./security/R-openssl, Toolkit for encryption, signatures and certificates based on OpenSSL

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 2.3.1, Package name: R-openssl-2.3.1, Maintainer: pkgsrc-users

Bindings to OpenSSL libssl and libcrypto, plus custom SSH key parsers.
Supports RSA, DSA and EC curves P-256, P-384, P-521, and curve25519.
Cryptographic signatures can either be created and verified manually
or via x509 certificates. AES can be used in cbc, ctr or gcm mode for
symmetric encryption; RSA for asymmetric (public key) encryption or EC
for Diffie Hellman. High-level envelope functions combine RSA and AES
for encrypting arbitrary sized data. Other utilities include key
generators, hash functions (md5, sha1, sha256, etc), base64 encoder, a
secure random number generator, and 'bignum' math methods for manually
performing crypto calculations on large multibyte integers.


Required to run:
[math/R] [security/openssl] [security/R-askpass]

Required to build:
[pkgtools/cwrappers]

Master sites: (Expand)


Version history: (Expand)


CVS history: (Expand)


   2025-01-12 16:14:20 by Makoto Fujiwara | Files touched by this commit (2)
Log message:
(security/R-openssl Updated 2.3.0 to 2.3.1, make test passed

2.3.1
 - Fix case base64_decode(NA) for libssl 3.4.0 (#130)
 - Refactor to build with R_NO_REMAP
   2025-01-11 13:43:15 by Makoto Fujiwara | Files touched by this commit (2) | Package updated
Log message:
(security/R-openssl) Updated 2.0.5 to 2.3.0, make test passed

2.3.0
 - Windows: use OpenSSL from Rtools if found

2.2.2
 - Reduce test verbosity per CRAN request
 - Update maintainer email address

2.2.1
 - Skip some legacy sha1 tests on Redhat systems to fix #125

2.2.0
 - Use new EVP_MD_fetch() api on libssl 3 to find non-default algorithms.
 - Add keccak() hash function
 - MacOS/Windows: update to OpenSSL 3.3.0

2.1.2
 - MacOS: avoid linking against legacy versions of openssl

2.1.1
 - Windows: update to openssl 3.1.2 + arm support

2.1.0
 - Windows and autobrew binaries have been bumped to libssl 3.1.1. (MacOS CRAN
   binaries use libssl from CRAN 'recipes' which is currently libssl 1.1.1)
 - Added sha3() function

2.0.6
 - Add new functions pkcs7_encrypt and pkcs7_decrypt
 - Fix snprintf bug in hash functions
   2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298)
Log message:
*: bump for openssl 3
   2022-12-18 03:00:10 by Makoto Fujiwara | Files touched by this commit (2)
Log message:
(security/R-openssl) Updated 2.0.1 to 2.0.5

2.0.5
 - Replace sprintf with snprintf for CRAN

2.0.4
 - Fix strict-prototype warnings for CRAN

2.0.3
 - New function write_openssh_pem to support ed25519 in libssh2/gert

2.0.2
 - Disable tests that require internet access to comply with AON policy
   2022-05-21 14:48:58 by Makoto Fujiwara | Files touched by this commit (2)
Log message:
(security/R-openssl) Updated 2.0.0 to 2.0.1

2.0.1
 - Fix a unit test for a changed error message in openssl 3.0.2
   2022-05-11 16:03:38 by Makoto Fujiwara | Files touched by this commit (2)
Log message:
(security/R-openssl) Updated 1.4.3 to 2.0.0

2.0.0
 - The default fingerprint() for keys has changed from md5 to sha256. This is
   a breaking change, but in line with other software phasing out md5, and needed
   to support systems where use of MD5 has been disabled to comply with FIPS.
 - Make the test-suite pass under FIPS on RHEL 8.
 - New family of ssl_ctx functions to manipulate an SSL context from inside curl
   https requests.
 - Rd manuals have been markdownified

1.4.6
 - Update unit tests to new pki.goog test servers

1.4.5
 - Tweaks and fixes for upcoming OpenSSLv3. Once OpenSSLv3 is released we should
   port the deprecated functions, but for now we keep supporting OpenSSL 1.0.2.

1.4.4
 - Fix rand_bytes for large input
 - Remove some legacy Windows workarounds from R 3.2
 - Windows: upgrade libs to openssl 1.1.1k
   2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605)
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \ 
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
   2021-10-07 16:54:50 by Nia Alarie | Files touched by this commit (606)
Log message:
security: Remove SHA1 hashes for distfiles