Thankfully the fix was simple (change == to = in debian/patches/CVE-2013-0169.patch for testssl), and once fixed didn't itself indicate any new errors.
However now I'm at a loss how to test this package; my first shot, using "LD_PRELOAD=/path/to/libssl.so.0.9.8 openssl" didn't actually work. How did you test it and is there something I can do to at least smoke-test it?
It appears one of the patches added some new errors to the build logs:
...
./testssl: 128: [: SSLv3: unexpected operator
Testing AES256-SHA
Available compression methods:
1: zlib compression
TLSv1, cipher TLSv1/SSLv3 AES256-SHA, 1024 bit RSA
1 handshakes of 256 bytes done
./testssl: 128: [: SSLv3: unexpected operator
...
Thankfully the fix was simple (change == to = in debian/ patches/ CVE-2013- 0169.patch for testssl), and once fixed didn't itself indicate any new errors.
However now I'm at a loss how to test this package; my first shot, using "LD_PRELOAD= /path/to/ libssl. so.0.9. 8 openssl" didn't actually work. How did you test it and is there something I can do to at least smoke-test it?
Thanks