Commit graph

9260 commits

Author SHA1 Message Date
markd
116bd96761 qgpgme: Add version 1.10.0
Qt bindings for GPGme
2018-01-31 11:36:14 +00:00
markd
ac8fb0942e security: add qca2-qt5{,-gnupg,-ossl} 2018-01-31 09:16:33 +00:00
markd
774f5d18f0 qca2{,-qt5}{,-gnupg,-ossl}: update to 2.1.0
New in 2.1.0
  - Ported to Qt5 (Qt4 also supported)
  - New building system. CMake instead of qmake
  - Added CTR symetric cipher support to qca core
  - Added no padding encryption algorithm to qca core
  - qcatool2 renamed to qcatool
  - fixed crash in qcatool when only options provided on command line without
    any commands
  - Use plugins installation path as hard-coded runtime plugins search path
  - Added new functiion pluginPaths
  - Added functions to get runtime QCA version
  - Fixed 'no watch file' warnings in FileWatch
  - Added EME_PKCS1v15_SSL Encryption Algorithm
  - New implementation of SafeTimer to prevent crashes
  - Updated certificates for unittests
  - RSA Keys are permutable, can encrypt with private and decrypt with public
  - Add unloadProvider() function for symmetry with insertProvider()
  - Overloaded "makeKey" to derive a password depending on a time factor
  - Remove pointer to deinit() routine from QCoreApplication at deinitialization
  - Fix a couple of crashes where all plugins might not be available
  - Fix operating on keys with unrelated expired subkeys
  - Fixed timers in Synchronizer class
  - Dropped randomunittest
  - Fixed many unittests
  - qca-gnupg: internal refactoring
  - qca-gnupg: try both gpg and gpg2 to find gnupg executable
  - qca-gnupg: fixed some encodings problem
  - qca-ossl: no DSA_* dl groups in FIPS specification
  - qca-ossl: added missed signatures to CRLContext
  - qca-ossl: fixed certs time zone
  - qca-nss: fixed KeyLenght for Cipher
  - qca-botan: fixed getting result size for ciphers
2018-01-31 09:14:55 +00:00
adam
bd032ccec8 py-cryptodome: updated to 3.4.8
3.4.8:

New features
* Added a native extension in pure C for modular exponentiation, optimized for SSE2 on x86.
  In the process, we drop support for the arbitrary arithmetic library MPIR
  on Windows, which is painful to compile and deploy.
  The custom  modular exponentiation is 130% (160%) slower on an Intel CPU in 32-bit (64-bit) mode,
  compared to MPIR. Still, that is much faster that CPython's own `pow()` function which
  is 900% (855%) slower than MPIR. Support for the GMP library on Unix remains.
* Added support for *manylinux* wheels.
* Support for Python 3.7.

Resolved issues
* The DSA parameter 'p' prime was created with 255 bits cleared
  (but still with the correct strength).
* Not all docs were included in the tar ball.
* ECDSA verification failed for DER encoded signatures.
* Human-friendly messages for padding errors with ECB and CBC.
2018-01-31 07:57:25 +00:00
bsiegert
f918d62e6f New package, py-crcmod.
The software in this package is a Python module for generating objects that
compute the Cyclic Redundancy Check (CRC). There is no attempt in this package
to explain how the CRC works. There are a number of resources on the web that
give a good explanation of the algorithms.

This package allows the use of any 8, 16, 24, 32, or 64 bit CRC. You can
generate a Python function for the selected polynomial or an instance of the
Crc class which provides the same interface as the md5 and sha modules from the
Python standard library. A Crc class instance can also generate C/C++ source
code that can be used in another application.

Part of PR pkg/52941.
2018-01-30 19:07:48 +00:00
fhajny
d76039b62f Update security/vault to 0.9.3.
## 0.9.3 (January 28th, 2018)

A regression from a feature merge disabled the Nomad secrets backend in 0.9.2.
This release re-enables the Nomad secrets backend; it is otherwise identical to
0.9.2.

## 0.9.2 (January 26th, 2018)

SECURITY:

* Okta Auth Backend: While the Okta auth backend was successfully verifying
  usernames and passwords, it was not checking the returned state of the
  account, so accounts that had been marked locked out could still be used to
  log in. Only accounts in SUCCESS or PASSWORD_WARN states are now allowed.
* Periodic Tokens: A regression in 0.9.1 meant that periodic tokens created by
  the AppRole, AWS, and Cert auth backends would expire when the max TTL for
  the backend/mount/system was hit instead of their stated behavior of living
  as long as they are renewed. This is now fixed; existing tokens do not have
  to be reissued as this was purely a regression in the renewal logic.
* Seal Wrapping: During certain replication states values written marked for
  seal wrapping may not be wrapped on the secondaries. This has been fixed,
  and existing values will be wrapped on next read or write. This does not
  affect the barrier keys.

DEPRECATIONS/CHANGES:

* `sys/health` DR Secondary Reporting: The `replication_dr_secondary` bool
  returned by `sys/health` could be misleading since it would be `false` both
  when a cluster was not a DR secondary but also when the node is a standby in
  the cluster and has not yet fully received state from the active node. This
  could cause health checks on LBs to decide that the node was acceptable for
  traffic even though DR secondaries cannot handle normal Vault traffic. (In
  other words, the bool could only convey "yes" or "no" but not "not sure
  yet".) This has been replaced by `replication_dr_mode` and
  `replication_perf_mode` which are string values that convey the current
  state of the node; a value of `disabled` indicates that replication is
  disabled or the state is still being discovered. As a result, an LB check
  can positively verify that the node is both not `disabled` and is not a DR
  secondary, and avoid sending traffic to it if either is true.
* PKI Secret Backend Roles parameter types: For `ou` and `organization`
  in role definitions in the PKI secret backend, input can now be a
  comma-separated string or an array of strings. Reading a role will
  now return arrays for these parameters.
* Plugin API Changes: The plugin API has been updated to utilize golang's
  context.Context package. Many function signatures now accept a context
  object as the first parameter. Existing plugins will need to pull in the
  latest Vault code and update their function signatures to begin using
  context and the new gRPC transport.

FEATURES:

* **gRPC Backend Plugins**: Backend plugins now use gRPC for transport,
  allowing them to be written in other languages.
* **Brand New CLI**: Vault has a brand new CLI interface that is significantly
  streamlined, supports autocomplete, and is almost entirely backwards
  compatible.
* **UI: PKI Secret Backend (Enterprise)**: Configure PKI secret backends,
  create and browse roles and certificates, and issue and sign certificates via
  the listed roles.

IMPROVEMENTS:

* auth/aws: Handle IAM headers produced by clients that formulate numbers as
  ints rather than strings [GH-3763]
* auth/okta: Support JSON lists when specifying groups and policies [GH-3801]
* autoseal/hsm: Attempt reconnecting to the HSM on certain kinds of issues,
  including HA scenarios for some Gemalto HSMs.
  (Enterprise)
* cli: Output password prompts to stderr to make it easier to pipe an output
  token to another command [GH-3782]
* core: Report replication status in `sys/health` [GH-3810]
* physical/s3: Allow using paths with S3 for non-AWS deployments [GH-3730]
* physical/s3: Add ability to disable SSL for non-AWS deployments [GH-3730]
* plugins: Args for plugins can now be specified separately from the command,
  allowing the same output format and input format for plugin information
  [GH-3778]
* secret/pki: `ou` and `organization` can now be specified as a
  comma-separated string or an array of strings [GH-3804]
* plugins: Plugins will fall back to using netrpc as the communication protocol
  on older versions of Vault [GH-3833]

BUG FIXES:

* auth/(approle,aws,cert): Fix behavior where periodic tokens generated by
  these backends could not have their TTL renewed beyond the system/mount max
  TTL value [GH-3803]
* auth/aws: Fix error returned if `bound_iam_principal_arn` was given to an
  existing role update [GH-3843]
* core/sealwrap: Speed improvements and bug fixes (Enterprise)
* identity: Delete group alias when an external group is deleted [GH-3773]
* legacymfa/duo: Fix intermittent panic when Duo could not be reached
  [GH-2030]
2018-01-30 16:37:35 +00:00
mef
2c03bffcc1 Updated security/easy-rsa to 3.0.5
3.0.5
   * Fix #17 & #58: use AES256 for CA key
        * Also, don't use read -s, use stty -echo

3.0.4
    * Remove use of egrep (#154)
    * Integrate with Travis-CI (#165)
    * Remove "local" from variable assignment (#165)
        * Other changes related to Travis-CI fixes
        * Assign values to variables defined previously w/local
    * Finally(?) fix the subjectAltName issues I presented earlier (really
    fixes #168
2018-01-30 14:34:06 +00:00
mef
93b44c5830 security/xmlsec1 updated 1.2.19 to 1.2.25
on 12 Sep 2017 xmlsec-1_2_25 XMLSec release 1.2.25
on 20 Apr 2017 xmlsec-1_2_24 XMLSec release 1.2.24

2016-10-15 Aleksey Sanin  <aleksey@aleksey.com>
	* 1.2.23 release

2016-10-14 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed gcrypto RSA/DSA keys params ordering

2016-10-12 Aleksey Sanin  <aleksey@aleksey.com>
	* Better X509Data templates

2016-10-07 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed memory leak caused by xmlGetProp (patch from Dafan Zhai)
	* Fixed KW transforms (overlapping buffer error) for OpenSSL 1.1.0
	* Fixed pkg-config detection

2016-09-27 Aleksey Sanin  <aleksey@aleksey.com>
	* Added initial support OpenSSL 1.1.0 (patch from Andrzej Siewior)

2016-09-19 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed signing with RSA SHA2 via mscrypto (patch from PepaRokos)

2016-07-08 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed mscrypto undeclared XMLSEC_DEFAULT_CRYPTO (patch from vmiklos)

2016-05-31 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed mismatched conditional for XMLSEC_NO_ECDSA (patch from Eric Sproul)

2016-05-20 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed openssl cert depth verification param usage (patch from R-Tur)

2016-04-22 Aleksey Sanin  <aleksey@aleksey.com>
	* Fixed stdin/stdout in xmlsec1 app

2016-04-20 Aleksey Sanin  <aleksey@aleksey.com>
	* Restored SOAP support for Lasso
	* 1.2.22 release

2016-04-12 Aleksey Sanin  <aleksey@aleksey.com>
        * 1.2.21 release

2016-02-17 Aleksey Sanin  <aleksey@aleksey.com>
        * Added OOXML Relationships Transform Algorithm (patch from Miklos Vajna)

2016-02-06 Aleksey Sanin  <aleksey@aleksey.com>
        * Deprecated XMLSEC_CRYPTO define in favor of xmlSecGetDefaultCrypto() function

2016-02-05 Aleksey Sanin  <aleksey@aleksey.com>
        * Revamped manpages/documentation build to completely pass 'make distcheck' tests

2016-01-28 Aleksey Sanin  <aleksey@aleksey.com>
        * Added OpenSSL 1.1.0 API support (major refactoring for block ciphers and DSA/ECDSA signatures)

2016-01-28 Aleksey Sanin  <aleksey@aleksey.com>
        * Migrated to GitHub (https://github.com/lsh123/xmlsec)

2015-03-10 Aleksey Sanin  <aleksey@aleksey.com>
        * Removed support for legacy OpenSSL 0.9.6 (last release: March, 2004) and 0.9.7 (last release: February, 2007)

2014-10-2014 Aleksey Sanin  <aleksey@aleksey.com>
        * Added experimental GOST2012 support (patch from Nikolay Shaplov)

2014-06-04 Aleksey Sanin  <aleksey@aleksey.com>
        * Fixed several compaints from Clang and Coverity (based on patches from Simo Sorce)

2014-02-25 Aleksey Sanin  <aleksey@aleksey.com>
        * Removed XKMS support -- it was never completed and not worth keeping

2013-05-23 Aleksey Sanin  <aleksey@aleksey.com>
        * 1.2.20 release

2014-05-23  Aleksey Sanin  <aleksey@aleksey.com>
        * fix build on MacOSX (bug #680307)
        * update certs for examples (bug #674572)
        * update test certs to be valid till 2114
        * don't create files on xmlsec-mscrypto when loading the key (bug #633924)
        * clarify min OpenSSL requirements

2014-05-23  Aleksey Sanin  <aleksey@aleksey.com>
        * better detect private keys on ext RSA engines (bug #728213)
        * fixed CRL check

2014-02-17  Aleksey Sanin  <aleksey@aleksey.com>
        * fixes for RH 6x

2013-07-19  Aleksey Sanin  <aleksey@aleksey.com>
        * fixed switch - added missed break keywords (bug #704574)

2013-06-03  Aleksey Sanin  <aleksey@aleksey.com>
        * fix memory leak in converting cert subject

2013-05-09  Aleksey Sanin  <aleksey@aleksey.com>
        * disable network access during internal xml transform parser

2013-04-12  Aleksey Sanin  <aleksey@aleksey.com>
        * fix typo (fixed bug 695605)

2013-03-28  Aleksey Sanin  <aleksey@aleksey.com>
        * disable ECDSA if needed (Daniel)

2013-03-24  Aleksey Sanin  <aleksey@aleksey.com>
        * docs rebuild
2018-01-30 13:25:19 +00:00
sborrill
08169e7809 lynis: update to 2.6.1
Changes:
--------
* Tests can have more than 1 required OS (e.g. Linux OR NetBSD)
* Added 'system-groups' option to profile (Enterprise users)
* Overhaul of default profile and migrate to new style (setting=value)
* Show warning if old profile options are used
* Improved detection of binaries
* New group 'usb' for tests related to USB devices

Tests:
------
* [FILE-6363] - New test for /var/tmp (sticky bit)
* [MAIL-8802] - Added exim4 process name to improve detection of Exim
* [NETW-3030] - Changed name of dhcp client name process and added udhcpc
* [SSH-7408] - Restored UsePrivilegeSeparation
* [TIME-3170] - Added chrony configuration file for NetBSD
2018-01-30 08:43:02 +00:00
he
5598fadd14 Fix the examples directory in MESSAGE to match where it is...
Bump PKGREVISION.
2018-01-29 09:48:45 +00:00
wiz
bff4597ffc Bump PKGREVISION for gdbm shlib major bump 2018-01-28 20:10:34 +00:00
wiz
691456c467 py-certifi: update to 2018.1.18.
Changes not found.
2018-01-28 16:38:18 +00:00
wiz
58a2a977a7 recursive bump after mpfr shlib major bump 2018-01-28 16:24:10 +00:00
bouyer
1e7228e2f0 Fix PLIST after clamav update 2018-01-28 13:22:53 +00:00
markd
63d72509a0 kauth: allow overriding the dbus install directory 2018-01-27 19:08:12 +00:00
roy
8115ceeee2 Import keychain-2.8.5 with the following improvements:
*  gnupg socket support
  *  better portability
2018-01-27 10:00:15 +00:00
bouyer
27605b8608 Fix memory/file descriptor leak in cli_scanscript().
Bump PKGREVISION.
2018-01-26 16:26:57 +00:00
bouyer
44650970f1 Reset PKGREVISION, ride previous package version bump. 2018-01-26 16:24:32 +00:00
jperkin
d24a7ffc58 sbd: Specify c++03 to avoid conflicts with std::bind. 2018-01-26 13:36:43 +00:00
bouyer
5905717e06 Update clamav and clamav-doc to 0.99.3. Changes since 0.99.2:
Security release fixing CVE-2017-12374, CVE-2017-12375, CVE-2017-12376,
CVE-2017-12377, CVE-2017-12378, CVE-2017-12379, CVE-2017-12380.
Also included are 2 minor fixes to properly detect openssl install locations on FreeBSD 11, and prevent false warnings about zlib 1.2.1# version numbers.
2018-01-26 12:20:16 +00:00
markd
52de0eb5b4 libssh: fix options.mk for current cmake based build 2018-01-25 19:52:38 +00:00
markd
e9c46ca027 kf5: strip -fvisibility=hidden in all kf5 packages
as it breaks the plugin mechanism due to not being able to
resolve various symbols
2018-01-24 19:06:06 +00:00
jperkin
41e1164ae6 qca2: Don't override QMAKE_MACOSX_DEPLOYMENT_TARGET. 2018-01-23 12:57:04 +00:00
fhajny
74add85d4c Update security/py-{acme,certbot} to 0.21.0.
### Added

- Support for the HTTP-01 challenge type was added to our Apache and Nginx
  plugins.
- IPv6 support was added to the Nginx plugin.
- Support for automatically creating server blocks based on the default server
  block was added to the Nginx plugin.
- The flags --delete-after-revoke and --no-delete-after-revoke were added
  allowing users to control whether the revoke subcommand also deletes the
  certificates it is revoking.

### Changed

- We deprecated support for Python 2.6 and Python 3.3 in Certbot and its ACME
  library.
- We split our implementation of JOSE (Javascript Object Signing and
  Encryption) out of our ACME library and into a separate package named josepy.
- We updated the ciphersuites used in Apache to the new values recommended by
  Mozilla

### Fixed

- An issue with our Apache plugin on Gentoo due to differences in their
  apache2ctl command have been resolved.
2018-01-22 13:37:25 +00:00
fhajny
95130c03ad Import josepy-1.0.1 as security/py-josepy.
JOSE protocol implementation in Python using cryptography.
2018-01-22 13:30:08 +00:00
leot
3ac4a82005 sqlmap: Update security/sqlmap to 1.2
Changes
(unfortunately upstream does not provide any changelog, this is based by
reading commit messages):
1.2
---
- Misc improvements and bug fixes

1.1.11
------
- Add support for Apache SHA1
- Add support for Joomla password
- Add support for vBulletin password hashes
- Add support for DJANGO_MD5 and DJANGO_SHA1
- Add WAF script for Wordfence
- Add WAF script for DOSarrest
- Misc improvements and bug fixes

1.1.10
------
- Polish translation
- Add support for blind-based charset dump
- Misc improvements and bug fixes
2018-01-21 21:46:34 +00:00
roy
2aa9c0a5d5 Update to keychain-2.8.4:
Uses id instead of whoami for better portability.
  GPG2 support, support for busybox ps and various optimizations.
2018-01-21 16:03:29 +00:00
markd
6c0ee424db Pass --disable-pinentry-fltk to configure to fix build when fltk installed 2018-01-20 11:06:13 +00:00
abs
a37d2c3937 Pass --disable-pinentry-fltk to configure to fix build when fltk installed 2018-01-19 13:36:42 +00:00
wiz
8408a2413f p5-Net-SSLeay: switch TEST_DEPENDS back to BUILD_DEPENDS
In pbulk with PKGSRC_RUN_TESTS, test dependencies are not installed
but expected.
2018-01-19 09:44:36 +00:00
adam
fe6e1fcfa9 py-requests-kerberos: updated to 0.12.0
0.12.0:
- Add support for channel binding tokens (assumes pykerberos support >= 1.2.1)
- Add support for kerberos message encryption (assumes pykerberos support >= 1.2.1)
- Misc CI/test fixes
2018-01-19 09:10:04 +00:00
sborrill
1a63599d49 lynis: update to 2.6.0
Changes:
--------
* Binary paths are now sorted
* Greek language added
* systemd detection improved
* VirtualBox detection extended
* Several code enhancements

Tests:
------
* [PHP-2379] - Small enhancement to resolve error on screen in some cases
* [MALW-3280] - Improved detection for BitDefender tooling
2018-01-18 16:42:40 +00:00
sborrill
d0ee27ce4d Make sure .orig files aren't installed 2018-01-18 16:26:05 +00:00
sborrill
71777ca9c3 Fix path in patch 2018-01-18 13:22:18 +00:00
markd
e92e325fbb kwallet: remove old patch 2018-01-18 05:10:44 +00:00
jnemeth
1902c33594 add and enable lynis 2018-01-18 04:57:22 +00:00
markd
41773c874e kf5: update to 5.41.0
16 months worth of updates. requires qt5>=5.7
2018-01-17 20:00:20 +00:00
markd
9e510201d4 kwalletmanager: PLIST changes for polkit-qt update 2018-01-17 18:59:53 +00:00
markd
1211c9a350 polkit-qt: update to 0.112.0
matching the polkit-qt5 version, and switching to polkit.
2018-01-17 18:48:26 +00:00
wiz
48f3fc592b p5-Net-SSLeay: update to 1.84.
Use TEST_DEPENDS.

1.84 2018-01-17
	Fixed an error in t/local/04_basic.t causing a test failure if
	Test::Exception not installed. Reported by Joel Berger.

1.83 2018-01-16
	Fixed a problem with exporting OPENSSL_NO_NEXTPROTONEG even though they are not availble on LibreSSL.
	Patch patch-SSLeay_xs-NO_NPN from Alexander Bluhm.
	Patch from Heikki Vatiainen adds support for SSL_set_default_passwd_cb* for
	OpenSSL 1.1.0f and later. LibreSSL does not support these functions, at
	least yet.
	Patch from Heikki Vatiainen adds new functions related to SSL_CTX_new.
	Patch from Heikki Vatiainen adds two new functions introduced in OpenSSL 1.1.0, a number
	of constants and a couple of const qualifiers to SSLeay.xs. Tests and
	documentation .pod were also updated.
	Patch from Heikki Vatiainen adds one new OpenSSL 1.1.0 function and has a minor fix for
	LibreSSL version detection:
	*   Added support for SSL_use_certificate_chain_file
     	function introduced in OpenSSL 1.1.0.
	*   Fixed LibreSSL version detection to correctly parse
     	LibreSSL minor version.
	Patch from Steffen Ulrich to fix memory leaks in OCSP handling. Thanks.
	Patch from Heikki Vatiainen adds new functions for certificate verification introduced in
	OpenSSL 1.02, a number of constants, new test data files, new tests and
	updates to .pod documentation.
	The new functions provide access to the built-in wildcard check
	functionality available in OpenSSL 1.0.2 and later.
	The patch also adds new tests for the new functions and updates some of
	the current tests for CTX_set_default_passwd_cb* functions.
	Added X509_STORE_CTX_new and X509_verify_cert.
	SSL_OCSP_response_verify now clears the error queue if OCSP_basic_verify fails but the
	intermediate certificate succeeds. Patch from Stefan Ullrich.
2018-01-17 08:52:51 +00:00
fhajny
1869f5db99 Update security/fast_tls to 1.0.20.
Version 1.0.20
- Include uthash.h in hex package

Version 1.0.19
- Fix couple memory leaks
- Switch hashmap to uthash library
- Use system allocator in openssl
- Update ciphers and option to safer defaults
2018-01-16 12:16:22 +00:00
jperkin
d525a984c7 openssl: Don't set LD_LIBRARY_PATH during build. 2018-01-16 09:48:46 +00:00
sborrill
f94537ebc1 lynis: add 2.5.9
Lynis is an open source security auditing tool. Used by system
administrators, security professionals, and auditors, to evaluate the
security defenses of their Linux and Unix-based systems. It runs on the host
itself, so it performs more extensive security scans than vulnerability
scanners.
2018-01-15 12:38:37 +00:00
jnemeth
0f612ec608 set sane default location for config file 2018-01-15 09:26:23 +00:00
maya
ea36019c88 sudo: avoid segfault if hostname is empty
from andrew hall in pr pkg/52923
PKGREVISION++
2018-01-14 15:29:38 +00:00
jaapb
2db819ded7 Recursive revbump associated with the update to OCaml 4.06. 2018-01-10 16:53:07 +00:00
jaapb
072d2bf47a Updated package security/ocaml-ssl to version 0.5.5.
This introduces compatibility with OCaml 4.06 (or rather safe-string)
and honours LDFLAGS during build.
2018-01-10 16:44:16 +00:00
wiz
215c1a4e0d pinentry-gtk2: update to 1.1.0.
See pinentry.
2018-01-10 12:30:00 +00:00
wiz
2e3cf37d6f pinentry: update to 1.1.0.
Noteworthy changes in version 1.1.0 (2017-12-03)
------------------------------------------------

 * A FLTK1.3-based pinentry has been contributed.

 * A TQt3-based pinentry has been contributed.

 * New option --ttyalert for pinentry-curses to alert the user.

 * Don't show "save passphrase" checkbox if secret service is
   unavailable.

 * The GTK Pinentry shows on Linux some information anout the process
   which invoked the Pinentry.

 * The GTK Pinentry does not anymore show tooltips when keyboard
   grabbing is enabled.

 * Fixed various minor problems.
2018-01-10 12:29:38 +00:00
adam
0d28a725ec py-argon2_cffi: updated to 18.1.0
18.1.0:
- It is now possible to use the ``argon2_cffi`` bindings against an Argon2 library that is provided by the system.
2018-01-10 09:39:10 +00:00