Commit Graph

76 Commits

Author SHA1 Message Date
rin 530d774931 Explicitly link liblber and libssl when ldap support is enabled.
Fix sun2, i.e., MKPIC=no build.
2020-12-02 02:21:43 +00:00
bouyer cfd5acca1c Enable ldap support in racoon(8). Proposed on tech-userlevel,
"Go for it" from christos@
2020-12-01 10:10:57 +00:00
mrg cb93b81028 add support for new GCC 9 warnings that may be too much to fix
right now.  new address-of-packed-member and format-overflow
warnings have new GCC_NO_ADDR_OF_PACKED_MEMBER amd
GCC_NO_FORMAT_OVERFLOW variables to remove these warnings.

apply to a bunch of the tree.  mostly, these are real bugs that
should be fixed, but in many cases, only by removing the 'packed'
attribute from some structure that doesn't really need it.  (i
looked at many different ones, and while perhaps 60-80% were
already properly aligned, it wasn't clear to me that the uses
were always coming from sane data vs network alignment, so it
doesn't seem safe to remove packed without careful research for
each affect struct.)  clang already warned (and was not erroring)
for many of these cases, but gcc picked up dozens more.
2020-09-06 07:20:26 +00:00
christos fd434df171 add commented out debugging options. 2018-04-01 23:00:40 +00:00
mrg 2e19323388 add LIBKRB5_LDADD/LIBKRB5_DPADD and their static counterparts
to bsd.prog.mk.  use them instead of hard coding various lists
of libraries for krb5.

this fixes static builds.
2018-02-25 00:16:48 +00:00
christos 2188bc148a No RC5 for OpenSSL-1.1 2018-02-09 02:51:32 +00:00
christos 26640e8b73 disable compat api setting for openssl 1.1 2018-02-09 02:37:20 +00:00
christos 3123832b23 needs the OpenSSL-1.1 api to build 2018-02-07 13:16:50 +00:00
riastradh 09956316a6 Remove MKCRYPTO_RC5. Unconditionally include RC5 in libcrypto.so.
This option existed only because RC5 is covered by patents that, twenty
years ago, we had reason to suspect the patent holder, RSA, Inc., might
litigate.  The two US patents in question are 5,724,428 and 5,835,600.

According to the USPTO Patent Term Calculator web site at
<https://www.uspto.gov/patent/laws-and-regulations/patent-term-calculator#heading-5>
(retrieved 2017-05-21), patents filed after 1995-06-07 expire twenty
years after the filing date.

number          filing date
5,724,428       1995-11-01
5,835,600       1997-04-21

Thus, these patents appear to be expired.

As proposed on tech-crypto and tech-security:

https://mail-index.netbsd.org/tech-crypto/2017/05/05/msg000718.html
https://mail-index.netbsd.org/tech-security/2017/05/05/msg000927.html
2017-05-21 14:20:44 +00:00
maya b0f6bc04c6 GC some GCC 4.8 specific sh3 HACKS entries.
These existed to avoid compile errors, and haven't been effect
since gcc.old was removed.
2017-02-22 12:17:16 +00:00
christos ce31bd9da4 add sqlite3 2017-01-28 23:42:36 +00:00
christos f7bfce339d more sh3 hacks. 2013-11-09 00:33:48 +00:00
christos d5b265f4fb Enable wildcard matching in psk files. We are big kids and if we put a *
in the psk file, we mean it.
2013-06-20 15:42:58 +00:00
christos 550109f835 MKCRYPTO_IDEA is no more 2012-07-14 04:03:44 +00:00
drochner 3712f81ced -consistently use "char *" for the compiled policy buffer in the
ipsec_*_policy() functions, as it was documented and used by clients
-remove "ipsec_policy_t" which was undocumented and only present
 in the KAME version of the ipsec.h header
-misc cleanup of historical artefacts, and to remove unnecessary
 differences between KAME ans FAST_IPSEC
2012-01-04 15:55:35 +00:00
joerg 28050549eb Ignore warnings when building with clang for now. 2011-05-30 14:41:26 +00:00
lukem d877c4c3c0 Enable WARNS=4 by default, except for:
cpuctl  dumplfs  hprop  ipf  iprop-log  kadmin  kcm  kdc  kdigest
	kimpersonate  kstash  ktutil  makefs  ndbootd  ntp  pppd  quot
	racoon  racoonctl  rtadvd  sntp  sup  tcpdchk  tcpdmatch  tcpdump
	traceroute  traceroute6  user  veriexecgen  wsmoused  zic
(Mostly third-party applications)
2009-04-22 15:23:01 +00:00
tsutsui df870ff695 Add more libraries required by libkrb5 etc. in NOPIC case. 2008-04-10 15:42:06 +00:00
christos 6bb1f8cf94 Not the right way to fix this. 2008-03-28 21:17:37 +00:00
he 25a92e43c5 Because privsep.c uses CMSG_SPACE() to size two local arrays, these
ends up as c99 variable-sized local arrays (CMSG_SPACE() uses a function
as part of calculating its result).  This causes the stack protection
code in the compiler to complain, so build this one with -fno-stack-protector
to avoid the problem.

Gets us back to buildability for this program for a number of our ports.
2008-03-28 18:10:53 +00:00
tls 4147a3c54a Add new Makefile knob, USE_FORT, which extends USE_SSP by turning on the
FORTIFY_SOURCE feature of libssp, thus checking the size of arguments to
various string and memory copy and set functions (as well as a few system
calls and other miscellany) where known at function entry.  RedHat has
evidently built all "core system packages" with this option for some time.

This option should be used at the top of Makefiles (or Makefile.inc where
this is used for subdirectories) but after any setting of LIB.

This is only useful for userland code, and cannot be used in libc or in
any code which includes the libc internals, because it overrides certain
libc functions with macros.  Some effort has been made to make USE_FORT=yes
work correctly for a full-system build by having the bsd.sys.mk logic
disable the feature where it should not be used (libc, libssp iteself,
the kernel) but no attempt has been made to build the entire system with
USE_FORT and doing so will doubtless expose numerous bugs and misfeatures.

Adjust the system build so that all programs and libraries that are setuid,
directly handle network data (including serial comm data), perform
authentication, or appear likely to have (or have a history of having)
data-driven bugs (e.g. file(1)) are built with USE_FORT=yes by default,
with the exception of libc, which cannot use USE_FORT and thus uses
only USE_SSP by default.  Tested on i386 with no ill results; USE_FORT=no
per-directory or in a system build will disable if desired.
2007-05-28 12:06:17 +00:00
christos 00201e88c3 PR/36069: Huang Yushuo: racoon can't work with pam_group
We need -lutil for login_getpwclass
2007-03-24 02:08:45 +00:00
manu 3c09e24ba2 Add the dependendy on libutil 2006-09-29 05:06:34 +00:00
manu d542f7adc2 Fix build 2006-09-16 06:19:50 +00:00
manu ba5b97f363 Fix ipsec-tools build after recent import 2006-09-09 17:52:01 +00:00
christos 65710e59db adjust to the new openssl 2005-11-26 02:32:32 +00:00
christos 192c2eccf6 Add -lcrypt where -lcrypto is specified. 2005-03-09 03:11:22 +00:00
he 8e8728c45c Introduce PAM_STATIC_LDADD and PAM_STATIC_DPADD. When compiling
with MKPIC=no, possibly because the target does not support shared
libraries, these include libraries required to resolve all symbols
which end up referenced from PAM-using applications.  The libraries
presently required are -lcrypt, -lrpcsvc and -lutil.

Add use of these variables which are currently set up to use PAM,
so that they compile when MKPIC=no.

Also, in the telnetd case, reorder the order of the libraries, so
that libtelnet.a comes before -ltermcap and -lutil, again to fix
link error when MKPIC=no.

Discussed with thorpej and christos.
2005-03-04 20:41:08 +00:00
he b404dc79be Move -lcrypto to the end of the library list, so that this links
without undefined entry points for non-shlib platforms such as sun2.
2005-02-26 11:31:48 +00:00
manu be15b99c92 Define SADB_X_EALG_AESCBC=SADB_X_EALG_AES, as we define SADB_X_EALG_AES
in <net/pfkeyv2.h> while ipsec-tools uses SADB_X_EALG_AESCBC in the code.
2005-02-24 13:45:08 +00:00
manu 3eda198fd5 Install racoon administrative socket in /var/run instead of /var/racoon 2005-02-23 14:44:41 +00:00
manu 32f1c835de Don't make racoonctl.8 here, it's already done in src/usr.sbin/racoonctl 2005-02-20 10:44:15 +00:00
manu f232e7a4c6 Add missing racoonctl(8), build with libradius 2005-02-20 01:17:41 +00:00
thorpej 33f19ef5cf Additional cleanup pass. 2005-02-19 17:05:02 +00:00
thorpej 354f2a1004 Switch to ipsec-tools for libipsec, setkey, and racoon. From
Emmanuel Dreyfus, with some small changes by me.
2005-02-19 16:55:02 +00:00
lukem 7157011597 Only compile in IPv6 support if ${USE_INET6} != "no"
MKINET6 is for providing IPv6 infrastructure.
USE_INET6 is for compiling IPv6 support into the programs (needs MKINET6).
2005-01-10 02:58:58 +00:00
junyoung d4277bb7d5 Add -fno-strict-aliasing to CFLAGS to avoid gcc warning
"dereferencing type-punned pointer will break strict-aliasing rules"
which occurs when compiling crypto_openssl.c with -O[23s].
This should be gone once a new release of kame with a fix applied
is imported.
2004-08-05 17:13:54 +00:00
itojun 166adfa9e5 sync w/ 20040617. 2004-06-17 03:42:55 +00:00
lukem b817247988 Use MKPRIVATELIB=yes instead of providing an empty libinstall:: target and
setting NOLINT, NOPIC, NOPROFILE (etc)
2004-05-23 02:24:50 +00:00
itojun 26cf1d701e do not compile in print-isakmp.c, as src/dist/tcpdump contains ancient version
which could be vulnerable to attacks.
2004-04-12 04:01:27 +00:00
itojun b4a3a9e6c1 properly validate phase 1 signature.
http://www.vuxml.org/freebsd/d8769838-8814-11d8-90d1-0020ed76ef5a.html
2004-04-12 03:34:05 +00:00
he 1a3822fca0 Wait for libpfkey to build before descending into racoon, as the
latter depends on the existence of the result of the former.
Fixes parallel build problem.
2004-04-09 22:23:14 +00:00
itojun a69a0241a1 bump date 2004-01-16 02:28:42 +00:00
itojun bde9df6596 bump version string 2004-01-14 09:21:41 +00:00
lukem 6672bff7fc rework how cfparse.y is generated 2003-10-19 06:09:17 +00:00
itojun d9c46578d1 update racoon to 2003/8/26 version. mostly minor bugfixes. 2003-08-26 03:31:50 +00:00
itojun c7d6ddcd4d racoon sha2.c is not compatible with openssl 0.9.7, drop support 2003-07-24 14:22:01 +00:00
itojun 18a884bc94 oops, forgot to bump version string 2003-07-22 08:46:03 +00:00
itojun 03eefe2ecf sync w/ latest racoon 2003-07-12 09:02:24 +00:00
itojun e1425434e7 no need for __ss_len define any longer 2003-07-04 05:21:26 +00:00