From nobody Sun Aug 07 14:49:51 2022 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4M12L73pNCz4Y6xg; Sun, 7 Aug 2022 14:49:51 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4M12L73GfHz3bl9; Sun, 7 Aug 2022 14:49:51 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1659883791; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mX1WY/+gkcEbaQuy2g7RfxBvuI4G30ZaBwpmS1zqTug=; b=GZW1lRSfNbsVEHE2UnfvIQS/F53iNsFQx2GUgJ4rS6gNvTn1Sc73sgdnbks0OK4QkUzJ0X jXdVDpEXBqvfkbl45+YojLDMlwrkCAAgiKCApqNg2AKo0MGh3bnFiwKE/Ju5zU2ySZCrej pTbdrx+o8+47BHOLnWC1M/OL7SBVShKP7XkwAhRnpFZL1B/29jXozrIG+oVJpaQEf4qObJ RpoMf9Qt0qWmvE6Xgy/K584dyWgT6rp/wtC+uugKpYx0Ewg8K35g1sSpfEKV+inCuys8dj xp233suF1F4m4qcMKX1JhhBcOklRkuDKOwYjncAaQdJj/RbxEOi0b6SCb9xRqw== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4M12L727WrzGfT; Sun, 7 Aug 2022 14:49:51 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 277EnpKI087836; Sun, 7 Aug 2022 14:49:51 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 277EnpGi087835; Sun, 7 Aug 2022 14:49:51 GMT (envelope-from git) Date: Sun, 7 Aug 2022 14:49:51 GMT Message-Id: <202208071449.277EnpGi087835@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Bernard Spil Subject: git: d9f50fb705d2 - main - dns/ldns: Fix patch from previous commit List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-main@freebsd.org X-BeenThere: dev-commits-ports-main@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: brnrd X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: d9f50fb705d29d73171e318eec7226bfd54e0da6 Auto-Submitted: auto-generated ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1659883791; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mX1WY/+gkcEbaQuy2g7RfxBvuI4G30ZaBwpmS1zqTug=; b=ZVNzZNw/uMdLjFQIS5nIxRsl74ZA23dy4Ru8FHaJvDLyTE7xfHoTG1XvMsiLTlKWy2oMaV Xe4sOMYRUHO5MnzN2eyKoiqAoRT/K35cNuBGi5bD8GDU4NsHCcNU/5o/R9un9bL7LjOBac v7ypaHkB8+4YSxfFV9itDgqdrRGqadnGgrewK3k1jrcI0MRSZ6J/18Yzj0NUj3YjYwo3Cc fqfS1WVQLVDfJUbY0po8lsvqWg+WlN7LTXat5abFLdDg6EbDNoHCrQWfQ2Jm75U0tFohL6 Ppu3+D345xTazLx4v6852iJ0CIVkzGHy7UK9UCM3mtEDlDT2WW78f6zmVoM5wQ== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1659883791; a=rsa-sha256; cv=none; b=HIFfl4ZcDHed54fMM7/dSsmurrSIaHB02MYeFEg+JXrADx4Xxy46ApBYEBm84vGBUYeIkf mE7Y+wgGwYezYabv+2MTJT9XbaFyJly7IKHf5tF2mc/d8C2jk9yNIKal0k+px7jVM0LI+H jF/c35w6dZED3AojyNvK1w6jIYa5wptNj/IIUK6xkKdpwoKjl7K8FWwIPuDp2WM8PbAKMh HRugW8kCSe2C+PKXbhTYMZG9TNlq0j1xx9SgZkcMdQJqcuxw/YStSGqwmJuE4z3vBcQgED TbCQB9qcAxa7+8+hG9ddQou60/uX4Q0Lv763lIw5fsCyYJMIby0v2w3uJ41ZEw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by brnrd: URL: https://cgit.FreeBSD.org/ports/commit/?id=d9f50fb705d29d73171e318eec7226bfd54e0da6 commit d9f50fb705d29d73171e318eec7226bfd54e0da6 Author: Bernard Spil AuthorDate: 2022-08-07 14:49:09 +0000 Commit: Bernard Spil CommitDate: 2022-08-07 14:49:09 +0000 dns/ldns: Fix patch from previous commit Apologies... --- dns/ldns/files/patch-LibreSSL-3.5 | 190 ++++++++++++++++++-------------------- 1 file changed, 92 insertions(+), 98 deletions(-) diff --git a/dns/ldns/files/patch-LibreSSL-3.5 b/dns/ldns/files/patch-LibreSSL-3.5 index 57f721cc614b..240caba8f2b4 100644 --- a/dns/ldns/files/patch-LibreSSL-3.5 +++ b/dns/ldns/files/patch-LibreSSL-3.5 @@ -1,98 +1,92 @@ -diff --git a/dns/ldns/files/patch-LibreSSL-3.5 b/dns/ldns/files/patch-LibreSSL-3.5 -new file mode 100644 -index 000000000000..42af36a139eb ---- /dev/null -+++ b/dns/ldns/files/patch-LibreSSL-3.5 -@@ -0,0 +1,92 @@ -+From 887d618239312cc8c11e41c45492eee02a8f28a2 Mon Sep 17 00:00:00 2001 -+From: Theo Buehler -+Date: Tue, 11 Jan 2022 21:14:24 +0100 -+Subject: [PATCH] Use accessors for DSA and RSA objects -+ -+In the upcoming LibreSSL version 3.5, the DSA and RSA structs will -+become opaque, so we should use the OpenSSL 1.1 setters and getters -+to fix the build. The relevant API has been available since -+LibreSSL 2.7. The last LibreSSL version (2.6) not having these -+accessors was EOL late 2018, so no users should be affected by this -+change. -+--- -+ dnssec.c | 4 ++-- -+ host2str.c | 4 ++-- -+ keys.c | 6 +++--- -+ 3 files changed, 7 insertions(+), 7 deletions(-) -+ -+diff --git a/dnssec.c b/dnssec.c -+index 63fece52..fbaa518a 100644 -+--- dnssec.c.orig -++++ dnssec.c -+@@ -381,7 +381,7 @@ ldns_key_buf2dsa_raw(const unsigned char* key, size_t len) -+ BN_free(Y); -+ return NULL; -+ } -+-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) -++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) -+ #ifndef S_SPLINT_S -+ dsa->p = P; -+ dsa->q = Q; -+@@ -468,7 +468,7 @@ ldns_key_buf2rsa_raw(const unsigned char* key, size_t len) -+ BN_free(modulus); -+ return NULL; -+ } -+-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) -++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) -+ #ifndef S_SPLINT_S -+ rsa->n = modulus; -+ rsa->e = exponent; -+diff --git a/host2str.c b/host2str.c -+index a207a913..634c5676 100644 -+--- host2str.c.orig -++++ host2str.c -+@@ -2451,7 +2451,7 @@ ldns_key2buffer_str(ldns_buffer *output, const ldns_key *k) -+ const BIGNUM *n=NULL, *e=NULL, *d=NULL, -+ *p=NULL, *q=NULL, *dmp1=NULL, -+ *dmq1=NULL, *iqmp=NULL; -+-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) -++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) -+ n = rsa->n; -+ e = rsa->e; -+ d = rsa->d; -+@@ -2504,7 +2504,7 @@ ldns_key2buffer_str(ldns_buffer *output, const ldns_key *k) -+ if(1) { -+ const BIGNUM *p=NULL, *q=NULL, *g=NULL, -+ *priv_key=NULL, *pub_key=NULL; -+-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) -++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) -+ #ifndef S_SPLINT_S -+ p = dsa->p; -+ q = dsa->q; -+diff --git a/keys.c b/keys.c -+index 91a3dffd..78bea972 100644 -+--- keys.c.orig -++++ keys.c -+@@ -861,7 +861,7 @@ ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr) -+ } -+ #endif /* splint */ -+ -+-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) -++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) -+ # ifndef S_SPLINT_S -+ rsa->n = n; -+ rsa->e = e; -+@@ -982,7 +982,7 @@ ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr)) -+ } -+ #endif /* splint */ -+ -+-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) -++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) -+ # ifndef S_SPLINT_S -+ dsa->p = p; -+ dsa->q = q; -+@@ -1660,7 +1660,7 @@ ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size) -+ if (!k) { -+ return false; -+ } -+-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) -++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) -+ n = k->n; -+ e = k->e; -+ #else +From 887d618239312cc8c11e41c45492eee02a8f28a2 Mon Sep 17 00:00:00 2001 +From: Theo Buehler +Date: Tue, 11 Jan 2022 21:14:24 +0100 +Subject: [PATCH] Use accessors for DSA and RSA objects + +In the upcoming LibreSSL version 3.5, the DSA and RSA structs will +become opaque, so we should use the OpenSSL 1.1 setters and getters +to fix the build. The relevant API has been available since +LibreSSL 2.7. The last LibreSSL version (2.6) not having these +accessors was EOL late 2018, so no users should be affected by this +change. +--- + dnssec.c | 4 ++-- + host2str.c | 4 ++-- + keys.c | 6 +++--- + 3 files changed, 7 insertions(+), 7 deletions(-) + +diff --git a/dnssec.c b/dnssec.c +index 63fece52..fbaa518a 100644 +--- dnssec.c.orig ++++ dnssec.c +@@ -381,7 +381,7 @@ ldns_key_buf2dsa_raw(const unsigned char* key, size_t len) + BN_free(Y); + return NULL; + } +-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) ++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) + #ifndef S_SPLINT_S + dsa->p = P; + dsa->q = Q; +@@ -468,7 +468,7 @@ ldns_key_buf2rsa_raw(const unsigned char* key, size_t len) + BN_free(modulus); + return NULL; + } +-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) ++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) + #ifndef S_SPLINT_S + rsa->n = modulus; + rsa->e = exponent; +diff --git a/host2str.c b/host2str.c +index a207a913..634c5676 100644 +--- host2str.c.orig ++++ host2str.c +@@ -2451,7 +2451,7 @@ ldns_key2buffer_str(ldns_buffer *output, const ldns_key *k) + const BIGNUM *n=NULL, *e=NULL, *d=NULL, + *p=NULL, *q=NULL, *dmp1=NULL, + *dmq1=NULL, *iqmp=NULL; +-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) ++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) + n = rsa->n; + e = rsa->e; + d = rsa->d; +@@ -2504,7 +2504,7 @@ ldns_key2buffer_str(ldns_buffer *output, const ldns_key *k) + if(1) { + const BIGNUM *p=NULL, *q=NULL, *g=NULL, + *priv_key=NULL, *pub_key=NULL; +-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) ++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) + #ifndef S_SPLINT_S + p = dsa->p; + q = dsa->q; +diff --git a/keys.c b/keys.c +index 91a3dffd..78bea972 100644 +--- keys.c.orig ++++ keys.c +@@ -861,7 +861,7 @@ ldns_key_new_frm_fp_rsa_l(FILE *f, int *line_nr) + } + #endif /* splint */ + +-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) ++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) + # ifndef S_SPLINT_S + rsa->n = n; + rsa->e = e; +@@ -982,7 +982,7 @@ ldns_key_new_frm_fp_dsa_l(FILE *f, ATTR_UNUSED(int *line_nr)) + } + #endif /* splint */ + +-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) ++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) + # ifndef S_SPLINT_S + dsa->p = p; + dsa->q = q; +@@ -1660,7 +1660,7 @@ ldns_key_rsa2bin(unsigned char *data, RSA *k, uint16_t *size) + if (!k) { + return false; + } +-#if OPENSSL_VERSION_NUMBER < 0x10100000 || defined(HAVE_LIBRESSL) ++#if OPENSSL_VERSION_NUMBER < 0x10100000 || (defined(HAVE_LIBRESSL) && LIBRESSL_VERSION_NUMBER < 0x20700000) + n = k->n; + e = k->e; + #else