Date: Thursday, January 25, 2018 @ 22:25:53 Author: anthraxx Revision: 286972
upgpkg: sslsplit 0.5.1-1 Modified: sslsplit/trunk/PKGBUILD Deleted: sslsplit/trunk/0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch -----------------------------------------------------------------+ 0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch | 510 ---------- PKGBUILD | 23 2 files changed, 8 insertions(+), 525 deletions(-) Deleted: 0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch =================================================================== --- 0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch 2018-01-25 22:23:28 UTC (rev 286971) +++ 0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch 2018-01-25 22:25:53 UTC (rev 286972) @@ -1,510 +0,0 @@ -From: Hilko Bengen <[email protected]> -Date: Tue, 8 Nov 2016 00:30:42 +0100 -Subject: Add fixes for OpenSSL 1.1 while retaining 1.0 compatibility - ---- - cachedsess.t.c | 4 ++ - cachefkcrt.t.c | 4 ++ - cachemgr.h | 21 ++++++---- - cachessess.t.c | 24 ++++++++++-- - extra/pki/GNUmakefile | 4 +- - ssl.c | 105 +++++++++++++++++++++++++++++++++++--------------- - ssl.t.c | 11 ++++-- - 7 files changed, 125 insertions(+), 48 deletions(-) - -diff --git a/cachedsess.t.c b/cachedsess.t.c -index 7daa472..49fb9e0 100644 ---- a/cachedsess.t.c -+++ b/cachedsess.t.c -@@ -120,6 +120,7 @@ START_TEST(cache_dsess_03) - } - END_TEST - -+#if OPENSSL_VERSION_NUMBER < 0x10100000 - START_TEST(cache_dsess_04) - { - SSL_SESSION *s1, *s2; -@@ -145,6 +146,7 @@ START_TEST(cache_dsess_04) - SSL_SESSION_free(s2); - } - END_TEST -+#endif - - Suite * - cachedsess_suite(void) -@@ -159,7 +161,9 @@ cachedsess_suite(void) - tcase_add_test(tc, cache_dsess_01); - tcase_add_test(tc, cache_dsess_02); - tcase_add_test(tc, cache_dsess_03); -+#if OPENSSL_VERSION_NUMBER < 0x10100000 - tcase_add_test(tc, cache_dsess_04); -+#endif - suite_add_tcase(s, tc); - - return s; -diff --git a/cachefkcrt.t.c b/cachefkcrt.t.c -index db5e365..d79fb77 100644 ---- a/cachefkcrt.t.c -+++ b/cachefkcrt.t.c -@@ -89,6 +89,7 @@ START_TEST(cache_fkcrt_03) - } - END_TEST - -+#if OPENSSL_VERSION_NUMBER < 0x10100000 - START_TEST(cache_fkcrt_04) - { - X509 *c1, *c2; -@@ -116,6 +117,7 @@ START_TEST(cache_fkcrt_04) - fail_unless(cachemgr_preinit() != -1, "reinit"); - } - END_TEST -+#endif - - Suite * - cachefkcrt_suite(void) -@@ -130,7 +132,9 @@ cachefkcrt_suite(void) - tcase_add_test(tc, cache_fkcrt_01); - tcase_add_test(tc, cache_fkcrt_02); - tcase_add_test(tc, cache_fkcrt_03); -+#if OPENSSL_VERSION_NUMBER < 0x10100000 - tcase_add_test(tc, cache_fkcrt_04); -+#endif - suite_add_tcase(s, tc); - - return s; -diff --git a/cachemgr.h b/cachemgr.h -index 8ec7306..2a0fb0e 100644 ---- a/cachemgr.h -+++ b/cachemgr.h -@@ -61,15 +61,20 @@ void cachemgr_gc(void); - #define cachemgr_ssess_get(key, keysz) \ - cache_get(cachemgr_ssess, cachessess_mkkey((key), (keysz))) - #define cachemgr_ssess_set(val) \ -- cache_set(cachemgr_ssess, \ -- cachessess_mkkey((val)->session_id, \ -- (val)->session_id_length), \ -- cachessess_mkval(val)) -+ { \ -+ unsigned int len; \ -+ const unsigned char* id = SSL_SESSION_get_id(val, &len); \ -+ cache_set(cachemgr_ssess, \ -+ cachessess_mkkey(id, len), \ -+ cachessess_mkval(val)); \ -+ } - #define cachemgr_ssess_del(val) \ -- cache_del(cachemgr_ssess, \ -- cachessess_mkkey((val)->session_id, \ -- (val)->session_id_length)) -- -+ { \ -+ unsigned int len; \ -+ const unsigned char* id = SSL_SESSION_get_id(val, &len); \ -+ cache_del(cachemgr_ssess, \ -+ cachessess_mkkey(id, len)); \ -+ } - #define cachemgr_dsess_get(addr, addrlen, sni) \ - cache_get(cachemgr_dsess, cachedsess_mkkey((addr), (addrlen), (sni))) - #define cachemgr_dsess_set(addr, addrlen, sni, val) \ -diff --git a/cachessess.t.c b/cachessess.t.c -index 8da5287..b23b661 100644 ---- a/cachessess.t.c -+++ b/cachessess.t.c -@@ -68,13 +68,16 @@ cachemgr_teardown(void) - START_TEST(cache_ssess_01) - { - SSL_SESSION *s1, *s2; -+ char* session_id; -+ unsigned int len; - - s1 = ssl_session_from_file(TMP_SESS_FILE); - fail_unless(!!s1, "creating session failed"); - fail_unless(ssl_session_is_valid(s1), "session invalid"); - - cachemgr_ssess_set(s1); -- s2 = cachemgr_ssess_get(s1->session_id, s1->session_id_length); -+ session_id = SSL_SESSION_get_id(s1, &len); -+ s2 = cachemgr_ssess_get(session_id, len); - fail_unless(!!s2, "cache returned no session"); - fail_unless(s2 != s1, "cache returned same pointer"); - SSL_SESSION_free(s1); -@@ -85,12 +88,15 @@ END_TEST - START_TEST(cache_ssess_02) - { - SSL_SESSION *s1, *s2; -+ char* session_id; -+ unsigned int len; - - s1 = ssl_session_from_file(TMP_SESS_FILE); - fail_unless(!!s1, "creating session failed"); - fail_unless(ssl_session_is_valid(s1), "session invalid"); - -- s2 = cachemgr_ssess_get(s1->session_id, s1->session_id_length); -+ session_id = SSL_SESSION_get_id(s1, &len); -+ s2 = cachemgr_ssess_get(session_id, len); - fail_unless(s2 == NULL, "session was already in empty cache"); - SSL_SESSION_free(s1); - } -@@ -99,6 +105,8 @@ END_TEST - START_TEST(cache_ssess_03) - { - SSL_SESSION *s1, *s2; -+ char* session_id; -+ unsigned int len; - - s1 = ssl_session_from_file(TMP_SESS_FILE); - fail_unless(!!s1, "creating session failed"); -@@ -106,15 +114,19 @@ START_TEST(cache_ssess_03) - - cachemgr_ssess_set(s1); - cachemgr_ssess_del(s1); -- s2 = cachemgr_ssess_get(s1->session_id, s1->session_id_length); -+ session_id = SSL_SESSION_get_id(s1, &len); -+ s2 = cachemgr_ssess_get(session_id, len); - fail_unless(s2 == NULL, "cache returned deleted session"); - SSL_SESSION_free(s1); - } - END_TEST - -+#if OPENSSL_VERSION_NUMBER < 0x10100000 - START_TEST(cache_ssess_04) - { - SSL_SESSION *s1, *s2; -+ char* session_id; -+ unsigned int len; - - s1 = ssl_session_from_file(TMP_SESS_FILE); - fail_unless(!!s1, "creating session failed"); -@@ -123,7 +135,8 @@ START_TEST(cache_ssess_04) - fail_unless(s1->references == 1, "refcount != 1"); - cachemgr_ssess_set(s1); - fail_unless(s1->references == 1, "refcount != 1"); -- s2 = cachemgr_ssess_get(s1->session_id, s1->session_id_length); -+ session_id = SSL_SESSION_get_id(s1, &len); -+ s2 = cachemgr_ssess_get(session_id, len); - fail_unless(s1->references == 1, "refcount != 1"); - fail_unless(!!s2, "cache returned no session"); - fail_unless(s2->references == 1, "refcount != 1"); -@@ -137,6 +150,7 @@ START_TEST(cache_ssess_04) - SSL_SESSION_free(s2); - } - END_TEST -+#endif - - Suite * - cachessess_suite(void) -@@ -151,7 +165,9 @@ cachessess_suite(void) - tcase_add_test(tc, cache_ssess_01); - tcase_add_test(tc, cache_ssess_02); - tcase_add_test(tc, cache_ssess_03); -+#if OPENSSL_VERSION_NUMBER < 0x10100000 - tcase_add_test(tc, cache_ssess_04); -+#endif - suite_add_tcase(s, tc); - - return s; -diff --git a/extra/pki/GNUmakefile b/extra/pki/GNUmakefile -index bd7b8d6..d0300fe 100644 ---- a/extra/pki/GNUmakefile -+++ b/extra/pki/GNUmakefile -@@ -63,7 +63,7 @@ ec.key: - $(OPENSSL) req -new -nodes -x509 $(DIGEST) -out $@ -key $< \ - -config $(CONFIG) -extensions $(CA_EXT) \ - -subj $(CA_SUBJECT) \ -- -set_serial 0 -days $(CA_DAYS) -+ -set_serial 1 -days $(CA_DAYS) - - server.key: - $(OPENSSL) genrsa -out $@ 2048 -@@ -112,7 +112,7 @@ targets/wildcard.roe.ch.pem: rsa.crt - - # localhost network connectivity is required - session.pem: -- openssl s_server -accept 46143 -cert server.pem -quiet -no_ssl2 & \ -+ openssl s_server -accept 46143 -cert server.pem -quiet & \ - pid=$$! ; \ - sleep 1 ; \ - echo q | $(OPENSSL) s_client -connect localhost:46143 \ -diff --git a/ssl.c b/ssl.c -index ca19263..417d57d 100644 ---- a/ssl.c -+++ b/ssl.c -@@ -88,6 +88,39 @@ ssl_ssl_cert_get(SSL *s) - } - #endif /* OpenSSL 0.9.8y, 1.0.0k or 1.0.1e */ - -+#if OPENSSL_VERSION_NUMBER < 0x10100000 -+#define SSL_is_server(ssl) (ssl->type != SSL_ST_CONNECT) -+#define X509_get_signature_nid(x509) (OBJ_obj2nid(x509->sig_alg->algorithm)) -+static int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g) -+{ -+ /* If the fields p and g in d are NULL, the corresponding input -+ * parameters MUST be non-NULL. q may remain NULL. -+ */ -+ if ((dh->p == NULL && p == NULL) -+ || (dh->g == NULL && g == NULL)) -+ return 0; -+ -+ if (p != NULL) { -+ BN_free(dh->p); -+ dh->p = p; -+ } -+ if (q != NULL) { -+ BN_free(dh->q); -+ dh->q = q; -+ } -+ if (g != NULL) { -+ BN_free(dh->g); -+ dh->g = g; -+ } -+ -+ if (q != NULL) { -+ dh->length = BN_num_bits(q); -+ } -+ -+ return 1; -+} -+#endif -+ - - /* - * Print OpenSSL version and build-time configuration to standard error and -@@ -226,7 +259,7 @@ ssl_openssl_version(void) - */ - static int ssl_initialized = 0; - --#ifdef OPENSSL_THREADS -+#if defined(OPENSSL_THREADS) && OPENSSL_VERSION_NUMBER < 0x10100000L - struct CRYPTO_dynlock_value { - pthread_mutex_t mutex; - }; -@@ -331,7 +364,7 @@ ssl_init(void) - OpenSSL_add_all_algorithms(); - - /* thread-safety */ --#ifdef OPENSSL_THREADS -+#if defined(OPENSSL_THREADS) && OPENSSL_VERSION_NUMBER < 0x10100000L - ssl_mutex_num = CRYPTO_num_locks(); - ssl_mutex = malloc(ssl_mutex_num * sizeof(*ssl_mutex)); - for (int i = 0; i < ssl_mutex_num; i++) { -@@ -397,7 +430,7 @@ ssl_reinit(void) - if (!ssl_initialized) - return; - --#ifdef OPENSSL_THREADS -+#if defined(OPENSSL_THREADS) && OPENSSL_VERSION_NUMBER < 0x10100000L - for (int i = 0; i < ssl_mutex_num; i++) { - pthread_mutex_init(&ssl_mutex[i], NULL); - } -@@ -416,7 +449,7 @@ ssl_fini(void) - - ERR_remove_state(0); /* current thread */ - --#ifdef OPENSSL_THREADS -+#if defined(OPENSSL_THREADS) && OPENSSL_VERSION_NUMBER < 0x10100000L - CRYPTO_set_locking_callback(NULL); - CRYPTO_set_dynlock_create_callback(NULL); - CRYPTO_set_dynlock_lock_callback(NULL); -@@ -476,16 +509,14 @@ ssl_ssl_state_to_str(SSL *ssl) - char *str = NULL; - int rv; - -- rv = asprintf(&str, "%08x = %s%s%s%04x = %s (%s) [%s]", -- ssl->state, -- (ssl->state & SSL_ST_CONNECT) ? "SSL_ST_CONNECT|" : "", -- (ssl->state & SSL_ST_ACCEPT) ? "SSL_ST_ACCEPT|" : "", -- (ssl->state & SSL_ST_BEFORE) ? "SSL_ST_BEFORE|" : "", -- ssl->state & SSL_ST_MASK, -+ rv = asprintf(&str, "%08x = %s%s%04x = %s (%s) [%s]", -+ SSL_get_state(ssl), -+ (SSL_get_state(ssl) & SSL_ST_CONNECT) ? "SSL_ST_CONNECT|" : "", -+ (SSL_get_state(ssl) & SSL_ST_ACCEPT) ? "SSL_ST_ACCEPT|" : "", -+ SSL_get_state(ssl) & SSL_ST_MASK, - SSL_state_string(ssl), - SSL_state_string_long(ssl), -- (ssl->type == SSL_ST_CONNECT) ? "connect socket" -- : "accept socket"); -+ SSL_is_server(ssl) ? "accept socket" : "connect socket"); - - return (rv < 0) ? NULL : str; - } -@@ -587,6 +618,7 @@ DH * - ssl_tmp_dh_callback(UNUSED SSL *s, int is_export, int keylength) - { - DH *dh; -+ int success = 0; - - if (!(dh = DH_new())) { - log_err_printf("DH_new() failed\n"); -@@ -594,16 +626,20 @@ ssl_tmp_dh_callback(UNUSED SSL *s, int is_export, int keylength) - } - switch (keylength) { - case 512: -- dh->p = BN_bin2bn(dh512_p, sizeof(dh512_p), NULL); -+ success = DH_set0_pqg(dh, BN_bin2bn(dh512_p, sizeof(dh512_p), NULL), NULL, -+ BN_bin2bn(dh_g, sizeof(dh_g), NULL)); - break; - case 1024: -- dh->p = BN_bin2bn(dh1024_p, sizeof(dh1024_p), NULL); -+ success = DH_set0_pqg(dh, BN_bin2bn(dh1024_p, sizeof(dh1024_p), NULL), NULL, -+ BN_bin2bn(dh_g, sizeof(dh_g), NULL)); - break; - case 2048: -- dh->p = BN_bin2bn(dh2048_p, sizeof(dh2048_p), NULL); -+ success = DH_set0_pqg(dh, BN_bin2bn(dh2048_p, sizeof(dh2048_p), NULL), NULL, -+ BN_bin2bn(dh_g, sizeof(dh_g), NULL)); - break; - case 4096: -- dh->p = BN_bin2bn(dh4096_p, sizeof(dh4096_p), NULL); -+ success = DH_set0_pqg(dh, BN_bin2bn(dh4096_p, sizeof(dh4096_p), NULL), NULL, -+ BN_bin2bn(dh_g, sizeof(dh_g), NULL)); - break; - default: - log_err_printf("Unhandled DH keylength %i%s\n", -@@ -612,8 +648,7 @@ ssl_tmp_dh_callback(UNUSED SSL *s, int is_export, int keylength) - DH_free(dh); - return NULL; - } -- dh->g = BN_bin2bn(dh_g, sizeof(dh_g), NULL); -- if (!dh->p || !dh->g) { -+ if (!success) { - log_err_printf("Failed to load DH p and g from memory\n"); - DH_free(dh); - return NULL; -@@ -841,7 +876,7 @@ ssl_x509_forge(X509 *cacrt, EVP_PKEY *cakey, X509 *origcrt, - if (!gn) - goto errout2; - gn->type = GEN_DNS; -- gn->d.dNSName = M_ASN1_IA5STRING_new(); -+ gn->d.dNSName = ASN1_IA5STRING_new(); - if (!gn->d.dNSName) - goto errout3; - ASN1_STRING_set(gn->d.dNSName, -@@ -865,10 +900,10 @@ ssl_x509_forge(X509 *cacrt, EVP_PKEY *cakey, X509 *origcrt, - #endif /* DEBUG_CERTIFICATE */ - - const EVP_MD *md; -- switch (EVP_PKEY_type(cakey->type)) { -+ switch (EVP_PKEY_type(EVP_PKEY_base_id(cakey))) { - #ifndef OPENSSL_NO_RSA - case EVP_PKEY_RSA: -- switch (OBJ_obj2nid(origcrt->sig_alg->algorithm)) { -+ switch (X509_get_signature_nid(origcrt)) { - case NID_md5WithRSAEncryption: - md = EVP_md5(); - break; -@@ -897,12 +932,20 @@ ssl_x509_forge(X509 *cacrt, EVP_PKEY *cakey, X509 *origcrt, - #endif /* !OPENSSL_NO_RSA */ - #ifndef OPENSSL_NO_DSA - case EVP_PKEY_DSA: -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - md = EVP_dss1(); -+#else -+ md = EVP_sha1(); -+#endif - break; - #endif /* !OPENSSL_NO_DSA */ - #ifndef OPENSSL_NO_ECDSA - case EVP_PKEY_EC: -+#if OPENSSL_VERSION_NUMBER < 0x10100000L - md = EVP_ecdsa(); -+#else -+ md = EVP_sha1(); -+#endif - break; - #endif /* !OPENSSL_NO_ECDSA */ - default: -@@ -1015,7 +1058,6 @@ ssl_x509chain_use(SSL_CTX *sslctx, X509 *crt, STACK_OF(X509) *chain) - - tmpcrt = sk_X509_value(chain, i); - ssl_x509_refcount_inc(tmpcrt); -- sk_X509_push(sslctx->extra_certs, tmpcrt); - SSL_CTX_add_extra_chain_cert(sslctx, tmpcrt); - } - } -@@ -1117,14 +1159,15 @@ int - ssl_key_identifier_sha1(EVP_PKEY *key, unsigned char *keyid) - { - X509_PUBKEY *pubkey = NULL; -- ASN1_BIT_STRING *pk; -+ const unsigned char *pk; -+ int length; - - /* X509_PUBKEY_set() will attempt to free pubkey if != NULL */ - if (X509_PUBKEY_set(&pubkey, key) != 1 || !pubkey) - return -1; -- if (!(pk = pubkey->public_key)) -+ if (!X509_PUBKEY_get0_param(NULL, &pk, &length, NULL, pubkey)) - goto errout; -- if (!EVP_Digest(pk->data, pk->length, keyid, NULL, EVP_sha1(), NULL)) -+ if (!EVP_Digest(pk, length, keyid, NULL, EVP_sha1(), NULL)) - goto errout; - X509_PUBKEY_free(pubkey); - return 0; -@@ -1221,10 +1264,10 @@ ssl_x509_fingerprint(X509 *crt, int colons) - void - ssl_dh_refcount_inc(DH *dh) - { --#ifdef OPENSSL_THREADS -+#if defined(OPENSSL_THREADS) && OPENSSL_VERSION_NUMBER < 0x10100000L - CRYPTO_add(&dh->references, 1, CRYPTO_LOCK_DH); - #else /* !OPENSSL_THREADS */ -- dh->references++; -+ DH_up_ref(dh); - #endif /* !OPENSSL_THREADS */ - } - #endif /* !OPENSSL_NO_DH */ -@@ -1236,10 +1279,10 @@ ssl_dh_refcount_inc(DH *dh) - void - ssl_key_refcount_inc(EVP_PKEY *key) - { --#ifdef OPENSSL_THREADS -+#if defined(OPENSSL_THREADS) && OPENSSL_VERSION_NUMBER < 0x10100000L - CRYPTO_add(&key->references, 1, CRYPTO_LOCK_EVP_PKEY); - #else /* !OPENSSL_THREADS */ -- key->references++; -+ EVP_PKEY_up_ref(key); - #endif /* !OPENSSL_THREADS */ - } - -@@ -1251,10 +1294,10 @@ ssl_key_refcount_inc(EVP_PKEY *key) - void - ssl_x509_refcount_inc(X509 *crt) - { --#ifdef OPENSSL_THREADS -+#if defined(OPENSSL_THREADS) && OPENSSL_VERSION_NUMBER < 0x10100000L - CRYPTO_add(&crt->references, 1, CRYPTO_LOCK_X509); - #else /* !OPENSSL_THREADS */ -- crt->references++; -+ X509_up_ref(crt); - #endif /* !OPENSSL_THREADS */ - } - -diff --git a/ssl.t.c b/ssl.t.c -index 997794f..9705976 100644 ---- a/ssl.t.c -+++ b/ssl.t.c -@@ -498,6 +498,10 @@ START_TEST(ssl_tls_clienthello_parse_10) - } - END_TEST - -+#if OPENSSL_VERSION_NUMBER < 0x10100000 -+#define ASN1_STRING_get0_data(value) ASN1_STRING_data(value) -+#endif -+ - START_TEST(ssl_key_identifier_sha1_01) - { - X509 *c; -@@ -515,9 +519,10 @@ START_TEST(ssl_key_identifier_sha1_01) - int loc = X509_get_ext_by_NID(c, NID_subject_key_identifier, -1); - X509_EXTENSION *ext = X509_get_ext(c, loc); - fail_unless(!!ext, "loading ext failed"); -- fail_unless(ext->value->length - 2 == SSL_KEY_IDSZ, -- "extension length mismatch"); -- fail_unless(!memcmp(ext->value->data + 2, keyid, SSL_KEY_IDSZ), -+ ASN1_STRING *value = X509_EXTENSION_get_data(ext); -+ fail_unless(ASN1_STRING_length(value) - 2 == SSL_KEY_IDSZ, -+ "extension length mismatch"); -+ fail_unless(!memcmp(ASN1_STRING_get0_data(value) + 2, keyid, SSL_KEY_IDSZ), - "key id mismatch"); - } - END_TEST Modified: PKGBUILD =================================================================== --- PKGBUILD 2018-01-25 22:23:28 UTC (rev 286971) +++ PKGBUILD 2018-01-25 22:25:53 UTC (rev 286972) @@ -1,26 +1,19 @@ # Maintainer: Levente Polyak <anthraxx[at]archlinux[dot]org> pkgname=sslsplit -pkgver=0.5.0 -pkgrel=3 -pkgdesc="Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections" -url="https://www.roe.ch/SSLsplit" +pkgver=0.5.1 +pkgrel=1 +pkgdesc='Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections' +url='https://www.roe.ch/SSLsplit' arch=('x86_64') license=('BSD') depends=('libevent' 'openssl') checkdepends=('check') -source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc} - 0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch) -sha512sums=('d8d4f294018a7a28b6e5cdec4690c5078118e1fc9c8b78d626290cdb5f2c8d2ecdbbee776a50666a99c522e9e22a15e85b5a602c412e242ec4cce64327555862' - 'SKIP' - 'b3fbde26b992c40adb15d218ce067ecc53707ed9746b3a7e166d0333543283368a0c439903d36dedfb6fd9d33599abbf0554b731a68bd2524824319e1970de56') +source=(https://mirror.roe.ch/rel/${pkgname}/${pkgname}-${pkgver}.tar.bz2{,.asc}) +sha512sums=('89f399e9efa86610ede5d4f1ebaedfe90c2da36fa7d613c92f5b1a83bc385a83fd2775f350e6f320cd637c4546a7cbb97b7a554214ccb639df047370227d8d92' + 'SKIP') validpgpkeys=('BFF9C7D7EA0EAC7F1AA55B3EFABE3324B5D3397E') # Daniel Roethlisberger <[email protected]> -prepare() { - cd ${pkgname}-${pkgver} - patch -p1 < "${srcdir}/0003-Add-fixes-for-OpenSSL-1.1-while-retaining-1.0-compat.patch" -} - build() { cd ${pkgname}-${pkgver} make @@ -34,7 +27,7 @@ package() { cd ${pkgname}-${pkgver} make PREFIX="${pkgdir}/usr" install - install -Dm 644 LICENSE.md "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" + install -Dm 644 LICENSE.md -t "${pkgdir}/usr/share/licenses/${pkgname}" install -Dm 644 README.md NEWS.md -t "${pkgdir}/usr/share/doc/${pkgname}" }
