---

Red Hat Product Enhancement Advisory: OpenSSL cryptography/security library available for Red Hat Linux 6.x

Date: Wed, 11 Oct 2000 12:53 -0400
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHEA-2000:085-02] OpenSSL cryptography/security library
available for Red Hat Linux 6.x


                   Red Hat, Inc. Product Enhancement Advisory

Synopsis:          OpenSSL cryptography/security library available for Red Hat Linux 6.x
Advisory ID:       RHEA-2000:085-02
Issue date:        2000-10-11
Updated on:        2000-10-11
Product:           Red Hat Linux
Keywords:          openssl ssl tls rsa dsa encryption
Cross references:  N/A

1. Topic:

OpenSSL is being made available for Red Hat Linux 6.x. This
release brings cryptographic algorithms and protocols as well as
certificate management to these platforms.

2. Relevant releases/architectures:

Red Hat Linux 6.0 – i386, alpha, sparc
Red Hat Linux 6.1 – i386, alpha, sparc
Red Hat Linux 6.2 – i386, alpha, sparc
Red Hat Linux 6.2EE – i386, alpha, sparc

3. Problem description:

OpenSSL, which was first officially shipped with Red Hat Linux
7.0, has been built and tested on Red Hat Linux 6.0, 6.1, and 6.2.
These packages are being made available so that developers may make
use of the encryption algorithms and protocols it provides, most
notably SSL (Secure Sockets Layer) version 3.0.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

You will need the base package to support SSL and RSA
functionality in future packages. To build programs that need this
functionality, you will need the development subpackage. The
various other packages are bindings for developers using scripting
languages.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
for more info):

N/A

6. RPMs required:

Red Hat Linux 6.x:

alpha:

ftp://updates.redhat.com/6.2/alpha/openssl-0.9.5a-1.6.x.alpha.rpm


ftp://updates.redhat.com/6.2/alpha/openssl-devel-0.9.5a-1.6.x.alpha.rpm


ftp://updates.redhat.com/6.2/alpha/openssl-perl-0.9.5a-1.6.x.alpha.rpm


ftp://updates.redhat.com/6.2/alpha/openssl-python-0.9.5a-1.6.x.alpha.rpm

sparc:

ftp://updates.redhat.com/6.2/sparc/openssl-0.9.5a-1.6.x.sparc.rpm


ftp://updates.redhat.com/6.2/sparc/openssl-devel-0.9.5a-1.6.x.sparc.rpm


ftp://updates.redhat.com/6.2/sparc/openssl-perl-0.9.5a-1.6.x.sparc.rpm


ftp://updates.redhat.com/6.2/sparc/openssl-python-0.9.5a-1.6.x.sparc.rpm

i386:
ftp://updates.redhat.com/6.2/i386/openssl-0.9.5a-1.6.x.i386.rpm


ftp://updates.redhat.com/6.2/i386/openssl-devel-0.9.5a-1.6.x.i386.rpm


ftp://updates.redhat.com/6.2/i386/openssl-perl-0.9.5a-1.6.x.i386.rpm


ftp://updates.redhat.com/6.2/i386/openssl-python-0.9.5a-1.6.x.i386.rpm

sources:
ftp://updates.redhat.com/6.2/SRPMS/openssl-0.9.5a-1.6.x.src.rpm

7. Verification:

MD5 sum                           Package Name

ec20eb60a42420ea45dfb76ad6d3e313 6.2/SRPMS/openssl-0.9.5a-1.6.x.src.rpm
e5fcfd49849a12d1902477097e0d133b 6.2/alpha/openssl-0.9.5a-1.6.x.alpha.rpm
71dee4ad5eac83950443ce1a633e4812 6.2/alpha/openssl-devel-0.9.5a-1.6.x.alpha.rpm
70ae7e28394e3e984122897e52dc5047 6.2/alpha/openssl-perl-0.9.5a-1.6.x.alpha.rpm
640933567bfa6f2909e7e31ac4b07e00 6.2/alpha/openssl-python-0.9.5a-1.6.x.alpha.rpm
a1e4c89a7c5e24fd6e0e2ab2d5b6aac6 6.2/i386/openssl-0.9.5a-1.6.x.i386.rpm
329a894fcee6c9d850fc1343cc9b7564 6.2/i386/openssl-devel-0.9.5a-1.6.x.i386.rpm
6d1fb9a62a9087b107423b964ed9075f 6.2/i386/openssl-perl-0.9.5a-1.6.x.i386.rpm
3c470abfb6acbf87df2731f4ab8ecbda 6.2/i386/openssl-python-0.9.5a-1.6.x.i386.rpm
f7fbdad93fc7dd38fe329cb91ef4f6b8 6.2/sparc/openssl-0.9.5a-1.6.x.sparc.rpm
d23aa9f8fa1012255b2868890f9dbb01 6.2/sparc/openssl-devel-0.9.5a-1.6.x.sparc.rpm
ed01f5f223cbf48fc23f43c5f2ed4bda 6.2/sparc/openssl-perl-0.9.5a-1.6.x.sparc.rpm
dbc1c22b8143b7248645c0fa5ec78e47 6.2/sparc/openssl-python-0.9.5a-1.6.x.sparc.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm –checksig <filename>

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg <filename>

8. References:

N/A

Copyright(c) 2000 Red Hat, Inc.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis