Index: distinfo =================================================================== RCS file: /cvsroot/pkgsrc/net/openslp/distinfo,v retrieving revision 1.19 diff -p -r1.19 distinfo *** distinfo 11 Feb 2016 15:12:06 -0000 1.19 --- distinfo 17 Apr 2018 08:29:50 -0000 *************** SHA1 (patch-aj) = 8e1d32772cf59a938a4d9d *** 14,17 **** --- 14,18 ---- SHA1 (patch-ak) = e64ede590e4af9d8951177b68c4bbf1b56ebdfae SHA1 (patch-al) = 19fa24e2ac362c3e45413826cd139ced984e8adc SHA1 (patch-am) = 7b8a47f0998202aab9c82278a2c405584eb3fea4 + SHA1 (patch-common-slp_crypto.c) = 1c543d07c22b104510eec10bbda13b82015685a8 SHA1 (patch-slpd_slpd__knownda.c) = c01286e4dfedc2112272405934cbe4097f90fd07 Index: patches/patch-common-slp_crypto.c =================================================================== RCS file: patches/patch-common-slp_crypto.c diff -N patches/patch-common-slp_crypto.c *** /dev/null 1 Jan 1970 00:00:00 -0000 --- patches/patch-common-slp_crypto.c 17 Apr 2018 08:29:50 -0000 *************** *** 0 **** --- 1,28 ---- + $NetBSD$ + + port to OpenSSL 1.1. + + --- common/slp_crypto.c.orig 2005-02-08 14:23:27.000000000 -0800 + +++ common/slp_crypto.c 2018-04-17 01:27:35.975421083 -0700 + @@ -90,11 +90,21 @@ + result = DSA_new(); + if(result) + { + +#if OPENSSL_VERSION_NUMBER < 0x1010000fL + result->p = BN_dup(dsa->p); + result->q = BN_dup(dsa->q); + result->g = BN_dup(dsa->g); + result->priv_key = BN_dup(dsa->priv_key); + result->pub_key = BN_dup(dsa->pub_key); + +#else + + const BIGNUM *p, *q, *g; + + const BIGNUM *pub_key, *priv_key; + + + + DSA_get0_pqg(dsa, &p, &q, &g); + + DSA_set0_pqg(result, BN_dup(p), BN_dup(q), BN_dup(g)); + + DSA_get0_key(dsa, &pub_key, &priv_key); + + DSA_set0_key(result, BN_dup(pub_key), BN_dup(priv_key)); + +#endif + } + + return result;