non port: security/openssl/Makefile |
Number of commits found: 320 (showing only 100 on this page) |
Sunday, 14 Apr 2024
|
19:20 Bernard Spil (brnrd)
security/openssl: Security update for CVE-2024-2511
Security: 7c217849-f7d7-11ee-a490-84a93843eb75
MFH: 2024Q2
3d9fc06 |
Sunday, 31 Mar 2024
|
13:04 Bernard Spil (brnrd)
security/openssl: Fix for POSIX_VERSION 200809L
* See https://github.com/openssl/openssl/pull/23885
PR: 273869
Reported by: imp
Submitted by: vvd
36dad62 |
Thursday, 21 Mar 2024
|
14:09 Bernard Spil (brnrd)
security/openssl: Chase addition of openssl33 in conflicts
* While here use proper tag for openssl31-quictls
e6eeffa |
Tuesday, 12 Mar 2024
|
05:40 Yasuhiro Kimura (yasu)
security/openssl: Move man pages to share/man
Approved by: portmgr (blanket)
eafa261 |
Wednesday, 31 Jan 2024
|
18:59 Bernard Spil (brnrd)
security/openssl: Security update to 3.0.13
* Note that this is a security rollup of four previously reported CVEs
Security: 10dee731-c069-11ee-9190-84a93843eb75
Security: 8337251b-b07b-11ee-b0d7-84a93843eb75
Security: a5956603-7e4f-11ee-9df6-84a93843eb75
MFH: 2024Q1
fa860fe |
Thursday, 11 Jan 2024
|
12:29 Bernard Spil (brnrd)
security/openssl: Security fix for POLY1305 on ppc
Security: 8337251b-b07b-11ee-b0d7-84a93843eb75
MFH: 2024Q1
0f0d8db |
Sunday, 31 Dec 2023
|
00:37 Muhammad Moinur Rahman (bofh)
*/*: Sunset 12.4-RELEASE/12-STABLE from ports tree
- Remove all references to defunct ARCH arm
- Remove all references to defunct ARCH sparc64
- Remove x11-drivers/xf86-video-sunffb which requires defunct sparc64
ARCH
- Remove sysutils/afbinit requires defunct sparc64 ARCH
- Remove all references to bktr driver
- Remove all references to defunct FreeBSD_12
- Remove all references to OSVERSION/OSREL corresponding to 12
- Remove conditionals in Mk/Uses/cabal.mk
- Remove sparc reference from Mk/Uses/qt-dist.mk
- Remove BROKEN_sparc64/NOT_FOR_ARCH=sparc64
- Remove BROKEN_FreeBSD_12* from:
- Remove OpenSSL patches from:
- Remove conditional flags for OSVERSION >= 1300000 to fixed flags.
Also move conditional flags for non sparc64/arm ARCH to fixed flags.
Reviewed by: brooks, jbeich, rene, salvadore
Differential Revision: https://reviews.freebsd.org/D42068
bbab7f5 |
Sunday, 26 Nov 2023
|
14:33 Bernard Spil (brnrd)
security/openssl: Set portscout limits
dedf8e0 |
Wednesday, 8 Nov 2023
|
16:14 Bernard Spil (brnrd)
security/openssl: Security fix for CVE-2023-5678
Security: a5956603-7e4f-11ee-9df6-84a93843eb75
MFH: 2023Q4
e315770 |
Tuesday, 24 Oct 2023
|
18:26 Bernard Spil (brnrd)
security/openssl: Security update to 3.0.12
Security: 4a4712ae-7299-11ee-85eb-84a93843eb75
MFH: 2023Q4
e32f5f1 |
Sunday, 15 Oct 2023
|
13:37 Bernard Spil (brnrd)
security/openssl: Fix EXPIRATION_DATE
* While here, chase in 3.x ports and use the actual date
c373c6a |
Saturday, 14 Oct 2023
|
17:23 Bernard Spil (brnrd)
security/openssl: Major version update to 3.0
* OpenSSL 1.1.1 is EoL, update to new LTS version
* Aligns with upcoming OpenSSL version in 14.0
d5ec2e1 |
Monday, 11 Sep 2023
|
16:46 Bernard Spil (brnrd)
security/openssl: Update to 1.1.1w
* Final version of OpenSSL 1.1.1, this port will upgrade to
3.0 (LTS) with a next commit.
* Note the recent vuln was Windows only
4649d1f |
Wednesday, 2 Aug 2023
|
19:27 Bernard Spil (brnrd)
security/openssl: Update to 1.1.1v
* MFH this version as this is a roll-up of multiple vulnerability fixes
MFH: 2023Q3
04ffe8f |
Monday, 31 Jul 2023
|
20:47 Bernard Spil (brnrd)
security/openssl: Security update for CVE-2023-3817 (Low)
Security: bad6588e-2fe0-11ee-a0d1-84a93843eb75
cf313db |
Wednesday, 31 May 2023
|
11:41 Bernard Spil (brnrd)
security/openssl: Security update to 1.1.1u
Security: eb9a3c57-ff9e-11ed-a0d1-84a93843eb75
MFH: 2023Q2
11c58a2 |
Wednesday, 29 Mar 2023
|
18:53 Bernard Spil (brnrd)
security/openssl: Security update for CVE-2023-0465 & 0466
Security: 425b9538-ce5f-11ed-ade3-d4c9ef517024
543bd99 |
Friday, 24 Mar 2023
|
11:43 Bernard Spil (brnrd)
security/openssl: Security update for CVE-2023-0464
Security: 1ba034fb-ca38-11ed-b242-d4c9ef517024
036b6ca |
Wednesday, 15 Mar 2023
|
09:14 Bernard Spil (brnrd)
security/openssl30: Chase rename in ports CONFLICTS*
Reported by: cperciva, junchoon
70a4cc5 |
Tuesday, 7 Feb 2023
|
19:54 Bernard Spil (brnrd)
security/openssl: Security update to 1.1.1t
Security: 648a432c-a71f-11ed-86e9-d4c9ef517024
MFH: 2023Q1
bf0a2e5 |
Tuesday, 1 Nov 2022
|
17:47 Bernard Spil (brnrd)
security/openssl: Update to 1.1.1s
323086c |
Wednesday, 7 Sep 2022
|
21:10 Stefan Eßer (se)
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
This commit implements such a proposal and moves one of the WWW: entries
of each pkg-descr file into the respective port's Makefile. A heuristic
attempts to identify the most relevant URL in case there is more than
one WWW: entry in some pkg-descr file. URLs that are not moved into the
Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr
files in order to preserve them.
There are 1256 ports that had no WWW: entries in pkg-descr files. These
ports will not be touched in this commit.
The portlint port has been adjusted to expect a WWW entry in each port
Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as
deprecated.
Approved by: portmgr (tcberner)
b7f0544 |
Wednesday, 20 Jul 2022
|
14:22 Tobias C. Berner (tcberner)
security: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* <ports@c0decafe.net>
* Aaron Dalton <aaron@FreeBSD.org>
* Adam Weinberger <adamw@FreeBSD.org>
* Ade Lovett <ade@FreeBSD.org>
* Aldis Berjoza <aldis@bsdroot.lv>
* Alex Dupre <ale@FreeBSD.org>
* Alex Kapranoff <kappa@rambler-co.ru>
* Alex Samorukov <samm@freebsd.org>
* Alexander Botero-Lowry <alex@foxybanana.com>
* Alexander Kriventsov <avk@vl.ru>
* Alexander Leidinger <netchild@FreeBSD.org>
* Alexander Logvinov <ports@logvinov.com>
* Alexander Y. Grigoryev <alexander.4mail@gmail.com>
* Alexey Dokuchaev <danfe@FreeBSD.org>
* Alfred Perlstein
* Alfred Perlstein <alfred@FreeBSD.org>
* Anders Nordby <anders@FreeBSD.org>
* Anders Nordby <anders@fix.no>
* Andreas Klemm <andreas@klemm.gtn.com>
* Andrew Lewis <freeghb@gmail.com>
* Andrew Pantyukhin <infofarmer@FreeBSD.org>
* Andrew St. Jean <andrew@arda.homeunix.net>
* Anes Mukhametov <anes@anes.su>
* Antoine Brodin <antoine@FreeBSD.org>
* Anton Berezin <tobez@FreeBSD.org>
* Antonio Carlos Venancio Junior (<antonio@inf.ufsc.br>)
* Antonio Carlos Venancio Junior <antonio@inf.ufsc.br>
* Ashish SHUKLA <ashish@FreeBSD.org>
* Attila Nagy <bra@fsn.hu>
* Autrijus Tang <autrijus@autrijus.org>
* Axel Rau <axel.rau@chaos1.de>
* Babak Farrokhi <farrokhi@FreeBSD.org>
* Ben Woods <woodsb02@FreeBSD.org>
* Bernard Spil <brnrd@FreeBSD.org>
* Bernard Spil <brnrd@freebsd.org>
* Blaz Zupan <blaz@si.FreeBSD.org>
* Bob Hockney <zeus@ix.netcom.com>
* Boris Kochergin <spawk@acm.poly.edu>
* Brendan Molloy <brendan+freebsd@bbqsrc.net>
* Bruce M Simpson
* Bruce M Simpson <bms@FreeBSD.org>
* Bruce M. Simpson <bms@FreeBSD.org>
* Carlo Strub
* Carlo Strub <cs@FreeBSD.org>
* Carlos J Puga Medina <cpm@FreeBSD.org>
* Carlos J Puga Medina <cpm@fbsd.es>
* Charlie Root <se@FreeBSD.org>
* Cheng-Lung Sung <clsung@FreeBSD.org>
* Cheng-Lung Sung <clsung@dragon2.net>
* Chie Taguchi <taguchi.ch@gmail.com>
* Chris Cowart <ccowart@rescomp.berkeley.edu>
* Chris D. Faulhaber <jedgar@FreeBSD.org>
* Christer Edwards <christer.edwards@gmail.com>
* Christian Lackas
* Christopher Hall <hsw@bitmark.com>
* Clement Laforet <sheepkiller@cultdeadsheep.org>
* Clive Lin <clive@CirX.ORG>
* Colin Percival
* Cory McIntire (loon@noncensored.com)
* Craig Leres <leres@FreeBSD.org>
* Cristiano Deana <cris@gufi.org>
* Cy Schubert (Cy.Schubert@uumail.gov.bc.ca)
* Cy Schubert <Cy.Schubert@uumail.gov.bc.ca>
* Cy Schubert <cy@FreeBSD.org>
* Damian Gerow <dgerow@afflictions.org>
* Damien Bobillot
* Dan Langille
* Dan Langille <dan@freebsddiary.org>
* Dan Langille <dvl@FreeBSD.org>
* Dan Langille <dvl@freebsd.org>
* Dan Langille <dvl@sourcefire.com>
* Daniel Kahn Gillmor <dkg@fifthhorseman.net>
* Daniel Roethlisberger <daniel@roe.ch>
* Danilo Egea Gondolfo <danilo@FreeBSD.org>
* Danton Dorati <urisso@bsd.com.br>
* Dave McKay <dave@mu.org>
* David E. Thiel <lx@FreeBSD.org>
* David O'Brien (obrien@NUXI.com)
* David O'Brien <obrien@FreeBSD.org>
* David Thiel <lx@redundancy.redundancy.org>
* Dean Hollister <dean@odyssey.apana.org.au>
* Denis Shaposhnikov <dsh@vlink.ru>
* Dereckson <dereckson@gmail.com>
* Dirk Froemberg <dirk@FreeBSD.org>
* Ditesh Shashikant Gathani <ditesh@gathani.org>
* Dom Mitchell <dom@happygiraffe.net>
* Dominic Marks <dominic.marks@btinternet.com>
* Don Croyle <croyle@gelemna.org>
* Douglas Thrift <douglas@douglasthrift.net>
* Edson Brandi <ebrandi@fugspbr.org>
* Edwin Groothuis <edwin@mavetju.org>
* Ekkehard 'Ekki' Gehm <gehm@physik.tu-berlin.de>
* Emanuel Haupt <ehaupt@FreeBSD.org>
* Emanuel Haupt <ehaupt@critical.ch>
* Eric Crist <ecrist@secure-computing.net>
* Erwin Lansing <erwin@FreeBSD.org>
* Eugene Grosbein <eugen@FreeBSD.org>
* Fabian Keil <fk@fabiankeil.de>
* Felix Palmen <felix@palmen-it.de>
* Florent Thoumie <flz@xbsd.org>
* Foxfair Hu <foxfair@FreeBSD.org>
* Frank Laszlo <laszlof@vonostingroup.com>
* Frank Wall <fw@moov.de>
* Franz Bettag <franz@bett.ag>
* Gabor Kovesdan
* Gabor Kovesdan <gabor@FreeBSD.org>
* Gabriel M. Dutra <0xdutra@gmail.com>
* Gary Hayers <Gary@Hayers.net>
* Gasol Wu <gasol.wu@gmail.com>
* Gea-Suan Lin <gslin@gslin.org>
* George Reid <greid@ukug.uk.freebsd.org>
* George Reid <services@nevernet.net>
* Greg Larkin <glarkin@FreeBSD.org>
* Greg V <greg@unrelenting.technology>
* Gregory Neil Shapiro <gshapiro@FreeBSD.org>
* Grzegorz Blach <gblach@FreeBSD.org>
* Guangyuan Yang <ygy@FreeBSD.org>
* Hakisho Nukama <nukama@gmail.com>
* Hammurabi Mendes <hmendes@brturbo.com>
* Henk van Oers <hvo.pm@xs4all.nl>
* Horia Racoviceanu <horia@racoviceanu.com>
* Hung-Yi Chen <gaod@hychen.org>
* Jaap Akkerhuis <jaap@NLnetLabs.nl>
* Jaap Boender <jaapb@kerguelen.org>
* Jacek Serwatynski <tutus@trynet.eu.org>
* James FitzGibbon <jfitz@FreeBSD.org>
* James Thomason <james@divide.org>
* Jan-Peter Koopmann <Jan-Peter.Koopmann@seceidos.de>
* Janky Jay <ek@purplehat.org>
* Janos Mohacsi
* Janos Mohacsi <janos.mohacsi@bsd.hu>
* Jean-Yves Lefort <jylefort@brutele.be>
* Jim Geovedi <jim@corebsd.or.id>
* Jim Ohlstein <jim@ohlste.in>
* Joe Clarke <marcus@marcuscom.com>
* Joe Marcus Clarke <marcus@FreeBSD.org>
* Johann Visagie <johann@egenetics.com>
* Johann Visagie <wjv@FreeBSD.org>
* John Ferrell <jdferrell3@yahoo.com>
* John Hixson <jhixson@gmail.com>
* John Polstra <jdp@polstra.com>
* John W. O'Brien <john@saltant.com>
* John-Mark Gurney <jmg@FreeBSD.org>
* Jose Alonso Cardenas Marquez <acardenas@bsd.org.pe>
* Joseph Benden <joe@thrallingpenguin.com>
* Joshua D. Abraham <jabra@ccs.neu.edu>
* Jov <amutu@amutu.com>
* Jui-Nan Lin <jnlin@freebsd.cs.nctu.edu.tw>
* Ka Ho Ng <khng300@gmail.com>
* Kay Lehmann <kay_lehmann@web.de>
* Keith J. Jones <kjones@antihackertoolkit.com>
* Kevin Zheng <kevinz5000@gmail.com>
* Kimura Fuyuki <fuyuki@hadaly.org>
* Kimura Fuyuki <fuyuki@mj.0038.net>
* Klayton Monroe <klm@uidzero.org>
* Konstantin Menshikov <kostjnspb@yandex.ru>
* Koop Mast <kwm@FreeBSD.org>
* Kris Kennaway <kris@FreeBSD.org>
* Kubilay Kocak <koobs@FreeBSD.org>
* Kurt Jaeger <fbsd-ports@opsec.eu>
* LEVAI Daniel <leva@ecentrum.hu>
* Lars Engels <lme@FreeBSD.org>
* Lars Thegler <lth@FreeBSD.org>
* Laurent LEVIER <llevier@argosnet.com>
* Luiz Eduardo R. Cordeiro
* Lukas Slebodnik <lukas.slebodnik@intrak.sk>
* Lukasz Komsta
* Mageirias Anastasios <anastmag@gmail.com>
* Marcel Prisi <marcel.prisi@virtua.ch>
* Marcello Coutinho
* Mario Sergio Fujikawa Ferreira <lioux@FreeBSD.org>
* Mark Felder <feld@FreeBSD.org>
* Mark Hannon <markhannon@optusnet.com.au>
* Mark Murray <markm@FreeBSD.org>
* Mark Pulford <mark@kyne.com.au>
* Marko Njezic <sf@maxempire.com>
* Martin Matuska <martin@tradex.sk>
* Martin Matuska <mm@FreeBSD.org>
* Martin Mersberger
* Martin Wilke <miwi@FreeBSD.org>
* Martti Kuparinen <martti.kuparinen@ericsson.com>
* Mateusz Piotrowski <0mp@FreeBSD.org>
* Matt <matt@xtaz.net>
* Matt Behrens <matt@zigg.com>
* Matthias Andree <mandree@FreeBSD.org>
* Matthias Fechner <mfechner@FreeBSD.org>
* Matthieu BOUTHORS <matthieu@labs.fr>
* Maxim Sobolev <sobomax@FreeBSD.org>
* Meno Abels <meno.abels@adviser.com>
* Michael Haro <mharo@FreeBSD.org>
* Michael Johnson <ahze@FreeBSD.org>
* Michael Nottebrock <lofi@FreeBSD.org>
* Michael Reifenberger <mr@FreeBSD.org>
* Michael Schout <mschout@gkg.net>
* Michal Bielicki <m.bielicki@llizardfs.com>
* Michiel van Baak <michiel@vanbaak.eu
* Mij <mij@bitchx.it>
* Mike Heffner <mheffner@vt.edu>
* Mikhail T. <m.tsatsenko@gmail.com>
* Mikhail Teterin <mi@aldan.algebra.com>
* Milan Obuch
* Mosconi <mosconi.rmg@gmail.com>
* Muhammad Moinur Rahman <5u623l20@gmail.com>
* Mustafa Arif <ma499@doc.ic.ac.uk>
* Neil Booth
* Neil Booth <kyuupichan@gmail.com>
* Nick Barkas <snb@threerings.net>
* Nicola Vitale <nivit@FreeBSD.org>
* Niels Heinen
* Nikola Kolev <koue@chaosophia.net>
* Nobutaka Mantani <nobutaka@FreeBSD.org>
* Oliver Lehmann
* Oliver Lehmann <oliver@FreeBSD.org>
* Olivier Duchateau
* Olivier Duchateau <duchateau.olivier@gmail.com>
* Olli Hauer
* Patrick Li <pat@databits.net>
* Paul Chvostek <paul@it.ca>
* Paul Schmehl <pauls@utdallas.edu>
* Pavel I Volkov <pavelivolkov@googlemail.com>
* Pete Fritchman <petef@databits.net>
* Peter Ankerstal <peter@pean.org>
* Peter Haight <peterh@sapros.com>
* Peter Johnson <johnson.peter@gmail.com>
* Peter Pentchev <roam@FreeBSD.org>
* Petr Rehor <rx@rx.cz>
* Philippe Audeoud <jadawin@tuxaco.net>
* Philippe Rocques <phil@teaser.fr>
* Piotr Kubaj <pkubaj@FreeBSD.org>
* Piotr Kubaj <pkubaj@anongoth.pl>
* Po-Chuan Hsieh <sunpoet@FreeBSD.org>
* RaRa Rasputin <rasputin@submonkey.net>
* Radim Kolar
* Ralf Meister
* Remington Lang <MrL0Lz@gmail.com>
* Renaud Chaput <renchap@cocoa-x.com>
* Roderick van Domburg <r.s.a.vandomburg@student.utwente.nl>
* Roland van Laar <roland@micite.net>
* Romain Tartiere <romain@blogreen.org>
* Roman Bogorodskiy
* Roman Bogorodskiy <novel@FreeBSD.org>
* Roman Shterenzon <roman@xpert.com>
* Rong-En Fan <rafan@FreeBSD.org>
* Ryan Steinmetz <zi@FreeBSD.org>
* Sahil Tandon <sahil@tandon.net>
* Sascha Holzleiter <sascha@root-login.org>
* SeaD
* Seamus Venasse <svenasse@polaris.ca>
* Sean Greven <sean.greven@gmail.com>
* Sebastian Schuetz <sschuetz@fhm.edu>
* Sergei Kolobov <sergei@FreeBSD.org>
* Sergei Kolobov <sergei@kolobov.com>
* Sergei Vyshenski
* Sergei Vyshenski <svysh.fbsd@gmail.com>
* Sergey Skvortsov <skv@protey.ru>
* Seth Kingsley <sethk@meowfishies.com>
* Shaun Amott <shaun@inerd.com>
* Simeon Simeonov <sgs@pichove.org>
* Simon Dick <simond@irrelevant.org>
* Sofian Brabez <sbrabez@gmail.com>
* Stanislav Sedov <ssedov@mbsd.msk.ru>
* Stefan Esser <se@FreeBSD.org>
* Stefan Grundmann
* Stefan Walter <sw@gegenunendlich.de>
* Stephon Chen <stephon@gmail.com>
* Steve Wills <steve@mouf.net>
* Steve Wills <swills@FreeBSD.org>
* Steven Kreuzer
* Steven Kreuzer <skreuzer@exit2shell.com>
* Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org>
* TAKAHASHI Kaoru <kaoru@kaisei.org>
* TAKATSU Tomonari <tota@FreeBSD.org>
* Tatsuki Makino <tatsuki_makino@hotmail.com>
* Thibault Payet <monwarez@mailoo.org>
* Thierry Thomas (<thierry@pompo.net>)
* Thierry Thomas <thierry@pompo.net>
* Thomas Hurst <tom@hur.st>
* Thomas Quinot <thomas@cuivre.fr.eu.org>
* Thomas Zander <riggs@FreeBSD.org>
* Thomas von Dein <freebsd@daemon.de>
* Tilman Linneweh <arved@FreeBSD.org>
* Tim Bishop <tim@bishnet.net>
* Tom Judge <tom@tomjudge.com>
* Tomoyuki Sakurai <cherry@trombik.org>
* Toni Viemerö <toni.viemero@iki.fi>
* Tony Maher
* Torsten Zuhlsdorff <ports@toco-domains.de>
* Travis Campbell <hcoyote@ghostar.org>
* Tsung-Han Yeh <snowfly@yuntech.edu.tw>
* Ulf Lilleengen
* Vaida Bogdan <vaida.bogdan@gmail.com>
* Valentin Zahariev <curly@e-card.bg>
* Valerio Daelli <valerio.daelli@gmail.com>
* Veniamin Gvozdikov <vg@FreeBSD.org>
* Victor Popov
* Victor Popov <v.a.popov@gmail.com>
* Vsevolod Stakhov
* Vsevolod Stakhov <vsevolod@FreeBSD.org>
* Wen Heping <wen@FreeBSD.org>
* Wen Heping <wenheping@gmail.com>
* Yarodin <yarodin@gmail.com>
* Yen-Ming Lee <leeym@FreeBSD.org>
* Yen-Ming Lee <leeym@cae.ce.ntu.edu.tw>
* Yen-Ming Lee <leeym@leeym.com>
* Ying-Chieh Liao <ijliao@FreeBSD.org>
* Yonatan <Yonatan@Xpert.com>
* Yonatan <onatan@gmail.com>
* Yoshisato YANAGISAWA
* Yuri Victorovich
* Yuri Victorovich <yuri@rawbw.com>
* Zach Thompson <hideo@lastamericanempire.com>
* Zane C. Bowers <vvelox@vvelox.net>
* Zeus Panchenko <zeus@gnu.org.ua>
* ache
* adamw
* ajk@iu.edu
* alex@FreeBSD.org
* allan@saddi.com
* alm
* andrej@ebert.su
* andrew@scoop.co.nz
* andy@fud.org.nz
* antoine@FreeBSD.org
* arved
* barner
* brix@FreeBSD.org
* buganini@gmail.com
* chinsan
* chris@still.whet.org
* clement
* clsung
* crow
* cy@FreeBSD.org
* dominik karczmarski <dominik@karczmarski.com>
* dwcjr@inethouston.net
* eivind
* erich@rrnet.com
* erwin@FreeBSD.org
* girgen@FreeBSD.org
* glen.j.barber@gmail.com
* hbo@egbok.com
* ijliao
* jesper
* jfitz
* johans
* joris
* kftseng@iyard.org
* kris@FreeBSD.org
* lx
* markm
* mharo@FreeBSD.org
* michaelnottebrock@gmx.net
* mnag@FreeBSD.org
* mp39590@gmail.com
* nbm
* nectar@FreeBSD.org
* nork@FreeBSD.org
* nork@cityfujisawa.ne.jp
* nsayer@FreeBSD.org
* nsayer@quack.kfu.com
* ntarmos@cs.uoi.gr
* oly
* onatan@gmail.com
* pandzilla
* patrick@mindstep.com
* pauls
* perl@FreeBSD.org
* petef@FreeBSD.org
* peter.thoenen@yahoo.com
* ports@c0decafe.net
* ports@rbt.ca
* roam@FreeBSD.org
* rokaz
* sada@FreeBSD.org
* scrappy
* se
* shane@freebsdhackers.net aka modsix@gmail.com
* snb@threerings.net
* sumikawa
* sviat
* teramoto@comm.eng.osaka-u.ac.jp
* thierry@pompo.net
* tobez@FreeBSD.org
* torstenb@FreeBSD.org
* trasz <trasz@pin.if.uz.zgora.pl>
* trevor
* truckman
* vanhu
* vanilla@
* wen@FreeBSD.org
* will
With hat: portmgr
857c05f |
Tuesday, 5 Jul 2022
|
14:53 Bernard Spil (brnrd)
security/openssl: Security update to 1.1.1q
* Fixes vuln in AES OCB
Security: a28e8b7e-fc70-11ec-856e-d4c9ef517024
MFH: 2022Q3
df0eb4e |
Wednesday, 22 Jun 2022
|
08:56 Bernard Spil (brnrd)
security/openssl: Security update to 1.1.1p
Security: 4eeb93bf-f204-11ec-8fbd-d4c9ef517024
f894292 |
Saturday, 14 May 2022
|
19:59 Bernard Spil (brnrd)
security/openssl: Update KTLS patches
* Add support for TLS 1.3 receive
Reported by: jhb
Differential Revision: https://reviews.freebsd.org/D35189
9de8dbb |
Wednesday, 4 May 2022
|
07:33 Bernard Spil (brnrd)
security/openssl: Update to 1.1.1o
Security: fceb2b08-cb76-11ec-a06f-d4c9ef517024
MFH: 2022Q2
1c667cc |
Wednesday, 16 Mar 2022
|
19:18 Bernard Spil (brnrd)
security/openssl: Security update to 1.1.1n
Security: ea05c456-a4fd-11ec-90de-1c697aa5a594
MFH: 2022Q1
4374137 |
Saturday, 19 Feb 2022
|
15:12 Bernard Spil (brnrd)
security/openssl: Update KTLS patch
Reported by: jhb
Differential Revision: https://reviews.freebsd.org/D34136
b4beeee |
Monday, 10 Jan 2022
|
23:19 Stefan Eßer (se)
security/openssl: add boringssl to CONFLICTS_INSTALL
Approved by: portmgr (implicit)
5600b79 |
15:15 Stefan Eßer (se)
Fix CONFLICTS entries of multiple ports
There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.
This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.
Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port
cannot conflict with itself (due to logic in bsd.port.mk that
supresses the pattern match result in that case).
A few ports that set the conflicts variables depending on complex
conditions (e.g. port options), have been left unmodified, despite
probably containing outdated package names.
These changes should only affect the installation of locally built
ports, not the package building with poudriere. They should give an
early indication of the install conflict in cases where currently
the pkg command aborts an installation when it detects that an
existing file would be overwritten,
Approved by: portmgr (implicit)
bcaf25a |
Monday, 20 Dec 2021
|
18:03 Bernard Spil (brnrd)
security/openssl: Fix build on aarch64
* Upstream only partly merged changes
PR: 259937, 260572
Reported by: allanjude, "Naram Qashat" <cyberbotx cyberbotx com>
f64391d |
Tuesday, 14 Dec 2021
|
19:13 Bernard Spil (brnrd)
security/openssl: Update to 1.1.1m
00935ff |
Tuesday, 23 Nov 2021
|
22:11 Stefan Eßer (se)
*/*: Remove redundant '-[0-9]*' from CONFLICTS_INSTALL
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").
Approved by: portmgr (blanket)
5933ac0 |
18:44 Bernard Spil (brnrd)
www/openssl: Fix detection of ARM CPU features
Upstream:
* https://github.com/openssl/openssl/pull/17082
* https://github.com/openssl/openssl/pull/17085
PR: 259937
Submitted by: allanjude
Differential Revision: https://reviews.freebsd.org/D33061
e2d67be |
Sunday, 29 Aug 2021
|
12:40 Bernard Spil (brnrd)
security/openssl: Auto-generate MAN3 plist
dcc0bde |
Tuesday, 24 Aug 2021
|
17:54 Bernard Spil (brnrd)
security/openssl: Security update to 1.1.1l
Security: 96811d4a-04ec-11ec-9b84-d4c9ef517024
MFH: 2021Q3
d3011e2 |
Thursday, 19 Aug 2021
|
14:01 Bernard Spil (brnrd)
security/openssl: Update KTLS patches for Chacha20-Poly1305
This pulls in several upstream KTLS patches from OpenSSL master:
* A fix to the return values of BIO_get_ktls_*().
* Support for Chacha20-Poly1305.
* Replacing the SSL_MODE_NO_KTLS_* modes which opted-out of KTLS with
an opt-in SSL_OP_ENABLE_KTLS. Note that this means that KTLS is not
enabled by default. Users can enable KTLS via a custom OpenSSL config
file that enables the KTLS option.
Reported by: jhb
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D31430
214d585 |
Tuesday, 6 Apr 2021
|
14:31 Mathieu Arnold (mat)
Remove # $FreeBSD$ from Makefiles.
305f148 |
10:45 Bernard Spil (brnrd)
security/openssl: Fix /dev/crypto issue with 1.1.1k
PR: 254643
Reported by: <cryx-freebsd h3q com>
Reviewed by: wollman
64d9416 |
Friday, 26 Mar 2021
|
08:13 brnrd
security/openssl: Security update to 1.1.1k
PR: 254551
Submitted by: Pascal Christen <pascal christen hostpoint ch>
MFH: 2021Q1
Security: 5a668ab3-8d86-11eb-b8d6-d4c9ef517024
|
Sunday, 7 Mar 2021
|
16:45 tobik
Remove redundant option descriptions that match the default ones
(ignoring case)
Reported by: danfe (for net/mosquitto), portscan
|
Thursday, 18 Feb 2021
|
09:22 brnrd
security/openssl: Update KTLS patch
PR: 251969
Submitted by: gonzo, jhb
Obtained
from: https://github.com/openssl/openssl/commit/dfcfd17f2818cf520ce6381aed9ec3d2fc12170d
Differential Revision: https://reviews.freebsd.org/D28763
|
Wednesday, 17 Feb 2021
|
13:57 brnrd
security/openssl: Security update to 1.1.1j
PR: 253561
Reported by: Michael Glaus <michael glaus hostpoint ch>
MFH: 2021Q1
Security: 96a21236-707b-11eb-96d8-d4c9ef517024
|
Sunday, 31 Jan 2021
|
17:35 brnrd
security/openssl: Update KTLS patch
Differential Revision: https://reviews.freebsd.org/D27423
|
Tuesday, 8 Dec 2020
|
16:26 brnrd
security/vuxml: Security update to 1.1.1i
MFH: 2020Q4
Security: 1d56cfc5-3970-11eb-929d-d4c9ef517024
|
Monday, 5 Oct 2020
|
20:07 jhb
Expand support for TLS protocols supported by KTLS.
Backport additional patches merged into OpenSSL's master
branch to support KTLS RX for TLS 1.1 and 1.2 as well as
support for KTLS TX for TLS 1.3.
Reviewed by: brnrd (maintainer)
Sponsored by: Chelsio Communications, Netflix
Differential Revision: https://reviews.freebsd.org/D26261
|
Wednesday, 23 Sep 2020
|
19:55 brnrd
security/openssl: Update to 1.1.1g
|
Saturday, 23 May 2020
|
19:35 brnrd
security/openssl: Add kernel TLS option
Submitted by: jhb@freebsd.org
Differential Revision: https://reviews.freebsd.org/D24274
|
Monday, 27 Apr 2020
|
13:10 brnrd
security/openssl-devel: Resurrect OpenSSL devel port
|
Wednesday, 22 Apr 2020
|
09:35 brnrd
security/openssl: Security update to 1.1.1g
PR: 245795
Reported by: Dani <i dani at outlook com>
MFH: 2020Q2
Security: 012809ce-83f3-11ea-92ab-00163e433440
|
Tuesday, 31 Mar 2020
|
14:37 brnrd
security/openssl: Bug-fix update to 1.1.1f
PR: 245154
MFH: 2020Q1
|
Sunday, 29 Mar 2020
|
16:00 brnrd
security/openssl: Fix EOF bug
See https://github.com/openssl/openssl/pull/11400
PR: 245154
Reported by: koobs
MFH: 2020Q1
|
Friday, 20 Mar 2020
|
20:05 brnrd
security/openssl: Add missing description
Reported by: adamw
|
Tuesday, 17 Mar 2020
|
20:02 brnrd
security/openssl: Update to 1.1.1e
- SM2/SM3 not a cipher [1]
- Add weak-ciphers option [2]
PR: 237056 [1]
Reported by: dewayne heuristicsystems com.au> [1], mat [2]
|
Friday, 3 Jan 2020
|
12:19 brnrd
security/openssl: Remove self-conflict
PR: 243049
Submitted by: Franco Fichtner
MFH: 2020Q1
|
Wednesday, 1 Jan 2020
|
16:42 brnrd
security/openssl111: Rename to openssl
- Honoring promise from DEPRECATED message
- Unbreak people's builds
PR: 243014
MFH: 2020Q1
|
Friday, 20 Dec 2019
|
15:06 brnrd
security/openssl: Security update to 1.0.2u
MFH: 2019Q4
Security: d778ddb0-2338-11ea-a1c7-b499baebfeaf
|
Sunday, 27 Oct 2019
|
11:19 brnrd
security/openssl: Notify users of upcoming 1.1.1
|
Wednesday, 11 Sep 2019
|
20:04 brnrd
security/openssl: Security update to 1.0.2t
MFH: 2019Q3
Security: 9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf
|
Tuesday, 28 May 2019
|
20:22 brnrd
security/openssl: Security hardening update to 1.0.2s
MFH: 2019Q2
|
Wednesday, 27 Feb 2019
|
08:06 brnrd
security/openssl: Security update to 1.0.2r
MFH: 2019Q1
Security: 7700061f-34f7-11e9-b95c-b499baebfeaf
|
Sunday, 17 Feb 2019
|
19:09 brnrd
security/openssl: Fix build with lld on i386
PR: 231459
Submitted by: Nathan <ndowens@yahoo.com>
Reported by: emaste
|
Tuesday, 20 Nov 2018
|
17:53 brnrd
security/openssl: Update to 1.0.2q
|
Monday, 12 Nov 2018
|
20:19 brnrd
security/openssl: Security update for CVE-2018-5407
MFH: 2018Q4
Security: 6f170cf2-e6b7-11e8-a9a8-b499baebfeaf
|
Wednesday, 12 Sep 2018
|
11:36 brnrd
Chase CONFLICTS after addition of security/openssl111
- While here mark OpenSSL 1.1.0 deprecated
see: https://www.openssl.org/policies/releasestrat.html
|
Wednesday, 29 Aug 2018
|
16:03 brnrd
security/openssl: Fix padlock patches url prefix
|
Tuesday, 14 Aug 2018
|
15:12 joneum
Fix PORTREVISION
|
15:04 brnrd
security/openssl: Add engines patches to distinfo
- Undo clobbering distinfo
Reported by: mat
|
14:12 brnrd
security/openssl: Update to 1.0.2p
- Includes vulnerability fixes that were already
added to the port as patches
|
Wednesday, 1 Aug 2018
|
16:33 adamw
Fix a common grammar error: "can not" means the opposite of "cannot."
"Can not" means "it is possible not to," and "cannot" means "it is impossible
to."
|
Wednesday, 11 Jul 2018
|
08:37 amdmi3
- Switch to new test framework
Approved by: portmgr blanket
|
Tuesday, 12 Jun 2018
|
13:43 brnrd
security/openssl: Actually add patch file
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf
|
13:17 brnrd
security/openssl: Security update
- Upstream update for CVE-2018-0732
MFH: 2018Q2
Security: c82ecac5-6e3f-11e8-8777-b499baebfeaf
|
Monday, 16 Apr 2018
|
17:47 brnrd
security/openssl: Add CVE-2018-0737 patch
- Bump portrev too
MFH: 2018Q2
Security: 8f353420-4197-11e8-8777-b499baebfeaf
|
17:24 brnrd
security/openssl: Security update
MFH: 2018Q2
Security: 8f353420-4197-11e8-8777-b499baebfeaf
|
Tuesday, 27 Mar 2018
|
14:53 brnrd
securit/openssl: Security update to 1.0.2o
MFH: 2018Q1
Security: b7cff5a9-31cc-11e8-8f07-b499baebfeaf
|
Saturday, 10 Mar 2018
|
10:53 brnrd
security/openssl: Cleanup
- Remove EXPCIPHERS option (use security/openssl-unsafe) [1]
- Move port variables not dependent on bsd.port.pre.mk up
- Deleting man3 .pod files is redundant
- bss_dgram.c modification is a no-op
- Let openssl's Makefile install libs
- Simplify stripping
PR: 195270 [1]
|
Thursday, 7 Dec 2017
|
15:48 brnrd
security/openssl: Update to 1.0.2m
- Remove patch now included upstream
- Include post-release patch for clang build error
MFH: 2017Q4
Security: 3bb451fc-db64-11e7-ac58-b499baebfeaf
|
Thursday, 2 Nov 2017
|
21:32 brnrd
security/openssl: Security update to 1.0.2m
- Adds additional manpages too
MFH: 2017Q4
Security: f40f07aa-c00f-11e7-ac58-b499baebfeaf
|
Saturday, 19 Aug 2017
|
15:11 brnrd
security/openssl: Fix build on MIPS
- gcc 4.2.1 on MIPS fails on -Werror
PR: 221620
Submitted by: Fukang Chen <loader@FreeBSD.org>
MFH: 2017Q3
|
Monday, 24 Jul 2017
|
17:51 brnrd
security/openssl: Fix MASTER_SITE_SUBDIR
- DISTVERSIONFULL is not expanded before assignment
PR: 219929
Submitted by: Fukang Chen <loader@FreeBSD.org>
|
Sunday, 25 Jun 2017
|
00:29 linimon
Begin deorbit burn of ia64. We have not attempted to build packages for
it for many years.
While here, alphabetize ARCHs, pet portlint, and modernize usages.
Approved by: portmgr (tier-2 blanket)
|
Thursday, 25 May 2017
|
18:53 brnrd
security/openssl: Update to 1.0.2l
- Bugfix update to 1.0.2l
- Fix PADLOCK option
- Build failure -Wunused-function
- Properly disable with configure
- Strip patch-version from DIST_SUBDIR, reduce dirs
- Remove unneeded testssl patch, dtls tests are OK
- Add new WITHOUT_SSL3 testssl extra-patch
- Remove md5 patch (inconsistent output)
- Remove openbsd_hw.c patch (not compiled)
- Remove srtp patch (upstream fixed)
- Fix plist
|
Wednesday, 8 Feb 2017
|
20:16 brnrd
security/openssl: Enable ASM by default
- Enable ASM option
* By extension this enables AES-NI [1]
- Order OPTIONS_DEFAULT alphabetically
- Switch to using @sample [2]
- Bump PORTREVISION
PR: 216559 [2]
Reported by: dtestke [1]
Submitted by: Franco Fichtner <franco@opnsense.org> [2]
Approved by: asomers, allanjude
|
Thursday, 26 Jan 2017
|
14:26 brnrd
security/openssl: Update to 1.0.2k
MFH: 2017Q1
Security: CVE-2016-7055
Security: CVE-2017-3731
Security: CVE-2017-3732
|
Friday, 28 Oct 2016
|
20:05 brnrd
security/openssl: Bump PORTREVISION
- Make sure ports get rebuilt
PR: 209582
Reported by: mat
|
Friday, 21 Oct 2016
|
12:51 mat
${RM} already has -f.
PR: 213570
Submitted by: mat
Exp-run by: antoine
Sponsored by: Absolight
|
Thursday, 6 Oct 2016
|
19:38 brnrd
security/openssl: Fix ldconfig issue
- OPT_USE= feature does not behave as expected
Reported by: dinoex
Differential Revision: D8166
|
Tuesday, 4 Oct 2016
|
18:35 brnrd
security/openssl: Mark MAKE_JOBS_UNSAFE
- Revert removal of MAKE_JOBS_UNSAFE in r423112
Reported by: D. Randolph
|
Sunday, 2 Oct 2016
|
11:51 brnrd
security/openssl: Modernize port
- Group options
- Migrate to <OPT>_CONFIGURE helpers
- Use CONFIGURE_ARGS not EXTRACONFIGURE
- Remove make-jobs unsafe (introduced 2009 / 0.9.8)
- Remove base SHLIBVER_BASE check (introduced 2006)
- Revert to default CPE_VERSION
- Rework MAN3 option
- Fix plist when SHARED disabled
Reviewed by: mat
Differential Revision: D8025
|
Monday, 26 Sep 2016
|
13:47 brnrd
security/openssl: Update to 1.0.2j
- Update to 1.0.2j
- Fixes Missing CRL sanity check (CVE-2016-7052)
Security: 337d8-83ed-11e6-bf52-b499baebfeaf
|
Saturday, 24 Sep 2016
|
20:23 brnrd
security/openssl: Take maintainership
|
13:15 marino
devel/openssl: change CONFLICTS to CONFLICTS_INSTALL
THere's no problem building openssl with other ports SSL libraries
installed, the conflict comes when it's time to install it.
|
06:43 dinoex
- add option ASM for OPNsense
- drop MAINTAINERSHIP caused of version naming change
|
Friday, 23 Sep 2016
|
12:54 brnrd
security/openssl: Update to 1.0.2i
- Update to 1.0.2i
- Move from PORTREVISION to PORTVERSION updates
- Remove patches that are included upstream
Reviewed by: mat, delphij
MFH: 2016Q3
Sponsored by: EuroBSDcon 2016 DevSummit
Differential Revision: D8006
|
Thursday, 15 Sep 2016
|
22:05 mat
ftp.openssl.org is being taken out.
https://mta.openssl.org/pipermail/openssl-announce/2016-September/000075.html
Sponsored by: Absolight
|
Monday, 12 Sep 2016
|
18:10 dinoex
- unroll for loop
Submitted by: John Marino
|
Sunday, 28 Aug 2016
|
16:19 dinoex
- remove options ASM and GMP
|
Saturday, 27 Aug 2016
|
11:00 mat
Revert the OpenSSL 1.1.0 update, it was not tested.
With hat: portmgr
Sponsored by: Absolight
|
Number of commits found: 320 (showing only 100 on this page) |