Actions
Submit #3142
openlib/libdmsg: Unbreak using new API EVP_CIPHER_CTX_new()
Start date:
07/08/2018
Due date:
% Done:
0%
Estimated time:
Description
https://github.com/kusumi/DragonFlyBSD/commit/e6833c80bc898c2674e180828fe62cd0b53226e7
--
The upstream OpenSSL no longer publicly expose definition of
EVP_CIPHER_CTX (struct evp_cipher_ctx_st).
Due to this change clients need to have it as a pointer instead
of as a value, and allocate or free EVP_CIPHER_CTX instance by
EVP_CIPHER_CTX_new()/EVP_CIPHER_CTX_free().
https://github.com/openssl/openssl/issues/962#issuecomment-208792020
Updated by daftaupe almost 2 years ago
- Status changed from New to Feedback
Hello,
is this still relevant ? We are using LibreSSL in base now.
I have no knowledge of lib/libdmsg being broken at the moment. For what it's worth, it seems that most changes from the commit linked ended up in https://gitweb.dragonflybsd.org/dragonfly.git/commit/a988b43e78629a379190205ccd368b35bf4fb239
Actions