Date: Saturday, February 16, 2013 @ 21:37:42
  Author: pierre
Revision: 84338

upgpkg: lib32-openssl 1.0.1.e-2

Modified:
  lib32-openssl/trunk/PKGBUILD

----------+
 PKGBUILD |    8 ++++++--
 1 file changed, 6 insertions(+), 2 deletions(-)

Modified: PKGBUILD
===================================================================
--- PKGBUILD    2013-02-16 20:27:53 UTC (rev 84337)
+++ PKGBUILD    2013-02-16 20:37:42 UTC (rev 84338)
@@ -7,7 +7,7 @@
 # use a pacman compatible version scheme
 pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}}
 #pkgver=$_ver
-pkgrel=1
+pkgrel=2
 pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer 
Security (32-bit)'
 arch=('x86_64')
 url='https://www.openssl.org'
@@ -37,11 +37,13 @@
        # set ca dir to /etc/ssl by default
        patch -p0 -i $srcdir/ca-dir.patch
        # mark stack as non-executable: http://bugs.archlinux.org/task/12434
-       # workaround for https://rt.openssl.org/Ticket/Display.html?id=2771: 
OPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50
+       # workaround for https://rt.openssl.org/Ticket/Display.html?id=2771
+       # See Changes file "Changes between 1.0.1 and 1.0.1a [19 Apr 2012]"
        ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib32 \
                shared zlib enable-md2 \
                linux-elf \
                -Wa,--noexecstack "${CFLAGS}" "${LDFLAGS}" \
+               -DOPENSSL_NO_TLS1_2_CLIENT \
                -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50
 
        make MAKEDEPPROG="${CC}" depend
@@ -53,6 +55,8 @@
        # the test fails due to missing write permissions in /etc/ssl
        # revert this patch for make test
        patch -p0 -R -i $srcdir/ca-dir.patch
+       # Do not test TLS1.2 as we disabled it above using 
OPENSSL_NO_TLS1_2_CLIENT
+       sed 's/TLSv1.2 //g' -i test/testssl
        make test
        patch -p0 -i $srcdir/ca-dir.patch
 }

Reply via email to