aboutsummaryrefslogtreecommitdiff
path: root/src/obj-test
diff options
context:
space:
mode:
authorWladimir J. van der Laan <laanwj@gmail.com>2014-06-05 15:44:35 +0200
committerWladimir J. van der Laan <laanwj@gmail.com>2014-06-05 17:24:38 +0200
commit6e7c4d17d8abb4b1c8b91504699ce6970e01a1fb (patch)
tree34a079cb2bad4e0906d3b92333c3fae7f1258cd0 /src/obj-test
parenta92aded70ec2346c3f07ff1cf8eb97101a76912f (diff)
gitian: upgrade OpenSSL to 1.0.1h
Upgrade for https://www.openssl.org/news/secadv_20140605.txt Just in case - there is no vulnerability that affects ecdsa signing or verification. The MITM attack vulnerability (CVE-2014-0224) may have some effect on our usage of SSL/TLS. As long as payment requests are signed (which is the common case), usage of the payment protocol should also not be affected. The TLS usage in RPC may be at risk for MITM attacks. If you have `-rpcssl` enabled, be sure to update OpenSSL as soon as possible.
Diffstat (limited to 'src/obj-test')
0 files changed, 0 insertions, 0 deletions