Hi, - maintenance update, no code change except... - remove our patches - use the default HOMEPAGE from the cpan module - t/ uses Digest::SHA (which is in base) - install Signature.pod for symmetry between perldoc and man(1)
ok? Index: Makefile =================================================================== RCS file: /cvs/ports/security/p5-Crypt-OpenSSL-DSA/Makefile,v retrieving revision 1.17 diff -u -p -r1.17 Makefile --- Makefile 11 Mar 2013 11:41:26 -0000 1.17 +++ Makefile 3 Nov 2013 23:30:53 -0000 @@ -4,20 +4,15 @@ SHARED_ONLY= Yes MODULES= cpan COMMENT= implements DSA using OpenSSL -DISTNAME= Crypt-OpenSSL-DSA-0.13 -REVISION= 4 +DISTNAME= Crypt-OpenSSL-DSA-0.14 CATEGORIES= security USE_GROFF = Yes MAINTAINER= Jasper Lievisse Adriaanse <[email protected]> -HOMEPAGE= http://perl-openssl.sourceforge.net/ - # perl PERMIT_PACKAGE_CDROM= Yes WANTLIB += c crypto ssl - -TEST_DEPENDS= security/p5-Digest-SHA1 .include <bsd.port.mk> Index: distinfo =================================================================== RCS file: /cvs/ports/security/p5-Crypt-OpenSSL-DSA/distinfo,v retrieving revision 1.5 diff -u -p -r1.5 distinfo --- distinfo 5 Apr 2007 17:26:08 -0000 1.5 +++ distinfo 3 Nov 2013 16:19:36 -0000 @@ -1,5 +1,2 @@ -MD5 (Crypt-OpenSSL-DSA-0.13.tar.gz) = OuNxeZEIcxYjqNmzrff3Zw== -RMD160 (Crypt-OpenSSL-DSA-0.13.tar.gz) = 3FvmBzld10e8ITSRJE1sPVyB95Y= -SHA1 (Crypt-OpenSSL-DSA-0.13.tar.gz) = 4OFbJEuaG+sX7eQWX2Kba+rbdFw= -SHA256 (Crypt-OpenSSL-DSA-0.13.tar.gz) = 94anZEEQamzj3k0VO93T/AqKkGV7LLZ3iqNi5OfWbO8= -SIZE (Crypt-OpenSSL-DSA-0.13.tar.gz) = 6796 +SHA256 (Crypt-OpenSSL-DSA-0.14.tar.gz) = LXXgwTDqtDuNpchcJ+orSZvPSPComxL7uSXMdNwUoW8= +SIZE (Crypt-OpenSSL-DSA-0.14.tar.gz) = 7062 Index: patches/patch-DSA_xs =================================================================== RCS file: patches/patch-DSA_xs diff -N patches/patch-DSA_xs --- patches/patch-DSA_xs 4 Mar 2009 20:19:16 -0000 1.1 +++ /dev/null 1 Jan 1970 00:00:00 -0000 @@ -1,15 +0,0 @@ -$OpenBSD: patch-DSA_xs,v 1.1 2009/03/04 20:19:16 jasper Exp $ - -Fix for Debian #511519. - ---- DSA.xs.orig Wed Mar 4 21:13:41 2009 -+++ DSA.xs Wed Mar 4 21:14:19 2009 -@@ -139,6 +139,8 @@ do_verify(dsa, dgst, sig) - CODE: - dgst_pv = SvPV(dgst, dgst_len); - RETVAL = DSA_do_verify(dgst_pv, dgst_len, sig, dsa); -+ if (RETVAL == -1) -+ croak("Error in DSA_do_verify: %s",ERR_error_string(ERR_get_error(), NULL)); - OUTPUT: - RETVAL - Index: patches/patch-lib_Crypt_OpenSSL_DSA_pm =================================================================== RCS file: patches/patch-lib_Crypt_OpenSSL_DSA_pm diff -N patches/patch-lib_Crypt_OpenSSL_DSA_pm --- patches/patch-lib_Crypt_OpenSSL_DSA_pm 4 Mar 2009 20:19:16 -0000 1.1 +++ /dev/null 1 Jan 1970 00:00:00 -0000 @@ -1,20 +0,0 @@ -$OpenBSD: patch-lib_Crypt_OpenSSL_DSA_pm,v 1.1 2009/03/04 20:19:16 jasper Exp $ - -Fix for Debian #511519. - ---- lib/Crypt/OpenSSL/DSA.pm.orig Wed Mar 4 21:15:39 2009 -+++ lib/Crypt/OpenSSL/DSA.pm Wed Mar 4 21:16:15 2009 -@@ -124,9 +124,13 @@ Verifies that the $sig signature for $message is valid - - $dsa is the signer's public key. - -+Note it croaks if the underlying library call returns error (-1). -+ - =item $valid = $dsa->do_verify( $message, $sig_obj ); - - Similar to C<verify>, but uses a L<Crypt::OpenSSL::DSA::Signature> object. -+ -+Note it croaks if the underlying library call returns error (-1). - - =item $dsa->write_params( $filename ); - Index: pkg/PLIST =================================================================== RCS file: /cvs/ports/security/p5-Crypt-OpenSSL-DSA/pkg/PLIST,v retrieving revision 1.5 diff -u -p -r1.5 PLIST --- pkg/PLIST 22 Dec 2005 07:32:03 -0000 1.5 +++ pkg/PLIST 4 Nov 2013 08:23:18 -0000 @@ -2,9 +2,9 @@ ${P5ARCH}/ ${P5ARCH}/Crypt/ ${P5ARCH}/Crypt/OpenSSL/ -@comment ${P5ARCH}/Crypt/OpenSSL/DSA/ +${P5ARCH}/Crypt/OpenSSL/DSA/ ${P5ARCH}/Crypt/OpenSSL/DSA.pm -@comment ${P5ARCH}/Crypt/OpenSSL/DSA/Signature.pod +${P5ARCH}/Crypt/OpenSSL/DSA/Signature.pod ${P5ARCH}/auto/ ${P5ARCH}/auto/Crypt/ ${P5ARCH}/auto/Crypt/OpenSSL/
