1 |
commit: 5830ebb0c5587a456ee8baa0593f0c1331326514 |
2 |
Author: Michael Mair-Keimberger <m.mairkeimberger <AT> gmail <DOT> com> |
3 |
AuthorDate: Tue Apr 30 17:17:35 2019 +0000 |
4 |
Commit: Aaron Bauman <bman <AT> gentoo <DOT> org> |
5 |
CommitDate: Fri May 3 00:41:10 2019 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5830ebb0 |
7 |
|
8 |
net-misc/stunnel: remove unused patches |
9 |
|
10 |
Signed-off-by: Michael Mair-Keimberger <m.mairkeimberger <AT> gmail.com> |
11 |
Closes: https://github.com/gentoo/gentoo/pull/11868 |
12 |
Signed-off-by: Aaron Bauman <bman <AT> gentoo.org> |
13 |
|
14 |
.../files/stunnel-5.39-compat-libressl.patch | 132 --------------------- |
15 |
.../files/stunnel-5.48-compat-libressl.patch | 114 ------------------ |
16 |
.../stunnel/files/stunnel-compat-libressl.patch | 42 ------- |
17 |
3 files changed, 288 deletions(-) |
18 |
|
19 |
diff --git a/net-misc/stunnel/files/stunnel-5.39-compat-libressl.patch b/net-misc/stunnel/files/stunnel-5.39-compat-libressl.patch |
20 |
deleted file mode 100644 |
21 |
index 7c4f7435183..00000000000 |
22 |
--- a/net-misc/stunnel/files/stunnel-5.39-compat-libressl.patch |
23 |
+++ /dev/null |
24 |
@@ -1,132 +0,0 @@ |
25 |
-diff -Naur stunnel-5.30.orig/src/ctx.c stunnel-5.30/src/ctx.c |
26 |
---- stunnel-5.30.orig/src/ctx.c 2016-01-15 16:45:23.000000000 +0000 |
27 |
-+++ stunnel-5.30/src/ctx.c 2016-05-14 15:16:47.392859450 +0000 |
28 |
-@@ -359,7 +359,7 @@ |
29 |
- /**************************************** initialize OpenSSL CONF */ |
30 |
- |
31 |
- NOEXPORT int conf_init(SERVICE_OPTIONS *section) { |
32 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
33 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
34 |
- SSL_CONF_CTX *cctx; |
35 |
- NAME_LIST *curr; |
36 |
- char *cmd, *param; |
37 |
-diff -Naur stunnel-5.30.orig/src/verify.c stunnel-5.30/src/verify.c |
38 |
---- stunnel-5.30.orig/src/verify.c 2016-01-15 16:45:23.000000000 +0000 |
39 |
-+++ stunnel-5.30/src/verify.c 2016-05-14 15:16:10.369860180 +0000 |
40 |
-@@ -51,7 +51,7 @@ |
41 |
- NOEXPORT int verify_callback(int, X509_STORE_CTX *); |
42 |
- NOEXPORT int verify_checks(CLI *, int, X509_STORE_CTX *); |
43 |
- NOEXPORT int cert_check(CLI *, X509_STORE_CTX *, int); |
44 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
45 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
46 |
- NOEXPORT int cert_check_subject(CLI *, X509_STORE_CTX *); |
47 |
- #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */ |
48 |
- NOEXPORT int cert_check_local(X509_STORE_CTX *); |
49 |
-@@ -280,7 +280,7 @@ |
50 |
- } |
51 |
- |
52 |
- if(depth==0) { /* additional peer certificate checks */ |
53 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
54 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
55 |
- if(!cert_check_subject(c, callback_ctx)) |
56 |
- return 0; /* reject */ |
57 |
- #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */ |
58 |
-@@ -291,7 +291,7 @@ |
59 |
- return 1; /* accept */ |
60 |
- } |
61 |
- |
62 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
63 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
64 |
- NOEXPORT int cert_check_subject(CLI *c, X509_STORE_CTX *callback_ctx) { |
65 |
- X509 *cert=X509_STORE_CTX_get_current_cert(callback_ctx); |
66 |
- NAME_LIST *ptr; |
67 |
-diff --git a/src/common.h b/src/common.h |
68 |
-index 93f165e..491d9de 100644 |
69 |
---- a/src/common.h |
70 |
-+++ b/src/common.h |
71 |
-@@ -448,7 +448,7 @@ extern char *sys_errlist[]; |
72 |
- #define OPENSSL_NO_TLS1_2 |
73 |
- #endif /* OpenSSL older than 1.0.1 || defined(OPENSSL_NO_TLS1) */ |
74 |
- |
75 |
--#if OPENSSL_VERSION_NUMBER>=0x10100000L |
76 |
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
77 |
- #ifndef OPENSSL_NO_SSL2 |
78 |
- #define OPENSSL_NO_SSL2 |
79 |
- #endif /* !defined(OPENSSL_NO_SSL2) */ |
80 |
-@@ -474,7 +474,7 @@ extern char *sys_errlist[]; |
81 |
- #include <openssl/des.h> |
82 |
- #ifndef OPENSSL_NO_DH |
83 |
- #include <openssl/dh.h> |
84 |
--#if OPENSSL_VERSION_NUMBER<0x10100000L |
85 |
-+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER) |
86 |
- int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g); |
87 |
- #endif /* OpenSSL older than 1.1.0 */ |
88 |
- #endif /* !defined(OPENSSL_NO_DH) */ |
89 |
-diff --git a/src/prototypes.h b/src/prototypes.h |
90 |
-index 303ff77..ae22598 100644 |
91 |
---- a/src/prototypes.h |
92 |
-+++ b/src/prototypes.h |
93 |
-@@ -664,13 +664,13 @@ typedef enum { |
94 |
- #endif /* OPENSSL_NO_DH */ |
95 |
- STUNNEL_LOCKS /* number of locks */ |
96 |
- } LOCK_TYPE; |
97 |
--#if OPENSSL_VERSION_NUMBER < 0x10100004L |
98 |
-+#if OPENSSL_VERSION_NUMBER < 0x10100004L || defined(LIBRESSL_VERSION_NUMBER) |
99 |
- typedef int STUNNEL_RWLOCK; |
100 |
- #else |
101 |
- typedef CRYPTO_RWLOCK *STUNNEL_RWLOCK; |
102 |
- #endif |
103 |
- extern STUNNEL_RWLOCK stunnel_locks[STUNNEL_LOCKS]; |
104 |
--#if OPENSSL_VERSION_NUMBER>=0x10100004L |
105 |
-+#if OPENSSL_VERSION_NUMBER>=0x10100004L && !defined(LIBRESSL_VERSION_NUMBER) |
106 |
- #define CRYPTO_THREAD_read_unlock(type) CRYPTO_THREAD_unlock(type) |
107 |
- #define CRYPTO_THREAD_write_unlock(type) CRYPTO_THREAD_unlock(type) |
108 |
- #else |
109 |
-diff --git a/src/ssl.c b/src/ssl.c |
110 |
-index a7af7e6..1483734 100644 |
111 |
---- a/src/ssl.c |
112 |
-+++ b/src/ssl.c |
113 |
-@@ -50,7 +50,7 @@ NOEXPORT int add_rand_file(GLOBAL_OPTIONS *, const char *); |
114 |
- int index_cli, index_opt, index_redirect, index_addr; |
115 |
- |
116 |
- int ssl_init(void) { /* init TLS before parsing configuration file */ |
117 |
--#if OPENSSL_VERSION_NUMBER>=0x10100000L |
118 |
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
119 |
- OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS | |
120 |
- OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL); |
121 |
- #else |
122 |
-@@ -83,7 +83,7 @@ int ssl_init(void) { /* init TLS before parsing configuration file */ |
123 |
- } |
124 |
- |
125 |
- #ifndef OPENSSL_NO_DH |
126 |
--#if OPENSSL_VERSION_NUMBER<0x10100000L |
127 |
-+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER) |
128 |
- /* this is needed for dhparam.c generated with OpenSSL >= 1.1.0 |
129 |
- * to be linked against the older versions */ |
130 |
- int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) { |
131 |
-diff --git a/src/sthreads.c b/src/sthreads.c |
132 |
-index 59c24a2..04fb256 100644 |
133 |
---- a/src/sthreads.c |
134 |
-+++ b/src/sthreads.c |
135 |
-@@ -47,7 +47,7 @@ |
136 |
- STUNNEL_RWLOCK stunnel_locks[STUNNEL_LOCKS]; |
137 |
- #endif |
138 |
- |
139 |
--#if OPENSSL_VERSION_NUMBER<0x10100004L |
140 |
-+#if OPENSSL_VERSION_NUMBER<0x10100004L || defined(LIBRESSL_VERSION_NUMBER) |
141 |
- #define CRYPTO_THREAD_lock_new() CRYPTO_get_new_dynlockid() |
142 |
- #endif |
143 |
- |
144 |
-diff --git a/src/verify.c b/src/verify.c |
145 |
-index ac1c3ee..3e3bda4 100644 |
146 |
---- a/src/verify.c |
147 |
-+++ b/src/verify.c |
148 |
-@@ -348,7 +348,7 @@ NOEXPORT int cert_check_local(X509_STORE_CTX *callback_ctx) { |
149 |
- cert=X509_STORE_CTX_get_current_cert(callback_ctx); |
150 |
- subject=X509_get_subject_name(cert); |
151 |
- |
152 |
--#if OPENSSL_VERSION_NUMBER>=0x10000000L |
153 |
-+#if OPENSSL_VERSION_NUMBER>=0x10000000L && !defined(LIBRESSL_VERSION_NUMBER) |
154 |
- #if OPENSSL_VERSION_NUMBER<0x10100006L |
155 |
- #define X509_STORE_CTX_get1_certs X509_STORE_get1_certs |
156 |
- #endif |
157 |
|
158 |
diff --git a/net-misc/stunnel/files/stunnel-5.48-compat-libressl.patch b/net-misc/stunnel/files/stunnel-5.48-compat-libressl.patch |
159 |
deleted file mode 100644 |
160 |
index 3161b1581b1..00000000000 |
161 |
--- a/net-misc/stunnel/files/stunnel-5.48-compat-libressl.patch |
162 |
+++ /dev/null |
163 |
@@ -1,114 +0,0 @@ |
164 |
-diff -Naur stunnel-5.48.orig/src/common.h stunnel-5.48/src/common.h |
165 |
---- stunnel-5.48.orig/src/common.h 2018-06-08 13:30:15.000000000 -0400 |
166 |
-+++ stunnel-5.48/src/common.h 2018-07-08 22:23:00.527131463 -0400 |
167 |
-@@ -446,7 +446,7 @@ |
168 |
- #define OPENSSL_NO_TLS1_2 |
169 |
- #endif /* OpenSSL older than 1.0.1 || defined(OPENSSL_NO_TLS1) */ |
170 |
- |
171 |
--#if OPENSSL_VERSION_NUMBER>=0x10100000L |
172 |
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
173 |
- #ifndef OPENSSL_NO_SSL2 |
174 |
- #define OPENSSL_NO_SSL2 |
175 |
- #endif /* !defined(OPENSSL_NO_SSL2) */ |
176 |
-@@ -473,7 +473,7 @@ |
177 |
- #include <openssl/des.h> |
178 |
- #ifndef OPENSSL_NO_DH |
179 |
- #include <openssl/dh.h> |
180 |
--#if OPENSSL_VERSION_NUMBER<0x10100000L |
181 |
-+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER) |
182 |
- int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g); |
183 |
- #endif /* OpenSSL older than 1.1.0 */ |
184 |
- #endif /* !defined(OPENSSL_NO_DH) */ |
185 |
-diff -Naur stunnel-5.48.orig/src/ctx.c stunnel-5.48/src/ctx.c |
186 |
---- stunnel-5.48.orig/src/ctx.c 2018-07-02 17:30:10.000000000 -0400 |
187 |
-+++ stunnel-5.48/src/ctx.c 2018-07-08 22:23:00.527131463 -0400 |
188 |
-@@ -311,7 +311,7 @@ |
189 |
- |
190 |
- #ifndef OPENSSL_NO_DH |
191 |
- |
192 |
--#if OPENSSL_VERSION_NUMBER<0x10100000L |
193 |
-+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER) |
194 |
- NOEXPORT STACK_OF(SSL_CIPHER) *SSL_CTX_get_ciphers(const SSL_CTX *ctx) { |
195 |
- return ctx->cipher_list; |
196 |
- } |
197 |
-@@ -414,7 +414,7 @@ |
198 |
- /**************************************** initialize OpenSSL CONF */ |
199 |
- |
200 |
- NOEXPORT int conf_init(SERVICE_OPTIONS *section) { |
201 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
202 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
203 |
- SSL_CONF_CTX *cctx; |
204 |
- NAME_LIST *curr; |
205 |
- char *cmd, *param; |
206 |
-diff -Naur stunnel-5.48.orig/src/options.c stunnel-5.48/src/options.c |
207 |
---- stunnel-5.48.orig/src/options.c 2018-07-02 17:30:26.000000000 -0400 |
208 |
-+++ stunnel-5.48/src/options.c 2018-07-08 22:23:00.527131463 -0400 |
209 |
-@@ -4215,7 +4215,7 @@ |
210 |
- } |
211 |
- #endif |
212 |
- /* engines can add new algorithms */ |
213 |
--#if OPENSSL_VERSION_NUMBER>=0x10100000L |
214 |
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
215 |
- OPENSSL_init_crypto(OPENSSL_INIT_ADD_ALL_CIPHERS| |
216 |
- OPENSSL_INIT_ADD_ALL_DIGESTS, NULL); |
217 |
- #else |
218 |
-diff -Naur stunnel-5.48.orig/src/ssl.c stunnel-5.48/src/ssl.c |
219 |
---- stunnel-5.48.orig/src/ssl.c 2018-04-06 10:25:10.000000000 -0400 |
220 |
-+++ stunnel-5.48/src/ssl.c 2018-07-08 22:23:00.527131463 -0400 |
221 |
-@@ -52,7 +52,7 @@ |
222 |
- int index_session_authenticated, index_session_connect_address; |
223 |
- |
224 |
- int ssl_init(void) { /* init TLS before parsing configuration file */ |
225 |
--#if OPENSSL_VERSION_NUMBER>=0x10100000L |
226 |
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) |
227 |
- OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS | |
228 |
- OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_LOAD_CONFIG, NULL); |
229 |
- #else |
230 |
-@@ -88,7 +88,7 @@ |
231 |
- } |
232 |
- |
233 |
- #ifndef OPENSSL_NO_DH |
234 |
--#if OPENSSL_VERSION_NUMBER<0x10100000L |
235 |
-+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER) |
236 |
- /* this is needed for dhparam.c generated with OpenSSL >= 1.1.0 |
237 |
- * to be linked against the older versions */ |
238 |
- int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) { |
239 |
-diff -Naur stunnel-5.48.orig/src/verify.c stunnel-5.48/src/verify.c |
240 |
---- stunnel-5.48.orig/src/verify.c 2018-07-02 17:30:10.000000000 -0400 |
241 |
-+++ stunnel-5.48/src/verify.c 2018-07-08 22:23:00.531131344 -0400 |
242 |
-@@ -51,7 +51,7 @@ |
243 |
- NOEXPORT int verify_callback(int, X509_STORE_CTX *); |
244 |
- NOEXPORT int verify_checks(CLI *, int, X509_STORE_CTX *); |
245 |
- NOEXPORT int cert_check(CLI *, X509_STORE_CTX *, int); |
246 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
247 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
248 |
- NOEXPORT int cert_check_subject(CLI *, X509_STORE_CTX *); |
249 |
- #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */ |
250 |
- NOEXPORT int cert_check_local(X509_STORE_CTX *); |
251 |
-@@ -285,7 +285,7 @@ |
252 |
- } |
253 |
- |
254 |
- if(depth==0) { /* additional peer certificate checks */ |
255 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
256 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
257 |
- if(!cert_check_subject(c, callback_ctx)) |
258 |
- return 0; /* reject */ |
259 |
- #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */ |
260 |
-@@ -296,7 +296,7 @@ |
261 |
- return 1; /* accept */ |
262 |
- } |
263 |
- |
264 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
265 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
266 |
- NOEXPORT int cert_check_subject(CLI *c, X509_STORE_CTX *callback_ctx) { |
267 |
- X509 *cert=X509_STORE_CTX_get_current_cert(callback_ctx); |
268 |
- NAME_LIST *ptr; |
269 |
-@@ -346,7 +346,7 @@ |
270 |
- cert=X509_STORE_CTX_get_current_cert(callback_ctx); |
271 |
- subject=X509_get_subject_name(cert); |
272 |
- |
273 |
--#if OPENSSL_VERSION_NUMBER<0x10100006L |
274 |
-+#if OPENSSL_VERSION_NUMBER<0x10100006L || defined(LIBRESSL_VERSION_NUMBER) |
275 |
- #define X509_STORE_CTX_get1_certs X509_STORE_get1_certs |
276 |
- #endif |
277 |
- /* modern API allows retrieving multiple matching certificates */ |
278 |
|
279 |
diff --git a/net-misc/stunnel/files/stunnel-compat-libressl.patch b/net-misc/stunnel/files/stunnel-compat-libressl.patch |
280 |
deleted file mode 100644 |
281 |
index 1349484bf3d..00000000000 |
282 |
--- a/net-misc/stunnel/files/stunnel-compat-libressl.patch |
283 |
+++ /dev/null |
284 |
@@ -1,42 +0,0 @@ |
285 |
-diff -Naur stunnel-5.30.orig/src/ctx.c stunnel-5.30/src/ctx.c |
286 |
---- stunnel-5.30.orig/src/ctx.c 2016-01-15 16:45:23.000000000 +0000 |
287 |
-+++ stunnel-5.30/src/ctx.c 2016-05-14 15:16:47.392859450 +0000 |
288 |
-@@ -359,7 +359,7 @@ |
289 |
- /**************************************** initialize OpenSSL CONF */ |
290 |
- |
291 |
- NOEXPORT int conf_init(SERVICE_OPTIONS *section) { |
292 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
293 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
294 |
- SSL_CONF_CTX *cctx; |
295 |
- NAME_LIST *curr; |
296 |
- char *cmd, *param; |
297 |
-diff -Naur stunnel-5.30.orig/src/verify.c stunnel-5.30/src/verify.c |
298 |
---- stunnel-5.30.orig/src/verify.c 2016-01-15 16:45:23.000000000 +0000 |
299 |
-+++ stunnel-5.30/src/verify.c 2016-05-14 15:16:10.369860180 +0000 |
300 |
-@@ -51,7 +51,7 @@ |
301 |
- NOEXPORT int verify_callback(int, X509_STORE_CTX *); |
302 |
- NOEXPORT int verify_checks(CLI *, int, X509_STORE_CTX *); |
303 |
- NOEXPORT int cert_check(CLI *, X509_STORE_CTX *, int); |
304 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
305 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
306 |
- NOEXPORT int cert_check_subject(CLI *, X509_STORE_CTX *); |
307 |
- #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */ |
308 |
- NOEXPORT int cert_check_local(X509_STORE_CTX *); |
309 |
-@@ -280,7 +280,7 @@ |
310 |
- } |
311 |
- |
312 |
- if(depth==0) { /* additional peer certificate checks */ |
313 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
314 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
315 |
- if(!cert_check_subject(c, callback_ctx)) |
316 |
- return 0; /* reject */ |
317 |
- #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */ |
318 |
-@@ -291,7 +291,7 @@ |
319 |
- return 1; /* accept */ |
320 |
- } |
321 |
- |
322 |
--#if OPENSSL_VERSION_NUMBER>=0x10002000L |
323 |
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER) |
324 |
- NOEXPORT int cert_check_subject(CLI *c, X509_STORE_CTX *callback_ctx) { |
325 |
- X509 *cert=X509_STORE_CTX_get_current_cert(callback_ctx); |
326 |
- NAME_LIST *ptr; |