diff options
author | taca <taca@pkgsrc.org> | 2008-05-14 10:08:59 +0000 |
---|---|---|
committer | taca <taca@pkgsrc.org> | 2008-05-14 10:08:59 +0000 |
commit | 31997ec9340a177a9d89dce16a5c07d831bd3476 (patch) | |
tree | 640ac6283efffd255a4eeb335e9df1589ba358c8 /lang/ruby18-base | |
parent | f3c00a243a6ce1bfa28701785e6780514f3196c2 (diff) | |
download | pkgsrc-31997ec9340a177a9d89dce16a5c07d831bd3476.tar.gz |
Fix build problem with recent NetBSD current with post version
of OpenSSL 0.9.8g.
Since this is fix for build problem only, I don't bump PKGREVISION.
Diffstat (limited to 'lang/ruby18-base')
-rw-r--r-- | lang/ruby18-base/distinfo | 5 | ||||
-rw-r--r-- | lang/ruby18-base/patches/patch-de | 27 | ||||
-rw-r--r-- | lang/ruby18-base/patches/patch-df | 94 | ||||
-rw-r--r-- | lang/ruby18-base/patches/patch-dg | 26 |
4 files changed, 151 insertions, 1 deletions
diff --git a/lang/ruby18-base/distinfo b/lang/ruby18-base/distinfo index f03d05829d7..dbac0165784 100644 --- a/lang/ruby18-base/distinfo +++ b/lang/ruby18-base/distinfo @@ -1,4 +1,4 @@ -$NetBSD: distinfo,v 1.26 2008/03/09 13:31:18 taca Exp $ +$NetBSD: distinfo,v 1.27 2008/05/14 10:08:59 taca Exp $ SHA1 (ruby-1.8.6-p114.tar.bz2) = 9929782935ebb77d040593a010b8d65b03ce6e23 RMD160 (ruby-1.8.6-p114.tar.bz2) = 332d6e98ef79ad8175ce699ed5293407763f769f @@ -7,3 +7,6 @@ SHA1 (patch-aa) = eb218253249d7fc8fe32c5d1ad00f355714861f9 SHA1 (patch-ab) = 973e36950d5b497c7283b928153e9f0ae9fe023e SHA1 (patch-ac) = eb4dd068729ba2a2c7d4d659f6bcdb1410227f3b SHA1 (patch-ad) = f58380acbde2cd346b622b1a547a2840c61cee1f +SHA1 (patch-de) = 716dadc9042f81fe16a183fe03b2a63ec2598212 +SHA1 (patch-df) = 0ea1f97ad998361172f78d5cb0e1d0a5f1501b24 +SHA1 (patch-dg) = e79566ded3c82e63357966e961d7dcdfb84a03cf diff --git a/lang/ruby18-base/patches/patch-de b/lang/ruby18-base/patches/patch-de new file mode 100644 index 00000000000..88f9c900e92 --- /dev/null +++ b/lang/ruby18-base/patches/patch-de @@ -0,0 +1,27 @@ +$NetBSD: patch-de,v 1.1 2008/05/14 10:09:00 taca Exp $ + +--- ext/openssl/openssl_missing.c.orig 2007-02-13 08:01:19.000000000 +0900 ++++ ext/openssl/openssl_missing.c +@@ -22,17 +22,15 @@ + #include "openssl_missing.h" + + #if !defined(HAVE_HMAC_CTX_COPY) +-int ++void + HMAC_CTX_copy(HMAC_CTX *out, HMAC_CTX *in) + { +- if (!out || !in) return 0; ++ if (!out || !in) return; + memcpy(out, in, sizeof(HMAC_CTX)); + +- if (!EVP_MD_CTX_copy(&out->md_ctx, &in->md_ctx) +- || !EVP_MD_CTX_copy(&out->i_ctx, &in->i_ctx) +- || !EVP_MD_CTX_copy(&out->o_ctx, &in->o_ctx)) +- return 0; +- return 1; ++ EVP_MD_CTX_copy(&out->md_ctx, &in->md_ctx); ++ EVP_MD_CTX_copy(&out->i_ctx, &in->i_ctx); ++ EVP_MD_CTX_copy(&out->o_ctx, &in->o_ctx); + } + #endif /* HAVE_HMAC_CTX_COPY */ + #endif /* NO_HMAC */ diff --git a/lang/ruby18-base/patches/patch-df b/lang/ruby18-base/patches/patch-df new file mode 100644 index 00000000000..91b8c7dab88 --- /dev/null +++ b/lang/ruby18-base/patches/patch-df @@ -0,0 +1,94 @@ +$NetBSD: patch-df,v 1.1 2008/05/14 10:09:00 taca Exp $ + +--- ext/openssl/openssl_missing.h.orig 2007-02-13 08:01:19.000000000 +0900 ++++ ext/openssl/openssl_missing.h +@@ -56,14 +56,33 @@ extern "C" { + (char *(*)())d2i_PKCS7_RECIP_INFO, (char *)ri) + #endif + ++#if !defined(HAVE_EVP_MD_CTX_INIT) + void HMAC_CTX_init(HMAC_CTX *ctx); +-int HMAC_CTX_copy(HMAC_CTX *out, HMAC_CTX *in); ++#endif ++ ++#if !defined(HAVE_HMAC_CTX_COPY) ++void HMAC_CTX_copy(HMAC_CTX *out, HMAC_CTX *in); ++#endif ++ ++#if !defined(HAVE_HMAC_CTX_CLEANUP) + void HMAC_CTX_cleanup(HMAC_CTX *ctx); ++#endif + ++#if !defined(HAVE_EVP_MD_CTX_CREATE) + EVP_MD_CTX *EVP_MD_CTX_create(void); ++#endif ++ ++#if !defined(HAVE_EVP_MD_CTX_INIT) + void EVP_MD_CTX_init(EVP_MD_CTX *ctx); ++#endif ++ ++#if !defined(HAVE_EVP_MD_CTX_CLEANUP) + int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx); ++#endif ++ ++#if !defined(HAVE_EVP_MD_CTX_DESTROY) + void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx); ++#endif + + #if !defined(HAVE_EVP_CIPHER_CTX_COPY) + int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, EVP_CIPHER_CTX *in); +@@ -107,19 +126,54 @@ int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX * + #define OPENSSL_cleanse(p, l) memset(p, 0, l) + #endif + ++#if !defined(HAVE_X509_STORE_SET_EX_DATA) + void *X509_STORE_get_ex_data(X509_STORE *str, int idx); + int X509_STORE_set_ex_data(X509_STORE *str, int idx, void *data); ++#endif ++ ++#if !defined(HAVE_X509_CRL_SET_VERSION) + int X509_CRL_set_version(X509_CRL *x, long version); ++#endif ++ ++#if !defined(HAVE_X509_CRL_SET_ISSUER_NAME) + int X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name); ++#endif ++ ++#if !defined(HAVE_X509_CRL_SORT) + int X509_CRL_sort(X509_CRL *c); ++#endif ++ ++#if !defined(HAVE_X509_CRL_ADD0_REVOKED) + int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev); ++#endif ++ ++#if !defined(HAVE_BN_MOD_SQR) + int BN_mod_sqr(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx); ++#endif ++ ++#if !defined(HAVE_BN_MOD_ADD) + int BN_mod_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx); ++#endif ++ ++#if !defined(HAVE_BN_MOD_SUB) + int BN_mod_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx); ++#endif ++ ++#if !defined(HAVE_BN_RAND_RANGE) + int BN_rand_range(BIGNUM *r, BIGNUM *range); ++#endif ++ ++#if !defined(HAVE_BN_PSEUDO_RAND_RANGE) + int BN_pseudo_rand_range(BIGNUM *r, BIGNUM *range); ++#endif ++ ++#if !defined(HAVE_CONF_GET1_DEFAULT_CONFIG_FILE) + char *CONF_get1_default_config_file(void); ++#endif ++ ++#if !defined(HAVE_PEM_DEF_CALLBACK) + int PEM_def_callback(char *buf, int num, int w, void *key); ++#endif + + #if defined(__cplusplus) + } diff --git a/lang/ruby18-base/patches/patch-dg b/lang/ruby18-base/patches/patch-dg new file mode 100644 index 00000000000..459d340b53e --- /dev/null +++ b/lang/ruby18-base/patches/patch-dg @@ -0,0 +1,26 @@ +$NetBSD: patch-dg,v 1.3 2008/05/14 10:09:00 taca Exp $ + +--- ext/openssl/ossl_hmac.c.orig 2007-03-12 13:12:32.000000000 +0900 ++++ ext/openssl/ossl_hmac.c +@@ -81,9 +81,7 @@ ossl_hmac_copy(VALUE self, VALUE other) + GetHMAC(self, ctx1); + SafeGetHMAC(other, ctx2); + +- if (!HMAC_CTX_copy(ctx1, ctx2)) { +- ossl_raise(eHMACError, NULL); +- } ++ HMAC_CTX_copy(ctx1, ctx2); + return self; + } + +@@ -104,9 +102,7 @@ hmac_final(HMAC_CTX *ctx, char **buf, in + { + HMAC_CTX final; + +- if (!HMAC_CTX_copy(&final, ctx)) { +- ossl_raise(eHMACError, NULL); +- } ++ HMAC_CTX_copy(&final, ctx); + if (!(*buf = OPENSSL_malloc(HMAC_size(&final)))) { + HMAC_CTX_cleanup(&final); + OSSL_Debug("Allocating %d mem", HMAC_size(&final)); |