diff options
author | Magnus Kroken <mkroken@gmail.com> | 2016-09-26 17:21:52 +0200 |
---|---|---|
committer | John Crispin <john@phrozen.org> | 2016-09-27 17:50:22 +0200 |
commit | b1f39d3d7ee7ba0714e45af64a935b01877a5175 (patch) | |
tree | 0ba98cf9341cac670180e2a0a127f4dc4d62437c /package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch | |
parent | 142ec7ada939313cc890f94df5fc6903f2660635 (diff) | |
download | master-31e0f0ae-b1f39d3d7ee7ba0714e45af64a935b01877a5175.tar.gz master-31e0f0ae-b1f39d3d7ee7ba0714e45af64a935b01877a5175.tar.bz2 master-31e0f0ae-b1f39d3d7ee7ba0714e45af64a935b01877a5175.zip |
openssl: update to 1.0.2j
A bug fix which included a CRL sanity check was added to OpenSSL 1.1.0
but was omitted from OpenSSL 1.0.2i. As a result any attempt to use
CRLs in OpenSSL 1.0.2i will crash with a null pointer exception.
Patches applied upstream:
* 301-fix_no_nextprotoneg_build.patch
* 302-Fix_typo_introduced_by_a03f81f4.patch
Security advisory: https://www.openssl.org/news/secadv/20160926.txt
Signed-off-by: Magnus Kroken <mkroken@gmail.com>
Diffstat (limited to 'package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch')
-rw-r--r-- | package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch | 21 |
1 files changed, 0 insertions, 21 deletions
diff --git a/package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch b/package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch deleted file mode 100644 index 8b14365fe1..0000000000 --- a/package/libs/openssl/patches/302-Fix_typo_introduced_by_a03f81f4.patch +++ /dev/null @@ -1,21 +0,0 @@ -From 581215a519c66db7255ea360ed25bb00033ccd52 Mon Sep 17 00:00:00 2001 -From: Rich Salz <rsalz@openssl.org> -Date: Thu, 22 Sep 2016 08:47:45 -0400 -Subject: [PATCH] Fix typo introduced by a03f81f4 - -Reviewed-by: Richard Levitte <levitte@openssl.org> ---- - crypto/engine/eng_cryptodev.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - ---- a/crypto/engine/eng_cryptodev.c -+++ b/crypto/engine/eng_cryptodev.c -@@ -939,7 +939,7 @@ static int cryptodev_digest_copy(EVP_MD_ - if (fstate->mac_len != 0) { - if (fstate->mac_data != NULL) { - dstate->mac_data = OPENSSL_malloc(fstate->mac_len); -- if (dstate->ac_data == NULL) { -+ if (dstate->mac_data == NULL) { - printf("cryptodev_digest_init: malloc failed\n"); - return 0; - } |