Gentoo Archives: gentoo-commits

From: Sam James <sam@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: x11-misc/x11vnc/, x11-misc/x11vnc/files/
Date: Sat, 01 May 2021 18:07:16
Message-Id: 1619892385.e5c07498fec32b108bc478d8381aa8c88c65a7e7.sam@gentoo
1 commit: e5c07498fec32b108bc478d8381aa8c88c65a7e7
2 Author: Sam James <sam <AT> gentoo <DOT> org>
3 AuthorDate: Sat May 1 17:32:20 2021 +0000
4 Commit: Sam James <sam <AT> gentoo <DOT> org>
5 CommitDate: Sat May 1 18:06:25 2021 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e5c07498
7
8 x11-misc/x11vnc: drop obsolete LibreSSL patch
9
10 Signed-off-by: Sam James <sam <AT> gentoo.org>
11
12 x11-misc/x11vnc/files/x11vnc-0.9.16-libressl.patch | 93 ----------------------
13 x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild | 1 -
14 x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild | 1 -
15 3 files changed, 95 deletions(-)
16
17 diff --git a/x11-misc/x11vnc/files/x11vnc-0.9.16-libressl.patch b/x11-misc/x11vnc/files/x11vnc-0.9.16-libressl.patch
18 deleted file mode 100644
19 index 8e5d8a69217..00000000000
20 --- a/x11-misc/x11vnc/files/x11vnc-0.9.16-libressl.patch
21 +++ /dev/null
22 @@ -1,93 +0,0 @@
23 -diff --git a/src/sslhelper.c b/src/sslhelper.c
24 -index 04c2e27..fb9daa6 100644
25 ---- a/src/sslhelper.c
26 -+++ b/src/sslhelper.c
27 -@@ -803,7 +803,7 @@ static int pem_passwd_callback(char *buf, int size, int rwflag,
28 - static int crl_callback(X509_STORE_CTX *callback_ctx) {
29 - const ASN1_INTEGER *revoked_serial;
30 - X509_STORE_CTX *store_ctx;
31 --#if OPENSSL_VERSION_NUMBER > 0x10100000L
32 -+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
33 - X509_OBJECT *obj;
34 - #else
35 - X509_OBJECT obj;
36 -@@ -829,7 +829,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) {
37 - * the current certificate in order to verify it's integrity. */
38 - store_ctx = X509_STORE_CTX_new();
39 - X509_STORE_CTX_init(store_ctx, revocation_store, NULL, NULL);
40 --#if OPENSSL_VERSION_NUMBER > 0x10100000L
41 -+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
42 - obj = X509_OBJECT_new();
43 - rc=X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, subject, obj);
44 - crl = X509_OBJECT_get0_X509_CRL(obj);
45 -@@ -865,7 +865,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) {
46 - rfbLog("Invalid signature on CRL\n");
47 - X509_STORE_CTX_set_error(callback_ctx,
48 - X509_V_ERR_CRL_SIGNATURE_FAILURE);
49 --#if OPENSSL_VERSION_NUMBER >= 0x10100000L
50 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
51 - X509_OBJECT_free(obj);
52 - #else
53 - X509_OBJECT_free_contents(&obj);
54 -@@ -883,7 +883,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) {
55 - rfbLog("Found CRL has invalid nextUpdate field\n");
56 - X509_STORE_CTX_set_error(callback_ctx,
57 - X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD);
58 --#if OPENSSL_VERSION_NUMBER >= 0x10100000L
59 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
60 - X509_OBJECT_free(obj);
61 - #else
62 - X509_OBJECT_free_contents(&obj);
63 -@@ -894,14 +894,14 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) {
64 - rfbLog("Found CRL is expired - "
65 - "revoking all certificates until you get updated CRL\n");
66 - X509_STORE_CTX_set_error(callback_ctx, X509_V_ERR_CRL_HAS_EXPIRED);
67 --#if OPENSSL_VERSION_NUMBER >= 0x10100000L
68 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
69 - X509_OBJECT_free(obj);
70 - #else
71 - X509_OBJECT_free_contents(&obj);
72 - #endif
73 - return 0; /* Reject connection */
74 - }
75 --#if OPENSSL_VERSION_NUMBER >= 0x10100000L
76 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
77 - X509_OBJECT_free(obj);
78 - #else
79 - X509_OBJECT_free_contents(&obj);
80 -@@ -912,7 +912,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) {
81 - * the current certificate in order to check for revocation. */
82 - store_ctx = X509_STORE_CTX_new();
83 - X509_STORE_CTX_init(store_ctx, revocation_store, NULL, NULL);
84 --#if OPENSSL_VERSION_NUMBER > 0x10100000L
85 -+#if OPENSSL_VERSION_NUMBER > 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
86 - obj = X509_OBJECT_new();
87 - rc=X509_STORE_get_by_subject(store_ctx, X509_LU_CRL, issuer, obj);
88 - crl = X509_OBJECT_get0_X509_CRL(obj);
89 -@@ -942,7 +942,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) {
90 - "revoked per CRL from issuer %s\n", serial, serial, cp);
91 - OPENSSL_free(cp);
92 - X509_STORE_CTX_set_error(callback_ctx, X509_V_ERR_CERT_REVOKED);
93 --#if OPENSSL_VERSION_NUMBER >= 0x10100000L
94 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
95 - X509_OBJECT_free(obj);
96 - #else
97 - X509_OBJECT_free_contents(&obj);
98 -@@ -950,7 +950,7 @@ static int crl_callback(X509_STORE_CTX *callback_ctx) {
99 - return 0; /* Reject connection */
100 - }
101 - }
102 --#if OPENSSL_VERSION_NUMBER >= 0x10100000L
103 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
104 - X509_OBJECT_free(obj);
105 - #else
106 - X509_OBJECT_free_contents(&obj);
107 -@@ -1596,7 +1596,7 @@ static int switch_to_anon_dh(void) {
108 - if (ssl_client_mode) {
109 - return 1;
110 - }
111 --#if OPENSSL_VERSION_NUMBER >= 0x10100000L
112 -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
113 - /* Security level must be set to 0 for unauthenticated suites. */
114 - SSL_CTX_set_security_level(ctx, 0);
115 - #endif
116
117 diff --git a/x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild b/x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild
118 index 9d0ae573e93..747abaec59d 100644
119 --- a/x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild
120 +++ b/x11-misc/x11vnc/x11vnc-0.9.16-r4.ebuild
121 @@ -40,7 +40,6 @@ RDEPEND="${COMMON_DEPEND}
122 PATCHES=(
123 "${FILESDIR}"/${P}-crypto.patch # https://github.com/LibVNC/x11vnc/issues/86
124 "${FILESDIR}"/${P}-anonymous-ssl.patch # https://github.com/LibVNC/x11vnc/pull/85
125 - "${FILESDIR}"/${P}-libressl.patch
126 "${FILESDIR}"/${P}-fno-common.patch
127 "${FILESDIR}"/${P}-CVE-2020-29074.patch
128 )
129
130 diff --git a/x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild b/x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild
131 index 67620fb825d..0980e502c5f 100644
132 --- a/x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild
133 +++ b/x11-misc/x11vnc/x11vnc-0.9.16-r5.ebuild
134 @@ -40,7 +40,6 @@ RDEPEND="${COMMON_DEPEND}
135 PATCHES=(
136 "${FILESDIR}"/${P}-crypto.patch # https://github.com/LibVNC/x11vnc/issues/86
137 "${FILESDIR}"/${P}-anonymous-ssl.patch # https://github.com/LibVNC/x11vnc/pull/85
138 - "${FILESDIR}"/${P}-libressl.patch
139 "${FILESDIR}"/${P}-fno-common.patch
140 "${FILESDIR}"/${P}-CVE-2020-29074.patch
141 )