summaryrefslogtreecommitdiff
path: root/databases/mariadb101-server/files/patch-mysys__ssl_my__crypt.cc
diff options
context:
space:
mode:
authorBernard Spil <brnrd@FreeBSD.org>2017-01-18 20:19:36 +0000
committerBernard Spil <brnrd@FreeBSD.org>2017-01-18 20:19:36 +0000
commiteaa122ead180917df69f323c8b0bd819831c6ed5 (patch)
tree5f41cdd860c23e0e0a64e4046de764d8d593f37b /databases/mariadb101-server/files/patch-mysys__ssl_my__crypt.cc
parentsecurity/vuxml: Document mysql vulnerabilities (diff)
databases/mariadb101-server: Update to 10.1.21
- Update to 10.1.21 - Fix patches that no longer cleanly apply - Rename patches to new naming scheme MFH: 2017Q1 Security: 4d2f9d09-ddb7-11e6-a9a5-b499baebfeaf
Diffstat (limited to 'databases/mariadb101-server/files/patch-mysys__ssl_my__crypt.cc')
-rw-r--r--databases/mariadb101-server/files/patch-mysys__ssl_my__crypt.cc25
1 files changed, 25 insertions, 0 deletions
diff --git a/databases/mariadb101-server/files/patch-mysys__ssl_my__crypt.cc b/databases/mariadb101-server/files/patch-mysys__ssl_my__crypt.cc
new file mode 100644
index 000000000000..f447253d3164
--- /dev/null
+++ b/databases/mariadb101-server/files/patch-mysys__ssl_my__crypt.cc
@@ -0,0 +1,25 @@
+--- mysys_ssl/my_crypt.cc.orig 2017-01-17 19:38:25 UTC
++++ mysys_ssl/my_crypt.cc
+@@ -275,10 +275,14 @@ int my_random_bytes(uchar* buf, int num)
+ return MY_AES_OK;
+ }
+ #else
++#include <openssl/opensslv.h>
+ #include <openssl/rand.h>
+
+ int my_random_bytes(uchar *buf, int num)
+ {
++#if defined(LIBRESSL_VERSION_NUMBER)
++ arc4random_buf(buf, num);
++#else
+ /*
+ Unfortunately RAND_bytes manual page does not provide any guarantees
+ in relation to blocking behavior. Here we explicitly use SSLeay random
+@@ -288,6 +292,7 @@ int my_random_bytes(uchar *buf, int num)
+ RAND_METHOD *rand = RAND_SSLeay();
+ if (rand == NULL || rand->bytes(buf, num) != 1)
+ return MY_AES_OPENSSL_ERROR;
++#endif
+ return MY_AES_OK;
+ }
+ #endif