Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
5.7.6_1 12 Jan 2025 09:03:23
![commit hash: aee3a0f6c74eb14fd68dcb4f9525c7c99cda4db0 commit hash: aee3a0f6c74eb14fd68dcb4f9525c7c99cda4db0](/images/git.png) ![commit hash: aee3a0f6c74eb14fd68dcb4f9525c7c99cda4db0 commit hash: aee3a0f6c74eb14fd68dcb4f9525c7c99cda4db0](/images/codeberg.svg) ![commit hash: aee3a0f6c74eb14fd68dcb4f9525c7c99cda4db0 commit hash: aee3a0f6c74eb14fd68dcb4f9525c7c99cda4db0](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Fix arm64 build.
- Pull in upstream patch https://github.com/wolfSSL/wolfssl/pull/8348
- Bump PORTREVISION |
5.7.6 09 Jan 2025 15:14:30
![commit hash: ef5c2fd766bd184908969b0119d15cdeba54423f commit hash: ef5c2fd766bd184908969b0119d15cdeba54423f](/images/git.png) ![commit hash: ef5c2fd766bd184908969b0119d15cdeba54423f commit hash: ef5c2fd766bd184908969b0119d15cdeba54423f](/images/codeberg.svg) ![commit hash: ef5c2fd766bd184908969b0119d15cdeba54423f commit hash: ef5c2fd766bd184908969b0119d15cdeba54423f](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Fix arm64 build. |
5.7.6 02 Jan 2025 12:35:32
![commit hash: 7e91948bf2b329302fd9dde079352dbaef705cc4 commit hash: 7e91948bf2b329302fd9dde079352dbaef705cc4](/images/git.png) ![commit hash: 7e91948bf2b329302fd9dde079352dbaef705cc4 commit hash: 7e91948bf2b329302fd9dde079352dbaef705cc4](/images/codeberg.svg) ![commit hash: 7e91948bf2b329302fd9dde079352dbaef705cc4 commit hash: 7e91948bf2b329302fd9dde079352dbaef705cc4](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to 5.7.6
Changes since 5.7.4:
wolfSSL Release 5.7.6 (Dec 31, 2024)
To download the release bundle of wolfSSL visit the download page at
www.wolfssl.com/download/
NOTE:
* --enable-heapmath is deprecated.
* In this release, the default cipher suite preference is updated to
prioritize TLS_AES_256_GCM_SHA384 over TLS_AES_128_GCM_SHA256 when
enabled. (Only the first 15 lines of the commit message are shown above ) |
5.7.4_1 02 Nov 2024 03:10:37
![commit hash: 5d788b406715ef4b843669684e5dfbe84317788b commit hash: 5d788b406715ef4b843669684e5dfbe84317788b](/images/git.png) ![commit hash: 5d788b406715ef4b843669684e5dfbe84317788b commit hash: 5d788b406715ef4b843669684e5dfbe84317788b](/images/codeberg.svg) ![commit hash: 5d788b406715ef4b843669684e5dfbe84317788b commit hash: 5d788b406715ef4b843669684e5dfbe84317788b](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Enable additional build options.
Enable option for storing user-defined data in TLS API
PR: 282430
Reported by: Matthias Andree <mandree@FreeBSD.org> |
5.7.4 28 Oct 2024 22:41:44
![commit hash: f4a07165f882cff41521c6ce701d97dcbd9bff80 commit hash: f4a07165f882cff41521c6ce701d97dcbd9bff80](/images/git.png) ![commit hash: f4a07165f882cff41521c6ce701d97dcbd9bff80 commit hash: f4a07165f882cff41521c6ce701d97dcbd9bff80](/images/codeberg.svg) ![commit hash: f4a07165f882cff41521c6ce701d97dcbd9bff80 commit hash: f4a07165f882cff41521c6ce701d97dcbd9bff80](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to 5.7.4
Changes since 5.7.2:
wolfSSL Release 5.7.4 (Oct 24, 2024)
Release 5.7.4 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * --enable-heapmath is being deprecated and will be removed by end of 2024
PR stands for Pull Request, and PR <NUMBER> references a GitHub pull request
number where the code change was added.
(Only the first 15 lines of the commit message are shown above ) |
5.7.2 04 Aug 2024 14:40:15
![commit hash: 496fc69ac5059a4c24d6bf0b9fa5e87f7ef94a50 commit hash: 496fc69ac5059a4c24d6bf0b9fa5e87f7ef94a50](/images/git.png) ![commit hash: 496fc69ac5059a4c24d6bf0b9fa5e87f7ef94a50 commit hash: 496fc69ac5059a4c24d6bf0b9fa5e87f7ef94a50](/images/codeberg.svg) ![commit hash: 496fc69ac5059a4c24d6bf0b9fa5e87f7ef94a50 commit hash: 496fc69ac5059a4c24d6bf0b9fa5e87f7ef94a50](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to 5.7.2
Changes since 5.7.0:
wolfSSL Release 5.7.2 (July 8, 2024)
NOTE: * --enable-heapmath is being deprecated and will be removed by end of
2024
Vulnerabilities
* [Medium] CVE-2024-1544
Potential ECDSA nonce side channel attack in versions of wolfSSL before 5.
6.6 with wc_ecc_sign_hash calls. Generating the ECDSA nonce k samples a
random number r and then truncates this randomness with a modular (Only the first 15 lines of the commit message are shown above ) |
5.7.0 24 Mar 2024 13:03:36
![commit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3e commit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3e](/images/git.png) ![commit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3e commit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3e](/images/codeberg.svg) ![commit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3e commit hash: 237d98d9c73ece6cddee0ab0b33cbfb1ac350b3e](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to 5.7.0
Changes since 5.6.6:
wolfSSL Release 5.7.0 (Mar 20, 2024)
NOTE: * --enable-heapmath is being deprecated and will be removed by end of
2024
NOTE: In future releases, --enable-des3 (which is disabled by default) will
be insufficient in itself to enable DES3 in TLS cipher suites. A new option,
--enable-des3-tls-suites, will need to be supplied in addition. This option
should only be used in backward compatibility scenarios, as it is inherently
insecure.
(Only the first 15 lines of the commit message are shown above ) |
5.6.6 25 Dec 2023 23:01:02
![commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507 commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507](/images/git.png) ![commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507 commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507](/images/codeberg.svg) ![commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507 commit hash: 9b9edb3eaebdaecd7e58da2271a46c4e077aa507](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to 5.6.6
Changes since 5.6.4:
wolfSSL Release 5.6.6 (Dec 19, 2023)
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
REMINDER: When working with AES Block Cipher algorithms, wc_AesInit() should
always be called first to initialize the Aes structure, before calling other Aes
API functions. Recently we found several places in our documentation, comments,
and codebase where this pattern was not observed. We have since fixed this
omission in several PRs for this release.
Vulnerabilities (Only the first 15 lines of the commit message are shown above ) |
5.6.4 19 Nov 2023 10:36:45
![commit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22f commit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22f](/images/git.png) ![commit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22f commit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22f](/images/codeberg.svg) ![commit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22f commit hash: 5693fdfa89b9468ce6ddf9bacbfda0bfbd54d22f](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.6.4
Changes since v5.6.3:
wolfSSL Release 5.6.4 (October 30, 2023)
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
* Old CyaSSL/CtaoCrypt shim layer was removed in this release (5.6.4)
Vulnerabilities
* [Medium] A fix was added, but still under review for completeness, for a
Bleichenbacher style attack, leading to being able to decrypt a saved TLS
connection and potentially forge a signature after probing with a large
number of trial connections. This issue is around RSA decryption and (Only the first 15 lines of the commit message are shown above ) |
5.6.3 02 Jul 2023 18:48:43
![commit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75c commit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75c](/images/git.png) ![commit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75c commit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75c](/images/codeberg.svg) ![commit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75c commit hash: ec896e47e8d91bd5e913d478e82fe6600ea3e75c](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Dima Panov (fluffy) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: fix packageing (+)
Unbreak packaging after 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c
===> Checking for items in STAGEDIR missing from pkg-plist
Error: Orphaned: lib/libwolfssl.so.35.5.1
===> Checking for items in pkg-plist which are not in STAGEDIR
Error: Missing: lib/libwolfssl.so.35.4.0
===> Error: Plist issues found.
Reported by: poudriere fallout
Approved by: portmgr blanket |
5.6.3 01 Jul 2023 17:07:46
![commit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c commit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c](/images/git.png) ![commit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c commit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c](/images/codeberg.svg) ![commit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c commit hash: 5638b5ef1ff5d825cda9432d97540fd1fe4caa8c](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.6.3
Changes since v5.6.0:
wolfSSL Release 5.6.3 (Jun 16, 2023)
Release 5.6.3 of wolfSSL embedded TLS has 4 bug fixes:
* Fix for setting the atomic macro options introduced in release 5.6.2. This
issue affects GNU gcc autoconf builds. The fix resolves a potential mismatch
of
the generated macros defined in options.h file and the macros used when the
wolfSSL library is compiled. In version 5.6.2 this mismatch could result in
unstable runtime behavior.
* Fix for invalid suffix error with Windows build using the macro
GCM_TABLE_4BIT. (Only the first 15 lines of the commit message are shown above ) |
5.6.0 26 Mar 2023 09:14:13
![commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004 commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004](/images/git.png) ![commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004 commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004](/images/codeberg.svg) ![commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004 commit hash: 2b488f7b2f970f0dcf56c9054d86f11d06470004](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.6.0
Changes since v5.5.4:
wolfSSL Release 5.6.0 (Mar 24, 2023)
Release 5.6.0 has been developed according to wolfSSL's development and QA
process (see link below) and successfully passed the quality
criteria.
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024 * This
release makes ASN Template the default with ./configure, the previous ASN
parsing can be built with --enable-asn=original
Release 5.6.0 of wolfSSL embedded TLS has bug fixes and new features including: (Only the first 15 lines of the commit message are shown above ) |
5.5.4 04 Feb 2023 15:44:24
![commit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9c commit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9c](/images/git.png) ![commit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9c commit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9c](/images/codeberg.svg) ![commit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9c commit hash: 2621a7fc635d4fbc955ec156fabbf26037f27a9c](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.5.4
Changes since v5.5.3:
wolfSSL Release 5.5.4 (Dec 21, 2022)
Release 5.5.4 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* QUIC related changes for HAProxy integration and config option
* Support for Analog Devices MAXQ1080 and MAXQ1065
* Testing and build of wolfSSL with NuttX
* New software based entropy gatherer with configure option
--enable-entropy-memuseOP (Only the first 15 lines of the commit message are shown above ) |
5.5.3 26 Nov 2022 21:08:47
![commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254 commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254](/images/git.png) ![commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254 commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254](/images/codeberg.svg) ![commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254 commit hash: 8f33b78f873a671f87b44cd1bec973d919f6e254](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update the description.
Update the supported TLS version in description.
PR: 267737
Reported by: Yonas Yanfa <yonas.yanfa@gmail.com> |
5.5.3 12 Nov 2022 05:55:40
![commit hash: e711537e2dc64236725736aceb40d72a4b6bc128 commit hash: e711537e2dc64236725736aceb40d72a4b6bc128](/images/git.png) ![commit hash: e711537e2dc64236725736aceb40d72a4b6bc128 commit hash: e711537e2dc64236725736aceb40d72a4b6bc128](/images/codeberg.svg) ![commit hash: e711537e2dc64236725736aceb40d72a4b6bc128 commit hash: e711537e2dc64236725736aceb40d72a4b6bc128](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.5.3
Changes since v5.5.1:
wolfSSL Release 5.5.3 (Nov 2, 2022)
Release 5.5.3 of wolfSSL embedded TLS has the following bug fix:
Fixes
* Fix for possible buffer zeroization overrun introduced at the end of v5.5.2
release cycle in GitHub pull request 5743
(https://github.com/wolfSSL/wolfssl/pull/5743) and fixed in pull request 5757
(https://github.com/wolfSSL/wolfssl/pull/5757). In the case where a specific
memory allocation failed or a hardware fault happened there was the potential (Only the first 15 lines of the commit message are shown above ) |
5.5.1 01 Oct 2022 11:55:13
![commit hash: 44b4edac350261df25ca4153ed01148a94051d90 commit hash: 44b4edac350261df25ca4153ed01148a94051d90](/images/git.png) ![commit hash: 44b4edac350261df25ca4153ed01148a94051d90 commit hash: 44b4edac350261df25ca4153ed01148a94051d90](/images/codeberg.svg) ![commit hash: 44b4edac350261df25ca4153ed01148a94051d90 commit hash: 44b4edac350261df25ca4153ed01148a94051d90](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.5.1
Changes since v5.5.0:
wolfSSL Release 5.5.1 (Sep 28, 2022) Latest
Vulnerabilities
* [Med] Denial of service attack and buffer overflow against TLS 1.3 servers
using session ticket resumption. When built with --enable-session-ticket and
making use of TLS 1.3 server code in wolfSSL, there is the possibility of a
malicious client to craft a malformed second ClientHello packet that causes
the server to crash. This issue is limited to when using both
--enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3
servers, and having --enable-session-ticket, should update to the latest
version of wolfSSL. Thanks to Max at Trail of Bits for the report and (Only the first 15 lines of the commit message are shown above ) |
07 Sep 2022 21:58:51
![commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4](/images/git.png) ![commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4](/images/codeberg.svg) ![commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4 commit hash: fb16dfecae4a6efac9f3a78e0b759fb7a3c53de4](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Stefan Eßer (se) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
5.5.0 07 Sep 2022 21:10:59
![commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52](/images/git.png) ![commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52](/images/codeberg.svg) ![commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52 commit hash: b7f05445c00f2625aa19b4154ebcbce5ed2daa52](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Stefan Eßer (se) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
5.5.0 04 Sep 2022 08:43:24
![commit hash: d915d5a4791539b1acb556c67489cacae3aae0af commit hash: d915d5a4791539b1acb556c67489cacae3aae0af](/images/git.png) ![commit hash: d915d5a4791539b1acb556c67489cacae3aae0af commit hash: d915d5a4791539b1acb556c67489cacae3aae0af](/images/codeberg.svg) ![commit hash: d915d5a4791539b1acb556c67489cacae3aae0af commit hash: d915d5a4791539b1acb556c67489cacae3aae0af](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.5.0
Changes since v5.4.0:
wolfSSL Release 5.5.0 (Aug 30, 2022)
Note:
** If not free’ing FP_ECC caches per thread by calling wc_ecc_fp_free there is
a
possible memory leak during TLS 1.3 handshakes which use ECC. Users are urged
to confirm they are free’ing FP_ECC caches per thread if enabled to avoid
this issue.
Release 5.5.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities (Only the first 15 lines of the commit message are shown above ) |
5.4.0 08 Aug 2022 08:07:52
![commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18 commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18](/images/git.png) ![commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18 commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18](/images/codeberg.svg) ![commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18 commit hash: 4850ea1e3ca82f63f94654cf1b9790ec476bbb18](/images/github.svg) ![files touched by this commit files touched by this commit](/images/logs.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.4.0
Changes since v5.3.0:
wolfSSL Release 5.4.0 (July 11, 2022)
Note:
** Future releases of wolfSSL will turn off TLS 1.1 by default
** Release 5.4.0 made SP math the default math implementation. To make an
equivalent build as –disable-fastmath from previous versions of wolfSSL,
now
requires using the configure option –enable-heapmath instead.
Release 5.4.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities (Only the first 15 lines of the commit message are shown above ) |
5.3.0 07 May 2022 11:43:03
![commit hash: 9819baefd0e561dd26087196faf9e477115f57b5 commit hash: 9819baefd0e561dd26087196faf9e477115f57b5](/images/git.png) ![commit hash: 9819baefd0e561dd26087196faf9e477115f57b5 commit hash: 9819baefd0e561dd26087196faf9e477115f57b5](/images/codeberg.svg) ![commit hash: 9819baefd0e561dd26087196faf9e477115f57b5 commit hash: 9819baefd0e561dd26087196faf9e477115f57b5](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.3.0
Changes since v5.2.0:
Release 5.3.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
Ports
* Updated support for Stunnel to version 5.61
* Add i.MX8 NXP SECO use for secure private ECC keys and expand
cryptodev-linux for use with the RSA/Curve25519 with the Linux CAAM driver
* Allow encrypt then mac with Apache port
* Update Renesas TSIP version to 1.15 on GR-ROSE and certificate signature
data for TSIP / SCE example (Only the first 15 lines of the commit message are shown above ) |
5.2.0 26 Feb 2022 06:58:42
![commit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb commit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb](/images/git.png) ![commit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb commit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb](/images/codeberg.svg) ![commit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb commit hash: ba4cf682d2070a74e78a093a250c5fdb2c4ce5fb](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.2.0
Changes since v5.1.1:
wolfSSL Release 5.2.0 (Feb 21, 2022)
Release 5.2.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [High] A TLS v1.3 server who requires mutual authentication can be
bypassed. If a malicious client does not send the certificate_verify message
a client can connect without presenting a certificate even if the server
requires one. Thank you to Aina Toky Rasoamanana and Olivier Levillain of
Télécom SudParis.
* [High] A TLS v1.3 client attempting to authenticate a TLS v1.3 server can (Only the first 15 lines of the commit message are shown above ) |
5.1.1 08 Jan 2022 09:57:16
![commit hash: 91258b1619a5516664f1c36d5440d73af6696316 commit hash: 91258b1619a5516664f1c36d5440d73af6696316](/images/git.png) ![commit hash: 91258b1619a5516664f1c36d5440d73af6696316 commit hash: 91258b1619a5516664f1c36d5440d73af6696316](/images/codeberg.svg) ![commit hash: 91258b1619a5516664f1c36d5440d73af6696316 commit hash: 91258b1619a5516664f1c36d5440d73af6696316](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.1.1
Changes since v5.1.0:
wolfSSL Release 5.1.1 (Jan 3rd, 2022)
Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:
Vulnerabilities
* [High] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV
being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing
TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the
version of wolfSSL used. |
5.1.0 30 Dec 2021 01:26:14
![commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89 commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89](/images/git.png) ![commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89 commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89](/images/codeberg.svg) ![commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89 commit hash: 677f4c2bf26ab6f81b00c68714b807b2faaf9c89](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.1.0
Changes since v5.0.0:
wolfSSL Release 5.1.0 (Dec 27, 2021)
Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Low] Potential for DoS attack on a wolfSSL client due to processing hello
packets of the incorrect side. This affects only connections using TLS v1.2
or less that have also been compromised by a man in the middle
attack. Thanks to James Henderson, Mathy Vanhoef, Chris M. Stone, Sam
L. Thomas, Nicolas Bailleut, and Tom Chothia (University of Birmingham, KU
Leuven, ENS Rennes for the report. (Only the first 15 lines of the commit message are shown above ) |
5.0.0 06 Nov 2021 04:57:38
![commit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0d commit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0d](/images/git.png) ![commit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0d commit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0d](/images/codeberg.svg) ![commit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0d commit hash: 71c26f55a13dc607c421cf1de326d079e5ee7b0d](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Update to v5.0.0
Changes since v4.8.1:
wolfSSL Release 5.0.0 (Nov 01, 2021)
Release 5.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [\Low] Hang with DSA signature creation when a specific q value is used in a
maliciously crafted key. If a DSA key with an invalid q value of either 1 or
0 was decoded and used for creating a signature, it would result in a hang
in wolfSSL. Users that are creating signatures with DSA and are using keys
supplied from an outside source are affected.
* [\Low] Issue with incorrectly validating a certificate that has multiple (Only the first 15 lines of the commit message are shown above ) |
4.8.1 10 Sep 2021 21:18:26
![commit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cb commit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cb](/images/git.png) ![commit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cb commit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cb](/images/codeberg.svg) ![commit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cb commit hash: 775375417c049d8148a3e6edbeee0c2d5a6615cb](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Bernhard Froehlich (decke) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Add CPE information
Approved by: portmgr (blanket) |
4.8.1 24 Jul 2021 04:49:39
![commit hash: e4b770114494f3d54409aef6bd23a3a2def34399 commit hash: e4b770114494f3d54409aef6bd23a3a2def34399](/images/git.png) ![commit hash: e4b770114494f3d54409aef6bd23a3a2def34399 commit hash: e4b770114494f3d54409aef6bd23a3a2def34399](/images/codeberg.svg) ![commit hash: e4b770114494f3d54409aef6bd23a3a2def34399 commit hash: e4b770114494f3d54409aef6bd23a3a2def34399](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Updates to v4.8.1
Changes since v4.8.0:
wolfSSL Release 4.8.1 (July 16, 2021)
Release 4.8.1 of wolfSSL embedded TLS has an OCSP vulnerability fix:
Vulnerabilities
* [High] OCSP verification issue when response is for a certificate with no
relation to the chain in question BUT that response contains the NoCheck
extension which effectively disables ALL verification of that one cert.
Users who should upgrade to 4.8.1 are TLS client users doing OCSP, TLS
server users doing mutual auth with OCSP, and CertManager users doing OCSP
independent of TLS. Thanks to Jan Nauber, Marco Smeets, Werner Rueschenbaum
and Alissa Kim of Volkswagen Infotainment for the report. |
4.8.0 15 Jul 2021 04:40:40
![commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3 commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3](/images/git.png) ![commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3 commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3](/images/codeberg.svg) ![commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3 commit hash: 711845c3350aee3b7cad8283fea81ec69531d8f3](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Santhosh Raju (fox) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Updates to v4.8.0
Changes since v4.7.0:
wolfSSL Release 4.8.0 (July 09, 2021)
Release 4.8.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities
* [Low] OCSP request/response verification issue. In the case that the serial
number in the OCSP request differs from the serial number in the OCSP
response the error from the comparison was not resulting in a failed
verification. We recommend users that have wolfSSL version 4.6.0 and 4.7.0
with OCSP enabled update their version of wolfSSL. Version 4.5.0 and earlier
are not affected by this report. Thanks to Rainer, Roee, Barak, Hila and (Only the first 15 lines of the commit message are shown above ) |
4.7.0 07 Apr 2021 08:09:01
![commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c](/images/git.png) ![commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c](/images/codeberg.svg) ![commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c commit hash: cf118ccf875508b9a1c570044c93cfcc82bd455c](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Mathieu Arnold (mat) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
One more small cleanup, forgotten yesterday.
Reported by: lwhsu |
4.7.0 06 Apr 2021 14:31:07
![commit hash: 305f148f482daf30dcf728039d03d019f88344eb commit hash: 305f148f482daf30dcf728039d03d019f88344eb](/images/git.png) ![commit hash: 305f148f482daf30dcf728039d03d019f88344eb commit hash: 305f148f482daf30dcf728039d03d019f88344eb](/images/codeberg.svg) ![commit hash: 305f148f482daf30dcf728039d03d019f88344eb commit hash: 305f148f482daf30dcf728039d03d019f88344eb](/images/github.svg) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
Mathieu Arnold (mat) ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Remove # $FreeBSD$ from Makefiles. |
4.7.0 08 Mar 2021 04:10:54
![Revision:567824 Revision:567824](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
fox ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Updates to v4.7.0
- Remove the memory leak patch since now it is upstreamed.
Changes since v4.6.0:
wolfSSL Release 4.7.0 (February 16, 2021)
Release 4.7.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* Compatibility Layer expansion SSL_get_verify_mode, X509_VERIFY_PARAM API,
X509_STORE_CTX API added
* WOLFSSL_PSK_IDENTITY_ALERT macro added for enabling a subset of TLS alerts
* Function wolfSSL_CTX_NoTicketTLSv12 added to enable turning off session (Only the first 15 lines of the commit message are shown above ) |
4.6.0_1 24 Feb 2021 15:43:35
![Revision:566484 Revision:566484](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
tobik ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Fix QA issues
====> Checking for pkg-plist issues (check-plist)
===> Parsing plist
===> Checking for items in STAGEDIR missing from pkg-plist
===> Checking for items in pkg-plist which are not in STAGEDIR
Error: Missing: %%DOCSDIR%%/README.txt
Error: Missing: %%DOCSDIR%%/example/client.c
Error: Missing: %%DOCSDIR%%/example/echoclient.c
Error: Missing: %%DOCSDIR%%/example/echoserver.c
Error: Missing: %%DOCSDIR%%/example/sctp-client-dtls.c
Error: Missing: %%DOCSDIR%%/example/sctp-client.c
Error: Missing: %%DOCSDIR%%/example/sctp-server-dtls.c
Error: Missing: %%DOCSDIR%%/example/sctp-server.c
Error: Missing: %%DOCSDIR%%/example/server.c (Only the first 15 lines of the commit message are shown above ) |
4.6.0_1 29 Jan 2021 22:11:11
![Revision:563255 Revision:563255](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
fox ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Add DEBUG option and enable more features.
- Set --enable-opensslall which is needed for
wolfSSL_X509_NAME_print_ex() and friends.
- Set --enable-certgen to allow certificate generation.
- Define WOLFSSL_ALT_NAMES so one can generate certificates
with the Subject Alternative Name extension.
- Set --enable-sessioncerts to allow to inspect certificates
with wolfSSL_get_peer_cert_chain().
- Set --enable-des3 so one can load PBES2-3DES-CBC-encoded keys.
Additionally a patch to prevent memory leaks is included.
PR: 252829
Submitted by: Fabian Keil <fk@fabiankeil.de>
Reported by: Fabian Keil <fk@fabiankeil.de>
Approved by: fox (maintainer) |
4.6.0 28 Dec 2020 16:44:19
![Revision:559504 Revision:559504](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
fox ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Updates to v4.6.0
Changes since v4.5.0:
wolfSSL Release 4.6.0 (December 22, 2020)
Release 4.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
New Build Options
* wolfSSL now enables linux kernel module support. Big news for Linux kernel
module developers with crypto requirements! wolfCrypt and wolfSSL are now
loadable as modules in the Linux kernel, providing the entire libwolfssl (Only the first 15 lines of the commit message are shown above ) |
4.5.0 17 Nov 2020 16:06:06
![Revision:555565 Revision:555565](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
pkubaj ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: fix build on big-endian
Merge upstream patch to fix build on big-endian architectures.
Also unmark mips and mips64 as broken, now builds fine.
MFH: 2020Q4 (fix build blanket) |
4.5.0 31 Aug 2020 16:01:08
![Revision:547195 Revision:547195](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mat ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
QAT fixes.
Reported by:
http://package21.nyi.freebsd.org/data/113amd64-default-qat/546304/logs/wolfssl-4.5.0.log |
4.5.0 22 Aug 2020 01:23:36
![Revision:545732 Revision:545732](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
fox ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Updates to v4.5.0
Changes since v4.4.0:
wolfSSL Release 4.5.0 (August 19, 2020)
If you have questions about this release, feel free to contact us on our
info@ address.
Release 4.5.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* Added Xilinx Vitis 2019.2 example and README updates
* TLS v1.3 is now enabled by default (Only the first 15 lines of the commit message are shown above ) |
4.4.0 02 May 2020 07:20:49
![Revision:533671 Revision:533671](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
fox ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Fixes build failure.
Uploaded the distfile manually into distcache to prevent failures during fetch.
Reviewed by: philip |
4.4.0 23 Apr 2020 19:18:32
![Revision:532705 Revision:532705](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
fox ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Updates to v4.4.0
Changes since v4.3.0:
wolfSSL Release 4.4.0 (04/22/2020)
If you have questions about this release, feel free to contact us on our
info@ address.
Release 4.4.0 of wolfSSL embedded TLS has bug fixes and new features including:
New Feature Additions
* Hexagon support.
* DSP builds to offload ECC verify operations.
* Certificate Manager callback support. (Only the first 15 lines of the commit message are shown above ) |
4.3.0 29 Jan 2020 19:17:12
![Revision:524597 Revision:524597](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
sunpoet ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Fix PLIST issue (r524152) with DOCS enabled
====> Checking for pkg-plist issues (check-plist)
===> Parsing plist
===> Checking for items in STAGEDIR missing from pkg-plist
===> Checking for items in pkg-plist which are not in STAGEDIR
Error: Missing: %%DOCSDIR%%/README.txt
Error: Missing: %%DOCSDIR%%/example/client.c
Error: Missing: %%DOCSDIR%%/example/echoclient.c
Error: Missing: %%DOCSDIR%%/example/echoserver.c
Error: Missing: %%DOCSDIR%%/example/sctp-client-dtls.c
Error: Missing: %%DOCSDIR%%/example/sctp-client.c
Error: Missing: %%DOCSDIR%%/example/sctp-server-dtls.c
Error: Missing: %%DOCSDIR%%/example/sctp-server.c
Error: Missing: %%DOCSDIR%%/example/server.c
Error: Missing: %%DOCSDIR%%/example/tls_bench.c
Error: Missing: %%DOCSDIR%%/taoCert.txt
===> Error: Plist issues found.
*** Error code 1
Stop.
make: stopped in /usr/ports/security/wolfssl
=>> Error: check-plist failures detected
Approved by: portmgr (blanket) |
4.3.0 26 Jan 2020 05:27:09
![Revision:524152 Revision:524152](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
fox ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
security/wolfssl: Updates to 4.3.0
- Minor portlint / portfmt fixes.
- Take ownership of the port.
Changes: https://www.wolfssl.com/docs/wolfssl-changelog/
PR: 242853
Submitted by: takefu@airport.fm
Reviewed by: philip |
4.2.0 13 Dec 2019 12:20:56
![Revision:520026 Revision:520026](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
amdmi3 ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
- Update to 4.2.0
- Fix LICENSE
- Add LICENSE_FILE
- Add testing support
PR: 233190
Submitted by: takefu@airport.fm |
3.13.0 04 Nov 2019 21:21:04
![Revision:516744 Revision:516744](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
rene ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Returns johans's ports to the pool after safekeeping his commit bit. |
3.13.0 05 Dec 2018 20:01:11
![Revision:486720 Revision:486720](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
linimon ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
These ports now build on powerpc64.
While here, pet portlint.
Approved by: portmgr (tier-2 blanket) |
3.13.0 17 Nov 2018 17:46:11
![Revision:485182 Revision:485182](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
sunpoet ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update MASTER_SITES and WWW
Approved by: portmgr (blanket) |
3.13.0 10 Sep 2018 13:14:52
![Revision:479406 Revision:479406](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
mat ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Add DOCS options to ports that should have one.
Also various fixes related to said option.
PR: 230864
Submitted by: mat
exp-runs by: antoine |
3.13.0 25 Dec 2017 11:47:18
![Revision:457220 Revision:457220](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to WolfSSL 3.13.0
https://www.wolfssl.com/docs/wolfssl-changelog/ |
3.12.2 21 Nov 2017 21:15:35
![Revision:454654 Revision:454654](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to WolfSSL 3.12
https://www.wolfssl.com/docs/wolfssl-changelog/ |
3.11.0 02 Jun 2017 15:49:34
![Revision:442405 Revision:442405](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
linimon ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Mark some ports failing on powerpc64. These ports are either new
ports, or had been recently unblocked.
While here, pet portlint.
Approved by: portmgr (tier-2 blanket) |
3.11.0 29 May 2017 05:26:57
![Revision:441970 Revision:441970](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Correct plist
Reported by: linimon |
3.11.0 09 May 2017 19:05:07
![Revision:440511 Revision:440511](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to latest release (4 May); bugfixes and new features
https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html |
3.10.0 27 Dec 2016 10:24:28
![Revision:429595 Revision:429595](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to WolfSSL 3.10
Configure script now uses bash-isms |
3.9.8 12 Sep 2016 20:30:20
![Revision:421959 Revision:421959](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to WolfSSL 3.9.8 |
3.9.0 26 Apr 2016 20:58:25
![Revision:414076 Revision:414076](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
Update to WolfSSL 3.9.0
https://www.wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html |
3.8.0 06 Jan 2016 21:32:10
![Revision:405390 Revision:405390](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
- Update WolfSSL to 3.8.0 (new MASTER_SITES, WWW entry and description)
- Includes important security fixes for CVE-2015-7744 and CVE-2015-6925
see
https://www.wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html
- Disables support for SSLv3
PR: 205936
Submitted by: Christoph Moench-Tegeder <cmt@burggraben.net>
MFH: 2016Q1 |
3.4.6 30 Apr 2015 19:41:38
![Revision:385058 Revision:385058](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
- Update to WolfSSL 3.4.6
- Remove options to include ChaCha and Poly1305, these are now on by default |
3.4.0 28 Mar 2015 09:15:25
![Revision:382450 Revision:382450](/images/subversion.png) ![This port version is marked as vulnerable. This port version is marked as vulnerable.](/images/vuxml.gif) |
johans ![search for other commits by this committer search for other commits by this committer](/images/search.jpg) |
CyaSSL has been renamed WolfSSL upstream
Rename port and update to 3.4.0
http://www.yassl.com/yaSSL/Products-wolfssl.html |