Commit graph

5705 commits

Author SHA1 Message Date
gls
bf26b205cb Update security/p5-IO-Socket-SSL to 1.35
Security fix

v1.35 2010.12.06
- if verify_mode is not VERIFY_NONE and the ca_file/ca_path cannot be
verified as valid it will no longer fall back to VERIFY_NONE but throw
an error. Thanks to Salvatore Bonaccorso and Daniel Kahn Gillmor for
pointing out the problem, see also
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058
2010-12-07 20:15:00 +00:00
gls
36160bc2a7 Direct MASTER_SITES to pypi.org, as the original MASTER_SITE doesn't host the
distfile anymore. Add DIST_SUBDIR to force re-download of the tarball, which
content has been modified.

While here, switch DEPENDS to py-crypto instead of py-amkCrypto.

Bump PKG_REVISION.
2010-12-06 22:22:08 +00:00
adam
67c5c9ef32 Detect builtin MIT Kerberos on Mac OS X 10.6.x 2010-12-05 21:56:55 +00:00
gls
863ba719f6 Update py-crypto to version 2.3
pkgsrc changes:
 - add a patch to fix an hardcoded interpreter path
 - add a patch to actually find gmp library.
 - add CONFLICTS with py-amkCrypto, both have files in common.

upstream changes:

2.3
===
* Fix NameError when attempting to use deprecated getRandomNumber()
function.
* _slowmath: Compute RSA u parameter when it's not given to
RSA.construct. This makes _slowmath behave the same as _fastmath in
this regard.
* Make RSA.generate raise a more user-friendly exception message when
the user tries to generate a bogus-length key.

2.2
===
* Deprecated Crypto.Util.number.getRandomNumber(), which had confusing
semantics.  It's been replaced by getRandomNBitInteger and
getRandomInteger.  (Thanks: Lorenz Quack)
* Better isPrime() and getPrime() implementations that do a real
Rabin-Miller probabilistic primality test (not the phony test we did
before with fixed bases).  (Thanks: Lorenz Quack)
* getStrongPrime() implementation for generating RSA primes.
(Thanks: Lorenz Quack)
* Support for importing and exporting RSA keys in DER and PEM format
(Thanks: Legrandin)
* Fix PyCrypto when floor division (python -Qnew) is enabled.
* When building using gcc, use -std=c99 for compilation.  This should
fix building on FreeBSD and NetBSD.
2010-12-05 17:13:09 +00:00
tez
9c348d6b44 add fix for CVE-2010-1323 from
http://web.mit.edu/kerberos/advisories/2010-007-patch-r15.txt
2010-12-03 20:11:31 +00:00
taca
83bbb51224 Update openssl package to 0.9.8q.
OpenSSL version 0.9.8q released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8q of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release. For a complete
   list of changes, please see

       http://www.openssl.org/source/exp/CHANGES.

   The most significant changes are:

      o Fix for security issue CVE-2010-4180
      o Fix for CVE-2010-4252
2010-12-03 00:17:21 +00:00
wiz
385e002b2a Update to 0.9.4: no list of changes found. 2010-12-02 16:13:53 +00:00
wiz
3499d7be81 Update to 2.0.3. List of changes not found. 2010-12-02 15:03:56 +00:00
wiz
c6a4ea899c Update to 0.50:
0.50  Nov 21, 2010
        - shell_quote in t/1_run.t was escaping '_' (bug report by
          Andreas J. König)
	- some typos corrected
        - initial implementation of scp_cat
2010-12-02 12:26:19 +00:00
wiz
76b16e925a Update to 1.34:
v1.34 2010.11.01
- schema http for certificate verification changed to
  wildcards_in_cn=1, because according to rfc2818 this is valid and
  also seen in the wild
- if upgrading socket from inet to ssl fails due to handshake problems
  the socket gets downgraded, but is still open.
  See https://rt.cpan.org/Ticket/Display.html?id=61466
- deprecate kill_socket, just use close()
2010-12-02 12:25:04 +00:00
wiz
ecb3e78865 Update to 2.51:
2010-09-30   Gisle Aas <gisle@ActiveState.com>

   Release 2.51

   Florian Ragwitz (1):
      Fix compilation with c++ compilers

   Gisle Aas (1):
      Fix repository specification in META.yml



2010-09-25   Gisle Aas <gisle@ActiveState.com>

   Release 2.50

   Chris 'BinGOs' Williams (1):
      Amended tests to work with perl core.

   Florian Ragwitz (3):
      Attach context pointers using sv magic
      Add failing test for thread cloning
      Clone MD5 contexts on thread cloning
      get_md5_ctx should never return anything but a valid pointer

   Gisle Aas (1):
      perl-5.6 no longer supported

   Jesse Vincent (1):
      Preserve utf8ness of argument [RT#44927]
2010-12-02 12:22:58 +00:00
wiz
abac0aa67c Update to 0.16:
0.16  Wed Sep 29 08:11:42 2010
        - fixed crc64 support for non-xs case, #61490, #61491
2010-12-02 12:22:07 +00:00
obache
21964a9977 Fixes build with OPENSSL_NO_MD2. 2010-11-30 07:12:49 +00:00
drochner
f0c61d0def update to 2.30.1
This switches to the gnome-2.32 release branch.
(compile-tested only; the old version didn't build anymore)
2010-11-29 12:56:20 +00:00
drochner
de7f3e8f42 update to 2.32.0
This switches to the gnome-2.32 release branch.
2010-11-28 12:57:50 +00:00
shattered
833bf67ecc Install manpages in man/, not share/man/ 2010-11-28 10:47:40 +00:00
agc
978258d152 add and enable libtomcrypt 2010-11-27 06:13:25 +00:00
agc
132d12edaa Import libtomcrypt (version 1.17) into the packages collection.
LibTomCrypt is a fairly comprehensive, modular and portable
	cryptographic toolkit that provides developers with a vast array of
	well known published block ciphers, one-way hash functions, chaining
	modes, pseudo-random number generators, public key cryptography and a
	plethora of other routines.  LibTomCrypt has been designed from the
	ground up to be very simple to use.  It has a modular and standard API
	that allows new ciphers, hashes and PRNGs to be added or removed
	without change to the overall end application.  It features easy to
	use functions and a complete user manual which has many source snippet
	examples.

	* Block Ciphers
	    * Blowfish
	    * XTEA
	    * RC5
	    * RC6
	    * SAFER+
	    * Rijndael (aka AES)
	    * Twofish
	    * SAFER (K64, SK64, K128, SK128)
	    * RC2
	    * DES, 3DES
	    * CAST5
	    * Noekeon
	    * Skipjack
	    * Anubis (with optional tweak as proposed by the developers)
	    * Khazad
	    * KASUMI
	    * SEED
	* Chaining Modes
	    * ECB
	    * CBC
	    * OFB
	    * CFB
	    * CTR
	    * IEEE LRW mode
	    * F8 Chaining Mode
	* One-Way Hash Functions
	    * MD2
	    * MD4
	    * MD5
	    * SHA-1
	    * SHA-224/256/384/512
	    * TIGER-192
	    * RIPE-MD 128/160/256/320
	    * WHIRLPOOL
	* Message Authentication
	    * FIPS-198 HMAC (supports all hashes)
	    * CMAC, also known as OMAC1 (supports all ciphers)
	    * PMAC Authentication
	    * F9-MAC
	    * Pelican MAC
	* Message Encrypt+Authenticate Modes
	    * EAX Mode
	    * OCB Mode
	    * CCM Mode (NIST spec)
	    * GCM Mode (IEEE spec)
	* Pseudo-Random Number Generators
	    * Yarrow (based algorithm)
	    * RC4
	    * Support for /dev/random, /dev/urandom and the Win32 CSP RNG
	    * Fortuna
	    * SOBER-128
	* Public Key Algorithms
	    * RSA (using PKCS #1 v1.5 and v2.1)
	    * ECC (EC-DSA X9.62 signatures, X9.63 EC-DH)
		  o With fast Fixed Point ECC support as well
		  o X9.63 import/export of public keys
	    * DSA (Users make their own groups)
	    * The math routines are pluggable which means you can use your own
	      math provider if you want.
	* Other standards
	    * PKCS #1 (v1.5 and v2.1 padding)
	    * PKCS #5
	    * ASN.1 DER
2010-11-27 06:11:57 +00:00
drochner
86be3a7ef6 update to 1.1.0
change: New functions to fix a leak in dirmngr
2010-11-26 18:00:17 +00:00
drochner
2069879c55 update to 2.10.3
changes: bugfixes
2010-11-26 17:56:14 +00:00
drochner
16cf750011 update to 1.10
change: 3 error codes added
2010-11-26 17:55:21 +00:00
obache
1c2474795f define missing PKGCONFIG_OVERRIDE. 2010-11-18 12:09:54 +00:00
taca
f8a37f7e9a Update security/openssl package to 0.9.8p.
OpenSSL version 0.9.8p released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8p of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release which addresses
   CVE-2010-3864. For a complete list of changes,
   please see http://www.openssl.org/source/exp/CHANGES.
2010-11-17 00:52:25 +00:00
drochner
714df7b568 update to 2.32.0
This switches to the gnome-2.32 release branch.
2010-11-16 13:10:53 +00:00
adam
52d99912dd Changes 186:
* fix for BUG-424: build fails on Darwin
2010-11-16 09:53:50 +00:00
abs
9987fa4b3a PKGREVISION bumps for changes to gtk2, librsvg, libbonobo and libgnome 2010-11-15 22:56:08 +00:00
obache
4df37b6c5f Shlib major bumped from 3 to 4 at update of ImageMagick-6.6.4.1.
Bump ABI_DEPENDS (and recursive bump).
2010-11-14 14:05:57 +00:00
shattered
3b05a61c76 Follow HTTP redirects to new HOMEPAGEs and/or MASTER_SITES. 2010-11-13 21:08:54 +00:00
obache
d8b3ca0f9b reset maintainer, he does not use this package anymore. 2010-11-11 11:42:20 +00:00
adam
6ed847acc6 pkglint fixes 2010-11-10 10:37:48 +00:00
agc
7719e6d6fa add and enable libpbc 2010-11-09 03:34:32 +00:00
agc
52f6ebf0c7 Initial import of security/libpbc-0.5.10 into the Packages Collection.
The PBC (Pairing-Based Cryptography) library is a free C library built
	on the GMP library that performs the mathematical operations
	underlying pairing-based cryptosystems.

	It provides routines such as elliptic curve generation, elliptic curve
	arithmetic and pairing computation.

	The API is abstract enough that the PBC library can be used even if
	the programmer possesses only an elementary understanding of pairings.
	There is no need to learn about elliptic curves or much of number
	theory.  (The minimum requirement is some knowledge of cyclic groups
	and properties of the pairing.)

	      Boneh-Lynn-Shacham short signatures
	      Hess identity-based signatures
	      Joux tripartite Diffie-Hellman
	      Paterson identity-based signatures
	      Yuan-Li identity-based authenticated key agreement
	      Zhang-Kim identity-based blind/ring signatures
	      Zhang-Safavi-Naini-Susilo signatures
2010-11-09 03:33:28 +00:00
adam
1db607f855 Changes 2.6.4:
Bug Fixes
* amavisd failed to start when spam scanning was disabled either
  by @bypass_spam_checks_maps=(1) or by @spam_scanners=(), giving:
    Can't locate object method "new" via package "Amavis::SpamControl"
  As a workaround one could use a @spam_scanners=(undef) to disable spam
  scanning;
* several decoders failed to propagate "Exceeded storage quota" exception,
  so the protection of AV scanners against mail bombs was ineffective;
  reported by Jorgen Lundman;
* milter usage (AM.PDP): verbatim header edits inserted a header body of
  "1" instead of the correct string
* updated AV entry for BitDefender's bdscan to recognize tabs around
  a colon in its output; contributed by Steve;
* fix parsing of a combined result from DSPAM (option --classify), as
  earlier versions of DSPAM did not include a signature with a combined
  result line; problem reported by Marijan Vidmar;
New Features
* provide a true SNMP agent and a MIB, facilitating monitoring the health
  of a content filtering system, its performance and mail characteristics;
* a new AV interface to SMTP-based antivirus scanners;
* allow customizing SMTP-status response reason text for blocked messages;
* prevent inserting fake copies of certain important mail header fields
  without breaking a DKIM signature;
2010-11-08 18:06:57 +00:00
agc
cfac11ad30 Update netpgp to 20101107.
Changes since previous version:

+ fixes for GNU autoconf/automake infrastructure
+ Elgamal encryption and decryption (for DSA keys) is now supported
2010-11-07 07:54:39 +00:00
agc
1fe8aec298 Update netpgp to version 20101105 - fixes for autoconf and automake 2010-11-06 03:54:18 +00:00
agc
975cdbd809 Update netpgp to version 3.99.13/20101104
Changes from previous version (20100601)

Changes to 3.99.13/20101104

+ fix up GNU autoconf framework to reflect new structure
+ add ability in netpgpkeys(1) and netpgp(1) to specify the cipher
  (symmetric algorithm)
+ add the camellia cipher implementation from openssl as specified in RFC 5581
+ changes from Peter Pentchev to get rid of an exit(3) in library context
+ changes from Peter Pentchev for manual page hyphens
+ changes from Peter Pentchev to clean up after tests
+ changes from Arnaud Ysmal to avoid dereferencing possible NULL pointers
+ change from Arnaud Ysmal to clean up usage message in netpgpkeys(1)
+ avoid calling bzlib functions if they aren't present
+ when writing out the key as an ssh key, don't include the user id
  information at the end, in-line with expectations about standard ssh
  key formats
+ since the signing key changed its "menu line" entry from "pub" to
  "signature", the offset of the key id moved 7 chars to the right, so
  take this into consideration when generating new keys
+ allow the user specification of the secret key file as the
  --sshkeyfile or -S argument, and check that the public key file exists
  before trying to read it

Changes to 3.99.12/20100907

+ add a pretty print function mj_pretty(3) to libmj
+ added netpgp_write_sshkey(3) to libnetpgp
+ added pgp2ssh(1)
+ added preliminary support for ElGamal decryption, needed for DSA keys
  as yet untested, unworking, and a WIP
+ add support for using all ssh keys, even those protected by a passphrase,
  for decryption and signing. This rounds off ssh key file support in netpgp.
+ add a single character alias (-S file) for [--sshkeyfile file] to
  netpgpkeys(1) and netpgp(1)

Changes to 3.99.11/20100809

+ update hkpd(8) to reflect the -S argument to hkpd(8)
+ add reachover Makefile support for hkpd(8) and hkpc(1)
+ regen autoconf with new version and date information

Changes to 3.99.10/20100809

+ check return value from option setting function in netpgpkeys(1)
+ be smarter when checking for a null id
+ add test for crap being returned when listing specific keys in netpgpkeys(1)
+ take the public key from the pubring, not the secring when exporting
  keys
+ allow hkpd to serve ssh keys in pgp format
+ test on whether a seckey is needed, not on a userid needed, for ssh keys

Changes to 3.99.9/20100809

+ add single character options to netpgp(1) and netpgpkeys(1)
+ add -o long-option (=value)? to netpgp(1) and netpgpkeys(1)
+ save subkeys when parsing keys. when listing keys, note that the first
  subkey is for encryption
+ rationalise birthtime/expiration timestamps into a single function
+ clean up some 64-bit (amd64) lint

Changes to 3.99.8/20100805

+ free a regular expression after using it
+ be a bit less typedef-happy when it's not needed
+ added minimalist JSON (libmj) to distribution
+ add a function in ops layer to construct JSON serialised text from keys
+ use json output from the library in netpgpkeys(1)
+ added check for alternative openssl location

Changes to 3.99.7/20100701

+ recognise ascii-armoured encrypted messages properly, in memory and
  in files
+ fix a bug when printing out the public key when prompting for a secret
  key
+ print error message and exit for now when trying to encrypt with a DSA key
+ fix bug reported by dyoung when trying to print out the encryption key
  fingerprint

Changes to 3.99.6/20100701

+ make some synonyms for --ssh-keys
+ make proper defaults for home dir for ssh key files as well as pgp files
+ modify regression test script to ensure that ssh-keygen and netpgpkey's
  idea of ssh keys are the same
+ return any error codes when reading ssh pub or private keys

Changes to 3.99.5/20100613

+ make ssh fingerprints (md5) match netpgp listing
+ use the more functional hexdump function from ssh2pgp in place of the
  older hexdump function from openpgpsdk
+ pass hash type down from command line where needed
+ add test for netpgp/ssh key fingerprint matching
+ make netpgpkeys(1) take a --hash= option
2010-11-05 03:48:33 +00:00
adam
d529f7a8ee nss_ldap and pam-ldap now share the same configuration files 2010-11-03 11:39:07 +00:00
shattered
297d960d1a Depend on zlib -- this package won't build without it. 2010-11-02 20:40:55 +00:00
obache
3c0dc157f1 Update ruby-oauth to 0.4.4.
=== 0.4.4 2010-10-31

* Fix LoadError rescue in tests: return can't be used in this context
  (Hans de G raaff)
* HTTP headers should be strings. (seancribbs)
* ensure consumer uri gets set back to original config even if an error occurs
  (Brian Finney)
* Yahoo uses & to split records in OAuth headers (Brian Finney)
* Added support for Rails 3 in client/action_controller_request (Pelle)
2010-11-01 04:02:26 +00:00
wiz
d181a9e465 Reset maintainer. 2010-11-01 00:08:09 +00:00
adam
8d32253257 Changes 185:
* fix: LDAP write on userPassword fails when chasing referral and cached
  policy error is POLICY_ERROR_PASSWORD_EXPIRED
* fix: only request attributes that are actually used
* fix: canonicalize PAM_USER name
2010-10-28 08:06:19 +00:00
wiz
b838928231 Update to 20100827. Set LICENSE.
Fix bug reported by Makoto Yamakura in PR 43992.
2010-10-22 10:41:49 +00:00
wiz
d039bae6b8 Update to 1.4.11, add some comments to patches and please pkglint.
Noteworthy changes in version 1.4.11 (2010-10-18)
-------------------------------------------------

    * Bug fixes and portability changes.

    * Minor changes for better interoperability with GnuPG-2.
2010-10-21 21:48:12 +00:00
pettai
abdb13d3cc SoftHSM 1.2.0 - 2010-09-30
* Added mechanism CKM_RSA_X_509 (use Botan 1.9.7 to fix a bug
  when verifying these signatures)
* The softhsm command now have the option --module <path>
  To use a PKCS#11 library other than SoftHSM.
* The softhsm command now import all parts of the RSA key.
  CKA_EXPONENT_1, CKA_EXPONENT_2, and CKA_COEFFICIENT is not needed
  by SoftHSM but might be needed by other HSM:s.
* Ticket #163: softhsm-keyconv now support BIND format v1.3
* Write message to stderr when the config file cannot be found
* CKA_WRAP_WITH_TRUSTED was not handled correctly. But it has not
  been a problem since wrapping is not supported.
* Set CKA_KEY_GEN_MECHANISM to CK_UNAVAILABLE_INFORMATION when
  importing objects.
* C_GetInfo now returns CKR_CRYPTOKI_NOT_INITIALIZED if library
  is not initialized.
* Force clean up if the app does not do C_Finalize (using auto_ptr)
* Limit the scope of the session objects to the owner application
* softhsm --optimize will clean up leftovers (session objects)
  from applications that haven't closed down properly.
* Do not use CKF_HW, the mechanisms are not performed by a device.
* The ulMinKeySize and ulMaxKeySize are not used for the digesting
  mechanisms, but we set them to zero for applications that forget
  this.
* Used wrong buffer size for signatures. This was only a problem
  for keys where (key size % 8 == 1), e.g. 1025 bit keys.
* C_Login now returns CKR_USER_ANOTHER_ALREADY_LOGGED_IN instead of
  CKR_USER_TOO_MANY_TYPES
2010-10-18 21:03:50 +00:00
wiz
50e9dd4d98 Update to 2.10.2:
* Version 2.10.2 (released 2010-09-30)

** Use Libtool 2.2.10 to ease MinGW64 builds.

** libgnutls: Add new extended key usage ipsecIKE.

** libgnutls: Is now more liberal in the PEM decoding.
That is spaces and tabs are being skipped.

** libgnutls: Renamed NULL MAC to MAC-NULL to prevent clash with NULL cipher.
This prevented the usage of the TLS ciphersuites with NULL cipher.
See <http://thread.gmane.org/gmane.network.gnutls.general/2093>.

** libgnutls: The %COMPAT flag now allows larger records that violate the
TLS spec.

** libgnutls: Fix asynchronous API handling.
The code was clearing session hash data on EAGAIN.  Problem reported
by Sjoerd Simons <sjoerd.simons@collabora.co.uk> and Vivek
Dasmohapatra <vivek@collabora.co.uk>.  See
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/4531>.

** gnutls-cli: Flush stdout/stderr before removing buffering.
Reported by Knut Anders Hatlen see
<http://savannah.gnu.org/support/?107481>.
2010-10-16 16:43:42 +00:00
wiz
050e9a2cad Update to 2.8:
* Noteworthy changes in release 2.8 (2010-09-25) [stable]
- Update gnulib files.
- Use Libtool 2.2.10 to ease MinGW64 builds.
2010-10-16 16:41:13 +00:00
obache
91cebf4447 Update ruby-roauth to 0.0.6.
* add tests
* Corrected a bogus array initialization.
* Effectively double-escaped the normalized params for inclusion in the
  signature base as required by sections 9.1.1 and 9.1.3 of the OAuth 1.0
  specification.
2010-10-16 05:03:23 +00:00
obache
972c01ae93 postgresql82 had been removed from pkgsrc,
switch to use default PostgreSQL in pkgsrc for pgsql option (default off).
2010-10-15 04:40:34 +00:00
joerg
69a49845e4 Sort out PLIST for i386. Bump revision. 2010-10-12 19:36:43 +00:00
obache
853e4f92be require elementtree module to build for python24. 2010-10-10 11:38:55 +00:00