diff options
author | gutteridge <gutteridge@pkgsrc.org> | 2022-01-14 01:59:59 +0000 |
---|---|---|
committer | gutteridge <gutteridge@pkgsrc.org> | 2022-01-14 01:59:59 +0000 |
commit | 5e6f6114cc7325ad677a65ccfe4752a24f7f27dc (patch) | |
tree | 6973219107a0ded1905962be4d39056efd9eee1b /x11 | |
parent | d29c0eeacc6d10bd74cbc984ae2db6dcb25a67f9 (diff) | |
download | pkgsrc-5e6f6114cc7325ad677a65ccfe4752a24f7f27dc.tar.gz |
libXdmcp: fix builds with Solaris 11.3
There are circumstances where getentropy() exists but arc4random_buf()
does not, as reported to be the case with Solaris 11.3 in PR pkg/54628,
report and analysis by Sad Clouds.
Diffstat (limited to 'x11')
-rw-r--r-- | x11/libXdmcp/distinfo | 3 | ||||
-rw-r--r-- | x11/libXdmcp/patches/patch-Key.c | 18 |
2 files changed, 20 insertions, 1 deletions
diff --git a/x11/libXdmcp/distinfo b/x11/libXdmcp/distinfo index b6bcba01fb7..f7d09e3b076 100644 --- a/x11/libXdmcp/distinfo +++ b/x11/libXdmcp/distinfo @@ -1,5 +1,6 @@ -$NetBSD: distinfo,v 1.10 2021/10/26 11:34:05 nia Exp $ +$NetBSD: distinfo,v 1.11 2022/01/14 01:59:59 gutteridge Exp $ BLAKE2s (libXdmcp-1.1.3.tar.bz2) = a830d9b0484d17db15080be824ba9f9819ea08c56fe07670c2bd2e17fafc2386 SHA512 (libXdmcp-1.1.3.tar.bz2) = cb1d4650f97d66e73acd2465ec7d757b9b797cce2f85e301860a44997a461837eea845ec9bd5b639ec5ca34c804f8bdd870697a5ce3f4e270b687c9ef74f25ec Size (libXdmcp-1.1.3.tar.bz2) = 332795 bytes +SHA1 (patch-Key.c) = 6cc4fbc4f7407affa9a604887f15890f9d21ee89 diff --git a/x11/libXdmcp/patches/patch-Key.c b/x11/libXdmcp/patches/patch-Key.c new file mode 100644 index 00000000000..6cc30c11e02 --- /dev/null +++ b/x11/libXdmcp/patches/patch-Key.c @@ -0,0 +1,18 @@ +$NetBSD: patch-Key.c,v 1.1 2022/01/14 02:00:00 gutteridge Exp $ + +Fix builds where getentropy() exists but arc4random_buf() does not, as +reported to be the case with Solaris 11.3 in PR pkg/54628. + +--- Key.c.orig 2019-03-16 16:21:22.000000000 +0000 ++++ Key.c +@@ -64,6 +64,10 @@ getbits (long data, unsigned char *dst) + + #ifndef HAVE_ARC4RANDOM_BUF + ++#ifdef HAVE_GETENTROPY ++#include <sys/random.h> ++#endif ++ + static void + insecure_getrandom_buf (unsigned char *auth, int len) + { |