All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2] openssl: Upgrade 1.0.2k -> 1.0.2l
@ 2017-06-08 12:51 Changhyeok Bae
  2017-06-09 11:06 ` Burton, Ross
  2017-06-09 13:13 ` Khem Raj
  0 siblings, 2 replies; 4+ messages in thread
From: Changhyeok Bae @ 2017-06-08 12:51 UTC (permalink / raw)
  To: openembedded-core

Dropped obsolete patches, because the new version contains them:
  - fix-cipher-des-ede3-cfb1.patch
  - openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch

Signed-off-by: Changhyeok Bae <changhyeok.bae@gmail.com>
---
 .../openssl/openssl/fix-cipher-des-ede3-cfb1.patch | 21 --------------------
 ...-pointer-dereference-in-EVP_DigestInit_ex.patch | 23 ----------------------
 .../{openssl_1.0.2k.bb => openssl_1.0.2l.bb}       |  8 +++-----
 3 files changed, 3 insertions(+), 49 deletions(-)
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch
 delete mode 100644 meta/recipes-connectivity/openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
 rename meta/recipes-connectivity/openssl/{openssl_1.0.2k.bb => openssl_1.0.2l.bb} (86%)

diff --git a/meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch b/meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch
deleted file mode 100644
index 2a318a4..0000000
--- a/meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch
+++ /dev/null
@@ -1,21 +0,0 @@
-Upstream-Status: Submitted
-
-This patch adds the fix for one of the ciphers used in openssl, namely
-the cipher des-ede3-cfb1. Complete bug log and patch is present here:
-http://rt.openssl.org/Ticket/Display.html?id=2867
-
-Signed-off-by: Muhammad Shakeel <muhammad_shakeel@mentor.com>
-
-Index: openssl-1.0.2/crypto/evp/e_des3.c
-===================================================================
---- openssl-1.0.2.orig/crypto/evp/e_des3.c
-+++ openssl-1.0.2/crypto/evp/e_des3.c
-@@ -211,7 +211,7 @@ static int des_ede3_cfb1_cipher(EVP_CIPH
-     size_t n;
-     unsigned char c[1], d[1];
- 
--    for (n = 0; n < inl; ++n) {
-+    for (n = 0; n * 8 < inl; ++n) {
-         c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0;
-         DES_ede3_cfb_encrypt(c, d, 1, 1,
-                              &data(ctx)->ks1, &data(ctx)->ks2,
diff --git a/meta/recipes-connectivity/openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch b/meta/recipes-connectivity/openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
deleted file mode 100644
index f736e5c..0000000
--- a/meta/recipes-connectivity/openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
+++ /dev/null
@@ -1,23 +0,0 @@
-openssl: avoid NULL pointer dereference in EVP_DigestInit_ex()
-
-We should avoid accessing the type pointer if it's NULL,
-this could happen if ctx->digest is not NULL.
-
-Upstream-Status: Submitted
-http://www.mail-archive.com/openssl-dev@openssl.org/msg32860.html
-
-Signed-off-by: Xufeng Zhang <xufeng.zhang@windriver.com>
----
-Index: openssl-1.0.2h/crypto/evp/digest.c
-===================================================================
---- openssl-1.0.2h.orig/crypto/evp/digest.c
-+++ openssl-1.0.2h/crypto/evp/digest.c
-@@ -211,7 +211,7 @@ int EVP_DigestInit_ex(EVP_MD_CTX *ctx, c
-         type = ctx->digest;
-     }
- #endif
--    if (ctx->digest != type) {
-+    if (type && (ctx->digest != type)) {
-         if (ctx->digest && ctx->digest->ctx_size) {
-             OPENSSL_free(ctx->md_data);
-             ctx->md_data = NULL;
diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.2k.bb b/meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
similarity index 86%
rename from meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
rename to meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
index 83d1a50..a2ef2ac 100644
--- a/meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
+++ b/meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
@@ -7,7 +7,7 @@ DEPENDS += "cryptodev-linux"
 CFLAG += "-DHAVE_CRYPTODEV -DUSE_CRYPTODEV_DIGESTS"
 CFLAG_append_class-native = " -fPIC"
 
-LIC_FILES_CHKSUM = "file://LICENSE;md5=27ffa5d74bb5a337056c14b2ef93fbf6"
+LIC_FILES_CHKSUM = "file://LICENSE;md5=057d9218c6180e1d9ee407572b2dd225"
 
 export DIRS = "crypto ssl apps engines"
 export OE_LDFLAGS="${LDFLAGS}"
@@ -32,8 +32,6 @@ SRC_URI += "file://find.pl;subdir=${BP}/util/ \
             file://debian1.0.2/version-script.patch \
             file://debian1.0.2/soname.patch \
             file://openssl_fix_for_x32.patch \
-            file://fix-cipher-des-ede3-cfb1.patch \
-            file://openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch \
             file://openssl-fix-des.pod-error.patch \
             file://Makefiles-ptest.patch \
             file://ptest-deps.patch \
@@ -45,8 +43,8 @@ SRC_URI += "file://find.pl;subdir=${BP}/util/ \
             file://Use-SHA256-not-MD5-as-default-digest.patch \
             file://0001-Fix-build-with-clang-using-external-assembler.patch \
             "
-SRC_URI[md5sum] = "f965fc0bf01bf882b31314b61391ae65"
-SRC_URI[sha256sum] = "6b3977c61f2aedf0f96367dcfb5c6e578cf37e7b8d913b4ecb6643c3cb88d8c0"
+SRC_URI[md5sum] = "f85123cd390e864dfbe517e7616e6566"
+SRC_URI[sha256sum] = "ce07195b659e75f4e1db43552860070061f156a98bb37b672b101ba6e3ddf30c"
 
 PACKAGES =+ "${PN}-engines"
 FILES_${PN}-engines = "${libdir}/ssl/engines/*.so ${libdir}/engines"
-- 
2.7.4



^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH v2] openssl: Upgrade 1.0.2k -> 1.0.2l
  2017-06-08 12:51 [PATCH v2] openssl: Upgrade 1.0.2k -> 1.0.2l Changhyeok Bae
@ 2017-06-09 11:06 ` Burton, Ross
  2017-06-09 13:13 ` Khem Raj
  1 sibling, 0 replies; 4+ messages in thread
From: Burton, Ross @ 2017-06-09 11:06 UTC (permalink / raw)
  To: Changhyeok Bae; +Cc: OE-core

[-- Attachment #1: Type: text/plain, Size: 864 bytes --]

On 8 June 2017 at 13:51, Changhyeok Bae <changhyeok.bae@gmail.com> wrote:

> Dropped obsolete patches, because the new version contains them:
>   - fix-cipher-des-ede3-cfb1.patch
>   - openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
>
This failed all over the autobuilder:

http://errors.yoctoproject.org/Errors/Details/144268/:

mips64-poky-linux-objcopy: Unable to recognise the format of the input file
`TOPDIR/tmp/work/mips64-poky-linux/openssl/1.0.2l-r0/package/usr/lib/openssl/ptest/test/x509aux'

http://errors.yoctoproject.org/Errors/Details/144261/:
Architecture did not match (x86-64, expected x86) on
/work/i586-poky-linux/openssl/1.0.2l-r0/packages-split/openssl-ptest/usr/lib/openssl/ptest/test/x509aux
[arch]

If that file is an ELF (which is unlikely) then removing the executable bit
should be enough.

Ross

[-- Attachment #2: Type: text/html, Size: 1732 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH v2] openssl: Upgrade 1.0.2k -> 1.0.2l
  2017-06-08 12:51 [PATCH v2] openssl: Upgrade 1.0.2k -> 1.0.2l Changhyeok Bae
  2017-06-09 11:06 ` Burton, Ross
@ 2017-06-09 13:13 ` Khem Raj
  2017-06-10  4:16   ` Changhyeok Bae
  1 sibling, 1 reply; 4+ messages in thread
From: Khem Raj @ 2017-06-09 13:13 UTC (permalink / raw)
  To: Changhyeok Bae, openembedded-core

[-- Attachment #1: Type: text/plain, Size: 5805 bytes --]

On Thu, Jun 8, 2017 at 5:52 AM Changhyeok Bae <changhyeok.bae@gmail.com>
wrote:

> Dropped obsolete patches, because the new version contains them:
>   - fix-cipher-des-ede3-cfb1.patch
>   - openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
>
> Signed-off-by: Changhyeok Bae <changhyeok.bae@gmail.com>
> ---
>  .../openssl/openssl/fix-cipher-des-ede3-cfb1.patch | 21
> --------------------
>  ...-pointer-dereference-in-EVP_DigestInit_ex.patch | 23
> ----------------------
>  .../{openssl_1.0.2k.bb => openssl_1.0.2l.bb}       |  8 +++-----
>  3 files changed, 3 insertions(+), 49 deletions(-)
>  delete mode 100644
> meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch
>  delete mode 100644
> meta/recipes-connectivity/openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
>  rename meta/recipes-connectivity/openssl/{openssl_1.0.2k.bb =>
> openssl_1.0.2l.bb} (86%)
>
> diff --git
> a/meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch
> b/meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch
> deleted file mode 100644
> index 2a318a4..0000000
> ---
> a/meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch
> +++ /dev/null
> @@ -1,21 +0,0 @@
> -Upstream-Status: Submitted
> -
> -This patch adds the fix for one of the ciphers used in openssl, namely
> -the cipher des-ede3-cfb1. Complete bug log and patch is present here:
> -http://rt.openssl.org/Ticket/Display.html?id=2867
> -
> -Signed-off-by: Muhammad Shakeel <muhammad_shakeel@mentor.com>
> -
> -Index: openssl-1.0.2/crypto/evp/e_des3.c
> -===================================================================
> ---- openssl-1.0.2.orig/crypto/evp/e_des3.c
> -+++ openssl-1.0.2/crypto/evp/e_des3.c
> -@@ -211,7 +211,7 @@ static int des_ede3_cfb1_cipher(EVP_CIPH
> -     size_t n;
> -     unsigned char c[1], d[1];
> -
> --    for (n = 0; n < inl; ++n) {
> -+    for (n = 0; n * 8 < inl; ++n) {
> -         c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0;
> -         DES_ede3_cfb_encrypt(c, d, 1, 1,
> -                              &data(ctx)->ks1, &data(ctx)->ks2,
> diff --git
> a/meta/recipes-connectivity/openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
> b/meta/recipes-connectivity/openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
> deleted file mode 100644
> index f736e5c..0000000
> ---
> a/meta/recipes-connectivity/openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
> +++ /dev/null
> @@ -1,23 +0,0 @@
> -openssl: avoid NULL pointer dereference in EVP_DigestInit_ex()
> -
> -We should avoid accessing the type pointer if it's NULL,
> -this could happen if ctx->digest is not NULL.
> -
> -Upstream-Status: Submitted
> -http://www.mail-archive.com/openssl-dev@openssl.org/msg32860.html
> -
> -Signed-off-by: Xufeng Zhang <xufeng.zhang@windriver.com>
> ----
> -Index: openssl-1.0.2h/crypto/evp/digest.c
> -===================================================================
> ---- openssl-1.0.2h.orig/crypto/evp/digest.c
> -+++ openssl-1.0.2h/crypto/evp/digest.c
> -@@ -211,7 +211,7 @@ int EVP_DigestInit_ex(EVP_MD_CTX *ctx, c
> -         type = ctx->digest;
> -     }
> - #endif
> --    if (ctx->digest != type) {
> -+    if (type && (ctx->digest != type)) {
> -         if (ctx->digest && ctx->digest->ctx_size) {
> -             OPENSSL_free(ctx->md_data);
> -             ctx->md_data = NULL;
> diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
> b/meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
> similarity index 86%
> rename from meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
> rename to meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
> index 83d1a50..a2ef2ac 100644
> --- a/meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
> +++ b/meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
> @@ -7,7 +7,7 @@ DEPENDS += "cryptodev-linux"
>  CFLAG += "-DHAVE_CRYPTODEV -DUSE_CRYPTODEV_DIGESTS"
>  CFLAG_append_class-native = " -fPIC"
>
> -LIC_FILES_CHKSUM = "file://LICENSE;md5=27ffa5d74bb5a337056c14b2ef93fbf6"
> +LIC_FILES_CHKSUM = "file://LICENSE;md5=057d9218c6180e1d9ee407572b2dd225"
>

What resulted in this change

>
>  export DIRS = "crypto ssl apps engines"
>  export OE_LDFLAGS="${LDFLAGS}"
> @@ -32,8 +32,6 @@ SRC_URI += "file://find.pl;subdir=${BP}/util/ \
>              file://debian1.0.2/version-script.patch \
>              file://debian1.0.2/soname.patch \
>              file://openssl_fix_for_x32.patch \
> -            file://fix-cipher-des-ede3-cfb1.patch \
> -
> file://openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch \
>              file://openssl-fix-des.pod-error.patch \
>              file://Makefiles-ptest.patch \
>              file://ptest-deps.patch \
> @@ -45,8 +43,8 @@ SRC_URI += "file://find.pl;subdir=${BP}/util/ \
>              file://Use-SHA256-not-MD5-as-default-digest.patch \
>
>  file://0001-Fix-build-with-clang-using-external-assembler.patch \
>              "
> -SRC_URI[md5sum] = "f965fc0bf01bf882b31314b61391ae65"
> -SRC_URI[sha256sum] =
> "6b3977c61f2aedf0f96367dcfb5c6e578cf37e7b8d913b4ecb6643c3cb88d8c0"
> +SRC_URI[md5sum] = "f85123cd390e864dfbe517e7616e6566"
> +SRC_URI[sha256sum] =
> "ce07195b659e75f4e1db43552860070061f156a98bb37b672b101ba6e3ddf30c"
>
>  PACKAGES =+ "${PN}-engines"
>  FILES_${PN}-engines = "${libdir}/ssl/engines/*.so ${libdir}/engines"
> --
> 2.7.4
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core@lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core
>

[-- Attachment #2: Type: text/html, Size: 8210 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH v2] openssl: Upgrade 1.0.2k -> 1.0.2l
  2017-06-09 13:13 ` Khem Raj
@ 2017-06-10  4:16   ` Changhyeok Bae
  0 siblings, 0 replies; 4+ messages in thread
From: Changhyeok Bae @ 2017-06-10  4:16 UTC (permalink / raw)
  To: Khem Raj; +Cc: Patches and discussions about the oe-core layer

[-- Attachment #1: Type: text/plain, Size: 6222 bytes --]

test binaries (x86) is included in In openssl-1.0.2l source code and I will
remove those binaries and re-submit.

Thanks
Changhyeok

2017-06-09 22:13 GMT+09:00 Khem Raj <raj.khem@gmail.com>:

>
> On Thu, Jun 8, 2017 at 5:52 AM Changhyeok Bae <changhyeok.bae@gmail.com>
> wrote:
>
>> Dropped obsolete patches, because the new version contains them:
>>   - fix-cipher-des-ede3-cfb1.patch
>>   - openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
>>
>> Signed-off-by: Changhyeok Bae <changhyeok.bae@gmail.com>
>> ---
>>  .../openssl/openssl/fix-cipher-des-ede3-cfb1.patch | 21
>> --------------------
>>  ...-pointer-dereference-in-EVP_DigestInit_ex.patch | 23
>> ----------------------
>>  .../{openssl_1.0.2k.bb => openssl_1.0.2l.bb}       |  8 +++-----
>>  3 files changed, 3 insertions(+), 49 deletions(-)
>>  delete mode 100644 meta/recipes-connectivity/openssl/openssl/fix-cipher-
>> des-ede3-cfb1.patch
>>  delete mode 100644 meta/recipes-connectivity/
>> openssl/openssl/openssl-avoid-NULL-pointer-dereference-in-
>> EVP_DigestInit_ex.patch
>>  rename meta/recipes-connectivity/openssl/{openssl_1.0.2k.bb =>
>> openssl_1.0.2l.bb} (86%)
>>
>> diff --git a/meta/recipes-connectivity/openssl/openssl/fix-cipher-des-ede3-cfb1.patch
>> b/meta/recipes-connectivity/openssl/openssl/fix-cipher-
>> des-ede3-cfb1.patch
>> deleted file mode 100644
>> index 2a318a4..0000000
>> --- a/meta/recipes-connectivity/openssl/openssl/fix-cipher-
>> des-ede3-cfb1.patch
>> +++ /dev/null
>> @@ -1,21 +0,0 @@
>> -Upstream-Status: Submitted
>> -
>> -This patch adds the fix for one of the ciphers used in openssl, namely
>> -the cipher des-ede3-cfb1. Complete bug log and patch is present here:
>> -http://rt.openssl.org/Ticket/Display.html?id=2867
>> -
>> -Signed-off-by: Muhammad Shakeel <muhammad_shakeel@mentor.com>
>> -
>> -Index: openssl-1.0.2/crypto/evp/e_des3.c
>> -===================================================================
>> ---- openssl-1.0.2.orig/crypto/evp/e_des3.c
>> -+++ openssl-1.0.2/crypto/evp/e_des3.c
>> -@@ -211,7 +211,7 @@ static int des_ede3_cfb1_cipher(EVP_CIPH
>> -     size_t n;
>> -     unsigned char c[1], d[1];
>> -
>> --    for (n = 0; n < inl; ++n) {
>> -+    for (n = 0; n * 8 < inl; ++n) {
>> -         c[0] = (in[n / 8] & (1 << (7 - n % 8))) ? 0x80 : 0;
>> -         DES_ede3_cfb_encrypt(c, d, 1, 1,
>> -                              &data(ctx)->ks1, &data(ctx)->ks2,
>> diff --git a/meta/recipes-connectivity/openssl/openssl/openssl-avoid-
>> NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
>> b/meta/recipes-connectivity/openssl/openssl/openssl-avoid-
>> NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
>> deleted file mode 100644
>> index f736e5c..0000000
>> --- a/meta/recipes-connectivity/openssl/openssl/openssl-avoid-
>> NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
>> +++ /dev/null
>> @@ -1,23 +0,0 @@
>> -openssl: avoid NULL pointer dereference in EVP_DigestInit_ex()
>> -
>> -We should avoid accessing the type pointer if it's NULL,
>> -this could happen if ctx->digest is not NULL.
>> -
>> -Upstream-Status: Submitted
>> -http://www.mail-archive.com/openssl-dev@openssl.org/msg32860.html
>> -
>> -Signed-off-by: Xufeng Zhang <xufeng.zhang@windriver.com>
>> ----
>> -Index: openssl-1.0.2h/crypto/evp/digest.c
>> -===================================================================
>> ---- openssl-1.0.2h.orig/crypto/evp/digest.c
>> -+++ openssl-1.0.2h/crypto/evp/digest.c
>> -@@ -211,7 +211,7 @@ int EVP_DigestInit_ex(EVP_MD_CTX *ctx, c
>> -         type = ctx->digest;
>> -     }
>> - #endif
>> --    if (ctx->digest != type) {
>> -+    if (type && (ctx->digest != type)) {
>> -         if (ctx->digest && ctx->digest->ctx_size) {
>> -             OPENSSL_free(ctx->md_data);
>> -             ctx->md_data = NULL;
>> diff --git a/meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
>> b/meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
>> similarity index 86%
>> rename from meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
>> rename to meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
>> index 83d1a50..a2ef2ac 100644
>> --- a/meta/recipes-connectivity/openssl/openssl_1.0.2k.bb
>> +++ b/meta/recipes-connectivity/openssl/openssl_1.0.2l.bb
>> @@ -7,7 +7,7 @@ DEPENDS += "cryptodev-linux"
>>  CFLAG += "-DHAVE_CRYPTODEV -DUSE_CRYPTODEV_DIGESTS"
>>  CFLAG_append_class-native = " -fPIC"
>>
>> -LIC_FILES_CHKSUM = "file://LICENSE;md5=27ffa5d74bb5a337056c14b2ef93fbf6"
>> +LIC_FILES_CHKSUM = "file://LICENSE;md5=057d9218c6180e1d9ee407572b2dd225"
>>
>
> What resulted in this change
>
>>
>>  export DIRS = "crypto ssl apps engines"
>>  export OE_LDFLAGS="${LDFLAGS}"
>> @@ -32,8 +32,6 @@ SRC_URI += "file://find.pl;subdir=${BP}/util/ \
>>              file://debian1.0.2/version-script.patch \
>>              file://debian1.0.2/soname.patch \
>>              file://openssl_fix_for_x32.patch \
>> -            file://fix-cipher-des-ede3-cfb1.patch \
>> -            file://openssl-avoid-NULL-pointer-dereference-in-EVP_DigestInit_ex.patch
>> \
>>              file://openssl-fix-des.pod-error.patch \
>>              file://Makefiles-ptest.patch \
>>              file://ptest-deps.patch \
>> @@ -45,8 +43,8 @@ SRC_URI += "file://find.pl;subdir=${BP}/util/ \
>>              file://Use-SHA256-not-MD5-as-default-digest.patch \
>>              file://0001-Fix-build-with-clang-using-external-assembler.patch
>> \
>>              "
>> -SRC_URI[md5sum] = "f965fc0bf01bf882b31314b61391ae65"
>> -SRC_URI[sha256sum] = "6b3977c61f2aedf0f96367dcfb5c6e
>> 578cf37e7b8d913b4ecb6643c3cb88d8c0"
>> +SRC_URI[md5sum] = "f85123cd390e864dfbe517e7616e6566"
>> +SRC_URI[sha256sum] = "ce07195b659e75f4e1db4355286007
>> 0061f156a98bb37b672b101ba6e3ddf30c"
>>
>>  PACKAGES =+ "${PN}-engines"
>>  FILES_${PN}-engines = "${libdir}/ssl/engines/*.so ${libdir}/engines"
>> --
>> 2.7.4
>>
>> --
>> _______________________________________________
>> Openembedded-core mailing list
>> Openembedded-core@lists.openembedded.org
>> http://lists.openembedded.org/mailman/listinfo/openembedded-core
>>
>


-- 
Thanks
Changhyeok

[-- Attachment #2: Type: text/html, Size: 9383 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2017-06-10  4:16 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-06-08 12:51 [PATCH v2] openssl: Upgrade 1.0.2k -> 1.0.2l Changhyeok Bae
2017-06-09 11:06 ` Burton, Ross
2017-06-09 13:13 ` Khem Raj
2017-06-10  4:16   ` Changhyeok Bae

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.