diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/ChangeLog b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/ChangeLog new file mode 100644 index 0000000000..c8b7f12cfb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/ChangeLog @@ -0,0 +1,1915 @@ +# ChangeLog for dev-libs/openssl +# Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/ChangeLog,v 1.470 2013/02/03 23:44:01 ago Exp $ + + 03 Feb 2013; Agostino Sarubbo openssl-1.0.1c.ebuild: + Stable for ia64, wrt bug #454566 + + 03 Feb 2013; Agostino Sarubbo openssl-1.0.1c.ebuild: + Stable for arm, wrt bug #454566 + + 31 Jan 2013; Agostino Sarubbo openssl-1.0.1c.ebuild: + Stable for ppc, wrt bug #454566 + + 31 Jan 2013; Agostino Sarubbo openssl-1.0.1c.ebuild: + Stable for ppc64, wrt bug #454566 + + 30 Jan 2013; Jeroen Roovers openssl-1.0.1c.ebuild: + Stable for HPPA (bug #454566). + + 30 Jan 2013; Agostino Sarubbo openssl-1.0.1c.ebuild: + Stable for x86, wrt bug #454566 + + 30 Jan 2013; Agostino Sarubbo openssl-1.0.1c.ebuild: + Stable for amd64, wrt bug #454566 + + 25 May 2012; Mike Frysinger openssl-0.9.8u.ebuild, + openssl-0.9.8v.ebuild, openssl-0.9.8w.ebuild, openssl-0.9.8x.ebuild, + openssl-1.0.0h.ebuild, openssl-1.0.0i.ebuild, openssl-1.0.0j.ebuild, + openssl-1.0.1a.ebuild, openssl-1.0.1b.ebuild, openssl-1.0.1c.ebuild: + Inherit multilib for get_libdir. + + 20 May 2012; Mike Frysinger -openssl-0.9.8r.ebuild, + -openssl-0.9.8s-r1.ebuild, -openssl-0.9.8s.ebuild, -openssl-0.9.8t.ebuild, + -openssl-1.0.0d.ebuild, -openssl-1.0.0e-r1.ebuild, -openssl-1.0.0e.ebuild, + -openssl-1.0.0f-r1.ebuild, -openssl-1.0.0f.ebuild, -openssl-1.0.0g.ebuild, + -openssl-1.0.1.ebuild, openssl-1.0.0h.ebuild, openssl-1.0.0i.ebuild, + openssl-1.0.0j.ebuild, openssl-1.0.1a.ebuild, openssl-1.0.1b.ebuild, + openssl-1.0.1c.ebuild: + Have c_rehash default to /etc/ssl #416717 by Marc Schiffbauer. + + 13 May 2012; Mark Loeser openssl-1.0.0j.ebuild: + Stable for ppc/ppc64; bug #415435 + + 13 May 2012; Agostino Sarubbo openssl-1.0.0j.ebuild: + Stable for amd64, wrt bug #415435 + + 13 May 2012; Agostino Sarubbo openssl-0.9.8x.ebuild: + Stable for amd64, wrt bug #415435 + + 12 May 2012; Raúl Porcel openssl-1.0.0j.ebuild: + arm/ia64/m68k/s390/sh/sparc stable wrt #415435 + + 12 May 2012; Jeroen Roovers openssl-1.0.0j.ebuild: + Stable for HPPA (bug #415435). + + 12 May 2012; Tobias Klausmann openssl-1.0.0j.ebuild: + Stable on alpha, bug #415435 + + 11 May 2012; Jeff Horelick openssl-0.9.8x.ebuild, + openssl-1.0.0j.ebuild: + marked x86 per bug 415435 + +*openssl-1.0.1c (10 May 2012) +*openssl-1.0.0j (10 May 2012) +*openssl-0.9.8x (10 May 2012) + + 10 May 2012; Mike Frysinger +openssl-0.9.8x.ebuild, + +openssl-1.0.0j.ebuild, +openssl-1.0.1c.ebuild: + Version bumps. + + 10 May 2012; Brent Baude openssl-0.9.8v.ebuild, + openssl-1.0.0i.ebuild: + Marking openssl-0.9.8v and openssl-1.0.0i ppc64 for 412643 + + 29 Apr 2012; Jeff Horelick openssl-0.9.8w.ebuild: + marked x86 per bug 412643 + + 28 Apr 2012; openssl-1.0.0i.ebuild: + ppc stable #412643 + + 28 Apr 2012; Agostino Sarubbo openssl-0.9.8w.ebuild: + Stable for amd64, wrt bug #412643 + +*openssl-1.0.1b (26 Apr 2012) + + 26 Apr 2012; Mike Frysinger +openssl-1.0.1b.ebuild: + Version bump. + + 26 Apr 2012; Alexis Ballier openssl-1.0.1a.ebuild: + keyword ~amd64-fbsd + + 26 Apr 2012; Mike Frysinger + +files/openssl-1.0.1a-hmac-ia32cap.patch, openssl-1.0.1a.ebuild: + Add fix from upstream for building on non-x86 arches #413559 by Petr Pisar. + +*openssl-0.9.8w (24 Apr 2012) + + 24 Apr 2012; Mike Frysinger +openssl-0.9.8w.ebuild: + Version bump. + + 21 Apr 2012; Raúl Porcel openssl-1.0.0i.ebuild: + alpha/arm/ia64/m68k/s390/sh/sparc stable wrt #412643 + + 20 Apr 2012; Mike Frysinger openssl-1.0.1a.ebuild: + Unmask now that openssh/neon fixes are in place. + + 19 Apr 2012; Jeff Horelick openssl-0.9.8v.ebuild, + openssl-1.0.0i.ebuild: + marked amd64 per security bug 412643 + + 19 Apr 2012; Jeff Horelick openssl-0.9.8v.ebuild, + openssl-1.0.0i.ebuild: + marked x86 per security bug 412643 + + 19 Apr 2012; Jeroen Roovers openssl-1.0.0i.ebuild: + Stable for HPPA (bug #412643). + +*openssl-1.0.1a (19 Apr 2012) +*openssl-1.0.0i (19 Apr 2012) +*openssl-0.9.8v (19 Apr 2012) + + 19 Apr 2012; Mike Frysinger +openssl-0.9.8v.ebuild, + +openssl-1.0.0i.ebuild, +openssl-1.0.1a.ebuild: + Version bump #412643 by Hanno Boeck. + + 29 Mar 2012; Mike Frysinger openssl-1.0.1.ebuild, + +files/openssl-1.0.1-ipv6.patch: + Add ipv6 patch. + + 19 Mar 2012; Mike Frysinger + files/openssl-1.0.1-parallel-build.patch: + Fix logic bug in parallel build so symlinks get generated #408381 by venom00. + + 17 Mar 2012; Raúl Porcel openssl-1.0.0h.ebuild: + alpha/arm/ia64/m68k/s390/sh/sparc/x86 stable wrt #406199 + + 15 Mar 2012; Pawel Hajdan jr openssl-0.9.8u.ebuild: + x86 stable wrt bug #406199 + +*openssl-1.0.1 (15 Mar 2012) + + 15 Mar 2012; Mike Frysinger +openssl-1.0.1.ebuild, + +files/openssl-1.0.1-parallel-build.patch, +files/openssl-1.0.1-x32.patch: + Version bump. + + 13 Mar 2012; Agostino Sarubbo openssl-0.9.8u.ebuild, + openssl-1.0.0h.ebuild: + Stable for amd64, wrt bug #406199 + + 13 Mar 2012; Brent Baude openssl-0.9.8u.ebuild, + openssl-1.0.0h.ebuild: + Marking openssl-0.9.8u and openssl-1.0.0h ppc and ppc64 for bug 406199 + + 13 Mar 2012; Jeroen Roovers openssl-1.0.0h.ebuild: + Stable for HPPA (bug #406199). + + 12 Mar 2012; Mike Frysinger + files/openssl-0.9.8h-ldflags.patch, files/openssl-1.0.0a-ldflags.patch: + Drop useless -rpath flags. + +*openssl-1.0.0h (12 Mar 2012) +*openssl-0.9.8u (12 Mar 2012) + + 12 Mar 2012; Mike Frysinger +openssl-0.9.8u.ebuild, + +openssl-1.0.0h.ebuild, +files/openssl-1.0.0h-pkg-config.patch: + Version bump #406199. + + 02 Mar 2012; Brent Baude openssl-0.9.8t.ebuild, + openssl-1.0.0g.ebuild: + Marking openssl-0.9.8t and -1.0.0g for bug 399365 + + 01 Feb 2012; Brent Baude openssl-0.9.8t.ebuild, + openssl-1.0.0g.ebuild: + Marking 0.9.8t and 1.0.0g for sec bug 399365 + + 28 Jan 2012; Raúl Porcel openssl-1.0.0g.ebuild: + alpha/arm/ia64/m68k/s390/sh/sparc stable wrt #399365 + + 24 Jan 2012; Jeroen Roovers openssl-1.0.0g.ebuild: + Stable for HPPA (bug #399365). + + 24 Jan 2012; Thomas Kahle openssl-0.9.8t.ebuild, + openssl-1.0.0g.ebuild: + x86 stable per bug 399365 + + 24 Jan 2012; Agostino Sarubbo openssl-0.9.8t.ebuild, + openssl-1.0.0g.ebuild: + Stable for AMD64, wrt security bug #399365 + +*openssl-1.0.0g (18 Jan 2012) +*openssl-0.9.8t (18 Jan 2012) + + 18 Jan 2012; Mike Frysinger +openssl-0.9.8t.ebuild, + +openssl-1.0.0g.ebuild: + Version bump. + + 16 Jan 2012; Mark Loeser openssl-1.0.0f-r1.ebuild: + Stable for ppc/ppc64; bug #397695 + + 14 Jan 2012; Raúl Porcel openssl-1.0.0f-r1.ebuild: + alpha/arm/ia64/m68k/s390/sh/sparc stable wrt #397695 + + 12 Jan 2012; Pawel Hajdan jr + openssl-0.9.8s-r1.ebuild, openssl-1.0.0f-r1.ebuild: + x86 stable wrt bug #397695 + + 11 Jan 2012; Jeroen Roovers openssl-1.0.0f-r1.ebuild: + Stable for HPPA (bug #397695). + + 11 Jan 2012; Agostino Sarubbo openssl-0.9.8s-r1.ebuild: + Stable for AMD64, wrt security bug #397695 + + 11 Jan 2012; Agostino Sarubbo openssl-1.0.0f-r1.ebuild: + Stable for AMD64, wrt security bug #397695 + +*openssl-1.0.0f-r1 (11 Jan 2012) +*openssl-0.9.8s-r1 (11 Jan 2012) + + 11 Jan 2012; Mike Frysinger +openssl-0.9.8s-r1.ebuild, + +openssl-1.0.0f-r1.ebuild, metadata.xml: + Remove IDEA algos from USE=bindist #398439 by Ulrich Müller. Update EAPI and + static-libs dep so we can work with older versions of zlib #397695#3. + +*openssl-1.0.0f (04 Jan 2012) +*openssl-0.9.8s (04 Jan 2012) + + 04 Jan 2012; Mike Frysinger +openssl-0.9.8s.ebuild, + +openssl-1.0.0f.ebuild: + Version bump #397695. + + 07 Dec 2011; Mike Frysinger files/gentoo.config-1.0.0, + openssl-1.0.0e-r1.ebuild, +files/openssl-1.0.0e-x32.patch: + Add support for x32 ABIs. + +*openssl-1.0.0e-r1 (01 Dec 2011) + + 01 Dec 2011; Mike Frysinger +openssl-1.0.0e-r1.ebuild, + +files/openssl-1.0.0e-parallel-build.patch, + +files/openssl-1.0.0e-pkg-config.patch: + Remove CROSS_COMPILE from the env since we setup all the tools explicitly + #311473 by Thomas Sachau. Add USE=static-libs support #378259 by Agostino + Sarubbo. Try and fix up parallel build yet again #196554 by Duncan. Clean up + the pkg-config files to keep --libs clean (not include --static output). + + 01 Dec 2011; Mike Frysinger metadata.xml: + Document USE=bindist specifics #369245 by Donald. + + 31 Oct 2011; Mike Frysinger openssl-0.9.8r.ebuild: + Update to EAPI=2 to keep down differences with newer openssl ebuilds, and fix + path to enginedir in multilib setup. + + 01 Oct 2011; Peter Volkov openssl-1.0.0e.ebuild: + Install README.gost when USE=rfc3779, bug #385027. + + 17 Sep 2011; Raúl Porcel openssl-1.0.0e.ebuild: + alpha/ia64/m68k/s390/sh/sparc stable wrt #382069 + + 15 Sep 2011; Mike Frysinger + -files/openssl-0.9.8l-binutils.patch, openssl-1.0.0d.ebuild, + openssl-1.0.0e.ebuild: + Drop gas patch since upstream worked around it in a different way (by + updating the x86_64-xlate.pl helper). + + 12 Sep 2011; Kacper Kowalik openssl-1.0.0e.ebuild: + ppc/ppc64 stable wrt #382069 + + 11 Sep 2011; Markus Meier openssl-1.0.0e.ebuild: + arm/x86 stable, bug #382069 + + 09 Sep 2011; Jeroen Roovers openssl-1.0.0e.ebuild: + Stable for HPPA (bug #382069). + + 07 Sep 2011; Tony Vroon openssl-1.0.0e.ebuild: + Marked stable on AMD64 based on arch testing by Agostino "ago" Sarubbo in + security bug #382069. + +*openssl-1.0.0e (07 Sep 2011) + + 07 Sep 2011; Mike Frysinger +openssl-1.0.0e.ebuild: + Version bump #382069. + + 12 Aug 2011; Sergei Trofimovich openssl-1.0.0d.ebuild, + +files/openssl-1.0.0d-alpha-fix-unalign.patch: + Fix unaligned access on alpha (bug #371561 by Tobias Klausmann). Thanks to + Andy Polyakov for the fix. + + 12 Jul 2011; Mike Frysinger files/gentoo.config-1.0.0, + openssl-1.0.0d.ebuild, +files/openssl-1.0.0d-windres.patch: + Add more mingw support -- respect RC/WINDRES settings, check ming64 hosts, + and only use --noexecstack if the toolchain supports it #373743 by Bertrand + Jacquin. + + 07 Jul 2011; Alexis Ballier openssl-1.0.0d.ebuild, + +files/openssl-1.0.0d-fbsd-amd64.patch: + add patch from Yuta SATOH to fix build on amd64-fbsd, bug #363089 + + 05 Jul 2011; Mike Frysinger + -files/openssl-0.9.7e-gentoo.patch, openssl-0.9.8r.ebuild, + openssl-1.0.0d.ebuild: + Punt old -lcrypt patch which hasn't been needed for a long time #373743#19 by + Bertrand Jacquin. + + 05 Jul 2011; Mike Frysinger files/gentoo.config-1.0.0: + Decode mingw targets #373743 by Bertrand Jacquin. + + 30 Apr 2011; Mike Frysinger openssl-1.0.0d.ebuild, + +files/openssl-1.0.0d-alpha-typo.patch: + Fix typo in alpha asm code #364699 by Raúl Porcel. + + 16 Mar 2011; Mike Frysinger openssl-0.9.8r.ebuild, + openssl-1.0.0d.ebuild: + Tweak sed to use | for separator #358771 by Raffaello D. Di Napoli. + + 05 Mar 2011; Raúl Porcel openssl-1.0.0d.ebuild: + ia64/s390/sh/sparc stable wrt #354139 + + 26 Feb 2011; Tobias Klausmann openssl-1.0.0d.ebuild: + Stable on alpha, bug #354139 + + 24 Feb 2011; Christian Faulhammer + openssl-0.9.8r.ebuild: + stable x86, security bug 354139 + + 24 Feb 2011; Christian Faulhammer + openssl-0.9.8r.ebuild: + stable x86, security bug 354139 + + 21 Feb 2011; Christian Faulhammer + openssl-1.0.0d.ebuild: + stable x86, security bug 354139 + + 19 Feb 2011; Markus Meier openssl-1.0.0d.ebuild: + arm stable, bug #354139 + + 18 Feb 2011; Jeroen Roovers openssl-1.0.0d.ebuild: + Stable for HPPA (bug #354139). + + 17 Feb 2011; Kacper Kowalik openssl-1.0.0d.ebuild: + ppc/ppc64 stable wrt #354139 + + 17 Feb 2011; Markos Chandras openssl-0.9.8r.ebuild, + openssl-1.0.0d.ebuild: + Stable on amd64 wrt bug #354139 + +*openssl-0.9.8r (10 Feb 2011) + + 10 Feb 2011; Mike Frysinger +openssl-0.9.8r.ebuild: + Version bump. + +*openssl-1.0.0d (08 Feb 2011) + + 08 Feb 2011; Mike Frysinger +openssl-1.0.0d.ebuild: + Version bump. + + 10 Dec 2010; Brent Baude openssl-1.0.0c.ebuild: + Marking openssl-1.0.0c ppc64 for bug 347623 + + 06 Dec 2010; Raúl Porcel openssl-1.0.0c.ebuild: + alpha/ia64/m68k/sh/sparc stable wrt #347623 + + 06 Dec 2010; Raúl Porcel openssl-1.0.0c.ebuild: + s390 stable wrt #347623 + + 05 Dec 2010; Markus Meier openssl-1.0.0c.ebuild: + arm stable, bug #347623 + + 04 Dec 2010; Markos Chandras openssl-0.9.8q.ebuild, + openssl-1.0.0c.ebuild: + Stable on amd64 wrt bug #347623 + + 03 Dec 2010; Jeroen Roovers openssl-1.0.0c.ebuild: + Stable for PPC (bug #347623). + + 03 Dec 2010; Jeroen Roovers openssl-1.0.0c.ebuild: + Stable for HPPA (bug #347623). + + 03 Dec 2010; Christian Faulhammer + openssl-0.9.8q.ebuild: + stable x86, security bug 347623 + + 03 Dec 2010; Christian Faulhammer + openssl-1.0.0c.ebuild: + stable x86, security bug 347623 + +*openssl-0.9.8q (02 Dec 2010) + + 02 Dec 2010; Mike Frysinger +openssl-0.9.8q.ebuild: + Version bump. + +*openssl-1.0.0c (02 Dec 2010) + + 02 Dec 2010; Mike Frysinger +openssl-1.0.0c.ebuild: + Version bump. + + 28 Nov 2010; Brent Baude openssl-0.9.8p.ebuild, + openssl-1.0.0b-r1.ebuild: + Marking -0.9.8p and -1.0.0b-r1 ppc64 for bug 345767 + + 21 Nov 2010; Raúl Porcel openssl-0.9.8p.ebuild, + openssl-1.0.0b-r1.ebuild: + alpha/ia64/m68k/s390/sh/sparc stable wrt #345767 + + 19 Nov 2010; Markus Meier openssl-1.0.0b-r1.ebuild: + arm stable, bug #345767 + + 17 Nov 2010; Markos Chandras openssl-0.9.8p.ebuild, + openssl-1.0.0b-r1.ebuild: + Stable on amd64 wrt bug #345767 + + 17 Nov 2010; Thomas Kahle openssl-0.9.8p.ebuild, + openssl-1.0.0b-r1.ebuild: + x86 stable per bug 345767 + + 17 Nov 2010; Jeroen Roovers openssl-1.0.0b-r1.ebuild: + Stable for HPPA PPC (bug #345767). + +*openssl-1.0.0b-r1 (17 Nov 2010) + + 17 Nov 2010; Diego E. Pettenò + +openssl-1.0.0b-r1.ebuild, +files/openssl-1.0.0b-rev19998.patch: + Add patch to fix a bug slipped by upstream but caught by testsuite; thanks to + Brant Gurganus in bug #345767 for reporting and providing a link to the + upstream patch. + +*openssl-0.9.8p (16 Nov 2010) + + 16 Nov 2010; Mike Frysinger +openssl-0.9.8p.ebuild: + Version bump. + +*openssl-1.0.0b (16 Nov 2010) + + 16 Nov 2010; Mike Frysinger +openssl-1.0.0b.ebuild: + Version bump. + + 11 Oct 2010; Christian Faulhammer + openssl-1.0.0a-r3.ebuild: + stable x86, bug 330437 + + 11 Oct 2010; Christian Faulhammer + openssl-0.9.8o-r2.ebuild: + stable x86, bug 330437 + + 10 Oct 2010; Raúl Porcel openssl-1.0.0a-r3.ebuild: + arm/ia64/m68k/s390/sh/sparc stable wrt #330437 + + 08 Oct 2010; Mike Frysinger openssl-0.9.8o-r2.ebuild: + Only remove libs when installing this SLOT for the first time, and warn + about it #340033 by Marcin Mirosław. + + 07 Oct 2010; Jeroen Roovers openssl-1.0.0a-r3.ebuild: + Stable for HPPA PPC (bug #332027). + + 03 Oct 2010; Mike Frysinger openssl-1.0.0a-r3.ebuild: + Convert by Samuli Suominen to EAPI 2 #339027 by Marco Leogrande. + + 03 Oct 2010; Tobias Klausmann + openssl-1.0.0a-r3.ebuild: + Stable on alpha, bug #330437 + + 02 Oct 2010; Jeremy Olexa openssl-1.0.0a-r3.ebuild: + Silly issue, revert to original SRC_URI so users can fetch the file. bug + 339027 + + 28 Sep 2010; Jeremy Olexa openssl-1.0.0a-r3.ebuild, + -files/openssl-c_rehash.sh-rev-1.7: + Revert revision 1.8 and just modify the SRC_URI to the converted character + instead for bug 339027 + + 28 Sep 2010; Jeremy Olexa openssl-1.0.0a-r3.ebuild, + +files/openssl-c_rehash.sh-rev-1.7: + QA: Fix SRC_URI of c_rehash and move it to FILESDIR, bug 339027 + + 28 Sep 2010; Samuli Suominen + openssl-0.9.8o-r2.ebuild, openssl-1.0.0a-r3.ebuild: + amd64 stable wrt #330437 + + 28 Sep 2010; Samuli Suominen + openssl-1.0.0a-r3.ebuild: + ppc64 stable wrt #330437 + + 14 Sep 2010; Mike Frysinger openssl-1.0.0a-r3.ebuild, + files/openssl-1.0.0a-alpha-mont.patch: + Add another fix from upstream for alpha so it actually (seems) to work + #330915 by Kazuyoshi Furutaka. + + 12 Sep 2010; Mike Frysinger openssl-1.0.0a-r3.ebuild, + +files/openssl-1.0.0a-alpha-mont.patch: + Fix alpha build issues in new alpha-mont.pl file #330915. + + 12 Sep 2010; Mike Frysinger openssl-1.0.0a-r3.ebuild, + +files/openssl-1.0.0a-alphacpuid.patch: + Fix alpha asm syntax error in new cpuid file #330915 by Matt Turner. + + 23 Aug 2010; Mike Frysinger +files/gentoo.config-1.0.0, + openssl-1.0.0a-r3.ebuild: + Split off gentoo.config for openssl-1.0.0 to take advantage of newer + optimized targets #333679 by Sergei Trofimovich. + +*openssl-1.0.0a-r3 (20 Aug 2010) + + 20 Aug 2010; Mike Frysinger +openssl-1.0.0a-r3.ebuild: + Revbump to revert USE=sslv2 screw up, and add epatch_user to accommodate + random needs (historical, new divers, etc...) #332661. + + 20 Aug 2010; Mike Frysinger openssl-1.0.0a-r2.ebuild, + metadata.xml: + Drop USE=sslv2 support as it doesnt do what was intended. Will revbump once + #332661 shakes out but for now, stop breaking random apps. + +*openssl-1.0.0a-r2 (19 Aug 2010) + + 19 Aug 2010; Mike Frysinger +openssl-1.0.0a-r2.ebuild, + metadata.xml: + Grab POSIX shell version of c_rehash from PLD #333117. Add a local USE=sslv2 + flag so people can enable legacy support #332661 by Stefan de Konink. + + 17 Aug 2010; Mike Frysinger openssl-1.0.0a-r1.ebuild: + Automatically rehash ssl certs for people #333069. + +*openssl-0.9.8o-r2 (14 Aug 2010) + + 14 Aug 2010; Mike Frysinger +openssl-0.9.8o-r2.ebuild: + Add fix from upstream for double free to older version too #332027 by Hanno + Boeck. + +*openssl-1.0.0a-r1 (10 Aug 2010) + + 10 Aug 2010; Samuli Suominen + +openssl-1.0.0a-r1.ebuild, +files/openssl-1.0.0a-fix-double-free.patch, + +files/openssl-1.0.0a-ldflags.patch: + Use environment LDFLAGS wrt #327421 by Olivier Huber. Fix double free wrt + #332027 by Hanno Boeck. + + 04 Aug 2010; Mike Frysinger openssl-1.0.0a.ebuild, + +files/alphacpuid.s: + Add missing file from upstream for alpha builds #330915 by Kazuyoshi + Furutaka. + + 18 Jul 2010; Mike Frysinger openssl-1.0.0a.ebuild: + Avoid preserve_old_lib when we have the old SLOT #328355. + +*openssl-0.9.8o-r1 (17 Jul 2010) + + 17 Jul 2010; Samuli Suominen + +openssl-0.9.8o-r1.ebuild: + This ebuild will only install libcrypto.so.0.9.8 and libssl.so.0.9.8 for + binary-only pkgs wrt #328355. + + 14 Jul 2010; Samuli Suominen openssl-1.0.0a.ebuild: + Release OpenSSL 1.x to testing. Known issues have been resolved wrt + #304279. + + 21 Jun 2010; Markus Meier openssl-0.9.8o.ebuild: + amd64 stable, bug #322575 + + 20 Jun 2010; Raúl Porcel openssl-0.9.8o.ebuild: + alpha/arm/ia64/m68k/s390/sh/sparc stable wrt #322575 + + 07 Jun 2010; Joseph Jezak openssl-0.9.8o.ebuild: + Marked ppc/ppc64 stable for bug #322575. + + 03 Jun 2010; Jeroen Roovers openssl-0.9.8o.ebuild: + Stable for HPPA (bug #322575). + + 03 Jun 2010; Pawel Hajdan jr + openssl-0.9.8o.ebuild: + x86 stable wrt security bug #322575 + +*openssl-0.9.8o (03 Jun 2010) + + 03 Jun 2010; Mike Frysinger +openssl-0.9.8o.ebuild: + Version bump. + +*openssl-1.0.0a (03 Jun 2010) + + 03 Jun 2010; Mike Frysinger +openssl-1.0.0a.ebuild: + Version bump. + + 11 Apr 2010; Mike Frysinger openssl-0.9.8n.ebuild, + openssl-1.0.0.ebuild: + Remove SCRIPTS from the environment #312551 by Justin Lecher. + + 29 Mar 2010; Markus Meier openssl-0.9.8n.ebuild: + amd64 stable, bug #308011 + +*openssl-1.0.0 (29 Mar 2010) + + 29 Mar 2010; Mike Frysinger +openssl-1.0.0.ebuild: + Version bump. + + 28 Mar 2010; Raúl Porcel openssl-0.9.8n.ebuild: + alpha/arm/ia64/m68k/s390/sh/sparc stable wrt #308011 + + 26 Mar 2010; Brent Baude openssl-0.9.8n.ebuild: + Marking openssl-0.9.8n ppc64 for bug 308011 + + 25 Mar 2010; Jeroen Roovers openssl-0.9.8n.ebuild: + Stable for PPC (bug #308011). + + 25 Mar 2010; Jeroen Roovers openssl-0.9.8n.ebuild: + Stable for HPPA (bug #308011). + + 25 Mar 2010; Christian Faulhammer + openssl-0.9.8n.ebuild: + stable x86, security bug 308011 + +*openssl-0.9.8n (25 Mar 2010) + + 25 Mar 2010; Mike Frysinger +openssl-0.9.8n.ebuild: + Version bump. + +*openssl-0.9.8m-r1 (09 Mar 2010) + + 09 Mar 2010; Fabio Erculiani -openssl-0.9.8m.ebuild, + +openssl-0.9.8m-r1.ebuild, +files/openssl-0.9.8m-cfb.patch: + fix critical bug #308123, thanks Joost Ruis for reporting + +*openssl-0.9.8m (05 Mar 2010) + + 05 Mar 2010; Mike Frysinger +openssl-0.9.8m.ebuild, + +files/openssl-0.9.8m-binutils.patch: + Version bump #306925 by Hanno Boeck. + + 15 Feb 2010; Mike Frysinger openssl-0.9.8l-r2.ebuild: + Fix up man page munging #304663 by William Throwe. + + 13 Feb 2010; Mike Frysinger + openssl-1.0.0_beta5.ebuild, metadata.xml: + Add support by Tony Cheneau for USE=rfc3779 #304717. + + 27 Jan 2010; Mike Frysinger openssl-0.9.8l-r2.ebuild, + openssl-1.0.0_beta5.ebuild: + Unify the sed statements and make sure we always set MANSUFFIX #302165 by + Hanno Boeck. + +*openssl-1.0.0_beta5 (21 Jan 2010) + + 21 Jan 2010; Mike Frysinger + +openssl-1.0.0_beta5.ebuild: + Version bump. + +*openssl-1.0.0_beta4 (11 Jan 2010) + + 11 Jan 2010; Mike Frysinger + +openssl-1.0.0_beta4.ebuild: + Add testing version #269482 by Daniel Black. + + 11 Jan 2010; Mike Frysinger openssl-0.9.8l-r2.ebuild: + Drop gcc-3 flag munging, add -fno-strict-aliasing for everyone, and use + SET_X when linking things to make logs more useful. + + 11 Jan 2010; Mike Frysinger openssl-0.9.8l-r2.ebuild: + Handle renamed man pages in SEE ALSO #287783 by Guido Winkelmann. + + 11 Jan 2010; Mike Frysinger + files/openssl-0.9.8h-ldflags.patch, openssl-0.9.8l-r2.ebuild: + Respect LDFLAGS on openssl again #181438. + + 11 Jan 2010; Mike Frysinger openssl-0.9.8l-r2.ebuild, + files/openssl-0.9.8e-bsd-sparc64.patch: + Update the bsd-sparc patch to apply again. + + 11 Jan 2010; Mike Frysinger openssl-0.9.8l-r2.ebuild: + Link in gmp when USE=gmp #276557 by Justin Lecher. + +*openssl-0.9.8l-r2 (27 Nov 2009) + + 27 Nov 2009; Mike Frysinger +openssl-0.9.8l-r2.ebuild, + files/openssl-0.9.8l-CVE-2009-2409.patch: + Add other half of MD2 disable so that root certs arent checked #294615 by + Alexander Danilov. + + 23 Nov 2009; Raúl Porcel openssl-0.9.8l-r1.ebuild: + ia64/m68k/s390/sh/sparc stable wrt #292022 + + 23 Nov 2009; Brent Baude openssl-0.9.8l-r1.ebuild: + Marking openssl-0.9.8l-r1 ppc64 for bug 292022 + + 23 Nov 2009; Markus Meier openssl-0.9.8l-r1.ebuild: + amd64/arm/x86 stable, bug #292022 + + 22 Nov 2009; Tobias Klausmann + openssl-0.9.8l-r1.ebuild: + Stable on alpha, bug #292022 + + 21 Nov 2009; nixnut openssl-0.9.8l-r1.ebuild: + ppc stable #292022 + + 21 Nov 2009; Jeroen Roovers openssl-0.9.8l-r1.ebuild: + Stable for HPPA (bug #292022). + + 21 Nov 2009; Mike Frysinger openssl-0.9.8l-r1.ebuild, + +files/openssl-0.9.8l-binutils.patch: + Add fix from upstream/fedora for building with newer binutils #289130 by + Martin Jansa. Also drop the alpha gcc/ccc patch as ccc is long dead. + +*openssl-0.9.8l-r1 (21 Nov 2009) + + 21 Nov 2009; Mike Frysinger +openssl-0.9.8l-r1.ebuild, + +files/openssl-0.9.8l-CVE-2009-1387.patch, + +files/openssl-0.9.8l-CVE-2009-2409.patch, + +files/openssl-0.9.8l-dtls-compat.patch: + Add fixes from upstream but not in the 0.9.8l release. + + 08 Nov 2009; nixnut openssl-0.9.8l.ebuild: + ppc stable #292022 + + 08 Nov 2009; Jeroen Roovers openssl-0.9.8l.ebuild: + Stable for HPPA (bug #292022). + + 07 Nov 2009; Tobias Klausmann openssl-0.9.8l.ebuild: + Stable on alpha, bug #292022 + + 05 Nov 2009; Mike Frysinger openssl-0.9.8l.ebuild, + +files/openssl-0.9.8l-CVE-2009-1377.patch, + +files/openssl-0.9.8l-CVE-2009-1378.patch, + +files/openssl-0.9.8l-CVE-2009-1379.patch: + Add some patches from upstream #270305. + +*openssl-0.9.8l (05 Nov 2009) + + 05 Nov 2009; Mike Frysinger +openssl-0.9.8l.ebuild: + Version bump. + + 01 Nov 2009; nixnut openssl-0.9.8k-r1.ebuild: + ppc stable #290545 + + 29 Oct 2009; Christian Faulhammer + openssl-0.9.8k-r1.ebuild: + stable x86, bug 290545 + + 26 Oct 2009; Jeroen Roovers openssl-0.9.8k-r1.ebuild: + Stable for HPPA (bug #290545). + + 21 Jun 2009; Fabian Groffen + files/gentoo.config-0.9.8: + update gentoo.config script to include support for Prefix arches + + 29 May 2009; Mike Frysinger + -files/openssl-0.9.8b-parallel-build.patch, -openssl-0.9.8h-r1.ebuild, + -files/openssl-0.9.8h-pkcs12.patch, -openssl-0.9.8i.ebuild: + Punt old packages vuln to GLSA 200902-02 #271772 by Robert Buchholz. + +*openssl-0.9.8k-r1 (29 May 2009) + + 29 May 2009; Diego E. Pettenò + +openssl-0.9.8k-r1.ebuild: + Revision bump with zlib linked in at build-time rather than dlopened. See + bug #271415. + + 09 Apr 2009; Mike Frysinger openssl-0.9.8k.ebuild: + Make sure we dont accidently create /etc/sandbox.d with 0700 perms #265376 + by Friedrich Oslage. + + 02 Apr 2009; Raúl Porcel openssl-0.9.8k.ebuild: + alpha/arm/ia64/m68k/s390/sh stable wrt #263751 + + 29 Mar 2009; Markus Meier openssl-0.9.8k.ebuild: + x86 stable, bug #263751 + + 26 Mar 2009; Jeroen Roovers openssl-0.9.8k.ebuild: + Stable for HPPA (bug #263751). + + 26 Mar 2009; Brent Baude openssl-0.9.8k.ebuild: + Marking openssl-0.9.8k ppc64 and ppc for bug 263751 + + 26 Mar 2009; Ferris McCormick openssl-0.9.8k.ebuild: + Sparc stable --- security Bug #263751 --- All tests run as they should. + + 26 Mar 2009; Richard Freeman openssl-0.9.8k.ebuild: + amd64 stable - 263751 + +*openssl-0.9.8k (25 Mar 2009) + + 25 Mar 2009; Mike Frysinger + +files/openssl-0.9.8k-toolchain.patch, +openssl-0.9.8k.ebuild: + Version bump #263751. + + 19 Feb 2009; Raúl Porcel + +files/openssl-0.9.8j-ia64.patch, openssl-0.9.8j.ebuild: + Add patch to fix ia64 build failure from the openssl mailing list, thanks + to Ryan Bebeau for letting me know, ia64 stable + + 10 Jan 2009; Markus Meier openssl-0.9.8j.ebuild: + amd64 stable, bug #251346 + + 09 Jan 2009; Raúl Porcel openssl-0.9.8j.ebuild: + alpha/sparc/x86 stable wrt #251346 + + 08 Jan 2009; Brent Baude openssl-0.9.8j.ebuild: + Marking openssl-0.9.8j ppc64 and ppc for bug 251346 + + 08 Jan 2009; Jeroen Roovers openssl-0.9.8j.ebuild: + Stable for HPPA (bug #25134). + +*openssl-0.9.8j (08 Jan 2009) + + 08 Jan 2009; Peter Alfredsen + +files/openssl-0.9.8j-parallel-build.patch, +openssl-0.9.8j.ebuild: + Bump, bug 254183 and CVE-2008-5077, bug 251346. Parallel build fails + horribly, forcing -j1. Since we don't install fips, sedded that part out + of the root makefile to get around a build failure. + + 03 Oct 2008; Raúl Porcel openssl-0.9.8h-r1.ebuild: + alpha/ia64/x86 stable wrt #239301 + + 02 Oct 2008; Jeroen Roovers openssl-0.9.8h-r1.ebuild: + Stable for HPPA (bug #239301). + + 02 Oct 2008; Brent Baude openssl-0.9.8h-r1.ebuild: + stable ppc, bug 239301 + + 02 Oct 2008; Brent Baude openssl-0.9.8h-r1.ebuild: + stable ppc64, bug 239301 + + 02 Oct 2008; Ferris McCormick + openssl-0.9.8h-r1.ebuild: + Sparc stable --- Bug #239301 --- looks good and all tests successful. + + 02 Oct 2008; Thomas Anderson + openssl-0.9.8h-r1.ebuild: + stable amd64, bug 239301 + +*openssl-0.9.8i (02 Oct 2008) + + 02 Oct 2008; Mike Frysinger +openssl-0.9.8i.ebuild: + Version bump #239030 by Lars (Polynomial-C). + +*openssl-0.9.8h-r1 (21 Jun 2008) + + 21 Jun 2008; Mike Frysinger + +files/openssl-0.9.8h-ldflags.patch, +files/openssl-0.9.8h-pkcs12.patch, + +openssl-0.9.8h-r1.ebuild: + Respect LDFLAGS #181438 by Arfrever Frehtes Taifersar Arahesis and add fix + from upstream for PKCS12 troubles #224843 by Per Pomsel. + + 05 Jun 2008; Tobias Scherbaum + openssl-0.9.8g-r2.ebuild: + ppc stable, bug #223429 + + 03 Jun 2008; Steve Dibb openssl-0.9.8g-r2.ebuild: + amd64 stable, security bug 223429 + + 02 Jun 2008; Raúl Porcel openssl-0.9.8g-r2.ebuild: + alpha/ia64/sparc stable wrt security #223429 + + 31 May 2008; Markus Rothe openssl-0.9.8g-r2.ebuild: + Stable on ppc64; bug #223429 + + 31 May 2008; Jeroen Roovers openssl-0.9.8g-r2.ebuild: + Stable for HPPA (bug #223429). + + 31 May 2008; Christian Faulhammer + openssl-0.9.8g-r2.ebuild: + stable x86, security bug 223429 + +*openssl-0.9.8g-r2 (30 May 2008) + + 30 May 2008; Doug Goldstein + +files/openssl-0.9.8g-CVE-2008-0891.patch, + +files/openssl-0.9.8g-CVE-2008-1672.patch, +openssl-0.9.8g-r2.ebuild: + Security fix for CVE-2008-0891 & CVE-2008-1672. bug #223429 + +*openssl-0.9.8h (28 May 2008) + + 28 May 2008; Mike Frysinger +openssl-0.9.8h.ebuild: + Version bump. + + 16 May 2008; Ulrich Mueller openssl-0.9.8g-r1.ebuild: + Don't install bogus Emacs support file, bug 222337. + +*openssl-0.9.8g-r1 (25 Mar 2008) + + 25 Mar 2008; Doug Goldstein + +files/openssl-0.9.8g-sslv3-no-tlsext.patch, +openssl-0.9.8g-r1.ebuild: + Patch from OpenSSL's bug tracker not to send TLS Extensions on SSLv3 only + connections, while not explicitly against the SSL spec, several SSL + implementations can not handle it. Patch by Kaspar Brand + from http://rt.openssl.org/Ticket/Display.html?id=1629. + Resolves bug #198914 + + 24 Dec 2007; Mike Frysinger openssl-0.9.8g.ebuild: + Dont force src_test any longer as things seem to be sane. + + 24 Nov 2007; Brent Baude openssl-0.9.8g.ebuild: + Keywording openssl-0.9.8g ppc for bug 198370 + + 19 Nov 2007; Joshua Kinard openssl-0.9.8g.ebuild: + Stable on mips, per #198370. + + 16 Nov 2007; Doug Goldstein openssl-0.9.8g.ebuild: + change depend to mit-krb5 since openssl's Configure script specifically + states they don't support building against heimdal and it will break. Which + results in a die during the ebuild + + 12 Nov 2007; Mike Frysinger openssl-0.9.8g.ebuild: + Filter out $APPS from the environment #197996. + + 09 Nov 2007; Daniel Gryniewicz openssl-0.9.8g.ebuild: + Marked stable on amd64 for bug #198370 + + 08 Nov 2007; Jeroen Roovers openssl-0.9.8g.ebuild: + Stable for HPPA (bug #198370). + + 07 Nov 2007; Markus Rothe openssl-0.9.8g.ebuild: + Stable on ppc64; bug #198370 + + 07 Nov 2007; Raúl Porcel openssl-0.9.8g.ebuild: + alpha/ia64 stable wrt #198370 + + 07 Nov 2007; Jurek Bartuszek openssl-0.9.8g.ebuild: + x86 stable (bug #198370) + + 07 Nov 2007; Ferris McCormick openssl-0.9.8g.ebuild: + Sparc stable, Bug #198370; early, but all tests check out and can't + duplicate reported problems. + +*openssl-0.9.8g (20 Oct 2007) + + 20 Oct 2007; +openssl-0.9.8g.ebuild: + Version bump. Enable tlsext #196191 by Hanno Boeck. Fix double test running + #196149 by Dustin Surawicz. + + 16 Oct 2007; Tobias Scherbaum + openssl-0.9.8f.ebuild: + ppc stable, bug #195634 + + 16 Oct 2007; Christoph Mende openssl-0.9.8f.ebuild: + Stable on amd64 wrt bug #195634 + + 14 Oct 2007; Jeroen Roovers openssl-0.9.8f.ebuild: + Stable for HPPA (bug #195634). + + 14 Oct 2007; Markus Rothe openssl-0.9.8f.ebuild: + Stable on ppc64; bug #195634 + + 14 Oct 2007; Raúl Porcel openssl-0.9.8f.ebuild: + alpha/ia64/sparc stable wrt security #195634 + + 13 Oct 2007; Dawid Węgliński openssl-0.9.8f.ebuild: + Stable on x86 wrt bug #195634 + +*openssl-0.9.8f (13 Oct 2007) + + 13 Oct 2007; Mike Frysinger + +files/openssl-0.9.8f-fix-version.patch, +openssl-0.9.8f.ebuild: + Version bump. + + 11 Oct 2007; Mike Frysinger + +files/openssl-0.9.8e-padlock-O0.patch, openssl-0.9.8e-r4.ebuild: + Fix from upstream for building with -O0 #185104. + +*openssl-0.9.8e-r4 (07 Oct 2007) + + 07 Oct 2007; Mike Frysinger +openssl-0.9.8e-r4.ebuild: + Enable camellia and mdc2 regardless of USE=bindist #194946 by Justin Foote. + Flesh out support for USE="gmp kerberos zlib". + + 03 Oct 2007; Chris Gianelloni + openssl-0.9.8e-r3.ebuild: + Stable on amd64 wrt bug #194039. + + 01 Oct 2007; Jeroen Roovers openssl-0.9.8e-r3.ebuild: + Stable for HPPA (bug #194039). + + 01 Oct 2007; Roy Marples + +files/openssl-0.9.8e-bsd-sparc64.patch, openssl-0.9.8e-r3.ebuild: + Love the ~sparc-fbsd keyword. + + 01 Oct 2007; Raúl Porcel openssl-0.9.8e-r3.ebuild: + alpha/ia64/sparc stable wrt security #194039 + + 01 Oct 2007; Joe Peterson openssl-0.9.8e-r3.ebuild: + Add ~x86-fbsd keyword + + 01 Oct 2007; Mike Frysinger openssl-0.9.8e-r3.ebuild: + Tweak how we do the manpage renaming so that it is POSIX friendly #194335 by + Joe Peterson. + + 01 Oct 2007; Joshua Kinard openssl-0.9.8e-r3.ebuild: + Stable on mips, per #194039. + + 30 Sep 2007; Tobias Scherbaum + openssl-0.9.8e-r3.ebuild: + ppc stable, bug #194039 + + 30 Sep 2007; Markus Meier openssl-0.9.8e-r3.ebuild: + x86 stable, security bug #194039 + + 30 Sep 2007; Mike Frysinger openssl-0.9.8e-r3.ebuild: + We dont actually need the hppa patch anymore as exit() in awk at first match + makes the head useless. + + 30 Sep 2007; Mike Frysinger + +files/openssl-0.9.8e-make.patch, openssl-0.9.8e-r3.ebuild: + Fix building on Gentoo/BSD setups where `make` != `$MAKE` #146316. + + 30 Sep 2007; Markus Rothe openssl-0.9.8e-r3.ebuild: + Stable on ppc64; bug #194039 + +*openssl-0.9.8e-r3 (30 Sep 2007) + + 30 Sep 2007; Mike Frysinger + +files/openssl-0.9.8e-CVE-2007-5135.patch, +openssl-0.9.8e-r3.ebuild: + Add fix from upstream for CVE-2007-5135 #194039. + + 29 Aug 2007; Markus Rothe openssl-0.9.8e-r2.ebuild: + Stable on ppc64; bug #188799 + + 28 Aug 2007; Christoph Mende + openssl-0.9.8e-r2.ebuild: + Stable on amd64 wrt security bug #188799 + + 28 Aug 2007; Tobias Scherbaum + openssl-0.9.8e-r2.ebuild: + ppc stable, bug #188799 + + 27 Aug 2007; Jeroen Roovers openssl-0.9.8e-r2.ebuild: + Stable for HPPA (bug #188799). + + 27 Aug 2007; Gustavo Zacarias + openssl-0.9.8e-r2.ebuild: + Stable on sparc wrt security #188799 + + 25 Aug 2007; Raúl Porcel openssl-0.9.8e-r2.ebuild: + alpha/ia64/x86 stable wrt security #188799 + +*openssl-0.9.8e-r2 (25 Aug 2007) + + 25 Aug 2007; Mike Frysinger + +files/openssl-0.9.8e-CVE-2007-3108.patch, +openssl-0.9.8e-r2.ebuild: + Add fix from upstream for CVE-2007-3108 #188799. + +*openssl-0.9.8e-r1 (22 Jun 2007) + + 22 Jun 2007; Mike Frysinger + +files/openssl-0.9.8-evp-key-len.patch, +files/openssl-0.9.8-gcc42.patch, + +openssl-0.9.8e-r1.ebuild: + Fix from upstream for encfs/ssh troubles #168750 and fix from PLD Linux for + gcc-4.2 troubles #158324. + + 22 Apr 2007; Bryan Østergaard openssl-0.9.8d.ebuild: + Stable on Mips. + +*openssl-0.9.8e (27 Feb 2007) +*openssl-0.9.7m (27 Feb 2007) + + 27 Feb 2007; Mike Frysinger +openssl-0.9.7m.ebuild, + +openssl-0.9.8e.ebuild: + Version bump #168357 by Michael Huber. + + 04 Nov 2006; Ilya A. Volynets-Evenbakh + openssl-0.9.8d.ebuild: + 0.9.8 builds on mips now, so add mips back to keywords + + 03 Nov 2006; Ilya A. Volynets-Evenbakh + openssl-0.9.7l.ebuild: + Stabilize on mips + + 23 Oct 2006; Joslwah openssl-0.9.8d.ebuild: + Mark ppc64 stable. + + 18 Oct 2006; Roy Marples openssl-0.9.7l.ebuild: + Added ~sparc-fbsd keyword. + + 14 Oct 2006; Aron Griffis openssl-0.9.7l.ebuild, + openssl-0.9.8d.ebuild: + Mark 0.9.8d 0.9.7l stable on ia64. #145510 + + 14 Oct 2006; Jason Wever openssl-0.9.8d.ebuild: + Added fix from bug #149958 for ppc64. + + 01 Oct 2006; Mike Frysinger + +files/openssl-0.9.8-makedepend.patch, openssl-0.9.7l.ebuild, + openssl-0.9.8d.ebuild: + Fix up depend system to use gcc to generate deps #149583. + + 01 Oct 2006; Mike Frysinger openssl-0.9.8d.ebuild: + Respect LDFLAGS #149676 by Donnie Berkholz. + + 30 Sep 2006; Fernando J. Pereda openssl-0.9.7l.ebuild, + openssl-0.9.8d.ebuild: + Stable on alpha as per security bug #145510 + + 28 Sep 2006; Tobias Scherbaum + openssl-0.9.7l.ebuild, openssl-0.9.8d.ebuild: + ppc stable, bug #145510 + + 28 Sep 2006; Gustavo Zacarias openssl-0.9.7l.ebuild, + openssl-0.9.8d.ebuild: + Stable on hppa wrt security #145510 + + 28 Sep 2006; Jason Wever openssl-0.9.7l.ebuild, + openssl-0.9.8d.ebuild: + Stable on SPARC wrt security bug #145510. + + 28 Sep 2006; Chris Gianelloni openssl-0.9.7l.ebuild, + openssl-0.9.8d.ebuild: + Stable on amd64/x86 wrt bug #145510. + + 28 Sep 2006; Brent Baude openssl-0.9.7l.ebuild: + Marking openssl-0.9.7l ppc64 stable for sec bug #145510 + +*openssl-0.9.8d (28 Sep 2006) +*openssl-0.9.7l (28 Sep 2006) + + 28 Sep 2006; Mike Frysinger +openssl-0.9.7l.ebuild, + +openssl-0.9.8d.ebuild: + Version bump for security #145510 and #148654. + + 24 Sep 2006; Michael Hanselmann + openssl-0.9.8c-r2.ebuild: + Stable on ppc. + +*openssl-0.9.8c-r2 (18 Sep 2006) + + 18 Sep 2006; Mike Frysinger files/gentoo.config-0.9.8, + -openssl-0.9.8c-r1.ebuild, +openssl-0.9.8c-r2.ebuild: + Force people to re-emerge openssl on i686 so that they get the optimized + version. You will probably have to re-emerge openssh/etc... if you + experience troubles. Openssl sucks sometimes. + +*openssl-0.9.8c-r1 (16 Sep 2006) + + 16 Sep 2006; Mike Frysinger -openssl-0.9.8c.ebuild, + +openssl-0.9.8c-r1.ebuild: + Remove USE=sse2 for now as it breaks ABI #147758 by Andrew Stimpson and + revert asm targets for i686. + + 15 Sep 2006; Mike Frysinger files/gentoo.config-0.9.8, + openssl-0.9.8c.ebuild: + Add support for USE=sse2 and reclassify i686/sparc7 targets #147551. + + 07 Sep 2006; Gustavo Zacarias openssl-0.9.7k.ebuild: + Stable on hppa wrt security #146375 + + 07 Sep 2006; Joshua Kinard openssl-0.9.8b.ebuild, + openssl-0.9.8c.ebuild: + Remask openssl-0.9.8 on mips due to changes upstream which need resolving. + + 06 Sep 2006; Ilya A. Volynets-Evenbakh + openssl-0.9.8c.ebuild: + Don't run src_test when test is not in FEATURES. + + 06 Sep 2006; Markus Rothe openssl-0.9.7k.ebuild, + openssl-0.9.8c.ebuild: + 0.9.8c ~ppc64 again. fails test with gcc-3.4. marked 0.9.7k stable on ppc64 + + 06 Sep 2006; Joshua Jackson openssl-0.9.7k.ebuild, + openssl-0.9.8c.ebuild: + stable x86; security bug #146375 + + 05 Sep 2006; Thomas Cort openssl-0.9.8c.ebuild: + Stable on alpha wrt security Bug #146375. + + 05 Sep 2006; Markus Rothe openssl-0.9.8c.ebuild: + Stable on ppc64; bug #146375 + + 05 Sep 2006; Jason Wever openssl-0.9.7k.ebuild: + Stable on SPARC wrt security bug #146375. + + 05 Sep 2006; Mike Doty openssl-0.9.8c.ebuild: + amd64 stable, bug 146375 + + 05 Sep 2006; Joseph Jezak openssl-0.9.7k.ebuild: + Marked ppc stable for bug #146375. + +*openssl-0.9.8c (05 Sep 2006) +*openssl-0.9.7k (05 Sep 2006) + + 05 Sep 2006; Mike Frysinger +openssl-0.9.7k.ebuild, + +openssl-0.9.8c.ebuild: + Version bump #146375 by Sune Kloppenborg Jeppesen. + + 05 Sep 2006; Joshua Kinard openssl-0.9.8b.ebuild: + Added ~mips to KEYWORDS. + + 03 Sep 2006; Joshua Jackson openssl-0.9.8b.ebuild: + Added ~x86 as per bug 145605 + + 02 Sep 2006; Michael Sterrett + openssl-0.9.7j.ebuild: + keepdir instead of dodir for empty directory + + 02 Sep 2006; openssl-0.9.8b.ebuild: + ~ppc added. bug 145605 + + 01 Sep 2006; Jason Wever openssl-0.9.8b.ebuild: + Added ~sparc keyword wrt bug #145605. + + 31 Aug 2006; openssl-0.9.8b.ebuild: + marked ~amd64 + + 30 Aug 2006; Markus Rothe openssl-0.9.8b.ebuild: + Added ~ppc64; bug #145605 + + 09 Jul 2006; Joshua Kinard openssl-0.9.7j.ebuild: + Marked stable on mips. + + 06 Jul 2006; openssl-0.9.7i.ebuild, + openssl-0.9.7j.ebuild: + - openssl needs tc- functions exported for the install phase so we dont try + to install for x86 when compiling for ppc + + 01 Jul 2006; Jason Wever openssl-0.9.7j.ebuild: + Fixed typo when I added filtering for -mv8 CFLAG, solves bug #138583. + + 30 Jun 2006; Jason Wever openssl-0.9.7j.ebuild: + Filtered out the assumed -mv8 use flag as it was removed in >=gcc-4.0.0 + + 28 Jun 2006; Joshua Jackson openssl-0.9.7j.ebuild: + Stable x86; bug #137143 + + 27 Jun 2006; Thomas Cort openssl-0.9.7j.ebuild: + Stable on alpha wrt Bug #137143. + + 25 Jun 2006; Guy Martin openssl-0.9.7j.ebuild: + Stable on hppa. + + 25 Jun 2006; Guy Martin ChangeLog: + Stable on hppa. + + 21 Jun 2006; Gustavo Zacarias openssl-0.9.7j.ebuild: + Stable on sparc wrt #137143 + + 21 Jun 2006; openssl-0.9.7j.ebuild: + Stable on ppc; bug #137143 + + 20 Jun 2006; Simon Stelling openssl-0.9.7j.ebuild: + stable on amd64 + + 18 Jun 2006; Markus Rothe openssl-0.9.7j.ebuild: + Stable on ppc64; bug #137143 + + 14 May 2006; Mike Frysinger + +files/openssl-0.9.7j-doc-updates.patch, + +files/openssl-0.9.8b-doc-updates.patch, openssl-0.9.7i.ebuild, + openssl-0.9.7j.ebuild, openssl-0.9.8a.ebuild, openssl-0.9.8b.ebuild: + Dont run src_test twice and namespace common manpages to prevent conflicts + with other packages #132830 by Diego Pettenò. + +*openssl-0.9.8b (05 May 2006) + + 05 May 2006; Mike Frysinger + +files/openssl-0.9.8b-parallel-build.patch, +openssl-0.9.8b.ebuild: + Version bump. + +*openssl-0.9.7j (05 May 2006) + + 05 May 2006; Mike Frysinger +openssl-0.9.7j.ebuild: + Version bump. + + 27 Apr 2006; Marien Zwart Manifest: + Fixing SHA256 digest, pass four + + 19 Apr 2006; Seemant Kulleen ChangeLog: + fix the Manifest -- got hit by this on a few different build boxes + + 19 Apr 2006; Mike Frysinger + +files/openssl-0.9.7i-m68k.patch, openssl-0.9.7i.ebuild: + Add support for m68k shared libs #113807 by Kolbjørn Barmen. + + 30 Mar 2006; Diego Pettenò openssl-0.9.7i.ebuild: + Add ~x86-fbsd keyword. + + 09 Mar 2006; Mike Frysinger openssl-0.9.7e-r2.ebuild, + openssl-0.9.7g-r1.ebuild, openssl-0.9.7h.ebuild, openssl-0.9.7i.ebuild, + openssl-0.9.8a.ebuild: + Use revdep-rebuild --library instead of revdep-rebuild --soname #125506 by + Carsten Lohrke. + + 15 Feb 2006; Markus Rothe openssl-0.9.7i.ebuild: + Stable on ppc64; bug #122071 + + 13 Feb 2006; Mark Loeser openssl-0.9.7e-r2.ebuild: + Fix leading spaces + + 12 Feb 2006; Mike Frysinger openssl-0.9.7i.ebuild, + openssl-0.9.8a.ebuild: + Run sed in LC_ALL=C in order to fix [a-z] in funky locales #122554 by Erkki + Eilonen. + + 09 Feb 2006; Simon Stelling openssl-0.9.7e-r2.ebuild, + openssl-0.9.7i.ebuild: + stable on amd64 + + 09 Feb 2006; Joshua Kinard openssl-0.9.7i.ebuild: + Marked stable on mips. + + 09 Feb 2006; Aron Griffis openssl-0.9.7i.ebuild: + Mark 0.9.7i stable on alpha + + 08 Feb 2006; Gustavo Zacarias openssl-0.9.7i.ebuild: + Stable on sparc wrt #122071 + + 08 Feb 2006; openssl-0.9.7i.ebuild: + Stable on ppc. bug 122071 + + 08 Feb 2006; Saleem Abdulrasool + openssl-0.9.7i.ebuild: + stable on x86 as per bug #122071 + + 06 Jan 2006; Mike Frysinger openssl-0.9.6m.ebuild, + openssl-0.9.7e-r2.ebuild, openssl-0.9.7g-r1.ebuild, openssl-0.9.7h.ebuild, + openssl-0.9.7i.ebuild, openssl-0.9.8a.ebuild: + Add ca-certificates for most systems. + + 13 Dec 2005; Markus Rothe openssl-0.9.7i.ebuild: + Added ~ppc64 keyword; bug #114592 + + 09 Nov 2005; openssl-0.9.7i.ebuild: + Add back in ~amd64. It is ABI compat as far as I can tell + + 26 Oct 2005; Mike Frysinger + +files/gentoo.config-0.9.8, +files/openssl-0.9.8-toolchain.patch, + openssl-0.9.8a.ebuild: + Clean up ebuild and fix building on x86 #110457 by Justin Guyett. + +*openssl-0.9.7i (16 Oct 2005) + + 16 Oct 2005; Mike Frysinger +openssl-0.9.7i.ebuild: + Version bump. + +*openssl-0.9.8a (12 Oct 2005) +*openssl-0.9.7h (12 Oct 2005) + + 12 Oct 2005; Mike Frysinger + +files/openssl-0.9.7h-ABI-compat.patch, +openssl-0.9.7h.ebuild, + +files/openssl-0.9.8-hppa-fix-detection.patch, +openssl-0.9.8a.ebuild: + Version bumpage. + +*openssl-0.9.8-r1 (12 Oct 2005) +*openssl-0.9.7g-r1 (12 Oct 2005) +*openssl-0.9.7e-r2 (12 Oct 2005) + + 12 Oct 2005; Mike Frysinger + +files/openssl-0.9.7-CAN-2005-2969.patch, + +files/openssl-0.9.8-CAN-2005-2969.patch, -openssl-0.9.7d-r2.ebuild, + +openssl-0.9.7e-r2.ebuild, +openssl-0.9.7g-r1.ebuild, + +openssl-0.9.8-r1.ebuild: + Add fixes for CAN-2005-2969 #108852. + + 02 Sep 2005; MATSUU Takuto + +files/openssl-0.9.7e-superh.patch, openssl-0.9.7e-r1.ebuild: + Added patch to support sh. + + 18 Aug 2005; Mike Frysinger openssl-0.9.7e-r1.ebuild, + openssl-0.9.7g.ebuild, openssl-0.9.8.ebuild: + Add support for USE=zlib #79179 by Stefan Riemer. + + 13 Aug 2005; Diego Pettenò + files/gentoo.config-0.9.7g, +files/openssl-0.9.7g-amd64-fbsd.patch, + openssl-0.9.7g.ebuild: + Added patch to support amd64-fbsd target. Updated config script. + + 12 Aug 2005; +files/openssl-0.9.7c-tempfile.patch: + Readding missing patch. + + 12 Aug 2005; Caleb Tennis -openssl-0.9.7e.ebuild: + remove stale version + + 12 Aug 2005; Caleb Tennis + -files/openssl-0.9.7c-gentoo.diff, -files/openssl-0.9.7c-tempfile.patch, + -openssl-0.9.7c-r1.ebuild: + remove old version that was package.masked for security reasons + + 07 Aug 2005; MATSUU Takuto files/gentoo.config-0.9.7g, + files/openssl-0.9.7g-superh.patch: + Fixed compile issue on sh. Bug 98418. + + 08 Jul 2005; Hardave Riar openssl-0.9.7g.ebuild: + Marked ~mips, bug #92076. + + 06 Jul 2005; Martin Schlemmer openssl-0.9.8.ebuild: + Remove custom config stuff as asked in gentoo.config-0.9.7g - bug #98072 + responsible. + + 05 Jul 2005; Martin Schlemmer + openssl-0.9.7c-r1.ebuild, openssl-0.9.7d-r2.ebuild, openssl-0.9.7e.ebuild, + openssl-0.9.7e-r1.ebuild, openssl-0.9.7g.ebuild: + Fix creating certificates cannot find libcrypt/libssl on new install. + +*openssl-0.9.8 (05 Jul 2005) + + 05 Jul 2005; Martin Schlemmer + +files/openssl-0.9.8-make-engines-dir.patch, + +files/openssl-0.9.8-parallel-build.patch, + +files/openssl-0.9.8-ppc64.patch, +openssl-0.9.8.ebuild: + Update version. Fix parallel build. Fix new engines not creating install + dir. Fix creating certificates cannot find libcrypt/libssl on new install. + + 04 Jul 2005; Hardave Riar openssl-0.9.7e-r1.ebuild: + Stable on mips. + + 02 Jul 2005; Bryan Østergaard + openssl-0.9.7e-r1.ebuild: + Stable on alpha. + + 17 Jun 2005; Michael Hanselmann + openssl-0.9.7e-r1.ebuild: + Stable on ppc. + + 13 Jun 2005; Diego Pettenò + files/gentoo.config-0.9.7g: + Unbreak uclibc cross-compilation and beautify the script using a case + instead of a series of ifs. + + 13 Jun 2005; Diego Pettenò + files/gentoo.config-0.9.7g, openssl-0.9.7g.ebuild: + Fixed the gentoo.config script to be aware of different OS (in this case, + FreeBSD), and added an output to tell which target is selected. + + 29 May 2005; openssl-0.9.7d-r2.ebuild, + openssl-0.9.7e.ebuild: + echangelog - update package to use libc expanded variable elibc_uclibc vs + uclibc so USE=-* works + + 26 May 2005; Markus Rothe openssl-0.9.7e-r1.ebuild: + Stable on ppc64 + + 11 May 2005; Gustavo Zacarias openssl-0.9.7g.ebuild: + Back to ~sparc wrt #92075 + + 10 May 2005; Mike Frysinger + +files/openssl-0.9.7g-ABI-compat.patch, openssl-0.9.7g.ebuild: + Add patch to fix amd64 ABI breakage #86358. Thanks to Daniel Gryniewicz for + tracking this down. + + 10 May 2005; Mike Frysinger + +files/openssl-0.9.7e-ptr-casting.patch, + +files/openssl-0.9.7e-x86_64-bn-asm.patch, + +files/openssl-0.9.7g-mem-clr-ptr-cast.patch, + +files/openssl-0.9.7g-ptr-casting.patch, openssl-0.9.7e-r1.ebuild, + openssl-0.9.7g.ebuild: + Some misc pointer/asm fixes from upstream. + + 09 May 2005; Mike Frysinger + +files/gentoo.config-0.9.7g, openssl-0.9.7g.ebuild: + Add cross-compiling support #85344. + + 02 May 2005; Gustavo Zacarias + openssl-0.9.7e-r1.ebuild: + Stable on sparc + +*openssl-0.9.7g (01 May 2005) + + 01 May 2005; Mike Frysinger + +files/openssl-0.9.7g-no-fips.patch, +openssl-0.9.7g.ebuild: + Version bump #86358. + + 20 Apr 2005; openssl-0.9.7e-r1.ebuild: + - clean out patent or otherwise encumbered code when USE=bindist is set + + 08 Apr 2005; Markus Rothe openssl-0.9.7e.ebuild: + Stable on ppc64 + + 29 Mar 2005; Mamoru KOMACHI openssl-0.9.7d.ebuild, + openssl-0.9.7d-r1.ebuild, openssl-0.9.7d-r2.ebuild, openssl-0.9.7e.ebuild, + openssl-0.9.7e-r1.ebuild: + Install elisp file only if emacs USE flag is set; bug #85944. + + 22 Mar 2005; Jeremy Huddleston + openssl-0.9.7e-r1.ebuild: + Use correct toolchain CC. + + 13 Mar 2005; Mike Frysinger + +files/openssl-0.9.7e-no-fips.patch, openssl-0.9.7e-r1.ebuild: + Dont install the fips stuff #80878 by Kaiting Chen. + + 02 Mar 2005; Daniel Goller openssl-0.9.7e.ebuild: + Stable on ppc + + 14 Feb 2005; Gustavo Zacarias openssl-0.9.7e.ebuild: + Stable on sparc + +*openssl-0.9.7e-r1 (14 Feb 2005) + + 14 Feb 2005; Robin H. Johnson + +openssl-0.9.7e-r1.ebuild: + Bug #69550, make sure openssl is built correctly to work with unstripped + /lib/ld.so. + + 07 Feb 2005; Bryan Østergaard openssl-0.9.7e.ebuild: + Stable on alpha. + + 13 Dec 2004; Jeremy Huddleston + openssl-0.9.7d-r2.ebuild, openssl-0.9.7e.ebuild: + Added support for sparc64-multilib. + +*openssl-0.9.7e (12 Dec 2004) + + 12 Dec 2004; Mike Frysinger + +files/openssl-0.9.7-alpha-default-gcc.patch, + +files/openssl-0.9.7-arm-big-endian.patch, + +files/openssl-0.9.7-hppa-fix-detection.patch, + +files/openssl-0.9.7e-gentoo.patch, +openssl-0.9.7e.ebuild: + Version bump #68983 by Lars. Also cleanup the sed-scripts to be patches and + add an arm big endian fix #74054. + + 07 Nov 2004; Joshua Kinard openssl-0.9.7d-r2.ebuild: + Marked stable on mips. + + 05 Nov 2004; Jason Wever openssl-0.9.7d-r2.ebuild: + Stable on sparc wrt security bug #68407. + + 06 Nov 2004; Bryan Østergaard + openssl-0.9.7d-r2.ebuild: + Stable on alpha, bug 68407. + + 05 Nov 2004; Karol Wojtaszek + openssl-0.9.7d-r2.ebuild: + Stable on amd64 + + 05 Nov 2004; Markus Rothe openssl-0.9.7d-r2.ebuild: + Stable on ppc64; bug #68407 + +*openssl-0.9.7d-r2 (06 Nov 2004) + + 06 Nov 2004; Daniel Black + +files/openssl-0.9.7c-tempfile.patch, +openssl-0.9.7d-r2.ebuild: + Fixed insecure temp file creation as per bug #68407. stable on x86 and ppc + + 21 Sep 2004; Michael Sterrett + openssl-0.9.7d-r1.ebuild: + error check sed + + 01 Sep 2004; Travis Tilley openssl-0.9.7d-r1.ebuild: + made openssl use $(get_libdir) to optionally install to lib64/lib32 + + 19 Jul 2004; Mike Frysinger openssl-0.9.7d-r1.ebuild: + Move `make test` out of src_compile() and into src_test() where it should be. + + 13 Jul 2004; Daniel Ahlberg openssl-0.9.7d-r1.ebuild: + Change back to single make. + Added diffutils to DEPEND, closing #55560. + + 01 Jul 2004; Jeremy Huddleston + openssl-0.9.6m.ebuild, openssl-0.9.7c-r1.ebuild, openssl-0.9.7c.ebuild, + openssl-0.9.7d-r1.ebuild, openssl-0.9.7d.ebuild: + virtual/glibc -> virtual/libc + + 28 Jun 2004; openssl-0.9.7d-r1.ebuild: + added missing uclibc to IUSE + + 25 Jun 2004; openssl-0.9.7d-r1.ebuild: + uclibc update + + 15 Jun 2004; Daniel Ahlberg openssl-0.9.7d-r1.ebuild, + openssl-0.9.7d.ebuild: + Fall back to single thread make if parallell fails. Hopefully closing #48475. + + 15 Jun 2004; openssl-0.9.7d.ebuild: + remove dep of bc when uclibc is used + +*openssl-0.9.7d-r1 (14 Jun 2004) + + 14 Jun 2004; Daniel Ahlberg openssl-0.9.7d-r1.ebuild, + Add smime patch from CVS, closing #50440. + + 06 Jun 2004; Aron Griffis openssl-0.9.7c-r1.ebuild, + openssl-0.9.7d.ebuild: + Fix use invocation + + 16 May 2004; Luca Barbato openssl-0.9.7d.ebuild: + Minor workaround for ppc and ppc64 gcc-3.3.3 and gcc-3.4 + + 10 May 2004; Tom Gall openssl-0.9.7d.ebuild: + fix for ppc64, bug #50637 + + 28 Apr 2004; Tom Gall openssl-0.9.7d.ebuild: + patch fix ppc64, bug #49102 + + 25 Apr 2004; Daniel Ahlberg openssl-0.9.7d.ebuild: + Install emacs files, from #47854. + + 20 Apr 2004; Tom Gall openssl-0.9.7d.ebuild: + fix for ppc64 support see #45463 + + 30 Mar 2004; Daniel Ahlberg openssl-0.9.7d.ebuild: + + use gcc eclass instead of gcc-dumpversion. + + filter -funroll-loops, closing #45600. + + use emake of 0.9.7, closing #45002. + +*openssl-0.9.6m (17 Mar 2004) +*openssl-0.9.7d (17 Mar 2004) + + 17 Mar 2004; Daniel Ahlberg openssl-0.9.7d.ebuild, + openssl-0.9.6m.ebuild: + Security update, also removed some old ebuilds. + + 01 Mar 2004; Tom Gall openssl-0.9.7c-r1.ebuild: + remove call to make test for ppc64 for now. This is problematic, as + we have some bug running around for ppc64 but we also need to move + forward. + + 16 Feb 2004; Gustavo Zacarias + openssl-0.9.7c-r1.ebuild: + Fixed compilation of sparc32 target on sparc64 + + 10 Feb 2004; Bartosch Pixa + openssl-0.9.7c-r1.ebuild: + set ppc in keywords + + 28 Jan 2004; Aron Griffis openssl-0.9.7c-r1.ebuild: + stable on alpha and ia64 + + 18 Jan 2004; Jason Wever openssl-0.9.7c-r1.ebuild: + Marked stable on sparc. + + 18 Jan 2004; Martin Guy openssl-0.9.7c-r1.ebuild: + Marked stable on hppa. + +*openssl-0.9.7b-r3 (17 Jan 2004) + + 17 Jan 2004; Joshua Kinard openssl-0.9.6k-r1.ebuild, + openssl-0.9.6k.ebuild, openssl-0.9.6l.ebuild, openssl-0.9.7b-r3.ebuild, + openssl-0.9.7b.ebuild, openssl-0.9.7c-r1.ebuild, openssl-0.9.7c.ebuild: + Bumped mips to stable, fixed copyright headers, & Removed inherit on gcc.eclass + and replaced $(gcc-version) calls with a ${gcc_version} variable defined by + calling gcc -dumpversion directly. The reason for this was to resolve + dependency issues reported by repoman. + + 17 Jan 2004; Guy Martin openssl-0.9.7c-r1.ebuild: + Fixed detection of the target on hppa smp box. + + 13 Jan 2004; Daniel Ahlberg openssl-0.9.7c-r1.ebuild: + More CFLAGS filtering, Closing #34261. + + 09 Jan 2004; Daniel Ahlberg openssl-0.9.7c-r1.ebuild: + Update the way CFLAGS are changed. + + 08 Jan 2004; Robin H. Johnson openssl-0.9.7c-r1.ebuild: + fix bug #37600 + + 03 Jan 2004; Daniel Ahlberg openssl-0.9.7c-r1.ebuild: + Better filtering of existing cflags to be replaced by our own. Closing #35283. + + 16 Dec 2003; Joshua Kinard openssl-0.9.7c-r1.ebuild: + Made a change to the mips detection so we can differentiate betweem mips and + mipsel machines, and pass the apropriate configure target, otherwise the + testsuite fails + +*openssl-0.9.6l (04 Nov 2003) +*openssl-0.9.7c-r1 (04 Nov 2003) + + 8 Dec 2003; Guy Martin openssl-0.9.6k.ebuild, + openssl-0.9.6k-r1.ebuild, openssl-0.9.6l.ebuild : + Forcing target linux-parisc even on 32bit kernel because detection fail + on multicpu box. + + 25 Nov 2003; Guy Martin openssl-0.9.7c-r1.ebuild : + Fix detection of parisc64 boxes. + + 17 Nov 2003; Joshua Kinard openssl-0.9.7c-r1.ebuild: + Made a tweak to allow openssl to build on mips64 platforms (64-bit kernel, + 32-bit userland) + + 12 Nov 2003; Daniel Ahlberg openssl-0.9.7c.ebuild, openssl-0.9.7c-r1.ebuild : + Make test removes the built libraries to be rebuilt later with make install, this was not the case with + 0.9.6 libraries as they where only inserted into ${D}. Now we run make again before installing those + libraries to make sure they exist. Closing #32858. + + 06 Nov 2003; Paul de Vrieze openssl-0.9.7c-r1.ebuild: + Add checks so that missing 0.9.6 libs when they should be there will cause the + ebuild to fail, so saving from mishap + + 04 Nov 2003; Daniel AHlberg openssl-0.9.7c-r1.ebuild openssl-0.9.6l.ebuild : + Security update. + + 28 Oct 2003; Daniel Ahlberg openssl-0.9.7c.ebuild : + Add make test to compile process. Closes #30066. + +*openssl-0.9.6k-r1 (10 Oct 2003) + + 10 Oct 2003; Daniel Ahlberg openssl-0.9.6k-r1.ebuild: + Adding the fix for bn.h to the 0.9.6k series + + 01 Oct 2003; Jon Portnoy openssl-0.9.7c.ebuild : + Stable for ia64 + + 30 Sep 2003; openssl-0.9.7c.ebuild: + Keyword amd64 + + 30 Sep 2003; Christian Birchinger openssl-0.9.6k.ebuild: + Added sparc stable keyword + +*openssl-0.9.7c (30 Sep 2003) +*openssl-0.9.6k (30 Sep 2003) + + 30 Sep 2003; Daniel Ahlberg openssl-0.9.7c.ebuild, openssl-0.9.6k.ebuild : + Security update. + +*openssl-0.9.7b-r2 (16 Sep 2003) + + 24 Sep 2003; Martin Schlemmer openssl-0.9.7b-r1.ebuild, + openssl-0.9.7b-r2.ebuild, openssl-0.9.7b.ebuild: + Breaks things one some boxen, bug #13795. The problem is that if we have + a 'gcc fixed' version in $(gcc-config -L) from 0.9.6, then breaks as it was + defined as 'int BN_mod(...)' and in 0.9.7 it is a #define with BN_div(...). + + 19 Sep 2003; Daniel Ahlberg openssl-0.9.7b-r2.ebuild : + Filter "-fprefetch-loop-arrays" for all GCC 3.3 versions. + Closing #28997. + + 17 Sep 2003; Daniel Ahlberg openssl-0.9.7b-r2.ebuild : + Closing #12971 and #25461. Removing from packages.mask + + 16 Sep 2003; Daniel Ahlberg openssl-0.9.7b-r2.ebuild : + This version optionally installs openssl-0.9.6 if upgrading, and leaves it out + if installing from scratch. Libraries from openssl-0.9.6 are needed becuse every + program linking to openssl links directly to the version named library instead of + the symlink. + +*openssl-0.9.7b-r1 (02 Sep 2003) + + 02 Sep 2003; Mike Frysinger : + Add a version so ppl running ~ can unmask/emerge it. + + 29 Jul 2003; Will Woods openssl-0.9.6j.ebuild: + Use SSH_TARGET on alpha to force it to honor CHOST, marked stable. + +*openssl-0.9.6j (23 May 2003) + + 29 Sep 2003; Joshua Kinard openssl-0.9.6j.ebuild: + Changes ~mips to mips in KEYWORDS + + 23 Sep 2003; Bartosch Pixa openssl-0.9.6j.ebuild: + set ppc in keywords + + 23 Jul 2003; Guy Martin openssl-0.9.6j.ebuild : + Marked stable on hppa. + + 01 Jul 2003; Todd Sunderlin openssl-0.9.6j.ebuild : + set stable on sparc + + 14 Jun 2003; Guy Martin openssl-0.9.6j.ebuild : + Added a build fix for people running a 64bit kernel. + + 23 May 2003; Brandon Low openssl-0.9.6j.ebuild: + Bump, lots of nice security fixes, several patches from 0.9.6i-r2 are merged + in here + + 20 May 2003; Tavis Ormandy openssl-0.9.6i-r2.ebuild, + openssl-0.9.7b.ebuild: + ccc/openssl co-existance fixes. + + 18 May 2003; Tavis Ormandy openssl-0.9.6i-r2.ebuild: + making ccc usable. + +*openssl-0.9.7b (10 Apr 2003) + + 17 Apr 2003; Tavis Ormandy openssl-0.9.6i-r2.ebuild, + openssl-0.9.7b.ebuild: + Setting openssl-0.9.6i-r2 to completely ignore ccc, even if found - if used, result wont be + backward compatible. + + Produce libssl.so on linux-alpha*-ccc in openssl-0.9.7b. + + 10 Apr 2003; Brandon Low Manifest, + openssl-0.9.7b.ebuild: + Bump + +*openssl-0.9.6i-r2 (24 Mar 2003) + + 14 Jun 2003; Guy Martin openssl-0.9.6i-r2.ebuild : + Added a build fix for people running a 64bit kernel. + + 19 Mar 2003; Daniel Ahlberg : + Security update. Added patch against Klima-Pokorny-Rosa attack. + +*openssl-0.9.7a-r2 (24 Mar 2003) + + 19 Mar 2003; Daniel Ahlberg : + Security update. Added patch against Klima-Pokorny-Rosa attack. + +*openssl-0.9.6i-r1 (19 Mar 2003) + + 19 Mar 2003; Daniel Ahlberg : + Security update. + +*openssl-0.9.7a-r1 (19 Mar 2003) + + 19 Mar 2003; Daniel Ahlberg : + Security update. + + 13 Mar 2003; Guy Martin openssl-0.9.6i.ebuild : + Now produce also libssl.so on hppa. + + 28 Feb 2003; Maarten Thibaut openssl-0.9.6i.ebuild : + Add code to detect sparc32 build on sparc64. Add code to compile for + sparc32 on sparc64 depending on PROFILE_ARCH environment variable. + + 23 Feb 2003; Zach Welch openssl-0.9.6i.ebuild : + Add arm patch to ebuild to fix problems linking aginst libcrypto.so + Cleanup several lintool violations + + 21 Feb 2003; Zach Welch openssl-0.9.6i.ebuild : + Added arm to keywords. + + 21 Feb 2003; Jan Seidel openssl-0.9.6g-r1.ebuild openssl-0.9.6i.ebuild : + added a patch for mips + + 12 Feb 2003; Guy Martin : + Added -fPIC to CFLAGS for hppa needed by many apps linking to openssl. + + 09 Feb 2003; Guy Martin : + Added hppa to keywords. + + 07 Jan 2003; Daniel Ahlberg openssl-0.9.7.ebuild : + Added warning message and some info on how to successfully emerge new version. + +*openssl-0.9.7 (05 Jan 2003) + + 05 Jan 2003; Daniel Ahlberg files/digest-openssl-0.9.7 : + Version bump. Found by jochem prins in #12973. Masked. + + 05 Jan 2003; Daniel Ahlberg files/digest-openssl-0.9.6h : + Removed masking in packages.mask and marked it unstable. + + 19 Dec 2002; Daniel Ahlberg files/digest-openssl-0.9.6h : + Re-made digest. The new md5 sum is the same as the md5sum in the announcement + mail. I must have made the old digest against a bad archive. + +*openssl-0.9.6h (16 Dec 2002) + + 16 Dec 2002; Daniel Ahlberg : + Version bump. Masked in packages.mask. NOT binary compatible with g so it will break things + unless you re-emerge does packages failing. + + 06 Dec 2002; Rodney Rees : changed sparc ~sparc keywords + +*openssl-0.9.6g-r1 (04 Nov 2002) + + 21 Feb 2003; Jan Seidel : + Added a patch for mips + + 25 Nov 2002; Nick Hadaway openssl-0.9.6g-r1.ebuild : + Updated ebuild so the certs directory is created. + + 04 Nov 2002; Daniel Ahlberg : + Changed openssldir to /etc as suggested by Corporate Gadfly in #9315. + +*opessl-0.9.6g (29 Aug 2002) + + 09 Feb 2003; Jan Seidel : + Added a patch for mips (apache2 with openssl) + + 19 Jan 2003; Jan Seidel : + Added mips to keywords + + 06 Oct 2002; Jack Morgan : + Added sparc/sparc64 keywords + + 27 Sep 2002; Daniel Ahlberg : + Cleaned out files/. + + Made OpenSSL use native crypt() instead of built-in. Thanks to Jason Jeremias + in #8438. + + 17 Sep 2002; Mark Guertin openssl-0.9.6g.ebuild : + Added ppc to keywords + + 29 Aug 2002; Daniel Ahlberg openssl-0.9.6g.ebuild : + Version bump, closes #6290. Ebuild contributed by hannes@mehnert.org. + +*openssl-0.9.6e (30 Jul 2002) + + 2 Aug 2002; Calum Selkirk openssl-0.9.6e.ebuild : + + Added ppc to KEYWORDS. + + 30 Jul 2002; Daniel Ahlberg openssl-0.9.6e.ebuild : + + New version to fix security, http://www.openssl.org/news/secadv_20020730.txt + +*openssl-0.9.6d-r1 (10 Jul 2002) + + 10 Jul 2002; Josh Tegart : + + Fixed problem that prevented openssl-0.9.6d from building on sparc. The + Configure script incorrectly set the SHARED_LDFLAGS in the Makefile. The new + ebuild simply removes the incorrect value if ARCH="sparc". + +*openssl-0.9.6d (13 May 2002) + + 13 May 2002; Donny Davies : + + Update to latest. Added LICENSE, SLOT. Use make vs. emake. + +*openssl-0.9.6c-r1 (3 Apr 2002) + + patch from src_unpack; it was redundant. Remove the manpage sed stuff + and pass MANDIR to make install instead. Fix a longstanding annoyance + with the support scripts getting installed into /usr/ssl and install + them in the proper place: /usr/lib/ssl. Add a patch for compiling with + gcc-3. Fix a glitch with the html docs getting installed into a redundant + 'doc' subdirectory. Remove all old patches, digests and ebuilds. + + 21 Mar 2002; Daniel Robbins : Fixed 0.9.6c ebuild so + that it doesn't do 'sed -e "foo" | cat > Makefile', which breaks often. Now + it is a standard 2-liner. + + 21 Mar 2002; Seemant Kulleen openssl-0.9.6c.ebuild : + Fixed so that html documentation is no longer gzipped. Small enough to not + warrant a revision bump on the ebuild. + +*openssl-0.9.6c (1 Feb 2002) + + 1 Feb 2002; G.Bevin ChangeLog : + + Added initial ChangeLog which should be updated whenever the package is + updated in any way. This changelog is targetted to users. This means that the + comments should well explained and written in clean English. The details about + writing correct changelogs are explained in the skel.ChangeLog file which you + can find in the root directory of the portage repository. diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/Manifest b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/Manifest index 0cfc20122b..582a5eabbf 100644 --- a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/Manifest +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/Manifest @@ -1 +1,41 @@ -DIST openssl-0.9.8x.tar.gz 3782486 RMD160 18a805c177af1667a05104e87acbff97a420864c SHA1 8c3be5160513c0af1e558d3f932390ecb16f59e9 SHA256 7ce0c7f2c451070b4497ea7ca6f23eba6cef1a56db2e86e433f65926a7bc7497 +AUX gentoo.config-0.9.8 4246 SHA256 a38f4a9af890303d764b04eab64dd618b60599762d3ab3286b667c1ee38d2b75 SHA512 04ca7a9cb42762060216cf2696003d1087b1504e7f79278b0509b6a03da0bba0a13cdbe9fd713754379e09dc6bf0e7354fc1bcbaf8a7d75f4a400fe6c8868ab7 WHIRLPOOL 3d5524dda714eec5236b7d15e36c0633d75c750ba5555df2c5da59781cd6d0005f5810dad001758635def1894f27f83fde45e80f51c5467603c54a2b1389e22a +AUX gentoo.config-1.0.0 4748 SHA256 67ae024ebb87a8236a358a081f2d9b038eef2d0f432705d05063274e7af28b4e SHA512 c68b7eb3d07a3b619f6c3e5f508e594efe2991aef91d8904019f967c20a7e9e9604d8fce1271b5bc247856411e81a800eed7710da46645b9d5d9e5cb184ab99b WHIRLPOOL a849c1ea7d7d0dfeac675636e801dd050c66866f6327e6619f233ede0fc0e59f5f2f554f7812a0c33bd40d76a7ba85ca3aab0a00f964e971de97f5af11a527bc +AUX openssl-0.9.8e-bsd-sparc64.patch 1484 SHA256 8a79f022a17a7fadb4eb708538b41a7a034e21ad84162beb1f7fa7cff5eb487e SHA512 dbbfae5ce19a4247a6b1ca4a45ca6c15904e13e6bf603447cb5d9820292ceb411792e29db0001c5869e3c4cb0a8afe7fb64d35f007052efc68098301c2e81def WHIRLPOOL 36959cfb8a3f2ac05b28fb6c0e28574f0267ddb6f89471e663ee370a1a1ce3e6c85c6a637098acdac4644f4c20370e2775d9c2610ff03a5ae2a7662d79a60e95 +AUX openssl-0.9.8h-ldflags.patch 1048 SHA256 2c7cca7b59efc9da5de2efebec2085933295c2875d221c54897dae770cca45de SHA512 71faa144f3a5c9e9b55a05d856e8d1e6d76fd3c00078d7e44a1637076cc86eea018d533ad1dd677a28ebbb1418794b7d029d993d66601f2bc02f497b1cc7eb6e WHIRLPOOL bab4de438c687752e497c8cc3dd2d24015d189fdcccaec5e35c1f738177ad39555dc70d80fd3efba46db425bdf3b471f380a91466a2d17316d491755893763bd +AUX openssl-0.9.8m-binutils.patch 684 SHA256 1e4475f7183ec237d129b686d4ca5265bf7eb34642e7d9e77cbe8ad9a97b4876 SHA512 5e8a20111bd4809e7375c7323dab2c2edd6a131d1ec2377ee99c5e06ceb7b4b000e9606ba6d0e68cd67d8e001cc8194e11e301eace0feb066d5f3c5b331b5f04 WHIRLPOOL dd4a0329e571e4f9322806fce2e6c510b978b68e5c6c64bfbe6993da16989c1a5451fe1e5b0509c0022925ca356cf3309799cdc204998107425fb016cb49da2d +AUX openssl-1.0.0a-ldflags.patch 891 SHA256 f04cef1b912681393236f9631792cd404783586c2fd8e0f011ace6236cc6dc4a SHA512 8ced9f22e413f81ff0563793bd6b765912af16671a0d10bff0c518c44bced0177dbcd6536359ff5b6bd5d49fa5032de47c719198444254d4814e4b21301f606c WHIRLPOOL f9b2641b8df926ff5d9d5cf5a7737f5cb4a3a2be2225911ebebd944f13219acfac07d496eec9a8e91af3f50ac1275dc7b0652354e8e958a0d3f6708e641f8970 +AUX openssl-1.0.0d-alpha-fix-unalign.patch 1377 SHA256 e5f1c60ea82f22d7f388ecc9db42aa872e1329a672e41297bec2bf9b7a662244 SHA512 dbd953cfeeac148277a03ef86bf3e293fa2620c0b4d18888c141ac234b9d492b016745553b6c8937eee784dea5706be29794c7a456928da0d7ce47f4ac63d120 WHIRLPOOL 8fd0ce44a2f64df2a55155162a606edd2b1c1cd82196f6be89de0a8c2262067eedf1f14647407c9bb3d8eda7598c4eda078f6d597cfc97487cb4e54d9c6e196f +AUX openssl-1.0.0d-alpha-typo.patch 235 SHA256 60d2cb4cae47b5d61aeca2b6e0ae45d82c3b2ba698df72d10ee26370abd354ab SHA512 5993c77d15cd19353c218863e65d773c42c2a11e35247f991d7f388965e64fef3aae0659c02698bd5b4cd28dcbf7c4c40beb63dea1ac7b4ec041965eaf16b0db WHIRLPOOL 9eb3808e8ca7793b1cdd926d4a63822006be54cb0085855af27bfa57ff792772828d3f20b4598036f3ab075d6a24cad456dc19f995d6ec5ccf5c26a22ca46ccf +AUX openssl-1.0.0d-fbsd-amd64.patch 417 SHA256 c72d33d0ac88280fb444574f236fefd73db4b968d342b0fb4530cdffbe2fff5a SHA512 3f9805ce1b3e52e3c14c79104a76b42f94df677be2567b4d4f25fd1e964d60bac39fae4f4e0175583da5eeea012315d95d27656c8ad7613ad31e4f82f036c301 WHIRLPOOL 6b51beb8fd9874a0683136df7dd21bec72de85abd1e561397ecbdb2fb7633047738d2b9bb4cad2610b3788b9995ff40212383b7dd752074e9af5d671780b0ccc +AUX openssl-1.0.0d-windres.patch 2890 SHA256 27664cfab4852f1a301c4020375eba029c8a1728d58829c831a36d3aa2fbe9f4 SHA512 32187d0a04c85118cc763ff1fe8c4635622294fe629b920c47e16408aa720fee2bcc42f97120f6750b59996878e0a3d249143d728a5b5775ec3a022f81bc230a WHIRLPOOL d5979143f7e637b0072f7d5f214d80f5cc0e53f54358781d7f10c0cdb15c2b52813e12d2aa07dde2b40e7a88fcb26d1d619443a8012530d90789609cf5ac4083 +AUX openssl-1.0.0e-parallel-build.patch 9055 SHA256 dc7b14a29d4efc26bf14c5c37e9c3696448826a639ebf9c8485f9f2ddd7efc9b SHA512 1c34083ae3b4833792a0236a6fc73d14056aeb4f4ad086be42865f46dc81a15f017f76cc82c5e8d7cc296f6c7826fb060bf5388cba1653dc7d1fda78208513c5 WHIRLPOOL 5d31f5fdbddad7869912762bb39bcb0e93b0cfc81f3e3a5833f35517349662b9c59369524a05848fde92be600e8decc486219913a0ca3ea27761736cbee96ead +AUX openssl-1.0.0e-pkg-config.patch 1702 SHA256 f506d94ee240776e3f5d93ecdaa010539aa264ec4553b09fa8093074401fe98b SHA512 b28c4118a5157fded2c01a6a61891c69c2c511972ec1afccf1d124736446588838b3025c4a0e41c440aca1e784aa05161fca38e9b6e6f90746263b108b956ac2 WHIRLPOOL 86d32914a757d519b513bec0c0a7e1592775782f8ba5b9c85c8bb01612e6c700c40d5f22f2713e974e140e2841c5852b7391056709b9c353eb1a64df7087e080 +AUX openssl-1.0.0e-x32.patch 4113 SHA256 e3c5118541d580d3cac2fe9f8af54059f81518b9bec0f07aaa1b77e03b85b1c9 SHA512 3e45360aea727f7835c192bc7f0271b0b8fc29c7262b6a96744c88aa56242044872fe170f64e48e0757b5d0a8b7650c786b2b3799bb353d3803253c42691dfaf WHIRLPOOL 1afe85e83041773fea3fbe7264f67d13e6ca0c821a64d3e78de694085cb2270b6f6bfa88c17c1fd5ec9ccc13c58355bca04b6652646b9a754636bdb07c1f8659 +AUX openssl-1.0.0h-pkg-config.patch 1289 SHA256 542dea12747b1cb667707250e3eb3803cbdd396bd0d8e836e48a8018417dc1b8 SHA512 4d1f66dc8615cdf7c96719c8cc909c7d908089e91b0cfe2dd08ae7a332c525b5384e2eb8eb3922e89cbc035167f581eaa606ba826fca6253f16f89f66a9ef225 WHIRLPOOL cdd63a06205b0237ddef1f56df2accf29e5f43f886aed01f95711b49a3af07d87afd0953cb3c12c7e97d4a3392f7c691257dcb7ad3e97cc6fbf1cf399a8a6394 +AUX openssl-1.0.1-ipv6.patch 19237 SHA256 0fae6057881fb43e775cabafb6ff6af6cfaa40eebf64be26ff77a9d4b8bc6b2c SHA512 df55d28b6668ade3041e8d33cf7f98c5770d0b0935a6ba33468783eec6065dcf37ba8d59ba94ea1938afcf3377db176cb27ce417897194c64fc8a75a3f7f924e WHIRLPOOL 90a3cae043a44505ef73cfbc5d48a72309f8eb513789ab3209dac5471983452f10443cee07654867b12860b79840a6b24c5c3a8cd27cb5f3e031068eab196069 +AUX openssl-1.0.1-parallel-build.patch 9918 SHA256 bd56e5fe1b6fe594ab93f34d25fef0b7372633bad8532f81da998f3e6655d221 SHA512 7255b3315133e415631b2ecadc8f5c50a705b9db507c46efded0190363ce9eb31ffbfe01c500669c060878e5202f858b1d2475c64948426fbf70820b4c798ba1 WHIRLPOOL 8a8c71c3806db85d6c6b355717cb4aa1e421fa1777aa7dcd7ee817ac1e552d4b671cdd7cceef9aee1a7dc1b305eb722b1ba0219832c7a6c1b808a0c49212df05 +AUX openssl-1.0.1-x32.patch 3273 SHA256 a4f05b8757e225a05a9c5a3ea485159066760d878c9ee54c4eaf61760e33c6cf SHA512 6bed57fe2fbe2d0ced1279b53804d94426a679d5d6b80ad7d0ed18523a7fda397e02038032c08cdd4e6034f9ff6e82cad365ff2a724d49d91467cf2b77f47752 WHIRLPOOL 1366632e7dc1c6e54efc5b9791bf24833d20e7a61ca29aa38d31b5b9629febf926a29742e370b7cd6767c810c0a1676100ca9169f0d836dfd19ff0b2c29e49c1 +AUX openssl-1.0.1a-hmac-ia32cap.patch 1876 SHA256 798f883a1852ecf50fff5c7cd97b7b5162931fb5ba0f21ba0d3ca26e23c8e967 SHA512 4a13394757e9fdd3a7713cad75c464a33e17860529ee136f988c40e6ee5988483ed3307e5603a5a9ef336b2c94ca35e4707fb493138d79c36aa1c646df6cc81c WHIRLPOOL f04aaf4b0a7ad501d8f3a35e0219f7e7bf73851ba9b1b756e6a0791badf850dc04ffe69ce3fe99045a7a6c9672b10ec5447c5de21ba4bdd44b70bf8fd56372aa +DIST openssl-0.9.8u.tar.gz 3781776 SHA256 0548e4b9171a62dcbbe85e63d9b897a35de718e0fe19b3fe56002c8f5a3ba587 SHA512 5c5998a74b70fb0624086d22f2bc16b6114819deae13c777f93e1c3cf0c1efc6e7adad4a8b00a45c1a112596ac9ea07330356af02d86a82667bb216327cdde34 WHIRLPOOL c6059d0fa69fea76f645afaa0b9d40ea9c5cab310d1e522aaba5b7176dbe89136af74e70577e16e0926c824f646ee3c6902cdc0c87305fd7693a9e4b7e1f4585 +DIST openssl-0.9.8v.tar.gz 3782207 SHA256 701ac4dbd27b9237919b214b53bc0d08e5e1448f2d0fbe1c80479293d2379a65 SHA512 5e625c69b6176bbb4acd0c4b5751d694591156f672e79fecd72c2a7e782e27cb67f0bfe2aea662b2e81f2f4c71ce9805bb5b8da023b368f35952b052e04520f9 WHIRLPOOL 66ea39d7f67259bf17f614de17e76c4c01e910aece24a3f9b107c7f0119809c8b86e098e92639d7c94417e45bc80c670cc3838520743b5ccc632905d1140d66f +DIST openssl-0.9.8w.tar.gz 3782900 SHA256 537411fe2cfe249a8a5b98b3f809a07ed5f913b94a216b3c510fd353318e4593 SHA512 3d93c96ec5550ae6936b353aa48081b9d8a4adfbd5a51d58b44916961e56fb9aedd30621a99ca3618aa3c6b3e15f30a10457d98629ef6ee0c6cb5518606981ca WHIRLPOOL 0ebc673d02489be248b62f800a99d714b7751702fcb7050f40c2231b318aeb3c868cdd48abc9dcecd018139c30b6e23764d0525bafde17097699e9767a3534dd +DIST openssl-0.9.8x.tar.gz 3782486 SHA256 7ce0c7f2c451070b4497ea7ca6f23eba6cef1a56db2e86e433f65926a7bc7497 SHA512 195ba38e5a3ecb9ea65ed1c0dfd7a7c7c8d25683cb401a4c68880a58b0dc3f3002186381ab1ddac64cc441ecd86606aa14bb91ecfc0c56b31ba85015589afdb2 WHIRLPOOL c54f046600443e16dcb41ef1bbb8a803f701f3af4b2a2011419fb1528838f412dc003155a3fbf5e0d15c64c64c3368e628e145cfc90671a0c2b333ac3a4c2ff9 +DIST openssl-1.0.0h.tar.gz 4048067 SHA256 7e3dfc21aa57ed33ea673170053d1921322803b8a6a624a4f0d2e4c308bd418d SHA512 6a1129fa4c90ed67cdeec5578f72ee74ceb983877bbbac41b6ace4abcf4154d6b8217d11951296a1fdfade82c7b9e59e7994fca94e7eb78026b2980fec7be9c5 WHIRLPOOL edec087ef7bf3b6300c2b5870471eca793a0cba217f1ae728d808757749bdc1bdc193c21d86ecf9ba47ca4d0e6bebd1d6407654637226b6dece68b75b8295bc5 +DIST openssl-1.0.0i.tar.gz 4047721 SHA256 548262d15777c504be1ab9bb8fabef1e14a3de54837a6593c8f403dd843d5e57 SHA512 b35d64c038f913fcec8cdec5f8a801425dd4bafb1472548a8c13cbce2245aabfc0ca416e166ac6063d59375817f6560390079156db41b98a83db44307ac0cecb WHIRLPOOL a0854284830ec7e7e2c4418423d089f91a0f81bc7313dd1d1791b20d4b78bfc7543834baad2e8817a3809eb8db10079ee1e84f40ef5003ff9330ad49adf142b8 +DIST openssl-1.0.0j.tar.gz 4047852 SHA256 626fb8fcb3eb7e966edbe71553ff993d137f6e8a87b05051a3695e621098b8af SHA512 9796c75b4d5de57928708f5f0a8ca01aff5b4974b60006454657ed54c34998bc54d747af03860d319db7e7a57b0cd3c267758ffaac31be2be045c977d5fc33d4 WHIRLPOOL 239f051930d9562e7266edd69cf3a1060d381a95228fd17813dd2dbf469c2cf066786b277c2fd56973b830a6b43f28934f5f15d3b6dfac8f37a6e6a65fcae455 +DIST openssl-1.0.1a.tar.gz 4456456 SHA256 d3487e09d891c772cf946273a3bb0ca47479e7941be6d822274320e7cfcc361b SHA512 ceebecbe60201ebb2c600f97e4e0ed38638789189dc2fae85997d5903eda7884ad6190e21b75c453c28ab36ab9262c30f2732945e78bcecc3090542dd4dafd02 WHIRLPOOL 8448ef79710410a2f2b8a7b7b80798c032273d39a3c3f5c1389a1c45a24dd63a3a5a6ce8902a6d0669f0f2643cd5321e969417d01e5194283a159d1773896a50 +DIST openssl-1.0.1b.tar.gz 4456651 SHA256 1187bf2d5cdf0b286b951bf5c777aa97855cd7db24fdb9604cb557c8b1d7364b SHA512 d0cfec093b1a27a14ee6d6dc5da0c19c14b77edf8ba558e909be7cf8c5e29023061ed7ac3c54ffe08ea0c21bb859781c63257e26423a66a117c5887bc65051d2 WHIRLPOOL 552d99cdecba10f208933d5fd2055125769c67576af76c8a50f0d33a4d64cc3165913cddcf5e9a1bed0dec51efbd055beaa8bfdcb079fb8337b22534da741540 +DIST openssl-1.0.1c.tar.gz 4457113 SHA256 2a9eb3cd4e8b114eb9179c0d3884d61658e7d8e8bf4984798a5f5bd48e325ebe SHA512 14f766daab0828a2f07c65d6da8469a4a5a2b839ff3da188538c4e2db3e3e2f37217fb37e269617fb438463b75fb77dab0b155f36831ff48edbc9e7f2903ebd3 WHIRLPOOL 15f90cd981ed82cb1891a2e4179a15882f34aa0ecfff7e6a4fa435b9ea021168228504e7cd9e201c8ada1207942784558f2696f5d45293fa876cf143d8826bf7 +DIST openssl-c_rehash.sh.1.7 4167 SHA256 4999ee79892f52bd6a4a7baba9fac62262454d573bbffd72685d3aae9e48cee0 SHA512 55e8c2e827750a4f375cb83c86bfe2d166c01ffa5d7e9b16657b72b38b747c8985dd2c98f854c911dfbbee2ff3e92aff39fdf089d979b2e3534b7685ee8b80da WHIRLPOOL c88f06a3b8651f76b6289552cccceb64e13f6697c5f0ce3ff114c781ce1c218912b8ee308af9d087cd76a9600fdacda1953175bff07d7d3eb21b0c0b7f4f1ce1 +EBUILD openssl-0.9.8u.ebuild 4327 SHA256 700495983027e6aa69cc801f245e35697fb57336fe33d4b165a884a0f1d8743a SHA512 911484ed40414e5528eb8f2f3899adf8c3c01a45574a6f21318a4abc15c2ee5217b54727bb5aa36ba76102d24772954a591a30f38dd65d3ad1b8164a5b93be8f WHIRLPOOL f70f7e47063803b85303a1b49e4c581d7802330c824ec8694109d284e4517be6c7afd960d585c921b7a89c8d1def2d66c60f3c6aa3fd89934e8216141e10f815 +EBUILD openssl-0.9.8v.ebuild 4328 SHA256 6feb0c64fb55a702b77cee8ef7fb549ec48af9b8c6d513a3238cb66d9fe02548 SHA512 047322f69df93f9d0c800bac10eb2069665bae00acba726f85a6c6446659dd2123148e612a41cd38dee756946e61b1897a1e3d38f991c894e8b343bc1dbed34c WHIRLPOOL 1eedc542e7b94ba7d8095c458ca939671bf2c04ccc24d6bc76bb96a0dafa93aa0864d991e55a59d65393f277176f9613092911cc0f3b31396539e3639fb33ba4 +EBUILD openssl-0.9.8w.ebuild 4329 SHA256 d41ca4ed1e7178ec41b08e9948a5793aaa777effe7c3c1d550637f3f3adac1ff SHA512 1463ef8ceb393f23492b67c6b2c6ffdc9727f733640e56050fe4fbfa2450826d94dfaad655bcf0f2b820722aa89c912d898f34ff70a0f1fcd5d26d2ef80c9f37 WHIRLPOOL 5853809b2c4f7891e026147a37b0ed54556d7b55ba5814a1565d094d4757d470eb460a169818ac6d40fc57adc47d63a583bd7c8801ea959dfa0cfc0a8365d973 +EBUILD openssl-0.9.8x.ebuild 4329 SHA256 4d95e8d5a1c566e645d7c8b0be86487114a9b2ef48373b778995a7116e9847da SHA512 cd33d7432234aa0c4fc35fb44e2b0fb06df0bde54641a886027fec17ab7b3cce35441f5599260cb556ba00ced08be7f65925ab2dd4d286c6ae630bdc52c3c5c9 WHIRLPOOL 0dbf0f044ae876bb2109773556efea36d412e5e9c5d4e43aa5c6d636a4e2c405a8754d86d9eb5ac103d360ef69befea33788f835e72e5ec3ec853ca4ad4c06b1 +EBUILD openssl-1.0.0h.ebuild 7045 SHA256 b22ebc6290b9619c741e893c26045b2ee41135b8b5ff0c3823912f8ca78ce9a6 SHA512 2e2e61dccd7aac6fe910df1f74a9e0e8b59888bb5d9f6467496e84d63a517803b76b8f5f563556e129d10c0f4dabc6db53e1db44e5a422ec14a5327dfc804cde WHIRLPOOL e105ca19416bcbb76fbac93d30180e3e9223e67ab9673c50e6719866bce334c56d574b7d19329c49ac9bcb3951bd84fffacd41d91f534ab08f6c3d7ceec808e0 +EBUILD openssl-1.0.0i.ebuild 7045 SHA256 a47a7cb0c489642191aca5c515b0cb7c9732c1b5efc4ddfed7cf73d4627b3a95 SHA512 e02849ee3957b40fc471f8111f7530becb40f965de8075a12ccbb68edc8e41e8c9d07cab671c52800f2091da095c4fad86addda279a65603a676dfc9eb9d3b7e WHIRLPOOL 0b3debf0e531ef1ea29548c3f6f4b5d5f8c774ee4d68e49843bb9f68702c662f4cbf3c1a22b44bedaca0e1cf6ef8103c1777444bdf4833896af65a8d89d23e17 +EBUILD openssl-1.0.0j.ebuild 7045 SHA256 ea3c127fec343b813a517ecc2b6eee6183c8094fdb575ff9fc015783ee3e39cb SHA512 5a501172d4690f71a109ec4efa4166b8c979efd56b36cfb0c9d46e0333b3c3863ebe755512bca87c543f82469daeda601b2a3f4247f924c2905707c7bb383930 WHIRLPOOL 3db8a0e930df8e605da735ccd25ef31b59ea81e0a3839e09cbe927ac88db8d53b263482f673afe8fd10009c8f2b615c3ff5e501ca97f563051223d070835406b +EBUILD openssl-1.0.1a.ebuild 7364 SHA256 8f4b3486fb8e73dcf54469228c089b185444a449796b8651d54d0c45c5ca4e57 SHA512 0ee731d20639b8464330e1be1e130a28dd55ddbdbce4264c16645eb4c9f4d53805a0a97c614add73eab44714a64f8a4db15cfdd90117a48eac8b8bafba464547 WHIRLPOOL 330865f112a84360bc8f14cc5119bc378f126fea2cd7e4a2892fface434d7eeb6a30cee5e798ebd185ec946bf27ead502806b6d5dad7e48f8d43e4c63ebef1eb +EBUILD openssl-1.0.1b.ebuild 7317 SHA256 e06c044e6493d34ab718b10f75c0c4f119dac3bb2989c1bf97b70e14f1131b12 SHA512 eaca2832c9dfb8955a7bb97025fb97a44739c0308283a9dfcd270daccd1b973ac5125f1f1dbf1bece138a0b0f08d2900f7e710f173f89346874251566f3e103b WHIRLPOOL 28fe59a0e846600d1e69d7d505d862f14d5630af3b341cb758bee993466146867a5c7c245711ece96a2b391cd0bf608703986e919447aa299b985571fb3e3ab8 +EBUILD openssl-1.0.1c.ebuild 7308 SHA256 a22c0324c4d1a53b4d5f81f2a4789da6e4c7e34b355cbb1f651b5f2fb975fcd6 SHA512 72129a888e05270a5efbc17e7c901d4fae94ecb0609cffc5d6d528a9be5b57a0a033bab7a71ab076f367a9a5ba8ba2c634434a9f7a9d41bbd3f319138f6ed2dc WHIRLPOOL 4075cde512b87351de65acf1944981727e6195676b61c31d9989752981ef869c6ab2ceb3b0443339b257b3fc647c38be6316b2b3b7d13106b6b3a372544db250 +MISC ChangeLog 70374 SHA256 74ec4fcdd2029fa4a3d54e7b44f5d595c525ab2e60dae7ab6b0bac1fc3a7122a SHA512 999916c9ebcfe10eeddc7ae2a780d81c69ae32f6ce2ec228c863d8e7f063b5db0e91e8c48553d2df56e27ad055925aa11dae74892023acc4a6b307192f6dde3f WHIRLPOOL e602d235f0cc7af6d4e068009a7a575427b425e144bc9192f38c32870c3ef6516584843fe4e07f98b59d3b4bbc204d02d45160a0e132457d51c175e4cf58813c +MISC metadata.xml 374 SHA256 ce29618473c02511695f6767087277e246b2d252ef6e662dbc65e9df44722f5b SHA512 af8240564be62abad18e8f928694ac2836fc445ae186d5ac3b11dae060e5088dbcbbcac625fffe888de1df0e75934cf1484e54c113c00a25a55d57c39563d430 WHIRLPOOL 197464700dbd530c26a50055e98c1008cd1fd6f4f34ba2e9b4070fca6b87201599c3187b5e4689b6360a1311f1de6b96ae6a0050eb9677c648d8eaf28b0880b9 diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/gentoo.config-0.9.8 b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/gentoo.config-0.9.8 index b096d34bfc..69bb6bc0a3 100644 --- a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/gentoo.config-0.9.8 +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/gentoo.config-0.9.8 @@ -1,12 +1,12 @@ #!/usr/bin/env bash # Copyright 1999-2009 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/files/gentoo.config-0.9.8,v 1.17 2009/06/21 11:40:34 grobian Exp $ +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/files/gentoo.config-0.9.8,v 1.18 2012/05/25 17:41:21 vapier Exp $ # -# Openssl doesn't play along nicely with cross-compiling +# Openssl doesn't play along nicely with cross-compiling # like autotools based projects, so let's teach it new tricks. # -# Review the bundled 'config' script to see why kind of targets +# Review the bundled 'config' script to see why kind of targets # we can pass to the 'Configure' script. diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/gentoo.config-1.0.0 b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/gentoo.config-1.0.0 new file mode 100755 index 0000000000..0c479f1692 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/gentoo.config-1.0.0 @@ -0,0 +1,159 @@ +#!/usr/bin/env bash +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/files/gentoo.config-1.0.0,v 1.5 2012/05/25 17:41:21 vapier Exp $ +# +# Openssl doesn't play along nicely with cross-compiling +# like autotools based projects, so let's teach it new tricks. +# +# Review the bundled 'config' script to see why kind of targets +# we can pass to the 'Configure' script. + + +# Testing routines +if [[ $1 == "test" ]] ; then + for c in \ + "arm-gentoo-linux-uclibc |linux-generic32 -DL_ENDIAN" \ + "armv5b-linux-gnu |linux-armv4 -DB_ENDIAN" \ + "x86_64-pc-linux-gnu |linux-x86_64" \ + "alphaev56-unknown-linux-gnu |linux-alpha+bwx-gcc" \ + "i686-pc-linux-gnu |linux-elf" \ + "whatever-gentoo-freebsdX.Y |BSD-generic32" \ + "i686-gentoo-freebsdX.Y |BSD-x86-elf" \ + "sparc64-alpha-freebsdX.Y |BSD-sparc64" \ + "ia64-gentoo-freebsd5.99234 |BSD-ia64" \ + "x86_64-gentoo-freebsdX.Y |BSD-x86_64" \ + "hppa64-aldsF-linux-gnu5.3 |linux-generic32 -DB_ENDIAN" \ + "powerpc-gentOO-linux-uclibc |linux-ppc" \ + "powerpc64-unk-linux-gnu |linux-ppc64" \ + "x86_64-apple-darwinX |darwin64-x86_64-cc" \ + "powerpc64-apple-darwinX |darwin64-ppc-cc" \ + "i686-apple-darwinX |darwin-i386-cc" \ + "i386-apple-darwinX |darwin-i386-cc" \ + "powerpc-apple-darwinX |darwin-ppc-cc" \ + "i586-pc-winnt |winnt-parity" \ + "s390-ibm-linux-gnu |linux-generic32 -DB_ENDIAN" \ + "s390x-linux-gnu |linux-s390x" \ + ;do + CHOST=${c/|*} + ret_want=${c/*|} + ret_got=$(CHOST=${CHOST} "$0") + + if [[ ${ret_want} == "${ret_got}" ]] ; then + echo "PASS: ${CHOST}" + else + echo "FAIL: ${CHOST}" + echo -e "\twanted: ${ret_want}" + echo -e "\twe got: ${ret_got}" + fi + done + exit 0 +fi +[[ -z ${CHOST} && -n $1 ]] && CHOST=$1 + + +# Detect the operating system +case ${CHOST} in + *-aix*) system="aix";; + *-darwin*) system="darwin";; + *-freebsd*) system="BSD";; + *-hpux*) system="hpux";; + *-linux*) system="linux";; + *-solaris*) system="solaris";; + *-winnt*) system="winnt";; + x86_64-*-mingw*) system="mingw64";; + *mingw*) system="mingw";; + *) exit 0;; +esac + + +# Compiler munging +compiler="gcc" +if [[ ${CC} == "ccc" ]] ; then + compiler=${CC} +fi + + +# Detect target arch +machine="" +chost_machine=${CHOST%%-*} +case ${system} in +linux) + case ${chost_machine}:${ABI} in + alphaev56*) machine=alpha+bwx-${compiler};; + alphaev[678]*)machine=alpha+bwx-${compiler};; + alpha*) machine=alpha-${compiler};; + armv[4-9]*b*) machine="armv4 -DB_ENDIAN";; + armv[4-9]*) machine="armv4 -DL_ENDIAN";; + arm*b*) machine="generic32 -DB_ENDIAN";; + arm*) machine="generic32 -DL_ENDIAN";; + avr*) machine="generic32 -DL_ENDIAN";; + bfin*) machine="generic32 -DL_ENDIAN";; + # hppa64*) machine=parisc64;; + hppa*) machine="generic32 -DB_ENDIAN";; + i[0-9]86*|\ + x86_64*:x86) machine=elf;; + ia64*) machine=ia64;; + m68*) machine="generic32 -DB_ENDIAN";; + mips*el*) machine="generic32 -DL_ENDIAN";; + mips*) machine="generic32 -DB_ENDIAN";; + powerpc64*) machine=ppc64;; + powerpc*) machine=ppc;; + # sh64*) machine=elf;; + sh*b*) machine="generic32 -DB_ENDIAN";; + sh*) machine="generic32 -DL_ENDIAN";; + sparc*v7*) machine="generic32 -DB_ENDIAN";; + sparc64*) machine=sparcv9;; + sparc*) machine=sparcv8;; + s390x*) machine=s390x;; + s390*) machine="generic32 -DB_ENDIAN";; + x86_64*:x32) machine=x32;; + x86_64*) machine=x86_64;; + esac + ;; +BSD) + case ${chost_machine} in + alpha*) machine=generic64;; + i[6-9]86*) machine=x86-elf;; + ia64*) machine=ia64;; + sparc64*) machine=sparc64;; + x86_64*) machine=x86_64;; + *) machine=generic32;; + esac + ;; +aix) + machine=${compiler} + ;; +darwin) + case ${chost_machine} in + powerpc64) machine=ppc-cc; system=${system}64;; + powerpc) machine=ppc-cc;; + i?86*) machine=i386-cc;; + x86_64) machine=x86_64-cc; system=${system}64;; + esac + ;; +hpux) + case ${chost_machine} in + ia64) machine=ia64-${compiler} ;; + esac + ;; +solaris) + case ${chost_machine} in + i386) machine=x86-${compiler} ;; + x86_64*) machine=x86_64-${compiler}; system=${system}64;; + sparcv9*) machine=sparcv9-${compiler}; system=${system}64;; + sparc*) machine=sparcv8-${compiler};; + esac + ;; +winnt) + machine=parity + ;; +mingw*) + # special case ... no xxx-yyy style name + echo ${system} + ;; +esac + + +# If we have something, show it +[[ -n ${machine} ]] && echo ${system}-${machine} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0a-ldflags.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0a-ldflags.patch new file mode 100644 index 0000000000..c0b3bc3fdd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0a-ldflags.patch @@ -0,0 +1,23 @@ +http://bugs.gentoo.org/327421 + +--- Makefile.org ++++ Makefile.org +@@ -189,6 +189,7 @@ + MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD $(MAKEDEPPROG)' \ + DEPFLAG='-DOPENSSL_NO_DEPRECATED $(DEPFLAG)' \ + MAKEDEPPROG='$(MAKEDEPPROG)' \ ++ LDFLAGS='${LDFLAGS}' \ + SHARED_LDFLAGS='$(SHARED_LDFLAGS)' \ + KRB5_INCLUDES='$(KRB5_INCLUDES)' LIBKRB5='$(LIBKRB5)' \ + ZLIB_INCLUDE='$(ZLIB_INCLUDE)' LIBZLIB='$(LIBZLIB)' \ +--- Makefile.shared ++++ Makefile.shared +@@ -153,7 +153,7 @@ + NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \ + SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX" + +-DO_GNU_APP=LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBRPATH)" ++DO_GNU_APP=LDFLAGS="$(LDFLAGS) $(CFLAGS)" + + #This is rather special. It's a special target with which one can link + #applications without bothering with any features that have anything to diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-alpha-fix-unalign.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-alpha-fix-unalign.patch new file mode 100644 index 0000000000..c8fe3301fb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-alpha-fix-unalign.patch @@ -0,0 +1,59 @@ +fix unaligned access in alpha specific 'OPENSSL_cleanse' function + +Debugged with the following simple program: + // gcc cleanse_test.c -o ct -lcrypto + #include + int main(void) + { + char buffer [128]; + int off; + int sz; + for (off = 0; off < sizeof (buffer); ++off) + for (sz = 0; sz < sizeof (buffer) - off; ++sz) + OPENSSL_cleanse (buffer + off, sz); + return 0; + } + $ prctl --unaligned=signal ./cleanse_test + Bus error + +https://bugs.gentoo.org/show_bug.cgi?id=371561 +http://cvs.openssl.org/chngview?cn=21233 +Reported by Tobias Klausmann +Fixed by Andy Polyakov +diff --git a/crypto/alphacpuid.pl b/crypto/alphacpuid.pl +index 11f2e30..5b0e21b 100644 +--- a/crypto/alphacpuid.pl ++++ b/crypto/alphacpuid.pl +@@ -99,19 +99,19 @@ OPENSSL_cleanse: + beq $0,.Laligned + + .Little: ++ subq $0,8,$0 + ldq_u $1,0($16) + mov $16,$2 + .Lalign: + mskbl $1,$16,$1 + lda $16,1($16) + subq $17,1,$17 +- subq $0,1,$0 ++ addq $0,1,$0 + beq $17,.Lout + bne $0,.Lalign + .Lout: stq_u $1,0($2) + beq $17,.Ldone + bic $17,7,$at +- mov $17,$0 + beq $at,.Little + + .Laligned: +@@ -120,9 +120,7 @@ OPENSSL_cleanse: + lda $16,8($16) + bic $17,7,$at + bne $at,.Laligned +- beq $17,.Ldone +- mov $17,$0 +- br .Little ++ bne $17,.Little + .Ldone: ret ($26) + .end OPENSSL_cleanse + ___ diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-alpha-typo.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-alpha-typo.patch new file mode 100644 index 0000000000..1d5496daed --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-alpha-typo.patch @@ -0,0 +1,13 @@ +http://bugs.gentoo.org/364699 + +--- crypto/bn/asm/alpha-mont.pl ++++ crypto/bn/asm/alpha-mont.pl +@@ -41,7 +41,7 @@ $j="s4"; + $m1="s5"; + + $code=<<___; +-#indef __linux__ ++#ifdef __linux__ + #include + #else + #include diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-fbsd-amd64.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-fbsd-amd64.patch new file mode 100644 index 0000000000..5b27ce5c33 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-fbsd-amd64.patch @@ -0,0 +1,12 @@ +Taken from http://rt.openssl.org/Ticket/Display.html?id=2440 + +--- crypto/sha/asm/sha512-x86_64.pl 2008-12-19 11:17:28.000000000 +0000 ++++ crypto/sha/asm/sha512-x86_64.pl 2011-01-15 23:33:13.000000000 +0000 +@@ -51,6 +51,7 @@ + ( $xlate="${dir}../../perlasm/x86_64-xlate.pl" and -f $xlate) or + die "can't locate x86_64-xlate.pl"; + ++close STDOUT; + open STDOUT,"| $^X $xlate $flavour $output"; + + if ($output =~ /512/) { diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-windres.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-windres.patch new file mode 100644 index 0000000000..3f889807da --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0d-windres.patch @@ -0,0 +1,76 @@ +URL: http://rt.openssl.org/Ticket/Display.html?id=2558 +Subject: make windres controllable via build env var settings + +atm, the windres code in openssl is only usable via the cross-compile prefix +option unlike all the other build tools. so add support for the standard $RC +/ $WINDRES env vars as well. + +Index: Configure +=================================================================== +RCS file: /usr/local/src/openssl/CVSROOT/openssl/Configure,v +retrieving revision 1.621.2.40 +diff -u -p -r1.621.2.40 Configure +--- Configure 30 Nov 2010 22:19:26 -0000 1.621.2.40 ++++ Configure 4 Jul 2011 23:12:32 -0000 +@@ -1094,6 +1094,7 @@ my $shared_extension = $fields[$idx_shar + my $ranlib = $ENV{'RANLIB'} || $fields[$idx_ranlib]; + my $ar = $ENV{'AR'} || "ar"; + my $arflags = $fields[$idx_arflags]; ++my $windres = $ENV{'RC'} || $ENV{'WINDRES'} || "windres"; + my $multilib = $fields[$idx_multilib]; + + # if $prefix/lib$multilib is not an existing directory, then +@@ -1511,12 +1512,14 @@ while () + s/^AR=\s*/AR= \$\(CROSS_COMPILE\)/; + s/^NM=\s*/NM= \$\(CROSS_COMPILE\)/; + s/^RANLIB=\s*/RANLIB= \$\(CROSS_COMPILE\)/; ++ s/^WINDRES=\s*/WINDRES= \$\(CROSS_COMPILE\)/; + s/^MAKEDEPPROG=.*$/MAKEDEPPROG= \$\(CROSS_COMPILE\)$cc/ if $cc eq "gcc"; + } + else { + s/^CC=.*$/CC= $cc/; + s/^AR=\s*ar/AR= $ar/; + s/^RANLIB=.*/RANLIB= $ranlib/; ++ s/^WINDRES=.*/WINDRES= $windres/; + s/^MAKEDEPPROG=.*$/MAKEDEPPROG= $cc/ if $cc eq "gcc"; + } + s/^CFLAG=.*$/CFLAG= $cflags/; +Index: Makefile.org +=================================================================== +RCS file: /usr/local/src/openssl/CVSROOT/openssl/Makefile.org,v +retrieving revision 1.295.2.10 +diff -u -p -r1.295.2.10 Makefile.org +--- Makefile.org 27 Jan 2010 16:06:58 -0000 1.295.2.10 ++++ Makefile.org 4 Jul 2011 23:13:08 -0000 +@@ -66,6 +66,7 @@ EXE_EXT= + ARFLAGS= + AR=ar $(ARFLAGS) r + RANLIB= ranlib ++WINDRES= windres + NM= nm + PERL= perl + TAR= tar +@@ -180,6 +181,7 @@ BUILDENV= PLATFORM='$(PLATFORM)' PROCESS + CC='$(CC)' CFLAG='$(CFLAG)' \ + AS='$(CC)' ASFLAG='$(CFLAG) -c' \ + AR='$(AR)' NM='$(NM)' RANLIB='$(RANLIB)' \ ++ WINDRES='$(WINDRES)' \ + CROSS_COMPILE='$(CROSS_COMPILE)' \ + PERL='$(PERL)' ENGDIRS='$(ENGDIRS)' \ + SDIRS='$(SDIRS)' LIBRPATH='$(INSTALLTOP)/$(LIBDIR)' \ +Index: Makefile.shared +=================================================================== +RCS file: /usr/local/src/openssl/CVSROOT/openssl/Makefile.shared,v +retrieving revision 1.72.2.4 +diff -u -p -r1.72.2.4 Makefile.shared +--- Makefile.shared 21 Aug 2010 11:36:49 -0000 1.72.2.4 ++++ Makefile.shared 4 Jul 2011 23:13:52 -0000 +@@ -293,7 +293,7 @@ link_a.cygwin: + fi; \ + dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \ + $(PERL) util/mkrc.pl $$dll_name | \ +- $(CROSS_COMPILE)windres -o rc.o; \ ++ $(WINDRES) -o rc.o; \ + extras="$$extras rc.o"; \ + ALLSYMSFLAGS='-Wl,--whole-archive'; \ + NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \ diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-parallel-build.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-parallel-build.patch new file mode 100644 index 0000000000..e1a030f9eb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-parallel-build.patch @@ -0,0 +1,315 @@ +http://rt.openssl.org/Ticket/Display.html?id=2084 + +--- a/Makefile.org ++++ b/Makefile.org +@@ -247,17 +247,17 @@ + build_libs: build_crypto build_ssl build_engines + + build_crypto: +- @dir=crypto; target=all; $(BUILD_ONE_CMD) ++ +@dir=crypto; target=all; $(BUILD_ONE_CMD) +-build_ssl: ++build_ssl: build_crypto +- @dir=ssl; target=all; $(BUILD_ONE_CMD) ++ +@dir=ssl; target=all; $(BUILD_ONE_CMD) +-build_engines: ++build_engines: build_crypto +- @dir=engines; target=all; $(BUILD_ONE_CMD) ++ +@dir=engines; target=all; $(BUILD_ONE_CMD) +-build_apps: ++build_apps: build_libs +- @dir=apps; target=all; $(BUILD_ONE_CMD) ++ +@dir=apps; target=all; $(BUILD_ONE_CMD) +-build_tests: ++build_tests: build_libs +- @dir=test; target=all; $(BUILD_ONE_CMD) ++ +@dir=test; target=all; $(BUILD_ONE_CMD) +-build_tools: ++build_tools: build_libs +- @dir=tools; target=all; $(BUILD_ONE_CMD) ++ +@dir=tools; target=all; $(BUILD_ONE_CMD) + + all_testapps: build_libs build_testapps + build_testapps: +@@ -497,9 +497,9 @@ + dist_pem_h: + (cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean) + +-install: all install_docs install_sw ++install: install_docs install_sw + +-install_sw: ++install_dirs: + @$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \ + $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR) \ + $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines \ +@@ -508,6 +508,13 @@ + $(INSTALL_PREFIX)$(OPENSSLDIR)/misc \ + $(INSTALL_PREFIX)$(OPENSSLDIR)/certs \ + $(INSTALL_PREFIX)$(OPENSSLDIR)/private ++ @$(PERL) $(TOP)/util/mkdir-p.pl \ ++ $(INSTALL_PREFIX)$(MANDIR)/man1 \ ++ $(INSTALL_PREFIX)$(MANDIR)/man3 \ ++ $(INSTALL_PREFIX)$(MANDIR)/man5 \ ++ $(INSTALL_PREFIX)$(MANDIR)/man7 ++ ++install_sw: install_dirs + @set -e; headerlist="$(EXHEADER)"; for i in $$headerlist;\ + do \ + (cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \ +@@ -511,7 +511,7 @@ + (cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \ + chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \ + done; +- @set -e; target=install; $(RECURSIVE_BUILD_CMD) ++ +@set -e; target=install; $(RECURSIVE_BUILD_CMD) + @set -e; for i in $(LIBS) ;\ + do \ + if [ -f "$$i" ]; then \ +@@ -593,12 +600,7 @@ + done; \ + done + +-install_docs: +- @$(PERL) $(TOP)/util/mkdir-p.pl \ +- $(INSTALL_PREFIX)$(MANDIR)/man1 \ +- $(INSTALL_PREFIX)$(MANDIR)/man3 \ +- $(INSTALL_PREFIX)$(MANDIR)/man5 \ +- $(INSTALL_PREFIX)$(MANDIR)/man7 ++install_docs: install_dirs + @pod2man="`cd ./util; ./pod2mantest $(PERL)`"; \ + here="`pwd`"; \ + filecase=; \ +--- a/crypto/Makefile ++++ b/crypto/Makefile +@@ -85,11 +85,11 @@ + @if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi + + subdirs: +- @target=all; $(RECURSIVE_MAKE) ++ +@target=all; $(RECURSIVE_MAKE) + + files: + $(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO +- @target=files; $(RECURSIVE_MAKE) ++ +@target=files; $(RECURSIVE_MAKE) + + links: + @$(PERL) $(TOP)/util/mklink.pl ../include/openssl $(EXHEADER) +@@ -100,7 +100,7 @@ + # lib: $(LIB): are splitted to avoid end-less loop + lib: $(LIB) + @touch lib +-$(LIB): $(LIBOBJ) ++$(LIB): $(LIBOBJ) | subdirs + $(AR) $(LIB) $(LIBOBJ) + $(RANLIB) $(LIB) || echo Never mind. + +@@ -110,7 +110,7 @@ + fi + + libs: +- @target=lib; $(RECURSIVE_MAKE) ++ +@target=lib; $(RECURSIVE_MAKE) + + install: + @[ -n "$(INSTALLTOP)" ] # should be set by top Makefile... +@@ -119,7 +119,7 @@ + (cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \ + chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \ + done; +- @target=install; $(RECURSIVE_MAKE) ++ +@target=install; $(RECURSIVE_MAKE) + + lint: + @target=lint; $(RECURSIVE_MAKE) +--- a/engines/Makefile ++++ b/engines/Makefile +@@ -72,7 +72,7 @@ + + all: lib subdirs + +-lib: $(LIBOBJ) ++lib: $(LIBOBJ) | subdirs + @if [ -n "$(SHARED_LIBS)" ]; then \ + set -e; \ + for l in $(LIBNAMES); do \ +@@ -89,7 +89,7 @@ + + subdirs: + echo $(EDIRS) +- @target=all; $(RECURSIVE_MAKE) ++ +@target=all; $(RECURSIVE_MAKE) + + files: + $(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO +@@ -128,7 +128,7 @@ + mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx ); \ + done; \ + fi +- @target=install; $(RECURSIVE_MAKE) ++ +@target=install; $(RECURSIVE_MAKE) + + tags: + ctags $(SRC) +--- a/test/Makefile ++++ b/test/Makefile +@@ -123,7 +123,7 @@ + tags: + ctags $(SRC) + +-tests: exe apps $(TESTS) ++tests: exe $(TESTS) + + apps: + @(cd ..; $(MAKE) DIRS=apps all) +@@ -345,106 +345,106 @@ + link_app.$${shlib_target} + + $(RSATEST)$(EXE_EXT): $(RSATEST).o $(DLIBCRYPTO) +- @target=$(RSATEST); $(BUILD_CMD) ++ +@target=$(RSATEST); $(BUILD_CMD) + + $(BNTEST)$(EXE_EXT): $(BNTEST).o $(DLIBCRYPTO) +- @target=$(BNTEST); $(BUILD_CMD) ++ +@target=$(BNTEST); $(BUILD_CMD) + + $(ECTEST)$(EXE_EXT): $(ECTEST).o $(DLIBCRYPTO) +- @target=$(ECTEST); $(BUILD_CMD) ++ +@target=$(ECTEST); $(BUILD_CMD) + + $(EXPTEST)$(EXE_EXT): $(EXPTEST).o $(DLIBCRYPTO) +- @target=$(EXPTEST); $(BUILD_CMD) ++ +@target=$(EXPTEST); $(BUILD_CMD) + + $(IDEATEST)$(EXE_EXT): $(IDEATEST).o $(DLIBCRYPTO) +- @target=$(IDEATEST); $(BUILD_CMD) ++ +@target=$(IDEATEST); $(BUILD_CMD) + + $(MD2TEST)$(EXE_EXT): $(MD2TEST).o $(DLIBCRYPTO) +- @target=$(MD2TEST); $(BUILD_CMD) ++ +@target=$(MD2TEST); $(BUILD_CMD) + + $(SHATEST)$(EXE_EXT): $(SHATEST).o $(DLIBCRYPTO) +- @target=$(SHATEST); $(BUILD_CMD) ++ +@target=$(SHATEST); $(BUILD_CMD) + + $(SHA1TEST)$(EXE_EXT): $(SHA1TEST).o $(DLIBCRYPTO) +- @target=$(SHA1TEST); $(BUILD_CMD) ++ +@target=$(SHA1TEST); $(BUILD_CMD) + + $(SHA256TEST)$(EXE_EXT): $(SHA256TEST).o $(DLIBCRYPTO) +- @target=$(SHA256TEST); $(BUILD_CMD) ++ +@target=$(SHA256TEST); $(BUILD_CMD) + + $(SHA512TEST)$(EXE_EXT): $(SHA512TEST).o $(DLIBCRYPTO) +- @target=$(SHA512TEST); $(BUILD_CMD) ++ +@target=$(SHA512TEST); $(BUILD_CMD) + + $(RMDTEST)$(EXE_EXT): $(RMDTEST).o $(DLIBCRYPTO) +- @target=$(RMDTEST); $(BUILD_CMD) ++ +@target=$(RMDTEST); $(BUILD_CMD) + + $(MDC2TEST)$(EXE_EXT): $(MDC2TEST).o $(DLIBCRYPTO) +- @target=$(MDC2TEST); $(BUILD_CMD) ++ +@target=$(MDC2TEST); $(BUILD_CMD) + + $(MD4TEST)$(EXE_EXT): $(MD4TEST).o $(DLIBCRYPTO) +- @target=$(MD4TEST); $(BUILD_CMD) ++ +@target=$(MD4TEST); $(BUILD_CMD) + + $(MD5TEST)$(EXE_EXT): $(MD5TEST).o $(DLIBCRYPTO) +- @target=$(MD5TEST); $(BUILD_CMD) ++ +@target=$(MD5TEST); $(BUILD_CMD) + + $(HMACTEST)$(EXE_EXT): $(HMACTEST).o $(DLIBCRYPTO) +- @target=$(HMACTEST); $(BUILD_CMD) ++ +@target=$(HMACTEST); $(BUILD_CMD) + + $(WPTEST)$(EXE_EXT): $(WPTEST).o $(DLIBCRYPTO) +- @target=$(WPTEST); $(BUILD_CMD) ++ +@target=$(WPTEST); $(BUILD_CMD) + + $(RC2TEST)$(EXE_EXT): $(RC2TEST).o $(DLIBCRYPTO) +- @target=$(RC2TEST); $(BUILD_CMD) ++ +@target=$(RC2TEST); $(BUILD_CMD) + + $(BFTEST)$(EXE_EXT): $(BFTEST).o $(DLIBCRYPTO) +- @target=$(BFTEST); $(BUILD_CMD) ++ +@target=$(BFTEST); $(BUILD_CMD) + + $(CASTTEST)$(EXE_EXT): $(CASTTEST).o $(DLIBCRYPTO) +- @target=$(CASTTEST); $(BUILD_CMD) ++ +@target=$(CASTTEST); $(BUILD_CMD) + + $(RC4TEST)$(EXE_EXT): $(RC4TEST).o $(DLIBCRYPTO) +- @target=$(RC4TEST); $(BUILD_CMD) ++ +@target=$(RC4TEST); $(BUILD_CMD) + + $(RC5TEST)$(EXE_EXT): $(RC5TEST).o $(DLIBCRYPTO) +- @target=$(RC5TEST); $(BUILD_CMD) ++ +@target=$(RC5TEST); $(BUILD_CMD) + + $(DESTEST)$(EXE_EXT): $(DESTEST).o $(DLIBCRYPTO) +- @target=$(DESTEST); $(BUILD_CMD) ++ +@target=$(DESTEST); $(BUILD_CMD) + + $(RANDTEST)$(EXE_EXT): $(RANDTEST).o $(DLIBCRYPTO) +- @target=$(RANDTEST); $(BUILD_CMD) ++ +@target=$(RANDTEST); $(BUILD_CMD) + + $(DHTEST)$(EXE_EXT): $(DHTEST).o $(DLIBCRYPTO) +- @target=$(DHTEST); $(BUILD_CMD) ++ +@target=$(DHTEST); $(BUILD_CMD) + + $(DSATEST)$(EXE_EXT): $(DSATEST).o $(DLIBCRYPTO) +- @target=$(DSATEST); $(BUILD_CMD) ++ +@target=$(DSATEST); $(BUILD_CMD) + + $(METHTEST)$(EXE_EXT): $(METHTEST).o $(DLIBCRYPTO) +- @target=$(METHTEST); $(BUILD_CMD) ++ +@target=$(METHTEST); $(BUILD_CMD) + + $(SSLTEST)$(EXE_EXT): $(SSLTEST).o $(DLIBSSL) $(DLIBCRYPTO) +- @target=$(SSLTEST); $(BUILD_CMD) ++ +@target=$(SSLTEST); $(BUILD_CMD) + + $(ENGINETEST)$(EXE_EXT): $(ENGINETEST).o $(DLIBCRYPTO) +- @target=$(ENGINETEST); $(BUILD_CMD) ++ +@target=$(ENGINETEST); $(BUILD_CMD) + + $(EVPTEST)$(EXE_EXT): $(EVPTEST).o $(DLIBCRYPTO) +- @target=$(EVPTEST); $(BUILD_CMD) ++ +@target=$(EVPTEST); $(BUILD_CMD) + + $(ECDSATEST)$(EXE_EXT): $(ECDSATEST).o $(DLIBCRYPTO) +- @target=$(ECDSATEST); $(BUILD_CMD) ++ +@target=$(ECDSATEST); $(BUILD_CMD) + + $(ECDHTEST)$(EXE_EXT): $(ECDHTEST).o $(DLIBCRYPTO) +- @target=$(ECDHTEST); $(BUILD_CMD) ++ +@target=$(ECDHTEST); $(BUILD_CMD) + + $(IGETEST)$(EXE_EXT): $(IGETEST).o $(DLIBCRYPTO) +- @target=$(IGETEST); $(BUILD_CMD) ++ +@target=$(IGETEST); $(BUILD_CMD) + + $(JPAKETEST)$(EXE_EXT): $(JPAKETEST).o $(DLIBCRYPTO) +- @target=$(JPAKETEST); $(BUILD_CMD) ++ +@target=$(JPAKETEST); $(BUILD_CMD) + + $(ASN1TEST)$(EXE_EXT): $(ASN1TEST).o $(DLIBCRYPTO) +- @target=$(ASN1TEST); $(BUILD_CMD) ++ +@target=$(ASN1TEST); $(BUILD_CMD) + + #$(AESTEST).o: $(AESTEST).c + # $(CC) -c $(CFLAGS) -DINTERMEDIATE_VALUE_KAT -DTRACE_KAT_MCT $(AESTEST).c +@@ -457,7 +457,7 @@ + # fi + + dummytest$(EXE_EXT): dummytest.o $(DLIBCRYPTO) +- @target=dummytest; $(BUILD_CMD) ++ +@target=dummytest; $(BUILD_CMD) + + # DO NOT DELETE THIS LINE -- make depend depends on it. + diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-pkg-config.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-pkg-config.patch new file mode 100644 index 0000000000..fcf286c2ec --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-pkg-config.patch @@ -0,0 +1,42 @@ +move internal libraries to ".private" fields so that the default +--libs output matches only what we need + +--- a/Makefile.org ++++ b/Makefile.org +@@ -325,7 +325,8 @@ libcrypto.pc: Makefile + echo 'Description: OpenSSL cryptography library'; \ + echo 'Version: '$(VERSION); \ + echo 'Requires: '; \ +- echo 'Libs: -L$${libdir} -lcrypto $(EX_LIBS)'; \ ++ echo 'Libs: -L$${libdir} -lcrypto'; \ ++ echo 'Libs.private: $(EX_LIBS)'; \ + echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libcrypto.pc + + libssl.pc: Makefile +@@ -334,11 +335,12 @@ libssl.pc: Makefile + echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \ + echo 'includedir=$${prefix}/include'; \ + echo ''; \ +- echo 'Name: OpenSSL'; \ ++ echo 'Name: OpenSSL-libssl'; \ + echo 'Description: Secure Sockets Layer and cryptography libraries'; \ + echo 'Version: '$(VERSION); \ +- echo 'Requires: '; \ +- echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \ ++ echo 'Requires.private: libcrypto'; \ ++ echo 'Libs: -L$${libdir} -lssl'; \ ++ echo 'Libs.private: $(EX_LIBS)'; \ + echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libssl.pc + + openssl.pc: Makefile +@@ -350,9 +352,7 @@ openssl.pc: Makefile + echo 'Name: OpenSSL'; \ + echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \ + echo 'Version: '$(VERSION); \ +- echo 'Requires: '; \ +- echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \ +- echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > openssl.pc ++ echo 'Requires: libssl libcrypto' ) > openssl.pc + + Makefile: Makefile.org Configure config + @echo "Makefile is older than Makefile.org, Configure or config." diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-x32.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-x32.patch new file mode 100644 index 0000000000..d73a050ec9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0e-x32.patch @@ -0,0 +1,92 @@ +http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=51bfed2e26fc13a66e8b5710aa2ce1d7a04af721 + +UpstreamStatus: Pending + +Received from H J Liu @ Intel +Make the assembly syntax compatible with x32 gcc. Othewise x32 gcc throws errors. +Signed-Off-By: Nitin A Kamble 2011/07/13 + +ported the patch to the 1.0.0e version +Signed-Off-By: Nitin A Kamble 2011/12/01 +Index: openssl-1.0.0e/Configure +=================================================================== +--- openssl-1.0.0e.orig/Configure ++++ openssl-1.0.0e/Configure +@@ -393,6 +393,7 @@ my %table=( + "linux-ia64-ecc","ecc:-DL_ENDIAN -DTERMIO -O2 -Wall -no_cpprt::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", + "linux-ia64-icc","icc:-DL_ENDIAN -DTERMIO -O2 -Wall -no_cpprt::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_RISC1 DES_INT:${ia64_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", + "linux-x86_64", "gcc:-m64 -DL_ENDIAN -DTERMIO -O3 -Wall -DMD32_REG_T=int::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64", ++"linux-x32", "gcc:-DL_ENDIAN -DTERMIO -O2 -pipe -g -feliminate-unused-debug-types -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-mx32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", + "linux-s390x", "gcc:-m64 -DB_ENDIAN -DTERMIO -O3 -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL:${s390x_asm}:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64", + #### SPARC Linux setups + # Ray Miller has patiently +Index: openssl-1.0.0e/crypto/bn/asm/x86_64-gcc.c +=================================================================== +--- openssl-1.0.0e.orig/crypto/bn/asm/x86_64-gcc.c ++++ openssl-1.0.0e/crypto/bn/asm/x86_64-gcc.c +@@ -55,7 +55,7 @@ + * machine. + */ + +-#ifdef _WIN64 ++#if defined _WIN64 || !defined __LP64__ + #define BN_ULONG unsigned long long + #else + #define BN_ULONG unsigned long +@@ -192,9 +192,9 @@ BN_ULONG bn_add_words (BN_ULONG *rp, con + asm ( + " subq %2,%2 \n" + ".p2align 4 \n" +- "1: movq (%4,%2,8),%0 \n" +- " adcq (%5,%2,8),%0 \n" +- " movq %0,(%3,%2,8) \n" ++ "1: movq (%q4,%2,8),%0 \n" ++ " adcq (%q5,%2,8),%0 \n" ++ " movq %0,(%q3,%2,8) \n" + " leaq 1(%2),%2 \n" + " loop 1b \n" + " sbbq %0,%0 \n" +@@ -215,9 +215,9 @@ BN_ULONG bn_sub_words (BN_ULONG *rp, con + asm ( + " subq %2,%2 \n" + ".p2align 4 \n" +- "1: movq (%4,%2,8),%0 \n" +- " sbbq (%5,%2,8),%0 \n" +- " movq %0,(%3,%2,8) \n" ++ "1: movq (%q4,%2,8),%0 \n" ++ " sbbq (%q5,%2,8),%0 \n" ++ " movq %0,(%q3,%2,8) \n" + " leaq 1(%2),%2 \n" + " loop 1b \n" + " sbbq %0,%0 \n" +Index: openssl-1.0.0e/crypto/bn/bn.h +=================================================================== +--- openssl-1.0.0e.orig/crypto/bn/bn.h ++++ openssl-1.0.0e/crypto/bn/bn.h +@@ -172,6 +172,13 @@ extern "C" { + # endif + #endif + ++/* Address type. */ ++#ifdef _WIN64 ++#define BN_ADDR unsigned long long ++#else ++#define BN_ADDR unsigned long ++#endif ++ + /* assuming long is 64bit - this is the DEC Alpha + * unsigned long long is only 64 bits :-(, don't define + * BN_LLONG for the DEC Alpha */ +Index: openssl-1.0.0e/crypto/bn/bn_exp.c +=================================================================== +--- openssl-1.0.0e.orig/crypto/bn/bn_exp.c ++++ openssl-1.0.0e/crypto/bn/bn_exp.c +@@ -561,7 +561,7 @@ static int MOD_EXP_CTIME_COPY_FROM_PREBU + + /* Given a pointer value, compute the next address that is a cache line multiple. */ + #define MOD_EXP_CTIME_ALIGN(x_) \ +- ((unsigned char*)(x_) + (MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH - (((BN_ULONG)(x_)) & (MOD_EXP_CTIME_MIN_CACHE_LINE_MASK)))) ++ ((unsigned char*)(x_) + (MOD_EXP_CTIME_MIN_CACHE_LINE_WIDTH - (((BN_ADDR)(x_)) & (MOD_EXP_CTIME_MIN_CACHE_LINE_MASK)))) + + /* This variant of BN_mod_exp_mont() uses fixed windows and the special + * precomputation memory layout to limit data-dependency to a minimum diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0h-pkg-config.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0h-pkg-config.patch new file mode 100644 index 0000000000..6c0218256d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.0h-pkg-config.patch @@ -0,0 +1,32 @@ +depend on other pc files rather than encoding library info directly in +every pkg-config file + +--- a/Makefile.org ++++ b/Makefile.org +@@ -335,11 +335,11 @@ libssl.pc: Makefile + echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \ + echo 'includedir=$${prefix}/include'; \ + echo ''; \ +- echo 'Name: OpenSSL'; \ ++ echo 'Name: OpenSSL-libssl'; \ + echo 'Description: Secure Sockets Layer and cryptography libraries'; \ + echo 'Version: '$(VERSION); \ +- echo 'Requires: '; \ +- echo 'Libs: -L$${libdir} -lssl -lcrypto'; \ ++ echo 'Requires.private: libcrypto'; \ ++ echo 'Libs: -L$${libdir} -lssl'; \ + echo 'Libs.private: $(EX_LIBS)'; \ + echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libssl.pc + +@@ -352,10 +353,7 @@ openssl.pc: Makefile + echo 'Name: OpenSSL'; \ + echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \ + echo 'Version: '$(VERSION); \ +- echo 'Requires: '; \ +- echo 'Libs: -L$${libdir} -lssl -lcrypto'; \ +- echo 'Libs.private: $(EX_LIBS)'; \ +- echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > openssl.pc ++ echo 'Requires: libssl libcrypto' ) > openssl.pc + + Makefile: Makefile.org Configure config + @echo "Makefile is older than Makefile.org, Configure or config." diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-ipv6.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-ipv6.patch new file mode 100644 index 0000000000..4955c65d31 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-ipv6.patch @@ -0,0 +1,678 @@ +http://rt.openssl.org/Ticket/Display.html?id=2051 +user/pass: guest/guest + +Index: apps/s_apps.h +=================================================================== +RCS file: /v/openssl/cvs/openssl/apps/s_apps.h,v +retrieving revision 1.21.2.1 +diff -u -r1.21.2.1 s_apps.h +--- apps/s_apps.h 4 Sep 2009 17:42:04 -0000 1.21.2.1 ++++ apps/s_apps.h 28 Dec 2011 00:28:14 -0000 +@@ -148,7 +148,7 @@ + #define PORT_STR "4433" + #define PROTOCOL "tcp" + +-int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, unsigned char *context), unsigned char *context); ++int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, unsigned char *context), unsigned char *context, int use_ipv4, int use_ipv6); + #ifdef HEADER_X509_H + int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx); + #endif +@@ -156,7 +156,7 @@ + int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file); + int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key); + #endif +-int init_client(int *sock, char *server, int port, int type); ++int init_client(int *sock, char *server, int port, int type, int use_ipv4, int use_ipv6); + int should_retry(int i); + int extract_port(char *str, short *port_ptr); + int extract_host_port(char *str,char **host_ptr,unsigned char *ip,short *p); +Index: apps/s_cb.c +=================================================================== +RCS file: /v/openssl/cvs/openssl/apps/s_cb.c,v +retrieving revision 1.27.2.8.2.2 +diff -u -r1.27.2.8.2.2 s_cb.c +--- apps/s_cb.c 13 Nov 2011 13:13:13 -0000 1.27.2.8.2.2 ++++ apps/s_cb.c 28 Dec 2011 00:28:14 -0000 +Index: apps/s_client.c +=================================================================== +RCS file: /v/openssl/cvs/openssl/apps/s_client.c,v +retrieving revision 1.123.2.6.2.10 +diff -u -r1.123.2.6.2.10 s_client.c +--- apps/s_client.c 14 Dec 2011 22:18:02 -0000 1.123.2.6.2.10 ++++ apps/s_client.c 28 Dec 2011 00:28:14 -0000 +@@ -285,6 +285,9 @@ + { + BIO_printf(bio_err,"usage: s_client args\n"); + BIO_printf(bio_err,"\n"); ++#if OPENSSL_USE_IPV6 ++ BIO_printf(bio_err," -6 - use IPv6\n"); ++#endif + BIO_printf(bio_err," -host host - use -connect instead\n"); + BIO_printf(bio_err," -port port - use -connect instead\n"); + BIO_printf(bio_err," -connect host:port - who to connect to (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR); +@@ -564,6 +567,7 @@ + int sbuf_len,sbuf_off; + fd_set readfds,writefds; + short port=PORT; ++ int use_ipv4, use_ipv6; + int full_log=1; + char *host=SSL_HOST_NAME; + char *cert_file=NULL,*key_file=NULL; +@@ -609,7 +613,11 @@ + #endif + char *sess_in = NULL; + char *sess_out = NULL; +- struct sockaddr peer; ++#if OPENSSL_USE_IPV6 ++ struct sockaddr_storage peer; ++#else ++ struct sockaddr_in peer; ++#endif + int peerlen = sizeof(peer); + int enable_timeouts = 0 ; + long socket_mtu = 0; +@@ -630,6 +638,8 @@ + meth=SSLv2_client_method(); + #endif + ++ use_ipv4 = 1; ++ use_ipv6 = 0; + apps_startup(); + c_Pause=0; + c_quiet=0; +@@ -951,6 +961,13 @@ + jpake_secret = *++argv; + } + #endif ++#if OPENSSL_USE_IPV6 ++ else if (strcmp(*argv,"-6") == 0) ++ { ++ use_ipv4 = 0; ++ use_ipv6 = 1; ++ } ++#endif + else if (strcmp(*argv,"-use_srtp") == 0) + { + if (--argc < 1) goto bad; +@@ -967,7 +984,7 @@ + keymatexportlen=atoi(*(++argv)); + if (keymatexportlen == 0) goto bad; + } +- else ++ else + { + BIO_printf(bio_err,"unknown option %s\n",*argv); + badop=1; +@@ -1259,7 +1276,7 @@ + + re_start: + +- if (init_client(&s,host,port,socket_type) == 0) ++ if (init_client(&s,host,port,socket_type,use_ipv4,use_ipv6) == 0) + { + BIO_printf(bio_err,"connect:errno=%d\n",get_last_socket_error()); + SHUTDOWN(s); +@@ -1285,7 +1302,7 @@ + { + + sbio=BIO_new_dgram(s,BIO_NOCLOSE); +- if (getsockname(s, &peer, (void *)&peerlen) < 0) ++ if (getsockname(s, (struct sockaddr *)&peer, (void *)&peerlen) < 0) + { + BIO_printf(bio_err, "getsockname:errno=%d\n", + get_last_socket_error()); +@@ -2036,7 +2061,7 @@ + BIO_printf(bio,"Expansion: %s\n", + expansion ? SSL_COMP_get_name(expansion) : "NONE"); + #endif +- ++ + #ifdef SSL_DEBUG + { + /* Print out local port of connection: useful for debugging */ +=================================================================== +RCS file: /v/openssl/cvs/openssl/apps/s_server.c,v +retrieving revision 1.136.2.15.2.13 +diff -u -r1.136.2.15.2.13 s_server.c +--- apps/s_server.c 27 Dec 2011 14:23:22 -0000 1.136.2.15.2.13 ++++ apps/s_server.c 28 Dec 2011 00:28:14 -0000 +@@ -558,6 +558,10 @@ + # endif + BIO_printf(bio_err," -use_srtp profiles - Offer SRTP key management with a colon-separated profile list"); + #endif ++ BIO_printf(bio_err," -4 - use IPv4 only\n"); ++#if OPENSSL_USE_IPV6 ++ BIO_printf(bio_err," -6 - use IPv6 only\n"); ++#endif + BIO_printf(bio_err," -keymatexport label - Export keying material using label\n"); + BIO_printf(bio_err," -keymatexportlen len - Export len bytes of keying material (default 20)\n"); + } +@@ -943,6 +947,7 @@ + int state=0; + const SSL_METHOD *meth=NULL; + int socket_type=SOCK_STREAM; ++ int use_ipv4, use_ipv6; + ENGINE *e=NULL; + char *inrand=NULL; + int s_cert_format = FORMAT_PEM, s_key_format = FORMAT_PEM; +@@ -981,6 +986,12 @@ + /* #error no SSL version enabled */ + #endif + ++ use_ipv4 = 1; ++#if OPENSSL_USE_IPV6 ++ use_ipv6 = 1; ++#else ++ use_ipv6 = 0; ++#endif + local_argc=argc; + local_argv=argv; + +@@ -1329,6 +1340,18 @@ + jpake_secret = *(++argv); + } + #endif ++ else if (strcmp(*argv,"-4") == 0) ++ { ++ use_ipv4 = 1; ++ use_ipv6 = 0; ++ } ++#if OPENSSL_USE_IPV6 ++ else if (strcmp(*argv,"-6") == 0) ++ { ++ use_ipv4 = 0; ++ use_ipv6 = 1; ++ } ++#endif + else if (strcmp(*argv,"-use_srtp") == 0) + { + if (--argc < 1) goto bad; +@@ -1884,9 +1907,9 @@ + BIO_printf(bio_s_out,"ACCEPT\n"); + (void)BIO_flush(bio_s_out); + if (www) +- do_server(port,socket_type,&accept_socket,www_body, context); ++ do_server(port,socket_type,&accept_socket,www_body, context, use_ipv4, use_ipv6); + else +- do_server(port,socket_type,&accept_socket,sv_body, context); ++ do_server(port,socket_type,&accept_socket,sv_body, context, use_ipv4, use_ipv6); + print_stats(bio_s_out,ctx); + ret=0; + end: +Index: apps/s_socket.c +=================================================================== +RCS file: /v/openssl/cvs/openssl/apps/s_socket.c,v +retrieving revision 1.43.2.3.2.2 +diff -u -r1.43.2.3.2.2 s_socket.c +--- apps/s_socket.c 2 Dec 2011 14:39:40 -0000 1.43.2.3.2.2 ++++ apps/s_socket.c 28 Dec 2011 00:28:14 -0000 +@@ -97,16 +97,16 @@ + #include "netdb.h" + #endif + +-static struct hostent *GetHostByName(char *name); ++static struct hostent *GetHostByName(char *name, int domain); + #if defined(OPENSSL_SYS_WINDOWS) || (defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)) + static void ssl_sock_cleanup(void); + #endif + static int ssl_sock_init(void); +-static int init_client_ip(int *sock,unsigned char ip[4], int port, int type); +-static int init_server(int *sock, int port, int type); +-static int init_server_long(int *sock, int port,char *ip, int type); ++static int init_client_ip(int *sock,unsigned char *ip, int port, int type, int domain); ++static int init_server(int *sock, int port, int type, int use_ipv4, int use_ipv6); ++static int init_server_long(int *sock, int port,char *ip, int type, int use_ipv4, int use_ipv6); + static int do_accept(int acc_sock, int *sock, char **host); +-static int host_ip(char *str, unsigned char ip[4]); ++static int host_ip(char *str, unsigned char *ip, int domain); + + #ifdef OPENSSL_SYS_WIN16 + #define SOCKET_PROTOCOL 0 /* more microsoft stupidity */ +@@ -234,38 +234,76 @@ + return(1); + } + +-int init_client(int *sock, char *host, int port, int type) ++int init_client(int *sock, char *host, int port, int type, int use_ipv4, int use_ipv6) + { ++#if OPENSSL_USE_IPV6 ++ unsigned char ip[16]; ++#else + unsigned char ip[4]; ++#endif + +- memset(ip, '\0', sizeof ip); +- if (!host_ip(host,&(ip[0]))) ++ if (!use_ipv4 && !use_ipv6) + return 0; +- return init_client_ip(sock,ip,port,type); +- } +- +-static int init_client_ip(int *sock, unsigned char ip[4], int port, int type) +- { +- unsigned long addr; ++#if OPENSSL_USE_IPV6 ++ /* we are fine here */ ++#else ++ if (use_ipv6) ++ return 0; ++#endif ++ if (use_ipv4) ++ if (host_ip(host,ip,AF_INET)) ++ return(init_client_ip(sock,ip,port,type,AF_INET)); ++#if OPENSSL_USE_IPV6 ++ if (use_ipv6) ++ if (host_ip(host,ip,AF_INET6)) ++ return(init_client_ip(sock,ip,port,type,AF_INET6)); ++#endif ++ return 0; ++ } ++ ++static int init_client_ip(int *sock, unsigned char ip[4], int port, int type, int domain) ++ { ++#if OPENSSL_USE_IPV6 ++ struct sockaddr_storage them; ++ struct sockaddr_in *them_in = (struct sockaddr_in *)&them; ++ struct sockaddr_in6 *them_in6 = (struct sockaddr_in6 *)&them; ++#else + struct sockaddr_in them; ++ struct sockaddr_in *them_in = &them; ++#endif ++ socklen_t addr_len; + int s,i; + + if (!ssl_sock_init()) return(0); + + memset((char *)&them,0,sizeof(them)); +- them.sin_family=AF_INET; +- them.sin_port=htons((unsigned short)port); +- addr=(unsigned long) +- ((unsigned long)ip[0]<<24L)| +- ((unsigned long)ip[1]<<16L)| +- ((unsigned long)ip[2]<< 8L)| +- ((unsigned long)ip[3]); +- them.sin_addr.s_addr=htonl(addr); ++ if (domain == AF_INET) ++ { ++ addr_len = (socklen_t)sizeof(struct sockaddr_in); ++ them_in->sin_family=AF_INET; ++ them_in->sin_port=htons((unsigned short)port); ++#ifndef BIT_FIELD_LIMITS ++ memcpy(&them_in->sin_addr.s_addr, ip, 4); ++#else ++ memcpy(&them_in->sin_addr, ip, 4); ++#endif ++ } ++ else ++#if OPENSSL_USE_IPV6 ++ { ++ addr_len = (socklen_t)sizeof(struct sockaddr_in6); ++ them_in6->sin6_family=AF_INET6; ++ them_in6->sin6_port=htons((unsigned short)port); ++ memcpy(&(them_in6->sin6_addr), ip, sizeof(struct in6_addr)); ++ } ++#else ++ return(0); ++#endif + + if (type == SOCK_STREAM) +- s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL); ++ s=socket(domain,SOCK_STREAM,SOCKET_PROTOCOL); + else /* ( type == SOCK_DGRAM) */ +- s=socket(AF_INET,SOCK_DGRAM,IPPROTO_UDP); ++ s=socket(domain,SOCK_DGRAM,IPPROTO_UDP); + + if (s == INVALID_SOCKET) { perror("socket"); return(0); } + +@@ -277,29 +315,27 @@ + if (i < 0) { perror("keepalive"); return(0); } + } + #endif +- +- if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1) ++ if (connect(s,(struct sockaddr *)&them,addr_len) == -1) + { closesocket(s); perror("connect"); return(0); } + *sock=s; + return(1); + } + +-int do_server(int port, int type, int *ret, int (*cb)(char *hostname, int s, unsigned char *context), unsigned char *context) ++int do_server(int port, int type, int *ret, int (*cb)(char *hostname, int s, unsigned char *context), unsigned char *context, int use_ipv4, int use_ipv6) + { + int sock; + char *name = NULL; + int accept_socket = 0; + int i; + +- if (!init_server(&accept_socket,port,type)) return(0); +- ++ if (!init_server(&accept_socket,port,type, use_ipv4, use_ipv6)) return(0); + if (ret != NULL) + { + *ret=accept_socket; + /* return(1);*/ + } +- for (;;) +- { ++ for (;;) ++ { + if (type==SOCK_STREAM) + { + if (do_accept(accept_socket,&sock,&name) == 0) +@@ -322,41 +358,88 @@ + } + } + +-static int init_server_long(int *sock, int port, char *ip, int type) ++static int init_server_long(int *sock, int port, char *ip, int type, int use_ipv4, int use_ipv6) + { + int ret=0; ++ int domain; ++#if OPENSSL_USE_IPV6 ++ struct sockaddr_storage server; ++ struct sockaddr_in *server_in = (struct sockaddr_in *)&server; ++ struct sockaddr_in6 *server_in6 = (struct sockaddr_in6 *)&server; ++#else + struct sockaddr_in server; ++ struct sockaddr_in *server_in = &server; ++#endif ++ socklen_t addr_len; + int s= -1; + ++ if (!use_ipv4 && !use_ipv6) ++ goto err; ++#if OPENSSL_USE_IPV6 ++ /* we are fine here */ ++#else ++ if (use_ipv6) ++ goto err; ++#endif + if (!ssl_sock_init()) return(0); + +- memset((char *)&server,0,sizeof(server)); +- server.sin_family=AF_INET; +- server.sin_port=htons((unsigned short)port); +- if (ip == NULL) +- server.sin_addr.s_addr=INADDR_ANY; +- else +-/* Added for T3E, address-of fails on bit field (beckman@acl.lanl.gov) */ +-#ifndef BIT_FIELD_LIMITS +- memcpy(&server.sin_addr.s_addr,ip,4); ++#if OPENSSL_USE_IPV6 ++ domain = use_ipv6 ? AF_INET6 : AF_INET; + #else +- memcpy(&server.sin_addr,ip,4); ++ domain = AF_INET; + #endif +- +- if (type == SOCK_STREAM) +- s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL); +- else /* type == SOCK_DGRAM */ +- s=socket(AF_INET, SOCK_DGRAM,IPPROTO_UDP); ++ if (type == SOCK_STREAM) ++ s=socket(domain,SOCK_STREAM,SOCKET_PROTOCOL); ++ else /* type == SOCK_DGRAM */ ++ s=socket(domain, SOCK_DGRAM,IPPROTO_UDP); + + if (s == INVALID_SOCKET) goto err; + #if defined SOL_SOCKET && defined SO_REUSEADDR ++ { ++ int j = 1; ++ setsockopt(s, SOL_SOCKET, SO_REUSEADDR, ++ (void *) &j, sizeof j); ++ } ++#endif ++#if OPENSSL_USE_IPV6 ++ if ((use_ipv4 == 0) && (use_ipv6 == 1)) + { +- int j = 1; +- setsockopt(s, SOL_SOCKET, SO_REUSEADDR, +- (void *) &j, sizeof j); ++ const int on = 1; ++ ++ setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, ++ (const void *) &on, sizeof(int)); + } + #endif +- if (bind(s,(struct sockaddr *)&server,sizeof(server)) == -1) ++ if (domain == AF_INET) ++ { ++ addr_len = (socklen_t)sizeof(struct sockaddr_in); ++ memset(server_in, 0, sizeof(struct sockaddr_in)); ++ server_in->sin_family=AF_INET; ++ server_in->sin_port = htons((unsigned short)port); ++ if (ip == NULL) ++ server_in->sin_addr.s_addr = htonl(INADDR_ANY); ++ else ++/* Added for T3E, address-of fails on bit field (beckman@acl.lanl.gov) */ ++#ifndef BIT_FIELD_LIMITS ++ memcpy(&server_in->sin_addr.s_addr, ip, 4); ++#else ++ memcpy(&server_in->sin_addr, ip, 4); ++#endif ++ } ++#if OPENSSL_USE_IPV6 ++ else ++ { ++ addr_len = (socklen_t)sizeof(struct sockaddr_in6); ++ memset(server_in6, 0, sizeof(struct sockaddr_in6)); ++ server_in6->sin6_family = AF_INET6; ++ server_in6->sin6_port = htons((unsigned short)port); ++ if (ip == NULL) ++ server_in6->sin6_addr = in6addr_any; ++ else ++ memcpy(&server_in6->sin6_addr, ip, sizeof(struct in6_addr)); ++ } ++#endif ++ if (bind(s, (struct sockaddr *)&server, addr_len) == -1) + { + #ifndef OPENSSL_SYS_WINDOWS + perror("bind"); +@@ -375,16 +458,23 @@ + return(ret); + } + +-static int init_server(int *sock, int port, int type) ++static int init_server(int *sock, int port, int type, int use_ipv4, int use_ipv6) + { +- return(init_server_long(sock, port, NULL, type)); ++ return(init_server_long(sock, port, NULL, type, use_ipv4, use_ipv6)); + } + + static int do_accept(int acc_sock, int *sock, char **host) + { + int ret; + struct hostent *h1,*h2; +- static struct sockaddr_in from; ++#if OPENSSL_USE_IPV6 ++ struct sockaddr_storage from; ++ struct sockaddr_in *from_in = (struct sockaddr_in *)&from; ++ struct sockaddr_in6 *from_in6 = (struct sockaddr_in6 *)&from; ++#else ++ struct sockaddr_in from; ++ struct sockaddr_in *from_in = &from; ++#endif + int len; + /* struct linger ling; */ + +@@ -431,13 +521,23 @@ + */ + + if (host == NULL) goto end; ++#if OPENSSL_USE_IPV6 ++ if (from.ss_family == AF_INET) ++#else ++ if (from.sin_family == AF_INET) ++#endif + #ifndef BIT_FIELD_LIMITS +- /* I should use WSAAsyncGetHostByName() under windows */ +- h1=gethostbyaddr((char *)&from.sin_addr.s_addr, +- sizeof(from.sin_addr.s_addr),AF_INET); ++ /* I should use WSAAsyncGetHostByName() under windows */ ++ h1=gethostbyaddr((char *)&from_in->sin_addr.s_addr, ++ sizeof(from_in->sin_addr.s_addr), AF_INET); + #else +- h1=gethostbyaddr((char *)&from.sin_addr, +- sizeof(struct in_addr),AF_INET); ++ h1=gethostbyaddr((char *)&from_in->sin_addr, ++ sizeof(struct in_addr), AF_INET); ++#endif ++#if OPENSSL_USE_IPV6 ++ else ++ h1=gethostbyaddr((char *)&from_in6->sin6_addr, ++ sizeof(struct in6_addr), AF_INET6); + #endif + if (h1 == NULL) + { +@@ -454,15 +554,23 @@ + } + BUF_strlcpy(*host,h1->h_name,strlen(h1->h_name)+1); + +- h2=GetHostByName(*host); ++#if OPENSSL_USE_IPV6 ++ h2=GetHostByName(*host, from.ss_family); ++#else ++ h2=GetHostByName(*host, from.sin_family); ++#endif + if (h2 == NULL) + { + BIO_printf(bio_err,"gethostbyname failure\n"); + return(0); + } +- if (h2->h_addrtype != AF_INET) ++#if OPENSSL_USE_IPV6 ++ if (h2->h_addrtype != from.ss_family) ++#else ++ if (h2->h_addrtype != from.sin_family) ++#endif + { +- BIO_printf(bio_err,"gethostbyname addr is not AF_INET\n"); ++ BIO_printf(bio_err,"gethostbyname addr address is not correct\n"); + return(0); + } + } +@@ -477,7 +585,7 @@ + char *h,*p; + + h=str; +- p=strchr(str,':'); ++ p=strrchr(str,':'); + if (p == NULL) + { + BIO_printf(bio_err,"no port defined\n"); +@@ -485,7 +593,7 @@ + } + *(p++)='\0'; + +- if ((ip != NULL) && !host_ip(str,ip)) ++ if ((ip != NULL) && !host_ip(str,ip,AF_INET)) + goto err; + if (host_ptr != NULL) *host_ptr=h; + +@@ -496,48 +604,58 @@ + return(0); + } + +-static int host_ip(char *str, unsigned char ip[4]) ++static int host_ip(char *str, unsigned char *ip, int domain) + { +- unsigned int in[4]; ++ unsigned int in[4]; ++ unsigned long l; + int i; + +- if (sscanf(str,"%u.%u.%u.%u",&(in[0]),&(in[1]),&(in[2]),&(in[3])) == 4) ++ if ((domain == AF_INET) && ++ (sscanf(str,"%u.%u.%u.%u",&(in[0]),&(in[1]),&(in[2]),&(in[3])) == 4)) + { ++ + for (i=0; i<4; i++) + if (in[i] > 255) + { + BIO_printf(bio_err,"invalid IP address\n"); + goto err; + } +- ip[0]=in[0]; +- ip[1]=in[1]; +- ip[2]=in[2]; +- ip[3]=in[3]; +- } ++ l=htonl((in[0]<<24L)|(in[1]<<16L)|(in[2]<<8L)|in[3]); ++ memcpy(ip, &l, 4); ++ return 1; ++ } ++#if OPENSSL_USE_IPV6 ++ else if ((domain == AF_INET6) && ++ (inet_pton(AF_INET6, str, ip) == 1)) ++ return 1; ++#endif + else + { /* do a gethostbyname */ + struct hostent *he; + + if (!ssl_sock_init()) return(0); + +- he=GetHostByName(str); ++ he=GetHostByName(str,domain); + if (he == NULL) + { + BIO_printf(bio_err,"gethostbyname failure\n"); + goto err; + } + /* cast to short because of win16 winsock definition */ +- if ((short)he->h_addrtype != AF_INET) ++ if ((short)he->h_addrtype != domain) + { +- BIO_printf(bio_err,"gethostbyname addr is not AF_INET\n"); ++ BIO_printf(bio_err,"gethostbyname addr family is not correct\n"); + return(0); + } +- ip[0]=he->h_addr_list[0][0]; +- ip[1]=he->h_addr_list[0][1]; +- ip[2]=he->h_addr_list[0][2]; +- ip[3]=he->h_addr_list[0][3]; ++ if (domain == AF_INET) ++ memset(ip, 0, 4); ++#if OPENSSL_USE_IPV6 ++ else ++ memset(ip, 0, 16); ++#endif ++ memcpy(ip, he->h_addr_list[0], he->h_length); ++ return 1; + } +- return(1); + err: + return(0); + } +@@ -574,7 +692,7 @@ + static unsigned long ghbn_hits=0L; + static unsigned long ghbn_miss=0L; + +-static struct hostent *GetHostByName(char *name) ++static struct hostent *GetHostByName(char *name, int domain) + { + struct hostent *ret; + int i,lowi=0; +@@ -589,14 +707,20 @@ + } + if (ghbn_cache[i].order > 0) + { +- if (strncmp(name,ghbn_cache[i].name,128) == 0) ++ if ((strncmp(name,ghbn_cache[i].name,128) == 0) && ++ (ghbn_cache[i].ent.h_addrtype == domain)) + break; + } + } + if (i == GHBN_NUM) /* no hit*/ + { + ghbn_miss++; +- ret=gethostbyname(name); ++ if (domain == AF_INET) ++ ret=gethostbyname(name); ++#if OPENSSL_USE_IPV6 ++ else ++ ret=gethostbyname2(name, AF_INET6); ++#endif + if (ret == NULL) return(NULL); + /* else add to cache */ + if(strlen(name) < sizeof ghbn_cache[0].name) diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-parallel-build.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-parallel-build.patch new file mode 100644 index 0000000000..7c804b5432 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-parallel-build.patch @@ -0,0 +1,337 @@ +http://rt.openssl.org/Ticket/Display.html?id=2084 + +--- a/Makefile.org ++++ b/Makefile.org +@@ -247,17 +247,17 @@ + build_libs: build_crypto build_ssl build_engines + + build_crypto: +- @dir=crypto; target=all; $(BUILD_ONE_CMD) ++ +@dir=crypto; target=all; $(BUILD_ONE_CMD) +-build_ssl: ++build_ssl: build_crypto +- @dir=ssl; target=all; $(BUILD_ONE_CMD) ++ +@dir=ssl; target=all; $(BUILD_ONE_CMD) +-build_engines: ++build_engines: build_crypto +- @dir=engines; target=all; $(BUILD_ONE_CMD) ++ +@dir=engines; target=all; $(BUILD_ONE_CMD) +-build_apps: ++build_apps: build_libs +- @dir=apps; target=all; $(BUILD_ONE_CMD) ++ +@dir=apps; target=all; $(BUILD_ONE_CMD) +-build_tests: ++build_tests: build_libs +- @dir=test; target=all; $(BUILD_ONE_CMD) ++ +@dir=test; target=all; $(BUILD_ONE_CMD) +-build_tools: ++build_tools: build_libs +- @dir=tools; target=all; $(BUILD_ONE_CMD) ++ +@dir=tools; target=all; $(BUILD_ONE_CMD) + + all_testapps: build_libs build_testapps + build_testapps: +@@ -497,9 +497,9 @@ + dist_pem_h: + (cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean) + +-install: all install_docs install_sw ++install: install_docs install_sw + +-install_sw: ++install_dirs: + @$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \ + $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR) \ + $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines \ +@@ -508,6 +508,13 @@ + $(INSTALL_PREFIX)$(OPENSSLDIR)/misc \ + $(INSTALL_PREFIX)$(OPENSSLDIR)/certs \ + $(INSTALL_PREFIX)$(OPENSSLDIR)/private ++ @$(PERL) $(TOP)/util/mkdir-p.pl \ ++ $(INSTALL_PREFIX)$(MANDIR)/man1 \ ++ $(INSTALL_PREFIX)$(MANDIR)/man3 \ ++ $(INSTALL_PREFIX)$(MANDIR)/man5 \ ++ $(INSTALL_PREFIX)$(MANDIR)/man7 ++ ++install_sw: install_dirs + @set -e; headerlist="$(EXHEADER)"; for i in $$headerlist;\ + do \ + (cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \ +@@ -511,7 +511,7 @@ + (cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \ + chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \ + done; +- @set -e; target=install; $(RECURSIVE_BUILD_CMD) ++ +@set -e; target=install; $(RECURSIVE_BUILD_CMD) + @set -e; liblist="$(LIBS)"; for i in $$liblist ;\ + do \ + if [ -f "$$i" ]; then \ +@@ -593,12 +600,7 @@ + done; \ + done + +-install_docs: +- @$(PERL) $(TOP)/util/mkdir-p.pl \ +- $(INSTALL_PREFIX)$(MANDIR)/man1 \ +- $(INSTALL_PREFIX)$(MANDIR)/man3 \ +- $(INSTALL_PREFIX)$(MANDIR)/man5 \ +- $(INSTALL_PREFIX)$(MANDIR)/man7 ++install_docs: install_dirs + @pod2man="`cd ./util; ./pod2mantest $(PERL)`"; \ + here="`pwd`"; \ + filecase=; \ +--- a/Makefile.shared ++++ b/Makefile.shared +@@ -105,6 +105,7 @@ LINK_SO= \ + SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \ + LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \ + LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \ ++ [ -e $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX ] && exit 0; \ + LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \ + $${SHAREDCMD} $${SHAREDFLAGS} \ + -o $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX \ +@@ -122,6 +124,7 @@ SYMLINK_SO= \ + done; \ + fi; \ + if [ -n "$$SHLIB_SOVER" ]; then \ ++ [ -e "$$SHLIB$$SHLIB_SUFFIX" ] || \ + ( $(SET_X); rm -f $$SHLIB$$SHLIB_SUFFIX; \ + ln -s $$prev $$SHLIB$$SHLIB_SUFFIX ); \ + fi; \ +--- a/crypto/Makefile ++++ b/crypto/Makefile +@@ -85,11 +85,11 @@ + @if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi + + subdirs: +- @target=all; $(RECURSIVE_MAKE) ++ +@target=all; $(RECURSIVE_MAKE) + + files: + $(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO +- @target=files; $(RECURSIVE_MAKE) ++ +@target=files; $(RECURSIVE_MAKE) + + links: + @$(PERL) $(TOP)/util/mklink.pl ../include/openssl $(EXHEADER) +@@ -100,7 +100,7 @@ + # lib: $(LIB): are splitted to avoid end-less loop + lib: $(LIB) + @touch lib +-$(LIB): $(LIBOBJ) ++$(LIB): $(LIBOBJ) | subdirs + $(AR) $(LIB) $(LIBOBJ) + $(RANLIB) $(LIB) || echo Never mind. + +@@ -110,7 +110,7 @@ + fi + + libs: +- @target=lib; $(RECURSIVE_MAKE) ++ +@target=lib; $(RECURSIVE_MAKE) + + install: + @[ -n "$(INSTALLTOP)" ] # should be set by top Makefile... +@@ -119,7 +119,7 @@ + (cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \ + chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \ + done; +- @target=install; $(RECURSIVE_MAKE) ++ +@target=install; $(RECURSIVE_MAKE) + + lint: + @target=lint; $(RECURSIVE_MAKE) +--- a/engines/Makefile ++++ b/engines/Makefile +@@ -72,7 +72,7 @@ + + all: lib subdirs + +-lib: $(LIBOBJ) ++lib: $(LIBOBJ) | subdirs + @if [ -n "$(SHARED_LIBS)" ]; then \ + set -e; \ + for l in $(LIBNAMES); do \ +@@ -89,7 +89,7 @@ + + subdirs: + echo $(EDIRS) +- @target=all; $(RECURSIVE_MAKE) ++ +@target=all; $(RECURSIVE_MAKE) + + files: + $(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO +@@ -128,7 +128,7 @@ + mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/engines/$$pfx$$l$$sfx ); \ + done; \ + fi +- @target=install; $(RECURSIVE_MAKE) ++ +@target=install; $(RECURSIVE_MAKE) + + tags: + ctags $(SRC) +--- a/test/Makefile ++++ b/test/Makefile +@@ -123,7 +123,7 @@ + tags: + ctags $(SRC) + +-tests: exe apps $(TESTS) ++tests: exe $(TESTS) + + apps: + @(cd ..; $(MAKE) DIRS=apps all) +@@ -365,109 +365,109 @@ + link_app.$${shlib_target} + + $(RSATEST)$(EXE_EXT): $(RSATEST).o $(DLIBCRYPTO) +- @target=$(RSATEST); $(BUILD_CMD) ++ +@target=$(RSATEST); $(BUILD_CMD) + + $(BNTEST)$(EXE_EXT): $(BNTEST).o $(DLIBCRYPTO) +- @target=$(BNTEST); $(BUILD_CMD) ++ +@target=$(BNTEST); $(BUILD_CMD) + + $(ECTEST)$(EXE_EXT): $(ECTEST).o $(DLIBCRYPTO) +- @target=$(ECTEST); $(BUILD_CMD) ++ +@target=$(ECTEST); $(BUILD_CMD) + + $(EXPTEST)$(EXE_EXT): $(EXPTEST).o $(DLIBCRYPTO) +- @target=$(EXPTEST); $(BUILD_CMD) ++ +@target=$(EXPTEST); $(BUILD_CMD) + + $(IDEATEST)$(EXE_EXT): $(IDEATEST).o $(DLIBCRYPTO) +- @target=$(IDEATEST); $(BUILD_CMD) ++ +@target=$(IDEATEST); $(BUILD_CMD) + + $(MD2TEST)$(EXE_EXT): $(MD2TEST).o $(DLIBCRYPTO) +- @target=$(MD2TEST); $(BUILD_CMD) ++ +@target=$(MD2TEST); $(BUILD_CMD) + + $(SHATEST)$(EXE_EXT): $(SHATEST).o $(DLIBCRYPTO) +- @target=$(SHATEST); $(BUILD_CMD) ++ +@target=$(SHATEST); $(BUILD_CMD) + + $(SHA1TEST)$(EXE_EXT): $(SHA1TEST).o $(DLIBCRYPTO) +- @target=$(SHA1TEST); $(BUILD_CMD) ++ +@target=$(SHA1TEST); $(BUILD_CMD) + + $(SHA256TEST)$(EXE_EXT): $(SHA256TEST).o $(DLIBCRYPTO) +- @target=$(SHA256TEST); $(BUILD_CMD) ++ +@target=$(SHA256TEST); $(BUILD_CMD) + + $(SHA512TEST)$(EXE_EXT): $(SHA512TEST).o $(DLIBCRYPTO) +- @target=$(SHA512TEST); $(BUILD_CMD) ++ +@target=$(SHA512TEST); $(BUILD_CMD) + + $(RMDTEST)$(EXE_EXT): $(RMDTEST).o $(DLIBCRYPTO) +- @target=$(RMDTEST); $(BUILD_CMD) ++ +@target=$(RMDTEST); $(BUILD_CMD) + + $(MDC2TEST)$(EXE_EXT): $(MDC2TEST).o $(DLIBCRYPTO) +- @target=$(MDC2TEST); $(BUILD_CMD) ++ +@target=$(MDC2TEST); $(BUILD_CMD) + + $(MD4TEST)$(EXE_EXT): $(MD4TEST).o $(DLIBCRYPTO) +- @target=$(MD4TEST); $(BUILD_CMD) ++ +@target=$(MD4TEST); $(BUILD_CMD) + + $(MD5TEST)$(EXE_EXT): $(MD5TEST).o $(DLIBCRYPTO) +- @target=$(MD5TEST); $(BUILD_CMD) ++ +@target=$(MD5TEST); $(BUILD_CMD) + + $(HMACTEST)$(EXE_EXT): $(HMACTEST).o $(DLIBCRYPTO) +- @target=$(HMACTEST); $(BUILD_CMD) ++ +@target=$(HMACTEST); $(BUILD_CMD) + + $(WPTEST)$(EXE_EXT): $(WPTEST).o $(DLIBCRYPTO) +- @target=$(WPTEST); $(BUILD_CMD) ++ +@target=$(WPTEST); $(BUILD_CMD) + + $(RC2TEST)$(EXE_EXT): $(RC2TEST).o $(DLIBCRYPTO) +- @target=$(RC2TEST); $(BUILD_CMD) ++ +@target=$(RC2TEST); $(BUILD_CMD) + + $(BFTEST)$(EXE_EXT): $(BFTEST).o $(DLIBCRYPTO) +- @target=$(BFTEST); $(BUILD_CMD) ++ +@target=$(BFTEST); $(BUILD_CMD) + + $(CASTTEST)$(EXE_EXT): $(CASTTEST).o $(DLIBCRYPTO) +- @target=$(CASTTEST); $(BUILD_CMD) ++ +@target=$(CASTTEST); $(BUILD_CMD) + + $(RC4TEST)$(EXE_EXT): $(RC4TEST).o $(DLIBCRYPTO) +- @target=$(RC4TEST); $(BUILD_CMD) ++ +@target=$(RC4TEST); $(BUILD_CMD) + + $(RC5TEST)$(EXE_EXT): $(RC5TEST).o $(DLIBCRYPTO) +- @target=$(RC5TEST); $(BUILD_CMD) ++ +@target=$(RC5TEST); $(BUILD_CMD) + + $(DESTEST)$(EXE_EXT): $(DESTEST).o $(DLIBCRYPTO) +- @target=$(DESTEST); $(BUILD_CMD) ++ +@target=$(DESTEST); $(BUILD_CMD) + + $(RANDTEST)$(EXE_EXT): $(RANDTEST).o $(DLIBCRYPTO) +- @target=$(RANDTEST); $(BUILD_CMD) ++ +@target=$(RANDTEST); $(BUILD_CMD) + + $(DHTEST)$(EXE_EXT): $(DHTEST).o $(DLIBCRYPTO) +- @target=$(DHTEST); $(BUILD_CMD) ++ +@target=$(DHTEST); $(BUILD_CMD) + + $(DSATEST)$(EXE_EXT): $(DSATEST).o $(DLIBCRYPTO) +- @target=$(DSATEST); $(BUILD_CMD) ++ +@target=$(DSATEST); $(BUILD_CMD) + + $(METHTEST)$(EXE_EXT): $(METHTEST).o $(DLIBCRYPTO) +- @target=$(METHTEST); $(BUILD_CMD) ++ +@target=$(METHTEST); $(BUILD_CMD) + + $(SSLTEST)$(EXE_EXT): $(SSLTEST).o $(DLIBSSL) $(DLIBCRYPTO) +- @target=$(SSLTEST); $(FIPS_BUILD_CMD) ++ +@target=$(SSLTEST); $(FIPS_BUILD_CMD) + + $(ENGINETEST)$(EXE_EXT): $(ENGINETEST).o $(DLIBCRYPTO) +- @target=$(ENGINETEST); $(BUILD_CMD) ++ +@target=$(ENGINETEST); $(BUILD_CMD) + + $(EVPTEST)$(EXE_EXT): $(EVPTEST).o $(DLIBCRYPTO) +- @target=$(EVPTEST); $(BUILD_CMD) ++ +@target=$(EVPTEST); $(BUILD_CMD) + + $(ECDSATEST)$(EXE_EXT): $(ECDSATEST).o $(DLIBCRYPTO) +- @target=$(ECDSATEST); $(BUILD_CMD) ++ +@target=$(ECDSATEST); $(BUILD_CMD) + + $(ECDHTEST)$(EXE_EXT): $(ECDHTEST).o $(DLIBCRYPTO) +- @target=$(ECDHTEST); $(BUILD_CMD) ++ +@target=$(ECDHTEST); $(BUILD_CMD) + + $(IGETEST)$(EXE_EXT): $(IGETEST).o $(DLIBCRYPTO) +- @target=$(IGETEST); $(BUILD_CMD) ++ +@target=$(IGETEST); $(BUILD_CMD) + + $(JPAKETEST)$(EXE_EXT): $(JPAKETEST).o $(DLIBCRYPTO) +- @target=$(JPAKETEST); $(BUILD_CMD) ++ +@target=$(JPAKETEST); $(BUILD_CMD) + + $(ASN1TEST)$(EXE_EXT): $(ASN1TEST).o $(DLIBCRYPTO) +- @target=$(ASN1TEST); $(BUILD_CMD) ++ +@target=$(ASN1TEST); $(BUILD_CMD) + + $(SRPTEST)$(EXE_EXT): $(SRPTEST).o $(DLIBCRYPTO) +- @target=$(SRPTEST); $(BUILD_CMD) ++ +@target=$(SRPTEST); $(BUILD_CMD) + + #$(AESTEST).o: $(AESTEST).c + # $(CC) -c $(CFLAGS) -DINTERMEDIATE_VALUE_KAT -DTRACE_KAT_MCT $(AESTEST).c +@@ -480,7 +480,7 @@ + # fi + + dummytest$(EXE_EXT): dummytest.o $(DLIBCRYPTO) +- @target=dummytest; $(BUILD_CMD) ++ +@target=dummytest; $(BUILD_CMD) + + # DO NOT DELETE THIS LINE -- make depend depends on it. + diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-x32.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-x32.patch new file mode 100644 index 0000000000..5106cb6e82 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1-x32.patch @@ -0,0 +1,79 @@ +http://git.yoctoproject.org/cgit/cgit.cgi/poky/commit/?id=51bfed2e26fc13a66e8b5710aa2ce1d7a04af721 + +UpstreamStatus: Pending + +Received from H J Liu @ Intel +Make the assembly syntax compatible with x32 gcc. Othewise x32 gcc throws errors. +Signed-Off-By: Nitin A Kamble 2011/07/13 + +ported the patch to the 1.0.0e version +Signed-Off-By: Nitin A Kamble 2011/12/01 +Index: openssl-1.0.0e/Configure +=================================================================== +--- openssl-1.0.0e.orig/Configure ++++ openssl-1.0.0e/Configure +@@ -393,6 +393,7 @@ my %table=( + "debug-linux-generic32","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DTERMIO -g -Wall::-D_REENTRANT::-ldl:BN_LLONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", + "debug-linux-generic64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -DTERMIO -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHAR RC4_CHUNK DES_INT DES_UNROLL BF_PTR:${no_asm}:dlfcn:linux-shared:-fPIC::.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", + "debug-linux-x86_64","gcc:-DBN_DEBUG -DREF_CHECK -DCONF_DEBUG -DCRYPTO_MDEBUG -m64 -DL_ENDIAN -DTERMIO -g -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT_LONG RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-m64:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR):::64", ++"linux-x32", "gcc:-DL_ENDIAN -DTERMIO -O2 -pipe -g -feliminate-unused-debug-types -Wall::-D_REENTRANT::-ldl:SIXTY_FOUR_BIT RC4_CHUNK DES_INT DES_UNROLL:${x86_64_asm}:elf:dlfcn:linux-shared:-fPIC:-mx32:.so.\$(SHLIB_MAJOR).\$(SHLIB_MINOR)", + "dist", "cc:-O::(unknown)::::::", + + # Basic configs that should work on any (32 and less bit) box +Index: openssl-1.0.0e/crypto/bn/asm/x86_64-gcc.c +=================================================================== +--- openssl-1.0.0e.orig/crypto/bn/asm/x86_64-gcc.c ++++ openssl-1.0.0e/crypto/bn/asm/x86_64-gcc.c +@@ -55,7 +55,7 @@ + * machine. + */ + +-#ifdef _WIN64 ++#if defined _WIN64 || !defined __LP64__ + #define BN_ULONG unsigned long long + #else + #define BN_ULONG unsigned long +@@ -192,9 +192,9 @@ BN_ULONG bn_add_words (BN_ULONG *rp, con + asm ( + " subq %2,%2 \n" + ".p2align 4 \n" +- "1: movq (%4,%2,8),%0 \n" +- " adcq (%5,%2,8),%0 \n" +- " movq %0,(%3,%2,8) \n" ++ "1: movq (%q4,%2,8),%0 \n" ++ " adcq (%q5,%2,8),%0 \n" ++ " movq %0,(%q3,%2,8) \n" + " leaq 1(%2),%2 \n" + " loop 1b \n" + " sbbq %0,%0 \n" +@@ -215,9 +215,9 @@ BN_ULONG bn_sub_words (BN_ULONG *rp, con + asm ( + " subq %2,%2 \n" + ".p2align 4 \n" +- "1: movq (%4,%2,8),%0 \n" +- " sbbq (%5,%2,8),%0 \n" +- " movq %0,(%3,%2,8) \n" ++ "1: movq (%q4,%2,8),%0 \n" ++ " sbbq (%q5,%2,8),%0 \n" ++ " movq %0,(%q3,%2,8) \n" + " leaq 1(%2),%2 \n" + " loop 1b \n" + " sbbq %0,%0 \n" +Index: openssl-1.0.0e/crypto/bn/bn.h +=================================================================== +--- openssl-1.0.0e.orig/crypto/bn/bn.h ++++ openssl-1.0.0e/crypto/bn/bn.h +@@ -172,6 +172,13 @@ extern "C" { + # endif + #endif + ++/* Address type. */ ++#ifdef _WIN64 ++#define BN_ADDR unsigned long long ++#else ++#define BN_ADDR unsigned long ++#endif ++ + /* assuming long is 64bit - this is the DEC Alpha + * unsigned long long is only 64 bits :-(, don't define + * BN_LLONG for the DEC Alpha */ diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1a-hmac-ia32cap.patch b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1a-hmac-ia32cap.patch new file mode 100644 index 0000000000..4e0ed86a99 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/files/openssl-1.0.1a-hmac-ia32cap.patch @@ -0,0 +1,52 @@ +http://cvs.openssl.org/chngview?cn=22455 + +fix from upstream for building on non-x86 arches + +e_rc4_hmac_md5.c: last commit was inappropriate for non-x86[_64] platforms [from HEAD]. PR: 2792 + +Index: crypto/evp/e_rc4_hmac_md5.c +=================================================================== +RCS file: /usr/local/src/openssl/CVSROOT/openssl/crypto/evp/e_rc4_hmac_md5.c,v +retrieving revision 1.1.2.5 +retrieving revision 1.1.2.6 +diff -u -p -r1.1.2.5 -r1.1.2.6 +--- crypto/evp/e_rc4_hmac_md5.c 18 Apr 2012 17:51:33 -0000 1.1.2.5 ++++ crypto/evp/e_rc4_hmac_md5.c 19 Apr 2012 20:43:02 -0000 1.1.2.6 +@@ -121,6 +121,7 @@ static int rc4_hmac_md5_cipher(EVP_CIPHE + md5_off = MD5_CBLOCK-key->md.num, + blocks; + unsigned int l; ++ extern unsigned int OPENSSL_ia32cap_P[]; + #endif + size_t plen = key->payload_length; + +@@ -132,7 +133,8 @@ static int rc4_hmac_md5_cipher(EVP_CIPHE + /* cipher has to "fall behind" */ + if (rc4_off>md5_off) md5_off+=MD5_CBLOCK; + +- if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK)) { ++ if (plen>md5_off && (blocks=(plen-md5_off)/MD5_CBLOCK) && ++ (OPENSSL_ia32cap_P[0]&(1<<20))==0) { + MD5_Update(&key->md,in,md5_off); + RC4(&key->ks,rc4_off,in,out); + +@@ -172,7 +174,8 @@ static int rc4_hmac_md5_cipher(EVP_CIPHE + if (md5_off>rc4_off) rc4_off += 2*MD5_CBLOCK; + else rc4_off += MD5_CBLOCK; + +- if (len>rc4_off && (blocks=(len-rc4_off)/MD5_CBLOCK)) { ++ if (len>rc4_off && (blocks=(len-rc4_off)/MD5_CBLOCK) && ++ (OPENSSL_ia32cap_P[0]&(1<<20))==0) { + RC4(&key->ks,rc4_off,in,out); + MD5_Update(&key->md,out,md5_off); + +@@ -289,8 +292,6 @@ static EVP_CIPHER r4_hmac_md5_cipher= + + const EVP_CIPHER *EVP_rc4_hmac_md5(void) + { +- extern unsigned int OPENSSL_ia32cap_P[]; +- /* RC4_CHAR flag ------------vvvvv */ +- return(OPENSSL_ia32cap_P[0]&(1<<20) ? NULL : &r4_hmac_md5_cipher); ++ return(&r4_hmac_md5_cipher); + } + #endif diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/metadata.xml b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/metadata.xml new file mode 100644 index 0000000000..c3a9997785 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/metadata.xml @@ -0,0 +1,9 @@ + + + +base-system + + Disable EC/RC5 algorithms (as they seem to be patented) + Enable support for RFC 3779 (X.509 Extensions for IP Addresses and AS Identifiers) + + diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8u.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8u.ebuild new file mode 100644 index 0000000000..8710be994d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8u.ebuild @@ -0,0 +1,141 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-0.9.8u.ebuild,v 1.5 2012/05/25 17:41:49 vapier Exp $ + +# this ebuild is only for the libcrypto.so.0.9.8 and libssl.so.0.9.8 SONAME for ABI compat + +EAPI="2" + +inherit eutils flag-o-matic toolchain-funcs multilib + +DESCRIPTION="Toolkit for SSL v2/v3 and TLS v1" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz" + +LICENSE="openssl" +SLOT="0.9.8" +KEYWORDS="~alpha amd64 ~arm ~hppa ~ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh ~sparc x86 ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos sse2 test zlib" + +RDEPEND="gmp? ( dev-libs/gmp ) + zlib? ( sys-libs/zlib ) + kerberos? ( app-crypt/mit-krb5 ) + !=dev-libs/openssl-0.9.8*:0" +DEPEND="${RDEPEND} + sys-apps/diffutils + >=dev-lang/perl-5 + test? ( sys-devel/bc )" + +pkg_setup() { + # avoid collisions with openssl-1 (preserve lib) + if ! has_version dev-libs/openssl:${SLOT} ; then + ewarn "Removing lib{crypto,ssl}.so.0.9.8 to avoid collision with openssl-1" + rm -f "${ROOT}"/usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 + fi +} + +src_prepare() { + epatch "${FILESDIR}"/${PN}-0.9.8e-bsd-sparc64.patch + epatch "${FILESDIR}"/${PN}-0.9.8h-ldflags.patch #181438 + epatch "${FILESDIR}"/${PN}-0.9.8m-binutils.patch #289130 + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile{,.org} \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + # update the enginedir path + sed -i \ + -e "/foo.*engines/s|/lib/engines|/$(get_libdir)/engines|" \ + Configure || die + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-0.9.8 gentoo.config || die "cp cross-compile failed" + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags -Wa,--noexecstack + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + sed -i '/^"debug-steve/d' Configure # 0.9.8k shipped broken + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + + tc-export CC AR RANLIB + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { use $1 && echo "enable-${2:-$1} ${*:3}" || echo "no-${2:-$1}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=/etc/ssl \ + shared threads \ + || die "Configure failed" + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^LIBDIR=/s|=.*|=$(get_libdir)|" \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts + emake -j1 depend || die "depend failed" + emake -j1 build_libs || die "make build_libs failed" +} + +src_test() { + emake -j1 test || die "make test failed" +} + +src_install() { + dolib.so lib{crypto,ssl}.so.0.9.8 || die +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8v.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8v.ebuild new file mode 100644 index 0000000000..cd1229d066 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8v.ebuild @@ -0,0 +1,141 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-0.9.8v.ebuild,v 1.5 2012/05/25 17:41:49 vapier Exp $ + +# this ebuild is only for the libcrypto.so.0.9.8 and libssl.so.0.9.8 SONAME for ABI compat + +EAPI="2" + +inherit eutils flag-o-matic toolchain-funcs multilib + +DESCRIPTION="Toolkit for SSL v2/v3 and TLS v1" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz" + +LICENSE="openssl" +SLOT="0.9.8" +KEYWORDS="~alpha amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ppc64 ~s390 ~sh ~sparc x86 ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos sse2 test zlib" + +RDEPEND="gmp? ( dev-libs/gmp ) + zlib? ( sys-libs/zlib ) + kerberos? ( app-crypt/mit-krb5 ) + !=dev-libs/openssl-0.9.8*:0" +DEPEND="${RDEPEND} + sys-apps/diffutils + >=dev-lang/perl-5 + test? ( sys-devel/bc )" + +pkg_setup() { + # avoid collisions with openssl-1 (preserve lib) + if ! has_version dev-libs/openssl:${SLOT} ; then + ewarn "Removing lib{crypto,ssl}.so.0.9.8 to avoid collision with openssl-1" + rm -f "${ROOT}"/usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 + fi +} + +src_prepare() { + epatch "${FILESDIR}"/${PN}-0.9.8e-bsd-sparc64.patch + epatch "${FILESDIR}"/${PN}-0.9.8h-ldflags.patch #181438 + epatch "${FILESDIR}"/${PN}-0.9.8m-binutils.patch #289130 + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile{,.org} \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + # update the enginedir path + sed -i \ + -e "/foo.*engines/s|/lib/engines|/$(get_libdir)/engines|" \ + Configure || die + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-0.9.8 gentoo.config || die "cp cross-compile failed" + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags -Wa,--noexecstack + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + sed -i '/^"debug-steve/d' Configure # 0.9.8k shipped broken + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + + tc-export CC AR RANLIB + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { use $1 && echo "enable-${2:-$1} ${*:3}" || echo "no-${2:-$1}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=/etc/ssl \ + shared threads \ + || die "Configure failed" + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^LIBDIR=/s|=.*|=$(get_libdir)|" \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts + emake -j1 depend || die "depend failed" + emake -j1 build_libs || die "make build_libs failed" +} + +src_test() { + emake -j1 test || die "make test failed" +} + +src_install() { + dolib.so lib{crypto,ssl}.so.0.9.8 || die +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8w.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8w.ebuild new file mode 100644 index 0000000000..325504deb9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8w.ebuild @@ -0,0 +1,141 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-0.9.8w.ebuild,v 1.4 2012/05/25 17:41:49 vapier Exp $ + +# this ebuild is only for the libcrypto.so.0.9.8 and libssl.so.0.9.8 SONAME for ABI compat + +EAPI="2" + +inherit eutils flag-o-matic toolchain-funcs multilib + +DESCRIPTION="Toolkit for SSL v2/v3 and TLS v1" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz" + +LICENSE="openssl" +SLOT="0.9.8" +KEYWORDS="~alpha amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc x86 ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos sse2 test zlib" + +RDEPEND="gmp? ( dev-libs/gmp ) + zlib? ( sys-libs/zlib ) + kerberos? ( app-crypt/mit-krb5 ) + !=dev-libs/openssl-0.9.8*:0" +DEPEND="${RDEPEND} + sys-apps/diffutils + >=dev-lang/perl-5 + test? ( sys-devel/bc )" + +pkg_setup() { + # avoid collisions with openssl-1 (preserve lib) + if ! has_version dev-libs/openssl:${SLOT} ; then + ewarn "Removing lib{crypto,ssl}.so.0.9.8 to avoid collision with openssl-1" + rm -f "${ROOT}"/usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 + fi +} + +src_prepare() { + epatch "${FILESDIR}"/${PN}-0.9.8e-bsd-sparc64.patch + epatch "${FILESDIR}"/${PN}-0.9.8h-ldflags.patch #181438 + epatch "${FILESDIR}"/${PN}-0.9.8m-binutils.patch #289130 + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile{,.org} \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + # update the enginedir path + sed -i \ + -e "/foo.*engines/s|/lib/engines|/$(get_libdir)/engines|" \ + Configure || die + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-0.9.8 gentoo.config || die "cp cross-compile failed" + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags -Wa,--noexecstack + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + sed -i '/^"debug-steve/d' Configure # 0.9.8k shipped broken + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + + tc-export CC AR RANLIB + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { use $1 && echo "enable-${2:-$1} ${*:3}" || echo "no-${2:-$1}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=/etc/ssl \ + shared threads \ + || die "Configure failed" + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^LIBDIR=/s|=.*|=$(get_libdir)|" \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts + emake -j1 depend || die "depend failed" + emake -j1 build_libs || die "make build_libs failed" +} + +src_test() { + emake -j1 test || die "make test failed" +} + +src_install() { + dolib.so lib{crypto,ssl}.so.0.9.8 || die +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8x.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8x.ebuild index bf624e413c..2d7bacf6f6 100644 --- a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8x.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-0.9.8x.ebuild @@ -1,12 +1,12 @@ # Copyright 1999-2012 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-0.9.8x.ebuild,v 1.3 2012/05/13 11:13:51 ago Exp $ +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-0.9.8x.ebuild,v 1.4 2012/05/25 17:41:49 vapier Exp $ # this ebuild is only for the libcrypto.so.0.9.8 and libssl.so.0.9.8 SONAME for ABI compat EAPI="2" -inherit eutils flag-o-matic toolchain-funcs +inherit eutils flag-o-matic toolchain-funcs multilib DESCRIPTION="Toolkit for SSL v2/v3 and TLS v1" HOMEPAGE="http://www.openssl.org/" @@ -14,7 +14,7 @@ SRC_URI="mirror://openssl/source/${P}.tar.gz" LICENSE="openssl" SLOT="0.9.8" -KEYWORDS="~alpha amd64 arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc x86 ~sparc-fbsd ~x86-fbsd" +KEYWORDS="~alpha amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc x86 ~sparc-fbsd ~x86-fbsd" IUSE="bindist gmp kerberos sse2 test zlib" RDEPEND="gmp? ( dev-libs/gmp ) diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0h.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0h.ebuild new file mode 100644 index 0000000000..1e28ca9231 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0h.ebuild @@ -0,0 +1,213 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-1.0.0h.ebuild,v 1.7 2012/05/25 17:41:49 vapier Exp $ + +EAPI="4" + +inherit eutils flag-o-matic toolchain-funcs multilib + +REV="1.7" +DESCRIPTION="full-strength general purpose cryptography library (including SSL v2/v3 and TLS v1)" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz + http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/~checkout~/packages/${PN}/${PN}-c_rehash.sh?rev=${REV} -> ${PN}-c_rehash.sh.${REV}" + +LICENSE="openssl" +SLOT="0" +KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos rfc3779 sse2 static-libs test zlib" + +# Have the sub-libs in RDEPEND with [static-libs] since, logically, +# our libssl.a depends on libz.a/etc... at runtime. +LIB_DEPEND="gmp? ( dev-libs/gmp[static-libs(+)] ) + zlib? ( sys-libs/zlib[static-libs(+)] ) + kerberos? ( app-crypt/mit-krb5 )" +RDEPEND="static-libs? ( ${LIB_DEPEND} ) + !static-libs? ( ${LIB_DEPEND//\[static-libs(+)]} )" +DEPEND="${RDEPEND} + sys-apps/diffutils + >=dev-lang/perl-5 + test? ( sys-devel/bc )" +PDEPEND="app-misc/ca-certificates" + +src_unpack() { + unpack ${P}.tar.gz + SSL_CNF_DIR="/etc/ssl" + sed \ + -e "/^DIR=/s:=.*:=${SSL_CNF_DIR}:" \ + "${DISTDIR}"/${PN}-c_rehash.sh.${REV} \ + > "${WORKDIR}"/c_rehash || die #416717 +} + +src_prepare() { + # Make sure we only ever touch Makefile.org and avoid patching a file + # that gets blown away anyways by the Configure script in src_configure + rm -f Makefile + + epatch "${FILESDIR}"/${PN}-1.0.0a-ldflags.patch #327421 + epatch "${FILESDIR}"/${PN}-1.0.0d-fbsd-amd64.patch #363089 + epatch "${FILESDIR}"/${PN}-1.0.0d-windres.patch #373743 + epatch "${FILESDIR}"/${PN}-1.0.0h-pkg-config.patch + epatch "${FILESDIR}"/${PN}-1.0.0e-parallel-build.patch + epatch "${FILESDIR}"/${PN}-1.0.0e-x32.patch + epatch_user #332661 + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile.org \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-1.0.0 gentoo.config || die + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags $(test-flags-CC -Wa,--noexecstack) + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + unset CROSS_COMPILE #311473 + + tc-export CC AR RANLIB RC + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl rfc3779) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=${SSL_CNF_DIR} \ + --libdir=$(get_libdir) \ + shared threads \ + || die + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts; it also doesn't matter + # that it's -j1 as the code itself serializes subdirs + emake -j1 depend || die + emake all || die + # rehash is needed to prep the certs/ dir; do this + # separately to avoid parallel build issues. + emake rehash || die +} + +src_test() { + emake -j1 test || die +} + +src_install() { + emake INSTALL_PREFIX="${D}" install || die + dobin "${WORKDIR}"/c_rehash || die #333117 + dodoc CHANGES* FAQ NEWS README doc/*.txt doc/c-indentation.el + dohtml -r doc/* + use rfc3779 && dodoc engines/ccgost/README.gost + + # This is crappy in that the static archives are still built even + # when USE=static-libs. But this is due to a failing in the openssl + # build system: the static archives are built as PIC all the time. + # Only way around this would be to manually configure+compile openssl + # twice; once with shared lib support enabled and once without. + use static-libs || rm -f "${D}"/usr/lib*/lib*.a + + # create the certs directory + dodir ${SSL_CNF_DIR}/certs + cp -RP certs/* "${D}"${SSL_CNF_DIR}/certs/ || die + rm -r "${D}"${SSL_CNF_DIR}/certs/{demo,expired} + + # Namespace openssl programs to prevent conflicts with other man pages + cd "${D}"/usr/share/man + local m d s + for m in $(find . -type f | xargs grep -L '#include') ; do + d=${m%/*} ; d=${d#./} ; m=${m##*/} + [[ ${m} == openssl.1* ]] && continue + [[ -n $(find -L ${d} -type l) ]] && die "erp, broken links already!" + mv ${d}/{,ssl-}${m} + # fix up references to renamed man pages + sed -i '/^[.]SH "SEE ALSO"/,/^[.]/s:\([^(, ]*(1)\):ssl-\1:g' ${d}/ssl-${m} + ln -s ssl-${m} ${d}/openssl-${m} + # locate any symlinks that point to this man page ... we assume + # that any broken links are due to the above renaming + for s in $(find -L ${d} -type l) ; do + s=${s##*/} + rm -f ${d}/${s} + ln -s ssl-${m} ${d}/ssl-${s} + ln -s ssl-${s} ${d}/openssl-${s} + done + done + [[ -n $(find -L ${d} -type l) ]] && die "broken manpage links found :(" + + dodir /etc/sandbox.d #254521 + echo 'SANDBOX_PREDICT="/dev/crypto"' > "${D}"/etc/sandbox.d/10openssl + + diropts -m0700 + keepdir ${SSL_CNF_DIR}/private +} + +pkg_preinst() { + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} + +pkg_postinst() { + ebegin "Running 'c_rehash ${ROOT%/}${SSL_CNF_DIR}/certs/' to rebuild hashes #333069" + c_rehash "${ROOT%/}${SSL_CNF_DIR}/certs" >/dev/null + eend $? + + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0i.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0i.ebuild new file mode 100644 index 0000000000..e095154023 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0i.ebuild @@ -0,0 +1,213 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-1.0.0i.ebuild,v 1.9 2012/05/25 17:41:49 vapier Exp $ + +EAPI="4" + +inherit eutils flag-o-matic toolchain-funcs multilib + +REV="1.7" +DESCRIPTION="full-strength general purpose cryptography library (including SSL v2/v3 and TLS v1)" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz + http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/~checkout~/packages/${PN}/${PN}-c_rehash.sh?rev=${REV} -> ${PN}-c_rehash.sh.${REV}" + +LICENSE="openssl" +SLOT="0" +KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos rfc3779 sse2 static-libs test zlib" + +# Have the sub-libs in RDEPEND with [static-libs] since, logically, +# our libssl.a depends on libz.a/etc... at runtime. +LIB_DEPEND="gmp? ( dev-libs/gmp[static-libs(+)] ) + zlib? ( sys-libs/zlib[static-libs(+)] ) + kerberos? ( app-crypt/mit-krb5 )" +RDEPEND="static-libs? ( ${LIB_DEPEND} ) + !static-libs? ( ${LIB_DEPEND//\[static-libs(+)]} )" +DEPEND="${RDEPEND} + sys-apps/diffutils + >=dev-lang/perl-5 + test? ( sys-devel/bc )" +PDEPEND="app-misc/ca-certificates" + +src_unpack() { + unpack ${P}.tar.gz + SSL_CNF_DIR="/etc/ssl" + sed \ + -e "/^DIR=/s:=.*:=${SSL_CNF_DIR}:" \ + "${DISTDIR}"/${PN}-c_rehash.sh.${REV} \ + > "${WORKDIR}"/c_rehash || die #416717 +} + +src_prepare() { + # Make sure we only ever touch Makefile.org and avoid patching a file + # that gets blown away anyways by the Configure script in src_configure + rm -f Makefile + + epatch "${FILESDIR}"/${PN}-1.0.0a-ldflags.patch #327421 + epatch "${FILESDIR}"/${PN}-1.0.0d-fbsd-amd64.patch #363089 + epatch "${FILESDIR}"/${PN}-1.0.0d-windres.patch #373743 + epatch "${FILESDIR}"/${PN}-1.0.0h-pkg-config.patch + epatch "${FILESDIR}"/${PN}-1.0.0e-parallel-build.patch + epatch "${FILESDIR}"/${PN}-1.0.0e-x32.patch + epatch_user #332661 + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile.org \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-1.0.0 gentoo.config || die + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags $(test-flags-CC -Wa,--noexecstack) + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + unset CROSS_COMPILE #311473 + + tc-export CC AR RANLIB RC + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl rfc3779) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=${SSL_CNF_DIR} \ + --libdir=$(get_libdir) \ + shared threads \ + || die + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts; it also doesn't matter + # that it's -j1 as the code itself serializes subdirs + emake -j1 depend || die + emake all || die + # rehash is needed to prep the certs/ dir; do this + # separately to avoid parallel build issues. + emake rehash || die +} + +src_test() { + emake -j1 test || die +} + +src_install() { + emake INSTALL_PREFIX="${D}" install || die + dobin "${WORKDIR}"/c_rehash || die #333117 + dodoc CHANGES* FAQ NEWS README doc/*.txt doc/c-indentation.el + dohtml -r doc/* + use rfc3779 && dodoc engines/ccgost/README.gost + + # This is crappy in that the static archives are still built even + # when USE=static-libs. But this is due to a failing in the openssl + # build system: the static archives are built as PIC all the time. + # Only way around this would be to manually configure+compile openssl + # twice; once with shared lib support enabled and once without. + use static-libs || rm -f "${D}"/usr/lib*/lib*.a + + # create the certs directory + dodir ${SSL_CNF_DIR}/certs + cp -RP certs/* "${D}"${SSL_CNF_DIR}/certs/ || die + rm -r "${D}"${SSL_CNF_DIR}/certs/{demo,expired} + + # Namespace openssl programs to prevent conflicts with other man pages + cd "${D}"/usr/share/man + local m d s + for m in $(find . -type f | xargs grep -L '#include') ; do + d=${m%/*} ; d=${d#./} ; m=${m##*/} + [[ ${m} == openssl.1* ]] && continue + [[ -n $(find -L ${d} -type l) ]] && die "erp, broken links already!" + mv ${d}/{,ssl-}${m} + # fix up references to renamed man pages + sed -i '/^[.]SH "SEE ALSO"/,/^[.]/s:\([^(, ]*(1)\):ssl-\1:g' ${d}/ssl-${m} + ln -s ssl-${m} ${d}/openssl-${m} + # locate any symlinks that point to this man page ... we assume + # that any broken links are due to the above renaming + for s in $(find -L ${d} -type l) ; do + s=${s##*/} + rm -f ${d}/${s} + ln -s ssl-${m} ${d}/ssl-${s} + ln -s ssl-${s} ${d}/openssl-${s} + done + done + [[ -n $(find -L ${d} -type l) ]] && die "broken manpage links found :(" + + dodir /etc/sandbox.d #254521 + echo 'SANDBOX_PREDICT="/dev/crypto"' > "${D}"/etc/sandbox.d/10openssl + + diropts -m0700 + keepdir ${SSL_CNF_DIR}/private +} + +pkg_preinst() { + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} + +pkg_postinst() { + ebegin "Running 'c_rehash ${ROOT%/}${SSL_CNF_DIR}/certs/' to rebuild hashes #333069" + c_rehash "${ROOT%/}${SSL_CNF_DIR}/certs" >/dev/null + eend $? + + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0j.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0j.ebuild new file mode 100644 index 0000000000..32f4784075 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.0j.ebuild @@ -0,0 +1,213 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-1.0.0j.ebuild,v 1.9 2012/05/25 17:41:49 vapier Exp $ + +EAPI="4" + +inherit eutils flag-o-matic toolchain-funcs multilib + +REV="1.7" +DESCRIPTION="full-strength general purpose cryptography library (including SSL v2/v3 and TLS v1)" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz + http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/~checkout~/packages/${PN}/${PN}-c_rehash.sh?rev=${REV} -> ${PN}-c_rehash.sh.${REV}" + +LICENSE="openssl" +SLOT="0" +KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos rfc3779 sse2 static-libs test zlib" + +# Have the sub-libs in RDEPEND with [static-libs] since, logically, +# our libssl.a depends on libz.a/etc... at runtime. +LIB_DEPEND="gmp? ( dev-libs/gmp[static-libs(+)] ) + zlib? ( sys-libs/zlib[static-libs(+)] ) + kerberos? ( app-crypt/mit-krb5 )" +RDEPEND="static-libs? ( ${LIB_DEPEND} ) + !static-libs? ( ${LIB_DEPEND//\[static-libs(+)]} )" +DEPEND="${RDEPEND} + sys-apps/diffutils + >=dev-lang/perl-5 + test? ( sys-devel/bc )" +PDEPEND="app-misc/ca-certificates" + +src_unpack() { + unpack ${P}.tar.gz + SSL_CNF_DIR="/etc/ssl" + sed \ + -e "/^DIR=/s:=.*:=${SSL_CNF_DIR}:" \ + "${DISTDIR}"/${PN}-c_rehash.sh.${REV} \ + > "${WORKDIR}"/c_rehash || die #416717 +} + +src_prepare() { + # Make sure we only ever touch Makefile.org and avoid patching a file + # that gets blown away anyways by the Configure script in src_configure + rm -f Makefile + + epatch "${FILESDIR}"/${PN}-1.0.0a-ldflags.patch #327421 + epatch "${FILESDIR}"/${PN}-1.0.0d-fbsd-amd64.patch #363089 + epatch "${FILESDIR}"/${PN}-1.0.0d-windres.patch #373743 + epatch "${FILESDIR}"/${PN}-1.0.0h-pkg-config.patch + epatch "${FILESDIR}"/${PN}-1.0.0e-parallel-build.patch + epatch "${FILESDIR}"/${PN}-1.0.0e-x32.patch + epatch_user #332661 + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile.org \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-1.0.0 gentoo.config || die + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags $(test-flags-CC -Wa,--noexecstack) + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + unset CROSS_COMPILE #311473 + + tc-export CC AR RANLIB RC + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl rfc3779) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=${SSL_CNF_DIR} \ + --libdir=$(get_libdir) \ + shared threads \ + || die + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts; it also doesn't matter + # that it's -j1 as the code itself serializes subdirs + emake -j1 depend || die + emake all || die + # rehash is needed to prep the certs/ dir; do this + # separately to avoid parallel build issues. + emake rehash || die +} + +src_test() { + emake -j1 test || die +} + +src_install() { + emake INSTALL_PREFIX="${D}" install || die + dobin "${WORKDIR}"/c_rehash || die #333117 + dodoc CHANGES* FAQ NEWS README doc/*.txt doc/c-indentation.el + dohtml -r doc/* + use rfc3779 && dodoc engines/ccgost/README.gost + + # This is crappy in that the static archives are still built even + # when USE=static-libs. But this is due to a failing in the openssl + # build system: the static archives are built as PIC all the time. + # Only way around this would be to manually configure+compile openssl + # twice; once with shared lib support enabled and once without. + use static-libs || rm -f "${D}"/usr/lib*/lib*.a + + # create the certs directory + dodir ${SSL_CNF_DIR}/certs + cp -RP certs/* "${D}"${SSL_CNF_DIR}/certs/ || die + rm -r "${D}"${SSL_CNF_DIR}/certs/{demo,expired} + + # Namespace openssl programs to prevent conflicts with other man pages + cd "${D}"/usr/share/man + local m d s + for m in $(find . -type f | xargs grep -L '#include') ; do + d=${m%/*} ; d=${d#./} ; m=${m##*/} + [[ ${m} == openssl.1* ]] && continue + [[ -n $(find -L ${d} -type l) ]] && die "erp, broken links already!" + mv ${d}/{,ssl-}${m} + # fix up references to renamed man pages + sed -i '/^[.]SH "SEE ALSO"/,/^[.]/s:\([^(, ]*(1)\):ssl-\1:g' ${d}/ssl-${m} + ln -s ssl-${m} ${d}/openssl-${m} + # locate any symlinks that point to this man page ... we assume + # that any broken links are due to the above renaming + for s in $(find -L ${d} -type l) ; do + s=${s##*/} + rm -f ${d}/${s} + ln -s ssl-${m} ${d}/ssl-${s} + ln -s ssl-${s} ${d}/openssl-${s} + done + done + [[ -n $(find -L ${d} -type l) ]] && die "broken manpage links found :(" + + dodir /etc/sandbox.d #254521 + echo 'SANDBOX_PREDICT="/dev/crypto"' > "${D}"/etc/sandbox.d/10openssl + + diropts -m0700 + keepdir ${SSL_CNF_DIR}/private +} + +pkg_preinst() { + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} + +pkg_postinst() { + ebegin "Running 'c_rehash ${ROOT%/}${SSL_CNF_DIR}/certs/' to rebuild hashes #333069" + c_rehash "${ROOT%/}${SSL_CNF_DIR}/certs" >/dev/null + eend $? + + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1a.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1a.ebuild new file mode 100644 index 0000000000..212abe0bed --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1a.ebuild @@ -0,0 +1,222 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-1.0.1a.ebuild,v 1.6 2012/05/25 17:41:49 vapier Exp $ + +EAPI="4" + +inherit eutils flag-o-matic toolchain-funcs multilib + +REV="1.7" +DESCRIPTION="full-strength general purpose cryptography library (including SSL v2/v3 and TLS v1)" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz + http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/~checkout~/packages/${PN}/${PN}-c_rehash.sh?rev=${REV} -> ${PN}-c_rehash.sh.${REV}" + +LICENSE="openssl" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos rfc3779 sse2 static-libs test vanilla zlib" + +# Have the sub-libs in RDEPEND with [static-libs] since, logically, +# our libssl.a depends on libz.a/etc... at runtime. +LIB_DEPEND="gmp? ( dev-libs/gmp[static-libs(+)] ) + zlib? ( sys-libs/zlib[static-libs(+)] ) + kerberos? ( app-crypt/mit-krb5 )" +# The blocks are temporary just to make sure people upgrade to a +# version that lack runtime version checking. We'll drop them in +# the future. +RDEPEND="static-libs? ( ${LIB_DEPEND} ) + !static-libs? ( ${LIB_DEPEND//\[static-libs(+)]} ) + ! "${WORKDIR}"/c_rehash || die #416717 +} + +src_prepare() { + # Make sure we only ever touch Makefile.org and avoid patching a file + # that gets blown away anyways by the Configure script in src_configure + rm -f Makefile + + if ! use vanilla ; then + epatch "${FILESDIR}"/${PN}-1.0.0a-ldflags.patch #327421 + epatch "${FILESDIR}"/${PN}-1.0.0d-fbsd-amd64.patch #363089 + epatch "${FILESDIR}"/${PN}-1.0.0d-windres.patch #373743 + epatch "${FILESDIR}"/${PN}-1.0.0h-pkg-config.patch + epatch "${FILESDIR}"/${PN}-1.0.1-parallel-build.patch + epatch "${FILESDIR}"/${PN}-1.0.1-x32.patch + epatch "${FILESDIR}"/${PN}-1.0.1-ipv6.patch + epatch "${FILESDIR}"/${P}-hmac-ia32cap.patch + epatch_user #332661 + fi + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile.org \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-1.0.0 gentoo.config || die + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags $(test-flags-CC -Wa,--noexecstack) + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + unset CROSS_COMPILE #311473 + + tc-export CC AR RANLIB RC + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl rfc3779) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=${SSL_CNF_DIR} \ + --libdir=$(get_libdir) \ + shared threads \ + || die + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts; it also doesn't matter + # that it's -j1 as the code itself serializes subdirs + emake -j1 depend + emake all + # rehash is needed to prep the certs/ dir; do this + # separately to avoid parallel build issues. + emake rehash +} + +src_test() { + emake -j1 test +} + +src_install() { + emake INSTALL_PREFIX="${D}" install + dobin "${WORKDIR}"/c_rehash #333117 + dodoc CHANGES* FAQ NEWS README doc/*.txt doc/c-indentation.el + dohtml -r doc/* + use rfc3779 && dodoc engines/ccgost/README.gost + + # This is crappy in that the static archives are still built even + # when USE=static-libs. But this is due to a failing in the openssl + # build system: the static archives are built as PIC all the time. + # Only way around this would be to manually configure+compile openssl + # twice; once with shared lib support enabled and once without. + use static-libs || rm -f "${D}"/usr/lib*/lib*.a + + # create the certs directory + dodir ${SSL_CNF_DIR}/certs + cp -RP certs/* "${D}"${SSL_CNF_DIR}/certs/ || die + rm -r "${D}"${SSL_CNF_DIR}/certs/{demo,expired} + + # Namespace openssl programs to prevent conflicts with other man pages + cd "${D}"/usr/share/man + local m d s + for m in $(find . -type f | xargs grep -L '#include') ; do + d=${m%/*} ; d=${d#./} ; m=${m##*/} + [[ ${m} == openssl.1* ]] && continue + [[ -n $(find -L ${d} -type l) ]] && die "erp, broken links already!" + mv ${d}/{,ssl-}${m} + # fix up references to renamed man pages + sed -i '/^[.]SH "SEE ALSO"/,/^[.]/s:\([^(, ]*(1)\):ssl-\1:g' ${d}/ssl-${m} + ln -s ssl-${m} ${d}/openssl-${m} + # locate any symlinks that point to this man page ... we assume + # that any broken links are due to the above renaming + for s in $(find -L ${d} -type l) ; do + s=${s##*/} + rm -f ${d}/${s} + ln -s ssl-${m} ${d}/ssl-${s} + ln -s ssl-${s} ${d}/openssl-${s} + done + done + [[ -n $(find -L ${d} -type l) ]] && die "broken manpage links found :(" + + dodir /etc/sandbox.d #254521 + echo 'SANDBOX_PREDICT="/dev/crypto"' > "${D}"/etc/sandbox.d/10openssl + + diropts -m0700 + keepdir ${SSL_CNF_DIR}/private +} + +pkg_preinst() { + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} + +pkg_postinst() { + ebegin "Running 'c_rehash ${ROOT%/}${SSL_CNF_DIR}/certs/' to rebuild hashes #333069" + c_rehash "${ROOT%/}${SSL_CNF_DIR}/certs" >/dev/null + eend $? + + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1b.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1b.ebuild new file mode 100644 index 0000000000..c813c87fe0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1b.ebuild @@ -0,0 +1,221 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-1.0.1b.ebuild,v 1.3 2012/05/25 17:41:49 vapier Exp $ + +EAPI="4" + +inherit eutils flag-o-matic toolchain-funcs multilib + +REV="1.7" +DESCRIPTION="full-strength general purpose cryptography library (including SSL v2/v3 and TLS v1)" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz + http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/~checkout~/packages/${PN}/${PN}-c_rehash.sh?rev=${REV} -> ${PN}-c_rehash.sh.${REV}" + +LICENSE="openssl" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos rfc3779 sse2 static-libs test vanilla zlib" + +# Have the sub-libs in RDEPEND with [static-libs] since, logically, +# our libssl.a depends on libz.a/etc... at runtime. +LIB_DEPEND="gmp? ( dev-libs/gmp[static-libs(+)] ) + zlib? ( sys-libs/zlib[static-libs(+)] ) + kerberos? ( app-crypt/mit-krb5 )" +# The blocks are temporary just to make sure people upgrade to a +# version that lack runtime version checking. We'll drop them in +# the future. +RDEPEND="static-libs? ( ${LIB_DEPEND} ) + !static-libs? ( ${LIB_DEPEND//\[static-libs(+)]} ) + ! "${WORKDIR}"/c_rehash || die #416717 +} + +src_prepare() { + # Make sure we only ever touch Makefile.org and avoid patching a file + # that gets blown away anyways by the Configure script in src_configure + rm -f Makefile + + if ! use vanilla ; then + epatch "${FILESDIR}"/${PN}-1.0.0a-ldflags.patch #327421 + epatch "${FILESDIR}"/${PN}-1.0.0d-fbsd-amd64.patch #363089 + epatch "${FILESDIR}"/${PN}-1.0.0d-windres.patch #373743 + epatch "${FILESDIR}"/${PN}-1.0.0h-pkg-config.patch + epatch "${FILESDIR}"/${PN}-1.0.1-parallel-build.patch + epatch "${FILESDIR}"/${PN}-1.0.1-x32.patch + epatch "${FILESDIR}"/${PN}-1.0.1-ipv6.patch + epatch_user #332661 + fi + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile.org \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-1.0.0 gentoo.config || die + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags $(test-flags-CC -Wa,--noexecstack) + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + unset CROSS_COMPILE #311473 + + tc-export CC AR RANLIB RC + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl rfc3779) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=${SSL_CNF_DIR} \ + --libdir=$(get_libdir) \ + shared threads \ + || die + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts; it also doesn't matter + # that it's -j1 as the code itself serializes subdirs + emake -j1 depend + emake all + # rehash is needed to prep the certs/ dir; do this + # separately to avoid parallel build issues. + emake rehash +} + +src_test() { + emake -j1 test +} + +src_install() { + emake INSTALL_PREFIX="${D}" install + dobin "${WORKDIR}"/c_rehash #333117 + dodoc CHANGES* FAQ NEWS README doc/*.txt doc/c-indentation.el + dohtml -r doc/* + use rfc3779 && dodoc engines/ccgost/README.gost + + # This is crappy in that the static archives are still built even + # when USE=static-libs. But this is due to a failing in the openssl + # build system: the static archives are built as PIC all the time. + # Only way around this would be to manually configure+compile openssl + # twice; once with shared lib support enabled and once without. + use static-libs || rm -f "${D}"/usr/lib*/lib*.a + + # create the certs directory + dodir ${SSL_CNF_DIR}/certs + cp -RP certs/* "${D}"${SSL_CNF_DIR}/certs/ || die + rm -r "${D}"${SSL_CNF_DIR}/certs/{demo,expired} + + # Namespace openssl programs to prevent conflicts with other man pages + cd "${D}"/usr/share/man + local m d s + for m in $(find . -type f | xargs grep -L '#include') ; do + d=${m%/*} ; d=${d#./} ; m=${m##*/} + [[ ${m} == openssl.1* ]] && continue + [[ -n $(find -L ${d} -type l) ]] && die "erp, broken links already!" + mv ${d}/{,ssl-}${m} + # fix up references to renamed man pages + sed -i '/^[.]SH "SEE ALSO"/,/^[.]/s:\([^(, ]*(1)\):ssl-\1:g' ${d}/ssl-${m} + ln -s ssl-${m} ${d}/openssl-${m} + # locate any symlinks that point to this man page ... we assume + # that any broken links are due to the above renaming + for s in $(find -L ${d} -type l) ; do + s=${s##*/} + rm -f ${d}/${s} + ln -s ssl-${m} ${d}/ssl-${s} + ln -s ssl-${s} ${d}/openssl-${s} + done + done + [[ -n $(find -L ${d} -type l) ]] && die "broken manpage links found :(" + + dodir /etc/sandbox.d #254521 + echo 'SANDBOX_PREDICT="/dev/crypto"' > "${D}"/etc/sandbox.d/10openssl + + diropts -m0700 + keepdir ${SSL_CNF_DIR}/private +} + +pkg_preinst() { + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} + +pkg_postinst() { + ebegin "Running 'c_rehash ${ROOT%/}${SSL_CNF_DIR}/certs/' to rebuild hashes #333069" + c_rehash "${ROOT%/}${SSL_CNF_DIR}/certs" >/dev/null + eend $? + + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1c.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1c.ebuild new file mode 100644 index 0000000000..5d054eda3f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/openssl/openssl-1.0.1c.ebuild @@ -0,0 +1,221 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/dev-libs/openssl/openssl-1.0.1c.ebuild,v 1.10 2013/02/03 23:44:01 ago Exp $ + +EAPI="4" + +inherit eutils flag-o-matic toolchain-funcs multilib + +REV="1.7" +DESCRIPTION="full-strength general purpose cryptography library (including SSL v2/v3 and TLS v1)" +HOMEPAGE="http://www.openssl.org/" +SRC_URI="mirror://openssl/source/${P}.tar.gz + http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/~checkout~/packages/${PN}/${PN}-c_rehash.sh?rev=${REV} -> ${PN}-c_rehash.sh.${REV}" + +LICENSE="openssl" +SLOT="0" +KEYWORDS="~alpha amd64 arm hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh ~sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd" +IUSE="bindist gmp kerberos rfc3779 sse2 static-libs test vanilla zlib" + +# Have the sub-libs in RDEPEND with [static-libs] since, logically, +# our libssl.a depends on libz.a/etc... at runtime. +LIB_DEPEND="gmp? ( dev-libs/gmp[static-libs(+)] ) + zlib? ( sys-libs/zlib[static-libs(+)] ) + kerberos? ( app-crypt/mit-krb5 )" +# The blocks are temporary just to make sure people upgrade to a +# version that lack runtime version checking. We'll drop them in +# the future. +RDEPEND="static-libs? ( ${LIB_DEPEND} ) + !static-libs? ( ${LIB_DEPEND//\[static-libs(+)]} ) + ! "${WORKDIR}"/c_rehash || die #416717 +} + +src_prepare() { + # Make sure we only ever touch Makefile.org and avoid patching a file + # that gets blown away anyways by the Configure script in src_configure + rm -f Makefile + + if ! use vanilla ; then + epatch "${FILESDIR}"/${PN}-1.0.0a-ldflags.patch #327421 + epatch "${FILESDIR}"/${PN}-1.0.0d-fbsd-amd64.patch #363089 + epatch "${FILESDIR}"/${PN}-1.0.0d-windres.patch #373743 + epatch "${FILESDIR}"/${PN}-1.0.0h-pkg-config.patch + epatch "${FILESDIR}"/${PN}-1.0.1-parallel-build.patch + epatch "${FILESDIR}"/${PN}-1.0.1-x32.patch + epatch "${FILESDIR}"/${PN}-1.0.1-ipv6.patch + epatch_user #332661 + fi + + # disable fips in the build + # make sure the man pages are suffixed #302165 + # don't bother building man pages if they're disabled + sed -i \ + -e '/DIRS/s: fips : :g' \ + -e '/^MANSUFFIX/s:=.*:=ssl:' \ + -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \ + -e $(has noman FEATURES \ + && echo '/^install:/s:install_docs::' \ + || echo '/^MANDIR=/s:=.*:=/usr/share/man:') \ + Makefile.org \ + || die + # show the actual commands in the log + sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared + + # allow openssl to be cross-compiled + cp "${FILESDIR}"/gentoo.config-1.0.0 gentoo.config || die + chmod a+rx gentoo.config + + append-flags -fno-strict-aliasing + append-flags $(test-flags-CC -Wa,--noexecstack) + + sed -i '1s,^:$,#!/usr/bin/perl,' Configure #141906 + ./config --test-sanity || die "I AM NOT SANE" +} + +src_configure() { + unset APPS #197996 + unset SCRIPTS #312551 + unset CROSS_COMPILE #311473 + + tc-export CC AR RANLIB RC + + # Clean out patent-or-otherwise-encumbered code + # Camellia: Royalty Free http://en.wikipedia.org/wiki/Camellia_(cipher) + # IDEA: Expired http://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm + # EC: ????????? ??/??/2015 http://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography + # MDC2: Expired http://en.wikipedia.org/wiki/MDC-2 + # RC5: 5,724,428 03/03/2015 http://en.wikipedia.org/wiki/RC5 + + use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; } + echoit() { echo "$@" ; "$@" ; } + + local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal") + + local sslout=$(./gentoo.config) + einfo "Use configuration ${sslout:-(openssl knows best)}" + local config="Configure" + [[ -z ${sslout} ]] && config="config" + echoit \ + ./${config} \ + ${sslout} \ + $(use sse2 || echo "no-sse2") \ + enable-camellia \ + $(use_ssl !bindist ec) \ + enable-idea \ + enable-mdc2 \ + $(use_ssl !bindist rc5) \ + enable-tlsext \ + $(use_ssl gmp gmp -lgmp) \ + $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \ + $(use_ssl rfc3779) \ + $(use_ssl zlib) \ + --prefix=/usr \ + --openssldir=${SSL_CNF_DIR} \ + --libdir=$(get_libdir) \ + shared threads \ + || die + + # Clean out hardcoded flags that openssl uses + local CFLAG=$(grep ^CFLAG= Makefile | LC_ALL=C sed \ + -e 's:^CFLAG=::' \ + -e 's:-fomit-frame-pointer ::g' \ + -e 's:-O[0-9] ::g' \ + -e 's:-march=[-a-z0-9]* ::g' \ + -e 's:-mcpu=[-a-z0-9]* ::g' \ + -e 's:-m[a-z0-9]* ::g' \ + ) + sed -i \ + -e "/^CFLAG/s|=.*|=${CFLAG} ${CFLAGS}|" \ + -e "/^SHARED_LDFLAGS=/s|$| ${LDFLAGS}|" \ + Makefile || die +} + +src_compile() { + # depend is needed to use $confopts; it also doesn't matter + # that it's -j1 as the code itself serializes subdirs + emake -j1 depend + emake all + # rehash is needed to prep the certs/ dir; do this + # separately to avoid parallel build issues. + emake rehash +} + +src_test() { + emake -j1 test +} + +src_install() { + emake INSTALL_PREFIX="${D}" install + dobin "${WORKDIR}"/c_rehash #333117 + dodoc CHANGES* FAQ NEWS README doc/*.txt doc/c-indentation.el + dohtml -r doc/* + use rfc3779 && dodoc engines/ccgost/README.gost + + # This is crappy in that the static archives are still built even + # when USE=static-libs. But this is due to a failing in the openssl + # build system: the static archives are built as PIC all the time. + # Only way around this would be to manually configure+compile openssl + # twice; once with shared lib support enabled and once without. + use static-libs || rm -f "${D}"/usr/lib*/lib*.a + + # create the certs directory + dodir ${SSL_CNF_DIR}/certs + cp -RP certs/* "${D}"${SSL_CNF_DIR}/certs/ || die + rm -r "${D}"${SSL_CNF_DIR}/certs/{demo,expired} + + # Namespace openssl programs to prevent conflicts with other man pages + cd "${D}"/usr/share/man + local m d s + for m in $(find . -type f | xargs grep -L '#include') ; do + d=${m%/*} ; d=${d#./} ; m=${m##*/} + [[ ${m} == openssl.1* ]] && continue + [[ -n $(find -L ${d} -type l) ]] && die "erp, broken links already!" + mv ${d}/{,ssl-}${m} + # fix up references to renamed man pages + sed -i '/^[.]SH "SEE ALSO"/,/^[.]/s:\([^(, ]*(1)\):ssl-\1:g' ${d}/ssl-${m} + ln -s ssl-${m} ${d}/openssl-${m} + # locate any symlinks that point to this man page ... we assume + # that any broken links are due to the above renaming + for s in $(find -L ${d} -type l) ; do + s=${s##*/} + rm -f ${d}/${s} + ln -s ssl-${m} ${d}/ssl-${s} + ln -s ssl-${s} ${d}/openssl-${s} + done + done + [[ -n $(find -L ${d} -type l) ]] && die "broken manpage links found :(" + + dodir /etc/sandbox.d #254521 + echo 'SANDBOX_PREDICT="/dev/crypto"' > "${D}"/etc/sandbox.d/10openssl + + diropts -m0700 + keepdir ${SSL_CNF_DIR}/private +} + +pkg_preinst() { + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +} + +pkg_postinst() { + ebegin "Running 'c_rehash ${ROOT%/}${SSL_CNF_DIR}/certs/' to rebuild hashes #333069" + c_rehash "${ROOT%/}${SSL_CNF_DIR}/certs" >/dev/null + eend $? + + has_version ${CATEGORY}/${PN}:0.9.8 && return 0 + preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}.so.0.9.8 +}