ports/74275: bsd.openssl.mk

freebsd at simplerezo.com freebsd at simplerezo.com
Tue Nov 23 01:00:55 UTC 2004

>Number:         74275
>Category:       ports
>Synopsis:       bsd.openssl.mk
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Tue Nov 23 01:00:51 GMT 2004
>Originator:     freebsd at simplerezo.com
>Release:        FreeBSD 4.9-RELEASE-p12 i386
SimpleRezo [http://www.simplerezo.com]
System: FreeBSD devel.simplerezo.com 4.9-RELEASE-p12 FreeBSD 4.9-RELEASE-p12 #0: Sun Nov 7 15:23:05 CET 2004 root at devel.simplerezo.com:/usr/obj/usr/src/sys/KERNEL i386

All FreeBSD releases affected (ports related)

	bsd.openssl.mk, used by many ports, try to guess installed OpenSSL version by checking
	in opensslv.h for the variable OPENSSL_VERSION_TEXT
	since 0.9.7e, there are two lines contains the variable (w and w/o fips)
	unfortunaly, the first is the 0.9.7e-fips, and so the Mk script could not recognize
	openSSL version (looking for 0.9.7e)

	maintainer is cc'd

	install security/openssl (version 0.9.7e_1)


--- bsd-openssl.patch begins here ---
--- Mk/bsd.openssl.mk.orig	Tue Nov 23 01:20:42 2004
+++ Mk/bsd.openssl.mk	Tue Nov 23 01:38:25 2004
@@ -51,7 +51,7 @@
 #	Security: version in base must be 0.9.7d or have fixes
 #	http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssl/crypto/opensslv.h
-OPENSSLVER!=	${AWK} '/OPENSSL_VERSION_TEXT/ { print $$4; exit }' \
+OPENSSLVER!=	${AWK} '/OPENSSL_VERSION_TEXT/ { sub(/-fips/, ""); print $$4; exit }' \
 # check for safe versions in the base
 .if ${OPENSSLVER} != "0.9.7a-p1" && ${OPENSSLVER} != "0.9.7c-p1" && ${OPENSSLVER} != "0.9.7d" && ${OPENSSLVER} != "0.9.7e"
--- bsd-openssl.patch ends here ---


More information about the freebsd-ports-bugs mailing list