From owner-svn-ports-head@freebsd.org Tue Apr 23 09:24:57 2019 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3DADB1593F8C; Tue, 23 Apr 2019 09:24:57 +0000 (UTC) (envelope-from gahr@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D5F089795C; Tue, 23 Apr 2019 09:24:56 +0000 (UTC) (envelope-from gahr@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id AE9D32278D; Tue, 23 Apr 2019 09:24:56 +0000 (UTC) (envelope-from gahr@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id x3N9OuvJ048811; Tue, 23 Apr 2019 09:24:56 GMT (envelope-from gahr@FreeBSD.org) Received: (from gahr@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id x3N9OuSE048810; Tue, 23 Apr 2019 09:24:56 GMT (envelope-from gahr@FreeBSD.org) Message-Id: <201904230924.x3N9OuSE048810@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gahr set sender to gahr@FreeBSD.org using -f From: Pietro Cerutti Date: Tue, 23 Apr 2019 09:24:56 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r499739 - head/security/p5-Net-SSLeay/files X-SVN-Group: ports-head X-SVN-Commit-Author: gahr X-SVN-Commit-Paths: head/security/p5-Net-SSLeay/files X-SVN-Commit-Revision: 499739 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: D5F089795C X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.975,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Apr 2019 09:24:57 -0000 Author: gahr Date: Tue Apr 23 09:24:56 2019 New Revision: 499739 URL: https://svnweb.freebsd.org/changeset/ports/499739 Log: security/p5-Net-SSLeay: fix build with libressl 2.9 I'm considering a maintainer timeout for this one, as the bug was first reported in December. LibreSSL 2.9.1 is now the main version in the ports tree, so this is urgent. perl@, feel free to commit a better fix. PR: 234102 Submitted by: Charlie Li Approved by: maintainer (timeout) Added: head/security/p5-Net-SSLeay/files/patch-libressl-2.9 (contents, props changed) Added: head/security/p5-Net-SSLeay/files/patch-libressl-2.9 ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/p5-Net-SSLeay/files/patch-libressl-2.9 Tue Apr 23 09:24:56 2019 (r499739) @@ -0,0 +1,67 @@ +$OpenBSD: patch-SSLeay_xs,v 1.15 2018/11/07 01:55:42 bluhm Exp $ + +https://github.com/radiator-software/p5-net-ssleay/pull/96 +https://github.com/radiator-software/p5-net-ssleay/pull/95 +https://github.com/radiator-software/p5-net-ssleay/pull/94 + +Index: SSLeay.xs +--- SSLeay.xs.orig ++++ SSLeay.xs +@@ -2766,7 +2766,7 @@ RAND_write_file(file_name) + + #define REM40 "Minimal X509 stuff..., this is a bit ugly and should be put in its own modules Net::SSLeay::X509.pm" + +-#if OPENSSL_VERSION_NUMBER >= 0x1000200fL && !defined(LIBRESSL_VERSION_NUMBER) ++#if OPENSSL_VERSION_NUMBER >= 0x1000200fL + + int + X509_check_host(X509 *cert, const char *name, unsigned int flags = 0, SV *peername = &PL_sv_undef) +@@ -4366,7 +4366,7 @@ TLSv1_2_client_method() + #endif + + +-#if (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x20020002L) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + + const SSL_METHOD * + TLS_method() +@@ -4377,10 +4377,10 @@ TLS_server_method() + const SSL_METHOD * + TLS_client_method() + +-#endif /* OpenSSL 1.1.0 or LibreSSL 2.2.2 */ ++#endif /* OpenSSL 1.1.0 */ + + +-#if (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x2060000fL) ++#if OPENSSL_VERSION_NUMBER >= 0x10100000L + + int + SSL_CTX_set_min_proto_version(ctx, version) +@@ -4402,7 +4402,7 @@ SSL_set_max_proto_version(ssl, version) + SSL * ssl + int version + +-#endif /* OpenSSL 1.1.0 or LibreSSL 2.6.0 */ ++#endif /* OpenSSL 1.1.0 */ + + + #if OPENSSL_VERSION_NUMBER >= 0x1010007fL && !defined(LIBRESSL_VERSION_NUMBER) +@@ -5612,7 +5612,7 @@ SSL_get_client_random(s) + + #endif + +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x2070000fL) + + void + SSL_get_server_random(s) +@@ -5643,7 +5643,7 @@ int + SSL_get_keyblock_size(s) + SSL * s + CODE: +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)) || (LIBRESSL_VERSION_NUMBER >= 0x2070000fL) + const SSL_CIPHER *ssl_cipher; + int cipher = NID_undef, digest = NID_undef, mac_secret_size = 0; + const EVP_CIPHER *c = NULL;