Re: [CVS] OpenPKG: openpkg-src/openssl/ openssl.patch
On Wed, Oct 17, 2007, Christoph Schug wrote: > On Wed, Oct 17, 2007, Christoph Schug wrote: > > > On Wed, Oct 17, 2007, Ralf S. Engelschall wrote: > > > > > OpenPKG CVS Repository > > > http://cvs.openpkg.org/ > > > > > > > > > > > > Server: cvs.openpkg.org Name: Ralf S. Engelschall > > > Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] > > > Module: openpkg-src Date: 17-Oct-2007 10:01:05 > > > Branch: HEAD Handle: 2007101709010400 > > > > > > Modified files: > > > openpkg-src/openssl openssl.patch > > > > > > Log: > > > fix patching > > > > Thanks! (was just building a fixed version but you has been faster ;) > > Do you fix openpkg as well? > > Thanks, fixed openpkg just appeared on my radar as well But it was still broken as today I seem unable to create correct patches. Now fixed. Should be available online in about 5 minutes. Then you can retry with the fixed bootstrap package. Sorry for the inconveniences... Ralf S. Engelschall [EMAIL PROTECTED] www.engelschall.com __ OpenPKG http://openpkg.org Developer Communication List openpkg-dev@openpkg.org
Re: [CVS] OpenPKG: openpkg-src/openssl/ openssl.patch
On Wed, Oct 17, 2007, Christoph Schug wrote: > On Wed, Oct 17, 2007, Ralf S. Engelschall wrote: > > > OpenPKG CVS Repository > > http://cvs.openpkg.org/ > > > > > > > > Server: cvs.openpkg.org Name: Ralf S. Engelschall > > Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] > > Module: openpkg-src Date: 17-Oct-2007 10:01:05 > > Branch: HEAD Handle: 2007101709010400 > > > > Modified files: > > openpkg-src/openssl openssl.patch > > > > Log: > > fix patching > > Thanks! (was just building a fixed version but you has been faster ;) > Do you fix openpkg as well? Thanks, fixed openpkg just appeared on my radar as well -cs __ OpenPKG http://openpkg.org Developer Communication List openpkg-dev@openpkg.org
Re: [CVS] OpenPKG: openpkg-src/openssl/ openssl.patch
On Wed, Oct 17, 2007, Ralf S. Engelschall wrote: > OpenPKG CVS Repository > http://cvs.openpkg.org/ > > > Server: cvs.openpkg.org Name: Ralf S. Engelschall > Root: /v/openpkg/cvs Email: [EMAIL PROTECTED] > Module: openpkg-src Date: 17-Oct-2007 10:01:05 > Branch: HEAD Handle: 2007101709010400 > > Modified files: > openpkg-src/openssl openssl.patch > > Log: > fix patching Thanks! (was just building a fixed version but you has been faster ;) Do you fix openpkg as well? -cs __ OpenPKG http://openpkg.org Developer Communication List openpkg-dev@openpkg.org
[CVS] OpenPKG: openpkg-src/openssl/ openssl.patch openssl.spec
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src Date: 18-Mar-2004 09:23:42 Branch: HEAD Handle: 2004031808234101 Modified files: openpkg-src/openssl openssl.patch openssl.spec Log: SA-2004.007-openssl; CAN-2004-0079, CAN-2004-0112 Summary: RevisionChanges Path 1.14+0 -48 openpkg-src/openssl/openssl.patch 1.52+2 -2 openpkg-src/openssl/openssl.spec patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r1.13 -r1.14 openssl.patch --- openpkg-src/openssl/openssl.patch 1 Oct 2003 20:12:19 - 1.13 +++ openpkg-src/openssl/openssl.patch 18 Mar 2004 08:23:41 - 1.14 @@ -22,51 +22,3 @@ =head1 DESCRIPTION -Index: doc/crypto/ui.pod doc/crypto/ui.pod.orig 2001-10-25 18:55:17.0 +0200 -+++ doc/crypto/ui.pod2003-10-01 22:07:42.0 +0200 -@@ -5,7 +5,7 @@ - UI_new, UI_new_method, UI_free, UI_add_input_string, UI_dup_input_string, - UI_add_verify_string, UI_dup_verify_string, UI_add_input_boolean, - UI_dup_input_boolean, UI_add_info_string, UI_dup_info_string, --UI_add_error_string, UI_dup_error_string, UI_construct_prompt -+UI_add_error_string, UI_dup_error_string, UI_construct_prompt, - UI_add_user_data, UI_get0_user_data, UI_get0_result, UI_process, - UI_ctrl, UI_set_default_method, UI_get_default_method, UI_get_method, - UI_set_method, UI_OpenSSL, ERR_load_UI_strings - New User Interface -Index: doc/crypto/EVP_DigestInit.pod doc/crypto/EVP_DigestInit.pod.orig 2002-07-18 20:55:04.0 +0200 -+++ doc/crypto/EVP_DigestInit.pod2003-10-01 22:08:09.0 +0200 -@@ -4,7 +4,7 @@ - - EVP_MD_CTX_init, EVP_MD_CTX_create, EVP_DigestInit_ex, EVP_DigestUpdate, - EVP_DigestFinal_ex, EVP_MD_CTX_cleanup, EVP_MD_CTX_destroy, EVP_MAX_MD_SIZE, --EVP_MD_CTX_copy_ex EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, EVP_MD_size, -+EVP_MD_CTX_copy_ex, EVP_MD_CTX_copy, EVP_MD_type, EVP_MD_pkey_type, EVP_MD_size, - EVP_MD_block_size, EVP_MD_CTX_md, EVP_MD_CTX_size, EVP_MD_CTX_block_size, EVP_MD_CTX_type, - EVP_md_null, EVP_md2, EVP_md5, EVP_sha, EVP_sha1, EVP_dss, EVP_dss1, EVP_mdc2, - EVP_ripemd160, EVP_get_digestbyname, EVP_get_digestbynid, EVP_get_digestbyobj - -Index: Makefile.ssl Makefile.ssl.orig2003-09-30 14:38:13.0 +0200 -+++ Makefile.ssl 2003-10-01 22:06:50.0 +0200 -@@ -834,7 +834,7 @@ - fi; \ - fi - cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig --chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig -+chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig/openssl.pc - - install_docs: - @$(PERL) $(TOP)/util/mkdir-p.pl \ -Index: Makefile.org Makefile.org.orig2003-08-11 11:37:17.0 +0200 -+++ Makefile.org 2003-10-01 22:06:50.0 +0200 -@@ -832,7 +832,7 @@ - fi; \ - fi - cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig --chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig -+chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig/openssl.pc - - install_docs: - @$(PERL) $(TOP)/util/mkdir-p.pl \ @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.spec $ cvs diff -u -r1.51 -r1.52 openssl.spec --- openpkg-src/openssl/openssl.spec 7 Feb 2004 17:57:18 - 1.51 +++ openpkg-src/openssl/openssl.spec 18 Mar 2004 08:23:42 - 1.52 @@ -33,8 +33,8 @@ Class:CORE Group:Cryptography License: BSD-style -Version: 0.9.7c -Release: 20040207 +Version: 0.9.7d +Release: 20040318 # package options %option with_zlib no @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/openssl/ openssl.patch openssl.spec openpkg...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Thomas Lotterer Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web Date: 30-Sep-2003 14:44:31 Branch: HEAD Handle: 2003093013442902 Modified files: openpkg-src/openssl openssl.patch openssl.spec openpkg-web news.txt Log: SA-2003.044-openssl; CAN-2003-0543, CAN-2003-0544, CAN-2003-0545 Summary: RevisionChanges Path 1.12+66 -0 openpkg-src/openssl/openssl.patch 1.47+1 -1 openpkg-src/openssl/openssl.spec 1.6790 +1 -0 openpkg-web/news.txt patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r1.11 -r1.12 openssl.patch --- openpkg-src/openssl/openssl.patch 6 Aug 2003 08:52:45 - 1.11 +++ openpkg-src/openssl/openssl.patch 30 Sep 2003 12:44:31 - 1.12 @@ -9,3 +9,69 @@ { next loop if (($p%$primes[$i]) == 0); } + +- + +Security Bugfixes +OpenPKG-SA-2003.044-openssl +http://www.openssl.org/news/secadv_20030930.txt +CAN-2003-0543, CAN-2003-0544, CAN-2003-0545 + +--- crypto/asn1/asn1_lib.c Sun Sep 28 14:20:55 2003 crypto/asn1/asn1_lib.c Fri Sep 26 13:51:38 2003 +@@ -104,10 +104,12 @@ + l<<=7L; + l|= *(p++)&0x7f; + if (--max == 0) goto err; ++if (l > (INT_MAX >> 7L)) goto err; + } + l<<=7L; + l|= *(p++)&0x7f; + tag=(int)l; ++if (--max == 0) goto err; + } + else + { +--- crypto/asn1/tasn_dec.c Sun Sep 28 14:20:55 2003 crypto/asn1/tasn_dec.c Fri Sep 26 13:51:38 2003 +@@ -691,6 +691,7 @@ + + int asn1_ex_c2i(ASN1_VALUE **pval, unsigned char *cont, int len, int utype, char *free_cont, const ASN1_ITEM *it) + { ++ASN1_VALUE **opval = NULL; + ASN1_STRING *stmp; + ASN1_TYPE *typ = NULL; + int ret = 0; +@@ -705,6 +706,7 @@ + *pval = (ASN1_VALUE *)typ; + } else typ = (ASN1_TYPE *)*pval; + if(utype != typ->type) ASN1_TYPE_set(typ, utype, NULL); ++opval = pval; + pval = (ASN1_VALUE **)&typ->value.ptr; + } + switch(utype) { +@@ -796,7 +798,12 @@ + + ret = 1; + err: +-if(!ret) ASN1_TYPE_free(typ); ++if(!ret) ++{ ++ASN1_TYPE_free(typ); ++if (opval) ++*opval = NULL; ++} + return ret; + } + +--- crypto/x509/x509_vfy.c Sun Sep 28 14:20:55 2003 crypto/x509/x509_vfy.c Fri Sep 26 13:51:38 2003 +@@ -674,7 +674,7 @@ + ok=(*cb)(0,ctx); + if (!ok) goto end; + } +-if (X509_verify(xs,pkey) <= 0) ++else if (X509_verify(xs,pkey) <= 0) + /* XXX For the final trusted self-signed cert, + * this is a waste of time. That check should + * optional so that e.g. 'openssl x509' can be @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.spec $ cvs diff -u -r1.46 -r1.47 openssl.spec --- openpkg-src/openssl/openssl.spec 6 Aug 2003 08:52:45 - 1.46 +++ openpkg-src/openssl/openssl.spec 30 Sep 2003 12:44:31 - 1.47 @@ -33,7 +33,7 @@ Group:Cryptography License: BSD-style Version: 0.9.7b -Release: 20030806 +Release: 20030930 # package options %option with_zlib no @@ . patch -p0 <<'@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.6789 -r1.6790 news.txt --- openpkg-web/news.txt 29 Sep 2003 19:09:19 - 1.6789 +++ openpkg-web/news.txt 30 Sep 2003 12:44:29 - 1.6790 @@ -1,3 +1,4 @@ +30-Sep-2003: Upgraded package: P 29-Sep-2003: New package: P 29-Sep-2003: Upgraded package: P 29-Sep-2003: Upgraded package: P @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/openssl/ openssl.patch openssl.spec openpkg...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web Date: 06-Aug-2003 10:52:45 Branch: HEAD Handle: 2003080609524302 Added files: openpkg-src/openssl openssl.patch Modified files: openpkg-src/openssl openssl.spec openpkg-web news.txt Log: not all platform like zero modulus operations, so fix the loop Summary: RevisionChanges Path 1.11+11 -0 openpkg-src/openssl/openssl.patch 1.46+3 -1 openpkg-src/openssl/openssl.spec 1.6052 +1 -0 openpkg-web/news.txt patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r0 -r1.11 openssl.patch --- /dev/null 2003-08-06 10:52:45.0 +0200 +++ openssl.patch 2003-08-06 10:52:45.0 +0200 @@ -0,0 +1,11 @@ +--- crypto/bn/bn_prime.pl.orig Wed Feb 16 14:24:06 2000 crypto/bn/bn_prime.plWed Aug 6 10:49:34 2003 +@@ -11,7 +11,7 @@ + $p+=2; + $s=int(sqrt($p)); + +-for ($i=0; $primes[$i]<=$s; $i++) ++for ($i=0; defined($primes[$i]) && $primes[$i]<=$s; $i++) + { + next loop if (($p%$primes[$i]) == 0); + } @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.spec $ cvs diff -u -r1.45 -r1.46 openssl.spec --- openpkg-src/openssl/openssl.spec 23 Jul 2003 13:32:09 - 1.45 +++ openpkg-src/openssl/openssl.spec 6 Aug 2003 08:52:45 - 1.46 @@ -33,7 +33,7 @@ Group:Cryptography License: BSD-style Version: 0.9.7b -Release: 20030723 +Release: 20030806 # package options %option with_zlib no @@ -42,6 +42,7 @@ # list of sources Source0: ftp://ftp.openssl.org/source/openssl-%{version}.tar.gz +Patch0: openssl.patch # build information Prefix: %{l_prefix} @@ -62,6 +63,7 @@ %prep %setup -q +%patch -p0 %{l_shtool} subst \ -e 's;-m486;-march=i486;g' \ -e 's;-DZLIB;%{l_cppflags} -DZLIB;' \ @@ . patch -p0 <<'@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.6051 -r1.6052 news.txt --- openpkg-web/news.txt 6 Aug 2003 07:13:45 - 1.6051 +++ openpkg-web/news.txt 6 Aug 2003 08:52:43 - 1.6052 @@ -1,3 +1,4 @@ +06-Aug-2003: Upgraded package: P 06-Aug-2003: Upgraded package: P 06-Aug-2003: Upgraded package: P 06-Aug-2003: Upgraded package: P @@ . __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/openssl/ openssl.patch openssl.spec openpkg...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web Date: 20-Mar-2003 20:54:08 Branch: HEAD Handle: 2003032019540701 Modified files: openpkg-src/openssl openssl.patch openssl.spec openpkg-web news.txt Log: include OpenSSL security fix (OpenPKG-SA-2003.026-openssl) Summary: RevisionChanges Path 1.9 +56 -0 openpkg-src/openssl/openssl.patch 1.40+1 -1 openpkg-src/openssl/openssl.spec 1.3748 +1 -0 openpkg-web/news.txt patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r1.8 -r1.9 openssl.patch --- openpkg-src/openssl/openssl.patch 17 Mar 2003 14:30:21 - 1.8 +++ openpkg-src/openssl/openssl.patch 20 Mar 2003 19:54:08 - 1.9 @@ -75,3 +75,59 @@ } void RSA_set_default_method(const RSA_METHOD *meth) +Index: ssl/s3_srvr.c + +$ cvs diff -u -r1.104 -r1.105 s3_srvr.c +--- ssl/s3_srvr.c28 Feb 2003 15:37:10 - 1.104 ssl/s3_srvr.c19 Mar 2003 19:19:53 - 1.105 +@@ -1684,7 +1684,7 @@ + if (i != SSL_MAX_MASTER_KEY_LENGTH) + { + al=SSL_AD_DECODE_ERROR; +- SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_RSA_DECRYPT); ++/* SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_RSA_DECRYPT); */ + } + + if ((al == -1) && !((p[0] == (s->client_version>>8)) && (p[1] == (s->client_version & 0xff +@@ -1700,30 +1700,29 @@ + (p[0] == (s->version>>8)) && (p[1] == (s->version & 0xff + { + al=SSL_AD_DECODE_ERROR; +- SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); +-goto f_err; ++/* SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); */ ++ ++/* The Klima-Pokorny-Rosa extension of Bleichenbacher's attack ++ * (http://eprint.iacr.org/2003/052/) exploits the version ++ * number check as a "bad version oracle" -- an alert would ++ * reveal that the plaintext corresponding to some ciphertext ++ * made up by the adversary is properly formatted except ++ * that the version number is wrong. To avoid such attacks, ++ * we should treat this just like any other decryption error. */ ++p[0] = (char)(int) "CAN-2003-0131 patch 2003-03-20"; + } + } + + if (al != -1) + { +-#if 0 +-goto f_err; +-#else + /* Some decryption failure -- use random value instead as countermeasure + * against Bleichenbacher's attack on PKCS #1 v1.5 RSA padding +- * (see RFC 2246, section 7.4.7.1). +- * But note that due to length and protocol version checking, the +- * attack is impractical anyway (see section 5 in D. Bleichenbacher: +- * "Chosen Ciphertext Attacks Against Protocols Based on the RSA +- * Encryption Standard PKCS #1", CRYPTO '98, LNCS 1462, pp. 1-12). +- */ ++ * (see RFC 2246, section 7.4.7.1). */ + ERR_clear_error(); + i = SSL_MAX_MASTER_KEY_LENGTH; + p[0] = s->client_version >> 8; + p[1] = s->client_version & 0xff; + RAND_pseudo_bytes(p+2, i-2); /* should be RAND_bytes, but we cannot work around a failure */ +-#endif + } + + s->session->master_key_length= @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.spec $ cvs diff -u -r1.39 -r1.40 openssl.spec --- openpkg-src/openssl/openssl.spec 17 Mar 2003 14:30:21 - 1.39 +++ openpkg-src/openssl/openssl.spec 20 Mar 2003 19:54:08 - 1.40 @@ -33,7 +33,7 @@ Group:Cryptography
[CVS] OpenPKG: openpkg-src/openssl/ openssl.patch openssl.spec openpkg...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web Date: 17-Mar-2003 15:30:22 Branch: HEAD Handle: 2003031714302001 Added files: openpkg-src/openssl openssl.patch Modified files: openpkg-src/openssl openssl.spec openpkg-web news.txt Log: apply official OpenSSL RSA blinding security patch Summary: RevisionChanges Path 1.8 +77 -0 openpkg-src/openssl/openssl.patch 1.39+3 -1 openpkg-src/openssl/openssl.spec 1.3708 +1 -0 openpkg-web/news.txt patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r0 -r1.8 openssl.patch --- /dev/null 2003-03-17 15:30:22.0 +0100 +++ openssl.patch 2003-03-17 15:30:22.0 +0100 @@ -0,0 +1,77 @@ +Index: crypto/rsa/rsa_eay.c +=== +RCS file: /e/openssl/cvs/openssl/crypto/rsa/rsa_eay.c,v +retrieving revision 1.28.2.3 +diff -u -r1.28.2.3 rsa_eay.c +--- crypto/rsa/rsa_eay.c 30 Jan 2003 17:37:46 - 1.28.2.3 crypto/rsa/rsa_eay.c 16 Mar 2003 10:34:13 - +@@ -195,6 +195,25 @@ + return(r); + } + ++static int rsa_eay_blinding(RSA *rsa, BN_CTX *ctx) ++{ ++int ret = 1; ++CRYPTO_w_lock(CRYPTO_LOCK_RSA); ++/* Check again inside the lock - the macro's check is racey */ ++if(rsa->blinding == NULL) ++ret = RSA_blinding_on(rsa, ctx); ++CRYPTO_w_unlock(CRYPTO_LOCK_RSA); ++return ret; ++} ++ ++#define BLINDING_HELPER(rsa, ctx, err_instr) \ ++do { \ ++if(((rsa)->flags & RSA_FLAG_BLINDING) && \ ++((rsa)->blinding == NULL) && \ ++!rsa_eay_blinding(rsa, ctx)) \ ++err_instr \ ++} while(0) ++ + /* signing */ + static int RSA_eay_private_encrypt(int flen, const unsigned char *from, + unsigned char *to, RSA *rsa, int padding) +@@ -239,8 +258,8 @@ + goto err; + } + +-if ((rsa->flags & RSA_FLAG_BLINDING) && (rsa->blinding == NULL)) +-RSA_blinding_on(rsa,ctx); ++BLINDING_HELPER(rsa, ctx, goto err;); ++ + if (rsa->flags & RSA_FLAG_BLINDING) + if (!BN_BLINDING_convert(&f,rsa->blinding,ctx)) goto err; + +@@ -318,8 +337,8 @@ + goto err; + } + +-if ((rsa->flags & RSA_FLAG_BLINDING) && (rsa->blinding == NULL)) +-RSA_blinding_on(rsa,ctx); ++BLINDING_HELPER(rsa, ctx, goto err;); ++ + if (rsa->flags & RSA_FLAG_BLINDING) + if (!BN_BLINDING_convert(&f,rsa->blinding,ctx)) goto err; + +Index: crypto/rsa/rsa_lib.c +=== +RCS file: /e/openssl/cvs/openssl/crypto/rsa/rsa_lib.c,v +retrieving revision 1.30.2.2 +diff -u -r1.30.2.2 rsa_lib.c +--- crypto/rsa/rsa_lib.c 30 Jan 2003 17:37:46 - 1.30.2.2 crypto/rsa/rsa_lib.c 16 Mar 2003 10:34:13 - +@@ -72,7 +72,13 @@ + + RSA *RSA_new(void) + { +-return(RSA_new_method(NULL)); ++RSA *r=RSA_new_method(NULL); ++ ++#ifndef OPENSSL_NO_FORCE_RSA_BLINDING ++r->flags|=RSA_FLAG_BLINDING; ++#endif ++ ++return r; + } + + void RSA_set_default_method(const RSA_METHOD *meth) @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.spec $ cvs diff -u -r1.38 -r1.39 openssl.spec --- openpkg-src/openssl/openssl.spec 19 Feb 2003 14:03:47 - 1.38 +++ openpkg-src/openssl/openssl.spec 17 Mar 2003 14:30:21 - 1.39 @@ -33,10 +33,11 @@ Group:Cryptography License: BSD-style Version: 0.9.7a -Release: 20030219 +Release: 20030317 # list of sources Source0: ftp://ftp.openssl.org/source/openssl-%{version}.tar.gz +Patch0: openssl.patch # build information Prefix: %{l_prefix} @@ -57,6 +58,7 @@ %prep %setup -q +%patch -p0 %{l_shtool} subst -e 's;-m486;-march=i486;g' Configure %{l_shtool} subst -e 's;test "$OSTYPE" = msdosdjgpp;true;' util/point.sh @@ . patch -p0 <<'@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.3707 -r1.3708 news.txt --- openpkg-web/news.txt 17 Mar 200
[CVS] OpenPKG: openpkg-src/openssl/ openssl.patch openssl.spec openpkg...
OpenPKG CVS Repository http://cvs.openpkg.org/ Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-src openpkg-web Date: 31-Dec-2002 10:56:24 Branch: HEAD Handle: 2002123109562301 Modified files: openpkg-src/openssl openssl.spec openpkg-web news.txt Removed files: openpkg-src/openssl openssl.patch Log: Upgrade to OpenSSL 0.9.7! This is not a small upgrade as with the 0.9.6 versions, hence I performed a full rebuild-test of all packages which depend on "openssl". The result is promising: 1. packages which failed (I'll investigate): - w3m/w3m.spec (https://www.openssl.org/ -> Segmentation fault (core dumped)) - curl/curl.spec (conflicting types for `ENGINE') - imapd/imapd.spec ( Cannot continue without libsasl2. because of DES API changes in OpenSSL and hence sasl) - rdesktop/rdesktop.spec (/cw/include/openssl/bn.h:234: parse error before "BN_ULONG") 2. packages which failed, but not because of OpenSSL: . cadaver/cadaver.spec (multiple definition of `optarg') . cpu/cpu.spec (undefined reference to `ldap_init') . dsniff/dsniff.spec (`ETH_H' undeclared (first use in this function) 3. packages which compiles correctly: + apache/apache.spec + bind/bind.spec + c-client/c-client.spec + cfengine/cfengine.spec + easysoap/easysoap.spec + ethereal/ethereal.spec + exim/exim.spec (but: tls-openssl.c:343: warning: assignment from incompatible pointer type) + fetchmail/fetchmail.spec + inn/inn.spec + linc/linc.spec + links/links.spec + lynx/lynx.spec + mozilla/mozilla.spec + mutt/mutt.spec + neon/neon.spec + openldap/openldap.spec + openssh/openssh.spec + openvpn/openvpn.spec + perl-ssl/perl-ssl.spec + postfix/postfix.spec + postgresql/postgresql.spec + qpopper/qpopper.spec + samba/samba.spec + sasl/sasl.spec + scanssh/scanssh.spec + sendmail/sendmail.spec + siege/siege.spec + sitecopy/sitecopy.spec + snmp/snmp.spec + socat/socat.spec + stunnel/stunnel.spec + subversion/subversion.spec + sysmon/sysmon.spec + tcpdump/tcpdump.spec + wget/wget.spec Summary: RevisionChanges Path 1.7 +0 -31 openpkg-src/openssl/openssl.patch 1.35+7 -7 openpkg-src/openssl/openssl.spec 1.2475 +1 -0 openpkg-web/news.txt rm -f openpkg-src/openssl/openssl.patch <<'@@ .' Index: openpkg-src/openssl/openssl.patch [NO CHANGE SUMMARY BECAUSE FILE AS A WHOLE IS JUST REMOVED] @@ . patch -p0 <<'@@ .' Index: openpkg-src/openssl/openssl.spec $ cvs diff -u -r1.34 -r1.35 openssl.spec --- openpkg-src/openssl/openssl.spec 30 Dec 2002 22:05:39 - 1.34 +++ openpkg-src/openssl/openssl.spec 31 Dec 2002 09:56:24 - 1.35 @@ -32,18 +32,17 @@ Distribution: OpenPKG [CORE] Group:Cryptography License: BSD-style -Version: 0.9.6h -Release: 20021209 +Version: 0.9.7 +Release: 20021231 # list of sources Source0: ftp://ftp.openssl.org/source/openssl-%{version}.tar.gz -Patch0: openssl.patch # build information Prefix: %{l_prefix} BuildRoot:%{l_buildroot} -BuildPreReq: OpenPKG, openpkg >= 20020206, perl, make, gcc -PreReq: OpenPKG, openpkg >= 20020206 +BuildPreReq: OpenPKG, openpkg >= 20021230, perl, make, gcc +PreReq: OpenPKG, openpkg >= 20021230 AutoReq: no AutoReqProv: no @@ -60,8 +59,8 @@ %prep %setup -q -%patch0 -p0 %{l_shtool} subst -e 's;-m486;-march=i486;g' Configure +%{l_shtool} subst -e 's;test "$OSTYPE" = msdosdjgpp;true;' util/point.sh %build %{l_prefix}/bin/perl util/perlpath.pl %{l_prefix}/bin/perl @@ -91,7 +90,8 @@ done ) %{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT \ %{l_files_std} \ -'%config %{l_prefix}/etc/openssl/openssl.cnf' +'%config %{l_prefix}/etc/openssl/openssl.cnf' \ +'%not %dir %{l_prefix}/lib/pkgconfig' %files -f files @@ . patch -p0 <<'@@ .' Index: openpkg-web/news.txt $ cvs diff -u -r1.2474 -r1.2475 news.txt --- openpkg-web/news.txt 31 Dec 2002 09:52:11 -
[CVS] OpenPKG: openpkg-src/openssl openssl.patch openssl.spec openpkg-...
OpenPKG CVS Repository http://www.openpkg.org/cvsweb/cvsweb.cgi Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web, openpkg-src Date: 30-Jul-2002 15:02:31 Branch: HEAD Handle: 2002073014023001 Modified files: openpkg-src/openssl openssl.patch openssl.spec openpkg-web news.txt Log: upgrade to security fixed version Summary: RevisionChanges Path 1.4 +0 -85 openpkg-src/openssl/openssl.patch 1.24+4 -5 openpkg-src/openssl/openssl.spec 1.1068 +1 -0 openpkg-web/news.txt Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r1.3 -r1.4 openssl.patch --- openpkg-src/openssl/openssl.patch 30 Jun 2002 08:21:56 - 1.3 +++ openpkg-src/openssl/openssl.patch 30 Jul 2002 13:02:31 - 1.4 @@ -1,18 +1,5 @@ --- config.orig Fri Mar 15 17:47:23 2002 +++ config Sat Jun 29 09:55:45 2002 -@@ -381,9 +381,11 @@ - - # figure out if gcc is available and if so we use it otherwise - # we fallback to whatever cc does on the system --GCCVER=`(gcc --version) 2>/dev/null` -+GCCVER=`(gcc --version) 2>/dev/null | head -1` - if [ "$GCCVER" != "" ]; then - CC=gcc -+ # then strip off whatever prefix GCC 3.1 and higher prepends the number with... -+ GCCVER=`echo $GCCVER | sed 's/^gcc (GCC) //'` - # then strip off whatever prefix Cygnus prepends the number with... - GCCVER=`echo $GCCVER | sed 's/^[a-z]*\-//'` - # peak single digit before and after first dot, e.g. 2.95.1 gives 29 @@ -562,6 +564,7 @@ *-freebsd[1-2]*) OUT="FreeBSD" ;; *86*-*-netbsd) OUT="NetBSD-x86" ;; @@ -23,45 +10,6 @@ alpha*-*-openbsd) OUT="OpenBSD-alpha" ;; --- Configure.orig Fri May 10 01:05:49 2002 +++ ConfigureSat Jun 29 09:56:35 2002 -@@ -119,10 +119,10 @@ - "debug-ben-debug", "gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -g3 -O2 -pedantic -Wall -Wshadow -Werror -pipe::(unknown):", - "debug-ben-strict", "gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DCONST_STRICT -O2 -Wall -Wshadow -Werror -Wpointer-arith -Wcast-qual -Wwrite-strings -pipe::(unknown):", - "debug-rse","cc:-DTERMIOS -DL_ENDIAN -pipe -O -g -ggdb3 -Wall::(unknown)::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}", --"debug-bodo", "gcc:-DL_ENDIAN -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -DPEDANTIC -DBIO_PAIR_DEBUG -g -m486 -pedantic -Wshadow -Wall::-D_REENTRANT::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}", --"debug-ulf","gcc:-DL_ENDIAN -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -DPEDANTIC -g -O2 -m486 -Wall -Werror -Wshadow -pipe::-D_REENTRANT::${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}", --"debug-steve", "gcc:-DL_ENDIAN -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DDEBUG_SAFESTACK -DCRYPTO_MDEBUG_ALL -DPEDANTIC -g -O2 -m486 -pedantic -Wall -Werror -Wshadow -pipe::-D_REENTRANT::${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}", --"debug-levitte-linux-elf","gcc:-DUSE_ALLOCATING_PRINT -DRL_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DNO_ASM -DL_ENDIAN -DTERMIO -D_POSIX_SOURCE -ggdb -g3 -m486 -pedantic -ansi -Wall -Wshadow -Wid-clash-31 -pipe::-D_REENTRANT:-ldl:::dlfcn", -+"debug-bodo", "gcc:-DL_ENDIAN -DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -DPEDANTIC -DBIO_PAIR_DEBUG -g -march=i486 -pedantic -Wshadow -Wall::-D_REENTRANT::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}", -+"debug-ulf","gcc:-DL_ENDIAN -DREF_CHECK -DCONF_DEBUG -DBN_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG_ALL -DPEDANTIC -g -O2 -march=i486 -Wall -Werror -Wshadow -pipe::-D_REENTRANT::${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}", -+"debug-steve", "gcc:-DL_ENDIAN -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DDEBUG_SAFESTACK -DCRYPTO_MDEBUG_ALL -DPEDANTIC -g -O2 -march=i486 -pedantic -Wall -Werror -Wshadow -pipe::-D_REENTRANT::${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}", -+"debug-levitte-linux-elf","gcc:-DUSE_ALLOCATING_PRINT -DRL_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DNO_ASM -DL_ENDIAN -DTERMIO -D_POSIX_SOURCE -ggdb -g3 -march=i486 -pedantic -ansi -Wall -Wshadow -Wid-clash-31 -pipe::-D_REENTRANT:-ldl:::dlfcn", - "dist", "cc:-O::(unknown):", - - # Basic configs that should work on any (32 and less bit) box -@@ -135,7 +135,7 @@ - # surrounds it with #APP #NO_APP comment pair which (at least
[CVS] OpenPKG: openpkg-src/openssl openssl.patch openssl.spec openpkg-...
OpenPKG CVS Repository http://www.openpkg.org/cvsweb/cvsweb.cgi Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web, openpkg-src Date: 30-Jun-2002 10:21:56 Branch: HEAD Handle: 2002063009215501 Modified files: openpkg-src/openssl openssl.patch openssl.spec openpkg-web news.txt Log: finally fix support for sparc64-NetBSD Summary: RevisionChanges Path 1.3 +1 -1 openpkg-src/openssl/openssl.patch 1.22+1 -1 openpkg-src/openssl/openssl.spec 1.854 +1 -0 openpkg-web/news.txt Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r1.2 -r1.3 openssl.patch --- openpkg-src/openssl/openssl.patch 29 Jun 2002 07:59:53 - 1.2 +++ openpkg-src/openssl/openssl.patch 30 Jun 2002 08:21:56 - 1.3 @@ -66,7 +66,7 @@ "linux-s390x", "gcc:-DB_ENDIAN -DTERMIO -DNO_ASM -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::SIXTY_FOUR_BIT_LONG:::linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", "linux-ia64", "gcc:-DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT:-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK RC4_CHAR:asm/ia64.o:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", "NetBSD-sparc", "gcc:-DTERMIOS -O3 -fomit-frame-pointer -mv8 -Wall -DB_ENDIAN::(unknown)::BN_LLONG MD2_CHAR RC4_INDEX DES_UNROLL::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", -+"NetBSD-sparc64","gcc:-DTERMIOS -O3 -fomit-frame-pointer -m64 -mcpu=v9 -Wall -DB_ENDIAN::(unknown)::BN_LLONG MD2_CHAR RC4_INDEX DES_UNROLL::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", ++"NetBSD-sparc64","gcc:-DTERMIOS -O3 -fomit-frame-pointer -m64 -mcpu=v9 -Wall -DB_ENDIAN::(unknown)::SIXTY_FOUR_BIT_LONG DES_INT DES_PTR DES_RISC1::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", "NetBSD-m68", "gcc:-DTERMIOS -O3 -fomit-frame-pointer -Wall -DB_ENDIAN::(unknown)::BN_LLONG MD2_CHAR RC4_INDEX DES_UNROLL::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", -"NetBSD-x86", "gcc:-DTERMIOS -O3 -fomit-frame-pointer -m486 -Wall::(unknown)::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", -"FreeBSD-elf", "gcc:-DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O3 -m486 -Wall::-pthread -D_REENTRANT -D_THREAD_SAFE -D_THREADSAFE::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", Index: openpkg-src/openssl/openssl.spec $ cvs diff -u -r1.21 -r1.22 openssl.spec --- openpkg-src/openssl/openssl.spec 29 Jun 2002 07:59:53 - 1.21 +++ openpkg-src/openssl/openssl.spec 30 Jun 2002 08:21:56 - 1.22 @@ -33,7 +33,7 @@ Group:Cryptography License: BSD-style Version: 0.9.6d -Release: 20020628 +Release: 20020630 # list of sources Source0: ftp://ftp.openssl.org/source/%{name}-%{version}.tar.gz Index: openpkg-web/news.txt $ cvs diff -u -r1.853 -r1.854 news.txt --- openpkg-web/news.txt 30 Jun 2002 07:34:49 - 1.853 +++ openpkg-web/news.txt 30 Jun 2002 08:21:55 - 1.854 @@ -1,3 +1,4 @@ +30-Jun-2002: Upgraded package: P 30-Jun-2002: Upgraded package: P 29-Jun-2002: Upgraded package: P 29-Jun-2002: New package: P __ The OpenPKG Projectwww.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]
[CVS] OpenPKG: openpkg-src/openssl openssl.patch openssl.spec openpkg-...
OpenPKG CVS Repository http://www.openpkg.org/cvsweb/cvsweb.cgi Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web, openpkg-src Date: 29-Jun-2002 09:59:53 Branch: HEAD Handle: 2002062908595201 Modified files: openpkg-src/openssl openssl.patch openssl.spec openpkg-web news.txt Log: add support for sparc64-NetBSD-1.6 Summary: RevisionChanges Path 1.2 +17 -7 openpkg-src/openssl/openssl.patch 1.21+1 -1 openpkg-src/openssl/openssl.spec 1.850 +1 -0 openpkg-web/news.txt Index: openpkg-src/openssl/openssl.patch $ cvs diff -u -r1.1 -r1.2 openssl.patch --- openpkg-src/openssl/openssl.patch 22 Jun 2002 22:18:30 - 1.1 +++ openpkg-src/openssl/openssl.patch 29 Jun 2002 07:59:53 - 1.2 @@ -1,5 +1,5 @@ --- config.orig Fri Mar 15 17:47:23 2002 -+++ config Tue Jun 4 09:00:37 2002 config Sat Jun 29 09:55:45 2002 @@ -381,9 +381,11 @@ # figure out if gcc is available and if so we use it otherwise @@ -13,8 +13,16 @@ # then strip off whatever prefix Cygnus prepends the number with... GCCVER=`echo $GCCVER | sed 's/^[a-z]*\-//'` # peak single digit before and after first dot, e.g. 2.95.1 gives 29 Configure.orig Tue Jun 4 09:06:27 2002 -+++ ConfigureTue Jun 4 09:08:36 2002 +@@ -562,6 +564,7 @@ + *-freebsd[1-2]*) OUT="FreeBSD" ;; + *86*-*-netbsd) OUT="NetBSD-x86" ;; + sun3*-*-netbsd) OUT="NetBSD-m68" ;; ++ sparc64-*-netbsd) OUT="NetBSD-sparc64" ;; + *-*-netbsd) OUT="NetBSD-sparc" ;; + *86*-*-openbsd) OUT="OpenBSD-x86" ;; + alpha*-*-openbsd) OUT="OpenBSD-alpha" ;; +--- Configure.orig Fri May 10 01:05:49 2002 ConfigureSat Jun 29 09:56:35 2002 @@ -119,10 +119,10 @@ "debug-ben-debug", "gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DPEDANTIC -DDEBUG_SAFESTACK -g3 -O2 -pedantic -Wall -Wshadow -Werror -pipe::(unknown):", "debug-ben-strict", "gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DBN_CTX_DEBUG -DCRYPTO_MDEBUG -DCONST_STRICT -O2 -Wall -Wshadow -Werror -Wpointer-arith -Wcast-qual -Wwrite-strings -pipe::(unknown):", @@ -54,9 +62,11 @@ "linux-mipsel", "gcc:-DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::(unknown)::BN_LLONG:::", "linux-mips", "gcc:-DB_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::(unknown)::BN_LLONG:::", "linux-ppc","gcc:-DB_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT:-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_RISC1 DES_UNROLL::dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", -@@ -347,11 +347,11 @@ +@@ -346,12 +346,13 @@ + "linux-s390x", "gcc:-DB_ENDIAN -DTERMIO -DNO_ASM -O3 -fomit-frame-pointer -Wall::-D_REENTRANT::SIXTY_FOUR_BIT_LONG:::linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", "linux-ia64", "gcc:-DL_ENDIAN -DTERMIO -O3 -fomit-frame-pointer -Wall::-D_REENTRANT:-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK RC4_CHAR:asm/ia64.o:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", "NetBSD-sparc", "gcc:-DTERMIOS -O3 -fomit-frame-pointer -mv8 -Wall -DB_ENDIAN::(unknown)::BN_LLONG MD2_CHAR RC4_INDEX DES_UNROLL::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", ++"NetBSD-sparc64","gcc:-DTERMIOS -O3 -fomit-frame-pointer -m64 -mcpu=v9 -Wall -DB_ENDIAN::(unknown)::BN_LLONG MD2_CHAR RC4_INDEX DES_UNROLL::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", "NetBSD-m68", "gcc:-DTERMIOS -O3 -fomit-frame-pointer -Wall -DB_ENDIAN::(unknown)::BN_LLONG MD2_CHAR RC4_INDEX DES_UNROLL::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", -"NetBSD-x86", "gcc:-DTERMIOS -O3 -fomit-frame-pointer -m486 -Wall::(unknown)::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}::dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", -"FreeBSD-elf", "gcc:-DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O3 -m486 -Wall::-pthread -D_REENTRANT -D_THREAD_SAFE -D_THREADSAFE::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:${x86_elf_asm}:dlfcn:bsd-gcc-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", @@ -71,7 +81,7 @@ "nextstep", "cc:-O -Wall::(unknown)::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:::", "nextstep3.3", "cc:-O3 -Wall::(unknown)::BN_LLONG ${x86_gcc_des} ${x86_gcc_opts}:::", # NCR MP-RAS UNIX ver 02.03.01 -@@ -379,7 +379,7 @@ +@@ -379,7 +380,7 @@ "unixware-7","cc:-O -DFILIO_H -Kalloca::-Kthread:-lsocket -lnsl:BN_LLONG MD2_CHAR RC4_INDEX ${x86_gc