From owner-svn-ports-head@freebsd.org Thu Jul 9 20:54:38 2015 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 75F44997242; Thu, 9 Jul 2015 20:54:38 +0000 (UTC) (envelope-from dinoex@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 59BA410B1; Thu, 9 Jul 2015 20:54:38 +0000 (UTC) (envelope-from dinoex@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.70]) by repo.freebsd.org (8.14.9/8.14.9) with ESMTP id t69KsctS080854; Thu, 9 Jul 2015 20:54:38 GMT (envelope-from dinoex@FreeBSD.org) Received: (from dinoex@localhost) by repo.freebsd.org (8.14.9/8.14.9/Submit) id t69KsbFh080849; Thu, 9 Jul 2015 20:54:37 GMT (envelope-from dinoex@FreeBSD.org) Message-Id: <201507092054.t69KsbFh080849@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: dinoex set sender to dinoex@FreeBSD.org using -f From: Dirk Meyer Date: Thu, 9 Jul 2015 20:54:37 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r391681 - in head/security/openssl: . files X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2015 20:54:38 -0000 Author: dinoex Date: Thu Jul 9 20:54:36 2015 New Revision: 391681 URL: https://svnweb.freebsd.org/changeset/ports/391681 Log: - Security update to 1.0.2d Security: http://openssl.org/news/secadv_20150709.txt Added: head/security/openssl/files/patch-testssl (contents, props changed) Deleted: head/security/openssl/files/patch-SSL_CTX_use_serverinfo.pod Modified: head/security/openssl/Makefile head/security/openssl/distinfo Modified: head/security/openssl/Makefile ============================================================================== --- head/security/openssl/Makefile Thu Jul 9 19:44:33 2015 (r391680) +++ head/security/openssl/Makefile Thu Jul 9 20:54:36 2015 (r391681) @@ -3,8 +3,8 @@ PORTNAME= openssl PORTVERSION= 1.0.2 -DISTVERSIONSUFFIX= c -PORTREVISION= 3 +DISTVERSIONSUFFIX= d +PORTREVISION= 4 CATEGORIES= security devel MASTER_SITES= http://www.openssl.org/source/ \ ftp://ftp.openssl.org/source/ \ Modified: head/security/openssl/distinfo ============================================================================== --- head/security/openssl/distinfo Thu Jul 9 19:44:33 2015 (r391680) +++ head/security/openssl/distinfo Thu Jul 9 20:54:36 2015 (r391681) @@ -1,10 +1,10 @@ -SHA256 (openssl-1.0.2c/openssl-1.0.2c.tar.gz) = 0038ba37f35a6367c58f17a7a7f687953ef8ce4f9684bbdec63e62515ed36a83 -SIZE (openssl-1.0.2c/openssl-1.0.2c.tar.gz) = 5280670 -SHA256 (openssl-1.0.2c/1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 2eddcb7ab342285cb637ce6b6be143cca835f449f35dd9bb8c7b9167ba2117a7 -SIZE (openssl-1.0.2c/1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3717 -SHA256 (openssl-1.0.2c/1002-backport-changes-from-upstream-padlock-module.patch) = aee88a24622ce9d71e38deeb874e58435dcf8ff5690f56194f0e4a00fb09b260 -SIZE (openssl-1.0.2c/1002-backport-changes-from-upstream-padlock-module.patch) = 5770 -SHA256 (openssl-1.0.2c/1003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = c10b8aaf56a4f4f79ca195fc587e0bb533f643e777d7a3e6fb0350399a6060ea -SIZE (openssl-1.0.2c/1003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20935 -SHA256 (openssl-1.0.2c/1004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 2f7c850af078a3ae71b2dd38d5d0b3964ea4262e52673e36ff33498cc6223e6c -SIZE (openssl-1.0.2c/1004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 809 +SHA256 (openssl-1.0.2d/openssl-1.0.2d.tar.gz) = 671c36487785628a703374c652ad2cebea45fa920ae5681515df25d9f2c9a8c8 +SIZE (openssl-1.0.2d/openssl-1.0.2d.tar.gz) = 5295447 +SHA256 (openssl-1.0.2d/1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 2eddcb7ab342285cb637ce6b6be143cca835f449f35dd9bb8c7b9167ba2117a7 +SIZE (openssl-1.0.2d/1001-crypto-hmac-support-EVP_MD_CTX_FLAG_ONESHOT-and-set-.patch) = 3717 +SHA256 (openssl-1.0.2d/1002-backport-changes-from-upstream-padlock-module.patch) = aee88a24622ce9d71e38deeb874e58435dcf8ff5690f56194f0e4a00fb09b260 +SIZE (openssl-1.0.2d/1002-backport-changes-from-upstream-padlock-module.patch) = 5770 +SHA256 (openssl-1.0.2d/1003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = c10b8aaf56a4f4f79ca195fc587e0bb533f643e777d7a3e6fb0350399a6060ea +SIZE (openssl-1.0.2d/1003-engines-e_padlock-implement-sha1-sha224-sha256-accel.patch) = 20935 +SHA256 (openssl-1.0.2d/1004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 2f7c850af078a3ae71b2dd38d5d0b3964ea4262e52673e36ff33498cc6223e6c +SIZE (openssl-1.0.2d/1004-crypto-engine-autoload-padlock-dynamic-engine.patch) = 809 Added: head/security/openssl/files/patch-testssl ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/openssl/files/patch-testssl Thu Jul 9 20:54:36 2015 (r391681) @@ -0,0 +1,39 @@ +--- test/testssl.orig 2015-06-11 15:50:11.000000000 +0200 ++++ test/testssl 2015-06-12 13:43:32.000000000 +0200 +@@ -102,28 +102,28 @@ + $ssltest $extra || exit 1 + + echo test dtlsv1 +-$ssltest -dtls1 $extra || exit 1 ++#$ssltest -dtls1 $extra || exit 1 + + echo test dtlsv1 with server authentication +-$ssltest -dtls1 -server_auth $CA $extra || exit 1 ++#$ssltest -dtls1 -server_auth $CA $extra || exit 1 + + echo test dtlsv1 with client authentication +-$ssltest -dtls1 -client_auth $CA $extra || exit 1 ++#$ssltest -dtls1 -client_auth $CA $extra || exit 1 + + echo test dtlsv1 with both client and server authentication +-$ssltest -dtls1 -server_auth -client_auth $CA $extra || exit 1 ++#$ssltest -dtls1 -server_auth -client_auth $CA $extra || exit 1 + + echo test dtlsv1.2 +-$ssltest -dtls12 $extra || exit 1 ++#$ssltest -dtls12 $extra || exit 1 + + echo test dtlsv1.2 with server authentication +-$ssltest -dtls12 -server_auth $CA $extra || exit 1 ++#$ssltest -dtls12 -server_auth $CA $extra || exit 1 + + echo test dtlsv1.2 with client authentication +-$ssltest -dtls12 -client_auth $CA $extra || exit 1 ++#$ssltest -dtls12 -client_auth $CA $extra || exit 1 + + echo test dtlsv1.2 with both client and server authentication +-$ssltest -dtls12 -server_auth -client_auth $CA $extra || exit 1 ++#$ssltest -dtls12 -server_auth -client_auth $CA $extra || exit 1 + + if [ $dsa_cert = NO ]; then + echo 'test sslv2/sslv3 w/o (EC)DHE via BIO pair'