[Pkg-voip-commits] [kamailio] 06/07: debian/patches: remove applied upstream patches

Victor Seva Lopez maniac-guest at moszumanska.debian.org
Fri Apr 25 08:33:41 UTC 2014


This is an automated email from the git hooks/post-receive script.

maniac-guest pushed a commit to branch master
in repository kamailio.

commit e4b2607a7be451d7d209760d3b47a052ca357e39
Author: Victor Seva <linuxmaniac at torreviejawireless.org>
Date:   Fri Apr 25 09:59:34 2014 +0200

    debian/patches: remove applied upstream patches
---
 debian/patches/series                              |   3 -
 ...rpc-xmlrpc-scalar-int-value-can-be-positi.patch |  26 ----
 ...x-copy-paste-error-that-can-lead-to-a-cra.patch |  27 ----
 ...port-for-Elliptic-Curve-Diffie-Hellman-Ci.patch | 149 ---------------------
 4 files changed, 205 deletions(-)

diff --git a/debian/patches/series b/debian/patches/series
index 55f8fe5..097470b 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1,6 +1,3 @@
-upstream/0001-modules-xmlrpc-xmlrpc-scalar-int-value-can-be-positi.patch
-upstream/0010-xhttp_pi-fix-copy-paste-error-that-can-lead-to-a-cra.patch
-upstream/0011-tls-Add-support-for-Elliptic-Curve-Diffie-Hellman-Ci.patch
 no_lib64_on_64_bits.patch
 no_INSTALL_file.patch
 fix_export.patch
diff --git a/debian/patches/upstream/0001-modules-xmlrpc-xmlrpc-scalar-int-value-can-be-positi.patch b/debian/patches/upstream/0001-modules-xmlrpc-xmlrpc-scalar-int-value-can-be-positi.patch
deleted file mode 100644
index 50eb993..0000000
--- a/debian/patches/upstream/0001-modules-xmlrpc-xmlrpc-scalar-int-value-can-be-positi.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From 18376e35ebbc1ba82fcce78c4eaa7f7b04e00aa8 Mon Sep 17 00:00:00 2001
-From: Juha Heinanen <jh at tutpro.com>
-Date: Fri, 7 Mar 2014 23:54:05 +0200
-Subject: [PATCH] modules/xmlrpc: xmlrpc scalar <int> value can be positive or
- negative (cherry picked from commit 67c2101fc60e4a963a6133f7a71f5faf510ca214)
-
----
- modules/xmlrpc/xmlrpc.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/modules/xmlrpc/xmlrpc.c b/modules/xmlrpc/xmlrpc.c
-index 4fa9b15..5522a8f 100644
---- a/modules/xmlrpc/xmlrpc.c
-+++ b/modules/xmlrpc/xmlrpc.c
-@@ -993,7 +993,7 @@ static int print_value(struct xmlrpc_reply* res,
- 	case 'd':
- 		prefix = int_prefix;
- 		suffix = int_suffix;
--		body.s = int2str(va_arg(*ap, int), &body.len);
-+		body.s = sint2str(va_arg(*ap, int), &body.len);
- 		break;
- 
- 	case 'f':
--- 
-1.9.0
-
diff --git a/debian/patches/upstream/0010-xhttp_pi-fix-copy-paste-error-that-can-lead-to-a-cra.patch b/debian/patches/upstream/0010-xhttp_pi-fix-copy-paste-error-that-can-lead-to-a-cra.patch
deleted file mode 100644
index 3eb21c1..0000000
--- a/debian/patches/upstream/0010-xhttp_pi-fix-copy-paste-error-that-can-lead-to-a-cra.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From 6245e35a43d68e074064ded56333d7784478b8c2 Mon Sep 17 00:00:00 2001
-From: Ovidiu Sas <osas at voipembedded.com>
-Date: Wed, 19 Mar 2014 22:36:47 -0400
-Subject: [PATCH] xhttp_pi: fix copy/paste error that can lead to a crash when
- 'order_by_cols' are used (cherry picked from commit
- 216faa86af3d6db70fae9186ab2776efc27a5f55)
-
----
- modules/xhttp_pi/xhttp_pi_fnc.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/modules/xhttp_pi/xhttp_pi_fnc.c b/modules/xhttp_pi/xhttp_pi_fnc.c
-index 761a277..71f6fbc 100644
---- a/modules/xhttp_pi/xhttp_pi_fnc.c
-+++ b/modules/xhttp_pi/xhttp_pi_fnc.c
-@@ -1357,7 +1357,7 @@ int ph_getCmds(ph_db_table_t *ph_db_tables, int ph_db_tables_size,
- 								NULL,
- 								&cmds->o_keys,
- 								NULL,
--								&cmds->q_vals,
-+								NULL,
- 								&cmds->o_keys_size,
- 								cmd_cols)!=0)
- 							return -1;
--- 
-1.9.0
-
diff --git a/debian/patches/upstream/0011-tls-Add-support-for-Elliptic-Curve-Diffie-Hellman-Ci.patch b/debian/patches/upstream/0011-tls-Add-support-for-Elliptic-Curve-Diffie-Hellman-Ci.patch
deleted file mode 100644
index 6d375cd..0000000
--- a/debian/patches/upstream/0011-tls-Add-support-for-Elliptic-Curve-Diffie-Hellman-Ci.patch
+++ /dev/null
@@ -1,149 +0,0 @@
-From f8430785ec9c46b2535b2d29898853ee50cc76e0 Mon Sep 17 00:00:00 2001
-From: Carsten Bock <carsten at ng-voice.com>
-Date: Sat, 22 Mar 2014 15:30:27 +0100
-Subject: [PATCH] tls: Add support for Elliptic-Curve Diffie-Hellman Ciphers
- (ECDH)
-
----
- modules/tls/tls_domain.c | 91 ++++++++++++++++++++++++++++++++++++++++++++++++
- modules/tls/tls_mod.c    |  8 +++--
- 2 files changed, 97 insertions(+), 2 deletions(-)
-
-diff --git a/modules/tls/tls_domain.c b/modules/tls/tls_domain.c
-index b832c63..a814818 100644
---- a/modules/tls/tls_domain.c
-+++ b/modules/tls/tls_domain.c
-@@ -42,6 +42,91 @@
- #include "tls_domain.h"
- #include "tls_cfg.h"
- 
-+/*
-+ * ECDHE is enabled only on OpenSSL 1.0.0e and later.
-+ * See http://www.openssl.org/news/secadv_20110906.txt
-+ * for details.
-+ */
-+#ifndef OPENSSL_NO_ECDH
-+static void setup_ecdh(SSL_CTX *ctx)
-+{
-+   EC_KEY *ecdh;
-+
-+   if (SSLeay() < 0x1000005fL) {
-+      return;
-+   }
-+
-+   ecdh = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
-+   SSL_CTX_set_options(ctx, SSL_OP_SINGLE_ECDH_USE);
-+   SSL_CTX_set_tmp_ecdh(ctx, ecdh);
-+
-+   EC_KEY_free(ecdh);
-+}
-+#endif
-+
-+#ifndef OPENSSL_NO_DH
-+
-+static unsigned char dh3072_p[] = {
-+   0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xC9,0x0F,0xDA,0xA2,
-+   0x21,0x68,0xC2,0x34,0xC4,0xC6,0x62,0x8B,0x80,0xDC,0x1C,0xD1,
-+   0x29,0x02,0x4E,0x08,0x8A,0x67,0xCC,0x74,0x02,0x0B,0xBE,0xA6,
-+   0x3B,0x13,0x9B,0x22,0x51,0x4A,0x08,0x79,0x8E,0x34,0x04,0xDD,
-+   0xEF,0x95,0x19,0xB3,0xCD,0x3A,0x43,0x1B,0x30,0x2B,0x0A,0x6D,
-+   0xF2,0x5F,0x14,0x37,0x4F,0xE1,0x35,0x6D,0x6D,0x51,0xC2,0x45,
-+   0xE4,0x85,0xB5,0x76,0x62,0x5E,0x7E,0xC6,0xF4,0x4C,0x42,0xE9,
-+   0xA6,0x37,0xED,0x6B,0x0B,0xFF,0x5C,0xB6,0xF4,0x06,0xB7,0xED,
-+   0xEE,0x38,0x6B,0xFB,0x5A,0x89,0x9F,0xA5,0xAE,0x9F,0x24,0x11,
-+   0x7C,0x4B,0x1F,0xE6,0x49,0x28,0x66,0x51,0xEC,0xE4,0x5B,0x3D,
-+   0xC2,0x00,0x7C,0xB8,0xA1,0x63,0xBF,0x05,0x98,0xDA,0x48,0x36,
-+   0x1C,0x55,0xD3,0x9A,0x69,0x16,0x3F,0xA8,0xFD,0x24,0xCF,0x5F,
-+   0x83,0x65,0x5D,0x23,0xDC,0xA3,0xAD,0x96,0x1C,0x62,0xF3,0x56,
-+   0x20,0x85,0x52,0xBB,0x9E,0xD5,0x29,0x07,0x70,0x96,0x96,0x6D,
-+   0x67,0x0C,0x35,0x4E,0x4A,0xBC,0x98,0x04,0xF1,0x74,0x6C,0x08,
-+   0xCA,0x18,0x21,0x7C,0x32,0x90,0x5E,0x46,0x2E,0x36,0xCE,0x3B,
-+   0xE3,0x9E,0x77,0x2C,0x18,0x0E,0x86,0x03,0x9B,0x27,0x83,0xA2,
-+   0xEC,0x07,0xA2,0x8F,0xB5,0xC5,0x5D,0xF0,0x6F,0x4C,0x52,0xC9,
-+   0xDE,0x2B,0xCB,0xF6,0x95,0x58,0x17,0x18,0x39,0x95,0x49,0x7C,
-+   0xEA,0x95,0x6A,0xE5,0x15,0xD2,0x26,0x18,0x98,0xFA,0x05,0x10,
-+   0x15,0x72,0x8E,0x5A,0x8A,0xAA,0xC4,0x2D,0xAD,0x33,0x17,0x0D,
-+   0x04,0x50,0x7A,0x33,0xA8,0x55,0x21,0xAB,0xDF,0x1C,0xBA,0x64,
-+   0xEC,0xFB,0x85,0x04,0x58,0xDB,0xEF,0x0A,0x8A,0xEA,0x71,0x57,
-+   0x5D,0x06,0x0C,0x7D,0xB3,0x97,0x0F,0x85,0xA6,0xE1,0xE4,0xC7,
-+   0xAB,0xF5,0xAE,0x8C,0xDB,0x09,0x33,0xD7,0x1E,0x8C,0x94,0xE0,
-+   0x4A,0x25,0x61,0x9D,0xCE,0xE3,0xD2,0x26,0x1A,0xD2,0xEE,0x6B,
-+   0xF1,0x2F,0xFA,0x06,0xD9,0x8A,0x08,0x64,0xD8,0x76,0x02,0x73,
-+   0x3E,0xC8,0x6A,0x64,0x52,0x1F,0x2B,0x18,0x17,0x7B,0x20,0x0C,
-+   0xBB,0xE1,0x17,0x57,0x7A,0x61,0x5D,0x6C,0x77,0x09,0x88,0xC0,
-+   0xBA,0xD9,0x46,0xE2,0x08,0xE2,0x4F,0xA0,0x74,0xE5,0xAB,0x31,
-+   0x43,0xDB,0x5B,0xFC,0xE0,0xFD,0x10,0x8E,0x4B,0x82,0xD1,0x20,
-+   0xA9,0x3A,0xD2,0xCA,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF,0xFF
-+
-+};
-+
-+static unsigned char dh3072_g[] = { 0x02 };
-+
-+static void setup_dh(SSL_CTX *ctx)
-+{
-+   DH *dh;
-+
-+   dh = DH_new();
-+   if (dh == NULL) {
-+      return;
-+   }
-+
-+   dh->p = BN_bin2bn(dh3072_p, sizeof(dh3072_p), NULL);
-+   dh->g = BN_bin2bn(dh3072_g, sizeof(dh3072_g), NULL);
-+   if (dh->p == NULL || dh->g == NULL) {
-+      DH_free(dh);
-+      return;
-+   }
-+
-+   SSL_CTX_set_options(ctx, SSL_OP_SINGLE_DH_USE);
-+   SSL_CTX_set_tmp_dh(ctx, dh);
-+
-+   DH_free(dh);
-+}
-+#endif
-+
- 
- /**
-  * @brief Create a new TLS domain structure
-@@ -543,6 +628,12 @@ static int set_cipher_list(tls_domain_t* d)
- 					tls_domain_str(d), cipher_list);
- 			return -1;
- 		}
-+#ifndef OPENSSL_NO_ECDH
-+                setup_ecdh(d->ctx[i]);
-+#endif
-+#ifndef OPENSSL_NO_DH
-+                setup_dh(d->ctx[i]);
-+#endif
- 	}
- 	return 0;
- }
-diff --git a/modules/tls/tls_mod.c b/modules/tls/tls_mod.c
-index b206bf6..c81a8e9 100644
---- a/modules/tls/tls_mod.c
-+++ b/modules/tls/tls_mod.c
-@@ -57,8 +57,6 @@
- 	#error "conflict: CORE_TLS must _not_ be defined"
- #endif
- 
--
--
- /*
-  * FIXME:
-  * - How do we ask for secret key password ? Mod_init is called after
-@@ -344,6 +342,12 @@ static int mod_init(void)
- 	if (tls_check_sockets(*tls_domains_cfg) < 0)
- 		goto error;
- 
-+#ifndef OPENSSL_NO_ECDH
-+	LM_INFO("With ECDH-Support!\n");
-+#endif
-+#ifndef OPENSSL_NO_DH
-+	LM_INFO("With Diffie Hellman\n");
-+#endif
- 	return 0;
- error:
- 	destroy_tls_h();
--- 
-1.9.0
-

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-voip/kamailio.git



More information about the Pkg-voip-commits mailing list