Hi, I would like to update p5-Net-SSLeay, but there are compiler warnings about bad length checks. I have reported the bug upstream.
https://rt.cpan.org/Public/Bug/Display.html?id=92076 ok? bluhm Index: security/p5-Net_SSLeay/Makefile =================================================================== RCS file: /data/mirror/openbsd/cvs/ports/security/p5-Net_SSLeay/Makefile,v retrieving revision 1.45 diff -u -p -r1.45 Makefile --- security/p5-Net_SSLeay/Makefile 8 Jun 2013 22:04:54 -0000 1.45 +++ security/p5-Net_SSLeay/Makefile 12 Jan 2014 15:19:23 -0000 @@ -4,7 +4,7 @@ SHARED_ONLY = Yes COMMENT = perl module for using OpenSSL -DISTNAME = Net-SSLeay-1.55 +DISTNAME = Net-SSLeay-1.57 CATEGORIES = security Index: security/p5-Net_SSLeay/distinfo =================================================================== RCS file: /data/mirror/openbsd/cvs/ports/security/p5-Net_SSLeay/distinfo,v retrieving revision 1.26 diff -u -p -r1.26 distinfo --- security/p5-Net_SSLeay/distinfo 8 Jun 2013 22:04:54 -0000 1.26 +++ security/p5-Net_SSLeay/distinfo 12 Jan 2014 15:19:35 -0000 @@ -1,2 +1,2 @@ -SHA256 (Net-SSLeay-1.55.tar.gz) = jNXwlyLge05DYQLLOkuTYj11PBcWZcqXUsOzmmLqOnk= -SIZE (Net-SSLeay-1.55.tar.gz) = 394657 +SHA256 (Net-SSLeay-1.57.tar.gz) = Zg9CgzmC7rI8RfRtooYnw/79bv2zOjRIDbapJQVdxoI= +SIZE (Net-SSLeay-1.57.tar.gz) = 398797 Index: security/p5-Net_SSLeay/patches/patch-SSLeay_xs =================================================================== RCS file: security/p5-Net_SSLeay/patches/patch-SSLeay_xs diff -N security/p5-Net_SSLeay/patches/patch-SSLeay_xs --- /dev/null 1 Jan 1970 00:00:00 -0000 +++ security/p5-Net_SSLeay/patches/patch-SSLeay_xs 12 Jan 2014 15:50:44 -0000 @@ -0,0 +1,52 @@ +$OpenBSD$ +https://rt.cpan.org/Public/Bug/Display.html?id=92076 +--- SSLeay.xs.orig Tue Jan 7 08:28:35 2014 ++++ SSLeay.xs Sat Jan 11 18:53:52 2014 +@@ -780,8 +780,8 @@ int next_proto_helper_AV2protodata(AV * list, unsigned + if (last_index<0) return 0; + for(i=0; i<=last_index; i++) { + char *p = SvPV_nolen(*av_fetch(list, i, 0)); +- int len = strlen(p); +- if (len<0 || len>255) return 0; ++ size_t len = strlen(p); ++ if (len>255) return 0; + if (out) { + /* if out == NULL we only calculate the length of output */ + out[ptr] = (unsigned char)len; +@@ -811,7 +811,7 @@ int next_proto_select_cb_invoke(SSL *ssl, unsigned cha + { + SV *cb_func, *cb_data; + unsigned char *next_proto_data; +- unsigned char next_proto_len; ++ size_t next_proto_len; + int next_proto_status; + SSL_CTX *ctx = SSL_get_SSL_CTX(ssl); + STRLEN n_a; +@@ -941,7 +941,7 @@ int alpn_select_cb_invoke(SSL *ssl, const unsigned cha + { + SV *cb_func, *cb_data; + unsigned char *alpn_data; +- unsigned char alpn_len; ++ size_t alpn_len; + SSL_CTX *ctx = SSL_get_SSL_CTX(ssl); + STRLEN n_a; + +@@ -1010,7 +1010,8 @@ int alpn_select_cb_invoke(SSL *ssl, const unsigned cha + int pem_password_cb_invoke(char *buf, int bufsize, int rwflag, void *data) { + dSP; + char *str; +- int count = -1, str_len = 0; ++ int count = -1; ++ size_t str_len = 0; + simple_cb_data_t* cb = (simple_cb_data_t*)data; + STRLEN n_a; + +@@ -3252,7 +3253,7 @@ PEM_get_string_PrivateKey(pk,passwd=NULL,enc_alg=NULL) + BIO *bp; + int i, n; + char *buf; +- int passwd_len = 0; ++ size_t passwd_len = 0; + pem_password_cb * cb = NULL; + void * u = NULL; + CODE: