mirror of
https://git.busybox.net/buildroot.git
synced 2024-11-23 21:43:30 +08:00
f2074e11ed
Removed patch 0003, upstream fixes configure.in. Added patch from Fedora to fix OpenSSL 1.1.x. build. Added upstream hashes and license hash. Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
295 lines
9.5 KiB
Diff
295 lines
9.5 KiB
Diff
Fix build with OpenSSL 1.1.x
|
|
|
|
Extracted vtun-openssl.patch from
|
|
http://dl.fedoraproject.org/pub/fedora/linux/releases/27/Everything/source/tree/Packages/v/vtun-3.0.4-4.fc27.src.rpm
|
|
|
|
Signed-off-by: Bernd Kuhls <bernd.kuhls@t-online.de>
|
|
|
|
diff -NarU5 a/lfd_encrypt.c b/lfd_encrypt.c
|
|
--- a/lfd_encrypt.c 2016-10-01 17:27:51.000000000 -0400
|
|
+++ b/lfd_encrypt.c 2017-03-20 08:43:48.013308435 -0400
|
|
@@ -93,15 +93,15 @@
|
|
static int dec_init_first_time;
|
|
static unsigned long sequence_num;
|
|
static char * pkey;
|
|
static char * iv_buf;
|
|
|
|
-static EVP_CIPHER_CTX ctx_enc; /* encrypt */
|
|
-static EVP_CIPHER_CTX ctx_dec; /* decrypt */
|
|
+static EVP_CIPHER_CTX *ctx_enc; /* encrypt */
|
|
+static EVP_CIPHER_CTX *ctx_dec; /* decrypt */
|
|
|
|
-static EVP_CIPHER_CTX ctx_enc_ecb; /* sideband ecb encrypt */
|
|
-static EVP_CIPHER_CTX ctx_dec_ecb; /* sideband ecb decrypt */
|
|
+static EVP_CIPHER_CTX *ctx_enc_ecb; /* sideband ecb encrypt */
|
|
+static EVP_CIPHER_CTX *ctx_dec_ecb; /* sideband ecb decrypt */
|
|
|
|
static int send_msg(int len, char *in, char **out);
|
|
static int recv_msg(int len, char *in, char **out);
|
|
static int send_ib_mesg(int *len, char **in);
|
|
static int recv_ib_mesg(int *len, char **in);
|
|
@@ -180,37 +180,37 @@
|
|
case VTUN_ENC_AES256CBC:
|
|
blocksize = 16;
|
|
keysize = 32;
|
|
sb_init = 1;
|
|
cipher_type = EVP_aes_256_ecb();
|
|
- pctx_enc = &ctx_enc_ecb;
|
|
- pctx_dec = &ctx_dec_ecb;
|
|
+ pctx_enc = ctx_enc_ecb;
|
|
+ pctx_dec = ctx_dec_ecb;
|
|
break;
|
|
|
|
case VTUN_ENC_AES256ECB:
|
|
blocksize = 16;
|
|
keysize = 32;
|
|
- pctx_enc = &ctx_enc;
|
|
- pctx_dec = &ctx_dec;
|
|
+ pctx_enc = ctx_enc;
|
|
+ pctx_dec = ctx_dec;
|
|
cipher_type = EVP_aes_256_ecb();
|
|
strcpy(cipher_name,"AES-256-ECB");
|
|
break;
|
|
case VTUN_ENC_AES128OFB:
|
|
case VTUN_ENC_AES128CFB:
|
|
case VTUN_ENC_AES128CBC:
|
|
blocksize = 16;
|
|
keysize = 16;
|
|
sb_init=1;
|
|
cipher_type = EVP_aes_128_ecb();
|
|
- pctx_enc = &ctx_enc_ecb;
|
|
- pctx_dec = &ctx_dec_ecb;
|
|
+ pctx_enc = ctx_enc_ecb;
|
|
+ pctx_dec = ctx_dec_ecb;
|
|
break;
|
|
case VTUN_ENC_AES128ECB:
|
|
blocksize = 16;
|
|
keysize = 16;
|
|
- pctx_enc = &ctx_enc;
|
|
- pctx_dec = &ctx_dec;
|
|
+ pctx_enc = ctx_enc;
|
|
+ pctx_dec = ctx_dec;
|
|
cipher_type = EVP_aes_128_ecb();
|
|
strcpy(cipher_name,"AES-128-ECB");
|
|
break;
|
|
|
|
case VTUN_ENC_BF256OFB:
|
|
@@ -219,20 +219,20 @@
|
|
blocksize = 8;
|
|
keysize = 32;
|
|
var_key = 1;
|
|
sb_init = 1;
|
|
cipher_type = EVP_bf_ecb();
|
|
- pctx_enc = &ctx_enc_ecb;
|
|
- pctx_dec = &ctx_dec_ecb;
|
|
+ pctx_enc = ctx_enc_ecb;
|
|
+ pctx_dec = ctx_dec_ecb;
|
|
break;
|
|
|
|
case VTUN_ENC_BF256ECB:
|
|
blocksize = 8;
|
|
keysize = 32;
|
|
var_key = 1;
|
|
- pctx_enc = &ctx_enc;
|
|
- pctx_dec = &ctx_dec;
|
|
+ pctx_enc = ctx_enc;
|
|
+ pctx_dec = ctx_dec;
|
|
cipher_type = EVP_bf_ecb();
|
|
strcpy(cipher_name,"Blowfish-256-ECB");
|
|
break;
|
|
|
|
case VTUN_ENC_BF128OFB:
|
|
@@ -241,26 +241,28 @@
|
|
blocksize = 8;
|
|
keysize = 16;
|
|
var_key = 1;
|
|
sb_init = 1;
|
|
cipher_type = EVP_bf_ecb();
|
|
- pctx_enc = &ctx_enc_ecb;
|
|
- pctx_dec = &ctx_dec_ecb;
|
|
+ pctx_enc = ctx_enc_ecb;
|
|
+ pctx_dec = ctx_dec_ecb;
|
|
break;
|
|
case VTUN_ENC_BF128ECB: /* blowfish 128 ecb is the default */
|
|
default:
|
|
blocksize = 8;
|
|
keysize = 16;
|
|
var_key = 1;
|
|
- pctx_enc = &ctx_enc;
|
|
- pctx_dec = &ctx_dec;
|
|
+ pctx_enc = ctx_enc;
|
|
+ pctx_dec = ctx_dec;
|
|
cipher_type = EVP_bf_ecb();
|
|
strcpy(cipher_name,"Blowfish-128-ECB");
|
|
break;
|
|
} /* switch(host->cipher) */
|
|
|
|
if (prep_key(&pkey, keysize, host) != 0) return -1;
|
|
+ pctx_enc = EVP_CIPHER_CTX_new();
|
|
+ pctx_dec = EVP_CIPHER_CTX_new();
|
|
EVP_CIPHER_CTX_init(pctx_enc);
|
|
EVP_CIPHER_CTX_init(pctx_dec);
|
|
EVP_EncryptInit_ex(pctx_enc, cipher_type, NULL, NULL, NULL);
|
|
EVP_DecryptInit_ex(pctx_dec, cipher_type, NULL, NULL, NULL);
|
|
if (var_key)
|
|
@@ -292,14 +294,14 @@
|
|
free_key(pkey); pkey = NULL;
|
|
|
|
lfd_free(enc_buf); enc_buf = NULL;
|
|
lfd_free(dec_buf); dec_buf = NULL;
|
|
|
|
- EVP_CIPHER_CTX_cleanup(&ctx_enc);
|
|
- EVP_CIPHER_CTX_cleanup(&ctx_dec);
|
|
- EVP_CIPHER_CTX_cleanup(&ctx_enc_ecb);
|
|
- EVP_CIPHER_CTX_cleanup(&ctx_dec_ecb);
|
|
+ EVP_CIPHER_CTX_free(ctx_enc);
|
|
+ EVP_CIPHER_CTX_free(ctx_dec);
|
|
+ EVP_CIPHER_CTX_free(ctx_enc_ecb);
|
|
+ EVP_CIPHER_CTX_free(ctx_dec_ecb);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int encrypt_buf(int len, char *in, char **out)
|
|
@@ -321,11 +323,11 @@
|
|
|
|
memset(in_ptr+len, pad, pad);
|
|
outlen=len+pad;
|
|
if (pad == blocksize)
|
|
RAND_bytes(in_ptr+len, blocksize-1);
|
|
- EVP_EncryptUpdate(&ctx_enc, out_ptr, &outlen, in_ptr, len+pad);
|
|
+ EVP_EncryptUpdate(ctx_enc, out_ptr, &outlen, in_ptr, len+pad);
|
|
*out = enc_buf;
|
|
|
|
sequence_num++;
|
|
|
|
return outlen+msg_len;
|
|
@@ -341,11 +343,11 @@
|
|
in = *out;
|
|
in_ptr = in;
|
|
|
|
outlen=len;
|
|
if (!len) return 0;
|
|
- EVP_DecryptUpdate(&ctx_dec, out_ptr, &outlen, in_ptr, len);
|
|
+ EVP_DecryptUpdate(ctx_dec, out_ptr, &outlen, in_ptr, len);
|
|
recv_ib_mesg(&outlen, &out_ptr);
|
|
if (!outlen) return 0;
|
|
tmp_ptr = out_ptr + outlen; tmp_ptr--;
|
|
pad = *tmp_ptr;
|
|
if (pad < 1 || pad > blocksize) {
|
|
@@ -429,17 +431,18 @@
|
|
/* if we're here, something weird's going on */
|
|
return -1;
|
|
break;
|
|
} /* switch(cipher) */
|
|
|
|
- EVP_CIPHER_CTX_init(&ctx_enc);
|
|
- EVP_EncryptInit_ex(&ctx_enc, cipher_type, NULL, NULL, NULL);
|
|
+ ctx_enc = EVP_CIPHER_CTX_new();
|
|
+ EVP_CIPHER_CTX_init(ctx_enc);
|
|
+ EVP_EncryptInit_ex(ctx_enc, cipher_type, NULL, NULL, NULL);
|
|
if (var_key)
|
|
- EVP_CIPHER_CTX_set_key_length(&ctx_enc, keysize);
|
|
- EVP_EncryptInit_ex(&ctx_enc, NULL, NULL, pkey, NULL);
|
|
- EVP_EncryptInit_ex(&ctx_enc, NULL, NULL, NULL, iv);
|
|
- EVP_CIPHER_CTX_set_padding(&ctx_enc, 0);
|
|
+ EVP_CIPHER_CTX_set_key_length(ctx_enc, keysize);
|
|
+ EVP_EncryptInit_ex(ctx_enc, NULL, NULL, pkey, NULL);
|
|
+ EVP_EncryptInit_ex(ctx_enc, NULL, NULL, NULL, iv);
|
|
+ EVP_CIPHER_CTX_set_padding(ctx_enc, 0);
|
|
if (enc_init_first_time)
|
|
{
|
|
sprintf(tmpstr,"%s encryption initialized", cipher_name);
|
|
vtun_syslog(LOG_INFO, tmpstr);
|
|
enc_init_first_time = 0;
|
|
@@ -519,17 +522,18 @@
|
|
/* if we're here, something weird's going on */
|
|
return -1;
|
|
break;
|
|
} /* switch(cipher) */
|
|
|
|
- EVP_CIPHER_CTX_init(&ctx_dec);
|
|
- EVP_DecryptInit_ex(&ctx_dec, cipher_type, NULL, NULL, NULL);
|
|
+ ctx_dec = EVP_CIPHER_CTX_new();
|
|
+ EVP_CIPHER_CTX_init(ctx_dec);
|
|
+ EVP_DecryptInit_ex(ctx_dec, cipher_type, NULL, NULL, NULL);
|
|
if (var_key)
|
|
- EVP_CIPHER_CTX_set_key_length(&ctx_dec, keysize);
|
|
- EVP_DecryptInit_ex(&ctx_dec, NULL, NULL, pkey, NULL);
|
|
- EVP_DecryptInit_ex(&ctx_dec, NULL, NULL, NULL, iv);
|
|
- EVP_CIPHER_CTX_set_padding(&ctx_dec, 0);
|
|
+ EVP_CIPHER_CTX_set_key_length(ctx_dec, keysize);
|
|
+ EVP_DecryptInit_ex(ctx_dec, NULL, NULL, pkey, NULL);
|
|
+ EVP_DecryptInit_ex(ctx_dec, NULL, NULL, NULL, iv);
|
|
+ EVP_CIPHER_CTX_set_padding(ctx_dec, 0);
|
|
if (dec_init_first_time)
|
|
{
|
|
sprintf(tmpstr,"%s decryption initialized", cipher_name);
|
|
vtun_syslog(LOG_INFO, tmpstr);
|
|
dec_init_first_time = 0;
|
|
@@ -557,11 +561,11 @@
|
|
memset(iv,0,blocksize); free(iv); iv = NULL;
|
|
RAND_bytes(in_ptr, in - in_ptr);
|
|
|
|
in_ptr = in - blocksize*2;
|
|
outlen = blocksize*2;
|
|
- EVP_EncryptUpdate(&ctx_enc_ecb, in_ptr,
|
|
+ EVP_EncryptUpdate(ctx_enc_ecb, in_ptr,
|
|
&outlen, in_ptr, blocksize*2);
|
|
*out = in_ptr;
|
|
len = outlen;
|
|
cipher_enc_state = CIPHER_SEQUENCE;
|
|
break;
|
|
@@ -584,11 +588,11 @@
|
|
{
|
|
case CIPHER_INIT:
|
|
in_ptr = in;
|
|
iv = malloc(blocksize);
|
|
outlen = blocksize*2;
|
|
- EVP_DecryptUpdate(&ctx_dec_ecb, in_ptr, &outlen, in_ptr, blocksize*2);
|
|
+ EVP_DecryptUpdate(ctx_dec_ecb, in_ptr, &outlen, in_ptr, blocksize*2);
|
|
|
|
if ( !strncmp(in_ptr, "ivec", 4) )
|
|
{
|
|
memcpy(iv, in_ptr+4, blocksize);
|
|
cipher_dec_init(iv);
|
|
@@ -627,11 +631,11 @@
|
|
"Max. gibberish threshold reached");
|
|
#endif
|
|
if (cipher_enc_state != CIPHER_INIT)
|
|
{
|
|
cipher_enc_state = CIPHER_INIT;
|
|
- EVP_CIPHER_CTX_cleanup(&ctx_enc);
|
|
+ EVP_CIPHER_CTX_free(ctx_enc);
|
|
#ifdef LFD_ENCRYPT_DEBUG
|
|
vtun_syslog(LOG_INFO,
|
|
"Forcing local encryptor re-init");
|
|
#endif
|
|
}
|
|
@@ -708,11 +712,11 @@
|
|
*len -= blocksize;
|
|
|
|
if (cipher_enc_state != CIPHER_INIT)
|
|
{
|
|
cipher_enc_state = CIPHER_INIT;
|
|
- EVP_CIPHER_CTX_cleanup(&ctx_enc);
|
|
+ EVP_CIPHER_CTX_free(ctx_enc);
|
|
}
|
|
#ifdef LFD_ENCRYPT_DEBUG
|
|
vtun_syslog(LOG_INFO, "Remote requests encryptor re-init");
|
|
#endif
|
|
}
|
|
@@ -722,11 +726,11 @@
|
|
|
|
if (cipher_dec_state != CIPHER_INIT &&
|
|
cipher_enc_state != CIPHER_REQ_INIT &&
|
|
cipher_enc_state != CIPHER_INIT)
|
|
{
|
|
- EVP_CIPHER_CTX_cleanup (&ctx_dec);
|
|
+ EVP_CIPHER_CTX_free (ctx_dec);
|
|
cipher_dec_state = CIPHER_INIT;
|
|
cipher_enc_state = CIPHER_REQ_INIT;
|
|
}
|
|
#ifdef LFD_ENCRYPT_DEBUG
|
|
vtun_syslog(LOG_INFO, "Local decryptor out of sync");
|