From owner-freebsd-ports@freebsd.org Fri Jan 5 02:11:15 2018 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A4B0FEA6BBD for ; Fri, 5 Jan 2018 02:11:15 +0000 (UTC) (envelope-from mjl@luckie.org.nz) Received: from warlock.wand.net.nz (warlock.cms.waikato.ac.nz [IPv6:2001:df0:4:4000::250:15]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 685186DBB9 for ; Fri, 5 Jan 2018 02:11:15 +0000 (UTC) (envelope-from mjl@luckie.org.nz) Received: from [130.217.250.39] (helo=sorcerer.cms.waikato.ac.nz) by warlock.wand.net.nz with esmtps (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1eXHTN-000259-Gm for freebsd-ports@freebsd.org; Fri, 05 Jan 2018 15:11:10 +1300 Received: from sorcerer.cms.waikato.ac.nz (localhost [127.0.0.1]) by sorcerer.cms.waikato.ac.nz (Postfix) with ESMTP id 2F1B712C07BB for ; Fri, 5 Jan 2018 15:11:04 +1300 (NZDT) To: freebsd-ports@freebsd.org From: Matthew Luckie Subject: using security/openssl in a port Message-ID: Date: Fri, 5 Jan 2018 15:11:00 +1300 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="GimnVIkOmE1j49buWSr1mcaSNnhafzEtu" Received-SPF: none client-ip=130.217.250.39; envelope-from=mjl@luckie.org.nz; helo=sorcerer.cms.waikato.ac.nz X-Spam-Scanned-By: warlock.wand.net.nz (b3fa4d753a68042b5812afd2cc8dea25af2bb214) X-Spam-Score: -1.0 (-) X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 05 Jan 2018 02:11:15 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --GimnVIkOmE1j49buWSr1mcaSNnhafzEtu Content-Type: multipart/mixed; boundary="d1vjduNpgqz94vIUFKkKVCr8P8R24SzzC"; protected-headers="v1" From: Matthew Luckie To: freebsd-ports@freebsd.org Message-ID: Subject: using security/openssl in a port --d1vjduNpgqz94vIUFKkKVCr8P8R24SzzC Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable Hi, I maintain a port that has a new release which requires openssl 1.0.2 to build. FreeBSD 10.3 and 10.4 both have openssl 1.0.1, and 11 onwards have 1.0.2. Is there a magic way to have this port depend on ports openssl for freebsd releases without openssl 1.0.2? I ran find /usr/ports -exec grep "security/openssl" {} \; -print and didn't find anything that I could use as a recipe. USES =3D ssl doesn't seem to be it either. Matthew --d1vjduNpgqz94vIUFKkKVCr8P8R24SzzC-- --GimnVIkOmE1j49buWSr1mcaSNnhafzEtu Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHAEARECADAWIQTXPLTkr00GLuDVs20rK4MpIRAAYAUCWk7euBIcbWpsQGx1Y2tp ZS5vcmcubnoACgkQKyuDKSEQAGBY0ACeJfZIu+FQToptIi+s3jLS/guyqFwAoMzN dPHoyftecHZYuWp4BGAIRtQ1 =Srt5 -----END PGP SIGNATURE----- --GimnVIkOmE1j49buWSr1mcaSNnhafzEtu--