Commit graph

232236 commits

Author SHA1 Message Date
tnn
1706e60098 NOLOGIN needs to be /usr/bin/false here. Probably copy-pasto from OSF1.mk. 2015-04-19 12:02:15 +00:00
tnn
19daf0cc07 fix typo in comment 2015-04-19 09:21:33 +00:00
tnn
52b321bbb5 guard against undefined ABI 2015-04-19 09:02:02 +00:00
wiz
51728e7420 Wrap libtool arguments (instead of cxx) and do it for all pulseaudio users
instead of only qt5-qtmultimedia.

Fixes build failures in qt5-qtmultimedia users like kid3.
Suggested by joerg.
2015-04-19 06:42:02 +00:00
manu
cc51ee6883 Apply fix from upstream, to workaround a build failure in SOGo
http://svn.gna.org/viewcvs/gnustep?view=revision&revision=36185
2015-04-19 04:13:26 +00:00
joerg
7049152f2f Specify safer WRKSRC for meta packages. As they don't extract files,
they won't create the subdirectory either. Since the SUBST targets try
to change to WRKSRC first, they fail. This is seen with meta packages
depending on Freetype2 when using X11_TYPE=native.
2015-04-19 01:37:55 +00:00
rodent
5c17f20354 Updated devel/py-trytond to 3.4.2nb1 2015-04-19 00:57:05 +00:00
rodent
3d58a5998a Use correct bcrypt python module. Bump PKGREVISION. 2015-04-19 00:54:30 +00:00
rodent
a297322fde Updated www/py-flask-user to 0.6.1nb3 2015-04-19 00:50:55 +00:00
rodent
d018966497 Use the correct bcrypt python module. Bump PKGREVISION. 2015-04-19 00:50:42 +00:00
rodent
9e2921cf37 CONFLICT with py-py-bcrypt. They install some files in the same place. 2015-04-19 00:50:02 +00:00
rodent
73391ddb48 +py-py-bcrypt 2015-04-19 00:48:47 +00:00
rodent
c54aaddb5c Added security/py-py-bcrypt version 0.4 2015-04-19 00:48:09 +00:00
rodent
300a2f9d02 Import py27-py-bcrypt-0.4 as security/py-py-bcrypt.
py-bcrypt is a Python wrapper of OpenBSD's Blowfish password hashing code, as
described in "A Future-Adaptable Password Scheme" by Niels Provos and David
Mazieres.

This system hashes passwords using a version of Bruce Schneier's Blowfish block
cipher with modifications designed to raise the cost of off-line password
cracking and frustrate fast hardware implementation. The computation cost of the
algorithm is parametised, so it can be increased as computers get faster. The
intent is to make a compromise of a password database less likely to result in
an attacker gaining knowledge of the plaintext passwords (e.g. using John the
Ripper).

As of py-bcrypt-0.4, this module can also be used as a Key Derivation Function
(KDF) to turn a password and salt into a cryptographic key.
2015-04-19 00:47:58 +00:00
tnn
13e2544f91 - Remove compat files. Upstream ships them now in lib.
- Fix build of compat library. Needs to use libtool objects (.lo) since
  linking is done with libtool.
2015-04-19 00:05:44 +00:00
tnn
e9d8d4a3f7 fix comment about pkgtools/compat_headers 2015-04-18 22:56:19 +00:00
dholland
55b81e4c56 mozilla-rootcerts stuff and kazehakase 2015-04-18 21:26:36 +00:00
dholland
d693071540 -kazehakase 2015-04-18 21:25:34 +00:00
dholland
03742f43db PR 49757: remove kazehakase
tnn wrote:
 : As the software seems to be ...
 :
 : 1) completely abandoned by upstream for several years
 : 2) hasn't worked in pkgsrc for at least as long
 : 3) has been removed from all linux distributions I can find
 :
 : ... the only reasonable choice of action is to remove it.
2015-04-18 21:25:01 +00:00
dholland
c5db3aa83b added security/mozilla-rootcerts-openssl 2015-04-18 21:20:51 +00:00
joerg
543c036ed4 Needs explicit libdrm dependency. 2015-04-18 20:44:47 +00:00
joerg
7222fce1ea Allow building on NetBSD/arm. 2015-04-18 20:44:08 +00:00
joerg
6f31dee37a Use uname -m output for NetBSD/ARM in the PLIST as the package does. 2015-04-18 20:43:19 +00:00
joerg
4b11e81000 Add long long overloads to help ILP32 targets. 2015-04-18 20:42:39 +00:00
joerg
d917ca2fe2 Support NetBSD/ARM. Simplify NetBSD/amd64. 2015-04-18 20:41:44 +00:00
joerg
ba4222e2ee Not MAKE_JOBS_SAFE. 2015-04-18 20:41:10 +00:00
joerg
782b3d375b Let clang ignore the mixed up return use of the K&R code. 2015-04-18 20:40:46 +00:00
dholland
28a72db5a4 Add mozilla-rootcerts-openssl.
It operates the mozilla-rootcerts installer script in order to allow
managing the resulting output openssl certs with the package tools.

Since openssl does not support more than one directory of certificates
(sheesh) this is an abusive package - it installs directly into the
openssl certs directory even though this is a sysconfig directory that
should normally only be touched using the config files infrastructure.
And, for native openssl, it's in the root /etc outside of $PREFIX.

Nonetheless, having this package is better than not having it.

Probably at some point this and the mozilla-rootcerts package should
be folded together in some fashion; but I didn't want to do that up
front, and in particular I didn't want to muck with the installer
script in mozilla-rootcerts any more than necessary to make this
package possible. This in particular prevented e.g. installing the
certs in share/ and symlinking them into the certs directory.

As things are, if you already have the certs installed manually you
can install this package over them cleanly, and thenceforth not have
to update them by hand.
2015-04-18 20:21:25 +00:00
schwarz
c6a36e1521 Updated mail/sylpheed to 3.4.2 (some minor bug fixes) 2015-04-18 20:14:58 +00:00
dholland
69b63823bc Add support for -d destdir to the mozilla-rootcerts installer script. 2015-04-18 20:11:35 +00:00
joerg
e7863e1a9d Until there is evidence to the contrary, provide _COMPILER_ABI_FLAG on
all platforms.
2015-04-18 19:53:59 +00:00
cheusov
6238e8d2d5 Depends on python-dateutil>=2.2; ++pkgrevision 2015-04-18 18:27:16 +00:00
tnn
187e09b507 Move patch-src_glu_sgi_libtess_sweep.c from MesaLib to here since this
package is built independently now.
Bump PKGREVISON.

The commit message in MesaLib read:
date: 2015-01-29 23:35:43 +0100;  author: nat;  state: Exp;
Fix segfaults and crashing with applications that use libGLU.
2015-04-18 17:44:12 +00:00
schmonz
19ef1ad8c1 Updated textproc/py-html2text to 2015.4.14 2015-04-18 14:09:00 +00:00
schmonz
f90ae3a796 Update to 2015.4.14. From the changelog:
* Feature #56: Treat '-' file parameter as stdin.
* Feature #57: Retain escaping of html except within code or pre tags.
* Feature #59: Write image tags with height and width attrs as raw
  html to retain dimensions
2015-04-18 14:08:54 +00:00
mef
54e3fb6386 Updated fonts/lohit-fonts to 2.3.8 2015-04-18 12:43:15 +00:00
mef
5180945d02 (pkgsrc)
- Add LICENSE as gnu-gpl-v2
(upstream)
 - Update 2.3.1 to 2.3.8
---------------------
* Thu Mar 05 2009 Rahul Bhalerao <rbhalera@redhat.com> - 2.3.8
- Bug 428427 - [kn_IN][fonts-indic] - 0CB5+0CCA is wrongly rendering
- Bug 450699 - [ta_IN]Errors in "sh" and "shrI" in Lohit Tamil
  font (fixed in font, needs rendering update)
- Bug 476427 - [te_IN] -
  Consonant+Virama+Consonant+Virama+space renders the second
  virama as a separate glyph in lohit-telugu font
- Bug 479100 - [kn_IN] Conjunct combination of U0C9D with
  U0CCA/U0CCB is rendering wrongly
- Bug 483530 - [bn_IN]Lohit Bengali font cheating about character support
- Added Lohit-Assamese
- Modified README file.
2015-04-18 12:43:07 +00:00
rodent
7f6a668f5c Fix build on SunOS. 2015-04-18 12:39:05 +00:00
mef
d558cce4e7 Updated fonts/tamsyn-font to 1.11 2015-04-18 12:06:55 +00:00
mef
d6d5eff122 Update to 1.11
--------------
CHANGES IN 1.11 2015-01-21

  Changed capital "A" to be less pointy, more consistent between sizes.
  Expecting hate mail.

  Previously, unimplemented chars defaulted to print a blank space under X.
  Now those chars are not placed in the font at all in order to allow
  fontconfig to fall back to use a char from another font.  (Thanks, Allen,
  for pointing this out and testing the fix.)
2015-04-18 12:06:08 +00:00
wen
7fa4aaff81 Updated devel/p5-Class-C3 to 0.28 2015-04-18 11:59:02 +00:00
wen
3f83646eff Update to 0.28
Upstream changes:
0.28 - 2015-04-14
    - Change link to Dylan paper to use archive.org, as the original link has
      gone offline (RT#99756).
2015-04-18 11:58:06 +00:00
wen
2ff09fd0b0 Updated devel/p5-Moose to 2.1404 2015-04-18 11:52:23 +00:00
wen
8371b9bca8 Update to 2.1404
Update DEPENDS

Upstream changes:
2.1404   2015-04-16

  [BUG FIXES]

  - Add Sub::Identify to prereqs. (RT #101661)
  - bump List::Util prereq to avoid a memory leak (RT#101124)

  [DOCUMENTATION]

  - Added section to Moose::Manual::Resources to list external links related
    to Moose (RT #101993, Michael LaGrasta)
2015-04-18 11:51:15 +00:00
tsutsui
cfa145751d Updated multimedia/adobe-flash-plugin11 to 11.2.202.457 2015-04-18 10:05:44 +00:00
tsutsui
d77c69b6a3 Update adobe-flash-plugin11 to 11.2.202.457.
Upstream announcement:
 https://helpx.adobe.com/security/products/flash-player/apsb15-06.html

Security updates available for Adobe Flash Player

Release date: April 14, 2015

Vulnerability identifier: APSB15-06

CVE number: CVE-2015-0346, CVE-2015-0347, CVE-2015-0348, CVE-2015-0349,
 CVE-2015-0350, CVE-2015-0351, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354,
 CVE-2015-0355, CVE-2015-0356, CVE-2015-0357, CVE-2015-0358, CVE-2015-0359,
 CVE-2015-0360, CVE-2015-3038, CVE-2015-3039, CVE-2015-3040, CVE-2015-3041,
 CVE-2015-3042, CVE-2015-3043, CVE-2015-3044

Platform: All Platforms
2015-04-18 10:04:29 +00:00
manu
cf545205bf Build fix for missing __i686.get_pc_thunk.bx symbol
Depending on the compiler, __i686.get_pc_thunk.bx may be missing
from runtime. Replace it by a localy supplied version.
2015-04-18 07:23:18 +00:00
rodent
ab0af02be4 Updated net/libzrtpcpp to 4.4.0 2015-04-18 03:36:36 +00:00
rodent
ff44be253e Add sqlite3 PKG_OPTION. USE_CMAKE instead of autotools. Update openssl
dependency. Bump BUILDLINK_A{B,P}I* in buildlink3.mk due to API changes.

From NEWS:

== GNU ZRTP 4.4.0 ==

Changes the handling of HMAC and Hash contexts to avoild tool
many malloc/free calls and thus memory pointer problems.

Enhance the handling an check the nonce when using multi-stream
mode. This required a modification to the class file and some
modifications on the API. The old functions are now deprecated
but still usable. Nevertheless you should change your application
to use the new fuctions which support the new nonce handling and
checks.

Some bug fixing as well.

== GNU ZRTP 4.3.1 ==

This is a bugfix release. It fixes several compiler issues in
iOS8 Clang, Mircosoft C++ compiler (VS 2012) etc.

This release also adds a fix to address a possible problem when
using 'memset(...)' on a memory area immediately followed by a
'free(...)' call to free this memory area. Some compilers may
otpimize the code and do not call 'memset(...)'. That's bad for
software that deals with secure keys :-) . The fix removes this
possible vulnerability.


== GNU ZRTP 4.3.0 ==

This version adds some new API that provide to set retry timer
values and to get some retry counters.

Application may now set some values of the retry counters during
the discovery (Hello) and the negotiation phase. Applications may
increase the number of retries or modify the capping to support
slow or bad networks.

To get some idea about the actual number of retries during ZRTP
negotiation an application may now use the new API to get an array
of counters. The ZRTP state engine records how many retries occured
during the different protocol states.

Note: only the ZRTP initiator performs packet retries after the
discovery (Hello) phase. The responder would always return zero
alues for the other retry counters.

Because we have a new set of functions the API changed, thus it's
necessary to recompile applications that use the new library version.


== GNU ZRTP 4.2.4 ==

Only small changes to enable Android X86 (see clients/tivi/android)
as an example.

Rename functions aes_init() to aes_init_zrtp() to avoid names clashes
with other libreries that may include own AES modules.


== GNU ZRTP 4.2.3 ==

The optional SAS relay feature (refer to RFC6189, chapter 7.3) is
not longer compiled by default. If your project needs this support
then modify the CMakeLists.txt file and uncomment a 'add_definition'
statments. See comment in the CMakelists.txt file.

The reasons to disable this optional feature in the default build:
it's rarely used and some concerns about misusing this feature.


== GNU ZRTP 4.2.2 ==

A small enhancement in SRTP handling to provide a longer bit-shift
register with 128 bits. The replay now check accepts packets which
are up to 127 sequence number behing the current packet. The upper
layer (codecs) gets more packets on slower/bad networks that we may
see on mobile 3G/4G connections.

If the codecs do not remove silence then this may lead to some longer
audio replay, similar to sattelite communication.


== GNU ZRTP 4.2.1 ==

Bug fixes in the SRTP part that checks for replay and updates the ROC.

The wrong computations lead to false replay indications and to wrong
HMAC, thus they dropped to much packets, in particular under bad network
conditions.

Changed the handling the the zrtp_getSasType function the the ZrtpCWrapper.
Please check the inline documentation and the compiler warning how to
use the return value of the function.
2015-04-18 03:36:23 +00:00
rodent
e457955c84 Updated net/ccrtp to 2.1.2 2015-04-18 03:12:51 +00:00