head 1.5; access; symbols pkgsrc-2017Q1:1.4.0.54 pkgsrc-2017Q1-base:1.4 pkgsrc-2016Q4:1.4.0.52 pkgsrc-2016Q4-base:1.4 pkgsrc-2016Q3:1.4.0.50 pkgsrc-2016Q3-base:1.4 pkgsrc-2016Q2:1.4.0.48 pkgsrc-2016Q2-base:1.4 pkgsrc-2016Q1:1.4.0.46 pkgsrc-2016Q1-base:1.4 pkgsrc-2015Q4:1.4.0.44 pkgsrc-2015Q4-base:1.4 pkgsrc-2015Q3:1.4.0.42 pkgsrc-2015Q3-base:1.4 pkgsrc-2015Q2:1.4.0.40 pkgsrc-2015Q2-base:1.4 pkgsrc-2015Q1:1.4.0.38 pkgsrc-2015Q1-base:1.4 pkgsrc-2014Q4:1.4.0.36 pkgsrc-2014Q4-base:1.4 pkgsrc-2014Q3:1.4.0.34 pkgsrc-2014Q3-base:1.4 pkgsrc-2014Q2:1.4.0.32 pkgsrc-2014Q2-base:1.4 pkgsrc-2014Q1:1.4.0.30 pkgsrc-2014Q1-base:1.4 pkgsrc-2013Q4:1.4.0.28 pkgsrc-2013Q4-base:1.4 pkgsrc-2013Q3:1.4.0.26 pkgsrc-2013Q3-base:1.4 pkgsrc-2013Q2:1.4.0.24 pkgsrc-2013Q2-base:1.4 pkgsrc-2013Q1:1.4.0.22 pkgsrc-2013Q1-base:1.4 pkgsrc-2012Q4:1.4.0.20 pkgsrc-2012Q4-base:1.4 pkgsrc-2012Q3:1.4.0.18 pkgsrc-2012Q3-base:1.4 pkgsrc-2012Q2:1.4.0.16 pkgsrc-2012Q2-base:1.4 pkgsrc-2012Q1:1.4.0.14 pkgsrc-2012Q1-base:1.4 pkgsrc-2011Q4:1.4.0.12 pkgsrc-2011Q4-base:1.4 pkgsrc-2011Q3:1.4.0.10 pkgsrc-2011Q3-base:1.4 pkgsrc-2011Q2:1.4.0.8 pkgsrc-2011Q2-base:1.4 pkgsrc-2011Q1:1.4.0.6 pkgsrc-2011Q1-base:1.4 pkgsrc-2010Q4:1.4.0.4 pkgsrc-2010Q4-base:1.4 pkgsrc-2010Q3:1.4.0.2 pkgsrc-2010Q3-base:1.4 pkgsrc-2010Q2:1.3.0.8 pkgsrc-2010Q2-base:1.3 pkgsrc-2010Q1:1.3.0.6 pkgsrc-2010Q1-base:1.3 pkgsrc-2009Q4:1.3.0.4 pkgsrc-2009Q4-base:1.3 pkgsrc-2009Q3:1.3.0.2 pkgsrc-2009Q3-base:1.3 pkgsrc-2008Q4:1.2.0.26 pkgsrc-2008Q4-base:1.2 pkgsrc-2008Q3:1.2.0.24 pkgsrc-2008Q3-base:1.2 cube-native-xorg:1.2.0.22 cube-native-xorg-base:1.2 pkgsrc-2008Q2:1.2.0.20 pkgsrc-2008Q2-base:1.2 pkgsrc-2008Q1:1.2.0.18 pkgsrc-2008Q1-base:1.2 pkgsrc-2007Q4:1.2.0.16 pkgsrc-2007Q4-base:1.2 pkgsrc-2007Q3:1.2.0.14 pkgsrc-2007Q3-base:1.2 pkgsrc-2007Q2:1.2.0.12 pkgsrc-2007Q2-base:1.2 pkgsrc-2007Q1:1.2.0.10 pkgsrc-2007Q1-base:1.2 pkgsrc-2006Q4:1.2.0.8 pkgsrc-2006Q4-base:1.2 pkgsrc-2006Q3:1.2.0.6 pkgsrc-2006Q3-base:1.2 pkgsrc-2006Q2:1.2.0.4 pkgsrc-2006Q2-base:1.2 pkgsrc-2006Q1:1.2.0.2 pkgsrc-2006Q1-base:1.2 pkgsrc-2005Q4:1.1.0.2 pkgsrc-2005Q4-base:1.1; locks; strict; comment @# @; 1.5 date 2017.04.22.18.23.55; author taca; state dead; branches; next 1.4; commitid tDoWtAVFTjPkJyOz; 1.4 date 2010.09.10.03.29.00; author taca; state Exp; branches; next 1.3; 1.3 date 2009.08.11.14.26.58; author taca; state Exp; branches; next 1.2; 1.2 date 2006.01.03.14.37.24; author taca; state dead; branches; next 1.1; 1.1 date 2005.11.02.08.56.40; author taca; state Exp; branches; next ; desc @@ 1.5 log @Remove ruby18 which is EOL almost 4 years ago. @ text @$NetBSD: patch-be,v 1.4 2010/09/10 03:29:00 taca Exp $ Suppress warnings. --- ext/openssl/ossl_cipher.c.orig 2010-05-24 23:58:49.000000000 +0000 +++ ext/openssl/ossl_cipher.c @@@@ -188,7 +188,7 @@@@ ossl_cipher_init(int argc, VALUE *argv, * We deprecated the arguments for this method, but we decided * keeping this behaviour for backward compatibility. */ - char *cname = rb_class2name(rb_obj_class(self)); + const char *cname = rb_class2name(rb_obj_class(self)); rb_warn("argumtents for %s#encrypt and %s#decrypt were deprecated; " "use %s#pkcs5_keyivgen to derive key and IV", cname, cname, cname); @@@@ -204,7 +204,7 @@@@ ossl_cipher_init(int argc, VALUE *argv, else memcpy(iv, RSTRING_PTR(init_v), sizeof(iv)); } EVP_BytesToKey(EVP_CIPHER_CTX_cipher(ctx), EVP_md5(), iv, - RSTRING_PTR(pass), RSTRING_LEN(pass), 1, key, NULL); + (unsigned char *)RSTRING_PTR(pass), RSTRING_LEN(pass), 1, key, NULL); p_key = key; p_iv = iv; } @@@@ -281,13 +281,13 @@@@ ossl_cipher_pkcs5_keyivgen(int argc, VAL StringValue(vsalt); if(RSTRING_LEN(vsalt) != PKCS5_SALT_LEN) rb_raise(eCipherError, "salt must be an 8-octet string"); - salt = RSTRING_PTR(vsalt); + salt = (unsigned char *)RSTRING_PTR(vsalt); } iter = NIL_P(viter) ? 2048 : NUM2INT(viter); digest = NIL_P(vdigest) ? EVP_md5() : GetDigestPtr(vdigest); GetCipher(self, ctx); EVP_BytesToKey(EVP_CIPHER_CTX_cipher(ctx), digest, salt, - RSTRING_PTR(vpass), RSTRING_LEN(vpass), iter, key, iv); + (unsigned char *)RSTRING_PTR(vpass), RSTRING_LEN(vpass), iter, key, iv); if (EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, -1) != 1) ossl_raise(eCipherError, NULL); OPENSSL_cleanse(key, sizeof key); @@@@ -309,7 +309,7 @@@@ ossl_cipher_pkcs5_keyivgen(int argc, VAL static VALUE ossl_cipher_update_deprecated(VALUE self, VALUE data) { - char *cname; + const char *cname; cname = rb_class2name(rb_obj_class(self)); rb_warning("%s#<< is deprecated; use %s#update instead", cname, cname); @@@@ -329,14 +329,14 @@@@ static VALUE ossl_cipher_update(int argc, VALUE *argv, VALUE self) { EVP_CIPHER_CTX *ctx; - char *in; + unsigned char *in; int in_len, out_len; VALUE data, str; rb_scan_args(argc, argv, "11", &data, &str); StringValue(data); - in = RSTRING_PTR(data); + in = (unsigned char *)RSTRING_PTR(data); if ((in_len = RSTRING_LEN(data)) == 0) rb_raise(rb_eArgError, "data must not be empty"); GetCipher(self, ctx); @@@@ -349,7 +349,7 @@@@ ossl_cipher_update(int argc, VALUE *argv rb_str_resize(str, out_len); } - if (!EVP_CipherUpdate(ctx, RSTRING_PTR(str), &out_len, in, in_len)) + if (!EVP_CipherUpdate(ctx, (unsigned char *)RSTRING_PTR(str), &out_len, in, in_len)) ossl_raise(eCipherError, NULL); assert(out_len < RSTRING_LEN(str)); rb_str_set_len(str, out_len); @@@@ -374,7 +374,7 @@@@ ossl_cipher_final(VALUE self) GetCipher(self, ctx); str = rb_str_new(0, EVP_CIPHER_CTX_block_size(ctx)); - if (!EVP_CipherFinal_ex(ctx, RSTRING_PTR(str), &out_len)) + if (!EVP_CipherFinal_ex(ctx, (unsigned char *)RSTRING_PTR(str), &out_len)) ossl_raise(eCipherError, NULL); assert(out_len <= RSTRING_LEN(str)); rb_str_set_len(str, out_len); @@@@ -417,7 +417,7 @@@@ ossl_cipher_set_key(VALUE self, VALUE ke if (RSTRING_LEN(key) < EVP_CIPHER_CTX_key_length(ctx)) ossl_raise(eCipherError, "key length too short"); - if (EVP_CipherInit_ex(ctx, NULL, NULL, RSTRING_PTR(key), NULL, -1) != 1) + if (EVP_CipherInit_ex(ctx, NULL, NULL, (unsigned char *)RSTRING_PTR(key), NULL, -1) != 1) ossl_raise(eCipherError, NULL); return key; @@@@ -442,7 +442,7 @@@@ ossl_cipher_set_iv(VALUE self, VALUE iv) if (RSTRING_LEN(iv) < EVP_CIPHER_CTX_iv_length(ctx)) ossl_raise(eCipherError, "iv length too short"); - if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, RSTRING_PTR(iv), -1) != 1) + if (EVP_CipherInit_ex(ctx, NULL, NULL, NULL, (unsigned char *)RSTRING_PTR(iv), -1) != 1) ossl_raise(eCipherError, NULL); return iv; @ 1.4 log @Update ruby18-base to 1.8.7.302 (Ruby 1.8.7 patchlevel 302). Since many changes from previous release, please refer http://www.ruby-lang.org/en/news/2010/08/16/ruby-1-8-7-p302-is-released/. Note: Since all security updates are already in previous package, This update dosen't include any securify fix. @ text @d1 1 a1 1 $NetBSD: patch-be,v 1.3 2009/08/11 14:26:58 taca Exp $ @ 1.3 log @ * Make Ruby's OpenSSL library compatible with OpenSSL 1.0.0 and later, focusing to PR pkg/41829. * Add comments to patches. Bump PKGREVISION. @ text @d1 1 a1 1 $NetBSD$ d3 1 a3 1 * Constify. d5 1 a5 1 --- ext/openssl/ossl_cipher.c.orig 2007-06-09 00:02:04.000000000 +0900 d7 1 a7 1 @@@@ -186,7 +186,7 @@@@ ossl_cipher_init(int argc, VALUE *argv, d16 26 a41 1 @@@@ -307,7 +307,7 @@@@ ossl_cipher_pkcs5_keyivgen(int argc, VAL d50 53 @ 1.2 log @Update ruby18-base package to Ruby 1.8.4. Ruby 1.8.4 are maintainous release of Ruby programming language. Changes are too huge to list here, please see http://www.ruby-lang.org/. And this package contains some bug fixes after release of 1.8.4. Tue Dec 27 08:29:18 2005 GOTOU Yuuzou * ext/openssl/lib/openssl/ssl.rb (OpenSSL::SSL::SSLSocket#post_connection_chech): treat wildcard character in commonName. [ruby-dev:28121] Mon Dec 26 22:32:47 2005 Nobuyoshi Nakada * eval.c (rb_eval), gc.c (gc_mark_children), node.h (NEW_ALIAS, NEW_VALIAS), parse.y (fitem): allow dynamic symbols to NODE_UNDEF and NODE_ALIAS. backported from trunk. fixed: [ruby-dev:28105] Mon Dec 26 08:50:36 2005 Yukihiro Matsumoto * eval.c (ev_const_get): fixed a bug in constant reference during instance_eval. [yarv-dev:707] * eval.c (ev_const_defined): ditto. * lib/yaml.rb (YAML::add_domain_type): typo fixed. a patch from Joel VanderWerf . [ruby-talk:165285] [ruby-core:6995] @ text @d1 1 a1 1 $NetBSD: patch-be,v 1.1 2005/11/02 08:56:40 taca Exp $ d3 3 a5 1 --- ext/openssl/ossl_cipher.c.orig 2005-02-28 11:45:17.000000000 +0900 d7 15 a21 1 @@@@ -224,7 +224,8 @@@@ ossl_cipher_update(VALUE self, VALUE dat d23 2 a24 8 StringValue(data); in = RSTRING(data)->ptr; - in_len = RSTRING(data)->len; + if ((in_len = RSTRING(data)->len) == 0) + rb_raise(rb_eArgError, "data must not be empty"); GetCipher(self, ctx); str = rb_str_new(0, in_len+EVP_CIPHER_CTX_block_size(ctx)); if (!EVP_CipherUpdate(ctx, RSTRING(str)->ptr, &out_len, in, in_len)) @ 1.1 log @- Update to Ruby 1.8.3 with several fixes after its release (see CHANGES.pkgsrc file). - Merge databases/ruby-dbm, devel/ruby-zlib, security/ruby-digest and ruby-openssl, conflicting with these packages. - Better handling for RI directories. - Use pkgsrc's TOOLS framework. @ text @d1 1 a1 1 $NetBSD$ @