[openssl-commits] [web] master update
Rich Salz
rsalz at openssl.org
Thu Oct 29 19:26:13 UTC 2015
The branch master has been updated
via 85a91384a31f8ca359dae220bf4d2cc63f0d1f18 (commit)
from 98dd590bb12c298a62e39a175b2b66511c3fb9bd (commit)
- Log -----------------------------------------------------------------
commit 85a91384a31f8ca359dae220bf4d2cc63f0d1f18
Author: Viktor Szakats <vszakats at users.noreply.github.com>
Date: Thu Oct 29 20:15:25 2015 +0100
use secure URLs in secadv docs
Also remove some trailing whitespace.
Signed-off-by: Rich Salz <rsalz at akamai.com>
-----------------------------------------------------------------------
Summary of changes:
docs/faq.txt | 16 ++++++++--------
news/secadv/20020730.txt | 16 ++++++++--------
news/secadv/20030219.txt | 6 +++---
news/secadv/20030319.txt | 8 ++++----
news/secadv/20030930.txt | 8 ++++----
news/secadv/20031104.txt | 8 ++++----
news/secadv/20040317.txt | 8 ++++----
news/secadv/20051011.txt | 10 +++++-----
news/secadv/20060905.txt | 10 +++++-----
news/secadv/20060928.txt | 6 +++---
news/secadv/20071129.txt | 8 ++++----
news/secadv/20090107.txt | 2 +-
news/secadv/20090325.txt | 2 +-
news/secadv/20091111.txt | 4 ++--
news/secadv/20100324.txt | 2 +-
news/secadv/20100601.txt | 2 +-
news/secadv/20101116-2.txt | 2 +-
news/secadv/20101116.txt | 2 +-
news/secadv/20101202.txt | 4 ++--
news/secadv/20110208.txt | 2 +-
news/secadv/20110906.txt | 2 +-
news/secadv/20120104.txt | 2 +-
news/secadv/20120118.txt | 2 +-
news/secadv/20120312.txt | 2 +-
news/secadv/20120419.txt | 2 +-
news/secadv/20120424.txt | 4 ++--
news/secadv/20120510.txt | 2 +-
news/secadv/20130205.txt | 2 +-
news/secadv/20140605.txt | 2 +-
news/secadv/20140806.txt | 2 +-
news/secadv/20150108.txt | 3 +--
news/secadv/prng.txt | 4 ++--
support/acks.html | 2 +-
33 files changed, 78 insertions(+), 79 deletions(-)
mode change 100644 => 100755 news/secadv/20020730.txt
mode change 100644 => 100755 news/secadv/20030219.txt
mode change 100644 => 100755 news/secadv/20030319.txt
mode change 100644 => 100755 news/secadv/20030930.txt
mode change 100644 => 100755 news/secadv/20031104.txt
mode change 100644 => 100755 news/secadv/20040317.txt
mode change 100644 => 100755 news/secadv/20051011.txt
mode change 100644 => 100755 news/secadv/20060905.txt
mode change 100644 => 100755 news/secadv/20060928.txt
mode change 100644 => 100755 news/secadv/20071129.txt
mode change 100644 => 100755 news/secadv/20090107.txt
mode change 100644 => 100755 news/secadv/20090325.txt
mode change 100644 => 100755 news/secadv/20091111.txt
mode change 100644 => 100755 news/secadv/20100324.txt
mode change 100644 => 100755 news/secadv/20100601.txt
mode change 100644 => 100755 news/secadv/20101116-2.txt
mode change 100644 => 100755 news/secadv/20101116.txt
mode change 100644 => 100755 news/secadv/20101202.txt
mode change 100644 => 100755 news/secadv/20110208.txt
mode change 100644 => 100755 news/secadv/20110906.txt
mode change 100644 => 100755 news/secadv/20120104.txt
mode change 100644 => 100755 news/secadv/20120118.txt
mode change 100644 => 100755 news/secadv/20120312.txt
mode change 100644 => 100755 news/secadv/20120419.txt
mode change 100644 => 100755 news/secadv/20120424.txt
mode change 100644 => 100755 news/secadv/20120510.txt
mode change 100644 => 100755 news/secadv/20130205.txt
mode change 100644 => 100755 news/secadv/20140605.txt
mode change 100644 => 100755 news/secadv/20140806.txt
mode change 100644 => 100755 news/secadv/prng.txt
diff --git a/docs/faq.txt b/docs/faq.txt
index 85b8092..dde39c0 100644
--- a/docs/faq.txt
+++ b/docs/faq.txt
@@ -15,7 +15,7 @@ OpenSSL - Frequently Asked Questions
[LEGAL] Legal questions
* Do I need patent licenses to use OpenSSL?
-* Can I use OpenSSL with GPL software?
+* Can I use OpenSSL with GPL software?
[USER] Questions on using the OpenSSL applications
@@ -174,9 +174,9 @@ just do:
* How does the versioning scheme work?
-After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter
+After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter
releases (e.g. 1.0.1a) can only contain bug and security fixes and no
-new features. Minor releases change the last number (e.g. 1.0.2) and
+new features. Minor releases change the last number (e.g. 1.0.2) and
can contain new features that retain binary compatibility. Changes to
the middle number are considered major releases and neither source nor
binary compatibility is guaranteed.
@@ -543,7 +543,7 @@ that the OpenSSL bntest throws at it. This gets triggered when you run the
test suite (using "make test"). The message returned is "bc: stack empty".
The best way to deal with this is to find another implementation of bc
-and compile/install it. GNU bc (see <URL: http://www.gnu.org/software/software.html>
+and compile/install it. GNU bc (see <URL: https://www.gnu.org/software/software.html>
for download instructions) can be safely used, for example.
@@ -582,7 +582,7 @@ This will only compile sha_dgst.c with -O0, the rest with the optimization
level chosen by the configuration process. When the above is done, do the
test and installation and you're set.
-3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It
+3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It
should not be used and is not used in SSL/TLS nor any other recognized
protocol in either case.
@@ -774,14 +774,14 @@ See also <URL: https://www.openssl.org/community>
* I've found a security issue, how do I report it?
If you think your bug has security implications then please send it to
-openssl-security at openssl.org if you don't get a prompt reply at least
+openssl-security at openssl.org if you don't get a prompt reply at least
acknowledging receipt then resend or mail it directly to one of the
more active team members (e.g. Steve). If you wish to use PGP to send
in a report please use one or more of the keys of the team members listed
at <URL: https://www.openssl.org/community/team.html>
Note that bugs only present in the openssl utility are not in general
-considered to be security issues.
+considered to be security issues.
[PROG] ========================================================================
@@ -931,7 +931,7 @@ macros with a C++ compiler. There is hardly ever any need to use the
PKCS#12 macros in a program, it is much easier to parse and create
PKCS#12 files using the PKCS12_parse() and PKCS12_create() functions
documented in doc/openssl.txt and with examples in demos/pkcs12. The
-'pkcs12' application has to use the macros because it prints out
+'pkcs12' application has to use the macros because it prints out
debugging information.
diff --git a/news/secadv/20020730.txt b/news/secadv/20020730.txt
old mode 100644
new mode 100755
index 918b764..464307c
--- a/news/secadv/20020730.txt
+++ b/news/secadv/20020730.txt
@@ -56,7 +56,7 @@ Apply the attached patch to OpenSSL 0.9.6d, or upgrade to OpenSSL
TLS.
A patch for 0.9.7 is available from the OpenSSL website
-(http://www.openssl.org/).
+(https://www.openssl.org/).
Servers can disable SSL2, alternatively disable all applications using
SSL or TLS until the patches are applied. Users of 0.9.7 pre-release
@@ -74,9 +74,9 @@ possible, but have not released the exploit code.
References
----------
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657
Acknowledgements
----------------
@@ -126,7 +126,7 @@ There are no known exploits for this vulnerability.
References
----------
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659
Acknowledgements
----------------
@@ -141,10 +141,10 @@ The patch and advisory were prepared by Dr. Stephen Henson.
Combined patches for OpenSSL 0.9.6d:
-http://www.openssl.org/news/patch_20020730_0_9_6d.txt
+https://www.openssl.org/news/patch_20020730_0_9_6d.txt
Combined patches for OpenSSL 0.9.7 beta 2:
-http://www.openssl.org/news/patch_20020730_0_9_7.txt
+https://www.openssl.org/news/patch_20020730_0_9_7.txt
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20020730.txt
+https://www.openssl.org/news/secadv_20020730.txt
diff --git a/news/secadv/20030219.txt b/news/secadv/20030219.txt
old mode 100644
new mode 100755
index 647373a..d8266ba
--- a/news/secadv/20030219.txt
+++ b/news/secadv/20030219.txt
@@ -48,7 +48,7 @@ plaintext block.
OpenSSL version since 0.9.6c supposedly treat block cipher padding
errors like MAC verification errors during record decryption
-(see http://www.openssl.org/~bodo/tls-cbc.txt), but MAC verification
+(see https://www.openssl.org/~bodo/tls-cbc.txt), but MAC verification
was still skipped after detection of a padding error, which allowed
the timing attack. (Note that it is likely that other SSL/TLS
implementations will have similar problems.)
@@ -208,7 +208,7 @@ http://lasecwww.epfl.ch/memo_ssl.shtml
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0078 to this issue:
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030219.txt
+https://www.openssl.org/news/secadv_20030219.txt
diff --git a/news/secadv/20030319.txt b/news/secadv/20030319.txt
old mode 100644
new mode 100755
index f868198..778f9e2
--- a/news/secadv/20030319.txt
+++ b/news/secadv/20030319.txt
@@ -44,7 +44,7 @@ The following patch can be applied to OpenSSL releases 0.9.6b up to 0.9.6i,
+ /* SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); */
+
+ /* The Klima-Pokorny-Rosa extension of Bleichenbacher's attack
-+ * (http://eprint.iacr.org/2003/052/) exploits the version
++ * (https://eprint.iacr.org/2003/052/) exploits the version
+ * number check as a "bad version oracle" -- an alert would
+ * reveal that the plaintext corresponding to some ciphertext
+ * made up by the adversary is properly formatted except
@@ -84,11 +84,11 @@ References
Report "Attacking RSA-based Sessions in SSL/TLS" by V. Klima, O. Pokorny,
and T. Rosa:
-http://eprint.iacr.org/2003/052/
+https://eprint.iacr.org/2003/052/
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0131 to this issue.
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030319.txt
+https://www.openssl.org/news/secadv_20030319.txt
diff --git a/news/secadv/20030930.txt b/news/secadv/20030930.txt
old mode 100644
new mode 100755
index 72aee84..ad0b90e
--- a/news/secadv/20030930.txt
+++ b/news/secadv/20030930.txt
@@ -61,12 +61,12 @@ References
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0545 for issue 1:
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
and CAN-2003-0543 and CAN-2003-0544 for issue 2:
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030930.txt
+https://www.openssl.org/news/secadv_20030930.txt
diff --git a/news/secadv/20031104.txt b/news/secadv/20031104.txt
old mode 100644
new mode 100755
index 2cd2fb8..31b332c
--- a/news/secadv/20031104.txt
+++ b/news/secadv/20031104.txt
@@ -42,9 +42,9 @@ applications statically linked to OpenSSL libraries.
OpenSSL 0.9.6l is available for download via HTTP and FTP from the
following master locations (you can find the various FTP mirrors under
-http://www.openssl.org/source/mirror.html):
+https://www.openssl.org/source/mirror.html):
- o http://www.openssl.org/source/
+ o https://www.openssl.org/source/
o ftp://ftp.openssl.org/source/
The distribution file name is:
@@ -65,7 +65,7 @@ References
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0851 to this issue.
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20031104.txt
+https://www.openssl.org/news/secadv_20031104.txt
diff --git a/news/secadv/20040317.txt b/news/secadv/20040317.txt
old mode 100644
new mode 100755
index daf0b67..15879c6
--- a/news/secadv/20040317.txt
+++ b/news/secadv/20040317.txt
@@ -48,7 +48,7 @@ statically linked to OpenSSL libraries.
OpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and
FTP from the following master locations (you can find the various FTP
-mirrors under http://www.openssl.org/source/mirror.html):
+mirrors under https://www.openssl.org/source/mirror.html):
ftp://ftp.openssl.org/source/
@@ -79,10 +79,10 @@ References
----------
http://www.codenomicon.com/testtools/tls/
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20040317.txt
+https://www.openssl.org/news/secadv_20040317.txt
diff --git a/news/secadv/20051011.txt b/news/secadv/20051011.txt
old mode 100644
new mode 100755
index c4fd001..1fadb6f
--- a/news/secadv/20051011.txt
+++ b/news/secadv/20051011.txt
@@ -63,9 +63,9 @@ following measures is sufficient.
OpenSSL 0.9.8a and OpenSSL 0.9.7h are available for download via
HTTP and FTP from the following master locations (you can find the
- various FTP mirrors under http://www.openssl.org/source/mirror.html):
+ various FTP mirrors under https://www.openssl.org/source/mirror.html):
- o http://www.openssl.org/source/
+ o https://www.openssl.org/source/
o ftp://ftp.openssl.org/source/
The distribution file names are:
@@ -88,7 +88,7 @@ following measures is sufficient.
source code to resolve the problem. The patch is compatible with
the 0.9.6, 0.9.7, and 0.9.8 branches of OpenSSL.
- o http://www.openssl.org/news/patch-CAN-2005-2969.txt
+ o https://www.openssl.org/news/patch-CAN-2005-2969.txt
Whether you choose to upgrade to a new version or to apply the
patch, make sure to recompile any applications statically linked
@@ -108,7 +108,7 @@ problem.
References
----------
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20051011.txt
+https://www.openssl.org/news/secadv_20051011.txt
diff --git a/news/secadv/20060905.txt b/news/secadv/20060905.txt
old mode 100644
new mode 100755
index 45c9e7f..9865eee
--- a/news/secadv/20060905.txt
+++ b/news/secadv/20060905.txt
@@ -38,9 +38,9 @@ following measures is sufficient.
OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via
HTTP and FTP from the following master locations (you can find the
- various FTP mirrors under http://www.openssl.org/source/mirror.html):
+ various FTP mirrors under https://www.openssl.org/source/mirror.html):
- o http://www.openssl.org/source/
+ o https://www.openssl.org/source/
o ftp://ftp.openssl.org/source/
The distribution file names are:
@@ -63,7 +63,7 @@ following measures is sufficient.
source code to resolve the problem. The patch is compatible with
the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL.
- o http://www.openssl.org/news/patch-CVE-2006-4339.txt
+ o https://www.openssl.org/news/patch-CVE-2006-4339.txt
Whether you choose to upgrade to a new version or to apply the patch,
make sure to recompile any applications statically linked to OpenSSL
@@ -82,9 +82,9 @@ to fix the problems.
References
----------
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20060905.txt
+https://www.openssl.org/news/secadv_20060905.txt
diff --git a/news/secadv/20060928.txt b/news/secadv/20060928.txt
old mode 100644
new mode 100755
index 9c2c1e1..50a2f09
--- a/news/secadv/20060928.txt
+++ b/news/secadv/20060928.txt
@@ -79,9 +79,9 @@ These vulnerabilities are resolved in the following versions of OpenSSL:
OpenSSL 0.9.8d and OpenSSL 0.9.7l are available for download via
HTTP and FTP from the following master locations (you can find the
-various FTP mirrors under http://www.openssl.org/source/mirror.html):
+various FTP mirrors under https://www.openssl.org/source/mirror.html):
- o http://www.openssl.org/source/
+ o https://www.openssl.org/source/
o ftp://ftp.openssl.org/source/
The distribution file names are:
@@ -108,4 +108,4 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20060928.txt
+https://www.openssl.org/news/secadv_20060928.txt
diff --git a/news/secadv/20071129.txt b/news/secadv/20071129.txt
old mode 100644
new mode 100755
index 52e7c5f..d3f0be3
--- a/news/secadv/20071129.txt
+++ b/news/secadv/20071129.txt
@@ -4,7 +4,7 @@ OpenSSL FIPS Object Module Vulnerabilities
------------------------------------------
A significant flaw in the PRNG implementation for the OpenSSL FIPS Object
-Module v1.1.1 (http://openssl.org/source/openssl-fips-1.1.1.tar.gz, FIPS
+Module v1.1.1 (https://www.openssl.org/source/openssl-fips-1.1.1.tar.gz, FIPS
140-2 validation certificate #733,
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#733) has
been reported by Geoff Lowe of Secure Computing Corporation. Due to a coding
@@ -32,11 +32,11 @@ Wait for official approval of a patched distribution.
For reference purposes the patches
- http://www.openssl.org/news/patch-CVE-2007-5502-1.txt
+ https://www.openssl.org/news/patch-CVE-2007-5502-1.txt
(the simplest direct fix) and:
- http://www.openssl.org/news/patch-CVE-2007-5502-2.txt
+ https://www.openssl.org/news/patch-CVE-2007-5502-2.txt
(a workaround which avoids touching the PRNG code directly) demonstrate two
different fixes that independently address the vulnerability. However, for
@@ -49,7 +49,7 @@ Institute (OSSI), has supplied the information needed for a "letter change"
update request based on the latter of these two patches to the FIPS 140-2
test lab to be submitted for official approval. Once (and if) approved the
new distribution containing this patch will be posted as
-http://openssl.org/source/openssl-fips-1.1.2.tar.gz. The timeline for this
+https://www.openssl.org/source/openssl-fips-1.1.2.tar.gz. The timeline for this
approval is presently unknown.
diff --git a/news/secadv/20090107.txt b/news/secadv/20090107.txt
old mode 100644
new mode 100755
index b2816c9..4e06b88
--- a/news/secadv/20090107.txt
+++ b/news/secadv/20090107.txt
@@ -63,7 +63,7 @@ References
===========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20090107.txt
+https://www.openssl.org/news/secadv_20090107.txt
diff -ur openssl-0.9.8i-ORIG/apps/speed.c openssl-0.9.8i/apps/speed.c
diff --git a/news/secadv/20090325.txt b/news/secadv/20090325.txt
old mode 100644
new mode 100755
index 4e90a20..de84b65
--- a/news/secadv/20090325.txt
+++ b/news/secadv/20090325.txt
@@ -60,5 +60,5 @@ References
===========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20090325.txt
+https://www.openssl.org/news/secadv_20090325.txt
diff --git a/news/secadv/20091111.txt b/news/secadv/20091111.txt
old mode 100644
new mode 100755
index 62af9e9..b21eec9
--- a/news/secadv/20091111.txt
+++ b/news/secadv/20091111.txt
@@ -83,11 +83,11 @@ References
===========
CVE-2009-3555:
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
TLS extension:
https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20091111.txt
+https://www.openssl.org/news/secadv_20091111.txt
diff --git a/news/secadv/20100324.txt b/news/secadv/20100324.txt
old mode 100644
new mode 100755
index aabb4d3..0127494
--- a/news/secadv/20100324.txt
+++ b/news/secadv/20100324.txt
@@ -45,4 +45,4 @@ References
This vulnerability is tracked as CVE-2010-0740.
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20100324.txt
+https://www.openssl.org/news/secadv_20100324.txt
diff --git a/news/secadv/20100601.txt b/news/secadv/20100601.txt
old mode 100644
new mode 100755
index 6d874e3..709370c
--- a/news/secadv/20100601.txt
+++ b/news/secadv/20100601.txt
@@ -41,5 +41,5 @@ References
===========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20100601.txt
+https://www.openssl.org/news/secadv_20100601.txt
diff --git a/news/secadv/20101116-2.txt b/news/secadv/20101116-2.txt
old mode 100644
new mode 100755
index e624bb3..4d6e0bf
--- a/news/secadv/20101116-2.txt
+++ b/news/secadv/20101116-2.txt
@@ -203,6 +203,6 @@ References
===========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101116-2.txt
+https://www.openssl.org/news/secadv_20101116-2.txt
diff --git a/news/secadv/20101116.txt b/news/secadv/20101116.txt
old mode 100644
new mode 100755
index 7273c81..bc392f1
--- a/news/secadv/20101116.txt
+++ b/news/secadv/20101116.txt
@@ -199,6 +199,6 @@ References
===========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101116.txt
+https://www.openssl.org/news/secadv_20101116.txt
diff --git a/news/secadv/20101202.txt b/news/secadv/20101202.txt
old mode 100644
new mode 100755
index 22a31c6..0d4d91a
--- a/news/secadv/20101202.txt
+++ b/news/secadv/20101202.txt
@@ -119,9 +119,9 @@ References
===========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101202.txt
+https://www.openssl.org/news/secadv_20101202.txt
URL for updated CVS-2010-3864 Security Advisory:
-http://www.openssl.org/news/secadv_20101116-2.txt
+https://www.openssl.org/news/secadv_20101116-2.txt
diff --git a/news/secadv/20110208.txt b/news/secadv/20110208.txt
old mode 100644
new mode 100755
index 9c1e951..ee46181
--- a/news/secadv/20110208.txt
+++ b/news/secadv/20110208.txt
@@ -72,7 +72,7 @@ References
This vulnerability is tracked as CVE-2011-0014.
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20110208.txt
+https://www.openssl.org/news/secadv_20110208.txt
OCSP stapling is defined in RFC 6066 (previously RFC 3546), section
"Certificate Status Request".
diff --git a/news/secadv/20110906.txt b/news/secadv/20110906.txt
old mode 100644
new mode 100755
index f95aa02..db8cba1
--- a/news/secadv/20110906.txt
+++ b/news/secadv/20110906.txt
@@ -58,5 +58,5 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20110906.txt
+https://www.openssl.org/news/secadv_20110906.txt
diff --git a/news/secadv/20120104.txt b/news/secadv/20120104.txt
old mode 100644
new mode 100755
index 6763fb4..d015463
--- a/news/secadv/20120104.txt
+++ b/news/secadv/20120104.txt
@@ -105,5 +105,5 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120104.txt
+https://www.openssl.org/news/secadv_20120104.txt
diff --git a/news/secadv/20120118.txt b/news/secadv/20120118.txt
old mode 100644
new mode 100755
index 64d3502..4ac82c3
--- a/news/secadv/20120118.txt
+++ b/news/secadv/20120118.txt
@@ -19,5 +19,5 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120118.txt
+https://www.openssl.org/news/secadv_20120118.txt
diff --git a/news/secadv/20120312.txt b/news/secadv/20120312.txt
old mode 100644
new mode 100755
index d584f62..1ee42d9
--- a/news/secadv/20120312.txt
+++ b/news/secadv/20120312.txt
@@ -29,5 +29,5 @@ References
RFC3218
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120312.txt
+https://www.openssl.org/news/secadv_20120312.txt
diff --git a/news/secadv/20120419.txt b/news/secadv/20120419.txt
old mode 100644
new mode 100755
index ca9bd34..617f8d7
--- a/news/secadv/20120419.txt
+++ b/news/secadv/20120419.txt
@@ -35,6 +35,6 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120419.txt
+https://www.openssl.org/news/secadv_20120419.txt
diff --git a/news/secadv/20120424.txt b/news/secadv/20120424.txt
old mode 100644
new mode 100755
index 5929329..21ff332
--- a/news/secadv/20120424.txt
+++ b/news/secadv/20120424.txt
@@ -7,7 +7,7 @@ ASN1 BIO incomplete fix (CVE-2012-2131)
It was discovered that the fix for CVE-2012-2110 released on 19 Apr
2012 was not sufficient to correct the issue for OpenSSL 0.9.8.
-Please see http://www.openssl.org/news/secadv_20120419.txt for details
+Please see https://www.openssl.org/news/secadv_20120419.txt for details
of that vulnerability.
This issue only affects OpenSSL 0.9.8v. OpenSSL 1.0.1a and 1.0.0i
@@ -21,4 +21,4 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120424.txt
+https://www.openssl.org/news/secadv_20120424.txt
diff --git a/news/secadv/20120510.txt b/news/secadv/20120510.txt
old mode 100644
new mode 100755
index 441b835..be085ed
--- a/news/secadv/20120510.txt
+++ b/news/secadv/20120510.txt
@@ -22,6 +22,6 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120510.txt
+https://www.openssl.org/news/secadv_20120510.txt
diff --git a/news/secadv/20130205.txt b/news/secadv/20130205.txt
old mode 100644
new mode 100755
index 4d4a610..1a278f6
--- a/news/secadv/20130205.txt
+++ b/news/secadv/20130205.txt
@@ -57,7 +57,7 @@ Affected users should upgrade to OpenSSL 1.0.1d, 1.0.0k or 0.9.8y.
References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20130204.txt
+https://www.openssl.org/news/secadv_20130204.txt
Wikipedia AES-NI description:
https://en.wikipedia.org/wiki/AES-NI
diff --git a/news/secadv/20140605.txt b/news/secadv/20140605.txt
old mode 100644
new mode 100755
index a86051d..514929e
--- a/news/secadv/20140605.txt
+++ b/news/secadv/20140605.txt
@@ -117,7 +117,7 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20140605.txt
+https://www.openssl.org/news/secadv_20140605.txt
Note: the online version of the advisory may be updated with additional
details over time.
diff --git a/news/secadv/20140806.txt b/news/secadv/20140806.txt
old mode 100644
new mode 100755
index d2e7e53..0146712
--- a/news/secadv/20140806.txt
+++ b/news/secadv/20140806.txt
@@ -157,7 +157,7 @@ References
==========
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20140806.txt
+https://www.openssl.org/news/secadv_20140806.txt
Note: the online version of the advisory may be updated with additional
details over time.
diff --git a/news/secadv/20150108.txt b/news/secadv/20150108.txt
index a4e68a8..c3fe15f 100644
--- a/news/secadv/20150108.txt
+++ b/news/secadv/20150108.txt
@@ -193,7 +193,7 @@ conducted by the OpenSSL development team and Adam Langley of
Google. The final fix was developed by Andy Polyakov of the OpenSSL
core team.
-[1] http://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdf
+[1] https://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdf
Note
====
@@ -215,4 +215,3 @@ details over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/about/secpolicy.html
-
diff --git a/news/secadv/prng.txt b/news/secadv/prng.txt
old mode 100644
new mode 100755
index a923174..981b062
--- a/news/secadv/prng.txt
+++ b/news/secadv/prng.txt
@@ -23,7 +23,7 @@ MD5 checksums:
openssl-engine-0.9.6b.tar.gz ab5ca5b157459c49bdab06a7db8a5a47
OpenSSL source code can also be obtained from a number of mirror sites.
-For a list, see <URL: http://www.openssl.org/source/mirror.html>.
+For a list, see <URL: https://www.openssl.org/source/mirror.html>.
If you are using a pre-compiled OpenSSL package, please look for update
information from the respective software distributor. The OpenSSL
@@ -216,4 +216,4 @@ for discovering the PRNG problem and bringing it to our attention.
URL for this Security Advisory:
-http://www.openssl.org/news/secadv_prng.txt
+https://www.openssl.org/news/secadv_prng.txt
diff --git a/support/acks.html b/support/acks.html
index 0118b3e..29bb761 100644
--- a/support/acks.html
+++ b/support/acks.html
@@ -25,7 +25,7 @@
<hr noshade size=1>
<p>Exceptional support:</p>
- <a href="http://www.linux-foundation.org/"><img src="/img/lf-logo-med.png"></a>
+ <a href="http://www.linuxfoundation.org/"><img src="/img/lf-logo-med.png"></a>
<a href="http://www.linuxfoundation.org/programs/core-infrastructure-initiative"><img src="/img/cii-logo-med.png"></a>
<a href="http://www.smartisan.com/"><img src="/img/smartisan-logo-med.png"></a>
More information about the openssl-commits
mailing list