Package: openssl / 3.5.2-1

Metadata

Package Version Patches format
openssl 3.5.2-1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
debian targets.patch | (download)

Configurations/20-debian.conf | 163 163 + 0 - 0 !
1 file changed, 163 insertions(+)

 debian-targets


man section.patch | (download)

Configurations/unix-Makefile.tmpl | 5 3 + 2 - 0 !
1 file changed, 3 insertions(+), 2 deletions(-)

 man-section


no symbolic.patch | (download)

Configurations/shared-info.pl | 2 1 + 1 - 0 !
1 file changed, 1 insertion(+), 1 deletion(-)

 no-symbolic


pic.patch | (download)

crypto/des/asm/desboth.pl | 17 14 + 3 - 0 !
crypto/perlasm/cbc.pl | 24 20 + 4 - 0 !
crypto/perlasm/x86gas.pl | 16 16 + 0 - 0 !
crypto/x86cpuid.pl | 10 5 + 5 - 0 !
4 files changed, 55 insertions(+), 12 deletions(-)

 pic


c_rehash compat.patch | (download)

tools/c_rehash.in | 19 8 + 11 - 0 !
1 file changed, 8 insertions(+), 11 deletions(-)

 also create old hash for compatibility


Configure allow to enable ktls if target does not start w.patch | (download)

Configurations/10-main.conf | 2 1 + 1 - 0 !
Configure | 2 1 + 1 - 0 !
2 files changed, 2 insertions(+), 2 deletions(-)

 configure: allow to enable ktls if target does not start with linux

The Debian build system uses a `debian' target which sets CFLAGS and
then we have for instance debian-amd64 which inherits from
linux-x86_64 and debian. So far so good.

Since the target name does not start with `linux', the build system does not
enable ktls. So in order to get enabled, I
added a
        `enable           => [ "ktls" ],'
to the generic linux config which sets it explicit). Having this set, we can
check for it instead matching the target name.

This commit is based on changes for afalgeng in commit
   9e381e8a01859 ("Configure: allow to enable afalgeng if target does not start with Linux")

Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>

conf Serialize allocation free of ssl_names.patch | (download)

crypto/conf/conf_ssl.c | 35 32 + 3 - 0 !
1 file changed, 32 insertions(+), 3 deletions(-)

 conf: serialize allocation/free of ssl_names.

The access to `ssl_names' is not fully serialized. With multiple threads
it is possible that more than one thread starts to clean up `ssl_names'.
This leads to occasional segfaults if more than one terminates and
performs the clean up.

Fixes: #19243

Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc>