Commit graph

11558 commits

Author SHA1 Message Date
dsainty
19d1830bc0 To fix Linux readv/writev, back-port:
417421b1d8 (diff-484f666f58ec13f38fa402143f2f6ad8e63a013909d3941ffbb3d66745b20c8d)

This is also needed by the Pkgsrc WIP version.

Bump PKGREVISION - though this change is unlikely to alter the outcome of
previously successful builds.
2022-01-12 11:53:26 +00:00
schmonz
d41dbd8493 Apply upstream c023d98dcf2ba1cc30f545ae54d0e037e80a8794:
Darwin platform allows to build on releases before Yosemite/ios 8.
Fixes build on Snow Leopard. Still builds on Monterey.
2022-01-11 13:54:01 +00:00
schmonz
7245e204a8 Omit "-MT $@" from generated make rules, as it breaks SunPro builds and
"-o $@" is already sufficient.

Also for SunPro, set OPENSSL_HOST.SunOS-x86_64=solaris64-x86_64-cc
(that's cc, not gcc) to avoid this error linking libcrypto.so:

    cc: Warning: Option --libgcc passed to ld, if ld is invoked,
    ignored otherwise
    cc: No valid input files specified, no output generated

"make package" succeeds on:

- Solaris 11 with "Studio 12.6 Sun C 5.15"
- Tribblix m25.1 with pkgsrc gcc7
- CentOS 7 with pkgsrc gcc7
- FreeBSD 13 with system clang
- OpenBSD 7.0 with system clang
- NetBSD 9.2 and -current with system gcc
- CentOS 8 with system gcc
- Debian 11, 10, 9 with system gcc
- Devuan 4 with system gcc
- Ubuntu 21, 18, 16, 14 with system gcc
- Void with system gcc
- Gentoo with system gcc
2022-01-11 11:10:39 +00:00
adam
7b60c388ad py-gnupg: updated to 0.4.8
Switch to python-gnupg.

This module allows easy access to GnuPG’s key management, encryption and signature functionality from Python programs. It is intended for use with Python 2.4 or greater.
2022-01-11 08:45:10 +00:00
wiz
59a27a2707 py-simplesha3: convert to egg.mk 2022-01-10 22:02:43 +00:00
wiz
f2d064824a py-mcrypt: convert to egg.mk 2022-01-10 21:58:20 +00:00
wiz
353c9928dc py-crack: fix for python 2.7 2022-01-10 21:29:45 +00:00
wiz
2eeda3ff2a py-pydeep: convert to egg.mk 2022-01-10 20:42:38 +00:00
wiz
4b5b308a7f py-crcmod: fix for python 2.7 2022-01-10 20:30:55 +00:00
wiz
75743e4887 py-backports.ssl_match_hostname: convert to egg.mk 2022-01-10 20:27:16 +00:00
wiz
9a08783f9b py-aes: fix for python 2.7 2022-01-10 20:25:12 +00:00
wiz
652d06e378 py-tlslite: convert to egg.mk 2022-01-10 19:42:15 +00:00
wiz
3297b67eeb py-cryptkit: convert to egg.mk 2022-01-10 18:27:55 +00:00
adam
f62f2e5046 pcsc-lite: updated to 1.9.5
1.9.5: Ludovic Rousseau
4 December 2021
- pcscd: autoexit even if no client connects
- Fix variable substitution in systemd units
- fix potential race conditions with powerState handling
- Add and use tag TAG_IFD_DEVICE_REMOVED
- UnitaryTests: port code to Python 3

1.9.4: Ludovic Rousseau
1 October 2021
- fix a memory leak when libusb is used for hotplug (i.e. non-Linux
  systems)

1.9.3: Ludovic Rousseau
6 August 2021
- fix a stupid regression with systemd introduced in the previous version


1.9.2: Ludovic Rousseau
3 August 2021
- improve NetBSD support
- pcsc-spy: version 1.1
  . add option -t|--thread
  . x10 speed increase
  . correctly exit at end-of-file
  . remove, now useless, support of macOS
- systemd:
  . use /etc/default/pcscd as EnvironmentFile
  . use $PCSCD_ARGS to specify more arguments
- SetProtocol: Handle IFD_NOT_SUPPORTED from the driver
- hotplug_libudev.c: sanitize interface name
- pcsc_demo: change licence from GPLv3 to BSD
- use Python 3 for Python scripts (psc-spy, UnitaryTests)
- Some other minor improvements
2022-01-10 16:11:52 +00:00
taca
e509c166cf security/php-gnupg: update to 1.5.1
1.5.1 (2021-12-31)

* Fixed compilation with PHP 8.1
* Fixed build with gpgme 1.4
2022-01-10 14:16:40 +00:00
wiz
1a061fc689 py-gnupg: convert to egg.mk 2022-01-10 09:11:20 +00:00
wiz
766e8994a0 py-crcmod: convert to egg.mk 2022-01-10 09:00:02 +00:00
wiz
275ae65a96 py-crack: convert to egg.mk 2022-01-10 08:59:05 +00:00
wiz
eb6c4d32e3 py-aes: convert to egg.mk 2022-01-10 08:48:30 +00:00
wiz
0fbe107d2d pius: convert to egg.mk 2022-01-10 08:31:01 +00:00
wiz
d654101479 fail2ban: convert to egg.mk 2022-01-10 08:14:30 +00:00
khorben
c1424b6b85 Add hashcat 2022-01-10 02:30:41 +00:00
khorben
0a3899ee30 hashcat: import version 6.2.5
hashcat is the world's fastest and most advanced password recovery
utility, supporting five unique modes of attack for over 160
highly-optimized hashing algorithms. hashcat currently supports
CPU's, GPU's other hardware-accelerators on Linux, Windows and OSX,
and has facilities to help enable distributed password cracking.

From pkgsrc-wip, original packaging by adam@; thanks!
2022-01-10 02:30:23 +00:00
ryoon
45fb4e2594 *: Recursive revbump from boost 1.78.0 2022-01-10 01:46:21 +00:00
dsainty
89407139e6 The need for php-mysql seems to have vanished a long time ago. This package
is quite happy to use php-mysqlnd, which in turn is a built-in component
of all versions of PHP in Pkgsrc.

Drop the dependency, and therefore expand the PHP_VERSIONS_ACCEPTED
constraint.

ZoneMinder 1.29.0 seems to work fine on at least PHP 5.6 and 7.4.

Under PHP 8.0 it is logging at Error level type errors out of skin.js.

Under PHP 8.1 it is logging at Panic level that strftime is deprecated.

Bump PKGREVISION.
2022-01-09 23:59:35 +00:00
tnn
4c00f1860d Fix packages that use GITSUB_MODULES on SunOS and possibly others
This is annoying, but for now we must always explicitly combine
GITHUB_SUBMODULES with EXTRACT_USING+=bsdtar.

This is because mk/fetch/github.mk uses OPTS_TAR=--strip-components=1
and that is not supported by nbtar(pax), which is the default pkgsrc
tar on some platforms. We cannot override EXTRACT_USING in github.mk
because that is too late.

We should switch all platforms to bsdtar and retire pax.
2022-01-09 23:42:02 +00:00
bsiegert
69b9f4cba9 Revbump all Go packages after go117 update 2022-01-09 20:10:29 +00:00
adam
92932f8fba py-signedjson: updated to 1.1.1
Signedjson 1.1.1

Bugfixes
- Fix incorrect typing annotation for `decode_signing_key_base64`.
- Reinstate `decode_verify_key_base64` function which was erroneously removed in 1.1.0.

Internal Changes
- Use `setuptools_scm` for the version number.
2022-01-08 16:14:31 +00:00
fox
9de52ac3ba security/wolfssl: Update to v5.1.1
Changes since v5.1.0:

wolfSSL Release 5.1.1 (Jan 3rd, 2022)

Release 5.1.1 of wolfSSL embedded TLS has a high vulnerability fix:
Vulnerabilities

  * [High] In connections using AES-CBC or DES3 with TLS/DTLS 1.2 or 1.1 the IV
    being used is not random. Users using wolfSSL version 5.0.0 or 5.1.0 doing
    TLS/DTLS 1.2 or 1.1 connections, without AEAD only, should update the
    version of wolfSSL used.
2022-01-08 09:48:16 +00:00
wiz
414fbfcf6b *: set USE_PKG_RESOURCES for more packages 2022-01-05 20:47:34 +00:00
wiz
67e1f1a6bf python: egg.mk: add USE_PKG_RESOURCES flag
This flag should be set for packages that import pkg_resources
and thus need setuptools after the build step.

Set this flag for packages that need it and bump PKGREVISION.
2022-01-05 15:40:56 +00:00
schmonz
dcb28e724f Borrow build and runtime fixes from Debian. Fixes aarch64 build on
macOS, and perhaps others. Bump PKGREVISION.
2022-01-05 13:51:19 +00:00
schmonz
23e230852c Fix build on BSDs and Solarish. 2022-01-04 22:10:37 +00:00
schmonz
a0bbfefa4e Add and enable tlswrapper. 2022-01-04 21:39:48 +00:00
schmonz
b36f85c9cc Add tlswrapper, an UCSPI/inetd-style TLS encryption wrapper.
tlswrapper is an TLS encryption wrapper between remote client and local
program prog. Systemd.socket/inetd/tcpserver/... creates the server
connection, tlswrapper encrypts/decrypts data stream and reads/writes
data from/to the program prog as follows:

Internet <--> systemd.socket/inetd/tcpserver/... <--> tlswrapper <--> prog

By running separate instance of tlswrapper for each TLS connection, a
vulnerability in the code (e.g. bug in the TLS library) can't be used to
compromise the memory of another connection.

To protect against secret-information leaks to the network connection
(such Heartbleed) tlswrapper runs two independent processes for every
TLS connection. One process holds secret-keys and runs secret-keys
operations and second talks to the network. Processes communicate with
each other through UNIX pipes.
2022-01-04 21:39:03 +00:00
wiz
bb579283d0 *: bump PKGREVISION for egg.mk users
They now have a tool dependency on py-setuptools instead of a DEPENDS
2022-01-04 20:53:26 +00:00
schmonz
e222964b51 Fix building the curvecp programs on at least FreeBSD and macOS. Install
them. Bump PKGREVISION.
2022-01-04 20:53:20 +00:00
wiz
87d9cea17b py-yubikey-manager: disallow python 2.7 due to py-usb (update incoming) 2022-01-04 19:31:41 +00:00
wiz
c023fa8d8f gnutls: add lzo option
Based on PR 56601 by Vladimir Stupin.
2022-01-03 12:36:53 +00:00
rhialto
5879392fe4 security/pam-af: fix for PIE build
Use "ld -shared" rather than "ld --shared". The former allows cwrappers to
detect shared lib link mode. This makes it omit "-pie" which would remove
required symbols.
2022-01-01 12:59:15 +00:00
dsainty
00c4fdd909 The web interface PHP uses the PHP sockets extension, at least from
share/zoneminder/htdocs/ajax/stream.php.

Because all the PHP extensions self-enable in this decade, there's no need
to configure php-sockets.  The same is also true of all the other
extensions, so just remove those unnecessary instructions from MESSAGE.

Bump PKGREVISION to 7 and bump year to 2022 (NZDT).
2021-12-31 12:07:55 +00:00
adam
0a9c3a7fb7 py-dataclasses: removed; was Python 3.6 onlu 2021-12-30 12:12:53 +00:00
fox
6318754b44 security/wolfssl: Update to v5.1.0
Changes since v5.0.0:

wolfSSL Release 5.1.0 (Dec 27, 2021)

Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
Vulnerabilities

  * [Low] Potential for DoS attack on a wolfSSL client due to processing hello
    packets of the incorrect side. This affects only connections using TLS v1.2
    or less that have also been compromised by a man in the middle
    attack. Thanks to James Henderson, Mathy Vanhoef, Chris M. Stone, Sam
    L. Thomas, Nicolas Bailleut, and Tom Chothia (University of Birmingham, KU
    Leuven, ENS Rennes for the report.
  * [Low] Client side session resumption issue once the session resumption cache
    has been filled up. The hijacking of a session resumption has been
    demonstrated so far with only non verified peer connections. That is where
    the client is not verifying the server’s CA that it is connecting to. There
    is the potential though for other cases involving proxies that are verifying
    the server to be at risk, if using wolfSSL in a case involving proxies use
    wolfSSL_get1_session and then wolfSSL_SESSION_free when done where
    possible. If not adding in the session get/free function calls we recommend
    that users of wolfSSL that are resuming sessions update to the latest
    version (wolfSSL version 5.1.0 or later). Thanks to the UK's National Cyber
    Security Centre (NCSC) for the report.

New Feature Additions
Ports

  * Curve25519 support with NXP SE050 added
  * Renesas RA6M4 support with SCE Protected Mode and FSP 3.5.0
  * Renesas TSIP 1.14 support for RX65N/RX72N

Post Quantum

  * Post quantum resistant algorithms used with Apache port
  * NIST round 3 FALCON Signature Scheme support added to TLS 1.3 connections
  * FALCON added to the benchmarking application
  * Testing of cURL with wolfSSL post quantum resistant build

Compatibility Layer Additions

  * Updated NGINX port to NGINX version 1.21.4
  * Updated Apache port to Apache version 2.4.51
  * Add support for SSL_OP_NO_TLSv1_2 flag with wolfSSL_CTX_set_options function
  * Support added for the functions
      - SSL_CTX_get_max_early_data
      - SSL_CTX_set_max_early_data
      - SSL_set_max_early_data
      - SSL_get_max_early_data
      - SSL_CTX_clear_mode
      - SSL_CONF_cmd_value_type
      - SSL_read_early_data
      - SSL_write_early_data

Misc.

  * Crypto callback support for AES-CCM added. A callback function can be
    registered and used instead of the default AES-CCM implementation in
    wolfSSL.
  * Added AES-OFB to the FIPS boundary for future FIPS validations.
  * Add support for custom OIDs used with CSR (certificate signing request)
    generation using the macro WOLFSSL_CUSTOM_OID
  * Added HKDF extract callback function for use with TLS 1.3
  * Add variant from RFC6979 of deterministic ECC signing that can be enabled
    using the macro WOLFSSL_ECDSA_DETERMINISTIC_K_VARIANT
  * Added the function wc_GetPubKeyDerFromCert to get the public key from a
    DecodedCert structure
  * Added the functions wc_InitDecodedCert, wc_ParseCert and wc_FreeDecodedCert
    for access to decoding a certificate into a DecodedCert structure
  * Added the macro WOLFSSL_ECC_NO_SMALL_STACK for hybrid builds where the
    numerous malloc/free with ECC is undesired but small stack use is desired
    throughout the rest of the library
  * Added the function wc_d2i_PKCS12_fp for reading a PKCS12 file and parsing it

Fixes
PORT Fixes

  * Building with Android wpa_supplicant and KeyStore
  * Setting initial value of CA certificate with TSIP enabled
  * Cryptocell ECC build fix and fix with RSA disabled
  * IoT-SAFE improvement for Key/File slot ID size, fix for C++ compile, and
    fixes for retrieving the public key after key generation

Math Library Fixes

  * Check return values on TFM library montgomery function in case the system
    runs out of memory. This resolves an edge case of invalid ECC signatures
    being created.
  * SP math library sanity check on size of values passed to sp_gcd.
  * SP math library sanity check on exponentiation by 0 with mod_exp
  * Update base ECC mp_sqrtmod_prime function to handle an edge case of zero
  * TFM math library with Intel MULX multiply fix for carry in assembly code

Misc.

  * Fix for potential heap buffer overflow with compatibility layer PEM parsing
  * Fix for edge memory leak case with an error encountered during TLS
    resumption
  * Fix for length on inner sequence created with wc_DhKeyToDer when handling
    small DH keys
  * Fix for sanity check on input argument to DSA sign and verify
  * Fix for setting of the return value with ASN1 integer get on an i386 device
  * Fix for BER to DER size checks with PKCS7 decryption
  * Fix for memory leak with PrintPubKeyEC function in compatibility layer
  * Edge case with deterministic ECC key generation when the private key has
    leading 0’s
  * Fix for build with OPENSSL_EXTRA and NO_WOLFSSL_STUB both defined
  * Use page aligned memory with ECDSA signing and KCAPI
  * Skip expired sessions for TLS 1.3 rather than turning off the resume
    behavior
  * Fix for DTLS handling dropped or retransmitted messages

Improvements/Optimizations
Build Options and Warnings

  * Bugfix: could not build with liboqs and without DH enabled
  * Build with macro NO_ECC_KEY_EXPORT fixed
  * Fix for building with the macro HAVE_ENCRYPT_THEN_MAC when session export is
    enabled
  * Building with wolfSentry and HAVE_EX_DATA macro set

Math Libraries

  * Improvement for performance with SP C implementation of montgomery reduction
    for ECC (P256 and P384) and SP ARM64 implementation for ECC (P384)
  * With SP math handle case of dividing by length of dividend
  * SP math improvement for lo/hi register names to be used with older GCC
    compilers

Misc.

  * ASN name constraints checking code refactor for better efficiency and
    readability
  * Refactor of compatibility layer stack free’ing calls to simplify and reduce
    code
  * Scrubbed code for trailing spaces, hard tabs, and any control characters
  * Explicit check that leaf certificate's public key type match cipher suite
    signature algorithm
  * Additional NULL sanity checks on WOLFSSL struct internally and improve
    switch statement fallthrough
  * Retain OCSP error value when CRL is enabled with certificate parsing
  * Update to NATIVE LwIP support for TCP use
  * Sanity check on PEM size when parsing a PEM with OpenSSL compatibility layer
    API.
  * SWIG wrapper was removed from the codebase in favor of dedicated Java and
    Python wrappers.
  * Updates to bundled example client for when to load the CA, handling print
    out of IP alt names, and printing out the peers certificate in PEM format
  * Handling BER encoded inner content type with PKCS7 verify
  * Checking for SOCKET_EPIPE errors from low level socket
  * Improvements to cleanup in the case that wolfSSL_Init fails
  * Update test and example certificates expiration dates
2021-12-30 01:19:03 +00:00
gutteridge
14cc5633f6 gnutls: fix builds on Solaris 10
Addresses PR pkg/56500 from Claes Nästén.
2021-12-26 23:03:54 +00:00
wiz
268375865d fail2ban: fix build with latest setuptools.
Fixes PR 56572 by nia@

Fix pkglint while here.
2021-12-23 22:27:35 +00:00
mef
b097f67763 (*/py-trytond-*) regen distinfo and PLIST, I'll adjust other fallout later 2021-12-22 22:54:44 +00:00
gdt
ff06f2fadc cyrus-sasl: Extend DESCR to mention plugins 2021-12-20 19:41:45 +00:00
taca
1bef8d1d8a security/ruby-chef-vault: update to 4.1.5
4.1.5 (2021-12-16)

Merged Pull Requests

* Fix for chef-vault command was not returning any results #383
  (snehaldwivedi)
2021-12-19 06:41:31 +00:00
schmonz
b726309f0a Update to 3.4.2. From the LibreSSL changelog:
* In some situations the X.509 verifier would discard an error on an
  unverified certificate chain, resulting in an authentication bypass.
  Thanks to Ilya Shipitsin and Timo Steinlein for reporting.
2021-12-18 13:55:18 +00:00
wiz
f198be0cf3 py-cyclonedx-*: mark as not for python 2.7 2021-12-17 10:18:23 +00:00