Commit graph

2503 commits

Author SHA1 Message Date
Ying-Chieh Liao
d3a76d18b4 upgrade to 1.6.1 2002-04-25 17:27:12 +00:00
Michael Haro
1ff6b6d7a4 update to 1.6.6 2002-04-25 17:20:23 +00:00
James E. Housley
05cce0c1ba Update to 4198 2002-04-24 20:41:38 +00:00
Will Andrews
d54d1eaf5d Update to 3.0. Sigh. 2002-04-23 00:13:10 +00:00
Michael Haro
26aa8df556 revert change from this morning 2002-04-22 23:45:48 +00:00
David E. O'Brien
a1b2756e73 Change to vi:ts=8. 2002-04-22 16:15:10 +00:00
Michael Haro
30a7314a16 Patch sudo 1.6.5.2 with GlobalInterSec's sudo patch. 2002-04-22 15:30:41 +00:00
Anders Nordby
6828f0b78a Reclaim maintainership. 2002-04-22 01:38:22 +00:00
Will Andrews
d1c2f0dddd Please welcome Qt3/KDE3 to our ports tree. This includes work since the
original versions of these ports, so some PORTREVISIONs were bumped.  See
http://freebsd.kde.org/ and mailing lists linked to from there for info
on the packages generated to test these ports.

bsd.kde.mk has already been updated a few days ago to work with these.

Some patches applied to fix a few bugs were:

deskutils/kdepim3:
        [1] Remove kpilot from build because it wasn't ready at release.
editors/koffice-kde3:
        [2] Fix compile time bugs for FreeBSD.
misc/kdeedu3:
        [3] Fix compile problem with kvoctrain.
x11/kdebase3:
        [4] Fix KDM CPU usage and login bug.

Some caveats:
        * All PLISTs are broken for deinstall due to script bug that I
          didn't notice until very recently.  This will be fixed when I
          commit an update tomorrow.  These ports should still install
          perfectly fine though.  They should also deinstall without
          giving errors, but will leave directories behind.
        * You can't install this with any other version of QT or KDE
          already installed.  I am not sure the checks are 100% working,
          but fixes for these will be forthcoming.  This is mainly due
          to a policy decision made by kde@ to make QT/KDE ports install
          the way the rest of the world expects it to while also still
          conforming to FreeBSD's hier(7).  For reference on this decision,
          please consult the KDE/FreeBSD mailing list archives.  This
          decision fixes 2-year-old bug reports relating to how we handled
          this for KDE2 vs KDE1.

Submitted by:   [1] Adrian de Groot <adridg@cs.kun.nl>,
                [2] David Faure <faure@kde.org>,
                    Andy Fawcett <andy@athame.co.uk>
                    Lauri Watts <lauri@kde.org>
                [3] Lauri Watts <lauri@kde.org>
                [4] Alan Eldridge <alane@geeksrus.net>
                    Oswald Buddenhagen <ossi@kde.org>
Reviewed by:    kde
2002-04-21 23:47:50 +00:00
Dirk Meyer
cd87949d28 - Update to 0.9.6c
- more manpages
- shift FORBIDDEN

 Excerpt of Changes between 0.9.6b and 0.9.6c  [21 dec 2001]
  *) Fix BN_rand_range bug pointed out by Dominikus Scherkl
  *) Only add signing time to PKCS7 structures if it is not already present.
  *) Fix crypto/objects/objects.h: "ld-ce" should be "id-ce", OBJ_ld_ce
     should be OBJ_id_ce.  Also some ip-pda OIDs in crypto/objects/objects.txt
     were incorrect (cf. RFC 3039).
  *) Release CRYPTO_LOCK_DYNLOCK when CRYPTO_destroy_dynlockid()
     returns early because it has nothing to do.
  *) Fix mutex callback return values in crypto/engine/hw_ncipher.c.
  *) Change ssl/s2_clnt.c and ssl/s2_srvr.c so that received handshake
     messages are stored in a single piece (fixed-length part and
     variable-length part combined) and fix various bugs found on the way.
  *) Disable caching in BIO_gethostbyname(), directly use gethostbyname()
     instead.  BIO_gethostbyname() does not know what timeouts are
     appropriate, so entries would stay in cache even when they have
     become invalid.
  *) Change ssl23_get_client_hello (ssl/s23_srvr.c) behaviour when
     faced with a pathologically small ClientHello fragment that does
     not contain client_version: Instead of aborting with an error,
     simply choose the highest available protocol version (i.e.,
     TLS 1.0 unless it is disabled).
  *) Fix SSL handshake functions and SSL_clear() such that SSL_clear()
     never resets s->method to s->ctx->method when called from within
     one of the SSL handshake functions.
  *) In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert
     (sent using the client's version number) if client_version is
     smaller than the protocol version in use.  Also change
     ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if
     the client demanded SSL 3.0 but only TLS 1.0 is enabled; then
     the client will at least see that alert.
  *) Fix ssl3_get_message (ssl/s3_both.c) to handle message fragmentation
     correctly.
  *) Avoid infinite loop in ssl3_get_message (ssl/s3_both.c) if a
     client receives HelloRequest while in a handshake.
  *) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C
     should end in 'break', not 'goto end' which circuments various
     cleanups done in state SSL_ST_OK.   But session related stuff
     must be disabled for SSL_ST_OK in the case that we just sent a
     HelloRequest.  Also avoid some overhead by not calling
     ssl_init_wbio_buffer() before just sending a HelloRequest.
  *) Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't
     reveal whether illegal block cipher padding was found or a MAC
     verification error occured.  (Neither SSLerr() codes nor alerts
     are directly visible to potential attackers, but the information
     may leak via logfiles.) ssl/s2_pkt.c failed to verify that the
     purported number of padding bytes is in the legal range.
  *) Improve RSA_padding_check_PKCS1_OAEP() check again to avoid
     'wristwatch attack' using huge encoding parameters (cf.
     James H. Manger's CRYPTO 2001 paper).  Note that the
     RSA_PKCS1_OAEP_PADDING case of RSA_private_decrypt() does not use
     encoding parameters and hence was not vulnerable.
  *) BN_sqr() bug fix.
  *) Rabin-Miller test analyses assume uniformly distributed witnesses,
     so use BN_pseudo_rand_range() instead of using BN_pseudo_rand()
     followed by modular reduction.
  *) Add BN_pseudo_rand_range() with obvious functionality: BN_rand_range()
     equivalent based on BN_pseudo_rand() instead of BN_rand().
  *) s3_srvr.c: allow sending of large client certificate lists (> 16 kB).
     This function was broken, as the check for a new client hello message
     to handle SGC did not allow these large messages.
  *) Add alert descriptions for TLSv1 to SSL_alert_desc_string[_long]().
  *) Fix buggy behaviour of BIO_get_num_renegotiates() and BIO_ctrl()
     for BIO_C_GET_WRITE_BUF_SIZE ("Stephen Hinton" <shinton@netopia.com>).
  *) In ssl3_get_key_exchange (ssl/s3_clnt.c), call ssl3_get_message()
     with the same message size as in ssl3_get_certificate_request().
     Otherwise, if no ServerKeyExchange message occurs, CertificateRequest
     messages might inadvertently be reject as too long.
  *) Modified SSL library such that the verify_callback that has been set
     specificly for an SSL object with SSL_set_verify() is actually being
     used. Before the change, a verify_callback set with this function was
     ignored and the verify_callback() set in the SSL_CTX at the time of
     the call was used. New function X509_STORE_CTX_set_verify_cb() introduced
     to allow the necessary settings.
  *) In OpenSSL 0.9.6a and 0.9.6b, crypto/dh/dh_key.c ignored
     dh->length and always used
          BN_rand_range(priv_key, dh->p).
     So switch back to
          BN_rand(priv_key, l, ...)
     where 'l' is dh->length if this is defined, or BN_num_bits(dh->p)-1
     otherwise.
  *) In RSA_eay_public_encrypt, RSA_eay_private_decrypt, RSA_eay_private_encrypt
     RSA_eay_public_decrypt always reject numbers >= n.
  *) In crypto/rand/md_rand.c, use a new short-time lock CRYPTO_LOCK_RAND2
     to synchronize access to 'locking_thread'.
  *) In crypto/rand/md_rand.c, set 'locking_thread' to current thread's ID
     *before* setting the 'crypto_lock_rand' flag.  The previous code had
     a race condition if 0 is a valid thread ID.
2002-04-21 13:02:08 +00:00
Anders Nordby
450bcc58e6 Update maintainer e-mail address.
PR:		37294
Submitted by:	maintainer
2002-04-20 20:41:23 +00:00
Cy Schubert
fddcce45a6 Update krb5-1.2.5-beta1 --> krb5-1.2.5-beta2 2002-04-20 06:33:53 +00:00
Kris Kennaway
66bcd1ef6c Patches from maintainer:
* HKP (WWW) key submissions disabled by default, enabled via
  configuration file
* nicer formatting of long (SHA-1) fingerprints
* pksdctl usage() shows available commands/arguments
* manual page fixes

Bump PORTREVISION.

PR:		ports/34970
Submitted by:	Jason Harris <jharris@widomaker.com>
2002-04-19 22:23:32 +00:00
Will Andrews
e05ed36727 Say goodbye to Qt 1.x and all of its dependents. The one port I found
which probably isn't supposed to be removed is misc/instant-workstation,
which had a dependency on audio/xamp (being removed), so I removed that
dependency and bumped PORTREVISION.  All other ports are real dependents
upon Qt 1.x, including KDE 1.x stuff.

Code in bsd.kde.mk supporting these ports is also removed or adjusted.
Also, some adjustments made to accomodate Qt3/KDE3 ports, which will be
committed Real Soon Now (TM), pending repo-copies.

This commit made in impending view of Qt3/KDE3 entering ports tree.
2002-04-19 02:30:02 +00:00
Jimmy Olgeni
650acf9b73 Update nessus-devel suite to version 1.2.0.
PR:		37237
Submitted by:	Udo Schweigert <udo.schweigert@siemens.com>
2002-04-18 23:03:36 +00:00
Ying-Chieh Liao
7467468397 libgmp3 -> libgmp4 2002-04-18 08:20:50 +00:00
Kris Kennaway
89b10cd027 Transfer maintainership to Jason Harris <jharris@widomaker.com> 2002-04-18 07:21:39 +00:00
Patrick Li
b4c65fcd5a Give maintainership back to ports@
PR:		37191
Submitted by:	maintainer
2002-04-17 20:48:29 +00:00
James E. Housley
4bfc56ffba Update to 4197 2002-04-17 17:44:11 +00:00
Jun Kuriyama
4d9355ef5d Check hidden dependency on libiconv.
Pointed out by:	Neil Darlow <neil@darlow.co.uk>
2002-04-16 13:00:39 +00:00
Kris Kennaway
4a9bf56335 Upgrade to snort 1.8.6. The previous two versions (1.8.4 and 1.8.5) were
buggy and short-lived; hopefully this one is better.
2002-04-13 22:17:58 +00:00
Cy Schubert
23fe8b5980 New MIT Kerberos V beta, V 1.2.5-beta1. 2002-04-13 16:33:14 +00:00
Ade Lovett
f18cbf2fa6 gettext upgrade uber-patch (stage 3)
- switch devel/gettext (0.11.1) on, installing full package
- flip devel/gettext-old (0.10.35) to installing only static binaries
  with a "-old" suffix -- gettext-old will have its deorbit burn
  sequence initiated just after 4.6-RELEASE
- fix up ports for the new world order

Reviewed by:	portmgr
2002-04-12 17:10:20 +00:00
Peter Pentchev
827337d5de Update the download site and URL.
PR:		36687
Submitted by:	Kimura Fuyuki <fuyuki@mj.0038.net>
Approved by:	maintainer
2002-04-11 12:13:12 +00:00
Anders Nordby
15cf2b7eb4 Mark as broken for -current with OpenPAM. Does not work yet. 2002-04-10 22:28:01 +00:00
James E. Housley
790f5083d2 Upgrade to 4196 2002-04-10 19:45:33 +00:00
Ying-Chieh Liao
d1c0c6dc10 upgrade to 0.9.5 2002-04-10 05:20:58 +00:00
Patrick Li
ddc479d484 Fix another case when build breaks when qt versions 1 and 2 coexist 2002-04-10 03:06:58 +00:00
Cy Schubert
149ce449af Add fwanalog 0.5.1, a firewall log summarizer that uses Analog.
PR:		35758
Submitted by:	Kimura Fuyuki <fuyuki@mj.0038.net>
2002-04-07 02:55:07 +00:00
Cy Schubert
c2fc27cd09 Fixup pkg-plist.
Pointy hat to:	myself
2002-04-06 20:30:01 +00:00
Joe Marcus Clarke
82c3291614 Change my ports to use my FreeBSD.org address.
Approved by:	sobomax
2002-04-05 23:26:36 +00:00
Dag-Erling Smørgrav
bd860384a9 Nuked at maintainer's request now that pam_passwdqc is in the base system. 2002-04-04 19:30:49 +00:00
Ying-Chieh Liao
7d997e7631 upgrade to 1.14
PR:		36742
Submitted by:	maintainer
2002-04-04 17:47:33 +00:00
James E. Housley
745067e401 Update to 4195 2002-04-03 23:59:42 +00:00
Patrick Li
d4d6adf588 Update to 20020403
PR:		36693
Submitted by:	Martti Kuparinen <martti.kuparinen@iki.fi>
2002-04-03 21:11:50 +00:00
David E. O'Brien
740ec3103f Update to version 2.54 Beta 32. 2002-04-02 19:49:58 +00:00
Munechika SUMIKAWA
f60fc31a58 This port needs python from building, not running. 2002-04-02 15:39:26 +00:00
Mark Pulford
30cda655e2 Add vlog 1.1f, a curses based real-time logfile viewer.
PR:		36616
Submitted by:	hannes sowa <satbran@web.de>
2002-04-02 12:58:21 +00:00
Akinori MUSHA
5e7984ac3c ssh_askpass2 is built only when X11 is installed. Support
{WITH,WITHOUT}_X11 and detect ${X11BASE}/lib/libX11.a.

Reported by:	bento
Obtained from:	security/ssh (partly)
2002-04-02 04:49:20 +00:00
Kris Kennaway
f37b25c1d3 Remove this port at the request of the maintainer. The version of pam_ssh
in the base system is more up-to-date and is being actively maintained.
2002-04-01 21:53:39 +00:00
Patrick Li
bef868fb31 Unbreak pam_ldap on -CURRENT after the latest OpenPAM patch
PR:		36613
Submitted by:	maintainer
2002-04-01 17:30:37 +00:00
Patrick Li
f4ae410928 Add new port security/pam_passwdqc - A pam module to validate passwords
for quality

PR:		36597
Submitted by:	Dominic Marks <dominic_marks@btinernet.com>
2002-04-01 05:03:15 +00:00
David W. Chapman Jr.
b9adee9a1b Update to 2.0.3
PR:		36595
Submitted by:	maintainer
2002-04-01 02:10:44 +00:00
Patrick Li
cc9b51f474 Update to 0.6.6 2002-03-31 06:42:30 +00:00
Kris Kennaway
0d40931381 Add #include <arpa/inet.h> to unbreak build 2002-03-31 06:40:03 +00:00
Patrick Li
c62a8ab834 Add option for jumbo patch kit and pass maintainership to submitter
PR:		36514
Submitted by:	ago <a.go@wish.net>
2002-03-31 01:00:39 +00:00
Patrick Li
fcc7c84916 Update to 20020203 and give maintainership back to ports@
PR:		36548
Submitted by:	maintainer
2002-03-30 21:30:23 +00:00
Will Andrews
97e6d16408 Fix the KDE ports to not use objprelink, if OSVERSION >= 500029. This is
not tested other than for syntax, but should DTRT from what I understand
of the problem.

Submitted by:	bento
2002-03-30 09:07:53 +00:00
Dirk Meyer
24b7840a21 - Fix build for 5.0-CURRENT 2002-03-30 05:18:23 +00:00
Cy Schubert
341484d039 www.crypto-publish.org does not have krb5-1.2.4.{tar,tar.Z,tar.gz,tar.bz2}.
Reported by:	bento
2002-03-29 13:23:08 +00:00