Secure Sockets and Transport Layer Security
The OpenSSL Project is a collaborative effort to develop a robust,
commercial-grade, full-featured, and open source toolkit implementing
the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS
v1) protocols with full-strength cryptography. The project is managed
by a worldwide community of volunteers that use the Internet to
communicate, plan, and develop the OpenSSL toolkit and its related
documentation.
Derivation and License
OpenSSL is based on the excellent SSLeay library developed by Eric A.
Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an
pache-style license, which basically means that you are free to get it
and to use it for commercial and noncommercial purposes.
- Sources inherited from project windows:mingw:win64
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:Guillaume_G:WSL/mingw64-openssl-1_1 && cd $_
- Create Badge
Source Files
Revision 5 (latest revision is 8)
- Add openssl-update_expired_certificates.patch - Rebase openssl-1.1-fix-mingw-compile.patch - Update to 1.1.1n: [bsc#1196877, CVE-2022-0778] * Security fix [CVE-2022-0778]: Infinite loop for non-prime moduli in BN_mod_sqrt() reachable when parsing certificates. * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489) to the list of ciphersuites providing Perfect Forward Secrecy as required by SECLEVEL >= 3. * Rebase openssl-1.1.1-fips.patch openssl-1.1.1-evp-kdf.patch - Security fix: [bsc#1192820, CVE-2002-20001] * Fix DHEATER: The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE calculation. * Stop recommending the DHE in SSL_DEFAULT_SUSE_CIPHER_LIST * Rebase openssl-DEFAULT_SUSE_cipher.patch - Fix the engines section in <prefix>/etc/ssl/openssl.cnf [bsc#1194187] * In an INI-type file, the sections begin with a [section_name] and they run until the next section begins. * Rebase openssl-1_1-use-include-directive.patch - FIPS: Fix function and reason error codes [bsc#1182959] * Add openssl-1_1-FIPS-fix-error-reason-codes.patch - Enable zlib compression support [bsc#1195149] - Backport cryptographic improvements from OpenSSL 3 [jsc#SLE-19742] * Optimize RSA on armv8: openssl-1_1-Optimize-RSA-armv8.patch * Optimize AES-XTS mode for aarch64: openssl-1_1-Optimize-AES-XTS-aarch64.patch * Optimize AES-GCM for uarchs with unroll and new instructions: openssl-1_1-Optimize-AES-GCM-uarchs.patch - POWER10 performance enhancements for cryptography [jsc#SLE-18136] * openssl-1_1-Optimize-ppc64.patch
Comments 2
Is the openssl-1.1.1-fips patch right? I'm looking on it and seens like it's searching for a *.so.VERSION library (linux format). Wondering if this can be the reason for que fips selftest erros I'm getting in windows.
I do not think that this could be the reason as those filenames are fixed by openssl-1.1-fix-mingw-compile.patch. If the issue persists, feel free to open a bug report, see https://en.opensuse.org/Build:projects:windows:mingw for details.