The following diff brings security/pwgen to 2.08, which fixes some bugs. Response maintainer 'fine for me'.
-- Björn Ketelaars GPG key: 0x4F0E5F21 diff --git security/pwgen/Makefile security/pwgen/Makefile index 866aea4c7b0..3f8961119b2 100644 --- security/pwgen/Makefile +++ security/pwgen/Makefile @@ -2,8 +2,7 @@ COMMENT= simple password generator -DISTNAME= pwgen-2.07 -REVISION= 2 +DISTNAME= pwgen-2.08 CATEGORIES= security MAINTAINER= Robert Nagy <rob...@openbsd.org> diff --git security/pwgen/distinfo security/pwgen/distinfo index ce21281216e..5fae692561c 100644 --- security/pwgen/distinfo +++ security/pwgen/distinfo @@ -1,2 +1,2 @@ -SHA256 (pwgen-2.07.tar.gz) = 63RZP1gpbCHHHNB5M+BwSS6SIrec7fgdGgLOCcDhFVY= -SIZE (pwgen-2.07.tar.gz) = 53513 +SHA256 (pwgen-2.08.tar.gz) = 2rA90wrVpY5XjFWBJBpuh+GEoY6yw7Lg//qKnPEFyXs= +SIZE (pwgen-2.08.tar.gz) = 54884 diff --git security/pwgen/patches/patch-configure_ac security/pwgen/patches/patch-configure_ac new file mode 100644 index 00000000000..56b5749f3e0 --- /dev/null +++ security/pwgen/patches/patch-configure_ac @@ -0,0 +1,19 @@ +$OpenBSD$ + +Index: configure.ac +--- configure.ac.orig ++++ configure.ac +@@ -1,11 +1,12 @@ + AC_INIT(pwgen.c) + AC_PREREQ(2.50) ++AC_CONFIG_HEADERS(config.h) + AC_PROG_CC + AC_PROG_INSTALL + AC_PATH_PROG(MV, mv, mv) + AC_PATH_PROG(RM, rm, rm) + AC_PATH_PROG(SED, sed, sed) + AC_PATH_PROG(PERL, perl, perl) +-AC_CHECK_FUNCS(getopt_long) ++AC_CHECK_FUNCS(arc4random arc4random_uniform getopt_long pledge) + AC_CHECK_HEADERS(getopt.h) + AC_OUTPUT(Makefile) diff --git security/pwgen/patches/patch-configure_in security/pwgen/patches/patch-configure_in deleted file mode 100644 index 26c9a16e2ef..00000000000 --- security/pwgen/patches/patch-configure_in +++ /dev/null @@ -1,17 +0,0 @@ -$OpenBSD: patch-configure_in,v 1.6 2016/01/31 13:35:28 jasper Exp $ ---- configure.in.orig Tue Oct 28 04:39:37 2014 -+++ configure.in Mon Jan 18 14:30:48 2016 -@@ -1,11 +1,12 @@ - AC_INIT(pwgen.c) - AC_PREREQ(2.50) -+AC_CONFIG_HEADERS(config.h) - AC_PROG_CC - AC_PROG_INSTALL - AC_PATH_PROG(MV, mv, mv) - AC_PATH_PROG(RM, rm, rm) - AC_PATH_PROG(SED, sed, sed) - AC_PATH_PROG(PERL, perl, perl) --AC_CHECK_FUNCS(getopt_long) -+AC_CHECK_FUNCS(arc4random arc4random_uniform getopt_long pledge) - AC_CHECK_HEADERS(getopt.h) - AC_OUTPUT(Makefile) diff --git security/pwgen/patches/patch-pwgen_c security/pwgen/patches/patch-pwgen_c index f58d7e3129f..9de7d8bc7ee 100644 --- security/pwgen/patches/patch-pwgen_c +++ security/pwgen/patches/patch-pwgen_c @@ -1,6 +1,7 @@ $OpenBSD: patch-pwgen_c,v 1.2 2016/01/31 13:35:28 jasper Exp $ ---- pwgen.c.orig Tue Oct 28 02:00:39 2014 -+++ pwgen.c Mon Jan 18 14:38:37 2016 +Index: pwgen.c +--- pwgen.c.orig ++++ pwgen.c @@ -7,6 +7,8 @@ * License. */ @@ -10,9 +11,9 @@ $OpenBSD: patch-pwgen_c,v 1.2 2016/01/31 13:35:28 jasper Exp $ #include <stdio.h> #include <unistd.h> #include <stdlib.h> -@@ -94,6 +96,12 @@ int main(int argc, char **argv) - char *buf, *tmp; - void (*pwgen)(char *inbuf, int size, int pw_flags); +@@ -99,6 +101,12 @@ int main(int argc, char **argv) + char *remove=NULL; + void (*pwgen)(char *inbuf, int size, int pw_flags, char *remove); +#ifdef HAVE_PLEDGE + if (pledge("stdio rpath", NULL) == -1) { @@ -23,7 +24,7 @@ $OpenBSD: patch-pwgen_c,v 1.2 2016/01/31 13:35:28 jasper Exp $ pwgen = pw_phonemes; pw_number = pw_random_number; if (isatty(1)) -@@ -162,6 +170,13 @@ int main(int argc, char **argv) +@@ -170,6 +178,13 @@ int main(int argc, char **argv) break; } } diff --git security/pwgen/patches/patch-randnum_c security/pwgen/patches/patch-randnum_c index ae910943fb4..491577d21a8 100644 --- security/pwgen/patches/patch-randnum_c +++ security/pwgen/patches/patch-randnum_c @@ -1,6 +1,7 @@ $OpenBSD: patch-randnum_c,v 1.4 2015/02/09 18:56:11 jasper Exp $ ---- randnum.c.orig Tue Oct 28 02:55:43 2014 -+++ randnum.c Mon Feb 9 19:24:58 2015 +Index: randnum.c +--- randnum.c.orig ++++ randnum.c @@ -16,8 +16,18 @@ #include <fcntl.h> #include <errno.h> @@ -20,7 +21,7 @@ $OpenBSD: patch-randnum_c,v 1.4 2015/02/09 18:56:11 jasper Exp $ #ifdef HAVE_DRAND48 extern double drand48(void); #endif -@@ -76,3 +86,4 @@ int pw_random_number(max_num) +@@ -75,3 +85,4 @@ int pw_random_number(max_num) fprintf(stderr, "No entropy available!\n"); exit(1); }