aboutsummaryrefslogtreecommitdiffstats
path: root/main/openssl
Commit message (Collapse)AuthorAgeFilesLines
* main/openssl: security upgrade to 1.0.1j ↵Natanael Copa2014-10-161-2/+2
| | | | | | (CVE-2014-3513,CVE-2014-3567,CVE-2014-3568) fixes #3434
* main/openssl: security ugprade to 1.0.1i (multiple CVE)Timo Teräs2014-08-072-682/+12
| | | | | | | | | | | | | | | | | CVE-2014-3508 Information leak in pretty printing functions CVE-2014-5139 Crash with SRP ciphersuite in Server Hello message CVE-2014-3509 Race condition in ssl_parse_serverhello_tlsext CVE-2014-3505 Double Free when processing DTLS packets CVE-2014-3506 DTLS memory exhaustion CVE-2014-3507 DTLS memory leak from zero-length fragments CVE-2014-3510 OpenSSL DTLS anonymous EC(DH) denial of service CVE-2014-3511 OpenSSL TLS protocol downgrade attack CVE-2014-3512 SRP buffer overrun (cherry picked from commit a662e7dfb065b0b91ca19c33838295bf3e459f48) Conflicts: main/openssl/APKBUILD
* main/openssl: security upgrade to 1.0.1h (multiple CVE)Timo Teräs2014-06-094-130/+4
| | | | | | | | | | | | | | | | | Newly fixed CVEs: CVE-2014-0224 SSL/TLS MITM vulnerability CVE-2014-0221 DTLS recursion flaw CVE-2014-0195 DTLS invalid fragment vulnerability Previously fixed in Alpine by cherry picks: CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (cherry picked from commit 120a0ce7ae2b324c46ba9e47fb64feaa13913582) Conflicts: main/openssl/APKBUILD fixes #2996
* main/openssl: security fix to CVE-2014-0198Timo Teräs2014-05-292-1/+42
| | | | fixes #2917
* main/openssl: fix for CVE-2010-5298Timo Teräs2014-05-212-1/+18
| | | | | | fixes #2896 (cherry picked from commit 4456c9ec91d13627b3900075f8ac84ce97551679)
* main/openssl: upgrade to 1.0.1gTimo Teräs2014-04-071-2/+18
| | | | | - fix for CVE-2014-0160 - fix for CVE-2014-0076
* main/openssl: security upgrade to 1.0.1f ↵Natanael Copa2014-01-142-47/+4
| | | | | | (CVE-2013-4353,CVE-2013-6449,CVE-2013-6450) fixes #2583
* main/openssl: don't use rdrand engine as defaultTimo Teräs2013-12-172-2/+45
| | | | | | | | | | As security measure, do not rely solely on hardware random source. fixes #2510 (cherry picked from commit 1fd915b81678c58d35bf63761c260efd5362a93d) Conflicts: main/openssl/APKBUILD
* main/openssl: upgrade to 1.0.1eNatanael Copa2013-02-122-78/+4
|
* main/openssl: fix regressionNatanael Copa2013-02-082-2/+76
| | | | | | | | http://marc.info/?t=136018837600003&r=1&w=2 (cherry picked from commit 24db490f2be6cab64aba36142309daf3fb624d34) Conflicts: main/openssl/APKBUILD
* main/openssl: security upgrade to 1.0.1d ↵Natanael Copa2013-02-061-3/+3
| | | | | | (CVE-2013-0169,CVE-2012-2686,CVE-2013-0166) fixes #1592
* main/openssl: add ircv3 tls-3.1 extension support to s_clientWilliam Pitcock2012-09-222-2/+60
|
* main/openssl: refresh hmac/oneshot and padlock patchesTimo Teräs2012-08-025-67/+83
| | | | | * fixed hmac oneshot flag to work as expected * renamed the patch series, and rebased against 1.0.1c
* main/openssl: fix padlock sha1/256 oneshot finalizing updateTimo Teräs2012-08-022-4/+4
| | | | | | We want to handle bytes upto next block boundary, to work with hardware from block boundary. The code incorrectly fed just the amount of bytes in the block.
* main/openssl: security upgrade to 1.0.1c (CVE-2012-2333)Natanael Copa2012-05-141-2/+2
| | | | | fixes #1151 (cherry picked from commit 1831053bb87f432f0d45ccd9f7a368fc885a1d64)
* main/openssl: upgrade to 1.0.1bNatanael Copa2012-04-261-2/+2
|
* main/openssl: security upgrade to 1.0.1a (CVE-2012-2110)Natanael Copa2012-04-231-2/+2
| | | | fixes #1107
* main/openssl: upgrade to 1.0.1Timo Teräs2012-03-283-398/+4
| | | | | | | Remove the unneeded 0002-apps-speed-fix; the speed utility can now measure evp speeds with -evp flag. Padlock autoloading patch is rebased.
* main/openssl: upgrade to 1.0.0hNatanael Copa2012-03-131-2/+2
|
* main/openssl: security upgrade to 1.0.0g (CVE-2012-0050)Natanael Copa2012-01-191-2/+2
| | | | fixes #935
* main/openssl: security upgrade to 1.0.0fNatanael Copa2012-01-051-2/+2
| | | | | | | | | | | CVE-2011-4108 CVE-2011-4109 CVE-2011-4576 CVE-2011-4577 CVE-2011-4619 CVE-2012-0027 fixes #893
* main/openssl: security upgrade to 1.0.0e (CVE-2011-3207, CVE-2011-3210)Natanael Copa2011-09-061-2/+2
|
* main/openssl: update to 1.0.0dTimo Teräs2011-02-091-2/+2
| | | | * contains security fix to CVE-2011-0014
* Set all packages with arch="x86 x86_64" to arch="all".William Pitcock2011-01-131-1/+1
|
* main/*: add archNatanael Copa2010-12-131-0/+1
|
* main/openssl: security update to 1.0.0cTimo Teräs2010-12-031-2/+2
| | | | | | | | - Fix for security issue CVE-2010-4180 - Fix for CVE-2010-4252 - Fix mishandling of absent EC point format extension. - Fix various platform compilation issues. - Corrected fix for security issue CVE-2010-3864.
* main/openssl: specify libdirNatanael Copa2010-11-231-0/+1
| | | | so we avoid /usr/lib64 on x86_64
* main/openssl: upgrade to 1.0.0b and claim maintainershipTimo Teräs2010-11-173-23/+9
| | | | | | * upgrade to 1.0.0b which has security fixes * update patch which did not apply anymore * delete patch merged upstream
* main/openssl: fix double free. cve-2010-2939Natanael Copa2010-10-082-2/+16
|
* main/openssl: -dev package needs zlib-devNatanael Copa2010-08-311-1/+2
|
* main/openssl: refresh padlock patchesTimo Teräs2010-07-286-94/+377
| | | | The new feature is support for VIA Nano Padlock in 64-bit mode.
* Merge remote branch 'alpine/master'Andrew Manison2010-06-195-11/+1220
|\ | | | | | | | | Conflicts: main/openssl/APKBUILD
| * main/openssl: add padlock sha support, autoload dynamic padlockTimo Teräs2010-06-045-2/+1218
| | | | | | | | | | | | | | | | | | | | | | | | Add new version of padlock patches which enable: - limited support of VIA C7 SHA acceleration - full support for VIA Nano SHA acceleration Openssl HMAC core is also patched to take full performance out of padlock. Speed application is updated for measuring hmac(sha1). Padlock was moved to be dynamic engine in openssl-1.0.0. So add some code that losfd automatically that engine.
| * main/openssl: upgrade to 1.0.0aNatanael Copa2010-06-011-9/+2
| |
* | Fixes for total repository build.Andrew Manison2010-06-111-1/+1
| |
* | Deleted old patch file.Andrew Manison2010-06-011-821/+0
|/
* main/openssl: upgrade to 1.0.0Natanael Copa2010-05-143-85/+1362
| | | | and introduce libssl1.0 and libcrypto1.0 packages
* main/[various]: bump pkgrel to force rebuild against nptlNatanael Copa2010-05-041-1/+1
|
* main/openssl: upgrade to 0.9.8nNatanael Copa2010-03-301-2/+2
|
* main/openssl: upgrade to 0.9.8mNatanael Copa2010-03-126-249/+16
|
* main/openssl: security patchesNatanael Copa2009-12-096-2/+241
| | | | | | | | | * CVE-2009-1377 * CVE-2009-1378 * CVE-2009-1379 * CVE-2009-1387 * CVE-2009-2409 * CVE-2009-3555
* main/openssl: upgrade to 0.9.8lNatanael Copa2009-11-091-3/+3
|
* main/openssl: enable optimized montgomery multiplicationTimo Teras2009-08-201-2/+2
| | | | gives about 2x performance improvement on sse enabled chips.
* main/openssl: the libcrypto subpackage replaces openssl for upgradesNatanael Copa2009-08-061-1/+2
|
* main/openssl: fix random padlock sha1 breakageTimo Teras2009-07-302-14/+17
| | | | | | | fix copying of oneshot sha1 context. also decrease the size of "small buffer", to make context smaller (and context copy faster in most cases); it should be still enough to catch most hmac operations.
* main/openssl: update checksumNatanael Copa2009-07-271-1/+1
|
* main/openssl: fix padlock patchTimo Teras2009-07-272-238/+159
| | | | | | | | there was a bug sha context copying, that caused all hmac users (and possibly others) to crash. also implemented a third intermediate hashing mode with small buffer: it'll speed up hashing in most cases considerably (packets / certificates to be hashed are not usually too long).
* move core/* to main/Natanael Copa2009-07-234-0/+1036
added maintainer to several packages as well