From patchwork Sun Mar 25 01:59:59 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Peter_M=C3=BCller?= X-Patchwork-Id: 1711 Return-Path: Received: from mail01.ipfire.org (unknown [172.28.1.200]) by web02.i.ipfire.org (Postfix) with ESMTP id 877D660329 for ; Sat, 24 Mar 2018 16:00:18 +0100 (CET) X-Virus-Scanned: ClamAV at mail01.ipfire.org X-Spam-Flag: NO X-Spam-Score: -0.55 X-Spam-Level: X-Spam-Status: No, score=-0.55 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, RCVD_IN_DNSWL_LOW=-0.7] autolearn=disabled Received: from mail01.i.ipfire.org (localhost [IPv6:::1]) by mail01.ipfire.org (Postfix) with ESMTP id 2C34D1108869; Sat, 24 Mar 2018 15:00:16 +0000 (GMT) Authentication-Results: mail01.ipfire.org; dkim=pass (2048-bit key) header.d=link38.eu header.i=@link38.eu header.b="TEfxJux+" X-Virus-Scanned: ClamAV at mail01.ipfire.org Received: from mx-nbg.link38.eu (mx-nbg.link38.eu [IPv6:2a03:4000:6:432c:1f9e:48:ac3:199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx-nbg.link38.eu", Issuer "Let's Encrypt Authority X3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 6209D1063DEB for ; Sat, 24 Mar 2018 15:00:11 +0000 (GMT) Authentication-Results: mail01.ipfire.org; dmarc=pass (p=none dis=none) header.from=link38.eu Authentication-Results: mail01.ipfire.org; spf=pass smtp.mailfrom=peter.mueller@link38.eu DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=link38.eu; s=201803; t=1521903601; h=from:subject:date:message-id:to:mime-version:content-type:content-transfer-encoding; bh=g0FEjNRPrwhOwf8sRDzyGPWg43Zs3KYMNFAmVidmUcI=; b=TEfxJux+jw809F8ytZJQ5Bljx4NrsmrnN6pagGNfOhrt5bdcbkcyPhPqajokaXDNTRc4m7 VU9fejDh7DBj+o5MAgWD+kU94l4gyI57zPpB3/DagH7Ok8zODYGzRdLCxp/2gqBpKAUJBr Djc92h00MELvXTMhHLUHkJ328N2UG0rNZvx4+67obhFVnMHB88gSaqGJWOpE4ALE9XvW6m gMk0TgC5TWYX88jfhtLzuL+xM7amdUBdTGwGtiaKPQYgsffrwPPdtvJNddiKA7JlsJAmD9 13onCsXDthk2cYnCIV9QIoDrMF3yX2dJr6ZiiOTI4GIAAE1hebZUCrk0eG0P3Q== Date: Sat, 24 Mar 2018 15:59:59 +0100 From: Peter =?utf-8?q?M=C3=BCller?= To: "development@lists.ipfire.org" Subject: [PATCH] delete obsolete patch for OpenSSL 1.0.x Message-ID: <20180324155959.3813fdb9.peter.mueller@link38.eu> MIME-Version: 1.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" This patch became obsolete since we use OpenSSL 1.1.x in Core Update 120 and onward, where a similar patch already exists. Signed-off-by: Peter Müller --- src/patches/openssl-1.0.2h-weak-ciphers.patch | 12 ------------ 1 file changed, 12 deletions(-) delete mode 100644 src/patches/openssl-1.0.2h-weak-ciphers.patch diff --git a/src/patches/openssl-1.0.2h-weak-ciphers.patch b/src/patches/openssl-1.0.2h-weak-ciphers.patch deleted file mode 100644 index d1ec6a2af..000000000 --- a/src/patches/openssl-1.0.2h-weak-ciphers.patch +++ /dev/null @@ -1,12 +0,0 @@ -diff -Naur openssl-1.0.2h.org/ssl/ssl.h openssl-1.0.2h/ssl/ssl.h ---- openssl-1.0.2h.org/ssl/ssl.h 2016-05-03 15:44:42.000000000 +0200 -+++ openssl-1.0.2h/ssl/ssl.h 2016-05-03 18:49:10.393302264 +0200 -@@ -338,7 +338,7 @@ - * The following cipher list is used by default. It also is substituted when - * an application-defined cipher list string starts with 'DEFAULT'. - */ --# define SSL_DEFAULT_CIPHER_LIST "ALL:!EXPORT:!LOW:!aNULL:!eNULL:!SSLv2" -+# define SSL_DEFAULT_CIPHER_LIST "ALL:!EXPORT:!LOW:!aNULL:!eNULL:!SSLv2:!RC2:!DES" - /* - * As of OpenSSL 1.0.0, ssl_create_cipher_list() in ssl/ssl_ciph.c always - * starts with a reasonable order, and all we have to do for DEFAULT is