[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHEA-2000:085-02] OpenSSL cryptography/security library available for Red Hat Linux 6.x



---------------------------------------------------------------------
                   Red Hat, Inc. Product Enhancement Advisory

Synopsis:          OpenSSL cryptography/security library available for Red Hat Linux 6.x
Advisory ID:       RHEA-2000:085-02
Issue date:        2000-10-11
Updated on:        2000-10-11
Product:           Red Hat Linux
Keywords:          openssl ssl tls rsa dsa encryption
Cross references:  N/A
---------------------------------------------------------------------

1. Topic:

OpenSSL is being made available for Red Hat Linux 6.x.  This release brings
cryptographic algorithms and protocols as well as certificate management to
these platforms.

2. Relevant releases/architectures:

Red Hat Linux 6.0 - i386, alpha, sparc
Red Hat Linux 6.1 - i386, alpha, sparc
Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 6.2EE - i386, alpha, sparc

3. Problem description:

OpenSSL, which was first officially shipped with Red Hat Linux 7.0, has
been built and tested on Red Hat Linux 6.0, 6.1, and 6.2.  These packages
are being made available so that developers may make use of the encryption
algorithms and protocols it provides, most notably SSL (Secure Sockets
Layer) version 3.0.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

You will need the base package to support SSL and RSA functionality in
future packages.  To build programs that need this functionality, you will
need the development subpackage.  The various other packages are bindings
for developers using scripting languages.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

N/A

6. RPMs required:

Red Hat Linux 6.x:

alpha:
ftp://updates.redhat.com/6.2/alpha/openssl-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-devel-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-perl-0.9.5a-1.6.x.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/openssl-python-0.9.5a-1.6.x.alpha.rpm

sparc:
ftp://updates.redhat.com/6.2/sparc/openssl-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-devel-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-perl-0.9.5a-1.6.x.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/openssl-python-0.9.5a-1.6.x.sparc.rpm

i386:
ftp://updates.redhat.com/6.2/i386/openssl-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-devel-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-perl-0.9.5a-1.6.x.i386.rpm
ftp://updates.redhat.com/6.2/i386/openssl-python-0.9.5a-1.6.x.i386.rpm

sources:
ftp://updates.redhat.com/6.2/SRPMS/openssl-0.9.5a-1.6.x.src.rpm

7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
ec20eb60a42420ea45dfb76ad6d3e313  6.2/SRPMS/openssl-0.9.5a-1.6.x.src.rpm
e5fcfd49849a12d1902477097e0d133b  6.2/alpha/openssl-0.9.5a-1.6.x.alpha.rpm
71dee4ad5eac83950443ce1a633e4812  6.2/alpha/openssl-devel-0.9.5a-1.6.x.alpha.rpm
70ae7e28394e3e984122897e52dc5047  6.2/alpha/openssl-perl-0.9.5a-1.6.x.alpha.rpm
640933567bfa6f2909e7e31ac4b07e00  6.2/alpha/openssl-python-0.9.5a-1.6.x.alpha.rpm
a1e4c89a7c5e24fd6e0e2ab2d5b6aac6  6.2/i386/openssl-0.9.5a-1.6.x.i386.rpm
329a894fcee6c9d850fc1343cc9b7564  6.2/i386/openssl-devel-0.9.5a-1.6.x.i386.rpm
6d1fb9a62a9087b107423b964ed9075f  6.2/i386/openssl-perl-0.9.5a-1.6.x.i386.rpm
3c470abfb6acbf87df2731f4ab8ecbda  6.2/i386/openssl-python-0.9.5a-1.6.x.i386.rpm
f7fbdad93fc7dd38fe329cb91ef4f6b8  6.2/sparc/openssl-0.9.5a-1.6.x.sparc.rpm
d23aa9f8fa1012255b2868890f9dbb01  6.2/sparc/openssl-devel-0.9.5a-1.6.x.sparc.rpm
ed01f5f223cbf48fc23f43c5f2ed4bda  6.2/sparc/openssl-perl-0.9.5a-1.6.x.sparc.rpm
dbc1c22b8143b7248645c0fa5ec78e47  6.2/sparc/openssl-python-0.9.5a-1.6.x.sparc.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:

N/A


Copyright(c) 2000 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]