-
Committer:
Package Import Robot
-
Author(s):
Marc Deslauriers
-
Date:
2012-06-29 13:01:30 UTC
-
mfrom:
(11.1.38 sid)
-
Revision ID:
package-import@ubuntu.com-20120629130130-9i6y36xymsxy7jmh
Tags: 1.0.1c-3ubuntu1
* Resynchronise with Debian. Remaining changes:
- debian/libssl1.0.0.postinst:
+ Display a system restart required notification on libssl1.0.0
upgrade on servers.
+ Use a different priority for libssl1.0.0/restart-services depending
on whether a desktop, or server dist-upgrade is being performed.
- debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
in Debian).
- debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
rules}: Move runtime libraries to /lib, for the benefit of
wpasupplicant.
- debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
.pc.
- debian/rules:
+ Don't run 'make test' when cross-building.
+ Use host compiler when cross-building. Patch from Neil Williams.
+ Don't build for processors no longer supported: i586 (on i386)
+ Fix Makefile to properly clean up libs/ dirs in clean target.
+ Replace duplicate files in the doc directory with symlinks.
- Unapply patch c_rehash-multi and comment it out in the series as it
breaks parsing of certificates with CRLF line endings and other cases
(see Debian #642314 for discussion), it also changes the semantics of
c_rehash directories by requiring applications to parse hash link
targets as files containing potentially *multiple* certificates rather
than exactly one.
- Bump version passed to dh_makeshlibs to 1.0.1 for new symbols.
- debian/patches/tls12_workarounds.patch: workaround large client hello
issue: Compile with -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 and
with -DOPENSSL_NO_TLS1_2_CLIENT.
* Dropped upstreamed patches:
- debian/patches/CVE-2012-2110.patch
- debian/patches/CVE-2012-2110b.patch
- debian/patches/CVE-2012-2333.patch
- debian/patches/CVE-2012-0884-extra.patch
- most of debian/patches/tls12_workarounds.patch