diff options
| author | Derek Straka <derek@asterius.io> | 2016-07-15 15:03:30 -0400 |
|---|---|---|
| committer | Martin Jansa <Martin.Jansa@gmail.com> | 2016-07-22 21:45:39 +0200 |
| commit | ae9a0c58b44dc8800eed734df1195976f11fe2d8 (patch) | |
| tree | 47db890b8294fcc223a285fbfe24d3433a84fb95 /meta-python/recipes-devtools/python/python-cryptography | |
| parent | d212af495f78f7f0ee72fbe4931e31c57b7ca2c2 (diff) | |
| download | meta-openembedded-ae9a0c58b44dc8800eed734df1195976f11fe2d8.tar.gz | |
python-cryptography: update to version 1.4 and remove patches now available with the latest release
Signed-off-by: Derek Straka <derek@asterius.io>
Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-cryptography')
3 files changed, 0 insertions, 127 deletions
diff --git a/meta-python/recipes-devtools/python/python-cryptography/Comment_lingering_SSLv2_symbol.patch b/meta-python/recipes-devtools/python/python-cryptography/Comment_lingering_SSLv2_symbol.patch deleted file mode 100644 index b28e7efff1..0000000000 --- a/meta-python/recipes-devtools/python/python-cryptography/Comment_lingering_SSLv2_symbol.patch +++ /dev/null | |||
| @@ -1,24 +0,0 @@ | |||
| 1 | From f326e4a97cce6b9479560ce0c65ad18d54393f96 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Cory Benfield <lukasaoz@gmail.com> | ||
| 3 | Date: Mon, 14 Dec 2015 15:37:46 +0000 | ||
| 4 | Subject: [PATCH] Comment lingering SSLv2 symbol. | ||
| 5 | |||
| 6 | --- | ||
| 7 | src/_cffi_src/openssl/ssl.py | 4 ++++ | ||
| 8 | 1 file changed, 4 insertions(+) | ||
| 9 | |||
| 10 | Index: cryptography-1.1/src/_cffi_src/openssl/ssl.py | ||
| 11 | =================================================================== | ||
| 12 | --- cryptography-1.1.orig/src/_cffi_src/openssl/ssl.py | ||
| 13 | +++ cryptography-1.1/src/_cffi_src/openssl/ssl.py | ||
| 14 | @@ -421,6 +421,10 @@ const long SSL_OP_LEGACY_SERVER_CONNECT | ||
| 15 | static const long Cryptography_HAS_SECURE_RENEGOTIATION = 1; | ||
| 16 | #endif | ||
| 17 | |||
| 18 | +/* Cryptography now compiles out all SSLv2 bindings. This exists to allow | ||
| 19 | + * clients that use it to check for SSLv2 support to keep functioning as | ||
| 20 | + * expected. | ||
| 21 | + */ | ||
| 22 | static const long Cryptography_HAS_SSL2 = 0; | ||
| 23 | |||
| 24 | #ifdef OPENSSL_NO_SSL3_METHOD | ||
diff --git a/meta-python/recipes-devtools/python/python-cryptography/Remove_SSLv2_bindings.patch b/meta-python/recipes-devtools/python/python-cryptography/Remove_SSLv2_bindings.patch deleted file mode 100644 index 8522325467..0000000000 --- a/meta-python/recipes-devtools/python/python-cryptography/Remove_SSLv2_bindings.patch +++ /dev/null | |||
| @@ -1,75 +0,0 @@ | |||
| 1 | From 90c6a53a885dd5c66992309e0af98ac554f1bb97 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Cory Benfield <lukasaoz@gmail.com> | ||
| 3 | Date: Mon, 14 Dec 2015 08:35:20 +0000 | ||
| 4 | Subject: [PATCH] Remove SSLv2 bindings. | ||
| 5 | |||
| 6 | This commit removes bindings that allow users to set SSLv2 handshake | ||
| 7 | methods. These are regarded as unnecessary and out-of-date: see #2527. | ||
| 8 | This commit does leave in a few options that refer to SSLv2 in order to | ||
| 9 | avoid breaking deployments that rely on them, and in order to allow | ||
| 10 | users to continue to request that SSLv2 not be enabled at all in their | ||
| 11 | OpenSSL. | ||
| 12 | |||
| 13 | Upstream-Status: Backport | ||
| 14 | |||
| 15 | This fixes the compile issue after updating to openssl 1.0.2h | ||
| 16 | Signed-off-by: Armin Kuster <akuster@mvista.com> | ||
| 17 | |||
| 18 | --- | ||
| 19 | src/_cffi_src/openssl/ssl.py | 17 +---------------- | ||
| 20 | .../hazmat/bindings/openssl/_conditional.py | 6 ------ | ||
| 21 | 2 files changed, 1 insertion(+), 22 deletions(-) | ||
| 22 | |||
| 23 | Index: cryptography-1.1/src/_cffi_src/openssl/ssl.py | ||
| 24 | =================================================================== | ||
| 25 | --- cryptography-1.1.orig/src/_cffi_src/openssl/ssl.py | ||
| 26 | +++ cryptography-1.1/src/_cffi_src/openssl/ssl.py | ||
| 27 | @@ -292,15 +292,6 @@ unsigned long SSL_CTX_add_extra_chain_ce | ||
| 28 | |||
| 29 | /* methods */ | ||
| 30 | |||
| 31 | -/* SSLv2 support is compiled out of some versions of OpenSSL. These will | ||
| 32 | - * get special support when we generate the bindings so that if they are | ||
| 33 | - * available they will be wrapped, but if they are not they won't cause | ||
| 34 | - * problems (like link errors). | ||
| 35 | - */ | ||
| 36 | -const SSL_METHOD *SSLv2_method(void); | ||
| 37 | -const SSL_METHOD *SSLv2_server_method(void); | ||
| 38 | -const SSL_METHOD *SSLv2_client_method(void); | ||
| 39 | - | ||
| 40 | /* | ||
| 41 | * TLSv1_1 and TLSv1_2 are recent additions. Only sufficiently new versions of | ||
| 42 | * OpenSSL support them. | ||
| 43 | @@ -429,14 +420,8 @@ const long SSL_OP_LEGACY_SERVER_CONNECT | ||
| 44 | #else | ||
| 45 | static const long Cryptography_HAS_SECURE_RENEGOTIATION = 1; | ||
| 46 | #endif | ||
| 47 | -#ifdef OPENSSL_NO_SSL2 | ||
| 48 | + | ||
| 49 | static const long Cryptography_HAS_SSL2 = 0; | ||
| 50 | -SSL_METHOD* (*SSLv2_method)(void) = NULL; | ||
| 51 | -SSL_METHOD* (*SSLv2_client_method)(void) = NULL; | ||
| 52 | -SSL_METHOD* (*SSLv2_server_method)(void) = NULL; | ||
| 53 | -#else | ||
| 54 | -static const long Cryptography_HAS_SSL2 = 1; | ||
| 55 | -#endif | ||
| 56 | |||
| 57 | #ifdef OPENSSL_NO_SSL3_METHOD | ||
| 58 | static const long Cryptography_HAS_SSL3_METHOD = 0; | ||
| 59 | Index: cryptography-1.1/src/cryptography/hazmat/bindings/openssl/_conditional.py | ||
| 60 | =================================================================== | ||
| 61 | --- cryptography-1.1.orig/src/cryptography/hazmat/bindings/openssl/_conditional.py | ||
| 62 | +++ cryptography-1.1/src/cryptography/hazmat/bindings/openssl/_conditional.py | ||
| 63 | @@ -274,12 +274,6 @@ CONDITIONAL_NAMES = { | ||
| 64 | "TLSv1_2_client_method", | ||
| 65 | ], | ||
| 66 | |||
| 67 | - "Cryptography_HAS_SSL2": [ | ||
| 68 | - "SSLv2_method", | ||
| 69 | - "SSLv2_client_method", | ||
| 70 | - "SSLv2_server_method", | ||
| 71 | - ], | ||
| 72 | - | ||
| 73 | "Cryptography_HAS_SSL3_METHOD": [ | ||
| 74 | "SSLv3_method", | ||
| 75 | "SSLv3_client_method", | ||
diff --git a/meta-python/recipes-devtools/python/python-cryptography/build_fix_openssl_1.0.1g.patch b/meta-python/recipes-devtools/python/python-cryptography/build_fix_openssl_1.0.1g.patch deleted file mode 100644 index d08994fe8d..0000000000 --- a/meta-python/recipes-devtools/python/python-cryptography/build_fix_openssl_1.0.1g.patch +++ /dev/null | |||
| @@ -1,28 +0,0 @@ | |||
| 1 | build issue do to openssl 1.0.1g upgrade | ||
| 2 | |||
| 3 | BIO *BIO_new_mem_buf(void *, int); | ||
| 4 | ^ | ||
| 5 | In file included from /home/jenkins/oe/world/shr-core/tmp-glibc/sysroots/qemuarm/usr/include/openssl/asn1.h:65:0, | ||
| 6 | from build/temp.linux-x86_64-2.7/_openssl.c:413: | ||
| 7 | |||
| 8 | |||
| 9 | Upstream-Status: Pending | ||
| 10 | |||
| 11 | seems to be a known issue | ||
| 12 | https://github.com/pyca/cryptography/issues/2750 | ||
| 13 | |||
| 14 | Signed-off-by: Armin Kuster <akuster@mvista.com> | ||
| 15 | |||
| 16 | Index: src/_cffi_src/openssl/bio.py | ||
| 17 | =================================================================== | ||
| 18 | --- a/src/_cffi_src/openssl/bio.py | ||
| 19 | +++ b/src/_cffi_src/openssl/bio.py | ||
| 20 | @@ -99,7 +99,7 @@ BIO *BIO_pop(BIO *); | ||
| 21 | BIO *BIO_next(BIO *); | ||
| 22 | BIO *BIO_find_type(BIO *, int); | ||
| 23 | BIO_METHOD *BIO_s_mem(void); | ||
| 24 | -BIO *BIO_new_mem_buf(void *, int); | ||
| 25 | +BIO *BIO_new_mem_buf(const void *, int); | ||
| 26 | BIO_METHOD *BIO_s_file(void); | ||
| 27 | BIO *BIO_new_file(const char *, const char *); | ||
| 28 | BIO *BIO_new_fp(FILE *, int); | ||
