head 1.2; access; symbols pkgsrc-2025Q3:1.1.0.6 pkgsrc-2025Q3-base:1.1 pkgsrc-2025Q2:1.1.0.4 pkgsrc-2025Q2-base:1.1 pkgsrc-2025Q1:1.1.0.2 pkgsrc-2025Q1-base:1.1; locks; strict; comment @// @; 1.2 date 2025.10.19.13.45.31; author adam; state dead; branches; next 1.1; commitid QM2F1aOD4NNKtbfG; 1.1 date 2024.12.30.09.40.20; author wiz; state Exp; branches; next ; commitid zgfgV4m5B6AFxvDF; desc @@ 1.2 log @botan3 py-botan3: updated to 3.9.0 3.9.0 Add SHA-1 implementation using AVX2/BMI2 Add Camellia implementation using GFNI/AVX2 Add SHACAL2 implementation using AVX512 The eFrodoKEM TLS 1.3 ciphersuites have changed the suite code to match changes in OQS. Add support for TLS 1.2 NULL cipher suites. These suites are disabled in the build by default, enable tls_null module to use. Add support for X.509 extensions from RFC 3779 Elliptic curve improvements Add EC_Scalar::hash following RFC 9380’s hash_to_field Modify the OID lookup system to use a static switch for builtin OIDs. Optimizations for X448 and Ed448 Modify BOTAN_CLEAR_CPUID so that clearing ssse3 also disables AVX2/AVX512 Remove various internal references to “EMSA”, an obsolete term used for RSA signature padding that originates from IEEE 1363. Enable support for GCC’s “strub” stack clearing. This is disabled by default, use the --enable-stack-scrubbing option to turn on. Use std::span in the internal block cipher padding mode interfaces Properly check DNS label length restrictions when checking wildcards. Work around a GCC 13/14 miscompilation when LTO is used Fix a bug preventing building System_RNG with only getrandom enabled. Document the specific threat model the library uses Remove configure.py options to disable specific CPU instructions. Remove configure.py option --with-local-config Add a better interface for encoding optional ASN.1 elements using std::optional Internal cleanups relating to multiprecision integers Resolve many warnings from clang-tidy CMake improvements CI improvements @ text @$NetBSD: patch-src_cli_tls__proxy.cpp,v 1.1 2024/12/30 09:40:20 wiz Exp $ https://github.com/randombit/botan/commit/2a406beab449a2cb310fa543451a7087ca7b4b1a --- src/cli/tls_proxy.cpp.orig 2024-10-26 07:00:10.000000000 +0000 +++ src/cli/tls_proxy.cpp @@@@ -106,11 +106,11 @@@@ class tls_proxy_session final : public s typedef std::shared_ptr pointer; - static pointer create(boost::asio::io_service& io, + static pointer create(boost::asio::io_context& io, const std::shared_ptr& session_manager, const std::shared_ptr& credentials, const std::shared_ptr& policy, - const tcp::resolver::iterator& endpoints) { + const tcp::resolver::results_type& endpoints) { auto session = std::make_shared(io, endpoints); // Defer the setup of the TLS server to make use of @@@@ -144,7 +144,7 @@@@ class tls_proxy_session final : public s } } - tls_proxy_session(boost::asio::io_service& io, tcp::resolver::iterator endpoints) : + tls_proxy_session(boost::asio::io_context& io, tcp::resolver::results_type endpoints) : m_strand(io), m_server_endpoints(std::move(endpoints)), m_client_socket(io), @@@@ -287,7 +287,7 @@@@ class tls_proxy_session final : public s void tls_session_activated() override { auto onConnect = [self = weak_from_this()](boost::system::error_code ec, - const tcp::resolver::iterator& /*endpoint*/) { + tcp::resolver::results_type::iterator /*endpoint*/) { if(ec) { log_error("Server connection", ec); return; @@@@ -301,7 +301,7 @@@@ class tls_proxy_session final : public s return; } }; - async_connect(m_server_socket, m_server_endpoints, onConnect); + async_connect(m_server_socket, m_server_endpoints.begin(), m_server_endpoints.end(), onConnect); } void tls_session_established(const Botan::TLS::Session_Summary& session) override { @@@@ -315,9 +315,9 @@@@ class tls_proxy_session final : public s } } - boost::asio::io_service::strand m_strand; + boost::asio::io_context::strand m_strand; - tcp::resolver::iterator m_server_endpoints; + tcp::resolver::results_type m_server_endpoints; tcp::socket m_client_socket; tcp::socket m_server_socket; @@@@ -341,9 +341,9 @@@@ class tls_proxy_server final { public: typedef tls_proxy_session session; - tls_proxy_server(boost::asio::io_service& io, + tls_proxy_server(boost::asio::io_context& io, unsigned short port, - tcp::resolver::iterator endpoints, + tcp::resolver::results_type endpoints, std::shared_ptr creds, std::shared_ptr policy, std::shared_ptr session_mgr, @@@@ -383,7 +383,7 @@@@ class tls_proxy_server final { } tcp::acceptor m_acceptor; - tcp::resolver::iterator m_server_endpoints; + tcp::resolver::results_type m_server_endpoints; std::shared_ptr m_creds; std::shared_ptr m_policy; @@@@ -429,10 +429,10 @@@@ class TLS_Proxy final : public Command { auto policy = load_tls_policy(get_arg("policy")); - boost::asio::io_service io; + boost::asio::io_context io; tcp::resolver resolver(io); - auto server_endpoint_iterator = resolver.resolve({target, target_port}); + auto server_endpoint_iterator = resolver.resolve(target, target_port); std::shared_ptr session_mgr; @ 1.1 log @ibotan3: fix build with boost 1.87 using upstream patch @ text @d1 1 a1 1 $NetBSD$ @