head	1.78;
access;
symbols
	RELEASE_8_3_0:1.70
	RELEASE_9_0_0:1.67
	RELEASE_7_4_0:1.64
	RELEASE_8_2_0:1.64
	RELEASE_6_EOL:1.63
	RELEASE_8_1_0:1.62
	RELEASE_7_3_0:1.56
	RELEASE_8_0_0:1.54
	RELEASE_7_2_0:1.51
	RELEASE_7_1_0:1.47
	RELEASE_6_4_0:1.47
	RELEASE_5_EOL:1.45
	RELEASE_7_0_0:1.44
	RELEASE_6_3_0:1.44
	PRE_XORG_7:1.42
	RELEASE_4_EOL:1.41
	RELEASE_6_2_0:1.41
	RELEASE_6_1_0:1.38
	RELEASE_5_5_0:1.38
	RELEASE_6_0_0:1.37
	RELEASE_5_4_0:1.32
	RELEASE_4_11_0:1.32
	RELEASE_5_3_0:1.31
	RELEASE_4_10_0:1.31
	RELEASE_5_2_1:1.29
	RELEASE_5_2_0:1.29
	RELEASE_4_9_0:1.28
	RELEASE_5_1_0:1.28
	RELEASE_4_8_0:1.27
	RELEASE_5_0_0:1.23
	RELEASE_4_7_0:1.23
	RELEASE_4_6_2:1.21
	RELEASE_4_6_1:1.21
	RELEASE_4_6_0:1.21
	RELEASE_5_0_DP1:1.19
	RELEASE_4_5_0:1.19
	RELEASE_4_4_0:1.19
	RELEASE_4_3_0:1.17
	RELEASE_4_2_0:1.17
	RELEASE_4_1_1:1.17
	RELEASE_4_1_0:1.17
	RELEASE_3_5_0:1.17
	RELEASE_4_0_0:1.16
	RELEASE_3_4_0:1.16
	RELEASE_3_3_0:1.16
	RELEASE_3_2_0:1.13
	RELEASE_3_1_0:1.10
	RELEASE_2_2_8:1.9
	RELEASE_3_0_0:1.9
	RELEASE_2_2_7:1.8
	RELEASE_2_2_6:1.7
	RELEASE_2_2_5:1.7
	RELEASE_2_2_1:1.6
	RELEASE_2_2_2:1.6
	ssleay_0_5_1b:1.1.1.1
	EAY:1.1.1;
locks; strict;
comment	@# @;


1.78
date	2013.03.06.13.47.03;	author svnexp;	state Exp;
branches;
next	1.77;

1.77
date	2013.02.13.20.59.35;	author svnexp;	state Exp;
branches;
next	1.76;

1.76
date	2013.02.07.00.11.04;	author svnexp;	state Exp;
branches;
next	1.75;

1.75
date	2013.02.03.06.43.35;	author svnexp;	state Exp;
branches;
next	1.74;

1.74
date	2012.06.15.21.07.56;	author dinoex;	state Exp;
branches;
next	1.73;

1.73
date	2012.05.13.07.35.17;	author dinoex;	state Exp;
branches;
next	1.72;

1.72
date	2012.04.20.11.13.17;	author dinoex;	state Exp;
branches;
next	1.71;

1.71
date	2012.04.11.21.06.35;	author dinoex;	state Exp;
branches;
next	1.70;

1.70
date	2012.03.15.06.15.33;	author dinoex;	state Exp;
branches;
next	1.69;

1.69
date	2012.01.19.19.25.16;	author dinoex;	state Exp;
branches;
next	1.68;

1.68
date	2012.01.11.05.44.00;	author dinoex;	state Exp;
branches;
next	1.67;

1.67
date	2011.11.22.06.50.03;	author dinoex;	state Exp;
branches;
next	1.66;

1.66
date	2011.09.07.18.10.58;	author dinoex;	state Exp;
branches;
next	1.65;

1.65
date	2011.02.10.18.30.34;	author dinoex;	state Exp;
branches;
next	1.64;

1.64
date	2010.12.03.15.19.01;	author dinoex;	state Exp;
branches;
next	1.63;

1.63
date	2010.11.17.10.35.00;	author dinoex;	state Exp;
branches;
next	1.62;

1.62
date	2010.06.11.20.15.00;	author dinoex;	state Exp;
branches;
next	1.61;

1.61
date	2010.06.06.12.33.25;	author dinoex;	state Exp;
branches;
next	1.60;

1.60
date	2010.05.05.15.21.58;	author dinoex;	state Exp;
branches;
next	1.59;

1.59
date	2010.04.06.10.46.38;	author dinoex;	state Exp;
branches;
next	1.58;

1.58
date	2010.04.02.18.42.11;	author dinoex;	state Exp;
branches;
next	1.57;

1.57
date	2010.03.30.19.07.14;	author dinoex;	state Exp;
branches;
next	1.56;

1.56
date	2010.02.26.18.47.09;	author dinoex;	state Exp;
branches;
next	1.55;

1.55
date	2009.11.06.20.09.49;	author dinoex;	state Exp;
branches;
next	1.54;

1.54
date	2009.08.14.06.32.22;	author dinoex;	state Exp;
branches;
next	1.53;

1.53
date	2009.08.13.20.01.34;	author dinoex;	state Exp;
branches;
next	1.52;

1.52
date	2009.05.20.19.22.46;	author dinoex;	state Exp;
branches;
next	1.51;

1.51
date	2009.03.28.17.32.24;	author dinoex;	state Exp;
branches;
next	1.50;

1.50
date	2009.01.09.18.48.43;	author dinoex;	state Exp;
branches;
next	1.49;

1.49
date	2009.01.09.06.38.40;	author dinoex;	state Exp;
branches;
next	1.48;

1.48
date	2008.10.09.05.35.34;	author dinoex;	state Exp;
branches;
next	1.47;

1.47
date	2008.06.08.10.53.04;	author dinoex;	state Exp;
branches;
next	1.46;

1.46
date	2008.06.08.10.51.47;	author dinoex;	state Exp;
branches;
next	1.45;

1.45
date	2008.05.29.17.49.50;	author dinoex;	state Exp;
branches;
next	1.44;

1.44
date	2007.10.23.20.24.16;	author dinoex;	state Exp;
branches;
next	1.43;

1.43
date	2007.10.16.20.37.23;	author dinoex;	state Exp;
branches;
next	1.42;

1.42
date	2007.02.27.20.03.40;	author dinoex;	state Exp;
branches;
next	1.41;

1.41
date	2006.09.28.15.24.41;	author dinoex;	state Exp;
branches;
next	1.40;

1.40
date	2006.09.08.05.20.50;	author dinoex;	state Exp;
branches;
next	1.39;

1.39
date	2006.05.07.19.27.13;	author dinoex;	state Exp;
branches;
next	1.38;

1.38
date	2005.11.13.09.26.45;	author dinoex;	state Exp;
branches;
next	1.37;

1.37
date	2005.10.15.19.49.02;	author dinoex;	state Exp;
branches;
next	1.36;

1.36
date	2005.10.12.11.14.14;	author dinoex;	state Exp;
branches;
next	1.35;

1.35
date	2005.07.10.19.15.12;	author dinoex;	state Exp;
branches;
next	1.34;

1.34
date	2005.04.15.04.39.20;	author dinoex;	state Exp;
branches;
next	1.33;

1.33
date	2005.04.02.20.11.09;	author dinoex;	state Exp;
branches;
next	1.32;

1.32
date	2004.10.26.21.32.19;	author dinoex;	state Exp;
branches;
next	1.31;

1.31
date	2004.03.17.13.51.00;	author dinoex;	state Exp;
branches;
next	1.30;

1.30
date	2004.02.26.05.47.06;	author dinoex;	state Exp;
branches;
next	1.29;

1.29
date	2003.09.30.17.48.20;	author dinoex;	state Exp;
branches;
next	1.28;

1.28
date	2003.04.11.18.29.17;	author dinoex;	state Exp;
branches;
next	1.27;

1.27
date	2003.02.19.21.12.51;	author dinoex;	state Exp;
branches;
next	1.26;

1.26
date	2003.01.29.20.00.43;	author dinoex;	state Exp;
branches;
next	1.25;

1.25
date	2003.01.02.16.32.48;	author dinoex;	state Exp;
branches;
next	1.24;

1.24
date	2003.01.02.04.17.19;	author dinoex;	state Exp;
branches;
next	1.23;

1.23
date	2002.08.10.08.30.39;	author dinoex;	state Exp;
branches;
next	1.22;

1.22
date	2002.07.30.17.38.17;	author dinoex;	state Exp;
branches;
next	1.21;

1.21
date	2002.05.13.18.54.03;	author dinoex;	state Exp;
branches;
next	1.20;

1.20
date	2002.04.21.13.02.08;	author dinoex;	state Exp;
branches;
next	1.19;

1.19
date	2001.07.20.14.24.10;	author okazaki;	state Exp;
branches;
next	1.18;

1.18
date	2001.05.23.02.46.58;	author dougb;	state Exp;
branches;
next	1.17;

1.17
date	2000.04.16.12.24.42;	author dirk;	state Exp;
branches;
next	1.16;

1.16
date	99.08.09.18.48.12;	author dirk;	state Exp;
branches;
next	1.15;

1.15
date	99.06.06.09.56.03;	author dirk;	state Exp;
branches;
next	1.14;

1.14
date	99.06.02.07.30.37;	author dirk;	state Exp;
branches;
next	1.13;

1.13
date	99.04.13.22.37.02;	author dirk;	state Exp;
branches;
next	1.12;

1.12
date	99.03.26.08.42.48;	author dirk;	state Exp;
branches;
next	1.11;

1.11
date	99.03.06.11.36.23;	author dirk;	state Exp;
branches;
next	1.10;

1.10
date	99.01.09.12.55.49;	author dirk;	state Exp;
branches;
next	1.9;

1.9
date	98.08.27.16.38.03;	author markm;	state Exp;
branches;
next	1.8;

1.8
date	98.07.06.04.55.31;	author itojun;	state Exp;
branches;
next	1.7;

1.7
date	97.08.15.15.32.09;	author markm;	state Exp;
branches;
next	1.6;

1.6
date	97.01.13.21.39.39;	author markm;	state Exp;
branches;
next	1.5;

1.5
date	96.12.12.06.27.56;	author markm;	state Exp;
branches;
next	1.4;

1.4
date	96.09.24.18.03.33;	author markm;	state Exp;
branches;
next	1.3;

1.3
date	96.08.10.19.15.43;	author markm;	state Exp;
branches;
next	1.2;

1.2
date	96.07.29.19.57.54;	author markm;	state Exp;
branches;
next	1.1;

1.1
date	96.03.03.21.32.34;	author markm;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	96.03.03.21.32.34;	author markm;	state Exp;
branches;
next	;


desc
@@


1.78
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/313480
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@SHA256 (openssl-1.0.1e2/openssl-1.0.1e.tar.gz) = f74f15e8c8ff11aa3d5bb5f276d202ec18d7246e95f961db76054199c69c1ae3
SIZE (openssl-1.0.1e2/openssl-1.0.1e.tar.gz) = 4459777
SHA256 (openssl-1.0.1e2/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 18dd81fefb39b3328a444774ed10871ed50348ca171d2da9f826f916127b2dae
SIZE (openssl-1.0.1e2/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3512
SHA256 (openssl-1.0.1e2/0002-engines-e_padlock-backport-cvs-head-changes.patch) = 39c31c2e33cded09543a2d1fd2e3238e9d11c672ba71a14d13095baad3ec9696
SIZE (openssl-1.0.1e2/0002-engines-e_padlock-backport-cvs-head-changes.patch) = 5867
SHA256 (openssl-1.0.1e2/0003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = cbb2493ec9157e78035e9cc02be17655996ee9cd0a71b79507fc19f3862f452b
SIZE (openssl-1.0.1e2/0003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20625
SHA256 (openssl-1.0.1e2/0004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 157ec6d17add25b96956abc7c44259c91eebe8a6c1026cdb976b895bf42ec56f
SIZE (openssl-1.0.1e2/0004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 777
@


1.77
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/312171
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@d1 10
a10 10
SHA256 (openssl-1.0.1e/openssl-1.0.1e.tar.gz) = f74f15e8c8ff11aa3d5bb5f276d202ec18d7246e95f961db76054199c69c1ae3
SIZE (openssl-1.0.1e/openssl-1.0.1e.tar.gz) = 4459777
SHA256 (openssl-1.0.1e/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 18dd81fefb39b3328a444774ed10871ed50348ca171d2da9f826f916127b2dae
SIZE (openssl-1.0.1e/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3512
SHA256 (openssl-1.0.1e/0002-engines-e_padlock-backport-cvs-head-changes.patch) = 39c31c2e33cded09543a2d1fd2e3238e9d11c672ba71a14d13095baad3ec9696
SIZE (openssl-1.0.1e/0002-engines-e_padlock-backport-cvs-head-changes.patch) = 5867
SHA256 (openssl-1.0.1e/0003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = e59f86fb779d327479fa97506c6d0d2df44b97f8182b45ca2eefebe9bef44b8d
SIZE (openssl-1.0.1e/0003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20593
SHA256 (openssl-1.0.1e/0004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 157ec6d17add25b96956abc7c44259c91eebe8a6c1026cdb976b895bf42ec56f
SIZE (openssl-1.0.1e/0004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 777
@


1.76
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/311793
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@d1 10
a10 10
SHA256 (openssl-1.0.1d/openssl-1.0.1d.tar.gz) = 88a423f9b08a994054583691b968815875580e12df754e881d7cfe9f1bd1f49d
SIZE (openssl-1.0.1d/openssl-1.0.1d.tar.gz) = 4459791
SHA256 (openssl-1.0.1d/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 18dd81fefb39b3328a444774ed10871ed50348ca171d2da9f826f916127b2dae
SIZE (openssl-1.0.1d/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3512
SHA256 (openssl-1.0.1d/0002-engines-e_padlock-backport-cvs-head-changes.patch) = 39c31c2e33cded09543a2d1fd2e3238e9d11c672ba71a14d13095baad3ec9696
SIZE (openssl-1.0.1d/0002-engines-e_padlock-backport-cvs-head-changes.patch) = 5867
SHA256 (openssl-1.0.1d/0003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = e59f86fb779d327479fa97506c6d0d2df44b97f8182b45ca2eefebe9bef44b8d
SIZE (openssl-1.0.1d/0003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20593
SHA256 (openssl-1.0.1d/0004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 157ec6d17add25b96956abc7c44259c91eebe8a6c1026cdb976b895bf42ec56f
SIZE (openssl-1.0.1d/0004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 777
@


1.75
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/311452
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@d1 10
a10 10
SHA256 (openssl-1.0.1c2/openssl-1.0.1c.tar.gz) = 2a9eb3cd4e8b114eb9179c0d3884d61658e7d8e8bf4984798a5f5bd48e325ebe
SIZE (openssl-1.0.1c2/openssl-1.0.1c.tar.gz) = 4457113
SHA256 (openssl-1.0.1c2/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 18dd81fefb39b3328a444774ed10871ed50348ca171d2da9f826f916127b2dae
SIZE (openssl-1.0.1c2/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3512
SHA256 (openssl-1.0.1c2/0002-engines-e_padlock-backport-cvs-head-changes.patch) = 39c31c2e33cded09543a2d1fd2e3238e9d11c672ba71a14d13095baad3ec9696
SIZE (openssl-1.0.1c2/0002-engines-e_padlock-backport-cvs-head-changes.patch) = 5867
SHA256 (openssl-1.0.1c2/0003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = e59f86fb779d327479fa97506c6d0d2df44b97f8182b45ca2eefebe9bef44b8d
SIZE (openssl-1.0.1c2/0003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20593
SHA256 (openssl-1.0.1c2/0004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 157ec6d17add25b96956abc7c44259c91eebe8a6c1026cdb976b895bf42ec56f
SIZE (openssl-1.0.1c2/0004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 777
@


1.74
log
@- use OPTIONS_DEFINE

- add VIA padlock support
PR:		164795
Submitted by:	Stefan Krger
@
text
@d1 10
a10 10
SHA256 (openssl-1.0.1c/openssl-1.0.1c.tar.gz) = 2a9eb3cd4e8b114eb9179c0d3884d61658e7d8e8bf4984798a5f5bd48e325ebe
SIZE (openssl-1.0.1c/openssl-1.0.1c.tar.gz) = 4457113
SHA256 (openssl-1.0.1c/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 7f40edec04115e97ae2c64e77d3324f6083963200add148f9a4dec090c60550b
SIZE (openssl-1.0.1c/0001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3089
SHA256 (openssl-1.0.1c/0003-engines-e_padlock-backport-cvs-head-changes.patch) = cc5e464d7bf8e181bb454de65772366ed90ee91716ecbadaaf2dfda2e080fdc2
SIZE (openssl-1.0.1c/0003-engines-e_padlock-backport-cvs-head-changes.patch) = 5897
SHA256 (openssl-1.0.1c/0004-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = bff8308f6652c8ddade1dd3261e5519fa3aa1660bea3474fc9996a53382a26b5
SIZE (openssl-1.0.1c/0004-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20552
SHA256 (openssl-1.0.1c/0005-crypto-engine-autoload-padlock-dynamic-engine.patch) = f2d6bffae2fe5fcf76c7b9f6299893846a7730cadf70ab91bc94ee0578d0ba8d
SIZE (openssl-1.0.1c/0005-crypto-engine-autoload-padlock-dynamic-engine.patch) = 794
@


1.73
log
@- Security update to 1.0.1c
Security: http://openssl.org/news/secadv_20120510.txt
@
text
@d3 8
@


1.72
log
@- Security Update to 1.0.0a
Security: http://www.openssl.org/news/secadv_20120419.txt
Security: http://lists.grok.org.uk/pipermail/full-disclosure/2012-April/086585.html
Security: CVE-2012-2110
@
text
@d1 2
a2 2
SHA256 (openssl-1.0.1a/openssl-1.0.1a.tar.gz) = d3487e09d891c772cf946273a3bb0ca47479e7941be6d822274320e7cfcc361b
SIZE (openssl-1.0.1a/openssl-1.0.1a.tar.gz) = 4456456
@


1.71
log
@- update to 1.0.1
@
text
@d1 2
a2 2
SHA256 (openssl-1.0.1/openssl-1.0.1.tar.gz) = 4d9f0a594a9a89b28e1a04a9504c04104f6508ee27ad1e0efdd17a7a6dbbeeee
SIZE (openssl-1.0.1/openssl-1.0.1.tar.gz) = 4453920
@


1.70
log
@- drop DTLS bugfixes, now included upstream

- drop SCTP, will be in 1.0.1

- Security update to 1.0.0h
Security: http://www.openssl.org/news/secadv_20120312.txt
Security: CVE-2012-0884

PR:		166064
Approved by:	portmgr (miwi)
Feature safe:	yes
@
text
@d1 2
a2 2
SHA256 (openssl-1.0.0h/openssl-1.0.0h.tar.gz) = 7e3dfc21aa57ed33ea673170053d1921322803b8a6a624a4f0d2e4c308bd418d
SIZE (openssl-1.0.0h/openssl-1.0.0h.tar.gz) = 4048067
@


1.69
log
@- Security update to 1.0.0g
Security: http://www.openssl.org/news/secadv_20120118.txt
@
text
@d1 2
a2 8
SHA256 (openssl-1.0.0g/openssl-1.0.0g.tar.gz) = 905106a1505e7d9f7c36ee81408d3aa3d41aac291a9603d0c290c9530c92fc2c
SIZE (openssl-1.0.0g/openssl-1.0.0g.tar.gz) = 4046513
SHA256 (openssl-1.0.0g/abbreviated-renegotiation.patch) = f060c344d2eb639d6a7859b00195d6661e29018b4b877e8fc9cc791fd4025272
SIZE (openssl-1.0.0g/abbreviated-renegotiation.patch) = 7977
SHA256 (openssl-1.0.0g/dtls-heartbeats.patch) = b580ba6419e5732ed09fb9b4a9b2c083b1a002b848b2c71d6357ca7c9c36670e
SIZE (openssl-1.0.0g/dtls-heartbeats.patch) = 14132
SHA256 (openssl-1.0.0g/dtls-sctp-24.patch) = 8335423c6f4767b899d923091244ec90cab4aabbd6e557358d04d0daf023001a
SIZE (openssl-1.0.0g/dtls-sctp-24.patch) = 57229
@


1.68
log
@- Build with obsolte MD2 hash by default

- Security Update to 1.0.0f
Security: http://openssl.org/news/secadv_20120104.txt
Security: CVE-2011-4108
Security: CVE-2011-4109
Security: CVE-2011-4576
Security: CVE-2011-4577
Security: CVE-2011-4619
Security: CVE-2012-0027
Submitted by:	Tim Zingelman
@
text
@d1 8
a8 8
SHA256 (openssl-1.0.0f/openssl-1.0.0f.tar.gz) = faf1eab0ef85fd6c3beca271c356b31b5cc831e2c6b7f23cf672e7ab4680fde1
SIZE (openssl-1.0.0f/openssl-1.0.0f.tar.gz) = 4043367
SHA256 (openssl-1.0.0f/abbreviated-renegotiation.patch) = f060c344d2eb639d6a7859b00195d6661e29018b4b877e8fc9cc791fd4025272
SIZE (openssl-1.0.0f/abbreviated-renegotiation.patch) = 7977
SHA256 (openssl-1.0.0f/dtls-sctp-24.patch) = 8335423c6f4767b899d923091244ec90cab4aabbd6e557358d04d0daf023001a
SIZE (openssl-1.0.0f/dtls-sctp-24.patch) = 57229
SHA256 (openssl-1.0.0f/dtls-heartbeats.patch) = b580ba6419e5732ed09fb9b4a9b2c083b1a002b848b2c71d6357ca7c9c36670e
SIZE (openssl-1.0.0f/dtls-heartbeats.patch) = 14132
@


1.67
log
@- make portlint happier

- update patches
PR:		161379

Feature safe:	yes
@
text
@d1 8
a8 14
SHA256 (openssl-1.0.0e2/openssl-1.0.0e.tar.gz) = e361dc2775733fb84de7b5bf7b504778b772869e8f7bfac0b28b935cbf7380f7
SIZE (openssl-1.0.0e2/openssl-1.0.0e.tar.gz) = 4040229
SHA256 (openssl-1.0.0e2/dtls-manual-mtu-bug-1.0.0.patch) = b28d5810bc6aad1427c0d1464ae4d652befac818e72e50f8ca4f16028ea1d720
SIZE (openssl-1.0.0e2/dtls-manual-mtu-bug-1.0.0.patch) = 2513
SHA256 (openssl-1.0.0e2/dtls-ecc-key-bug-1.0.0.patch) = 92c1659fa92308107bee95dadc9f0a8a05fddd02b7b3d0b620b5337f41245b5d
SIZE (openssl-1.0.0e2/dtls-ecc-key-bug-1.0.0.patch) = 500
SHA256 (openssl-1.0.0e2/dtls-fragment-assert-bug-1.0.0.patch) = ee95a8a3c1b2d331f0774930dd9faeb48b940886fb764724daee6045ff7c5714
SIZE (openssl-1.0.0e2/dtls-fragment-assert-bug-1.0.0.patch) = 835
SHA256 (openssl-1.0.0e2/abbreviated-renegotiation.patch) = f060c344d2eb639d6a7859b00195d6661e29018b4b877e8fc9cc791fd4025272
SIZE (openssl-1.0.0e2/abbreviated-renegotiation.patch) = 7977
SHA256 (openssl-1.0.0e2/dtls-sctp-24.patch) = 8335423c6f4767b899d923091244ec90cab4aabbd6e557358d04d0daf023001a
SIZE (openssl-1.0.0e2/dtls-sctp-24.patch) = 57229
SHA256 (openssl-1.0.0e2/dtls-heartbeats.patch) = b580ba6419e5732ed09fb9b4a9b2c083b1a002b848b2c71d6357ca7c9c36670e
SIZE (openssl-1.0.0e2/dtls-heartbeats.patch) = 14132
@


1.66
log
@- Security update to 1.0.0e
Security: http://openssl.org/news/secadv_20110906.txt

- drop option TLS_EXTRACTOR, now in distribution

- add RFC-5705 patch
Obtained from:	OpenBSD
@
text
@d1 14
a14 8
SHA256 (openssl-1.0.0e/openssl-1.0.0e.tar.gz) = e361dc2775733fb84de7b5bf7b504778b772869e8f7bfac0b28b935cbf7380f7
SIZE (openssl-1.0.0e/openssl-1.0.0e.tar.gz) = 4040229
SHA256 (openssl-1.0.0e/abbreviated-renegotiation.patch) = 606e0fe48d39484d1663be12e35c91f012f2f864bc2fc3fc4ec3f889c94ab3ef
SIZE (openssl-1.0.0e/abbreviated-renegotiation.patch) = 6578
SHA256 (openssl-1.0.0e/dtls-sctp-24.patch) = 8335423c6f4767b899d923091244ec90cab4aabbd6e557358d04d0daf023001a
SIZE (openssl-1.0.0e/dtls-sctp-24.patch) = 57229
SHA256 (openssl-1.0.0e/dtls-heartbeats.patch) = b580ba6419e5732ed09fb9b4a9b2c083b1a002b848b2c71d6357ca7c9c36670e
SIZE (openssl-1.0.0e/dtls-heartbeats.patch) = 14132
@


1.65
log
@- Security update to 1.0.0d
Security: http://openssl.org/news/secadv_20110208.txt
Security: CVE-2011-0014
Feature safe:	yes
@
text
@d1 8
a8 10
SHA256 (openssl-1.0.0d/openssl-1.0.0d.tar.gz) = 92511d1f0caaa298dba250426f8e7d5d00b271847886d1adc62422778d6320db
SIZE (openssl-1.0.0d/openssl-1.0.0d.tar.gz) = 4025484
SHA256 (openssl-1.0.0d/abbreviated-renegotiation.patch) = 606e0fe48d39484d1663be12e35c91f012f2f864bc2fc3fc4ec3f889c94ab3ef
SIZE (openssl-1.0.0d/abbreviated-renegotiation.patch) = 6578
SHA256 (openssl-1.0.0d/tls-extractor.patch) = b7dfb15b6ab7d62348eaa191fc8ba06565c92ecdd5d08bb5e9eb01a2e7433bb2
SIZE (openssl-1.0.0d/tls-extractor.patch) = 1235
SHA256 (openssl-1.0.0d/dtls-sctp-20.patch) = f002b13fead7c08270a9cfaf556be49c62be5b46f492ad59db29af4d3e9a4e67
SIZE (openssl-1.0.0d/dtls-sctp-20.patch) = 50812
SHA256 (openssl-1.0.0d/dtls-heartbeats.patch) = b580ba6419e5732ed09fb9b4a9b2c083b1a002b848b2c71d6357ca7c9c36670e
SIZE (openssl-1.0.0d/dtls-heartbeats.patch) = 14132
@


1.64
log
@- Security update to 1.0.0c
Security: http://openssl.org/news/secadv_20101202.txt
Security: CVE-2010-4180
@
text
@d1 10
a10 10
SHA256 (openssl-1.0.0c/openssl-1.0.0c.tar.gz) = f731b36de3edaa361179ae6f449668b248a360e34e31e92902d976e9b9d604eb
SIZE (openssl-1.0.0c/openssl-1.0.0c.tar.gz) = 4023056
SHA256 (openssl-1.0.0c/abbreviated-renegotiation.patch) = ddbc0683461d364af25b3cd7481d73c6476bfcfb945b3b3c9883f72eabb6367f
SIZE (openssl-1.0.0c/abbreviated-renegotiation.patch) = 6578
SHA256 (openssl-1.0.0c/tls-extractor.patch) = bb1aa486327fd96f9d6b870f0a1ad2c83dd4c06a96284eb64dde3f833ba5e0d0
SIZE (openssl-1.0.0c/tls-extractor.patch) = 1234
SHA256 (openssl-1.0.0c/dtls-sctp-20.patch) = 3b451618b64d7dbc917942759c26cbc717be3077e9d73cb3c5bd12a82a132268
SIZE (openssl-1.0.0c/dtls-sctp-20.patch) = 50812
SHA256 (openssl-1.0.0c/dtls-heartbeats.patch) = c75dbb87d8afe9f3156993169880c14a1c58addf0cd9bf1e9a31cc14047559f2
SIZE (openssl-1.0.0c/dtls-heartbeats.patch) = 14129
@


1.63
log
@- Security update to 1.0.0b
Security: http://openssl.org/news/secadv_20101116.txt
Security: CVE-2010-3864

PR:		152312
Submitted by:	Alexander Wittig

- Fix regression in TLS handling
Obtained from:	http://cvs.openssl.org/chngview?cn=19998
@
text
@d1 10
a10 10
SHA256 (openssl-1.0.0b/openssl-1.0.0b.tar.gz) = 4e7b4e2fb33ee2d97c5e143561ab495dbbfc08f0a863e617a0c7adca19017331
SIZE (openssl-1.0.0b/openssl-1.0.0b.tar.gz) = 4019360
SHA256 (openssl-1.0.0b/abbreviated-renegotiation.patch) = ddbc0683461d364af25b3cd7481d73c6476bfcfb945b3b3c9883f72eabb6367f
SIZE (openssl-1.0.0b/abbreviated-renegotiation.patch) = 6578
SHA256 (openssl-1.0.0b/tls-extractor.patch) = bb1aa486327fd96f9d6b870f0a1ad2c83dd4c06a96284eb64dde3f833ba5e0d0
SIZE (openssl-1.0.0b/tls-extractor.patch) = 1234
SHA256 (openssl-1.0.0b/dtls-sctp-20.patch) = 3b451618b64d7dbc917942759c26cbc717be3077e9d73cb3c5bd12a82a132268
SIZE (openssl-1.0.0b/dtls-sctp-20.patch) = 50812
SHA256 (openssl-1.0.0b/dtls-heartbeats.patch) = c75dbb87d8afe9f3156993169880c14a1c58addf0cd9bf1e9a31cc14047559f2
SIZE (openssl-1.0.0b/dtls-heartbeats.patch) = 14129
@


1.62
log
@- update dtls-heartbeats.patch
PR:		147787
Submitted by:	Nagilum
@
text
@d1 10
a10 15
MD5 (openssl-1.0.0a/openssl-1.0.0a.tar.gz) = e3873edfffc783624cfbdb65e2249cbd
SHA256 (openssl-1.0.0a/openssl-1.0.0a.tar.gz) = 18a9bd1fc02b8ef90dded34fafaa9089baaafef278a19fc4e89c2ab0dcf70f63
SIZE (openssl-1.0.0a/openssl-1.0.0a.tar.gz) = 4015794
MD5 (openssl-1.0.0a/abbreviated-renegotiation.patch) = 2409eb80e65effb928032ee18f690dd7
SHA256 (openssl-1.0.0a/abbreviated-renegotiation.patch) = ddbc0683461d364af25b3cd7481d73c6476bfcfb945b3b3c9883f72eabb6367f
SIZE (openssl-1.0.0a/abbreviated-renegotiation.patch) = 6578
MD5 (openssl-1.0.0a/tls-extractor.patch) = 23a88cd05cdb3f2040b0866b87586460
SHA256 (openssl-1.0.0a/tls-extractor.patch) = bb1aa486327fd96f9d6b870f0a1ad2c83dd4c06a96284eb64dde3f833ba5e0d0
SIZE (openssl-1.0.0a/tls-extractor.patch) = 1234
MD5 (openssl-1.0.0a/dtls-sctp-17.patch) = 9037f54f0d851daa8b35fc5ad5f903c0
SHA256 (openssl-1.0.0a/dtls-sctp-17.patch) = b8968a1a01f459033c40fe15e1b77e8941db301a10bb7668baa3961632c23b4c
SIZE (openssl-1.0.0a/dtls-sctp-17.patch) = 51558
MD5 (openssl-1.0.0a/dtls-heartbeats.patch) = 628f9a70baaaafbb0ceadb3736bd5782
SHA256 (openssl-1.0.0a/dtls-heartbeats.patch) = c75dbb87d8afe9f3156993169880c14a1c58addf0cd9bf1e9a31cc14047559f2
SIZE (openssl-1.0.0a/dtls-heartbeats.patch) = 14129
@


1.61
log
@- update to openssl-1.0.0a
Security: CVE-2010-1633
this problem was already fixed in 1.0.0 with option WITH_DTLS_BUGS
@
text
@d13 3
a15 3
MD5 (openssl-1.0.0a/dtls-heartbeats.patch) = a9ad6a0d30f0b8c1dbbcb084a86d719a
SHA256 (openssl-1.0.0a/dtls-heartbeats.patch) = 173bbddfc1812461b5abfc26a27a57a172a4b33acc8c1307307c4f78f97a0ab4
SIZE (openssl-1.0.0a/dtls-heartbeats.patch) = 14113
@


1.60
log
@- fix path in c_rehash
Submitted by:	Matthias Andree
Obtained from:	http://rt.openssl.org/Ticket/Display.html?id=2234

- add more DTLS bugfixes
Obtained from:	http://sctp.fh-muenster.de/
@
text
@d1 15
a15 33
MD5 (openssl-1.0.0/openssl-1.0.0.tar.gz) = 89eaa86e25b2845f920ec00ae4c864ed
SHA256 (openssl-1.0.0/openssl-1.0.0.tar.gz) = 1bbf9afc5a6215121ac094147d0a84178294fe4c3d0a231731038fd3717ba7ca
SIZE (openssl-1.0.0/openssl-1.0.0.tar.gz) = 4010166
MD5 (openssl-1.0.0/dtls-replay-bug-1.0.0.patch) = 965624f870068b228ae549697769a9ea
SHA256 (openssl-1.0.0/dtls-replay-bug-1.0.0.patch) = ecd22b870600187648bbd6bcaf7752fc72e79f350386c090c3e77ea29a8e7439
SIZE (openssl-1.0.0/dtls-replay-bug-1.0.0.patch) = 860
MD5 (openssl-1.0.0/dtls-buffer-bug-1.0.0.patch) = 6c1c7b62369f0992b3cd8a3874190d71
SHA256 (openssl-1.0.0/dtls-buffer-bug-1.0.0.patch) = 3794abdf31a206b9f909b4250bbd5ead2dd7a24628add38e09f0ed67b13013ec
SIZE (openssl-1.0.0/dtls-buffer-bug-1.0.0.patch) = 388
MD5 (openssl-1.0.0/dtls-timeout-bug-1.0.0.patch) = 4ea76473161328ac84e17606b80ef202
SHA256 (openssl-1.0.0/dtls-timeout-bug-1.0.0.patch) = 069ba0e8b4137f7754b50e173d50a9f7748f424b003690fc9c7d34b46ac17403
SIZE (openssl-1.0.0/dtls-timeout-bug-1.0.0.patch) = 442
MD5 (openssl-1.0.0/dtls-badmac-bug-1.0.0.patch) = 3c83737cd831caa9d059ddc5ac72478a
SHA256 (openssl-1.0.0/dtls-badmac-bug-1.0.0.patch) = cbdf4594fe4c1e8a02207f1adbee6ad8ea1a68d0f975e072305b5d6dcb96ef1f
SIZE (openssl-1.0.0/dtls-badmac-bug-1.0.0.patch) = 444
MD5 (openssl-1.0.0/dtls-badmsg-alert-bug-1.0.0.patch) = a37855ac4977717d6ae2c81b9e9346bf
SHA256 (openssl-1.0.0/dtls-badmsg-alert-bug-1.0.0.patch) = d666bf237df50a6130a68bce74d6281f75d11f855e78622965199f14a72628bc
SIZE (openssl-1.0.0/dtls-badmsg-alert-bug-1.0.0.patch) = 2192
MD5 (openssl-1.0.0/dtls-reassembly-bug-1.0.0.patch) = 4eb20cb6c8cf014942435b4f63197b66
SHA256 (openssl-1.0.0/dtls-reassembly-bug-1.0.0.patch) = 808011b2d84631aa6f04652b48fdfb1c79778ae95cb5b1d3371be8dc7bb376f3
SIZE (openssl-1.0.0/dtls-reassembly-bug-1.0.0.patch) = 13328
MD5 (openssl-1.0.0/abbreviated-renegotiation.patch) = 2409eb80e65effb928032ee18f690dd7
SHA256 (openssl-1.0.0/abbreviated-renegotiation.patch) = ddbc0683461d364af25b3cd7481d73c6476bfcfb945b3b3c9883f72eabb6367f
SIZE (openssl-1.0.0/abbreviated-renegotiation.patch) = 6578
MD5 (openssl-1.0.0/tls-extractor.patch) = 23a88cd05cdb3f2040b0866b87586460
SHA256 (openssl-1.0.0/tls-extractor.patch) = bb1aa486327fd96f9d6b870f0a1ad2c83dd4c06a96284eb64dde3f833ba5e0d0
SIZE (openssl-1.0.0/tls-extractor.patch) = 1234
MD5 (openssl-1.0.0/dtls-sctp-17.patch) = 9037f54f0d851daa8b35fc5ad5f903c0
SHA256 (openssl-1.0.0/dtls-sctp-17.patch) = b8968a1a01f459033c40fe15e1b77e8941db301a10bb7668baa3961632c23b4c
SIZE (openssl-1.0.0/dtls-sctp-17.patch) = 51558
MD5 (openssl-1.0.0/dtls-heartbeats.patch) = a9ad6a0d30f0b8c1dbbcb084a86d719a
SHA256 (openssl-1.0.0/dtls-heartbeats.patch) = 173bbddfc1812461b5abfc26a27a57a172a4b33acc8c1307307c4f78f97a0ab4
SIZE (openssl-1.0.0/dtls-heartbeats.patch) = 14113
@


1.59
log
@- chase updated patches for sctp-17 and dtls
@
text
@d13 9
@


1.58
log
@- update to 1.0.0
- regression tested on i386, amd64 and ia64
- use DIST_SUBDIR to resolve conflicts with old patchfiles
- new options DTLS_RENEGOTIATION, DTLS_HEARTBEAT, TLS_EXTRACTOR, SCTP
@
text
@d4 12
a15 9
MD5 (openssl-1.0.0/dtls-sctp-16.patch) = d2d9e318dcf297df05ccb00ac7197676
SHA256 (openssl-1.0.0/dtls-sctp-16.patch) = 8e6b5aa8430203801f86bb08e3d7813fade0a75f0afe260277184666fb61d20b
SIZE (openssl-1.0.0/dtls-sctp-16.patch) = 50055
MD5 (openssl-1.0.0/dtls-bugs-1.0.0.patch) = 70e19be97bf375005132b2b764f0fb11
SHA256 (openssl-1.0.0/dtls-bugs-1.0.0.patch) = 638141568f155ff64dbc2545863783d3723e811ff3c3bd02881c5ede58beb11c
SIZE (openssl-1.0.0/dtls-bugs-1.0.0.patch) = 1333
MD5 (openssl-1.0.0/abbreviated-renegotiation.patch) = ede88c89aa5278d65308f0609009a136
SHA256 (openssl-1.0.0/abbreviated-renegotiation.patch) = e4e2a4d8a352f606658f175ba603fe2355feb96eeef679decf3e10792e4e5725
SIZE (openssl-1.0.0/abbreviated-renegotiation.patch) = 6577
d19 5
a23 2
MD5 (openssl-1.0.0/dtls-heartbeats.patch) = 446c4632a49ab1293e203891a0fc3317
SHA256 (openssl-1.0.0/dtls-heartbeats.patch) = 4da57a6e9cd779a3f8f1f2055919cbea09eb09b281337b2108f952cb77764355
@


1.57
log
@- Security update to 0.9.8n
Security: http://www.openssl.org/news/secadv_20100324.txt
@
text
@d1 18
a18 3
MD5 (openssl-0.9.8n.tar.gz) = 076d8efc3ed93646bd01f04e23c07066
SHA256 (openssl-0.9.8n.tar.gz) = b01abc28376b866515df58f1b004da8453166291783d4e7477cda89b000c1f01
SIZE (openssl-0.9.8n.tar.gz) = 3770041
@


1.56
log
@- update to 0.9.8m
- support RFC5746
Security: CVE-2008-1678
Security: CVE-2009-1377
Security: CVE-2009-1378
Security: CVE-2009-1379
Approved by:	portmgr (pav)
Feature safe:	yes
@
text
@d1 3
a3 6
MD5 (openssl-0.9.8m.tar.gz) = 898bf125370926d5f692a2201124f8ec
SHA256 (openssl-0.9.8m.tar.gz) = 36037160281cf4977d964e403d2bc0680fbca0a7ff9f65e33136d75fae12cb5b
SIZE (openssl-0.9.8m.tar.gz) = 3767604
MD5 (dtls-bugs-2009-05-18.patch) = dc6a79d5dd8e9eacfaa5e2ae05457df4
SHA256 (dtls-bugs-2009-05-18.patch) = e4929a3fbaa20b1c22b0ba218b8c2ab4c5df941c70d975e8672337620eca3422
SIZE (dtls-bugs-2009-05-18.patch) = 33268
@


1.55
log
@- Security update to 0.9.8l
Security: CVE-2009-3555
@
text
@d1 3
a3 3
MD5 (openssl-0.9.8l.tar.gz) = 05a0ece1372392a2cf310ebb96333025
SHA256 (openssl-0.9.8l.tar.gz) = ecd054e9eed2e9c1620ba15257e6fc4d882c9a4aea663d23b769e2138de8c91a
SIZE (openssl-0.9.8l.tar.gz) = 4179422
@


1.54
log
@- revert patch
@
text
@d1 3
a3 3
MD5 (openssl-0.9.8k.tar.gz) = e555c6d58d276aec7fdc53363e338ab3
SHA256 (openssl-0.9.8k.tar.gz) = 7e7cd4f3974199b729e6e3a0af08bd4279fde0370a1120c1a3b351ab090c6101
SIZE (openssl-0.9.8k.tar.gz) = 3852259
@


1.53
log
@- update dtls-bugs.patch
@
text
@d4 3
a6 3
MD5 (dtls-bugs.patch) = 3b23c6a5e3b8bc19040d24eb3305f977
SHA256 (dtls-bugs.patch) = 1d343e4d13e188b32f4dc348bd2cff1ad03588dd859de25caf05a241f59e8a62
SIZE (dtls-bugs.patch) = 42623
@


1.52
log
@- add more DTLS bugfixes
- use options framework
- new option WITH_FIPS
add fips code
- new option WITH_SCTP
add SCTP support to openssl
@
text
@d4 3
a6 15
MD5 (dtls-bugs.patch) = dc6a79d5dd8e9eacfaa5e2ae05457df4
SHA256 (dtls-bugs.patch) = e4929a3fbaa20b1c22b0ba218b8c2ab4c5df941c70d975e8672337620eca3422
SIZE (dtls-bugs.patch) = 33268
MD5 (freebsd-compatibility.patch) = 2c1dcf5c25509e2a929eeb05cb4baa66
SHA256 (freebsd-compatibility.patch) = e5b78a56a461892a8fe2cb5f156f381d54dee82dbec8f5ed4fb6e48329ffb59b
SIZE (freebsd-compatibility.patch) = 399
MD5 (tls-extractor.patch) = ac104f69472f37359d0fd8c6da56383f
SHA256 (tls-extractor.patch) = 091bde68933fbf23cfd402bd6bb90b23dc95702a7302c5706336d3eaaa2982f5
SIZE (tls-extractor.patch) = 1329
MD5 (abbreviated-renegotiation.patch) = 374a11933e52b4c5a85295cd6cf08ef3
SHA256 (abbreviated-renegotiation.patch) = fc6a1f6b0f12c9c43f1c66fd716ac3d3f6cf51a466444758ff270640addf795e
SIZE (abbreviated-renegotiation.patch) = 6396
MD5 (dtls-sctp.patch) = 146680bedb7fe104430a8d8c71927f9d
SHA256 (dtls-sctp.patch) = 0696ad1aa23d59274c8a3925397f5f37f75d1ee70d2c270665e3615ee1746edc
SIZE (dtls-sctp.patch) = 45747
@


1.51
log
@- Security update to 0.9.8k
Security: http://www.openssl.org/news/secadv_20090325.txt
Security: CVE-2009-0590
Security: CVE-2009-0591 (port not affected)
Security: CVE-2009-0789
PR:		133156
Submitted by:	Eygene Ryabinkin
@
text
@d4 15
@


1.50
log
@- update to 0.9.8j
- move patches from files-beta back to files
- FIPS disabled with force
- support for crypto_hw device cloning restored
- support for crypto_hw aes_256 restored
@
text
@d1 3
a3 3
MD5 (openssl-0.9.8j.tar.gz) = a5cb5f6c3d11affb387ecf7a997cac0c
SHA256 (openssl-0.9.8j.tar.gz) = 7131242042dbd631fbd83436f42aea1775e7c32f587fa4ada5a01df4c3ae8e8b
SIZE (openssl-0.9.8j.tar.gz) = 3738359
@


1.49
log
@- cleanup 0.97
@
text
@d1 3
a3 3
MD5 (openssl-0.9.8i.tar.gz) = 561e00f18821c74b2b86c8c7786f9d8b
SHA256 (openssl-0.9.8i.tar.gz) = e8fc5fcfb715ffe925b2982aa9ca287832a93495d7fff03f17f6449f0732718c
SIZE (openssl-0.9.8i.tar.gz) = 3459643
@


1.48
log
@- update to 0.9.8i
@
text
@a0 3
MD5 (openssl-0.9.7m.tar.gz) = 74a4d1b87e1e6e1ec95dbe58cb4c5b9a
SHA256 (openssl-0.9.7m.tar.gz) = c98b9703887e2dda6217b91405d0d94883f7c67e205fc4d7a81bb690d2e10572
SIZE (openssl-0.9.7m.tar.gz) = 3303943
@


1.47
log
@PR:	124281
@
text
@d4 3
a6 3
MD5 (openssl-0.9.8h.tar.gz) = 7d3d41dafc76cf2fcb5559963b5783b3
SHA256 (openssl-0.9.8h.tar.gz) = 224e1ca3aeeda8acc72e5c48b34843904b9d585aaadb4d5a15524c25f6c6a1ce
SIZE (openssl-0.9.8h.tar.gz) = 3439981
@


1.46
log
@- readd 0.9.7m
@
text
@@


1.45
log
@- Security update to 0.9.8h
Security: http://openssl.org/news/secadv_20080528.txt
Security: http://secunia.com/advisories/30405/
Security: http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html
Security: CVE-2008-0891
Security: CVE-2008-1672
@
text
@d1 3
@


1.44
log
@- update to 0.9.8g
@
text
@d1 3
a3 6
MD5 (openssl-0.9.7m.tar.gz) = 74a4d1b87e1e6e1ec95dbe58cb4c5b9a
SHA256 (openssl-0.9.7m.tar.gz) = c98b9703887e2dda6217b91405d0d94883f7c67e205fc4d7a81bb690d2e10572
SIZE (openssl-0.9.7m.tar.gz) = 3303943
MD5 (openssl-0.9.8g.tar.gz) = acf70a16359bf3658bdfb74bda1c4419
SHA256 (openssl-0.9.8g.tar.gz) = 0e26886845de95716c9f1b9b75c0e06e9d4075d2bdc9e11504eaa5f7ee901cf0
SIZE (openssl-0.9.8g.tar.gz) = 3354792
@


1.43
log
@- Secuurity update to 0.9.8f
Security: CVE-2007-4995
@
text
@d4 3
a6 3
MD5 (openssl-0.9.8f.tar.gz) = 114bf908eb1b293d11d3e6b18a09269f
SHA256 (openssl-0.9.8f.tar.gz) = be5afd386f5d7acff019acaf46cdaad89a8b42cc9cee85d1adb2774627f32b42
SIZE (openssl-0.9.8f.tar.gz) = 3357445
@


1.42
log
@- Security update to 0.9.7m / 0.9.8e
- md5 verfified.
Security:	CVE-2006-2937
Security:	CVE-2006-2938
Security:	CVE-2006-2940
Security:	CVE-2006-3738
Security:	CVE-2006-4343
Security:	SA-06:23.openssl
@
text
@d4 3
a6 3
MD5 (openssl-0.9.8e.tar.gz) = 3a7ff24f6ea5cd711984722ad654b927
SHA256 (openssl-0.9.8e.tar.gz) = 414e8428b95fbc51707965fda31390497d058290356426bfe084b49464a60340
SIZE (openssl-0.9.8e.tar.gz) = 3341665
@


1.41
log
@- Security update to 0.9.7l
- Security update to 0.9.8d
Security: http://www.openssl.org/news/secadv_20060928.txt
Security: CVE-2006-2937
Security: CVE-2006-2940
Security: CVE-2006-3738
Security: CVE-2006-4343
Security: http://security.freebsd.org/advisories/FreeBSD-SA-06:23.openssl.asc

md5 hashes verfied
@
text
@d1 6
a6 6
MD5 (openssl-0.9.7l.tar.gz) = b21d6e10817ddeccf5fbe1379987333e
SHA256 (openssl-0.9.7l.tar.gz) = 7ed19859c92e1c13e9f8ed5c3de35c3d48e45bff1b52ffc43845cc0c856fa3d1
SIZE (openssl-0.9.7l.tar.gz) = 3294357
MD5 (openssl-0.9.8d.tar.gz) = 8ed1853538e1d05a1f5ada61ebf8bffa
SHA256 (openssl-0.9.8d.tar.gz) = 022194944cc20dad917c86c916db8a4e0050df2de91b9b6740ddd4fb2daf175d
SIZE (openssl-0.9.8d.tar.gz) = 3315566
@


1.40
log
@- update to 0.9.8c
- update stable to 0.9.7k
md5 verified
Security: http://www.openssl.org/news/secadv_20060905.txt
Security: CAN-2006-4339
@
text
@d1 6
a6 6
MD5 (openssl-0.9.7k.tar.gz) = be6bba1d67b26eabb48cf1774925416f
SHA256 (openssl-0.9.7k.tar.gz) = 9bbce75d55c03fad47f7ca5e6790facca4b203b28c6c33428d1a471ef73ee622
SIZE (openssl-0.9.7k.tar.gz) = 3292692
MD5 (openssl-0.9.8c.tar.gz) = 78454bec556bcb4c45129428a766c886
SHA256 (openssl-0.9.8c.tar.gz) = 896f7830c1921688f22c6fe4fb3d7b75189cefdd79acca5fb0cad2b599139048
SIZE (openssl-0.9.8c.tar.gz) = 3313857
@


1.39
log
@- update to 0.9.8a and 0.9.7j
  md5 verified with distribution
@
text
@d1 6
a6 6
MD5 (openssl-0.9.8b.tar.gz) = 12cedbeb6813a0d7919dbf1f82134b86
SHA256 (openssl-0.9.8b.tar.gz) = 69efed6275942f9312de61cf69aaef12b06c12f6b10f319672ce026a756f65c0
SIZE (openssl-0.9.8b.tar.gz) = 3279283
MD5 (openssl-0.9.7j.tar.gz) = 79dd939266b069e7aca587e6ab16a055
SHA256 (openssl-0.9.7j.tar.gz) = 65a6e88c3397cb68d19dbb576ecf9f9d8dc41423aa9ac3025cd29e3987274460
SIZE (openssl-0.9.7j.tar.gz) = 3290510
@


1.38
log
@- add SHA checksum
@
text
@d1 6
a6 6
MD5 (openssl-0.9.8a.tar.gz) = 1d16c727c10185e4d694f87f5e424ee1
SHA256 (openssl-0.9.8a.tar.gz) = 30f8f61fb1316f4fb51410c740b4879b8e26b417c8d870e486144b10b8041c73
SIZE (openssl-0.9.8a.tar.gz) = 3271435
MD5 (openssl-0.9.7i.tar.gz) = f69d82b206ff8bff9d0e721f97380b9e
SHA256 (openssl-0.9.7i.tar.gz) = 2fdd9235fc08c4353875d0981741947f2fa9f8835f04d97c30461cc14a986dd0
SIZE (openssl-0.9.7i.tar.gz) = 3280907
@


1.37
log
@- update stable to 0.9.7i
@
text
@d2 1
d5 1
@


1.36
log
@- update to 0.9.7g and 0.9.8a
@
text
@a0 2
MD5 (openssl-0.9.7h.tar.gz) = 8dc90a113eb8925795071fbe52b2932c
SIZE (openssl-0.9.7h.tar.gz) = 3287019
d3 2
@


1.35
log
@- update to 0.9.8 for WITH_OPENSSL_BETA=yes
@
text
@d1 4
a4 4
MD5 (openssl-0.9.7g.tar.gz) = 991615f73338a571b6a1be7d74906934
SIZE (openssl-0.9.7g.tar.gz) = 3132217
MD5 (openssl-0.9.8.tar.gz) = 9da21071596a124acde6080552deac16
SIZE (openssl-0.9.8.tar.gz) = 3259550
@


1.34
log
@- update 0.9.7g
PR:		79899
Submitted by:	Vasil Dimov
@
text
@d3 2
@


1.33
log
@- update to 0.9.7f
@
text
@d1 2
a2 2
MD5 (openssl-0.9.7f.tar.gz) = b2d37d7eb8a5a5040d834105d5ae1a50
SIZE (openssl-0.9.7f.tar.gz) = 3104957
@


1.32
log
@- Bugfix update to 0.9.7e
- md5 verfied with website
@
text
@d1 2
a2 2
MD5 (openssl-0.9.7e.tar.gz) = a8777164bca38d84e5eb2b1535223474
SIZE (openssl-0.9.7e.tar.gz) = 3043231
@


1.31
log
@- Security update to 0.9.7d
http://www.openssl.org/news/secadv_20040317.txt
@
text
@d1 2
a2 2
MD5 (openssl-0.9.7d.tar.gz) = 1b49e90fc8a75c3a507c0a624529aca5
SIZE (openssl-0.9.7d.tar.gz) = 2798433
@


1.30
log
@- add SIZE
@
text
@d1 2
a2 2
MD5 (openssl-0.9.7c.tar.gz) = c54fb36218adaaaba01ef733cd88c8ec
SIZE (openssl-0.9.7c.tar.gz) = 2791797
@


1.29
log
@- Security Fix, Update to 0.9.7c
- Fix manpages
@
text
@d2 1
@


1.28
log
@- Udpate to 0.9.7b
@
text
@d1 1
a1 1
MD5 (openssl-0.9.7b.tar.gz) = fae4bec090fa78e20f09d76d55b6ccff
@


1.27
log
@- merged some patches in distribution
- added thread support on alpha, sparc64
- Update to 0.9.7a (with security fix)
- defaults openssl to port
@
text
@d1 1
a1 1
MD5 (openssl-0.9.7a.tar.gz) = a0d3203ecf10989fdc61c784ae82e531
@


1.26
log
@- Update to 0.9.7
- rnd_keys.c now in distribution
- drop lib/libRSAglue.a
- build on i386, alpha, sparc64, ia64
- build on 2.2.8 with the gas-patch as noted in FAQ
@
text
@d1 1
a1 1
MD5 (openssl-0.9.7.tar.gz) = ef376d14205afcfb831cd3720f705d79
@


1.25
log
@- add new checksum, only "OPENSSL_VERSION_NUMBER" has been changed
in the distribution after 6th December.
2178290  6 Dez 00:25 /usr/ports/distfiles/openssl-0.9.6h.tar.gz
2178314  8 Dez 21:43 /usr/ports/distfiles/openssl-0.9.6h.tar.gz
@
text
@d1 1
a1 2
MD5 (openssl-0.9.6h.tar.gz) = 621bef36ad61012bb71945a1cb449073
MD5 (openssl-0.9.6h.tar.gz) = 1a0c2bee9f6b0af95ce65106462411f5
@


1.24
log
@- Update to 0.9.6h
- md5 verified
- add test target
- make build on sparc64
@
text
@d2 1
@


1.23
log
@Security Update to: 0.9.6g
@
text
@d1 1
a1 1
MD5 (openssl-0.9.6g.tar.gz) = 515ed54165a55df83f4eb4e4e9078d3f
@


1.22
log
@Security Update to 0.9.6e
@
text
@d1 1
a1 1
MD5 (openssl-0.9.6e.tar.gz) = 2f57a28e6a2468c488d49bb4dd31f24a
@


1.21
log
@Update to: 0.9.6d

See:
http://www.openssl.org/source/exp/CHANGES

Port improvements:
proccessor type is now detected

Add option: OPENSSL_WITH_386
This set as default for package generation on bento
@
text
@d1 1
a1 1
MD5 (openssl-0.9.6d.tar.gz) = 6cba586958f6e35f28dde70bd9e5d10a
@


1.20
log
@- Update to 0.9.6c
- more manpages
- shift FORBIDDEN

 Excerpt of Changes between 0.9.6b and 0.9.6c  [21 dec 2001]
  *) Fix BN_rand_range bug pointed out by Dominikus Scherkl
  *) Only add signing time to PKCS7 structures if it is not already present.
  *) Fix crypto/objects/objects.h: "ld-ce" should be "id-ce", OBJ_ld_ce
     should be OBJ_id_ce.  Also some ip-pda OIDs in crypto/objects/objects.txt
     were incorrect (cf. RFC 3039).
  *) Release CRYPTO_LOCK_DYNLOCK when CRYPTO_destroy_dynlockid()
     returns early because it has nothing to do.
  *) Fix mutex callback return values in crypto/engine/hw_ncipher.c.
  *) Change ssl/s2_clnt.c and ssl/s2_srvr.c so that received handshake
     messages are stored in a single piece (fixed-length part and
     variable-length part combined) and fix various bugs found on the way.
  *) Disable caching in BIO_gethostbyname(), directly use gethostbyname()
     instead.  BIO_gethostbyname() does not know what timeouts are
     appropriate, so entries would stay in cache even when they have
     become invalid.
  *) Change ssl23_get_client_hello (ssl/s23_srvr.c) behaviour when
     faced with a pathologically small ClientHello fragment that does
     not contain client_version: Instead of aborting with an error,
     simply choose the highest available protocol version (i.e.,
     TLS 1.0 unless it is disabled).
  *) Fix SSL handshake functions and SSL_clear() such that SSL_clear()
     never resets s->method to s->ctx->method when called from within
     one of the SSL handshake functions.
  *) In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert
     (sent using the client's version number) if client_version is
     smaller than the protocol version in use.  Also change
     ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if
     the client demanded SSL 3.0 but only TLS 1.0 is enabled; then
     the client will at least see that alert.
  *) Fix ssl3_get_message (ssl/s3_both.c) to handle message fragmentation
     correctly.
  *) Avoid infinite loop in ssl3_get_message (ssl/s3_both.c) if a
     client receives HelloRequest while in a handshake.
  *) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C
     should end in 'break', not 'goto end' which circuments various
     cleanups done in state SSL_ST_OK.   But session related stuff
     must be disabled for SSL_ST_OK in the case that we just sent a
     HelloRequest.  Also avoid some overhead by not calling
     ssl_init_wbio_buffer() before just sending a HelloRequest.
  *) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't
     reveal whether illegal block cipher padding was found or a MAC
     verification error occured.  (Neither SSLerr() codes nor alerts
     are directly visible to potential attackers, but the information
     may leak via logfiles.) ssl/s2_pkt.c failed to verify that the
     purported number of padding bytes is in the legal range.
  *) Improve RSA_padding_check_PKCS1_OAEP() check again to avoid
     'wristwatch attack' using huge encoding parameters (cf.
     James H. Manger's CRYPTO 2001 paper).  Note that the
     RSA_PKCS1_OAEP_PADDING case of RSA_private_decrypt() does not use
     encoding parameters and hence was not vulnerable.
  *) BN_sqr() bug fix.
  *) Rabin-Miller test analyses assume uniformly distributed witnesses,
     so use BN_pseudo_rand_range() instead of using BN_pseudo_rand()
     followed by modular reduction.
  *) Add BN_pseudo_rand_range() with obvious functionality: BN_rand_range()
     equivalent based on BN_pseudo_rand() instead of BN_rand().
  *) s3_srvr.c: allow sending of large client certificate lists (> 16 kB).
     This function was broken, as the check for a new client hello message
     to handle SGC did not allow these large messages.
  *) Add alert descriptions for TLSv1 to SSL_alert_desc_string[_long]().
  *) Fix buggy behaviour of BIO_get_num_renegotiates() and BIO_ctrl()
     for BIO_C_GET_WRITE_BUF_SIZE ("Stephen Hinton" <shinton@@netopia.com>).
  *) In ssl3_get_key_exchange (ssl/s3_clnt.c), call ssl3_get_message()
     with the same message size as in ssl3_get_certificate_request().
     Otherwise, if no ServerKeyExchange message occurs, CertificateRequest
     messages might inadvertently be reject as too long.
  *) Modified SSL library such that the verify_callback that has been set
     specificly for an SSL object with SSL_set_verify() is actually being
     used. Before the change, a verify_callback set with this function was
     ignored and the verify_callback() set in the SSL_CTX at the time of
     the call was used. New function X509_STORE_CTX_set_verify_cb() introduced
     to allow the necessary settings.
  *) In OpenSSL 0.9.6a and 0.9.6b, crypto/dh/dh_key.c ignored
     dh->length and always used
          BN_rand_range(priv_key, dh->p).
     So switch back to
          BN_rand(priv_key, l, ...)
     where 'l' is dh->length if this is defined, or BN_num_bits(dh->p)-1
     otherwise.
  *) In RSA_eay_public_encrypt, RSA_eay_private_decrypt, RSA_eay_private_encrypt
     RSA_eay_public_decrypt always reject numbers >= n.
  *) In crypto/rand/md_rand.c, use a new short-time lock CRYPTO_LOCK_RAND2
     to synchronize access to 'locking_thread'.
  *) In crypto/rand/md_rand.c, set 'locking_thread' to current thread's ID
     *before* setting the 'crypto_lock_rand' flag.  The previous code had
     a race condition if 0 is a valid thread ID.
@
text
@d1 1
a1 1
MD5 (openssl-0.9.6c.tar.gz) = 6d0a279079fae4f0a5a7af60c89ea178
@


1.19
log
@Upgrade openssl to 0.9.6b.
@
text
@d1 1
a1 1
MD5 (openssl-0.9.6b.tar.gz) = bd8c4d8c5bafc7a4d55d152989fdb327
@


1.18
log
@Upgrade openssl to 0.9.6a and bump the shlib version in the process
due to non-backwards compatible changes. The shlib bump necessitates
a corresponding bump in bsd.port.mk for the automagic openssl
dependency. Mistakes in the port are my responsibility. Approval for
the bsd.port.mk commit comes through asami -> kkenn -> me. Kris is
a little busy at the moment, so he asked me to lob it in.

Approved by:	kris
@
text
@d1 1
a1 1
MD5 (openssl-0.9.6a.tar.gz) = 6097d726aeb13373aba5213c35acd5c5
@


1.17
log
@Upgrade to 0.9.5a.
@
text
@d1 1
a1 1
MD5 (openssl-0.9.5a.tar.gz) = 8fcb6a8ba511ec8b54b95f267ef52cf0
@


1.16
log
@Upgrade to 0.9.4.
@
text
@d1 1
a1 1
MD5 (openssl-0.9.4.tar.gz) = ee27fd88986143156920a0da362135fb
@


1.15
log
@Upgrade to 0.9.3a.
@
text
@d1 1
a1 1
MD5 (openssl-0.9.3a.tar.gz) = 1024c591024dec7d0558694635e7ebf1
@


1.14
log
@Upgrade to OpenSSL 0.9.3:

- some changes of the directory layout:
  e. g. ${PREFIX}/lib/openssl.cnf -> ${PREFIX}/openssl/openssl.cnf
@
text
@d1 1
a1 1
MD5 (openssl-0.9.3.tar.gz) = 41c15e89f3ad2b312dd71ae586e89487
@


1.13
log
@openssl-0.9.2b-rsaoaep.patch supersedes patch-aj.

Obtained from:	http://www.openssl.org/
@
text
@d1 1
a1 2
MD5 (openssl-0.9.2b.tar.gz) = e78a6b30b443cd0d118b376a4dfe4745
MD5 (openssl-0.9.2b-rsaoaep.patch) = 7336290517c4b3f8e74c462affff1c6b
@


1.12
log
@Upgrade to 0.9.2b.

According to the OpenSSL-core-team you are strongly encouraged to upgrade
any old version. The new version has a lot of bug fixes.

- ${PREFIX}/bin/ssleay was renamed to ${PREFIX}/bin/openssl and
  ${PREFIX}/etc/ssleay.cnf to ${PREFIX}/lib/openssl.cnf

- there are no links from e. g. ${PREFIX}/bin/md5 to ${PREFIX}/bin/ssleay
  any longer, instead you have to call "openssl md5" now

- replaced HAS_CONFIGURE, CONFIGURE_SCRIPT and CONFIGURE_ENV with a
  do-configure target and changed the indention level

- some perl scripts need perl5 now, so set USE_PERL5 and replace perl
  with ${PERL5} where neccessary.

- honour ${CFLAGS}
@
text
@d2 1
@


1.11
log
@Set ONLY_FOR_ARCHS to i386.
Apply openssl-0.9.1c-bnrec.patch via PATCHFILES:

"DESCRIPTION:
The Big Number (BN) library in OpenSSL 0.9.1c has some problems when dealing
with very large numbers. Because mostly all other OpenSSL sub-libraries
(including the RSA library) are based on BN, this can cause failures when
doing certificate verification and performing other SSL functions. These BN
bugs are already fixed for OpenSSL 0.9.2. But for OpenSSL 0.9.1c the easiest
workaround to fix the subtle problems is to apply the above patch which mainly
disables the broken Montgomery multiplication algorithm inside BN."
@
text
@d1 1
a1 2
MD5 (openssl-0.9.1c.tar.gz) = 6c453d4b8180f57cde82c58ac03a053b
MD5 (openssl-0.9.1c-bnrec.patch) = d9b0c8c334dfef2b2bad15be5de0d061
@


1.10
log
@Bring this port up to openssl-0.9.1c after a repository copy from SSLeay.

OpenSSL is a successor of SSLeay (see http://www.openssl.org/).

This port uses almost the same files as SSLeay. So they can't be
installed both.

- make the port ${PREFIX} clean
- reorganize PLIST (list links as normal files, which makes the PLIST
  shorter and easier to maintain)
- reference ${PREFIX}/etc/ssleay.cnf only (there was a reference to
  ${PREFIX}/lib/ssleay.cnf somewhere)
- some other minor portlint changes
@
text
@d2 1
@


1.9
log
@Upgrade to version 0.9.0b
@
text
@d1 1
a1 1
MD5 (SSLeay-0.9.0b.tar.gz) = 41c26258b20af611e9995968cbd89688
@


1.8
log
@update original distribution (0.8.1 -> 0.8.1b).
0.8.1 is no longer available due to PKCS#1 security hole.
@
text
@d1 1
a1 1
MD5 (SSLeay-0.8.1b.tar.gz) = 4c386f17ba13ad097b3df1f2e5b019af
@


1.7
log
@Update to v 0.8.1. New algorithms (Blowfish &c) added. SSLv3 added.
Thanks to: Richard Seaman <Dick@@tar.com>
@
text
@d1 1
a1 1
MD5 (SSLeay-0.8.1.tar.gz) = 10092f272305e4c9162c906904550100
@


1.6
log
@Upgrade to 0.6.6
@
text
@d1 1
a1 1
MD5 (SSLeay-0.6.6.tar.gz) = e98396ff1a21e26402c3208df049b953
@


1.5
log
@@@#$%!! Forgot the MD5 checksum.

Found before: Anyone Else
@
text
@d1 1
a1 1
MD5 (SSLeay-0.6.5.tar.gz) = 57eac774278e349948508f8da535ad43
@


1.4
log
@Update to 0.6.4
Submitted by:Jeremy Prior <jez@@netcraft.co.uk> (sorry I took so long!)
@
text
@d1 1
a1 1
MD5 (SSLeay-0.6.4.tar.gz) = eb899853fccb927f157d442f19075121
@


1.3
log
@Move to version 0.6.3
@
text
@d1 1
a1 1
MD5 (SSLeay-0.6.3.tar.gz) = 8c0a9923b01bd33651134e1375285f8d
@


1.2
log
@SSLeay version 0.6.2.

This implementation has been built with Our ((actually its own but in our
source tree) DES library and our MD{45}. You will need to link your SSL
code with -ldes and -lmd.

Are you happy now, Torsten? ;-)
@
text
@d1 1
a1 1
MD5 (SSLeay-0.6.2.tar.gz) = f1e0ac84b4fc07dd6e7cb060d7ca790d
@


1.1
log
@Initial revision
@
text
@d1 1
a1 1
MD5 (SSLeay-0.5.1b.tar.gz) = 74df21c1ef5c58c5faa7b1d385181d56
@


1.1.1.1
log
@At long last! This is Eric Young's SSL library. The DES routines
are not part of this build as they are part of mainstram FreeBSD.

Please will a certificates expert check out the certificates
location.
@
text
@@
