aes patch no longer needed
authorBdale Garbee <bdale@gag.com>
Sat, 29 Oct 2022 05:14:13 +0000 (23:14 -0600)
committerBdale Garbee <bdale@gag.com>
Sat, 29 Oct 2022 05:14:13 +0000 (23:14 -0600)
debian/patches/aes-fix.patch [deleted file]
debian/patches/series

diff --git a/debian/patches/aes-fix.patch b/debian/patches/aes-fix.patch
deleted file mode 100644 (file)
index d8b5def..0000000
+++ /dev/null
@@ -1,38 +0,0 @@
-Description: <short summary of the patch>
- TODO: Put a short summary on the line above and replace this paragraph
- with a longer explanation of this change. Complete the meta-information
- with other relevant fields (see below for details). To make it easier, the
- information below has been extracted from the changelog. Adjust it or drop
- it.
- .
- altos (1.9.11-2) unstable; urgency=medium
- .
-   * cherry pick patch from master that increases AES IV buffer to hold
-     maximum AES state, closes: #1022301
-Author: Bdale Garbee <bdale@gag.com>
-Bug-Debian: https://bugs.debian.org/1022301
-
----
-The information above should follow the Patch Tagging Guidelines, please
-checkout http://dep.debian.net/deps/dep3/ to learn about the format. Here
-are templates for supplementary fields that you might want to add:
-
-Origin: <vendor|upstream|other>, <url of original patch>
-Bug: <url in upstream bugtracker>
-Bug-Debian: https://bugs.debian.org/<bugnumber>
-Bug-Ubuntu: https://launchpad.net/bugs/<bugnumber>
-Forwarded: <no|not-needed|url proving that it has been forwarded>
-Reviewed-By: <name and email of someone who approved the patch>
-Last-Update: 2022-10-24
-
---- altos-1.9.11.orig/src/aes/ao_aes.c
-+++ altos-1.9.11/src/aes/ao_aes.c
-@@ -362,7 +362,7 @@ uint8_t ao_aes_mutex;
- static word32 key[16/4];
- static roundkey       rkk;
--static word32 iv[16/4];
-+static word32 iv[32/4];
- void
- ao_aes_set_mode(enum ao_aes_mode mode)
index 0d94e03ed6f65e944b1335fa32e0c20df611060f..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 100644 (file)
@@ -1 +0,0 @@
-aes-fix.patch