notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
All times are UTC
Ukraine
non port: security/openssl/Makefile
SVNWeb

Number of commits found: 305 (showing only 100 on this page)

1 | 2 | 3 | 4  »  

Wed, 31 May 2023
[ 11:41 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:11c58a2694053ae22d77c36419a7f6064cb8b32f  commit hash:11c58a2694053ae22d77c36419a7f6064cb8b32f  commit hash:11c58a2694053ae22d77c36419a7f6064cb8b32f  11c58a2 
security/openssl: Security update to 1.1.1u

Security:	eb9a3c57-ff9e-11ed-a0d1-84a93843eb75
MFH:		2023Q2
Wed, 29 Mar 2023
[ 18:53 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:543bd99158b8ebc2dbe2d6c16f98c36cd59359b5  commit hash:543bd99158b8ebc2dbe2d6c16f98c36cd59359b5  commit hash:543bd99158b8ebc2dbe2d6c16f98c36cd59359b5  543bd99 
security/openssl: Security update for CVE-2023-0465 & 0466

Security:	425b9538-ce5f-11ed-ade3-d4c9ef517024
Fri, 24 Mar 2023
[ 11:43 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:036b6ca1ec7feaa48e1ac7d73d852130277a006a  commit hash:036b6ca1ec7feaa48e1ac7d73d852130277a006a  commit hash:036b6ca1ec7feaa48e1ac7d73d852130277a006a  036b6ca 
security/openssl: Security update for CVE-2023-0464

Security:	1ba034fb-ca38-11ed-b242-d4c9ef517024
Wed, 15 Mar 2023
[ 09:14 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:70a4cc59a7690c42d12e673c33f79993619a66b7  commit hash:70a4cc59a7690c42d12e673c33f79993619a66b7  commit hash:70a4cc59a7690c42d12e673c33f79993619a66b7  70a4cc5 
security/openssl30: Chase rename in ports CONFLICTS*

Reported by:	cperciva, junchoon
Tue, 7 Feb 2023
[ 19:54 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:bf0a2e5fb12f267f3a43c72762dde9417889099f  commit hash:bf0a2e5fb12f267f3a43c72762dde9417889099f  commit hash:bf0a2e5fb12f267f3a43c72762dde9417889099f  bf0a2e5 
security/openssl: Security update to 1.1.1t

Security:	648a432c-a71f-11ed-86e9-d4c9ef517024
MFH:		2023Q1
Tue, 1 Nov 2022
[ 17:47 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:323086c03b198feefe570a75b730c52e6cd37345  commit hash:323086c03b198feefe570a75b730c52e6cd37345  commit hash:323086c03b198feefe570a75b730c52e6cd37345  323086c 
security/openssl: Update to 1.1.1s
Wed, 7 Sep 2022
[ 21:10 Stefan Eßer (se) search for other commits by this committer ]    commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52  commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52  commit hash:b7f05445c00f2625aa19b4154ebcbce5ed2daa52  b7f0544  (Only the first 10 of 27931 ports in this commit are shown above. View all ports for this commit)
Add WWW entries to port Makefiles

It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.

Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.

There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Wed, 20 Jul 2022
[ 14:22 Tobias C. Berner (tcberner) search for other commits by this committer ]    commit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fe  commit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fe  commit hash:857c05f8674c5f4c990f49f9d0fb7034ebd340fe  857c05f  (Only the first 10 of 840 ports in this commit are shown above. View all ports for this commit)
security: remove 'Created by' lines

A big Thank You to the original contributors of these ports:

  *  <ports@c0decafe.net>
  *  Aaron Dalton <aaron@FreeBSD.org>
  *  Adam Weinberger <adamw@FreeBSD.org>
  *  Ade Lovett <ade@FreeBSD.org>
  *  Aldis Berjoza <aldis@bsdroot.lv>
  *  Alex Dupre <ale@FreeBSD.org>
  *  Alex Kapranoff <kappa@rambler-co.ru>
  *  Alex Samorukov <samm@freebsd.org>
  *  Alexander Botero-Lowry <alex@foxybanana.com>
  *  Alexander Kriventsov <avk@vl.ru>
  *  Alexander Leidinger <netchild@FreeBSD.org>
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 5 Jul 2022
[ 14:53 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:df0eb4e60d26841149380b794a10bfe9dc510e51  commit hash:df0eb4e60d26841149380b794a10bfe9dc510e51  commit hash:df0eb4e60d26841149380b794a10bfe9dc510e51  df0eb4e 
security/openssl: Security update to 1.1.1q

 * Fixes vuln in AES OCB

Security:	a28e8b7e-fc70-11ec-856e-d4c9ef517024
MFH:		2022Q3
Wed, 22 Jun 2022
[ 08:56 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:f8942926a8cb9a03b0ffab32565479d97fa5be05  commit hash:f8942926a8cb9a03b0ffab32565479d97fa5be05  commit hash:f8942926a8cb9a03b0ffab32565479d97fa5be05  f894292 
security/openssl: Security update to 1.1.1p

Security:	4eeb93bf-f204-11ec-8fbd-d4c9ef517024
Sat, 14 May 2022
[ 19:59 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:9de8dbb151c9a1472e8c560b8facb4c7d07af332  commit hash:9de8dbb151c9a1472e8c560b8facb4c7d07af332  commit hash:9de8dbb151c9a1472e8c560b8facb4c7d07af332  9de8dbb 
security/openssl: Update KTLS patches

 * Add support for TLS 1.3 receive

Reported by:	jhb
Differential Revision:	https://reviews.freebsd.org/D35189
Wed, 4 May 2022
[ 07:33 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:1c667cc5c2b8ed3e2f36a8912c35054fd8eb7d6d  commit hash:1c667cc5c2b8ed3e2f36a8912c35054fd8eb7d6d  commit hash:1c667cc5c2b8ed3e2f36a8912c35054fd8eb7d6d  1c667cc 
security/openssl: Update to 1.1.1o

Security:	fceb2b08-cb76-11ec-a06f-d4c9ef517024
MFH:		2022Q2
Wed, 16 Mar 2022
[ 19:18 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:43741377b1438d800de8e41282f60be06083ca06  commit hash:43741377b1438d800de8e41282f60be06083ca06  commit hash:43741377b1438d800de8e41282f60be06083ca06  4374137 
security/openssl: Security update to 1.1.1n

Security:	ea05c456-a4fd-11ec-90de-1c697aa5a594
MFH:		2022Q1
Sat, 19 Feb 2022
[ 15:12 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:b4beeee6937a06cf80b396030ad2205fb02d6816  commit hash:b4beeee6937a06cf80b396030ad2205fb02d6816  commit hash:b4beeee6937a06cf80b396030ad2205fb02d6816  b4beeee 
security/openssl: Update KTLS patch

Reported by:	jhb
Differential Revision:	https://reviews.freebsd.org/D34136
Mon, 10 Jan 2022
[ 23:19 Stefan Eßer (se) search for other commits by this committer ]    commit hash:5600b7995f2ac6a53732950958ca27ca9e90ae70  commit hash:5600b7995f2ac6a53732950958ca27ca9e90ae70  commit hash:5600b7995f2ac6a53732950958ca27ca9e90ae70  5600b79 
security/openssl: add boringssl to CONFLICTS_INSTALL

Approved by:	portmgr (implicit)
[ 15:15 Stefan Eßer (se) search for other commits by this committer ]    commit hash:bcaf25a8c8046b094f6b5ab5bc258333bc326ee1  commit hash:bcaf25a8c8046b094f6b5ab5bc258333bc326ee1  commit hash:bcaf25a8c8046b094f6b5ab5bc258333bc326ee1  bcaf25a  (Only the first 10 of 491 ports in this commit are shown above. View all ports for this commit)
Fix CONFLICTS entries of multiple ports

There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.

This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.

Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Mon, 20 Dec 2021
[ 18:03 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:f64391dd014047d542cd394dda3dc00c1d061801  commit hash:f64391dd014047d542cd394dda3dc00c1d061801  commit hash:f64391dd014047d542cd394dda3dc00c1d061801  f64391d 
security/openssl: Fix build on aarch64

 * Upstream only partly merged changes

PR:		259937, 260572
Reported by:	allanjude, "Naram Qashat" <cyberbotx cyberbotx com>
Tue, 14 Dec 2021
[ 19:13 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:00935ff28f32fc509d93045002cebfa4baf81d87  commit hash:00935ff28f32fc509d93045002cebfa4baf81d87  commit hash:00935ff28f32fc509d93045002cebfa4baf81d87  00935ff 
security/openssl: Update to 1.1.1m
Tue, 23 Nov 2021
[ 22:11 Stefan Eßer (se) search for other commits by this committer ]    commit hash:5933ac0b099d61d98eb531d373cf57a8927bc7af  commit hash:5933ac0b099d61d98eb531d373cf57a8927bc7af  commit hash:5933ac0b099d61d98eb531d373cf57a8927bc7af  5933ac0  (Only the first 10 of 157 ports in this commit are shown above. View all ports for this commit)
*/*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL

The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").

Approved by: portmgr (blanket)
[ 18:44 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:e2d67bee9eb05d8c48a054edd5b52938b1c1d576  commit hash:e2d67bee9eb05d8c48a054edd5b52938b1c1d576  commit hash:e2d67bee9eb05d8c48a054edd5b52938b1c1d576  e2d67be 
www/openssl: Fix detection of ARM CPU features

Upstream:
 * https://github.com/openssl/openssl/pull/17082
 * https://github.com/openssl/openssl/pull/17085

PR:		259937
Submitted by: 	allanjude
Differential Revision:	https://reviews.freebsd.org/D33061
Sun, 29 Aug 2021
[ 12:40 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:dcc0bde25bc087ccd82e021a51d6d32c7e3e3c0c  commit hash:dcc0bde25bc087ccd82e021a51d6d32c7e3e3c0c  commit hash:dcc0bde25bc087ccd82e021a51d6d32c7e3e3c0c  dcc0bde 
security/openssl: Auto-generate MAN3 plist
Tue, 24 Aug 2021
[ 17:54 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:d3011e20b1f199d4ca63d783274387f35a0afefa  commit hash:d3011e20b1f199d4ca63d783274387f35a0afefa  commit hash:d3011e20b1f199d4ca63d783274387f35a0afefa  d3011e2 
security/openssl: Security update to 1.1.1l

Security:	96811d4a-04ec-11ec-9b84-d4c9ef517024
MFH:		2021Q3
Thu, 19 Aug 2021
[ 14:01 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:214d5852d425659f89f6de1834b8bc662d7a29a7  commit hash:214d5852d425659f89f6de1834b8bc662d7a29a7  commit hash:214d5852d425659f89f6de1834b8bc662d7a29a7  214d585 
security/openssl: Update KTLS patches for Chacha20-Poly1305

This pulls in several upstream KTLS patches from OpenSSL master:

 * A fix to the return values of BIO_get_ktls_*().
 * Support for Chacha20-Poly1305.
 * Replacing the SSL_MODE_NO_KTLS_* modes which opted-out of KTLS with
   an opt-in SSL_OP_ENABLE_KTLS. Note that this means that KTLS is not
   enabled by default. Users can enable KTLS via a custom OpenSSL config
   file that enables the KTLS option.

Reported by:	jhb
Sponsored by:	Netflix
Differential Revision:	https://reviews.freebsd.org/D31430
Tue, 6 Apr 2021
[ 14:31 Mathieu Arnold (mat) search for other commits by this committer ]    commit hash:305f148f482daf30dcf728039d03d019f88344eb  commit hash:305f148f482daf30dcf728039d03d019f88344eb  commit hash:305f148f482daf30dcf728039d03d019f88344eb  305f148  (Only the first 10 of 29333 ports in this commit are shown above. View all ports for this commit)
Remove # $FreeBSD$ from Makefiles.
[ 10:45 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:64d94165652f40041bf71bdf7a775f867e7b80a9  commit hash:64d94165652f40041bf71bdf7a775f867e7b80a9  commit hash:64d94165652f40041bf71bdf7a775f867e7b80a9  64d9416 
security/openssl: Fix /dev/crypto issue with 1.1.1k

PR:		254643
Reported by:	<cryx-freebsd h3q com>
Reviewed by:	wollman
Fri, 26 Mar 2021
[ 08:13 brnrd search for other commits by this committer ] Original commit   Revision:569247
security/openssl: Security update to 1.1.1k

PR:		254551
Submitted by:	Pascal Christen <pascal christen hostpoint ch>
MFH:		2021Q1
Security:	5a668ab3-8d86-11eb-b8d6-d4c9ef517024
Sun, 7 Mar 2021
[ 16:45 tobik search for other commits by this committer ] Original commit   Revision:567577 (Only the first 10 of 34 ports in this commit are shown above. View all ports for this commit)
Remove redundant option descriptions that match the default ones

(ignoring case)

Reported by:	danfe (for net/mosquitto), portscan
Thu, 18 Feb 2021
[ 09:22 brnrd search for other commits by this committer ] Original commit   Revision:565914
security/openssl: Update KTLS patch

PR:		251969
Submitted by:	gonzo, jhb
Obtained
from:	https://github.com/openssl/openssl/commit/dfcfd17f2818cf520ce6381aed9ec3d2fc12170d
Differential Revision:	https://reviews.freebsd.org/D28763
Wed, 17 Feb 2021
[ 13:57 brnrd search for other commits by this committer ] Original commit   Revision:565502
security/openssl: Security update to 1.1.1j

PR:		253561
Reported by:	Michael Glaus <michael glaus hostpoint ch>
MFH:		2021Q1
Security:	96a21236-707b-11eb-96d8-d4c9ef517024
Sun, 31 Jan 2021
[ 17:35 brnrd search for other commits by this committer ] Original commit   Revision:563500
security/openssl: Update KTLS patch

Differential Revision:	https://reviews.freebsd.org/D27423
Tue, 8 Dec 2020
[ 16:26 brnrd search for other commits by this committer ] Original commit   Revision:557297
security/vuxml: Security update to 1.1.1i

MFH:		2020Q4
Security:	1d56cfc5-3970-11eb-929d-d4c9ef517024
Mon, 5 Oct 2020
[ 20:07 jhb search for other commits by this committer ] Original commit   Revision:551541
Expand support for TLS protocols supported by KTLS.

Backport additional patches merged into OpenSSL's master
branch to support KTLS RX for TLS 1.1 and 1.2 as well as
support for KTLS TX for TLS 1.3.

Reviewed by:	brnrd (maintainer)
Sponsored by:	Chelsio Communications, Netflix
Differential Revision:	https://reviews.freebsd.org/D26261
Wed, 23 Sep 2020
[ 19:55 brnrd search for other commits by this committer ] Original commit   Revision:549842
security/openssl: Update to 1.1.1g
Sat, 23 May 2020
[ 19:35 brnrd search for other commits by this committer ] Original commit   Revision:536339
security/openssl: Add kernel TLS option

Submitted by:	jhb@freebsd.org
Differential Revision:	https://reviews.freebsd.org/D24274
Mon, 27 Apr 2020
[ 13:10 brnrd search for other commits by this committer ] Original commit   Revision:533134 (Only the first 10 of 15 ports in this commit are shown above. View all ports for this commit)
security/openssl-devel: Resurrect OpenSSL devel port
Wed, 22 Apr 2020
[ 09:35 brnrd search for other commits by this committer ] Original commit   Revision:532457
security/openssl: Security update to 1.1.1g

PR:		245795
Reported by:	Dani <i dani at outlook com>
MFH:		2020Q2
Security:	012809ce-83f3-11ea-92ab-00163e433440
Tue, 31 Mar 2020
[ 14:37 brnrd search for other commits by this committer ] Original commit   Revision:529977
security/openssl: Bug-fix update to 1.1.1f

PR:		245154
MFH:		2020Q1
Sun, 29 Mar 2020
[ 16:00 brnrd search for other commits by this committer ] Original commit   Revision:529814
security/openssl: Fix EOF bug

See https://github.com/openssl/openssl/pull/11400

PR:		245154
Reported by:	koobs
MFH:		2020Q1
Fri, 20 Mar 2020
[ 20:05 brnrd search for other commits by this committer ] Original commit   Revision:528797
security/openssl: Add missing description

Reported by:	adamw
Tue, 17 Mar 2020
[ 20:02 brnrd search for other commits by this committer ] Original commit   Revision:528600
security/openssl: Update to 1.1.1e

 - SM2/SM3 not a cipher [1]
 - Add weak-ciphers option [2]

PR:		237056 [1]
Reported by:	dewayne heuristicsystems com.au> [1], mat [2]
Fri, 3 Jan 2020
[ 12:19 brnrd search for other commits by this committer ] Original commit   Revision:521932
security/openssl: Remove self-conflict

PR:		243049
Submitted by:	Franco Fichtner
MFH:		2020Q1
Wed, 1 Jan 2020
[ 16:42 brnrd search for other commits by this committer ] Original commit   Revision:521745
security/openssl111: Rename to openssl

 - Honoring promise from DEPRECATED message
 - Unbreak people's builds

PR:		243014
MFH:		2020Q1
Fri, 20 Dec 2019
[ 15:06 brnrd search for other commits by this committer ] Original commit   Revision:520514
security/openssl: Security update to 1.0.2u

MFH:		2019Q4
Security:	d778ddb0-2338-11ea-a1c7-b499baebfeaf
Sun, 27 Oct 2019
[ 11:19 brnrd search for other commits by this committer ] Original commit   Revision:515770
security/openssl: Notify users of upcoming 1.1.1
Wed, 11 Sep 2019
[ 20:04 brnrd search for other commits by this committer ] Original commit   Revision:511841
security/openssl: Security update to 1.0.2t

MFH:		2019Q3
Security:	9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf
Tue, 28 May 2019
[ 20:22 brnrd search for other commits by this committer ] Original commit   Revision:502915
security/openssl: Security hardening update to 1.0.2s

MFH:		2019Q2
Wed, 27 Feb 2019
[ 08:06 brnrd search for other commits by this committer ] Original commit   Revision:494033
security/openssl: Security update to 1.0.2r

MFH:		2019Q1
Security:	7700061f-34f7-11e9-b95c-b499baebfeaf
Sun, 17 Feb 2019
[ 19:09 brnrd search for other commits by this committer ] Original commit   Revision:493181
security/openssl: Fix build with lld on i386

PR:		231459
Submitted by:	Nathan <ndowens@yahoo.com>
Reported by:	emaste
Tue, 20 Nov 2018
[ 17:53 brnrd search for other commits by this committer ] Original commit   Revision:485452
security/openssl: Update to 1.0.2q
Mon, 12 Nov 2018
[ 20:19 brnrd search for other commits by this committer ] Original commit   Revision:484821
security/openssl: Security update for CVE-2018-5407

MFH:		2018Q4
Security:	6f170cf2-e6b7-11e8-a9a8-b499baebfeaf
Wed, 12 Sep 2018
[ 11:36 brnrd search for other commits by this committer ] Original commit   Revision:479595
Chase CONFLICTS after addition of security/openssl111

 - While here mark OpenSSL 1.1.0 deprecated
   see: https://www.openssl.org/policies/releasestrat.html
Wed, 29 Aug 2018
[ 16:03 brnrd search for other commits by this committer ] Original commit   Revision:478360
security/openssl: Fix padlock patches url prefix
Tue, 14 Aug 2018
[ 15:12 joneum search for other commits by this committer ] Original commit   Revision:477164
Fix PORTREVISION
[ 15:04 brnrd search for other commits by this committer ] Original commit   Revision:477161
security/openssl: Add engines patches to distinfo

 - Undo clobbering distinfo

Reported by:	mat
[ 14:12 brnrd search for other commits by this committer ] Original commit   Revision:477155
security/openssl: Update to 1.0.2p

 - Includes vulnerability fixes that were already
   added to the port as patches
Wed, 1 Aug 2018
[ 16:33 adamw search for other commits by this committer ] Original commit   Revision:476184 (Only the first 10 of 35 ports in this commit are shown above. View all ports for this commit)
Fix a common grammar error: "can not" means the opposite of "cannot."

"Can not" means "it is possible not to," and "cannot" means "it is impossible
to."
Wed, 11 Jul 2018
[ 08:37 amdmi3 search for other commits by this committer ] Original commit   Revision:474428
- Switch to new test framework

Approved by:	portmgr blanket
Tue, 12 Jun 2018
[ 13:43 brnrd search for other commits by this committer ] Original commit   Revision:472245
security/openssl: Actually add patch file

MFH:		2018Q2
Security:	c82ecac5-6e3f-11e8-8777-b499baebfeaf
[ 13:17 brnrd search for other commits by this committer ] Original commit   Revision:472244
security/openssl: Security update

 - Upstream update for CVE-2018-0732

MFH:		2018Q2
Security:	c82ecac5-6e3f-11e8-8777-b499baebfeaf
Mon, 16 Apr 2018
[ 17:47 brnrd search for other commits by this committer ] Original commit   Revision:467498
security/openssl: Add CVE-2018-0737 patch

 - Bump portrev too

MFH:		2018Q2
Security:	8f353420-4197-11e8-8777-b499baebfeaf
[ 17:24 brnrd search for other commits by this committer ] Original commit   Revision:467495
security/openssl: Security update

MFH:		2018Q2
Security:	8f353420-4197-11e8-8777-b499baebfeaf
Tue, 27 Mar 2018
[ 14:53 brnrd search for other commits by this committer ] Original commit   Revision:465710
securit/openssl: Security update to 1.0.2o

MFH:		2018Q1
Security:	b7cff5a9-31cc-11e8-8f07-b499baebfeaf
Sat, 10 Mar 2018
[ 10:53 brnrd search for other commits by this committer ] Original commit   Revision:464064
security/openssl: Cleanup

 - Remove EXPCIPHERS option (use security/openssl-unsafe) [1]
 - Move port variables not dependent on bsd.port.pre.mk up
 - Deleting man3 .pod files is redundant
 - bss_dgram.c modification is a no-op
 - Let openssl's Makefile install libs
 - Simplify stripping

PR: 		195270 [1]
Thu, 7 Dec 2017
[ 15:48 brnrd search for other commits by this committer ] Original commit   Revision:455706
security/openssl: Update to 1.0.2m

 - Remove patch now included upstream
 - Include post-release patch for clang build error

MFH:		2017Q4
Security:	3bb451fc-db64-11e7-ac58-b499baebfeaf
Thu, 2 Nov 2017
[ 21:32 brnrd search for other commits by this committer ] Original commit   Revision:453380
security/openssl: Security update to 1.0.2m

 - Adds additional manpages too

MFH:		2017Q4
Security:	f40f07aa-c00f-11e7-ac58-b499baebfeaf
Sat, 19 Aug 2017
[ 15:11 brnrd search for other commits by this committer ] Original commit   Revision:448318
security/openssl: Fix build on MIPS

 - gcc 4.2.1 on MIPS fails on -Werror

PR:		221620
Submitted by:	Fukang Chen <loader@FreeBSD.org>
MFH:		2017Q3
Mon, 24 Jul 2017
[ 17:51 brnrd search for other commits by this committer ] Original commit   Revision:446538
security/openssl: Fix MASTER_SITE_SUBDIR

 - DISTVERSIONFULL is not expanded before assignment

PR:		219929
Submitted by:	Fukang Chen <loader@FreeBSD.org>
Sun, 25 Jun 2017
[ 00:29 linimon search for other commits by this committer ] Original commit   Revision:444251 (Only the first 10 of 81 ports in this commit are shown above. View all ports for this commit)
Begin deorbit burn of ia64.  We have not attempted to build packages for
it for many years.

While here, alphabetize ARCHs, pet portlint, and modernize usages.

Approved by:	portmgr (tier-2 blanket)
Thu, 25 May 2017
[ 18:53 brnrd search for other commits by this committer ] Original commit   Revision:441709
security/openssl: Update to 1.0.2l

 - Bugfix update to 1.0.2l
 - Fix PADLOCK option
   - Build failure -Wunused-function
   - Properly disable with configure
 - Strip patch-version from DIST_SUBDIR, reduce dirs
 - Remove unneeded testssl patch, dtls tests are OK
 - Add new WITHOUT_SSL3 testssl extra-patch
 - Remove md5 patch (inconsistent output)
 - Remove openbsd_hw.c patch (not compiled)
 - Remove srtp patch (upstream fixed)
 - Fix plist
Wed, 8 Feb 2017
[ 20:16 brnrd search for other commits by this committer ] Original commit   Revision:433671
security/openssl: Enable ASM by default

  - Enable ASM option
    * By extension this enables AES-NI [1]
  - Order OPTIONS_DEFAULT alphabetically
  - Switch to using @sample [2]
  - Bump PORTREVISION

PR:		216559 [2]
Reported by:	dtestke [1]
Submitted by:	Franco Fichtner <franco@opnsense.org> [2]

Approved by:	asomers, allanjude
Thu, 26 Jan 2017
[ 14:26 brnrd search for other commits by this committer ] Original commit   Revision:432493
security/openssl: Update to 1.0.2k

MFH:		2017Q1
Security:	CVE-2016-7055
Security:	CVE-2017-3731
Security:	CVE-2017-3732
Fri, 28 Oct 2016
[ 20:05 brnrd search for other commits by this committer ] Original commit   Revision:424879
security/openssl: Bump PORTREVISION

  - Make sure ports get rebuilt

PR:		209582
Reported by:	mat
Fri, 21 Oct 2016
[ 12:51 mat search for other commits by this committer ] Original commit   Revision:424411 (Only the first 10 of 718 ports in this commit are shown above. View all ports for this commit)
${RM} already has -f.

PR:		213570
Submitted by:	mat
Exp-run by:	antoine
Sponsored by:	Absolight
Thu, 6 Oct 2016
[ 19:38 brnrd search for other commits by this committer ] Original commit   Revision:423434
security/openssl: Fix ldconfig issue

  - OPT_USE= feature does not behave as expected

Reported by:	dinoex
Differential Revision:	D8166
Tue, 4 Oct 2016
[ 18:35 brnrd search for other commits by this committer ] Original commit   Revision:423288
security/openssl: Mark MAKE_JOBS_UNSAFE

  - Revert removal of MAKE_JOBS_UNSAFE in r423112

Reported by:	D. Randolph
Sun, 2 Oct 2016
[ 11:51 brnrd search for other commits by this committer ] Original commit   Revision:423112
security/openssl: Modernize port

  - Group options
  - Migrate to <OPT>_CONFIGURE helpers
  - Use CONFIGURE_ARGS not EXTRACONFIGURE
  - Remove make-jobs unsafe (introduced 2009 / 0.9.8)
  - Remove base SHLIBVER_BASE check (introduced 2006)
  - Revert to default CPE_VERSION
  - Rework MAN3 option
  - Fix plist when SHARED disabled

Reviewed by:	mat
Differential Revision:	D8025
Mon, 26 Sep 2016
[ 13:47 brnrd search for other commits by this committer ] Original commit   Revision:422776
security/openssl: Update to 1.0.2j

  - Update to 1.0.2j
  - Fixes Missing CRL sanity check (CVE-2016-7052)

Security:	337d8-83ed-11e6-bf52-b499baebfeaf
Sat, 24 Sep 2016
[ 20:23 brnrd search for other commits by this committer ] Original commit   Revision:422737
security/openssl: Take maintainership
[ 13:15 marino search for other commits by this committer ] Original commit   Revision:422717
devel/openssl: change CONFLICTS to CONFLICTS_INSTALL

THere's no problem building openssl with other ports SSL libraries
installed, the conflict comes when it's time to install it.
[ 06:43 dinoex search for other commits by this committer ] Original commit   Revision:422700
- add option ASM for OPNsense
- drop MAINTAINERSHIP caused of version naming change
Fri, 23 Sep 2016
[ 12:54 brnrd search for other commits by this committer ] Original commit   Revision:422668
security/openssl: Update to 1.0.2i

  - Update to 1.0.2i
  - Move from PORTREVISION to PORTVERSION updates
  - Remove patches that are included upstream

Reviewed by:	mat, delphij
MFH:		2016Q3
Sponsored by:	EuroBSDcon 2016 DevSummit
Differential Revision:	D8006
Thu, 15 Sep 2016
[ 22:05 mat search for other commits by this committer ] Original commit   Revision:422233
ftp.openssl.org is being taken out.

https://mta.openssl.org/pipermail/openssl-announce/2016-September/000075.html

Sponsored by:	Absolight
Mon, 12 Sep 2016
[ 18:10 dinoex search for other commits by this committer ] Original commit   Revision:421945
- unroll for loop
Submitted by:	John Marino
Sun, 28 Aug 2016
[ 16:19 dinoex search for other commits by this committer ] Original commit   Revision:421025
- remove options ASM and GMP
Sat, 27 Aug 2016
[ 11:00 mat search for other commits by this committer ] Original commit   Revision:420968 (Only the first 10 of 16 ports in this commit are shown above. View all ports for this commit)
Revert the OpenSSL 1.1.0 update, it was not tested.

With hat:	portmgr
Sponsored by:	Absolight
[ 09:59 dinoex search for other commits by this committer ] Original commit   Revision:420967 (Only the first 10 of 16 ports in this commit are shown above. View all ports for this commit)
- update to 1.1.0
- bump SHLIBVERSION
Sun, 14 Aug 2016
[ 20:46 dinoex search for other commits by this committer ] Original commit   Revision:420199
- cleanup options
Wed, 20 Jul 2016
[ 15:33 mat search for other commits by this committer ] Original commit   Revision:418840 (Only the first 10 of 67 ports in this commit are shown above. View all ports for this commit)
Cleanup $() variables in ports Makefiles.

Mostly replace with ${}, but sometime, replace with $$() because it is
what was intended in the first place. (I think.)

Sponsored by:	Absolight
Mon, 20 Jun 2016
[ 19:16 dinoex search for other commits by this committer ] Original commit   Revision:417176
- fix possible integer overflow and application crash
Security: CVE-2016-2177
MFH:		2016Q2
Thu, 16 Jun 2016
[ 18:15 dinoex search for other commits by this committer ] Original commit   Revision:416976
- update warning message for new macros
Sun, 12 Jun 2016
[ 21:29 dinoex search for other commits by this committer ] Original commit   Revision:416823
- Fix DSA, preserve BN_FLG_CONSTTIME
Security: CVE-2016-2178
Tue, 3 May 2016
[ 15:19 dinoex search for other commits by this committer ] Original commit   Revision:414534
- Security update to 1.0.2h
Security: https://www.openssl.org/news/secadv/20160503.txt
Security: CVE-2016-2105
Security: CVE-2016-2106
Security: CVE-2016-2107
Security: CVE-2016-2108
Security: CVE-2016-2109
Security: CVE-2016-2176
MFH:		2016Q2
Mon, 4 Apr 2016
[ 19:09 dinoex search for other commits by this committer ] Original commit   Revision:412526
- remove NOPRECIOUS*
- make portlint happier
Fri, 1 Apr 2016
[ 14:25 mat search for other commits by this committer ] Original commit   Revision:412349 (Only the first 10 of 2099 ports in this commit are shown above. View all ports for this commit)
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
Sun, 6 Mar 2016
[ 20:06 brnrd search for other commits by this committer ] Original commit   Revision:410481
security/libressl*: Register conflict with security/openssl-devel

 - Add conflict for security/openssl-devel
 - Sort conflicts alphabetically

Reviewed by:	feld (mentor), koobs (mentor)
Approved by:	feld (mentor)
Differential Revision:	D5539
Thu, 3 Mar 2016
[ 19:00 dinoex search for other commits by this committer ] Original commit   Revision:410067
- extend CONFLICTS for openssl-devel
[ 13:58 feld search for other commits by this committer ] Original commit   Revision:410039
security/openssl: Revert disabling of SSLv2 and MD2

Disabling SSLv2 without a shared library bump has a visible impact to
some applications. It is unclear at this time if disabling MD2 could
cause the same issues, but both are being reverted at the moment to be
safe.

PR:		195796
Wed, 2 Mar 2016
[ 22:31 feld search for other commits by this committer ] Original commit   Revision:409967
security/openssl: Disable SSLv2 and MD2

SSLv2 is being disabled due to DROWN.

MD2 is being disabled as it should not have been enabled by default.
This was disabled by upstream back in 2009.

PR:		195796
Approved by:	delphij, eadler
Security:	CVE-2009-2409
Security:	CVE-2016-0800
Tue, 1 Mar 2016
[ 16:40 dinoex search for other commits by this committer ] Original commit   Revision:409885
- Security update to 1.0.2g

Security: https://www.openssl.org/news/secadv/20160301.txt
Security: CVE-2016-0800
Security: CVE-2016-0705
Security: CVE-2016-0798
Security: CVE-2016-0797
Security: CVE-2016-0799
Security: CVE-2016-0702
Security: CVE-2016-0703
Security: CVE-2016-0704
Sat, 13 Feb 2016
[ 09:48 dinoex search for other commits by this committer ] Original commit   Revision:408778
- mark options ASM broken on sparc64
PR:		204527

Number of commits found: 305 (showing only 100 on this page)

1 | 2 | 3 | 4  »