[Bug 232784] devel/qca Latest version links against undefined OpenSSL 1.1 symbols on 11.2

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Wed Feb 27 19:23:05 GMT 2019


--- Comment #15 from commit-hook at freebsd.org ---
A commit references this bug:

Author: rakuco
Date: Wed Feb 27 19:22:17 UTC 2019
New revision: 494079
URL: https://svnweb.freebsd.org/changeset/ports/494079

  Replace OpenSSL 1.1.0 with upstream ones

  The patches from bug 228902 and added in r481850 are not entirely compatible
  with older OpenSSL versions, to the point that the qca-ossl plugin refuses to
  load at all on FreeBSD 11.2, for example (see bug 232784 and its duplicates).

  Fix it by replacing our patches with backports from upstream the same way
  OpenSUSE does it (the OpenSSL 1.1.0 upstream patch was authored by SUSE):

  * Revert an upstream commit made only to the 2.1 branch disabling a few
    in the unit tests.
  * Backport a change to the master branch that never made it to the 2.1 branch
    disabling the ciphers mentioned above as well as a few other ones, so that
    can backport the actual change adding support for OpenSSL 1.1.0 more
  * Backport the actual OpenSSL 1.1.0 support commit, with a few conflicts
    resolved due to the lack of a commit adding suport for AES GCM and AES CCM
    the 2.1 branch. The patch was actually obtained from OpenSUSE's
    since they had to resolve the same conflict as well.

  The port built fine on 11.2-i386, an old 12-CURRENT snapshot on amd64 as well
  as 13-CURRENT on amd64, and all unit tests are passing except for some PGP
  that are unrelated. With the patches we have in the tree, a lot of unit tests
  failed on 11.2 due to the qca-ossl plugin failing to load.

  PR:           228902
  PR:           232784
  Reviewed by:  tcberner
  Differential Revision:        https://reviews.freebsd.org/D19347


You are receiving this mail because:
You are the assignee for the bug.

More information about the kde-freebsd mailing list