Closed HansVanEijsden closed 7 years ago
yup same here https://community.centminmod.com/posts/36691/
ccache gcc -I.. -I../.. -I../modes -I../asn1 -I../evp -I../../include -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -Wa,--noexecstack -m64 -DL_ENDIAN -O3 -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -c -o e_rc4_hmac_md5.o e_rc4_hmac_md5.c
ccache gcc -I.. -I../.. -I../modes -I../asn1 -I../evp -I../../include -fPIC -DOPENSSL_PIC -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -Wa,--noexecstack -m64 -DL_ENDIAN -O3 -Wall -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -c -o e_chacha20poly1305.o e_chacha20poly1305.c
e_chacha20poly1305.c: In function 'EVP_chacha20_poly1305_cipher':
e_chacha20poly1305.c:82:57: error: 'EVP_CHACHA20_POLY1305_CTX' has no member named 'poly_state'
#define poly_update(c,i,l) CRYPTO_poly1305_update(&c->poly_state,i,l)
^
e_chacha20poly1305.c:228:9: note: in expansion of macro 'poly_update'
poly_update(aead_ctx, in, inl);
^
e_chacha20poly1305.c:251:9: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing]
((uint64_t *)(aead_ctx->nonce))[4]--;
@HansVanEijsden @centminmod You could easily fix the patch for OpenSSL 1.0.2i yourself.
Because the OpenSSL 1.0.2i code changed the < OpenSSL 1.0.2i based patch can't find the requested code (via the @@ position and location) and fails.
View the rejected code in the affected .rej files and reinsert it into the OpenSSL 1.0.2i base in the right place. Then diff the upstream vs new and update your patch.
No reason to ask Cloudflare every time for an up-to-date patch 123456. They have better things to do.
Their task is accomplished with the release of the source. Desired own efforts, not dependent on another.
@xetorixik Come on, be a bit friendly to this community here. Do you have a working patch?
@HansVanEijsden @centminmod
Apply Cloudflare's patch, then re-add the reject 8 lines back in. If you need a patch for it, you can use: https://gist.github.com/charlesportwoodii/9e95c6a4ecde31ea23c17f6823bdb320.
I backported the complete patch for 1.0.2i: https://github.com/Whissi/openssl/commit/5f22ddce5c2f301e9e6b2d38315e44388cefce5d
@rugk it is friendly intended. @HansVanEijsden linkedin profile, writes about Gymnasium (type of school). He is more than smart enough to adapt a few lines in the code.
Get out of your own strength :)
Separately, hours or a day or so after the release of a new Openssl version there are more than enough up-to-date (fork) patches on github. No reason thereby to bother Cloudflare time after time for 1233456 lines changed patches.
Hi everyone, I am very excited to see so much interest in this patch, and thank you for the support @xetorixik :) I will try to update it next week.
writes about Gymnasium (type of school).
Ah, ehm, that's supposed to mean secondary school, high school or grammar school. School systems are sometimes different. :smiley:
@rugk Highest achievable in the Netherlands regarding high school. In short, @HansVanEijsden is a smart guy. He should be able to work on a patch. @vkrasnov Your Chacha patch is awesome so thank you, next stop if you ask me, releasing Cloudflare's Nginx http/2 server push patch :)
Thanks Wissi.
Updated to 1.0.2j.
Unfortunately I cannot patch the new OpenSSL 1.0.2i.