385 modules/db_berkeley/db_berkeley.c \ |
385 modules/db_berkeley/db_berkeley.c \ |
386 modules/db_berkeley/bdb_lib.h \ |
386 modules/db_berkeley/bdb_lib.h \ |
387 modules/sipcapture/sipcapture.h \ |
387 modules/sipcapture/sipcapture.h \ |
388 modules/lua/sipwatch.h \ |
388 modules/lua/sipwatch.h \ |
389 modules/lua/crc32.h |
389 modules/lua/crc32.h |
390 %{l_shtool} subst \ |
390 # redundant since OpenSIPS commit #9666 (ab 1.9.*) |
391 -e 's;\(LM_ERR("\)\(failed to retrieve SO_ERROR (%d) %s\\n",\);\1addr (%s) port (%d), \2 inet_ntoa(((struct sockaddr_in *)servaddr)->sin_addr), ntohs(((struct sockaddr_in *)servaddr)->sin_port),;' \ |
391 %{l_shtool} subst \ |
|
392 -e 's/\(LM_ERR("\)\(failed to retrieve SO_ERROR (%d) %s\\n",\)/char erraddrstr[INET6_ADDRSTRLEN]; \1addr (%s) port (%d), \2 servaddr->sa_family == AF_INET ? inet_ntoa(((struct sockaddr_in *)servaddr)->sin_addr) : inet_ntop(AF_INET6, \&((struct sockaddr_in6 *)servaddr)->sin6_addr, erraddrstr, sizeof(erraddrstr)), servaddr->sa_family == AF_INET ? ntohs(((struct sockaddr_in *)servaddr)->sin_port) : ntohs(((struct sockaddr_in6 *)servaddr)->sin6_port),/' \ |
392 tcp_main.c |
393 tcp_main.c |
393 %{l_shtool} subst \ |
394 %{l_shtool} subst \ |
394 -e 's;\(sock_info->socket = socket(AF2PF(addr->s.sa_family), SOCK_SEQPACKET,\) 0;\1 IPPROTO_SCTP;' \ |
395 -e 's;\(sock_info->socket = socket(AF2PF(addr->s.sa_family), SOCK_SEQPACKET,\) 0;\1 IPPROTO_SCTP;' \ |
395 sctp_server.c |
396 sctp_server.c |
396 %{l_shtool} subst \ |
|
397 -e 's;\(#define MAX_SSL_RETRIES\) 32;\1 1024;' \ |
|
398 tls/tls_server.c |
|
399 %{l_shtool} subst \ |
397 %{l_shtool} subst \ |
400 -e 's;LM_ERR(\("unable to load\);LM_WARN(\1;g' \ |
398 -e 's;LM_ERR(\("unable to load\);LM_WARN(\1;g' \ |
401 tls/tls_init.c |
399 tls/tls_init.c |
402 %{l_shtool} subst \ |
400 %{l_shtool} subst \ |
403 -e 's;^\(default_bits[ \t]*=[ \t]*\)2048;\14096;' \ |
401 -e 's;^\(default_bits[ \t]*=[ \t]*\)2048;\14096;' \ |