From owner-freebsd-ports@freebsd.org Wed Oct 5 02:04:24 2016 Return-Path: Delivered-To: freebsd-ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7E31FAF487E for ; Wed, 5 Oct 2016 02:04:24 +0000 (UTC) (envelope-from 0101015792959ef2-163aa5ec-0b1c-4220-baf0-67ab2871cfa8-000000@us-west-2.amazonses.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 6237F3C2 for ; Wed, 5 Oct 2016 02:04:24 +0000 (UTC) (envelope-from 0101015792959ef2-163aa5ec-0b1c-4220-baf0-67ab2871cfa8-000000@us-west-2.amazonses.com) Received: by mailman.ysv.freebsd.org (Postfix) id 5EA71AF487D; Wed, 5 Oct 2016 02:04:24 +0000 (UTC) Delivered-To: ports@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5E52CAF487C for ; Wed, 5 Oct 2016 02:04:24 +0000 (UTC) (envelope-from 0101015792959ef2-163aa5ec-0b1c-4220-baf0-67ab2871cfa8-000000@us-west-2.amazonses.com) Received: from a27-38.smtp-out.us-west-2.amazonses.com (a27-38.smtp-out.us-west-2.amazonses.com [54.240.27.38]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3F9443BF for ; Wed, 5 Oct 2016 02:04:23 +0000 (UTC) (envelope-from 0101015792959ef2-163aa5ec-0b1c-4220-baf0-67ab2871cfa8-000000@us-west-2.amazonses.com) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=stdm37fqbypyvw6iolbo3nkyd73es3w7; d=vmeta.jp; t=1475633061; h=MIME-Version:Content-Type:Content-Transfer-Encoding:Date:From:To:Subject:Message-ID; bh=YSfa4qAxaIZXzOLdwDcC6Hw8uM/46GrTj31zMmLXcX4=; b=dz2C23B4cLK6l6b4nPWzbmXwT+oxDjXxct3vmekfD3DAHdPnFdWWdU0H1oGHJ0mI iFZfdxqAAs27rKAF/5m2CyaQKK4Qwz6Rg44TCHmCH2tCWTDZcfl85YpYYW9hsNvOQyQ qrtTjf5AlevieK+zmYYP4kW+CJBsGe0eY+9priaA= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=gdwg2y3kokkkj5a55z2ilkup5wp5hhxx; d=amazonses.com; t=1475633061; h=MIME-Version:Content-Type:Content-Transfer-Encoding:Date:From:To:Subject:Message-ID:Feedback-ID; bh=YSfa4qAxaIZXzOLdwDcC6Hw8uM/46GrTj31zMmLXcX4=; b=WNm8h3k1Gzg0Ix/X1YToGCDBMXEaoU2xE41u/kFls22vmUjqNUBAf/10zq660GFZ gYH6VbHrDcfK8ABTjiM3DL3Z8S4Z8sd4ZjqID+6/s+F0su2t6tgaz/EaFxQDXpBmhmc skQpJlApix7gT0MfNupJylIxmu+YzhFBfbhXi5lY= X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on glory.vmeta.jp X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.1 MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Wed, 5 Oct 2016 02:04:21 +0000 From: Koichiro IWAO To: ports@freebsd.org Subject: usage of openssl command in ports Message-ID: <0101015792959ef2-163aa5ec-0b1c-4220-baf0-67ab2871cfa8-000000@us-west-2.amazonses.com> X-Sender: meta+ports@vmeta.jp User-Agent: Roundcube Webmail/1.2.0 X-SES-Outgoing: 2016.10.05-54.240.27.38 Feedback-ID: 1.us-west-2.ngRt4x2U/cWqug8pbfjwMxB6pcDw1fmN73bGmMLYyRI=:AmazonSES X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Oct 2016 02:04:24 -0000 Hi, I have a question about usage of openssl command in ports. If a port uses openssl command for example in pkg-install, how can I determine which openssl to use? I think if ssl=base, /usr/bin/openssl should be used. If ssl=openssl, ${PREFIX}/bin/openssl should be used. And other ssl ports. Is there something like ${OPENSSL_CMD} or do I have to do manually like this? .if ${SSL_DEFAULT} == base OPENSSL_CMD= /usr/bin/openssl .endif .if ${SSL_DEFAULT} == openssl OPENSSL_CMD= ${PREFIX}/bin/openssl .endif .if ${SSL_DEFAULT} == libressl OPENSSL_CMD= "i don't know" .endif -- `whois vmeta.jp | nkf -w` meta