New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Crypto patch for EC_GROUP_new_curve_GF2m #65
Conversation
…def . We have to check whether OPENSSL_NO_EC2M is set, and if it is, then we do not have EC_GROUP_new_curve_GF2m function and do not HAVE_EC.
Thank you! |
Should we backport this to the 20.x and 19.x branches? |
Yes, but I think that we have to check the diff file https://github.com/rabbitmq/erlang-rpm/blob/master/otp-0008-crypto.patch Will check/try and will prepare another PR for 20.x and 19.x branches |
Porting #65 for erlang 19.x
Porting #65 for erlang 20.3.x
Do you want also update the https://github.com/rabbitmq/erlang-rpm/tree/erlang-20.1.x branch? |
Nope, we only maintain the most recent minor for |
…h_19_x Revert "Porting #65 for erlang 19.x"
…h_20.3_x Revert "Porting #65 for erlang 20.3.x"
In openssl 1.0.1e
EC_GROUP_new_curve_GF2m
function is wrapped by #ifndefOPENSSL_NO_EC2M
.We have to check whether
OPENSSL_NO_EC2M
is set, and if it is, then we do not haveEC_GROUP_new_curve_GF2m
function and do notHAVE_EC
.Currently there is this kind of the problem:
I remember that we met this problem before.
With this patch the result will be:
Notes:
1 - Copied from https://build.opensuse.org/package/view_file/devel:languages:erlang:Factory/erlang/crypto.patch?expand=1&rev=92106653f72b30973f28170277fa4b0e
2 - also in the last release
3- Even if there is a way, to enable Enable Elliptical Curve Diffie-Hellman (ECDHE) in Linux, I think that it shouldn't be done :)