diff options
author | manu <manu@pkgsrc.org> | 2020-03-29 02:13:32 +0000 |
---|---|---|
committer | manu <manu@pkgsrc.org> | 2020-03-29 02:13:32 +0000 |
commit | 7b967dc2f1a264be44e7dd48e663f19fc43d56b1 (patch) | |
tree | 863d622c17973bbb6f39d723e2fec5fe594abb6b /security/libp11/patches | |
parent | 93c588bc97d18147aeb0a03720272890ef200799 (diff) | |
download | pkgsrc-7b967dc2f1a264be44e7dd48e663f19fc43d56b1.tar.gz |
Update libp11 to 0.4.4 so that we can build with NetBSD-9.0 newer OpenSSL
Changes since libp11-0.2.8 from the NEWS file:
New in 0.4.4; 2017-01-26; Michal Trojnara
* Fixed a state reset caused by re-login on LOAD_CERT_CTRL engine ctrl;
fixes #141 (Michal Trojnara)
* "?" and "&" allowed as URI separators; fixes #142 (Michal Trojnara)
* engine: Unified private/public key and certificate enumeration
to be performed without login if possible (Michal Trojnara)
New in 0.4.3; 2016-12-04; Michal Trojnara
* Use UI to get CKU_CONTEXT_SPECIFIC PINs (Michal Trojnara)
* Added graceful handling of alien (non-PKCS#11) keys (Michal Trojnara)
* Added symbol versioning (Nikos Mavrogiannopoulos)
* Soname tied with with the OpenSSL soname (Nikos Mavrogiannopoulos)
* Added MSYS2, Cygwin, and MinGW/MSYS support (Pawel Witas)
* Workaround implemented for a deadlock in PKCS#11 modules that
internally use OpenSSL engines (Michal Trojnara, Pawel Witas)
* Fixed an EVP_PKEY reference count leak (David Woodhouse)
* Fixed OpenSSL 1.1.x crash in public RSA methods (Doug Engert,
Michal Trojnara)
* Fixed OpenSSL 1.1.x builds (Nikos Mavrogiannopoulos, Michal Trojnara)
* Fixed retrieving PIN values from certificate URIs (Andrei Korikov)
* Fixed symlink installation (Alon Bar-Lev)
New in 0.4.2; 2016-09-25; Michal Trojnara
* Fixed a 0.4.0 regression bug causing the engine finish function to
remove any configured engine parameters; fixes #104 (Michal Trojnara)
New in 0.4.1; 2016-09-17; Michal Trojnara
* Use enginesdir provided by libcrypto.pc if available (David Woodhouse)
* Certificate cache destroyed on login/logout (David Woodhouse)
* Fixed accessing certificates marked as CKA_PRIVATE (David Woodhouse)
* Directly included libp11 code into the engine (Matt Hauck)
* Fixed handling simultaneous make jobs (Derek Straka)
* Reverted an old hack that broke engine initialization (Michal Trojnara)
* Fixed loading of multiple keys due to unneeded re-logging (Matt Hauck)
* Makefile fixes and improvements (Nikos Mavrogiannopoulos)
* Fixed several certificate selection bugs (Michal Trojnara)
* The signed message digest is truncated if it is too long for the
signing curve (David von Oheimb)
* Workaround for broken PKCS#11 modules not returning CKA_EC_POINT
in the ASN1_OCTET_STRING format (Michal Trojnara)
* OpenSSL 1.1.0 build fixes (Michal Trojnara)
New in 0.4.0; 2016-03-28; Michal Trojnara
* Merged engine_pkcs11 (Michal Trojnara)
* Added ECDSA support for OpenSSL < 1.0.2 (Michal Trojnara)
* Added ECDH key derivation support (Doug Engert and Michal Trojnara)
* Added support for RSA_NO_PADDING RSA private key decryption, used
by OpenSSL for various features including OAEP (Michal Trojnara)
* Added support for the ANSI X9.31 (RSA_X931_PADDING) RSA padding
(Michal Trojnara)
* Added support for RSA encryption (not only signing) (Michal Trojnara)
* Added CKA_ALWAYS_AUTHENTICATE support (Michal Trojnara)
* Fixed double locking the global engine lock (Michal Trojnara)
* Fixed incorrect errors reported on signing/encryption/decryption
(Michal Trojnara)
* Fixed deadlocks in keys and certificates listing (Brian Hinz)
* Use PKCS11_MODULE_PATH environment variable (Doug Engert)
* Added support for building against OpenSSL 1.1.0-dev (Doug Engert)
* Returned EVP_PKEY objects are no longer "const" (Michal Trojnara)
* Fixed building against OpenSSL 0.9.8 (Michal Trojnara)
* Removed support for OpenSSL 0.9.7 (Michal Trojnara)
New in 0.3.1; 2016-01-22; Michal Trojnara
* Added PKCS11_is_logged_in to the API (Mikhail Denisenko)
* Added PKCS11_enumerate_public_keys to the API (Michal Trojnara)
* Fixed EVP_PKEY handling of public keys (Michal Trojnara)
* Added thread safety based on OpenSSL dynamic locks (Michal Trojnara)
* A private index is allocated for ex_data access (RSA and ECDSA classes)
instead of using the reserved index zero (app_data) (Michal Trojnara)
* Fixes in reinitialization after fork; addresses #39
(Michal Trojnara)
* Improved searching for dlopen() (Christoph Moench-Tegeder)
* MSVC build fixes (Michal Trojnara)
* Fixed memory leaks in pkcs11_get_evp_key_rsa() (Michal Trojnara)
New in 0.3.0; 2015-10-09; Nikos Mavrogiannopoulos
* Added small test suite based on softhsm (run on make check)
* Memory leak fixes (Christian Heimes)
* On module initialization tell the module to that the OS locking
primitives are OK to use (Mike Gerow)
* Transparently handle applications that fork. That is call C_Initialize()
and reopen any handles if a fork is detected.
* Eliminated any hard coded limits for certificate size (Doug Engert)
* Added support for ECDSA (Doug Engert)
* Allow RSA_NO_PADDING padding mode in PKCS11_private_encrypt
(Stephane Adenot)
* Eliminated several hard-coded limits in parameter sizes.
Diffstat (limited to 'security/libp11/patches')
-rw-r--r-- | security/libp11/patches/patch-Makefile.am | 19 |
1 files changed, 11 insertions, 8 deletions
diff --git a/security/libp11/patches/patch-Makefile.am b/security/libp11/patches/patch-Makefile.am index a8688b1b9d3..db12b7daa27 100644 --- a/security/libp11/patches/patch-Makefile.am +++ b/security/libp11/patches/patch-Makefile.am @@ -1,22 +1,25 @@ -$NetBSD: patch-Makefile.am,v 1.1 2014/04/02 20:14:19 gdt Exp $ +$NetBSD: patch-Makefile.am,v 1.2 2020/03/29 02:13:32 manu Exp $ Don't install NEWS, as usually it is not. Don't install a README about a wiki copy that isn't there. These changes have not yet been submitted upstream. ---- Makefile.am.orig 2011-04-15 11:52:31.000000000 +0000 -+++ Makefile.am -@@ -16,9 +16,10 @@ EXTRA_DIST = svnignore Makefile.mak winc +--- Makefile.am.orig 2017-01-26 22:19:45.000000000 +0100 ++++ Makefile.am 2020-03-28 02:57:20.450453387 +0100 +@@ -14,12 +14,13 @@ + EXTRA_DIST = Makefile.mak make.rules.mak README.md + + dist_noinst_DATA = COPYING INSTALL.md - dist_noinst_DATA = COPYING bootstrap \ - $(srcdir)/examples/Makefile $(srcdir)/examples/*.c $(srcdir)/examples/README -dist_doc_DATA = NEWS +#dist_doc_DATA = NEWS --SUBDIRS = src doc + # Prerequisites must be first on the list +-SUBDIRS = src doc examples tests +SUBDIRS = src -+# doc ++# doc examples tests # Allow detection of packaged tarball dist-hook: + $(MKDIR_P) "$(distdir)/m4" |