This is an automated email from the git hooks/post-receive script.

grinorcole-guest pushed a commit to branch master
in repository libcrypt-openssl-pkcs12-perl.

commit 74352d867c315dcf5c45157049fcb6554263d97e
Author: Christopher Hoskin <christopher.hos...@gmail.com>
Date:   Sun Nov 6 20:34:30 2016 +0000

    Fix "FTBFS with openssl 1.1.0" - patch for new API (Closes: #828386)
---
 debian/changelog                 |  6 ++++
 debian/patches/openssl-1.1.patch | 67 ++++++++++++++++++++++++++++++++++++++++
 debian/patches/series            |  1 +
 3 files changed, 74 insertions(+)

diff --git a/debian/changelog b/debian/changelog
index 9bbdc6d..759cee6 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,9 @@
+libcrypt-openssl-pkcs12-perl (0.7-2) UNRELEASED; urgency=medium
+
+  * Fix "FTBFS with openssl 1.1.0" - patch for new API (Closes: #828386)
+
+ -- Christopher Hoskin <christopher.hos...@gmail.com>  Sun, 06 Nov 2016 
20:32:29 +0000
+
 libcrypt-openssl-pkcs12-perl (0.7-1) unstable; urgency=low
 
   * New upstream release (0.7)
diff --git a/debian/patches/openssl-1.1.patch b/debian/patches/openssl-1.1.patch
new file mode 100644
index 0000000..6e74790
--- /dev/null
+++ b/debian/patches/openssl-1.1.patch
@@ -0,0 +1,67 @@
+Description: Compatibility with OpenSSL 1.1.0
+Bug: https://github.com/dsully/perl-crypt-openssl-pkcs12/issues/8
+Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=828386
+Forwarded: https://github.com/dsully/perl-crypt-openssl-pkcs12/pull/10
+Author: Christopher Hoskin <christopher.hos...@gmail.com>
+Last-Update: 2016-11-06
+--- a/PKCS12.xs
++++ b/PKCS12.xs
+@@ -149,18 +149,18 @@
+ int dump_certs_pkeys_bag (BIO *bio, PKCS12_SAFEBAG *bag, char *pass, int 
passlen, int options, char *pempass) {
+ 
+   EVP_PKEY *pkey;
+-  PKCS8_PRIV_KEY_INFO *p8;
+   X509 *x509;
+ 
+   switch (M_PKCS12_bag_type(bag)) {
+ 
+-    case NID_keyBag:
++    case NID_keyBag: ;
++      const PKCS8_PRIV_KEY_INFO *cp8;
+ 
+       if (options & NOKEYS) return 1;
+ 
+-      p8 = bag->value.keybag;
++      cp8 = PKCS12_SAFEBAG_get0_p8inf(bag);
+ 
+-      if (!(pkey = EVP_PKCS82PKEY (p8))) return 0;
++      if (!(pkey = EVP_PKCS82PKEY (cp8))) return 0;
+ 
+       PEM_write_bio_PrivateKey (bio, pkey, enc, NULL, 0, NULL, pempass);
+ 
+@@ -168,7 +168,8 @@
+ 
+       break;
+ 
+-    case NID_pkcs8ShroudedKeyBag:
++    case NID_pkcs8ShroudedKeyBag: ;
++      PKCS8_PRIV_KEY_INFO *p8;
+ 
+       if (options & NOKEYS) return 1;
+ 
+@@ -192,7 +193,7 @@
+ 
+       if (options & NOCERTS) return 1;
+ 
+-      if (PKCS12_get_attr(bag, NID_localKeyID)) {
++      if (PKCS12_SAFEBAG_get0_attr(bag, NID_localKeyID)) {
+ 
+         if (options & CACERTS) return 1;
+ 
+@@ -203,7 +204,7 @@
+ 
+       if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate) return 1;
+ 
+-      if (!(x509 = M_PKCS12_certbag2x509(bag))) return 0;
++      if (!(x509 = PKCS12_certbag2x509(bag))) return 0;
+ 
+       PEM_write_bio_X509 (bio, x509);
+ 
+@@ -368,7 +369,6 @@
+ 
+   CRYPTO_cleanup_all_ex_data();
+   ERR_free_strings();
+-  ERR_remove_state(0);
+   EVP_cleanup();
+ 
+ SV*
diff --git a/debian/patches/series b/debian/patches/series
new file mode 100644
index 0000000..5505fc5
--- /dev/null
+++ b/debian/patches/series
@@ -0,0 +1 @@
+openssl-1.1.patch

-- 
Alioth's /usr/local/bin/git-commit-notice on 
/srv/git.debian.org/git/pkg-perl/packages/libcrypt-openssl-pkcs12-perl.git

_______________________________________________
Pkg-perl-cvs-commits mailing list
Pkg-perl-cvs-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-perl-cvs-commits

Reply via email to