Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.1.1u,1 31 May 2023 11:41:20
    |
Bernard Spil (brnrd)  |
security/openssl: Security update to 1.1.1u
Security: eb9a3c57-ff9e-11ed-a0d1-84a93843eb75
MFH: 2023Q2 |
1.1.1t_2,1 29 Mar 2023 18:53:07
    |
Bernard Spil (brnrd)  |
security/openssl: Security update for CVE-2023-0465 & 0466
Security: 425b9538-ce5f-11ed-ade3-d4c9ef517024 |
1.1.1t_1,1 24 Mar 2023 11:43:40
    |
Bernard Spil (brnrd)  |
security/openssl: Security update for CVE-2023-0464
Security: 1ba034fb-ca38-11ed-b242-d4c9ef517024 |
1.1.1t,1 15 Mar 2023 09:14:16
    |
Bernard Spil (brnrd)  |
security/openssl30: Chase rename in ports CONFLICTS*
Reported by: cperciva, junchoon |
1.1.1t,1 07 Feb 2023 19:54:35
    |
Bernard Spil (brnrd)  |
security/openssl: Security update to 1.1.1t
Security: 648a432c-a71f-11ed-86e9-d4c9ef517024
MFH: 2023Q1 |
1.1.1s,1 01 Nov 2022 17:47:15
    |
Bernard Spil (brnrd)  |
security/openssl: Update to 1.1.1s |
07 Sep 2022 21:58:51
    |
Stefan Eßer (se)  |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
1.1.1q,1 07 Sep 2022 21:10:59
    |
Stefan Eßer (se)  |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
1.1.1q,1 20 Jul 2022 14:22:56
    |
Tobias C. Berner (tcberner)  |
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org> (Only the first 15 lines of the commit message are shown above ) |
1.1.1q,1 05 Jul 2022 14:53:43
    |
Bernard Spil (brnrd)  |
security/openssl: Security update to 1.1.1q
* Fixes vuln in AES OCB
Security: a28e8b7e-fc70-11ec-856e-d4c9ef517024
MFH: 2022Q3 |
1.1.1p,1 22 Jun 2022 08:56:18
    |
Bernard Spil (brnrd)  |
security/openssl: Security update to 1.1.1p
Security: 4eeb93bf-f204-11ec-8fbd-d4c9ef517024 |
1.1.1o_1,1 22 Jun 2022 08:29:39
    |
Bernard Spil (brnrd)  |
security/vuxml: Document OpenSSL vulnerability
* Pet `make validate`
* Fix spacing for 482456fb-e9af-11ec-93b6-318d1419ea39
* Add discovery date for 482456fb-e9af-11ec-93b6-318d1419ea39
using tor wiki page update date. |
1.1.1o_1,1 14 May 2022 19:59:25
    |
Bernard Spil (brnrd)  |
security/openssl: Update KTLS patches
* Add support for TLS 1.3 receive
Reported by: jhb
Differential Revision: https://reviews.freebsd.org/D35189 |
1.1.1o,1 04 May 2022 07:33:32
    |
Bernard Spil (brnrd)  |
security/openssl: Update to 1.1.1o
Security: fceb2b08-cb76-11ec-a06f-d4c9ef517024
MFH: 2022Q2 |
1.1.1n,1 16 Mar 2022 19:18:56
    |
Bernard Spil (brnrd)  |
security/openssl: Security update to 1.1.1n
Security: ea05c456-a4fd-11ec-90de-1c697aa5a594
MFH: 2022Q1 |
1.1.1m_2,1 19 Feb 2022 15:12:25
    |
Bernard Spil (brnrd)  |
security/openssl: Update KTLS patch
Reported by: jhb
Differential Revision: https://reviews.freebsd.org/D34136 |
1.1.1m_1,1 10 Jan 2022 23:19:35
    |
Stefan Eßer (se)  |
security/openssl: add boringssl to CONFLICTS_INSTALL
Approved by: portmgr (implicit) |
1.1.1m_1,1 10 Jan 2022 15:15:39
    |
Stefan Eßer (se)  |
Fix CONFLICTS entries of multiple ports
There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.
This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.
Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port (Only the first 15 lines of the commit message are shown above ) |
1.1.1m_1,1 20 Dec 2021 18:03:30
    |
Bernard Spil (brnrd)  |
security/openssl: Fix build on aarch64
* Upstream only partly merged changes
PR: 259937, 260572
Reported by: allanjude, "Naram Qashat" <cyberbotx cyberbotx com> |
1.1.1m,1 14 Dec 2021 19:13:32
    |
Bernard Spil (brnrd)  |
security/openssl: Update to 1.1.1m |
1.1.1l_1,1 23 Nov 2021 22:11:40
    |
Stefan Eßer (se)  |
*/*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Approved by: portmgr (blanket) |
1.1.1l_1,1 23 Nov 2021 18:44:13
    |
Bernard Spil (brnrd)  |
www/openssl: Fix detection of ARM CPU features
Upstream:
* https://github.com/openssl/openssl/pull/17082
* https://github.com/openssl/openssl/pull/17085
PR: 259937
Submitted by: allanjude
Differential Revision: https://reviews.freebsd.org/D33061 |
1.1.1l,1 29 Aug 2021 12:40:50
    |
Bernard Spil (brnrd)  |
security/openssl: Auto-generate MAN3 plist |
1.1.1l,1 24 Aug 2021 17:54:49
    |
Bernard Spil (brnrd)  |
security/openssl: Security update to 1.1.1l
Security: 96811d4a-04ec-11ec-9b84-d4c9ef517024
MFH: 2021Q3 |
1.1.1k_2,1 19 Aug 2021 14:01:53
    |
Bernard Spil (brnrd)  |
security/openssl: Update KTLS patches for Chacha20-Poly1305
This pulls in several upstream KTLS patches from OpenSSL master:
* A fix to the return values of BIO_get_ktls_*().
* Support for Chacha20-Poly1305.
* Replacing the SSL_MODE_NO_KTLS_* modes which opted-out of KTLS with
an opt-in SSL_OP_ENABLE_KTLS. Note that this means that KTLS is not
enabled by default. Users can enable KTLS via a custom OpenSSL config
file that enables the KTLS option.
Reported by: jhb
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D31430 |
1.1.1k_1,1 06 Apr 2021 14:31:07
    |
Mathieu Arnold (mat)  |
Remove # $FreeBSD$ from Makefiles. |
1.1.1k_1,1 06 Apr 2021 10:45:45
    |
Bernard Spil (brnrd)  |
security/openssl: Fix /dev/crypto issue with 1.1.1k
PR: 254643
Reported by: <cryx-freebsd h3q com>
Reviewed by: wollman |
1.1.1k,1 26 Mar 2021 08:13:03
  |
brnrd  |
security/openssl: Security update to 1.1.1k
PR: 254551
Submitted by: Pascal Christen <pascal christen hostpoint ch>
MFH: 2021Q1
Security: 5a668ab3-8d86-11eb-b8d6-d4c9ef517024 |
1.1.1j_1,1 07 Mar 2021 16:45:49
  |
tobik  |
Remove redundant option descriptions that match the default ones
(ignoring case)
Reported by: danfe (for net/mosquitto), portscan |
1.1.1j_1,1 18 Feb 2021 09:22:42
  |
brnrd  |
security/openssl: Update KTLS patch
PR: 251969
Submitted by: gonzo, jhb
Obtained
from: https://github.com/openssl/openssl/commit/dfcfd17f2818cf520ce6381aed9ec3d2fc12170d
Differential Revision: https://reviews.freebsd.org/D28763 |
1.1.1j,1 17 Feb 2021 13:57:04
  |
brnrd  |
security/openssl: Security update to 1.1.1j
PR: 253561
Reported by: Michael Glaus <michael glaus hostpoint ch>
MFH: 2021Q1
Security: 96a21236-707b-11eb-96d8-d4c9ef517024 |
1.1.1i_1,1 31 Jan 2021 17:35:48
  |
brnrd  |
security/openssl: Update KTLS patch
Differential Revision: https://reviews.freebsd.org/D27423 |
1.1.1i,1 08 Dec 2020 16:26:33
  |
brnrd  |
security/vuxml: Security update to 1.1.1i
MFH: 2020Q4
Security: 1d56cfc5-3970-11eb-929d-d4c9ef517024 |
1.1.1h_1,1 05 Oct 2020 20:07:25
  |
jhb  |
Expand support for TLS protocols supported by KTLS.
Backport additional patches merged into OpenSSL's master
branch to support KTLS RX for TLS 1.1 and 1.2 as well as
support for KTLS TX for TLS 1.3.
Reviewed by: brnrd (maintainer)
Sponsored by: Chelsio Communications, Netflix
Differential Revision: https://reviews.freebsd.org/D26261 |
1.1.1h,1 23 Sep 2020 19:55:41
  |
brnrd  |
security/openssl: Update to 1.1.1g |
1.1.1g,1 23 May 2020 19:35:43
  |
brnrd  |
security/openssl: Add kernel TLS option
Submitted by: jhb@freebsd.org
Differential Revision: https://reviews.freebsd.org/D24274 |
1.1.1g,1 27 Apr 2020 13:10:14
  |
brnrd  |
security/openssl-devel: Resurrect OpenSSL devel port |
1.1.1g,1 22 Apr 2020 09:35:38
  |
brnrd  |
security/openssl: Security update to 1.1.1g
PR: 245795
Reported by: Dani <i dani at outlook com>
MFH: 2020Q2
Security: 012809ce-83f3-11ea-92ab-00163e433440 |
1.1.1f,1 31 Mar 2020 14:37:18
  |
brnrd  |
security/openssl: Bug-fix update to 1.1.1f
PR: 245154
MFH: 2020Q1 |
1.1.1e_1,1 29 Mar 2020 16:00:41
  |
brnrd  |
security/openssl: Fix EOF bug
See https://github.com/openssl/openssl/pull/11400
PR: 245154
Reported by: koobs
MFH: 2020Q1 |
1.1.1e,1 20 Mar 2020 20:05:25
  |
brnrd  |
security/openssl: Add missing description
Reported by: adamw |
1.1.1e,1 17 Mar 2020 20:02:38
  |
brnrd  |
security/openssl: Update to 1.1.1e
- SM2/SM3 not a cipher [1]
- Add weak-ciphers option [2]
PR: 237056 [1]
Reported by: dewayne heuristicsystems com.au> [1], mat [2] |
1.1.1d,1 03 Jan 2020 12:19:06
  |
brnrd  |
security/openssl: Remove self-conflict
PR: 243049
Submitted by: Franco Fichtner
MFH: 2020Q1 |
1.1.1d,1 01 Jan 2020 16:42:44
  |
brnrd  |
security/openssl111: Rename to openssl
- Honoring promise from DEPRECATED message
- Unbreak people's builds
PR: 243014
MFH: 2020Q1 |
1.0.2u,1 31 Dec 2019 17:00:29
  |
rene  |
Remove expired ports:
2019-12-31 accessibility/linux-c6-atk: Superseded by CentOS 7
2019-12-31 audio/exaile-devel: this port is older than audio/exaile
2019-12-31 audio/linux-c6-alsa-lib: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-plugins-oss: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-plugins-pulseaudio: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-utils: Superseded by CentOS 7
2019-12-31 audio/linux-c6-flac: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libaudiofile: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libogg: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libsndfile: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libvorbis: Superseded by CentOS 7
2019-12-31 audio/linux-c6-mikmod: Superseded by CentOS 7
2019-12-31 audio/linux-c6-nas-libs: Superseded by CentOS 7 (Only the first 15 lines of the commit message are shown above ) |
1.0.2u,1 20 Dec 2019 15:06:52
  |
brnrd  |
security/openssl: Security update to 1.0.2u
MFH: 2019Q4
Security: d778ddb0-2338-11ea-a1c7-b499baebfeaf |
1.0.2t,1 27 Oct 2019 11:19:53
  |
brnrd  |
security/openssl: Notify users of upcoming 1.1.1 |
1.0.2t,1 11 Sep 2019 20:04:29
  |
brnrd  |
security/openssl: Security update to 1.0.2t
MFH: 2019Q3
Security: 9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf |
1.0.2s,1 14 Aug 2019 12:16:13
  |
mat  |
Convert to UCL & cleanup pkg-message (categories s) |
1.0.2s,1 28 May 2019 20:22:25
  |
brnrd  |
security/openssl: Security hardening update to 1.0.2s
MFH: 2019Q2 |
1.0.2r,1 27 Feb 2019 08:06:02
  |
brnrd  |
security/openssl: Security update to 1.0.2r
MFH: 2019Q1
Security: 7700061f-34f7-11e9-b95c-b499baebfeaf |
1.0.2q,1 17 Feb 2019 19:09:55
  |
brnrd  |
security/openssl: Fix build with lld on i386
PR: 231459
Submitted by: Nathan <ndowens@yahoo.com>
Reported by: emaste |
1.0.2q,1 20 Nov 2018 17:53:09
  |
brnrd  |
security/openssl: Update to 1.0.2q |
1.0.2p_2,1 12 Nov 2018 20:19:24
  |
brnrd  |
security/openssl: Security update for CVE-2018-5407
MFH: 2018Q4
Security: 6f170cf2-e6b7-11e8-a9a8-b499baebfeaf |
1.0.2p_1,1 18 Oct 2018 09:30:09
  |
amdmi3  |
- Update WWW
Approved by: portmgr blanket |
1.0.2p_1,1 12 Sep 2018 11:36:17
  |
brnrd  |
Chase CONFLICTS after addition of security/openssl111
- While here mark OpenSSL 1.1.0 deprecated
see: https://www.openssl.org/policies/releasestrat.html |
1.0.2p_1,1 29 Aug 2018 16:03:38
  |
brnrd  |
security/openssl: Fix padlock patches url prefix |
1.0.2p_1,1 14 Aug 2018 15:12:32
  |
joneum  |
Fix PORTREVISION |
1.0.2p,1 14 Aug 2018 15:04:04
  |
brnrd  |
security/openssl: Add engines patches to distinfo
- Undo clobbering distinfo
Reported by: mat |
1.0.2p,1 14 Aug 2018 14:12:53
  |
brnrd  |
security/openssl: Update to 1.0.2p
- Includes vulnerability fixes that were already
added to the port as patches |
1.0.2o_4,1 01 Aug 2018 16:33:11
  |
adamw  |
Fix a common grammar error: "can not" means the opposite of "cannot."
"Can not" means "it is possible not to," and "cannot" means "it is impossible
to." |
1.0.2o_4,1 11 Jul 2018 08:37:43
  |
amdmi3  |
- Switch to new test framework
Approved by: portmgr blanket |
1.0.2o_4,1 12 Jun 2018 13:43:28
  |
brnrd  |
security/openssl: Actually add patch file
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf |
1.0.2o_3,1 12 Jun 2018 13:17:25
  |
brnrd  |
security/openssl: Security update
- Upstream update for CVE-2018-0732
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf |
1.0.2o_2,1 16 Apr 2018 17:47:16
  |
brnrd  |
security/openssl: Add CVE-2018-0737 patch
- Bump portrev too
MFH: 2018Q2
Security: 8f353420-4197-11e8-8777-b499baebfeaf |
1.0.2o_1,1 16 Apr 2018 17:24:35
  |
brnrd  |
security/openssl: Security update
MFH: 2018Q2
Security: 8f353420-4197-11e8-8777-b499baebfeaf |
1.0.2o,1 27 Mar 2018 15:27:06
  |
brnrd  |
security/openssl: Fix distinfo for patches
Reported by: joneum |
1.0.2o,1 27 Mar 2018 14:53:51
  |
brnrd  |
securit/openssl: Security update to 1.0.2o
MFH: 2018Q1
Security: b7cff5a9-31cc-11e8-8f07-b499baebfeaf |
1.0.2n,1 10 Mar 2018 10:53:36
  |
brnrd  |
security/openssl: Cleanup
- Remove EXPCIPHERS option (use security/openssl-unsafe) [1]
- Move port variables not dependent on bsd.port.pre.mk up
- Deleting man3 .pod files is redundant
- bss_dgram.c modification is a no-op
- Let openssl's Makefile install libs
- Simplify stripping
PR: 195270 [1] |
1.0.2n,1 07 Dec 2017 15:48:57
  |
brnrd  |
security/openssl: Update to 1.0.2m
- Remove patch now included upstream
- Include post-release patch for clang build error
MFH: 2017Q4
Security: 3bb451fc-db64-11e7-ac58-b499baebfeaf |
1.0.2m,1 03 Nov 2017 15:51:11
  |
brnrd  |
security/openssl: Unbreak build with No-SSLv3
- Importing patch from upstream
PR: 223388
Submitted by: tijl
Reported by: Laurence Parry <greenreaper@hotmail.com> |
1.0.2m,1 02 Nov 2017 21:32:34
  |
brnrd  |
security/openssl: Security update to 1.0.2m
- Adds additional manpages too
MFH: 2017Q4
Security: f40f07aa-c00f-11e7-ac58-b499baebfeaf |
1.0.2l,1 19 Aug 2017 15:11:03
  |
brnrd  |
security/openssl: Fix build on MIPS
- gcc 4.2.1 on MIPS fails on -Werror
PR: 221620
Submitted by: Fukang Chen <loader@FreeBSD.org>
MFH: 2017Q3 |
1.0.2l,1 24 Jul 2017 17:51:15
  |
brnrd  |
security/openssl: Fix MASTER_SITE_SUBDIR
- DISTVERSIONFULL is not expanded before assignment
PR: 219929
Submitted by: Fukang Chen <loader@FreeBSD.org> |
1.0.2l,1 25 Jun 2017 00:29:09
  |
linimon  |
Begin deorbit burn of ia64. We have not attempted to build packages for
it for many years.
While here, alphabetize ARCHs, pet portlint, and modernize usages.
Approved by: portmgr (tier-2 blanket) |
1.0.2l,1 10 Jun 2017 13:24:10
  |
brnrd  |
security/openssl: Fix xmpp STARTTLS
- Add (refactored) patch from master branch
PR: 219805
Submitted by: Alexey <fbsd98816551@avksrv.org> |
1.0.2l,1 25 May 2017 21:20:13
  |
brnrd  |
security/openssl: Fix distinfo after DIST_SUBDIR update
- Chase DIST_SUBDIR update in distinfo
Reported by: Cybil Courraud |
1.0.2l,1 25 May 2017 18:53:09
  |
brnrd  |
security/openssl: Update to 1.0.2l
- Bugfix update to 1.0.2l
- Fix PADLOCK option
- Build failure -Wunused-function
- Properly disable with configure
- Strip patch-version from DIST_SUBDIR, reduce dirs
- Remove unneeded testssl patch, dtls tests are OK
- Add new WITHOUT_SSL3 testssl extra-patch
- Remove md5 patch (inconsistent output)
- Remove openbsd_hw.c patch (not compiled)
- Remove srtp patch (upstream fixed)
- Fix plist |
1.0.2k_1,1 08 Feb 2017 20:16:31
  |
brnrd  |
security/openssl: Enable ASM by default
- Enable ASM option
* By extension this enables AES-NI [1]
- Order OPTIONS_DEFAULT alphabetically
- Switch to using @sample [2]
- Bump PORTREVISION
PR: 216559 [2]
Reported by: dtestke [1]
Submitted by: Franco Fichtner <franco@opnsense.org> [2]
Approved by: asomers, allanjude |
1.0.2k,1 26 Jan 2017 14:26:46
  |
brnrd  |
security/openssl: Update to 1.0.2k
MFH: 2017Q1
Security: CVE-2016-7055
Security: CVE-2017-3731
Security: CVE-2017-3732 |
1.0.2j_1,1 28 Oct 2016 20:05:48
  |
brnrd  |
security/openssl: Bump PORTREVISION
- Make sure ports get rebuilt
PR: 209582
Reported by: mat |
1.0.2j,1 28 Oct 2016 19:49:18
  |
brnrd  |
security/openssl: Bump shared library version
- Bump shlib version for security/openssl
- Bump shlib version for security/openssl-devel
- Add instructions to UPDATING
PR: 209582
Reported by: Matthew D. Fuller <fullermd@over-yonder.net>
MFH: 2016Q4 |
1.0.2j,1 21 Oct 2016 12:51:41
  |
mat  |
${RM} already has -f.
PR: 213570
Submitted by: mat
Exp-run by: antoine
Sponsored by: Absolight |
1.0.2j,1 06 Oct 2016 19:38:48
  |
brnrd  |
security/openssl: Fix ldconfig issue
- OPT_USE= feature does not behave as expected
Reported by: dinoex
Differential Revision: D8166 |
1.0.2j,1 04 Oct 2016 18:35:00
  |
brnrd  |
security/openssl: Mark MAKE_JOBS_UNSAFE
- Revert removal of MAKE_JOBS_UNSAFE in r423112
Reported by: D. Randolph |
1.0.2j,1 02 Oct 2016 11:51:00
  |
brnrd  |
security/openssl: Modernize port
- Group options
- Migrate to <OPT>_CONFIGURE helpers
- Use CONFIGURE_ARGS not EXTRACONFIGURE
- Remove make-jobs unsafe (introduced 2009 / 0.9.8)
- Remove base SHLIBVER_BASE check (introduced 2006)
- Revert to default CPE_VERSION
- Rework MAN3 option
- Fix plist when SHARED disabled
Reviewed by: mat
Differential Revision: D8025 |
1.0.2j,1 26 Sep 2016 13:47:20
  |
brnrd  |
security/openssl: Update to 1.0.2j
- Update to 1.0.2j
- Fixes Missing CRL sanity check (CVE-2016-7052)
Security: 337d8-83ed-11e6-bf52-b499baebfeaf |
1.0.2i,1 25 Sep 2016 06:06:59
  |
ohauer  |
- add missing man pages to pkg-plist (fix package building)
from poudriere log:
===> Parsing plist
===> Checking for items in STAGEDIR missing from pkg-plist
Error: Orphaned: man/man3/d2i_AutoPrivateKey.3.gz
Error: Orphaned: man/man3/d2i_PrivateKey.3.gz
Error: Orphaned: man/man3/d2i_Private_key.3.gz
Error: Orphaned: man/man3/i2d_PrivateKey.3.gz
===> Error: Plist issues found.
*** Error code 1
====>> Error: check-plist failures detected
!!! build failure encountered !!!
Approved by: blanket |
1.0.2i,1 24 Sep 2016 20:23:53
  |
brnrd  |
security/openssl: Take maintainership |
1.0.2i,1 24 Sep 2016 13:15:48
  |
marino  |
devel/openssl: change CONFLICTS to CONFLICTS_INSTALL
THere's no problem building openssl with other ports SSL libraries
installed, the conflict comes when it's time to install it. |
1.0.2i,1 24 Sep 2016 06:43:04
  |
dinoex  |
- add option ASM for OPNsense
- drop MAINTAINERSHIP caused of version naming change |
1.0.2i,1 23 Sep 2016 12:54:20
  |
brnrd  |
security/openssl: Update to 1.0.2i
- Update to 1.0.2i
- Move from PORTREVISION to PORTVERSION updates
- Remove patches that are included upstream
Reviewed by: mat, delphij
MFH: 2016Q3
Sponsored by: EuroBSDcon 2016 DevSummit
Differential Revision: D8006 |
1.0.2_15,1 15 Sep 2016 22:05:45
  |
mat  |
ftp.openssl.org is being taken out.
https://mta.openssl.org/pipermail/openssl-announce/2016-September/000075.html
Sponsored by: Absolight |
1.0.2_15,1 12 Sep 2016 18:10:41
  |
dinoex  |
- unroll for loop
Submitted by: John Marino |
1.0.2_15,1 28 Aug 2016 16:19:16
  |
dinoex  |
- remove options ASM and GMP |
1.0.2_14,1 27 Aug 2016 11:00:44
  |
mat  |
Revert the OpenSSL 1.1.0 update, it was not tested.
With hat: portmgr
Sponsored by: Absolight |
1.1.0 27 Aug 2016 09:59:48
  |
dinoex  |
- update to 1.1.0
- bump SHLIBVERSION |
1.0.2_14 14 Aug 2016 20:46:55
  |
dinoex  |
- cleanup options |
1.0.2_14 20 Jul 2016 15:33:20
  |
mat  |
Cleanup $() variables in ports Makefiles.
Mostly replace with ${}, but sometime, replace with $$() because it is
what was intended in the first place. (I think.)
Sponsored by: Absolight |
1.0.2_14 20 Jun 2016 19:16:43
  |
dinoex  |
- fix possible integer overflow and application crash
Security: CVE-2016-2177
MFH: 2016Q2 |