openssl-1.0.1i-21.1.x86_64.rpm


Advertisement

Description

openssl - Secure Sockets and Transport Layer Security

Distribution: openSUSE 42.1
Repository: openSUSE Update Oss all
Package name: openssl
Package version: 1.0.1i
Package release: 21.1
Package architecture: x86_64
Package type: rpm
Installed size: 1.31 MB
Download size: 562.74 KB
Official Mirror: ftp.gwdg.de
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and open source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL toolkit and its related documentation. Derivation and License OpenSSL is based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson. The OpenSSL toolkit is licensed under an Apache-style license, which basically means that you are free to get it and to use it for commercial and noncommercial purposes.

Alternatives

Provides

  • config(openssl) = 1.0.1i-21.1
  • openssl = 1.0.1i-21.1
  • openssl(x86-64) = 1.0.1i-21.1
  • ssl

    Download

    Install Howto

    Install openssl rpm package:

    # zypper install openssl

    Files

    • /etc/ssl/openssl.cnf
    • /etc/ssl/private/
    • /usr/bin/c_rehash
    • /usr/bin/fips_standalone_hmac
    • /usr/bin/openssl
    • /usr/share/doc/packages/openssl/AVAILABLE_CIPHERS
    • /usr/share/doc/packages/openssl/CHANGES
    • /usr/share/doc/packages/openssl/CHANGES.SSLeay
    • /usr/share/doc/packages/openssl/INSTALL
    • /usr/share/doc/packages/openssl/INSTALL.DJGPP
    • /usr/share/doc/packages/openssl/INSTALL.MacOS
    • /usr/share/doc/packages/openssl/INSTALL.NW
    • /usr/share/doc/packages/openssl/INSTALL.OS2
    • /usr/share/doc/packages/openssl/INSTALL.VMS
    • /usr/share/doc/packages/openssl/INSTALL.W32
    • /usr/share/doc/packages/openssl/INSTALL.W64
    • /usr/share/doc/packages/openssl/INSTALL.WCE
    • /usr/share/doc/packages/openssl/LICENSE
    • /usr/share/doc/packages/openssl/NEWS
    • /usr/share/doc/packages/openssl/README
    • /usr/share/doc/packages/openssl/README-FIPS.txt
    • /usr/share/doc/packages/openssl/README.SUSE
    • /usr/share/man/man1/asn1parse.1ssl.gz
    • /usr/share/man/man1/ca.1ssl.gz
    • /usr/share/man/man1/crl.1ssl.gz
    • /usr/share/man/man1/crl2pkcs7.1ssl.gz
    • /usr/share/man/man1/dgst.1ssl.gz
    • /usr/share/man/man1/dhparam.1ssl.gz
    • /usr/share/man/man1/dsa.1ssl.gz
    • /usr/share/man/man1/dsaparam.1ssl.gz
    • /usr/share/man/man1/enc.1ssl.gz
    • /usr/share/man/man1/gendsa.1ssl.gz
    • /usr/share/man/man1/genrsa.1ssl.gz
    • /usr/share/man/man1/nseq.1ssl.gz
    • /usr/share/man/man1/openssl.1ssl.gz
    • /usr/share/man/man1/passwd.1ssl.gz
    • /usr/share/man/man1/pkcs12.1ssl.gz
    • /usr/share/man/man1/pkcs7.1ssl.gz
    • /usr/share/man/man1/pkcs8.1ssl.gz
    • /usr/share/man/man1/rand.1ssl.gz
    • /usr/share/man/man1/req.1ssl.gz
    • /usr/share/man/man1/rsa.1ssl.gz
    • /usr/share/man/man1/rsautl.1ssl.gz
    • /usr/share/man/man1/s_client.1ssl.gz
    • /usr/share/man/man1/s_server.1ssl.gz
    • /usr/share/man/man1/smime.1ssl.gz
    • /usr/share/man/man1/spkac.1ssl.gz
    • /usr/share/man/man1/verify.1ssl.gz
    • /usr/share/man/man1/version.1ssl.gz
    • /usr/share/man/man1/x509.1ssl.gz
    • /usr/share/man/man3/crypto.3ssl.gz
    • /usr/share/man/man3/dsa.3ssl.gz
    • /usr/share/man/man3/rand.3ssl.gz
    • /usr/share/man/man3/rsa.3ssl.gz
    • /usr/share/man/man3/ssl.3ssl.gz
    • /usr/share/man/man3/x509.3ssl.gz
    • /usr/share/man/man5/config.5ssl.gz
    • /usr/share/ssl/
    • /usr/share/ssl/misc/CA.pl
    • /usr/share/ssl/misc/CA.sh
    • /usr/share/ssl/misc/c_hash
    • /usr/share/ssl/misc/c_info
    • /usr/share/ssl/misc/c_issuer
    • /usr/share/ssl/misc/c_name
    • /usr/share/ssl/misc/tsget

    Changelog

    2017-01-31 - vcizek@suse.com - OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641) - ECSDA P-256 timing attack key recovery (bsc#1019334, CVE-2016-7056) - remote denial of service in SSL alert handling (bsc#1005878, CVE-2016-8610) - Truncated packet could crash via OOB read (bsc#1022085, CVE-2017-3731) - degrade 3DES to MEDIUM in SSL2 (bsc#1001912) - fix crash in openssl speed (bsc#1000677) - added patches: * openssl-CVE-2016-7056.patch * openssl-CVE-2016-8610.patch * openssl-CVE-2017-3731.patch * openssl-fix_crash_in_openssl_speed.patch * openssl-degrade_3DES_to_MEDIUM_in_SSL2.patch - add missing commit for CVE-2016-2108 (bsc#1004499) * updated openssl-CVE-2016-2108.patch - fix X509_CERT_FILE path (bsc#1022271) * updated openssl-1.0.1e-truststore.diff

    2016-09-23 - vcizek@suse.com - resume reading from /dev/urandom when interrupted by a signal (bsc#995075) * add openssl-randfile_fread_interrupt.patch

    2016-09-22 - vcizek@suse.com - OpenSSL Security Advisory [22 Sep 2016] (bsc#999665) Severity: High * OCSP Status Request extension unbounded memory growth (CVE-2016-6304) (bsc#999666) Severity: Low * Pointer arithmetic undefined behaviour (CVE-2016-2177) (bsc#982575) * Constant time flag not preserved in DSA signing (CVE-2016-2178) (bsc#983249) * DTLS buffered message DoS (CVE-2016-2179) (bsc#994844) * OOB read in TS_OBJ_print_bio() (CVE-2016-2180) (bsc#990419) * DTLS replay protection DoS (CVE-2016-2181) (bsc#994749) * OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819) * Birthday attack against 64-bit block ciphers (SWEET32) (CVE-2016-2183) (bsc#995359) * Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324) * OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377) * Certificate message OOB reads (CVE-2016-6306) (bsc#999668) - added patches: * openssl-CVE-2016-2177.patch * openssl-CVE-2016-2178.patch * openssl-CVE-2016-2179.patch * openssl-CVE-2016-2180.patch * openssl-CVE-2016-2181.patch * openssl-CVE-2016-2182.patch * openssl-CVE-2016-2183.patch * openssl-CVE-2016-6302.patch * openssl-CVE-2016-6303.patch * openssl-CVE-2016-6304.patch * openssl-CVE-2016-6306.patch

    2016-08-03 - vcizek@suse.com - update expired S/MIME certs (bsc#979475) * add openssl-update-expired-smime-certs.patch - improve s390x performance (bsc#982745) * add openssl-s390x_performance_improvements.patch - allow >= 64GB AESGCM transfers (bsc#988591) * modify openssl-1.0.1i-new-fips-reqs.patch - fix crash in print_notice (bsc#998190) * add openssl-print_notice-NULL_crash.patch

    2016-04-28 - vcizek@suse.com - OpenSSL Security Advisory [3rd May 2016] * Memory corruption in the ASN.1 encoder - bsc#977617 (CVE-2016-2108) * Padding oracle in AES-NI CBC MAC check - bsc#977616 (CVE-2016-2107) * EVP_EncodeUpdate overflow - bsc#977614 (CVE-2016-2105) * EVP_EncryptUpdate overflow - bsc#977615 (CVE-2016-2106) * ASN.1 BIO excessive memory allocation - bsc#976942 (CVE-2016-2109) * add patches + openssl-CVE-2016-2105.patch + openssl-CVE-2016-2106.patch + openssl-CVE-2016-2107.patch + openssl-CVE-2016-2108.patch + openssl-CVE-2016-2109.patch - Fix buffer overrun in ASN1_parse (bsc#976943) * add 0001-Fix-buffer-overrun-in-ASN1_parse.patch - Preserve digests for SNI (bsc#977621) * add 0001-Preserve-digests-for-SNI.patch - Fix openssl enc -non-fips-allow option in FIPS mode (bsc#958501) * modify openssl-fips-dont-fall-back-to-default-digest.patch

    Advertisement
    Advertisement