generic-poky/meta/recipes-connectivity/openssl/openssl-1.0.1e/debian
Radu Moisan f720f8f3d2 openssl: Upgrade to v1.0.1e
Dropped obolete patches and pulled updates for debian patches.

Addresses CVEs:

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2686
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0166
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0169

[YOCTO #3965]

(From OE-Core rev: 0470edd01c0aebaa78db137e365a7e22bfb199e9)

Signed-off-by: Radu Moisan <radu.moisan@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-04-09 13:16:53 +01:00
..
c_rehash-compat.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
ca.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
debian-targets.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
make-targets.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
man-dir.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
man-section.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
no-rpath.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
no-symbolic.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
pic.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00
version-script.patch openssl: Upgrade to v1.0.1e 2013-04-09 13:16:53 +01:00