Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 577454 Details for
Bug 675610
x11-misc/x11vnc-0.9.16 : sslhelper.c:(.text+<snip>): undefined reference to X509_OBJECT_new
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
x11vnc-0.9.16-libressl.patch
x11vnc-0.9.16-libressl.patch (text/plain), 3.66 KB, created by
Alexander Tsoy
on 2019-05-21 15:09:49 UTC
(
hide
)
Description:
x11vnc-0.9.16-libressl.patch
Filename:
MIME Type:
Creator:
Alexander Tsoy
Created:
2019-05-21 15:09:49 UTC
Size:
3.66 KB
patch
obsolete
>diff --git a/src/sslhelper.c b/src/sslhelper.c >index 04c2e27..207de55 100644 >--- a/src/sslhelper.c >+++ b/src/sslhelper.c >@@ -803,7 +803,7 @@ static int pem_passwd_callback(char *buf, int size, int rwflag, > static int crl_callback(X509_STORE_CTX *callback_ctx) { > const ASN1_INTEGER *revoked_serial; > X509_STORE_CTX *store_ctx; >-#if OPENSSL_VERSION_NUMBER > 0x10100000L >+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > X509_OBJECT *obj; > #else > X509_OBJECT obj; >@@ -829,7 +829,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { > * the current certificate in order to verify it's integrity. */ > store_ctx = X509_STORE_CTX_new(); > X509_STORE_CTX_init(store_ctx, revocation_store, NULL, NULL); >-#if OPENSSL_VERSION_NUMBER > 0x10100000L >+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > obj = X509_OBJECT_new(); > rc=X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, subject, obj); > crl = X509_OBJECT_get0_X509_CRL(obj); >@@ -865,7 +865,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { > rfbLog("Invalid signature on CRL\n"); > X509_STORE_CTX_set_error(callback_ctx, > X509_V_ERR_CRL_SIGNATURE_FAILURE); >-#if OPENSSL_VERSION_NUMBER >= 0x10100000L >+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > X509_OBJECT_free(obj); > #else > X509_OBJECT_free_contents(&obj); >@@ -883,7 +883,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { > rfbLog("Found CRL has invalid nextUpdate field\n"); > X509_STORE_CTX_set_error(callback_ctx, > X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD); >-#if OPENSSL_VERSION_NUMBER >= 0x10100000L >+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > X509_OBJECT_free(obj); > #else > X509_OBJECT_free_contents(&obj); >@@ -894,14 +894,14 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { > rfbLog("Found CRL is expired - " > "revoking all certificates until you get updated CRL\n"); > X509_STORE_CTX_set_error(callback_ctx, X509_V_ERR_CRL_HAS_EXPIRED); >-#if OPENSSL_VERSION_NUMBER >= 0x10100000L >+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > X509_OBJECT_free(obj); > #else > X509_OBJECT_free_contents(&obj); > #endif > return 0; /* Reject connection */ > } >-#if OPENSSL_VERSION_NUMBER >= 0x10100000L >+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > X509_OBJECT_free(obj); > #else > X509_OBJECT_free_contents(&obj); >@@ -912,7 +912,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { > * the current certificate in order to check for revocation. */ > store_ctx = X509_STORE_CTX_new(); > X509_STORE_CTX_init(store_ctx, revocation_store, NULL, NULL); >-#if OPENSSL_VERSION_NUMBER > 0x10100000L >+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > obj = X509_OBJECT_new(); > rc=X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, issuer, obj); > crl = X509_OBJECT_get0_X509_CRL(obj); >@@ -942,7 +942,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { > "revoked per CRL from issuer %s\n", serial, serial, cp); > OPENSSL_free(cp); > X509_STORE_CTX_set_error(callback_ctx, X509_V_ERR_CERT_REVOKED); >-#if OPENSSL_VERSION_NUMBER >= 0x10100000L >+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > X509_OBJECT_free(obj); > #else > X509_OBJECT_free_contents(&obj); >@@ -950,7 +950,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { > return 0; /* Reject connection */ > } > } >-#if OPENSSL_VERSION_NUMBER >= 0x10100000L >+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) > X509_OBJECT_free(obj); > #else > X509_OBJECT_free_contents(&obj);
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 675610
:
561442
|
561444
|
561446
|
561448
|
561450
|
561452
|
561454
|
577420
|
577454