SF.net SVN: gar:[26303] csw/mgar/pkg/openssl1/branches/lts102
janholzh at users.sourceforge.net
janholzh at users.sourceforge.net
Fri Dec 8 09:52:56 CET 2017
Revision: 26303
http://sourceforge.net/p/gar/code/26303
Author: janholzh
Date: 2017-12-08 08:52:10 +0000 (Fri, 08 Dec 2017)
Log Message:
-----------
openssl1/branches/lts102: update to 1.0.2n
Modified Paths:
--------------
csw/mgar/pkg/openssl1/branches/lts102/Makefile
csw/mgar/pkg/openssl1/branches/lts102/checksums
csw/mgar/pkg/openssl1/branches/lts102/files/029-fork_safe.patch
Removed Paths:
-------------
csw/mgar/pkg/openssl1/branches/lts102/files/0018-PRE-29_Patch_do_to_code_change.patch
Modified: csw/mgar/pkg/openssl1/branches/lts102/Makefile
===================================================================
--- csw/mgar/pkg/openssl1/branches/lts102/Makefile 2017-11-30 09:49:24 UTC (rev 26302)
+++ csw/mgar/pkg/openssl1/branches/lts102/Makefile 2017-12-08 08:52:10 UTC (rev 26303)
@@ -13,7 +13,7 @@
###### Package information #######
NAME = openssl
-VERSION = 1.0.2m
+VERSION = 1.0.2n
GARTYPE = v2
# Since version 1.0.0, soname is fixed and does not follow the minor releases
SONAME=1.0.0
@@ -166,7 +166,6 @@
# Patches taken form oracle
-PATCHFILES += 0018-PRE-29_Patch_do_to_code_change.patch
PATCHFILES += 029-fork_safe.patch
PATCHFILES += 032-aes_cbc_len_check.patch
PATCHFILES += 036-evp_leak.patch
Modified: csw/mgar/pkg/openssl1/branches/lts102/checksums
===================================================================
--- csw/mgar/pkg/openssl1/branches/lts102/checksums 2017-11-30 09:49:24 UTC (rev 26302)
+++ csw/mgar/pkg/openssl1/branches/lts102/checksums 2017-12-08 08:52:10 UTC (rev 26303)
@@ -1 +1 @@
-10e9e37f492094b9ef296f68f24a7666 openssl-1.0.2m.tar.gz
+13bdc1b1d1ff39b6fd42a255e74676a4 openssl-1.0.2n.tar.gz
Deleted: csw/mgar/pkg/openssl1/branches/lts102/files/0018-PRE-29_Patch_do_to_code_change.patch
===================================================================
--- csw/mgar/pkg/openssl1/branches/lts102/files/0018-PRE-29_Patch_do_to_code_change.patch 2017-11-30 09:49:24 UTC (rev 26302)
+++ csw/mgar/pkg/openssl1/branches/lts102/files/0018-PRE-29_Patch_do_to_code_change.patch 2017-12-08 08:52:10 UTC (rev 26303)
@@ -1,26 +0,0 @@
-From 6945a594cda4f1198f3ceee20d344e6728f925ce Mon Sep 17 00:00:00 2001
-From: Jan Holzhueter <jh at opencsw.org>
-Date: Fri, 3 Nov 2017 10:05:18 +0100
-Subject: [PATCH] PRE-29_Patch_do_to_code_change
-
----
- crypto/cryptlib.c | 3 ---
- 1 file changed, 3 deletions(-)
-
-diff --git a/crypto/cryptlib.c b/crypto/cryptlib.c
-index 5fab45b..9de694f 100644
---- a/crypto/cryptlib.c
-+++ b/crypto/cryptlib.c
-@@ -478,9 +478,6 @@ int CRYPTO_THREADID_set_callback(void (*func) (CRYPTO_THREADID *))
- if (threadid_callback)
- return 0;
- threadid_callback = func;
--#ifdef OPENSSL_FIPS
-- FIPS_crypto_threadid_set_callback(func);
--#endif
- return 1;
- }
-
---
-2.4.0
-
Modified: csw/mgar/pkg/openssl1/branches/lts102/files/029-fork_safe.patch
===================================================================
--- csw/mgar/pkg/openssl1/branches/lts102/files/029-fork_safe.patch 2017-11-30 09:49:24 UTC (rev 26302)
+++ csw/mgar/pkg/openssl1/branches/lts102/files/029-fork_safe.patch 2017-12-08 08:52:10 UTC (rev 26303)
@@ -188,7 +188,7 @@
void CRYPTO_set_locking_callback(void (*func) (int mode, int type,
const char *file, int line))
{
-@@ -410,7 +541,11 @@
+@@ -410,7 +543,11 @@
* started.
*/
OPENSSL_init();
@@ -201,7 +201,7 @@
}
void CRYPTO_set_add_lock_callback(int (*func) (int *num, int mount, int type,
-@@ -471,9 +606,10 @@
+@@ -471,12 +608,10 @@
int CRYPTO_THREADID_set_callback(void (*func) (CRYPTO_THREADID *))
{
@@ -208,25 +208,47 @@
- if (threadid_callback)
- return 0;
- threadid_callback = func;
+-#ifdef OPENSSL_FIPS
+- FIPS_crypto_threadid_set_callback(func);
+-#endif
+ /*
-+ * Use the backup method (the address of 'errno') to identify the
-+ * thread and disallow setting the threadid callback.
++ * Setting a threadid callback is no longer allowed; the compiled-in
++ * platform-specific default is always used.
+ */
return 1;
}
-@@ -529,7 +665,10 @@
+@@ -503,7 +641,7 @@
+ CRYPTO_THREADID_set_numeric(id, (unsigned long)find_thread(NULL));
+ #else
+- /* For everything else, default to using the address of 'errno' */
+- CRYPTO_THREADID_set_pointer(id, (void *)&errno);
++ /* For everything else, default to using pthread_self() */
++ CRYPTO_THREADID_set_numeric(id, (unsigned long)pthread_self());
+ #endif
+ }
+@@ -529,7 +667,10 @@
+
void CRYPTO_set_id_callback(unsigned long (*func) (void))
{
- id_callback = func;
+ /*
-+ * Use the backup method to identify the thread/process.
-+ * Setting the id callback is disallowed.
++ * Setting a threadid callback is no longer allowed; the compiled-in
++ * platform-specific default is always used.
+ */
}
unsigned long CRYPTO_thread_id(void)
+@@ -546,7 +687,7 @@
+ # elif defined(OPENSSL_SYS_BEOS)
+ ret = (unsigned long)find_thread(NULL);
+ # else
+- ret = (unsigned long)getpid();
++ ret = (unsigned long)pthread_self();
+ # endif
+ } else
+ ret = id_callback();
--- openssl-1.0.1f/crypto/cryptlib.h.~1~ Fri Feb 7 10:41:42 2014
+++ openssl-1.0.1f/crypto/cryptlib.h Thu Feb 6 16:04:16 2014
@@ -104,6 +104,8 @@
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
More information about the devel
mailing list