Hi ports@,
This is update kamailio port.
Changelog:
- update port to version 5.0.3
- regen pathes
- fix set soname for shared library
(fix load modules linked with srdb1,srdb2,trie,srutils on CLANG_ARCHS)
Tested on current amd64.
Ok? Comments?
Index: Makefile
===================================================================
RCS file: /cvs/ports/telephony/kamailio/Makefile,v
retrieving revision 1.41
diff -u -p -u -p -r1.41 Makefile
--- Makefile 4 Jul 2017 08:29:27 -0000 1.41
+++ Makefile 10 Sep 2017 22:32:31 -0000
@@ -2,8 +2,7 @@
COMMENT-main = mature and flexible open source SIP server
-VERSION = 5.0.2
-REVISION-main = 0
+VERSION = 5.0.3
DISTNAME = kamailio-${VERSION}_src
@@ -49,7 +48,7 @@ LIB_DEPENDS-main = converters/libiconv \
net/curl \
textproc/libxml,-main,no_python
-KAMAILIO_GROUPS = kstandard kcpl khttp_async koutbound ktls kutils kwebsocket
kxmpp
+KAMAILIO_GROUPS = kstandard kcpl khttp_async koutbound ktls kutils
kwebsocket kxmpp
FLAVOR ?=
MULTI_PACKAGES = -main
Index: distinfo
===================================================================
RCS file: /cvs/ports/telephony/kamailio/distinfo,v
retrieving revision 1.8
diff -u -p -u -p -r1.8 distinfo
--- distinfo 3 Jul 2017 22:14:20 -0000 1.8
+++ distinfo 10 Sep 2017 22:32:31 -0000
@@ -1,2 +1,2 @@
-SHA256 (kamailio-5.0.2_src.tar.gz) =
fxg7jHZjV3qwfh/7jCJumuPeKiUuAphETNBNreVwZPk=
-SIZE (kamailio-5.0.2_src.tar.gz) = 11654459
+SHA256 (kamailio-5.0.3_src.tar.gz) =
+nX3Oh1AxLorMy3mqk/pqqUxZ5NMb6rfoEJH0tMLVwo=
+SIZE (kamailio-5.0.3_src.tar.gz) = 11678360
Index: patches/patch-src_Makefile_defs
===================================================================
RCS file: /cvs/ports/telephony/kamailio/patches/patch-src_Makefile_defs,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_Makefile_defs
--- patches/patch-src_Makefile_defs 3 Jul 2017 22:14:20 -0000 1.1
+++ patches/patch-src_Makefile_defs 10 Sep 2017 22:32:31 -0000
@@ -14,7 +14,7 @@ Index: src/Makefile.defs
alpha_macros= __alpha__ __alpha _M_ALPHA_
-@@ -867,16 +867,12 @@ ifeq ($(ARCH), i386)
+@@ -879,16 +879,12 @@ ifeq ($(ARCH), i386)
ifeq ($(CC_NAME), gcc)
C_DEFS+=-DCC_GCC_LIKE_ASM
#common stuff
@@ -34,7 +34,7 @@ Index: src/Makefile.defs
else
#if gcc 4.0+
ifeq ($(CC_SHORTVER), 4.x)
-@@ -924,8 +920,8 @@ else # CC_NAME, gcc
+@@ -936,8 +932,8 @@ else # CC_NAME, gcc
ifeq ($(CC_NAME), clang)
$(call set_if_empty,CPUTYPE,athlon64)
C_DEFS+=-DCC_GCC_LIKE_ASM
@@ -45,7 +45,7 @@ Index: src/Makefile.defs
else # CC_NAME, clang
ifeq ($(CC_NAME), icc)
C_DEFS+=-DCC_GCC_LIKE_ASM
-@@ -949,7 +945,7 @@ ifeq ($(ARCH), x86_64)
+@@ -961,7 +957,7 @@ ifeq ($(ARCH), x86_64)
ifeq ($(CC_NAME), gcc)
C_DEFS+=-DCC_GCC_LIKE_ASM
#common stuff
@@ -54,7 +54,7 @@ Index: src/Makefile.defs
#if gcc 4.5+
# don't add '-mtune=$(CPUTYPE)' - gcc failure
ifeq ($(CC_SHORTVER),$(filter $(CC_SHORTVER),4.5+ 5.0+ 6.0+))
-@@ -963,12 +959,8 @@ else
+@@ -975,12 +971,8 @@ else
#if gcc 4.2+
ifeq ($(CC_SHORTVER), 4.2+)
$(call set_if_empty,CPUTYPE,opteron)
@@ -69,7 +69,7 @@ Index: src/Makefile.defs
else
#if gcc 4.0+
ifeq ($(CC_SHORTVER), 4.x)
-@@ -1017,9 +1009,8 @@ else # CC_NAME, gcc
+@@ -1029,9 +1021,8 @@ else # CC_NAME, gcc
ifeq ($(CC_NAME), clang)
$(call set_if_empty,CPUTYPE,opteron)
C_DEFS+=-DCC_GCC_LIKE_ASM
Index: patches/patch-src_Makefile_libs
===================================================================
RCS file: /cvs/ports/telephony/kamailio/patches/patch-src_Makefile_libs,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_Makefile_libs
--- patches/patch-src_Makefile_libs 3 Jul 2017 22:14:20 -0000 1.1
+++ patches/patch-src_Makefile_libs 10 Sep 2017 22:32:31 -0000
@@ -1,13 +1,14 @@
$OpenBSD: patch-src_Makefile_libs,v 1.1 2017/07/03 22:14:20 sthen Exp $
---- src/Makefile.libs.orig Mon May 15 22:09:20 2017
-+++ src/Makefile.libs Mon May 15 22:15:55 2017
+Index: src/Makefile.libs
+--- src/Makefile.libs.orig
++++ src/Makefile.libs
@@ -52,12 +52,18 @@ ifeq ($(OS), darwin)
-install_name $(LIB_INSTALL_NAME)
else
+ifeq ($(OS), openbsd)
+ LIB_NAME:=$(LIB_PREFIX)$(NAME)$(LIB_SUFFIX).$(OBSD_VER)
-+ NAME_LD_FLAGS= $(LIB_SONAME)$(LIB_RUNTIME_NAME)
++ NAME_LD_FLAGS= $(LIB_SONAME)$(LIB_NAME)
+ LIBINAME_F:=
+else
LIB_NAME:=$(LIB_PREFIX)$(NAME)$(LIB_SUFFIX).$(MAJOR_VER).$(MINOR_VER)
Index: patches/patch-src_core_core_cmd_c
===================================================================
RCS file: patches/patch-src_core_core_cmd_c
diff -N patches/patch-src_core_core_cmd_c
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ patches/patch-src_core_core_cmd_c 10 Sep 2017 22:32:31 -0000
@@ -0,0 +1,14 @@
+$OpenBSD$
+
+Index: src/core/core_cmd.c
+--- src/core/core_cmd.c.orig
++++ src/core/core_cmd.c
+@@ -943,7 +943,7 @@ static void core_sockets_list(rpc_t* rpc, void* c)
+ rpc->struct_add(ha, "ss",
+ "proto", get_proto_name(proto),
+ "address", si->name.s);
+- if (!si->flags & SI_IS_IP)
++ if (!(si->flags & SI_IS_IP))
+ rpc->struct_add(ha, "s",
+ "ipaddress", si->address_str.s);
+ rpc->struct_add(ha, "sss",
Index: patches/patch-src_core_msg_translator_c
===================================================================
RCS file:
/cvs/ports/telephony/kamailio/patches/patch-src_core_msg_translator_c,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_core_msg_translator_c
--- patches/patch-src_core_msg_translator_c 3 Jul 2017 22:14:20 -0000
1.1
+++ patches/patch-src_core_msg_translator_c 10 Sep 2017 22:32:31 -0000
@@ -1,6 +1,7 @@
$OpenBSD: patch-src_core_msg_translator_c,v 1.1 2017/07/03 22:14:20 sthen Exp $
---- src/core/msg_translator.c.orig Mon May 15 22:35:06 2017
-+++ src/core/msg_translator.c Mon May 15 22:42:28 2017
+Index: src/core/msg_translator.c
+--- src/core/msg_translator.c.orig
++++ src/core/msg_translator.c
@@ -522,7 +522,11 @@ static inline int lump_check_opt( struct lump *l,
return 1;
}
@@ -13,7 +14,7 @@ $OpenBSD: patch-src_core_msg_translator_
LUMP_SET_COND_TRUE(l);
return 1;
} else return 0;
-@@ -2317,6 +2321,7 @@ char * build_res_buf_from_sip_req( unsigned int code,
+@@ -2320,6 +2324,7 @@ char * build_res_buf_from_sip_req( unsigned int code,
body = 0;
buf=0;
Index: patches/patch-src_core_pt_c
===================================================================
RCS file: /cvs/ports/telephony/kamailio/patches/patch-src_core_pt_c,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_core_pt_c
--- patches/patch-src_core_pt_c 3 Jul 2017 22:14:20 -0000 1.1
+++ patches/patch-src_core_pt_c 10 Sep 2017 22:32:31 -0000
@@ -1,7 +1,8 @@
$OpenBSD: patch-src_core_pt_c,v 1.1 2017/07/03 22:14:20 sthen Exp $
---- src/core/pt.c.orig Mon May 15 22:43:07 2017
-+++ src/core/pt.c Mon May 15 22:48:08 2017
-@@ -245,8 +245,10 @@ int fork_process(int child_id, char *desc, int make_so
+Index: src/core/pt.c
+--- src/core/pt.c.orig
++++ src/core/pt.c
+@@ -249,8 +249,10 @@ int fork_process(int child_id, char *desc, int make_so
{
int pid, child_process_no;
int ret;
@@ -12,9 +13,9 @@ $OpenBSD: patch-src_core_pt_c,v 1.1 2017
#ifdef USE_TCP
int sockfd[2];
#endif
-@@ -285,8 +287,10 @@ int fork_process(int child_id, char *desc, int make_so
-
-
+@@ -289,8 +291,10 @@ int fork_process(int child_id, char *desc, int make_so
+ }
+
child_process_no = *process_count;
+#ifndef HAVE_ARC4RANDOM
new_seed1=kam_rand();
@@ -23,7 +24,7 @@ $OpenBSD: patch-src_core_pt_c,v 1.1 2017
pid = fork();
if (pid<0) {
lock_release(process_lock);
-@@ -301,9 +305,11 @@ int fork_process(int child_id, char *desc, int make_so
+@@ -305,9 +309,11 @@ int fork_process(int child_id, char *desc, int make_so
#ifdef USE_TCP
close_extra_socks(child_id, process_no);
#endif /* USE_TCP */
@@ -35,7 +36,7 @@ $OpenBSD: patch-src_core_pt_c,v 1.1 2017
shm_malloc_on_fork();
#ifdef PROFILING
monstartup((u_long) &_start, (u_long) &etext);
-@@ -380,8 +386,10 @@ int fork_tcp_process(int child_id, char *desc, int r,
+@@ -384,8 +390,10 @@ int fork_tcp_process(int child_id, char *desc, int r,
int reader_fd[2]; /* for comm. with the tcp children read */
int ret;
int i;
@@ -43,12 +44,12 @@ $OpenBSD: patch-src_core_pt_c,v 1.1 2017
unsigned int new_seed1;
unsigned int new_seed2;
+#endif
-
+
/* init */
sockfd[0]=sockfd[1]=-1;
-@@ -420,8 +428,10 @@ int fork_tcp_process(int child_id, char *desc, int r,
-
-
+@@ -423,8 +431,10 @@ int fork_tcp_process(int child_id, char *desc, int r,
+ }
+
child_process_no = *process_count;
+#ifndef HAVE_ARC4RANDOM
new_seed1=kam_rand();
@@ -57,7 +58,7 @@ $OpenBSD: patch-src_core_pt_c,v 1.1 2017
pid = fork();
if (pid<0) {
lock_release(process_lock);
-@@ -443,9 +453,11 @@ int fork_tcp_process(int child_id, char *desc, int r,
+@@ -446,9 +456,11 @@ int fork_tcp_process(int child_id, char *desc, int r,
}
}
daemon_status_on_fork_cleanup();
Index: patches/patch-src_core_socket_info_c
===================================================================
RCS file: patches/patch-src_core_socket_info_c
diff -N patches/patch-src_core_socket_info_c
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ patches/patch-src_core_socket_info_c 10 Sep 2017 22:32:31 -0000
@@ -0,0 +1,14 @@
+$OpenBSD$
+
+Index: src/core/socket_info.c
+--- src/core/socket_info.c.orig
++++ src/core/socket_info.c
+@@ -1912,7 +1912,7 @@ void print_all_socket_lists()
+ printf(" %s: %s",
+ get_valid_proto_name(proto),
+ si->name.s);
+- if (!si->flags & SI_IS_IP)
++ if (!(si->flags & SI_IS_IP))
+ printf(" [%s]", si->address_str.s);
+ printf( ":%s%s%s",
+ si->port_no_str.s,
Index: patches/patch-src_core_tcp_read_c
===================================================================
RCS file: /cvs/ports/telephony/kamailio/patches/patch-src_core_tcp_read_c,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_core_tcp_read_c
--- patches/patch-src_core_tcp_read_c 3 Jul 2017 22:14:20 -0000 1.1
+++ patches/patch-src_core_tcp_read_c 10 Sep 2017 22:32:31 -0000
@@ -3,7 +3,7 @@ $OpenBSD: patch-src_core_tcp_read_c,v 1.
Index: src/core/tcp_read.c
--- src/core/tcp_read.c.orig
+++ src/core/tcp_read.c
-@@ -1497,6 +1497,14 @@ void release_tcpconn(struct tcp_connection* c, long st
+@@ -1503,6 +1503,14 @@ void release_tcpconn(struct tcp_connection* c, long st
ip_addr2a(&c->rcv.src_ip), c->rcv.src_port,
ip_addr2a(&c->rcv.dst_ip), c->rcv.dst_port);
LM_DBG("extra_data %p\n", c->extra_data);
Index: patches/patch-src_main_c
===================================================================
RCS file: /cvs/ports/telephony/kamailio/patches/patch-src_main_c,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_main_c
--- patches/patch-src_main_c 3 Jul 2017 22:14:20 -0000 1.1
+++ patches/patch-src_main_c 10 Sep 2017 22:32:31 -0000
@@ -2,7 +2,7 @@ $OpenBSD: patch-src_main_c,v 1.1 2017/07
Index: src/main.c
--- src/main.c.orig
+++ src/main.c
-@@ -1845,8 +1845,10 @@ int main(int argc, char** argv)
+@@ -1842,8 +1842,10 @@ int main(int argc, char** argv)
int proto;
char *options;
int ret;
@@ -13,7 +13,7 @@ Index: src/main.c
int debug_save, debug_flag;
int dont_fork_cnt;
struct name_lst* n_lst;
-@@ -2112,6 +2114,7 @@ int main(int argc, char** argv)
+@@ -2109,6 +2111,7 @@ int main(int argc, char** argv)
goto error;
}
@@ -21,7 +21,7 @@ Index: src/main.c
/* seed the prng */
/* try to use /dev/urandom if possible */
seed=0;
-@@ -2132,6 +2135,7 @@ try_again:
+@@ -2129,6 +2132,7 @@ try_again:
fastrand_seed(kam_rand());
srandom(kam_rand()+time(0));
LM_DBG("test random numbers %u %lu %u\n", kam_rand(), random(),
fastrand());
Index: patches/patch-src_modules_nat_traversal_nat_traversal_c
===================================================================
RCS file:
/cvs/ports/telephony/kamailio/patches/patch-src_modules_nat_traversal_nat_traversal_c,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_modules_nat_traversal_nat_traversal_c
--- patches/patch-src_modules_nat_traversal_nat_traversal_c 3 Jul 2017
22:14:20 -0000 1.1
+++ patches/patch-src_modules_nat_traversal_nat_traversal_c 10 Sep 2017
22:32:31 -0000
@@ -3,7 +3,7 @@ $OpenBSD: patch-src_modules_nat_traversa
Index: src/modules/nat_traversal/nat_traversal.c
--- src/modules/nat_traversal/nat_traversal.c.orig
+++ src/modules/nat_traversal/nat_traversal.c
-@@ -1687,7 +1687,7 @@ restore_keepalive_state(void)
+@@ -1691,7 +1691,7 @@ restore_keepalive_state(void)
res = fscanf(f, STATE_FILE_HEADER); // skip header
while (true) {
Index: patches/patch-src_modules_rls_utils_c
===================================================================
RCS file: /cvs/ports/telephony/kamailio/patches/patch-src_modules_rls_utils_c,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_modules_rls_utils_c
--- patches/patch-src_modules_rls_utils_c 3 Jul 2017 22:14:20 -0000
1.1
+++ patches/patch-src_modules_rls_utils_c 10 Sep 2017 22:32:31 -0000
@@ -10,13 +10,13 @@ Index: src/modules/rls/utils.c
-str* normalize_sip_uri(const str *uri)
+str* normalize_sip_uri(str *uri)
{
- static str normalized_uri;
- static str null_str = {NULL, 0};
- static char buf[MAX_URI_SIZE];
+ static str normalized_uri;
+ static str null_str = {NULL, 0};
+ static char buf[MAX_URI_SIZE];
- normalized_uri.s = buf;
-- if (un_escape((str *)uri, &normalized_uri) < 0)
-+ if (un_escape(uri, &normalized_uri) < 0)
- {
- LM_ERR("un-escaping URI\n");
- return &null_str;
+ normalized_uri.s = buf;
+- if (un_escape((str *)uri, &normalized_uri) < 0)
++ if (un_escape(uri, &normalized_uri) < 0)
+ {
+ LM_ERR("un-escaping URI\n");
+ return &null_str;
Index: patches/patch-src_modules_tls_tls_domain_c
===================================================================
RCS file: patches/patch-src_modules_tls_tls_domain_c
diff -N patches/patch-src_modules_tls_tls_domain_c
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ patches/patch-src_modules_tls_tls_domain_c 10 Sep 2017 22:32:32 -0000
@@ -0,0 +1,32 @@
+$OpenBSD$
+
+Index: src/modules/tls/tls_domain.c
+--- src/modules/tls/tls_domain.c.orig
++++ src/modules/tls/tls_domain.c
+@@ -734,7 +734,7 @@ static void sr_ssl_ctx_info_callback(const SSL *ssl, i
+ if(data==0)
+ data = (struct tls_extra_data*)SSL_get_app_data(ssl);
+ LOG(tls_dbg, "SSL handshake done\n");
+-#if OPENSSL_VERSION_NUMBER < 0x010100000L
++#if OPENSSL_VERSION_NUMBER < 0x010100000L || defined(LIBRESSL_VERSION_NUMBER)
+ /* CVE-2009-3555 - disable renegotiation */
+ if (ssl->s3) {
+ LOG(tls_dbg, "SSL disable renegotiation\n");
+@@ -858,7 +858,7 @@ static int tls_ssl_ctx_mode(SSL_CTX* ctx, long mode, v
+ */
+ static int tls_ssl_ctx_set_freelist(SSL_CTX* ctx, long val, void* unused)
+ {
+-#if OPENSSL_VERSION_NUMBER < 0x010100000L
++#if OPENSSL_VERSION_NUMBER < 0x010100000L || defined(LIBRESSL_VERSION_NUMBER)
+ if (val >= 0)
+ #if OPENSSL_VERSION_NUMBER >= 0x01000000L
+ #ifndef OPENSSL_NO_BUF_FREELISTS
+@@ -997,7 +997,7 @@ static int fix_domain(tls_domain_t* d, tls_domain_t* d
+ memset(d->ctx, 0, sizeof(SSL_CTX*) * procs_no);
+ for(i = 0; i < procs_no; i++) {
+
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+ /* libssl < 1.1.0 */
+ if(d->method>TLS_USE_TLSvRANGE) {
+ d->ctx[i] = SSL_CTX_new(SSLv23_method());
Index: patches/patch-src_modules_tls_tls_init_c
===================================================================
RCS file:
/cvs/ports/telephony/kamailio/patches/patch-src_modules_tls_tls_init_c,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_modules_tls_tls_init_c
--- patches/patch-src_modules_tls_tls_init_c 3 Jul 2017 22:14:20 -0000
1.1
+++ patches/patch-src_modules_tls_tls_init_c 10 Sep 2017 22:32:32 -0000
@@ -3,7 +3,16 @@ $OpenBSD: patch-src_modules_tls_tls_init
Index: src/modules/tls/tls_init.c
--- src/modules/tls/tls_init.c.orig
+++ src/modules/tls/tls_init.c
-@@ -139,7 +139,7 @@ const SSL_METHOD* ssl_methods[TLS_METHOD_MAX];
+@@ -119,7 +119,7 @@ to compile on the _target_ system)"
+ int openssl_kssl_malloc_bug=0; /* is openssl bug #1467 present ? */
+ #endif
+
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+ const SSL_METHOD* ssl_methods[TLS_METHOD_MAX];
+ #else
+ sr_tls_methods_t sr_tls_methods[TLS_METHOD_MAX];
+@@ -143,7 +143,7 @@ sr_tls_methods_t sr_tls_methods[TLS_METHOD_MAX];
*/
@@ -12,7 +21,7 @@ Index: src/modules/tls/tls_init.c
inline static char* buf_append(char* buf, char* end, char* str, int str_len)
{
if ( (buf+str_len)<end){
-@@ -317,6 +317,7 @@ static void ser_free(void *ptr, const char *fname, int
+@@ -321,6 +321,7 @@ static void ser_free(void *ptr, const char *fname, int
}
#endif
@@ -20,7 +29,16 @@ Index: src/modules/tls/tls_init.c
/*
* Initialize TLS socket
-@@ -360,7 +361,7 @@ static void init_ssl_methods(void)
+@@ -356,7 +357,7 @@ error:
+ */
+ static void init_ssl_methods(void)
+ {
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+ /* libssl < 1.1.0 */
+ memset(ssl_methods, 0, sizeof(ssl_methods));
+
+@@ -366,7 +367,7 @@ static void init_ssl_methods(void)
ssl_methods[TLS_USE_SSLv23 - 1] = SSLv23_method();
/* only specific SSL or TLS version */
@@ -29,7 +47,7 @@ Index: src/modules/tls/tls_init.c
#ifndef OPENSSL_NO_SSL2
ssl_methods[TLS_USE_SSLv2_cli - 1] = SSLv2_client_method();
ssl_methods[TLS_USE_SSLv2_srv - 1] = SSLv2_server_method();
-@@ -378,13 +379,13 @@ static void init_ssl_methods(void)
+@@ -384,13 +385,13 @@ static void init_ssl_methods(void)
ssl_methods[TLS_USE_TLSv1_srv - 1] = TLSv1_server_method();
ssl_methods[TLS_USE_TLSv1 - 1] = TLSv1_method();
@@ -45,7 +63,7 @@ Index: src/modules/tls/tls_init.c
ssl_methods[TLS_USE_TLSv1_2_cli - 1] = TLSv1_2_client_method();
ssl_methods[TLS_USE_TLSv1_2_srv - 1] = TLSv1_2_server_method();
ssl_methods[TLS_USE_TLSv1_2 - 1] = TLSv1_2_method();
-@@ -393,11 +394,11 @@ static void init_ssl_methods(void)
+@@ -399,11 +400,11 @@ static void init_ssl_methods(void)
/* ranges of TLS versions (require a minimum TLS version) */
ssl_methods[TLS_USE_TLSv1_PLUS - 1] = (void*)TLS_OP_TLSv1_PLUS;
@@ -58,8 +76,8 @@ Index: src/modules/tls/tls_init.c
+#if OPENSSL_VERSION_NUMBER >= 0x1000105fL && !defined(LIBRESSL_VERSION_NUMBER)
ssl_methods[TLS_USE_TLSv1_2_PLUS - 1] = (void*)TLS_OP_TLSv1_2_PLUS;
#endif
- }
-@@ -408,6 +409,7 @@ static void init_ssl_methods(void)
+
+@@ -477,6 +478,7 @@ static void init_ssl_methods(void)
*/
static int init_tls_compression(void)
{
@@ -67,7 +85,7 @@ Index: src/modules/tls/tls_init.c
#if OPENSSL_VERSION_NUMBER < 0x010100000L
#if OPENSSL_VERSION_NUMBER >= 0x00908000L
int n, r;
-@@ -494,6 +496,7 @@ static int init_tls_compression(void)
+@@ -563,6 +565,7 @@ static int init_tls_compression(void)
end:
#endif /* OPENSSL_VERSION_NUMBER >= 0.9.8 */
#endif /* OPENSSL_VERSION_NUMBER < 1.1.0 */
@@ -75,7 +93,7 @@ Index: src/modules/tls/tls_init.c
return 0;
}
-@@ -504,6 +507,7 @@ end:
+@@ -573,6 +576,7 @@ end:
*/
int tls_pre_init(void)
{
@@ -83,7 +101,7 @@ Index: src/modules/tls/tls_init.c
#if OPENSSL_VERSION_NUMBER < 0x010100000L
void *(*mf)(size_t) = NULL;
void *(*rf)(void *, size_t) = NULL;
-@@ -530,6 +534,7 @@ int tls_pre_init(void)
+@@ -599,6 +603,7 @@ int tls_pre_init(void)
" (can be loaded first to be safe)\n");
return -1;
}
@@ -91,7 +109,7 @@ Index: src/modules/tls/tls_init.c
if (tls_init_locks()<0)
return -1;
-@@ -563,7 +568,7 @@ int init_tls_h(void)
+@@ -632,7 +637,7 @@ int init_tls_h(void)
{
/*struct socket_info* si;*/
long ssl_version;
@@ -100,7 +118,7 @@ Index: src/modules/tls/tls_init.c
int lib_kerberos;
int lib_zlib;
int kerberos_support;
-@@ -607,7 +612,7 @@ int init_tls_h(void)
+@@ -676,7 +681,7 @@ int init_tls_h(void)
}
/* check kerberos support using compile flags only for version < 1.1.0 */
@@ -109,3 +127,12 @@ Index: src/modules/tls/tls_init.c
#ifdef TLS_KERBEROS_SUPPORT
kerberos_support=1;
+@@ -847,7 +852,7 @@ void destroy_tls_h(void)
+ tls_destroy_cfg();
+ tls_destroy_locks();
+ tls_ct_wq_destroy();
+-#if OPENSSL_VERSION_NUMBER >= 0x010100000L
++#if OPENSSL_VERSION_NUMBER >= 0x010100000L &&
!defined(LIBRESSL_VERSION_NUMBER)
+ /* explicit execution of libssl cleanup to avoid being executed again
+ * by atexit(), when shm is gone */
+ DBG("executing openssl v1.1+ cleanup\n");
Index: patches/patch-src_modules_tls_tls_init_h
===================================================================
RCS file: patches/patch-src_modules_tls_tls_init_h
diff -N patches/patch-src_modules_tls_tls_init_h
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ patches/patch-src_modules_tls_tls_init_h 10 Sep 2017 22:32:32 -0000
@@ -0,0 +1,14 @@
+$OpenBSD$
+
+Index: src/modules/tls/tls_init.h
+--- src/modules/tls/tls_init.h.orig
++++ src/modules/tls/tls_init.h
+@@ -45,7 +45,7 @@ extern int openssl_kssl_malloc_bug; /* is openssl bug
+ #endif
+
+
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+ extern const SSL_METHOD* ssl_methods[];
+ #else
+ typedef struct sr_tls_methods_s {
Index: patches/patch-src_modules_tls_tls_locking_c
===================================================================
RCS file: patches/patch-src_modules_tls_tls_locking_c
diff -N patches/patch-src_modules_tls_tls_locking_c
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ patches/patch-src_modules_tls_tls_locking_c 10 Sep 2017 22:32:32 -0000
@@ -0,0 +1,23 @@
+$OpenBSD$
+
+Index: src/modules/tls/tls_locking.c
+--- src/modules/tls/tls_locking.c.orig
++++ src/modules/tls/tls_locking.c
+@@ -33,7 +33,7 @@ static int n_static_locks=0;
+ static gen_lock_set_t* static_locks=0;
+
+ /* OpenSSL is thread-safe since 1.1.0 */
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+
+ /* "dynamic" locks */
+
+@@ -168,7 +168,7 @@ int tls_init_locks()
+ }
+
+ /* OpenSSL is thread-safe since 1.1.0 */
+-#if OPENSSL_VERSION_NUMBER < 0x10100000L
++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
+ /* set "dynamic" locks callbacks */
+ CRYPTO_set_dynlock_create_callback(dyn_create_f);
+ CRYPTO_set_dynlock_lock_callback(dyn_lock_f);
Index: patches/patch-src_modules_xhttp_pi_xhttp_pi_fnc_c
===================================================================
RCS file:
/cvs/ports/telephony/kamailio/patches/patch-src_modules_xhttp_pi_xhttp_pi_fnc_c,v
retrieving revision 1.1
diff -u -p -u -p -r1.1 patch-src_modules_xhttp_pi_xhttp_pi_fnc_c
--- patches/patch-src_modules_xhttp_pi_xhttp_pi_fnc_c 3 Jul 2017 22:14:20
-0000 1.1
+++ patches/patch-src_modules_xhttp_pi_xhttp_pi_fnc_c 10 Sep 2017 22:32:32
-0000
@@ -3,7 +3,7 @@ $OpenBSD: patch-src_modules_xhttp_pi_xht
Index: src/modules/xhttp_pi/xhttp_pi_fnc.c
--- src/modules/xhttp_pi/xhttp_pi_fnc.c.orig
+++ src/modules/xhttp_pi/xhttp_pi_fnc.c
-@@ -3189,7 +3189,7 @@ int ph_run_pi_cmd(pi_ctx_t* ctx)
+@@ -3193,7 +3193,7 @@ int ph_run_pi_cmd(pi_ctx_t* ctx)
val_str.len = max_page_len -
ctx->reply.body.len;
if(db_time2str(values[j].val.time_val,
val_str.s, &val_str.len)!=0){
@@ -12,7 +12,7 @@ Index: src/modules/xhttp_pi/xhttp_pi_fnc
values[j].val.time_val);
goto error;
}
-@@ -3197,7 +3197,7 @@ int ph_run_pi_cmd(pi_ctx_t* ctx)
+@@ -3201,7 +3201,7 @@ int ph_run_pi_cmd(pi_ctx_t* ctx)
ctx->reply.body.len +=
val_str.len;
if(link_on)
XHTTP_PI_COPY_2(p,XHTTP_PI_SQUOT_GT,val_str);
LM_DBG(" got %.*s[%d]=>"
Index: patches/patch-utils_kamctl_kamdbctl_pgsql
===================================================================
RCS file: patches/patch-utils_kamctl_kamdbctl_pgsql
diff -N patches/patch-utils_kamctl_kamdbctl_pgsql
--- patches/patch-utils_kamctl_kamdbctl_pgsql 3 Jul 2017 22:14:20 -0000
1.1
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,19 +0,0 @@
-$OpenBSD: patch-utils_kamctl_kamdbctl_pgsql,v 1.1 2017/07/03 22:14:20 sthen
Exp $
-
-kamctl: kamdbctl - proper use of DBPORT for postgres
-https://github.com/kamailio/kamailio/commit/8cdee50d7c89c1617b68e2eff1ce646eba0c33fb
-
-Index: utils/kamctl/kamdbctl.pgsql
---- utils/kamctl/kamdbctl.pgsql.orig
-+++ utils/kamctl/kamdbctl.pgsql
-@@ -55,8 +55,8 @@ if [ -z "$DBPORT" ] ; then
- CMD="psql -q -h $DBHOST -U $DBROOTUSER "
- DUMP_CMD="pg_dump -h $DBHOST -U $DBROOTUSER -c"
- else
-- CMD="psql -q -h $DBHOST -p $DBHOST -U $DBROOTUSER "
-- DUMP_CMD="pg_dump -h $DBHOST -p $DBHOST -U $DBROOTUSER -c"
-+ CMD="psql -q -h $DBHOST -p $DBPORT -U $DBROOTUSER "
-+ DUMP_CMD="pg_dump -h $DBHOST -p $DBPORT -U $DBROOTUSER -c"
- fi
-
- #################################################################