diff options
author | B Stack <bgstack15@gmail.com> | 2020-04-21 13:27:40 +0000 |
---|---|---|
committer | B Stack <bgstack15@gmail.com> | 2020-04-21 13:27:40 +0000 |
commit | edbfd7e2c82b9b72af429a0af15fb4685987b80a (patch) | |
tree | 73ef81c5517422a357ea495b4d09193998fd0d01 /freefilesync/ffs_libssl.patch | |
parent | improve pm/wf prefs.js (diff) | |
parent | git stupidity (diff) | |
download | stackrpms-edbfd7e2c82b9b72af429a0af15fb4685987b80a.tar.gz stackrpms-edbfd7e2c82b9b72af429a0af15fb4685987b80a.tar.bz2 stackrpms-edbfd7e2c82b9b72af429a0af15fb4685987b80a.zip |
Merge branch 'freefilesync-bump' into 'master'
Freefilesync 10.23
See merge request bgstack15/stackrpms!151
Diffstat (limited to 'freefilesync/ffs_libssl.patch')
-rw-r--r-- | freefilesync/ffs_libssl.patch | 53 |
1 files changed, 0 insertions, 53 deletions
diff --git a/freefilesync/ffs_libssl.patch b/freefilesync/ffs_libssl.patch deleted file mode 100644 index 1e043c1..0000000 --- a/freefilesync/ffs_libssl.patch +++ /dev/null @@ -1,53 +0,0 @@ -Author: bgstack15 -Message: Revert freefilesync 10.22 zen/open_ssl.cpp which depends on openssl 1.1.1e which is not available in this distro yet. -Date: 2020-03-18 -diff --git a/zen/open_ssl.cpp b/zen/open_ssl.cpp -index 0f1da3fc..b823f8ca 100644 ---- a/zen/open_ssl.cpp -+++ b/zen/open_ssl.cpp -@@ -18,7 +18,7 @@ using namespace zen; - #error FFS, we are royally screwed! - #endif - --static_assert(OPENSSL_VERSION_NUMBER >= 0x1010105fL, "OpenSSL version too old"); -+static_assert(OPENSSL_VERSION_NUMBER >= 0x10100000L, "OpenSSL version too old"); - - - void zen::openSslInit() -@@ -68,7 +68,7 @@ std::wstring formatOpenSSLError(const std::wstring& functionName, unsigned long - - std::wstring formatLastOpenSSLError(const std::wstring& functionName) - { -- const auto ec = ::ERR_peek_last_error(); -+ const unsigned long ec = ::ERR_peek_last_error(); - ::ERR_clear_error(); //clean up for next OpenSSL operation on this thread - return formatOpenSSLError(functionName, ec); - } -@@ -566,16 +566,9 @@ public: - if (rv != 1) - { - const int sslError = ::SSL_get_error(ssl_, rv); -- if (sslError == SSL_ERROR_ZERO_RETURN) -- return 0; //EOF + close_notify alert -- -- warn_static("find a better solution for SSL_read_ex + EOF") -- //"sslError == SSL_ERROR_SYSCALL && ::ERR_peek_last_error() == 0" => obsolete as of OpenSSL 1.1.1e -- //https://github.com/openssl/openssl/issues/10880#issuecomment-575746226 -- const auto ec = ::ERR_peek_last_error(); -- if (sslError == SSL_ERROR_SSL && ERR_GET_REASON(ec) == SSL_R_UNEXPECTED_EOF_WHILE_READING) //EOF: only expected for HTTP/1.0 -+ if (sslError == SSL_ERROR_ZERO_RETURN || //EOF + close_notify alert -+ (sslError == SSL_ERROR_SYSCALL && ::ERR_peek_last_error() == 0)) //EOF: only expected for HTTP/1.0 - return 0; -- - throw SysError(formatLastOpenSSLError(L"SSL_read_ex") + L' ' + formatSslErrorCode(sslError)); - } - assert(bytesReceived > 0); //SSL_read_ex() considers EOF an error! -@@ -771,7 +764,7 @@ std::string zen::convertPuttyKeyToPkix(const std::string& keyStream, const std:: - - auto numToBeString = [](size_t n) -> std::string - { -- static_assert(usingLittleEndian()&& sizeof(n) >= 4); -+ static_assert(usingLittleEndian() && sizeof(n) >= 4); - const char* numStr = reinterpret_cast<const char*>(&n); - return { numStr[3], numStr[2], numStr[1], numStr[0] }; //big endian! - }; |