The tarball has been rerolled with many post 3.3 release fixes,

so bump PORTREVISION, too.
This commit is contained in:
Alex Dupre 2006-09-17 08:40:33 +00:00
parent 2c3dc153a9
commit b0a1ca0086
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=173221
3 changed files with 4 additions and 17 deletions

View File

@ -7,6 +7,7 @@
PORTNAME= cryptlib
PORTVERSION= 3.3
PORTREVISION= 1
CATEGORIES= security
MASTER_SITES= ftp://ftp.franken.de/pub/crypt/cryptlib/
DISTNAME= cl${PORTVERSION:S/.//g}

View File

@ -1,3 +1,3 @@
MD5 (cl33.zip) = 50383f20dfe79c401540d083c7d52084
SHA256 (cl33.zip) = 73d72b005aeb75da7d385e762f4e8cdcff9ac75d17152c980545a654c7d9c2f5
SIZE (cl33.zip) = 3777255
MD5 (cl33.zip) = 386abce26023fe1ca3bf67cb4b2d739f
SHA256 (cl33.zip) = 8c9d784d7699456e1aff2211cde6b95962116f43a05e869a0caec21b5be754b8
SIZE (cl33.zip) = 3779126

View File

@ -1,14 +0,0 @@
--- context/ctx_aes.c.orig Thu Sep 14 20:29:24 2006
+++ context/ctx_aes.c Thu Sep 14 20:30:14 2006
@@ -67,10 +67,10 @@
is a relatively minor overhead compared to en/decryption, so it's not a
big problem) */
+#define L_SIZE( x ) ( sizeof( x ) / sizeof( unsigned long ) )
#if defined( USE_VIA_ACE_IF_PRESENT )
/* Data is DWORD-aligned anyway but we need to have 16-byte alignment for
key data in case we're using the VIA ACE */
- #define L_SIZE( x ) ( sizeof( x ) / sizeof( unsigned long ) )
#define KS_SIZE ( sizeof( AES_EKEY ) + sizeof( AES_DKEY ) + 24 )
#define ALGN( x ) ( ( unsigned long )( x ) & 0xFFFFFFF0 )
#define EKEY( x ) ( ( AES_EKEY * ) ALGN( ( ( AES_CTX * ) x )->ksch + 3 ) )