summaryrefslogtreecommitdiff
path: root/security/botan-devel
AgeCommit message (Collapse)AuthorFilesLines
2016-11-23Restore explicit CPU selection based on MACHINE_ARCH, needing e.g. onjoerg1-1/+13
SmartOS.
2016-11-17Regen.joerg1-2/+2
2016-11-11Bump ABI version for major bump.joerg1-2/+2
2016-11-11Become maintainer.joerg1-2/+2
2016-11-11Move Solaris-specific code first, at least SmartOS doesn't supportjoerg1-9/+11
'RLIMIT_MEMLOCK' and fails with the default mlock code.
2016-11-11Update to Botan-1.11.33:joerg5-77/+45
- avoid side channel with OAEP (CVE-2016-8871) - avoid Lucky13 timing attack against CBC-based TLS cipher - added X25519-based key exchange for TLS - add support for the TLS Supported Point Formats Extension from RFC 4492 - add support for the NewHope Ring-LWE key encapsulation algorithm for estimated ~200 bit security level against a quantum attacker. - add support for TLS Encrypt-then-MAC extension - Fix undefined behavior in Curve25519 for 32bit platforms - bugfix for GCM when 32-bit counters overflowed - added ChaCha20Poly1305 TLS cipher
2016-10-07Revbump post boost updateadam2-3/+4
2016-07-02Fix PLIST for i386.joerg1-2/+2
2016-05-31Use library pattern on the BSDs as well.joerg5-1/+61
2016-05-19Update to Botan 1.11.29:joerg9-139/+69
- CVE-2016-2849: side channel attack against DSA and ECDSA - CVE-2016-2850: failure to enforce TLS policies could lead to weaker algorithms being choosen - CVE-2016-2195: heap overflow in ECC point decoding - CVE-2016-2196: heap overflow in P-521 reduction - CVE-2016-2194: DOS against the modular reduction - CVE-2015-7824: padding oracle attack against TLS CBC - CVE-2015-7825: DOS due to certificate chains - CVE-2015-7826: wildcard certifications verification failures - CVE-2015-7827: protection against PKCS#1 side channel issues - CVE-2015-5726: potential DOS with invalid zero-length BER - CVE-2015-5727: unbound memory use with BER - deprecation or removal of various insecure crypto primitives - TLS heartbeat removed - various other bugfixes and improvements.
2016-02-26Remove manual addition of MAKE_FLAGS to OPSYSVARS, it's now in by default.jperkin1-2/+1
2016-02-26Use OPSYSVARS.jperkin1-4/+3
2015-12-29Sort.dholland1-18/+18
2015-11-04Add SHA512 digests for distfiles for security categoryagc1-1/+2
Problems found locating distfiles: Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz Package libidea: missing distfile libidea-0.8.2b.tar.gz Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2 Package uvscan: missing distfile vlp4510e.tar.Z Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
2015-10-21For amd64 builds, override the automatic CPU detection. It fails onjoerg1-1/+2
SmartOS for 64bit builds.
2015-09-13Add missing stdexcept includes. Add missing libraries for socketjoerg6-6/+88
functions on Solaris. Check privileges for mlock use on Solaris before trying to lock the resource buffer.
2015-09-13Fix PLIST conditional for i386.joerg1-2/+2
2015-05-20Add missing header. Patch up Python interpreter. Regen distinfo.joerg3-6/+17
2015-05-14Update to Botan 1.11.16:joerg7-101/+44
- Switch to using IETF ALPN extension for negotiating application-level protocols for TLS in place of NPN extension. - Optimizations for ECDSA - Allow using OpenSSL's RSA implementation - RC4 is deprecated and will be removed in the future - Removed global state like the global PRNG. - Cleaner registration for algorithm etc, potentially requires changes for statically linked programs. - Simple C binding for common operations - Optimized reductors for P-192, P-224, P-256, P-384, P-521 - Experimental OCB support for TLS - Reduced memory footprint of CTR - botan-config has been merged into botan - Removal of SSLv3 support - MCEIES, DTLS-STRP, SipHash, Curve25519, Poly1305, ChaCha20Poly1305 supported - Changed format of serialized TLS sessions - TLS heartbeat messages support user-defined size of padding for PMTU discovery - RFC 6979 support for deterministic nouns and signatures with DSA and ECDSA - Support for TLS fallback signaling
2015-04-17Revbump after updating devel/boost-libsadam2-4/+4
2014-11-07Revbump after updating boostadam2-4/+4
2014-08-13Revbump after boost-libs updateadam2-3/+4
2014-05-23Forgotten mps.joerg1-1/+2
2014-05-21Fix build on NetBSD/evbarm.joerg3-8/+29
2014-05-17Bump applications PKGREVISIONs for python users that might be usingwiz1-1/+2
python3, since the default changed from python33 to python34. I probably bumped too many. I hope I got them all.
2014-03-05Fix build on NetBSD and with clang.joerg5-2/+62
2014-02-24Add botan 1.11.8, the in-progress version of security/botan. It brings ajoerg6-0/+362
heavily changed x509 instructure and TLS support on top.