forked from pool/ipmitool
Thomas Renninger
e7e8d0d141
* Add: 0001-fix-typo.patch 0002-added-microTCA-major-version.patch 0003-replaced-removed-defines-which-are-already-present-i.patch 0004-fix-typo.patch 0005-fix-typo.patch 0006-ID-461-OpenSSL-1.1-compatibility-error-storage-size-.patch 0007-ID-461-Make-compiler-happier-about-changes-related-t.patch 0008-ID-474-Compile-fix-on-nonlinux-systems.patch 0009-Add-bootstrap-support-for-Mac.patch 0010-Prevent-autoreconf-from-complaining-about-missing-NE.patch 0011-Add-git-hash-and-dirty-mark-to-ipmitool-version.patch 0012-Add-some-more-configure-build-editor-byproducts-to-..patch 0013-ID-478-ekanalyzer-Fixed-decoding-of-FRU-fields.patch 0014-ID-479-ekanalyzer-fix-processing-of-custom-mfg.-fiel.patch 0015-ID-477-fru-Fix-decoding-of-non-text-data-in-get_fru_.patch 0016-Make-git-revision-more-descriptive.patch 0017-ID-480-ipmitool-coredumps-in-EVP_CIPHER_CTX_init.patch OBS-URL: https://build.opensuse.org/package/show/systemsmanagement/ipmitool?expand=0&rev=40
105 lines
3.3 KiB
Diff
105 lines
3.3 KiB
Diff
From b57487e360916ab3eaa50aa6d021c73b6337a4a0 Mon Sep 17 00:00:00 2001
|
|
From: Dennis Schridde <dennis.schridde@uni-heidelberg.de>
|
|
Date: Wed, 30 Nov 2016 17:33:00 +0100
|
|
Subject: [PATCH 06/17] ID:461 - OpenSSL 1.1 compatibility - "error: storage
|
|
size of 'ctx' isn't known"
|
|
|
|
In OpenSSL 1.1 EVP_CIPHER_CTX became opaque, cf. `man 3ssl EVP_EncryptInit`
|
|
|
|
Fixes: ID:461
|
|
---
|
|
src/plugins/lanplus/lanplus_crypt_impl.c | 28 ++++++++++++++--------------
|
|
1 file changed, 14 insertions(+), 14 deletions(-)
|
|
|
|
diff --git a/src/plugins/lanplus/lanplus_crypt_impl.c b/src/plugins/lanplus/lanplus_crypt_impl.c
|
|
index d5fac37..3c0df23 100644
|
|
--- a/src/plugins/lanplus/lanplus_crypt_impl.c
|
|
+++ b/src/plugins/lanplus/lanplus_crypt_impl.c
|
|
@@ -164,10 +164,10 @@ lanplus_encrypt_aes_cbc_128(const uint8_t * iv,
|
|
uint8_t * output,
|
|
uint32_t * bytes_written)
|
|
{
|
|
- EVP_CIPHER_CTX ctx;
|
|
- EVP_CIPHER_CTX_init(&ctx);
|
|
- EVP_EncryptInit_ex(&ctx, EVP_aes_128_cbc(), NULL, key, iv);
|
|
- EVP_CIPHER_CTX_set_padding(&ctx, 0);
|
|
+ EVP_CIPHER_CTX* ctx;
|
|
+ EVP_CIPHER_CTX_init(ctx);
|
|
+ EVP_EncryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv);
|
|
+ EVP_CIPHER_CTX_set_padding(ctx, 0);
|
|
|
|
|
|
*bytes_written = 0;
|
|
@@ -191,7 +191,7 @@ lanplus_encrypt_aes_cbc_128(const uint8_t * iv,
|
|
assert((input_length % IPMI_CRYPT_AES_CBC_128_BLOCK_SIZE) == 0);
|
|
|
|
|
|
- if(!EVP_EncryptUpdate(&ctx, output, (int *)bytes_written, input, input_length))
|
|
+ if(!EVP_EncryptUpdate(ctx, output, (int *)bytes_written, input, input_length))
|
|
{
|
|
/* Error */
|
|
*bytes_written = 0;
|
|
@@ -201,7 +201,7 @@ lanplus_encrypt_aes_cbc_128(const uint8_t * iv,
|
|
{
|
|
uint32_t tmplen;
|
|
|
|
- if(!EVP_EncryptFinal_ex(&ctx, output + *bytes_written, (int *)&tmplen))
|
|
+ if(!EVP_EncryptFinal_ex(ctx, output + *bytes_written, (int *)&tmplen))
|
|
{
|
|
*bytes_written = 0;
|
|
return; /* Error */
|
|
@@ -210,7 +210,7 @@ lanplus_encrypt_aes_cbc_128(const uint8_t * iv,
|
|
{
|
|
/* Success */
|
|
*bytes_written += tmplen;
|
|
- EVP_CIPHER_CTX_cleanup(&ctx);
|
|
+ EVP_CIPHER_CTX_cleanup(ctx);
|
|
}
|
|
}
|
|
}
|
|
@@ -239,10 +239,10 @@ lanplus_decrypt_aes_cbc_128(const uint8_t * iv,
|
|
uint8_t * output,
|
|
uint32_t * bytes_written)
|
|
{
|
|
- EVP_CIPHER_CTX ctx;
|
|
- EVP_CIPHER_CTX_init(&ctx);
|
|
- EVP_DecryptInit_ex(&ctx, EVP_aes_128_cbc(), NULL, key, iv);
|
|
- EVP_CIPHER_CTX_set_padding(&ctx, 0);
|
|
+ EVP_CIPHER_CTX* ctx;
|
|
+ EVP_CIPHER_CTX_init(ctx);
|
|
+ EVP_DecryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv);
|
|
+ EVP_CIPHER_CTX_set_padding(ctx, 0);
|
|
|
|
|
|
if (verbose >= 5)
|
|
@@ -266,7 +266,7 @@ lanplus_decrypt_aes_cbc_128(const uint8_t * iv,
|
|
assert((input_length % IPMI_CRYPT_AES_CBC_128_BLOCK_SIZE) == 0);
|
|
|
|
|
|
- if (!EVP_DecryptUpdate(&ctx, output, (int *)bytes_written, input, input_length))
|
|
+ if (!EVP_DecryptUpdate(ctx, output, (int *)bytes_written, input, input_length))
|
|
{
|
|
/* Error */
|
|
lprintf(LOG_DEBUG, "ERROR: decrypt update failed");
|
|
@@ -277,7 +277,7 @@ lanplus_decrypt_aes_cbc_128(const uint8_t * iv,
|
|
{
|
|
uint32_t tmplen;
|
|
|
|
- if (!EVP_DecryptFinal_ex(&ctx, output + *bytes_written, (int *)&tmplen))
|
|
+ if (!EVP_DecryptFinal_ex(ctx, output + *bytes_written, (int *)&tmplen))
|
|
{
|
|
char buffer[1000];
|
|
ERR_error_string(ERR_get_error(), buffer);
|
|
@@ -290,7 +290,7 @@ lanplus_decrypt_aes_cbc_128(const uint8_t * iv,
|
|
{
|
|
/* Success */
|
|
*bytes_written += tmplen;
|
|
- EVP_CIPHER_CTX_cleanup(&ctx);
|
|
+ EVP_CIPHER_CTX_cleanup(ctx);
|
|
}
|
|
}
|
|
|
|
--
|
|
1.8.5.6
|
|
|