From patchwork Wed Sep 5 21:02:13 2018
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
X-Patchwork-Submitter: Khem Raj
Finally, you can use SSL for complete +-end-to-end encryption if you have an SSL-enabled mailserver.
++Finally, you can use SSL or TLS for complete ++end-to-end encryption if you have a TLS-enabled mailserver.
+ +You'll need to have the OpenSSL libraries installed, and they +-should at least be version 0.9.7. ++should at least be version 0.9.8, with 1.0.1 preferred. + Configure with --with-ssl. If you have the OpenSSL libraries + installed in commonly-used default locations, this will + suffice. If you have them installed in a non-default location, +@@ -2130,7 +2130,7 @@ to --with-ssl after an equal sign.
+Fetchmail binaries built this way support ssl
,
+ sslkey
, and sslcert
options that control
+ SSL encryption, and will automatically use tls
if the
+-server offers it. You will need to have an SSL-enabled mailserver to
++server offers it. You will need to have an SSL/TLS-enabled mailserver to
+ use these options. See the manual page for details and some words
+ of care on the limited security provided.
You should note that SSL is only secure against a "man-in-the-middle" +-attack if the client is able to verify that the peer's public key is the +-correct one, and has not been substituted by an attacker. fetchmail can do +-this in one of two ways: by verifying the SSL certificate, or by checking +-the fingerprint of the peer's public key.
++You should note that SSL or TLS are only secure against a ++"man-in-the-middle" attack if the client is able to verify that the ++peer's public key is the correct one, and has not been substituted by an ++attacker. fetchmail can do this in one of two ways: by verifying the SSL ++certificate, or by checking the fingerprint of the peer's public ++key.
+ +-There are three parts to SSL certificate verification: checking that the ++
There are three parts to TLS certificate verification: checking that the + domain name in the certificate matches the hostname you asked to connect to; + checking that the certificate expiry date has not passed; and checking that + the certificate has been signed by a known Certificate Authority (CA). This +@@ -2227,8 +2228,12 @@ will automatically attempt TLS negotiati + time. This can however cause problems if the upstream didn't configure + his certificates properly.
+ +-In order to prevent fetchmail from trying TLS (STLS, STARTTLS) +-negotiation, add this option:
++In order to prevent fetchmail 6.4.0 and newer versions from trying ++STLS or STARTTLS negotiation, add this option:
++sslproto ''++ ++
In order to prevent older fetchmail versions from trying TLS (STLS, STARTTLS) ++negotiation where the above does not work, try this option:
+ +sslproto ssl23+ +@@ -2876,15 +2881,22 @@ need to say something like '
envelo
+
+
+ Received: from send103.yahoomail.com (send103.yahoomail.com [205.180.60.92])
+- by iserv.ttns.net (8.8.5/8.8.5) with SMTP id RAA10088
+- for <ksturgeon@fbceg.org>; Wed, 9 Sep 1998 17:01:59 -0700
++ by iserv.example.net (8.8.5/8.8.5) with SMTP id RAA10088
++ for <ksturgeon@fbceg.example.org>; Wed, 9 Sep 1998 17:01:59 -0700
+
+
+-it checks to see if 'iserv.ttns.net' is a DNS alias of your
+-mailserver before accepting 'ksturgeon@fbceg.org' as an envelope
++
it checks to see if 'iserv.example.net' is a DNS alias of your
++mailserver before accepting 'ksturgeon@fbceg.example.org' as an envelope
+ address. This check might fail if your DNS were misconfigured, or
+-if you were using 'no dns' and had failed to declare iserv.ttns.net
+-as an alias of your server.
++if you were using 'no dns' and had failed to declare iserv.example.net
++as an alias of your server. The typical hint is logging similar to:
++line rejected, iserv.example.net is not an alias of the mailserver
,
++if you use fetchmail in verbose mode.
++
++Workaround: You can specify the alias explicitly, with aka
++ iserv.example.net
statements in the rcfile. Replace
++iserv.example.net by the name you find in your
++'by' part of the 'Received:' line.
+
+ M8. Users are getting multiple copies of
+ messages.
+@@ -3237,6 +3249,8 @@ Hayes mode escape "+++".
+ X8. A spurious ) is being appended to my
+ messages.
+
++Fetchmail 6.3.5 and newer releases are supposed to fix this.
++
+ Due to the problem described in S2, the
+ IMAP support in fetchmail cannot follow the IMAP protocol 100 %.
+ Most of the time it doesn't matter, but if you combine it with an
+@@ -3279,8 +3293,6 @@ it at the end of the message it forwards
+ on, you'll get a message about actual != expected.
+
+
+-
There is no fix for this.
+-
+ X9. Missing "Content-Transfer-Encoding" header
+ with Domino IMAP
+
+--- fetchmail-6.3.26.orig/fetchmail.c
++++ fetchmail-6.3.26/fetchmail.c
+@@ -54,6 +54,10 @@
+ #define ENETUNREACH 128 /* Interactive doesn't know this */
+ #endif /* ENETUNREACH */
+
++#ifdef SSL_ENABLE
++#include /* for OPENSSL_NO_SSL2 and ..._SSL3 checks */
++#endif
++
+ /* prototypes for internal functions */
+ static int load_params(int, char **, int);
+ static void dump_params (struct runctl *runp, struct query *, flag implicit);
+@@ -138,7 +142,7 @@ static void printcopyright(FILE *fp) {
+ "Copyright (C) 2004 Matthias Andree, Eric S. Raymond,\n"
+ " Robert M. Funk, Graham Wilson\n"
+ "Copyright (C) 2005 - 2012 Sunil Shetye\n"
+- "Copyright (C) 2005 - 2013 Matthias Andree\n"
++ "Copyright (C) 2005 - 2015 Matthias Andree\n"
+ ));
+ fprintf(fp, GT_("Fetchmail comes with ABSOLUTELY NO WARRANTY. This is free software, and you\n"
+ "are welcome to redistribute it under certain conditions. For details,\n"
+@@ -262,6 +266,9 @@ int main(int argc, char **argv)
+ #endif /* ODMR_ENABLE */
+ #ifdef SSL_ENABLE
+ "+SSL"
++#if (HAVE_DECL_SSLV3_CLIENT_METHOD + 0 == 0) || defined(OPENSSL_NO_SSL3)
++ "-SSLv3"
++#endif
+ #endif
+ #ifdef OPIE_ENABLE
+ "+OPIE"
+--- fetchmail-6.3.26.orig/fetchmail.h
++++ fetchmail-6.3.26/fetchmail.h
+@@ -771,9 +771,9 @@ int servport(const char *service);
+ int fm_getaddrinfo(const char *node, const char *serv, const struct addrinfo *hints, struct addrinfo **res);
+ void fm_freeaddrinfo(struct addrinfo *ai);
+
+-/* prototypes from tls.c */
+-int maybe_tls(struct query *ctl);
+-int must_tls(struct query *ctl);
++/* prototypes from starttls.c */
++int maybe_starttls(struct query *ctl);
++int must_starttls(struct query *ctl);
+
+ /* prototype from rfc822valid.c */
+ int rfc822_valid_msgid(const unsigned char *);
+--- fetchmail-6.3.26.orig/fetchmail.man
++++ fetchmail-6.3.26/fetchmail.man
+@@ -412,23 +412,22 @@ from. The folder information is written
+ .B \-\-ssl
+ (Keyword: ssl)
+ .br
+-Causes the connection to the mail server to be encrypted
+-via SSL. Connect to the server using the specified base protocol over a
+-connection secured by SSL. This option defeats opportunistic starttls
+-negotiation. It is highly recommended to use \-\-sslproto 'SSL3'
+-\-\-sslcertck to validate the certificates presented by the server and
+-defeat the obsolete SSLv2 negotiation. More information is available in
+-the \fIREADME.SSL\fP file that ships with fetchmail.
+-.IP
+-Note that fetchmail may still try to negotiate SSL through starttls even
+-if this option is omitted. You can use the \-\-sslproto option to defeat
+-this behavior or tell fetchmail to negotiate a particular SSL protocol.
++Causes the connection to the mail server to be encrypted via SSL, by
++negotiating SSL directly after connecting (SSL-wrapped mode). It is
++highly recommended to use \-\-sslcertck to validate the certificates
++presented by the server. Please see the description of \-\-sslproto
++below! More information is available in the \fIREADME.SSL\fP file that
++ships with fetchmail.
++.IP
++Note that even if this option is omitted, fetchmail may still negotiate
++SSL in-band for POP3 or IMAP, through the STLS or STARTTLS feature. You
++can use the \-\-sslproto option to modify that behavior.
+ .IP
+ If no port is specified, the connection is attempted to the well known
+ port of the SSL version of the base protocol. This is generally a
+ different port than the port used by the base protocol. For IMAP, this
+ is port 143 for the clear protocol and port 993 for the SSL secured
+-protocol, for POP3, it is port 110 for the clear text and port 995 for
++protocol; for POP3, it is port 110 for the clear text and port 995 for
+ the encrypted variant.
+ .IP
+ If your system lacks the corresponding entries from /etc/services, see
+@@ -470,39 +469,73 @@ cause some complications in daemon mode.
+ .IP
+ Also see \-\-sslcert above.
+ .TP
+-.B \-\-sslproto
+-(Keyword: sslproto)
++.B \-\-sslproto
++(Keyword: sslproto, NOTE: semantic changes since v6.4.0)
+ .br
+-Forces an SSL/TLS protocol. Possible values are \fB''\fP,
+-\&'\fBSSL2\fP' (not supported on all systems),
+-\&'\fBSSL23\fP', (use of these two values is discouraged
+-and should only be used as a last resort) \&'\fBSSL3\fP', and
+-\&'\fBTLS1\fP'. The default behaviour if this option is unset is: for
+-connections without \-\-ssl, use \&'\fBTLS1\fP' so that fetchmail will
+-opportunistically try STARTTLS negotiation with TLS1. You can configure
+-this option explicitly if the default handshake (TLS1 if \-\-ssl is not
+-used) does not work for your server.
+-.IP
+-Use this option with '\fBTLS1\fP' value to enforce a STARTTLS
+-connection. In this mode, it is highly recommended to also use
+-\-\-sslcertck (see below). Note that this will then cause fetchmail
+-v6.3.19 to force STARTTLS negotiation even if it is not advertised by
+-the server.
+-.IP
+-To defeat opportunistic TLSv1 negotiation when the server advertises
+-STARTTLS or STLS, and use a cleartext connection use \fB''\fP. This
+-option, even if the argument is the empty string, will also suppress the
+-diagnostic 'SERVER: opportunistic upgrade to TLS.' message in verbose
+-mode. The default is to try appropriate protocols depending on context.
++This option has a dual use, out of historic fetchmail behaviour. It
++controls both the SSL/TLS protocol version and, if \-\-ssl is not
++specified, the STARTTLS behaviour (upgrading the protocol to an SSL or
++TLS connection in-band). Some other options may however make TLS
++mandatory.
++.PP
++Only if this option and \-\-ssl are both missing for a poll, there will
++be opportunistic TLS for POP3 and IMAP, where fetchmail will attempt to
++upgrade to TLSv1 or newer.
++.PP
++Recognized values for \-\-sslproto are given below. You should normally
++chose one of the auto-negotiating options, i. e. '\fBauto\fP' or one of
++the options ending in a plus (\fB+\fP) character. Note that depending
++on OpenSSL library version and configuration, some options cause
++run-time errors because the requested SSL or TLS versions are not
++supported by the particular installed OpenSSL library.
++.RS
++.IP "\fB''\fP, the empty string"
++Disable STARTTLS. If \-\-ssl is given for the same server, log an error
++and pretend that '\fBauto\fP' had been used instead.
++.IP '\fBauto\fP'
++(default). Since v6.4.0. Require TLS. Auto-negotiate TLSv1 or newer, disable SSLv3 downgrade.
++(fetchmail 6.3.26 and older have auto-negotiated all protocols that
++their OpenSSL library supported, including the broken SSLv3).
++.IP "\&'\fBSSL23\fP'
++see '\fBauto\fP'.
++.IP \&'\fBSSL3\fP'
++Require SSLv3 exactly. SSLv3 is broken, not supported on all systems, avoid it
++if possible. This will make fetchmail negotiate SSLv3 only, and is the
++only way besides '\fBSSL3+\fP' to have fetchmail 6.4.0 or newer permit SSLv3.
++.IP \&'\fBSSL3+\fP'
++same as '\fBauto\fP', but permit SSLv3 as well. This is the only way
++besides '\fBSSL3\fP' to have fetchmail 6.4.0 or newer permit SSLv3.
++.IP \&'\fBTLS1\fP'
++Require TLSv1. This does not negotiate TLSv1.1 or newer, and is
++discouraged. Replace by TLS1+ unless the latter chokes your server.
++.IP \&'\fBTLS1+\fP'
++Since v6.4.0. See 'fBauto\fP'.
++.IP \&'\fBTLS1.1\fP'
++Since v6.4.0. Require TLS v1.1 exactly.
++.IP \&'\fBTLS1.1+\fP'
++Since v6.4.0. Require TLS. Auto-negotiate TLSv1.1 or newer.
++.IP \&'\fBTLS1.2\fP'
++Since v6.4.0. Require TLS v1.2 exactly.
++.IP '\fBTLS1.2+\fP'
++Since v6.4.0. Require TLS. Auto-negotiate TLSv1.2 or newer.
++.IP "Unrecognized parameters"
++are treated the same as '\fBauto\fP'.
++.RE
++.IP
++NOTE: you should hardly ever need to use anything other than '' (to
++force an unencrypted connection) or 'auto' (to enforce TLS).
+ .TP
+ .B \-\-sslcertck
+ (Keyword: sslcertck)
+ .br
+-Causes fetchmail to strictly check the server certificate against a set of
+-local trusted certificates (see the \fBsslcertfile\fP and \fBsslcertpath\fP
+-options). If the server certificate cannot be obtained or is not signed by one
+-of the trusted ones (directly or indirectly), the SSL connection will fail,
+-regardless of the \fBsslfingerprint\fP option.
++Causes fetchmail to require that SSL/TLS be used and disconnect if it
++can not successfully negotiate SSL or TLS, or if it cannot successfully
++verify and validate the certificate and follow it to a trust anchor (or
++trusted root certificate). The trust anchors are given as a set of local
++trusted certificates (see the \fBsslcertfile\fP and \fBsslcertpath\fP
++options). If the server certificate cannot be obtained or is not signed
++by one of the trusted ones (directly or indirectly), fetchmail will
++disconnect, regardless of the \fBsslfingerprint\fP option.
+ .IP
+ Note that CRL (certificate revocation lists) are only supported in
+ OpenSSL 0.9.7 and newer! Your system clock should also be reasonably
+@@ -1202,31 +1235,33 @@ capability response. Specify a user opti
+ username and the part to the right as the NTLM domain.
+
+ .SS Secure Socket Layers (SSL) and Transport Layer Security (TLS)
++.PP All retrieval protocols can use SSL or TLS wrapping for the
++transport. Additionally, POP3 and IMAP retrival can also negotiate
++SSL/TLS by means of STARTTLS (or STLS).
+ .PP
+ Note that fetchmail currently uses the OpenSSL library, which is
+ severely underdocumented, so failures may occur just because the
+ programmers are not aware of OpenSSL's requirement of the day.
+ For instance, since v6.3.16, fetchmail calls
+ OpenSSL_add_all_algorithms(), which is necessary to support certificates
+-using SHA256 on OpenSSL 0.9.8 -- this information is deeply hidden in the
+-documentation and not at all obvious. Please do not hesitate to report
+-subtle SSL failures.
+-.PP
+-You can access SSL encrypted services by specifying the \-\-ssl option.
+-You can also do this using the "ssl" user option in the .fetchmailrc
+-file. With SSL encryption enabled, queries are initiated over a
+-connection after negotiating an SSL session, and the connection fails if
+-SSL cannot be negotiated. Some services, such as POP3 and IMAP, have
++using SHA256 on OpenSSL 0.9.8 -- this information is deeply hidden in
++the documentation and not at all obvious. Please do not hesitate to
++report subtle SSL failures.
++.PP
++You can access SSL encrypted services by specifying the options starting
++with \-\-ssl, such as \-\-ssl, \-\-sslproto, \-\-sslcertck, and others.
++You can also do this using the corresponding user options in the .fetchmailrc
++file. Some services, such as POP3 and IMAP, have
+ different well known ports defined for the SSL encrypted services. The
+ encrypted ports will be selected automatically when SSL is enabled and
+-no explicit port is specified. The \-\-sslproto 'SSL3' option should be
+-used to select the SSLv3 protocol (default if unset: v2 or v3). Also,
+-the \-\-sslcertck command line or sslcertck run control file option
+-should be used to force strict certificate checking - see below.
++no explicit port is specified. Also, the \-\-sslcertck command line or
++sslcertck run control file option should be used to force strict
++certificate checking - see below.
+ .PP
+ If SSL is not configured, fetchmail will usually opportunistically try to use
+-STARTTLS. STARTTLS can be enforced by using \-\-sslproto "TLS1". TLS
+-connections use the same port as the unencrypted version of the
++STARTTLS. STARTTLS can be enforced by using \-\-sslproto\~auto and
++defeated by using \-\-sslproto\~''.
++TLS connections use the same port as the unencrypted version of the
+ protocol and negotiate TLS via special command. The \-\-sslcertck
+ command line or sslcertck run control file option should be used to
+ force strict certificate checking - see below.
+--- fetchmail-6.3.26.orig/imap.c
++++ fetchmail-6.3.26/imap.c
+@@ -405,6 +405,8 @@ static int imap_getauth(int sock, struct
+ /* apply for connection authorization */
+ {
+ int ok = 0;
++ char *commonname;
++
+ (void)greeting;
+
+ /*
+@@ -429,25 +431,21 @@ static int imap_getauth(int sock, struct
+ return(PS_SUCCESS);
+ }
+
+-#ifdef SSL_ENABLE
+- if (maybe_tls(ctl)) {
+- char *commonname;
+-
+- commonname = ctl->server.pollname;
+- if (ctl->server.via)
+- commonname = ctl->server.via;
+- if (ctl->sslcommonname)
+- commonname = ctl->sslcommonname;
++ commonname = ctl->server.pollname;
++ if (ctl->server.via)
++ commonname = ctl->server.via;
++ if (ctl->sslcommonname)
++ commonname = ctl->sslcommonname;
+
+- if (strstr(capabilities, "STARTTLS")
+- || must_tls(ctl)) /* if TLS is mandatory, ignore capabilities */
++#ifdef SSL_ENABLE
++ if (maybe_starttls(ctl)) {
++ if ((strstr(capabilities, "STARTTLS") && maybe_starttls(ctl))
++ || must_starttls(ctl)) /* if TLS is mandatory, ignore capabilities */
+ {
+- /* Use "tls1" rather than ctl->sslproto because tls1 is the only
+- * protocol that will work with STARTTLS. Don't need to worry
+- * whether TLS is mandatory or opportunistic unless SSLOpen() fails
+- * (see below). */
++ /* Don't need to worry whether TLS is mandatory or
++ * opportunistic unless SSLOpen() fails (see below). */
+ if (gen_transact(sock, "STARTTLS") == PS_SUCCESS
+- && (set_timeout(mytimeout), SSLOpen(sock, ctl->sslcert, ctl->sslkey, "tls1", ctl->sslcertck,
++ && (set_timeout(mytimeout), SSLOpen(sock, ctl->sslcert, ctl->sslkey, ctl->sslproto, ctl->sslcertck,
+ ctl->sslcertfile, ctl->sslcertpath, ctl->sslfingerprint, commonname,
+ ctl->server.pollname, &ctl->remotename)) != -1)
+ {
+@@ -470,7 +468,7 @@ static int imap_getauth(int sock, struct
+ {
+ report(stdout, GT_("%s: upgrade to TLS succeeded.\n"), commonname);
+ }
+- } else if (must_tls(ctl)) {
++ } else if (must_starttls(ctl)) {
+ /* Config required TLS but we couldn't guarantee it, so we must
+ * stop. */
+ set_timeout(0);
+@@ -492,6 +490,10 @@ static int imap_getauth(int sock, struct
+ /* Usable. Proceed with authenticating insecurely. */
+ }
+ }
++ } else {
++ if (strstr(capabilities, "STARTTLS") && outlevel >= O_VERBOSE) {
++ report(stdout, GT_("%s: WARNING: server offered STARTTLS but sslproto '' given.\n"), commonname);
++ }
+ }
+ #endif /* SSL_ENABLE */
+
+--- fetchmail-6.3.26.orig/po/Makevars
++++ fetchmail-6.3.26/po/Makevars
+@@ -46,3 +46,15 @@ MSGID_BUGS_ADDRESS = fetchmail-devel@lis
+ # This is the list of locale categories, beyond LC_MESSAGES, for which the
+ # message catalogs shall be used. It is usually empty.
+ EXTRA_LOCALE_CATEGORIES =
++
++# This tells whether the $(DOMAIN).pot file contains messages with an 'msgctxt'
++# context. Possible values are "yes" and "no". Set this to yes if the
++# package uses functions taking also a message context, like pgettext(), or
++# if in $(XGETTEXT_OPTIONS) you define keywords with a context argument.
++USE_MSGCTXT = no
++
++# These options get passed to msgmerge.
++# Useful options are in particular:
++# --previous to keep previous msgids of translated messages,
++# --quiet to reduce the verbosity.
++MSGMERGE_OPTIONS =
+--- fetchmail-6.3.26.orig/pop3.c
++++ fetchmail-6.3.26/pop3.c
+@@ -281,6 +281,7 @@ static int pop3_getauth(int sock, struct
+ #endif /* OPIE_ENABLE */
+ #ifdef SSL_ENABLE
+ flag connection_may_have_tls_errors = FALSE;
++ char *commonname;
+ #endif /* SSL_ENABLE */
+
+ done_capa = FALSE;
+@@ -393,7 +394,7 @@ static int pop3_getauth(int sock, struct
+ (ctl->server.authenticate == A_KERBEROS_V5) ||
+ (ctl->server.authenticate == A_OTP) ||
+ (ctl->server.authenticate == A_CRAM_MD5) ||
+- maybe_tls(ctl))
++ maybe_starttls(ctl))
+ {
+ if ((ok = capa_probe(sock)) != PS_SUCCESS)
+ /* we are in STAGE_GETAUTH => failure is PS_AUTHFAIL! */
+@@ -406,12 +407,12 @@ static int pop3_getauth(int sock, struct
+ (ok == PS_SOCKET && !ctl->wehaveauthed))
+ {
+ #ifdef SSL_ENABLE
+- if (must_tls(ctl)) {
++ if (must_starttls(ctl)) {
+ /* fail with mandatory STLS without repoll */
+ report(stderr, GT_("TLS is mandatory for this session, but server refused CAPA command.\n"));
+ report(stderr, GT_("The CAPA command is however necessary for TLS.\n"));
+ return ok;
+- } else if (maybe_tls(ctl)) {
++ } else if (maybe_starttls(ctl)) {
+ /* defeat opportunistic STLS */
+ xfree(ctl->sslproto);
+ ctl->sslproto = xstrdup("");
+@@ -431,24 +432,19 @@ static int pop3_getauth(int sock, struct
+ }
+
+ #ifdef SSL_ENABLE
+- if (maybe_tls(ctl)) {
+- char *commonname;
++ commonname = ctl->server.pollname;
++ if (ctl->server.via)
++ commonname = ctl->server.via;
++ if (ctl->sslcommonname)
++ commonname = ctl->sslcommonname;
+
+- commonname = ctl->server.pollname;
+- if (ctl->server.via)
+- commonname = ctl->server.via;
+- if (ctl->sslcommonname)
+- commonname = ctl->sslcommonname;
+-
+- if (has_stls
+- || must_tls(ctl)) /* if TLS is mandatory, ignore capabilities */
++ if (maybe_starttls(ctl)) {
++ if (has_stls || must_starttls(ctl)) /* if TLS is mandatory, ignore capabilities */
+ {
+- /* Use "tls1" rather than ctl->sslproto because tls1 is the only
+- * protocol that will work with STARTTLS. Don't need to worry
+- * whether TLS is mandatory or opportunistic unless SSLOpen() fails
+- * (see below). */
++ /* Don't need to worry whether TLS is mandatory or
++ * opportunistic unless SSLOpen() fails (see below). */
+ if (gen_transact(sock, "STLS") == PS_SUCCESS
+- && (set_timeout(mytimeout), SSLOpen(sock, ctl->sslcert, ctl->sslkey, "tls1", ctl->sslcertck,
++ && (set_timeout(mytimeout), SSLOpen(sock, ctl->sslcert, ctl->sslkey, ctl->sslproto, ctl->sslcertck,
+ ctl->sslcertfile, ctl->sslcertpath, ctl->sslfingerprint, commonname,
+ ctl->server.pollname, &ctl->remotename)) != -1)
+ {
+@@ -475,7 +471,7 @@ static int pop3_getauth(int sock, struct
+ {
+ report(stdout, GT_("%s: upgrade to TLS succeeded.\n"), commonname);
+ }
+- } else if (must_tls(ctl)) {
++ } else if (must_starttls(ctl)) {
+ /* Config required TLS but we couldn't guarantee it, so we must
+ * stop. */
+ set_timeout(0);
+@@ -495,7 +491,11 @@ static int pop3_getauth(int sock, struct
+ }
+ }
+ }
+- } /* maybe_tls() */
++ } else { /* maybe_starttls() */
++ if (has_stls && outlevel >= O_VERBOSE) {
++ report(stdout, GT_("%s: WARNING: server offered STLS, but sslproto '' given.\n"), commonname);
++ }
++ } /* maybe_starttls() */
+ #endif /* SSL_ENABLE */
+
+ /*
+--- fetchmail-6.3.26.orig/socket.c
++++ fetchmail-6.3.26/socket.c
+@@ -876,7 +876,9 @@ int SSLOpen(int sock, char *mycert, char
+ {
+ struct stat randstat;
+ int i;
++ int avoid_ssl_versions = SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3;
+ long sslopts = SSL_OP_ALL;
++ int ssle_connect = 0;
+
+ SSL_load_error_strings();
+ SSL_library_init();
+@@ -906,25 +908,57 @@ int SSLOpen(int sock, char *mycert, char
+ /* Make sure a connection referring to an older context is not left */
+ _ssl_context[sock] = NULL;
+ if(myproto) {
+- if(!strcasecmp("ssl2",myproto)) {
+-#if HAVE_DECL_SSLV2_CLIENT_METHOD + 0 > 0
+- _ctx[sock] = SSL_CTX_new(SSLv2_client_method());
++ if(!strcasecmp("ssl3",myproto)) {
++#if (HAVE_DECL_SSLV3_CLIENT_METHOD > 0) && (0 == OPENSSL_NO_SSL3 + 0)
++ _ctx[sock] = SSL_CTX_new(SSLv3_client_method());
++ avoid_ssl_versions &= ~SSL_OP_NO_SSLv3;
+ #else
+- report(stderr, GT_("Your operating system does not support SSLv2.\n"));
++ report(stderr, GT_("Your OpenSSL version does not support SSLv3.\n"));
+ return -1;
+ #endif
+- } else if(!strcasecmp("ssl3",myproto)) {
+- _ctx[sock] = SSL_CTX_new(SSLv3_client_method());
++ } else if(!strcasecmp("ssl3+",myproto)) {
++ avoid_ssl_versions &= ~SSL_OP_NO_SSLv3;
++ myproto = NULL;
+ } else if(!strcasecmp("tls1",myproto)) {
+ _ctx[sock] = SSL_CTX_new(TLSv1_client_method());
+- } else if (!strcasecmp("ssl23",myproto)) {
++ } else if(!strcasecmp("tls1+",myproto)) {
++ myproto = NULL;
++#if defined(TLS1_1_VERSION) && TLS_MAX_VERSION >= TLS1_1_VERSION
++ } else if(!strcasecmp("tls1.1",myproto)) {
++ _ctx[sock] = SSL_CTX_new(TLSv1_1_client_method());
++ } else if(!strcasecmp("tls1.1+",myproto)) {
++ myproto = NULL;
++ avoid_ssl_versions |= SSL_OP_NO_TLSv1;
++#else
++ } else if(!strcasecmp("tls1.1",myproto) || !strcasecmp("tls1.1+", myproto)) {
++ report(stderr, GT_("Your OpenSSL version does not support TLS v1.1.\n"));
++ return -1;
++#endif
++#if defined(TLS1_2_VERSION) && TLS_MAX_VERSION >= TLS1_2_VERSION
++ } else if(!strcasecmp("tls1.2",myproto)) {
++ _ctx[sock] = SSL_CTX_new(TLSv1_2_client_method());
++ } else if(!strcasecmp("tls1.2+",myproto)) {
++ myproto = NULL;
++ avoid_ssl_versions |= SSL_OP_NO_TLSv1;
++ avoid_ssl_versions |= SSL_OP_NO_TLSv1_1;
++#else
++ } else if(!strcasecmp("tls1.2",myproto) || !strcasecmp("tls1.2+", myproto)) {
++ report(stderr, GT_("Your OpenSSL version does not support TLS v1.2.\n"));
++ return -1;
++#endif
++ } else if (!strcasecmp("ssl23",myproto) || 0 == strcasecmp("auto",myproto)) {
+ myproto = NULL;
+ } else {
+- report(stderr,GT_("Invalid SSL protocol '%s' specified, using default (SSLv23).\n"), myproto);
++ report(stderr,GT_("Invalid SSL protocol '%s' specified, using default autoselect (SSL23).\n"), myproto);
+ myproto = NULL;
+ }
+ }
+- if(!myproto) {
++ // do not combine into an else { } as myproto may be nulled
++ // above!
++ if (!myproto) {
++ // SSLv23 is a misnomer and will in fact use the best
++ // available protocol, subject to SSL_OP_NO*
++ // constraints.
+ _ctx[sock] = SSL_CTX_new(SSLv23_client_method());
+ }
+ if(_ctx[sock] == NULL) {
+@@ -938,7 +972,7 @@ int SSLOpen(int sock, char *mycert, char
+ sslopts &= ~ SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS;
+ }
+
+- SSL_CTX_set_options(_ctx[sock], sslopts);
++ SSL_CTX_set_options(_ctx[sock], sslopts | avoid_ssl_versions);
+
+ if (certck) {
+ SSL_CTX_set_verify(_ctx[sock], SSL_VERIFY_PEER, SSL_ck_verify_callback);
+@@ -1008,8 +1042,18 @@ int SSLOpen(int sock, char *mycert, char
+ }
+
+ if (SSL_set_fd(_ssl_context[sock], sock) == 0
+- || SSL_connect(_ssl_context[sock]) < 1) {
++ || (ssle_connect = SSL_connect(_ssl_context[sock])) < 1) {
++ int e = errno;
++ unsigned long ssle_err_from_queue = ERR_peek_error();
++ unsigned long ssle_err_from_get_error = SSL_get_error(_ssl_context[sock], ssle_connect);
+ ERR_print_errors_fp(stderr);
++ if (SSL_ERROR_SYSCALL == ssle_err_from_get_error && 0 == ssle_err_from_queue) {
++ if (0 == ssle_connect) {
++ report(stderr, GT_("Server shut down connection prematurely during SSL_connect().\n"));
++ } else if (ssle_connect < 0) {
++ report(stderr, GT_("System error during SSL_connect(): %s\n"), strerror(e));
++ }
++ }
+ SSL_free( _ssl_context[sock] );
+ _ssl_context[sock] = NULL;
+ SSL_CTX_free(_ctx[sock]);
+@@ -1017,6 +1061,24 @@ int SSLOpen(int sock, char *mycert, char
+ return(-1);
+ }
+
++ if (outlevel >= O_VERBOSE) {
++ SSL_CIPHER const *sc;
++ int bitsmax, bitsused;
++
++ const char *ver;
++
++ ver = SSL_get_version(_ssl_context[sock]);
++
++ sc = SSL_get_current_cipher(_ssl_context[sock]);
++ if (!sc) {
++ report (stderr, GT_("Cannot obtain current SSL/TLS cipher - no session established?\n"));
++ } else {
++ bitsused = SSL_CIPHER_get_bits(sc, &bitsmax);
++ report(stdout, GT_("SSL/TLS: using protocol %s, cipher %s, %d/%d secret/processed bits\n"),
++ ver, SSL_CIPHER_get_name(sc), bitsused, bitsmax);
++ }
++ }
++
+ /* Paranoia: was the callback not called as we expected? */
+ if (!_depth0ck) {
+ report(stderr, GT_("Certificate/fingerprint verification was somehow skipped!\n"));
+--- /dev/null
++++ fetchmail-6.3.26/starttls.c
+@@ -0,0 +1,37 @@
++/** \file tls.c - collect common TLS functionality
++ * \author Matthias Andree
++ * \date 2006
++ */
++
++#include "fetchmail.h"
++
++#include
++
++#ifdef HAVE_STRINGS_H
++#include
++#endif
++
++/** return true if user allowed opportunistic STARTTLS/STLS */
++int maybe_starttls(struct query *ctl) {
++#ifdef SSL_ENABLE
++ /* opportunistic or forced TLS */
++ return (!ctl->sslproto || strlen(ctl->sslproto))
++ && !ctl->use_ssl;
++#else
++ (void)ctl;
++ return 0;
++#endif
++}
++
++/** return true if user requires STARTTLS/STLS, note though that this
++ * code must always use a logical AND with maybe_tls(). */
++int must_starttls(struct query *ctl) {
++#ifdef SSL_ENABLE
++ return maybe_starttls(ctl)
++ && (ctl->sslfingerprint || ctl->sslcertck
++ || (ctl->sslproto && !strcasecmp(ctl->sslproto, "tls1")));
++#else
++ (void)ctl;
++ return 0;
++#endif
++}
diff --git a/meta-networking/recipes-support/fetchmail/fetchmail_6.3.26.bb b/meta-networking/recipes-support/fetchmail/fetchmail_6.3.26.bb
index 1d78288c88..5af5d0df62 100644
--- a/meta-networking/recipes-support/fetchmail/fetchmail_6.3.26.bb
+++ b/meta-networking/recipes-support/fetchmail/fetchmail_6.3.26.bb
@@ -7,7 +7,9 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=fbb509e0303f5ded1cbfc0cc8705f28c"
DEPENDS = "openssl"
-SRC_URI = "${SOURCEFORGE_MIRROR}/${BPN}/${BPN}-${PV}.tar.xz"
+SRC_URI = "${SOURCEFORGE_MIRROR}/${BPN}/${BPN}-${PV}.tar.xz \
+ file://02_remove_SSLv3.patch \
+ "
SRC_URI[md5sum] = "61b66faad044afa26e142bb1791aa2b3"
SRC_URI[sha256sum] = "79b4c54cdbaf02c1a9a691d9948fcb1a77a1591a813e904283a8b614b757e850"
From patchwork Wed Sep 5 21:02:18 2018
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: Khem Raj
X-Patchwork-Id: 146044
Delivered-To: patch@linaro.org
Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp29887ljw;
Wed, 5 Sep 2018 14:03:17 -0700 (PDT)
X-Google-Smtp-Source: ANB0Vda2H7Hy7CHhgPRyQ2NPhGwnRXRVO2RXiAR+ku+LlR8smdCo/lj0o02bVOXoPFp4vxy8vlQV
X-Received: by 2002:a63:1363:: with SMTP id
35-v6mr38673090pgt.202.1536181397512;
Wed, 05 Sep 2018 14:03:17 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1536181397; cv=none;
d=google.com; s=arc-20160816;
b=FzP/HAEqUqVg778DxHtavtj5VM1ACIiQxFNT/DuyyyGPdk6vGVLicdwl23WsdAMlBe
GLWgHUFPv7DG4wFSuRKvTS3J/NPSfIEGqSxZcjCr90bDazomwxysnMnb2ipAWSM/dtl9
ay5a8PcG3aH3OxfhGkF40OroQsuNWJoNkFtWTezP9nziNQQe6yckmFBdv8skd1mWn0O9
yDRCf5maMYGbBEkEGtLcABZBFKAQR1cb23gQjs4AsgcV1QrJSeTEVAKuZiBL9spP5ZkX
2rPOj1yUPWEg/XSIOK6aLiVxYK8kXBlnFfv6Yh9SelwdfZ56ZMJwVk3zeEyynyngTiPr
jaXg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
s=arc-20160816;
h=errors-to:sender:content-transfer-encoding:mime-version
:list-subscribe:list-help:list-post:list-archive:list-unsubscribe
:list-id:precedence:subject:references:in-reply-to:message-id:date
:to:from:dkim-signature:delivered-to;
bh=8N3yMwYYI5h+pfty5rFEDgA6UL/psl1dRl9BPjDU8TI=;
b=WGMTAAZx8sfZxnFFJDU74tqNK6NqbfJ7T2uxQZigUw4q9uAa3YbARBiWJlq36Nok4e
SeT2nMKw/yvMrW6wOZLTB7dK6QymZ/2Xaeg8/Is+tqwsV0xlKaIP2w052rMRSCogRlEB
d58RKm8RAvMxQzh0EGgmGZRVo7ME1ZI7e8LdSxGiX3dUkwIz/syku5ywq3e6wZ5cnCD1
be+lMjKm7B/cI4HFhcGIBSjuLm2bnM6xXvEuKFvonRSV21mn4rSqj6nhRcjIxp2qA+1I
yVb6HeuCzcwH8Z9IiD+whkIUw6Q67I7n12Awt8Zh/GqqXAGi5Mi6UU9mNvhyv8aXtmH/
HJWA==
ARC-Authentication-Results: i=1; mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=KTr7jqAO;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Return-Path:
Received: from mail.openembedded.org (mail.openembedded.org.
[140.211.169.62]) by mx.google.com with ESMTP id
f29-v6si3150949pgl.570.2018.09.05.14.03.17;
Wed, 05 Sep 2018 14:03:17 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender) client-ip=140.211.169.62;
Authentication-Results: mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=KTr7jqAO;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Received: from layers.openembedded.org (localhost [127.0.0.1])
by mail.openembedded.org (Postfix) with ESMTP id AA163794A2;
Wed, 5 Sep 2018 21:02:57 +0000 (UTC)
X-Original-To: openembedded-devel@lists.openembedded.org
Delivered-To: openembedded-devel@lists.openembedded.org
Received: from mail-pg1-f174.google.com (mail-pg1-f174.google.com
[209.85.215.174])
by mail.openembedded.org (Postfix) with ESMTP id E1F00793E6
for ;
Wed, 5 Sep 2018 21:02:36 +0000 (UTC)
Received: by mail-pg1-f174.google.com with SMTP id d19-v6so4044882pgv.1
for ;
Wed, 05 Sep 2018 14:02:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=from:to:cc:subject:date:message-id:in-reply-to:references;
bh=muKjt7AYmpPdhmepByEc2LWX7VJ7wXc6naC8xbI2LiU=;
b=KTr7jqAO+R5bSYYmo2qzS7dJp4ehYqpWYs2KQnH052qEZVjXcPhlbmjSN537WNBR/7
GsYS7fsieuj37gRVmpA7hNTTgP7yvBirRTZiRv9pTU62kdZrC+qkmHi6ygCpA5VXq643
no1SAA2ZOY9aeyYzMN+Y/N1EvbbJR/Tdo8WK1L6sVzYRwxp5bqh3eJKKqRdXeT90Moyu
ygYp+szBVw533BaEg2Z4dBKq8ZSgwK1Lk9hSFTUeKoa1Lh7Ivj1vy9autgdylm40uket
9C6sGl7R86BeX+WrzhO+xuUMF5/BeR/L1pl7INIO4PIFDQ6B9KM5cIl5Pzpx9EZ7u6Ka
pjPw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
:references;
bh=muKjt7AYmpPdhmepByEc2LWX7VJ7wXc6naC8xbI2LiU=;
b=PDPgFhGCsrNEYS287S7jBa55VttP/Dd9F8BGi4KwkOkI74uxGpmlrRirgCnhlL/bBh
dkgFa8fGgsYZRgdcdzXzuVytTeWsuBDHl8vRMPasG3gzh1s4L0rX6JL6nFlXiHt3xpvu
zVRljpQhe6Ea4WVK3PHtvbUGw8PM77NNWiUa/vpGgqiCQ/RFnwr6PQBjW7auizYWOFE4
moGzKoSm/dZNshNuLhdUb4q4OMAkbUzxsb3x3nMqqaeupwVzthFk26x8X6MNtWuGDayd
lMCg01h9l6P7OOTOI3LW3fw/yIG9XbtKYpTH4crMAfOH+TJl7lw2gFGRN3NMcs3fi6lP
9UJg==
X-Gm-Message-State: APzg51A8Eaq4CCWeay6MM0qdn4b20hcqT5KBPiHFimMOG5HHeSUQ6AtE
98PFwSAkvWx6jIlmANtZjNTju/Qf
X-Received: by 2002:a65:450a:: with SMTP id
n10-v6mr36732135pgq.392.1536181357527;
Wed, 05 Sep 2018 14:02:37 -0700 (PDT)
Received: from localhost.localdomain ([2601:646:877f:9499::71e7])
by smtp.gmail.com with ESMTPSA id
e26-v6sm3689411pfi.70.2018.09.05.14.02.36
(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Wed, 05 Sep 2018 14:02:36 -0700 (PDT)
From: Khem Raj
To: openembedded-devel@lists.openembedded.org
Date: Wed, 5 Sep 2018 14:02:18 -0700
Message-Id: <20180905210224.21225-6-raj.khem@gmail.com>
X-Mailer: git-send-email 2.18.0
In-Reply-To: <20180905210224.21225-1-raj.khem@gmail.com>
References: <20180905210224.21225-1-raj.khem@gmail.com>
Subject: [oe] [meta-oe][PATCH 06/12] uw-imap: Fix build with openSSL 1.1
X-BeenThere: openembedded-devel@lists.openembedded.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Using the OpenEmbedded metadata to build Distributions
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Sender: openembedded-devel-bounces@lists.openembedded.org
Errors-To: openembedded-devel-bounces@lists.openembedded.org
Signed-off-by: Khem Raj
---
.../uw-imap/0001-Support-OpenSSL-1.1.patch | 71 +++++++++++++++++++
.../recipes-devtools/uw-imap/uw-imap_2007f.bb | 1 +
2 files changed, 72 insertions(+)
create mode 100644 meta-oe/recipes-devtools/uw-imap/uw-imap/0001-Support-OpenSSL-1.1.patch
--
2.18.0
--
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel
diff --git a/meta-oe/recipes-devtools/uw-imap/uw-imap/0001-Support-OpenSSL-1.1.patch b/meta-oe/recipes-devtools/uw-imap/uw-imap/0001-Support-OpenSSL-1.1.patch
new file mode 100644
index 0000000000..d5610bbcd5
--- /dev/null
+++ b/meta-oe/recipes-devtools/uw-imap/uw-imap/0001-Support-OpenSSL-1.1.patch
@@ -0,0 +1,71 @@
+From 4c684542816a08b95444b8e2515f24d084e6e3c3 Mon Sep 17 00:00:00 2001
+From: Khem Raj
+Date: Tue, 4 Sep 2018 22:05:17 -0700
+Subject: [PATCH] Support OpenSSL 1.1
+
+When building with OpenSSL 1.1 and newer, use the new built-in
+ hostname verification instead of code that doesn't compile due to
+ structs having been made opaque.
+Bug-Debian: https://bugs.debian.org/828589
+
+Upstream-Status: Unknown
+
+Signed-off-by: Khem Raj
+---
+ src/osdep/unix/ssl_unix.c | 14 +++++++++++++-
+ 1 file changed, 13 insertions(+), 1 deletion(-)
+
+diff --git a/src/osdep/unix/ssl_unix.c b/src/osdep/unix/ssl_unix.c
+index 3bfdff3..dec9467 100644
+--- a/src/osdep/unix/ssl_unix.c
++++ b/src/osdep/unix/ssl_unix.c
+@@ -227,8 +227,16 @@ static char *ssl_start_work (SSLSTREAM *stream,char *host,unsigned long flags)
+ /* disable certificate validation? */
+ if (flags & NET_NOVALIDATECERT)
+ SSL_CTX_set_verify (stream->context,SSL_VERIFY_NONE,NIL);
+- else SSL_CTX_set_verify (stream->context,SSL_VERIFY_PEER,ssl_open_verify);
++ else {
++#if OPENSSL_VERSION_NUMBER >= 0x10100000
++ X509_VERIFY_PARAM *param = SSL_CTX_get0_param(stream->context);
++ X509_VERIFY_PARAM_set_hostflags(param, X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS);
++ X509_VERIFY_PARAM_set1_host(param, host, 0);
++#endif
++
++ SSL_CTX_set_verify (stream->context,SSL_VERIFY_PEER,ssl_open_verify);
+ /* set default paths to CAs... */
++ }
+ SSL_CTX_set_default_verify_paths (stream->context);
+ /* ...unless a non-standard path desired */
+ if (s = (char *) mail_parameters (NIL,GET_SSLCAPATH,NIL))
+@@ -266,6 +274,7 @@ static char *ssl_start_work (SSLSTREAM *stream,char *host,unsigned long flags)
+ if (SSL_write (stream->con,"",0) < 0)
+ return ssl_last_error ? ssl_last_error : "SSL negotiation failed";
+ /* need to validate host names? */
++#if OPENSSL_VERSION_NUMBER < 0x10100000
+ if (!(flags & NET_NOVALIDATECERT) &&
+ (err = ssl_validate_cert (cert = SSL_get_peer_certificate (stream->con),
+ host))) {
+@@ -275,6 +284,7 @@ static char *ssl_start_work (SSLSTREAM *stream,char *host,unsigned long flags)
+ sprintf (tmp,"*%.128s: %.255s",err,cert ? cert->name : "???");
+ return ssl_last_error = cpystr (tmp);
+ }
++#endif
+ return NIL;
+ }
+
+@@ -313,6 +323,7 @@ static int ssl_open_verify (int ok,X509_STORE_CTX *ctx)
+ * Returns: NIL if validated, else string of error message
+ */
+
++#if OPENSSL_VERSION_NUMBER < 0x10100000
+ static char *ssl_validate_cert (X509 *cert,char *host)
+ {
+ int i,n;
+@@ -342,6 +353,7 @@ static char *ssl_validate_cert (X509 *cert,char *host)
+ else ret = "Unable to locate common name in certificate";
+ return ret;
+ }
++#endif
+
+ /* Case-independent wildcard pattern match
+ * Accepts: base string
diff --git a/meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb b/meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb
index 4c055e54ca..0000f05ae4 100644
--- a/meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb
+++ b/meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb
@@ -10,6 +10,7 @@ SRC_URI = "https://fossies.org/linux/misc/old/imap-${PV}.tar.gz \
file://quote_cctype.patch \
file://imap-2007e-shared.patch \
file://imap-2007f-format-security.patch \
+ file://0001-Support-OpenSSL-1.1.patch \
"
SRC_URI[md5sum] = "2126fd125ea26b73b20f01fcd5940369"
From patchwork Wed Sep 5 21:02:19 2018
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: Khem Raj
X-Patchwork-Id: 146046
Delivered-To: patch@linaro.org
Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp30191ljw;
Wed, 5 Sep 2018 14:03:34 -0700 (PDT)
X-Google-Smtp-Source: ANB0VdY7yxFb5+OIke3LYKNgNAw416nOkRj2G8PUmUL7bScA+ECOpdrbmvHnB7cAEl1Z+iWVbvpO
X-Received: by 2002:a17:902:6681:: with SMTP id
e1-v6mr41201239plk.109.1536181414404;
Wed, 05 Sep 2018 14:03:34 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1536181414; cv=none;
d=google.com; s=arc-20160816;
b=FztpzVYpeFmdXG2GdXhFuj10KjGUqKo9aVTe2M+QbpBySGxF9PVhw5Tz7AGQE6JFak
J5S5UbHdzH4uqJ8XKRrmoLyXoe35xKsnDak1nfh2fhWjXn5zSgCnCb2yA4IuqI+rBv71
RvMJcNvEum7Usfy6niBc7ET/l9ygcV4lI4NqHYzdEntCtSw8O9qaPitD1+hH2LssO2VK
nX7U5u7k5cU89H921lnis8MmwcFZ10rOPjA+xNgf3txiAQWOFmklq0OVqXEHrzIfrmRV
7zWzggZbDI4B93Meqt7SC+xbYg1SmxALzxuOjQE0/gNNJ94cf8Slf/JBppnWHe1OW8Gp
ym6w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
s=arc-20160816;
h=errors-to:sender:content-transfer-encoding:mime-version
:list-subscribe:list-help:list-post:list-archive:list-unsubscribe
:list-id:precedence:subject:references:in-reply-to:message-id:date
:to:from:dkim-signature:delivered-to;
bh=wEKcY6i9gDfs/TgktgNYg9K935hcFY69J1nJS3uvu+g=;
b=tun1y6EKWW5Ywwh3rMfmhtvVDQ1kM6kZqdC91Pew1fCTFllg32SlUDqhWN65Xvzg5s
WZAb0pj1yZ1Ddk4vfxxEACHiNeZx+8zuk9KRhMvsMnuNlbl/U14CyZF3WPxagivfObtb
Mjda5qAp1NOsP9Isr7fKUPs3ckxjA0xMFWhM6BG8sByMOOL8TsHafXNBlYk/Y1sWntYI
KZ0o0UovQq9u1SMwVmvN3gXUyBb0ZcbTUR4tCNARfnB2pj9TQGTyQ+GYrYOEQ4ULGki9
KoUYP3QbV/k4susNvqe7XQWMrrhrcOgjRdTsssIzp9bakOCadrqkZ7MKImb7ETXo0IFt
nUwA==
ARC-Authentication-Results: i=1; mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=Fbn2JK3Q;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Return-Path:
Received: from mail.openembedded.org (mail.openembedded.org.
[140.211.169.62]) by mx.google.com with ESMTP id
s65-v6si3245915pfb.271.2018.09.05.14.03.34;
Wed, 05 Sep 2018 14:03:34 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender) client-ip=140.211.169.62;
Authentication-Results: mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=Fbn2JK3Q;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Received: from layers.openembedded.org (localhost [127.0.0.1])
by mail.openembedded.org (Postfix) with ESMTP id DEE08794DE;
Wed, 5 Sep 2018 21:02:59 +0000 (UTC)
X-Original-To: openembedded-devel@lists.openembedded.org
Delivered-To: openembedded-devel@lists.openembedded.org
Received: from mail-pg1-f182.google.com (mail-pg1-f182.google.com
[209.85.215.182])
by mail.openembedded.org (Postfix) with ESMTP id 68F5C793FC
for ;
Wed, 5 Sep 2018 21:02:37 +0000 (UTC)
Received: by mail-pg1-f182.google.com with SMTP id b129-v6so4011834pga.13
for ;
Wed, 05 Sep 2018 14:02:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=from:to:cc:subject:date:message-id:in-reply-to:references;
bh=2C4OUwCJ/wGfFiiI+GP4tYCdz3nZ9wdPaiaTZVfuA+s=;
b=Fbn2JK3Q7lJ700sK6e2OPdtv/5a6MFnLYFk1tQCh72A3JTAtyE5uqEhtglJlARWPJc
lnOyKHcgE3rifASh2Pc2WsBo4exS0EhkJAcUgKIKTT645SAKJCTDVDT5/DWrT2U+FB9y
gMc9DrEB+k0l7/Ar23JJJFQrNAgmNC/3K5J8vAavvcbH4CaXkra0lRe8V82AKOZfEHx3
sKfBoPC20kl4zTTsluvK75Obh+cafR5jRcqr/YViidMT4GkADVbCubjfN5SyS1dl07bY
pR8JLNvW4soLpDwdloHoseevPX/65eZ12g2ykRFwUbsx76g9i1FwXteyMjZDzUw0Mlo4
7M/g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
:references;
bh=2C4OUwCJ/wGfFiiI+GP4tYCdz3nZ9wdPaiaTZVfuA+s=;
b=LYKpBEjycx4tQCO4BFdwMY2ZmJh6onEBCZSG+66DkCTxHCIvVT3VSs03BD8nZWWdiH
dGHfegS/wrOXA9E64ZcwbOxHNoSJfEANQ/m/F6rwXuK9Mcf3fXS8oXTFnsZ5Y/ye1hJE
zjn86QYR9LgVUm5CYRy5rIdo4gPI75rel7g0HzLNH2ddYHma+6S5leTDZdKr7ty6oQ9I
zmMDfNGRx5J1SPti6KMyKQu3mCh4PfVWyvrMRseBsuEh/tVt4iFKQIF4heUfdKkZrdHM
BlXLJzBuWFs8RIb5ynupvFXdeyRYzmZIDCiTCBhh7vD5K5B7J3wEM5llF2+vSOvRvHBP
14mw==
X-Gm-Message-State: APzg51CN4cji9xr1CbdM+SdpE3D0aqaikBfLvU/fjSuHiUJMawqkCiIL
AKEnBy7EknmS/2eztft2SPmjbeLP
X-Received: by 2002:a63:3741:: with SMTP id
g1-v6mr15621531pgn.59.1536181358207;
Wed, 05 Sep 2018 14:02:38 -0700 (PDT)
Received: from localhost.localdomain ([2601:646:877f:9499::71e7])
by smtp.gmail.com with ESMTPSA id
e26-v6sm3689411pfi.70.2018.09.05.14.02.37
(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Wed, 05 Sep 2018 14:02:37 -0700 (PDT)
From: Khem Raj
To: openembedded-devel@lists.openembedded.org
Date: Wed, 5 Sep 2018 14:02:19 -0700
Message-Id: <20180905210224.21225-7-raj.khem@gmail.com>
X-Mailer: git-send-email 2.18.0
In-Reply-To: <20180905210224.21225-1-raj.khem@gmail.com>
References: <20180905210224.21225-1-raj.khem@gmail.com>
Subject: [oe] [meta-oe][PATCH 07/12] libusbmuxd: Add recipe
X-BeenThere: openembedded-devel@lists.openembedded.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Using the OpenEmbedded metadata to build Distributions
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Sender: openembedded-devel-bounces@lists.openembedded.org
Errors-To: openembedded-devel-bounces@lists.openembedded.org
Signed-off-by: Khem Raj
---
.../libimobiledevice/libusbmuxd_git.bb | 18 ++++++++++++++++++
1 file changed, 18 insertions(+)
create mode 100644 meta-oe/recipes-extended/libimobiledevice/libusbmuxd_git.bb
--
2.18.0
--
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel
diff --git a/meta-oe/recipes-extended/libimobiledevice/libusbmuxd_git.bb b/meta-oe/recipes-extended/libimobiledevice/libusbmuxd_git.bb
new file mode 100644
index 0000000000..7ab4ce1ba5
--- /dev/null
+++ b/meta-oe/recipes-extended/libimobiledevice/libusbmuxd_git.bb
@@ -0,0 +1,18 @@
+DESCRIPTION = "This daemon is in charge of multiplexing connections over USB to an iPhone or iPod touch."
+LICENSE = "GPLv3 & GPLv2 & LGPLv2.1"
+LIC_FILES_CHKSUM = "file://COPYING.GPLv2;md5=ebb5c50ab7cab4baeffba14977030c07 \
+ file://COPYING.GPLv3;md5=d32239bcb673463ab874e80d47fae504 \
+ file://COPYING.LGPLv2.1;md5=6ab17b41640564434dda85c06b7124f7"
+
+DEPENDS = "udev libusb1 libplist"
+
+inherit autotools pkgconfig gitpkgv
+
+PKGV = "${GITPKGVTAG}"
+
+SRCREV = "78df9be5fc8222ed53846cb553de9b5d24c85c6c"
+SRC_URI = "git://github.com/libimobiledevice/libusbmuxd;protocol=https"
+
+S = "${WORKDIR}/git"
+
+FILES_${PN} += "${base_libdir}/udev/rules.d/"
From patchwork Wed Sep 5 21:02:20 2018
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: Khem Raj
X-Patchwork-Id: 146047
Delivered-To: patch@linaro.org
Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp30335ljw;
Wed, 5 Sep 2018 14:03:42 -0700 (PDT)
X-Google-Smtp-Source: ANB0VdZMQ1CWt/t/r37n6aAZaWOvBsVmD4cZs0G9G4/R1D/uBj57DLloHFLVjSAalj4giWoStr71
X-Received: by 2002:a17:902:8541:: with SMTP id
d1-v6mr41308698plo.81.1536181422790;
Wed, 05 Sep 2018 14:03:42 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1536181422; cv=none;
d=google.com; s=arc-20160816;
b=OF0h7CfmgFh64YXfSpowV34F5iANw2wYL0MffpIxuPGnfo7x7BKXolDiIRn079doWg
M0spMMnHpFquUbum8glPtzQJJeE4ERRkwzWOoPKWU5drINIxZuYhuB8Lrsvb+z+y1e1L
CJlljsJmU5AsiUHs14KZabTqltSlDTj2HhLnXPXtmombYMrvXxiVGOZW3xvZth4HC721
9cEqRwVA3KvU8xXyKDybXYUbpAsXXeft7ab0gQGBdhVhU7Zl+CXetAspfJahtSNpWLpG
wmqoPFS2mYUJlljT/v9eNQ9t0rqEpztldxLcVIlll/LDnhxhCD6/cwn6UtMwE/OiQuer
m9Ig==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
s=arc-20160816;
h=errors-to:sender:content-transfer-encoding:mime-version
:list-subscribe:list-help:list-post:list-archive:list-unsubscribe
:list-id:precedence:subject:references:in-reply-to:message-id:date
:to:from:dkim-signature:delivered-to;
bh=TF3ZH8o38Vjxcu08yN33ud6wBM/AWA7z8JyRf+M9WYo=;
b=dqDWD9ah27l5puyCBMYlTxMITa6tsVR4RVjyIx3U6jZRcnvzvrA8wgQOhsxMS6jn6y
ahjWiDn8/vqhfu5+hEA2OhzjCKktXIr7nBKRs32vGs/ZcJ9VkRjpoW8+AXyuifA1JTyU
Wp71rrlppUcervskV1+Bvc4YMp4/z8qz/XCzSEZdRl00DaUysmZFQp3EmGAsj1SSgsg6
kFczfktVpHz9WJuVNmP3v02hfV4ynY1SIubZ7FqMtAq3cs8w0upfQ0MP+RzBHb6yPqbw
g5JFDOg4kE0wNAiZaSIYxeJ5LlR2V4eqKLoql3N6dlt5pPukd01BPaNwaE10mXxWKTe+
+qbw==
ARC-Authentication-Results: i=1; mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=nOJX47W1;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Return-Path:
Received: from mail.openembedded.org (mail.openembedded.org.
[140.211.169.62]) by mx.google.com with ESMTP id
f10-v6si3190570pgk.367.2018.09.05.14.03.42;
Wed, 05 Sep 2018 14:03:42 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender) client-ip=140.211.169.62;
Authentication-Results: mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=nOJX47W1;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Received: from layers.openembedded.org (localhost [127.0.0.1])
by mail.openembedded.org (Postfix) with ESMTP id 69797794F7;
Wed, 5 Sep 2018 21:03:01 +0000 (UTC)
X-Original-To: openembedded-devel@lists.openembedded.org
Delivered-To: openembedded-devel@lists.openembedded.org
Received: from mail-pl1-f193.google.com (mail-pl1-f193.google.com
[209.85.214.193])
by mail.openembedded.org (Postfix) with ESMTP id 69C34793E6
for ;
Wed, 5 Sep 2018 21:02:38 +0000 (UTC)
Received: by mail-pl1-f193.google.com with SMTP id e11-v6so3871947plb.3
for ;
Wed, 05 Sep 2018 14:02:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=from:to:cc:subject:date:message-id:in-reply-to:references;
bh=OK7c8ZkrZJEMelPQxnbUoSZnxIfA2sKEJL1o3NxV870=;
b=nOJX47W1YYXhirrVleDya/vKOb99QgYDV3l1OZ+7Qcq8LoyaH50jluai7OqYTc35KM
CnAyJ4JenTCMaH8o8ku420P2mrW9sdQehXGhbTg8gF5usGhEMSAZrmt5s3HBWHzOyNGY
oWG4dV3W6TOuXV5sb6xUYUtiT6dcPvGqRWJU/OLN1uy+nnfdyhxwofY0jpwPQ1buJzQc
JckxXfnQuF3fKcUHFvFhIFrr3H1PkXxzWBqokoHMy/cQXgIG0fw9WhItXGwKbw42jsan
iE+b8q5teJ6rXBpF3IYBFQNyI8pzkm9pmGAY95BlnyuSwR9Ox92kDYke7HRTuiE/l9AI
DhTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
:references;
bh=OK7c8ZkrZJEMelPQxnbUoSZnxIfA2sKEJL1o3NxV870=;
b=LTvygjsQUL0lCJGRaXjuUlvYPi5yrcH+nKWv+EtqUmGnGRCgsmThGCa1hlcU4qk+tt
iSAsZODGohKgHSu7+ltBaGivSIF0r5mJ7eQv7wa5OePdbwiZ/kczGtyf4wAnT21uhNFv
7Mb5eTC/z5NGlPeJvFSW4HkVwDocd7dn0Ew4AsOEjiD2zsXkTvIBouitbNQ3AKGLe7/n
nHM18GxTYblWxAFmggRkCkUyfS+VgU+uKFLUs86HOFdHPJkP1K8aqKuqIWhSW44lTT+m
SCvfyDG8qBcYE9npXF84+1QL9Ovftn9VgK6tLgZP3+HSi34wIfwzxd5B6GMNUxd/3usF
wKNg==
X-Gm-Message-State: APzg51CEUbuNvdXHrLF3EBpHqOaz0d6P6ArkJQmy+W532iP1Bc8AjEgh
dNpE9mx8uTkwyte39m8arAPKD4ka
X-Received: by 2002:a17:902:1c5:: with SMTP id
b63-v6mr41556557plb.82.1536181359131;
Wed, 05 Sep 2018 14:02:39 -0700 (PDT)
Received: from localhost.localdomain ([2601:646:877f:9499::71e7])
by smtp.gmail.com with ESMTPSA id
e26-v6sm3689411pfi.70.2018.09.05.14.02.38
(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Wed, 05 Sep 2018 14:02:38 -0700 (PDT)
From: Khem Raj
To: openembedded-devel@lists.openembedded.org
Date: Wed, 5 Sep 2018 14:02:20 -0700
Message-Id: <20180905210224.21225-8-raj.khem@gmail.com>
X-Mailer: git-send-email 2.18.0
In-Reply-To: <20180905210224.21225-1-raj.khem@gmail.com>
References: <20180905210224.21225-1-raj.khem@gmail.com>
Subject: [oe] [meta-oe][PATCH 08/12] libimobiledevice: Upgrade to latest
X-BeenThere: openembedded-devel@lists.openembedded.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Using the OpenEmbedded metadata to build Distributions
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Sender: openembedded-devel-bounces@lists.openembedded.org
Errors-To: openembedded-devel-bounces@lists.openembedded.org
Needs several packages to be updates
Fixes build with openSSL 1.1.x
Signed-off-by: Khem Raj
---
.../files/inline-without-definition.patch | 31 -----------
...evice_1.1.4.bb => libimobiledevice_git.bb} | 13 +++--
.../usbmuxd/usbmuxd_git.bb | 16 +++---
.../0001-Fix-warnings-found-with-clang.patch | 51 -------------------
.../files/fix-parallel-make.patch | 21 --------
.../{libplist_1.8.bb => libplist_2.0.0.bb} | 10 ++--
6 files changed, 17 insertions(+), 125 deletions(-)
delete mode 100644 meta-oe/recipes-connectivity/libimobiledevice/files/inline-without-definition.patch
rename meta-oe/recipes-connectivity/libimobiledevice/{libimobiledevice_1.1.4.bb => libimobiledevice_git.bb} (54%)
delete mode 100644 meta-oe/recipes-extended/libimobiledevice/files/0001-Fix-warnings-found-with-clang.patch
delete mode 100644 meta-oe/recipes-extended/libimobiledevice/files/fix-parallel-make.patch
rename meta-oe/recipes-extended/libimobiledevice/{libplist_1.8.bb => libplist_2.0.0.bb} (67%)
--
2.18.0
--
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel
diff --git a/meta-oe/recipes-connectivity/libimobiledevice/files/inline-without-definition.patch b/meta-oe/recipes-connectivity/libimobiledevice/files/inline-without-definition.patch
deleted file mode 100644
index 9a7895fd41..0000000000
--- a/meta-oe/recipes-connectivity/libimobiledevice/files/inline-without-definition.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-Fix link error with gcc 5 toolchains
-
- afc.c:258: error: undefined reference to 'debug_buffer'
- collect2: error: ld returned 1 exit status
-
-debug.h header was declaring things inline without providing a definition.
-Files that included this header then failed to link against the corresponding
-external symbol in debug.c, because the linker took the 'inline' keyword
-seriously rather than ignoring it.
-
---- libimobiledevice-1.1.4/src/debug.h.orig 2015-10-03 16:24:08.758740386 -0700
-+++ libimobiledevice-1.1.4/src/debug.h 2015-10-03 16:24:22.706740355 -0700
-@@ -44,14 +44,14 @@
- #define debug_plist(a)
- #endif
-
--LIBIMOBILEDEVICE_INTERNAL inline void debug_info_real(const char *func,
-+LIBIMOBILEDEVICE_INTERNAL void debug_info_real(const char *func,
- const char *file,
- int line,
- const char *format, ...);
-
--LIBIMOBILEDEVICE_INTERNAL inline void debug_buffer(const char *data, const int length);
--LIBIMOBILEDEVICE_INTERNAL inline void debug_buffer_to_file(const char *file, const char *data, const int length);
--LIBIMOBILEDEVICE_INTERNAL inline void debug_plist_real(const char *func,
-+LIBIMOBILEDEVICE_INTERNAL void debug_buffer(const char *data, const int length);
-+LIBIMOBILEDEVICE_INTERNAL void debug_buffer_to_file(const char *file, const char *data, const int length);
-+LIBIMOBILEDEVICE_INTERNAL void debug_plist_real(const char *func,
- const char *file,
- int line,
- plist_t plist);
diff --git a/meta-oe/recipes-connectivity/libimobiledevice/libimobiledevice_1.1.4.bb b/meta-oe/recipes-connectivity/libimobiledevice/libimobiledevice_git.bb
similarity index 54%
rename from meta-oe/recipes-connectivity/libimobiledevice/libimobiledevice_1.1.4.bb
rename to meta-oe/recipes-connectivity/libimobiledevice/libimobiledevice_git.bb
index 32aca96fd0..908b98d8c5 100644
--- a/meta-oe/recipes-connectivity/libimobiledevice/libimobiledevice_1.1.4.bb
+++ b/meta-oe/recipes-connectivity/libimobiledevice/libimobiledevice_git.bb
@@ -7,17 +7,16 @@ LIC_FILES_CHKSUM = "\
HOMEPAGE ="http://www.libimobiledevice.org/"
-DEPENDS = "libplist usbmuxd libtasn1 gnutls libgcrypt"
+DEPENDS = "libplist usbmuxd libusbmuxd libtasn1 gnutls libgcrypt"
-SRC_URI = " \
- http://www.libimobiledevice.org/downloads/libimobiledevice-${PV}.tar.bz2 \
+SRCREV = "fb71aeef10488ed7b0e60a1c8a553193301428c0"
+PV = "1.2.0+git${SRCPV}"
+SRC_URI = "\
+ git://github.com/libimobiledevice/libimobiledevice;protocol=https \
file://configure-fix-largefile.patch \
- file://inline-without-definition.patch \
"
-SRC_URI[md5sum] = "3f28cbc6a2e30d34685049c0abde5183"
-SRC_URI[sha256sum] = "67499cfaa6172f566ee6b0783605acffe484fb7ddc3b09881ab7ac58667ee5b8"
-
+S = "${WORKDIR}/git"
inherit autotools pkgconfig
EXTRA_OECONF = " --without-cython "
diff --git a/meta-oe/recipes-connectivity/usbmuxd/usbmuxd_git.bb b/meta-oe/recipes-connectivity/usbmuxd/usbmuxd_git.bb
index 4365aa4bc6..a9741bd5b7 100644
--- a/meta-oe/recipes-connectivity/usbmuxd/usbmuxd_git.bb
+++ b/meta-oe/recipes-connectivity/usbmuxd/usbmuxd_git.bb
@@ -4,21 +4,19 @@ LIC_FILES_CHKSUM = "file://COPYING.GPLv2;md5=ebb5c50ab7cab4baeffba14977030c07 \
file://COPYING.GPLv3;md5=d32239bcb673463ab874e80d47fae504 \
file://COPYING.LGPLv2.1;md5=6ab17b41640564434dda85c06b7124f7"
-DEPENDS = "udev libusb1"
+DEPENDS = "udev libusb1 libplist"
-inherit cmake pkgconfig gitpkgv
+inherit autotools pkgconfig gitpkgv systemd
PKGV = "${GITPKGVTAG}"
-SRCREV = "919587580c5e77f3936f3432115d2e10c7bac7c5"
-SRC_URI = "git://git.sukimashita.com/usbmuxd.git;protocol=http"
+SRCREV = "ee85938c21043ef5f7cd4dfbc7677f385814d4d8"
+SRC_URI = "git://github.com/libimobiledevice/usbmuxd;protocol=https"
S = "${WORKDIR}/git"
-FILES_${PN} += "${base_libdir}/udev/rules.d/"
+EXTRA_OECONF += "--without-preflight"
-# fix usbmuxd installing files to /usr/lib64 on 64bit hosts:
-EXTRA_OECMAKE = "-DLIB_SUFFIX=${@d.getVar('baselib').replace('lib', '')}"
+FILES_${PN} += "${base_libdir}/udev/rules.d/"
-PACKAGECONFIG ??= ""
-PACKAGECONFIG[plist] = "-DWANT_PLIST=1,-DWANT_PLIST=0,libplist"
+SYSTEMD_SERVICE_${PN} = "usbmuxd.service"
diff --git a/meta-oe/recipes-extended/libimobiledevice/files/0001-Fix-warnings-found-with-clang.patch b/meta-oe/recipes-extended/libimobiledevice/files/0001-Fix-warnings-found-with-clang.patch
deleted file mode 100644
index f8114a0634..0000000000
--- a/meta-oe/recipes-extended/libimobiledevice/files/0001-Fix-warnings-found-with-clang.patch
+++ /dev/null
@@ -1,51 +0,0 @@
-From ad1be542b87b3186f8ef7bee2c594daefe5bb4c8 Mon Sep 17 00:00:00 2001
-From: Khem Raj
-Date: Tue, 18 Oct 2016 21:31:40 +0000
-Subject: [PATCH] Fix warnings found with clang
-
-| /mnt/oe/openembedded-core/build/workspace/sources/libplist/src/base64.c:107:12: error: non-void function 'base64decode' should return a value [-Wreturn-type]
-| if (!buf) return;
-| ^
-| /mnt/oe/openembedded-core/build/workspace/sources/libplist/src/base64.c:109:16: error: non-void function 'base64decode' should return a value [-Wreturn-type]
-| if (len <= 0) return;
-
-Upstream-Status: Pending
-
-Signed-off-by: Khem Raj
----
- libcnary/node.c | 2 +-
- src/base64.c | 4 ++--
- 2 files changed, 3 insertions(+), 3 deletions(-)
-
-diff --git a/libcnary/node.c b/libcnary/node.c
-index 1f9f669..d6f3f63 100644
---- a/libcnary/node.c
-+++ b/libcnary/node.c
-@@ -104,7 +104,7 @@ int node_detach(node_t* parent, node_t* child) {
-
- int node_insert(node_t* parent, unsigned int index, node_t* child)
- {
-- if (!parent || !child) return;
-+ if (!parent || !child) return -1;
- child->isLeaf = TRUE;
- child->isRoot = FALSE;
- child->parent = parent;
-diff --git a/src/base64.c b/src/base64.c
-index 65c6061..531a06a 100644
---- a/src/base64.c
-+++ b/src/base64.c
-@@ -104,9 +104,9 @@ static int base64decode_block(unsigned char *target, const char *data, size_t da
-
- unsigned char *base64decode(const char *buf, size_t *size)
- {
-- if (!buf) return;
-+ if (!buf) return 0;
- size_t len = strlen(buf);
-- if (len <= 0) return;
-+ if (len <= 0) return 0;
- unsigned char *outbuf = (unsigned char*)malloc((len/4)*3+3);
-
- unsigned char *line;
---
-1.9.1
-
diff --git a/meta-oe/recipes-extended/libimobiledevice/files/fix-parallel-make.patch b/meta-oe/recipes-extended/libimobiledevice/files/fix-parallel-make.patch
deleted file mode 100644
index f6ef6f4f8b..0000000000
--- a/meta-oe/recipes-extended/libimobiledevice/files/fix-parallel-make.patch
+++ /dev/null
@@ -1,21 +0,0 @@
-From 335b25febd4c864ad0ac08479f5cd43fc21b7d73 Mon Sep 17 00:00:00 2001
-From: Nikias Bassen
-Date: Mon, 09 Jul 2012 21:17:15 +0000
-Subject: Fix building with parallel build makeopts
-
----
-diff --git a/CMakeLists.txt b/CMakeLists.txt
-index 0bad840..155994e 100644
---- a/CMakeLists.txt
-+++ b/CMakeLists.txt
-@@ -57,6 +57,8 @@ ADD_SUBDIRECTORY( plutil )
- ADD_SUBDIRECTORY( include )
- ADD_SUBDIRECTORY( test )
-
-+ADD_DEPENDENCIES( plist libcnary )
-+
- IF ( SWIG_FOUND AND PYTHONLIBS_FOUND AND PYTHONINTERP_FOUND )
- ADD_SUBDIRECTORY( swig )
- ENDIF ( SWIG_FOUND AND PYTHONLIBS_FOUND AND PYTHONINTERP_FOUND )
---
-cgit v0.9.0.2
diff --git a/meta-oe/recipes-extended/libimobiledevice/libplist_1.8.bb b/meta-oe/recipes-extended/libimobiledevice/libplist_2.0.0.bb
similarity index 67%
rename from meta-oe/recipes-extended/libimobiledevice/libplist_1.8.bb
rename to meta-oe/recipes-extended/libimobiledevice/libplist_2.0.0.bb
index f78979619f..43c1fd5cab 100644
--- a/meta-oe/recipes-extended/libimobiledevice/libplist_1.8.bb
+++ b/meta-oe/recipes-extended/libimobiledevice/libplist_2.0.0.bb
@@ -6,15 +6,13 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=ebb5c50ab7cab4baeffba14977030c07 \
DEPENDS = "libxml2 glib-2.0 swig python"
-inherit cmake pkgconfig
+inherit autotools pkgconfig pythonnative
-SRC_URI = "http://www.libimobiledevice.org/downloads/libplist-${PV}.tar.bz2 \
- file://fix-parallel-make.patch \
- file://0001-Fix-warnings-found-with-clang.patch \
+SRCREV = "62ec804736435fa34e37e66e228e17e2aacee1d7"
+SRC_URI = "git://github.com/libimobiledevice/libplist;protocol=https \
"
-SRC_URI[md5sum] = "2a9e0258847d50f9760dc3ece25f4dc6"
-SRC_URI[sha256sum] = "a418da3880308199b74766deef2a760a9b169b81a868a6a9032f7614e20500ec"
+S = "${WORKDIR}/git"
do_install_append () {
if [ -e ${D}${libdir}/python*/site-packages/plist/_plist.so ]; then
From patchwork Wed Sep 5 21:02:21 2018
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: Khem Raj
X-Patchwork-Id: 146048
Delivered-To: patch@linaro.org
Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp30486ljw;
Wed, 5 Sep 2018 14:03:50 -0700 (PDT)
X-Google-Smtp-Source: ANB0Vdbs+KPdWuJMOWPiZcWJea1zMh9PxcHfHcio3dn5lNr3YU6xzSQMzIBvP4QJ2JVpZWbP3JAF
X-Received: by 2002:a17:902:ab94:: with SMTP id
f20-v6mr41337638plr.231.1536181430650;
Wed, 05 Sep 2018 14:03:50 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1536181430; cv=none;
d=google.com; s=arc-20160816;
b=jHDeMbOYnRQWlvSnkpjiyaygno5fNAF+3eZWwlaJGIsCyZ75MJo/sk7MABvLRCULMz
RPO+tgrA1Y8R05jcTdEy5d+FF/JD9R52fpacp+3FrvUSkUA/s/R8z/0499EsfLoeM0yb
K+HO1WY8Aic8Sc4uBFCPaJj305MGJdgVmezVXVr4/PXxWan1cmiEa6kV7MTkCNFNGdrr
S7zTyzdCQ4J+cxRkFptT9EJTB9qZGTKnDuUL8XHxZLxsMBHW4zlZjZ1eTr/TgqHVzqPR
4qh6JCDInl10317EMg1cuaAOEZ+09zNDKtvSJnqkGSIByFgfKBLrRmDExWxTnsVhS/tH
zQgA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
s=arc-20160816;
h=errors-to:sender:content-transfer-encoding:mime-version
:list-subscribe:list-help:list-post:list-archive:list-unsubscribe
:list-id:precedence:subject:references:in-reply-to:message-id:date
:to:from:dkim-signature:delivered-to;
bh=mYF6yOwYXEXpb+ANEzU0ZLT4CmIbK4PX/mcSx1VHp4k=;
b=RrpzV+00wfJBKC+FddKtp37EOM8tcYPROjly1GzxXNHH/XR/Qy+YW8uTvDZnLqk7B3
RGo6hi7eO4kUn0Mn7zf5GlDqQ1vkVJrDVo7kdRySKYsQQWzv2n2HRLyql46Z1q5uuHjf
JATNEwaSi55Op8kNuMd7GB7dCSpt4Q9idlfnXNBCH3kpN1eUMNkQURR4qvis4J4wkCOZ
uouJSb6rUyJiX4RukZxAeZWqJmWU1k+oUl05szgWzbVbyEoNXGWDNMEU5cMrJQid/dcE
5X4BmF/EOCa3qQY7iLW558mZNEX9txsRhtSTC2Sz955XldGLhKFJcX+181SdUIw+Ko61
51LQ==
ARC-Authentication-Results: i=1; mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=G8ZQZClJ;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Return-Path:
Received: from mail.openembedded.org (mail.openembedded.org.
[140.211.169.62]) by mx.google.com with ESMTP id
z5-v6si2858950pgn.348.2018.09.05.14.03.50;
Wed, 05 Sep 2018 14:03:50 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender) client-ip=140.211.169.62;
Authentication-Results: mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=G8ZQZClJ;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Received: from layers.openembedded.org (localhost [127.0.0.1])
by mail.openembedded.org (Postfix) with ESMTP id 7D46E794FA;
Wed, 5 Sep 2018 21:03:02 +0000 (UTC)
X-Original-To: openembedded-devel@lists.openembedded.org
Delivered-To: openembedded-devel@lists.openembedded.org
Received: from mail-pl1-f171.google.com (mail-pl1-f171.google.com
[209.85.214.171])
by mail.openembedded.org (Postfix) with ESMTP id 713EC7942B
for ;
Wed, 5 Sep 2018 21:02:39 +0000 (UTC)
Received: by mail-pl1-f171.google.com with SMTP id b30-v6so1584103pla.0
for ;
Wed, 05 Sep 2018 14:02:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=from:to:cc:subject:date:message-id:in-reply-to:references;
bh=e+j3b0sQmcO3Cl9uyrXtBH0Br1H6BfEk/m4i9uIvHx4=;
b=G8ZQZClJKk/Rxxpry7OL6DYBEyRSGao8bjj/lCVeRUZVQHT85qfKZYYkfr4jB34o8w
7kqKzDJw64pyCQWWMNe6fmpQgS7rYxkVDryzeUzVjBxU4gCSOkbP/4XUkzWxfml//kI/
0iCJjPWxnPrIAnCpvE8ynqDrKGUD60tofZz0Y9Mtc6ZL0q6DLGwcGFc5HU4mclYGrzhy
KIrWWjyWA1siNm1hCNiTPCa6iZs7YQabbOP6wL5E/TusRg0GSRBIpYBIDG/+rrCuw54C
0xWohQsGygASkEUGDjYpe8ghFlrWz+iLscvdX8GCPFiGnxcyPh98HDt0We5ZPdLaqHjC
duNg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
:references;
bh=e+j3b0sQmcO3Cl9uyrXtBH0Br1H6BfEk/m4i9uIvHx4=;
b=T485UTn09duWvJPLv170sHPFWSK91YKtMXS0POtepvixFjBQyRfdr55zHB8PtTOz8D
0wsopN83pU6xf9JZm4bzPcvAEt739G+YEwgxMUEsKikhw943crNI5fCcdbTwsYKBQiw2
AzcDX8ESXmJ1+lrRfr/s2pBvmsIm8BBXx82JRA+k8T95HQlywpIPws/wt9VIF+xtHVji
GAFeol9/T6P0HIT+r8gTBRv5R7jTBt19r0ieUIfa+9f4CWGE7+RVHpGjVtTGwAPB556Q
g+HNgUumB2pf00Vnqi4p4KVGtmA0XfUJd3j8MXZKYsdlMOi6vUhfDzHhuON6yBEr1RAi
usOw==
X-Gm-Message-State: APzg51Cdt6b+7I3T3/iY4WrtRkkdzI5bncggYI+la2MYknQSeHsX9IIG
GaLPONToOw05YtVbynzqtT1N+JNx
X-Received: by 2002:a17:902:e109:: with SMTP id
cc9-v6mr40647558plb.96.1536181360314;
Wed, 05 Sep 2018 14:02:40 -0700 (PDT)
Received: from localhost.localdomain ([2601:646:877f:9499::71e7])
by smtp.gmail.com with ESMTPSA id
e26-v6sm3689411pfi.70.2018.09.05.14.02.39
(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Wed, 05 Sep 2018 14:02:39 -0700 (PDT)
From: Khem Raj
To: openembedded-devel@lists.openembedded.org
Date: Wed, 5 Sep 2018 14:02:21 -0700
Message-Id: <20180905210224.21225-9-raj.khem@gmail.com>
X-Mailer: git-send-email 2.18.0
In-Reply-To: <20180905210224.21225-1-raj.khem@gmail.com>
References: <20180905210224.21225-1-raj.khem@gmail.com>
Subject: [oe] [meta-oe][PATCH 09/12] liboauth: Fix build with openSSL 1.1.x
X-BeenThere: openembedded-devel@lists.openembedded.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Using the OpenEmbedded metadata to build Distributions
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Sender: openembedded-devel-bounces@lists.openembedded.org
Errors-To: openembedded-devel-bounces@lists.openembedded.org
Signed-off-by: Khem Raj
---
.../liboauth/0001-Support-OpenSSL-1.1.0.patch | 151 ++++++++++++++++++
.../liboauth/liboauth_1.0.3.bb | 4 +-
2 files changed, 154 insertions(+), 1 deletion(-)
create mode 100644 meta-oe/recipes-support/liboauth/liboauth/0001-Support-OpenSSL-1.1.0.patch
--
2.18.0
--
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel
diff --git a/meta-oe/recipes-support/liboauth/liboauth/0001-Support-OpenSSL-1.1.0.patch b/meta-oe/recipes-support/liboauth/liboauth/0001-Support-OpenSSL-1.1.0.patch
new file mode 100644
index 0000000000..8691eae2b5
--- /dev/null
+++ b/meta-oe/recipes-support/liboauth/liboauth/0001-Support-OpenSSL-1.1.0.patch
@@ -0,0 +1,151 @@
+From c14d9bf71753a38df57cc6538b22ed389d2c2cb1 Mon Sep 17 00:00:00 2001
+From: Khem Raj
+Date: Tue, 4 Sep 2018 17:18:51 -0700
+Subject: [PATCH] Support OpenSSL 1.1.0
+
+Taken from https://github.com/x42/liboauth/issues/9
+
+Upstream-Status: Submitted[https://github.com/x42/liboauth/issues/9]
+Signed-off-by: Khem Raj
+---
+ src/hash.c | 65 ++++++++++++++++++++++++++++++++++++------------------
+ 1 file changed, 44 insertions(+), 21 deletions(-)
+
+diff --git a/src/hash.c b/src/hash.c
+index 17ff5c8..e128826 100644
+--- a/src/hash.c
++++ b/src/hash.c
+@@ -362,6 +362,11 @@ looser:
+ #include "oauth.h" // base64 encode fn's.
+ #include
+
++#if OPENSSL_VERSION_NUMBER < 0x10100000
++#define EVP_MD_CTX_new EVP_MD_CTX_create
++#define EVP_MD_CTX_free EVP_MD_CTX_destroy
++#endif
++
+ char *oauth_sign_hmac_sha1 (const char *m, const char *k) {
+ return(oauth_sign_hmac_sha1_raw (m, strlen(m), k, strlen(k)));
+ }
+@@ -386,7 +391,7 @@ char *oauth_sign_rsa_sha1 (const char *m, const char *k) {
+ unsigned char *sig = NULL;
+ unsigned char *passphrase = NULL;
+ unsigned int len=0;
+- EVP_MD_CTX md_ctx;
++ EVP_MD_CTX *md_ctx;
+
+ EVP_PKEY *pkey;
+ BIO *in;
+@@ -399,24 +404,31 @@ char *oauth_sign_rsa_sha1 (const char *m, const char *k) {
+ return xstrdup("liboauth/OpenSSL: can not read private key");
+ }
+
++ md_ctx = EVP_MD_CTX_new();
++ if (md_ctx == NULL) {
++ return xstrdup("liboauth/OpenSSL: failed to allocate EVP_MD_CTX");
++ }
++
+ len = EVP_PKEY_size(pkey);
+ sig = (unsigned char*)xmalloc((len+1)*sizeof(char));
+
+- EVP_SignInit(&md_ctx, EVP_sha1());
+- EVP_SignUpdate(&md_ctx, m, strlen(m));
+- if (EVP_SignFinal (&md_ctx, sig, &len, pkey)) {
++ EVP_SignInit(md_ctx, EVP_sha1());
++ EVP_SignUpdate(md_ctx, m, strlen(m));
++ if (EVP_SignFinal (md_ctx, sig, &len, pkey)) {
+ char *tmp;
+ sig[len] = '\0';
+ tmp = oauth_encode_base64(len,sig);
+ OPENSSL_free(sig);
+ EVP_PKEY_free(pkey);
++ EVP_MD_CTX_free(md_ctx);
+ return tmp;
+ }
++ EVP_MD_CTX_free(md_ctx);
+ return xstrdup("liboauth/OpenSSL: rsa-sha1 signing failed");
+ }
+
+ int oauth_verify_rsa_sha1 (const char *m, const char *c, const char *s) {
+- EVP_MD_CTX md_ctx;
++ EVP_MD_CTX *md_ctx;
+ EVP_PKEY *pkey;
+ BIO *in;
+ X509 *cert = NULL;
+@@ -437,13 +449,18 @@ int oauth_verify_rsa_sha1 (const char *m, const char *c, const char *s) {
+ return -2;
+ }
+
++ md_ctx = EVP_MD_CTX_new();
++ if (md_ctx == NULL) {
++ return -2;
++ }
++
+ b64d= (unsigned char*) xmalloc(sizeof(char)*strlen(s));
+ slen = oauth_decode_base64(b64d, s);
+
+- EVP_VerifyInit(&md_ctx, EVP_sha1());
+- EVP_VerifyUpdate(&md_ctx, m, strlen(m));
+- err = EVP_VerifyFinal(&md_ctx, b64d, slen, pkey);
+- EVP_MD_CTX_cleanup(&md_ctx);
++ EVP_VerifyInit(md_ctx, EVP_sha1());
++ EVP_VerifyUpdate(md_ctx, m, strlen(m));
++ err = EVP_VerifyFinal(md_ctx, b64d, slen, pkey);
++ EVP_MD_CTX_free(md_ctx);
+ EVP_PKEY_free(pkey);
+ xfree(b64d);
+ return (err);
+@@ -455,35 +472,41 @@ int oauth_verify_rsa_sha1 (const char *m, const char *c, const char *s) {
+ */
+ char *oauth_body_hash_file(char *filename) {
+ unsigned char fb[BUFSIZ];
+- EVP_MD_CTX ctx;
++ EVP_MD_CTX *ctx;
+ size_t len=0;
+ unsigned char *md;
+ FILE *F= fopen(filename, "r");
+ if (!F) return NULL;
+
+- EVP_MD_CTX_init(&ctx);
+- EVP_DigestInit(&ctx,EVP_sha1());
++ ctx = EVP_MD_CTX_new();
++ if (ctx == NULL) {
++ return xstrdup("liboauth/OpenSSL: failed to allocate EVP_MD_CTX");
++ }
++ EVP_DigestInit(ctx,EVP_sha1());
+ while (!feof(F) && (len=fread(fb,sizeof(char),BUFSIZ, F))>0) {
+- EVP_DigestUpdate(&ctx, fb, len);
++ EVP_DigestUpdate(ctx, fb, len);
+ }
+ fclose(F);
+ len=0;
+ md=(unsigned char*) xcalloc(EVP_MD_size(EVP_sha1()),sizeof(unsigned char));
+- EVP_DigestFinal(&ctx, md,(unsigned int*) &len);
+- EVP_MD_CTX_cleanup(&ctx);
++ EVP_DigestFinal(ctx, md,(unsigned int*) &len);
++ EVP_MD_CTX_free(ctx);
+ return oauth_body_hash_encode(len, md);
+ }
+
+ char *oauth_body_hash_data(size_t length, const char *data) {
+- EVP_MD_CTX ctx;
++ EVP_MD_CTX *ctx;
+ size_t len=0;
+ unsigned char *md;
+ md=(unsigned char*) xcalloc(EVP_MD_size(EVP_sha1()),sizeof(unsigned char));
+- EVP_MD_CTX_init(&ctx);
+- EVP_DigestInit(&ctx,EVP_sha1());
+- EVP_DigestUpdate(&ctx, data, length);
+- EVP_DigestFinal(&ctx, md,(unsigned int*) &len);
+- EVP_MD_CTX_cleanup(&ctx);
++ ctx = EVP_MD_CTX_new();
++ if (ctx == NULL) {
++ return xstrdup("liboauth/OpenSSL: failed to allocate EVP_MD_CTX");
++ }
++ EVP_DigestInit(ctx,EVP_sha1());
++ EVP_DigestUpdate(ctx, data, length);
++ EVP_DigestFinal(ctx, md,(unsigned int*) &len);
++ EVP_MD_CTX_free(ctx);
+ return oauth_body_hash_encode(len, md);
+ }
+
diff --git a/meta-oe/recipes-support/liboauth/liboauth_1.0.3.bb b/meta-oe/recipes-support/liboauth/liboauth_1.0.3.bb
index 3311da5a8f..498764ac83 100644
--- a/meta-oe/recipes-support/liboauth/liboauth_1.0.3.bb
+++ b/meta-oe/recipes-support/liboauth/liboauth_1.0.3.bb
@@ -9,7 +9,9 @@ LIC_FILES_CHKSUM = "file://COPYING.MIT;md5=6266718a5241c045c8099d9be48817df \
SECTION = "libs"
DEPENDS = "curl openssl"
-SRC_URI = "${SOURCEFORGE_MIRROR}/project/${BPN}/${BP}.tar.gz"
+SRC_URI = "${SOURCEFORGE_MIRROR}/project/${BPN}/${BP}.tar.gz \
+ file://0001-Support-OpenSSL-1.1.0.patch \
+ "
SRC_URI[md5sum] = "689b46c2b3ab1a39735ac33f714c4f7f"
SRC_URI[sha256sum] = "0df60157b052f0e774ade8a8bac59d6e8d4b464058cc55f9208d72e41156811f"
From patchwork Wed Sep 5 21:02:22 2018
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: Khem Raj
X-Patchwork-Id: 146049
Delivered-To: patch@linaro.org
Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp30603ljw;
Wed, 5 Sep 2018 14:03:58 -0700 (PDT)
X-Google-Smtp-Source: ANB0VdYnQZBQkdDOvrlmsE0xZe9ok63T1l9NyBCQuH7jEqEE3MCaAbY12Je4KOHM5RII5iQzKX0e
X-Received: by 2002:a63:4745:: with SMTP id
w5-v6mr16055822pgk.140.1536181437907;
Wed, 05 Sep 2018 14:03:57 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1536181437; cv=none;
d=google.com; s=arc-20160816;
b=sU43nLltnkTebu0a6qmIvXxETlSp3L2iPNNma6EeHA1466VRJLuS/Fel4KBN0q2AOP
zS2GrxrHl6Mctw/Bl00tD+g2iLUv9BAMT+DRbWTGLgp8jH/oUFwxcbSi1tQNcdRHYIHw
80I0Z6ND55ms5XmBBqIpkbLswz5BKIE9nX/hwK0uZK0ulUhP92ze/CIfvfWFcHZY1vj/
RWUM43z4PxK96hR9U0+5kwqhspAXFY4RoEmlO3WDWMozAIMAR2jeE2C7Ovux3Ggcc4eV
sjPTKb2nQph2u8BuIUcWlR1Fzay9AH/lo42O87GO+9iAlfhHA76OdB5pi2qC7x8H3z+s
aV1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
s=arc-20160816;
h=errors-to:sender:content-transfer-encoding:mime-version
:list-subscribe:list-help:list-post:list-archive:list-unsubscribe
:list-id:precedence:subject:references:in-reply-to:message-id:date
:to:from:dkim-signature:delivered-to;
bh=s1WCeSpWUK/CGI9GIIDOWfy6/8WfPyYFNk+dcHvuk6s=;
b=baJzv06LzQQFe+f7WTiRM7MB1K8B9ojZYV0ioTlom6+x7JQ6wcROohUHOpzLxJHL+V
XPFkNVsuZM6V0togtFMBDNaA+ndNREosIZ1Rb/wRb+uJR24qq7ja234jP5Fhj6jNzAPq
QZX9yLYFzoQ9TlRSvSPlzEtebbrX0fBDBxTEPxw+u8OEh88c1kodUIRls7z0j2YDq1eb
mlY6GbABUEKTZ4nDJaNL2rISK7lWl6fXycAWxvXeoAnq+vC6VBNoRIvG4sJzOYmkpLlZ
EH9CgkXm1dDZ9EanKncmsj+ILcnGdqXUOEJyWAA3Y5WxMfLHZTTUTZrUy6FiPvdKPvqK
gQYg==
ARC-Authentication-Results: i=1; mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=FjAj72uC;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Return-Path:
Received: from mail.openembedded.org (mail.openembedded.org.
[140.211.169.62]) by mx.google.com with ESMTP id
r34-v6si3105465pgb.656.2018.09.05.14.03.57;
Wed, 05 Sep 2018 14:03:57 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender) client-ip=140.211.169.62;
Authentication-Results: mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=FjAj72uC;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Received: from layers.openembedded.org (localhost [127.0.0.1])
by mail.openembedded.org (Postfix) with ESMTP id 94DDE7944D;
Wed, 5 Sep 2018 21:03:03 +0000 (UTC)
X-Original-To: openembedded-devel@lists.openembedded.org
Delivered-To: openembedded-devel@lists.openembedded.org
Received: from mail-pl1-f193.google.com (mail-pl1-f193.google.com
[209.85.214.193])
by mail.openembedded.org (Postfix) with ESMTP id 55A76793E6
for ;
Wed, 5 Sep 2018 21:02:40 +0000 (UTC)
Received: by mail-pl1-f193.google.com with SMTP id h3-v6so510337plh.10
for ;
Wed, 05 Sep 2018 14:02:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=from:to:cc:subject:date:message-id:in-reply-to:references;
bh=doIuFTzTmgAJeB6syKbQnIE6dNf5NKdHqiDT33HfaXI=;
b=FjAj72uCYAyUQCTyKaP27zCChMHsilTAjL82jyxh7Jc8SbKXCLV9flm/uQTXQwRGxQ
mL/Q8RlwTcXfUm5rTYn71hyEyzuwWUwj8PqW1vEZ49PZ++imbejWIxRT8TBvZSdeIjmS
jQtHSISM4e4hKLFeYm2q8z/+W8uv3fAGFjZjQmtEhI6843/Cw9ZFN+Yb3OLeYRp5wvQq
/T+4VvwkQnK4X2t416Dj15VyW+6mMfxOQnwXqA4h1YoUPOulxp7VtlbGp2zLqJ1E/niz
7PsVl5ZUxg+M36oxdFTEcutDWf62mBdy/ANFmbEVHOpjc7VDQWFjVgBB+Pya5oFDl4MF
x74g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
:references;
bh=doIuFTzTmgAJeB6syKbQnIE6dNf5NKdHqiDT33HfaXI=;
b=DWJz7e5IOtLxjIUTEnnC59/QzCD0aObrHjY0/w6wQ+2Em8FZN6+WyDMqm57cBBHPwx
MdF5BJ56IEpWca8+W08ZY7W3hdTQ4HeV/13VUKXiFuCZbdxU6yq1YcPWEWGiLxVsNlUZ
52krMUamQBPyD8Gga9uY1p8gWmBZs4lxBu9uujy5sqkU6I64/70u9vk/2hgAn24/R/I6
Q3z0j8hzy5gv35VaHUS5lk/m3Pd4UUJwWS3ulnCqTNvgOul/KM7+Ygxo8Xa0JfDUaRNN
cT3YrqkN1Qz9SdtNmtuPF6V3cRPpWHmhpJePmRflJp+p34WCdvZmsMA5xYwYZQHca/AI
QdVQ==
X-Gm-Message-State: APzg51Dd+B3aEkiV9qWxlDYyxSkAD4/i2lQ5pqtsfTSuyamu1dGkLjlF
iLt4LiirHAxybUkBC9v6KuaHCJme
X-Received: by 2002:a17:902:a413:: with SMTP id
p19-v6mr40595649plq.220.1536181361312;
Wed, 05 Sep 2018 14:02:41 -0700 (PDT)
Received: from localhost.localdomain ([2601:646:877f:9499::71e7])
by smtp.gmail.com with ESMTPSA id
e26-v6sm3689411pfi.70.2018.09.05.14.02.40
(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Wed, 05 Sep 2018 14:02:40 -0700 (PDT)
From: Khem Raj
To: openembedded-devel@lists.openembedded.org
Date: Wed, 5 Sep 2018 14:02:22 -0700
Message-Id: <20180905210224.21225-10-raj.khem@gmail.com>
X-Mailer: git-send-email 2.18.0
In-Reply-To: <20180905210224.21225-1-raj.khem@gmail.com>
References: <20180905210224.21225-1-raj.khem@gmail.com>
Subject: [oe] [meta-oe][PATCH 10/12] sip: Upgrade to 4.19.12 release
X-BeenThere: openembedded-devel@lists.openembedded.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Using the OpenEmbedded metadata to build Distributions
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Sender: openembedded-devel-bounces@lists.openembedded.org
Errors-To: openembedded-devel-bounces@lists.openembedded.org
Inherit pythonnative instead of using python from build host
Signed-off-by: Khem Raj
---
.../recipes-devtools/sip/{sip_4.19.8.bb => sip_4.19.12.bb} | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
rename meta-oe/recipes-devtools/sip/{sip_4.19.8.bb => sip_4.19.12.bb} (90%)
--
2.18.0
--
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel
diff --git a/meta-oe/recipes-devtools/sip/sip_4.19.8.bb b/meta-oe/recipes-devtools/sip/sip_4.19.12.bb
similarity index 90%
rename from meta-oe/recipes-devtools/sip/sip_4.19.8.bb
rename to meta-oe/recipes-devtools/sip/sip_4.19.12.bb
index ea944b32ff..be58959989 100644
--- a/meta-oe/recipes-devtools/sip/sip_4.19.8.bb
+++ b/meta-oe/recipes-devtools/sip/sip_4.19.12.bb
@@ -4,13 +4,13 @@ SECTION = "devel"
LICENSE = "GPLv2+"
LIC_FILES_CHKSUM = "file://LICENSE-GPL2;md5=e91355d8a6f8bd8f7c699d62863c7303"
-inherit python-dir
+inherit python-dir pythonnative
DEPENDS = "python"
SRC_URI = "${SOURCEFORGE_MIRROR}/project/pyqt/sip/sip-${PV}/sip-${PV}.tar.gz"
-SRC_URI[md5sum] = "0625fb20347d4ff1b5da551539be0727"
-SRC_URI[sha256sum] = "7eaf7a2ea7d4d38a56dd6d2506574464bddf7cf284c960801679942377c297bc"
+SRC_URI[md5sum] = "e28b0790dfe4962ce6bbd7c4772f40c9"
+SRC_URI[sha256sum] = "24617fc31b983df075500ecac0e99d2fb48bf63ba82d4a17518659e571923822"
BBCLASSEXTEND = "native"
From patchwork Wed Sep 5 21:02:23 2018
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: Khem Raj
X-Patchwork-Id: 146050
Delivered-To: patch@linaro.org
Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp30725ljw;
Wed, 5 Sep 2018 14:04:06 -0700 (PDT)
X-Google-Smtp-Source: ANB0VdajO7QsxxO4u3HSRbpk7U5Tp4tGJdLzvXz8sZwbgFXFcn+d8Iv2rtnmuBlmUWQ3WnNYGaSK
X-Received: by 2002:a62:455b:: with SMTP id
s88-v6mr42101765pfa.203.1536181446125;
Wed, 05 Sep 2018 14:04:06 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1536181446; cv=none;
d=google.com; s=arc-20160816;
b=JK9ayfPDJnY5qR2LC9jOlwbEbjs+MdQ1zsRy2MW65YT8IS8rgLBHNnmK/YHlb68oXv
F20ilOtWiyWku+w3jZc6xzwNpIRNdltpvgfix8TNvNx69fGIXbXkV5bMfeS08xFtLYnP
i/X+jESFqZ/61/wvaL8VtKVzECZehWpzjqK3MbwUzED4ejkOGwiRGG0e1Zdrm/vye69e
2lXje+Gay4OWw/OJmAaTzIFzo0K5EZxhcSnbEwVEaIIxrHl4EeniZUE293a5be4Avswj
hJynq8U0NXcr4hk7b0R0WKPXGKa888E9+Y13Q8JLj+lfXcpW20E+8XY7GDjdlCjjiY1u
CEWA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
s=arc-20160816;
h=errors-to:sender:content-transfer-encoding:mime-version
:list-subscribe:list-help:list-post:list-archive:list-unsubscribe
:list-id:precedence:subject:references:in-reply-to:message-id:date
:to:from:dkim-signature:delivered-to;
bh=ChbPTMmSriOW69C9nqzMv7KgXOT37oZ8I9PscyhGiIs=;
b=rRWkkEQ0Ce9joDbGU2dKBqUrd2KQAEsqJsjf6eYEaQzKiABtpOGAuWOJJk03V/XVk6
uKc7/R+cYav+QWxpMcSw8MWPuP+gCK73l0dS13UXY2niiRLgqVcnhTx6DVXQLvHAI4Zu
R7DQXfhhMlPjnLm1FgmlT3c/NvtDCa1z+FM0YozJ6u/AqfYDKot5XjY2HOB3tdCWQT0E
XaAqQRQ9f7WHODdPIgmvMBsoORCSo2arlaZ/TgwBAfcejDCFRoQnjHV4J8XrZGL7mVlI
/OWSPEyYfvssMovrlL6ygb1BnYrcYh4nxwn+tz1/OLyJosuqNZqSi3ghMiCvOJz9EVMJ
92Yw==
ARC-Authentication-Results: i=1; mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=AoILfCzU;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Return-Path:
Received: from mail.openembedded.org (mail.openembedded.org.
[140.211.169.62]) by mx.google.com with ESMTP id
y9-v6si2836770plt.9.2018.09.05.14.04.05;
Wed, 05 Sep 2018 14:04:06 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender) client-ip=140.211.169.62;
Authentication-Results: mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=AoILfCzU;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Received: from layers.openembedded.org (localhost [127.0.0.1])
by mail.openembedded.org (Postfix) with ESMTP id D55607950F;
Wed, 5 Sep 2018 21:03:04 +0000 (UTC)
X-Original-To: openembedded-devel@lists.openembedded.org
Delivered-To: openembedded-devel@lists.openembedded.org
Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com
[209.85.210.169])
by mail.openembedded.org (Postfix) with ESMTP id 6D39179034
for ;
Wed, 5 Sep 2018 21:02:42 +0000 (UTC)
Received: by mail-pf1-f169.google.com with SMTP id k19-v6so4105476pfi.1
for ;
Wed, 05 Sep 2018 14:02:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=from:to:cc:subject:date:message-id:in-reply-to:references;
bh=KTeJ6TG92gkE6Js9/tpr/MzUxYeRkZGp8XzW51NCYM4=;
b=AoILfCzUiOFuYr2YQs0jq52s01wQPfmWS3He3AM5rx4s4DDMrr0SUfHG8mwxqHS5a2
K1+NV9vKGuQAMHngY8Jqeiv1L6nEs1nyWH+h/2UR0ap+QdyK8e0xVdmN+WU/A75U2o7g
PnTBsG1Y/FxXAg4OxWDAFAtqd6GcN+WylGB14HpSw8csFnuzMTDaHWAW8wRZxtYIUydN
vFOm1QkiCNcCuGv6aBxSKfiuqI3hgpKUTcDUOu2CEjJ0bwZPNbyI+IS+7kUTp9wlFQD4
bOWH1TDtpfFwDy7KlTDIwCT/4l4ruC9JLBInwE7ETixvDLRQiricydGjSS/3K+XLvshc
5mJQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
:references;
bh=KTeJ6TG92gkE6Js9/tpr/MzUxYeRkZGp8XzW51NCYM4=;
b=dvD+S6INw1LaJ6zo6OqdzvZzwhm17UNPaphh18amm1Rae06NTqOeBGcvYsQkA/DEJb
ttvDMbfnGXXvroVDi7iV6fgi7p2S0pNbdsZ0NhGKXu0WLVV802DQkyhY253ZZbaNjUuZ
sDyo2UgYEipumJFMK7i0uzB7gFdeE8nP3iWT7wSjH92jfGC1ekd7Lsl5twEv1P88noUJ
dEWkQn8nPZPB302nAP3CFUmUqu8m5caz/RrA7lH8Wy5Uu20/1xsZBFZDgeZhrYitROB6
91O9/iFrGEFyM2G7TIyq713yC4wYn6iopbB51gswY35JlSzHGaqcVKlioKnRImOj/JI6
B50Q==
X-Gm-Message-State: APzg51DsyslYyKb7pieyZvLf2llNi2RZ+MDiiHrUQ9OuuyrOY74RvvaT
qcgxIJlceBW+TjJkRgj8rsZ8fFfy
X-Received: by 2002:a63:d70e:: with SMTP id
d14-v6mr38858585pgg.110.1536181362476;
Wed, 05 Sep 2018 14:02:42 -0700 (PDT)
Received: from localhost.localdomain ([2601:646:877f:9499::71e7])
by smtp.gmail.com with ESMTPSA id
e26-v6sm3689411pfi.70.2018.09.05.14.02.41
(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Wed, 05 Sep 2018 14:02:41 -0700 (PDT)
From: Khem Raj
To: openembedded-devel@lists.openembedded.org
Date: Wed, 5 Sep 2018 14:02:23 -0700
Message-Id: <20180905210224.21225-11-raj.khem@gmail.com>
X-Mailer: git-send-email 2.18.0
In-Reply-To: <20180905210224.21225-1-raj.khem@gmail.com>
References: <20180905210224.21225-1-raj.khem@gmail.com>
Subject: [oe] [meta-networking][PATCH 11/12] nopoll: Upgrade to 0.4.6.b400
X-BeenThere: openembedded-devel@lists.openembedded.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Using the OpenEmbedded metadata to build Distributions
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Sender: openembedded-devel-bounces@lists.openembedded.org
Errors-To: openembedded-devel-bounces@lists.openembedded.org
Signed-off-by: Khem Raj
---
.../nopoll/{nopoll_0.4.2.b297.bb => nopoll_0.4.6.b400.bb} | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
rename meta-networking/recipes-protocols/nopoll/{nopoll_0.4.2.b297.bb => nopoll_0.4.6.b400.bb} (84%)
--
2.18.0
--
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel
diff --git a/meta-networking/recipes-protocols/nopoll/nopoll_0.4.2.b297.bb b/meta-networking/recipes-protocols/nopoll/nopoll_0.4.6.b400.bb
similarity index 84%
rename from meta-networking/recipes-protocols/nopoll/nopoll_0.4.2.b297.bb
rename to meta-networking/recipes-protocols/nopoll/nopoll_0.4.6.b400.bb
index 1d77891d47..8c57d29492 100644
--- a/meta-networking/recipes-protocols/nopoll/nopoll_0.4.2.b297.bb
+++ b/meta-networking/recipes-protocols/nopoll/nopoll_0.4.6.b400.bb
@@ -13,8 +13,8 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=f0504124678c1b3158146e0630229298 \
DEPENDS = "openssl"
SRC_URI = "http://www.aspl.es/nopoll/downloads/nopoll-${PV}.tar.gz \
"
-SRC_URI[md5sum] = "8c411cd0f3c0479aed28c4cf7b114fbb"
-SRC_URI[sha256sum] = "f5fbf8aaa16a77b0f265d8c847eb06cb3e68f2b1a50737466dae81181618654c"
+SRC_URI[md5sum] = "8d333f158b5d5a8975a6149e6ef8db63"
+SRC_URI[sha256sum] = "7f1b20f1d0525f30cdd2a4fc386d328b4cf98c6d11cef51fe62cd9491ba19ad9"
inherit autotools pkgconfig
From patchwork Wed Sep 5 21:02:24 2018
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: Khem Raj
X-Patchwork-Id: 146051
Delivered-To: patch@linaro.org
Received: by 2002:a2e:1648:0:0:0:0:0 with SMTP id 8-v6csp30853ljw;
Wed, 5 Sep 2018 14:04:13 -0700 (PDT)
X-Google-Smtp-Source: ANB0VdZ4bcDSQcpsQkI8iAKptuMubllvSXWRS9nTNqjKtycDQsy/TNcA/8i2rprFfTjp0utGbEzE
X-Received: by 2002:a63:5c10:: with SMTP id
q16-v6mr38082210pgb.452.1536181453278;
Wed, 05 Sep 2018 14:04:13 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1536181453; cv=none;
d=google.com; s=arc-20160816;
b=wyNpQrv4uHsPsV8tSN3xXklOWfSKlr8li24SePUh0DgvuV0yl+imlSuqjYtzKqUFh7
xjtgPwga7PhMnWtfeY7xdjIh68F7zAJNhMUIRkauNdGlXT/2OS/8V251tdlSLVKM+kCj
N1xIYVYb/dWzxvqWR3djHxqo/sqinFG5A8Wb5ot4LcqCdO+P/b60bBo5XYFMtmthSxeA
O8wwnG+AkBiJ9Vet9JzuqwwlAlD+drGFZtC3ooBwUMcD0rkMTaPoEJyQ0LwtcHJQVd8r
Ijdsu98jrS/8sQDtr9P6Lkp5ivPtTjtAEvzTYItK4WlO2Ha0Ic4S9Ie3a1EPcFBgnLxq
ihqA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com;
s=arc-20160816;
h=errors-to:sender:content-transfer-encoding:mime-version
:list-subscribe:list-help:list-post:list-archive:list-unsubscribe
:list-id:precedence:subject:references:in-reply-to:message-id:date
:to:from:dkim-signature:delivered-to;
bh=Houeg3yBzQda3vUqDcjt/EZ5RCDn4rH+B+JKEGEe/a8=;
b=hdFA//uwg+IT4bXVLu7h6ExnZYDgKxTGrE6Z0MqWLuj0PlLWs55qPwGfRjgc4+xUvZ
wwTwyiNYn4yBiA+6NgQ7EWNcCO46AlUa/iEsd9a/gFxF4izokyVmJbpmsciwYiRfRtym
En+h2I4xrOQ8i9mJX2E//+euAweG/MTU7YY9+uE97F0lvqDGr+lCrxK4yb3P+YauwtNp
InIum9rGH6+66iPx1UyAFpXLjRigkZNT+b6pulriMnYP2hHCS66crLw8rSLwiuQ2rXKT
gjhl/cTPXXrUs/MMKYmAb1Iovi1XaXvUyNjUP37MrnIL6X3+DgLXvBgJxA7tv175ka8t
u3og==
ARC-Authentication-Results: i=1; mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=eyf05sU+;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Return-Path:
Received: from mail.openembedded.org (mail.openembedded.org.
[140.211.169.62]) by mx.google.com with ESMTP id
f4-v6si2873727plr.213.2018.09.05.14.04.13;
Wed, 05 Sep 2018 14:04:13 -0700 (PDT)
Received-SPF: pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender) client-ip=140.211.169.62;
Authentication-Results: mx.google.com;
dkim=neutral (body hash did not verify) header.i=@gmail.com
header.s=20161025 header.b=eyf05sU+;
spf=pass (google.com: best guess record for domain of
openembedded-devel-bounces@lists.openembedded.org designates
140.211.169.62 as permitted sender)
smtp.mailfrom=openembedded-devel-bounces@lists.openembedded.org;
dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com
Received: from layers.openembedded.org (localhost [127.0.0.1])
by mail.openembedded.org (Postfix) with ESMTP id EABAF79514;
Wed, 5 Sep 2018 21:03:05 +0000 (UTC)
X-Original-To: openembedded-devel@lists.openembedded.org
Delivered-To: openembedded-devel@lists.openembedded.org
Received: from mail-pg1-f173.google.com (mail-pg1-f173.google.com
[209.85.215.173])
by mail.openembedded.org (Postfix) with ESMTP id 16B0F79034
for ;
Wed, 5 Sep 2018 21:02:42 +0000 (UTC)
Received: by mail-pg1-f173.google.com with SMTP id d19-v6so4044989pgv.1
for ;
Wed, 05 Sep 2018 14:02:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=from:to:cc:subject:date:message-id:in-reply-to:references;
bh=a4hzTa2uUSAeUCtHAq2Zi0BYyt4Nbf9kVAH+0mqCivI=;
b=eyf05sU+HLwC2Sd8wGXrCAUmimhhKa+bnjH48xP/nizWRW7FnP+wVWG9IxOHgZsx1t
Lrw1SvzxJ3VjRR29p5LY0bP/CgGXZC7La4QuVCwndJyHTEWC5VcVJ0S5tUQKF+SitSbC
F1eb3XWDO2S+tBdg2JO9a5s6+kb9kAS4NihjTSOTbTiUOFVm8chnneGO9a0NwQCNbyGc
pS7VhKvVjZ2Q+NB0tBM41MhTphyxvordXwQyaApgp9to6i2S/Gzow4B3gBHZZWffdR2w
30ku+X4YeVeua0KEplNw5QUvN1O7+Yv0DXJh9sEOsBc/rInQOSXS9Vc/er1snZk18l+N
Njww==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to
:references;
bh=a4hzTa2uUSAeUCtHAq2Zi0BYyt4Nbf9kVAH+0mqCivI=;
b=nwJBsEccfxc+ol0ExSNOAHkgT3jgmDD0lvd2X9XF57YXY1BX65lSY2oY/ACHwTGxAz
Tv12RzTLwiAJ78GBcoUtvk8Hd86w50uaxHnKm8mVN+IRwfa8eYiCwyloH6oSOnIVPY4D
NKHNDBDR1yYRaufyca2udqDHy+9yiUWqfluU9G7DrtDakzG9oSQeYpjwvRDx/DfbFIDw
etIi4IMek5iK2DccBB37KyTa/UO9/nOghSYwpu5gzVaBXwfHtFVoJbuVxYUETVi++HfJ
EahvJSvMUhT8g9J8K728zWK7HTVKIkHorGbq9EvSwNT0/GhW9NApCsrNtjSM+tmKWcRv
73jw==
X-Gm-Message-State: APzg51BpK+87ZypUb4v7xwOzd0c28TULy1JZAUkWL7M226Bz6zndFYAj
De9/k5TExe8zM5stcsteSL91kFXT
X-Received: by 2002:a63:1b07:: with SMTP id
b7-v6mr14713942pgb.444.1536181363926;
Wed, 05 Sep 2018 14:02:43 -0700 (PDT)
Received: from localhost.localdomain ([2601:646:877f:9499::71e7])
by smtp.gmail.com with ESMTPSA id
e26-v6sm3689411pfi.70.2018.09.05.14.02.42
(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
Wed, 05 Sep 2018 14:02:42 -0700 (PDT)
From: Khem Raj
To: openembedded-devel@lists.openembedded.org
Date: Wed, 5 Sep 2018 14:02:24 -0700
Message-Id: <20180905210224.21225-12-raj.khem@gmail.com>
X-Mailer: git-send-email 2.18.0
In-Reply-To: <20180905210224.21225-1-raj.khem@gmail.com>
References: <20180905210224.21225-1-raj.khem@gmail.com>
Subject: [oe] [meta-multimedia][PATCH 12/12] rtmpdump: Depend on openssl10 and
X-BeenThere: openembedded-devel@lists.openembedded.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Using the OpenEmbedded metadata to build Distributions
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Sender: openembedded-devel-bounces@lists.openembedded.org
Errors-To: openembedded-devel-bounces@lists.openembedded.org
Signed-off-by: Khem Raj
---
.../rtmpdump/rtmpdump/fix-racing-build-issue.patch | 10 +++++-----
.../recipes-multimedia/rtmpdump/rtmpdump_2.4.bb | 4 ++--
2 files changed, 7 insertions(+), 7 deletions(-)
--
2.18.0
--
_______________________________________________
Openembedded-devel mailing list
Openembedded-devel@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-devel
diff --git a/meta-multimedia/recipes-multimedia/rtmpdump/rtmpdump/fix-racing-build-issue.patch b/meta-multimedia/recipes-multimedia/rtmpdump/rtmpdump/fix-racing-build-issue.patch
index bb3d8b0efe..6e11c9752e 100644
--- a/meta-multimedia/recipes-multimedia/rtmpdump/rtmpdump/fix-racing-build-issue.patch
+++ b/meta-multimedia/recipes-multimedia/rtmpdump/rtmpdump/fix-racing-build-issue.patch
@@ -8,11 +8,11 @@ Index: git/librtmp/Makefile
===================================================================
--- git.orig/librtmp/Makefile
+++ git/librtmp/Makefile
-@@ -107,6 +107,7 @@ install_base: librtmp.a librtmp.pc
+@@ -115,6 +115,7 @@ install_base: librtmp.a librtmp.pc
cp librtmp.3 $(MANDIR)/man3
- install_so: librtmp.$(SO_EXT)
+ install_so: librtmp$(SO_EXT)
+ -mkdir -p $(SODIR)
- cp librtmp.$(SO_EXT) $(SODIR)
- cd $(SODIR); ln -sf librtmp.$(SO_EXT) librtmp.$(SOX)
-
+ cp librtmp$(SO_EXT) $(SODIR)
+ $(INSTALL_IMPLIB)
+ cd $(SODIR); ln -sf librtmp$(SO_EXT) librtmp.$(SOX)
diff --git a/meta-multimedia/recipes-multimedia/rtmpdump/rtmpdump_2.4.bb b/meta-multimedia/recipes-multimedia/rtmpdump/rtmpdump_2.4.bb
index c5513b0252..a72b0d651e 100644
--- a/meta-multimedia/recipes-multimedia/rtmpdump/rtmpdump_2.4.bb
+++ b/meta-multimedia/recipes-multimedia/rtmpdump/rtmpdump_2.4.bb
@@ -5,9 +5,9 @@ HOMEPAGE = "http://rtmpdump.mplayerhq.hu/"
LICENSE = "GPLv2"
LIC_FILES_CHKSUM = "file://COPYING;md5=751419260aa954499f7abaabaa882bbe"
-DEPENDS = "openssl zlib"
+DEPENDS = "openssl10 zlib"
-SRCREV = "3121324046e4ca1934e7e28293fc8326475d5053"
+SRCREV = "fa8646daeb19dfd12c181f7d19de708d623704c0"
SRC_URI = " \
git://git.ffmpeg.org/rtmpdump \
file://fix-racing-build-issue.patch"