This release fixes CVE-2017-13098 ("ROBOT"), a Bleichenbacher oracle in TLS
when RSA key exchange is negotiated. This potentially affected BCJSSE servers
and any other TLS servers configured to use JCE for the underlying crypto -
note the two TLS implementations using the BC lightweight APIs
are not affected by this.
Some of additional fixes, features and functionality:
* GOST3410-94 private keys encoded using ASN.1 INTEGER are now accepted
in private key info objects; GOST3412-2015 has been added
to the JCE provider and the lightweight API.
* SCRYPT is now supported as a SecretKeyFactory in the provider and
in the PKCS8 APIs.
* The BCJSSE provider now supports Server Name Indication,
session resumption in clients, the jdk.tls.namedGroups and
org.bouncycastle.jsse.ec.disableChar2 system properties.
* ECGOST-2012 public keys were being encoded with the wrong OID
for the digest parameter in the algorithm parameter set. This has been fixed.
* The BCJSSE SSLEngine implementation now correctly wraps/unwraps
application data only in whole records.
Further details on other additions and bug fixes can be found in the
release notes at:
https://www.bouncycastle.org/releasenotes.html
Security: CVE-2017-13098
The main focus in this release is on features. Considerable work has
been done on improving the TLS/DTLS API and the BCJSSE. Support for
ECGOST3410-2012 has been added for both signing and key
agreement/exchange. The DSTU-7564 digest and DSTU-7624 (Kalyna) cipher
have also been added. Support for XMSS and XMSS^MT has been added to the
BCPQC provider and certificate support for the BCPQC algorithms is much
improved.
Further details on other additions and bug fixes can be found in the
release notes at:
https://www.bouncycastle.org/releasenotes.html
remove fork="true" in javac and fork="yes" in junit tasks (ant/bc+-build.xml)
Original report:
If java/bouncycastle15 is build on armv6 with openjdk18, the build stops with
This command is not for general use and should only be run as the result of a call to ProcessBuilder.start() or Runtime.exec() in a java application
PR: 220612
Submitted by: Gerrit Beine <mail+freebsd@gerritbeine.de> (based on)
Approved by: az (mentor)
port changes:
- upstream updated list of its MASTER_SITES (bouncycastle.gva.es
is gone, downloads.bouncycastle.org changed to www.bouncycastle.org);
- pkg-descr updated to reflect current features;
- installation of zipped bundled sources made optional, enabled by
default to match previous behavior.
Some of new version changes:
- a new API for DTLS/TLS and a JSSE provider suitable for Java 5 and later;
- support for RFC 7539 ChaCha20 and Poly1305 has also been added
and general support for SHA-3 in the PKIX APIs has been improved;
Full details of the release:
PR: 215507
Changes: https://www.bouncycastle.org/releasenotes.html
Security: CVE-2016-1000338, CVE-2016-1000339, CVE-2016-1000340,
CVE-2016-1000341, CVE-2016-1000342, CVE-2016-1000343,
CVE-2016-1000344, CVE-2016-1000345, CVE-2016-1000346,
CVE-2016-1000352
Submitted by: Eugene Grosbein <ports@grosbein.net> (maintainer)
The FreeBSD Ports Collection already has 1.45 version of the Bouncy Castle and
this new port is based on java/bouncycastle.
Newer versions are not API-compatible with that older one. Some say they should
be given 2.x version numbers. So, this new version comes as distinct port
java/bouncycastle15 instead of update for existing java/bouncycastle15 to keep
old API version available.
This is neccessary dependency for other port updates, e.g. newer version of
iText PDF (devel/itext) requires new API of modern Bouncy Castle versions.
PR: 211316
Submitted by: Eugen Grosbein <eugen=at=grosbein.net>