Package: openssh / 1:6.6p1-4~bpo70+1

no-openssl-version-check.patch Patch series | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
From 20690ea4b33e8ff81fea287492270df3a7029777 Mon Sep 17 00:00:00 2001
From: Philip Hands <phil@hands.com>
Date: Sun, 9 Feb 2014 16:10:14 +0000
Subject: Disable OpenSSL version check

OpenSSL's SONAME is sufficient nowadays.

Author: Colin Watson <cjwatson@debian.org>
Bug-Debian: http://bugs.debian.org/93581
Bug-Debian: http://bugs.debian.org/664383
Forwarded: not-needed
Last-Update: 2013-12-23

Patch-Name: no-openssl-version-check.patch
---
 entropy.c | 12 ------------
 1 file changed, 12 deletions(-)

diff --git a/entropy.c b/entropy.c
index 2d483b3..2aee2d9 100644
--- a/entropy.c
+++ b/entropy.c
@@ -209,18 +209,6 @@ seed_rng(void)
 #ifndef OPENSSL_PRNG_ONLY
 	unsigned char buf[RANDOM_SEED_SIZE];
 #endif
-	/*
-	 * OpenSSL version numbers: MNNFFPPS: major minor fix patch status
-	 * We match major, minor, fix and status (not patch) for <1.0.0.
-	 * After that, we acceptable compatible fix versions (so we
-	 * allow 1.0.1 to work with 1.0.0). Going backwards is only allowed
-	 * within a patch series.
-	 */
-	u_long version_mask = SSLeay() >= 0x1000000f ?  ~0xffff0L : ~0xff0L;
-	if (((SSLeay() ^ OPENSSL_VERSION_NUMBER) & version_mask) ||
-	    (SSLeay() >> 12) < (OPENSSL_VERSION_NUMBER >> 12))
-		fatal("OpenSSL version mismatch. Built against %lx, you "
-		    "have %lx", (u_long)OPENSSL_VERSION_NUMBER, SSLeay());
 
 #ifndef OPENSSL_PRNG_ONLY
 	if (RAND_status() == 1) {