commit:     f2e20d1658c7955020ef48cfde79717ac5af4a97
Author:     Anthony G. Basile <blueness <AT> gentoo <DOT> org>
AuthorDate: Wed Nov 25 01:06:16 2015 +0000
Commit:     Anthony G. Basile <blueness <AT> gentoo <DOT> org>
CommitDate: Wed Nov 25 01:06:16 2015 +0000
URL:        https://gitweb.gentoo.org/proj/musl.git/commit/?id=f2e20d16

net-misc/openssh: in tree version works.

 net-misc/openssh/Manifest                          |  18 --
 .../openssh/files/openssh-4.7_p1-GSSAPI-dns.patch  | 127 ---------
 .../files/openssh-6.3_p1-x509-hpn14v2-glue.patch   |  51 ----
 .../openssh-6.7_p1-openssl-ignore-status.patch     |  17 --
 .../openssh-6.8_p1-ssl-engine-configure.patch      |  33 ---
 .../openssh-6.9_p1-remove-stackprotector.patch     |  51 ----
 net-misc/openssh/files/sshd.confd                  |  21 --
 net-misc/openssh/files/sshd.pam_include.2          |   4 -
 net-misc/openssh/files/sshd.rc6.4                  |  87 ------
 net-misc/openssh/files/sshd.service                |  11 -
 net-misc/openssh/files/sshd.socket                 |  10 -
 net-misc/openssh/files/sshd_at.service             |   8 -
 net-misc/openssh/metadata.xml                      |  34 ---
 net-misc/openssh/openssh-6.9_p1-r99.ebuild         | 314 ---------------------
 14 files changed, 786 deletions(-)

diff --git a/net-misc/openssh/Manifest b/net-misc/openssh/Manifest
deleted file mode 100644
index 5d2f675..0000000
--- a/net-misc/openssh/Manifest
+++ /dev/null
@@ -1,18 +0,0 @@
-AUX openssh-4.7_p1-GSSAPI-dns.patch 4494 SHA256 
88a08f349258d4be5b2faa838a89fe1aa0196502990b745ac0e3a70dda30a0d7 SHA512 
4d00a9ed79f66b92502c3e5ee580523f63d7b3643fe1bd330ff97994acce527d4d285d38199cef66eddc0ef68afabf7b268abc60cba871bac5d2e99045d4ac11
 WHIRLPOOL 
2f118fd2f016c529dbc31e8f2b6b418931e6770ab02c28b7feeaba93e84e7fcd1c742f4420a43a9fec0bdfaa4d4bc7cf14fb860c0a56c68a30e7b136fb60bcdb
-AUX openssh-6.3_p1-x509-hpn14v2-glue.patch 1451 SHA256 
d7179b3c16edd065977aaf56a410e2b9b237206fb619474f312972b430b73c8d SHA512 
02577e3f718ff994bb4e962189f17048b4c03104d0a1981683f3c6a1d6d30701db368e132102c8396da2c0f5eb2f6602b26f32f74d19382af34bd9a93fc508f3
 WHIRLPOOL 
b7d224d71634f380bd31b3a1dd3e588a29582255f717a6a308738ad58b485b693d827a53704479995ec2ebca53c9dc9b2113d8de52a1336b67ce83943f946b77
-AUX openssh-6.7_p1-openssl-ignore-status.patch 765 SHA256 
b068cc30d4bce5c457cea78233396c9793864ec909f810dd0be87d913673433a SHA512 
ab15d6dfdb8d59946684501f6f30ac0eb82676855b7b57f19f2027a7ada072f9062fcb96911111a50cfc3838492faddd282db381ec83d22462644ccddccf0ae7
 WHIRLPOOL 
c0a4ff69d65eeb40c1ace8d5be6f8e59044a8f16dc6b37e87393e79ab80935abf30a9d2a6babc043aba0477f5f79412e1ae5d373daba580178fd85ca1f60e60b
-AUX openssh-6.8_p1-ssl-engine-configure.patch 936 SHA256 
cb3f34ef031aa5360b082468b4afb8b7fd2c778c990c2f20fda250167725ff88 SHA512 
4b7840f719ad58c1f196327a52534f0a21264ce47e8df4a335e9f58d9d5eae33dbb9a75a2a714c3bdae6bee04728e66020ed57eb521fc1164521c4c5aa4a9a93
 WHIRLPOOL 
662d6eedb091021d5da4cdbd6d623e3678e54fb75cb52d8afdc4ef9c31f98d95f8445c2fde834d622b0aabf8b9593244847da574201ed176c350747526a28fe5
-AUX openssh-6.9_p1-remove-stackprotector.patch 1574 SHA256 
a8d96a7f273f8920a96c87ad258fd88d939ae51dd05893869f4b0ab4ffe7563b SHA512 
4e720add3384031173ed86d147d062a2f3b6cb3f87bd9d47a0369d2634c1beaf791c613d1498031e9b476d47a1c8682bb0297fd2c97724a6a09a769c2182de0e
 WHIRLPOOL 
1bd560bb1befcafea2fe3e60f9a20a9e214c38516cca763b99e188a5ffafba7590b7ee7f370688c4d50476505e9b8412349fe37f69d51263eb4461d016c53a23
-AUX sshd.confd 396 SHA256 
29c6d57ac3ec6018cadc6ba6cd9b90c9ed46e20049b970fdcc68ee2481a2ee41 SHA512 
b9ae816af54a55e134a9307e376f05367b815f1b3fd545c2a2c312d18aedcf907f413e8bad8db980cdd9aad4011a72a79e1e94594f69500939a9cb46287f2f81
 WHIRLPOOL 
69f43e6192e009a4663d130f7e40ee8b13c6eb9cc7d960b5e0e22f5d477649c88806a9d219efef211f4346582c2bb51e40d230a8191e5953dbe08bfff976ae53
-AUX sshd.pam_include.2 156 SHA256 
166136e27d653e0bf481a6ca79fecb7d9fa2fc3d597d041f97df595f65a8193c SHA512 
d3f7e6ca8c9f2b5060ebccb259316bb59c9a7e158e8ef9466765a20db263a4043a590811f1a3ab072b718dbd70898bc69b77e0b19603d7f394b5ac1bd0a4a56c
 WHIRLPOOL 
ba7a0a8c3bb39c5fda69de34b822a19696398e0a8789211ac1faae787ee34f9639eb35efe29c67f874b5f9fe674742503e570f441c005974f4a0c93468b8970b
-AUX sshd.rc6.4 2313 SHA256 
97221a017d8ee9de996277c5a794d973a0b5e8180c29c97b3652bd1984a7b5d0 SHA512 
88826bc9923299ac4c1502e7076483d6c197fd5a0e693bc2e1690f82bcd7d1bbd144aae2ffd92acb28d6fe912233aa93346e00c72917de65c22811ce9cd5bff7
 WHIRLPOOL 
a77bad5891eb74770ae12e79131a99e5645a83841d14f1d60e39581a23b9d86e66b2e5fb7d0c989afac410eb5c6a627b83389d54085d1b78c89fc07852f8eb66
-AUX sshd.service 242 SHA256 
1351c43fe8287f61255ace9fa20790f770d69296b4dd31b0c583983d4cc59843 SHA512 
77f50c85a2c944995a39819916eb860cfdc1aff90986e93282e669a0de73c287ecb92d550fd118cfcc8ab538eab677e0d103b23cd959b7e8d9801bc37250c39c
 WHIRLPOOL 
0f5c48d709274c526ceee4f26e35dcb00816ffa9d6661acc1e4e462acb38c3c6108b0e87783eff9da1b1868127c5550c57a5a0a9d7270b927ac4b92191876989
-AUX sshd.socket 136 SHA256 
c055abcd10c5d372119cbc3708661ddffccdee7a1de1282559c54d03e2f109d9 SHA512 
4d31d373b7bdae917dc0cf05418c71d4743e98e354aefcf055f88f55c9c644a5a0e0e605dbb8372c1b98d17c0ea1c8c0fee27d38ab8dbe23c7e420a6a78c6d42
 WHIRLPOOL 
102d87b708c31e5994e8005437c78b1aa756c6def4ee9ae2fa9be1438f328fc28c9152a4ff2528941be18f1311594490ecd98b66716ec74e970aa3725a98e2e5
-AUX sshd_at.service 176 SHA256 
332f5ffc30456fe2494095c2aabd1e6e02075ce224e2d49708ac7ccf6d341998 SHA512 
662a9c2668902633e6dbcb9435ac35bec3e224afdb2ab6a1df908618536ae9fc1958ba1d611e146c01fddb0c8f41eefdc26de78f45b7f165b1d6b2ee2f23be2a
 WHIRLPOOL 
aeb32351380dd674ef7a2e7b537f43116c189f7fddb8bdb8b2c109e9f62b0a73cc0f29f2d46270e658ab6409b8d3671ce9e0d0ba7c0d3674c2f85291a73e6df1
-DIST openssh-6.8_p1-sctp.patch.xz 7388 SHA256 
2c74dd00aaae9f4de908d8e5685ae982779a5069996b98d55e8408eada739a19 SHA512 
f93a1d27bc3e57a6d4fa717c9d5ece4f28196f8539cb2f2efc4285dce9a2e94a3f5a59d18fc01ea73a94e90630cee7621240455fce146f781cf7091a828f2db0
 WHIRLPOOL 
7fb3346c3444654988303ff2a941345c00412a8012d6d419c9e4f870ef4c3362f92a4020d7bff2dc5d1ff9e42cf7287c4346909f8db07154783d5359a73a7476
-DIST openssh-6.9p1+x509-8.4.diff.gz 425687 SHA256 
0ed8bfff0d2ecd9f3791ae1f168ca3270bb66d7ab7bc0a8ff2d61d2ab829c3fb SHA512 
596cb65408db06fb299b92160147685b001dc23929ecf5c4bd11a8b0475d79695c7b4dbe8a878d7fbcd944155935fd62a14e35c79204b39e413f5eaa961ef76c
 WHIRLPOOL 
771fa0f4f6a20ed49ba201605fcdcbfc41a0f094ef4a89ca2433ee51b7c8bf99cc266f26bd7877c61ff92e9a50c7d65119ba75ba64eaa029bd567bab3ee243c2
-DIST openssh-6.9p1-r1-hpnssh14v5.tar.xz 21396 SHA256 
84e9e28a1488ccf66e29a7c90442b3bc4833a6fa186260fb6853b5a1b19c0beb SHA512 
476064dbdb3d82b86ad7c481a4a301ff0d46bd281fe7ca0c29f34ae50b0034028760997ae2c934a265499c154f4534d35ead647aa63d1a4545ed503a5364eada
 WHIRLPOOL 
74eaf2fe0a6ecd0e2fa5078034628d4c76c75b121f3c813ff8a098ab28363daa3800d03936046aa3aebbfdab3afd31ef30a207399f5e305d7f71e5f3c7e4f4a7
-DIST openssh-6.9p1.tar.gz 1487617 SHA256 
6e074df538f357d440be6cf93dc581a21f22d39e236f217fcd8eacbb6c896cfe SHA512 
68fec9b4e512fe126a5d35b01e2cc656d810b75052ed8a36bc85cd0a05de7318b15ed287bc95cf9bcb3fa2f385029151d85aced55e07fbcc79e6c779bee6751d
 WHIRLPOOL 
1dcb291383c9f934b512f61ce9f6e0319f22e112ce3f6eace2a868ca0f99c709c65bae14a9815e2ef237f8132fe72c583cffb7ea20bdfa2aaa77cf347967be7f
-DIST openssh-lpk-6.8p1-0.3.14.patch.xz 16940 SHA256 
d5f048dc7e9d3fca085c152fc31306f1d8fa793e524c538295915b075ec085b0 SHA512 
2470b6b46f8c7ac985f82d14b788a3eb81a468a1d5013cb7f89257d9dd78b6037e24bf54ac57b757db8ed1df24332d659cf918c11ea73592fd24a69c25a54081
 WHIRLPOOL 
b041ee9e0efdf370686f11df4131ab5e5ffb2f11cc66c386a8223bf563c5b78ab9443f06e4adc2e506e440cdec9dc5b20f5972cd8d691d786d2f903bb49b947b
-EBUILD openssh-6.9_p1-r99.ebuild 9806 SHA256 
2360ba25d6c04203dc83316981212858358412aba721a950a149fe90de06a3a7 SHA512 
c3e3a9ead1e3b9d7416d942ea1b9a9ab908efca3d09ecf52ff5d2987e90ec4362c73597bc5b4dd42725559abc2a835f37b49ae96b8371120e1a70e6abf07e0a0
 WHIRLPOOL 
602cd12b21ed055fa5c83e08c903fa790a476302a69df9b23442e507e54fa627dea325e6c4fd0c244e8bc3c366f70302b1398d603d31dfbe87ebe87a6e5c1fdc
-MISC metadata.xml 1912 SHA256 
7b838285f09ad395f237a0d0b9963eee86d0e85b58e6e5b4d5edb093fa888a0a SHA512 
e55c10ffd12488720c3da19e55942cfedec63fe767fc1608439b5a3932eeb5488086ad7ef4e1f858c89381e737426f035845ea5e8bede4ed8a0ccabdc656d9b5
 WHIRLPOOL 
5c07b3dd4a4002cff5df62133ecf570bf79f58e9477d0ad25d60f185ee029183d11118147e3adfec373542659d921e99e787054cfe9284031c974d694de6e9ed

diff --git a/net-misc/openssh/files/openssh-4.7_p1-GSSAPI-dns.patch 
b/net-misc/openssh/files/openssh-4.7_p1-GSSAPI-dns.patch
deleted file mode 100644
index c81ae5c..0000000
--- a/net-misc/openssh/files/openssh-4.7_p1-GSSAPI-dns.patch
+++ /dev/null
@@ -1,127 +0,0 @@
-http://bugs.gentoo.org/165444
-https://bugzilla.mindrot.org/show_bug.cgi?id=1008
-
-Index: readconf.c
-===================================================================
-RCS file: /cvs/openssh/readconf.c,v
-retrieving revision 1.135
-diff -u -r1.135 readconf.c
---- readconf.c 5 Aug 2006 02:39:40 -0000       1.135
-+++ readconf.c 19 Aug 2006 11:59:52 -0000
-@@ -126,6 +126,7 @@
-       oClearAllForwardings, oNoHostAuthenticationForLocalhost,
-       oEnableSSHKeysign, oRekeyLimit, oVerifyHostKeyDNS, oConnectTimeout,
-       oAddressFamily, oGssAuthentication, oGssDelegateCreds,
-+      oGssTrustDns, 
-       oServerAliveInterval, oServerAliveCountMax, oIdentitiesOnly,
-       oSendEnv, oControlPath, oControlMaster, oHashKnownHosts,
-       oTunnel, oTunnelDevice, oLocalCommand, oPermitLocalCommand,
-@@ -163,9 +164,11 @@
- #if defined(GSSAPI)
-       { "gssapiauthentication", oGssAuthentication },
-       { "gssapidelegatecredentials", oGssDelegateCreds },
-+      { "gssapitrustdns", oGssTrustDns },
- #else
-       { "gssapiauthentication", oUnsupported },
-       { "gssapidelegatecredentials", oUnsupported },
-+      { "gssapitrustdns", oUnsupported },
- #endif
-       { "fallbacktorsh", oDeprecated },
-       { "usersh", oDeprecated },
-@@ -444,6 +447,10 @@
-               intptr = &options->gss_deleg_creds;
-               goto parse_flag;
- 
-+      case oGssTrustDns:
-+              intptr = &options->gss_trust_dns;
-+              goto parse_flag;
-+
-       case oBatchMode:
-               intptr = &options->batch_mode;
-               goto parse_flag;
-@@ -1010,6 +1017,7 @@
-       options->challenge_response_authentication = -1;
-       options->gss_authentication = -1;
-       options->gss_deleg_creds = -1;
-+      options->gss_trust_dns = -1;
-       options->password_authentication = -1;
-       options->kbd_interactive_authentication = -1;
-       options->kbd_interactive_devices = NULL;
-@@ -1100,6 +1108,8 @@
-               options->gss_authentication = 0;
-       if (options->gss_deleg_creds == -1)
-               options->gss_deleg_creds = 0;
-+      if (options->gss_trust_dns == -1)
-+              options->gss_trust_dns = 0;
-       if (options->password_authentication == -1)
-               options->password_authentication = 1;
-       if (options->kbd_interactive_authentication == -1)
-Index: readconf.h
-===================================================================
-RCS file: /cvs/openssh/readconf.h,v
-retrieving revision 1.63
-diff -u -r1.63 readconf.h
---- readconf.h 5 Aug 2006 02:39:40 -0000       1.63
-+++ readconf.h 19 Aug 2006 11:59:52 -0000
-@@ -45,6 +45,7 @@
-                                       /* Try S/Key or TIS, authentication. */
-       int     gss_authentication;     /* Try GSS authentication */
-       int     gss_deleg_creds;        /* Delegate GSS credentials */
-+      int     gss_trust_dns;          /* Trust DNS for GSS canonicalization */
-       int     password_authentication;        /* Try password
-                                                * authentication. */
-       int     kbd_interactive_authentication; /* Try keyboard-interactive 
auth. */
-Index: ssh_config.5
-===================================================================
-RCS file: /cvs/openssh/ssh_config.5,v
-retrieving revision 1.97
-diff -u -r1.97 ssh_config.5
---- ssh_config.5       5 Aug 2006 01:34:51 -0000       1.97
-+++ ssh_config.5       19 Aug 2006 11:59:53 -0000
-@@ -483,7 +483,16 @@
- Forward (delegate) credentials to the server.
- The default is
- .Dq no .
--Note that this option applies to protocol version 2 only.
-+Note that this option applies to protocol version 2 connections using GSSAPI.
-+.It Cm GSSAPITrustDns
-+Set to 
-+.Dq yes to indicate that the DNS is trusted to securely canonicalize
-+the name of the host being connected to. If 
-+.Dq no, the hostname entered on the
-+command line will be passed untouched to the GSSAPI library.
-+The default is
-+.Dq no .
-+This option only applies to protocol version 2 connections using GSSAPI.
- .It Cm HashKnownHosts
- Indicates that
- .Xr ssh 1
-Index: sshconnect2.c
-===================================================================
-RCS file: /cvs/openssh/sshconnect2.c,v
-retrieving revision 1.151
-diff -u -r1.151 sshconnect2.c
---- sshconnect2.c      18 Aug 2006 14:33:34 -0000      1.151
-+++ sshconnect2.c      19 Aug 2006 11:59:53 -0000
-@@ -499,6 +499,12 @@
-       static u_int mech = 0;
-       OM_uint32 min;
-       int ok = 0;
-+      const char *gss_host;
-+
-+      if (options.gss_trust_dns)
-+              gss_host = get_canonical_hostname(1);
-+      else
-+              gss_host = authctxt->host;
- 
-       /* Try one GSSAPI method at a time, rather than sending them all at
-        * once. */
-@@ -511,7 +517,7 @@
-               /* My DER encoding requires length<128 */
-               if (gss_supported->elements[mech].length < 128 &&
-                   ssh_gssapi_check_mechanism(&gssctxt, 
--                  &gss_supported->elements[mech], authctxt->host)) {
-+                  &gss_supported->elements[mech], gss_host)) {
-                       ok = 1; /* Mechanism works */
-               } else {
-                       mech++;

diff --git a/net-misc/openssh/files/openssh-6.3_p1-x509-hpn14v2-glue.patch 
b/net-misc/openssh/files/openssh-6.3_p1-x509-hpn14v2-glue.patch
deleted file mode 100644
index c3647d5..0000000
--- a/net-misc/openssh/files/openssh-6.3_p1-x509-hpn14v2-glue.patch
+++ /dev/null
@@ -1,51 +0,0 @@
---- openssh-6.3p1/Makefile.in
-+++ openssh-6.3p1/Makefile.in
-@@ -45,7 +45,7 @@
- CC=@CC@
- LD=@LD@
- CFLAGS=@CFLAGS@
--CPPFLAGS=-I. -I$(srcdir) @CPPFLAGS@ @LDAP_CPPFLAGS@ $(PATHS) @DEFS@
-+CPPFLAGS=-I. -I$(srcdir) @CPPFLAGS@ $(PATHS) @DEFS@
- LIBS=@LIBS@
- K5LIBS=@K5LIBS@
- GSSLIBS=@GSSLIBS@
-@@ -53,6 +53,7 @@
- SSHDLIBS=@SSHDLIBS@
- LIBEDIT=@LIBEDIT@
- LIBLDAP=@LDAP_LDFLAGS@ @LDAP_LIBS@
-+CPPFLAGS+=@LDAP_CPPFLAGS@
- AR=@AR@
- AWK=@AWK@
- RANLIB=@RANLIB@
---- openssh-6.3p1/sshconnect.c
-+++ openssh-6.3p1/sshconnect.c
-@@ -465,7 +465,7 @@
- {
-       /* Send our own protocol version identification. */
-       if (compat20) {
--              xasprintf(&client_version_string, "SSH-%d.%d-%.100s PKIX\r\n",
-+              xasprintf(&client_version_string, "SSH-%d.%d-%.100s\r\n",
-                   PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION);
-       } else {
-               xasprintf(&client_version_string, "SSH-%d.%d-%.100s\n",
---- openssh-6.3p1/sshd.c
-+++ openssh-6.3p1/sshd.c
-@@ -472,8 +472,8 @@
-               comment = "";
-       }
- 
--      xasprintf(&server_version_string, "SSH-%d.%d-%.100s%s%s%s%s",
--          major, minor, SSH_VERSION, comment,
-+      xasprintf(&server_version_string, "SSH-%d.%d-%.100s%s%s%s",
-+          major, minor, SSH_VERSION,
-           *options.version_addendum == '\0' ? "" : " ",
-           options.version_addendum, newline);
- 
---- openssh-6.3p1/version.h
-+++ openssh-6.3p1/version.h
-@@ -3,4 +3,5 @@
- #define SSH_VERSION   "OpenSSH_6.3"
- 
- #define SSH_PORTABLE  "p1"
-+#define SSH_X509      " PKIX"
- #define SSH_RELEASE   SSH_VERSION SSH_PORTABLE

diff --git a/net-misc/openssh/files/openssh-6.7_p1-openssl-ignore-status.patch 
b/net-misc/openssh/files/openssh-6.7_p1-openssl-ignore-status.patch
deleted file mode 100644
index fa33af3..0000000
--- a/net-misc/openssh/files/openssh-6.7_p1-openssl-ignore-status.patch
+++ /dev/null
@@ -1,17 +0,0 @@
-the last nibble of the openssl version represents the status.  that is,
-whether it is a beta or release.  when it comes to version checks in
-openssh, this component does not matter, so ignore it.
-
-https://bugzilla.mindrot.org/show_bug.cgi?id=2212
-
---- a/openbsd-compat/openssl-compat.c
-+++ b/openbsd-compat/openssl-compat.c
-@@ -58,7 +58,7 @@ ssh_compatible_openssl(long headerver, long libver)
-        * For versions >= 1.0.0, major,minor,status must match and library
-        * fix version must be equal to or newer than the header.
-        */
--      mask = 0xfff0000fL; /* major,minor,status */
-+      mask = 0xfff00000L; /* major,minor,status */
-       hfix = (headerver & 0x000ff000) >> 12;
-       lfix = (libver & 0x000ff000) >> 12;
-       if ( (headerver & mask) == (libver & mask) && lfix >= hfix)

diff --git a/net-misc/openssh/files/openssh-6.8_p1-ssl-engine-configure.patch 
b/net-misc/openssh/files/openssh-6.8_p1-ssl-engine-configure.patch
deleted file mode 100644
index a355e2c..0000000
--- a/net-misc/openssh/files/openssh-6.8_p1-ssl-engine-configure.patch
+++ /dev/null
@@ -1,33 +0,0 @@
-https://github.com/openssh/openssh-portable/pull/29
-
-From 003ed46d1bd94bac29c53b26ae70f6321ea11c80 Mon Sep 17 00:00:00 2001
-From: Mike Frysinger <[email protected]>
-Date: Wed, 18 Mar 2015 12:37:24 -0400
-Subject: [PATCH] do not abort when --without-ssl-engine --without-openssl is
- set
-
----
- configure.ac | 6 +++---
- 1 file changed, 3 insertions(+), 3 deletions(-)
-
-diff --git a/configure.ac b/configure.ac
-index b4d6598..7806d20 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -2276,10 +2276,10 @@ openssl_engine=no
- AC_ARG_WITH([ssl-engine],
-       [  --with-ssl-engine       Enable OpenSSL (hardware) ENGINE support ],
-       [
--              if test "x$openssl" = "xno" ; then
--                      AC_MSG_ERROR([cannot use --with-ssl-engine when OpenSSL 
disabled])
--              fi
-               if test "x$withval" != "xno" ; then
-+                      if test "x$openssl" = "xno" ; then
-+                              AC_MSG_ERROR([cannot use --with-ssl-engine when 
OpenSSL disabled])
-+                      fi
-                       openssl_engine=yes
-               fi
-       ]
--- 
-2.3.2
-

diff --git a/net-misc/openssh/files/openssh-6.9_p1-remove-stackprotector.patch 
b/net-misc/openssh/files/openssh-6.9_p1-remove-stackprotector.patch
deleted file mode 100644
index 98e867f..0000000
--- a/net-misc/openssh/files/openssh-6.9_p1-remove-stackprotector.patch
+++ /dev/null
@@ -1,51 +0,0 @@
-diff -Naur openssh-6.9p1.orig/configure.ac openssh-6.9p1/configure.ac
---- openssh-6.9p1.orig/configure.ac    2015-06-30 22:35:31.000000000 -0400
-+++ openssh-6.9p1/configure.ac 2015-09-04 02:29:02.746836099 -0400
-@@ -234,47 +234,6 @@
-                 CFLAGS="$saved_CFLAGS" ]
-       )
- 
--      # -fstack-protector-all doesn't always work for some GCC versions
--      # and/or platforms, so we test if we can.  If it's not supported
--      # on a given platform gcc will emit a warning so we use -Werror.
--      if test "x$use_stack_protector" = "x1"; then
--          for t in -fstack-protector-strong -fstack-protector-all \
--                  -fstack-protector; do
--              AC_MSG_CHECKING([if $CC supports $t])
--              saved_CFLAGS="$CFLAGS"
--              saved_LDFLAGS="$LDFLAGS"
--              CFLAGS="$CFLAGS $t -Werror"
--              LDFLAGS="$LDFLAGS $t -Werror"
--              AC_LINK_IFELSE(
--                      [AC_LANG_PROGRAM([[ #include <stdio.h> ]],
--                      [[
--      char x[256];
--      snprintf(x, sizeof(x), "XXX");
--                       ]])],
--                  [ AC_MSG_RESULT([yes])
--                    CFLAGS="$saved_CFLAGS $t"
--                    LDFLAGS="$saved_LDFLAGS $t"
--                    AC_MSG_CHECKING([if $t works])
--                    AC_RUN_IFELSE(
--                      [AC_LANG_PROGRAM([[ #include <stdio.h> ]],
--                      [[
--      char x[256];
--      snprintf(x, sizeof(x), "XXX");
--                      ]])],
--                      [ AC_MSG_RESULT([yes])
--                        break ],
--                      [ AC_MSG_RESULT([no]) ],
--                      [ AC_MSG_WARN([cross compiling: cannot test])
--                        break ]
--                    )
--                  ],
--                  [ AC_MSG_RESULT([no]) ]
--              )
--              CFLAGS="$saved_CFLAGS"
--              LDFLAGS="$saved_LDFLAGS"
--          done
--      fi
--
-       if test -z "$have_llong_max"; then
-               # retry LLONG_MAX with -std=gnu99, needed on some Linuxes
-               unset ac_cv_have_decl_LLONG_MAX

diff --git a/net-misc/openssh/files/sshd.confd 
b/net-misc/openssh/files/sshd.confd
deleted file mode 100644
index 28952b4..0000000
--- a/net-misc/openssh/files/sshd.confd
+++ /dev/null
@@ -1,21 +0,0 @@
-# /etc/conf.d/sshd: config file for /etc/init.d/sshd
-
-# Where is your sshd_config file stored?
-
-SSHD_CONFDIR="/etc/ssh"
-
-
-# Any random options you want to pass to sshd.
-# See the sshd(8) manpage for more info.
-
-SSHD_OPTS=""
-
-
-# Pid file to use (needs to be absolute path).
-
-#SSHD_PIDFILE="/var/run/sshd.pid"
-
-
-# Path to the sshd binary (needs to be absolute path).
-
-#SSHD_BINARY="/usr/sbin/sshd"

diff --git a/net-misc/openssh/files/sshd.pam_include.2 
b/net-misc/openssh/files/sshd.pam_include.2
deleted file mode 100644
index b801aaa..0000000
--- a/net-misc/openssh/files/sshd.pam_include.2
+++ /dev/null
@@ -1,4 +0,0 @@
-auth       include     system-remote-login
-account    include     system-remote-login
-password   include     system-remote-login
-session           include      system-remote-login

diff --git a/net-misc/openssh/files/sshd.rc6.4 
b/net-misc/openssh/files/sshd.rc6.4
deleted file mode 100755
index 1b872bc..0000000
--- a/net-misc/openssh/files/sshd.rc6.4
+++ /dev/null
@@ -1,87 +0,0 @@
-#!/sbin/runscript
-# Copyright 1999-2013 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/openssh/files/sshd.rc6.4,v 1.3 
2013/04/24 03:13:03 vapier Exp $
-
-extra_commands="checkconfig"
-extra_started_commands="reload"
-
-SSHD_CONFDIR=${SSHD_CONFDIR:-/etc/ssh}
-SSHD_CONFIG=${SSHD_CONFIG:-${SSHD_CONFDIR}/sshd_config}
-SSHD_PIDFILE=${SSHD_PIDFILE:-/var/run/${SVCNAME}.pid}
-SSHD_BINARY=${SSHD_BINARY:-/usr/sbin/sshd}
-
-depend() {
-       use logger dns
-       if [ "${rc_need+set}" = "set" ]; then
-               : # Do nothing, the user has explicitly set rc_need
-       else
-               warn_addr=''
-               for x in $(awk '/^ListenAddress/{ print $2 }' "$SSHD_CONFIG" 
2>/dev/null) ; do
-                       case "$x" in
-                               0.0.0.0|0.0.0.0:*) ;;
-                               ::|\[::\]*) ;;
-                               *) warn_addr="${warn_addr} $x" ;;
-                       esac
-               done
-               unset x
-               if [ "${warn_addr:+set}" = "set" ]; then
-                       need net 
-                       ewarn "You are binding an interface in ListenAddress 
statement in your sshd_config!"
-                       ewarn "You must add rc_need=\"net.FOO\" to your 
/etc/conf.d/sshd"
-                       ewarn "where FOO is the interface(s) providing the 
following address(es):"
-                       ewarn "${warn_addr}"
-               fi
-               unset warn_addr
-       fi
-}
-
-checkconfig() {
-       if [ ! -d /var/empty ] ; then
-               mkdir -p /var/empty || return 1
-       fi
-
-       if [ ! -e "${SSHD_CONFDIR}"/sshd_config ] ; then
-               eerror "You need an ${SSHD_CONFDIR}/sshd_config file to run 
sshd"
-               eerror "There is a sample file in /usr/share/doc/openssh"
-               return 1
-       fi
-
-       ssh-keygen -A || return 1
-
-       [ "${SSHD_PIDFILE}" != "/var/run/sshd.pid" ] \
-               && SSHD_OPTS="${SSHD_OPTS} -o PidFile=${SSHD_PIDFILE}"
-       [ "${SSHD_CONFDIR}" != "/etc/ssh" ] \
-               && SSHD_OPTS="${SSHD_OPTS} -f ${SSHD_CONFDIR}/sshd_config"
-
-       "${SSHD_BINARY}" -t ${SSHD_OPTS} || return 1
-}
-
-start() {
-       checkconfig || return 1
-
-       ebegin "Starting ${SVCNAME}"
-       start-stop-daemon --start --exec "${SSHD_BINARY}" \
-           --pidfile "${SSHD_PIDFILE}" \
-           -- ${SSHD_OPTS}
-       eend $?
-}
-
-stop() {
-       if [ "${RC_CMD}" = "restart" ] ; then
-               checkconfig || return 1
-       fi
-
-       ebegin "Stopping ${SVCNAME}"
-       start-stop-daemon --stop --exec "${SSHD_BINARY}" \
-           --pidfile "${SSHD_PIDFILE}" --quiet
-       eend $?
-}
-
-reload() {
-       checkconfig || return 1
-       ebegin "Reloading ${SVCNAME}"
-       start-stop-daemon --signal HUP \
-           --exec "${SSHD_BINARY}" --pidfile "${SSHD_PIDFILE}"
-       eend $?
-}

diff --git a/net-misc/openssh/files/sshd.service 
b/net-misc/openssh/files/sshd.service
deleted file mode 100644
index b5e96b3..0000000
--- a/net-misc/openssh/files/sshd.service
+++ /dev/null
@@ -1,11 +0,0 @@
-[Unit]
-Description=OpenSSH server daemon
-After=syslog.target network.target auditd.service
-
-[Service]
-ExecStartPre=/usr/bin/ssh-keygen -A
-ExecStart=/usr/sbin/sshd -D -e
-ExecReload=/bin/kill -HUP $MAINPID
-
-[Install]
-WantedBy=multi-user.target

diff --git a/net-misc/openssh/files/sshd.socket 
b/net-misc/openssh/files/sshd.socket
deleted file mode 100644
index 94b9533..0000000
--- a/net-misc/openssh/files/sshd.socket
+++ /dev/null
@@ -1,10 +0,0 @@
-[Unit]
-Description=OpenSSH Server Socket
-Conflicts=sshd.service
-
-[Socket]
-ListenStream=22
-Accept=yes
-
-[Install]
-WantedBy=sockets.target

diff --git a/net-misc/openssh/files/sshd_at.service 
b/net-misc/openssh/files/sshd_at.service
deleted file mode 100644
index 2645ad0..0000000
--- a/net-misc/openssh/files/sshd_at.service
+++ /dev/null
@@ -1,8 +0,0 @@
-[Unit]
-Description=OpenSSH per-connection server daemon
-After=syslog.target auditd.service
-
-[Service]
-ExecStart=-/usr/sbin/sshd -i -e
-StandardInput=socket
-StandardError=syslog

diff --git a/net-misc/openssh/metadata.xml b/net-misc/openssh/metadata.xml
deleted file mode 100644
index 885648b..0000000
--- a/net-misc/openssh/metadata.xml
+++ /dev/null
@@ -1,34 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd";>
-<pkgmetadata>
-  <herd>base-system</herd>
-  <maintainer restrict="net-misc/openssh[ldap]">
-    <email>[email protected]</email>
-       <description>LPK issues. Only assign if it's a direct LPK issue. Do not 
directly assign for anything else.</description>
-  </maintainer>
-  <longdescription>
-OpenSSH is a FREE version of the SSH protocol suite of network connectivity 
tools that 
-increasing numbers of people on the Internet are coming to rely on. Many users 
of telnet, 
-rlogin, ftp, and other such programs might not realize that their password is 
transmitted 
-across the Internet unencrypted, but it is. OpenSSH encrypts all traffic 
(including passwords) 
-to effectively eliminate eavesdropping, connection hijacking, and other 
network-level attacks. 
-Additionally, OpenSSH provides a myriad of secure tunneling capabilities, as 
well as a variety 
-of authentication methods.
-
-The OpenSSH suite includes the ssh program which replaces rlogin and telnet, 
scp which 
-replaces rcp, and sftp which replaces ftp. Also included is sshd which is the 
server side of 
-the package, and the other basic utilities like ssh-add, ssh-agent, 
ssh-keysign, ssh-keyscan, 
-ssh-keygen and sftp-server. OpenSSH supports SSH protocol versions 1.3, 1.5, 
and 2.0.
-</longdescription>
-  <use>
-       <flag name="bindist">Disable EC/RC5 algorithms in OpenSSL for patent 
reasons.</flag>
-       <flag name="hpn">Enable high performance ssh</flag>
-       <flag name="ldap">Add support for storing SSH public keys in LDAP</flag>
-       <flag name="ldns">Use LDNS for DNSSEC/SSHFP validation.</flag>
-       <flag name="sctp">Support for Stream Control Transmission 
Protocol</flag>
-       <flag name="X509">Adds support for X.509 certificate 
authentication</flag>
-  </use>
-  <upstream>
-    <remote-id type="cpe">cpe:/a:openssh:openssh</remote-id>
-  </upstream>
-</pkgmetadata>

diff --git a/net-misc/openssh/openssh-6.9_p1-r99.ebuild 
b/net-misc/openssh/openssh-6.9_p1-r99.ebuild
deleted file mode 100644
index 0ab549d..0000000
--- a/net-misc/openssh/openssh-6.9_p1-r99.ebuild
+++ /dev/null
@@ -1,314 +0,0 @@
-# Copyright 1999-2015 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Id$
-
-EAPI="4"
-inherit eutils user flag-o-matic multilib autotools pam systemd versionator
-
-# Make it more portable between straight releases
-# and _p? releases.
-PARCH=${P/_}
-
-HPN_PATCH="${PN}-6.9p1-r1-hpnssh14v5.tar.xz"
-LDAP_PATCH="${PN}-lpk-6.8p1-0.3.14.patch.xz"
-X509_VER="8.4" X509_PATCH="${PN}-6.9p1+x509-${X509_VER}.diff.gz"
-
-DESCRIPTION="Port of OpenBSD's free SSH release"
-HOMEPAGE="http://www.openssh.org/";
-SRC_URI="mirror://openbsd/OpenSSH/portable/${PARCH}.tar.gz
-       mirror://gentoo/${PN}-6.8_p1-sctp.patch.xz
-       ${HPN_PATCH:+hpn? (
-               mirror://gentoo/${HPN_PATCH}
-               https://dev.gentoo.org/~polynomial-c/${HPN_PATCH}
-               mirror://sourceforge/hpnssh/${HPN_PATCH}
-       )}
-       ${LDAP_PATCH:+ldap? ( mirror://gentoo/${LDAP_PATCH} )}
-       ${X509_PATCH:+X509? ( 
http://roumenpetrov.info/openssh/x509-${X509_VER}/${X509_PATCH} )}
-       "
-
-LICENSE="BSD GPL-2"
-SLOT="0"
-KEYWORDS="ppc"
-# Probably want to drop ssl defaulting to on in a future version.
-IUSE="bindist debug ${HPN_PATCH:++}hpn kerberos kernel_linux ldap ldns libedit 
pam +pie sctp selinux skey ssh1 +ssl static X X509"
-REQUIRED_USE="ldns? ( ssl )
-       pie? ( !static )
-       ssh1? ( ssl )
-       static? ( !kerberos !pam )
-       X509? ( !ldap ssl )"
-
-LIB_DEPEND="
-       ldns? (
-               net-libs/ldns[static-libs(+)]
-               !bindist? ( net-libs/ldns[ecdsa,ssl] )
-               bindist? ( net-libs/ldns[-ecdsa,ssl] )
-       )
-       libedit? ( dev-libs/libedit[static-libs(+)] )
-       sctp? ( net-misc/lksctp-tools[static-libs(+)] )
-       selinux? ( >=sys-libs/libselinux-1.28[static-libs(+)] )
-       skey? ( >=sys-auth/skey-1.1.5-r1[static-libs(+)] )
-       ssl? (
-               >=dev-libs/openssl-0.9.6d:0[bindist=]
-               dev-libs/openssl[static-libs(+)]
-       )
-       >=sys-libs/zlib-1.2.3[static-libs(+)]"
-RDEPEND="
-       !static? ( ${LIB_DEPEND//\[static-libs(+)]} )
-       pam? ( virtual/pam )
-       kerberos? ( virtual/krb5 )
-       ldap? ( net-nds/openldap )"
-DEPEND="${RDEPEND}
-       static? ( ${LIB_DEPEND} )
-       virtual/pkgconfig
-       virtual/os-headers
-       sys-devel/autoconf"
-RDEPEND="${RDEPEND}
-       pam? ( >=sys-auth/pambase-20081028 )
-       userland_GNU? ( virtual/shadow )
-       X? ( x11-apps/xauth )"
-
-S=${WORKDIR}/${PARCH}
-
-pkg_setup() {
-       # this sucks, but i'd rather have people unable to `emerge -u openssh`
-       # than not be able to log in to their server any more
-       maybe_fail() { [[ -z ${!2} ]] && echo "$1" ; }
-       local fail="
-               $(use X509 && maybe_fail X509 X509_PATCH)
-               $(use ldap && maybe_fail ldap LDAP_PATCH)
-               $(use hpn && maybe_fail hpn HPN_PATCH)
-       "
-       fail=$(echo ${fail})
-       if [[ -n ${fail} ]] ; then
-               eerror "Sorry, but this version does not yet support features"
-               eerror "that you requested:      ${fail}"
-               eerror "Please mask ${PF} for now and check back later:"
-               eerror " # echo '=${CATEGORY}/${PF}' >> 
/etc/portage/package.mask"
-               die "booooo"
-       fi
-
-       # Make sure people who are using tcp wrappers are notified of its 
removal. #531156
-       if grep -qs '^ *sshd *:' "${EROOT}"/etc/hosts.{allow,deny} ; then
-               ewarn "Sorry, but openssh no longer supports tcp-wrappers, and 
it seems like"
-               ewarn "you're trying to use it.  Update your 
${EROOT}etc/hosts.{allow,deny} please."
-       fi
-}
-
-save_version() {
-       # version.h patch conflict avoidence
-       mv version.h version.h.$1
-       cp -f version.h.pristine version.h
-}
-
-src_prepare() {
-       sed -i \
-               -e 
"/_PATH_XAUTH/s:/usr/X11R6/bin/xauth:${EPREFIX}/usr/bin/xauth:" \
-               pathnames.h || die
-       # keep this as we need it to avoid the conflict between LPK and HPN 
changing
-       # this file.
-       cp version.h version.h.pristine
-
-       # don't break .ssh/authorized_keys2 for fun
-       sed -i '/^AuthorizedKeysFile/s:^:#:' sshd_config || die
-
-       if use X509 ; then
-               pushd .. >/dev/null
-               #epatch "${WORKDIR}"/${PN}-6.8_p1-x509-${X509_VER}-glue.patch
-               epatch "${FILESDIR}"/${PN}-6.8_p1-sctp-x509-glue.patch
-               popd >/dev/null
-               epatch "${WORKDIR}"/${X509_PATCH%.*}
-               epatch "${FILESDIR}"/${PN}-6.3_p1-x509-hpn14v2-glue.patch
-               epatch "${FILESDIR}"/${PN}-6.9_p1-x509-warnings.patch
-               save_version X509
-       fi
-       if use ldap ; then
-               epatch "${WORKDIR}"/${LDAP_PATCH%.*}
-               save_version LPK
-       fi
-       epatch "${FILESDIR}"/${PN}-4.7_p1-GSSAPI-dns.patch #165444 integrated 
into gsskex
-       epatch "${FILESDIR}"/${PN}-6.7_p1-openssl-ignore-status.patch
-       # The X509 patchset fixes this independently.
-       use X509 || epatch "${FILESDIR}"/${PN}-6.8_p1-ssl-engine-configure.patch
-       epatch "${WORKDIR}"/${PN}-6.8_p1-sctp.patch
-       if use hpn ; then
-               EPATCH_FORCE="yes" EPATCH_SUFFIX="patch" \
-                       EPATCH_MULTI_MSG="Applying HPN patchset ..." \
-                       epatch "${WORKDIR}"/${HPN_PATCH%.*.*}
-               save_version HPN
-       fi
-
-       tc-export PKG_CONFIG
-       local sed_args=(
-               -e "s:-lcrypto:$(${PKG_CONFIG} --libs openssl):"
-               # Disable PATH reset, trust what portage gives us #254615
-               -e 's:^PATH=/:#PATH=/:'
-               # Disable fortify flags ... our gcc does this for us
-               -e 's:-D_FORTIFY_SOURCE=2::'
-       )
-       # The -ftrapv flag ICEs on hppa #505182
-       use hppa && sed_args+=(
-               -e '/CFLAGS/s:-ftrapv:-fdisable-this-test:'
-               -e '/OSSH_CHECK_CFLAG_LINK.*-ftrapv/d'
-       )
-       sed -i "${sed_args[@]}" configure{.ac,} || die
-
-       # ppc musl lacks __stack_chk_fail_local()
-       epatch "${FILESDIR}"/${P}-remove-stackprotector.patch
-
-       epatch_user #473004
-
-       # Now we can build a sane merged version.h
-       (
-               sed '/^#define SSH_RELEASE/d' version.h.* | sort -u
-               macros=()
-               for p in HPN LPK X509 ; do [ -e version.h.${p} ] && macros+=( 
SSH_${p} ) ; done
-               printf '#define SSH_RELEASE SSH_VERSION SSH_PORTABLE %s\n' 
"${macros}"
-       ) > version.h
-
-       eautoreconf
-}
-
-src_configure() {
-       addwrite /dev/ptmx
-       addpredict /etc/skey/skeykeys # skey configure code triggers this
-
-       use debug && append-cppflags -DSANDBOX_SECCOMP_FILTER_DEBUG
-       use static && append-ldflags -static
-
-       local myconf=(
-               --with-ldflags="${LDFLAGS}"
-               --disable-strip
-               --with-pid-dir="${EPREFIX}"$(usex kernel_linux '' '/var')/run
-               --sysconfdir="${EPREFIX}"/etc/ssh
-               --libexecdir="${EPREFIX}"/usr/$(get_libdir)/misc
-               --datadir="${EPREFIX}"/usr/share/openssh
-               --with-privsep-path="${EPREFIX}"/var/empty
-               --with-privsep-user=sshd
-               $(use_with kerberos kerberos5 "${EPREFIX}"/usr)
-               # We apply the ldap patch conditionally, so can't pass 
--without-ldap
-               # unconditionally else we get unknown flag warnings.
-               $(use ldap && use_with ldap)
-               $(use_with ldns)
-               $(use_with libedit)
-               $(use_with pam)
-               $(use_with pie)
-               $(use_with sctp)
-               $(use_with selinux)
-               $(use_with skey)
-               $(use_with ssh1)
-               # The X509 patch deletes this option entirely.
-               $(use X509 || use_with ssl openssl)
-               $(use_with ssl md5-passwords)
-               $(use_with ssl ssl-engine)
-       )
-
-       # The seccomp sandbox is broken on x32, so use the older method for 
now. #553748
-       use amd64 && [[ ${ABI} == "x32" ]] && myconf+=( --with-sandbox=rlimit )
-
-       # Special settings for Gentoo/FreeBSD 9.0 or later (see bug #391011)
-       if use elibc_FreeBSD && version_is_at_least 9.0 "$(uname -r|sed 
's/\(.\..\).*/\1/')" ; then
-               myconf+=( --disable-utmp --disable-wtmp --disable-wtmpx )
-               append-ldflags -lutil
-       fi
-
-       econf "${myconf[@]}"
-}
-
-src_install() {
-       emake install-nokeys DESTDIR="${D}"
-       fperms 600 /etc/ssh/sshd_config
-       dobin contrib/ssh-copy-id
-       newinitd "${FILESDIR}"/sshd.rc6.4 sshd
-       newconfd "${FILESDIR}"/sshd.confd sshd
-       keepdir /var/empty
-
-       newpamd "${FILESDIR}"/sshd.pam_include.2 sshd
-       if use pam ; then
-               sed -i \
-                       -e "/^#UsePAM /s:.*:UsePAM yes:" \
-                       -e "/^#PasswordAuthentication 
/s:.*:PasswordAuthentication no:" \
-                       -e "/^#PrintMotd /s:.*:PrintMotd no:" \
-                       -e "/^#PrintLastLog /s:.*:PrintLastLog no:" \
-                       "${ED}"/etc/ssh/sshd_config || die
-       fi
-
-       # Gentoo tweaks to default config files
-       cat <<-EOF >> "${ED}"/etc/ssh/sshd_config
-
-       # Allow client to pass locale environment variables #367017
-       AcceptEnv LANG LC_*
-       EOF
-       cat <<-EOF >> "${ED}"/etc/ssh/ssh_config
-
-       # Send locale environment variables #367017
-       SendEnv LANG LC_*
-       EOF
-
-       if ! use X509 && [[ -n ${LDAP_PATCH} ]] && use ldap ; then
-               insinto /etc/openldap/schema/
-               newins openssh-lpk_openldap.schema openssh-lpk.schema
-       fi
-
-       doman contrib/ssh-copy-id.1
-       dodoc ChangeLog CREDITS OVERVIEW README* TODO sshd_config
-
-       diropts -m 0700
-       dodir /etc/skel/.ssh
-
-       systemd_dounit "${FILESDIR}"/sshd.{service,socket}
-       systemd_newunit "${FILESDIR}"/sshd_at.service '[email protected]'
-}
-
-src_test() {
-       local t tests skipped failed passed shell
-       tests="interop-tests compat-tests"
-       skipped=""
-       shell=$(egetshell ${UID})
-       if [[ ${shell} == */nologin ]] || [[ ${shell} == */false ]] ; then
-               elog "Running the full OpenSSH testsuite"
-               elog "requires a usable shell for the 'portage'"
-               elog "user, so we will run a subset only."
-               skipped="${skipped} tests"
-       else
-               tests="${tests} tests"
-       fi
-       # It will also attempt to write to the homedir .ssh
-       local sshhome=${T}/homedir
-       mkdir -p "${sshhome}"/.ssh
-       for t in ${tests} ; do
-               # Some tests read from stdin ...
-               HOMEDIR="${sshhome}" \
-               emake -k -j1 ${t} </dev/null \
-                       && passed="${passed}${t} " \
-                       || failed="${failed}${t} "
-       done
-       einfo "Passed tests: ${passed}"
-       ewarn "Skipped tests: ${skipped}"
-       if [[ -n ${failed} ]] ; then
-               ewarn "Failed tests: ${failed}"
-               die "Some tests failed: ${failed}"
-       else
-               einfo "Failed tests: ${failed}"
-               return 0
-       fi
-}
-
-pkg_preinst() {
-       enewgroup sshd 22
-       enewuser sshd 22 -1 /var/empty sshd
-}
-
-pkg_postinst() {
-       if has_version "<${CATEGORY}/${PN}-5.8_p1" ; then
-               elog "Starting with openssh-5.8p1, the server will default to a 
newer key"
-               elog "algorithm (ECDSA).  You are encouraged to manually update 
your stored"
-               elog "keys list as servers update theirs.  See ssh-keyscan(1) 
for more info."
-       fi
-       if has_version "<${CATEGORY}/${PN}-6.9_p1" ; then
-               elog "Starting with openssh-6.9p1, ssh1 support is disabled by 
default."
-       fi
-       ewarn "Remember to merge your config files in /etc/ssh/ and then"
-       ewarn "reload sshd: '/etc/init.d/sshd reload'."
-       elog "Note: openssh-6.7 versions no longer support USE=tcpd as upstream 
has"
-       elog "      dropped it.  Make sure to update any configs that you might 
have."
-}

Reply via email to