svn commit: r483779 - in branches/2018Q4/net-im/telegram: . files

Antoine Brodin antoine at FreeBSD.org
Fri Nov 2 08:15:07 UTC 2018


Author: antoine
Date: Fri Nov  2 08:15:05 2018
New Revision: 483779
URL: https://svnweb.freebsd.org/changeset/ports/483779

Log:
  MFH: r482679
  
  net-im/telegram: Unbreak build on 12.0-CURRENT
  
  Add extra-patch to fix build on 12.0-CURRENT after updating OpenSSL to version 1.1.1
  
  See https://github.com/vysheng/tgl/issues/129

Added:
  branches/2018Q4/net-im/telegram/files/extra-patch-openssl-1.1.0
     - copied unchanged from r482679, head/net-im/telegram/files/extra-patch-openssl-1.1.0
Modified:
  branches/2018Q4/net-im/telegram/Makefile
Directory Properties:
  branches/2018Q4/   (props changed)

Modified: branches/2018Q4/net-im/telegram/Makefile
==============================================================================
--- branches/2018Q4/net-im/telegram/Makefile	Fri Nov  2 08:12:20 2018	(r483778)
+++ branches/2018Q4/net-im/telegram/Makefile	Fri Nov  2 08:15:05 2018	(r483779)
@@ -35,6 +35,12 @@ PORTDOCS=	*
 
 OPTIONS_DEFINE=	DOCS
 
+.include <bsd.port.options.mk>
+
+.if ${OPSYS} == FreeBSD && ${OSVERSION} >= 1200085
+EXTRA_PATCHES+=	${FILESDIR}/extra-patch-openssl-1.1.0
+.endif
+
 do-install:
 	@${MKDIR} ${STAGEDIR}${PREFIX}/etc/telegram-cli
 	${INSTALL_PROGRAM} ${WRKSRC}/bin/telegram-cli ${STAGEDIR}${PREFIX}/bin

Copied: branches/2018Q4/net-im/telegram/files/extra-patch-openssl-1.1.0 (from r482679, head/net-im/telegram/files/extra-patch-openssl-1.1.0)
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ branches/2018Q4/net-im/telegram/files/extra-patch-openssl-1.1.0	Fri Nov  2 08:15:05 2018	(r483779, copy of r482679, head/net-im/telegram/files/extra-patch-openssl-1.1.0)
@@ -0,0 +1,38 @@
+--- tgl/crypto/rsa_pem_openssl.c.orig	2018-10-21 14:25:36 UTC
++++ tgl/crypto/rsa_pem_openssl.c
+@@ -36,18 +36,28 @@ TGLC_WRAPPER_ASSOC(rsa,RSA)
+ // TODO: Refactor crucial struct-identity into its own header.
+ TGLC_WRAPPER_ASSOC(bn,BIGNUM)
+ 
++/*
++ * Note: Since OpenSSL version 1.1.0-pre5 the RSA struct (rsa_st) is opaque,
++ * see https://wiki.openssl.org/index.php/OpenSSL_1.1.0_Changes
++ */
+ TGLC_rsa *TGLC_rsa_new (unsigned long e, int n_bytes, const unsigned char *n) {
+   RSA *ret = RSA_new ();
+-  ret->e = unwrap_bn (TGLC_bn_new ());
+-  TGLC_bn_set_word (wrap_bn (ret->e), e);
+-  ret->n = unwrap_bn (TGLC_bn_bin2bn (n, n_bytes, NULL));
++  BIGNUM *ret_e = unwrap_bn (TGLC_bn_new ());
++  BIGNUM *ret_n = unwrap_bn (TGLC_bn_bin2bn (n, n_bytes, NULL));
++  RSA_set0_key (ret, ret_n, ret_e, NULL);
++  TGLC_bn_set_word (wrap_bn (ret_e), e);
+   return wrap_rsa (ret);
+ }
+ 
+-#define RSA_GETTER(M)                                                          \
+-  TGLC_bn *TGLC_rsa_ ## M (TGLC_rsa *key) {                                    \
+-    return wrap_bn (unwrap_rsa (key)->M);                                      \
+-  }                                                                            \
++#define RSA_GETTER(M)                       \
++TGLC_bn *TGLC_rsa_ ## M (TGLC_rsa *key) {   \
++    BIGNUM *rsa_n, *rsa_e, *rsa_d;          \
++    RSA_get0_key(unwrap_rsa (key),          \
++        (const BIGNUM **) &rsa_n,           \
++        (const BIGNUM **) &rsa_e,           \
++        (const BIGNUM **) &rsa_d);          \
++    return wrap_bn (rsa_ ## M);             \
++}
+ 
+ RSA_GETTER(n);
+ RSA_GETTER(e);


More information about the svn-ports-all mailing list