public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Sam James" <sam@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: dev-libs/openssl/
Date: Thu, 16 Jan 2025 15:43:48 +0000 (UTC)	[thread overview]
Message-ID: <1737042203.b21c8891539ba6636a6f0c0ff23a315cbff883c4.sam@gentoo> (raw)

commit:     b21c8891539ba6636a6f0c0ff23a315cbff883c4
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Thu Jan 16 15:42:43 2025 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Thu Jan 16 15:43:23 2025 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=b21c8891

dev-libs/openssl: add 3.0.9999, 3.1.9999, 3.2.9999, 3.3.9999

Add live ebuilds for supported upstream branches to facilitate testing.

Upstream releases are sadly infrequent and often there's many fixes
on the branches. It's useful to be able to check if these fix a problem
reported.

Signed-off-by: Sam James <sam <AT> gentoo.org>

 dev-libs/openssl/openssl-3.0.9999.ebuild | 288 ++++++++++++++++++++++++++++++
 dev-libs/openssl/openssl-3.1.9999.ebuild | 289 ++++++++++++++++++++++++++++++
 dev-libs/openssl/openssl-3.2.9999.ebuild | 295 +++++++++++++++++++++++++++++++
 dev-libs/openssl/openssl-3.3.9999.ebuild | 293 ++++++++++++++++++++++++++++++
 4 files changed, 1165 insertions(+)

diff --git a/dev-libs/openssl/openssl-3.0.9999.ebuild b/dev-libs/openssl/openssl-3.0.9999.ebuild
new file mode 100644
index 000000000000..6d7eefcece55
--- /dev/null
+++ b/dev-libs/openssl/openssl-3.0.9999.ebuild
@@ -0,0 +1,288 @@
+# Copyright 1999-2025 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+VERIFY_SIG_OPENPGP_KEY_PATH=/usr/share/openpgp-keys/openssl.org.asc
+inherit edo flag-o-matic linux-info toolchain-funcs
+inherit multilib multilib-minimal multiprocessing preserve-libs
+
+DESCRIPTION="Robust, full-featured Open Source Toolkit for the Transport Layer Security (TLS)"
+HOMEPAGE="https://openssl-library.org/"
+
+MY_P=${P/_/-}
+
+if [[ ${PV} == *9999 ]] ; then
+	[[ ${PV} == *.*.9999 ]] && EGIT_BRANCH="openssl-${PV%%.9999}"
+	EGIT_REPO_URI="https://github.com/openssl/openssl.git"
+
+	inherit git-r3
+else
+	inherit verify-sig
+	SRC_URI="
+		https://github.com/openssl/openssl/releases/download/${P}/${P}.tar.gz
+		verify-sig? (
+			https://github.com/openssl/openssl/releases/download/${P}/${P}.tar.gz.asc
+		)
+	"
+
+	if [[ ${PV} != *_alpha* && ${PV} != *_beta* ]] ; then
+		KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 ~arm64-macos ~ppc-macos ~x64-macos ~x64-solaris"
+	fi
+
+	BDEPEND="verify-sig? ( >=sec-keys/openpgp-keys-openssl-20240920 )"
+fi
+
+S="${WORKDIR}"/${MY_P}
+
+LICENSE="Apache-2.0"
+SLOT="0/3" # .so version of libssl/libcrypto
+IUSE="+asm cpu_flags_x86_sse2 fips ktls rfc3779 sctp static-libs test tls-compression vanilla weak-ssl-ciphers"
+RESTRICT="!test? ( test )"
+
+COMMON_DEPEND="
+	tls-compression? ( >=sys-libs/zlib-1.2.8-r1[static-libs(+)?,${MULTILIB_USEDEP}] )
+"
+BDEPEND+="
+	>=dev-lang/perl-5
+	sctp? ( >=net-misc/lksctp-tools-1.0.12 )
+	test? (
+		sys-apps/diffutils
+		app-alternatives/bc
+		sys-process/procps
+	)
+"
+DEPEND="${COMMON_DEPEND}"
+RDEPEND="${COMMON_DEPEND}"
+PDEPEND="app-misc/ca-certificates"
+
+MULTILIB_WRAPPED_HEADERS=(
+	/usr/include/openssl/configuration.h
+)
+
+pkg_setup() {
+	if use ktls ; then
+		if kernel_is -lt 4 18 ; then
+			ewarn "Kernel implementation of TLS (USE=ktls) requires kernel >=4.18!"
+		else
+			CONFIG_CHECK="~TLS ~TLS_DEVICE"
+			ERROR_TLS="You will be unable to offload TLS to kernel because CONFIG_TLS is not set!"
+			ERROR_TLS_DEVICE="You will be unable to offload TLS to kernel because CONFIG_TLS_DEVICE is not set!"
+			use test && CONFIG_CHECK+=" ~CRYPTO_USER_API_SKCIPHER"
+
+			linux-info_pkg_setup
+		fi
+	fi
+
+	[[ ${MERGE_TYPE} == binary ]] && return
+
+	# must check in pkg_setup; sysctl doesn't work with userpriv!
+	if use test && use sctp ; then
+		# test_ssl_new will fail with "Ensure SCTP AUTH chunks are enabled in kernel"
+		# if sctp.auth_enable is not enabled.
+		local sctp_auth_status=$(sysctl -n net.sctp.auth_enable 2>/dev/null)
+		if [[ -z "${sctp_auth_status}" ]] || [[ ${sctp_auth_status} != 1 ]] ; then
+			die "FEATURES=test with USE=sctp requires net.sctp.auth_enable=1!"
+		fi
+	fi
+}
+
+src_prepare() {
+	# Make sure we only ever touch Makefile.org and avoid patching a file
+	# that gets blown away anyways by the Configure script in src_configure
+	rm -f Makefile || die
+
+	if ! use vanilla ; then
+		PATCHES+=(
+			# Add patches which are Gentoo-specific customisations here
+		)
+	fi
+
+	default
+
+	if use test && use sctp && has network-sandbox ${FEATURES} ; then
+		einfo "Disabling test '80-test_ssl_new.t' which is known to fail with FEATURES=network-sandbox ..."
+		rm test/recipes/80-test_ssl_new.t || die
+	fi
+
+	# Test fails depending on kernel configuration, bug #699134
+	rm test/recipes/30-test_afalg.t || die
+}
+
+src_configure() {
+	# Keep this in sync with app-misc/c_rehash
+	SSL_CNF_DIR="/etc/ssl"
+
+	# Quiet out unknown driver argument warnings since openssl
+	# doesn't have well-split CFLAGS and we're making it even worse
+	# and 'make depend' uses -Werror for added fun (bug #417795 again)
+	tc-is-clang && append-flags -Qunused-arguments
+
+	# We really, really need to build OpenSSL w/ strict aliasing disabled.
+	# It's filled with violations and it *will* result in miscompiled
+	# code. This has been in the ebuild for > 10 years but even in 2022,
+	# it's still relevant:
+	# - https://github.com/llvm/llvm-project/issues/55255
+	# - https://github.com/openssl/openssl/issues/12247
+	# - https://github.com/openssl/openssl/issues/18225
+	# - https://github.com/openssl/openssl/issues/18663#issuecomment-1181478057
+	# Don't remove the no strict aliasing bits below!
+	filter-flags -fstrict-aliasing
+	append-flags -fno-strict-aliasing
+	# The OpenSSL developers don't test with LTO right now, it leads to various
+	# warnings/errors (which may or may not be false positives), it's considered
+	# unsupported, and it's not tested in CI: https://github.com/openssl/openssl/issues/18663.
+	filter-lto
+
+	append-flags $(test-flags-CC -Wa,--noexecstack)
+
+	# bug #895308
+	append-atomic-flags
+	# Configure doesn't respect LIBS
+	export LDLIBS="${LIBS}"
+
+	# bug #197996
+	unset APPS
+	# bug #312551
+	unset SCRIPTS
+	# bug #311473
+	unset CROSS_COMPILE
+
+	tc-export AR CC CXX RANLIB RC
+
+	multilib-minimal_src_configure
+}
+
+multilib_src_configure() {
+	use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; }
+
+	local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal")
+
+	# See if our toolchain supports __uint128_t.  If so, it's 64bit
+	# friendly and can use the nicely optimized code paths, bug #460790.
+	#local ec_nistp_64_gcc_128
+	#
+	# Disable it for now though (bug #469976)
+	# Do NOT re-enable without substantial discussion first!
+	#
+	#echo "__uint128_t i;" > "${T}"/128.c
+	#if ${CC} ${CFLAGS} -c "${T}"/128.c -o /dev/null >&/dev/null ; then
+	#       ec_nistp_64_gcc_128="enable-ec_nistp_64_gcc_128"
+	#fi
+
+	local sslout=$(bash "${FILESDIR}/gentoo.config-1.0.4")
+	einfo "Using configuration: ${sslout:-(openssl knows best)}"
+
+	# https://github.com/openssl/openssl/blob/master/INSTALL.md#enable-and-disable-features
+	local myeconfargs=(
+		${sslout}
+
+		$(use cpu_flags_x86_sse2 || echo "no-sse2")
+		enable-camellia
+		enable-ec
+		enable-ec2m
+		enable-sm2
+		enable-srp
+		$(use elibc_musl && echo "no-async")
+		enable-idea
+		enable-mdc2
+		enable-rc5
+		$(use fips && echo "enable-fips")
+		$(use_ssl asm)
+		$(use_ssl ktls)
+		$(use_ssl rfc3779)
+		$(use_ssl sctp)
+		$(use test || echo "no-tests")
+		$(use_ssl tls-compression zlib)
+		$(use_ssl weak-ssl-ciphers)
+
+		--prefix="${EPREFIX}"/usr
+		--openssldir="${EPREFIX}"${SSL_CNF_DIR}
+		--libdir=$(get_libdir)
+
+		shared
+		threads
+	)
+
+	edo perl "${S}/Configure" "${myeconfargs[@]}"
+}
+
+multilib_src_compile() {
+	emake build_sw
+
+	if multilib_is_native_abi; then
+		emake build_docs
+	fi
+}
+
+multilib_src_test() {
+	# VFP = show subtests verbosely and show failed tests verbosely
+	# Normal V=1 would show everything verbosely but this slows things down.
+	emake HARNESS_JOBS="$(makeopts_jobs)" -Onone VFP=1 test
+}
+
+multilib_src_install() {
+	# Only -j1 is supported for the install targets:
+	# https://github.com/openssl/openssl/issues/21999#issuecomment-1771150305
+	emake DESTDIR="${D}" -j1 install_sw
+	if use fips; then
+		emake DESTDIR="${D}" -j1 install_fips
+		# Regen this in pkg_preinst, bug 900625
+		rm "${ED}${SSL_CNF_DIR}"/fipsmodule.cnf || die
+	fi
+
+	if multilib_is_native_abi; then
+		emake DESTDIR="${D}" -j1 install_ssldirs
+		emake DESTDIR="${D}" DOCDIR='$(INSTALLTOP)'/share/doc/${PF} -j1 install_docs
+	fi
+
+	# This is crappy in that the static archives are still built even
+	# when USE=static-libs. But this is due to a failing in the openssl
+	# build system: the static archives are built as PIC all the time.
+	# Only way around this would be to manually configure+compile openssl
+	# twice; once with shared lib support enabled and once without.
+	if ! use static-libs ; then
+		rm "${ED}"/usr/$(get_libdir)/lib{crypto,ssl}.a || die
+	fi
+}
+
+multilib_src_install_all() {
+	# openssl installs perl version of c_rehash by default, but
+	# we provide a shell version via app-misc/c_rehash
+	rm "${ED}"/usr/bin/c_rehash || die
+
+	dodoc {AUTHORS,CHANGES,NEWS,README,README-PROVIDERS}.md doc/*.txt doc/${PN}-c-indent.el
+
+	# Create the certs directory
+	keepdir ${SSL_CNF_DIR}/certs
+
+	# bug #254521
+	dodir /etc/sandbox.d
+	echo 'SANDBOX_PREDICT="/dev/crypto"' > "${ED}"/etc/sandbox.d/10openssl
+
+	diropts -m0700
+	keepdir ${SSL_CNF_DIR}/private
+}
+
+pkg_preinst() {
+	if use fips; then
+		# Regen fipsmodule.cnf, bug 900625
+		ebegin "Running openssl fipsinstall"
+		"${ED}/usr/bin/openssl" fipsinstall -quiet \
+			-out "${ED}${SSL_CNF_DIR}/fipsmodule.cnf" \
+			-module "${ED}/usr/$(get_libdir)/ossl-modules/fips.so"
+		eend $?
+	fi
+
+	preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1) \
+		/usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1.1)
+}
+
+pkg_postinst() {
+	ebegin "Running 'openssl rehash ${EROOT}${SSL_CNF_DIR}/certs' to rebuild hashes (bug #333069)"
+	openssl rehash "${EROOT}${SSL_CNF_DIR}/certs"
+	eend $?
+
+	preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1) \
+		/usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1.1)
+}

diff --git a/dev-libs/openssl/openssl-3.1.9999.ebuild b/dev-libs/openssl/openssl-3.1.9999.ebuild
new file mode 100644
index 000000000000..56f9601dd58f
--- /dev/null
+++ b/dev-libs/openssl/openssl-3.1.9999.ebuild
@@ -0,0 +1,289 @@
+# Copyright 1999-2025 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+VERIFY_SIG_OPENPGP_KEY_PATH=/usr/share/openpgp-keys/openssl.org.asc
+inherit edo flag-o-matic linux-info toolchain-funcs
+inherit multilib multilib-minimal multiprocessing preserve-libs
+
+DESCRIPTION="Robust, full-featured Open Source Toolkit for the Transport Layer Security (TLS)"
+HOMEPAGE="https://openssl-library.org/"
+
+MY_P=${P/_/-}
+
+if [[ ${PV} == *9999 ]] ; then
+	[[ ${PV} == *.*.9999 ]] && EGIT_BRANCH="openssl-${PV%%.9999}"
+	EGIT_REPO_URI="https://github.com/openssl/openssl.git"
+
+	inherit git-r3
+else
+	inherit verify-sig
+	SRC_URI="
+		https://github.com/openssl/openssl/releases/download/${P}/${P}.tar.gz
+		verify-sig? (
+			https://github.com/openssl/openssl/releases/download/${P}/${P}.tar.gz.asc
+		)
+	"
+
+	if [[ ${PV} != *_alpha* && ${PV} != *_beta* ]] ; then
+		KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 ~arm64-macos ~ppc-macos ~x64-macos ~x64-solaris"
+	fi
+
+	BDEPEND="verify-sig? ( >=sec-keys/openpgp-keys-openssl-20240920 )"
+fi
+
+S="${WORKDIR}"/${MY_P}
+
+LICENSE="Apache-2.0"
+SLOT="0/$(ver_cut 1)" # .so version of libssl/libcrypto
+IUSE="+asm cpu_flags_x86_sse2 fips ktls rfc3779 sctp static-libs test tls-compression vanilla weak-ssl-ciphers"
+RESTRICT="!test? ( test )"
+
+COMMON_DEPEND="
+	!<net-misc/openssh-9.2_p1-r3
+	tls-compression? ( >=sys-libs/zlib-1.2.8-r1[static-libs(+)?,${MULTILIB_USEDEP}] )
+"
+BDEPEND+="
+	>=dev-lang/perl-5
+	sctp? ( >=net-misc/lksctp-tools-1.0.12 )
+	test? (
+		sys-apps/diffutils
+		app-alternatives/bc
+		sys-process/procps
+	)
+"
+DEPEND="${COMMON_DEPEND}"
+RDEPEND="${COMMON_DEPEND}"
+PDEPEND="app-misc/ca-certificates"
+
+MULTILIB_WRAPPED_HEADERS=(
+	/usr/include/openssl/configuration.h
+)
+
+pkg_setup() {
+	if use ktls ; then
+		if kernel_is -lt 4 18 ; then
+			ewarn "Kernel implementation of TLS (USE=ktls) requires kernel >=4.18!"
+		else
+			CONFIG_CHECK="~TLS ~TLS_DEVICE"
+			ERROR_TLS="You will be unable to offload TLS to kernel because CONFIG_TLS is not set!"
+			ERROR_TLS_DEVICE="You will be unable to offload TLS to kernel because CONFIG_TLS_DEVICE is not set!"
+			use test && CONFIG_CHECK+=" ~CRYPTO_USER_API_SKCIPHER"
+
+			linux-info_pkg_setup
+		fi
+	fi
+
+	[[ ${MERGE_TYPE} == binary ]] && return
+
+	# must check in pkg_setup; sysctl doesn't work with userpriv!
+	if use test && use sctp ; then
+		# test_ssl_new will fail with "Ensure SCTP AUTH chunks are enabled in kernel"
+		# if sctp.auth_enable is not enabled.
+		local sctp_auth_status=$(sysctl -n net.sctp.auth_enable 2>/dev/null)
+		if [[ -z "${sctp_auth_status}" ]] || [[ ${sctp_auth_status} != 1 ]] ; then
+			die "FEATURES=test with USE=sctp requires net.sctp.auth_enable=1!"
+		fi
+	fi
+}
+
+src_prepare() {
+	# Make sure we only ever touch Makefile.org and avoid patching a file
+	# that gets blown away anyways by the Configure script in src_configure
+	rm -f Makefile
+
+	if ! use vanilla ; then
+		PATCHES+=(
+			# Add patches which are Gentoo-specific customisations here
+		)
+	fi
+
+	default
+
+	if use test && use sctp && has network-sandbox ${FEATURES} ; then
+		einfo "Disabling test '80-test_ssl_new.t' which is known to fail with FEATURES=network-sandbox ..."
+		rm test/recipes/80-test_ssl_new.t || die
+	fi
+
+	# Test fails depending on kernel configuration, bug #699134
+	rm test/recipes/30-test_afalg.t || die
+}
+
+src_configure() {
+	# Keep this in sync with app-misc/c_rehash
+	SSL_CNF_DIR="/etc/ssl"
+
+	# Quiet out unknown driver argument warnings since openssl
+	# doesn't have well-split CFLAGS and we're making it even worse
+	# and 'make depend' uses -Werror for added fun (bug #417795 again)
+	tc-is-clang && append-flags -Qunused-arguments
+
+	# We really, really need to build OpenSSL w/ strict aliasing disabled.
+	# It's filled with violations and it *will* result in miscompiled
+	# code. This has been in the ebuild for > 10 years but even in 2022,
+	# it's still relevant:
+	# - https://github.com/llvm/llvm-project/issues/55255
+	# - https://github.com/openssl/openssl/issues/12247
+	# - https://github.com/openssl/openssl/issues/18225
+	# - https://github.com/openssl/openssl/issues/18663#issuecomment-1181478057
+	# Don't remove the no strict aliasing bits below!
+	filter-flags -fstrict-aliasing
+	append-flags -fno-strict-aliasing
+	# The OpenSSL developers don't test with LTO right now, it leads to various
+	# warnings/errors (which may or may not be false positives), it's considered
+	# unsupported, and it's not tested in CI: https://github.com/openssl/openssl/issues/18663.
+	filter-lto
+
+	append-flags $(test-flags-CC -Wa,--noexecstack)
+
+	# bug #895308
+	append-atomic-flags
+	# Configure doesn't respect LIBS
+	export LDLIBS="${LIBS}"
+
+	# bug #197996
+	unset APPS
+	# bug #312551
+	unset SCRIPTS
+	# bug #311473
+	unset CROSS_COMPILE
+
+	tc-export AR CC CXX RANLIB RC
+
+	multilib-minimal_src_configure
+}
+
+multilib_src_configure() {
+	use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; }
+
+	local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal")
+
+	# See if our toolchain supports __uint128_t.  If so, it's 64bit
+	# friendly and can use the nicely optimized code paths, bug #460790.
+	#local ec_nistp_64_gcc_128
+	#
+	# Disable it for now though (bug #469976)
+	# Do NOT re-enable without substantial discussion first!
+	#
+	#echo "__uint128_t i;" > "${T}"/128.c
+	#if ${CC} ${CFLAGS} -c "${T}"/128.c -o /dev/null >&/dev/null ; then
+	#       ec_nistp_64_gcc_128="enable-ec_nistp_64_gcc_128"
+	#fi
+
+	local sslout=$(bash "${FILESDIR}/gentoo.config-1.0.4")
+	einfo "Using configuration: ${sslout:-(openssl knows best)}"
+
+	# https://github.com/openssl/openssl/blob/master/INSTALL.md#enable-and-disable-features
+	local myeconfargs=(
+		${sslout}
+
+		$(use cpu_flags_x86_sse2 || echo "no-sse2")
+		enable-camellia
+		enable-ec
+		enable-ec2m
+		enable-sm2
+		enable-srp
+		$(use elibc_musl && echo "no-async")
+		enable-idea
+		enable-mdc2
+		enable-rc5
+		$(use fips && echo "enable-fips")
+		$(use_ssl asm)
+		$(use_ssl ktls)
+		$(use_ssl rfc3779)
+		$(use_ssl sctp)
+		$(use test || echo "no-tests")
+		$(use_ssl tls-compression zlib)
+		$(use_ssl weak-ssl-ciphers)
+
+		--prefix="${EPREFIX}"/usr
+		--openssldir="${EPREFIX}"${SSL_CNF_DIR}
+		--libdir=$(get_libdir)
+
+		shared
+		threads
+	)
+
+	edo perl "${S}/Configure" "${myeconfargs[@]}"
+}
+
+multilib_src_compile() {
+	emake build_sw
+
+	if multilib_is_native_abi; then
+		emake build_docs
+	fi
+}
+
+multilib_src_test() {
+	# VFP = show subtests verbosely and show failed tests verbosely
+	# Normal V=1 would show everything verbosely but this slows things down.
+	emake HARNESS_JOBS="$(makeopts_jobs)" -Onone VFP=1 test
+}
+
+multilib_src_install() {
+	# Only -j1 is supported for the install targets:
+	# https://github.com/openssl/openssl/issues/21999#issuecomment-1771150305
+	emake DESTDIR="${D}" -j1 install_sw
+	if use fips; then
+		emake DESTDIR="${D}" -j1 install_fips
+		# Regen this in pkg_preinst, bug 900625
+		rm "${ED}${SSL_CNF_DIR}"/fipsmodule.cnf || die
+	fi
+
+	if multilib_is_native_abi; then
+		emake DESTDIR="${D}" -j1 install_ssldirs
+		emake DESTDIR="${D}" DOCDIR='$(INSTALLTOP)'/share/doc/${PF} -j1 install_docs
+	fi
+
+	# This is crappy in that the static archives are still built even
+	# when USE=static-libs. But this is due to a failing in the openssl
+	# build system: the static archives are built as PIC all the time.
+	# Only way around this would be to manually configure+compile openssl
+	# twice; once with shared lib support enabled and once without.
+	if ! use static-libs ; then
+		rm "${ED}"/usr/$(get_libdir)/lib{crypto,ssl}.a || die
+	fi
+}
+
+multilib_src_install_all() {
+	# openssl installs perl version of c_rehash by default, but
+	# we provide a shell version via app-misc/c_rehash
+	rm "${ED}"/usr/bin/c_rehash || die
+
+	dodoc {AUTHORS,CHANGES,NEWS,README,README-PROVIDERS}.md doc/*.txt doc/${PN}-c-indent.el
+
+	# Create the certs directory
+	keepdir ${SSL_CNF_DIR}/certs
+
+	# bug #254521
+	dodir /etc/sandbox.d
+	echo 'SANDBOX_PREDICT="/dev/crypto"' > "${ED}"/etc/sandbox.d/10openssl
+
+	diropts -m0700
+	keepdir ${SSL_CNF_DIR}/private
+}
+
+pkg_preinst() {
+	if use fips; then
+		# Regen fipsmodule.cnf, bug 900625
+		ebegin "Running openssl fipsinstall"
+		"${ED}/usr/bin/openssl" fipsinstall -quiet \
+			-out "${ED}${SSL_CNF_DIR}/fipsmodule.cnf" \
+			-module "${ED}/usr/$(get_libdir)/ossl-modules/fips.so"
+		eend $?
+	fi
+
+	preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1) \
+		/usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1.1)
+}
+
+pkg_postinst() {
+	ebegin "Running 'openssl rehash ${EROOT}${SSL_CNF_DIR}/certs' to rebuild hashes (bug #333069)"
+	openssl rehash "${EROOT}${SSL_CNF_DIR}/certs"
+	eend $?
+
+	preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1) \
+		/usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1.1)
+}

diff --git a/dev-libs/openssl/openssl-3.2.9999.ebuild b/dev-libs/openssl/openssl-3.2.9999.ebuild
new file mode 100644
index 000000000000..162a9453a625
--- /dev/null
+++ b/dev-libs/openssl/openssl-3.2.9999.ebuild
@@ -0,0 +1,295 @@
+# Copyright 1999-2025 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+VERIFY_SIG_OPENPGP_KEY_PATH=/usr/share/openpgp-keys/openssl.org.asc
+inherit edo flag-o-matic linux-info toolchain-funcs
+inherit multilib multilib-minimal multiprocessing preserve-libs
+
+DESCRIPTION="Robust, full-featured Open Source Toolkit for the Transport Layer Security (TLS)"
+HOMEPAGE="https://openssl-library.org/"
+
+MY_P=${P/_/-}
+
+if [[ ${PV} == *9999 ]] ; then
+	[[ ${PV} == *.*.9999 ]] && EGIT_BRANCH="openssl-${PV%%.9999}"
+	EGIT_REPO_URI="https://github.com/openssl/openssl.git"
+
+	inherit git-r3
+else
+	inherit verify-sig
+	SRC_URI="
+		https://github.com/openssl/openssl/releases/download/${P}/${P}.tar.gz
+		verify-sig? (
+			https://github.com/openssl/openssl/releases/download/${P}/${P}.tar.gz.asc
+		)
+	"
+
+	if [[ ${PV} != *_alpha* && ${PV} != *_beta* ]] ; then
+		KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 ~arm64-macos ~ppc-macos ~x64-macos ~x64-solaris"
+	fi
+
+	BDEPEND="verify-sig? ( >=sec-keys/openpgp-keys-openssl-20240920 )"
+fi
+
+S="${WORKDIR}"/${MY_P}
+
+LICENSE="Apache-2.0"
+SLOT="0/$(ver_cut 1)" # .so version of libssl/libcrypto
+IUSE="+asm cpu_flags_x86_sse2 fips ktls rfc3779 sctp static-libs test tls-compression vanilla weak-ssl-ciphers"
+RESTRICT="!test? ( test )"
+
+COMMON_DEPEND="
+	!<net-misc/openssh-9.2_p1-r3
+	tls-compression? ( >=sys-libs/zlib-1.2.8-r1[static-libs(+)?,${MULTILIB_USEDEP}] )
+"
+BDEPEND+="
+	>=dev-lang/perl-5
+	sctp? ( >=net-misc/lksctp-tools-1.0.12 )
+	test? (
+		sys-apps/diffutils
+		app-alternatives/bc
+		sys-process/procps
+	)
+"
+DEPEND="${COMMON_DEPEND}"
+RDEPEND="${COMMON_DEPEND}"
+PDEPEND="app-misc/ca-certificates"
+
+MULTILIB_WRAPPED_HEADERS=(
+	/usr/include/openssl/configuration.h
+)
+
+pkg_setup() {
+	if use ktls ; then
+		if kernel_is -lt 4 18 ; then
+			ewarn "Kernel implementation of TLS (USE=ktls) requires kernel >=4.18!"
+		else
+			CONFIG_CHECK="~TLS ~TLS_DEVICE"
+			ERROR_TLS="You will be unable to offload TLS to kernel because CONFIG_TLS is not set!"
+			ERROR_TLS_DEVICE="You will be unable to offload TLS to kernel because CONFIG_TLS_DEVICE is not set!"
+			use test && CONFIG_CHECK+=" ~CRYPTO_USER_API_SKCIPHER"
+
+			linux-info_pkg_setup
+		fi
+	fi
+
+	[[ ${MERGE_TYPE} == binary ]] && return
+
+	# must check in pkg_setup; sysctl doesn't work with userpriv!
+	if use test && use sctp ; then
+		# test_ssl_new will fail with "Ensure SCTP AUTH chunks are enabled in kernel"
+		# if sctp.auth_enable is not enabled.
+		local sctp_auth_status=$(sysctl -n net.sctp.auth_enable 2>/dev/null)
+		if [[ -z "${sctp_auth_status}" ]] || [[ ${sctp_auth_status} != 1 ]] ; then
+			die "FEATURES=test with USE=sctp requires net.sctp.auth_enable=1!"
+		fi
+	fi
+}
+
+src_prepare() {
+	# Make sure we only ever touch Makefile.org and avoid patching a file
+	# that gets blown away anyways by the Configure script in src_configure
+	rm -f Makefile
+
+	if ! use vanilla ; then
+		PATCHES+=(
+			# Add patches which are Gentoo-specific customisations here
+		)
+	fi
+
+	default
+
+	if use test && use sctp && has network-sandbox ${FEATURES} ; then
+		einfo "Disabling test '80-test_ssl_new.t' which is known to fail with FEATURES=network-sandbox ..."
+		rm test/recipes/80-test_ssl_new.t || die
+	fi
+
+	# Test fails depending on kernel configuration, bug #699134
+	rm test/recipes/30-test_afalg.t || die
+}
+
+src_configure() {
+	# Keep this in sync with app-misc/c_rehash
+	SSL_CNF_DIR="/etc/ssl"
+
+	# Quiet out unknown driver argument warnings since openssl
+	# doesn't have well-split CFLAGS and we're making it even worse
+	# and 'make depend' uses -Werror for added fun (bug #417795 again)
+	tc-is-clang && append-flags -Qunused-arguments
+
+	# We really, really need to build OpenSSL w/ strict aliasing disabled.
+	# It's filled with violations and it *will* result in miscompiled
+	# code. This has been in the ebuild for > 10 years but even in 2022,
+	# it's still relevant:
+	# - https://github.com/llvm/llvm-project/issues/55255
+	# - https://github.com/openssl/openssl/issues/12247
+	# - https://github.com/openssl/openssl/issues/18225
+	# - https://github.com/openssl/openssl/issues/18663#issuecomment-1181478057
+	# Don't remove the no strict aliasing bits below!
+	filter-flags -fstrict-aliasing
+	append-flags -fno-strict-aliasing
+	# The OpenSSL developers don't test with LTO right now, it leads to various
+	# warnings/errors (which may or may not be false positives), it's considered
+	# unsupported, and it's not tested in CI: https://github.com/openssl/openssl/issues/18663.
+	filter-lto
+
+	append-flags $(test-flags-CC -Wa,--noexecstack)
+
+	# bug #895308 -- check inserts GNU ld-compatible arguments
+	[[ ${CHOST} == *-darwin* ]] || append-atomic-flags
+	# Configure doesn't respect LIBS
+	export LDLIBS="${LIBS}"
+
+	# bug #197996
+	unset APPS
+	# bug #312551
+	unset SCRIPTS
+	# bug #311473
+	unset CROSS_COMPILE
+
+	tc-export AR CC CXX RANLIB RC
+
+	multilib-minimal_src_configure
+}
+
+multilib_src_configure() {
+	use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; }
+
+	local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal")
+
+	# See if our toolchain supports __uint128_t.  If so, it's 64bit
+	# friendly and can use the nicely optimized code paths, bug #460790.
+	#local ec_nistp_64_gcc_128
+	#
+	# Disable it for now though (bug #469976)
+	# Do NOT re-enable without substantial discussion first!
+	#
+	#echo "__uint128_t i;" > "${T}"/128.c
+	#if ${CC} ${CFLAGS} -c "${T}"/128.c -o /dev/null >&/dev/null ; then
+	#       ec_nistp_64_gcc_128="enable-ec_nistp_64_gcc_128"
+	#fi
+
+	local sslout=$(bash "${FILESDIR}/gentoo.config-1.0.4")
+	einfo "Using configuration: ${sslout:-(openssl knows best)}"
+
+	# https://github.com/openssl/openssl/blob/master/INSTALL.md#enable-and-disable-features
+	local myeconfargs=(
+		${sslout}
+
+		$(use cpu_flags_x86_sse2 || echo "no-sse2")
+		enable-camellia
+		enable-ec
+		enable-ec2m
+		enable-sm2
+		enable-srp
+		$(use elibc_musl && echo "no-async")
+		enable-idea
+		enable-mdc2
+		enable-rc5
+		$(use fips && echo "enable-fips")
+		$(use_ssl asm)
+		$(use_ssl ktls)
+		$(use_ssl rfc3779)
+		$(use_ssl sctp)
+		$(use test || echo "no-tests")
+		$(use_ssl tls-compression zlib)
+		$(use_ssl weak-ssl-ciphers)
+
+		--prefix="${EPREFIX}"/usr
+		--openssldir="${EPREFIX}"${SSL_CNF_DIR}
+		--libdir=$(get_libdir)
+
+		shared
+		threads
+	)
+
+	edo perl "${S}/Configure" "${myeconfargs[@]}"
+}
+
+multilib_src_compile() {
+	emake build_sw
+
+	if multilib_is_native_abi; then
+		emake build_docs
+	fi
+}
+
+multilib_src_test() {
+	# See https://github.com/openssl/openssl/blob/master/test/README.md for options.
+	#
+	# VFP = show subtests verbosely and show failed tests verbosely
+	# Normal V=1 would show everything verbosely but this slows things down.
+	#
+	# -j1 here for https://github.com/openssl/openssl/issues/21999, but it
+	# shouldn't matter as tests were already built earlier, and HARNESS_JOBS
+	# controls running the tests.
+	emake -Onone -j1 HARNESS_JOBS="$(makeopts_jobs)" VFP=1 test
+}
+
+multilib_src_install() {
+	# Only -j1 is supported for the install targets:
+	# https://github.com/openssl/openssl/issues/21999#issuecomment-1771150305
+	emake DESTDIR="${D}" -j1 install_sw
+	if use fips; then
+		emake DESTDIR="${D}" -j1 install_fips
+		# Regen this in pkg_preinst, bug 900625
+		rm "${ED}${SSL_CNF_DIR}"/fipsmodule.cnf || die
+	fi
+
+	if multilib_is_native_abi; then
+		emake DESTDIR="${D}" -j1 install_ssldirs
+		emake DESTDIR="${D}" DOCDIR='$(INSTALLTOP)'/share/doc/${PF} -j1 install_docs
+	fi
+
+	# This is crappy in that the static archives are still built even
+	# when USE=static-libs. But this is due to a failing in the openssl
+	# build system: the static archives are built as PIC all the time.
+	# Only way around this would be to manually configure+compile openssl
+	# twice; once with shared lib support enabled and once without.
+	if ! use static-libs ; then
+		rm "${ED}"/usr/$(get_libdir)/lib{crypto,ssl}.a || die
+	fi
+}
+
+multilib_src_install_all() {
+	# openssl installs perl version of c_rehash by default, but
+	# we provide a shell version via app-misc/c_rehash
+	rm "${ED}"/usr/bin/c_rehash || die
+
+	dodoc {AUTHORS,CHANGES,NEWS,README,README-PROVIDERS}.md doc/*.txt doc/${PN}-c-indent.el
+
+	# Create the certs directory
+	keepdir ${SSL_CNF_DIR}/certs
+
+	# bug #254521
+	dodir /etc/sandbox.d
+	echo 'SANDBOX_PREDICT="/dev/crypto"' > "${ED}"/etc/sandbox.d/10openssl
+
+	diropts -m0700
+	keepdir ${SSL_CNF_DIR}/private
+}
+
+pkg_preinst() {
+	if use fips; then
+		# Regen fipsmodule.cnf, bug 900625
+		ebegin "Running openssl fipsinstall"
+		"${ED}/usr/bin/openssl" fipsinstall -quiet \
+			-out "${ED}${SSL_CNF_DIR}/fipsmodule.cnf" \
+			-module "${ED}/usr/$(get_libdir)/ossl-modules/fips.so"
+		eend $?
+	fi
+
+	preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1) \
+		/usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1.1)
+}
+
+pkg_postinst() {
+	ebegin "Running 'openssl rehash ${EROOT}${SSL_CNF_DIR}/certs' to rebuild hashes (bug #333069)"
+	openssl rehash "${EROOT}${SSL_CNF_DIR}/certs"
+	eend $?
+
+	preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1) \
+		/usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1.1)
+}

diff --git a/dev-libs/openssl/openssl-3.3.9999.ebuild b/dev-libs/openssl/openssl-3.3.9999.ebuild
new file mode 100644
index 000000000000..41de3131f213
--- /dev/null
+++ b/dev-libs/openssl/openssl-3.3.9999.ebuild
@@ -0,0 +1,293 @@
+# Copyright 1999-2025 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+VERIFY_SIG_OPENPGP_KEY_PATH=/usr/share/openpgp-keys/openssl.org.asc
+inherit edo flag-o-matic linux-info toolchain-funcs
+inherit multilib multilib-minimal multiprocessing preserve-libs
+
+DESCRIPTION="Robust, full-featured Open Source Toolkit for the Transport Layer Security (TLS)"
+HOMEPAGE="https://openssl-library.org/"
+
+MY_P=${P/_/-}
+
+if [[ ${PV} == *9999 ]] ; then
+	[[ ${PV} == *.*.9999 ]] && EGIT_BRANCH="openssl-${PV%%.9999}"
+	EGIT_REPO_URI="https://github.com/openssl/openssl.git"
+
+	inherit git-r3
+else
+	inherit verify-sig
+	SRC_URI="
+		https://github.com/openssl/openssl/releases/download/${P}/${P}.tar.gz
+		verify-sig? (
+			https://github.com/openssl/openssl/releases/download/${P}/${P}.tar.gz.asc
+		)
+	"
+
+	if [[ ${PV} != *_alpha* && ${PV} != *_beta* ]] ; then
+		KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 ~arm64-macos ~ppc-macos ~x64-macos ~x64-solaris"
+	fi
+
+	BDEPEND="verify-sig? ( >=sec-keys/openpgp-keys-openssl-20240920 )"
+fi
+
+S="${WORKDIR}"/${MY_P}
+
+LICENSE="Apache-2.0"
+SLOT="0/$(ver_cut 1)" # .so version of libssl/libcrypto
+IUSE="+asm cpu_flags_x86_sse2 fips ktls +quic rfc3779 sctp static-libs test tls-compression vanilla weak-ssl-ciphers"
+RESTRICT="!test? ( test )"
+
+COMMON_DEPEND="
+	!<net-misc/openssh-9.2_p1-r3
+	tls-compression? ( >=sys-libs/zlib-1.2.8-r1[static-libs(+)?,${MULTILIB_USEDEP}] )
+"
+BDEPEND+="
+	>=dev-lang/perl-5
+	sctp? ( >=net-misc/lksctp-tools-1.0.12 )
+	test? (
+		sys-apps/diffutils
+		app-alternatives/bc
+		sys-process/procps
+	)
+"
+DEPEND="${COMMON_DEPEND}"
+RDEPEND="${COMMON_DEPEND}"
+PDEPEND="app-misc/ca-certificates"
+
+MULTILIB_WRAPPED_HEADERS=(
+	/usr/include/openssl/configuration.h
+)
+
+pkg_setup() {
+	if use ktls ; then
+		if kernel_is -lt 4 18 ; then
+			ewarn "Kernel implementation of TLS (USE=ktls) requires kernel >=4.18!"
+		else
+			CONFIG_CHECK="~TLS ~TLS_DEVICE"
+			ERROR_TLS="You will be unable to offload TLS to kernel because CONFIG_TLS is not set!"
+			ERROR_TLS_DEVICE="You will be unable to offload TLS to kernel because CONFIG_TLS_DEVICE is not set!"
+			use test && CONFIG_CHECK+=" ~CRYPTO_USER_API_SKCIPHER"
+
+			linux-info_pkg_setup
+		fi
+	fi
+
+	[[ ${MERGE_TYPE} == binary ]] && return
+
+	# must check in pkg_setup; sysctl doesn't work with userpriv!
+	if use test && use sctp ; then
+		# test_ssl_new will fail with "Ensure SCTP AUTH chunks are enabled in kernel"
+		# if sctp.auth_enable is not enabled.
+		local sctp_auth_status=$(sysctl -n net.sctp.auth_enable 2>/dev/null)
+		if [[ -z "${sctp_auth_status}" ]] || [[ ${sctp_auth_status} != 1 ]] ; then
+			die "FEATURES=test with USE=sctp requires net.sctp.auth_enable=1!"
+		fi
+	fi
+}
+
+src_prepare() {
+	# Make sure we only ever touch Makefile.org and avoid patching a file
+	# that gets blown away anyways by the Configure script in src_configure
+	rm -f Makefile || die
+
+	if ! use vanilla ; then
+		PATCHES+=(
+			# Add patches which are Gentoo-specific customisations here
+		)
+	fi
+
+	default
+
+	if use test && use sctp && has network-sandbox ${FEATURES} ; then
+		einfo "Disabling test '80-test_ssl_new.t' which is known to fail with FEATURES=network-sandbox ..."
+		rm test/recipes/80-test_ssl_new.t || die
+	fi
+
+	# Test fails depending on kernel configuration, bug #699134
+	rm test/recipes/30-test_afalg.t || die
+}
+
+src_configure() {
+	# Keep this in sync with app-misc/c_rehash
+	SSL_CNF_DIR="/etc/ssl"
+
+	# Quiet out unknown driver argument warnings since openssl
+	# doesn't have well-split CFLAGS and we're making it even worse
+	# and 'make depend' uses -Werror for added fun (bug #417795 again)
+	tc-is-clang && append-flags -Qunused-arguments
+
+	# We really, really need to build OpenSSL w/ strict aliasing disabled.
+	# It's filled with violations and it *will* result in miscompiled
+	# code. This has been in the ebuild for > 10 years but even in 2022,
+	# it's still relevant:
+	# - https://github.com/llvm/llvm-project/issues/55255
+	# - https://github.com/openssl/openssl/issues/12247
+	# - https://github.com/openssl/openssl/issues/18225
+	# - https://github.com/openssl/openssl/issues/18663#issuecomment-1181478057
+	# Don't remove the no strict aliasing bits below!
+	filter-flags -fstrict-aliasing
+	append-flags -fno-strict-aliasing
+	# The OpenSSL developers don't test with LTO right now, it leads to various
+	# warnings/errors (which may or may not be false positives), it's considered
+	# unsupported, and it's not tested in CI: https://github.com/openssl/openssl/issues/18663.
+	filter-lto
+
+	append-flags $(test-flags-CC -Wa,--noexecstack)
+
+	# bug #895308 -- check inserts GNU ld-compatible arguments
+	[[ ${CHOST} == *-darwin* ]] || append-atomic-flags
+	# Configure doesn't respect LIBS
+	export LDLIBS="${LIBS}"
+
+	# bug #197996
+	unset APPS
+	# bug #312551
+	unset SCRIPTS
+	# bug #311473
+	unset CROSS_COMPILE
+
+	tc-export AR CC CXX RANLIB RC
+
+	multilib-minimal_src_configure
+}
+
+multilib_src_configure() {
+	use_ssl() { usex $1 "enable-${2:-$1}" "no-${2:-$1}" " ${*:3}" ; }
+
+	local krb5=$(has_version app-crypt/mit-krb5 && echo "MIT" || echo "Heimdal")
+
+	# See if our toolchain supports __uint128_t.  If so, it's 64bit
+	# friendly and can use the nicely optimized code paths, bug #460790.
+	#local ec_nistp_64_gcc_128
+	#
+	# Disable it for now though (bug #469976)
+	# Do NOT re-enable without substantial discussion first!
+	#
+	#echo "__uint128_t i;" > "${T}"/128.c
+	#if ${CC} ${CFLAGS} -c "${T}"/128.c -o /dev/null >&/dev/null ; then
+	#       ec_nistp_64_gcc_128="enable-ec_nistp_64_gcc_128"
+	#fi
+
+	local sslout=$(bash "${FILESDIR}/gentoo.config-1.0.4")
+	einfo "Using configuration: ${sslout:-(openssl knows best)}"
+
+	# https://github.com/openssl/openssl/blob/master/INSTALL.md#enable-and-disable-features
+	local myeconfargs=(
+		${sslout}
+
+		$(multilib_is_native_abi || echo "no-docs")
+		$(use cpu_flags_x86_sse2 || echo "no-sse2")
+		enable-camellia
+		enable-ec
+		enable-ec2m
+		enable-sm2
+		enable-srp
+		$(use elibc_musl && echo "no-async")
+		enable-idea
+		enable-mdc2
+		enable-rc5
+		$(use fips && echo "enable-fips")
+		$(use quic && echo "enable-quic")
+		$(use_ssl asm)
+		$(use_ssl ktls)
+		$(use_ssl rfc3779)
+		$(use_ssl sctp)
+		$(use test || echo "no-tests")
+		$(use_ssl tls-compression zlib)
+		$(use_ssl weak-ssl-ciphers)
+
+		--prefix="${EPREFIX}"/usr
+		--openssldir="${EPREFIX}"${SSL_CNF_DIR}
+		--libdir=$(get_libdir)
+
+		shared
+		threads
+	)
+
+	edo perl "${S}/Configure" "${myeconfargs[@]}"
+}
+
+multilib_src_compile() {
+	emake build_sw
+}
+
+multilib_src_test() {
+	# See https://github.com/openssl/openssl/blob/master/test/README.md for options.
+	#
+	# VFP = show subtests verbosely and show failed tests verbosely
+	# Normal V=1 would show everything verbosely but this slows things down.
+	#
+	# -j1 here for https://github.com/openssl/openssl/issues/21999, but it
+	# shouldn't matter as tests were already built earlier, and HARNESS_JOBS
+	# controls running the tests.
+	emake -Onone -j1 HARNESS_JOBS="$(makeopts_jobs)" VFP=1 test
+}
+
+multilib_src_install() {
+	# Only -j1 is supported for the install targets:
+	# https://github.com/openssl/openssl/issues/21999#issuecomment-1771150305
+	emake DESTDIR="${D}" -j1 install_sw
+	if use fips; then
+		emake DESTDIR="${D}" -j1 install_fips
+		# Regen this in pkg_preinst, bug 900625
+		rm "${ED}${SSL_CNF_DIR}"/fipsmodule.cnf || die
+	fi
+
+	if multilib_is_native_abi; then
+		emake DESTDIR="${D}" -j1 install_ssldirs
+		emake DESTDIR="${D}" DOCDIR='$(INSTALLTOP)'/share/doc/${PF} -j1 install_docs
+	fi
+
+	# This is crappy in that the static archives are still built even
+	# when USE=static-libs. But this is due to a failing in the openssl
+	# build system: the static archives are built as PIC all the time.
+	# Only way around this would be to manually configure+compile openssl
+	# twice; once with shared lib support enabled and once without.
+	if ! use static-libs ; then
+		rm "${ED}"/usr/$(get_libdir)/lib{crypto,ssl}.a || die
+	fi
+}
+
+multilib_src_install_all() {
+	# openssl installs perl version of c_rehash by default, but
+	# we provide a shell version via app-misc/c_rehash
+	rm "${ED}"/usr/bin/c_rehash || die
+
+	dodoc {AUTHORS,CHANGES,NEWS,README,README-PROVIDERS}.md doc/*.txt doc/${PN}-c-indent.el
+
+	# Create the certs directory
+	keepdir ${SSL_CNF_DIR}/certs
+
+	# bug #254521
+	dodir /etc/sandbox.d
+	echo 'SANDBOX_PREDICT="/dev/crypto"' > "${ED}"/etc/sandbox.d/10openssl
+
+	diropts -m0700
+	keepdir ${SSL_CNF_DIR}/private
+}
+
+pkg_preinst() {
+	if use fips; then
+		# Regen fipsmodule.cnf, bug 900625
+		ebegin "Running openssl fipsinstall"
+		"${ED}/usr/bin/openssl" fipsinstall -quiet \
+			-out "${ED}${SSL_CNF_DIR}/fipsmodule.cnf" \
+			-module "${ED}/usr/$(get_libdir)/ossl-modules/fips.so"
+		eend $?
+	fi
+
+	preserve_old_lib /usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1) \
+		/usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1.1)
+}
+
+pkg_postinst() {
+	ebegin "Running 'openssl rehash ${EROOT}${SSL_CNF_DIR}/certs' to rebuild hashes (bug #333069)"
+	openssl rehash "${EROOT}${SSL_CNF_DIR}/certs"
+	eend $?
+
+	preserve_old_lib_notify /usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1) \
+		/usr/$(get_libdir)/lib{crypto,ssl}$(get_libname 1.1)
+}


             reply	other threads:[~2025-01-16 15:43 UTC|newest]

Thread overview: 686+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-01-16 15:43 Sam James [this message]
  -- strict thread matches above, loose matches on Subject: below --
2025-04-13 13:14 [gentoo-commits] repo/gentoo:master commit in: dev-libs/openssl/ Sam James
2025-04-09 15:25 Sam James
2025-04-09 15:25 Sam James
2025-03-14  7:02 Sam James
2025-03-14  7:02 Sam James
2025-03-14  7:02 Sam James
2025-03-14  7:02 Sam James
2025-03-14  7:02 Sam James
2025-03-13  4:16 Sam James
2025-03-09 20:48 Sam James
2025-03-09 20:15 Sam James
2025-03-09 20:15 Sam James
2025-03-09 20:15 Sam James
2025-03-09 20:15 Sam James
2025-03-09 20:15 Sam James
2025-03-09 20:15 Sam James
2025-03-09 20:15 Sam James
2025-03-02 15:31 Sam James
2025-03-02 15:31 Sam James
2025-02-27  3:28 Sam James
2025-02-23  3:09 Sam James
2025-02-22  8:57 Arthur Zamarin
2025-02-22  8:57 Arthur Zamarin
2025-02-15 18:21 Arthur Zamarin
2025-02-15 18:21 Arthur Zamarin
2025-02-15 18:21 Arthur Zamarin
2025-02-15 18:21 Arthur Zamarin
2025-02-15 18:21 Arthur Zamarin
2025-02-15 18:21 Arthur Zamarin
2025-02-15 18:21 Arthur Zamarin
2025-02-12  9:02 Sam James
2025-02-12  8:26 Sam James
2025-02-12  8:21 Sam James
2025-02-12  8:21 Sam James
2025-02-12  8:07 Sam James
2025-02-12  8:06 Sam James
2025-02-12  8:06 Sam James
2025-02-12  8:06 Sam James
2025-02-12  8:06 Sam James
2025-02-12  7:20 Sam James
2025-02-12  7:20 Sam James
2025-02-12  7:20 Sam James
2025-02-11 17:26 Patrick McLean
2025-02-11 17:26 Patrick McLean
2025-02-11 17:26 Patrick McLean
2025-02-11 17:26 Patrick McLean
2025-02-11 17:26 Patrick McLean
2025-01-30  9:57 Arthur Zamarin
2025-01-30  9:57 Arthur Zamarin
2025-01-29 21:25 Sam James
2025-01-29 21:25 Sam James
2025-01-29 21:25 Sam James
2025-01-29 19:30 Sam James
2025-01-29 19:23 Sam James
2025-01-29 19:23 Sam James
2025-01-29 19:23 Sam James
2025-01-29 19:23 Sam James
2025-01-29 19:23 Sam James
2025-01-18 22:54 Sam James
2024-12-15  1:08 Sam James
2024-12-09 19:24 Arthur Zamarin
2024-12-09  5:47 Arthur Zamarin
2024-12-07 13:09 Arthur Zamarin
2024-12-07 13:00 Arthur Zamarin
2024-12-07  6:34 Arthur Zamarin
2024-12-07  6:34 Arthur Zamarin
2024-12-07  6:34 Arthur Zamarin
2024-11-26  6:09 Sam James
2024-11-26  6:09 Sam James
2024-11-26  6:09 Sam James
2024-10-31 13:51 Sam James
2024-10-30 22:09 Sam James
2024-10-30 19:59 Sam James
2024-10-13 19:27 Arthur Zamarin
2024-10-13 14:51 Sam James
2024-10-11  9:56 Arthur Zamarin
2024-10-10 12:20 Arthur Zamarin
2024-09-30 19:35 Arthur Zamarin
2024-09-30  1:54 Sam James
2024-09-30  1:54 Sam James
2024-09-29 22:59 Sam James
2024-09-29 22:59 Sam James
2024-09-29 22:59 Sam James
2024-09-29 22:16 Jakov Smolić
2024-09-29 22:16 Jakov Smolić
2024-09-28 13:17 Arthur Zamarin
2024-09-27 21:53 Sam James
2024-09-24  9:53 Arthur Zamarin
2024-09-24  7:50 Arthur Zamarin
2024-09-24  7:50 Arthur Zamarin
2024-09-22 11:01 Sam James
2024-09-20  9:58 Sam James
2024-09-20  9:58 Sam James
2024-09-20  9:43 Sam James
2024-09-20  9:43 Sam James
2024-09-12 16:16 Jakov Smolić
2024-09-05  0:06 Sam James
2024-09-02  7:29 Arthur Zamarin
2024-09-02  7:29 Arthur Zamarin
2024-09-02  6:48 Sam James
2024-09-02  6:31 Sam James
2024-08-29 14:28 Ionen Wolkens
2024-08-10 17:45 Arthur Zamarin
2024-08-10 17:45 Arthur Zamarin
2024-08-08 20:37 Mike Gilbert
2024-08-08 20:35 Mike Gilbert
2024-08-08  5:49 Viorel Munteanu
2024-08-08  5:49 Viorel Munteanu
2024-08-08  5:49 Viorel Munteanu
2024-08-08  5:49 Viorel Munteanu
2024-08-07  2:41 Sam James
2024-08-03  5:08 Sam James
2024-08-03  5:08 Sam James
2024-08-03  5:08 Sam James
2024-08-03  3:21 Sam James
2024-08-03  3:21 Sam James
2024-08-01 14:47 Matt Jolly
2024-08-01  8:46 Fabian Groffen
2024-07-23 19:15 Arthur Zamarin
2024-07-23 15:02 James Le Cuirot
2024-07-22 18:37 Arthur Zamarin
2024-07-19 12:20 Arthur Zamarin
2024-07-19 11:12 Sam James
2024-07-19 11:12 Sam James
2024-07-19  6:29 Sam James
2024-07-01 18:55 Mike Gilbert
2024-06-29  7:04 Matt Jolly
2024-06-12  4:59 Sam James
2024-06-12  4:46 Sam James
2024-06-12  4:46 Sam James
2024-06-12  4:46 Sam James
2024-05-31 23:58 Sam James
2024-05-31 23:58 Sam James
2024-04-25 16:35 Arthur Zamarin
2024-04-25 16:35 Arthur Zamarin
2024-04-24 15:02 Sam James
2024-04-24 10:57 Sam James
2024-04-17 22:01 Sam James
2024-04-17  6:54 Sam James
2024-04-15 21:09 Sam James
2024-04-15 21:09 Sam James
2024-04-15  8:02 Sam James
2024-04-15  7:27 Sam James
2024-03-04 20:59 Sam James
2024-03-03 23:02 Sam James
2024-03-02 23:30 Sam James
2024-03-02 11:18 Arthur Zamarin
2024-03-02 10:13 Arthur Zamarin
2024-02-29  5:49 Sam James
2024-02-29  5:49 Sam James
2024-02-29  5:49 Sam James
2024-02-29  4:38 Sam James
2024-02-29  4:38 Sam James
2024-02-29  4:06 Sam James
2024-02-29  4:06 Sam James
2024-02-01 16:46 Sam James
2024-01-30 21:21 Sam James
2024-01-30 20:49 Sam James
2024-01-30 20:49 Sam James
2024-01-30 20:49 Sam James
2023-12-29 16:38 Arthur Zamarin
2023-12-29 13:45 Arthur Zamarin
2023-12-29 13:45 Arthur Zamarin
2023-12-29  6:58 Arthur Zamarin
2023-12-29  0:24 Sam James
2023-12-29  0:24 Sam James
2023-12-29  0:24 Sam James
2023-12-28  4:41 Sam James
2023-12-28  4:41 Sam James
2023-11-29  4:59 Sam James
2023-11-29  4:54 Sam James
2023-11-21 18:06 Sam James
2023-10-24 18:17 Patrick McLean
2023-10-24 18:17 Patrick McLean
2023-10-19 14:58 Sam James
2023-10-13 15:11 Sam James
2023-10-11  5:22 Sam James
2023-10-11  5:22 Sam James
2023-10-11  5:22 Sam James
2023-10-11  5:22 Sam James
2023-10-11  5:22 Sam James
2023-10-11  5:22 Sam James
2023-10-03  3:14 Sam James
2023-10-03  3:14 Sam James
2023-10-03  3:14 Sam James
2023-09-26 15:40 Arthur Zamarin
2023-09-26 15:40 Arthur Zamarin
2023-09-20 13:55 David Seifert
2023-09-19 18:07 Patrick McLean
2023-09-19 18:07 Patrick McLean
2023-09-14 22:54 Sam James
2023-09-13  3:47 Sam James
2023-09-10 10:41 Fabian Groffen
2023-09-10 10:41 Fabian Groffen
2023-09-10  5:54 Sam James
2023-09-10  5:54 Sam James
2023-09-10  5:54 Sam James
2023-09-10  5:54 Sam James
2023-09-10  5:54 Sam James
2023-08-04 10:59 Sam James
2023-08-01 15:42 Sam James
2023-08-01 15:42 Sam James
2023-08-01 15:42 Sam James
2023-07-23 16:01 Arthur Zamarin
2023-07-23 16:00 Arthur Zamarin
2023-07-23 16:00 Arthur Zamarin
2023-07-23  1:55 Sam James
2023-07-22 18:36 Sam James
2023-07-22 18:36 Sam James
2023-07-22 18:36 Sam James
2023-06-27 18:03 Sam James
2023-06-27 10:02 Sam James
2023-06-26 19:33 Sam James
2023-06-25  7:39 Sam James
2023-06-23  5:08 Arthur Zamarin
2023-06-22  7:24 Sam James
2023-06-22  7:14 Sam James
2023-06-22  7:14 Sam James
2023-06-22  7:06 Sam James
2023-06-22  6:11 Sam James
2023-06-22  3:08 Sam James
2023-06-22  2:49 Sam James
2023-06-14  5:20 Sam James
2023-06-01 17:18 Arthur Zamarin
2023-06-01 17:18 Arthur Zamarin
2023-06-01 16:44 Arthur Zamarin
2023-06-01  7:50 Arthur Zamarin
2023-05-30 14:16 Sam James
2023-05-30 14:16 Sam James
2023-05-30 14:16 Sam James
2023-04-29 11:50 Arthur Zamarin
2023-04-29  8:48 Sam James
2023-04-28  7:06 Sam James
2023-04-20 16:58 Patrick McLean
2023-04-20 16:58 Patrick McLean
2023-04-20 16:58 Patrick McLean
2023-04-19 11:07 Sam James
2023-04-19  8:58 Arthur Zamarin
2023-04-19  7:12 Arthur Zamarin
2023-04-19  7:05 Arthur Zamarin
2023-04-19  7:01 Arthur Zamarin
2023-04-19  7:01 Arthur Zamarin
2023-04-13  3:47 Sam James
2023-04-13  3:45 Sam James
2023-03-30 18:36 Arthur Zamarin
2023-03-30 18:36 Arthur Zamarin
2023-03-16 17:38 Arthur Zamarin
2023-03-15  3:14 Sam James
2023-03-14 19:48 Sam James
2023-03-13 20:50 Sam James
2023-03-11 18:02 Mike Gilbert
2023-03-11 18:02 Mike Gilbert
2023-03-11 16:51 Mike Gilbert
2023-03-11 16:51 Mike Gilbert
2023-03-11 16:51 Mike Gilbert
2023-02-26 21:46 Sam James
2023-02-26 18:27 Arthur Zamarin
2023-02-08  1:57 Sam James
2023-02-08  1:55 Sam James
2023-02-08  1:19 Sam James
2023-02-08  1:18 Sam James
2023-02-08  1:14 Sam James
2023-02-08  1:04 Sam James
2023-02-07 20:33 Sam James
2023-02-07 20:33 Sam James
2023-02-07 20:07 Mike Gilbert
2023-02-04  3:24 Mike Gilbert
2023-02-04  3:24 Mike Gilbert
2023-02-04  3:24 Mike Gilbert
2023-02-04  3:24 Mike Gilbert
2023-02-04  1:48 Mike Gilbert
2023-01-15  1:54 Mike Gilbert
2023-01-15  1:35 Mike Gilbert
2023-01-13 20:42 Mike Gilbert
2023-01-13 17:55 Arthur Zamarin
2023-01-08 18:25 Andreas K. Hüttel
2022-12-18 16:09 Andreas K. Hüttel
2022-12-18 11:15 Andreas K. Hüttel
2022-12-18  2:32 Andreas K. Hüttel
2022-12-18  2:32 Andreas K. Hüttel
2022-12-18  0:18 Andreas K. Hüttel
2022-12-17  8:14 Andreas K. Hüttel
2022-12-16 20:59 Arthur Zamarin
2022-12-16 20:59 Arthur Zamarin
2022-12-16 18:31 Arthur Zamarin
2022-12-15 22:31 Andreas K. Hüttel
2022-12-15 22:21 Andreas K. Hüttel
2022-12-13 18:18 Sam James
2022-12-11 18:13 Arthur Zamarin
2022-12-10  4:48 Sam James
2022-12-10  4:36 Sam James
2022-12-10  4:20 Sam James
2022-12-10  4:20 Sam James
2022-11-01 20:15 Sam James
2022-11-01 19:37 John Helmert III
2022-11-01 19:19 Robin H. Johnson
2022-11-01 19:19 Robin H. Johnson
2022-11-01 15:48 Robin H. Johnson
2022-10-12 23:41 Sam James
2022-10-11 22:59 Patrick McLean
2022-10-11 22:59 Patrick McLean
2022-10-08 16:16 Sam James
2022-10-08 13:16 Sam James
2022-08-29 21:34 Sam James
2022-08-18 17:21 Sam James
2022-07-16  8:59 Agostino Sarubbo
2022-07-16  8:58 Agostino Sarubbo
2022-07-15 12:14 Sam James
2022-07-15 11:31 Arthur Zamarin
2022-07-15 11:31 Arthur Zamarin
2022-07-15 10:13 Arthur Zamarin
2022-07-15 10:13 Arthur Zamarin
2022-07-01  5:04 Benda XU
2022-06-30 19:32 Sam James
2022-06-30 19:32 Sam James
2022-06-29  0:03 Sam James
2022-06-29  0:03 Sam James
2022-06-29  0:03 Sam James
2022-06-28 18:57 Patrick McLean
2022-06-28 18:53 Patrick McLean
2022-06-28 18:51 Patrick McLean
2022-06-11  5:12 Sam James
2022-06-11  5:09 Sam James
2022-06-11  5:08 Sam James
2022-06-11  3:40 Sam James
2022-06-07 19:48 Sam James
2022-06-07  3:44 Sam James
2022-06-01 15:28 Benda XU
2022-05-28  3:38 Sam James
2022-05-19 20:31 Sam James
2022-05-19  7:47 Agostino Sarubbo
2022-05-19  5:17 Sam James
2022-05-18 14:58 Jakov Smolić
2022-05-18  7:58 Agostino Sarubbo
2022-05-18  7:58 Agostino Sarubbo
2022-05-18  7:57 Agostino Sarubbo
2022-05-18  7:57 Agostino Sarubbo
2022-05-18  7:57 Agostino Sarubbo
2022-05-18  3:30 Sam James
2022-05-06  7:12 Sam James
2022-05-06  7:12 Sam James
2022-05-06  5:43 Sam James
2022-05-03 21:32 Sam James
2022-05-03 20:30 Patrick McLean
2022-04-17 17:06 Sam James
2022-04-11  0:46 Mike Gilbert
2022-03-23  9:58 Jakov Smolić
2022-03-19 19:21 Agostino Sarubbo
2022-03-17  2:13 Sam James
2022-03-16 23:53 Sam James
2022-03-16 23:53 Sam James
2022-03-16 17:07 Sam James
2022-03-16 15:18 Sam James
2022-03-16 15:18 Sam James
2022-03-15 17:34 Patrick McLean
2022-03-15 17:31 Patrick McLean
2022-03-10  9:48 Jakov Smolić
2022-02-23 13:32 Sam James
2022-02-19 10:35 Arthur Zamarin
2022-02-19  3:02 Sam James
2022-02-19  2:42 Sam James
2022-02-19  2:28 Sam James
2022-01-03 23:26 David Seifert
2021-12-16  0:09 Sam James
2021-12-15  4:15 Sam James
2021-12-14 20:42 Thomas Deutschmann
2021-12-14 20:42 Thomas Deutschmann
2021-11-02 15:02 Sam James
2021-11-02 15:01 Sam James
2021-10-22 18:44 Robin H. Johnson
2021-09-16 21:28 Sam James
2021-09-07 16:09 Thomas Deutschmann
2021-09-01 18:32 Sam James
2021-09-01  9:33 Agostino Sarubbo
2021-09-01  9:31 Agostino Sarubbo
2021-08-26 20:36 Sam James
2021-08-26 19:52 Sam James
2021-08-26 19:52 Sam James
2021-08-24 14:27 Lars Wendler
2021-08-24 14:27 Lars Wendler
2021-08-11 18:19 Mike Gilbert
2021-08-11 18:16 Mike Gilbert
2021-07-29 15:48 Thomas Deutschmann
2021-07-21 12:56 Thomas Deutschmann
2021-06-22 10:27 Thomas Deutschmann
2021-06-17 16:54 Thomas Deutschmann
2021-06-17 16:28 Thomas Deutschmann
2021-06-07 19:33 Mike Gilbert
2021-03-28 16:47 Thomas Deutschmann
2021-03-28  7:14 Sam James
2021-03-26 16:35 Sergei Trofimovich
2021-03-26 11:50 Agostino Sarubbo
2021-03-26  0:08 Sam James
2021-03-25 23:42 Sam James
2021-03-25 23:20 Sam James
2021-03-25 23:20 Sam James
2021-03-25 23:17 Sam James
2021-03-25 23:13 Sam James
2021-03-25 14:30 Thomas Deutschmann
2021-02-18 23:28 Sam James
2021-02-18 20:11 Sergei Trofimovich
2021-02-18 18:30 Sergei Trofimovich
2021-02-18  8:49 Sam James
2021-02-18  8:47 Sam James
2021-02-18  7:32 Sam James
2021-02-18  7:29 Sam James
2021-02-18  0:03 Sam James
2021-02-18  0:03 Sam James
2021-02-16 18:14 Thomas Deutschmann
2020-12-13 23:23 Sam James
2020-12-11 23:07 Sergei Trofimovich
2020-12-11 22:12 Sam James
2020-12-10 21:41 Thomas Deutschmann
2020-12-10 19:21 Sergei Trofimovich
2020-12-10 18:39 Sam James
2020-12-10 18:39 Sam James
2020-12-10 17:48 Sam James
2020-12-08 23:04 Thomas Deutschmann
2020-12-08 16:48 Thomas Deutschmann
2020-09-22 14:18 Lars Wendler
2020-05-29 18:57 Georgy Yakovlev
2020-05-29 18:57 Georgy Yakovlev
2020-04-23 18:18 Sergei Trofimovich
2020-04-23  6:29 Agostino Sarubbo
2020-04-23  6:27 Agostino Sarubbo
2020-04-23  6:21 Agostino Sarubbo
2020-04-22 16:41 Mart Raudsepp
2020-04-22 13:55 Mikle Kolyada
2020-04-22  6:20 Sergei Trofimovich
2020-04-21 14:10 Thomas Deutschmann
2020-04-08  9:52 Agostino Sarubbo
2020-04-08  9:48 Agostino Sarubbo
2020-04-08  6:10 Mart Raudsepp
2020-04-07 10:32 Agostino Sarubbo
2020-04-07  8:41 Sergei Trofimovich
2020-03-31 14:05 Thomas Deutschmann
2020-03-31 14:05 Thomas Deutschmann
2020-03-19 21:28 Thomas Deutschmann
2020-01-01 21:25 Thomas Deutschmann
2020-01-01 21:25 Thomas Deutschmann
2019-12-21 20:31 Thomas Deutschmann
2019-12-01 19:28 Lars Wendler
2019-11-27  8:28 Thomas Deutschmann
2019-11-25  0:42 Thomas Deutschmann
2019-11-10 23:06 Matt Turner
2019-10-20  9:04 Mikle Kolyada
2019-10-20  9:04 Mikle Kolyada
2019-10-20  9:04 Mikle Kolyada
2019-10-14  3:31 Matt Turner
2019-10-12 18:53 Sergei Trofimovich
2019-10-10 15:57 Aaron Bauman
2019-10-09  8:27 Agostino Sarubbo
2019-10-09  8:23 Agostino Sarubbo
2019-10-09  8:12 Agostino Sarubbo
2019-10-08 16:06 Thomas Deutschmann
2019-10-07 19:26 Agostino Sarubbo
2019-10-07 19:25 Agostino Sarubbo
2019-10-07  7:29 Agostino Sarubbo
2019-10-07  1:23 Thomas Deutschmann
2019-10-04 15:48 Thomas Deutschmann
2019-10-04 15:48 Thomas Deutschmann
2019-10-01 19:38 Thomas Deutschmann
2019-10-01 19:38 Thomas Deutschmann
2019-09-21  1:01 Matt Turner
2019-09-20 12:10 Agostino Sarubbo
2019-09-16 22:00 Sergei Trofimovich
2019-09-16  0:06 Thomas Deutschmann
2019-09-16  0:06 Thomas Deutschmann
2019-09-16  0:06 Thomas Deutschmann
2019-09-15 20:37 Thomas Deutschmann
2019-09-15 20:28 Thomas Deutschmann
2019-09-15 20:28 Thomas Deutschmann
2019-09-13 18:02 Aaron Bauman
2019-09-13 17:38 Mikle Kolyada
2019-09-13 12:15 Mikle Kolyada
2019-09-13 12:03 Agostino Sarubbo
2019-09-13 12:01 Agostino Sarubbo
2019-09-13  6:21 Sergei Trofimovich
2019-09-13  0:00 Thomas Deutschmann
2019-09-12 13:40 Thomas Deutschmann
2019-09-11 20:32 Thomas Deutschmann
2019-09-11 19:54 Thomas Deutschmann
2019-08-23 19:01 Thomas Deutschmann
2019-08-23 18:10 Thomas Deutschmann
2019-08-23 18:10 Thomas Deutschmann
2019-08-23 18:10 Thomas Deutschmann
2019-08-21 22:25 Thomas Deutschmann
2019-08-19 16:41 Alexis Ballier
2019-05-29 12:04 Lars Wendler
2019-05-04 11:33 Mikle Kolyada
2019-03-12 16:34 Mikle Kolyada
2019-03-12 16:34 Mikle Kolyada
2019-03-12 16:34 Mikle Kolyada
2019-03-12 16:34 Mikle Kolyada
2019-03-12 16:34 Mikle Kolyada
2019-03-12 12:02 Mart Raudsepp
2019-03-10 22:24 Jeroen Roovers
2019-03-10 22:17 Sergei Trofimovich
2019-03-10 21:38 Matt Turner
2019-03-10 21:38 Matt Turner
2019-03-10 20:35 Sergei Trofimovich
2019-03-10 14:21 Mikle Kolyada
2019-03-09 19:35 Mikle Kolyada
2019-03-09 19:18 Thomas Deutschmann
2019-03-06 16:56 Thomas Deutschmann
2019-02-26 15:31 Lars Wendler
2019-01-07 18:44 Thomas Deutschmann
2019-01-07 18:44 Thomas Deutschmann
2019-01-06 22:18 Mart Raudsepp
2019-01-05 21:11 Matt Turner
2019-01-02 21:29 Lars Wendler
2019-01-01 12:17 Sergei Trofimovich
2019-01-01 12:05 Sergei Trofimovich
2018-12-29 19:12 Thomas Deutschmann
2018-12-29 18:02 Matt Turner
2018-12-29 12:05 Sergei Trofimovich
2018-12-28 20:19 Mikle Kolyada
2018-12-28 19:40 Sergei Trofimovich
2018-12-28 19:09 Thomas Deutschmann
2018-11-18 23:19 Thomas Deutschmann
2018-11-12 18:36 Thomas Deutschmann
2018-10-11 12:10 Lars Wendler
2018-09-19 11:28 Lars Wendler
2018-09-11 15:41 Lars Wendler
2018-09-11 15:41 Lars Wendler
2018-09-09 11:56 Mikle Kolyada
2018-09-09 11:56 Mikle Kolyada
2018-09-07 20:23 Matt Turner
2018-09-07  9:51 Mart Raudsepp
2018-09-06 15:26 Agostino Sarubbo
2018-09-05 14:04 Thomas Deutschmann
2018-09-03 14:40 Thomas Deutschmann
2018-09-03  6:19 Sergei Trofimovich
2018-09-02 11:12 Sergei Trofimovich
2018-09-01 23:26 Sergei Trofimovich
2018-09-01 23:18 Sergei Trofimovich
2018-09-01 22:07 Mikle Kolyada
2018-09-01 17:55 Thomas Deutschmann
2018-08-21 13:24 Thomas Deutschmann
2018-08-14 22:29 Patrick McLean
2018-06-02 18:32 Lars Wendler
2018-05-30 19:53 Mike Frysinger
2018-05-30 10:02 Lars Wendler
2018-05-26 10:07 Mikle Kolyada
2018-05-26 10:07 Mikle Kolyada
2018-05-19 11:32 Jeroen Roovers
2018-05-17 15:12 Lars Wendler
2018-05-01 18:35 Lars Wendler
2018-04-26 13:25 Lars Wendler
2018-04-25  8:32 Lars Wendler
2018-04-19 22:14 Sergei Trofimovich
2018-04-18  8:27 Lars Wendler
2018-04-18  8:27 Lars Wendler
2018-04-16 21:03 Sergei Trofimovich
2018-04-14 11:40 Markus Meier
2018-04-12 11:13 Jeroen Roovers
2018-04-12 10:29 Mart Raudsepp
2018-04-11 20:43 Thomas Deutschmann
2018-04-09 18:42 Sergei Trofimovich
2018-04-09  0:18 Matt Turner
2018-04-08 15:38 Aaron Bauman
2018-03-29 17:00 Thomas Deutschmann
2018-03-27 15:51 Thomas Deutschmann
2018-03-27 15:24 Thomas Deutschmann
2018-03-16 10:41 Lars Wendler
2018-02-14 14:17 Jason Zaman
2018-02-13 15:07 Michał Górny
2018-02-12 21:36 Thomas Deutschmann
2017-12-30 19:55 Thomas Deutschmann
2017-12-14 19:09 Tobias Klausmann
2017-12-14 18:35 Thomas Deutschmann
2017-12-13 21:12 Markus Meier
2017-12-10 23:37 Manuel Rüger
2017-12-10 21:33 Sergei Trofimovich
2017-12-09 10:59 Sergei Trofimovich
2017-12-09 10:54 Sergei Trofimovich
2017-12-07 18:53 Thomas Deutschmann
2017-11-27 21:12 Sergei Trofimovich
2017-11-20  2:06 Matt Thode
2017-11-19 15:14 Markus Meier
2017-11-18  6:52 Matt Thode
2017-11-10  8:30 Sergei Trofimovich
2017-11-08 12:51 Tobias Klausmann
2017-11-06  6:50 Jeroen Roovers
2017-11-04 13:04 Sergei Trofimovich
2017-11-02 21:48 Manuel Rüger
2017-11-02 21:16 Thomas Deutschmann
2017-11-02 15:58 Thomas Deutschmann
2017-10-22 21:51 Robin H. Johnson
2017-10-22 21:16 Robin H. Johnson
2017-10-06 10:30 Sergei Trofimovich
2017-09-24 11:00 Sergei Trofimovich
2017-09-11 19:36 Sergei Trofimovich
2017-09-08  5:06 Markus Meier
2017-08-29 21:39 Thomas Deutschmann
2017-08-28 19:08 Robin H. Johnson
2017-08-27  0:47 Matt Turner
2017-08-25 21:09 Mikle Kolyada
2017-08-21 22:25 Sergei Trofimovich
2017-05-25 21:22 Lars Wendler
2017-02-18 16:46 Lars Wendler
2017-02-16 15:05 Lars Wendler
2017-02-14 20:03 Mike Frysinger
2017-02-12 20:10 Markus Meier
2017-02-08  1:48 Michael Weber
2017-01-27 13:23 Tobias Klausmann
2017-01-27  9:07 Agostino Sarubbo
2017-01-27  9:02 Agostino Sarubbo
2017-01-26 17:39 Jeroen Roovers
2017-01-26 17:19 Lars Wendler
2017-01-26 17:10 Lars Wendler
2017-01-26 16:11 Lars Wendler
2016-11-12  4:17 Mike Frysinger
2016-09-29 13:28 Agostino Sarubbo
2016-09-29 13:14 Agostino Sarubbo
2016-09-29 12:35 Agostino Sarubbo
2016-09-29  9:41 Agostino Sarubbo
2016-09-27  8:24 Tobias Klausmann
2016-09-27  3:25 Jeroen Roovers
2016-09-26 18:58 Agostino Sarubbo
2016-09-26 18:56 Agostino Sarubbo
2016-09-26 11:45 Lars Wendler
2016-09-23  4:44 Jeroen Roovers
2016-09-22 13:42 Agostino Sarubbo
2016-09-22 13:42 Agostino Sarubbo
2016-09-22 13:15 Lars Wendler
2016-08-08  8:39 Andrew Savchenko
2016-07-19 14:37 Mike Frysinger
2016-07-08 12:02 Agostino Sarubbo
2016-07-08 10:02 Agostino Sarubbo
2016-07-08  7:53 Agostino Sarubbo
2016-07-07  2:29 Stephen Klimaszewski
2016-07-05 20:55 Markus Meier
2016-07-02 11:08 Jeroen Roovers
2016-06-30 20:07 Michael Palimaka
2016-06-30  9:28 Tobias Klausmann
2016-06-30  7:53 Jeroen Roovers
2016-06-27  8:48 Agostino Sarubbo
2016-06-27  8:23 Agostino Sarubbo
2016-05-27  6:44 Lars Wendler
2016-05-24 20:14 Mike Frysinger
2016-05-24 19:30 Mike Frysinger
2016-05-20 18:45 Tobias Klausmann
2016-05-12 17:15 Markus Meier
2016-05-04  7:37 Lars Wendler
2016-05-04  6:38 Lars Wendler
2016-05-04  5:33 Jeroen Roovers
2016-05-04  5:17 Jeroen Roovers
2016-05-03 14:18 Lars Wendler
2016-03-21  2:39 Mike Frysinger
2016-03-21  2:39 Mike Frysinger
2016-03-20 11:53 Agostino Sarubbo
2016-03-15 20:50 Tobias Klausmann
2016-03-10 20:23 Markus Meier
2016-03-08 13:41 Jeroen Roovers
2016-03-07  8:04 Agostino Sarubbo
2016-03-03 15:40 Doug Goldstein
2016-03-01 21:57 Lars Wendler
2016-02-26 22:50 Doug Goldstein
2016-02-09 19:00 Jason Donenfeld
2016-02-02 18:54 Mike Frysinger
2016-01-30 12:58 Jeroen Roovers
2016-01-30 10:30 Jeroen Roovers
2016-01-29  8:34 Agostino Sarubbo
2015-12-26 12:16 Agostino Sarubbo
2015-12-26 12:03 Agostino Sarubbo
2015-12-13  1:36 Mike Frysinger
2015-12-11 11:01 Mikle Kolyada
2015-12-09  5:48 Markus Meier
2015-12-07 10:02 Agostino Sarubbo
2015-12-06 23:04 Matt Turner
2015-12-05 20:40 Jeroen Roovers
2015-10-20 23:16 Julian Ospald
2015-10-05 20:50 Mike Frysinger
2015-10-01 13:49 Julian Ospald
2015-10-01 11:48 Julian Ospald
2015-10-01  9:40 Julian Ospald
2015-09-21 11:27 Agostino Sarubbo
2015-09-05 18:15 Mikle Kolyada
2015-09-03 21:33 Anthony G. Basile
2015-09-02 19:46 Markus Meier
2015-09-02  5:04 Mike Frysinger
2015-09-02  4:22 Jeroen Roovers
2015-08-30 13:07 Tobias Klausmann
2015-08-26  9:55 Mikle Kolyada

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1737042203.b21c8891539ba6636a6f0c0ff23a315cbff883c4.sam@gentoo \
    --to=sam@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox