OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 28-May-2008 19:22:37 Branch: HEAD Handle: 2008052818223700 Modified files: openpkg-src/openssl openssl.patch openssl.spec Log: upgrading package: openssl 0.9.8g -> 0.9.8h Summary: Revision Changes Path 1.37 +4 -156 openpkg-src/openssl/openssl.patch 1.98 +2 -2 openpkg-src/openssl/openssl.spec ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.patch ============================================================================ $ cvs diff -u -r1.36 -r1.37 openssl.patch --- openpkg-src/openssl/openssl.patch 4 Nov 2007 10:15:39 -0000 1.36 +++ openpkg-src/openssl/openssl.patch 28 May 2008 17:22:37 -0000 1.37 @@ -1,7 +1,7 @@ Index: Configure ---- Configure.orig 2007-09-16 14:24:17 +0200 -+++ Configure 2007-10-17 10:00:11 +0200 -@@ -402,8 +402,8 @@ +--- Configure.orig 2008-05-02 01:11:30 +0200 ++++ Configure 2008-05-28 19:20:07 +0200 +@@ -407,8 +407,8 @@ #### IBM's AIX. "aix3-cc", "cc:-O -DB_ENDIAN -qmaxmem=16384::(unknown):AIX::BN_LLONG RC4_CHAR:::", @@ -14,7 +14,7 @@ "aix-cc", "cc:-q32 -O -DB_ENDIAN -qmaxmem=16384 -qro -qroconst::-qthreaded:AIX::BN_LLONG RC4_CHAR::aix_ppc32.o::::::::::dlfcn:aix-shared::-q32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)::-X 32", Index: config --- config.orig 2007-08-01 13:21:35 +0200 -+++ config 2007-10-17 09:59:48 +0200 ++++ config 2008-05-28 19:20:07 +0200 @@ -469,6 +469,7 @@ if [ "${SYSTEM}" = "AIX" ]; then # favor vendor cc over gcc @@ -32,155 +32,3 @@ OUT="solaris64-x86_64-$CC" else OUT="solaris-x86-$CC" -Index: crypto/rand/rand_lib.c ---- crypto/rand/rand_lib.c.orig 2007-09-21 12:10:47 +0200 -+++ crypto/rand/rand_lib.c 2007-10-17 09:59:48 +0200 -@@ -154,6 +154,7 @@ - int RAND_bytes(unsigned char *buf, int num) - { - const RAND_METHOD *meth = RAND_get_rand_method(); -+ memset(buf, 0, num); - if (meth && meth->bytes) - return meth->bytes(buf,num); - return(-1); -@@ -162,6 +163,7 @@ - int RAND_pseudo_bytes(unsigned char *buf, int num) - { - const RAND_METHOD *meth = RAND_get_rand_method(); -+ memset(buf, 0, num); - if (meth && meth->pseudorand) - return meth->pseudorand(buf,num); - return(-1); - ------------------------------------------------------------------------------ - -A few patches from upstream OpenSSL CVS: - -Index: ssl/ssl_asn1.c ---- ssl/ssl_asn1.c 12 Aug 2007 18:59:02 -0000 1.20.2.2 -+++ ssl/ssl_asn1.c 17 Oct 2007 11:27:25 -0000 1.20.2.3 -@@ -200,12 +200,13 @@ - a.tlsext_tick.type=V_ASN1_OCTET_STRING; - a.tlsext_tick.data=(unsigned char *)in->tlsext_tick; - /* If we have a ticket set session ID to empty because -- * it will be bogus. -+ * it will be bogus. If liftime hint is -1 treat as a special -+ * case because the session is being used as a container - */ -- if (in->tlsext_ticklen) -+ if (in->tlsext_ticklen && (in->tlsext_tick_lifetime_hint != -1)) - a.session_id.length=0; - } -- if (in->tlsext_tick_lifetime_hint != 0) -+ if (in->tlsext_tick_lifetime_hint > 0) - { - a.tlsext_tick_lifetime.length=LSIZE2; - a.tlsext_tick_lifetime.type=V_ASN1_INTEGER; -@@ -235,7 +236,7 @@ - M_ASN1_I2D_len_EXP_opt(&(a.verify_result),i2d_ASN1_INTEGER,5,v5); - - #ifndef OPENSSL_NO_TLSEXT -- if (in->tlsext_tick_lifetime_hint) -+ if (in->tlsext_tick_lifetime_hint > 0) - M_ASN1_I2D_len_EXP_opt(&a.tlsext_tick_lifetime, i2d_ASN1_INTEGER,9,v9); - if (in->tlsext_tick) - M_ASN1_I2D_len_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRING,10,v10); -@@ -268,7 +269,7 @@ - #ifndef OPENSSL_NO_TLSEXT - if (in->tlsext_hostname) - M_ASN1_I2D_put_EXP_opt(&(a.tlsext_hostname), i2d_ASN1_OCTET_STRING,6,v6); -- if (in->tlsext_tick_lifetime_hint) -+ if (in->tlsext_tick_lifetime_hint > 0) - M_ASN1_I2D_put_EXP_opt(&a.tlsext_tick_lifetime, i2d_ASN1_INTEGER,9,v9); - if (in->tlsext_tick) - M_ASN1_I2D_put_EXP_opt(&(a.tlsext_tick), i2d_ASN1_OCTET_STRING,10,v10); -@@ -464,8 +465,10 @@ - ret->tlsext_tick_lifetime_hint=ASN1_INTEGER_get(aip); - OPENSSL_free(ai.data); ai.data=NULL; ai.length=0; - } -+ else if (ret->tlsext_ticklen && ret->session_id_length) -+ ret->tlsext_tick_lifetime_hint = -1; - else -- ret->tlsext_tick_lifetime_hint=0; -+ ret->tlsext_tick_lifetime_hint = 0; - os.length=0; - os.data=NULL; - M_ASN1_D2I_get_EXP_opt(osp,d2i_ASN1_OCTET_STRING,10); -Index: ssl/s3_clnt.c ---- ssl/s3_clnt.c 14 Oct 2007 14:07:46 -0000 1.88.2.11 -+++ ssl/s3_clnt.c 3 Nov 2007 13:07:39 -0000 1.88.2.12 -@@ -273,7 +273,10 @@ - if (ret == 2) - { - s->hit = 1; -- s->state=SSL3_ST_CR_FINISHED_A; -+ if (s->tlsext_ticket_expected) -+ s->state=SSL3_ST_CR_SESSION_TICKET_A; -+ else -+ s->state=SSL3_ST_CR_FINISHED_A; - s->init_num=0; - break; - } -Index: crypto/bn/bn_mul.c ---- crypto/bn/bn_mul.c 8 Jul 2007 18:54:30 -0000 1.36.2.1 -+++ crypto/bn/bn_mul.c 3 Nov 2007 20:09:29 -0000 1.36.2.2 -@@ -389,6 +389,7 @@ - * a[0]*b[0]+a[1]*b[1]+(a[0]-a[1])*(b[1]-b[0]) - * a[1]*b[1] - */ -+/* dnX may not be positive, but n2/2+dnX has to be */ - void bn_mul_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n2, - int dna, int dnb, BN_ULONG *t) - { -@@ -398,7 +399,7 @@ - BN_ULONG ln,lo,*p; - - # ifdef BN_COUNT -- fprintf(stderr," bn_mul_recursive %d * %d\n",n2,n2); -+ fprintf(stderr," bn_mul_recursive %d%+d * %d%+d\n",n2,dna,n2,dnb); - # endif - # ifdef BN_MUL_COMBA - # if 0 -@@ -545,6 +546,7 @@ - - /* n+tn is the word length - * t needs to be n*4 is size, as does r */ -+/* tnX may not be negative but less than n */ - void bn_mul_part_recursive(BN_ULONG *r, BN_ULONG *a, BN_ULONG *b, int n, - int tna, int tnb, BN_ULONG *t) - { -@@ -553,8 +555,8 @@ - BN_ULONG ln,lo,*p; - - # ifdef BN_COUNT -- fprintf(stderr," bn_mul_part_recursive (%d+%d) * (%d+%d)\n", -- tna, n, tnb, n); -+ fprintf(stderr," bn_mul_part_recursive (%d%+d) * (%d%+d)\n", -+ n, tna, n, tnb); - # endif - if (n < 8) - { -@@ -655,16 +657,19 @@ - for (;;) - { - i/=2; -- if (i <= tna && tna == tnb) -+ /* these simplified conditions work -+ * exclusively because difference -+ * between tna and tnb is 1 or 0 */ -+ if (i < tna || i < tnb) - { -- bn_mul_recursive(&(r[n2]), -+ bn_mul_part_recursive(&(r[n2]), - &(a[n]),&(b[n]), - i,tna-i,tnb-i,p); - break; - } -- else if (i < tna || i < tnb) -+ else if (i == tna || i == tnb) - { -- bn_mul_part_recursive(&(r[n2]), -+ bn_mul_recursive(&(r[n2]), - &(a[n]),&(b[n]), - i,tna-i,tnb-i,p); - break; @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.spec ============================================================================ $ cvs diff -u -r1.97 -r1.98 openssl.spec --- openpkg-src/openssl/openssl.spec 1 Jan 2008 15:00:47 -0000 1.97 +++ openpkg-src/openssl/openssl.spec 28 May 2008 17:22:37 -0000 1.98 @@ -31,8 +31,8 @@ Class: CORE Group: SSL License: BSD-style -Version: 0.9.8g -Release: 20080101 +Version: 0.9.8h +Release: 20080528 # package options %option with_zlib no @@ . ______________________________________________________________________ OpenPKG http://openpkg.org CVS Repository Commit List openpkg-cvs@openpkg.org