This fixes the regression that occurs with nettle > 3.5 and dnsmasq.
diff -Nurp a/dnsmasq/crypto.c b/dnsmasq/crypto.c
--- a/dnsmasq/crypto.c 2019-07-08 10:09:06.000000000 +0000
+++ b/dnsmasq/crypto.c 2019-07-08 10:12:32.000000000 +0000
@@ -275,6 +275,10 @@ static int dnsmasq_ecdsa_verify(struct b
static struct ecc_point *key_256 = NULL, *key_384 = NULL;
static mpz_t x, y;
static struct dsa_signature *sig_struct;
+ #if NETTLE_VERSION_MAJOR == 3 && NETTLE_VERSION_MINOR < 4
+ #define nettle_get_secp_256r1() (&nettle_secp_256r1)
+ #define nettle_get_secp_384r1() (&nettle_secp_384r1)
+ #endif
if (!sig_struct)
{
@@ -294,7 +298,7 @@ static int dnsmasq_ecdsa_verify(struct b
if (!(key_256 = whine_malloc(sizeof(struct ecc_point))))
return 0;
- nettle_ecc_point_init(key_256, &nettle_get_secp_256r1);
+ nettle_ecc_point_init(key_256, nettle_get_secp_256r1());
}
key = key_256;
@@ -307,7 +311,7 @@ static int dnsmasq_ecdsa_verify(struct b
if (!(key_384 = whine_malloc(sizeof(struct ecc_point))))
return 0;
- nettle_ecc_point_init(key_384, &nettle_get_secp_384r1);
+ nettle_ecc_point_init(key_384, nettle_get_secp_384r1());
}
key = key_384;
Pinned Comments
max.bra commented on 2018-02-09 16:46 (UTC) (edited on 2019-10-18 23:13 (UTC) by max.bra)
ArchLinux Pi-hole is not officially supported by Pi-hole project. In case of bugs and malfunctions please DO NOT file a report upstream.
First of all check if the wiki (https://wiki.archlinux.org/index.php/Pi-hole) can help then ask here for assistance and tips.
When it will be excluded that the problem does not depend on ArchLinux we will file a bug upstream.