49 Commits

Author SHA1 Message Date
tb
f2cc771bb0 Bump after OpenSSL update (static linking) 2022-07-05 10:51:02 +00:00
sthen
b5c13562bd update to sslscan-2.0.15 2022-07-04 09:58:15 +00:00
sthen
0125c21742 Add notes about why these ports use security/openssl 2022-06-26 13:40:59 +00:00
sthen
f2d54b8266 update to sslscan-2.0.14 2022-06-25 18:45:37 +00:00
tb
48eae20f25 Bump after OpenSSL update (static linking) 2022-06-21 14:48:14 +00:00
tb
fec1a00167 sslscan: bump after openssl 1.1.1 update (static linking) 2022-05-03 15:15:11 +00:00
sthen
5c5d8c3eba update to sslscan-2.0.13 2022-04-12 20:33:29 +00:00
tb
3a23de365d sslscan: fix merge error 2022-03-16 07:51:11 +00:00
tb
74c9e57b32 bump slscan for openssl update (static link) 2022-03-15 16:41:44 +00:00
sthen
ae724bb727 update to sslscan-2.0.12 2022-03-12 10:27:50 +00:00
sthen
a98e0e6666 remove rcs IDs in ports that I maintain 2022-03-07 21:36:41 +00:00
sthen
587af6f03a remove pointless ports-clang from COMPILER 2022-02-10 21:01:52 +00:00
sthen
f64a39a836 update to sslscan-2.0.11 2021-12-22 22:53:40 +00:00
sthen
a8ba477a71 bump sslscan for openssl update (static linked) 2021-12-14 17:40:50 +00:00
sthen
d7c710369e update to sslscan-2.0.10 2021-04-28 08:20:03 +00:00
sthen
43dd50f4f5 update to sslscan-2.0.9 2021-03-27 14:10:00 +00:00
sthen
e7022f0e0b bump for openssl update 2021-03-25 14:56:48 +00:00
sthen
cc05a2bb8f update to sslscan-2.0.8 2021-02-20 16:02:35 +00:00
sthen
90df8abeab update to sslscan-2.0.7 2021-02-11 16:27:30 +00:00
sthen
1c0d4a3f38 Bump sslscan REVISION. This uses "BUILD_DEPENDS=security/openssl/1.1:patch"
to pull in a current version of OpenSSL that it builds with special options
and links statically, so it needs manual bumps when openssl/1.1 is updated
to trigger pkg_add updates.
2020-12-22 13:07:58 +00:00
sthen
0a7aeb8d03 update to sslscan-2.0.6 2020-11-21 14:45:49 +00:00
sthen
b4fa17c3d2 update to sslscan-2.0.5 2020-11-06 14:36:43 +00:00
sthen
22c09817fd update to sslscan-2.0.4 2020-10-20 18:43:49 +00:00
kmos
87eebc03ae sslscan does not compile with base-gcc. Need at least ports-gcc for
non-base-clang architectures.

ok sthen (maintainer)
2020-07-26 20:03:34 +00:00
sthen
e4103c34a0 update to sslscan-2.0.0, merge flavour into default version 2020-07-25 17:27:00 +00:00
sthen
6cc9779250 switch my maintainer email addresses to my own domain 2020-07-11 22:54:35 +00:00
sthen
c66456bcb7 mark sslscan,openssl as BROKEN-sparc64; runs openssl tests during build;
fails SIGILL in BN_mod_sqrt (unsure if security/openssl/1.0.2 itself is
affected as sslscan builds it with nonstandard options)
2020-01-03 11:26:14 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
86ff5a3936 update to sslscan-1.11.12 2019-03-03 15:14:49 +00:00
naddy
b086632fa8 Disable CAST cipher when configuring the embedded OpenSSL.
Since we don't build shared libraries, the CAST assembly implementation
is included on i386 even though there is no PIC version. Skip the whole
cipher as there are no SSL/TLS cipher suites that use CAST.

ok sthen@
2018-11-20 16:46:36 +00:00
sthen
10295c3ad6 adapt to new layout in security/openssl 2018-11-07 11:07:11 +00:00
jsing
08ec0d71c2 Stop using old/deprecated M_ASN1_* defines/macros.
Switch from the old/deprecated M_ASN1_OCTET_STRING_print() defines/macros
to ASN1_STRING_print(). While here, add const to the version struct member
to remove a compiler warning.

ok sthen@
2018-08-30 17:05:21 +00:00
sthen
fe9fd1abd1 don't fail if ${WRKSRC}/openssl/.git exists, found during ports src extraction 2018-02-24 13:30:11 +00:00
sthen
509b551836 update to sslscan-1.11.11 2018-01-01 14:35:24 +00:00
sthen
30eaa4b102 sync WANTLIB and bump, gc a few gettext MODULES while there 2017-09-22 21:30:32 +00:00
sthen
a0af7d140a update to sslscan-1.11.8, convert to GH_* variables, use the SSL_get_state()
accessor rather than digging in the struct directly which no longer works in
libressl (state was moved to internal).
2017-01-27 11:01:14 +00:00
sthen
1dcc764027 fix "make extract NO_DEPENDS=Yes" 2016-06-01 22:37:58 +00:00
sthen
248b31f1a2 update to sslscan-1.11.2, now built against static-linked openssl lib
with SSLv2 enabled to allow identification of misconfigured servers
again (as was the case before the last openssl update).
2016-03-03 14:41:46 +00:00
sthen
a91e23cb14 update to sslscan-1.11.1 2016-01-08 02:08:10 +00:00
sthen
53cb3ecedc update to sslscan-1.11.0-rbsec, take MAINTAINER 2015-10-21 13:23:54 +00:00
sthen
8b6b8e35b1 allow libressl and openssl versions of sslscan to coexist in installation;
now you can use one to check for chacha20-poly1305 and the other to check
for SSLv2/v3 support without messing around with pkg_delete/pkg_add between
tests.
2015-09-16 21:24:46 +00:00
sthen
170f3f8091 Add a flavour providing a choice of which SSL library to build sslscan against. 2015-09-10 14:08:44 +00:00
sthen
83db9a1edc switch to rbsec's version of sslscan. adds TLSv1.1/1.2 support, displays
cert information (alg/strength/issuer/times), heartbleed/compression/secure
reneg checks, etc.
2015-09-10 13:55:51 +00:00
sthen
f3a2d47f3b use openssl from ports, allows scanning for things which have been removed from
libressl
2015-07-19 00:07:15 +00:00
naddy
570aa62a9c Drop remaining MD5/RMD160/SHA1 checksums. 2015-01-18 03:12:39 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
jasper
cbcacca97f do not show --ssl2 commandline option if built with an OpenSSL without SSLv2 support.
from brad
2012-07-16 08:49:31 +00:00
jasper
7ce355632a let this work if sslv2 is disabled, from Brad 2012-06-26 10:12:21 +00:00
ajacoutot
c251bafcec Import sslscan-1.8.2.
SSLScan queries SSL services, such as HTTPS, in order to determine the
ciphers that are supported. SSLScan is designed to be easy, lean and
fast. The output includes prefered ciphers of the SSL service, the
certificate and is in Text and XML formats.

Heavily based on the FreeBSD port.

inputs from sthen@
ok jasper@
2011-06-21 21:05:48 +00:00