[arch-commits] Commit in lib32-openssl/repos (3 files)
Date: Tuesday, April 21, 2020 @ 14:46:16 Author: jelle Revision: 617366 archrelease: copy trunk to multilib-testing-x86_64 Added: lib32-openssl/repos/multilib-testing-x86_64/ lib32-openssl/repos/multilib-testing-x86_64/PKGBUILD (from rev 617365, lib32-openssl/trunk/PKGBUILD) lib32-openssl/repos/multilib-testing-x86_64/ca-dir.patch (from rev 617365, lib32-openssl/trunk/ca-dir.patch) --+ PKGBUILD | 63 + ca-dir.patch | 31 2 files changed, 94 insertions(+) Copied: lib32-openssl/repos/multilib-testing-x86_64/PKGBUILD (from rev 617365, lib32-openssl/trunk/PKGBUILD) === --- multilib-testing-x86_64/PKGBUILD(rev 0) +++ multilib-testing-x86_64/PKGBUILD2020-04-21 14:46:16 UTC (rev 617366) @@ -0,0 +1,63 @@ +# Maintainer: Pierre Schmitz + +_pkgbasename=openssl +pkgname=lib32-$_pkgbasename +epoch=1 +_ver=1.1.1g +# use a pacman compatible version scheme +pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}} +pkgrel=1 +pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security (32-bit)' +arch=('x86_64') +url='https://www.openssl.org' +license=('custom:BSD') +depends=('lib32-glibc' "${_pkgbasename}") +optdepends=('ca-certificates') +source=("https://www.openssl.org/source/${_pkgbasename}-${_ver}.tar.gz"{,.asc} +'ca-dir.patch') +sha256sums=('ddb04774f1e32f0c49751e21b67216ac87852ceb056b75209af2443400636d46' +'SKIP' +'0938c8d68110768db4f350a7ec641070686904f2fe7ba630ac94399d7dc8cc5e') +validpgpkeys=('8657ABB260F056B1E5190839D9C4D26D0E604491' + '7953AC1FBC3DC8B3B292393ED5E9E43F7DF9EE8C') + +prepare() { + cd "$srcdir"/$_pkgbasename-$_ver + + # set ca dir to /etc/ssl by default + patch -p0 -i "$srcdir"/ca-dir.patch +} + +build() { + export CC="gcc -m32" + export CXX="g++ -m32" + export PKG_CONFIG_PATH="/usr/lib32/pkgconfig" + + cd "$srcdir"/$_pkgbasename-$_ver + + # mark stack as non-executable: http://bugs.archlinux.org/task/12434 + ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib32 \ + shared no-ssl3-method linux-elf \ + "-Wa,--noexecstack ${CPPFLAGS} ${CFLAGS} ${LDFLAGS}" + + make MAKEDEPPROG="${CC}" depend + make +} + +check() { + cd "$srcdir"/$_pkgbasename-$_ver + # the test fails due to missing write permissions in /etc/ssl + # revert this patch for make test + patch -p0 -R -i "$srcdir"/ca-dir.patch + make test + patch -p0 -i "$srcdir"/ca-dir.patch +} + +package() { + cd "$srcdir"/$_pkgbasename-$_ver + make DESTDIR="$pkgdir" install_sw + + rm -rf ${pkgdir}/{usr/{include,bin},etc} + mkdir -p "$pkgdir"/usr/share/licenses + ln -s $_pkgbasename "$pkgdir"/usr/share/licenses/$pkgname +} Copied: lib32-openssl/repos/multilib-testing-x86_64/ca-dir.patch (from rev 617365, lib32-openssl/trunk/ca-dir.patch) === --- multilib-testing-x86_64/ca-dir.patch(rev 0) +++ multilib-testing-x86_64/ca-dir.patch2020-04-21 14:46:16 UTC (rev 617366) @@ -0,0 +1,31 @@ +--- apps/CA.pl.in 2018-09-11 14:48:19.0 +0200 apps/CA.pl.in 2018-09-11 16:16:32.125629435 +0200 +@@ -33,7 +33,7 @@ + my $PKCS12 = "$openssl pkcs12"; + + # default openssl.cnf file has setup as per the following +-my $CATOP = "./demoCA"; ++my $CATOP = "/etc/ssl"; + my $CAKEY = "cakey.pem"; + my $CAREQ = "careq.pem"; + my $CACERT = "cacert.pem"; +--- apps/openssl.cnf 2018-09-11 14:48:20.0 +0200 apps/openssl.cnf 2018-09-11 16:16:32.125629435 +0200 +@@ -43,7 +43,7 @@ + + [ CA_default ] + +-dir = ./demoCA # Where everything is kept ++dir = /etc/ssl # Where everything is kept + certs = $dir/certs# Where the issued certs are kept + crl_dir = $dir/crl # Where the issued crl are kept + database = $dir/index.txt# database index file. +@@ -327,7 +327,7 @@ + [ tsa_config1 ] + + # These are used by the TSA reply generation only. +-dir = ./demoCA # TSA root directory ++dir = /etc/ssl # TSA root directory + serial= $dir/tsaserial# The current serial number (mandatory) + crypto_device = builtin # OpenSSL engine to use for signing + signer_cert = $dir/tsacert.pem # The TSA signing certificate
[arch-commits] Commit in lib32-openssl/repos (3 files)
Date: Tuesday, November 20, 2018 @ 18:09:39 Author: pierre Revision: 409190 archrelease: copy trunk to multilib-testing-x86_64 Added: lib32-openssl/repos/multilib-testing-x86_64/ lib32-openssl/repos/multilib-testing-x86_64/PKGBUILD (from rev 409189, lib32-openssl/trunk/PKGBUILD) lib32-openssl/repos/multilib-testing-x86_64/ca-dir.patch (from rev 409189, lib32-openssl/trunk/ca-dir.patch) --+ PKGBUILD | 62 + ca-dir.patch | 31 2 files changed, 93 insertions(+) Copied: lib32-openssl/repos/multilib-testing-x86_64/PKGBUILD (from rev 409189, lib32-openssl/trunk/PKGBUILD) === --- multilib-testing-x86_64/PKGBUILD(rev 0) +++ multilib-testing-x86_64/PKGBUILD2018-11-20 18:09:39 UTC (rev 409190) @@ -0,0 +1,62 @@ +# Maintainer: Pierre Schmitz + +_pkgbasename=openssl +pkgname=lib32-$_pkgbasename +epoch=1 +_ver=1.1.1a +# use a pacman compatible version scheme +pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}} +pkgrel=1 +pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security (32-bit)' +arch=('x86_64') +url='https://www.openssl.org' +license=('custom:BSD') +depends=('lib32-glibc' "${_pkgbasename}") +optdepends=('ca-certificates') +source=("https://www.openssl.org/source/${_pkgbasename}-${_ver}.tar.gz"{,.asc} +'ca-dir.patch') +sha256sums=('fc20130f8b7cbd2fb918b2f14e2f429e109c31ddd0fb38fc5d71d9ffed3f9f41' +'SKIP' +'0938c8d68110768db4f350a7ec641070686904f2fe7ba630ac94399d7dc8cc5e') +validpgpkeys=('8657ABB260F056B1E5190839D9C4D26D0E604491') + +prepare() { + cd "$srcdir"/$_pkgbasename-$_ver + + # set ca dir to /etc/ssl by default + patch -p0 -i "$srcdir"/ca-dir.patch +} + +build() { + export CC="gcc -m32" + export CXX="g++ -m32" + export PKG_CONFIG_PATH="/usr/lib32/pkgconfig" + + cd "$srcdir"/$_pkgbasename-$_ver + + # mark stack as non-executable: http://bugs.archlinux.org/task/12434 + ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib32 \ + shared no-ssl3-method linux-elf \ + "-Wa,--noexecstack ${CPPFLAGS} ${CFLAGS} ${LDFLAGS}" + + make MAKEDEPPROG="${CC}" depend + make +} + +check() { + cd "$srcdir"/$_pkgbasename-$_ver + # the test fails due to missing write permissions in /etc/ssl + # revert this patch for make test + patch -p0 -R -i "$srcdir"/ca-dir.patch + make test + patch -p0 -i "$srcdir"/ca-dir.patch +} + +package() { + cd "$srcdir"/$_pkgbasename-$_ver + make DESTDIR="$pkgdir" install_sw + + rm -rf ${pkgdir}/{usr/{include,bin},etc} + mkdir -p "$pkgdir"/usr/share/licenses + ln -s $_pkgbasename "$pkgdir"/usr/share/licenses/$pkgname +} Copied: lib32-openssl/repos/multilib-testing-x86_64/ca-dir.patch (from rev 409189, lib32-openssl/trunk/ca-dir.patch) === --- multilib-testing-x86_64/ca-dir.patch(rev 0) +++ multilib-testing-x86_64/ca-dir.patch2018-11-20 18:09:39 UTC (rev 409190) @@ -0,0 +1,31 @@ +--- apps/CA.pl.in 2018-09-11 14:48:19.0 +0200 apps/CA.pl.in 2018-09-11 16:16:32.125629435 +0200 +@@ -33,7 +33,7 @@ + my $PKCS12 = "$openssl pkcs12"; + + # default openssl.cnf file has setup as per the following +-my $CATOP = "./demoCA"; ++my $CATOP = "/etc/ssl"; + my $CAKEY = "cakey.pem"; + my $CAREQ = "careq.pem"; + my $CACERT = "cacert.pem"; +--- apps/openssl.cnf 2018-09-11 14:48:20.0 +0200 apps/openssl.cnf 2018-09-11 16:16:32.125629435 +0200 +@@ -43,7 +43,7 @@ + + [ CA_default ] + +-dir = ./demoCA # Where everything is kept ++dir = /etc/ssl # Where everything is kept + certs = $dir/certs# Where the issued certs are kept + crl_dir = $dir/crl # Where the issued crl are kept + database = $dir/index.txt# database index file. +@@ -327,7 +327,7 @@ + [ tsa_config1 ] + + # These are used by the TSA reply generation only. +-dir = ./demoCA # TSA root directory ++dir = /etc/ssl # TSA root directory + serial= $dir/tsaserial# The current serial number (mandatory) + crypto_device = builtin # OpenSSL engine to use for signing + signer_cert = $dir/tsacert.pem # The TSA signing certificate
[arch-commits] Commit in lib32-openssl/repos (3 files)
Date: Wednesday, September 12, 2018 @ 07:15:07 Author: pierre Revision: 379782 archrelease: copy trunk to multilib-testing-x86_64 Added: lib32-openssl/repos/multilib-testing-x86_64/ lib32-openssl/repos/multilib-testing-x86_64/PKGBUILD (from rev 379781, lib32-openssl/trunk/PKGBUILD) lib32-openssl/repos/multilib-testing-x86_64/ca-dir.patch (from rev 379781, lib32-openssl/trunk/ca-dir.patch) --+ PKGBUILD | 62 + ca-dir.patch | 31 2 files changed, 93 insertions(+) Copied: lib32-openssl/repos/multilib-testing-x86_64/PKGBUILD (from rev 379781, lib32-openssl/trunk/PKGBUILD) === --- multilib-testing-x86_64/PKGBUILD(rev 0) +++ multilib-testing-x86_64/PKGBUILD2018-09-12 07:15:07 UTC (rev 379782) @@ -0,0 +1,62 @@ +# Maintainer: Pierre Schmitz + +_pkgbasename=openssl +pkgname=lib32-$_pkgbasename +epoch=1 +_ver=1.1.1 +# use a pacman compatible version scheme +pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}} +pkgrel=1 +pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security (32-bit)' +arch=('x86_64') +url='https://www.openssl.org' +license=('custom:BSD') +depends=('lib32-glibc' "${_pkgbasename}") +optdepends=('ca-certificates') +source=("https://www.openssl.org/source/${_pkgbasename}-${_ver}.tar.gz"{,.asc} +'ca-dir.patch') +sha256sums=('2836875a0f89c03d0fdf483941512613a50cfb421d6fd94b9f41d7279d586a3d' +'SKIP' +'0938c8d68110768db4f350a7ec641070686904f2fe7ba630ac94399d7dc8cc5e') +validpgpkeys=('8657ABB260F056B1E5190839D9C4D26D0E604491') + +prepare() { + cd "$srcdir"/$_pkgbasename-$_ver + + # set ca dir to /etc/ssl by default + patch -p0 -i "$srcdir"/ca-dir.patch +} + +build() { + export CC="gcc -m32" + export CXX="g++ -m32" + export PKG_CONFIG_PATH="/usr/lib32/pkgconfig" + + cd "$srcdir"/$_pkgbasename-$_ver + + # mark stack as non-executable: http://bugs.archlinux.org/task/12434 + ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib32 \ + shared no-ssl3-method linux-elf \ + "-Wa,--noexecstack ${CPPFLAGS} ${CFLAGS} ${LDFLAGS}" + + make MAKEDEPPROG="${CC}" depend + make +} + +check() { + cd "$srcdir"/$_pkgbasename-$_ver + # the test fails due to missing write permissions in /etc/ssl + # revert this patch for make test + patch -p0 -R -i "$srcdir"/ca-dir.patch + make test + patch -p0 -i "$srcdir"/ca-dir.patch +} + +package() { + cd "$srcdir"/$_pkgbasename-$_ver + make DESTDIR="$pkgdir" install_sw + + rm -rf ${pkgdir}/{usr/{include,bin},etc} + mkdir -p "$pkgdir"/usr/share/licenses + ln -s $_pkgbasename "$pkgdir"/usr/share/licenses/$pkgname +} Copied: lib32-openssl/repos/multilib-testing-x86_64/ca-dir.patch (from rev 379781, lib32-openssl/trunk/ca-dir.patch) === --- multilib-testing-x86_64/ca-dir.patch(rev 0) +++ multilib-testing-x86_64/ca-dir.patch2018-09-12 07:15:07 UTC (rev 379782) @@ -0,0 +1,31 @@ +--- apps/CA.pl.in 2018-09-11 14:48:19.0 +0200 apps/CA.pl.in 2018-09-11 16:16:32.125629435 +0200 +@@ -33,7 +33,7 @@ + my $PKCS12 = "$openssl pkcs12"; + + # default openssl.cnf file has setup as per the following +-my $CATOP = "./demoCA"; ++my $CATOP = "/etc/ssl"; + my $CAKEY = "cakey.pem"; + my $CAREQ = "careq.pem"; + my $CACERT = "cacert.pem"; +--- apps/openssl.cnf 2018-09-11 14:48:20.0 +0200 apps/openssl.cnf 2018-09-11 16:16:32.125629435 +0200 +@@ -43,7 +43,7 @@ + + [ CA_default ] + +-dir = ./demoCA # Where everything is kept ++dir = /etc/ssl # Where everything is kept + certs = $dir/certs# Where the issued certs are kept + crl_dir = $dir/crl # Where the issued crl are kept + database = $dir/index.txt# database index file. +@@ -327,7 +327,7 @@ + [ tsa_config1 ] + + # These are used by the TSA reply generation only. +-dir = ./demoCA # TSA root directory ++dir = /etc/ssl # TSA root directory + serial= $dir/tsaserial# The current serial number (mandatory) + crypto_device = builtin # OpenSSL engine to use for signing + signer_cert = $dir/tsacert.pem # The TSA signing certificate
[arch-commits] Commit in lib32-openssl/repos (3 files)
Date: Monday, March 13, 2017 @ 03:38:43 Author: foutrelis Revision: 215997 archrelease: copy trunk to multilib-staging-x86_64 Added: lib32-openssl/repos/multilib-staging-x86_64/ lib32-openssl/repos/multilib-staging-x86_64/PKGBUILD (from rev 215996, lib32-openssl/trunk/PKGBUILD) lib32-openssl/repos/multilib-staging-x86_64/ca-dir.patch (from rev 215996, lib32-openssl/trunk/ca-dir.patch) --+ PKGBUILD | 67 + ca-dir.patch | 31 ++ 2 files changed, 98 insertions(+) Copied: lib32-openssl/repos/multilib-staging-x86_64/PKGBUILD (from rev 215996, lib32-openssl/trunk/PKGBUILD) === --- multilib-staging-x86_64/PKGBUILD(rev 0) +++ multilib-staging-x86_64/PKGBUILD2017-03-13 03:38:43 UTC (rev 215997) @@ -0,0 +1,67 @@ +# $Id$ +# Maintainer: Pierre Schmitz+ +_pkgbasename=openssl +pkgname=lib32-$_pkgbasename +_ver=1.1.0e +# use a pacman compatible version scheme +pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}} +#pkgver=$_ver +pkgrel=1 +epoch=1 +pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security (32-bit)' +arch=('x86_64') +url='https://www.openssl.org' +license=('custom:BSD') +depends=('lib32-glibc' "${_pkgbasename}") +optdepends=('ca-certificates') +makedepends=('gcc-multilib') +source=("https://www.openssl.org/source/${_pkgbasename}-${_ver}.tar.gz; +"https://www.openssl.org/source/${_pkgbasename}-${_ver}.tar.gz.asc; +'ca-dir.patch') +validpgpkeys=(8657ABB260F056B1E5190839D9C4D26D0E604491) +md5sums=('51c42d152122e474754aea96f66928c6' + 'SKIP' + '02b53865fb70faef763e262b4971aa4b') + +prepare() { + cd $srcdir/$_pkgbasename-$_ver + + # set ca dir to /etc/ssl by default + patch -p0 -i $srcdir/ca-dir.patch +} + +build() { + export CC="gcc -m32" + export CXX="g++ -m32" + export PKG_CONFIG_PATH="/usr/lib32/pkgconfig" + + cd $srcdir/$_pkgbasename-$_ver + + # mark stack as non-executable: http://bugs.archlinux.org/task/12434 + ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib32 \ + shared no-ssl3-method \ + linux-elf \ + "-Wa,--noexecstack ${CPPFLAGS} ${CFLAGS} ${LDFLAGS}" + + make MAKEDEPPROG="${CC}" depend + make +} + +check() { + cd $srcdir/$_pkgbasename-$_ver + # the test fails due to missing write permissions in /etc/ssl + # revert this patch for make test + patch -p0 -R -i $srcdir/ca-dir.patch + make test + patch -p0 -i $srcdir/ca-dir.patch +} + +package() { + cd $srcdir/$_pkgbasename-$_ver + make DESTDIR=$pkgdir install_sw + + rm -rf ${pkgdir}/{usr/{include,bin},etc} + mkdir -p $pkgdir/usr/share/licenses + ln -s $_pkgbasename $pkgdir/usr/share/licenses/$pkgname +} Copied: lib32-openssl/repos/multilib-staging-x86_64/ca-dir.patch (from rev 215996, lib32-openssl/trunk/ca-dir.patch) === --- multilib-staging-x86_64/ca-dir.patch(rev 0) +++ multilib-staging-x86_64/ca-dir.patch2017-03-13 03:38:43 UTC (rev 215997) @@ -0,0 +1,31 @@ +--- apps/CA.pl.in 2016-09-26 11:46:04.0 +0200 apps/CA.pl.in 2016-11-01 16:02:16.709616823 +0100 +@@ -33,7 +33,7 @@ + my $PKCS12 = "$openssl pkcs12"; + + # default openssl.cnf file has setup as per the following +-my $CATOP = "./demoCA"; ++my $CATOP = "/etc/ssl"; + my $CAKEY = "cakey.pem"; + my $CAREQ = "careq.pem"; + my $CACERT = "cacert.pem"; +--- apps/openssl.cnf 2016-09-26 11:46:04.0 +0200 apps/openssl.cnf 2016-11-01 16:02:48.378503427 +0100 +@@ -39,7 +39,7 @@ + + [ CA_default ] + +-dir = ./demoCA # Where everything is kept ++dir = /etc/ssl # Where everything is kept + certs = $dir/certs# Where the issued certs are kept + crl_dir = $dir/crl # Where the issued crl are kept + database = $dir/index.txt# database index file. +@@ -323,7 +323,7 @@ + [ tsa_config1 ] + + # These are used by the TSA reply generation only. +-dir = ./demoCA # TSA root directory ++dir = /etc/ssl # TSA root directory + serial= $dir/tsaserial# The current serial number (mandatory) + crypto_device = builtin # OpenSSL engine to use for signing + signer_cert = $dir/tsacert.pem # The TSA signing certificate