1 |
commit: e5c07498fec32b108bc478d8381aa8c88c65a7e7 |
2 |
Author: Sam James <sam <AT> gentoo <DOT> org> |
3 |
AuthorDate: Sat May 1 17:32:20 2021 +0000 |
4 |
Commit: Sam James <sam <AT> gentoo <DOT> org> |
5 |
CommitDate: Sat May 1 18:06:25 2021 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e5c07498 |
7 |
|
8 |
x11-misc/x11vnc: drop obsolete LibreSSL patch |
9 |
|
10 |
Signed-off-by: Sam James <sam <AT> gentoo.org> |
11 |
|
12 |
x11-misc/x11vnc/files/x11vnc-0.9.16-libressl.patch | 93 ---------------------- |
13 |
x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild | 1 - |
14 |
x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild | 1 - |
15 |
3 files changed, 95 deletions(-) |
16 |
|
17 |
diff --git a/x11-misc/x11vnc/files/x11vnc-0.9.16-libressl.patch b/x11-misc/x11vnc/files/x11vnc-0.9.16-libressl.patch |
18 |
deleted file mode 100644 |
19 |
index 8e5d8a69217..00000000000 |
20 |
--- a/x11-misc/x11vnc/files/x11vnc-0.9.16-libressl.patch |
21 |
+++ /dev/null |
22 |
@@ -1,93 +0,0 @@ |
23 |
-diff --git a/src/sslhelper.c b/src/sslhelper.c |
24 |
-index 04c2e27..fb9daa6 100644 |
25 |
---- a/src/sslhelper.c |
26 |
-+++ b/src/sslhelper.c |
27 |
-@@ -803,7 +803,7 @@ static int pem_passwd_callback(char *buf, int size, int rwflag, |
28 |
- static int crl_callback(X509_STORE_CTX *callback_ctx) { |
29 |
- const ASN1_INTEGER *revoked_serial; |
30 |
- X509_STORE_CTX *store_ctx; |
31 |
--#if OPENSSL_VERSION_NUMBER > 0x10100000L |
32 |
-+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
33 |
- X509_OBJECT *obj; |
34 |
- #else |
35 |
- X509_OBJECT obj; |
36 |
-@@ -829,7 +829,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { |
37 |
- * the current certificate in order to verify it's integrity. */ |
38 |
- store_ctx = X509_STORE_CTX_new(); |
39 |
- X509_STORE_CTX_init(store_ctx, revocation_store, NULL, NULL); |
40 |
--#if OPENSSL_VERSION_NUMBER > 0x10100000L |
41 |
-+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
42 |
- obj = X509_OBJECT_new(); |
43 |
- rc=X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, subject, obj); |
44 |
- crl = X509_OBJECT_get0_X509_CRL(obj); |
45 |
-@@ -865,7 +865,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { |
46 |
- rfbLog("Invalid signature on CRL\n"); |
47 |
- X509_STORE_CTX_set_error(callback_ctx, |
48 |
- X509_V_ERR_CRL_SIGNATURE_FAILURE); |
49 |
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L |
50 |
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
51 |
- X509_OBJECT_free(obj); |
52 |
- #else |
53 |
- X509_OBJECT_free_contents(&obj); |
54 |
-@@ -883,7 +883,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { |
55 |
- rfbLog("Found CRL has invalid nextUpdate field\n"); |
56 |
- X509_STORE_CTX_set_error(callback_ctx, |
57 |
- X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD); |
58 |
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L |
59 |
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
60 |
- X509_OBJECT_free(obj); |
61 |
- #else |
62 |
- X509_OBJECT_free_contents(&obj); |
63 |
-@@ -894,14 +894,14 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { |
64 |
- rfbLog("Found CRL is expired - " |
65 |
- "revoking all certificates until you get updated CRL\n"); |
66 |
- X509_STORE_CTX_set_error(callback_ctx, X509_V_ERR_CRL_HAS_EXPIRED); |
67 |
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L |
68 |
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
69 |
- X509_OBJECT_free(obj); |
70 |
- #else |
71 |
- X509_OBJECT_free_contents(&obj); |
72 |
- #endif |
73 |
- return 0; /* Reject connection */ |
74 |
- } |
75 |
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L |
76 |
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
77 |
- X509_OBJECT_free(obj); |
78 |
- #else |
79 |
- X509_OBJECT_free_contents(&obj); |
80 |
-@@ -912,7 +912,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { |
81 |
- * the current certificate in order to check for revocation. */ |
82 |
- store_ctx = X509_STORE_CTX_new(); |
83 |
- X509_STORE_CTX_init(store_ctx, revocation_store, NULL, NULL); |
84 |
--#if OPENSSL_VERSION_NUMBER > 0x10100000L |
85 |
-+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
86 |
- obj = X509_OBJECT_new(); |
87 |
- rc=X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, issuer, obj); |
88 |
- crl = X509_OBJECT_get0_X509_CRL(obj); |
89 |
-@@ -942,7 +942,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { |
90 |
- "revoked per CRL from issuer %s\n", serial, serial, cp); |
91 |
- OPENSSL_free(cp); |
92 |
- X509_STORE_CTX_set_error(callback_ctx, X509_V_ERR_CERT_REVOKED); |
93 |
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L |
94 |
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
95 |
- X509_OBJECT_free(obj); |
96 |
- #else |
97 |
- X509_OBJECT_free_contents(&obj); |
98 |
-@@ -950,7 +950,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) { |
99 |
- return 0; /* Reject connection */ |
100 |
- } |
101 |
- } |
102 |
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L |
103 |
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
104 |
- X509_OBJECT_free(obj); |
105 |
- #else |
106 |
- X509_OBJECT_free_contents(&obj); |
107 |
-@@ -1596,7 +1596,7 @@ static int switch_to_anon_dh(void) { |
108 |
- if (ssl_client_mode) { |
109 |
- return 1; |
110 |
- } |
111 |
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L |
112 |
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
113 |
- /* Security level must be set to 0 for unauthenticated suites. */ |
114 |
- SSL_CTX_set_security_level(ctx, 0); |
115 |
- #endif |
116 |
|
117 |
diff --git a/x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild b/x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild |
118 |
index 9d0ae573e93..747abaec59d 100644 |
119 |
--- a/x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild |
120 |
+++ b/x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild |
121 |
@@ -40,7 +40,6 @@ RDEPEND="${COMMON_DEPEND} |
122 |
PATCHES=( |
123 |
"${FILESDIR}"/${P}-crypto.patch # https://github.com/LibVNC/x11vnc/issues/86 |
124 |
"${FILESDIR}"/${P}-anonymous-ssl.patch # https://github.com/LibVNC/x11vnc/pull/85 |
125 |
- "${FILESDIR}"/${P}-libressl.patch |
126 |
"${FILESDIR}"/${P}-fno-common.patch |
127 |
"${FILESDIR}"/${P}-CVE-2020-29074.patch |
128 |
) |
129 |
|
130 |
diff --git a/x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild b/x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild |
131 |
index 67620fb825d..0980e502c5f 100644 |
132 |
--- a/x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild |
133 |
+++ b/x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild |
134 |
@@ -40,7 +40,6 @@ RDEPEND="${COMMON_DEPEND} |
135 |
PATCHES=( |
136 |
"${FILESDIR}"/${P}-crypto.patch # https://github.com/LibVNC/x11vnc/issues/86 |
137 |
"${FILESDIR}"/${P}-anonymous-ssl.patch # https://github.com/LibVNC/x11vnc/pull/85 |
138 |
- "${FILESDIR}"/${P}-libressl.patch |
139 |
"${FILESDIR}"/${P}-fno-common.patch |
140 |
"${FILESDIR}"/${P}-CVE-2020-29074.patch |
141 |
) |