Hi,

I would like to update p5-Net-SSLeay, but there are compiler warnings
about bad length checks.  I have reported the bug upstream.

https://rt.cpan.org/Public/Bug/Display.html?id=92076

ok?

bluhm

Index: security/p5-Net_SSLeay/Makefile
===================================================================
RCS file: /data/mirror/openbsd/cvs/ports/security/p5-Net_SSLeay/Makefile,v
retrieving revision 1.45
diff -u -p -r1.45 Makefile
--- security/p5-Net_SSLeay/Makefile     8 Jun 2013 22:04:54 -0000       1.45
+++ security/p5-Net_SSLeay/Makefile     12 Jan 2014 15:19:23 -0000
@@ -4,7 +4,7 @@ SHARED_ONLY =           Yes
 
 COMMENT =              perl module for using OpenSSL
 
-DISTNAME =             Net-SSLeay-1.55
+DISTNAME =             Net-SSLeay-1.57
 
 CATEGORIES =           security
 
Index: security/p5-Net_SSLeay/distinfo
===================================================================
RCS file: /data/mirror/openbsd/cvs/ports/security/p5-Net_SSLeay/distinfo,v
retrieving revision 1.26
diff -u -p -r1.26 distinfo
--- security/p5-Net_SSLeay/distinfo     8 Jun 2013 22:04:54 -0000       1.26
+++ security/p5-Net_SSLeay/distinfo     12 Jan 2014 15:19:35 -0000
@@ -1,2 +1,2 @@
-SHA256 (Net-SSLeay-1.55.tar.gz) = jNXwlyLge05DYQLLOkuTYj11PBcWZcqXUsOzmmLqOnk=
-SIZE (Net-SSLeay-1.55.tar.gz) = 394657
+SHA256 (Net-SSLeay-1.57.tar.gz) = Zg9CgzmC7rI8RfRtooYnw/79bv2zOjRIDbapJQVdxoI=
+SIZE (Net-SSLeay-1.57.tar.gz) = 398797
Index: security/p5-Net_SSLeay/patches/patch-SSLeay_xs
===================================================================
RCS file: security/p5-Net_SSLeay/patches/patch-SSLeay_xs
diff -N security/p5-Net_SSLeay/patches/patch-SSLeay_xs
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ security/p5-Net_SSLeay/patches/patch-SSLeay_xs      12 Jan 2014 15:50:44 
-0000
@@ -0,0 +1,52 @@
+$OpenBSD$
+https://rt.cpan.org/Public/Bug/Display.html?id=92076
+--- SSLeay.xs.orig     Tue Jan  7 08:28:35 2014
++++ SSLeay.xs  Sat Jan 11 18:53:52 2014
+@@ -780,8 +780,8 @@ int next_proto_helper_AV2protodata(AV * list, unsigned
+     if (last_index<0) return 0;
+     for(i=0; i<=last_index; i++) {
+         char *p = SvPV_nolen(*av_fetch(list, i, 0));
+-        int len = strlen(p);
+-        if (len<0 || len>255) return 0;
++        size_t len = strlen(p);
++        if (len>255) return 0;
+         if (out) {
+             /* if out == NULL we only calculate the length of output */
+             out[ptr] = (unsigned char)len;
+@@ -811,7 +811,7 @@ int next_proto_select_cb_invoke(SSL *ssl, unsigned cha
+ {
+     SV *cb_func, *cb_data;
+     unsigned char *next_proto_data;
+-    unsigned char next_proto_len;
++    size_t next_proto_len;
+     int next_proto_status;
+     SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
+     STRLEN n_a;
+@@ -941,7 +941,7 @@ int alpn_select_cb_invoke(SSL *ssl, const unsigned cha
+ {
+     SV *cb_func, *cb_data;
+     unsigned char *alpn_data;
+-    unsigned char alpn_len;
++    size_t alpn_len;
+     SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
+     STRLEN n_a;
+ 
+@@ -1010,7 +1010,8 @@ int alpn_select_cb_invoke(SSL *ssl, const unsigned cha
+ int pem_password_cb_invoke(char *buf, int bufsize, int rwflag, void *data) {
+     dSP;
+     char *str;
+-    int count = -1, str_len = 0;
++    int count = -1;
++    size_t str_len = 0;
+     simple_cb_data_t* cb = (simple_cb_data_t*)data;
+     STRLEN n_a;
+ 
+@@ -3252,7 +3253,7 @@ PEM_get_string_PrivateKey(pk,passwd=NULL,enc_alg=NULL)
+         BIO *bp;
+         int i, n;
+         char *buf;
+-        int passwd_len = 0;
++        size_t passwd_len = 0;
+         pem_password_cb * cb = NULL;
+         void * u = NULL;
+     CODE:

Reply via email to