pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/lang/ruby18-base Fix build problem with recent NetBSD ...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/9907812c690b
branches:  trunk
changeset: 542371:9907812c690b
user:      taca <taca%pkgsrc.org@localhost>
date:      Wed May 14 10:08:59 2008 +0000

description:
Fix build problem with recent NetBSD current with post version
of OpenSSL 0.9.8g.

Since this is fix for build problem only, I don't bump PKGREVISION.

diffstat:

 lang/ruby18-base/distinfo         |   5 +-
 lang/ruby18-base/patches/patch-de |  27 +++++++++++
 lang/ruby18-base/patches/patch-df |  94 +++++++++++++++++++++++++++++++++++++++
 lang/ruby18-base/patches/patch-dg |  26 ++++++++++
 4 files changed, 151 insertions(+), 1 deletions(-)

diffs (175 lines):

diff -r 8cf603929520 -r 9907812c690b lang/ruby18-base/distinfo
--- a/lang/ruby18-base/distinfo Wed May 14 08:05:43 2008 +0000
+++ b/lang/ruby18-base/distinfo Wed May 14 10:08:59 2008 +0000
@@ -1,4 +1,4 @@
-$NetBSD: distinfo,v 1.26 2008/03/09 13:31:18 taca Exp $
+$NetBSD: distinfo,v 1.27 2008/05/14 10:08:59 taca Exp $
 
 SHA1 (ruby-1.8.6-p114.tar.bz2) = 9929782935ebb77d040593a010b8d65b03ce6e23
 RMD160 (ruby-1.8.6-p114.tar.bz2) = 332d6e98ef79ad8175ce699ed5293407763f769f
@@ -7,3 +7,6 @@
 SHA1 (patch-ab) = 973e36950d5b497c7283b928153e9f0ae9fe023e
 SHA1 (patch-ac) = eb4dd068729ba2a2c7d4d659f6bcdb1410227f3b
 SHA1 (patch-ad) = f58380acbde2cd346b622b1a547a2840c61cee1f
+SHA1 (patch-de) = 716dadc9042f81fe16a183fe03b2a63ec2598212
+SHA1 (patch-df) = 0ea1f97ad998361172f78d5cb0e1d0a5f1501b24
+SHA1 (patch-dg) = e79566ded3c82e63357966e961d7dcdfb84a03cf
diff -r 8cf603929520 -r 9907812c690b lang/ruby18-base/patches/patch-de
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/lang/ruby18-base/patches/patch-de Wed May 14 10:08:59 2008 +0000
@@ -0,0 +1,27 @@
+$NetBSD: patch-de,v 1.1 2008/05/14 10:09:00 taca Exp $
+
+--- ext/openssl/openssl_missing.c.orig 2007-02-13 08:01:19.000000000 +0900
++++ ext/openssl/openssl_missing.c
+@@ -22,17 +22,15 @@
+ #include "openssl_missing.h"
+ 
+ #if !defined(HAVE_HMAC_CTX_COPY)
+-int
++void
+ HMAC_CTX_copy(HMAC_CTX *out, HMAC_CTX *in)
+ {
+-    if (!out || !in) return 0;
++    if (!out || !in) return;
+     memcpy(out, in, sizeof(HMAC_CTX));
+ 
+-    if (!EVP_MD_CTX_copy(&out->md_ctx, &in->md_ctx)
+-          || !EVP_MD_CTX_copy(&out->i_ctx, &in->i_ctx)
+-          || !EVP_MD_CTX_copy(&out->o_ctx, &in->o_ctx))
+-      return 0;
+-    return 1;
++    EVP_MD_CTX_copy(&out->md_ctx, &in->md_ctx);
++    EVP_MD_CTX_copy(&out->i_ctx, &in->i_ctx);
++    EVP_MD_CTX_copy(&out->o_ctx, &in->o_ctx);
+ }
+ #endif /* HAVE_HMAC_CTX_COPY */
+ #endif /* NO_HMAC */
diff -r 8cf603929520 -r 9907812c690b lang/ruby18-base/patches/patch-df
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/lang/ruby18-base/patches/patch-df Wed May 14 10:08:59 2008 +0000
@@ -0,0 +1,94 @@
+$NetBSD: patch-df,v 1.1 2008/05/14 10:09:00 taca Exp $
+
+--- ext/openssl/openssl_missing.h.orig 2007-02-13 08:01:19.000000000 +0900
++++ ext/openssl/openssl_missing.h
+@@ -56,14 +56,33 @@ extern "C" {
+       (char *(*)())d2i_PKCS7_RECIP_INFO, (char *)ri)
+ #endif
+ 
++#if !defined(HAVE_EVP_MD_CTX_INIT)
+ void HMAC_CTX_init(HMAC_CTX *ctx);
+-int HMAC_CTX_copy(HMAC_CTX *out, HMAC_CTX *in);
++#endif
++
++#if !defined(HAVE_HMAC_CTX_COPY)
++void HMAC_CTX_copy(HMAC_CTX *out, HMAC_CTX *in);
++#endif
++
++#if !defined(HAVE_HMAC_CTX_CLEANUP)
+ void HMAC_CTX_cleanup(HMAC_CTX *ctx);
++#endif
+ 
++#if !defined(HAVE_EVP_MD_CTX_CREATE)
+ EVP_MD_CTX *EVP_MD_CTX_create(void);
++#endif
++
++#if !defined(HAVE_EVP_MD_CTX_INIT)
+ void EVP_MD_CTX_init(EVP_MD_CTX *ctx);
++#endif
++
++#if !defined(HAVE_EVP_MD_CTX_CLEANUP)
+ int EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx);
++#endif
++
++#if !defined(HAVE_EVP_MD_CTX_DESTROY)
+ void EVP_MD_CTX_destroy(EVP_MD_CTX *ctx);
++#endif
+ 
+ #if !defined(HAVE_EVP_CIPHER_CTX_COPY)
+ int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *out, EVP_CIPHER_CTX *in);
+@@ -107,19 +126,54 @@ int EVP_CIPHER_CTX_copy(EVP_CIPHER_CTX *
+ #define OPENSSL_cleanse(p, l) memset(p, 0, l)
+ #endif
+ 
++#if !defined(HAVE_X509_STORE_SET_EX_DATA)
+ void *X509_STORE_get_ex_data(X509_STORE *str, int idx);
+ int X509_STORE_set_ex_data(X509_STORE *str, int idx, void *data);
++#endif
++
++#if !defined(HAVE_X509_CRL_SET_VERSION)
+ int X509_CRL_set_version(X509_CRL *x, long version);
++#endif
++
++#if !defined(HAVE_X509_CRL_SET_ISSUER_NAME)
+ int X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name);
++#endif
++
++#if !defined(HAVE_X509_CRL_SORT)
+ int X509_CRL_sort(X509_CRL *c);
++#endif
++
++#if !defined(HAVE_X509_CRL_ADD0_REVOKED)
+ int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev);
++#endif
++
++#if !defined(HAVE_BN_MOD_SQR)
+ int BN_mod_sqr(BIGNUM *r, const BIGNUM *a, const BIGNUM *m, BN_CTX *ctx);
++#endif
++
++#if !defined(HAVE_BN_MOD_ADD)
+ int BN_mod_add(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx);
++#endif
++
++#if !defined(HAVE_BN_MOD_SUB)
+ int BN_mod_sub(BIGNUM *r, const BIGNUM *a, const BIGNUM *b, const BIGNUM *m, BN_CTX *ctx);
++#endif
++
++#if !defined(HAVE_BN_RAND_RANGE)
+ int BN_rand_range(BIGNUM *r, BIGNUM *range);
++#endif
++
++#if !defined(HAVE_BN_PSEUDO_RAND_RANGE)
+ int BN_pseudo_rand_range(BIGNUM *r, BIGNUM *range);
++#endif
++
++#if !defined(HAVE_CONF_GET1_DEFAULT_CONFIG_FILE)
+ char *CONF_get1_default_config_file(void);
++#endif
++
++#if !defined(HAVE_PEM_DEF_CALLBACK)
+ int PEM_def_callback(char *buf, int num, int w, void *key);
++#endif
+ 
+ #if defined(__cplusplus)
+ }
diff -r 8cf603929520 -r 9907812c690b lang/ruby18-base/patches/patch-dg
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/lang/ruby18-base/patches/patch-dg Wed May 14 10:08:59 2008 +0000
@@ -0,0 +1,26 @@
+$NetBSD: patch-dg,v 1.3 2008/05/14 10:09:00 taca Exp $
+
+--- ext/openssl/ossl_hmac.c.orig       2007-03-12 13:12:32.000000000 +0900
++++ ext/openssl/ossl_hmac.c
+@@ -81,9 +81,7 @@ ossl_hmac_copy(VALUE self, VALUE other)
+     GetHMAC(self, ctx1);
+     SafeGetHMAC(other, ctx2);
+ 
+-    if (!HMAC_CTX_copy(ctx1, ctx2)) {
+-      ossl_raise(eHMACError, NULL);
+-    }
++    HMAC_CTX_copy(ctx1, ctx2);
+     return self;
+ }
+ 
+@@ -104,9 +102,7 @@ hmac_final(HMAC_CTX *ctx, char **buf, in
+ {
+     HMAC_CTX final;
+ 
+-    if (!HMAC_CTX_copy(&final, ctx)) {
+-      ossl_raise(eHMACError, NULL);
+-    }
++    HMAC_CTX_copy(&final, ctx);
+     if (!(*buf = OPENSSL_malloc(HMAC_size(&final)))) {
+       HMAC_CTX_cleanup(&final);
+       OSSL_Debug("Allocating %d mem", HMAC_size(&final));



Home | Main Index | Thread Index | Old Index