FreeBSD Bugzilla – Attachment 197083 Details for
Bug 231331
security/apache-xml-security-c: Not broken with OpenSSL 1.1.x
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
Prepare for LLD on i386; Strip library file
apache-xml-security (text/plain), 2.96 KB, created by
Nathan
on 2018-09-14 01:25:06 UTC
(
hide
)
Description:
Prepare for LLD on i386; Strip library file
Filename:
MIME Type:
Creator:
Nathan
Created:
2018-09-14 01:25:06 UTC
Size:
2.96 KB
patch
obsolete
>Index: security/apache-xml-security-c/Makefile >=================================================================== >--- security/apache-xml-security-c/Makefile (revision 479619) >+++ security/apache-xml-security-c/Makefile (working copy) >@@ -3,6 +3,7 @@ > > PORTNAME= xml-security-c > PORTVERSION= 2.0.1 >+PORTREVISION= 1 > CATEGORIES= security > MASTER_SITES= APACHE/santuario/c-library > PKGNAMEPREFIX= apache- >@@ -16,13 +17,14 @@ > > GNU_CONFIGURE= yes > CONFIGURE_ARGS= --disable-dependency-tracking --without-xalan --with-openssl=${OPENSSLBASE} >-USES= cpe gmake libtool tar:bzip2 ssl pkgconfig autoreconf >+USES= autoreconf cpe gmake libtool pkgconfig ssl tar:bzip2 > USE_LDCONFIG= yes >-CONFIGURE_ENV+= openssl_LIBS="-L${OPENSSLLIB} -lcrypto" openssl_CFLAGS=-I${OPENSSLBASE} >+CONFIGURE_ENV+= openssl_LIBS="-L${LOCALBASE}/lib -lcrypto" openssl_CFLAGS=-I${OPENSSLBASE} > > CPE_PRODUCT= xml_security_for_c\+\+ > CPE_VENDOR= apache >-BROKEN_SSL= openssl-devel >-BROKEN_SSL_REASON_openssl-devel= field has incomplete type HMAC_CTX (aka hmac_ctx_st) > >+post-install: >+ ${STRIP_CMD} ${STAGEDIR}${PREFIX}/lib/libxml-security-c.so.* >+ > .include <bsd.port.mk> >Index: security/apache-xml-security-c/files/patch-xsec_canon_XSECC14n20010315.cpp >=================================================================== >--- security/apache-xml-security-c/files/patch-xsec_canon_XSECC14n20010315.cpp (revision 479619) >+++ security/apache-xml-security-c/files/patch-xsec_canon_XSECC14n20010315.cpp (working copy) >@@ -1,8 +1,8 @@ > Index: xsec/canon/XSECC14n20010315.cpp > =================================================================== >---- xsec/canon/XSECC14n20010315.cpp (revision 1821687) >-+++ xsec/canon/XSECC14n20010315.cpp (working copy) >-@@ -1148,7 +1148,7 @@ >+--- xsec/canon/XSECC14n20010315.cpp.orig 2018-06-18 14:48:28 UTC >++++ xsec/canon/XSECC14n20010315.cpp >+@@ -1149,7 +1149,7 @@ XMLSize_t XSECC14n20010315::processNextNode() { > // Is this the default? > if (currentName.sbStrcmp("xmlns") == 0 && > (!m_XPathSelection || m_XPathMap.hasNode(tmpAtts->item(i))) && >@@ -11,7 +11,7 @@ > xmlnsFound = true; > > // A namespace node - See if we need to output >-@@ -1297,7 +1297,7 @@ >+@@ -1298,7 +1298,7 @@ XMLSize_t XSECC14n20010315::processNextNode() { > // Is this the default? > if (currentName.sbStrcmp("xmlns") == 0 && > (!m_XPathSelection || m_XPathMap.hasNode(nsnode)) && >Index: security/apache-xml-security-c/files/patch-xsec_utils_XSECSafeBuffer.cpp >=================================================================== >--- security/apache-xml-security-c/files/patch-xsec_utils_XSECSafeBuffer.cpp (revision 479619) >+++ security/apache-xml-security-c/files/patch-xsec_utils_XSECSafeBuffer.cpp (working copy) >@@ -1,5 +1,5 @@ >---- xsec/utils/XSECSafeBuffer.cpp.orig 2018-08-12 18:15:47.905481000 +0200 >-+++ xsec/utils/XSECSafeBuffer.cpp 2018-08-12 18:21:09.514664000 +0200 >+--- xsec/utils/XSECSafeBuffer.cpp.orig 2018-06-18 14:48:28 UTC >++++ xsec/utils/XSECSafeBuffer.cpp > @@ -28,6 +28,8 @@ > * > */
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 231331
:
197082
|
197083