119 Commits

Author SHA1 Message Date
sthen
56b00461ae now that sslscan uses a special build, disable ssl3/rc5 again in openssl port 2016-03-07 10:58:49 +00:00
sthen
20f753acb5 security update to OpenSSL 1.0.2g, for the few things in ports which use it 2016-03-01 15:37:53 +00:00
sthen
a7c01a49e1 fix the installed pkg-config files, issue reported a while ago by
Wladimir J. van der Laan
2016-01-29 15:23:43 +00:00
sthen
0da19f8387 cherrypick patch from OpenSSL_1_0_2-stable upstream:
Correct number of arguments in BIO_get_conn_int_port macro.
2016-01-28 22:50:59 +00:00
sthen
96f7a8769d security update to openssl-1.0.2f
http://www.openssl.org/news/openssl-1.0.2-notes.html
2016-01-28 15:51:38 +00:00
sthen
648fa1e2a7 The upstream distfile was quietly re-rolled. 2015-12-03 19:39:59 +00:00
sthen
15b08744d2 update to OpenSSL 1.0.2e, patching around the pod2mantest script missing
in the distribution tar file.

- BN_mod_exp may produce incorrect results on x86_64 (CVE-2015-3193, Aug 13)

- Certificate verify crash with missing PSS parameter (CVE-2015-3194, Aug 27)

- X509_ATTRIBUTE memory leak (CVE-2015-3195, Nov 9)

(plus the advisory mentions an issue fixed in 1.0.2d)
2015-12-03 16:21:30 +00:00
sthen
6cddeec814 update to openssl-1.0.2d 2015-09-12 19:29:34 +00:00
sthen
29d2b02fdc tweak port 2015-07-19 00:39:01 +00:00
sthen
b3937349db Reenable crappy old protocols, mainly for use with sslscan (which connects
to a server to identify supported SSL/TLS methods) - note that this port is
not used generally within OpenBSD, only for testing and special cases.
2015-07-19 00:06:42 +00:00
sthen
56467fc126 security update to openssl-1.0.1o (libressl is not affected by this problem)
During certificate verification, OpenSSL (starting from version 1.0.1n and
1.0.2b) will attempt to find an alternative certificate chain if the first
attempt to build such a chain fails. An error in the implementation of this
logic can mean that an attacker could cause certain checks on untrusted
certificates to be bypassed, such as the CA flag, enabling them to use a valid
leaf certificate to act as a CA and "issue" an invalid certificate.

This issue will impact any application that verifies certificates including
SSL/TLS/DTLS clients and SSL/TLS/DTLS servers using client authentication.
2015-07-09 14:49:35 +00:00
sthen
a97ffba88f update to openssl-1.0.1o, restoring ABI 2015-06-13 11:30:00 +00:00
sthen
6cb657f283 update to openssl-1.0.1n; http://www.openssl.org/news/secadv_20150611.txt 2015-06-11 15:30:17 +00:00
sthen
f9790344fd SECURITY update to OpenSSL 1.0.1m
http://openssl.org/news/secadv_20150319.txt
2015-03-19 16:22:04 +00:00
sthen
a059c9ae72 update to openssl 1.0.1k 2015-01-09 18:36:32 +00:00
sthen
e45e6daad9 update to openssl-1.0.1j, build with no-ssl3 2014-10-15 15:01:11 +00:00
landry
d1366585d7 Fix build on sparc64.
In the 'you didnt think openssl was that insane' series, it tries to use
m4 -B 8192 to generate some sparc asm from an m4 file.
Unsurprisingly, our m4 doesn't support -B, it's not even in gm4's manpage,
and gm4 info page says this about -B :
     These options are present for compatibility with System V `m4', but
     do nothing in this implementation.  They may disappear in future
     releases, and issue a warning to that effect.

I'm glad openssl can be built with System V m4..
2014-08-22 07:59:54 +00:00
sthen
5d6de15498 security update to OpenSSL 1.0.1i 2014-08-21 23:15:57 +00:00
sthen
ccd7379d11 Add a port for openssl-1.0.1h, carefully installing files outside of
standard paths searched for by third-party software to ensure that it's
not picked up by autoconf-type programs. This is not intended for general
use, but allows us to continue using specific software relying on APIs
which have been removed from LibReSSL, and for test/comparison purposes.

Various feedback from zhuk@ and jca@, earlier version ok zhuk@ (with only
minor file/path shuffling since then).
2014-07-15 22:23:16 +00:00