summaryrefslogtreecommitdiffstats
path: root/abs/core/openssl/PKGBUILD
diff options
context:
space:
mode:
Diffstat (limited to 'abs/core/openssl/PKGBUILD')
-rw-r--r--abs/core/openssl/PKGBUILD50
1 files changed, 33 insertions, 17 deletions
diff --git a/abs/core/openssl/PKGBUILD b/abs/core/openssl/PKGBUILD
index 9853a57..29fd885 100644
--- a/abs/core/openssl/PKGBUILD
+++ b/abs/core/openssl/PKGBUILD
@@ -1,11 +1,12 @@
-# $Id: PKGBUILD 81714 2010-06-02 11:00:36Z pierre $
+# $Id: PKGBUILD 158833 2012-05-11 23:33:03Z pierre $
# Maintainer: Pierre Schmitz <pierre@archlinux.de>
pkgname=openssl
-_ver=1.0.0a
+_ver=1.0.1c
# use a pacman compatible version scheme
pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}}
-pkgrel=2
+#pkgver=$_ver
+pkgrel=1
pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security'
arch=('i686' 'x86_64')
url='https://www.openssl.org'
@@ -15,38 +16,53 @@ optdepends=('ca-certificates')
options=('!makeflags')
backup=('etc/ssl/openssl.cnf')
source=("https://www.openssl.org/source/${pkgname}-${_ver}.tar.gz"
+ "https://www.openssl.org/source/${pkgname}-${_ver}.tar.gz.asc"
'fix-manpages.patch'
'no-rpath.patch'
'ca-dir.patch')
-md5sums=('e3873edfffc783624cfbdb65e2249cbd'
- 'f540cd9e0e3047d589d0581fe7a2d0f2'
+md5sums=('ae412727c8c15b67880aef7bd2999b2e'
+ 'a3d90bc42253def61cd1c4237f1ce5f7'
+ '5bbc0655bda2af95bc8eb568963ce8ba'
'dc78d3d06baffc16217519242ce92478'
'3bf51be3a1bbd262be46dc619f92aa90')
-# keep an upgrade path for older installations
-PKGEXT='.pkg.tar.gz'
-
build() {
cd $srcdir/$pkgname-$_ver
+ if [ "${CARCH}" == 'x86_64' ]; then
+ openssltarget='linux-x86_64'
+ optflags='enable-ec_nistp_64_gcc_128'
+ elif [ "${CARCH}" == 'i686' ]; then
+ openssltarget='linux-elf'
+ optflags=''
+ fi
+
# avoid conflicts with other man pages
# see http://www.linuxfromscratch.org/patches/downloads/openssl/
- patch -p0 -i $srcdir/fix-manpages.patch || return 1
+ patch -p1 -i $srcdir/fix-manpages.patch
# remove rpath: http://bugs.archlinux.org/task/14367
- patch -p0 -i $srcdir/no-rpath.patch || return 1
+ patch -p0 -i $srcdir/no-rpath.patch
# set ca dir to /etc/ssl by default
- patch -p0 -i $srcdir/ca-dir.patch || return 1
+ patch -p0 -i $srcdir/ca-dir.patch
# mark stack as non-executable: http://bugs.archlinux.org/task/12434
- ./config --prefix=/usr --openssldir=/etc/ssl --libdir=lib \
- shared zlib enable-md2 -Wa,--noexecstack || return 1
+ # workaround for PR#2771: OPENSSL_NO_TLS1_2_CLIENT
+ ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib \
+ shared zlib enable-md2 ${optflags} \
+ "${openssltarget}" \
+ -Wa,--noexecstack "${CFLAGS}" "${LDFLAGS}" \
+ -DOPENSSL_NO_TLS1_2_CLIENT
- make || return 1
+ make depend
+ make
+}
+check() {
+ cd $srcdir/$pkgname-$_ver
# the test fails due to missing write permissions in /etc/ssl
# revert this patch for make test
- #patch -p0 -R -i $srcdir/ca-dir.patch
- #make test || return 1
- #patch -p0 -i $srcdir/ca-dir.patch
+ patch -p0 -R -i $srcdir/ca-dir.patch
+ make test
+ patch -p0 -i $srcdir/ca-dir.patch
}
package() {