aboutsummaryrefslogtreecommitdiff
path: root/patches
diff options
context:
space:
mode:
Diffstat (limited to 'patches')
-rw-r--r--patches/crypto_arch.h.patch34
-rw-r--r--patches/crypto_namespace.h.patch6
-rw-r--r--patches/netcat.c.patch20
-rw-r--r--patches/openssl.c.patch6
-rw-r--r--patches/opensslfeatures.h.patch22
-rw-r--r--patches/patch-aarch64-crypto-cpu-caps.c.patch39
-rw-r--r--patches/patch-amd64-crypto-cpu-caps.c.patch20
-rw-r--r--patches/patch-i386-crypto-cpu-caps.c.patch20
-rw-r--r--patches/speed.c.patch27
-rw-r--r--patches/ssl_namespace.h.patch6
-rw-r--r--patches/tls_config.c.patch15
11 files changed, 183 insertions, 32 deletions
diff --git a/patches/crypto_arch.h.patch b/patches/crypto_arch.h.patch
new file mode 100644
index 0000000..6c889e5
--- /dev/null
+++ b/patches/crypto_arch.h.patch
@@ -0,0 +1,34 @@
1--- crypto/arch/amd64/crypto_arch.h.orig Fri Feb 14 06:00:43 2025
2+++ crypto/arch/amd64/crypto_arch.h Fri Feb 14 06:01:13 2025
3@@ -40,6 +40,7 @@ extern uint64_t crypto_cpu_caps_amd64;
4 #define HAVE_RC4_INTERNAL
5 #define HAVE_RC4_SET_KEY_INTERNAL
6
7+#if 0
8 #define HAVE_SHA1_BLOCK_DATA_ORDER
9 #define HAVE_SHA1_BLOCK_GENERIC
10
11@@ -48,6 +49,7 @@ extern uint64_t crypto_cpu_caps_amd64;
12
13 #define HAVE_SHA512_BLOCK_DATA_ORDER
14 #define HAVE_SHA512_BLOCK_GENERIC
15+#endif
16
17 #endif
18
19--- crypto/arch/aarch64/crypto_arch.h.orig Thu Mar 13 05:42:37 2025
20+++ crypto/arch/aarch64/crypto_arch.h Thu Mar 13 05:47:39 2025
21@@ -33,11 +33,13 @@
22 #define CRYPTO_CPU_CAPS_AARCH64_SHA512 (1ULL << 4)
23 #define CRYPTO_CPU_CAPS_AARCH64_SHA3 (1ULL << 5)
24
25+#if 0
26 #ifndef OPENSSL_NO_ASM
27
28 #define HAVE_SHA256_BLOCK_DATA_ORDER
29 #define HAVE_SHA512_BLOCK_DATA_ORDER
30
31+#endif
32 #endif
33
34 #endif
diff --git a/patches/crypto_namespace.h.patch b/patches/crypto_namespace.h.patch
index c18f0da..400030f 100644
--- a/patches/crypto_namespace.h.patch
+++ b/patches/crypto_namespace.h.patch
@@ -1,5 +1,5 @@
1--- crypto/hidden/crypto_namespace.h.orig 2024-04-09 10:12:22.320737957 +0200 1--- crypto/hidden/crypto_namespace.h.orig Fri Aug 2 23:52:55 2024
2+++ crypto/hidden/crypto_namespace.h 2024-04-11 09:09:31.163350515 +0200 2+++ crypto/hidden/crypto_namespace.h Fri Aug 2 23:53:17 2024
3@@ -24,6 +24,12 @@ 3@@ -24,6 +24,12 @@
4 * external calls use the latter name. 4 * external calls use the latter name.
5 */ 5 */
@@ -13,7 +13,7 @@
13 #ifdef LIBRESSL_NAMESPACE 13 #ifdef LIBRESSL_NAMESPACE
14 #ifdef LIBRESSL_CRYPTO_NAMESPACE 14 #ifdef LIBRESSL_CRYPTO_NAMESPACE
15 # define LCRYPTO_UNUSED(x) __attribute__((deprecated)) \ 15 # define LCRYPTO_UNUSED(x) __attribute__((deprecated)) \
16@@ -43,5 +49,6 @@ 16@@ -47,5 +53,6 @@
17 # define LCRYPTO_ALIAS1(pre,x) 17 # define LCRYPTO_ALIAS1(pre,x)
18 # define LCRYPTO_ALIAS(x) asm("") 18 # define LCRYPTO_ALIAS(x) asm("")
19 #endif 19 #endif
diff --git a/patches/netcat.c.patch b/patches/netcat.c.patch
index 9c3a450..319aca6 100644
--- a/patches/netcat.c.patch
+++ b/patches/netcat.c.patch
@@ -1,5 +1,5 @@
1--- apps/nc/netcat.c.orig Tue Aug 15 15:17:28 2023 1--- apps/nc/netcat.c.orig Sat Aug 17 03:21:05 2024
2+++ apps/nc/netcat.c Tue Aug 15 15:17:54 2023 2+++ apps/nc/netcat.c Sat Aug 17 03:28:50 2024
3@@ -93,9 +93,13 @@ int zflag; /* Port Scan Flag */ 3@@ -93,9 +93,13 @@ int zflag; /* Port Scan Flag */
4 int Dflag; /* sodebug */ 4 int Dflag; /* sodebug */
5 int Iflag; /* TCP receive buffer size */ 5 int Iflag; /* TCP receive buffer size */
@@ -53,7 +53,7 @@
53 53
54 /* Cruft to make sure options are clean, and used properly. */ 54 /* Cruft to make sure options are clean, and used properly. */
55 if (argc == 1 && family == AF_UNIX) { 55 if (argc == 1 && family == AF_UNIX) {
56@@ -927,7 +937,10 @@ remote_connect(const char *host, const char *port, str 56@@ -923,7 +933,10 @@ remote_connect(const char *host, const char *port, str
57 char *ipaddr) 57 char *ipaddr)
58 { 58 {
59 struct addrinfo *res, *res0; 59 struct addrinfo *res, *res0;
@@ -65,7 +65,7 @@
65 65
66 if ((error = getaddrinfo(host, port, &hints, &res0))) 66 if ((error = getaddrinfo(host, port, &hints, &res0)))
67 errx(1, "getaddrinfo for host \"%s\" port %s: %s", host, 67 errx(1, "getaddrinfo for host \"%s\" port %s: %s", host,
68@@ -942,8 +955,10 @@ remote_connect(const char *host, const char *port, str 68@@ -938,8 +951,10 @@ remote_connect(const char *host, const char *port, str
69 if (sflag || pflag) { 69 if (sflag || pflag) {
70 struct addrinfo ahints, *ares; 70 struct addrinfo ahints, *ares;
71 71
@@ -76,7 +76,7 @@
76 memset(&ahints, 0, sizeof(struct addrinfo)); 76 memset(&ahints, 0, sizeof(struct addrinfo));
77 ahints.ai_family = res->ai_family; 77 ahints.ai_family = res->ai_family;
78 ahints.ai_socktype = uflag ? SOCK_DGRAM : SOCK_STREAM; 78 ahints.ai_socktype = uflag ? SOCK_DGRAM : SOCK_STREAM;
79@@ -1035,7 +1050,10 @@ int 79@@ -1031,7 +1046,10 @@ int
80 local_listen(const char *host, const char *port, struct addrinfo hints) 80 local_listen(const char *host, const char *port, struct addrinfo hints)
81 { 81 {
82 struct addrinfo *res, *res0; 82 struct addrinfo *res, *res0;
@@ -88,7 +88,7 @@
88 int error; 88 int error;
89 89
90 /* Allow nodename to be null. */ 90 /* Allow nodename to be null. */
91@@ -1056,9 +1074,11 @@ local_listen(const char *host, const char *port, struc 91@@ -1052,9 +1070,11 @@ local_listen(const char *host, const char *port, struc
92 res->ai_protocol)) == -1) 92 res->ai_protocol)) == -1)
93 continue; 93 continue;
94 94
@@ -100,7 +100,7 @@
100 100
101 set_common_sockopts(s, res->ai_family); 101 set_common_sockopts(s, res->ai_family);
102 102
103@@ -1563,11 +1583,13 @@ set_common_sockopts(int s, int af) 103@@ -1559,11 +1579,13 @@ set_common_sockopts(int s, int af)
104 { 104 {
105 int x = 1; 105 int x = 1;
106 106
@@ -114,7 +114,7 @@
114 if (Dflag) { 114 if (Dflag) {
115 if (setsockopt(s, SOL_SOCKET, SO_DEBUG, 115 if (setsockopt(s, SOL_SOCKET, SO_DEBUG,
116 &x, sizeof(x)) == -1) 116 &x, sizeof(x)) == -1)
117@@ -1578,9 +1600,16 @@ set_common_sockopts(int s, int af) 117@@ -1574,9 +1596,16 @@ set_common_sockopts(int s, int af)
118 IP_TOS, &Tflag, sizeof(Tflag)) == -1) 118 IP_TOS, &Tflag, sizeof(Tflag)) == -1)
119 err(1, "set IP ToS"); 119 err(1, "set IP ToS");
120 120
@@ -131,7 +131,7 @@
131 } 131 }
132 if (Iflag) { 132 if (Iflag) {
133 if (setsockopt(s, SOL_SOCKET, SO_RCVBUF, 133 if (setsockopt(s, SOL_SOCKET, SO_RCVBUF,
134@@ -1604,13 +1633,17 @@ set_common_sockopts(int s, int af) 134@@ -1600,13 +1629,17 @@ set_common_sockopts(int s, int af)
135 } 135 }
136 136
137 if (minttl != -1) { 137 if (minttl != -1) {
@@ -150,7 +150,7 @@
150 } 150 }
151 } 151 }
152 152
153@@ -1835,15 +1868,19 @@ help(void) 153@@ -1831,15 +1864,19 @@ help(void)
154 \t-P proxyuser\tUsername for proxy authentication\n\ 154 \t-P proxyuser\tUsername for proxy authentication\n\
155 \t-p port\t Specify local port for remote connects\n\ 155 \t-p port\t Specify local port for remote connects\n\
156 \t-R CAfile CA bundle\n\ 156 \t-R CAfile CA bundle\n\
diff --git a/patches/openssl.c.patch b/patches/openssl.c.patch
index 15afb78..5ba5ac6 100644
--- a/patches/openssl.c.patch
+++ b/patches/openssl.c.patch
@@ -1,6 +1,6 @@
1--- apps/openssl/openssl.c.orig Mon Mar 4 13:39:56 2024 1--- apps/openssl/openssl.c.orig Thu Jan 2 08:27:54 2025
2+++ apps/openssl/openssl.c Mon Mar 4 13:40:15 2024 2+++ apps/openssl/openssl.c Thu Jan 2 08:28:04 2025
3@@ -348,7 +348,9 @@ 3@@ -344,7 +344,9 @@ BIO *bio_err = NULL;
4 static void 4 static void
5 openssl_startup(void) 5 openssl_startup(void)
6 { 6 {
diff --git a/patches/opensslfeatures.h.patch b/patches/opensslfeatures.h.patch
index 618de73..77df5dc 100644
--- a/patches/opensslfeatures.h.patch
+++ b/patches/opensslfeatures.h.patch
@@ -14,3 +14,25 @@
14 #define OPENSSL_THREADS 14 #define OPENSSL_THREADS
15 15
16 #define OPENSSL_NO_BUF_FREELISTS 16 #define OPENSSL_NO_BUF_FREELISTS
17--- crypto/crypto_internal.h.orig Sat Dec 14 14:15:39 2024
18+++ crypto/crypto_internal.h Sat Dec 14 14:15:52 2024
19@@ -15,6 +15,8 @@
20 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21 */
22
23+#include <openssl/opensslfeatures.h>
24+
25 #include <endian.h>
26 #include <stddef.h>
27 #include <stdint.h>
28--- tests/parse_test_file.h.orig Thu Dec 26 01:13:00 2024
29+++ tests/parse_test_file.h Thu Dec 26 01:13:27 2024
30@@ -22,6 +22,8 @@
31 #include <stdint.h>
32 #include <stdio.h>
33
34+#include <openssl/opensslfeatures.h>
35+
36 #include "bytestring.h"
37
38 #if defined(__cplusplus)
diff --git a/patches/patch-aarch64-crypto-cpu-caps.c.patch b/patches/patch-aarch64-crypto-cpu-caps.c.patch
new file mode 100644
index 0000000..dcfbdc0
--- /dev/null
+++ b/patches/patch-aarch64-crypto-cpu-caps.c.patch
@@ -0,0 +1,39 @@
1Disable feature detection until we find a more portable way.
2
3--- crypto/arch/aarch64/crypto_cpu_caps.c.orig Sat Dec 14 13:45:16 2024
4+++ crypto/arch/aarch64/crypto_cpu_caps.c Sat Dec 14 13:54:06 2024
5@@ -16,9 +16,12 @@
6 */
7
8 #include <sys/types.h>
9+
10+#if defined(__OpenBSD__)
11 #include <sys/sysctl.h>
12
13 #include <machine/cpu.h>
14+#endif
15
16 #include <stddef.h>
17 #include <stdio.h>
18@@ -67,6 +70,7 @@ parse_isar0(uint64_t isar0)
19 return caps;
20 }
21
22+#if defined(__OpenBSD__)
23 static int
24 read_isar0(uint64_t *isar0)
25 {
26@@ -84,6 +88,13 @@ read_isar0(uint64_t *isar0)
27
28 return 1;
29 }
30+#else
31+static int
32+read_isar0(uint64_t *isar0)
33+{
34+ return 0;
35+}
36+#endif
37
38 void
39 crypto_cpu_caps_init(void)
diff --git a/patches/patch-amd64-crypto-cpu-caps.c.patch b/patches/patch-amd64-crypto-cpu-caps.c.patch
new file mode 100644
index 0000000..5fd7524
--- /dev/null
+++ b/patches/patch-amd64-crypto-cpu-caps.c.patch
@@ -0,0 +1,20 @@
1--- crypto/arch/amd64/crypto_cpu_caps.c.orig Sat Dec 14 13:45:16 2024
2+++ crypto/arch/amd64/crypto_cpu_caps.c Sat Dec 14 13:54:06 2024
3@@ -37,7 +37,7 @@ cpuid(uint32_t eax, uint32_t *out_eax, uint32_t *out_e
4 {
5 uint32_t ebx = 0, ecx = 0, edx = 0;
6
7-#ifndef OPENSSL_NO_ASM
8+#if defined(__GNUC__) && !defined(OPENSSL_NO_ASM)
9 __asm__ ("cpuid": "+a"(eax), "+b"(ebx), "+c"(ecx), "+d"(edx));
10 #else
11 eax = 0;
12@@ -58,7 +58,7 @@ xgetbv(uint32_t ecx, uint32_t *out_eax, uint32_t *out_
13 {
14 uint32_t eax = 0, edx = 0;
15
16-#ifndef OPENSSL_NO_ASM
17+#if defined(__GNUC__) && !defined(OPENSSL_NO_ASM)
18 __asm__ ("xgetbv": "+a"(eax), "+c"(ecx), "+d"(edx));
19 #endif
20
diff --git a/patches/patch-i386-crypto-cpu-caps.c.patch b/patches/patch-i386-crypto-cpu-caps.c.patch
new file mode 100644
index 0000000..c85e33c
--- /dev/null
+++ b/patches/patch-i386-crypto-cpu-caps.c.patch
@@ -0,0 +1,20 @@
1--- crypto/arch/i386/crypto_cpu_caps.c.orig Fri Oct 18 17:35:20 2024
2+++ crypto/arch/i386/crypto_cpu_caps.c Fri Oct 18 17:39:13 2024
3@@ -33,7 +33,7 @@ cpuid(uint32_t eax, uint32_t *out_eax, uint32_t *out_e
4 {
5 uint32_t ebx = 0, ecx = 0, edx = 0;
6
7-#ifndef OPENSSL_NO_ASM
8+#if defined(__GNUC__) && !defined(OPENSSL_NO_ASM)
9 __asm__ ("cpuid": "+a"(eax), "+b"(ebx), "+c"(ecx), "+d"(edx));
10 #else
11 eax = 0;
12@@ -54,7 +54,7 @@ xgetbv(uint32_t ecx, uint32_t *out_eax, uint32_t *out_
13 {
14 uint32_t eax = 0, edx = 0;
15
16-#ifndef OPENSSL_NO_ASM
17+#if defined(__GNUC__) && !defined(OPENSSL_NO_ASM)
18 __asm__ ("xgetbv": "+a"(eax), "+c"(ecx), "+d"(edx));
19 #endif
20
diff --git a/patches/speed.c.patch b/patches/speed.c.patch
index c29ef4d..e1f1698 100644
--- a/patches/speed.c.patch
+++ b/patches/speed.c.patch
@@ -1,6 +1,6 @@
1--- apps/openssl/speed.c.orig Sat Jul 13 11:02:51 2024 1--- apps/openssl/speed.c.orig Thu Jan 2 08:04:28 2025
2+++ apps/openssl/speed.c Sat Jul 13 10:27:25 2024 2+++ apps/openssl/speed.c Thu Jan 2 08:04:38 2025
3@@ -161,7 +161,16 @@ 3@@ -158,7 +158,16 @@ static void
4 pkey_print_message(const char *str, const char *str2, 4 pkey_print_message(const char *str, const char *str2,
5 long num, int bits, int sec); 5 long num, int bits, int sec);
6 static void print_result(int alg, int run_no, int count, double time_used); 6 static void print_result(int alg, int run_no, int count, double time_used);
@@ -17,7 +17,7 @@
17 17
18 #define ALGOR_NUM 32 18 #define ALGOR_NUM 32
19 #define SIZE_NUM 5 19 #define SIZE_NUM 5
20@@ -430,8 +439,10 @@ 20@@ -1129,8 +1138,10 @@ speed_main(int argc, char **argv)
21 const EVP_CIPHER *evp_cipher = NULL; 21 const EVP_CIPHER *evp_cipher = NULL;
22 const EVP_MD *evp_md = NULL; 22 const EVP_MD *evp_md = NULL;
23 int decrypt = 0; 23 int decrypt = 0;
@@ -28,7 +28,7 @@
28 const char *errstr = NULL; 28 const char *errstr = NULL;
29 29
30 if (pledge("stdio proc", NULL) == -1) { 30 if (pledge("stdio proc", NULL) == -1) {
31@@ -506,6 +517,7 @@ 31@@ -1205,6 +1216,7 @@ speed_main(int argc, char **argv)
32 decrypt = 1; 32 decrypt = 1;
33 j--; /* Otherwise, -decrypt gets confused with an 33 j--; /* Otherwise, -decrypt gets confused with an
34 * algorithm. */ 34 * algorithm. */
@@ -36,7 +36,7 @@
36 } else if (argc > 0 && strcmp(*argv, "-multi") == 0) { 36 } else if (argc > 0 && strcmp(*argv, "-multi") == 0) {
37 argc--; 37 argc--;
38 argv++; 38 argv++;
39@@ -520,6 +532,7 @@ 39@@ -1219,6 +1231,7 @@ speed_main(int argc, char **argv)
40 } 40 }
41 j--; /* Otherwise, -multi gets confused with an 41 j--; /* Otherwise, -multi gets confused with an
42 * algorithm. */ 42 * algorithm. */
@@ -44,7 +44,7 @@
44 } else if (argc > 0 && strcmp(*argv, "-unaligned") == 0) { 44 } else if (argc > 0 && strcmp(*argv, "-unaligned") == 0) {
45 argc--; 45 argc--;
46 argv++; 46 argv++;
47@@ -851,7 +864,9 @@ 47@@ -1542,7 +1555,9 @@ speed_main(int argc, char **argv)
48 BIO_printf(bio_err, "-evp e use EVP e.\n"); 48 BIO_printf(bio_err, "-evp e use EVP e.\n");
49 BIO_printf(bio_err, "-decrypt time decryption instead of encryption (only EVP).\n"); 49 BIO_printf(bio_err, "-decrypt time decryption instead of encryption (only EVP).\n");
50 BIO_printf(bio_err, "-mr produce machine readable output.\n"); 50 BIO_printf(bio_err, "-mr produce machine readable output.\n");
@@ -54,7 +54,7 @@
54 BIO_printf(bio_err, "-unaligned n use buffers with offset n from proper alignment.\n"); 54 BIO_printf(bio_err, "-unaligned n use buffers with offset n from proper alignment.\n");
55 goto end; 55 goto end;
56 } 56 }
57@@ -860,8 +875,10 @@ 57@@ -1551,8 +1566,10 @@ speed_main(int argc, char **argv)
58 j++; 58 j++;
59 } 59 }
60 60
@@ -65,7 +65,7 @@
65 65
66 if (j == 0) { 66 if (j == 0) {
67 for (i = 0; i < ALGOR_NUM; i++) { 67 for (i = 0; i < ALGOR_NUM; i++) {
68@@ -933,11 +950,13 @@ 68@@ -1624,11 +1641,13 @@ speed_main(int argc, char **argv)
69 #define COND(c) (run && count<0x7fffffff) 69 #define COND(c) (run && count<0x7fffffff)
70 #define COUNT(d) (count) 70 #define COUNT(d) (count)
71 71
@@ -79,7 +79,7 @@
79 79
80 #ifndef OPENSSL_NO_MD4 80 #ifndef OPENSSL_NO_MD4
81 if (doit[D_MD4]) { 81 if (doit[D_MD4]) {
82@@ -1743,7 +1762,9 @@ 82@@ -2434,7 +2453,9 @@ speed_main(int argc, char **argv)
83 ecdh_doit[j] = 0; 83 ecdh_doit[j] = 0;
84 } 84 }
85 } 85 }
@@ -89,7 +89,7 @@
89 if (!mr) { 89 if (!mr) {
90 fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_VERSION)); 90 fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_VERSION));
91 fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_BUILT_ON)); 91 fprintf(stdout, "%s\n", SSLeay_version(SSLEAY_BUILT_ON));
92@@ -1899,11 +1920,15 @@ 92@@ -2590,11 +2611,15 @@ pkey_print_message(const char *str, const char *str2,
93 static void 93 static void
94 print_result(int alg, int run_no, int count, double time_used) 94 print_result(int alg, int run_no, int count, double time_used)
95 { 95 {
@@ -105,9 +105,10 @@
105 static char * 105 static char *
106 sstrsep(char **string, const char *delim) 106 sstrsep(char **string, const char *delim)
107 { 107 {
108@@ -2104,4 +2129,5 @@ 108@@ -2795,5 +2820,6 @@ do_multi(int multi)
109 free(fds); 109 free(fds);
110 return 1; 110 return 1;
111 } 111 }
112+#endif 112+#endif
113 #endif 113
114 #endif /* OPENSSL_NO_SPEED */
diff --git a/patches/ssl_namespace.h.patch b/patches/ssl_namespace.h.patch
index 758f8dc..eb9c7a2 100644
--- a/patches/ssl_namespace.h.patch
+++ b/patches/ssl_namespace.h.patch
@@ -1,5 +1,5 @@
1--- openbsd/src/lib/libssl/hidden/ssl_namespace.h 2023-03-15 11:41:52.481641800 -0600 1--- ssl/hidden/ssl_namespace.h.orig Fri Aug 2 23:52:55 2024
2+++ ssl/hidden/ssl_namespace.h 2023-03-15 17:28:04.685309300 -0600 2+++ ssl/hidden/ssl_namespace.h Fri Aug 2 23:53:17 2024
3@@ -23,6 +23,11 @@ 3@@ -23,6 +23,11 @@
4 * and we alias that to the normal name. 4 * and we alias that to the normal name.
5 */ 5 */
@@ -12,7 +12,7 @@
12 #ifdef LIBRESSL_NAMESPACE 12 #ifdef LIBRESSL_NAMESPACE
13 #define LSSL_UNUSED(x) typeof(x) x __attribute__((deprecated)) 13 #define LSSL_UNUSED(x) typeof(x) x __attribute__((deprecated))
14 #define LSSL_USED(x) __attribute__((visibility("hidden"))) \ 14 #define LSSL_USED(x) __attribute__((visibility("hidden"))) \
15@@ -33,5 +38,6 @@ 15@@ -37,5 +42,6 @@
16 #define LSSL_USED(x) 16 #define LSSL_USED(x)
17 #define LSSL_ALIAS(x) asm("") 17 #define LSSL_ALIAS(x) asm("")
18 #endif 18 #endif
diff --git a/patches/tls_config.c.patch b/patches/tls_config.c.patch
new file mode 100644
index 0000000..1342a60
--- /dev/null
+++ b/patches/tls_config.c.patch
@@ -0,0 +1,15 @@
1uid_t can be 64-bit
2
3--- tls/tls_config.c.orig 2024-11-02 21:19:47.090322191 +0100
4+++ tls/tls_config.c 2024-11-02 21:38:22.527071689 +0100
5@@ -742,8 +742,8 @@
6
7 if (sb.st_uid != getuid()) {
8 tls_config_set_errorx(config, TLS_ERROR_UNKNOWN,
9- "session file has incorrect owner (uid %u != %u)",
10- sb.st_uid, getuid());
11+ "session file has incorrect owner (uid %llu != %llu)",
12+ (unsigned long long)sb.st_uid, (unsigned long long)getuid());
13 return (-1);
14 }
15 mugo = sb.st_mode & (S_IRWXU|S_IRWXG|S_IRWXO);