[openssl-commits] [web] master update

Rich Salz rsalz at openssl.org
Thu Oct 29 19:26:13 UTC 2015


The branch master has been updated
       via  85a91384a31f8ca359dae220bf4d2cc63f0d1f18 (commit)
      from  98dd590bb12c298a62e39a175b2b66511c3fb9bd (commit)


- Log -----------------------------------------------------------------
commit 85a91384a31f8ca359dae220bf4d2cc63f0d1f18
Author: Viktor Szakats <vszakats at users.noreply.github.com>
Date:   Thu Oct 29 20:15:25 2015 +0100

    use secure URLs in secadv docs
    
    Also remove some trailing whitespace.
    
    Signed-off-by: Rich Salz <rsalz at akamai.com>

-----------------------------------------------------------------------

Summary of changes:
 docs/faq.txt               | 16 ++++++++--------
 news/secadv/20020730.txt   | 16 ++++++++--------
 news/secadv/20030219.txt   |  6 +++---
 news/secadv/20030319.txt   |  8 ++++----
 news/secadv/20030930.txt   |  8 ++++----
 news/secadv/20031104.txt   |  8 ++++----
 news/secadv/20040317.txt   |  8 ++++----
 news/secadv/20051011.txt   | 10 +++++-----
 news/secadv/20060905.txt   | 10 +++++-----
 news/secadv/20060928.txt   |  6 +++---
 news/secadv/20071129.txt   |  8 ++++----
 news/secadv/20090107.txt   |  2 +-
 news/secadv/20090325.txt   |  2 +-
 news/secadv/20091111.txt   |  4 ++--
 news/secadv/20100324.txt   |  2 +-
 news/secadv/20100601.txt   |  2 +-
 news/secadv/20101116-2.txt |  2 +-
 news/secadv/20101116.txt   |  2 +-
 news/secadv/20101202.txt   |  4 ++--
 news/secadv/20110208.txt   |  2 +-
 news/secadv/20110906.txt   |  2 +-
 news/secadv/20120104.txt   |  2 +-
 news/secadv/20120118.txt   |  2 +-
 news/secadv/20120312.txt   |  2 +-
 news/secadv/20120419.txt   |  2 +-
 news/secadv/20120424.txt   |  4 ++--
 news/secadv/20120510.txt   |  2 +-
 news/secadv/20130205.txt   |  2 +-
 news/secadv/20140605.txt   |  2 +-
 news/secadv/20140806.txt   |  2 +-
 news/secadv/20150108.txt   |  3 +--
 news/secadv/prng.txt       |  4 ++--
 support/acks.html          |  2 +-
 33 files changed, 78 insertions(+), 79 deletions(-)
 mode change 100644 => 100755 news/secadv/20020730.txt
 mode change 100644 => 100755 news/secadv/20030219.txt
 mode change 100644 => 100755 news/secadv/20030319.txt
 mode change 100644 => 100755 news/secadv/20030930.txt
 mode change 100644 => 100755 news/secadv/20031104.txt
 mode change 100644 => 100755 news/secadv/20040317.txt
 mode change 100644 => 100755 news/secadv/20051011.txt
 mode change 100644 => 100755 news/secadv/20060905.txt
 mode change 100644 => 100755 news/secadv/20060928.txt
 mode change 100644 => 100755 news/secadv/20071129.txt
 mode change 100644 => 100755 news/secadv/20090107.txt
 mode change 100644 => 100755 news/secadv/20090325.txt
 mode change 100644 => 100755 news/secadv/20091111.txt
 mode change 100644 => 100755 news/secadv/20100324.txt
 mode change 100644 => 100755 news/secadv/20100601.txt
 mode change 100644 => 100755 news/secadv/20101116-2.txt
 mode change 100644 => 100755 news/secadv/20101116.txt
 mode change 100644 => 100755 news/secadv/20101202.txt
 mode change 100644 => 100755 news/secadv/20110208.txt
 mode change 100644 => 100755 news/secadv/20110906.txt
 mode change 100644 => 100755 news/secadv/20120104.txt
 mode change 100644 => 100755 news/secadv/20120118.txt
 mode change 100644 => 100755 news/secadv/20120312.txt
 mode change 100644 => 100755 news/secadv/20120419.txt
 mode change 100644 => 100755 news/secadv/20120424.txt
 mode change 100644 => 100755 news/secadv/20120510.txt
 mode change 100644 => 100755 news/secadv/20130205.txt
 mode change 100644 => 100755 news/secadv/20140605.txt
 mode change 100644 => 100755 news/secadv/20140806.txt
 mode change 100644 => 100755 news/secadv/prng.txt

diff --git a/docs/faq.txt b/docs/faq.txt
index 85b8092..dde39c0 100644
--- a/docs/faq.txt
+++ b/docs/faq.txt
@@ -15,7 +15,7 @@ OpenSSL  -  Frequently Asked Questions
 [LEGAL] Legal questions
 
 * Do I need patent licenses to use OpenSSL?
-* Can I use OpenSSL with GPL software? 
+* Can I use OpenSSL with GPL software?
 
 [USER] Questions on using the OpenSSL applications
 
@@ -174,9 +174,9 @@ just do:
 
 * How does the versioning scheme work?
 
-After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter 
+After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter
 releases (e.g. 1.0.1a) can only contain bug and security fixes and no
-new features. Minor releases change the last number (e.g. 1.0.2) and 
+new features. Minor releases change the last number (e.g. 1.0.2) and
 can contain new features that retain binary compatibility. Changes to
 the middle number are considered major releases and neither source nor
 binary compatibility is guaranteed.
@@ -543,7 +543,7 @@ that the OpenSSL bntest throws at it.  This gets triggered when you run the
 test suite (using "make test").  The message returned is "bc: stack empty".
 
 The best way to deal with this is to find another implementation of bc
-and compile/install it.  GNU bc (see <URL: http://www.gnu.org/software/software.html>
+and compile/install it.  GNU bc (see <URL: https://www.gnu.org/software/software.html>
 for download instructions) can be safely used, for example.
 
 
@@ -582,7 +582,7 @@ This will only compile sha_dgst.c with -O0, the rest with the optimization
 level chosen by the configuration process.  When the above is done, do the
 test and installation and you're set.
 
-3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It 
+3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It
 should not be used and is not used in SSL/TLS nor any other recognized
 protocol in either case.
 
@@ -774,14 +774,14 @@ See also <URL: https://www.openssl.org/community>
 * I've found a security issue, how do I report it?
 
 If you think your bug has security implications then please send it to
-openssl-security at openssl.org if you don't get a prompt reply at least 
+openssl-security at openssl.org if you don't get a prompt reply at least
 acknowledging receipt then resend or mail it directly to one of the
 more active team members (e.g. Steve). If you wish to use PGP to send
 in a report please use one or more of the keys of the team members listed
 at <URL: https://www.openssl.org/community/team.html>
 
 Note that bugs only present in the openssl utility are not in general
-considered to be security issues. 
+considered to be security issues.
 
 [PROG] ========================================================================
 
@@ -931,7 +931,7 @@ macros with a C++ compiler. There is hardly ever any need to use the
 PKCS#12 macros in a program, it is much easier to parse and create
 PKCS#12 files using the PKCS12_parse() and PKCS12_create() functions
 documented in doc/openssl.txt and with examples in demos/pkcs12. The
-'pkcs12' application has to use the macros because it prints out 
+'pkcs12' application has to use the macros because it prints out
 debugging information.
 
 
diff --git a/news/secadv/20020730.txt b/news/secadv/20020730.txt
old mode 100644
new mode 100755
index 918b764..464307c
--- a/news/secadv/20020730.txt
+++ b/news/secadv/20020730.txt
@@ -56,7 +56,7 @@ Apply the attached patch to OpenSSL 0.9.6d, or upgrade to OpenSSL
 TLS.
 
 A patch for 0.9.7 is available from the OpenSSL website
-(http://www.openssl.org/).
+(https://www.openssl.org/).
 
 Servers can disable SSL2, alternatively disable all applications using
 SSL or TLS until the patches are applied. Users of 0.9.7 pre-release
@@ -74,9 +74,9 @@ possible, but have not released the exploit code.
 References
 ----------
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657
 
 Acknowledgements
 ----------------
@@ -126,7 +126,7 @@ There are no known exploits for this vulnerability.
 References
 ----------
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659
 
 Acknowledgements
 ----------------
@@ -141,10 +141,10 @@ The patch and advisory were prepared by Dr. Stephen Henson.
 
 
 Combined patches for OpenSSL 0.9.6d:
-http://www.openssl.org/news/patch_20020730_0_9_6d.txt
+https://www.openssl.org/news/patch_20020730_0_9_6d.txt
 
 Combined patches for OpenSSL 0.9.7 beta 2:
-http://www.openssl.org/news/patch_20020730_0_9_7.txt
+https://www.openssl.org/news/patch_20020730_0_9_7.txt
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20020730.txt
+https://www.openssl.org/news/secadv_20020730.txt
diff --git a/news/secadv/20030219.txt b/news/secadv/20030219.txt
old mode 100644
new mode 100755
index 647373a..d8266ba
--- a/news/secadv/20030219.txt
+++ b/news/secadv/20030219.txt
@@ -48,7 +48,7 @@ plaintext block.
 
 OpenSSL version since 0.9.6c supposedly treat block cipher padding
 errors like MAC verification errors during record decryption
-(see http://www.openssl.org/~bodo/tls-cbc.txt), but MAC verification
+(see https://www.openssl.org/~bodo/tls-cbc.txt), but MAC verification
 was still skipped after detection of a padding error, which allowed
 the timing attack.  (Note that it is likely that other SSL/TLS
 implementations will have similar problems.)
@@ -208,7 +208,7 @@ http://lasecwww.epfl.ch/memo_ssl.shtml
 
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0078 to this issue:
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030219.txt
+https://www.openssl.org/news/secadv_20030219.txt
diff --git a/news/secadv/20030319.txt b/news/secadv/20030319.txt
old mode 100644
new mode 100755
index f868198..778f9e2
--- a/news/secadv/20030319.txt
+++ b/news/secadv/20030319.txt
@@ -44,7 +44,7 @@ The following patch can be applied to OpenSSL releases 0.9.6b up to 0.9.6i,
 +				/* SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); */
 +
 +				/* The Klima-Pokorny-Rosa extension of Bleichenbacher's attack
-+				 * (http://eprint.iacr.org/2003/052/) exploits the version
++				 * (https://eprint.iacr.org/2003/052/) exploits the version
 +				 * number check as a "bad version oracle" -- an alert would
 +				 * reveal that the plaintext corresponding to some ciphertext
 +				 * made up by the adversary is properly formatted except
@@ -84,11 +84,11 @@ References
 
 Report "Attacking RSA-based Sessions in SSL/TLS" by V. Klima, O. Pokorny,
 and T. Rosa:
-http://eprint.iacr.org/2003/052/
+https://eprint.iacr.org/2003/052/
 
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0131 to this issue.
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030319.txt
+https://www.openssl.org/news/secadv_20030319.txt
diff --git a/news/secadv/20030930.txt b/news/secadv/20030930.txt
old mode 100644
new mode 100755
index 72aee84..ad0b90e
--- a/news/secadv/20030930.txt
+++ b/news/secadv/20030930.txt
@@ -61,12 +61,12 @@ References
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0545 for issue 1:
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545
 
 and CAN-2003-0543 and CAN-2003-0544 for issue 2:
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20030930.txt
+https://www.openssl.org/news/secadv_20030930.txt
diff --git a/news/secadv/20031104.txt b/news/secadv/20031104.txt
old mode 100644
new mode 100755
index 2cd2fb8..31b332c
--- a/news/secadv/20031104.txt
+++ b/news/secadv/20031104.txt
@@ -42,9 +42,9 @@ applications statically linked to OpenSSL libraries.
 
 OpenSSL 0.9.6l is available for download via HTTP and FTP from the
 following master locations (you can find the various FTP mirrors under
-http://www.openssl.org/source/mirror.html):
+https://www.openssl.org/source/mirror.html):
 
-    o http://www.openssl.org/source/
+    o https://www.openssl.org/source/
     o ftp://ftp.openssl.org/source/
 
 The distribution file name is:
@@ -65,7 +65,7 @@ References
 The Common Vulnerabilities and Exposures project (cve.mitre.org) has
 assigned the name CAN-2003-0851 to this issue.
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20031104.txt
+https://www.openssl.org/news/secadv_20031104.txt
diff --git a/news/secadv/20040317.txt b/news/secadv/20040317.txt
old mode 100644
new mode 100755
index daf0b67..15879c6
--- a/news/secadv/20040317.txt
+++ b/news/secadv/20040317.txt
@@ -48,7 +48,7 @@ statically linked to OpenSSL libraries.
 
 OpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and
 FTP from the following master locations (you can find the various FTP
-mirrors under http://www.openssl.org/source/mirror.html):
+mirrors under https://www.openssl.org/source/mirror.html):
 
     ftp://ftp.openssl.org/source/
 
@@ -79,10 +79,10 @@ References
 ----------
 
 http://www.codenomicon.com/testtools/tls/
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20040317.txt
+https://www.openssl.org/news/secadv_20040317.txt
 
 
diff --git a/news/secadv/20051011.txt b/news/secadv/20051011.txt
old mode 100644
new mode 100755
index c4fd001..1fadb6f
--- a/news/secadv/20051011.txt
+++ b/news/secadv/20051011.txt
@@ -63,9 +63,9 @@ following measures is sufficient.
 
     OpenSSL 0.9.8a and OpenSSL 0.9.7h are available for download via
     HTTP and FTP from the following master locations (you can find the
-    various FTP mirrors under http://www.openssl.org/source/mirror.html):
+    various FTP mirrors under https://www.openssl.org/source/mirror.html):
 
-        o http://www.openssl.org/source/
+        o https://www.openssl.org/source/
         o ftp://ftp.openssl.org/source/
 
     The distribution file names are:
@@ -88,7 +88,7 @@ following measures is sufficient.
     source code to resolve the problem.  The patch is compatible with
     the 0.9.6, 0.9.7, and 0.9.8 branches of OpenSSL.
 
-        o http://www.openssl.org/news/patch-CAN-2005-2969.txt
+        o https://www.openssl.org/news/patch-CAN-2005-2969.txt
 
     Whether you choose to upgrade to a new version or to apply the
     patch, make sure to recompile any applications statically linked
@@ -108,7 +108,7 @@ problem.
 References
 ----------
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20051011.txt
+https://www.openssl.org/news/secadv_20051011.txt
diff --git a/news/secadv/20060905.txt b/news/secadv/20060905.txt
old mode 100644
new mode 100755
index 45c9e7f..9865eee
--- a/news/secadv/20060905.txt
+++ b/news/secadv/20060905.txt
@@ -38,9 +38,9 @@ following measures is sufficient.
 
     OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via
     HTTP and FTP from the following master locations (you can find the
-    various FTP mirrors under http://www.openssl.org/source/mirror.html):
+    various FTP mirrors under https://www.openssl.org/source/mirror.html):
 
-        o http://www.openssl.org/source/
+        o https://www.openssl.org/source/
         o ftp://ftp.openssl.org/source/
 
     The distribution file names are:
@@ -63,7 +63,7 @@ following measures is sufficient.
     source code to resolve the problem.  The patch is compatible with
     the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL.
 
-        o http://www.openssl.org/news/patch-CVE-2006-4339.txt
+        o https://www.openssl.org/news/patch-CVE-2006-4339.txt
 
 Whether you choose to upgrade to a new version or to apply the patch,
 make sure to recompile any applications statically linked to OpenSSL
@@ -82,9 +82,9 @@ to fix the problems.
 References
 ----------
 
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339
 http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20060905.txt
+https://www.openssl.org/news/secadv_20060905.txt
 
diff --git a/news/secadv/20060928.txt b/news/secadv/20060928.txt
old mode 100644
new mode 100755
index 9c2c1e1..50a2f09
--- a/news/secadv/20060928.txt
+++ b/news/secadv/20060928.txt
@@ -79,9 +79,9 @@ These vulnerabilities are resolved in the following versions of OpenSSL:
 
 OpenSSL 0.9.8d and OpenSSL 0.9.7l are available for download via
 HTTP and FTP from the following master locations (you can find the
-various FTP mirrors under http://www.openssl.org/source/mirror.html):
+various FTP mirrors under https://www.openssl.org/source/mirror.html):
 
-    o http://www.openssl.org/source/
+    o https://www.openssl.org/source/
     o ftp://ftp.openssl.org/source/
 
 The distribution file names are:
@@ -108,4 +108,4 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20060928.txt
+https://www.openssl.org/news/secadv_20060928.txt
diff --git a/news/secadv/20071129.txt b/news/secadv/20071129.txt
old mode 100644
new mode 100755
index 52e7c5f..d3f0be3
--- a/news/secadv/20071129.txt
+++ b/news/secadv/20071129.txt
@@ -4,7 +4,7 @@ OpenSSL FIPS Object Module Vulnerabilities
 ------------------------------------------
 
 A significant flaw in the PRNG implementation for the OpenSSL FIPS Object 
-Module v1.1.1 (http://openssl.org/source/openssl-fips-1.1.1.tar.gz, FIPS 
+Module v1.1.1 (https://www.openssl.org/source/openssl-fips-1.1.1.tar.gz, FIPS 
 140-2 validation certificate #733, 
 http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#733) has 
 been reported by Geoff Lowe of Secure Computing Corporation.  Due to a coding 
@@ -32,11 +32,11 @@ Wait for official approval of a patched distribution.
 
 For reference purposes the patches
 
-        http://www.openssl.org/news/patch-CVE-2007-5502-1.txt 
+        https://www.openssl.org/news/patch-CVE-2007-5502-1.txt 
 
 (the simplest direct fix) and: 
 
-         http://www.openssl.org/news/patch-CVE-2007-5502-2.txt 
+         https://www.openssl.org/news/patch-CVE-2007-5502-2.txt 
 
 (a workaround which avoids touching the PRNG code directly) demonstrate two 
 different fixes that independently address the vulnerability.  However, for 
@@ -49,7 +49,7 @@ Institute (OSSI), has supplied the information needed for a "letter change"
 update request based on the latter of these two patches to the FIPS 140-2 
 test lab to be submitted for official approval.  Once (and if) approved the 
 new distribution containing this patch will be posted as 
-http://openssl.org/source/openssl-fips-1.1.2.tar.gz.  The timeline for this 
+https://www.openssl.org/source/openssl-fips-1.1.2.tar.gz.  The timeline for this 
 approval is presently unknown.
 
 
diff --git a/news/secadv/20090107.txt b/news/secadv/20090107.txt
old mode 100644
new mode 100755
index b2816c9..4e06b88
--- a/news/secadv/20090107.txt
+++ b/news/secadv/20090107.txt
@@ -63,7 +63,7 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20090107.txt
+https://www.openssl.org/news/secadv_20090107.txt
 
 
 diff -ur openssl-0.9.8i-ORIG/apps/speed.c openssl-0.9.8i/apps/speed.c
diff --git a/news/secadv/20090325.txt b/news/secadv/20090325.txt
old mode 100644
new mode 100755
index 4e90a20..de84b65
--- a/news/secadv/20090325.txt
+++ b/news/secadv/20090325.txt
@@ -60,5 +60,5 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20090325.txt
+https://www.openssl.org/news/secadv_20090325.txt
 
diff --git a/news/secadv/20091111.txt b/news/secadv/20091111.txt
old mode 100644
new mode 100755
index 62af9e9..b21eec9
--- a/news/secadv/20091111.txt
+++ b/news/secadv/20091111.txt
@@ -83,11 +83,11 @@ References
 ===========
 
 CVE-2009-3555:
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
 
 TLS extension:
 https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20091111.txt
+https://www.openssl.org/news/secadv_20091111.txt
 
diff --git a/news/secadv/20100324.txt b/news/secadv/20100324.txt
old mode 100644
new mode 100755
index aabb4d3..0127494
--- a/news/secadv/20100324.txt
+++ b/news/secadv/20100324.txt
@@ -45,4 +45,4 @@ References
 This vulnerability is tracked as CVE-2010-0740.
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20100324.txt
+https://www.openssl.org/news/secadv_20100324.txt
diff --git a/news/secadv/20100601.txt b/news/secadv/20100601.txt
old mode 100644
new mode 100755
index 6d874e3..709370c
--- a/news/secadv/20100601.txt
+++ b/news/secadv/20100601.txt
@@ -41,5 +41,5 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20100601.txt
+https://www.openssl.org/news/secadv_20100601.txt
 
diff --git a/news/secadv/20101116-2.txt b/news/secadv/20101116-2.txt
old mode 100644
new mode 100755
index e624bb3..4d6e0bf
--- a/news/secadv/20101116-2.txt
+++ b/news/secadv/20101116-2.txt
@@ -203,6 +203,6 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101116-2.txt
+https://www.openssl.org/news/secadv_20101116-2.txt
 
 
diff --git a/news/secadv/20101116.txt b/news/secadv/20101116.txt
old mode 100644
new mode 100755
index 7273c81..bc392f1
--- a/news/secadv/20101116.txt
+++ b/news/secadv/20101116.txt
@@ -199,6 +199,6 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101116.txt
+https://www.openssl.org/news/secadv_20101116.txt
 
 
diff --git a/news/secadv/20101202.txt b/news/secadv/20101202.txt
old mode 100644
new mode 100755
index 22a31c6..0d4d91a
--- a/news/secadv/20101202.txt
+++ b/news/secadv/20101202.txt
@@ -119,9 +119,9 @@ References
 ===========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20101202.txt
+https://www.openssl.org/news/secadv_20101202.txt
 
 URL for updated CVS-2010-3864 Security Advisory:
-http://www.openssl.org/news/secadv_20101116-2.txt
+https://www.openssl.org/news/secadv_20101116-2.txt
 
 
diff --git a/news/secadv/20110208.txt b/news/secadv/20110208.txt
old mode 100644
new mode 100755
index 9c1e951..ee46181
--- a/news/secadv/20110208.txt
+++ b/news/secadv/20110208.txt
@@ -72,7 +72,7 @@ References
 This vulnerability is tracked as CVE-2011-0014.
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20110208.txt
+https://www.openssl.org/news/secadv_20110208.txt
 
 OCSP stapling is defined in RFC 6066 (previously RFC 3546), section
 "Certificate Status Request".
diff --git a/news/secadv/20110906.txt b/news/secadv/20110906.txt
old mode 100644
new mode 100755
index f95aa02..db8cba1
--- a/news/secadv/20110906.txt
+++ b/news/secadv/20110906.txt
@@ -58,5 +58,5 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20110906.txt
+https://www.openssl.org/news/secadv_20110906.txt
 
diff --git a/news/secadv/20120104.txt b/news/secadv/20120104.txt
old mode 100644
new mode 100755
index 6763fb4..d015463
--- a/news/secadv/20120104.txt
+++ b/news/secadv/20120104.txt
@@ -105,5 +105,5 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120104.txt
+https://www.openssl.org/news/secadv_20120104.txt
 
diff --git a/news/secadv/20120118.txt b/news/secadv/20120118.txt
old mode 100644
new mode 100755
index 64d3502..4ac82c3
--- a/news/secadv/20120118.txt
+++ b/news/secadv/20120118.txt
@@ -19,5 +19,5 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120118.txt
+https://www.openssl.org/news/secadv_20120118.txt
 
diff --git a/news/secadv/20120312.txt b/news/secadv/20120312.txt
old mode 100644
new mode 100755
index d584f62..1ee42d9
--- a/news/secadv/20120312.txt
+++ b/news/secadv/20120312.txt
@@ -29,5 +29,5 @@ References
 RFC3218
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120312.txt
+https://www.openssl.org/news/secadv_20120312.txt
 
diff --git a/news/secadv/20120419.txt b/news/secadv/20120419.txt
old mode 100644
new mode 100755
index ca9bd34..617f8d7
--- a/news/secadv/20120419.txt
+++ b/news/secadv/20120419.txt
@@ -35,6 +35,6 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120419.txt
+https://www.openssl.org/news/secadv_20120419.txt
 
 
diff --git a/news/secadv/20120424.txt b/news/secadv/20120424.txt
old mode 100644
new mode 100755
index 5929329..21ff332
--- a/news/secadv/20120424.txt
+++ b/news/secadv/20120424.txt
@@ -7,7 +7,7 @@ ASN1 BIO incomplete fix (CVE-2012-2131)
 It was discovered that the fix for CVE-2012-2110 released on 19 Apr
 2012 was not sufficient to correct the issue for OpenSSL 0.9.8.
 
-Please see http://www.openssl.org/news/secadv_20120419.txt for details
+Please see https://www.openssl.org/news/secadv_20120419.txt for details
 of that vulnerability.
 
 This issue only affects OpenSSL 0.9.8v.  OpenSSL 1.0.1a and 1.0.0i
@@ -21,4 +21,4 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120424.txt
+https://www.openssl.org/news/secadv_20120424.txt
diff --git a/news/secadv/20120510.txt b/news/secadv/20120510.txt
old mode 100644
new mode 100755
index 441b835..be085ed
--- a/news/secadv/20120510.txt
+++ b/news/secadv/20120510.txt
@@ -22,6 +22,6 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20120510.txt
+https://www.openssl.org/news/secadv_20120510.txt
 
 
diff --git a/news/secadv/20130205.txt b/news/secadv/20130205.txt
old mode 100644
new mode 100755
index 4d4a610..1a278f6
--- a/news/secadv/20130205.txt
+++ b/news/secadv/20130205.txt
@@ -57,7 +57,7 @@ Affected users should upgrade to OpenSSL 1.0.1d, 1.0.0k or 0.9.8y.
 References
 ==========
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20130204.txt
+https://www.openssl.org/news/secadv_20130204.txt
 Wikipedia AES-NI description:
 https://en.wikipedia.org/wiki/AES-NI
 
diff --git a/news/secadv/20140605.txt b/news/secadv/20140605.txt
old mode 100644
new mode 100755
index a86051d..514929e
--- a/news/secadv/20140605.txt
+++ b/news/secadv/20140605.txt
@@ -117,7 +117,7 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20140605.txt
+https://www.openssl.org/news/secadv_20140605.txt
 
 Note: the online version of the advisory may be updated with additional
 details over time.
diff --git a/news/secadv/20140806.txt b/news/secadv/20140806.txt
old mode 100644
new mode 100755
index d2e7e53..0146712
--- a/news/secadv/20140806.txt
+++ b/news/secadv/20140806.txt
@@ -157,7 +157,7 @@ References
 ==========
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_20140806.txt
+https://www.openssl.org/news/secadv_20140806.txt
 
 Note: the online version of the advisory may be updated with additional
 details over time.
diff --git a/news/secadv/20150108.txt b/news/secadv/20150108.txt
index a4e68a8..c3fe15f 100644
--- a/news/secadv/20150108.txt
+++ b/news/secadv/20150108.txt
@@ -193,7 +193,7 @@ conducted by the OpenSSL development team and Adam Langley of
 Google. The final fix was developed by Andy Polyakov of the OpenSSL
 core team.
 
-[1] http://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdf
+[1] https://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdf
 
 Note
 ====
@@ -215,4 +215,3 @@ details over time.
 
 For details of OpenSSL severity classifications please see:
 https://www.openssl.org/about/secpolicy.html
-
diff --git a/news/secadv/prng.txt b/news/secadv/prng.txt
old mode 100644
new mode 100755
index a923174..981b062
--- a/news/secadv/prng.txt
+++ b/news/secadv/prng.txt
@@ -23,7 +23,7 @@ MD5 checksums:
      openssl-engine-0.9.6b.tar.gz   ab5ca5b157459c49bdab06a7db8a5a47
 
 OpenSSL source code can also be obtained from a number of mirror sites.
-For a list, see <URL: http://www.openssl.org/source/mirror.html>.
+For a list, see <URL: https://www.openssl.org/source/mirror.html>.
 
 If you are using a pre-compiled OpenSSL package, please look for update
 information from the respective software distributor.  The OpenSSL
@@ -216,4 +216,4 @@ for discovering the PRNG problem and bringing it to our attention.
 
 
 URL for this Security Advisory:
-http://www.openssl.org/news/secadv_prng.txt
+https://www.openssl.org/news/secadv_prng.txt
diff --git a/support/acks.html b/support/acks.html
index 0118b3e..29bb761 100644
--- a/support/acks.html
+++ b/support/acks.html
@@ -25,7 +25,7 @@
 
 	  <hr noshade size=1>
 	  <p>Exceptional support:</p>
-	  <a href="http://www.linux-foundation.org/"><img src="/img/lf-logo-med.png"></a>
+	  <a href="http://www.linuxfoundation.org/"><img src="/img/lf-logo-med.png"></a>
 
 	  <a href="http://www.linuxfoundation.org/programs/core-infrastructure-initiative"><img src="/img/cii-logo-med.png"></a>
 	  <a href="http://www.smartisan.com/"><img src="/img/smartisan-logo-med.png"></a>


More information about the openssl-commits mailing list