From dd5b71d2ad69f1887985ee1ca67b254e04157f73 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Thu, 23 Mar 2023 06:44:33 +0000 Subject: gentoo auto-resync : 23:03:2023 - 06:44:33 --- net-libs/Manifest.gz | Bin 32788 -> 32789 bytes net-libs/libvncserver/Manifest | 2 + .../libvncserver-0.9.14-crypto-openssl-fix.patch | 56 ++++++++++++++ .../libvncserver/libvncserver-0.9.14-r1.ebuild | 81 +++++++++++++++++++++ 4 files changed, 139 insertions(+) create mode 100644 net-libs/libvncserver/files/libvncserver-0.9.14-crypto-openssl-fix.patch create mode 100644 net-libs/libvncserver/libvncserver-0.9.14-r1.ebuild (limited to 'net-libs') diff --git a/net-libs/Manifest.gz b/net-libs/Manifest.gz index de460395623f..682c068ab421 100644 Binary files a/net-libs/Manifest.gz and b/net-libs/Manifest.gz differ diff --git a/net-libs/libvncserver/Manifest b/net-libs/libvncserver/Manifest index a4de1576c571..73a7c0adf2ab 100644 --- a/net-libs/libvncserver/Manifest +++ b/net-libs/libvncserver/Manifest @@ -1,3 +1,5 @@ +AUX libvncserver-0.9.14-crypto-openssl-fix.patch 2043 BLAKE2B 7db58e983c1f7c633b883c385821272c2c0d32b786ec002df5a53bc18981de15b87d5be92ed246f219dc198fc9851b15823e2cb60e5c0b39f9572a4a6a3f0a38 SHA512 77838751bdb98c4de8351d6f10552dd646f929b8653ebee3b22b1ff86c80fb7b2f2434fbd4eba53c84be8af8eed220f2a7a115132a9823673d244da06a312eac DIST LibVNCServer-0.9.14.tar.gz 593516 BLAKE2B 6585e15e2ade08211ace0ae40deb07eca04b96dcfe38fb4d2e7d7a7192ca22dda546cb69fc4be6c6b7eb83c8afb0ea14d7cee3779a9e64c138ec861efeb540b8 SHA512 8a0a58e355154cbe1e5807864dc874b063c5e5f5e20d64ae541d49d51b654a35ca9c625adc5c303b6570fa79c19f82d87a37612f9801b453ccf862bd77c06fcc +EBUILD libvncserver-0.9.14-r1.ebuild 2228 BLAKE2B be43688dc06b984d7856a99169e397b8738931fe0dff33f798699edcb8e5d87e8f621cd1b78698ee935e057c6edfcabff1ba34db087101e7c193411a2182b903 SHA512 ed7c4f9a28645621f0bb9bd0097522ea000437c8ba027d3351d7e74608dce14cd9e32de9ca2a7a8e325f588937fb439aa4fc97fb23ca82595cbef8d908dafe02 EBUILD libvncserver-0.9.14.ebuild 2163 BLAKE2B fcb5f1ab392c4e42c5f45e0cbba88757661dadb985e15b9530f18a4fb4ffe7b63e402f7f99c171d202ca374170ab6dbda0e556cd127a1dbf63a429b99800715b SHA512 ab361e3be84763c93bfdbe5b5b4c11d65f336bdee0a66e5ee1314a1cedd99b4b29d372bfdbd62bd08af71c0debf1957907a44cde74d98b6e86456d32136b230f MISC metadata.xml 1078 BLAKE2B c1977b60d1c6943a3b6636c24e29d2b029dbb088c59defb8f4cd820aac317b6a207ffd3669e3da567270161392425b8a30be4bd544d91e6262f258449b71261c SHA512 d774527b02965a951ae5eba13a4865ee874aa0c969c32a4bc3643313ffefeb933700901dbeca6511048140d311b380e7e2035adfea4542b455b608d25eb47efe diff --git a/net-libs/libvncserver/files/libvncserver-0.9.14-crypto-openssl-fix.patch b/net-libs/libvncserver/files/libvncserver-0.9.14-crypto-openssl-fix.patch new file mode 100644 index 000000000000..85179ee5ae61 --- /dev/null +++ b/net-libs/libvncserver/files/libvncserver-0.9.14-crypto-openssl-fix.patch @@ -0,0 +1,56 @@ +https://github.com/LibVNC/libvncserver/commit/b686f379c34114cf938fe88291f58014337558f6 +https://bugs.gentoo.org/893608 + +From b686f379c34114cf938fe88291f58014337558f6 Mon Sep 17 00:00:00 2001 +From: Gaurav Ujjwal +Date: Mon, 23 Jan 2023 00:03:03 +0530 +Subject: [PATCH] common/crypto_openssl: pad DH key buffers with leading zeros + for smaller keys + +Re: https://github.com/LibVNC/libvncserver/issues/493 +Re: https://github.com/bk138/multivnc/issues/202 +--- a/common/crypto_openssl.c ++++ b/common/crypto_openssl.c +@@ -156,6 +156,15 @@ int encrypt_aes128ecb(void *out, int *out_len, const unsigned char key[16], cons + return result; + } + ++static void pad_leading_zeros(uint8_t *out, const size_t current_len, const size_t expected_len) { ++ if (current_len >= expected_len || expected_len < 1) ++ return; ++ ++ size_t diff = expected_len - current_len; ++ memmove(out + diff, out, current_len); ++ memset(out, 0, diff); ++} ++ + int dh_generate_keypair(uint8_t *priv_out, uint8_t *pub_out, const uint8_t *gen, const size_t gen_len, const uint8_t *prime, const size_t keylen) + { + int result = 0; +@@ -184,6 +193,9 @@ int dh_generate_keypair(uint8_t *priv_out, uint8_t *pub_out, const uint8_t *gen, + goto out; + if(BN_bn2bin(dh->pub_key, pub_out) == 0) + goto out; ++ ++ pad_leading_zeros(priv_out, BN_num_bytes(dh->priv_key), keylen); ++ pad_leading_zeros(pub_out, BN_num_bytes(dh->pub_key), keylen); + #else + DH_get0_key(dh, &pub_key, &priv_key); + if(BN_bn2binpad(priv_key, priv_out, keylen) == -1) +@@ -216,9 +228,11 @@ int dh_compute_shared_key(uint8_t *shared_out, const uint8_t *priv, const uint8_ + if(!DH_set0_key(dh, NULL, BN_bin2bn(priv, keylen, NULL))) + goto out; + #endif +- if(DH_compute_key(shared_out, BN_bin2bn(pub, keylen, NULL), dh) == -1) +- goto out; ++ int shared_len = DH_compute_key(shared_out, BN_bin2bn(pub, keylen, NULL), dh); ++ if(shared_len == -1) ++ goto out; + ++ pad_leading_zeros(shared_out, shared_len, keylen); + result = 1; + + out: +-- +2.39.2 + diff --git a/net-libs/libvncserver/libvncserver-0.9.14-r1.ebuild b/net-libs/libvncserver/libvncserver-0.9.14-r1.ebuild new file mode 100644 index 000000000000..996b5e9c2b4e --- /dev/null +++ b/net-libs/libvncserver/libvncserver-0.9.14-r1.ebuild @@ -0,0 +1,81 @@ +# Copyright 1999-2023 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit cmake + +MY_P="LibVNCServer-${PV}" + +DESCRIPTION="library for creating vnc servers" +HOMEPAGE="https://libvnc.github.io/" +SRC_URI="https://github.com/LibVNC/${PN}/archive/${MY_P}.tar.gz" +S="${WORKDIR}/${PN}-${MY_P}" + +# common/d3des.*: https://github.com/LibVNC/libvncserver/issues/88 +LICENSE="GPL-2 GPL-2+ LGPL-2.1+ BSD MIT" +# no sub slot wanted (yet), see #578958 +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~loong ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 ~amd64-linux ~x86-linux" +IUSE="+24bpp +filetransfer +gcrypt gnutls ipv6 +jpeg lzo +png sasl ssl systemd +threads +zlib" +# https://bugs.gentoo.org/690202 +# https://bugs.gentoo.org/435326 +# https://bugs.gentoo.org/550916 +REQUIRED_USE=" + filetransfer? ( threads ) + jpeg? ( zlib ) + png? ( zlib ) + ssl? ( !gnutls? ( threads ) ) +" +# Avoid using internal crypto backend as it doesn't support +# all authentication methods #893608 +REQUIRED_USE+=" + ssl? ( gnutls? ( gcrypt ) ) + !ssl? ( gcrypt ) +" + +DEPEND=" + gcrypt? ( >=dev-libs/libgcrypt-1.5.3:0= ) + ssl? ( + !gnutls? ( + >=dev-libs/openssl-1.0.2:0= + ) + gnutls? ( >=net-libs/gnutls-2.12.23-r6:0= ) + ) + jpeg? ( media-libs/libjpeg-turbo:= ) + lzo? ( dev-libs/lzo ) + png? ( >=media-libs/libpng-1.6.10:0= ) + sasl? ( dev-libs/cyrus-sasl ) + systemd? ( sys-apps/systemd:= ) + zlib? ( >=sys-libs/zlib-1.2.8-r1:0= ) +" +RDEPEND="${DEPEND}" + +DOCS=( AUTHORS ChangeLog NEWS.md README.md ) + +PATCHES=( + "${FILESDIR}"/${P}-crypto-openssl-fix.patch +) + +src_configure() { + local mycmakeargs=( + -DWITH_EXAMPLES=OFF + -DWITH_FFMPEG=OFF + -DWITH_GTK=OFF + -DWITH_SDL=OFF + -DWITH_24BPP=$(usex 24bpp ON OFF) + -DWITH_TIGHTVNC_FILETRANSFER=$(usex filetransfer ON OFF) + -DWITH_GCRYPT=$(usex gcrypt ON OFF) + -DWITH_GNUTLS=$(usex gnutls $(usex ssl ON OFF) OFF) + -DWITH_IPv6=$(usex ipv6 ON OFF) + -DWITH_JPEG=$(usex jpeg ON OFF) + -DWITH_LZO=$(usex lzo ON OFF) + -DWITH_OPENSSL=$(usex gnutls OFF $(usex ssl ON OFF)) + -DWITH_PNG=$(usex png ON OFF) + -DWITH_SASL=$(usex sasl ON OFF) + -DWITH_SYSTEMD=$(usex systemd ON OFF) + -DWITH_THREADS=$(usex threads ON OFF) + -DWITH_ZLIB=$(usex zlib ON OFF) + ) + cmake_src_configure +} -- cgit v1.2.3