]> code.ossystems Code Review - openembedded-core.git/commit
openssl: refresh patches
authorRoss Burton <ross.burton@intel.com>
Fri, 9 Mar 2018 18:55:44 +0000 (20:55 +0200)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Thu, 3 May 2018 08:52:09 +0000 (09:52 +0100)
commit95b5ec1d6d614ebd1ea3a57bbbcef33b08966265
treefaa8d16657f4bf00802ea16b9568c3e4340e68d9
parent9c72ddb605f1f4fc98fa427e37b5ba8c8758c6cd
openssl: refresh patches

The patch tool will apply patches by default with "fuzz", which is where if the
hunk context isn't present but what is there is close enough, it will force the
patch in.

Whilst this is useful when there's just whitespace changes, when applied to
source it is possible for a patch applied with fuzz to produce broken code which
still compiles (see #10450).  This is obviously bad.

We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For
that to be realistic the existing patches with fuzz need to be rebased and
reviewed.

(From OE-Core rev: 7baba7a19c5610a63ccbfd6a2238667772b32118)

Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Alexander Kanavin <alexander.kanavin@linux.intel.com>
Signed-off-by: Ross Burton <ross.burton@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Armin Kuster <akuster@mvista.com>
meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/c_rehash-compat.patch
meta/recipes-connectivity/openssl/openssl-1.0.2n/debian/debian-targets.patch