aboutsummaryrefslogtreecommitdiffstats
path: root/main/openssl/APKBUILD
Commit message (Collapse)AuthorAgeFilesLines
* main/openssl: add aarch64 supportTimo Teräs2016-07-081-1/+2
|
* main/openssl: fix cross buildingTimo Teräs2016-07-061-1/+1
|
* main/openssl: security fix for CVE-2016-2177, CVE-2016-2178Natanael Copa2016-06-221-4/+12
|
* main/openssl: security upgrade to 1.0.2hTimo Teräs2016-05-031-5/+5
| | | | | | | | CVE-2016-2107 Prevent padding oracle in AES-NI CBC MAC check CVE-2016-2105 Fix EVP_EncodeUpdate overflow CVE-2016-2106 Fix EVP_EncryptUpdate overflow CVE-2016-2109 Prevent ASN.1 BIO excessive memory allocation CVE-2016-2176 EBCDIC overread
* main/openssl: build standalone c_rehash for libcryptoTimo Teräs2016-03-111-5/+10
|
* main/openssl: disable the weak cryptosNatanael Copa2016-03-031-2/+1
| | | | They are not needed for keeping ABI compat
* main/openssl: enable ssl2 and weak ciphers now disabled by defaultLeonardo Arena2016-03-011-1/+3
|
* main/openssl: security upgrade to 1.0.2gNatanael Copa2016-03-011-5/+5
| | | | | | | | | | | CVE-2016-0800 [High severity] CVE-2016-0705 [Low severity] CVE-2016-0798 [Low severity] CVE-2016-0797 [Low severity] CVE-2016-0799 [Low severity] CVE-2016-0702 [Low severity] CVE-2016-0703 [High severity] CVE-2016-0704 [Moderate severity]
* main/openssl: add padlock autoload patch backNatanael Copa2016-02-041-1/+1
| | | | | | and clear errors This reverts commit 29f1e13e6f54c24c5fac520555da38e763c6c45b.
* main/openssl: remove padlock autoload patchNatanael Copa2016-02-041-8/+4
| | | | | | | it appears they made padlock static upstream again this fixes nodejs issues ref #4999
* main/openssl: security upgrade to 1.0.2fTimo Teräs2016-01-281-5/+5
| | | | Fixes CVE-2016-0701, CVE-2015-3197
* main/openssl: use suffix for manpagesTimo Teräs2016-01-071-14/+2
| | | | fixes #4991
* main/openssl: new upstream version 1.0.2eChristian Kampka2015-12-041-7/+7
|
* main/openssl: security upgrade to 1.0.1d (CVE-2015-1793)Timo Teräs2015-07-091-7/+7
|
* main/openssl: upgrade to 1.0.2cTimo Teräs2015-06-151-8/+4
|
* main/openssl: security upgrade to 1.0.2bTimo Teräs2015-06-121-8/+12
| | | | | | | | CVE-2015-1788 Malformed ECParameters causes infinite loop CVE-2015-1789 Exploitable out-of-bounds read in X509_cmp_time CVE-2015-1790 PKCS7 crash with missing EnvelopedContent CVE-2015-1792 CMS verify infinite loop with unknown hash function CVE-2015-1791 Race condition handling NewSessionTicket
* main/openssl: fix rpath and turn off ssl compression by defaultTimo Teräs2015-03-271-20/+27
| | | | | System wide mitigation for CVE-2012-4929. While most affected programs turn off compression themselves, this is safer default.
* main/openssl: security upgrade to 1.0.2aTimo Teräs2015-03-191-10/+10
| | | | | | CVE-2015-0291, CVE-2015-0290, CVE-2015-0207, CVE-2015-0286, CVE-2015-0208, CVE-2015-0287, CVE-2015-0289, CVE-2015-0293, CVE-2015-1787, CVE-2015-0285, CVE-2015-0209, CVE-2015-0288
* main/openssl: upgrade to 1.0.2 and rebase all patchesTimo Teräs2015-02-231-76/+60
|
* main/openssl: upgrade to 1.0.1lNatanael Copa2015-01-191-4/+4
|
* main/openssl: security upgrade to 1.0.1kTimo Teräs2015-01-091-7/+7
| | | | | | | | | | | CVE-2014-3571 DTLS segmentation fault in dtls1_get_record CVE-2015-0206 DTLS memory leak in dtls1_buffer_record CVE-2014-3569 no-ssl3 configuration sets method to NULL CVE-2014-3572 ECDHE silently downgrades to ECDH [Client] CVE-2015-0204 RSA silently downgrades to EXPORT_RSA [Client] CVE-2015-0205 DH client certificates accepted without verification [Server] CVE-2014-8275 Certificate fingerprints can be modified CVE-2014-3570 Bignum squaring may produce incorrect results
* Revert "main/openssl: upgrade to 1.0.1k"Bartłomiej Piotrowski2015-01-081-4/+4
| | | | This reverts commit 9bb63edbc546e6253578e5050132c62839e84dff.
* main/openssl: upgrade to 1.0.1kBartłomiej Piotrowski2015-01-081-4/+4
|
* main/openssl: upgrade to 1.0.1jNatanael Copa2014-10-151-5/+5
|
* main/openssl: enable accelerated NIST P-224 and P-256 on x86_64Bartłomiej Piotrowski2014-10-121-3/+4
|
* main/openssl: fix man-pages properlyTimo Teräs2014-08-071-7/+11
| | | | | | | Failed to rebase the manpages patch properly. This removes the hunks that delete pages. Instead have the package script rename the affected man pages, and update the patch only to change the cross references of the conflicting man pages.
* main/openssl: remove conflicting man pagesTimo Teräs2014-08-071-2/+6
|
* main/openssl: security ugprade to 1.0.1i (multiple CVE)Timo Teräs2014-08-071-7/+7
| | | | | | | | | | | | CVE-2014-3508 Information leak in pretty printing functions CVE-2014-5139 Crash with SRP ciphersuite in Server Hello message CVE-2014-3509 Race condition in ssl_parse_serverhello_tlsext CVE-2014-3505 Double Free when processing DTLS packets CVE-2014-3506 DTLS memory exhaustion CVE-2014-3507 DTLS memory leak from zero-length fragments CVE-2014-3510 OpenSSL DTLS anonymous EC(DH) denial of service CVE-2014-3511 OpenSSL TLS protocol downgrade attack CVE-2014-3512 SRP buffer overrun
* main/openssl: security upgrade to 1.0.1h (multiple CVE)Timo Teräs2014-06-051-19/+11
| | | | | | | | | | Newly fixed CVEs: CVE-2014-0224 SSL/TLS MITM vulnerability CVE-2014-0221 DTLS recursion flaw CVE-2014-0195 DTLS invalid fragment vulnerability Previously fixed in Alpine by cherry picks: CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference
* main/openssl: security fix to CVE-2014-0198Timo Teräs2014-05-291-1/+5
| | | | ref #2916
* main/openssl: fix use after free happening without freebufsTimo Teräs2014-04-111-4/+8
| | | | and it also happens with freebufs on multi-threaded programs.
* main/openssl: disable free(2) caching in ssl codeWilliam Pitcock2014-04-091-4/+9
| | | | | | | This code is dubious at best and also responsible for the heartbleed vulnerability being exposed in the first place. With the heartbleed test on a broken version, this results in a daemon crash instead of private key exposure. We add dummy padding to preserve ABI compatibility with older packages.
* main/openssl: upgrade to 1.0.1gTimo Teräs2014-04-071-4/+4
| | | | | - fix for CVE-2014-0160 - fix for CVE-2014-0076
* main/openssl: build fixesNatanael Copa2014-01-101-5/+9
| | | | | fixes parallel build and linking to dynamic libcrypto of c_rehash in case openssl-dev is not installed.
* main/openssl: security upgrade to 1.0.1fTimo Teräs2014-01-071-9/+5
| | | | | | | * Don't include gmt_unix_time in TLS server and client random values * Fix for TLS record tampering bug CVE-2013-4353 * Fix for TLS version checking bug CVE-2013-6449 * Fix for DTLS retransmission bug CVE-2013-6450
* main/openssl: fix musl build of c_rehash (missing include)Timo Teräs2014-01-031-3/+3
|
* main/openssl: rewrite c_rehash in C for speedTimo Teräs2013-12-311-8/+8
| | | | fixes #2533
* main/openssl: speed improvements for c_rehash.shTimo Teräs2013-12-261-4/+4
|
* main/openssl: don't use rdrand engine as defaultTimo Teräs2013-12-171-1/+5
| | | | As security measure, do not rely solely on hardware random source.
* main/openssl: fix makedepends for crosscompilingTimo Teräs2013-10-181-1/+3
|
* main/openssl: replace c_rehash perl script with shell scriptNatanael Copa2013-10-021-5/+13
| | | | | | from http://cvs.pld-linux.org/cgi-bin/viewvc.cgi/cvs/packages/openssl/openssl-c_rehash.sh ref #2266
* [all autotools packages]: normalize ./configureTimo Teräs2013-07-301-1/+2
|
* main/openssl: support crosscompiling, arm and muslTimo Teräs2013-07-081-2/+24
|
* main/openssl: fix openssl tools default CApathTimo Teräs2013-06-151-5/+9
| | | | Apply patch from openssl rt.
* main/openssl: update padlock sha1 patchTimo Teräs2013-03-051-4/+4
| | | | | | | | | Add EVP_MD_FLAG_PKEY_METHOD_SIGNATURE to padlock_sha1_md to fix DSA/SHA1 verification in certain cases. Seems that NID_sha1 instead of NID_dss is used sometimes incorrectly, and this seems to be the workaround regular SHA1 code does too. Suggested-by: Daniel Mansfield <daniel.mansfield@unsw.edu.au>
* main/openssl: upgrade to 1.0.1eNatanael Copa2013-02-121-9/+5
|
* main/openssl: fix regressionNatanael Copa2013-02-081-1/+23
| | | | http://marc.info/?t=136018837600003&r=1&w=2
* main/openssl: eglibc update verioned symbolsCarlo Landmeter2013-02-071-2/+2
|
* main/openssl: security upgrade to 1.0.1d ↵Natanael Copa2013-02-061-3/+3
| | | | | | (CVE-2013-0169,CVE-2012-2686,CVE-2013-0166) fixes #1591
* main/openssl: add versioned symbolsCarlo Landmeter2013-01-041-7/+28
| | | | when building on eglibc we need versioned symbols