Blame SOURCES/ntp-4.2.6p5-cve-2016-1550.patch

2b78f7
diff -up ntp-4.2.6p5/libntp/a_md5encrypt.c.cve-2016-1550 ntp-4.2.6p5/libntp/a_md5encrypt.c
2b78f7
--- ntp-4.2.6p5/libntp/a_md5encrypt.c.cve-2016-1550	2016-04-27 15:11:40.955168086 +0200
2b78f7
+++ ntp-4.2.6p5/libntp/a_md5encrypt.c	2016-04-27 15:13:41.126499861 +0200
2b78f7
@@ -88,7 +88,7 @@ MD5authdecrypt(
2b78f7
 		    "MAC decrypt: MAC length error");
2b78f7
 		return (0);
2b78f7
 	}
2b78f7
-	return (!memcmp(digest, (char *)pkt + length + 4, len));
2b78f7
+	return (!CRYPTO_memcmp(digest, (char *)pkt + length + 4, len));
2b78f7
 }
2b78f7
 
2b78f7
 /*
2b78f7
diff -up ntp-4.2.6p5/sntp/crypto.c.cve-2016-1550 ntp-4.2.6p5/sntp/crypto.c
2b78f7
--- ntp-4.2.6p5/sntp/crypto.c.cve-2016-1550	2010-11-14 09:47:00.000000000 +0100
2b78f7
+++ ntp-4.2.6p5/sntp/crypto.c	2016-04-27 15:13:41.126499861 +0200
2b78f7
@@ -58,7 +58,7 @@ auth_md5(
2b78f7
 	if (!hash_len)
2b78f7
 		authentic = FALSE;
2b78f7
 	else
2b78f7
-		authentic = !memcmp(digest, pkt_data + pkt_size + 4,
2b78f7
+		authentic = !CRYPTO_memcmp(digest, pkt_data + pkt_size + 4,
2b78f7
 				    hash_len);
2b78f7
 	return authentic;
2b78f7
 }