46 Commits

Author SHA1 Message Date
sthen
1d2106febf update to openssl-1.0.2s 2019-05-28 21:34:08 +00:00
sthen
fc6f9c45b8 update to openssl-1.1.1b 2019-03-03 15:42:55 +00:00
sthen
e43f0ccabc update to openssl-1.0.2r 2019-03-03 14:56:25 +00:00
sthen
4e6789282a adjust PORTROACH marker, try again to get it to skip 1.1.1 2019-02-08 20:35:07 +00:00
sthen
72bf53aa28 add skipv:1.1.1 for portroach 2019-02-01 12:36:51 +00:00
sthen
77c208d298 Set `shared_target => "bsd-gcc-shared"' in 10-main.conf for i386 to force the
build system to assume gcc/binutils compatible linker. There is autodetection
in detect_gnu_ld() for partially unknown build targets but it's broken
(it tries to run $config{CC} -Wl,-V before it sets up $config{CC}, and even
if that did work, the regex matching output doesn't match LLD's string).

Initial research by naddy@. Mucu further headscratching and deciding on a
not-too-horrible way to work around the problem by me.

Unbreaks i386.
2019-01-31 22:04:40 +00:00
sthen
68ac84cbdb update to openssl-1.1.1a 2018-11-20 22:19:57 +00:00
sthen
b2ca7ff77a update to openssl-1.0.2q 2018-11-20 22:19:48 +00:00
sthen
5fcd38d614 mark BROKEN-i386 for now (undefined reference to `__guard_local'), not sure
what's going on yet..
2018-11-15 10:03:08 +00:00
naddy
dc2d68a931 recognize lld as compatible with GNU ld 2018-11-13 14:36:08 +00:00
tim
5646b8310d Use the right includedir in the .pc files; OK sthen@ 2018-11-10 20:38:07 +00:00
sthen
7531c6480c split the openssl port into branches; move the existing to 1.0.2 and add
a new 1.1 branch.
2018-11-07 11:00:29 +00:00
sthen
d7eb206082 update to OpenSSL 1.0.2p
- Client DoS due to large DH parameter (CVE-2018-0732)
- Cache timing vulnerability in RSA Key Generation (CVE-2018-0737)
2018-08-15 13:19:00 +00:00
visa
88477b0ad7 Fix make depend on gcc architectures.
OK sthen@
2018-05-15 15:15:05 +00:00
sthen
c75a2b1be7 security update to openssl 1.0.2o 2018-03-29 19:32:33 +00:00
sthen
bbcb9055da security update to OpenSSL 1.0.2n
- Read/write after SSL object in error state (CVE-2017-3737)
- rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
2017-12-08 21:07:42 +00:00
sthen
2e62db821c update to openssl-1.0.2m 2017-11-02 22:52:29 +00:00
naddy
347d9d266f Replace /dev/arandom with /dev/urandom. This code path has been removed
upstream.
2017-10-27 23:46:52 +00:00
sthen
4a7831cf7c update to OpenSSL-1.0.2l 2017-05-25 14:39:24 +00:00
sthen
873939c131 add portroach limit to 1.0.x 2017-03-28 14:14:01 +00:00
sthen
f7c4c5ccdb update to openssl-1.0.2k 2017-01-26 14:40:04 +00:00
sthen
3994a363bf update to OpenSSL 1.0.2j, "A bug fix which included a CRL sanity check
was added to OpenSSL 1.1.0 but was omitted from OpenSSL 1.0.2i. As a
result any attempt to use CRLs in OpenSSL 1.0.2i will crash with a null
pointer exception."

(not moved to 1.1.0 yet, so today's critical fix for CVE-2016-6309
doesn't apply).
2016-09-26 11:11:42 +00:00
sthen
b8ae22262a security update to OpenSSL 1.0.2i
major library bump because dtls1_clear_record_buffer() was removed
2016-09-22 21:18:06 +00:00
sthen
8225138536 update to OpenSSL-1.0.2h:
*) Prevent padding oracle in AES-NI CBC MAC check
*) Fix EVP_EncodeUpdate overflow
*) Fix EVP_EncryptUpdate overflow
*) Prevent ASN.1 BIO excessive memory allocation
*) EBCDIC overread
*) Modify behavior of ALPN to invoke callback after SNI/servername
callback, such that updates to the SSL_CTX affect ALPN.
*) Remove LOW from the DEFAULT cipher list, removing single DES
from the default.
*) Only remove the SSLv2 methods with the no-ssl2-method option.
When the methods are enabled and ssl2 is disabled the methods return
NULL.  (i.e. restore ABI compat with pre-1.0.2g cf. SSLv2_*_method)
2016-05-04 08:07:03 +00:00
sthen
fcd0185bd7 Fix OpenSSL which uses file on /usr/lib/libc.so.* to figure out if we're ELF
or not, which gets confused with libc.so.*.a files present.
2016-04-29 11:24:05 +00:00
sthen
b8f9aa2b27 add fallback MASTER_SITES 2016-03-19 12:16:04 +00:00
naddy
061bb68878 remove NO_SHARED_LIBS and merge PFRAG.shared into PLIST; ok sthen@ 2016-03-11 23:03:21 +00:00
sthen
56b00461ae now that sslscan uses a special build, disable ssl3/rc5 again in openssl port 2016-03-07 10:58:49 +00:00
sthen
20f753acb5 security update to OpenSSL 1.0.2g, for the few things in ports which use it 2016-03-01 15:37:53 +00:00
sthen
a7c01a49e1 fix the installed pkg-config files, issue reported a while ago by
Wladimir J. van der Laan
2016-01-29 15:23:43 +00:00
sthen
0da19f8387 cherrypick patch from OpenSSL_1_0_2-stable upstream:
Correct number of arguments in BIO_get_conn_int_port macro.
2016-01-28 22:50:59 +00:00
sthen
96f7a8769d security update to openssl-1.0.2f
http://www.openssl.org/news/openssl-1.0.2-notes.html
2016-01-28 15:51:38 +00:00
sthen
648fa1e2a7 The upstream distfile was quietly re-rolled. 2015-12-03 19:39:59 +00:00
sthen
15b08744d2 update to OpenSSL 1.0.2e, patching around the pod2mantest script missing
in the distribution tar file.

- BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193, Aug 13)

- Certificate verify crash with missing PSS parameter (CVE-2015-3194, Aug 27)

- X509_ATTRIBUTE memory leak (CVE-2015-3195, Nov 9)

(plus the advisory mentions an issue fixed in 1.0.2d)
2015-12-03 16:21:30 +00:00
sthen
6cddeec814 update to openssl-1.0.2d 2015-09-12 19:29:34 +00:00
sthen
29d2b02fdc tweak port 2015-07-19 00:39:01 +00:00
sthen
b3937349db Reenable crappy old protocols, mainly for use with sslscan (which connects
to a server to identify supported SSL/TLS methods) - note that this port is
not used generally within OpenBSD, only for testing and special cases.
2015-07-19 00:06:42 +00:00
sthen
56467fc126 security update to openssl-1.0.1o (libressl is not affected by this problem)
During certificate verification, OpenSSL (starting from version 1.0.1n and
1.0.2b) will attempt to find an alternative certificate chain if the first
attempt to build such a chain fails. An error in the implementation of this
logic can mean that an attacker could cause certain checks on untrusted
certificates to be bypassed, such as the CA flag, enabling them to use a valid
leaf certificate to act as a CA and "issue" an invalid certificate.

This issue will impact any application that verifies certificates including
SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
2015-07-09 14:49:35 +00:00
sthen
a97ffba88f update to openssl-1.0.1o, restoring ABI 2015-06-13 11:30:00 +00:00
sthen
6cb657f283 update to openssl-1.0.1n; http://www.openssl.org/news/secadv_20150611.txt 2015-06-11 15:30:17 +00:00
sthen
f9790344fd SECURITY update to OpenSSL 1.0.1m
http://openssl.org/news/secadv_20150319.txt
2015-03-19 16:22:04 +00:00
sthen
a059c9ae72 update to openssl 1.0.1k 2015-01-09 18:36:32 +00:00
sthen
e45e6daad9 update to openssl-1.0.1j, build with no-ssl3 2014-10-15 15:01:11 +00:00
landry
d1366585d7 Fix build on sparc64.
In the 'you didnt think openssl was that insane' series, it tries to use
m4 -B 8192 to generate some sparc asm from an m4 file.
Unsurprisingly, our m4 doesn't support -B, it's not even in gm4's manpage,
and gm4 info page says this about -B :
     These options are present for compatibility with System V `m4', but
     do nothing in this implementation.  They may disappear in future
     releases, and issue a warning to that effect.

I'm glad openssl can be built with System V m4..
2014-08-22 07:59:54 +00:00
sthen
5d6de15498 security update to OpenSSL 1.0.1i 2014-08-21 23:15:57 +00:00
sthen
ccd7379d11 Add a port for openssl-1.0.1h, carefully installing files outside of
standard paths searched for by third-party software to ensure that it's
not picked up by autoconf-type programs. This is not intended for general
use, but allows us to continue using specific software relying on APIs
which have been removed from LibReSSL, and for test/comparison purposes.

Various feedback from zhuk@ and jca@, earlier version ok zhuk@ (with only
minor file/path shuffling since then).
2014-07-15 22:23:16 +00:00