On Thu, Jan 05, 2017 at 11:10:37PM +0100, Alexander Bluhm wrote:
> On Wed, Jan 04, 2017 at 05:53:30PM +0100, Alexander Bluhm wrote:
> > Net-SSLeay 1.79 provides a function RSA_get_key_parameters() that
> > only works with OpenSSL < 1.1.  As it works also with our LibreSSL,
> > I have added a #ifdef for that.
> >
> > Now Net::SSLeay checks for #ifndef OPENSSL_NO_COMP.  So the sub
> > Net::SSLeay::COMP_add_compression_method() does not exists anymore.
> > I think this is intensional as LibreSSL says "no compression is
> > also a feature of libressl".
> 
> Net::SSLeay has been updated to 1.80 to resolve the issue with
> IO::Socket::SSL.  Patch for LibreSSL remains the same.
> 
> ok?

The reverse dependency tests seem unaffected by the update.
(p5-Event-RPC tests still hang, which made testing take a while)

IO-Socket-SSL has a test that fails for me.

t/verify_fingerprint.t ............
Dubious, test returned 6 (wstat 1536, 0x600)
Failed 6/13 subtests


as does p5-Net_SSLEay 

t/local/07_sslecho.t ...................                          
Dubious, test returned 4 (wstat 1024, 0x400)                              
Failed 12/78 subtests                                                           


However, that's apparently just me as the existing versions also fail.

OK afresh1@




> Index: security/p5-Net_SSLeay/Makefile
> ===================================================================
> RCS file: /data/mirror/openbsd/cvs/ports/security/p5-Net_SSLeay/Makefile,v
> retrieving revision 1.63
> diff -u -p -r1.63 Makefile
> --- security/p5-Net_SSLeay/Makefile   16 Aug 2016 16:34:07 -0000      1.63
> +++ security/p5-Net_SSLeay/Makefile   5 Jan 2017 20:58:43 -0000
> @@ -2,7 +2,7 @@
>  
>  COMMENT =            perl module for using OpenSSL
>  
> -DISTNAME =           Net-SSLeay-1.78
> +DISTNAME =           Net-SSLeay-1.80
>  
>  CATEGORIES =         security
>  
> Index: security/p5-Net_SSLeay/distinfo
> ===================================================================
> RCS file: /data/mirror/openbsd/cvs/ports/security/p5-Net_SSLeay/distinfo,v
> retrieving revision 1.40
> diff -u -p -r1.40 distinfo
> --- security/p5-Net_SSLeay/distinfo   16 Aug 2016 16:34:07 -0000      1.40
> +++ security/p5-Net_SSLeay/distinfo   5 Jan 2017 20:58:49 -0000
> @@ -1,2 +1,2 @@
> -SHA256 (Net-SSLeay-1.78.tar.gz) = 
> 5/VkJ2AviXRGATuEuf9RuOirT84LvQhsTijBmKlC7VM=
> -SIZE (Net-SSLeay-1.78.tar.gz) = 394554
> +SHA256 (Net-SSLeay-1.80.tar.gz) = 
> pUGmbVn8X5u3rwnToLaDBeTEO6lIixKRVyj9KC6gG5M=
> +SIZE (Net-SSLeay-1.80.tar.gz) = 395820
> Index: security/p5-Net_SSLeay/patches/patch-SSLeay_xs
> ===================================================================
> RCS file: security/p5-Net_SSLeay/patches/patch-SSLeay_xs
> diff -N security/p5-Net_SSLeay/patches/patch-SSLeay_xs
> --- /dev/null 1 Jan 1970 00:00:00 -0000
> +++ security/p5-Net_SSLeay/patches/patch-SSLeay_xs    5 Jan 2017 21:01:35 
> -0000
> @@ -0,0 +1,12 @@
> +$OpenBSD$
> +--- SSLeay.xs.orig   Wed Jan  4 22:39:08 2017
> ++++ SSLeay.xs        Thu Jan  5 22:01:15 2017
> +@@ -4989,7 +4989,7 @@ RSA_generate_key(bits,e,perl_cb=&PL_sv_undef,perl_data
> + 
> + #endif
> + 
> +-#if OPENSSL_VERSION_NUMBER < 0x10100000L
> ++#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
> + 
> + void
> + RSA_get_key_parameters(rsa)
> Index: security/p5-Net_SSLeay/patches/patch-t_local_33_x509_create_cert_t
> ===================================================================
> RCS file: security/p5-Net_SSLeay/patches/patch-t_local_33_x509_create_cert_t
> diff -N security/p5-Net_SSLeay/patches/patch-t_local_33_x509_create_cert_t
> --- /dev/null 1 Jan 1970 00:00:00 -0000
> +++ security/p5-Net_SSLeay/patches/patch-t_local_33_x509_create_cert_t        
> 4 Jan 2017 18:26:41 -0000
> @@ -0,0 +1,28 @@
> +$OpenBSD$
> +--- t/local/33_x509_create_cert.t.orig       Tue Nov  1 22:46:12 2016
> ++++ t/local/33_x509_create_cert.t    Wed Jan  4 17:39:35 2017
> +@@ -2,7 +2,7 @@
> + 
> + use strict;
> + use warnings;
> +-use Test::More tests => 122;
> ++use Test::More tests => 123;
> + use Net::SSLeay qw/MBSTRING_ASC MBSTRING_UTF8 EVP_PK_RSA EVP_PKT_SIGN 
> EVP_PKT_ENC/;
> + use File::Spec;
> + use utf8;
> +@@ -32,9 +32,12 @@ is(Net::SSLeay::X509_NAME_cmp($ca_issuer, $ca_subject)
> +   ok(my $rsa = Net::SSLeay::RSA_generate_key(2048, &Net::SSLeay::RSA_F4), 
> "RSA_generate_key");
> +   ok(Net::SSLeay::EVP_PKEY_assign_RSA($pk,$rsa), "EVP_PKEY_assign_RSA");
> + 
> +-# ONly in pre 1.1:
> +-#  my @params = Net::SSLeay::RSA_get_key_parameters($rsa);
> +-#  ok(@params == 8, "RSA_get_key_parameters");
> ++  SKIP: {
> ++    skip 'openssl<1.1.0 required', 1 unless Net::SSLeay::SSLeay < 0x10100000
> ++    or Net::SSLeay::constant("LIBRESSL_VERSION_NUMBER");
> ++    my @params = Net::SSLeay::RSA_get_key_parameters($rsa);
> ++    ok(@params == 8, "RSA_get_key_parameters");
> ++  }
> + 
> +   ok(my $x509  = Net::SSLeay::X509_new(), "X509_new");
> +   ok(Net::SSLeay::X509_set_pubkey($x509,$pk), "X509_set_pubkey");
> 

-- 
andrew - http://afresh1.com

Computer hackers do it all night long.

Reply via email to