Update "openssl" package to version 1.0.1f. Changes since 1.0.1e: - Fix for TLS record tampering bug. A carefully crafted invalid handshake could crash OpenSSL with a NULL pointer exception. Thanks to Anton Johansson for reporting this issues. (CVE-2013-4353) - Keep original DTLS digest and encryption contexts in retransmission structures so we can use the previous session parameters if they need to be resent. (CVE-2013-6450) [Steve Henson] - Add option SSL_OP_SAFARI_ECDHE_ECDSA_BUG (part of SSL_OP_ALL) which avoids preferring ECDHE-ECDSA ciphers when the client appears to be Safari on OS X. Safari on OS X 10.8..10.8.3 advertises support for several ECDHE-ECDSA ciphers, but fails to negotiate them. The bug is fixed in OS X 10.8.4, but Apple have ruled out both hot fixing 10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer. [Rob Stradling, Adam Langley]diff -r1.182 -r1.183 pkgsrc/security/openssl/Makefile
(tron)
@@ -1,18 +1,17 @@ | @@ -1,18 +1,17 @@ | |||
1 | # $NetBSD: Makefile,v 1.182 2013/10/29 21:33:21 joerg Exp $ | 1 | # $NetBSD: Makefile,v 1.183 2014/01/10 14:32:42 tron Exp $ | |
2 | 2 | |||
3 | DISTNAME= openssl-1.0.1e | 3 | DISTNAME= openssl-1.0.1f | |
4 | MASTER_SITES= http://ftp.openssl.org/source/ | 4 | MASTER_SITES= http://ftp.openssl.org/source/ | |
5 | PKGREVISION= 2 | |||
6 | SVR4_PKGNAME= ossl | 5 | SVR4_PKGNAME= ossl | |
7 | CATEGORIES= security | 6 | CATEGORIES= security | |
8 | 7 | |||
9 | MAINTAINER= pkgsrc-users@NetBSD.org | 8 | MAINTAINER= pkgsrc-users@NetBSD.org | |
10 | HOMEPAGE= http://www.openssl.org/ | 9 | HOMEPAGE= http://www.openssl.org/ | |
11 | COMMENT= Secure Socket Layer and cryptographic library | 10 | COMMENT= Secure Socket Layer and cryptographic library | |
12 | 11 | |||
13 | CONFLICTS= SSLeay-[0-9]* ssleay-[0-9]* | 12 | CONFLICTS= SSLeay-[0-9]* ssleay-[0-9]* | |
14 | 13 | |||
15 | CRYPTO= yes | 14 | CRYPTO= yes | |
16 | 15 | |||
17 | PKG_INSTALLATION_TYPES= overwrite pkgviews | 16 | PKG_INSTALLATION_TYPES= overwrite pkgviews | |
18 | 17 |
@@ -1,34 +1,33 @@ | @@ -1,34 +1,33 @@ | |||
1 | $NetBSD: distinfo,v 1.100 2013/12/21 12:21:47 is Exp $ | 1 | $NetBSD: distinfo,v 1.101 2014/01/10 14:32:42 tron Exp $ | |
2 | 2 | |||
3 | SHA1 (openssl-1.0.1e.tar.gz) = 3f1b1223c9e8189bfe4e186d86449775bd903460 | 3 | SHA1 (openssl-1.0.1f.tar.gz) = 9ef09e97dfc9f14ac2c042f3b7e301098794fc0f | |
4 | RMD160 (openssl-1.0.1e.tar.gz) = 380827c16f18bed4f2eb3d54a387c7c089b2b299 | 4 | RMD160 (openssl-1.0.1f.tar.gz) = db8c07f8753fab2b76118d4c18175290356ed144 | |
5 | Size (openssl-1.0.1e.tar.gz) = 4459777 bytes | 5 | Size (openssl-1.0.1f.tar.gz) = 4509212 bytes | |
6 | SHA1 (patch-aa) = 8311c7af603513d4574946386ba11f4a36953b0c | 6 | SHA1 (patch-aa) = 8311c7af603513d4574946386ba11f4a36953b0c | |
7 | SHA1 (patch-ac) = ecdafa378e73bd2d6789c985ea28ef4ab2126aa6 | 7 | SHA1 (patch-ac) = ecdafa378e73bd2d6789c985ea28ef4ab2126aa6 | |
8 | SHA1 (patch-ad) = bb86ac463fc4ab8b485df5f1a4fb9c13c1fc41c3 | 8 | SHA1 (patch-ad) = bb86ac463fc4ab8b485df5f1a4fb9c13c1fc41c3 | |
9 | SHA1 (patch-ae) = 7a58f1765a3761321dcc8dafc5fe2e33207be480 | 9 | SHA1 (patch-ae) = 7a58f1765a3761321dcc8dafc5fe2e33207be480 | |
10 | SHA1 (patch-af) = f305134acfaa17e6a039630d916fbda4900adc85 | 10 | SHA1 (patch-af) = f305134acfaa17e6a039630d916fbda4900adc85 | |
11 | SHA1 (patch-ag) = b407200455878a8a151fc9b4f771fe17552d04fc | 11 | SHA1 (patch-ag) = b407200455878a8a151fc9b4f771fe17552d04fc | |
12 | SHA1 (patch-ak) = 049250b9bd42e6f155145703135dab39a7ec17e0 | 12 | SHA1 (patch-ak) = 049250b9bd42e6f155145703135dab39a7ec17e0 | |
13 | SHA1 (patch-crypto_dso_dso__dlfcn.c) = d5d6ca9a517151357efecb6aa9a5f528a5014290 | 13 | SHA1 (patch-crypto_dso_dso__dlfcn.c) = d5d6ca9a517151357efecb6aa9a5f528a5014290 | |
14 | SHA1 (patch-doc_apps_cms.pod) = 24792a0db2d8566e0f8b52833de300f538f6a92e | 14 | SHA1 (patch-doc_apps_cms.pod) = 24792a0db2d8566e0f8b52833de300f538f6a92e | |
15 | SHA1 (patch-doc_apps_smine.pod) = 277aee087892f867402ea73bae10383fe24d6e08 | 15 | SHA1 (patch-doc_apps_smine.pod) = 277aee087892f867402ea73bae10383fe24d6e08 | |
16 | SHA1 (patch-doc_crypto_X509__STORE__CTX__get__error.pod) = 39ceb8d8d88f47794c257286c958daa5c408dfd2 | |||
17 | SHA1 (patch-doc_ssl_SSL__COMP__add__compression__method.pod) = f3fcbe0eae26ac8e24fe937e529ea0dba6ea1639 | 16 | SHA1 (patch-doc_ssl_SSL__COMP__add__compression__method.pod) = f3fcbe0eae26ac8e24fe937e529ea0dba6ea1639 | |
18 | SHA1 (patch-doc_ssl_SSL__CTX__add__session.pod) = db72b7e04bb74595a78bc09379854957dcfaa4c7 | 17 | SHA1 (patch-doc_ssl_SSL__CTX__add__session.pod) = db72b7e04bb74595a78bc09379854957dcfaa4c7 | |
19 | SHA1 (patch-doc_ssl_SSL__CTX__load__verify__locations.pod) = d0fd17e118a1bd19c729a0930a52925b9bb81d6d | 18 | SHA1 (patch-doc_ssl_SSL__CTX__load__verify__locations.pod) = d0fd17e118a1bd19c729a0930a52925b9bb81d6d | |
20 | SHA1 (patch-doc_ssl_SSL__CTX__set__client__CA__list.pod) = 964ea426276741f89a9d02dd75baaaabc97e0943 | 19 | SHA1 (patch-doc_ssl_SSL__CTX__set__client__CA__list.pod) = df3ab7287667f32454357a3a2eaca8275f01ce08 | |
21 | SHA1 (patch-doc_ssl_SSL__CTX__set__session__id__context.pod) = b5d711fcf9512c82ec2c7aa61303377006ebfca7 | 20 | SHA1 (patch-doc_ssl_SSL__CTX__set__session__id__context.pod) = b5d711fcf9512c82ec2c7aa61303377006ebfca7 | |
22 | SHA1 (patch-doc_ssl_SSL__CTX__set__ssl__version.pod) = 79340b3f4cfa4293362a79c336e0768711153930 | 21 | SHA1 (patch-doc_ssl_SSL__CTX__set__ssl__version.pod) = 79340b3f4cfa4293362a79c336e0768711153930 | |
23 | SHA1 (patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod) = e39c7f0ac0edaadf0462f78947fa40b11084cced | 22 | SHA1 (patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod) = eb4d8ccfa47ecc3f50dbda5b0ffd98ea740f4ebf | |
24 | SHA1 (patch-doc_ssl_SSL__accept.pod) = c5ca9e0333de10d2032d03cf3ce0d9e41b6b495f | 23 | SHA1 (patch-doc_ssl_SSL__accept.pod) = c68aa6eb518d5ca72ae5bd142fd3895e378ca638 | |
25 | SHA1 (patch-doc_ssl_SSL__clear.pod) = c7d2eb126137ee642294466f0ea9019fcd5e9b92 | 24 | SHA1 (patch-doc_ssl_SSL__clear.pod) = c7d2eb126137ee642294466f0ea9019fcd5e9b92 | |
26 | SHA1 (patch-doc_ssl_SSL__connect.pod) = 78a21f325f5749f0ed491ee71467a4a89848dfe3 | 25 | SHA1 (patch-doc_ssl_SSL__connect.pod) = 07327bdb408493c6696efb71070b1b0f7294982c | |
27 | SHA1 (patch-doc_ssl_SSL__do__handshake.pod) = 7b8c392568ef965c1709fc3fefe572f591007b24 | 26 | SHA1 (patch-doc_ssl_SSL__do__handshake.pod) = f62a43b7b9e59b321cd8dd00d6ea448e3c11d77f | |
28 | SHA1 (patch-doc_ssl_SSL__read.pod) = 2a6db16242aceeee645f5b48a9725c5530fbbb8c | 27 | SHA1 (patch-doc_ssl_SSL__read.pod) = 2a6db16242aceeee645f5b48a9725c5530fbbb8c | |
29 | SHA1 (patch-doc_ssl_SSL__session__reused.pod) = 0ed7425cf8b098c97ab223cd368c4b18f5187ae5 | 28 | SHA1 (patch-doc_ssl_SSL__session__reused.pod) = 0ed7425cf8b098c97ab223cd368c4b18f5187ae5 | |
30 | SHA1 (patch-doc_ssl_SSL__set__fd.pod) = 68e3f6f3ff0fdfb2113cebb8f08e6d42c442fa2f | 29 | SHA1 (patch-doc_ssl_SSL__set__fd.pod) = 68e3f6f3ff0fdfb2113cebb8f08e6d42c442fa2f | |
31 | SHA1 (patch-doc_ssl_SSL__set__session.pod) = e4d8442f4fc827520ca20f108050fcd6314dd41d | 30 | SHA1 (patch-doc_ssl_SSL__set__session.pod) = e4d8442f4fc827520ca20f108050fcd6314dd41d | |
32 | SHA1 (patch-doc_ssl_SSL__shutdown.pod) = ca5b1fd9fda9405907697e848614f050978cfb90 | 31 | SHA1 (patch-doc_ssl_SSL__shutdown.pod) = 21682f3385a66ba8f0ebd11bb9bb3c6198352783 | |
33 | SHA1 (patch-doc_ssl_SSL__write.pod) = 67efd6d0de0a0db34c18c62e4a939c0ea49442ca | 32 | SHA1 (patch-doc_ssl_SSL__write.pod) = 67efd6d0de0a0db34c18c62e4a939c0ea49442ca | |
34 | SHA1 (patch-engines_ccgost_Makefile) = 08999f0f40969883482ad9ffc1aa9959ed7d402c | 33 | SHA1 (patch-engines_ccgost_Makefile) = 08999f0f40969883482ad9ffc1aa9959ed7d402c |
@@ -1,20 +1,22 @@ | @@ -1,20 +1,22 @@ | |||
1 | $NetBSD: patch-doc_ssl_SSL__CTX__set__client__CA__list.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ | 1 | $NetBSD: patch-doc_ssl_SSL__CTX__set__client__CA__list.pod,v 1.2 2014/01/10 14:32:42 tron Exp $ | |
2 | 2 | |||
3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | 3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | |
4 | 4 | |||
5 | --- doc/ssl/SSL_CTX_set_client_CA_list.pod.orig 2013-02-11 15:02:48.000000000 +0000 | 5 | --- doc/ssl/SSL_CTX_set_client_CA_list.pod.orig 2014-01-06 13:47:42.000000000 +0000 | |
6 | +++ doc/ssl/SSL_CTX_set_client_CA_list.pod | 6 | +++ doc/ssl/SSL_CTX_set_client_CA_list.pod 2014-01-10 13:19:11.000000000 +0000 | |
7 | @@ -66,11 +66,11 @@ values: | 7 | @@ -66,13 +66,13 @@ | |
8 | 8 | |||
9 | =over 4 | 9 | =over 4 | |
10 | 10 | |||
11 | -=item 1 | |||
12 | +=item Z<>1 | |||
13 | ||||
14 | The operation succeeded. | |||
15 | ||||
16 | -=item 0 | 11 | -=item 0 | |
17 | +=item Z<>0 | 12 | +=item Z<>0 | |
18 | 13 | |||
19 | A failure while manipulating the STACK_OF(X509_NAME) object occurred or | 14 | A failure while manipulating the STACK_OF(X509_NAME) object occurred or | |
20 | the X509_NAME could not be extracted from B<cacert>. Check the error stack | 15 | the X509_NAME could not be extracted from B<cacert>. Check the error stack | |
16 | to find out the reason. | |||
17 | ||||
18 | -=item 1 | |||
19 | +=item Z<>1 | |||
20 | ||||
21 | The operation succeeded. | |||
22 |
@@ -1,28 +1,15 @@ | @@ -1,28 +1,15 @@ | |||
1 | $NetBSD: patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ | 1 | $NetBSD: patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod,v 1.2 2014/01/10 14:32:42 tron Exp $ | |
2 | 2 | |||
3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | 3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | |
4 | 4 | |||
5 | --- doc/ssl/SSL_CTX_use_psk_identity_hint.pod.orig 2013-02-11 15:26:04.000000000 +0000 | 5 | --- doc/ssl/SSL_CTX_use_psk_identity_hint.pod.orig 2014-01-06 13:47:42.000000000 +0000 | |
6 | +++ doc/ssl/SSL_CTX_use_psk_identity_hint.pod | 6 | +++ doc/ssl/SSL_CTX_use_psk_identity_hint.pod 2014-01-10 13:23:46.000000000 +0000 | |
7 | @@ -81,6 +81,8 @@ SSL_CTX_use_psk_identity_hint() and SSL_ | 7 | @@ -96,7 +96,7 @@ | |
8 | ||||
9 | Return values from the server callback are interpreted as follows: | |||
10 | ||||
11 | +=over 1 | |||
12 | + | |||
13 | =item > 0 | |||
14 | ||||
15 | PSK identity was found and the server callback has provided the PSK | |||
16 | @@ -94,9 +96,11 @@ data to B<psk> and return the length of | |||
17 | connection will fail with decryption_error before it will be finished | 8 | connection will fail with decryption_error before it will be finished | |
18 | completely. | 9 | completely. | |
19 | 10 | |||
20 | -=item 0 | 11 | -=item 0 | |
21 | +=item Z<>0 | 12 | +=item Z<>0 | |
22 | 13 | |||
23 | PSK identity was not found. An "unknown_psk_identity" alert message | 14 | PSK identity was not found. An "unknown_psk_identity" alert message | |
24 | will be sent and the connection setup fails. | 15 | will be sent and the connection setup fails. | |
25 | ||||
26 | +=back | |||
27 | + | |||
28 | =cut |
@@ -1,21 +1,22 @@ | @@ -1,21 +1,22 @@ | |||
1 | $NetBSD: patch-doc_ssl_SSL__accept.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ | 1 | $NetBSD: patch-doc_ssl_SSL__accept.pod,v 1.2 2014/01/10 14:32:42 tron Exp $ | |
2 | 2 | |||
3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | 3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | |
4 | 4 | |||
5 | --- doc/ssl/SSL_accept.pod.orig 2013-02-11 15:02:48.000000000 +0000 | 5 | --- doc/ssl/SSL_accept.pod.orig 2014-01-06 13:47:42.000000000 +0000 | |
6 | +++ doc/ssl/SSL_accept.pod | 6 | +++ doc/ssl/SSL_accept.pod 2014-01-10 13:25:21.000000000 +0000 | |
7 | @@ -44,12 +44,12 @@ The following return values can occur: | 7 | @@ -44,13 +44,13 @@ | |
8 | 8 | |||
9 | =over 4 | 9 | =over 4 | |
10 | 10 | |||
11 | -=item 1 | |||
12 | +=item Z<>1 | |||
13 | ||||
14 | The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been | |||
15 | established. | |||
16 | ||||
17 | -=item 0 | 11 | -=item 0 | |
18 | +=item Z<>0 | 12 | +=item Z<>0 | |
19 | 13 | |||
20 | The TLS/SSL handshake was not successful but was shut down controlled and | 14 | The TLS/SSL handshake was not successful but was shut down controlled and | |
21 | by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the | 15 | by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the | |
16 | return value B<ret> to find out the reason. | |||
17 | ||||
18 | -=item 1 | |||
19 | +=item Z<>1 | |||
20 | ||||
21 | The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been | |||
22 | established. |
@@ -1,28 +1,22 @@ | @@ -1,28 +1,22 @@ | |||
1 | $NetBSD: patch-doc_ssl_SSL__connect.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ | 1 | $NetBSD: patch-doc_ssl_SSL__connect.pod,v 1.2 2014/01/10 14:32:42 tron Exp $ | |
2 | 2 | |||
3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | 3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | |
4 | 4 | |||
5 | --- doc/ssl/SSL_connect.pod.orig 2013-02-11 15:02:48.000000000 +0000 | 5 | --- doc/ssl/SSL_connect.pod.orig 2014-01-06 13:47:42.000000000 +0000 | |
6 | +++ doc/ssl/SSL_connect.pod | 6 | +++ doc/ssl/SSL_connect.pod 2014-01-10 13:30:56.000000000 +0000 | |
7 | @@ -41,18 +41,18 @@ The following return values can occur: | 7 | @@ -41,13 +41,13 @@ | |
8 | 8 | |||
9 | =over 4 | 9 | =over 4 | |
10 | 10 | |||
11 | -=item 1 | |||
12 | +=item Z<>1 | |||
13 | ||||
14 | The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been | |||
15 | established. | |||
16 | ||||
17 | -=item 0 | 11 | -=item 0 | |
18 | +=item Z<>0 | 12 | +=item Z<>0 | |
19 | 13 | |||
20 | The TLS/SSL handshake was not successful but was shut down controlled and | 14 | The TLS/SSL handshake was not successful but was shut down controlled and | |
21 | by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the | 15 | by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the | |
22 | return value B<ret> to find out the reason. | 16 | return value B<ret> to find out the reason. | |
23 | 17 | |||
24 | -=item E<lt>0 | 18 | -=item 1 | |
25 | +=item Z<>E<lt>0 | 19 | +=item Z<>1 | |
26 | 20 | |||
27 | The TLS/SSL handshake was not successful, because a fatal error occurred either | 21 | The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been | |
28 | at the protocol level or a connection failure occurred. The shutdown was | 22 | established. |
@@ -1,21 +1,22 @@ | @@ -1,21 +1,22 @@ | |||
1 | $NetBSD: patch-doc_ssl_SSL__do__handshake.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ | 1 | $NetBSD: patch-doc_ssl_SSL__do__handshake.pod,v 1.2 2014/01/10 14:32:42 tron Exp $ | |
2 | 2 | |||
3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | 3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | |
4 | 4 | |||
5 | --- doc/ssl/SSL_do_handshake.pod.orig 2013-02-11 15:02:48.000000000 +0000 | 5 | --- doc/ssl/SSL_do_handshake.pod.orig 2014-01-06 13:47:42.000000000 +0000 | |
6 | +++ doc/ssl/SSL_do_handshake.pod | 6 | +++ doc/ssl/SSL_do_handshake.pod 2014-01-10 13:32:08.000000000 +0000 | |
7 | @@ -45,12 +45,12 @@ The following return values can occur: | 7 | @@ -45,13 +45,13 @@ | |
8 | 8 | |||
9 | =over 4 | 9 | =over 4 | |
10 | 10 | |||
11 | -=item 1 | |||
12 | +=item Z<>1 | |||
13 | ||||
14 | The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been | |||
15 | established. | |||
16 | ||||
17 | -=item 0 | 11 | -=item 0 | |
18 | +=item Z<>0 | 12 | +=item Z<>0 | |
19 | 13 | |||
20 | The TLS/SSL handshake was not successful but was shut down controlled and | 14 | The TLS/SSL handshake was not successful but was shut down controlled and | |
21 | by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the | 15 | by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the | |
16 | return value B<ret> to find out the reason. | |||
17 | ||||
18 | -=item 1 | |||
19 | +=item Z<>1 | |||
20 | ||||
21 | The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been | |||
22 | established. |
@@ -1,21 +1,23 @@ | @@ -1,21 +1,23 @@ | |||
1 | $NetBSD: patch-doc_ssl_SSL__shutdown.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ | 1 | $NetBSD: patch-doc_ssl_SSL__shutdown.pod,v 1.2 2014/01/10 14:32:42 tron Exp $ | |
2 | 2 | |||
3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | 3 | Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. | |
4 | 4 | |||
5 | --- doc/ssl/SSL_shutdown.pod.orig 2013-02-11 15:02:48.000000000 +0000 | 5 | --- doc/ssl/SSL_shutdown.pod.orig 2014-01-06 13:47:42.000000000 +0000 | |
6 | +++ doc/ssl/SSL_shutdown.pod | 6 | +++ doc/ssl/SSL_shutdown.pod 2014-01-10 13:32:54.000000000 +0000 | |
7 | @@ -92,12 +92,12 @@ The following return values can occur: | 7 | @@ -92,14 +92,14 @@ | |
8 | 8 | |||
9 | =over 4 | 9 | =over 4 | |
10 | 10 | |||
11 | -=item 1 | |||
12 | +=item Z<>1 | |||
13 | ||||
14 | The shutdown was successfully completed. The "close notify" alert was sent | |||
15 | and the peer's "close notify" alert was received. | |||
16 | ||||
17 | -=item 0 | 11 | -=item 0 | |
18 | +=item Z<>0 | 12 | +=item Z<>0 | |
19 | 13 | |||
20 | The shutdown is not yet finished. Call SSL_shutdown() for a second time, | 14 | The shutdown is not yet finished. Call SSL_shutdown() for a second time, | |
21 | if a bidirectional shutdown shall be performed. | 15 | if a bidirectional shutdown shall be performed. | |
16 | The output of L<SSL_get_error(3)|SSL_get_error(3)> may be misleading, as an | |||
17 | erroneous SSL_ERROR_SYSCALL may be flagged even though no error occurred. | |||
18 | ||||
19 | -=item 1 | |||
20 | +=item Z<>1 | |||
21 | ||||
22 | The shutdown was successfully completed. The "close notify" alert was sent | |||
23 | and the peer's "close notify" alert was received. |