Commit graph

6032 commits

Author SHA1 Message Date
uebayasi
d2c63dcc42 Support user-destdir. 2011-06-14 14:07:37 +00:00
obache
b8c78714fb recursive bump from icu shlib major bump. 2011-06-10 21:57:06 +00:00
drochner
3649698414 add a hint for gnupg2 users (as claws-mail with the s/mime plugin) 2011-06-10 16:23:45 +00:00
obache
f38363508f recursive bump from textproc/icu shlib major bump. 2011-06-10 09:39:41 +00:00
obache
398227e43f Update ruby-roauth to 0.0.7.
bug fixes.
2011-06-10 02:09:57 +00:00
adam
394438d6a9 Changes 1.6.1:
* build: Demand gettext >= 0.18.1 in order to get newer M4 files.
  The old M4 files associated with 0.17 caused problems on Solaris,
  which will hopefully be fixed with this.
* doc: Typo fix in autoconf snippet.
* i18n: Updated translations.
2011-06-01 10:05:57 +00:00
adam
ddb30a933a Fix building with Clang 2011-06-01 09:57:23 +00:00
tez
b27db31dae Add protection against ECDSA timing attacks as mentioned in the paper
by Billy Bob Brumley and Nicola Tuveri, see:
  http://eprint.iacr.org/2011/232.pdf
[Billy Bob Brumley and Nicola Tuveri]

(patch confirmed in upstream cvs)
2011-05-31 17:18:42 +00:00
cheusov
ea3beea076 DESCR_SRC now contains full paths to DESCR files 2011-05-28 10:15:14 +00:00
cheusov
81b4666bb3 add heirloom-su, oked by sponsors 2011-05-28 08:37:10 +00:00
cheusov
036c24cc4c heirloom part 2011-05-28 08:36:05 +00:00
wiz
5728bf8530 Bump PKGREVISION for dependency removal. 2011-05-27 18:50:48 +00:00
hans
911e1a1fe8 libgnome-keyring 2.32.0 does not depend on eggdbus anymore, according to
http://mail.gnome.org/archives/gnome-announce-list/2010-September/msg00101.html
2011-05-27 14:02:57 +00:00
kivinen
1e40d776bf Added support for new 2048 bit FINEID cards. 2011-05-27 10:05:52 +00:00
obache
0145660fa8 * LICENSE=gnu-gpl-v2 # or later
* honor PKGMANDIR
* add user-destdir installation support
* use ${PERL5} as shebang, not /usr/bin/env.

Bump PKGREVISION.
2011-05-26 13:32:26 +00:00
drochner
9e85c89248 add patch from upstream to make network connections (to fetch CRLs)
non-blocking. Blocking can be considered a DOS problem because other
requests are not served in that time. (SA44680, no CVE entry)
bump PKGREV
2011-05-25 09:29:05 +00:00
adam
335c18229a Changes 0.12:
* OpenSSL/crypto/x509.c: Add get_extension_count and get_extension
  to the X509 type, allowing read access to certificate extensions.
* OpenSSL/crypto/x509ext.c: Add get_short_name and get_data to the
  X509Extension type, allowing read access to the contents of an
  extension.
* OpenSSL/ssl/ssl.c: Expose a number of symbolic constants for
  values passed to the connection "info" callback.
* OpenSSL/ssl/connection.py: Add support for new-style
  buffers (primarily memoryviews) to Connection.send and
  Connection.sendall.
2011-05-20 11:05:33 +00:00
drochner
5c91fd0b1a make this build again on NetBSD-current 2011-05-19 15:48:41 +00:00
drochner
08b37fc7ba update to 1.2.18
change: fixes a serious crasher
2011-05-18 10:51:38 +00:00
drochner
00fa4b39fe this pkg only installs binaries -- no need to propagate library
dependencies
2011-05-18 10:11:47 +00:00
taca
5d2a3ee538 Don't always try to create ecdsa key which depends on OpenSSL's version.
Bump PKGREVISION.
2011-05-17 03:26:52 +00:00
taca
0c29a4f649 Maintenance of openssh pacakge:
1. Add support for check and create ECDSA host key for SSH protocol
   version 2.

2. Disable use of strnvis(3) on NetBSD.  NetBSD current after 2011/03/12
   has strnvis(3), but it has different argument from OpenBSD (and other
   system).

Bump PKGREVISION.
2011-05-16 05:06:48 +00:00
gls
51e1a9085c Update security/ruby-net-ssh-gateway to version 1.1.0
Upstream changes:

1.1.0 / 30 Apr 2011

    * Fix for sporadicly stalled SSH connections in Ruby 1.9 [Mat Trudel]
    * Decrease wait time within Net::SSH session loop [Grant Hutchins, Michael
Schubert]
2011-05-15 19:34:51 +00:00
gls
70b476675c Update security/ruby-net-ssh to version 2.1.4.
Upstream changes:

2.1.4 / 3 Apr 2011

    * Add ConnectionTimeout exception class. [Joel Watson]

        See: https://github.com/net-ssh/net-ssh-multi/pull/1

2.1.3 / 2 Mar 2011

    * Call to transport.closed should be transport.close [Woon Jung]

2.1.2 / 1 Mar 2011

    * Fix for Net::SSH Continues to attempt authentication when notified it is
not allowed [Eric Hodel]
(see: http://net-ssh.lighthouseapp.com/projects/36253-net-ssh/tickets/26)
    * Fix for transport won't be closed if authentication fails [Patrick Marchi]

2.1 / 19 Jan 2011

    * Support "IdentitiesOnly" directive (LH-24) [Musy Bite, Edmund Haselwanter]
    * Speeding up the Loggable module (LH-23) [robbebob]

2.0.24 / 14 Jan 2011

    * Fix for process code to correctly wait until remote_id is set before
sending any output, including eof. [Daniel Pittman, Markus Roberts]
    * Fix circular require warning in Ruby 1.9.2 [Gavin Brock]
2011-05-15 19:31:55 +00:00
wiz
2cc499a464 Finish move of tarsnap from security to sysutils. 2011-05-15 11:17:51 +00:00
taca
3ed5f70d98 Update openssh package to 5.8.2 (5.8p2).
20110403
 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
   [contrib/suse/openssh.spec] Prepare for 5.8p2 release.
 - (djm) [version.h] crank version
 - Release 5.8p2

20110329
 - (djm) [entropy.c] closefrom() before running ssh-rand-helper; leftover fds
   noticed by tmraz AT redhat.com

20110221
 - (dtucker) [contrib/cygwin/ssh-host-config] From Corinna: revamp of the
   Cygwin-specific service installer script ssh-host-config.  The actual
   functionality is the same, the revisited version is just more
   exact when it comes to check for problems which disallow to run
   certain aspects of the script.  So, part of this script and the also
   rearranged service helper script library "csih" is to check if all
   the tools required to run the script are available on the system.
   The new script also is more thorough to inform the user why the
   script failed.  Patch from vinschen at redhat com.

20110206
 - (dtucker) [openbsd-compat/port-linux.c] Bug #1851: fix syntax error in
   selinux code.  Patch from Leonardo Chiquitto
 - (dtucker) [contrib/cygwin/ssh-{host,user}-config]  Add ECDSA key
   generation and simplify.  Patch from Corinna Vinschen.
2011-05-15 04:17:15 +00:00
adam
699ff5335b Fix building on systems, where ulong is not defined. 2011-05-12 12:54:17 +00:00
reed
0a80d6b8b8 Remove the REPLACE_PYTHON. It pointed to unused "perl" file.
It is not needed since python is ran directly.
2011-05-10 13:01:01 +00:00
obache
9d60d6d511 Update ruby-simple_oauth to 0.1.5.
* Rakefiles are executables, and rake loads rake, not rakefile code
* Replace rcov with simplecov
* Convert README to Markdown
* Convert LICENSE to Markdown
* Replace rdoc with yard
* Add turn in development for more verbose test output
* Trust the load path
* Remove vestigial VERSION file
* Add Travis configuration file
* Bundle setup before running tests
* Require rubygems
* Add bundler as a development dependency
* Apparently, Object#tap was added in 1.8.7, not 1.9
* Add jruby-openssl dependency
* Add link to Travis CI
* Remove vestigial rdoc options from gem specification
* Bump version to 0.1.5
2011-05-07 03:01:35 +00:00
alnsn
4d64f2a89a pass --libdir to ./configure to fix lib64 vs lib confusion on linux 2011-05-06 19:30:13 +00:00
adam
995d3d9924 Fix buildling with Clang 2011-05-05 08:55:23 +00:00
pettai
8dfe655542 SoftHSM 1.2.1 - 2011-05-03
* Backport mutex handling from v2 for increased multithreaded
  performance.
* Remove signature verification used for debugging purposes.
  (was enabled with ./configure --enable-sigver)
* Added an index to the attribute table in the database.
* Optimization of the database handling.
2011-05-04 10:10:18 +00:00
agc
2467a18da6 Update liboauth from 0.8.9 to 0.9.4.
Changes since previous version:

	version 0.9.4
	  - fixed possible memory corrution in oauth_curl_get
		  thanks to Bruce Rosen for reporting this issue

	version 0.9.3
	 - yet more build-system fixes:
	   - allow to override HASH_LIBS and CURL_LIBS using envoronment variables
	   - include them in .pc and tests/Makefile.am

	version 0.9.2
	 - fixed typo in build-system (LDFLAGS, -Wl,--as-needed detection)

	version 0.9.1
	 - fixed typo in API:
	   oauth_time_indepenent_equals[_n] is now deprecated in favor of
		 oauth_time_independent_equals[_n]
	 - added check for 'Wl,--as-needed' linker flag.

	version 0.9.0
	 - fixed typo in pkg-config file.

With thanks to Brad Harder for the nudge.
2011-05-03 14:23:57 +00:00
adam
01033f3b3f Fix building with Clang 2011-05-02 21:27:15 +00:00
obache
f2478777ba Add a patch for lack of posix standard AF_LOCAL, fall back to AF_UNIX.
for PR#44924.
2011-05-02 09:27:43 +00:00
wiz
046d47d5a1 Add archivers and sysutils to CATEGORIES, per gdt. 2011-05-01 08:28:24 +00:00
wiz
c5e2d17823 + tarsnap. 2011-04-30 12:21:43 +00:00
wiz
77eab98f65 Initial import of tarsnap-1.0.29:
Tarsnap is a secure online backup service for BSD, Linux, OS X,
Solaris, Cygwin, and can probably be compiled on many other UNIX-like
operating systems. The Tarsnap client code provides a flexible and
powerful command-line interface which can be used directly or via
shell scripts.
2011-04-30 12:21:05 +00:00
taca
8e39c26fec More replace interpreter. 2011-04-29 16:51:27 +00:00
adam
5d74d58d73 Changes 1.08:
* Do not attempt to logout if uninitialized.
* Use OpenSSL engine's rsa_priv_enc instead of rsa_sign.

Changes 1.07:
* Minor Win64 fixup.
2011-04-28 07:20:46 +00:00
tnn
8a8ed77799 "pkg-config --cflags gnutls" failed with:
Package zlib was not found in the pkg-config search path.

... there is no zlib.pc, so comment out the part of the configure
script that adds that to the pkg-config file.
Bump PKGREVISION.
2011-04-27 16:56:43 +00:00
obache
39bd7ddc6f need to buildlink with security/nettle.
fixes PR#44909.
2011-04-27 07:19:06 +00:00
adam
7058ae9281 Changes 2.12.3:
* libgnutls: Several minor bugfixes.
* libgnutls: Restored HMAC-MD5 for compatibility. Although considered weak,
  several sites require it for connection. It is enabled for "NORMAL" and
  "PERFORMANCE" priority strings.
* libgnutls: depend on libdl.
* libgnutls: gnutls_transport_set_global_errno() was deprecated. Use your
  system's errno fascility or gnutls_transport_set_errno().
* gnutls-cli: Correction with usage of select to check for pending data in
  gnutls sessions. It now uses gnutls_record_check_pending().
* tests: More fixes and updates for win32. Patches by LRN.
* libgnutls: Several files unnecessarily included <gcrypt.h>; this has been
  fixed.
** API and ABI modifications: gnutls_transport_set_global_errno: DEPRECATED

Changes 2.12.2:
* libgnutls: Several updates and fixes for win32. Patches by LRN.
* libgnutls: Several bug and memory leak fixes.
* srptool: Accepts the -d option to enable debugging.
* libgnutls: Corrected bug in gnutls_srp_verifier() that prevented the
  allocation of a verifier. Reported by Andrew Wiseman.

Changes 2.12.1:
* certtool: Generated certificate request with stricter permissions.
* libgnutls: Bug fixes in opencdk code. Reported by Vitaly Kruglikov.
* libgnutls: Corrected windows system_errno() function prototype.
* libgnutls: C++ compatibility fix for compat.h. Reported by Mark Brand.
* libgnutls: Fix size of gnutls_openpgp_keyid_t by using the
  GNUTLS_OPENPGP_KEYID_SIZE definition. Reported by Andreas Metzler.
2011-04-26 10:35:29 +00:00
adam
5b80244664 buildlink3.mk depends on gmp, even when includes are needed; use MAJOR/MINOR for linking libraries 2011-04-26 09:54:55 +00:00
adam
9b89868c0c Actually, prefer gm4 2011-04-26 09:39:02 +00:00
adam
4d6fe6a19d Added security/nettle version 2.1 2011-04-26 09:01:12 +00:00
adam
b7a3a18f70 Nettle is a cryptographic library that is designed to fit easily in more
or less any context: In crypto toolkits for object-oriented languages
(C++, Python, Pike, ...), in applications like LSH or GNUPG, or even in
kernel space. In most contexts, you need more than the basic
cryptographic algorithms, you also need some way to keep track of available
algorithms, their properties and variants. You often have some algorithm
selection process, often dictated by a protocol you want to implement.

And as the requirements of applications differ in subtle and not so
subtle ways, an API that fits one application well can be a pain to use
in a different context. And that is why there are so many different
cryptographic libraries around.

Nettle tries to avoid this problem by doing one thing, the low-level
crypto stuff, and providing a simple but general interface to it.
In particular, Nettle doesn't do algorithm selection. It doesn't do
memory allocation. It doesn't do any I/O.

The idea is that one can build several application and context specific
interfaces on top of Nettle, and share the code, test cases, benchmarks,
documentation, etc. Examples are the Nettle module for the Pike
language, and LSH, which both use an object-oriented abstraction on top
of the library.
2011-04-26 08:59:33 +00:00
hauke
c0f345ba8c Make sure <langinfo.h> actually provides CODESET before using it,
for the sake of old NetBSD releases.
2011-04-23 17:48:33 +00:00
obache
51d76b29e2 recursive bump from gettext-lib shlib bump. 2011-04-22 14:40:40 +00:00
obache
0e2c97799a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
obache
95b767f494 note "used by..." comments 2011-04-18 11:55:14 +00:00
joerg
0359c177d4 Dependency doesn't support Python 2.4 2011-04-15 14:48:41 +00:00
tez
388e116bb9 fix MITKRB5-SA-2011-004 (CVE-2011-0285) DOS in kadmind 2011-04-14 19:37:26 +00:00
drochner
138ff0467d +py-keyring 2011-04-14 17:28:47 +00:00
drochner
9b0600fdbc add py-keyring-0.5.1, from Kamel Derouiche per pkgsrc-wip 2011-04-14 17:27:04 +00:00
drochner
b3508adc19 update to 2.32.1
This switches to the gnome-2.32 release branch.
2011-04-13 16:39:14 +00:00
wiz
8de78773ac Bump PKGREVISION for abs' PLIST fix.
While here, set COMMENT (!) and HOMEPAGE.
2011-04-13 09:53:32 +00:00
abs
d927a89d7e Add info/assuan.info to PLIST 2011-04-13 09:11:39 +00:00
adam
0165a96203 Removed (lib)fwbuilder21 successor (lib)fwbuilder 4.1.3 2011-04-12 13:46:35 +00:00
adam
b8d55b79dc Changes 4.1.3:
This version comes with the following usability enhancements:
* Added checkbox to the Preferences dialog, this checkbox turns off some
  tooltips that can be annoying for users who are sufficiently familiar with
  the GUI.
* Added a tab "Policy Rule" to the "Objects" page of the global preferences
  dialog; checkbox in this tab allows the user to choose whether new policy
  rules should be created with logging turned on or off.
The major bug fixes in this release include:
* Fixed installer issue for Windows users that use Putty sessions. Built-in
  policy installer can use putty session on Windows when it runs pscp.exe
  utility to copy generated script to the firewall
* Fixed bug in the generated iptables script that made it to not configure
  broadcast address when it added ip addresses to interfaces.
* Several bugs that affected cluster configurations were fixed.
2011-04-12 13:41:17 +00:00
adam
0db3777841 Fix building on Mac OS X; pkglint clean-up 2011-04-12 13:17:20 +00:00
obache
0845142e1c + ruby-simple_oauth 2011-04-12 12:00:39 +00:00
obache
a39e90bec7 Import ruby18-simple_oauth-0.1.4 as security/ruby-simple_oauth.
Simply builds and verifies OAuth headers.
2011-04-12 11:58:45 +00:00
tez
1c5206aa83 correct openssl dependency (it needs >=0.9.8)
correct BUILDLINK_API_DEPENDS.mit-krb5
fix building where libtool chokes on "--version-info : " (at least OS X)
2011-04-09 00:16:18 +00:00
tez
d625f1997f Add builtin support for SunOS per PR#44597 2011-04-08 17:30:35 +00:00
obache
77638188c3 * set LICENSE=gnu-gpl-v2(tools part) AND gnu-lgpl-v2(library part).
* let to depend on dbus-glib, this package use it directly and already in
  buildlink3.mk.
* using desktopdb.mk for *.desktop files.

Bump PKGREVISION.
2011-04-07 08:58:12 +00:00
wiz
83a1bc5219 Fix PKGREVISION variable name. From Robert Elz. 2011-04-05 08:36:41 +00:00
manu
0834ececa9 Major update, with many changes that ould be difficult to sum up. Please
see the NEWS file.
2011-04-04 08:30:29 +00:00
agc
f7af5d4e16 Let this package build on post-POSIX getline() systems.
Also include the relevant (static) libraries, where necessary, to allow
link-editing.
2011-04-01 21:56:14 +00:00
tez
3a17f46777 Use solaris64 rather than solaris for ABI=64 build using gcc in SunOS
fixes PR#44769
2011-04-01 21:02:48 +00:00
wiz
eed20d026c Update to 1.2.17, for security reasons.
* Preparations for 1.2.17 release
* Fixed security issue with libxslt (CVE-2011-1425, reported by Nicolas Gregoire)
* Fixed pkcs12 file loading (based on patch from Andre de Souza Pinto)
* Fixed comments (based on patch from Wolfgang Woehl)
* Fixed extra quotes in configure (bug #631258)
* Fixed configure issue with empty --with-libxml/libxsl and config scripts in /bin directory
* Fixed gcrypt init/shutdown (patch from Roumen)
2011-04-01 12:27:45 +00:00
wiz
03abaedf27 Fix PKGNAME to have "60" instead of "6", to avoid making it appear very
old and triggering a vulnerability match. Suggested by obache.

Reset PKGREVISION, since the version is newer than the old one.
Set LICENSE.
2011-04-01 11:43:57 +00:00
agc
4c6ea94f65 Be consistent in the way we quote the '#' character 2011-03-31 18:37:33 +00:00
agc
6f280e7bc8 The '#' character is kinda special to makefiles - re-work the comment field
so that we don't have any '#' chars in it.

Avoids the following:

	% grep COMMENT Makefile
	COMMENT=       Cryptographic store accessible through a PKCS#11 interface
	% pkg_info softhsm
	Information for softhsm-1.2.0:

	Comment:
	Cryptographic store accessible through a PKCS
2011-03-31 18:30:32 +00:00
obache
d40f6a7ea6 * fix make target dependency to man page aliases (arg_printusage.3) will be
always installed.
* add user-destdir installation support.
2011-03-24 05:38:01 +00:00
obache
c9c076afbc Use bsdtar for extract, or result in corrupted file name with certain tar.
Bump PKGREVISION.
2011-03-24 03:04:16 +00:00
zafer
2cb4ddf81c update PLIST. arg_printusage.3 is gone. 2011-03-23 20:56:49 +00:00
obache
6bf7e93088 revert unwanted commit accidently. 2011-03-23 08:11:37 +00:00
obache
8826e81333 remove needless assignment, it break strict-aliasing. 2011-03-23 08:10:33 +00:00
obache
d44d630616 bsd.fast.prefs.mk should not be included from packages. 2011-03-23 07:49:47 +00:00
tez
aaed81ca3e Kerberos V5 is an authentication system developed at MIT. It is a network
authentication protocol designed to provide strong authentication for
client/server applications by using secret-key cryptography. (Kerberos
5 is discussed in RFC 1510.)

This package provides MIT Kerberos applications and servers for telnet,
the r-services and ftp.  These were recently split from the mit-krb5
package due to upstream making the same split.
2011-03-23 00:01:38 +00:00
tez
0988999e87 remove 3 more old patches that got missed 2011-03-22 23:35:59 +00:00
tez
491d6a5a3b Update MIT Kerberos to v1.8.3 with the latest security patches up to and
including MITKRB5-SA-2011-003.

Please see http://web.mit.edu/kerberos/ for the change logs since v1.4.2

Note that the r-services, telnetd and ftpd services and the related client
applications are now in a separate pacakge security/mit-krb5-appl.
2011-03-22 23:31:04 +00:00
tez
c8b298166d add mit-krb5-appl (split out of mit-krb5) 2011-03-22 23:20:49 +00:00
abs
261907ea22 looks like "make mps" may have been missed... 2011-03-22 23:09:10 +00:00
taca
9fdaec50e8 Update sudo pacakge to 1.7.5.
* pkgsrc change: trying to use user-destdir.


What's new in Sudo 1.7.5?

 * When using visudo in check mode, a file named "-" may be used to
   check sudoers data on the standard input.

 * Sudo now only fetches shadow password entries when using the
   password database directly for authentication.

 * Password and group entries are now cached using the same key
   that was used to look them up.  This fixes a problem when looking
   up entries by name if the name in the retrieved entry does not
   match the name used to look it up.  This may happen on some systems
   that do case insensitive lookups or that truncate long names.

 * GCC will no longer display warnings on glibc systems that use
   the warn_unused_result attribute for write(2) and other system calls.

 * If a PAM account management module denies access, sudo now prints
   a more useful error message and stops trying to validate the user.

 * Fixed a potential hang on idle systems when the sudo-run process
   exits immediately.

 * Sudo now includes a copy of zlib that will be used on systems
   that do not have zlib installed.

 * The --with-umask-override configure flag has been added to enable
   the "umask_override" sudoers Defaults option at build time.

 * Sudo now unblocks all signals on startup to avoid problems caused
   by the parent process changing the default signal mask.

 * LDAP Sudoers entries may now specify a time period for which
   the entry is valid.  This requires an updated sudoers schema
   that includes the sudoNotBefore and sudoNotAfter attributes.
   Support for timed entries must be explicitly enabled in the
   ldap.conf file.  Based on changes from Andreas Mueller.

 * LDAP Sudoers entries may now specify a sudoOrder attribute that
   determines the order in which matching entries are applied.  The
   last matching entry is used, just like file-based sudoers.  This
   requires an updated sudoers schema that includes the sudOrder
   attribute.  Based on changes from Andreas Mueller.

 * When run as sudoedit, or when given the -e flag, sudo now treats
   command line arguments as pathnames.  This means that slashes
   in the sudoers file entry must explicitly match slashes in
   the command line arguments.  As a result, and entry such as:
	user ALL = sudoedit /etc/*
   will allow editing of /etc/motd but not /etc/security/default.

 * NETWORK_TIMEOUT is now an alias for BIND_TIMELIMIT in ldap.conf for
   compatibility with OpenLDAP configuration files.

 * The LDAP API TIMEOUT parameter is now honored in ldap.conf.

 * The I/O log directory may now be specified in the sudoers file.

 * Sudo will no longer refuse to run if the sudoers file is writable
   by root.

 * Sudo now performs command line escaping for "sudo -s" and "sudo -i"
   after validating the command so the sudoers entries do not need
   to include the backslashes.

 * Logging and email sending are now done in the locale specified
   by the "sudoers_locale" setting ("C" by default).  Email send by
   sudo now includes MIME headers when "sudoers_locale" is not "C".

 * The configure script has a new option, --disable-env-reset, to
   allow one to change the default for the sudoers Default setting
   "env_reset" at compile time.

 * When logging "sudo -l command", sudo will now prepend "list "
   to the command in the log line to distinguish between an
   actual command invocation in the logs.

 * Double-quoted group and user names may now include escaped double
   quotes as part of the name.  Previously this was a parse error.

 * Sudo once again restores the state of the signal handlers it
   modifies before executing the command.  This allows sudo to be
   used with the nohup command.

 * Resuming a suspended shell now works properly when I/O logging
   is not enabled (the I/O logging case was already correct).
2011-03-22 14:52:08 +00:00
pettai
981e84fa49 OpenDNSSEC 1.2.1:
* ldns 1.6.9 is required for bugfixes.
* dnsruby-1.52 required for bugfixes.

Bugfixes:
* Auditor: 'make check' now works when srcdir != builddir.
* Auditor: Include the 'make check' files in the tarball.
* Enforcer: Fix the migration script for SQLite.
* Enforcer: Increase size of keypairs(id) field in MySQL to allow more than
  32767 keys; see MIGRATION for details.
* Enforcer: Minor change to NOT_READY_KEY error message.
* libhsm: Increase the maximum number of attached HSM:s from 10 to 100.
* ods-ksmutil: Send trivial MySQL messages to stdout when exporting zonelist
  etc. Otherwise the resulting XML needs to be edited by hand.
* ods-control: Fix for Bourne shell.
* Signer Engine: Prevent race condition when setting up the workers and
  the command handler.
* Signer Engine: Check if the signature exists before recycling it.
* Signer Engine: Quit when there are errors in the configuration.
* Signer Engine: Enable core dump on failure.
* Signer Engine: Explicitly close down log msg with null.
* Signer Engine: Backup state after writing output.
* Signer Engine: Allow update of serial if internal structure is not
  initialized.
2011-03-21 15:52:25 +00:00
obache
e472f7bcd2 Add user-destdir installatin support. 2011-03-20 06:36:30 +00:00
obache
c47c160dc4 Add user-destdir installation support. 2011-03-20 06:29:52 +00:00
obache
d1b49ee73e Add user-destdir installation support. 2011-03-20 06:17:58 +00:00
dholland
4f4376b1c7 Update ap-modsecurity2 to 2.5.13, partly from Matthew Sporleder in
PR 44745, rest by me.

pkgsrc changes:
   - fix up deps
   - fix Apache module handling
   - DESTDIR support

XXX: The DESTDIR support has to bypass apxs because as far as I can tell
XXX: apxs -i doesn't know how to handle DESTDIRs. Various Apache modules
XXX: do this in various different ways. Someone(TM) should teach apxs -i
XXX: about DESTDIRs and fix up all the abuse. The infrastructure for
XXX: Apache modules could use some rototilling as well.

29 Nov 2010 - 2.5.13
--------------------

 * Cleaned up some mlogc code and debugging output.

 * Remove the ability to use a relative path to a piped audit logger
   (i.e. mlogc) as Apache does not support it in their piped loggers
   and it was breaking Windows and probably other platforms that
   use spaces in filesystem paths.  Discovered by Tom Donovan.

 * Fix memory leak freeing regex.  Discovered by Tom Donovan.

 * Fix some portability issues on Windows.

 * Fixed Geo lookup concurrent connections bug

 * Fixed Skip/SkipAfter chain bug

 * Added new setvar Lua API to be used into Lua scripts

 * Added PCRE messages indicates each rule that exceed match limits

 * Added new Base64 transformation function called base64DecodeEx, which
   can decode base64 data skipping special characters.

 * Add SecReadStateLimit to limit the number of concurrent threads in BUSY connections per ip address

 * Fixed redirect action was not expanding macros in chained rules



04 Feb 2010 - 2.5.12
--------------------

 * Fixed SecUploadFileMode to set the correct mode.

 * Fixed nolog,auditlog/noauditlog/nolog controls for disruptive actions.

 * Added additional file info definitions introduced in APR 0.9.5 so that
   build will work with older APRs (IBM HTTP Server v6).

 * Added SecUploadFileLimit to limit the number of uploaded file parts that
   will be processed in a multipart POST.  The default is 100.

 * Fixed path normalization to better handle backreferences that extend
   above root directories.  Reported by Sogeti/ESEC R&D.

 * Trim whitespace around phrases used with @pmFromFile and allow
   for both LF and CRLF terminated lines.

 * Allow for more robust parsing for multipart header folding.  Reported
   by Sogeti/ESEC R&D.

 * Fixed failure to match internally set TX variables with regex
   (TX:/.../) syntax.

 * Fixed failure to log full internal TX variable names and populate
   MATCHED_VAR* vars.

 * Enabled PCRE "studying" by default.  This is now a configure-time option.

 * Added PCRE match limits (SecPcreMatchLimit/SecPcreMatchLimitRecursion) to
   aide in REDoS type attacks.  A rule that goes over the limits will set
   TX:MSC_PCRE_LIMITS_EXCEEDED.  It is intended that the next major release
   of ModSecurity (2.6.x) will move these flags to a dedicated collection.

 * Reduced default PCRE match limits reducing impact of REDoS on poorly
   written regex rules.  Reported by Sogeti/ESEC R&D.

 * Fixed memory leak in v1 cookie parser.  Reported by Sogeti/ESEC R&D.

 * Now support macro expansion in numeric operators (@eq, @ge, @lt, etc.)

 * Update copyright to 2010.

 * Reserved 700,000-799,999 IDs for Ivan Ristic.

 * Fixed SecAction not working when CONNECT request method is used
   (MODSEC-110). [Ivan Ristic]

 * Do not escape quotes in macro resolution and only escape NUL in setenv
   values.


04 Nov 2009 - 2.5.11
--------------------

 * Added a new multipart flag, MULTIPART_INVALID_QUOTING, which will be
   set true if any invalid quoting is found during multipart parsing.

 * Fixed parsing quoted strings in multipart Content-Disposition headers.
   Discovered by Stefan Esser.

 * Cleanup persistence database locking code.

 * Added warning during configure if libcurl is found linked against
   gnutls for SSL.  The openssl lib is recommended as gnutls has
   proven to cause issues with mutexes and may crash.

 * Cleanup some mlogc (over)logging.

 * Do not log output filter errors in the error log.

 * Moved output filter to run before other stock filters (mod_deflate,
   mod_cache, mod_expires, mod_filter) to avoid analyzing modified data
   in the response.  Patch originally submitted by Ivan Ristic.



18 Sep 2009 - 2.5.10
--------------------

 * Cleanup mlogc so that it builds on Windows.

 * Added more detailed messages to replace "Unknown error" in filters.

 * Added SecAuditLogDirMode and SecAuditLogFileMode to allow fine tuning
   auditlog permissions (especially with mpm-itk).

 * Cleanup SecUploadFileMode implementation.

 * Cleanup build scripts.

 * Fixed crash on configuration if SecMarker is used before any rules.

 * Fixed SecRuleUpdateActionById so that it will work on chain starters.

 * Cleanup build system for mlogc.

 * Allow mlogc to periodically flush memory pools.

 * Using nolog,auditlog will now log the "Message:" line to the auditlog, but
   nothing to the error log.  Prior versions dropped the "Message:" line from
   both logs.  To do this now, just use "nolog" or "nolog,noauditlog".

 * Forced mlogc to use SSLv3 to avoid some potential auto negotiation
   issues with some libcurl versions.

 * Fixed mlogc issue seen on big endian machines where content type
   could be listed as zero.

 * Removed extra newline from audit log message line when logging XML errors.
   This was causing problems parsing audit logs.

 * Fixed @pm/@pmFromFile case insensitivity.


 * Truncate long parameters in log message for "Match of ... against ...
   required" messages.

 * Correctly resolve chained rule actions in logs.

 * Cleanup some code for portability.

 * AIX does not support hidden visibility with xlc compiler.

 * Allow specifying EXTRA_CFLAGS during configure to override gcc specific
   values for non-gcc compilers.

 * Populate GEO:COUNTRY_NAME and GEO:COUNTRY_CONTINENT as documented.

 * Handle a newer geo database more gracefully, avoiding a potential crash for
   new countries that ModSecurity is not yet aware.

 * Allow checking &GEO "@eq 0" for a failed @geoLookup.

 * Fixed mlogc global mutex locking issue and added more debugging output.

 * Cleaned up build dependencies and configure options.
2011-03-19 21:18:06 +00:00
dholland
d9e3ab2da8 Sort. 2011-03-19 21:16:27 +00:00
obache
fa81d4c2b1 * additional missing clean up after removal of libxml option.
* pass to configure more preferred variables.
2011-03-19 13:31:52 +00:00
obache
98f3ca061d * improve fetch message
* add user-destdir installation support
* fixes installation on platforms where ROOT_USER != "root".
2011-03-19 11:54:30 +00:00
obache
1136fd6bd2 Only suggest download of DEFAULT_DISTFILES, or other files may need to be
downloaded from other sites than MASTER_SITES.
2011-03-19 11:46:59 +00:00
obache
2462957290 Add user-destdir installation support. 2011-03-19 11:14:30 +00:00
obache
afe02a84c3 Convert to usual style of "used by" comment. 2011-03-19 10:37:26 +00:00
obache
9b53688301 * MAKE_JOBS_SAFE=no
* Note commented-out LICENSE (GNU EMACS GENERAL PUBLIC LICENSE)
* Add user-destdir installation support.
2011-03-19 09:36:47 +00:00
obache
c7f99d1836 * LICENSE=original-bsd
* Add user-destdir installation support.
* Let to binary package same as installed from source
Bump PKGREVISION.
2011-03-19 09:18:02 +00:00
obache
d71e41989d LICENSE=gnu-gpl-v2 2011-03-19 08:31:26 +00:00
obache
ebd42cd2a8 Marked as USER_DESTDIR ready. 2011-03-19 08:29:20 +00:00
zafer
536818ce0f service suspended. prevent timeout. fetch from backup. 2011-03-18 20:28:21 +00:00
zafer
8a952529f9 update master_sites 2011-03-18 20:26:02 +00:00
pettai
c350b3a99f 1.8:
- New Features:
    - zonesigner, rollerd
                    - Made changes so that these tools are more compatible
                      with recent versions of Bind
                    - The zone_errors configuration parameter allows a zone-
                      specific maximum to be set.  Once exceeded, that zone
                      will be skipped rather than allowing rollover to continue.
    - blinkenlights
                    - Recognizes when rollerd abruptly quits, so error messages
                      aren't spewed interminably.
    - ZonFile::Fast - Fixed parsing of DS records containing spaces and
                      parsing of mname and rname SOA fields
                    - Added support for parsing KEY records
    - keyrec.pm     - Made changes to properly lock keyrec files before
                      writing to them.
                    - Begun process of deprecating keyrec_open().
    - mapper:       - added a new option: --node-size for mapping
                      complex zones.
    - dnspktflow:   - added two new options:
                      --layout-style for selecting the layout style to use
                      --node-size for mapping complex zones.
                    - Add new (default) option to cluster
                      authoritative nodes together to help better
                      understand the relationships between traffic
                      patterns and authoritative name server/zone arrangement.
    - libval:       - Now distributed with the Root TA.
                    - Added stricter checks for openssl SHA-256 support in
                      configure.
                    - Added several improvements that allow the validator to
                      lookup information within provably insecure zones that
                      do not handle EDNS0 requests nicely. This includes
                      adding support for turning off EDNS0 when traversing a
                      name hierarchy that leads to a provably insecure zone,
                      EDNS0 fallback support, and additional checks to check
                      the sanity of response data.
                    - Fixed certain bugs in CNAME handling and in the
                      validation of proofs accompanying wildcard responses,
                      referrals and alias chains.
                    - Fixed support for RSADSA and RSASHA-512 signature
                      validation.
    - Mac OSX:      - Added a Ports file for mac ports
                    - updated the fink build spec

 - many other miscellaneous bug fixes and improvements.
2011-03-12 20:07:19 +00:00
pettai
695a2a1abb Fix build + installation errors. 2011-03-12 19:55:41 +00:00
pettai
c3acfc37e5 zkt 1.0 -- 15. June 2010
* feat  "/dev/urandom" check added to checkconfig()
* feat  Config compability switch (-C) added to zkt-conf
* feat  zkt-ls has a new switch -s to change sorting of domains from
        subdomain before parent to subdomain below the parent
* feat  "zkt-ls -T" prints only parent trust anchor

zkt 1.0rc1 -- 1. Apr 2010 (The 1.0 release was sponsored by DOMINIC(r) )

* feat  Several config parameter are printed now in a more consistent and
        user friendly form.
        SerialFormat "Incremental" could be abbreviated as "inc" on input.
* bug   use of AC_ARG_ENABLE macros changed in a way that it is possible
        to use it as a "--disable-FEATURE" switch.
* port  no longer checking for malloc() in configue script.
        Mainly because it checks only if malloc(0) is allowed and we do
        not need this.
* port  --disable-color-mode added to configure script
* bug   Makro PRINT_AGE_OF_YEAR renamed to PRINT_AGE_WITH_YEAR in configure.ac
* misc  man page zkt-keyman added
* misc  New command zkt-keyman added as replacement for dnssec-zkt's key
        management functionality
* misc  man page zkt-ls added
* port  Check for ncurses added to Makefile.in
* misc  Color mode (Option -C) added to zkt-ls (experimental)
        New source file tcap.c.
* misc  Deprecate "single linked list" version of ZKT. The binary tree
        version is the default for years, so the VERSION string does no
        longer contain a "T".  Now, if someone insist on the single link
        list version (configure --disable-tree) a "S" is added to the
        version string.
        Anyway, the code for the single link list version does no longer
        have the same functionality and will be removed in one of the later
        releases.
* misc  New command zkt-ls added as replacement for dnssec-zkt's key
        listing functionality
* func  New key algorithms RSASHA256 and RSAHSHA512 added to dki.[ch]
        and zconf.c
        New parameter NSEC3 added. Now it's possible to configure
        an NSEC3_OPTOUT zone.
* bug   Token parsing function gettok() fixed to recognize tokens
        with dashes ("zone-statistics" was seen as "zone").
        Thanks to Andreas Baess for finding this bug.
* bug   Fixed bug in (re)salting dynamic zones.
        sig_zone() and gensalt() needs parameter change for this
* func  New option -a added to zkt-conf
* func  In zconf.c CONF_TIMEINT parameter are now able to recognize
        "unset" values (which is represented internaly as 0)
* func  Set Max_TTL to sig lifetime for dynamic zones or if Max_TTL
        is less than 1.
        max_ttl checks in checkconfig() fixed.
* func  printconfigdiff() added to zconf.c and used by zkt-conf.
        Now local configs are printed as diff to site wide config.
* misc  man page zkt-signer.8 changed to new command syntax
* func  Per domain logging added. Use parameter LogDomainDir to
        enable it. For more details see file README.logging.
* func  distribute.sh supports new action type "distkeys" but is
        currently not used
* misc  LOG_FNAMETMPL changed and moved from config_zkt.h to log.h
* misc  Default soa serial format changed from "Incremental"
        to "Unixtime"
* func  dnssec-signer command renamed to zkt-signer. Man page updated.
* func  New command zkt-conf added as replacement for dnssec-zkt -Z
* misc  timeint2str() is now global (zconf.c)
* func  zfparse.c - a rudimentary zone file parser
        scans minimum and maximum ttl values; adds $INCLUDE dnskey.db

zkt 0.99d -- Not released

* func  Option SIG_DnsKeyKSK for DNSKEY signing with KSK only added
* misc  BIND 9.7 compability
2011-03-12 16:46:05 +00:00
drochner
ee7814d4b8 add some clarification about the difference between OpenSSL and GnuTLS,
and guidance for users of the latter
2011-03-11 21:00:06 +00:00
adam
3f56fef802 Changes 1.2.0:
* New functions to allow the creation of X.509 certificates.
* Interface changes relative to the 1.1.0 release:
  ksba_certreq_set_serial          NEW
  ksba_certreq_set_issuer          NEW
  ksba_certreq_set_validity        NEW
  ksba_certreq_set_siginfo         NEW
2011-03-11 07:22:05 +00:00
adam
39cacf8b91 Fix building on Mac OS X; added LICENCE 2011-03-11 07:20:45 +00:00
drochner
bf61ff2be8 update to 0.53.1
changes:
-misc fixes and improvements
-build against system libtommath/crypt
2011-03-10 10:20:16 +00:00
drochner
6b3134f375 build shared lib, bump PKGREV 2011-03-10 09:52:24 +00:00
drochner
fc92f5813b fix installed pkgconfig .pc file: Don't refer to zlib.pc -- this
fails with system libz. We propagate a dependency per bl3 file,
this should be sufficient.
bump PKGREV
2011-03-09 10:52:25 +00:00
adam
d762c5558e Changes 2.10.5:
* libgnutls: Corrected verification of finished messages.
* libgnutls: Corrected signature generation and verification in the Certificate
  Verify message when in TLS 1.2.
* pkg-config gnutls.pc improvements.
* API and ABI modifications: No changes since last version.
2011-03-07 13:45:34 +00:00
adam
3f208f95b6 buildlink3.mk fix 2011-03-05 11:49:12 +00:00
obache
116527272b Use AC_LINK_IFELSE instead of AC_COMPILE_IFELSE for __thread,
or unwanted detect of TLS support on NetBSD-5.1.
2011-03-04 11:34:12 +00:00
adam
94fd91d96b Changes 1.3.0:
* GPGME does not come with an internal libassuan version anymore.
  The external libassuan 1.1.0 release or later is required.  For
  application programmers on systems that can resolve inter-library
  dependencies at runtime, this is a transparent change.
* New engine GPGME_PROTOCOL_G13 to support the new g13 tool.
* New engine GPGME_PROTOCOL_UISERVER to support UI Servers.
* New API to change the passpgrase of a key.
2011-03-03 11:39:47 +00:00
kleink
f710071ee7 Remove security/libksba04. Nothing uses this anymore, there's
security/libksba tracking stable releases, and the distfile is gone.
2011-03-01 15:40:22 +00:00
wiz
36ff915e97 Reset maintainer for retired developers. 2011-02-28 14:52:37 +00:00
wiz
df14816790 Let's assume for now that everything that worked with python-2.6 also
works with python-2.7.
2011-02-25 09:47:18 +00:00
obache
6f52075a35 Use --format-executable to avoid conflicts with ruby variants each other.
Bump PKGREVISION.
2011-02-25 06:35:23 +00:00
adam
533f882eab Changes 2.4.1:
Bug
* Reload interval staying too low on reload failures.
* [HTTP-Redirect binding] [Message encoding] There should be no '%0A' in the
  SAMLRequest parameter value
2011-02-23 09:11:09 +00:00
adam
d13c24ae28 Changes 1.6.0:
* Fix: wrong namespace in encryption DigestMethod
* Fix: RetrievalMethod handler
* Fix: support for >1 CRL per KeyInfo
* Fix: buffer initialization issue
* Fix: vector index bug
* Fix: stylesheet append bug
* Fix: header guard in XPath transform header
* Fix: string release crash
* Fix: improper c14n of XSLT
* Fix: setters for Reference Type/Id
* Fix: skip comments in X509Certificate elements
* Fix: more header guards
* Fix: NSS verification of RSA broken
* Expose algorithm URI on Signature and Reference objects
* White/blacklisting of otherwise registered algorithms
* Add selected XML Signature 1.1 KeyInfo extensions
* Add elliptic curve keys and signatures via ECDSA
* Support debugging of Reference/SignedInfo data
* Clean up tests for SHA2 algorithms in OpenSSL
* Updated autoconf script, added NSS support, removed pre-automake material
* Add methods for Reference removal to DSIGSignature/DSIGSignedInfo classes
2011-02-23 09:02:07 +00:00
taca
6d80a96612 Bump PKGREVISION due to ABI change of ruby18-base. 2011-02-21 16:01:10 +00:00
jmcneill
05ef2ca099 don't enable padlock support on NetBSD by default, it crashes on padlock
capable CPUs
2011-02-19 00:55:31 +00:00
taca
1caa448699 Update openssh package to 5.8.1 (5.8p1).
For changes from 5.5 to 5.7, please refer http://openssh.com/txt/release-5.7
and http://openssh.com/txt/release-5.6 in detail.

Changes since OpenSSH 5.7
=========================

Security:

 * Fix vulnerability in legacy certificate signing introduced in
   OpenSSH-5.6 and found by Mateusz Kocielski.

   Legacy certificates signed by OpenSSH 5.6 or 5.7 included data from
   the stack in place of a random nonce field. The contents of the stack
   do not appear to contain private data at this point, but this cannot
   be stated with certainty for all platform, library and compiler
   combinations. In particular, there exists a risk that some bytes from
   the privileged CA key may be accidentally included.

   A full advisory for this issue is available at:
   http://www.openssh.com/txt/legacy-cert.adv

Portable OpenSSH Bugfixes:

 * Fix compilation failure when enableing SELinux support.

 * Do not attempt to call SELinux functions when SELinux is disabled.
   bz#1851
2011-02-16 17:45:08 +00:00
tnn
1b0495fc57 revbump(1) for devel/libevent update. 2011-02-11 21:22:02 +00:00
taca
b1ce322fbc Add fix for security issue CVE-2011-0014.
Bump PKGREVISION.
2011-02-09 00:15:30 +00:00
adam
c86c95d050 Changes 0.97:
ClamAV 0.97 brings many improvements, including complete Windows support
(all major components compile out-of-box under Visual Studio), support for
signatures based on SHA1 and SHA256, better error detection, as well as
speed and memory optimizations. The complete list of changes is available
in the ChangeLog file.
2011-02-08 07:56:09 +00:00
obache
efbeaad982 Fixes build on SUA.
* header file location of libbind is differ than SFU.
* treat all Interxi as same, not only interix3.
2011-02-06 11:31:18 +00:00
obache
705909d2dd On Interix, it is impossible to build with HAVE_IPV6 due to missing
neither getipnodebyname(3) nor gethostbyname2(3).
2011-02-06 08:39:59 +00:00
jym
e6a576c7a4 Add MESSAGE to give a hint on what to do (~copy/pasted from script) 2011-01-31 03:05:17 +00:00
adam
51929d9a97 PLIST fix 2011-01-28 08:16:55 +00:00
obache
9dd96830cd corrent checksum of patches. 2011-01-25 09:08:25 +00:00
obache
12c10280c4 * Note comments to patch files.
* detect recent OpenPAM correctly
* catch getopt(3) with `int' for platforms that char will never be -1.

Bump PKGREVISION.
2011-01-25 09:07:58 +00:00
pettai
77b9b55e05 OpenDNSSEC 1.2.0:
Bugfixes:
* Enforcer: Fixed a number of build warnings.

OpenDNSSEC 1.2.0rc3:

* Moved migration instructions to the file MIGRATION

Bugfixes:
* Bugreport #199: The previous DB schema change made the zone removal broken.
* Enforcer: When retiring old KSK, use TTL(ds) and not TTL(ksk).
* Enforcer: Minimize the set of DS RRs sent to DelegationSignerSubmitCommand.
* Enforcer: Replace tab with a space character in the DNSKEY printed to syslog.
* Enforcer: Fixed pontential format string bug.
* ods-ksmutil: Log to syslog when ds-seen changes a key to active/standby.
* Signer Engine: Don't be smart with RRSIG TTLs, the hsm will set them for you.
* Signer Engine: Set notify command for zone when receiving ods-signer update.
* Signer Engine: Update TTL of NSEC(3) records if SOA Minimum has changed
  in KASP.
* Signer Engine: Now logs to the correct facility.
* Signer Engine: Also remove NSEC records when detecting changes in
  signconf <Denial>
* Signer Engine: Dropped privileges before starting Zonefetcher.

OpenDNSSEC 1.2.0rc2:

Bugfixes:
* Signer Engine: Use the correct TTL for RRs after the $INCLUDE directive.
* Signer Engine: Also create new signature if TTL of RR has changed.
* Signer Engine: Drop old NSEC/NSEC3 records.
* ods-ksmutil: Fixed some memory leaks.

OpenDNSSEC 1.2.0rc1:

* New commandline option for the signer: ods-signer running.
* Allow connection to different MySQL ports in the Enforcer.
* Tone down and explain warning when converting M or Y to seconds
* ldns 1.6.7 is required for bugfixes
* dnsruby 1.51 is required for bugfixes

Bugfixes:
* Bugreport #187: ods-control signer start will return non-zero if start up
  failed (uses ods-signer running).
* Narrow glue at the zone cut is allowed, do not consider it as occluded.
* Move zone fetcher output to correct input adapter file.
* Enforcer shared keys on zones with ShareKeys disabled.
* Make names of key states consistent.
* Signer Engine file descriptor leak fix on engine.sock.
* Set explicit "unlimited" repository capacity to prevent random integer being
  read. Requires "ods-ksmutil update conf" to be run if using an existing
  database.
* Fix issue with key generation creating too many keys Ticket #194.
* Bugreport #189: Auditor did not handle white-space-seperated substrings
  for base64 text
* Bugreport #190: Auditor (and signer) does not handle case correctly
* Signer now silence stdout-output from the notify command

OpenDNSSEC 1.2.0b1:

* A new signer engine, written in c. Zones are maintained in memory, instead of
  in files on disk.
* Removed the python and python-4suite-xml dependencies.
* Remove separate autoconf for libhsm/conf/enforcer.
* Add option to disable building the signer.
* Signer logs statistics just after outputting a new signed zone.
* libhsm will skip processing (and not create) any public keys if the
  per repository option <SkipPublicKey/> is set.
* Keysharing improved - keys can now exist in different states on each zone
  that the key is in use for.
* Backup prepare/commit/rollback added for 2-step backups without taking the
  enforcer offline.
* Standby keys are now optional (default to 0) and should be considered
  experimental.

Bugfixes:
* Fix semantics of refresh value in Signer Engine.
* Auditor handles chains of empty nonterminals correctly.
* Recalculate salt immediately if the saltlength is changed.
* libhsm connected to slot 0 if the token label was not found.
  An error is now returned instead of connecting to the slot.
* Bugreport #102: Removed the obsoleted python-4suite-xml dependency.
* Fixed Known Issue: KSK rollover requires manual timing.
* Fixed Known Issue: Key rollover and reuse of signatures.
* Fixed Known Issue: Issue with sharing keys and adding zones.
* Fixed Known Issue: Quicksorter does not allow certain owner names
  (Quicksorter is removed, signer now reads and sorts the zone).
2011-01-24 20:30:28 +00:00
markd
bcd2c50a50 Also allow the builtin heimdal from ArchLinux. 2011-01-23 10:01:37 +00:00
taca
88e89ec05a Update sudo package to 1.7.4p6.
What's new in Sudo 1.7.4p6?

 * A bug has been fixed in the I/O logging support that could cause
   visual artifacts in full-screen programs such as text editors.
2011-01-22 09:18:21 +00:00
tez
e53bbe065d 'fix' pr#43939 by providing a pointer to the root cause 2011-01-20 16:25:21 +00:00
adam
096653e550 Changes 2.0.17:
* Allow more hash algorithms with the OpenPGP v2 card.
* The gpg-agent now tests for a new gpg-agent.conf on a HUP.
* Fixed output of "gpgconf --check-options".
* Fixed a bug where Scdaemon sends a signal to Gpg-agent running in
  non-daemon mode.
* Fixed TTY management for pinentries and session variable update
  problem.
2011-01-20 08:54:56 +00:00
adam
3c78667746 Fix building with special CFLAGS; e.g. on Mac OS X with -isysroot 2011-01-20 07:43:02 +00:00
drochner
b14427059e add/fix mutual CONFLICT 2011-01-18 12:06:57 +00:00
wiz
fcc0b5fda0 png shlib name changed for png>=1.5.0, so bump PKGREVISIONs. 2011-01-13 13:53:23 +00:00
wiz
2f4126dc58 png shlib name changed for png>=1.5.0, so bump PKGREVISIONs. 2011-01-13 13:36:05 +00:00
taca
2099519b37 Update sudo package to 1.7.4p5.
What's new in Sudo 1.7.4p5?

 * A bug has been fixed that would allow a command to be run without the
   user entering a password when sudo's -g flag is used without the -u flag.

 * If user has no supplementary groups, sudo will now fall back on checking
   the group file explicitly, which restores historic sudo behavior.

 * A crash has been fixed when sudo's -g flag is used without the -u flag
   and the sudoers file contains an entry with no runas user or group listed.

 * A bug has been fixed in the I/O logging support that could cause
   visual artifacts in full-screen programs such as text editors,.

 * A crash has been fixed when the Solaris project support is enabled
   and sudo's -g flag is used without the -u flag.

 * Sudo no longer exits with an error when support for auditing is
   compiled in but auditing is not enabled.

 * Fixed a bug introduced in sudo 1.7.3 where the ticket file was not
   being honored when the "targetpw" sudoers Defaults option was enabled.

 * The LOG_INPUT and LOG_OUTPUT tags in sudoers are now parsed correctly.

 * A crash has been fixed in "sudo -l" when sudo is built with auditing
   support and the user is not allowed to run any commands on the host.
2011-01-13 12:22:40 +00:00
lukem
539c7cd41f update version to 1.5 2011-01-13 00:40:31 +00:00
lukem
635ee7f731 * update wotsap URLs for new (?) CGI paths
* only use the last 8 chars of the key -- it's the more common use, and
  the wotsap urls only use them now
* convert optional "mykey" to uppercase before matching
* print correct date (misuse of non-local vars)
2011-01-13 00:40:09 +00:00
drochner
8d75abb070 sync w/ base pkg 2011-01-11 12:11:29 +00:00
drochner
5e83b0b73b update to 0.8.1
changes: bugfixes
2011-01-11 12:10:16 +00:00
jmmv
819dffb7af Fix previous: I redefined OWN_DIRS which prevented the creation of the
run dir in VARBASE...  Bump PKGREVISION to 3.
2011-01-09 19:22:17 +00:00
jmmv
fafed3bdd9 Create the ${PKG_SYSCONFDIR}/sudoers.d directory on install. The default
configuration file requires this directory to exist.

Bump PKGREVISION to 2.
2011-01-07 17:54:34 +00:00
obache
0ac25ba67c tabfy. 2011-01-07 04:16:14 +00:00
obache
826f3c88d2 Let preferred libpcap to be picked up.
PR#44333.
2011-01-07 04:15:37 +00:00
obache
d297c98561 DragonFly is in same situation as other *BSD, PR#44329 2011-01-06 12:10:21 +00:00
obache
7c08eed098 Fixes PR#44324.
* On DragonFly, rmd160.h exists and required functions are defined there,
  but not in any library, so ignore it.
* On DragonFly and FreeBSD, MD5 and MD4 functions are in libmd.
2011-01-06 08:55:37 +00:00
adam
9c040be976 Change the order in which LDAP libraries are detected; fixes building on Mac OS X and probably other machines. pkglint clean-up. 2011-01-05 07:28:19 +00:00
obache
e3ad496a51 defined(%hash) is deprecated. 2011-01-04 14:20:00 +00:00
obache
6a0d604fd1 Some patches for DragonFly.
* need to include sys/socket.h, PR#44313.
* same signature as Linux and NetBSD for PAM related functions.
2011-01-03 02:39:32 +00:00
obache
cf3d36fe7f Fixes build failure on DragonFly-2.8.2.
* not have libresolv, but required functions in libc.
* need to include <sys/socket.h> exactly in some place.
2011-01-01 12:13:10 +00:00
wiz
0556f29c62 Sort SUBDIRs. 2010-12-31 06:18:48 +00:00
obache
db54e578d6 DragonFly also not require extra libs for OpenSSL. 2010-12-25 11:35:06 +00:00
kefren
7bc41ff9a5 Fix Makefiles SUBDIRs for clamav and amavis-perl, amavisd-new changes 2010-12-24 07:24:54 +00:00
kefren
c2af6baed7 Remove amavis-perl and amavisd-new from security/. They are now moved
into pkgsrc/mail. Part of PR/32554
2010-12-24 07:23:35 +00:00
kefren
714210b407 Move clamav into security/. No objections on tech-pkg@
Part of PR/32554
2010-12-24 07:11:05 +00:00
christos
089e24de2e de to 1.6.0 from Anon Ymous
Changes since 1.1:

** gsasl: Add --no-cb to disable use of TLS channel bindings.
** build: Use silent build rules via automake.
    Use 'make V=99' to see the command lines used.
** Update gnulib files.
** gsasl: Support for TLS channel bindings.
    Requires GnuTLS 2.11.4 or later for the gnutls_session_channel_binding
    function.  Used by the SCRAM-SHA-1-PLUS mechanism.
** doc: Mention new property GSASL_CB_TLS_UNIQUE and SCRAM-SHA-1-PLUS.
** tests: Added self-tests for SCRAM-SHA-1-PLUS.
** gsasl: Avoid fixed size buffers.
    This caused problems on Windows where the BUFSIZ was too small for
    some line lengths with GS2-KRB5.
** tests: Fix error strings to be more unique.
** doc: Added section on how to build with MIT Kerberos for Windows.
** doc: Added PDF version of API reference manual.
    See doc/reference/gsasl.pdf.
** i18n: Updated translations.
    Thanks to Benno Schulenberg.
** doc: Explain GS2-related changes.
** doc: GTK-DOC manual improved.
    Now almost all symbols and types are explained.
** gsasl: Fix crash when getaddrinfo does not get a canonical name.
** gsasl: Improve error message when server rejects authentication.
** tests: Self checks are improved.
** gsasl: Improve application data throughput.
    Patch from Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de> in
    <http://thread.gmane.org/gmane.comp.gnu.gsasl.general/256>.
** Improve MinGW builds.
** doc: Fix doc/cyclo/ output.
** tests/crypto: Also test newly added SHA-1 interfaces.
** tests/scram: Also test GSASL_SCRAM_SALTED_PASSWORD case.
    This code path triggered a crash in v1.3.
** i18n: Added Finnish translation.
    Thanks to Jorma Karvonen <karvonen.jorma@gmail.com>.
** Experimental support for SCRAM-SHA-1 added.
    Please test it but don't put it into production use, the RFC have not
    been finalized yet.  For this reason, the mechanism priority list is
    such that SCRAM-SHA-1 will never be selected over any other mechanism
    (including PLAIN, CRAM-MD5, and DIGEST-MD5).  When it has been tested
    further, we'll make SCRAM-SHA-1 the preferred mechanism after GSSAPI.
** gsasl: Fix libintl-related build errors on MinGW.
    Tiny patch from "carlo.bramix" <carlo.bramix@libero.it>.
** doc: Typo fixes to manual.
    Based on report by Marco Maggi <marco.maggi-ipsu@poste.it> in
    <http://thread.gmane.org/gmane.comp.gnu.gsasl.general/222>.
** tests: Rewrite basic self test using modern API.
** tests: New self-test 'crypto' to increase code coverage.
** gsasl: Fix out of bounds write when in IMAP/SMTP mode.
    Reported by Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de> in
    <http://thread.gmane.org/gmane.comp.gnu.gsasl.general/230>.
** doc: Rewritten introduction material.
** doc: Improved sections for the info manual.
    We now follow the advice given by the texinfo manual on which
    directory categories to use.  In particular, libgsasl moved from the
    'GNU Libraries' section to the 'Software libraries' as GNU SASL, and
    'Invoking gsasl' moved from 'GNU utilities' to 'Security'.
** examples: Removed unneeded 'ctx' parameter from client_authenticate.
** Building with many warning flags now requires --enable-gcc-warnings.
    This avoids crying wolf for normal compiles.
** New configure parameters to set packaging specific information.
    The parameters are --with-packager, --with-packager-version, and
    --with-packager-bug-reports.  See
    <http://article.gmane.org/gmane.comp.lib.gnulib.bugs/17791> for more
    details.
2010-12-23 18:03:48 +00:00
dsainty
ada744dc0a Mechanically replace references to graphics/jpeg with the suitable
alternative from mk/jpeg.buildlink3.mk

This allows selection of an alternative jpeg library (namely the x86 MMX,
SSE, SSE2 accelerated libjpeg-turbo) via JPEG_DEFAULT=libjpeg-turbo, and
follows the current standard model for alternatives (fam, motif, fuse etc).

The mechanical edits were applied via the following script:

#!/bin/sh
for d in */*; do
  [ -d "$d" ] || continue
  for i in "$d/"Makefile* "$d/"*.mk; do
    case "$i" in *.orig|*"*"*) continue;; esac
    out="$d/x"
    sed -e 's;graphics/jpeg/buildlink3\.mk;mk/jpeg.buildlink3.mk;g' \
        -e 's;BUILDLINK_PREFIX\.jpeg;JPEGBASE;g' \
        < "$i" > "$out"
    if cmp -s "$i" "$out"; then
      rm -f "$out"
    else
      echo "Edited $i"
      mv -f "$i" "$i.orig" && mv "$out" "$i"
    fi
  done
done
2010-12-23 11:44:24 +00:00
wiz
6120ab1c8e Set LICENSE. 2010-12-20 11:55:17 +00:00
wiz
c9887384f4 Set LICENSE. 2010-12-20 10:00:56 +00:00
taca
2ef7fcdc05 Update php-suhosin pacakge to 0.9.32.1.
2010-07-23 - 0.9.32.1

    - Fixed missing header file resulting in compile errors

2010-07-23 - 0.9.32

    - Added support for memory_limit > 2GB
    - Fixed missing header file resulting in wrong php_combined_lcg()
      prototype being used
    - Improved random number seed generation more by adding /dev/urandom juice

2010-03-28 - 0.9.31

    - Fix ZTS build of session.c
    - Increased session identifier entropy by using /dev/urandom if available

2010-03-25 - 0.9.30

    - Added line ending characters %0a and %0d to the list of
      dangerous characters handled
      by suhosin.server.encode and suhosin.server.strip
    - Fixed crash bug with PHP 5.3.x and session module (due to
      changed session globals struct)
    - Added ! protection to PHP session serializer
    - Fixed simulation mode now also affects (dis)allowed functions
    - Fixed missing return (1); in random number generator replacements
    - Fixed random number generator replacement error case behaviour
      in PHP 5.3.x
    - Fixed error case handling in function_exists() PHP 5.3.x
    - Merged changes/fixes in import_request_variables()/extract()
      from upstream PHP
    - Fixed suhosin_header_handler to be PHP 5.3.x compatible
    - Merge fixes and new features of PHP's file upload code to suhosin
2010-12-19 02:22:15 +00:00
shannonjr
88a125ab5b Backported security fix from Version 1.6.6 of pcsc-lite. The fix bounds the
value of a pointer, prior to a memcpy(), to prevent a buffer overflow.
2010-12-17 17:00:35 +00:00
obache
d99eb6b342 Bump PKGREVISION from icu shlib major bump. 2010-12-17 07:36:08 +00:00
drochner
4b032efd8e add patch from upstream to protect for possible buffer overflows from
rogue cards (SA42658)
2010-12-16 18:00:59 +00:00
riz
60057dbd53 Explicitly pass "--cpu=i386" when MACHINE_ARCH is i386 in order for
this to build properly under Mac OS X "Snow Leopard" on a 64-bit host.
Fixes PR pkg/44191 by me.
2010-12-15 21:52:15 +00:00
tron
9699f00bd3 Get this close to build under Mac OS X by removing some horrible use
of the C pre-processor.
2010-12-13 16:03:20 +00:00
wiz
420868f744 Add TEST_TARGET. 2010-12-13 10:33:24 +00:00
wiz
cc1641846e Update to 1.7.6:
The following changes have been made between John 1.7.5.1 and 1.7.6:

* Generic crypt(3) support (enabled with "--format=crypt") has been added for
auditing password hash types supported by the system but not yet supported by
John's own optimized cryptographic routines (such as "SHA-crypt" and SunMD5).
* Optional parallelization of the above has been implemented by means of OpenMP
along with glibc's crypt_r(3) or Solaris' MT-safe crypt(3C).
* Optional parallelization of John's own optimized code for the OpenBSD-style
Blowfish-based crypt(3) (bcrypt) hashes with OpenMP has been added.
* A more suitable version of 32-bit x86 assembly code for Blowfish is now
chosen on Core i7 and similar CPUs (when they happen to run a 32-bit build).
* More optimal DES S-box expressions for PowerPC with AltiVec (making use of
the conditional select operation) contributed by Dumplinger Boy (Dango-Chu)
have been integrated.
* The bitslice DES C source code has been reworked to allow for the use of
arbitrary SIMD intrinsics, which was previously only implemented for AltiVec
as a special case.
* Support for SSE2 and MMX intrinsics with bitslice DES (as an alternative to
the supplied assembly code) has been added (currently only enabled for SSE2 on
x86-64 when compiling with GCC 4.4+).
* Support for mixed-type longer virtual vectors (such as SSE2+MMX, SSE2+ALU,
AltiVec+ALU, and other combinations) with bitslice DES has been added (not
enabled by default yet, primarily intended for easy benchmarks on future CPUs,
with future compiler versions, with even more SIMD instruction sets, and with
different DES S-box expressions that might be available in the future).
* The obsolete 32-bit SPARC assembly implementation of DES has been dropped.
* The loader will now detect password hashes specified on a line on their own,
not only as part of an /etc/passwd or PWDUMP format file.
* When run in "--stdin" mode and reading candidate passwords from a terminal
(to be typed by the user), John will no longer mess with the terminal settings.
* John will now restore terminal settings not only on normal termination or
interrupt, but also when forcibly interrupted with two Ctrl-C keypresses.

The following changes have been made between John 1.7.5 and 1.7.5.1:

* A new numeric variable has been added to the word mangling rules engine:
"p" for position of the character last found with the "/" or "%" commands.

The following changes have been made between John 1.7.4.2 and 1.7.5:

* Support for the use of "--format" along with "--show" or "--make-charset" has
been added.
* The choice of .rec and .log filenames for custom session names has been made
more intuitive.
* Support for "\r" (character lists with repeats) and "\p0" (reference to the
immediately preceding character list/range) has been added to the word mangling
rules preprocessor.
* The undefined and undocumented behavior of some subtle word mangling rules
preprocessor constructs has been changed to arguably be more sensible.
* Some bugs were fixed, most notably JtR crashing on no password hashes loaded
(bug introduced in 1.7.4.2).

The following changes have been made between John 1.7.4 and 1.7.4.2:

* Major performance improvements for processing of very large password files
or sets of files, especially with salt-less or same-salt hashes, achieved
primarily through introduction of two additional hash table sizes (64K and 1M
entries), changes to the loader, and smarter processing of successful guesses
(to accommodate getting thousands of hashes successfully cracked per second).
* Many default buffer and hash table sizes have been increased and thresholds
for the use of hash tables lowered, meaning that John will now tend to use
more memory to achieve better speed (unless it is told not to with the
"--save-memory" option).
* Some previously missed common website passwords found on public lists of
"top N passwords" have been added to the bundled common passwords list.
* Some bugs introduced in 1.7.4 and affecting wordlist mode's elimination of
consecutive duplicate candidate passwords have been fixed.

The following changes have been made between John 1.7.3.4 and 1.7.4:

* Support for back-references and "parallel" ranges has been added to the
word mangling rules preprocessor.
* The notion of numeric variables (to be used for character positions
and substring lengths along with numeric constants supported previously)
has been introduced into the rules engine.  Two pre-defined variables
("l" for initial or updated word's length and "m" for initial or
memorized word's last character position) and 11 user-defined variables
("a" through "k") have been added.  Additionally, there's a new numeric
constant: "z" for "infinite" position or length.
* New rule commands have been added: "A" (append, insert, or prefix with a
string), "X" (extract a substring from memory and insert), "v" (subtract
and assign to a numeric variable).
* New rule reject flags have been added: ":" (no-op, for use along with the
"parallel" ranges feature of the preprocessor) and "p" (reject unless word
pair commands are allowed, for sharing of the same ruleset between "single
crack" and wordlist modes).
* Processing of word mangling rules has been made significantly faster in
multiple ways (caching of the current length, less copying of data, code
and data placement changes for better branch prediction and L1 cache usage,
compiler-friendly use of local variables, code micro-optimizations,
removal of no-op rule commands in an initial pass).
* The default rulesets for "single crack" and wordlist modes have been
revised to make use of the new features, for speed, to produce fewer
duplicates, and to attempt additional kinds of candidate passwords (such
as for years 2010 through 2019 with "year-based" rules).
* The idle priority emulation code has been optimized for lower overhead when
there appears to be no other demand for CPU time.
* The default for the Idle setting has been changed from N to Y.

The following changes have been made between John 1.7.3.1 and 1.7.3.4:

* "make check" has been implemented (for Unix-like systems only).
* The "--test" option will now take an optional argument - the duration of each
benchmark in seconds.
* Section .note.GNU-stack has been added to all assembly files to avoid the
stack area unnecessarily being made executable on Linux systems that use this
mechanism.
* Some very minor bugs that did not affect normal operation have been fixed.
* Some unimportant compiler warnings have been fixed, a source code comment has
been made more verbose and more complete.
2010-12-13 10:32:35 +00:00
wiz
c404c656c4 Update to 2.10.4:
* Version 2.10.4 (released 2010-12-06)

** gnutls-serv: Corrected a buffer overflow. Reported and patch by Tomas Mraz.

** libgnutls: Use ASN1_NULL when writing parameters for RSA signatures.
This makes us comply with RFC3279. Reported by Michael Rommel.

** libgnutls: Reverted default behavior for verification and
introduced GNUTLS_VERIFY_DO_NOT_ALLOW_X509_V1_CA_CRT. Thus by default
V1 trusted CAs are allowed, unless the new flag is specified.

** minitasn1: Updated to Libtasn1 2.9.

** API and ABI modifications:
No changes since last version.
2010-12-12 11:58:53 +00:00
wiz
3a01a82bc7 Update to 2.9:
* Noteworthy changes in release 2.9 (2010-12-06) [stable]
- tests: Link to gnulib to avoid build error related to 'rpl_ftello' on Solaris.
  Reported by Dagobert Michelsen.
- doc: Fix bug reporting address to point at help-libtasn1@gnu.org.
- doc: Fix Returns: documentation in Texinfo.  Reported by Jeffrey Walton.
- build: Update gnulib files.
2010-12-12 11:37:27 +00:00
gls
b9725631ec Update security/p5-IO-Socket-SSL to 1.35
Security fix

v1.35 2010.12.06
- if verify_mode is not VERIFY_NONE and the ca_file/ca_path cannot be
verified as valid it will no longer fall back to VERIFY_NONE but throw
an error. Thanks to Salvatore Bonaccorso and Daniel Kahn Gillmor for
pointing out the problem, see also
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058
2010-12-07 20:15:00 +00:00
gls
dd11cff74b Direct MASTER_SITES to pypi.org, as the original MASTER_SITE doesn't host the
distfile anymore. Add DIST_SUBDIR to force re-download of the tarball, which
content has been modified.

While here, switch DEPENDS to py-crypto instead of py-amkCrypto.

Bump PKG_REVISION.
2010-12-06 22:22:08 +00:00
adam
efb355b5ec Detect builtin MIT Kerberos on Mac OS X 10.6.x 2010-12-05 21:56:55 +00:00
gls
a920bc52d3 Update py-crypto to version 2.3
pkgsrc changes:
 - add a patch to fix an hardcoded interpreter path
 - add a patch to actually find gmp library.
 - add CONFLICTS with py-amkCrypto, both have files in common.

upstream changes:

2.3
===
* Fix NameError when attempting to use deprecated getRandomNumber()
function.
* _slowmath: Compute RSA u parameter when it's not given to
RSA.construct. This makes _slowmath behave the same as _fastmath in
this regard.
* Make RSA.generate raise a more user-friendly exception message when
the user tries to generate a bogus-length key.

2.2
===
* Deprecated Crypto.Util.number.getRandomNumber(), which had confusing
semantics.  It's been replaced by getRandomNBitInteger and
getRandomInteger.  (Thanks: Lorenz Quack)
* Better isPrime() and getPrime() implementations that do a real
Rabin-Miller probabilistic primality test (not the phony test we did
before with fixed bases).  (Thanks: Lorenz Quack)
* getStrongPrime() implementation for generating RSA primes.
(Thanks: Lorenz Quack)
* Support for importing and exporting RSA keys in DER and PEM format
(Thanks: Legrandin)
* Fix PyCrypto when floor division (python -Qnew) is enabled.
* When building using gcc, use -std=c99 for compilation.  This should
fix building on FreeBSD and NetBSD.
2010-12-05 17:13:09 +00:00
tez
63e878c120 add fix for CVE-2010-1323 from
http://web.mit.edu/kerberos/advisories/2010-007-patch-r15.txt
2010-12-03 20:11:31 +00:00
taca
ba2a96a188 Update openssl package to 0.9.8q.
OpenSSL version 0.9.8q released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8q of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release. For a complete
   list of changes, please see

       http://www.openssl.org/source/exp/CHANGES.

   The most significant changes are:

      o Fix for security issue CVE-2010-4180
      o Fix for CVE-2010-4252
2010-12-03 00:17:21 +00:00
wiz
17e65fc0bf Update to 0.9.4: no list of changes found. 2010-12-02 16:13:53 +00:00
wiz
03bd73e5b4 Update to 2.0.3. List of changes not found. 2010-12-02 15:03:56 +00:00
wiz
43cbfe0d54 Update to 0.50:
0.50  Nov 21, 2010
        - shell_quote in t/1_run.t was escaping '_' (bug report by
          Andreas J. König)
	- some typos corrected
        - initial implementation of scp_cat
2010-12-02 12:26:19 +00:00
wiz
16d04ad42c Update to 1.34:
v1.34 2010.11.01
- schema http for certificate verification changed to
  wildcards_in_cn=1, because according to rfc2818 this is valid and
  also seen in the wild
- if upgrading socket from inet to ssl fails due to handshake problems
  the socket gets downgraded, but is still open.
  See https://rt.cpan.org/Ticket/Display.html?id=61466
- deprecate kill_socket, just use close()
2010-12-02 12:25:04 +00:00
wiz
2d76d401af Update to 2.51:
2010-09-30   Gisle Aas <gisle@ActiveState.com>

   Release 2.51

   Florian Ragwitz (1):
      Fix compilation with c++ compilers

   Gisle Aas (1):
      Fix repository specification in META.yml



2010-09-25   Gisle Aas <gisle@ActiveState.com>

   Release 2.50

   Chris 'BinGOs' Williams (1):
      Amended tests to work with perl core.

   Florian Ragwitz (3):
      Attach context pointers using sv magic
      Add failing test for thread cloning
      Clone MD5 contexts on thread cloning
      get_md5_ctx should never return anything but a valid pointer

   Gisle Aas (1):
      perl-5.6 no longer supported

   Jesse Vincent (1):
      Preserve utf8ness of argument [RT#44927]
2010-12-02 12:22:58 +00:00
wiz
b97b0f139a Update to 0.16:
0.16  Wed Sep 29 08:11:42 2010
        - fixed crc64 support for non-xs case, #61490, #61491
2010-12-02 12:22:07 +00:00
obache
ff0532c170 Fixes build with OPENSSL_NO_MD2. 2010-11-30 07:12:49 +00:00
drochner
3b7e644378 update to 2.30.1
This switches to the gnome-2.32 release branch.
(compile-tested only; the old version didn't build anymore)
2010-11-29 12:56:20 +00:00
drochner
ffc449a826 update to 2.32.0
This switches to the gnome-2.32 release branch.
2010-11-28 12:57:50 +00:00
shattered
e52a792d99 Install manpages in man/, not share/man/ 2010-11-28 10:47:40 +00:00
agc
a713290913 add and enable libtomcrypt 2010-11-27 06:13:25 +00:00
agc
6befaa1caf Import libtomcrypt (version 1.17) into the packages collection.
LibTomCrypt is a fairly comprehensive, modular and portable
	cryptographic toolkit that provides developers with a vast array of
	well known published block ciphers, one-way hash functions, chaining
	modes, pseudo-random number generators, public key cryptography and a
	plethora of other routines.  LibTomCrypt has been designed from the
	ground up to be very simple to use.  It has a modular and standard API
	that allows new ciphers, hashes and PRNGs to be added or removed
	without change to the overall end application.  It features easy to
	use functions and a complete user manual which has many source snippet
	examples.

	* Block Ciphers
	    * Blowfish
	    * XTEA
	    * RC5
	    * RC6
	    * SAFER+
	    * Rijndael (aka AES)
	    * Twofish
	    * SAFER (K64, SK64, K128, SK128)
	    * RC2
	    * DES, 3DES
	    * CAST5
	    * Noekeon
	    * Skipjack
	    * Anubis (with optional tweak as proposed by the developers)
	    * Khazad
	    * KASUMI
	    * SEED
	* Chaining Modes
	    * ECB
	    * CBC
	    * OFB
	    * CFB
	    * CTR
	    * IEEE LRW mode
	    * F8 Chaining Mode
	* One-Way Hash Functions
	    * MD2
	    * MD4
	    * MD5
	    * SHA-1
	    * SHA-224/256/384/512
	    * TIGER-192
	    * RIPE-MD 128/160/256/320
	    * WHIRLPOOL
	* Message Authentication
	    * FIPS-198 HMAC (supports all hashes)
	    * CMAC, also known as OMAC1 (supports all ciphers)
	    * PMAC Authentication
	    * F9-MAC
	    * Pelican MAC
	* Message Encrypt+Authenticate Modes
	    * EAX Mode
	    * OCB Mode
	    * CCM Mode (NIST spec)
	    * GCM Mode (IEEE spec)
	* Pseudo-Random Number Generators
	    * Yarrow (based algorithm)
	    * RC4
	    * Support for /dev/random, /dev/urandom and the Win32 CSP RNG
	    * Fortuna
	    * SOBER-128
	* Public Key Algorithms
	    * RSA (using PKCS #1 v1.5 and v2.1)
	    * ECC (EC-DSA X9.62 signatures, X9.63 EC-DH)
		  o With fast Fixed Point ECC support as well
		  o X9.63 import/export of public keys
	    * DSA (Users make their own groups)
	    * The math routines are pluggable which means you can use your own
	      math provider if you want.
	* Other standards
	    * PKCS #1 (v1.5 and v2.1 padding)
	    * PKCS #5
	    * ASN.1 DER
2010-11-27 06:11:57 +00:00
drochner
029635ae8c update to 1.1.0
change: New functions to fix a leak in dirmngr
2010-11-26 18:00:17 +00:00
drochner
911e76b522 update to 2.10.3
changes: bugfixes
2010-11-26 17:56:14 +00:00
drochner
9f9e8455cb update to 1.10
change: 3 error codes added
2010-11-26 17:55:21 +00:00
obache
b8e486b157 define missing PKGCONFIG_OVERRIDE. 2010-11-18 12:09:54 +00:00
taca
c63bd2f11d Update security/openssl package to 0.9.8p.
OpenSSL version 0.9.8p released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8p of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release which addresses
   CVE-2010-3864. For a complete list of changes,
   please see http://www.openssl.org/source/exp/CHANGES.
2010-11-17 00:52:25 +00:00