From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Sep 5 13:41:31 2013 Return-Path: Delivered-To: freebsd-ports-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 6EE29EE3; Thu, 5 Sep 2013 13:41:31 +0000 (UTC) (envelope-from jaap@NLnetLabs.nl) Received: from bela.nlnetlabs.nl (bela.nlnetlabs.nl [IPv6:2001:7b8:206:1:222:4dff:fe55:4ccb]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 0D7C22F44; Thu, 5 Sep 2013 13:41:30 +0000 (UTC) Received: from bela.nlnetlabs.nl (localhost [IPv6:::1]) by bela.nlnetlabs.nl (8.14.7/8.14.7) with ESMTP id r85DfPsv096185; Thu, 5 Sep 2013 15:41:26 +0200 (CEST) (envelope-from jaap@NLnetLabs.nl) Authentication-Results: bela.nlnetlabs.nl; dmarc=none header.from=NLnetLabs.nl Message-Id: <201309051341.r85DfPsv096185@bela.nlnetlabs.nl> To: Jan Beich , freebsd-ports-bugs@FreeBSD.org Subject: Re: ports/178262: [patch] dns/unbound, dns/ldns: openssl port iff base version < 1.0 From: Jaap Akkerhuis In-reply-to: <1UXCEE-0007yS-1X@internal.tormail.org> References: <1UXCEE-0007yS-1X@internal.tormail.org> Comments: In-reply-to Jan Beich message dated "Tue, 30 Apr 2013 09:53:48 +0500." Date: Thu, 05 Sep 2013 15:41:25 +0200 X-Spam-Status: No, score=-2.4 required=5.0 tests=ALL_TRUSTED,BAYES_00, MISSING_MID autolearn=no version=3.3.2 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on bela.nlnetlabs.nl X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.4.3 (bela.nlnetlabs.nl [IPv6:::1]); Thu, 05 Sep 2013 15:41:27 +0200 (CEST) Cc: FreeBSD-gnats-submit@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 05 Sep 2013 13:41:31 -0000 Oops, forgot about this. >Description: Do not depend on security/openssl if openssl in base is sufficient. I did actually tested this for ldns and it seems OK. I'm not maintaining the unbound port so cannot speak for him, but I assume he won't have a problem with it either. jaap