Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
home:flodevdb
openssl-1_1-devrandom
openssl-1_1-openssl-config.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File openssl-1_1-openssl-config.patch of Package openssl-1_1-devrandom
--- Configurations/descrip.mms.tmpl | 4 +-- Configurations/unix-Makefile.tmpl | 22 ++++++++--------- Configure | 2 - INSTALL | 2 - NEWS | 3 ++ VMS/openssl_utils.com.in | 2 - apps/CA.pl.in | 8 +++--- apps/build.info | 6 ++-- apps/tsget.in | 2 - doc/HOWTO/certificates.txt | 2 - doc/man1/CA.pl.pod | 36 ++++++++++++++--------------- doc/man1/ca.pod | 4 +-- doc/man1/rehash.pod | 10 ++++---- doc/man1/tsget.pod | 4 +-- doc/man1/verify.pod | 2 - doc/man1/x509.pod | 2 - doc/man3/OPENSSL_config.pod | 2 - doc/man3/SSL_CTX_load_verify_locations.pod | 4 +-- doc/man5/config.pod | 2 - include/internal/cryptlib.h | 2 - test/recipes/80-test_ca.t | 10 ++++---- tools/build.info | 2 - tools/c_rehash.in | 6 ++-- 23 files changed, 71 insertions(+), 68 deletions(-) Index: openssl-1.1.1v/Configurations/descrip.mms.tmpl =================================================================== --- openssl-1.1.1v.orig/Configurations/descrip.mms.tmpl +++ openssl-1.1.1v/Configurations/descrip.mms.tmpl @@ -142,8 +142,8 @@ INSTALL_SHLIBS={- join(", ", map { "-\n\ INSTALL_ENGINES={- join(", ", map { "-\n\t".$_.".EXE" } @{$unified_info{install}->{engines}}) -} INSTALL_PROGRAMS={- join(", ", map { "-\n\t".$_.".EXE" } @{$unified_info{install}->{programs}}) -} {- output_off() if $disabled{apps}; "" -} -BIN_SCRIPTS=[.tools]c_rehash.pl -MISC_SCRIPTS=[.apps]CA.pl, [.apps]tsget.pl +BIN_SCRIPTS=[.tools]c_rehash-1_1.pl +MISC_SCRIPTS=[.apps]CA-1_1.pl, [.apps]tsget-1_1.pl {- output_on() if $disabled{apps}; "" -} APPS_OPENSSL={- use File::Spec::Functions; Index: openssl-1.1.1v/Configurations/unix-Makefile.tmpl =================================================================== --- openssl-1.1.1v.orig/Configurations/unix-Makefile.tmpl +++ openssl-1.1.1v/Configurations/unix-Makefile.tmpl @@ -140,8 +140,8 @@ INSTALL_SHLIB_INFO={- join(" ", map { "\ INSTALL_ENGINES={- join(" ", map { dso($_) } @{$unified_info{install}->{engines}}) -} INSTALL_PROGRAMS={- join(" ", map { $_.$exeext } @{$unified_info{install}->{programs}}) -} {- output_off() if $disabled{apps}; "" -} -BIN_SCRIPTS=$(BLDDIR)/tools/c_rehash -MISC_SCRIPTS=$(BLDDIR)/apps/CA.pl $(BLDDIR)/apps/tsget.pl:tsget +BIN_SCRIPTS=$(BLDDIR)/tools/c_rehash-1_1 +MISC_SCRIPTS=$(BLDDIR)/apps/CA-1_1.pl $(BLDDIR)/apps/tsget-1_1.pl:tsget-1_1 {- output_on() if $disabled{apps}; "" -} APPS_OPENSSL={- use File::Spec::Functions; @@ -579,14 +579,14 @@ install_ssldirs: : {- output_on() if windowsdll(); "" -}; \ fi; \ done - @$(ECHO) "install $(SRCDIR)/apps/openssl.cnf -> $(DESTDIR)$(OPENSSLDIR)/openssl.cnf.dist" - @cp $(SRCDIR)/apps/openssl.cnf "$(DESTDIR)$(OPENSSLDIR)/openssl.cnf.new" - @chmod 644 "$(DESTDIR)$(OPENSSLDIR)/openssl.cnf.new" - @mv -f "$(DESTDIR)$(OPENSSLDIR)/openssl.cnf.new" "$(DESTDIR)$(OPENSSLDIR)/openssl.cnf.dist" - @if [ ! -f "$(DESTDIR)$(OPENSSLDIR)/openssl.cnf" ]; then \ - $(ECHO) "install $(SRCDIR)/apps/openssl.cnf -> $(DESTDIR)$(OPENSSLDIR)/openssl.cnf"; \ - cp $(SRCDIR)/apps/openssl.cnf "$(DESTDIR)$(OPENSSLDIR)/openssl.cnf"; \ - chmod 644 "$(DESTDIR)$(OPENSSLDIR)/openssl.cnf"; \ + @$(ECHO) "install $(SRCDIR)/apps/openssl-1_1.cnf -> $(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf.dist" + @cp $(SRCDIR)/apps/openssl-1_1.cnf "$(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf.new" + @chmod 644 "$(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf.new" + @mv -f "$(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf.new" "$(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf.dist" + @if [ ! -f "$(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf" ]; then \ + $(ECHO) "install $(SRCDIR)/apps/openssl-1_1.cnf -> $(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf"; \ + cp $(SRCDIR)/apps/openssl-1_1.cnf "$(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf"; \ + chmod 644 "$(DESTDIR)$(OPENSSLDIR)/openssl-1_1.cnf"; \ fi @$(ECHO) "install $(SRCDIR)/apps/ct_log_list.cnf -> $(DESTDIR)$(OPENSSLDIR)/ct_log_list.cnf.dist" @cp $(SRCDIR)/apps/ct_log_list.cnf "$(DESTDIR)$(OPENSSLDIR)/ct_log_list.cnf.new" @@ -870,7 +870,7 @@ lint: generate_apps: ( cd $(SRCDIR); $(PERL) VMS/VMSify-conf.pl \ - < apps/openssl.cnf > apps/openssl-vms.cnf ) + < apps/openssl-1_1.cnf > apps/openssl-vms.cnf ) generate_crypto_bn: ( cd $(SRCDIR); $(PERL) crypto/bn/bn_prime.pl > crypto/bn/bn_prime.h ) Index: openssl-1.1.1v/Configure =================================================================== --- openssl-1.1.1v.orig/Configure +++ openssl-1.1.1v/Configure @@ -35,7 +35,7 @@ my $usage="Usage: Configure [no-<cipher> # directories bin, lib, include, share/man, share/doc/openssl # This becomes the value of INSTALLTOP in Makefile # (Default: /usr/local) -# --openssldir OpenSSL data area, such as openssl.cnf, certificates and keys. +# --openssldir OpenSSL data area, such as openssl-1_1.cnf, certificates and keys. # If it's a relative directory, it will be added on the directory # given with --prefix. # This becomes the value of OPENSSLDIR in Makefile and in C. Index: openssl-1.1.1v/INSTALL =================================================================== --- openssl-1.1.1v.orig/INSTALL +++ openssl-1.1.1v/INSTALL @@ -296,7 +296,7 @@ be undesirable if small executable size is an objective. no-autoload-config - Don't automatically load the default openssl.cnf file. + Don't automatically load the default openssl-1_1.cnf file. Typically OpenSSL will automatically load a system config file which configures default ssl options. Index: openssl-1.1.1v/NEWS =================================================================== --- openssl-1.1.1v.orig/NEWS +++ openssl-1.1.1v/NEWS @@ -10,6 +10,9 @@ o Fix excessive time spent checking DH q parameter value (CVE-2023-3817) o Fix DH_check() excessive time with over sized modulus (CVE-2023-3446) + IMPORTANT: For compatibility with OpenSSL 3.0, the OpenSSL master + configuration file openssl.cnf has been renamed to openssl-1_1.cnf. + Major changes between OpenSSL 1.1.1t and OpenSSL 1.1.1u [30 May 2023] o Mitigate for very slow `OBJ_obj2txt()` performance with gigantic Index: openssl-1.1.1v/VMS/openssl_utils.com.in =================================================================== --- openssl-1.1.1v.orig/VMS/openssl_utils.com.in +++ openssl-1.1.1v/VMS/openssl_utils.com.in @@ -8,7 +8,7 @@ $ OPENSSL :== $OSSL$EXE:OPENSSL'v' $ $ IF F$TYPE(PERL) .EQS. "STRING" $ THEN -$ C_REHASH :== 'PERL' OSSL$EXE:c_rehash.pl +$ C_REHASH :== 'PERL' OSSL$EXE:c_rehash-1_1.pl $ ELSE $ WRITE SYS$ERROR "NOTE: no perl => no C_REHASH" $ ENDIF Index: openssl-1.1.1v/apps/CA.pl.in =================================================================== --- openssl-1.1.1v.orig/apps/CA.pl.in +++ openssl-1.1.1v/apps/CA.pl.in @@ -113,10 +113,10 @@ sub run if ( $WHAT =~ /^(-\?|-h|-help)$/ ) { - print STDERR "usage: CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-extra-cmd extra-params]\n"; - print STDERR " CA.pl -pkcs12 [-extra-pkcs12 extra-params] [certname]\n"; - print STDERR " CA.pl -verify [-extra-verify extra-params] certfile ...\n"; - print STDERR " CA.pl -revoke [-extra-ca extra-params] certfile [reason]\n"; + print STDERR "usage: CA-1_1.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-extra-cmd extra-params]\n"; + print STDERR " CA-1_1.pl -pkcs12 [-extra-pkcs12 extra-params] [certname]\n"; + print STDERR " CA-1_1.pl -verify [-extra-verify extra-params] certfile ...\n"; + print STDERR " CA-1_1.pl -revoke [-extra-ca extra-params] certfile [reason]\n"; exit 0; } if ($WHAT eq '-newcert' ) { Index: openssl-1.1.1v/apps/build.info =================================================================== --- openssl-1.1.1v.orig/apps/build.info +++ openssl-1.1.1v/apps/build.info @@ -73,7 +73,7 @@ IF[{- !$disabled{apps} -}] GENERATE[progs.h]=progs.pl $(APPS_OPENSSL) DEPEND[progs.h]=../configdata.pm - SCRIPTS=CA.pl tsget.pl - SOURCE[CA.pl]=CA.pl.in - SOURCE[tsget.pl]=tsget.in + SCRIPTS=CA-1_1.pl tsget-1_1.pl + SOURCE[CA-1_1.pl]=CA.pl.in + SOURCE[tsget-1_1.pl]=tsget.in ENDIF Index: openssl-1.1.1v/apps/tsget.in =================================================================== --- openssl-1.1.1v.orig/apps/tsget.in +++ openssl-1.1.1v/apps/tsget.in @@ -47,7 +47,7 @@ sub create_curl { $curl->setopt(CURLOPT_VERBOSE, 1) if $options{d}; $curl->setopt(CURLOPT_FAILONERROR, 1); $curl->setopt(CURLOPT_USERAGENT, - "OpenTSA tsget.pl/openssl-{- $config{version} -}"); + "OpenTSA tsget-1_1.pl/openssl-{- $config{version} -}"); # Options for POST method. $curl->setopt(CURLOPT_UPLOAD, 1); Index: openssl-1.1.1v/doc/HOWTO/certificates.txt =================================================================== --- openssl-1.1.1v.orig/doc/HOWTO/certificates.txt +++ openssl-1.1.1v/doc/HOWTO/certificates.txt @@ -16,7 +16,7 @@ Certificate authorities should read http In all the cases shown below, the standard configuration file, as compiled into openssl, will be used. You may find it in /etc/, /usr/local/ssl/ or somewhere else. By default the file is named -openssl.cnf and is described at https://www.openssl.org/docs/apps/config.html. +openssl-1_1.cnf and is described at https://www.openssl.org/docs/apps/config.html. You can specify a different configuration file using the '-config {file}' argument with the commands shown below. Index: openssl-1.1.1v/doc/man1/CA.pl.pod =================================================================== --- openssl-1.1.1v.orig/doc/man1/CA.pl.pod +++ openssl-1.1.1v/doc/man1/CA.pl.pod @@ -2,16 +2,16 @@ =head1 NAME -CA.pl - friendlier interface for OpenSSL certificate programs +CA-1_1.pl - friendlier interface for OpenSSL certificate programs =head1 SYNOPSIS -B<CA.pl> +B<CA-1_1.pl> B<-?> | B<-h> | B<-help> -B<CA.pl> +B<CA-1_1.pl> B<-newcert> | B<-newreq> | B<-newreq-nodes> | @@ -23,15 +23,15 @@ B<-crl> | B<-newca> [B<-extra-cmd> extra-params] -B<CA.pl> B<-pkcs12> [B<-extra-pkcs12> extra-params] [B<certname>] +B<CA-1_1.pl> B<-pkcs12> [B<-extra-pkcs12> extra-params] [B<certname>] -B<CA.pl> B<-verify> [B<-extra-verify> extra-params] B<certfile>... +B<CA-1_1.pl> B<-verify> [B<-extra-verify> extra-params] B<certfile>... -B<CA.pl> B<-revoke> [B<-extra-ca> extra-params] B<certfile> [B<reason>] +B<CA-1_1.pl> B<-revoke> [B<-extra-ca> extra-params] B<certfile> [B<reason>] =head1 DESCRIPTION -The B<CA.pl> script is a perl script that supplies the relevant command line +The B<CA-1_1.pl> script is a perl script that supplies the relevant command line arguments to the B<openssl> command for some common certificate operations. It is intended to simplify the process of certificate creation and management by the use of some simple options. @@ -136,19 +136,19 @@ Users should consult B<openssl> command Create a CA hierarchy: - CA.pl -newca + CA-1_1.pl -newca Complete certificate creation example: create a CA, create a request, sign the request and finally create a PKCS#12 file containing it. - CA.pl -newca - CA.pl -newreq - CA.pl -sign - CA.pl -pkcs12 "My Test Certificate" + CA-1_1.pl -newca + CA-1_1.pl -newreq + CA-1_1.pl -sign + CA-1_1.pl -pkcs12 "My Test Certificate" =head1 DSA CERTIFICATES -Although the B<CA.pl> creates RSA CAs and requests it is still possible to +Although the B<CA-1_1.pl> creates RSA CAs and requests it is still possible to use it with DSA certificates and requests using the L<req(1)> command directly. The following example shows the steps that would typically be taken. @@ -162,7 +162,7 @@ Create a DSA CA certificate and private Create the CA directories and files: - CA.pl -newca + CA-1_1.pl -newca enter cacert.pem when prompted for the CA filename. @@ -173,22 +173,22 @@ can optionally be created first): Sign the request: - CA.pl -sign + CA-1_1.pl -sign =head1 NOTES -Most of the filenames mentioned can be modified by editing the B<CA.pl> script. +Most of the filenames mentioned can be modified by editing the B<CA-1_1.pl> script. If the demoCA directory already exists then the B<-newca> command will not overwrite it and will do nothing. This can happen if a previous call using the B<-newca> option terminated abnormally. To get the correct behaviour delete the demoCA directory if it already exists. -Under some environments it may not be possible to run the B<CA.pl> script +Under some environments it may not be possible to run the B<CA-1_1.pl> script directly (for example Win32) and the default configuration file location may be wrong. In this case the command: - perl -S CA.pl + perl -S CA-1_1.pl can be used and the B<OPENSSL_CONF> environment variable changed to point to the correct path of the configuration file. Index: openssl-1.1.1v/doc/man1/ca.pod =================================================================== --- openssl-1.1.1v.orig/doc/man1/ca.pod +++ openssl-1.1.1v/doc/man1/ca.pod @@ -698,7 +698,7 @@ the database has to be kept in memory. The B<ca> command really needs rewriting or the required functionality exposed at either a command or interface level so a more friendly utility (perl script or GUI) can handle things properly. The script -B<CA.pl> helps a little but not very much. +B<CA-1_1.pl> helps a little but not very much. Any fields in a request that are not present in a policy are silently deleted. This does not happen if the B<-preserveDN> option is used. To @@ -754,7 +754,7 @@ are in year 2050 or later. =head1 SEE ALSO -L<req(1)>, L<spkac(1)>, L<x509(1)>, L<CA.pl(1)>, +L<req(1)>, L<spkac(1)>, L<x509(1)>, L<CA-1_1.pl(1)>, L<config(5)>, L<x509v3_config(5)> =head1 COPYRIGHT Index: openssl-1.1.1v/doc/man1/rehash.pod =================================================================== --- openssl-1.1.1v.orig/doc/man1/rehash.pod +++ openssl-1.1.1v/doc/man1/rehash.pod @@ -6,7 +6,7 @@ Original text by James Westby, contribut =head1 NAME openssl-c_rehash, openssl-rehash, -c_rehash, rehash - Create symbolic links to files named by the hash values +c_rehash-1_1, rehash - Create symbolic links to files named by the hash values =head1 SYNOPSIS @@ -19,13 +19,13 @@ B<[-n]> B<[-v]> [ I<directory>...] -B<c_rehash> +B<c_rehash-1_1> I<flags...> =head1 DESCRIPTION -On some platforms, the OpenSSL B<rehash> command is available as -an external script called B<c_rehash>. They are functionally equivalent, +On some platforms, the OpenSSL B<rehash-1_1> command is available as +an external script called B<c_rehash-1_1>. They are functionally equivalent, except for minor differences noted below. B<rehash> scans directories and calculates a hash value of each @@ -66,7 +66,7 @@ more than one such object appears in the =head2 Script Configuration -The B<c_rehash> script +The B<c_rehash-1_1> script uses the B<openssl> program to compute the hashes and fingerprints. If not found in the user's B<PATH>, then set the B<OPENSSL> environment variable to the full pathname. Index: openssl-1.1.1v/doc/man1/tsget.pod =================================================================== --- openssl-1.1.1v.orig/doc/man1/tsget.pod +++ openssl-1.1.1v/doc/man1/tsget.pod @@ -35,7 +35,7 @@ line. The tool sends the following HTTP request for each timestamp request: POST url HTTP/1.1 - User-Agent: OpenTSA tsget.pl/<version> + User-Agent: OpenTSA tsget-1_1.pl/<version> Host: <host>:<port> Pragma: no-cache Content-Type: application/timestamp-query @@ -108,7 +108,7 @@ Either option B<-C> or option B<-P> must =item B<-P> CA_path (HTTPS) The path containing the trusted CA certificates to verify the peer's -certificate. The directory must be prepared with the B<c_rehash> +certificate. The directory must be prepared with the B<c_rehash-1_1> OpenSSL utility. Either option B<-C> or option B<-P> must be given in case of HTTPS. (Optional) Index: openssl-1.1.1v/doc/man1/verify.pod =================================================================== --- openssl-1.1.1v.orig/doc/man1/verify.pod +++ openssl-1.1.1v/doc/man1/verify.pod @@ -75,7 +75,7 @@ The file should contain one or more cert A directory of trusted certificates. The certificates should have names of the form: hash.0 or have symbolic links to them of this form ("hash" is the hashed certificate subject name: see the B<-hash> option -of the B<x509> utility). Under Unix the B<c_rehash> script will automatically +of the B<x509> utility). Under Unix the B<c_rehash-1_1> script will automatically create symbolic links to a directory of certificates. =item B<-no-CAfile> Index: openssl-1.1.1v/doc/man1/x509.pod =================================================================== --- openssl-1.1.1v.orig/doc/man1/x509.pod +++ openssl-1.1.1v/doc/man1/x509.pod @@ -932,7 +932,7 @@ The hash algorithm used in the B<-subjec before OpenSSL 1.0.0 was based on the deprecated MD5 algorithm and the encoding of the distinguished name. In OpenSSL 1.0.0 and later it is based on a canonical version of the DN using SHA1. This means that any directories using -the old form must have their links rebuilt using B<c_rehash> or similar. +the old form must have their links rebuilt using B<c_rehash-1_1> or similar. =head1 COPYRIGHT Index: openssl-1.1.1v/doc/man3/OPENSSL_config.pod =================================================================== --- openssl-1.1.1v.orig/doc/man3/OPENSSL_config.pod +++ openssl-1.1.1v/doc/man3/OPENSSL_config.pod @@ -15,7 +15,7 @@ OPENSSL_config, OPENSSL_no_config - simp =head1 DESCRIPTION -OPENSSL_config() configures OpenSSL using the standard B<openssl.cnf> and +OPENSSL_config() configures OpenSSL using the standard B<openssl-1_1.cnf> and reads from the application section B<appname>. If B<appname> is NULL then the default section, B<openssl_conf>, will be used. Errors are silently ignored. Index: openssl-1.1.1v/doc/man3/SSL_CTX_load_verify_locations.pod =================================================================== --- openssl-1.1.1v.orig/doc/man3/SSL_CTX_load_verify_locations.pod +++ openssl-1.1.1v/doc/man3/SSL_CTX_load_verify_locations.pod @@ -63,7 +63,7 @@ If more than one CA certificate with the extension must be different (e.g. 9d66eef0.0, 9d66eef0.1 etc). The search is performed in the ordering of the extension number, regardless of other properties of the certificates. -Use the B<c_rehash> utility to create the necessary links. +Use the B<c_rehash-1_1> utility to create the necessary links. The certificates in B<CApath> are only looked up when required, e.g. when building the certificate chain or when actually performing the verification @@ -137,7 +137,7 @@ Prepare the directory /some/where/certs for use as B<CApath>: cd /some/where/certs - c_rehash . + c_rehash-1_1 . =head1 SEE ALSO Index: openssl-1.1.1v/doc/man5/config.pod =================================================================== --- openssl-1.1.1v.orig/doc/man5/config.pod +++ openssl-1.1.1v/doc/man5/config.pod @@ -7,7 +7,7 @@ config - OpenSSL CONF library configurat =head1 DESCRIPTION The OpenSSL CONF library can be used to read configuration files. -It is used for the OpenSSL master configuration file B<openssl.cnf> +It is used for the OpenSSL master configuration file B<openssl-1_1.cnf> and in a few other places like B<SPKAC> files and certificate extension files for the B<x509> utility. OpenSSL applications can also use the CONF library for their own purposes. Index: openssl-1.1.1v/include/internal/cryptlib.h =================================================================== --- openssl-1.1.1v.orig/include/internal/cryptlib.h +++ openssl-1.1.1v/include/internal/cryptlib.h @@ -51,7 +51,7 @@ typedef struct app_mem_info_st APP_INFO; typedef struct mem_st MEM; DEFINE_LHASH_OF(MEM); -# define OPENSSL_CONF "openssl.cnf" +# define OPENSSL_CONF "openssl-1_1.cnf" # ifndef OPENSSL_SYS_VMS # define X509_CERT_AREA OPENSSLDIR Index: openssl-1.1.1v/test/recipes/80-test_ca.t =================================================================== --- openssl-1.1.1v.orig/test/recipes/80-test_ca.t +++ openssl-1.1.1v/test/recipes/80-test_ca.t @@ -27,27 +27,27 @@ plan tests => 5; SKIP: { $ENV{OPENSSL_CONFIG} = '-config "'.srctop_file("test", "CAss.cnf").'"'; skip "failed creating CA structure", 4 - if !ok(run(perlapp(["CA.pl","-newca"], stdin => undef)), + if !ok(run(perlapp(["CA-1_1.pl","-newca"], stdin => undef)), 'creating CA structure'); $ENV{OPENSSL_CONFIG} = '-config "'.srctop_file("test", "Uss.cnf").'"'; skip "failed creating new certificate request", 3 - if !ok(run(perlapp(["CA.pl","-newreq"])), + if !ok(run(perlapp(["CA-1_1.pl","-newreq"])), 'creating certificate request'); $ENV{OPENSSL_CONFIG} = '-rand_serial -config "'.$std_openssl_cnf.'"'; skip "failed to sign certificate request", 2 - if !is(yes(cmdstr(perlapp(["CA.pl", "-sign"]))), 0, + if !is(yes(cmdstr(perlapp(["CA-1_1.pl", "-sign"]))), 0, 'signing certificate request'); - ok(run(perlapp(["CA.pl", "-verify", "newcert.pem"])), + ok(run(perlapp(["CA-1_1.pl", "-verify", "newcert.pem"])), 'verifying new certificate'); skip "CT not configured, can't use -precert", 1 if disabled("ct"); $ENV{OPENSSL_CONFIG} = '-config "'.srctop_file("test", "Uss.cnf").'"'; - ok(run(perlapp(["CA.pl", "-precert"], stderr => undef)), + ok(run(perlapp(["CA-1_1.pl", "-precert"], stderr => undef)), 'creating new pre-certificate'); } Index: openssl-1.1.1v/tools/build.info =================================================================== --- openssl-1.1.1v.orig/tools/build.info +++ openssl-1.1.1v/tools/build.info @@ -1,5 +1,5 @@ {- our $c_rehash_name = - $config{target} =~ /^(VC|vms)-/ ? "c_rehash.pl" : "c_rehash"; + $config{target} =~ /^(VC|vms)-/ ? "c_rehash-1_1.pl" : "c_rehash-1_1"; "" -} IF[{- !$disabled{apps} -}] SCRIPTS={- $c_rehash_name -} Index: openssl-1.1.1v/tools/c_rehash.in =================================================================== --- openssl-1.1.1v.orig/tools/c_rehash.in +++ openssl-1.1.1v/tools/c_rehash.in @@ -8,7 +8,7 @@ # in the file LICENSE in the source distribution or at # https://www.openssl.org/source/license.html -# Perl c_rehash script, scan all files in a directory +# Perl c_rehash-1_1 script, scan all files in a directory # and add symbolic links to their hash values. my $dir = {- quotify1($config{openssldir}) -}; @@ -44,7 +44,7 @@ while ( $ARGV[0] =~ /^-/ ) { } sub help { - print "Usage: c_rehash [-old] [-h] [-help] [-v] [dirs...]\n"; + print "Usage: c_rehash-1_1 [-old] [-h] [-help] [-v] [dirs...]\n"; print " -old use old-style digest\n"; print " -h or -help print this help text\n"; print " -v print files removed and linked\n"; @@ -73,7 +73,7 @@ if (! -x $openssl) { } } if ($found == 0) { - print STDERR "c_rehash: rehashing skipped ('openssl' program not available)\n"; + print STDERR "c_rehash-1_1: rehashing skipped ('openssl-1_1' program not available)\n"; exit 0; } }
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor