Up to [cvs.NetBSD.org] / pkgsrc / security / bearssl
Request diff between arbitrary revisions
Default branch: MAIN
Revision 1.6 / (download) - annotate - [select for diffs], Tue Jul 28 08:49:54 2020 UTC (13 months, 3 weeks ago) by wiz
CVS Tags: pkgsrc-2021Q2-base, pkgsrc-2021Q2, pkgsrc-2021Q1-base, pkgsrc-2021Q1, pkgsrc-2020Q4-base, pkgsrc-2020Q4, pkgsrc-2020Q3-base, pkgsrc-2020Q3, HEAD
Changes since 1.5: +2 -2 lines
Diff to previous 1.5 (colored)
bearssl: honor CFLAGS and LDFLAGS
Revision 1.5 / (download) - annotate - [select for diffs], Mon Jan 21 06:59:58 2019 UTC (2 years, 7 months ago) by agc
CVS Tags: pkgsrc-2020Q2-base, pkgsrc-2020Q2, pkgsrc-2020Q1-base, pkgsrc-2020Q1, pkgsrc-2019Q4-base, pkgsrc-2019Q4, pkgsrc-2019Q3-base, pkgsrc-2019Q3, pkgsrc-2019Q2-base, pkgsrc-2019Q2, pkgsrc-2019Q1-base, pkgsrc-2019Q1
Changes since 1.4: +6 -6 lines
Diff to previous 1.4 (colored)
Update security/bearssl from 0.5 to 0.6 Changes since previous version: + Added general-purpose implementations of EAX and CCM modes (including shared precomputation support for EAX). + Added general-purpose RSA/OAEP implementation. + Added general-purpose HKDF implementation. + Added support for CCM and CCM_8 TLS cipher suites (RFC 6655 and RFC 7251). + Added RSA and EC key generation. + Added private key encoding support ("raw" and PKCS#8 formats, both in DER and PEM, for RSA and EC key pairs). + Made Base64 encoding/decoding constant-time (with regards to the encoded data bytes). + Added a generic API for random seed providers. + Added an extra DRBG based on AES/CTR + Hirose construction for reseeding. + Some cosmetic fixes to avoid warnings with picky compilers. + Makefile fix to achieve compatibility with OpenBSD. + Fixed a bug in bit length computation for big integers (this was breaking RSA signatures with some specific implementations and key lengths). + Made SSL/TLS client stricter in cipher suite selection (to align with server behaviour).
Revision 1.4 / (download) - annotate - [select for diffs], Wed Feb 7 11:52:56 2018 UTC (3 years, 7 months ago) by maya
CVS Tags: pkgsrc-2018Q4-base, pkgsrc-2018Q4, pkgsrc-2018Q3-base, pkgsrc-2018Q3, pkgsrc-2018Q2-base, pkgsrc-2018Q2, pkgsrc-2018Q1-base, pkgsrc-2018Q1
Changes since 1.3: +5 -5 lines
Diff to previous 1.3 (colored)
bearssl: update to 0.5. From Charlotte Koch. Added support for the BoarSSL / Twrch test framework. Header files now include the ritual mantras that make them compatible with C++. Better Makefile behaviour with Clang (FreeBSD compatibility). Worked around a bug of GCC 4.8 and 4.9 in 32-bit x86 mode. Incoming application data after initiating closure is now properly ignored. Some instances of (critical) Certificate Policies extensions are now ignored (when it is safe to do so). Fixed some behavioural bugs with regards to renegotiation (all were failing safe). Added encoded OID for hash functions in the public API, to help with using RSA signatures in non-SSL contexts. Fixed bug in AES/CBC decryption on x86 with AES-NI opcode (this was breaking decryption with AES/CBC cipher suites and TLS 1.0 only). Added an explicit stack buffer initialisation (some provably harmless accesses to uninitialised data were performed, Valgrind was not happy). Fixed bug in the search tree for the cache of SSL sessions (occasional lock-ups). Fixed bug in modular reduction in the special field for P-256 (this was infrequently breaking ECDSA signatures). Added support for exporting keying material (RFC 5705). Added new general-purpose API for AEAD implementations (in non-SSL contexts) and an AES/GCM implementation that follows that API. Added a function to forget saved session parameter in the LRU cache. Added a new ChaCha20 implementation that uses SSE2 on x86 architectures (both 32-bit and 64-bit).
Revision 1.3 / (download) - annotate - [select for diffs], Fri Sep 22 22:00:57 2017 UTC (3 years, 11 months ago) by wiedi
CVS Tags: pkgsrc-2017Q4-base, pkgsrc-2017Q4, pkgsrc-2017Q3-base, pkgsrc-2017Q3
Changes since 1.2: +2 -1 lines
Diff to previous 1.2 (colored)
bearssl: fix build on SunOS Needs to link -lsocket -lnsl
Revision 1.2 / (download) - annotate - [select for diffs], Wed Jun 14 01:14:30 2017 UTC (4 years, 3 months ago) by agc
CVS Tags: pkgsrc-2017Q2-base, pkgsrc-2017Q2
Changes since 1.1: +5 -5 lines
Diff to previous 1.1 (colored)
Update bearssl from version 0.3 to version 0.4 Changes from previous version: + New AES and GHASH implementations for POWER8 processors (provides AES/GCM at more than 2 gigabytes per second!). + Improved GHASH implementation with AES-NI opcodes (pclmulqdq). + New Poly1305 implementation with 64 -> 128 multiplications, available on some 64-bit architectures. + New "i62" big-integer code with 64 -> 128 multiplications, available on some 64-bit architectures (RSA is much faster). + Some mostly cosmetic patches to support very old systems (BearSSL now compiles and run on Debian 2.2 "potato" from 2000, with GCC 2.95).
Revision 1.1 / (download) - annotate - [select for diffs], Sat Apr 1 17:01:51 2017 UTC (4 years, 5 months ago) by wiz
Import bearssl-0.3 as security/bearssl. BearSSL is an implementation of the SSL/TLS protocol (RFC 5246) written in C. It aims at offering the following features: * Be correct and secure. In particular, insecure protocol versions and choices of algorithms are not supported, by design; cryptographic algorithm implementations are constant-time by default. * Be small, both in RAM and code footprint. For instance, a minimal server implementation may fit in about 20 kilobytes of compiled code and 25 kilobytes of RAM. * Be highly portable. BearSSL targets not only "big" operating systems like Linux and Windows, but also small embedded systems and even special contexts like bootstrap code. * Be feature-rich and extensible. SSL/TLS has many defined cipher suites and extensions; BearSSL should implement most of them, and allow extra algorithm implementations to be added afterwards, possibly from third parties. bearssl is considered alpha-quality software, which means that it runs but it probably has bugs, some of which being certainly exploitable vulnerabilities.
This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.