Commit Graph

3038 Commits

Author SHA1 Message Date
christos c48b6ae7fc new config file 2019-01-07 15:43:17 +00:00
christos 71d1bfd50f merge conflicts. 2019-01-07 15:43:04 +00:00
christos 8cc77b481a tpm-tools (1.3.9.1)
- Builds with openssl 1.1.0
    - Align code properly so gcc-6 does not complain
    - update symbol file.
    - drop 02-cflags-errors-unused.patch, -Werror is gone.
    - update 03-fix-bool-error-parseStringWithValues.patch, different fix
      upstream, does not look right.

tpm-tools (1.3.8.2)

  * Add patch 03 to fix FTBFS with gcc-5
  * Merge patch 04 to fix FTBFS with clang
    Thanks to Alexander <email address hidden> for the patch.
  * Bump Standards Version to 3.9.6
2019-01-07 15:37:41 +00:00
christos 1cebe59da2 merge conflicts 2019-01-07 15:18:03 +00:00
christos 1023804e38 * TROUSERS_0_3_14
- Changes to support OpenSSL 1.1.0
- Removed some warnings for proper builds
- Changes to allow building on OS X
- Fixed memory leaks
- Fixed failure to recognize connections from localhost over IPv6
- Fixed for an exploitable local denial of service in tcsd

* TROUSERS_0_3_13
- Changed exported functions which had a name too common, to avoid collision
- Assessed daemon security using manual techniques and coverit
- Fixed major security bugs and memory leaks
- Added debug support to run tcsd with a different user/group
- Daemon now properly closes sockets before shutting down

* TROUSERS_0_3_12
- Added new network code for RPC, which supports IPv6
- Users of client applications can configure the hostname of the tcsd server
they want to connect through the TSS_TCSD_HOSTNAME env var (only works if
application didn't set a hostname in the context)
- Added disable_ipv4 and disable_ipv6 config options for server

* TROUSERS_0_3_11
- Fix build process for distros
- License was changed from GPL to BSD
- Many bugfixes
- updated man pages
2019-01-07 14:57:23 +00:00
christos ba1213d69a regen 2019-01-06 22:22:02 +00:00
christos 6210d3c848 PR/53838: Scole Mail: OPENSSL_rdtsc() is reading a time counter
for randomness, and the powerpc code uses mftbu and mftb for access.
The 601 is different than other powerpcs. It doesn't have a time
base register (TBR), but a real time clock (RTC) so it needs to
use different calls like mfrtcu/mfrtcl instead.
2019-01-06 22:20:50 +00:00
christos a391bfdb6d add new file (Robert Swindells) 2018-12-09 21:39:48 +00:00
christos deb6f0161a Add engines infrastructure, not hooked to the build:
1. sets needs to be fixed
2. need to decide if I am going to add engine.so.MAJOR or use engine.so
   like OpenSSL wants
3. padlock is MD (x86) needs asm to be added, and conditionally built
2018-12-08 23:24:01 +00:00
christos bf8eace1c0 Merge conflicts 2018-12-08 22:35:42 +00:00
christos f4f044c4b1 Changes between 1.1.1 and 1.1.1a [20 Nov 2018]
*) Timing vulnerability in DSA signature generation

     The OpenSSL DSA signature algorithm has been shown to be vulnerable to a
     timing side channel attack. An attacker could use variations in the signing
     algorithm to recover the private key.

     This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser.
     (CVE-2018-0734)
     [Paul Dale]

  *) Timing vulnerability in ECDSA signature generation

     The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a
     timing side channel attack. An attacker could use variations in the signing
     algorithm to recover the private key.

     This issue was reported to OpenSSL on 25th October 2018 by Samuel Weiser.
     (CVE-2018-0735)
     [Paul Dale]

  *) Added EVP_PKEY_ECDH_KDF_X9_63 and ecdh_KDF_X9_63() as replacements for
     the EVP_PKEY_ECDH_KDF_X9_62 KDF type and ECDH_KDF_X9_62(). The old names
     are retained for backwards compatibility.
     [Antoine Salon]

  *) Fixed the issue that RAND_add()/RAND_seed() silently discards random input
     if its length exceeds 4096 bytes. The limit has been raised to a buffer size
     of two gigabytes and the error handling improved.

     This issue was reported to OpenSSL by Dr. Falko Strenzke. It has been
     categorized as a normal bug, not a security issue, because the DRBG reseeds
     automatically and is fully functional even without additional randomness
     provided by the application.
2018-12-08 22:33:03 +00:00
christos 0ef48146df Put back devcrypto (what was called cryptodev) engine support. 2018-12-08 17:07:27 +00:00
maya 5e0e9ff149 Don't expose a getauxval symbol.
The code already knows how to handle it, but it assumes anyone who uses
GCC or clang might resolve the getauxval function to something eventually.

The only time we will expose getauxval is if a package tries to substitute
getauxval too, and then code will start having mysterious failures.

getauxval is purely a linux function (as far as I can see), so limit it to
that.

PR pkg/53387, PR port-arm/53386
2018-11-20 07:30:17 +00:00
ozaki-r 16fc099a65 Use Cm instead of Li or Ar for fixed command strings 2018-11-19 04:54:37 +00:00
mlelstv 3118701f5e Fix some error handling, json support, keyring handling. 2018-11-13 14:52:30 +00:00
martin f6fb28f512 Ooops - fix editor accident in previous 2018-10-15 12:45:52 +00:00
martin ad88e5ac0b Define OPENSSL_NO_EC_NISTP_64_GCC_128 for sparc64, the code does
not work there (or maybe any big endian machine).
Fixes PR bin/53670.
2018-10-15 12:27:58 +00:00
maxv f1c81f6829 Remove dead files that have never been built, and likely can't build since
they are not correct C files.
2018-10-14 08:36:09 +00:00
maxv 0fe8cb7566 Clean up setkey: remove dead wood, KNF, localify, and slightly improve. 2018-10-14 08:27:39 +00:00
maxv 7666e47285 Fix SF#24: incorrect authentication algorithms, copy-pasto. 2018-10-13 15:38:28 +00:00
maxv 2be45af163 Fix ticket SF#91: pass the correct size for tbuf. 2018-10-13 15:17:45 +00:00
maxv 05d534bebd Reduce the diff against the latest release. Also remove netbsd-import.sh,
since we are upstream now.
2018-10-13 15:08:51 +00:00
christos f84d9921ff Add the EC_GFp_nistp*_method's 2018-10-10 14:57:31 +00:00
martin c822cfe197 On 32bit platforms set OPENSSL_NO_EC_NISTP_64_GCC_128 again, the non
standard __uint128_t is required for the code, but only provided by gcc
on 64bit archs.
2018-10-10 06:16:55 +00:00
christos 34a6ee4275 enable OPENSSL_NO_EC_NISTP_64_GCC_128, requested by wiz 2018-10-10 01:29:25 +00:00
christos be750853ee elide a warning that triggers on arm/clang 2018-10-08 18:01:23 +00:00
christos 006807b168 Skip man pages that conflict (but have different case with libc: {hmac,md5}.3
and libdes: des_random_key.3)
2018-10-08 16:31:35 +00:00
christos 5f39f5717b disable another clang warning 2018-10-06 15:31:09 +00:00
christos 52b4b66650 From Thomas Reim:
Current racoon code cannot detect duplicate last fragments as it uses
the fragment flag instead of the fragment number.

The code does not consider that the IKE payload fragments might not be
received in the correct order. In this case, packet complete detection
will again fail and VPN clients abandoned from VPN service.
Nevertheless, clients still can add fragments to the fragment queue and
fill it up to the possible 255 fragments. Only duplicates are detected,
but not the fragments with a number greater than the last fragment
number.

The last fragment number is kept in the Phase 1 handler
after fragment queue deletion, which may lead to error notifications
after succesful reassembly of the IKE phase 1 message.

In general, the 2017's CVE fix added laconic and difficult to understand
failure notifications, which do not much help for analysis, why a VPN
client was blocked by racoon server.

This patch fixes the code and aligns it to Microsoft/Cisco IKE
fragmentation specification. It provides error logging which is in line
with above specification and adds some debug info to the logs to better
support analysis VPN client blackballing.

XXX: pullup-8
2018-10-05 20:12:37 +00:00
joerg 04f39e5059 Add missing format string annotation. 2018-10-04 13:38:41 +00:00
christos 1eb7c866e6 Don't treat mostly connection closed events as filtering events.
There a a failed to negotiate instance too, but I don't want to generate
more diff.
2018-10-02 22:44:07 +00:00
christos 6ed279ad58 Undo previous change. It made filtering a lot more aggressive. 2018-10-02 22:40:28 +00:00
christos 451f4db714 PR/53646: Thomas Reim: Incorrect detection of the packet complete code in
fragment list check.

While the fix in https://launchpad.net/~rdratlos/+archive/ubuntu/racoon

	- if (i > last_frag) /* It is complete */
	+ if (i >= last_frag) /* It is complete */

has the correct behavior, it violates the test for successful
completion of the invariant of the loop:

    for (i = 1; i <= last_frag; i++) {
	if (!check_fragment_index())
	    break;
    }
    if (i > last_frag)
	return ok;

It is better to move the check for NULL in the loop earlier, so that
the final iteration is done and the test is kept the same. It makes
the code easier to understand and preserves the original intent.

XXX: pullup-8
2018-10-02 18:49:24 +00:00
christos 277582e5d7 Use hex string syntax to prevent overflow warnings for character constants
>= 128.
2018-10-02 13:53:51 +00:00
christos 949cd49583 Annotate format functions and fix format errors. 2018-09-30 19:23:13 +00:00
martin 7cf9d82c2e Newer gcc seems to use __ARM_ARCH_ISA_THUMB to tell use we have thumb
instructions available
2018-09-30 09:46:41 +00:00
martin cde2e090ac Regen 2018-09-29 19:45:18 +00:00
martin 2cc7a20425 Upstream does not support armv4 any more - but it is trivial to add
add regen time. Make the "regen" target here do it.
2018-09-29 19:44:57 +00:00
christos 5c87189615 be less aggressive about blocking connections from disconnected sessions. 2018-09-29 15:10:44 +00:00
christos 52fef4034c fix build 2018-09-28 17:28:01 +00:00
christos 9c90d67021 Remove debugging accidentally left in! Noticed by Tobias Ulmer 2018-09-27 18:18:53 +00:00
christos 285c5abcb8 use the standard code instead of ours 2018-09-25 14:17:49 +00:00
christos 0d38e0d044 no need for our copy of memequal 2018-09-25 14:16:33 +00:00
christos d6dadc43cc put back sparccap.c; too hard to iron out the bn_mont stuff. 2018-09-24 20:36:51 +00:00
christos 777e7b79f5 sparcv9cap is a c file. 2018-09-24 20:15:38 +00:00
christos 72ff73fc7e use sparcv9cap.S 2018-09-24 19:50:51 +00:00
christos ed78d1de0f Don't include the libc CRYPTO_memcmp file (it has a different prototype
now) and it is provided by openssl in C, or use the assembly versions.
2018-09-24 11:03:39 +00:00
christos d06d8258da don't override the sha man page provided by libc. 2018-09-24 11:02:12 +00:00
christos 9f80cc1672 sparc has memcmp and cpuid 2018-09-24 00:45:12 +00:00
christos 9d109c93ae we provide memcmp and rdtsc 2018-09-23 21:44:01 +00:00