[arch-commits] Commit in openssl/trunk (PKGBUILD)
Pierre Schmitz
pierre at nymeria.archlinux.org
Sat Feb 16 20:31:04 UTC 2013
Date: Saturday, February 16, 2013 @ 21:31:04
Author: pierre
Revision: 178117
Apparently the TLS1.2 workarounds are not exclusive; so enable both
Modified:
openssl/trunk/PKGBUILD
----------+
PKGBUILD | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)
Modified: PKGBUILD
===================================================================
--- PKGBUILD 2013-02-16 16:58:25 UTC (rev 178116)
+++ PKGBUILD 2013-02-16 20:31:04 UTC (rev 178117)
@@ -6,7 +6,7 @@
# use a pacman compatible version scheme
pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}}
#pkgver=$_ver
-pkgrel=1
+pkgrel=2
pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security'
arch=('i686' 'x86_64')
url='https://www.openssl.org'
@@ -41,11 +41,13 @@
patch -p0 -i $srcdir/ca-dir.patch
# mark stack as non-executable: http://bugs.archlinux.org/task/12434
- # workaround for https://rt.openssl.org/Ticket/Display.html?id=2771: OPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50
+ # workaround for https://rt.openssl.org/Ticket/Display.html?id=2771
+ # See Changes file "Changes between 1.0.1 and 1.0.1a [19 Apr 2012]"
./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib \
shared zlib enable-md2 ${optflags} \
"${openssltarget}" \
-Wa,--noexecstack "${CFLAGS}" "${LDFLAGS}" \
+ -DOPENSSL_NO_TLS1_2_CLIENT \
-DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50
make depend
@@ -57,6 +59,8 @@
# the test fails due to missing write permissions in /etc/ssl
# revert this patch for make test
patch -p0 -R -i $srcdir/ca-dir.patch
+ # Do not test TLS1.2 as we disabled it above using OPENSSL_NO_TLS1_2_CLIENT
+ sed 's/TLSv1.2 //g' -i test/testssl
make test
patch -p0 -i $srcdir/ca-dir.patch
}
More information about the arch-commits
mailing list