{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.GH7Scfq9/b1/asterisk_22.0.0~dfsg+~cs6.14.60671435-1_armhf.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.GH7Scfq9/b2/asterisk_22.0.0~dfsg+~cs6.14.60671435-1_armhf.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -13,8 +13,8 @@\n 2360576628500771fe58b8f2692e70eb 64136 comm optional asterisk-mp3_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n 82b41b1ac21a7b89473edbbd7486825d 68620 debug optional asterisk-mysql-dbgsym_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n 55589ac1f7eef46327427e593c7b274c 63292 comm optional asterisk-mysql_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n 8dff8e0d54e5f2cd3c7d8d08a51a1bcc 1133664 debug optional asterisk-ooh323-dbgsym_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n a00ed03291601653a3862aba0232a96c 336424 comm optional asterisk-ooh323_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n e8a3a7ff2ffa26dc9e8965738ad3067b 1306236 debug optional asterisk-tests-dbgsym_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n 42bef43b1d73b27d6dca5aefd8905efc 556888 comm optional asterisk-tests_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n- 4092836b1115ff21c893a0d0f1d9e455 2188564 comm optional asterisk_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n+ 508a88c6cc1d834b9dc02f92caa7edc6 2188568 comm optional asterisk_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb\n"}, {"source1": "asterisk_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb", "source2": "asterisk_22.0.0~dfsg+~cs6.14.60671435-1_armhf.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2024-10-23 11:39:34.000000 debian-binary\n--rw-r--r-- 0 0 0 8296 2024-10-23 11:39:34.000000 control.tar.xz\n+-rw-r--r-- 0 0 0 8300 2024-10-23 11:39:34.000000 control.tar.xz\n -rw-r--r-- 0 0 0 2180076 2024-10-23 11:39:34.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "./usr/share/asterisk/documentation/core-en_US.xml", "source2": "./usr/share/asterisk/documentation/core-en_US.xml", "unified_diff": null, "details": [{"source1": "./usr/share/asterisk/documentation/core-en_US.xml", "source2": "./usr/share/asterisk/documentation/core-en_US.xml", "comments": ["Ordering differences only"], "unified_diff": "@@ -33778,298 +33778,14 @@\n \n \n \n \n \n extended\n \n- \n- STIR/SHAKEN module for Asterisk\n- \n- \n- STIR/SHAKEN attestation options\n- \n- Globally disable verification\n- \n- \n- File path to a certificate\n- \n- \n- URL to the public certificate\n- \n- Must be a valid http, or https, URL.\n- \n- \n- \n- Attestation level\n- \n- \n- On load, Retrieve all TN's certificates and validate their dates\n- \n- \n- Send a media key (mky) grant in the attestation for DTLS calls.\n-\t\t\t\t\t(not common)\n- \n- \n- \n- STIR/SHAKEN TN options\n- \n- Must be of type 'tn'.\n- \n- \n- File path to a certificate\n- \n- \n- URL to the public certificate\n- \n- Must be a valid http, or https, URL.\n- \n- \n- \n- Attestation level\n- \n- \n- On load, Retrieve all TN's certificates and validate their dates\n- \n- \n- Send a media key (mky) grant in the attestation for DTLS calls.\n-\t\t\t\t\t(not common)\n- \n- \n- \n- STIR/SHAKEN verification options\n- \n- Globally disable verification\n- \n- \n- A boolean indicating whether trusted CA certificates should be loaded from the system\n- \n- \n- Path to a file containing one or more CA certs in PEM format\n- \n- These certs are used to verify the chain of trust for the\n-\t\t\t\t\t\tcertificate retrieved from the X5U Identity header parameter. This\n-\t\t\t\t\t\tfile must have the root CA certificate, the certificate of the\n-\t\t\t\t\t\tissuer of the X5U certificate, and any intermediate certificates\n-\t\t\t\t\t\tbetween them.\n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- Path to a directory containing one or more hashed CA certs\n- \n- \n- \n- For this option, the individual certificates must be placed in\n-\t\t\t\t\t\tthe directory specified and hashed using the\n- openssl rehash\n- command.\n- \n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- Path to a file containing one or more CRLs in PEM format\n- \n- If you with to check if the certificate in the X5U Identity header\n-\t\t\t\t\t\tparameter has been revoked, you'll need the certificate revocation\n-\t\t\t\t\t\tlist generated by the issuer.\n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- Path to a directory containing one or more hashed CRLs\n- \n- \n- \n- For this option, the individual CRLs must be placed in\n-\t\t\t\t\t\tthe directory specified and hashed using the\n- openssl rehash\n- command.\n- \n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- Path to a file containing one or more untrusted cert in PEM format used to verify CRLs\n- \n- If you with to check if the certificate in the X5U Identity header\n-\t\t\t\t\tparameter has been revoked, you'll need the certificate revocation\n-\t\t\t\t\tlist generated by the issuer. Unfortunately, sometimes the CRLs are signed by a\n-\t\t\t\t\tdifferent CA than the certificate being verified. In this case, you\n-\t\t\t\t\tmay need to provide the untrusted certificate to verify the CRL.\n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- Path to a directory containing one or more hashed untrusted certs used to verify CRLs\n- \n- \n- \n- For this option, the individual certificates must be placed in\n-\t\t\t\t\t\tthe directory specified and hashed using the\n- openssl rehash\n- command.\n- \n- See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n- \n- \n- \n- Directory to cache retrieved verification certs\n- \n- \n- Maximum time to wait to CURL certificates\n- \n- \n- Number of seconds a cache entry may be behind current time\n- \n- \n- Maximum size to use for caching public keys\n- \n- \n- Number of seconds an iat grant may be behind current time\n- \n- \n- Number of seconds a SIP Date header may be behind current time\n- \n- \n- The default failure action when not set on a profile\n- \n- \n- \n- \n- If set to\n- continue\n- , continue and let\n-\t\t\t\t\t\t\tthe dialplan decide what action to take.\n- \n- \n- \n- \n- If set to\n- reject_request\n- , reject the incoming\n-\t\t\t\t\t\t\trequest with response codes defined in RFC8224.\n- \n- \n- \n- \n- If set to\n- return_reason\n- , continue to the\n-\t\t\t\t\t\t\tdialplan but add a\n- Reason\n- header to the sender in\n-\t\t\t\t\t\t\tthe next provisional response.\n- \n- \n- \n- \n- \n- \n- RFC9410 uses the STIR protocol on Reason headers\n-\t\t\t\t\tinstead of the SIP protocol\n- \n- \n- Relaxes check for "https" and port 443 or 8443\n-\t\t\t\t\tin incoming Identity header x5u URLs.\n- \n- \n- Relaxes check for query parameters, user/password, etc.\n-\t\t\t\t\tin incoming Identity header x5u URLs.\n- \n- \n- An existing ACL from acl.conf to use when checking\n-\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n- \n- \n- An IP or subnet to permit when checking\n-\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n- \n- \n- An IP or subnet to deny checking\n-\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n- \n- \n- \n- STIR/SHAKEN profile configuration options\n- \n- Must be of type 'profile'.\n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- \n- Actions performed when an endpoint references this profile\n- \n- \n- \n- Don't do any STIR/SHAKEN processing.\n- \n- \n- Attest on outgoing calls.\n- \n- \n- Verify incoming calls.\n- \n- \n- Attest outgoing calls and verify incoming calls.\n- \n- \n- \n- \n- \n- \n- \n- \n- Gets the number of STIR/SHAKEN results or a specific STIR/SHAKEN value from a result on the channel.\n- \n- \n- The index of the STIR/SHAKEN result to get. If only 'count' is passed in, gets the number of STIR/SHAKEN results instead.\n- \n- \n- The value to get from the STIR/SHAKEN result. Only used when an index is passed in (instead of 'count'). Allowable values:\n- \n- \n- \n- \n- \n- \n- \n- \n- This function will either return the number of STIR/SHAKEN identities, or return information on the specified identity.\n-\t\t\tTo get the number of identities, just pass 'count' as the only parameter to the function. If you want to get information on a\n-\t\t\tspecific STIR/SHAKEN identity, you can get the number of identities and then pass an index as the first parameter and one of\n-\t\t\tthe values you would like to retrieve as the second parameter.\n- same => n,NoOp(Number of STIR/SHAKEN identities: ${STIR_SHAKEN(count)})\n-\t\t\tsame => n,NoOp(Identity ${STIR_SHAKEN(0, identity)} has attestation level ${STIR_SHAKEN(0, attestation)})\n- \n- \n \n SIP Resource using PJProject\n \n \n Endpoint\n \n \n@@ -38221,14 +37937,298 @@\n \n \n \n \n \n \n \n+ \n+ STIR/SHAKEN module for Asterisk\n+ \n+ \n+ STIR/SHAKEN attestation options\n+ \n+ Globally disable verification\n+ \n+ \n+ File path to a certificate\n+ \n+ \n+ URL to the public certificate\n+ \n+ Must be a valid http, or https, URL.\n+ \n+ \n+ \n+ Attestation level\n+ \n+ \n+ On load, Retrieve all TN's certificates and validate their dates\n+ \n+ \n+ Send a media key (mky) grant in the attestation for DTLS calls.\n+\t\t\t\t\t(not common)\n+ \n+ \n+ \n+ STIR/SHAKEN TN options\n+ \n+ Must be of type 'tn'.\n+ \n+ \n+ File path to a certificate\n+ \n+ \n+ URL to the public certificate\n+ \n+ Must be a valid http, or https, URL.\n+ \n+ \n+ \n+ Attestation level\n+ \n+ \n+ On load, Retrieve all TN's certificates and validate their dates\n+ \n+ \n+ Send a media key (mky) grant in the attestation for DTLS calls.\n+\t\t\t\t\t(not common)\n+ \n+ \n+ \n+ STIR/SHAKEN verification options\n+ \n+ Globally disable verification\n+ \n+ \n+ A boolean indicating whether trusted CA certificates should be loaded from the system\n+ \n+ \n+ Path to a file containing one or more CA certs in PEM format\n+ \n+ These certs are used to verify the chain of trust for the\n+\t\t\t\t\t\tcertificate retrieved from the X5U Identity header parameter. This\n+\t\t\t\t\t\tfile must have the root CA certificate, the certificate of the\n+\t\t\t\t\t\tissuer of the X5U certificate, and any intermediate certificates\n+\t\t\t\t\t\tbetween them.\n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ Path to a directory containing one or more hashed CA certs\n+ \n+ \n+ \n+ For this option, the individual certificates must be placed in\n+\t\t\t\t\t\tthe directory specified and hashed using the\n+ openssl rehash\n+ command.\n+ \n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ Path to a file containing one or more CRLs in PEM format\n+ \n+ If you with to check if the certificate in the X5U Identity header\n+\t\t\t\t\t\tparameter has been revoked, you'll need the certificate revocation\n+\t\t\t\t\t\tlist generated by the issuer.\n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ Path to a directory containing one or more hashed CRLs\n+ \n+ \n+ \n+ For this option, the individual CRLs must be placed in\n+\t\t\t\t\t\tthe directory specified and hashed using the\n+ openssl rehash\n+ command.\n+ \n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ Path to a file containing one or more untrusted cert in PEM format used to verify CRLs\n+ \n+ If you with to check if the certificate in the X5U Identity header\n+\t\t\t\t\tparameter has been revoked, you'll need the certificate revocation\n+\t\t\t\t\tlist generated by the issuer. Unfortunately, sometimes the CRLs are signed by a\n+\t\t\t\t\tdifferent CA than the certificate being verified. In this case, you\n+\t\t\t\t\tmay need to provide the untrusted certificate to verify the CRL.\n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ Path to a directory containing one or more hashed untrusted certs used to verify CRLs\n+ \n+ \n+ \n+ For this option, the individual certificates must be placed in\n+\t\t\t\t\t\tthe directory specified and hashed using the\n+ openssl rehash\n+ command.\n+ \n+ See https://docs.asterisk.org/Deployment/STIR-SHAKEN/ for more information.\n+ \n+ \n+ \n+ Directory to cache retrieved verification certs\n+ \n+ \n+ Maximum time to wait to CURL certificates\n+ \n+ \n+ Number of seconds a cache entry may be behind current time\n+ \n+ \n+ Maximum size to use for caching public keys\n+ \n+ \n+ Number of seconds an iat grant may be behind current time\n+ \n+ \n+ Number of seconds a SIP Date header may be behind current time\n+ \n+ \n+ The default failure action when not set on a profile\n+ \n+ \n+ \n+ \n+ If set to\n+ continue\n+ , continue and let\n+\t\t\t\t\t\t\tthe dialplan decide what action to take.\n+ \n+ \n+ \n+ \n+ If set to\n+ reject_request\n+ , reject the incoming\n+\t\t\t\t\t\t\trequest with response codes defined in RFC8224.\n+ \n+ \n+ \n+ \n+ If set to\n+ return_reason\n+ , continue to the\n+\t\t\t\t\t\t\tdialplan but add a\n+ Reason\n+ header to the sender in\n+\t\t\t\t\t\t\tthe next provisional response.\n+ \n+ \n+ \n+ \n+ \n+ \n+ RFC9410 uses the STIR protocol on Reason headers\n+\t\t\t\t\tinstead of the SIP protocol\n+ \n+ \n+ Relaxes check for "https" and port 443 or 8443\n+\t\t\t\t\tin incoming Identity header x5u URLs.\n+ \n+ \n+ Relaxes check for query parameters, user/password, etc.\n+\t\t\t\t\tin incoming Identity header x5u URLs.\n+ \n+ \n+ An existing ACL from acl.conf to use when checking\n+\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n+ \n+ \n+ An IP or subnet to permit when checking\n+\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n+ \n+ \n+ An IP or subnet to deny checking\n+\t\t\t\t\thostnames in incoming Identity header x5u URLs.\n+ \n+ \n+ \n+ STIR/SHAKEN profile configuration options\n+ \n+ Must be of type 'profile'.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ Actions performed when an endpoint references this profile\n+ \n+ \n+ \n+ Don't do any STIR/SHAKEN processing.\n+ \n+ \n+ Attest on outgoing calls.\n+ \n+ \n+ Verify incoming calls.\n+ \n+ \n+ Attest outgoing calls and verify incoming calls.\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ Gets the number of STIR/SHAKEN results or a specific STIR/SHAKEN value from a result on the channel.\n+ \n+ \n+ The index of the STIR/SHAKEN result to get. If only 'count' is passed in, gets the number of STIR/SHAKEN results instead.\n+ \n+ \n+ The value to get from the STIR/SHAKEN result. Only used when an index is passed in (instead of 'count'). Allowable values:\n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ \n+ This function will either return the number of STIR/SHAKEN identities, or return information on the specified identity.\n+\t\t\tTo get the number of identities, just pass 'count' as the only parameter to the function. If you want to get information on a\n+\t\t\tspecific STIR/SHAKEN identity, you can get the number of identities and then pass an index as the first parameter and one of\n+\t\t\tthe values you would like to retrieve as the second parameter.\n+ same => n,NoOp(Number of STIR/SHAKEN identities: ${STIR_SHAKEN(count)})\n+\t\t\tsame => n,NoOp(Identity ${STIR_SHAKEN(0, identity)} has attestation level ${STIR_SHAKEN(0, attestation)})\n+ \n+ \n \n Core Geolocation Support\n \n \n Location\n \n Parameters for defining a Location object\n"}]}]}]}]}]}