| Summary: | False negative when running abipkgdiff against ppc64 packages | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Hubert Kario <hkario> |
| Component: | libabigail | Assignee: | Dodji Seketeli <dodji> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 23 | CC: | dodji, dodji, ksinny |
| Target Milestone: | --- | Keywords: | Reopened |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | libabigail-1.0-0.rc3.2.el6 libabigail-1.0-0.rc3.1.fc23 libabigail-1.0-0.8.rc3.1.el7 libabigail-1.0-0.8.rc3.1.fc22 libabigail-1.0-0.8.rc4.2.fc24 libabigail-1.0-0.8.rc4.2.fc22 libabigail-1.0-0.8.rc4.2.fc23 libabigail-1.0-0.8.rc4.2.el7 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-05-09 00:05:07 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
I think that version of libabigail you are using is pretty old.
I believe the current master branch has the fix for this issue because it works fine for me.
I am working toward a new upstream release of libabigail, followed by a new Fedora package update.
For the record, with the current master branch (that I built myself from git), here is what I am getting:
~/git/libabigail/master/build/tools/abipkgdiff --d1 nss-debuginfo-3.19.1-8.el6_7.ppc.rpm --d2 nss-debuginfo-3.21.0-0.2.el6_7.ppc.rpm nss-3.19.1-8.el6_7.ppc.rpm nss-3.21.0-0.2.el6_7.ppc.rpm
================ changes of 'libnss3.so'===============
Functions changes summary: 0 Removed, 0 Changed, 3 Added functions
Variables changes summary: 0 Removed, 0 Changed, 0 Added variable
3 Added functions:
'function SECStatus NSS_OptionGet(PRInt32, PRInt32*)' {NSS_OptionGet@@NSS_3.21}
'function SECStatus NSS_OptionSet(PRInt32, PRInt32)' {NSS_OptionSet@@NSS_3.21}
'function SECMODModule* SECMOD_CreateModuleEx(const char*, const char*, const char*, const char*, const char*)' {SECMOD_CreateModuleEx@@NSS_3.21}
================ end of changes of 'libnss3.so'===============
================ changes of 'libssl3.so'===============
Functions changes summary: 0 Removed, 2 Changed (2 filtered out), 6 Added functions
Variables changes summary: 0 Removed, 1 Changed, 0 Added variable
6 Added functions:
'function SECStatus SSL_DHEGroupPrefSet(PRFileDesc*, SSLDHEGroupType*, PRUint16)' {SSL_DHEGroupPrefSet@@NSS_3.20}
'function SECStatus SSL_EnableWeakDHEPrimeGroup(PRFileDesc*, PRBool)' {SSL_EnableWeakDHEPrimeGroup@@NSS_3.20}
'function SECStatus SSL_GetPreliminaryChannelInfo(PRFileDesc*, SSLPreliminaryChannelInfo*, PRUintn)' {SSL_GetPreliminaryChannelInfo@@NSS_3.21}
'function unsigned int SSL_SignatureMaxCount()' {SSL_SignatureMaxCount@@NSS_3.21}
'function SECStatus SSL_SignaturePrefGet(PRFileDesc*, SSLSignatureAndHashAlg*, unsigned int*, unsigned int)' {SSL_SignaturePrefGet@@NSS_3.21}
'function SECStatus SSL_SignaturePrefSet(PRFileDesc*, const SSLSignatureAndHashAlg*, unsigned int)' {SSL_SignaturePrefSet@@NSS_3.21}
2 functions with some indirect sub-type change:
[C]'function SECStatus SSL_GetChannelInfo(PRFileDesc*, SSLChannelInfo*, PRUintn)' at sslinfo.c:24:1 has some indirect sub-type changes:
parameter 2 of type 'SSLChannelInfo*' has sub-type changes:
in pointed to type 'typedef SSLChannelInfo' at sslt.h:154:1:
underlying type 'struct SSLChannelInfoStr' at sslt.h:125:1 changed:
type size changed from 576 to 608 bits
1 data member insertion:
'PRBool SSLChannelInfoStr::reservedNotSupported', at offset 576 (in bits) at sslt.h:153:1
[C]'function int SSL_RestartHandshakeAfterCertReq(sslSocket*, CERTCertificate*, SECKEYPrivateKey*, CERTCertificateList*)' at sslsecur.c:1539:1 has some indirect sub-type changes:
parameter 1 of type 'sslSocket*' has sub-type changes:
in pointed to type 'typedef sslSocket' at sslimpl.h:175:1:
underlying type 'struct sslSocketStr' at sslimpl.h:1206:1 changed:
type size changed from 90304 to 91712 bits
2 data member insertions:
'const ssl3DHParams* sslSocketStr::dheParams', at offset 4064 (in bits) at sslimpl.h:1254:1
'ssl3KeyPair* sslSocketStr::dheKeyPair', at offset 4096 (in bits) at sslimpl.h:1255:1
44 data member changes (5 filtered):
type of 'sslOptions sslSocketStr::opt' changed:
underlying type 'struct sslOptionsStr' at sslimpl.h:316:1 changed:
2 data member insertions:
'unsigned int sslOptionsStr::enableExtendedMS', at offset 96 (in bits) at sslimpl.h:349:1
'unsigned int sslOptionsStr::enableServerDhe', at offset 96 (in bits) at sslimpl.h:348:1
'SSLAuthCertificate sslSocketStr::authCertificate' offset changed from 4064 to 4128 (in bits)
'void* sslSocketStr::authCertificateArg' offset changed from 4096 to 4160 (in bits)
'SSLGetClientAuthData sslSocketStr::getClientAuthData' offset changed from 4128 to 4192 (in bits)
'void* sslSocketStr::getClientAuthDataArg' offset changed from 4160 to 4224 (in bits)
'SSLSNISocketConfig sslSocketStr::sniSocketConfig' offset changed from 4192 to 4256 (in bits)
'void* sslSocketStr::sniSocketConfigArg' offset changed from 4224 to 4288 (in bits)
'SSLBadCertHandler sslSocketStr::handleBadCert' offset changed from 4256 to 4320 (in bits)
'void* sslSocketStr::badCertArg' offset changed from 4288 to 4352 (in bits)
'SSLHandshakeCallback sslSocketStr::handshakeCallback' offset changed from 4320 to 4384 (in bits)
'void* sslSocketStr::handshakeCallbackData' offset changed from 4352 to 4416 (in bits)
'SSLCanFalseStartCallback sslSocketStr::canFalseStartCallback' offset changed from 4384 to 4448 (in bits)
'void* sslSocketStr::canFalseStartCallbackData' offset changed from 4416 to 4480 (in bits)
'void* sslSocketStr::pkcs11PinArg' offset changed from 4448 to 4512 (in bits)
'SSLNextProtoCallback sslSocketStr::nextProtoCallback' offset changed from 4480 to 4544 (in bits)
'void* sslSocketStr::nextProtoArg' offset changed from 4512 to 4576 (in bits)
'PRIntervalTime sslSocketStr::rTimeout' offset changed from 4544 to 4608 (in bits)
'PRIntervalTime sslSocketStr::wTimeout' offset changed from 4576 to 4640 (in bits)
'PRIntervalTime sslSocketStr::cTimeout' offset changed from 4608 to 4672 (in bits)
'PRLock* sslSocketStr::recvLock' offset changed from 4640 to 4704 (in bits)
'PRLock* sslSocketStr::sendLock' offset changed from 4672 to 4736 (in bits)
'PRMonitor* sslSocketStr::recvBufLock' offset changed from 4704 to 4768 (in bits)
'PRMonitor* sslSocketStr::xmitBufLock' offset changed from 4736 to 4800 (in bits)
'PRMonitor* sslSocketStr::firstHandshakeLock' offset changed from 4768 to 4832 (in bits)
'PRMonitor* sslSocketStr::ssl3HandshakeLock' offset changed from 4800 to 4864 (in bits)
'NSSRWLock* sslSocketStr::specLock' offset changed from 4832 to 4896 (in bits)
'CERTCertDBHandle* sslSocketStr::dbHandle' offset changed from 4864 to 4928 (in bits)
'PRThread* sslSocketStr::writerThread' offset changed from 4896 to 4960 (in bits)
'PRUint16 sslSocketStr::shutdownHow' offset changed from 4928 to 4992 (in bits)
'PRUint16 sslSocketStr::allowedByPolicy' offset changed from 4944 to 5008 (in bits)
'PRUint16 sslSocketStr::maybeAllowedByPolicy' offset changed from 4960 to 5024 (in bits)
'PRUint16 sslSocketStr::chosenPreference' offset changed from 4976 to 5040 (in bits)
'sslHandshakingType sslSocketStr::handshaking' offset changed from 4992 to 5056 (in bits)
'sslGather sslSocketStr::gs' offset changed from 5024 to 5088 (in bits)
'sslBuffer sslSocketStr::saveBuf' offset changed from 5792 to 5856 (in bits)
'sslBuffer sslSocketStr::pendingBuf' offset changed from 5888 to 5952 (in bits)
'sslServerCerts sslSocketStr::serverCerts[5]' offset changed from 5984 to 6048 (in bits)
'SECItemArray* sslSocketStr::certStatusArray[5]' offset changed from 6624 to 6688 (in bits)
type of 'ssl3CipherSuiteCfg sslSocketStr::cipherSuites[61]' changed:
type name changed from 'ssl3CipherSuiteCfg[61]' to 'ssl3CipherSuiteCfg[64]'
array type size changed from 1952 to 2048 bits:
array type subrange 1 changed length from 61 to 64
and offset changed from 6784 to 6848 (in bits)
'ssl3KeyPair* sslSocketStr::ephemeralECDHKeyPair' offset changed from 8736 to 8896 (in bits)
type of 'ssl3State sslSocketStr::ssl3' changed:
underlying type 'struct ssl3StateStr' at sslimpl.h:970:1 changed:
type size changed from 80192 to 81344 bits
5 data member insertions:
'PRUint16 ssl3StateStr::numDHEGroups', at offset 80224 (in bits) at sslimpl.h:1013:1
'SSLDHEGroupType* ssl3StateStr::dheGroups', at offset 80256 (in bits) at sslimpl.h:1014:1
'PRBool ssl3StateStr::dheWeakGroupEnabled', at offset 80288 (in bits) at sslimpl.h:1015:1
'SSLSignatureAndHashAlg ssl3StateStr::signatureAlgorithms[15]', at offset 80320 (in bits) at sslimpl.h:1019:1
'unsigned int ssl3StateStr::signatureAlgorithmCount', at offset 81280 (in bits) at sslimpl.h:1020:1
9 data member changes:
type of 'SSL3HandshakeState ssl3StateStr::hs' changed:
underlying type 'struct SSL3HandshakeStateStr' at sslimpl.h:852:1 changed:
type size changed from 3040 to 3072 bits
1 data member insertion:
'PRUint32 SSL3HandshakeStateStr::preliminaryInfo', at offset 2304 (in bits) at sslimpl.h:930:1
15 data member changes (1 filtered):
type of 'const ssl3KEADef* SSL3HandshakeStateStr::kea_def' changed:
in pointed to type 'const ssl3KEADef':
in unqualified underlying type 'typedef ssl3KEADef' at sslimpl.h:757:1:
underlying type 'struct __anonymous_struct__' at sslimpl.h:744:1 changed:
1 data member change:
type of 'int __anonymous_struct__::key_size_limit' changed:
type name changed from 'int' to 'unsigned int'
type of 'SSL3SignatureAndHashAlgorithm* SSL3HandshakeStateStr::clientSigAndHash' changed:
in pointed to type 'typedef SSL3SignatureAndHashAlgorithm' at sslt.h:86:1:
underlying type 'struct __anonymous_struct__' at sslt.h:83:1 changed:
type name changed from '__anonymous_struct__' to 'SSLSignatureAndHashAlgStr'
2 data member changes:
type of 'SECOidTag __anonymous_struct__::hashAlg' changed:
underlying type 'enum __anonymous_enum__' changed:
319 enumerator deletions:
'__anonymous_enum__::SEC_OID_UNKNOWN' value '0'
'__anonymous_enum__::SEC_OID_MD2' value '1'
'__anonymous_enum__::SEC_OID_MD4' value '2'
'__anonymous_enum__::SEC_OID_MD5' value '3'
'__anonymous_enum__::SEC_OID_SHA1' value '4'
'__anonymous_enum__::SEC_OID_RC2_CBC' value '5'
'__anonymous_enum__::SEC_OID_RC4' value '6'
'__anonymous_enum__::SEC_OID_DES_EDE3_CBC' value '7'
'__anonymous_enum__::SEC_OID_RC5_CBC_PAD' value '8'
'__anonymous_enum__::SEC_OID_DES_ECB' value '9'
'__anonymous_enum__::SEC_OID_DES_CBC' value '10'
'__anonymous_enum__::SEC_OID_DES_OFB' value '11'
'__anonymous_enum__::SEC_OID_DES_CFB' value '12'
'__anonymous_enum__::SEC_OID_DES_MAC' value '13'
'__anonymous_enum__::SEC_OID_DES_EDE' value '14'
'__anonymous_enum__::SEC_OID_ISO_SHA_WITH_RSA_SIGNATURE' value '15'
'__anonymous_enum__::SEC_OID_PKCS1_RSA_ENCRYPTION' value '16'
'__anonymous_enum__::SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION' value '17'
'__anonymous_enum__::SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION' value '18'
'__anonymous_enum__::SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION' value '19'
'__anonymous_enum__::SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION' value '20'
'__anonymous_enum__::SEC_OID_PKCS5_PBE_WITH_MD2_AND_DES_CBC' value '21'
'__anonymous_enum__::SEC_OID_PKCS5_PBE_WITH_MD5_AND_DES_CBC' value '22'
'__anonymous_enum__::SEC_OID_PKCS5_PBE_WITH_SHA1_AND_DES_CBC' value '23'
'__anonymous_enum__::SEC_OID_PKCS7' value '24'
'__anonymous_enum__::SEC_OID_PKCS7_DATA' value '25'
'__anonymous_enum__::SEC_OID_PKCS7_SIGNED_DATA' value '26'
'__anonymous_enum__::SEC_OID_PKCS7_ENVELOPED_DATA' value '27'
'__anonymous_enum__::SEC_OID_PKCS7_SIGNED_ENVELOPED_DATA' value '28'
'__anonymous_enum__::SEC_OID_PKCS7_DIGESTED_DATA' value '29'
'__anonymous_enum__::SEC_OID_PKCS7_ENCRYPTED_DATA' value '30'
'__anonymous_enum__::SEC_OID_PKCS9_EMAIL_ADDRESS' value '31'
'__anonymous_enum__::SEC_OID_PKCS9_UNSTRUCTURED_NAME' value '32'
'__anonymous_enum__::SEC_OID_PKCS9_CONTENT_TYPE' value '33'
'__anonymous_enum__::SEC_OID_PKCS9_MESSAGE_DIGEST' value '34'
'__anonymous_enum__::SEC_OID_PKCS9_SIGNING_TIME' value '35'
'__anonymous_enum__::SEC_OID_PKCS9_COUNTER_SIGNATURE' value '36'
'__anonymous_enum__::SEC_OID_PKCS9_CHALLENGE_PASSWORD' value '37'
'__anonymous_enum__::SEC_OID_PKCS9_UNSTRUCTURED_ADDRESS' value '38'
'__anonymous_enum__::SEC_OID_PKCS9_EXTENDED_CERTIFICATE_ATTRIBUTES' value '39'
'__anonymous_enum__::SEC_OID_PKCS9_SMIME_CAPABILITIES' value '40'
'__anonymous_enum__::SEC_OID_AVA_COMMON_NAME' value '41'
'__anonymous_enum__::SEC_OID_AVA_COUNTRY_NAME' value '42'
'__anonymous_enum__::SEC_OID_AVA_LOCALITY' value '43'
'__anonymous_enum__::SEC_OID_AVA_STATE_OR_PROVINCE' value '44'
'__anonymous_enum__::SEC_OID_AVA_ORGANIZATION_NAME' value '45'
'__anonymous_enum__::SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME' value '46'
'__anonymous_enum__::SEC_OID_AVA_DN_QUALIFIER' value '47'
'__anonymous_enum__::SEC_OID_AVA_DC' value '48'
'__anonymous_enum__::SEC_OID_NS_TYPE_GIF' value '49'
'__anonymous_enum__::SEC_OID_NS_TYPE_JPEG' value '50'
'__anonymous_enum__::SEC_OID_NS_TYPE_URL' value '51'
'__anonymous_enum__::SEC_OID_NS_TYPE_HTML' value '52'
'__anonymous_enum__::SEC_OID_NS_TYPE_CERT_SEQUENCE' value '53'
'__anonymous_enum__::SEC_OID_MISSI_KEA_DSS_OLD' value '54'
'__anonymous_enum__::SEC_OID_MISSI_DSS_OLD' value '55'
'__anonymous_enum__::SEC_OID_MISSI_KEA_DSS' value '56'
'__anonymous_enum__::SEC_OID_MISSI_DSS' value '57'
'__anonymous_enum__::SEC_OID_MISSI_KEA' value '58'
'__anonymous_enum__::SEC_OID_MISSI_ALT_KEA' value '59'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_NETSCAPE_OK' value '60'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_ISSUER_LOGO' value '61'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_SUBJECT_LOGO' value '62'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_CERT_TYPE' value '63'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_BASE_URL' value '64'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_REVOCATION_URL' value '65'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL' value '66'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_CA_CRL_URL' value '67'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_CA_CERT_URL' value '68'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_CERT_RENEWAL_URL' value '69'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_CA_POLICY_URL' value '70'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_HOMEPAGE_URL' value '71'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_ENTITY_LOGO' value '72'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_USER_PICTURE' value '73'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_SSL_SERVER_NAME' value '74'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_COMMENT' value '75'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_LOST_PASSWORD_URL' value '76'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_CERT_RENEWAL_TIME' value '77'
'__anonymous_enum__::SEC_OID_NS_KEY_USAGE_GOVT_APPROVED' value '78'
'__anonymous_enum__::SEC_OID_X509_SUBJECT_DIRECTORY_ATTR' value '79'
'__anonymous_enum__::SEC_OID_X509_SUBJECT_KEY_ID' value '80'
'__anonymous_enum__::SEC_OID_X509_KEY_USAGE' value '81'
'__anonymous_enum__::SEC_OID_X509_PRIVATE_KEY_USAGE_PERIOD' value '82'
'__anonymous_enum__::SEC_OID_X509_SUBJECT_ALT_NAME' value '83'
'__anonymous_enum__::SEC_OID_X509_ISSUER_ALT_NAME' value '84'
'__anonymous_enum__::SEC_OID_X509_BASIC_CONSTRAINTS' value '85'
'__anonymous_enum__::SEC_OID_X509_NAME_CONSTRAINTS' value '86'
'__anonymous_enum__::SEC_OID_X509_CRL_DIST_POINTS' value '87'
'__anonymous_enum__::SEC_OID_X509_CERTIFICATE_POLICIES' value '88'
'__anonymous_enum__::SEC_OID_X509_POLICY_MAPPINGS' value '89'
'__anonymous_enum__::SEC_OID_X509_POLICY_CONSTRAINTS' value '90'
'__anonymous_enum__::SEC_OID_X509_AUTH_KEY_ID' value '91'
'__anonymous_enum__::SEC_OID_X509_EXT_KEY_USAGE' value '92'
'__anonymous_enum__::SEC_OID_X509_AUTH_INFO_ACCESS' value '93'
'__anonymous_enum__::SEC_OID_X509_CRL_NUMBER' value '94'
'__anonymous_enum__::SEC_OID_X509_REASON_CODE' value '95'
'__anonymous_enum__::SEC_OID_X509_INVALID_DATE' value '96'
'__anonymous_enum__::SEC_OID_X500_RSA_ENCRYPTION' value '97'
'__anonymous_enum__::SEC_OID_RFC1274_UID' value '98'
'__anonymous_enum__::SEC_OID_RFC1274_MAIL' value '99'
'__anonymous_enum__::SEC_OID_PKCS12' value '100'
'__anonymous_enum__::SEC_OID_PKCS12_MODE_IDS' value '101'
'__anonymous_enum__::SEC_OID_PKCS12_ESPVK_IDS' value '102'
'__anonymous_enum__::SEC_OID_PKCS12_BAG_IDS' value '103'
'__anonymous_enum__::SEC_OID_PKCS12_CERT_BAG_IDS' value '104'
'__anonymous_enum__::SEC_OID_PKCS12_OIDS' value '105'
'__anonymous_enum__::SEC_OID_PKCS12_PBE_IDS' value '106'
'__anonymous_enum__::SEC_OID_PKCS12_SIGNATURE_IDS' value '107'
'__anonymous_enum__::SEC_OID_PKCS12_ENVELOPING_IDS' value '108'
'__anonymous_enum__::SEC_OID_PKCS12_PKCS8_KEY_SHROUDING' value '109'
'__anonymous_enum__::SEC_OID_PKCS12_KEY_BAG_ID' value '110'
'__anonymous_enum__::SEC_OID_PKCS12_CERT_AND_CRL_BAG_ID' value '111'
'__anonymous_enum__::SEC_OID_PKCS12_SECRET_BAG_ID' value '112'
'__anonymous_enum__::SEC_OID_PKCS12_X509_CERT_CRL_BAG' value '113'
'__anonymous_enum__::SEC_OID_PKCS12_SDSI_CERT_BAG' value '114'
'__anonymous_enum__::SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC4' value '115'
'__anonymous_enum__::SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC4' value '116'
'__anonymous_enum__::SEC_OID_PKCS12_PBE_WITH_SHA1_AND_TRIPLE_DES_CBC' value '117'
'__anonymous_enum__::SEC_OID_PKCS12_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC' value '118'
'__anonymous_enum__::SEC_OID_PKCS12_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC' value '119'
'__anonymous_enum__::SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_128_BIT_RC4' value '120'
'__anonymous_enum__::SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_40_BIT_RC4' value '121'
'__anonymous_enum__::SEC_OID_PKCS12_RSA_ENCRYPTION_WITH_TRIPLE_DES' value '122'
'__anonymous_enum__::SEC_OID_PKCS12_RSA_SIGNATURE_WITH_SHA1_DIGEST' value '123'
'__anonymous_enum__::SEC_OID_ANSIX9_DSA_SIGNATURE' value '124'
'__anonymous_enum__::SEC_OID_ANSIX9_DSA_SIGNATURE_WITH_SHA1_DIGEST' value '125'
'__anonymous_enum__::SEC_OID_BOGUS_DSA_SIGNATURE_WITH_SHA1_DIGEST' value '126'
'__anonymous_enum__::SEC_OID_VERISIGN_USER_NOTICES' value '127'
'__anonymous_enum__::SEC_OID_PKIX_CPS_POINTER_QUALIFIER' value '128'
'__anonymous_enum__::SEC_OID_PKIX_USER_NOTICE_QUALIFIER' value '129'
'__anonymous_enum__::SEC_OID_PKIX_OCSP' value '130'
'__anonymous_enum__::SEC_OID_PKIX_OCSP_BASIC_RESPONSE' value '131'
'__anonymous_enum__::SEC_OID_PKIX_OCSP_NONCE' value '132'
'__anonymous_enum__::SEC_OID_PKIX_OCSP_CRL' value '133'
'__anonymous_enum__::SEC_OID_PKIX_OCSP_RESPONSE' value '134'
'__anonymous_enum__::SEC_OID_PKIX_OCSP_NO_CHECK' value '135'
'__anonymous_enum__::SEC_OID_PKIX_OCSP_ARCHIVE_CUTOFF' value '136'
'__anonymous_enum__::SEC_OID_PKIX_OCSP_SERVICE_LOCATOR' value '137'
'__anonymous_enum__::SEC_OID_PKIX_REGCTRL_REGTOKEN' value '138'
'__anonymous_enum__::SEC_OID_PKIX_REGCTRL_AUTHENTICATOR' value '139'
'__anonymous_enum__::SEC_OID_PKIX_REGCTRL_PKIPUBINFO' value '140'
'__anonymous_enum__::SEC_OID_PKIX_REGCTRL_PKI_ARCH_OPTIONS' value '141'
'__anonymous_enum__::SEC_OID_PKIX_REGCTRL_OLD_CERT_ID' value '142'
'__anonymous_enum__::SEC_OID_PKIX_REGCTRL_PROTOCOL_ENC_KEY' value '143'
'__anonymous_enum__::SEC_OID_PKIX_REGINFO_UTF8_PAIRS' value '144'
'__anonymous_enum__::SEC_OID_PKIX_REGINFO_CERT_REQUEST' value '145'
'__anonymous_enum__::SEC_OID_EXT_KEY_USAGE_SERVER_AUTH' value '146'
'__anonymous_enum__::SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH' value '147'
'__anonymous_enum__::SEC_OID_EXT_KEY_USAGE_CODE_SIGN' value '148'
'__anonymous_enum__::SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT' value '149'
'__anonymous_enum__::SEC_OID_EXT_KEY_USAGE_TIME_STAMP' value '150'
'__anonymous_enum__::SEC_OID_OCSP_RESPONDER' value '151'
'__anonymous_enum__::SEC_OID_NETSCAPE_SMIME_KEA' value '152'
'__anonymous_enum__::SEC_OID_FORTEZZA_SKIPJACK' value '153'
'__anonymous_enum__::SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC4' value '154'
'__anonymous_enum__::SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC4' value '155'
'__anonymous_enum__::SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_3KEY_TRIPLE_DES_CBC' value '156'
'__anonymous_enum__::SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_2KEY_TRIPLE_DES_CBC' value '157'
'__anonymous_enum__::SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_128_BIT_RC2_CBC' value '158'
'__anonymous_enum__::SEC_OID_PKCS12_V2_PBE_WITH_SHA1_AND_40_BIT_RC2_CBC' value '159'
'__anonymous_enum__::SEC_OID_PKCS12_SAFE_CONTENTS_ID' value '160'
'__anonymous_enum__::SEC_OID_PKCS12_PKCS8_SHROUDED_KEY_BAG_ID' value '161'
'__anonymous_enum__::SEC_OID_PKCS12_V1_KEY_BAG_ID' value '162'
'__anonymous_enum__::SEC_OID_PKCS12_V1_PKCS8_SHROUDED_KEY_BAG_ID' value '163'
'__anonymous_enum__::SEC_OID_PKCS12_V1_CERT_BAG_ID' value '164'
'__anonymous_enum__::SEC_OID_PKCS12_V1_CRL_BAG_ID' value '165'
'__anonymous_enum__::SEC_OID_PKCS12_V1_SECRET_BAG_ID' value '166'
'__anonymous_enum__::SEC_OID_PKCS12_V1_SAFE_CONTENTS_BAG_ID' value '167'
'__anonymous_enum__::SEC_OID_PKCS9_X509_CERT' value '168'
'__anonymous_enum__::SEC_OID_PKCS9_SDSI_CERT' value '169'
'__anonymous_enum__::SEC_OID_PKCS9_X509_CRL' value '170'
'__anonymous_enum__::SEC_OID_PKCS9_FRIENDLY_NAME' value '171'
'__anonymous_enum__::SEC_OID_PKCS9_LOCAL_KEY_ID' value '172'
'__anonymous_enum__::SEC_OID_BOGUS_KEY_USAGE' value '173'
'__anonymous_enum__::SEC_OID_X942_DIFFIE_HELMAN_KEY' value '174'
'__anonymous_enum__::SEC_OID_NETSCAPE_NICKNAME' value '175'
'__anonymous_enum__::SEC_OID_NETSCAPE_RECOVERY_REQUEST' value '176'
'__anonymous_enum__::SEC_OID_CERT_RENEWAL_LOCATOR' value '177'
'__anonymous_enum__::SEC_OID_NS_CERT_EXT_SCOPE_OF_USE' value '178'
'__anonymous_enum__::SEC_OID_CMS_EPHEMERAL_STATIC_DIFFIE_HELLMAN' value '179'
'__anonymous_enum__::SEC_OID_CMS_3DES_KEY_WRAP' value '180'
'__anonymous_enum__::SEC_OID_CMS_RC2_KEY_WRAP' value '181'
'__anonymous_enum__::SEC_OID_SMIME_ENCRYPTION_KEY_PREFERENCE' value '182'
'__anonymous_enum__::SEC_OID_AES_128_ECB' value '183'
'__anonymous_enum__::SEC_OID_AES_128_CBC' value '184'
'__anonymous_enum__::SEC_OID_AES_192_ECB' value '185'
'__anonymous_enum__::SEC_OID_AES_192_CBC' value '186'
'__anonymous_enum__::SEC_OID_AES_256_ECB' value '187'
'__anonymous_enum__::SEC_OID_AES_256_CBC' value '188'
'__anonymous_enum__::SEC_OID_SDN702_DSA_SIGNATURE' value '189'
'__anonymous_enum__::SEC_OID_MS_SMIME_ENCRYPTION_KEY_PREFERENCE' value '190'
'__anonymous_enum__::SEC_OID_SHA256' value '191'
'__anonymous_enum__::SEC_OID_SHA384' value '192'
'__anonymous_enum__::SEC_OID_SHA512' value '193'
'__anonymous_enum__::SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION' value '194'
'__anonymous_enum__::SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION' value '195'
'__anonymous_enum__::SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION' value '196'
'__anonymous_enum__::SEC_OID_AES_128_KEY_WRAP' value '197'
'__anonymous_enum__::SEC_OID_AES_192_KEY_WRAP' value '198'
'__anonymous_enum__::SEC_OID_AES_256_KEY_WRAP' value '199'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_PUBLIC_KEY' value '200'
'__anonymous_enum__::SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE' value '201'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_PRIME192V1' value '202'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_PRIME192V2' value '203'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_PRIME192V3' value '204'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_PRIME239V1' value '205'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_PRIME239V2' value '206'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_PRIME239V3' value '207'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_PRIME256V1' value '208'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP112R1' value '209'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP112R2' value '210'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP128R1' value '211'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP128R2' value '212'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP160K1' value '213'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP160R1' value '214'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP160R2' value '215'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP192K1' value '216'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP224K1' value '217'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP224R1' value '218'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP256K1' value '219'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP384R1' value '220'
'__anonymous_enum__::SEC_OID_SECG_EC_SECP521R1' value '221'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2PNB163V1' value '222'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2PNB163V2' value '223'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2PNB163V3' value '224'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2PNB176V1' value '225'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2TNB191V1' value '226'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2TNB191V2' value '227'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2TNB191V3' value '228'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2ONB191V4' value '229'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2ONB191V5' value '230'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2PNB208W1' value '231'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2TNB239V1' value '232'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2TNB239V2' value '233'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2TNB239V3' value '234'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2ONB239V4' value '235'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2ONB239V5' value '236'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2PNB272W1' value '237'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2PNB304W1' value '238'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2TNB359V1' value '239'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2PNB368W1' value '240'
'__anonymous_enum__::SEC_OID_ANSIX962_EC_C2TNB431R1' value '241'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT113R1' value '242'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT113R2' value '243'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT131R1' value '244'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT131R2' value '245'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT163K1' value '246'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT163R1' value '247'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT163R2' value '248'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT193R1' value '249'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT193R2' value '250'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT233K1' value '251'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT233R1' value '252'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT239K1' value '253'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT283K1' value '254'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT283R1' value '255'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT409K1' value '256'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT409R1' value '257'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT571K1' value '258'
'__anonymous_enum__::SEC_OID_SECG_EC_SECT571R1' value '259'
'__anonymous_enum__::SEC_OID_NETSCAPE_AOLSCREENNAME' value '260'
'__anonymous_enum__::SEC_OID_AVA_SURNAME' value '261'
'__anonymous_enum__::SEC_OID_AVA_SERIAL_NUMBER' value '262'
'__anonymous_enum__::SEC_OID_AVA_STREET_ADDRESS' value '263'
'__anonymous_enum__::SEC_OID_AVA_TITLE' value '264'
'__anonymous_enum__::SEC_OID_AVA_POSTAL_ADDRESS' value '265'
'__anonymous_enum__::SEC_OID_AVA_POSTAL_CODE' value '266'
'__anonymous_enum__::SEC_OID_AVA_POST_OFFICE_BOX' value '267'
'__anonymous_enum__::SEC_OID_AVA_GIVEN_NAME' value '268'
'__anonymous_enum__::SEC_OID_AVA_INITIALS' value '269'
'__anonymous_enum__::SEC_OID_AVA_GENERATION_QUALIFIER' value '270'
'__anonymous_enum__::SEC_OID_AVA_HOUSE_IDENTIFIER' value '271'
'__anonymous_enum__::SEC_OID_AVA_PSEUDONYM' value '272'
'__anonymous_enum__::SEC_OID_PKIX_CA_ISSUERS' value '273'
'__anonymous_enum__::SEC_OID_PKCS9_EXTENSION_REQUEST' value '274'
'__anonymous_enum__::SEC_OID_ANSIX962_ECDSA_SIGNATURE_RECOMMENDED_DIGEST' value '275'
'__anonymous_enum__::SEC_OID_ANSIX962_ECDSA_SIGNATURE_SPECIFIED_DIGEST' value '276'
'__anonymous_enum__::SEC_OID_ANSIX962_ECDSA_SHA224_SIGNATURE' value '277'
'__anonymous_enum__::SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE' value '278'
'__anonymous_enum__::SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE' value '279'
'__anonymous_enum__::SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE' value '280'
'__anonymous_enum__::SEC_OID_X509_HOLD_INSTRUCTION_CODE' value '281'
'__anonymous_enum__::SEC_OID_X509_DELTA_CRL_INDICATOR' value '282'
'__anonymous_enum__::SEC_OID_X509_ISSUING_DISTRIBUTION_POINT' value '283'
'__anonymous_enum__::SEC_OID_X509_CERT_ISSUER' value '284'
'__anonymous_enum__::SEC_OID_X509_FRESHEST_CRL' value '285'
'__anonymous_enum__::SEC_OID_X509_INHIBIT_ANY_POLICY' value '286'
'__anonymous_enum__::SEC_OID_X509_SUBJECT_INFO_ACCESS' value '287'
'__anonymous_enum__::SEC_OID_CAMELLIA_128_CBC' value '288'
'__anonymous_enum__::SEC_OID_CAMELLIA_192_CBC' value '289'
'__anonymous_enum__::SEC_OID_CAMELLIA_256_CBC' value '290'
'__anonymous_enum__::SEC_OID_PKCS5_PBKDF2' value '291'
'__anonymous_enum__::SEC_OID_PKCS5_PBES2' value '292'
'__anonymous_enum__::SEC_OID_PKCS5_PBMAC1' value '293'
'__anonymous_enum__::SEC_OID_HMAC_SHA1' value '294'
'__anonymous_enum__::SEC_OID_HMAC_SHA224' value '295'
'__anonymous_enum__::SEC_OID_HMAC_SHA256' value '296'
'__anonymous_enum__::SEC_OID_HMAC_SHA384' value '297'
'__anonymous_enum__::SEC_OID_HMAC_SHA512' value '298'
'__anonymous_enum__::SEC_OID_PKIX_TIMESTAMPING' value '299'
'__anonymous_enum__::SEC_OID_PKIX_CA_REPOSITORY' value '300'
'__anonymous_enum__::SEC_OID_ISO_SHA1_WITH_RSA_SIGNATURE' value '301'
'__anonymous_enum__::SEC_OID_SEED_CBC' value '302'
'__anonymous_enum__::SEC_OID_X509_ANY_POLICY' value '303'
'__anonymous_enum__::SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION' value '304'
'__anonymous_enum__::SEC_OID_PKCS1_MGF1' value '305'
'__anonymous_enum__::SEC_OID_PKCS1_PSPECIFIED' value '306'
'__anonymous_enum__::SEC_OID_PKCS1_RSA_PSS_SIGNATURE' value '307'
'__anonymous_enum__::SEC_OID_PKCS1_SHA224_WITH_RSA_ENCRYPTION' value '308'
'__anonymous_enum__::SEC_OID_SHA224' value '309'
'__anonymous_enum__::SEC_OID_EV_INCORPORATION_LOCALITY' value '310'
'__anonymous_enum__::SEC_OID_EV_INCORPORATION_STATE' value '311'
'__anonymous_enum__::SEC_OID_EV_INCORPORATION_COUNTRY' value '312'
'__anonymous_enum__::SEC_OID_BUSINESS_CATEGORY' value '313'
'__anonymous_enum__::SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA224_DIGEST' value '314'
'__anonymous_enum__::SEC_OID_NIST_DSA_SIGNATURE_WITH_SHA256_DIGEST' value '315'
'__anonymous_enum__::SEC_OID_MS_EXT_KEY_USAGE_CTL_SIGNING' value '316'
'__anonymous_enum__::SEC_OID_AVA_NAME' value '317'
'__anonymous_enum__::SEC_OID_TOTAL' value '318'
7 enumerator insertions:
'__anonymous_enum__::ssl_hash_none' value '0'
'__anonymous_enum__::ssl_hash_md5' value '1'
'__anonymous_enum__::ssl_hash_sha1' value '2'
'__anonymous_enum__::ssl_hash_sha224' value '3'
'__anonymous_enum__::ssl_hash_sha256' value '4'
'__anonymous_enum__::ssl_hash_sha384' value '5'
'__anonymous_enum__::ssl_hash_sha512' value '6'
type of 'TLSSignatureAlgorithm __anonymous_struct__::sigAlg' changed:
underlying type 'enum __anonymous_enum__' changed:
3 enumerator deletions:
'__anonymous_enum__::tls_sig_rsa' value '1'
'__anonymous_enum__::tls_sig_dsa' value '2'
'__anonymous_enum__::tls_sig_ecdsa' value '3'
4 enumerator insertions:
'__anonymous_enum__::ssl_sign_null' value '0'
'__anonymous_enum__::ssl_sign_rsa' value '1'
'__anonymous_enum__::ssl_sign_dsa' value '2'
'__anonymous_enum__::ssl_sign_ecdsa' value '3'
and offset changed from 2304 to 2336 (in bits)
'unsigned int SSL3HandshakeStateStr::numClientSigAndHash' offset changed from 2336 to 2368 (in bits)
'PRUint16 SSL3HandshakeStateStr::sendMessageSeq' offset changed from 2368 to 2400 (in bits)
'PRCList SSL3HandshakeStateStr::lastMessageFlight' offset changed from 2400 to 2432 (in bits)
'PRUint16 SSL3HandshakeStateStr::maxMessageSent' offset changed from 2464 to 2496 (in bits)
'PRUint16 SSL3HandshakeStateStr::recvMessageSeq' offset changed from 2480 to 2512 (in bits)
'sslBuffer SSL3HandshakeStateStr::recvdFragments' offset changed from 2496 to 2528 (in bits)
'PRInt32 SSL3HandshakeStateStr::recvdHighWater' offset changed from 2592 to 2624 (in bits)
'unsigned char SSL3HandshakeStateStr::cookie[32]' offset changed from 2624 to 2656 (in bits)
'unsigned char SSL3HandshakeStateStr::cookieLen' offset changed from 2880 to 2912 (in bits)
'PRIntervalTime SSL3HandshakeStateStr::rtTimerStarted' offset changed from 2912 to 2944 (in bits)
'DTLSTimerCb SSL3HandshakeStateStr::rtTimerCb' offset changed from 2944 to 2976 (in bits)
'PRUint32 SSL3HandshakeStateStr::rtTimeoutMs' offset changed from 2976 to 3008 (in bits)
'PRUint32 SSL3HandshakeStateStr::rtRetries' offset changed from 3008 to 3040 (in bits)
'ssl3CipherSpec ssl3StateStr::specs[2]' offset changed from 3456 to 3520 (in bits)
'SECItem ssl3StateStr::nextProto' offset changed from 79872 to 79936 (in bits)
'SSLNextProtoState ssl3StateStr::nextProtoState' offset changed from 79968 to 80032 (in bits)
'PRUint16 ssl3StateStr::mtu' offset changed from 80000 to 80064 (in bits)
'PRUint16 ssl3StateStr::dtlsSRTPCiphers[4]' offset changed from 80016 to 80080 (in bits)
'PRUint16 ssl3StateStr::dtlsSRTPCipherCount' offset changed from 80080 to 80144 (in bits)
'PRUint16 ssl3StateStr::dtlsSRTPCipherSuite' offset changed from 80096 to 80160 (in bits)
'PRBool ssl3StateStr::fatalAlertSent' offset changed from 80128 to 80192 (in bits)
and offset changed from 8768 to 8960 (in bits)
'PRBool sslSocketStr::statelessResume' offset changed from 88960 to 90304 (in bits)
type of 'TLSExtensionData sslSocketStr::xtnData' changed:
underlying type 'struct TLSExtensionDataStr' at sslimpl.h:807:1 changed:
type size changed from 1248 to 1344 bits
10 data member changes:
type of 'ssl3HelloExtensionSender TLSExtensionDataStr::serverSenders[11]' changed:
type name changed from 'ssl3HelloExtensionSender[11]' to 'ssl3HelloExtensionSender[12]'
array type size changed from 704 to 768 bits:
array type subrange 1 changed length from 11 to 12
'PRUint16 TLSExtensionDataStr::numAdvertised' offset changed from 704 to 768 (in bits)
'PRUint16 TLSExtensionDataStr::numNegotiated' offset changed from 720 to 784 (in bits)
type of 'PRUint16 TLSExtensionDataStr::advertised[11]' changed:
type name changed from 'PRUint16[11]' to 'PRUint16[12]'
array type size changed from 176 to 192 bits:
array type subrange 1 changed length from 11 to 12
and offset changed from 736 to 800 (in bits)
'PRUint16 TLSExtensionDataStr::negotiated[11]' offset changed from 912 to 992 (in bits)
'PRBool TLSExtensionDataStr::ticketTimestampVerified' offset changed from 1088 to 1184 (in bits)
'PRBool TLSExtensionDataStr::emptySessionTicket' offset changed from 1120 to 1216 (in bits)
'PRBool TLSExtensionDataStr::sentSessionTicketInClientHello' offset changed from 1152 to 1248 (in bits)
'SECItem* TLSExtensionDataStr::sniNameArr' offset changed from 1184 to 1280 (in bits)
'PRUint32 TLSExtensionDataStr::sniNameArrSize' offset changed from 1216 to 1312 (in bits)
and offset changed from 88992 to 90336 (in bits)
'SSLProtocolVariant sslSocketStr::protocolVariant' offset changed from 90240 to 91680 (in bits)
1 Changed variable:
[C]'const PRUint16[68] SSL_ImplementedCiphers' was changed to 'const PRUint16[71] SSL_ImplementedCiphers' at sslenum.c:49:1:
size of symbol (in bytes) changed from 136 to 142
type of variable changed:
'const PRUint16[68]' changed to 'const PRUint16[71]'
================ end of changes of 'libssl3.so'===============
that is the version in Fedora 23 repo anyway, looks like a simple rebase will fix it, once that happens we'll be able to close it as fixed libabigail-1.0-0.rc3.2.el6 has been submitted as an update to Fedora EPEL 6. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-c0cf4b9bc1 libabigail-1.0-0.rc3.1.el7 has been submitted as an update to Fedora EPEL 7. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-3141c4dddf libabigail-1.0-0.rc3.1.fc22 has been submitted as an update to Fedora 22. https://bodhi.fedoraproject.org/updates/FEDORA-2016-627c4a9385 libabigail-1.0-0.rc3.1.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-fbf75a532f libabigail-1.0-0.rc3.1.fc22 has been pushed to the Fedora 22 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-627c4a9385 libabigail-1.0-0.rc3.1.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-fbf75a532f libabigail-1.0-0.rc3.2.el6 has been pushed to the Fedora EPEL 6 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-c0cf4b9bc1 libabigail-1.0-0.rc3.1.el7 has been pushed to the Fedora EPEL 7 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-3141c4dddf first, the libabigail-1.0-0.5.20150727gitf0d319a.fc23 is a higher n-v-r than libabigail-1.0-0.rc3.1.fc23 so dnf will not automatically update it, the new package should increase the epoch if the n-v-r is to stay the same.
Secondly, I can still reproduce the issue (no "indirect sub-type change"):
:: abipkgdiff --d1 nss-debuginfo-3.19.1-8.el6_7.ppc64.rpm --d2 nss-debuginfo-3.21.0-0.2.el6_7.ppc64.rpm nss-3.19.1-8.el6_7.ppc64.rpm nss-3.21.0-0.2.el6_7.ppc64.rpm
================ changes of 'libnss3.so'===============
Functions changes summary: 0 Removed, 0 Changed, 0 Added function
Variables changes summary: 0 Removed, 0 Changed, 0 Added variable
Function symbols changes summary: 0 Removed, 3 Added function symbols not referenced by debug info
Variable symbols changes summary: 0 Removed, 0 Added variable symbol not referenced by debug info
3 Added function symbols not referenced by debug info:
NSS_OptionGet@@NSS_3.21
NSS_OptionSet@@NSS_3.21
SECMOD_CreateModuleEx@@NSS_3.21
================ end of changes of 'libnss3.so'===============
================ changes of 'libssl3.so'===============
Functions changes summary: 0 Removed, 0 Changed, 0 Added function
Variables changes summary: 0 Removed, 1 Changed, 0 Added variable
Function symbols changes summary: 0 Removed, 6 Added function symbols not referenced by debug info
Variable symbols changes summary: 0 Removed, 0 Added variable symbol not referenced by debug info
1 Changed variable:
[C]'const PRUint16[68] SSL_ImplementedCiphers' was changed to 'const PRUint16[71] SSL_ImplementedCiphers' at sslenum.c:49:1:
size of symbol (in bytes) changed from 136 to 142
type of variable changed:
'const PRUint16[68]' changed to 'const PRUint16[71]'
6 Added function symbols not referenced by debug info:
SSL_DHEGroupPrefSet@@NSS_3.20
SSL_EnableWeakDHEPrimeGroup@@NSS_3.20
SSL_GetPreliminaryChannelInfo@@NSS_3.21
SSL_SignatureMaxCount@@NSS_3.21
SSL_SignaturePrefGet@@NSS_3.21
SSL_SignaturePrefSet@@NSS_3.21
================ end of changes of 'libssl3.so'===============
libabigail-1.0-0.8.rc3.1.el7 has been submitted as an update to Fedora EPEL 7. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-0fadb87d4a libabigail-1.0-0.8.rc3.1.fc22 has been submitted as an update to Fedora 22. https://bodhi.fedoraproject.org/updates/FEDORA-2016-004d881198 libabigail-1.0-0.rc3.2.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. libabigail-1.0-0.8.rc3.1.fc22 has been pushed to the Fedora 22 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-004d881198 libabigail-1.0-0.rc3.1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. libabigail-1.0-0.8.rc3.1.el7 has been pushed to the Fedora EPEL 7 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-0fadb87d4a I mis-read the text of this bug and mistakenly tried to reproduce the issue on ppc packages rather than ppc64. That is why I couldn't reproduce it, I guess. Now that I see the issue, I filed an upstream accordingly to https://sourceware.org/bugzilla/show_bug.cgi?id=19885. The upstream bug https://sourceware.org/bugzilla/show_bug.cgi?id=19885 is now fixed in the upstream git repository, in the master branch. The fix should be available in the next 1.0.rc4 tarball release. Thanks for reporting this issue! libabigail-1.0-0.8.rc3.1.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report. libabigail-1.0-0.8.rc3.1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. Re-opening this, as it's fixed by 1.0.rc4, not 1.0.rc3. I am going to roll out an update with 1.0.rc4 very soon. libabigail-1.0-0.8.rc4.1.fc24 has been submitted as an update to Fedora 24. https://bodhi.fedoraproject.org/updates/FEDORA-2016-3cb5659f14 libabigail-1.0-0.8.rc4.1.fc22 has been submitted as an update to Fedora 22. https://bodhi.fedoraproject.org/updates/FEDORA-2016-b306839053 libabigail-1.0-0.8.rc4.1.el7 has been submitted as an update to Fedora EPEL 7. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-256ec3c1db libabigail-1.0-0.8.rc4.1.el6 has been submitted as an update to Fedora EPEL 6. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-333925f376 libabigail-1.0-0.8.rc4.1.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-8068ed4a6e libabigail-1.0-0.8.rc4.1.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-8068ed4a6e libabigail-1.0-0.8.rc4.1.el6 has been pushed to the Fedora EPEL 6 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-333925f376 libabigail-1.0-0.8.rc4.1.el7 has been pushed to the Fedora EPEL 7 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-256ec3c1db libabigail-1.0-0.8.rc4.1.fc22 has been pushed to the Fedora 22 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-b306839053 libabigail-1.0-0.8.rc4.1.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-8068ed4a6e libabigail-1.0-0.8.rc4.1.fc24 has been pushed to the Fedora 24 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-3cb5659f14 libabigail-1.0-0.8.rc4.2.fc24 has been submitted as an update to Fedora 24. https://bodhi.fedoraproject.org/updates/FEDORA-2016-6452c52b09 libabigail-1.0-0.8.rc4.2.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-da9120400c libabigail-1.0-0.8.rc4.2.fc22 has been submitted as an update to Fedora 22. https://bodhi.fedoraproject.org/updates/FEDORA-2016-1d7143fcb2 libabigail-1.0-0.8.rc4.2.el7 has been submitted as an update to Fedora EPEL 7. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-9c45c3a0ac libabigail-1.0-0.8.rc4.2.el6 has been submitted as an update to Fedora EPEL 6. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-fa0baa05e0 libabigail-1.0-0.8.rc4.2.fc24 has been pushed to the Fedora 24 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-6452c52b09 libabigail-1.0-0.8.rc4.2.el6 has been pushed to the Fedora EPEL 6 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-fa0baa05e0 libabigail-1.0-0.8.rc4.2.el7 has been pushed to the Fedora EPEL 7 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-9c45c3a0ac libabigail-1.0-0.8.rc4.2.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-da9120400c libabigail-1.0-0.8.rc4.2.fc22 has been pushed to the Fedora 22 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-1d7143fcb2 I've tested with fc22 packages, issue seems to be fixed libabigail-1.0-0.8.rc4.2.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. libabigail-1.0-0.8.rc4.2.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report. libabigail-1.0-0.8.rc4.2.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report. libabigail-1.0-0.8.rc4.2.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report. libabigail-1.0-0.8.rc4.2.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. |
Description of problem: When abipkgdiff is run against ppc64 packages it does not report the same set of changes as when run against x86_64 versions of the same package Version-Release number of selected component (if applicable): libabigail-1.0-0.5.20150727gitf0d319a.fc23.x86_64 How reproducible: Always Steps to Reproduce: 1. abipkgdiff --d1 nss-3.19.1-8.el6_7/nss-debuginfo-3.19.1-8.el6_7.ppc64.rpm --d2 nss-3.21.0-0.2.el6_7/nss-debuginfo-3.21.0-0.2.el6_7.ppc64.rpm nss-3.19.1-8.el6_7/nss-3.19.1-8.el6_7.ppc64.rpm nss-3.21.0-0.2.el6_7/nss-3.21.0-0.2.el6_7.ppc64.rpm Actual results: No indirect sub-type change detected Expected results: 1 function with some indirect sub-type change: [C]'function SECStatus SSL_GetChannelInfo(PRFileDesc*, SSLChannelInfo*, PRUintn)' has some indirect sub-type changes: parameter 2 of type 'SSLChannelInfo*' has sub-type changes: in pointed to type 'typedef SSLChannelInfo': underlying type 'struct SSLChannelInfoStr' changed: 1 data member insertion: 'PRBool SSLChannelInfoStr::reservedNotSupported', at offset 608 (in bits)