head 1.18; access; symbols pkgsrc-2026Q1:1.18.0.36 pkgsrc-2026Q1-base:1.18 pkgsrc-2025Q4:1.18.0.34 pkgsrc-2025Q4-base:1.18 pkgsrc-2025Q3:1.18.0.32 pkgsrc-2025Q3-base:1.18 pkgsrc-2025Q2:1.18.0.30 pkgsrc-2025Q2-base:1.18 pkgsrc-2025Q1:1.18.0.28 pkgsrc-2025Q1-base:1.18 pkgsrc-2024Q4:1.18.0.26 pkgsrc-2024Q4-base:1.18 pkgsrc-2024Q3:1.18.0.24 pkgsrc-2024Q3-base:1.18 pkgsrc-2024Q2:1.18.0.22 pkgsrc-2024Q2-base:1.18 pkgsrc-2024Q1:1.18.0.20 pkgsrc-2024Q1-base:1.18 pkgsrc-2023Q4:1.18.0.18 pkgsrc-2023Q4-base:1.18 pkgsrc-2023Q3:1.18.0.16 pkgsrc-2023Q3-base:1.18 pkgsrc-2023Q2:1.18.0.14 pkgsrc-2023Q2-base:1.18 pkgsrc-2023Q1:1.18.0.12 pkgsrc-2023Q1-base:1.18 pkgsrc-2022Q4:1.18.0.10 pkgsrc-2022Q4-base:1.18 pkgsrc-2022Q3:1.18.0.8 pkgsrc-2022Q3-base:1.18 pkgsrc-2022Q2:1.18.0.6 pkgsrc-2022Q2-base:1.18 pkgsrc-2022Q1:1.18.0.4 pkgsrc-2022Q1-base:1.18 pkgsrc-2021Q4:1.18.0.2 pkgsrc-2021Q4-base:1.18 pkgsrc-2021Q3:1.16.0.44 pkgsrc-2021Q3-base:1.16 pkgsrc-2021Q2:1.16.0.42 pkgsrc-2021Q2-base:1.16 pkgsrc-2021Q1:1.16.0.40 pkgsrc-2021Q1-base:1.16 pkgsrc-2020Q4:1.16.0.38 pkgsrc-2020Q4-base:1.16 pkgsrc-2020Q3:1.16.0.36 pkgsrc-2020Q3-base:1.16 pkgsrc-2020Q2:1.16.0.32 pkgsrc-2020Q2-base:1.16 pkgsrc-2020Q1:1.16.0.12 pkgsrc-2020Q1-base:1.16 pkgsrc-2019Q4:1.16.0.34 pkgsrc-2019Q4-base:1.16 pkgsrc-2019Q3:1.16.0.30 pkgsrc-2019Q3-base:1.16 pkgsrc-2019Q2:1.16.0.28 pkgsrc-2019Q2-base:1.16 pkgsrc-2019Q1:1.16.0.26 pkgsrc-2019Q1-base:1.16 pkgsrc-2018Q4:1.16.0.24 pkgsrc-2018Q4-base:1.16 pkgsrc-2018Q3:1.16.0.22 pkgsrc-2018Q3-base:1.16 pkgsrc-2018Q2:1.16.0.20 pkgsrc-2018Q2-base:1.16 pkgsrc-2018Q1:1.16.0.18 pkgsrc-2018Q1-base:1.16 pkgsrc-2017Q4:1.16.0.16 pkgsrc-2017Q4-base:1.16 pkgsrc-2017Q3:1.16.0.14 pkgsrc-2017Q3-base:1.16 pkgsrc-2017Q2:1.16.0.10 pkgsrc-2017Q2-base:1.16 pkgsrc-2017Q1:1.16.0.8 pkgsrc-2017Q1-base:1.16 pkgsrc-2016Q4:1.16.0.6 pkgsrc-2016Q4-base:1.16 pkgsrc-2016Q3:1.16.0.4 pkgsrc-2016Q3-base:1.16 pkgsrc-2016Q2:1.16.0.2 pkgsrc-2016Q2-base:1.16 pkgsrc-2016Q1:1.15.0.4 pkgsrc-2016Q1-base:1.15 pkgsrc-2015Q4:1.15.0.2 pkgsrc-2015Q4-base:1.15 pkgsrc-2015Q3:1.14.0.2 pkgsrc-2015Q3-base:1.14 pkgsrc-2015Q2:1.13.0.4 pkgsrc-2015Q2-base:1.13 pkgsrc-2015Q1:1.13.0.2 pkgsrc-2015Q1-base:1.13 pkgsrc-2014Q4:1.12.0.2 pkgsrc-2014Q4-base:1.12 pkgsrc-2014Q3:1.10.0.2 pkgsrc-2014Q3-base:1.10 pkgsrc-2014Q2:1.9.0.2 pkgsrc-2014Q2-base:1.9 pkgsrc-2014Q1:1.3.0.2 pkgsrc-2014Q1-base:1.3 pkgsrc-2013Q4:1.1.0.2 pkgsrc-2013Q4-base:1.1; locks; strict; comment @# @; 1.18 date 2021.10.26.10.24.13; author nia; state Exp; branches; next 1.17; commitid EqWu6cZXDZxK5jeD; 1.17 date 2021.10.07.13.49.50; author nia; state Exp; branches; next 1.16; commitid TRhDzHVorQ9JQSbD; 1.16 date 2016.06.17.17.21.39; author tsutsui; state Exp; branches; next 1.15; commitid iDdV3eVbtT7zjQaz; 1.15 date 2015.11.03.20.31.09; author agc; state Exp; branches; next 1.14; commitid OCLictVGb8NpDGHy; 1.14 date 2015.07.28.08.49.15; author wiz; state Exp; branches; next 1.13; commitid oJEoZpvwtdHMU1vy; 1.13 date 2015.01.24.01.01.54; author obache; state Exp; branches 1.13.4.1; next 1.12; commitid hrxXdzIyMAfChd7y; 1.12 date 2014.11.24.10.47.45; author obache; state Exp; branches; next 1.11; commitid E0ndm0eWjKBeuqZx; 1.11 date 2014.11.03.09.28.39; author obache; state Exp; branches; next 1.10; commitid tz7ApJaQxIIWIIWx; 1.10 date 2014.08.22.08.43.09; author obache; state Exp; branches; next 1.9; commitid z3WFnKfXvUbIOkNx; 1.9 date 2014.06.06.09.53.29; author obache; state Exp; branches 1.9.2.1; next 1.8; commitid jycGs6FTsnuhGrDx; 1.8 date 2014.05.14.09.31.44; author obache; state Exp; branches; next 1.7; commitid URoaHaioRXxtiuAx; 1.7 date 2014.05.03.02.10.06; author obache; state Exp; branches; next 1.6; commitid xzABQRmQGnAOc2zx; 1.6 date 2014.04.23.13.14.42; author obache; state Exp; branches; next 1.5; commitid GCLvupa3vWPVcOxx; 1.5 date 2014.04.08.14.46.39; author obache; state Exp; branches; next 1.4; commitid mvzv74eqtTPCcTvx; 1.4 date 2014.04.04.12.50.14; author obache; state Exp; branches; next 1.3; commitid jYjjbBkxLRuwGmvx; 1.3 date 2014.01.20.12.18.12; author obache; state Exp; branches 1.3.2.1; next 1.2; commitid yhk638Kr8hPhTQlx; 1.2 date 2014.01.05.09.44.59; author obache; state Exp; branches; next 1.1; commitid POFoIw1frp6pwUjx; 1.1 date 2013.12.05.11.42.16; author obache; state Exp; branches 1.1.2.1; next ; commitid rpke7eBZXYe2aWfx; 1.13.4.1 date 2015.08.01.09.19.56; author tron; state Exp; branches; next ; commitid 4byN7MIwlgEhYxvy; 1.9.2.1 date 2014.08.22.17.13.35; author tron; state Exp; branches; next ; commitid erfYty4U1IglEnNx; 1.3.2.1 date 2014.04.05.15.59.58; author tron; state Exp; branches; next 1.3.2.2; commitid gd5LkS3ZNxp6Ivvx; 1.3.2.2 date 2014.04.08.20.01.23; author tron; state Exp; branches; next 1.3.2.3; commitid G05mwLiKUtDWWUvx; 1.3.2.3 date 2014.05.05.17.10.18; author tron; state Exp; branches; next 1.3.2.4; commitid Khf48LpSfSgr8nzx; 1.3.2.4 date 2014.05.14.20.57.59; author tron; state Exp; branches; next 1.3.2.5; commitid i1WhWOyaCnvC6yAx; 1.3.2.5 date 2014.06.15.12.55.05; author tron; state Exp; branches; next ; commitid lPCO3G0EaHlbpCEx; 1.1.2.1 date 2014.01.05.20.20.36; author spz; state Exp; branches; next 1.1.2.2; commitid 4DMidsy8AjrS2Yjx; 1.1.2.2 date 2014.01.20.23.13.00; author tron; state Exp; branches; next ; commitid RtjURmR1daO7wUlx; desc @@ 1.18 log @emulators: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes The following distfiles could not be fetched (mostly distfiles fetched conditionally...): ./emulators/compat30/distinfo compat30-alpha-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-arm-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-m68k-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-mipseb-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-mipsel-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-powerpc-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-sh3eb-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-sh3el-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-sparc-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-sparc64-3.1.tar.bz2 ./emulators/compat30/distinfo compat30-vax-3.1.tar.bz2 ./emulators/compat51-x11/distinfo compat51-x11-alpha-5.1.tar.bz2 ./emulators/compat51-x11/distinfo compat51-x11-arm-5.1.tar.bz2 ./emulators/compat51-x11/distinfo compat51-x11-m68k-5.1.tar.bz2 ./emulators/compat51-x11/distinfo compat51-x11-mipseb-5.1.tar.bz2 ./emulators/compat51-x11/distinfo compat51-x11-mipsel-5.1.tar.bz2 ./emulators/compat51-x11/distinfo compat51-x11-powerpc-5.1.tar.bz2 ./emulators/compat51-x11/distinfo compat51-x11-sparc-5.1.tar.bz2 ./emulators/compat51-x11/distinfo compat51-x11-sparc64-5.1.tar.bz2 ./emulators/xbeeb/distinfo BASIC2.rom ./emulators/xbeeb/distinfo OS-1.2.rom ./emulators/compat61/distinfo 20150430/compat61-alpha-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-arm-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-m68k-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-mips64eb-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-mips64el-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-mipseb-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-mipsel-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-powerpc-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-sparc-6.1.tar.bz2 ./emulators/compat61/distinfo 20150430/compat61-sparc64-6.1.tar.bz2 ./emulators/compat16/distinfo compat16-alpha-1.6.2.tar.bz2 ./emulators/compat16/distinfo compat16-arm-1.6.2.tar.bz2 ./emulators/compat16/distinfo compat16-m68k-1.6.2.tar.bz2 ./emulators/compat16/distinfo compat16-mipseb-1.6.2.tar.bz2 ./emulators/compat16/distinfo compat16-mipsel-1.6.2.tar.bz2 ./emulators/compat16/distinfo compat16-powerpc-1.6.2.tar.bz2 ./emulators/compat16/distinfo compat16-sparc-1.6.2.tar.bz2 ./emulators/compat16/distinfo compat16-sparc64-1.6.2.tar.bz2 ./emulators/compat16/distinfo compat16-vax-1.6.2.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-alpha-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-arm-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-m68k-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-mipseb-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-mipsel-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-powerpc-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-sh3eb-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-sh3el-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-sparc-4.0.tar.bz2 ./emulators/compat40/distinfo 20071230/compat40-sparc64-4.0.tar.bz2 ./emulators/compat20/distinfo compat20-alpha-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-arm-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-m68k-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-mipseb-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-mipsel-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-powerpc-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-sh3eb-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-sh3el-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-sparc-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-sparc64-2.1.tar.bz2 ./emulators/compat20/distinfo compat20-vax-2.1.tar.bz2 ./emulators/compat50-x11/distinfo compat50-x11-sparc64-5.0.tar.bz2 ./emulators/compat12/distinfo compat12-m68k-1.2.1.tar.bz2 ./emulators/compat12/distinfo compat12-ns32k-1.2.tar.bz2 ./emulators/compat12/distinfo compat12-sparc-1.2.1.tar.bz2 ./emulators/compat15/distinfo compat15-alpha-1.5.3.tar.bz2 ./emulators/compat15/distinfo compat15-arm-1.5.3.tar.bz2 ./emulators/compat15/distinfo compat15-m68k-1.5.3.tar.bz2 ./emulators/compat15/distinfo compat15-mipsel-1.5.3.tar.bz2 ./emulators/compat15/distinfo compat15-ns32k-1.5.3.tar.bz2 ./emulators/compat15/distinfo compat15-powerpc-1.5.3.tar.bz2 ./emulators/compat15/distinfo compat15-sparc-1.5.3.tar.bz2 ./emulators/compat15/distinfo compat15-sparc64-1.5.2.tar.bz2 ./emulators/compat15/distinfo compat15-vax-1.5.3.tar.bz2 ./emulators/compat50/distinfo compat50-alpha-5.0.tar.bz2 ./emulators/compat50/distinfo compat50-arm-5.0.tar.bz2 ./emulators/compat50/distinfo compat50-m68k-5.0.tar.bz2 ./emulators/compat50/distinfo compat50-mipseb-5.0.tar.bz2 ./emulators/compat50/distinfo compat50-mipsel-5.0.tar.bz2 ./emulators/compat50/distinfo compat50-powerpc-5.0.tar.bz2 ./emulators/compat50/distinfo compat50-sparc-5.0.tar.bz2 ./emulators/compat50/distinfo compat50-sparc64-5.0.tar.bz2 ./emulators/compat16-extras/distinfo compat16-extras-sparc-1.6.2.tar.bz2 ./emulators/compat40-extras/distinfo 20071230/compat40-extras-sparc-4.0.tar.bz2 ./emulators/compat15-extras/distinfo compat15-extras-sparc-1.5.3.tar.bz2 ./emulators/compat60/distinfo 20150428/compat60-alpha-6.0.tar.bz2 ./emulators/compat60/distinfo 20150428/compat60-arm-6.0.tar.bz2 ./emulators/compat60/distinfo 20150428/compat60-m68k-6.0.tar.bz2 ./emulators/compat60/distinfo 20150428/compat60-mipseb-6.0.tar.bz2 ./emulators/compat60/distinfo 20150428/compat60-mipsel-6.0.tar.bz2 ./emulators/compat60/distinfo 20150428/compat60-powerpc-6.0.tar.bz2 ./emulators/compat60/distinfo 20150428/compat60-sparc-6.0.tar.bz2 ./emulators/compat60/distinfo 20150428/compat60-sparc64-6.0.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-alpha-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-arm-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-m68k-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-mips64eb-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-mips64el-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-mipseb-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-mipsel-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-powerpc-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-sparc-6.1.tar.bz2 ./emulators/compat61-x11/distinfo 20150430/compat61-x11-sparc64-6.1.tar.bz2 ./emulators/osf1_lib/distinfo netscape-4.7-3.alpha.rpm ./emulators/compat20-extras/distinfo compat20-extras-sparc-2.1.tar.bz2 ./emulators/compat30-extras/distinfo compat30-extras-sparc-3.1.tar.bz2 ./emulators/compat30-extras/distinfo compat30-extras-vax-3.1.tar.bz2 ./emulators/compat14/distinfo compat14-alpha-1.4.3.tar.bz2 ./emulators/compat14/distinfo compat14-arm-1.4.3.tar.bz2 ./emulators/compat14/distinfo compat14-m68k-1.4.3.tar.bz2 ./emulators/compat14/distinfo compat14-mipsel-1.4.3.tar.bz2 ./emulators/compat14/distinfo compat14-ns32k-1.4.2.tar.bz2 ./emulators/compat14/distinfo compat14-powerpc-1.4.3.tar.bz2 ./emulators/compat14/distinfo compat14-sparc-1.4.3.1.tar.bz2 ./emulators/compat14/distinfo compat14-vax-1.4.3.tar.bz2 ./emulators/compat51/distinfo compat51-alpha-5.1.tar.bz2 ./emulators/compat51/distinfo compat51-arm-5.1.tar.bz2 ./emulators/compat51/distinfo compat51-m68k-5.1.tar.bz2 ./emulators/compat51/distinfo compat51-mipseb-5.1.tar.bz2 ./emulators/compat51/distinfo compat51-mipsel-5.1.tar.bz2 ./emulators/compat51/distinfo compat51-powerpc-5.1.tar.bz2 ./emulators/compat51/distinfo compat51-sparc-5.1.tar.bz2 ./emulators/compat51/distinfo compat51-sparc64-5.1.tar.bz2 ./emulators/compat13/distinfo compat13-alpha-1.3.3.tar.bz2 ./emulators/compat13/distinfo compat13-arm-1.3.2.tar.bz2 ./emulators/compat13/distinfo compat13-m68k-1.3.3.tar.bz2 ./emulators/compat13/distinfo compat13-mipsel-1.3.3.tar.bz2 ./emulators/compat13/distinfo compat13-ns32k-1.3.3.tar.bz2 ./emulators/compat13/distinfo compat13-sparc-1.3.3.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-alpha-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-arm-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-armeb-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-armv6hf-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-armv7hf-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-earm-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-earmv7hfeb-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-m68k-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-mips64eb-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-mips64el-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-mipseb-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-mipsel-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-powerpc-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-sh3eb-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-sh3el-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-sparc-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-sparc64-8.0.tar.bz2 ./emulators/compat80/distinfo 20191014/compat80-vax-8.0.tar.bz2 @ text @$NetBSD: distinfo,v 1.17 2021/10/07 13:49:50 nia Exp $ BLAKE2s (suse131/libopenssl1_0_0-1.0.1k-11.87.1.i586.rpm) = e907cc9c9ba82ec228d86831388d8b013bf5ba0849073de4207877f946081478 SHA512 (suse131/libopenssl1_0_0-1.0.1k-11.87.1.i586.rpm) = f52028269e840b54d51d80e90ed88e6527bfa2e2de58b0f926b0d479b6252ab2c25a37de5a6e3cec97235d9c0f616d9461344ffc9abb71de495beb9459a37a5a Size (suse131/libopenssl1_0_0-1.0.1k-11.87.1.i586.rpm) = 778674 bytes BLAKE2s (suse131/libopenssl1_0_0-1.0.1k-11.87.1.x86_64.rpm) = 7f7afeb47bebc7644b63860ee7cdc6a733f8464e73f245035465f7daece8f67a SHA512 (suse131/libopenssl1_0_0-1.0.1k-11.87.1.x86_64.rpm) = fd98d4b318a9119b73501dfa336300654220d56531ea7963b42ad56419d30a3f31ff4f54a885ef621229c81db625c57d8924d08ddc990324e5712832bf8b670b Size (suse131/libopenssl1_0_0-1.0.1k-11.87.1.x86_64.rpm) = 828722 bytes @ 1.17 log @emulators: Remove SHA1 hashes for distfiles @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.16 2016/06/17 17:21:39 tsutsui Exp $ d3 1 a3 1 RMD160 (suse131/libopenssl1_0_0-1.0.1k-11.87.1.i586.rpm) = 104c3a340e37e20737f3786bfb5c08a8585101be d6 1 a6 1 RMD160 (suse131/libopenssl1_0_0-1.0.1k-11.87.1.x86_64.rpm) = 55ce5a1618e82f6a0372a791d66917406174a2fc @ 1.16 log @Update more RPMs from Suse 13.1. @ text @d1 1 a1 1 $NetBSD$ a2 1 SHA1 (suse131/libopenssl1_0_0-1.0.1k-11.87.1.i586.rpm) = 780d197cf6ed01464c12726fccb9889b3999ab9b a5 1 SHA1 (suse131/libopenssl1_0_0-1.0.1k-11.87.1.x86_64.rpm) = cd02bc764d8d1632e8f868ba3fc371117dd375de @ 1.15 log @Add SHA512 digests for distfiles for emulators category Problems found with existing digests: Package suse131_libSDL 1c4d17a53bece6243cb3e6dd11c36d50f851a4f4 [recorded] da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated] Package suse131_libdbus de99fcfa8e2c7ced28caf38c24d217d6037aaa56 [recorded] da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated] Package suse131_qt4 94daff738912c96ed8878ce1a131cd49fb379206 [recorded] 886206018431aee9f8a01e1fb7e46973e8dca9d9 [calculated] Problems found locating distfiles for atari800, compat12, compat 13, compat14, compat15, compat20, compat30, compat40, compat50, compat50-x11, compat51, compat51-x11, compat60, compat61, compat61-x11, fmsx, osf1_lib, vice, xbeeb, xm7. Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.14 2015/07/28 08:49:15 wiz Exp $ d3 8 a10 8 SHA1 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.i586.rpm) = 3ed012b5838f694b133bee4629a4a38282ee5bdb RMD160 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.i586.rpm) = 6274c98f3579689d24c0ffe9de5f36cefb21dfd7 SHA512 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.i586.rpm) = 552bae2cb35e651c1997ca37bfa9d619c3a185d21dd5714dc6e33b5b90687a4e1533a92c25e5ee4bbaa8f0aebd182fe24e616cfd45b12681ad15ea9bea8abe12 Size (suse131/libopenssl1_0_0-1.0.1k-11.72.1.i586.rpm) = 772597 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.x86_64.rpm) = d6591354d9db02302ef1fe142970e97d31ea544e RMD160 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.x86_64.rpm) = f8a144990be5780dfb83919bc4188a7b8920c4f0 SHA512 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.x86_64.rpm) = f18a3ad45b373311bcf3a04db5503031a255fb4b01dd4df8a221f4df566c376526f689f96217e51e42b05e7b5b01917ffccc3de817f778e59cd62ebb087dfae8 Size (suse131/libopenssl1_0_0-1.0.1k-11.72.1.x86_64.rpm) = 823738 bytes @ 1.14 log @Update RPMs from latest openSUSE 13.1 files. From Rin Okuyama in PR 50082. @ text @d1 1 a1 1 $NetBSD$ d5 1 d9 1 @ 1.13 log @Apply following update to suse131_openssl, bump PKGREVISION. openSUSE Security Update: Security update for openssl ______________________________________________________________________________ Announcement ID: openSUSE-SU-2015:0130-1 Rating: important References: #911399 #912014 #912015 #912018 #912292 #912293 #912294 #912296 Cross-References: CVE-2014-3569 CVE-2014-3570 CVE-2014-3571 CVE-2014-3572 CVE-2014-8275 CVE-2015-0204 CVE-2015-0205 CVE-2015-0206 Affected Products: openSUSE 13.2 openSUSE 13.1 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: openssl was updated to 1.0.1k to fix various security issues and bugs. More information can be found in the openssl advisory: http://openssl.org/news/secadv_20150108.txt Following issues were fixed: * CVE-2014-3570 (bsc#912296): Bignum squaring (BN_sqr) may have produced incorrect results on some platforms, including x86_64. * CVE-2014-3571 (bsc#912294): Fixed crash in dtls1_get_record whilst in the listen state where you get two separate reads performed - one for the header and one for the body of the handshake record. * CVE-2014-3572 (bsc#912015): Don't accept a handshake using an ephemeral ECDH ciphersuites with the server key exchange message omitted. * CVE-2014-8275 (bsc#912018): Fixed various certificate fingerprint issues. * CVE-2015-0204 (bsc#912014): Only allow ephemeral RSA keys in export ciphersuites * CVE-2015-0205 (bsc#912293): A fixwas added to prevent use of DH client certificates without sending certificate verify message. * CVE-2015-0206 (bsc#912292): A memory leak was fixed in dtls1_buffer_record. References: http://support.novell.com/security/cve/CVE-2014-3569.html http://support.novell.com/security/cve/CVE-2014-3570.html http://support.novell.com/security/cve/CVE-2014-3571.html http://support.novell.com/security/cve/CVE-2014-3572.html http://support.novell.com/security/cve/CVE-2014-8275.html http://support.novell.com/security/cve/CVE-2015-0204.html http://support.novell.com/security/cve/CVE-2015-0205.html http://support.novell.com/security/cve/CVE-2015-0206.html https://bugzilla.suse.com/show_bug.cgi?id=911399 https://bugzilla.suse.com/show_bug.cgi?id=912014 https://bugzilla.suse.com/show_bug.cgi?id=912015 https://bugzilla.suse.com/show_bug.cgi?id=912018 https://bugzilla.suse.com/show_bug.cgi?id=912292 https://bugzilla.suse.com/show_bug.cgi?id=912293 https://bugzilla.suse.com/show_bug.cgi?id=912294 https://bugzilla.suse.com/show_bug.cgi?id=912296 @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.12 2014/11/24 10:47:45 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1k-11.64.2.i586.rpm) = f5e5231bd256363f501f12fb3b9253ddb44e091e RMD160 (suse131/libopenssl1_0_0-1.0.1k-11.64.2.i586.rpm) = bb5770f3f44cd0a3313243cd7dce80675bd38e33 Size (suse131/libopenssl1_0_0-1.0.1k-11.64.2.i586.rpm) = 770010 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1k-11.64.2.x86_64.rpm) = e57577dea61a189f9d481f486818db2f0e5cbb9d RMD160 (suse131/libopenssl1_0_0-1.0.1k-11.64.2.x86_64.rpm) = f094e603beacb01cfe2eacf3caca83fcbbf17a07 Size (suse131/libopenssl1_0_0-1.0.1k-11.64.2.x86_64.rpm) = 820981 bytes @ 1.13.4.1 log @Pullup ticket #4787 - requested by wiz emulators/suse131_base: security update emulators/suse131_freetype2: security update emulators/suse131_glib2: security update emulators/suse131_glx: security update emulators/suse131_gtk2: security update emulators/suse131_krb5: security update emulators/suse131_libSDL: security update emulators/suse131_libcups: security update emulators/suse131_libcurl: security update emulators/suse131_libdbus: security update emulators/suse131_libidn: security update emulators/suse131_libjpeg: security update emulators/suse131_libsndfile: security update emulators/suse131_libssh: security update emulators/suse131_libtiff: security update emulators/suse131_locale: security update emulators/suse131_mozilla-nspr: security update emulators/suse131_mozilla-nss: security update emulators/suse131_openssl: security update emulators/suse131_qt4: security update emulators/suse131_x11: security update Revisions pulled up: - emulators/suse131_base/Makefile 1.15 - emulators/suse131_base/distinfo 1.11 - emulators/suse131_freetype2/Makefile 1.5 - emulators/suse131_freetype2/distinfo 1.2 - emulators/suse131_glib2/Makefile 1.5 - emulators/suse131_glib2/distinfo 1.2 - emulators/suse131_glx/Makefile 1.10 - emulators/suse131_glx/distinfo 1.5 - emulators/suse131_gtk2/Makefile 1.11 - emulators/suse131_gtk2/distinfo 1.7 - emulators/suse131_krb5/Makefile 1.7 - emulators/suse131_krb5/distinfo 1.4 - emulators/suse131_libSDL/Makefile 1.5 - emulators/suse131_libSDL/distinfo 1.2 - emulators/suse131_libcups/Makefile 1.5 - emulators/suse131_libcups/distinfo 1.2 - emulators/suse131_libcurl/Makefile 1.10 - emulators/suse131_libcurl/distinfo 1.7 - emulators/suse131_libdbus/Makefile 1.12 - emulators/suse131_libdbus/distinfo 1.8 - emulators/suse131_libidn/Makefile 1.5 - emulators/suse131_libidn/distinfo 1.2 - emulators/suse131_libjpeg/Makefile 1.5 - emulators/suse131_libjpeg/distinfo 1.2 - emulators/suse131_libsndfile/Makefile 1.6 - emulators/suse131_libsndfile/distinfo 1.3 - emulators/suse131_libssh/Makefile 1.5 - emulators/suse131_libssh/distinfo 1.2 - emulators/suse131_libtiff/Makefile 1.6 - emulators/suse131_libtiff/distinfo 1.3 - emulators/suse131_locale/Makefile 1.5 - emulators/suse131_locale/distinfo 1.2 - emulators/suse131_mozilla-nspr/Makefile 1.8 - emulators/suse131_mozilla-nspr/distinfo 1.5 - emulators/suse131_mozilla-nss/Makefile 1.9 - emulators/suse131_mozilla-nss/distinfo 1.6 - emulators/suse131_openssl/Makefile 1.17 - emulators/suse131_openssl/distinfo 1.14 - emulators/suse131_qt4/Makefile 1.8 - emulators/suse131_qt4/distinfo 1.5 - emulators/suse131_x11/Makefile 1.11 - emulators/suse131_x11/distinfo 1.7 --- Module Name: pkgsrc Committed By: wiz Date: Tue Jul 28 08:49:16 UTC 2015 Modified Files: pkgsrc/emulators/suse131_base: Makefile distinfo pkgsrc/emulators/suse131_freetype2: Makefile distinfo pkgsrc/emulators/suse131_glib2: Makefile distinfo pkgsrc/emulators/suse131_glx: Makefile distinfo pkgsrc/emulators/suse131_gtk2: Makefile distinfo pkgsrc/emulators/suse131_krb5: Makefile distinfo pkgsrc/emulators/suse131_libSDL: Makefile distinfo pkgsrc/emulators/suse131_libcups: Makefile distinfo pkgsrc/emulators/suse131_libcurl: Makefile distinfo pkgsrc/emulators/suse131_libdbus: Makefile distinfo pkgsrc/emulators/suse131_libidn: Makefile distinfo pkgsrc/emulators/suse131_libjpeg: Makefile distinfo pkgsrc/emulators/suse131_libsndfile: Makefile distinfo pkgsrc/emulators/suse131_libssh: Makefile distinfo pkgsrc/emulators/suse131_libtiff: Makefile distinfo pkgsrc/emulators/suse131_locale: Makefile distinfo pkgsrc/emulators/suse131_mozilla-nspr: Makefile distinfo pkgsrc/emulators/suse131_mozilla-nss: Makefile distinfo pkgsrc/emulators/suse131_openssl: Makefile distinfo pkgsrc/emulators/suse131_qt4: Makefile distinfo pkgsrc/emulators/suse131_x11: Makefile distinfo Log Message: Update RPMs from latest openSUSE 13.1 files. >From Rin Okuyama in PR 50082. @ text @d1 1 a1 1 $NetBSD$ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.i586.rpm) = 3ed012b5838f694b133bee4629a4a38282ee5bdb RMD160 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.i586.rpm) = 6274c98f3579689d24c0ffe9de5f36cefb21dfd7 Size (suse131/libopenssl1_0_0-1.0.1k-11.72.1.i586.rpm) = 772597 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.x86_64.rpm) = d6591354d9db02302ef1fe142970e97d31ea544e RMD160 (suse131/libopenssl1_0_0-1.0.1k-11.72.1.x86_64.rpm) = f8a144990be5780dfb83919bc4188a7b8920c4f0 Size (suse131/libopenssl1_0_0-1.0.1k-11.72.1.x86_64.rpm) = 823738 bytes @ 1.12 log @Bump PKGREVISION to 11 for suse131_openssl. openSUSE Security Update: openssl: fixed elliptic curve handshake failure ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:1474-1 Rating: low References: #905037 Affected Products: openSUSE 13.2 openSUSE 13.1 openSUSE 12.3 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This openssl update fixes a TLS handshake problem when elliptic curves are in use. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.11 2014/11/03 09:28:39 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1j-11.59.1.i586.rpm) = da5698935ddd9aec3ef30eac423ac447db5a787c RMD160 (suse131/libopenssl1_0_0-1.0.1j-11.59.1.i586.rpm) = d426aad6f6a218e937b8ad544e09429fdf5c408e Size (suse131/libopenssl1_0_0-1.0.1j-11.59.1.i586.rpm) = 769059 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1j-11.59.1.x86_64.rpm) = db1f917a9b55bd4e6eb9b067d6ca2e5f11ca9c9f RMD160 (suse131/libopenssl1_0_0-1.0.1j-11.59.1.x86_64.rpm) = 3505534e244ccc91109ca90cf18f04a572834718 Size (suse131/libopenssl1_0_0-1.0.1j-11.59.1.x86_64.rpm) = 819451 bytes @ 1.11 log @Apply following security update to suse131_openssl, bump PKGREVISION to 10. openSUSE Security Update: update for openssl ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:1331-1 Rating: important References: #901223 #901277 Cross-References: CVE-2014-3513 CVE-2014-3566 CVE-2014-3567 CVE-2014-3568 Affected Products: openSUSE 13.1 openSUSE 12.3 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: The following issues were fixed in this release: CVE-2014-3566: SSLv3 POODLE attack (bnc#901223) CVE-2014-3513, CVE-2014-3567: DTLS memory leak and session ticket memory leak @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.10 2014/08/22 08:43:09 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1j-11.56.1.i586.rpm) = 0ed8165a82d1824cd7e8da57ea06be8a33ef8013 RMD160 (suse131/libopenssl1_0_0-1.0.1j-11.56.1.i586.rpm) = fa986feaea4b2ee0c18c34e78796012a997a2e6b Size (suse131/libopenssl1_0_0-1.0.1j-11.56.1.i586.rpm) = 769224 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1j-11.56.1.x86_64.rpm) = d41f9c28a3b78b4b510d00a82b57afe40eaa9729 RMD160 (suse131/libopenssl1_0_0-1.0.1j-11.56.1.x86_64.rpm) = 70f16e4a41e26f285cf9fe49d212f751d25d11c9 Size (suse131/libopenssl1_0_0-1.0.1j-11.56.1.x86_64.rpm) = 818911 bytes @ 1.10 log @ openSUSE Security Update: update for openssl ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:1052-1 Rating: moderate References: #890764 #890765 #890766 #890767 #890768 #890769 #890770 #890771 #890772 Cross-References: CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 CVE-2014-3512 CVE-2014-5139 Affected Products: openSUSE 13.1 openSUSE 12.3 ______________________________________________________________________________ An update that fixes 9 vulnerabilities is now available. Description: This openssl update fixes the following security issues: - openssl 1.0.1i * Information leak in pretty printing functions (CVE-2014-3508) * Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139) * Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509) * Double Free when processing DTLS packets (CVE-2014-3505) * DTLS memory exhaustion (CVE-2014-3506) * DTLS memory leak from zero-length fragments (CVE-2014-3507) * OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510) * OpenSSL TLS protocol downgrade attack (CVE-2014-3511) * SRP buffer overrun (CVE-2014-3512) @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.9 2014/06/06 09:53:29 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1i-11.52.1.i586.rpm) = 68820d833bc41f03de3e786ceff069851fe200a0 RMD160 (suse131/libopenssl1_0_0-1.0.1i-11.52.1.i586.rpm) = 49f2c34353cb91e97ccd476d0fe9b185c69cfbd1 Size (suse131/libopenssl1_0_0-1.0.1i-11.52.1.i586.rpm) = 765230 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1i-11.52.1.x86_64.rpm) = 0f5adc999934e03d290150fcab751d2899f1812e RMD160 (suse131/libopenssl1_0_0-1.0.1i-11.52.1.x86_64.rpm) = f07cb634362c06e8fcf4238c93f759ef57246e53 Size (suse131/libopenssl1_0_0-1.0.1i-11.52.1.x86_64.rpm) = 816052 bytes @ 1.9 log @Apply openSUSE-SU-2014:0764-1 openSUSE Security Update: openssl: update to version 1.0.1h Description: The openssl library was updated to version 1.0.1h fixing various security issues and bugs: Security issues fixed: - CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. - CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. - CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. - CVE-2014-3470: Fix bug in TLS code where clients enable anonymous ECDH ciphersuites are subject to a denial of service attack. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.8 2014/05/14 09:31:44 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1h-11.48.1.i586.rpm) = 9a06f864be4ead3704e6f6fa3a2e8d381294c9af RMD160 (suse131/libopenssl1_0_0-1.0.1h-11.48.1.i586.rpm) = 41eda2b2f92ed1fd1d4f57e955b06f033898dde5 Size (suse131/libopenssl1_0_0-1.0.1h-11.48.1.i586.rpm) = 763568 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1h-11.48.1.x86_64.rpm) = 08d4a810c404b3c9219d575b91d01ba707ac908d RMD160 (suse131/libopenssl1_0_0-1.0.1h-11.48.1.x86_64.rpm) = b3e7fcd49c919bda726782b72c91d464b9d4838f Size (suse131/libopenssl1_0_0-1.0.1h-11.48.1.x86_64.rpm) = 815035 bytes @ 1.9.2.1 log @Pullup ticket #4481 - requested by obache emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.10 - emulators/suse131_openssl/distinfo 1.10 --- Module Name: pkgsrc Committed By: obache Date: Fri Aug 22 08:43:09 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: openSUSE Security Update: update for openssl ___________________________________________________________________________ ___ Announcement ID: openSUSE-SU-2014:1052-1 Rating: moderate References: #890764 #890765 #890766 #890767 #890768 #890769 #890770 #890771 #890772 Cross-References: CVE-2014-3505 CVE-2014-3506 CVE-2014-3507 CVE-2014-3508 CVE-2014-3509 CVE-2014-3510 CVE-2014-3511 CVE-2014-3512 CVE-2014-5139 Affected Products: openSUSE 13.1 openSUSE 12.3 ___________________________________________________________________________ ___ An update that fixes 9 vulnerabilities is now available. Description: This openssl update fixes the following security issues: - openssl 1.0.1i * Information leak in pretty printing functions (CVE-2014-3508) * Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139) * Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509) * Double Free when processing DTLS packets (CVE-2014-3505) * DTLS memory exhaustion (CVE-2014-3506) * DTLS memory leak from zero-length fragments (CVE-2014-3507) * OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510) * OpenSSL TLS protocol downgrade attack (CVE-2014-3511) * SRP buffer overrun (CVE-2014-3512) @ text @d1 1 a1 1 $NetBSD$ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1i-11.52.1.i586.rpm) = 68820d833bc41f03de3e786ceff069851fe200a0 RMD160 (suse131/libopenssl1_0_0-1.0.1i-11.52.1.i586.rpm) = 49f2c34353cb91e97ccd476d0fe9b185c69cfbd1 Size (suse131/libopenssl1_0_0-1.0.1i-11.52.1.i586.rpm) = 765230 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1i-11.52.1.x86_64.rpm) = 0f5adc999934e03d290150fcab751d2899f1812e RMD160 (suse131/libopenssl1_0_0-1.0.1i-11.52.1.x86_64.rpm) = f07cb634362c06e8fcf4238c93f759ef57246e53 Size (suse131/libopenssl1_0_0-1.0.1i-11.52.1.x86_64.rpm) = 816052 bytes @ 1.8 log @Apply openSUSE Security Update: openSUSE-SU-2014:0635-1 update for openssl Description: - Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer dereference in do_ssl3_write Add file: CVE-2014-0198.patch Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.7 2014/05/03 02:10:06 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.44.1.i586.rpm) = 06696d4d499147bf836134f6fda0fc5ceebe001a RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.44.1.i586.rpm) = fd356fb9e27312db6368e7ed43a76b216a2f9962 Size (suse131/libopenssl1_0_0-1.0.1g-11.44.1.i586.rpm) = 762008 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.44.1.x86_64.rpm) = 7678bd9f85f861ec7c9c277755d264af1f4458f6 RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.44.1.x86_64.rpm) = 2fb4cc38743d66d293da09ae043f61674191be76 Size (suse131/libopenssl1_0_0-1.0.1g-11.44.1.x86_64.rpm) = 812058 bytes @ 1.7 log @Apply Security Update: openSUSE-SU-2014:0592-1 OpenSSL: Fixed a use-after-free race condition in OpenSSL's read buffer. Description: A use-after-free race condition in OpenSSL's read buffer was fixed that could cause connections to drop (CVE-2010-5298). Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.6 2014/04/23 13:14:42 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.40.1.i586.rpm) = e9d03e2ffcb2d988ab6ffeca773005cda7382b8d RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.40.1.i586.rpm) = ce5f7e40ec930bf40bc4f75c9effbd854bd6de6c Size (suse131/libopenssl1_0_0-1.0.1g-11.40.1.i586.rpm) = 761717 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.40.1.x86_64.rpm) = f99e06b6346c158c0e705b312dfcebd950e225d9 RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.40.1.x86_64.rpm) = 50a0c79557ccac163c529cd080a2da5cc1d84c5c Size (suse131/libopenssl1_0_0-1.0.1g-11.40.1.x86_64.rpm) = 811851 bytes @ 1.6 log @Apply Security Update: openSUSE-SU-2014:0560-1 update for openssl This is an openssl version update to 1.0.1g. - The main reason for this upgrade was to be clear about the TLS heartbeat problem know as "Heartbleed" (CVE-2014-0160). That problem was already fixed in our previous openssl update. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.5 2014/04/08 14:46:39 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.36.1.i586.rpm) = 2fc4eed368892982a64d80942697a8272eea8ce0 RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.36.1.i586.rpm) = ac34b1d6955f6c04811b1c9a4bfbe1c5b188ddcc Size (suse131/libopenssl1_0_0-1.0.1g-11.36.1.i586.rpm) = 761749 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.36.1.x86_64.rpm) = f686859e6eb8c3e75ada12c17e9997740aa9e804 RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.36.1.x86_64.rpm) = 5bd6a2f1b1d838f1f667343cf65651180be0b4ee Size (suse131/libopenssl1_0_0-1.0.1g-11.36.1.x86_64.rpm) = 811575 bytes @ 1.5 log @Update to libopenssl1_0_0-1.0.1e-11.32.1 for CVE-2014-0160. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2014/04/04 12:50:14 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.32.1.i586.rpm) = 50adabda537833f01ef36af42bf172447fd95508 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.32.1.i586.rpm) = c545ff5b18a42ae5450d37c3def8ca458ce0cc0d Size (suse131/libopenssl1_0_0-1.0.1e-11.32.1.i586.rpm) = 760753 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.32.1.x86_64.rpm) = 6b58c66246625d519a383669320c9712abf79ef4 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.32.1.x86_64.rpm) = 7ca5ecffa8af88aff560a738b1f37c75143bf143 Size (suse131/libopenssl1_0_0-1.0.1e-11.32.1.x86_64.rpm) = 811211 bytes @ 1.4 log @Update suse131_openssl RPM to libopenssl1_0_0-1.0.1e-11.28.1 for CVE-2014-0076. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2014/01/20 12:18:12 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.28.1.i586.rpm) = e79ade024e3e119f5291f727688f5d8218c41803 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.28.1.i586.rpm) = 1284acaa68a6cc87b86fbc4d7d4ae135b6458ad9 Size (suse131/libopenssl1_0_0-1.0.1e-11.28.1.i586.rpm) = 760593 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.28.1.x86_64.rpm) = a19ecef9bba2ed5d01a72ca9c82ef4fc81358440 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.28.1.x86_64.rpm) = 89289697debb2e155f11458d0caa80d8da1a68a9 Size (suse131/libopenssl1_0_0-1.0.1e-11.28.1.x86_64.rpm) = 811123 bytes @ 1.3 log @Update rpm to libopenssl1_0_0-1.0.1e-11.14.1 for CVE-2013-4353. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2014/01/05 09:44:59 obache Exp $ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.14.1.i586.rpm) = b5090725478701e747107dc985e22bf546716bb3 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.14.1.i586.rpm) = 9ab75e6db551858f7951fccd71de2a9f151ec959 Size (suse131/libopenssl1_0_0-1.0.1e-11.14.1.i586.rpm) = 759490 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.14.1.x86_64.rpm) = d74e22436f221a23f0553b4f9185fcf9ed1c54b6 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.14.1.x86_64.rpm) = 9e347eeba01c84a7763827598b808690b9de1aea Size (suse131/libopenssl1_0_0-1.0.1e-11.14.1.x86_64.rpm) = 810203 bytes @ 1.3.2.1 log @Pullup ticket #4352 - requested by obache emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.4 - emulators/suse131_openssl/distinfo 1.4 --- Module Name: pkgsrc Committed By: obache Date: Fri Apr 4 12:50:14 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Update suse131_openssl RPM to libopenssl1_0_0-1.0.1e-11.28.1 for CVE-2014-0076. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD$ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.28.1.i586.rpm) = e79ade024e3e119f5291f727688f5d8218c41803 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.28.1.i586.rpm) = 1284acaa68a6cc87b86fbc4d7d4ae135b6458ad9 Size (suse131/libopenssl1_0_0-1.0.1e-11.28.1.i586.rpm) = 760593 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.28.1.x86_64.rpm) = a19ecef9bba2ed5d01a72ca9c82ef4fc81358440 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.28.1.x86_64.rpm) = 89289697debb2e155f11458d0caa80d8da1a68a9 Size (suse131/libopenssl1_0_0-1.0.1e-11.28.1.x86_64.rpm) = 811123 bytes @ 1.3.2.2 log @Pullup ticket #4360 - requested by obache emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.5 - emulators/suse131_openssl/distinfo 1.5 --- Module Name: pkgsrc Committed By: obache Date: Tue Apr 8 14:46:39 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Update to libopenssl1_0_0-1.0.1e-11.32.1 for CVE-2014-0160. Bump PKGREVISION. @ text @d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.32.1.i586.rpm) = 50adabda537833f01ef36af42bf172447fd95508 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.32.1.i586.rpm) = c545ff5b18a42ae5450d37c3def8ca458ce0cc0d Size (suse131/libopenssl1_0_0-1.0.1e-11.32.1.i586.rpm) = 760753 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.32.1.x86_64.rpm) = 6b58c66246625d519a383669320c9712abf79ef4 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.32.1.x86_64.rpm) = 7ca5ecffa8af88aff560a738b1f37c75143bf143 Size (suse131/libopenssl1_0_0-1.0.1e-11.32.1.x86_64.rpm) = 811211 bytes @ 1.3.2.3 log @Pullup ticket #4396 - requested by obache emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.6-1.7 - emulators/suse131_openssl/distinfo 1.6-1.7 --- Module Name: pkgsrc Committed By: obache Date: Wed Apr 23 13:14:42 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Apply Security Update: openSUSE-SU-2014:0560-1 update for openssl This is an openssl version update to 1.0.1g. - The main reason for this upgrade was to be clear about the TLS heartbeat problem know as "Heartbleed" (CVE-2014-0160). That problem was already fixed in our previous openssl update. Bump PKGREVISION. --- Module Name: pkgsrc Committed By: obache Date: Sat May 3 02:10:06 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Apply Security Update: openSUSE-SU-2014:0592-1 OpenSSL: Fixed a use-after-free race condition in OpenSSL's read buffer. Description: A use-after-free race condition in OpenSSL's read buffer was fixed that could cause connections to drop (CVE-2010-5298). Bump PKGREVISION. @ text @d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.40.1.i586.rpm) = e9d03e2ffcb2d988ab6ffeca773005cda7382b8d RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.40.1.i586.rpm) = ce5f7e40ec930bf40bc4f75c9effbd854bd6de6c Size (suse131/libopenssl1_0_0-1.0.1g-11.40.1.i586.rpm) = 761717 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.40.1.x86_64.rpm) = f99e06b6346c158c0e705b312dfcebd950e225d9 RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.40.1.x86_64.rpm) = 50a0c79557ccac163c529cd080a2da5cc1d84c5c Size (suse131/libopenssl1_0_0-1.0.1g-11.40.1.x86_64.rpm) = 811851 bytes @ 1.3.2.4 log @Pullup ticket #4404 - requested by obache emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.8 - emulators/suse131_openssl/distinfo 1.8 --- Module Name: pkgsrc Committed By: obache Date: Wed May 14 09:31:44 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Apply openSUSE Security Update: openSUSE-SU-2014:0635-1 update for openssl Description: - Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer dereference in do_ssl3_write Add file: CVE-2014-0198.patch Bump PKGREVISION. @ text @d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.44.1.i586.rpm) = 06696d4d499147bf836134f6fda0fc5ceebe001a RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.44.1.i586.rpm) = fd356fb9e27312db6368e7ed43a76b216a2f9962 Size (suse131/libopenssl1_0_0-1.0.1g-11.44.1.i586.rpm) = 762008 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1g-11.44.1.x86_64.rpm) = 7678bd9f85f861ec7c9c277755d264af1f4458f6 RMD160 (suse131/libopenssl1_0_0-1.0.1g-11.44.1.x86_64.rpm) = 2fb4cc38743d66d293da09ae043f61674191be76 Size (suse131/libopenssl1_0_0-1.0.1g-11.44.1.x86_64.rpm) = 812058 bytes @ 1.3.2.5 log @Pullup ticket #4432 - requested by obache emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.9 - emulators/suse131_openssl/distinfo 1.9 --- Module Name: pkgsrc Committed By: obache Date: Fri Jun 6 09:53:29 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Apply openSUSE-SU-2014:0764-1 openSUSE Security Update: openssl: update to version 1.0.1h Description: The openssl library was updated to version 1.0.1h fixing various security issues and bugs: Security issues fixed: - CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. - CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. - CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. - CVE-2014-3470: Fix bug in TLS code where clients enable anonymous ECDH ciphersuites are subject to a denial of service attack. Bump PKGREVISION. @ text @d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1h-11.48.1.i586.rpm) = 9a06f864be4ead3704e6f6fa3a2e8d381294c9af RMD160 (suse131/libopenssl1_0_0-1.0.1h-11.48.1.i586.rpm) = 41eda2b2f92ed1fd1d4f57e955b06f033898dde5 Size (suse131/libopenssl1_0_0-1.0.1h-11.48.1.i586.rpm) = 763568 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1h-11.48.1.x86_64.rpm) = 08d4a810c404b3c9219d575b91d01ba707ac908d RMD160 (suse131/libopenssl1_0_0-1.0.1h-11.48.1.x86_64.rpm) = b3e7fcd49c919bda726782b72c91d464b9d4838f Size (suse131/libopenssl1_0_0-1.0.1h-11.48.1.x86_64.rpm) = 815035 bytes @ 1.2 log @Update rpm to libopenssl1_0_0-1.0.1e-11.10.1 for CVE-2013-6449. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD$ d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.10.1.i586.rpm) = e0a7fe83d7a126c29c5d72fc76ff635c69bcaba4 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.10.1.i586.rpm) = 6a39a56072d972a047d09e911b9ae2fc2c08f856 Size (suse131/libopenssl1_0_0-1.0.1e-11.10.1.i586.rpm) = 759130 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.10.1.x86_64.rpm) = dc16b9d6cdf56078ef24645875452fa9a3b2eacc RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.10.1.x86_64.rpm) = b706bb91224613216f2c494c38af2236c8d6615f Size (suse131/libopenssl1_0_0-1.0.1e-11.10.1.x86_64.rpm) = 809973 bytes @ 1.1 log @Added openSUSE 13.1 packages, provides a number of components for a openSUSE-based Linux binary emulation environment. @ text @d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.2.1.i586.rpm) = 3f58790bc9f4d4982580e94e66f1cbf992ffed52 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.2.1.i586.rpm) = d1da8577851fb7f226a1bbdca10ed03a4f0dd63c Size (suse131/libopenssl1_0_0-1.0.1e-11.2.1.i586.rpm) = 758979 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.2.1.x86_64.rpm) = 72ab7616dd0e19fa6da1bdfdb46073034a48ad53 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.2.1.x86_64.rpm) = 1fe00b00a64c66819e95964d4f03f7d2c04627c0 Size (suse131/libopenssl1_0_0-1.0.1e-11.2.1.x86_64.rpm) = 809157 bytes @ 1.1.2.1 log @Pullup ticket #4283 - requested by obache emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.2 - emulators/suse131_openssl/distinfo 1.2 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: obache Date: Sun Jan 5 09:44:59 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Update rpm to libopenssl1_0_0-1.0.1e-11.10.1 for CVE-2013-6449. Bump PKGREVISION. To generate a diff of this commit: cvs rdiff -u -r1.1 -r1.2 pkgsrc/emulators/suse131_openssl/Makefile \ pkgsrc/emulators/suse131_openssl/distinfo @ text @d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.10.1.i586.rpm) = e0a7fe83d7a126c29c5d72fc76ff635c69bcaba4 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.10.1.i586.rpm) = 6a39a56072d972a047d09e911b9ae2fc2c08f856 Size (suse131/libopenssl1_0_0-1.0.1e-11.10.1.i586.rpm) = 759130 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.10.1.x86_64.rpm) = dc16b9d6cdf56078ef24645875452fa9a3b2eacc RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.10.1.x86_64.rpm) = b706bb91224613216f2c494c38af2236c8d6615f Size (suse131/libopenssl1_0_0-1.0.1e-11.10.1.x86_64.rpm) = 809973 bytes @ 1.1.2.2 log @Pullup ticket #4306 - requested by obache emulators/suse131_openssl: security update Revisions pulled up: - emulators/suse131_openssl/Makefile 1.3 - emulators/suse131_openssl/distinfo 1.3 --- Module Name: pkgsrc Committed By: obache Date: Mon Jan 20 12:18:12 UTC 2014 Modified Files: pkgsrc/emulators/suse131_openssl: Makefile distinfo Log Message: Update rpm to libopenssl1_0_0-1.0.1e-11.14.1 for CVE-2013-4353. Bump PKGREVISION. @ text @d3 6 a8 6 SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.14.1.i586.rpm) = b5090725478701e747107dc985e22bf546716bb3 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.14.1.i586.rpm) = 9ab75e6db551858f7951fccd71de2a9f151ec959 Size (suse131/libopenssl1_0_0-1.0.1e-11.14.1.i586.rpm) = 759490 bytes SHA1 (suse131/libopenssl1_0_0-1.0.1e-11.14.1.x86_64.rpm) = d74e22436f221a23f0553b4f9185fcf9ed1c54b6 RMD160 (suse131/libopenssl1_0_0-1.0.1e-11.14.1.x86_64.rpm) = 9e347eeba01c84a7763827598b808690b9de1aea Size (suse131/libopenssl1_0_0-1.0.1e-11.14.1.x86_64.rpm) = 810203 bytes @