119 Commits

Author SHA1 Message Date
sthen
399e9c0aa0 add a no_man flavour to openssl packages, to speed testing of patches
etc (avoids pod2man of ~1700 files for 1.0 / ~4k files for 1.1)
2021-01-07 20:13:47 +00:00
sthen
f0fafcce6a skip generating html docs in the first place, rather than generating
them (with pod2html) and rm'ing.
2021-01-07 19:53:27 +00:00
sthen
9d5c13e71c update DESCR; warn about conflicts if the library is used with software
where other library dependencies use libressl.
2021-01-06 22:34:13 +00:00
sthen
ad9d69085d add a comment reminding to bump security/sslscan, suggested by phessler 2020-12-22 15:02:26 +00:00
sthen
5e5a0c45d7 update to openssl-1.1.1i, notable fixes:
- Fixed NULL pointer deref in the GENERAL_NAME_cmp function, CVE-2020-1971

- In 1.1.1h, an expired trusted (root) certificate was not anymore rejected
when validating a certificate path.
2020-12-08 14:57:47 +00:00
sthen
23f20bca78 doh, i fail at #ifdef. actually fix previous issue. 2020-12-03 11:58:48 +00:00
sthen
4e76066bb6 add a comment about the IPV6_V6ONLY patch:
On OpenBSD, setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, ...) only allows
setting to 1 (which is the default anyway). Setting to 0 results in EINVAL.

This doesn't fix everything, there are still some other problems with binds
to v6 addresses with OpenSSL 1.1 on OpenBSD.
2020-12-03 11:38:42 +00:00
sthen
0d261c0365 openssl/1.1: don't try using IPV6_V6ONLY which does EINVAL on OpenBSD
found while looking at https://marc.info/?t=160692394000004&r=1&w=2
issue in net/nagios/nsca-ng (but doesn't fix the problem)
2020-12-02 17:32:50 +00:00
sthen
c894a73d21 openssl ports: add PKGSPEC 2020-11-25 19:58:32 +00:00
sthen
66bcbfa29d update to openssl-1.1.1h 2020-09-23 15:24:03 +00:00
espie
b39082aa1a fix broken conflict spec. nice thinko 2020-07-05 10:05:40 +00:00
tb
f1a7dcecf4 Enable debug package for OpenSSL 1.1.
ok sthen
2020-06-05 16:47:57 +00:00
tb
955001fe20 update to OpenSSL 1.1.1g.
Addresses one high severity issue, CVE-2020-1967.

ok sthen
2020-04-22 04:31:53 +00:00
jca
bae84d9315 Don't attempt to use -Wa,--noexecstack, breaks build on sparc64
Detection succeeds on sparc64 where clang uses gas, but then build fails
because of a mix of -Wa,foobar unused argument warning and -Werror.
Just drop the use of --noexecstack, the stack is always marked
non-executable on OpenBSD.

ok sthen@ (maintainer)
2020-04-06 11:45:35 +00:00
tb
53ecbe3496 Update to OpenSSL 1.1.1f. Commit missing Makefile.inc piece from a
"drop maintainer" commit.

ok sthen
2020-03-31 14:50:08 +00:00
sthen
d6ec230fac update to openssl 1.1.1e 2020-03-17 18:38:39 +00:00
sthen
a3e5de8f53 drop maintainer 2020-02-03 20:40:37 +00:00
sthen
113114c55b update to openssl-1.0.2u 2019-12-20 17:11:58 +00:00
sthen
cd8873dda9 fix openssl 1.1 pc files, from kristaps 2019-12-05 16:24:07 +00:00
sthen
69ba377bf2 update to openssl-1.1.1d 2019-09-10 23:55:24 +00:00
sthen
98bc427df0 update to openssl-1.0.2t 2019-09-10 23:55:14 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
e3d9167a1d update to openssl-1.1.1c 2019-05-28 22:19:55 +00:00
sthen
1d2106febf update to openssl-1.0.2s 2019-05-28 21:34:08 +00:00
sthen
fc6f9c45b8 update to openssl-1.1.1b 2019-03-03 15:42:55 +00:00
sthen
e43f0ccabc update to openssl-1.0.2r 2019-03-03 14:56:25 +00:00
sthen
4e6789282a adjust PORTROACH marker, try again to get it to skip 1.1.1 2019-02-08 20:35:07 +00:00
sthen
72bf53aa28 add skipv:1.1.1 for portroach 2019-02-01 12:36:51 +00:00
sthen
77c208d298 Set `shared_target => "bsd-gcc-shared"' in 10-main.conf for i386 to force the
build system to assume gcc/binutils compatible linker. There is autodetection
in detect_gnu_ld() for partially unknown build targets but it's broken
(it tries to run $config{CC} -Wl,-V before it sets up $config{CC}, and even
if that did work, the regex matching output doesn't match LLD's string).

Initial research by naddy@. Mucu further headscratching and deciding on a
not-too-horrible way to work around the problem by me.

Unbreaks i386.
2019-01-31 22:04:40 +00:00
sthen
68ac84cbdb update to openssl-1.1.1a 2018-11-20 22:19:57 +00:00
sthen
b2ca7ff77a update to openssl-1.0.2q 2018-11-20 22:19:48 +00:00
sthen
5fcd38d614 mark BROKEN-i386 for now (undefined reference to `__guard_local'), not sure
what's going on yet..
2018-11-15 10:03:08 +00:00
naddy
dc2d68a931 recognize lld as compatible with GNU ld 2018-11-13 14:36:08 +00:00
tim
5646b8310d Use the right includedir in the .pc files; OK sthen@ 2018-11-10 20:38:07 +00:00
sthen
7531c6480c split the openssl port into branches; move the existing to 1.0.2 and add
a new 1.1 branch.
2018-11-07 11:00:29 +00:00
sthen
d7eb206082 update to OpenSSL 1.0.2p
- Client DoS due to large DH parameter (CVE-2018-0732)
- Cache timing vulnerability in RSA Key Generation (CVE-2018-0737)
2018-08-15 13:19:00 +00:00
visa
88477b0ad7 Fix make depend on gcc architectures.
OK sthen@
2018-05-15 15:15:05 +00:00
sthen
c75a2b1be7 security update to openssl 1.0.2o 2018-03-29 19:32:33 +00:00
sthen
bbcb9055da security update to OpenSSL 1.0.2n
- Read/write after SSL object in error state (CVE-2017-3737)
- rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
2017-12-08 21:07:42 +00:00
sthen
2e62db821c update to openssl-1.0.2m 2017-11-02 22:52:29 +00:00
naddy
347d9d266f Replace /dev/arandom with /dev/urandom. This code path has been removed
upstream.
2017-10-27 23:46:52 +00:00
sthen
4a7831cf7c update to OpenSSL-1.0.2l 2017-05-25 14:39:24 +00:00
sthen
873939c131 add portroach limit to 1.0.x 2017-03-28 14:14:01 +00:00
sthen
f7c4c5ccdb update to openssl-1.0.2k 2017-01-26 14:40:04 +00:00
sthen
3994a363bf update to OpenSSL 1.0.2j, "A bug fix which included a CRL sanity check
was added to OpenSSL 1.1.0 but was omitted from OpenSSL 1.0.2i. As a
result any attempt to use CRLs in OpenSSL 1.0.2i will crash with a null
pointer exception."

(not moved to 1.1.0 yet, so today's critical fix for CVE-2016-6309
doesn't apply).
2016-09-26 11:11:42 +00:00
sthen
b8ae22262a security update to OpenSSL 1.0.2i
major library bump because dtls1_clear_record_buffer() was removed
2016-09-22 21:18:06 +00:00
sthen
8225138536 update to OpenSSL-1.0.2h:
*) Prevent padding oracle in AES-NI CBC MAC check
*) Fix EVP_EncodeUpdate overflow
*) Fix EVP_EncryptUpdate overflow
*) Prevent ASN.1 BIO excessive memory allocation
*) EBCDIC overread
*) Modify behavior of ALPN to invoke callback after SNI/servername
callback, such that updates to the SSL_CTX affect ALPN.
*) Remove LOW from the DEFAULT cipher list, removing single DES
from the default.
*) Only remove the SSLv2 methods with the no-ssl2-method option.
When the methods are enabled and ssl2 is disabled the methods return
NULL.  (i.e. restore ABI compat with pre-1.0.2g cf. SSLv2_*_method)
2016-05-04 08:07:03 +00:00
sthen
fcd0185bd7 Fix OpenSSL which uses file on /usr/lib/libc.so.* to figure out if we're ELF
or not, which gets confused with libc.so.*.a files present.
2016-04-29 11:24:05 +00:00
sthen
b8f9aa2b27 add fallback MASTER_SITES 2016-03-19 12:16:04 +00:00
naddy
061bb68878 remove NO_SHARED_LIBS and merge PFRAG.shared into PLIST; ok sthen@ 2016-03-11 23:03:21 +00:00