pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/mail/openarc



Module Name:    pkgsrc
Committed By:   ryoon
Date:           Mon Jun 16 16:17:05 UTC 2025

Modified Files:
        pkgsrc/mail/openarc: Makefile distinfo
        pkgsrc/mail/openarc/patches: patch-libopenarc_arc.c

Log Message:
mail/openarc: Do not fail validation of emails from Microsoft email services

* Do not fail when t= is not available.
* Bump PKGREVISION.


To generate a diff of this commit:
cvs rdiff -u -r1.4 -r1.5 pkgsrc/mail/openarc/Makefile
cvs rdiff -u -r1.2 -r1.3 pkgsrc/mail/openarc/distinfo
cvs rdiff -u -r1.1 -r1.2 pkgsrc/mail/openarc/patches/patch-libopenarc_arc.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/mail/openarc/Makefile
diff -u pkgsrc/mail/openarc/Makefile:1.4 pkgsrc/mail/openarc/Makefile:1.5
--- pkgsrc/mail/openarc/Makefile:1.4    Tue Oct 24 22:09:47 2023
+++ pkgsrc/mail/openarc/Makefile        Mon Jun 16 16:17:05 2025
@@ -1,7 +1,7 @@
-# $NetBSD: Makefile,v 1.4 2023/10/24 22:09:47 wiz Exp $
+# $NetBSD: Makefile,v 1.5 2025/06/16 16:17:05 ryoon Exp $
 
 DISTNAME=      openarc-20180921
-PKGREVISION=   2
+PKGREVISION=   3
 CATEGORIES=    mail
 MASTER_SITES=  ${MASTER_SITE_GITHUB:=trusteddomainproject/}
 GITHUB_PROJECT=        OpenARC

Index: pkgsrc/mail/openarc/distinfo
diff -u pkgsrc/mail/openarc/distinfo:1.2 pkgsrc/mail/openarc/distinfo:1.3
--- pkgsrc/mail/openarc/distinfo:1.2    Wed Apr 26 15:01:22 2023
+++ pkgsrc/mail/openarc/distinfo        Mon Jun 16 16:17:05 2025
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.2 2023/04/26 15:01:22 wiz Exp $
+$NetBSD: distinfo,v 1.3 2025/06/16 16:17:05 ryoon Exp $
 
 BLAKE2s (openarc-20180921-355ee2a1ca85acccce494478991983b54f794f4e.tar.gz) = bea742cd9cab422b17296d3d90e5fcf025a6d59e6d02b60c2c3fbda7caa72d11
 SHA512 (openarc-20180921-355ee2a1ca85acccce494478991983b54f794f4e.tar.gz) = 
edf006b4c8312ea93f478a228a498cd00394c9ec9682cd918e15629ef77974c530033a2de466d7e3d30eefa5d0ad12514f18a914fb69ccfc4b8306ee147c917c
 Size (openarc-20180921-355ee2a1ca85acccce494478991983b54f794f4e.tar.gz) = 150982 bytes
-SHA1 (patch-libopenarc_arc.c) = 70a7a061f9a6dd5e9b63c3681d6b3f9233b5e97a
+SHA1 (patch-libopenarc_arc.c) = 2dc1206ce9cf0ba9f85710ce3342c05efbf89dc1

Index: pkgsrc/mail/openarc/patches/patch-libopenarc_arc.c
diff -u pkgsrc/mail/openarc/patches/patch-libopenarc_arc.c:1.1 pkgsrc/mail/openarc/patches/patch-libopenarc_arc.c:1.2
--- pkgsrc/mail/openarc/patches/patch-libopenarc_arc.c:1.1      Fri Apr 21 00:49:56 2023
+++ pkgsrc/mail/openarc/patches/patch-libopenarc_arc.c  Mon Jun 16 16:17:05 2025
@@ -1,14 +1,23 @@
-$NetBSD: patch-libopenarc_arc.c,v 1.1 2023/04/21 00:49:56 manu Exp $
+$NetBSD: patch-libopenarc_arc.c,v 1.2 2025/06/16 16:17:05 ryoon Exp $
 
 Fix buffer overrun
 
 From upstream
 https://github.com/trusteddomainproject/OpenARC/pull/117
 
---- libopenarc/arc.c.orig      2021-03-30 15:33:39.683325974 +0200
-+++ libopenarc/arc.c   2021-03-30 15:34:50.693955186 +0200
-@@ -2329,8 +2329,12 @@
- 
+--- libopenarc/arc.c.orig      2018-09-21 15:51:23.000000000 +0000
++++ libopenarc/arc.c
+@@ -1664,8 +1664,7 @@ arc_process_set(ARC_MESSAGE *msg, arc_kv
+                   arc_param_get(set, (u_char *) "b") == NULL ||
+                   arc_param_get(set, (u_char *) "s") == NULL ||
+                   arc_param_get(set, (u_char *) "d") == NULL ||
+-                  arc_param_get(set, (u_char *) "a") == NULL ||
+-                  arc_param_get(set, (u_char *) "t") == NULL)
++                  arc_param_get(set, (u_char *) "a") == NULL)
+               {
+                       arc_error(msg, "missing parameter(s) in %s data",
+                                 settype);
+@@ -2330,6 +2329,10 @@ arc_parse_header_field(ARC_MESSAGE *msg,
        while (end > hdr && isascii(*(end - 1)) && isspace(*(end - 1)))
                end--;
  
@@ -19,9 +28,7 @@ https://github.com/trusteddomainproject/
        /* don't allow a field name containing a semicolon */
        semicolon = memchr(hdr, ';', hlen);
        if (semicolon != NULL && colon != NULL && semicolon < colon)
-               return ARC_STAT_SYNTAX;
-@@ -2676,8 +2680,9 @@
- 
+@@ -2677,6 +2680,7 @@ arc_eoh(ARC_MESSAGE *msg)
        for (h = msg->arc_hhead; h != NULL; h = h->hdr_next)
        {
                char hnbuf[ARC_MAXHEADER + 1];
@@ -29,4 +36,3 @@ https://github.com/trusteddomainproject/
  
                memset(hnbuf, '\0', sizeof hnbuf);
                strncpy(hnbuf, h->hdr_text, h->hdr_namelen);
-               if (strcasecmp(hnbuf, ARC_AR_HDRNAME) == 0 ||



Home | Main Index | Thread Index | Old Index