From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <gentoo-commits+bounces-1513718-garchives=archives.gentoo.org@lists.gentoo.org> Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 3015D15ACFC for <garchives@archives.gentoo.org>; Mon, 1 May 2023 08:05:36 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 73D97E084E; Mon, 1 May 2023 08:05:35 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 41FD1E084E for <gentoo-commits@lists.gentoo.org>; Mon, 1 May 2023 08:05:35 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 25923340B98 for <gentoo-commits@lists.gentoo.org>; Mon, 1 May 2023 08:05:34 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id B12C6990 for <gentoo-commits@lists.gentoo.org>; Mon, 1 May 2023 08:05:32 +0000 (UTC) From: "Joonas Niilola" <juippis@gentoo.org> To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Joonas Niilola" <juippis@gentoo.org> Message-ID: <1682928329.9088957da743bd19ba56a001852568916b5d393a.juippis@gentoo> Subject: [gentoo-commits] repo/gentoo:master commit in: dev-libs/efl/files/, dev-libs/efl/ X-VCS-Repository: repo/gentoo X-VCS-Files: dev-libs/efl/efl-1.26.3-r1.ebuild dev-libs/efl/files/efl-1.26.3-libressl.patch X-VCS-Directories: dev-libs/efl/ dev-libs/efl/files/ X-VCS-Committer: juippis X-VCS-Committer-Name: Joonas Niilola X-VCS-Revision: 9088957da743bd19ba56a001852568916b5d393a X-VCS-Branch: master Date: Mon, 1 May 2023 08:05:32 +0000 (UTC) Precedence: bulk List-Post: <mailto:gentoo-commits@lists.gentoo.org> List-Help: <mailto:gentoo-commits+help@lists.gentoo.org> List-Unsubscribe: <mailto:gentoo-commits+unsubscribe@lists.gentoo.org> List-Subscribe: <mailto:gentoo-commits+subscribe@lists.gentoo.org> List-Id: Gentoo Linux mail <gentoo-commits.gentoo.org> X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: e481ae2c-f911-46fa-8b58-dde6dcd68d1d X-Archives-Hash: d59b23dc54690e884f634dc78c268cfc commit: 9088957da743bd19ba56a001852568916b5d393a Author: orbea <orbea <AT> riseup <DOT> net> AuthorDate: Fri Apr 28 16:36:57 2023 +0000 Commit: Joonas Niilola <juippis <AT> gentoo <DOT> org> CommitDate: Mon May 1 08:05:29 2023 +0000 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9088957d dev-libs/efl: add upstream patch for libressl This patch was accepted upstream and fixed the build with libressl >= 3.5.0. Upstream-PR: https://git.enlightenment.org/enlightenment/efl/pulls/10 Upstream-Commit: https://git.enlightenment.org/enlightenment/efl/commit/bdd5b244e6a6161228f4a98210cefd9ef8a12e85 Upstream-Commit: https://git.enlightenment.org/enlightenment/efl/commit/0e22417f4579333a967fb5ce65ab339dfc066753 Bug: https://bugs.gentoo.org/903001 Closes: https://github.com/gentoo/gentoo/pull/30794 Signed-off-by: Joonas Niilola <juippis <AT> gentoo.org> dev-libs/efl/efl-1.26.3-r1.ebuild | 4 + dev-libs/efl/files/efl-1.26.3-libressl.patch | 191 +++++++++++++++++++++++++++ 2 files changed, 195 insertions(+) diff --git a/dev-libs/efl/efl-1.26.3-r1.ebuild b/dev-libs/efl/efl-1.26.3-r1.ebuild index 8b00eb21d056..fb26d694f9b3 100644 --- a/dev-libs/efl/efl-1.26.3-r1.ebuild +++ b/dev-libs/efl/efl-1.26.3-r1.ebuild @@ -131,6 +131,10 @@ BDEPEND="${PYTHON_DEPS} nls? ( sys-devel/gettext ) wayland? ( dev-util/wayland-scanner )" +PATCHES=( + "${FILESDIR}"/${PN}-1.26.3-libressl.patch #903001 +) + pkg_setup() { # Deprecated, provided for backward-compatibility. Everything is moved to libefreet.so. QA_FLAGS_IGNORED="/usr/$(get_libdir)/libefreet_trash.so.${PV} diff --git a/dev-libs/efl/files/efl-1.26.3-libressl.patch b/dev-libs/efl/files/efl-1.26.3-libressl.patch new file mode 100644 index 000000000000..6bb1b6bb83e3 --- /dev/null +++ b/dev-libs/efl/files/efl-1.26.3-libressl.patch @@ -0,0 +1,191 @@ +https://bugs.gentoo.org/903001 +https://git.enlightenment.org/enlightenment/efl/pulls/10 +https://git.enlightenment.org/enlightenment/efl/commit/bdd5b244e6a6161228f4a98210cefd9ef8a12e85 +https://git.enlightenment.org/enlightenment/efl/commit/0e22417f4579333a967fb5ce65ab339dfc066753 + +From bdd5b244e6a6161228f4a98210cefd9ef8a12e85 Mon Sep 17 00:00:00 2001 +From: orbea <orbea@riseup.net> +Date: Mon, 4 Jul 2022 09:05:38 -0700 +Subject: [PATCH] Support LibreSSL 3.5.x + +LibreSSL 3.5.x now works with the standard OpenSSL code paths. +--- + src/lib/ecore_con/efl_net_ssl_conn-openssl.c | 12 ++++++------ + src/lib/eet/eet_cipher.c | 8 ++++---- + src/lib/emile/emile_cipher_openssl.c | 14 +++++++------- + 3 files changed, 17 insertions(+), 17 deletions(-) + +From 0e22417f4579333a967fb5ce65ab339dfc066753 Mon Sep 17 00:00:00 2001 +From: "Carsten Haitzler (Rasterman)" <raster@rasterman.com> +Date: Mon, 1 Aug 2022 17:35:52 +0100 +Subject: [PATCH] eet emile - cipher - add braces for if defines to be clear on + order of op + +--- + src/lib/ecore_con/efl_net_ssl_conn-openssl.c | 12 ++++++------ + src/lib/eet/eet_cipher.c | 8 ++++---- + src/lib/emile/emile_cipher_openssl.c | 10 +++++----- + 3 files changed, 15 insertions(+), 15 deletions(-) + +diff --git a/src/lib/ecore_con/efl_net_ssl_conn-openssl.c b/src/lib/ecore_con/efl_net_ssl_conn-openssl.c +index e59c6811c9..56c8a595eb 100644 +--- a/src/lib/ecore_con/efl_net_ssl_conn-openssl.c ++++ b/src/lib/ecore_con/efl_net_ssl_conn-openssl.c +@@ -27,7 +27,7 @@ + static int + efl_net_socket_bio_create(BIO *b) + { +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + BIO_set_init(b, 1); + BIO_set_data(b, NULL); + BIO_set_flags(b, 0); +@@ -44,7 +44,7 @@ static int + efl_net_socket_bio_destroy(BIO *b) + { + if (!b) return 0; +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + BIO_set_init(b, 0); + BIO_set_data(b, NULL); + BIO_set_flags(b, 0); +@@ -63,7 +63,7 @@ efl_net_socket_bio_read(BIO *b, char *buf, int len) + .mem = buf, + .len = len + }; +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + Eo *sock = BIO_get_data(b); + #else + Eo *sock = b->ptr; +@@ -99,7 +99,7 @@ efl_net_socket_bio_write(BIO *b, const char *buf, int len) + .mem = buf, + .len = len + }; +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + Eo *sock = BIO_get_data(b); + #else + Eo *sock = b->ptr; +@@ -146,7 +146,7 @@ efl_net_socket_bio_puts(BIO *b, const char *str) + static BIO_METHOD * + __efl_net_socket_bio_get(void) + { +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + static BIO_METHOD *efl_net_socket_bio = NULL; + + if (efl_net_socket_bio) return efl_net_socket_bio; +@@ -359,7 +359,7 @@ efl_net_ssl_conn_setup(Efl_Net_Ssl_Conn *conn, Eina_Bool is_dialer, Efl_Net_Sock + conn->bio = BIO_new(__efl_net_socket_bio_get()); + EINA_SAFETY_ON_NULL_GOTO(conn->bio, error_bio); + +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + BIO_set_data(conn->bio, sock); + #else + conn->bio->ptr = sock; +diff --git a/src/lib/eet/eet_cipher.c b/src/lib/eet/eet_cipher.c +index 025750cc98..30501b99e1 100644 +--- a/src/lib/eet/eet_cipher.c ++++ b/src/lib/eet/eet_cipher.c +@@ -472,7 +472,7 @@ eet_identity_sign(FILE *fp, + gnutls_datum_t signum = { NULL, 0 }; + gnutls_privkey_t privkey; + # else /* ifdef HAVE_GNUTLS */ +-# if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++# if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + EVP_MD_CTX *md_ctx; + # else + EVP_MD_CTX md_ctx; +@@ -562,7 +562,7 @@ eet_identity_sign(FILE *fp, + } + + /* Do the signature. */ +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && (!defined(LIBRESSL_VERSION_NUMBER))) + md_ctx = EVP_MD_CTX_new(); + if (!md_ctx) + { +@@ -756,7 +756,7 @@ eet_identity_check(const void *data_base, + const unsigned char *tmp; + EVP_PKEY *pkey; + X509 *x509; +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + EVP_MD_CTX *md_ctx; + #else + EVP_MD_CTX md_ctx; +@@ -779,7 +779,7 @@ eet_identity_check(const void *data_base, + } + + /* Verify the signature */ +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + md_ctx = EVP_MD_CTX_new(); + if (!md_ctx) + { +diff --git a/src/lib/emile/emile_cipher_openssl.c b/src/lib/emile/emile_cipher_openssl.c +index e5a1ed4135..7fed417d3f 100644 +--- a/src/lib/emile/emile_cipher_openssl.c ++++ b/src/lib/emile/emile_cipher_openssl.c +@@ -45,12 +45,12 @@ struct _Emile_SSL + Eina_Bool + _emile_cipher_init(void) + { +-#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) ++#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || (LIBRESSL_VERSION_NUMBER < 0x3050000fL) + ERR_load_crypto_strings(); + SSL_library_init(); + SSL_load_error_strings(); + OpenSSL_add_all_algorithms(); +-#endif /* if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) */ ++#endif /* if OPENSSL_VERSION_NUMBER < 0x10100000L || LIBRESSL_VERSION_NUMBER < 0x3050000fL */ + + return EINA_TRUE; + } +@@ -73,7 +73,7 @@ emile_binbuf_sha1(const Eina_Binbuf * data, unsigned char digest[20]) + { + const EVP_MD *md = EVP_sha1(); + Eina_Slice slice = eina_binbuf_slice_get(data); +-#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER) ++#if (LIBRESSL_VERSION_NUMBER >= 0x3050000fL) || ((OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(LIBRESSL_VERSION_NUMBER)) + EVP_MD_CTX *ctx = EVP_MD_CTX_new(); + if (!ctx) return EINA_FALSE; + +@@ -196,7 +196,7 @@ on_error: + memset(ik, 0, sizeof (ik)); + + /* Openssl error */ +-#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) ++#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || (LIBRESSL_VERSION_NUMBER < 0x3050000fL) + if (ctx) + EVP_CIPHER_CTX_cleanup(ctx); + #else +@@ -204,7 +204,7 @@ on_error: + EVP_CIPHER_CTX_cleanup(ctx); + EVP_CIPHER_CTX_free(ctx); + } +-#endif /* if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) */ ++#endif /* if OPENSSL_VERSION_NUMBER < 0x10100000L || LIBRESSL_VERSION_NUMBER < 0x3050000fL */ + + + free(buffer); +@@ -331,7 +331,7 @@ emile_cipher_server_listen(Emile_Cipher_Type t) + SSL_CTX_set_options(r->ssl_ctx, + options | SSL_OP_NO_SSLv2 | SSL_OP_SINGLE_DH_USE); + break; +-#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) ++#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || (LIBRESSL_VERSION_NUMBER < 0x3050000fL) + case EMILE_TLSv1: + r->ssl_ctx = SSL_CTX_new(TLSv1_server_method()); + break; +@@ -780,7 +780,7 @@ emile_cipher_server_connect(Emile_Cipher_Type t) + options | SSL_OP_NO_SSLv2 | SSL_OP_SINGLE_DH_USE); + break; + case EMILE_TLSv1: +-#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER) ++#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || (LIBRESSL_VERSION_NUMBER < 0x3050000fL) + r->ssl_ctx = SSL_CTX_new(TLSv1_client_method()); + break; + #endif