22144600 problem in X11/VNC
authorAlan Coopersmith <Alan.Coopersmith@Oracle.COM>
Sat, 30 Jan 2016 20:09:19 -0800
changeset 1601 8c094bb73cdf
parent 1600 84968a0fa1b4
child 1602 5761ecbe7d0a
22144600 problem in X11/VNC
exception_lists/check_rtime
open-src/xserver/xvnc/Makefile
open-src/xserver/xvnc/gnutls-3.patch
open-src/xserver/xvnc/gnutls-disable-sslv3.patch
open-src/xserver/xvnc/gnutls-drop-ecdh.patch
pkg/manifests/developer-opensolaris-X.p5m
--- a/exception_lists/check_rtime	Thu Jan 28 22:41:53 2016 -0800
+++ b/exception_lists/check_rtime	Sat Jan 30 20:09:19 2016 -0800
@@ -1,5 +1,5 @@
 #
-# Copyright (c) 2011, 2015, Oracle and/or its affiliates. All rights reserved.
+# Copyright (c) 2011, 2016, Oracle and/or its affiliates. All rights reserved.
 #
 # Permission is hereby granted, free of charge, to any person obtaining a
 # copy of this software and associated documentation files (the "Software"),
@@ -70,7 +70,6 @@
 UNREF_OBJ       /libXext\.so\.0;\ unused\ dependency\ of .*/libX11\.so\.4
 #
 # Unreferenced objects of objects from other consolidations
-UNREF_OBJ	/lib.*\ of\ .*libgnutls\.so\.26
 UNREF_OBJ	/lib.*\ of\ .*libstdcxx4\.so\.4
 
 #
--- a/open-src/xserver/xvnc/Makefile	Thu Jan 28 22:41:53 2016 -0800
+++ b/open-src/xserver/xvnc/Makefile	Sat Jan 30 20:09:19 2016 -0800
@@ -4,7 +4,7 @@
 # Based on Fedora's tigervnc.spec revision 1.20 from
 # http://cvs.fedoraproject.org/viewvc/rpms/tigervnc/devel/tigervnc.spec
 #
-# Copyright (c) 2007, 2015, Oracle and/or its affiliates. All rights reserved.
+# Copyright (c) 2007, 2016, Oracle and/or its affiliates. All rights reserved.
 #
 # Permission is hereby granted, free of charge, to any person obtaining a
 # copy of this software and associated documentation files (the "Software"),
@@ -84,8 +84,9 @@
 SOURCE_PATCHES += 17950657.patch,-p1
 SOURCE_PATCHES += studio12.4-patch,-p1
 SOURCE_PATCHES += CVE-2014-8240.patch,-p1
-SOURCE_PATCHES += gnutls-disable-sslv3.patch,-p1
 SOURCE_PATCHES += vnc-Makefile.patch,-p1
+SOURCE_PATCHES += gnutls-3.patch,-p1
+SOURCE_PATCHES += gnutls-drop-ecdh.patch,-p1
 
 # Need to regenerate autoconf/automake files after patching
 AUTORECONF=yes
@@ -149,6 +150,13 @@
 # Command line options to GNU autoconf configure script for vnc clients
 MODULE_CONFIG_OPTS  = --with-installed-zlib --with-system-jpeg --without-simd
 MODULE_CONFIG_OPTS += --libdir='$${exec_prefix}/lib/vnc'
+MODULE_CONFIG_OPTS += --enable-gnutls
+
+# Force use of gnutls-3 pkgconfig during 2.x->3.x transition (bug 22144600)
+GNUTLS_PKGCONFIG_CMD = \
+    PKG_CONFIG_PATH=/usr/lib/$(SUBDIR64)/pkgconfig/gnutls-3/ pkg-config
+MODULE_CONFIG_OPTS += GNUTLS_CFLAGS="$$($(GNUTLS_PKGCONFIG_CMD) --cflags gnutls)"
+MODULE_CONFIG_OPTS += GNUTLS_LDFLAGS="$$($(GNUTLS_PKGCONFIG_CMD) --libs gnutls)"
 
 # Compatibility links from /usr/X11/bin to /usr/bin
 MODULE_X11_BINCOMPAT_LINKS = Xvnc
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/open-src/xserver/xvnc/gnutls-3.patch	Sat Jan 30 20:09:19 2016 -0800
@@ -0,0 +1,847 @@
+GnuTLS 3 support from upstream, extracted from these commits and backported
+to TigerVNC 1.1 (including use of automake instead of Cmake):
+
+From fe48cd4d2427c0262cd58b30c74331a9fce756c7 Mon Sep 17 00:00:00 2001
+From: Pierre Ossman <[email protected]>
+Date: Tue, 3 Jul 2012 14:43:38 +0000
+Subject: [PATCH] Refactor the TLS code so that the push/pull functions are
+ aware of their containing stream object. This is in
+ preparation for supporting GnuTLS 3.x.
+
+git-svn-id: svn://svn.code.sf.net/p/tigervnc/code/trunk@4921 3789f03b-4d11-0410-bbf8-ca57d06f2519
+---
+From 2137f4f78f2b80faf96707907cd08562d83f1216 Mon Sep 17 00:00:00 2001
+From: Pierre Ossman <[email protected]>
+Date: Tue, 3 Jul 2012 14:52:26 +0000
+Subject: [PATCH] GnuTLS 3.x has removed gnutls_transport_set_global_errno()
+ in favour of gnutls_transport_set_errno(). Make sure we
+ call the right errno function depending on which GnuTLS
+ we're using.
+
+git-svn-id: svn://svn.code.sf.net/p/tigervnc/code/trunk@4922 3789f03b-4d11-0410-bbf8-ca57d06f2519
+---
+From 88c24edd8f7a793561104be50b6ecf2c85b42956 Mon Sep 17 00:00:00 2001
+From: Pierre Ossman <[email protected]>
+Date: Thu, 29 Jan 2015 13:12:22 +0100
+Subject: [PATCH] Raise GnuTLS requirements to 3.x
+
+This allows us to simplify things by getting rid of some old
+compatibility code. People should really be using current versions
+of GnuTLS anyway to stay secure.
+---
+From 27eb55e1975c4f558f6a53d573091e76064cc8e7 Mon Sep 17 00:00:00 2001
+From: Pierre Ossman <[email protected]>
+Date: Thu, 29 Jan 2015 13:31:06 +0100
+Subject: [PATCH] Add parameter to override GnuTLS priority
+
+---
+From 660f1081d7cd1e4c763675ace8181ed34d377d34 Mon Sep 17 00:00:00 2001
+From: Pierre Ossman <[email protected]>
+Date: Wed, 2 Mar 2011 12:44:12 +0000
+Subject: [PATCH] Make it easier to read string parameters by providing an
+ implicit conversion to const char*.
+
+git-svn-id: svn://svn.code.sf.net/p/tigervnc/code/trunk@4307 3789f03b-4d11-0410-bbf8-ca57d06f2519
+---
+
+diff --git a/common/os/Makefile.am b/common/os/Makefile.am
+index ab4f2d7..d87a0da 100644
+--- a/common/os/Makefile.am
++++ b/common/os/Makefile.am
+@@ -1,8 +1,8 @@
+ noinst_LTLIBRARIES = libos.la
+ 
+-HDRS = net.h print.h os.h tls.h
++HDRS = net.h print.h os.h
+ 
+-libos_la_SOURCES = $(HDRS) print.c net.c os.cxx tls.cxx
++libos_la_SOURCES = $(HDRS) print.c net.c os.cxx
+ 
+ libos_la_CPPFLAGS = -I$(top_srcdir)/common
+ 
+diff --git a/common/os/tls.cxx b/./prev/common/os/tls.cxx
+deleted file mode 100644
+index c092996..0000000
+--- a/common/os/tls.cxx
++++ /dev/null
+@@ -1,198 +0,0 @@
+-/* Copyright (C) 2011 TightVNC Team.  All Rights Reserved.
+- *
+- * This is free software; you can redistribute it and/or modify
+- * it under the terms of the GNU General Public License as published by
+- * the Free Software Foundation; either version 2 of the License, or
+- * (at your option) any later version.
+- * 
+- * This software is distributed in the hope that it will be useful,
+- * but WITHOUT ANY WARRANTY; without even the implied warranty of
+- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+- * GNU General Public License for more details.
+- * 
+- * You should have received a copy of the GNU General Public License
+- * along with this software; if not, write to the Free Software
+- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307,
+- * USA.
+- */
+-
+-#ifdef HAVE_CONFIG_H
+-#include <config.h>
+-#endif
+-
+-#include <os/tls.h>
+-
+-#include <iomanip>
+-#include <stdio.h>
+-#include <stdlib.h>
+-#include <string.h>
+-#include <sstream>
+-#include <sys/types.h>
+-#include <time.h>
+-
+-using namespace std;
+-
+-#if defined(HAVE_GNUTLS) && !defined(WIN32)
+-#include <gnutls/gnutls.h>
+-#include <gnutls/x509.h>
+-
+-#ifndef HAVE_GNUTLS_X509_CRT_PRINT
+-
+-/* Ancient GNUTLS... */
+-#if !defined(GNUTLS_VERSION_NUMBER) && !defined(LIBGNUTLS_VERSION_NUMBER)
+-#define GNUTLS_DIG_SHA1 GNUTLS_DIG_SHA
+-#endif
+-
+-#define UNKNOWN_SUBJECT(err) \
+-	do { \
+-		ss << "unknown subject (" << gnutls_strerror(err) << "), "; \
+-	} while (0)
+-
+-#define UNKNOWN_ISSUER(err) \
+-	do { \
+-		ss << "unknown issuer (" << gnutls_strerror(err) << "), "; \
+-	} while (0)
+-
+-
+-static void
+-hexprint(ostringstream &ss, const char *data, size_t len)
+-{
+-	size_t j;
+-	char tmp[3];
+-
+-	if (len == 0)
+-		ss << "00";
+-	else {
+-		for (j = 0; j < len; j++) {
+-			snprintf(tmp, sizeof(tmp), "%.2x", (unsigned char) data[j]);
+-			ss << tmp;
+-		}
+-	}
+-}
+-
+-/* Implementation based on gnutls_x509_crt_print from GNUTLS */
+-int
+-gnutls_x509_crt_print(gnutls_x509_crt_t cert,
+-		      gnutls_certificate_print_formats_t format,
+-		      gnutls_datum_t * out)
+-{
+-	ostringstream ss;
+-	
+-	int err;
+-
+-	char *dn;
+-	size_t dn_size = 0;
+-
+-	/* Subject */
+-	err = gnutls_x509_crt_get_dn(cert, NULL, &dn_size);
+-	if (err != GNUTLS_E_SHORT_MEMORY_BUFFER)
+-		UNKNOWN_SUBJECT(err);
+-	else {
+-		dn = (char *)malloc(dn_size);
+-		if (dn == NULL) {
+-			UNKNOWN_SUBJECT(GNUTLS_E_MEMORY_ERROR);
+-		} else {
+-			err = gnutls_x509_crt_get_dn(cert, dn, &dn_size);
+-			if (err < 0) {
+-				UNKNOWN_SUBJECT(err);
+-			} else
+-				ss << "subject `" << dn << "', ";
+-			free(dn);
+-		}
+-	}
+-
+-	/* Issuer */
+-	dn = NULL;
+-	dn_size = 0;
+-	err = gnutls_x509_crt_get_issuer_dn(cert, NULL, &dn_size);
+-	if (err != GNUTLS_E_SHORT_MEMORY_BUFFER)
+-		UNKNOWN_ISSUER(err);
+-	else {
+-		dn = (char *)malloc(dn_size);
+-		if (dn == NULL) {
+-			UNKNOWN_ISSUER(GNUTLS_E_MEMORY_ERROR);
+-		} else {
+-			err = gnutls_x509_crt_get_issuer_dn(cert, dn, &dn_size);
+-			if (err < 0)
+-				UNKNOWN_ISSUER(err);
+-			else
+-				ss << "issuer `" << dn << "', ";
+-			free(dn);
+-		}
+-	}
+-
+-	/* Key algorithm and size */
+-	unsigned int bits;
+-	const char *name;
+-	name = gnutls_pk_algorithm_get_name( (gnutls_pk_algorithm_t)
+-		gnutls_x509_crt_get_pk_algorithm(cert, &bits));
+-	if (name == NULL)
+-		name = "Unknown";
+-	ss << name << " key " << bits << " bits, ";
+-
+-	/* Signature algorithm */
+-	err = gnutls_x509_crt_get_signature_algorithm(cert);
+-	if (err < 0) {
+-		ss << "unknown signature algorithm (" << gnutls_strerror(err)
+-		   << "), ";
+-	} else {
+-		const char *name;
+-		name = gnutls_sign_algorithm_get_name((gnutls_sign_algorithm_t)err);
+-		if (name == NULL)
+-			name = "Unknown";
+-
+-		ss << "signed using " << name;
+-		if (err == GNUTLS_SIGN_RSA_MD5 || err == GNUTLS_SIGN_RSA_MD2)
+-			ss << " (broken!)";
+-		ss << ", ";
+-	}
+-
+-	/* Validity */
+-	time_t tim;
+-	char s[42];
+-	size_t max = sizeof(s);
+-	struct tm t;
+-
+-	tim = gnutls_x509_crt_get_activation_time(cert);
+-	if (gmtime_r(&tim, &t) == NULL)
+-		ss << "unknown activation (" << (unsigned long) tim << ")";
+-	else if (strftime(s, max, "%Y-%m-%d %H:%M:%S UTC", &t) == 0)
+-		ss << "failed activation (" << (unsigned long) tim << ")";
+-	else
+-		ss << "activated `" << s << "'";
+-	ss << ", ";
+-
+-	tim = gnutls_x509_crt_get_expiration_time(cert);
+-	if (gmtime_r(&tim, &t) == NULL)
+-		ss << "unknown expiry (" << (unsigned long) tim << ")";
+-	else if (strftime(s, max, "%Y-%m-%d %H:%M:%S UTC", &t) == 0)
+-		ss << "failed expiry (" << (unsigned long) tim << ")";
+-	else
+-		ss << "expires `" << s << "'";
+-	ss << ", ";
+-
+-	/* Fingerprint */
+-	char buffer[20];
+-	size_t size = sizeof(buffer);
+-
+-	err = gnutls_x509_crt_get_fingerprint(cert, GNUTLS_DIG_SHA1, buffer, &size);
+-	if (err < 0)
+-		ss << "unknown fingerprint (" << gnutls_strerror(err) << ")";
+-	else {
+-		ss << "SHA-1 fingerprint `";
+-		hexprint(ss, buffer, size);
+-		ss << "'";
+-	}
+-
+-	out->data = (unsigned char *) strdup(ss.str().c_str());
+-	if (out->data == NULL)
+-		return GNUTLS_E_MEMORY_ERROR;
+-	out->size = strlen((char *)out->data);
+-
+-	return 0;
+-}
+-
+-#endif /* HAVE_GNUTLS_X509_CRT_PRINT */
+-
+-#endif /* HAVE_GNUTLS */
+-
+diff --git a/common/os/tls.h b/./prev/common/os/tls.h
+deleted file mode 100644
+index 8980197..0000000
+--- a/common/os/tls.h
++++ /dev/null
+@@ -1,63 +0,0 @@
+-/* Copyright (C) 2011 TightVNC Team.  All Rights Reserved.
+- *
+- * This is free software; you can redistribute it and/or modify
+- * it under the terms of the GNU General Public License as published by
+- * the Free Software Foundation; either version 2 of the License, or
+- * (at your option) any later version.
+- * 
+- * This software is distributed in the hope that it will be useful,
+- * but WITHOUT ANY WARRANTY; without even the implied warranty of
+- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+- * GNU General Public License for more details.
+- * 
+- * You should have received a copy of the GNU General Public License
+- * along with this software; if not, write to the Free Software
+- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307,
+- * USA.
+- */
+-
+-#ifndef OS_TLS_H
+-#define OS_TLS_H
+-
+-#ifdef HAVE_CONFIG_H
+-#include <config.h>
+-#endif
+-
+-/*
+- * Windows builds are build against fairly new GNUTLS, ignore compatibility
+- * code.
+- */
+-#if defined(HAVE_GNUTLS) && !defined(WIN32)
+-#include <gnutls/gnutls.h>
+-
+-#ifndef HAVE_GNUTLS_DATUM_T
+-typedef gnutls_datum gnutls_datum_t;
+-#endif
+-#ifndef HAVE_GNUTLS_CRT_T
+-typedef gnutls_x509_crt gnutls_x509_crt_t;
+-#endif
+-#ifndef HAVE_GNUTLS_PK_ALGORITHM_T
+-typedef gnutls_pk_algorithm gnutls_pk_algorithm_t;
+-#endif
+-#ifndef HAVE_GNUTLS_SIGN_ALGORITHM_T
+-typedef gnutls_sign_algorithm gnutls_sign_algorithm_t;
+-#endif
+-
+-#ifndef HAVE_GNUTLS_X509_CRT_PRINT
+-
+-typedef enum {
+-	GNUTLS_CRT_PRINT_ONELINE = 1
+-} gnutls_certificate_print_formats_t;
+-
+-/*
+- * Prints certificate in human-readable form.
+- */
+-int
+-gnutls_x509_crt_print(gnutls_x509_crt_t cert,
+-		      gnutls_certificate_print_formats_t format,
+-		      gnutls_datum_t * out);
+-#endif /* HAVE_GNUTLS_X509_CRT_PRINT */
+-#endif /* HAVE_GNUTLS */
+-
+-#endif /* OS_TLS_H */
+-
+diff --git a/common/rdr/TLSInStream.cxx b/common/rdr/TLSInStream.cxx
+index ddc9991..ef030c1 100644
+--- a/common/rdr/TLSInStream.cxx
++++ b/common/rdr/TLSInStream.cxx
+@@ -27,23 +27,19 @@
+ #include <rdr/TLSInStream.h>
+ #include <errno.h>
+ 
+-#ifdef HAVE_OLD_GNUTLS
+-#define gnutls_transport_set_global_errno(A) do { errno = (A); } while(0)
+-#endif
+-
+ #ifdef HAVE_GNUTLS 
+ using namespace rdr;
+ 
+ enum { DEFAULT_BUF_SIZE = 16384 };
+ 
+-ssize_t rdr::gnutls_InStream_pull(gnutls_transport_ptr str, void* data,
+-				  size_t size)
++ssize_t TLSInStream::pull(gnutls_transport_ptr_t str, void* data, size_t size)
+ {
+-  InStream* in= (InStream*) str;
++  TLSInStream* self= (TLSInStream*) str;
++  InStream *in = self->in;
+ 
+   try {
+     if (!in->check(1, 1, false)) {
+-      gnutls_transport_set_global_errno(EAGAIN);
++      gnutls_transport_set_errno(self->session, EAGAIN);
+       return -1;
+     }
+ 
+@@ -53,21 +49,29 @@ ssize_t rdr::gnutls_InStream_pull(gnutls_transport_ptr str, void* data,
+     in->readBytes(data, size);
+ 
+   } catch (Exception& e) {
+-    gnutls_transport_set_global_errno(EINVAL);
++    gnutls_transport_set_errno(self->session, EINVAL);
+     return -1;
+   }
+ 
+   return size;
+ }
+ 
+-TLSInStream::TLSInStream(InStream* _in, gnutls_session _session)
++TLSInStream::TLSInStream(InStream* _in, gnutls_session_t _session)
+   : session(_session), in(_in), bufSize(DEFAULT_BUF_SIZE), offset(0)
+ {
++  gnutls_transport_ptr_t recv, send;
++
+   ptr = end = start = new U8[bufSize];
++
++  gnutls_transport_set_pull_function(session, pull);
++  gnutls_transport_get_ptr2(session, &recv, &send);
++  gnutls_transport_set_ptr2(session, this, send);
+ }
+ 
+ TLSInStream::~TLSInStream()
+ {
++  gnutls_transport_set_pull_function(session, NULL);
++
+   delete[] start;
+ }
+ 
+diff --git a/common/rdr/TLSInStream.h b/common/rdr/TLSInStream.h
+index 7fad6fa..b16d9f5 100644
+--- a/common/rdr/TLSInStream.h
++++ b/common/rdr/TLSInStream.h
+@@ -33,7 +33,7 @@ namespace rdr {
+ 
+   class TLSInStream : public InStream {
+   public:
+-    TLSInStream(InStream* in, gnutls_session session);
++    TLSInStream(InStream* in, gnutls_session_t session);
+     virtual ~TLSInStream();
+ 
+     int pos();
+@@ -41,16 +41,14 @@ namespace rdr {
+   private:
+     int overrun(int itemSize, int nItems, bool wait);
+     int readTLS(U8* buf, int len, bool wait);
++    static ssize_t pull(gnutls_transport_ptr_t str, void* data, size_t size);
+ 
+-    gnutls_session session;
++    gnutls_session_t session;
+     InStream* in;
+     int bufSize;
+     int offset;
+     U8* start;
+   };
+-
+-  ssize_t gnutls_InStream_pull(gnutls_transport_ptr,void*, size_t);
+-
+ };
+ 
+ #endif
+diff --git a/common/rdr/TLSOutStream.cxx b/common/rdr/TLSOutStream.cxx
+index d577ccc..44d2d9f 100644
+--- a/common/rdr/TLSOutStream.cxx
++++ b/common/rdr/TLSOutStream.cxx
+@@ -27,36 +27,39 @@
+ #include <rdr/TLSOutStream.h>
+ #include <errno.h>
+ 
+-#ifdef HAVE_OLD_GNUTLS
+-#define gnutls_transport_set_global_errno(A) do { errno = (A); } while(0)
+-#endif
+-
+ #ifdef HAVE_GNUTLS
+ using namespace rdr;
+ 
+ enum { DEFAULT_BUF_SIZE = 16384 };
+ 
+-ssize_t rdr::gnutls_OutStream_push(gnutls_transport_ptr str, const void* data,
++ssize_t TLSOutStream::push(gnutls_transport_ptr_t str, const void* data,
+ 				   size_t size)
+ {
+-  OutStream* out = (OutStream*) str;
++  TLSOutStream* self= (TLSOutStream*) str;
++  OutStream *out = self->out;
+ 
+   try {
+     out->writeBytes(data, size);
+     out->flush();
+   } catch (Exception& e) {
+-    gnutls_transport_set_global_errno(EINVAL);
++    gnutls_transport_set_errno(self->session, EINVAL);
+     return -1;
+   }
+ 
+   return size;
+ }
+ 
+-TLSOutStream::TLSOutStream(OutStream* _out, gnutls_session _session)
++TLSOutStream::TLSOutStream(OutStream* _out, gnutls_session_t _session)
+   : session(_session), out(_out), bufSize(DEFAULT_BUF_SIZE), offset(0)
+ {
++  gnutls_transport_ptr_t recv, send;
++
+   ptr = start = new U8[bufSize];
+   end = start + bufSize;
++
++  gnutls_transport_set_push_function(session, push);
++  gnutls_transport_get_ptr2(session, &recv, &send);
++  gnutls_transport_set_ptr2(session, recv, this);
+ }
+ 
+ TLSOutStream::~TLSOutStream()
+@@ -67,6 +70,8 @@ TLSOutStream::~TLSOutStream()
+   } catch (Exception&) {
+   }
+ #endif
++  gnutls_transport_set_push_function(session, NULL);
++
+   delete [] start;
+ }
+ 
+diff --git a/common/rdr/TLSOutStream.h b/common/rdr/TLSOutStream.h
+index 5eb512e..81dd237 100644
+--- a/common/rdr/TLSOutStream.h
++++ b/common/rdr/TLSOutStream.h
+@@ -32,7 +32,7 @@ namespace rdr {
+ 
+   class TLSOutStream : public OutStream {
+   public:
+-    TLSOutStream(OutStream* out, gnutls_session session);
++    TLSOutStream(OutStream* out, gnutls_session_t session);
+     virtual ~TLSOutStream();
+ 
+     void flush();
+@@ -43,15 +43,14 @@ namespace rdr {
+ 
+   private:
+     int writeTLS(const U8* data, int length);
++    static ssize_t push(gnutls_transport_ptr_t str, const void* data, size_t size);
+ 
+-    gnutls_session session;
++    gnutls_session_t session;
+     OutStream* out;
+     int bufSize;
+     U8* start;
+     int offset;
+   };
+-
+-  ssize_t gnutls_OutStream_push(gnutls_transport_ptr, const void*, size_t);
+ };
+ 
+ #endif
+diff --git a/common/rfb/Configuration.cxx b/common/rfb/Configuration.cxx
+index e9eee1a..8137501 100644
+--- a/common/rfb/Configuration.cxx
++++ b/common/rfb/Configuration.cxx
+@@ -444,6 +444,10 @@ char* StringParameter::getValueStr() const {
+   return strDup(value);
+ }
+ 
++StringParameter::operator const char *() const {
++  return value;
++}
++
+ // -=- BinaryParameter
+ 
+ BinaryParameter::BinaryParameter(const char* name_, const char* desc_,
+diff --git a/common/rfb/Configuration.h b/common/rfb/Configuration.h
+index 276651d..35e31fc 100644
+--- a/common/rfb/Configuration.h
++++ b/common/rfb/Configuration.h
+@@ -241,6 +241,7 @@ namespace rfb {
+     virtual char* getDefaultStr() const;
+     virtual char* getValueStr() const;
+     void setDefaultStr(const char* v);
++    operator const char*() const;
+ 
+     // getData() returns a copy of the data - it must be delete[]d by the
+     // caller.
+diff --git a/common/rfb/CSecurityTLS.cxx b/common/rfb/CSecurityTLS.cxx
+index 3421de5..a60dbdd 100644
+--- a/common/rfb/CSecurityTLS.cxx
++++ b/common/rfb/CSecurityTLS.cxx
+@@ -43,7 +43,6 @@
+ #include <rdr/TLSOutStream.h>
+ #include <os/os.h>
+ #include <os/print.h>
+-#include <os/tls.h>
+ 
+ #include <gnutls/x509.h>
+ 
+@@ -188,20 +187,20 @@ bool CSecurityTLS::processMsg(CConnection* cc)
+       throw AuthFailureException("gnutls_set_default_priority failed");
+ 
+     setParam();
+-    
+-    gnutls_transport_set_pull_function(session, rdr::gnutls_InStream_pull);
+-    gnutls_transport_set_push_function(session, rdr::gnutls_OutStream_push);
+-    gnutls_transport_set_ptr2(session,
+-			      (gnutls_transport_ptr) is,
+-			      (gnutls_transport_ptr) os);
+   }
+ 
++  rdr::TLSInStream *tlsis = new rdr::TLSInStream(is, session);
++  rdr::TLSOutStream *tlsos = new rdr::TLSOutStream(os, session);
++
+   int err;
+   err = gnutls_handshake(session);
+-  if (err != GNUTLS_E_SUCCESS && !gnutls_error_is_fatal(err))
+-    return false;
+-
+   if (err != GNUTLS_E_SUCCESS) {
++    delete tlsis;
++    delete tlsos;
++
++    if (!gnutls_error_is_fatal(err))
++      return false;
++
+     vlog.error("TLS Handshake failed: %s\n", gnutls_strerror (err));
+     shutdown(false);
+     throw AuthFailureException("TLS Handshake failed");
+@@ -209,22 +208,39 @@ bool CSecurityTLS::processMsg(CConnection* cc)
+ 
+   checkSession();
+ 
+-  cc->setStreams(fis = new rdr::TLSInStream(is, session),
+-		 fos = new rdr::TLSOutStream(os, session));
++  cc->setStreams(fis = tlsis, fos = tlsos);
+ 
+   return true;
+ }
+ 
+ void CSecurityTLS::setParam()
+ {
+-  static const int kx_anon_priority[] = { GNUTLS_KX_ANON_DH, 0 };
+-  static const int kx_priority[] = { GNUTLS_KX_DHE_DSS, GNUTLS_KX_RSA,
+-				     GNUTLS_KX_DHE_RSA, GNUTLS_KX_SRP, 0 };
++  static const char kx_anon_priority[] = ":+ANON-ECDH:+ANON-DH";
+ 
+-  if (anon) {
+-    if (gnutls_kx_set_priority(session, kx_anon_priority) != GNUTLS_E_SUCCESS)
+-      throw AuthFailureException("gnutls_kx_set_priority failed");
++  int ret;
++  char *prio;
++  const char *err;
++
++  prio = (char*)malloc(strlen(Security::GnuTLSPriority) +
++                       strlen(kx_anon_priority) + 1);
++  if (prio == NULL)
++    throw AuthFailureException("Not enough memory for GnuTLS priority string");
+ 
++  strcpy(prio, Security::GnuTLSPriority);
++  if (anon)
++    strcat(prio, kx_anon_priority);
++
++  ret = gnutls_priority_set_direct(session, prio, &err);
++
++  free(prio);
++
++  if (ret != GNUTLS_E_SUCCESS) {
++    if (ret == GNUTLS_E_INVALID_REQUEST)
++      vlog.error("GnuTLS priority syntax error at: %s", err);
++    throw AuthFailureException("gnutls_set_priority_direct failed");
++  }
++
++  if (anon) {
+     if (gnutls_anon_allocate_client_credentials(&anon_cred) != GNUTLS_E_SUCCESS)
+       throw AuthFailureException("gnutls_anon_allocate_client_credentials failed");
+ 
+@@ -233,9 +249,6 @@ void CSecurityTLS::setParam()
+ 
+     vlog.debug("Anonymous session has been set");
+   } else {
+-    if (gnutls_kx_set_priority(session, kx_priority) != GNUTLS_E_SUCCESS)
+-      throw AuthFailureException("gnutls_kx_set_priority failed");
+-
+     if (gnutls_certificate_allocate_credentials(&cert_cred) != GNUTLS_E_SUCCESS)
+       throw AuthFailureException("gnutls_certificate_allocate_credentials failed");
+ 
+@@ -274,10 +287,10 @@ void CSecurityTLS::checkSession()
+ 				  GNUTLS_CERT_SIGNER_NOT_FOUND |
+ 				  GNUTLS_CERT_SIGNER_NOT_CA;
+   unsigned int status;
+-  const gnutls_datum *cert_list;
++  const gnutls_datum_t *cert_list;
+   unsigned int cert_list_size = 0;
+   int err;
+-  gnutls_datum info;
++  gnutls_datum_t info;
+ 
+   if (anon)
+     return;
+@@ -313,7 +326,7 @@ void CSecurityTLS::checkSession()
+     throw AuthFailureException("empty certificate chain");
+ 
+   /* Process only server's certificate, not issuer's certificate */
+-  gnutls_x509_crt crt;
++  gnutls_x509_crt_t crt;
+   gnutls_x509_crt_init(&crt);
+ 
+   if (gnutls_x509_crt_import(crt, &cert_list[0], GNUTLS_X509_FMT_DER) < 0)
+diff --git a/common/rfb/CSecurityTLS.h b/common/rfb/CSecurityTLS.h
+index c19307e..50aaf30 100644
+--- a/common/rfb/CSecurityTLS.h
++++ b/common/rfb/CSecurityTLS.h
+@@ -64,9 +64,9 @@ namespace rfb {
+   private:
+     static void initGlobal();
+ 
+-    gnutls_session session;
+-    gnutls_anon_client_credentials anon_cred;
+-    gnutls_certificate_credentials cert_cred;
++    gnutls_session_t session;
++    gnutls_anon_client_credentials_t anon_cred;
++    gnutls_certificate_credentials_t cert_cred;
+     bool anon;
+ 
+     char *cafile, *crlfile;
+diff --git a/common/rfb/SSecurityTLS.cxx b/common/rfb/SSecurityTLS.cxx
+index 2ea84e0..c2b1ded 100644
+--- a/common/rfb/SSecurityTLS.cxx
++++ b/common/rfb/SSecurityTLS.cxx
+@@ -27,6 +27,8 @@
+ #error "This source should not be compiled without HAVE_GNUTLS defined"
+ #endif
+ 
++#include <stdlib.h>
++
+ #include <rfb/SSecurityTLS.h>
+ #include <rfb/SConnection.h>
+ #include <rfb/LogWriter.h>
+@@ -148,17 +150,19 @@ bool SSecurityTLS::processMsg(SConnection *sc)
+       throw;
+     }
+ 
+-    gnutls_transport_set_pull_function(session,rdr::gnutls_InStream_pull);
+-    gnutls_transport_set_push_function(session,rdr::gnutls_OutStream_push);
+-    gnutls_transport_set_ptr2(session,
+-			      (gnutls_transport_ptr)is,
+-			      (gnutls_transport_ptr)os);
+     os->writeU8(1);
+     os->flush();
+   }
+ 
++  rdr::TLSInStream *tlsis = new rdr::TLSInStream(is, session);
++  rdr::TLSOutStream *tlsos = new rdr::TLSOutStream(os, session);
++
+   int err;
+-  if ((err = gnutls_handshake(session)) != GNUTLS_E_SUCCESS) {
++  err = gnutls_handshake(session);
++  if (err != GNUTLS_E_SUCCESS) {
++    delete tlsis;
++    delete tlsos;
++
+     if (!gnutls_error_is_fatal(err)) {
+       vlog.debug("Deferring completion of TLS handshake: %s", gnutls_strerror(err));
+       return false;
+@@ -170,21 +174,37 @@ bool SSecurityTLS::processMsg(SConnection *sc)
+ 
+   vlog.debug("Handshake completed");
+ 
+-  sc->setStreams(fis=new rdr::TLSInStream(is,session),
+-		 fos=new rdr::TLSOutStream(os,session));
++  sc->setStreams(fis = tlsis, fos = tlsos);
+ 
+   return true;
+ }
+ 
+-void SSecurityTLS::setParams(gnutls_session session)
++void SSecurityTLS::setParams(gnutls_session_t session)
+ {
+-  static const int kx_anon_priority[] = { GNUTLS_KX_ANON_DH, 0 };
+-  static const int kx_priority[] = { GNUTLS_KX_DHE_DSS, GNUTLS_KX_RSA,
+-				     GNUTLS_KX_DHE_RSA, GNUTLS_KX_SRP, 0 };
++  static const char kx_anon_priority[] = ":+ANON-ECDH:+ANON-DH";
++
++  int ret;
++  char *prio;
++  const char *err;
++
++  prio = (char*)malloc(strlen(Security::GnuTLSPriority) +
++                       strlen(kx_anon_priority) + 1);
++  if (prio == NULL)
++    throw AuthFailureException("Not enough memory for GnuTLS priority string");
+ 
+-  if (gnutls_kx_set_priority(session, anon ? kx_anon_priority : kx_priority)
+-      != GNUTLS_E_SUCCESS)
+-    throw AuthFailureException("gnutls_kx_set_priority failed");
++  strcpy(prio, Security::GnuTLSPriority);
++  if (anon)
++    strcat(prio, kx_anon_priority);
++
++  ret = gnutls_priority_set_direct(session, prio, &err);
++
++  free(prio);
++
++  if (ret != GNUTLS_E_SUCCESS) {
++    if (ret == GNUTLS_E_INVALID_REQUEST)
++      vlog.error("GnuTLS priority syntax error at: %s", err);
++    throw AuthFailureException("gnutls_set_priority_direct failed");
++  }
+ 
+   if (gnutls_dh_params_init(&dh_params) != GNUTLS_E_SUCCESS)
+     throw AuthFailureException("gnutls_dh_params_init failed");
+diff --git a/common/rfb/SSecurityTLS.h b/common/rfb/SSecurityTLS.h
+index 4eebc7e..a793205 100644
+--- a/common/rfb/SSecurityTLS.h
++++ b/common/rfb/SSecurityTLS.h
+@@ -51,15 +51,15 @@ namespace rfb {
+ 
+   protected:
+     void shutdown();
+-    void setParams(gnutls_session session);
++    void setParams(gnutls_session_t session);
+ 
+   private:
+     static void initGlobal();
+ 
+-    gnutls_session session;
+-    gnutls_dh_params dh_params;
+-    gnutls_anon_server_credentials anon_cred;
+-    gnutls_certificate_credentials cert_cred;
++    gnutls_session_t session;
++    gnutls_dh_params_t dh_params;
++    gnutls_anon_server_credentials_t anon_cred;
++    gnutls_certificate_credentials_t cert_cred;
+     char *keyfile, *certfile;
+ 
+     int type;
+diff --git a/common/rfb/Security.cxx b/common/rfb/Security.cxx
+index e51c891..342aa8f 100644
+--- a/common/rfb/Security.cxx
++++ b/common/rfb/Security.cxx
+@@ -52,6 +52,12 @@ using namespace std;
+ 
+ static LogWriter vlog("Security");
+ 
++#ifdef HAVE_GNUTLS
++StringParameter Security::GnuTLSPriority("GnuTLSPriority",
++  "GnuTLS priority string that controls the TLS session’s handshake algorithms",
++  "NORMAL");
++#endif
++
+ Security::Security(StringParameter &secTypes)
+ {
+   char *secTypesStr;
+diff --git a/common/rfb/Security.h b/common/rfb/Security.h
+index 832735a..e69adf6 100644
+--- a/common/rfb/Security.h
++++ b/common/rfb/Security.h
+@@ -93,6 +93,10 @@ namespace rfb {
+     /* Output char* is stored in static array */
+     char *ToString(void);
+ 
++#ifdef HAVE_GNUTLS
++    static StringParameter GnuTLSPriority;
++#endif
++
+   private:
+     std::list<rdr::U32> enabledSecTypes;
+   };
+diff --git a/configure.ac b/configure.ac
+index b0b6501..cf1ad6e 100644
+--- a/configure.ac
++++ b/configure.ac
+@@ -100,6 +100,11 @@ if test "x$enable_gnutls" = xyes; then
+ 		       [GNUTLS_LIBS=${GNUTLS_LDFLAGS}
+ 			AC_DEFINE(HAVE_GNUTLS, 1, [Is gnutls present? ])
+ 			AC_MSG_RESULT(yes)], AC_MSG_RESULT(no))
++	AC_MSG_CHECKING([for gnutls_transport_set_errno() function])
++	AC_LINK_IFELSE(AC_LANG_CALL([], gnutls_transport_set_errno),
++		       AC_MSG_RESULT(yes),
++		       [AC_DEFINE(HAVE_GNUTLS_SET_ERRNO, 1, [Does gnutls have the gnutls_transport_set_errno() function? ])
++			AC_MSG_RESULT(no)])
+ 	AC_MSG_CHECKING([for gnutls_transport_set_global_errno() function])
+ 	AC_LINK_IFELSE(AC_LANG_CALL([], gnutls_transport_set_global_errno),
+ 		       AC_MSG_RESULT(yes),
--- a/open-src/xserver/xvnc/gnutls-disable-sslv3.patch	Thu Jan 28 22:41:53 2016 -0800
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-Disable SSLv3 as long as we're using GNU TLS 2.8 - we should be able to drop
-this once we upgrade to GNU TLS 3.4.0 or later, which disable it by default
-per http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007535.html
-
-diff --git a/common/rfb/CSecurityTLS.cxx b/common/rfb/CSecurityTLS.cxx
-index 3421de5..3a55d16 100644
---- a/common/rfb/CSecurityTLS.cxx
-+++ b/common/rfb/CSecurityTLS.cxx
-@@ -184,8 +184,10 @@ bool CSecurityTLS::processMsg(CConnection* cc)
-     if (gnutls_init(&session, GNUTLS_CLIENT) != GNUTLS_E_SUCCESS)
-       throw AuthFailureException("gnutls_init failed");
- 
--    if (gnutls_set_default_priority(session) != GNUTLS_E_SUCCESS)
--      throw AuthFailureException("gnutls_set_default_priority failed");
-+    // SSL 3.0 is enabled by default in GNU TLS 2.8, but we want it off
-+    if (gnutls_priority_set_direct(session, "NORMAL:-VERS-SSL3.0", NULL)
-+	!= GNUTLS_E_SUCCESS)
-+      throw AuthFailureException("gnutls_priority_set_direct failed");
- 
-     setParam();
-     
-diff --git a/common/rfb/SSecurityTLS.cxx b/common/rfb/SSecurityTLS.cxx
-index 2ea84e0..5cd4739 100644
---- a/common/rfb/SSecurityTLS.cxx
-+++ b/common/rfb/SSecurityTLS.cxx
-@@ -137,8 +137,10 @@ bool SSecurityTLS::processMsg(SConnection *sc)
-     if (gnutls_init(&session, GNUTLS_SERVER) != GNUTLS_E_SUCCESS)
-       throw AuthFailureException("gnutls_init failed");
- 
--    if (gnutls_set_default_priority(session) != GNUTLS_E_SUCCESS)
--      throw AuthFailureException("gnutls_set_default_priority failed");
-+    // SSL 3.0 is enabled by default in GNU TLS 2.8, but we want it off
-+    if (gnutls_priority_set_direct(session, "NORMAL:-VERS-SSL3.0", NULL)
-+	!= GNUTLS_E_SUCCESS)
-+      throw AuthFailureException("gnutls_priority_set_direct failed");
- 
-     try {
-       setParams(session);
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/open-src/xserver/xvnc/gnutls-drop-ecdh.patch	Sat Jan 30 20:09:19 2016 -0800
@@ -0,0 +1,30 @@
+Need to drop ECDH from algorithm list when building on Solaris,
+since our GnuTLS build disables it in
+userland/components/gnutls-3/patches/02_remove_elliptical.patch
+
+diff --git a/common/rfb/CSecurityTLS.cxx b/common/rfb/CSecurityTLS.cxx
+index a60dbdd..032cbdd 100644
+--- a/common/rfb/CSecurityTLS.cxx
++++ b/common/rfb/CSecurityTLS.cxx
+@@ -215,7 +215,7 @@ bool CSecurityTLS::processMsg(CConnection* cc)
+ 
+ void CSecurityTLS::setParam()
+ {
+-  static const char kx_anon_priority[] = ":+ANON-ECDH:+ANON-DH";
++  static const char kx_anon_priority[] = ":+ANON-DH";
+ 
+   int ret;
+   char *prio;
+diff --git a/common/rfb/SSecurityTLS.cxx b/common/rfb/SSecurityTLS.cxx
+index c2b1ded..59fa561 100644
+--- a/common/rfb/SSecurityTLS.cxx
++++ b/common/rfb/SSecurityTLS.cxx
+@@ -181,7 +181,7 @@ bool SSecurityTLS::processMsg(SConnection *sc)
+ 
+ void SSecurityTLS::setParams(gnutls_session_t session)
+ {
+-  static const char kx_anon_priority[] = ":+ANON-ECDH:+ANON-DH";
++  static const char kx_anon_priority[] = ":+ANON-DH";
+ 
+   int ret;
+   char *prio;
--- a/pkg/manifests/developer-opensolaris-X.p5m	Thu Jan 28 22:41:53 2016 -0800
+++ b/pkg/manifests/developer-opensolaris-X.p5m	Sat Jan 30 20:09:19 2016 -0800
@@ -1,4 +1,4 @@
-# Copyright (c) 2010, 2015, Oracle and/or its affiliates. All rights reserved.
+# Copyright (c) 2010, 2016, Oracle and/or its affiliates. All rights reserved.
 #
 # Permission is hereby granted, free of charge, to any person obtaining a
 # copy of this software and associated documentation files (the "Software"),
@@ -146,7 +146,7 @@
     org.opensolaris.pkgdepend.resolve=true
 
 # TigerVNC links with gnutls libraries
-depend type=require fmri=pkg:/library/gnutls \
+depend type=require fmri=pkg:/library/gnutls-3 \
     org.opensolaris.pkgdepend.resolve=true
 
 # xcb-proto runs xmllint