Commit graph

6478 commits

Author SHA1 Message Date
pettai
c4d660f807 Added otptool 2012-11-10 22:16:40 +00:00
pettai
e2b79459a5 Otptool is a client utility for two-factor authentication using one-time
passwords (OTP) generated via the HOTP/OATH algorithm defined in RFC 4226.
2012-11-10 22:13:47 +00:00
pettai
27662afe78 Version 1.8.2 (released 2012-10-17)
* Add udev rules files to packed distribution.

Version 1.8.1 (released 2012-10-17)

* Memory leak fixes and potential crash fixes in osx backend.
* Error reporting fixes in osx backend, reporting correct errors and
  better errors.
* Provide new another udev permissions file that works on udev version
  greater than 188. Autodetects from configure which to use.
* Add new binary ykinfo, can be used to get serial number, version and
  touch level from a YubiKey.

Version 1.8.0 (released 2012-09-28)

* Added ./configure --enable-gcc-warnings to enable a lot of warnings.
* Added Continuous integration at travis-ci
  (http://travis-ci.org/#!/Yubico/yubikey-personalization)
* Added yk_challenge_response() function for doing challenge response
  with a key.
* Fixed functions for NDEF writing, adding:
  ykp_ndef_alloc(), ykp_ndef_free() and ykp_set_ndef_access_code()
  also providing compatible name YK_NDEF in ykcore.h and exporting
  yk_write_ndef() there.
  Change return values from ndef_construct_*() functions to make them
  consistent with the rest of the library.
* Fixed a crash bug when the library was called from different threads.
* Check return code from libusb_init() so we avoid crashing there.
  Also use a usb context instead of relying on default.
* Fix numerous warnings.
* Fix compilation in MSVC2010.

Version 1.7.0 (released 2012-06-07)

* Add support for new features in YubiKey 2.3:
  ALLOW_UPDATE flag that allows updating of configuration in slots.
  Update command (-u) to do update of existing config.
  Swap command (-x) to swap contents of two updatable slots
  DORMANT flag that's settable/removable if ALLOW_UPDATE is set
  USE_NUMERIC_KEYPAD flag for sending the OATH OTP using keypad scan codes
  instead
  FAST_TRIG flag for faster triggering of slot one if slot two is empty
* Change the library around some to make the 2.3 features available.
  Use ykp_alloc() instead of ykp_create_config().
  Use ykp_configure_version() instead of ykp_configure_for() to set the version.
  Use ykp_configure_command() instead of ykp_configure_for() to set slot.
  Use yk_write_command() instead of yk_write_config().
  The new commands doesn't set any default configuration at all.
* Add library support for the YubiKey NEO beta
  ykp_construct_ndef_uri() for preparing a URI to write.
  ykp_construct_ndef_text() for preparing a text to write.
  yk_write_ndef() to write the constructed NDEF.
* Add support for the YubiKey NEO beta
  Writing NDEF URI with -n http://example.com/foo/
  Writing NDEF Text record with -t example
2012-11-10 20:53:43 +00:00
pettai
b2d6eba1b3 Version 2.9 (released 2012-08-07)
* Compability with curl versions before 7.20.
* Fix signature checking on ARM (at least).
2012-11-10 19:17:26 +00:00
pettai
e7955062af Version 1.12.6 (released 2012-09-04)
* liboath: The usersfile is now fflush'ed and fsync'ed.
* liboath: A memory leak fixed.
* oathtool: The --counter parameter now works on 32-bit platforms.
* API and ABI is backwards compatible with the previous version.
  OATH_FILE_FLUSH_ERROR: Added.
  OATH_FILE_SYNC_ERROR: Added.
  OATH_FILE_CLOSE_ERROR: Added.
  OATH_LAST_ERROR: Added.

Version 1.12.5 (released 2012-08-19)

* oathtool: The --counter parameter now supports larger values.
  Before it used an 'int' type and now it uses a 'longlong' type.
  Needed for eSecuTech tokens as they use a 64-bit value for their
  initial counter. see <https://savannah.nongnu.org/support/?108114>.
* Added gnulib self-tests.
* API and ABI is backwards compatible with the previous version.

Version 1.12.4 (released 2012-06-17)

* liboath: Usersfile code handles multiple lines for a single user.
  This can be used when a single user carries multiple tokens (with
  different OATH secrets) and any of them should be permitted.
* API and ABI is backwards compatible with the previous version.

Version 1.12.3 (released 2012-05-31)

* pam_oath: Fix "try_first_pass".
* API and ABI is backwards compatible with the previous version.

Version 1.12.2 (released 2012-04-04)

* liboath: usersfile function now works on FreeBSD.
* tests: liboath usersfile self-test is skipped if there is no datefudge.
* API and ABI is backwards compatible with the previous version.

Version 1.12.1 (released 2012-04-01)

* liboath, oathtool: Base32 decoding now permit lowercase characters.
* API and ABI is backwards compatible with the previous version.

Version 1.12.0 (released 2012-04-01)

* oathtool: Added --base32 parameter to decode base32 keys.
* oathtool: Verbose output (-v) now print key data in base32 format too.
* liboath: Added base32 functions.  Added hex encoding function.
  The new APIs are oath_bin2hex, oath_base32_decode, and
  oath_base32_encode.
* liboath: Gnulib's snprintf is used for better portability.
  The system snprintf is known to have bugs on some systems, see the
  Gnulib manual for more information.
* API and ABI is backwards compatible with the previous version.
  oath_bin2hex: New function.
  oath_base32_decode: New function.
  oath_base32_encode: New function.
  OATH_INVALID_BASE32: New error code.
  OATH_BASE32_OVERFLOW: New error code.
  OATH_MALLOC_ERROR: New error code.
2012-11-10 18:07:44 +00:00
pettai
d6a6f48e00 1.1.4
- Fix X-HKP-Results-Count so that limit=0 returns no results, but include
    the header, to let a client poll for how many results exist, without
    retrieving any. See:
    http://lists.nongnu.org/archive/html/sks-devel/2010-11/msg00015.html
  - Add UPGRADING document to explain upgrading Berkeley DB without
    rebuilding. System bdb versions often change with new SKS releases
    for .deb and .rpm distros.
  - Cleanup build errors for bdb/bdb_stubs.c. Patch from Mike Doty
  - Update cryptokit from version 1.0 to 1.5 without requiring OASIS
    build system or other additional dependencies
  - build, fastbuild, & pbuild fixed to ignore signals USR1 and USR2
  - common.ml and reconSC.ml were using different values for minumimum
    compatible version. This has been fixed.
  - Added new server mime-types, and trying another default document (Issue 6)
    In addition to the new MIME types added in 1.1.[23], the server now
    looks over a list and and serves the first index file that it finds
    Current list: index.html, index.htm, index.xhtml, index.xhtm, index.xml.
  - options=mr now works on get as well as (v)index operations. This is
    described in http://tools.ietf.org/html/draft-shaw-openpgp-hkp-00
    sections 3.2.1.1. and 5.1.
  - Updated copyright notices in source files
  - Added sksclient tool, similar to old pksclient
  - Add no-cache instructions to HTTP response (in order for reverse proxies
    not to cache the output from SKS)
  - Use unique timestamps for keydb to reduce occurrances of Ptree corruption.
  - Added Interface specifications (.mli files) for modules that were missing
    them
  - Yaron pruned some no longer needed source files from the tree.
  - Improved the HTTP status and HTTP error codes returned for various
    situations and added checks for more error conditions.
  - Add a suffix to version (+) indicating non-release or development builds
  - Add an option to specify the contact details of the server administrator
    that shows in the status page of the server. The information is in the
    form of an OpenPGP KeyID and set by server_contact: in sksconf
  - Add a `sks version` command to provide information on the setup.
  - Added configuration settings for the remaining database table files. If
    no pagesize settings are in sksconf, SKS will use 2048 bytes for key
    and 512 for ptree. The remainining files' pagesize will be set by BDB
    based on the filesystem settings, typically this is 4096 bytes.
    See sampleConfig/sksconf.typical for settings recommended by db_tuner.
  - Makefile: Added distclean target. Dropped autogenerated file from VCS.
  - Allow tuning BDB environment before creation in [fast]build and pbuild.
    If DB_CONFIG exists in basedir, copy it to DB dir before DB creation.
    Preference is given to DB_CONFIG.KDB and DB_CONFIG.PTree over DB_CONFIG.
  - Add support for Elliptic Curve Public keys (ECDSA, ECDH)
  - Add check if an upload is a revocation certificate, and if it is,
    produce an error message tailored for this.

1.1.3
  - Makefile fix for 'make dep' if .depend does not exist. Issue #4
  - Makefile fix: sks and sks_add_mail fail to link w/o '-ccopt -pg'
    Issue #23
  - Added -disable_mailsync and -disable_log_diffs to sks.pod
  - Added file extensions .css, .jpeg, .htm, .es, .js, .xml, .shtml, .xhtm,
    .xhtml and associated MIME types to server code. Part of Issue #6
  - Added sample configuration files in sampleConfig directory
  - Added sample web page files in sampleWeb directory. Issues #7, 9, 19
  - Allow requests for non-official options hget, hash, status, & clean to
    be preceded by '-x'. Closes issues #10, 11, 13, & 14.
  - Allow &search with long subkey ID (16 digit) and subkey fingerprint
    subkey lookup was failing with other than a short key ID. However,
    public key lookup was working with short and long key ID and fingerprints.
    This patch makes subkey lookup behave the same as full key lookup.
    http://lists.gnupg.org/pipermail/gnupg-users/2012-January/043495.html
  - Patch recon script so that POST includes HTTP version number.
2012-11-10 14:24:44 +00:00
manu
ca97ecb67c Update crudesaml to 1.4: fix build problems 2012-11-08 08:48:13 +00:00
wiz
92fbf519cc Bump PKGREVISION for patch replacements. 2012-11-07 21:07:51 +00:00
wiz
2614709be5 Use upstream version of dlerror() fix. 2012-11-07 21:07:37 +00:00
joerg
013f277f11 Don't use nested functions. Bump revision. 2012-11-07 15:31:23 +00:00
wiz
716803a7ef Remove it-seems-unneeded FreeBSD changes that were long commented out. 2012-11-07 12:24:39 +00:00
wiz
a3b872212d Use just committed upstream change addressing c99 inline semantics. 2012-11-07 12:23:23 +00:00
wiz
a37d57d872 + kpcli 2012-11-07 10:32:44 +00:00
wiz
ea92c07ba9 Import kpcli-1.5 as security/kpcli.
A command line interface (interactive shell) to work with KeePass
1.x and 2.x database files.
2012-11-07 10:32:30 +00:00
wiz
8ebd3f9437 + p5-File-KeePass 2012-11-07 10:24:05 +00:00
wiz
712aed0747 Import p5-File-KeePass-2.03 as security/p5-File-KeePass.
File::KeePass gives access to KeePass version 1 (kdb) and version
2 (kdbx) databases.

The version 1 and version 2 databases are very different in
construction, but the majority of information overlaps and many
algorithms are similar. File::KeePass attempts to iron out as many
of the differences.

File::KeePass gives nearly raw data access. There are a few utility
methods for manipulating groups and entries. More advanced manipulation
can easily be layered on top by other modules.

File::KeePass is only used for reading and writing databases and
for keeping passwords scrambled while in memory. Programs dealing
with UI or using of auto-type features are the domain of other
modules on CPAN. File::KeePass::Agent is one example.
2012-11-07 10:23:32 +00:00
drochner
767dfd0b7f update to 3.0.25
changes:
--bugfixes
-added an OCSP function
2012-11-06 19:01:36 +00:00
abs
3b78db0719 Add .include "../../devel/zlib/buildlink3.mk"
Needed on at least CentOS 6.3
2012-11-05 15:03:14 +00:00
pettai
4aa6a4c864 Added py-Des 2012-11-04 21:58:29 +00:00
pettai
b528341ccd This is a pure python implementation of the DES encryption algorithm.
It is in pure python to avoid portability issues, since most DES
implementations are programmed in C (for performance reasons).

Triple DES class is also implemented, utilising the DES base. Triple DES
is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
See the "About triple DES" section below more info on this algorithm.

The code below is not written for speed or performance, so not for those
needing a fast des implementation, but rather a handy portable solution
ideal for small usage.
2012-11-04 21:57:11 +00:00
joerg
323960c934 Don't order function pointers directly. Don't use non-literals as format
strings. Fix return type of intermediate used for return value of
wcrtomb.
2012-11-01 19:32:44 +00:00
wiz
8d33bfd93c Update HOMEPAGE, from diro@nixsyspaus.org in PR 47148. 2012-10-31 22:45:47 +00:00
wen
6acdcf18fb Update to 2.31
Upstream changes:
2.31    Tue Oct 30 07:03:40 EDT 2012
	- Fixes to regular expressions to avoid rare failures to
          correctly strip padding in decoded messages.
        - Add padding type = "none".
        - Both fixes contributed by Bas van Sisseren.
2012-10-30 14:35:37 +00:00
markd
9866bf5db7 Update to 0.4.3
4+ years worth of patches.
2012-10-28 02:00:50 +00:00
wiz
44cbb90d8b + KeePass. 2012-10-27 22:19:01 +00:00
wiz
8a9de37b40 Import KeePass-2.20.1 as security/KeePass.
Today you need to remember many passwords. You need a password for
the Windows network logon, your e-mail account, your website's FTP
password, online passwords (like website member account), etc. etc.
etc. The list is endless. Also, you should use different passwords
for each account. Because if you use only one password everywhere
and someone gets this password you have a problem... A serious
problem. The thief would have access to your e-mail account, website,
etc. Unimaginable.

KeePass is a free open source password manager, which helps you to
manage your passwords in a secure way. You can put all your passwords
in one database, which is locked with one master key or a key file.
So you only have to remember one single master password or select
the key file to unlock the whole database. The databases are
encrypted using the best and most secure encryption algorithms
currently known (AES and Twofish).
2012-10-27 22:18:50 +00:00
wiz
f531cf3fcd Add comments to patches. 2012-10-27 17:39:12 +00:00
joerg
eaf5600a7b Use void for a few functions that need it. 2012-10-26 20:24:19 +00:00
joerg
f96e4c6b58 Allow unprivileged build on NetBSD, if bind is in base. 2012-10-24 16:05:15 +00:00
manu
756fd1358b Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shall
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
2012-10-24 09:01:40 +00:00
manu
7edb0c3452 Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shall
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
2012-10-24 08:33:51 +00:00
asau
40b91e7ab9 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
manu
ff862ac29f Upgrade to lasso 2.3.6 in order to completely fix the libxml 2.9 dependency
ChangeLog Since 2.3.5:
 * fix a bug when receiving a signature using the InclusiveNamespaces
   PrefixList by copying namespace declaration from upper level at the level of
   the signed node.
 * fix compilation warning on recent version of GCC
2012-10-23 18:16:15 +00:00
schmonz
8f0dc12cf1 Restore INSTALLATION_DIRS and krb5.buildlink3.mk, lost in previous.
Indent while here.
2012-10-23 13:02:08 +00:00
elric
724dd1746f Update to knc 1.7. 2012-10-23 06:04:28 +00:00
wiz
2bcdfec626 Update to 1.49:
1.49 2012-09-25
     Fixed problem where on some platforms test t/local/07_tcpecho.t would
     bail out if it could not bind port 1212. Now now tries a number of ports to bind to until
     successful.
     Improvements to  unsigned casting contributed by Reini Urban.
     Improvements to Net::SSLeay::read to make it easier to use with non-blocking IO:
      contributed by James Marshall:  It modifies
      Net::SSLeay::read() to return the result from SSL_read() as the second
      return value, if Net::SSLeay::read() is called in list context.  Its
      behavior should be unchanged if called in scalar or void context.  This
      result code seems to be required for full support of non-blocking I/O,
      since users need to handle SSL_ERR_WANT_READ, SSL_ERROR_WANT_WRITE, etc.
      Fixed a problem where t/local/kwalitee.t fails with
       Module::CPANTS::Analyse 0.86. Patch from Paul.
      Fixed a number of typos patched by Giles.
      Fixed a compiler warning from Compiling with gcc-4.4 and -Wall, patched by Giles.
      Fixed problems with get_https4: documentation was wrong, $header_ref was
       not correctly set and $server_cert was not returned.
      Fixed a problem that could cause a Perl exception about no blength
      method on undef. Reported by "Stephen J. Smith via RT". https://rt.cpan.org/Ticket/Display.html?id=79309
      Added documentation about how to mitigatxe various SSL/TLS
     vulnerabilities.
     Fixed problem reported by Mike Doherty: SSL_MODE_* are defined in ssl.h,
     and should be available as constants, but I do not see them listed in constants.h
2012-10-21 22:28:16 +00:00
wiz
63d4534896 Update to 20120823. Replace interpreter in installed file.
20120823
  - Fix test (RT#79129, reported by Sinan Unur)

20120822
  - Add mk-ca-bundle.pl from git repository to distribution.
  - Add new/additional certificates from the following CAs: Verisign,
    UTN-USER, UTN USERFirst, Sonera, NetLock Qualified, SwissSign
    Platinum, S-TRUST, ComSign, Actalis, Trustis, StartCom, Buypass.
2012-10-21 22:25:19 +00:00
wiz
baa31dc007 Update to 1.77:
v1.77 2012.10.05
- update_peer for IPv6 also, applied fix to
  https://rt.cpan.org/Ticket/Display.html?id=79916 by
  tlhackque[AT]yahoo[DOT]com
2012-10-21 22:22:36 +00:00
wiz
40d3c54b03 Update to 5.72:
5.72  Mon Sep 24 15:22:08 MST 2012
	- adjusted module installation directory for later Perls
		-- As of 5.11 Perl searches 'site' first, so use that
			-- ref. INSTALLDIRS in Makefile.PL
		-- thanks to Robert Sedlacek for patch
2012-10-21 22:20:40 +00:00
wiz
216ba55f22 Update to 0.64:
0.64 2012-08-06 01:23:30

- Drastically simplify Makefile.PL to resolve RT bugs #61249, #61324,
  #63553, #68208, and #68084.

- Forgot to update Changes for 0.63, so this version overrides that.


0.61_05 2012-08-04 00:40:22 UTC

- Trying to distinguish between good vs bad zero returns from underlying
  SSL_read/SSL_write broke stuff (see RT bug #78695). Revert to previous
  behavior.

- Completely re-organize Makefile.PL. I hope these changes will help take
  care of RT bugs #61324, #61249, #63553, and #68084 etc. This is not
  necessarily finished, but I want to see what happens on CPAN Testers at
  this point before making a few other minor changes.

0.60 2012-07-29 21:43:47 UTC

- Release 0.59_03 as 0.60 so distributions can pick up various fixes. The most
  important one seems to be bug RT #70565. This should take care of bug RT
  #77167

- SSL_read and SSL_write now try to handle incomplete reads/writes (see bug RT
  RT #64054). The current test suite does is not very comprehensive, so caution
  is recommended at this point. Also, if you have good test cases, I would love
  to incorporate them into the distribution.

0.59_03 2012-03-10 00:45:28 UTC

- Bump version number and upload to CPAN.


0.59_02 2012-03-08 16:16:03 UTC

- Forgot to update Changes for 0.59_01. The following is a combined list of
  the more important fixes incorporated in both.

- Bug RT #64054: Handle incomplete reads/writes better

- Bug RT #73754: Add LWP::Protocol::https to PREREQ_PM

- Bug RT #73755: Crypt-SSLeay does not verify hosts (yet). Don't let that
  cause a failure during tests.

- Streamline t/02-live.t using Try::Tiny and done_testing

- Plus assorted related small changes.

0.58_01 2010-09-08 19:11:39 UTC

- L<text|scheme:...> is not supported in POD for 5.8.5 and earlier.
- TODOs in POD should stand out
- Add /boot/common/ssl and some other directories to unix_ssl_dirs (see bug
  #60936).
2012-10-21 22:19:14 +00:00
wiz
d4a974c4db Update to 0.13:
0.13
Updated the WRITE() method to use syswrite() and account for
variable buffer sizes in SASL.
2012-10-21 22:16:43 +00:00
wiz
61869bb86f Update to 2.16:
Authen-SASL 2.16 -- Tue Sep  4 11:01:18 CDT 2012

  * SASL.pod: fix typo [Peter Marschall]
  * Perl.pm: avoid warning on "uninitialized value" [Peter Marschall]
2012-10-21 22:14:51 +00:00
wen
ab9ceeb5f9 Update to 0.14
Upstream changes:
0.14  October 16, 2012
	- compiling with -Werror=format-security now works (Jerome Quelin, #48446)
	- Use Digest::SHA instead of Digest::SHA1 (Ansgar Burchardt, #60271)
	- Security fix, CVE-2009-0129: Missing error check in do_verify (Havard Eidnes, #79958)
2012-10-20 14:25:58 +00:00
pettai
1c3d937865 Added scrypt 2012-10-17 22:18:56 +00:00
pettai
2281e8547b A simple password-based encryption utility is available as a demonstration
of the scrypt key derivation function. On modern hardware and with default
parameters, the cost of cracking the password on a file encrypted by scrypt
enc is approximately 100 billion times more than the cost of cracking the
same password on a file encrypted by openssl enc; this means that a five-
character password using scrypt is stronger than a ten-character password
using openssl
2012-10-17 22:17:47 +00:00
adam
e871bbb82b MASTER_SITES fix 2012-10-12 15:37:12 +00:00
marino
1b71fe7899 security/qoauth: Fix DISTNAME and thus fetch
As soon as qoauth got PKGREV bump, this package could no longer fetch due
to a bad DISTNAME definition.  Fix DISTNAME to fix "make fetch".
2012-10-12 11:06:59 +00:00
marino
da604f2b06 security/mit-krb5: Fix build for gcc 4.7
Generated file didn't pass -Werror check on gcc4.7.  The problem is
well-known and already fixed on the current version of mit-krb5.  The
patch added here was taken from upstream.

No revbump necessary, won't change binary on systems that already built it.
2012-10-12 08:06:25 +00:00
drochner
e02daaded0 update to 3.0.24
changes:
-better IPv6 support
-bugfixes
-minor improvements
2012-10-10 11:44:30 +00:00
adam
ed93f0ca47 Revbump after updating graphics/pango 2012-10-08 23:00:34 +00:00