Package: openssl / 3.0.17-1~deb12u2
Metadata
| Package | Version | Patches format |
|---|---|---|
| openssl | 3.0.17-1~deb12u2 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| debian targets.patch | (download) |
Configurations/20-debian.conf |
169 169 + 0 - 0 ! |
debian-targets |
| man section.patch | (download) |
Configurations/unix-Makefile.tmpl |
5 3 + 2 - 0 ! |
man-section |
| no symbolic.patch | (download) |
Configurations/shared-info.pl |
2 1 + 1 - 0 ! |
no-symbolic |
| pic.patch | (download) |
crypto/des/asm/desboth.pl |
17 14 + 3 - 0 ! |
pic |
| c_rehash compat.patch | (download) |
tools/c_rehash.in |
19 8 + 11 - 0 ! |
also create old hash for compatibility |
| Configure allow to enable ktls if target does not start w.patch | (download) |
Configurations/10-main.conf |
2 1 + 1 - 0 ! |
configure: allow to enable ktls if target does not start with linux
The Debian build system uses a `debian' target which sets CFLAGS and
then we have for instance debian-amd64 which inherits from
linux-x86_64 and debian. So far so good.
Since the target name does not start with `linux', the build system does not
enable ktls. So in order to get enabled, I
added a
`enable => [ "ktls" ],'
to the generic linux config which sets it explicit). Having this set, we can
check for it instead matching the target name.
This commit is based on changes for afalgeng in commit
9e381e8a01859 ("Configure: allow to enable afalgeng if target does not start with Linux")
Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
|
| Remove the provider section.patch | (download) |
apps/openssl.cnf |
8 4 + 4 - 0 ! |
remove the provider section. The provider section breaks libssl1.1 users. Remove it for now. Link: https://bugs.debian.org/1011051 Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc> |
| conf Serialize allocation free of ssl_names.patch | (download) |
crypto/conf/conf_ssl.c |
35 32 + 3 - 0 ! |
conf: serialize allocation/free of ssl_names. The access to `ssl_names' is not fully serialized. With multiple threads it is possible that more than one thread starts to clean up `ssl_names'. This leads to occasional segfaults if more than one terminates and performs the clean up. Fixes: #19243 Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc> |
| Fix tests for new default security level.patch | (download) |
test/ssl-tests/12-ct.cnf |
24 12 + 12 - 0 ! |
fix tests for new default security level Fix tests that were expecting a default security level of 1 to work with the new default of 2. |
| Revert Drop by store s by_store_subject_ex.patch | (download) |
crypto/x509/by_store.c |
18 13 + 5 - 0 ! |
revert "drop "by store"'s by_store_subject_ex()"
This reverts commit 7141330fb98ce ("Drop "by store"'s by_store_subject_ex()").
Avoid crashes in users, see https://bugs.debian.org/1110254
Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
|
| Revert Rework the by store X509_LOOKUP method to open the.patch | (download) |
crypto/x509/by_store.c |
111 27 + 84 - 0 ! |
revert "rework the "by store" x509_lookup method to open the given
URI early"
This reverts commit 340383f5f49f8 ("Rework the "by store" X509_LOOKUP method to open the given URI early")
Avoid crashes in users, see https://bugs.debian.org/1110254
Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
|
| Revert Add test_verify tests.patch | (download) |
test/recipes/25-test_verify.t |
39 5 + 34 - 0 ! |
revert "add test_verify tests"
This reverts commit a468bdb02531e ("Add test_verify tests")
Avoid crashes in users, see https://bugs.debian.org/1110254
Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>
|
