Commit graph

80 commits

Author SHA1 Message Date
wiz
1fd93a1b1b Update gnupg2 to 2.0.30.
Noteworthy changes in version 2.0.30 (2016-03-31)
-------------------------------------------------

 * gpg: Avoid too early timeout during key generation with 2.1 cards.

 * agent: Fixed printing of ssh fingerprints for 384 bit ECDSA keys.

 * agent: Fixed an alignment bug related to the passphrase
   confirmation.

 * scdaemon: Fixed a "conflicting usage" bug.

 * scdaemon: Fixed usb card reader removal problem on Windows 8 and
   later.

 * Fixed a problem on AIX due to peculiarity with RLIMIT_NOFILE.

 * Updated the Japanese and Dutch translations.

 * Fixed a few other bugs.
2016-04-13 18:01:55 +00:00
wiz
d27a4a27b9 Fix pinentry configure argument.
Found by coypu.
2016-03-20 22:03:17 +00:00
jperkin
17661ff9a5 Bump PKGREVISION for security/openssl ABI bump. 2016-03-05 11:27:40 +00:00
agc
5293710fb4 Add SHA512 digests for distfiles for security category
Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:17:40 +00:00
ryoon
4b801ee699 There is no consumer anymore.
And this package does not have header/library files.
2015-09-24 23:53:11 +00:00
wiz
e7439a3e74 Update security/gnupg2 to 2.0.29.
While here, clean up patches. They looked pretty cargo-culty to me and
were not commented.
File a bug report for one of the remaining ones and link to it from comment.

Changes in 2.0.29:

Noteworthy changes in version 2.0.29 (2015-09-08)
-------------------------------------------------

 * gpg: Print a PGP-2 fingerprint again instead of a row of "0".

 * gpg: Fixed a race condition from multiple several "gpg --verify".

 * gpg: Print FAILURE status lines to help GPGME.

 * gpgsm: Fixed a regression in CSR generation.

 * scdaemon: Fixed problems with some pinpads.

 * Fixed a few other bugs.
2015-09-09 18:15:34 +00:00
szptvlfn
06cd379951 GNUpg -> GnuPG 2015-07-15 20:45:57 +00:00
szptvlfn
a68d8a57c2 change pinentry from bl3 to DEPENDS 2015-07-13 21:00:05 +00:00
jperkin
455467dc28 Support the stdint.h fix when using the OSX SDK include path. 2015-06-16 13:41:23 +00:00
wiz
903afa24fc Update to 2.0.28:
Noteworthy changes in version 2.0.28 (2015-06-02)
-------------------------------------------------

 * agent: Added support for an external password manager.

 * gpg: New command --list-gcrypt-config.

 * gpg: Issue NEWSIG status lines during signature verification.

 * gpgsm: The default hash algo for a CSR is now SHA-256 and the
   default encryption algo is AES-128.

 * scdaemon: Allow PC/SC reader selection by partial name match.

 * gpgtar: Fix extracting files with a size of a multiple of 512.

 * Fixed several other bugs.

 * Libgcrypt 1.5 is now required.
2015-06-03 21:00:39 +00:00
wiz
e9fdbba849 Fix typo in previous, noted by rpalo. 2015-03-24 08:36:56 +00:00
wiz
fe50bcdc76 Add default-off libusb option.
If you enable this, scdaemon can use some USB Tokens without another
pcsc daemon.

From Yasushi Oshima in PR 49760.
2015-03-21 16:24:51 +00:00
wiz
a7e3cf4059 Update to 2.0.27:
Noteworthy changes in version 2.0.27 (2015-02-18)
-------------------------------------------------

 * gpg: Detect faulty use of --verify on detached signatures.

 * gpg: New import option "keep-ownertrust".

 * gpg: Uses SHA-256 for all signature types also on RSA keys.

 * gpg: Added support for algo names when generating keys using the
   --command-fd method.

 * gpg: Unless --allow-weak-digest-algos is used the insecure MD5
   based fingerprints are shown as all zeroe

 * gpg: Fixed DoS based on bogus and overlong key packets.

 * gpg: Better error reporting for keyserver problems.

 * Fixed several bugs related to bogus keyrings and improved some
   other code.
2015-02-21 09:08:53 +00:00
wiz
b9a3129a64 Fix executable name in gpgkey2ssh tool.
From ISIHARA Takanori in PR 49576.

Bump PKGREVISION.
2015-01-15 20:59:59 +00:00
wiz
cda18437be Remove pkgviews: don't set PKG_INSTALLATION_TYPES in Makefiles. 2014-10-09 14:05:50 +00:00
wiz
4a13c1636c Update to 2.0.26:
Noteworthy changes in version 2.0.26 (2014-08-12)
-------------------------------------------------

 * gpg: Fix a regression in 2.0.24 if a subkey id is given
   to --recv-keys et al.

 * gpg: Cap attribute packets at 16MB.

 * gpgsm: Auto-create the ".gnupg" home directory in the same
   way gpg does.

 * scdaemon: Allow for certificates > 1024 when using PC/SC.
2014-08-16 12:14:28 +00:00
wiz
2324d44072 Fix overlooked option name for previous.
Found by jperkin.
2014-07-28 11:02:11 +00:00
wiz
edbf61ee18 Update to 2.0.25. Rename gpgsm option to gnupg2-gpgsm.
Noteworthy changes in version 2.0.25 (2014-06-30)
-------------------------------------------------

 * gpg: Fix a regression in 2.0.24 if more than one keyid is given
   to --recv-keys et al.

 * gpg: Cap RSA and Elgamal keysize at 4096 bit also for unattended
   key generation.

 * gpgsm: Fix a DISPLAY related problem with --export-secret-key-p12.

 * scdaemon: Support reader Gemalto IDBridge CT30.
2014-07-22 11:30:00 +00:00
wiz
667c623a90 Update to 2.0.24, security fix:
Noteworthy changes in version 2.0.24 (2014-06-24)
-------------------------------------------------

 * gpg: Avoid DoS due to garbled compressed data packets.

 * gpg: Screen keyserver responses to avoid importing unwanted keys
   from rogue servers.

 * gpg: The validity of user ids is now shown by default.  To revert
   this add "list-options no-show-uid-validity" to gpg.conf.

 * gpg: Print more specific reason codes with the INV_RECP status.

 * gpg: Allow loading of a cert only key to an OpenPGP card.

 * gpg-agent: Make ssh support for ECDSA keys work with Libgcrypt 1.6.


Noteworthy changes in version 2.0.23 (2014-06-03)
-------------------------------------------------

 * gpg: Reject signatures made using the MD5 hash algorithm unless the
   new option --allow-weak-digest-algos or --pgp2 are given.

 * gpg: Do not create a trustdb file if --trust-model=always is used.

 * gpg: Only the major version number is by default included in the
   armored output.

 * gpg: Print a warning if the Gnome-Keyring-Daemon intercepts the
   communication with the gpg-agent.

 * gpg: The format of the fallback key listing ("gpg KEYFILE") is now more
   aligned to the regular key listing ("gpg -k").

 * gpg: The option--show-session-key prints its output now before the
   decryption of the bulk message starts.

 * gpg: New %U expando for the photo viewer.

 * gpgsm: Improved handling of re-issued CA certificates.

 * scdaemon: Various fixes for pinpad equipped card readers.

 * Minor bug fixes.
2014-06-24 21:53:14 +00:00
tron
c64e9eb269 Recursive PKGREVISION bump for OpenSSL API version bump. 2014-02-12 23:18:26 +00:00
wiz
e03c03b6dc Recursive PKGREVISION bump for libgcrypt-1.6.0 shlib major bump. 2014-01-01 11:52:02 +00:00
wiz
30f530de00 Remove obsolete --with-static-rnd=auto, as suggested by Andreas Gustafsson
in PR 48345.
2013-10-26 23:30:53 +00:00
wiz
1b4677eff1 Update to 2.0.22:
Noteworthy changes in version 2.0.22 (2013-10-04)
-------------------------------------------------

 * Fixed possible infinite recursion in the compressed packet
   parser. [CVE-2013-4402]

 * Improved support for some card readers.

 * Prepared building with the forthcoming Libgcrypt 1.6.

 * Protect against rogue keyservers sending secret keys.
2013-10-05 13:20:03 +00:00
wiz
33964c906f Update to 2.0.21:
Noteworthy changes in version 2.0.21 (2013-08-19)
-------------------------------------------------

 * gpg-agent: By default the users are now asked via the Pinentry
   whether they trust an X.509 root key.  To prohibit interactive
   marking of such keys, the new option --no-allow-mark-trusted may
   be used.

 * gpg-agent: The command KEYINFO has options to add info from
   sshcontrol.

 * The included ssh agent does now support ECDSA keys.

 * The new option --enable-putty-support allows gpg-agent to act on
   Windows as a Pageant replacement with full smartcard support.

 * Support installation as portable application under Windows.
2013-09-02 16:52:04 +00:00
ryoon
f8e628f818 * .include "../../devel/readline/buildlink3.mk" with USE_GNU_READLINE=yes
are replaced with .include "../../devel/readline/buildlink3.mk", and
  USE_GNU_READLINE are removed,

* .include "../../devel/readline/buildlink3.mk" without USE_GNU_READLINE
  are replaced with .include "../../mk/readline.buildlink3.mk".
2013-07-15 02:02:17 +00:00
wiz
c523bf69e3 Update to 2.0.20:
Noteworthy changes in version 2.0.20 (2013-05-10)
-------------------------------------------------

 * Decryption using smartcards keys > 3072 bit does now work.

 * New meta option ignore-invalid-option to allow using the same
   option file by other GnuPG versions.

 * gpg: The hash algorithm is now printed for sig records in key listings.

 * gpg: Skip invalid keyblock packets during import to avoid a DoS.

 * gpg: Correctly handle ports from DNS SRV records.

 * keyserver: Improve use of SRV records

 * gpg-agent: Avoid tty corruption when killing pinentry.

 * scdaemon: Improve detection of card insertion and removal.

 * scdaemon: Rename option --disable-keypad to --disable-pinpad.

 * scdaemon: Better support for CCID readers.  Now, the internal CCID
   driver supports readers without the auto configuration feature.

 * scdaemon: Add pinpad input for PC/SC, if your reader has pinpad and
   it supports variable length PIN input, and you specify
   --enable-pinpad-varlen option.

 * scdaemon: New option --enable-pinpad-varlen.

 * scdaemon: Install into libexecdir to avoid accidental execution
   from the command line.

 * Support building using w64-mingw32.

 * Assorted bug fixes.
2013-05-29 22:53:36 +00:00
jperkin
becd113253 PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
wiz
bd06e1cb46 Reset MAINTAINER/OWNER (became observers) 2013-02-01 22:21:05 +00:00
drochner
de3d2f7e3e add patch from upstream to fix possible keyring corruption
on import of corrupted keys (CVE-2012-6085), bump PKGREV
from "Bug Hunting" per PR pkg/47442
2013-01-15 11:21:50 +00:00
obache
64deda1dc9 recursive bump from cyrus-sasl libsasl2 shlib major bump. 2012-12-16 01:51:57 +00:00
asau
1a433eae91 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
dholland
7e751949e4 Set BUILDLINK_ABI_DEPENDS correctly (with +=, not ?=)
It turns out there were a lot of these.
2012-05-07 01:53:12 +00:00
drochner
97431b5272 update to 2.0.19
changes:
-cmd line UI improvements
-Ukrainian translation
2012-04-17 18:35:33 +00:00
sbd
87f94d0311 Add missing archivers/bzip2 buildlink.
Bump PKGREVISION
2011-11-16 07:39:45 +00:00
drochner
6130ea5573 fix configure check for libcurl, from John Marshall on the gnupg-devel
mailing list
bump PKGREV
2011-09-12 17:38:33 +00:00
adam
2120ebdb47 Changes 2.0.18:
* Bug fix for newer versions of Libgcrypt.
* Support the SSH confirm flag and show SSH fingerprints in ssh
  related pinentries.
* Improved dirmngr/gpgsm interaction for OCSP.
* Allow generation of card keys up to 4096 bit.
2011-08-11 10:46:10 +00:00
drochner
ff5d4eba24 this pkg only installs binaries -- no need to propagate library
dependencies
2011-05-18 10:11:47 +00:00
adam
c01bda295d Fix buildling with Clang 2011-05-05 08:55:23 +00:00
obache
1d9df3258a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
adam
c3c8b80c6b Changes 2.0.17:
* Allow more hash algorithms with the OpenPGP v2 card.
* The gpg-agent now tests for a new gpg-agent.conf on a HUP.
* Fixed output of "gpgconf --check-options".
* Fixed a bug where Scdaemon sends a signal to Gpg-agent running in
  non-daemon mode.
* Fixed TTY management for pinentries and session variable update
  problem.
2011-01-20 08:54:56 +00:00
obache
d0e7b4bdf9 Some fixes at update to 2.0.16.
* not using autogen.sh anymore, so remove some tools from USE_TOOLS.
* patch-ak does not effect anymore for above reason, add patch-ao for it.
  this patch is required to avoid conflict with security/gnupg.

Bump PKGREVISION.
2010-09-02 06:58:35 +00:00
drochner
d690c66afe update to 2.0.16
changes:
-bugfixes
-New command --passwd for GPG
-Make use of libassuan 2.0 which is available as a DSO
-The gpg-agent commands KILLAGENT and RELOADAGENT are now available
 on all platforms
2010-09-01 16:46:41 +00:00
drochner
65207c04f9 add patch from upstream to fix a possible use-after-free problem
(CVE-2010-2547), bump PKGREVISION
2010-08-03 19:14:42 +00:00
wiz
a8b7f81812 Mark as make-jobs-safe again; a comment said the problem was reported
upstream and supposedly fixed in 2.0.6 (pkgsrc is at 2.0.14 now).

Multiple builds with 16 jobs showed no problem.
2010-05-30 08:24:48 +00:00
drochner
e7ed3dfc76 add a patch from upstream CVS to fix a bug which could make keys
unusable on passphrase changes
bump PKGREVISION
2010-02-03 10:58:11 +00:00
wiz
579796a3e5 Recursive PKGREVISION bump for jpeg update to 8. 2010-01-17 12:02:03 +00:00
drochner
fe61bbf7dd update to 2.0.14
changes:
* The default for --include-cert is now to include all certificates
  in the chain except for the root certificate.
* Numerical values may now be used as an alternative to the
  debug-level keywords.
* The GPGSM --audit-log feature is now more complete.
* GPG now supports DNS lookups for SRV, PKA and CERT on W32.
* New GPGSM option --ignore-cert-extension.
* New and changed passphrases are now created with an iteration count
  requiring about 100ms of CPU work.
2010-01-15 20:15:07 +00:00
drochner
5214da8496 kill the "idea" option -- gnupg2 uses libgcrypt which used to have
an "idea" option, but that was removed more than a year ago when it
got updated from 1.2 to 1.4
The patch was was used on gnupg2 in the "idea" case was just a four-line
memory initialization fix, there is no point in LICENSE restrictions
due to this, so I've pulled it in as regular patch so that it doesn't
get lost for the case someone fixes idea support in libgcrypt
(which isn't hard).
2009-12-18 17:49:51 +00:00
drochner
44f924529f don't install the gpg-zip.1 manpage, avoids CONFLICT with gnupg1,
noticed by OBATA Akio per mail to pkgsrc-users.
This makes most sense to me since gnupg2 doesn't install a gpg-zip
intentionally. Since possible clients of gpg-zip should have a
dependency on gnupg1, we can't take over easily. Once we are sure
that gnupg2 can fully replace gnupg1, we might consider to install
eg symlinks gpg->gpg2 etc and make gnupg1 obsolete, but this needs
careful testing.
2009-12-16 18:52:49 +00:00
wiz
f392c9b9c9 Add checksum for idea patch. 2009-12-16 09:09:06 +00:00