svn commit: r499739 - head/security/p5-Net-SSLeay/files

Pietro Cerutti gahr at FreeBSD.org
Tue Apr 23 09:24:57 UTC 2019


Author: gahr
Date: Tue Apr 23 09:24:56 2019
New Revision: 499739
URL: https://svnweb.freebsd.org/changeset/ports/499739

Log:
  security/p5-Net-SSLeay: fix build with libressl 2.9
  
  I'm considering a maintainer timeout for this one, as the bug was first
  reported in December. LibreSSL 2.9.1 is now the main version in the ports tree,
  so this is urgent.
  
  perl@, feel free to commit a better fix.
  
  PR:		234102
  Submitted by:	Charlie Li <ml+freebsd at vishwin.info>
  Approved by:	maintainer (timeout)

Added:
  head/security/p5-Net-SSLeay/files/patch-libressl-2.9   (contents, props changed)

Added: head/security/p5-Net-SSLeay/files/patch-libressl-2.9
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/p5-Net-SSLeay/files/patch-libressl-2.9	Tue Apr 23 09:24:56 2019	(r499739)
@@ -0,0 +1,67 @@
+$OpenBSD: patch-SSLeay_xs,v 1.15 2018/11/07 01:55:42 bluhm Exp $
+
+https://github.com/radiator-software/p5-net-ssleay/pull/96
+https://github.com/radiator-software/p5-net-ssleay/pull/95
+https://github.com/radiator-software/p5-net-ssleay/pull/94
+
+Index: SSLeay.xs
+--- SSLeay.xs.orig
++++ SSLeay.xs
+@@ -2766,7 +2766,7 @@ RAND_write_file(file_name)
+ 
+ #define REM40 "Minimal X509 stuff..., this is a bit ugly and should be put in its own modules Net::SSLeay::X509.pm"
+ 
+-#if OPENSSL_VERSION_NUMBER >= 0x1000200fL && !defined(LIBRESSL_VERSION_NUMBER)
++#if OPENSSL_VERSION_NUMBER >= 0x1000200fL
+ 
+ int
+ X509_check_host(X509 *cert, const char *name, unsigned int flags = 0, SV *peername = &PL_sv_undef)
+@@ -4366,7 +4366,7 @@ TLSv1_2_client_method()
+ #endif
+ 
+ 
+-#if (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x20020002L)
++#if OPENSSL_VERSION_NUMBER >= 0x10100000L
+ 
+ const SSL_METHOD *
+ TLS_method()
+@@ -4377,10 +4377,10 @@ TLS_server_method()
+ const SSL_METHOD *
+ TLS_client_method()
+ 
+-#endif /* OpenSSL 1.1.0 or LibreSSL 2.2.2 */
++#endif /* OpenSSL 1.1.0 */
+ 
+ 
+-#if  (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x2060000fL)
++#if OPENSSL_VERSION_NUMBER >= 0x10100000L
+ 
+ int
+ SSL_CTX_set_min_proto_version(ctx, version)
+@@ -4402,7 +4402,7 @@ SSL_set_max_proto_version(ssl, version)
+      SSL *  ssl
+      int    version
+ 
+-#endif /* OpenSSL 1.1.0 or LibreSSL 2.6.0 */
++#endif /* OpenSSL 1.1.0 */
+ 
+ 
+ #if OPENSSL_VERSION_NUMBER >= 0x1010007fL && !defined(LIBRESSL_VERSION_NUMBER)
+@@ -5612,7 +5612,7 @@ SSL_get_client_random(s)
+ 
+ #endif
+ 
+-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
++#if (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x2070000fL)
+ 
+ void
+ SSL_get_server_random(s)
+@@ -5643,7 +5643,7 @@ int
+ SSL_get_keyblock_size(s)
+      SSL *   s
+      CODE:
+-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
++#if (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x2070000fL)
+         const SSL_CIPHER *ssl_cipher;
+ 	int cipher = NID_undef, digest = NID_undef, mac_secret_size = 0;
+ 	const EVP_CIPHER *c = NULL;


More information about the svn-ports-head mailing list