diff options
author | V3n3RiX <venerix@koprulu.sector> | 2022-07-11 01:28:44 +0100 |
---|---|---|
committer | V3n3RiX <venerix@koprulu.sector> | 2022-07-11 01:28:44 +0100 |
commit | b46b9834b3fbf80b22ccc12e95f660512cd0fa75 (patch) | |
tree | f7eb18ccc89e078e2f175e5249fe0d4dfdb5b104 /net-voip/telepathy-gabble | |
parent | 62f7102650b24618880e8e6f08fcb8fbd235025b (diff) |
gentoo auto-resync : 11:07:2022 - 01:28:44
Diffstat (limited to 'net-voip/telepathy-gabble')
-rw-r--r-- | net-voip/telepathy-gabble/Manifest | 2 | ||||
-rw-r--r-- | net-voip/telepathy-gabble/files/telepathy-gabble-0.18.4-openssl-1.1.patch | 30 |
2 files changed, 16 insertions, 16 deletions
diff --git a/net-voip/telepathy-gabble/Manifest b/net-voip/telepathy-gabble/Manifest index 9a40c960d15b..41d9accd0834 100644 --- a/net-voip/telepathy-gabble/Manifest +++ b/net-voip/telepathy-gabble/Manifest @@ -1,5 +1,5 @@ AUX telepathy-gabble-0.18.4-build-fix-no-jingle.patch 774 BLAKE2B 3a861c8f32d0900003b7553f70144f261bf45f33dd2cfffb54d1a0bbc00a1f99961180d8f848d4e1cf70deee46e9a66fd56af6cc6196787fa4265bbd46034a35 SHA512 e1d2dc3b13ebfb24dab5c73ba9dd930f1ff61a443311dbfb3526a3474bfba96934b24e48c8b098216e8c205c4835143c891697c23b328a6541a72683d4864e11 -AUX telepathy-gabble-0.18.4-openssl-1.1.patch 8670 BLAKE2B 1d7f3133a67b4f17acbbbad0e1ba45421c9d3bbaa7bab4cdc1cffdadaff6a839b197f8b2167c5bb77fef80a68fea6c214fe0fb6b348c06a2a84a020d0d5f4cfe SHA512 f3d5f4aa15efe17a408888a51a5670e512cf3264261b1a11bada080b15ec131c42f222fe9fe9660717d32208988383a75214908adc6e364d4a8903b7ef0f3d2c +AUX telepathy-gabble-0.18.4-openssl-1.1.patch 8115 BLAKE2B 155503c50aa76003c202b1244bbba321aa4e4060074a5d298e24989597f70fadf712b42203aba65742bc8550292eceeff940b9628bbdced012b3f3697eba5b7e SHA512 07384272d1aa91cbb821080146841aae9fa8ca25d6a91bd5cd2d93a3ebc06cafd1f7272bbed28c1191b32cc5692d3d6f69186914865eafdfaa52bf6a821d7b19 DIST telepathy-gabble-0.18.4-python3.patch 16302 BLAKE2B 6cbd6469febe4acc6d8d07c0c209b47fbf79990601f41c4715f13944d81165df6dccfc344b3cc674fa131fc383a609ae628d8508ff96b05ef63634af6c32b638 SHA512 3b8ea10b5330c5d02d4bc4508a7d9a348bb4c9a93a92419fb66668e06f461097fb16a1a4b956c327740cf6dc77693b921a63f37a6095c21fcab6d1169e62a2f4 DIST telepathy-gabble-0.18.4.tar.gz 2584311 BLAKE2B c1708be2ebe0b7dd06b53af1087c349e1a1f0b83dfffe463c72e31e459d2efd4db5bad7ade7a478bd4b91948aade822bfa6c13fe175863759cc98c44beca8178 SHA512 4303f1da7eeadf1f0e69fa881cd8b08dc41f4fd061df3f2ecdc80735d8be3e8cf24d8482f265f1858d8dfed71f62e8bc02c13f9525db8d21c9d927e25fa66218 EBUILD telepathy-gabble-0.18.4-r4.ebuild 2508 BLAKE2B 822a6baccc6c79921cf7403f52a36dacc534e207b374fb30aba7526f0ce5f0baca6cbbfbb531b37cff3a41b812b3c0ad1aeee50400a9ff7116900aafa06e26b9 SHA512 10d3a339cde71dc212da9bbcd7b798fac9a61023dfbc67c7df626793aa8008a5f77315a5d28279904c422cb3b1031f31a6924fa2055d9b657b341f5e91237751 diff --git a/net-voip/telepathy-gabble/files/telepathy-gabble-0.18.4-openssl-1.1.patch b/net-voip/telepathy-gabble/files/telepathy-gabble-0.18.4-openssl-1.1.patch index 0e0d647b700c..c4707e849384 100644 --- a/net-voip/telepathy-gabble/files/telepathy-gabble-0.18.4-openssl-1.1.patch +++ b/net-voip/telepathy-gabble/files/telepathy-gabble-0.18.4-openssl-1.1.patch @@ -19,12 +19,12 @@ index b77fb4c..bb50523 100644 0x02, }; DH *dh; -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + int r = 0; +#endif if ((dh=DH_new()) == NULL) return(NULL); -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + r = DH_set0_pqg(dh, BN_bin2bn(dh1024_p,sizeof(dh1024_p),NULL), + NULL, BN_bin2bn(dh1024_g,sizeof(dh1024_g),NULL)); + if (!r) @@ -45,12 +45,12 @@ index c16deb7..d53ceda 100644 0x02, }; DH *dh; -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + int r = 0; +#endif if ((dh=DH_new()) == NULL) return(NULL); -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + r = DH_set0_pqg(dh, BN_bin2bn(dh2048_p,sizeof(dh2048_p),NULL), + NULL, BN_bin2bn(dh2048_g,sizeof(dh2048_g),NULL)); + if (!r) @@ -71,12 +71,12 @@ index 2854385..93fa7e5 100644 0x02, }; DH *dh; -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + int r = 0; +#endif if ((dh=DH_new()) == NULL) return(NULL); -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + r = DH_set0_pqg(dh, BN_bin2bn(dh4096_p,sizeof(dh4096_p),NULL), + NULL, BN_bin2bn(dh4096_g,sizeof(dh4096_g),NULL)); + if (!r) @@ -97,12 +97,12 @@ index 8e7a278..c2891cd 100644 0x02, }; DH *dh; -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + int r = 0; +#endif if ((dh=DH_new()) == NULL) return(NULL); -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + r = DH_set0_pqg(dh, BN_bin2bn(dh512_p,sizeof(dh512_p),NULL), + NULL, BN_bin2bn(dh512_g,sizeof(dh512_g),NULL)); + if (!r) @@ -124,7 +124,7 @@ index 2201213..18f9981 100644 gboolean rval = FALSE; X509_NAME *subject = X509_get_subject_name (cert); - X509_CINF *ci = cert->cert_info; -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + const STACK_OF(X509_EXTENSION)* extensions = X509_get0_extensions(cert); +#else + const STACK_OF(X509_EXTENSION)* extensions = cert->cert_info->extensions; @@ -148,7 +148,7 @@ index 2201213..18f9981 100644 long ni = OBJ_obj2nid (obj); const guchar *p; char *value = NULL; -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + const ASN1_OCTET_STRING* ext_value = X509_EXTENSION_get_data(ext); + int len = ASN1_STRING_length(ext_value); +#else @@ -161,7 +161,7 @@ index 2201213..18f9981 100644 if ((convert = (X509V3_EXT_METHOD *) X509V3_EXT_get (ext)) == NULL) continue; -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + p = ASN1_STRING_get0_data(ext_value); +#else p = ext->value->data; @@ -173,7 +173,7 @@ index 2201213..18f9981 100644 X509_STORE *store = SSL_CTX_get_cert_store(session->ctx); X509 *cert = SSL_get_peer_certificate (session->ssl); STACK_OF(X509) *chain = SSL_get_peer_cert_chain (session->ssl); -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + X509_VERIFY_PARAM* param = X509_STORE_get0_param(store); + long old_flags = X509_VERIFY_PARAM_get_flags(param); +#else @@ -184,7 +184,7 @@ index 2201213..18f9981 100644 new_flags &= ~(X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL); -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + X509_VERIFY_PARAM_set_flags(param, new_flags); +#else store->param->flags = new_flags; @@ -196,7 +196,7 @@ index 2201213..18f9981 100644 status = _cert_status (session, new_code, level, ssl_code); } -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + X509_VERIFY_PARAM_set_flags(param, old_flags); +#else store->param->flags = old_flags; @@ -208,7 +208,7 @@ index 2201213..18f9981 100644 if G_UNLIKELY (g_once_init_enter (&initialised)) { -+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + DEBUG ("initialising SSL library and error strings"); +#else gint malloc_init_succeeded; |