following diff updates stunnel to the latest release. works here @amd64
it was slightly tested... so I'm looking for test reports, someone willing? OKs?

Index: Makefile
===================================================================
RCS file: /cvs/ports/security/stunnel/Makefile,v
retrieving revision 1.82
diff -u -p -r1.82 Makefile
--- Makefile    11 Mar 2016 20:28:31 -0000      1.82
+++ Makefile    22 Apr 2016 01:06:22 -0000
@@ -2,7 +2,7 @@
 
 COMMENT=       SSL encryption wrapper for standard network daemons
 
-DISTNAME=      stunnel-5.29
+DISTNAME=      stunnel-5.31
 CATEGORIES=    security
 
 MAINTAINER=    Gleydson Soares <gsoa...@openbsd.org>
Index: distinfo
===================================================================
RCS file: /cvs/ports/security/stunnel/distinfo,v
retrieving revision 1.39
diff -u -p -r1.39 distinfo
--- distinfo    13 Jan 2016 12:39:55 -0000      1.39
+++ distinfo    22 Apr 2016 01:06:22 -0000
@@ -1,2 +1,2 @@
-SHA256 (stunnel-5.29.tar.gz) = Q5CWJUA+pjT6fLg5nVj6+OfxHBt7KQl0kUaZUfVt9VE=
-SIZE (stunnel-5.29.tar.gz) = 637806
+SHA256 (stunnel-5.31.tar.gz) = p0a3GrPcbCPqyw2vc0JGeHDkOskzQwkF6xsdBQu64Lc=
+SIZE (stunnel-5.31.tar.gz) = 639381
cvs server: Diffing patches
Index: patches/patch-src_ctx_c
===================================================================
RCS file: /cvs/ports/security/stunnel/patches/patch-src_ctx_c,v
retrieving revision 1.2
diff -u -p -r1.2 patch-src_ctx_c
--- patches/patch-src_ctx_c     4 Dec 2015 01:38:56 -0000       1.2
+++ patches/patch-src_ctx_c     22 Apr 2016 01:06:22 -0000
@@ -1,7 +1,7 @@
 $OpenBSD: patch-src_ctx_c,v 1.2 2015/12/04 01:38:56 gsoares Exp $
---- src/ctx.c.orig     Mon Nov 30 11:15:43 2015
-+++ src/ctx.c  Thu Dec  3 19:26:54 2015
-@@ -351,7 +351,7 @@ NOEXPORT int ecdh_init(SERVICE_OPTIONS *section) {
+--- src/ctx.c.orig     Fri Feb 19 16:18:43 2016
++++ src/ctx.c  Thu Apr 21 21:59:31 2016
+@@ -363,7 +363,7 @@ NOEXPORT int ecdh_init(SERVICE_OPTIONS *section) {
  /**************************************** initialize OpenSSL CONF */
  
  NOEXPORT int conf_init(SERVICE_OPTIONS *section) {
Index: patches/patch-src_options_c
===================================================================
RCS file: /cvs/ports/security/stunnel/patches/patch-src_options_c,v
retrieving revision 1.5
diff -u -p -r1.5 patch-src_options_c
--- patches/patch-src_options_c 13 Jan 2016 12:39:55 -0000      1.5
+++ patches/patch-src_options_c 22 Apr 2016 01:06:22 -0000
@@ -3,9 +3,9 @@ $OpenBSD: patch-src_options_c,v 1.5 2016
 use SSLv23_client_method() required to build with libressl since that it 
haven't
 TLS_client_method()  for now.
 
---- src/options.c.orig Tue Jan  5 06:20:12 2016
-+++ src/options.c      Tue Jan 12 19:57:30 2016
-@@ -2559,7 +2559,7 @@ NOEXPORT char *parse_service_option(CMD cmd, SERVICE_O
+--- src/options.c.orig Fri Jan 15 13:45:23 2016
++++ src/options.c      Thu Apr 21 21:59:31 2016
+@@ -2579,7 +2579,7 @@ NOEXPORT char *parse_service_option(CMD cmd, SERVICE_O
      /* sslVersion */
      switch(cmd) {
      case CMD_BEGIN:
@@ -14,7 +14,7 @@ TLS_client_method()  for now.
          section->client_method=(SSL_METHOD *)TLS_client_method();
          section->server_method=(SSL_METHOD *)TLS_server_method();
  #else
-@@ -2571,7 +2571,7 @@ NOEXPORT char *parse_service_option(CMD cmd, SERVICE_O
+@@ -2591,7 +2591,7 @@ NOEXPORT char *parse_service_option(CMD cmd, SERVICE_O
          if(strcasecmp(opt, "sslVersion"))
              break;
          if(!strcasecmp(arg, "all")) {
Index: patches/patch-src_verify_c
===================================================================
RCS file: /cvs/ports/security/stunnel/patches/patch-src_verify_c,v
retrieving revision 1.2
diff -u -p -r1.2 patch-src_verify_c
--- patches/patch-src_verify_c  14 Oct 2015 02:05:06 -0000      1.2
+++ patches/patch-src_verify_c  22 Apr 2016 01:06:22 -0000
@@ -3,8 +3,8 @@ $OpenBSD: patch-src_verify_c,v 1.2 2015/
 disable OpenSSL 1.0.2 X509_check_* functions, so it can build with libressl.
 
 
---- src/verify.c.orig  Wed Sep 23 07:00:08 2015
-+++ src/verify.c       Tue Oct  6 05:52:42 2015
+--- src/verify.c.orig  Fri Feb 19 16:18:43 2016
++++ src/verify.c       Thu Apr 21 21:59:31 2016
 @@ -51,7 +51,7 @@ NOEXPORT int add_dir_lookup(X509_STORE *, char *);
  NOEXPORT int verify_callback(int, X509_STORE_CTX *);
  NOEXPORT int verify_checks(CLI *, int, X509_STORE_CTX *);
@@ -14,7 +14,7 @@ disable OpenSSL 1.0.2 X509_check_* funct
  NOEXPORT int cert_check_subject(CLI *, X509_STORE_CTX *);
  #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */
  NOEXPORT int cert_check_local(X509_STORE_CTX *);
-@@ -280,7 +280,7 @@ NOEXPORT int cert_check(CLI *c, X509_STORE_CTX *callba
+@@ -274,7 +274,7 @@ NOEXPORT int cert_check(CLI *c, X509_STORE_CTX *callba
      }
  
      if(depth==0) { /* additional peer certificate checks */
@@ -23,7 +23,7 @@ disable OpenSSL 1.0.2 X509_check_* funct
          if(!cert_check_subject(c, callback_ctx))
              return 0; /* reject */
  #endif /* OPENSSL_VERSION_NUMBER>=0x10002000L */
-@@ -291,7 +291,7 @@ NOEXPORT int cert_check(CLI *c, X509_STORE_CTX *callba
+@@ -285,7 +285,7 @@ NOEXPORT int cert_check(CLI *c, X509_STORE_CTX *callba
      return 1; /* accept */
  }
  

Reply via email to