Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package openssl-3 for openSUSE:Factory 
checked in at 2022-03-23 20:19:11
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openssl-3 (Old)
 and      /work/SRC/openSUSE:Factory/.openssl-3.new.25692 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openssl-3"

Wed Mar 23 20:19:11 2022 rev:3 rq:964296 version:3.0.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/openssl-3/openssl-3.changes      2022-03-16 
20:20:41.740980107 +0100
+++ /work/SRC/openSUSE:Factory/.openssl-3.new.25692/openssl-3.changes   
2022-03-23 20:21:04.070554054 +0100
@@ -1,0 +2,13 @@
+Sat Mar 19 10:05:22 UTC 2022 - Pedro Monreal <pmonr...@suse.com>
+
+- Enable zlib compression support [bsc#1195149]
+
+-------------------------------------------------------------------
+Fri Mar 18 22:27:34 UTC 2022 - Pedro Monreal <pmonr...@suse.com>
+
+- Add crypto-policies support.
+  * Fix some tests that couldn't find the openssl3.cnf location
+  * Rebase patch:
+    openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ openssl-3.spec ++++++
--- /var/tmp/diff_new_pack.70nF89/_old  2022-03-23 20:21:04.830554484 +0100
+++ /var/tmp/diff_new_pack.70nF89/_new  2022-03-23 20:21:04.838554488 +0100
@@ -49,8 +49,12 @@
 Patch9:         openssl-use-versioned-config.patch
 Patch10:        fix-config-in-tests.patch
 BuildRequires:  pkgconfig
+BuildRequires:  pkgconfig(zlib)
 # Add requires for ct_log_list.cnf{,.dist}
 Requires:       openssl
+%if 0%{?suse_version} >= 1550 || 0%{?sle_version} >= 150400
+Requires:       crypto-policies
+%endif
 
 %description
 OpenSSL is a software library to be used in applications that need to
@@ -60,6 +64,9 @@
 
 %package -n libopenssl3
 Summary:        Secure Sockets and Transport Layer Security
+%if 0%{?suse_version} >= 1550 || 0%{?sle_version} >= 150400
+Requires:       crypto-policies
+%endif
 Recommends:     ca-certificates-mozilla
 
 %description -n libopenssl3
@@ -71,6 +78,7 @@
 %package -n libopenssl-3-devel
 Summary:        Development files for OpenSSL
 Requires:       libopenssl3 = %{version}
+Requires:       pkgconfig(zlib)
 Recommends:     %{name} = %{version}
 # We need to have around only the exact version we are able to operate with
 Conflicts:      libopenssl-devel < %{version}
@@ -112,6 +120,7 @@
     enable-ec_nistp_64_gcc_128 \
 %endif
     enable-camellia \
+    zlib \
     --prefix=%{_prefix} \
     --libdir=%{_lib} \
     --openssldir=%{ssletcdir} \
@@ -125,7 +134,8 @@
     -DOPENSSL_NO_BUF_FREELISTS \
     $(getconf LFS_CFLAGS) \
     -Wall \
-    --with-rand-seed=getrandom
+    --with-rand-seed=getrandom \
+    
--system-ciphers-file=%{_sysconfdir}/crypto-policies/back-ends/openssl.config
 
 # Show build configuration
 perl configdata.pm --dump
@@ -135,16 +145,14 @@
 %make_build all
 
 %check
+
+# We must revert patch8 before running tests, otherwise they will fail.
+patch -p1 -R < %{P:8}
+
 export MALLOC_CHECK_=3
 export MALLOC_PERTURB_=$(($RANDOM % 255 + 1))
 # export HARNESS_VERBOSE=yes
-LD_LIBRARY_PATH="$PWD" make TESTS='-test_req\
-                                  -test_verify_store\
-                                  -test_evp_fetch_prov\
-                                  -test_ca\
-                                  -test_ssl_old\
-                                  -test_tsa'\
-                                 test -j1
+LD_LIBRARY_PATH="$PWD" make TESTS='-test_evp_fetch_prov -test_tsa' test -j1
 # show ciphers
 gcc -o showciphers %{optflags} -I%{buildroot}%{_includedir} %{SOURCE5} 
-L%{buildroot}%{_libdir} -lssl -lcrypto
 LD_LIBRARY_PATH=%{buildroot}%{_libdir} ./showciphers


++++++ openssl-Add-support-for-PROFILE-SYSTEM-system-default-cipher.patch ++++++
--- /var/tmp/diff_new_pack.70nF89/_old  2022-03-23 20:21:04.902554525 +0100
+++ /var/tmp/diff_new_pack.70nF89/_new  2022-03-23 20:21:04.906554527 +0100
@@ -216,14 +216,6 @@
      /* Add TLSv1.3 ciphers first - we always prefer those if possible */
      for (i = 0; i < sk_SSL_CIPHER_num(tls13_ciphersuites); i++) {
          const SSL_CIPHER *sslc = sk_SSL_CIPHER_value(tls13_ciphersuites, i);
-@@ -1656,6 +1713,7 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
-         if (!sk_SSL_CIPHER_push(cipherstack, sslc)) {
-             OPENSSL_free(co_list);
-             sk_SSL_CIPHER_free(cipherstack);
-+            OPENSSL_free(co_list);
-             return NULL;
-         }
-     }
 @@ -1690,6 +1748,14 @@ STACK_OF(SSL_CIPHER) *ssl_create_cipher_
      *cipher_list = cipherstack;
  

Reply via email to