Merge lp:~jtaylor/ubuntu/oneiric/m2crypto/cleanup into lp:ubuntu/oneiric/m2crypto
- Oneiric (11.10)
- cleanup
- Merge into oneiric
Proposed by
Julian Taylor
Status: | Merged |
---|---|
Merged at revision: | 24 |
Proposed branch: | lp:~jtaylor/ubuntu/oneiric/m2crypto/cleanup |
Merge into: | lp:ubuntu/oneiric/m2crypto |
Diff against target: |
783 lines (+642/-8) 15 files modified
M2Crypto/m2urllib2.py (+0/-1) debian/README.source (+2/-0) debian/changelog (+31/-0) debian/control (+1/-1) debian/patches/disable_sslv2_test.patch (+17/-0) debian/patches/fix_build_with_new_openssl.patch (+487/-0) debian/patches/fix_kill_signal.patch (+17/-0) debian/patches/fix_sslv2_test.patch (+19/-0) debian/patches/fix_sslv2_test2.patch (+54/-0) debian/patches/series (+5/-0) debian/rules (+1/-1) debian/source/format (+1/-0) debian/watch (+1/-0) tests/test_smime.py (+4/-3) tests/test_ssl.py (+2/-2) |
To merge this branch: | bzr merge lp:~jtaylor/ubuntu/oneiric/m2crypto/cleanup |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Ubuntu branches | Pending | ||
Review via email: mp+71102@code.launchpad.net |
Commit message
Description of the change
remove undistributable file (see http://
merge with debian, fixes new openssl ftbs
switch do dh_python2
quiltify existing patches
add patch to fix testsuite for new openssl
To post a comment you must log in.
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | === modified file 'M2Crypto/m2urllib2.py' | |||
2 | --- M2Crypto/m2urllib2.py 2009-11-06 01:28:39 +0000 | |||
3 | +++ M2Crypto/m2urllib2.py 2011-08-10 19:50:59 +0000 | |||
4 | @@ -14,7 +14,6 @@ | |||
5 | 14 | import socket | 14 | import socket |
6 | 15 | from urllib2 import * | 15 | from urllib2 import * |
7 | 16 | import urlparse | 16 | import urlparse |
8 | 17 | import inspect | ||
9 | 18 | 17 | ||
10 | 19 | import SSL | 18 | import SSL |
11 | 20 | import httpslib | 19 | import httpslib |
12 | 21 | 20 | ||
13 | === added file 'debian/README.source' | |||
14 | --- debian/README.source 1970-01-01 00:00:00 +0000 | |||
15 | +++ debian/README.source 2011-08-10 19:50:59 +0000 | |||
16 | @@ -0,0 +1,2 @@ | |||
17 | 1 | removed non-free files in 0.20.1+dfsg1: | ||
18 | 2 | demo/x509/proxylib.py | ||
19 | 0 | 3 | ||
20 | === modified file 'debian/changelog' | |||
21 | --- debian/changelog 2010-12-03 00:04:32 +0000 | |||
22 | +++ debian/changelog 2011-08-10 19:50:59 +0000 | |||
23 | @@ -1,3 +1,34 @@ | |||
24 | 1 | m2crypto (0.20.1+dfsg1-1.1ubuntu1) oneiric; urgency=low | ||
25 | 2 | |||
26 | 3 | * repackage upstream | ||
27 | 4 | - remove non-free demo/x509/proxylib.py | ||
28 | 5 | * switch to dh_python2 (LP: #788514) | ||
29 | 6 | * switch to 3.0 (quilt) | ||
30 | 7 | - converted all upstream changes to patches | ||
31 | 8 | - fix_sslv2_test.patch: testsuite patch for sslv2 deactivation | ||
32 | 9 | - fix_build_with_new_openssl.patch: build fix from debian 0.20.1-1.1 | ||
33 | 10 | * Merge from debian testing, remaining changes: | ||
34 | 11 | - disable_sslv2_test.patch: disable sslv23_weak_crypto test as it is expected to | ||
35 | 12 | fail with SSLv2 having been disabled in openssl 0.9.8o-1ubuntu3. | ||
36 | 13 | (LP: #600549) | ||
37 | 14 | - fix_sslv2_test2.patch: fix testsuite with newer openssl. (LP: #600549) | ||
38 | 15 | - Backported from http://svn.osafoundation.org/viewvc/m2crypto/trunk/tests/test_smime.py?r1=698&r2=721 | ||
39 | 16 | - debian/control: Add openssl for FTBFS. | ||
40 | 17 | - debian/rules; enable testsuite, add more files to "clean" rule. | ||
41 | 18 | - fix_kill_signal.patch: use signal 9 to kill old s_server processes | ||
42 | 19 | to work around build HUP signal-ignore-mask (LP: #451998). | ||
43 | 20 | |||
44 | 21 | -- Julian Taylor <jtaylor.debian@googlemail.com> Wed, 10 Aug 2011 17:01:24 +0200 | ||
45 | 22 | |||
46 | 23 | m2crypto (0.20.1-1.1) unstable; urgency=low | ||
47 | 24 | |||
48 | 25 | * Non-maintainer upload. | ||
49 | 26 | * Backport revision 721 from upstream SVN repository to fix build errors | ||
50 | 27 | with libssl-dev >= 1.0.0. (Closes: #622001) | ||
51 | 28 | * Do not provide sslv2_method if SSLv2 is not available. | ||
52 | 29 | |||
53 | 30 | -- Sebastian Ramacher <s.ramacher@gmx.at> Fri, 24 Jun 2011 17:27:46 +0200 | ||
54 | 31 | |||
55 | 1 | m2crypto (0.20.1-1ubuntu5) natty; urgency=low | 32 | m2crypto (0.20.1-1ubuntu5) natty; urgency=low |
56 | 2 | 33 | ||
57 | 3 | * Rebuild to add support for python 2.7. | 34 | * Rebuild to add support for python 2.7. |
58 | 4 | 35 | ||
59 | === modified file 'debian/control' | |||
60 | --- debian/control 2010-04-23 12:55:10 +0000 | |||
61 | +++ debian/control 2011-08-10 19:50:59 +0000 | |||
62 | @@ -3,7 +3,7 @@ | |||
63 | 3 | Priority: optional | 3 | Priority: optional |
64 | 4 | Maintainer: Ubuntu MOTU Developers <ubuntu-motu@lists.ubuntu.com> | 4 | Maintainer: Ubuntu MOTU Developers <ubuntu-motu@lists.ubuntu.com> |
65 | 5 | XSBC-Original-Maintainer: Dima Barsky <dima@debian.org> | 5 | XSBC-Original-Maintainer: Dima Barsky <dima@debian.org> |
67 | 6 | Build-Depends: debhelper (>= 5.0.37.2), python-all-dev (>= 2.3.5-11), python-support (>= 0.4), libssl-dev (>= 0.9.7), swig (>= 1.3.24), python-setuptools (>=0.6c5-3), openssl | 6 | Build-Depends: debhelper (>= 5.0.37.2), python-all-dev (>= 2.6.6-3~), libssl-dev (>= 0.9.7), swig (>= 1.3.24), python-setuptools (>=0.6c5-3), openssl |
68 | 7 | Standards-Version: 3.8.3 | 7 | Standards-Version: 3.8.3 |
69 | 8 | 8 | ||
70 | 9 | Package: python-m2crypto | 9 | Package: python-m2crypto |
71 | 10 | 10 | ||
72 | === added directory 'debian/patches' | |||
73 | === added file 'debian/patches/disable_sslv2_test.patch' | |||
74 | --- debian/patches/disable_sslv2_test.patch 1970-01-01 00:00:00 +0000 | |||
75 | +++ debian/patches/disable_sslv2_test.patch 2011-08-10 19:50:59 +0000 | |||
76 | @@ -0,0 +1,17 @@ | |||
77 | 1 | Description: disable sslv2 test | ||
78 | 2 | disable sslv23_weak_crypto test as it is expected to | ||
79 | 3 | fail with SSLv2 having been disabled in openssl 0.9.8o-1ubuntu3. | ||
80 | 4 | Bug.Ubuntu: https://bugs.launchpad.net/ubuntu/+source/m2crypto/+bug/600549 | ||
81 | 5 | Author: Marc Deslauriers <marc.deslauriers@ubuntu.com> | ||
82 | 6 | Origin: 0.20.1-1ubuntu4 | ||
83 | 7 | --- m2crypto-0.20.1.orig/tests/test_ssl.py | ||
84 | 8 | +++ m2crypto-0.20.1/tests/test_ssl.py | ||
85 | 9 | @@ -398,7 +398,7 @@ class MiscSSLClientTestCase(BaseSSLClien | ||
86 | 10 | finally: | ||
87 | 11 | self.stop_server(pid) | ||
88 | 12 | |||
89 | 13 | - def test_sslv23_weak_crypto(self): | ||
90 | 14 | + def disabled_test_sslv23_weak_crypto(self): | ||
91 | 15 | if fips_mode: # TLS is required in FIPS mode | ||
92 | 16 | return | ||
93 | 17 | self.args = self.args + ['-no_tls1', '-no_ssl3'] | ||
94 | 0 | 18 | ||
95 | === added file 'debian/patches/fix_build_with_new_openssl.patch' | |||
96 | --- debian/patches/fix_build_with_new_openssl.patch 1970-01-01 00:00:00 +0000 | |||
97 | +++ debian/patches/fix_build_with_new_openssl.patch 2011-08-10 19:50:59 +0000 | |||
98 | @@ -0,0 +1,487 @@ | |||
99 | 1 | Description: fix ftbs with openssl 1.0.0 | ||
100 | 2 | Backport revision 721 from upstream SVN repository to fix build errors | ||
101 | 3 | with libssl-dev >= 1.0.0 | ||
102 | 4 | Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622001 | ||
103 | 5 | Author: Sebastian Ramacher <s.ramacher@gmx.at> | ||
104 | 6 | --- m2crypto-0.20.1.orig/M2Crypto/m2urllib2.py | ||
105 | 7 | +++ m2crypto-0.20.1/M2Crypto/m2urllib2.py | ||
106 | 8 | @@ -14,6 +14,7 @@ Summary of changes: | ||
107 | 9 | import socket | ||
108 | 10 | from urllib2 import * | ||
109 | 11 | import urlparse | ||
110 | 12 | +import inspect | ||
111 | 13 | |||
112 | 14 | import SSL | ||
113 | 15 | import httpslib | ||
114 | 16 | --- m2crypto-0.20.1.orig/SWIG/_evp.i | ||
115 | 17 | +++ m2crypto-0.20.1/SWIG/_evp.i | ||
116 | 18 | @@ -180,7 +180,7 @@ PyObject *pkcs5_pbkdf2_hmac_sha1(PyObjec | ||
117 | 19 | |||
118 | 20 | PKCS5_PBKDF2_HMAC_SHA1(passbuf, passlen, saltbuf, saltlen, iter, | ||
119 | 21 | keylen, key); | ||
120 | 22 | - ret = PyString_FromStringAndSize(key, keylen); | ||
121 | 23 | + ret = PyString_FromStringAndSize((char*)key, keylen); | ||
122 | 24 | OPENSSL_cleanse(key, keylen); | ||
123 | 25 | return ret; | ||
124 | 26 | } | ||
125 | 27 | @@ -339,7 +339,7 @@ PyObject *bytes_to_key(const EVP_CIPHER | ||
126 | 28 | klen = EVP_BytesToKey(cipher, md, (unsigned char *)sbuf, | ||
127 | 29 | (unsigned char *)dbuf, dlen, iter, | ||
128 | 30 | key, NULL); /* Since we are not returning IV no need to derive it */ | ||
129 | 31 | - ret = PyString_FromStringAndSize(key, klen); | ||
130 | 32 | + ret = PyString_FromStringAndSize((char*)key, klen); | ||
131 | 33 | return ret; | ||
132 | 34 | } | ||
133 | 35 | |||
134 | 36 | @@ -435,7 +435,7 @@ PyObject *sign_final(EVP_MD_CTX *ctx, EV | ||
135 | 37 | PyErr_SetString(_evp_err, ERR_reason_error_string(ERR_get_error())); | ||
136 | 38 | return NULL; | ||
137 | 39 | } | ||
138 | 40 | - ret = PyString_FromStringAndSize(sigbuf, siglen); | ||
139 | 41 | + ret = PyString_FromStringAndSize((char*)sigbuf, siglen); | ||
140 | 42 | OPENSSL_cleanse(sigbuf, siglen); | ||
141 | 43 | OPENSSL_free(sigbuf); | ||
142 | 44 | return ret; | ||
143 | 45 | @@ -513,7 +513,7 @@ PyObject *pkey_as_der(EVP_PKEY *pkey) { | ||
144 | 46 | PyErr_SetString(PyExc_ValueError, "EVP_PKEY as DER failed"); | ||
145 | 47 | return NULL; | ||
146 | 48 | } | ||
147 | 49 | - der = PyString_FromStringAndSize(pp, len); | ||
148 | 50 | + der = PyString_FromStringAndSize((char*)pp, len); | ||
149 | 51 | OPENSSL_free(pp); | ||
150 | 52 | return der; | ||
151 | 53 | } | ||
152 | 54 | --- m2crypto-0.20.1.orig/SWIG/_m2crypto.i | ||
153 | 55 | +++ m2crypto-0.20.1/SWIG/_m2crypto.i | ||
154 | 56 | @@ -38,6 +38,19 @@ static PyObject *ssl_set_tmp_rsa_cb_func | ||
155 | 57 | #define CONST098 | ||
156 | 58 | #endif | ||
157 | 59 | |||
158 | 60 | +/* Bring in STACK_OF macro definition */ | ||
159 | 61 | +%include <openssl/safestack.h> | ||
160 | 62 | + | ||
161 | 63 | +/* Bring in LHASH_OF macro definition */ | ||
162 | 64 | +/* XXX Can't include lhash.h where LHASH_OF is defined, because it includes | ||
163 | 65 | + XXX stdio.h etc. which we fail to include. So we have to (re)define | ||
164 | 66 | + XXX LHASH_OF here instead. | ||
165 | 67 | +%include <openssl/lhash.h> | ||
166 | 68 | +*/ | ||
167 | 69 | +#if OPENSSL_VERSION_NUMBER >= 0x10000000L | ||
168 | 70 | +#define LHASH_OF(type) struct lhash_st_##type | ||
169 | 71 | +#endif | ||
170 | 72 | + | ||
171 | 73 | %include constraints.i | ||
172 | 74 | %include _threads.i | ||
173 | 75 | %include _lib.i | ||
174 | 76 | --- m2crypto-0.20.1.orig/SWIG/_rand.i | ||
175 | 77 | +++ m2crypto-0.20.1/SWIG/_rand.i | ||
176 | 78 | @@ -87,7 +87,7 @@ PyObject *rand_pseudo_bytes(int n) { | ||
177 | 79 | Py_INCREF(Py_None); | ||
178 | 80 | return Py_None; | ||
179 | 81 | } else { | ||
180 | 82 | - PyTuple_SET_ITEM(tuple, 0, PyString_FromStringAndSize(blob, n)); | ||
181 | 83 | + PyTuple_SET_ITEM(tuple, 0, PyString_FromStringAndSize((char*)blob, n)); | ||
182 | 84 | PyMem_Free(blob); | ||
183 | 85 | PyTuple_SET_ITEM(tuple, 1, PyInt_FromLong((long)ret)); | ||
184 | 86 | return tuple; | ||
185 | 87 | --- m2crypto-0.20.1.orig/SWIG/_pkcs7.i | ||
186 | 88 | +++ m2crypto-0.20.1/SWIG/_pkcs7.i | ||
187 | 89 | @@ -12,7 +12,7 @@ | ||
188 | 90 | %apply Pointer NONNULL { EVP_CIPHER * }; | ||
189 | 91 | %apply Pointer NONNULL { EVP_PKEY * }; | ||
190 | 92 | %apply Pointer NONNULL { PKCS7 * }; | ||
191 | 93 | -%apply Pointer NONNULL { STACK * }; | ||
192 | 94 | +%apply Pointer NONNULL { STACK_OF(X509) * }; | ||
193 | 95 | %apply Pointer NONNULL { X509 * }; | ||
194 | 96 | |||
195 | 97 | %rename(pkcs7_new) PKCS7_new; | ||
196 | 98 | @@ -54,8 +54,8 @@ void smime_init(PyObject *smime_err) { | ||
197 | 99 | |||
198 | 100 | %threadallow pkcs7_encrypt; | ||
199 | 101 | %inline %{ | ||
200 | 102 | -PKCS7 *pkcs7_encrypt(STACK *stack, BIO *bio, EVP_CIPHER *cipher, int flags) { | ||
201 | 103 | - return PKCS7_encrypt((STACK_OF(X509) *)stack, bio, cipher, flags); | ||
202 | 104 | +PKCS7 *pkcs7_encrypt(STACK_OF(X509) *stack, BIO *bio, EVP_CIPHER *cipher, int flags) { | ||
203 | 105 | + return PKCS7_encrypt(stack, bio, cipher, flags); | ||
204 | 106 | } | ||
205 | 107 | |||
206 | 108 | PyObject *pkcs7_decrypt(PKCS7 *pkcs7, EVP_PKEY *pkey, X509 *cert, int flags) { | ||
207 | 109 | @@ -96,14 +96,14 @@ PKCS7 *pkcs7_sign0(X509 *x509, EVP_PKEY | ||
208 | 110 | |||
209 | 111 | %threadallow pkcs7_sign1; | ||
210 | 112 | %inline %{ | ||
211 | 113 | -PKCS7 *pkcs7_sign1(X509 *x509, EVP_PKEY *pkey, STACK *stack, BIO *bio, int flags) { | ||
212 | 114 | - return PKCS7_sign(x509, pkey, (STACK_OF(X509) *)stack, bio, flags); | ||
213 | 115 | +PKCS7 *pkcs7_sign1(X509 *x509, EVP_PKEY *pkey, STACK_OF(X509) *stack, BIO *bio, int flags) { | ||
214 | 116 | + return PKCS7_sign(x509, pkey, stack, bio, flags); | ||
215 | 117 | } | ||
216 | 118 | %} | ||
217 | 119 | |||
218 | 120 | %threadallow pkcs7_verify1; | ||
219 | 121 | %inline %{ | ||
220 | 122 | -PyObject *pkcs7_verify1(PKCS7 *pkcs7, STACK *stack, X509_STORE *store, BIO *data, int flags) { | ||
221 | 123 | +PyObject *pkcs7_verify1(PKCS7 *pkcs7, STACK_OF(X509) *stack, X509_STORE *store, BIO *data, int flags) { | ||
222 | 124 | int outlen; | ||
223 | 125 | char *outbuf; | ||
224 | 126 | BIO *bio; | ||
225 | 127 | @@ -113,7 +113,7 @@ PyObject *pkcs7_verify1(PKCS7 *pkcs7, ST | ||
226 | 128 | PyErr_SetString(PyExc_MemoryError, "pkcs7_verify1"); | ||
227 | 129 | return NULL; | ||
228 | 130 | } | ||
229 | 131 | - if (!PKCS7_verify(pkcs7, (STACK_OF(X509) *)stack, store, data, bio, flags)) { | ||
230 | 132 | + if (!PKCS7_verify(pkcs7, stack, store, data, bio, flags)) { | ||
231 | 133 | PyErr_SetString(_pkcs7_err, ERR_reason_error_string(ERR_get_error())); | ||
232 | 134 | BIO_free(bio); | ||
233 | 135 | return NULL; | ||
234 | 136 | @@ -131,7 +131,7 @@ PyObject *pkcs7_verify1(PKCS7 *pkcs7, ST | ||
235 | 137 | return ret; | ||
236 | 138 | } | ||
237 | 139 | |||
238 | 140 | -PyObject *pkcs7_verify0(PKCS7 *pkcs7, STACK *stack, X509_STORE *store, int flags) { | ||
239 | 141 | +PyObject *pkcs7_verify0(PKCS7 *pkcs7, STACK_OF(X509) *stack, X509_STORE *store, int flags) { | ||
240 | 142 | return pkcs7_verify1(pkcs7, stack, store, NULL, flags); | ||
241 | 143 | } | ||
242 | 144 | %} | ||
243 | 145 | @@ -229,7 +229,7 @@ int smime_crlf_copy(BIO *in, BIO *out) { | ||
244 | 146 | } | ||
245 | 147 | |||
246 | 148 | /* return STACK_OF(X509)* */ | ||
247 | 149 | -STACK *pkcs7_get0_signers(PKCS7 *p7, STACK *certs, int flags) { | ||
248 | 150 | +STACK_OF(X509) *pkcs7_get0_signers(PKCS7 *p7, STACK_OF(X509) *certs, int flags) { | ||
249 | 151 | return PKCS7_get0_signers(p7, certs, flags); | ||
250 | 152 | } | ||
251 | 153 | |||
252 | 154 | --- m2crypto-0.20.1.orig/SWIG/_util.i | ||
253 | 155 | +++ m2crypto-0.20.1/SWIG/_util.i | ||
254 | 156 | @@ -48,7 +48,7 @@ PyObject *util_string_to_hex(PyObject *b | ||
255 | 157 | PyErr_SetString(_util_err, ERR_reason_error_string(ERR_get_error())); | ||
256 | 158 | return NULL; | ||
257 | 159 | } | ||
258 | 160 | - obj = PyString_FromStringAndSize(ret, len); | ||
259 | 161 | + obj = PyString_FromStringAndSize((char*)ret, len); | ||
260 | 162 | OPENSSL_free(ret); | ||
261 | 163 | return obj; | ||
262 | 164 | } | ||
263 | 165 | --- m2crypto-0.20.1.orig/SWIG/_x509.i | ||
264 | 166 | +++ m2crypto-0.20.1/SWIG/_x509.i | ||
265 | 167 | @@ -148,8 +148,15 @@ extern int X509_NAME_add_entry_by_NID(X5 | ||
266 | 168 | extern int X509_NAME_print_ex(BIO *, X509_NAME *, int, unsigned long); | ||
267 | 169 | %rename(x509_name_print_ex_fp) X509_NAME_print_ex_fp; | ||
268 | 170 | extern int X509_NAME_print_ex_fp(FILE *, X509_NAME *, int, unsigned long); | ||
269 | 171 | + | ||
270 | 172 | +#if OPENSSL_VERSION_NUMBER >= 0x10000000L | ||
271 | 173 | +%rename(x509_name_hash) X509_NAME_hash_old; | ||
272 | 174 | +extern unsigned long X509_NAME_hash_old(X509_NAME *); | ||
273 | 175 | +#else | ||
274 | 176 | %rename(x509_name_hash) X509_NAME_hash; | ||
275 | 177 | extern unsigned long X509_NAME_hash(X509_NAME *); | ||
276 | 178 | +#endif | ||
277 | 179 | + | ||
278 | 180 | %rename(x509_name_get_index_by_nid) X509_NAME_get_index_by_NID; | ||
279 | 181 | extern int X509_NAME_get_index_by_NID(X509_NAME *, int, int); | ||
280 | 182 | |||
281 | 183 | @@ -171,7 +178,7 @@ extern ASN1_STRING *X509_NAME_ENTRY_get_ | ||
282 | 184 | if (PyString_Check($input)) { | ||
283 | 185 | Py_ssize_t len; | ||
284 | 186 | |||
285 | 187 | - $1 = PyString_AsString($input); | ||
286 | 188 | + $1 = (unsigned char *)PyString_AsString($input); | ||
287 | 189 | len = PyString_Size($input); | ||
288 | 190 | if (len > INT_MAX) { | ||
289 | 191 | PyErr_SetString(PyExc_ValueError, "object too large"); | ||
290 | 192 | @@ -184,7 +191,7 @@ extern ASN1_STRING *X509_NAME_ENTRY_get_ | ||
291 | 193 | } | ||
292 | 194 | } | ||
293 | 195 | %rename(x509_name_entry_set_data) X509_NAME_ENTRY_set_data; | ||
294 | 196 | -extern int X509_NAME_ENTRY_set_data( X509_NAME_ENTRY *, int, CONST unsigned char *, int); | ||
295 | 197 | +extern int X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *, int, CONST unsigned char *, int); | ||
296 | 198 | %typemap(in) (CONST unsigned char *, int); | ||
297 | 199 | |||
298 | 200 | %rename(x509_req_new) X509_REQ_new; | ||
299 | 201 | @@ -230,7 +237,7 @@ extern int X509_STORE_CTX_get_error_dept | ||
300 | 202 | %rename(x509_store_ctx_free) X509_STORE_CTX_free; | ||
301 | 203 | extern void X509_STORE_CTX_free(X509_STORE_CTX *); | ||
302 | 204 | %rename(x509_store_ctx_get1_chain) X509_STORE_CTX_get1_chain; | ||
303 | 205 | -extern STACK *X509_STORE_CTX_get1_chain(X509_STORE_CTX *); | ||
304 | 206 | +extern STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *); | ||
305 | 207 | |||
306 | 208 | %rename(x509_extension_get_critical) X509_EXTENSION_get_critical; | ||
307 | 209 | extern int X509_EXTENSION_get_critical(X509_EXTENSION *); | ||
308 | 210 | @@ -348,7 +355,7 @@ PyObject *i2d_x509(X509 *x) | ||
309 | 211 | PyErr_SetString(_x509_err, ERR_reason_error_string(ERR_get_error())); | ||
310 | 212 | } | ||
311 | 213 | else { | ||
312 | 214 | - ret = PyString_FromStringAndSize(buf, len); | ||
313 | 215 | + ret = PyString_FromStringAndSize((char*)buf, len); | ||
314 | 216 | OPENSSL_free(buf); | ||
315 | 217 | } | ||
316 | 218 | return ret; | ||
317 | 219 | @@ -435,12 +442,12 @@ PyObject *x509_name_by_nid(X509_NAME *na | ||
318 | 220 | } | ||
319 | 221 | |||
320 | 222 | int x509_name_set_by_nid(X509_NAME *name, int nid, PyObject *obj) { | ||
321 | 223 | - return X509_NAME_add_entry_by_NID(name, nid, MBSTRING_ASC, PyString_AsString(obj), -1, -1, 0); | ||
322 | 224 | + return X509_NAME_add_entry_by_NID(name, nid, MBSTRING_ASC, (unsigned char *)PyString_AsString(obj), -1, -1, 0); | ||
323 | 225 | } | ||
324 | 226 | |||
325 | 227 | /* x509_name_add_entry_by_txt */ | ||
326 | 228 | int x509_name_add_entry_by_txt(X509_NAME *name, char *field, int type, char *bytes, int len, int loc, int set) { | ||
327 | 229 | - return X509_NAME_add_entry_by_txt(name, field, type, bytes, len, loc, set); | ||
328 | 230 | + return X509_NAME_add_entry_by_txt(name, field, type, (unsigned char *)bytes, len, loc, set); | ||
329 | 231 | } | ||
330 | 232 | |||
331 | 233 | PyObject *x509_name_get_der(X509_NAME *name) | ||
332 | 234 | @@ -450,23 +457,23 @@ PyObject *x509_name_get_der(X509_NAME *n | ||
333 | 235 | } | ||
334 | 236 | |||
335 | 237 | /* sk_X509_new_null() is a macro returning "STACK_OF(X509) *". */ | ||
336 | 238 | -STACK *sk_x509_new_null(void) { | ||
337 | 239 | - return (STACK *)sk_X509_new_null(); | ||
338 | 240 | +STACK_OF(X509) *sk_x509_new_null(void) { | ||
339 | 241 | + return sk_X509_new_null(); | ||
340 | 242 | } | ||
341 | 243 | |||
342 | 244 | /* sk_X509_free() is a macro. */ | ||
343 | 245 | -void sk_x509_free(STACK *stack) { | ||
344 | 246 | - sk_X509_free((STACK_OF(X509) *)stack); | ||
345 | 247 | +void sk_x509_free(STACK_OF(X509) *stack) { | ||
346 | 248 | + sk_X509_free(stack); | ||
347 | 249 | } | ||
348 | 250 | |||
349 | 251 | /* sk_X509_push() is a macro. */ | ||
350 | 252 | -int sk_x509_push(STACK *stack, X509 *x509) { | ||
351 | 253 | - return sk_X509_push((STACK_OF(X509) *)stack, x509); | ||
352 | 254 | +int sk_x509_push(STACK_OF(X509) *stack, X509 *x509) { | ||
353 | 255 | + return sk_X509_push(stack, x509); | ||
354 | 256 | } | ||
355 | 257 | |||
356 | 258 | /* sk_X509_pop() is a macro. */ | ||
357 | 259 | -X509 *sk_x509_pop(STACK *stack) { | ||
358 | 260 | - return sk_X509_pop((STACK_OF(X509) *)stack); | ||
359 | 261 | +X509 *sk_x509_pop(STACK_OF(X509) *stack) { | ||
360 | 262 | + return sk_X509_pop(stack); | ||
361 | 263 | } | ||
362 | 264 | |||
363 | 265 | int x509_store_load_locations(X509_STORE *store, const char *file) { | ||
364 | 266 | @@ -493,21 +500,29 @@ int x509_req_set_version(X509_REQ *x, lo | ||
365 | 267 | return X509_REQ_set_version(x, version); | ||
366 | 268 | } | ||
367 | 269 | |||
368 | 270 | -int x509_req_add_extensions(X509_REQ *req, STACK *exts) { | ||
369 | 271 | - return X509_REQ_add_extensions(req, (STACK_OF(X509_EXTENSION) *)exts); | ||
370 | 272 | +int x509_req_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts) { | ||
371 | 273 | + return X509_REQ_add_extensions(req, exts); | ||
372 | 274 | } | ||
373 | 275 | |||
374 | 276 | -X509_NAME_ENTRY *x509_name_entry_create_by_txt( X509_NAME_ENTRY **ne, char *field, int type, char *bytes, int len) { | ||
375 | 277 | - return X509_NAME_ENTRY_create_by_txt( ne, field, type, bytes, len); | ||
376 | 278 | +X509_NAME_ENTRY *x509_name_entry_create_by_txt(X509_NAME_ENTRY **ne, char *field, int type, char *bytes, int len) { | ||
377 | 279 | + return X509_NAME_ENTRY_create_by_txt( ne, field, type, (unsigned char *)bytes, len); | ||
378 | 280 | } | ||
379 | 281 | |||
380 | 282 | -LHASH * | ||
381 | 283 | -x509v3_lhash(){ | ||
382 | 284 | - return lh_new(NULL,NULL); | ||
383 | 285 | +#if OPENSSL_VERSION_NUMBER >= 0x10000000L | ||
384 | 286 | +LHASH_OF(CONF_VALUE) | ||
385 | 287 | +#else | ||
386 | 288 | +LHASH | ||
387 | 289 | +#endif | ||
388 | 290 | +*x509v3_lhash() { | ||
389 | 291 | + return lh_new(NULL, NULL); /* Should probably be lh_CONF_VALUE_new but won't compile. */ | ||
390 | 292 | } | ||
391 | 293 | |||
392 | 294 | X509V3_CTX * | ||
393 | 295 | -x509v3_set_conf_lhash(LHASH * lhash){ | ||
394 | 296 | +#if OPENSSL_VERSION_NUMBER >= 0x10000000L | ||
395 | 297 | +x509v3_set_conf_lhash(LHASH_OF(CONF_VALUE) * lhash) { | ||
396 | 298 | +#else | ||
397 | 299 | +x509v3_set_conf_lhash(LHASH * lhash) { | ||
398 | 300 | +#endif | ||
399 | 301 | X509V3_CTX * ctx; | ||
400 | 302 | if (!(ctx=(X509V3_CTX *)PyMem_Malloc(sizeof(X509V3_CTX)))) { | ||
401 | 303 | PyErr_SetString(PyExc_MemoryError, "x509v3_set_conf_lhash"); | ||
402 | 304 | @@ -517,11 +532,20 @@ x509v3_set_conf_lhash(LHASH * lhash){ | ||
403 | 305 | return ctx; | ||
404 | 306 | } | ||
405 | 307 | |||
406 | 308 | -X509_EXTENSION *x509v3_ext_conf(LHASH *conf, X509V3_CTX *ctx, char *name, char *value) { | ||
407 | 309 | +X509_EXTENSION * | ||
408 | 310 | +#if OPENSSL_VERSION_NUMBER >= 0x10000000L | ||
409 | 311 | +x509v3_ext_conf(LHASH_OF(CONF_VALUE) *conf, X509V3_CTX *ctx, char *name, char *value) { | ||
410 | 312 | +#else | ||
411 | 313 | +x509v3_ext_conf(LHASH *conf, X509V3_CTX *ctx, char *name, char *value) { | ||
412 | 314 | +#endif | ||
413 | 315 | X509_EXTENSION * ext = NULL; | ||
414 | 316 | ext = X509V3_EXT_conf(conf, ctx, name, value); | ||
415 | 317 | PyMem_Free(ctx); | ||
416 | 318 | +#if OPENSSL_VERSION_NUMBER >= 0x10000000L | ||
417 | 319 | + lh_CONF_VALUE_free(conf); | ||
418 | 320 | +#else | ||
419 | 321 | lh_free(conf); | ||
420 | 322 | +#endif | ||
421 | 323 | return ext; | ||
422 | 324 | } | ||
423 | 325 | |||
424 | 326 | @@ -543,33 +567,33 @@ PyObject *x509_extension_get_name(X509_E | ||
425 | 327 | } | ||
426 | 328 | |||
427 | 329 | /* sk_X509_EXTENSION_new_null is a macro. */ | ||
428 | 330 | -STACK *sk_x509_extension_new_null(void) { | ||
429 | 331 | - return (STACK *)sk_X509_EXTENSION_new_null(); | ||
430 | 332 | +STACK_OF(X509_EXTENSION) *sk_x509_extension_new_null(void) { | ||
431 | 333 | + return sk_X509_EXTENSION_new_null(); | ||
432 | 334 | } | ||
433 | 335 | |||
434 | 336 | /* sk_X509_EXTENSION_free() is a macro. */ | ||
435 | 337 | -void sk_x509_extension_free(STACK *stack) { | ||
436 | 338 | - sk_X509_EXTENSION_free((STACK_OF(X509_EXTENSION) *)stack); | ||
437 | 339 | +void sk_x509_extension_free(STACK_OF(X509_EXTENSION) *stack) { | ||
438 | 340 | + sk_X509_EXTENSION_free(stack); | ||
439 | 341 | } | ||
440 | 342 | |||
441 | 343 | /* sk_X509_EXTENSION_push() is a macro. */ | ||
442 | 344 | -int sk_x509_extension_push(STACK *stack, X509_EXTENSION *x509_ext) { | ||
443 | 345 | - return sk_X509_EXTENSION_push((STACK_OF(X509_EXTENSION) *)stack, x509_ext); | ||
444 | 346 | +int sk_x509_extension_push(STACK_OF(X509_EXTENSION) *stack, X509_EXTENSION *x509_ext) { | ||
445 | 347 | + return sk_X509_EXTENSION_push(stack, x509_ext); | ||
446 | 348 | } | ||
447 | 349 | |||
448 | 350 | /* sk_X509_EXTENSION_pop() is a macro. */ | ||
449 | 351 | -X509_EXTENSION *sk_x509_extension_pop(STACK *stack) { | ||
450 | 352 | - return sk_X509_EXTENSION_pop((STACK_OF(X509_EXTENSION) *)stack); | ||
451 | 353 | +X509_EXTENSION *sk_x509_extension_pop(STACK_OF(X509_EXTENSION) *stack) { | ||
452 | 354 | + return sk_X509_EXTENSION_pop(stack); | ||
453 | 355 | } | ||
454 | 356 | |||
455 | 357 | /* sk_X509_EXTENSION_num() is a macro. */ | ||
456 | 358 | -int sk_x509_extension_num(STACK *stack) { | ||
457 | 359 | - return sk_X509_EXTENSION_num((STACK_OF(X509_EXTENSION) *)stack); | ||
458 | 360 | +int sk_x509_extension_num(STACK_OF(X509_EXTENSION) *stack) { | ||
459 | 361 | + return sk_X509_EXTENSION_num(stack); | ||
460 | 362 | } | ||
461 | 363 | |||
462 | 364 | /* sk_X509_EXTENSION_value() is a macro. */ | ||
463 | 365 | -X509_EXTENSION *sk_x509_extension_value(STACK *stack, int i) { | ||
464 | 366 | - return sk_X509_EXTENSION_value((STACK_OF(X509_EXTENSION) *)stack, i); | ||
465 | 367 | +X509_EXTENSION *sk_x509_extension_value(STACK_OF(X509_EXTENSION) *stack, int i) { | ||
466 | 368 | + return sk_X509_EXTENSION_value(stack, i); | ||
467 | 369 | } | ||
468 | 370 | |||
469 | 371 | /* X509_STORE_CTX_get_app_data is a macro. */ | ||
470 | 372 | @@ -590,7 +614,7 @@ Used in the wrapping of ASN1_seq_unpack | ||
471 | 373 | #define I2DTYPE int (*)() | ||
472 | 374 | #endif | ||
473 | 375 | |||
474 | 376 | -STACK * | ||
475 | 377 | +STACK_OF(X509) * | ||
476 | 378 | make_stack_from_der_sequence(PyObject * pyEncodedString){ | ||
477 | 379 | STACK_OF(X509) *certs; | ||
478 | 380 | Py_ssize_t encoded_string_len; | ||
479 | 381 | @@ -606,7 +630,7 @@ make_stack_from_der_sequence(PyObject * | ||
480 | 382 | return NULL; | ||
481 | 383 | } | ||
482 | 384 | |||
483 | 385 | - certs = ASN1_seq_unpack((unsigned char *)encoded_string, encoded_string_len, (D2ITYPE)d2i_X509, (void(*)())X509_free ); | ||
484 | 386 | + certs = ASN1_seq_unpack_X509((unsigned char *)encoded_string, encoded_string_len, d2i_X509, X509_free ); | ||
485 | 387 | if (!certs) { | ||
486 | 388 | PyErr_SetString(_x509_err, ERR_reason_error_string(ERR_get_error())); | ||
487 | 389 | return NULL; | ||
488 | 390 | @@ -616,13 +640,13 @@ make_stack_from_der_sequence(PyObject * | ||
489 | 391 | } | ||
490 | 392 | |||
491 | 393 | PyObject * | ||
492 | 394 | -get_der_encoding_stack(STACK * stack){ | ||
493 | 395 | +get_der_encoding_stack(STACK_OF(X509) *stack){ | ||
494 | 396 | PyObject * encodedString; | ||
495 | 397 | |||
496 | 398 | unsigned char * encoding; | ||
497 | 399 | int len; | ||
498 | 400 | |||
499 | 401 | - encoding = ASN1_seq_pack((STACK_OF(X509)*) stack, (I2DTYPE)i2d_X509, NULL, &len); | ||
500 | 402 | + encoding = ASN1_seq_pack_X509(stack, i2d_X509, NULL, &len); | ||
501 | 403 | if (!encoding) { | ||
502 | 404 | PyErr_SetString(_x509_err, ERR_reason_error_string(ERR_get_error())); | ||
503 | 405 | return NULL; | ||
504 | 406 | --- m2crypto-0.20.1.orig/SWIG/_aes.i | ||
505 | 407 | +++ m2crypto-0.20.1/SWIG/_aes.i | ||
506 | 408 | @@ -76,7 +76,7 @@ PyObject *AES_crypt(const AES_KEY *key, | ||
507 | 409 | AES_encrypt((const unsigned char *)in, out, key); | ||
508 | 410 | else | ||
509 | 411 | AES_decrypt((const unsigned char *)in, out, key); | ||
510 | 412 | - return PyString_FromStringAndSize(out, outlen); | ||
511 | 413 | + return PyString_FromStringAndSize((char*)out, outlen); | ||
512 | 414 | } | ||
513 | 415 | |||
514 | 416 | int AES_type_check(AES_KEY *key) { | ||
515 | 417 | --- m2crypto-0.20.1.orig/SWIG/_ssl.i | ||
516 | 418 | +++ m2crypto-0.20.1/SWIG/_ssl.i | ||
517 | 419 | @@ -17,13 +17,17 @@ | ||
518 | 420 | %apply Pointer NONNULL { SSL_CTX * }; | ||
519 | 421 | %apply Pointer NONNULL { SSL * }; | ||
520 | 422 | %apply Pointer NONNULL { SSL_CIPHER * }; | ||
521 | 423 | -%apply Pointer NONNULL { STACK * }; | ||
522 | 424 | +%apply Pointer NONNULL { STACK_OF(SSL_CIPHER) * }; | ||
523 | 425 | +%apply Pointer NONNULL { STACK_OF(X509) * }; | ||
524 | 426 | %apply Pointer NONNULL { BIO * }; | ||
525 | 427 | %apply Pointer NONNULL { DH * }; | ||
526 | 428 | %apply Pointer NONNULL { RSA * }; | ||
527 | 429 | %apply Pointer NONNULL { EVP_PKEY *}; | ||
528 | 430 | %apply Pointer NONNULL { PyObject *pyfunc }; | ||
529 | 431 | |||
530 | 432 | +%rename(ssl_get_ciphers) SSL_get_ciphers; | ||
531 | 433 | +extern STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *ssl); | ||
532 | 434 | + | ||
533 | 435 | %rename(ssl_get_version) SSL_get_version; | ||
534 | 436 | extern const char *SSL_get_version(CONST SSL *); | ||
535 | 437 | %rename(ssl_get_error) SSL_get_error; | ||
536 | 438 | @@ -41,8 +45,10 @@ extern const char *SSL_alert_desc_string | ||
537 | 439 | %rename(ssl_get_alert_desc_v) SSL_alert_desc_string_long; | ||
538 | 440 | extern const char *SSL_alert_desc_string_long(int); | ||
539 | 441 | |||
540 | 442 | +#ifndef OPENSSL_NO_SSL2 | ||
541 | 443 | %rename(sslv2_method) SSLv2_method; | ||
542 | 444 | extern SSL_METHOD *SSLv2_method(void); | ||
543 | 445 | +#endif | ||
544 | 446 | %rename(sslv3_method) SSLv3_method; | ||
545 | 447 | extern SSL_METHOD *SSLv3_method(void); | ||
546 | 448 | %rename(sslv23_method) SSLv23_method; | ||
547 | 449 | @@ -668,28 +674,24 @@ int ssl_cipher_get_bits(SSL_CIPHER *c) { | ||
548 | 450 | return SSL_CIPHER_get_bits(c, NULL); | ||
549 | 451 | } | ||
550 | 452 | |||
551 | 453 | -STACK *ssl_get_ciphers(SSL *ssl) { | ||
552 | 454 | - return (STACK *)SSL_get_ciphers(ssl); | ||
553 | 455 | -} | ||
554 | 456 | - | ||
555 | 457 | -int sk_ssl_cipher_num(STACK *stack) { | ||
556 | 458 | - return sk_num(stack); | ||
557 | 459 | +int sk_ssl_cipher_num(STACK_OF(SSL_CIPHER) *stack) { | ||
558 | 460 | + return sk_SSL_CIPHER_num(stack); | ||
559 | 461 | } | ||
560 | 462 | |||
561 | 463 | -SSL_CIPHER *sk_ssl_cipher_value(STACK *stack, int idx) { | ||
562 | 464 | - return (SSL_CIPHER *)sk_value(stack, idx); | ||
563 | 465 | +SSL_CIPHER *sk_ssl_cipher_value(STACK_OF(SSL_CIPHER) *stack, int idx) { | ||
564 | 466 | + return sk_SSL_CIPHER_value(stack, idx); | ||
565 | 467 | } | ||
566 | 468 | |||
567 | 469 | -STACK *ssl_get_peer_cert_chain(SSL *ssl) { | ||
568 | 470 | - return (STACK *)SSL_get_peer_cert_chain(ssl); | ||
569 | 471 | +STACK_OF(X509) *ssl_get_peer_cert_chain(SSL *ssl) { | ||
570 | 472 | + return SSL_get_peer_cert_chain(ssl); | ||
571 | 473 | } | ||
572 | 474 | |||
573 | 475 | -int sk_x509_num(STACK *stack) { | ||
574 | 476 | - return sk_num(stack); | ||
575 | 477 | +int sk_x509_num(STACK_OF(X509) *stack) { | ||
576 | 478 | + return sk_X509_num(stack); | ||
577 | 479 | } | ||
578 | 480 | |||
579 | 481 | -X509 *sk_x509_value(STACK *stack, int idx) { | ||
580 | 482 | - return (X509 *)sk_value(stack, idx); | ||
581 | 483 | +X509 *sk_x509_value(STACK_OF(X509) *stack, int idx) { | ||
582 | 484 | + return sk_X509_value(stack, idx); | ||
583 | 485 | } | ||
584 | 486 | %} | ||
585 | 487 | |||
586 | 0 | 488 | ||
587 | === added file 'debian/patches/fix_kill_signal.patch' | |||
588 | --- debian/patches/fix_kill_signal.patch 1970-01-01 00:00:00 +0000 | |||
589 | +++ debian/patches/fix_kill_signal.patch 2011-08-10 19:50:59 +0000 | |||
590 | @@ -0,0 +1,17 @@ | |||
591 | 1 | Description: fix kill signal | ||
592 | 2 | use signal 9 to kill old s_server processes | ||
593 | 3 | to work around build HUP signal-ignore-mask (LP: #451998). | ||
594 | 4 | Author: Chuck Short <zulcss@ubuntu.com> | ||
595 | 5 | Origin: 0.20.1-1ubuntu1 | ||
596 | 6 | Bug-Ubuntu: https://bugs.launchpad.net/bugs/451998 | ||
597 | 7 | --- m2crypto-0.20.1.orig/tests/test_ssl.py | ||
598 | 8 | +++ m2crypto-0.20.1/tests/test_ssl.py | ||
599 | 9 | @@ -92,7 +92,7 @@ class BaseSSLClientTestCase(unittest.Tes | ||
600 | 10 | return pid | ||
601 | 11 | |||
602 | 12 | def stop_server(self, pid): | ||
603 | 13 | - os.kill(pid, 1) | ||
604 | 14 | + os.kill(pid, 9) | ||
605 | 15 | os.waitpid(pid, 0) | ||
606 | 16 | |||
607 | 17 | def http_get(self, s): | ||
608 | 0 | 18 | ||
609 | === added file 'debian/patches/fix_sslv2_test.patch' | |||
610 | --- debian/patches/fix_sslv2_test.patch 1970-01-01 00:00:00 +0000 | |||
611 | +++ debian/patches/fix_sslv2_test.patch 2011-08-10 19:50:59 +0000 | |||
612 | @@ -0,0 +1,19 @@ | |||
613 | 1 | Description: fix test_sslv23_no_v2_no_service test | ||
614 | 2 | sslv2 is disabled in openssl 1.0.0 thus sslv23 will build up an sslv3 | ||
615 | 3 | connection instead of throwing an error | ||
616 | 4 | Author: Julian Taylor <jtaylor.debian@googlemail.com> | ||
617 | 5 | Forwarded: no | ||
618 | 6 | === modified file 'tests/test_ssl.py' | ||
619 | 7 | --- m2crypto.orig/tests/test_ssl.py 2010-10-01 11:58:15 +0000 | ||
620 | 8 | +++ m2crypto/tests/test_ssl.py 2011-08-10 17:25:08 +0000 | ||
621 | 9 | @@ -392,7 +392,8 @@ | ||
622 | 10 | try: | ||
623 | 11 | ctx = SSL.Context('sslv23') | ||
624 | 12 | s = SSL.Connection(ctx) | ||
625 | 13 | - self.assertRaises(SSL.SSLError, s.connect, self.srv_addr) | ||
626 | 14 | + s.connect(self.srv_addr) | ||
627 | 15 | + self.failUnlessEqual(s.get_version(), 'SSLv3') | ||
628 | 16 | s.close() | ||
629 | 17 | finally: | ||
630 | 18 | self.stop_server(pid) | ||
631 | 19 | |||
632 | 0 | 20 | ||
633 | === added file 'debian/patches/fix_sslv2_test2.patch' | |||
634 | --- debian/patches/fix_sslv2_test2.patch 1970-01-01 00:00:00 +0000 | |||
635 | +++ debian/patches/fix_sslv2_test2.patch 2011-08-10 19:50:59 +0000 | |||
636 | @@ -0,0 +1,54 @@ | |||
637 | 1 | Description: fix testsuite for newer openssl | ||
638 | 2 | Origin: 0.20.1-1ubuntu3 | ||
639 | 3 | Applied-Upstream: http://svn.osafoundation.org/viewvc/m2crypto/trunk/tests/test_smime.py?r1=698&r2=721 | ||
640 | 4 | Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/m2crypto/+bug/600549 | ||
641 | 5 | Author: Marc Deslauriers <marc.deslauriers@ubuntu.com> | ||
642 | 6 | --- m2crypto-0.20.1.orig/tests/test_smime.py | ||
643 | 7 | +++ m2crypto-0.20.1/tests/test_smime.py | ||
644 | 8 | @@ -37,7 +37,7 @@ class SMIMETestCase(unittest.TestCase): | ||
645 | 9 | buf = BIO.MemoryBuffer(self.cleartext) | ||
646 | 10 | s = SMIME.SMIME() | ||
647 | 11 | s.load_key('tests/signer_key.pem', 'tests/signer.pem') | ||
648 | 12 | - p7 = s.sign(buf) | ||
649 | 13 | + p7 = s.sign(buf, SMIME.PKCS7_DETACHED) | ||
650 | 14 | assert len(buf) == 0 | ||
651 | 15 | assert p7.type() == SMIME.PKCS7_SIGNED, p7.type() | ||
652 | 16 | assert isinstance(p7, SMIME.PKCS7), p7 | ||
653 | 17 | @@ -73,9 +73,8 @@ class SMIMETestCase(unittest.TestCase): | ||
654 | 18 | |||
655 | 19 | p7, data = SMIME.smime_load_pkcs7_bio(self.signed) | ||
656 | 20 | |||
657 | 21 | - assert data.read() == self.cleartext | ||
658 | 22 | assert isinstance(p7, SMIME.PKCS7), p7 | ||
659 | 23 | - v = s.verify(p7) | ||
660 | 24 | + v = s.verify(p7, data) | ||
661 | 25 | assert v == self.cleartext | ||
662 | 26 | |||
663 | 27 | t = p7.get0_signers(sk) | ||
664 | 28 | @@ -169,7 +168,7 @@ class SMIMETestCase(unittest.TestCase): | ||
665 | 29 | s.set_cipher(SMIME.Cipher('des_ede3_cbc')) | ||
666 | 30 | |||
667 | 31 | tmp = BIO.MemoryBuffer() | ||
668 | 32 | - s.write(tmp, p7, buf) | ||
669 | 33 | + s.write(tmp, p7) | ||
670 | 34 | |||
671 | 35 | p7 = s.encrypt(tmp) | ||
672 | 36 | |||
673 | 37 | @@ -211,6 +210,7 @@ class WriteLoadTestCase(unittest.TestCas | ||
674 | 38 | assert p7.write(f) == 1 | ||
675 | 39 | f.close() | ||
676 | 40 | |||
677 | 41 | + p7 = s.sign(BIO.MemoryBuffer('some text'), SMIME.PKCS7_DETACHED) | ||
678 | 42 | self.filenameSmime = 'tests/sig.p7s' | ||
679 | 43 | f = BIO.openfile(self.filenameSmime, 'wb') | ||
680 | 44 | assert s.write(f, p7, BIO.MemoryBuffer('some text')) == 1 | ||
681 | 45 | @@ -220,7 +220,7 @@ class WriteLoadTestCase(unittest.TestCas | ||
682 | 46 | buf = BIO.MemoryBuffer() | ||
683 | 47 | assert SMIME.load_pkcs7(self.filename).write_der(buf) == 1 | ||
684 | 48 | s = buf.read() | ||
685 | 49 | - assert len(s) == 1204, len(s) | ||
686 | 50 | + assert len(s) in (1204, 1243), len(s) | ||
687 | 51 | |||
688 | 52 | def test_load_pkcs7(self): | ||
689 | 53 | assert SMIME.load_pkcs7(self.filename).type() == SMIME.PKCS7_SIGNED | ||
690 | 54 | |||
691 | 0 | 55 | ||
692 | === added file 'debian/patches/series' | |||
693 | --- debian/patches/series 1970-01-01 00:00:00 +0000 | |||
694 | +++ debian/patches/series 2011-08-10 19:50:59 +0000 | |||
695 | @@ -0,0 +1,5 @@ | |||
696 | 1 | disable_sslv2_test.patch | ||
697 | 2 | fix_build_with_new_openssl.patch | ||
698 | 3 | fix_kill_signal.patch | ||
699 | 4 | fix_sslv2_test2.patch | ||
700 | 5 | fix_sslv2_test.patch | ||
701 | 0 | 6 | ||
702 | === modified file 'debian/rules' | |||
703 | --- debian/rules 2009-10-16 12:51:15 +0000 | |||
704 | +++ debian/rules 2011-08-10 19:50:59 +0000 | |||
705 | @@ -73,7 +73,7 @@ | |||
706 | 73 | dh_strip | 73 | dh_strip |
707 | 74 | dh_compress | 74 | dh_compress |
708 | 75 | dh_fixperms | 75 | dh_fixperms |
710 | 76 | dh_pysupport | 76 | dh_python2 |
711 | 77 | dh_installdeb | 77 | dh_installdeb |
712 | 78 | dh_shlibdeps | 78 | dh_shlibdeps |
713 | 79 | dh_gencontrol | 79 | dh_gencontrol |
714 | 80 | 80 | ||
715 | === added directory 'debian/source' | |||
716 | === added file 'debian/source/format' | |||
717 | --- debian/source/format 1970-01-01 00:00:00 +0000 | |||
718 | +++ debian/source/format 2011-08-10 19:50:59 +0000 | |||
719 | @@ -0,0 +1,1 @@ | |||
720 | 1 | 3.0 (quilt) | ||
721 | 0 | 2 | ||
722 | === modified file 'debian/watch' | |||
723 | --- debian/watch 2009-06-15 22:11:39 +0000 | |||
724 | +++ debian/watch 2011-08-10 19:50:59 +0000 | |||
725 | @@ -1,2 +1,3 @@ | |||
726 | 1 | version=3 | 1 | version=3 |
727 | 2 | opts=dversionmangle=s/\+dfsg// \ | ||
728 | 2 | http://pypi.python.org/packages/source/M/M2Crypto/M2Crypto-(.*).tar.gz | 3 | http://pypi.python.org/packages/source/M/M2Crypto/M2Crypto-(.*).tar.gz |
729 | 3 | 4 | ||
730 | === modified file 'tests/test_smime.py' | |||
731 | --- tests/test_smime.py 2010-07-09 11:17:57 +0000 | |||
732 | +++ tests/test_smime.py 2011-08-10 19:50:59 +0000 | |||
733 | @@ -37,7 +37,7 @@ | |||
734 | 37 | buf = BIO.MemoryBuffer(self.cleartext) | 37 | buf = BIO.MemoryBuffer(self.cleartext) |
735 | 38 | s = SMIME.SMIME() | 38 | s = SMIME.SMIME() |
736 | 39 | s.load_key('tests/signer_key.pem', 'tests/signer.pem') | 39 | s.load_key('tests/signer_key.pem', 'tests/signer.pem') |
738 | 40 | p7 = s.sign(buf, SMIME.PKCS7_DETACHED) | 40 | p7 = s.sign(buf) |
739 | 41 | assert len(buf) == 0 | 41 | assert len(buf) == 0 |
740 | 42 | assert p7.type() == SMIME.PKCS7_SIGNED, p7.type() | 42 | assert p7.type() == SMIME.PKCS7_SIGNED, p7.type() |
741 | 43 | assert isinstance(p7, SMIME.PKCS7), p7 | 43 | assert isinstance(p7, SMIME.PKCS7), p7 |
742 | @@ -73,8 +73,9 @@ | |||
743 | 73 | 73 | ||
744 | 74 | p7, data = SMIME.smime_load_pkcs7_bio(self.signed) | 74 | p7, data = SMIME.smime_load_pkcs7_bio(self.signed) |
745 | 75 | 75 | ||
746 | 76 | assert data.read() == self.cleartext | ||
747 | 76 | assert isinstance(p7, SMIME.PKCS7), p7 | 77 | assert isinstance(p7, SMIME.PKCS7), p7 |
749 | 77 | v = s.verify(p7, data) | 78 | v = s.verify(p7) |
750 | 78 | assert v == self.cleartext | 79 | assert v == self.cleartext |
751 | 79 | 80 | ||
752 | 80 | t = p7.get0_signers(sk) | 81 | t = p7.get0_signers(sk) |
753 | @@ -168,7 +169,7 @@ | |||
754 | 168 | s.set_cipher(SMIME.Cipher('des_ede3_cbc')) | 169 | s.set_cipher(SMIME.Cipher('des_ede3_cbc')) |
755 | 169 | 170 | ||
756 | 170 | tmp = BIO.MemoryBuffer() | 171 | tmp = BIO.MemoryBuffer() |
758 | 171 | s.write(tmp, p7) | 172 | s.write(tmp, p7, buf) |
759 | 172 | 173 | ||
760 | 173 | p7 = s.encrypt(tmp) | 174 | p7 = s.encrypt(tmp) |
761 | 174 | 175 | ||
762 | 175 | 176 | ||
763 | === modified file 'tests/test_ssl.py' | |||
764 | --- tests/test_ssl.py 2010-10-01 11:58:15 +0000 | |||
765 | +++ tests/test_ssl.py 2011-08-10 19:50:59 +0000 | |||
766 | @@ -92,7 +92,7 @@ | |||
767 | 92 | return pid | 92 | return pid |
768 | 93 | 93 | ||
769 | 94 | def stop_server(self, pid): | 94 | def stop_server(self, pid): |
771 | 95 | os.kill(pid, 9) | 95 | os.kill(pid, 1) |
772 | 96 | os.waitpid(pid, 0) | 96 | os.waitpid(pid, 0) |
773 | 97 | 97 | ||
774 | 98 | def http_get(self, s): | 98 | def http_get(self, s): |
775 | @@ -397,7 +397,7 @@ | |||
776 | 397 | finally: | 397 | finally: |
777 | 398 | self.stop_server(pid) | 398 | self.stop_server(pid) |
778 | 399 | 399 | ||
780 | 400 | def disabled_test_sslv23_weak_crypto(self): | 400 | def test_sslv23_weak_crypto(self): |
781 | 401 | if fips_mode: # TLS is required in FIPS mode | 401 | if fips_mode: # TLS is required in FIPS mode |
782 | 402 | return | 402 | return |
783 | 403 | self.args = self.args + ['-no_tls1', '-no_ssl3'] | 403 | self.args = self.args + ['-no_tls1', '-no_ssl3'] |