From nobody Sat Jun 3 11:12:13 2023 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4QYHJY6XlTz4ZLJv; Sat, 3 Jun 2023 11:12:13 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4QYHJY68Xkz3n9W; Sat, 3 Jun 2023 11:12:13 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1685790733; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=2tSNQQka0jUN1H41o8wLucz/VUwIxEEoH2YHDufvCU4=; b=vDoX2Pdq6RMnINlkXVvvmZXM53aMh6SrOgU0WIG5pdc72ZyxyTswauSwyBFeTHf+JbVhfT syvGz6pYIWgzgUhuJZUVK/ajDaBN8z982Q4EwwWncCQ9/oN/rRS+p9r0k41toWTWzIDbsj jhUCZJKWI0jZr6zJTVbeh55hb741MSzNpNkEsrrr6y+F6PvcVDz9y7haa1CcZarR6p4dk4 sTta22S/TeRlfHay020Dcbyo3wGD+qn8axGoE4FRevLCUVfGeKyBVJy1JHMPu8SyFYIC+k 29oYyUVbDZGmdgQ16x6V3SXA0UbcOjGG6YYu8FZ2JxXzx/DAPVOiT/9Z2U2MpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1685790733; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=2tSNQQka0jUN1H41o8wLucz/VUwIxEEoH2YHDufvCU4=; b=OK54FgP92xp9SgOTHpMqLAzdXo+yweDq5QuUiGOyCQrIb76+negNHDYUfPR0qm61ygQWKE 5IBVZh3oA/Z7+fbI/JpWzZKuMHPXX2jFkTrbImxvA7U0ipauZUTRY1MbtZ9jLiKAFzvzOZ KKmytKE/Hdv/0hCkCvbaWABmVp1LiZSIt1LCr2TGo/0X2D4n3acKg/2MHnwVrpVjZrcexl ebAr4zQ/kkyU32lujuyfz47+a7Uc6XRdevlplE6IcgG1C14ZgeZrZ+kZo4zN2x1iS2/nPh CfEXzKfLhx/NYIKl60cBuxKFEMad/YgeHN+AK7hQTZtCFVnjMHmDwvGiOuvxng== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1685790733; a=rsa-sha256; cv=none; b=a0oI+46FhR1bygO/WkYZy4N93p8PqoSLhvshMvrzhcuAqh9vsJPZQ7UgCWmV55fojX6UJa ML903SD9tG9W+OS1viiBJTjEQMNNuQkU67MSto63jGy0FE8q2XfYu4hINy8kWpbIC0cZgZ t8wT6ZFW+bB5/+y1iTtNbk0QODKD5pRN6+d3wDfSOYAYD7hOGQR9mcUfWuh4lWOKoBhOCT Pom5KQLMEKKY5FzrEMO+bgIPdXVfVMo39eTbespUcK0cQAgGPaDwpL1C1wh75db5C7fdrR L6b8raJ8KLJS92tNzaRymRxZ+uccmMrk+GWkUTcYRuHDUYcSgTZJ6L/lXwlYpg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4QYHJY4vFFzNjj; Sat, 3 Jun 2023 11:12:13 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 353BCDXE039907; Sat, 3 Jun 2023 11:12:13 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 353BCD0H039906; Sat, 3 Jun 2023 11:12:13 GMT (envelope-from git) Date: Sat, 3 Jun 2023 11:12:13 GMT Message-Id: <202306031112.353BCD0H039906@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Rene Ladan Subject: git: a96b72ed5f03 - main - net-mgmt/send: Remove expired port List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rene X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: a96b72ed5f03f080e862b739d25c65fb9dc84106 Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by rene: URL: https://cgit.FreeBSD.org/ports/commit/?id=a96b72ed5f03f080e862b739d25c65fb9dc84106 commit a96b72ed5f03f080e862b739d25c65fb9dc84106 Author: Rene Ladan AuthorDate: 2023-06-03 11:11:47 +0000 Commit: Rene Ladan CommitDate: 2023-06-03 11:11:47 +0000 net-mgmt/send: Remove expired port 2023-06-03 net-mgmt/send: Implementation is based on older obsolete RFC --- MOVED | 1 + net-mgmt/Makefile | 1 - net-mgmt/send/Makefile | 55 ---- net-mgmt/send/distinfo | 3 - net-mgmt/send/files/patch-Makefile.install | 15 - net-mgmt/send/files/patch-include-cga_keyutils.h | 12 - net-mgmt/send/files/patch-include-pkixip_ext.h | 33 --- net-mgmt/send/files/patch-include-pkixip_ext_asn.h | 33 --- net-mgmt/send/files/patch-libs-Makefile.lib.common | 9 - .../send/files/patch-libs-libcga-cga_keyutils.c | 19 -- net-mgmt/send/files/patch-libs-libcga-cga_mt.c | 54 ---- net-mgmt/send/files/patch-libs-libpkixipext-asn1.c | 25 -- .../patch-libs-libpkixipext-pkixip_ext_gram.y | 40 --- net-mgmt/send/files/patch-libs-libpkixipext-util.c | 30 -- net-mgmt/send/files/patch-libs-libpkixipext-ver.c | 240 ---------------- net-mgmt/send/files/patch-libs-libpkixipext-x509.c | 310 --------------------- net-mgmt/send/files/patch-sendd-Makefile | 13 - net-mgmt/send/files/patch-sendd-cert.c | 14 - net-mgmt/send/files/patch-sendd-cpa.c | 63 ----- net-mgmt/send/files/patch-sendd-openssl.c | 42 --- net-mgmt/send/files/patch-sendd-os-Makefile | 18 -- net-mgmt/send/files/patch-sendd-sig_rfc3971.c | 112 -------- net-mgmt/send/files/patch-sendd-snd_proto.h | 18 -- net-mgmt/send/files/patch-sendd_params__gram.y | 11 - net-mgmt/send/files/pkg-message.in | 9 - net-mgmt/send/files/sendd.in | 12 - net-mgmt/send/pkg-descr | 14 - net-mgmt/send/pkg-plist | 7 - 28 files changed, 1 insertion(+), 1212 deletions(-) diff --git a/MOVED b/MOVED index 061783758252..cfe507bca201 100644 --- a/MOVED +++ b/MOVED @@ -7613,3 +7613,4 @@ net-mgmt/nagircbot||2023-06-01|Has expired: Broken for more than a year and fail mail/spamdyke||2023-06-01|Has expired: Broken for more than a year and last upstream release was in 2015 net/haproxy17||2023-06-03|Has expired: Upstream EOL reached on 2021-03-31 net/haproxy18||2023-06-03|Has expired: Upstream EOL reached on 2022-12-31 +net-mgmt/send||2023-06-03|Has expired: Implementation is based on older obsolete RFC diff --git a/net-mgmt/Makefile b/net-mgmt/Makefile index 5a3305c86f0e..051a593f39b3 100644 --- a/net-mgmt/Makefile +++ b/net-mgmt/Makefile @@ -370,7 +370,6 @@ SUBDIR += seafile-gui SUBDIR += seafile-server SUBDIR += semaphore - SUBDIR += send SUBDIR += sendip SUBDIR += sipcalc SUBDIR += sjitter diff --git a/net-mgmt/send/Makefile b/net-mgmt/send/Makefile deleted file mode 100644 index 727bb7909f5d..000000000000 --- a/net-mgmt/send/Makefile +++ /dev/null @@ -1,55 +0,0 @@ -PORTNAME= send -PORTVERSION= 0.3 -DISTVERSIONPREFIX= v -PORTREVISION= 4 -CATEGORIES= net-mgmt - -MAINTAINER= hrs@FreeBSD.org -COMMENT= Secure Neighbor Discovery implementation for IPv6 - -LICENSE= BSD3CLAUSE -LICENSE_FILE= ${WRKSRC}/LICENSE - -DEPRECATED= Implementation is based on older obsolete RFC -EXPIRATION_DATE= 2023-06-03 - -LIB_DEPENDS= libdnet.so:net/libdnet - -USES= gmake ncurses readline ssl -BROKEN_SSL= openssl30 openssl31 -BROKEN_SSL_REASON= error: unknown type name 'IPAddressRange' -USE_GITHUB= yes -GH_ACCOUNT= hrs-allbsd -USE_RC_SUBR= sendd - -SUB_FILES= pkg-message -PORTDOCS= README UserGuide.pdf -MAKE_JOBS_UNSAFE=yes - -OPTIONS_DEFINE= DOCS - -.include - -.if ${OPSYS} == FreeBSD && ( ${OSVERSION} >= 1400079 || ( ${OSVERSION} >= 1302505 && ${OSVERSION} < 1400000 )) -CFLAGS+= -Wno-error=int-conversion -.endif - -post-extract: - ${INSTALL_DATA} ${WRKSRC}/examples/ipext/ipext_verify.conf \ - ${WRKSRC}/examples/ipext/ca/ipext.conf \ - ${WRKSRC}/examples/ - ${INSTALL_DATA} ${WRKSRC}/docs/UserGuide.pdf \ - ${WRKSRC}/UserGuide.pdf - -post-install: - ${MKDIR} ${STAGEDIR}${PREFIX}/etc/sendd - for F in sendd.conf params.conf ipext.conf ipext_verify.conf; do \ - ${INSTALL_DATA} ${WRKSRC}/examples/$$F \ - ${STAGEDIR}${PREFIX}/etc/sendd/$${F}-dist; \ - done - -post-install-DOCS-on: - ${MKDIR} ${STAGEDIR}${DOCSDIR} - cd ${WRKSRC} && ${INSTALL_DATA} ${PORTDOCS} ${STAGEDIR}${DOCSDIR} - -.include diff --git a/net-mgmt/send/distinfo b/net-mgmt/send/distinfo deleted file mode 100644 index efc5713d134c..000000000000 --- a/net-mgmt/send/distinfo +++ /dev/null @@ -1,3 +0,0 @@ -TIMESTAMP = 1551288169 -SHA256 (hrs-allbsd-send-v0.3_GH0.tar.gz) = 527542b24fa2009e0cc99a85fd423215782ced69c427454727172745c7fbae92 -SIZE (hrs-allbsd-send-v0.3_GH0.tar.gz) = 1313559 diff --git a/net-mgmt/send/files/patch-Makefile.install b/net-mgmt/send/files/patch-Makefile.install deleted file mode 100644 index 741130d3d5ee..000000000000 --- a/net-mgmt/send/files/patch-Makefile.install +++ /dev/null @@ -1,15 +0,0 @@ ---- Makefile.install.orig 2019-02-27 16:25:45 UTC -+++ Makefile.install -@@ -1,9 +1,9 @@ --INSSBIN= $(PREFIXSBIN)/$(PROG) -+INSSBIN= $(DESTDIR)$(PREFIXSBIN)/$(PROG) - - $(INSSBIN): $(PROG) -- install $< $@ -+ $(BSD_INSTALL_PROGRAM) $< $@ - --install: all $(PREFIXSBIN) $(INSSBIN) $(EXTRAINSTALL) -+install: all $(DESTDIR)$(PREFIXSBIN) $(INSSBIN) $(DESTDIR)$(EXTRAINSTALL) - - $(PREFIXSBIN): - mkdir -p $@ diff --git a/net-mgmt/send/files/patch-include-cga_keyutils.h b/net-mgmt/send/files/patch-include-cga_keyutils.h deleted file mode 100644 index d7fa4434759b..000000000000 --- a/net-mgmt/send/files/patch-include-cga_keyutils.h +++ /dev/null @@ -1,12 +0,0 @@ ---- include/cga_keyutils.h.orig 2019-02-27 16:25:45 UTC -+++ include/cga_keyutils.h -@@ -36,6 +36,9 @@ - #include - #include - #include -+#if OPENSSL_VERSION_NUMBER >= 0x0090900fL -+#define STACK _STACK -+#endif - #include - - extern int cga_add_key(cga_ctx_t *, EVP_PKEY *, int, uint16_t); diff --git a/net-mgmt/send/files/patch-include-pkixip_ext.h b/net-mgmt/send/files/patch-include-pkixip_ext.h deleted file mode 100644 index bc32707d1911..000000000000 --- a/net-mgmt/send/files/patch-include-pkixip_ext.h +++ /dev/null @@ -1,33 +0,0 @@ ---- include/pkixip_ext.h.orig 2019-02-27 16:25:45 UTC -+++ include/pkixip_ext.h -@@ -47,14 +47,30 @@ struct pkixip_config { - char *certfile; - }; - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - extern int pkixip_aor_cmp(const char * const *, const char * const *); - extern int pkixip_ipf_cmp(const char * const *, const char * const *); -+#else -+extern int pkixip_aor_cmp(const IPAddressOrRange * const *, -+ const IPAddressOrRange * const *); -+extern int pkixip_ipf_cmp(const IPAddressFamily * const *, -+ const IPAddressFamily * const *); -+#endif - - extern int pkixip_add2stores_cert(X509 *); - extern int pkixip_add2stores_file(const char *); -+ -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - extern int pkixip_add_store(int *, int (*cmp)(X509_OBJECT **, X509_OBJECT **)); -+#else -+extern int pkixip_add_store(int *, int (*cmp)(const X509_OBJECT * const *, const X509_OBJECT * const *)); -+#endif - extern void *pkixip_find_cert(void *, int); -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - extern STACK *pkixip_get_mychain(void); -+#else -+extern STACK_OF(X509_OBJECT) *pkixip_get_mychain(void); -+#endif - extern X509_STORE_CTX *pkixip_get_store_ctx(void); - extern int pkixip_has_ext(X509 *x); - extern X509 *pkixip_load_cert(const char *); diff --git a/net-mgmt/send/files/patch-include-pkixip_ext_asn.h b/net-mgmt/send/files/patch-include-pkixip_ext_asn.h deleted file mode 100644 index c1f7b7b8be6a..000000000000 --- a/net-mgmt/send/files/patch-include-pkixip_ext_asn.h +++ /dev/null @@ -1,33 +0,0 @@ ---- include/pkixip_ext_asn.h.orig 2019-02-27 16:25:45 UTC -+++ include/pkixip_ext_asn.h -@@ -33,7 +33,12 @@ - #ifndef _PKIXIP_EXT_ASN_H - #define _PKIXIP_EXT_ASN_H - -+#include -+#if OPENSSL_VERSION_NUMBER >= 0x0090900fL -+#define STACK _STACK -+#endif - #include -+#include - #include - #include - -@@ -45,7 +50,7 @@ - #define IANA_SAFI_BOTH 3 - #define IANA_SAFI_MPLS 4 - --/* -+#ifdef LIBRESSL_VERSION_NUMBER - typedef struct IPAddressRange_st { - ASN1_BIT_STRING *min; - ASN1_BIT_STRING *max; -@@ -79,7 +84,7 @@ typedef struct IPAddressFamily_st { - ASN1_OCTET_STRING *addressFamily; - IPAddressChoice *ipAddressChoice; - } IPAddressFamily; --*/ -+#endif - - #define IP_AOR_PREFIX 0 - #define IP_AOR_RANGE 1 diff --git a/net-mgmt/send/files/patch-libs-Makefile.lib.common b/net-mgmt/send/files/patch-libs-Makefile.lib.common deleted file mode 100644 index 02c297955be6..000000000000 --- a/net-mgmt/send/files/patch-libs-Makefile.lib.common +++ /dev/null @@ -1,9 +0,0 @@ ---- libs/Makefile.lib.common.orig 2019-02-27 16:25:45 UTC -+++ libs/Makefile.lib.common -@@ -1,5 +1,5 @@ - --CFLAGS += -Wall -O3 -+CFLAGS?= -Wall -O3 - - ifeq ($(DEBUG_POLICY),DEBUG) - CPPFLAGS += -g # enable for general debugging diff --git a/net-mgmt/send/files/patch-libs-libcga-cga_keyutils.c b/net-mgmt/send/files/patch-libs-libcga-cga_keyutils.c deleted file mode 100644 index 30423a55492d..000000000000 --- a/net-mgmt/send/files/patch-libs-libcga-cga_keyutils.c +++ /dev/null @@ -1,19 +0,0 @@ ---- libs/libcga/cga_keyutils.c.orig 2019-02-27 16:25:45 UTC -+++ libs/libcga/cga_keyutils.c -@@ -45,6 +45,7 @@ - #include - #include - #include -+#include - - #include "config.h" - #include -@@ -80,7 +81,7 @@ cga_load_cert(cga_ctx_t *cga, const char *f) - goto fail; - } - -- k = X509_PUBKEY_get(x->cert_info->key); -+ k = X509_PUBKEY_get(X509_get_X509_PUBKEY(x)); - - if (cga->key && cga->free_key) { - free(cga->key); diff --git a/net-mgmt/send/files/patch-libs-libcga-cga_mt.c b/net-mgmt/send/files/patch-libs-libcga-cga_mt.c deleted file mode 100644 index a70b51c861e4..000000000000 --- a/net-mgmt/send/files/patch-libs-libcga-cga_mt.c +++ /dev/null @@ -1,54 +0,0 @@ ---- libs/libcga/cga_mt.c.orig 2019-02-27 16:25:45 UTC -+++ libs/libcga/cga_mt.c -@@ -77,10 +77,10 @@ SPIN(void) - static int - add_mod(uint8_t *m, uint32_t s) - { -- BIGNUM bn[1], *bnp; -+ BIGNUM *bn, *bnp; - int blen; - -- BN_init(bn); -+ bn = BN_new(); - if ((bnp = BN_bin2bn(m, CGA_MODLEN, bn)) == NULL) { - ssl_err(__FUNCTION__, "BN_bin2bin failed"); - return (-1); -@@ -88,6 +88,7 @@ add_mod(uint8_t *m, uint32_t s) - BN_add_word(bnp, s); - blen = BN_num_bytes(bnp); - BN_bn2bin(bnp, m + (CGA_MODLEN - blen)); -+ BN_free(bn); - - return (0); - } -@@ -177,12 +178,16 @@ done: - static void - opssec(struct timeval *start, uint8_t *startmod) - { -- BIGNUM sm[1], em[1], ops[1], t[1], dv[1]; -+ BIGNUM *sm, *em, *ops, *t, *dv; - BN_CTX *bc; - struct timeval tv[1]; - char *dec; - -- BN_init(sm); BN_init(em); BN_init(ops); BN_init(t); BN_init(dv); -+ sm = BN_new(); -+ em = BN_new(); -+ ops = BN_new(); -+ t = BN_new(); -+ dv = BN_new(); - BN_bin2bn(startmod, CGA_MODLEN, sm); - BN_bin2bn(state->mod, CGA_MODLEN, em); - BN_sub(ops, em, sm); -@@ -210,6 +215,11 @@ opssec(struct timeval *start, uint8_t *startmod) - - OPENSSL_free(dec); - BN_CTX_free(bc); -+ BN_free(sm); -+ BN_free(em); -+ BN_free(ops); -+ BN_free(t); -+ BN_free(dv); - } - - void diff --git a/net-mgmt/send/files/patch-libs-libpkixipext-asn1.c b/net-mgmt/send/files/patch-libs-libpkixipext-asn1.c deleted file mode 100644 index be53eca5e80c..000000000000 --- a/net-mgmt/send/files/patch-libs-libpkixipext-asn1.c +++ /dev/null @@ -1,25 +0,0 @@ ---- libs/libpkixipext/asn1.c.orig 2019-02-27 16:25:45 UTC -+++ libs/libpkixipext/asn1.c -@@ -187,9 +187,8 @@ i2v_IPAddressChoice(X509V3_EXT_METHOD *method, IPAddre - break; - case IPA_CHOICE_AOR: - X509V3_add_value(" Prefix or Range", NULL, &extlist); -- for (i = 0; i < sk_num(ipc->u.addressesOrRanges); i++) { -- aor = (IPAddressOrRange *) -- sk_value(ipc->u.addressesOrRanges, i); -+ for (i = 0; i < sk_IPAddressOrRange_num(ipc->u.addressesOrRanges); i++) { -+ aor = sk_IPAddressOrRange_value(ipc->u.addressesOrRanges, i); - i2v_IPAddressOrRange(method, aor, extlist, af); - } - break; -@@ -265,8 +264,8 @@ i2v_IPAddrBlocks(X509V3_EXT_METHOD *method, IPAddrBloc - return (NULL); - } - -- for (i = 0; i < sk_num(ipb); i++) { -- ipf = (IPAddressFamily *)sk_value(ipb, i); -+ for (i = 0; i < sk_IPAddressFamily_num(ipb); i++) { -+ ipf = sk_IPAddressFamily_value(ipb, i); - i2v_IPAddressFamily(method, ipf, extlist); - } - diff --git a/net-mgmt/send/files/patch-libs-libpkixipext-pkixip_ext_gram.y b/net-mgmt/send/files/patch-libs-libpkixipext-pkixip_ext_gram.y deleted file mode 100644 index ef68ee80da79..000000000000 --- a/net-mgmt/send/files/patch-libs-libpkixipext-pkixip_ext_gram.y +++ /dev/null @@ -1,40 +0,0 @@ ---- libs/libpkixipext/pkixip_ext_gram.y.orig 2019-02-27 16:25:45 UTC -+++ libs/libpkixipext/pkixip_ext_gram.y -@@ -42,7 +42,7 @@ - #include "pkixip_ext.h" - #include "pkixip_local.h" - --int linecnt; -+extern int linecnt; - - extern char *pkixip_text; - extern int pkixip_lex(void); -@@ -350,7 +350,7 @@ new_aor(void) - - if (!ipc->u.addressesOrRanges && - !(ipc->u.addressesOrRanges = -- sk_new(pkixip_aor_cmp))) { -+ sk_IPAddressOrRange_new(pkixip_aor_cmp))) { - applog(LOG_CRIT, "no memory"); - return (-1); - } -@@ -361,7 +361,7 @@ new_aor(void) - applog(LOG_CRIT, "%s: no memory", __FUNCTION__); - return (-1); - } -- if (!sk_push(ipc->u.addressesOrRanges, (char *)aor)) { -+ if (!sk_IPAddressOrRange_push(ipc->u.addressesOrRanges, (char *)aor)) { - applog(LOG_CRIT, "sk_push() failed"); - return (-1); - } -@@ -459,8 +459,8 @@ af_already_exists(void) - int i; - IPAddressFamily *e_ipf; - -- for (i = 0; i < sk_num(parse_ipb); i++) { -- e_ipf = (IPAddressFamily *)sk_value(parse_ipb, i); -+ for (i = 0; i < sk_IPAddressFamily_num(parse_ipb); i++) { -+ e_ipf = sk_IPAddressFamily_value(parse_ipb, i); - if (af_match(ipf, e_ipf)) { - return (1); - } diff --git a/net-mgmt/send/files/patch-libs-libpkixipext-util.c b/net-mgmt/send/files/patch-libs-libpkixipext-util.c deleted file mode 100644 index b22140586ff3..000000000000 --- a/net-mgmt/send/files/patch-libs-libpkixipext-util.c +++ /dev/null @@ -1,30 +0,0 @@ ---- libs/libpkixipext/util.c.orig 2019-02-27 16:25:45 UTC -+++ libs/libpkixipext/util.c -@@ -37,8 +37,13 @@ - #include "config.h" - #include "pkixip_ext_asn.h" - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - int - pkixip_aor_cmp(const char * const *a1, const char * const *a2) -+#else -+int -+pkixip_aor_cmp(const IPAddressOrRange * const *a1, const IPAddressOrRange * const *a2) -+#endif - { - int by1, by2, bi1, bi2, bytes, bits; - uint8_t *d1, *d2, x1, x2, mask; -@@ -119,8 +124,13 @@ pkixip_aor_cmp(const char * const *a1, const char * co - return (0); - } - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - int - pkixip_ipf_cmp(const char * const *a1, const char * const *a2) -+#else -+int -+pkixip_ipf_cmp(const IPAddressFamily * const *a1, const IPAddressFamily * const *a2) -+#endif - { - IPAddressFamily *ipf1 = (IPAddressFamily *)*a1; - IPAddressFamily *ipf2 = (IPAddressFamily *)*a2; diff --git a/net-mgmt/send/files/patch-libs-libpkixipext-ver.c b/net-mgmt/send/files/patch-libs-libpkixipext-ver.c deleted file mode 100644 index 1b51ece804ca..000000000000 --- a/net-mgmt/send/files/patch-libs-libpkixipext-ver.c +++ /dev/null @@ -1,240 +0,0 @@ ---- libs/libpkixipext/ver.c.orig 2019-02-27 16:25:45 UTC -+++ libs/libpkixipext/ver.c -@@ -101,11 +101,15 @@ static int - in_range(ASN1_BIT_STRING *min1, ASN1_BIT_STRING *max1, ASN1_BIT_STRING *min2, - ASN1_BIT_STRING *max2, int af) - { -- BIGNUM bpmin[1], bpmax[1], bmin[1], bmax[1]; -- int alen, len, bits; -+ BIGNUM *bpmin, *bpmax, *bmin, *bmax; -+ int alen, len, bits, ret; - uint8_t mask, buf[sizeof (struct in6_addr)]; - -- BN_init(bpmin); BN_init(bpmax); BN_init(bmin); BN_init(bmax); -+ bpmin = BN_new(); -+ bpmax = BN_new(); -+ bmin = BN_new(); -+ bmax = BN_new(); -+ ret = 0; - switch (af) { - case AF_INET: - alen = sizeof (struct in_addr); -@@ -115,14 +119,14 @@ in_range(ASN1_BIT_STRING *min1, ASN1_BIT_STRING *max1, - break; - default: - DBG(&dbg_ver, "Unsupported AF"); -- return (0); -+ goto end; - } - - len = min1->length < alen ? min1->length : alen; - memset(buf, 0, sizeof (buf)); - memcpy(buf, min1->data, len); - if (!BN_bin2bn(buf, alen, bpmin)) { -- return (0); -+ goto end; - } - - len = max1->length < alen ? max1->length : alen; -@@ -135,14 +139,14 @@ in_range(ASN1_BIT_STRING *min1, ASN1_BIT_STRING *max1, - buf[len - 1] |= mask; - } - if (!BN_bin2bn(buf, alen, bpmax)) { -- return (0); -+ goto end; - } - - len = min2->length < alen ? min2->length : alen; - memset(buf, 0, sizeof (buf)); - memcpy(buf, min2->data, len); - if (!BN_bin2bn(buf, alen, bmin)) { -- return (0); -+ goto end; - } - - len = max2->length < alen ? max2->length : alen; -@@ -155,18 +159,24 @@ in_range(ASN1_BIT_STRING *min1, ASN1_BIT_STRING *max1, - buf[len - 1] |= mask; - } - if (!BN_bin2bn(buf, alen, bmax)) { -- return (0); -+ goto end; - } - - /* bmin <= bpmin <= bpmax <= bmax. We already know bpmin <= bpmax */ - if (BN_cmp(bmin, bpmin) == 1) { -- return (0); -+ goto end; - } - if (BN_cmp(bpmax, bmax) == 1) { -- return (0); -+ goto end; - } -+ ret = 1; -+end: -+ BN_free(bpmin); -+ BN_free(bpmax); -+ BN_free(bmin); -+ BN_free(bmax); - -- return (1); -+ return (ret); - } - - static int -@@ -247,16 +257,14 @@ af_cmp(IPAddressFamily *ipf1, IPAddressFamily *ipf2) - } - - DBG(&dbg_ver, "Pre-cmp ipc AOR count: %d", -- sk_num(ipc1->u.addressesOrRanges)); -+ sk_IPAddressOrRange_num(ipc1->u.addressesOrRanges)); - -- for (i = 0; i < sk_num(ipc1->u.addressesOrRanges); i++) { -- aor1 = -- (IPAddressOrRange *)sk_value(ipc1->u.addressesOrRanges, i); -- for (j = 0; j < sk_num(ipc2->u.addressesOrRanges); j++) { -- aor2 = (IPAddressOrRange *) -- sk_value(ipc2->u.addressesOrRanges, j); -+ for (i = 0; i < sk_IPAddressOrRange_num(ipc1->u.addressesOrRanges); i++) { -+ aor1 = sk_IPAddressOrRange_value(ipc1->u.addressesOrRanges, i); -+ for (j = 0; j < sk_IPAddressOrRange_num(ipc2->u.addressesOrRanges); j++) { -+ aor2 = sk_IPAddressOrRange_value(ipc2->u.addressesOrRanges, j); - if (aor_match(aor1, aor2, af) == 0) { -- sk_delete(ipc1->u.addressesOrRanges, i--); -+ sk_IPAddressOrRange_delete(ipc1->u.addressesOrRanges, i--); - IPAddressOrRange_free(aor1); - break; - } -@@ -264,9 +272,9 @@ af_cmp(IPAddressFamily *ipf1, IPAddressFamily *ipf2) - } - - DBG(&dbg_ver, "Post-cmp ipc AOR count: %d", -- sk_num(ipc1->u.addressesOrRanges)); -+ sk_IPAddressOrRange_num(ipc1->u.addressesOrRanges)); - -- if (sk_num(ipc1->u.addressesOrRanges) == 0) { -+ if (sk_IPAddressOrRange_num(ipc1->u.addressesOrRanges) == 0) { - return (0); - } - -@@ -307,7 +315,7 @@ verify_ipext_cert(X509_STORE_CTX *ctx, int idx, X509 * - IPAddressFamily *ipf1, *ipf2; - int i, j, inherit = 0; - -- DBG(&dbg_ver, "vipb stack cnt: %d idx: %d", sk_num(vipb), idx); -+ DBG(&dbg_ver, "vipb stack cnt: %d idx: %d", sk_IPAddressFamily_num(vipb), idx); - - ipb = X509_get_ext_d2i(x, pkix_ip_ext_method.ext_nid, NULL, NULL); - if (!ipb) { -@@ -315,18 +323,18 @@ verify_ipext_cert(X509_STORE_CTX *ctx, int idx, X509 * - return (-1); - } - -- for (i = 0; i < sk_num(vipb); i++) { -- ipf1 = (IPAddressFamily *)sk_value(vipb, i); -+ for (i = 0; i < sk_IPAddressFamily_num(vipb); i++) { -+ ipf1 = sk_IPAddressFamily_value(vipb, i); - - /* Ignore inherits in vipb */ - if (is_inherit(ipf1)) { -- sk_delete(vipb, i--); -+ sk_IPAddressFamily_delete(vipb, i--); - IPAddressFamily_free(ipf1); - continue; - } - -- for (j = 0; j < sk_num(ipb); j++) { -- ipf2 = (IPAddressFamily *)sk_value(ipb, j); -+ for (j = 0; j < sk_IPAddressFamily_num(ipb); j++) { -+ ipf2 = sk_IPAddressFamily_value(ipb, j); - if (af_match(ipf1, ipf2)) { - /* - * Inherits in ipb need to be checked -@@ -338,7 +346,7 @@ verify_ipext_cert(X509_STORE_CTX *ctx, int idx, X509 * - } - - if (af_cmp(ipf1, ipf2) == 0) { -- sk_delete(vipb, i--); -+ sk_IPAddressFamily_delete(vipb, i--); - IPAddressFamily_free(ipf1); - break; - } -@@ -346,18 +354,18 @@ verify_ipext_cert(X509_STORE_CTX *ctx, int idx, X509 * - } - } - -- if (!inherit || (++idx) == sk_num(ctx->chain)) { -+ if (!inherit || (++idx) == sk_num(X509_STORE_CTX_get_chain(ctx))) { - /* end of the line */ - goto done; - } -- x = (X509 *)sk_value(ctx->chain, idx); -+ x = (X509 *)sk_value(X509_STORE_CTX_get_chain(ctx), idx); - verify_ipext_cert(ctx, idx, x, vipb); - - done: - IPAddrBlocks_free(ipb); - - /* If the vipb stack is now empty all ipf's matched */ -- if (sk_num(vipb) != 0) { -+ if (sk_IPAddressFamily_num(vipb) != 0) { - return (-1); - } - -@@ -376,13 +384,13 @@ verify_ipext(X509_STORE_CTX *ctx, IPAddrBlocks *vipb) - i2v_IPAddrBlocks(NULL, vipb, NULL), 8, 1); - #endif - -- if (sk_num(vipb) == 0) { -+ if (sk_IPAddressFamily_num(vipb) == 0) { - DBG(&dbg_ver, "IPAddrBlock empty; rejecting"); - return (-1); - } - -- for (i = 0; i < sk_num(ctx->chain); i++) { -- x = (X509 *)sk_value(ctx->chain, i); -+ for (i = 0; i < sk_num(X509_STORE_CTX_get_chain(ctx)); i++) { -+ x = (X509 *)sk_value(X509_STORE_CTX_get_chain(ctx), i); - - DBG(&dbg_ver, "%s", - X509_NAME_oneline(X509_get_subject_name(x), nbuf, -@@ -391,7 +399,7 @@ verify_ipext(X509_STORE_CTX *ctx, IPAddrBlocks *vipb) - if (verify_ipext_cert(ctx, i, x, vipb) < 0) { - return (-1); - } -- if (sk_num(vipb) == 0) { -+ if (sk_IPAddressFamily_num(vipb) == 0) { - break; - } - } -@@ -408,9 +416,9 @@ verify_ipext_chain(X509_STORE_CTX *ctx) - - DBG(&dbg_ver, "Verifying IP Exts in the certificate chain"); - -- for (i = 1; i < sk_num(ctx->chain); i++) { -- vx = (X509 *)sk_value(ctx->chain, i - 1); -- x = (X509 *)sk_value(ctx->chain, i); -+ for (i = 1; i < sk_num(X509_STORE_CTX_get_chain(ctx)); i++) { -+ vx = (X509 *)sk_value(X509_STORE_CTX_get_chain(ctx), i - 1); -+ x = (X509 *)sk_value(X509_STORE_CTX_get_chain(ctx), i); - - DBG(&dbg_ver, "%s", - X509_NAME_oneline(X509_get_subject_name(vx), nbuf, -@@ -446,7 +454,7 @@ pkixip_verify_cb(int ok, X509_STORE_CTX *ctx) - X509_NAME_oneline(X509_get_subject_name(x), nbuf, sizeof (nbuf)); - #endif - if (!ok) { -- if (ctx->error == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION) { -+ if (X509_STORE_CTX_get_error(ctx) == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION) { - /* - * OpenSSL doesn't explicitly support PKIX IP Ext, - * so it throws this error when it encounters the -@@ -458,7 +466,7 @@ pkixip_verify_cb(int ok, X509_STORE_CTX *ctx) - } else { - DBG(&dbg_ver, "Not OK at %s", nbuf); - DBG(&dbg_ver, "%s", -- X509_verify_cert_error_string(ctx->error)); -+ X509_verify_cert_error_string(X509_STORE_CTX_get_error(ctx))); - } - } else { - DBG(&dbg_ver, "OK at %s", nbuf); diff --git a/net-mgmt/send/files/patch-libs-libpkixipext-x509.c b/net-mgmt/send/files/patch-libs-libpkixipext-x509.c deleted file mode 100644 index 1668b9ba4ddc..000000000000 --- a/net-mgmt/send/files/patch-libs-libpkixipext-x509.c +++ /dev/null @@ -1,310 +0,0 @@ ---- libs/libpkixipext/x509.c.orig 2019-02-27 16:25:45 UTC -+++ libs/libpkixipext/x509.c -@@ -57,34 +57,54 @@ static char nbuf[1024]; - extern int pkixip_verify_cb(int, X509_STORE_CTX *); - - X509V3_EXT_METHOD pkix_ip_ext_method = { -- ext_flags : X509V3_EXT_MULTILINE, -- it : ASN1_ITEM_ref(IPAddrBlocks), -- i2v : (X509V3_EXT_I2V)i2v_IPAddrBlocks, -+ .ext_flags = X509V3_EXT_MULTILINE, -+ .it = ASN1_ITEM_ref(IPAddrBlocks), -+ .i2v = (X509V3_EXT_I2V)i2v_IPAddrBlocks, - }; - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - static STACK *stores[PKIXIP_MAX_STORES]; -+#else -+static STACK_OF(X509_OBJECT) *stores[PKIXIP_MAX_STORES]; -+#endif - static X509_STORE_CTX *ctx_bysubj; - static int next_store = 1; - static void *(*wrap_store_cert)(X509 *x); - static void (*trustanchor_cb)(X509 *x); - pthread_mutex_t stores_lock = PTHREAD_MUTEX_INITIALIZER; - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - static STACK *mychain; -+#else -+static STACK_OF(X509_OBJECT) *mychain; -+#endif - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L -+#define X509_OBJECT_get_type(a) ((a)->type) -+#define X509_OBJECT_get0_X509(a) ((a)->data.x509) -+#define X509_OBJECT_get0_X509_CRL(a) ((a)->data.crl) -+#define X509_STORE_get0_objects(a) ((a)->objs) -+#define X509_STORE_CTX_get0_chain(a) ((a)->chain) -+#endif - /* Lifted from openssl x509_lu.c */ -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - static int - x509_object_cmp(X509_OBJECT **a, X509_OBJECT **b) -+#else -+static int -+x509_object_cmp(const X509_OBJECT * const *a, const X509_OBJECT * const *b) -+#endif - { - int ret; - -- ret=((*a)->type - (*b)->type); -+ ret=(X509_OBJECT_get_type(*a) - X509_OBJECT_get_type(*b)); - if (ret) return ret; -- switch ((*a)->type) { -+ switch (X509_OBJECT_get_type(*a)) { - case X509_LU_X509: -- ret=X509_subject_name_cmp((*a)->data.x509,(*b)->data.x509); -+ ret=X509_subject_name_cmp(X509_OBJECT_get0_X509(*a),X509_OBJECT_get0_X509(*b)); - break; - case X509_LU_CRL: -- ret=X509_CRL_cmp((*a)->data.crl,(*b)->data.crl); -+ ret=X509_CRL_cmp(X509_OBJECT_get0_X509_CRL(*a),X509_OBJECT_get0_X509_CRL(*b)); - break; - default: - /* abort(); */ -@@ -243,7 +263,11 @@ pkixip_load_pkey(const char *f) - return (pkey); - } - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - static STACK * -+#else -+static STACK_OF(X509_OBJECT) * -+#endif - pkixip_get_store(int handle) - { - if (handle >= PKIXIP_MAX_STORES || handle < 0) { -@@ -257,7 +281,11 @@ pkixip_get_store(int handle) - void - pkixip_walk_store(int (*cb)(X509 *, void *), void *cookie, int handle) - { -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - STACK *objs; -+#else -+ STACK_OF(X509_OBJECT) *objs; -+#endif - int i; - X509_OBJECT *xo; - -@@ -266,12 +294,16 @@ pkixip_walk_store(int (*cb)(X509 *, void *), void *coo - goto done; - } - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - for (i = 0; i < sk_num(objs); i++) { -+#else -+ for (i = 0; i < sk_X509_OBJECT_num(objs); i++) { -+#endif - xo = sk_X509_OBJECT_value(objs, i); -- if (xo->type != X509_LU_X509) { -+ if (X509_OBJECT_get_type(xo) != X509_LU_X509) { - continue; - } -- if (!cb(xo->data.x509, cookie)) { -+ if (!cb(X509_OBJECT_get0_X509(xo), cookie)) { - break; - } - } -@@ -282,7 +314,11 @@ done: - void * - pkixip_find_cert(void *k, int handle) - { -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - STACK *store; -+#else -+ STACK_OF(X509_OBJECT) *store; -+#endif - int i; - void *r = NULL; - -@@ -291,11 +327,19 @@ pkixip_find_cert(void *k, int handle) - goto done; - } - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - if ((i = sk_find(store, k)) < 0) { -+#else -+ if ((i = sk_X509_OBJECT_find(store, k)) < 0) { -+#endif - goto done; - } - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - r = sk_value(store, i); -+#else -+ r = sk_X509_OBJECT_value(store, i); -+#endif - - done: - pthread_mutex_unlock(&stores_lock); -@@ -304,8 +348,13 @@ done: - - /* Caller must hold stores_lock */ - static int -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - pkixip_do_add_store(int handle, int (*cmp)(X509_OBJECT **, X509_OBJECT **), - STACK *objs) -+#else -+pkixip_do_add_store(int handle, int (*cmp)(const X509_OBJECT * const *, X509_OBJECT * const *), -+ STACK_OF(X509_OBJECT) *objs) -+#endif - { - if (objs == NULL && (objs = sk_X509_OBJECT_new(cmp)) == NULL) { - applog(LOG_CRIT, "no memory"); -@@ -316,8 +365,13 @@ pkixip_do_add_store(int handle, int (*cmp)(X509_OBJECT - return (0); - } - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - int - pkixip_add_store(int *handle, int (*cmp)(X509_OBJECT **, X509_OBJECT **)) -+#else -+int -+pkixip_add_store(int *handle, int (*cmp)(const X509_OBJECT * const *, const X509_OBJECT * const *)) -+#endif - { - int r = 0; - -@@ -369,7 +423,7 @@ pkixip_get_store_ctx(void) - } - - pthread_mutex_lock(&stores_lock); -- if (pkixip_do_add_store(PKIXIP_STORE_BYSUBJ, x509_object_cmp, st->objs) -+ if (pkixip_do_add_store(PKIXIP_STORE_BYSUBJ, x509_object_cmp, X509_STORE_get0_objects(st)) - < 0) { - X509_STORE_free(st); - X509_STORE_CTX_free(ctx_bysubj); -@@ -396,17 +450,24 @@ pkixip_store_ctx_light_cleanup(X509_STORE_CTX *ctx) - { - // X509_STORE_CTX_cleanup(ctx); - -- if (ctx->chain != NULL) { -- sk_X509_pop_free(ctx->chain, noop_free); -+ if (X509_STORE_CTX_get0_chain(ctx) != NULL) { -+ sk_X509_pop_free(X509_STORE_CTX_get0_chain(ctx), noop_free); -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - ctx->chain=NULL; -+#endif - } -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE_CTX, ctx, - &(ctx->ex_data)); - memset(&ctx->ex_data,0,sizeof(CRYPTO_EX_DATA)); -+#else -+ CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE_CTX, ctx, -+ X509_STORE_CTX_get_app_data(ctx)); -+#endif - - #if 0 -- while (sk_num(ctx->chain) > 0) { -- sk_pop(ctx->chain); -+ while (sk_num(X509_STORE_CTX_get0_chain(ctx)) > 0) { -+ sk_pop(X509_STORE_CTX_get0_chain(ctx)); - } - #endif - } -@@ -445,10 +506,19 @@ pkixip_add2stores_cert(X509 *x) - int i, r = 0; - X509_STORE_CTX *ctx; - void *wrapper; -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - X509_OBJECT o[1]; -+#else -+ X509_OBJECT *o; - -- if ((ctx = pkixip_get_store_ctx()) == NULL) { -+ o = X509_OBJECT_new(); -+ if (o == NULL) - return (-1); -+#endif -+ -+ if ((ctx = pkixip_get_store_ctx()) == NULL) { -+ r = -1; -+ goto done2; - } - - pthread_mutex_lock(&stores_lock); -@@ -459,7 +529,11 @@ pkixip_add2stores_cert(X509 *x) - goto done; - } - -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - if (X509_STORE_add_cert(ctx->ctx, x) != 1) { -+#else -+ if (X509_STORE_add_cert(X509_STORE_CTX_get0_store(ctx), x) != 1) { -+#endif - pkixip_ssl_err(__FUNCTION__, "X509_STORE_add_cert() failed"); - r = -1; - goto done; -@@ -467,7 +541,8 @@ pkixip_add2stores_cert(X509 *x) - - if (wrap_store_cert) { - if ((wrapper = wrap_store_cert(x)) == NULL) { -- return (-1); -+ r = -1; -+ goto done2; - } - } else { - wrapper = x; -@@ -475,7 +550,11 @@ pkixip_add2stores_cert(X509 *x) - - for (i = 1; i < PKIXIP_MAX_STORES; i++) { - if (stores[i]) { -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - sk_push(stores[i], wrapper); -+#else -+ sk_X509_OBJECT_push(stores[i], wrapper); -+#endif - } - } - -@@ -484,6 +563,10 @@ pkixip_add2stores_cert(X509 *x) - - done: - pthread_mutex_unlock(&stores_lock); -+done2: -+#if OPENSSL_VERSION_NUMBER < 0x10100000L -+ free(o); -+#endif - return (r); - } *** 445 LINES SKIPPED ***