~ubuntu-branches/ubuntu/trusty/openssl/trusty

« back to all changes in this revision

Viewing changes to .pc/fix-pod-errors.patch/doc/ssl/SSL_connect.pod

  • Committer: Package Import Robot
  • Author(s): Marc Deslauriers
  • Date: 2014-01-08 15:57:24 UTC
  • mfrom: (11.1.46 sid)
  • Revision ID: package-import@ubuntu.com-20140108155724-kl61on9fyqmod2z9
Tags: 1.0.1f-1ubuntu1
* Merge with Debian, remaining changes.
  - debian/libssl1.0.0.postinst:
    + Display a system restart required notification on libssl1.0.0
      upgrade on servers.
    + Use a different priority for libssl1.0.0/restart-services depending
      on whether a desktop, or server dist-upgrade is being performed.
  - debian/{libssl1.0.0-udeb.dirs, control, rules}: Create
    libssl1.0.0-udeb, for the benefit of wget-udeb (no wget-udeb package
    in Debian).
  - debian/{libcrypto1.0.0-udeb.dirs, libssl1.0.0.dirs, libssl1.0.0.files,
    rules}: Move runtime libraries to /lib, for the benefit of
    wpasupplicant.
  - debian/patches/perlpath-quilt.patch: Don't change perl #! paths under
    .pc.
  - debian/rules:
    + Don't run 'make test' when cross-building.
    + Use host compiler when cross-building.  Patch from Neil Williams.
    + Don't build for processors no longer supported: i586 (on i386)
    + Fix Makefile to properly clean up libs/ dirs in clean target.
    + Replace duplicate files in the doc directory with symlinks.
  - debian/control: Mark Debian Vcs-* as XS-Debian-Vcs-*
  - debian/patches/ubuntu_deb676533_arm_asm.patch: Enable arm assembly
    code.
  - debian/rules: Enable optimized 64bit elliptic curve code contributed
    by Google.
* Dropped changes:
  - debian/patches/arm64-support: included in debian-targets.patch
  - debian/patches/no_default_rdrand.patch: upstream
  - debian/patches/openssl-1.0.1e-env-zlib.patch: zlib is now completely
    disabled in debian/rules

Show diffs side-by-side

added added

removed removed

Lines of Context:
41
41
 
42
42
=over 4
43
43
 
44
 
=item E<lt>0
45
 
 
46
 
The TLS/SSL handshake was not successful, because a fatal error occurred either
47
 
at the protocol level or a connection failure occurred. The shutdown was
48
 
not clean. It can also occur of action is need to continue the operation
49
 
for non-blocking BIOs. Call SSL_get_error() with the return value B<ret>
50
 
to find out the reason.
51
 
 
52
44
=item 0
53
45
 
54
46
The TLS/SSL handshake was not successful but was shut down controlled and
60
52
The TLS/SSL handshake was successfully completed, a TLS/SSL connection has been
61
53
established.
62
54
 
 
55
=item E<lt>0
 
56
 
 
57
The TLS/SSL handshake was not successful, because a fatal error occurred either
 
58
at the protocol level or a connection failure occurred. The shutdown was
 
59
not clean. It can also occur of action is need to continue the operation
 
60
for non-blocking BIOs. Call SSL_get_error() with the return value B<ret>
 
61
to find out the reason.
 
62
 
63
63
=back
64
64
 
65
65
=head1 SEE ALSO