summaryrefslogtreecommitdiff
path: root/mail/fetchmail
diff options
context:
space:
mode:
authortron <tron@pkgsrc.org>2010-05-09 11:45:28 +0000
committertron <tron@pkgsrc.org>2010-05-09 11:45:28 +0000
commit6fc245526404f71ffa505a7f33e3e6abafc4a40d (patch)
tree274d849e4be331269e16a1c610b208c7b59d7a3f /mail/fetchmail
parentb43c04aa851ea12bf1cadcbc9ecb9f3c59576958 (diff)
downloadpkgsrc-6fc245526404f71ffa505a7f33e3e6abafc4a40d.tar.gz
Add patch by Matthias Andree to avoid warnings about insecure connections
if SSL fingerprints are used.
Diffstat (limited to 'mail/fetchmail')
-rw-r--r--mail/fetchmail/Makefile3
-rw-r--r--mail/fetchmail/distinfo3
-rw-r--r--mail/fetchmail/patches/patch-aa20
3 files changed, 24 insertions, 2 deletions
diff --git a/mail/fetchmail/Makefile b/mail/fetchmail/Makefile
index 592e2c75a91..82d06fcf17f 100644
--- a/mail/fetchmail/Makefile
+++ b/mail/fetchmail/Makefile
@@ -1,7 +1,8 @@
-# $NetBSD: Makefile,v 1.172 2010/05/08 15:34:59 tez Exp $
+# $NetBSD: Makefile,v 1.173 2010/05/09 11:45:28 tron Exp $
# Note to updaters: mail/fetchmailconf reaches over here, make sure it builds.
DISTNAME= fetchmail-6.3.17
+PKGREVISION= 1
CATEGORIES= mail
MASTER_SITES= http://download.berlios.de/fetchmail/
EXTRACT_SUFX= .tar.bz2
diff --git a/mail/fetchmail/distinfo b/mail/fetchmail/distinfo
index 1ab7d05684f..35fbe8c1abb 100644
--- a/mail/fetchmail/distinfo
+++ b/mail/fetchmail/distinfo
@@ -1,5 +1,6 @@
-$NetBSD: distinfo,v 1.42 2010/05/08 15:34:59 tez Exp $
+$NetBSD: distinfo,v 1.43 2010/05/09 11:45:28 tron Exp $
SHA1 (fetchmail-6.3.17.tar.bz2) = d9ffc9a43f08f9ee9394a959834606eb41141d47
RMD160 (fetchmail-6.3.17.tar.bz2) = a908da76b9d729dee7c6457b89a342be677bd690
Size (fetchmail-6.3.17.tar.bz2) = 1642598 bytes
+SHA1 (patch-aa) = 9885a4f063b428d68c7bff06c1402571f0e21c82
diff --git a/mail/fetchmail/patches/patch-aa b/mail/fetchmail/patches/patch-aa
new file mode 100644
index 00000000000..c8ff87430d9
--- /dev/null
+++ b/mail/fetchmail/patches/patch-aa
@@ -0,0 +1,20 @@
+$NetBSD: patch-aa,v 1.8 2010/05/09 11:45:28 tron Exp $
+
+Don't complain about insecure connection if a SSL fingerprint is provided.
+Patch taken from here:
+
+http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg780308.html
+
+--- socket.c.orig 2010-04-30 00:29:05.000000000 +0100
++++ socket.c 2010-05-09 12:40:58.000000000 +0100
+@@ -1009,8 +1009,8 @@
+ }
+ }
+
+- if (!certck && (SSL_get_verify_result(_ssl_context[sock]) != X509_V_OK
+-|| !_verify_ok)) {
++ if (!certck && !fingerprint &&
++ (SSL_get_verify_result(_ssl_context[sock]) != X509_V_OK || !_verify_ok)) {
+ report(stderr, GT_("Warning: the connection is insecure, continuing anyways. (Better use --sslcertck!)\n"));
+ }
+