commit:     8a72f62b921efb43ace48874bbc8cfb2241648f0
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Wed Feb  4 03:12:46 2026 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Wed Feb  4 03:21:13 2026 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=8a72f62b

app-crypt/gnupg: backport LTO fix

I sent a fix upstream for this and Werner ended up merging an identical
patch as he'd missed mine. Backport that and drop filter-lto.

There is an additional fix which didn't land that I'll send upstream
once rebased soon but it's trivial.

Bug: https://bugs.gentoo.org/854222
Bug: https://dev.gnupg.org/T4416
Signed-off-by: Sam James <sam <AT> gentoo.org>

 ...-stub-functions-to-avoid-LTO-linking-bugs.patch | 200 +++++++++++++++++++
 ...ctions-to-avoid-LTO-linking-bugs-followup.patch |  47 +++++
 app-crypt/gnupg/gnupg-2.5.17-r1.ebuild             | 220 +++++++++++++++++++++
 3 files changed, 467 insertions(+)

diff --git 
a/app-crypt/gnupg/files/0001-Fix-stub-functions-to-avoid-LTO-linking-bugs.patch 
b/app-crypt/gnupg/files/0001-Fix-stub-functions-to-avoid-LTO-linking-bugs.patch
new file mode 100644
index 000000000000..65ff69294d40
--- /dev/null
+++ 
b/app-crypt/gnupg/files/0001-Fix-stub-functions-to-avoid-LTO-linking-bugs.patch
@@ -0,0 +1,200 @@
+https://bugs.gentoo.org/854222
+
+From 81760cc931d69f37cf2a8ad54616a1af590fd2cf Mon Sep 17 00:00:00 2001
+Message-ID: 
<81760cc931d69f37cf2a8ad54616a1af590fd2cf.1770174575.git....@gentoo.org>
+From: Werner Koch <[email protected]>
+Date: Wed, 28 Jan 2026 13:45:00 +0100
+Subject: [PATCH GnuPG] Fix stub functions to avoid LTO linking bugs.
+
+--
+---
+ g10/gpgv.c       | 42 ++++++++++++++++++++++++++++--------------
+ g10/test-stubs.c | 36 +++++++++++++++++++++++-------------
+ 2 files changed, 51 insertions(+), 27 deletions(-)
+
+diff --git a/g10/gpgv.c b/g10/gpgv.c
+index b65dfa66b..23704e21c 100644
+--- a/g10/gpgv.c
++++ b/g10/gpgv.c
+@@ -462,10 +462,13 @@ keyserver_any_configured (ctrl_t ctrl)
+ }
+ 
+ int
+-keyserver_import_keyid (u32 *keyid, void *dummy, unsigned int flags)
++keyserver_import_keyid (ctrl_t ctrl,
++                        u32 *keyid,struct keyserver_spec *keyserver,
++                        unsigned int flags)
+ {
++  (void)ctrl;
+   (void)keyid;
+-  (void)dummy;
++  (void)keyserver;
+   (void)flags;
+   return -1;
+ }
+@@ -493,9 +496,14 @@ keyserver_import_fpr_ntds (ctrl_t ctrl,
+ }
+ 
+ int
+-keyserver_import_cert (const char *name)
++keyserver_import_cert (ctrl_t ctrl, const char *name, int dane_mode,
++                       unsigned char **fpr,size_t *fpr_len)
+ {
++  (void)ctrl;
+   (void)name;
++  (void)dane_mode;
++  (void)fpr;
++  (void)fpr_len;
+   return -1;
+ }
+ 
+@@ -511,11 +519,17 @@ keyserver_import_wkd (ctrl_t ctrl, const char *name, 
unsigned int flags,
+   return GPG_ERR_BUG;
+ }
+ 
+-int
+-keyserver_import_mbox (const char *name,struct keyserver_spec *spec)
++gpg_error_t
++keyserver_import_mbox (ctrl_t ctrl, const char *mbox,
++                       unsigned char **fpr, size_t *fprlen,
++                       struct keyserver_spec *keyserver, unsigned int flags)
+ {
+-  (void)name;
+-  (void)spec;
++  (void)ctrl;
++  (void)mbox;
++  (void)fpr;
++  (void)fprlen;
++  (void)keyserver;
++  (void)flags;
+   return -1;
+ }
+ 
+@@ -647,14 +661,11 @@ parse_preferred_keyserver(PKT_signature *sig)
+   return NULL;
+ }
+ 
+-struct keyserver_spec *
+-parse_keyserver_uri (const char *uri, int require_scheme,
+-                     const char *configname, unsigned int configlineno)
++keyserver_spec_t
++parse_keyserver_uri (const char *string, int require_scheme)
+ {
+-  (void)uri;
++  (void)string;
+   (void)require_scheme;
+-  (void)configname;
+-  (void)configlineno;
+   return NULL;
+ }
+ 
+@@ -666,11 +677,14 @@ free_keyserver_spec (struct keyserver_spec *keyserver)
+ 
+ /* Stubs to avoid linking to photoid.c */
+ void
+-show_photos (const struct user_attribute *attrs, int count, PKT_public_key 
*pk)
++show_photos (ctrl_t ctrl, const struct user_attribute *attrs, int count,
++             PKT_public_key *pk, PKT_user_id *uid)
+ {
++  (void)ctrl;
+   (void)attrs;
+   (void)count;
+   (void)pk;
++  (void)uid;
+ }
+ 
+ int
+diff --git a/g10/test-stubs.c b/g10/test-stubs.c
+index 9b41c8929..16d10972d 100644
+--- a/g10/test-stubs.c
++++ b/g10/test-stubs.c
+@@ -193,10 +193,13 @@ keyserver_any_configured (ctrl_t ctrl)
+ }
+ 
+ int
+-keyserver_import_keyid (u32 *keyid, void *dummy, unsigned int flags)
++keyserver_import_keyid (ctrl_t ctrl,
++                        u32 *keyid,struct keyserver_spec *keyserver,
++                        unsigned int flags)
+ {
++  (void)ctrl;
+   (void)keyid;
+-  (void)dummy;
++  (void)keyserver;
+   (void)flags;
+   return -1;
+ }
+@@ -224,9 +227,14 @@ keyserver_import_fpr_ntds (ctrl_t ctrl,
+ }
+ 
+ int
+-keyserver_import_cert (const char *name)
++keyserver_import_cert (ctrl_t ctrl, const char *name, int dane_mode,
++                       unsigned char **fpr,size_t *fpr_len)
+ {
++  (void)ctrl;
+   (void)name;
++  (void)dane_mode;
++  (void)fpr;
++  (void)fpr_len;
+   return -1;
+ }
+ 
+@@ -242,15 +250,17 @@ keyserver_import_wkd (ctrl_t ctrl, const char *name, 
unsigned int flags,
+   return GPG_ERR_BUG;
+ }
+ 
+-int
+-keyserver_import_mbox (ctrl_t ctrl, const char *mbox, unsigned char **fpr,
+-                       size_t *fprlen, struct keyserver_spec *keyserver)
++gpg_error_t
++keyserver_import_mbox (ctrl_t ctrl, const char *mbox,
++                       unsigned char **fpr, size_t *fprlen,
++                       struct keyserver_spec *keyserver, unsigned int flags)
+ {
+   (void)ctrl;
+   (void)mbox;
+   (void)fpr;
+   (void)fprlen;
+   (void)keyserver;
++  (void)flags;
+   return -1;
+ }
+ 
+@@ -381,14 +391,11 @@ parse_preferred_keyserver(PKT_signature *sig)
+   return NULL;
+ }
+ 
+-struct keyserver_spec *
+-parse_keyserver_uri (const char *uri, int require_scheme,
+-                     const char *configname, unsigned int configlineno)
++keyserver_spec_t
++parse_keyserver_uri (const char *string, int require_scheme)
+ {
+-  (void)uri;
++  (void)string;
+   (void)require_scheme;
+-  (void)configname;
+-  (void)configlineno;
+   return NULL;
+ }
+ 
+@@ -400,11 +407,14 @@ free_keyserver_spec (struct keyserver_spec *keyserver)
+ 
+ /* Stubs to avoid linking to photoid.c */
+ void
+-show_photos (const struct user_attribute *attrs, int count, PKT_public_key 
*pk)
++show_photos (ctrl_t ctrl, const struct user_attribute *attrs, int count,
++             PKT_public_key *pk, PKT_user_id *uid)
+ {
++  (void)ctrl;
+   (void)attrs;
+   (void)count;
+   (void)pk;
++  (void)uid;
+ }
+ 
+ int
+-- 
+2.53.0
+

diff --git 
a/app-crypt/gnupg/files/0002-Fix-stub-functions-to-avoid-LTO-linking-bugs-followup.patch
 
b/app-crypt/gnupg/files/0002-Fix-stub-functions-to-avoid-LTO-linking-bugs-followup.patch
new file mode 100644
index 000000000000..751a1c9a4250
--- /dev/null
+++ 
b/app-crypt/gnupg/files/0002-Fix-stub-functions-to-avoid-LTO-linking-bugs-followup.patch
@@ -0,0 +1,47 @@
+https://bugs.gentoo.org/854222
+
+From 40b28085f30f6031bd72ae24d736c9116d70f547 Mon Sep 17 00:00:00 2001
+Message-ID: 
<40b28085f30f6031bd72ae24d736c9116d70f547.1770174958.git....@gentoo.org>
+From: Sam James <[email protected]>
+Date: Sun, 4 Jan 2026 02:04:39 +0000
+Subject: [PATCH GnuPG] Fix -Wlto-type-mismatch warnings [T4416]
+
+* agent/t-protect.c (convert_from_openpgp_native): Sync stub definition.
+
+--
+
+GnuPG-bug-id: 4416
+
+When building with GCC -flto, some warnings appear because of
+mismatched definitions in stubs (gpgv or tests). Sync them with the
+real definitions to fix the warnings, as they just drifted over time.
+
+Followup to 81760cc931d69f37cf2a8ad54616a1af590fd2cf.
+
+Signed-off-by: Sam James <[email protected]>
+---
+ agent/t-protect.c | 7 +++++--
+ 1 file changed, 5 insertions(+), 2 deletions(-)
+
+diff --git a/agent/t-protect.c b/agent/t-protect.c
+index e6edbffba..9508de36a 100644
+--- a/agent/t-protect.c
++++ b/agent/t-protect.c
+@@ -341,9 +341,12 @@ main (int argc, char **argv)
+ 
+ /* Stub function.  */
+ gpg_error_t
+-convert_from_openpgp_native (gcry_sexp_t s_pgp, const char *passphrase,
+-                             unsigned char **r_key)
++convert_from_openpgp_native (ctrl_t ctrl,
++                           gcry_sexp_t s_pgp,
++                           const char *passphrase,
++                           unsigned char **r_key)
+ {
++  (void)ctrl;
+   (void)s_pgp;
+   (void)passphrase;
+   (void)r_key;
+-- 
+2.53.0
+

diff --git a/app-crypt/gnupg/gnupg-2.5.17-r1.ebuild 
b/app-crypt/gnupg/gnupg-2.5.17-r1.ebuild
new file mode 100644
index 000000000000..7453a3b2180e
--- /dev/null
+++ b/app-crypt/gnupg/gnupg-2.5.17-r1.ebuild
@@ -0,0 +1,220 @@
+# Copyright 1999-2026 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+# Maintainers should:
+# 1. Join the "Gentoo" project at https://dev.gnupg.org/project/view/27/
+# 2. Subscribe to release tasks like https://dev.gnupg.org/T6159
+# (find the one for the current release then subscribe to it +
+# any subsequent ones linked within so you're covered for a while.)
+
+VERIFY_SIG_OPENPGP_KEY_PATH=/usr/share/openpgp-keys/gnupg.asc
+# in-source builds are not supported: https://dev.gnupg.org/T6313#166339
+inherit flag-o-matic out-of-source multiprocessing systemd toolchain-funcs 
verify-sig
+
+MY_P="${P/_/-}"
+
+DESCRIPTION="The GNU Privacy Guard, a GPL OpenPGP implementation"
+HOMEPAGE="https://gnupg.org/";
+SRC_URI="mirror://gnupg/gnupg/${MY_P}.tar.bz2"
+SRC_URI+=" verify-sig? ( mirror://gnupg/gnupg/${P}.tar.bz2.sig )"
+S="${WORKDIR}/${MY_P}"
+
+LICENSE="GPL-3+"
+SLOT="0"
+KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 
~riscv ~s390 ~sparc ~x86 ~arm64-macos ~x64-macos ~x64-solaris"
+IUSE="+alternatives bzip2 doc ldap nls readline selinux +smartcard ssl test 
+tofu tpm tools usb user-socket wks-server"
+RESTRICT="!test? ( test )"
+REQUIRED_USE="test? ( tofu )"
+
+# Existence of executables is checked during configuration.
+# Note: On each bump, update dep bounds on each version from configure.ac!
+DEPEND="
+       >=dev-libs/libassuan-3.0.0-r1:=
+       >=dev-libs/libgcrypt-1.11.0:=
+       >=dev-libs/libgpg-error-1.56
+       >=dev-libs/libksba-1.6.3
+       >=dev-libs/npth-1.2
+       virtual/zlib:=
+       bzip2? ( app-arch/bzip2 )
+       ldap? ( net-nds/openldap:= )
+       readline? ( sys-libs/readline:0= )
+       smartcard? ( usb? ( virtual/libusb:1 ) )
+       tofu? ( >=dev-db/sqlite-3.27 )
+       tpm? ( >=app-crypt/tpm2-tss-2.4.0:= )
+       ssl? ( >=net-libs/gnutls-3.2:0= )
+"
+RDEPEND="
+       ${DEPEND}
+       nls? ( virtual/libintl )
+       selinux? ( sec-policy/selinux-gpg )
+       wks-server? ( virtual/mta )
+"
+PDEPEND="
+       app-crypt/pinentry
+       alternatives? (
+               app-alternatives/gpg[-freepg(-)]
+       )
+"
+BDEPEND="
+       virtual/pkgconfig
+       doc? ( sys-apps/texinfo )
+       nls? ( sys-devel/gettext )
+       verify-sig? ( sec-keys/openpgp-keys-gnupg )
+"
+
+DOCS=(
+       ChangeLog NEWS README THANKS TODO VERSION
+       doc/FAQ doc/DETAILS doc/HACKING doc/TRANSLATE doc/OpenPGP doc/KEYSERVER
+)
+
+PATCHES=(
+       
"${FILESDIR}"/${PN}-2.1.20-gpgscm-Use-shorter-socket-path-lengts-to-improve-tes.patch
+       "${FILESDIR}"/0001-Fix-stub-functions-to-avoid-LTO-linking-bugs.patch
+       
"${FILESDIR}"/0002-Fix-stub-functions-to-avoid-LTO-linking-bugs-followup.patch
+)
+
+src_prepare() {
+       default
+
+       GNUPG_SYSTEMD_UNITS=(
+               dirmngr.service
+               dirmngr.socket
+               gpg-agent-browser.socket
+               gpg-agent-extra.socket
+               gpg-agent.service
+               gpg-agent.socket
+               gpg-agent-ssh.socket
+       )
+
+       cp "${GNUPG_SYSTEMD_UNITS[@]/#/${FILESDIR}/}" "${T}" || die
+
+       # Inject SSH_AUTH_SOCK into user's sessions after enabling 
gpg-agent-ssh.socket in systemctl --user mode,
+       # idea borrowed from libdbus, see
+       #   
https://gitlab.freedesktop.org/dbus/dbus/-/blob/master/bus/systemd-user/dbus.socket.in#L6
+       #
+       # This cannot be upstreamed, as it requires determining the exact 
prefix of 'systemctl',
+       # which in turn requires discovery in Autoconf, something that upstream 
deeply resents.
+       sed -e "/DirectoryMode=/a ExecStartPost=-${EPREFIX}/bin/systemctl 
--user set-environment SSH_AUTH_SOCK=%t/gnupg/S.gpg-agent.ssh" \
+               -i "${T}"/gpg-agent-ssh.socket || die
+
+       # Since 2.5.3, --supervised is called --deprecated-supervised.  See
+       # https://dev.gnupg.org/rGa019a0fcd8dfb9d1eae5bc991fdd54b7cf55641e
+       sed -i "s/--supervised/--deprecated-supervised/g" "${T}"/*.service || 
die
+}
+
+my_src_configure() {
+       local myconf=(
+               $(use_enable bzip2)
+               $(use_enable nls)
+               $(use_enable smartcard scdaemon)
+               $(use_enable ssl gnutls)
+               $(use_enable test all-tests)
+               $(use_enable test tests)
+               $(use_enable tofu)
+               $(use_enable tofu keyboxd)
+               $(use_enable tofu sqlite)
+               $(usex tpm '--with-tss=intel' '--disable-tpm2d')
+               $(use smartcard && use_enable usb ccid-driver || echo 
'--disable-ccid-driver')
+               $(use_enable wks-server wks-tools)
+               $(use_with ldap)
+               $(use_with readline)
+
+               # Hardcode mailprog to /usr/libexec/sendmail even if it does 
not exist.
+               # As of GnuPG 2.3, the mailprog substitution is used for the 
binary called
+               # by wks-client & wks-server; and if it's autodetected but not 
not exist at
+               # build time, then then 'gpg-wks-client --send' functionality 
will not
+               # work. This has an unwanted side-effect in stage3 builds: 
there was a
+               # [R]DEPEND on virtual/mta, which also brought in 
virtual/logger, bloating
+               # the build where the install guide previously make the user 
chose the
+               # logger & mta early in the install.
+               --with-mailprog=/usr/libexec/sendmail
+
+               --disable-ntbtls
+               --enable-gpgsm
+               --enable-large-secmem
+
+               CC_FOR_BUILD="$(tc-getBUILD_CC)"
+               GPGRT_CONFIG="${ESYSROOT}/usr/bin/${CHOST}-gpgrt-config"
+
+               $("${S}/configure" --help | grep -o -- '--without-.*-prefix')
+       )
+
+       if use prefix && use usb; then
+               # bug #649598
+               append-cppflags -I"${ESYSROOT}/usr/include/libusb-1.0"
+       fi
+
+       if [[ ${CHOST} == *-solaris* ]] ; then
+               # these somehow are treated as fatal, but Solaris has different
+               # types for getpeername with socket_t
+               append-flags -Wno-incompatible-pointer-types
+               append-flags -Wno-unused-label
+       fi
+
+       # bug #663142
+       if use user-socket; then
+               myconf+=( --enable-run-gnupg-user-socket )
+       fi
+
+       # glib fails and picks up clang's internal stdint.h causing weird errors
+       tc-is-clang && export 
gl_cv_absolute_stdint_h="${ESYSROOT}"/usr/include/stdint.h
+
+       econf "${myconf[@]}"
+}
+
+my_src_compile() {
+       default
+
+       use doc && emake -C doc html
+}
+
+my_src_test() {
+       export TESTFLAGS="--parallel=$(makeopts_jobs)"
+
+       default
+}
+
+my_src_install() {
+       emake DESTDIR="${D}" install
+
+       use tools && dobin tools/{gpgconf,gpgsplit,gpg-check-pattern} 
tools/make-dns-cert
+
+       if use alternatives; then
+               # rename for app-alternatives/gpg
+               mv "${ED}"/usr/bin/gpg{,-reference} || die
+               mv "${ED}"/usr/bin/gpgv{,-reference} || die
+               mv "${ED}"/usr/share/man/man1/gpg{,-reference}.1 || die
+               mv "${ED}"/usr/share/man/man1/gpgv{,-reference}.1 || die
+       else
+               dosym gpg /usr/bin/gpg2
+               dosym gpgv /usr/bin/gpgv2
+               echo ".so man1/gpg.1" > "${ED}"/usr/share/man/man1/gpg2.1 || die
+               echo ".so man1/gpgv.1" > "${ED}"/usr/share/man/man1/gpgv2.1 || 
die
+       fi
+
+       use doc && dodoc doc/gnupg.html/*
+}
+
+my_src_install_all() {
+       einstalldocs
+
+       use tools && dobin tools/{convert-from-106,mail-signed-keys,lspgpot}
+       use doc && dodoc doc/*.png
+
+       # Dropped upstream in 
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=eae28f1bd4a5632e8f8e85b7248d1c4d4a10a5ed.
+       dodoc "${FILESDIR}"/README-systemd
+       systemd_douserunit "${GNUPG_SYSTEMD_UNITS[@]/#/${T}/}"
+}
+
+pkg_postinst() {
+       # If /usr/bin/gpg and /usr/bin/gpgv do not exist, provide them.
+       if [[ ! -e ${EROOT}/usr/bin/gpg ]]; then
+               ln -sf -- gpg-reference "${EROOT}"/usr/bin/gpg || die
+       fi
+
+       if [[ ! -e ${EROOT}/usr/bin/gpgv ]]; then
+               ln -sf -- gpgv-reference "${EROOT}"/usr/bin/gpgv || die
+       fi
+}

Reply via email to