commit:     ce31fee637176f83f523892cd400753b19b86c5c
Author:     David Seifert <soap <AT> gentoo <DOT> org>
AuthorDate: Mon Feb  9 10:52:57 2026 +0000
Commit:     David Seifert <soap <AT> gentoo <DOT> org>
CommitDate: Mon Feb  9 10:52:57 2026 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ce31fee6

dev-libs/openssl: drop 1.0.2u-r1, 1.1.1w

Signed-off-by: David Seifert <soap <AT> gentoo.org>

 dev-libs/openssl/Manifest                          |   5 -
 .../openssl-1.1.0j-parallel_install_fix.patch      |  21 --
 .../openssl/files/openssl-1.1.1i-riscv32.patch     |  61 -----
 dev-libs/openssl/metadata.xml                      |   4 -
 dev-libs/openssl/openssl-1.0.2u-r1.ebuild          | 303 ---------------------
 dev-libs/openssl/openssl-1.1.1w.ebuild             | 268 ------------------
 profiles/base/package.use.mask                     |   5 -
 profiles/package.mask                              |   8 -
 8 files changed, 675 deletions(-)

diff --git a/dev-libs/openssl/Manifest b/dev-libs/openssl/Manifest
index cf4aa2fa2ec0..f143205832a4 100644
--- a/dev-libs/openssl/Manifest
+++ b/dev-libs/openssl/Manifest
@@ -1,8 +1,3 @@
-DIST openssl-1.0.2-patches-1.5.tar.xz 12404 BLAKE2B 
6c1b8c28f339f539b2ab8643379502a24cf62bffde00041dce54d5dd9e8d2620b181362ee5464b0ab32ba4948e209697bfabadbea2944a409a1009100d298f24
 SHA512 
5725e2d9d1ee8cc074bcef3bed61c71bdab2ff1c114362110c3fb8da11ad5bc8f2ff28e90a293f5f3a5cf96ecda54dffdb7ab3fb3f8b23ef6472250dc3037659
-DIST openssl-1.0.2t-bindist-1.0.tar.xz 13872 BLAKE2B 
b2aade96a6e0ca6209a39e205b1c838de945903fcf959c62cc29ddcd1a0cb360fc5db234df86860a6a4c096f5ecc237611e4c2946b986a5500c24ba93c208ef4
 SHA512 
a48a7efb9b973b865bcc5009d450b428ed6b4b95e4cefe70c51056e47392c8a7bec58215168d8b07712419dc74646c2bd2fd23bcfbba2031376e292249a6b1b6
-DIST openssl-1.0.2u.tar.gz 5355412 BLAKE2B 
b2ff2a10e5851af5aca4093422a9a072c794e87b997263826c1c35910c040f695fac63decac5856cb49399ed03d410f97701d9fd4e1ebfbcacd8f3a74ce8bf57
 SHA512 
c455bb309e20e2c2d47fdc5619c734d107d5c8c38c1409903ce979acc120b0d5fa0312917c0aa0d630e402d092a703d4249643f36078e8528a3cafc9dac6ab32
-DIST openssl-1.1.1w.tar.gz 9893384 BLAKE2B 
2fdba6ca0188928ab2f74e606136afca66cfa0467170fa6298ef160b64ac6fdcad1e81e5dd14013ce0e9921d0f7417edec531cd0beaf1196fec704c2c6d48395
 SHA512 
b4c625fe56a4e690b57b6a011a225ad0cb3af54bd8fb67af77b5eceac55cc7191291d96a660c5b568a08a2fbf62b4612818e7cca1bb95b2b6b4fc649b0552b6d
-DIST openssl-1.1.1w.tar.gz.asc 833 BLAKE2B 
d990be69ed913509d52b78e7473668429d4485adb29ef03e4612dd0cadbac4f04c7289d8e5baf6f397bcedeaac9f802f18fc719964d882ae0514ed1ca16ae277
 SHA512 
0f3d7aa48b1cabf8dd43e8108aeed10a4dffb4f5a244d4da9c86ea358b0c8b90c46da561d21e01c567c2f5035d824ed82ec104aad1776b7f33a1be85990e98ef
 DIST openssl-3.0.18.tar.gz 15348046 BLAKE2B 
2cb9cefecab790f6e857a63e2ade93e1b28fdfab7110e4ed6049c36c7cc2131e88454cb49e70e0802adf6f9317b3f21e950446a9152b58074f9ffb787732716a
 SHA512 
6bdd16f33b83ae2a12777230c4ff00d0595bbc00253ac8c3ac31e1375e818fc74d7f491bd2e507ff33cab9f0498cfb28fa8690f75a98663568d40901523cdf3c
 DIST openssl-3.0.18.tar.gz.asc 833 BLAKE2B 
bfa698106e314bf8800c5bdf9ec892611a91a2bcb006b7e5f52afc5d0af64be65bf8512e042b37d36db041964aa83c17f4b1ee2f22dcb127d4e4665d3b6c9440
 SHA512 
cd4cd8afab68cbe0a5b034039112901cf8a25711c55556681f86b04e47389bcffae85a98f155a517156dd9fb29ceb82f627e371881feb928e887053f145bddfd
 DIST openssl-3.0.19.tar.gz 15280904 BLAKE2B 
0d21fd9037b87c5d22c75e2201208394fa7d6a37ed7a44cc6ae760ab95ff6743a00d26b90141871ba5bd76a56500142df33d04219379e51b6f74e411e9d2b3af
 SHA512 
6e602ac7217e1b4423793ee5c4c10745f70fcde3f9820d6c894ebeedb4f29566e2d0c3c590ae210484dcea4eb53db5bb8dbbfee14bbaca3e147406b1343c3cd7

diff --git a/dev-libs/openssl/files/openssl-1.1.0j-parallel_install_fix.patch 
b/dev-libs/openssl/files/openssl-1.1.0j-parallel_install_fix.patch
deleted file mode 100644
index c837e208cf6a..000000000000
--- a/dev-libs/openssl/files/openssl-1.1.0j-parallel_install_fix.patch
+++ /dev/null
@@ -1,21 +0,0 @@
-https://github.com/openssl/openssl/issues/7679
-
---- a/Configurations/unix-Makefile.tmpl
-+++ b/Configurations/unix-Makefile.tmpl
-@@ -77,8 +77,14 @@
-      # to. You're welcome.
-      sub dependmagic {
-          my $target = shift;
--
--         return "$target: build_generated\n\t\$(MAKE) depend && \$(MAKE) 
_$target\n_$target";
-+                my $magic = <<"_____";
-+$target: build_generated depend
-+               \$(MAKE) _$target
-+_$target
-+_____
-+               # Remove line ending
-+               $magic =~ s|\R$||;
-+               return $magic;
-      }
-      '';
- -}

diff --git a/dev-libs/openssl/files/openssl-1.1.1i-riscv32.patch 
b/dev-libs/openssl/files/openssl-1.1.1i-riscv32.patch
deleted file mode 100644
index c94b0323eb43..000000000000
--- a/dev-libs/openssl/files/openssl-1.1.1i-riscv32.patch
+++ /dev/null
@@ -1,61 +0,0 @@
-From 5b5e2985f355c8e99c196d9ce5d02c15bebadfbc Mon Sep 17 00:00:00 2001
-From: Alistair Francis <[email protected]>
-Date: Thu, 29 Aug 2019 13:56:21 -0700
-Subject: [PATCH] Add support for io_pgetevents_time64 syscall
-
-32-bit architectures that are y2038 safe don't include syscalls that use
-32-bit time_t. Instead these architectures have suffixed syscalls that
-always use a 64-bit time_t. In the case of the io_getevents syscall the
-syscall has been replaced with the io_pgetevents_time64 syscall instead.
-
-This patch changes the io_getevents() function to use the correct
-syscall based on the avaliable syscalls and the time_t size. We will
-only use the new 64-bit time_t syscall if the architecture is using a
-64-bit time_t. This is to avoid having to deal with 32/64-bit
-conversions and relying on a 64-bit timespec struct on 32-bit time_t
-platforms. As of Linux 5.3 there are no 32-bit time_t architectures
-without __NR_io_getevents. In the future if a 32-bit time_t architecture
-wants to use the 64-bit syscalls we can handle the conversion.
-
-This fixes build failures on 32-bit RISC-V.
-
-Signed-off-by: Alistair Francis <[email protected]>
-
-Reviewed-by: Richard Levitte <[email protected]>
-Reviewed-by: Paul Dale <[email protected]>
-(Merged from https://github.com/openssl/openssl/pull/9819)
----
- engines/e_afalg.c | 16 ++++++++++++++++
- 1 file changed, 16 insertions(+)
-
-diff --git a/engines/e_afalg.c b/engines/e_afalg.c
-index dacbe358cb..99516cb1bb 100644
---- a/engines/e_afalg.c
-+++ b/engines/e_afalg.c
-@@ -125,7 +125,23 @@ static ossl_inline int io_getevents(aio_context_t ctx, 
long min, long max,
-                                struct io_event *events,
-                                struct timespec *timeout)
- {
-+#if defined(__NR_io_getevents)
-     return syscall(__NR_io_getevents, ctx, min, max, events, timeout);
-+#elif defined(__NR_io_pgetevents_time64)
-+    /* Let's only support the 64 suffix syscalls for 64-bit time_t.
-+     * This simplifies the code for us as we don't need to use a 64-bit
-+     * version of timespec with a 32-bit time_t and handle converting
-+     * between 64-bit and 32-bit times and check for overflows.
-+     */
-+    if (sizeof(timeout->tv_sec) == 8)
-+        return syscall(__NR_io_pgetevents_time64, ctx, min, max, events, 
timeout, NULL);
-+    else {
-+        errno = ENOSYS;
-+        return -1;
-+    }
-+#else
-+# error "We require either the io_getevents syscall or 
__NR_io_pgetevents_time64."
-+#endif
- }
- 
- static void afalg_waitfd_cleanup(ASYNC_WAIT_CTX *ctx, const void *key,
--- 
-2.26.2
-

diff --git a/dev-libs/openssl/metadata.xml b/dev-libs/openssl/metadata.xml
index a00bd02d7b09..638a3475a9b3 100644
--- a/dev-libs/openssl/metadata.xml
+++ b/dev-libs/openssl/metadata.xml
@@ -6,15 +6,11 @@
                <name>Gentoo Base System</name>
        </maintainer>
        <use>
-               <flag name="bindist">Disable/Restrict EC algorithms (as they 
seem to be patented) -- note: changes the ABI</flag>
                <flag name="fips">Enable FIPS provider</flag>
                <flag name="ktls">Enable support for Kernel implementation of 
TLS (kTLS)</flag>
                <flag name="quic">Enable support for QUIC (RFC 9000); a 
UDP-based protocol intended to replace TCP</flag>
                <flag name="rfc3779">Enable support for RFC 3779 (X.509 
Extensions for IP Addresses and AS Identifiers)</flag>
-               <flag name="sslv2">Support for the old/insecure SSLv2 protocol 
-- note: not required for TLS/https</flag>
-               <flag name="sslv3">Support for the old/insecure SSLv3 protocol 
-- note: not required for TLS/https</flag>
                <flag name="tls-compression">Enable support for discouraged TLS 
compression</flag>
-               <flag name="tls-heartbeat">Enable the Heartbeat Extension in 
TLS and DTLS</flag>
                <flag name="weak-ssl-ciphers">Build support for SSL/TLS ciphers 
that are considered "weak"</flag>
        </use>
        <upstream>

diff --git a/dev-libs/openssl/openssl-1.0.2u-r1.ebuild 
b/dev-libs/openssl/openssl-1.0.2u-r1.ebuild
deleted file mode 100644
index d0c876578deb..000000000000
--- a/dev-libs/openssl/openssl-1.0.2u-r1.ebuild
+++ /dev/null
@@ -1,303 +0,0 @@
-# Copyright 1999-2025 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI="7"
-
-inherit flag-o-matic toolchain-funcs multilib-minimal
-
-# openssl-1.0.2-patches-1.6 contain additional CVE patches
-# which got fixed with this release.
-# Please use 1.7 version number when rolling a new tarball!
-PATCH_SET="openssl-1.0.2-patches-1.5"
-
-MY_P=${P/_/-}
-
-# This patch set is based on the following files from Fedora 25,
-# see https://src.fedoraproject.org/rpms/openssl/blob/25/f/openssl.spec
-# for more details:
-# - hobble-openssl (SOURCE1)
-# - ec_curve.c (SOURCE12) -- MODIFIED
-# - ectest.c (SOURCE13)
-# - openssl-1.1.1-ec-curves.patch (PATCH37) -- MODIFIED
-BINDIST_PATCH_SET="openssl-1.0.2t-bindist-1.0.tar.xz"
-
-DESCRIPTION="full-strength general purpose cryptography library (including SSL 
and TLS)"
-HOMEPAGE="https://openssl-library.org/";
-SRC_URI="mirror://openssl/source/${MY_P}.tar.gz
-       bindist? (
-               mirror://gentoo/bb/${BINDIST_PATCH_SET}
-       )
-       !vanilla? (
-               https://dev.gentoo.org/~chutzpah/dist/${PN}/${PATCH_SET}.tar.xz
-       )"
-
-LICENSE="openssl"
-SLOT="0"
-KEYWORDS="~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 
~sparc x86 ~arm64-macos"
-IUSE="+asm bindist gmp kerberos rfc3779 sctp cpu_flags_x86_sse2 sslv2 +sslv3 
static-libs test tls-compression +tls-heartbeat vanilla"
-RESTRICT="!bindist? ( bindist )
-       !test? ( test )"
-
-RDEPEND=">=app-misc/c_rehash-1.7-r1
-       gmp? ( >=dev-libs/gmp-5.1.3-r1[static-libs(+)?,${MULTILIB_USEDEP}] )
-       kerberos? ( >=app-crypt/mit-krb5-1.11.4[${MULTILIB_USEDEP}] )
-       tls-compression? ( 
>=virtual/zlib-1.2.8-r1:=[static-libs(+)?,${MULTILIB_USEDEP}] )"
-DEPEND="${RDEPEND}"
-BDEPEND="
-       >=dev-lang/perl-5
-       sctp? ( >=net-misc/lksctp-tools-1.0.12 )
-       test? (
-               sys-apps/diffutils
-               app-alternatives/bc
-       )"
-PDEPEND="app-misc/ca-certificates"
-
-S="${WORKDIR}/${MY_P}"
-
-MULTILIB_WRAPPED_HEADERS=(
-       usr/include/openssl/opensslconf.h
-)
-
-src_prepare() {
-       if use bindist; then
-               mv "${WORKDIR}"/bindist-patches/hobble-openssl "${WORKDIR}" || 
die
-               bash "${WORKDIR}"/hobble-openssl || die
-
-               cp -f "${WORKDIR}"/bindist-patches/ec_curve.c "${S}"/crypto/ec/ 
|| die
-               cp -f "${WORKDIR}"/bindist-patches/ectest.c "${S}"/crypto/ec/ 
|| die
-
-               eapply "${WORKDIR}"/bindist-patches/ec-curves.patch
-
-               # Also see the configure parts below:
-               # enable-ec \
-               # $(use_ssl !bindist ec2m) \
-               # $(use_ssl !bindist srp) \
-       fi
-
-       # keep this in sync with app-misc/c_rehash
-       SSL_CNF_DIR="/etc/ssl"
-
-       # Make sure we only ever touch Makefile.org and avoid patching a file
-       # that gets blown away anyways by the Configure script in src_configure
-       rm -f Makefile
-
-       if ! use vanilla ; then
-               eapply "${WORKDIR}"/patch/*.patch
-       fi
-
-       eapply_user
-
-       # disable fips in the build
-       # make sure the man pages are suffixed #302165
-       # don't bother building man pages if they're disabled
-       sed -i \
-               -e '/DIRS/s: fips : :g' \
-               -e '/^MANSUFFIX/s:=.*:=ssl:' \
-               -e '/^MAKEDEPPROG/s:=.*:=$(CC):' \
-               -e $(has noman FEATURES \
-                       && echo '/^install:/s:install_docs::' \
-                       || echo '/^MANDIR=/s:=.*:='${EPREFIX}'/usr/share/man:') 
\
-               Makefile.org \
-               || die
-       # show the actual commands in the log
-       sed -i '/^SET_X/s:=.*:=set -x:' Makefile.shared
-
-       # since we're forcing $(CC) as makedep anyway, just fix
-       # the conditional as always-on
-       # helps clang (#417795), and versioned gcc (#499818)
-       # this breaks build with 1.0.2p, not sure if it is needed anymore
-       #sed -i 's/expr.*MAKEDEPEND.*;/true;/' util/domd || die
-
-       # quiet out unknown driver argument warnings since openssl
-       # doesn't have well-split CFLAGS and we're making it even worse
-       # and 'make depend' uses -Werror for added fun (#417795 again)
-       [[ ${CC} == *clang* ]] && append-flags -Qunused-arguments
-
-       # allow openssl to be cross-compiled
-       cp "${FILESDIR}"/gentoo.config-1.0.2 gentoo.config || die
-       chmod a+rx gentoo.config || die
-
-       append-flags -fno-strict-aliasing
-       append-flags $(test-flags-CC -Wa,--noexecstack)
-       append-cppflags -DOPENSSL_NO_BUF_FREELISTS
-
-       sed -i '1s,^:$,#!'${EPREFIX}'/usr/bin/perl,' Configure #141906
-       # The config script does stupid stuff to prompt the user.  Kill it.
-       sed -i '/stty -icanon min 0 time 50; read waste/d' config || die
-       ./config --test-sanity || die "I AM NOT SANE"
-
-       multilib_copy_sources
-}
-
-multilib_src_configure() {
-       unset APPS #197996
-       unset SCRIPTS #312551
-       unset CROSS_COMPILE #311473
-
-       tc-export CC AR RANLIB RC
-
-       # Clean out patent-or-otherwise-encumbered code
-       # Camellia: Royalty Free            
https://en.wikipedia.org/wiki/Camellia_(cipher)
-       # IDEA:     Expired                 
https://en.wikipedia.org/wiki/International_Data_Encryption_Algorithm
-       # EC:       ????????? ??/??/2015    
https://en.wikipedia.org/wiki/Elliptic_Curve_Cryptography
-       # MDC2:     Expired                 https://en.wikipedia.org/wiki/MDC-2
-       # RC5:      Expired                 https://en.wikipedia.org/wiki/RC5
-
-       use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; }
-       echoit() { echo "$@" ; "$@" ; }
-
-       local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo 
"Heimdal")
-
-       # See if our toolchain supports __uint128_t.  If so, it's 64bit
-       # friendly and can use the nicely optimized code paths, bug #460790.
-       #local ec_nistp_64_gcc_128
-       #
-       # Disable it for now though (bug #469976)
-       # Do NOT re-enable without substantial discussion first!
-       #
-       #echo "__uint128_t i;" > "${T}"/128.c
-       #if ${CC} ${CFLAGS} -c "${T}"/128.c -o /dev/null >&/dev/null ; then
-       #       ec_nistp_64_gcc_128="enable-ec_nistp_64_gcc_128"
-       #fi
-
-       local sslout=$(./gentoo.config)
-       einfo "Use configuration ${sslout:-(openssl knows best)}"
-       local config="Configure"
-       [[ -z ${sslout} ]] && config="config"
-
-       # Fedora hobbled-EC needs 'no-ec2m', 'no-srp'
-       # Make sure user flags don't get added *yet* to avoid duplicated
-       # flags.
-       CFLAGS= LDFLAGS= echoit \
-       ./${config} \
-               ${sslout} \
-               $(use cpu_flags_x86_sse2 || echo "no-sse2") \
-               enable-camellia \
-               enable-ec \
-               $(use_ssl !bindist ec2m) \
-               $(use_ssl !bindist srp) \
-               ${ec_nistp_64_gcc_128} \
-               enable-idea \
-               enable-mdc2 \
-               enable-rc5 \
-               enable-tlsext \
-               $(use_ssl asm) \
-               $(use_ssl gmp gmp -lgmp) \
-               $(use_ssl kerberos krb5 --with-krb5-flavor=${krb5}) \
-               $(use_ssl rfc3779) \
-               $(use_ssl sctp) \
-               $(use_ssl sslv2 ssl2) \
-               $(use_ssl sslv3 ssl3) \
-               $(use_ssl tls-compression zlib) \
-               $(use_ssl tls-heartbeat heartbeats) \
-               --prefix="${EPREFIX}"/usr \
-               --openssldir="${EPREFIX}"${SSL_CNF_DIR} \
-               --libdir=$(get_libdir) \
-               shared threads \
-               || die
-
-       # Clean out hardcoded flags that openssl uses
-       local DEFAULT_CFLAGS=$(grep ^CFLAG= Makefile | LC_ALL=C sed \
-               -e 's:^CFLAG=::' \
-               -e 's:\(^\| \)-fomit-frame-pointer::g' \
-               -e 's:\(^\| \)-O[^ ]*::g' \
-               -e 's:\(^\| \)-march=[^ ]*::g' \
-               -e 's:\(^\| \)-mcpu=[^ ]*::g' \
-               -e 's:\(^\| \)-m[^ ]*::g' \
-               -e 's:^ *::' \
-               -e 's: *$::' \
-               -e 's: \+: :g' \
-               -e 's:\\:\\\\:g'
-       )
-
-       # Now insert clean default flags with user flags
-       sed -i \
-               -e "/^CFLAG/s|=.*|=${DEFAULT_CFLAGS} ${CFLAGS}|" \
-               -e "/^LDFLAGS=/s|=[[:space:]]*$|=${LDFLAGS}|" \
-               Makefile || die
-}
-
-multilib_src_compile() {
-       # depend is needed to use $confopts; it also doesn't matter
-       # that it's -j1 as the code itself serializes subdirs
-       emake -j1 V=1 depend
-       emake all
-       # rehash is needed to prep the certs/ dir; do this
-       # separately to avoid parallel build issues.
-       emake rehash
-}
-
-multilib_src_test() {
-       emake -j1 test
-}
-
-multilib_src_install() {
-       # We need to create $ED/usr on our own to avoid a race condition #665130
-       if [[ ! -d "${ED}/usr" ]]; then
-               # We can only create this directory once
-               mkdir "${ED}"/usr || die
-       fi
-
-       # Only -j1 is supported for the install targets:
-       # 
https://github.com/openssl/openssl/issues/21999#issuecomment-1771150305
-       emake INSTALL_PREFIX="${D}" -j1 install
-
-       # This is crappy in that the static archives are still built even
-       # when USE=static-libs.  But this is due to a failing in the openssl
-       # build system: the static archives are built as PIC all the time.
-       # Only way around this would be to manually configure+compile openssl
-       # twice; once with shared lib support enabled and once without.
-       if ! use static-libs; then
-               rm "${ED}"/usr/$(get_libdir)/lib{crypto,ssl}.a || die
-       fi
-}
-
-multilib_src_install_all() {
-       # openssl installs perl version of c_rehash by default, but
-       # we provide a shell version via app-misc/c_rehash
-       rm "${ED}"/usr/bin/c_rehash || die
-
-       local -a DOCS=( CHANGES* FAQ NEWS README doc/*.txt doc/c-indentation.el 
)
-       einstalldocs
-
-       use rfc3779 && dodoc engines/ccgost/README.gost
-
-       # create the certs directory
-       dodir ${SSL_CNF_DIR}/certs
-       cp -RP certs/* "${ED}"${SSL_CNF_DIR}/certs/ || die
-       rm -r "${ED}"${SSL_CNF_DIR}/certs/{demo,expired}
-
-       # Namespace openssl programs to prevent conflicts with other man pages
-       cd "${ED}"/usr/share/man
-       local m d s
-       for m in $(find . -type f | xargs grep -L '#include') ; do
-               d=${m%/*} ; d=${d#./} ; m=${m##*/}
-               [[ ${m} == openssl.1* ]] && continue
-               [[ -n $(find -L ${d} -type l) ]] && die "erp, broken links 
already!"
-               mv ${d}/{,ssl-}${m}
-               # fix up references to renamed man pages
-               sed -i '/^[.]SH "SEE ALSO"/,/^[.]/s:\([^(, ]*(1)\):ssl-\1:g' 
${d}/ssl-${m}
-               ln -s ssl-${m} ${d}/openssl-${m}
-               # locate any symlinks that point to this man page ... we assume
-               # that any broken links are due to the above renaming
-               for s in $(find -L ${d} -type l) ; do
-                       s=${s##*/}
-                       rm -f ${d}/${s}
-                       ln -s ssl-${m} ${d}/ssl-${s}
-                       ln -s ssl-${s} ${d}/openssl-${s}
-               done
-       done
-       [[ -n $(find -L ${d} -type l) ]] && die "broken manpage links found :("
-
-       dodir /etc/sandbox.d #254521
-       echo 'SANDBOX_PREDICT="/dev/crypto"' > "${ED}"/etc/sandbox.d/10openssl
-
-       diropts -m0700
-       keepdir ${SSL_CNF_DIR}/private
-}
-
-pkg_postinst() {
-       ebegin "Running 'c_rehash ${EROOT}${SSL_CNF_DIR}/certs/' to rebuild 
hashes #333069"
-       c_rehash "${EROOT}${SSL_CNF_DIR}/certs" >/dev/null
-       eend $?
-}

diff --git a/dev-libs/openssl/openssl-1.1.1w.ebuild 
b/dev-libs/openssl/openssl-1.1.1w.ebuild
deleted file mode 100644
index c8826028e092..000000000000
--- a/dev-libs/openssl/openssl-1.1.1w.ebuild
+++ /dev/null
@@ -1,268 +0,0 @@
-# Copyright 1999-2025 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=8
-
-VERIFY_SIG_OPENPGP_KEY_PATH=/usr/share/openpgp-keys/openssl.org.asc
-inherit edo flag-o-matic toolchain-funcs multilib-minimal verify-sig
-
-MY_P=${P/_/-}
-DESCRIPTION="Full-strength general purpose cryptography library (including SSL 
and TLS)"
-HOMEPAGE="https://openssl-library.org/";
-SRC_URI="mirror://openssl/source/${MY_P}.tar.gz
-       verify-sig? ( mirror://openssl/source/${MY_P}.tar.gz.asc )"
-S="${WORKDIR}/${MY_P}"
-
-LICENSE="openssl"
-SLOT="0/1.1" # .so version of libssl/libcrypto
-if [[ ${PV} != *_pre* ]] ; then
-       KEYWORDS="~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 
~riscv ~s390 ~sparc x86 ~arm64-macos ~x64-macos ~x64-solaris"
-fi
-IUSE="+asm rfc3779 sctp cpu_flags_x86_sse2 sslv3 static-libs test 
tls-compression tls-heartbeat vanilla verify-sig weak-ssl-ciphers"
-RESTRICT="!test? ( test )"
-
-RDEPEND="
-       tls-compression? ( 
>=virtual/zlib-1.2.8-r1:=[static-libs(+)?,${MULTILIB_USEDEP}] )"
-DEPEND="${RDEPEND}"
-BDEPEND="
-       >=dev-lang/perl-5
-       sctp? ( >=net-misc/lksctp-tools-1.0.12 )
-       test? (
-               sys-apps/diffutils
-               app-alternatives/bc
-               kernel_linux? ( sys-process/procps )
-       )
-       verify-sig? ( <sec-keys/openpgp-keys-openssl-20240920 )"
-PDEPEND="app-misc/ca-certificates"
-
-# force upgrade to prevent broken login, bug #696950
-RDEPEND+=" !<net-misc/openssh-8.0_p1-r3"
-
-MULTILIB_WRAPPED_HEADERS=(
-       usr/include/openssl/opensslconf.h
-)
-
-PATCHES=(
-       # General patches which are suitable to always apply
-       # If they're Gentoo specific, add to USE=-vanilla logic in src_prepare!
-       "${FILESDIR}"/${PN}-1.1.0j-parallel_install_fix.patch # bug #671602
-       "${FILESDIR}"/${PN}-1.1.1i-riscv32.patch
-)
-
-pkg_setup() {
-       [[ ${MERGE_TYPE} == binary ]] && return
-
-       # must check in pkg_setup; sysctl doesn't work with userpriv!
-       if use test && use sctp; then
-               # test_ssl_new will fail with "Ensure SCTP AUTH chunks are 
enabled in kernel"
-               # if sctp.auth_enable is not enabled.
-               local sctp_auth_status=$(sysctl -n net.sctp.auth_enable 
2>/dev/null)
-               if [[ -z "${sctp_auth_status}" ]] || [[ ${sctp_auth_status} != 
1 ]]; then
-                       die "FEATURES=test with USE=sctp requires 
net.sctp.auth_enable=1!"
-               fi
-       fi
-}
-
-src_unpack() {
-       # Can delete this once test fix patch is dropped
-       if use verify-sig ; then
-               # Needed for downloaded patch (which is unsigned, which is fine)
-               verify-sig_verify_detached "${DISTDIR}"/${MY_P}.tar.gz{,.asc}
-       fi
-
-       default
-}
-
-src_prepare() {
-       # Make sure we only ever touch Makefile.org and avoid patching a file
-       # that gets blown away anyways by the Configure script in src_configure
-       rm -f Makefile
-
-       if ! use vanilla ; then
-               PATCHES+=(
-                       # Add patches which are Gentoo-specific customisations 
here
-               )
-       fi
-
-       default
-
-       if use test && use sctp && has network-sandbox ${FEATURES}; then
-               einfo "Disabling test '80-test_ssl_new.t' which is known to 
fail with FEATURES=network-sandbox ..."
-               rm test/recipes/80-test_ssl_new.t || die
-       fi
-
-       # Test fails depending on kernel configuration, bug #699134
-       rm test/recipes/30-test_afalg.t || die
-
-       # Remove test target when FEATURES=test isn't set
-       if ! use test ; then
-               sed \
-                       -e '/^$config{dirs}/s@ "test",@@' \
-                       -i Configure || die
-       fi
-
-       if use prefix && [[ ${CHOST} == *-solaris* ]] ; then
-               # use GNU ld full option, not to confuse it on Solaris
-               sed -i \
-                       -e 's/-Wl,-M,/-Wl,--version-script=/' \
-                       -e 's/-Wl,-h,/-Wl,--soname=/' \
-                       Configurations/10-main.conf || die
-       fi
-
-       # The config script does stupid stuff to prompt the user.  Kill it.
-       sed -i '/stty -icanon min 0 time 50; read waste/d' config || die
-}
-
-src_configure() {
-       # Keep this in sync with app-misc/c_rehash
-       SSL_CNF_DIR="/etc/ssl"
-
-       # Quiet out unknown driver argument warnings since openssl
-       # doesn't have well-split CFLAGS and we're making it even worse
-       # and 'make depend' uses -Werror for added fun (bug #417795 again)
-       tc-is-clang && append-flags -Qunused-arguments
-
-       # We really, really need to build OpenSSL w/ strict aliasing disabled.
-       # It's filled with violations and it *will* result in miscompiled
-       # code. This has been in the ebuild for > 10 years but even in 2022,
-       # it's still relevant:
-       # - https://github.com/llvm/llvm-project/issues/55255
-       # - https://github.com/openssl/openssl/issues/12247
-       # - https://github.com/openssl/openssl/issues/18225
-       # - 
https://github.com/openssl/openssl/issues/18663#issuecomment-1181478057
-       # Don't remove the no strict aliasing bits below!
-       filter-flags -fstrict-aliasing
-       append-flags -fno-strict-aliasing
-       # The OpenSSL developers don't test with LTO right now, it leads to 
various
-       # warnings/errors (which may or may not be false positives), it's 
considered
-       # unsupported, and it's not tested in CI: 
https://github.com/openssl/openssl/issues/18663.
-       filter-lto
-
-       append-cppflags -DOPENSSL_NO_BUF_FREELISTS
-
-       append-flags $(test-flags-CC -Wa,--noexecstack)
-
-       # bug #197996
-       unset APPS
-       # bug #312551
-       unset SCRIPTS
-       # bug #311473
-       unset CROSS_COMPILE
-
-       tc-export AR CC CXX RANLIB RC
-
-       multilib-minimal_src_configure
-}
-
-multilib_src_configure() {
-       use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; }
-
-       local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo 
"Heimdal")
-
-       # See if our toolchain supports __uint128_t.  If so, it's 64bit
-       # friendly and can use the nicely optimized code paths, bug #460790.
-       #local ec_nistp_64_gcc_128
-       #
-       # Disable it for now though (bug #469976)
-       # Do NOT re-enable without substantial discussion first!
-       #
-       #echo "__uint128_t i;" > "${T}"/128.c
-       #if ${CC} ${CFLAGS} -c "${T}"/128.c -o /dev/null >&/dev/null ; then
-       #       ec_nistp_64_gcc_128="enable-ec_nistp_64_gcc_128"
-       #fi
-
-       local sslout=$(bash "${FILESDIR}/gentoo.config-1.0.4")
-       einfo "Use configuration ${sslout:-(openssl knows best)}"
-       local config=( perl "${S}/Configure" )
-       [[ -z ${sslout} ]] && config=( sh "${S}/config" -v )
-
-       # "disable-deprecated" option breaks too many consumers.
-       # Don't set it without thorough revdeps testing.
-       # Make sure user flags don't get added *yet* to avoid duplicated
-       # flags.
-       local myeconfargs=(
-               ${sslout}
-
-               $(use cpu_flags_x86_sse2 || echo "no-sse2")
-               enable-camellia
-               enable-ec
-               enable-ec2m
-               enable-sm2
-               enable-srp
-               $(use elibc_musl && echo "no-async")
-               ${ec_nistp_64_gcc_128}
-               enable-idea
-               enable-mdc2
-               enable-rc5
-               $(use_ssl sslv3 ssl3)
-               $(use_ssl sslv3 ssl3-method)
-               $(use_ssl asm)
-               $(use_ssl rfc3779)
-               $(use_ssl sctp)
-               $(use test || echo "no-tests")
-               $(use_ssl tls-compression zlib)
-               $(use_ssl tls-heartbeat heartbeats)
-               $(use_ssl weak-ssl-ciphers)
-
-               --prefix="${EPREFIX}"/usr
-               --openssldir="${EPREFIX}"${SSL_CNF_DIR}
-               --libdir=$(get_libdir)
-
-               shared
-               threads
-       )
-
-       edo "${config[@]}" "${myeconfargs[@]}"
-}
-
-multilib_src_compile() {
-       emake all
-}
-
-multilib_src_test() {
-       emake -j1 test
-}
-
-multilib_src_install() {
-       # Only -j1 is supported for the install targets:
-       # 
https://github.com/openssl/openssl/issues/21999#issuecomment-1771150305
-       emake DESTDIR="${D}" -j1 install_sw
-
-       if multilib_is_native_abi; then
-               emake DESTDIR="${D}" -j1 install_ssldirs
-               emake DESTDIR="${D}" DOCDIR='$(INSTALLTOP)'/share/doc/${PF} 
MANSUFFIX=ssl -j1 install_docs
-       fi
-
-       # This is crappy in that the static archives are still built even
-       # when USE=static-libs. But this is due to a failing in the openssl
-       # build system: the static archives are built as PIC all the time.
-       # Only way around this would be to manually configure+compile openssl
-       # twice; once with shared lib support enabled and once without.
-       if ! use static-libs; then
-               rm "${ED}"/usr/$(get_libdir)/lib{crypto,ssl}.a || die
-       fi
-}
-
-multilib_src_install_all() {
-       # openssl installs perl version of c_rehash by default, but
-       # we provide a shell version via app-misc/c_rehash
-       rm "${ED}"/usr/bin/c_rehash || die
-
-       dodoc CHANGES* FAQ NEWS README doc/*.txt doc/${PN}-c-indent.el
-
-       # Create the certs directory
-       keepdir ${SSL_CNF_DIR}/certs
-
-       # bug #254521
-       dodir /etc/sandbox.d
-       echo 'SANDBOX_PREDICT="/dev/crypto"' > "${ED}"/etc/sandbox.d/10openssl
-
-       diropts -m0700
-       keepdir ${SSL_CNF_DIR}/private
-}
-
-pkg_postinst() {
-       ebegin "Running 'openssl rehash ${EROOT}${SSL_CNF_DIR}/certs' to 
rebuild hashes (bug #333069)"
-       openssl rehash "${EROOT}${SSL_CNF_DIR}/certs"
-       eend $?
-}

diff --git a/profiles/base/package.use.mask b/profiles/base/package.use.mask
index 7563aeff3779..aeb3d91610b7 100644
--- a/profiles/base/package.use.mask
+++ b/profiles/base/package.use.mask
@@ -445,11 +445,6 @@ mail-client/thunderbird system-icu
 # obvious.
 net-libs/nodejs lto
 
-# Sam James <[email protected]> (2023-06-29)
-# Insecure old versions of the SSL/TLS protocol.
-net-libs/gnutls sslv2 sslv3
-dev-libs/openssl sslv2 sslv3
-
 # Joonas Niilola <[email protected]> (2023-06-06)
 # Runtime not tested, may require more configuration in the ebuild.
 # Bug: #906509.

diff --git a/profiles/package.mask b/profiles/package.mask
index 7fbf0ba7d068..edd1034a2312 100644
--- a/profiles/package.mask
+++ b/profiles/package.mask
@@ -389,14 +389,6 @@ app-emulation/virtualbox-kvm
 # The symbol versioning "fix" breaks anything built with 3.0.0.
 >=dev-libs/libassuan-3.0.1
 
-# Sam James <[email protected]> (2023-09-09)
-# OpenSSL 1.1.x is EOL on 2023-09-11. Please upgrade immediately to >= OpenSSL 
3.
-# https://www.openssl.org/blog/blog/2023/03/28/1.1.1-EOL/
-# https://www.openssl.org/blog/blog/2023/06/15/1.1.1-EOL-Reminder/
-# Please run a full world upgrade, especially checking /etc/portage and your 
world file
-# for old PHP or Ruby references.
-<dev-libs/openssl-3
-
 # Michał Górny <[email protected]> (2023-06-21)
 # suitesparseconfig-7.0.0 fails to build with multilib enabled
 # because of dependencies that cannot be satisfied.  All the other

Reply via email to