commit:     e501de7a2caf0cec28e54c0cc2cd5ae0e49f3d96
Author:     orbea <orbea <AT> riseup <DOT> net>
AuthorDate: Mon Jul 21 02:18:19 2025 +0000
Commit:     orbea <orbea <AT> riseup <DOT> net>
CommitDate: Mon Jul 21 02:18:19 2025 +0000
URL:        https://gitweb.gentoo.org/repo/proj/libressl.git/commit/?id=e501de7a

net-misc/stunnel: drop 5.68, 5.71

Signed-off-by: orbea <orbea <AT> riseup.net>

 net-misc/stunnel/Manifest                          |   1 -
 net-misc/stunnel/files/stunnel-5.68-libressl.patch | 333 ---------------------
 net-misc/stunnel/stunnel-5.68.ebuild               |  97 ------
 net-misc/stunnel/stunnel-5.71.ebuild               | 120 --------
 4 files changed, 551 deletions(-)

diff --git a/net-misc/stunnel/Manifest b/net-misc/stunnel/Manifest
index 53cc433..ed1de84 100644
--- a/net-misc/stunnel/Manifest
+++ b/net-misc/stunnel/Manifest
@@ -1,2 +1 @@
-DIST stunnel-5.68.tar.gz 884989 BLAKE2B 
e2551b2052db0719203b24dcf16a2ef74c078dccd1200d25502defcef1301456e755a71a1a2b6ab7b43fc9ddc04cd031fca83ffb760528133a0e22ae22e64d40
 SHA512 
cdc3b8ab4cd35ba722b5248c005ae58a39d79a80600447417b1d0d01fd3aa9e8b22f8568c3177423be99d7395bb15a8754e975fb953556cd80a9cc11e185e9fb
 DIST stunnel-5.71.tar.gz 895646 BLAKE2B 
d323363c7bfdd6c0b7931b84a6069cf9a8337e967c31e14d15976d7932f0c0d6f40f7a1cbf5abbdff0e9edc52176cdcead4f848653088193b2debf4e77443b42
 SHA512 
c7004f48b93b3415305eec1193d51b7bf51a3bdd2cdc9f6ae588f563b32408b1ecde83b9f3f5b658f945ab5bcc5124390c38235394aad4471bf5b666081af2a2

diff --git a/net-misc/stunnel/files/stunnel-5.68-libressl.patch 
b/net-misc/stunnel/files/stunnel-5.68-libressl.patch
deleted file mode 100644
index ca4ae84..0000000
--- a/net-misc/stunnel/files/stunnel-5.68-libressl.patch
+++ /dev/null
@@ -1,333 +0,0 @@
-commit deb3cc400a32c21712b6b748da616ef4a1b0d86a
-Author: orbea <[email protected]>
-Date:   Tue Apr 11 15:13:02 2023 -0700
-
-    libressl (From OpenBSD)
-
-diff --git a/src/client.c b/src/client.c
-index ac4a115..dda42c2 100644
---- a/src/client.c
-+++ b/src/client.c
-@@ -773,7 +773,7 @@ NOEXPORT void print_cipher(CLI *c) { /* print negotiated 
cipher */
- NOEXPORT void transfer(CLI *c) {
-     int timeout; /* s_poll_wait timeout in seconds */
-     int pending; /* either processed on unprocessed TLS data */
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-     int has_pending=0, prev_has_pending;
- #endif
-     int watchdog=0; /* a counter to detect an infinite loop */
-@@ -820,7 +820,7 @@ NOEXPORT void transfer(CLI *c) {
- 
-         /****************************** wait for an event */
-         pending=SSL_pending(c->ssl);
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-         /* only attempt to process SSL_has_pending() data once */
-         prev_has_pending=has_pending;
-         has_pending=SSL_has_pending(c->ssl);
-@@ -1225,7 +1225,7 @@ NOEXPORT void transfer(CLI *c) {
-             s_log(LOG_ERR,
-                 "please report the problem to [email protected]");
-             stunnel_info(LOG_ERR);
--#if OPENSSL_VERSION_NUMBER >= 0x10100000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-             s_log(LOG_ERR, "protocol=%s, SSL_pending=%d, SSL_has_pending=%d",
-                 SSL_get_version(c->ssl),
-                 SSL_pending(c->ssl), SSL_has_pending(c->ssl));
-diff --git a/src/common.h b/src/common.h
-index 8fe50b4..52435d7 100644
---- a/src/common.h
-+++ b/src/common.h
-@@ -459,7 +459,7 @@ extern char *sys_errlist[];
- #define OPENSSL_NO_TLS1_2
- #endif /* OpenSSL older than 1.0.1 || defined(OPENSSL_NO_TLS1) */
- 
--#if OPENSSL_VERSION_NUMBER>=0x10100000L
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
- #ifndef OPENSSL_NO_SSL2
- #define OPENSSL_NO_SSL2
- #endif /* !defined(OPENSSL_NO_SSL2) */
-@@ -505,7 +505,7 @@ int DH_set0_pqg(DH *dh, BIGNUM *p, BIGNUM *q, BIGNUM *g);
- /* not defined in public headers before OpenSSL 0.9.8 */
- STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void);
- #endif /* !defined(OPENSSL_NO_COMP) */
--#if OPENSSL_VERSION_NUMBER>=0x10101000L
-+#if OPENSSL_VERSION_NUMBER>=0x10101000L && !defined(LIBRESSL_VERSION_NUMBER)
- #include <openssl/storeerr.h>
- #endif /* OPENSSL_VERSION_NUMBER>=0x10101000L */
- #if OPENSSL_VERSION_NUMBER>=0x30000000L
-diff --git a/src/ctx.c b/src/ctx.c
-index 6a42a6b..90d6273 100644
---- a/src/ctx.c
-+++ b/src/ctx.c
-@@ -94,7 +94,7 @@ NOEXPORT void set_prompt(const char *);
- NOEXPORT int ui_retry(void);
- 
- /* session tickets */
--#if OPENSSL_VERSION_NUMBER >= 0x10101000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10101000L && !defined(LIBRESSL_VERSION_NUMBER)
- NOEXPORT int generate_session_ticket_cb(SSL *, void *);
- NOEXPORT int decrypt_session_ticket_cb(SSL *, SSL_SESSION *,
-     const unsigned char *, size_t, SSL_TICKET_STATUS, void *);
-@@ -133,7 +133,7 @@ NOEXPORT void sslerror_log(unsigned long, const char *, 
int, const char *);
- 
- /**************************************** initialize section->ctx */
- 
--#if OPENSSL_VERSION_NUMBER>=0x10100000L
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
- typedef long unsigned SSL_OPTIONS_TYPE;
- #else
- typedef long SSL_OPTIONS_TYPE;
-@@ -184,7 +184,7 @@ int context_init(SERVICE_OPTIONS *section) { /* init TLS 
context */
-     }
-     current_section=section; /* setup current section for callbacks */
- 
--#if OPENSSL_VERSION_NUMBER>=0x10100000L
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-     /* set the security level */
-     if(section->security_level>=0) {
-         /* set the user-specified value */
-@@ -272,7 +272,7 @@ int context_init(SERVICE_OPTIONS *section) { /* init TLS 
context */
- #endif
- 
-     /* setup session tickets */
--#if OPENSSL_VERSION_NUMBER >= 0x10101000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10101000L && !defined(LIBRESSL_VERSION_NUMBER)
-     SSL_CTX_set_session_ticket_cb(section->ctx, generate_session_ticket_cb,
-         decrypt_session_ticket_cb, NULL);
- #endif /* OpenSSL 1.1.1 or later */
-@@ -546,7 +546,7 @@ NOEXPORT int ecdh_init(SERVICE_OPTIONS *section) {
- /**************************************** initialize OpenSSL CONF */
- 
- NOEXPORT int conf_init(SERVICE_OPTIONS *section) {
--#if OPENSSL_VERSION_NUMBER>=0x10002000L
-+#if OPENSSL_VERSION_NUMBER>=0x10002000L && !defined(LIBRESSL_VERSION_NUMBER)
-     SSL_CONF_CTX *cctx;
-     NAME_LIST *curr;
-     char *cmd, *param;
-@@ -1085,7 +1085,7 @@ NOEXPORT int ui_retry() {
- 
- /**************************************** session tickets */
- 
--#if OPENSSL_VERSION_NUMBER >= 0x10101000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10101000L && !defined(LIBRESSL_VERSION_NUMBER)
- 
- typedef struct {
-     void *session_authenticated;
-@@ -1573,7 +1573,7 @@ NOEXPORT void info_callback(const SSL *ssl, int where, 
int ret) {
-     CLI *c;
-     SSL_CTX *ctx;
-     const char *state_string;
--#if OPENSSL_VERSION_NUMBER>=0x10100000L
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-     OSSL_HANDSHAKE_STATE state=SSL_get_state(ssl);
- #else
-     int state=SSL_get_state((SSL *)ssl);
-@@ -1622,7 +1622,10 @@ NOEXPORT void info_callback(const SSL *ssl, int where, 
int ret) {
-         if(state==TLS_ST_SR_CLNT_HELLO) {
- #else
-         if(state==SSL3_ST_SR_CLNT_HELLO_A
--                || state==SSL23_ST_SR_CLNT_HELLO_A) {
-+#if !defined(LIBRESSL_VERSION_NUMBER) || LIBRESSL_VERSION_NUMBER < 0x4000000fL
-+                || state==SSL23_ST_SR_CLNT_HELLO_A
-+#endif
-+        ) {
- #endif
-             /* client hello received after initial handshake,
-              * this means renegotiation -> mark it */
-diff --git a/src/prototypes.h b/src/prototypes.h
-index 0ecd719..1084ce2 100644
---- a/src/prototypes.h
-+++ b/src/prototypes.h
-@@ -733,7 +733,7 @@ int getnameinfo(const struct sockaddr *, socklen_t,
- extern CLI *thread_head;
- #endif
- 
--#if OPENSSL_VERSION_NUMBER<0x10100004L
-+#if OPENSSL_VERSION_NUMBER<0x10100004L || defined(LIBRESSL_VERSION_NUMBER)
- 
- #ifdef USE_OS_THREADS
- 
-@@ -784,7 +784,7 @@ typedef enum {
- 
- extern CRYPTO_RWLOCK *stunnel_locks[STUNNEL_LOCKS];
- 
--#if OPENSSL_VERSION_NUMBER<0x10100004L
-+#if OPENSSL_VERSION_NUMBER<0x10100004L || defined(LIBRESSL_VERSION_NUMBER)
- /* Emulate the OpenSSL 1.1 locking API for older OpenSSL versions */
- CRYPTO_RWLOCK *CRYPTO_THREAD_lock_new(void);
- int CRYPTO_THREAD_read_lock(CRYPTO_RWLOCK *);
-diff --git a/src/ssl.c b/src/ssl.c
-index 2fd0c77..e465fe1 100644
---- a/src/ssl.c
-+++ b/src/ssl.c
-@@ -43,7 +43,7 @@ NOEXPORT void cb_new_auth(void *parent, void *ptr, 
CRYPTO_EX_DATA *ad,
- #if OPENSSL_VERSION_NUMBER>=0x30000000L
- NOEXPORT int cb_dup_addr(CRYPTO_EX_DATA *to, const CRYPTO_EX_DATA *from,
-     void **from_d, int idx, long argl, void *argp);
--#elif OPENSSL_VERSION_NUMBER>=0x10100000L
-+#elif OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
- NOEXPORT int cb_dup_addr(CRYPTO_EX_DATA *to, const CRYPTO_EX_DATA *from,
-     void *from_d, int idx, long argl, void *argp);
- #else
-@@ -103,7 +103,7 @@ int fips_available() { /* either FIPS provider or 
container is available */
- 
- /* initialize libcrypto before invoking API functions that require it */
- void crypto_init() {
--#if OPENSSL_VERSION_NUMBER>=0x10100000L
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-     OPENSSL_INIT_SETTINGS *conf;
- #endif /* OPENSSL_VERSION_NUMBER>=0x10100000L */
- #ifdef USE_WIN32
-@@ -146,7 +146,7 @@ void crypto_init() {
- #endif /* USE_WIN32 */
- 
-     /* initialize OpenSSL */
--#if OPENSSL_VERSION_NUMBER>=0x10100000L
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-     conf=OPENSSL_INIT_new();
- #ifdef USE_WIN32
-     stunnel_dir=tstr2str(stunnel_exe_path);
-@@ -246,7 +246,7 @@ NOEXPORT void cb_new_auth(void *parent, void *ptr, 
CRYPTO_EX_DATA *ad,
- #if OPENSSL_VERSION_NUMBER>=0x30000000L
- NOEXPORT int cb_dup_addr(CRYPTO_EX_DATA *to, const CRYPTO_EX_DATA *from,
-         void **from_d, int idx, long argl, void *argp) {
--#elif OPENSSL_VERSION_NUMBER>=0x10100000L
-+#elif OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
- NOEXPORT int cb_dup_addr(CRYPTO_EX_DATA *to, const CRYPTO_EX_DATA *from,
-         void *from_d, int idx, long argl, void *argp) {
- #else
-diff --git a/src/sthreads.c b/src/sthreads.c
-index d0104ee..23ca48c 100644
---- a/src/sthreads.c
-+++ b/src/sthreads.c
-@@ -123,7 +123,7 @@ NOEXPORT void thread_id_init() {
- /**************************************** locking */
- 
- /* we only need to initialize locking with OpenSSL older than 1.1.0 */
--#if OPENSSL_VERSION_NUMBER<0x10100004L
-+#if OPENSSL_VERSION_NUMBER<0x10100004L || defined(LIBRESSL_VERSION_NUMBER)
- 
- #ifdef USE_PTHREAD
- 
-@@ -283,7 +283,7 @@ NOEXPORT int s_atomic_add(int *val, int amount, 
CRYPTO_RWLOCK *lock) {
- 
- CRYPTO_RWLOCK *stunnel_locks[STUNNEL_LOCKS];
- 
--#if OPENSSL_VERSION_NUMBER<0x10100004L
-+#if OPENSSL_VERSION_NUMBER<0x10100004L || defined(LIBRESSL_VERSION_NUMBER)
- 
- #ifdef USE_OS_THREADS
- 
-@@ -391,7 +391,8 @@ int CRYPTO_atomic_add(int *val, int amount, int *ret, 
CRYPTO_RWLOCK *lock) {
- 
- NOEXPORT void locking_init() {
-     size_t i;
--#if defined(USE_OS_THREADS) && OPENSSL_VERSION_NUMBER<0x10100004L
-+#if defined(USE_OS_THREADS) && \
-+      (OPENSSL_VERSION_NUMBER<0x10100004L || defined(LIBRESSL_VERSION_NUMBER))
-     size_t num;
- 
-     /* initialize the OpenSSL static locking */
-diff --git a/src/str.c b/src/str.c
-index 5b464a1..9837c49 100644
---- a/src/str.c
-+++ b/src/str.c
-@@ -93,7 +93,7 @@ NOEXPORT LEAK_ENTRY leak_hash_table[LEAK_TABLE_SIZE],
-     *leak_results[LEAK_TABLE_SIZE];
- NOEXPORT int leak_result_num=0;
- 
--#if OPENSSL_VERSION_NUMBER >= 0x10101000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10101000L && !defined(LIBRESSL_VERSION_NUMBER)
- DEFINE_STACK_OF(LEAK_ENTRY)
- #endif /* OpenSSL version >= 1.1.1 */
- 
-@@ -107,7 +107,9 @@ NOEXPORT ALLOC_LIST *get_alloc_list_ptr(void *, const char 
*, int);
- NOEXPORT void str_leak_debug(const ALLOC_LIST *, int);
- 
- NOEXPORT LEAK_ENTRY *leak_search(const ALLOC_LIST *);
-+#if !defined(LIBRESSL_VERSION_NUMBER)
- NOEXPORT int leak_cmp(const LEAK_ENTRY *const *, const LEAK_ENTRY *const *);
-+#endif /* LIBRESSL_VERSION_NUMBER */
- NOEXPORT void leak_report(void);
- NOEXPORT long leak_threshold(void);
- 
-@@ -555,7 +557,7 @@ NOEXPORT LEAK_ENTRY *leak_search(const ALLOC_LIST 
*alloc_list) {
- void leak_table_utilization() {
-     int i, utilization=0;
-     int64_t grand_total=0;
--#if OPENSSL_VERSION_NUMBER >= 0x10101000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10101000L && !defined(LIBRESSL_VERSION_NUMBER)
-     STACK_OF(LEAK_ENTRY) *stats;
- #endif /* OpenSSL version >= 1.1.1 */
- 
-@@ -572,7 +574,7 @@ void leak_table_utilization() {
-     s_log(LOG_DEBUG, "Leak detection table utilization: %d/%d (%05.2f%%)",
-         utilization, LEAK_TABLE_SIZE, 100.0*utilization/LEAK_TABLE_SIZE);
- 
--#if OPENSSL_VERSION_NUMBER >= 0x10101000L
-+#if OPENSSL_VERSION_NUMBER >= 0x10101000L && !defined(LIBRESSL_VERSION_NUMBER)
-     /* log up to 5 most frequently used heap allocations */
-     stats=sk_LEAK_ENTRY_new_reserve(leak_cmp, utilization);
-     for(i=0; i<LEAK_TABLE_SIZE; ++i)
-@@ -589,6 +591,7 @@ void leak_table_utilization() {
- #endif /* OpenSSL version >= 1.1.1 */
- }
- 
-+#if !defined(LIBRESSL_VERSION_NUMBER)
- NOEXPORT int leak_cmp(const LEAK_ENTRY *const *a, const LEAK_ENTRY *const *b) 
{
-     int64_t d = (*a)->total - (*b)->total;
-     if(d>0)
-@@ -597,6 +600,7 @@ NOEXPORT int leak_cmp(const LEAK_ENTRY *const *a, const 
LEAK_ENTRY *const *b) {
-         return -1;
-     return 0;
- }
-+#endif /* LIBRESSL_VERSION_NUMBER */
- 
- /* report identified leaks */
- NOEXPORT void leak_report() {
-diff --git a/src/tls.c b/src/tls.c
-index 691dfa2..bd1b66a 100644
---- a/src/tls.c
-+++ b/src/tls.c
-@@ -40,7 +40,7 @@
- volatile int tls_initialized=0;
- 
- NOEXPORT void tls_platform_init(void);
--#if OPENSSL_VERSION_NUMBER<0x10100000L
-+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
- NOEXPORT void free_function(void *);
- #endif
- 
-@@ -51,7 +51,7 @@ void tls_init() {
-     tls_platform_init();
-     tls_initialized=1;
-     ui_tls=tls_alloc(NULL, NULL, "ui");
--#if OPENSSL_VERSION_NUMBER>=0x10100000L
-+#if OPENSSL_VERSION_NUMBER>=0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
-     CRYPTO_set_mem_functions(str_alloc_detached_debug,
-         str_realloc_detached_debug, str_free_debug);
- #else
-@@ -184,7 +184,7 @@ TLS_DATA *tls_get() {
- 
- /**************************************** OpenSSL allocator hook */
- 
--#if OPENSSL_VERSION_NUMBER<0x10100000L
-+#if OPENSSL_VERSION_NUMBER<0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
- NOEXPORT void free_function(void *ptr) {
-     /* CRYPTO_set_mem_ex_functions() needs a function rather than a macro */
-     /* unfortunately, OpenSSL provides no file:line information here */
-diff --git a/src/verify.c b/src/verify.c
-index 4d8c087..9e71e2c 100644
---- a/src/verify.c
-+++ b/src/verify.c
-@@ -388,7 +388,7 @@ NOEXPORT int cert_check_local(X509_STORE_CTX 
*callback_ctx) {
-     cert=X509_STORE_CTX_get_current_cert(callback_ctx);
-     subject=X509_get_subject_name(cert);
- 
--#if OPENSSL_VERSION_NUMBER<0x10100006L
-+#if OPENSSL_VERSION_NUMBER<0x10100006L || defined(LIBRESSL_VERSION_NUMBER)
- #define X509_STORE_CTX_get1_certs X509_STORE_get1_certs
- #endif
-     /* modern API allows retrieving multiple matching certificates */

diff --git a/net-misc/stunnel/stunnel-5.68.ebuild 
b/net-misc/stunnel/stunnel-5.68.ebuild
deleted file mode 100644
index 969241b..0000000
--- a/net-misc/stunnel/stunnel-5.68.ebuild
+++ /dev/null
@@ -1,97 +0,0 @@
-# Copyright 1999-2025 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=8
-
-inherit ssl-cert systemd tmpfiles
-
-DESCRIPTION="TLS/SSL - Port Wrapper"
-HOMEPAGE="https://www.stunnel.org/index.html";
-SRC_URI="
-       https://www.stunnel.org/downloads/${P}.tar.gz
-       https://www.stunnel.org/stunnel/archive/${PV%%.*}.x/${P}.tar.gz
-"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~alpha amd64 arm ~arm64 ~hppa ~mips ppc ppc64 ~s390 sparc x86 
~amd64-linux ~x86-linux ~ppc-macos"
-IUSE="selinux stunnel3 tcpd"
-
-DEPEND="
-       dev-libs/openssl:0=
-       tcpd? ( sys-apps/tcp-wrappers )
-"
-
-RDEPEND="
-       acct-user/stunnel
-       acct-group/stunnel
-       ${DEPEND}
-       selinux? ( sec-policy/selinux-stunnel )
-       stunnel3? ( dev-lang/perl )
-"
-
-RESTRICT="test"
-
-src_prepare() {
-       # Hack away generation of certificate
-       sed -i -e "s/^install-data-local:/do-not-run-this:/" \
-               tools/Makefile.in || die "sed failed"
-
-       # bug 656420
-       eapply "${FILESDIR}"/${PN}-5.68-libressl.patch
-
-       echo "CONFIG_PROTECT=\"/etc/stunnel/stunnel.conf\"" > "${T}"/20stunnel
-
-       eapply_user
-}
-
-src_configure() {
-       local myeconfargs=(
-               --libdir="${EPREFIX}/usr/$(get_libdir)"
-               $(use_enable tcpd libwrap)
-               --with-ssl="${EPREFIX}"/usr
-               --disable-fips
-       )
-
-       econf "${myeconfargs[@]}"
-}
-
-src_install() {
-       emake DESTDIR="${D}" install
-       rm -rf "${ED}"/usr/share/doc/${PN}
-       rm -f "${ED}"/etc/stunnel/stunnel.conf-sample \
-               "${ED}"/usr/share/man/man8/stunnel.{fr,pl}.8
-       use stunnel3 || rm -f "${ED}"/usr/bin/stunnel3
-
-       dodoc AUTHORS.md BUGS.md CREDITS.md PORTS.md README.md TODO.md
-       docinto html
-       dodoc doc/stunnel.html doc/en/VNC_StunnelHOWTO.html tools/ca.html \
-               tools/importCA.html
-
-       insinto /etc/stunnel
-       doins "${FILESDIR}"/stunnel.conf
-       newinitd "${FILESDIR}"/stunnel-r2 stunnel
-
-       doenvd "${T}"/20stunnel
-
-       systemd_dounit "${S}/tools/stunnel.service"
-       newtmpfiles "${FILESDIR}"/stunnel.tmpfiles.conf stunnel.conf
-
-       find "${ED}" -name '*.la' -delete || die
-}
-
-pkg_postinst() {
-       if [ ! -f "${EROOT}"/etc/stunnel/stunnel.key ]; then
-               install_cert /etc/stunnel/stunnel
-               chown stunnel:stunnel 
"${EROOT}"/etc/stunnel/stunnel.{crt,csr,key,pem}
-               chmod 0640 "${EROOT}"/etc/stunnel/stunnel.{crt,csr,key,pem}
-       fi
-
-       tmpfiles_process stunnel.conf
-
-       einfo "If you want to run multiple instances of stunnel, create a new 
config"
-       einfo "file ending with .conf in /etc/stunnel/. **Make sure** you 
change "
-       einfo "\'pid= \' with a unique filename.  For openrc make a symlink 
from the"
-       einfo "stunnel init script to \'stunnel.name\' and use that to 
start|stop"
-       einfo "your custom instance"
-}

diff --git a/net-misc/stunnel/stunnel-5.71.ebuild 
b/net-misc/stunnel/stunnel-5.71.ebuild
deleted file mode 100644
index adfda6e..0000000
--- a/net-misc/stunnel/stunnel-5.71.ebuild
+++ /dev/null
@@ -1,120 +0,0 @@
-# Copyright 1999-2025 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=8
-
-PYTHON_COMPAT=( python3_{10..12} )
-inherit autotools python-any-r1 ssl-cert systemd tmpfiles
-
-DESCRIPTION="TLS/SSL - Port Wrapper"
-HOMEPAGE="https://www.stunnel.org/index.html";
-SRC_URI="
-       https://www.stunnel.org/downloads/${P}.tar.gz
-       https://www.stunnel.org/stunnel/archive/${PV%%.*}.x/${P}.tar.gz
-"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~alpha amd64 ~arm ~arm64 ~hppa ~mips ~ppc ~ppc64 ~s390 ~sparc x86 
~amd64-linux ~x86-linux ~ppc-macos"
-IUSE="selinux stunnel3 systemd tcpd test"
-RESTRICT="!test? ( test )"
-
-DEPEND="
-       dev-libs/openssl:=
-       tcpd? ( sys-apps/tcp-wrappers )
-       systemd? ( sys-apps/systemd:= )
-"
-RDEPEND="
-       ${DEPEND}
-       acct-user/stunnel
-       acct-group/stunnel
-       selinux? ( sec-policy/selinux-stunnel )
-       stunnel3? ( dev-lang/perl )
-"
-# autoconf-archive for F_S patch
-BDEPEND="
-       dev-build/autoconf-archive
-       test? ( ${PYTHON_DEPS} )
-"
-
-PATCHES=(
-       "${FILESDIR}"/${PN}-5.71-libressl.patch #656420
-       "${FILESDIR}"/${PN}-5.71-dont-clobber-fortify-source.patch
-       "${FILESDIR}"/${PN}-5.71-respect-EPYTHON-for-tests.patch
-)
-
-pkg_setup() {
-       use test && python-any-r1_pkg_setup
-}
-
-src_prepare() {
-       default
-
-       # Hack away generation of certificate
-       sed -i -e "s/^install-data-local:/do-not-run-this:/" \
-               tools/Makefile.am || die "sed failed"
-
-       echo "CONFIG_PROTECT=\"/etc/stunnel/stunnel.conf\"" > "${T}"/20stunnel 
|| die
-
-       # We pass --disable-fips to configure, so avoid spurious test failures
-       rm tests/plugins/p10_fips.py tests/plugins/p11_fips_cipher.py || die
-
-       # Needed for FORTIFY_SOURCE patch
-       eautoreconf
-}
-
-src_configure() {
-       local myeconfargs=(
-               --libdir="${EPREFIX}/usr/$(get_libdir)"
-               --with-ssl="${EPREFIX}"/usr
-               --disable-fips
-               $(use_enable tcpd libwrap)
-               $(use_enable systemd)
-       )
-
-       econf "${myeconfargs[@]}"
-}
-
-src_install() {
-       emake DESTDIR="${D}" install
-
-       rm -rf "${ED}"/usr/share/doc/${PN} || die
-       rm -f "${ED}"/etc/stunnel/stunnel.conf-sample \
-               "${ED}"/usr/share/man/man8/stunnel.{fr,pl}.8 || die
-
-       if ! use stunnel3 ; then
-               rm -f "${ED}"/usr/bin/stunnel3 || die
-       fi
-
-       dodoc AUTHORS.md BUGS.md CREDITS.md PORTS.md README.md TODO.md
-       docinto html
-       dodoc doc/stunnel.html doc/en/VNC_StunnelHOWTO.html tools/ca.html \
-               tools/importCA.html
-
-       insinto /etc/stunnel
-       doins "${FILESDIR}"/stunnel.conf
-       newinitd "${FILESDIR}"/stunnel-r2 stunnel
-
-       doenvd "${T}"/20stunnel
-
-       systemd_dounit "${S}/tools/stunnel.service"
-       newtmpfiles "${FILESDIR}"/stunnel.tmpfiles.conf stunnel.conf
-
-       find "${ED}" -name '*.la' -delete || die
-}
-
-pkg_postinst() {
-       if [[ ! -f "${EROOT}"/etc/stunnel/stunnel.key ]]; then
-               install_cert /etc/stunnel/stunnel
-               chown stunnel:stunnel 
"${EROOT}"/etc/stunnel/stunnel.{crt,csr,key,pem}
-               chmod 0640 "${EROOT}"/etc/stunnel/stunnel.{crt,csr,key,pem}
-       fi
-
-       tmpfiles_process stunnel.conf
-
-       einfo "If you want to run multiple instances of stunnel, create a new 
config"
-       einfo "file ending with .conf in /etc/stunnel/. **Make sure** you 
change "
-       einfo "\'pid= \' with a unique filename.  For openrc make a symlink 
from the"
-       einfo "stunnel init script to \'stunnel.name\' and use that to 
start|stop"
-       einfo "your custom instance"
-}

Reply via email to