Commit graph

7263 commits

Author SHA1 Message Date
joerg
b6801ac211 Fix build on NetBSD/evbarm. 2014-05-21 01:22:14 +00:00
dsainty
a60467a36e Improve behaviour under NetBSD, successfully supressing error messages under
NetBSD's shell, and passing the -m option to NetBSD's "su" command to support
users without login shells.

Add the PREFIX to all script PATHs.  This can allow sudo to be installed and
used as an alternative to su, should there be any value in doing that.

Bump PKGREVISION.
2014-05-20 11:30:27 +00:00
wiz
0f5b56b90f Update to 1.1.7, changes not found. 2014-05-20 08:27:47 +00:00
wiz
37b9dd732d Make PKGNAME match dirname. 2014-05-18 13:32:32 +00:00
wiz
8dc0b94b53 + TweetNaCl 2014-05-18 13:17:30 +00:00
wiz
525b55ab2f Import tweetnacl-20140427 as security/TweetNaCl.
TweetNaCl is the world's first auditable high-security cryptographic
library. TweetNaCl fits into just 100 tweets while supporting all
25 of the NaCl functions used by applications.

This package installs a libtool library of the code.
2014-05-18 13:16:13 +00:00
obache
09986a2875 one more catch up to removal of /boot/common on Haiku. 2014-05-18 11:20:53 +00:00
obache
132dcc3b78 catch up to removal of /boot/common on Haiku. 2014-05-18 11:18:17 +00:00
wiz
3faf991a33 Bump applications PKGREVISIONs for python users that might be using
python3, since the default changed from python33 to python34.

I probably bumped too many. I hope I got them all.
2014-05-17 16:10:41 +00:00
khorben
57e338f23f Imported py-libtaxii 2014-05-17 16:08:20 +00:00
khorben
4bfd9ef9e1 Import py27-libtaxii-1.1.101 as security/py-libtaxii (from wip)
libtaxii is a Python library for handling TAXII Messages as Python objects and
invoking TAXII Services.

A primary goal of libtaxii is to remain faithful to both the TAXII
specifications and to customary Python practices. libtaxii is designed to be
intuitive both to Python developers and XML developers.
2014-05-17 16:07:51 +00:00
khorben
92690f1470 Imported py-stix 2014-05-17 16:04:56 +00:00
khorben
fe7059f0c2 Import py27-stix-1.1.0.6 as security/py-stix (from wip)
A python library for parsing, manipulating, and generating STIX content.

The python-stix library utilizes the STIX v1.1 bindings, is under heavy
development. For more information about STIX, see http://stix.mitre.org.
2014-05-17 16:03:45 +00:00
khorben
ac00d90699 Imported py27-cybox-2.1.0.4 2014-05-17 16:00:24 +00:00
khorben
cdf7d31518 Import py27-cybox-2.1.0.4 as security/py-cybox (from wip)
A python library for parsing, manipulating, and generating CybOX content.

A primary goal of the python-cybox library is to remain faithful to both the
CybOX standard and to customary Python practices. There are places where these
will conflict, and the goal is to make the library intuitive both to those
familiar with the XML schemas (but less familiar with Python) and also to
experienced Python developers who want to add CybOX support to their programs.
2014-05-17 15:59:10 +00:00
ryoon
da42d81cab Fix build under OpenBSD 5.5
* OpenBSD's vis.h requires stdlib.h
* OpenBSD has SO_PEERCRED, but it is different from Linux's one
* __weak_alias is not for OpenBSD's gcc 4.2.1
* OpenBSD 5.5 has not VIS_HTTPSTYLE.
* Fix PLIST for OpenBSD
2014-05-16 12:49:42 +00:00
adam
28bb94d01f Revbump after updating graphics/giflib 2014-05-15 14:41:45 +00:00
wiz
dd9153b6b9 Update to 1.985:
1.985 2014/05/15
- make OCSP callback return 1 even if it was called on the server side
  because of bad setup of the socket. Otherwise we get an endless calling
  of the OCSP callback.
- consider an OCSP response which is not yet or no longer valid a soft error
  instead of an hard error
- fix skip in t/external/ocsp.t in case fingerprint does not match
- RT#95633 call EVP_PKEY_free not EVP_KEY_free in
  IO::Socket::SSL::Utils::KEY_free. Thanks to paul[AT]city-fan[DOT]org
- util/analyze.pl - with --show-chain check if chain with SNI is different
  from chain w/o SNI.
1.984 2014/05/10
- added OCSP support:
  - needs Net::SSLeay >=1.59
  - for usage see documentation of IO::Socket::SSL (examples and anything with
    OCSP in the name)
- new tool util/analyze-ssl.pl which is intended to help in debugging of SSL
  problems and to get information about capabilities of server. Works also
  as en example of how to use various features (like OCSP, SNI..)
- fix peer_certificates (returns leaf certificate only once on client side)
- added timeout for stop_SSL (either with Timeout or with the default
  timeout for IO::Socket)
- fix IO::Socket::SSL::Utils mapping between ASN1_TIME and time_t when local
  time is not GMT. Use Net::SSLeay::ASN1_TIME_timet if available.
- fix t/external/usable_ca.t for system with junk in CA files
1.983 2014/05/03
- fix public suffix handling: ajax.googleapis.com should be ok even if googleapis.com
  is in public suffix list (e.g. check one level less)
  #95317, thanks to purification[AT]ukr[DOT]net
- usable_ca.t - update fingerprints after heartbleed attack
- usable_ca.t - make sure we have usable CA for tested hosts in CA store
1.982 2014/04/24
- fix for using subroutine as argument to set_args_filter_hack
1.981 2014/04/08
- #95432 fix ecdhe Test for openssl1.0.1d, thanks to  paul[AT]city-fan[DOT]org
- fix detection of openssl1.0.1d (detected 1.0.1e instead)
- new function can_ecdh in IO::Socket::SSL
1.980 2014/04/08
- fixed incorrect calculation of certificate fingerprint in get_fingerprint*
  and comparison in SSL_fingerprint. Thanks to
  david[DT]palmer[AT]gradwell[DOT]com for reporting.
- disable elliptic curve support for openssl 1.0.1d on 64bit because of
  openssl rt#2975
1.979 2014/04/06
- hostname checking:
  - configuration of 'leftmost' is renamed to 'full_label', but the old
    version is kept for compatibility reasons.
  - documentation of predefined schemes fixed to match reality
1.978 2014/04/04
- RT#94424 again, fix test on older openssl version with no SNI support
1.977 2014/04/04
- fix publicsuffix for IDNA, more tests with various IDNA libs
  RT#94424. Thanks to paul[AT]city-fan[DOT]org
- reuse result of IDN lib detection from PublicSuffix.pm in SSL.pm
- add more checks to external/usable_ca.t. Now it is enough that at least
  one of the hosts verifies against the builtin CA store
- add openssl and Net::SSleay version to diagnostics in load test
1.976 2014/04/03
- added public prefix checking to verification of wildcard certificates,
  e.g. accept *.foo.com but not *.co.uk.
  See documentation of SSL_verifycn_publicsuffix and
  IO::Socket::SSL::PublicSuffix
  Thanks to noloader for pointing out the problem.
1.975 2014/04/02
- BEHAVIOR CHANGE: work around TEA misfeature on OS X builtin openssl, e.g.
  guarantee that only the explicitly given CA or the openssl default CA will
  be used. This means that certificates inside the OS X keyring will no
  longer be used, because there is no way to control the use by openssl
  (e.g. certificate pinning etc)
- make external tests run by default to make sure default CA works on all
  platforms, it skips automatically on network problems like timeouts or ssl
  interception, can also use http(s)_proxy environment variables
1.974 2014/04/02
- new function peer_certificates to get the whole certificate chain, needs
  Net::SSLeay>=1.58
- extended IO::Socket::Utils::CERT_asHash to provide way more information,
  like issuer information, cert and pubkey digests, all extensions, CRL
  distributions points and OCSP uri
1.973 2014/03/25
- with SSL_ca certificate handles can now be used additionally to
  SSL_ca_file and SSL_ca_path
- do not complain longer if SSL_ca_file and SSL_ca_path are both given,
  instead add both as options to the CA store
- Shortcut 'issuer' to give both issuer_cert and issuer_key in CERT_create.
1.972 2014/03/23
- make sure t/external/usable_ca.t works also with older openssl without
  support for SNI. RT#94117. Thanks to paul[AT]city-fan[DOT]org
1.971 2014/03/22
- try to use SSL_hostname for hostname verification if no SSL_verifycn_name
  is given. This way hostname for SNI and verification can be specified in
  one step.
- new test program example/simulate_proxy.pl
1.970 2014/03/19
- fix rt#93987 by making sure sub default_ca does use a local $_ and not a
  version of an outer scope which might be read-only.  Thanks to gshank
1.969 2014/03/13
- fix set_defaults to match documentation regarding short names
- new function set_args_filter_hack to make it possible to override bad SSL
  settings from other code at the last moment.
- determine default_ca on module load (and not on first use in each thread)
- don't try default hostname verification if verify_mode 0
- fix hostname verification when reusing context
1.968 2014/03/13
- BEHAVIOR CHANGE: removed implicit defaults of certs/server-{cert,key}.pem
  for SSL_{cert,key}_file and ca/,certs/my-ca.pem for SSL_ca_file.
  These defaults were depreceated since 1.951 (2013/7/3).
- Usable CA verification path on Windows etc:
  Do not use Net::SSLeay::CTX_set_default_verify_paths any longer to set
  system/build dependended default verification path, because there was no
  way to retrieve these default values and check if they contained usable
  CA. Instead re-implement the same algorithm and export the results with
  public function default_ca() and make it possible to overwrite it.
  Also check for usable verification path during build.
  If no usable path are detected require Mozilla::CA at build and try to
  use it at runtime.
2014-05-15 10:01:43 +00:00
wiz
c9f1929379 Update to 1.61 and set LICENSE.
1.61 2014-05-12
     Changes calloc to Newx and free to Safefree, otherwise there might be
     problems because calloc is done from a different memory pool than free (depends
     on the build options for perl, but seen on Windows). Patch from Steffen
     Ullrich. Thanks.

1.60 2014-05-10
     Fixed a typo in an error message. Patch from gregor herrmann. Thanks.
     Fixed a problem with building with openssl that does not support
     OCSP. Also fixed some newly introduced warnings
     if compiled with -Wall. Patch from Steffen Ullrich. Thanks.
     fix build-failure on most Debian architectures:
     SSLeay.xs: In function 'XS_Net__SSLeay_OCSP_response_results':
     SSLeay.xs:5602:3: error: format not a string literal and no format
     arguments. Patch from  gregor herrmann.

1.59 2014-05-10
     Fixed local/30_error.t, so that tests do not fail if diagnostics are
     enabled.
     Fixed error messages about undefined strings used with length or
     split. Reported and patched by Peter Heuchert.
     Improvements to configuration of OPTIMIZE flags, to prevent overriding
     of perls expected optimization flags. Caution: HPUX aCC optimize options are special.
     SSL_peek() now returns openssl error code as second item when called in
     array context, same as SSL_read. Patch from Andreas Mohr.
     Fixed some warnings.
     Added support for tlsv1.1 tlsv1.2 via $Net::SSLeay::ssl_version. Patch
     from Andreas Mohr.
     Improve examples in 'Using other perl modules based on
     Net::SSLeay'. Patched by Andreas Mohr.
     Added support for OCSP. Patched by Steffen Ullrich. Thanks!
     Added missing t/external/ocsp.t
2014-05-15 10:00:17 +00:00
wiz
cb806de263 Set LICENSE. 2014-05-15 09:59:32 +00:00
jperkin
9b95ea4753 Use PKG_SYSCONFDIR. 2014-05-14 14:00:42 +00:00
wiedi
149f0aa9b8 Add SMF manifest 2014-05-14 13:53:53 +00:00
joerg
61a3a8ab97 Correctly build as Python Egg. 2014-05-13 17:08:44 +00:00
rodent
4ff3edbefc Fix build on OpenBSD/sparc64. Defuzz patches (sorry if this is annoying). 2014-05-13 02:23:11 +00:00
wiz
c1b44346cd Mark packages that are not ready for python-3.3 also not ready for 3.4,
until proven otherwise.
2014-05-09 07:36:53 +00:00
jperkin
dadce68110 Update to clamav-0.98.3. Changes:
- Support for common raw disk image formats using 512 byte sectors,
   specifically GPT, APM, and MBR partitioning.

 - Experimental support of OpenIOC files. ClamAV will now extract file
   hashes from OpenIOC files residing in the signature database location,
   and generate ClamAV hash signatures. ClamAV uses no other OpenIOC
   features at this time. No OpenIOC files will be delivered through
   freshclam. See openioc.org and iocbucket.com for additional information
   about OpenIOC.

 - All ClamAV sockets (clamd, freshclam, clamav-milter, clamdscan, clamdtop)
   now support IPV6 addresses and configuration parameters.

 - Use OpenSSL file hash functions for improved performance. OpenSSL
   is now prerequisite software for ClamAV 0.98.3.

 - Improved detection of malware scripts within image files. Issue reported
   by Maarten Broekman.

 - Change to circumvent possible denial of service when processing icons within
   specially crafted PE files. Icon limits are now in place with corresponding
   clamd and clamscan configuration parameters. This issue was reported by
   Joxean Koret.

 - Improvements to the fidelity of the ClamAV pattern matcher, an issue
   reported by Christian Blichmann.

 - Opt-in collection of statistics. Statistics collected are: sizes and MD5
   hashes of files, PE file section counts and section MD5 hashes, and names
   and counts of detected viruses. Enable statistics collection with the
  --enable-stats clamscan flag or StatsEnabled clamd configuration
   parameter.

 - Improvements to ClamAV build process, unit tests, and platform support with
   assistance and suggestions by Sebastian Andrzej Siewior, Scott Kitterman,
   and Dave Simonson.

 - Patch by Arkadiusz Miskiewicz to improve error handling in freshclam.

 - ClamAV 0.98.3 also includes miscellaneous bug fixes and documentation
   improvements.
2014-05-08 16:01:09 +00:00
imil
63ca187992 add & enable py-requests-oauthlib 2014-05-08 15:27:10 +00:00
imil
d0dd56ea2f Initial import of py-requests-oauthlib, version 0.4.0, into the NetBSD Packages
Collection.

This project provides first-class OAuth library support for Python Requests.
2014-05-08 15:25:54 +00:00
imil
e94841a444 add & enable py-oauthlib 2014-05-08 15:22:51 +00:00
imil
05accc3cfa Initial import of py-oauthlib, version 0.6.1, into the NetBSD Packages
Collection.

OAuth often seems complicated and difficult-to-implement. There are several
prominent libraries for handling OAuth requests, but they all suffer from one
or both of the following:

  *  They predate the OAuth 1.0 spec, AKA RFC 5849.
  *  They predate the OAuth 2.0 spec, AKA RFC 6749.
  *  They assume the usage of a specific HTTP request library.

OAuthLib is a generic utility which implements the logic of OAuth without
assuming a specific HTTP request object or web framework. Use it to graft OAuth
client support onto your favorite HTTP library, or provider support onto your
favourite web framework. If you're a maintainer of such a library, write a thin
veneer on top of OAuthLib and get OAuth support for very little effort.
2014-05-08 15:18:10 +00:00
jperkin
1388b301ea Pull in libxml2 for additional functionality, from Matthias Ferdinand. 2014-05-08 10:19:53 +00:00
fhajny
090a640fd3 Fix the pkg-config file provided (exec_prefix was undefined).
Bump PKGREVISION.
2014-05-07 15:41:08 +00:00
jperkin
cc9493b4ab Fix rc.d handling. 2014-05-06 15:07:40 +00:00
wiz
fdb6618b04 Update to 0.4:
0.4 - 2014-05-03
~~~~~~~~~~~~~~~~

* Deprecated ``salt_length`` on
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.MGF1` and added it
  to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. It will be
  removed from ``MGF1`` in two releases per our :doc:`/api-stability` policy.
* Added :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED` support.
* Added :class:`~cryptography.hazmat.primitives.cmac.CMAC`.
* Added decryption support to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  and encryption support to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`.
* Added signature support to
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`
  and verification support to
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`.

0.3 - 2014-03-27
~~~~~~~~~~~~~~~~

* Added :class:`~cryptography.hazmat.primitives.twofactor.hotp.HOTP`.
* Added :class:`~cryptography.hazmat.primitives.twofactor.totp.TOTP`.
* Added :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA` support.
* Added signature support to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  and verification support to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`.
* Moved test vectors to the new ``cryptography_vectors`` package.
2014-05-06 10:30:54 +00:00
dsainty
b804d6ae0e SUBDIR+=p5-Crypt-Blowfish_PP 2014-05-06 05:23:08 +00:00
dsainty
01f96f7326 This is Crypt::Blowfish_PP, a Perl implementation of the Blowfish
cryptography algorithm designed by Bruce Schneier.
2014-05-06 05:21:38 +00:00
rodent
c6f75543cb Buildlink libiconv using build dependency method for OpenBSD. The courier-
{authlib,maildir} packages won't build otherwise (at least with
PREFER_PKGSRC=yes).
2014-05-06 03:45:36 +00:00
ryoon
60806aa001 Recursive revbump from x11/pixman
Fix PR pkg/48777
2014-05-05 00:47:34 +00:00
ryoon
ec0d38b90b Fix build under OpenBSD 5.5
* OpenBSD 5.5 has no _PASSWORD_WARNDAYS definition in its header files
  Declare _PASSWORD_WARNDAYS as 14 if _PASSWORD_WARNDAYS is not defined.
  Move the definition above its use.
2014-05-04 09:30:26 +00:00
adam
0edd5428de Changes 3.5:
- Correctly handle decoding of recursive CHOICE options.
- Allow deleting elements of SET OF.
- Several small bug fixes found by coverity.
- Code improvements
2014-05-03 19:40:22 +00:00
alnsn
aedfc77e1e Revbump for Lua multiversion support. 2014-05-03 13:14:36 +00:00
alnsn
fb7c78e46e Adapt to Lua multiversion support. 2014-05-03 13:01:24 +00:00
rodent
aaf97c5cf1 +py-bcrypt 2014-05-03 02:27:57 +00:00
rodent
b4b0301b27 Import py27-bcrypt-1.0.2 as security/py-bcrypt.
Modern password hashing for your software and your servers.
2014-05-03 02:27:10 +00:00
ryoon
7ab85098ff Update to 5.01
Changelog:
Version 5.01, unreleased, urgency: HIGH:
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1g.
    This version mitigates TLS heartbeat read overrun (CVE-2014-0160).
* New features
  - X.509 extensions added to the created self-signed stunnel.pem.
  - "FIPS = no" also allowed in non-FIPS builds of stunnel.
  - Search all certificates with the same subject name for a matching
    public key rather than only the first one (thx to Leon Winter).
  - Create logs in the local application data folder if stunnel folder
    is not writable on Win32.
* Bugfixes
  - close_notify not sent when SSL still has some data buffered.
  - Protocol negotiation with server-side SNI fixed.
  - A Mac OS X missing symbols fixed.
  - Win32 configuration file reload crash fixed.
  - Added s_pool_free() on exec+connect service retires.
  - Line-buffering enforced on stderr output.
2014-04-29 13:47:45 +00:00
obache
88baaa4e71 Remove BUILTIN_PKG.openssl masquerade for NetBSD.
We need buitin version to check suficient API, not for security fix.
2014-04-27 01:57:51 +00:00
asau
1cf44cb41c Band-aid packaging fix for Linux. From Jason Bacon through WIP. 2014-04-25 10:20:06 +00:00
wiz
3b5c8cda46 Update to 1.13:
Noteworthy changes in version 1.13 (2014-04-15)
-----------------------------------------------

 * Added a portable mutex API.

 * The AM_PATH_GPG_ERROR macro now defines GPG_ERROR_MT_CFLAGS and
   GPG_ERROR_MT_LIBS autoconf output variables for use by programs
   which need gpgrt based thread support.  gpg-error-config has a new
   option --mt.

 * Interface changes relative to the 1.12 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 GPG_ERR_KEY_ON_CARD          NEW.
 GPG_ERR_MAC_ALGO             NEW.
 GPG_ERR_INV_LOCK_OBJ         NEW.
 gpgrt_lock_t                 NEW.
 GPGRT_LOCK_INITIALIZER       NEW.
 GPGRT_LOCK_DEFINE            NEW.
 gpgrt_lock_init              NEW.
 gpgrt_lock_lock              NEW.
 gpgrt_lock_unlock            NEW.
 gpgrt_lock_destroy           NEW.
 gpgrt_yield                  NEW.
2014-04-25 08:33:57 +00:00
wiz
53295fa980 + PortableSigner 2014-04-23 11:28:33 +00:00
wiz
67ecc5031b Import PortableSigner-2.0.38c0573 as security/PortableSigner.
PortableSigner is a signing (with X.509 certificates) program for
PDF files. It's platform independent and runs (tested) under
Windows (2000, XP, ...), Linux and Mac OS X.

It's possible to sign PDF documents digital with X.509 certificates.
This signed documents are read only. Therefore it's possible to
implement "electronic paper".
2014-04-23 11:27:58 +00:00