Date: Saturday, February 16, 2013 @ 21:37:42 Author: pierre Revision: 84338
upgpkg: lib32-openssl 1.0.1.e-2 Modified: lib32-openssl/trunk/PKGBUILD ----------+ PKGBUILD | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) Modified: PKGBUILD =================================================================== --- PKGBUILD 2013-02-16 20:27:53 UTC (rev 84337) +++ PKGBUILD 2013-02-16 20:37:42 UTC (rev 84338) @@ -7,7 +7,7 @@ # use a pacman compatible version scheme pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}} #pkgver=$_ver -pkgrel=1 +pkgrel=2 pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security (32-bit)' arch=('x86_64') url='https://www.openssl.org' @@ -37,11 +37,13 @@ # set ca dir to /etc/ssl by default patch -p0 -i $srcdir/ca-dir.patch # mark stack as non-executable: http://bugs.archlinux.org/task/12434 - # workaround for https://rt.openssl.org/Ticket/Display.html?id=2771: OPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 + # workaround for https://rt.openssl.org/Ticket/Display.html?id=2771 + # See Changes file "Changes between 1.0.1 and 1.0.1a [19 Apr 2012]" ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib32 \ shared zlib enable-md2 \ linux-elf \ -Wa,--noexecstack "${CFLAGS}" "${LDFLAGS}" \ + -DOPENSSL_NO_TLS1_2_CLIENT \ -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 make MAKEDEPPROG="${CC}" depend @@ -53,6 +55,8 @@ # the test fails due to missing write permissions in /etc/ssl # revert this patch for make test patch -p0 -R -i $srcdir/ca-dir.patch + # Do not test TLS1.2 as we disabled it above using OPENSSL_NO_TLS1_2_CLIENT + sed 's/TLSv1.2 //g' -i test/testssl make test patch -p0 -i $srcdir/ca-dir.patch }