diff options
author | abs <abs@pkgsrc.org> | 2006-08-22 22:04:51 +0000 |
---|---|---|
committer | abs <abs@pkgsrc.org> | 2006-08-22 22:04:51 +0000 |
commit | 6ef5f872af5276ff56012c14d64138add07d2f5d (patch) | |
tree | ecbc2730f46f87d8543e6d657e3e72ec510908cf /security/p5-Crypt-SSLeay | |
parent | cfc48243e6d1c56624dba4676b563ff1c6ccb758 (diff) | |
download | pkgsrc-6ef5f872af5276ff56012c14d64138add07d2f5d.tar.gz |
Update p5-Crypt-SSLeay to 0.51nb7
For OpenSSL 0.9.8b SSLeay_add_all_algorithms() does not setup any
algorithms, wheras SSL_library_init() does. The net result was that
SSL_CTX_new() would return a NULL pointer causing a perl coredump
in such cases as:
my $request = HTTP::Request->new( "GET", 'https://<some_url>' );
my $ua = LWP::UserAgent->new;
my $response = $ua->request($request);
Tracking this down was an entire flaming evening and change of my
life that I'm never going to get back, but at least my NetBSD-4
retail machines can now run NetBSD-4 built perl binaries again.
Diffstat (limited to 'security/p5-Crypt-SSLeay')
-rw-r--r-- | security/p5-Crypt-SSLeay/Makefile | 4 | ||||
-rw-r--r-- | security/p5-Crypt-SSLeay/distinfo | 3 | ||||
-rw-r--r-- | security/p5-Crypt-SSLeay/patches/patch-ab | 32 |
3 files changed, 36 insertions, 3 deletions
diff --git a/security/p5-Crypt-SSLeay/Makefile b/security/p5-Crypt-SSLeay/Makefile index f97c44e4bdb..d0da97d0063 100644 --- a/security/p5-Crypt-SSLeay/Makefile +++ b/security/p5-Crypt-SSLeay/Makefile @@ -1,9 +1,9 @@ -# $NetBSD: Makefile,v 1.3 2006/08/15 12:30:58 abs Exp $ +# $NetBSD: Makefile,v 1.4 2006/08/22 22:04:51 abs Exp $ # DISTNAME= Crypt-SSLeay-0.51 PKGNAME= p5-${DISTNAME} -PKGREVISION= 6 +PKGREVISION= 7 SVR4_PKGNAME= p5csl CATEGORIES= security perl5 www MASTER_SITES= ${MASTER_SITE_PERL_CPAN:=Crypt/} diff --git a/security/p5-Crypt-SSLeay/distinfo b/security/p5-Crypt-SSLeay/distinfo index f8d1132306e..073dc21d95b 100644 --- a/security/p5-Crypt-SSLeay/distinfo +++ b/security/p5-Crypt-SSLeay/distinfo @@ -1,6 +1,7 @@ -$NetBSD: distinfo,v 1.1.1.1 2006/01/20 20:08:53 wiz Exp $ +$NetBSD: distinfo,v 1.2 2006/08/22 22:04:51 abs Exp $ SHA1 (Crypt-SSLeay-0.51.tar.gz) = dea8e37e2430e351688125f5a641d76f55dbe25c RMD160 (Crypt-SSLeay-0.51.tar.gz) = 963ee2616742b3983a06eaee3059aafa9b866e0a Size (Crypt-SSLeay-0.51.tar.gz) = 117555 bytes SHA1 (patch-aa) = f79576ad49381a5fef228537502770f22ae00e41 +SHA1 (patch-ab) = 53b86b52c58f314ba87aa307a6dcceb9855bb70c diff --git a/security/p5-Crypt-SSLeay/patches/patch-ab b/security/p5-Crypt-SSLeay/patches/patch-ab new file mode 100644 index 00000000000..57f1123bb01 --- /dev/null +++ b/security/p5-Crypt-SSLeay/patches/patch-ab @@ -0,0 +1,32 @@ +$NetBSD: patch-ab,v 1.1 2006/08/22 22:04:51 abs Exp $ + +--- SSLeay.xs.orig 2003-05-28 07:55:02.000000000 +0100 ++++ SSLeay.xs +@@ -107,7 +107,7 @@ SSL_CTX_new(packname, ssl_version) + int rand_bytes_read; + + if(!bNotFirstTime) { +- SSLeay_add_all_algorithms(); ++ SSL_library_init(); + SSL_load_error_strings(); + ERR_load_crypto_strings(); + bNotFirstTime = 1; +@@ -130,10 +130,15 @@ SSL_CTX_new(packname, ssl_version) + /* v2 is the default */ + ctx = SSL_CTX_new(SSLv2_client_method()); + } +- SSL_CTX_set_options(ctx,SSL_OP_ALL|0); ++ if (ctx == 0) ++ croak("SSL_CTX_new failed"); ++ else ++ { ++ SSL_CTX_set_options(ctx,SSL_OP_ALL|0); + +- SSL_CTX_set_default_verify_paths(ctx); +- SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL); ++ SSL_CTX_set_default_verify_paths(ctx); ++ SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL); ++ } + + RETVAL = ctx; + |