Hi,

Here's a little revision bump for Gambit.

I've added '--enable-poll' flag to enable polling instead of select, this should
work better on BSD's.

Main point is the '--enable-openssl' flag. This is needed for Gambit to support
SSL connections. It needs small patch to make it work with libressl though.

How does this look?

Timo

Index: Makefile
===================================================================
RCS file: /cvs/ports/lang/gambit/Makefile,v
retrieving revision 1.31
diff -u -p -r1.31 Makefile
--- Makefile    5 Sep 2018 21:39:18 -0000       1.31
+++ Makefile    20 Sep 2018 18:19:02 -0000
@@ -5,6 +5,7 @@ COMMENT=        complete, efficient and reliabl
 V=             4.9.0
 DISTNAME=      gambit-v${V:S/./_/g}
 PKGNAME=       gambit-$V
+REVISION=      0
 API_V=         ${V:R:S/./0/}00${V:E}
 SUBST_VARS+=   API_V
 
@@ -28,7 +29,10 @@ CONFIGURE_ARGS+=--disable-cplusplus \
                --docdir=${PREFIX}/share/doc/gambit/ \
                --includedir=${PREFIX}/include/gambit/ \
                --libdir=${PREFIX}/lib/gambit/ \
-               --enable-c-opt="${CFLAGS}"
+               --enable-c-opt="${CFLAGS}" \
+               --enable-openssl \
+               --enable-poll
+
 CONFIGURE_ENV= CC=${CC} CXX=${CXX} CFLAGS="${CFLAGS}" CXXFLAGS="${CXXFLAGS}"
 
 MAKE_FILE=     ${WRKSRC}/makefile
Index: patches/patch-lib_os_io_c
===================================================================
RCS file: patches/patch-lib_os_io_c
diff -N patches/patch-lib_os_io_c
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ patches/patch-lib_os_io_c   20 Sep 2018 18:19:02 -0000
@@ -0,0 +1,37 @@
+$OpenBSD$
+
+Index: lib/os_io.c
+--- lib/os_io.c.orig
++++ lib/os_io.c
+@@ -4139,6 +4139,7 @@ ___SCMOBJ client_ca_path;)
+                                 SSL_CTX_set_options (c->tls_ctx,
+                                                      SSL_OP_NO_TLSv1)));
+         case 0x301:
++#ifndef LIBRESSL_VERSION_NUMBER
+           OPENSSL_CHECK_ERROR ((SSL_OP_NO_SSLv3 &
+                                 SSL_CTX_set_options (c->tls_ctx,
+                                                      SSL_OP_NO_SSLv3)));
+@@ -4147,6 +4148,7 @@ ___SCMOBJ client_ca_path;)
+                                 SSL_CTX_set_options (c->tls_ctx,
+                                                      SSL_OP_NO_SSLv2)));
+         case 0x200:
++#endif
+           break;
+         default:
+           return ___FIX(___TLS_WRONG_TLS_VERSION_ERR);
+@@ -4365,6 +4367,7 @@ ___SCMOBJ client_ca_path;)
+                                 SSL_CTX_set_options (c->tls_ctx,
+                                                      SSL_OP_NO_TLSv1)));
+         case 0x301:
++#ifndef LIBRESSL_VERSION_NUMBER
+           OPENSSL_CHECK_ERROR ((SSL_OP_NO_SSLv3 &
+                                 SSL_CTX_set_options (c->tls_ctx,
+                                                      SSL_OP_NO_SSLv3)));
+@@ -4373,6 +4376,7 @@ ___SCMOBJ client_ca_path;)
+                                 SSL_CTX_set_options (c->tls_ctx,
+                                                      SSL_OP_NO_SSLv2)));
+         case 0x200:
++#endif
+           break;
+         default:
+           ___release_rc_tls_context (c);

Reply via email to