svn commit: r391681 - in head/security/openssl: . files
Dirk Meyer
dinoex at FreeBSD.org
Thu Jul 9 20:54:38 UTC 2015
Author: dinoex
Date: Thu Jul 9 20:54:36 2015
New Revision: 391681
URL: https://svnweb.freebsd.org/changeset/ports/391681
Log:
- Security update to 1.0.2d
Security: http://openssl.org/news/secadv_20150709.txt
Added:
head/security/openssl/files/patch-testssl (contents, props changed)
Deleted:
head/security/openssl/files/patch-SSL_CTX_use_serverinfo.pod
Modified:
head/security/openssl/Makefile
head/security/openssl/distinfo
Modified: head/security/openssl/Makefile
==============================================================================
--- head/security/openssl/Makefile Thu Jul 9 19:44:33 2015 (r391680)
+++ head/security/openssl/Makefile Thu Jul 9 20:54:36 2015 (r391681)
@@ -3,8 +3,8 @@
PORTNAME= openssl
PORTVERSION= 1.0.2
-DISTVERSIONSUFFIX= c
-PORTREVISION= 3
+DISTVERSIONSUFFIX= d
+PORTREVISION= 4
CATEGORIES= security devel
MASTER_SITES= http://www.openssl.org/source/ \
ftp://ftp.openssl.org/source/ \
Modified: head/security/openssl/distinfo
==============================================================================
--- head/security/openssl/distinfo Thu Jul 9 19:44:33 2015 (r391680)
+++ head/security/openssl/distinfo Thu Jul 9 20:54:36 2015 (r391681)
@@ -1,10 +1,10 @@
-SHA256 (openssl-1.0.2c/openssl-1.0.2c.tar.gz) = 0038ba37f35a6367c58f17a7a7f687953ef8ce4f9684bbdec63e62515ed36a83
-SIZE (openssl-1.0.2c/openssl-1.0.2c.tar.gz) = 5280670
-SHA256 (openssl-1.0.2c/1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 2eddcb7ab342285cb637ce6b6be143cca835f449f35dd9bb8c7b9167ba2117a7
-SIZE (openssl-1.0.2c/1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3717
-SHA256 (openssl-1.0.2c/1002-backport-changes-from-upstream-padlock-module.patch) = aee88a24622ce9d71e38deeb874e58435dcf8ff5690f56194f0e4a00fb09b260
-SIZE (openssl-1.0.2c/1002-backport-changes-from-upstream-padlock-module.patch) = 5770
-SHA256 (openssl-1.0.2c/1003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = c10b8aaf56a4f4f79ca195fc587e0bb533f643e777d7a3e6fb0350399a6060ea
-SIZE (openssl-1.0.2c/1003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20935
-SHA256 (openssl-1.0.2c/1004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 2f7c850af078a3ae71b2dd38d5d0b3964ea4262e52673e36ff33498cc6223e6c
-SIZE (openssl-1.0.2c/1004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 809
+SHA256 (openssl-1.0.2d/openssl-1.0.2d.tar.gz) = 671c36487785628a703374c652ad2cebea45fa920ae5681515df25d9f2c9a8c8
+SIZE (openssl-1.0.2d/openssl-1.0.2d.tar.gz) = 5295447
+SHA256 (openssl-1.0.2d/1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 2eddcb7ab342285cb637ce6b6be143cca835f449f35dd9bb8c7b9167ba2117a7
+SIZE (openssl-1.0.2d/1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3717
+SHA256 (openssl-1.0.2d/1002-backport-changes-from-upstream-padlock-module.patch) = aee88a24622ce9d71e38deeb874e58435dcf8ff5690f56194f0e4a00fb09b260
+SIZE (openssl-1.0.2d/1002-backport-changes-from-upstream-padlock-module.patch) = 5770
+SHA256 (openssl-1.0.2d/1003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = c10b8aaf56a4f4f79ca195fc587e0bb533f643e777d7a3e6fb0350399a6060ea
+SIZE (openssl-1.0.2d/1003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20935
+SHA256 (openssl-1.0.2d/1004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 2f7c850af078a3ae71b2dd38d5d0b3964ea4262e52673e36ff33498cc6223e6c
+SIZE (openssl-1.0.2d/1004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 809
Added: head/security/openssl/files/patch-testssl
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/security/openssl/files/patch-testssl Thu Jul 9 20:54:36 2015 (r391681)
@@ -0,0 +1,39 @@
+--- test/testssl.orig 2015-06-11 15:50:11.000000000 +0200
++++ test/testssl 2015-06-12 13:43:32.000000000 +0200
+@@ -102,28 +102,28 @@
+ $ssltest $extra || exit 1
+
+ echo test dtlsv1
+-$ssltest -dtls1 $extra || exit 1
++#$ssltest -dtls1 $extra || exit 1
+
+ echo test dtlsv1 with server authentication
+-$ssltest -dtls1 -server_auth $CA $extra || exit 1
++#$ssltest -dtls1 -server_auth $CA $extra || exit 1
+
+ echo test dtlsv1 with client authentication
+-$ssltest -dtls1 -client_auth $CA $extra || exit 1
++#$ssltest -dtls1 -client_auth $CA $extra || exit 1
+
+ echo test dtlsv1 with both client and server authentication
+-$ssltest -dtls1 -server_auth -client_auth $CA $extra || exit 1
++#$ssltest -dtls1 -server_auth -client_auth $CA $extra || exit 1
+
+ echo test dtlsv1.2
+-$ssltest -dtls12 $extra || exit 1
++#$ssltest -dtls12 $extra || exit 1
+
+ echo test dtlsv1.2 with server authentication
+-$ssltest -dtls12 -server_auth $CA $extra || exit 1
++#$ssltest -dtls12 -server_auth $CA $extra || exit 1
+
+ echo test dtlsv1.2 with client authentication
+-$ssltest -dtls12 -client_auth $CA $extra || exit 1
++#$ssltest -dtls12 -client_auth $CA $extra || exit 1
+
+ echo test dtlsv1.2 with both client and server authentication
+-$ssltest -dtls12 -server_auth -client_auth $CA $extra || exit 1
++#$ssltest -dtls12 -server_auth -client_auth $CA $extra || exit 1
+
+ if [ $dsa_cert = NO ]; then
+ echo 'test sslv2/sslv3 w/o (EC)DHE via BIO pair'
More information about the svn-ports-all
mailing list