FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

Port details
openssl-devel SSL and crypto library (1.1.x)
1.1.0f security on this many watch lists=1 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: brnrd@FreeBSD.org search for ports maintained by this maintainer
Port Added: 04 Mar 2016 04:14:23
Also Listed In: devel
License: OpenSSL
The OpenSSL Project is a collaborative effort to develop a robust,
commercial-grade, full-featured, and Open Source toolkit implementing
the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security
(TLS v1) protocols with full-strength cryptography world-wide. The
project is managed by a worldwide community of volunteers that use
the Internet to communicate, plan, and develop the OpenSSL tookit
and its related documentation.

OpenSSL is based on the excellent SSLeay library developed by Eric
A. Young and Tim J. Hudson. The OpenSSL toolkit is licensed under
an Apache-style licence, which basically means that you are free
to get and use it for commercial and non-commercial purposes subject
to some simple license conditions.

WWW: http://www.openssl.org/
WWW: http://sctp.fh-muenster.de/dtls-patches.html
SVNWeb : Homepage : PortsMon

To install the port: cd /usr/ports/security/openssl-devel/ && make install clean
To add the package: pkg install openssl-devel

PKGNAME: openssl-devel

distinfo:

TIMESTAMP = 1495727879
SHA256 (openssl-1.1.0f.tar.gz) = 12f746f3f2493b2f39da7ecf63d7ee19c6ac9ec6a4fcd8c229da8a522cb12765
SIZE (openssl-1.1.0f.tar.gz) = 5278176


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. perl5>=5.24<5.25 : lang/perl5.24
There are no ports dependent upon this port

Configuration Options
===> The following configuration options are available for openssl-devel-1.1.0f:
     MAN3=on: Install API manpages (section 3)
     RFC3779=off: RFC3779 support (BGP)
     SHARED=on: Build shared libraries
     ZLIB=off: zlib compression support
====> Cipher Suite Support
     IDEA=off: IDEA
     JPAKE=off: J-PAKE (experimental)
     RC2=on: RC2 (unsafe)
     RC4=on: RC4 (unsafe)
     RC5=off: RC5 (patented)
====> Hash Function Support
     MD2=off: MD2 (obsolete)
     MD4=on: MD4 (unsafe)
     MDC2=off: MDC-2
     RMD160=on: RIPEMD-160
====> Optimizations
     ASM=on: Assembler code
     SSE2=on: Runtime SSE2 detection
     THREADS=on: Threading support
     EC=off: Optimize NIST elliptic curves
====> Protocol Support
     NEXTPROTONEG=off: Next Protocol Negotiation (SPDY)
     SCTP=on: SCTP (Stream Control Transmission)
     SSL3=off: SSLv3 (unsafe)
===> Use 'make config' to modify these settings

USES:
cpe perl5

Master Sites:
  1. ftp://ftp.cert.dfn.de/pub/tools/net/openssl/source/
  2. https://www.openssl.org/source/

Number of commits found: 26

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
25 Jun 2017 00:29:09
Original commit files touched by this commit  1.1.0f
Revision:444251
linimon search for other commits by this committer
Begin deorbit burn of ia64.  We have not attempted to build packages for
it for many years.

While here, alphabetize ARCHs, pet portlint, and modernize usages.

Approved by:	portmgr (tier-2 blanket)
19 Jun 2017 16:06:12
Original commit files touched by this commit  1.1.0f
Revision:443880
mat search for other commits by this committer
The THREADS option is defined twice, remove one of them.

It makes poudriere think that options changed, and forces openssl to be
rebuilt at every bulk run.

Sponsored by:	Absolight
25 May 2017 19:08:57
Original commit files touched by this commit  1.1.0f
Revision:441711
brnrd search for other commits by this committer
security/openssl-devel: Update to 1.1.0f

 - Bugfix update to 1.1.0f
 - Fix plist issues
16 Feb 2017 13:17:20
Original commit files touched by this commit  1.1.0e
Revision:434211
brnrd search for other commits by this committer
security/openssl-devel: Upgrade to 1.1.0e

 - Vulnerability fix update to 1.1.0e

MFH:		2017Q1
Security:	1a802ba9-f444-11e6-9940-b499baebfeaf
Security:	CVE-2017-3733
26 Jan 2017 19:27:00
Original commit files touched by this commit  1.1.0d
Revision:432533 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Update to 1.1.0d

  - Update to 1.1.0d
  - Adjust pkg-plist

MFH:		2017Q1
Security:	d455708a-e3d3-11e6-9940-b499baebfeaf
10 Nov 2016 16:22:41
Original commit files touched by this commit  1.1.0c
Revision:425849 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Update to 1.1.0c

  - Update to 1.1.0c
  - Fix EC option
  - Fix added/removed man-pages

MFH:		2016Q4
Security:	CVE-2016-7054
Security:	CVE-2016-7053
Security:	CVE-2016-7055
02 Nov 2016 07:15:09
Original commit files touched by this commit  1.1.0b_1
Revision:425117 This port version is marked as vulnerable.
jbeich search for other commits by this committer
security/openssl-devel: adjust conflicts like r422717 and r424947

This permits bundling when DEPENDS_TARGET != install e.g.,

  BUILD_DEPENDS += ${NONEXISTENT}:security/openssl-devel:stage

  CPPFLAGS+=		-I${WRKDIR}/openssl-devel/include
  LDFLAGS+=		-L${WRKDIR}/openssl-devel/lib

  pre-configure:
	@(cd `${MAKE} -V STAGEDIR -C ${PORTSDIR}/security/openssl-devel`${LOCALBASE} \
	    && ${COPYTREE_SHARE} . ${WRKDIR}/openssl-devel "! -name *.so*")

PR:		213889
Approved by:	portmgr blanket
28 Oct 2016 20:05:48
Original commit files touched by this commit  1.1.0b_1
Revision:424879 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl: Bump PORTREVISION

  - Make sure ports get rebuilt

PR:		209582
Reported by:	mat
28 Oct 2016 19:49:18
Original commit files touched by this commit  1.1.0b
Revision:424878 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl: Bump shared library version

  - Bump shlib version for security/openssl
  - Bump shlib version for security/openssl-devel
  - Add instructions to UPDATING

PR:		209582
Reported by:	Matthew D. Fuller <fullermd@over-yonder.net>
MFH:		2016Q4
02 Oct 2016 15:30:14
Original commit files touched by this commit  1.1.0b
Revision:423128 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Align with security/openssl

  - Revert to default CPE_VERSION
  - Rework MAN3 option
  - Remove remnants of base SHLIBVER_BASE check
26 Sep 2016 14:28:06
Original commit files touched by this commit  1.1.0b
Revision:422777 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Update to 1.1.0b

  - Update to 1.1.0b
  - Fixes CRITICAL Use After Free for large message sizes (CVE-2016-6309)
  - Make zlib and ssl3 options work
  - Remove jpake header (jpake removed completely)

MFH:		2016Q3
Security:	91a337d8-83ed-11e6-bf52-b499baebfeaf
23 Sep 2016 09:17:49
Original commit files touched by this commit  1.1.0a
Revision:422660 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Revert to PORTVERSION

  - Delete DISTVERSION related variables
  - Add PORTVERSION variable

MFH:		2016Q3
22 Sep 2016 15:06:18
Original commit files touched by this commit  1.1.0_1
Revision:422627 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Bump portrevision

Security:	43eaa656-80bc-11e6-bf52-b499baebfeaf
22 Sep 2016 15:02:50
Original commit files touched by this commit  1.1.0
Revision:422626 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Update to 1.1.0a

  - Update to 1.1.0a fixing vulnerabilities
  - Sort OPTIONS_DEFINE alphabetically
  - Enable MD4 RC2 RC4 by default

MFH:		2016Q3
Security:	43eaa656-80bc-11e6-bf52-b499baebfeaf
Security:	CVE-2016-6304
Security:	CVE-2016-6305
Security:	CVE-2016-6307
Security:	CVE-2016-6308
Sponsored by:	EuroBSDCon 2016 DevSummit
15 Sep 2016 22:05:45
Original commit files touched by this commit  1.1.0
Revision:422233 This port version is marked as vulnerable.
mat search for other commits by this committer
ftp.openssl.org is being taken out.

https://mta.openssl.org/pipermail/openssl-announce/2016-September/000075.html

Sponsored by:	Absolight
08 Sep 2016 07:16:16
Original commit files touched by this commit  1.1.0
Revision:421534 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Fix EC option on DragonflyBSD

  - Allow Dragonfly to transform amd64 to x86_64

Submitted by:	John Marino <freebsd.contact@marino.st>
Reported by:	John Marino <freebsd.contact@marino.st>
28 Aug 2016 21:10:19
Original commit files touched by this commit  1.1.0
Revision:421034 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Fix index build failure on 9.x

  - Old fmake doesn't know :U modifier
28 Aug 2016 20:18:47
Original commit files touched by this commit  1.1.0
Revision:421032 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Configure, Build fixes

  - Do not pass asm to configure (upstream default ON), fixes configure
  - Disable EC optimizations on i386, fixes build
  - Split options activation into upstream-default-enabled and -disabled
  - Rework EC option handling
  - Align order of Makefile with security/openssl
  - Use improved patching from security/openssl
  - Improve options descriptions
  - Remove old PRECIOUSMAKEVARS
  - Add pkg-message
25 Aug 2016 19:52:03
Original commit files touched by this commit  1.1.0
Revision:420879 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Remove defunct pkg-message

  - Now RELEASE so remove message
25 Aug 2016 19:49:55
Original commit files touched by this commit  1.1.0
Revision:420878 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Update to 1.1.0-release

  - Update to 1.1.0 RELEASE
  - OPTIONS-ify NIST EC curves architectures
  - Remove dasync dynamic engine (as per upstream)
  - Fix man-page plist issues
04 Aug 2016 19:06:07
Original commit files touched by this commit  1.1.0.p6
Revision:419650 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Update to 1.1.0-pre6

  - Update to 1.1.0-pre6 first BETA
  - Remove defunct post-patch target
  - pkg-message.in is now pkg-message
  - Replace ALPHA with BETA
  - Fix pkg-plist
20 Jul 2016 15:33:20
Original commit files touched by this commit  1.1.0.p5
Revision:418840 This port version is marked as vulnerable.
mat search for other commits by this committer
Cleanup $() variables in ports Makefiles.

Mostly replace with ${}, but sometime, replace with $$() because it is
what was intended in the first place. (I think.)

Sponsored by:	Absolight
16 Jun 2016 13:22:59
Original commit files touched by this commit  1.1.0.p5
Revision:416965 This port version is marked as vulnerable.
mat search for other commits by this committer
Add DEFAULT_VERSIONS=ssl=XXX

Move the openssl detection routine to bsd.default-version.mk.
Add warnings telling people to not use WITH_OPENSSL_PORT or
WITH_OPENSSL_BASE.

To ease maintainability, change the way the different ssl libraries
version numbers are checked.

PR:		210149
Submitted by:	mat
Exp-run by:	antoine
Sponsored by:	The FreeBSD Foundation, Absolight
Differential Revision:	https://reviews.freebsd.org/D6577
24 Apr 2016 17:44:33
Original commit files touched by this commit  1.1.0.p5
Revision:413952 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Update to 1.1 BETA2 (1.1.0-pre5)

  - Update to first BETA of OpenSSL 1.1
  - Bump SHLIB_VERSION for 1.1 to 9
  - Add missing libressl-devel conflict
  - Mark jobs-safe
  - Add upstream clang fix (Issue 888)
  - Fix renamed shared engines (remove 'lib' prefix)
  - Remove "overwrite base" check
  - Do not install html docs

Reviewed by:	feld (mentor), koobs (mentor)
Approved by:	feld (mentor)
Differential Revision:	D5900
03 Mar 2016 14:39:12
Original commit files touched by this commit  1.1.0.p3
Revision:410043 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Create OpenSSL 1.1.0 Alpha port

 - Delete files after repo-copy initial commit

Reviewed by:	koobs (mentor)
Approved by:	koobs (mentor)
Differential Revision:	D5484
03 Mar 2016 14:36:51
Original commit files touched by this commit  1.1.0.p3
Revision:410042 This port version is marked as vulnerable.
brnrd search for other commits by this committer
security/openssl-devel: Create OpenSSL 1.1.0 Alpha port

 - Repo-copy of security/openssl
 - Remove unneeded USE_OPENSSL check
 - Add and normalize CONFLICTS
 - Put OPTIONS into GROUPS for ciphers, hashes, protocols and optimizations
 - Add more configurable ciphers, hashes and protocols
 - Sort <OPT>_DESC alphabetically
 - Reword <OPT>_DESC after grouping, add (comment)
 - Rewrite ${PORT_OPTIONS:M<OPT>} to <OPT>_<FEATURE>_* where possible
 - Rewrite ${PORT_OPTIONS:M<OPT>} to target-<OPT>-on where possible
 - Rewrite do-configure target to HAS_CONFIGURE/CONFIGURE_SCRIPT
 - Rewrite (regression-)test target to TEST_TARGET
 - Add NPN support patch from [1]
 - Remove 1.0.2 specific patches (Padlock and EVP_MD_CTX_FLAG_ONESHOT)
 - Disable obsolete, broken and obscure features

[1] https://github.com/openssl/openssl/pull/757

Reviewed by:	koobs (mentor)
Approved by:	koobs (mentor)
Differential Revision:	D5484

Number of commits found: 26

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
mariadb100-server*Jul 23
mariadb101-server*Jul 23
mariadb55-server*Jul 23
mysql55-server*Jul 23
mysql56-server*Jul 23
mysql57-server*Jul 23
percona55-server*Jul 23
percona56-server*Jul 23
percona57-server*Jul 23
gitlabJul 20
collectd5Jul 19
strongswanJul 19
strongswanJul 19
cactiJul 17
apache24Jul 13

11 vulnerabilities affecting 62 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 30871
Broken 176
Deprecated 103
Ignore 471
Forbidden 0
Restricted 210
No CDROM 84
Vulnerable 193
Expired 42
Set to expire 98
Interactive 0
new 24 hours 21
new 48 hours46
new 7 days91
new fortnight299
new month490

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2017 Dan Langille. All rights reserved.