Gentoo Archives: gentoo-commits

From: Aaron Bauman <bman@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: net-misc/stunnel/files/
Date: Fri, 03 May 2019 00:42:43
Message-Id: 1556844070.5830ebb0c5587a456ee8baa0593f0c1331326514.bman@gentoo
1 commit: 5830ebb0c5587a456ee8baa0593f0c1331326514
2 Author: Michael Mair-Keimberger <m.mairkeimberger <AT> gmail <DOT> com>
3 AuthorDate: Tue Apr 30 17:17:35 2019 +0000
4 Commit: Aaron Bauman <bman <AT> gentoo <DOT> org>
5 CommitDate: Fri May 3 00:41:10 2019 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5830ebb0
7
8 net-misc/stunnel: remove unused patches
9
10 Signed-off-by: Michael Mair-Keimberger <m.mairkeimberger <AT> gmail.com>
11 Closes: https://github.com/gentoo/gentoo/pull/11868
12 Signed-off-by: Aaron Bauman <bman <AT> gentoo.org>
13
14 .../files/stunnel-5.39-compat-libressl.patch | 132 ---------------------
15 .../files/stunnel-5.48-compat-libressl.patch | 114 ------------------
16 .../stunnel/files/stunnel-compat-libressl.patch | 42 -------
17 3 files changed, 288 deletions(-)
18
19 diff --git a/net-misc/stunnel/files/stunnel-5.39-compat-libressl.patch b/net-misc/stunnel/files/stunnel-5.39-compat-libressl.patch
20 deleted file mode 100644
21 index 7c4f7435183..00000000000
22 --- a/net-misc/stunnel/files/stunnel-5.39-compat-libressl.patch
23 +++ /dev/null
24 @@ -1,132 +0,0 @@
25 -diff -Naur stunnel-5.30.orig/src/ctx.c stunnel-5.30/src/ctx.c
26 ---- stunnel-5.30.orig/src/ctx.c 2016-01-15 16:45:23.000000000 +0000
27 -+++ stunnel-5.30/src/ctx.c 2016-05-14 15:16:47.392859450 +0000
28 -@@ -359,7 +359,7 @@
29 - /**************************************** initialize OpenSSL CONF */
30 -
31 - NOEXPORT int conf_init(SERVICE_OPTIONS *section) {
32 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
33 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
34 - SSL_CONF_CTX *cctx;
35 - NAME_LIST *curr;
36 - char *cmd, *param;
37 -diff -Naur stunnel-5.30.orig/src/verify.c stunnel-5.30/src/verify.c
38 ---- stunnel-5.30.orig/src/verify.c 2016-01-15 16:45:23.000000000 +0000
39 -+++ stunnel-5.30/src/verify.c 2016-05-14 15:16:10.369860180 +0000
40 -@@ -51,7 +51,7 @@
41 - NOEXPORT int verify_callback(int, X509_STORE_CTX *);
42 - NOEXPORT int verify_checks(CLI *, int, X509_STORE_CTX *);
43 - NOEXPORT int cert_check(CLI *, X509_STORE_CTX *, int);
44 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
45 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
46 - NOEXPORT int cert_check_subject(CLI *, X509_STORE_CTX *);
47 - #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */
48 - NOEXPORT int cert_check_local(X509_STORE_CTX *);
49 -@@ -280,7 +280,7 @@
50 - }
51 -
52 - if(depth==0) { /* additional peer certificate checks */
53 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
54 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
55 - if(!cert_check_subject(c, callback_ctx))
56 - return 0; /* reject */
57 - #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */
58 -@@ -291,7 +291,7 @@
59 - return 1; /* accept */
60 - }
61 -
62 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
63 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
64 - NOEXPORT int cert_check_subject(CLI *c, X509_STORE_CTX *callback_ctx) {
65 - X509 *cert=X509_STORE_CTX_get_current_cert(callback_ctx);
66 - NAME_LIST *ptr;
67 -diff --git a/src/common.h b/src/common.h
68 -index 93f165e..491d9de 100644
69 ---- a/src/common.h
70 -+++ b/src/common.h
71 -@@ -448,7 +448,7 @@ extern char *sys_errlist[];
72 - #define OPENSSL_NO_TLS1_2
73 - #endif /* OpenSSL older than 1.0.1 || defined(OPENSSL_NO_TLS1) */
74 -
75 --#if OPENSSL_VERSION_NUMBER>=0x10100000L
76 -+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
77 - #ifndef OPENSSL_NO_SSL2
78 - #define OPENSSL_NO_SSL2
79 - #endif /* !defined(OPENSSL_NO_SSL2) */
80 -@@ -474,7 +474,7 @@ extern char *sys_errlist[];
81 - #include <openssl/des.h>
82 - #ifndef OPENSSL_NO_DH
83 - #include <openssl/dh.h>
84 --#if OPENSSL_VERSION_NUMBER<0x10100000L
85 -+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
86 - int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g);
87 - #endif /* OpenSSL older than 1.1.0 */
88 - #endif /* !defined(OPENSSL_NO_DH) */
89 -diff --git a/src/prototypes.h b/src/prototypes.h
90 -index 303ff77..ae22598 100644
91 ---- a/src/prototypes.h
92 -+++ b/src/prototypes.h
93 -@@ -664,13 +664,13 @@ typedef enum {
94 - #endif /* OPENSSL_NO_DH */
95 - STUNNEL_LOCKS /* number of locks */
96 - } LOCK_TYPE;
97 --#if OPENSSL_VERSION_NUMBER < 0x10100004L
98 -+#if OPENSSL_VERSION_NUMBER < 0x10100004L || defined(LIBRESSL_VERSION_NUMBER)
99 - typedef int STUNNEL_RWLOCK;
100 - #else
101 - typedef CRYPTO_RWLOCK *STUNNEL_RWLOCK;
102 - #endif
103 - extern STUNNEL_RWLOCK stunnel_locks[STUNNEL_LOCKS];
104 --#if OPENSSL_VERSION_NUMBER>=0x10100004L
105 -+#if OPENSSL_VERSION_NUMBER>=0x10100004L && !defined(LIBRESSL_VERSION_NUMBER)
106 - #define CRYPTO_THREAD_read_unlock(type) CRYPTO_THREAD_unlock(type)
107 - #define CRYPTO_THREAD_write_unlock(type) CRYPTO_THREAD_unlock(type)
108 - #else
109 -diff --git a/src/ssl.c b/src/ssl.c
110 -index a7af7e6..1483734 100644
111 ---- a/src/ssl.c
112 -+++ b/src/ssl.c
113 -@@ -50,7 +50,7 @@ NOEXPORT int add_rand_file(GLOBAL_OPTIONS *, const char *);
114 - int index_cli, index_opt, index_redirect, index_addr;
115 -
116 - int ssl_init(void) { /* init TLS before parsing configuration file */
117 --#if OPENSSL_VERSION_NUMBER>=0x10100000L
118 -+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
119 - OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS |
120 - OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL);
121 - #else
122 -@@ -83,7 +83,7 @@ int ssl_init(void) { /* init TLS before parsing configuration file */
123 - }
124 -
125 - #ifndef OPENSSL_NO_DH
126 --#if OPENSSL_VERSION_NUMBER<0x10100000L
127 -+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
128 - /* this is needed for dhparam.c generated with OpenSSL >= 1.1.0
129 - * to be linked against the older versions */
130 - int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) {
131 -diff --git a/src/sthreads.c b/src/sthreads.c
132 -index 59c24a2..04fb256 100644
133 ---- a/src/sthreads.c
134 -+++ b/src/sthreads.c
135 -@@ -47,7 +47,7 @@
136 - STUNNEL_RWLOCK stunnel_locks[STUNNEL_LOCKS];
137 - #endif
138 -
139 --#if OPENSSL_VERSION_NUMBER<0x10100004L
140 -+#if OPENSSL_VERSION_NUMBER<0x10100004L || defined(LIBRESSL_VERSION_NUMBER)
141 - #define CRYPTO_THREAD_lock_new() CRYPTO_get_new_dynlockid()
142 - #endif
143 -
144 -diff --git a/src/verify.c b/src/verify.c
145 -index ac1c3ee..3e3bda4 100644
146 ---- a/src/verify.c
147 -+++ b/src/verify.c
148 -@@ -348,7 +348,7 @@ NOEXPORT int cert_check_local(X509_STORE_CTX *callback_ctx) {
149 - cert=X509_STORE_CTX_get_current_cert(callback_ctx);
150 - subject=X509_get_subject_name(cert);
151 -
152 --#if OPENSSL_VERSION_NUMBER>=0x10000000L
153 -+#if OPENSSL_VERSION_NUMBER>=0x10000000L && !defined(LIBRESSL_VERSION_NUMBER)
154 - #if OPENSSL_VERSION_NUMBER<0x10100006L
155 - #define X509_STORE_CTX_get1_certs X509_STORE_get1_certs
156 - #endif
157
158 diff --git a/net-misc/stunnel/files/stunnel-5.48-compat-libressl.patch b/net-misc/stunnel/files/stunnel-5.48-compat-libressl.patch
159 deleted file mode 100644
160 index 3161b1581b1..00000000000
161 --- a/net-misc/stunnel/files/stunnel-5.48-compat-libressl.patch
162 +++ /dev/null
163 @@ -1,114 +0,0 @@
164 -diff -Naur stunnel-5.48.orig/src/common.h stunnel-5.48/src/common.h
165 ---- stunnel-5.48.orig/src/common.h 2018-06-08 13:30:15.000000000 -0400
166 -+++ stunnel-5.48/src/common.h 2018-07-08 22:23:00.527131463 -0400
167 -@@ -446,7 +446,7 @@
168 - #define OPENSSL_NO_TLS1_2
169 - #endif /* OpenSSL older than 1.0.1 || defined(OPENSSL_NO_TLS1) */
170 -
171 --#if OPENSSL_VERSION_NUMBER>=0x10100000L
172 -+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
173 - #ifndef OPENSSL_NO_SSL2
174 - #define OPENSSL_NO_SSL2
175 - #endif /* !defined(OPENSSL_NO_SSL2) */
176 -@@ -473,7 +473,7 @@
177 - #include <openssl/des.h>
178 - #ifndef OPENSSL_NO_DH
179 - #include <openssl/dh.h>
180 --#if OPENSSL_VERSION_NUMBER<0x10100000L
181 -+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
182 - int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g);
183 - #endif /* OpenSSL older than 1.1.0 */
184 - #endif /* !defined(OPENSSL_NO_DH) */
185 -diff -Naur stunnel-5.48.orig/src/ctx.c stunnel-5.48/src/ctx.c
186 ---- stunnel-5.48.orig/src/ctx.c 2018-07-02 17:30:10.000000000 -0400
187 -+++ stunnel-5.48/src/ctx.c 2018-07-08 22:23:00.527131463 -0400
188 -@@ -311,7 +311,7 @@
189 -
190 - #ifndef OPENSSL_NO_DH
191 -
192 --#if OPENSSL_VERSION_NUMBER<0x10100000L
193 -+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
194 - NOEXPORT STACK_OF(SSL_CIPHER) *SSL_CTX_get_ciphers(const SSL_CTX *ctx) {
195 - return ctx->cipher_list;
196 - }
197 -@@ -414,7 +414,7 @@
198 - /**************************************** initialize OpenSSL CONF */
199 -
200 - NOEXPORT int conf_init(SERVICE_OPTIONS *section) {
201 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
202 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
203 - SSL_CONF_CTX *cctx;
204 - NAME_LIST *curr;
205 - char *cmd, *param;
206 -diff -Naur stunnel-5.48.orig/src/options.c stunnel-5.48/src/options.c
207 ---- stunnel-5.48.orig/src/options.c 2018-07-02 17:30:26.000000000 -0400
208 -+++ stunnel-5.48/src/options.c 2018-07-08 22:23:00.527131463 -0400
209 -@@ -4215,7 +4215,7 @@
210 - }
211 - #endif
212 - /* engines can add new algorithms */
213 --#if OPENSSL_VERSION_NUMBER>=0x10100000L
214 -+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
215 - OPENSSL_init_crypto(OPENSSL_INIT_ADD_ALL_CIPHERS|
216 - OPENSSL_INIT_ADD_ALL_DIGESTS, NULL);
217 - #else
218 -diff -Naur stunnel-5.48.orig/src/ssl.c stunnel-5.48/src/ssl.c
219 ---- stunnel-5.48.orig/src/ssl.c 2018-04-06 10:25:10.000000000 -0400
220 -+++ stunnel-5.48/src/ssl.c 2018-07-08 22:23:00.527131463 -0400
221 -@@ -52,7 +52,7 @@
222 - int index_session_authenticated, index_session_connect_address;
223 -
224 - int ssl_init(void) { /* init TLS before parsing configuration file */
225 --#if OPENSSL_VERSION_NUMBER>=0x10100000L
226 -+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
227 - OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS |
228 - OPENSSL_INIT_LOAD_CRYPTO_STRINGS | OPENSSL_INIT_LOAD_CONFIG, NULL);
229 - #else
230 -@@ -88,7 +88,7 @@
231 - }
232 -
233 - #ifndef OPENSSL_NO_DH
234 --#if OPENSSL_VERSION_NUMBER<0x10100000L
235 -+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
236 - /* this is needed for dhparam.c generated with OpenSSL >= 1.1.0
237 - * to be linked against the older versions */
238 - int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) {
239 -diff -Naur stunnel-5.48.orig/src/verify.c stunnel-5.48/src/verify.c
240 ---- stunnel-5.48.orig/src/verify.c 2018-07-02 17:30:10.000000000 -0400
241 -+++ stunnel-5.48/src/verify.c 2018-07-08 22:23:00.531131344 -0400
242 -@@ -51,7 +51,7 @@
243 - NOEXPORT int verify_callback(int, X509_STORE_CTX *);
244 - NOEXPORT int verify_checks(CLI *, int, X509_STORE_CTX *);
245 - NOEXPORT int cert_check(CLI *, X509_STORE_CTX *, int);
246 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
247 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
248 - NOEXPORT int cert_check_subject(CLI *, X509_STORE_CTX *);
249 - #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */
250 - NOEXPORT int cert_check_local(X509_STORE_CTX *);
251 -@@ -285,7 +285,7 @@
252 - }
253 -
254 - if(depth==0) { /* additional peer certificate checks */
255 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
256 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
257 - if(!cert_check_subject(c, callback_ctx))
258 - return 0; /* reject */
259 - #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */
260 -@@ -296,7 +296,7 @@
261 - return 1; /* accept */
262 - }
263 -
264 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
265 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
266 - NOEXPORT int cert_check_subject(CLI *c, X509_STORE_CTX *callback_ctx) {
267 - X509 *cert=X509_STORE_CTX_get_current_cert(callback_ctx);
268 - NAME_LIST *ptr;
269 -@@ -346,7 +346,7 @@
270 - cert=X509_STORE_CTX_get_current_cert(callback_ctx);
271 - subject=X509_get_subject_name(cert);
272 -
273 --#if OPENSSL_VERSION_NUMBER<0x10100006L
274 -+#if OPENSSL_VERSION_NUMBER<0x10100006L || defined(LIBRESSL_VERSION_NUMBER)
275 - #define X509_STORE_CTX_get1_certs X509_STORE_get1_certs
276 - #endif
277 - /* modern API allows retrieving multiple matching certificates */
278
279 diff --git a/net-misc/stunnel/files/stunnel-compat-libressl.patch b/net-misc/stunnel/files/stunnel-compat-libressl.patch
280 deleted file mode 100644
281 index 1349484bf3d..00000000000
282 --- a/net-misc/stunnel/files/stunnel-compat-libressl.patch
283 +++ /dev/null
284 @@ -1,42 +0,0 @@
285 -diff -Naur stunnel-5.30.orig/src/ctx.c stunnel-5.30/src/ctx.c
286 ---- stunnel-5.30.orig/src/ctx.c 2016-01-15 16:45:23.000000000 +0000
287 -+++ stunnel-5.30/src/ctx.c 2016-05-14 15:16:47.392859450 +0000
288 -@@ -359,7 +359,7 @@
289 - /**************************************** initialize OpenSSL CONF */
290 -
291 - NOEXPORT int conf_init(SERVICE_OPTIONS *section) {
292 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
293 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
294 - SSL_CONF_CTX *cctx;
295 - NAME_LIST *curr;
296 - char *cmd, *param;
297 -diff -Naur stunnel-5.30.orig/src/verify.c stunnel-5.30/src/verify.c
298 ---- stunnel-5.30.orig/src/verify.c 2016-01-15 16:45:23.000000000 +0000
299 -+++ stunnel-5.30/src/verify.c 2016-05-14 15:16:10.369860180 +0000
300 -@@ -51,7 +51,7 @@
301 - NOEXPORT int verify_callback(int, X509_STORE_CTX *);
302 - NOEXPORT int verify_checks(CLI *, int, X509_STORE_CTX *);
303 - NOEXPORT int cert_check(CLI *, X509_STORE_CTX *, int);
304 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
305 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
306 - NOEXPORT int cert_check_subject(CLI *, X509_STORE_CTX *);
307 - #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */
308 - NOEXPORT int cert_check_local(X509_STORE_CTX *);
309 -@@ -280,7 +280,7 @@
310 - }
311 -
312 - if(depth==0) { /* additional peer certificate checks */
313 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
314 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
315 - if(!cert_check_subject(c, callback_ctx))
316 - return 0; /* reject */
317 - #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */
318 -@@ -291,7 +291,7 @@
319 - return 1; /* accept */
320 - }
321 -
322 --#if OPENSSL_VERSION_NUMBER>=0x10002000L
323 -+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
324 - NOEXPORT int cert_check_subject(CLI *c, X509_STORE_CTX *callback_ctx) {
325 - X509 *cert=X509_STORE_CTX_get_current_cert(callback_ctx);
326 - NAME_LIST *ptr;