Package: openssl1.0 / 1.0.2s-1~deb9u1

Metadata

Package Version Patches format
openssl1.0 1.0.2s-1~deb9u1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
config hurd.patch | (download)

config | 4 2 + 2 - 0 !
1 file changed, 2 insertions(+), 2 deletions(-)

 config-hurd

===================================================================

debian targets.patch | (download)

Configure | 54 54 + 0 - 0 !
1 file changed, 54 insertions(+)

 debian-targets


engines path.patch | (download)

Configure | 2 1 + 1 - 0 !
Makefile.org | 4 2 + 2 - 0 !
engines/Makefile | 10 5 + 5 - 0 !
engines/ccgost/Makefile | 8 4 + 4 - 0 !
4 files changed, 12 insertions(+), 12 deletions(-)

 engines-path

===================================================================

man dir.patch | (download)

Makefile.org | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 man-dir

===================================================================

man section.patch | (download)

Makefile.org | 7 4 + 3 - 0 !
1 file changed, 4 insertions(+), 3 deletions(-)

 man-section

===================================================================

no rpath.patch | (download)

Makefile.shared | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 no-rpath

===================================================================

no symbolic.patch | (download)

Makefile.shared | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 no-symbolic

===================================================================

pic.patch | (download)

crypto/des/asm/desboth.pl | 17 14 + 3 - 0 !
crypto/perlasm/cbc.pl | 24 20 + 4 - 0 !
crypto/perlasm/x86gas.pl | 16 16 + 0 - 0 !
crypto/x86cpuid.pl | 10 5 + 5 - 0 !
4 files changed, 55 insertions(+), 12 deletions(-)

 pic


valgrind.patch | (download)

crypto/rand/md_rand.c | 2 2 + 0 - 0 !
1 file changed, 2 insertions(+)

 valgrind

===================================================================

shared lib ext.patch | (download)

Configure | 3 2 + 1 - 0 !
1 file changed, 2 insertions(+), 1 deletion(-)

 shared-lib-ext

===================================================================

version script.patch | (download)

Configure | 2 2 + 0 - 0 !
engines/ccgost/openssl.ld | 10 10 + 0 - 0 !
engines/openssl.ld | 10 10 + 0 - 0 !
openssl.ld | 4608 4608 + 0 - 0 !
4 files changed, 4630 insertions(+)

 version-script

===================================================================

c_rehash compat.patch | (download)

tools/c_rehash.in | 20 14 + 6 - 0 !
1 file changed, 14 insertions(+), 6 deletions(-)

 [patch] also create old hash for compatibility


block_diginotar.patch | (download)

crypto/x509/x509_vfy.c | 27 27 + 0 - 0 !
1 file changed, 27 insertions(+)

 make x509_verify_cert indicate that any certificate whose

block_digicert_malaysia.patch | (download)

crypto/x509/x509_vfy.c | 7 4 + 3 - 0 !
1 file changed, 4 insertions(+), 3 deletions(-)

 make x509_verify_cert indicate that any certificate whose

disable_freelist.patch | (download)

ssl/s3_both.c | 1 1 + 0 - 0 !
ssl/ssl_lib.c | 2 2 + 0 - 0 !
2 files changed, 3 insertions(+)

 disable the freelist

We don't define OPENSSL_NO_BUF_FREELISTS globally sinc it changes structures and
would break the ABI.  Instead we just do it in the .c files that try to do
something with it.

soname.patch | (download)

crypto/opensslv.h | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 soname

===================================================================

disable_sslv3_test.patch | (download)

test/testssl | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 disable sslv3 test in test suite

When testing SSLv3 the test program returns 0 for skip.  The test for weak DH
expects a failure, but gets success.

It should probably be changed to return something other than 0 for a skipped
test.

libdoc manpgs pod spell.patch | (download)

doc/crypto/EVP_PKEY_cmp.pod | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 libdoc-manpgs-pod-spell

===================================================================

Mark 3DES and RC4 ciphers as weak.patch | (download)

ssl/s3_lib.c | 59 58 + 1 - 0 !
1 file changed, 58 insertions(+), 1 deletion(-)

 [patch] mark 3des and rc4 ciphers as weak

This disables RC4 and 3DES in our build

Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>