Commit graph

11147 commits

Author SHA1 Message Date
wiz
6175361929 p5-Crypt-CBC: update to 3.03.
3.03    Sun 18 Apr 2021 10:54:19 PM EDT
	- Fixed bug which caused an extraneous block of garbage data to be appended to encrypted
	  string when "nopadding" specified and plaintext is even multiple of blocksize.

3.02
	- CTR mode now requires the Math::Int128 module, which gives a ~5x performance
	  boost over Math::BigInt.

3.01
	- Warn when the deprecated opensslv1 PBKDF (key derivation function) is used
	  for encryption. Turn off with -nodeprecate=>1 or by choosing a different
	  PBKDF, such as -pbkdf=>'pbkdf2'.
	- Fix a regression when passing the legacy -salt=>1 argument.

3.00    Sun Feb  7 10:28:08 EST 2021
        - Released version 3.00 in recognition of multiple new features
	  and cleanups.

2.37    Sun Feb  7 10:20:17 EST 2021
        - Added better argument checking.
	- Fixed long-standing standard padding bug: plaintext ending with
	  bytes between 0x00 and 0x0A would be truncated in some conditions.
	- Fixed Rijndael_compat padding.

2.36    Wed 03 Feb 2021 09:19:06 AM EST
        - Add support for OFB, CFB and CTR chain modes.
	- New dependency: Math::BigInt

2.35    Sun Jan 31 22:02:42 EST 2021
        - Add support for PBKDF2 key derivation algorithm
	- New dependencies: Digest::SHA, Crypt::PBKDF2, Crypt::Cipher::AES

2.34    Fri Jan 29 18:08:12 EST 2021
        - Support for openssl SHA-256 key derivation algorithm
2021-04-27 10:51:00 +00:00
wiz
94313f8dab security/Makefile: + p5-Crypt-PBKDF2 2021-04-27 10:43:45 +00:00
wiz
acbcf5322a p5-Crypt-PBKDF2: clean up Makefile 2021-04-27 10:43:06 +00:00
wiz
2566380758 security/p5-Crypt-PBKDF2: import p5-Crypt-PBKDF2-0.161520
PBKDF2 is a secure password hashing algorithm that uses the techniques
of "key strengthening" to make the complexity of a brute-force
attack arbitrarily high. PBKDF2 uses any other cryptographic hash
or cipher (by convention, usually HMAC-SHA1, but Crypt::PBKDF2 is
fully pluggable), and allows for an arbitrary number of iterations
of the hashing function, and a nearly unlimited output hash size
(up to 2**32 - 1 times the size of the output of the backend hash).
The hash is salted, as any password hash should be, and the salt
may also be of arbitrary size.
2021-04-27 10:42:40 +00:00
pin
b69c24819d security/pleaser: update to 0.4.1
Upstream provides no changelog, but NetBSD fixes have been merged.
Drop patch
2021-04-25 19:58:20 +00:00
wiz
481c563948 libdes: remove dead download link 2021-04-25 05:56:29 +00:00
wiz
edb9e3aabf pgp5: remove dead download link 2021-04-25 05:54:07 +00:00
wiz
4a236aa0a3 pam-ldap: remove dead links 2021-04-25 05:52:44 +00:00
pin
3da5d46e6e security/pleaser: update to 0.4.0
-No changelog provided upstream.
2021-04-24 18:52:58 +00:00
pho
09f2fa703e Update to hackage-security-0.6.0.1
* Fix bug in non-default -lukko build-configuration (#242)
* Add support for template-haskell-2.16.0.0 (#240)
2021-04-24 13:32:21 +00:00
pho
c210c57f2c Update to cryptohash-sha-256-0.11.102.0
* Add Eq instance for Ctx
* Add start and startlazy producing Ctx
* Introduce new use-cbits cabal flag in order to add support for
  FFI-less cryptohash-sha256-pure pass-thru
2021-04-24 13:25:14 +00:00
pho
875c8df363 Fix build with GHC 9 2021-04-24 13:21:53 +00:00
pho
7c206174d0 Update PLIST 2021-04-24 13:18:32 +00:00
pho
5cb8cf3708 Update PLIST 2021-04-24 13:08:44 +00:00
pho
fb30ffb91b Update to tls-1.5.5
Version 1.5.5
* QUIC support #419 #427 #428 #430 #433 #441
* Server ECDSA for P-256 #436
* Sort ciphersuites based on hardware-acceleration support #439
* Sending no_application_protocol #440
* Internal improvements #426 #431

Version 1.5.4
* Restore interoperability with early Java 6 #422
* Test cleanups for timeout and async usage #416
2021-04-24 13:06:02 +00:00
pho
61e1c86504 Update PLIST 2021-04-24 12:58:20 +00:00
pho
8ec5745cf7 Update to cryptonite-0.28
0.28
* Add hash constant time capability
* Prevent possible overflow during hashing by hashing in 4GB chunks

0.27
* Optimise AES GCM and CCM
* Optimise P256R1 implementation
* Various AES-NI building improvements
* Add better ECDSA support
* Add XSalsa derive
* Implement square roots for ECC binary curve
* Various tests and benchmarks
2021-04-24 12:55:43 +00:00
wiz
21e3684801 *: remove dead download links 2021-04-24 11:44:50 +00:00
wiz
7897265537 pam-dbm: remove
This is security related software last updated in 2003 with no upstream.
I couldn't find anyone else packaging this.
2021-04-24 11:02:51 +00:00
wiz
3b7aeddeb0 pgp5: remove dead download link 2021-04-24 00:27:13 +00:00
pho
335a312279 Update PLIST 2021-04-23 03:59:26 +00:00
adam
59ee103321 py-google-auth: updated to 1.29.0
v1.29.0

Features
add reauth feature to user credentials

Bug Fixes
Allow multiple audiences for id_token.verify_token
2021-04-22 13:56:50 +00:00
nia
c54ea0d550 openssl: add note on updating 2021-04-22 09:59:37 +00:00
nros
a03ebc143b Fix c++17 and openssl on solaris/illumos
gcc on solaris/illumos defines __STDC_VERSION__ in c++ mode where _Noreturn
does not exist.
This causes breakage when building c++17 programs that use openssl.
2021-04-22 09:32:39 +00:00
adam
da0a125726 revbump for boost-libs 2021-04-21 13:24:06 +00:00
adam
9d0e79c401 revbump for textproc/icu 2021-04-21 11:40:12 +00:00
wiz
bda00d494f smtpd: remove
Mail-related security software that hasn't been touched since 1997
should not be used.
2021-04-21 09:15:08 +00:00
nia
6e2ea1baf5 stunnel: update to 5.59
### Version 5.59, 2021.04.05, urgency: HIGH
* Security bugfixes
  - OpenSSL DLLs updated to version 1.1.1k.
* New features
  - Client-side "protocol = ldap" support (thx to Bart
    Dopheide and Seth Grover).
* Bugfixes
  - The test suite fixed not to require external connectivity.
  - Fixed paths in generated manuals (thx to Tatsuki Makino).
  - Fixed configuration reload when compression is used.
  - Fixed compilation with early releases of OpenSSL 1.1.1.
2021-04-21 09:02:32 +00:00
adam
ff1b1666ef libgcrypt: updated to 1.9.3
Noteworthy changes in version 1.9.3 (2021-04-19)
------------------------------------------------

 * Bug fixes:
   - Fix build problems on i386 using gcc-4.7.
   - Fix checksum calculation in OCB decryption for AES on s390.
   - Fix a regression in gcry_mpi_ec_add related to certain usages of
     curve 25519.
   - Fix a symbol not found problem on Apple M1.
   - Fix for Apple iOS getentropy peculiarity.
   - Make keygrip computation work for compressed points.

* Performance:
   - Add x86_64 VAES/AVX2 accelerated implementation of Camellia.
   - Add x86_64 VAES/AVX2 accelerated implementation of AES.
   - Add VPMSUMD acceleration for GCM mode on PPC.

 * Internal changes.
   - Harden MPI conditional code against EM leakage.
   - Harden Elgamal by introducing exponent blinding.
   - Fix memory leaks in the error code paths of EdDSA.
2021-04-21 08:28:31 +00:00
pin
0c59914cdf security/lxqt-openssh-askpass: update to 0.17.0
lxqt-openssh-askpass-0.17.0 / 2021-04-15
========================================
  * Updated README.md.
2021-04-20 18:29:35 +00:00
pin
7ec78410a8 security/lxqt-sudo: update to 0.17.0
lxqt-sudo-0.17.0 / 2021-04-15
=============================
  - Handled Qt5.15's deprecations.
2021-04-20 18:28:19 +00:00
pin
11754e328d security/lxqt-policykit: update to 0.17.0
lxqt-policykit-0.17.0 / 2021-04-15
==================================
  - Completely moved to Qt5 signal/slot syntax.
  - A better memory handling in PolicykitAgent.
  - Code cleanup.
  - Improved code readability.
2021-04-20 18:23:38 +00:00
wiz
c3e5c57b0b tor-browser-https-everywhere: update to 2021.4.15.
2021.4.15
* Add DuckDuckGo Smarter Encryption update channel
* Bloom filter for rulesets
* Firefox Fenix option page updates for Android users
* Move to Python 3 from Python 3.6
* Fix undefined type access
* Fix empty default types
2021-04-20 16:23:49 +00:00
leot
57d50dda9f amass: Update to 3.11.13
Changes:
3.11.13
-------
 - Update user_guide.md
 - Removed the previous CI/CD configuration

3.11.12
-------
 - format: write characterization tests for parse.go
 - Moved the DNS resolvers package to another repository
 - Increased speed of the Google certificate transparency data source
 - Addressing crash during cleanup issue #599
 - Added the Security Weekly interview information

3.11.11
-------
 - Improved data source service performance
 - Addressing #519 by noticing expired contexts quickly

3.11.10
-------
 - Support for the AMASS_CONFIG environment variable
2021-04-17 11:07:03 +00:00
leot
71a2738860 sqlmap: Update to 1.5.4
Changes:
1.5.4
-----
No changelog shared by upstream but according commit messages mostly bug fixes.
2021-04-17 10:33:20 +00:00
ryoon
633bec58e9 *: Recursive revbump from devel/nss 2021-04-15 11:23:03 +00:00
adam
49008cacac py-acme py-certbot*: updated to 1.14.0
Certbot 1.14.0

Changed

certbot-auto no longer checks for updates on any operating system.
The module acme.magic_typing is deprecated and will be removed in a future release.
Please use the built-in module typing instead.
The DigitalOcean plugin now creates TXT records for the DNS-01 challenge with a lower 30s TTL.

Fixed

Don't output an empty line for a hidden certificate when certbot certificates is being used
in combination with --cert-name or -d.
2021-04-15 05:16:35 +00:00
wiz
ae12fea0c1 *: bump for vala 0.52 2021-04-14 07:28:16 +00:00
dholland
c40b549999 PR pkg/56100: security/libgcrypt fails on NetBSD/m68k
Extend the m68k assembler syntax probe to recognize NetBSD targets.
2021-04-13 17:38:12 +00:00
nia
ac81f93ac2 honeyd: update to 1.5c, fix build with "new" libevent
i would post a changelog, but loading the honeyd forum fails with this:

SQL ERROR [ mysql4 ]

Table './phpbb2/phpbb3_sessions' is marked as crashed and should be repaired [145]

An sql error occurred while fetching this page. Please contact an administrator if this problem persists.

This release is from 2007.
2021-04-13 15:42:27 +00:00
nia
95837a61bd remove security/sfs
upstream has disappeared, this doesn't build with modern C++ compilers,
and i can't find any other packages from which to steal packages to fix
it in any other packaging systems.
2021-04-13 15:19:55 +00:00
nia
5cff77dd41 remove security/srp_client
development appears stalled upstream and this does not support current
openssl or SSP.
2021-04-13 15:15:45 +00:00
nia
6b34740005 security: expand COMMENT 2021-04-12 14:29:46 +00:00
nia
efc6bdfb67 libsecret: vala is build-time dependency 2021-04-12 13:21:00 +00:00
kim
8d0965f8b9 security/priv: Document why we would want to avoid "autoreconf -fi" 2021-04-11 07:10:06 +00:00
kim
0ae04c850a security/priv: Avoid calling "autoreconf -fi" during pre-configure. 2021-04-11 06:52:54 +00:00
taca
55e4deeefd security/ruby-rex-exploitation: remove dependency to ruby-rexml
Dro dependency to ruby-rexml since all ruby*-base contains ruby-rexml
package.
2021-04-11 00:10:55 +00:00
nia
92fdc2daed pam_ssh_agent_auth: update to 0.10.4
- fixed build with openssl 1.1.
- grabbed some fixes from FreeBSD.
- now uses the new GITHUB_SUBMODULES - thx ryoon!
2021-04-10 09:10:11 +00:00
nia
36d051e224 remove security/rainbowcrack
appears to be closed source now, patches for modern openssl support
are not available.
2021-04-10 08:48:25 +00:00
nia
28e50b3233 remove security/qore-asn1-module
development of this module appears to have been inactive upstream for
years so there's no support for modern openssl available.

the other packaging systems with a package for this are macports and
opensuse, neither of which have patches.
2021-04-10 08:44:49 +00:00