[Pkg-openssl-changes] r900 - in openssl/branches/openssl1.0/debian: . patches

Kurt Roeckx kroeckx at moszumanska.debian.org
Thu May 25 21:11:33 UTC 2017


Author: kroeckx
Date: 2017-05-25 21:11:32 +0000 (Thu, 25 May 2017)
New Revision: 900

Modified:
   openssl/branches/openssl1.0/debian/changelog
   openssl/branches/openssl1.0/debian/patches/valgrind.patch
Log:
New upstream release


Modified: openssl/branches/openssl1.0/debian/changelog
===================================================================
--- openssl/branches/openssl1.0/debian/changelog	2017-05-25 19:17:54 UTC (rev 899)
+++ openssl/branches/openssl1.0/debian/changelog	2017-05-25 21:11:32 UTC (rev 900)
@@ -1,3 +1,11 @@
+openssl1.0 (1.0.2l-1) unstable; urgency=medium
+
+  * New upstream release
+    - Properly detect features on the AMD Ryzen processor (Closes: #861145)
+  * Refresh valgrind.patch
+
+ -- Kurt Roeckx <kurt at roeckx.be>  Thu, 25 May 2017 22:53:57 +0200
+
 openssl1.0 (1.0.2k-1) unstable; urgency=medium
 
   * New upstream release

Modified: openssl/branches/openssl1.0/debian/patches/valgrind.patch
===================================================================
--- openssl/branches/openssl1.0/debian/patches/valgrind.patch	2017-05-25 19:17:54 UTC (rev 899)
+++ openssl/branches/openssl1.0/debian/patches/valgrind.patch	2017-05-25 21:11:32 UTC (rev 900)
@@ -1,18 +1,18 @@
-Index: openssl-1.0.2/crypto/rand/md_rand.c
+Index: openssl1.0-1.0.2l/crypto/rand/md_rand.c
 ===================================================================
---- openssl-1.0.2.orig/crypto/rand/md_rand.c
-+++ openssl-1.0.2/crypto/rand/md_rand.c
-@@ -480,6 +480,7 @@ int ssleay_rand_bytes(unsigned char *buf
-         MD_Update(&m, (unsigned char *)&(md_c[0]), sizeof(md_c));
+--- openssl1.0-1.0.2l.orig/crypto/rand/md_rand.c
++++ openssl1.0-1.0.2l/crypto/rand/md_rand.c
+@@ -490,6 +490,7 @@ int ssleay_rand_bytes(unsigned char *buf
+             goto err;
  
  #ifndef PURIFY                  /* purify complains */
 +#if 0
          /*
           * The following line uses the supplied buffer as a small source of
           * entropy: since this buffer is often uninitialised it may cause
-@@ -489,6 +490,7 @@ int ssleay_rand_bytes(unsigned char *buf
-          */
-         MD_Update(&m, buf, j);
+@@ -500,6 +501,7 @@ int ssleay_rand_bytes(unsigned char *buf
+         if (!MD_Update(&m, buf, j))
+             goto err;
  #endif
 +#endif
  




More information about the Pkg-openssl-changes mailing list