Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
3.0.15_1,1 19 Oct 2024 14:58:59 |
Bernard Spil (brnrd) |
security/openssl: Security update for CVE-2024-9143
Security: c6f4177c-8e29-11ef-98e7-84a93843eb75
MFH: 2024Q4 |
3.0.15,1 03 Sep 2024 18:20:00 |
Bernard Spil (brnrd) |
security/openssl: Security update to 3.0.15
Security: 21f505f4-6a1c-11ef-b611-84a93843eb75
MFH: 2024Q3 |
3.0.14,1 25 Jul 2024 09:36:36 |
Bernard Spil (brnrd) |
security/openssl*: Fix PORSTCOUT |
3.0.14,1 04 Jun 2024 16:51:35 |
Bernard Spil (brnrd) |
security/openssl: Update to 3.0.14 |
3.0.13_5,1 28 May 2024 16:35:14 |
Bernard Spil (brnrd) |
security/openssl: Security update for CVE-2024-4741
Security: 73a697d7-1d0f-11ef-a490-84a93843eb75
MFH: 2024Q2 |
3.0.13_4,1 17 May 2024 11:52:52 |
Bernard Spil (brnrd) |
security/openssl: Security update for CVE-2024-4603
Security: b88aa380-1442-11ef-a490-84a93843eb75
MFH: 2024Q2 |
3.0.13_3,1 14 Apr 2024 19:20:42 |
Bernard Spil (brnrd) |
security/openssl: Security update for CVE-2024-2511
Security: 7c217849-f7d7-11ee-a490-84a93843eb75
MFH: 2024Q2 |
3.0.13_2,1 31 Mar 2024 13:04:52 |
Bernard Spil (brnrd) |
security/openssl: Fix for POSIX_VERSION 200809L
* See https://github.com/openssl/openssl/pull/23885
PR: 273869
Reported by: imp
Submitted by: vvd |
3.0.13_1,1 21 Mar 2024 14:09:20 |
Bernard Spil (brnrd) |
security/openssl: Chase addition of openssl33 in conflicts
* While here use proper tag for openssl31-quictls |
3.0.13_1,1 12 Mar 2024 05:40:29 |
Yasuhiro Kimura (yasu) |
security/openssl: Move man pages to share/man
Approved by: portmgr (blanket) |
3.0.13,1 31 Jan 2024 18:59:59 |
Bernard Spil (brnrd) |
security/openssl: Security update to 3.0.13
* Note that this is a security rollup of four previously reported CVEs
Security: 10dee731-c069-11ee-9190-84a93843eb75
Security: 8337251b-b07b-11ee-b0d7-84a93843eb75
Security: a5956603-7e4f-11ee-9df6-84a93843eb75
MFH: 2024Q1 |
3.0.12_2,1 11 Jan 2024 12:29:29 |
Bernard Spil (brnrd) |
security/openssl: Security fix for POLY1305 on ppc
Security: 8337251b-b07b-11ee-b0d7-84a93843eb75
MFH: 2024Q1 |
3.0.12_1,1 31 Dec 2023 00:37:05 |
Muhammad Moinur Rahman (bofh) |
*/*: Sunset 12.4-RELEASE/12-STABLE from ports tree
- Remove all references to defunct ARCH arm
- Remove all references to defunct ARCH sparc64
- Remove x11-drivers/xf86-video-sunffb which requires defunct sparc64
ARCH
- Remove sysutils/afbinit requires defunct sparc64 ARCH
- Remove all references to bktr driver
- Remove all references to defunct FreeBSD_12
- Remove all references to OSVERSION/OSREL corresponding to 12
- Remove conditionals in Mk/Uses/cabal.mk
- Remove sparc reference from Mk/Uses/qt-dist.mk
- Remove BROKEN_sparc64/NOT_FOR_ARCH=sparc64
- Remove BROKEN_FreeBSD_12* from:
- Remove OpenSSL patches from:
- Remove conditional flags for OSVERSION >= 1300000 to fixed flags.
Also move conditional flags for non sparc64/arm ARCH to fixed flags.
Reviewed by: brooks, jbeich, rene, salvadore
Differential Revision: https://reviews.freebsd.org/D42068 |
3.0.12_1,1 26 Nov 2023 14:33:45 |
Bernard Spil (brnrd) |
security/openssl: Set portscout limits |
3.0.12_1,1 08 Nov 2023 16:14:28 |
Bernard Spil (brnrd) |
security/openssl: Security fix for CVE-2023-5678
Security: a5956603-7e4f-11ee-9df6-84a93843eb75
MFH: 2023Q4 |
3.0.12,1 24 Oct 2023 18:26:40 |
Bernard Spil (brnrd) |
security/openssl: Security update to 3.0.12
Security: 4a4712ae-7299-11ee-85eb-84a93843eb75
MFH: 2023Q4 |
3.0.11,1 15 Oct 2023 13:37:22 |
Bernard Spil (brnrd) |
security/openssl: Fix EXPIRATION_DATE
* While here, chase in 3.x ports and use the actual date |
3.0.11,1 14 Oct 2023 17:23:12 |
Bernard Spil (brnrd) |
security/openssl: Major version update to 3.0
* OpenSSL 1.1.1 is EoL, update to new LTS version
* Aligns with upcoming OpenSSL version in 14.0 |
1.1.1w,1 11 Sep 2023 16:46:38 |
Bernard Spil (brnrd) |
security/openssl: Update to 1.1.1w
* Final version of OpenSSL 1.1.1, this port will upgrade to
3.0 (LTS) with a next commit.
* Note the recent vuln was Windows only |
1.1.1v,1 02 Aug 2023 19:27:30 |
Bernard Spil (brnrd) |
security/openssl: Update to 1.1.1v
* MFH this version as this is a roll-up of multiple vulnerability fixes
MFH: 2023Q3 |
1.1.1u_1,1 31 Jul 2023 20:47:29 |
Bernard Spil (brnrd) |
security/openssl: Security update for CVE-2023-3817 (Low)
Security: bad6588e-2fe0-11ee-a0d1-84a93843eb75 |
1.1.1u,1 31 May 2023 11:41:20 |
Bernard Spil (brnrd) |
security/openssl: Security update to 1.1.1u
Security: eb9a3c57-ff9e-11ed-a0d1-84a93843eb75
MFH: 2023Q2 |
1.1.1t_2,1 29 Mar 2023 18:53:07 |
Bernard Spil (brnrd) |
security/openssl: Security update for CVE-2023-0465 & 0466
Security: 425b9538-ce5f-11ed-ade3-d4c9ef517024 |
1.1.1t_1,1 24 Mar 2023 11:43:40 |
Bernard Spil (brnrd) |
security/openssl: Security update for CVE-2023-0464
Security: 1ba034fb-ca38-11ed-b242-d4c9ef517024 |
1.1.1t,1 15 Mar 2023 09:14:16 |
Bernard Spil (brnrd) |
security/openssl30: Chase rename in ports CONFLICTS*
Reported by: cperciva, junchoon |
1.1.1t,1 07 Feb 2023 19:54:35 |
Bernard Spil (brnrd) |
security/openssl: Security update to 1.1.1t
Security: 648a432c-a71f-11ed-86e9-d4c9ef517024
MFH: 2023Q1 |
1.1.1s,1 01 Nov 2022 17:47:15 |
Bernard Spil (brnrd) |
security/openssl: Update to 1.1.1s |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
1.1.1q,1 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
1.1.1q,1 20 Jul 2022 14:22:56 |
Tobias C. Berner (tcberner) |
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <[email protected]>
* Aaron Dalton <[email protected]>
* Adam Weinberger <[email protected]>
* Ade Lovett <[email protected]>
* Aldis Berjoza <[email protected]>
* Alex Dupre <[email protected]>
* Alex Kapranoff <[email protected]>
* Alex Samorukov <[email protected]>
* Alexander Botero-Lowry <[email protected]>
* Alexander Kriventsov <[email protected]>
* Alexander Leidinger <[email protected]> (Only the first 15 lines of the commit message are shown above ) |
1.1.1q,1 05 Jul 2022 14:53:43 |
Bernard Spil (brnrd) |
security/openssl: Security update to 1.1.1q
* Fixes vuln in AES OCB
Security: a28e8b7e-fc70-11ec-856e-d4c9ef517024
MFH: 2022Q3 |
1.1.1p,1 22 Jun 2022 08:56:18 |
Bernard Spil (brnrd) |
security/openssl: Security update to 1.1.1p
Security: 4eeb93bf-f204-11ec-8fbd-d4c9ef517024 |
1.1.1o_1,1 22 Jun 2022 08:29:39 |
Bernard Spil (brnrd) |
security/vuxml: Document OpenSSL vulnerability
* Pet `make validate`
* Fix spacing for 482456fb-e9af-11ec-93b6-318d1419ea39
* Add discovery date for 482456fb-e9af-11ec-93b6-318d1419ea39
using tor wiki page update date. |
1.1.1o_1,1 14 May 2022 19:59:25 |
Bernard Spil (brnrd) |
security/openssl: Update KTLS patches
* Add support for TLS 1.3 receive
Reported by: jhb
Differential Revision: https://reviews.freebsd.org/D35189 |
1.1.1o,1 04 May 2022 07:33:32 |
Bernard Spil (brnrd) |
security/openssl: Update to 1.1.1o
Security: fceb2b08-cb76-11ec-a06f-d4c9ef517024
MFH: 2022Q2 |
1.1.1n,1 16 Mar 2022 19:18:56 |
Bernard Spil (brnrd) |
security/openssl: Security update to 1.1.1n
Security: ea05c456-a4fd-11ec-90de-1c697aa5a863
MFH: 2022Q1 |
1.1.1m_2,1 19 Feb 2022 15:12:25 |
Bernard Spil (brnrd) |
security/openssl: Update KTLS patch
Reported by: jhb
Differential Revision: https://reviews.freebsd.org/D34136 |
1.1.1m_1,1 10 Jan 2022 23:19:35 |
Stefan Eßer (se) |
security/openssl: add boringssl to CONFLICTS_INSTALL
Approved by: portmgr (implicit) |
1.1.1m_1,1 10 Jan 2022 15:15:39 |
Stefan Eßer (se) |
Fix CONFLICTS entries of multiple ports
There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.
This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.
Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port (Only the first 15 lines of the commit message are shown above ) |
1.1.1m_1,1 20 Dec 2021 18:03:30 |
Bernard Spil (brnrd) |
security/openssl: Fix build on aarch64
* Upstream only partly merged changes
PR: 259937, 260572
Reported by: allanjude, "Naram Qashat" <cyberbotx cyberbotx com> |
1.1.1m,1 14 Dec 2021 19:13:32 |
Bernard Spil (brnrd) |
security/openssl: Update to 1.1.1m |
1.1.1l_1,1 23 Nov 2021 22:11:40 |
Stefan Eßer (se) |
*/*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Approved by: portmgr (blanket) |
1.1.1l_1,1 23 Nov 2021 18:44:13 |
Bernard Spil (brnrd) |
www/openssl: Fix detection of ARM CPU features
Upstream:
* https://github.com/openssl/openssl/pull/17082
* https://github.com/openssl/openssl/pull/17085
PR: 259937
Submitted by: allanjude
Differential Revision: https://reviews.freebsd.org/D33061 |
1.1.1l,1 29 Aug 2021 12:40:50 |
Bernard Spil (brnrd) |
security/openssl: Auto-generate MAN3 plist |
1.1.1l,1 24 Aug 2021 17:54:49 |
Bernard Spil (brnrd) |
security/openssl: Security update to 1.1.1l
Security: 96811d4a-04ec-11ec-9b84-d4c9ef517024
MFH: 2021Q3 |
1.1.1k_2,1 19 Aug 2021 14:01:53 |
Bernard Spil (brnrd) |
security/openssl: Update KTLS patches for Chacha20-Poly1305
This pulls in several upstream KTLS patches from OpenSSL master:
* A fix to the return values of BIO_get_ktls_*().
* Support for Chacha20-Poly1305.
* Replacing the SSL_MODE_NO_KTLS_* modes which opted-out of KTLS with
an opt-in SSL_OP_ENABLE_KTLS. Note that this means that KTLS is not
enabled by default. Users can enable KTLS via a custom OpenSSL config
file that enables the KTLS option.
Reported by: jhb
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D31430 |
1.1.1k_1,1 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
1.1.1k_1,1 06 Apr 2021 10:45:45 |
Bernard Spil (brnrd) |
security/openssl: Fix /dev/crypto issue with 1.1.1k
PR: 254643
Reported by: <cryx-freebsd h3q com>
Reviewed by: wollman |
1.1.1k,1 26 Mar 2021 08:13:03 |
brnrd |
security/openssl: Security update to 1.1.1k
PR: 254551
Submitted by: Pascal Christen <pascal christen hostpoint ch>
MFH: 2021Q1
Security: 5a668ab3-8d86-11eb-b8d6-d4c9ef517024 |
1.1.1j_1,1 07 Mar 2021 16:45:49 |
tobik |
Remove redundant option descriptions that match the default ones
(ignoring case)
Reported by: danfe (for net/mosquitto), portscan |
1.1.1j_1,1 18 Feb 2021 09:22:42 |
brnrd |
security/openssl: Update KTLS patch
PR: 251969
Submitted by: gonzo, jhb
Obtained
from: https://github.com/openssl/openssl/commit/dfcfd17f2818cf520ce6381aed9ec3d2fc12170d
Differential Revision: https://reviews.freebsd.org/D28763 |
1.1.1j,1 17 Feb 2021 13:57:04 |
brnrd |
security/openssl: Security update to 1.1.1j
PR: 253561
Reported by: Michael Glaus <michael glaus hostpoint ch>
MFH: 2021Q1
Security: 96a21236-707b-11eb-96d8-d4c9ef517024 |
1.1.1i_1,1 31 Jan 2021 17:35:48 |
brnrd |
security/openssl: Update KTLS patch
Differential Revision: https://reviews.freebsd.org/D27423 |
1.1.1i,1 08 Dec 2020 16:26:33 |
brnrd |
security/vuxml: Security update to 1.1.1i
MFH: 2020Q4
Security: 1d56cfc5-3970-11eb-929d-d4c9ef517024 |
1.1.1h_1,1 05 Oct 2020 20:07:25 |
jhb |
Expand support for TLS protocols supported by KTLS.
Backport additional patches merged into OpenSSL's master
branch to support KTLS RX for TLS 1.1 and 1.2 as well as
support for KTLS TX for TLS 1.3.
Reviewed by: brnrd (maintainer)
Sponsored by: Chelsio Communications, Netflix
Differential Revision: https://reviews.freebsd.org/D26261 |
1.1.1h,1 23 Sep 2020 19:55:41 |
brnrd |
security/openssl: Update to 1.1.1g |
1.1.1g,1 23 May 2020 19:35:43 |
brnrd |
security/openssl: Add kernel TLS option
Submitted by: [email protected]
Differential Revision: https://reviews.freebsd.org/D24274 |
1.1.1g,1 27 Apr 2020 13:10:14 |
brnrd |
security/openssl-devel: Resurrect OpenSSL devel port |
1.1.1g,1 22 Apr 2020 09:35:38 |
brnrd |
security/openssl: Security update to 1.1.1g
PR: 245795
Reported by: Dani <i dani at outlook com>
MFH: 2020Q2
Security: 012809ce-83f3-11ea-92ab-00163e433440 |
1.1.1f,1 31 Mar 2020 14:37:18 |
brnrd |
security/openssl: Bug-fix update to 1.1.1f
PR: 245154
MFH: 2020Q1 |
1.1.1e_1,1 29 Mar 2020 16:00:41 |
brnrd |
security/openssl: Fix EOF bug
See https://github.com/openssl/openssl/pull/11400
PR: 245154
Reported by: koobs
MFH: 2020Q1 |
1.1.1e,1 20 Mar 2020 20:05:25 |
brnrd |
security/openssl: Add missing description
Reported by: adamw |
1.1.1e,1 17 Mar 2020 20:02:38 |
brnrd |
security/openssl: Update to 1.1.1e
- SM2/SM3 not a cipher [1]
- Add weak-ciphers option [2]
PR: 237056 [1]
Reported by: dewayne heuristicsystems com.au> [1], mat [2] |
1.1.1d,1 03 Jan 2020 12:19:06 |
brnrd |
security/openssl: Remove self-conflict
PR: 243049
Submitted by: Franco Fichtner
MFH: 2020Q1 |
1.1.1d,1 01 Jan 2020 16:42:44 |
brnrd |
security/openssl111: Rename to openssl
- Honoring promise from DEPRECATED message
- Unbreak people's builds
PR: 243014
MFH: 2020Q1 |
1.0.2u,1 31 Dec 2019 17:00:29 |
rene |
Remove expired ports:
2019-12-31 accessibility/linux-c6-atk: Superseded by CentOS 7
2019-12-31 audio/exaile-devel: this port is older than audio/exaile
2019-12-31 audio/linux-c6-alsa-lib: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-plugins-oss: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-plugins-pulseaudio: Superseded by CentOS 7
2019-12-31 audio/linux-c6-alsa-utils: Superseded by CentOS 7
2019-12-31 audio/linux-c6-flac: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libaudiofile: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libogg: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libsndfile: Superseded by CentOS 7
2019-12-31 audio/linux-c6-libvorbis: Superseded by CentOS 7
2019-12-31 audio/linux-c6-mikmod: Superseded by CentOS 7
2019-12-31 audio/linux-c6-nas-libs: Superseded by CentOS 7 (Only the first 15 lines of the commit message are shown above ) |
1.0.2u,1 20 Dec 2019 15:06:52 |
brnrd |
security/openssl: Security update to 1.0.2u
MFH: 2019Q4
Security: d778ddb0-2338-11ea-a1c7-b499baebfeaf |
1.0.2t,1 27 Oct 2019 11:19:53 |
brnrd |
security/openssl: Notify users of upcoming 1.1.1 |
1.0.2t,1 11 Sep 2019 20:04:29 |
brnrd |
security/openssl: Security update to 1.0.2t
MFH: 2019Q3
Security: 9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf |
1.0.2s,1 14 Aug 2019 12:16:13 |
mat |
Convert to UCL & cleanup pkg-message (categories s) |
1.0.2s,1 28 May 2019 20:22:25 |
brnrd |
security/openssl: Security hardening update to 1.0.2s
MFH: 2019Q2 |
1.0.2r,1 27 Feb 2019 08:06:02 |
brnrd |
security/openssl: Security update to 1.0.2r
MFH: 2019Q1
Security: 7700061f-34f7-11e9-b95c-b499baebfeaf |
1.0.2q,1 17 Feb 2019 19:09:55 |
brnrd |
security/openssl: Fix build with lld on i386
PR: 231459
Submitted by: Nathan <[email protected]>
Reported by: emaste |
1.0.2q,1 20 Nov 2018 17:53:09 |
brnrd |
security/openssl: Update to 1.0.2q |
1.0.2p_2,1 12 Nov 2018 20:19:24 |
brnrd |
security/openssl: Security update for CVE-2018-5407
MFH: 2018Q4
Security: 6f170cf2-e6b7-11e8-a9a8-b499baebfeaf |
1.0.2p_1,1 18 Oct 2018 09:30:09 |
amdmi3 |
- Update WWW
Approved by: portmgr blanket |
1.0.2p_1,1 12 Sep 2018 11:36:17 |
brnrd |
Chase CONFLICTS after addition of security/openssl111
- While here mark OpenSSL 1.1.0 deprecated
see: https://www.openssl.org/policies/releasestrat.html |
1.0.2p_1,1 29 Aug 2018 16:03:38 |
brnrd |
security/openssl: Fix padlock patches url prefix |
1.0.2p_1,1 14 Aug 2018 15:12:32 |
joneum |
Fix PORTREVISION |
1.0.2p,1 14 Aug 2018 15:04:04 |
brnrd |
security/openssl: Add engines patches to distinfo
- Undo clobbering distinfo
Reported by: mat |
1.0.2p,1 14 Aug 2018 14:12:53 |
brnrd |
security/openssl: Update to 1.0.2p
- Includes vulnerability fixes that were already
added to the port as patches |
1.0.2o_4,1 01 Aug 2018 16:33:11 |
adamw |
Fix a common grammar error: "can not" means the opposite of "cannot."
"Can not" means "it is possible not to," and "cannot" means "it is impossible
to." |
1.0.2o_4,1 11 Jul 2018 08:37:43 |
amdmi3 |
- Switch to new test framework
Approved by: portmgr blanket |
1.0.2o_4,1 12 Jun 2018 13:43:28 |
brnrd |
security/openssl: Actually add patch file
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf |
1.0.2o_3,1 12 Jun 2018 13:17:25 |
brnrd |
security/openssl: Security update
- Upstream update for CVE-2018-0732
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf |
1.0.2o_2,1 16 Apr 2018 17:47:16 |
brnrd |
security/openssl: Add CVE-2018-0737 patch
- Bump portrev too
MFH: 2018Q2
Security: 8f353420-4197-11e8-8777-b499baebfeaf |
1.0.2o_1,1 16 Apr 2018 17:24:35 |
brnrd |
security/openssl: Security update
MFH: 2018Q2
Security: 8f353420-4197-11e8-8777-b499baebfeaf |
1.0.2o,1 27 Mar 2018 15:27:06 |
brnrd |
security/openssl: Fix distinfo for patches
Reported by: joneum |
1.0.2o,1 27 Mar 2018 14:53:51 |
brnrd |
securit/openssl: Security update to 1.0.2o
MFH: 2018Q1
Security: b7cff5a9-31cc-11e8-8f07-b499baebfeaf |
1.0.2n,1 10 Mar 2018 10:53:36 |
brnrd |
security/openssl: Cleanup
- Remove EXPCIPHERS option (use security/openssl-unsafe) [1]
- Move port variables not dependent on bsd.port.pre.mk up
- Deleting man3 .pod files is redundant
- bss_dgram.c modification is a no-op
- Let openssl's Makefile install libs
- Simplify stripping
PR: 195270 [1] |
1.0.2n,1 07 Dec 2017 15:48:57 |
brnrd |
security/openssl: Update to 1.0.2m
- Remove patch now included upstream
- Include post-release patch for clang build error
MFH: 2017Q4
Security: 3bb451fc-db64-11e7-ac58-b499baebfeaf |
1.0.2m,1 03 Nov 2017 15:51:11 |
brnrd |
security/openssl: Unbreak build with No-SSLv3
- Importing patch from upstream
PR: 223388
Submitted by: tijl
Reported by: Laurence Parry <[email protected]> |
1.0.2m,1 02 Nov 2017 21:32:34 |
brnrd |
security/openssl: Security update to 1.0.2m
- Adds additional manpages too
MFH: 2017Q4
Security: f40f07aa-c00f-11e7-ac58-b499baebfeaf |
1.0.2l,1 19 Aug 2017 15:11:03 |
brnrd |
security/openssl: Fix build on MIPS
- gcc 4.2.1 on MIPS fails on -Werror
PR: 221620
Submitted by: Fukang Chen <[email protected]>
MFH: 2017Q3 |
1.0.2l,1 24 Jul 2017 17:51:15 |
brnrd |
security/openssl: Fix MASTER_SITE_SUBDIR
- DISTVERSIONFULL is not expanded before assignment
PR: 219929
Submitted by: Fukang Chen <[email protected]> |
1.0.2l,1 25 Jun 2017 00:29:09 |
linimon |
Begin deorbit burn of ia64. We have not attempted to build packages for
it for many years.
While here, alphabetize ARCHs, pet portlint, and modernize usages.
Approved by: portmgr (tier-2 blanket) |
1.0.2l,1 10 Jun 2017 13:24:10 |
brnrd |
security/openssl: Fix xmpp STARTTLS
- Add (refactored) patch from master branch
PR: 219805
Submitted by: Alexey <[email protected]> |
1.0.2l,1 25 May 2017 21:20:13 |
brnrd |
security/openssl: Fix distinfo after DIST_SUBDIR update
- Chase DIST_SUBDIR update in distinfo
Reported by: Cybil Courraud |
1.0.2l,1 25 May 2017 18:53:09 |
brnrd |
security/openssl: Update to 1.0.2l
- Bugfix update to 1.0.2l
- Fix PADLOCK option
- Build failure -Wunused-function
- Properly disable with configure
- Strip patch-version from DIST_SUBDIR, reduce dirs
- Remove unneeded testssl patch, dtls tests are OK
- Add new WITHOUT_SSL3 testssl extra-patch
- Remove md5 patch (inconsistent output)
- Remove openbsd_hw.c patch (not compiled)
- Remove srtp patch (upstream fixed)
- Fix plist |
1.0.2k_1,1 08 Feb 2017 20:16:31 |
brnrd |
security/openssl: Enable ASM by default
- Enable ASM option
* By extension this enables AES-NI [1]
- Order OPTIONS_DEFAULT alphabetically
- Switch to using @sample [2]
- Bump PORTREVISION
PR: 216559 [2]
Reported by: dtestke [1]
Submitted by: Franco Fichtner <[email protected]> [2]
Approved by: asomers, allanjude |