mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-26 05:02:18 +00:00
security/libressl: Update to 2.5.4
- Security update to 2.5.4 - Remove CVE-2017-8301 patch (included in 2.5.4) Security: 24673ed7-2bf3-11e7-b291-b499baebfeaf
This commit is contained in:
parent
445c7ccb38
commit
1fba56590e
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=440004
@ -2,8 +2,7 @@
|
||||
# $FreeBSD$
|
||||
|
||||
PORTNAME= libressl
|
||||
PORTVERSION= 2.5.3
|
||||
PORTREVISION= 1
|
||||
PORTVERSION= 2.5.4
|
||||
CATEGORIES= security devel
|
||||
MASTER_SITES= OPENBSD/LibreSSL
|
||||
|
||||
|
@ -1,3 +1,3 @@
|
||||
TIMESTAMP = 1491933706
|
||||
SHA256 (libressl-2.5.3.tar.gz) = 14e34cc586ec4ce5763f76046dcf366c45104b2cc71d77b63be5505608e68a30
|
||||
SIZE (libressl-2.5.3.tar.gz) = 3285151
|
||||
TIMESTAMP = 1493799912
|
||||
SHA256 (libressl-2.5.4.tar.gz) = 107a5b522fbb8318d4c3be668075e5e607296f0a9255d71674caa94571336efa
|
||||
SIZE (libressl-2.5.4.tar.gz) = 3286042
|
||||
|
@ -1,32 +0,0 @@
|
||||
https://marc.info/?l=openbsd-cvs&m=149342064612660
|
||||
|
||||
===================================================================
|
||||
RCS file: /cvs/src/lib/libcrypto/x509/x509_vfy.c,v
|
||||
retrieving revision 1.61
|
||||
retrieving revision 1.61.4.1
|
||||
diff -u -r1.61 -r1.61.4.1
|
||||
--- crypto/x509/x509_vfy.c 2017/02/05 02:33:21 1.61
|
||||
+++ crypto/x509/x509_vfy.c 2017/04/28 23:12:04 1.61.4.1
|
||||
@@ -1,4 +1,4 @@
|
||||
-/* $OpenBSD: x509_vfy.c,v 1.61 2017/02/05 02:33:21 beck Exp $ */
|
||||
+/* $OpenBSD: x509_vfy.c,v 1.61.4.1 2017/04/28 23:12:04 beck Exp $ */
|
||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
||||
* All rights reserved.
|
||||
*
|
||||
@@ -541,15 +541,7 @@
|
||||
/* Safety net, error returns must set ctx->error */
|
||||
if (ok <= 0 && ctx->error == X509_V_OK)
|
||||
ctx->error = X509_V_ERR_UNSPECIFIED;
|
||||
-
|
||||
- /*
|
||||
- * Safety net, if user provided verify callback indicates sucess
|
||||
- * make sure they have set error to X509_V_OK
|
||||
- */
|
||||
- if (ctx->verify_cb != null_callback && ok == 1)
|
||||
- ctx->error = X509_V_OK;
|
||||
-
|
||||
- return(ctx->error == X509_V_OK);
|
||||
+ return ok;
|
||||
}
|
||||
|
||||
/* Given a STACK_OF(X509) find the issuer of cert (if any)
|
Loading…
Reference in New Issue
Block a user