summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorabs <abs@pkgsrc.org>2006-08-22 22:04:51 +0000
committerabs <abs@pkgsrc.org>2006-08-22 22:04:51 +0000
commit6ef5f872af5276ff56012c14d64138add07d2f5d (patch)
treeecbc2730f46f87d8543e6d657e3e72ec510908cf /security
parentcfc48243e6d1c56624dba4676b563ff1c6ccb758 (diff)
downloadpkgsrc-6ef5f872af5276ff56012c14d64138add07d2f5d.tar.gz
Update p5-Crypt-SSLeay to 0.51nb7
For OpenSSL 0.9.8b SSLeay_add_all_algorithms() does not setup any algorithms, wheras SSL_library_init() does. The net result was that SSL_CTX_new() would return a NULL pointer causing a perl coredump in such cases as: my $request = HTTP::Request->new( "GET", 'https://<some_url>' ); my $ua = LWP::UserAgent->new; my $response = $ua->request($request); Tracking this down was an entire flaming evening and change of my life that I'm never going to get back, but at least my NetBSD-4 retail machines can now run NetBSD-4 built perl binaries again.
Diffstat (limited to 'security')
-rw-r--r--security/p5-Crypt-SSLeay/Makefile4
-rw-r--r--security/p5-Crypt-SSLeay/distinfo3
-rw-r--r--security/p5-Crypt-SSLeay/patches/patch-ab32
3 files changed, 36 insertions, 3 deletions
diff --git a/security/p5-Crypt-SSLeay/Makefile b/security/p5-Crypt-SSLeay/Makefile
index f97c44e4bdb..d0da97d0063 100644
--- a/security/p5-Crypt-SSLeay/Makefile
+++ b/security/p5-Crypt-SSLeay/Makefile
@@ -1,9 +1,9 @@
-# $NetBSD: Makefile,v 1.3 2006/08/15 12:30:58 abs Exp $
+# $NetBSD: Makefile,v 1.4 2006/08/22 22:04:51 abs Exp $
#
DISTNAME= Crypt-SSLeay-0.51
PKGNAME= p5-${DISTNAME}
-PKGREVISION= 6
+PKGREVISION= 7
SVR4_PKGNAME= p5csl
CATEGORIES= security perl5 www
MASTER_SITES= ${MASTER_SITE_PERL_CPAN:=Crypt/}
diff --git a/security/p5-Crypt-SSLeay/distinfo b/security/p5-Crypt-SSLeay/distinfo
index f8d1132306e..073dc21d95b 100644
--- a/security/p5-Crypt-SSLeay/distinfo
+++ b/security/p5-Crypt-SSLeay/distinfo
@@ -1,6 +1,7 @@
-$NetBSD: distinfo,v 1.1.1.1 2006/01/20 20:08:53 wiz Exp $
+$NetBSD: distinfo,v 1.2 2006/08/22 22:04:51 abs Exp $
SHA1 (Crypt-SSLeay-0.51.tar.gz) = dea8e37e2430e351688125f5a641d76f55dbe25c
RMD160 (Crypt-SSLeay-0.51.tar.gz) = 963ee2616742b3983a06eaee3059aafa9b866e0a
Size (Crypt-SSLeay-0.51.tar.gz) = 117555 bytes
SHA1 (patch-aa) = f79576ad49381a5fef228537502770f22ae00e41
+SHA1 (patch-ab) = 53b86b52c58f314ba87aa307a6dcceb9855bb70c
diff --git a/security/p5-Crypt-SSLeay/patches/patch-ab b/security/p5-Crypt-SSLeay/patches/patch-ab
new file mode 100644
index 00000000000..57f1123bb01
--- /dev/null
+++ b/security/p5-Crypt-SSLeay/patches/patch-ab
@@ -0,0 +1,32 @@
+$NetBSD: patch-ab,v 1.1 2006/08/22 22:04:51 abs Exp $
+
+--- SSLeay.xs.orig 2003-05-28 07:55:02.000000000 +0100
++++ SSLeay.xs
+@@ -107,7 +107,7 @@ SSL_CTX_new(packname, ssl_version)
+ int rand_bytes_read;
+
+ if(!bNotFirstTime) {
+- SSLeay_add_all_algorithms();
++ SSL_library_init();
+ SSL_load_error_strings();
+ ERR_load_crypto_strings();
+ bNotFirstTime = 1;
+@@ -130,10 +130,15 @@ SSL_CTX_new(packname, ssl_version)
+ /* v2 is the default */
+ ctx = SSL_CTX_new(SSLv2_client_method());
+ }
+- SSL_CTX_set_options(ctx,SSL_OP_ALL|0);
++ if (ctx == 0)
++ croak("SSL_CTX_new failed");
++ else
++ {
++ SSL_CTX_set_options(ctx,SSL_OP_ALL|0);
+
+- SSL_CTX_set_default_verify_paths(ctx);
+- SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
++ SSL_CTX_set_default_verify_paths(ctx);
++ SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
++ }
+
+ RETVAL = ctx;
+