Commit graph

8187 commits

Author SHA1 Message Date
wiz
1794f7b19f Update py-rsa to 3.4.1:
Version 3.4.1 - released 2006-03-26
----------------------------------------

- Included tests/private.pem in MANIFEST.in
- Included README.md and CHANGELOG.txt in MANIFEST.in
2016-04-13 17:54:10 +00:00
wen
bb8933028c Update to 2.55
Upstream changes:
2016-03-09   Gisle Aas <gisle@ActiveState.com>

   Release 2.55

   Gordon Stanton (2):
      Make use warnings work including test cases.
      Initial Travis config

   Gisle Aas (1):
      Avoid warning: 'static' is not at beginning of declaration [RT#105646]
2016-04-13 13:25:30 +00:00
fhajny
90c14d54cc Fix build on SunOS. Fix pkglint warnings while at it.
Problem isolated and solution provided by @Kurlon
  https://github.com/joyent/pkgsrc/pull/350
2016-04-12 13:15:14 +00:00
wiz
1f232bde7a Use ${MASTER_SITE_LOCAL} when you mean ${MASTER_SITE_LOCAL}. 2016-04-12 08:08:46 +00:00
ryoon
ac20a93574 Recursive revbump from textproc/icu 57.1 2016-04-11 19:01:33 +00:00
dbj
936c8e6e77 Avoid creating a fake zlib.pc, because if it does
gnutls will add a Requires.private for it in its .pc file
2016-04-10 07:45:22 +00:00
wiz
af09a31b93 Update py-cryptography to 1.3.1.
1.3.1 - 2016-03-21
~~~~~~~~~~~~~~~~~~

* Fixed a bug that caused an ``AttributeError`` when using ``mock`` to patch
  some ``cryptography`` modules.

1.3 - 2016-03-18
~~~~~~~~~~~~~~~~

* Added support for padding ANSI X.923 with
  :class:`~cryptography.hazmat.primitives.padding.ANSIX923`.
* Deprecated support for OpenSSL 0.9.8. Support will be removed in
  ``cryptography`` 1.4.
* Added support for the :class:`~cryptography.x509.PolicyConstraints`
  X.509 extension including both parsing and generation using
  :class:`~cryptography.x509.CertificateBuilder` and
  :class:`~cryptography.x509.CertificateSigningRequestBuilder`.
* Added :attr:`~cryptography.x509.CertificateSigningRequest.is_signature_valid`
  to :class:`~cryptography.x509.CertificateSigningRequest`.
* Fixed an intermittent ``AssertionError`` when performing an RSA decryption on
  an invalid ciphertext, ``ValueError`` is now correctly raised in all cases.
* Added
  :meth:`~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier`.
2016-04-08 15:22:03 +00:00
wiz
dbe9501ebb Update p5-IO-Socket-SSL to 2.025.
2.025 2016/04/04
- Resolved memleak if SSL_crl_file was used: RT#113257, RT#113530
  Thanks to avi[DOT]maslati[AT]forescout[DOT]com and
  mark[DOT]kurman[AT]gmail[DOT]com for reporting the problem
2016-04-08 15:09:37 +00:00
wiz
1436dbaf85 Update p5-Crypt-PWSafe3 to 1.22.
1.22:	Records created by Crypt::PWSafe3 (eg. the ones fetched
	with getrecords) are now associated with the parent
	object, so that you can modify them directly and call
	$vault->save afterwards without using $vault->modifyrecord.

        Erase passwd from memory using zeros instead of
        random bytes. fixes github#9.

	Fixed rt.cpan.org#112975: Crypt::ECB (which we use) have been
	reworked and among other issues it fixed handline of padding.
	PWSafe3.pm did not specify a padding scheme (because it doesn't
	use it) and therefore Crypt::ECB enforced a default scheme
	which lead to an invalid key size. Now we specify explicitly
	padding:none, as suggested by Christoph Appel.
2016-04-08 14:46:13 +00:00
wen
6d5401af2b Update to 2.15
Upstream changes:
v2.15, 14.03.2016
	- removing caching with v2.00 made Crypt::ECB ignorant of key changes
		within the same Crypt::ECB object. Fixed, changing the key now
		forces a new cipher object to be created.
	- added some notes on upgrading from versions before v2.00 to the README
2016-04-07 12:38:48 +00:00
imil
5c39e342e4 Added BUILD_DEPENDS+=xterm>=322:../../x11/xterm in order to quickly fix:
"xterm" binary not found - please amend $PATH or the cssh config file

ok wiz@
2016-04-06 11:33:07 +00:00
joerg
1318800a28 Fix build with API differences in xulrunner. 2016-04-04 17:36:34 +00:00
joerg
02847b53e7 Explicitly depend on the mozilla CA list for providing a trust anchor.
NetBSD doesn't ship a CA bundle by default.
2016-04-04 17:34:56 +00:00
jperkin
0e54984fed Support PKGMANDIR. 2016-04-01 17:11:36 +00:00
jperkin
44388a7b70 Honour --mandir. Fixes PKGMANDIR. 2016-04-01 13:54:41 +00:00
jperkin
4af722df87 Support PKGMANDIR. 2016-04-01 11:15:24 +00:00
jperkin
909175cee1 Support PKGMANDIR. 2016-04-01 11:06:44 +00:00
jperkin
a5f98844ec Support --mandir. Fixes PKGMANDIR. 2016-04-01 10:43:29 +00:00
jperkin
101e96eaa7 Use PKGMANDIR. Add patch comment. 2016-03-30 09:52:58 +00:00
jperkin
b4f61fc0e2 Use PKGMANDIR. Add patch comment. 2016-03-30 09:48:42 +00:00
khorben
3d28b483b6 Remove support for SSLv2
This fixes the build with the newest OpenSSL from pkgsrc. Bump revision.
2016-03-29 23:04:01 +00:00
joerg
169a80a903 Remove SSLv2 support. Bump revision. 2016-03-29 22:00:13 +00:00
wiz
b4b92bc3f3 Update py-rsa to 3.4.
Fixes a security vulnerability.

No proper changelog found, which I find even more astonishing for
security software...
2016-03-24 13:45:57 +00:00
wiz
d27a4a27b9 Fix pinentry configure argument.
Found by coypu.
2016-03-20 22:03:17 +00:00
pettai
7b643e1e8f Release Notes - OpenSAML 2 - C++ - Version 2.5.5
** Bug
    * [CPPOST-91] - BOOST autoconf macros break with gcc5

Release Notes - OpenSAML 2 - C++ - Version 2.5.4

** Bug
    * [CPPOST-87] - legacyOrgNames doesn't work as expected with empty
      mdui:UIInfo
    * [CPPOST-88] - Insufficient XML entity encoding in Metadata Status
      generation
    * [CPPOST-90] - Condition validation for empty element incorrectly
      requires either a NotBefore or a NotOnOrAfter attribute

This is part of fixing PR pkg/50354
2016-03-20 10:04:14 +00:00
ryoon
c4eb1e4258 Update to 5.5.4
* Based on Firefox 38.7.1
* Fix PR pkg/50975: security/tor-browser is built without -pie
* Store cache in ~/.tor-browser-caches instead of ~/Caches
2016-03-20 06:53:37 +00:00
tez
5bbc10b8a1 Fix build on 64 bit intel systems with yasm installed. 2016-03-18 19:08:39 +00:00
bsiegert
971812ea29 Update openssh to 7.2.2 (7.2p2).
Changes since OpenSSH 7.2p1
===========================

This release fixes a security bug:

 * sshd(8): sanitise X11 authentication credentials to avoid xauth
   command injection when X11Forwarding is enabled.

   Full details of the vulnerability are available at:
   http://www.openssh.com/txt/x11fwd.adv
2016-03-15 20:54:07 +00:00
tez
188b8d1ff4 Missed one checksum update... fixed. 2016-03-15 15:22:38 +00:00
tez
91d0631a40 Update to 1.14.1 resolving all reported vulnerabilities including:
CVE-2015-2695
CVE-2015-2696
CVE-2015-2697
CVE-2015-2698
CVE-2015-8629
CVE-2015-8630
CVE-2015-8631
2016-03-15 15:16:39 +00:00
taca
359749ffa1 Update HOMEPAGE.
Changes from 0.4.7 are too many to write here, please refer commit log:
<https://github.com/oauth-xx/oauth-ruby/commits/master>.
2016-03-15 15:15:49 +00:00
taca
c7d7bc9648 Update ruby-bcrypt to 3.1.11.
3.1.11 Mar 06 2016
  - Add support for Ruby 2.2 in compiled Windows binaries
2016-03-15 15:07:02 +00:00
ryoon
89c3f69b5c Update to 5.5.3
Changelog:
Rebase to Firefox 38.7.0
2016-03-14 14:30:47 +00:00
ryoon
fbe30c9e5b Update to 0.67
Changelog:  2016-03-05 PuTTY 0.67 released, fixing a SECURITY HOLE

PuTTY 0.67, released today, fixes a security hole in 0.66 and
before: vuln-pscp-sink-sscanf. It also contains a few other small
bug fixes.

Also, for the first time, the Windows executables in this release
(including the installer) are signed using an Authenticode certificate,
to help protect against tampering in transit from our website or
after downloading. You should find that they list "Simon Tatham"
as the verified publisher.
2016-03-14 14:07:30 +00:00
manu
3b286542d9 Update lasso to 2.5.1
Changes since 2.4.1 from NEWS file:

2.5.1 - February 19th 2016
---------------------------
17 commits, 16 files changed, 1096 insertions, 42 deletions

 - Add missing urn constants used in PAOS HTTP header
 - Set NotBefore in SAML 2.0 login assertions
 - tests: fix leak in test test16_test_get_issuer
 - id-ff: fix leak of profile->private_data->message_id
 - saml-2.0: fix leak of message_id in
   lasso_profile_saml20_build_paos_request_msg
 - tests: fix leaks in test_ecp
 - xml: fix wrong termination of comment
 - xml: fix leak in lasso_soap_envelope_new_full
 - profile: fix leak of private idp_list field
 - saml-2.0: fix leaks of url
 - tests: fix leak
 - tests: update valgrind suppressions
 - perl: remove quotes from $PERL -V::ccflags: output (#9572)
 - Fix wrong snippet type (fixes #9616). Thanks to Brett Gardner for the patch.
 - tools.c: use correct NID and digest length when building RSA signature
   using SHA-2 digest
   (fixes #10019) Thanks to Brett Gardner for the patch.
 - bindings/php5: fix enum getters and setters (fixes #10032). Thanks to
   Brett Gardner for the bug report.
 - fix warning about INCLUDES directive

2.5.0 - September 2nd 2015
--------------------------
151 commits, 180 files changed, 8391 insertions, 1339 deletions

 - lots of bugfixes (reported by static analysis tools like clang,
   coverity and manual inspection) thanks to Simo Sorce and John Dennis from
   RedHat
 - xsd:choices are now parsed correctly by implementing a real finite automata
   for parsing XML documents. New flag for jumping forward and backward in
   schema snippets have been added. It fixes parsing of message from third
   party not following the ordre from the schema (they are entitled to do it but
   most SAML implementations do not)
 - added C CGI examples for SP and IdP side
 - removed the _POSIX_SOURCE declaration
 - added support for the SHA-2 family of hash functions
 - fixed protocol profile selection when parsing AuthnRequest
 - added support for Python 3, thanks to Houzefa Abbasbhay from
   XCG Consulting
 - fixed default value of WantAuthnRequestSigned in metadata parsing
 - SAML 2.0 ECP is now functionnal, thanks to John Dennis from RedHat
 - added two new API function to LassoProfile to extract the Issuer and
   InResponseTo attribute of messages, allowing pre-treatment before parsing
   the message, to load the metadata of the remote provider, or find the request
   which the response matches.
 - fixed segfault when parsing HTTP-Redirect marlformed base64 content
 - added support for automake 1.15 (jdennis)
2016-03-14 09:43:42 +00:00
wiz
933c8f489e Update p5-Crypt-ECB to 2.10:
v2.10, 07.03.2016
	- forgot another change in the v2.00 changelog...
	- changed license from GPL to Artistic
	- improved kwalitee:
		- added license information to meta files
		- removed test.pl
	- added eg/ecb.pl (command line en- and decryption)
	- added dummy cipher, so the test suite makes sense even if there are no block ciphers installed
	- refactored test data from test scripts
2016-03-13 16:53:30 +00:00
taca
f5610a07a0 Bump PKGREVISION by chaging default version of Ruby. 2016-03-13 09:36:58 +00:00
ryoon
67962f5abb Update to 0.22.1
Changelog:
0.22.1 (stable)
 * Use SubjectKeyIdentifier for CKA_ID when available [#84761]
 * Allow 'BEGIN PuBLIC KEY' PEM blocks in .p11-kit files
 * Bump libtool library version
 * Build fixes [#84665 ...]

0.22.0 (stable)
 * Remove the 'isolated = yes' option due to unclear semantics
   replacement forth coming in later versions.
 * Use secure_getenv() where necessary
 * Run separate binary for 'p11-kit remote' command

0.21.3 (unstable)
 * New public pkcs11x.h header containing extensions [#83495]
 * Export necessary defines to lookup attached extensions [#83495]
 * Use term 'attached extensions' rather than 'stabled extensions'
 * Make proxy module respect 'critical = no' [#83651]
 * Show public-key-info in 'trust list --details'
 * Build fixes [#75674 ...]

0.21.2 (unstable)
 * Don't use invalid keys for looking up stapled extensions [#82328]
 * Better error messages when invalid certificate extensions
 * Fix parsing of some odd OpenSSL TRUSTED CERTIFICATE files
 * Fix some leaks, and memory issues
 * Silence some clang scanner warnings
 * Fix build against older pthread implementations [#82617]
 * Move to a non-recursive Makefile
 * Can now specify which tests to run on command line

0.21.1 (unstable)
 * Add new 'isolate' pkcs11 config option [#80472]
 * Add 'p11-kit remote' command for isolating modules [#54105]
 * Don't complain about C_Finalize after a fork
 * Other minor fixes

0.20.3 (stable)
 * Fix problems reinitializing managed modules after fork
 * Fix bad bookeeping when fail initializing one of the modules
 * Fix case where module would be unloaded while in use [#74919]
 * Remove assertions when module used before initialized [#74919]
 * Fix handling of mmap failure and mapping empty files [#74773]
 * Stable p11_kit_be_quiet() and p11_kit_be_loud() functions
 * Require automake 1.12 or later
 * Build fixes for Windows [#76594 #74149]

0.20.2 (stable)
 * Fix bug where blacklist didn't affect extracted ca-anchors if the anchor
   and blacklist were not in the same trust path (regression) [#73558]
 * Check for race in BasicConstraints stapled extension [#69314]
 * autogen.sh now runs configure as srcdir != builddir by default
 * Build fixes and cleanup

0.20.1 (stable)
 * Extract compat trust data after we've changes
 * Skip compat extraction if running as non-root
 * Better failure messages when removing anchors
 * Build cleanup

0.20.0 (stable)
 * Doc fixes

0.19.4 (unstable)
 * 'trust anchor' now adds/removes certificate anchors
 * 'trust list' lists trust policy stuff
 * 'p11-kit extract' is now 'trust extract'
 * 'p11-kit extract-trust' is now 'trust extract-compat'
 * Workarounds for working on broken zfsonlinux.org [#68525]
 * Add --with-module-config parameter to the configure script [#68122]
 * Add support for removing stored PKCS#11 objects in trust module
 * Various debugging tweaks

0.19.3 (unstable)
 * Fix up problems with automake testing
 * Fix a bunch of memory leaks in newly refactored code
 * Don't use _GNU_SOURCE and the unportability it brings
 * Testing fixes

0.19.2 (unstable)
 * Add basic 'trust anchor' command to store a new anchor
 * Support for writing out trust token objects
 * Port to use CKA_PUBLIC_KEY_INFO and updated trust store spec
 * Add option to use freebl for hashing
 * Implement reloading of token data
 * Fix warnings and possible minor bugs higlighted by code scanners
 * Don't load configs in home directories when running setuid or setgid
 * Support treating ~/.config as $XDG_CONFIG_HOME
 * Use $XDG_DATA_HOME/pkcs11 as default user config directory
 * Use $TMPDIR instead of $TEMP while testing
 * Open files and fds with O_CLOEXEC
 * Abort initialization if a critical module fails to load
 * Don't use thread-unsafe functions: strerror, getpwuid
 * Fix p11_kit_space_strlen() result when empty string
 * Refactoring of where various components live
 * Build fixes

0.19.1 (unstable)
 * Refactor API to be able to handle managed modules
 * Deprecate much of old p11-kit API
 * Implement concept of managed modules
 * Make C_CloseAllSessions function work for multiple callers
 * New dependency on libffi
 * Fix possible threading problems reported by hellgrind
 * Add log-calls option
 * Mark p11_kit_message() as a stable function
 * Use our own unit testing framework

0.18.3 (stable)
 * Fix reinitialization of trust module [#65401]
 * Fix crash in trust module C_Initialize
 * Mac OS fixes [#57714]

0.18.2 (stable)
 * Build fixes [#64378 ...]

0.18.1 (stable)
 * Put the external tools in $libdir/p11-kit
 * Documentation build fixes

0.18.0 (stable)
 * Fix use of trust module with gcr and empathy [#62896]
 * Further tweaks to trust module date parsing
 * Fix unaligned memory reads [#62819]
 * Win32 fixes [#63062, #63046]
 * Debug and logging tweaks [#62874]
 * Other build fixes

0.17.5 (unstable)
 * Don't try to guess at overflowing time values on 32-bit systems [#62825]
 * Test fixes [#927394]

0.17.4 (unstable)
 * Check for duplicate certificates in a token, warn and discard [#62548]
 * Implement a proper index so we have decent load performance

0.17.3 (unstable)
 * Use descriptive labels for the trust module tokens [#62534]
 * Remove the temporary built in distrust objects
 * Make extracted output directories and files read-only [#61898]
 * Don't export unneccessary ABI
 * Build fixes [#62479]

0.17.2 (unstable)
 * Fix build on 32-bit linux
 * Fix several crashers

0.17.1 (unstable)
 * Support a p11-kit specific PKCS#11 attribute persistance format [#62156]
 * Use the SHA1 hash of SPKI as the CKA_ID in the trust module by default [#62329]
 * Refactor a trust builder which builds objects out of parsed data [#62329]
 * Combine trust policy when extracting certificates [#61497]
 * The extract --comment option adds comments to PEM bundles [#62029]
 * A new 'priority' config option for ordering modules [#61978]
 * Make each configured path its own trust module token [#61499]
 * Use --with-trust-paths to configure trust module [#62327]
 * Fix bug decoding some PEM files
 * Better debug output for trust module lookups
 * Work around bug in NSS when doing serial number lookups
 * Work around broken strndup() function in firefox
 * Fix the nickname for the distrusted attribute
 * Build fixes

0.16.4 (stable)
 * Display per command help again [#62153]
 * Don't always print tools debug output [#62152]

0.16.3 (stable)
 * When iterating don't skip tokens without the CKF_TOKEN_INITIALIZED flag
 * Hardcode some distrust records for NSS temporarily
 * Parse global options better in the p11-kit command
 * Better debugging

0.16.2 (stable)
 * Fix regression in 'p11-kit extract --purpose' option [#62009]
 * Documentation updates
 * Build fixes [#62001, ...]

0.16.1 (stable)
 * Don't break when cA field of BasicConstraints is missing [#61975]
 * Documentation fixes and updates
 * p11-kit extract-trust is a placeholder script now

0.16.0 (stable)
 * Update the pkcs11.h header for new mechanisms
 * Fix build and tests on mingw64 (ie: win32)
 * Relicense LGPL code to BSD license
 * Documentation tweaks
 * Pull translations from Transifex [#60792]
 * Build fixes [#61739, #60894, #61740]

0.15.2 (unstable)
 * Add German and Finish translations
 * Better define the libtasn1 dependency
 * Crasher and bug fixes
 * Build fixes

0.15.1 (unstable)
 * Fix some memory leaks
 * Add a location for packages to drop module configs
 * Documentation updates and fixes
 * Add command line tool manual page
 * Remove unused err() function and friends
 * Move more code into common/ directory and refactor
 * Add a system trust policy module
 * Refactor how the p11-kit command line tool works
 * Add p11-kit extract and extract-trust commands
 * Don't complain if we cannot access ~/.pkcs11/pkcs11.conf
 * Refuse to load the p11-kit-proxy.so as a registered module
 * Don't fail initialization if last initialized module fails

0.14
 * Change default for user-config to merge
 * Always URI-encode the 'id' attribute in PKCS#11 URIs
 * Expect a .module extension on module configs
 * Windows compatibility fixes
 * Testing fixes
 * Build fixes

0.13
 * Don't allow reading of PIN files larger than 4096 bytes
 * If a module is not marked as critical then ignore init failure
 * Use preconditions to check for input problems and out of memory
 * Add enable-in and disable-in options to module config
 * Fix the flags in pin.h
 * Use gcc extensions to check varargs during compile
 * Fix crasher when a duplicate module is present
 * Fix broken hashmap behavior
 * Testing fixes
 * Win32 build fixes
 * 'p11-kit -h' now works
 * Documentation fixes

0.12
 * Build fix

0.11
 * Remove automatic reinitialization of PKCS#11 after fork
2016-03-13 03:10:36 +00:00
fhajny
14362336e3 Enable php-oauth1 2016-03-12 09:44:14 +00:00
fhajny
e71a890621 Update security/php-oauth to 2.0.1.
2.0.1
* Fix multiple segfaults (kgovande, rlerdorf)

2.0.0
- PHP 7 Support
- Bug 67658: configure does not detect missing pcre.h
- Bug 67665: update fetch to accept 20X HTTP ranges
- Bug 67883: check SERVER[REDIRECT_HTTP_AUTHORIZATION]
  for the Authorization header
2016-03-12 09:42:48 +00:00
fhajny
f8a5c9a7d4 Re-import security/php-oauth as security/php-oauth1 (for PHP<7).
OAuth is an authorization protocol built on top of HTTP which allows
applications to securely access data without having to store usernames
and passwords.
2016-03-12 09:39:57 +00:00
jperkin
b5e60568fb Ensure libss is built -static, the library is not installed resulting
in runtime failures which weren't previously detected due to a bug in
check-shlibs.  Bump PKGREVISION.
2016-03-10 18:21:58 +00:00
tnn
e2177365f6 include <limits.h> for PATH_MAX 2016-03-10 12:57:09 +00:00
wiz
cdda6f8ae4 Update p5-Crypt-ECB to 2.05:
v2.05, 04.03.2016
	- make Crypt:ECB work under perl-5.8.* again
	- some changes actually made in v2.00 haven't been mentioned in the changelog
	- add some more block ciphers to the test suite
	- minor changes in test.pl
	- minor documentation update
2016-03-09 10:47:45 +00:00
tnn
c5e92e4742 fix build on Linux 2016-03-09 06:01:09 +00:00
ryoon
8d85ffc504 Update to 5.31
Changelog:
Version 5.31, 2016.03.01, urgency: HIGH
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.2g.
    https://www.openssl.org/news/secadv_20160301.txt
* New features
  - Added logging the list of client CAs requested by the server.
  - Improved compatibility with the current OpenSSL 1.1.0-dev tree.
* Bugfixes
  - Only reset the watchdog if some data was actually transferred.
  - A workaround implemented for the unexpected exceptfds set by
    select() on WinCE 6.0 (thx to Richard Kraemer).
2016-03-08 19:25:35 +00:00
wiz
4e5c667790 Update py-cryptography to 1.2.3:
1.2.3 - 2016-03-01
~~~~~~~~~~~~~~~~~~

* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2g.
2016-03-08 15:14:38 +00:00
wiz
1dcb4ae5d8 Update p5-Crypt-ECB to 2.00.
v2.00, 19.02.2016
	- better compatibility with current Crypt::CBC:
		- allow passing options like Crypt::CBC does (new and old styles)
		- allow passing an existing cipher object (RT bug 112020)
		- added padding styles, including custom padding
		- added methods for accessing keysize and blocksize of a cipher
	- remove caching; the feature did finally not seem to make much sense
	- use Test::More (thanks to Xavier Guimard for providing a patch, RT bug 82301)
	- changed internal attribute names (foo -> _foo and Foo -> foo)
	- much more internal code cleanup
	- updated documentation
2016-03-08 15:07:28 +00:00
jperkin
17661ff9a5 Bump PKGREVISION for security/openssl ABI bump. 2016-03-05 11:27:40 +00:00
jperkin
e5fdb68de3 Bump BUILDLINK_ABI_DEPENDS to 1.0.2g due to SSLv2 removal. 2016-03-05 09:59:50 +00:00