# Based on openssl 1.1.0f PKGBUILD # Maintainer: oneup _basename=openssl pkgname=openssl-zlib _ver=1.1.0f # use a pacman compatible version scheme pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}} #pkgver=$_ver pkgrel=1 pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security' arch=('i686' 'x86_64') url='https://www.openssl.org' license=('custom:BSD') depends=('perl' 'zlib') optdepends=('ca-certificates') backup=('etc/ssl/openssl.cnf') source=("https://www.openssl.org/source/${_basename}-${_ver}.tar.gz" "https://www.openssl.org/source/${_basename}-${_ver}.tar.gz.asc" 'ca-dir.patch' 'fs54205.patch') sha256sums=('12f746f3f2493b2f39da7ecf63d7ee19c6ac9ec6a4fcd8c229da8a522cb12765' 'SKIP' '90c7411fed0157116f2df8f4be755aaf5a26e8484351b4e6a79492805d5f2790' '04de0feaaa81b5fb1c70a00c9f46670eb748f6d6795bd228d613c5f15c92af15') validpgpkeys=('8657ABB260F056B1E5190839D9C4D26D0E604491') provides=('openssl') conflicts=('openssl') prepare() { cd "$srcdir/$_basename-$_ver" # set ca dir to /etc/ssl by default patch -p0 -i "$srcdir/ca-dir.patch" patch -Np1 -i "$srcdir/fs54205.patch" } build() { cd "$srcdir/$_basename-$_ver" if [ "${CARCH}" == 'x86_64' ]; then openssltarget='linux-x86_64' optflags='enable-ec_nistp_64_gcc_128' elif [ "${CARCH}" == 'i686' ]; then openssltarget='linux-elf' optflags='' fi # mark stack as non-executable: http://bugs.archlinux.org/task/12434 ./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib \ shared no-ssl3-method zlib ${optflags} \ "${openssltarget}" \ "-Wa,--noexecstack ${CPPFLAGS} ${CFLAGS} ${LDFLAGS}" make depend make } check() { cd "$srcdir/$_basename-$_ver" # the test fails due to missing write permissions in /etc/ssl # revert this patch for make test patch -p0 -R -i "$srcdir/ca-dir.patch" make test patch -p0 -i "$srcdir/ca-dir.patch" } package() { cd "$srcdir/$_basename-$_ver" make DESTDIR=$pkgdir MANDIR=/usr/share/man MANSUFFIX=ssl install_sw install_ssldirs install_man_docs install -D -m644 LICENSE $pkgdir/usr/share/licenses/$pkgname/LICENSE }