pkgsrc/security/openssl
tron be45876be2 Update "openssl" package to version 1.0.1f. Changes since 1.0.1e:
- Fix for TLS record tampering bug. A carefully crafted invalid
  handshake could crash OpenSSL with a NULL pointer exception.
  Thanks to Anton Johansson for reporting this issues.
  (CVE-2013-4353)
- Keep original DTLS digest and encryption contexts in retransmission
  structures so we can use the previous session parameters if they need
  to be resent. (CVE-2013-6450)
  [Steve Henson]
- Add option SSL_OP_SAFARI_ECDHE_ECDSA_BUG (part of SSL_OP_ALL) which
  avoids preferring ECDHE-ECDSA ciphers when the client appears to be
  Safari on OS X.  Safari on OS X 10.8..10.8.3 advertises support for
  several ECDHE-ECDSA ciphers, but fails to negotiate them.  The bug
  is fixed in OS X 10.8.4, but Apple have ruled out both hot fixing
  10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer.
  [Rob Stradling, Adam Langley]
2014-01-10 14:32:42 +00:00
..
patches Update "openssl" package to version 1.0.1f. Changes since 1.0.1e: 2014-01-10 14:32:42 +00:00
buildlink3.mk prevent to reorder libcrypt and libcrypto for Cygwin, 2013-04-03 11:56:20 +00:00
builtin.mk Use find-headers instead of find-files to detect builtin header files. 2013-11-23 12:10:13 +00:00
DESCR
distinfo Update "openssl" package to version 1.0.1f. Changes since 1.0.1e: 2014-01-10 14:32:42 +00:00
Makefile Update "openssl" package to version 1.0.1f. Changes since 1.0.1e: 2014-01-10 14:32:42 +00:00
options.mk Update OpenSSL to 1.0.1d. Changes are far too numerous to list, the main one being 2013-02-06 21:40:33 +00:00
PLIST.common Update OpenSSL to 1.0.1d. Changes are far too numerous to list, the main one being 2013-02-06 21:40:33 +00:00
PLIST.Cygwin Fix case. 2013-10-02 20:03:33 +00:00
PLIST.OSF1 Don't mess with the normal PLIST.${OPSYS} logic. Use a variable to 2013-10-03 11:15:48 +00:00
PLIST.shlib Update OpenSSL to 1.0.1d. Changes are far too numerous to list, the main one being 2013-02-06 21:40:33 +00:00