[arch-commits] Commit in vde2/trunk (2 files)

Jan de Groot jgc at archlinux.org
Mon Mar 20 23:00:38 UTC 2017


    Date: Monday, March 20, 2017 @ 23:00:38
  Author: jgc
Revision: 291136

upgpkg: vde2 2.3.2-10

OpenSSL 1.1

Added:
  vde2/trunk/vde_cryptcab-compile-against-openssl-1.1.0.patch
Modified:
  vde2/trunk/PKGBUILD

--------------------------------------------------+
 PKGBUILD                                         |   23 +++--
 vde_cryptcab-compile-against-openssl-1.1.0.patch |   92 +++++++++++++++++++++
 2 files changed, 107 insertions(+), 8 deletions(-)

Modified: PKGBUILD
===================================================================
--- PKGBUILD	2017-03-20 21:50:14 UTC (rev 291135)
+++ PKGBUILD	2017-03-20 23:00:38 UTC (rev 291136)
@@ -3,14 +3,15 @@
 # Maintainer: Tobias Powalowski <tpowa at archlinux.org>
 pkgname=vde2
 pkgver=2.3.2
-pkgrel=9
+pkgrel=10
 pkgdesc="Virtual Distributed Ethernet for emulators like qemu"
-url="http://sourceforge.net/projects/vde/"
+url="https://sourceforge.net/projects/vde/"
 license=("GPL" "LGPL" "CUSTOM")
 arch=('i686' 'x86_64')
 depends=('bash' 'libpcap' 'openssl')
 makedepends=('python')
-source=(http://downloads.sourceforge.net/vde/$pkgname-$pkgver.tar.bz2
+source=(https://downloads.sourceforge.net/vde/$pkgname-$pkgver.tar.bz2
+        vde_cryptcab-compile-against-openssl-1.1.0.patch
         dhcpd.conf.sample
         iptables.rules.sample
         vde-config.sample
@@ -17,7 +18,18 @@
         vde-connection.sample)
 install=vde2.install
 options=(!makeflags)
+sha256sums=('cbea9b7e03097f87a6b5e98b07890d2275848f1fe4b9fcda77b8994148bc9542'
+            '110370a5f48f1e241d43f8bb5e3ea6d2ca7d2c1949e1cf672d03bfc897f2e11f'
+            'da0e2766dc63069da929c28126831ad5fdddcc4a04105a21217d78832c7ca1bc'
+            '99076d7466cd99673dbe91ef83865187e7868177959b38e125df63eea957f83e'
+            '5727c215646333c37b26388146cd3e6b3814b88d60d54051d7da99e00c0aef87'
+            '5139110ed6d5d1174bf12971512dac5196d9d07df46dd393d7b1cd083118fe9b')
 
+prepare() {
+  cd $pkgname-$pkgver
+  patch -Np1 -i ../vde_cryptcab-compile-against-openssl-1.1.0.patch
+}
+
 build() {
   cd $srcdir/$pkgname-$pkgver
   ./configure --prefix=/usr --sbindir=/usr/bin --sysconfdir=/etc --libexecdir=/usr/lib/vde2 \
@@ -35,8 +47,3 @@
   # install slirp license
   install -D -m 644 COPYING.slirpvde $pkgdir/usr/share/licenses/vde2/COPYING.slirpvde
 }
-md5sums=('46fbc5f97f03dc517aa3b2c9d9ea6628'
-         '7d9bc56d2e561d849e915000d1c0f269'
-         'a920123fc620bcedbccb703a8d1bdc55'
-         'f47d3372382dc9d67c1174d2796729fe'
-         '63033c33565e2030541c5e05e9d9b063')

Added: vde_cryptcab-compile-against-openssl-1.1.0.patch
===================================================================
--- vde_cryptcab-compile-against-openssl-1.1.0.patch	                        (rev 0)
+++ vde_cryptcab-compile-against-openssl-1.1.0.patch	2017-03-20 23:00:38 UTC (rev 291136)
@@ -0,0 +1,92 @@
+--- a/src/vde_cryptcab/cryptcab.c	2011-11-23 16:41:17.000000000 +0000
++++ b/src/vde_cryptcab/cryptcab.c	2017-03-20 22:54:20.452975075 +0000
+@@ -22,7 +22,7 @@
+ 	exit(1);
+ }
+ 	
+-static EVP_CIPHER_CTX ctx;
++static EVP_CIPHER_CTX *ctx;
+ static int ctx_initialized = 0;
+ static int encryption_disabled = 0;
+ static int nfd;
+@@ -30,6 +30,10 @@
+ static struct vde_open_args open_args={.port=0,.group=NULL,.mode=0700};
+ static int verbose = 0;
+ 
++#if OPENSSL_VERSION_NUMBER < 0x10100000
++#define EVP_CIPHER_CTX_reset(x)	EVP_CIPHER_CTX_cleanup(x)
++#endif
++
+ void vc_printlog(int priority, const char *format, ...)
+ {
+ 	va_list arg;
+@@ -103,19 +107,21 @@
+ 	}
+ 
+ 	if (!ctx_initialized) {
+-		EVP_CIPHER_CTX_init (&ctx);
++		ctx = EVP_CIPHER_CTX_new ();
++		if (!ctx)
++			return -1;
+ 		ctx_initialized = 1;
+ 	}
+ 	
+-	EVP_EncryptInit (&ctx, EVP_bf_cbc (), p->key, p->iv);
+-	if (EVP_EncryptUpdate (&ctx, dst, &olen, src, len) != 1)
++	EVP_EncryptInit (ctx, EVP_bf_cbc (), p->key, p->iv);
++	if (EVP_EncryptUpdate (ctx, dst, &olen, src, len) != 1)
+ 	{
+ 		fprintf (stderr,"error in encrypt update\n");
+ 		olen = -1;
+ 		goto cleanup;
+ 	}
+ 
+-	if (EVP_EncryptFinal (&ctx, dst + olen, &tlen) != 1)
++	if (EVP_EncryptFinal (ctx, dst + olen, &tlen) != 1)
+ 	{
+ 		fprintf (stderr,"error in encrypt final\n");
+ 		olen = -1;
+@@ -124,7 +130,7 @@
+ 	olen += tlen;
+ 
+ cleanup:
+-	EVP_CIPHER_CTX_cleanup(&ctx);	
++	EVP_CIPHER_CTX_reset(ctx);
+ 	return olen;
+ }
+ 
+@@ -138,19 +144,21 @@
+ 	}
+ 	
+ 	if (!ctx_initialized) {
+-		EVP_CIPHER_CTX_init (&ctx);
++		ctx = EVP_CIPHER_CTX_new ();
++		if (!ctx)
++			return -1;
+ 		ctx_initialized = 1;
+ 	}
+ 
+-	EVP_DecryptInit (&ctx, EVP_bf_cbc (), p->key, p->iv);
+-	if (EVP_DecryptUpdate (&ctx, dst, &olen, src, len) != 1)
++	EVP_DecryptInit (ctx, EVP_bf_cbc (), p->key, p->iv);
++	if (EVP_DecryptUpdate (ctx, dst, &olen, src, len) != 1)
+ 	{
+ 		fprintf (stderr,"error in decrypt update\n");
+ 		olen = -1;
+ 		goto cleanup;
+ 	}
+ 
+-	if (EVP_DecryptFinal (&ctx, dst + olen, &tlen) != 1)
++	if (EVP_DecryptFinal (ctx, dst + olen, &tlen) != 1)
+ 	{
+ 		fprintf (stderr,"error in decrypt final\n");
+ 		olen = -1;
+@@ -159,7 +167,7 @@
+ 	olen += tlen;
+ 
+ cleanup:
+-	EVP_CIPHER_CTX_cleanup(&ctx);	
++	EVP_CIPHER_CTX_reset (ctx);
+ 	return olen;
+ }
+ 


More information about the arch-commits mailing list