From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Jan 1 16:13:28 2015 Return-Path: Delivered-To: freebsd-ports-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9C5618C0 for ; Thu, 1 Jan 2015 16:13:28 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 83F111B9 for ; Thu, 1 Jan 2015 16:13:28 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t01GDSDS077648 for ; Thu, 1 Jan 2015 16:13:28 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 196248] net/libsrtp: Upgrade to latest from GitHub Date: Thu, 01 Jan 2015 16:13:27 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: needs-qa, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: mi@ALDAN.algebra.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-ports-bugs@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Jan 2015 16:13:28 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=196248 --- Comment #7 from Mikhail T. --- (In reply to Tijl Coosemans from comment #6) > I'd like to propose this alternate patch. It updates the port to version > 1.5.0 instead of using a development version. Considering the sort of "release-management" that GitHub seems to encourage, I doubt, using such a release ("version 1.5.0") will mean, what we usually mean by the term... Because nothing in our ports-tree is really using libsrtp at the moment, we don't need to worry (much) about "legacy" code. I'd say, we may as well offer a snapshot of the current master-branch of the project. > It also enables the use of some crypto functions from libcrypto (OpenSSL) which > eliminates the sha1_update function from the library so it no longer conflicts > with the same function from polarssl. So, we'll now have both OpenSSL and polarssl linked into libsrtp? If polarssl can not be easily replaced by OpenSSL (from base) completely, should we not use polarssl's implementation(s) of digests (like sha1) instead of -lcrypto's? -- You are receiving this mail because: You are the assignee for the bug.