./security/polarssl [SSL library with an intuitive API and readable source code]
[+] Add this package to your ports tracker

[ CVSweb ] [ Homepage ] [ RSS feed ]

Version: 2.6.0, Package name: mbedtls-2.6.0
Maintained by: The OpenBSD ports mailing-list
Master sites:
Description
PolarSSL is a fully featured and standards compliant SSL library offering
server and client functionality (SSLv3, TLSv1.0, TLSv1.1 and TLSv1.2) with
an intuitive API and readable source code. Dual license (GPLv2+/commercial).

Non-standard extensions include: SSL Session Tickets (RFC 5077), Server
Name Indication (SNI) (RFC 6066), Truncated HMAC (RFC 6066), Max Fragment
Length (RFC 6066), and Secure Renegotiation (RFC 5746).

Symmetric algorithms: AES, Blowfish, 3DES, DES, ARC4, Camellia, XTEA
Modes: ECB, CBC, CFB, CTR, GCM
Hashes: MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-160

PolarSSL has its own big number library. Its RSA implementation supports both
PKCS#1 v1.5 and PKCS#1 v2.1 padding. Its ECC implementation supports ECDHE
and ECDSA with various NIST/Koblitz/Brainpool curves and Curve25519.

PolarSSL includes extensive testing (over 6600 validation, regression and
code coverage tests) and uses a continuous integration system to check all
committed code. Automated tests are also done against GnuTLS and OpenSSL.


Filesize: 1912.178 KB
Version History (View Complete History)
  • (2017-10-21) Updated to version: mbedtls-2.6.0
  • (2016-01-06) Updated to version: mbedtls-2.2.1
  • (2015-11-12) Updated to version: mbedtls-2.2.0
  • (2015-10-18) Updated to version: mbedtls-2.1.2
  • (2015-09-21) Updated to version: mbedtls-2.1.1
  • (2015-09-13) Updated to version: mbedtls-2.1.0
  • (2015-06-10) Updated to version: mbedtls-1.3.11
  • (2015-02-12) Updated to version: mbedtls-1.3.10
  • (2014-11-05) Updated to version: polarssl-1.3.9
  • (2014-08-19) Updated to version: polarssl-1.3.8
[show/hide] View available PLISTS (Can be a lot of data)

CVS Commit History:

   2016-08-27 01:46:50 by Juan Francisco Cantero Hurtado | Files touched by this commit (2)
Log message:
Enable pthreads support on polarssl. OK jca@.
   2016-08-27 01:46:50 by Juan Francisco Cantero Hurtado | Files touched by this commit (2)
Log message:
Enable pthreads support on polarssl. OK jca@.
   2016-03-11 11:13:19 by Christian Weisgerber | Files touched by this commit (6)
Log message:
remove NO_SHARED_LIBS
   2016-01-06 03:59:59 by Stuart Henderson | Files touched by this commit (2)
Log message:
update to mbedtls-2.2.1
   2016-01-06 03:59:59 by Stuart Henderson | Files touched by this commit (2)
Log message:
update to mbedtls-2.2.1
   2015-11-11 14:01:44 by Benoit Lecocq | Files touched by this commit (3)
Log message:
Update to mbedtls-2.2.0.
   2015-11-11 14:01:44 by Benoit Lecocq | Files touched by this commit (3)
Log message:
Update to mbedtls-2.2.0.
   2015-11-11 14:01:44 by Benoit Lecocq | Files touched by this commit (3)
Log message:
Update to mbedtls-2.2.0.
   2015-10-18 07:59:15 by Benoit Lecocq | Files touched by this commit (2)
Log message:
Update to polarssl/mbedtls-2.1.2.
   2015-10-18 07:59:15 by Benoit Lecocq | Files touched by this commit (2)
Log message:
Update to polarssl/mbedtls-2.1.2.
   2015-09-21 05:44:50 by Benoit Lecocq | Files touched by this commit (2)
Log message:
Update to polarssl/mbedtls-2.1.1.
   2015-09-21 05:44:50 by Benoit Lecocq | Files touched by this commit (2)
Log message:
Update to polarssl/mbedtls-2.1.1.
   2015-09-12 14:30:00 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to polarssl/mbedtls-2.1.0
   2015-09-12 14:30:00 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to polarssl/mbedtls-2.1.0
   2015-09-12 14:30:00 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to polarssl/mbedtls-2.1.0
   2015-09-12 14:30:00 by Stuart Henderson | Files touched by this commit (4)
Log message:
update to polarssl/mbedtls-2.1.0
   2015-06-29 14:33:28 by Stuart Henderson | Files touched by this commit (1)
Log message:
update HOMEPAGE/MASTER_SITES (polarssl -> tls.mbed.org)
   2015-06-10 03:28:08 by Benoit Lecocq | Files touched by this commit (3)
Log message:
Update to mbedtls-1.3.11.
ok sthen@
   2015-06-10 03:28:08 by Benoit Lecocq | Files touched by this commit (3)
Log message:
Update to mbedtls-1.3.11.
ok sthen@
   2015-06-10 03:28:08 by Benoit Lecocq | Files touched by this commit (3)
Log message:
Update to mbedtls-1.3.11.
ok sthen@
   2015-02-11 07:07:29 by Stuart Henderson | Files touched by this commit (1)
Log message:
fix paths
   2015-02-11 04:13:27 by Stuart Henderson | Files touched by this commit (1)
Log message:
missed cvs rm
   2015-02-10 05:21:55 by Stuart Henderson | Files touched by this commit (4)
Log message:
Update to mbedtls 1.3.10 (the name changed). This version is still under GPL
but a forthcoming version moves to the Apache license.
   2015-02-10 05:21:55 by Stuart Henderson | Files touched by this commit (4)
Log message:
Update to mbedtls 1.3.10 (the name changed). This version is still under GPL
but a forthcoming version moves to the Apache license.
   2015-02-10 05:21:55 by Stuart Henderson | Files touched by this commit (4)
Log message:
Update to mbedtls 1.3.10 (the name changed). This version is still under GPL
but a forthcoming version moves to the Apache license.
   2015-02-10 05:21:55 by Stuart Henderson | Files touched by this commit (4)
Log message:
Update to mbedtls 1.3.10 (the name changed). This version is still under GPL
but a forthcoming version moves to the Apache license.
   2015-01-20 02:47:47 by Stuart Henderson | Files touched by this commit (2)
Log message:
Patch PolarSSL for CVE-2015-1182.
An error during parsing of an ASN.1 sequence (triggerable during certificate
parsing) results in an uninitialized pointer being freed.
https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04
   2015-01-20 02:47:47 by Stuart Henderson | Files touched by this commit (2)
Log message:
Patch PolarSSL for CVE-2015-1182.
An error during parsing of an ASN.1 sequence (triggerable during certificate
parsing) results in an uninitialized pointer being freed.
https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04
   2014-11-05 02:40:05 by David Coppa | Files touched by this commit (2)
Log message:
Respect our CFLAGS and remove default optimizations
   2014-11-05 02:40:05 by David Coppa | Files touched by this commit (2)
Log message:
Respect our CFLAGS and remove default optimizations
   2014-11-04 12:45:41 by Stuart Henderson | Files touched by this commit (3)
Log message:
update to polarssl 1.3.9, security fixes (but note that nothing in the ports
tree currently uses this library)
* Lowest common hash was selected from signature_algorithms extension in
TLS 1.2 (found by Darren Bane) (introduced in 1.3.8).
* Remotely-triggerable memory leak when parsing some X.509 certificates
(server is not affected if it doesn't ask for a client certificate)
(found using Codenomicon Defensics).
* Remotely-triggerable memory leak when parsing crafted ClientHello
(not affected if ECC support was compiled out) (found using Codenomicon
Defensics).
   2014-11-04 12:45:41 by Stuart Henderson | Files touched by this commit (3)
Log message:
update to polarssl 1.3.9, security fixes (but note that nothing in the ports
tree currently uses this library)
* Lowest common hash was selected from signature_algorithms extension in
TLS 1.2 (found by Darren Bane) (introduced in 1.3.8).
* Remotely-triggerable memory leak when parsing some X.509 certificates
(server is not affected if it doesn't ask for a client certificate)
(found using Codenomicon Defensics).
* Remotely-triggerable memory leak when parsing crafted ClientHello
(not affected if ECC support was compiled out) (found using Codenomicon
Defensics).
   2014-11-04 12:45:41 by Stuart Henderson | Files touched by this commit (3)
Log message:
update to polarssl 1.3.9, security fixes (but note that nothing in the ports
tree currently uses this library)
* Lowest common hash was selected from signature_algorithms extension in
TLS 1.2 (found by Darren Bane) (introduced in 1.3.8).
* Remotely-triggerable memory leak when parsing some X.509 certificates
(server is not affected if it doesn't ask for a client certificate)
(found using Codenomicon Defensics).
* Remotely-triggerable memory leak when parsing crafted ClientHello
(not affected if ECC support was compiled out) (found using Codenomicon
Defensics).