aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authortmclaugh <tmclaugh@FreeBSD.org>2008-07-08 07:59:33 +0800
committertmclaugh <tmclaugh@FreeBSD.org>2008-07-08 07:59:33 +0800
commita772c6b96b96cf3ccd47329483622a2f31e8ce0e (patch)
tree342616608ee092ddace5cdb8db188a323f9402eb /security
parentf9e9ab879a1487f4a7fc199bd736ce92f508fea0 (diff)
downloadfreebsd-ports-graphics-a772c6b96b96cf3ccd47329483622a2f31e8ce0e.tar.gz
freebsd-ports-graphics-a772c6b96b96cf3ccd47329483622a2f31e8ce0e.tar.zst
freebsd-ports-graphics-a772c6b96b96cf3ccd47329483622a2f31e8ce0e.zip
Fix build on 7.x when RC5 support is enabled.
PR: 103084, 122187 Submitted by: Dmitry A Grigorovich Approved by: maintainer
Diffstat (limited to 'security')
-rw-r--r--security/ipsec-tools/files/patch-crypto_openssl.c40
1 files changed, 40 insertions, 0 deletions
diff --git a/security/ipsec-tools/files/patch-crypto_openssl.c b/security/ipsec-tools/files/patch-crypto_openssl.c
new file mode 100644
index 00000000000..13eb30e3f13
--- /dev/null
+++ b/security/ipsec-tools/files/patch-crypto_openssl.c
@@ -0,0 +1,40 @@
+--- src/racoon/crypto_openssl.c.orig 2006-12-18 16:18:10.000000000 +0600
++++ src/racoon/crypto_openssl.c 2008-03-28 16:36:05.000000000 +0600
+@@ -1391,15 +1391,15 @@
+ RC5_32_KEY ks;
+
+ /* in RFC 2451, there is information about the number of round. */
+- RC5_32_set_key(&ks, key->l, key->v, 16);
++ RC5_32_set_key(&ks, key->l, (unsigned char*)key->v, 16);
+
+ /* allocate buffer for result */
+ if ((res = vmalloc(data->l)) == NULL)
+ return NULL;
+
+ /* decryption data */
+- RC5_32_cbc_encrypt(data->v, res->v, data->l,
+- &ks, iv->v, RC5_ENCRYPT);
++ RC5_32_cbc_encrypt( (unsigned char*)data->v, (unsigned char*)res->v, data->l,
++ &ks, (unsigned char*)iv->v, RC5_ENCRYPT);
+
+ return res;
+ }
+@@ -1412,15 +1412,15 @@
+ RC5_32_KEY ks;
+
+ /* in RFC 2451, there is information about the number of round. */
+- RC5_32_set_key(&ks, key->l, key->v, 16);
++ RC5_32_set_key(&ks, key->l, (unsigned char*)key->v, 16);
+
+ /* allocate buffer for result */
+ if ((res = vmalloc(data->l)) == NULL)
+ return NULL;
+
+ /* decryption data */
+- RC5_32_cbc_encrypt(data->v, res->v, data->l,
+- &ks, iv->v, RC5_DECRYPT);
++ RC5_32_cbc_encrypt( (unsigned char*)data->v, (unsigned char*)res->v, data->l,
++ &ks, (unsigned char*)iv->v, RC5_DECRYPT);
+
+ return res;
+ }