Compare commits

...

29 Commits

Author SHA1 Message Date
geos_one
f945c945a0 add gcc 14 patches 2025-08-08 14:21:29 +02:00
geos_one
9188d6465e Update upstream source from tag 'upstream/4.44-9807'
Update to upstream version '4.44-9807'
with Debian dir a922a50ac1abb7cf732b395b029eb6ee05d403df
2025-08-08 12:20:09 +02:00
geos_one
682c6d6d08 Bump 2025-08-08 12:15:03 +02:00
geos_one
43fc056a50 Update upstream source from tag 'upstream/4.44-9807-rtm'
Update to upstream version '4.44-9807-rtm'
with Debian dir 91d6ab76ae01f266a56b5171b8e31c5cab0b803d
2025-08-08 12:10:49 +02:00
Mario Fetka
8bf7619e83 Bump 2019-08-06 17:48:33 +02:00
Mario Fetka
78395fff92 Merge tag 'upstream/4.29.9680'
Upstream version 4.29.9680
2019-08-06 17:46:22 +02:00
Mario Fetka
e2164b858b Merge tag 'upstream/4.29.9680-rtm'
Upstream version 4.29.9680-rtm
2019-08-06 17:43:57 +02:00
Mario Fetka
36905fcc27 use latest ssl 2018-03-13 18:56:46 +01:00
Mario Fetka
5d515b03b2 Bump 2018-03-13 18:43:23 +01:00
Mario Fetka
11a71728dc readd updated ssl patch from freebsd 2018-03-13 18:35:29 +01:00
Mario Fetka
4eaa335ea3 readd updated ssl patch from freebsd 2018-03-13 18:31:59 +01:00
Mario Fetka
2c2919e3d6 add missing lib 2018-03-13 17:51:41 +01:00
Mario Fetka
d3a1dd7864 Merge tag 'upstream/4.25.9656'
Upstream version 4.25.9656
2018-03-13 17:42:59 +01:00
Mario Fetka
57631fc661 Merge tag 'upstream/4.25.9656-rtm'
Upstream version 4.25.9656-rtm
2018-03-13 17:33:01 +01:00
Mario Fetka
07de817ab3 Bump 2018-03-13 17:30:43 +01:00
Mario Fetka
4a107b38aa Merge tag 'upstream/4.25.9656-rtm'
Upstream version 4.25.9656-rtm
2018-03-13 17:27:27 +01:00
Mario Fetka
265a6a062c Bump 2018-03-13 17:17:28 +01:00
Mario Fetka
135c129931 Bump 2018-03-13 17:16:16 +01:00
Mario Fetka
39a01e0bb6 Merge tag 'upstream/4.25.9656-rtm'
Upstream version 4.25.9656-rtm
2018-03-13 17:12:23 +01:00
Mario Fetka
8be15c5e83 activate patch via dh quilt 2017-04-19 13:11:38 +02:00
Mario Fetka
1e1546aa10 activate patch via dh quilt 2017-04-19 13:10:54 +02:00
Mario Fetka
ed0ee04dc2 activate patch via dh quilt 2017-04-19 12:28:43 +02:00
Mario Fetka
ae45875dc6 update patch to rtm relase 2017-04-19 12:21:17 +02:00
Mario Fetka
9d14f83fa4 use quilt for patching 2017-04-19 12:12:51 +02:00
Mario Fetka
1fc2c0ee08 disable sslv3 2017-04-19 11:31:30 +02:00
Mario Fetka
bd943701e8 on stretch also the deep on libz ist needed 2017-04-19 10:49:54 +02:00
Mario Fetka
ca17e9314a on stretch use openssl 1.0 2017-04-19 10:38:43 +02:00
Mario Fetka
9aa5dc3871 Merge tag 'upstream/4.20.9608'
Upstream version 4.20.9608
2016-07-12 13:45:55 +02:00
Mario Fetka
e2304ce307 Bump 2016-07-12 13:35:23 +02:00
8 changed files with 260 additions and 1 deletions

10
debian/changelog vendored
View File

@ -1,3 +1,13 @@
softether-vpn (4.44-9807-rtm) unstable; urgency=medium
[ Mario Fetka ]
* Bump
[ geos_one ]
* New upstream version 4.44-9807-rtm
-- root <mario.fetka@disconnected-by-peer.at> Fri, 08 Aug 2025 12:14:30 +0200
softether-vpn (0:4.04.9412-rtm) unstable; urgency=low
* Testing debianization

2
debian/control vendored
View File

@ -2,7 +2,7 @@ Source: softether-vpn
Section: net
Priority: optional
Maintainer: Dmitry Orlov <me@mosquito.su>
Build-Depends: debhelper (>= 7.0.50~), libncurses-dev, linux-libc-dev, libssl-dev, libreadline-dev, build-essential, dh-exec
Build-Depends: debhelper (>= 7.0.50~), libncurses-dev, linux-libc-dev, libssl-dev , libreadline-dev, build-essential, dh-exec, zlib1g-dev
Standards-Version: 3.9.1
Homepage: http://www.softether.org/

View File

@ -0,0 +1,54 @@
From 1199ecd57dffdbc65c47baa61c4e836df5700244 Mon Sep 17 00:00:00 2001
From: NiteHawk <n1tehawk@users.noreply.github.com>
Date: Sun, 20 Jul 2025 18:31:49 +0200
Subject: [PATCH] [followup] Fix some oversights in previous commit
---
src/Mayaqua/Secure.c | 4 ++--
src/Mayaqua/Secure.h | 4 ++--
2 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/src/Mayaqua/Secure.c b/src/Mayaqua/Secure.c
index 7132f92a..da62f983 100644
--- a/src/Mayaqua/Secure.c
+++ b/src/Mayaqua/Secure.c
@@ -1710,7 +1710,7 @@ void CloseSecSession(SECURE *sec)
}
// Open the session
-bool OpenSecSession(SECURE *sec, UINT slot_number)
+bool OpenSecSession(SECURE *sec, CK_SLOT_ID slot_number)
{
UINT err = 0;
CK_SESSION_HANDLE session;
@@ -1835,7 +1835,7 @@ SECURE *OpenSec(UINT id)
return NULL;
}
- sec->SlotIdList = (CK_SLOT_ID *)ZeroMalloc(sizeof(UINT) * sec->NumSlot);
+ sec->SlotIdList = (CK_SLOT_ID *)ZeroMalloc(sizeof(CK_SLOT_ID) * sec->NumSlot);
if (sec->Api->C_GetSlotList(TRUE, sec->SlotIdList, &sec->NumSlot) != CKR_OK)
{
diff --git a/src/Mayaqua/Secure.h b/src/Mayaqua/Secure.h
index 649a8989..5cf574a4 100644
--- a/src/Mayaqua/Secure.h
+++ b/src/Mayaqua/Secure.h
@@ -162,7 +162,7 @@ struct SECURE
CK_SLOT_ID *SlotIdList; // Slot ID list
bool SessionCreated; // Session creation flags
UINT SessionId; // Session ID
- UINT SessionSlotNumber; // Slot ID of the session
+ CK_SLOT_ID SessionSlotNumber; // Slot ID of the session
bool LoginFlag; // Logged-in flag
SEC_INFO *Info; // Token information
LIST *EnumCache; // Enumeration cache
@@ -220,7 +220,7 @@ bool CheckSecureDeviceId(UINT id);
SECURE_DEVICE *GetSecureDevice(UINT id);
SECURE *OpenSec(UINT id);
void CloseSec(SECURE *sec);
-bool OpenSecSession(SECURE *sec, UINT slot_number);
+bool OpenSecSession(SECURE *sec, CK_SLOT_ID slot_number);
void CloseSecSession(SECURE *sec);
bool LoginSec(SECURE *sec, char *pin);
void LogoutSec(SECURE *sec);

View File

@ -0,0 +1,190 @@
From c6a357e29e93c1c3a0952c97adbb82dcb8a9c1f9 Mon Sep 17 00:00:00 2001
From: NiteHawk <n1tehawk@users.noreply.github.com>
Date: Sun, 20 Jul 2025 17:54:33 +0200
Subject: [PATCH] Fix Unix compilation when using GCC 14.x
GCC 14 defaults to stricter type checking, causing compilation errors that
result in a build failure with the current source code (v4.44 9807 rtm).
This patch addresses these to get the (Unix) build working again.
Tested with gcc 14.3.0 on Gentoo Linux.
---
src/Cedar/Console.c | 16 +++++++++-------
src/Cedar/VLanUnix.h | 1 +
src/Mayaqua/Secure.c | 18 +++++++++---------
src/Mayaqua/Secure.h | 7 ++++---
src/Mayaqua/Unix.c | 3 +--
5 files changed, 24 insertions(+), 21 deletions(-)
diff --git a/src/Cedar/Console.c b/src/Cedar/Console.c
index 3c6c90c20..bfb9bd524 100644
--- a/src/Cedar/Console.c
+++ b/src/Cedar/Console.c
@@ -1981,6 +1981,14 @@ char *ParseCommandA(wchar_t *str, char *name)
return ret;
}
+#ifndef OS_WIN32
+ // use a simple wrapper to create a compatible function,
+ // allowing for uniform use of getch() below
+ static int getch(void) {
+ return getc(stdin);
+ }
+#endif // OS_WIN32
+
// Password prompt
bool PasswordPrompt(char *password, UINT size)
{
@@ -2005,13 +2013,7 @@ bool PasswordPrompt(char *password, UINT size)
while (true)
{
- int c;
-
-#ifdef OS_WIN32
- c = getch();
-#else // OS_WIN32
- c = getc(stdin);
-#endif // OS_WIN32
+ int c = getch();
if (c >= 0x20 && c <= 0x7E)
{
diff --git a/src/Cedar/VLanUnix.h b/src/Cedar/VLanUnix.h
index fa878e599..556aecda6 100644
--- a/src/Cedar/VLanUnix.h
+++ b/src/Cedar/VLanUnix.h
@@ -122,6 +122,7 @@ struct VLAN
VLAN *NewVLan(char *instance_name, VLAN_PARAM *param);
VLAN *NewTap(char *name, char *mac_address);
void FreeVLan(VLAN *v);
+void FreeTap(VLAN *v);
CANCEL *VLanGetCancel(VLAN *v);
bool VLanGetNextPacket(VLAN *v, void **buf, UINT *size);
bool VLanPutPacket(VLAN *v, void *buf, UINT size);
diff --git a/src/Mayaqua/Secure.c b/src/Mayaqua/Secure.c
index 17cc2717f..7132f92a3 100644
--- a/src/Mayaqua/Secure.c
+++ b/src/Mayaqua/Secure.c
@@ -370,7 +370,7 @@ bool SignSec(SECURE *sec, char *name, void *dst, void *src, UINT size)
}
// Sign with the private key of the secure device
-bool SignSecByObject(SECURE *sec, SEC_OBJ *obj, void *dst, void *src, UINT size)
+bool SignSecByObject(SECURE *sec, SEC_OBJ *obj, void *dst, void *src, CK_ULONG size)
{
CK_MECHANISM mechanism = {CKM_RSA_PKCS, NULL, 0};
UINT ret;
@@ -474,7 +474,7 @@ bool WriteSecKey(SECURE *sec, bool private_obj, char *name, K *k)
UINT key_type = CKK_RSA;
CK_BBOOL b_true = true, b_false = false, b_private_obj = private_obj;
UINT obj_class = CKO_PRIVATE_KEY;
- UINT object;
+ CK_OBJECT_HANDLE object;
UINT ret;
BUF *b;
RSA *rsa;
@@ -716,7 +716,7 @@ bool WriteSecCert(SECURE *sec, bool private_obj, char *name, X *x)
UCHAR value[4096];
UINT ret;
BUF *b;
- UINT object;
+ CK_OBJECT_HANDLE object;
CK_ATTRIBUTE a[] =
{
{CKA_SUBJECT, subject, 0}, // 0
@@ -1264,8 +1264,8 @@ LIST *CloneEnumSecObject(LIST *o)
LIST *EnumSecObject(SECURE *sec)
{
CK_BBOOL b_true = true, b_false = false;
- UINT objects[MAX_OBJ];
- UINT i;
+ CK_OBJECT_HANDLE objects[MAX_OBJ];
+ CK_ULONG i;
UINT ret;
LIST *o;
CK_ATTRIBUTE dummy[1];
@@ -1273,7 +1273,7 @@ LIST *EnumSecObject(SECURE *sec)
{
{CKA_TOKEN, &b_true, sizeof(b_true)},
};
- UINT num_objects = MAX_OBJ;
+ CK_ULONG num_objects = MAX_OBJ;
// Validate arguments
if (sec == NULL)
{
@@ -1389,7 +1389,7 @@ bool WriteSecData(SECURE *sec, bool private_obj, char *name, void *data, UINT si
{
UINT object_class = CKO_DATA;
CK_BBOOL b_true = true, b_false = false, b_private_obj = private_obj;
- UINT object;
+ CK_OBJECT_HANDLE object;
CK_ATTRIBUTE a[] =
{
{CKA_TOKEN, &b_true, sizeof(b_true)},
@@ -1713,7 +1713,7 @@ void CloseSecSession(SECURE *sec)
bool OpenSecSession(SECURE *sec, UINT slot_number)
{
UINT err = 0;
- UINT session;
+ CK_SESSION_HANDLE session;
// Validate arguments
if (sec == NULL)
{
@@ -1835,7 +1835,7 @@ SECURE *OpenSec(UINT id)
return NULL;
}
- sec->SlotIdList = (UINT *)ZeroMalloc(sizeof(UINT) * sec->NumSlot);
+ sec->SlotIdList = (CK_SLOT_ID *)ZeroMalloc(sizeof(UINT) * sec->NumSlot);
if (sec->Api->C_GetSlotList(TRUE, sec->SlotIdList, &sec->NumSlot) != CKR_OK)
{
diff --git a/src/Mayaqua/Secure.h b/src/Mayaqua/Secure.h
index 7654acbf5..649a89894 100644
--- a/src/Mayaqua/Secure.h
+++ b/src/Mayaqua/Secure.h
@@ -109,6 +109,7 @@
#define MAX_SEC_DATA_SIZE 4096
// Type declaration related to PKCS#11
+#include "cryptoki.h"
#ifndef SECURE_C
typedef struct CK_FUNCTION_LIST *CK_FUNCTION_LIST_PTR;
typedef struct SEC_DATA_WIN32 SEC_DATA_WIN32;
@@ -157,8 +158,8 @@ struct SECURE
UINT Error; // The error that last occurred
struct CK_FUNCTION_LIST *Api; // API
bool Initialized; // Initialization flag
- UINT NumSlot; // The number of slots
- UINT *SlotIdList; // Slot ID list
+ CK_ULONG NumSlot; // The number of slots
+ CK_SLOT_ID *SlotIdList; // Slot ID list
bool SessionCreated; // Session creation flags
UINT SessionId; // Session ID
UINT SessionSlotNumber; // Slot ID of the session
@@ -247,7 +248,7 @@ X *ReadSecCertFromObject(SECURE *sec, SEC_OBJ *obj);
X *ReadSecCert(SECURE *sec, char *name);
bool WriteSecKey(SECURE *sec, bool private_obj, char *name, K *k);
bool DeleteSecKey(SECURE *sec, char *name);
-bool SignSecByObject(SECURE *sec, SEC_OBJ *obj, void *dst, void *src, UINT size);
+bool SignSecByObject(SECURE *sec, SEC_OBJ *obj, void *dst, void *src, CK_ULONG size);
bool SignSec(SECURE *sec, char *name, void *dst, void *src, UINT size);
bool ChangePin(SECURE *sec, char *old_pin, char *new_pin);
void TestSec();
diff --git a/src/Mayaqua/Unix.c b/src/Mayaqua/Unix.c
index c988ea268..b7b4b9150 100644
--- a/src/Mayaqua/Unix.c
+++ b/src/Mayaqua/Unix.c
@@ -309,9 +309,8 @@ OS_DISPATCH_TABLE *UnixGetDispatchTable()
return &t;
}
-static void *signal_received_for_ignore(int sig, siginfo_t *info, void *ucontext)
+static void signal_received_for_ignore(int sig, siginfo_t *info, void *ucontext)
{
- return NULL;
}
// Ignore the signal flew to the thread

2
debian/patches/series vendored Normal file
View File

@ -0,0 +1,2 @@
c6a357e29e93c1c3a0952c97adbb82dcb8a9c1f9.patch
1199ecd57dffdbc65c47baa61c4e836df5700244.patch

1
debian/softether-vpnbridge.service vendored Symbolic link
View File

@ -0,0 +1 @@
../systemd/softether-vpnbridge.service

1
debian/softether-vpnclient.service vendored Symbolic link
View File

@ -0,0 +1 @@
../systemd/softether-vpnclient.service

1
debian/softether-vpnserver.service vendored Symbolic link
View File

@ -0,0 +1 @@
../systemd/softether-vpnserver.service