - cleanup speed command output for ECDH ECDSA
* Fri Jul 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-12
  - use _prefix macro
* Thu Jul 11 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-11
  - add openssl.cnf.5 manpage symlink to config.5
* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-10
  - add relro linking flag
* Wed Jul 10 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-9
  - add support for the -trusted_first option for certificate chain verification
* Fri May 10 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-8
  - disable GOST engine
* Thu May 09 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-7
  - add symbol version for ECC functions
* Fri May 03 2013 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-6
  - update the FIPS selftests to use 256 bit curves
* Tue Apr 30 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-5
  - enabled NIST Suite B ECC curves and algorithms
* Mon Mar 18 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-4
  - fix random bad record mac errors (#918981)
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-3
  - fix up the SHLIB_VERSION_NUMBER
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-2
  - disable ZLIB loading by default (due to CRIME attack)
* Tue Feb 19 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1e-1
  - new upstream version
* Wed Jan 30 2013 Tomas Mraz <tmraz@redhat.com> 1.0.1c-12
  - more fixes from upstream
  - fix errors in manual causing build failure (#904777)
* Fri Dec 21 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-11
  - add script for renewal of a self-signed cert by Philip Prindeville (#871566)
  - allow X509_issuer_and_serial_hash() produce correct result in
    the FIPS mode (#881336)
* Thu Dec 06 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-10
  - do not load default verify paths if CApath or CAfile specified (#884305)
* Tue Nov 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-9
  - more fixes from upstream CVS
  - fix DSA key pairwise check (#878597)
* Thu Nov 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-8
  - use 1024 bit DH parameters in s_server as 512 bit is not allowed
    in FIPS mode and it is quite weak anyway
* Mon Sep 10 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-7
  - add missing initialization of str in aes_ccm_init_key (#853963)
  - add important patches from upstream CVS
  - use the secure_getenv() with new glibc
* Fri Jul 20 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1:1.0.1c-6
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
* Fri Jul 13 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-5
  - use __getenv_secure() instead of __libc_enable_secure
* Fri Jul 13 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-4
  - do not move libcrypto to /lib
  - do not use environment variables if __libc_enable_secure is on
  - fix strict aliasing problems in modes
* Thu Jul 12 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-3
  - fix DSA key generation in FIPS mode (#833866)
  - allow duplicate FIPS_mode_set(1)
  - enable build on ppc64 subarch (#834652)
* Wed Jul 11 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-2
  - fix s_server with new glibc when no global IPv6 address (#839031)
  - make it build with new Perl
* Tue May 15 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1c-1
  - new upstream version
* Thu Apr 26 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1b-1
  - new upstream version
* Fri Apr 20 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1a-1
  - new upstream version fixing CVE-2012-2110
* Wed Apr 11 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-3
  - add Kerberos 5 libraries to pkgconfig for static linking (#807050)
* Thu Apr 05 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-2
  - backports from upstream CVS
  - fix segfault when /dev/urandom is not available (#809586)
* Wed Mar 14 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-1
  - new upstream release
* Mon Mar 05 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.3.beta3
  - add obsoletes to assist multilib updates (#799636)
* Wed Feb 29 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.2.beta3
  - epoch bumped to 1 due to revert to 1.0.0g on Fedora 17
  - new upstream release from the 1.0.1 branch
  - fix s390x build (#798411)
  - versioning for the SSLeay symbol (#794950)
  - add -DPURIFY to build flags (#797323)
  - filter engine provides
  - split the libraries to a separate -libs package
  - add make to requires on the base package (#783446)
* Tue Feb 07 2012 Tomas Mraz <tmraz@redhat.com> 1.0.1-0.1.beta2
  - new upstream release from the 1.0.1 branch, ABI compatible
  - add documentation for the -no_ign_eof option
* Thu Jan 19 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0g-1
  - new upstream release fixing CVE-2012-0050 - DoS regression in
    DTLS support introduced by the previous release (#782795)
* Thu Jan 05 2012 Tomas Mraz <tmraz@redhat.com> 1.0.0f-1
  - new upstream release fixing multiple CVEs
* Tue Nov 22 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-4
  - move the libraries needed for static linking to Libs.private
* Thu Nov 03 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-3
  - do not use AVX instructions when osxsave bit not set
  - add direct known answer tests for SHA2 algorithms
* Wed Sep 21 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-2
  - fix missing initialization of variable in CHIL engine
* Wed Sep 07 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0e-1
  - new upstream release fixing CVE-2011-3207 (#736088)
* Wed Aug 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-8
  - drop the separate engine for Intel acceleration improvements
    and merge in the AES-NI, SHA1, and RC4 optimizations
  - add support for OPENSSL_DISABLE_AES_NI environment variable
    that disables the AES-NI support
* Tue Jul 26 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-7
  - correct openssl cms help output (#636266)
  - more tolerant starttls detection in XMPP protocol (#608239)
* Wed Jul 20 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-6
  - add support for newest Intel acceleration improvements backported
    from upstream by Intel in form of a separate engine
* Thu Jun 09 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-5
  - allow the AES-NI engine in the FIPS mode
* Tue May 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-4
  - add API necessary for CAVS testing of the new DSA parameter generation
* Thu Apr 28 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-3
  - add support for VIA Padlock on 64bit arch from upstream (#617539)
  - do not return bogus values from load_certs (#652286)
* Tue Apr 05 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-2
  - clarify apps help texts for available digest algorithms (#693858)
* Thu Feb 10 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0d-1
  - new upstream release fixing CVE-2011-0014 (OCSP stapling vulnerability)
* Tue Feb 08 2011 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.0.0c-4
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild
* Fri Feb 04 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0c-3
  - add -x931 parameter to openssl genrsa command to use the ANSI X9.31
    key generation method
  - use FIPS-186-3 method for DSA parameter generation
  - add OPENSSL_FIPS_NON_APPROVED_MD5_ALLOW environment variable
    to allow using MD5 when the system is in the maintenance state
    even if the /proc fips flag is on
  - make openssl pkcs12 command work by default in the FIPS mode
* Mon Jan 24 2011 Tomas Mraz <tmraz@redhat.com> 1.0.0c-2
  - listen on ipv6 wildcard in s_server so we accept connections
    from both ipv4 and ipv6 (#601612)
  - fix openssl speed command so it can be used in the FIPS mode
    with FIPS allowed ciphers
* Fri Dec 03 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0c-1
  - new upstream version fixing CVE-2010-4180
* Tue Nov 23 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-3
  - replace the revert for the s390x bignum asm routines with
    fix from upstream
* Mon Nov 22 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-2
  - revert upstream change in s390x bignum asm routines
* Tue Nov 16 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0b-1
  - new upstream version fixing CVE-2010-3864 (#649304)
* Tue Sep 07 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-3
  - make SHLIB_VERSION reflect the library suffix
* Wed Jun 30 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-2
  - openssl man page fix (#609484)
* Fri Jun 04 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0a-1
  - new upstream patch release, fixes CVE-2010-0742 (#598738)
    and CVE-2010-1633 (#598732)
* Wed May 19 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-5
  - pkgconfig files now contain the correct libdir (#593723)
* Tue May 18 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-4
  - make CA dir readable - the private keys are in private subdir (#584810)
* Fri Apr 09 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-3
  - a few fixes from upstream CVS
  - move libcrypto to /lib (#559953)
* Tue Apr 06 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-2
  - set UTC timezone on pod2man run (#578842)
  - make X509_NAME_hash_old work in FIPS mode
* Tue Mar 30 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-1
  - update to final 1.0.0 upstream release
* Tue Feb 16 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.22.beta5
  - make TLS work in the FIPS mode
* Fri Feb 12 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.21.beta5
  - gracefully handle zero length in assembler implementations of
    OPENSSL_cleanse (#564029)
  - do not fail in s_server if client hostname not resolvable (#561260)
* Wed Jan 20 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.20.beta5
  - new upstream release
* Thu Jan 14 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.19.beta4
  - fix CVE-2009-4355 - leak in applications incorrectly calling
    CRYPTO_free_all_ex_data() before application exit (#546707)
  - upstream fix for future TLS protocol version handling
* Wed Jan 13 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.18.beta4
  - add support for Intel AES-NI
* Thu Jan 07 2010 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.17.beta4
  - upstream fix compression handling on session resumption
  - various null checks and other small fixes from upstream
  - upstream changes for the renegotiation info according to the latest draft
* Mon Nov 23 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.16.beta4
  - fix non-fips mingw build (patch by Kalev Lember)
  - add IPV6 fix for DTLS
* Fri Nov 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.15.beta4
  - add better error reporting for the unsafe renegotiation
* Fri Nov 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.14.beta4
  - fix build on s390x
* Wed Nov 18 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.13.beta4
  - disable enforcement of the renegotiation extension on the client (#537962)
  - add fixes from the current upstream snapshot
* Fri Nov 13 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.12.beta4
  - keep the beta status in version number at 3 so we do not have to rebuild
    openssh and possibly other dependencies with too strict version check
* Thu Nov 12 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.11.beta4
  - update to new upstream version, no soname bump needed
  - fix CVE-2009-3555 - note that the fix is bypassed if SSL_OP_ALL is used
    so the compatibility with unfixed clients is not broken. The
    protocol extension is also not final.
* Fri Oct 16 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.10.beta3
  - fix use of freed memory if SSL_CTX_free() is called before
    SSL_free() (#521342)
* Thu Oct 08 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.9.beta3
  - fix typo in DTLS1 code (#527015)
  - fix leak in error handling of d2i_SSL_SESSION()
* Wed Sep 30 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.8.beta3
  - fix RSA and DSA FIPS selftests
  - reenable fixed x86_64 camellia assembler code (#521127)
* Fri Sep 04 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.7.beta3
  - temporarily disable x86_64 camellia assembler code (#521127)
* Mon Aug 31 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.6.beta3
  - fix openssl dgst -dss1 (#520152)
* Wed Aug 26 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.5.beta3
  - drop the compat symlink hacks
* Sat Aug 22 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.4.beta3
  - constify SSL_CIPHER_description()
* Fri Aug 21 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.3.beta3
  - fix WWW:Curl:Easy reference in tsget
* Fri Aug 21 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.2.beta3
  - enable MD-2
* Thu Aug 20 2009 Tomas Mraz <tmraz@redhat.com> 1.0.0-0.1.beta3
  - update to new major upstream release
* Sat Jul 25 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.9.8k-7
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild
* Wed Jul 22 2009 Bill Nottingham <notting@redhat.com>
  - do not build special 'optimized' versions for i686, as that's the base
    arch in Fedora now
* Tue Jun 30 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-6
  - abort if selftests failed and random number generator is polled
  - mention EVP_aes and EVP_sha2xx routines in the manpages
  - add README.FIPS
  - make CA dir absolute path (#445344)
  - change default length for RSA key generation to 2048 (#484101)
* Thu May 21 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-5
  - fix CVE-2009-1377 CVE-2009-1378 CVE-2009-1379
    (DTLS DoS problems) (#501253, #501254, #501572)
* Tue Apr 21 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-4
  - support compatibility DTLS mode for CISCO AnyConnect (#464629)
* Fri Apr 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-3
  - correct the SHLIB_VERSION define
* Wed Apr 15 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-2
  - add support for multiple CRLs with same subject
  - load only dynamic engine support in FIPS mode
* Wed Mar 25 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8k-1
  - update to new upstream release (minor bug fixes, security
    fixes and machine code optimizations only)
* Thu Mar 19 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-10
  - move libraries to /usr/lib (#239375)
* Fri Mar 13 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-9
  - add a static subpackage
* Thu Feb 26 2009 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.9.8j-8
  - Rebuilt for https://fedoraproject.org/wiki/Fedora_11_Mass_Rebuild
* Mon Feb 02 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-7
  - must also verify checksum of libssl.so in the FIPS mode
  - obtain the seed for FIPS rng directly from the kernel device
  - drop the temporary symlinks
* Mon Jan 26 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-6
  - drop the temporary triggerpostun and symlinking in post
  - fix the pkgconfig files and drop the unnecessary buildrequires
    on pkgconfig as it is a rpmbuild dependency (#481419)
* Sat Jan 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-5
  - add temporary triggerpostun to reinstate the symlinks
* Sat Jan 17 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-4
  - no pairwise key tests in non-fips mode (#479817)
* Fri Jan 16 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-3
  - even more robust test for the temporary symlinks
* Fri Jan 16 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-2
  - try to ensure the temporary symlinks exist
* Thu Jan 15 2009 Tomas Mraz <tmraz@redhat.com> 0.9.8j-1
  - new upstream version with necessary soname bump (#455753)
  - temporarily provide symlink to old soname to make it possible to rebuild
    the dependent packages in rawhide
  - add eap-fast support (#428181)
  - add possibility to disable zlib by setting
  - add fips mode support for testing purposes
  - do not null dereference on some invalid smime files
  - add buildrequires pkgconfig (#479493)
* Sun Aug 10 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-11
  - do not add tls extensions to server hello for SSLv3 either
* Mon Jun 02 2008 Joe Orton <jorton@redhat.com> 0.9.8g-10
  - move root CA bundle to ca-certificates package
* Wed May 28 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-9
  - fix CVE-2008-0891 - server name extension crash (#448492)
  - fix CVE-2008-1672 - server key exchange message omit crash (#448495)
* Tue May 27 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-8
  - super-H arch support
  - drop workaround for bug 199604 as it should be fixed in gcc-4.3
* Mon May 19 2008 Tom "spot" Callaway <tcallawa@redhat.com> 0.9.8g-7
  - sparc handling
* Mon Mar 10 2008 Joe Orton <jorton@redhat.com> 0.9.8g-6
  - update to new root CA bundle from mozilla.org (r1.45)
* Wed Feb 20 2008 Fedora Release Engineering <rel-eng@fedoraproject.org> - 0.9.8g-5
  - Autorebuild for GCC 4.3
* Thu Jan 24 2008 Tomas Mraz <tmraz@redhat.com> 0.9.8g-4
  - merge review fixes (#226220)
  - adjust the SHLIB_VERSION_NUMBER to reflect library name (#429846)
* Thu Dec 13 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-3
  - set default paths when no explicit paths are set (#418771)
  - do not add tls extensions to client hello for SSLv3 (#422081)
* Tue Dec 04 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-2
  - enable some new crypto algorithms and features
  - add some more important bug fixes from openssl CVS
* Mon Dec 03 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8g-1
  - update to latest upstream release, SONAME bumped to 7
* Mon Oct 15 2007 Joe Orton <jorton@redhat.com> 0.9.8b-17
  - update to new CA bundle from mozilla.org
* Fri Oct 12 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-16
  - fix CVE-2007-5135 - off-by-one in SSL_get_shared_ciphers (#309801)
  - fix CVE-2007-4995 - out of order DTLS fragments buffer overflow (#321191)
  - add alpha sub-archs (#296031)
* Tue Aug 21 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-15
  - rebuild
* Fri Aug 03 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-14
  - use localhost in testsuite, hopefully fixes slow build in koji
  - CVE-2007-3108 - fix side channel attack on private keys (#250577)
  - make ssl session cache id matching strict (#233599)
* Wed Jul 25 2007 Tomas Mraz <tmraz@redhat.com> 0.9.8b-13
  - allow building on ARM architectures (#245417)
  - use reference timestamps to prevent multilib conflicts (#218064)
  - -devel package must require pkgconfig (#241031)
* Mon Dec 11 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-12
  - detect duplicates in add_dir properly (#206346)
* Thu Nov 30 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-11
  - the previous change still didn't make X509_NAME_cmp transitive
* Thu Nov 23 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-10
  - make X509_NAME_cmp transitive otherwise certificate lookup
    is broken (#216050)
* Thu Nov 02 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-9
  - aliasing bug in engine loading, patch by IBM (#213216)
* Mon Oct 02 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-8
  - CVE-2006-2940 fix was incorrect (#208744)
* Mon Sep 25 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-7
  - fix CVE-2006-2937 - mishandled error on ASN.1 parsing (#207276)
  - fix CVE-2006-2940 - parasitic public keys DoS (#207274)
  - fix CVE-2006-3738 - buffer overflow in SSL_get_shared_ciphers (#206940)
  - fix CVE-2006-4343 - sslv2 client DoS (#206940)
* Tue Sep 05 2006 Tomas Mraz <tmraz@redhat.com> 0.9.8b-6
  - fix CVE-2006-4339 - prevent attack on PKCS#1 v1.5 signatures (#205180)
* Wed Aug 02 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-5
  - set buffering to none on stdio/stdout FILE when bufsize is set (#200580)
    patch by IBM
* Fri Jul 28 2006 Alexandre Oliva <aoliva@redhat.com> - 0.9.8b-4.1
  - rebuild with new binutils (#200330)
* Fri Jul 21 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-4
  - add a temporary workaround for sha512 test failure on s390 (#199604)
* Thu Jul 20 2006 Tomas Mraz <tmraz@redhat.com>
  - add ipv6 support to s_client and s_server (by Jan Pazdziora) (#198737)
  - add patches for BN threadsafety, AES cache collision attack hazard fix and
    pkcs7 code memleak fix from upstream CVS
* Wed Jul 12 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8b-3.1
  - rebuild
* Wed Jun 21 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-3
  - dropped libica and ica engine from build
* Wed Jun 21 2006 Joe Orton <jorton@redhat.com>
  - update to new CA bundle from mozilla.org; adds CA certificates
    from netlock.hu and startcom.org
* Mon Jun 05 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-2
  - fixed a few rpmlint warnings
  - better fix for #173399 from upstream
  - upstream fix for pkcs12
* Thu May 11 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8b-1
  - upgrade to new version, stays ABI compatible
  - there is no more linux/config.h (it was empty anyway)
* Tue Apr 04 2006 Tomas Mraz <tmraz@redhat.com> - 0.9.8a-6
  - fix stale open handles in libica (#177155)
  - fix build if 'rand' or 'passwd' in buildroot path (#178782)
  - initialize VIA Padlock engine (#186857)
* Fri Feb 10 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8a-5.2
  - bump again for double-long bug on ppc(64)
* Tue Feb 07 2006 Jesse Keating <jkeating@redhat.com> - 0.9.8a-5.1
  - rebuilt for new gcc4.1 snapshot and glibc changes
* Thu Dec 15 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-5
  - don't include SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
    in SSL_OP_ALL (#175779)
* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
  - rebuilt
* Tue Nov 29 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-4
  - fix build (-lcrypto was erroneusly dropped) of the updated libica
  - updated ICA engine to 1.3.6-rc3
* Tue Nov 22 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-3
  - disable builtin compression methods for now until they work
    properly (#173399)
* Wed Nov 16 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-2
  - don't set -rpath for openssl binary
* Tue Nov 08 2005 Tomas Mraz <tmraz@redhat.com> 0.9.8a-1
  - new upstream version
  - patches partially renumbered
* Fri Oct 21 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-11
  - updated IBM ICA engine library and patch to latest upstream version
* Wed Oct 12 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-10
  - fix CAN-2005-2969 - remove SSL_OP_MSIE_SSLV2_RSA_PADDING which
    disables the countermeasure against man in the middle attack in SSLv2
    (#169863)
  - use sha1 as default for CA and cert requests - CAN-2005-2946 (#169803)
* Tue Aug 23 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-9
  - add *.so.soversion as symlinks in /lib (#165264)
  - remove unpackaged symlinks (#159595)
  - fixes from upstream (constant time fixes for DSA,
    bn assembler div on ppc arch, initialize memory on realloc)
* Thu Aug 11 2005 Phil Knirsch <pknirsch@redhat.com> 0.9.7f-8
  - Updated ICA engine IBM patch to latest upstream version.
* Thu May 19 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-7
  - fix CAN-2005-0109 - use constant time/memory access mod_exp
    so bits of private key aren't leaked by cache eviction (#157631)
  - a few more fixes from upstream 0.9.7g
* Wed Apr 27 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-6
  - use poll instead of select in rand (#128285)
  - fix Makefile.certificate to point to /etc/pki/tls
  - change the default string mask in ASN1 to PrintableString+UTF8String
* Mon Apr 25 2005 Joe Orton <jorton@redhat.com> 0.9.7f-5
  - update to revision 1.37 of Mozilla CA bundle
* Thu Apr 21 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-4
  - move certificates to _sysconfdir/pki/tls (#143392)
  - move CA directories to _sysconfdir/pki/CA
  - patch the CA script and the default config so it points to the
    CA directories
* Fri Apr 01 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-3
  - uninitialized variable mustn't be used as input in inline
    assembly
  - reenable the x86_64 assembly again
* Thu Mar 31 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-2
  - add back RC4_CHAR on ia64 and x86_64 so the ABI isn't broken
  - disable broken bignum assembly on x86_64
* Wed Mar 30 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7f-1
  - reenable optimizations on ppc64 and assembly code on ia64
  - upgrade to new upstream version (no soname bump needed)
  - disable thread test - it was testing the backport of the
    RSA blinding - no longer needed
  - added support for changing serial number to
    Makefile.certificate (#151188)
  - make ca-bundle.crt a config file (#118903)
* Tue Mar 01 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-3
  - libcrypto shouldn't depend on libkrb5 (#135961)
* Mon Feb 28 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-2
  - rebuild
* Mon Feb 28 2005 Tomas Mraz <tmraz@redhat.com> 0.9.7e-1
  - new upstream source, updated patches
  - added patch so we are hopefully ABI compatible with upcoming
    0.9.7f
* Thu Feb 10 2005 Tomas Mraz <tmraz@redhat.com>
  - Support UTF-8 charset in the Makefile.certificate (#134944)
  - Added cmp to BuildPrereq
* Thu Jan 27 2005 Joe Orton <jorton@redhat.com> 0.9.7a-46
  - generate new ca-bundle.crt from Mozilla certdata.txt (revision 1.32)
* Thu Dec 23 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-45
  - Fixed and updated libica-1.3.4-urandom.patch patch (#122967)
* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-44
  - rebuild
* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-43
  - rebuild
* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-42
  - rebuild
* Fri Nov 19 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-41
  - remove der_chop, as upstream cvs has done (CAN-2004-0975, #140040)
* Tue Oct 05 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-40
  - Include latest libica version with important bugfixes
* Tue Jun 15 2004 Elliot Lee <sopwith@redhat.com>
  - rebuilt
* Mon Jun 14 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-38
  - Updated ICA engine IBM patch to latest upstream version.
* Mon Jun 07 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-37
  - build for linux-alpha-gcc instead of alpha-gcc on alpha (Jeff Garzik)
* Tue May 25 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-36
  - handle %{_arch}=i486/i586/i686/athlon cases in the intermediate
    header (#124303)
* Thu Mar 25 2004 Joe Orton <jorton@redhat.com> 0.9.7a-35
  - add security fixes for CAN-2004-0079, CAN-2004-0112
* Tue Mar 16 2004 Phil Knirsch <pknirsch@redhat.com>
  - Fixed libica filespec.
* Thu Mar 11 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-34
  - ppc/ppc64 define __powerpc__/__powerpc64__, not __ppc__/__ppc64__, fix
    the intermediate header
* Wed Mar 10 2004 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-33
  - add an intermediate <openssl/opensslconf.h> which points to the right
    arch-specific opensslconf.h on multilib arches
* Tue Mar 02 2004 Elliot Lee <sopwith@redhat.com>
  - rebuilt
* Thu Feb 26 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-32
  - Updated libica to latest upstream version 1.3.5.
* Tue Feb 17 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-31
  - Update ICA crypto engine patch from IBM to latest version.
* Fri Feb 13 2004 Elliot Lee <sopwith@redhat.com>
  - rebuilt
* Fri Feb 13 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-29
  - rebuilt
* Wed Feb 11 2004 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-28
  - Fixed libica build.
* Wed Feb 04 2004 Nalin Dahyabhai <nalin@redhat.com>
  - add "-ldl" to link flags added for Linux-on-ARM (#99313)
* Wed Feb 04 2004 Joe Orton <jorton@redhat.com> 0.9.7a-27
  - updated ca-bundle.crt: removed expired GeoTrust roots, added
    freessl.com root, removed trustcenter.de Class 0 root
* Sun Nov 30 2003 Tim Waugh <twaugh@redhat.com> 0.9.7a-26
  - Fix link line for libssl (bug #111154).
* Fri Oct 24 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-25
  - add dependency on zlib-devel for the -devel package, which depends on zlib
    symbols because we enable zlib for libssl (#102962)
* Fri Oct 24 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-24
  - Use /dev/urandom instead of PRNG for libica.
  - Apply libica-1.3.5 fix for /dev/urandom in icalinux.c
  - Use latest ICA engine patch from IBM.
* Sat Oct 04 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22.1
  - rebuild
* Wed Oct 01 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22
  - rebuild (22 wasn't actually built, fun eh?)
* Tue Sep 30 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-23
  - re-disable optimizations on ppc64
* Tue Sep 30 2003 Joe Orton <jorton@redhat.com>
  - add a_mbstr.c fix for 64-bit platforms from CVS
* Tue Sep 30 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-22
  - add -Wa,--noexecstack to RPM_OPT_FLAGS so that assembled modules get tagged
    as not needing executable stacks
* Mon Sep 29 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-21
  - rebuild
* Thu Sep 25 2003 Nalin Dahyabhai <nalin@redhat.com>
  - re-enable optimizations on ppc64
* Thu Sep 25 2003 Nalin Dahyabhai <nalin@redhat.com>
  - remove exclusivearch
* Wed Sep 24 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-20
  - only parse a client cert if one was requested
  - temporarily exclusivearch for %{ix86}
* Tue Sep 23 2003 Nalin Dahyabhai <nalin@redhat.com>
  - add security fixes for protocol parsing bugs (CAN-2003-0543, CAN-2003-0544)
    and heap corruption (CAN-2003-0545)
  - update RHNS-CA-CERT files
  - ease back on the number of threads used in the threading test
* Wed Sep 17 2003 Matt Wilson <msw@redhat.com> 0.9.7a-19
  - rebuild to fix gzipped file md5sums (#91211)
* Mon Aug 25 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-18
  - Updated libica to version 1.3.4.
* Thu Jul 17 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-17
  - rebuild
* Tue Jul 15 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-10.9
  - free the kssl_ctx structure when we free an SSL structure (#99066)
* Fri Jul 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-16
  - rebuild
* Thu Jul 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-15
  - lower thread test count on s390x
* Tue Jul 08 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-14
  - rebuild
* Thu Jun 26 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-13
  - disable assembly on arches where it seems to conflict with threading
* Thu Jun 26 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-12
  - Updated libica to latest upstream version 1.3.0
* Wed Jun 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-9.9
  - rebuild
* Wed Jun 11 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-11
  - rebuild
* Tue Jun 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-10
  - ubsec: don't stomp on output data which might also be input data
* Tue Jun 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-9
  - temporarily disable optimizations on ppc64
* Mon Jun 09 2003 Nalin Dahyabhai <nalin@redhat.com>
  - backport fix for engine-used-for-everything from 0.9.7b
  - backport fix for prng not being seeded causing problems, also from 0.9.7b
  - add a check at build-time to ensure that RSA is thread-safe
  - keep perlpath from stomping on the libica configure scripts
* Fri Jun 06 2003 Nalin Dahyabhai <nalin@redhat.com>
  - thread-safety fix for RSA blinding
* Wed Jun 04 2003 Elliot Lee <sopwith@redhat.com> 0.9.7a-8
  - rebuilt
* Fri May 30 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7a-7
  - Added libica-1.2 to openssl (featurerequest).
* Wed Apr 16 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-6
  - fix building with incorrect flags on ppc64
* Wed Mar 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-5
  - add patch to harden against Klima-Pokorny-Rosa extension of Bleichenbacher's
    attack (CAN-2003-0131)
* Mon Mar 17 2003 Nalin Dahyabhai <nalin@redhat.com>  0.9.7a-4
  - add patch to enable RSA blinding by default, closing a timing attack
    (CAN-2003-0147)
* Wed Mar 05 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-3
  - disable use of BN assembly module on x86_64, but continue to allow inline
    assembly (#83403)
* Thu Feb 27 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-2
  - disable EC algorithms
* Wed Feb 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7a-1
  - update to 0.9.7a
* Wed Feb 19 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-8
  - add fix to guard against attempts to allocate negative amounts of memory
  - add patch for CAN-2003-0078, fixing a timing attack
* Thu Feb 13 2003 Elliot Lee <sopwith@redhat.com> 0.9.7-7
  - Add openssl-ppc64.patch
* Mon Feb 10 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-6
  - EVP_DecryptInit should call EVP_CipherInit() instead of EVP_CipherInit_ex(),
    to get the right behavior when passed uninitialized context structures
    (#83766)
  - build with -mcpu=ev5 on alpha family (#83828)
* Wed Jan 22 2003 Tim Powers <timp@redhat.com>
  - rebuilt
* Fri Jan 17 2003 Phil Knirsch <pknirsch@redhat.com> 0.9.7-4
  - Added IBM hw crypto support patch.
* Wed Jan 15 2003 Nalin Dahyabhai <nalin@redhat.com>
  - add missing builddep on sed
* Thu Jan 09 2003 Bill Nottingham <notting@redhat.com> 0.9.7-3
  - debloat
  - fix broken manpage symlinks
* Wed Jan 08 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-2
  - fix double-free in 'openssl ca'
* Fri Jan 03 2003 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-1
  - update to 0.9.7 final
* Tue Dec 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.7-0
  - update to 0.9.7 beta6 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)
* Wed Dec 11 2002 Nalin Dahyabhai <nalin@redhat.com>
  - update to 0.9.7 beta5 (DO NOT USE UNTIL UPDATED TO FINAL 0.9.7)
* Tue Oct 22 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-30
  - add configuration stanza for x86_64 and use it on x86_64
  - build for linux-ppc on ppc
  - start running the self-tests again
* Wed Oct 02 2002 Elliot Lee <sopwith@redhat.com> 0.9.6b-29hammer.3
  - Merge fixes from previous hammer packages, including general x86-64 and
    multilib
* Tue Aug 06 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-29
  - rebuild
* Thu Aug 01 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-28
  - update asn patch to fix accidental reversal of a logic check
* Wed Jul 31 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-27
  - update asn patch to reduce chance that compiler optimization will remove
    one of the added tests
* Wed Jul 31 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-26
  - rebuild
* Mon Jul 29 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-25
  - add patch to fix ASN.1 vulnerabilities
* Thu Jul 25 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-24
  - add backport of Ben Laurie's patches for OpenSSL 0.9.6d
* Wed Jul 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-23
  - own {_datadir}/ssl/misc
* Fri Jun 21 2002 Tim Powers <timp@redhat.com>
  - automated rebuild
* Sun May 26 2002 Tim Powers <timp@redhat.com>
  - automated rebuild
* Fri May 17 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-20
  - free ride through the build system (whee!)
* Thu May 16 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-19
  - rebuild in new environment
* Thu Apr 04 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-17, 0.9.6b-18
  - merge RHL-specific bits into stronghold package, rename
* Tue Apr 02 2002 Gary Benson <gbenson@redhat.com> stronghold-0.9.6c-2
  - add support for Chrysalis Luna token
* Tue Mar 26 2002 Gary Benson <gbenson@redhat.com>
  - disable AEP random number generation, other AEP fixes
* Fri Mar 15 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-15
  - only build subpackages on primary arches
* Thu Mar 14 2002 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-13
  - on ia32, only disable use of assembler on i386
  - enable assembly on ia64
* Mon Jan 07 2002 Florian La Roche <Florian.LaRoche@redhat.de> 0.9.6b-11
  - fix sparcv9 entry
* Mon Jan 07 2002 Gary Benson <gbenson@redhat.com> stronghold-0.9.6c-1
  - upgrade to 0.9.6c
  - bump BuildArch to i686 and enable assembler on all platforms
  - synchronise with shrimpy and rawhide
  - bump soversion to 3
* Wed Oct 10 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  - delete BN_LLONG for s390x, patch from Oliver Paukstadt
* Mon Sep 17 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-9
  - update AEP driver patch
* Mon Sep 10 2001 Nalin Dahyabhai <nalin@redhat.com>
  - adjust RNG disabling patch to match version of patch from Broadcom
* Fri Sep 07 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-8
  - disable the RNG in the ubsec engine driver
* Tue Aug 28 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-7
  - tweaks to the ubsec engine driver
* Fri Aug 24 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-6
  - tweaks to the ubsec engine driver
* Thu Aug 23 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-5
  - update ubsec engine driver from Broadcom
* Fri Aug 10 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-4
  - move man pages back to %{_mandir}/man?/foo.?ssl from
    %{_mandir}/man?ssl/foo.?
  - add an [ engine ] section to the default configuration file
* Thu Aug 09 2001 Nalin Dahyabhai <nalin@redhat.com>
  - add a patch for selecting a default engine in SSL_library_init()
* Mon Jul 23 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-3
  - add patches for AEP hardware support
  - add patch to keep trying when we fail to load a cert from a file and
    there are more in the file
  - add missing prototype for ENGINE_ubsec() in engine_int.h
* Wed Jul 18 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-2
  - actually add hw_ubsec to the engine list
* Tue Jul 17 2001 Nalin Dahyabhai <nalin@redhat.com>
  - add in the hw_ubsec driver from CVS
* Wed Jul 11 2001 Nalin Dahyabhai <nalin@redhat.com> 0.9.6b-1
  - update to 0.9.6b
* Thu Jul 05 2001 Nalin Dahyabhai <nalin@redhat.com>
  - move .so symlinks back to %{_libdir}
* Tue Jul 03 2001 Nalin Dahyabhai <nalin@redhat.com>
  - move shared libraries to /lib (#38410)
* Mon Jun 25 2001 Nalin Dahyabhai <nalin@redhat.com>
  - switch to engine code base
* Mon Jun 18 2001 Nalin Dahyabhai <nalin@redhat.com>
  - add a script for creating dummy certificates
  - move man pages from %{_mandir}/man?/foo.?ssl to %{_mandir}/man?ssl/foo.?
* Thu Jun 07 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  - add s390x support
* Fri Jun 01 2001 Nalin Dahyabhai <nalin@redhat.com>
  - change two memcpy() calls to memmove()
  - don't define L_ENDIAN on alpha
* Wed May 23 2001 Joe Orton <jorton@redhat.com> stronghold-0.9.6a-1
  - Add 'stronghold-' prefix to package names.
  - Obsolete standard openssl packages.
* Wed May 16 2001 Joe Orton <jorton@redhat.com>
  - Add BuildArch: i586 as per Nalin's advice.
* Tue May 15 2001 Joe Orton <jorton@redhat.com>
  - Enable assembler on ix86 (using new .tar.bz2 which does
    include the asm directories).
* Tue May 15 2001 Nalin Dahyabhai <nalin@redhat.com>
  - make subpackages depend on the main package
* Tue May 01 2001 Nalin Dahyabhai <nalin@redhat.com>
  - adjust the hobble script to not disturb symlinks in include/ (fix from
    Joe Orton)
* Fri Apr 27 2001 Nalin Dahyabhai <nalin@redhat.com>
  - drop the m2crypo patch we weren't using
* Tue Apr 24 2001 Nalin Dahyabhai <nalin@redhat.com>
  - configure using "shared" as well
* Sun Apr 08 2001 Nalin Dahyabhai <nalin@redhat.com>
  - update to 0.9.6a
  - use the build-shared target to build shared libraries
  - bump the soversion to 2 because we're no longer compatible with
    our 0.9.5a packages or our 0.9.6 packages
  - drop the patch for making rsatest a no-op when rsa null support is used
  - put all man pages into <section>ssl instead of <section>
  - break the m2crypto modules into a separate package
* Tue Mar 13 2001 Nalin Dahyabhai <nalin@redhat.com>
  - use BN_LLONG on s390
* Mon Mar 12 2001 Nalin Dahyabhai <nalin@redhat.com>
  - fix the s390 changes for 0.9.6 (isn't supposed to be marked as 64-bit)
* Sat Mar 03 2001 Nalin Dahyabhai <nalin@redhat.com>
  - move c_rehash to the perl subpackage, because it's a perl script now
* Fri Mar 02 2001 Nalin Dahyabhai <nalin@redhat.com>
  - update to 0.9.6
  - enable MD2
  - use the libcrypto.so and libssl.so targets to build shared libs with
  - bump the soversion to 1 because we're no longer compatible with any of
    the various 0.9.5a packages circulating around, which provide lib*.so.0
* Wed Feb 28 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  - change hobble-openssl for disabling MD2 again
* Tue Feb 27 2001 Nalin Dahyabhai <nalin@redhat.com>
  - re-disable MD2 -- the EVP_MD_CTX structure would grow from 100 to 152
    bytes or so, causing EVP_DigestInit() to zero out stack variables in
    apps built against a version of the library without it
* Mon Feb 26 2001 Nalin Dahyabhai <nalin@redhat.com>
  - disable some inline assembly, which on x86 is Pentium-specific
  - re-enable MD2 (see http://www.ietf.org/ietf/IPR/RSA-MD-all)
* Thu Feb 08 2001 Florian La Roche <Florian.LaRoche@redhat.de>
  - fix s390 patch
* Fri Dec 08 2000 Than Ngo <than@redhat.com>
  - added support s390
* Mon Nov 20 2000 Nalin Dahyabhai <nalin@redhat.com>
  - remove -Wa,* and -m* compiler flags from the default Configure file (#20656)
  - add the CA.pl man page to the perl subpackage
* Thu Nov 02 2000 Nalin Dahyabhai <nalin@redhat.com>
  - always build with -mcpu=ev5 on alpha
* Tue Oct 31 2000 Nalin Dahyabhai <nalin@redhat.com>
  - add a symlink from cert.pem to ca-bundle.crt
* Wed Oct 25 2000 Nalin Dahyabhai <nalin@redhat.com>
  - add a ca-bundle file for packages like Samba to reference for CA certificates
* Tue Oct 24 2000 Nalin Dahyabhai <nalin@redhat.com>
  - remove libcrypto's crypt(), which doesn't handle md5crypt (#19295)
* Mon Oct 02 2000 Nalin Dahyabhai <nalin@redhat.com>
  - add unzip as a buildprereq (#17662)
  - update m2crypto to 0.05-snap4
* Tue Sep 26 2000 Bill Nottingham <notting@redhat.com>
  - fix some issues in building when it's not installed
* Wed Sep 06 2000 Nalin Dahyabhai <nalin@redhat.com>
  - make sure the headers we include are the ones we built with (aaaaarrgh!)
* Fri Sep 01 2000 Nalin Dahyabhai <nalin@redhat.com>
  - add Richard Henderson's patch for BN on ia64
  - clean up the changelog
* Tue Aug 29 2000 Nalin Dahyabhai <nalin@redhat.com>
  - fix the building of python modules without openssl-devel already installed
* Wed Aug 23 2000 Nalin Dahyabhai <nalin@redhat.com>
  - byte-compile python extensions without the build-root
  - adjust the makefile to not remove temporary files (like .key files when
    building .csr files) by marking them as .PRECIOUS
* Sat Aug 19 2000 Nalin Dahyabhai <nalin@redhat.com>
  - break out python extensions into a subpackage
* Mon Jul 17 2000 Nalin Dahyabhai <nalin@redhat.com>
  - tweak the makefile some more
* Tue Jul 11 2000 Nalin Dahyabhai <nalin@redhat.com>
  - disable MD2 support
* Thu Jul 06 2000 Nalin Dahyabhai <nalin@redhat.com>
  - disable MDC2 support
* Sun Jul 02 2000 Nalin Dahyabhai <nalin@redhat.com>
  - tweak the disabling of RC5, IDEA support
  - tweak the makefile
* Thu Jun 29 2000 Nalin Dahyabhai <nalin@redhat.com>
  - strip binaries and libraries
  - rework certificate makefile to have the right parts for Apache
* Wed Jun 28 2000 Nalin Dahyabhai <nalin@redhat.com>
  - use %{_perl} instead of /usr/bin/perl
  - disable alpha until it passes its own test suite
* Fri Jun 09 2000 Nalin Dahyabhai <nalin@redhat.com>
  - move the passwd.1 man page out of the passwd package's way
* Fri Jun 02 2000 Nalin Dahyabhai <nalin@redhat.com>
  - update to 0.9.5a, modified for U.S.
  - add perl as a build-time requirement
  - move certificate makefile to another package
  - disable RC5, IDEA, RSA support
  - remove optimizations for now
* Wed Mar 01 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  - Bero told me to move the Makefile into this package
* Wed Mar 01 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  - add lib*.so symlinks to link dynamically against shared libs
* Tue Feb 29 2000 Florian La Roche <Florian.LaRoche@redhat.de>
  - update to 0.9.5
  - run ldconfig directly in post/postun
  - add FAQ
* Sat Dec 18 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  - Fix build on non-x86 platforms
* Fri Nov 12 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  - move /usr/share/ssl/* from -devel to main package
* Tue Oct 26 1999 Bernhard Rosenkrdnzer <bero@redhat.de>
  - inital packaging
  - changes from base:
    - Move /usr/local/ssl to /usr/share/ssl for FHS compliance
    - handle RPM_OPT_FLAGS

Files

/usr/lib64/libcrypto.a
/usr/lib64/libssl.a


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Mar 23 03:05:35 2024