diff options
Diffstat (limited to 'patches')
-rw-r--r-- | patches/crypto_arch.h.patch | 34 | ||||
-rw-r--r-- | patches/crypto_namespace.h.patch | 6 | ||||
-rw-r--r-- | patches/netcat.c.patch | 20 | ||||
-rw-r--r-- | patches/openssl.c.patch | 6 | ||||
-rw-r--r-- | patches/opensslfeatures.h.patch | 22 | ||||
-rw-r--r-- | patches/patch-aarch64-crypto-cpu-caps.c.patch | 39 | ||||
-rw-r--r-- | patches/patch-amd64-crypto-cpu-caps.c.patch | 20 | ||||
-rw-r--r-- | patches/patch-i386-crypto-cpu-caps.c.patch | 20 | ||||
-rw-r--r-- | patches/speed.c.patch | 27 | ||||
-rw-r--r-- | patches/ssl_namespace.h.patch | 6 | ||||
-rw-r--r-- | patches/tls_config.c.patch | 15 |
11 files changed, 183 insertions, 32 deletions
diff --git a/patches/crypto_arch.h.patch b/patches/crypto_arch.h.patch new file mode 100644 index 0000000..6c889e5 --- /dev/null +++ b/patches/crypto_arch.h.patch | |||
@@ -0,0 +1,34 @@ | |||
1 | --- crypto/arch/amd64/crypto_arch.h.orig Fri Feb 14 06:00:43 2025 | ||
2 | +++ crypto/arch/amd64/crypto_arch.h Fri Feb 14 06:01:13 2025 | ||
3 | @@ -40,6 +40,7 @@ extern uint64_t crypto_cpu_caps_amd64; | ||
4 | #define HAVE_RC4_INTERNAL | ||
5 | #define HAVE_RC4_SET_KEY_INTERNAL | ||
6 | |||
7 | +#if 0 | ||
8 | #define HAVE_SHA1_BLOCK_DATA_ORDER | ||
9 | #define HAVE_SHA1_BLOCK_GENERIC | ||
10 | |||
11 | @@ -48,6 +49,7 @@ extern uint64_t crypto_cpu_caps_amd64; | ||
12 | |||
13 | #define HAVE_SHA512_BLOCK_DATA_ORDER | ||
14 | #define HAVE_SHA512_BLOCK_GENERIC | ||
15 | +#endif | ||
16 | |||
17 | #endif | ||
18 | |||
19 | --- crypto/arch/aarch64/crypto_arch.h.orig Thu Mar 13 05:42:37 2025 | ||
20 | +++ crypto/arch/aarch64/crypto_arch.h Thu Mar 13 05:47:39 2025 | ||
21 | @@ -33,11 +33,13 @@ | ||
22 | #define CRYPTO_CPU_CAPS_AARCH64_SHA512 (1ULL << 4) | ||
23 | #define CRYPTO_CPU_CAPS_AARCH64_SHA3 (1ULL << 5) | ||
24 | |||
25 | +#if 0 | ||
26 | #ifndef OPENSSL_NO_ASM | ||
27 | |||
28 | #define HAVE_SHA256_BLOCK_DATA_ORDER | ||
29 | #define HAVE_SHA512_BLOCK_DATA_ORDER | ||
30 | |||
31 | +#endif | ||
32 | #endif | ||
33 | |||
34 | #endif | ||
diff --git a/patches/crypto_namespace.h.patch b/patches/crypto_namespace.h.patch index c18f0da..400030f 100644 --- a/patches/crypto_namespace.h.patch +++ b/patches/crypto_namespace.h.patch | |||
@@ -1,5 +1,5 @@ | |||
1 | --- crypto/hidden/crypto_namespace.h.orig 2024-04-09 10:12:22.320737957 +0200 | 1 | --- crypto/hidden/crypto_namespace.h.orig Fri Aug 2 23:52:55 2024 |
2 | +++ crypto/hidden/crypto_namespace.h 2024-04-11 09:09:31.163350515 +0200 | 2 | +++ crypto/hidden/crypto_namespace.h Fri Aug 2 23:53:17 2024 |
3 | @@ -24,6 +24,12 @@ | 3 | @@ -24,6 +24,12 @@ |
4 | * external calls use the latter name. | 4 | * external calls use the latter name. |
5 | */ | 5 | */ |
@@ -13,7 +13,7 @@ | |||
13 | #ifdef LIBRESSL_NAMESPACE | 13 | #ifdef LIBRESSL_NAMESPACE |
14 | #ifdef LIBRESSL_CRYPTO_NAMESPACE | 14 | #ifdef LIBRESSL_CRYPTO_NAMESPACE |
15 | # define LCRYPTO_UNUSED(x) __attribute__((deprecated)) \ | 15 | # define LCRYPTO_UNUSED(x) __attribute__((deprecated)) \ |
16 | @@ -43,5 +49,6 @@ | 16 | @@ -47,5 +53,6 @@ |
17 | # define LCRYPTO_ALIAS1(pre,x) | 17 | # define LCRYPTO_ALIAS1(pre,x) |
18 | # define LCRYPTO_ALIAS(x) asm("") | 18 | # define LCRYPTO_ALIAS(x) asm("") |
19 | #endif | 19 | #endif |
diff --git a/patches/netcat.c.patch b/patches/netcat.c.patch index 9c3a450..319aca6 100644 --- a/patches/netcat.c.patch +++ b/patches/netcat.c.patch | |||
@@ -1,5 +1,5 @@ | |||
1 | --- apps/nc/netcat.c.orig Tue Aug 15 15:17:28 2023 | 1 | --- apps/nc/netcat.c.orig Sat Aug 17 03:21:05 2024 |
2 | +++ apps/nc/netcat.c Tue Aug 15 15:17:54 2023 | 2 | +++ apps/nc/netcat.c Sat Aug 17 03:28:50 2024 |
3 | @@ -93,9 +93,13 @@ int zflag; /* Port Scan Flag */ | 3 | @@ -93,9 +93,13 @@ int zflag; /* Port Scan Flag */ |
4 | int Dflag; /* sodebug */ | 4 | int Dflag; /* sodebug */ |
5 | int Iflag; /* TCP receive buffer size */ | 5 | int Iflag; /* TCP receive buffer size */ |
@@ -53,7 +53,7 @@ | |||
53 | 53 | ||
54 | /* Cruft to make sure options are clean, and used properly. */ | 54 | /* Cruft to make sure options are clean, and used properly. */ |
55 | if (argc == 1 && family == AF_UNIX) { | 55 | if (argc == 1 && family == AF_UNIX) { |
56 | @@ -927,7 +937,10 @@ remote_connect(const char *host, const char *port, str | 56 | @@ -923,7 +933,10 @@ remote_connect(const char *host, const char *port, str |
57 | char *ipaddr) | 57 | char *ipaddr) |
58 | { | 58 | { |
59 | struct addrinfo *res, *res0; | 59 | struct addrinfo *res, *res0; |
@@ -65,7 +65,7 @@ | |||
65 | 65 | ||
66 | if ((error = getaddrinfo(host, port, &hints, &res0))) | 66 | if ((error = getaddrinfo(host, port, &hints, &res0))) |
67 | errx(1, "getaddrinfo for host \"%s\" port %s: %s", host, | 67 | errx(1, "getaddrinfo for host \"%s\" port %s: %s", host, |
68 | @@ -942,8 +955,10 @@ remote_connect(const char *host, const char *port, str | 68 | @@ -938,8 +951,10 @@ remote_connect(const char *host, const char *port, str |
69 | if (sflag || pflag) { | 69 | if (sflag || pflag) { |
70 | struct addrinfo ahints, *ares; | 70 | struct addrinfo ahints, *ares; |
71 | 71 | ||
@@ -76,7 +76,7 @@ | |||
76 | memset(&ahints, 0, sizeof(struct addrinfo)); | 76 | memset(&ahints, 0, sizeof(struct addrinfo)); |
77 | ahints.ai_family = res->ai_family; | 77 | ahints.ai_family = res->ai_family; |
78 | ahints.ai_socktype = uflag ? SOCK_DGRAM : SOCK_STREAM; | 78 | ahints.ai_socktype = uflag ? SOCK_DGRAM : SOCK_STREAM; |
79 | @@ -1035,7 +1050,10 @@ int | 79 | @@ -1031,7 +1046,10 @@ int |
80 | local_listen(const char *host, const char *port, struct addrinfo hints) | 80 | local_listen(const char *host, const char *port, struct addrinfo hints) |
81 | { | 81 | { |
82 | struct addrinfo *res, *res0; | 82 | struct addrinfo *res, *res0; |
@@ -88,7 +88,7 @@ | |||
88 | int error; | 88 | int error; |
89 | 89 | ||
90 | /* Allow nodename to be null. */ | 90 | /* Allow nodename to be null. */ |
91 | @@ -1056,9 +1074,11 @@ local_listen(const char *host, const char *port, struc | 91 | @@ -1052,9 +1070,11 @@ local_listen(const char *host, const char *port, struc |
92 | res->ai_protocol)) == -1) | 92 | res->ai_protocol)) == -1) |
93 | continue; | 93 | continue; |
94 | 94 | ||
@@ -100,7 +100,7 @@ | |||
100 | 100 | ||
101 | set_common_sockopts(s, res->ai_family); | 101 | set_common_sockopts(s, res->ai_family); |
102 | 102 | ||
103 | @@ -1563,11 +1583,13 @@ set_common_sockopts(int s, int af) | 103 | @@ -1559,11 +1579,13 @@ set_common_sockopts(int s, int af) |
104 | { | 104 | { |
105 | int x = 1; | 105 | int x = 1; |
106 | 106 | ||
@@ -114,7 +114,7 @@ | |||
114 | if (Dflag) { | 114 | if (Dflag) { |
115 | if (setsockopt(s, SOL_SOCKET, SO_DEBUG, | 115 | if (setsockopt(s, SOL_SOCKET, SO_DEBUG, |
116 | &x, sizeof(x)) == -1) | 116 | &x, sizeof(x)) == -1) |
117 | @@ -1578,9 +1600,16 @@ set_common_sockopts(int s, int af) | 117 | @@ -1574,9 +1596,16 @@ set_common_sockopts(int s, int af) |
118 | IP_TOS, &Tflag, sizeof(Tflag)) == -1) | 118 | IP_TOS, &Tflag, sizeof(Tflag)) == -1) |
119 | err(1, "set IP ToS"); | 119 | err(1, "set IP ToS"); |
120 | 120 | ||
@@ -131,7 +131,7 @@ | |||
131 | } | 131 | } |
132 | if (Iflag) { | 132 | if (Iflag) { |
133 | if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, | 133 | if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, |
134 | @@ -1604,13 +1633,17 @@ set_common_sockopts(int s, int af) | 134 | @@ -1600,13 +1629,17 @@ set_common_sockopts(int s, int af) |
135 | } | 135 | } |
136 | 136 | ||
137 | if (minttl != -1) { | 137 | if (minttl != -1) { |
@@ -150,7 +150,7 @@ | |||
150 | } | 150 | } |
151 | } | 151 | } |
152 | 152 | ||
153 | @@ -1835,15 +1868,19 @@ help(void) | 153 | @@ -1831,15 +1864,19 @@ help(void) |
154 | \t-P proxyuser\tUsername for proxy authentication\n\ | 154 | \t-P proxyuser\tUsername for proxy authentication\n\ |
155 | \t-p port\t Specify local port for remote connects\n\ | 155 | \t-p port\t Specify local port for remote connects\n\ |
156 | \t-R CAfile CA bundle\n\ | 156 | \t-R CAfile CA bundle\n\ |
diff --git a/patches/openssl.c.patch b/patches/openssl.c.patch index 15afb78..5ba5ac6 100644 --- a/patches/openssl.c.patch +++ b/patches/openssl.c.patch | |||
@@ -1,6 +1,6 @@ | |||
1 | --- apps/openssl/openssl.c.orig Mon Mar 4 13:39:56 2024 | 1 | --- apps/openssl/openssl.c.orig Thu Jan 2 08:27:54 2025 |
2 | +++ apps/openssl/openssl.c Mon Mar 4 13:40:15 2024 | 2 | +++ apps/openssl/openssl.c Thu Jan 2 08:28:04 2025 |
3 | @@ -348,7 +348,9 @@ | 3 | @@ -344,7 +344,9 @@ BIO *bio_err = NULL; |
4 | static void | 4 | static void |
5 | openssl_startup(void) | 5 | openssl_startup(void) |
6 | { | 6 | { |
diff --git a/patches/opensslfeatures.h.patch b/patches/opensslfeatures.h.patch index 618de73..77df5dc 100644 --- a/patches/opensslfeatures.h.patch +++ b/patches/opensslfeatures.h.patch | |||
@@ -14,3 +14,25 @@ | |||
14 | #define OPENSSL_THREADS | 14 | #define OPENSSL_THREADS |
15 | 15 | ||
16 | #define OPENSSL_NO_BUF_FREELISTS | 16 | #define OPENSSL_NO_BUF_FREELISTS |
17 | --- crypto/crypto_internal.h.orig Sat Dec 14 14:15:39 2024 | ||
18 | +++ crypto/crypto_internal.h Sat Dec 14 14:15:52 2024 | ||
19 | @@ -15,6 +15,8 @@ | ||
20 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
21 | */ | ||
22 | |||
23 | +#include <openssl/opensslfeatures.h> | ||
24 | + | ||
25 | #include <endian.h> | ||
26 | #include <stddef.h> | ||
27 | #include <stdint.h> | ||
28 | --- tests/parse_test_file.h.orig Thu Dec 26 01:13:00 2024 | ||
29 | +++ tests/parse_test_file.h Thu Dec 26 01:13:27 2024 | ||
30 | @@ -22,6 +22,8 @@ | ||
31 | #include <stdint.h> | ||
32 | #include <stdio.h> | ||
33 | |||
34 | +#include <openssl/opensslfeatures.h> | ||
35 | + | ||
36 | #include "bytestring.h" | ||
37 | |||
38 | #if defined(__cplusplus) | ||
diff --git a/patches/patch-aarch64-crypto-cpu-caps.c.patch b/patches/patch-aarch64-crypto-cpu-caps.c.patch new file mode 100644 index 0000000..dcfbdc0 --- /dev/null +++ b/patches/patch-aarch64-crypto-cpu-caps.c.patch | |||
@@ -0,0 +1,39 @@ | |||
1 | Disable feature detection until we find a more portable way. | ||
2 | |||
3 | --- crypto/arch/aarch64/crypto_cpu_caps.c.orig Sat Dec 14 13:45:16 2024 | ||
4 | +++ crypto/arch/aarch64/crypto_cpu_caps.c Sat Dec 14 13:54:06 2024 | ||
5 | @@ -16,9 +16,12 @@ | ||
6 | */ | ||
7 | |||
8 | #include <sys/types.h> | ||
9 | + | ||
10 | +#if defined(__OpenBSD__) | ||
11 | #include <sys/sysctl.h> | ||
12 | |||
13 | #include <machine/cpu.h> | ||
14 | +#endif | ||
15 | |||
16 | #include <stddef.h> | ||
17 | #include <stdio.h> | ||
18 | @@ -67,6 +70,7 @@ parse_isar0(uint64_t isar0) | ||
19 | return caps; | ||
20 | } | ||
21 | |||
22 | +#if defined(__OpenBSD__) | ||
23 | static int | ||
24 | read_isar0(uint64_t *isar0) | ||
25 | { | ||
26 | @@ -84,6 +88,13 @@ read_isar0(uint64_t *isar0) | ||
27 | |||
28 | return 1; | ||
29 | } | ||
30 | +#else | ||
31 | +static int | ||
32 | +read_isar0(uint64_t *isar0) | ||
33 | +{ | ||
34 | + return 0; | ||
35 | +} | ||
36 | +#endif | ||
37 | |||
38 | void | ||
39 | crypto_cpu_caps_init(void) | ||
diff --git a/patches/patch-amd64-crypto-cpu-caps.c.patch b/patches/patch-amd64-crypto-cpu-caps.c.patch new file mode 100644 index 0000000..5fd7524 --- /dev/null +++ b/patches/patch-amd64-crypto-cpu-caps.c.patch | |||
@@ -0,0 +1,20 @@ | |||
1 | --- crypto/arch/amd64/crypto_cpu_caps.c.orig Sat Dec 14 13:45:16 2024 | ||
2 | +++ crypto/arch/amd64/crypto_cpu_caps.c Sat Dec 14 13:54:06 2024 | ||
3 | @@ -37,7 +37,7 @@ cpuid(uint32_t eax, uint32_t *out_eax, uint32_t *out_e | ||
4 | { | ||
5 | uint32_t ebx = 0, ecx = 0, edx = 0; | ||
6 | |||
7 | -#ifndef OPENSSL_NO_ASM | ||
8 | +#if defined(__GNUC__) && !defined(OPENSSL_NO_ASM) | ||
9 | __asm__ ("cpuid": "+a"(eax), "+b"(ebx), "+c"(ecx), "+d"(edx)); | ||
10 | #else | ||
11 | eax = 0; | ||
12 | @@ -58,7 +58,7 @@ xgetbv(uint32_t ecx, uint32_t *out_eax, uint32_t *out_ | ||
13 | { | ||
14 | uint32_t eax = 0, edx = 0; | ||
15 | |||
16 | -#ifndef OPENSSL_NO_ASM | ||
17 | +#if defined(__GNUC__) && !defined(OPENSSL_NO_ASM) | ||
18 | __asm__ ("xgetbv": "+a"(eax), "+c"(ecx), "+d"(edx)); | ||
19 | #endif | ||
20 | |||
diff --git a/patches/patch-i386-crypto-cpu-caps.c.patch b/patches/patch-i386-crypto-cpu-caps.c.patch new file mode 100644 index 0000000..c85e33c --- /dev/null +++ b/patches/patch-i386-crypto-cpu-caps.c.patch | |||
@@ -0,0 +1,20 @@ | |||
1 | --- crypto/arch/i386/crypto_cpu_caps.c.orig Fri Oct 18 17:35:20 2024 | ||
2 | +++ crypto/arch/i386/crypto_cpu_caps.c Fri Oct 18 17:39:13 2024 | ||
3 | @@ -33,7 +33,7 @@ cpuid(uint32_t eax, uint32_t *out_eax, uint32_t *out_e | ||
4 | { | ||
5 | uint32_t ebx = 0, ecx = 0, edx = 0; | ||
6 | |||
7 | -#ifndef OPENSSL_NO_ASM | ||
8 | +#if defined(__GNUC__) && !defined(OPENSSL_NO_ASM) | ||
9 | __asm__ ("cpuid": "+a"(eax), "+b"(ebx), "+c"(ecx), "+d"(edx)); | ||
10 | #else | ||
11 | eax = 0; | ||
12 | @@ -54,7 +54,7 @@ xgetbv(uint32_t ecx, uint32_t *out_eax, uint32_t *out_ | ||
13 | { | ||
14 | uint32_t eax = 0, edx = 0; | ||
15 | |||
16 | -#ifndef OPENSSL_NO_ASM | ||
17 | +#if defined(__GNUC__) && !defined(OPENSSL_NO_ASM) | ||
18 | __asm__ ("xgetbv": "+a"(eax), "+c"(ecx), "+d"(edx)); | ||
19 | #endif | ||
20 | |||
diff --git a/patches/speed.c.patch b/patches/speed.c.patch index c29ef4d..e1f1698 100644 --- a/patches/speed.c.patch +++ b/patches/speed.c.patch | |||
@@ -1,6 +1,6 @@ | |||
1 | --- apps/openssl/speed.c.orig Sat Jul 13 11:02:51 2024 | 1 | --- apps/openssl/speed.c.orig Thu Jan 2 08:04:28 2025 |
2 | +++ apps/openssl/speed.c Sat Jul 13 10:27:25 2024 | 2 | +++ apps/openssl/speed.c Thu Jan 2 08:04:38 2025 |
3 | @@ -161,7 +161,16 @@ | 3 | @@ -158,7 +158,16 @@ static void |
4 | pkey_print_message(const char *str, const char *str2, | 4 | pkey_print_message(const char *str, const char *str2, |
5 | long num, int bits, int sec); | 5 | long num, int bits, int sec); |
6 | static void print_result(int alg, int run_no, int count, double time_used); | 6 | static void print_result(int alg, int run_no, int count, double time_used); |
@@ -17,7 +17,7 @@ | |||
17 | 17 | ||
18 | #define ALGOR_NUM 32 | 18 | #define ALGOR_NUM 32 |
19 | #define SIZE_NUM 5 | 19 | #define SIZE_NUM 5 |
20 | @@ -430,8 +439,10 @@ | 20 | @@ -1129,8 +1138,10 @@ speed_main(int argc, char **argv) |
21 | const EVP_CIPHER *evp_cipher = NULL; | 21 | const EVP_CIPHER *evp_cipher = NULL; |
22 | const EVP_MD *evp_md = NULL; | 22 | const EVP_MD *evp_md = NULL; |
23 | int decrypt = 0; | 23 | int decrypt = 0; |
@@ -28,7 +28,7 @@ | |||
28 | const char *errstr = NULL; | 28 | const char *errstr = NULL; |
29 | 29 | ||
30 | if (pledge("stdio proc", NULL) == -1) { | 30 | if (pledge("stdio proc", NULL) == -1) { |
31 | @@ -506,6 +517,7 @@ | 31 | @@ -1205,6 +1216,7 @@ speed_main(int argc, char **argv) |
32 | decrypt = 1; | 32 | decrypt = 1; |
33 | j--; /* Otherwise, -decrypt gets confused with an | 33 | j--; /* Otherwise, -decrypt gets confused with an |
34 | * algorithm. */ | 34 | * algorithm. */ |
@@ -36,7 +36,7 @@ | |||
36 | } else if (argc > 0 && strcmp(*argv, "-multi") == 0) { | 36 | } else if (argc > 0 && strcmp(*argv, "-multi") == 0) { |
37 | argc--; | 37 | argc--; |
38 | argv++; | 38 | argv++; |
39 | @@ -520,6 +532,7 @@ | 39 | @@ -1219,6 +1231,7 @@ speed_main(int argc, char **argv) |
40 | } | 40 | } |
41 | j--; /* Otherwise, -multi gets confused with an | 41 | j--; /* Otherwise, -multi gets confused with an |
42 | * algorithm. */ | 42 | * algorithm. */ |
@@ -44,7 +44,7 @@ | |||
44 | } else if (argc > 0 && strcmp(*argv, "-unaligned") == 0) { | 44 | } else if (argc > 0 && strcmp(*argv, "-unaligned") == 0) { |
45 | argc--; | 45 | argc--; |
46 | argv++; | 46 | argv++; |
47 | @@ -851,7 +864,9 @@ | 47 | @@ -1542,7 +1555,9 @@ speed_main(int argc, char **argv) |
48 | BIO_printf(bio_err, "-evp e use EVP e.\n"); | 48 | BIO_printf(bio_err, "-evp e use EVP e.\n"); |
49 | BIO_printf(bio_err, "-decrypt time decryption instead of encryption (only EVP).\n"); | 49 | BIO_printf(bio_err, "-decrypt time decryption instead of encryption (only EVP).\n"); |
50 | BIO_printf(bio_err, "-mr produce machine readable output.\n"); | 50 | BIO_printf(bio_err, "-mr produce machine readable output.\n"); |
@@ -54,7 +54,7 @@ | |||
54 | BIO_printf(bio_err, "-unaligned n use buffers with offset n from proper alignment.\n"); | 54 | BIO_printf(bio_err, "-unaligned n use buffers with offset n from proper alignment.\n"); |
55 | goto end; | 55 | goto end; |
56 | } | 56 | } |
57 | @@ -860,8 +875,10 @@ | 57 | @@ -1551,8 +1566,10 @@ speed_main(int argc, char **argv) |
58 | j++; | 58 | j++; |
59 | } | 59 | } |
60 | 60 | ||
@@ -65,7 +65,7 @@ | |||
65 | 65 | ||
66 | if (j == 0) { | 66 | if (j == 0) { |
67 | for (i = 0; i < ALGOR_NUM; i++) { | 67 | for (i = 0; i < ALGOR_NUM; i++) { |
68 | @@ -933,11 +950,13 @@ | 68 | @@ -1624,11 +1641,13 @@ speed_main(int argc, char **argv) |
69 | #define COND(c) (run && count<0x7fffffff) | 69 | #define COND(c) (run && count<0x7fffffff) |
70 | #define COUNT(d) (count) | 70 | #define COUNT(d) (count) |
71 | 71 | ||
@@ -79,7 +79,7 @@ | |||
79 | 79 | ||
80 | #ifndef OPENSSL_NO_MD4 | 80 | #ifndef OPENSSL_NO_MD4 |
81 | if (doit[D_MD4]) { | 81 | if (doit[D_MD4]) { |
82 | @@ -1743,7 +1762,9 @@ | 82 | @@ -2434,7 +2453,9 @@ speed_main(int argc, char **argv) |
83 | ecdh_doit[j] = 0; | 83 | ecdh_doit[j] = 0; |
84 | } | 84 | } |
85 | } | 85 | } |
@@ -89,7 +89,7 @@ | |||
89 | if (!mr) { | 89 | if (!mr) { |
90 | fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_VERSION)); | 90 | fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_VERSION)); |
91 | fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_BUILT_ON)); | 91 | fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_BUILT_ON)); |
92 | @@ -1899,11 +1920,15 @@ | 92 | @@ -2590,11 +2611,15 @@ pkey_print_message(const char *str, const char *str2, |
93 | static void | 93 | static void |
94 | print_result(int alg, int run_no, int count, double time_used) | 94 | print_result(int alg, int run_no, int count, double time_used) |
95 | { | 95 | { |
@@ -105,9 +105,10 @@ | |||
105 | static char * | 105 | static char * |
106 | sstrsep(char **string, const char *delim) | 106 | sstrsep(char **string, const char *delim) |
107 | { | 107 | { |
108 | @@ -2104,4 +2129,5 @@ | 108 | @@ -2795,5 +2820,6 @@ do_multi(int multi) |
109 | free(fds); | 109 | free(fds); |
110 | return 1; | 110 | return 1; |
111 | } | 111 | } |
112 | +#endif | 112 | +#endif |
113 | #endif | 113 | |
114 | #endif /* OPENSSL_NO_SPEED */ | ||
diff --git a/patches/ssl_namespace.h.patch b/patches/ssl_namespace.h.patch index 758f8dc..eb9c7a2 100644 --- a/patches/ssl_namespace.h.patch +++ b/patches/ssl_namespace.h.patch | |||
@@ -1,5 +1,5 @@ | |||
1 | --- openbsd/src/lib/libssl/hidden/ssl_namespace.h 2023-03-15 11:41:52.481641800 -0600 | 1 | --- ssl/hidden/ssl_namespace.h.orig Fri Aug 2 23:52:55 2024 |
2 | +++ ssl/hidden/ssl_namespace.h 2023-03-15 17:28:04.685309300 -0600 | 2 | +++ ssl/hidden/ssl_namespace.h Fri Aug 2 23:53:17 2024 |
3 | @@ -23,6 +23,11 @@ | 3 | @@ -23,6 +23,11 @@ |
4 | * and we alias that to the normal name. | 4 | * and we alias that to the normal name. |
5 | */ | 5 | */ |
@@ -12,7 +12,7 @@ | |||
12 | #ifdef LIBRESSL_NAMESPACE | 12 | #ifdef LIBRESSL_NAMESPACE |
13 | #define LSSL_UNUSED(x) typeof(x) x __attribute__((deprecated)) | 13 | #define LSSL_UNUSED(x) typeof(x) x __attribute__((deprecated)) |
14 | #define LSSL_USED(x) __attribute__((visibility("hidden"))) \ | 14 | #define LSSL_USED(x) __attribute__((visibility("hidden"))) \ |
15 | @@ -33,5 +38,6 @@ | 15 | @@ -37,5 +42,6 @@ |
16 | #define LSSL_USED(x) | 16 | #define LSSL_USED(x) |
17 | #define LSSL_ALIAS(x) asm("") | 17 | #define LSSL_ALIAS(x) asm("") |
18 | #endif | 18 | #endif |
diff --git a/patches/tls_config.c.patch b/patches/tls_config.c.patch new file mode 100644 index 0000000..1342a60 --- /dev/null +++ b/patches/tls_config.c.patch | |||
@@ -0,0 +1,15 @@ | |||
1 | uid_t can be 64-bit | ||
2 | |||
3 | --- tls/tls_config.c.orig 2024-11-02 21:19:47.090322191 +0100 | ||
4 | +++ tls/tls_config.c 2024-11-02 21:38:22.527071689 +0100 | ||
5 | @@ -742,8 +742,8 @@ | ||
6 | |||
7 | if (sb.st_uid != getuid()) { | ||
8 | tls_config_set_errorx(config, TLS_ERROR_UNKNOWN, | ||
9 | - "session file has incorrect owner (uid %u != %u)", | ||
10 | - sb.st_uid, getuid()); | ||
11 | + "session file has incorrect owner (uid %llu != %llu)", | ||
12 | + (unsigned long long)sb.st_uid, (unsigned long long)getuid()); | ||
13 | return (-1); | ||
14 | } | ||
15 | mugo = sb.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO); | ||