Author: fernando Date: Mon Apr 21 08:14:58 2014 New Revision: 2878 Log: gnutls-3.3.1: fixes for building with guile and for the test suite.
Added: trunk/gnutls/ trunk/gnutls/gnutls-3.3.1-upstream_fixes-1.patch Added: trunk/gnutls/gnutls-3.3.1-upstream_fixes-1.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ trunk/gnutls/gnutls-3.3.1-upstream_fixes-1.patch Mon Apr 21 08:14:58 2014 (r2878) @@ -0,0 +1,187 @@ +Submitted By: Fernando de Oliveira <famobr at yahoo dot com dot br> +Date: 2014-04-21 +Initial Package Version: 3.3.1 +Upstream Status: Fixed +Origin: Upstream +Description: Fixes for building with guile and for the test suite + +--- a/guile/src/core.c ++++ b/guile/src/core.c +@@ -3364,11 +3364,6 @@ + #include "core.x" + + /* Use Guile's allocation routines, which will run the GC if need be. */ +- gnutls_malloc = scm_malloc; +- gnutls_realloc = scm_realloc; +- gnutls_secure_malloc = scm_malloc; +- gnutls_free = free; +- + (void) gnutls_global_init (); + + scm_gnutls_define_enums (); +--- a/tests/cert-tests/aki ++++ b/tests/cert-tests/aki +@@ -25,9 +25,19 @@ + srcdir=${srcdir:-.} + CERTTOOL=${CERTTOOL:-../../src/certtool$EXEEXT} + DIFF=${DIFF:-diff} ++if ! test -z "${VALGRIND}";then ++VALGRIND="libtool --mode=execute ${VALGRIND}" ++fi + +-$CERTTOOL --certificate-info --infile $srcdir/aki-cert.pem \ ++$VALGRIND $CERTTOOL --certificate-info --infile $srcdir/aki-cert.pem \ + |grep -v "Algorithm Security Level" > tmp-aki.pem ++rc=$? ++ ++if test "$rc" != "0"; then ++ echo "info failed" ++ exit $rc ++fi ++ + + $DIFF $srcdir/aki-cert.pem tmp-aki.pem + rc=$? +--- a/tests/cert-tests/pathlen ++++ b/tests/cert-tests/pathlen +@@ -25,11 +25,27 @@ + srcdir=${srcdir:-.} + CERTTOOL=${CERTTOOL:-../../src/certtool$EXEEXT} + DIFF=${DIFF:-diff} ++if ! test -z "${VALGRIND}";then ++VALGRIND="libtool --mode=execute ${VALGRIND}" ++fi + +-$CERTTOOL --certificate-info --infile $srcdir/ca-no-pathlen.pem \ ++$VALGRIND $CERTTOOL --certificate-info --infile $srcdir/ca-no-pathlen.pem \ + |grep -v "Algorithm Security Level" > new-ca-no-pathlen.pem +-$CERTTOOL --certificate-info --infile $srcdir/no-ca-or-pathlen.pem \ ++rc=$? ++ ++if test "$rc" != "0"; then ++ echo "info 1 failed" ++ exit $rc ++fi ++ ++$VALGRIND $CERTTOOL --certificate-info --infile $srcdir/no-ca-or-pathlen.pem \ + |grep -v "Algorithm Security Level" > new-no-ca-or-pathlen.pem ++rc=$? ++ ++if test "$rc" != "0"; then ++ echo "info 2 failed" ++ exit $rc ++fi + + $DIFF $srcdir/ca-no-pathlen.pem new-ca-no-pathlen.pem + rc1=$? +--- a/tests/cert-tests/pem-decoding ++++ b/tests/cert-tests/pem-decoding +@@ -25,9 +25,12 @@ + srcdir=${srcdir:-.} + CERTTOOL=${CERTTOOL:-../../src/certtool$EXEEXT} + DIFF=${DIFF:-diff} ++if ! test -z "${VALGRIND}";then ++VALGRIND="libtool --mode=execute ${VALGRIND}" ++fi + + #check whether "funny" spaces can be interpreted +-$CERTTOOL --certificate-info --infile $srcdir/funny-spacing.pem >/dev/null 2>&1 ++$VALGRIND $CERTTOOL --certificate-info --infile $srcdir/funny-spacing.pem >/dev/null 2>&1 + rc=$? + + # We're done. +@@ -37,7 +40,7 @@ + fi + + #check whether a BMPString attribute can be properly decoded +-$CERTTOOL --certificate-info --infile $srcdir/bmpstring.pem >tmp-pem.pem ++$VALGRIND $CERTTOOL --certificate-info --infile $srcdir/bmpstring.pem >tmp-pem.pem + rc=$? + + if test "$rc" != "0"; then +@@ -56,7 +59,7 @@ + fi + + #check whether complex-cert is decoded as expected +-$CERTTOOL --certificate-info --infile $srcdir/complex-cert.pem >tmp-pem.pem ++$VALGRIND $CERTTOOL --certificate-info --infile $srcdir/complex-cert.pem >tmp-pem.pem + rc=$? + + if test "$rc" != "0"; then +@@ -75,7 +78,7 @@ + fi + + #check whether the cert with many othernames is decoded as expected +-$CERTTOOL --certificate-info --infile $srcdir/xmpp-othername.pem >tmp-pem.pem ++$VALGRIND $CERTTOOL --certificate-info --infile $srcdir/xmpp-othername.pem >tmp-pem.pem + rc=$? + + if test "$rc" != "0"; then +--- a/lib/x509/x509.c ++++ b/lib/x509/x509.c +@@ -847,7 +847,8 @@ + inline static int is_type_printable(int type) + { + if (type == GNUTLS_SAN_DNSNAME || type == GNUTLS_SAN_RFC822NAME || +- type == GNUTLS_SAN_URI || type == GNUTLS_SAN_OTHERNAME_XMPP) ++ type == GNUTLS_SAN_URI || type == GNUTLS_SAN_OTHERNAME_XMPP || ++ type == GNUTLS_SAN_OTHERNAME) + return 1; + else + return 0; +--- a/lib/x509/output.c ++++ b/lib/x509/output.c +@@ -724,12 +724,14 @@ + { + unsigned int altname_idx; + gnutls_datum_t t; ++ char *buffer; ++ size_t size; ++ int err; + + for (altname_idx = 0;; altname_idx++) { +- char *buffer = NULL; +- size_t size = 0; +- int err; + ++ buffer = NULL; ++ size = 0; + if (altname_type == TYPE_CRT_SAN) + err = + gnutls_x509_crt_get_subject_alt_name(cert.crt, + +@@ -771,14 +773,14 @@ + return; + } + +- if (altname_type == TYPE_CRT_SAN) ++ if (altname_type == TYPE_CRT_SAN) { + err = + gnutls_x509_crt_get_subject_alt_name(cert.crt, + altname_idx, + buffer, + &size, + NULL); +- else if (altname_type == TYPE_CRQ_SAN) ++ } else if (altname_type == TYPE_CRQ_SAN) { + err = + gnutls_x509_crq_get_subject_alt_name(cert.crq, + altname_idx, + +@@ -786,14 +788,14 @@ + &size, + NULL, + NULL); +- else if (altname_type == TYPE_CRT_IAN) ++ } else if (altname_type == TYPE_CRT_IAN) { + err = + gnutls_x509_crt_get_issuer_alt_name(cert.crt, + altname_idx, + buffer, + &size, + NULL); +- ++ } + if (err < 0) { + gnutls_free(buffer); + addf(str, -- http://linuxfromscratch.org/mailman/listinfo/patches FAQ: http://www.linuxfromscratch.org/faq/ Unsubscribe: See the above information page