Update to megatools-1.10.2.
Changelog: https://megatools.megous.com/builds/NEWS
This commit is contained in:
parent
a1079b3f7e
commit
fd9e8e7f1a
@ -1,11 +1,10 @@
|
||||
# $OpenBSD: Makefile,v 1.14 2018/01/03 10:39:00 bentley Exp $
|
||||
# $OpenBSD: Makefile,v 1.15 2018/09/08 21:50:08 bentley Exp $
|
||||
|
||||
PORTROACH = limit:[0-9]\.tar\.gz
|
||||
|
||||
COMMENT = command line client application for Mega
|
||||
|
||||
DISTNAME = megatools-1.9.98
|
||||
REVISION = 2
|
||||
DISTNAME = megatools-1.10.2
|
||||
|
||||
CATEGORIES = net
|
||||
|
||||
@ -16,7 +15,7 @@ MAINTAINER = Anthony J. Bentley <anthony@anjbe.name>
|
||||
# GPLv2+
|
||||
PERMIT_PACKAGE_CDROM = Yes
|
||||
|
||||
WANTLIB = c crypto curl gio-2.0 glib-2.0 gobject-2.0 iconv intl pthread
|
||||
WANTLIB = c crypto curl gio-2.0 glib-2.0 gobject-2.0 intl pthread
|
||||
WANTLIB += ssl
|
||||
|
||||
MASTER_SITES = https://megatools.megous.com/builds/
|
||||
@ -28,7 +27,10 @@ LIB_DEPENDS = devel/glib2 \
|
||||
|
||||
USE_GMAKE = Yes
|
||||
CONFIGURE_STYLE = gnu
|
||||
MAKE_FLAGS = VERBOSE=1
|
||||
|
||||
CONFIGURE_ARGS = --disable-introspection
|
||||
|
||||
SEPARATE_BUILD = Yes
|
||||
|
||||
.include <bsd.port.mk>
|
||||
|
@ -1,2 +1,2 @@
|
||||
SHA256 (megatools-1.9.98.tar.gz) = mwUhpNJ9vEF/yOEmEKweHacpv21utb75J+82cLNyoW8=
|
||||
SIZE (megatools-1.9.98.tar.gz) = 285805
|
||||
SHA256 (megatools-1.10.2.tar.gz) = F56Exo4kaWwXEjinK8/l4oGY5MTp+QQ3BPNuXAsXw4o=
|
||||
SIZE (megatools-1.10.2.tar.gz) = 300486
|
||||
|
@ -1,14 +0,0 @@
|
||||
$OpenBSD: patch-lib_mega_c,v 1.1 2016/11/21 06:43:40 bentley Exp $
|
||||
Fix compiling against LibreSSL.
|
||||
From upstream 3111b1b11330feb8b81d163bce67c5579a289796.
|
||||
--- lib/mega.c.orig Thu Nov 3 07:45:42 2016
|
||||
+++ lib/mega.c Sat Nov 19 21:10:21 2016
|
||||
@@ -803,7 +803,7 @@ static gboolean rsa_key_gen(rsa_key* k)
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
-#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
||||
+#if OPENSSL_VERSION_NUMBER >= 0x101000000L && !defined(LIBRESSL_VERSION_NUMBER)
|
||||
RSA_get0_key(key, &k->m, &k->e, &k->d);
|
||||
RSA_get0_factors(key, &k->q, &k->p);
|
||||
RSA_get0_crt_params(key, NULL, NULL, &k->u);
|
Loading…
Reference in New Issue
Block a user