Commit graph

6458 commits

Author SHA1 Message Date
joerg
d7aec867fe Don't order function pointers directly. Don't use non-literals as format
strings. Fix return type of intermediate used for return value of
wcrtomb.
2012-11-01 19:32:44 +00:00
wiz
76a8d9ee20 Update HOMEPAGE, from diro@nixsyspaus.org in PR 47148. 2012-10-31 22:45:47 +00:00
wen
834089b7e6 Update to 2.31
Upstream changes:
2.31    Tue Oct 30 07:03:40 EDT 2012
	- Fixes to regular expressions to avoid rare failures to
          correctly strip padding in decoded messages.
        - Add padding type = "none".
        - Both fixes contributed by Bas van Sisseren.
2012-10-30 14:35:37 +00:00
markd
c929595f7b Update to 0.4.3
4+ years worth of patches.
2012-10-28 02:00:50 +00:00
wiz
81a321a361 + KeePass. 2012-10-27 22:19:01 +00:00
wiz
787b9e1c3a Import KeePass-2.20.1 as security/KeePass.
Today you need to remember many passwords. You need a password for
the Windows network logon, your e-mail account, your website's FTP
password, online passwords (like website member account), etc. etc.
etc. The list is endless. Also, you should use different passwords
for each account. Because if you use only one password everywhere
and someone gets this password you have a problem... A serious
problem. The thief would have access to your e-mail account, website,
etc. Unimaginable.

KeePass is a free open source password manager, which helps you to
manage your passwords in a secure way. You can put all your passwords
in one database, which is locked with one master key or a key file.
So you only have to remember one single master password or select
the key file to unlock the whole database. The databases are
encrypted using the best and most secure encryption algorithms
currently known (AES and Twofish).
2012-10-27 22:18:50 +00:00
wiz
0a9e42828d Add comments to patches. 2012-10-27 17:39:12 +00:00
joerg
eec1865445 Use void for a few functions that need it. 2012-10-26 20:24:19 +00:00
joerg
e11169fee0 Allow unprivileged build on NetBSD, if bind is in base. 2012-10-24 16:05:15 +00:00
manu
e69b457213 Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shall
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
2012-10-24 09:01:40 +00:00
manu
e5cd2cc7aa Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shall
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
2012-10-24 08:33:51 +00:00
asau
1a433eae91 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
manu
c6fc7dbcf6 Upgrade to lasso 2.3.6 in order to completely fix the libxml 2.9 dependency
ChangeLog Since 2.3.5:
 * fix a bug when receiving a signature using the InclusiveNamespaces
   PrefixList by copying namespace declaration from upper level at the level of
   the signed node.
 * fix compilation warning on recent version of GCC
2012-10-23 18:16:15 +00:00
schmonz
34a76f57a2 Restore INSTALLATION_DIRS and krb5.buildlink3.mk, lost in previous.
Indent while here.
2012-10-23 13:02:08 +00:00
elric
91a44af1fa Update to knc 1.7. 2012-10-23 06:04:28 +00:00
wiz
bf2203469a Update to 1.49:
1.49 2012-09-25
     Fixed problem where on some platforms test t/local/07_tcpecho.t would
     bail out if it could not bind port 1212. Now now tries a number of ports to bind to until
     successful.
     Improvements to  unsigned casting contributed by Reini Urban.
     Improvements to Net::SSLeay::read to make it easier to use with non-blocking IO:
      contributed by James Marshall:  It modifies
      Net::SSLeay::read() to return the result from SSL_read() as the second
      return value, if Net::SSLeay::read() is called in list context.  Its
      behavior should be unchanged if called in scalar or void context.  This
      result code seems to be required for full support of non-blocking I/O,
      since users need to handle SSL_ERR_WANT_READ, SSL_ERROR_WANT_WRITE, etc.
      Fixed a problem where t/local/kwalitee.t fails with
       Module::CPANTS::Analyse 0.86. Patch from Paul.
      Fixed a number of typos patched by Giles.
      Fixed a compiler warning from Compiling with gcc-4.4 and -Wall, patched by Giles.
      Fixed problems with get_https4: documentation was wrong, $header_ref was
       not correctly set and $server_cert was not returned.
      Fixed a problem that could cause a Perl exception about no blength
      method on undef. Reported by "Stephen J. Smith via RT". https://rt.cpan.org/Ticket/Display.html?id=79309
      Added documentation about how to mitigatxe various SSL/TLS
     vulnerabilities.
     Fixed problem reported by Mike Doherty: SSL_MODE_* are defined in ssl.h,
     and should be available as constants, but I do not see them listed in constants.h
2012-10-21 22:28:16 +00:00
wiz
ca6e77764b Update to 20120823. Replace interpreter in installed file.
20120823
  - Fix test (RT#79129, reported by Sinan Unur)

20120822
  - Add mk-ca-bundle.pl from git repository to distribution.
  - Add new/additional certificates from the following CAs: Verisign,
    UTN-USER, UTN USERFirst, Sonera, NetLock Qualified, SwissSign
    Platinum, S-TRUST, ComSign, Actalis, Trustis, StartCom, Buypass.
2012-10-21 22:25:19 +00:00
wiz
f649ff0fea Update to 1.77:
v1.77 2012.10.05
- update_peer for IPv6 also, applied fix to
  https://rt.cpan.org/Ticket/Display.html?id=79916 by
  tlhackque[AT]yahoo[DOT]com
2012-10-21 22:22:36 +00:00
wiz
f5c04a4c23 Update to 5.72:
5.72  Mon Sep 24 15:22:08 MST 2012
	- adjusted module installation directory for later Perls
		-- As of 5.11 Perl searches 'site' first, so use that
			-- ref. INSTALLDIRS in Makefile.PL
		-- thanks to Robert Sedlacek for patch
2012-10-21 22:20:40 +00:00
wiz
271d587e0c Update to 0.64:
0.64 2012-08-06 01:23:30

- Drastically simplify Makefile.PL to resolve RT bugs #61249, #61324,
  #63553, #68208, and #68084.

- Forgot to update Changes for 0.63, so this version overrides that.


0.61_05 2012-08-04 00:40:22 UTC

- Trying to distinguish between good vs bad zero returns from underlying
  SSL_read/SSL_write broke stuff (see RT bug #78695). Revert to previous
  behavior.

- Completely re-organize Makefile.PL. I hope these changes will help take
  care of RT bugs #61324, #61249, #63553, and #68084 etc. This is not
  necessarily finished, but I want to see what happens on CPAN Testers at
  this point before making a few other minor changes.

0.60 2012-07-29 21:43:47 UTC

- Release 0.59_03 as 0.60 so distributions can pick up various fixes. The most
  important one seems to be bug RT #70565. This should take care of bug RT
  #77167

- SSL_read and SSL_write now try to handle incomplete reads/writes (see bug RT
  RT #64054). The current test suite does is not very comprehensive, so caution
  is recommended at this point. Also, if you have good test cases, I would love
  to incorporate them into the distribution.

0.59_03 2012-03-10 00:45:28 UTC

- Bump version number and upload to CPAN.


0.59_02 2012-03-08 16:16:03 UTC

- Forgot to update Changes for 0.59_01. The following is a combined list of
  the more important fixes incorporated in both.

- Bug RT #64054: Handle incomplete reads/writes better

- Bug RT #73754: Add LWP::Protocol::https to PREREQ_PM

- Bug RT #73755: Crypt-SSLeay does not verify hosts (yet). Don't let that
  cause a failure during tests.

- Streamline t/02-live.t using Try::Tiny and done_testing

- Plus assorted related small changes.

0.58_01 2010-09-08 19:11:39 UTC

- L<text|scheme:...> is not supported in POD for 5.8.5 and earlier.
- TODOs in POD should stand out
- Add /boot/common/ssl and some other directories to unix_ssl_dirs (see bug
  #60936).
2012-10-21 22:19:14 +00:00
wiz
c5493b2090 Update to 0.13:
0.13
Updated the WRITE() method to use syswrite() and account for
variable buffer sizes in SASL.
2012-10-21 22:16:43 +00:00
wiz
55dfc797b6 Update to 2.16:
Authen-SASL 2.16 -- Tue Sep  4 11:01:18 CDT 2012

  * SASL.pod: fix typo [Peter Marschall]
  * Perl.pm: avoid warning on "uninitialized value" [Peter Marschall]
2012-10-21 22:14:51 +00:00
wen
302074d683 Update to 0.14
Upstream changes:
0.14  October 16, 2012
	- compiling with -Werror=format-security now works (Jerome Quelin, #48446)
	- Use Digest::SHA instead of Digest::SHA1 (Ansgar Burchardt, #60271)
	- Security fix, CVE-2009-0129: Missing error check in do_verify (Havard Eidnes, #79958)
2012-10-20 14:25:58 +00:00
pettai
0ab689e7ee Added scrypt 2012-10-17 22:18:56 +00:00
pettai
8c5e1963a4 A simple password-based encryption utility is available as a demonstration
of the scrypt key derivation function. On modern hardware and with default
parameters, the cost of cracking the password on a file encrypted by scrypt
enc is approximately 100 billion times more than the cost of cracking the
same password on a file encrypted by openssl enc; this means that a five-
character password using scrypt is stronger than a ten-character password
using openssl
2012-10-17 22:17:47 +00:00
adam
2eb65d47b8 MASTER_SITES fix 2012-10-12 15:37:12 +00:00
marino
131deb6dd8 security/qoauth: Fix DISTNAME and thus fetch
As soon as qoauth got PKGREV bump, this package could no longer fetch due
to a bad DISTNAME definition.  Fix DISTNAME to fix "make fetch".
2012-10-12 11:06:59 +00:00
marino
66505fc126 security/mit-krb5: Fix build for gcc 4.7
Generated file didn't pass -Werror check on gcc4.7.  The problem is
well-known and already fixed on the current version of mit-krb5.  The
patch added here was taken from upstream.

No revbump necessary, won't change binary on systems that already built it.
2012-10-12 08:06:25 +00:00
drochner
fbe4403ddf update to 3.0.24
changes:
-better IPv6 support
-bugfixes
-minor improvements
2012-10-10 11:44:30 +00:00
adam
3f2cc57b2b Revbump after updating graphics/pango 2012-10-08 23:00:34 +00:00
pettai
e1dba2d577 Update to Botan 1.8.14:
* 1.8.14, 2012-07-18

- The malloc allocator would return null instead of throwing in the event of
  an allocation failure, which could cause an application crash due to null
  pointer dereference where normally an exception would occur.
- Recent versions of OpenSSL include extra information in ECC private keys,
  the presence of which caused an exception when such a key was loaded by
  botan. The decoding of ECC private keys has been changed to ignore these
  fields if they are set.
- AutoSeeded_RNG has been changed to prefer /dev/random over /dev/urandom
- Fix detection of s390x (Debian bug 638347)
2012-10-08 20:46:38 +00:00
jaapb
ff1184e506 Revision bump associated with the update of lang/ocaml to version 4. 2012-10-08 15:18:20 +00:00
obache
8cc5681344 PKGNAME_NOREV must be used for DISTNAME.
fixes PR pkg/47043.
2012-10-07 12:31:13 +00:00
adam
a578ad0559 Small clean-up 2012-10-05 20:01:23 +00:00
cheusov
daafb85bd9 CONFLICTS between lang/sr and security/srm 2012-10-05 17:17:04 +00:00
apb
4fb000c8e0 In the PLIST, add four files in ${PYSITELIB}/${EGG_INFODIR}.
In the Makefile, remove PYDISTUTILSPKG=yes, add
.include "../../lang/python/egg.mk", and set PKGREVISION=1.

This fixes errors from "make package" complaining about files
that were installed but not present in the PLIST.
2012-10-05 10:14:46 +00:00
wiz
6bbbe9db41 Add build dependency on p5-Perl4-CoreLibs, needed since a script
uses find.pl.
Reported by Jörn Clausen in PR 47036.
2012-10-05 09:36:31 +00:00
pettai
5e8f65790b validns 0.6
Support for TLSA records.
        Support for ILNP (NID, L64, L3, LP) records (untested).
        Support for IPSECKEY records.
        Handle TYPEXXX for known types correctly.
        A number of NSEC3-related bug fixes.
        Miscellaneous bug fixes.
2012-10-04 20:30:57 +00:00
cheusov
4b97be0632 Bump revision for packages with changed CONFLICTS (PYTHON_SELF_CONFLICT) 2012-10-04 00:21:58 +00:00
cheusov
11c7685b77 CONFLICTS between python modules 2012-10-03 23:40:35 +00:00
wiz
8b5d49eb78 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
adam
69071e0c48 ClamAV 0.97.6 includes minor bug fixes and detection improvements. 2012-10-03 10:39:13 +00:00
wiz
5b31383393 Update to 2.14:
* Noteworthy changes in release 2.14 (2012-09-24) [stable]
- Added asn1_read_node_value() to obtain a node's value.
  This is to deprecate the export of the node_asn internal structure
  for the upcoming 3.x release.  The ASN1_DATA_NODE type and the
  ASN1_ETYPE_* constants were added to support the new function.
2012-10-02 17:36:00 +00:00
tron
14215633d2 Mass recursive bump after the dependence fix of the "cairo" package
requested by Thomas Klausner.
2012-10-02 17:10:28 +00:00
he
e891f8d269 Apply a fix for CVE-2009-0129, taken from Debian's problem report.
Also reported upstream, ref.
  https://rt.cpan.org/Public/Bug/Display.html?id=79958
Bump PKGREVISION.
2012-10-02 07:58:00 +00:00
adam
aacf7eeb82 Fix building on Darwin 2012-09-28 12:31:59 +00:00
obache
278be50828 add patches for libxml2>=2.9.0, new buffer structure. 2012-09-28 11:59:18 +00:00
obache
1bb83baca4 LICENSE=gnu-gpl-v2 2012-09-28 11:52:22 +00:00
obache
c580487448 missing parts of recursive revbump for gnutls update. 2012-09-23 10:47:45 +00:00
obache
cf91a942ab Install man source into $(mandir)/man8 instead of catman for saslauthd(8),
or manpage will not displayed correctly with man(1).
It also fixes installation failure for platforms missing `nroff -mandoc'.

Bump PKGREVISION.
2012-09-22 06:20:21 +00:00