summaryrefslogtreecommitdiffstats
path: root/package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch
diff options
context:
space:
mode:
authorMagnus Kroken <mkroken@gmail.com>2016-09-26 17:21:52 +0200
committerJohn Crispin <john@phrozen.org>2016-09-27 17:50:22 +0200
commitb1f39d3d7ee7ba0714e45af64a935b01877a5175 (patch)
tree0ba98cf9341cac670180e2a0a127f4dc4d62437c /package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch
parent142ec7ada939313cc890f94df5fc6903f2660635 (diff)
downloadmaster-31e0f0ae-b1f39d3d7ee7ba0714e45af64a935b01877a5175.tar.gz
master-31e0f0ae-b1f39d3d7ee7ba0714e45af64a935b01877a5175.tar.bz2
master-31e0f0ae-b1f39d3d7ee7ba0714e45af64a935b01877a5175.zip
openssl: update to 1.0.2j
A bug fix which included a CRL sanity check was added to OpenSSL 1.1.0 but was omitted from OpenSSL 1.0.2i. As a result any attempt to use CRLs in OpenSSL 1.0.2i will crash with a null pointer exception. Patches applied upstream: * 301-fix_no_nextprotoneg_build.patch * 302-Fix_typo_introduced_by_a03f81f4.patch Security advisory: https://www.openssl.org/news/secadv/20160926.txt Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Diffstat (limited to 'package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch')
-rw-r--r--package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch21
1 files changed, 0 insertions, 21 deletions
diff --git a/package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch b/package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch
deleted file mode 100644
index 8b14365fe1..0000000000
--- a/package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch
+++ /dev/null
@@ -1,21 +0,0 @@
-From 581215a519c66db7255ea360ed25bb00033ccd52 Mon Sep 17 00:00:00 2001
-From: Rich Salz <rsalz@openssl.org>
-Date: Thu, 22 Sep 2016 08:47:45 -0400
-Subject: [PATCH] Fix typo introduced by a03f81f4
-
-Reviewed-by: Richard Levitte <levitte@openssl.org>
----
- crypto/engine/eng_cryptodev.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/crypto/engine/eng_cryptodev.c
-+++ b/crypto/engine/eng_cryptodev.c
-@@ -939,7 +939,7 @@ static int cryptodev_digest_copy(EVP_MD_
- if (fstate->mac_len != 0) {
- if (fstate->mac_data != NULL) {
- dstate->mac_data = OPENSSL_malloc(fstate->mac_len);
-- if (dstate->ac_data == NULL) {
-+ if (dstate->mac_data == NULL) {
- printf("cryptodev_digest_init: malloc failed\n");
- return 0;
- }