aboutsummaryrefslogtreecommitdiffstats
path: root/main/openssl
Commit message (Collapse)AuthorAgeFilesLines
* main/openssl: security upgrade to 1.0.2tJ0WI2019-09-121-2/+5
| | | | | CVE-2019-1547 CVE-2019-1563
* main/openssl: security upgrade to 1.0.2rJ0WI2019-03-151-2/+4
|
* main/openssl: security upgrade to 1.0.2q - CVE-2018-0734 - CVE-2018-5407J0WI2018-11-221-4/+7
|
* main/openssl: upgrade to 1.0.2pNatanael Copa2018-09-253-75/+4
|
* main/openssl: fix CVE-2018-0732 and CVE-2018-0737Timo Teräs2018-07-183-2/+76
| | | | | fixes #8814 fixes #9009
* main/openssl: security upgrade to 1.0.2o and rebuild depending pkgsAndy Postnikov2018-04-011-2/+6
| | | | | | Fixes CVE-2017-3738, CVE-2018-0739, CVE-2018-0733 Rebuilds packages that link openssl statically.
* main/openssl: security upgrade to 1.0.2nColin Williams2017-12-151-2/+5
| | | | | | | | | fixes #8274 CVE-2017-3737 CVE-2017-3738 (cherry picked from commit d2d350f8a099c9ed303f00888e05626662e5c7f6)
* main/openssl: attempt to fix check()Sören Tempel2017-11-051-5/+5
| | | | By running the test suite without parallelization.
* main/openssl: add check()Andy Postnikov2017-11-051-0/+5
|
* main/openssl: security upgrade to 1.0.2mAndy Postnikov2017-11-051-2/+5
| | | | | CVE-2017-3735 CVE-2017-3736
* main/openssl: upgrade to 1.0.2l, modernize aportTimo Teräs2017-07-121-31/+6
|
* main/openssl: add s390x supportTuan M. Hoang2017-02-231-0/+1
|
* main/openssl: Add support for ppc64leBreno Leitao2017-01-271-0/+1
| | | | | This patch adds a target for ppc64le architecture. The target name on OpenSSL linux-ppc64le.
* main/openssl: upgrade to 1.0.2kNatanael Copa2017-01-261-5/+5
|
* main/openssl: remove c_rehashTimo Teräs2016-11-232-479/+7
| | | | | | the users of this should be using now libressl's certhash. and c_rehash is planned to be moved to ca-certificates so it can avoid dependency on libressl main package.
* main/openssl: enable -dbg packageNatanael Copa2016-09-271-2/+2
|
* main/openssl: security upgrade to 1.0.2j (CVE-2016-7052)Natanael Copa2016-09-261-4/+4
|
* main/openssl: fix secfixes commentNatanael Copa2016-09-231-2/+1
| | | | | | ref #6206 CVE-2016-6305 and CVE-2016-6307 apparently only affects openssl-1.1.0
* main/openssl: add comment on secfixesNatanael Copa2016-09-221-0/+5
|
* main/openssl: upgrade to 1.0.2iNatanael Copa2016-09-2210-1376/+8
|
* main/openssl: fix patch for CVE-2016-2181Natanael Copa2016-09-192-5/+34
| | | | | Add a missing patch. ref #6176
* main/openssl: backport various secfixesNatanael Copa2016-09-197-4/+930
| | | | | | | | | | fixes #6176 - CVE-2016-2179 - CVE-2016-2181 - CVE-2016-2182 - CVE-2016-6302 - CVE-2016-6303
* main/openssl: fix for CVE-2016-2180Daniel Sabogal2016-09-052-4/+46
|
* main/openssl: add aarch64 supportTimo Teräs2016-07-081-1/+2
|
* main/openssl: fix cross buildingTimo Teräs2016-07-061-1/+1
|
* main/openssl: security fix for CVE-2016-2177, CVE-2016-2178Natanael Copa2016-06-223-4/+395
|
* main/openssl: security upgrade to 1.0.2hTimo Teräs2016-05-031-5/+5
| | | | | | | | CVE-2016-2107 Prevent padding oracle in AES-NI CBC MAC check CVE-2016-2105 Fix EVP_EncodeUpdate overflow CVE-2016-2106 Fix EVP_EncryptUpdate overflow CVE-2016-2109 Prevent ASN.1 BIO excessive memory allocation CVE-2016-2176 EBCDIC overread
* main/openssl: build standalone c_rehash for libcryptoTimo Teräs2016-03-111-5/+10
|
* main/openssl: disable the weak cryptosNatanael Copa2016-03-031-2/+1
| | | | They are not needed for keeping ABI compat
* main/openssl: enable ssl2 and weak ciphers now disabled by defaultLeonardo Arena2016-03-011-1/+3
|
* main/openssl: security upgrade to 1.0.2gNatanael Copa2016-03-011-5/+5
| | | | | | | | | | | CVE-2016-0800 [High severity] CVE-2016-0705 [Low severity] CVE-2016-0798 [Low severity] CVE-2016-0797 [Low severity] CVE-2016-0799 [Low severity] CVE-2016-0702 [Low severity] CVE-2016-0703 [High severity] CVE-2016-0704 [Moderate severity]
* main/openssl: add padlock autoload patch backNatanael Copa2016-02-042-1/+34
| | | | | | and clear errors This reverts commit 29f1e13e6f54c24c5fac520555da38e763c6c45b.
* main/openssl: remove padlock autoload patchNatanael Copa2016-02-042-40/+4
| | | | | | | it appears they made padlock static upstream again this fixes nodejs issues ref #4999
* main/openssl: security upgrade to 1.0.2fTimo Teräs2016-01-281-5/+5
| | | | Fixes CVE-2016-0701, CVE-2015-3197
* main/openssl: use suffix for manpagesTimo Teräs2016-01-072-640/+2
| | | | fixes #4991
* main/openssl: new upstream version 1.0.2eChristian Kampka2015-12-042-152/+138
|
* main/openssl: security upgrade to 1.0.1d (CVE-2015-1793)Timo Teräs2015-07-092-26/+21
|
* main/openssl: upgrade to 1.0.2cTimo Teräs2015-06-152-130/+4
|
* main/openssl: security upgrade to 1.0.2bTimo Teräs2015-06-123-33/+134
| | | | | | | | CVE-2015-1788 Malformed ECParameters causes infinite loop CVE-2015-1789 Exploitable out-of-bounds read in X509_cmp_time CVE-2015-1790 PKCS7 crash with missing EnvelopedContent CVE-2015-1792 CMS verify infinite loop with unknown hash function CVE-2015-1791 Race condition handling NewSessionTicket
* main/openssl: fix rpath and turn off ssl compression by defaultTimo Teräs2015-03-277-20/+76
| | | | | System wide mitigation for CVE-2012-4929. While most affected programs turn off compression themselves, this is safer default.
* main/openssl: security upgrade to 1.0.2aTimo Teräs2015-03-193-77/+58
| | | | | | CVE-2015-0291, CVE-2015-0290, CVE-2015-0207, CVE-2015-0286, CVE-2015-0208, CVE-2015-0287, CVE-2015-0289, CVE-2015-0293, CVE-2015-1787, CVE-2015-0285, CVE-2015-0209, CVE-2015-0288
* main/openssl: add missing patchesTimo Teräs2015-02-235-0/+1129
|
* main/openssl: upgrade to 1.0.2 and rebase all patchesTimo Teräs2015-02-2319-6411/+889
|
* main/openssl: upgrade to 1.0.1lNatanael Copa2015-01-191-4/+4
|
* main/openssl: security upgrade to 1.0.1kTimo Teräs2015-01-092-29/+19
| | | | | | | | | | | CVE-2014-3571 DTLS segmentation fault in dtls1_get_record CVE-2015-0206 DTLS memory leak in dtls1_buffer_record CVE-2014-3569 no-ssl3 configuration sets method to NULL CVE-2014-3572 ECDHE silently downgrades to ECDH [Client] CVE-2015-0204 RSA silently downgrades to EXPORT_RSA [Client] CVE-2015-0205 DH client certificates accepted without verification [Server] CVE-2014-8275 Certificate fingerprints can be modified CVE-2014-3570 Bignum squaring may produce incorrect results
* Revert "main/openssl: upgrade to 1.0.1k"Bartłomiej Piotrowski2015-01-081-4/+4
| | | | This reverts commit 9bb63edbc546e6253578e5050132c62839e84dff.
* main/openssl: upgrade to 1.0.1kBartłomiej Piotrowski2015-01-081-4/+4
|
* main/openssl: upgrade to 1.0.1jNatanael Copa2014-10-151-5/+5
|
* main/openssl: enable accelerated NIST P-224 and P-256 on x86_64Bartłomiej Piotrowski2014-10-121-3/+4
|
* main/openssl: fix man-pages properlyTimo Teräs2014-08-072-95/+49
| | | | | | | Failed to rebase the manpages patch properly. This removes the hunks that delete pages. Instead have the package script rename the affected man pages, and update the patch only to change the cross references of the conflicting man pages.