[Pkg-openssl-changes] r724 - openssl/branches/squeeze/debian/patches
Kurt Roeckx
kroeckx at moszumanska.debian.org
Fri Mar 20 21:22:40 UTC 2015
Author: kroeckx
Date: 2015-03-20 21:22:40 +0000 (Fri, 20 Mar 2015)
New Revision: 724
Modified:
openssl/branches/squeeze/debian/patches/0009-Fix-unsigned-signed-warnings.patch
Log:
Make patch apply.
Modified: openssl/branches/squeeze/debian/patches/0009-Fix-unsigned-signed-warnings.patch
===================================================================
--- openssl/branches/squeeze/debian/patches/0009-Fix-unsigned-signed-warnings.patch 2015-03-20 21:14:16 UTC (rev 723)
+++ openssl/branches/squeeze/debian/patches/0009-Fix-unsigned-signed-warnings.patch 2015-03-20 21:22:40 UTC (rev 724)
@@ -14,9 +14,9 @@
Index: openssl-0.9.8o/ssl/s2_srvr.c
===================================================================
---- openssl-0.9.8o.orig/ssl/s2_srvr.c
-+++ openssl-0.9.8o/ssl/s2_srvr.c
-@@ -363,7 +363,8 @@ end:
+--- openssl-0.9.8o.orig/ssl/s2_srvr.c 2015-03-20 21:19:37.000000000 +0000
++++ openssl-0.9.8o/ssl/s2_srvr.c 2015-03-20 21:20:19.396662316 +0000
+@@ -363,7 +363,8 @@
static int get_client_master_key(SSL *s)
{
@@ -26,7 +26,7 @@
unsigned long len;
unsigned char *p;
SSL_CIPHER *cp;
-@@ -481,7 +482,7 @@ static int get_client_master_key(SSL *s)
+@@ -481,7 +482,7 @@
* must be zero).
*/
if ((!is_export && s->s2->tmp.clear != 0) ||
@@ -35,7 +35,7 @@
ssl2_return_error(s, SSL2_PE_UNDEFINED_ERROR);
SSLerr(SSL_F_GET_CLIENT_MASTER_KEY,SSL_R_BAD_LENGTH);
return -1;
-@@ -492,7 +493,7 @@ static int get_client_master_key(SSL *s)
+@@ -492,7 +493,7 @@
* bytes to fit the key in the buffer, stop now.
*/
if ((is_export && s->s2->tmp.enc < ek) ||
@@ -44,12 +44,12 @@
ssl2_return_error(s,SSL2_PE_UNDEFINED_ERROR);
SSLerr(SSL_F_GET_CLIENT_MASTER_KEY,SSL_R_LENGTH_TOO_SHORT);
return -1;
-@@ -509,7 +510,7 @@ static int get_client_master_key(SSL *s)
+@@ -509,7 +510,7 @@
/* If a bad decrypt, continue with protocol but with a
* random master secret (Bleichenbacher attack) */
if ((i < 0) || ((!is_export && i != EVP_CIPHER_key_length(c))
-- || (is_export && i != ek))) {
-+ || (is_export && i != (int)ek))) {
+- || (is_export && i != ek)))
++ || (is_export && i != (int)ek)))
{
ERR_clear_error();
if (is_export)
More information about the Pkg-openssl-changes
mailing list