Commit graph

7364 commits

Author SHA1 Message Date
wiedi
d156c4bc92 change smf manifest to use startd/duration child, this prevents useless creation of pid files 2014-08-18 22:19:15 +00:00
szptvlfn
700b5a4364 + hs-digest 2014-08-18 21:20:08 +00:00
szptvlfn
4a2edc5ddf Import digest-0.0.1.2 as security/hs-digest,
packaged for wip by zecrazytux.

Haskell package providing efficient cryptographic hash implementations
for strict and lazy bytestrings.
For now, CRC32 and Adler32 are supported; they are
implemented as FFI bindings to efficient code from zlib.
2014-08-18 21:18:48 +00:00
wiz
4a13c1636c Update to 2.0.26:
Noteworthy changes in version 2.0.26 (2014-08-12)
-------------------------------------------------

 * gpg: Fix a regression in 2.0.24 if a subkey id is given
   to --recv-keys et al.

 * gpg: Cap attribute packets at 16MB.

 * gpgsm: Auto-create the ".gnupg" home directory in the same
   way gpg does.

 * scdaemon: Allow for certificates > 1024 when using PC/SC.
2014-08-16 12:14:28 +00:00
wiz
14978c911c gsed needed on OS X. Dependency small enough, add it to TOOLS.
PR 49111 by Youri Mouton.
2014-08-13 13:19:14 +00:00
adam
72ed0307eb Revbump after boost-libs update 2014-08-13 10:57:32 +00:00
schmonz
27d556302e Add and enable nacl. 2014-08-12 05:01:14 +00:00
schmonz
60347b6f73 Initial import of NaCl.
NaCl (pronounced "salt") is a new easy-to-use high-speed software
library for network communication, encryption, decryption, signatures,
etc. NaCl's goal is to provide all of the core operations needed
to build higher-level cryptographic tools.

Of course, other libraries already exist for these core operations.
NaCl advances the state of the art by improving security, by improving
usability, and by improving speed.
2014-08-12 05:00:34 +00:00
wiz
41c6d74597 Update to 5.03:
Version 5.03, 2014.08.07, urgency: HIGH:
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1i.
    See https://www.openssl.org/news/secadv_20140806.txt
* New features
  - FIPS autoconfiguration cleanup.
  - FIPS canister updated to version 2.0.6.
  - Improved SNI diagnostic logging.
* Bugfixes
  - Compilation fixes for old versions of OpenSSL.
  - Fixed whitespace handling in the stunnel.init script.

Version 5.02, 2014.06.09, urgency: HIGH:
* Security bugfixes
  - OpenSSL DLLs updated to version 1.0.1h.
    See https://www.openssl.org/news/secadv_20140605.txt
* New features
  - Major rewrite of the protocol.c interface: it is now possible to add
    protocol negotiations at multiple connection phases, protocols can
    individually decide whether the remote connection will be
    established before or after SSL/TLS is negotiated.
  - Heap memory blocks are wiped before release.  This only works for
    block allocated by stunnel, and not by OpenSSL or other libraries.
  - The safe_memcmp() function implemented with execution time not
    dependent on the compared data.
  - Updated the stunnel.conf and stunnel.init templates.
  - Added a client-mode example to the manual.
* Bugfixes
  - Fixed "failover = rr" broken since version 5.00.
  - Fixed "taskbar = no" broken since version 5.00.
  - Compilation fix for missing SSL_OP_MSIE_SSLV2_RSA_PADDING option.
2014-08-10 14:54:12 +00:00
wiz
86a73bde4f Update to 0.5.3:
0.5.3 - 2014-08-06
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.1i.
2014-08-10 14:42:25 +00:00
wiz
f78434a2b8 Use 'mkdir -p' in case ${PREFIX}/etc doesn't exist yet. 2014-08-10 10:47:42 +00:00
tron
306456d39c Fix build under Mac OS X. 2014-08-10 09:06:48 +00:00
obache
c62adf2f13 Update openssl to 1.0.1i.
Changes between 1.0.1h and 1.0.1i [6 Aug 2014]

  *) Fix SRP buffer overrun vulnerability. Invalid parameters passed to the
     SRP code can be overrun an internal buffer. Add sanity check that
     g, A, B < N to SRP code.

     Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC
     Group for discovering this issue.
     (CVE-2014-3512)
     [Steve Henson]

  *) A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate
     TLS 1.0 instead of higher protocol versions when the ClientHello message
     is badly fragmented. This allows a man-in-the-middle attacker to force a
     downgrade to TLS 1.0 even if both the server and the client support a
     higher protocol version, by modifying the client's TLS records.

     Thanks to David Benjamin and Adam Langley (Google) for discovering and
     researching this issue.
     (CVE-2014-3511)
     [David Benjamin]

  *) OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject
     to a denial of service attack. A malicious server can crash the client
     with a null pointer dereference (read) by specifying an anonymous (EC)DH
     ciphersuite and sending carefully crafted handshake messages.

     Thanks to Felix Gröbert (Google) for discovering and researching this
     issue.
     (CVE-2014-3510)
     [Emilia Käsper]

  *) By sending carefully crafted DTLS packets an attacker could cause openssl
     to leak memory. This can be exploited through a Denial of Service attack.
     Thanks to Adam Langley for discovering and researching this issue.
     (CVE-2014-3507)
     [Adam Langley]

  *) An attacker can force openssl to consume large amounts of memory whilst
     processing DTLS handshake messages. This can be exploited through a
     Denial of Service attack.
     Thanks to Adam Langley for discovering and researching this issue.
     (CVE-2014-3506)
     [Adam Langley]

  *) An attacker can force an error condition which causes openssl to crash
     whilst processing DTLS packets due to memory being freed twice. This
     can be exploited through a Denial of Service attack.
     Thanks to Adam Langley and Wan-Teh Chang for discovering and researching
     this issue.
     (CVE-2014-3505)
     [Adam Langley]

  *) If a multithreaded client connects to a malicious server using a resumed
     session and the server sends an ec point format extension it could write
     up to 255 bytes to freed memory.

     Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this
     issue.
     (CVE-2014-3509)
     [Gabor Tyukasz]

  *) A malicious server can crash an OpenSSL client with a null pointer
     dereference (read) by specifying an SRP ciphersuite even though it was not
     properly negotiated with the client. This can be exploited through a
     Denial of Service attack.

     Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for
     discovering and researching this issue.
     (CVE-2014-5139)
     [Steve Henson]

  *) A flaw in OBJ_obj2txt may cause pretty printing functions such as
     X509_name_oneline, X509_name_print_ex et al. to leak some information
     from the stack. Applications may be affected if they echo pretty printing
     output to the attacker.

     Thanks to Ivan Fratric (Google) for discovering this issue.
     (CVE-2014-3508)
     [Emilia Käsper, and Steve Henson]

  *) Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.)
     for corner cases. (Certain input points at infinity could lead to
     bogus results, with non-infinity inputs mapped to infinity too.)
     [Bodo Moeller]
2014-08-07 01:29:45 +00:00
obache
85e8b5e02a netbsd-desktop@ is a retired list. 2014-08-06 12:21:02 +00:00
khorben
a10d76bf77 pev 0.60 was re-released with changes to the original archive 2014-08-06 11:07:30 +00:00
wiz
ad606e3f28 Update to 4.0:
---
4.0
---

* Removed ``keyring_path`` parameter from ``load_keyring``. See release notes
  for 3.0.3 for more details.
* Issue #22: Removed support for loading the config from the current
  directory. The config file must now be located in the platform-specific
  config location.
2014-08-05 19:22:42 +00:00
khorben
4bf67ebc1e Added security/pev 2014-08-02 14:12:56 +00:00
khorben
21df93147d Imported security/pev version 0.60 from wip
pev is a PE file analysis toolkit that includes some nice programs to work with
PE files in many systems. It can be useful for programmers, security analysts
and forensic investigators. It's licensed under GPLv3+ terms.
2014-08-02 14:11:08 +00:00
fhajny
bd10651ca6 Add runtime dependency on flex (in bin/compile_et). Bump PKGREVISION. 2014-07-30 11:05:04 +00:00
wiz
46df3236cf Update to 0.5.2:
0.5.2 - 2014-07-09
~~~~~~~~~~~~~~~~~~

* Add
  :class:`~cryptography.hazmat.backends.interfaces.TraditionalOpenSSLSerializationBackend`
  support to :doc:`/hazmat/backends/multibackend`.
* Fix compilation error on OS X 10.8 (Mountain Lion).

0.5.1 - 2014-07-07
~~~~~~~~~~~~~~~~~~

* Add
  :class:`~cryptography.hazmat.backends.interfaces.PKCS8SerializationBackend`
  support to :doc:`/hazmat/backends/multibackend`.

0.5 - 2014-07-07
~~~~~~~~~~~~~~~~

* **BACKWARDS INCOMPATIBLE:**
  :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` no longer allows
  truncation of tags by default. Previous versions of ``cryptography`` allowed
  tags to be truncated by default, applications wishing to preserve this
  behavior (not recommended) can pass the ``min_tag_length`` argument.
* Windows builds now statically link OpenSSL by default. When installing a
  wheel on Windows you no longer need to install OpenSSL separately. Windows
  users can switch between static and dynamic linking with an environment
  variable. See :doc:`/installation` for more details.
* Added :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDFExpand`.
* Added :class:`~cryptography.hazmat.primitives.ciphers.modes.CFB8` support
  for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` and
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
  :doc:`/hazmat/backends/commoncrypto` and :doc:`/hazmat/backends/openssl`.
* Added ``AES`` :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`
  support to the OpenSSL backend when linked against 0.9.8.
* Added
  :class:`~cryptography.hazmat.backends.interfaces.PKCS8SerializationBackend`
  and
  :class:`~cryptography.hazmat.backends.interfaces.TraditionalOpenSSLSerializationBackend`
  support to the :doc:`/hazmat/backends/openssl`.
* Added :doc:`/hazmat/primitives/asymmetric/ec` and
  :class:`~cryptography.hazmat.backends.interfaces.EllipticCurveBackend`.
* Added :class:`~cryptography.hazmat.primitives.ciphers.modes.ECB` support
  for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
  :doc:`/hazmat/backends/commoncrypto` and :doc:`/hazmat/backends/openssl`.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.RSAPrivateKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.RSAPublicKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAPrivateKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAPublicKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAParameters` interface.
* Deprecated ``encrypt_rsa``, ``decrypt_rsa``, ``create_rsa_signature_ctx`` and
  ``create_rsa_verification_ctx`` on
  :class:`~cryptography.hazmat.backends.interfaces.RSABackend`.
* Deprecated ``create_dsa_signature_ctx`` and ``create_dsa_verification_ctx``
  on :class:`~cryptography.hazmat.backends.interfaces.DSABackend`.
2014-07-29 11:51:36 +00:00
jperkin
2bb27de2fa Darwin doesn't build sudo_noexec.so, patch from Sevan Janiyan. 2014-07-28 20:07:42 +00:00
fhajny
a5a191ac1c This package is still useful on SunOS, as it provides more functionality
compared to the one shipped with the platform. Enable for SunOS, but disable
the INSTALL/DEINSTALL symlinks. Bump PKGREVISION.
2014-07-28 18:23:39 +00:00
wiz
2324d44072 Fix overlooked option name for previous.
Found by jperkin.
2014-07-28 11:02:11 +00:00
tron
d79b29792b Improve default options for SSHGuard. "-f 100:/var/run/sshd.pid" in
particular affects the detection rate badly.

Bump package revision.
2014-07-27 08:32:06 +00:00
tron
799ebd6a2c Add and enable "sshguard" package. 2014-07-26 19:57:59 +00:00
tron
9e9a7fc8f9 Add new "sshguard" package:
Sshguard is a small program that monitors services running on your
machine from the log files. When it detects that someone is doing
something bad to a service, sshguard blocks the IP address of the bad
guy with a firewall rule.

Sshguard was started in 2006 to mitigate the growing brute force
attacks to SSH servers. Because of the generality of its infrastructure,
however, it was soon extended to monitor and protect more and more services.
2014-07-26 19:57:44 +00:00
jperkin
18b7f8f21e Don't override LDFLAGS, fixes check-shlibs. 2014-07-25 16:21:26 +00:00
jperkin
5890faf951 Make sure RPATH to libcrypto is added, fixes check-shlibs-elf. 2014-07-24 21:21:09 +00:00
hiramatsu
586a3fe5af Update security/p5-String-Random to 0.26.
Changes from previous:
----------------------
0.26   Fri Jan 31 2014
- LICENSE section and file (CPANTS).
- Minimum version of perl in Build.PL / META.yml .

0.25   Fri Dec 27 2013
- Update the link to the version control repository.

0.24   Tue Dec 03 2013
- Add keywords and a link to he repository to Build.PL / META.yml.

0.23   Tue Dec 03 2013
- Add t/style-trailing-space.t .
- Update the POD in lib/String/Random.pm .
- Add t/pod.t .
- Convert Build.PL to Test::Run::Builder.
- Hopefully fix https://rt.cpan.org/Public/Bug/Display.html?id=86894
    - Bug #86894 for String-Random: Spurious warnings
2014-07-23 06:30:48 +00:00
wiz
edbf61ee18 Update to 2.0.25. Rename gpgsm option to gnupg2-gpgsm.
Noteworthy changes in version 2.0.25 (2014-06-30)
-------------------------------------------------

 * gpg: Fix a regression in 2.0.24 if more than one keyid is given
   to --recv-keys et al.

 * gpg: Cap RSA and Elgamal keysize at 4096 bit also for unattended
   key generation.

 * gpgsm: Fix a DISPLAY related problem with --export-secret-key-p12.

 * scdaemon: Support reader Gemalto IDBridge CT30.
2014-07-22 11:30:00 +00:00
wiz
7934c72e83 Update to 1.4.18:
Noteworthy changes in version 1.4.18 (2014-06-30)
-------------------------------------------------

 * Fix a regression in 1.4.17 if more than one keyid is given
   to --recv-keys et al.

 * Cap RSA and Elgamal keysize at 4096 bit also for unattended key
   generation.
2014-07-22 11:24:29 +00:00
wiz
a8bf36265a Update to 1.1.8.
New keyart binary (not installed)
documenation improvements.
2014-07-22 11:23:11 +00:00
manu
6b72428f50 Bug fix from upstream so that SAML assertion are correctly readen. 2014-07-22 09:47:37 +00:00
schnoebe
24c0e575f3 Update to 1.4.3:
Changelog:
Version 1.4.3 - November 27 2012

libssh2 1.4.3 GPG sig (685712 bytes)

Changes:

    compression: add support for zlib@openssh.com

Bug fixes:

    sftp_read: return error if a too large package arrives
    libssh2_hostkey_hash.3: update the description of return value
    Fixed MSVC NMakefile
    examples: use stderr for messages, stdout for data
    openssl: do not leak memory when handling errors
    improved handling of disabled MD5 algorithm in OpenSSL
    known_hosts: Fail when parsing unknown keys in known_hosts file
    configure: gcrypt doesn't come with pkg-config support
    session_free: wrong variable used for keeping state
    libssh2_userauth_publickey_fromfile_ex.3: mention publickey == NULL
    comp_method_zlib_decomp: handle Z_BUF_ERROR when inflating

Version 1.4.2 - May 18 2012

libssh2 1.4.2 GPG sig (679992 bytes)

Bug fixes:

    Return LIBSSH2_ERROR_SOCKET_DISCONNECT on EOF when reading banner
    userauth.c: fread() from public key file to correctly detect any
errors
    configure.ac: Add option to disable build of the example
applications
    Added 'Requires.private:' line to libssh2.pc
    SFTP: filter off incoming "zombie" responses
    gettimeofday: no need for a replacement under cygwin
    SSH_MSG_CHANNEL_REQUEST: default to want_reply
    win32/libssh2_config.h: Remove hardcoded #define LIBSSH2_HAVE_ZLIB

Version 1.4.1 - April 4 2012

libssh2 1.4.1 GPG sig (658507 bytes)

Bug fixes:

    build error with gcrypt backend
    always do "forced" window updates to avoid corner case stalls
    aes: the init function fails when OpenSSL has AES support
    transport_send: Finish in-progress key exchange before sending data
    channel_write: acknowledge transport errors
    examples/x11.c: Make sure sizeof passed to read operation is correct
    examples/x11.c:,Fix suspicious sizeof usage
    sftp_packet_add: verify the packet before accepting it
    SFTP: preserve the original error code more
    sftp_packet_read: adjust window size as necessary
    Use safer snprintf rather then sprintf in several places
    Define and use LIBSSH2_INVALID_SOCKET instead of INVALID_SOCKET
    sftp_write: cannot return acked data *and* EAGAIN
    sftp_read: avoid data *and* EAGAIN
    libssh2.h: Add missing prototype for libssh2_session_banner_set()

Version 1.4.0 - January 31 2012

libssh2 1.4.0 GPG sig (653514 bytes)

Changes:

    Added libssh2_session_supported_algs()
    Added libssh2_session_banner_get()
    Added libssh2_sftp_get_channel()
    libssh2.h: bump the default window size to 256K

Bug fixes:

    sftp-seek: clear EOF flag
    userauth: Provide more informations if ssh pub key extraction fails
    ssh2_exec: skip error outputs for EAGAIN
    LIBSSH2_SFTP_PACKET_MAXLEN: increase to 80000
    knownhost_check(): Don't dereference ext if NULL is passed
    knownhost_add: Avoid dereferencing uninitialized memory on error
path
    OpenSSL EVP: fix threaded use of structs
    _libssh2_channel_read: react on errors from receive_window_adjust
    sftp_read: cap the read ahead maximum amount
    _libssh2_channel_read: fix non-blocking window adjusting

Version 1.3.0 - September 6 2011

libssh2 1.3.0 GPG sig (639262 bytes)

Changes:

    Added custom callbacks for performing low level socket I/O

Bug fixes:

    sftp_read: advance offset correctly for buffered copies
    libssh2_sftp_seek64: flush packetlist and buffered data
    _libssh2_packet_add: adjust window size when truncating
    sftp_read: a short read is not end of file

Version 1.2.9 - August 16 2011

libssh2 1.2.9 GPG sig (642150 bytes)

Changes:

    Added libssh2_session_set_timeout() and
libssh2_session_get_timeout() to make blocking calls get a timeout

Bug fixes:

    configure and pkg-config: fix $VERSION
    s/\.NF/.nf/ to fix wrong macro name caught by man --warnings
    keepalive: add first basic man pages
    sftp_write: flush the packetlist on error
    sftp_write: clean offsets on error
    msvcproj: added libs and debug stuff
    SCP: fix incorrect error code
    session_startup: init state properly
    sftp_write_sliding: send the complete file
    userauth_keyboard_interactive: skip code on zero length auth
    _libssh2_wait_socket: fix timeouts for poll() uses
    agent_list_identities: fix out of scope access
    _libssh2_recv(): handle ENOENT error as EAGAIN
    userauth_keyboard_interactive: fix buffer overflow
    removed man pages for non-existing functions!
    gettimeofday: fix name space pollution
    _libssh2_channel_write: handle window_size == 0 better

Version 1.2.8 - April 5 2011

libssh2 1.2.8 GPG sig (637707 bytes)

Changes:

    added libssh2_free, libssh2_channel_get_exit_signal and
libssh2_session_handshake
    SFTP read/write remade and now MUCH faster, especially on high
latency connections
    added new examples: ssh2_echo.c, sftp_append.c and
sftp_write_sliding.c
    userauth: derive publickey from private
    NEWS: now generated from git

Bug fixes:

    Support unlimited number of host names in a single line of the
known_hosts file.
    fix memory leak in userauth_keyboard_interactive()
    fix memory leaks (two times cipher_data) for each sftp session
    session_startup: manage server data before server identification
    SCP: allow file names with bytes > 126
    scp_recv: improved treatment of channel_read() returning zero
    libssh2_userauth_authenticated: make it work as documented
    variable size cleanup: match internal variable sizes better with the
sizes of the fields used on the wire
    channel_request_pty_size: fix reqPTY_state
    sftp_symlink: return error if receive buffer too small
    sftp_readdir: return error if buffer is too small
    libssh2_knownhost_readfile.3: clarify return value
    configure: stop using the deprecated AM_INIT_AUTOMAKE syntax
    Fixed Win32 makefile which was now broken at resource build
    kex_agree_hostkey: fix NULL pointer derefence
    _libssh2_ntohu64: fix conversion from network bytes to uint64
    ssize_t: proper typedef with MSVC compilers
    zlib: Add debug tracing of zlib errors
    decomp: increase decompression buffer sizes

Version 1.2.7 - August 17 2010

libssh2 1.2.7 GPG sig (583105 bytes)

Changes:

    Added Watcom makefile

Bug fixes:

    Better handling of invalid key files
    inputchecks: make lots of API functions check for NULL pointers
    libssh2_session_callback_set: extended the man page
    SFTP: limit write() to not produce overly large packets
    agent: make libssh2_agent_userauth() work blocking properly
    _libssh2_userauth_publickey: reject method names longer than the
data
    channel_free: ignore problems with channel_close()
    typedef: make ssize_t get typedef without LIBSSH2_WIN32
    _libssh2_wait_socket: poll needs milliseconds
    libssh2_wait_socket: reset error code to "leak" EAGAIN less
    Added include for sys/select.h to get fd.set on some platforms
    session_free: free more data to avoid memory leaks
    openssl: make use of the EVP interface
    Fix underscore typo for 64-bit printf format specifiers on Windows
    Make libssh2_debug() create a correctly terminated string
    userauth_hostbased_fromfile: packet length too short
    handshake: Compression enabled at the wrong time
    Don't overflow MD5 server hostkey

Version 1.2.6 - June 10 2010

libssh2 1.2.6 GPG sig (579590 bytes)

Changes:

    Added libssh2_sftp_statvfs() and libssh2_sftp_fstatvfs()
    Added libssh2_knownhost_checkp()
    Added libssh2_scp_send64()

Bug fixes:

    wait_socket: make c89 compliant and use two fd_sets for select()
    OpenSSL AES-128-CTR detection
    proper keyboard-interactive user dialog in the sftp.c example
    build procedure for VMS
    fixed libssh2.dsw to use the generated libssh2.dsp
    several Windows-related build fixes
    fail to init SFTP if session isn't already authenticated
    many tiny fixes that address clang-analyzer warnings
    sftp_open: deal with short channel_write calls
    libssh2_publickey_init: fixed to work better non-blocking
    sftp_close_handle: add precation to not access NULL pointer
    sftp_readdir: simplified and bugfixed
    channel_write: if data has been sent, don't return EAGAIN

Version 1.2.5 - April 13 2010

libssh2 1.2.5 GPG sig (559553 bytes)

Changes:

    Added Add keep-alive support: libssh2_keepalive_config() and
libssh2_keepalive_send()
    Added libssh2_knownhost_addc(), libssh2_init() and libssh2_exit()
    Added LIBSSH2_SFTP_S_IS***() macros

Bug fixes:

    fix memory leak in libssh2_session_startup()
    added missing error codes - shown as hangs in blocking mode
    fix memory leak in userauth_keyboard_interactive()
    libssh2_knownhost_del: fix write to freed memory
    Send and receive channel EOF before sending SSH_MSG_CHANNEL_CLOSE
    Use AES-CTR from OpenSSL when available
    Fixed gettimeofday to compile with Visual C++ 6
    NULL dereference when window adjusting a non-existing channel
    avoid using poll on interix and mac os x systems
    fix scp memory leak
    Correctly clear blocking flag after sending multipart packet
    Reduce used window sizes by factor 10
    libssh2_userauth_publickey_fromfile_ex() handles a NULL password
    sftp_init() deal with _libssh2_channel_write() short returns

Version 1.2.4 - February 13 2010

libssh2 1.2.4 GPG sig (547675 bytes)

Bug fixes:

    Resolve compile issues on Solaris x64 and UltraSPARC
    Allow compiling with OpenSSL when AES isn't available
    Fix Tru64 socklen_t compile issue with example/direct_tcpip.c

Version 1.2.3 - February 3 2010

libssh2 1.2.3 GPG sig (547652 bytes)

Changes:

    ssh-agent support with the new libssh2_agent_* functions
    Added libssh2_trace_sethandler()
    Added the direct_tcpip.c and ssh2_agent.c examples

Bug fixes:

    Fixed memory leak in userauth_publickey
    Fixed publickey authentication regression
    Silenced several compiler warnings
    avoid returning data to memory already freed
    transport layer fix for bogus -39 (LIBSSH2_ERROR_BAD_USE) errors
    Fixed padding in ssh-dss signature blob encoding
    Fixed direction blocking flag problems
    Fixed memory leak in sftp_fstat()
2014-07-20 22:02:58 +00:00
ryoon
d663570005 Fix build under SCO OpenServer 5.0.7/3.2. 2014-07-18 10:36:28 +00:00
ryoon
e81c9fc236 For SCO OpenServer 5.0.7/3.2, sco-os5 target should be used.
And libsocket is needed.
2014-07-18 10:34:34 +00:00
ryoon
f0c3019e41 SCO OpenServer 5.0.7/3.2 does not support SSSE3. 2014-07-18 10:32:37 +00:00
wen
6e8fd11a70 Update to 1.9
No upstream changelog.
2014-07-17 13:10:01 +00:00
wen
b0e4b5bb7e Update to 5.92
Upstream changes:
5.92  Sun Jun  1 00:15:44 MST 2014
	- fixed reserved-word clash when compiling with C++
		-- use 'classname' instead of 'class'
			-- ref. SHA.xs (rt.cpan.org #96090)
	- silenced MSC compiler warning about signed/unsigned comparison
		-- ref. SHA.xs (rt.cpan.org #95830)

5.91  Fri May 16 10:21:44 MST 2014
	- restored original 'addfile' for use on opened file handles
		-- allows callbacks in place of actual files
			-- ref. IO::Callback (rt.cpan.org #95643)
	- re-established inheritance from Digest::base
		-- to pick up future Digest enhancements automatically
	- cleaned up documentation

5.90  Wed May  7 07:57:08 MST 2014
	- consolidated all dynamic memory allocation into XSUBs
		-- streamlines referencing of SHA objects
		-- simplifies DESTROYing of objects
	- enhanced Makefile.PL to allow 'use warnings'
		-- automatically reverts to $^W for early Perls
	- scrubbed C and Perl code to remove all compiler warnings
2014-07-17 13:00:13 +00:00
wen
72863d761d Update to 0.22
Upstream changes:
0.22  Sun Jun  1 00:15:46 MST 2014
	- fixed reserved-word clash when compiling with C++
		-- use 'classname' instead of 'class'
			-- ref. SHA3.xs (rt.cpan.org #96090)

0.21  Fri May 16 10:21:46 MST 2014
	- restored original 'addfile' for use on opened file handles
		-- allows callbacks in place of actual files
			-- ref. IO::Callback (rt.cpan.org #95643)
	- re-established inheritance from Digest::base
		-- to pick up future Digest enhancements automatically
	- cleaned up documentation

0.20  Wed May  7 07:57:10 MST 2014
	- consolidated all dynamic memory allocation into XSUBs
		-- streamlines referencing of SHA3 objects
		-- simplifies DESTROYing of objects
	- enhanced Makefile.PL to allow 'use warnings'
		-- automatically reverts to $^W for early Perls
	- scrubbed C and Perl code to remove all compiler warnings
2014-07-17 12:57:05 +00:00
mef
020c303e9f Caff was packaged fine, but a module was missing at run.
Add dependency
+DEPENDS+=  p5-Net-IDN-Encode-[0-9]*:../../textproc/p5-Net-IDN-Encode
and bump PKGREVION. Thanks gdt@ for review.
2014-07-16 12:21:29 +00:00
obache
45f890ce05 PolarSSL ChangeLog
= Version 1.2.11 released 2014-07-11
Features
   * Entropy module now supports seed writing and reading

Changes
   * Introduced POLARSSL_HAVE_READDIR_R for systems without it
   * Improvements to the CMake build system, contributed by Julian Ospald.
   * Work around a bug of the version of Clang shipped by Apple with Mavericks
     that prevented bignum.c from compiling. (Reported by Rafael Baptista.)
   * Improvements to tests/Makefile, contributed by Oden Eriksson.
   * Use UTC time to check certificate validity.
   * Reject certificates with times not in UTC, per RFC 5280.
   * Migrate zeroizing of data to polarssl_zeroize() instead of memset()
     against unwanted compiler optimizations

Security
   * Forbid change of server certificate during renegotiation to prevent
     "triple handshake" attack when authentication mode is optional (the
     attack was already impossible when authentication is required).
   * Check notBefore timestamp of certificates and CRLs from the future.
   * Forbid sequence number wrapping
   * Prevent potential NULL pointer dereference in ssl_read_record() (found by
     TrustInSoft)
   * Fix length checking for AEAD ciphersuites (found by Codenomicon).
     It was possible to crash the server (and client) using crafted messages
     when a GCM suite was chosen.

Bugfix
   * Fixed X.509 hostname comparison (with non-regular characters)
   * SSL now gracefully handles missing RNG
   * crypt_and_hash app checks MAC before final decryption
   * Fixed x509_crt_parse_path() bug on Windows platforms
   * Added missing MPI_CHK() around some statements in mpi_div_mpi() (found by
     TrustInSoft)
   * Fixed potential overflow in certificate size verification in
     ssl_write_certificate() (found by TrustInSoft)
   * Fix ASM format in bn_mul.h
   * Potential memory leak in bignum_selftest()
   * Replaced expired test certificate
   * ssl_mail_client now terminates lines with CRLF, instead of LF
   * Fix bug in RSA PKCS#1 v1.5 "reversed" operations
   * Fixed testing with out-of-source builds using cmake
   * Fixed version-major intolerance in server
   * Fixed CMake symlinking on out-of-source builds
   * Bignum's MIPS-32 assembly was used on MIPS-64, causing chaos. (Found by
     Alex Wilson.)
   * ssl_init() was leaving a dirty pointer in ssl_context if malloc of
     out_ctr failed
   * ssl_handshake_init() was leaving dirty pointers in subcontexts if malloc
     of one of them failed
   * x509_get_current_time() uses localtime_r() to prevent thread issues
   * Some example server programs were not sending the close_notify alert.
   * Potential memory leak in mpi_exp_mod() when error occurs during
     calculation of RR.
   * Improve interoperability by not writing extension length in ClientHello
     when no extensions are present (found by Matthew Page)
   * rsa_check_pubkey() now allows an E up to N
   * On OpenBSD, use arc4random_buf() instead of rand() to prevent warnings
   * mpi_fill_random() was creating numbers larger than requested on
     big-endian platform when size was not an integer number of limbs
   * Fix detection of DragonflyBSD in net.c (found by Markus Pfeiffer)
   * Stricter check on SSL ClientHello internal sizes compared to actual packet
     size (found by TrustInSoft)
   * Fix preprocessor checks for bn_mul PPC asm (found by Barry K. Nathan).
   * Use \n\t rather than semicolons for bn_mul asm, since some assemblers
     interpret semicolons as comment delimiters (found by Barry K. Nathan).
   * Disable broken Sparc64 bn_mul assembly (found by Florian Obser).
   * Fix base64_decode() to return and check length correctly (in case of
     tight buffers)

= Version 1.2.10 released 2013-10-07
Changes
   * Changed RSA blinding to a slower but thread-safe version
   * Make get_pkcs_padding() constant-time

Bugfix
   * Fixed memory leak in RSA as a result of introduction of blinding
   * Fixed ssl_pkcs11_decrypt() prototype
   * Fixed MSVC project files

= Version 1.2.9 released 2013-10-01
Changes
   * x509_verify() now case insensitive for cn (RFC 6125 6.4)

Bugfix
   * Fixed potential memory leak when failing to resume a session
   * Fixed potential file descriptor leaks (found by Remi Gacogne)
   * Minor fixes

Security
   * Fixed potential heap buffer overflow on large hostname setting
   * Fixed potential negative value misinterpretation in load_file()
   * RSA blinding on CRT operations to counter timing attacks
     (found by Cyril Arnaud and Pierre-Alain Fouque)
2014-07-16 10:03:57 +00:00
rodent
2316abf9f4 Unbump PKGREVISION on select ruby packages. 2014-07-16 08:37:20 +00:00
rodent
cdf103652e Removing .ri entries from PLIST. NFI why this works with/without the
entries on my machine. Seems no other ruby package has them. Bump
PKGREVISION.
2014-07-16 07:56:28 +00:00
agc
655471f565 Update netpgpverify package to 20140712
+ bring the bignum implementation up to the latest version

	+ radix conversion routines added
	+ bitwise operations added
	+ whitespace cleanups
2014-07-12 15:45:52 +00:00
wiz
caeb6e9a78 Add dependency on p5-Term-ReadLine-Perl. Either that or
...-Gnu is needed for kpcli to work.
Bump PKGREVISION.
2014-07-05 05:17:27 +00:00
rodent
fdbd69418d +ruby-{openid,rack-openid,ruby-openid} 2014-07-04 12:42:10 +00:00
rodent
12b3d92c3f Import ruby200-rack-openid-1.4.2 as security/ruby-rack-openid.
Provides a more HTTPish API around the ruby-openid library.
2014-07-04 12:39:38 +00:00
rodent
3ccc951698 Import ruby200-ruby-openid-2.5.0 as security/ruby-ruby-openid.
A Ruby library for verifying and serving OpenID identities. Features:

 * Easy to use API for verifying OpenID identites - OpenID::Consumer
 * Support for serving OpenID identites - OpenID::Server
 * Does not depend on underlying web framework
 * Supports multiple storage mechanisms (Filesystem, ActiveRecord, Memory)
 * Example code to help you get started, including:
   * Ruby on Rails based consumer and server
   * OpenIDLoginGenerator for quickly getting creating a rails app that uses
     OpenID for authentication
   * ActiveRecordOpenIDStore plugin
 * Comprehensive test suite
 * Supports both OpenID 1 and OpenID 2 transparently
2014-07-04 12:36:34 +00:00
rodent
da081ee856 Import ruby200-openid-0.0.1 as security/ruby-openid.
OpenID support for Ruby. OpenID is a decentralized identification system that
allows users to prove they own a url. OpenID for Ruby currently includes only
consumer modules.
2014-07-04 12:35:20 +00:00