Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
fix-makefile-clean.patch | no | |||||
fix-dont-overwrite-cflags.patch | Don't override CFLAGS and CPPFLAGS from the environment (needed for http://wiki.debian.org/Hardening). Also respect LDFLAGS. |
no | ||||
ignoreQuilt.patch | ignore quilt temporary directories | no | ||||
ipseckey-address-possible-string-truncation-warning.patch | [PATCH] ipseckey: address possible string truncation warning gcc-8 creates this: |ipseckey.c: In function 'ipseckey_human': |ipseckey.c:114:35: error: '%s' directive output may be truncated writing up to 1023 bytes into a region of size between 1010 and 1016 [-Werror=format-truncation=] Avoid the warning by limiting the length of the string. |
Sebastian Andrzej Siewior <sebastian@breakpoint.cc> | no | 2019-02-22 | ||
fix-compilation-on-openssl-1.1.patch | [PATCH] fix compilation on openssl 1.1 | Author: "Chris West (Faux)" <git@goeswhere.com> | no | 2019-02-22 | ||
test-accept-openssl-3-error-messages.patch | [PATCH] test: accept openssl 3 error messages The 'bad signature' error messages appear to have changed. Adjust test to accept both old anew new style openssl error strings. |
Dan Bungert <daniel.bungert@canonical.com> | no | 2022-02-02 | ||
dnskey-Avoid-using-RSA_new-on-OpenSSL-3.0.patch | [PATCH] dnskey: Avoid using RSA_new() on OpenSSL 3.0 Use BLD/ param and EVP_PKEY_fromdata() to build a RSA which avoids RSA_new() function which is deprecated in OpenSSL 3.0. |
Sebastian Andrzej Siewior <sebastian@breakpoint.cc> | no | 2022-06-23 |