70 Commits

Author SHA1 Message Date
tb
db0e16d257 security/openssl/1.0.2: fix alignment issue on sparc64
As diagnosed by kettenis, running the regress/lib/libssl/interop/openssl
test results in a SIGILL or SIGBUS due to an alignment issue. The reason
for this is that the configure magic fails to pick up -m64 which is
needed for the perlasm to generate the correct flavor of assembly.

None of the approaches for setting variables in the main port Makefile
worked.  Since we already patch out -O3 from Configure, I added -m64
there. The resulting binary seems to work well. The interop tests on
sparc64 pass with this patch.

Many thanks to kettenis for figuring this out and to sthen who helped
me save a lot of time with FLAVOR=no_man.

ok sthen
2021-01-07 21:55:33 +00:00
sthen
399e9c0aa0 add a no_man flavour to openssl packages, to speed testing of patches
etc (avoids pod2man of ~1700 files for 1.0 / ~4k files for 1.1)
2021-01-07 20:13:47 +00:00
sthen
f0fafcce6a skip generating html docs in the first place, rather than generating
them (with pod2html) and rm'ing.
2021-01-07 19:53:27 +00:00
sthen
9d5c13e71c update DESCR; warn about conflicts if the library is used with software
where other library dependencies use libressl.
2021-01-06 22:34:13 +00:00
sthen
ad9d69085d add a comment reminding to bump security/sslscan, suggested by phessler 2020-12-22 15:02:26 +00:00
sthen
5e5a0c45d7 update to openssl-1.1.1i, notable fixes:
- Fixed NULL pointer deref in the GENERAL_NAME_cmp function, CVE-2020-1971

- In 1.1.1h, an expired trusted (root) certificate was not anymore rejected
when validating a certificate path.
2020-12-08 14:57:47 +00:00
sthen
23f20bca78 doh, i fail at #ifdef. actually fix previous issue. 2020-12-03 11:58:48 +00:00
sthen
4e76066bb6 add a comment about the IPV6_V6ONLY patch:
On OpenBSD, setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, ...) only allows
setting to 1 (which is the default anyway). Setting to 0 results in EINVAL.

This doesn't fix everything, there are still some other problems with binds
to v6 addresses with OpenSSL 1.1 on OpenBSD.
2020-12-03 11:38:42 +00:00
sthen
0d261c0365 openssl/1.1: don't try using IPV6_V6ONLY which does EINVAL on OpenBSD
found while looking at https://marc.info/?t=160692394000004&r=1&w=2
issue in net/nagios/nsca-ng (but doesn't fix the problem)
2020-12-02 17:32:50 +00:00
sthen
c894a73d21 openssl ports: add PKGSPEC 2020-11-25 19:58:32 +00:00
sthen
66bcbfa29d update to openssl-1.1.1h 2020-09-23 15:24:03 +00:00
espie
b39082aa1a fix broken conflict spec. nice thinko 2020-07-05 10:05:40 +00:00
tb
f1a7dcecf4 Enable debug package for OpenSSL 1.1.
ok sthen
2020-06-05 16:47:57 +00:00
tb
955001fe20 update to OpenSSL 1.1.1g.
Addresses one high severity issue, CVE-2020-1967.

ok sthen
2020-04-22 04:31:53 +00:00
jca
bae84d9315 Don't attempt to use -Wa,--noexecstack, breaks build on sparc64
Detection succeeds on sparc64 where clang uses gas, but then build fails
because of a mix of -Wa,foobar unused argument warning and -Werror.
Just drop the use of --noexecstack, the stack is always marked
non-executable on OpenBSD.

ok sthen@ (maintainer)
2020-04-06 11:45:35 +00:00
tb
53ecbe3496 Update to OpenSSL 1.1.1f. Commit missing Makefile.inc piece from a
"drop maintainer" commit.

ok sthen
2020-03-31 14:50:08 +00:00
sthen
d6ec230fac update to openssl 1.1.1e 2020-03-17 18:38:39 +00:00
sthen
a3e5de8f53 drop maintainer 2020-02-03 20:40:37 +00:00
sthen
113114c55b update to openssl-1.0.2u 2019-12-20 17:11:58 +00:00
sthen
cd8873dda9 fix openssl 1.1 pc files, from kristaps 2019-12-05 16:24:07 +00:00
sthen
69ba377bf2 update to openssl-1.1.1d 2019-09-10 23:55:24 +00:00
sthen
98bc427df0 update to openssl-1.0.2t 2019-09-10 23:55:14 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
e3d9167a1d update to openssl-1.1.1c 2019-05-28 22:19:55 +00:00
sthen
1d2106febf update to openssl-1.0.2s 2019-05-28 21:34:08 +00:00
sthen
fc6f9c45b8 update to openssl-1.1.1b 2019-03-03 15:42:55 +00:00
sthen
e43f0ccabc update to openssl-1.0.2r 2019-03-03 14:56:25 +00:00
sthen
4e6789282a adjust PORTROACH marker, try again to get it to skip 1.1.1 2019-02-08 20:35:07 +00:00
sthen
72bf53aa28 add skipv:1.1.1 for portroach 2019-02-01 12:36:51 +00:00
sthen
77c208d298 Set `shared_target => "bsd-gcc-shared"' in 10-main.conf for i386 to force the
build system to assume gcc/binutils compatible linker. There is autodetection
in detect_gnu_ld() for partially unknown build targets but it's broken
(it tries to run $config{CC} -Wl,-V before it sets up $config{CC}, and even
if that did work, the regex matching output doesn't match LLD's string).

Initial research by naddy@. Mucu further headscratching and deciding on a
not-too-horrible way to work around the problem by me.

Unbreaks i386.
2019-01-31 22:04:40 +00:00
sthen
68ac84cbdb update to openssl-1.1.1a 2018-11-20 22:19:57 +00:00
sthen
b2ca7ff77a update to openssl-1.0.2q 2018-11-20 22:19:48 +00:00
sthen
5fcd38d614 mark BROKEN-i386 for now (undefined reference to `__guard_local'), not sure
what's going on yet..
2018-11-15 10:03:08 +00:00
naddy
dc2d68a931 recognize lld as compatible with GNU ld 2018-11-13 14:36:08 +00:00
tim
5646b8310d Use the right includedir in the .pc files; OK sthen@ 2018-11-10 20:38:07 +00:00
sthen
7531c6480c split the openssl port into branches; move the existing to 1.0.2 and add
a new 1.1 branch.
2018-11-07 11:00:29 +00:00
sthen
d7eb206082 update to OpenSSL 1.0.2p
- Client DoS due to large DH parameter (CVE-2018-0732)
- Cache timing vulnerability in RSA Key Generation (CVE-2018-0737)
2018-08-15 13:19:00 +00:00
visa
88477b0ad7 Fix make depend on gcc architectures.
OK sthen@
2018-05-15 15:15:05 +00:00
sthen
c75a2b1be7 security update to openssl 1.0.2o 2018-03-29 19:32:33 +00:00
sthen
bbcb9055da security update to OpenSSL 1.0.2n
- Read/write after SSL object in error state (CVE-2017-3737)
- rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
2017-12-08 21:07:42 +00:00
sthen
2e62db821c update to openssl-1.0.2m 2017-11-02 22:52:29 +00:00
naddy
347d9d266f Replace /dev/arandom with /dev/urandom. This code path has been removed
upstream.
2017-10-27 23:46:52 +00:00
sthen
4a7831cf7c update to OpenSSL-1.0.2l 2017-05-25 14:39:24 +00:00
sthen
873939c131 add portroach limit to 1.0.x 2017-03-28 14:14:01 +00:00
sthen
f7c4c5ccdb update to openssl-1.0.2k 2017-01-26 14:40:04 +00:00
sthen
3994a363bf update to OpenSSL 1.0.2j, "A bug fix which included a CRL sanity check
was added to OpenSSL 1.1.0 but was omitted from OpenSSL 1.0.2i. As a
result any attempt to use CRLs in OpenSSL 1.0.2i will crash with a null
pointer exception."

(not moved to 1.1.0 yet, so today's critical fix for CVE-2016-6309
doesn't apply).
2016-09-26 11:11:42 +00:00
sthen
b8ae22262a security update to OpenSSL 1.0.2i
major library bump because dtls1_clear_record_buffer() was removed
2016-09-22 21:18:06 +00:00
sthen
8225138536 update to OpenSSL-1.0.2h:
*) Prevent padding oracle in AES-NI CBC MAC check
*) Fix EVP_EncodeUpdate overflow
*) Fix EVP_EncryptUpdate overflow
*) Prevent ASN.1 BIO excessive memory allocation
*) EBCDIC overread
*) Modify behavior of ALPN to invoke callback after SNI/servername
callback, such that updates to the SSL_CTX affect ALPN.
*) Remove LOW from the DEFAULT cipher list, removing single DES
from the default.
*) Only remove the SSLv2 methods with the no-ssl2-method option.
When the methods are enabled and ssl2 is disabled the methods return
NULL.  (i.e. restore ABI compat with pre-1.0.2g cf. SSLv2_*_method)
2016-05-04 08:07:03 +00:00
sthen
fcd0185bd7 Fix OpenSSL which uses file on /usr/lib/libc.so.* to figure out if we're ELF
or not, which gets confused with libc.so.*.a files present.
2016-04-29 11:24:05 +00:00
sthen
b8f9aa2b27 add fallback MASTER_SITES 2016-03-19 12:16:04 +00:00