summaryrefslogtreecommitdiff
path: root/x11
diff options
context:
space:
mode:
authorgutteridge <gutteridge@pkgsrc.org>2022-01-14 01:59:59 +0000
committergutteridge <gutteridge@pkgsrc.org>2022-01-14 01:59:59 +0000
commit5e6f6114cc7325ad677a65ccfe4752a24f7f27dc (patch)
tree6973219107a0ded1905962be4d39056efd9eee1b /x11
parentd29c0eeacc6d10bd74cbc984ae2db6dcb25a67f9 (diff)
downloadpkgsrc-5e6f6114cc7325ad677a65ccfe4752a24f7f27dc.tar.gz
libXdmcp: fix builds with Solaris 11.3
There are circumstances where getentropy() exists but arc4random_buf() does not, as reported to be the case with Solaris 11.3 in PR pkg/54628, report and analysis by Sad Clouds.
Diffstat (limited to 'x11')
-rw-r--r--x11/libXdmcp/distinfo3
-rw-r--r--x11/libXdmcp/patches/patch-Key.c18
2 files changed, 20 insertions, 1 deletions
diff --git a/x11/libXdmcp/distinfo b/x11/libXdmcp/distinfo
index b6bcba01fb7..f7d09e3b076 100644
--- a/x11/libXdmcp/distinfo
+++ b/x11/libXdmcp/distinfo
@@ -1,5 +1,6 @@
-$NetBSD: distinfo,v 1.10 2021/10/26 11:34:05 nia Exp $
+$NetBSD: distinfo,v 1.11 2022/01/14 01:59:59 gutteridge Exp $
BLAKE2s (libXdmcp-1.1.3.tar.bz2) = a830d9b0484d17db15080be824ba9f9819ea08c56fe07670c2bd2e17fafc2386
SHA512 (libXdmcp-1.1.3.tar.bz2) = cb1d4650f97d66e73acd2465ec7d757b9b797cce2f85e301860a44997a461837eea845ec9bd5b639ec5ca34c804f8bdd870697a5ce3f4e270b687c9ef74f25ec
Size (libXdmcp-1.1.3.tar.bz2) = 332795 bytes
+SHA1 (patch-Key.c) = 6cc4fbc4f7407affa9a604887f15890f9d21ee89
diff --git a/x11/libXdmcp/patches/patch-Key.c b/x11/libXdmcp/patches/patch-Key.c
new file mode 100644
index 00000000000..6cc30c11e02
--- /dev/null
+++ b/x11/libXdmcp/patches/patch-Key.c
@@ -0,0 +1,18 @@
+$NetBSD: patch-Key.c,v 1.1 2022/01/14 02:00:00 gutteridge Exp $
+
+Fix builds where getentropy() exists but arc4random_buf() does not, as
+reported to be the case with Solaris 11.3 in PR pkg/54628.
+
+--- Key.c.orig 2019-03-16 16:21:22.000000000 +0000
++++ Key.c
+@@ -64,6 +64,10 @@ getbits (long data, unsigned char *dst)
+
+ #ifndef HAVE_ARC4RANDOM_BUF
+
++#ifdef HAVE_GETENTROPY
++#include <sys/random.h>
++#endif
++
+ static void
+ insecure_getrandom_buf (unsigned char *auth, int len)
+ {