Fri Jan 10 14:32:42 2014 UTC ()
Update "openssl" package to version 1.0.1f. Changes since 1.0.1e:
- Fix for TLS record tampering bug. A carefully crafted invalid
  handshake could crash OpenSSL with a NULL pointer exception.
  Thanks to Anton Johansson for reporting this issues.
  (CVE-2013-4353)
- Keep original DTLS digest and encryption contexts in retransmission
  structures so we can use the previous session parameters if they need
  to be resent. (CVE-2013-6450)
  [Steve Henson]
- Add option SSL_OP_SAFARI_ECDHE_ECDSA_BUG (part of SSL_OP_ALL) which
  avoids preferring ECDHE-ECDSA ciphers when the client appears to be
  Safari on OS X.  Safari on OS X 10.8..10.8.3 advertises support for
  several ECDHE-ECDSA ciphers, but fails to negotiate them.  The bug
  is fixed in OS X 10.8.4, but Apple have ruled out both hot fixing
  10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer.
  [Rob Stradling, Adam Langley]


(tron)
diff -r1.182 -r1.183 pkgsrc/security/openssl/Makefile
diff -r1.100 -r1.101 pkgsrc/security/openssl/distinfo
diff -r1.1 -r0 pkgsrc/security/openssl/patches/patch-doc_crypto_X509__STORE__CTX__get__error.pod
diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/patch-doc_ssl_SSL__CTX__set__client__CA__list.pod
diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod
diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/patch-doc_ssl_SSL__accept.pod
diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/patch-doc_ssl_SSL__connect.pod
diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/patch-doc_ssl_SSL__do__handshake.pod
diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/patch-doc_ssl_SSL__shutdown.pod

cvs diff -r1.182 -r1.183 pkgsrc/security/openssl/Makefile (expand / switch to unified diff)

--- pkgsrc/security/openssl/Makefile 2013/10/29 21:33:21 1.182
+++ pkgsrc/security/openssl/Makefile 2014/01/10 14:32:42 1.183
@@ -1,18 +1,17 @@ @@ -1,18 +1,17 @@
1# $NetBSD: Makefile,v 1.182 2013/10/29 21:33:21 joerg Exp $ 1# $NetBSD: Makefile,v 1.183 2014/01/10 14:32:42 tron Exp $
2 2
3DISTNAME= openssl-1.0.1e 3DISTNAME= openssl-1.0.1f
4MASTER_SITES= http://ftp.openssl.org/source/ 4MASTER_SITES= http://ftp.openssl.org/source/
5PKGREVISION= 2 
6SVR4_PKGNAME= ossl 5SVR4_PKGNAME= ossl
7CATEGORIES= security 6CATEGORIES= security
8 7
9MAINTAINER= pkgsrc-users@NetBSD.org 8MAINTAINER= pkgsrc-users@NetBSD.org
10HOMEPAGE= http://www.openssl.org/ 9HOMEPAGE= http://www.openssl.org/
11COMMENT= Secure Socket Layer and cryptographic library 10COMMENT= Secure Socket Layer and cryptographic library
12 11
13CONFLICTS= SSLeay-[0-9]* ssleay-[0-9]* 12CONFLICTS= SSLeay-[0-9]* ssleay-[0-9]*
14 13
15CRYPTO= yes 14CRYPTO= yes
16 15
17PKG_INSTALLATION_TYPES= overwrite pkgviews 16PKG_INSTALLATION_TYPES= overwrite pkgviews
18 17

cvs diff -r1.100 -r1.101 pkgsrc/security/openssl/distinfo (expand / switch to unified diff)

--- pkgsrc/security/openssl/distinfo 2013/12/21 12:21:47 1.100
+++ pkgsrc/security/openssl/distinfo 2014/01/10 14:32:42 1.101
@@ -1,34 +1,33 @@ @@ -1,34 +1,33 @@
1$NetBSD: distinfo,v 1.100 2013/12/21 12:21:47 is Exp $ 1$NetBSD: distinfo,v 1.101 2014/01/10 14:32:42 tron Exp $
2 2
3SHA1 (openssl-1.0.1e.tar.gz) = 3f1b1223c9e8189bfe4e186d86449775bd903460 3SHA1 (openssl-1.0.1f.tar.gz) = 9ef09e97dfc9f14ac2c042f3b7e301098794fc0f
4RMD160 (openssl-1.0.1e.tar.gz) = 380827c16f18bed4f2eb3d54a387c7c089b2b299 4RMD160 (openssl-1.0.1f.tar.gz) = db8c07f8753fab2b76118d4c18175290356ed144
5Size (openssl-1.0.1e.tar.gz) = 4459777 bytes 5Size (openssl-1.0.1f.tar.gz) = 4509212 bytes
6SHA1 (patch-aa) = 8311c7af603513d4574946386ba11f4a36953b0c 6SHA1 (patch-aa) = 8311c7af603513d4574946386ba11f4a36953b0c
7SHA1 (patch-ac) = ecdafa378e73bd2d6789c985ea28ef4ab2126aa6 7SHA1 (patch-ac) = ecdafa378e73bd2d6789c985ea28ef4ab2126aa6
8SHA1 (patch-ad) = bb86ac463fc4ab8b485df5f1a4fb9c13c1fc41c3 8SHA1 (patch-ad) = bb86ac463fc4ab8b485df5f1a4fb9c13c1fc41c3
9SHA1 (patch-ae) = 7a58f1765a3761321dcc8dafc5fe2e33207be480 9SHA1 (patch-ae) = 7a58f1765a3761321dcc8dafc5fe2e33207be480
10SHA1 (patch-af) = f305134acfaa17e6a039630d916fbda4900adc85 10SHA1 (patch-af) = f305134acfaa17e6a039630d916fbda4900adc85
11SHA1 (patch-ag) = b407200455878a8a151fc9b4f771fe17552d04fc 11SHA1 (patch-ag) = b407200455878a8a151fc9b4f771fe17552d04fc
12SHA1 (patch-ak) = 049250b9bd42e6f155145703135dab39a7ec17e0 12SHA1 (patch-ak) = 049250b9bd42e6f155145703135dab39a7ec17e0
13SHA1 (patch-crypto_dso_dso__dlfcn.c) = d5d6ca9a517151357efecb6aa9a5f528a5014290 13SHA1 (patch-crypto_dso_dso__dlfcn.c) = d5d6ca9a517151357efecb6aa9a5f528a5014290
14SHA1 (patch-doc_apps_cms.pod) = 24792a0db2d8566e0f8b52833de300f538f6a92e 14SHA1 (patch-doc_apps_cms.pod) = 24792a0db2d8566e0f8b52833de300f538f6a92e
15SHA1 (patch-doc_apps_smine.pod) = 277aee087892f867402ea73bae10383fe24d6e08 15SHA1 (patch-doc_apps_smine.pod) = 277aee087892f867402ea73bae10383fe24d6e08
16SHA1 (patch-doc_crypto_X509__STORE__CTX__get__error.pod) = 39ceb8d8d88f47794c257286c958daa5c408dfd2 
17SHA1 (patch-doc_ssl_SSL__COMP__add__compression__method.pod) = f3fcbe0eae26ac8e24fe937e529ea0dba6ea1639 16SHA1 (patch-doc_ssl_SSL__COMP__add__compression__method.pod) = f3fcbe0eae26ac8e24fe937e529ea0dba6ea1639
18SHA1 (patch-doc_ssl_SSL__CTX__add__session.pod) = db72b7e04bb74595a78bc09379854957dcfaa4c7 17SHA1 (patch-doc_ssl_SSL__CTX__add__session.pod) = db72b7e04bb74595a78bc09379854957dcfaa4c7
19SHA1 (patch-doc_ssl_SSL__CTX__load__verify__locations.pod) = d0fd17e118a1bd19c729a0930a52925b9bb81d6d 18SHA1 (patch-doc_ssl_SSL__CTX__load__verify__locations.pod) = d0fd17e118a1bd19c729a0930a52925b9bb81d6d
20SHA1 (patch-doc_ssl_SSL__CTX__set__client__CA__list.pod) = 964ea426276741f89a9d02dd75baaaabc97e0943 19SHA1 (patch-doc_ssl_SSL__CTX__set__client__CA__list.pod) = df3ab7287667f32454357a3a2eaca8275f01ce08
21SHA1 (patch-doc_ssl_SSL__CTX__set__session__id__context.pod) = b5d711fcf9512c82ec2c7aa61303377006ebfca7 20SHA1 (patch-doc_ssl_SSL__CTX__set__session__id__context.pod) = b5d711fcf9512c82ec2c7aa61303377006ebfca7
22SHA1 (patch-doc_ssl_SSL__CTX__set__ssl__version.pod) = 79340b3f4cfa4293362a79c336e0768711153930 21SHA1 (patch-doc_ssl_SSL__CTX__set__ssl__version.pod) = 79340b3f4cfa4293362a79c336e0768711153930
23SHA1 (patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod) = e39c7f0ac0edaadf0462f78947fa40b11084cced 22SHA1 (patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod) = eb4d8ccfa47ecc3f50dbda5b0ffd98ea740f4ebf
24SHA1 (patch-doc_ssl_SSL__accept.pod) = c5ca9e0333de10d2032d03cf3ce0d9e41b6b495f 23SHA1 (patch-doc_ssl_SSL__accept.pod) = c68aa6eb518d5ca72ae5bd142fd3895e378ca638
25SHA1 (patch-doc_ssl_SSL__clear.pod) = c7d2eb126137ee642294466f0ea9019fcd5e9b92 24SHA1 (patch-doc_ssl_SSL__clear.pod) = c7d2eb126137ee642294466f0ea9019fcd5e9b92
26SHA1 (patch-doc_ssl_SSL__connect.pod) = 78a21f325f5749f0ed491ee71467a4a89848dfe3 25SHA1 (patch-doc_ssl_SSL__connect.pod) = 07327bdb408493c6696efb71070b1b0f7294982c
27SHA1 (patch-doc_ssl_SSL__do__handshake.pod) = 7b8c392568ef965c1709fc3fefe572f591007b24 26SHA1 (patch-doc_ssl_SSL__do__handshake.pod) = f62a43b7b9e59b321cd8dd00d6ea448e3c11d77f
28SHA1 (patch-doc_ssl_SSL__read.pod) = 2a6db16242aceeee645f5b48a9725c5530fbbb8c 27SHA1 (patch-doc_ssl_SSL__read.pod) = 2a6db16242aceeee645f5b48a9725c5530fbbb8c
29SHA1 (patch-doc_ssl_SSL__session__reused.pod) = 0ed7425cf8b098c97ab223cd368c4b18f5187ae5 28SHA1 (patch-doc_ssl_SSL__session__reused.pod) = 0ed7425cf8b098c97ab223cd368c4b18f5187ae5
30SHA1 (patch-doc_ssl_SSL__set__fd.pod) = 68e3f6f3ff0fdfb2113cebb8f08e6d42c442fa2f 29SHA1 (patch-doc_ssl_SSL__set__fd.pod) = 68e3f6f3ff0fdfb2113cebb8f08e6d42c442fa2f
31SHA1 (patch-doc_ssl_SSL__set__session.pod) = e4d8442f4fc827520ca20f108050fcd6314dd41d 30SHA1 (patch-doc_ssl_SSL__set__session.pod) = e4d8442f4fc827520ca20f108050fcd6314dd41d
32SHA1 (patch-doc_ssl_SSL__shutdown.pod) = ca5b1fd9fda9405907697e848614f050978cfb90 31SHA1 (patch-doc_ssl_SSL__shutdown.pod) = 21682f3385a66ba8f0ebd11bb9bb3c6198352783
33SHA1 (patch-doc_ssl_SSL__write.pod) = 67efd6d0de0a0db34c18c62e4a939c0ea49442ca 32SHA1 (patch-doc_ssl_SSL__write.pod) = 67efd6d0de0a0db34c18c62e4a939c0ea49442ca
34SHA1 (patch-engines_ccgost_Makefile) = 08999f0f40969883482ad9ffc1aa9959ed7d402c 33SHA1 (patch-engines_ccgost_Makefile) = 08999f0f40969883482ad9ffc1aa9959ed7d402c

File Deleted: pkgsrc/security/openssl/patches/Attic/patch-doc_crypto_X509__STORE__CTX__get__error.pod

cvs diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__CTX__set__client__CA__list.pod (expand / switch to unified diff)

--- pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__CTX__set__client__CA__list.pod 2013/06/01 08:03:55 1.1
+++ pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__CTX__set__client__CA__list.pod 2014/01/10 14:32:42 1.2
@@ -1,20 +1,22 @@ @@ -1,20 +1,22 @@
1$NetBSD: patch-doc_ssl_SSL__CTX__set__client__CA__list.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ 1$NetBSD: patch-doc_ssl_SSL__CTX__set__client__CA__list.pod,v 1.2 2014/01/10 14:32:42 tron Exp $
2 2
3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. 3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0.
4 4
5--- doc/ssl/SSL_CTX_set_client_CA_list.pod.orig 2013-02-11 15:02:48.000000000 +0000 5--- doc/ssl/SSL_CTX_set_client_CA_list.pod.orig 2014-01-06 13:47:42.000000000 +0000
6+++ doc/ssl/SSL_CTX_set_client_CA_list.pod 6+++ doc/ssl/SSL_CTX_set_client_CA_list.pod 2014-01-10 13:19:11.000000000 +0000
7@@ -66,11 +66,11 @@ values: 7@@ -66,13 +66,13 @@
8  8
9 =over 4 9 =over 4
10  10
11-=item 1 
12+=item Z<>1 
13  
14 The operation succeeded. 
15  
16-=item 0 11-=item 0
17+=item Z<>0 12+=item Z<>0
18  13
19 A failure while manipulating the STACK_OF(X509_NAME) object occurred or 14 A failure while manipulating the STACK_OF(X509_NAME) object occurred or
20 the X509_NAME could not be extracted from B<cacert>. Check the error stack 15 the X509_NAME could not be extracted from B<cacert>. Check the error stack
 16 to find out the reason.
 17
 18-=item 1
 19+=item Z<>1
 20
 21 The operation succeeded.
 22

cvs diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod (expand / switch to unified diff)

--- pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod 2013/06/01 08:03:55 1.1
+++ pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod 2014/01/10 14:32:42 1.2
@@ -1,28 +1,15 @@ @@ -1,28 +1,15 @@
1$NetBSD: patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ 1$NetBSD: patch-doc_ssl_SSL__CTX__use__psk__identity__hint.pod,v 1.2 2014/01/10 14:32:42 tron Exp $
2 2
3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. 3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0.
4 4
5--- doc/ssl/SSL_CTX_use_psk_identity_hint.pod.orig 2013-02-11 15:26:04.000000000 +0000 5--- doc/ssl/SSL_CTX_use_psk_identity_hint.pod.orig 2014-01-06 13:47:42.000000000 +0000
6+++ doc/ssl/SSL_CTX_use_psk_identity_hint.pod 6+++ doc/ssl/SSL_CTX_use_psk_identity_hint.pod 2014-01-10 13:23:46.000000000 +0000
7@@ -81,6 +81,8 @@ SSL_CTX_use_psk_identity_hint() and SSL_ 7@@ -96,7 +96,7 @@
8  
9 Return values from the server callback are interpreted as follows: 
10  
11+=over 1 
12+ 
13 =item > 0 
14  
15 PSK identity was found and the server callback has provided the PSK 
16@@ -94,9 +96,11 @@ data to B<psk> and return the length of 
17 connection will fail with decryption_error before it will be finished 8 connection will fail with decryption_error before it will be finished
18 completely. 9 completely.
19  10
20-=item 0 11-=item 0
21+=item Z<>0 12+=item Z<>0
22  13
23 PSK identity was not found. An "unknown_psk_identity" alert message 14 PSK identity was not found. An "unknown_psk_identity" alert message
24 will be sent and the connection setup fails. 15 will be sent and the connection setup fails.
25  
26+=back 
27+ 
28 =cut 

cvs diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__accept.pod (expand / switch to unified diff)

--- pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__accept.pod 2013/06/01 08:03:55 1.1
+++ pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__accept.pod 2014/01/10 14:32:42 1.2
@@ -1,21 +1,22 @@ @@ -1,21 +1,22 @@
1$NetBSD: patch-doc_ssl_SSL__accept.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ 1$NetBSD: patch-doc_ssl_SSL__accept.pod,v 1.2 2014/01/10 14:32:42 tron Exp $
2 2
3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. 3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0.
4 4
5--- doc/ssl/SSL_accept.pod.orig 2013-02-11 15:02:48.000000000 +0000 5--- doc/ssl/SSL_accept.pod.orig 2014-01-06 13:47:42.000000000 +0000
6+++ doc/ssl/SSL_accept.pod 6+++ doc/ssl/SSL_accept.pod 2014-01-10 13:25:21.000000000 +0000
7@@ -44,12 +44,12 @@ The following return values can occur: 7@@ -44,13 +44,13 @@
8  8
9 =over 4 9 =over 4
10  10
11-=item 1 
12+=item Z<>1 
13  
14 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 
15 established. 
16  
17-=item 0 11-=item 0
18+=item Z<>0 12+=item Z<>0
19  13
20 The TLS/SSL handshake was not successful but was shut down controlled and 14 The TLS/SSL handshake was not successful but was shut down controlled and
21 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 15 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
 16 return value B<ret> to find out the reason.
 17
 18-=item 1
 19+=item Z<>1
 20
 21 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
 22 established.

cvs diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__connect.pod (expand / switch to unified diff)

--- pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__connect.pod 2013/06/01 08:03:55 1.1
+++ pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__connect.pod 2014/01/10 14:32:42 1.2
@@ -1,28 +1,22 @@ @@ -1,28 +1,22 @@
1$NetBSD: patch-doc_ssl_SSL__connect.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ 1$NetBSD: patch-doc_ssl_SSL__connect.pod,v 1.2 2014/01/10 14:32:42 tron Exp $
2 2
3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. 3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0.
4 4
5--- doc/ssl/SSL_connect.pod.orig 2013-02-11 15:02:48.000000000 +0000 5--- doc/ssl/SSL_connect.pod.orig 2014-01-06 13:47:42.000000000 +0000
6+++ doc/ssl/SSL_connect.pod 6+++ doc/ssl/SSL_connect.pod 2014-01-10 13:30:56.000000000 +0000
7@@ -41,18 +41,18 @@ The following return values can occur: 7@@ -41,13 +41,13 @@
8  8
9 =over 4 9 =over 4
10  10
11-=item 1 
12+=item Z<>1 
13  
14 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 
15 established. 
16  
17-=item 0 11-=item 0
18+=item Z<>0 12+=item Z<>0
19  13
20 The TLS/SSL handshake was not successful but was shut down controlled and 14 The TLS/SSL handshake was not successful but was shut down controlled and
21 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 15 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
22 return value B<ret> to find out the reason. 16 return value B<ret> to find out the reason.
23  17
24-=item E<lt>0 18-=item 1
25+=item Z<>E<lt>0 19+=item Z<>1
26  20
27 The TLS/SSL handshake was not successful, because a fatal error occurred either 21 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
28 at the protocol level or a connection failure occurred. The shutdown was 22 established.

cvs diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__do__handshake.pod (expand / switch to unified diff)

--- pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__do__handshake.pod 2013/06/01 08:03:55 1.1
+++ pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__do__handshake.pod 2014/01/10 14:32:42 1.2
@@ -1,21 +1,22 @@ @@ -1,21 +1,22 @@
1$NetBSD: patch-doc_ssl_SSL__do__handshake.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ 1$NetBSD: patch-doc_ssl_SSL__do__handshake.pod,v 1.2 2014/01/10 14:32:42 tron Exp $
2 2
3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. 3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0.
4 4
5--- doc/ssl/SSL_do_handshake.pod.orig 2013-02-11 15:02:48.000000000 +0000 5--- doc/ssl/SSL_do_handshake.pod.orig 2014-01-06 13:47:42.000000000 +0000
6+++ doc/ssl/SSL_do_handshake.pod 6+++ doc/ssl/SSL_do_handshake.pod 2014-01-10 13:32:08.000000000 +0000
7@@ -45,12 +45,12 @@ The following return values can occur: 7@@ -45,13 +45,13 @@
8  8
9 =over 4 9 =over 4
10  10
11-=item 1 
12+=item Z<>1 
13  
14 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been 
15 established. 
16  
17-=item 0 11-=item 0
18+=item Z<>0 12+=item Z<>0
19  13
20 The TLS/SSL handshake was not successful but was shut down controlled and 14 The TLS/SSL handshake was not successful but was shut down controlled and
21 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the 15 by the specifications of the TLS/SSL protocol. Call SSL_get_error() with the
 16 return value B<ret> to find out the reason.
 17
 18-=item 1
 19+=item Z<>1
 20
 21 The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
 22 established.

cvs diff -r1.1 -r1.2 pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__shutdown.pod (expand / switch to unified diff)

--- pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__shutdown.pod 2013/06/01 08:03:55 1.1
+++ pkgsrc/security/openssl/patches/Attic/patch-doc_ssl_SSL__shutdown.pod 2014/01/10 14:32:42 1.2
@@ -1,21 +1,23 @@ @@ -1,21 +1,23 @@
1$NetBSD: patch-doc_ssl_SSL__shutdown.pod,v 1.1 2013/06/01 08:03:55 sbd Exp $ 1$NetBSD: patch-doc_ssl_SSL__shutdown.pod,v 1.2 2014/01/10 14:32:42 tron Exp $
2 2
3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0. 3Fix openssl pod docs to work with the very picky pod2man from perl-5.18.0.
4 4
5--- doc/ssl/SSL_shutdown.pod.orig 2013-02-11 15:02:48.000000000 +0000 5--- doc/ssl/SSL_shutdown.pod.orig 2014-01-06 13:47:42.000000000 +0000
6+++ doc/ssl/SSL_shutdown.pod 6+++ doc/ssl/SSL_shutdown.pod 2014-01-10 13:32:54.000000000 +0000
7@@ -92,12 +92,12 @@ The following return values can occur: 7@@ -92,14 +92,14 @@
8  8
9 =over 4 9 =over 4
10  10
11-=item 1 
12+=item Z<>1 
13  
14 The shutdown was successfully completed. The "close notify" alert was sent 
15 and the peer's "close notify" alert was received. 
16  
17-=item 0 11-=item 0
18+=item Z<>0 12+=item Z<>0
19  13
20 The shutdown is not yet finished. Call SSL_shutdown() for a second time, 14 The shutdown is not yet finished. Call SSL_shutdown() for a second time,
21 if a bidirectional shutdown shall be performed. 15 if a bidirectional shutdown shall be performed.
 16 The output of L<SSL_get_error(3)|SSL_get_error(3)> may be misleading, as an
 17 erroneous SSL_ERROR_SYSCALL may be flagged even though no error occurred.
 18
 19-=item 1
 20+=item Z<>1
 21
 22 The shutdown was successfully completed. The "close notify" alert was sent
 23 and the peer's "close notify" alert was received.