Commit graph

5366 commits

Author SHA1 Message Date
joerg
002748c390 Run libtoolize. No need to touch libtool. 2009-11-25 21:43:55 +00:00
joerg
d7481628f4 Fix permissions of include files. Fix linkage for systems with openssh
in base. Add destdir support.
2009-11-25 21:11:33 +00:00
joerg
04c9be3080 Repeat after me, do not use bar/.libs/foo.la, use bar/foo.la. 2009-11-25 20:56:03 +00:00
markd
fe1669a672 Needs qt4-tools to build. (Thanks wiz) 2009-11-25 09:47:10 +00:00
markd
3002e1ec00 Add polkit-qt 2009-11-21 20:05:40 +00:00
markd
7a60a521e1 Import polkit-qt version 0.9.2
Qt Wrapper around PolicyKit
2009-11-21 20:04:06 +00:00
drochner
226b0b6fa9 update to 1.2.2
changes:
-Support for the "aes128-ctr", "aes192-ctr", "aes256-ctr" ciphers
-Support for the "arcfour128" cipher
-Fix crash when server sends an invalid SSH_MSG_IGNORE message
2009-11-20 16:45:30 +00:00
drochner
a3bb46bb6f update to 1.1.4
The changes since 1.1.3 are mostly limited to minor code and
manual pages markup cleanups (such as for proper formatting on OpenBSD).
2009-11-18 16:59:30 +00:00
wiz
68c152bbbb Update to 2.28.1:
seahorse-plugins 2.28.1
-----------------------

    * Add the get-info command to seahorse-agent [Peter Bloomfield]

seahorse-plugins 2.28.0
-----------------------

    * Fix configure script portability [Thomas Klausner]
    * Fix crash in seahorse-preferences [Pablo Castellano]
    * Fix single glib include [Kjartan Maraas]

    Translations
    * bn.po [Jamil Ahmed]
    * br.po [Denis Arnaud]
    * ca@valencia.po [Carles Ferrando]
    * cs.po [Marek Černocký]
    * da.po [Ask H. Larsen]
    * es.po [Jorge Gonzalez]
    * hi.po [Rajesh Ranjan]
    * ko.po [Changwoo Ryu]
    * mai.po [Rajesh Ranjan]
    * ml.po [Ani]
    * nb.po [Kjartan Maraas]
    * pt_BE.po [Og B. Maciel]
    * sr@latin.po [Branko Kokanović]
    * sr.po [Branko Kokanović]
    * te.po [krishnababu k]
    * or.po [Manoj Kumar Giri]
    * uk.po [Maxim V. Dziumanenko]
    * el.po [Kostas Papadimas, Jennie Petoumenou]

seahorse-plugins 2.27.1
-----------------------

    * Clean up socket directory [Adam Schreiber]

    Translations
    * or.po [Manoj Kumar Giri]
2009-11-17 16:05:54 +00:00
tron
9d505b5076 Avoid deprecation warnings under Python:
1.) Use "hashlib" instead of "sha" module if possible.
2.) Use "subprocess" module instead of os.popen3().
Both changes tested with Python 2.4 and 2.6.

Pkgsrc-related improvements:
1.) Support "user-destdir" installation (no changes required).
2.) Set license to "gnu-gpl-v2".
3.) Reduce patches by recording the fact that the manual page gets
    compressed automatically (which "pkgsrc" handles fine) instead
    of trying to prevent that.
2009-11-17 12:23:01 +00:00
tron
0e0b5d1fd1 This package works fine with Python 2.6, remove "PYTHON_VERSIONS_ACCEPTED". 2009-11-17 09:01:43 +00:00
dsainty
dc743aa7f1 Add p5-Crypt-ECB 2009-11-17 04:30:29 +00:00
dsainty
2d9cb92e2c Import p5-Crypt-ECB-1.45:
This is Crypt::ECB, a Perl-only implementation of the ECB mode.  In
combination with a block cipher such as DES, IDEA or Blowfish, you can encrypt
and decrypt messages of arbitrarily long length.  Though for security reasons
other modes than ECB such as CBC should be preferred.  See textbooks on
cryptography if you want to know why.

In addition to this module you will need to install one or more of the
Crypt::DES, Crypt::IDEA, or Crypt::Blowfish modules.
2009-11-17 04:27:59 +00:00
drochner
f442f1f99f update to 1.2.1
many fixes and improvements, notably speed
2009-11-15 20:07:45 +00:00
drochner
cb3b40e37f update to 1.1.8
changes:
-bugfixes
-API extensions
-documentation improvement
-The encoding of gpgme_data_t objects can affect the output encoding
 of export, sign and encrypt operations now
-Using GPGME_KEYLIST_MODE_LOCAL combined with
 GPGME_KEYLIST_MODE_EXTERN is now supported
2009-11-15 18:41:55 +00:00
hasso
f4ac82807e Update to 0.9.0-beta8 (by Rumko via private mail).
0.9.0-beta8:
- Include spamhaus_drop.dat in the source distribution. Fix installation
  issue (closes #364).

0.9.0-beta7:
- Initial SpamhausDrop plugin implementation, by
  Wes Young <wes@barely3am.com> (closes #363)
- Do not discard --root parameters if prefix is absolute.
- Python 2.4 backward compatibility fixes.
- Handle plugin loading error gracefully.
- Improve WormPlugin accuracy, and make it carry a reference to the
  initial event. The plugin used to alert when seeing an alert to a
  given target, and this same alert going back to the source. This can
  happen in a number of case (example: Netbios alert triggered by Snort)
  As of now, the plugin will wait for the events to be repeated against
  at least 5 differents hosts.
- Dshield CorrelationAlert now handle multiples events. Previously, we
  used to generate a single Dshield CorrelationAlert for each events
  where the source address would match the Dshield database. The plugin
  now generate CorrelationAlert for multiples events received from the
  same source.
2009-11-07 18:30:28 +00:00
tez
6e36f1eecb commit patch for PR#36120 2009-11-05 19:16:47 +00:00
adam
c7bbcf1e80 Allow building on 64-bit Darwin 2009-11-03 07:28:17 +00:00
wiz
a1981918ab Simplify awk usage to make it work with nawk, from Matthias Pfaller in
PR 42238.

While here, update to latest certificates from mozilla.
2009-11-03 02:43:55 +00:00
wiz
16513ccf69 Update to 2.8.5:
* Version 2.8.5 (released 2009-11-02)

** libgnutls: In server side when resuming a session do not overwrite the
** initial session data with the resumed session data.

** libgnutls: Fix PKCS#12 encoding.
The error you would get was "The OID is not supported.".  Problem
introduced for the v2.8.x branch in 2.7.6.

** guile: Compatibility with guile 2.x.
By Ludovic Courtes <ludovic.courtes@laas.fr>.

** tests: Fix expired cert in chainverify self-test.

** tests: Fix time bomb in chainverify self-test.
Reported by Andreas Metzler <ametzler@downhill.at.eu.org> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3925>.

** API and ABI modifications:
No changes since last version.
2009-11-03 00:15:41 +00:00
wiz
c3b72c8ff7 Update to 2.8.4:
* Version 2.8.4 (released 2009-09-18)

** libgnutls: Enable Camellia ciphers by default.

** libgnutls: Make OpenPGP hostname checking work again.
The patch to resolve the X.509 CN/SAN issue accidentally broken
OpenPGP hostname comparison.

** libgnutls: When printing X.509 certificates, handle XMPP SANs better.
Reported by Howard Chu <hyc@symas.com> in
<https://savannah.gnu.org/support/?106975>.

** API and ABI modifications:
No changes since last version.
2009-10-31 01:16:42 +00:00
wiz
32222ff809 Update to 1.1.2:
* gpgsigs:
     + Added patch from Roland Rosenfeld to support RIPEMD160 checksum.
       (Closes: #533747).
     + Updated man page to mention support for SHA256 and RIPEMD160 checksum.
     + Made removal of nonexistent photos quiet by the use of the force option.
     + Updated generated tex file in latex mode so that it uses the grffile
       package. This allows pdflatex to process our tex file assuming the photos
       are previously converted to PDF. (Closes: #542478)
   * caff: Updated check for the local-user keyids.
     + Moved the current check to a new function get_local_user_keys().
     + Warned the user if a local-user keyid is not listed as a keyid in
       ./caffrc. (Closes: #540165).
   * gpgdir: New upstream release.
   * gpg-mailkeys:
     + The charset for the text of the message is deduced from the charset used
       by ~/.gpg-mailkeysrc and ~/.signature.
       The text message is encoded in quoted printable and thus it requires a
       new dependency on qprint in debian/control. (Closes: #545186)
     + Mentionned both the .gpg-mailkeysrc and .signature files in the manpage.
2009-10-31 00:20:24 +00:00
jym
278145991d - create a specific user:group for stunnel
- fix the configuration path and file, so it can use the proper user:group
 and the chroot
- fix some pkglint warnings regarding PKG_OPTIONS: 'pthread' => 'threads',
'libwrap' => 'tcpwrappers' (in accordance to mk/defaults/options.description)

Bump PKGREVISION.
2009-10-30 23:54:52 +00:00
tnn
74f1dc7be8 Update to xmlsec1-1.2.13 to fix build breakage with current OpenSSL.
Changes: mostly bugfixes
2009-10-30 19:32:11 +00:00
heinz
08012652ef A value of "2-clause-bsd" is now valid for variable LICENSE. 2009-10-30 16:25:34 +00:00
tnn
9fc576a2ed fix broken/incomplete PKG_SYSCONFDIR handling 2009-10-29 22:24:51 +00:00
tnn
19556e6133 mark as not for unprivileged mode 2009-10-29 20:36:10 +00:00
drochner
eb663df1ca update HOMEPAGE and distfile location/format 2009-10-28 18:50:53 +00:00
drochner
210db0e8a3 +pam-passwdqc 2009-10-28 18:48:36 +00:00
drochner
7861f98879 add pam-passwdqc-1.1.3, a PAM module to enforce rules on password
changes
2009-10-28 18:46:20 +00:00
zafer
42e46f2aff update master_sites. remove ftp.ifi.uio.no. service suspended. 2009-10-27 16:28:30 +00:00
zafer
6f6335871d update master_sites. switch to http with gd.tuwien.ac.at 2009-10-27 16:25:21 +00:00
drochner
66f8d5bda9 update to 2.28.1
This switches to the gnome-2.28 release branch.
2009-10-24 12:52:32 +00:00
jmmv
d464689d18 Fix -install_name of library in OS X to include its full path. This is how
other libraries are being installed (as far as otool -D says) and fixes the
execution of mtn, which couldn't find the botan library before.
2009-10-22 10:25:02 +00:00
drochner
ccb0ade6bd update to 2.28.1
This switches to the gnome-2.28 release branch.
2009-10-21 16:37:19 +00:00
reed
cdcef4c516 Increase the BUILDLINK_API_DEPENDS.libgcrypt requirement.
The configure requires GCRY_CIPHER_CAMELLIA128.
(Not bumping PKGREVISION as this is a build issue.)
2009-10-12 15:25:14 +00:00
sno
2e4858807a Updating security/p5-IO-Socket-SSL from 1.30 to 1.31
Upstream changes:
v1.31 2009.09.25
- add and export constants for SSL_VERIFY_*
- set SSL_use_cert if cert is given and not SSL_server
- support alternative CRL file with SSL_crl_file thanks to patch of
  w[DOT]phillip[DOT]moore[AT]gmail[DOT]com
2009-10-11 08:01:27 +00:00
joerg
9170f1ed4b Use correct relative path. 2009-10-07 19:40:41 +00:00
joerg
85920d02fb Share distinfo file between libprelude-* and similar for
libpreludedb-*. Shuffle stuff a bit around in the Makefile.common,
define PATCHDIR in that, don't define user-destdir support there.
2009-10-07 19:39:42 +00:00
joerg
17a8e4d97d Fix DESTDIR build 2009-10-07 17:39:41 +00:00
joerg
7a466a7121 Fix amd64 case. Simplify. 2009-10-06 18:34:14 +00:00
taca
187ecf9484 Update distinfo to current DISTFILES. 2009-10-05 04:28:46 +00:00
jmmv
62df13b509 Set the correct cpu in macppc and macppc64 so that this builds. Only
verified in macppc though.
2009-10-03 18:02:32 +00:00
hasso
3333334de4 Change install location from ${PREFIX}/lib/mozilla/plugins to
${PREFIX}/lib/xulrunner/plugins. Bump PKGREVISION.
2009-10-02 18:51:20 +00:00
hasso
53bad582f5 Adapt reader.conf handling to pcsc-lite changes. 2009-10-02 12:38:44 +00:00
hasso
9f3ce5f310 - Fix reader.conf handling.
- Fix references to the confdir.
- Fix headers so thirdparty apps can be built with pcsc-lite from pkgsrc.
- Some minor changes to fix pkglint warnings.
- Bump PKGREVISION.
2009-10-02 12:36:13 +00:00
hasso
e29c0fd4da Update to 0.9.17.1. Fix PLIST. Fix dependency. Upstream changes since 0.9.17:
- Fix possible encoding error in the message summary view (#360).
2009-10-02 10:25:53 +00:00
hasso
882172627b Fix PLIST and bump PKGREVISION. 2009-10-02 10:19:51 +00:00
hasso
ee2b9e897c Correct PLIST problems and conf file handling. Bump PKGREVISION. 2009-10-02 10:15:10 +00:00
hasso
52a53dcc64 Add libpreludedb-mysql, libpreludedb-perl, libpreludedb-pgsql,
libpreludedb-python and libpreludedb-sqlite3.
2009-10-02 10:08:53 +00:00
hasso
3f85641953 Add Sqlite3 plugin for LibPreludeDB. Approved by agc@. 2009-10-02 10:05:54 +00:00
hasso
113366b43a Add python bindings for LibPreludeDB libraries. Approved by agc@. 2009-10-02 10:04:48 +00:00
hasso
64e5ea0205 Add PostgreSQL plugin for LibPreludeDB. Approved by agc@. 2009-10-02 10:03:08 +00:00
hasso
a44cbbc79b Add MySQL plugin for LibPreludeDB. Approved by agc@. 2009-10-02 10:02:08 +00:00
hasso
22358d22a8 Add perl bindings for LibPreludeDB libraries. Approved by agc@. 2009-10-02 09:59:40 +00:00
hasso
95b2444b22 Split up the libpreludedb. Approved by agc@. 2009-10-02 09:50:38 +00:00
hasso
06197330c6 Update to 0.9.24.1. Upstream changes:
- Use SWIG 1.3.39 to generate bindings code, fixes Prewikka compatibility
  problem because of SWIG version mismatch between libprelude/libpreludedb
  modules.
2009-10-02 09:46:42 +00:00
sketch
3e82c8a23a Add a bunch more gtkdoc-rebase workarounds. 2009-09-30 09:22:47 +00:00
wiz
62b20db6ab Fix build on systems with native getline() function.
From Anon.
2009-09-29 17:10:38 +00:00
tnn
7e91b0e7bc - AIX fixes from Louis Guillaume
- kill a trailing whitespace
2009-09-28 20:15:08 +00:00
hasso
911a6b035b Update to 0.6.18.
* USB code for BSD fixed by Emmanuel Dreyfus
* Add support for Rutoken S by  Aktiv Co. / Aleksey Samsonov
* Plus some fixes to Info.plist (for users combining openct with pcsc-lite).
2009-09-25 08:36:05 +00:00
tnn
7f4d50f202 really fix 2009-09-24 18:46:26 +00:00
tnn
c007677647 PLIST fix for ldap option. From Matthias Ferdinand. 2009-09-24 18:44:49 +00:00
jmmv
b5087ad17a Include bsd.prefs.mk to get the definition of MACHINE_ARCH. 2009-09-23 16:36:30 +00:00
jmmv
a2261658c3 Update to 1.8.7. Too many changes to list here.
This update is quite delicate and I'm sure it'll break somewhere.  So far
I've only been able to test it in NetBSD/amd64 and Mac OS X Leopard.

I'm bumping the dependency version in buildlink3.mk because the only package
using this seems to be Monotone, and I'll updating it right away.
2009-09-23 16:03:25 +00:00
tron
2ffbaf3d20 Remove "PYTHON_VERSIONS_ACCEPTED= 26 25 24" which is unnecessary
after Python 2.3 has been removed from "pkgsrc".

Approved by Thomas Klausner.
2009-09-23 09:54:45 +00:00
sno
12eb3b028a Added security/p5-Text-Password-Pronounceable version 0.28 2009-09-22 19:36:08 +00:00
sno
74d94cfd5e Importing package security/p5-Text-Password-Pronounceable for p5 module
Text::Password::Pronounceable v0.28 from PR pkg/42022 with some
modifications.

This module generates pronuceable passwords, based the the English digraphs by
D Edwards.
2009-09-22 19:35:32 +00:00
taca
21b1fad22d Retire security/fprot-workstation-bin package. It was F-PROT Antivirus
version 4.x whose support ended Jan. 2009.
2009-09-22 17:51:45 +00:00
taca
3d71b71493 * Add f-prot-antivirus6.
* Add and enable f-prot-antivirus6-fs-bin, f-prot-antivirus6-ms-bin
  and f-prot-antivirus6-ws-bin.
* Remove fprot-workstation-bin.
2009-09-22 17:45:05 +00:00
taca
5b546f54af Importing F-PROT Antivirus for workstations.
F-PROT Antivirus is commercial product of FRISK Software International Inc.
2009-09-22 17:42:40 +00:00
taca
17f06f841e Importing F-PROT Antivirus for mailservers.
F-PROT Antivirus is commercial product of FRISK Software International Inc.
2009-09-22 17:41:07 +00:00
taca
74d40fbdb3 Importing F-PROT Antivirus for fileservers.
F-PROT Antivirus is commercial product of FRISK Software International Inc.
2009-09-22 17:40:32 +00:00
taca
e35c118429 Importing common files for F-PROT Antivirus version 6.x.
F-PROT Antivirus is commercial product of FRISK Software International Inc.
2009-09-22 17:38:33 +00:00
wiz
de5379c30c Comment out crudesaml, it is not a package, just shared files for others.
Add comment to that effect.
2009-09-22 13:11:06 +00:00
wiz
1af8055190 Remove superfluous line. 2009-09-22 13:10:28 +00:00
spz
fa36e46c3f add an option to openvpn to enable using certificates on USB sticks
or cards (etc) that are using the PKCS11 protocol
2009-09-21 12:33:31 +00:00
sno
e940ceac61 Updating security/p5-Authen-CAS-Client from 0.04 to 0.05
pkgsrc changes:
  - Add commented license type
  - Add Perl module type

Upstream changes:
changes from 0.04 to 0.05
-------------------------
  * added doc() accessor to response types
  * added better error handling with better error messages
  * updated perldocs with new functionality and consistency fixes
  * changed user-agent string to reflect module name
2009-09-19 22:28:52 +00:00
sno
84180c5810 Updating security/p5-Crypt-DSA from 0.14nb1 to 1.16
pkgsrc changes:
  - Adding license definition
  - Adjusting dependencies

Upstream changes:
1.16 2009.09.11
	- Switching to production release
	- Switching to non-development version

0.15_01 2009.02.13
	- Updated to Module::Install 0.91
	- Added a consistent $VERSION across the entire distro
	- Removed the optional dependency on Convert::PEM for more
	  consistent downstream packaging (it was pointless to ask
	  since most people don't know what it is anyways).
	- Data::Buffer has almost perfect CPAN Testers PASS, so always
	  install it (plus, SSH2 is common now).
	- Added some missing dependencies to the Makefile.PL
	- Removed the sign(1) and auto_install (which was dangerous)
	- Removed all the magic repository tags that would change depending
	  on who was maintaining it.
	- Adding missing test_requires for Test.pm and Test::More (I'll
	  migrate the remaining tests away from Test.pm next release)
	- Merged the ToDo file into the POD
2009-09-19 22:22:34 +00:00
jnemeth
97170367db add and activate crudesaml 2009-09-17 19:01:49 +00:00
spz
2515e31957 take wip/pkcs11-helper as generated by Daniel 'morr' Horecki <shinden@@linux.pl>
add options, DESTDIR, LICENSE and other small updates to pkgsrc-current
2009-09-15 20:03:47 +00:00
spz
00f58a8658 take wip/pkcs11-helper as generated by Daniel 'morr' Horecki <shinden@linux.pl>
add options, DESTDIR, LICENSE and other small updates to pkgsrc-current
2009-09-15 20:00:47 +00:00
joerg
d8edd02e8c Fix libtool usage 2009-09-15 17:56:16 +00:00
zafer
b136f6334a update master_sites. 2009-09-14 22:56:53 +00:00
taca
4292dec049 Add a trailing slash to MASTER_SITES. 2009-09-14 06:14:14 +00:00
manu
591546dd81 Add crudesaml (cy2-saml and pam-saml) 2009-09-13 19:58:13 +00:00
manu
0b9daa7c95 SASL is a method for adding authentication support to connection-based
protocols.  To use SASL, a protocol includes a command for identifying and
authenticating a user to a server and for optionally negotiating protection
of subsequent protocol interactions.  If its use is negotiated, a security
layer is inserted between the protocol and the connection.

PAM provides a way to develop programs that are independent of
authentication scheme.  These programs need "authentication modules" to be
attached to them at run-time in order to work.  Which authentication module
is to be attached is dependent upon the local system setup and is at the
discretion of the local system administrator.

This package contains a SASL plugin and a PAM module that perform a crude
check on a SAML authentication assertion. The assertion signature and date
are verified, and access is granted on behalf ot the user taked for a
onfigurable attribute.

The only protection against replay attacks is the assertion validity dates
checks, this authentication is therefore secure only if the SAML
authentication assertion remains secret. The assertion has the same role
as a web cookie used for authentication.
2009-09-13 19:57:13 +00:00
joerg
d242e0b808 Explicitly include ctime early in the C++ binding, the macro games from config.h break NetBSD system header. 2009-09-11 16:54:47 +00:00
hasso
b657d29056 More userfriendly default configuration. 2009-09-10 11:38:56 +00:00
joerg
d5d6b13155 Pass down --mode=XXX for libtool. Mark as destdir ready. 2009-09-09 17:32:29 +00:00
abs
113348eb9d polkit-read-auth-helper, polkit-read-grant-helper and polkit-revoke-helper should be setgid polkit not setgid wheel - make it so. Bump PKGREVISION 2009-09-08 13:31:16 +00:00
joerg
e0d4ecdfc2 Retire Python 2.3 support. 2009-09-07 19:02:13 +00:00
joerg
bd37602c77 Retire py-gnutls with the Python 2.3 support. 2009-09-07 18:34:16 +00:00
ahoka
cb7664c5f9 Fix master site. 2009-09-07 18:08:54 +00:00
ahoka
15cf084769 +putty-devel 2009-09-07 18:07:56 +00:00
ahoka
27ce463e2d Import putty-0.6.20090906 as security/putty-devel.
PuTTY is a client program for the SSH, Telnet and Rlogin network protocols.

These protocols are all used to run a remote session on a computer, over a
network. PuTTY implements the client end of that session: the end at which
the session is displayed, rather than the end at which it runs.
2009-09-07 18:01:43 +00:00
zafer
138f1611ac update master_sites. remove openbsd.uni-erlangen. out of service since 8/18/09 2009-09-06 22:36:33 +00:00
joerg
b933558cd1 DESTDIR support, don't depend on libtool mode detection. 2009-09-03 12:35:32 +00:00
wiz
67534800b6 Update to 1.4.10:
Noteworthy changes in version 1.4.10 (2009-09-02)
-------------------------------------------------

    * 2048 bit RSA keys are now generated by default.  The default
      hash algorithm preferences has changed to prefer SHA-256 over
      SHA-1.  2048 bit DSA keys are now generated to use a 256 bit
      hash algorithm

    * Support v2 OpenPGP cards.

    * The algorithm to compute the SIG_ID status has been changed to
      match the one from 2.0.10.

    * Improved file locking.  Implemented it for W32.

    * Fixed a memory leak which made imports of many keys very slow.

    * Many smaller bug fixes.

    * Support for the Camellia cipher (RFC-5581).

    * Support for HKP keyservers over SSL ("HKPS").
2009-09-03 12:05:52 +00:00
plunky
6b81a6f5b6 help this to build on modern OpenSSL versions (as included in NetBSD-current)
by redefining BLOCK->osslBLOCK as was done in security/p5-Net-SSLeay
2009-09-02 11:43:30 +00:00
joerg
a4b5902266 Don't abuse WRAPPER_DIR, libgnutls-config belongs into BUILDLINK_DIR. 2009-09-01 17:48:14 +00:00
seb
f314c85754 Fix build problem on Solaris with PKGSRC_COMPILER=sunpro and 'db4'
in PKG_OPTIONS.apr-util/PKG_DEFAULT_OPTIONS.

USE_LANGUAGES should be set before including mk/apache.mk as it
(may) ends up including mk/compiler.mk.
This last file sets a default value of 'c' to USE_LANGUAGES and
then uses it to set PKG_CC, PKG_CXX and PKG_FC to "fail wrappers".
Hence the C++ compiler command ends up being wrapped by a "fail
script" thus breaks the build.
2009-08-31 07:19:44 +00:00
wiz
0b3b99b51d Convert to user-destdir. 2009-08-29 13:43:39 +00:00
obache
918c66e40c Add user-destdir support. 2009-08-29 10:42:55 +00:00
wiz
e029ceade5 Switch to postgresql82 and hope it works. postgresql81 is gone. 2009-08-27 19:40:44 +00:00
sno
551967e4c1 bumping revision due graphics/ImageMagick update 2009-08-26 21:20:13 +00:00
snj
655fbf8432 Update dropbear to 0.52. Build an scp binary and call it dbscp so it
doesn't conflict with openssh.

Changes since 0.50:

0.52 - Wed 12 November 2008

- Add "netcat-alike" option (-B) to dbclient, allowing Dropbear to
  tunnel standard input/output to a TCP port-forwarded remote host.

- Add "proxy command" support to dbclient, to allow using a spawned
  process for IO rather than a direct TCP connection. eg
	  dbclient remotehost
  is equivalent to
	  dbclient -J 'nc remotehost 22' remotehost
  (the hostname is still provided purely for looking up saved host keys)

- Combine netcat-alike and proxy support to allow "multihop"
  connections, with comma-separated host syntax.  Allows running

	  dbclient user1@host1,user2@host2,user3@host3

  to end up at host3 via the other two, using SSH TCP forwarding. It's
  a bit like onion-routing. All connections are established from the
  local machine.  The comma-separated syntax can also be used for
  scp/rsync, eg

  rsync -a -e dbclient m@gateway,m2@host,martello:/home/matt/ ~/backup/

  to bounce through a few hosts.

- Add -I "idle timeout" option (contributed by Farrell Aultman)

- Allow restrictions on authorized_keys logins such as restricting
  commands to be run etc. This is a subset of those allowed by OpenSSH,
  doesn't yet allow restricting source host.

- Use vfork() for scp on uClinux

- Default to PATH=/usr/bin:/bin for shells.

- Report errors if -R forwarding fails

- Add counter mode cipher support, which avoids some security problems
  with the standard CBC mode.

- Support zlib@openssh.com delayed compression for client/server. It
  can be required for the Dropbear server with the '-Z' option. This
  is useful for security as it avoids exposing the server to attacks
  on zlib by unauthenticated remote users, though requires client side
  support.

- options.h has been split into options.h (user-changable) and
  sysoptions.h (less commonly changed)

- Support "dbclient -s sftp" to specify a subsystem

- Fix a bug in replies to channel requests that could be triggered by
  recent versions of PuTTY

0.51 - Thu 27 March 2008

- Make a copy of password fields rather erroneously relying on getwpnam()
  to be safe to call multiple times

- If $SSH_ASKPASS_ALWAYS environment variable is set (and $SSH_ASKPASS is
  as well) always use that program, ignoring isatty() and $DISPLAY

- Wait until a process exits before the server closes a connection, so
  that an exit code can be sent. This fixes problems with exit codes not
  being returned, which could cause scp to fail.
2009-08-26 21:10:11 +00:00
sno
6f7368d4db bump revision because of graphics/jpeg update 2009-08-26 19:56:37 +00:00
wiz
059bf86ace Remove BROKEN_IN variable. It was no maintained, and there was no
defined workflow for setting it, removing it, or removing packages
depending on it.
2009-08-25 12:32:54 +00:00
wiz
cf79fe6cb9 Get rid of now unnecessary EXTRACT_OPTS_ZIP. 2009-08-25 11:57:44 +00:00
hasso
79e583cb35 Update to 0.9.15. Upstream changes:
- Make Prelude-Manager thread backend independant.
- Add missing dlpreopening support for the SMTP plugin.
- Win32 compilation fixes.
- Various fixes and update.

Also various pkgsrc related fixes including DESTDIR support.
2009-08-24 18:32:21 +00:00
hasso
9362f65242 Update to 0.9.17. From Rumko via PR 41763. Upstream changes:
Changes in 0.9.17:
==================

- Do not provide an exhaustive list of unreachable linked alert, rather,
tell the user how many linked alert are not reachable any more.

- String encoding fixes, do not mix unicode and bytestring, and more
generally, use unicode for internal string storage. This fixes a lot
of possible exception with particular specific user input, or with
localization enabled.

- Inline filter didn't work as expected when viewing events starting
with a specific offset, because the offset keyword wasn't removed
from the generated link.

- Error handling improvement (back / retry button weren't always
working as expected).

- Fix exception when no protocol was available.

- Improve navigation button link (make the link cover the whole button).

Changes in 0.9.16:
==================

- Multiples advanced filter within the same column wouldn't display
correctly.

- Correctly restore input field when switching between advanced/simple
filter mode.

- Fix multiple bug that would results in inconsistant filtered "state"
and reset button.

- Using the classification simple filter now also trigger a search on
impact.completion.

- Fix multiple alert deletion checkbox, (#357).

- Various bug fixes.

Changes in 0.9.15:
==================

- Make it obvious when a column is filtered by replacing the old sober
star with a big "[filtered]" red marker. If the column filter is
saved, then the marker color will go from red to black.

- Once the user filtered a given field by clicking on it, deny further
click so that it is clear that the filter is currently active.

- Re-write the inline filter implementation using Cheetah + Jquery, in
place of generating an enormous amount of javascript code. This
drastically reduce the size of the events listing HTML page, and will
allow for much easier modification of the inline-filters.

- Only propose filter operator relevant to the selected path.

- Inline filter now present a single input field (with no path and
operator selection). Using this field, the user can filter on what is
seen in the associated column. For example, in the classification
column, the filter will trigger a search on classification.text,
classification.reference.name and classification.reference.origin.

There is also an [advanced] button allowing the user to specify both
the path and the operator.

- Implement a reset button in each inline filter column, that allow to
switch between different version of the filter: last saved filters,
default filters, or current filters.

- The user can now click an alert completion to set an inline filter on
the completion value.

- Clicking on a port / protocol now trigger a CSS menu allowing to
filter on the port and protocol information, or to get information
concerning this port / protocol.

- Clicking on a classification reference now trigger a CSS menu which
allow to filter on the reference, or to get more information
concerning it.

- Clicking on classification now add a filter on the selected
classification (previously, it would have unfolded aggregated alerts
for the selected entry, which is now done clicking the alert count).

- Until now, the default user that was automatically created by Prewikka
if there was no administrative user was "admin". As of now you can
define the initial administrative username and password from the
configuration file. (fix #289).

- Fix escaping for reference details URI parameters.

- Fix ModPython content-type handling.

- Invalid variable name, fix #339.

- Update to JQuery 1.3.2, and fit small JQuery API change.

- If the installed libprelude or libpreludedb version is too old,
Prewikka will require the user to upgrade. Currently, Prewikka depend
on libpreludedb 0.9.12, and libprelude 0.9.23.

- Fix IDMEFDatabase exception on empty criteria string (fixes #346).

- Analyzer retrieval fixes and speedup (fixes #350).
2009-08-24 13:57:33 +00:00
hasso
8acc102c53 Update to 0.9.15.3. No normal upstream changelog. Pkgsrc package reworked,
but it's not final yet. From Rumko via PR 41763.
2009-08-24 13:50:03 +00:00
hasso
344bf05d17 Update to 0.9.0-beta6. Rewritten from scratch in Python instead of lua.
From Rumko via PR 41763.
2009-08-24 12:30:09 +00:00
hasso
75f29cb3be Make it build on DragonFly. From Rumko via PR 41763. 2009-08-23 20:02:28 +00:00
hasso
dc392b9701 Update to 0.9.15. Changes since 0.9.14:
- Make the Prelude-LML UDP server IPv6 compatible.
- Implement 'idmef-alter' and 'idmef-alter-force' option, alloing
  to include static values into IDMEF events generated using a given
  format.
- New PPP/PPTPD/L2TP ruleset, by Alexander Afonyashin <firm <at> iname.com>,
  with slight modification from Pierre Chifflier <p.chifflier <at> inl.fr>.
  Close #340.
- Fix CISCO VPN ruleset so that the 'Authentication rejected' rule will
  trigger even if the 'server' field does not contain a word (fix #328).
- Remove dos-style end-of-lines (Closes #338)
- Fixes possible off by one when parsing variable reference number, and
  remove un-needed check that would always evaluate to TRUE.Thanks
  Steve Grubb <sgrubb <at> redhat.com> for reporting this problem (and
  running flexelint on the Prelude sources)!
- Update for libtool 2.x compatibility.
- This simplify the whole regular expression handling a lot, making the
  code much easier to read, and fixing potential problem with ovector
  assignement. This code should also improve performance by a small
  factor.
- Change CISCO references urls to their new location, add CISCO ASA rule
  to handle discarded tcp or udp packets.
- Various fixes and update.
2009-08-23 19:49:27 +00:00
hasso
bdd2595950 Add libprelude bindings. 2009-08-23 19:15:54 +00:00
hasso
daadddf8f8 Import ruby bindings to libprelude. 2009-08-23 19:07:19 +00:00
hasso
11166f14e4 Import python bindings to libprelude. 2009-08-23 19:05:56 +00:00
hasso
ff34d99414 Import perl bindings to libprelude. 2009-08-23 19:05:00 +00:00
hasso
e514aa7db8 Import lua bindings for libprelude. 2009-08-23 19:03:34 +00:00
hasso
9d085e6bbb Update to 0.9.24. No normal upstream changelog except git log. Splitted up
the package to the base (with c++ bindings) and scripting languages bindings.
All hard work done by Rumko <rumcic at gmail.com>.
2009-08-23 18:56:34 +00:00
agc
ddf9c7b55a Fix tyop 2009-08-21 06:18:55 +00:00
sno
915228a30b Updating security/p5-IO-Socket-SSL from 1.27 to 1.30
Upstream changes:
v1.30 2009.08.19
- fix test t/memleak_bad_handshake.t
v1.29 2009.08.19
- fixed thanks for version 1.28
v1.28 2009.08.19
- fix memleak when SSL handshake failed.
  Thanks richardhundtu[AT]gmail[DOT]com
2009-08-20 05:32:21 +00:00
wiz
124c14e18b Bump PKGREVISION for libevent ABI bump. 2009-08-16 15:35:43 +00:00
joerg
c4c8a2da2f Update to Mixminion-0.0.8alpha3.
- support for newer Python versions
- various bug fixes and security improvements
- moved from LGPL to MIT license

Based on the update by Christian Sturm in wip with additional fixes from
me.
2009-08-14 14:09:28 +00:00
snj
00462a6e26 Update to 2.8.3. Changes:
* Version 2.8.3 (released 2009-08-13)

** libgnutls: Fix patch for NUL in CN/SAN in last release.
Code intended to be removed would lead to an read-out-bound error in
some situations.  Reported by Tomas Hoger <thoger@redhat.com>.  A CVE
code have been allocated for the vulnerability: [CVE-2009-2730].

** libgnutls: Fix rare failure in gnutls_x509_crt_import.
The function may fail incorrectly when an earlier certificate was
imported to the same gnutls_x509_crt_t structure.

** libgnutls-extra, libgnutls-openssl: Fix MinGW cross-compiling build
error.

** tests: Made self-test mini-eagain take less time.

** doc: Typo fixes.

** API and ABI modifications:
No changes since last version.

* Version 2.8.2 (released 2009-08-10)

** libgnutls: Fix problem with NUL bytes in X.509 CN and SAN fields.
By using a NUL byte in CN/SAN fields, it was possible to fool GnuTLS
into 1) not printing the entire CN/SAN field value when printing a
certificate and 2) cause incorrect positive matches when matching a
hostname against a certificate.  Some CAs apparently have poor
checking of CN/SAN values and issue these (arguable invalid)
certificates.  Combined, this can be used by attackers to become a
MITM on server-authenticated TLS sessions.  The problem is mitigated
since attackers needs to get one certificate per site they want to
attack, and the attacker reveals his tracks by applying for a
certificate at the CA.  It does not apply to client authenticated TLS
sessions.  Research presented independently by Dan Kaminsky and Moxie
Marlinspike at BlackHat09.  Thanks to Tomas Hoger <thoger@redhat.com>
for providing one part of the patch.  [GNUTLS-SA-2009-4].

** libgnutls: Fix return value of gnutls_certificate_client_get_request_status.
Before it always returned false.  Reported by Peter Hendrickson
<pdh@wiredyne.com> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3668>.

** libgnutls: Fix off-by-one size computation error in unknown DN printing.
The error resulted in truncated strings when printing unknown OIDs in
X.509 certificate DNs.  Reported by Tim Kosse
<tim.kosse@filezilla-project.org> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3651>.

** libgnutls: Return correct bit lengths of some MPIs.
gnutls_dh_get_prime_bits, gnutls_rsa_export_get_modulus_bits, and
gnutls_dh_get_peers_public_bits.  Before the reported value was
overestimated.  Reported by Peter Hendrickson <pdh@wiredyne.com> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3607>.

** libgnutls: Avoid internal error when invoked after GNUTLS_E_AGAIN.
Report and patch by Tim Kosse <tim.kosse@filezilla-project.org> in
<http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3671>
and
<http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3670>.

** libgnutls: Relax checking of required libtasn1/libgcrypt versions.
Before we required that the runtime library used the same (or more
recent) libgcrypt/libtasn1 as it was compiled with.  Now we just check
that the runtime usage is above the minimum required.  Reported by
Marco d'Itri <md@linux.it> via Andreas Metzler
<ametzler@downhill.at.eu.org> in <http://bugs.debian.org/540449>.

** minitasn1: Internal copy updated to libtasn1 v2.3.

** tests: Fix failure in "chainverify" because a certificate have expired.

** API and ABI modifications:
No changes since last version.
2009-08-13 18:56:32 +00:00
obache
3b11655430 recursive bump for icu shlib version change except already done. 2009-08-12 02:31:18 +00:00
drochner
c7892b37e3 recurse: PKGREV bump for ImageMagick shlib name change 2009-08-11 12:40:45 +00:00
drochner
d6e85d27ac bump PKGREVISION for ImageMagick shlib name change 2009-08-11 12:34:51 +00:00
sno
45ae8bcf8f Removing incorrect dependency to PAR::Dist and add license information
according to META.yml (to remove cyclic depend).
2009-08-10 06:40:38 +00:00
wiz
cbca3a57ff Update to 2.3. Update HOMEPAGE and MASTER_SITES. Set packager information.
* Noteworthy changes in release 2.3 (2009-07-29) [stable]
- Libtasn1 is now an official GNU project.
- Solve build problem on Tru64 related to TRUE/FALSE.
- More careful decoding of OIDs.
- Fixed warning in ASN1.y.
- Use "Software libraries" info dircategory.
- Drop GPL/LGPL copies from the manual (not needed there).
- New configure parameters to set packaging specific information.
  The parameters are --with-packager, --with-packager-version, and
  --with-packager-bug-reports.  See
  <http://article.gmane.org/gmane.comp.lib.gnulib.bugs/17791> for more
  details.
2009-08-09 08:02:07 +00:00
agc
99eea44084 Add and enable ssss 2009-08-09 05:53:28 +00:00
agc
f764f9e0bc Initial import of security/ssss-0.5 into the packages collection.
Shamir's Secret Sharing Scheme (SSSS) is an implementation of a
threshold scheme for sharing a secret between third parties, and
requiring a threshold of those parties to collaborate to reveal the
secret.

Taken from the Wikipedia article about Secret Sharing:

	In cryptography, a secret sharing scheme is a method for
	distributing a secret amongst a group of participants, each of
	which is allocated a share of the secret.  The secret can only
	be reconstructed when the shares are combined together;
	individual shares are of no use on their own.

Shamir's scheme is provable secure:  in a (t,n) scheme one can prove
that it makes no difference whether an attacker has t-1 valid shares
at his disposal or none at all; as long as he has less than t shares,
there is no better option than guessing to find out the secret.
2009-08-09 05:52:36 +00:00
bouyer
7f79d3203f This works fine with python 2.5 2009-08-08 14:16:55 +00:00
zafer
cdcc298e59 Update john to 1.7.3.1. Add license. Update patch-aa.
Changelog:
The following changes have been made between John 1.7.3 and 1.7.3.1:

* Corrected the x86 assembly files for building on Mac OS X.
* Merged in some generic changes from JtR Pro.

The following changes have been made between John 1.7.2 and 1.7.3:

* Two Blowfish-based crypt(3) hashes may now be computed in parallel for much
better performance on modern multi-issue CPUs with a sufficient number of
registers (e.g., x86-64).
* Bitslice DES assembly code for x86-64 has been converted to use
instruction pointer relative addressing (needed for Mac OS X support).
* New make targets: macosx-universal, macosx-x86-64, solaris-x86-64-cc,
solaris-x86-64-gcc, solaris-x86-sse2-cc, solaris-x86-sse2-gcc,
solaris-x86-mmx-cc, solaris-x86-mmx-gcc, solaris-x86-any-cc, linux-ia64;
other changes to the Makefile.
* Minor bug fixes.
* "DumbForce" and "KnownForce" external mode samples have been added to the
default john.conf.
2009-08-06 19:14:52 +00:00
minskim
7b90c30295 PKGREVISION bump for elisp packages because of bytecode format changes
in emacs23.
2009-08-06 01:44:45 +00:00
minskim
56f5fd9708 security/EasyPG can be built with emacs23. 2009-08-05 08:01:36 +00:00
hasso
ff9cc13f1e Update to 1.5.5. Changelog:
pcsc-lite-1.5.5: Ludovic Rousseau
28 July 2009
- add the reader interface name if provided by the device
- SCardTransmit(): return SCARD_E_UNSUPPORTED_FEATURE if
  SCARD_PROTOCOL_RAW is requested by unsupported
- SCardConnect() and SCardReconnect(): set dwActiveProtocol to
  SCARD_PROTOCOL_UNDEFINED if SCARD_SHARE_DIRECT is used (conform to
  MSDN). Contrary to Windows winscard behavior, the reader is accessed in
  shared mode and not exclusive mode if SCARD_SHARE_DIRECT is used.
- SCardControl(): correctly check for buffer overflow (bug introduced in
  pcsc-lite 1.5.4)
- some other minor improvements and bug corrections
2009-08-03 18:47:35 +00:00
hasso
3d6279f314 Update to 0.11.9.
New in OpenSC 0.11.9; 2009-07-29; Andreas Jellinghaus

* New rutoken_ecp driver by  Aktiv Co. / Aleksey Samsonov
* Allow more keys/certificates/files etc. with entersafe tokens
* Updates pkcs11.h from scute fixing warnings
* Small fixes in rutoken driver
* Major update for piv driver with increased compatibility
2009-08-03 18:45:31 +00:00
hasso
861ade0fb6 Update to 0.6.17.
New in OpenCT 0.6.17, 2009-07-29; Andreas Jellinghaus

* add support for Rutoken ECP (ccid driver)
* small bugfixes
2009-08-03 18:44:23 +00:00
hasso
5f6352b28f Update to 0.2.6. Changes include fixes in the export file is fixed, now
includes the new function we added in 0.2.5. Also the MSVC build was fixed.
2009-08-03 18:43:00 +00:00
hasso
f4782f4ab0 Update to 1.3.11. Changelog:
1.3.11 - 28 July 2009, Ludovic Rousseau
    - add support of Raritan D2CIM-DVUSB VM/CCID, Feitian SCR301,
      Softforum XecureHSM, 2 Neowave Weneo tokens, Synnix STD200, Aktiv
      Rutoken ECP, Alcor Micro SCR001, ATMEL AT91SC192192CT-USB,
      Panasonic USB Smart Card Reader 7A-Smart, Gemalto GemProx DU and SU
    - remove support of Reiner-SCT cyberJack pinpad(a) on request of
      Reiner-SCT.  You should user the Reiner-SCT driver instead
    - define CFBundleName to CCIDCLASSDRIVER so that non class drivers
      have a higher priority. Used by pcsc-lite 1.5.5 and up.
      Add a --disable-class configure option so that the Info.plist does
      not define a Class driver. Default is class driver.
    - do not power up a card with a voltage not supported by the reader
    - add support of PIN_PROPERTIES_STRUCTURE structure and
      FEATURE_IFD_PIN_PROPERTIES
    - adds support of FEATURE_MCT_READERDIRECT. Only the Kobil TriB@nk
      reader supports this feature for now. This is used for the Secoder
      functionality in connected mode.
    - add support of a composite device. No change needed with libhal.
      use --enable-composite-as-multislot on Mac OS X since libhal is
      not available on Mac OS X or with libusb on Linux
    - some minor bugs removed
2009-08-03 18:38:28 +00:00
hasso
a3f5107672 Update to 1.7.2p1.
Changes in 1.7.2p1 since 1.7.2:
===============================

* Fixed the expansion of the %h escape in #include file names introduced in
  sudo 1.7.1.

Changes in 1.7.2 since 1.7.1:
=============================

* A new #includedir directive is available in sudoers. This can be used to
  implement an /etc/sudo.d directory. Files in an includedir are not edited
  by visudo unless they contain a syntax error.
* The -g option did not work properly when only setting the group (and not
  the user). Also, in -l mode the wrong user was displayed for sudoers
  entries where only the group was allowed to be set.
* Fixed a problem with the alias checking in visudo which could prevent
  visudo from exiting.
* Sudo will now correctly parse the shell-style /etc/environment file format
  used by pam_env on Linux.
* When doing password and group database lookups, sudo will only cache an
  entry by name or by id, depending on how the entry was looked up.
  Previously, sudo would cache by both name and id from a single lookup, but
  this breaks sites that have multiple password or group database names that
  map to the same uid or gid.
* User and group names in sudoers may now be enclosed in double quotes to
  avoid having to escape special characters.
* BSM audit fixes when changing to a non-root uid.
* Experimental non-Unix group support. Currently only works with Quest
  Authorization Services and allows Active Directory groups fixes for
  Minix-3.
* For Netscape/Mozilla-derived LDAP SDKs the certificate and key paths may
  be specified as a directory or a file. However, version 5.0 of the SDK
  only appears to support using a directory (despite documentation to the
  contrary). If SSL client initialization fails and the certificate or key
  paths look like they could be default file name, strip off the last path
  element and try again.
* A setenv() compatibility fix for Linux systems, where a NULL value is
  treated the same as an empty string and the variable name is checked
  against the NULL pointer.
2009-08-02 07:39:27 +00:00
drochner
7599f90094 make this build with newer OpenSSL versions
tested with:
-1.0.0beta3 (which already identifies itself as 1.0.0)
-the snapshot in NetBSD-current (identifies itself as 1.1.0)
-the 0.9.8 we had in -current before
2009-07-30 14:54:39 +00:00
sno
75388c8ec8 Updating package for p5 module IO::Socket::SSL from 1.26 to 1.27
Upstream changes:
v1.27 2009.07.24
- changed possible local/utf-8 depended \w in some regex against more
  explicit [a-zA-Z0-9_]. Fixed one regex, where it assumed, that service
  names can't have '-' inside
- fixed bug https://rt.cpan.org/Ticket/Display.html?id=48131
  where eli[AT]dvns[DOT]com reported warnings when perl -w was used.
  While there made it more aware of errors in Net::ssl_write_all (return
  undef not 0 in generic_write)
2009-07-28 06:32:34 +00:00
hasso
3d84da253a Update to 1.5.1. No detailed changelog, but from announcements:
1.5.1 release provides some bug fixes and a fix for the recently announced
HMAC vulnerability in the XML Signature specification (CVE-2009-0217).

1.5.0 release provides more bug fixes, partial support for Inclusive
Canonicalization 1.1, and support for the Xerces 3.x official release and
32/64-bit portability APIs.
2009-07-24 20:33:16 +00:00
jnemeth
4dd427e95a sort 2009-07-23 05:53:05 +00:00
drochner
c2955f31c6 disable the openssl compatibility library -- no pkg I know of needs
it, and it only has a potential to conflict with the real openssl
(bad things will happen if a program links or dlopen()s both)
bump PKGREVISION
(the bug fixed in the added patches is already fixed upstream, will
be in the next release)
2009-07-22 16:50:07 +00:00
wiz
135620df42 Remove empty PLIST.common_end. 2009-07-22 09:31:05 +00:00