Commit graph

1708 commits

Author SHA1 Message Date
wiz
5319633bb2 Update to 1.6.7p1 (1.6.7.1):
478) Wildcards now work correctly in the env_keep Defaults directive.
479) Added support for non-root timestamp dirs.  This allows the timestamp
     dir to be shared via NFS (though this is not recommended).
480) Removed double printing of bad environment variable table in -V mode.
481) configure script has been regenerated with autoconf 2.5.7.
     This required some changes to configure.in.
482) Fixed a compilation problem on SunOS; thanks to Alek O. Komarnitsky.
483) SecurID 5.0 API support from Michael Stroucken.
484) Restore state of signal handlers to what we had upon startup.
     Fixes a problem when using sudo with nohup; thanks to Paul Markham.
485) Revamp set_perms() to use setresuid() or setreuid() when available
     in preference to POSIX stuff since they allow us to properly
     implement "stay_setuid" whereas POSIX does not really.
486) In strict mode sudo did not throw an error for undefined User_Aliases.
487) Fixed a Makefile bug on IRIX.
488) Write the prompt *after* turning off echo to avoid some password
     characters being echoed on heavily-loaded machines with fast typists.
489) Added %U and %H escapes in the prompt and fixed treatment of %%.
490) Visudo will now add a final newline to sudoers if the user's editor
     not add one before EOF.
491) The lexer state is now reset to its initial value on EOF.
     Previously, the state was not reset between parser invocations
     which could cause problems for visudo in rare cases.
492) Added support for Defaults that apply based on the RunasUser.
493) Sudo now includes copies of strlc{at,py} and uses them throughout.
494) Sudo is now careful to avoid interger overflow when allocating
     memory.  This is one of those "should not happen" situations.
495) Added a configure option (--with-stow) to make sudo compatible
     with GNU stow.
496) auth/kerb5.c now compiles under Heimdal.
497) The volatile prefix is used in the hopes of preventing compilers
     from optimizing away memory zeroing.  Unfortunately, this results
     in some warnings from gcc.
498) Better Kerberos IV/V support in the configure script.
499) Fixed a logic thinko in the SIGCHLD handler that caused problems
     with rlogin on HP-UX.
500) configure now adds -R to LDFLAGS when it adds -L for Solaris and
     SVR4.  There is a configure option, --with-rpath, to control this.
501) On AIX, configure will pass extra directory paths to the linker
     via the -blibpath ld option.  This is only active when additional
     library paths are used.  It may be disabled via the
     --without-blibpath configure option.
502) The --with-skey and --with-opie configure options now take
     an optional directory argument that should have an include and
     lib dir for the skey/opie include file and library respectively.
503) Fixed false positives in the overflow detection of expand_prompt().
2003-04-01 16:07:21 +00:00
jmmv
0916498c1b Place WRKSRC where it belongs, to make pkglint happy; ok'ed by wiz. 2003-03-29 12:40:00 +00:00
wiz
f2c0357f0b Remove unnecessary empty lines. 2003-03-28 21:24:22 +00:00
wiz
28a4483bc7 NO_PATCH is deprecated, says pkglint. Remove it. 2003-03-28 21:14:10 +00:00
jschauma
d928b8f223 De-confusify: Let emulators/suse_*/Makefile.* _not_ include bsd.pkg.mk, but rather
make all packages that use linux emulation include bsd.pkg.mk as the
last files just like any normal package.
2003-03-26 04:05:37 +00:00
grant
6d16b9adea grammar tweak 2003-03-25 17:27:49 +00:00
grant
27ac8ca77c use RCD_SCRIPTS. 2003-03-25 15:51:50 +00:00
lukem
15fbb8b0eb both: use pidfile
sfssd: support "reload"
sfssd: call sfskey gen with "-K -l sfs_host_key" to prevent interactive Q's

bump PKGREVISION (to 2)
2003-03-25 06:45:00 +00:00
ad
39ce4f0452 Update MASTER_SITES. 2003-03-23 22:33:23 +00:00
lukem
6ef8b32307 use PKG_SYSCONFSUBDIR=sfs
use /var/sfs instead of /usr/pkg/var/sfs
use OWN_DIRS_PERMS
bump PKGREVISION
2003-03-23 14:28:31 +00:00
jmc
ada44c37a8 Correct DEPENDS line to proper format 2003-03-22 23:02:55 +00:00
jmc
bb93d6e717 Correct DEPENDS line to proper format 2003-03-22 22:09:02 +00:00
lukem
851f4d0dac remove entries which aren't installed (and I couldn't find any
reference to them in the distribution, either):
	bin/fake-agent
	bin/rpc_pcl
	bin/rpc_psrv
	bin/smkdirall
	bin/smount
	bin/snfsfstab
	bin/snfshost
	bin/snfsmount
	bin/snfspsrv
	bin/snfsumount
	bin/snfsuser
	bin/sumount
	bin/sumountall
	etc/rpc_pcl.conf
	lib/perl5/site_perl/5.6.1/SNFS.pm
	lib/perl5/site_perl/5.6.1/auto/SNFS/autosplit.ix
2003-03-22 22:07:22 +00:00
jmmv
efcc873fa4 Install an rc.d script; closes PR pkg/20841 and PR pkg/20842 by David Ferlier.
Sort the Makefile a bit.  Install a default configuration file in place.
Bump PKGREVISION to 1.
2003-03-22 11:00:16 +00:00
seb
c387ecacba * Add patch from http://www.openssl.org/news/secadv_20030317.txt:
Researchers have discovered a timing attack on RSA keys, to which
OpenSSL is generally vulnerable, unless RSA blinding has been turned
on.

Typically, it will not have been, because it is not easily possible to
do so when using OpenSSL to provide SSL or TLS.

The enclosed patch switches blinding on by default. Applications that
wish to can remove the blinding with RSA_blinding_off(), but this is
not generally advised. It is also possible to disable it completely by
defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time.

The performance impact of blinding appears to be small (a few
percent).

This problem affects many applications using OpenSSL, in particular,
almost all SSL-enabled Apaches. You should rebuild and reinstall
OpenSSL, and all affected applications.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0147 to this issue.

* Add patch from http://www.openssl.org/news/secadv_20030319.txt:

Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa
have come up with an extension of the "Bleichenbacher attack" on RSA
with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0.  Their
attack requires the attacker to open millions of SSL/TLS connections
to the server under attack; the server's behaviour when faced with
specially made-up RSA ciphertexts can reveal information that in
effect allows the attacker to perform a single RSA private key
operation on a ciphertext of its choice using the server's RSA key.
Note that the server's RSA key is not compromised in this attack.

* Bump PKGREVISION.
2003-03-21 18:40:48 +00:00
jlam
3180d742a7 Add and enable cy2-{login,ntlm}. 2003-03-19 22:29:30 +00:00
jlam
4ab2bc5741 Initial import of security/cy2-ntlm.
This is the Cyrus SASL plugin that implements the NTLM (MS Windows NT)
authentication mechanism.
2003-03-19 22:28:53 +00:00
jlam
cf0f11028c Initial import of security/cy2-login.
This is the Cyrus SASL plugin that implements the LOGIN authentication
mechanism.  It's recommended that it only be used if absolutely necessary
since it is not a secure authentication scheme.
2003-03-19 22:28:23 +00:00
jlam
cc05368605 Rearrange the Makefile logic so that we can easily create Cyrus SASL 2.x
plugin packages.
2003-03-19 22:25:05 +00:00
jlam
be64260afd ${SASLSOCKETDIR} is removed by the DEINSTALL script, so remove this
redundant command.
2003-03-19 22:24:21 +00:00
jlam
ee14a59286 cyrus-sasl2 libraries have no library dependencies on PAM. 2003-03-19 22:22:34 +00:00
jlam
d99c1918d2 Add and enable cy-login 2003-03-19 21:11:03 +00:00
jlam
6dc0b0eaf3 Initial import of security/cy-login.
This is the Cyrus SASL plugin that implements the LOGIN authentication
mechanism.  It's recommended that it only be used if absolutely necessary
since it is not a secure authentication scheme.
2003-03-19 21:09:46 +00:00
jlam
1bcf64119a Add a section to deal with SASL plugins, and clarify where this file
should be included in package Makefiles.
2003-03-19 21:07:54 +00:00
jlam
11f6e9458c Rearrange some of the Makefile logic so that we can create Cyrus SASL
plugin packages.
2003-03-19 21:02:00 +00:00
agc
2708558756 Add and enable sfs. 2003-03-17 21:02:37 +00:00
agc
0b1292b249 Initial import of sfs-0.7.2 into the NetBSD Packages Collection.
Based on the sfs-0.6 package provided by Michael Santos in PR 18528.

SFS is a secure, global network file system with completely
decentralized control. SFS lets you access your files from anywhere
and share them with anyone, anywhere. Anyone can set up an SFS
server, and any user can access any server from any client. SFS
lets you share files across administrative realms without involving
administrators or certification authorities.
2003-03-17 21:01:47 +00:00
jlam
3ef633718c (1) Publicly export the value of _OPSYS_RPATH_NAME as RPATH_FLAG;
Makefiles simply need to use this value often, for better or for
    worse.

(2) Create a new variable FIX_RPATH that lists variables that should
    be cleansed of -R or -rpath values if ${_USE_RPATH} is "no".  By
    default, FIX_RPATH contains LIBS, X11_LDFLAGS, and LDFLAGS, and
    additional variables may be appended from package Makefiles.
2003-03-14 19:37:30 +00:00
salo
d1a8d95ec0 Updated to latest stable version 0.3.15.
Changes:

- The progress status is sent via the progress callbacks in
  gpgme_op_edit.
- Bug fix for signing operations with explicit signer settings
  for the CMS protocol.
2003-03-11 00:11:31 +00:00
wiz
bcfe715990 Update to 1.22.
This release changes the output format slightly to improve integration with
other tools, and improves the RPM packaging.
2003-03-09 18:11:05 +00:00
jschauma
5401719b98 Update fsh to 1.2. Changes since 1.1:
Use Bugzilla for bug reporting.
	* README: Mention Bugzilla.
	* fsh.texi (Bugs): Mention Bugzilla.

	Port to Python 2.2. (Bug 332).
	* fshcompat.py: New module, that finds some constants in os,
	fcntl, FCNTL or thin air depending on Python version.
	* fshlib.py: Use fshcompat instead of FCNTL.
	* infshd.py: Ditto.
	* Makefile.am (pkgdata_DATA): Added fshcompat.py.
2003-03-05 21:59:34 +00:00
seb
0ebf42d068 Pass prefix to openssl as argument to the configure stage: helps
when openssl is not in places planned by Makefile.PL (like
LOCALBASE).
2003-03-05 11:42:53 +00:00
wiz
9a4ac96c19 Remove obsolete and vulnerable libmcrypt22 package. 2003-03-05 09:10:22 +00:00
wiz
1ac924873a Use the libmcrypt package instead of the obsolete libmcrypt22 one.
Bump PKGREVISION.
2003-03-05 09:07:23 +00:00
wiz
79e9db5333 Unneeded after 2.5.6 update. 2003-03-05 08:49:29 +00:00
wiz
acb389814b Update to 2.6.4.
21Feb2003: Version 2.6.4
	- Updated Spanish-Argentina translation by Ariel
	Fermani.
	- Some fixes for compiling under win32.
        - Some fixes to allow compiling gaaout.c with external
          CFLAGS and CPPFLAGS.

04Oct2002: Version 2.6.3
	- Added support for 64 bit file offsets. Based on patch by
          Keven Belanger.

23Jun2002: Version 2.6.2
	- Corrections in localization
	- Added Spanish-Argentina translation. Translated by Ariel
	Fermani.

15Jun2002: Version 2.6.1
	- Better error checking
	- Added rndunix random gatherer from gnupg. It is
	  a gatherer for random bytes, written by Peter Gutmann.
	- Added some kind of random byte generator for Win32
	  systems.
	- Corrected bug in configuration file parsing.
	- Corrected bug in bare mode which put an IV in the
	  encrypted file even if the mode did not support IV.

29May2002: Version 2.6.0
	- Added OpenPGP support (added by Timo Schulz)
	- Removed all of file locking code.
	- Several improvements and corrections on the old
          codebase (still a mess).

11Mar2002: Version 2.5.13
	- Corrected stream modes in block algorithms

29Jan2002: Version 2.5.12
	- Added some missing files

26Jan2002: Version 2.5.11
	- SHA1 is the default digest used

01Dec2001:
	- Added --time option
2003-03-05 08:44:56 +00:00
wiz
4ae327b008 Update to 2.5.6.
January 19 2003: (version 2.5.6)
- Fixes in win32 detection and DLL building.
- Fixes for solaris (a symbol was not exported)
- Corrected bug which made algorithm symbols to be inserted
  twice in symbol table.

December 22 2002: (version 2.5.5)
- Better win32 detection and DLL building.
- Changed some variables names in gost.c to allow compiling
  with gcc and K6 optimizations.
- Some buffer overrun checks on input. Patches and suggestions
  by Ilia A.
- Made the default behaviour to include all algorithms into
  the main library, instead of using dynamic modules. Dynamic
  loading is disabled by default. The --enable-dynamic-loading flag
  can be used in the configure script, to get the old behaviour.
- Some fixes in ECB mode.

August 16 2002: (version 2.5.3)
- The const keyword is now used in the exported functions
- Corrected problem in libltdl's configure script

June 22 2002: (version 2.5.2)
- Fixed bug in the returned IV size of ARCFOUR
- Fixed bug in mcrypt_readdir() which prevented the test programs
  to work.

May 30 2002: (version 2.5.1)
- Corrected the license. COPYING.LIB (LGPL) is now included
  instead of COPYING (GPL)

Mar 09th 2002: (version 2.5.0)
- Several corrections in stream and block cipher modes.
- Added --disable-dynamic-loading configure option
- The IV modifications in Arcfour and Wake have been disabled
  by default.
- Added CTR mode for block ciphers.
- Fixes in nCFB and nOFB modes.
- Added mcrypt_enc_get_state() function.
- Added test for nCFB, CFB, nOFB and CTR with AES

Feb 14th 2002:
- nOFB and nCFB modes can now encrypt and decrypt plaintext
  of size less than block size.
2003-03-05 08:42:55 +00:00
jschauma
86e6bcbf20 Use new IMAKE_MAN_PATH variables in PLISTs to make these packages more
portable.  Bump PKGREVISION accordingly.
2003-03-03 02:45:51 +00:00
grant
90181f93e7 tweak linking of libssl so it can find libcrypto. 2003-02-28 08:08:20 +00:00
seb
3869278076 Update to version 2.1.12.
New in 2.1.12
-------------
* Distribute in Solaris tar (not GNU tar format)
* Fix a number of build/configure related issues.

New in 2.1.11
-------------
* Add the fastbind auth method to the saslauthd LDAP module.
* Fix a potential memory leak in the doors version of saslauthd.
* NTLM now only requires one of LM or NT, not both.
* Fix a variety of Berkeley DB, LDAP, OpenSSL, and other build issues.
* Win32 support compiles, but no documentation as of yet.
2003-02-27 13:18:06 +00:00
wiz
f628ba9e29 Add patch from http://www.openssl.org/news/secadv_20030219.txt:
In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
via timing by performing a MAC computation even if incorrrect
block cipher padding has been found.  This is a countermeasure
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CAN-2003-0078)

Bump PKGREVISION.
2003-02-20 07:59:24 +00:00
jmmv
3a84fed861 GConf2's buildlink2.mk now creates a gconftool-2 wrapper which prevents the
configuration database from beeing modified by packages that do not honour
the --disable-schemas-install option. There is no need to patch these broken
packages any more.

Okay'ed by wiz.
2003-02-18 20:52:05 +00:00
jmmv
dea9abf569 Use the omf.mk file provided by the scrollkeeper package to automatically
rebuild the documentation database at install/deinstall time. This means
that:
- PLIST's do not need to call scrollkeeper-{update,rebuilddb} directly;
  this is done by a bsd.pkg.install.mk template.
- The share/omf directory is only removed by scrollkeeper, which is the
  last package in the dependancy tree.
- PKGREVISION is bumped.

Reviewed by wiz.
2003-02-18 14:55:54 +00:00
dillo
5f4ad95078 convert to use test target from bsd.pkg.mk
addresses PR pkg/19416
2003-02-17 15:27:58 +00:00
markd
69373d994d Add and enable kssh. 2003-02-16 11:13:58 +00:00
markd
5daa81ba7e Initial import of kssh-0.7.
From Juan RP in PR 20346.

KSSH is a KDE front-end to ssh.
It can work as a standard KDE application that launches ssh connections in
a terminal or as a konsole session. This means that you can press in any
konsole "New Session" and then select "Secure Shell".
2003-02-16 11:12:21 +00:00
jmmv
aece36b6e1 Update to 0.7.0. Changes since 0.5.0:
seahorse 0.7.0
--------------
	* Add a user ID
	* Add a subkey
	* Delete a subkey
	* Change a subkey's expiration
	* Revoke a subkey
	* Properties shows subkey status (good, revoked, expired)
	* Key Manager shows user IDs instead of subkeys
	* Sort keys by user ID & validity in Key Manager and Recipients
	* Subkeys hidden by default in properties

seahorse 0.6.2
--------------
	* Bug fix in GPGME check
	* Supported languages: cs, de, es, hu, ja, nl, no, sv, tr
	* Interface fixups so buttons are not sensitive when they cannot be
	  used

seahorse 0.6.1
--------------
	* Correctly check for GPGME 0.3.14 and GnuPG 1.2 during build
	* More and updated translations
	* Key manager updates all keys when changed
	* Preferences loads faster
	* More HIG compliant windows & dialogs
	* Failure to install schemas does not stop installation
	* Better about dialog: shows version & lists translators

seahorse 0.6.0
--------------
	* Key properties cleanups
	* Less passphrase crashes
	* Only one window of each type or of each type per key allowed open
	* Less memory leaks
	* Preferences is slower to load, but keeps track of default signer
	  better
	* Updated help manual with figures
	* More translations
	* Migration to GNOME

(missed in previous commit)
2003-02-15 11:04:25 +00:00
jmmv
3258c7bb60 Update to 0.7.0. Changes since 0.5.0:
seahorse 0.7.0
--------------
	* Add a user ID
	* Add a subkey
	* Delete a subkey
	* Change a subkey's expiration
	* Revoke a subkey
	* Properties shows subkey status (good, revoked, expired)
	* Key Manager shows user IDs instead of subkeys
	* Sort keys by user ID & validity in Key Manager and Recipients
	* Subkeys hidden by default in properties

seahorse 0.6.2
--------------
	* Bug fix in GPGME check
	* Supported languages: cs, de, es, hu, ja, nl, no, sv, tr
	* Interface fixups so buttons are not sensitive when they cannot be
	  used

seahorse 0.6.1
--------------
	* Correctly check for GPGME 0.3.14 and GnuPG 1.2 during build
	* More and updated translations
	* Key manager updates all keys when changed
	* Preferences loads faster
	* More HIG compliant windows & dialogs
	* Failure to install schemas does not stop installation
	* Better about dialog: shows version & lists translators

seahorse 0.6.0
--------------
	* Key properties cleanups
	* Less passphrase crashes
	* Only one window of each type or of each type per key allowed open
	* Less memory leaks
	* Preferences is slower to load, but keeps track of default signer
	  better
	* Updated help manual with figures
	* More translations
	* Migration to GNOME
2003-02-15 11:03:42 +00:00
dmcmahill
21473236f5 fix compilation problems on systems that don't have ldconfig. 2003-02-09 16:16:56 +00:00
shell
4174e9ad6e Updated to p5-SSLeay-0.47
Changes from 0.45
+ Added patch from Pavel Hlavnicka for freeing memory leaks
  from SSL_CTX_use_pkcs12_file() whose functionality is triggered
  by the $ENV{HTTPS_PKCS12_*} settings
+ Set timeout to 15 seconds for ./net_ssl_test and lwp-ssl-test
  sample scripts for better testing of timeout behavior
+ Added alarm() during Net::SSL->read() to honor socket timeout setting
  for more robust applications.  read() will die_with_error() which
  in consistent with previous semantics used during SSL read() failure
  Thanks to Pavel Hlavnicka for prompting this change.
+ Removed code that supported versions of SSLeay before version 0.8
  I believe SSLeay v.8 was released back in 1998
+ Added patch from Devin Heitmueller so that initial random seed
  would be taken from /dev/urandom if available via RAND_load_file API
2003-02-09 08:09:08 +00:00
dmcmahill
d0d199d53c do not disable asm on alpha. fixes recently noted compile problems 2003-02-08 23:01:02 +00:00
dmcmahill
29e312f193 fix some format strings for 64 bit systems so this can build with -Werror 2003-02-08 17:06:26 +00:00
grant
b2dad3eb2c add newline to end of perl script. while I'm here, clean up
post-configure target and whitespace.

fixes PR pkg/20210 from Jesse Kempf.
2003-02-05 06:29:54 +00:00
tron
76bb1cfd97 Set "USE_LIBTOOL" even if we use the bundled "libtool" so that
buildlink2 will do the right thing.
2003-02-02 22:00:24 +00:00
jmmv
9c8a584f4e Make this package honor PKG_SYSCONFDIR. Bump PKGREVISION. 2003-02-02 21:32:11 +00:00
jmmv
104203ffab Make this package honor PKG_SYSCONFDIR. Bump PKGREVISION. 2003-02-02 19:47:35 +00:00
tron
55cb04d56c Add and enable "libgcrypt". 2003-02-02 17:28:51 +00:00
tron
f28db5fa67 Import new "libgcrypt" package: GNU's cryptographic library
This fixes PR pkg/19732 by Juan RP.
2003-02-02 17:27:47 +00:00
shell
6bf2be9ec2 Updated to p5-Digest-MD2-2.01
Changes :
- Support UTF8 strings in newer versions of Perl.
2003-01-31 10:50:49 +00:00
shell
65269ab93e Updated to p5-Digest-SHA1-2.02
Changes :
- Make it work when there is a mismatch between the
  sizeof(BYTEORDER) and sizeof(long).  Based on patch
  Allen Smith <easmith@beatrice.rutgers.edu>.
- Support UTF8 strings in newer versions of Perl.
2003-01-31 10:48:41 +00:00
jlam
d7f69e47ce Instead of including bsd.pkg.install.mk directly in a package Makefile,
have it be automatically included by bsd.pkg.mk if USE_PKGINSTALL is set
to "YES".  This enforces the requirement that bsd.pkg.install.mk be
included at the end of a package Makefile.  Idea suggested by Julio M.
Merino Vidal <jmmv at menta.net>.
2003-01-28 22:03:00 +00:00
wiz
7d417cd068 Remove (hi hubert!) 2003-01-25 13:59:05 +00:00
grant
f7b9c1222e strip leading path from $CC so we don't try to run Configure with args
eg. 'solaris-sparcv7-/usr/pkg/bin/gcc' :-)
2003-01-23 02:23:21 +00:00
seb
be72e8456a Put back MASTER_SITES. 2003-01-23 00:00:17 +00:00
salo
26ffa3bb10 s/INSTALL_*/BSD_INSTALL_*/ in patches, remove unnecessary MAKE_ENV. 2003-01-19 09:04:02 +00:00
seb
b95b9f3468 Update to version 3.5p1
Also mark this package as conflicting with ssh2 package.

Changes:

20021003
 - (djm) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/10/01 20:34:12
     [ssh-agent.c]
     allow root to access the agent, since there is no protection from root.
   - markus@cvs.openbsd.org 2002/10/01 13:24:50
     [version.h]
     OpenSSH 3.5
 - (djm) Bump RPM spec version numbers
 - (djm) Bug #406 s/msg_send/ssh_msh_send/ for Mac OS X 1.2

20020930
 - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs,
   tweak README
 - (djm) OpenBSD CVS Sync
   - mickey@cvs.openbsd.org 2002/09/27 10:42:09
     [compat.c compat.h sshd.c]
     add a generic match for a prober, such as sie big brother;
     idea from stevesk@; markus@ ok
   - stevesk@cvs.openbsd.org 2002/09/27 15:46:21
     [ssh.1]
     clarify compression level protocol 1 only; ok markus@ deraadt@

20020927
 - (djm) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/09/25 11:17:16
     [sshd_config]
     sync LoginGraceTime with default
   - markus@cvs.openbsd.org 2002/09/25 15:19:02
     [sshd.c]
     typo; pilot@monkey.org
   - markus@cvs.openbsd.org 2002/09/26 11:38:43
     [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
     [monitor_wrap.h]
     krb4 + privsep; ok dugsong@, deraadt@

20020925
 - (bal) Fix issue where successfull login does not clear failure counts
   in AIX.  Patch by dtucker@zip.com.au ok by djm
 - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
    This does not include the deattack.c fixes.

20020923
 - (djm) OpenBSD CVS Sync
   - stevesk@cvs.openbsd.org 2002/09/23 20:46:27
     [canohost.c]
     change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
     non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
   - markus@cvs.openbsd.org 2002/09/23 22:11:05
     [monitor.c]
     only call auth_krb5 if kerberos is enabled; ok deraadt@
   - markus@cvs.openbsd.org 2002/09/24 08:46:04
     [monitor.c]
     only call kerberos code for authctxt->valid
   - todd@cvs.openbsd.org 2002/09/24 20:59:44
     [sshd.8]
     tweak the example $HOME/.ssh/rc script to not show on any cmdline the
     sensitive data it handles. This fixes bug # 402 as reported by
     kolya@mit.edu (Nickolai Zeldovich).
     ok markus@ and stevesk@

20020923
 - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au

20020922
 - (djm) OpenBSD CVS Sync
   - stevesk@cvs.openbsd.org 2002/09/19 14:53:14
     [compat.c]
   - markus@cvs.openbsd.org 2002/09/19 15:51:23
     [ssh-add.c]
     typo; cd@kalkatraz.de
   - stevesk@cvs.openbsd.org 2002/09/19 16:03:15
     [serverloop.c]
     log IP address also; ok markus@
   - stevesk@cvs.openbsd.org 2002/09/20 18:41:29
     [auth.c]
     log illegal user here for missing privsep case (ssh2).
     this is executed in the monitor. ok markus@

20020919
 - (djm) OpenBSD CVS Sync
   - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
     [ssh-agent.c]
     %u for uid print; ok markus@
   - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
     [session.c ssh.1]
     add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384.  ok markus@
   - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
     [channels.c sshconnect.c sshd.c]
     remove use of SO_LINGER, it should not be needed. error check
     SO_REUSEADDR. fixup comments. ok markus@
   - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
     [session.c]
     log when _PATH_NOLOGIN exists; ok markus@
   - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
     [sshd_config.5]
     more details on X11Forwarding security issues and threats; ok markus@
   - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
     [sshd.8]
     reference moduli(5) in FILES /etc/moduli.
   - itojun@cvs.openbsd.org 2002/09/17 07:47:02
     [channels.c]
     don't quit while creating X11 listening socket.
     http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
     got from portable.  markus ok
   - djm@cvs.openbsd.org 2002/09/19 01:58:18
     [ssh.c sshconnect.c]
     bugzilla.mindrot.org #223 - ProxyCommands don't exit.
     Patch from dtucker@zip.com.au; ok markus@

20020912
 - (djm) Made GNOME askpass programs return non-zero if cancel button is
   pressed.
 - (djm) Added getpeereid() replacement. Properly implemented for systems
   with SO_PEERCRED support. Faked for systems which lack it.
 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
   fake-queue.h to sys-tree.h and sys-queue.h
 - (djm) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/09/08 20:24:08
     [hostfile.h]
     no comma at end of enumerator list
   - itojun@cvs.openbsd.org 2002/09/09 06:48:06
     [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
     [monitor_wrap.c monitor_wrap.h]
     kerberos support for privsep.  confirmed to work by lha@stacken.kth.se
     patch from markus
   - markus@cvs.openbsd.org 2002/09/09 14:54:15
     [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
     signed vs unsigned from -pedantic; ok henning@
   - markus@cvs.openbsd.org 2002/09/10 20:24:47
     [ssh-agent.c]
     check the euid of the connecting process with getpeereid(2);
     ok provos deraadt stevesk
   - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
     [ssh.1]
     add agent and X11 forwarding warning text from ssh_config.5; ok markus@
   - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
     [authfd.c authfd.h ssh.c]
     don't connect to agent to test for presence if we've previously
     connected; ok markus@
   - djm@cvs.openbsd.org 2002/09/11 22:41:50
     [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
     [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
     support for short/long listings and globbing in "ls"; ok markus@
   - djm@cvs.openbsd.org 2002/09/12 00:13:06
     [sftp-int.c]
     zap unused var introduced in last commit

20020911
 - (djm) Sync openbsd-compat with OpenBSD -current

20020910
 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
   Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
   Patch from Robert Halubek <rob@adso.com.pl>

20020905
 - (djm) OpenBSD CVS Sync
   - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
     [servconf.c sshd.8 sshd_config.5]
     default LoginGraceTime to 2m; 1m may be too short for slow systems.
     ok markus@
 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
    Nalin Dahyabhai <nalin@redhat.com>
 - (djm) Add support for building gtk2 password requestor from Redhat beta

20020903
 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
 - (djm) Fix Redhat RPM build dependancy test
 - (djm) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/08/12 10:46:35
     [ssh-agent.c]
     make ssh-agent setgid, disallow ptrace.
   - espie@cvs.openbsd.org 2002/08/21 11:20:59
     [sshd.8]
     `RSA' updated to refer to `public key', where it matters.
     okay markus@
   - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
     [servconf.c sshd.8 sshd_config sshd_config.5]
     change LoginGraceTime default to 1 minute; ok mouring@ markus@
   - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
     [ssh-agent.c]
     raise listen backlog; ok markus@
   - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
     [ssh-agent.c]
     use common close function; ok markus@
   - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
     [clientloop.c]
     format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
     ok markus@
   - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
     [ssh-agent.c]
     shutdown(SHUT_RDWR) not needed before close here; ok markus@
   - markus@cvs.openbsd.org 2002/08/22 21:33:58
     [auth1.c auth2.c]
     auth_root_allowed() is handled by the monitor in the privsep case,
     so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
   - markus@cvs.openbsd.org 2002/08/22 21:45:41
     [session.c]
     send signal name (not signal number) in "exit-signal" message; noticed
     by galb@vandyke.com
   - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
     [ssh-rsa.c]
     RSA_public_decrypt() returns -1 on error so len must be signed;
     ok markus@
   - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
     [ssh_config.5]
     some warning text for ForwardAgent and ForwardX11; ok markus@
   - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
     [monitor.c session.c sshlogin.c sshlogin.h]
     pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
     NOTE: there are also p-specific parts to this patch. ok markus@
   - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
     [ssh.1 ssh.c]
     deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
   - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
     [ssh_config.5]
     more on UsePrivilegedPort and setuid root; ok markus@
   - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
     [ssh.c]
     shrink initial privilege bracket for setuid case; ok markus@
   - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
     [ssh_config.5 sshd_config.5]
     state XAuthLocation is a full pathname

20020820
 - OpenBSD CVS Sync
   - millert@cvs.openbsd.org 2002/08/02 14:43:15
     [monitor.c monitor_mm.c]
     Change mm_zalloc() sanity checks to be more in line with what
     we do in calloc() and add a check to monitor_mm.c.
     OK provos@ and markus@
   - marc@cvs.openbsd.org 2002/08/02 16:00:07
     [ssh.1 sshd.8]
     note that .ssh/environment is only read when
     allowed (PermitUserEnvironment in sshd_config).
     OK markus@
   - markus@cvs.openbsd.org 2002/08/02 21:23:41
     [ssh-rsa.c]
     diff is u_int (2x); ok deraadt/provos
   - markus@cvs.openbsd.org 2002/08/02 22:20:30
     [ssh-rsa.c]
     replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
     for authentication; ok deraadt/djm
   - aaron@cvs.openbsd.org 2002/08/08 13:50:23
     [sshconnect1.c]
     Use & to test if bits are set, not &&; markus@ ok.
   - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
     [auth.c]
     typo in comment
   - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
     [sshd_config.5]
     use Op for mdoc conformance; from esr@golux.thyrsus.com
     ok aaron@
   - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
     [sshd_config.5]
     proxy vs. fake display
   - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
     [ssh.1 sshd.8 sshd_config.5]
     more PermitUserEnvironment; ok markus@
   - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
     [ssh.1]
     ForwardAgent has defaulted to no for over 2 years; be more clear here.
   - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
     [ssh_config.5]
     ordered list here
 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX.  So assign
   it to ULONG_MAX.

20020813
 - (tim) [configure.ac] Display OpenSSL header/library version.
   Patch by dtucker@zip.com.au

20020731
 - (bal) OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/07/24 16:11:18
     [hostfile.c hostfile.h sshconnect.c]
     print out all known keys for a host if we get a unknown host key,
     see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4

     the ssharp mitm tool attacks users in a similar way, so i'd like to
     pointed out again:
        A MITM attack is always possible if the ssh client prints:
        The authenticity of host 'bla' can't be established.
     (protocol version 2 with pubkey authentication allows you to detect
     MITM attacks)
   - mouring@cvs.openbsd.org 2002/07/25 01:16:59
     [sftp.c]
     FallBackToRsh does not exist anywhere else.  Remove it from here.
     OK deraadt.
   - markus@cvs.openbsd.org 2002/07/29 18:57:30
     [sshconnect.c]
     print file:line
   - markus@cvs.openbsd.org 2002/07/30 17:03:55
     [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
     add PermitUserEnvironment (off by default!); from dot@dotat.at;
     ok provos, deraadt

20020730
 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de

20020728
 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
 - (stevesk) [CREDITS] solar
 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
   char arg.

20020725
 - (djm) Remove some cruft from INSTALL
 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/

20020723
 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
 - (bal) sync ID w/ ssh-agent.c
 - (bal) OpenBSD Sync
   - markus@cvs.openbsd.org 2002/07/19 15:43:33
     [log.c log.h session.c sshd.c]
     remove fatal cleanups after fork; based on discussions with and code
     from solar.
   - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
     [ssh.c]
     display a warning from ssh when XAuthLocation does not exist or xauth
     returned no authentication data. ok markus@
   - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
     [auth-options.c]
     unneeded includes
   - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
     [auth-options.h]
     remove invalid comment
   - markus@cvs.openbsd.org 2002/07/22 11:03:06
     [session.c]
     fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
   - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
     [monitor.c]
     u_int here; ok provos@
   - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
     [sshd.c]
     utmp_len is unsigned; display error consistent with other options.
     ok markus@
   - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
     [uidswap.c]
     little more debugging; ok markus@

20020722
 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
 - (stevesk) [xmmap.c] missing prototype for fatal()
 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
   with Cray (mostly #ifdef renaming).  Patch by wendyp@cray.com.
 - (bal) [configure.ac]  Missing ;; from cray patch.
 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
   into it's own header.
 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
   freed by the caller; add free_pam_environment() and use it.
 - (stevesk) [auth-pam.c] typo in comment

20020721
 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
   openssh-3.4p1-owl-password-changing.diff
 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
   PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
   warning on pam_conv struct conversation function.
 - (stevesk) [auth-pam.h] license
 - (stevesk) [auth-pam.h] unneeded include
 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h

20020720
 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().

20020719
 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
   Patch by dtucker@zip.com.au
 - (tim) [configure.ac]  test for libxnet on HP. Patch by dtucker@zip.com.au

20020718
 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
   by ayamura@ayamura.org
 - (tim) [configure.ac] Bug 267 rework int64_t test.
 - (tim) [includes.h] Bug 267 add stdint.h

20020717
 - (bal) aixbff package updated by dtucker@zip.com.au
 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
   for autoconf 2.53. Based on a patch by jrj@purdue.edu

20020716
 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found

20020715
 - (bal) OpenBSD CVS Sync
   - itojun@cvs.openbsd.org 2002/07/12 13:29:09
     [sshconnect.c]
     print connect failure during debugging mode.
   - markus@cvs.openbsd.org 2002/07/12 15:50:17
     [cipher.c]
     EVP_CIPH_CUSTOM_IV for our own rijndael
 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
   dtucker@zip.com.au plus a a more KNF since I am near it.
 - (bal) Privsep user creation support in Solaris buildpkg.sh by
   dtucker@zip.com.au

20020714
 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
   openbsd-compat/Makefile.in] support compression on platforms that
   have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
   Based on patch from nalin@redhat.com of code extracted from Owl's package
 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
   report by chris@by-design.net
 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
   report by rodney@bond.net

20020712
 - (tim) [Makefile.in] quiet down install-files: and check-user:
 - (tim) [configure.ac] remove unused filepriv line

20020710
 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
   on /var/empty to 755 Patch by vinschen@redhat.com
 - (bal) OpenBSD CVS Sync
   - itojun@cvs.openbsd.org 2002/07/09 11:56:50
     [sshconnect.c]
     silently try next address on connect(2).  markus ok
   - itojun@cvs.openbsd.org 2002/07/09 11:56:27
     [canohost.c]
     suppress log on reverse lookup failiure, as there's no real value in
     doing so.
     markus ok
   - itojun@cvs.openbsd.org 2002/07/09 12:04:02
     [sshconnect.c]
     ed static function (less warnings)
   - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
     [sshd_config.5]
     clarify no preference ordering in protocol list; ok markus@
   - itojun@cvs.openbsd.org 2002/07/10 10:28:15
     [sshconnect.c]
     bark if all connection attempt fails.
   - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
     [rijndael.c]
     use right sizeof in memcpy; markus ok

20020709
 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
   lacking that concept can share it. Patch by vinschen@redhat.com

20020708
 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
   work in a jumpstart environment. patch by kbrint@rufus.net
 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
   --with-privsep-path=

20020707
 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
 - (tim) [acconfig.h configure.ac sshd.c]
   s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
   patch from vinschen@redhat.com
 - (bal) [realpath.c] Updated with OpenBSD tree.
 - (bal) OpenBSD CVS Sync
   - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
     [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
     patch memory leaks; grendel@zeitbombe.org
   - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
     [channels.c packet.c]
     blah blah minor nothing as i read and re-read and re-read...
   - markus@cvs.openbsd.org 2002/07/04 10:41:47
     [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
     don't allocate, copy, and discard if there is not interested in the data;
     ok deraadt@
   - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
     [log.c]
     KNF
   - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
     [ssh-keyscan.c]
     KNF, realloc fix, and clean usage
   - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
     [ssh-keyscan.c]
     unused variable
 - (bal) Minor KNF on ssh-keyscan.c

20020705
 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
   Reported by Darren Tucker <dtucker@zip.com.au>
 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
   from vinschen@redhat.com

20020704
 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
   faster data rate)  Bug #124
 - (bal) glob.c defines TILDE and AIX also defines it.  #undef it first.
   bug #265
 - (bal) One too many nulls in ports-aix.c

20020703
 - (bal) Updated contrib/cygwin/  patch by vinschen@redhat.com
 - (bal) minor correction to utimes() replacement.  Patch by
   onoe@sm.sony.co.jp
 - OpenBSD CVS Sync
   - markus@cvs.openbsd.org 2002/06/27 08:49:44
     [dh.c ssh-keyscan.c sshconnect.c]
     more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
   - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
     [monitor.c]
     improve mm_zalloc check; markus ok
   - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
     [auth2-none.c monitor.c sftp-client.c]
     use xfree()
   - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
     [ssh-keyscan.c]
     use convtime(); ok markus@
   - millert@cvs.openbsd.org 2002/06/28 01:49:31
     [monitor_mm.c]
     tree(3) wants an int return value for its compare functions and
     the difference between two pointers is not an int.  Just do the
     safest thing and store the result in a long and then return 0,
     -1, or 1 based on that result.
   - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
     [monitor_wrap.c]
     use ssize_t
   - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
     [sshd.c]
     range check -u option at invocation
   - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
     [sshd.c]
     gidset[2] -> gidset[1]; markus ok
   - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
     [auth2.c session.c sshd.c]
     lint asks that we use names that do not overlap
   - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
     [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
      monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
      sshconnect2.c sshd.c]
     minor KNF
   - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
     [msg.c]
     %u
   - markus@cvs.openbsd.org 2002/07/01 19:48:46
     [sshconnect2.c]
     for compression=yes, we fallback to no-compression if the server does
     not support compression, vice versa for compression=no. ok mouring@
   - markus@cvs.openbsd.org 2002/07/03 09:55:38
     [ssh-keysign.c]
     use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
     in order to avoid a possible Kocher timing attack pointed out by Charles
     Hannum; ok provos@
   - markus@cvs.openbsd.org 2002/07/03 14:21:05
     [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
     re-enable ssh-keysign's sbit, but make ssh-keysign read
     /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
     globally. based on discussions with deraadt, itojun and sommerfeld;
     ok itojun@
 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
 - (bal) Missed Makefile.in change.  keysign needs readconf.o
 - (bal) Clean up aix_usrinfo().  Ignore TTY= period I guess.

20020702
 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
   friends consistently. Spotted by Solar Designer <solar@openwall.com>

20020629
 - (bal) fix to auth2-pam.c to swap fatal() arguments,  A bit of style
   clean up while I'm near it.

20020628
 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
   options should contain default value.  from solar.
 - (bal) Cygwin uid0 fix by vinschen@redhat.com
 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c.  Otherwise wise
   have issues of our fixes not propogating right (ie bcopy instead of
   memmove).  OK tim
 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
   Bug #303

20020627
 - OpenBSD CVS Sync
   - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
     [monitor.c]
     correct %u
   - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
     [monitor_fdpass.c]
     use ssize_t for recvmsg() and sendmsg() return
   - markus@cvs.openbsd.org 2002/06/26 14:51:33
     [ssh-add.c]
     fix exit code for -X/-x
   - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
     [monitor_wrap.c]
     more %u
   - markus@cvs.openbsd.org 2002/06/26 22:27:32
     [ssh-keysign.c]
     bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
2003-01-19 01:26:35 +00:00
martti
4bab2ec9a5 Updated stunnel to 4.04 (upgrade to 4.03 provided by Juan RP in pkg/19310)
* New features sponsored by MAXIMUS http://www.maximus.com/
  - New 'options' configuration option to setup
    OpenSSL library hacks with SSL_CTX_set_options().
  - 'service' option also changes the name for
    TCP Wrappers access control in inetd mode.
  - SSL is negotiated before connecting remote host
    or spawning local process whenever possible.
  - REMOTE_HOST variable is always placed in the
    enrivonment of a process spawned with 'exec'.
  - Whole SSL error stack is dumped on errors.
  - Manual page updated (special thanks to Brian Hatch).
  - New user interface (config file).
  - Single daemon can listen on multiple ports, now.
  - Delayed DNS lookup added.

* Other new features
  - All the timeouts are now configurable including
    TIMEOUTclose that can be set to 0 for MSIE and other
    buggy clients that do not send close_notify.
  - Stunnel process can be chrooted in a specified directory.
  - Numerical values for setuid() and setgid() are allowed, now.
  - Confusing code for setting certificate defaults introduced in
    version 3.8p3 was removed to simplify stunnel setup.
    There are no built-in defaults for CApath and CAfile options.
  - Private key file for a certificate can be kept in a separate
    file.  Default remains to keep it in the cert file.
  - Manual page updated.
2003-01-18 08:33:42 +00:00
martti
344173b272 Updated keychain to 2.0.2
NOTE: The .ssh-agent-* files are now in the ~/.keychain/ directory. Use
something like this in your dot files:

[ -r ${HOME}/.ssh-agent-`hostname` ]   && . ${HOME}/.ssh-agent-`hostname`
[ -r ${HOME}/.keychain/`hostname`-sh ] && . ${HOME}/.keychain/`hostname`-sh
2003-01-18 05:58:58 +00:00
hubertf
6ac99e5ad9 Update p0f to 1.8.2. Changes:
1. Developer changed s/Micha³ Zalewski/William Stearns/
        2. A lot of new finger prints.
        3. GPL -> LGPL license change
        Full list (not so big) in ChangeLog

Patch contributed by Dawid Szymañski in PR 19896.
2003-01-17 23:15:23 +00:00
grant
90b34116bc add LDFLAGS to ld arguments so libpam_misc can find libpam.
fixes build problem in Hubert's bulk-build.
2003-01-13 14:18:08 +00:00
seb
54021692d0 Update to ssh version 3.2.2.
Changes since 3.2.0:
2002-10-15  Sami J. Lehtinen  <sjl@ssh.com>

        * ssh-3.2.2 (on Unix this time).

        * sshd2: Fixed a security problem with setsid() use. Now we call
          it every time, if we need to run a new process on the user's
          privileges (command, subsystem or shell). Previously, it was only
          run if the user had requested a tty (for a shell, for example).

          Special thanks to Logan Gabriel for finding this problem.

2002-10-01  Sami J. Lehtinen  <sjl@ssh.com>

        * configure: Previous: Check for /dev/pts was broken.

2002-08-08  Sami J. Lehtinen  <sjl@ssh.com>

        * ssh-3.2.2 (only Windows client, no *nix changes).

2002-07-26  Sami J. Lehtinen  <sjl@ssh.com>

        * ssh-3.2.1.

2002-07-24  Sami J. Lehtinen  <sjl@ssh.com>

        * sshd2: Fixed a bug with setpcred() usage (on AIX), which caused
          that chroot() was not done.
2003-01-12 15:15:51 +00:00
cjep
2f9e9722bf USE_PKGLOCALEDIR=yes 2003-01-10 07:49:51 +00:00
cjep
5b8c845234 USE_PKGLOCALEDIR=yes 2003-01-10 07:39:46 +00:00
mycroft
1f91e92ecd Update from 2.20 to 2.22.
Release 2.22.

   Added clone method.
   Contributed by Holger Smolinski <holger@kunterbunt.bb.bawue.de>

   Release 2.21

   Minor tweaks sync up with bleadperl:
     - VMS optimizer tweaks to the Makefile.PL
     - MacOS support
     - Added alignment test

   Added example to the MD5 POD that shows how to calculate the
   digest of Unicode strings.
2003-01-09 15:52:04 +00:00
chris
e4d5272bd4 Update checksum for idea.c.gz.
Changelog from idea.c file indicates:
* 2002-12-11 wk  __ppc__ is used on Darwin instead of __powerpc__.

Used .sig file to check download was ok.

Closes pkg/19749
2003-01-09 10:20:20 +00:00
cjep
ddd81b681e Split up installation of directories to please SunOS /usr/ucb/install 2003-01-06 07:44:11 +00:00
cjep
ffaab3bebd Instead of using -Wl,-R use -Wl,${_OPSYS_RPATH_NAME} (and pass this
value to make).
2003-01-04 11:51:29 +00:00
cjep
d0feb58df1 Pass -Wl,-R${X11BASE}/lib to cc to build ssh-askpass (instead of just -R) 2003-01-03 20:10:45 +00:00
jmmv
502d4e2e0d Change my email address to the NetBSD one (hispabsd.org -> netbsd.org).
Approved by wiz.
2003-01-03 15:26:54 +00:00
abs
69bd158e0d Fix distinfos (server holding distfiles replaced and original distfiles lost) 2003-01-02 12:33:07 +00:00
shell
695a84e287 Updated to p5-Net-SSLeay-1.21
Changes provided, but not clear, I guess should be a
functional improvement and some bugs fixed.

- Patch by Mike McCauley mikem@open.com_.au
- applied patch from Tim Engler <tim@burntcouch_.com>
- perl-5.8/gcc-3.2 patch on Makefile.PL from
  Joern_Hoos@@notes.uni-paderborn._de, lucho@@galix._com,
  bellis@@saberlogic._com, and simonclewer@@superquote._com
2002-12-31 14:15:17 +00:00
frueauf
435c6c7bc2 remove entry for "lib/nessus/plugins_factory". Reported by Bernd Ernesti
in private mail.
2002-12-30 12:13:33 +00:00
grant
36f2f3809c Use automatic PLIST handling. 2002-12-25 12:26:46 +00:00
jschauma
79eecce301 Make this work on IRIX. 2002-12-24 04:23:09 +00:00
jschauma
999e13c1b9 Add PLIST for irix6. Same as netbsd and solaris -- maybe we can combine these? 2002-12-24 03:57:04 +00:00
cjep
09132bc144 implementations->implications 2002-12-24 00:47:43 +00:00
jlam
3530f6ba5c Update security/PAM to 0.77. Changes from version 0.75 include:
* Numerous bug fixes for most of the PAM modules, including several
  string length checks and fixes (update recommended!).

* fix for legacy behavior of pam_setcred and pam_close_session in
  the case that pam_authenticate and pam_open_session hadn't been
  called

* pam_unix:
	- don't zero out password strings during password changing function
* pam_wheel:
	- feature: can use the module to provide wheel access to non-root
	  accounts.
* pam_limits:
	- added '%' domain for maxlogins limiting, now '*' and @group
	  have the old meaning (every) and '%' the new one (all)
	- handle negative priority limits (which can apply to the
	  superuser too).
* pam_userdb:
	- require that all of typed password matches that in database
* pam_access:
	- added the 'fieldsep=' argument, made a PAM_RHOST of ""
	  equivalent to NULL

Incidentally, cups-1.1.18 will once again do PAM authentication using
pam_unix.so if built against PAM-0.77.
2002-12-23 21:23:56 +00:00
cjep
afa55834c5 Whitespace fix 2002-12-23 16:24:59 +00:00
chris
55746b078e Update gpgme to 0.3.14.
From NEWS file:
Noteworthy changes in version 0.3.14 (2002-12-04)
-------------------------------------------------

 * GPGME-Plug is now in its own package "cryptplug".

 * Workaround for a setlocale problem.  Fixed a segv related to not
   correctly as closed marked file descriptors.

For full list of changes see ChangeLog.

(distfile checked against .sig file)
2002-12-22 13:53:04 +00:00
frueauf
7a24737d03 Update nessus{-core,-libraries,-plugins} and libnasl to 1.2.7.
Based on pr pkg/19438 by Adrian Portelli.

Changes since 1.2.6:

. changes by Renaud Deraison (deraison@cvs.nessus.org)
- The 'cancel' button of several file selection dialogs is now working
- Optimized several plugins :
	- Web-related checks now use http_recv() instead of recv()
	- open_priv_sock_tcp() has a lower timeout
	- RPC related checks now use get_rpc_port(), a function equivalent
	  to libc's getrpcport() but with a much smaller timeout
	- Decreased the default value of checks_read_timeout from 15 to 5
- Fixed a bug in the plugin selection GUI which would not refresh
  the list of plugins of a given family properly (bug#3)
- Fixed memory leaks in NASL
- Fixed a bug in nessusd which would make it leak memory when receiving a SIGHUP
  (bug#10)
- Fixed a compatibility problem with Nmap 3.10ALPHA (bug#11)
- Nessus now accepts nmap's U: and T: notation for the port range (bug#5)

. changes by Erik Anderson (eanders@pobox.com)
- Added CVE and BID links, added urls and removed dead links from the plugins

. changes by Michel Scheidell (scheidell@secnap.net)
- Improved several SMB-related checks

. changes by Rodolfo Baader (rbaader@activesec.biz)
- Quotes and apostrophes are properly escaped in the XML output report
2002-12-19 18:30:12 +00:00
wiz
1b7c693d6c Add and enable gtk-systrace and tkpasman. 2002-12-18 03:56:12 +00:00
wiz
6d23f68b9b GTK interface to systrace(1). 2002-12-18 03:49:56 +00:00
martti
5fc154101c On NetBSD use /dev/urandom insted of /dev/random (PR#19275).
Bump PKGREVISION.
2002-12-16 10:55:03 +00:00
schmonz
0268aa4b89 REPLACE_PERL's working directory is ${WRKSRC}, so packages needn't
prefix REPLACE_PERL definitions with ${WRKSRC}.
2002-12-14 03:43:18 +00:00
uebayasi
f79202d866 Change directory before ${FETCH_CMD} as mk/bsd.pkg.mk does. This avoids a
fetch error if FETCH_CMD is e.g. ``curl -O''.  No functional changes.
2002-12-13 11:18:14 +00:00
grant
fc4a4b389c add some missing documentation files. 2002-12-13 01:06:02 +00:00
abs
6826b96b8b shorten COMMENT 2002-12-12 14:34:49 +00:00
chris
688dada0be Update buildlink2.mk to force the use of 2.1.10. 2002-12-12 09:13:52 +00:00
chris
9b2c204ebc Update cyrus sasl to 2.1.10. As noted in pkg/19335.
Fixes a buffer overflow:
http://online.securityfocus.com/archive/1/302603

and other misc bugs.

(note .sig file checked and verified)
2002-12-11 23:48:58 +00:00
tron
39a943ad92 Replace "true" by "${TRUE}". 2002-12-09 16:01:10 +00:00
jmmv
185fedc050 Avoid using the "tl" modifier in PKGNAME. It is not supported in make of
NetBSD 1.5.
2002-12-07 11:23:48 +00:00
schmonz
0a1bd5acad Replace IGNORE with PKG_FAIL_REASON or PKG_SKIP_REASON as appropriate. 2002-12-07 02:38:52 +00:00
jmmv
1de8ecdae5 Initial import of tkpasman, version 2.2. Description follows:
TkPasMan is a simple program that lets you store usernames and passwords
you collect during access to forums, mailing lists, and other websites.
It is inspired in gpasman, but it has more paste possibilities. You can,
for example, paste the username at first and then password, using two
mouse clicks.

Passwords can be stored in a secure file, using OpenSSL to encrypt it.

This closes my own PR pkg/18884.

Approved by wiz.
2002-12-05 21:21:55 +00:00
grant
074405705a on Solaris, pass -Wl,-R ... (as per NetBSD targets) so that libssl can
find libcrypto.

fixes my PR pkg/19229.
2002-12-03 14:02:24 +00:00
tron
371bab3600 A build dependence on the "bison" package is enough. It is not required
for running this package.
2002-12-02 21:16:39 +00:00
seb
279bd27c20 Update to version 0.9b3. Okay'ed by hubertf.
Package changes: use buildlink2, ssldump command moved from bin/ to sbin/.

Selected Changelogs bits:
* Added support for VLAN networks (Jeffrey Hafey)
* Added support for non-promiscuous mode (-P flag) (Bruce M Simpson)
* Added support for session resumption.
* Added the -X flag to force hex-only printing when binary data is displayed
  as hex dumps.
* Added -r as a synonym for -f. -f will eventually
  be removed and reused for some other option.
  This was done for option compatibility with tcpdump
  and on the theory that someday I might add a -w.
* Renamed -h to -H and added it to the documentation.
  -h now triggers usage info.

Plus numerous fixes, bug fixes and security fixes.
2002-12-01 21:48:09 +00:00
mjl
d06d8cf7ea Add patch to reopen stdout/stderr to /dev/null to quelch whining about
closed descriptors in syslog.
2002-11-30 14:56:53 +00:00
uebayasi
049d5d69d6 Explicitly specify the path to Perl5 executable for configure script.
Reported by Jonathan Perkin in PR19205.
2002-11-30 05:13:23 +00:00
chris
83a775bc38 Belated bump libgpgme.so from 9.3 to 9.4.
Next time something says just updated a couple of scripts, I won't believe it.

Thanks to skrueger for pointing this out 8)
2002-11-29 00:14:44 +00:00
cjep
137d358f18 Add RCS Tag. 2002-11-26 21:51:55 +00:00
pooka
f6a99772de add&enable hackbot 2002-11-26 13:48:42 +00:00
pooka
c9624f493c hackbot 2.15 provided by Niilo Kajander in pkg/19151
from DESCR:
Hackbot is a vulnerability scanner that started as a joke at first, but now
it has become a serious project. Hackbot scans over 300 CGI's, scans for
banners of several services, does unicode checks, checks for open relays,
outsmarts Cisco PIX MailGuard, can do ripe checkup, spamcop db checkup, X
connect test and lots more.
2002-11-26 13:40:17 +00:00
seb
76e473a890 Trivially use buildlink2. 2002-11-24 22:23:12 +00:00
seb
e127039faa As I said before this INSTALL script is not needed anymore: /usr/lib/sasl2
is not needed!
2002-11-24 22:18:23 +00:00
dillo
2805cfca36 use test target provided by bsd.pkg.mk instead of home grown one. 2002-11-24 18:47:48 +00:00
chris
7c89b99007 Rename the regress target test. This appears to be the new standard:
http://mail-index.netbsd.org/pkgsrc-changes/2002/11/23/0009.html
2002-11-24 16:52:05 +00:00
chris
47ffacbf6f Update gpgme to 0.3.13.
Only change (other than version) is:
* config.sub, config.guess: Updated from ftp.gnu.org/gnu/config
to version 2002-11-08.
2002-11-24 13:51:33 +00:00
chris
fe47a89cdb Seems that gnupg now depends on perl being available to create, install
and run gpgkeys_mailto

Fixes PR pkg/19104

Also bump pkgrevision.
2002-11-24 12:22:16 +00:00
chris
e8d6997dad saslauthd daemonises itself, so we don't need to background it, and
we don't really need to sleep 2 while it gets going.
2002-11-23 15:07:46 +00:00
chris
8f034dce82 Match the default for the sasl socket dir, IE /var/run/saslauthd.
Also the dir is now root owned, but with 755 permissions, previously it was
cyrus owned.

Bump PKGREVISION to 2.
2002-11-23 14:44:53 +00:00
itojun
84deb1f634 adjust version date embedded into binary 2002-11-20 03:33:49 +00:00
itojun
4a25e5820a upgrade to 20021120.
- fix sha2 computation (was in patch-ag)
- plug some memory leaks
- more strict isakmp header length check
- correct phase 2 proposal reqid handling
- check for fd_set overrun
2002-11-20 03:26:26 +00:00
martti
ce871f4992 Updated isakmpd to 20021118
* bug fixes
2002-11-18 12:07:41 +00:00
jlam
aca0f11a1d Whitespace fixes for 80-char wide displays. 2002-11-15 01:18:39 +00:00
jlam
19b404bbc7 buildlink1 -> buildlink2 2002-11-15 00:15:02 +00:00
seb
3258c54477 Bump PKGREVISION:
- No need for /usr/lib/sasl2 anymore: INSTALL script removed, DEINSTALL
  script tuned.
- Removed auto* tools dependencies by providing patch files for generated
  configure and Makefile.in.
- Use ${PKGDIR} instead of ${.CURDIR} for PLIST_SRC files.
- `--with-rc4' does not need an argument.
- Use BUILDLINK_PREFIX.whatever instead of BUILDLINK_DIR.
- Fix GSSAPI build for non-current NetBSD, this includes patch-ag removal.
- Fix PLIST handling by providing PLIST.post (lib/sasl2 removal at deinstall
  time) and fixing PLIST.common (include/sasl removal at deinstall time).
- Bump BUILDLINK_DEPENDS.cyrus-sasl in buildlink2.mk.
- Work around problem introduced by LTCONFIG_OVERRIDE and direct usage
  of ac_cv_can_build_shared in configure.in as suggested by Nick Hudson.
  Remove patch-ab (sasl-config is gone btw, it was not needed anyway).
  This should fix plugins shared libs problem as reported -among other-
  in PR pkg/19001 by Stephen Degler <sdegler at degler dot net>.
2002-11-14 22:21:13 +00:00
jschauma
aa6d383a4d Update to 0.9:
Version 0.9
	* Fixed bugs
	* Added support for keyed md check of db and config
	* Removed dependancy on libgcrypt
	* Added dependancy on mhash

Version 0.8
	* Fixed loads and loads of bugs
        * Added syslog backend
        * Report format changed
        * added lots of parameters see man page and configure --help
        * added ACL support for SunOS 5.x (and compatibles)
	* libgcrypt is now separate and required

Version 0.7
	* Bug fixes
	* Compressed database support
	* Linkname checking
	* Mhash support (version 0.8.1 of mhash required)
2002-11-13 22:58:20 +00:00
jschauma
fbe8afd7a6 Update to version 0.8.17:
Version 0.8.17 (released October 4 2002)
- Corrected the HEX key mode. Refuses to convert hex strings longer
  than the given key size.
- Corrected some memory leaks in keygen_s2k. Patch by Bob Mathews
  <bobmathews@alumni.calpoly.edu>
- Corrected wrong use of sizeof in hmac_test. Reported by Ellis Pritchard
  <ellispritchard@users.sf.net>

Version 0.8.16 (released May 29 2002)
- Code cleanups and optimizations
- Added configure time options to disable certain algorithms

Version 0.8.15 (released May 24 2002)
- Corrected Iterated S2K
- Made all static tables constant (pointed out by Darryl Miles <darryl@netbauds.net>)

Version 0.8.14 (release March 28 2002)
- mhash_deinit() and mhash_hmac_deinit() now accept a null digest parameter
- Corrected memory leaks (patch by Gustavo Niemeyer <niemeyer@conectiva.com>)
- Corrected bug in Gost hash algorithm (pointed out by Mike Gorchak <mike@malva.ua>)

Version 0.8.13 (released November 18 2001)
- Added ADLER32 algorithm (implementation by Manuel Kasper <mk@neon1.net>)

Version 0.8.12 (released October 29 2001)
- Corrected bugs in mhash_get_name() functions
- Added SHA-256 from libnettle.

Version 0.8.11 (released October 21 2001)
- added mhash_save_state_mem() and mhash_restore_state_mem() functions,
  initial patches and idea by Blake Stephen <Stephen.Blake@veritect.com>
- Added mhash_get_name_static()
- Corrected mhash_get_name() and mhash_count()

Version 0.8.10 (released on July 12 2001)
- New mhash_deinit() and mhash_hmac_deinit() functions based on the
  proposal, and patches by William Ahern <wahern@25thandClement.com>
2002-11-13 22:53:42 +00:00
chris
449b9f7388 Make it build again if you don't have SASL_USE_GSSAPI set anywhere. 2002-11-13 10:44:26 +00:00
chris
418f424ad3 Fix support for kerberos 5, it now compiles and installs properly when
SASL_USE_GSSAPI is defined to yes.  Note untested as I don't have kerberos
setup, it probably won't work until some patches are put in to fix plugins
not working.
2002-11-13 10:39:12 +00:00
martti
9ef7dbabf1 - make this work with apache2
- buildlink2
2002-11-05 07:33:13 +00:00
wiz
07160b676a Remove unneeded files. Closes PR 18868. 2002-10-31 02:08:46 +00:00
joda
629e619e5c Update to version 1.2.1.
Changes in release 1.2.1:
* kadmind: fix remote exploit

Changes in release 1.2:
* fix buffer overrun in ftp
* fix openssl building
* don't try to force encryption in telnet if not talking to a default
  telnet port
* recognise AIX 5
* should work with more DB libraries
2002-10-29 13:56:50 +00:00
drochner
054dc869f4 update to 1.9a4
Many changes since 0.1.3, compatibility is not provided, so this is
more or less a new pkg.
2002-10-28 11:53:29 +00:00
seb
5ae097cecf Use buildlink2. Use perl5/module.mk. 2002-10-28 00:05:42 +00:00
seb
cdf4db798b Remove gmake dependency. 2002-10-27 23:32:36 +00:00
seb
f7968d6db9 Use buildlink2. Use perl5/module.mk. 2002-10-27 21:20:37 +00:00
seb
e8328761a2 Use buildlink2. Use perl5/module.mk. 2002-10-27 20:48:55 +00:00
chris
010fc6d1be Enable cyrus-sasl2. 2002-10-27 15:13:11 +00:00
chris
ce6ee05b60 Initial import of cyrus-sasl 2.1.9.
This is the latest release of cyrus-sasl.  It is needed for the 2.1.x
versions of cyrus-imapd.

SASL is a method for adding authentication support to connection-based
protocols.  To use SASL, a protocol includes a command for identifying and
authenticating a user to a server and for optionally negotiating protection
of subsequent protocol interactions.  If its use is negotiated, a security
layer is inserted between the protocol and the connection.
2002-10-27 15:08:59 +00:00
chris
9f9ba84b76 Update gpgme to 0.3.12. Again mostly bug fixes. Now depends on gpg 1.2.0.
Don't seem to need patch-ba.  Also fix .info file handling.
2002-10-27 03:09:14 +00:00
chris
ba5dbf6950 Update gnupg to 1.2.1. Is a bug fix release.
Major user visible changes are:
    * The library dependencies for OpenLDAP seem to change fairly
      frequently, and GnuPG's configure script cannot guess all the
      combinations.  Use ./configure LDAPLIBS="-L libdir -l libs" to
      override the script and use the libraries selected.

    * Secret keys generated with --export-secret-subkeys are now
      indicated in key listings with a '#' after the "sec", and in
      --with-colons listings by showing no capabilities (no lowercase
      characters).

    * --trusted-key has been un-obsoleted, as it is useful for adding
      ultimately trusted keys from the config file.  It is identical
      to using --edit and "trust" to change a key to ultimately
      trusted.

    * The usual bug fixes as well as fixes to build problems on some
      systems.

Note that patch-aa and patch-ab are no longer needed as was, patch-aa now
contains fixes to handle dlsym errors properly.

Also now include libiconv/buildlink2.mk as gnupg looks for iconv.

Fixes pkg/18221.
2002-10-27 02:53:02 +00:00
wiz
2c905f67dd Add buildlink2.mk. 2002-10-25 21:11:27 +00:00
wiz
121a6b3cc4 Convert to buildlink2. 2002-10-25 12:32:10 +00:00
wiz
adf8cf3253 Add buildlink2.mk. 2002-10-25 12:22:29 +00:00
wiz
affff1c0bc Unused. 2002-10-25 12:19:37 +00:00
wiz
6c16e68949 Convert to buildlink2. 2002-10-25 12:04:07 +00:00
wiz
3ab90d3e93 buildlink1 -> buildlink2. 2002-10-25 09:51:51 +00:00
wiz
491df6a4f1 buildlink1 -> buildlink2. 2002-10-25 09:36:24 +00:00
wiz
af366a6a07 Convert to buildlink2, and add buildlink2.mk. Inspired by PR 18728. 2002-10-22 11:44:58 +00:00