Commit graph

54 commits

Author SHA1 Message Date
wiz
42426a5a45 Follow some redirects. 2017-09-03 08:53:04 +00:00
sevan
b970197822 Tabs vs spaces!
Unbreak with the Python 3 versions of the package.
Heads up by Daniel Jakots.
2017-03-08 01:09:00 +00:00
sevan
c1c6fa5055 Patch CVE-2013-7459, obtained from:
8dbe0dc3ee
Bump rev.

Reviewed by: wiz
2017-03-07 23:17:51 +00:00
rodent
a68bd97524 Revert last commit. According to wiz@ in private mail, CONFLICTS is needed
for configuration files only.
2017-01-12 16:36:35 +00:00
rodent
1cc0f77a81 py-crypto and py-cryptodome CONFLICT with:
${PYSITELIB}/Crypto/Cipher/AES.py
2017-01-12 11:53:16 +00:00
maya
f2fddd9dec Use public-domain AND python-software-foundation as a license.
Pointed out by leot - thanks!
2016-12-30 22:50:15 +00:00
jperkin
17661ff9a5 Bump PKGREVISION for security/openssl ABI bump. 2016-03-05 11:27:40 +00:00
agc
5293710fb4 Add SHA512 digests for distfiles for security category
Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
2015-11-04 01:17:40 +00:00
tron
c64e9eb269 Recursive PKGREVISION bump for OpenSSL API version bump. 2014-02-12 23:18:26 +00:00
wiz
aa67e11089 Mark packages as not ready for python-3.x where applicable;
either because they themselves are not ready or because a
dependency isn't. This is annotated by
PYTHON_VERSIONS_INCOMPATIBLE=  33 # not yet ported as of x.y.z
or
PYTHON_VERSIONS_INCOMPATIBLE=  33 # py-foo, py-bar
respectively, please use the same style for other packages,
and check during updates.

Use versioned_dependencies.mk where applicable.
Use REPLACE_PYTHON instead of handcoded alternatives, where applicable.
Reorder Makefile sections into standard order, where applicable.

Remove PYTHON_VERSIONS_INCLUDE_3X lines since that will be default
with the next commit.

Whitespace cleanups and other nits corrected, where necessary.
2014-01-25 10:29:56 +00:00
gdt
bbb9c95d58 Take MAINTAINERship; I more or less have been. 2013-12-16 01:03:02 +00:00
obache
a492aec0e2 marked as SUPERSEDES py-amkCrypto 2013-12-14 09:17:24 +00:00
obache
dc9609ab55 FETCH_USING must not be put on pkg's Makefile. 2013-12-14 08:17:31 +00:00
gls
fa84197e2b Update security/py-crypto to 2..6.1
This is a security fix to address CVE-2013-1445

Upstream changes:
-----------------

2.6.1
=====
        * [CVE-2013-1445] Fix PRNG not correctly reseeded in some situations.

         In previous versions of PyCrypto, the Crypto.Random PRNG exhibits a
         race condition that may cause forked processes to generate identical
         sequences of 'random' numbers.
2013-10-29 08:42:14 +00:00
jperkin
becd113253 PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
asau
1a433eae91 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
wiz
81c617df6d Update to 2.6:
2.6
===
	* [CVE-2012-2417] Fix LP#985164: insecure ElGamal key generation.
	  (thanks: Legrandin)

	  In the ElGamal schemes (for both encryption and signatures), g is
	  supposed to be the generator of the entire Z^*_p group.  However, in
	  PyCrypto 2.5 and earlier, g is more simply the generator of a random
	  sub-group of Z^*_p.

	  The result is that the signature space (when the key is used for
	  signing) or the public key space (when the key is used for encryption)
	  may be greatly reduced from its expected size of log(p) bits, possibly
	  down to 1 bit (the worst case if the order of g is 2).

	  While it has not been confirmed, it has also been suggested that an
	  attacker might be able to use this fact to determine the private key.

	  Anyone using ElGamal keys should generate new keys as soon as practical.

	  Any additional information about this bug will be tracked at
	  https://bugs.launchpad.net/pycrypto/+bug/985164

	* Huge documentation cleanup (thanks: Legrandin).

	* Added more tests, including test vectors from NIST 800-38A
	  (thanks: Legrandin)

	* Remove broken MODE_PGP, which never actually worked properly.
	  A new mode, MODE_OPENPGP, has been added for people wishing to write
	  OpenPGP implementations.  Note that this does not implement the full
	  OpenPGP specification, only the "OpenPGP CFB mode" part of that
	  specification.
	  https://bugs.launchpad.net/pycrypto/+bug/996814

	* Fix: getPrime with invalid input causes Python to abort with fatal error
	  https://bugs.launchpad.net/pycrypto/+bug/988431

	* Fix: Segfaults within error-handling paths
	  (thanks: Paul Howarth & Dave Malcolm)
	  https://bugs.launchpad.net/pycrypto/+bug/934294

	* Fix: Block ciphers allow empty string as IV
	  https://bugs.launchpad.net/pycrypto/+bug/997464

	* Fix DevURandomRNG to work with Python3's new I/O stack.
	  (thanks: Sebastian Ramacher)

	* Remove automagic dependencies on libgmp and libmpir, let the caller
	  disable them using args.

	* Many other minor bug fixes and improvements (mostly thanks to Legrandin)
2012-05-25 08:28:13 +00:00
wiz
c595076396 All supported python versions in pkgsrc support eggs, so remove
${PLIST.eggfile} from PLISTs and support code from lang/python.
2012-04-08 20:21:41 +00:00
hans
ea0b413f85 Fix build on SunOS. 2012-02-16 19:39:48 +00:00
gls
8575828c82 Update security/py-crypto to 2.5
Upstream changes:

2.5
===
* Added PKCS#1 encryption schemes (v1.5 and OAEP). We now have
a decent, easy-to-use non-textbook RSA implementation. Yay!

* Added PKCS#1 signature schemes (v1.5 and PSS). v1.5 required some
extensive changes to Hash modules to contain the algorithm specific
ASN.1 OID. To that end, we now always have a (thin) Python module to
hide the one in pure C.

* Added 2 standard Key Derivation Functions (PBKDF1 and PBKDF2).

* Added export/import of RSA keys in OpenSSH and PKCS#8 formats.

* Added password-protected export/import of RSA keys (one old method
for PKCS#8 PEM only).

* Added ability to generate RSA key pairs with configurable public
exponent e.

* Added ability to construct an RSA key pair even if only the private
exponent d is known, and not p and q.

* Added SHA-2 C source code (fully from Lorenz Quack).

* Unit tests for all the above.

* Updates to documentation (both inline and in Doc/pycrypt.rst)

* All of the above changes were put together by Legrandin (Thanks!)

* Minor bug fixes (setup.py and tests).
2012-02-12 14:37:52 +00:00
joerg
9a0666357e Tag the 28 locations that result in a Python 3.1 package as supporting so.
Remove it from the default list for the rest.
2011-12-03 00:02:14 +00:00
gls
63e901bfa8 Updating security/py-crypto to 2.4.1
upstream Changelog:
2.4.1
=====
        * Fix "error: Setup script exited with error: src/config.h: No such file or
	  directory" when installing via easy_install.  (Sebastian Ramacher)
2011-11-23 19:09:01 +00:00
obache
42f9b78943 Update py-cryoto to 2.4.
2.4
===
	* Python 3 support!  (Thorsten E. Behrens, Anders Sundman)
	  PyCrypto now supports every version of Python from 2.1 through 3.2.

	* Timing-attack countermeasures in _fastmath: When built against
	  libgmp version 5 or later, we use mpz_powm_sec instead of mpz_powm.
	  This should prevent the timing attack described by Geremy Condra at
	  PyCon 2011:
	  http://blip.tv/pycon-us-videos-2009-2010-2011/pycon-2011-through-the-side-channel-timing-and-implementation-attacks-in-python-4897955

	* New hash modules (for Python >= 2.5 only): SHA224, SHA384, and
	  SHA512 (Frédéric Bertolus)

	* Configuration using GNU autoconf.  This should help fix a bunch of
	  build issues.

	* Support using MPIR as an alternative to GMP.

	* Improve the test command in setup.py, by allowing tests to be
	  performed on a single sub-package or module only. (Legrandin)

	  You can now do something like this:

	    python setup.py test -m Hash.SHA256 --skip-slow-tests

	* Fix double-decref of "counter" when Cipher object initialisation
	  fails (Ryan Kelly)

	* Apply patches from Debian's python-crypto 2.3-3 package (Jan
	  Dittberner, Sebastian Ramacher):
	 - fix-RSA-generate-exception.patch
	 - epydoc-exclude-introspect.patch
	 - no-usr-local.patch

	* Fix launchpad bug #702835: "Import key code is not compatible with
	  GMP library" (Legrandin)

	* More tests, better documentation, various bugfixes.
2011-10-30 13:30:36 +00:00
drochner
6716ad932a add/fix mutual CONFLICT 2011-01-18 12:06:57 +00:00
gls
863ba719f6 Update py-crypto to version 2.3
pkgsrc changes:
 - add a patch to fix an hardcoded interpreter path
 - add a patch to actually find gmp library.
 - add CONFLICTS with py-amkCrypto, both have files in common.

upstream changes:

2.3
===
* Fix NameError when attempting to use deprecated getRandomNumber()
function.
* _slowmath: Compute RSA u parameter when it's not given to
RSA.construct. This makes _slowmath behave the same as _fastmath in
this regard.
* Make RSA.generate raise a more user-friendly exception message when
the user tries to generate a bogus-length key.

2.2
===
* Deprecated Crypto.Util.number.getRandomNumber(), which had confusing
semantics.  It's been replaced by getRandomNBitInteger and
getRandomInteger.  (Thanks: Lorenz Quack)
* Better isPrime() and getPrime() implementations that do a real
Rabin-Miller probabilistic primality test (not the phony test we did
before with fixed bases).  (Thanks: Lorenz Quack)
* getStrongPrime() implementation for generating RSA primes.
(Thanks: Lorenz Quack)
* Support for importing and exporting RSA keys in DER and PEM format
(Thanks: Legrandin)
* Fix PyCrypto when floor division (python -Qnew) is enabled.
* When building using gcc, use -std=c99 for compilation.  This should
fix building on FreeBSD and NetBSD.
2010-12-05 17:13:09 +00:00
gdt
e1baafb374 Use new lang/python/distutils.mk, simplifying Makefile.
Support conditional egg generation, making this build on 2.4.
2010-07-24 12:33:19 +00:00
wiz
40080c3dbf Remove empty line. 2010-07-23 23:24:19 +00:00
gdt
409190ee02 Substitute egg file name to avoid hardcoded version. 2010-07-23 23:12:36 +00:00
gdt
2df45cab87 Add PY_NO_EGG=no and egg file to PLIST.
Add LICENSE.
2010-07-23 18:30:51 +00:00
gdt
473de3c98d Fix import; apparently importing a package that used to exist does not
go well.
2010-07-22 19:34:11 +00:00
gdt
544809ca9b Import py26-crypto-2.1.0 as security/py-crypto.
Python extensions using OpenSSL which contains hashing algorithms,

This package more or less supersedes py-amkCrypto.
chaffing/winnowing, random number generation, various utility modules,
and several block encryption and digital signature algorithms.
2010-07-22 19:30:42 +00:00
wiz
e5735fb287 Remove py-crypto, which has been obsoleted by py-amkCrypto. 2001-05-07 00:59:26 +00:00
agc
a35e3d707c Move to sha1 digests, add distfile sizes. 2001-04-19 15:40:29 +00:00
agc
2d6b6a009c + move the distfile digest/checksum value from files/md5 to distinfo
+ move the patch digest/checksum values from files/patch-sum to distinfo
2001-04-17 11:43:32 +00:00
hubertf
d32e698de6 Cleanup MKDIR usage => INSTALL_*_DIR
XXX need to teach pkglint to be more picky about this
2001-02-25 04:17:35 +00:00
wiz
a87738b456 Update to new COMMENT style: COMMENT var in Makefile instead of pkg/COMMENT. 2001-02-17 17:42:09 +00:00
fredb
0c6b58570c Reorganize crypto handling, as discussed on tech-pkg. Remove all
RESTRICTED= variables that were predicated on former U.S. export
regulations. Add CRYPTO=, as necessary, so it's still possible to
exclude all crypto packages from a build by setting MKCRYPTO=no
(but "lintpkgsrc -R" will no longer catch them).

Specifically,

- - All packages which set USE_SSL just lose their RESTRICTED
    variable, since MKCRYPTO responds to USE_SSL directly.
- - realplayer7 and ns-flash keep their RESTRICTED, which is based
    on license terms, but also gain the CRYPTO variable.
- - srp-client is now marked broken, since the distfile is evidently
    no longer available. On this, we're no worse off than before.
    [We haven't been mirroring the distfile, or testing the build!]
- - isakmpd gets CRYPTO for RESTRICTED, but remains broken.
- - crack loses all restrictions, as it does not evidently empower
    a user to utilize strong encryption (working definition: ability
    to encode a message that requires a secret key plus big number
    arithmetic to decode).
2000-09-09 19:40:14 +00:00
hubertf
e75965c6ba Update IGNORE-messages for recent changes: add ${PKGNAME} where
appropriate.
2000-08-21 21:01:29 +00:00
hubertf
402899809a Replace MIRROR_DISTFILES and NO_CDROM with the more descriptive and
more fine-grained NO_{BIN,SRC}_ON_{FTP,CDROM} definitions.

MIRROR_DISTFILES and NO_CDROM are now dead.
2000-08-18 22:46:29 +00:00
wiz
c75539eab1 add proper info dir entry 2000-02-05 05:59:30 +00:00
wiz
181c085e62 whitespace fix 2000-02-05 05:59:06 +00:00
hubertf
aa8a9eb1c0 install(1) wants directories to install to to exist 1999-09-21 03:40:23 +00:00
agc
00a16e3008 Add package patch checksum files. 1999-07-09 14:22:59 +00:00
tsarna
b1f3fae459 Update for python 1.5.2.
XXX this is not updated to the latest version, which has changed
significantly. There isn't time to do investigate it before the freeze.
1999-04-17 01:41:13 +00:00
agc
1bb3007c04 s/make/${MAKE}/g 1999-03-08 10:53:55 +00:00
tv
111c4f44b0 Use install-info in $PATH, so that systems with it in base will work too. 1999-02-11 19:17:28 +00:00
tsarna
5796146a4d Re-enable on alpha 1998-12-18 00:42:39 +00:00
tsarna
3b281936b0 Tim tested some of these, but I don't know which. Since at least one of
the pkgs broke on Alpha that was not expected to, disable them all for
the 1.3.3 tag to be on the safe side :-(
1998-09-27 22:24:43 +00:00
tsarna
9bc8051d4e alpha->vax, since Alpha now works for Python dynamicly loaded modules,
but VAX never has.
1998-09-22 16:13:33 +00:00
tsarna
6bd0d65c65 The Grand Homepagification:
- New, optional Makefile variable HOMEPAGE, specifies a URL for
	  the home page of the software if it has one.
	- The value of HOMEPAGE is used to add a link from the
	  README.html files.
	- pkglint updated to know about it.  The "correct" location for
	  HOMEPAGE in the Makefile is after MAINTAINER, in that same
	  section.
1998-08-20 15:16:34 +00:00