diff options
author | bobsayshilol <bobsayshilol@live.co.uk> | 2018-11-07 23:45:17 +0000 |
---|---|---|
committer | bobsayshilol <bobsayshilol@live.co.uk> | 2018-11-07 23:45:17 +0000 |
commit | 34394e7ee024d2b88bed9c61b9a19bba6ec5e49e (patch) | |
tree | 38dc244b7011d3e16b240857d3bdafc57723cc63 | |
parent | d826f2dfc13d08c7c69fed7ecc28aed7443e81f7 (diff) | |
download | portable-34394e7ee024d2b88bed9c61b9a19bba6ec5e49e.tar.gz portable-34394e7ee024d2b88bed9c61b9a19bba6ec5e49e.tar.bz2 portable-34394e7ee024d2b88bed9c61b9a19bba6ec5e49e.zip |
Misc fixes to bring portable in line with upstream.
-rw-r--r-- | crypto/CMakeLists.txt | 2 | ||||
-rw-r--r-- | crypto/Makefile.am | 2 | ||||
-rw-r--r-- | patches/aeadtest.c.patch | 2 | ||||
-rw-r--r-- | patches/bio.h.patch | 4 | ||||
-rw-r--r-- | patches/http.c.patch | 12 | ||||
-rw-r--r-- | patches/netcat.c.patch | 40 | ||||
-rw-r--r-- | patches/ocsp_test.c.patch | 2 | ||||
-rw-r--r-- | patches/tls_internal.h.patch | 12 | ||||
-rw-r--r-- | patches/tlsexttest.c.patch | 14 | ||||
-rw-r--r-- | ssl/CMakeLists.txt | 5 | ||||
-rw-r--r-- | ssl/Makefile.am | 5 | ||||
-rwxr-xr-x | update.sh | 2 |
12 files changed, 29 insertions, 73 deletions
diff --git a/crypto/CMakeLists.txt b/crypto/CMakeLists.txt index ed85a11..acbbe55 100644 --- a/crypto/CMakeLists.txt +++ b/crypto/CMakeLists.txt | |||
@@ -120,7 +120,6 @@ set( | |||
120 | aes/aes_wrap.c | 120 | aes/aes_wrap.c |
121 | asn1/a_bitstr.c | 121 | asn1/a_bitstr.c |
122 | asn1/a_bool.c | 122 | asn1/a_bool.c |
123 | asn1/a_bytes.c | ||
124 | asn1/a_d2i_fp.c | 123 | asn1/a_d2i_fp.c |
125 | asn1/a_digest.c | 124 | asn1/a_digest.c |
126 | asn1/a_dup.c | 125 | asn1/a_dup.c |
@@ -131,7 +130,6 @@ set( | |||
131 | asn1/a_object.c | 130 | asn1/a_object.c |
132 | asn1/a_octet.c | 131 | asn1/a_octet.c |
133 | asn1/a_print.c | 132 | asn1/a_print.c |
134 | asn1/a_set.c | ||
135 | asn1/a_sign.c | 133 | asn1/a_sign.c |
136 | asn1/a_strex.c | 134 | asn1/a_strex.c |
137 | asn1/a_strnid.c | 135 | asn1/a_strnid.c |
diff --git a/crypto/Makefile.am b/crypto/Makefile.am index 3073342..864b2d3 100644 --- a/crypto/Makefile.am +++ b/crypto/Makefile.am | |||
@@ -237,7 +237,6 @@ noinst_HEADERS += aes/aes_locl.h | |||
237 | # asn1 | 237 | # asn1 |
238 | libcrypto_la_SOURCES += asn1/a_bitstr.c | 238 | libcrypto_la_SOURCES += asn1/a_bitstr.c |
239 | libcrypto_la_SOURCES += asn1/a_bool.c | 239 | libcrypto_la_SOURCES += asn1/a_bool.c |
240 | libcrypto_la_SOURCES += asn1/a_bytes.c | ||
241 | libcrypto_la_SOURCES += asn1/a_d2i_fp.c | 240 | libcrypto_la_SOURCES += asn1/a_d2i_fp.c |
242 | libcrypto_la_SOURCES += asn1/a_digest.c | 241 | libcrypto_la_SOURCES += asn1/a_digest.c |
243 | libcrypto_la_SOURCES += asn1/a_dup.c | 242 | libcrypto_la_SOURCES += asn1/a_dup.c |
@@ -248,7 +247,6 @@ libcrypto_la_SOURCES += asn1/a_mbstr.c | |||
248 | libcrypto_la_SOURCES += asn1/a_object.c | 247 | libcrypto_la_SOURCES += asn1/a_object.c |
249 | libcrypto_la_SOURCES += asn1/a_octet.c | 248 | libcrypto_la_SOURCES += asn1/a_octet.c |
250 | libcrypto_la_SOURCES += asn1/a_print.c | 249 | libcrypto_la_SOURCES += asn1/a_print.c |
251 | libcrypto_la_SOURCES += asn1/a_set.c | ||
252 | libcrypto_la_SOURCES += asn1/a_sign.c | 250 | libcrypto_la_SOURCES += asn1/a_sign.c |
253 | libcrypto_la_SOURCES += asn1/a_strex.c | 251 | libcrypto_la_SOURCES += asn1/a_strex.c |
254 | libcrypto_la_SOURCES += asn1/a_strnid.c | 252 | libcrypto_la_SOURCES += asn1/a_strnid.c |
diff --git a/patches/aeadtest.c.patch b/patches/aeadtest.c.patch index ce62107..09838bc 100644 --- a/patches/aeadtest.c.patch +++ b/patches/aeadtest.c.patch | |||
@@ -1,6 +1,6 @@ | |||
1 | --- tests/aeadtest.c.orig 2016-10-18 17:03:33.845870889 +0900 | 1 | --- tests/aeadtest.c.orig 2016-10-18 17:03:33.845870889 +0900 |
2 | +++ tests/aeadtest.c 2016-10-18 17:11:19.880841283 +0900 | 2 | +++ tests/aeadtest.c 2016-10-18 17:11:19.880841283 +0900 |
3 | @@ -75,6 +75,12 @@ | 3 | @@ -76,6 +76,12 @@ |
4 | 4 | ||
5 | #define BUF_MAX 1024 | 5 | #define BUF_MAX 1024 |
6 | 6 | ||
diff --git a/patches/bio.h.patch b/patches/bio.h.patch index 7212b54..9bfd43a 100644 --- a/patches/bio.h.patch +++ b/patches/bio.h.patch | |||
@@ -1,6 +1,6 @@ | |||
1 | --- include/openssl/bio.h.orig Mon Oct 3 06:09:28 2016 | 1 | --- include/openssl/bio.h.orig Mon Oct 3 06:09:28 2016 |
2 | +++ include/openssl/bio.h Sun Nov 6 04:24:57 2016 | 2 | +++ include/openssl/bio.h Sun Nov 6 04:24:57 2016 |
3 | @@ -678,8 +678,24 @@ | 3 | @@ -713,8 +713,24 @@ |
4 | 4 | ||
5 | /*long BIO_ghbn_ctrl(int cmd,int iarg,char *parg);*/ | 5 | /*long BIO_ghbn_ctrl(int cmd,int iarg,char *parg);*/ |
6 | 6 | ||
@@ -25,7 +25,7 @@ | |||
25 | __attribute__((__format__(__printf__, 2, 3), __nonnull__(2))); | 25 | __attribute__((__format__(__printf__, 2, 3), __nonnull__(2))); |
26 | int | 26 | int |
27 | BIO_vprintf(BIO *bio, const char *format, va_list args) | 27 | BIO_vprintf(BIO *bio, const char *format, va_list args) |
28 | @@ -692,6 +708,8 @@ | 28 | @@ -727,6 +743,8 @@ |
29 | BIO_vsnprintf(char *buf, size_t n, const char *format, va_list args) | 29 | BIO_vsnprintf(char *buf, size_t n, const char *format, va_list args) |
30 | __attribute__((__deprecated__, __format__(__printf__, 3, 0), | 30 | __attribute__((__deprecated__, __format__(__printf__, 3, 0), |
31 | __nonnull__(3))); | 31 | __nonnull__(3))); |
diff --git a/patches/http.c.patch b/patches/http.c.patch deleted file mode 100644 index 0e620cf..0000000 --- a/patches/http.c.patch +++ /dev/null | |||
@@ -1,12 +0,0 @@ | |||
1 | --- apps/ocspcheck/http.c.orig Sun Jun 4 00:45:29 2017 | ||
2 | +++ apps/ocspcheck/http.c Sun Jun 4 00:45:57 2017 | ||
3 | @@ -35,7 +35,9 @@ | ||
4 | #include "http.h" | ||
5 | #include <tls.h> | ||
6 | |||
7 | +#ifndef DEFAULT_CA_FILE | ||
8 | #define DEFAULT_CA_FILE "/etc/ssl/cert.pem" | ||
9 | +#endif | ||
10 | |||
11 | /* | ||
12 | * A buffer for transferring HTTP/S data. | ||
diff --git a/patches/netcat.c.patch b/patches/netcat.c.patch index 35f88db..2965ea7 100644 --- a/patches/netcat.c.patch +++ b/patches/netcat.c.patch | |||
@@ -1,16 +1,6 @@ | |||
1 | --- apps/nc/netcat.c.orig Mon Jul 17 06:06:51 2017 | 1 | --- apps/nc/netcat.c.orig Mon Jul 17 06:06:51 2017 |
2 | +++ apps/nc/netcat.c Mon Jul 17 06:11:24 2017 | 2 | +++ apps/nc/netcat.c Mon Jul 17 06:11:24 2017 |
3 | @@ -66,7 +66,9 @@ | 3 | @@ -92,9 +92,13 @@ |
4 | #define POLL_NETIN 2 | ||
5 | #define POLL_STDOUT 3 | ||
6 | #define BUFSIZE 16384 | ||
7 | +#ifndef DEFAULT_CA_FILE | ||
8 | #define DEFAULT_CA_FILE "/etc/ssl/cert.pem" | ||
9 | +#endif | ||
10 | |||
11 | #define TLS_ALL (1 << 1) | ||
12 | #define TLS_NOVERIFY (1 << 2) | ||
13 | @@ -95,9 +97,13 @@ | ||
14 | int Dflag; /* sodebug */ | 4 | int Dflag; /* sodebug */ |
15 | int Iflag; /* TCP receive buffer size */ | 5 | int Iflag; /* TCP receive buffer size */ |
16 | int Oflag; /* TCP send buffer size */ | 6 | int Oflag; /* TCP send buffer size */ |
@@ -24,7 +14,7 @@ | |||
24 | 14 | ||
25 | int usetls; /* use TLS */ | 15 | int usetls; /* use TLS */ |
26 | char *Cflag; /* Public cert file */ | 16 | char *Cflag; /* Public cert file */ |
27 | @@ -266,12 +272,14 @@ | 17 | @@ -266,12 +270,14 @@ |
28 | case 'u': | 18 | case 'u': |
29 | uflag = 1; | 19 | uflag = 1; |
30 | break; | 20 | break; |
@@ -39,7 +29,7 @@ | |||
39 | case 'v': | 29 | case 'v': |
40 | vflag = 1; | 30 | vflag = 1; |
41 | break; | 31 | break; |
42 | @@ -318,9 +326,11 @@ | 32 | @@ -318,9 +324,11 @@ |
43 | case 'o': | 33 | case 'o': |
44 | oflag = optarg; | 34 | oflag = optarg; |
45 | break; | 35 | break; |
@@ -51,7 +41,7 @@ | |||
51 | case 'T': | 41 | case 'T': |
52 | errstr = NULL; | 42 | errstr = NULL; |
53 | errno = 0; | 43 | errno = 0; |
54 | @@ -344,9 +354,11 @@ | 44 | @@ -344,9 +352,11 @@ |
55 | argc -= optind; | 45 | argc -= optind; |
56 | argv += optind; | 46 | argv += optind; |
57 | 47 | ||
@@ -61,9 +51,9 @@ | |||
61 | err(1, "setrtable"); | 51 | err(1, "setrtable"); |
62 | +#endif | 52 | +#endif |
63 | 53 | ||
64 | if (family == AF_UNIX) { | 54 | /* Cruft to make sure options are clean, and used properly. */ |
65 | if (pledge("stdio rpath wpath cpath tmppath unix", NULL) == -1) | 55 | if (argv[0] && !argv[1] && family == AF_UNIX) { |
66 | @@ -892,7 +904,10 @@ | 56 | @@ -909,7 +919,10 @@ |
67 | remote_connect(const char *host, const char *port, struct addrinfo hints) | 57 | remote_connect(const char *host, const char *port, struct addrinfo hints) |
68 | { | 58 | { |
69 | struct addrinfo *res, *res0; | 59 | struct addrinfo *res, *res0; |
@@ -75,7 +65,7 @@ | |||
75 | 65 | ||
76 | if ((error = getaddrinfo(host, port, &hints, &res0))) | 66 | if ((error = getaddrinfo(host, port, &hints, &res0))) |
77 | errx(1, "getaddrinfo for host \"%s\" port %s: %s", host, | 67 | errx(1, "getaddrinfo for host \"%s\" port %s: %s", host, |
78 | @@ -907,8 +922,10 @@ | 68 | @@ -924,8 +937,10 @@ |
79 | if (sflag || pflag) { | 69 | if (sflag || pflag) { |
80 | struct addrinfo ahints, *ares; | 70 | struct addrinfo ahints, *ares; |
81 | 71 | ||
@@ -86,8 +76,8 @@ | |||
86 | memset(&ahints, 0, sizeof(struct addrinfo)); | 76 | memset(&ahints, 0, sizeof(struct addrinfo)); |
87 | ahints.ai_family = res->ai_family; | 77 | ahints.ai_family = res->ai_family; |
88 | ahints.ai_socktype = uflag ? SOCK_DGRAM : SOCK_STREAM; | 78 | ahints.ai_socktype = uflag ? SOCK_DGRAM : SOCK_STREAM; |
89 | @@ -979,7 +996,10 @@ | 79 | @@ -996,7 +1011,10 @@ |
90 | local_listen(char *host, char *port, struct addrinfo hints) | 80 | local_listen(const char *host, const char *port, struct addrinfo hints) |
91 | { | 81 | { |
92 | struct addrinfo *res, *res0; | 82 | struct addrinfo *res, *res0; |
93 | - int s = -1, ret, x = 1, save_errno; | 83 | - int s = -1, ret, x = 1, save_errno; |
@@ -98,7 +88,7 @@ | |||
98 | int error; | 88 | int error; |
99 | 89 | ||
100 | /* Allow nodename to be null. */ | 90 | /* Allow nodename to be null. */ |
101 | @@ -1000,9 +1020,11 @@ | 91 | @@ -1017,9 +1035,11 @@ |
102 | res->ai_protocol)) < 0) | 92 | res->ai_protocol)) < 0) |
103 | continue; | 93 | continue; |
104 | 94 | ||
@@ -110,7 +100,7 @@ | |||
110 | 100 | ||
111 | set_common_sockopts(s, res->ai_family); | 101 | set_common_sockopts(s, res->ai_family); |
112 | 102 | ||
113 | @@ -1458,11 +1480,13 @@ | 103 | @@ -1475,11 +1495,13 @@ |
114 | { | 104 | { |
115 | int x = 1; | 105 | int x = 1; |
116 | 106 | ||
@@ -124,7 +114,7 @@ | |||
124 | if (Dflag) { | 114 | if (Dflag) { |
125 | if (setsockopt(s, SOL_SOCKET, SO_DEBUG, | 115 | if (setsockopt(s, SOL_SOCKET, SO_DEBUG, |
126 | &x, sizeof(x)) == -1) | 116 | &x, sizeof(x)) == -1) |
127 | @@ -1473,9 +1497,16 @@ | 117 | @@ -1490,9 +1512,16 @@ |
128 | IP_TOS, &Tflag, sizeof(Tflag)) == -1) | 118 | IP_TOS, &Tflag, sizeof(Tflag)) == -1) |
129 | err(1, "set IP ToS"); | 119 | err(1, "set IP ToS"); |
130 | 120 | ||
@@ -141,7 +131,7 @@ | |||
141 | } | 131 | } |
142 | if (Iflag) { | 132 | if (Iflag) { |
143 | if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, | 133 | if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, |
144 | @@ -1499,13 +1530,17 @@ | 134 | @@ -1516,13 +1545,17 @@ |
145 | } | 135 | } |
146 | 136 | ||
147 | if (minttl != -1) { | 137 | if (minttl != -1) { |
@@ -160,7 +150,7 @@ | |||
160 | } | 150 | } |
161 | } | 151 | } |
162 | 152 | ||
163 | @@ -1714,14 +1749,22 @@ | 153 | @@ -1748,14 +1781,22 @@ |
164 | \t-P proxyuser\tUsername for proxy authentication\n\ | 154 | \t-P proxyuser\tUsername for proxy authentication\n\ |
165 | \t-p port\t Specify local port for remote connects\n\ | 155 | \t-p port\t Specify local port for remote connects\n\ |
166 | \t-R CAfile CA bundle\n\ | 156 | \t-R CAfile CA bundle\n\ |
diff --git a/patches/ocsp_test.c.patch b/patches/ocsp_test.c.patch index aa427db..03e02ac 100644 --- a/patches/ocsp_test.c.patch +++ b/patches/ocsp_test.c.patch | |||
@@ -1,6 +1,6 @@ | |||
1 | --- tests/ocsp_test.c.orig 2016-10-18 18:12:39.854607509 +0900 | 1 | --- tests/ocsp_test.c.orig 2016-10-18 18:12:39.854607509 +0900 |
2 | +++ tests/ocsp_test.c 2016-10-18 18:14:29.261600559 +0900 | 2 | +++ tests/ocsp_test.c 2016-10-18 18:14:29.261600559 +0900 |
3 | @@ -16,6 +16,11 @@ | 3 | @@ -35,6 +35,11 @@ |
4 | hints.ai_family = AF_INET; | 4 | hints.ai_family = AF_INET; |
5 | hints.ai_socktype = SOCK_STREAM; | 5 | hints.ai_socktype = SOCK_STREAM; |
6 | 6 | ||
diff --git a/patches/tls_internal.h.patch b/patches/tls_internal.h.patch deleted file mode 100644 index e82bf96..0000000 --- a/patches/tls_internal.h.patch +++ /dev/null | |||
@@ -1,12 +0,0 @@ | |||
1 | --- tls/tls_internal.h.orig Sun Jul 9 06:16:17 2017 | ||
2 | +++ tls/tls_internal.h Mon Jul 17 06:10:01 2017 | ||
3 | @@ -26,7 +26,9 @@ | ||
4 | |||
5 | __BEGIN_HIDDEN_DECLS | ||
6 | |||
7 | +#ifndef _PATH_SSL_CA_FILE | ||
8 | #define _PATH_SSL_CA_FILE "/etc/ssl/cert.pem" | ||
9 | +#endif | ||
10 | |||
11 | #define TLS_CIPHERS_DEFAULT "TLSv1.2+AEAD+ECDHE:TLSv1.2+AEAD+DHE" | ||
12 | #define TLS_CIPHERS_COMPAT "HIGH:!aNULL" | ||
diff --git a/patches/tlsexttest.c.patch b/patches/tlsexttest.c.patch index 981fc95..6a4184d 100644 --- a/patches/tlsexttest.c.patch +++ b/patches/tlsexttest.c.patch | |||
@@ -1,6 +1,6 @@ | |||
1 | --- tests/tlsexttest.c.orig 2017-12-30 20:03:09.279079726 +0900 | 1 | --- tests/tlsexttest.c.orig 2017-12-30 20:03:09.279079726 +0900 |
2 | +++ tests/tlsexttest.c 2017-12-30 20:07:21.849939140 +0900 | 2 | +++ tests/tlsexttest.c 2017-12-30 20:07:21.849939140 +0900 |
3 | @@ -1676,7 +1676,9 @@ static unsigned char tlsext_sni_clienthe | 3 | @@ -1676,7 +1676,9 @@ |
4 | }; | 4 | }; |
5 | 5 | ||
6 | static unsigned char tlsext_sni_serverhello[] = { | 6 | static unsigned char tlsext_sni_serverhello[] = { |
@@ -10,7 +10,7 @@ | |||
10 | 10 | ||
11 | static int | 11 | static int |
12 | test_tlsext_sni_clienthello(void) | 12 | test_tlsext_sni_clienthello(void) |
13 | @@ -1839,9 +1841,9 @@ test_tlsext_sni_serverhello(void) | 13 | @@ -1841,9 +1843,9 @@ |
14 | if (!CBB_finish(&cbb, &data, &dlen)) | 14 | if (!CBB_finish(&cbb, &data, &dlen)) |
15 | errx(1, "failed to finish CBB"); | 15 | errx(1, "failed to finish CBB"); |
16 | 16 | ||
@@ -22,7 +22,7 @@ | |||
22 | goto err; | 22 | goto err; |
23 | } | 23 | } |
24 | 24 | ||
25 | @@ -1850,14 +1852,14 @@ test_tlsext_sni_serverhello(void) | 25 | @@ -1852,14 +1854,14 @@ |
26 | fprintf(stderr, "received:\n"); | 26 | fprintf(stderr, "received:\n"); |
27 | hexdump(data, dlen); | 27 | hexdump(data, dlen); |
28 | fprintf(stderr, "test data:\n"); | 28 | fprintf(stderr, "test data:\n"); |
@@ -39,7 +39,7 @@ | |||
39 | if (!tlsext_sni_serverhello_parse(ssl, &cbs, &alert)) { | 39 | if (!tlsext_sni_serverhello_parse(ssl, &cbs, &alert)) { |
40 | FAIL("failed to parse serverhello SNI\n"); | 40 | FAIL("failed to parse serverhello SNI\n"); |
41 | goto err; | 41 | goto err; |
42 | @@ -2741,7 +2743,10 @@ unsigned char tlsext_clienthello_default | 42 | @@ -2744,7 +2746,10 @@ |
43 | 0x03, 0x01, 0x03, 0x03, 0x02, 0x01, 0x02, 0x03, | 43 | 0x03, 0x01, 0x03, 0x03, 0x02, 0x01, 0x02, 0x03, |
44 | }; | 44 | }; |
45 | 45 | ||
@@ -51,7 +51,7 @@ | |||
51 | 51 | ||
52 | static int | 52 | static int |
53 | test_tlsext_clienthello_build(void) | 53 | test_tlsext_clienthello_build(void) |
54 | @@ -2806,18 +2811,18 @@ test_tlsext_clienthello_build(void) | 54 | @@ -2811,18 +2816,18 @@ |
55 | if (!CBB_finish(&cbb, &data, &dlen)) | 55 | if (!CBB_finish(&cbb, &data, &dlen)) |
56 | errx(1, "failed to finish CBB"); | 56 | errx(1, "failed to finish CBB"); |
57 | 57 | ||
@@ -74,7 +74,7 @@ | |||
74 | goto err; | 74 | goto err; |
75 | } | 75 | } |
76 | 76 | ||
77 | @@ -2832,7 +2837,10 @@ test_tlsext_clienthello_build(void) | 77 | @@ -2837,7 +2842,10 @@ |
78 | return (failure); | 78 | return (failure); |
79 | } | 79 | } |
80 | 80 | ||
@@ -86,7 +86,7 @@ | |||
86 | 86 | ||
87 | unsigned char tlsext_serverhello_enabled[] = { | 87 | unsigned char tlsext_serverhello_enabled[] = { |
88 | 0x00, 0x13, 0xff, 0x01, 0x00, 0x01, 0x00, 0x00, | 88 | 0x00, 0x13, 0xff, 0x01, 0x00, 0x01, 0x00, 0x00, |
89 | @@ -2872,18 +2880,18 @@ test_tlsext_serverhello_build(void) | 89 | @@ -2877,18 +2885,18 @@ |
90 | if (!CBB_finish(&cbb, &data, &dlen)) | 90 | if (!CBB_finish(&cbb, &data, &dlen)) |
91 | errx(1, "failed to finish CBB"); | 91 | errx(1, "failed to finish CBB"); |
92 | 92 | ||
diff --git a/ssl/CMakeLists.txt b/ssl/CMakeLists.txt index 8596d25..5c13e5d 100644 --- a/ssl/CMakeLists.txt +++ b/ssl/CMakeLists.txt | |||
@@ -8,7 +8,6 @@ set( | |||
8 | d1_clnt.c | 8 | d1_clnt.c |
9 | d1_enc.c | 9 | d1_enc.c |
10 | d1_lib.c | 10 | d1_lib.c |
11 | d1_meth.c | ||
12 | d1_pkt.c | 11 | d1_pkt.c |
13 | d1_srtp.c | 12 | d1_srtp.c |
14 | d1_srvr.c | 13 | d1_srvr.c |
@@ -24,6 +23,7 @@ set( | |||
24 | ssl_err.c | 23 | ssl_err.c |
25 | ssl_init.c | 24 | ssl_init.c |
26 | ssl_lib.c | 25 | ssl_lib.c |
26 | ssl_methods.c | ||
27 | ssl_packet.c | 27 | ssl_packet.c |
28 | ssl_pkt.c | 28 | ssl_pkt.c |
29 | ssl_rsa.c | 29 | ssl_rsa.c |
@@ -33,12 +33,9 @@ set( | |||
33 | ssl_tlsext.c | 33 | ssl_tlsext.c |
34 | ssl_txt.c | 34 | ssl_txt.c |
35 | ssl_versions.c | 35 | ssl_versions.c |
36 | t1_clnt.c | ||
37 | t1_enc.c | 36 | t1_enc.c |
38 | t1_hash.c | 37 | t1_hash.c |
39 | t1_lib.c | 38 | t1_lib.c |
40 | t1_meth.c | ||
41 | t1_srvr.c | ||
42 | ) | 39 | ) |
43 | 40 | ||
44 | add_library(ssl ${SSL_SRC}) | 41 | add_library(ssl ${SSL_SRC}) |
diff --git a/ssl/Makefile.am b/ssl/Makefile.am index 189876e..8263749 100644 --- a/ssl/Makefile.am +++ b/ssl/Makefile.am | |||
@@ -17,7 +17,6 @@ libssl_la_SOURCES += d1_both.c | |||
17 | libssl_la_SOURCES += d1_clnt.c | 17 | libssl_la_SOURCES += d1_clnt.c |
18 | libssl_la_SOURCES += d1_enc.c | 18 | libssl_la_SOURCES += d1_enc.c |
19 | libssl_la_SOURCES += d1_lib.c | 19 | libssl_la_SOURCES += d1_lib.c |
20 | libssl_la_SOURCES += d1_meth.c | ||
21 | libssl_la_SOURCES += d1_pkt.c | 20 | libssl_la_SOURCES += d1_pkt.c |
22 | libssl_la_SOURCES += d1_srtp.c | 21 | libssl_la_SOURCES += d1_srtp.c |
23 | libssl_la_SOURCES += d1_srvr.c | 22 | libssl_la_SOURCES += d1_srvr.c |
@@ -33,6 +32,7 @@ libssl_la_SOURCES += ssl_clnt.c | |||
33 | libssl_la_SOURCES += ssl_err.c | 32 | libssl_la_SOURCES += ssl_err.c |
34 | libssl_la_SOURCES += ssl_init.c | 33 | libssl_la_SOURCES += ssl_init.c |
35 | libssl_la_SOURCES += ssl_lib.c | 34 | libssl_la_SOURCES += ssl_lib.c |
35 | libssl_la_SOURCES += ssl_methods.c | ||
36 | libssl_la_SOURCES += ssl_packet.c | 36 | libssl_la_SOURCES += ssl_packet.c |
37 | libssl_la_SOURCES += ssl_pkt.c | 37 | libssl_la_SOURCES += ssl_pkt.c |
38 | libssl_la_SOURCES += ssl_rsa.c | 38 | libssl_la_SOURCES += ssl_rsa.c |
@@ -42,12 +42,9 @@ libssl_la_SOURCES += ssl_stat.c | |||
42 | libssl_la_SOURCES += ssl_tlsext.c | 42 | libssl_la_SOURCES += ssl_tlsext.c |
43 | libssl_la_SOURCES += ssl_txt.c | 43 | libssl_la_SOURCES += ssl_txt.c |
44 | libssl_la_SOURCES += ssl_versions.c | 44 | libssl_la_SOURCES += ssl_versions.c |
45 | libssl_la_SOURCES += t1_clnt.c | ||
46 | libssl_la_SOURCES += t1_enc.c | 45 | libssl_la_SOURCES += t1_enc.c |
47 | libssl_la_SOURCES += t1_hash.c | 46 | libssl_la_SOURCES += t1_hash.c |
48 | libssl_la_SOURCES += t1_lib.c | 47 | libssl_la_SOURCES += t1_lib.c |
49 | libssl_la_SOURCES += t1_meth.c | ||
50 | libssl_la_SOURCES += t1_srvr.c | ||
51 | 48 | ||
52 | noinst_HEADERS = srtp.h | 49 | noinst_HEADERS = srtp.h |
53 | noinst_HEADERS += ssl_locl.h | 50 | noinst_HEADERS += ssl_locl.h |
@@ -126,7 +126,7 @@ copy_hdrs $libcrypto_src "stack/stack.h lhash/lhash.h stack/safestack.h | |||
126 | objects/objects.h asn1/asn1.h bn/bn.h ec/ec.h ecdsa/ecdsa.h | 126 | objects/objects.h asn1/asn1.h bn/bn.h ec/ec.h ecdsa/ecdsa.h |
127 | ecdh/ecdh.h rsa/rsa.h sha/sha.h x509/x509_vfy.h pkcs7/pkcs7.h pem/pem.h | 127 | ecdh/ecdh.h rsa/rsa.h sha/sha.h x509/x509_vfy.h pkcs7/pkcs7.h pem/pem.h |
128 | pem/pem2.h hkdf/hkdf.h hmac/hmac.h rand/rand.h md5/md5.h | 128 | pem/pem2.h hkdf/hkdf.h hmac/hmac.h rand/rand.h md5/md5.h |
129 | asn1/asn1_mac.h x509v3/x509v3.h conf/conf.h ocsp/ocsp.h | 129 | x509v3/x509v3.h conf/conf.h ocsp/ocsp.h |
130 | aes/aes.h modes/modes.h asn1/asn1t.h dso/dso.h bf/blowfish.h | 130 | aes/aes.h modes/modes.h asn1/asn1t.h dso/dso.h bf/blowfish.h |
131 | bio/bio.h cast/cast.h cmac/cmac.h conf/conf_api.h des/des.h dh/dh.h | 131 | bio/bio.h cast/cast.h cmac/cmac.h conf/conf_api.h des/des.h dh/dh.h |
132 | dsa/dsa.h engine/engine.h ui/ui.h pkcs12/pkcs12.h ts/ts.h | 132 | dsa/dsa.h engine/engine.h ui/ui.h pkcs12/pkcs12.h ts/ts.h |