diff options
author | Luca Longinotti <chtekk@gentoo.org> | 2007-06-13 12:35:33 +0000 |
---|---|---|
committer | Luca Longinotti <chtekk@gentoo.org> | 2007-06-13 12:35:33 +0000 |
commit | a36b493c613087c4180d962eba2049ecdb839186 (patch) | |
tree | 117159ea7f7bc3e21ac185db4e4b650b2ce0970b /net-www/mod_ssl | |
parent | Remove Apache1. (diff) | |
download | gentoo-2-a36b493c613087c4180d962eba2049ecdb839186.tar.gz gentoo-2-a36b493c613087c4180d962eba2049ecdb839186.tar.bz2 gentoo-2-a36b493c613087c4180d962eba2049ecdb839186.zip |
Remove Apache1.
Diffstat (limited to 'net-www/mod_ssl')
-rw-r--r-- | net-www/mod_ssl/ChangeLog | 406 | ||||
-rw-r--r-- | net-www/mod_ssl/Manifest | 36 | ||||
-rw-r--r-- | net-www/mod_ssl/files/10_mod_ssl.conf | 80 | ||||
-rw-r--r-- | net-www/mod_ssl/files/default-ssl.conf | 155 | ||||
-rw-r--r-- | net-www/mod_ssl/files/digest-mod_ssl-2.8.25-r10 | 3 | ||||
-rw-r--r-- | net-www/mod_ssl/files/digest-mod_ssl-2.8.28 | 3 | ||||
-rw-r--r-- | net-www/mod_ssl/files/gentestcrt.sh | 243 | ||||
-rw-r--r-- | net-www/mod_ssl/metadata.xml | 8 | ||||
-rw-r--r-- | net-www/mod_ssl/mod_ssl-2.8.25-r10.ebuild | 79 | ||||
-rw-r--r-- | net-www/mod_ssl/mod_ssl-2.8.28.ebuild | 79 |
10 files changed, 0 insertions, 1092 deletions
diff --git a/net-www/mod_ssl/ChangeLog b/net-www/mod_ssl/ChangeLog deleted file mode 100644 index 5b3953dd9ee8..000000000000 --- a/net-www/mod_ssl/ChangeLog +++ /dev/null @@ -1,406 +0,0 @@ -# ChangeLog for net-www/mod_ssl -# Copyright 2002-2007 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-www/mod_ssl/ChangeLog,v 1.111 2007/01/14 20:38:43 chtekk Exp $ - - 14 Jan 2007; Luca Longinotti <chtekk@gentoo.org> -files/mod_ssl.conf, - -files/ssl.default-vhost.conf, mod_ssl-2.8.25-r10.ebuild, - mod_ssl-2.8.28.ebuild: - Cleanup. - -*mod_ssl-2.8.28 (29 Jul 2006) - - 29 Jul 2006; Bryan Østergaard <kloeri@gentoo.org> +mod_ssl-2.8.28.ebuild: - Bump version, bug 141986. - - 05 Jun 2006; Michael Stewart <vericgar@gentoo.org> -mod_ssl-2.8.21.ebuild, - -mod_ssl-2.8.22.ebuild, -mod_ssl-2.8.22-r1.ebuild, -mod_ssl-2.8.24.ebuild, - -mod_ssl-2.8.24-r1.ebuild, -mod_ssl-2.8.25-r1.ebuild: - Remove old-style ebuilds - - 04 Jun 2006; Michael Stewart <vericgar@gentoo.org> - mod_ssl-2.8.22-r1.ebuild, mod_ssl-2.8.24-r1.ebuild, - mod_ssl-2.8.25-r10.ebuild: - Address dependency issues caused by depend.apache. Refer to bug 107127. - - 13 Jan 2006; Bryan Østergaard <kloeri@gentoo.org -mod_ssl-2.8.17.ebuild, - -mod_ssl-2.8.18.ebuild, -mod_ssl-2.8.19.ebuild, -mod_ssl-2.8.20.ebuild: - Clean up mod_ssl (broken by my apache cleaning). - - 23 Dec 2005; Markus Rothe <corsair@gentoo.org> mod_ssl-2.8.25-r10.ebuild: - Stable on ppc64 - - 21 Dec 2005; Markus Rothe <corsair@gentoo.org> mod_ssl-2.8.25-r1.ebuild: - Stable on ppc64; bug #109895 - - 19 Dec 2005; Gustavo Zacarias <gustavoz@gentoo.org> - mod_ssl-2.8.25-r1.ebuild, mod_ssl-2.8.25-r10.ebuild: - Stable on sparc wrt security #109895 - - 19 Dec 2005; Michael Hanselmann <hansmi@gentoo.org> - mod_ssl-2.8.25-r1.ebuild, mod_ssl-2.8.25-r10.ebuild: - Stable on hppa, ppc. See bug #109895. - - 19 Dec 2005; Danny van Dyk <kugelfang@gentoo.org> - mod_ssl-2.8.25-r1.ebuild, mod_ssl-2.8.25-r10.ebuild: - Marked stable on amd64 wrt security bug #109895. - - 15 Dec 2005; Bryan Østergaard <kloeri@gentoo.org - mod_ssl-2.8.25-r1.ebuild, mod_ssl-2.8.25-r10.ebuild: - Stable on alpha, ia64 and x86, bug 109895. - -*mod_ssl-2.8.25-r1 (14 Dec 2005) - - 14 Dec 2005; Michael Stewart <vericgar@gentoo.org> - +mod_ssl-2.8.25-r1.ebuild: - Version bump for old-style configuration. Fixes bug 109895 - -*mod_ssl-2.8.25-r10 (13 Dec 2005) - - 13 Dec 2005; Michael Stewart <vericgar@gentoo.org> -mod_ssl-2.8.25.ebuild, - +mod_ssl-2.8.25-r10.ebuild: - Bump new-style 2.8.25 to -r10 to make room for supporting old-style security - bug - - 12 Dec 2005; Michael Hanselmann <hansmi@gentoo.org> mod_ssl-2.8.25.ebuild: - Stable on hppa, ppc. See bug #109895. - - 12 Dec 2005; Gustavo Zacarias <gustavoz@gentoo.org> mod_ssl-2.8.25.ebuild: - Stable on sparc wrt #109895 - -*mod_ssl-2.8.25 (11 Dec 2005) - - 11 Dec 2005; Michael Stewart <vericgar@gentoo.org> +mod_ssl-2.8.25.ebuild: - New version of mod_ssl to go with version bump of Apache 1.3. - - 16 Oct 2005; Bryan Østergaard <kloeri@gentoo.org> mod_ssl-2.8.17.ebuild, - mod_ssl-2.8.18.ebuild, mod_ssl-2.8.19.ebuild, mod_ssl-2.8.20.ebuild, - mod_ssl-2.8.21.ebuild, mod_ssl-2.8.22.ebuild, mod_ssl-2.8.22-r1.ebuild, - mod_ssl-2.8.24.ebuild, mod_ssl-2.8.24-r1.ebuild: - Fix cp -a stuff, bug 103487. - - 07 Oct 2005; Gustavo Zacarias <gustavoz@gentoo.org> - mod_ssl-2.8.24-r1.ebuild: - Stable on sparc wrt #106421 - - 02 Oct 2005; Bryan Østergaard <kloeri@gentoo.org> - mod_ssl-2.8.24-r1.ebuild: - ia64 stable. - - 24 Sep 2005; Bryan Østergaard <kloeri@gentoo.org> - mod_ssl-2.8.24-r1.ebuild: - Stable on alpha. - - 20 Sep 2005; Marcus D. Hanwell <cryos@gentoo.org> - mod_ssl-2.8.24-r1.ebuild: - Stable on amd64, bug 106421, thanks to aja@gentoo.org. - - 19 Sep 2005; Michael Hanselmann <hansmi@gentoo.org> - mod_ssl-2.8.24-r1.ebuild: - Stable on hppa, ppc. - - 19 Sep 2005; Markus Rothe <corsair@gentoo.org> mod_ssl-2.8.24-r1.ebuild: - Stable on ppc64 (bug #106421) - - 18 Sep 2005; Michael Stewart <vericgar@gentoo.org> - mod_ssl-2.8.24-r1.ebuild: - Stable on x86 - - 17 Sep 2005; Aron Griffis <agriffis@gentoo.org> mod_ssl-2.8.24.ebuild: - Mark 2.8.24 stable on ia64 - - 16 Sep 2005; Simon Stelling <blubb@gentoo.org> mod_ssl-2.8.24.ebuild: - stable wrt bug 104807 - - 15 Sep 2005; Bryan Østergaard <kloeri@gentoo.org> mod_ssl-2.8.24.ebuild: - Stable on alpha, bug 104807. - - 12 Sep 2005; Jason Wever <weeve@gentoo.org> mod_ssl-2.8.24.ebuild: - Marked stable on SPARC wrt security bug #104807. - - 11 Sep 2005; Michael Hanselmann <hansmi@gentoo.org> mod_ssl-2.8.24.ebuild: - Stable on hppa and ppc. - - 11 Sep 2005; Markus Rothe <corsair@gentoo.org> mod_ssl-2.8.24.ebuild: - Stable on ppc64 - -*mod_ssl-2.8.24-r1 (10 Sep 2005) -*mod_ssl-2.8.24 (10 Sep 2005) - - 10 Sep 2005; Michael Stewart <vericgar@gentoo.org> +mod_ssl-2.8.24.ebuild, - +mod_ssl-2.8.24-r1.ebuild: - Security bump to address CAN-2005-2700. Fixes bug 104807 - - 16 Jul 2005; Joseph Jezak <josejx@gentoo.org> mod_ssl-2.8.22.ebuild: - Marked ppc stable for bug #88666. - - 27 Jun 2005; Simon Stelling <blubb@gentoo.org> mod_ssl-2.8.22.ebuild: - stable on amd64 - - 12 Jun 2005; Bryan Østergaard <kloeri@gentoo.org> mod_ssl-2.8.22.ebuild: - Stable on alpha. - - 18 May 2005; Rene Nussbaumer <killerfox@gentoo.org> mod_ssl-2.8.22.ebuild: - stable on hppa; bug #86052 - - 18 May 2005; Markus Rothe <corsair@gentoo.org> mod_ssl-2.8.22.ebuild: - Stable on ppc64 - - 09 May 2005; Aron Griffis <agriffis@gentoo.org> mod_ssl-2.8.22.ebuild: - stable on ia64 #86052 - - 20 Apr 2005; Gustavo Zacarias <gustavoz@gentoo.org> mod_ssl-2.8.22.ebuild: - Stable on sparc wrt #86052 - - 15 Apr 2005; Markus Rothe <corsair@gentoo.org> mod_ssl-2.8.22-r1.ebuild: - Back to ~ppc64 - - 11 Apr 2005; Markus Rothe <corsair@gentoo.org> mod_ssl-2.8.22-r1.ebuild: - Stable on ppc64; bug #88639 - -*mod_ssl-2.8.22-r1 (09 Apr 2005) - - 09 Apr 2005; Benedikt Boehm <hollow@gentoo.org> mod_ssl-2.8.21.ebuild, - mod_ssl-2.8.22.ebuild, +mod_ssl-2.8.22-r1.ebuild: - fixed dependency issues: moved 2.8.22 to 2.8.22-r1, fixed deps in 2.8.21 - and moved 2.8.21 to 2.8.22 to support 1.3.33-r1, see bug #86052 - - 21 Mar 2005; Elfyn McBratney <beu@gentoo.org> mod_ssl-2.8.21.ebuild: - Fix DEPEND. - - 21 Mar 2005; Elfyn McBratney <beu@gentoo.org> mod_ssl-2.8.21.ebuild: - Fix DEPEND so mod_ssl-2.8.21 will work with <=apache-1.3.33-r1. - - 09 Mar 2005; Markus Rothe <corsair@gentoo.org> mod_ssl-2.8.22.ebuild: - Added ~ppc64 to KEYWORDS - -*mod_ssl-2.8.22 (08 Jan 2005) - - 08 Jan 2005; Benedikt Boehm <hollow@gentoo.org> metadata.xml, - +files/10_mod_ssl.conf, +files/default-ssl.conf, +mod_ssl-2.8.22.ebuild: - Apache herd package refresh - - 29 Dec 2004; Ciaran McCreesh <ciaranm@gentoo.org> : - Change encoding to UTF-8 for GLEP 31 compliance - - 09 Nov 2004; Michael Tindal <urilith@gentoo.org> mod_ssl-2.8.21.ebuild: - Fix a messed up dependency in mod_ssl 2.8.21. - - 09 Nov 2004; Michael Tindal <urilith@gentoo.org> files/mod_ssl.conf: - Change cache location. Bug #65054. - - 07 Nov 2004; Joshua Kinard <kumba@gentoo.org> mod_ssl-2.8.21.ebuild: - Marked stable on mips. - - 02 Nov 2004; Simon Stelling <blubb@gentoo.org> mod_ssl-2.8.21.ebuild: - stable on amd64 for security reasons (bug #68564) - - 30 Oct 2004; Bryan Østergaard <kloeri@gentoo.org> mod_ssl-2.8.21.ebuild: - Stable on alpha, bug 68564. - - 29 Oct 2004; Simon Stelling <blubb@gentoo.org> mod_ssl-2.8.21.ebuild: - added ~amd64 - - 29 Oct 2004; Michael Hanselmann <hansmi@gentoo.org> mod_ssl-2.8.21.ebuild: - Stable on ppc. - - 29 Oct 2004; Jason Wever <weeve@gentoo.org> mod_ssl-2.8.21.ebuild: - Stable on sparc wrt security bug #68564. - - 29 Oct 2004; Stuart Herbert <stuart@gentoo.org> mod_ssl-2.8.21.ebuild: - Marked stable on x86; added --force so that this mod_ssl can be used with - apache-1.3.33 (temporary measure until mod_ssl is bumped upstream) - -*mod_ssl-2.8.21 (23 Oct 2004) - - 23 Oct 2004; Stuart Herbert <stuart@gentoo.org> +mod_ssl-2.8.21.ebuild: - Version bump to match apache-1.3.32 - -*mod_ssl-2.8.20 (21 Oct 2004) - - 21 Oct 2004; Bryan Østergaard <kloeri@gentoo.org> +mod_ssl-2.8.20.ebuild: - Version bump, bug 66807. - - 01 Aug 2004; Guy Martin <gmsoft@gentoo.org> mod_ssl-2.8.19.ebuild: - Marked stable on hppa. - - 02 Aug 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.19.ebuild: - Added dbm_key detection support. Closes #58624. - - 28 Jul 2004; Joshua Kinard <kumba@gentoo.org> mod_ssl-2.8.19.ebuild: - Marked stable on mips. - - 27 Jul 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.19.ebuild: - Fix typo in config. Closes #58274. - - 22 Jul 2004; Luca Barbato <lu_zero@gentoo.org> mod_ssl-2.8.19.ebuild: - Marked ppc - - 19 Jul 2004; Bryan Østergaard <kloeri@gentoo.org> mod_ssl-2.8.19.ebuild: - Stable on alpha. - -*mod_ssl-2.8.19 (18 Jul 2004) - - 18 Jul 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.19.ebuild: - Version bump, cloes #57379. - - 20 Jun 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.17.ebuild, - mod_ssl-2.8.18.ebuild: - Ebuild cleanups. - - 09 Jun 2004; Guy Martin <gmsoft@gentoo.org> mod_ssl-2.8.18.ebuild: - Marked stable on hppa. - - 09 Jun 2004; Daniel Ostrow <dostrow@gentoo.org> mod_ssl-2.8.18.ebuild: - Stable on ppc. - - 07 Jun 2004; Michael Sterrett <mr_bones_@gentoo.org> mod_ssl-2.8.16.ebuild: - remove older ebuild with bad dep - - 06 Jun 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.16.ebuild: - Modified DEPENDS so we can get rid of 1.3.29-r1. - - 03 Jun 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.18.ebuild: - Marked stable for x86. - -*mod_ssl-2.8.18 (01 Jun 2004) - - 01 Jun 2004; Joshua Kinard <kumba@gentoo.org> mod_ssl-2.8.18.ebuild: - Marked stable on sparc and mips. - - 02 Jun 2004; Bryan Østergaard <kloeri@gentoo.org> : - Stable on alpha, bug 51368. - - 29 May 2004; Chuck Short <zul@gentoo.org> : - Version bump. Fix for CAN-2004-0488. Closes #51368. - - 25 May 2004; Guy Martin <gmsoft@gentoo.org> mod_ssl-2.8.17.ebuild: - Marked stable on hppa. - - 24 May 2004; Luca Barbato <lu_zero@gentoo.org> mod_ssl-2.8.17.ebuild: - Marked ppc - - 24 May 2004; Luca Barbato <lu_zero@gentoo.org> mod_ssl-2.8.17.ebuild: - Marked ppc - - 24 May 2004; Bryan Østergaard <kloeri@gentoo.org> mod_ssl-2.8.17.ebuild: - Stable on alpha. - - 23 May 2004; Christian Birchinger <joker@gentoo.org> mod_ssl-2.8.17.ebuild: - Added sparc stable keyword - - 23 May 2004; Joshua Kinard <kumba@gentoo.org> mod_ssl-2.8.17.ebuild: - Marked stable on mips. - - 25 May 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.17.ebuild: - Marked stable for x86. - -*mod_ssl-2.8.17 (12 May 2004) - - 12 May 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.17.ebuild: - Version bump. - - 16 Apr 2004; Chuck Short <zul@gentoo.org> files/ssl.default-vhost.conf: - Fixed DocumentRoot. Closes #47988. - - 13 Apr 2004; Chuck Short <zul@gentoo.org> mod_ssl-2.8.14.ebuild, - mod_ssl-2.8.15.ebuild, mod_ssl-2.8.16.ebuild: - Removed old versions of mod_ssl since the only one we are using now 1.3.29-r1. - - 08 Apr 2004; Stuart Herbert <stuart@gentoo.org> - files/ssl.default-vhost.conf: - Fix for typos in the mod_ssl config file - - 04 Apr 2004; Chuck Short <zul@gentoo.org> metadata.xml: - Updated metadata.xml - - 03 Apr 2004; Chuck Short <zul@gentoo.org> metadata.xml, - mod_ssl-2.8.14.ebuild, mod_ssl-2.8.15.ebuild, mod_ssl-2.8.16.ebuild, - files/ssl.default-vhost.conf: - Added metadata.xml - Updated headers, turned off ssl for virtualhosts on port 80. Closes #45700. - - 19 Nov 2003; Daniel Robbins <drobbins@gentoo.org> mod_ssl-2.8.16.ebuild: - moving to stable on all arches for GLSA 200310-03 (Apache 1.x security fix.) - -*mod_ssl-2.8.16 (02 Nov 2003) - - 02 Nov 2003; <solar@gentoo.org> mod_ssl-2.8.16.ebuild: - version bump for apache-1.3.29 security fix - - 06 Oct 2003; Jason Wever <weeve@gentoo.org> mod_ssl-2.8.15.ebuild: - Marked stable for sparc. - - 04 Aug 2003; Donny Davies <woodchip@gentoo.org> mod_ssl-2.8.15.ebuild: - Mark x86 stable. - - 31 Jul 2003; Tavis Ormandy <taviso@gentoo.org> mod_ssl-2.8.14.ebuild: - ~alpha - -*mod_ssl-2.8.15 (23 Jul 2003) - - 03 Aug 2003; Guy Martin <gmsoft@gentoo.org> mod_ssl-2.8.15.ebuild : - Added hppa to KEYWORDS. - - 23 Jul 2003; Donny Davies <woodchip@gentoo.org> mod_ssl-2.8.15.ebuild: - Bump for Apache-1.3.28. - -*mod_ssl-2.8.14 (25 Mar 2003) - - 25 Mar 2003; Daniel Ahlberg <aliz@gentoo.org> mod_ssl-2.8.14.ebuild : - Security update. - -*mod_ssl-2.8.12-r1 (21 Feb 2003) - - 11 Mar 2003; Thomas Raschbacher <lordvan@gentoo.org> mod_ssl-2.8.12-r1.ebuild: - configure says it needs apache 1.3.27 (only) -> changed dep - - 21 Feb 2003; Martin Holzer <mholzer@gentoo.org> mod_ssl-2.8.12-r1.ebuild : - Bumped Revision cause of openssl - -*mod_ssl-2.8.12 (26 Oct 2002) - - 26 Oct 2002; Daniel Ahlberg <aliz@gentoo.org> : - Security update. - -*mod_ssl-2.8.11.ebuild (14 July 2002) - - 10 Oct 2002; Mike Frysinger <vapier@gentoo.org> mod_ssl-2.8.11.ebuild : - Version bump #8978 - -*mod_ssl-2.8.8-r1.ebuild (14 July 2002) - - 14 Jul 2002; Daniel Ahlberg <aliz@gentoo.org> mod_ssl-2.8.8-r1.ebuild : - Added KEYWORDS. - -*mod_ssl-2.8.10 (24 Jun 2002) - - 14 Aug 2002; Pieter Van den Abeele <pvdabeel@gentoo.org> : - Added ppc keyword - - 14 Jul 2002; Daniel Ahlberg <aliz@gentoo.org> mod_ssl-2.8.10.ebuild : - Added KEYWORDS. - - 24 Jun 2002; Nicholas Jones <carpaski@gentoo.org> mod_ssl-2.8.10.ebuild - o Version bump. Overflow fix. - -*mod_ssl-2.8.9-r1 (21 Jun 2002) - - 14 Jul 2002; Daniel Ahlberg <aliz@gentoo.org> mod_ssl-2.8.9.ebuild : - Added KEYWORDS. - - 14 Jul 2002; Daniel Ahlberg <aliz@gentoo.org> mod_ssl-2.8.9-r1.ebuild : - Added KEYWORDS. - - 21 Jun 2002; Nicholas Jones <carpaski@gentoo.org> mod_ssl-2.8.9-r1.ebuild - o Changed depend line to allow for revisions of apache without - new ebuilds for mod_ssl. - -*mod_ssl-2.8.9 (20 Jun 2002) - - 20 Jun 2002; Thilo Bangert <bangert@gentoo.org> mod_ssl-2.8.9.ebuild - version bump - for apache 1.3.26 - -*mod_ssl-2.8.8 (9 Apr 2002) - - 9 Apr 2002; Donny Davies <woodchip@gentoo.org> : - New package to go along with the rewritten apache ebuild. diff --git a/net-www/mod_ssl/Manifest b/net-www/mod_ssl/Manifest deleted file mode 100644 index 9a4711f639e1..000000000000 --- a/net-www/mod_ssl/Manifest +++ /dev/null @@ -1,36 +0,0 @@ -AUX 10_mod_ssl.conf 2859 RMD160 6639871106bc5a1aef0d5f4f652363860bb7afaa SHA1 c5e259c689e72af1dd9a3ae580f9ae581adab1d6 SHA256 e9b4c64c375336d85719d9253d8c705d0c7bbe32de8f0c017541ddeb0f0b75df -MD5 515630b3e53faa458b8ec7a0e73bef55 files/10_mod_ssl.conf 2859 -RMD160 6639871106bc5a1aef0d5f4f652363860bb7afaa files/10_mod_ssl.conf 2859 -SHA256 e9b4c64c375336d85719d9253d8c705d0c7bbe32de8f0c017541ddeb0f0b75df files/10_mod_ssl.conf 2859 -AUX default-ssl.conf 7653 RMD160 11b95a8c5e0f17cbb5152d8dd174b98c26c860ab SHA1 c94fa14582b61162ff7c3d07e1e5086a98f351c0 SHA256 1bf5c9c3fe2ccdbc4d5c56486fd8305dd88fbfcd1111858957af4ce9e3c16171 -MD5 959a0125c23ead91b0071f4ffc54e9bc files/default-ssl.conf 7653 -RMD160 11b95a8c5e0f17cbb5152d8dd174b98c26c860ab files/default-ssl.conf 7653 -SHA256 1bf5c9c3fe2ccdbc4d5c56486fd8305dd88fbfcd1111858957af4ce9e3c16171 files/default-ssl.conf 7653 -AUX gentestcrt.sh 8801 RMD160 dc36b929ba0ee4b1640a3f9f2f3848d0c55a07d9 SHA1 258013559ae847feab8585b68b5e6ee604346b4c SHA256 e528d3aae1aae6d66b5df72c845ec63926bcf9bbdcb1e8f0796e7c47de4f6ceb -MD5 dd92adba34e6b36ef6fd2750869e1a18 files/gentestcrt.sh 8801 -RMD160 dc36b929ba0ee4b1640a3f9f2f3848d0c55a07d9 files/gentestcrt.sh 8801 -SHA256 e528d3aae1aae6d66b5df72c845ec63926bcf9bbdcb1e8f0796e7c47de4f6ceb files/gentestcrt.sh 8801 -DIST mod_ssl-2.8.25-1.3.34.tar.gz 820352 RMD160 90a3913d30c7f4d194907463125c90101005837a SHA1 150f726539d74c0d2af02e482be78bbcdb811395 SHA256 832b240157666efdbdfc1a2fd593ee4eebbc9441ec48ece8276660092b974d07 -DIST mod_ssl-2.8.28-1.3.37.tar.gz 820417 RMD160 6b12c0a52fe0fbb7b91221d1cb37f93fbe59bb11 SHA1 9db2a7240e499da2b99d0df9c1a6fbae0580ba0b SHA256 76437105b5b5593a7dbd8ee45af417233897dcaf910cbc337a68b0db24e35489 -EBUILD mod_ssl-2.8.25-r10.ebuild 1862 RMD160 d9ec405145ef927fd0f9895de70bf7db8819adb7 SHA1 aa58ce89b4f8aadbe3ef3fd7b6a4c28ba0f6d682 SHA256 5f5efae413bdc37c1431a11a7d2bbd79cd9597516d206e8a2bfb57e679065367 -MD5 46bc17fb0fb84c0c6c1bb31b58b65d20 mod_ssl-2.8.25-r10.ebuild 1862 -RMD160 d9ec405145ef927fd0f9895de70bf7db8819adb7 mod_ssl-2.8.25-r10.ebuild 1862 -SHA256 5f5efae413bdc37c1431a11a7d2bbd79cd9597516d206e8a2bfb57e679065367 mod_ssl-2.8.25-r10.ebuild 1862 -EBUILD mod_ssl-2.8.28.ebuild 1868 RMD160 f6d621f86d0e68a36aa2b2d6143790b9ea8748f8 SHA1 80f4b420c9187d2d8722a4cd636c4729e50da6a9 SHA256 da39f566ac073ec7917e884789dd1ae88462a64cda43639420b8b2a41d758bb2 -MD5 167e5c715db2ee05d65a6133a5e1473c mod_ssl-2.8.28.ebuild 1868 -RMD160 f6d621f86d0e68a36aa2b2d6143790b9ea8748f8 mod_ssl-2.8.28.ebuild 1868 -SHA256 da39f566ac073ec7917e884789dd1ae88462a64cda43639420b8b2a41d758bb2 mod_ssl-2.8.28.ebuild 1868 -MISC ChangeLog 13665 RMD160 f51bdd2e315f718a6bcf0a7ff26110ca3d0d18b5 SHA1 c6eeed532477a061585c9821e77d06bb97685262 SHA256 c5aea03bd55975221066c16087de94b0ff4e0f2c3e441b2ad48fd4a3ef2120b4 -MD5 0008c7ba631e25f2b7cc56943246711e ChangeLog 13665 -RMD160 f51bdd2e315f718a6bcf0a7ff26110ca3d0d18b5 ChangeLog 13665 -SHA256 c5aea03bd55975221066c16087de94b0ff4e0f2c3e441b2ad48fd4a3ef2120b4 ChangeLog 13665 -MISC metadata.xml 226 RMD160 d11ce73e47adf4b3d91309ec6489fded2f4d4e0e SHA1 fe9f7ce6f2281683065abb3255c8b731665c82ac SHA256 376a327f91f69eb96f0c1b05cc1481dd7017a0570f631a03b1f6d14d58215ca8 -MD5 7272d8b6d09e3e301b6a08aa9c912eb0 metadata.xml 226 -RMD160 d11ce73e47adf4b3d91309ec6489fded2f4d4e0e metadata.xml 226 -SHA256 376a327f91f69eb96f0c1b05cc1481dd7017a0570f631a03b1f6d14d58215ca8 metadata.xml 226 -MD5 733058325d244739057f7464f8fab3b9 files/digest-mod_ssl-2.8.25-r10 265 -RMD160 407f6079298509a67026223a045c1f2de1831576 files/digest-mod_ssl-2.8.25-r10 265 -SHA256 db89c52a48681068a539f75c94953424d1716090c36e8e49ce44471551245096 files/digest-mod_ssl-2.8.25-r10 265 -MD5 97f4583a0395c774364634b026431379 files/digest-mod_ssl-2.8.28 265 -RMD160 e2e6135498da63855ef6428fbb2e68589ced9e84 files/digest-mod_ssl-2.8.28 265 -SHA256 eb6f04ee23938d5a3bd53845bdec41f68df8c165c9f7e7420e16a407eb8ce446 files/digest-mod_ssl-2.8.28 265 diff --git a/net-www/mod_ssl/files/10_mod_ssl.conf b/net-www/mod_ssl/files/10_mod_ssl.conf deleted file mode 100644 index fc639333292a..000000000000 --- a/net-www/mod_ssl/files/10_mod_ssl.conf +++ /dev/null @@ -1,80 +0,0 @@ -# Copyright 1999-2004 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-www/mod_ssl/files/10_mod_ssl.conf,v 1.1 2005/01/08 21:43:06 hollow Exp $ - -<IfDefine SSL> - <IfModule !mod_ssl.c> - LoadModule ssl_module modules/libssl.so - </IfModule> -</IfDefine> - -# -# See http://www.modssl.org/docs/2.8/ for details -# -<IfModule mod_ssl.c> - ##-------------------------------------------------------------------------- - ## Add additional SSL configuration directives which provide a - ## robust default configuration: virtual server on port 443 - ## which speaks SSL. - ##-------------------------------------------------------------------------- - ## - ## SSL Support - ## - ## When we also provide SSL we have to listen to the - ## standard HTTP port (see above) and to the HTTPS port - ## - Listen 443 - - ## - ## SSL Global Context - ## - ## All SSL configuration in this context applies both to - ## the main server and all SSL-enabled virtual hosts. - ## - # - # Some MIME-types for downloading Certificates and CRLs - # - AddType application/x-x509-ca-cert .crt - AddType application/x-pkcs7-crl .crl - - # Pass Phrase Dialog: - # Configure the pass phrase gathering process. - # The filtering dialog program (`builtin' is a internal - # terminal dialog) has to provide the pass phrase on stdout. - SSLPassPhraseDialog builtin - - # Inter-Process Session Cache: - # Configure the SSL Session Cache: First either `none' - # or `dbm:/path/to/file' for the mechanism to use and - # second the expiring timeout (in seconds). - #SSLSessionCache none - #SSLSessionCache dbm:logs/ssl_scache - #SSLSessionCache shm:/var/cache/apache/ssl_scache - SSLSessionCache shm:/var/cache/apache/ssl_scache(512000) - SSLSessionCacheTimeout 300 - - # Semaphore: - # Configure the path to the mutual explusion semaphore the - # SSL engine uses internally for inter-process synchronization. - SSLMutex sem - - # Pseudo Random Number Generator (PRNG): - # Configure one or more sources to seed the PRNG of the - # SSL library. The seed data should be of good random quality. - SSLRandomSeed startup builtin - SSLRandomSeed connect builtin - #SSLRandomSeed startup file:/dev/random 512 - #SSLRandomSeed startup file:/dev/urandom 512 - #SSLRandomSeed connect file:/dev/random 512 - #SSLRandomSeed connect file:/dev/urandom 512 - - # Logging: - # The home of the dedicated SSL protocol logfile. Errors are - # additionally duplicated in the general error log file. Put - # this somewhere where it cannot be used for symlink attacks on - # a real server (i.e. somewhere where only root can write). - # Log levels are (ascending order: higher ones include lower ones): - # none, error, warn, info, trace, debug. - SSLLog logs/ssl_engine_log - SSLLogLevel info -</IfModule> diff --git a/net-www/mod_ssl/files/default-ssl.conf b/net-www/mod_ssl/files/default-ssl.conf deleted file mode 100644 index e0bdee00d40c..000000000000 --- a/net-www/mod_ssl/files/default-ssl.conf +++ /dev/null @@ -1,155 +0,0 @@ -# Copyright 1999-2004 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-www/mod_ssl/files/default-ssl.conf,v 1.1 2005/01/08 21:43:06 hollow Exp $ - -<IfModule mod_ssl.c> - <VirtualHost _default_:80> - SSLEngine off - </VirtualHost> - - ## - ## SSL Virtual Host Context - ## - - <VirtualHost _default_:443> - # General setup for the virtual host - DocumentRoot /var/www/localhost/htdocs - #ServerName new.host.name - #ServerAdmin you@your.address - ErrorLog logs/ssl-error_log - TransferLog logs/ssl-access_log - - # SSL Engine Switch: - # Enable/Disable SSL for this virtual host. - SSLEngine on - - # SSL Cipher Suite: - # List the ciphers that the client is permitted to negotiate. - # See the mod_ssl documentation for a complete list. - SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL - - # Server Certificate: - # Point SSLCertificateFile at a PEM encoded certificate. If - # the certificate is encrypted, then you will be prompted for a - # pass phrase. Note that a kill -HUP will prompt again. A test - # certificate can be generated with `make certificate' under - # built time. - SSLCertificateFile conf/ssl/server.crt - - # Server Private Key: - # If the key is not combined with the certificate, use this - # directive to point at the key file. - SSLCertificateKeyFile conf/ssl/server.key - - # Server Certificate Chain: - # Point SSLCertificateChainFile at a file containing the - # concatenation of PEM encoded CA certificates which form the - # certificate chain for the server certificate. Alternatively - # the referenced file can be the same as SSLCertificateFile - # when the CA certificates are directly appended to the server - # certificate for convinience. - #SSLCertificateChainFile @@ServerRoot@@/conf/ssl/ssl.crt/ca.crt - - # Certificate Authority (CA): - # Set the CA certificate verification path where to find CA - # certificates for client authentication or alternatively one - # huge file containing all of them (file must be PEM encoded) - # Note: Inside SSLCACertificatePath you need hash symlinks - # to point to the certificate files. Use the provided - # Makefile to update the hash symlinks after changes. - #SSLCACertificatePath @@ServerRoot@@/conf/ssl/ssl.crt - #SSLCACertificateFile @@ServerRoot@@/conf/sssl/sl.crt/ca-bundle.crt - - # Certificate Revocation Lists (CRL): - # Set the CA revocation path where to find CA CRLs for client - # authentication or alternatively one huge file containing all - # of them (file must be PEM encoded) - # Note: Inside SSLCARevocationPath you need hash symlinks - # to point to the certificate files. Use the provided - # Makefile to update the hash symlinks after changes. - #SSLCARevocationPath @@ServerRoot@@/conf/ssl/ssl.crl - #SSLCARevocationFile @@ServerRoot@@/conf/ssl/ssl.crl/ca-bundle.crl - - # Client Authentication (Type): - # Client certificate verification type and depth. Types are - # none, optional, require and optional_no_ca. Depth is a - # number which specifies how deeply to verify the certificate - # issuer chain before deciding the certificate is not valid. - #SSLVerifyClient require - #SSLVerifyDepth 10 - - # Access Control: - # With SSLRequire you can do per-directory access control based - # on arbitrary complex boolean expressions containing server - # variable checks and other lookup directives. The syntax is a - # mixture between C and Perl. See the mod_ssl documentation - # for more details. - #<Location /> - #SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \ - # and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \ - # and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \ - # and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \ - # and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 ) \ - # or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/ - #</Location> - - # SSL Engine Options: - # Set various options for the SSL engine. - # FakeBasicAuth: - # Translate the client X.509 into a Basic Authorisation. This means that - # the standard Auth/DBMAuth methods can be used for access control. The - # user name is the `one line' version of the client's X.509 certificate. - # Note that no password is obtained from the user. Every entry in the user - # file needs this password: `xxj31ZMTZzkVA'. - # ExportCertData: - # This exports two additional environment variables: SSL_CLIENT_CERT and - # SSL_SERVER_CERT. These contain the PEM-encoded certificates of the - # server (always existing) and the client (only existing when client - # authentication is used). This can be used to import the certificates - # into CGI scripts. - # CompatEnvVars: - # This exports obsolete environment variables for backward compatibility - # to Apache-SSL 1.x, mod_ssl 2.0.x, Sioux 1.0 and Stronghold 2.x. Use this - # to provide compatibility to existing CGI scripts. - # StrictRequire: - # This denies access when "SSLRequireSSL" or "SSLRequire" applied even - # under a "Satisfy any" situation, i.e. when it applies access is denied - # and no other module can change it. - # OptRenegotiate: - # This enables optimized SSL connection renegotiation handling when SSL - # directives are used in per-directory context. - #SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVars +StrictRequire - - # SSL Protocol Adjustments: - # The safe and default but still SSL/TLS standard compliant shutdown - # approach is that mod_ssl sends the close notify alert but doesn't wait for - # the close notify alert from client. When you need a different shutdown - # approach you can use one of the following variables: - # ssl-unclean-shutdown: - # This forces an unclean shutdown when the connection is closed, i.e. no - # SSL close notify alert is send or allowed to received. This violates - # the SSL/TLS standard but is needed for some brain-dead browsers. Use - # this when you receive I/O errors because of the standard approach where - # mod_ssl sends the close notify alert. - # ssl-accurate-shutdown: - # This forces an accurate shutdown when the connection is closed, i.e. a - # SSL close notify alert is send and mod_ssl waits for the close notify - # alert of the client. This is 100% SSL/TLS standard compliant, but in - # practice often causes hanging connections with brain-dead browsers. Use - # this only for browsers where you know that their SSL implementation - # works correctly. - # Notice: Most problems of broken clients are also related to the HTTP - # keep-alive facility, so you usually additionally want to disable - # keep-alive for those clients, too. Use variable "nokeepalive" for this. - SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown - - # Per-Server Logging: - # The home of a custom SSL log file. Use this when you want a - # compact non-error SSL logfile on a virtual host basis. - CustomLog logs/ssl_request_log \ - "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b" - - RewriteEngine On - RewriteOptions inherit - </VirtualHost> -</IfModule> diff --git a/net-www/mod_ssl/files/digest-mod_ssl-2.8.25-r10 b/net-www/mod_ssl/files/digest-mod_ssl-2.8.25-r10 deleted file mode 100644 index 3206c2045b4d..000000000000 --- a/net-www/mod_ssl/files/digest-mod_ssl-2.8.25-r10 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 1ef2a6cb47573444779b2fd10502514b mod_ssl-2.8.25-1.3.34.tar.gz 820352 -RMD160 90a3913d30c7f4d194907463125c90101005837a mod_ssl-2.8.25-1.3.34.tar.gz 820352 -SHA256 832b240157666efdbdfc1a2fd593ee4eebbc9441ec48ece8276660092b974d07 mod_ssl-2.8.25-1.3.34.tar.gz 820352 diff --git a/net-www/mod_ssl/files/digest-mod_ssl-2.8.28 b/net-www/mod_ssl/files/digest-mod_ssl-2.8.28 deleted file mode 100644 index 7b48f2a3160d..000000000000 --- a/net-www/mod_ssl/files/digest-mod_ssl-2.8.28 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 5e9486a86fcd4efef395f58fd795aaea mod_ssl-2.8.28-1.3.37.tar.gz 820417 -RMD160 6b12c0a52fe0fbb7b91221d1cb37f93fbe59bb11 mod_ssl-2.8.28-1.3.37.tar.gz 820417 -SHA256 76437105b5b5593a7dbd8ee45af417233897dcaf910cbc337a68b0db24e35489 mod_ssl-2.8.28-1.3.37.tar.gz 820417 diff --git a/net-www/mod_ssl/files/gentestcrt.sh b/net-www/mod_ssl/files/gentestcrt.sh deleted file mode 100644 index 5cd721d8f95c..000000000000 --- a/net-www/mod_ssl/files/gentestcrt.sh +++ /dev/null @@ -1,243 +0,0 @@ -#!/bin/sh -## $Header: /var/cvsroot/gentoo-x86/net-www/mod_ssl/files/gentestcrt.sh,v 1.3 2004/07/18 04:25:08 dragonheart Exp $ -## -## gentestcrt -- Create self-signed test certificate -## (C) 2001 Jean-Michel Dault <jmdault@mandrakesoft.com> and Mandrakesoft -## Based on cca.sh script by Ralf S. Engelschall -## - -# external tools -openssl="/usr/bin/openssl" - -# some optional terminal sequences -case $TERM in - xterm|xterm*|vt220|vt220*) - T_MD=`echo dummy | awk '{ printf("%c%c%c%c", 27, 91, 49, 109); }'` - T_ME=`echo dummy | awk '{ printf("%c%c%c", 27, 91, 109); }'` - ;; - vt100|vt100*) - T_MD=`echo dummy | awk '{ printf("%c%c%c%c%c%c", 27, 91, 49, 109, 0, 0); }'` - T_ME=`echo dummy | awk '{ printf("%c%c%c%c%c", 27, 91, 109, 0, 0); }'` - ;; - default) - T_MD='' - T_ME='' - ;; -esac - -# find some random files -# (do not use /dev/random here, because this device -# doesn't work as expected on all platforms) -randfiles='' -for file in /var/log/messages /var/adm/messages \ - /kernel /vmunix /vmlinuz \ - /etc/hosts /etc/resolv.conf; do - if [ -f $file ]; then - if [ ".$randfiles" = . ]; then - randfiles="$file" - else - randfiles="${randfiles}:$file" - fi - fi -done - - -echo "${T_MD}maketestcrt -- Create self-signed test certificate${T_ME}" -echo "(C) 2001 Jean-Michel Dault <jmdault@mandrakesoft.com> and Mandrakesoft" -echo "Based on cca.sh script by Ralf S. Engelschall" -echo "" - -grep -q -s DUMMY server.crt && mv server.crt server.crt.dummy -grep -q -s DUMMY server.key && mv server.key server.key.dummy - -echo "" -echo "" - -if [ ! -e ./server.crt -a ! -e ./server.key ];then - echo "Will create server.key and server.crt in `pwd`" -else - echo "server.key and server.crt already exist, dying" - exit -fi - -echo "" - - -mkdir -p /tmp/tmpssl-$$ -pushd /tmp/tmpssl-$$ > /dev/null - - - echo "${T_MD}INITIALIZATION${T_ME}" - - echo "" - echo "${T_MD}Generating custom Certificate Authority (CA)${T_ME}" - echo "______________________________________________________________________" - echo "" - echo "${T_MD}STEP 1: Generating RSA private key for CA (1024 bit)${T_ME}" - cp /dev/null ca.rnd - echo '01' >ca.ser - if [ ".$randfiles" != . ]; then - $openssl genrsa -rand $randfiles -out ca.key 1024 - else - $openssl genrsa -out ca.key 1024 - fi - if [ $? -ne 0 ]; then - echo "cca:Error: Failed to generate RSA private key" 1>&2 - exit 1 - fi - echo "______________________________________________________________________" - echo "" - echo "${T_MD}STEP 2: Generating X.509 certificate signing request for CA${T_ME}" - cat >.cfg <<EOT -[ req ] -default_bits = 1024 -distinguished_name = req_DN -RANDFILE = ca.rnd -[ req_DN ] -countryName = "1. Country Name (2 letter code)" -#countryName_default = CA -#countryName_min = 2 -countryName_max = 2 -stateOrProvinceName = "2. State or Province Name (full name) " -#stateOrProvinceName_default = "Quebec" -localityName = "3. Locality Name (eg, city) " -#localityName_default = "Montreal" -0.organizationName = "4. Organization Name (eg, company) " -0.organizationName_default = "Apache HTTP Server" -organizationalUnitName = "5. Organizational Unit Name (eg, section) " -organizationalUnitName_default = "For testing purposes only" -commonName = "6. Common Name (eg, CA name) " -commonName_max = 64 -commonName_default = "localhost" -emailAddress = "7. Email Address (eg, name@FQDN)" -emailAddress_max = 40 -#emailAddress_default = "root@localhost" -EOT - $openssl req -config .cfg -new -key ca.key -out ca.csr - if [ $? -ne 0 ]; then - echo "cca:Error: Failed to generate certificate signing request" 1>&2 - exit 1 - fi - echo "______________________________________________________________________" - echo "" - echo "${T_MD}STEP 3: Generating X.509 certificate for CA signed by itself${T_ME}" - cat >.cfg <<EOT -#extensions = x509v3 -#[ x509v3 ] -#subjectAltName = email:copy -#basicConstraints = CA:true,pathlen:0 -#nsComment = "CCA generated custom CA certificate" -#nsCertType = sslCA -EOT - $openssl x509 -extfile .cfg -req -days 365 -signkey ca.key -in ca.csr -out ca.crt - if [ $? -ne 0 ]; then - echo "cca:Error: Failed to generate self-signed CA certificate" 1>&2 - exit 1 - fi - echo "______________________________________________________________________" - echo "" - echo "${T_MD}RESULT:${T_ME}" - $openssl verify ca.crt - if [ $? -ne 0 ]; then - echo "cca:Error: Failed to verify resulting X.509 certificate" 1>&2 - exit 1 - fi - $openssl x509 -text -in ca.crt - $openssl rsa -text -in ca.key - - echo "${T_MD}CERTIFICATE GENERATION${T_ME}" - user="server" - - echo "" - echo "${T_MD}Generating custom USER${T_ME} [$user]" - echo "______________________________________________________________________" - echo "" - echo "${T_MD}STEP 5: Generating RSA private key for USER (1024 bit)${T_ME}" - if [ ".$randfiles" != . ]; then - $openssl genrsa -rand $randfiles -out $user.key 1024 - else - $openssl genrsa -out $user.key 1024 - fi - if [ $? -ne 0 ]; then - echo "cca:Error: Failed to generate RSA private key" 1>&2 - exit 1 - fi - echo "______________________________________________________________________" - echo "" - echo "${T_MD}STEP 6: Generating X.509 certificate signing request for USER${T_ME}" - cat >.cfg <<EOT -[ req ] -default_bits = 1024 -distinguished_name = req_DN -RANDFILE = ca.rnd -[ req_DN ] -countryName = "1. Country Name (2 letter code)" -#countryName_default = XY -#countryName_min = 2 -countryName_max = 2 -stateOrProvinceName = "2. State or Province Name (full name) " -#stateOrProvinceName_default = "Unknown" -localityName = "3. Locality Name (eg, city) " -#localityName_default = "Server Room" -0.organizationName = "4. Organization Name (eg, company) " -0.organizationName_default = "Apache HTTP Server" -organizationalUnitName = "5. Organizational Unit Name (eg, section) " -organizationalUnitName_default = "Test Certificate" -commonName = "6. Common Name (eg, DOMAIN NAME) " -commonName_max = 64 -commonName_default = "localhost" -emailAddress = "7. Email Address (eg, name@fqdn)" -emailAddress_max = 40 -#emailAddress_default = "root@localhost" -EOT - $openssl req -config .cfg -new -key $user.key -out $user.csr - if [ $? -ne 0 ]; then - echo "cca:Error: Failed to generate certificate signing request" 1>&2 - exit 1 - fi - rm -f .cfg - echo "______________________________________________________________________" - echo "" - echo "${T_MD}STEP 7: Generating X.509 certificate signed by own CA${T_ME}" - cat >.cfg <<EOT -#extensions = x509v3 -#[ x509v3 ] -#subjectAltName = email:copy -#basicConstraints = CA:false,pathlen:0 -#nsComment = "CCA generated client certificate" -#nsCertType = client -EOT - $openssl x509 -extfile .cfg -days 365 -CAserial ca.ser -CA ca.crt -CAkey ca.key -in $user.csr -req -out $user.crt - if [ $? -ne 0 ]; then - echo "cca:Error: Failed to generate X.509 certificate" 1>&2 - exit 1 - fi - caname="`$openssl x509 -noout -text -in ca.crt |\ - grep Subject: | sed -e 's;.*CN=;;' -e 's;/Em.*;;'`" - username="`$openssl x509 -noout -text -in $user.crt |\ - grep Subject: | sed -e 's;.*CN=;;' -e 's;/Em.*;;'`" -# echo "Assembling PKCS#12 package" -# $openssl pkcs12 -export -in $user.crt -inkey $user.key -certfile ca.crt -name "$username" -caname "$caname" -out $user.p12 - echo "______________________________________________________________________" - echo "" - echo "${T_MD}RESULT:${T_ME}" - $openssl verify -CAfile ca.crt $user.crt - if [ $? -ne 0 ]; then - echo "cca:Error: Failed to verify resulting X.509 certificate" 1>&2 - exit 1 - fi - $openssl x509 -text -in $user.crt - $openssl rsa -text -in $user.key - - -popd >/dev/null - - -rm -f /tmp/tmpssl-$$/*.csr -rm -f /tmp/tmpssl-$$/ca.* -chmod 400 /tmp/tmpssl-$$/* - -echo "Certificate creation done!" -cp /tmp/tmpssl-$$/server.* . - -rm -rf /tmp/tmpssl-$$ diff --git a/net-www/mod_ssl/metadata.xml b/net-www/mod_ssl/metadata.xml deleted file mode 100644 index ff5b6490402e..000000000000 --- a/net-www/mod_ssl/metadata.xml +++ /dev/null @@ -1,8 +0,0 @@ -<?xml version="1.0" encoding="UTF-8"?> -<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> -<pkgmetadata> -<herd>apache</herd> -<maintainer> - <email>apache-bugs@gentoo.org</email> -</maintainer> -</pkgmetadata> diff --git a/net-www/mod_ssl/mod_ssl-2.8.25-r10.ebuild b/net-www/mod_ssl/mod_ssl-2.8.25-r10.ebuild deleted file mode 100644 index 0e50a99bda57..000000000000 --- a/net-www/mod_ssl/mod_ssl-2.8.25-r10.ebuild +++ /dev/null @@ -1,79 +0,0 @@ -# Copyright 1999-2007 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-www/mod_ssl/mod_ssl-2.8.25-r10.ebuild,v 1.10 2007/01/14 20:38:43 chtekk Exp $ - -inherit apache-module multilib - -KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86" - -MY_P="${P}-1.3.34" - -DESCRIPTION="An SSL module for the Apache 1.3 webserver." -HOMEPAGE="http://www.modssl.org/" -SRC_URI="http://www.modssl.org/source/${MY_P}.tar.gz" -LICENSE="as-is" -SLOT="0" -IUSE="" - -DEPEND=">=dev-libs/openssl-0.9.6k" -RDEPEND="${DEPEND}" - -S="${WORKDIR}/${MY_P}" - -APACHE1_MOD_FILE="${S}/pkg.sslmod/libssl.so" -APACHE1_MOD_CONF="10_${PN}" -APACHE1_MOD_DEFINE="SSL" - -VHOSTFILE="default-ssl" - -DOCFILES="ANNOUNCE CHANGES CREDITS LICENSE NEWS README*" - -need_apache1 - -src_unpack() { - unpack ${A} - cd "${S}" - - # Proper path to OpenSSL - sed -i -e 's:^\(openssl=\).*:\1"/usr/bin/openssl":' pkg.contrib/cca.sh -} - -src_compile() { - local myconf="" - - if has_version '=sys-libs/gdbm-1.8.3*' ; then - myconf="${myconf} --enable-rule=SSL_SDBM" - fi - - SSL_BASE=SYSTEM \ - ./configure \ - --with-apxs=${APXS1} \ - ${myconf} \ - || die "./configure failed" - emake || die "emake failed" -} - -src_install() { - apache1_src_install - - insinto "${APACHE1_VHOSTDIR}" - doins "${FILESDIR}/${VHOSTFILE}.conf" - - exeinto /usr/$(get_libdir)/ssl/mod_ssl - doexe pkg.contrib/*.sh "${FILESDIR}/gentestcrt.sh" - - dodir /usr/share/doc/${PF}/html - cp -pPR pkg.ssldoc/* "${D}/usr/share/doc/${PF}/html" -} - -pkg_postinst() { - install -d -m0755 -o root -g root "${ROOT}${APACHE1_CONFDIR}/ssl" - - apache1_pkg_postinst - - cd "${ROOT}${APACHE1_CONFDIR}/ssl" - einfo "Generating self-signed test certificate in ${APACHE1_CONFDIR}/ssl ..." - einfo "(Ignore any message from the yes command below)" - yes "" | "${ROOT}"/usr/lib/ssl/mod_ssl/gentestcrt.sh >/dev/null 2>&1 - einfo -} diff --git a/net-www/mod_ssl/mod_ssl-2.8.28.ebuild b/net-www/mod_ssl/mod_ssl-2.8.28.ebuild deleted file mode 100644 index 8dcb5c80b5d3..000000000000 --- a/net-www/mod_ssl/mod_ssl-2.8.28.ebuild +++ /dev/null @@ -1,79 +0,0 @@ -# Copyright 1999-2007 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-www/mod_ssl/mod_ssl-2.8.28.ebuild,v 1.2 2007/01/14 20:38:43 chtekk Exp $ - -inherit apache-module multilib - -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86" - -MY_P="${P}-1.3.37" - -DESCRIPTION="An SSL module for the Apache 1.3 webserver." -HOMEPAGE="http://www.modssl.org/" -SRC_URI="http://www.modssl.org/source/${MY_P}.tar.gz" -LICENSE="as-is" -SLOT="0" -IUSE="" - -DEPEND=">=dev-libs/openssl-0.9.6k" -RDEPEND="${DEPEND}" - -S="${WORKDIR}/${MY_P}" - -APACHE1_MOD_FILE="${S}/pkg.sslmod/libssl.so" -APACHE1_MOD_CONF="10_${PN}" -APACHE1_MOD_DEFINE="SSL" - -VHOSTFILE="default-ssl" - -DOCFILES="ANNOUNCE CHANGES CREDITS LICENSE NEWS README*" - -need_apache1 - -src_unpack() { - unpack ${A} - cd "${S}" - - # Proper path to OpenSSL - sed -i -e 's:^\(openssl=\).*:\1"/usr/bin/openssl":' pkg.contrib/cca.sh -} - -src_compile() { - local myconf="" - - if has_version '=sys-libs/gdbm-1.8.3*' ; then - myconf="${myconf} --enable-rule=SSL_SDBM" - fi - - SSL_BASE=SYSTEM \ - ./configure \ - --with-apxs=${APXS1} \ - ${myconf} \ - || die "./configure failed" - emake || die "emake failed" -} - -src_install() { - apache1_src_install - - insinto "${APACHE1_VHOSTDIR}" - doins "${FILESDIR}/${VHOSTFILE}.conf" - - exeinto /usr/$(get_libdir)/ssl/mod_ssl - doexe pkg.contrib/*.sh "${FILESDIR}/gentestcrt.sh" - - dodir /usr/share/doc/${PF}/html - cp -pPR pkg.ssldoc/* "${D}/usr/share/doc/${PF}/html" -} - -pkg_postinst() { - install -d -m0755 -o root -g root "${ROOT}${APACHE1_CONFDIR}/ssl" - - apache1_pkg_postinst - - cd "${ROOT}${APACHE1_CONFDIR}/ssl" - einfo "Generating self-signed test certificate in ${APACHE1_CONFDIR}/ssl ..." - einfo "(Ignore any message from the yes command below)" - yes "" | "${ROOT}"/usr/lib/ssl/mod_ssl/gentestcrt.sh >/dev/null 2>&1 - einfo -} |