SHA256
8
0
forked from pool/libksi

13 Commits
devel ... main

Author SHA256 Message Date
bd4e5a2081 Accepting request 1223292 from devel:libraries:c_c++
OBS-URL: https://build.opensuse.org/request/show/1223292
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libksi?expand=0&rev=6
2024-11-11 12:46:41 +00:00
d90d74f918 Accepting request 1154040 from devel:libraries:c_c++
OBS-URL: https://build.opensuse.org/request/show/1154040
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libksi?expand=0&rev=5
2024-03-01 22:38:54 +00:00
3c6fb9d733 Accepting request 1153514 from home:pgajdos:l
- Use %autosetup macro. Allows to eliminate the usage of deprecated
  %patchN

OBS-URL: https://build.opensuse.org/request/show/1153514
OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/libksi?expand=0&rev=10
2024-03-01 13:24:33 +00:00
90ddee1217 Accepting request 519202 from devel:libraries:c_c++
1

OBS-URL: https://build.opensuse.org/request/show/519202
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libksi?expand=0&rev=4
2017-09-04 10:26:43 +00:00
3e16d8a694 Accepting request 518392 from home:pmonrealgonzalez:branches:devel:libraries:c_c++
- Fixed errors when building with openssl-1.1.0 [bsc#1042656]
  * Added patch libksi-build-with-openssl-1.1.0.patch

OBS-URL: https://build.opensuse.org/request/show/518392
OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/libksi?expand=0&rev=8
2017-08-28 19:04:42 +00:00
94da3dc4b6 Accepting request 457464 from devel:libraries:c_c++
1

OBS-URL: https://build.opensuse.org/request/show/457464
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libksi?expand=0&rev=3
2017-02-20 13:27:51 +00:00
Nirmoy Das
9355778268 Accepting request 457439 from home:ndas:branches:devel:libraries:c_c++
- This library is needed for latest rsyslog 8.24.0(fate#320546)

OBS-URL: https://build.opensuse.org/request/show/457439
OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/libksi?expand=0&rev=6
2017-02-15 15:39:06 +00:00
b73d2fcd9e Accepting request 351684 from devel:libraries:c_c++
libksi 3.4.0.5. Will break rsyslog (the only package depending on it). Rsyslog 8.15.0 needs/fixes that.

OBS-URL: https://build.opensuse.org/request/show/351684
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libksi?expand=0&rev=2
2016-01-05 20:54:42 +00:00
a80c6c0728 Accepting request 351653 from home:AndreasStieger:branches:devel:libraries:c_c++
libksi 3.4.0.5 (1:0:0)

OBS-URL: https://build.opensuse.org/request/show/351653
OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/libksi?expand=0&rev=5
2016-01-02 16:07:20 +00:00
Stephan Kulow
8cf896fe2e Accepting request 315001 from devel:libraries:c_c++
libksi, an optional dependency for rsyslog 8.11.0
With license fix applied

OBS-URL: https://build.opensuse.org/request/show/315001
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/libksi?expand=0&rev=1
2015-07-08 04:59:15 +00:00
0777f34b08 gz for SLE 11
OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/libksi?expand=0&rev=3
2015-07-03 14:34:09 +00:00
88d8629949 - correct license header of rest/resigner.c (as sent by copyright
holder in https://github.com/rgerhards/libksi/pull/1)

OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/libksi?expand=0&rev=2
2015-07-03 13:19:33 +00:00
3ab3d1b6ed Accepting request 314804 from home:AndreasStieger:branches:Base:System
libksi, an optional dependency for rsyslog 8.11.0

OBS-URL: https://build.opensuse.org/request/show/314804
OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/libksi?expand=0&rev=1
2015-07-02 14:46:15 +00:00
2 changed files with 0 additions and 86 deletions

View File

@@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:8a11d597971cf9973c6f20ba62ba0abe4e47baecee3482758ea0d6612829392c
size 602461

View File

@@ -1,83 +0,0 @@
Index: libksi-3.4.0.5/src/ksi/hash_openssl.c
===================================================================
--- libksi-3.4.0.5.orig/src/ksi/hash_openssl.c
+++ libksi-3.4.0.5/src/ksi/hash_openssl.c
@@ -102,7 +102,9 @@ int KSI_isHashAlgorithmSupported(KSI_Has
void KSI_DataHasher_free(KSI_DataHasher *hasher) {
if (hasher != NULL) {
- KSI_free(hasher->hashContext);
+ if (hasher->hashContext != NULL) {
+ EVP_MD_CTX_destroy(hasher->hashContext);
+ }
KSI_free(hasher);
}
}
@@ -171,7 +173,7 @@ int KSI_DataHasher_reset(KSI_DataHasher
context = hasher->hashContext;
if (context == NULL) {
- context = KSI_new(EVP_MD_CTX);
+ context = EVP_MD_CTX_create();
if (context == NULL) {
KSI_pushError(hasher->ctx, res = KSI_OUT_OF_MEMORY, NULL);
goto cleanup;
@@ -179,7 +181,7 @@ int KSI_DataHasher_reset(KSI_DataHasher
hasher->hashContext = context;
} else {
- EVP_MD_CTX_cleanup(context);
+ EVP_MD_CTX_destroy(context);
}
if (!EVP_DigestInit(context, evp_md)) {
Index: libksi-3.4.0.5/src/ksi/pkitruststore_openssl.c
===================================================================
--- libksi-3.4.0.5.orig/src/ksi/pkitruststore_openssl.c
+++ libksi-3.4.0.5/src/ksi/pkitruststore_openssl.c
@@ -907,13 +907,13 @@ cleanup:
int KSI_PKITruststore_verifyRawSignature(KSI_CTX *ctx, const unsigned char *data, size_t data_len, const char *algoOid, const unsigned char *signature, size_t signature_len, const KSI_PKICertificate *certificate) {
int res;
ASN1_OBJECT* algorithm = NULL;
- EVP_MD_CTX md_ctx;
+ EVP_MD_CTX *md_ctx;
X509 *x509 = NULL;
const EVP_MD *evp_md;
EVP_PKEY *pubKey = NULL;
/* Needs to be initialized before jumping to cleanup. */
- EVP_MD_CTX_init(&md_ctx);
+ md_ctx = EVP_MD_CTX_create();
KSI_ERR_clearErrors(ctx);
@@ -956,17 +956,17 @@ int KSI_PKITruststore_verifyRawSignature
goto cleanup;
}
- if (!EVP_VerifyInit(&md_ctx, evp_md)) {
+ if (!EVP_VerifyInit(md_ctx, evp_md)) {
KSI_pushError(ctx, res = KSI_CRYPTO_FAILURE, NULL);
goto cleanup;
}
- if (!EVP_VerifyUpdate(&md_ctx, (unsigned char *)data, data_len)) {
+ if (!EVP_VerifyUpdate(md_ctx, (unsigned char *)data, data_len)) {
KSI_pushError(ctx, res = KSI_CRYPTO_FAILURE, NULL);
goto cleanup;
}
- res = EVP_VerifyFinal(&md_ctx, (unsigned char *)signature, (unsigned)signature_len, pubKey);
+ res = EVP_VerifyFinal(md_ctx, (unsigned char *)signature, (unsigned)signature_len, pubKey);
if (res < 0) {
KSI_pushError(ctx, res = KSI_CRYPTO_FAILURE, NULL);
goto cleanup;
@@ -982,7 +982,7 @@ int KSI_PKITruststore_verifyRawSignature
cleanup:
- EVP_MD_CTX_cleanup(&md_ctx);
+ EVP_MD_CTX_destroy(md_ctx);
if (algorithm != NULL) ASN1_OBJECT_free(algorithm);
if (pubKey != NULL) EVP_PKEY_free(pubKey);