So this update fixes the CVE that affected previous releases, and brings
back sparc64 support. Patches where committed upstream, too. Tests
pass on amd64 and sparc64.
I noticed only symbol additions, but upstream bumped SOVERSION in the
cmake build files (this changes SONAME on other platforms), so I went
for a major bump. No other port uses this anyway (www/hiawatha?).
ok?
Index: Makefile
===================================================================
RCS file: /cvs/ports/security/polarssl/Makefile,v
retrieving revision 1.2
diff -u -p -r1.2 Makefile
--- Makefile 18 Apr 2014 20:51:48 -0000 1.2
+++ Makefile 18 Aug 2014 07:30:10 -0000
@@ -1,14 +1,12 @@
# $OpenBSD: Makefile,v 1.2 2014/04/18 20:51:48 sthen Exp $
-BROKEN-sparc64= problems with mpi_mul_hlp() (also tested with gcc4.8)
-
COMMENT= SSL library with an intuitive API and readable source code
-DISTNAME= polarssl-1.3.6
-REVISION= 0
+DISTNAME= polarssl-1.3.8
EXTRACT_SUFX= -gpl.tgz
-SHARED_LIBS += polarssl 0.0 # 1.3
+# check SOVERSION
+SHARED_LIBS += polarssl 1.0
CATEGORIES= security
Index: distinfo
===================================================================
RCS file: /cvs/ports/security/polarssl/distinfo,v
retrieving revision 1.1.1.1
diff -u -p -r1.1.1.1 distinfo
--- distinfo 18 Apr 2014 11:37:02 -0000 1.1.1.1
+++ distinfo 17 Aug 2014 22:30:30 -0000
@@ -1,2 +1,2 @@
-SHA256 (polarssl-1.3.6-gpl.tgz) = uXllwaBS30EgHTXgH5HErAvyjkQ6Vt30Yb5jsgyFrgk=
-SIZE (polarssl-1.3.6-gpl.tgz) = 1596728
+SHA256 (polarssl-1.3.8-gpl.tgz) = MYFx20EzXKy7WwBHyU8fr5FEKrcKIjtSI0NnA8lAb/E=
+SIZE (polarssl-1.3.8-gpl.tgz) = 1725531
Index: patches/patch-library_rsa_c
===================================================================
RCS file: patches/patch-library_rsa_c
diff -N patches/patch-library_rsa_c
--- patches/patch-library_rsa_c 18 Apr 2014 11:37:02 -0000 1.1.1.1
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,22 +0,0 @@
-$OpenBSD: patch-library_rsa_c,v 1.1.1.1 2014/04/18 11:37:02 sthen Exp $
-
-Avoid triggering APIWARN (though using rand() for this self-test is
-actually harmless).
-
---- library/rsa.c.orig Fri Apr 18 12:01:57 2014
-+++ library/rsa.c Fri Apr 18 12:02:07 2014
-@@ -1469,13 +1469,10 @@ void rsa_free( rsa_context *ctx )
- #if defined(POLARSSL_PKCS1_V15)
- static int myrand( void *rng_state, unsigned char *output, size_t len )
- {
-- size_t i;
--
- if( rng_state != NULL )
- rng_state = NULL;
-
-- for( i = 0; i < len; ++i )
-- output[i] = rand();
-+ arc4random_buf(output, len);
-
- return( 0 );
- }
Index: patches/patch-tests_suites_helpers_function
===================================================================
RCS file: patches/patch-tests_suites_helpers_function
diff -N patches/patch-tests_suites_helpers_function
--- patches/patch-tests_suites_helpers_function 18 Apr 2014 11:37:02 -0000
1.1.1.1
+++ /dev/null 1 Jan 1970 00:00:00 -0000
@@ -1,21 +0,0 @@
-$OpenBSD: patch-tests_suites_helpers_function,v 1.1.1.1 2014/04/18 11:37:02
sthen Exp $
-
-Stops test_suite_pk from looping forever.
-
---- tests/suites/helpers.function.orig Fri Apr 18 11:59:32 2014
-+++ tests/suites/helpers.function Fri Apr 18 11:59:54 2014
-@@ -105,13 +105,10 @@ static void hexify(unsigned char *obuf, const unsigned
- */
- static int rnd_std_rand( void *rng_state, unsigned char *output, size_t len )
- {
-- size_t i;
--
- if( rng_state != NULL )
- rng_state = NULL;
-
-- for( i = 0; i < len; ++i )
-- output[i] = rand();
-+ arc4random_buf(output, len);
-
- return( 0 );
- }
Index: pkg/PLIST
===================================================================
RCS file: /cvs/ports/security/polarssl/pkg/PLIST,v
retrieving revision 1.3
diff -u -p -r1.3 PLIST
--- pkg/PLIST 19 Apr 2014 14:40:51 -0000 1.3
+++ pkg/PLIST 18 Aug 2014 06:56:18 -0000
@@ -10,7 +10,9 @@ include/polarssl/bignum.h
include/polarssl/blowfish.h
include/polarssl/bn_mul.h
include/polarssl/camellia.h
+include/polarssl/ccm.h
include/polarssl/certs.h
+include/polarssl/check_config.h
include/polarssl/cipher.h
include/polarssl/cipher_wrap.h
include/polarssl/compat-1.2.h
--
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE