summaryrefslogtreecommitdiff
path: root/dev-python/xmpppy/files
diff options
context:
space:
mode:
Diffstat (limited to 'dev-python/xmpppy/files')
-rw-r--r--dev-python/xmpppy/files/xmpppy-0.5.0_rc1-ssl_fields.patch28
-rw-r--r--dev-python/xmpppy/files/xmpppy-hashlib_ssl_deprecation.patch69
2 files changed, 0 insertions, 97 deletions
diff --git a/dev-python/xmpppy/files/xmpppy-0.5.0_rc1-ssl_fields.patch b/dev-python/xmpppy/files/xmpppy-0.5.0_rc1-ssl_fields.patch
deleted file mode 100644
index a39af1821fdb..000000000000
--- a/dev-python/xmpppy/files/xmpppy-0.5.0_rc1-ssl_fields.patch
+++ /dev/null
@@ -1,28 +0,0 @@
-Taken from https://bugs.gentoo.org/show_bug.cgi?id=535758
-Kudos to Anton Bolshakov <blshkv@pentoo.ch> for this patch
-
---- xmpp/transports.py.orig 2015-01-05 15:41:23.000000000 +0800
-+++ xmpp/transports.py 2015-01-06 15:52:25.916240681 +0800
-@@ -27,7 +27,7 @@
- Also exception 'error' is defined to allow capture of this module specific exceptions.
- """
-
--import socket,select,base64,dispatcher,sys
-+import socket,ssl,select,base64,dispatcher,sys
- from simplexml import ustr
- from client import PlugIn
- from protocol import *
-@@ -314,9 +314,10 @@
- """ Here we should switch pending_data to hint mode."""
- tcpsock=self._owner.Connection
- warnings.filterwarnings("ignore", "socket\.ssl.*ssl\.wrap_socket", DeprecationWarning)
-- tcpsock._sslObj = socket.ssl(tcpsock._sock, None, None)
-- tcpsock._sslIssuer = tcpsock._sslObj.issuer()
-- tcpsock._sslServer = tcpsock._sslObj.server()
-+ tcpsock._sslObj = ssl.wrap_socket(tcpsock._sock, None, None)
-+ tcpsock._sslIssuer = tcpsock._sslObj.getpeercert().get('issuer')
-+ tcpsock._sslServer = tcpsock._sslObj.getpeercert().get('server')
-+
- tcpsock._recv = tcpsock._sslObj.read
- tcpsock._send = tcpsock._sslObj.write
-
diff --git a/dev-python/xmpppy/files/xmpppy-hashlib_ssl_deprecation.patch b/dev-python/xmpppy/files/xmpppy-hashlib_ssl_deprecation.patch
deleted file mode 100644
index 489de037a488..000000000000
--- a/dev-python/xmpppy/files/xmpppy-hashlib_ssl_deprecation.patch
+++ /dev/null
@@ -1,69 +0,0 @@
---- xmpp/auth.py
-+++ xmpp/auth.py
-@@ -21,11 +21,16 @@
-
- from protocol import *
- from client import PlugIn
--import sha,base64,random,dispatcher,re
-+import base64,random,dispatcher,re
-
--import md5
--def HH(some): return md5.new(some).hexdigest()
--def H(some): return md5.new(some).digest()
-+try:
-+ from hashlib import md5, sha1
-+except ImportError:
-+ from md5 import new as md5
-+ from sha import new as sha1
-+
-+def HH(some): return md5(some).hexdigest()
-+def H(some): return md5(some).digest()
- def C(some): return ':'.join(some)
-
- class NonSASL(PlugIn):
-@@ -54,15 +59,15 @@
-
- if query.getTag('digest'):
- self.DEBUG("Performing digest authentication",'ok')
-- query.setTagData('digest',sha.new(owner.Dispatcher.Stream._document_attrs['id']+self.password).hexdigest())
-+ query.setTagData('digest',sha1(owner.Dispatcher.Stream._document_attrs['id']+self.password).hexdigest())
- if query.getTag('password'): query.delChild('password')
- method='digest'
- elif query.getTag('token'):
- token=query.getTagData('token')
- seq=query.getTagData('sequence')
- self.DEBUG("Performing zero-k authentication",'ok')
-- hash = sha.new(sha.new(self.password).hexdigest()+token).hexdigest()
-- for foo in xrange(int(seq)): hash = sha.new(hash).hexdigest()
-+ hash = sha1(sha1(self.password).hexdigest()+token).hexdigest()
-+ for foo in xrange(int(seq)): hash = sha1(hash).hexdigest()
- query.setTagData('hash',hash)
- method='0k'
- else:
-@@ -81,7 +86,7 @@
- def authComponent(self,owner):
- """ Authenticate component. Send handshake stanza and wait for result. Returns "ok" on success. """
- self.handshake=0
-- owner.send(Node(NS_COMPONENT_ACCEPT+' handshake',payload=[sha.new(owner.Dispatcher.Stream._document_attrs['id']+self.password).hexdigest()]))
-+ owner.send(Node(NS_COMPONENT_ACCEPT+' handshake',payload=[sha1(owner.Dispatcher.Stream._document_attrs['id']+self.password).hexdigest()]))
- owner.RegisterHandler('handshake',self.handshakeHandler,xmlns=NS_COMPONENT_ACCEPT)
- while not self.handshake:
- self.DEBUG("waiting on handshake",'notify')
---- xmpp/transports.py
-+++ xmpp/transports.py
-@@ -31,6 +31,7 @@
- from simplexml import ustr
- from client import PlugIn
- from protocol import *
-+import warnings
-
- # determine which DNS resolution library is available
- HAVE_DNSPYTHON = False
-@@ -312,6 +313,7 @@
- """ Immidiatedly switch socket to TLS mode. Used internally."""
- """ Here we should switch pending_data to hint mode."""
- tcpsock=self._owner.Connection
-+ warnings.filterwarnings("ignore", "socket\.ssl.*ssl\.wrap_socket", DeprecationWarning)
- tcpsock._sslObj = socket.ssl(tcpsock._sock, None, None)
- tcpsock._sslIssuer = tcpsock._sslObj.issuer()
- tcpsock._sslServer = tcpsock._sslObj.server()