diff --git a/security/pks/Makefile b/security/pks/Makefile index 614e53f98f89..90a249c889e2 100644 --- a/security/pks/Makefile +++ b/security/pks/Makefile @@ -1,62 +1,50 @@ PORTNAME= pks PORTVERSION= 0.9.6.20040312 PORTREVISION= 10 CATEGORIES= security www MASTER_SITES= http://pks.sourceforge.net/ LOCAL/mandree DISTFILES= pks-current.tgz MAINTAINER= tphilipp@potion-studios.com COMMENT= PGP Public Key Server WWW= http://www.mit.edu/people/marc/pks/ LICENSE= BSD4CLAUSE LICENSE_FILE= ${WRKSRC}/LICENSE -BROKEN_SSL= openssl -BROKEN_SSL_REASON_openssl= member access into incomplete type 'EVP_PKEY' (aka 'evp_pkey_st') -DEPRECATED= Broken with recent ssl -EXPIRATION_DATE= 2023-03-20 - USES= bdb ssl -USE_GCC= yes USE_RC_SUBR= pksd WRKSRC= ${WRKDIR}/${PORTNAME} GNU_CONFIGURE= yes CONFIGURE_ARGS= --datadir=${DATADIR} \ --localstatedir=/var/pks \ --with-libwrap \ --with-openssl=${OPENSSLBASE} MAKE_ENV+= SUBDIRS= LDFLAGS+= -L${LOCALBASE}/lib CONFIGURE_ENV= DBLIB="-L${BDB_LIB_DIR} -l${BDB_LIB_NAME}" \ DBINC=-I${BDB_INCLUDE_DIR} DBHDR=db.h SUB_FILES= pkg-message SUB_LIST= PORTNAME="${PORTNAME}" OPTIONS_DEFINE= DOCS PORTDOCS= pks_help.* README EMAIL post-extract: @${CP} -a ${FILESDIR}/EMAIL ${WRKSRC} post-install: ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/pgpsplit ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/pksdctl ${STRIP_CMD} ${STAGEDIR}${PREFIX}/bin/pksclient ${STRIP_CMD} ${STAGEDIR}${PREFIX}/sbin/pksd ${MV} ${STAGEDIR}${PREFIX}/etc/pksd.conf ${STAGEDIR}${PREFIX}/etc/pksd.conf.sample post-install-DOCS-on: ${MKDIR} ${STAGEDIR}${DOCSDIR}/ cd ${WRKSRC}/ && ${INSTALL_DATA} ${PORTDOCS} ${STAGEDIR}${DOCSDIR}/ -.include - -.if ${OPSYS} == FreeBSD && ${SSL_DEFAULT} == base -BROKEN= Does not build with OpenSSL 1.1 -.endif - .include diff --git a/security/pks/files/patch-pgputil.c b/security/pks/files/patch-pgputil.c new file mode 100644 index 000000000000..624635bcb56f --- /dev/null +++ b/security/pks/files/patch-pgputil.c @@ -0,0 +1,20 @@ +--- pgputil.c.orig 2003-04-30 04:13:38 UTC ++++ pgputil.c +@@ -221,14 +221,14 @@ decode_x509 (ddesc * data, long len, ddesc * keyid) + { + return (0); + } +- switch (pkey->type) ++ switch (EVP_PKEY_type(EVP_PKEY_id(pkey))) + { + case EVP_PKEY_RSA: + /* pkey->pkey.rsa->n is the modulus */ +- b = BN_dup (pkey->pkey.rsa->n); ++ b = BN_dup (RSA_get0_n(EVP_PKEY_get0_RSA(pkey))); + break; + case EVP_PKEY_DSA: +- b = BN_dup (pkey->pkey.dsa->p); ++ b = BN_dup (RSA_get0_p(EVP_PKEY_get0_DSA(pkey))); + break; + } + EVP_PKEY_free (pkey);