Date: Sunday, March 5, 2023 @ 22:29:54
  Author: arojas
Revision: 1415157

archrelease: copy trunk to multilib-x86_64

Added:
  lib32-openssl/repos/multilib-x86_64/PKGBUILD
    (from rev 1415156, lib32-openssl/trunk/PKGBUILD)
  lib32-openssl/repos/multilib-x86_64/ca-dir.patch
    (from rev 1415156, lib32-openssl/trunk/ca-dir.patch)
  lib32-openssl/repos/multilib-x86_64/keys/
Deleted:
  lib32-openssl/repos/multilib-x86_64/PKGBUILD
  lib32-openssl/repos/multilib-x86_64/ca-dir.patch
  lib32-openssl/repos/multilib-x86_64/keys/

--------------+
 PKGBUILD     |  122 ++++++++++++++++++++++++++++-----------------------------
 ca-dir.patch |   62 ++++++++++++++--------------
 2 files changed, 92 insertions(+), 92 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD    2023-03-05 22:29:39 UTC (rev 1415156)
+++ PKGBUILD    2023-03-05 22:29:54 UTC (rev 1415157)
@@ -1,61 +0,0 @@
-# Maintainer: Pierre Schmitz <[email protected]>
-
-_pkgbasename=openssl
-pkgname=lib32-$_pkgbasename
-epoch=1
-pkgver=3.0.7
-pkgrel=1
-pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer 
Security (32-bit)'
-arch=('x86_64')
-url='https://www.openssl.org'
-license=('Apache')
-depends=('lib32-glibc' "${_pkgbasename}")
-optdepends=('ca-certificates')
-provides=('libcrypto.so' 'libssl.so')
-source=("https://www.openssl.org/source/${_pkgbasename}-${pkgver}.tar.gz"{,.asc}
-        'ca-dir.patch')
-sha256sums=('83049d042a260e696f62406ac5c08bf706fd84383f945cf21bd61e9ed95c396e'
-            'SKIP'
-            '0a32d9ca68e8d985ce0bfef6a4c20b46675e06178cc2d0bf6d91bd6865d648b7')
-validpgpkeys=('8657ABB260F056B1E5190839D9C4D26D0E604491'
-              '7953AC1FBC3DC8B3B292393ED5E9E43F7DF9EE8C'
-              'A21FAB74B0088AA361152586B8EF1A6BA9DA2D5C')
-
-prepare() {
-       cd "$srcdir"/$_pkgbasename-$pkgver
-
-       # set ca dir to /etc/ssl by default
-       patch -Np1 -i "$srcdir"/ca-dir.patch
-}
-
-build() {
-       export CC="gcc -m32"
-       export CXX="g++ -m32"
-       export PKG_CONFIG_PATH="/usr/lib32/pkgconfig"
-
-       cd "$srcdir"/$_pkgbasename-$pkgver
-
-       # mark stack as non-executable: http://bugs.archlinux.org/task/12434
-       ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib32 \
-               shared enable-ktls linux-elf \
-               "-Wa,--noexecstack ${CPPFLAGS} ${CFLAGS} ${LDFLAGS}"
-
-       make MAKEDEPPROG="${CC}" depend
-       make
-}
-
-check() {
-       cd "$srcdir"/$_pkgbasename-$pkgver
-       # the test fails due to missing write permissions in /etc/ssl
-       # revert this patch for make test
-       patch -Rp1 -i "$srcdir"/ca-dir.patch
-       make test
-       patch -Np1 -i "$srcdir"/ca-dir.patch
-}
-
-package() {
-       cd "$srcdir"/$_pkgbasename-$pkgver
-       make DESTDIR="$pkgdir" install_sw
-
-       rm -r "$pkgdir"/usr/{include,bin}
-}

Copied: lib32-openssl/repos/multilib-x86_64/PKGBUILD (from rev 1415156, 
lib32-openssl/trunk/PKGBUILD)
===================================================================
--- PKGBUILD                            (rev 0)
+++ PKGBUILD    2023-03-05 22:29:54 UTC (rev 1415157)
@@ -0,0 +1,61 @@
+# Maintainer: Pierre Schmitz <[email protected]>
+
+_pkgbasename=openssl
+pkgname=lib32-$_pkgbasename
+epoch=1
+pkgver=3.0.8
+pkgrel=1
+pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer 
Security (32-bit)'
+arch=('x86_64')
+url='https://www.openssl.org'
+license=('Apache')
+depends=('lib32-glibc' "${_pkgbasename}")
+optdepends=('ca-certificates')
+provides=('libcrypto.so' 'libssl.so')
+source=("https://www.openssl.org/source/${_pkgbasename}-${pkgver}.tar.gz"{,.asc}
+        'ca-dir.patch')
+sha256sums=('6c13d2bf38fdf31eac3ce2a347073673f5d63263398f1f69d0df4a41253e4b3e'
+            'SKIP'
+            '0a32d9ca68e8d985ce0bfef6a4c20b46675e06178cc2d0bf6d91bd6865d648b7')
+validpgpkeys=('8657ABB260F056B1E5190839D9C4D26D0E604491'
+              '7953AC1FBC3DC8B3B292393ED5E9E43F7DF9EE8C'
+              'A21FAB74B0088AA361152586B8EF1A6BA9DA2D5C')
+
+prepare() {
+       cd "$srcdir"/$_pkgbasename-$pkgver
+
+       # set ca dir to /etc/ssl by default
+       patch -Np1 -i "$srcdir"/ca-dir.patch
+}
+
+build() {
+       export CC="gcc -m32"
+       export CXX="g++ -m32"
+       export PKG_CONFIG_PATH="/usr/lib32/pkgconfig"
+
+       cd "$srcdir"/$_pkgbasename-$pkgver
+
+       # mark stack as non-executable: http://bugs.archlinux.org/task/12434
+       ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib32 \
+               shared enable-ktls linux-elf \
+               "-Wa,--noexecstack ${CPPFLAGS} ${CFLAGS} ${LDFLAGS}"
+
+       make MAKEDEPPROG="${CC}" depend
+       make
+}
+
+check() {
+       cd "$srcdir"/$_pkgbasename-$pkgver
+       # the test fails due to missing write permissions in /etc/ssl
+       # revert this patch for make test
+       patch -Rp1 -i "$srcdir"/ca-dir.patch
+       make test
+       patch -Np1 -i "$srcdir"/ca-dir.patch
+}
+
+package() {
+       cd "$srcdir"/$_pkgbasename-$pkgver
+       make DESTDIR="$pkgdir" install_sw
+
+       rm -r "$pkgdir"/usr/{include,bin}
+}

Deleted: ca-dir.patch
===================================================================
--- ca-dir.patch        2023-03-05 22:29:39 UTC (rev 1415156)
+++ ca-dir.patch        2023-03-05 22:29:54 UTC (rev 1415157)
@@ -1,31 +0,0 @@
---- a/apps/CA.pl.in
-+++ b/apps/CA.pl.in
-@@ -29,7 +29,7 @@
- my $PKCS12 = "$openssl pkcs12";
- 
- # Default values for various configuration settings.
--my $CATOP = "./demoCA";
-+my $CATOP = "/etc/ssl";
- my $CAKEY = "cakey.pem";
- my $CAREQ = "careq.pem";
- my $CACERT = "cacert.pem";
---- a/apps/openssl.cnf
-+++ b/apps/openssl.cnf
-@@ -79,7 +79,7 @@
- ####################################################################
- [ CA_default ]
- 
--dir           = ./demoCA              # Where everything is kept
-+dir           = /etc/ssl              # Where everything is kept
- certs         = $dir/certs            # Where the issued certs are kept
- crl_dir               = $dir/crl              # Where the issued crl are kept
- database      = $dir/index.txt        # database index file.
-@@ -309,7 +309,7 @@
- [ tsa_config1 ]
- 
- # These are used by the TSA reply generation only.
--dir           = ./demoCA              # TSA root directory
-+dir           = /etc/ssl              # TSA root directory
- serial                = $dir/tsaserial        # The current serial number 
(mandatory)
- crypto_device = builtin               # OpenSSL engine to use for signing
- signer_cert   = $dir/tsacert.pem      # The TSA signing certificate

Copied: lib32-openssl/repos/multilib-x86_64/ca-dir.patch (from rev 1415156, 
lib32-openssl/trunk/ca-dir.patch)
===================================================================
--- ca-dir.patch                                (rev 0)
+++ ca-dir.patch        2023-03-05 22:29:54 UTC (rev 1415157)
@@ -0,0 +1,31 @@
+--- a/apps/CA.pl.in
++++ b/apps/CA.pl.in
+@@ -29,7 +29,7 @@
+ my $PKCS12 = "$openssl pkcs12";
+ 
+ # Default values for various configuration settings.
+-my $CATOP = "./demoCA";
++my $CATOP = "/etc/ssl";
+ my $CAKEY = "cakey.pem";
+ my $CAREQ = "careq.pem";
+ my $CACERT = "cacert.pem";
+--- a/apps/openssl.cnf
++++ b/apps/openssl.cnf
+@@ -79,7 +79,7 @@
+ ####################################################################
+ [ CA_default ]
+ 
+-dir           = ./demoCA              # Where everything is kept
++dir           = /etc/ssl              # Where everything is kept
+ certs         = $dir/certs            # Where the issued certs are kept
+ crl_dir               = $dir/crl              # Where the issued crl are kept
+ database      = $dir/index.txt        # database index file.
+@@ -309,7 +309,7 @@
+ [ tsa_config1 ]
+ 
+ # These are used by the TSA reply generation only.
+-dir           = ./demoCA              # TSA root directory
++dir           = /etc/ssl              # TSA root directory
+ serial                = $dir/tsaserial        # The current serial number 
(mandatory)
+ crypto_device = builtin               # OpenSSL engine to use for signing
+ signer_cert   = $dir/tsacert.pem      # The TSA signing certificate

Reply via email to