Commit graph

322 commits

Author SHA1 Message Date
jlam
d2b62c66fb Create a new variable PREFER_NATIVE that has the opposite semantics
as PREFER_PKGSRC.  Preferences are determined by the most specific
instance of the package in either PREFER_PKGSRC or PREFER_NATIVE.  If
a package is specified in neither or in both variables, then PREFER_PKGSRC
has precedence over PREFER_NATIVE.
2004-02-12 02:35:06 +00:00
jlam
1edfa505ed Reorganize code so that any dependencies are checked as part of deciding
whether the software is built-in or not.  This facilitates implementing
the forthcoming PKGSRC_NATIVE variable.
2004-02-12 01:59:37 +00:00
jlam
7699290f10 If we're passing through MAKEFLAGS variables whose values may contain
spaces, use the :Q modifier instead of double-quoting the value.  This
avoids breakage when executing the just-in-time su targets.
2004-02-06 19:04:24 +00:00
jlam
317cc72791 Make PREFER_PKGSRC just yes/no or a list of packages. This makes it
simpler to understand.
2004-02-05 07:17:14 +00:00
jlam
e7133cac25 Rename BUILDLINK_PREFER_PKGSRC to PREFER_PKGSRC so that we can use its
value outside of buildlink-related files.
2004-02-05 07:06:15 +00:00
jlam
07a9d8dfb2 Support a new global variable:
BUILDLINK_PREFER_PKGSRC
	This variable determines whether or not to prefer the pkgsrc
	versions of software that is also present in the base system.

	This variable is multi-state:
		defined, or "yes"	always prefer the pkgsrc versions
		not defined, or "no"	only use the pkgsrc versions if
					needed by dependency requirements

	This can also take a list of packages for which to prefer the
	pkgsrc-installed software.  The package names may be found by
	consulting the value added to BUILDLINK_PACKAGES in the
	buildlink[23].mk files for that package.
2004-02-05 06:58:02 +00:00
jlam
22aa620838 Ensure that -lcrypt appears before -lcrypto on the command line so that
the system crypt(), which is considerably smarter than the OpenSSL crypt(),
is used.
2004-01-30 10:59:14 +00:00
jlam
01a5abff01 Support BUILDLINK_DEPENDS.<pkg> being a list of values. 2004-01-24 03:12:31 +00:00
jlam
0167c3791f Only point SSLCERTS into ${PKG_SYSCONFDIR} if we're not using the built-in
OpenSSL software.  Otherwise, set it to /etc/ssl/certs, which is where a
lot of Linux distros store certs.  The behaviour on NetBSD systems is
unchanged -- always set to /etc/openssl/certs.  Fixes PR 24161.
2004-01-21 10:03:41 +00:00
jlam
4b90d17ed9 From the log for rev. 1.1260 of bsd.pkg.mk:
"Package Makefiles should refer to PKG_SYSCONFBASEDIR instead of
 PKG_SYSCONFBASE when they want PKG_SYSCONFDIR stripped of
 PKG_SYSCONFSUBDIR.  This makes PKG_SYSCONFBASE=/etc work with pkgviews by
 installing all config files into /etc/packages/<pkg> instead of
 occasionally putting some directly into /etc."
2004-01-07 02:21:16 +00:00
jlam
38252eb956 bl3ify 2004-01-05 22:33:45 +00:00
jlam
d279e6f535 Use S/+$// instead of C/\+$// to save a backslash. Very highly
recommended by seb :)
2004-01-05 11:05:44 +00:00
jlam
c9ff27d270 Sow BUILDLINK_USE_BUILTIN.<pkg> and reap _NEED_<PKG> variables. 2004-01-05 09:31:31 +00:00
jlam
47bb2aae5f Re-arrange to match example buildlink3.mk file in bsd.buildlink3.mk. 2004-01-04 23:34:04 +00:00
jlam
339cd13cb2 Initial sprinkling of work-in-progress buildlink3.mk files for using the
buildlink3 framework.
2004-01-03 23:06:43 +00:00
erh
ff4ab4ac22 Add an empty plist for AIX. 2003-12-03 17:35:43 +00:00
reed
ace3815fc7 The PLIST.linux was empty, but should be registering the
libssl.so* and libcrypto.so* files. So added this.
2003-12-03 01:57:08 +00:00
jlam
dc0392f000 Fix OpenSSL version number parsing. Patch from PR 23532 by Michael van
Elst with style modifications by me.
2003-11-27 05:19:58 +00:00
jlam
49eef2d279 If the built-in OpenSSL software is 0.9.6g, then check whether it
contains the 0.9.6g -> 0.9.6l security fixes pulled up to netbsd-1-6 on
2003-11-07 by checking for the presence of the preprocessor symbol
OPENSSL_HAS_20031107_FIX.  If it does, then allow the built-in OpenSSL to
satisfy dependencies for openssl>=0.9.6l.
2003-11-25 06:56:08 +00:00
jschauma
07e126d1f6 textproc/glimpse and security/openssl no longer conflict, as openssl
does no longer install bin/cast.  Noted by Bernhard Riedel.
2003-11-19 02:57:43 +00:00
jschauma
b5425f7502 OpenSSL has not had base64 for a while now, so these two no longer need
to conflict.  Noted by Bernhard Riedel.
2003-11-19 02:52:46 +00:00
wiz
4c64aceda4 Remove OPENSSL_HAS_*FIX code; corresponding check was removed in
previous commit to this file. Noted superfluous by Todd Vierling.
2003-11-17 15:25:57 +00:00
wiz
6485961f23 Depend on latest openssl package (hi jan!).
Remove some obsolete code.
Fix rsaref reference, we do not want to include a buildlink3.mk here.
2003-11-12 07:55:02 +00:00
jschauma
cf88580cec Update to openssl-0.9.6l:
*) Fix additional bug revealed by the NISCC test suite:

     Stop bug triggering large recursion when presented with
     certain ASN.1 tags (CAN-2003-0851)
     [Steve Henson]
2003-11-12 03:35:45 +00:00
kristerw
d5f213bea8 Let the Configure script handle NetBSD-arm too. 2003-10-21 23:03:36 +00:00
reed
b2fcfff89a Add support for BSD/OS. 2003-10-04 07:54:52 +00:00
jschauma
83ca290393 Update to 0.9.6k:
Changes between 0.9.6j and 0.9.6k  [30 Sep 2003]

  *) Fix various bugs revealed by running the NISCC test suite:

     Stop out of bounds reads in the ASN1 code when presented with
     invalid tags (CAN-2003-0543 and CAN-2003-0544).

     If verify callback ignores invalid public key errors don't try to check
     certificate signature with the NULL public key.

     [Steve Henson]

  *) In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate
     if the server requested one: as stated in TLS 1.0 and SSL 3.0
     specifications.
     [Steve Henson]

  *) In ssl3_get_client_hello() (ssl/s3_srvr.c), tolerate additional
     extra data after the compression methods not only for TLS 1.0
     but also for SSL 3.0 (as required by the specification).
     [Bodo Moeller; problem pointed out by Matthias Loepfe]

  *) Change X509_certificate_type() to mark the key as exported/exportable
     when it's 512 *bits* long, not 512 bytes.
     [Richard Levitte]

 Changes between 0.9.6i and 0.9.6j  [10 Apr 2003]

  *) Countermeasure against the Klima-Pokorny-Rosa extension of
     Bleichbacher's attack on PKCS #1 v1.5 padding: treat
     a protocol version number mismatch like a decryption error
     in ssl3_get_client_key_exchange (ssl/s3_srvr.c).
     [Bodo Moeller]

  *) Turn on RSA blinding by default in the default implementation
     to avoid a timing attack. Applications that don't want it can call
     RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING.
     They would be ill-advised to do so in most cases.
     [Ben Laurie, Steve Henson, Geoff Thorpe, Bodo Moeller]

  *) Change RSA blinding code so that it works when the PRNG is not
     seeded (in this case, the secret RSA exponent is abused as
     an unpredictable seed -- if it is not unpredictable, there
     is no point in blinding anyway).  Make RSA blinding thread-safe
     by remembering the creator's thread ID in rsa->blinding and
     having all other threads use local one-time blinding factors
     (this requires more computation than sharing rsa->blinding, but
     avoids excessive locking; and if an RSA object is not shared
     between threads, blinding will still be very fast).
     [Bodo Moeller]

 Changes between 0.9.6h and 0.9.6i  [19 Feb 2003]

  *) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
     via timing by performing a MAC computation even if incorrrect
     block cipher padding has been found.  This is a countermeasure
     against active attacks where the attacker has to distinguish
     between bad padding and a MAC verification error. (CAN-2003-0078)

     [Bodo Moeller; problem pointed out by Brice Canvel (EPFL),
     Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and
     Martin Vuagnoux (EPFL, Ilion)]

 Changes between 0.9.6g and 0.9.6h  [5 Dec 2002]

  *) New function OPENSSL_cleanse(), which is used to cleanse a section of
     memory from it's contents.  This is done with a counter that will
     place alternating values in each byte.  This can be used to solve
     two issues: 1) the removal of calls to memset() by highly optimizing
     compilers, and 2) cleansing with other values than 0, since those can
     be read through on certain media, for example a swap space on disk.
     [Geoff Thorpe]

  *) Bugfix: client side session caching did not work with external caching,
     because the session->cipher setting was not restored when reloading
     from the external cache. This problem was masked, when
     SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG (part of SSL_OP_ALL) was set.
     (Found by Steve Haslam <steve@araqnid.ddts.net>.)
     [Lutz Jaenicke]

  *) Fix client_certificate (ssl/s2_clnt.c): The permissible total
     length of the REQUEST-CERTIFICATE message is 18 .. 34, not 17 .. 33.
     [Zeev Lieber <zeev-l@yahoo.com>]

  *) Undo an undocumented change introduced in 0.9.6e which caused
     repeated calls to OpenSSL_add_all_ciphers() and
     OpenSSL_add_all_digests() to be ignored, even after calling
     EVP_cleanup().
     [Richard Levitte]

  *) Change the default configuration reader to deal with last line not
     being properly terminated.
     [Richard Levitte]

  *) Change X509_NAME_cmp() so it applies the special rules on handling
     DN values that are of type PrintableString, as well as RDNs of type
     emailAddress where the value has the type ia5String.
     [stefank@valicert.com via Richard Levitte]

  *) Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half
     the job SSL_SESS_CACHE_NO_INTERNAL_LOOKUP was inconsistently
     doing, define a new flag (SSL_SESS_CACHE_NO_INTERNAL) to be
     the bitwise-OR of the two for use by the majority of applications
     wanting this behaviour, and update the docs. The documented
     behaviour and actual behaviour were inconsistent and had been
     changing anyway, so this is more a bug-fix than a behavioural
     change.
     [Geoff Thorpe, diagnosed by Nadav Har'El]

  *) Don't impose a 16-byte length minimum on session IDs in ssl/s3_clnt.c
     (the SSL 3.0 and TLS 1.0 specifications allow any length up to 32 bytes).
     [Bodo Moeller]

  *) Fix initialization code race conditions in
        SSLv23_method(),  SSLv23_client_method(),   SSLv23_server_method(),
        SSLv2_method(),   SSLv2_client_method(),    SSLv2_server_method(),
        SSLv3_method(),   SSLv3_client_method(),    SSLv3_server_method(),
        TLSv1_method(),   TLSv1_client_method(),    TLSv1_server_method(),
        ssl2_get_cipher_by_char(),
        ssl3_get_cipher_by_char().
     [Patrick McCormick <patrick@tellme.com>, Bodo Moeller]

  *) Reorder cleanup sequence in SSL_CTX_free(): only remove the ex_data after
     the cached sessions are flushed, as the remove_cb() might use ex_data
     contents. Bug found by Sam Varshavchik <mrsam@courier-mta.com>
     (see [openssl.org #212]).
     [Geoff Thorpe, Lutz Jaenicke]

  *) Fix typo in OBJ_txt2obj which incorrectly passed the content
     length, instead of the encoding length to d2i_ASN1_OBJECT.
     [Steve Henson]
2003-10-02 02:34:39 +00:00
grant
0f0b2f9840 style nits 2003-09-22 03:15:33 +00:00
grant
7be5254f17 formatting nits 2003-09-22 03:13:58 +00:00
jlam
05b5d9484e Rewrite this file so that we can specify the version of OpenSSL that we
need by simply setting BUILDLINK_DEPENDS.openssl.  This buildlink2.mk file
now functions just like any other typical buildlink2.mk file.
2003-09-11 04:10:38 +00:00
jlam
31ac96c449 Note version numbers for 0.9.6[hij]. 2003-09-10 16:43:14 +00:00
jlam
8851ca23da Only check if we need to add the rsaref dependency if we need the pkgsrc
openssl.
2003-09-10 16:25:25 +00:00
jlam
054f8001ea Use the built-in HAS_CONFIGURE and TEST_TARGET infrastructure to do the
configure and test phases.
2003-09-10 16:23:27 +00:00
jlam
d7e76ed3bc Honor CFLAGS/LDFLAGS from the environment. 2003-09-10 16:05:09 +00:00
jlam
e02a907cbe Back out the make -> @MAKE@ -> ${MAKE} changes since we workaround the
bare "make" problem using tools.mk.
2003-09-10 01:57:06 +00:00
jschauma
6766d3344d Several of the Makefile used in this package call 'make' directly. If
an operating system does not have a 'make' (ie only bmake), or if the OS
supplied 'make' is sufficiently broken (Irix), this will cause the build to
fail (interestingly enough apparently only if build as a dependency, not
if build from this directory).
Patch Makefiles to use @MAKE@, which then, after patching, is substituted with
the actual ${MAKE} (can't use "MAKE= ${MAKE} -f Makefile.ssl").

While here, tweak Irix configure a bit.
2003-08-25 16:34:00 +00:00
jmc
ae16687c70 If 0.9.7a or 0.9.7b are required and not otherwise installed on the system
set PKG_SKIP_REASON and move on. The package only supports to 0.9.6g
currently otherwise.
2003-08-04 17:28:23 +00:00
grant
23cd338455 add openssl 0.9.7a, as found in Slackware Linux 9.
XXX there really must be a better way to (not have to) do this.
2003-07-29 19:25:50 +00:00
tron
bf2ee3a526 Add support for OpenSSL 0.9.7b shipped with NetBSD-current. 2003-07-24 20:18:24 +00:00
wiz
daa9aa028d Remove fallout from ruby-openssl mis-reimport. 2003-07-22 18:57:39 +00:00
taca
3caaeff527 Re-import security/ruby-openssl 0.1.4.1. 2003-07-22 17:37:36 +00:00
grant
ca3be631f2 s/netbsd.org/NetBSD.org/ 2003-07-17 22:50:55 +00:00
dillo
2816ab4961 don't define test target directly, use do-test instead 2003-07-12 13:23:43 +00:00
grant
1355ba8347 style nits, join two .if's. 2003-07-02 13:03:25 +00:00
grant
1bbc0aa690 more brutally attack the CONFIGURE_ARGS target issue on Solaris.
force gcc if *gcc* - Sun's compiler is never going to be installed
into a path with 'gcc' in it(!)
2003-07-02 13:00:46 +00:00
jschauma
e4114ffbdd Make this work on IRIX64. 2003-06-27 02:36:36 +00:00
jschauma
dc9cb111d0 Rename PLIST.irix6 to PLIST.irix to match the others and set the
PLIST_SRC accordingly after we recently set LOWER_OPSYS on IRIX to what
most applications seem to expect (ie irix6.5 rather than irix6).
2003-06-10 18:02:26 +00:00
jschauma
e366d0c694 Use tech-pkg@ in favor of packages@ as MAINTAINER for orphaned packages.
Should anybody feel like they could be the maintainer for any of thewe packages,
please adjust.
2003-06-02 01:15:31 +00:00
wiz
b263414622 Add freebsd specific parts. From Marc Recht in PR 21573. 2003-05-14 12:07:45 +00:00
wiz
f65dbbe2f2 Remove a paragraph with the following comment:
# This hack goes away, once we formally de-support NetBSD-1.4.x.
We did that half a year ago.
2003-04-17 12:32:32 +00:00
seb
c387ecacba * Add patch from http://www.openssl.org/news/secadv_20030317.txt:
Researchers have discovered a timing attack on RSA keys, to which
OpenSSL is generally vulnerable, unless RSA blinding has been turned
on.

Typically, it will not have been, because it is not easily possible to
do so when using OpenSSL to provide SSL or TLS.

The enclosed patch switches blinding on by default. Applications that
wish to can remove the blinding with RSA_blinding_off(), but this is
not generally advised. It is also possible to disable it completely by
defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time.

The performance impact of blinding appears to be small (a few
percent).

This problem affects many applications using OpenSSL, in particular,
almost all SSL-enabled Apaches. You should rebuild and reinstall
OpenSSL, and all affected applications.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0147 to this issue.

* Add patch from http://www.openssl.org/news/secadv_20030319.txt:

Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa
have come up with an extension of the "Bleichenbacher attack" on RSA
with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0.  Their
attack requires the attacker to open millions of SSL/TLS connections
to the server under attack; the server's behaviour when faced with
specially made-up RSA ciphertexts can reveal information that in
effect allows the attacker to perform a single RSA private key
operation on a ciphertext of its choice using the server's RSA key.
Note that the server's RSA key is not compromised in this attack.

* Bump PKGREVISION.
2003-03-21 18:40:48 +00:00
grant
90181f93e7 tweak linking of libssl so it can find libcrypto. 2003-02-28 08:08:20 +00:00
wiz
f628ba9e29 Add patch from http://www.openssl.org/news/secadv_20030219.txt:
In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
via timing by performing a MAC computation even if incorrrect
block cipher padding has been found.  This is a countermeasure
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CAN-2003-0078)

Bump PKGREVISION.
2003-02-20 07:59:24 +00:00
jlam
d7f69e47ce Instead of including bsd.pkg.install.mk directly in a package Makefile,
have it be automatically included by bsd.pkg.mk if USE_PKGINSTALL is set
to "YES".  This enforces the requirement that bsd.pkg.install.mk be
included at the end of a package Makefile.  Idea suggested by Julio M.
Merino Vidal <jmmv at menta.net>.
2003-01-28 22:03:00 +00:00
grant
f7b9c1222e strip leading path from $CC so we don't try to run Configure with args
eg. 'solaris-sparcv7-/usr/pkg/bin/gcc' :-)
2003-01-23 02:23:21 +00:00
jschauma
999e13c1b9 Add PLIST for irix6. Same as netbsd and solaris -- maybe we can combine these? 2002-12-24 03:57:04 +00:00
schmonz
0a1bd5acad Replace IGNORE with PKG_FAIL_REASON or PKG_SKIP_REASON as appropriate. 2002-12-07 02:38:52 +00:00
grant
074405705a on Solaris, pass -Wl,-R ... (as per NetBSD targets) so that libssl can
find libcrypto.

fixes my PR pkg/19229.
2002-12-03 14:02:24 +00:00
uebayasi
049d5d69d6 Explicitly specify the path to Perl5 executable for configure script.
Reported by Jonathan Perkin in PR19205.
2002-11-30 05:13:23 +00:00
wiz
affff1c0bc Unused. 2002-10-25 12:19:37 +00:00
markd
823ba38095 The shared libraries are installed on Solaris now. 2002-09-09 22:17:00 +00:00
jlam
5bec783195 Use buildlink2 and pass an extra flag to the configure script so that if
RSAref is used, then the library may be found.
2002-09-07 07:17:00 +00:00
jlam
448a7bb843 We don't need to symlink bin/openssl since we want the one in ${SSLBASE}. 2002-09-05 12:44:21 +00:00
jlam
efb93b17bd Merge changes in packages from the buildlink2 branch that have
buildlink2.mk files back into the main trunk.
2002-08-25 19:21:43 +00:00
fredb
6db5eceda2 Let build on sparc v7. 2002-08-19 18:34:54 +00:00
wiz
ce1ba0b1d2 Fix a comment, and improve pattern to also work on netbsd-1-4. 2002-08-19 16:00:06 +00:00
wiz
13ee19350f Compile no-shared on 1.4.x. This makes the package install and work for me
on 1.4.2/i386. Approved by agc.
2002-08-19 15:17:55 +00:00
agc
2df95bedb4 Provide a sensible default for BUILDLINK_DEPENDS.openssl - noticed when
the in-tree openssl is < 0.9.6f, a previous package build has installed
the openssl-0.9.6g package, but the BUILDLINK_DEPENDS.openssl value is
not initialised, so that the package infrastructure tries to build and
install the openssl-0.9.6g package again.
2002-08-16 19:41:14 +00:00
fredb
5677c8890c Revert Makefile,v.1.56, as the NetBSD patches were causing intractable
problems for Solaris. Instead, handle patch for NetBSD-1.4.2 specially.
2002-08-15 19:22:10 +00:00
fredb
36090d2088 Really require 0.9.6g, if we require the package at all. 2002-08-15 01:14:32 +00:00
fredb
03a3cef468 It just occurred to me that the ${PATCHDIR} patches developed against the
NetBSD-patched codebase won't apply cleanly (or at all) without the NetBSD
patch. Therefore, remove the `.if ${OS}' condition for applying the patch,
so Solaris and Darwin start with the same codebase. Fix as needed.
2002-08-10 11:08:18 +00:00
itojun
b81f5f0022 require 0.9.6f, at least 2002-08-10 05:27:30 +00:00
fredb
d5e2ea6e68 Update to 0.9.6g. The most significant change is this proof against
a stunning DoS vulnerability, fixed in 0.9.6f:

  *) Use proper error handling instead of 'assertions' in buffer
     overflow checks added in 0.9.6e.  This prevents DoS (the
     assertions could call abort()).
     [Arne Ansper <arne@ats.cyber.ee>, Bodo Moeller]

Regenerate the netbsd patch. This is now a clean diff against the
vendor tag, with version-number-only changes elided.

Partially revert "crypto/dist/openssl/crypto/rand/randfile.c", version
1.4 (via additional pkgsrc patch), to give this a shot to compile on
NetBSD-1.4.2 and earlier, which had no strlcpy() or strlcat().

Assemble the shared library without "-Bsymbolic", mainly to give this
a shot at linking on NetBSD-a.out (untested).
2002-08-10 04:50:31 +00:00
jlam
577caefd40 Correctly set the value of SSLCERTS depending on the environment and the
platform.
2002-08-09 17:12:51 +00:00
jlam
8ad7767d39 * Change the perl paths in the various build scripts to ${PERL5} and not
${LOCALBASE}/bin/perl.

* Refer to the make program used to drive the build and installation as
  "${MAKE_PROGRAM}".

* Instead of explicitly setting PKG_SYSCONFBASE=/etc, use the pkg-specific
  override PKG_SYSCONFDIR.openssl, and optionally set it so that the
  user still has the option of overriding its value.

* Use bsd.pkg.install.mk to install the default config file (openssl.cnf)
  and to create and remove the extra config directories.  This lets us
  reemove the extra lines in PLIST that do the same thing.
2002-08-09 14:45:05 +00:00
jlam
7ddc05c158 Refer to the openssl config directory as ${PKG_SYSCONFDIR} as it differs
between platforms.
2002-08-09 14:35:55 +00:00
fredb
abd1be5e66 Remove my macros for missing strlcpy() and strncpy() which aren't correct,
and don't actually work.
2002-08-07 10:30:53 +00:00
fredb
1ffcd53464 Make this work on platforms that don't have any base system "openssl",
includes (i.e NetBSD-1.4.3). Problem pointed out by Amitai Schlair.
2002-08-04 23:38:43 +00:00
fredb
d78c8fae4b Update openssl to 0.9.6e. This update fixes multiple vulnerabilities,
and also changes the ABI of "libcrypto" and "libssl". (So the shared
library majors and buildlink requirements are bumped, too.) The code
base is now synced perfectly with NetBSD HEAD and netbsd-1-6 branches
as of 2002-08-04, the optimization levels are reduced to "-O2", but
I've retained some of the processor optimization flags and different code
path #defines in the "Configure" script, just to keep things interesting.

The default "certs" directory on NetBSD is now "/etc/openssl/certs", to
give continuity to those who find themselves using the package system's
"openssl" after upgrading a package that formerly used the base system's.
[Suggested by itojun.] The best way to avoid such problems, however, is
to upgrade your base system *first*.

I'm making use of the new and improved build system as much as possible.
This gives us a cleaner way to make shared libraries and real man pages,
but loses many of the symlinks to the openssl binary.

I've culled items from the "CHANGES" file that appear to have security
implications or are particularly interesting for NetBSD users, below.
My comments are marked off with '===>'.

===> This is from the netbsd-20020804-patch

  *) Fix ASN1 checks. Check for overflow by comparing with LONG_MAX
     and get fix the header length calculation.
     [Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>,
      Alon Kantor <alonk@checkpoint.com> (and others),
      Steve Henson]

 Changes between 0.9.6d and 0.9.6e  [30 Jul 2002]

  *) New option
          SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
     for disabling the SSL 3.0/TLS 1.0 CBC vulnerability countermeasure
     that was added in OpenSSL 0.9.6d.

     As the countermeasure turned out to be incompatible with some
     broken SSL implementations, the new option is part of SSL_OP_ALL.
     SSL_OP_ALL is usually employed when compatibility with weird SSL
     implementations is desired (e.g. '-bugs' option to 's_client' and
     's_server'), so the new option is automatically set in many
     applications.
     [Bodo Moeller]

  *) Changes in security patch:

     Changes marked "(CHATS)" were sponsored by the Defense Advanced
     Research Projects Agency (DARPA) and Air Force Research Laboratory,
     Air Force Materiel Command, USAF, under agreement number
     F30602-01-2-0537.

  *) Add various sanity checks to asn1_get_length() to reject
     the ASN1 length bytes if they exceed sizeof(long), will appear
     negative or the content length exceeds the length of the
     supplied buffer.
     [Steve Henson, Adi Stav <stav@mercury.co.il>, James Yonan <jim@ntlp.com>]

  *) Assertions for various potential buffer overflows, not known to
     happen in practice.
     [Ben Laurie (CHATS)]

  *) Various temporary buffers to hold ASCII versions of integers were
     too small for 64 bit platforms. (CAN-2002-0655)
     [Matthew Byng-Maddick <mbm@aldigital.co.uk> and Ben Laurie (CHATS)>

  *) Remote buffer overflow in SSL3 protocol - an attacker could
     supply an oversized session ID to a client. (CAN-2002-0656)
     [Ben Laurie (CHATS)]

  *) Remote buffer overflow in SSL2 protocol - an attacker could
     supply an oversized client master key. (CAN-2002-0656)
     [Ben Laurie (CHATS)]

 Changes between 0.9.6c and 0.9.6d  [9 May 2002]

  *) Implement a countermeasure against a vulnerability recently found
     in CBC ciphersuites in SSL 3.0/TLS 1.0: Send an empty fragment
     before application data chunks to avoid the use of known IVs
     with data potentially chosen by the attacker.
     [Bodo Moeller]

 Changes between 0.9.6a and 0.9.6b  [9 Jul 2001]

  *) Change ssleay_rand_bytes (crypto/rand/md_rand.c)
     to avoid a SSLeay/OpenSSL PRNG weakness pointed out by
     Markku-Juhani O. Saarinen <markku-juhani.saarinen@nokia.com>:
     PRNG state recovery was possible based on the output of
     one PRNG request appropriately sized to gain knowledge on
     'md' followed by enough consecutive 1-byte PRNG requests
     to traverse all of 'state'.

     1. When updating 'md_local' (the current thread's copy of 'md')
        during PRNG output generation, hash all of the previous
        'md_local' value, not just the half used for PRNG output.

     2. Make the number of bytes from 'state' included into the hash
        independent from the number of PRNG bytes requested.

     The first measure alone would be sufficient to avoid
     Markku-Juhani's attack.  (Actually it had never occurred
     to me that the half of 'md_local' used for chaining was the
     half from which PRNG output bytes were taken -- I had always
     assumed that the secret half would be used.)  The second
     measure makes sure that additional data from 'state' is never
     mixed into 'md_local' in small portions; this heuristically
     further strengthens the PRNG.
     [Bodo Moeller]

  *) The countermeasure against Bleichbacher's attack on PKCS #1 v1.5
     RSA encryption was accidentally removed in s3_srvr.c in OpenSSL 0.9.5
     when fixing the server behaviour for backwards-compatible 'client
     hello' messages.  (Note that the attack is impractical against
     SSL 3.0 and TLS 1.0 anyway because length and version checking
     means that the probability of guessing a valid ciphertext is
     around 2^-40; see section 5 in Bleichenbacher's CRYPTO '98
     paper.)

     Before 0.9.5, the countermeasure (hide the error by generating a
     random 'decryption result') did not work properly because
     ERR_clear_error() was missing, meaning that SSL_get_error() would
     detect the supposedly ignored error.

     Both problems are now fixed.
     [Bodo Moeller]

 Changes between 0.9.6 and 0.9.6a  [5 Apr 2001]

===> This is our ABI change.

  *) Rename 'des_encrypt' to 'des_encrypt1'.  This avoids the clashes
     with des_encrypt() defined on some operating systems, like Solaris
     and UnixWare.
     [Richard Levitte]

  *) Don't use getenv in library functions when run as setuid/setgid.
     New function OPENSSL_issetugid().
     [Ulf Moeller]

  *) Store verify_result within SSL_SESSION also for client side to
     avoid potential security hole. (Re-used sessions on the client side
     always resulted in verify_result==X509_V_OK, not using the original
     result of the server certificate verification.)
     [Lutz Jaenicke]

===> package doesn't doesn't do this. We'll bump major versions
===> as necessary.

  *) Make sure that shared libraries get the internal name engine with
     the full version number and not just 0.  This should mark the
     shared libraries as not backward compatible.  Of course, this should
     be changed again when we can guarantee backward binary compatibility.
     [Richard Levitte]


  *) Rework the system to generate shared libraries:

     - Make note of the expected extension for the shared libraries and
       if there is a need for symbolic links from for example libcrypto.so.0
       to libcrypto.so.0.9.7.  There is extended info in Configure for
       that.

     - Make as few rebuilds of the shared libraries as possible.

     - Still avoid linking the OpenSSL programs with the shared libraries.

     - When installing, install the shared libraries separately from the
       static ones.
2002-08-04 15:47:43 +00:00
tron
4dbad0e528 Add support for OpenSSL 0.9.6e. 2002-07-31 06:22:45 +00:00
schmonz
e71fb8b5b0 Build on Darwin using patches from Apple's Darwin source repository,
via Fink.
2002-07-28 05:36:29 +00:00
jlam
e1be891dbc Change explicit build dependencies on perl into "USE_PERL5=build". This
makes these packages build correctly on Darwin where perl>=5.8.0 is
required.
2002-07-24 19:45:22 +00:00
seb
db84442a67 Substitute a couple of mkdir' by ${MKDIR}'.
Remove `-p' from mkdir arguments, it is already part of ${MKDIR}.
While here substitute a couple of ${PREFIX} by `%D' in
`@exec ${MKDIR} ...' lines and add a couple of missing `%D' in such lines too!
2002-06-26 10:29:33 +00:00
tron
715f6e7521 Recognize version 0.9.6d of "openssl" which is now used in NetBSD-current. 2002-06-16 12:26:43 +00:00
kleink
a763c90bcc G/c references to ftp.uni-trier.de. 2002-05-08 11:44:50 +00:00
itojun
f87f0472ac darwin has opensslv.h in /usr/local/include/openssl 2002-03-23 19:21:47 +00:00
skrll
08bdd44549 mkdir -> ${MKDIR}
rmdir -> ${RMDIR}
rm -> ${RM} (${RM} added to PLIST_SUBST)
chmod -> ${CHMOD}
chown -> ${CHOWN}
2002-02-15 10:12:28 +00:00
hubertf
5542206cba Get rid of manually adding "nbX" to PKGNAME when a pkg was changed in
pkgsrc. Instead, a new variable PKGREVISION is invented that can get
bumped independent of DISTNAME and PKGNAME.

Example #1:
        DISTNAME=       foo-X.Y
        PKGREVISION=    Z
     => PKGNAME=        foo-X.YnbZ

Example #2:
        DISTNAME=       barthing-X.Y
        PKGNAME=        bar-X.Y
        PKGREVISION=    Z
     => PKGNAME=        bar=X.YnbZ (!)

On subsequent changes, only PKGREVISION needs to be bumped, no more risk
of getting DISTNAME changed accidentally.
2001-11-29 01:12:24 +00:00
zuntum
c72c1cf5f9 Move pkg/ files into package's toplevel directory 2001-11-01 00:57:41 +00:00
veego
63ad910dee SVR4 packages have a limit of 9 chars for a package name.
The automatic truncation in gensolpkg doesn't work for packages which
have the same package name for the first 5-6 chars.
e.g. amanda-server and amanda-client would be named amanda and amanda.
Now, we add a SVR4_PKGNAME and use amacl for amanda-client and amase for
amanda-server.
All svr4 packages also have a vendor tag, so we have to reserve some chars
for this tag, which is normaly 3 or 4 chars. Thats why we can only use 6
or 5 chars for SVR4_PKGNAME. I used 5 for all the packages, to give the
vendor tag enough room.
All p5-* packages and a few other packages have now a SVR4_PKGNAME.
2001-10-18 15:20:01 +00:00
tron
5dd3db0a26 Add conflict between "glimpse" and "openssl" package. They both install
"bin/cast" in "${LOCALBASE}".
2001-10-18 04:51:04 +00:00
jlam
f2fc2f6cbe Link the openssl binary into the buildlink directory, too, since some
packages look for it.
2001-10-17 17:56:57 +00:00
jlam
f79573370a Mechanical changes to 375 files to change dependency patterns of the form
foo-* to foo-[0-9]*.  This is to cause the dependencies to match only the
packages whose base package name is "foo", and not those named "foo-bar".
A concrete example is p5-Net-* matching p5-Net-DNS as well as p5-Net.  Also
change dependency examples in Packages.txt to reflect this.
2001-09-27 23:17:41 +00:00
skrll
37fd599af3 Super bump the major numbers for libssl and libcrypto so that they don't
conflict with the -current versions.
2001-09-14 14:17:10 +00:00
skrll
bd6e00dc75 Record libssl dependency on libcrypt.
This allows a mixture of 1.5.x openssl (version<0.9.5) and security/openssl
(version>=0.9.6) to actually work.
2001-08-30 14:02:06 +00:00
skrll
41c724207c Fix version logic in 0.9.6a case. 2001-08-30 10:14:24 +00:00
jlam
d2eb68d2a6 Add dir_DEFAULT setting used by EVAL_PREFIX logic to set the default
installation directory in case the package isn't installed.
2001-07-27 13:33:18 +00:00
jlam
f79b2df20a Mechanical changes to buildlink.mk files to use EVAL_PREFIX to set
BUILDLINK_PREFIX.<pkgname>.  This allows buildlink to find X11BASE packages
regardless of whether they were installed before or after xpkgwedge was
installed.  Idea by Alistair Crooks <agc@pkgsrc.org>.

Also overhaul code to specify the minimum version of OpenSSL needed by
a dependent package.  We now set USE_OPENSSL_VERSION to the version number
in <openssl/opensslv.h>.  Idea also by Alistair Crooks <agc@pkgsrc.org>.
2001-07-20 01:54:50 +00:00
jlam
8559bffd4c Allow definition of USE_OPENSSL_096 force a minimum dependency of
openssl>=0.9.6.
2001-07-18 18:03:16 +00:00
fredb
cdc44631a6 Let USE_SSL accept latest version of openssl, in current. Patch supplied
by Martti Kuparinen in PR pk/13447.
2001-07-12 14:25:53 +00:00
wiz
12743c91d4 Pull in security fix from basesrc by itojun. Commit message was:
fix PRNG weakness.  the workaround presented on bugtraq posting.
Update to 0.9.6nb1.
2001-07-11 01:26:10 +00:00
tron
cb49807a85 Add support for "SPARC_TARGET_ARCH". 2001-07-10 15:08:32 +00:00
jlam
cb76bd5efc Move inclusion of bsd.buildlink.mk to start of file. 2001-07-01 22:59:08 +00:00
jlam
b6802e9266 Check for openssl>=0.9.5a when depending on openssl. 2001-06-28 21:22:18 +00:00
jlam
34d11d8a0f Generalize how the dependency pattern may be specified. Instead of just
FOO_REQD=1.0 being converted to foo>=1.0, one can now directly specify
the dependency pattern as FOO_DEPENDS=foo>=1.0.  This allows things like
JPEG_DEPENDS=jpeg-6b, or fancier expressions like for postgresql-lib.
Change existing FOO_REQD definitions in Makefiles to FOO_DEPENDS.
2001-06-23 19:26:48 +00:00
jlam
6f410a9bae Add buildlink.mk file for use by other program Makefiles. 2001-06-18 05:30:20 +00:00
abs
ca5e157ae5 linux is much like solaris (for today) 2001-05-22 09:56:02 +00:00
abs
621154e39c We also work under Linux 2001-05-22 09:46:16 +00:00
tron
b54440e1ef Move NetBSD only patches to a distribution patch file to avoid ugly
conditional patch hack.
2001-05-11 22:24:16 +00:00
tron
038a4c069d Convert all patches to unified output format. 2001-05-11 22:14:09 +00:00
jlam
d75cbbb9fd Change build dependency from perl-5.* to perl>=${PERL5_REQD}. Also change
dependency from libperl-5.* to libperl>=${PERL5_REQD}.
2001-04-30 04:16:08 +00:00
itojun
164d230264 clarify comment on LICENSE line. 2001-04-17 23:32:34 +00:00
agc
203a7fae92 As pointed out by Havard Eidnes: run "make patch" before attempting to
run "make makepatchsum", so that patch digests get calculated properly.

!!!This needs to be fixed properly to fit in with pkgsrc infrastructure.!!!
2001-04-17 19:32:16 +00:00
agc
2d6b6a009c + move the distfile digest/checksum value from files/md5 to distinfo
+ move the patch digest/checksum values from files/patch-sum to distinfo
2001-04-17 11:43:32 +00:00
tron
2929ae8dde - Install new include files so that this package can be used to build
applications again.
- Fix patch sum for Solaris.
2001-04-09 13:32:01 +00:00
fredb
bc0d2ef3b4 Update to OpenSSL 0.9.6. Update contributed by Dave Burgess,
in PR pkg/12569.

Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6:

    o Some documentation for BIO and SSL libraries.
    o Enhanced chain verification using key identifiers.
    o New sign and verify options to 'dgst' application.
    o Support for DER and PEM encoded messages in 'smime' application.
    o New 'rsautl' application, low level RSA utility. [*]
    o MD4 now included.
    o Bugfix for SSL rollback padding check.
    o Support for external crypto devices [1].
    o Enhanced EVP interface.

[1] The support for external crypto devices is currently a separate
      distribution.  See the file README.ENGINE.
[*] Not installed with the package.
2001-04-09 04:29:23 +00:00
fredb
5e16130edb Make an explicit BUILD_DEPENDS on perl5, rather than the run-time DEPENDS
that USE_PERL implies, as the core functionality of this package does not
depend on perl. The user can always install perl later, to format the "pod"
docs or to run the installed scripts.
2001-04-09 02:36:47 +00:00
wiz
383b86f10f Improve the description by borrowing from the web site ;) 2001-04-05 14:03:45 +00:00
wiz
7eb8846863 Standardize patch file names. 2001-04-05 13:57:14 +00:00
fredb
6ed737e35a - -Supply the customary symlinks for NetBSD/ELF.
- -Make the "test" target work.
- -Allow the user to set USE_RSAREF2. (It works!) Not sure why you'd
    ever want to...
2001-03-24 03:55:15 +00:00
wiz
742a34cf85 Add RCS Id, and remove -mv8 from sparc target. pkg/11765 by Klaus Klein. 2001-03-16 13:42:08 +00:00
hubertf
85e9837abb Revert rev. 1.30 which didn't do anything with MKDIR but rather
bumbed the version accidentally.
2001-03-01 13:57:53 +00:00
wiz
2ad4d8f28e security/openssl and converters/base64 both install a 'base64' executable,
so make them CONFLICT (pkg/11408).
2001-02-27 18:21:25 +00:00
hubertf
d32e698de6 Cleanup MKDIR usage => INSTALL_*_DIR
XXX need to teach pkglint to be more picky about this
2001-02-25 04:17:35 +00:00
hubertf
09e1f31963 Work around Solaris' braindead "ln -f" (which just does not do anything) 2001-02-20 18:04:17 +00:00
wiz
a87738b456 Update to new COMMENT style: COMMENT var in Makefile instead of pkg/COMMENT. 2001-02-17 17:42:09 +00:00
wiz
d7906c3ebd Some more MESSAGE cleanup. 2001-01-29 11:38:10 +00:00
dmcmahill
e3ab3aba58 remove PLIST entries which are not installed (on a.out _or_ ELF) 2001-01-23 20:55:21 +00:00
wiz
001fec7fa0 Should make this buildable on Solaris, too. Untested for lack of Solaris. 2001-01-17 10:46:30 +00:00
wiz
982b769774 If we have to choose if this works on Solaris or NetBSD, prefer NetBSD.
XXX: This needs some work. How to handle platform-dependent patches?
What's the problem with using the NetBSD patches on Solaris?
2001-01-17 10:09:51 +00:00
tron
fa7191ae26 Pass "${CC}" to configure script. 2001-01-14 01:52:23 +00:00
tron
67350f5123 Regen. 2001-01-14 01:51:53 +00:00
tron
cc4979a399 Don't force to use WS 5.0 on Solaris. 2001-01-14 01:51:12 +00:00
agc
9c2d582fc9 The way that shared objects were handled in the PLISTs and bsd.pkg.mk was
out of date - it was based on a.out OBJECT_FMT, and added entries in the
generated PLISTs to reflect the symlinks that ELF packages uses. It also
tried to be clever, and removed and recreated any symbolic links that were
created, which has resulted in some fun, especially with packages which
use dlopen(3) to load modules. Some recent changes to our ld.so to bring
it more into line with other Operating Systems also exposed some cracks.

+ Modify bsd.pkg.mk and its shared object handling, so that PLISTs now contain
the ELF symlinks.
+ Don't mess about with file system entries when handling shared objects in
bsd.pkg.mk, since it's likely that libtool and the BSD *.mk processing will
have got it right, and have a much better idea than we do.
+ Modify PLISTs to contain "ELF symlinks"
+ On a.out platforms, delete any "ELF symlinks" from the generated PLISTs
+ On ELF platforms, no extra processing needs to be done in bsd.pkg.mk
+ Modify print-PLIST target in bsd.pkg.mk to add dummy symlink entries on
a.out platforms
+ Update the documentation in Packages.txt

With many thanks to Thomas Klausner for keeping me honest with this.
2001-01-04 15:10:17 +00:00
wiz
04c985472d Enable on alpha again; according to itojun, the referenced PR doesn't
apply to the package.
2000-12-28 21:35:34 +00:00
rh
1a3a5c7ee1 Undo previous commit. These packages apparently handle patches specially. 2000-12-07 13:22:40 +00:00
rh
224a7afec4 Sync w/ reality 2000-12-07 12:46:47 +00:00
wennmach
e762848ee9 Openssl no longer conflicts with kth-krb4. 2000-10-11 16:30:12 +00:00
itojun
133bb03367 add LICENCE=fee-based-commercial-use, for use of IDEA/RC5 logic.
(per discussion on packages@netbsd.org)
2000-10-10 11:42:15 +00:00
hubertf
ac69036af9 openssl is broken on alpha, and openssh hangs in configure when checking
for openssl libs. Disable both, and reference PR to fix it.

XXX should be changed for USE_SSL.
2000-09-28 16:31:15 +00:00
fredb
0c6b58570c Reorganize crypto handling, as discussed on tech-pkg. Remove all
RESTRICTED= variables that were predicated on former U.S. export
regulations. Add CRYPTO=, as necessary, so it's still possible to
exclude all crypto packages from a build by setting MKCRYPTO=no
(but "lintpkgsrc -R" will no longer catch them).

Specifically,

- - All packages which set USE_SSL just lose their RESTRICTED
    variable, since MKCRYPTO responds to USE_SSL directly.
- - realplayer7 and ns-flash keep their RESTRICTED, which is based
    on license terms, but also gain the CRYPTO variable.
- - srp-client is now marked broken, since the distfile is evidently
    no longer available. On this, we're no worse off than before.
    [We haven't been mirroring the distfile, or testing the build!]
- - isakmpd gets CRYPTO for RESTRICTED, but remains broken.
- - crack loses all restrictions, as it does not evidently empower
    a user to utilize strong encryption (working definition: ability
    to encode a message that requires a secret key plus big number
    arithmetic to decode).
2000-09-09 19:40:14 +00:00
wennmach
48340f9e1e Added a CONFLICT with kth-krb4. Both pkgs install a `des' binary in
the same place, $PREFIX/bin/des.
2000-09-05 17:34:05 +00:00
wiz
45b78ed4d2 add RCS Id 2000-09-03 14:51:55 +00:00
jlam
06f0a4c3c2 Use new PERL5 variable instead of ${LOCALBASE}/bin/perl. 2000-08-27 02:46:03 +00:00
hubertf
e75965c6ba Update IGNORE-messages for recent changes: add ${PKGNAME} where
appropriate.
2000-08-21 21:01:29 +00:00
hubertf
402899809a Replace MIRROR_DISTFILES and NO_CDROM with the more descriptive and
more fine-grained NO_{BIN,SRC}_ON_{FTP,CDROM} definitions.

MIRROR_DISTFILES and NO_CDROM are now dead.
2000-08-18 22:46:29 +00:00
tron
26bc3d3c60 Add german mirror to master site list. 2000-07-24 11:11:16 +00:00
veego
30d9da4663 Fix last commit. 2000-05-12 06:10:35 +00:00
veego
35e049414d Support to build it on Solaris.
It would be easier to make that change if we support patches for one OPSYS
but someone removed that from out tree.
2000-05-10 12:28:37 +00:00
tron
19871dbe44 Don't complain on deinstallation if directory "${PREFIX}/certs" cannot
be removed.
2000-04-24 13:54:41 +00:00
fredb
b8d7b2eb99 Defuzz patches. 2000-04-22 05:07:02 +00:00
explorer
786a6128b8 upgrade to 0.9.5a 2000-04-21 02:15:37 +00:00
fredb
d8e78911c9 Make this compile on m68k. Old m68k hack for bin_div.c is broken for
OpenSSL-0.94, but that's OK, because it's evidently no longer needed.
2000-03-18 17:41:45 +00:00
fredb
a65f2ae264 Make this compile on m68k. Old m68k hack for bin_div.c is broken for
OpenSSL-0.94, but that's OK, because it's evidently no longer needed.
2000-03-18 16:52:33 +00:00
fredb
2782ab0195 Install the static libs, now that they're built anyway, and run "ranlib",
if it exists. Minor fix-up to PLIST. Closes PR pkg/8897.
2000-02-12 14:08:29 +00:00
wiz
2fedb0da63 RCS tags added 2000-02-05 04:41:15 +00:00
abs
1031a18ae4 Update depends to rsaref 2.0p3 1999-12-16 12:03:20 +00:00
erh
9e5d4ff0b9 Install the RSAglue library if USERSAREF2 if set to YES. 1999-11-26 19:14:56 +00:00
erh
c11044fe62 Update openssl to 0.9.4. 1999-11-25 18:51:47 +00:00
erh
745ae9714e Make openssl compile whether or not RSAref is defined. 1999-10-19 04:09:19 +00:00
simonb
08e996524e Fix typo in "mipsel". 1999-08-24 07:46:41 +00:00
agc
00a16e3008 Add package patch checksum files. 1999-07-09 14:22:59 +00:00
tron
8475357fcd Don't use "{}" or "[]" in "ONLY_FOR_PLATFORM" or "NOT_FOR_PLATFORM"
because "bsd.pkg.mk" can't handle those patterns. Fixes PR pkg/7808
by Chris Demetriou.
1999-06-20 21:06:17 +00:00
tv
d226be6c21 Let's get this right this time. It's 0.9.2b, not 0.9.2c. I'll get this
to 0.9.3 after the weekend.
1999-06-10 05:08:02 +00:00
tv
bb65b296a6 Revert previous. 1999-06-08 16:58:57 +00:00
tv
0298e68438 This is actually OpenSSL 0.9.2c. Revert part of previous. 1999-06-08 16:58:26 +00:00
mycroft
f7784037b2 Update to match the Makefile. 1999-06-04 16:33:53 +00:00
tv
41d79870d3 Update rsaref dependency to "2.0p2"; still pending update to OpenSSL 0.9.3. 1999-05-26 15:36:28 +00:00
tv
5c60ed5794 Change {ONLY,NOT}_FOR_{ARCH,OPSYS} format to {ONLY,NOT}_FOR_PLATFORM
pattern match format.  Minor pkglint along the way.
1999-05-24 20:39:35 +00:00
tv
2ff534a830 Update rsaref dependency to 2.0p1. OpenSSL 0.9.3 is still beta... will fix
shlib problems when 0.9.3 is out.
1999-05-23 21:15:20 +00:00
tv
f9516c43f3 Fix m68k compile as provided by <fb@enteract.com> in pkg/7152. 1999-05-01 17:12:00 +00:00
tv
4a29e61dd5 Import OpenSSL 0.9.2b pkg, a package which finally updates and fixes many
deficiencies in SSLeay.  Intended to be a drop-in replacement for SSLeay
(and still provides the command-prompt interface as "ssleay").
1999-04-30 15:19:13 +00:00