notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

non port: security/openssl/distinfo

Number of commits found: 122 (showing only 22 on this page)

«  1 | 2 

Sunday, 7 May 2006
19:27 dinoex search for other commits by this committer
- update to 0.9.8a and 0.9.7j
  md5 verified with distribution
Original commit
Sunday, 13 Nov 2005
09:26 dinoex search for other commits by this committer
- add SHA checksum
Original commit
Saturday, 15 Oct 2005
19:49 dinoex search for other commits by this committer
- update stable to 0.9.7i
Original commit
Wednesday, 12 Oct 2005
11:14 dinoex search for other commits by this committer
- update to 0.9.7g and 0.9.8a
Original commit
Sunday, 10 Jul 2005
19:15 dinoex search for other commits by this committer
- update to 0.9.8 for WITH_OPENSSL_BETA=yes
Original commit
Friday, 15 Apr 2005
04:39 dinoex search for other commits by this committer
- update 0.9.7g
PR:             79899
Submitted by:   Vasil Dimov
Original commit
Saturday, 2 Apr 2005
20:11 dinoex search for other commits by this committer
- update to 0.9.7f
Original commit
Tuesday, 26 Oct 2004
21:32 dinoex search for other commits by this committer
- Bugfix update to 0.9.7e
- md5 verfied with website
Original commit
Wednesday, 17 Mar 2004
13:51 dinoex search for other commits by this committer
- Security update to 0.9.7d
http://www.openssl.org/news/secadv_20040317.txt
Original commit
Thursday, 26 Feb 2004
05:47 dinoex search for other commits by this committer
- add SIZE
Original commit
Tuesday, 30 Sep 2003
17:48 dinoex search for other commits by this committer
- Security Fix, Update to 0.9.7c
- Fix manpages
Original commit
Friday, 11 Apr 2003
18:29 dinoex search for other commits by this committer
- Udpate to 0.9.7b
Original commit
Wednesday, 19 Feb 2003
21:12 dinoex search for other commits by this committer
- merged some patches in distribution
- added thread support on alpha, sparc64
- Update to 0.9.7a (with security fix)
- defaults openssl to port
Original commit
Wednesday, 29 Jan 2003
20:00 dinoex search for other commits by this committer
- Update to 0.9.7
- rnd_keys.c now in distribution
- drop lib/libRSAglue.a
- build on i386, alpha, sparc64, ia64
- build on 2.2.8 with the gas-patch as noted in FAQ
Original commit
Thursday, 2 Jan 2003
16:32 dinoex search for other commits by this committer
- add new checksum, only "OPENSSL_VERSION_NUMBER" has been changed
in the distribution after 6th December.
2178290  6 Dez 00:25 /usr/ports/distfiles/openssl-0.9.6h.tar.gz
2178314  8 Dez 21:43 /usr/ports/distfiles/openssl-0.9.6h.tar.gz
Original commit
04:17 dinoex search for other commits by this committer
- Update to 0.9.6h
- md5 verified
- add test target
- make build on sparc64
Original commit
Saturday, 10 Aug 2002
08:30 dinoex search for other commits by this committer
Security Update to: 0.9.6g
Original commit
Tuesday, 30 Jul 2002
17:38 dinoex search for other commits by this committer
Security Update to 0.9.6e
Original commit
Monday, 13 May 2002
18:54 dinoex search for other commits by this committer
Update to: 0.9.6d

See:
http://www.openssl.org/source/exp/CHANGES

Port improvements:
proccessor type is now detected

Add option: OPENSSL_WITH_386
This set as default for package generation on bento
Original commit
Sunday, 21 Apr 2002
13:02 dinoex search for other commits by this committer
- Update to 0.9.6c
- more manpages
- shift FORBIDDEN

 Excerpt of Changes between 0.9.6b and 0.9.6c  [21 dec 2001]
  *) Fix BN_rand_range bug pointed out by Dominikus Scherkl
  *) Only add signing time to PKCS7 structures if it is not already present.
  *) Fix crypto/objects/objects.h: "ld-ce" should be "id-ce", OBJ_ld_ce
     should be OBJ_id_ce.  Also some ip-pda OIDs in crypto/objects/objects.txt
     were incorrect (cf. RFC 3039).
  *) Release CRYPTO_LOCK_DYNLOCK when CRYPTO_destroy_dynlockid()
     returns early because it has nothing to do.
  *) Fix mutex callback return values in crypto/engine/hw_ncipher.c.
  *) Change ssl/s2_clnt.c and ssl/s2_srvr.c so that received handshake
     messages are stored in a single piece (fixed-length part and
     variable-length part combined) and fix various bugs found on the way.
  *) Disable caching in BIO_gethostbyname(), directly use gethostbyname()
     instead.  BIO_gethostbyname() does not know what timeouts are
     appropriate, so entries would stay in cache even when they have
     become invalid.
  *) Change ssl23_get_client_hello (ssl/s23_srvr.c) behaviour when
     faced with a pathologically small ClientHello fragment that does
     not contain client_version: Instead of aborting with an error,
     simply choose the highest available protocol version (i.e.,
     TLS 1.0 unless it is disabled).
  *) Fix SSL handshake functions and SSL_clear() such that SSL_clear()
     never resets s->method to s->ctx->method when called from within
     one of the SSL handshake functions.
  *) In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert
     (sent using the client's version number) if client_version is
     smaller than the protocol version in use.  Also change
     ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if
     the client demanded SSL 3.0 but only TLS 1.0 is enabled; then
     the client will at least see that alert.
  *) Fix ssl3_get_message (ssl/s3_both.c) to handle message fragmentation
     correctly.
  *) Avoid infinite loop in ssl3_get_message (ssl/s3_both.c) if a
     client receives HelloRequest while in a handshake.
  *) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C
     should end in 'break', not 'goto end' which circuments various
     cleanups done in state SSL_ST_OK.   But session related stuff
     must be disabled for SSL_ST_OK in the case that we just sent a
     HelloRequest.  Also avoid some overhead by not calling
     ssl_init_wbio_buffer() before just sending a HelloRequest.
  *) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't
     reveal whether illegal block cipher padding was found or a MAC
     verification error occured.  (Neither SSLerr() codes nor alerts
     are directly visible to potential attackers, but the information
     may leak via logfiles.) ssl/s2_pkt.c failed to verify that the
     purported number of padding bytes is in the legal range.
  *) Improve RSA_padding_check_PKCS1_OAEP() check again to avoid
     'wristwatch attack' using huge encoding parameters (cf.
     James H. Manger's CRYPTO 2001 paper).  Note that the
     RSA_PKCS1_OAEP_PADDING case of RSA_private_decrypt() does not use
     encoding parameters and hence was not vulnerable.
  *) BN_sqr() bug fix.
  *) Rabin-Miller test analyses assume uniformly distributed witnesses,
     so use BN_pseudo_rand_range() instead of using BN_pseudo_rand()
     followed by modular reduction.
  *) Add BN_pseudo_rand_range() with obvious functionality: BN_rand_range()
     equivalent based on BN_pseudo_rand() instead of BN_rand().
  *) s3_srvr.c: allow sending of large client certificate lists (> 16 kB).
     This function was broken, as the check for a new client hello message
     to handle SGC did not allow these large messages.
  *) Add alert descriptions for TLSv1 to SSL_alert_desc_string[_long]().
  *) Fix buggy behaviour of BIO_get_num_renegotiates() and BIO_ctrl()
     for BIO_C_GET_WRITE_BUF_SIZE ("Stephen Hinton" <shinton@netopia.com>).
  *) In ssl3_get_key_exchange (ssl/s3_clnt.c), call ssl3_get_message()
     with the same message size as in ssl3_get_certificate_request().
     Otherwise, if no ServerKeyExchange message occurs, CertificateRequest
     messages might inadvertently be reject as too long.
  *) Modified SSL library such that the verify_callback that has been set
     specificly for an SSL object with SSL_set_verify() is actually being
     used. Before the change, a verify_callback set with this function was
     ignored and the verify_callback() set in the SSL_CTX at the time of
     the call was used. New function X509_STORE_CTX_set_verify_cb() introduced
     to allow the necessary settings.
  *) In OpenSSL 0.9.6a and 0.9.6b, crypto/dh/dh_key.c ignored
     dh->length and always used
          BN_rand_range(priv_key, dh->p).
     So switch back to
          BN_rand(priv_key, l, ...)
     where 'l' is dh->length if this is defined, or BN_num_bits(dh->p)-1
     otherwise.
  *) In RSA_eay_public_encrypt, RSA_eay_private_decrypt, RSA_eay_private_encrypt
     RSA_eay_public_decrypt always reject numbers >= n.
  *) In crypto/rand/md_rand.c, use a new short-time lock CRYPTO_LOCK_RAND2
     to synchronize access to 'locking_thread'.
  *) In crypto/rand/md_rand.c, set 'locking_thread' to current thread's ID
     *before* setting the 'crypto_lock_rand' flag.  The previous code had
     a race condition if 0 is a valid thread ID.
Original commit
Friday, 20 Jul 2001
15:24 okazaki search for other commits by this committer
Upgrade openssl to 0.9.6b.    
Original commit
Wednesday, 23 May 2001
03:47 dougb search for other commits by this committer
Upgrade openssl to 0.9.6a and bump the shlib version in the process   due to
non-backwards compatible changes. The shlib bump necessitates   a corresponding
bump in bsd.port.mk for the automagic openssl   dependency. Mistakes in the port
are my responsibility. Approval for   the bsd.port.mk commit comes through asami
-> kkenn -> me. Kris is   a little busy at the moment, so he asked me to lob it
in.    
Original commit

Number of commits found: 122 (showing only 22 on this page)

«  1 | 2