The do-install-* targets will now automatically install all the
relevant files provided by the port.
Also while here:
- Replace PORTDOCS with pkg-plist entries for greater control over the
docs.
- Move ZIPSRC-only install targets to ZIPSRC_ALL_TARGET.
- Sort pkg-plist.
- Add a comment explaining why the port installs the bundled version of
bcprov.jar.
- Install additional documentation (docs and tls/docs).
Sponsored by: Modirum MDPay
Sponsored by: Klara, Inc.
java/openjdk6 support was removed from Mk/bsd.java.mk (r512662) and
java/openjdk6 and java/openjdk6-jre were removed from the ports tree
(r512663). Now this patch completely removes remaining stuff from the
ports tree.
PR: 241953 (exp-run)
Reviewed by: glewis
Approved by: portmgr (antoine)
Differential Revision: https://reviews.freebsd.org/D22342
Previous revision 497549 switched to install bcprov.jar build from sources
instead of bundled version. However, the bundled version of JAR file is signed
that is essential as is provides an implementation of a Provider
in the Java Cryptography Architecture. For details, refer to
https://docs.oracle.com/javase/8/docs/technotes/guides/security/crypto/HowToImplAProvider.html
Partially back out that revision to install bundled bcprov.jar as before.
Thanks to Alex Dupre for reporting this.
Reported by: ale
This release adds support for the qTESLA signature alogirithm
and the password hashing algorithm Argon2. Support for endpoint
ID validation has been added to the BCJSSE, and the TLS/BCJSEE API's
journey to TLS 1.3 has continued.
Support has been added to the provider for the Ed25519 and Ed448
signature algorithms and provider support has also been added
for X25519 and X448.
A new API for directly parsing and creating S/MIME documents has been added
to the PKIX APIs. In terms of bug fixes, the TLS api will now tolerate
unrecognized hash algorithms and SNI types.
An issue that meant XMSS/XMSS^MT private keys would sometime reload
incorrectly has been fixed.
RFC3211WrapEngine will now properly handle messages longer than 127 bytes,
and an endianness issue for encoding parameters longer than 255 bytes
for CSHAKE has been fixed, some CMP parsing issues have been found and
dealt with, the co-factors for id-tc26-gost-3410-12-256-paramSetA and
id-tc26-gost-3410-12-512-paramSetC have been corrected and more
work has been done on EC key encoding to make sure named curve
parameters are preserved where possible. BCFKS key stores can
now be signature protected rather than passord protected.
See also https://www.bouncycastle.org/releasenotes.html
Also, the port now installs version of bcprov.jar built from sources
removing code since older java/bouncycastle port that installs
bcprov.jar bundled with distfile.
This release deals with two CVEs: one affecting RSA key pair generation
where the certainty value is being tweaked in the light-weight API,
and the other on properly validating an XMSS/XMSS^MT private key on reload.
In terms of improvements, the BCJSSE now supports SNI,
CMS now supports SHA-3 signatures, the Unified Model is now fully supported
for Diffie-Hellman with ephemeral keys, and PGP EC operations can support
a wider range of curves. Issues have also been fixed in EST,
CRMF request generation, and low-level support has been added for EdDSA.
Further details on other additions and bug fixes can be found in the
release notes at:
https://www.bouncycastle.org/releasenotes.html
Security: CVE-2018-1000180
Security: CVE-2018-1000613
MFH: 2018Q3
This release fixes CVE-2017-13098 ("ROBOT"), a Bleichenbacher oracle in TLS
when RSA key exchange is negotiated. This potentially affected BCJSSE servers
and any other TLS servers configured to use JCE for the underlying crypto -
note the two TLS implementations using the BC lightweight APIs
are not affected by this.
Some of additional fixes, features and functionality:
* GOST3410-94 private keys encoded using ASN.1 INTEGER are now accepted
in private key info objects; GOST3412-2015 has been added
to the JCE provider and the lightweight API.
* SCRYPT is now supported as a SecretKeyFactory in the provider and
in the PKCS8 APIs.
* The BCJSSE provider now supports Server Name Indication,
session resumption in clients, the jdk.tls.namedGroups and
org.bouncycastle.jsse.ec.disableChar2 system properties.
* ECGOST-2012 public keys were being encoded with the wrong OID
for the digest parameter in the algorithm parameter set. This has been fixed.
* The BCJSSE SSLEngine implementation now correctly wraps/unwraps
application data only in whole records.
Further details on other additions and bug fixes can be found in the
release notes at:
https://www.bouncycastle.org/releasenotes.html
Security: CVE-2017-13098
The main focus in this release is on features. Considerable work has
been done on improving the TLS/DTLS API and the BCJSSE. Support for
ECGOST3410-2012 has been added for both signing and key
agreement/exchange. The DSTU-7564 digest and DSTU-7624 (Kalyna) cipher
have also been added. Support for XMSS and XMSS^MT has been added to the
BCPQC provider and certificate support for the BCPQC algorithms is much
improved.
Further details on other additions and bug fixes can be found in the
release notes at:
https://www.bouncycastle.org/releasenotes.html
remove fork="true" in javac and fork="yes" in junit tasks (ant/bc+-build.xml)
Original report:
If java/bouncycastle15 is build on armv6 with openjdk18, the build stops with
This command is not for general use and should only be run as the result of a call to ProcessBuilder.start() or Runtime.exec() in a java application
PR: 220612
Submitted by: Gerrit Beine <mail+freebsd@gerritbeine.de> (based on)
Approved by: az (mentor)
port changes:
- upstream updated list of its MASTER_SITES (bouncycastle.gva.es
is gone, downloads.bouncycastle.org changed to www.bouncycastle.org);
- pkg-descr updated to reflect current features;
- installation of zipped bundled sources made optional, enabled by
default to match previous behavior.
Some of new version changes:
- a new API for DTLS/TLS and a JSSE provider suitable for Java 5 and later;
- support for RFC 7539 ChaCha20 and Poly1305 has also been added
and general support for SHA-3 in the PKIX APIs has been improved;
Full details of the release:
PR: 215507
Changes: https://www.bouncycastle.org/releasenotes.html
Security: CVE-2016-1000338, CVE-2016-1000339, CVE-2016-1000340,
CVE-2016-1000341, CVE-2016-1000342, CVE-2016-1000343,
CVE-2016-1000344, CVE-2016-1000345, CVE-2016-1000346,
CVE-2016-1000352
Submitted by: Eugene Grosbein <ports@grosbein.net> (maintainer)
The FreeBSD Ports Collection already has 1.45 version of the Bouncy Castle and
this new port is based on java/bouncycastle.
Newer versions are not API-compatible with that older one. Some say they should
be given 2.x version numbers. So, this new version comes as distinct port
java/bouncycastle15 instead of update for existing java/bouncycastle15 to keep
old API version available.
This is neccessary dependency for other port updates, e.g. newer version of
iText PDF (devel/itext) requires new API of modern Bouncy Castle versions.
PR: 211316
Submitted by: Eugen Grosbein <eugen=at=grosbein.net>