58 Commits

Author SHA1 Message Date
jca
86a1029472 Use ld(1) version scripts to fix symbol conflicts (hopefully) for good
Remove the symbol renaming workaround.  Use version scripts as done on
Linux and FreeBSD to hide internal symbols (eg HMAC_Update) that
conflict with libcrypto.

Tested in a bul by ajacoutot@, ok sthen@ naddy@, no objection landry@
(maintainer)
2019-04-16 18:45:41 +00:00
sthen
5af1768410 Rename additional symbols in NSS that conflict with libcrypto.
NSS has a number of internal functions (used inter-library between NSS's
various libraries, not exported in the public API) that conflict with
libcrypto:

HMAC_Init, HMAC_Update, MD5_Update, SHA1_Update, SHA224_Update,
SHA256_Update, SHA384_Update, SHA512_Update.

We were already renaming (via #define macro) SHA1_Update and HMAC_Update
but some programs use others - notably libreoffice, which uses HMAC_Init and
HMAC_Update when saving encrypted .od* files - as robert@ tracked down, the
NSS version was being called instead of the expected libcrypto one.

Fix by renaming the remaining conflicting functions the same way.
2019-04-07 18:48:38 +00:00
landry
c5961827d0 Update to nss 3.38.
Went in an amd64 bulk build, and probably required by gecko 62.
See https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.38_release_notes
2018-06-27 04:53:40 +00:00
landry
8473a639e7 Remove patch that was merged upstream in
2209bddb98
spotted by nigel@
2018-06-07 11:29:37 +00:00
landry
0ac926161e add link to upstream commit 2018-05-28 12:44:30 +00:00
landry
b06e682696 Fix build on !x86 by inconditionally building FStar.c. Cf
https://bugzilla.mozilla.org/show_bug.cgi?id=1459739#c2
2018-05-14 18:43:47 +00:00
landry
d6923b69fa Update to nss 3.37, needed by gecko 61.
See https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.37_release_notes

Interestingly, in nss 3.31 the way entropy is gathered from the system
was revamped, and in #1057343 it started using the getentropy() syscall
by default if available, with a fallback to /dev/urandom...but only on
linux/glibc 2.25.

Add a patch to also use getentropy() on OpenBSD.. reported upstream in
#1461075
2018-05-12 18:10:12 +00:00
landry
dd0100d4e4 Remove upstream patch from #1443400. 2018-04-10 09:55:00 +00:00
phessler
5892e31794 a much better fix, pulled from upstream.
OK landry@
2018-03-21 20:39:16 +00:00
phessler
5d4b3a62bd fix build on aarch64
OK sthen@
2018-03-21 20:01:00 +00:00
landry
ce81f2c321 Fix HaCl* build on non-clang archs by using -std=gnu99.
Better fix discussed upstream in #1436932
2018-02-09 08:23:38 +00:00
landry
e0697ba4c9 Instead of providing old versions of nss-config & nss.pc shoplifted ages
ago from Debian, just patch & use the ones added upstream in bug
#1277852. This way, we properly list the right libs when linking,
including nssutil3 (which should fix linking chrome with lld) - and
while here fix includedir to be consistent with cflags.

Prompted by an original diff from espie@
Tested in bulks by ajacoutot@ and myself
WANTLIB fixes removing softokn3 to come
2017-11-09 18:45:24 +00:00
landry
59331a241d Update to nss 3.32, will be required by upcoming gecko 56 releases.
See https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.32_release_notes
2017-08-07 18:48:22 +00:00
landry
bfccfb7fa2 Tentative fix for nss w/ clang on i386 - fix comparison trigerring
-Werror,-Wtautological-constant-out-of-range-compare.

Reported upstream as https://bugzilla.mozilla.org/show_bug.cgi?id=1384827
tested w/ make CC=clang on amd64 & i386
2017-07-27 06:33:25 +00:00
ajacoutot
1619cca8f2 Define HMAC_Update to NSS_HMAC_Update to prevent clashing symbol with libcrypto.
input from landry@ and miod@
2017-05-30 18:57:01 +00:00
landry
615e891338 Update to nss 3.28, will be required by upcoming firefox 51.
See https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28_release_notes

Enable TLS 1.3 (draft) support per
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.28_release_notes#Request_to_test_and_prepare_for_TLS_1.3.
2017-01-04 12:17:48 +00:00
landry
fc050c27fc Update to nss 3.27, required by gecko 50.
See
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.27_release_notes

Note that a bunch of CA's were removed, but not WoSign, because it owns
StartSSL/StartCOM.. see
https://docs.google.com/document/d/1C6BlmbeQfn4a9zydVi2UvjBGv6szuSB4sMYUcVrR8vQ/preview
and https://wiki.mozilla.org/CA:WoSign_Issues for details. Anyway, we
know the CA model is broken, right ?

Bump major, functions added/removed...
2016-10-06 12:10:22 +00:00
landry
7a3e950865 Update to nss 3.24, requirement of firefox 48.
- Remove patch-nss_lib_util_verref_h, merged upstream (#1226179)
- Remove useless patch-nss_coreconf_UNIX_mk, our -O2 takes precedence
- Remove chunk of patch-nss_coreconf_OpenBSD_mk, was merged upstream in
  #1250891. While here remove the addition of -Wl,Bsymbolic to MKSHLIB
which was here since forever for no justified reason.
2016-06-14 14:48:51 +00:00
landry
1d4125ae85 Update to nss 3.23.
See
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
for details.

Remove c++-comments patch, now that we remove -ansi from the build flags it
is allowed in C99. (see https://bugzilla.mozilla.org/show_bug.cgi?id=1250891)
2016-03-04 16:29:24 +00:00
landry
5ab13415e4 Trololololol. 2016-02-22 20:10:37 +00:00
landry
43f6eb0469 C++-style comments are bad. Srsly. 2016-02-22 20:01:05 +00:00
landry
5bd2a921a8 Update to nss 3.21.
Tested in a bulk and ok ajacoutot@, thanks!
2015-11-23 11:32:12 +00:00
landry
ba1b302d96 Remove the patch adding CACert, which has strict requirements on redistribution
(http://www.cacert.org/policy/RootDistributionLicense.php) which we don't meet.

Following what was done in src/lib/libssl/cert.pem r1.24 3 weeks ago.
ok sthen@
2014-04-29 12:01:54 +00:00
landry
49ec5a94fc Update to nss 3.16, will be needed by gecko 29.
See https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16_release_notes

Tested on ppc/amd64/sparc64.
2014-04-16 09:07:38 +00:00
landry
559f7b8b5e Update to nss 3.15.4, needed by gecko 27.
Contains a fix for (CVE-2013-1740): When false start is enabled, libssl
will sometimes return unencrypted, unauthenticated data from PR_Recv
(https://bugzilla.mozilla.org/show_bug.cgi?id=919877)

See https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.4_release_notes
2014-01-09 20:09:44 +00:00
landry
575289e06c SECURITY update to nss 3.15.3.1.
Bug 946351 - Misissued Google certificates from DCSSI
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.3.1_release_notes
2013-12-10 11:17:05 +00:00
landry
665aa1b119 Update to nss 3.15.
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15_release_notes

After years of sticking to CVS, upstream finally switched to hg,
changing its directory layout while here. All our patches are actually
unchanged, but got renamed/moved. CVS doesn't handle moves :)

Tested in an amd64 bulk build.
2013-06-23 18:40:01 +00:00
landry
6865587314 Security update to nss 3.14.3.
Fixes CVE-2013-1620 / bug #822365 (Lucky Thirteen attack)
Required by firefox 20 & later anyway.. and tested to work fine with 20.0b6.
2013-03-21 12:49:42 +00:00
landry
505f877d4b Update to nss 3.14.2.
Remove a useless patch, unix_rand.c uses /dev/urandom on OpenBSD since
bug #174993 was fixed more that 5 years ago in nss 3.5.
Enforce dependency on sqlite 3.7.15.2.
Went in a handful of bulk builds.
2013-03-18 20:38:13 +00:00
landry
e6eff40b58 Update to nss 3.14.1, required by upcoming fx 18.
Tested on sparc64 & hppa, and went into an amd64 bulk build.

Node that builtins/certdata.c patch goes to the attic since it's
autogenerated at build time from builtins/certdata.txt (which we patch
too for CACert roots) since bug #683266.

There might be a chemspill for a TURKTRUST CA distrust soon (bug
#825022, sg-only) but let's get this in now.
2012-12-29 20:03:17 +00:00
landry
051b961835 Remove the chunks only containing #@!#@!$@! rcs ids changes, patch was
not applying properly because of them.
Reported by ajacoutot@
2012-11-13 08:26:25 +00:00
landry
40547a68f6 Update to nss 3.14.
- use ${SUBST_CMD} instead of old-style perl -pi -e commands
- update nss-config from debian's nss-config.in, since apparently it
comes from there.. needed to fix detection by mozillas, otherwise the
current script returns 3.14 for --version while configure scripts
expect 3.14.0... grab version via awk on nss.h at runtime.

Tested on amd64/i386/powerpc and in an amd64 bulk build. Needed by
firefox 18.

ok sthen@ ajacoutot@ jasper@
2012-11-12 20:43:09 +00:00
landry
52c4c5958a Update to nss 3.13.6.
Needed by upcoming Mozilla 16 releases.
Been in a bunch of amd64 bulks, tested on ppc/sparc64 too.
ok ajacoutot@
2012-09-17 20:01:22 +00:00
ajacoutot
a89a75cd04 Garbage collect the /dev/arandom patches.
from Brad
ok landry@ sthen@
2012-03-08 12:13:00 +00:00
landry
fb31069d9c Update to nss 3.13.3.
This release actively distrusts the MITM subCA issued by TrustWave, see
details at https://bugzilla.mozilla.org/show_bug.cgi?id=724929 (also
#727167 & #728617). While here, depend on nspr 4.9.
2012-02-22 20:00:55 +00:00
landry
e1119cc19f Update to nss 3.12.2, needed by mozilla 11+.
Tested on alpha amd64 hppa i386 powerpc sparc64, no change in regress
output.
2012-02-20 09:18:05 +00:00
nigel
de798d08da Removing CVS markers from within the patch
reported by Mark Patruck
2011-11-18 23:31:01 +00:00
nigel
c9c77840a6 Update to 3.13.1 with ckbi 1.88 changes include
SSL 2.0 is disabled by default.

A defense against the SSL 3.0 and TLS 1.0 CBC chosen plaintext attack
demonstrated by Rizzo and Duong (CVE-2011-3389) is enabled by default.

SHA-224 is supported.

additional blacklist CA's.  Malaysia-based DigiCert Sdn. Bhd

Ok sthen@
2011-11-18 12:32:37 +00:00
landry
5bc0634f59 Damn you, RCS $Id$s... spotted by Greg Jones. 2011-09-07 05:22:52 +00:00
landry
21a1502fbb Update to nss 3.12.11p0 with ckbi 1.87, ckbi being the internal builtin CA
root/certificate database. This special release (along incoming mozilla
releases) fixes the DigiNotar mess, for which more info is available at
http://blog.gerv.net/2011/09/diginotar-compromise/, MFSA2011-34 and
http://blog.mozilla.com/security/2011/09/02/diginotar-removal-follow-up/
2011-09-06 19:39:34 +00:00
landry
77fcb12fe2 Update to nss 3.12.10, needed by upcoming mozilla updates.
ok martynas@ rpointel@.
2011-08-23 20:07:50 +00:00
landry
20218047ab Update to nss 3.12.9, required by ffx4.0b8 and later,and
soon-to-be-required by stable releases in other mozilla branches.
ok sthen@ martynas@
2011-01-15 16:59:37 +00:00
landry
54921dc6b1 Update to nss 3.12.8, required by upcoming moz* updates. Bump major and
switch to newer lib_depends while here.
2010-10-22 19:14:56 +00:00
landry
916b73b22c Oops, fix subtle typo in patch.
ok naddy@
2010-06-07 17:40:28 +00:00
landry
6c94d7699b Update to nss 3.12.6, tested by jasper@ in a bulk, thanks!
ok naddy@
2010-04-03 09:21:00 +00:00
ajacoutot
da8b64728a Remove useless patch.
No pkg change, no bump.

prodded by and ok naddy@
cvs: ----------------------------------------------------------------------
2009-11-14 22:52:20 +00:00
ajacoutot
cec9282f5c SHA1_Update conflicts with openssl which may be dynamically loaded
at runtime via other libs (cups, kerberos...) so causing a crash due to
using the wrong binding.
Rename here to avoid conflict.

from pkgsrc

ok sthen@ jasper@ robert@
2009-11-14 16:31:06 +00:00
martynas
c794c3de96 add cacert class 1 & class 3 to ckfw builtins; so the older mozilla
friends could use it too.  bumped minor.  ok naddy@
2009-08-08 12:57:17 +00:00
martynas
4e9112069d update to nss-3.12.3. security. please note, this will be needed
in stable for further mozilla-firefox security updates.
bulk build done by sthen@.  thanks!
2009-08-04 14:00:21 +00:00
jakemsr
0f8ed61c99 use /dev/arandom instead of /dev/urandom. /dev/urandom is too slow.
ok martynas@
2009-03-23 07:50:47 +00:00