Commit graph

5850 commits

Author SHA1 Message Date
taca
83bbb51224 Update openssl package to 0.9.8q.
OpenSSL version 0.9.8q released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8q of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release. For a complete
   list of changes, please see

       http://www.openssl.org/source/exp/CHANGES.

   The most significant changes are:

      o Fix for security issue CVE-2010-4180
      o Fix for CVE-2010-4252
2010-12-03 00:17:21 +00:00
wiz
385e002b2a Update to 0.9.4: no list of changes found. 2010-12-02 16:13:53 +00:00
wiz
3499d7be81 Update to 2.0.3. List of changes not found. 2010-12-02 15:03:56 +00:00
wiz
c6a4ea899c Update to 0.50:
0.50  Nov 21, 2010
        - shell_quote in t/1_run.t was escaping '_' (bug report by
          Andreas J. König)
	- some typos corrected
        - initial implementation of scp_cat
2010-12-02 12:26:19 +00:00
wiz
76b16e925a Update to 1.34:
v1.34 2010.11.01
- schema http for certificate verification changed to
  wildcards_in_cn=1, because according to rfc2818 this is valid and
  also seen in the wild
- if upgrading socket from inet to ssl fails due to handshake problems
  the socket gets downgraded, but is still open.
  See https://rt.cpan.org/Ticket/Display.html?id=61466
- deprecate kill_socket, just use close()
2010-12-02 12:25:04 +00:00
wiz
ecb3e78865 Update to 2.51:
2010-09-30   Gisle Aas <gisle@ActiveState.com>

   Release 2.51

   Florian Ragwitz (1):
      Fix compilation with c++ compilers

   Gisle Aas (1):
      Fix repository specification in META.yml



2010-09-25   Gisle Aas <gisle@ActiveState.com>

   Release 2.50

   Chris 'BinGOs' Williams (1):
      Amended tests to work with perl core.

   Florian Ragwitz (3):
      Attach context pointers using sv magic
      Add failing test for thread cloning
      Clone MD5 contexts on thread cloning
      get_md5_ctx should never return anything but a valid pointer

   Gisle Aas (1):
      perl-5.6 no longer supported

   Jesse Vincent (1):
      Preserve utf8ness of argument [RT#44927]
2010-12-02 12:22:58 +00:00
wiz
abac0aa67c Update to 0.16:
0.16  Wed Sep 29 08:11:42 2010
        - fixed crc64 support for non-xs case, #61490, #61491
2010-12-02 12:22:07 +00:00
obache
21964a9977 Fixes build with OPENSSL_NO_MD2. 2010-11-30 07:12:49 +00:00
drochner
f0c61d0def update to 2.30.1
This switches to the gnome-2.32 release branch.
(compile-tested only; the old version didn't build anymore)
2010-11-29 12:56:20 +00:00
drochner
de7f3e8f42 update to 2.32.0
This switches to the gnome-2.32 release branch.
2010-11-28 12:57:50 +00:00
shattered
833bf67ecc Install manpages in man/, not share/man/ 2010-11-28 10:47:40 +00:00
agc
978258d152 add and enable libtomcrypt 2010-11-27 06:13:25 +00:00
agc
132d12edaa Import libtomcrypt (version 1.17) into the packages collection.
LibTomCrypt is a fairly comprehensive, modular and portable
	cryptographic toolkit that provides developers with a vast array of
	well known published block ciphers, one-way hash functions, chaining
	modes, pseudo-random number generators, public key cryptography and a
	plethora of other routines.  LibTomCrypt has been designed from the
	ground up to be very simple to use.  It has a modular and standard API
	that allows new ciphers, hashes and PRNGs to be added or removed
	without change to the overall end application.  It features easy to
	use functions and a complete user manual which has many source snippet
	examples.

	* Block Ciphers
	    * Blowfish
	    * XTEA
	    * RC5
	    * RC6
	    * SAFER+
	    * Rijndael (aka AES)
	    * Twofish
	    * SAFER (K64, SK64, K128, SK128)
	    * RC2
	    * DES, 3DES
	    * CAST5
	    * Noekeon
	    * Skipjack
	    * Anubis (with optional tweak as proposed by the developers)
	    * Khazad
	    * KASUMI
	    * SEED
	* Chaining Modes
	    * ECB
	    * CBC
	    * OFB
	    * CFB
	    * CTR
	    * IEEE LRW mode
	    * F8 Chaining Mode
	* One-Way Hash Functions
	    * MD2
	    * MD4
	    * MD5
	    * SHA-1
	    * SHA-224/256/384/512
	    * TIGER-192
	    * RIPE-MD 128/160/256/320
	    * WHIRLPOOL
	* Message Authentication
	    * FIPS-198 HMAC (supports all hashes)
	    * CMAC, also known as OMAC1 (supports all ciphers)
	    * PMAC Authentication
	    * F9-MAC
	    * Pelican MAC
	* Message Encrypt+Authenticate Modes
	    * EAX Mode
	    * OCB Mode
	    * CCM Mode (NIST spec)
	    * GCM Mode (IEEE spec)
	* Pseudo-Random Number Generators
	    * Yarrow (based algorithm)
	    * RC4
	    * Support for /dev/random, /dev/urandom and the Win32 CSP RNG
	    * Fortuna
	    * SOBER-128
	* Public Key Algorithms
	    * RSA (using PKCS #1 v1.5 and v2.1)
	    * ECC (EC-DSA X9.62 signatures, X9.63 EC-DH)
		  o With fast Fixed Point ECC support as well
		  o X9.63 import/export of public keys
	    * DSA (Users make their own groups)
	    * The math routines are pluggable which means you can use your own
	      math provider if you want.
	* Other standards
	    * PKCS #1 (v1.5 and v2.1 padding)
	    * PKCS #5
	    * ASN.1 DER
2010-11-27 06:11:57 +00:00
drochner
86be3a7ef6 update to 1.1.0
change: New functions to fix a leak in dirmngr
2010-11-26 18:00:17 +00:00
drochner
2069879c55 update to 2.10.3
changes: bugfixes
2010-11-26 17:56:14 +00:00
drochner
16cf750011 update to 1.10
change: 3 error codes added
2010-11-26 17:55:21 +00:00
obache
1c2474795f define missing PKGCONFIG_OVERRIDE. 2010-11-18 12:09:54 +00:00
taca
f8a37f7e9a Update security/openssl package to 0.9.8p.
OpenSSL version 0.9.8p released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8p of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release which addresses
   CVE-2010-3864. For a complete list of changes,
   please see http://www.openssl.org/source/exp/CHANGES.
2010-11-17 00:52:25 +00:00
drochner
714df7b568 update to 2.32.0
This switches to the gnome-2.32 release branch.
2010-11-16 13:10:53 +00:00
adam
52d99912dd Changes 186:
* fix for BUG-424: build fails on Darwin
2010-11-16 09:53:50 +00:00
abs
9987fa4b3a PKGREVISION bumps for changes to gtk2, librsvg, libbonobo and libgnome 2010-11-15 22:56:08 +00:00
obache
4df37b6c5f Shlib major bumped from 3 to 4 at update of ImageMagick-6.6.4.1.
Bump ABI_DEPENDS (and recursive bump).
2010-11-14 14:05:57 +00:00
shattered
3b05a61c76 Follow HTTP redirects to new HOMEPAGEs and/or MASTER_SITES. 2010-11-13 21:08:54 +00:00
obache
d8b3ca0f9b reset maintainer, he does not use this package anymore. 2010-11-11 11:42:20 +00:00
adam
6ed847acc6 pkglint fixes 2010-11-10 10:37:48 +00:00
agc
7719e6d6fa add and enable libpbc 2010-11-09 03:34:32 +00:00
agc
52f6ebf0c7 Initial import of security/libpbc-0.5.10 into the Packages Collection.
The PBC (Pairing-Based Cryptography) library is a free C library built
	on the GMP library that performs the mathematical operations
	underlying pairing-based cryptosystems.

	It provides routines such as elliptic curve generation, elliptic curve
	arithmetic and pairing computation.

	The API is abstract enough that the PBC library can be used even if
	the programmer possesses only an elementary understanding of pairings.
	There is no need to learn about elliptic curves or much of number
	theory.  (The minimum requirement is some knowledge of cyclic groups
	and properties of the pairing.)

	      Boneh-Lynn-Shacham short signatures
	      Hess identity-based signatures
	      Joux tripartite Diffie-Hellman
	      Paterson identity-based signatures
	      Yuan-Li identity-based authenticated key agreement
	      Zhang-Kim identity-based blind/ring signatures
	      Zhang-Safavi-Naini-Susilo signatures
2010-11-09 03:33:28 +00:00
adam
1db607f855 Changes 2.6.4:
Bug Fixes
* amavisd failed to start when spam scanning was disabled either
  by @bypass_spam_checks_maps=(1) or by @spam_scanners=(), giving:
    Can't locate object method "new" via package "Amavis::SpamControl"
  As a workaround one could use a @spam_scanners=(undef) to disable spam
  scanning;
* several decoders failed to propagate "Exceeded storage quota" exception,
  so the protection of AV scanners against mail bombs was ineffective;
  reported by Jorgen Lundman;
* milter usage (AM.PDP): verbatim header edits inserted a header body of
  "1" instead of the correct string
* updated AV entry for BitDefender's bdscan to recognize tabs around
  a colon in its output; contributed by Steve;
* fix parsing of a combined result from DSPAM (option --classify), as
  earlier versions of DSPAM did not include a signature with a combined
  result line; problem reported by Marijan Vidmar;
New Features
* provide a true SNMP agent and a MIB, facilitating monitoring the health
  of a content filtering system, its performance and mail characteristics;
* a new AV interface to SMTP-based antivirus scanners;
* allow customizing SMTP-status response reason text for blocked messages;
* prevent inserting fake copies of certain important mail header fields
  without breaking a DKIM signature;
2010-11-08 18:06:57 +00:00
agc
cfac11ad30 Update netpgp to 20101107.
Changes since previous version:

+ fixes for GNU autoconf/automake infrastructure
+ Elgamal encryption and decryption (for DSA keys) is now supported
2010-11-07 07:54:39 +00:00
agc
1fe8aec298 Update netpgp to version 20101105 - fixes for autoconf and automake 2010-11-06 03:54:18 +00:00
agc
975cdbd809 Update netpgp to version 3.99.13/20101104
Changes from previous version (20100601)

Changes to 3.99.13/20101104

+ fix up GNU autoconf framework to reflect new structure
+ add ability in netpgpkeys(1) and netpgp(1) to specify the cipher
  (symmetric algorithm)
+ add the camellia cipher implementation from openssl as specified in RFC 5581
+ changes from Peter Pentchev to get rid of an exit(3) in library context
+ changes from Peter Pentchev for manual page hyphens
+ changes from Peter Pentchev to clean up after tests
+ changes from Arnaud Ysmal to avoid dereferencing possible NULL pointers
+ change from Arnaud Ysmal to clean up usage message in netpgpkeys(1)
+ avoid calling bzlib functions if they aren't present
+ when writing out the key as an ssh key, don't include the user id
  information at the end, in-line with expectations about standard ssh
  key formats
+ since the signing key changed its "menu line" entry from "pub" to
  "signature", the offset of the key id moved 7 chars to the right, so
  take this into consideration when generating new keys
+ allow the user specification of the secret key file as the
  --sshkeyfile or -S argument, and check that the public key file exists
  before trying to read it

Changes to 3.99.12/20100907

+ add a pretty print function mj_pretty(3) to libmj
+ added netpgp_write_sshkey(3) to libnetpgp
+ added pgp2ssh(1)
+ added preliminary support for ElGamal decryption, needed for DSA keys
  as yet untested, unworking, and a WIP
+ add support for using all ssh keys, even those protected by a passphrase,
  for decryption and signing. This rounds off ssh key file support in netpgp.
+ add a single character alias (-S file) for [--sshkeyfile file] to
  netpgpkeys(1) and netpgp(1)

Changes to 3.99.11/20100809

+ update hkpd(8) to reflect the -S argument to hkpd(8)
+ add reachover Makefile support for hkpd(8) and hkpc(1)
+ regen autoconf with new version and date information

Changes to 3.99.10/20100809

+ check return value from option setting function in netpgpkeys(1)
+ be smarter when checking for a null id
+ add test for crap being returned when listing specific keys in netpgpkeys(1)
+ take the public key from the pubring, not the secring when exporting
  keys
+ allow hkpd to serve ssh keys in pgp format
+ test on whether a seckey is needed, not on a userid needed, for ssh keys

Changes to 3.99.9/20100809

+ add single character options to netpgp(1) and netpgpkeys(1)
+ add -o long-option (=value)? to netpgp(1) and netpgpkeys(1)
+ save subkeys when parsing keys. when listing keys, note that the first
  subkey is for encryption
+ rationalise birthtime/expiration timestamps into a single function
+ clean up some 64-bit (amd64) lint

Changes to 3.99.8/20100805

+ free a regular expression after using it
+ be a bit less typedef-happy when it's not needed
+ added minimalist JSON (libmj) to distribution
+ add a function in ops layer to construct JSON serialised text from keys
+ use json output from the library in netpgpkeys(1)
+ added check for alternative openssl location

Changes to 3.99.7/20100701

+ recognise ascii-armoured encrypted messages properly, in memory and
  in files
+ fix a bug when printing out the public key when prompting for a secret
  key
+ print error message and exit for now when trying to encrypt with a DSA key
+ fix bug reported by dyoung when trying to print out the encryption key
  fingerprint

Changes to 3.99.6/20100701

+ make some synonyms for --ssh-keys
+ make proper defaults for home dir for ssh key files as well as pgp files
+ modify regression test script to ensure that ssh-keygen and netpgpkey's
  idea of ssh keys are the same
+ return any error codes when reading ssh pub or private keys

Changes to 3.99.5/20100613

+ make ssh fingerprints (md5) match netpgp listing
+ use the more functional hexdump function from ssh2pgp in place of the
  older hexdump function from openpgpsdk
+ pass hash type down from command line where needed
+ add test for netpgp/ssh key fingerprint matching
+ make netpgpkeys(1) take a --hash= option
2010-11-05 03:48:33 +00:00
adam
d529f7a8ee nss_ldap and pam-ldap now share the same configuration files 2010-11-03 11:39:07 +00:00
shattered
297d960d1a Depend on zlib -- this package won't build without it. 2010-11-02 20:40:55 +00:00
obache
3c0dc157f1 Update ruby-oauth to 0.4.4.
=== 0.4.4 2010-10-31

* Fix LoadError rescue in tests: return can't be used in this context
  (Hans de G raaff)
* HTTP headers should be strings. (seancribbs)
* ensure consumer uri gets set back to original config even if an error occurs
  (Brian Finney)
* Yahoo uses & to split records in OAuth headers (Brian Finney)
* Added support for Rails 3 in client/action_controller_request (Pelle)
2010-11-01 04:02:26 +00:00
wiz
d181a9e465 Reset maintainer. 2010-11-01 00:08:09 +00:00
adam
8d32253257 Changes 185:
* fix: LDAP write on userPassword fails when chasing referral and cached
  policy error is POLICY_ERROR_PASSWORD_EXPIRED
* fix: only request attributes that are actually used
* fix: canonicalize PAM_USER name
2010-10-28 08:06:19 +00:00
wiz
b838928231 Update to 20100827. Set LICENSE.
Fix bug reported by Makoto Yamakura in PR 43992.
2010-10-22 10:41:49 +00:00
wiz
d039bae6b8 Update to 1.4.11, add some comments to patches and please pkglint.
Noteworthy changes in version 1.4.11 (2010-10-18)
-------------------------------------------------

    * Bug fixes and portability changes.

    * Minor changes for better interoperability with GnuPG-2.
2010-10-21 21:48:12 +00:00
pettai
abdb13d3cc SoftHSM 1.2.0 - 2010-09-30
* Added mechanism CKM_RSA_X_509 (use Botan 1.9.7 to fix a bug
  when verifying these signatures)
* The softhsm command now have the option --module <path>
  To use a PKCS#11 library other than SoftHSM.
* The softhsm command now import all parts of the RSA key.
  CKA_EXPONENT_1, CKA_EXPONENT_2, and CKA_COEFFICIENT is not needed
  by SoftHSM but might be needed by other HSM:s.
* Ticket #163: softhsm-keyconv now support BIND format v1.3
* Write message to stderr when the config file cannot be found
* CKA_WRAP_WITH_TRUSTED was not handled correctly. But it has not
  been a problem since wrapping is not supported.
* Set CKA_KEY_GEN_MECHANISM to CK_UNAVAILABLE_INFORMATION when
  importing objects.
* C_GetInfo now returns CKR_CRYPTOKI_NOT_INITIALIZED if library
  is not initialized.
* Force clean up if the app does not do C_Finalize (using auto_ptr)
* Limit the scope of the session objects to the owner application
* softhsm --optimize will clean up leftovers (session objects)
  from applications that haven't closed down properly.
* Do not use CKF_HW, the mechanisms are not performed by a device.
* The ulMinKeySize and ulMaxKeySize are not used for the digesting
  mechanisms, but we set them to zero for applications that forget
  this.
* Used wrong buffer size for signatures. This was only a problem
  for keys where (key size % 8 == 1), e.g. 1025 bit keys.
* C_Login now returns CKR_USER_ANOTHER_ALREADY_LOGGED_IN instead of
  CKR_USER_TOO_MANY_TYPES
2010-10-18 21:03:50 +00:00
wiz
50e9dd4d98 Update to 2.10.2:
* Version 2.10.2 (released 2010-09-30)

** Use Libtool 2.2.10 to ease MinGW64 builds.

** libgnutls: Add new extended key usage ipsecIKE.

** libgnutls: Is now more liberal in the PEM decoding.
That is spaces and tabs are being skipped.

** libgnutls: Renamed NULL MAC to MAC-NULL to prevent clash with NULL cipher.
This prevented the usage of the TLS ciphersuites with NULL cipher.
See <http://thread.gmane.org/gmane.network.gnutls.general/2093>.

** libgnutls: The %COMPAT flag now allows larger records that violate the
TLS spec.

** libgnutls: Fix asynchronous API handling.
The code was clearing session hash data on EAGAIN.  Problem reported
by Sjoerd Simons <sjoerd.simons@collabora.co.uk> and Vivek
Dasmohapatra <vivek@collabora.co.uk>.  See
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/4531>.

** gnutls-cli: Flush stdout/stderr before removing buffering.
Reported by Knut Anders Hatlen see
<http://savannah.gnu.org/support/?107481>.
2010-10-16 16:43:42 +00:00
wiz
050e9a2cad Update to 2.8:
* Noteworthy changes in release 2.8 (2010-09-25) [stable]
- Update gnulib files.
- Use Libtool 2.2.10 to ease MinGW64 builds.
2010-10-16 16:41:13 +00:00
obache
91cebf4447 Update ruby-roauth to 0.0.6.
* add tests
* Corrected a bogus array initialization.
* Effectively double-escaped the normalized params for inclusion in the
  signature base as required by sections 9.1.1 and 9.1.3 of the OAuth 1.0
  specification.
2010-10-16 05:03:23 +00:00
obache
972c01ae93 postgresql82 had been removed from pkgsrc,
switch to use default PostgreSQL in pkgsrc for pgsql option (default off).
2010-10-15 04:40:34 +00:00
joerg
69a49845e4 Sort out PLIST for i386. Bump revision. 2010-10-12 19:36:43 +00:00
obache
853e4f92be require elementtree module to build for python24. 2010-10-10 11:38:55 +00:00
tez
055fb2956e Fix for CVE-2010-2939 2010-10-08 20:04:58 +00:00
obache
ee727b8a60 * using perl in test.pl.
* missing dependency in p5-SHA package is fixed, then no included copy of SHA
  module will not be installed, conflict is resolved.
2010-10-08 04:39:37 +00:00
obache
04e46908e0 Add missing dependency on p5-Digest-SHA1.
Bump PKGREVISION.
2010-10-08 04:31:11 +00:00
obache
d30ec1755c set HOMEPAGE. 2010-10-08 03:24:07 +00:00
obache
1e406c5b5f fixes patches for previous commit, not for generated file. 2010-10-04 12:46:26 +00:00
obache
3d2ce8c6e5 Remove redundant escape slash from *.pc file.
It's shell script style escape, not required in *.pc file
and break build of security/lasso.

Bump PKGREVISION.
2010-10-04 12:32:16 +00:00
obache
f8c4ad9dca Bump PKGREVISION by default mysql version changed from 5.0 to 5.1. 2010-09-30 10:49:10 +00:00
wiz
f4f9b4b89b Reset maintainer. 2010-09-28 13:21:29 +00:00
gdt
87292b4bf3 Update to 0.5.25. Add patch to not install odd extraversion.h file.
2010-09-20 -- pycryptopp v0.5.25

    * make setup backwards-compatible to Python 2.4
    * fix incompatibilities between setup script and older versions of darcsver
    * don't attempt to compile Mac OS X extended attribute files (this fixes the build breaking)
    * include a version number of the specific version of Crypto++ in extraversion.h
    * small changes to docs

2010-09-18 -- pycryptopp v0.5.20

    * fix bugs in assembly implementation of SHA-256 from Crypto++
    * fix it to compile on *BSD (#39)
    * improve doc strings
    * add a quick start-up-self-test of SHA256 (#43)
    * execute the quick start-up-self-tests of AES and SHA256 on module import
2010-09-24 18:10:46 +00:00
taca
1a5530e324 Add and enable ruby-hmac. 2010-09-23 07:25:13 +00:00
taca
2a3d75771e Importing security/ruby-hmac 0.4.0.
This module provides common interface to HMAC functionality. HMAC is a
kind of "Message Authentication Code" (MAC) algorithm whose standard
is documented in RFC2104. Namely, a MAC provides a way to check the
integrity of information transmitted over or stored in an unreliable
medium, based on a secret key.

Originally written by Daiki Ueno. Converted to a RubyGem by Geoffrey Grosenbach
2010-09-23 07:24:28 +00:00
taca
2c91cd3cae Update security/ruby-net-scp to 1.0.4.
=== 1.0.4 / 16 Sep 2010

* maintain filename sanitization compatibility with ruby 1.8.6 [Sung Pae, Tim Charper]
2010-09-23 06:49:34 +00:00
obache
9168326ab8 + lua-sec 2010-09-23 05:30:21 +00:00
fhajny
ca3186fe10 Import lua-sec-0.4 as security/lua-sec.
LuaSec is a binding for OpenSSL library to provide TLS/SSL communication.
This version delegates to LuaSocket the TCP connection establishment
between the client and server. Then LuaSec uses this connection to start
a secure TLS/SSL session.

(Based on wip/luasec.)
2010-09-21 10:45:56 +00:00
sno
9fe20f9011 Updating security/p5-Digest-CRC from 0.14nb2 to 0.15
pkgsrc changes:
- add license definition

Upstream changes:
0.15  Sun Sep 12 13:46:13 2010
        - added crc64 support, #50064
          Thanks to Anders Ossowicki <aowi@novozymes.com>
        - added bit reversing per byte, #59575
          Thanks to Joel Peshkin <joel@peshkin.net>
        - clone method nwo copies content too
          Thanks to Stefan Ochs <stefan.ochs@opentext.com>
2010-09-21 05:54:13 +00:00
taca
84f4843fbb * Fix PLIST when "ldap" is enabled in PKG_OPTIONS.
* Install README.LDAP when "ldap" is enabled in PKG_OPTIONS.
* Fix build problem when "kerberos" is enabled in PKG_OPTIONS.

Bump PKGREVISION since default PLIST has changed.
2010-09-21 03:05:27 +00:00
obache
e28dfa8297 static link is not supported on MacOS X.
PR#39058
2010-09-19 06:11:04 +00:00
drochner
df63bd6dd0 do missing dependency bump for glitz removal 2010-09-15 19:44:53 +00:00
wiz
4d24b9b8ad More PKGREVISION bumps for pixman update. 2010-09-14 11:13:10 +00:00
wiz
200e3c4a04 Bump dependency on pixman to 0.18.4 because cairo-1.10 needs that
version, and bump all depends.

Per discussion on pkgsrc-changes.
2010-09-14 11:00:44 +00:00
pettai
588fb71304 The author pushed a new distfile 2010-09-14 06:48:52 +00:00
pettai
d4d3e7cfa5 Version 0.15.1
* Fixed bug with DB_CHECKINODE

Version 0.15
        * Added new grouped option
        * Sort files in report by filename
        * Added support for e2fsattrs attribute
        * Added support for ftype attribute
        * Bug fixes
2010-09-13 13:09:20 +00:00
pettai
824c0448c4 OpenDNSSEC 1.1.3:
Bugfixes:
* Bugreport #183: Partial zone could get signed if zone transfer failed when using zone_fetcher
2010-09-13 07:53:06 +00:00
spz
80e75e00a3 updating to the latest and greatest (and less a bunch of security
relevant bugs) version:

Major changes between version 1.7.4p3 and 1.7.4p4:

    * A potential security issue has been fixed with respect to the
      handling of sudo's -g command line option when -u is also
      specified. The flaw may allow an attacker to run commands as a
      user that is not authorized by the sudoers file.
    * A bug has been fixed where "sudo -l" output was incomplete if
      multiple sudoers sources were defined in nsswitch.conf and there
      was an error querying one of the sources.
    * The log_input, log_output, and use_pty sudoers options now work
      correctly on AIX. Previously, sudo would hang if they were
      enabled.
    * Fixed "make install" when sudo is built in a directory other
      than the directory that holds the sources.
    * The runas_default sudoers setting now works properly in a
      per-command Defaults line.
    * Suspending and resuming the bash shell when PAM is in use now
      works properly. The SIGCONT signal was not being propagated to
      the child process.

Major changes between version 1.7.4p2 and 1.7.4p3:

    * A bug has been fixed where duplicate HOME environment variables
      could be set when the env_reset setting was disabled and the
      always_set_home setting was enabled in sudoers.
    * The value of sysconfdir is now substituted into the path to the
      sudoers.d directory in the installed sudoers file.
    * Fixed compilation problems on Irix and other platforms.
    * If multiple PAM "auth" actions are specified and the user enters
      ^C at the password prompt, sudo will now abort any subsequent
      "auth" actions. Previously it was necessary to enter ^C once for
      each "auth" action.

Major changes between version 1.7.4p1 and 1.7.4p2:

    * Fixed a bug where sudo could spin in a cpu loop waiting for the
      child process.
    * Packaging fixes for sudo.pp to better handle patchlevels.

Major changes between version 1.7.4 and 1.7.4p1:

    * Fix a bug introduced in sudo 1.7.3 that prevented the -k and -K
      options from functioning when the tty_tickets sudoers option was
      enabled.
    * Sudo no longer prints a warning when the -k or -K options are
      specified and the ticket file does not exist.
    * Changes to the configure script to enable cross-compilation of
      Sudo.

Major changes between version 1.7.3 and 1.7.4:

    * Sudoedit will now preserve the file extension in the name of the
      temporary file being edited. The extension is used by some
      editors (such as emacs) to choose the editing mode.
    * Time stamp files have moved from /var/run/sudo to either
      /var/db/sudo, /var/lib/sudo or /var/adm/sudo. The directories
      are checked for existence in that order. This prevents users
      from receiving the sudo lecture every time the system reboots.
      Time stamp files older than the boot time are ignored on systems
      where it is possible to determine this.
    * Ancillary documentation (README files, LICENSE, etc) is now
      installed in a sudo documentation directory.
    * Sudo now recognizes "tls_cacert" as an alias for "tls_cacertfile"
      in ldap.conf.
    * Defaults settings that are tied to a user, host or command may
      now include the negation operator. For example:
          Defaults:!millert lecture
      will match any user but millert.
    * The default PATH environment variable, used when no PATH variable
      exists, now includes /usr/sbin and /sbin.
    * Sudo now uses polypkg for cross-platform packing.
    * On Linux, sudo will now restore the nproc resource limit before
      executing a command, unless the limit appears to have been
      modified by pam_limits. This avoids a problem with bash scripts
      that open more than 32 descriptors on SuSE Linux, where
      sysconf(_SC_CHILD_MAX) will return -1 when RLIMIT_NPROC is set
      to RLIMIT_UNLIMITED (-1).
    * Visudo will now treat an unrecognized Defaults entry as a parse
      error (sudo will warn but still run).
    * The HOME and MAIL environment variables are now reset based on
      the target user's password database entry when the env_reset
      sudoers option is enabled (which is the case in the default
      configuration). Users wishing to preserve the original values
      should use a sudoers entry like:
          Defaults env_keep += HOME
      to preserve the old value of HOME and
          Defaults env_keep += MAIL
      to preserve the old value of MAIL.
    * The tty_tickets option is now on by default.
    * Fixed a problem in the restoration of the AIX authdb registry
      setting.
    * If PAM is in use, wait until the process has finished before
      closing the PAM session.
    * Fixed "sudo -i -u user" where user has no shell listed in the
      password database.
    * When logging I/O, sudo now handles pty read/write returning ENXIO,
      as seen on FreeBSD when the login session has been killed.
    * Sudo now performs I/O logging in the C locale. This avoids
      locale-related issues when parsing floating point numbers in the
      timing file.
    * Added support for Ubuntu-style admin flag dot files.

Major changes between version 1.7.2p8 and 1.7.3:

    * Support for logging a command's input and output as well as the
      ability to replay sessions. For more information, see the
      documentation for the log_input and log_output Defaults options
      in the sudoers manual. Also see the sudoreplay manual for
      information on replaying I/O log sessions.
    * The use_pty sudoers option can be used to force a command to be
      run in a pseudo-pty, even when I/O logging is not enabled.
    * On some systems, sudo can now detect when a user has logged out
      and back in again when tty-based time stamps are in use.
      Supported systems include Solaris systems with the devices file
      system, Mac OS X, and Linux systems with the devpts filesystem
      (pseudo-ttys only).
    * On AIX systems, the registry setting in /etc/security/user is
      now taken into account when looking up users and groups.
      Sudo now applies the correct the user and group ids when running
      a command as a user whose account details come from a different
      source (e.g. LDAP or DCE vs. local files).
    * Support for multiple sudoers_base and uri entries in ldap.conf.
      When multiple entries are listed, sudo will try each one in the
      order in which they are specified.
    * Sudo's SELinux support should now function correctly when running
      commands as a non-root user and when one of stdin, stdout or stderr
      is not a terminal.
    * Sudo will now use the Linux audit system with configure with the
      --with-linux-audit flag.
    * Sudo now uses mbr_check_membership() on systems that support it
      to determine group membership. Currently, only Darwin (Mac OS X)
      supports this.
    * When the tty_tickets sudoers option is enabled but there is no
      terminal device, sudo will no longer use or create a tty-based
      ticket file. Previously, sudo would use a tty name of "unknown".
      As a consequence, if a user has no terminal device, sudo will now
      always prompt for a password.
    * The passwd_timeout and timestamp_timeout options may now be
      specified as floating point numbers for more granular timeout
      values.
    * Negating the fqdn option in sudoers now works correctly when sudo
      is configured with the --with-fqdn option. In previous versions
      of sudo the fqdn was set before sudoers was parsed.
2010-09-10 17:11:27 +00:00
wiz
ca8f550fbf Add --certstore-internal to fix packaging on some Linuces.
From Aleksey Cheusov in PR 43849.
2010-09-10 15:02:49 +00:00
taca
573eb0b264 * Add LICENSE.
* Remove RUBY_HAS_ARCHLIB.
* Chante PKG_DESTDIR_SUPPORT to user-destdir.
* Add patch to support both ruby18 and ruby19.
2010-09-10 07:49:07 +00:00
taca
bc7d38a763 * Use lang/ruby/gem.mk instead of misc/rubygems/rubygem.mk.
* Remove default value of GEM_BUILD.
2010-09-10 07:47:05 +00:00
taca
882aa84fba * Add LICENSE.
* Update dependency according to gemspec.
2010-09-10 07:46:31 +00:00
taca
2f9cb6cd71 * Use lang/ruby/gem.mk instead of misc/rubygems/rubygem.mk.
* Remove default value of GEM_BUILD.
2010-09-10 07:45:12 +00:00
taca
f8874bf937 * Use lang/ruby/gem.mk instead of misc/rubygems/rubygem.mk.
* Update HOMEPAGE.
* Remove default value of GEM_BUILD.


=== 2.0.23 / 03 Jun 2010

* delay CHANNEL_EOF packet until output buffer is empty [Rich Lane]

Previously, calling #eof! after #send_data would result in the CHANNEL_EOF
packet being sent immediately, ahead of the data in the output buffer. Now
buffer becomes empty.


=== 2.0.22 / 20 Apr 2010

* Fix for: "Parsing the config errors out because it coerces the "1" into an integer and then tries to split it on spaces for multiple host checking." (http://net-ssh.lighthouseapp.com/projects/36253/tickets/10) [Lee Marlow]


=== 2.0.21 / 20 Mar 2010

* Fix for "IdentifyFile" in ~/.ssh/config does not work if no "Host" statement is given (http://net-ssh.lighthouseapp.com/projects/36253/tickets/9-identifyfile-in-sshconfig-does-not-work-if-no-host-statement-is-given#ticket-9-5) [xbaldauf, Delano Mandelbaum]

* Fix for client closes a forwarded connection, but the server is reading, net-ssh terminates with IOError socket closed (http://net-ssh.lighthouseapp.com/projects/36253/tickets/7) [Miklós Fazekas]

* Fix for client force closes (RST) a forwarded connection, but server is reading, net-ssh terminates with exception [Miklós Fazekas]

* Fix for server closes the sending side, the on_eof is not handled. [Miklós Fazekas]

* Removed Hanna dependency in Rakefile [Delano Mandelbaum]


=== 2.0.20 / 10 Feb 2010

* Support "ProxyCommand none" directive [Andy Lo-A-Foe]

=== 2.0.19 / 16 Jan 2010

* Support plus sign in sshconfig hostname [Jason Weathered]

=== 2.0.18 / 15 Jan 2010

* Fix related to #recv(1) to #readpartial change in 2.0.16 [Hans de Graaff, Delano Mandelbaum]


=== 2.0.17 / 14 Dec 2009

* Don't load net/ssh/authentication/pageant on Windows with Ruby 1.9 [Travis Reeder, Delano Mandelbaum]
2010-09-10 07:44:40 +00:00
taca
69f1fe4d53 Update security/ruby-net-sftp to 2.0.5.
* Use lang/ruby/gem.mk instead of misc/rubygems/rubygem.mk.
* Remove default value of GEM_BUILD.


=== 2.0.5 / 19 Aug 2010

* Fixed missing StringIO exception in download! [Toby Bryans, Delano Mandelbaum]
2010-09-10 07:43:45 +00:00
taca
fffb1a76a9 Update security/ruby-net-scp to 1.0.3.
* Use lang/ruby/gem.mk instead of misc/rubygems/rubygem.mk.
* Remove default value of GEM_BUILD.
* Ajust new ruby package's framework.

=== 1.0.3 / 17 Aug 2010

* replace :sanitize_file_name with a call to String#shellescape [Sung Pae]
* Added gemspec file and removed echoe dependency [Miron Cuperman, Delano Mandelbaum]
* Removed Hanna dependency in Rakefile [Delano Mandelbaum]
2010-09-10 07:42:48 +00:00
taca
ff7742c82a Update security/ruby-ezcrypto to 0.7.2.
* Use lang/ruby/gem.mk instead of misc/rubygems/rubygem.mk.
* Add LICENSE.

Changes are unknown.
2010-09-10 07:41:46 +00:00
taca
2e576f5f32 * Ajust new ruby package's framework. 2010-09-10 07:40:32 +00:00
sno
7d3ba9530f Use bundled M::I to avoid cyclic dependency 2010-09-09 20:30:02 +00:00
sno
1740dada22 Updating security/p5-Data-SimplePassword from 0.05nb1 to 0.06
pkgsrc changes:
- imported and added recommended dependency to Math::Random::MT
- moved List::MoreUtils to run dependencies

Upstream changes:
0.06  Tue Aug 31 15:37:15 JST 2010
	* added a parameter 'provider' passed to Crypt::Random.
	  now you can avoid annoying device lock to set the value for example
	  to 'udevrandom' (means /dev/urandom), 'rand' etc.
2010-09-09 05:54:41 +00:00
sno
c63041084c Updating security/p5-Authen-SASL from 2.14nb1 to 2.15
pkgsrc changes:
- add informational dependency to core module Digest::MD5

Upstream changes:
Authen-SASL 2.15 -- Wed Jun 2 13:47:41 CDT 2010
  * Makes sure that user callbacks are called [Yann Kerherve]

Authen-SASL 2.1401 -- Mon Mar 29 14:22:54 CDT 2010
  * Add META.yml to release
2010-09-09 05:25:50 +00:00
sno
0f8a782d45 Updating security/p5-Net-OpenSSH from 0.48nb1 to 0.49
Upstream changes:
0.49  Aug 7, 2010
	- do not kill master from forked processes (bug report by
          scotchie at PerlMonks)
	- some typos corrected
2010-09-09 05:18:02 +00:00
sno
bac50ef623 Updating security/p5-Module-Signature from 0.64nb1 to 0.66
pkgsrc changes:
- switch from gnupg-1 (more or less depreciated) to Crypt::OpenPGP and a
  bunch of used encoders and digest modules
- use Module::Install::Bundled module type
- remove patch - works fine with current infrastructure for now

Upstream changes:
[Changes for 0.66 - Fri,  6 Sep 2010 22:51:37 +0200]
  * Fix incompatibility with EU::Manifest 1.54 to 1.57
    (Paul Howarth) (Closes RT#61124).

[Changes for 0.65 - Fri,  3 Sep 2010 21:38:02 +0200]
  * Skip MYMETA (Alexandr Ciornii)
2010-09-08 21:15:28 +00:00
agc
794908d417 Add and enable liboauth 2010-09-03 07:15:09 +00:00
agc
68beccdcbb Import liboauth-0.8.9 into the Packages Collection.
This is an updated version of the liboauth package in pkgsrc-wip by
Kamel Derouiche, modified by myself not to have nss, doxygen, perl and
graphviz pre-requisites.

        OAuth (Open Authorization) is an open standard that allows users to
        share their private resources (e.g.  photos, videos, contact lists)
        stored on one site with another site without having to hand out their
        username and password.

        OAuth allows users to hand out tokens instead of usernames and
        passwords to their data hosted by a given service provider.  Each
        token grants access to a specific site (e.g.  a video editing site)
        for specific resources (e.g.  just videos from a specific album) and
        for a defined duration (e.g.  the next 2 hours).

        Thus OAuth allows a user to grant a third party site access to their
        information stored with another service provider, without sharing
        their access permissions or the full extent of their data.

        OAuth is a service that is complementary to but distinct from OpenID.

        liboauth is a collection of C functions implementing the OAuth
        Core 1.0 standard API.  liboauth provides basic functions to
        escape and encode parameters according to OAuth specs and
        offers high-level functions to sign requests or verify
        signatures.

Necessary these days for twitter applications; useful for flickr and many
others...
2010-09-03 07:14:12 +00:00
obache
d0e7b4bdf9 Some fixes at update to 2.0.16.
* not using autogen.sh anymore, so remove some tools from USE_TOOLS.
* patch-ak does not effect anymore for above reason, add patch-ao for it.
  this patch is required to avoid conflict with security/gnupg.

Bump PKGREVISION.
2010-09-02 06:58:35 +00:00
obache
68775cbba5 Update ruby-oauth to 0.4.3.
== 0.4.3 2010-09-01

* Fix for em-http proxy (ichverstehe)
2010-09-02 00:35:56 +00:00
drochner
d690c66afe update to 2.0.16
changes:
-bugfixes
-New command --passwd for GPG
-Make use of libassuan 2.0 which is available as a DSO
-The gpg-agent commands KILLAGENT and RELOADAGENT are now available
 on all platforms
2010-09-01 16:46:41 +00:00
drochner
a536f78cb7 update to 1.1.0
changes:
-bugfixes
-Make use of libassuan 2.0 which is available as a DSO
2010-09-01 16:40:53 +00:00
drochner
da422cb954 update to 1.0.8
change: Fixed a CMS parsing bug exhibited by Lotus Notes
2010-09-01 16:35:15 +00:00
drochner
c315c4aa11 update to 1.9
change: New function gpg_err_deinit
2010-09-01 16:34:00 +00:00
drochner
417c0701c1 update to 2.10.1
many fixes and API extensions, but still binary compatible afaict
2010-09-01 16:32:17 +00:00
drochner
a29c215d18 sync w/ base pkg 2010-09-01 15:59:48 +00:00
drochner
b12e02d483 update to 0.11.13
This is basically to switch to libassuan2.

other changes: minor fixes
2010-09-01 15:59:22 +00:00
drochner
0ad37a2144 update MASTER_SITES for current location
(this pkg will be obsolete soon, when gnutls gets updated to 2.10)
2010-09-01 11:31:42 +00:00
enami
2157f4b6ef Fix typo. 2010-09-01 00:54:59 +00:00
pettai
018f115709 Version 0.14.2
* Report correct file type in "Detailed information
      about changes" section
    * Bug fixes

Version 0.14.1
    * Added aide-attributes.sh contrib script
    * Bug fixes

Version 0.14
        * Renewed autoconf mechanism
        * Resolved licensing conflicts
        * New feature to summarize changes
        * Added prelink support
        * Many bugfixes
2010-08-30 22:30:27 +00:00
pettai
4ef9b45f02 OpenDNSSEC 1.1.2:
Dnsruby 1.49 now required (for correct zone parsing)
ldns 1.6.6 is required to fix the zone fetcher bug

Bugfixes:
* ods-control stop did not stopped zone fetcher (bug was introduced in 1.1.0)
* Auditor correctly handles chains of empty nonterminals
* Zone fetcher can block zone transfers if AXFR once failed.
  This is a bug in ldns versions 1.6.5 and lower.
  See KNOWN_ISSUES for more information.
* Bugreport #165: Ensure Output SOA serial is always bigger than Input SOA serial.
* Bugreport #166: Correct exit value from signer.
* Bugreport #167: Zone fetcher now also picks up changes when zonelist is reloaded
* Bugreport #168: ods-control with tightened control for the Enforcer
* Bugreport #169: Do not include config.h in the distribution
* Bugreport #170: Typo in a man page (ods-signer)
* Bugreport #172: Correction of some macros in a man page (ods-timing)
* Bugreport #173: A man page used a macro that does not exist (ods-ksmutil)
2010-08-30 13:51:57 +00:00
obache
bdd735a0f7 No need gtkdoc-rebase workaround anymore. 2010-08-29 09:15:50 +00:00
sno
f99b66810e Updating security/p5-Text-Password-Pronounceable from 0.28nb1 to 0.30
Upstream changes:
[Changes for 0.30 - 16 Aug 2010]
	* Updated dist metadata and M::I

[Changes for 0.29 (unreleased) - 11 Sep, 2007]
	* T::P::P->generate($len) works
	* Fix behavior:
	       T::P::P->new(2,10)->generate(6)
	  was equivalent to
	       T::P::P->generate(6,10)
	  which is too subtle. Now it works just as
	       T::P::P->generate(6,6)
	* Improved warnings on bad arguments
2010-08-26 06:46:00 +00:00
sno
7a53405296 Upating security/p5-Crypt-SSLeay from 0.57nb4 to 0.58
Upstream changes:
0.58 2010-08-25 14:06:30 UTC

- Bump version number for Crypt::SSLeay to 0.58 and Net::SSL to 2.85 in
  preparation for release.
- Fix typo in POD is SSLeay.pm s/PEM0encoded/PEM encoded/ (checked
  9a1582ee1e/SSLeay.pm)
- Update Changes and TODO. Regenerate README and META.yml. Update package
  author. Minor POD fixes.

0.57_05 2010-08-15 17:41:21 UTC

- Fix for NO_PROXY support in Net::SSL (bug #57836)
- Bump Net::SSL version number to 2.84_02 after changes
- Fix file/dir permissions (bug #60338)
- Review warnings when compiling SSLeay.xs against older versions of OpenSSL.
  Warnings are due to OpenSSL.
- Add clarification regarding $ENV{HTTPS_CA_FILE} and $ENV{HTTPS_CA_DIR} to the
  POD.
- Other POD related changes:
    * Remove historic information in README about platforms where the package
      was successfully built.
    * Reformat acknowledgements. TODO: Add more people.
    * Fix link to Net-SSLeay.
    * Add note about the --live-tests command line option
    * Generate README from POD.
    * Formatting fixes.
    * Update copyright notice.

0.57_04 2010-08-11 00:22:33 UTC

- Reorganize Makefile.PL to break individual steps in to subroutines so as to
  facilitate localized future modifications. Whether there was any point to
  this remains to be seen.
- In Makefile.PL, accommodate ActiveState+MingW configuration.
- Pick the correct lib location for Strawberry Perl (bug #60230).
- Apply fixes in bug reports #59312 and #33954 to Net/SSL.pm.
- Bump version number in Net/SSL.pm to indicate development release.

0.57_03 2010-08-09 20:12:30 UTC

- If the last component of $inc_dir is 'openssl', set $inc_dir to its parent
  and set $prefix to 'openssl'. Otherwise, leave $inc_dir as is and set $prefix
  to '' (I hope this fixes bugs #28431, #28680, #32084, #43084, #54103 without
  breaking anything).
- Improved OpenSSL detection on Win32/Strawberry Perl (bug #49285).
- Add MIME::Base64 as a prerequisite as Net::SSL needs it.
- exit 0 if OpenSSL can't be found to avoid superfluous reports from CPAN
  Testers.
- Add \ to $opt_bench in eg/net-ssl-test (bugs #30931, #39363).

0.57_02 2010-08-08 18:27:40 UTC

- Refactor the version detection algorithm in Makefile.PL to handle all known
  variations of version number encoding. Should fix bug #52408.

0.57_01 2008-02-18 14:42:32 UTC

- use #include <..> rather than #include "..." in
  crypt_ssleay_version.h.
- add command-line switch to avoid live tests (bug #30268).
- skip tests in t/01-connect.t if 443 is already in use (bug #30985).
- make code gcc -Wwrite-strings compatible (bug #31926).
2010-08-26 06:37:10 +00:00
seb
c3f1e700ad Bump the PKGREVISION for all packages which depend directly on perl,
to trigger/signal a rebuild for the transition 5.10.1 -> 5.12.1.

The list of packages is computed by finding all packages which end
up having either of PERL5_USE_PACKLIST, BUILDLINK_API_DEPENDS.perl,
or PERL5_PACKLIST defined in their make setup (tested via
"make show-vars VARNAMES=..."), minus the packages updated after
the perl package update.

sno@ was right after all, obache@ kindly asked and he@ led the
way. Thanks!
2010-08-21 16:32:42 +00:00
reed
e71e811eeb Fix homepage (specific page for software). 2010-08-19 17:08:44 +00:00
wiz
49fd68dbf3 Recognize 64 bit DragonFly systems correctly. From Damian Lubosch
in PR 43774.
2010-08-18 11:20:55 +00:00
obache
7ba33e497f Update ruby-roauth to 0.0.3.
bug fixes.
2010-08-17 04:48:46 +00:00
wiz
78ec1df6d3 Update to 2.0.1:
Noteworthy changes in version 2.0.1 (2010-08-09)
------------------------------------------------

 * Support for WindowsCE.

 * Input and output notification handler can now really access the
   parsed fd as stated in the manual.

 * Cleaned up the logging.

 * Interface changes relative to the 2.0.0 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 assuan_free               NEW.
 _assuan_w32ce_create_pipe NEW.
 ASSUAN_LOG_CONTROL        NEW.
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2010-08-16 21:42:18 +00:00
obache
984c67619c Update ruby-oauth to 0.4.2.
== 0.4.2 2010-08-13

* Fixed compatibility with Ruby 1.9.2 (ecavazos)
* Fixed the em-http request proxy (Joshua Hull)
* Fix for oauth proxy string manipulation (Jakub Suder)
* Added Bundler (rc) Gemfile for easier dev/testing
2010-08-14 02:55:23 +00:00
drochner
b73228d07a sync with base pkg
qt4: run "moc" at build time to make sure the generated files
match the installed qt version
2010-08-11 13:29:19 +00:00
drochner
e11490c7a7 update to 0.8.0
changes:
-Beautified the qt4 pinentry
-Minor enhancements

Thanks to Sverre Froyen for testing the qt4 version and finding
a patch which makes the dialog stay on top.
2010-08-11 13:28:08 +00:00
drochner
447ca785c0 remove awk script modifications someone added for compatibility -- they
are wrong and caused out-of-bounds memory accesses
bump PKGREVISION
2010-08-05 13:28:24 +00:00
jnemeth
ac2c286c38 sort 2010-08-05 04:58:12 +00:00
sno
88e434d606 Updating security/p5-Net-OpenSSH from 0.47 to 0.48
Upstream changes:
0.48  Aug 2, 2010
        - bug quoting escaped scalars as globs solved
	- new faq for "can't change directory"
	- support calling shell_quote and shell_quote_args as class
          methods
	- more tests
	- minor doc corrections
2010-08-04 16:49:54 +00:00
drochner
65207c04f9 add patch from upstream to fix a possible use-after-free problem
(CVE-2010-2547), bump PKGREVISION
2010-08-03 19:14:42 +00:00
obache
dfff3c8910 Update ruby-oauth to 0.4.1.
== 0.4.1 2010-06-16

* Added support for using OAuth with proxies (Marsh Gardiner)
* Rails 3 Compatibility fixes (Pelle Braendgaard)
* Fixed load errors on tests for missing (non-required) libraries
2010-08-03 07:06:45 +00:00
obache
dc6780c274 + ruby-soauth, ruby-roauth 2010-08-03 05:03:41 +00:00
obache
9a356936e0 Import ruby-roauth-0.0.2 as security/ruby-roauth.
Based on SOAuth: security/ruby-soauth

A *simple* Ruby OAuth library that supports OAuth header signing, and header
verifying.
2010-08-03 05:01:41 +00:00
obache
4139c1da8b Import ruby-soauth-0.2 as security/ruby-soauth.
## The "S" is for "Signs" ##

*SOAuth* is a Ruby library that **creates HTTP headers for OAuth Authorization**
using previously-obtained OAuth keys/secrets.  Useful if you want to make your
own HTTP request objects instead of using the ones created for you using the
[commonly-used OAuth gem](security/ruby-oauth).

It should be noted that this was developed without edge cases in mind -- it was
pretty much abstracted from my "by-hand" signing of OAuth requests in [Prey
Fetcher](http://preyfetcher.com), so don't consider it production-quality code
(though it [is running in production](http://preyfetcher.com)).
2010-08-03 04:55:10 +00:00
obache
813cc3df1b ABI is not defined on old Darwin. 2010-08-01 05:24:00 +00:00
sno
6215dac456 Updating security/p5-Net-OpenSSH from 0.45 to 0.47
Upstream changes:
0.47  Apr 13, 2010
	- document how to make it work under Solaris
	- some docs reorganization and improvements

0.46_02  Mar 29, 2010
	- add suport for default_stdin_file, default_stdin_discard and
          similar options
        - add stdinout_socket feature and open2socket shortcut method
        - rename some internal methods to more meaningfull names
        - add open_tunnel and capture_tunnel methods
	- add support for tunnel feature and docs
	- document mod_perl/mod_perl2 integration
	- document not-a-real-file-handle errors
	- some minor doc updates
	- run tests with StrictHostKeyChecking=no
        - disable tty allocation for control commands
        - better debugging for _io3

0.46_01  Mar 25, 2010
        - do not depend on STDIN, STDOUT and STDERR being file
          descriptors 0, 1, and 2 respectively as it happens, for
          instance, under mod_perl (bug report by eserte via
          PerlMonks)
        - use POSIX::dup2 to duplicate file descriptors, instead of
          perl open builtin
        - set stdin_discard to when running control commands as it may
          be closed or tied
        - better debugging for waitpid and _io3
        - error in example in documentation corrected (reported by
          Slaven Rezic)
2010-07-31 11:55:03 +00:00
sno
824090e49a Updating security/p5-GSSAPI from 0.26nb1 to 0.28
pkgsrc changes:
- add license definition

Upstream changes:
0.28    Do 3. Jun 12:11:21 UTC 2010
        - Fixed Lenght-problem in typemap, T_BUFFER_STR_OUT for Heimdal.
          Thanks to Slaven Rezic <slaven@rezic.de> for report and patch.
2010-07-31 11:52:29 +00:00
sno
80298f61c0 Updating security/p5-Digest-MD5 from 2.39 to 2.40
pkgsrc changes:
- adjust dependencies

Upstream changes:
2010-07-03 - Release 2.40 - Gisle Aas <gisle@ActiveState.com>
   Marc Pignat (1):
      Safer alignment test [RT#35823]
   Robin Barker (1):
      consting in new ext/
   Gisle Aas (1):
      Remove the MacOS branch of this test
2010-07-31 11:48:37 +00:00
sno
87624823fb Updating security/p5-Crypt-Twofish from 2.13 to 2.14
pkgsrc changes:
- adjust license definition

Upstream changes:
2.14    2010-05-08      Abhijit Menon-Sen <ams@toroid.org>
    * Fix inaccurate dependency in Makefile.PL
2010-07-31 11:44:09 +00:00
jnemeth
e319f50d79 add and enable dnssec-tools 2010-07-29 04:59:33 +00:00
drochner
f5081bd7b2 POSIX says <sys/stat.h> is sufficient to get mode_t defined, but some
older systems apparently need <sys/types.h> for this, so just
include it as well
fixes compile problem on Ubuntu 6.06 reported by Matthias Ferdinand
2010-07-28 08:45:07 +00:00
taca
290874ff8f Add information for libgcrypt-1.4.6/gcrypt.tar.bz2 which is needed with
idea PKG_OPTION.
Fix PR pkg/43675 reported by Ryo HAYASAKA.
2010-07-27 04:45:41 +00:00
pettai
02d844d2b4 Add installation of the CONF files, to ease the usability of this package 2010-07-25 19:57:25 +00:00
pettai
8090b073b2 Added buildlink3.mk, so other packages can use this toolset to get DNSSEC
fuctionality
2010-07-25 19:23:06 +00:00
gdt
f9ea4ed356 Use distutils.mk, and conditionalize egg file presence.
Fixes build with Python 2.4.
2010-07-24 12:49:25 +00:00
gdt
e1baafb374 Use new lang/python/distutils.mk, simplifying Makefile.
Support conditional egg generation, making this build on 2.4.
2010-07-24 12:33:19 +00:00
sborrill
4037f4e73d Add openssl bl3.mk to deal with partial bulk builds and pkgsrc ssl 2010-07-24 10:43:33 +00:00
wiz
40080c3dbf Remove empty line. 2010-07-23 23:24:19 +00:00
gdt
e271ea57be This uses setuptools, so use egg.mk.
Substitute egg directory in PLIST to avoid hardcoded version.
2010-07-23 23:17:48 +00:00
gdt
409190ee02 Substitute egg file name to avoid hardcoded version. 2010-07-23 23:12:36 +00:00
gdt
1d8703d103 Substitute the egg file in PLIST so that the version isn't hardcoded.
(We are missing infrastructure for egg files in non-egg packages.)
Problem pointed out by wiz@.
2010-07-23 23:04:27 +00:00
pettai
fc4c667ad2 Missed to remove a line containing etc 2010-07-23 22:41:49 +00:00
gdt
d912f24231 Don't suppress egg-info file, so that programs that use requires to
find the Python package contained in this distribution will work.
2010-07-23 21:09:51 +00:00
gdt
2df45cab87 Add PY_NO_EGG=no and egg file to PLIST.
Add LICENSE.
2010-07-23 18:30:51 +00:00
pettai
66684c4c54 Added the correct NSEC3 option 2010-07-23 08:42:05 +00:00
adam
a1676cb63f Changes in version 1.4.6:
* New variants of the TIGER algorithm.
* New cipher algorithm mode for AES-WRAP.
* Interface changes relative to the 1.4.2 release:
  GCRY_MD_TIGER1             NEW.
  GCRY_MD_TIGER2             NEW.
  GCRY_CIPHER_MODE_AESWRAP   NEW.
2010-07-23 06:39:03 +00:00
gdt
2d1e75b669 Don't bl3 against crypto++.
While one would expect a python wrapper for a library to link with the
library, this packages's source has files from crypto++, and it
doesn't try to link against the installed crypto++.
2010-07-23 01:17:42 +00:00
pettai
ae3b70002d The DNSSEC-Tools project is about creating a set of software tools, patches,
applications, wrappers, extensions, and plugins that will help ease
the deployment of DNSSEC related technologies.
2010-07-22 21:08:26 +00:00
gdt
c22b22a519 Add py-crypto and py-cryptopp. 2010-07-22 20:22:49 +00:00
gdt
2d1c8c73d7 Import py26-cryptopp-0.5.19 as security/py-cryptopp.
pycryptopp is a set of Python wrappers for a few of the best crypto
algorithms from the Crypto++ library.
2010-07-22 19:39:41 +00:00
gdt
473de3c98d Fix import; apparently importing a package that used to exist does not
go well.
2010-07-22 19:34:11 +00:00
gdt
544809ca9b Import py26-crypto-2.1.0 as security/py-crypto.
Python extensions using OpenSSL which contains hashing algorithms,

This package more or less supersedes py-amkCrypto.
chaffing/winnowing, random number generation, various utility modules,
and several block encryption and digital signature algorithms.
2010-07-22 19:30:42 +00:00
ver
29a33353ba Add devel/py-jersey, net/py-s3cm3, security, py-oauth, and www/py-pendrell
to their respective category Make files.
2010-07-19 17:04:54 +00:00
ver
743775cf8d Add py-oauth from http://pypi.python.org/pypi/oauth/1.0.1:
Library implementing OAuth version 1.0a as documented at http://oauth.net/
2010-07-19 16:53:13 +00:00
ver
a6e9424ac2 Upgrade py-OpenSSL to 0.10 from 0.7 for feature enhancements. 2010-07-19 16:46:48 +00:00
seb
1c65c53816 Update p5-Digest-SHA1 from version 2.12 to version 2.13.
Upstream changes:
2010-07-03   Release 2.13
    Mike McCauley (1):
          Fix memory leak in sha1_transform
2010-07-18 12:05:41 +00:00
wiz
b34ff48407 Bump depends for libpng bump. PR 43564 by David H. Gutteridge. 2010-07-17 12:17:51 +00:00
wiz
b9e6a6744a Do not accept libassuan>=2 here. 2010-07-17 12:07:10 +00:00
pettai
4cca68aac8 Update HOMEPAGE 2010-07-16 22:24:52 +00:00
pettai
9edc252854 OpenDNSSEC 1.1.1:
Bugfixes:
* Bugreport #127: Large SOA serial numbers were not handled properly by signer
* Bugreport #133: Better handling of SOA serial when setting is 'keep'
* Bugreport #136: quicksorter could not handle standard bind format SOA rdata
* The Auditor could not handle the new way of rolling KSKs
* One log message in the Enforcer referred to an old command
* The Enforcer forgot to publish certain keys during transition between states
2010-07-16 22:22:38 +00:00
sbd
d823d74afa Recursive PKGREVISION bump for the net/mDNSResponder update 2010-07-14 11:11:13 +00:00
manu
ba6be2374a Raise pam-p11 from the deads 2010-07-14 07:13:59 +00:00
manu
dd66e33552 pam-p11 comes back 2010-07-13 19:48:09 +00:00
obache
a8e0961b5c Need yacc and lex to build.
PR#43594 by Aleksey Cheusov.
2010-07-10 11:38:57 +00:00
jnemeth
3f75682ed0 delete non-existant pam-11 package 2010-07-08 06:59:56 +00:00
drochner
a012c1b7fb update to 2.30.3
changes:
-bugfixes
-Add dbus activation service file for org.freedesktop.secrets

pkgsrc note: removed dependency on libgnome-keyring; child pkgs
should have been updated to list this dependency explicitely
2010-07-06 16:13:41 +00:00
drochner
ae01316169 update to 2.30.1
This switches to the gnome-2.30 release branch.
2010-07-06 15:12:37 +00:00
jmmv
3b922a2b77 Transfer ownership to pkgsrc-users. pancake's address is not valid any
more and he has agreed in private mail to drop maintainership.
2010-07-06 10:17:11 +00:00
taca
402c75a536 Update sudo package to 1.7.2p8.
Major changes between sudo 1.7.2p7 and 1.7.2p8:

 * Fixed a crash on AIX when LDAP support is in use.

 * Fixed problems with the QAS non-Unix group support
2010-07-05 03:08:10 +00:00
obache
d47dfc39ed Add builtin OpenSSL support for Haiku. 2010-07-04 16:33:25 +00:00
manu
84644d7c3c Added security/gnupg-pkcs11-scd version 0.7.0 2010-07-03 05:01:38 +00:00
manu
930b542bea gnupg-pkcs11 is a project to implement a BSD-licensed smart-card
daemon to enable the use of PKCS#11 tokens with GnuPG. The motivation
behind this project originates in the following two threads:

 * http://lists.gnupg.org/pipermail/gnupg-users/2006-February/027964.html
 * http://lists.gnupg.org/pipermail/gnupg-devel/2004-November/021522.html
 * http://lists.gnupg.org/pipermail/gnupg-users/2004-November/023673.html

PKCS#11 is the de-facto standard for accessing cryptographic tokens,
and thus we strongly disagree with WK's attitude towards it.

The patch mentioned in the above threads is unmaintained, so we
decided to implement PKCS#11 support "the right way". gnupg-pkcs11
is a (hopefully) drop-in replacement for the smart-card daemon
(scd) shipped with GnuPG.
2010-07-03 04:59:19 +00:00
manu
06255e2898 Added security/pam-p11 version 0.1.5 2010-07-03 04:51:15 +00:00
manu
d262e81bda Added security/libassuan2 version 2.0.0 2010-07-03 04:46:55 +00:00
manu
b6b1c504e6 This is the IPC library used by GnuPG 2, GPGME and a few other packages. 2010-07-03 04:45:38 +00:00
joerg
edc1b1c129 Use CHECK_BUILTIN.heimdal to prevent the fake-krb5-config target to be
defined twice.
2010-07-02 13:40:22 +00:00
joerg
d26366aa51 Don't include mk/bdb.m3.mk for the builtin heimdal. 2010-07-01 18:14:19 +00:00
joerg
d188bd3135 Needs py-expat for build. Fix destdir. 2010-07-01 15:08:14 +00:00
manu
965acbc02b Roll back commit: this is pkgsrc freeze (sorry, I missed the message) 2010-06-29 13:42:10 +00:00
manu
94c0f743d2 Added security/pam-p11-0.1.5 2010-06-29 07:31:28 +00:00
manu
e828730471 Pam_p11 is a plugable authentication module (PAM) package for using
crpytographic PKCS#11 tokens such as smart cards and usb crypto
tokens for local authentication.

Pam_p11 implements two authentication modules:
* pam_p11_openssh authenticates the user against public keys found
in OpenSSH ~/.ssh/authorized_keys file.
* pam_p11_opensc authenticates the user against certificates found
in ~/.eid/authorized_certificates.
2010-06-29 07:29:32 +00:00
roy
d88fee8650 New version, 2.2.5. Fixes PR pkg/43528.
No upstream changelog.
2010-06-28 15:26:44 +00:00
joerg
b77fcebc94 DESTDIR support 2010-06-28 10:13:01 +00:00
wiz
7e05f222be Remove configure override for funopen detection.
Aleksey Cheusov reports in PR 43519 that this fixes a problem on Linux,
and the function is still properly detected on NetBSD-5.99.31..
2010-06-25 22:11:10 +00:00
obache
55970ad7a8 * fixes DESTDIR installation
* define TEST_TARGET.
2010-06-25 06:28:09 +00:00
joerg
e51cf4c45c Fix dependency pattern 2010-06-19 14:21:57 +00:00
taca
b240294d0c Update F-PROT Antivirus to 6.0.3.1.
pkgsrc changes:

* Fix PKGNAME to really intended to.
* Some permission problem with using scan-mail.pl


6.0.3 (Initially NetBSD only):

 - Scanning inside NSIS (Nullsoft) installer files

 - Generic IFRAME exploit detection

 - Numerous additions to the Eldorado heuristic engine, making it
   significantly more powerful than before - Scanning of 7-Zip, ACE
   and "solid RAR" archives - Improved scanning of JavaScript files

 - List of detected malware now includes Eldorado heuristic detections

 - Much faster initial loading of ANTIVIR.DEF

  - Scan engine updated
2010-06-16 22:27:03 +00:00
pettai
c4eb363ac8 OpenDNSSEC 1.1.0:
* Partial Auditor added
* Dnsruby-1.46 required
* Improved error messages when the system runs out of keys
* Optimise communication of signconfs for multiple zones sharing keys.
  Group zones in zonelist.xml by policy to get this benefit.
* Bugreport #101: Signer Engine now maintains its own pidfile.
* Jitter redefined: now in the range of [-jitter, ..., +jitter]
* Optimized sorter: quicksorter (sorter becomes obsolete).
* Optimized zone_reader, includes nseccing/nsec3ing (nseccer and nsec3er
  become obsolete).
* Enable database selection using --with-database-backend={sqlite3|mysql}
* Enable the EPP-client using --enable-eppclient
  For sending DS RR to the parent zone (experimental)
* Turn NSEC3 OptOut off by default
* Install kasp2html XML stylesheet
* Add simple kasp2html conversion script
* DNSKEY records communicated to an external script if configured
* The command 'ods-signer restart' is removed.
* Signer Engine now also reuses signatures after a change in NSEC(3)
  configuration or rolling keys.
* Quicksorter defaults to class IN.

And a lot of bugfixes...
2010-06-16 00:19:08 +00:00
pettai
299d59a534 courier-authlib-0.63.0:
* authldapescape.c: Factor out LDAP string escape function.
* authldap.schema: Various fixes
* authldap.ldif (olcObjectClasses): Create LDIF format schema from
  authldap.schema
* authoption.c (auth_getoptionenvint): For account options that
  are parsed to an int, an option value that begins with t, T, y, or Y
  is evaluated as 1, other alphabetic values as 0; so that 'true'
  or 'yes' get evaluated as 1.

(See the Changelog for the previous releases)

Based on patch(es) from PR pkg/42989 by Brian Candler
2010-06-15 23:10:44 +00:00
drochner
2bc030fefa fix build against gnome-keyring-2.30, should fix PR pkg/43479
by Greg Oster
being here, disable avahi support which is mostly useless
2010-06-15 16:32:11 +00:00
wiz
d69edc3fa4 Remove patch-aa, upstream's Simon Josefsson said:
The patch looks wrong to me, though, because stdint.h should be
generated in lib/gllib/ if the system does not have it (or if it is not
correct), and the -I's should make the code find the local file instead.
Thus, the code should be able to unconditionally include the header
file.
2010-06-15 12:25:50 +00:00
taca
b90020b8ef Add hpn-patch for OpenSSH 5.5p1.
No PKGREVISION bump since this option never worked
with OpenSSH 5.5p1 before.
2010-06-15 03:11:52 +00:00
jnemeth
1c55f55e8f PR/43470 - Jack Lloyd -- update DESCR
While here, do some minor delinting and set LICENSE.
2010-06-14 18:27:54 +00:00
wiz
f45a09f8f6 PKGREVISION bump for png-1.4.x shlib change.
(missed those and *emacs* the first time round because they pull
in their png dependencies via default-on options; they were included
in the test bulk build though)
2010-06-14 15:33:12 +00:00
wiz
e8d8834f6a Bump PKGREVISION for libpng shlib name change.
Also add some patches to remove use of deprecated symbols and fix other
problems when looking for or compiling against libpng-1.4.x.
2010-06-13 22:43:46 +00:00
wiz
95e615c646 Fix installation with latest gnome-doc-utils and depend on it. 2010-06-12 14:13:17 +00:00
martti
4e27aff6a3 Updated security/openssh to 5.5.1
Lots of changes, including

 * After a transition period of about 10 years, this release disables
   SSH protocol 1 by default. Clients and servers that need to use the
   legacy protocol must explicitly enable it in ssh_config / sshd_config
   or on the command-line.

 * Remove the libsectok/OpenSC-based smartcard code and add support for
   PKCS#11 tokens. This support is automatically enabled on all
   platforms that support dlopen(3) and was inspired by patches written
   by Alon Bar-Lev. Details in the ssh(1) and ssh-add(1) manpages.

 * Add support for certificate authentication of users and hosts using a
   new, minimal OpenSSH certificate format (not X.509). Certificates
   contain a public key, identity information and some validity
   constraints and are signed with a standard SSH public key using
   ssh-keygen(1). CA keys may be marked as trusted in authorized_keys
   or via a TrustedUserCAKeys option in sshd_config(5) (for user
   authentication), or in known_hosts (for host authentication).

   Documentation for certificate support may be found in ssh-keygen(1),
   sshd(8) and ssh(1) and a description of the protocol extensions in
   PROTOCOL.certkeys.

 * Added a 'netcat mode' to ssh(1): "ssh -W host:port ..." This connects
   stdio on the client to a single port forward on the server. This
   allows, for example, using ssh as a ProxyCommand to route connections
   via intermediate servers. bz#1618
2010-06-11 20:41:41 +00:00
drochner
a9e8813c6e update to 2.30.1
This switches to the gnome-2.30 release branch

pkgsrc note: temporarily add a dependency on libgnome-keyring which
was split out of the old gnome-keyring pkg, so that client pkgs
get the same as before
2010-06-11 13:45:50 +00:00
wiz
435d0e3dae Need pkg-config, add it to tools. 2010-06-10 21:18:16 +00:00
pettai
e3f00da3f7 Corrected PLIST 2010-06-08 12:02:21 +00:00
wiz
743c02520a Update to 1.8:
Noteworthy changes in version 1.8 (2010-05-06)
----------------------------------------------

 * Support for WindowsCE.

 * New option --list for gpg-error.

 * Interface changes relative to the 1.7 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 GPG_ERR_NOT_ENABLED           NEW.
 GPG_ERR_SOURCE_G13            NEW.
 GPG_ERR_NO_ENGINE             NEW.
 gpg_err_set_errno             NEW.
2010-06-08 10:15:32 +00:00
obache
d3d7334aaa Update xmlsec1 to 1.2.16.
* May 26 2010
  Changes in XML Security Library 1.2.16 release:
    * New xmlsec-gcrypt library.
    * xmlsec-gcrypt: Added RSA with SHA1/SHA256/SHA384/SHA512/MD5/RIPEMD160, DSA
      with SHA1, AES/DES KW support.
    * xmlsec-gnutls: Added X509 support and converted the library to use xmlsec-
      crypt library for all crypto operations.
    * xmlsec-mscrypto: RSA/OAEP and AES/DES KW support.
    * Several minor bug fixes and code cleanups.
* April 29 2010
  Changes in XML Security Library 1.2.15 release:
    * xmlsec-mscrypto: Added HMAC with MD5, SHA1, SHA256/384/512; RSA with MD5,
      SHA256/384/512 support.
    * xmlsec-mscrypto: Converted to Unicode (the non-Unicode builds are still
      available as compile time option).
    * xmlsec-nss: Added MD5 and SHA256/384/512 support for digest, HMAC and RSA
      (the new minimum required version for NSS library is 3.9).
    * xmlsec-gnutls: Added SHA256/384/512 for digest and HMAC; MD5 and RIPEMD160
      digests support (the new minimum required version for GnuTLS library is
      2.8.0).
    * Fixed typo: "Copyrigth" should be "Copyright".
    * Several critical bug fixes and code cleanups.
* December 5 2009
  Changes in XML Security Library 1.2.14 release:
    * XMLSec library is switched from built-in LTDL library to the system LTDL
      library on Linux/Unix and native calls on Windows to fix security issue
       (CVE-2009-3736) in LTDL.
    * Fixed minor bugs (see log for complete list).
2010-06-06 12:36:11 +00:00
obache
087589d065 remove obsoleted @dirrm. 2010-06-06 11:52:31 +00:00
manu
129ac552e7 Update to 1.1, which allows to select what timeframe should be validated:
assertion and/or session
2010-06-05 20:36:30 +00:00
wiz
1ccb64e2ed Update to 2.7:
* Noteworthy changes in release 2.7 (2010-05-20) [stable]
- Doc: Build a PDF manual using GTK-PDC.
- Doc: Fix of asn1_check_version, documentation was missing from last release.
- Build: Avoid warnings about ignored visibility attributes on Windows.
2010-06-05 10:53:25 +00:00
taca
9ece180735 Update security/sudo package to 1.7.2p7.
For more detail: http://www.sudo.ws/sudo/alerts/secure_path.html

Summary:
    Sudo "secure path" feature works by replacing the PATH environment
    variable with a value specified in the sudoers file, or at
    compile time if the --with-secure-path configure option is used.
    The flaw is that sudo only replaces the first instance of PATH
    in the environment.  If the program being run through sudo uses
    the last instance of PATH in the environment, an attacker may
    be able to avoid the "secure path" restrictions.

Sudo versions affected:
    Sudo 1.3.1 through 1.6.9p22 and Sudo 1.7.0 through 1.7.2p6.
2010-06-03 14:53:14 +00:00