Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: softhsm | Distribution: openSUSE Tumbleweed |
Version: 2.6.1 | Vendor: openSUSE |
Release: 2.1 | Build date: Tue May 21 09:24:23 2024 |
Group: Unspecified | Build host: reproducible |
Size: 1214168 | Source RPM: softhsm-2.6.1-2.1.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.opendnssec.org/ | |
Summary: Software version of a PKCS#11 Hardware Security Module |
OpenDNSSEC is providing a software implementation of a generic cryptographic device with a PKCS#11 interface, the SoftHSM. SoftHSM is designed to meet the requirements of OpenDNSSEC, but can also work together with other cryptographic products because of the PKCS#11 interface.
BSD-2-Clause
* Tue May 21 2024 Matej Cepl <mcepl@cepl.eu> - Use correct SOURCE for /usr/share/p11-kit/modules/softhsm.module (fix bsc#1224356). * Sat May 11 2024 Matej Cepl <mcepl@cepl.eu> - We actually don't need any hard Requires for OpenSSL at all (and yes, rpmlint is right, we shouldn't use it at all). * Tue May 07 2024 Matej Cepl <mcepl@cepl.eu> - Add creation of ods user. * Mon Apr 15 2024 Matej Cepl <mcepl@cepl.eu> - Rebuild with inspiration (and patches) from the Fedora package. - Remove obsolete patch softhsm-rsakeys.patch - Add Fedora patches (comments in SPEC indicate their true origin): - softhsm-openssl3-tests.patch - softhsm-prevent-global-deleted-objects-access.patch - softhsm-2.6.1-rh1831086-exit.patch - softhsm-2.6.1-uninitialized.patch * Thu Apr 21 2022 Marcus Meissner <meissner@suse.com> - switched URL to https * Thu Apr 30 2020 Martin Hauke <mardnh@gmx.de> - Update to version 2.6.1 * Issue #542: Support Ed448/X448 for OpenSSL * Issue #538: Improved warning and compilation issues for GCC10 * Tue Mar 17 2020 Martin Hauke <mardnh@gmx.de> - Update to version 2.6.0 Changes: * Issue #493: Upgrade to Botan 2. * Issue #530: Update appveyor build. * Issue #438: Detect crypto algorithms by default. * Issue #455: Provide a new configuration option to allow enabling and disabling various mechanisms (slots.mechanisms in the softhsm2.conf). * Issue #479: Increase SQLite busy timeout from 15 seconds to 3 minutes. * Issue #513: Add configuration option to reset state on fork closing all sessions rather than keeping all sessions open in duplicate process. * Issue #500: C_WaitForSlotEvent implementation. * Issue #445: Add wrap support with CKM_AES_CBC. Bugfixes: * Issue #418: Set fields to NULL to avoid double free. * Issue #423: ENGINE_load_rdrand is not supported with older openssl. * Issue #429: Updated prerequisite to build from repository. * Issue #434: Fix build issues with CMake. * Issue #435: Fix botan build without EDDSA. * Issue #442: Release resources from OSSLEVPSymmetricAlgorithm. * Issue #449/#502: Do not copy zero sized buffer avoid null pointer reference. * Issue #464: Race condition with multiple threads closing last session and opening a newer sessions. * Issue #452: Fixes to automake build fir undefined macros. * Issue #462: User PIN count wrongly calculated. * Issue #516: Fix memory leak in OSSLCryptoFactory. * Issue #494: Allow null pointers as arguments when count is zero. * Issue #518: Sporadic problem in closing sessions because of lookup of object without prior locking. * Issue #506: Check key type for C_EncryptInit and C_DecryptInit. * Issue #526: Adjust EDDSA code to return valid EC_PARAMS. * Issue #452: Autogen failure on undefined macro AC_MSG_ERROR. * Issue #527: Fixed some build errors for GCC 10. * Issue #470: Null pointer arguments validation for C_EncryptFinal, etc. * Mon May 20 2019 Christophe Giboudeaux <christophe@krop.fr> - Add the missing zlib requirement. * Mon Sep 24 2018 Michael Ströder <michael@stroeder.com> - Update to version 2.5.0 Updates: * Issue #323: Support for EDDSA with vendor defined mechanisms. * Issue #362: CMake Build System Support for SoftHSM. * Issue #368: Support migrating 32-bit SoftHSMv1 DB on 64-bit system (LP64). * Issue #385: Default is not to build EDDSA since it has not been released in OpenSSL. * Issue #387: Windows: Add VS2017 detection to Configure.py. * Issue #412: Replace PKCS11 headers with a version from p11-kit. Bugfixes: * Issue #366: Support cross-compilation. * Issue #377: Duplicate symbol error with custom p11test. * Issue #386: Use RDRAND in OpenSSL if that engine is available. * Issue #388: Update DBTests.cpp to fix x86 test failure. * Issue #393: Not setting CKA_PUBLIC_KEY_INFO correctly. * Issue #401: Wrong key and keyserver mentioned in installation documentation. * Issue #408: Remove mutex callbacks after C_Finalize(). * Tue Feb 27 2018 mardnh@gmx.de - Update to version 2.4.0 * Support PKCS#8 for GOST. * Support for CKA_ALLOWED_MECHANISMS. * Support CKA_ALWAYS_AUTHENTICATE for private key objects. * Support for CKM_DES3_CMAC and CKM_AES_CMAC. * Support for CKM_AES_GCM. * Document that initialized tokens will be reassigned to another slot (based on the token serial number). * Support for CKM_RSA_PKCS_PSS. * Import AES keys with softhsm2-util. * softhsm2-util will check the configuration and report any issues before loading the PKCS#11 library.
/etc/softhsm2.conf /usr/bin/softhsm2-dump-file /usr/bin/softhsm2-keyconv /usr/bin/softhsm2-migrate /usr/bin/softhsm2-pk11install /usr/bin/softhsm2-util /usr/lib/sysusers.d/ods-user.conf /usr/lib64/pkcs11/libsofthsm2.so /usr/lib64/softhsm /usr/lib64/softhsm/libsofthsm.so /usr/share/doc/packages/softhsm /usr/share/doc/packages/softhsm/FIPS-NOTES.md /usr/share/doc/packages/softhsm/NEWS /usr/share/doc/packages/softhsm/README.md /usr/share/doc/packages/softhsm/fedora.changelog /usr/share/licenses/softhsm /usr/share/licenses/softhsm/LICENSE /usr/share/man/man1/softhsm2-dump-file.1.gz /usr/share/man/man1/softhsm2-keyconv.1.gz /usr/share/man/man1/softhsm2-migrate.1.gz /usr/share/man/man1/softhsm2-util.1.gz /usr/share/man/man5/softhsm2.conf.5.gz /usr/share/p11-kit/modules/softhsm.module /usr/share/p11-kit/modules/softhsm2.module /var/lib/softhsm /var/lib/softhsm/tokens
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Nov 13 00:41:02 2024