CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: rob...@cvs.openbsd.org 2014/05/16 00:51:43 Modified files: www/chromium : Makefile distinfo Log message: update to 34.0.1847.137
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: schwa...@cvs.openbsd.org2014/05/16 06:36:22 Log message: Import textproc/igor. Automated proofreader for text files, man pages, and DocBook SGML source files. Developed by Warren Block for FreeBSD. Port based on the FreeBSD port by Eitan Adler. feedback and ok sthen@ ok afresh1@ and bcallah@ an a previous version additional testing by Eric Radman ericshane at eradman dot com, thanks Status: Vendor Tag: schwarze Release Tags: schwarze_20140516 N ports/textproc/igor/Makefile N ports/textproc/igor/distinfo N ports/textproc/igor/pkg/PLIST N ports/textproc/igor/pkg/DESCR No conflicts created by this import
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: schwa...@cvs.openbsd.org2014/05/16 06:43:40 Modified files: textproc : Makefile Log message: +igor
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: giova...@cvs.openbsd.org2014/05/16 08:54:16 Modified files: www/sope : Makefile www/sope/patches: patch-sope-appserver_NGObjWeb_NSObject+WO_m Added files: www/sope/patches: patch-sope-mime_NGMime_NGMimeFileData_m Log message: Fixed fd leak where files were unlinked w/o being closed first. patch from upstream ok sebastia@
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: st...@cvs.openbsd.org 2014/05/16 09:08:54 Modified files: net/nmap : Makefile distinfo net/nmap/patches: patch-Makefile_in patch-libnetutil_netutil_cc patch-ndiff_setup_py patch-osscan2_cc patch-scan-engine_cc patch-timing_cc patch-zenmap_setup_py net/nmap/pkg : PLIST-main PLIST-zenmap Removed files: net/nmap/pkg : PFRAG.shared-main Log message: update to nmap 6.46, tweak from / ok giovanni@ (maintainer)
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: giova...@cvs.openbsd.org2014/05/16 09:32:30 Modified files: www/phpmyadmin : Makefile distinfo www/phpmyadmin/pkg: PLIST Log message: update to 4.2.1 full changelog at http://www.phpmyadmin.net/documentation/changelog.php
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: ajacou...@cvs.openbsd.org 2014/05/16 10:48:58 Modified files: x11/gnome/gdm : Makefile distinfo x11/gnome/gdm/patches: patch-configure_ac patch-data_Makefile_in Log message: Update to gdm-3.12.2.
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: sebas...@cvs.openbsd.org2014/05/16 11:00:21 Modified files: www/sogo : Makefile www/sogo/pkg : README Log message: Add nginx configuration example to pkg README, from giovanni@, with minor tweak from me. Feel free to commit, giovanni@
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: bl...@cvs.openbsd.org 2014/05/16 14:20:42 ports/devel/p5-BSD-arc4random/patches Update of /cvs/ports/devel/p5-BSD-arc4random/patches In directory cvs.openbsd.org:/tmp/cvs-serv5847/patches Log Message: Directory /cvs/ports/devel/p5-BSD-arc4random/patches added to the repository
CVS: cvs.openbsd.org: ports
CVSROOT:/cvs Module name:ports Changes by: bl...@cvs.openbsd.org 2014/05/16 17:08:31 Modified files: devel/p5-BSD-arc4random: Makefile Added files: devel/p5-BSD-arc4random/patches: patch-arc4rnd_xs_c patch-lib_BSD_arc4random_pm Log message: The port of the Perl module p5-BSD-arc4random was broken since arc4random_stir() and arc4random_addrandom() were removed from libc. Make sure that BSD::arc4random can only use OpenBSD's arc4random(3). Patch away all calls to obsolete and non existing functions in libc. Leave stubs for these functions in BSD::arc4random's API so that programs using them will not break. OK sthen@
devel/p5-BSD-arc4random broken on 5.5 and -current
devel/p5-BSD-arc4random broken on 5.5 and -current since this commit: http://marc.info/?l=openbsd-cvsm=138238762705209w=2 $ perl -MBSD::arc4random -e 1 perl:/usr/local/libdata/perl5/site_perl/i386-openbsd/auto/BSD/arc4random/arc4random.so: undefined symbol 'arc4random_addrandom' lazy binding failed! Segmentation fault (core dumped) No fix except this: Index: devel/p5-BSD-arc4random/Makefile === RCS file: /home/cvs/OpenBSD/ports/devel/p5-BSD-arc4random/Makefile,v retrieving revision 1.4 diff -u -p -r1.4 Makefile --- devel/p5-BSD-arc4random/Makefile11 Mar 2013 10:50:13 - 1.4 +++ devel/p5-BSD-arc4random/Makefile16 May 2014 09:41:29 - @@ -2,6 +2,8 @@ COMMENT = perl interface to the arc4 random number generator +BROKEN = undefined symbol 'arc4random_addrandom' + SHARED_ONLY = Yes MODULES = cpan DISTNAME = BSD-arc4random-1.50
Re: devel/p5-BSD-arc4random broken on 5.5 and -current
On 2014/05/16 12:44, j...@turnipsi.no-ip.org wrote: devel/p5-BSD-arc4random broken on 5.5 and -current since this commit: http://marc.info/?l=openbsd-cvsm=138238762705209w=2 $ perl -MBSD::arc4random -e 1 perl:/usr/local/libdata/perl5/site_perl/i386-openbsd/auto/BSD/arc4random/arc4random.so: undefined symbol 'arc4random_addrandom' lazy binding failed! Segmentation fault (core dumped) No fix except this: Index: devel/p5-BSD-arc4random/Makefile === RCS file: /home/cvs/OpenBSD/ports/devel/p5-BSD-arc4random/Makefile,v retrieving revision 1.4 diff -u -p -r1.4 Makefile --- devel/p5-BSD-arc4random/Makefile 11 Mar 2013 10:50:13 - 1.4 +++ devel/p5-BSD-arc4random/Makefile 16 May 2014 09:41:29 - @@ -2,6 +2,8 @@ COMMENT =perl interface to the arc4 random number generator +BROKEN = undefined symbol 'arc4random_addrandom' + SHARED_ONLY =Yes MODULES =cpan DISTNAME = BSD-arc4random-1.50 I think this port should either be deleted (nothing in the ports tree uses it) or gutted to remove the interfaces which were removed in OpenBSD 5.5. Even better would be to fix Perl itself to have a proper random function, it is 2014 after all... rand() is not cryptographically secure. You should not rely on it in security-sensitive situations. As of this writing, a number of third-party CPAN modules offer random number generators intended by their authors to be cryptographically secure, including: Data::Entropy, Crypt::Random, Math::Random::Secure, and Math::TrulyRandom. ...what a cop-out, none of these modules are even in base perl. As a minimum, on OS which have it, Perl rand() could take the same approach as we do in ksh - use arc4random unless srand has been called.
Re: [NEW] py-acoustid
This is nearly there, but make test still downloads audioread .. Perhaps for the sake of getting it imported, the best option might be to add this? # tests require https://pypi.python.org/pypi/audioread/ NO_TEST=Yes
Quick fix of x11/kde4/libs build
This patch makes x11/kde4/libs build reliably again. The probably is likely deep inside our compiler but I'm not the one who'll be able to fix this bug. And we need to have reliable builds of kdelibs anyway, it's too critical to wait until it gets fixed. This could probably fix the build/package bug in x11/kde4/l10n/pt, too. But since I still can't reproduce it, I'm not sure. Asking for bulk build tests. -- WBR, Vadim Zhukov Index: Makefile === RCS file: /cvs/ports/devel/cmake/Makefile,v retrieving revision 1.101 diff -u -p -r1.101 Makefile --- Makefile13 May 2014 05:55:30 - 1.101 +++ Makefile16 May 2014 16:33:07 - @@ -2,16 +2,19 @@ DPB_PROPERTIES =parallel -# avoid segfaults from binaries compiled and then used during the build .if ${MACHINE_ARCH} == arm +# avoid segfaults from binaries compiled and then used during the build CFLAGS += -O1 -fno-stack-protector +.else +# -O2 breaks at least x11/kde4/libs +CFLAGS += -O1 .endif HOMEPAGE = http://www.cmake.org/ CATEGORIES = devel COMMENT = portable build system DISTNAME = cmake-2.8.12.2 -REVISION = 3 +REVISION = 4 MASTER_SITES = ${HOMEPAGE}files/v2.8/ MAINTAINER = David Coppa dco...@openbsd.org
Re: Quick fix of x11/kde4/libs build
On Fri, May 16, 2014 at 08:38:50PM +0400, Vadim Zhukov wrote: This patch makes x11/kde4/libs build reliably again. The probably is likely deep inside our compiler but I'm not the one who'll be able to fix this bug. And we need to have reliable builds of kdelibs anyway, it's too critical to wait until it gets fixed. This could probably fix the build/package bug in x11/kde4/l10n/pt, too. But since I still can't reproduce it, I'm not sure. Asking for bulk build tests. -- WBR, Vadim Zhukov Index: Makefile === RCS file: /cvs/ports/devel/cmake/Makefile,v retrieving revision 1.101 diff -u -p -r1.101 Makefile --- Makefile 13 May 2014 05:55:30 - 1.101 +++ Makefile 16 May 2014 16:33:07 - @@ -2,16 +2,19 @@ DPB_PROPERTIES =parallel -# avoid segfaults from binaries compiled and then used during the build .if ${MACHINE_ARCH} == arm +# avoid segfaults from binaries compiled and then used during the build CFLAGS +=-O1 -fno-stack-protector +.else +# -O2 breaks at least x11/kde4/libs +CFLAGS +=-O1 .endif HOMEPAGE = http://www.cmake.org/ CATEGORIES = devel COMMENT =portable build system DISTNAME = cmake-2.8.12.2 -REVISION = 3 +REVISION = 4 MASTER_SITES = ${HOMEPAGE}files/v2.8/ MAINTAINER = David Coppa dco...@openbsd.org As an ad interim fix, I'd say put it in and we'll see... ciao, David
Re: [NEW] py-acoustid
Stuart Henderson schrieb am 16.05.2014 18:24: This is nearly there, but make test still downloads audioread .. Perhaps for the sake of getting it imported, the best option might be to add this? # tests require https://pypi.python.org/pypi/audioread/ NO_TEST= Yes Sorry, i always forget about the tests. I think they can be ignored in this case, and i will do my best to remember tests in my next port :) Nils
[new] audio/py-discogs-client
hello, this is a port of py-discogs-client which is an optional plugin for audio/beets so you can query the Discogs database instead of only Musicbrainz. tested on amd64 thanks, .jh py-discogs-client.tgz Description: Binary data
Re: [NEW] beets
On 5/15/14, 2:23 PM, Nils R wrote: Thanks :) It's a nice program indeed. Finally a tagger with a sane config syntax, low overhead and which allows to get tags from musicbrainz *and* discogs. Btw, i use to browse the ports tree on ports.su from time to time to look for nice programs i would otherwise never notice, e.g. xbanish, youtube-dl, lumail, and many more. I've been using beets on FreeBSD so I moved over my library.db and config.yaml to test this out. However I had quite a few plugins enabled that don't work in the port yet (as per your earlier e-mail). So here is what I needed to do to get it all working: fetchart just needs www/py-requests, which we have and doesn't pull in anything additional, so adding it as a RUN_DEPENDS seems like a reasonable idea. I created a port for py-discogs-client, see separate e-mail. I created a pkg/MESSAGE to mention it and a few other plugins which require additional packages to be installed. Finally the man pages for beet and beetsconfig weren't installed by your port so I added that step. updated port is attached. .jh beets.tgz Description: Binary data
Re: devel/p5-BSD-arc4random broken on 5.5 and -current
On Fri, May 16, 2014 at 01:28:51PM +0100, Stuart Henderson wrote: Even better would be to fix Perl itself to have a proper random function, it is 2014 after all... That would be nice. I don't think it will happen. As a minimum, on OS which have it, Perl rand() could take the same approach as we do in ksh - use arc4random unless srand has been called. This is dangerous. Some module might call srand(), then rand() is no longer secure. When writing perl programms I need a secure random generator. The code using it must be portable. So patching Perl in OpenBSD would not help. When people rely on that in OpenBSD and port the perl programm to another platform, they are lost. When using BSD::arc4random the perl programm can be sure that it works the same way everywhere. So I would recommend to strip everything out of p5-BSD-arc4random that does not call the OpenBSD libc function. But the API of BSD::arc4random must stay the same. bluhm
Re: devel/p5-BSD-arc4random broken on 5.5 and -current
On 2014/05/16 21:23, Alexander Bluhm wrote: On Fri, May 16, 2014 at 01:28:51PM +0100, Stuart Henderson wrote: Even better would be to fix Perl itself to have a proper random function, it is 2014 after all... That would be nice. I don't think it will happen. As a minimum, on OS which have it, Perl rand() could take the same approach as we do in ksh - use arc4random unless srand has been called. This is dangerous. Some module might call srand(), then rand() is no longer secure. When writing perl programms I need a secure random generator. The code using it must be portable. So patching Perl in OpenBSD would not help. When people rely on that in OpenBSD and port the perl programm to another platform, they are lost. I meant this more as something that will improve things a bit for us, rather than as something for people to rely on for security.. When using BSD::arc4random the perl programm can be sure that it works the same way everywhere. So I would recommend to strip everything out of p5-BSD-arc4random that does not call the OpenBSD libc function. But the API of BSD::arc4random must stay the same. bluhm
Re: devel/p5-BSD-arc4random broken on 5.5 and -current
On Fri, May 16, 2014 at 09:23:40PM +0200, Alexander Bluhm wrote: When using BSD::arc4random the perl programm can be sure that it works the same way everywhere. So I would recommend to strip everything out of p5-BSD-arc4random that does not call the OpenBSD libc function. But the API of BSD::arc4random must stay the same. Here is the diff. I have also removed arc4random.c so we will not link it by accident. Do we want it that way? bluhm Index: devel/p5-BSD-arc4random/Makefile === RCS file: /data/mirror/openbsd/cvs/ports/devel/p5-BSD-arc4random/Makefile,v retrieving revision 1.4 diff -u -p -u -p -r1.4 Makefile --- devel/p5-BSD-arc4random/Makefile11 Mar 2013 10:50:13 - 1.4 +++ devel/p5-BSD-arc4random/Makefile16 May 2014 19:24:48 - @@ -5,7 +5,7 @@ COMMENT = perl interface to the arc4 ra SHARED_ONLY = Yes MODULES = cpan DISTNAME = BSD-arc4random-1.50 -REVISION = 0 +REVISION = 1 CATEGORIES = devel MAINTAINER = Abel Abraham Camarillo Ojeda acam...@verlet.org Index: devel/p5-BSD-arc4random/patches/patch-arc4random_c === RCS file: devel/p5-BSD-arc4random/patches/patch-arc4random_c diff -N devel/p5-BSD-arc4random/patches/patch-arc4random_c --- /dev/null 1 Jan 1970 00:00:00 - +++ devel/p5-BSD-arc4random/patches/patch-arc4random_c 16 May 2014 19:28:31 - @@ -0,0 +1,626 @@ +$OpenBSD$ +--- arc4random.c.orig Sun Sep 12 14:24:51 2010 arc4random.c Fri May 16 21:25:38 2014 +@@ -1,622 +0,0 @@ +-static const char __vcsid[] = @(#) MirOS contributed arc4random.c (old) +-\n @(#)rcsid_master: $MirOS: contrib/code/Snippets/arc4random.c,v 1.28 2010/09/12 12:24:27 tg Exp $ +-; +- +-/*- +- * Arc4 random number generator for OpenBSD. +- * Copyright 1996 David Mazieres d...@lcs.mit.edu. +- * +- * Modification and redistribution in source and binary forms is +- * permitted provided that due credit is given to the author and the +- * OpenBSD project by leaving this copyright notice intact. +- */ +- +-/*- +- * This code is derived from section 17.1 of Applied Cryptography, +- * second edition, which describes a stream cipher allegedly +- * compatible with RSA Labs RC4 cipher (the actual description of +- * which is a trade secret). The same algorithm is used as a stream +- * cipher called arcfour in Tatu Ylonen's ssh package. +- * +- * Here the stream cipher has been modified always to include the time +- * when initializing the state. That makes it impossible to +- * regenerate the same random sequence twice, so this can't be used +- * for encryption, but will generate good random numbers. +- * +- * RC4 is a registered trademark of RSA Laboratories. +- */ +- +-/*- +- * Modified by Robert Connolly from OpenBSD lib/libc/crypt/arc4random.c v1.11. +- * This is arc4random(3) using urandom. +- */ +- +-/*- +- * Copyright (c) 2008, 2009, 2010 +- *Thorsten Glaser t...@mirbsd.org +- * This is arc4random(3) made more portable, +- * as well as arc4random_pushb(3) for Cygwin. +- * +- * Provided that these terms and disclaimer and all copyright notices +- * are retained or reproduced in an accompanying document, permission +- * is granted to deal in this work without restriction, including un- +- * limited rights to use, publicly perform, distribute, sell, modify, +- * merge, give away, or sublicence. +- * +- * This work is provided AS IS and WITHOUT WARRANTY of any kind, to +- * the utmost extent permitted by applicable law, neither express nor +- * implied; without malicious intent or gross negligence. In no event +- * may a licensor, author or contributor be held liable for indirect, +- * direct, other damage, loss, or other issues arising in any way out +- * of dealing in the work, even if advised of the possibility of such +- * damage or existence of a defect, except proven that it results out +- * of said person's immediate fault when using the work as intended. +- */ +- +-#include sys/param.h +-#include sys/types.h +-#include sys/time.h +-#if defined(HAVE_SYS_SYSCTL_H) HAVE_SYS_SYSCTL_H +-#include sys/sysctl.h +-#endif +-#include fcntl.h +-#if defined(HAVE_STDINT_H) HAVE_STDINT_H +-#include stdint.h +-#elif defined(USE_INTTYPES) +-#include inttypes.h +-#endif +-#include stdio.h +-#include stdlib.h +-#include string.h +-#include unistd.h +- +-#if defined(__CYGWIN__) || defined(WIN32) +-#define USE_MS_CRYPTOAPI +-#define REDEF_USCORETYPES +-#endif +- +-#ifdef USE_MS_CRYPTOAPI +-#define WIN32_WINNT 0x400 +-#define _WIN32_WINNT 0x400 +-#include windows.h +-#include wincrypt.h +- +-static uint8_t w32_buf[16*16384]; /* force reseed */ +-static uint8_t w32_hklm[80]; /* registry key (MS, Admin) */ +-static uint8_t w32_hkcu[256]; /* registry key (per user) */ +-static struct timeval w32_last; /* last time CGR was used
Re: devel/p5-BSD-arc4random broken on 5.5 and -current
On Fri, May 16, 2014 at 7:28 AM, Stuart Henderson st...@openbsd.org wrote: On 2014/05/16 12:44, j...@turnipsi.no-ip.org wrote: devel/p5-BSD-arc4random broken on 5.5 and -current since this commit: http://marc.info/?l=openbsd-cvsm=138238762705209w=2 $ perl -MBSD::arc4random -e 1 perl:/usr/local/libdata/perl5/site_perl/i386-openbsd/auto/BSD/arc4random/arc4random.so: undefined symbol 'arc4random_addrandom' lazy binding failed! Segmentation fault (core dumped) No fix except this: Index: devel/p5-BSD-arc4random/Makefile === RCS file: /home/cvs/OpenBSD/ports/devel/p5-BSD-arc4random/Makefile,v retrieving revision 1.4 diff -u -p -r1.4 Makefile --- devel/p5-BSD-arc4random/Makefile 11 Mar 2013 10:50:13 - 1.4 +++ devel/p5-BSD-arc4random/Makefile 16 May 2014 09:41:29 - @@ -2,6 +2,8 @@ COMMENT =perl interface to the arc4 random number generator +BROKEN = undefined symbol 'arc4random_addrandom' + SHARED_ONLY =Yes MODULES =cpan DISTNAME = BSD-arc4random-1.50 I think this port should either be deleted (nothing in the ports tree uses it) or gutted to remove the interfaces which were removed in OpenBSD 5.5. Well, I use BSD::arc4random in some production applications - that haven't been updated in a while... Will try to see how can it be updated to arc4random changes... Even better would be to fix Perl itself to have a proper random function, it is 2014 after all... rand() is not cryptographically secure. You should not rely on it in security-sensitive situations. As of this writing, a number of third-party CPAN modules offer random number generators intended by their authors to be cryptographically secure, including: Data::Entropy, Crypt::Random, Math::Random::Secure, and Math::TrulyRandom. ...what a cop-out, none of these modules are even in base perl. As a minimum, on OS which have it, Perl rand() could take the same approach as we do in ksh - use arc4random unless srand has been called.
Re: devel/p5-BSD-arc4random broken on 5.5 and -current
On Fri, May 16, 2014 at 3:36 PM, Abel Abraham Camarillo Ojeda acam...@verlet.org wrote: On Fri, May 16, 2014 at 7:28 AM, Stuart Henderson st...@openbsd.org wrote: On 2014/05/16 12:44, j...@turnipsi.no-ip.org wrote: devel/p5-BSD-arc4random broken on 5.5 and -current since this commit: http://marc.info/?l=openbsd-cvsm=138238762705209w=2 $ perl -MBSD::arc4random -e 1 perl:/usr/local/libdata/perl5/site_perl/i386-openbsd/auto/BSD/arc4random/arc4random.so: undefined symbol 'arc4random_addrandom' lazy binding failed! Segmentation fault (core dumped) No fix except this: Index: devel/p5-BSD-arc4random/Makefile === RCS file: /home/cvs/OpenBSD/ports/devel/p5-BSD-arc4random/Makefile,v retrieving revision 1.4 diff -u -p -r1.4 Makefile --- devel/p5-BSD-arc4random/Makefile 11 Mar 2013 10:50:13 - 1.4 +++ devel/p5-BSD-arc4random/Makefile 16 May 2014 09:41:29 - @@ -2,6 +2,8 @@ COMMENT =perl interface to the arc4 random number generator +BROKEN = undefined symbol 'arc4random_addrandom' + SHARED_ONLY =Yes MODULES =cpan DISTNAME = BSD-arc4random-1.50 I think this port should either be deleted (nothing in the ports tree uses it) or gutted to remove the interfaces which were removed in OpenBSD 5.5. Well, I use BSD::arc4random in some production applications - that haven't been updated in a while... Will try to see how can it be updated to arc4random changes... I'm OK with it being tagged as broken for now, though
Re: devel/p5-BSD-arc4random broken on 5.5 and -current
On 2014/05/16 22:34, Alexander Bluhm wrote: On Fri, May 16, 2014 at 09:23:40PM +0200, Alexander Bluhm wrote: When using BSD::arc4random the perl programm can be sure that it works the same way everywhere. So I would recommend to strip everything out of p5-BSD-arc4random that does not call the OpenBSD libc function. But the API of BSD::arc4random must stay the same. Here is the diff. I have also removed arc4random.c so we will not link it by accident. Do we want it that way? My preference would be to add rm ${WRKSRC}/arc4random.c in post-extract rather than add a patch to remove all file contents, but OK either way.
Re: devel/p5-BSD-arc4random broken on 5.5 and -current
On Fri, May 16, 2014 at 10:20:03PM +0100, Stuart Henderson wrote: On 2014/05/16 22:34, Alexander Bluhm wrote: On Fri, May 16, 2014 at 09:23:40PM +0200, Alexander Bluhm wrote: When using BSD::arc4random the perl programm can be sure that it works the same way everywhere. So I would recommend to strip everything out of p5-BSD-arc4random that does not call the OpenBSD libc function. But the API of BSD::arc4random must stay the same. Here is the diff. I have also removed arc4random.c so we will not link it by accident. Do we want it that way? My preference would be to add rm ${WRKSRC}/arc4random.c in post-extract rather than add a patch to remove all file contents, but OK either way. Yes, that is better. Index: devel/p5-BSD-arc4random/Makefile === RCS file: /data/mirror/openbsd/cvs/ports/devel/p5-BSD-arc4random/Makefile,v retrieving revision 1.4 diff -u -p -u -p -r1.4 Makefile --- devel/p5-BSD-arc4random/Makefile11 Mar 2013 10:50:13 - 1.4 +++ devel/p5-BSD-arc4random/Makefile16 May 2014 21:31:17 - @@ -5,7 +5,7 @@ COMMENT = perl interface to the arc4 ra SHARED_ONLY = Yes MODULES = cpan DISTNAME = BSD-arc4random-1.50 -REVISION = 0 +REVISION = 1 CATEGORIES = devel MAINTAINER = Abel Abraham Camarillo Ojeda acam...@verlet.org @@ -13,5 +13,8 @@ MAINTAINER = Abel Abraham Camarillo Oje PERMIT_PACKAGE_CDROM = Yes WANTLIB += c + +post-extract: + rm ${WRKSRC}/arc4random.c .include bsd.port.mk Index: devel/p5-BSD-arc4random/patches/patch-arc4rnd_xs_c === RCS file: devel/p5-BSD-arc4random/patches/patch-arc4rnd_xs_c diff -N devel/p5-BSD-arc4random/patches/patch-arc4rnd_xs_c --- /dev/null 1 Jan 1970 00:00:00 - +++ devel/p5-BSD-arc4random/patches/patch-arc4rnd_xs_c 16 May 2014 20:19:10 - @@ -0,0 +1,171 @@ +$OpenBSD$ +--- arc4rnd_xs.c.orig Sun Oct 11 00:44:17 2009 arc4rnd_xs.c Fri May 16 22:18:56 2014 +@@ -54,11 +54,6 @@ __RCSID($MirOS: contrib/hosted/tg/code/BSD::arc4rando + #define u_int32_t uint32_t + #endif + +-#ifdef NEED_ARC4RANDOM_DECL +-u_int32_t arc4random(void); +-void arc4random_addrandom(u_char *, int); +-#endif +- + XS(XS_BSD__arc4random_arc4random_xs); + XS(XS_BSD__arc4random_arc4random_xs) + { +@@ -74,142 +69,14 @@ XS(XS_BSD__arc4random_arc4random_xs) + XSRETURN(1); + } + +-XS(XS_BSD__arc4random_stir_xs); +-XS(XS_BSD__arc4random_stir_xs) +-{ +- dXSARGS; +- +- arc4random_stir(); +- +- XSRETURN_EMPTY; +-} +- +-XS(XS_BSD__arc4random_arc4random_addrandom_xs); +-XS(XS_BSD__arc4random_arc4random_addrandom_xs) +-{ +- dXSARGS; +- dXSTARG; +- SV *sv; +- char *buf; +- STRLEN len; +- uint32_t rv; +- +- sv = ST(0); +- buf = SvPV(sv, len); +- arc4random_addrandom((unsigned char *)buf, (int)len); +- rv = arc4random(); +- XSprePUSH; +- PUSHu((UV)rv); +- +- XSRETURN(1); +-} +- +-#ifndef HAVE_ARC4RANDOM_PUSHB +-#define HAVE_ARC4RANDOM_PUSHB 1 +-#endif +- +-#if HAVE_ARC4RANDOM_PUSHB +-XS(XS_BSD__arc4random_arc4random_pushb_xs); +-XS(XS_BSD__arc4random_arc4random_pushb_xs) +-{ +- dXSARGS; +- dXSTARG; +- SV *sv; +- char *buf; +- STRLEN len; +- uint32_t rv; +- +- sv = ST(0); +- buf = SvPV(sv, len); +- rv = arc4random_pushb((void *)buf, (size_t)len); +- XSprePUSH; +- PUSHu((UV)rv); +- +- XSRETURN(1); +-} +-#elif defined(arc4random_pushk) +-#define XS_BSD__arc4random_arc4random_pushb_xs \ +- XS_BSD__arc4random_arc4random_pushk_xs +-#else +-#define XS_BSD__arc4random_arc4random_pushb_xs \ +- XS_BSD__arc4random_arc4random_addrandom_xs +-#endif +- +-#if defined(arc4random_pushk) +-XS(XS_BSD__arc4random_arc4random_pushk_xs); +-XS(XS_BSD__arc4random_arc4random_pushk_xs) +-{ +- dXSARGS; +- dXSTARG; +- SV *sv; +- char *buf; +- STRLEN len; +- uint32_t rv; +- +- sv = ST(0); +- buf = SvPV(sv, len); +- rv = arc4random_pushk((void *)buf, (size_t)len); +- XSprePUSH; +- PUSHu((UV)rv); +- +- XSRETURN(1); +-} +-#elif HAVE_ARC4RANDOM_PUSHB +-#define XS_BSD__arc4random_arc4random_pushk_xs \ +- XS_BSD__arc4random_arc4random_pushb_xs +-#else +-#define XS_BSD__arc4random_arc4random_pushk_xs \ +- XS_BSD__arc4random_arc4random_addrandom_xs +-#endif +- +-#undef HAVE_ARC4RANDOM_KINTF +-#if HAVE_ARC4RANDOM_PUSHB || defined(arc4random_pushk) +-#define HAVE_ARC4RANDOM_KINTF 1 +-#else +-#define HAVE_ARC4RANDOM_KINTF 0 +-#endif +- +- +-/* +- * These may be needed because praeprocessor commands inside a +- * macro's argument list may not work +- */ +- +-#if HAVE_ARC4RANDOM_PUSHB +-#define IDT_ARC4RANDOM_PUSHB arc4random_pushb +-#else +-#define IDT_ARC4RANDOM_PUSHB +-#endif +- +-#if defined(arc4random_pushk)
x11/mplayer: Did we lose AC3 passthru over S/PDIF?
Did we somewhere along the way lose the ability to pass through AC3/DTS audio over S/PDIF? It makes no difference whether sndiod(1) is running, and it's the same for mplayer-20140106p3 and mplayer-20140412. $ mplayer -afm hwac3 dvd.vob [...] == Trying to force audio codec driver family hwac3... Opening audio decoder: [hwac3] AC3/DTS pass-through S/PDIF hwac3: switched to AC3, 384000 bps, 48000 Hz AUDIO: 48000 Hz, 2 ch, ac3be, 384.0 kbit/25.00% (ratio: 48000-192000) Selected audio codec: [hwac3] afm: hwac3 (AC3 through S/PDIF) == AO: [sndio] 48000Hz 2ch s16be (2 bytes per sample) [format] Sample format big-endian AC3 not yet supported [libaf] Reinitialization did not work, audio filter 'format' returned error code -2 [libaf] Unable to setup filter system can not meet sound-card demands, please send a bug report. Couldn't find matching filter/ao format! Audio: no sound [...] My ability to test this will likely go away over the next few days, so if nobody else cares... *shrug* -- Christian naddy Weisgerber na...@mips.inka.de