On 2020/08/23 22:21, Remi Locherer wrote:
> This is an update for librelp to version 1.6.0 which was released
> 4 months ago. The local patches to make it build with LibreSSL are
> now incorporated into upstream and can be dropped.

btw, @SECLEVEL is nasty because it's a runtime failure rather than a
build one.

> There are two tests that fail (tls-basic-anon.sh and
> tls-wrong-signedcert.sh). Both are related to verifying (or not in
> the anon case) certificates. It also fails with the librelp
> version 1.5.0. Both failures are for tests with LibreSSL.  rsyslogd
> (consumer of librelp) is linked against gnutls. I do not remember
> what the state was when I last updated librelp.
> 
> I verified that rsyslogd can still send and receive RELP messages
> with and without TLS.
> 
> OK?

ok.

> Remi
> 
> 
> Index: Makefile
> ===================================================================
> RCS file: /cvs/ports/sysutils/librelp/Makefile,v
> retrieving revision 1.16
> diff -u -p -r1.16 Makefile
> --- Makefile  2 Mar 2020 16:41:50 -0000       1.16
> +++ Makefile  23 Aug 2020 14:25:48 -0000
> @@ -2,9 +2,9 @@
>  
>  COMMENT =    reliable event logging protocol library
>  
> -DISTNAME =   librelp-1.5.0
> +DISTNAME =   librelp-1.6.0
>  
> -SHARED_LIBS +=  relp                      3.1 # 5.0
> +SHARED_LIBS +=  relp                      4.0 # 5.0
>  
>  CATEGORIES = sysutils
>  
> Index: distinfo
> ===================================================================
> RCS file: /cvs/ports/sysutils/librelp/distinfo,v
> retrieving revision 1.8
> diff -u -p -r1.8 distinfo
> --- distinfo  2 Mar 2020 16:41:50 -0000       1.8
> +++ distinfo  11 Aug 2020 15:23:25 -0000
> @@ -1,2 +1,2 @@
> -SHA256 (librelp-1.5.0.tar.gz) = aShO8aBRqywvd2WVjoR77x/POPR+sbA3LGX2PwPIOV4=
> -SIZE (librelp-1.5.0.tar.gz) = 521793
> +SHA256 (librelp-1.6.0.tar.gz) = z2zJSKWz0eVrMlFYXBG+6hxbKF/L+OKa1olVx+t1+Mo=
> +SIZE (librelp-1.6.0.tar.gz) = 522827
> Index: patches/patch-src_tcp_c
> ===================================================================
> RCS file: patches/patch-src_tcp_c
> diff -N patches/patch-src_tcp_c
> --- patches/patch-src_tcp_c   2 Mar 2020 16:41:50 -0000       1.2
> +++ /dev/null 1 Jan 1970 00:00:00 -0000
> @@ -1,26 +0,0 @@
> -$OpenBSD: patch-src_tcp_c,v 1.2 2020/03/02 16:41:50 remi Exp $
> -
> -LibreSSL has no support for @SECLEVEL and SSL_CONF_CTX_set_flags().
> -
> -Index: src/tcp.c
> ---- src/tcp.c.orig
> -+++ src/tcp.c
> -@@ -1200,7 +1200,8 @@ relpTcpTLSSetPrio_ossl(relpTcp_t *const pThis)
> -     /* Compute priority string (in simple cases where the user does not 
> care...) */
> -     if(pThis->pristring == NULL) {
> -             if (pThis->authmode == eRelpAuthMode_None) {
> --                    #if OPENSSL_VERSION_NUMBER >= 0x10100000L
> -+                    #if OPENSSL_VERSION_NUMBER >= 0x10100000L \
> -+                        && !defined(LIBRESSL_VERSION_NUMBER)
> -                      /* NOTE: do never use: +eNULL, it DISABLES encryption! 
> */
> -                     strncpy(pristringBuf, 
> "ALL:+COMPLEMENTOFDEFAULT:+ADH:+ECDH:+aNULL@SECLEVEL=0",
> -                             sizeof(pristringBuf));
> -@@ -1578,7 +1579,7 @@ relpTcpSetSslConfCmd_ossl(relpTcp_t *const pThis, char
> -     } else {
> -             pThis->pEngine->dbgprint("relpTcpSetSslConfCmd_ossl: set to 
> '%s'\n", tlsConfigCmd);
> -             char errmsg[1424];
> --#if OPENSSL_VERSION_NUMBER >= 0x10020000L
> -+#if OPENSSL_VERSION_NUMBER >= 0x10020000L && 
> !defined(LIBRESSL_VERSION_NUMBER)
> -             char *pCurrentPos;
> -             char *pNextPos;
> -             char *pszCmd;
> Index: pkg/PLIST
> ===================================================================
> RCS file: /cvs/ports/sysutils/librelp/pkg/PLIST,v
> retrieving revision 1.2
> diff -u -p -r1.2 PLIST
> --- pkg/PLIST 16 Mar 2015 18:07:55 -0000      1.2
> +++ pkg/PLIST 11 Aug 2020 15:26:36 -0000
> @@ -1,6 +1,6 @@
>  @comment $OpenBSD: PLIST,v 1.2 2015/03/16 18:07:55 naddy Exp $
>  include/librelp.h
> -lib/librelp.a
> +@static-lib lib/librelp.a
>  lib/librelp.la
>  @lib lib/librelp.so.${LIBrelp_VERSION}
>  lib/pkgconfig/relp.pc
> 

Reply via email to