Update to 11.0.30+7-1 GA:
* Contains upstream bug and security fixes:
https://openjdk.org/groups/vulnerability/advisories/2026-01-20
* Add @pkgpath devel/jdk/1.8 to PLIST to not leave behind jdk-1.8.0
when people upgrade.
* Rename PATCH_VER to BUILD_VER to match what upstream calls this
part of the version.
* Additional gcc 15 fixes from upstream unmerged pull request
* Use closefrom(2) in libjdwp/exec_md.c
* Update URLS to use https
ok sthen@
EVP_SealInit.3: fix RETURN VALUES section
While normal calls return 0 for error and npubk for success, there is a
case where it returns the usual 1/0 thing. Make that explicit.
Prompted by a report by Niels Dossche
ok jsing kenjiro
import ports/net/p5-Net-IDN-PP, tweak/ok benoit@
A pure-Perl implementation of the Punycode algorithm for encoding
internationalized domain names (IDNs).
EVP_{Open,Seal}Init(): remove redundant EVP_CIPHER_CTX_reset() calls
The subsequent EVP_{Decrypt,Encrypt}Init_ex() calls already do that.
pointed out by jsing
EVP_SealInit(): minor cleanup.
Explicitly compare pointers against NULL, turn the function into single
exit, add hint at why npubk <= 0 or pubk == NULL are a success path:
The documentation briefly explains that EVP_OpenInit() and EVP_SealInit()
is able to initialize the EVP_CIPHER_CTX in two steps exactly like the
EVP_CipherInit_ex() API they wrap: the first call with non-NULL cipher
(aka type) only sets the cipher on the ctx, then it returns to allow
callers to customize the EVP_CIPHER_CTX, and a second call with
cipher == NULL skips the initialization and finishes the ctx setup
by setting key and iv.
Prompted by a report by Niels Dossche.
ok jsing kenjiro
EVP_SealInit: do not return -1 on error
It is documented that EVP_SealInit() returns 0 on error. So -1 is wrong.
Reported by Niels Dossche
ok jsing kenjiro
EVP_OpenInit(): minor cleanup
Explicitly compare pointers against NULL, turn the function into single
exit and explain why priv == NULL is a success (hint: muppet API).
Prompted by a report by Niels Dossche.
ok jsing kenjiro