pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/p5-Crypt-SSLeay Update p5-Crypt-SSLeay to 0.5...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/e00f45085ad7
branches:  trunk
changeset: 517790:e00f45085ad7
user:      abs <abs%pkgsrc.org@localhost>
date:      Tue Aug 22 22:04:51 2006 +0000

description:
Update p5-Crypt-SSLeay to 0.51nb7
For OpenSSL 0.9.8b SSLeay_add_all_algorithms() does not setup any
algorithms, wheras SSL_library_init() does. The net result was that
SSL_CTX_new() would return a NULL pointer causing a perl coredump
in such cases as:

    my $request  = HTTP::Request->new( "GET", 'https://<some_url>' );
    my $ua       = LWP::UserAgent->new;
    my $response = $ua->request($request);

Tracking this down was an entire flaming evening and change of my
life that I'm never going to get back, but at least my NetBSD-4
retail machines can now run NetBSD-4 built perl binaries again.

diffstat:

 security/p5-Crypt-SSLeay/Makefile         |   4 +-
 security/p5-Crypt-SSLeay/distinfo         |   3 +-
 security/p5-Crypt-SSLeay/patches/patch-ab |  32 +++++++++++++++++++++++++++++++
 3 files changed, 36 insertions(+), 3 deletions(-)

diffs (63 lines):

diff -r a16f58edd11c -r e00f45085ad7 security/p5-Crypt-SSLeay/Makefile
--- a/security/p5-Crypt-SSLeay/Makefile Tue Aug 22 21:48:29 2006 +0000
+++ b/security/p5-Crypt-SSLeay/Makefile Tue Aug 22 22:04:51 2006 +0000
@@ -1,9 +1,9 @@
-# $NetBSD: Makefile,v 1.3 2006/08/15 12:30:58 abs Exp $
+# $NetBSD: Makefile,v 1.4 2006/08/22 22:04:51 abs Exp $
 #
 
 DISTNAME=      Crypt-SSLeay-0.51
 PKGNAME=       p5-${DISTNAME}
-PKGREVISION=   6
+PKGREVISION=   7
 SVR4_PKGNAME=  p5csl
 CATEGORIES=    security perl5 www
 MASTER_SITES=  ${MASTER_SITE_PERL_CPAN:=Crypt/}
diff -r a16f58edd11c -r e00f45085ad7 security/p5-Crypt-SSLeay/distinfo
--- a/security/p5-Crypt-SSLeay/distinfo Tue Aug 22 21:48:29 2006 +0000
+++ b/security/p5-Crypt-SSLeay/distinfo Tue Aug 22 22:04:51 2006 +0000
@@ -1,6 +1,7 @@
-$NetBSD: distinfo,v 1.1.1.1 2006/01/20 20:08:53 wiz Exp $
+$NetBSD: distinfo,v 1.2 2006/08/22 22:04:51 abs Exp $
 
 SHA1 (Crypt-SSLeay-0.51.tar.gz) = dea8e37e2430e351688125f5a641d76f55dbe25c
 RMD160 (Crypt-SSLeay-0.51.tar.gz) = 963ee2616742b3983a06eaee3059aafa9b866e0a
 Size (Crypt-SSLeay-0.51.tar.gz) = 117555 bytes
 SHA1 (patch-aa) = f79576ad49381a5fef228537502770f22ae00e41
+SHA1 (patch-ab) = 53b86b52c58f314ba87aa307a6dcceb9855bb70c
diff -r a16f58edd11c -r e00f45085ad7 security/p5-Crypt-SSLeay/patches/patch-ab
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/security/p5-Crypt-SSLeay/patches/patch-ab Tue Aug 22 22:04:51 2006 +0000
@@ -0,0 +1,32 @@
+$NetBSD: patch-ab,v 1.1 2006/08/22 22:04:51 abs Exp $
+
+--- SSLeay.xs.orig     2003-05-28 07:55:02.000000000 +0100
++++ SSLeay.xs
+@@ -107,7 +107,7 @@ SSL_CTX_new(packname, ssl_version)
+         int rand_bytes_read;
+ 
+       if(!bNotFirstTime) {
+-               SSLeay_add_all_algorithms();
++             SSL_library_init();
+                SSL_load_error_strings();
+                ERR_load_crypto_strings();
+              bNotFirstTime = 1;
+@@ -130,10 +130,15 @@ SSL_CTX_new(packname, ssl_version)
+               /* v2 is the default */
+               ctx = SSL_CTX_new(SSLv2_client_method());
+       }               
+-      SSL_CTX_set_options(ctx,SSL_OP_ALL|0);
++      if (ctx == 0)
++         croak("SSL_CTX_new failed");
++      else
++          {
++          SSL_CTX_set_options(ctx,SSL_OP_ALL|0);
+ 
+-      SSL_CTX_set_default_verify_paths(ctx);
+-      SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
++          SSL_CTX_set_default_verify_paths(ctx);
++          SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
++          }
+ 
+       RETVAL = ctx;
+ 



Home | Main Index | Thread Index | Old Index