From 1b3dee9ed536f49571fbfcd1671d14396212c5e3 Mon Sep 17 00:00:00 2001 From: Juan RP Date: Mon, 14 Jul 2014 16:55:50 +0200 Subject: [PATCH] elinks: switch to libressl. --- .../patches/patch-src_network_ssl_ssl_c | 21 +++++++++++++++++++ srcpkgs/elinks/template | 4 ++-- 2 files changed, 23 insertions(+), 2 deletions(-) create mode 100644 srcpkgs/elinks/patches/patch-src_network_ssl_ssl_c diff --git a/srcpkgs/elinks/patches/patch-src_network_ssl_ssl_c b/srcpkgs/elinks/patches/patch-src_network_ssl_ssl_c new file mode 100644 index 00000000000..12b4bc6f5cf --- /dev/null +++ b/srcpkgs/elinks/patches/patch-src_network_ssl_ssl_c @@ -0,0 +1,21 @@ +$OpenBSD: patch-src_network_ssl_ssl_c,v 1.2 2014/06/02 14:37:16 sthen Exp $ +--- src/network/ssl/ssl.c.orig Mon Jun 2 12:54:40 2014 ++++ src/network/ssl/ssl.c Mon Jun 2 12:55:46 2014 +@@ -49,11 +49,16 @@ init_openssl(struct module *module) + * cannot initialize the PRNG and so every attempt to use SSL fails. + * It's actually an OpenSSL FAQ, and according to them, it's up to the + * application coders to seed the RNG. -- William Yodlowsky */ +- if (RAND_egd(RAND_file_name(f_randfile, sizeof(f_randfile))) < 0) { ++ RAND_file_name(f_randfile, sizeof(f_randfile)); ++#ifdef HAVE_RAND_EGD ++ if (RAND_egd(f_randfile) < 0) { + /* Not an EGD, so read and write to it */ ++#endif + if (RAND_load_file(f_randfile, -1)) + RAND_write_file(f_randfile); ++#ifdef HAVE_RAND_EGD + } ++#endif + + SSLeay_add_ssl_algorithms(); + context = SSL_CTX_new(SSLv23_client_method()); diff --git a/srcpkgs/elinks/template b/srcpkgs/elinks/template index 76294ae5ae7..6f55668d51a 100644 --- a/srcpkgs/elinks/template +++ b/srcpkgs/elinks/template @@ -1,9 +1,9 @@ # Template file for 'elinks' pkgname=elinks version=0.12pre6 -revision=4 +revision=5 build_style=gnu-configure -makedepends="ncurses-devel openssl-devel" +makedepends="zlib-devel ncurses-devel libressl-devel" short_desc="Full-Featured Text WWW Browser" maintainer="Juan RP " homepage="http://elinks.or.cz"