bdf3209e96
- update to 1.0.2a * Major changes since 1.0.1: - Suite B support for TLS 1.2 and DTLS 1.2 - Support for DTLS 1.2 - TLS automatic EC curve selection. - API to set TLS supported signature algorithms and curves - SSL_CONF configuration API. - TLS Brainpool support. - ALPN support. - CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH. - packaging changes: * merged patches modifying CIPHER_LIST into one, dropping: - openssl-1.0.1e-add-suse-default-cipher-header.patch - openssl-libssl-noweakciphers.patch * fix a manpage with invalid name - added openssl-fix_invalid_manpage_name.patch * remove a missing fips function - openssl-missing_FIPS_ec_group_new_by_curve_name.patch * reimported patches from Fedora dropped patches: - openssl-1.0.1c-default-paths.patch - openssl-1.0.1c-ipv6-apps.patch - openssl-1.0.1e-fips-ctor.patch - openssl-1.0.1e-fips-ec.patch - openssl-1.0.1e-fips.patch - openssl-1.0.1e-new-fips-reqs.patch - VIA_padlock_support_on_64systems.patch added patches: - openssl-1.0.2a-default-paths.patch - openssl-1.0.2a-fips-ctor.patch (forwarded request 309611 from vitezslav_cizek) OBS-URL: https://build.opensuse.org/request/show/310849 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/openssl?expand=0&rev=127
44 lines
1.3 KiB
Diff
44 lines
1.3 KiB
Diff
From 83f318d68bbdab1ca898c94576a838cc97df4700 Mon Sep 17 00:00:00 2001
|
|
From: Ludwig Nussel <ludwig.nussel@suse.de>
|
|
Date: Wed, 21 Apr 2010 15:52:10 +0200
|
|
Subject: [PATCH] also create old hash for compatibility
|
|
|
|
---
|
|
tools/c_rehash.in | 8 +++++++-
|
|
1 files changed, 7 insertions(+), 1 deletions(-)
|
|
|
|
Index: openssl-1.0.2a/tools/c_rehash.in
|
|
===================================================================
|
|
--- openssl-1.0.2a.orig/tools/c_rehash.in 2015-04-03 21:41:53.440111263 +0200
|
|
+++ openssl-1.0.2a/tools/c_rehash.in 2015-04-03 21:42:51.150916910 +0200
|
|
@@ -113,6 +113,7 @@ sub hash_dir {
|
|
next;
|
|
}
|
|
link_hash_cert($fname) if($cert);
|
|
+ link_hash_cert_old($fname) if($cert);
|
|
link_hash_crl($fname) if($crl);
|
|
}
|
|
}
|
|
@@ -146,8 +147,9 @@ sub check_file {
|
|
|
|
sub link_hash_cert {
|
|
my $fname = $_[0];
|
|
+ my $hashopt = $_[1] || '-subject_hash';
|
|
$fname =~ s/'/'\\''/g;
|
|
- my ($hash, $fprint) = `"$openssl" x509 $x509hash -fingerprint -noout -in "$fname"`;
|
|
+ my ($hash, $fprint) = `"$openssl" x509 $hashopt -fingerprint -noout -in "$fname"`;
|
|
chomp $hash;
|
|
chomp $fprint;
|
|
$fprint =~ s/^.*=//;
|
|
@@ -177,6 +179,10 @@ sub link_hash_cert {
|
|
$hashlist{$hash} = $fprint;
|
|
}
|
|
|
|
+sub link_hash_cert_old {
|
|
+ link_hash_cert($_[0], '-subject_hash_old');
|
|
+}
|
|
+
|
|
# Same as above except for a CRL. CRL links are of the form <hash>.r<n>
|
|
|
|
sub link_hash_crl {
|