X-Original-To: alpine-devel@lists.alpinelinux.org Received: from mx1.tetrasec.net (mx1.tetrasec.net [74.117.190.25]) by lists.alpinelinux.org (Postfix) with ESMTP id 56B6A5C43A9 for ; Thu, 25 Oct 2018 08:35:56 +0000 (GMT) Received: from mx1.tetrasec.net (mail.local [127.0.0.1]) by mx1.tetrasec.net (Postfix) with ESMTP id 1E5FA9E1D87; Thu, 25 Oct 2018 08:35:56 +0000 (GMT) Received: from ncopa-desktop.copa.dup.pw (67.63.200.37.customer.cdi.no [37.200.63.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: alpine@tanael.org) by mx1.tetrasec.net (Postfix) with ESMTPSA id 84ECE9E00F8; Thu, 25 Oct 2018 08:35:54 +0000 (GMT) Date: Thu, 25 Oct 2018 10:35:50 +0200 From: Natanael Copa To: William Pitcock Cc: Timo Teras , alpine-dev Subject: Re: [alpine-devel] Re: openssl 1.1 support Message-ID: <20181025103550.18d4cc2c@ncopa-desktop.copa.dup.pw> In-Reply-To: References: <20181024171950.2343fefd@ncopa-desktop.copa.dup.pw> X-Mailer: Claws Mail 3.17.1 (GTK+ 2.24.32; x86_64-alpine-linux-musl) X-Mailinglist: alpine-devel Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Wed, 24 Oct 2018 18:47:51 -0500 William Pitcock wrote: ... > > There are also some patches that fedora uses that we may want. Some of > > fedoras patches are for multilib and FIPS support, which I don't think > > we care about (yet), but there are some that replaces getenv() with > > secure_getenv(). > > I do not think musl have secure_getenv(3) yet. We don't but its relatively easy to implement same functionality: inline *char secure_getenv(const char *name) { return getauxval(AT_SECURE) ? NULL : getenv(name); } I think it may be good that we do that so that nobody gets a nasty surprise if a suid binary is linked to openssl. ... > > William, can you please have a look at the irc tls patch[4]? Is this > > something we still want/need? If so, can you rebase it for openssl 1.1? > > We can drop it. IRCv3 STARTTLS has been all but deprecated. Good. > > Can you please also have a look at porting libtls-standalone to openssl > > 1.1? > > I pushed a new libtls-standalone which builds against openssl 1.1.0 APIs. Great! thanks! -nc --- Unsubscribe: alpine-devel+unsubscribe@lists.alpinelinux.org Help: alpine-devel+help@lists.alpinelinux.org ---