Commit graph

322 commits

Author SHA1 Message Date
jnemeth
caeaab9b2c Add a new threads option which is on by default. The purpose of this is
to allow other packages that can't handle threads to link against this.

No revbump since there is no change to binary packages.
2011-11-02 22:51:07 +00:00
hans
4df3a77d37 Look in /usr/sfw to find built-in openssl on SunOS 5.10. 2011-10-04 14:15:35 +00:00
tez
7d9d8dc49b Correct the fix for http://secunia.com/advisories/44572/
See the thread here:
  http://www.mail-archive.com/openssl-dev@openssl.org/msg29283.html
2011-07-04 14:42:56 +00:00
tez
b27db31dae Add protection against ECDSA timing attacks as mentioned in the paper
by Billy Bob Brumley and Nicola Tuveri, see:
  http://eprint.iacr.org/2011/232.pdf
[Billy Bob Brumley and Nicola Tuveri]

(patch confirmed in upstream cvs)
2011-05-31 17:18:42 +00:00
tez
3a17f46777 Use solaris64 rather than solaris for ABI=64 build using gcc in SunOS
fixes PR#44769
2011-04-01 21:02:48 +00:00
taca
b1ce322fbc Add fix for security issue CVE-2011-0014.
Bump PKGREVISION.
2011-02-09 00:15:30 +00:00
tez
e53bbe065d 'fix' pr#43939 by providing a pointer to the root cause 2011-01-20 16:25:21 +00:00
taca
ba2a96a188 Update openssl package to 0.9.8q.
OpenSSL version 0.9.8q released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8q of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release. For a complete
   list of changes, please see

       http://www.openssl.org/source/exp/CHANGES.

   The most significant changes are:

      o Fix for security issue CVE-2010-4180
      o Fix for CVE-2010-4252
2010-12-03 00:17:21 +00:00
taca
c63bd2f11d Update security/openssl package to 0.9.8p.
OpenSSL version 0.9.8p released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8p of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release which addresses
   CVE-2010-3864. For a complete list of changes,
   please see http://www.openssl.org/source/exp/CHANGES.
2010-11-17 00:52:25 +00:00
tez
2ca1f91bbd Fix for CVE-2010-2939 2010-10-08 20:04:58 +00:00
wiz
6255d7ef3a Recognize 64 bit DragonFly systems correctly. From Damian Lubosch
in PR 43774.
2010-08-18 11:20:55 +00:00
obache
f985006214 ABI is not defined on old Darwin. 2010-08-01 05:24:00 +00:00
obache
a39f5824f1 Add builtin OpenSSL support for Haiku. 2010-07-04 16:33:25 +00:00
taca
068ea7541e Update security/openssl package to 0.9.8o.
OpenSSL CHANGES
 _______________

 Changes between 0.9.8n and 0.9.8o [01 Jun 2010]

  *) Correct a typo in the CMS ASN1 module which can result in invalid memory
     access or freeing data twice (CVE-2010-0742)
     [Steve Henson, Ronald Moesbergen <intercommit@gmail.com>]

  *) Add SHA2 algorithms to SSL_library_init(). SHA2 is becoming far more
     common in certificates and some applications which only call
     SSL_library_init and not OpenSSL_add_all_algorithms() will fail.
     [Steve Henson]

  *) VMS fixes:
     Reduce copying into .apps and .test in makevms.com
     Don't try to use blank CA certificate in CA.com
     Allow use of C files from original directories in maketests.com
     [Steven M. Schweda" <sms@antinode.info>]
2010-06-02 13:30:11 +00:00
adam
1d09989d31 Set correct architecture on Darwin 2010-05-08 06:33:41 +00:00
taca
662d52e488 Update openssl package from 0.9.8m to 0.9.8n.
Changes between 0.9.8m and 0.9.8n [24 Mar 2010]

  *) When rejecting SSL/TLS records due to an incorrect version number, never
     update s->server with a new major version number.  As of
     - OpenSSL 0.9.8m if 'short' is a 16-bit type,
     - OpenSSL 0.9.8f if 'short' is longer than 16 bits,
     the previous behavior could result in a read attempt at NULL when
     receiving specific incorrect SSL/TLS records once record payload
     protection is active.  (CVE-2010-0740)
     [Bodo Moeller, Adam Langley <agl@chromium.org>]

  *) Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
     could be crashed if the relevant tables were not present (e.g. chrooted).
     [Tomas Hoger <thoger@redhat.com>]
2010-04-12 14:19:17 +00:00
taca
b87d51e229 Add a patch for Fix for CVE-2010-0740, DoS problem.
http://www.openssl.org/news/secadv_20100324.txt

Bump PKGREVISION.
2010-03-26 00:20:49 +00:00
taca
606736c60b Fix broken PLIST.
(I wonder why "make print-PLIST" generated wrong result before...")

Bump PKGREVISION.
2010-03-01 08:15:40 +00:00
taca
3c9d1189e6 Update openssl to 0.9.8m.
The OpenSSL project team is pleased to announce the release of
   version 0.9.8m of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release which implements
   RFC5746 to address renegotiation vulnerabilities mentioned in
   CVE-2009-3555.  For a complete list of changes,
   please see http://www.openssl.org/source/exp/CHANGES.
2010-02-26 03:15:13 +00:00
taca
9fabab017b Add a patch from OpenSSL's repositroy to deal with CVE-2009-4355.
Bump PKGREVISION.
2010-01-22 03:35:10 +00:00
wiz
672ef23395 Recursive PKGREVISION bump for jpeg update to 8. 2010-01-17 12:02:03 +00:00
taca
46298023fb Update openssl package to 0.9.8l, fixing security problem.
Approved by agc@.


Changes between 0.9.8k and 0.9.8l  [5 Nov 2009]

 *) Disable renegotiation completely - this fixes a severe security
    problem (CVE-2009-3555) at the cost of breaking all
    renegotiation. Renegotiation can be re-enabled by setting
    SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at
    run-time. This is really not recommended unless you know what
    you're doing.
    [Ben Laurie]
2010-01-15 04:55:30 +00:00
obache
b78b0121e1 Fixes and improvement for Interix
* Not only interix-3, but also treat all interix release, allow to build on SUA.
* Gave up randomized image base, use 0x5e000000, as in mk/platform/Interix.mk.
  It is workaround of PR 42369.
* Use -D_REENTRANT flags for threads.
* replace -Wl,soname= linker flags with -Wl,h, for Interix
2009-12-25 11:58:06 +00:00
joerg
6761fb26cb Convert @exec/@unexec to @pkgdir or drop it. 2009-06-14 21:21:16 +00:00
joerg
4bfd4a2628 Remove @dirrm entries from PLISTs 2009-06-14 18:13:25 +00:00
tez
b850511ab2 Patches for CVE-2009-1377, CVE-2009-1378 & CVE-2009-1379 from
http://cvs.openssl.org/filediff?f=openssl/ssl/d1_both.c&v1=1.4.2.9&v2=1.4.2.10
http://cvs.openssl.org/filediff?f=openssl/ssl/d1_both.c&v1=1.4.2.13&v2=1.4.2.15
http://cvs.openssl.org/filediff?f=openssl/crypto/pqueue/pqueue.c&v1=1.2.2.4&v2=1.2.2.5
http://cvs.openssl.org/filediff?f=openssl/crypto/pqueue/pqueue.h&v1=1.2.2.1&v2=1.2.2.2
http://cvs.openssl.org/filediff?f=openssl/ssl/d1_pkt.c&v1=1.4.2.17&v2=1.4.2.18
2009-06-10 13:57:08 +00:00
joerg
307289f1e2 Define openssl-fake-pc only once. 2009-06-07 14:24:03 +00:00
wiz
b022bba7cf Create fake pc files for builtin openssl, for the packages that
insist on them (like modular-xorg-server).
2009-06-07 11:06:26 +00:00
zafer
f9a8f0d95e clean up mirrors. use official up to date ones. 2009-05-21 21:37:28 +00:00
tnn
7eab86532c the external rsaref option was dropped from securirty/openssl over
4 years ago; remove support from the bl3.mk as well.
2009-04-16 14:05:38 +00:00
tnn
021b4615a9 NetBSD/sparc64 build fix. Reported and fix tested by Michael C. Vergallen. 2009-04-16 09:50:37 +00:00
tnn
ce257462cd Update to openssl-0.9.8k.
Changes between 0.9.8j and 0.9.8k  [25 Mar 2009]
*) Don't set val to NULL when freeing up structures, it is freed up by
   underlying code. If sizeof(void *) > sizeof(long) this can result in
   zeroing past the valid field. (CVE-2009-0789)
*) Fix bug where return value of CMS_SignerInfo_verify_content() was not
   checked correctly. This would allow some invalid signed attributes to
   appear to verify correctly. (CVE-2009-0591)
*) Reject UniversalString and BMPString types with invalid lengths. This
   prevents a crash in ASN1_STRING_print_ex() which assumes the strings have
   a legal length. (CVE-2009-0590)
*) Set S/MIME signing as the default purpose rather than setting it
   unconditionally. This allows applications to override it at the store
   level.
*) Permit restricted recursion of ASN1 strings. This is needed in practice
   to handle some structures.
*) Improve efficiency of mem_gets: don't search whole buffer each time
   for a '\n'
*) New -hex option for openssl rand.
*) Print out UTF8String and NumericString when parsing ASN1.
*) Support NumericString type for name components.
*) Allow CC in the environment to override the automatically chosen
   compiler. Note that nothing is done to ensure flags work with the
   chosen compiler.
2009-04-05 15:50:17 +00:00
joerg
2d1ba244e9 Simply and speed up buildlink3.mk files and processing.
This changes the buildlink3.mk files to use an include guard for the
recursive include. The use of BUILDLINK_DEPTH, BUILDLINK_DEPENDS,
BUILDLINK_PACKAGES and BUILDLINK_ORDER is handled by a single new
variable BUILDLINK_TREE. Each buildlink3.mk file adds a pair of
enter/exit marker, which can be used to reconstruct the tree and
to determine first level includes. Avoiding := for large variables
(BUILDLINK_ORDER) speeds up parse time as += has linear complexity.
The include guard reduces system time by avoiding reading files over and
over again. For complex packages this reduces both %user and %sys time to
half of the former time.
2009-03-20 19:23:50 +00:00
tnn
1157e16862 Update to openssl-0.9.8j. Fixes CVE-2008-5077.
Changes between 0.9.8i and 0.9.8j  [07 Jan 2009]
*) Properly check EVP_VerifyFinal() and similar return values
   (CVE-2008-5077).
*) Allow the CHIL engine to be loaded, whether the application is
   multithreaded or not. (This does not release the developer from the
   obligation to set up the dynamic locking callbacks.)
*) Use correct exit code if there is an error in dgst command.
*) Tweak Configure so that you need to say "experimental-jpake" to enable
   JPAKE, and need to use -DOPENSSL_EXPERIMENTAL_JPAKE in applications.
*) Add experimental JPAKE support, including demo authentication in
   s_client and s_server.
*) Set the comparison function in v3_addr_canonize().
*) Add support for XMPP STARTTLS in s_client.
*) Change the server-side SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG behavior
   to ensure that even with this option, only ciphersuites in the
   server's preference list will be accepted.  (Note that the option
   applies only when resuming a session, so the earlier behavior was
   just about the algorithm choice for symmetric cryptography.)

Changes between 0.9.8h and 0.9.8i  [15 Sep 2008]
*) Fix a state transitition in s3_srvr.c and d1_srvr.c
   (was using SSL3_ST_CW_CLNT_HELLO_B, should be ..._ST_SW_SRVR_...).
*) The fix in 0.9.8c that supposedly got rid of unsafe
   double-checked locking was incomplete for RSA blinding,
   addressing just one layer of what turns out to have been
   doubly unsafe triple-checked locking.
   So now fix this for real by retiring the MONT_HELPER macro
   in crypto/rsa/rsa_eay.c.
*) Various precautionary measures:
   - Avoid size_t integer overflow in HASH_UPDATE (md32_common.h).
   - Avoid a buffer overflow in d2i_SSL_SESSION() (ssl_asn1.c).
     (NB: This would require knowledge of the secret session ticket key
     to exploit, in which case you'd be SOL either way.)
   - Change bn_nist.c so that it will properly handle input BIGNUMs
     outside the expected range.
   - Enforce the 'num' check in BN_div() (bn_div.c) for non-BN_DEBUG
     builds.
*) Allow engines to be "soft loaded" - i.e. optionally don't die if
   the load fails. Useful for distros.
*) Add support for Local Machine Keyset attribute in PKCS#12 files.
*) Fix BN_GF2m_mod_arr() top-bit cleanup code.
*) Expand ENGINE to support engine supplied SSL client certificate functions.
   This work was sponsored by Logica.
*) Add CryptoAPI ENGINE to support use of RSA and DSA keys held in Windows
   keystores. Support for SSL/TLS client authentication too.
   Not compiled unless enable-capieng specified to Configure.
   This work was sponsored by Logica.
*) Fix bug in X509_ATTRIBUTE creation: dont set attribute using
   ASN1_TYPE_set1 if MBSTRING flag set. This bug would crash certain
   attribute creation routines such as certifcate requests and PKCS#12
   files.
2009-01-08 16:38:22 +00:00
adrianp
dede2ac381 Might be good to actually add the patch that fixes the problem 2008-10-25 12:04:34 +00:00
adrianp
c348119408 OpenSSL is not JOBS_SAFE
Pull in a fix from the OpenSSL CVS:
http://cvs.openssl.org/filediff?f=openssl/crypto/x509/x509_att.c&v1=1.14&v2=1.15
This should fix PR #39767 opened by Wolfgang Solfrank
2008-10-25 12:03:35 +00:00
reed
8748c6679e Add zlib option.
This is for PR 39433.
It is not enabled by default.
2008-09-17 00:46:58 +00:00
dsainty
8f8c9f2e65 Catch distinfo up with the removal of patch-a[bh].
(Hi Tobias :)
2008-07-14 22:19:11 +00:00
tnn
ecd7c12e2c Update to openssl-0.9.8h. Changes from 0.9.8g:
Two crashes discovered using the Codenomicon TLS test suite, as reported
in CVE-2008-0891 and CVE-2008-1672, were fixed. The root CA certificates
of commercial CAs were removed from the distribution. Functions were added
to implement RFC3394 compatible AES key wrapping. Utility functions to
handle ASN1 structures were added. The certificate status request TLS
extension, as defined in RFC3546, was implemented. Several other bugfixes
and enhancements were made.
2008-07-14 03:52:54 +00:00
tonnerre
edf2b93718 Fix shared library build on various architectures. This basically fiddles
with the number of colons between the fields.
2008-06-16 20:18:20 +00:00
tonnerre
9005c221a8 Fix two Denial of Service vulnerabilities in OpenSSL 0.9.8g:
- Fix flaw if 'Server Key exchange message' is omitted from a TLS handshake
   which could lead to a silent crash.
 - Fix double free in TLS server name extensions which could lead to a remote
   crash.

Patches from upstream.
2008-06-03 21:39:40 +00:00
tonnerre
2f84995386 Fix build of OpenSSL on NetBSD/amd64 (4.0 and current tested) 2008-05-08 14:04:25 +00:00
jlam
9080934d3b Fix detection of openssl configuration directory on NetBSD so it's
/etc/openssl only if USE_BUILTIN.openssl is "yes".
2008-04-25 20:06:15 +00:00
jlam
841dfa0e7a Convert to use PLIST_VARS instead of manually passing "@comment "
through PLIST_SUBST to the plist module.
2008-04-12 22:42:57 +00:00
tnn
20a85821ab Link shared libraries with -rpath on IRIX to prevent check-shlibs errors. 2008-02-20 01:10:20 +00:00
tnn
5b7fef9e0c Update to openssl-0.9.8g. Provided by Jukka Salmi in pkgsrc-wip.
pkgsrc notes:
  o Tested on NetBSD/i386 (Jukka Salmi), Mac OSX 10.5 (Adrian Portelli),
    Linux (Jeremy C. Reed), Tru64 5.1b (tnn), HP-UX 11i (tnn).
    Because the Makefile system has been rewamped, other
    platforms may require fixes. Please test if you can.
  o OpenSSL can now be built with installation to DESTDIR.

Overview of important changes since 0.9.7i:
  o Add gcc 4.2 support.
  o DTLS improvements.
  o RFC4507bis support.
  o TLS Extensions support.
  o RFC3779 support.
  o New cipher Camellia
  o Updated ECC cipher suite support.
  o New functions EVP_CIPHER_CTX_new() and EVP_CIPHER_CTX_free().
  o Zlib compression usage fixes.
  o Major work on the BIGNUM library for higher efficiency and to
    make operations more streamlined and less contradictory.  This
    is the result of a major audit of the BIGNUM library.
  o Addition of BIGNUM functions for fields GF(2^m) and NIST
    curves, to support the Elliptic Crypto functions.
  o Major work on Elliptic Crypto; ECDH and ECDSA added, including
    the use through EVP, X509 and ENGINE.
  o New ASN.1 mini-compiler that's usable through the OpenSSL
    configuration file.
  o Added support for ASN.1 indefinite length constructed encoding.
  o New PKCS#12 'medium level' API to manipulate PKCS#12 files.
  o Complete rework of shared library construction and linking
    programs with shared or static libraries, through a separate
    Makefile.shared.
  o Rework of the passing of parameters from one Makefile to another.
  o Changed ENGINE framework to load dynamic engine modules
    automatically from specifically given directories.
  o New structure and ASN.1 functions for CertificatePair.
  o Changed the key-generation and primality testing "progress"
    mechanism to take a structure that contains the ticker
    function and an argument.
  o New engine module: GMP (performs private key exponentiation).
  o New engine module: VIA PadLOck ACE extension in VIA C3
    Nehemiah processors.
  o Added support for IPv6 addresses in certificate extensions.
    See RFC 1884, section 2.2.
  o Added support for certificate policy mappings, policy
    constraints and name constraints.
  o Added support for multi-valued AVAs in the OpenSSL
    configuration file.
  o Added support for multiple certificates with the same subject
    in the 'openssl ca' index file.
  o Make it possible to create self-signed certificates using
    'openssl ca -selfsign'.
  o Make it possible to generate a serial number file with
    'openssl ca -create_serial'.
  o New binary search functions with extended functionality.
  o New BUF functions.
  o New STORE structure and library to provide an interface to all
    sorts of data repositories.  Supports storage of public and
    private keys, certificates, CRLs, numbers and arbitrary blobs.
    This library is unfortunately unfinished and unused withing
    OpenSSL.
  o New control functions for the error stack.
  o Changed the PKCS#7 library to support one-pass S/MIME
    processing.
  o New FIPS 180-2 algorithms (SHA-224, -256, -384 and -512).
  o New X509_VERIFY_PARAM structure to support parametrisation
    of X.509 path validation.
  o Change the default digest in 'openssl' commands from MD5 to
    SHA-1.
  o Added support for DTLS.
  o New BIGNUM blinding.
  o Added support for the RSA-PSS encryption scheme
  o Added support for the RSA X.931 padding.
  o Added support for files larger than 2GB.
  o Added alternate pkg-config files.
2008-01-17 06:42:47 +00:00
joerg
6cf0f6c49c Fix builtin.mk logic for thread feature if no native OpenSSL exists.
Fixes PR pkg/37699 from Aleksey Cheusov.
2008-01-07 15:51:08 +00:00
rillig
d5a1ab0577 Fixed a few pkglint warnings. 2008-01-05 20:41:25 +00:00
rillig
7f791603aa Removed the special-case handling of PKG_SYSCONFDIR for NetBSD. Now the
configuration files are installed in the usual pkgsrc place, not in
/etc. PKGREVISION++

Ok'ed by jlam@.
2008-01-04 22:08:09 +00:00
gdt
efee29e6e8 Remove deprecated "fee-based commercial use" license for idea, mdc2,
rc5, and replace with {idea,mdc2,rc5}-nonlicense.  Because pkgsrc does
not yet handle multiple licenses, set LICENSE to
openssl-patented-algorithms-nonlicense.
2007-12-27 23:41:42 +00:00