Commit graph

2517 commits

Author SHA1 Message Date
snj
8675850c7b Fix build on sparc64 with gcc2. 2004-03-23 07:16:10 +00:00
jlam
342197e64b bl3ify and convert to use krb5.buildlink3.mk for proper Kerberos
detection and linkage.  This fixes PR 24498.
2004-03-23 06:13:30 +00:00
jlam
326169077a USE_BUILDLINK3 must be set to "yes" or "no", not defined/undefined. 2004-03-23 04:40:59 +00:00
jlam
40372bf47b Fix building this package with Kerberos 5 support -- the misdeclared
krb5_mcc_ops variable is "const" in both Heimdal and in MIT krb5.
2004-03-22 08:45:56 +00:00
kristerw
73ff7727b9 Let ONLY_FOR_PLATFORM recognize NetBSD 2.0 and future versions. 2004-03-22 03:22:01 +00:00
bouyer
ce4f41fe72 Use strerror() instead of sys_errlist[], as the later isn't available on
solaris9.  OK'd by tron@
2004-03-21 19:49:05 +00:00
minskim
cf309f8885 This package needs Tcl only at run time; use DEPENDS to get Tcl
dependency instead of including buildlink.mk.

Switch to Tcl 8.4.
2004-03-21 05:15:52 +00:00
heinz
7200f4494e Uses no compiler, so USE_LANGUAGES is empty 2004-03-21 01:03:20 +00:00
heinz
6a56a0628e Take maintainership, add HOMEPAGE. Uses no compiler, so mark it with empty USE_LANGUAGES. 2004-03-20 17:29:26 +00:00
heinz
68682a0ae6 Add HOMEPAGE, adapt to buildlink3 and add BUILD_DEPENDS on p5-Crypt-CBC for testing. 2004-03-20 17:21:32 +00:00
taca
1517ba3b69 Update fp-netbsd-ws package to 4.4.1 since old distribution isn't
available any more.

	(c) FRISK Software International
  	http://www.f-prot.com/

F-PROT Antivirus for BSD, version 4.4.1

Version 4.4.1 contains various bugfixes and improvements to the documentation
and software.

o	Further enhancements of scanning password encrypted zip files.
o	Added detection of encrypted archives (since various new viruses
	spread through encrypted archives).
o	Minor bug-fixes in the F-Prot daemon.
o	Minor bug-fixes in scan-mail.pl (smtp proxying).
o	Critical bug-fixes in f-prot-milter.
2004-03-19 15:33:01 +00:00
jlam
7db11b582a Fix serious bug where BUILDLINK_PACKAGES wasn't being ordered properly
by moving the inclusion of buildlink3.mk files outside of the protected
region.  This bug would be seen by users that have set PREFER_PKGSRC
or PREFER_NATIVE to non-default values.

BUILDLINK_PACKAGES should be ordered so that for any package in the
list, that package doesn't depend on any packages to the left of it
in the list.  This ordering property is used to check for builtin
packages in the correct order.  The problem was that including a
buildlink3.mk file for <pkg> correctly ensured that <pkg> was removed
from BUILDLINK_PACKAGES and appended to the end.  However, since the
inclusion of any other buildlink3.mk files within that buildlink3.mk
was in a region that was protected against multiple inclusion, those
dependencies weren't also moved to the end of BUILDLINK_PACKAGES.
2004-03-18 09:12:08 +00:00
jlam
59bdf89739 If the ${PKGBASE} of a package doesn't match the token passed to
BUILDLINK_PACKAGES, then set BUILDLINK_PKGBASE.<pkg> explicitly so that
we can map from <pkg> to BUILDLINK_PKGBASE.<pkg>.
2004-03-16 18:23:26 +00:00
jlam
46453f87ed BUILDLINK_DEPENDS.<pkg> should be appended to, not set. 2004-03-16 17:58:01 +00:00
cube
88853cc030 Define NO_EXPORT_CPP so that rpcgen doesn't produce empty files. 2004-03-16 13:21:48 +00:00
taca
d428fd9d93 Add ruby to CATEGORIES. 2004-03-16 02:01:09 +00:00
wiz
f4b5e9fef5 Add dependency on unzip, per Norm in PR 24785.
While here, update to 4.4.0 since previous distfile disappeared.
Changes:
o       Added detection of encrypted archives (since various new viruses
        spread through encrypted archives).
o       Minor bug-fixes in the F-Prot daemon.
o       Minor bug-fixes in scan-mail.pl (smtp proxying).
o       Critical bug-fixes in f-prot-milter.
o       Minor modifications to the check-updates.pl script (disable proxy caching
        by default).
2004-03-15 15:08:41 +00:00
wiz
f042140b18 Update to 3.8p1:
This version features many improvements and bugfixes.
2004-03-12 19:24:47 +00:00
recht
5f7392fd02 update to 20040310 version
changes:

- Added support for removing files recursivly
- Incudes checking for file type and size.
- Displays the file being destroyed and its size.
- Added command line flags:
- Added Security Level Flag (Destroy Severity)
- Added Output suppression flag for non-verbose output.
- Added Help flag.
- Added a Manual page for the program in section 1.
2004-03-12 18:01:57 +00:00
seb
9fca7358bd Update to version 3.2.9.1.
While here bl3ify.

Changes since previously packaged version (3.2.5):

2003-12-03  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.9.1.

	* non-commercial: removed cert hash compat stuff, which broke
	  compilation.

2003-09-26  Sami J. Lehtinen  <sjl@ssh.com>
	* ssh-3.2.9.
	* ssh2,sshd2: (by Patrick Irwin): Critical security fix: fixed
	  several bugs in ASN.1 decoding functionality, which were caused
	  by invalid assumptions on the format of input BER data.
	  Certificates malformed in certain ways could cause a crash or
	  buffer overflow. No known exploits at this time, but you are
	  strongly advised to upgrade.

	  Admins unwilling or unable to upgrade need to disable
	  certificates, but this may not be enough for "hostbased"
	  authentication. "publickey" auth should be safe even with the
	  old version with certificates disabled. Clients are probably
	  vulnerable against malicious servers in the initial key exchange
	  regardless of configuration.

	  Users of noncommercial version are not affected by this
	  vulnerability.

2003-09-25  Sami J. Lehtinen  <sjl@ssh.com>

	* sshd2, ssh2: Implemented DisableVersionFallback, with which you
	  can disable fallback compatibility code for older, or otherwise
	  incompatible versions of software. Don't disable unless you know
	  what you're doing. See sshd2_config(5) for details. For really
	  paranoid people (using this option will probably hurt usability
	  somewhat, especially in environments where multiple versions of
	  SSH are used from different vendors).

	* sshd2, ssh2: Implemented Cert.RSA.Compat.HashScheme. Older SSH
	  Secure Shell clients and servers used hashes in an incoherent
	  manner (sometimes MD5, sometimes SHA-1). With this option, you
	  can set what hash is used. See sshd2_config(5) for details.

	* Previous: ssh-3.2.8.

2003-08-07  Tomi Salo  <ttsalo@ssh.com>

	* Added a new general configuration option, MaxCRLSize. This sets
	  the maximum size for CRLs and CA certs used in validating
	  received certificates. (The size is the total size of all CRLs
	  and certs, not the maximum individual size.)

2003-06-11  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.7.

	* ssh-signer2: Fixed a bug, which caused the application to
	  intermittently call fatal because the read() operation was
	  interrupted by a signal (SIGCHLD).

2003-06-04  Sami J. Lehtinen  <sjl@ssh.com>

	* ssh-3.2.6.

	* SecurID certified binaries, no code changes.
2004-03-12 16:40:08 +00:00
taca
4ebeb28b9f Bump pacakge revision with ruby-base package's update. 2004-03-12 05:02:55 +00:00
reed
9c5adc6fea The MESSAGE mentions modifying the sudoers file (and doesn't
haev location shown), so tell the admin to use the visudo tool.
2004-03-11 23:33:09 +00:00
jmmv
96a54de082 s/Gnome/GNOME/ 2004-03-11 12:41:58 +00:00
jmmv
182bab7770 Fix path to an icon so that the entry in the control center shows up properly. 2004-03-11 12:38:18 +00:00
jmmv
1dc4467816 Bump PKGREVISION to catch with gpgme03 package rename (it was named gpgme
previously) and its associated library.
2004-03-11 12:29:39 +00:00
jmmv
28eb406354 Rename this package to gpgme03, and rename all installed files to include
the '03' suffix, so that this can coexist with the gpgme package.
2004-03-11 12:26:28 +00:00
jmmv
c84bf493a1 unused 2004-03-11 12:24:22 +00:00
uebayasi
8c74d25297 Fix build on Red Hat 7.3. 2004-03-11 01:41:49 +00:00
jlam
bb46710479 Convert to use bdb.buildlink3.mk. 2004-03-10 18:07:16 +00:00
jlam
d0b4c54eb6 Split out the code that deals with checking whether the software is
built-in or not into a separate builtin.mk file.  The code to deal
checking for built-in software is much simpler to deal with in pkgsrc.

The buildlink3.mk file for a package will be of the usual format
regardless of the package, which makes it simpler for packagers to
update a package.

The builtin.mk file for a package must define a single yes/no variable
USE_BUILTIN.<pkg> that is used by bsd.buildlink3.mk to decide whether
to use the built-in software or to use the pkgsrc software.
2004-03-10 17:57:14 +00:00
cube
93a406f391 Define NO_EXPORT_CPP so that rpcgen doesn't get mad. 2004-03-10 07:12:09 +00:00
seb
b47b1b8a52 Remove info files entries from PLIST. 2004-03-10 00:56:54 +00:00
seb
2baa1f9c50 Remove info files entries from PLIST. 2004-03-10 00:34:51 +00:00
seb
b2a8972a6e Remove info files entries from PLIST. 2004-03-10 00:22:43 +00:00
seb
a8438b38a4 Remove info files entries from PLIST. 2004-03-09 23:10:34 +00:00
seb
dc6d5ee831 Remove info files entries from PLIST. 2004-03-09 23:01:17 +00:00
reed
044930d046 Don't build and install openssl with IDEA, MDC2, or RC5 support.
According to README, "RSA Security holds software patents on the
RC5 algorithm.  If you intend to use this cipher, you must contact
RSA Security for licensing conditions." And "The IDEA algorithm is
patented by Ascom ... They should be contacted if that algorithm
is to be used." The openssl FAQ says "For patent reasons, support
for IDEA, RC5 and MDC2 is disabled in this [Red Hat Linux] version."
The FAQ lists patent numbers and expiry dates of US patents:
MDC-2: 4,908,861 13/03/2007
IDEA:  5,214,703 25/05/2010
RC5:   5,724,428 03/03/2015

Now fee-based-commercial-use ACCEPTABLE_LICENSES is not needed.
2004-03-09 08:06:45 +00:00
minskim
2827f5b2d8 Enable tk84 and replace x11/tk with x11/tk83. Packages compatible
with 8.4 will be updated to depend on x11/tk after Tk update.
2004-03-08 20:27:13 +00:00
minskim
ac690cf634 Replace lang/tcl with lang/tcl83. Packages compatible with 8.4 will
be updated to depend on lang/tcl after Tcl/Tk update.
2004-03-08 19:52:50 +00:00
jmmv
ae5a97419f Handle some shared directories by depending on (or updating dependancies to
the latest versions) xdg-dirs, xdg-x11-dirs or gnome*-dirs.
Bump PKGREVISION.
2004-03-08 19:40:36 +00:00
heinz
6b57ac466e Updated to version 1.03
Adapted to buildlink3
No INTERACTIVE_STAGE anymore

Changes sinces 0.17
===================

1.03 2002.12.09
    - Makefile.PL now uses ExtUtils::AutoInstall. Thanks to Autrijus Tang
      for the note.
    - SIGNATURE file now included with distribution.
    - Added --version to bin/pgplet, which lists supported ciphers, digests,
      etc., along with version information.
    - Added Crypt::OpenPGP::KeyBlock::save_armoured, to save an armoured
      version of the keyblock (useful for exporting public keys).
    - encrypt and verify no longer fail if there are no public keyrings,
      in case lookup in a keyserver is desired.
    - Added Crypt::OpenPGP::Digest::supported and
      Crypt::OpenPGP::Cipher::supported.
    - Fixed bug where signed cleartext has \r characters in the header.

1.02 2002.10.12
    - encrypt and verify now support auto-retrieval of public keys from
      an HKP keyserver, if the keys are not found in the local keyring.
    - Added support for the SHA-1 integrity checks on secret keys used
      by gnupg 1.0.7. Thanks to Chip Turner for the spot.
    - Added a --local-user|-u option to bin/pgplet to support using a
      different secret key for signing. Thanks to Joseph Pepin for the
      patch.
    - new() now accepts Crypt::OpenPGP::KeyRing objects for the PubRing
      and SecRing parameters.
    - Fixed a bug in decrypt where passing in a "Key" param to decrypt a
      message encrypted to multiple recipients did not work. Thanks to
      rdailey for the spot.
    - ElGamal self-signatures no longer cause an error.
    - Added LWP::UserAgent and URI::Escape to prereqs, for keyserver.
    - Added Crypt::OpenPGP::Signature::digest accessor. Thanks to Bob
      Mathews for the patch.

1.01 2002.07.15
    - Added Crypt::OpenPGP::handle, a DWIM wrapper around the other
      high-level interface methods. Given data, it determines whether the
      data needs to be decrypted, verified, or both. And then it does what
      it's supposed to do.
    - Added Crypt::OpenPGP::Signature::timestamp to return the created-on
      time for a signature. Also, Crypt::OpenPGP::decrypt and
      Crypt::OpenPGP::verify now return the Crypt::OpenPGP::Signature object
      if called in list context (and, in the case of decrypt, if there is
      a signature). Thanks to Erik Arneson for the patches.
    - Fixed a bug in decrypt with uncompressed encrypted signed data.
      Thanks to Erik Arneson for the spot.
    - Fixed a bug in Crypt::OpenPGP::Message with clearsigned messages, if
      the text and signature were contained in a block of text containing
      more PGP messages/signatures.
    - Fixed a nasty, evil, stupid compatibility bug with canonical text.
      Namely, pgp2 and pgp5 do not trim trailing whitespace from "canonical
      text" signatures, only from cleartext signatures. This was causing
      invalid signatures which should not have been invalid. Thanks to
      Erik Arneson for the spot.
    - Added Crypt::OpenPGP::KeyServer, which does lookups against an HKP
      keyserver.

1.00 2002.02.26
    - CAST5 is now supported thanks to Crypt::CAST5_PP from Bob Mathews.
    - bin/pgplet now supports encrypting and decrypting symmetrically-
      encrypted messages.
    - The PassphraseCallback argument to Crypt::OpenPGP::decrypt can now
      be used to supply a callback for symmetrically-encrypted packets,
      as well as public-key-encrypted packets.
    - Fix a bug with encrypted, signed text--the signature was being
      armoured, which led to errors from the process trying to decrypt and
      verify.
    - Fix a bug with symmetric-encrypted session keys w/r/t generation for
      PGP2--PGP2 doesn't understand symmetric-encrypted session keys, so we
      need to leave them out when Compat is PGP2. Also, we need to use the
      'Simple' S2k rather than the default, 'Salt_Iter'.
    - Fix a key generation bug where GnuPG will not import generated public
      keys, because the self-signature is invalid; signature needs to be on
      key data *and* user ID. Thanks to Joel Rowles for the spot.
    - Fix bug in ElGamal encryption and k generation.

0.18  2002.01.29
    - Added IsPacketStream parameter to Crypt::OpenPGP::Message; this turns
      off armour detection when initializing the message, and can be used
      when you *know* that the message is a stream of packets, and not an
      ASCII-armoured stream of packets.
    - When unarmouring, remove \r characters from the armoured text end
      of lines.
    - Added Crypt::OpenPGP::KeyRing::save method. Thanks to Ben Xain for
      the idea and a patch.
    - Added compatibility with symmetric-key-encrypted files that do not
      have a symmetric-key session key packet. The assumption with these
      encrypted messages is that they are PGP2-encrypted, using the IDEA
      cipher, MD5 digests, and a Simple s2k. So that is how the fix has
      been implemented. Thanks to Ben Xain for the bug report.
    - Win32 fixes: use binmode when reading files that might be binary.
    - Added --symmetric and --digest options to Makefile.PL to set
      symmetric and digest algorithms when using --sdk.
    - Fixed subkey IDs in list-keys with bin/pgplet.
    - Check for errors when reading keyring.
2004-03-07 03:28:44 +00:00
jlam
9ff0e10340 Reorder location and setting of BUILDLINK_PACKAGES to match template
buildlink3.mk file in revision 1.101 of bsd.buildlink3.mk.
2004-03-05 19:25:06 +00:00
minskim
b2f1469a63 Update gss to 0.0.10.
Changes since 0.0.6:
  - A command line tool "gss" added in src/.
  - gss_display_status can return multiple description texts (using context).
  - The Swedish translation has been updated.
  - Various cleanups and improvements.
  - Implemented gss_export_name and gss_krb5_inquire_cred_by_mech.
    The Kerberos 5 backend also support them.
  - gss_inquire_cred support default credentials.
  - Kerberos 5 gss_canonicalize_name now support all mandatory name types.
  - Kerberos 5 gss_accept_sec_context now support sub-session keys in AP-REQ.
  - Added new extended function API: gss_userok.
  - API documentation in HTML format from GTK-DOC included in doc/reference/.
  - Moved all backend specific code into sub-directories of lib/.
  - The gss_duplicate_name function now allocate the output result properly.
  - Man pages for all public functions are included.
  - Documentation fixes.  For example, all official APIs are now documented.
  - Fixed typo that broke gss_wrap for 3DES with Kerberos 5.
  - Improvements to build environment.
  - Autoconf 2.59, Automake 1.8 beta, Libtool CVS used.
2004-03-04 18:54:41 +00:00
simonb
2deb3b6da5 Update to priv-1.0-beta2.
Changes from previous version are:

 + Fix a single byte buffer overflow.  Can only be a NUL byte that
   overflows, not believed (at this stage!) to be exploitable in any
   way.
 + Avoid null-pointer dereference if getpwuid(getuid()) fails.
2004-03-04 02:57:00 +00:00
minskim
1ed4d35a43 Update opencdk to 0.5.4.
Changes since 0.5.3:
  * Added versioned symbols.
2004-03-03 04:00:32 +00:00
wiz
5b42d2b843 Make build on m68kelf, and honour M68060 variable for quite a bit
of speedup on m68060 machines.
From S.P. Zeidler in PR 24579.
2004-03-01 19:12:25 +00:00
jmmv
5adcfa1afb Bump PKGREVISION due to libtasn1 and gnutls updates. 2004-03-01 15:19:41 +00:00
jmmv
640581be59 Update to 1.0.8. Changes since 1.0.6:
Version 1.0.8 (28/02/2004)
- Corrected bug in mutual certificate authentication in SSL 3.0.
- Several other minor bugfixes.

Version 1.0.7 (25/02/2004)
- Implemented TLS 1.1 (and also obsoleted the TLS 1.0 CBC protection hack).
- Some updates in the documentation.
2004-03-01 15:14:45 +00:00
jmmv
e8f5ff2654 Update to 0.2.7:
- Added versioned symbols.
2004-03-01 15:12:10 +00:00
cube
a2711fedac Enable and note addition of srm version 1.2.8. 2004-03-01 09:45:31 +00:00
cube
24dcecdd5f Initial import of srm, version 1.2.8 into the NetBSD Package Collection,
by request on regional-fr.

Srm is a secure replacement for rm(1).  Unlike the standard rm, it overwrites
the data in the target files before unlinkg them.  This prevents command-line
recovery of the data by examining the raw block device.  It may also help
frustrate physical examination of the disk, although it's unlikely that
completely protects against this type of recovery.

Srm uses algorithms found in _Secure Deletion of Data from Magnetic and
Solid-State Memory_ by Peter Gutmann and THC Secure Delete (the overwrite,
truncate, rename, unlink sequence).

All users, but especially Linux users, should be aware that srm will only
work on file systems that overwrite blocks in place.  In particular, it will
_NOT_ work on resiserfs or the vast majority of journaled file systems.  It
should work on ext2, FAT-based file systems, and the BSD native file system.
Ext3 users should be especially careful as it can be set to journal data as
well, which is an obvious route to reconstructing information.
2004-03-01 09:43:06 +00:00
grant
1fa7a034f2 include mk/compiler.mk before testing ${CC} 2004-02-29 00:36:45 +00:00
taca
90dc08bf79 MAINTAINER should be tech-pkg@NetBSD.org instead of packages@netbsd.org. 2004-02-28 15:29:20 +00:00
itojun
22cfcba886 add ike-scan 2004-02-27 22:14:10 +00:00
itojun
923a884c64 ike-scan, IKE fingerprinting tool
---
ike-scan discovers IKE hosts and can also fingerprint them using the
retransmission backoff pattern.

ike-scan does two things:

a) Discovery: Determine which hosts are running IKE.
   This is done by displaying those hosts which respond to the IKE requests
   sent by ike-scan.

b) Fingerprinting: Determine which IKE implementation the hosts are using.
   This is done by recording the times of the IKE response packets from the
   target hosts and comparing the observed retransmission backoff pattern
   against known patterns.

The retransmission backoff fingerprinting concept is discussed in more
detail in the UDP backoff fingerprinting paper which should be included
in the ike-scan kit as udp-backoff-fingerprinting-paper.txt.

The program sends IKE main mode requests to the specified hosts and displays
any responses that are received.  It handles retry and retransmission with
backoff to cope with packet loss.  It also limits the amount of bandwidth
used by the outbound IKE packets.
2004-02-27 22:12:51 +00:00
markd
dd05c8383d USE_LANGUAGES= c c++. 2004-02-25 22:16:23 +00:00
minskim
fe66015eda Regen. Noted by jmmv@. 2004-02-25 21:53:17 +00:00
minskim
e073097bd3 Not used any more. 2004-02-25 19:19:45 +00:00
minskim
9f9cc8dd13 bl3ify and add explicit dependency on pkgconfig. 2004-02-25 19:15:44 +00:00
minskim
a734b80220 Not used any more. 2004-02-25 19:05:09 +00:00
heinz
133c0cfe89 Enable p5-Crypt-CAST5_PP 2004-02-25 19:00:16 +00:00
minskim
8131e4341f Not used any more. 2004-02-25 18:42:12 +00:00
minskim
2333b63720 Enable pkgviews installation. 2004-02-25 18:20:06 +00:00
minskim
3976305efb Not used any more. 2004-02-25 18:16:28 +00:00
minskim
62b096c9c5 Bump BUILDLINK_DEPENDS due to library major bump. 2004-02-25 18:10:49 +00:00
minskim
6d3ec2b779 Update libksba to 0.9.4.
Changes since 0.9.1:
 * Support for Extended Key Usage.
 * ksba_cms_identify may no return a pseudo content type for pkcs#12
   files.
 * Cleaned up the DN label table.
 * Fixed a bug in creating CMS signed data.
 * Interface changes:
	ksba_reader_clear             NEW.
	ksba_cert_get_ext_key_usages  NEW.
	KSBA_CT_PKCS12                NEW.
2004-02-25 18:08:27 +00:00
minskim
f5e93c14ab Bump PKGREVISION due to the update of libgcrypt. 2004-02-25 15:53:17 +00:00
minskim
51c6cdfa83 Update libgcrypt to 1.1.92.
Changes since 1.1.90:
  - Included a limited implementation of RFC2268.
  - Changed API of the gcry_ac_ functions.
  - Code cleanups and minor bug fixes.
  - Interface changes:
	GCRY_CIPHER_RFC2268_40          NEW.
	gcry_ac_data_set                CHANGED: New argument FLAGS.
	gcry_ac_data_get_name           CHANGED: New argument FLAGS.
	gcry_ac_data_get_index          CHANGED: New argument FLAGS.
	cry_ac_key_pair_generate        CHANGED: New and reordered arguments.
	gcry_ac_key_test                CHANGED: New argument HANDLE.
	gcry_ac_key_get_nbits           CHANGED: New argument HANDLE.
	gcry_ac_key_get_grip            CHANGED: New argument HANDLE.
	gcry_ac_data_search             REMOVED.
	gcry_ac_data_add                REMOVED.
	GCRY_AC_DATA_FLAG_NO_BLINDING   REMOVED.
	GCRY_AC_FLAG_NO_BLINDING        NEW: Replaces above.
2004-02-25 15:51:51 +00:00
minskim
dad37e7733 Not used any more. 2004-02-25 15:14:10 +00:00
minskim
cc086e4525 Enable pkgviews installation. While here, update the MAINTAINER email
address.
2004-02-25 15:02:26 +00:00
schmonz
da3bb84f21 Respect CFLAGS and LDFLAGS. Fixes the case where the preferred
OpenSSL is in ${LOCALBASE} (e.g., PREFER_PKGSRC=openssl), as found
in Krister's bulk build. From jlam.
2004-02-25 05:02:26 +00:00
heinz
9c6e4c8dfd Initial import of Crypt::CAST5_PP.
This is a pure Perl implementation of the CAST5 block cipher.
2004-02-25 00:25:02 +00:00
heinz
10285633ff Adapted to buildlink3.
Taking maintainership.
Needs Math-Pari>=2.001804 and Crypt-Random>=0.33 according to Makefile.PL.
2004-02-24 23:34:59 +00:00
heinz
949cd7ac0e Added HOMEPAGE and adapted to buildlink3. 2004-02-24 23:09:42 +00:00
heinz
d6f12dd7fe Updated to version 1.50.
Taking maintainership.
Adapted to buildlink3.
Shut up warnings during test with patch-aa.
Updated version requirements according to Makefile.PL.

Changes sinces 1.47
===================
  * In ::Key::generate() calls to ::Key::Private::write() and
    ::Key::Public::write() have been fixed.  Thanks to
    Lars Rehe <rehe@mail.desy.de> for pointing out this bug.
  * Fixed some documentation typos.
  * POD documentation for ::Key::[Private|Public].
2004-02-24 23:05:08 +00:00
heinz
36b363fc00 Added HOMEPAGE and adapted to buildlink3. 2004-02-24 22:29:40 +00:00
heinz
6616df21df Taking maintainership.
Adapted to buildlink3.
2004-02-24 22:26:28 +00:00
grant
681e8c7629 this package doesn't use a compiler, so USE_LANGUAGES= # empty 2004-02-24 13:49:29 +00:00
schmonz
6fa6ffa1d4 MASTER_SITES and HOMEPAGE are the same URL. 2004-02-23 17:54:36 +00:00
wiz
8c8f18c61c Let the rc.d script start kdc detached, as is the default for
the in-tree kdc.
From Jukka Salmi in PR 24489, ok'd by lukem@.
Bump PKGREVISION to 1.
2004-02-23 12:35:11 +00:00
kristerw
9b0b0b3499 This package uses X11 includes/libraries, so USE_X11 must be "yes" for
it to build.
2004-02-23 03:51:47 +00:00
xtraeme
2398988a97 bl3ify and use zlib's buildlink3 instead of using DEPENDS. 2004-02-23 00:33:42 +00:00
heinz
a8b41c8ee5 Updated to version 0.50.
Taking maintainership.
Adapted to buildlink3.

Changes sinces 0.49
===================
    * Patch by Dave Paris to fix a limit problem in trialdiv().
2004-02-22 22:24:38 +00:00
heinz
38aae207e2 Updated to version 1.13.
Taking maintainership.

Adapted to buildlink3.

Changes sinces 1.11
===================
  * Changed the die() message at provider contruction to include the
    name of the provider.
  * Updated documentation.
2004-02-22 22:18:10 +00:00
jlam
ff818c5bea bl3ify 2004-02-22 19:30:52 +00:00
heinz
c8a5dfddcc Updated to version 1.02.
Taking maintainership.
Adapted to buildlink3.

Changes sinces 1.01
===================

Patch-ab has been incorparated into the distribution.
2004-02-22 17:07:18 +00:00
heinz
2979df3140 Updated to version 2.08
Taking maintainership.
Needs p5-Crypt-Rijndael for running the tests.
Adapted to buildlink3.

Changes sinces 2.02
===================
  -Bug fix from Chris Laas to fix custom padding
  -Bug fixes from Stephen Waters to fix space padding
  -Lots of regression tests from Stephen Waters
  -Makes zero-and-one padding compatible with Crypt::Rijndael::MODE_CBC.
  -Lots of improvements to padding mechanisms from Stephen Waters
  -Patch from Andy Turner <turner@mikomi.org> to allow backward
   compatibility with old versions when key length exceeded max.
2004-02-22 16:54:56 +00:00
markd
59215063a5 configure looks for and finds -ltermcap too late in the process for it to
be linked in when testing -lreadline usability so that test fails on
Solaris - so pass that lib into configure at the start via the environment.

Also allow optional use of db4 rather that db.
2004-02-22 11:59:50 +00:00
schmonz
5d9e0bc2e4 Since this package provides a static-only library, specify only a
build-time dependency in buildlink3.mk. Also, buildlink3 and the
new compiler framework obviate the need for fooling around with
${CC}. From jlam.
2004-02-22 04:01:57 +00:00
schmonz
021b7a8ab2 Add and enable libtcpa. 2004-02-22 01:42:27 +00:00
schmonz
a34744d49c Initial import of libtcpa-1.1b, a library and example programs for
the TCPA chip described in IBM Global Security Analysis Lab's
article "Take Control of TCPA" in the August 2003 issue of Linux
Journal.

For this package to be useful, you need a computer with a TCPA
chip, and support for the chip in your kernel. An unofficial NetBSD
TCPA driver and instructions can be found here:

http://www.citi.umich.edu/u/rwash/projects/trusted/netbsd.html

I don't have a TCPA chip with which to verify the functionality of
this package.

Thanks to Soren Jacobsen for bringing me up to speed on modern
pkgsrc conventions, and to Rick Wash for his recent presentation
at my local ACM chapter on TCPA and "Trusted Computing".
2004-02-22 01:40:04 +00:00
grant
7844fee7eb replace inappropriate use of _OPSYS_RPATH_NAME with RPATH_FLAG and
make sure that this argument precedes -lX11.
2004-02-21 13:55:01 +00:00
xtraeme
86968c5a85 Depend on zlib if we are using IRIX. Reported by Georg Schwarz in
PR pkg/24423.
2004-02-21 06:30:05 +00:00
xtraeme
974c5dc7ce Force manual pages installation, because some systems like IRIX will
install them like preformatted manual pages (cat).
Reported by Georg Schwarz in PR pkg/24428.
2004-02-21 06:26:41 +00:00
jmmv
d4927f73a9 bl3ify and use pkgsrc intltool. 2004-02-20 13:08:21 +00:00
jlam
2c91794666 If we're using the LDAP authentication backend, we pull in <sasl/sasl.h>,
so include cyrus-sasl2/buildlink3.mk to get it.
2004-02-19 07:11:16 +00:00
minskim
7238d3685d Add and enable py-OpenSSL. 2004-02-19 01:20:27 +00:00
minskim
4507c45f6d Import py-OpenSSL from pkgsrc-wip. Packaged by mjasm at users dot
sourceforge dot net, cleaned by cjep@, and modified by me.

pyOpenSSL is a Python module that is a rather think wrapper around (a
subset of) the OpenSSL library.  A lot of the object methods do
nothing more than call a corresponding function in the OpenSSL
library.
2004-02-19 01:18:52 +00:00
heinz
842e2c007e Convert to buildlink3.
Update to version 0.21.

Changes since 0.19:

0.21  Sun Feb 15 2004 21:13:45
        - Include t/format.t in the MANIFEST file, so that it is
          actually included in the distribution.

0.20  Sun Feb 15 2004 15:21:40
        - Finally add support for the public key format produced by
          "openssl rsa -pubout".
        - Add comment in readme about locating kerberos files on redhat systems
2004-02-18 21:57:35 +00:00
jlam
bf6e059da4 Reorder some lines so that BUILDLINK_USE_BUILTIN.<pkg> set in the
environment overrides all other settings.
2004-02-18 16:35:27 +00:00
minskim
530953a61b Add and enable chkrootkit. 2004-02-17 15:36:06 +00:00
minskim
eaeeb8f539 Import chkrootkit from pkgsrc-wip. Packaged by Adrian Portelli and
modified by me.

chkrootkit is a tool to locally check for signs of a rootkit.  It
contains:

 * chkrootkit: a shell script that checks system binaries for
   rootkit modification.
 * ifpromisc.c: checks if the network interface is in promiscuous
   mode.
 * chklastlog.c: checks for lastlog deletions.
 * chkwtmp.c: checks for wtmp deletions.
 * check_wtmpx.c: checks for wtmpx deletions.  (Solaris only)
 * chkproc.c: checks for signs of LKM trojans.
 * chkdirs.c: checks for signs of LKM trojans.
 * strings.c: quick and dirty strings replacement.
2004-02-17 15:33:52 +00:00
jlam
2c8d533a36 Don't use sysctl to determine the machine arch when ${MACHINE_ARCH} already
has the correct value.  Fixes build on NetBSD-1.5.3/sparc, which doesn't
understand "sysctl hw.machine_arch", reported in PR 24448.
2004-02-17 14:26:47 +00:00
jlam
e44579ded5 We no longer need to set GNU_MISSING_OVERRIDE after the changes in revision
1.27 of tools.mk to hide the auto* tools between pre-configure and
do-configure.
2004-02-17 12:13:07 +00:00
chris
631e1cc0e8 Update gpgme to 0.3.16.
Only minor changes since last release:

2003-11-19  Werner Koch  <wk@gnupg.org>

        Released 0.3.16.

        * configure.ac: Bump LT revision to C9/A3/R7.

2003-11-18  Werner Koch  <wk@gnupg.org>

        * configure.ac: Check for timegm.
2004-02-17 01:52:31 +00:00
martti
00a9eb792d Updated stunnel to 4.05
* New feature sponsored by SURFnet http://www.surfnet.nl/
  - Support for CIFS aka SMB protocol SSL negotiation.
* New features
  - CRL support with new CApath and CAfile global options.
  - New 'taskbar' option on WIN32 (thx to Ken Mattsen
    <ken.Mattsen@roxio.com>).
  - New -fd command line parameter to read configuration
    from a specified file descriptor instead of a file.
  - accept is reported as error with [section] defined (in
    stunnel 4.04 it was silently ignored causing problems
    for lusers that did not read the fine manual).
  - Use fcntl() instead of ioctlsocket() to set socket
    nonblocking when it is supported.
  - Basic support for hardware engines with OpenSSL >= 0.9.7.
  - French manual by Bernard Choppy <choppy@imaginet.fr>.
  - Thread stack size reduced to 64KB for maximum scalability.
  - Added optional code to debug thread stack usage.
  - Support for nsr-tandem-nsk (thx to Tom Bates <tom.bates@hp.com>).
* Bugfixes
  - TCP wrappers code moved to CRIT_NTOA critical section
    since it uses static inet_ntoa() result buffer.
  - SSL_ERROR_SYSCALL handling problems fixed.
  - added code to retry nonblocking SSL_shutdown() calls.
  - Use FD_SETSIZE instead of 16 file descriptors in inetd
    mode.
  - fdscanf groks lowercase protocol negotiation commands.
  - WIN32 taskbar GDI objects leak fixed.
  - Libwrap detection bug in ./configure script fixed.
  - grp.h header detection fixed for NetBSD and possibly
    other systems.
  - Some other minor updates.
2004-02-16 11:48:38 +00:00
grant
1954268133 USE_GNU_TOOLS should be appended to with += 2004-02-14 22:41:17 +00:00
minskim
3b1bc1ff87 bl3ify 2004-02-14 18:45:25 +00:00
jmmv
ab17dd00b3 PKGCONFIG_OVERRIDE is relative to WRKSRC. 2004-02-14 18:26:26 +00:00
jlam
3ebe053d90 LIBTOOL_OVERRIDE and SHLIBTOOL_OVERRIDE are now lists of shell globs
relative to ${WRKSRC}.  Remove redundant LIBTOOL_OVERRIDE settings that
are automatically handled by the default setting in bsd.pkg.mk.
2004-02-14 17:21:49 +00:00
uebayasi
09dda46dcf USE_GMAKE=yes -> USE_GNU_TOOLS=make 2004-02-14 15:10:27 +00:00
minskim
e6e77cdca0 This package needs python>=2.3. 2004-02-14 15:00:37 +00:00
jlam
2b41236203 Add a note to cyrus-sasl2/Makefile.common about which package Makefiles
include it.  This is a reminder to anyone who updates cyrus-sasl2 to also
touch the other packages.

Update the cy2-*/PLIST files to have the correct module version numbers.
2004-02-14 14:43:51 +00:00
wiz
eeb4a8a94f Update to 1.24:
2003-10-29 David A. Wheeler
        * Fixed an incredibly obscure parsing error that caused some
          false positives.  If a constant C string, after the closing
          double-quote, is followed by a \ and newline (instead of a comma),
          the string might not be recognized as a constant string
          (thus triggering warnings about non-constant values in some cases).
          This kind of formatting is quite ugly and rare.
          My thanks to Sascha Nitsch (sascha, at spsn.ath.cx) for pointing
          this bug out and giving me a test case to work with.
        * Added a warning for readlink.  The implementation and warning
          are mine, but the idea of warning about readlink came from
           Stefan Kost (kost, at imn.htwk-leipzig.de).  Thanks!!

2003-09-27 David A. Wheeler
        * Released version 1.23.  Minor bugfixes.

2003-09-27 David A. Wheeler
        * Fixed subtle bug - in some circumstances single character constants
          wouldn't be parsed correctly.  My thanks to Scott Renfro
          <scottdonotspam, at renfro.org> for notifying me about this bug.
          Scott Renfro also sent me a patch; I didn't use it
          (the patch didn't handle other cases), but I'm grateful since it
          illustrated the problem.
        * Fixed documentation bug in man page.
          The option "--minlevel=X" must be preceded by two dashes,
          as are all GNU-style long options. The man page accidentally only
          had one dash in the summary (it was correct elsewhere); it now
          correctly shows both dashes.
        * Modified man page to list filename extensions that are
          interpreted as C/C++.
        * Removed index.html from distribution - it's really only for the
          website.
2004-02-14 14:21:17 +00:00
jlam
19e040b6dc CONFIG_STATUS_OVERRIDE is the default in bsd.pkg.mk, so no need for these
definitions here.
2004-02-14 13:55:19 +00:00
jlam
450a4245ea Remove unused patch. 2004-02-14 07:51:36 +00:00
jlam
8f70d2adc2 Don't try to link GSSAPI module staticly if we're using shared libs.
Fixes undefined symbols on linking other software against libsasl2.
Bump PKGREVISION.
2004-02-14 07:45:36 +00:00
jlam
276769e2ea Update security/cyrus-sasl2 to 2.1.17. Changes from version 2.1.15 include:
* Now correctly do authorizaton callback in sasl_checkpass()
* Writable auxprop support
* Significantly improved documentation
2004-02-14 03:16:58 +00:00
grant
52f1b46a37 remove unneeded CONFIG_{GUESS,SUB}_OVERRIDE, as bsd.pkg.mk does this
automatically now.
2004-02-14 00:54:44 +00:00
sekiya
1d220f5614 Yet another mipseb config.guess/config.sub override. 2004-02-13 13:09:43 +00:00
jlam
66b3f4ee74 PKGSHLIBTOOL has been removed from pkgsrc; we're supposed to use
${SHLIBTOOL} instead.
2004-02-12 13:40:42 +00:00
jlam
0cbd511107 Remove hidden dependency on autoconf by using GNU_MISSING_OVERRIDE. Also,
PKGSHLIBTOOL has been removed from pkgsrc and we're supposed to use
${SHLIBTOOL} instead.
2004-02-12 13:34:29 +00:00
jlam
fea0c77b1f We only conflict with cyrus-sasl<2.1.15nb2, which was the first version
of cyrus-sasl2 after spliiting out the saslauthd into a separate package.
2004-02-12 13:10:31 +00:00
jlam
2ee656decf s/_BUILTIN_OPENSSL/BUILDLINK_IS_BUILTIN.openssl/g 2004-02-12 09:38:43 +00:00
jlam
d2b62c66fb Create a new variable PREFER_NATIVE that has the opposite semantics
as PREFER_PKGSRC.  Preferences are determined by the most specific
instance of the package in either PREFER_PKGSRC or PREFER_NATIVE.  If
a package is specified in neither or in both variables, then PREFER_PKGSRC
has precedence over PREFER_NATIVE.
2004-02-12 02:35:06 +00:00
jlam
1edfa505ed Reorganize code so that any dependencies are checked as part of deciding
whether the software is built-in or not.  This facilitates implementing
the forthcoming PKGSRC_NATIVE variable.
2004-02-12 01:59:37 +00:00
xtraeme
5bcb5c6c73 bl3ify 2004-02-11 02:30:49 +00:00
minskim
ed7a48d587 Add and enable py-gnutls. 2004-02-10 19:34:14 +00:00
minskim
b59c2f90ca Import py-gnutls from pkgsrc-wip.
Python bindings for GNUTLS.

GnuTLS is a project that aims to develop a library which provides a
secure layer, over a reliable transport layer.  Currently the GnuTLS
library implements the proposed standards by the IETF's TLS working
group.
2004-02-10 19:32:26 +00:00
ben
57c2879a3b Update fprot-workstation-bin to version 4.3.3. 2004-02-10 14:21:38 +00:00
jlam
a002208c66 buildlink3.mk files for libidn and libksba. 2004-02-10 10:22:03 +00:00
grant
c228e99594 include <sys/types.h> before <sys/socket.h>, allowing this to build
on IRIX 5.3.

fixes second part of PR pkg/24375 from Georg Schwarz.
2004-02-10 09:17:22 +00:00
grant
d25b85d351 fix build on IRIX by using the right Makefile target, which contains
only the major part of OS_VERSION.

fixes part of PR pkg/24375 from Georg Schwarz.
2004-02-10 09:06:55 +00:00
minskim
c4b77c9bac Add missing gettext-lib/buildlink2.mk. 2004-02-10 05:31:48 +00:00
jlam
d50278d275 buildlink3.mk file for security/gnutls (used by mail/dovecot). 2004-02-10 00:21:28 +00:00
jlam
42055451ff bl3ify 2004-02-10 00:20:29 +00:00
jlam
085085fe75 bl3ify, and bump the PKGREVISION due to gss dependency update. 2004-02-10 00:17:51 +00:00
jlam
dc5c2bf22a Bump DEPENDS after PKGREVISION update due to header file change. 2004-02-10 00:17:29 +00:00
jlam
736a1099f7 bl3ify and bump the PKGREVISION after removing <gss/krb5.h> (which isn't
installed) from the gss.h header.
2004-02-10 00:14:41 +00:00
jlam
38afafca59 bl3ify and remove libiconv and gettext-lib buildlink files. This package
really only needs gettext-lib through libgpg-error, and doesn't need
libiconv at all unless it uses the pkgsrc gettext-lib.  The gettext-lib
buildlink3.mk file combined with the buildlink3 framework is considerably
better at detecting this than the buildlink2.mk, which broke in a lot of
instances.
2004-02-10 00:13:24 +00:00
jlam
bbdd151ce7 BUILDLINK_DEPENDS.<pkg> lines should _always_ use += to _append_ to the
existing value.  This is critical to set the correct list of dependencies
for a package.
2004-02-09 23:56:32 +00:00
jlam
52cda80f7d bl3ify 2004-02-09 20:25:09 +00:00
jmmv
bad3afef71 Bump PKGREVISION due to gnome-vfs2 update (fam readded as a dependancy). 2004-02-09 18:47:36 +00:00
wennmach
cbbc35eccf Pull in value of KRB4_PREFIX_CMDS from KERBEROS_PREFIX_CMDS.
This provides both, simple and fine-grained control over the Kerberos
prefix. If not specified, KRB4_PREFIX_CMDS will default to the value
of KERBEROS_PREFIX_CMDS. If specified, it overrides KERBEROS_PREFIX_CMDS.
2004-02-09 17:36:37 +00:00
wennmach
e3b0c42311 Do not install bin/ftp (this will overwrite the ftp installed as part
of bootstrap-pkgsrc).

ftp is now always installed as bin/k4ftp. In addition, if the variable
KRB4_PREFIX_CMDS is set to YES, rcp, rlogin, rsh, su, and telnet will
be installed with a "k4" prefix.

This has been achieved by stealing the transform code from security/heimdal
and by tayloring it a bit.

Closes PR pkg/24354 by Tracy Di Marco White.
2004-02-09 12:54:31 +00:00
jlam
56a6d12f07 Update security/audit-packages to 1.29. Changes from version 1.28 include
supporting using the FreeBSD "fetch" command to get the vulnerabilities
list.  Patch provided in PR 24371 by Michal Pasternak.
2004-02-09 03:56:34 +00:00
grant
f4f20e65a0 move CFLAGS and LD_LIBS to pkgsrc Makefile and clean up install
targets so platforms other than *BSD have a chance of building.

install /etc/TIMEZONE on Solaris.

XXX this package still needs more work to be useful on Solaris
and other platforms.
2004-02-08 14:27:35 +00:00
grant
f14d46ec5c link against socket libs on Solaris. 2004-02-08 13:44:12 +00:00
grant
fe16309cfe don't override variables which pkgsrc already sets in MAKE_ENV.
fixes build on Solaris.
2004-02-08 13:36:20 +00:00
jlam
75f431d969 PKGLIBTOOL and PKGSHLIBTOOL are no more. 2004-02-08 03:00:29 +00:00
kleink
8213a84c9d Install doc/DETAILS, which conveniently documents --with-colon formatted
output, among other things.  Bump to 1.2.4nb1.

Approved by Thomas Klausner.
2004-02-08 01:00:13 +00:00
jlam
53f75c6830 Don't set LD=${CC} globally, but only pass it to CONFIGURE_ENV, which is
the only relevant place that wants it.
2004-02-07 23:58:49 +00:00
cube
e67cfd2737 Remove forgotten patch from last commit (what it did is now in patch-ac).
Pointed out by wiz@.
2004-02-07 10:52:08 +00:00
jlam
7699290f10 If we're passing through MAKEFLAGS variables whose values may contain
spaces, use the :Q modifier instead of double-quoting the value.  This
avoids breakage when executing the just-in-time su targets.
2004-02-06 19:04:24 +00:00
jlam
317cc72791 Make PREFER_PKGSRC just yes/no or a list of packages. This makes it
simpler to understand.
2004-02-05 07:17:14 +00:00
jlam
e7133cac25 Rename BUILDLINK_PREFER_PKGSRC to PREFER_PKGSRC so that we can use its
value outside of buildlink-related files.
2004-02-05 07:06:15 +00:00
jlam
07a9d8dfb2 Support a new global variable:
BUILDLINK_PREFER_PKGSRC
	This variable determines whether or not to prefer the pkgsrc
	versions of software that is also present in the base system.

	This variable is multi-state:
		defined, or "yes"	always prefer the pkgsrc versions
		not defined, or "no"	only use the pkgsrc versions if
					needed by dependency requirements

	This can also take a list of packages for which to prefer the
	pkgsrc-installed software.  The package names may be found by
	consulting the value added to BUILDLINK_PACKAGES in the
	buildlink[23].mk files for that package.
2004-02-05 06:58:02 +00:00
grant
c3c063f95d this needs libintl, so explicitly include gettext-lib/buildlink2.mk. 2004-02-05 00:09:51 +00:00
fredb
8ffb30621b Regen. 2004-02-04 19:17:44 +00:00
fredb
ea06e1992a Remove extra, asymetric context from last hunk; it was confusing GNU patch.
Problem pointed out by Georg Schwarz on tech-pkg.
2004-02-04 19:02:43 +00:00
xtraeme
3ddd319e00 Respect whitespaces in SUBST_SED.fixme. 2004-02-02 23:47:15 +00:00
xtraeme
1d4270a631 Fix build in FreeBSD, the output was:
_mpih-mul1.s:2: Error: alignment not a power of 2
_mpih-mul1.s:20: Error: alignment not a power of 2

So, changing ALIGN (3) to ALIGN (4) fixes these problems.
Patch sent by pancake in private email, adapted to use subst.mk
framework by me.
2004-02-02 23:41:32 +00:00
jlam
3d74ada992 Pretend that all versions of NetBSD newer than 1.6U have Heimdal-0.6. 2004-02-02 11:30:45 +00:00
wiz
2ffaf7ba0f Update to 4.3.2:
Version 4.3.2 contains various bugfixes and improvements to the documentation
and software.

o       Minor modifications to the check-updates.pl script.
o       A libmilter plugin for the Mail Scanner added.
o       A qmail plugin for the Mail Scanner added.
o       Improved mime handling.
o       Various features added to scan-mail.pl.
o       Minor improvements in mime handling.
2004-02-02 04:10:04 +00:00
jlam
3ac2d4b8aa In the new compiler selection framework, GCC_REQD is appended to, not
overridden.
2004-02-01 01:43:28 +00:00
snj
206a030cb0 s/seperated/separated/ 2004-02-01 00:11:13 +00:00
snj
5882c43f22 USE_PKGINSTALL instead of including bsd.pkg.install.mk and get rid of
an extra blank line.

Okayed by jmmv.
2004-01-31 21:12:23 +00:00
jlam
22aa620838 Ensure that -lcrypt appears before -lcrypto on the command line so that
the system crypt(), which is considerably smarter than the OpenSSL crypt(),
is used.
2004-01-30 10:59:14 +00:00
grant
b82d93c996 bl3ify; fixes build on Solaris with SunPro. 2004-01-28 11:35:00 +00:00
grant
b00b09f079 no need to include perl5/buildlink2.mk, in fact, it breaks
USE_PERL5=build.
2004-01-28 02:52:43 +00:00
heinz
18a916d5e6 Use $FIND with "-print". Noted by Georg Schwarz in PR pkg/24248 2004-01-27 00:53:10 +00:00
taca
510272cbc2 Fix build problem with gcc 3.X. 2004-01-26 11:16:11 +00:00
kleink
65e1df96ec Make ksba-config --libs emit the runtime linker search path.
Welcome nb1.
2004-01-25 22:29:50 +00:00
wiz
9418e15514 Fix two typos. 2004-01-25 11:02:13 +00:00
kleink
7bab5a4b1f Make the dependency on 0.4.7 explicit. 2004-01-25 01:08:28 +00:00
kleink
8ced7b4c17 In COMMENT, refer to the 0.4.x branch of ksba. 2004-01-25 00:49:39 +00:00
kleink
5ee79016e8 Descend into libksba04. 2004-01-25 00:48:22 +00:00
kleink
6bd72b8d76 Initial import of libksba-0.4.7.
KSBA is a library to make the taks of working with X.509 certifictes,
CMS data and related data more easy.
2004-01-25 00:46:34 +00:00
kleink
7fdc20ae6a Descend into libksba. 2004-01-25 00:16:21 +00:00
kleink
11283663f4 Initial import of libksba-0.9.1.
KSBA is a library to make the taks of working with X.509 certifictes,
CMS data and related data more easy.
2004-01-25 00:14:56 +00:00
grant
a07396feb8 replace deprecated USE_GMAKE with USE_GNU_TOOLS+=make. 2004-01-24 15:00:22 +00:00
jlam
a7d877ca6a Append to BUILDLINK_DEPENDS.<pkg> instead of setting a default value. In
the normal case when BUILDLINK_DEPENDS.<pkg> isn't specified, it receives
a value only once due to the multiple inclusion protection in the
bulldlink3.mk files.  In the case where a package includes several
buildlink3.mk files that each want a slightly different version of another
dependency, having BUILDLINK_DEPENDS.<pkg> be a list allows for the
strictest <pkg> dependency to be matched.
2004-01-24 03:26:45 +00:00
jlam
01a5abff01 Support BUILDLINK_DEPENDS.<pkg> being a list of values. 2004-01-24 03:12:31 +00:00
kristerw
96eb31c77a Correct a minor mistake in previous commit, to actually get it
to compile on NetBSD 1.6.
2004-01-23 23:45:55 +00:00
recht
09b598ed06 Fix build on NetBSD 1.6 where O_NOFOLLOW isn't available.
Noted by Krister Walfridsson.
2004-01-23 23:30:10 +00:00
jmmv
a58dd81611 Bump PKGREVISION due to xmlcatmgr update to 2.0beta1. I know; this is a PITA.
This shouldn't be needed if we had non-recursive dependancies *sigh*.
2004-01-23 21:50:42 +00:00
recht
dccd787bd2 add destroy 2004-01-23 18:18:15 +00:00
recht
b1d1e20c4f initial import of destroy-20030307
sent to me by the author Shane Kinney

A system utility that destroys files on the hard drive
by writing null and random bytes to the file over and over.
2004-01-23 18:11:29 +00:00
taca
f2b4d11a7f Update pgpdump pacakge to 0.22.
0.22 2004/01/23

* parse_subpacket() are split into parse_signature_subpacket() and
  parse_userattr_subpacket(). A bug of length calculation is fixed.
* The critical bit of the signature subpackets are supported.
	Peter Palfrader <peter@palfrader.org>

0.21 2004/01/13

* Removing compiler warnings.
* Using getopt().
* Supporting RISC OS.
	Stefan Bellon <sbellon@sbellon.de>
* Correct casting for Bzip2.
	Stefan Bellon <sbellon@sbellon.de>
* Prepared os/riscos/{config.h,Makefile} since "sh" does not exist on
  RISC OS.
	Stefan Bellon <sbellon@sbellon.de>
2004-01-23 14:49:35 +00:00
agc
d9c1f58592 Master site has moved to sourceforge. 2004-01-22 10:11:49 +00:00
agc
d731127ea2 Update portsentry from 1.0 to 1.2.
Major changes from previous version:

	Master site has moved to sourceforge
	Licence has changed to a GPL-like licence

Minor changes from previous version:
12-21-1999 - 1.1 Fixed typo in bare-bones TCP list where 524 was supposed to be for 1524.
03-31-2000 - 1.1 Updated .conf to add ipf blocking rule. Thanks Graham Dunn
<gdunn@inscriber.com>
06-08-2000 - 1.1 Fixed an error in the state engine portion that could cause an increment error
under certain conditions. Thanks Peter M. Allan <peter.m.allan@hsbcgroup.com> for finding this.
6-21-2000 - 1.1 New Features added
                - Added in feature to disable DNS host resolution by checking RESOLVE_HOST in
                conf file.
                - Added in feature to have external command run before or after blocking has
                occurred as defined in KILL_RUN_CMD_FIRST option in conf file.
                - Removed DoBlockTCP/UDP functions. Converted over to generic flag checker.
7-5-2000 - 1.1
                - Added iptables support (thanks Scott Catterton <scatterton@valinux.com>)
                - Added Makefile support for Irix
                - Put in ports for common DDOS ports
9-8-2000 - 1.1  - Added in netmask support
9-9-2000 - 1.1  - Finally moved resolver functions to own area.
                - Made CleanAndResolve to ensure DNS records returned are sanitized
                  correctly before being passed back.
3-23-2001 - 1.1 - Fixed a bug that showed up under Linux 2.4 Kernel that would cause accept
to loop. There was an error with how I used a count variable after trying to bind to ports.
If the port didn't bind the count for the openSockfd would still increment and this caused
the error to show up.
6-26-2001 - 1.1 - Added Mac OS X build support (Same as FreeBSD). Fixed bug for Advanced mode
to properly monitor 1024 ports (it only did first 1023 before). Thanks Guido.
05-23-2003 - 1.2 - Removed references to old psionic e-mail and changed license to
Common Public License.

I've also added a fix for a multi-line string constant for gcc3.
2004-01-22 10:08:19 +00:00
jlam
3601a7551c Recognize KERBEROS as a flag that can cause this package to be built using
Kerberos for GSSAPI support.
2004-01-21 14:01:06 +00:00
jlam
998ffbfea9 Convert to use krb5.buildlink3.mk to get Kerberos 5 support. Tested to
build and install properly using Heimdal.
2004-01-21 12:40:17 +00:00
jlam
9351de8505 Remove debugging line accidentally committed in previous. 2004-01-21 12:14:57 +00:00
jlam
b5b7b84c22 Convert to use krb5.buildlink3.mk to get Kerberos 5 support. Tested to
build and install properly using Heimdal.
2004-01-21 12:12:13 +00:00
jlam
0167c3791f Only point SSLCERTS into ${PKG_SYSCONFDIR} if we're not using the built-in
OpenSSL software.  Otherwise, set it to /etc/ssl/certs, which is where a
lot of Linux distros store certs.  The behaviour on NetBSD systems is
unchanged -- always set to /etc/openssl/certs.  Fixes PR 24161.
2004-01-21 10:03:41 +00:00
lukem
4152ee431a crank version for my mods 2004-01-21 04:15:09 +00:00
lukem
6d77a64959 "Collapse" mutual trust into a single line of a different color.
If an optional "mykeyid" is given on the command line, use different
colors for lines to & from that node.  The colors are:
	green		mutual trust, includes mykey
	blue		mutual trust, not mykey
	orange		someone trusts mykey (one way)
	red		mykey trusts someone (one way)
	black		one way trust, not mykey
2004-01-21 04:14:45 +00:00
atatat
39ecc311a5 This simple perl script takes the output of gpg --list-keys --verbose,
which lists all the keys in your public key ring, along with all
their signatures, and converts it to a di-graph in "dot" language
form.

The graphviz package can turn the description into a graph you can
look at to see who has signed whose key, or how far it is from your
key to someone in Reykjavik, etc.
2004-01-21 04:04:55 +00:00
snj
e0220ad330 s/it's/its/ 2004-01-20 22:15:21 +00:00
snj
324a2e6bfe Add lsh (hi drochner!). Okayed by jmmv. 2004-01-20 21:26:13 +00:00
agc
3ad1bdbf06 Move WRKSRC definition away from the first paragraph in a Makefile. 2004-01-20 12:18:15 +00:00
grant
35e1a08546 put the stunnel.pid file in /var/run, not ${PREFIX}/var/run.
bump PKGREVISION.
2004-01-20 03:08:25 +00:00
jlam
a442099d05 This package never invokes the toolchain so it doesn't need buildlink[23].
Define NO_BUILDLINK to signify this to bsd.pkg.mk.
2004-01-19 15:15:08 +00:00
jlam
a6d5f1ebaf Update MASTER_SITES and HOMEPAGE to current locations. 2004-01-17 15:31:02 +00:00
itojun
8fe68eb74f bump to 20040116a. missing ntohs() in info exchange fix. 2004-01-16 02:29:49 +00:00
cube
796b5386cc No patches are needed for that package, except for -current between Sept.,
16th 2003 and Jan., 6th 2004 when <sys/siginfo.h> included <sys/queue.h>
unconditionally.

Rework the patches so that they're used only in that case.
2004-01-15 14:10:51 +00:00
jlam
83532f92f6 Support a new yes/no variable "KERBEROS_PREFIX_CMDS" that can be used by
Kerberos implementation packages to decide whether to prefix certain
commands with a "k" to differentiate it from system tools with similar
names.  KERBEROS_PREFIX_CMDS defaults to "no".
2004-01-15 12:48:00 +00:00
grant
c1ba386ea1 kth-krb4: add CONFLICT on tnftp.
tnftp: add CONFLICT on lukemftp, kth-krb4.
2004-01-15 10:35:49 +00:00
itojun
cb805a8461 upgrade to 2004/1/14 tar.gz. fixes hash validation problem posted to bugtraq. 2004-01-14 09:22:22 +00:00
jlam
5389a1c2c7 This package should try to build samba2 if it needs a samba package
installed.
2004-01-13 20:45:50 +00:00
jlam
2569632971 Bump the version of security/cyrus-saslauthd to 2.1.17nb1: install the
saslcache and testsaslauthd programs that are useful to test and debug
the setup of saslauthd.
2004-01-13 09:03:15 +00:00
jlam
29903eb0aa Move the documentation into share/doc instead of using share/examples. 2004-01-13 08:13:42 +00:00
markd
f8c2eb7eb1 Fix build with gcc3. 2004-01-13 02:05:29 +00:00
jlam
18ec955c8a whitespace. 2004-01-13 00:00:32 +00:00
xtraeme
b4fbdeca7f Update to 1.0.4
Version 1.0.4 (04/01/2004)

- Changed handshake behaviour to send the lowest TLS version
  when an unsupported version was advertized. The current behaviour
  is to send the maximum version we support.
- certtool no longer asks the password in unencrypted private
  keys.
- The source is now compiled to use the reentrant libc functions.
2004-01-12 22:57:38 +00:00
jlam
3685c7774b bl3ify 2004-01-12 15:59:35 +00:00
drochner
94d670332b add a pkg for lsh-1.4.3, an alternative ssh2 client/server 2004-01-12 15:55:11 +00:00
cjep
1b39677b6e Remove unnecessary blank lines. 2004-01-12 09:46:04 +00:00
martti
a73e004fa9 Use correct Makefile.common 2004-01-12 07:59:28 +00:00
martti
6c1f64b114 Use correct Makefile.common 2004-01-12 07:31:52 +00:00
jlam
0ac69be3ed Note conflict with samba>=3.0, which installs its own pam-smbpass. 2004-01-12 04:56:35 +00:00
jlam
63d79814ef Note location of pidfile. 2004-01-12 04:52:34 +00:00
jlam
c4dd17d8b7 Update security/PAM to 0.77nb1:
Actually make this package honor PKG_SYSCONFDIR.  This package now looks
for /usr/pkg/etc/pam.conf if PKG_SYSCONFBASE != "/etc".
2004-01-12 04:31:09 +00:00
jlam
a542b62c6b Substitute for ROOT_USER in the rc.d script. 2004-01-12 04:12:58 +00:00
jlam
bf65a51eb8 Add MAINTAINER, HOMEPAGE, COMMENT. 2004-01-12 03:16:32 +00:00
jschauma
52d6dbeeaa Update to version 0.12, include new homepage and thusly fix problem seen
in agc's last bulk build.

Changes since 0.11:
- ZServerSSL with client certificate-based authentication rides again.
- Created Makefile for Python 2.3.
- Modified LICENCE: changed my name to the generic "the author" in the
all-caps disclaimer paragraph.
- Allow to save RSA key pair in the clear.
- ZServerSSL for Zope 2.7.
- Excluded RC5. IDEA was taken out several releases ago. This should
allow M2Crypto to build with stock OpenSSL on various Linuxen.
- Added ssl_set_tmp_dh_callback.
- Added ssl_set_tmp_rsa and ssl_set_tmp_rsa_callback to support weak-cipher
browsers.
- ZServerSSL exports SSL_CIPHER request header (a la mod_ssl) to Zope applications.
- Perform distutils's SWIG .i search path tweaking within setup.py. setup.py
should now work "out of the box".
- Allow using a passphrase callback in class SMIME. Thanks to Artur Frysiak
<wiget@pld-linux.org> for the patch.
- Added method get0_signers to class PKCS7, which retrieves signers' certificates
from a PKCS7 blob. Thanks again to Artur Frysiak.
- Added contrib/smimeplus.py, a high-level S/MIME interface, contributed by Bernard
Yue <bernie@3captus.com>. Thanks Bernard.
- Alias 'emailAddress' to 'Email' in X509.X509_Name.nid to support recent OpenSSL
convention.
2004-01-11 19:06:46 +00:00
jlam
0e60357705 Fix printing of daemon name if rc.subr isn't there. 2004-01-11 00:38:17 +00:00
jlam
489bc96215 bl3ify 2004-01-11 00:33:03 +00:00
xtraeme
012b8a7d98 s/bonobo-activation/libbonobo/ 2004-01-11 00:32:34 +00:00
jlam
a41e499e44 Note CONFLICT with forthcoming mit-krb5 package. 2004-01-11 00:00:28 +00:00
jlam
99ac5d408b Add a rc.d script to start the kdc daemon on the Kerberos master server. 2004-01-10 21:59:29 +00:00
jlam
c0a16733a6 Back out previous. This doesn't work as expected and needs more thought. 2004-01-10 21:35:26 +00:00
jlam
ca86c17d51 The buildlink3 wrappers automatically remove -I/usr/include/* from the
command line options.  We need -I/usr/include/krb5 to build against
heimdal, so symlink the headers in /usr/include/krb5 into ${BUILDLINK_DIR}
so they can be found.
2004-01-10 19:44:16 +00:00
jlam
3f2f920bfb Add and enable heimdal. 2004-01-10 14:57:21 +00:00
jlam
694ff19aff Initial import of heimdal-0.6 into security/heimdal.
Heimdal is a free implementation of Kerberos 5.

Kerberos is a system for authenticating users and services on a network.
It is built upon the assumption that the network is "unsafe".  Kerberos
is a trusted third-party service.  That means that there is a third
party (the Kerberos server) that is trusted by all the entities on the
network (users and services, usually called "principals").  All
principals share a secret password (or key) with the Kerberos server and
this enables principals to verify that the messages from the Kerberos
server are authentic.  Thus trusting the Kerberos server, users and
services can authenticate each other.
2004-01-10 14:56:44 +00:00
jlam
682212d643 Remove files listed in PLIST.ldap. 2004-01-10 01:27:00 +00:00
jlam
fe51e56c62 Don't install the LDAP_SASLAUTHD documentation file unless we are building
with support for LDAP.
2004-01-09 20:40:05 +00:00
jlam
7fa7bb10c3 Remove references to saslauthd from this package. 2004-01-09 20:35:03 +00:00
jlam
e6cd919ca9 Provide uint*_t datatypes for UINT* typedefs by including either
<stdint.h> or <inttypes.h>.  Fix suggested by the analysis in pkg
PR 22031.
2004-01-09 20:29:47 +00:00
jlam
b3823f43f2 Add and enable cyrus-saslauthd. 2004-01-09 19:47:39 +00:00
jlam
1ffd1b5f21 Initial import of cyrus-saslauthd-2.1.17 as security/cyrus-saslauthd.
saslauthd is a daemon process that handles plaintext authentication
requests on behalf of the Cyrus SASL library.  It may be compiled to
support authentication using getpwent, PAM, or an LDAP database.
2004-01-09 19:44:10 +00:00
jlam
ab147d0e74 Update cyrus-sasl2 to 2.1.15nb2. Changes from version 2.1.15nb1 are
splitting out the saslauthd daemon into a separate package,
security/cyrus-saslauthd.  This allows the saslauthd daemon to
support additional database backends for plaintext authentication
without adding unrelated dependencies to the cyrus-sasl2 package.
2004-01-09 19:37:48 +00:00
jlam
39b5cf574d bl3ify 2004-01-08 22:13:14 +00:00
jlam
4fb76c0ccb Adding a MESSAGE file noting where these packages search for plugins or
modules that may be added by other packages.
2004-01-08 19:18:00 +00:00
agc
0e62dfb3b8 Add and enable fragroute. 2004-01-08 17:56:32 +00:00
agc
09077a7922 Initial import of fragroute-1.2 into the NetBSD Packages Collection,
provided in PR 24022 by ISIHARA Takanori. This was taken from the
FreeBSD Packages Collection and ported to NetBSD by ISIHARA Takanori.

Additional fixes to make the package compile on NetBSD by myself,
along with fixes for the build infrastructure (since libevent is part
of NetBSD-current).

"Fragroute intercepts, modifies, and rewrites egress traffic destined
for a specified host, implementing most of the attacks described in the
Secure Networks "Insertion, Evasion, and Denial of Service: Eluding
Network Intrusion Detection" paper of January 1998.

It features a simple ruleset language to delay, duplicate, drop,
fragment, overlap, print, reorder, segment, source-route, or otherwise
monkey with all outbound packets destined for a target host, with
minimal support for randomized or probabilistic behaviour.

This tool was written in good faith to aid in the testing of network
intrusion detection systems, firewalls, and basic TCP/IP stack
behaviour. Please do not abuse this software."
2004-01-08 17:55:15 +00:00
jlam
3d57ea1af7 First cut at a common module.mk file to be included by PAM module packages. 2004-01-08 00:08:23 +00:00
jlam
727f2c9aa1 bl3ify 2004-01-08 00:07:26 +00:00
ben
e2f3e6a525 Convert to buildlink3. 2004-01-07 23:10:17 +00:00
ben
836543b802 Note rename of fp-netbsd-ws to fprot-workstation-bin. 2004-01-07 19:10:58 +00:00
ben
2b7ba69857 Add security/fprot-workstation-bin-4.3.1, which used to be fp-netbsd-ws.
This is the F-prot antivirus for home users.
2004-01-07 18:47:00 +00:00
ben
17dccc0d2f Remove fp-netbsd-ws in order to re-import as fprot-workstation-bin. 2004-01-07 18:45:11 +00:00
jlam
4b90d17ed9 From the log for rev. 1.1260 of bsd.pkg.mk:
"Package Makefiles should refer to PKG_SYSCONFBASEDIR instead of
 PKG_SYSCONFBASE when they want PKG_SYSCONFDIR stripped of
 PKG_SYSCONFSUBDIR.  This makes PKG_SYSCONFBASE=/etc work with pkgviews by
 installing all config files into /etc/packages/<pkg> instead of
 occasionally putting some directly into /etc."
2004-01-07 02:21:16 +00:00
reed
f15e3f4f9a Make PLIST work if different perl version is used (version was hard-coded
in PLIST.)
Use:
${PERL5_SITEARCH}
Instead of:
lib/perl5/site_perl/5.6.1/${MACHINE_ARCH}-${LOWER_OPSYS}
2004-01-06 17:28:16 +00:00
jlam
fe69a47fe5 bl3ify 2004-01-05 23:34:03 +00:00
jlam
38252eb956 bl3ify 2004-01-05 22:33:45 +00:00
jlam
848d6eb2a3 bl3ify 2004-01-05 22:16:24 +00:00
markd
6139b28041 Fix build if SASL_USE_GSSAPI=YES
From PR pkg/23634 by Louis Guillaume.
also noted in PR pkg/23339.
Fix configure to not try and _statically_ link in gssapi support as it doesn't
work (unresolved symbols when used).  This deals with the second part of
PR pkg/23339.
2004-01-05 12:10:29 +00:00
jlam
6ff48e076b bl3ify 2004-01-05 11:53:39 +00:00
jlam
22645a942c bl3ify 2004-01-05 11:28:07 +00:00
jlam
d279e6f535 Use S/+$// instead of C/\+$// to save a backslash. Very highly
recommended by seb :)
2004-01-05 11:05:44 +00:00
jlam
c9ff27d270 Sow BUILDLINK_USE_BUILTIN.<pkg> and reap _NEED_<PKG> variables. 2004-01-05 09:31:31 +00:00
jlam
47bb2aae5f Re-arrange to match example buildlink3.mk file in bsd.buildlink3.mk. 2004-01-04 23:34:04 +00:00
jlam
339cd13cb2 Initial sprinkling of work-in-progress buildlink3.mk files for using the
buildlink3 framework.
2004-01-03 23:06:43 +00:00
reed
6d9af8d68d Bump package revisions for tiff update.
Tiff is backward compatible, but was broken on amd64 platform
so this makes sure new tiff is used.
2004-01-03 18:49:33 +00:00
ben
97fabad2ff Add p5-libwww dependency for check-updates.pl 2004-01-03 05:05:15 +00:00
ben
3054737f99 Add license information for fp-netbsd-ws, and note new package in Makefile
and CHANGES.
2004-01-02 18:45:44 +00:00
ben
ab9eb84b8a Import fp-netbsd-ws-4.3.1, the f-prot antivirus for home users.
For home users using the BSD open-source operating system, we offer F-Prot
Antivirus for BSD Workstations.  F-Prot Antivirus for BSD Workstations
utilizes the renowned F-Prot Antivirus scanning engine for primary scan but
has in addition to that a system of internal heuristics devised to search
for unknown viruses

F-Prot Antivirus for BSD was especially developed to effectively eradicate
viruses threatening workstations running FreeBSD, NetBSD, or OpenBSD.  It
provides full protection against macro viruses and other forms of malicious
software - including Trojans.
2004-01-02 18:43:00 +00:00
grant
3232ee482f formatting tweak. 2004-01-02 00:07:58 +00:00
grant
dc0dfa83b3 correct path for ftp.tuwien.ac.at, and consistently use the 'ftp'
hostname.
2004-01-01 23:58:34 +00:00
agc
7ae16542a6 Update audit-packages to 1.28.
By popular demand, add a -v switch to audit-packages(8) which enables the
check for a package vulnerabilities file being unchanged for over 7 days.
To enable the check, -v must be specified on the command line:

	% audit-packages
	% audit-packages -v
	*** WARNING - /usr/distfiles/pkg-vulnerabilities more than a week old, continuing...
	%
2004-01-01 23:35:28 +00:00
kristerw
35c8abbdb4 Sort. 2003-12-31 00:39:50 +00:00
cjep
15d9504c29 Whitespace fixes 2003-12-30 23:14:17 +00:00
cjep
0a88f2ddc6 Whitespace fix 2003-12-30 22:55:04 +00:00
bad
88eb08ea76 Get rid of -DNO_RSA in CFLAGS. This causes newer openssl headers to
not include <openssl/rsa.h> from <openssl/x509.h>.  Fixes PR pkg/23901.

While here, apply the patches to properly buildlinkify it for openssl,
which I forgot to pass to agc@ for the last update.
2003-12-30 15:57:53 +00:00
jmmv
a51d1c36df Bump PKGREVISION due to gnome-vfs2 update (fam removed as dependancy).
( We really need non-recursive dependancies... *sigh* )
2003-12-28 23:37:05 +00:00
heinz
80abdc0e10 Enable p5-Digest-Hashcash 2003-12-28 01:11:45 +00:00
heinz
02b1d30ca3 Initial import of the Digest::Hashcash Perl module.
The Digest::Hashcash Perl module calculates n-bit partial hash
collisions on chosen texts.
The idea of using partial hashes is that they can be made arbitrarily
expensive to compute (by choosing the desired number of bits of
collision), and yet can be verified instantly. This can be used as the
basis for an e-cash system measured in burnt CPU cycles. Such cash
systems can be used to throttle systematic abuses of un-metered internet
resources.
2003-12-28 01:07:58 +00:00
wiz
fae189b50e Update to 1.2.4:
* Added read-only support for BZIP2 compression.  This should be
      considered experimental, and is only available if the libbzip2
      library <http://sources.redhat.com/bzip2/> is installed.

    * Added the ability to handle messages that can be decrypted with
      either a passphrase or a secret key.

    * Most support for Elgamal sign+encrypt keys has been removed.
      Old signatures may still be verified, and existing encrypted
      messages may still be decrypted, but no new signatures may be
      issued by, and no new messages will be encrypted to, these keys.
      Elgamal sign+encrypt keys are not part of the web of trust.  The
      only new message that can be generated by an Elgamal
      sign+encrypt key is a key revocation.  Note that in a future
      version of GnuPG (currently planned for 1.4), all support for
      Elgamal sign+encrypt keys will be removed, so take this
      opportunity to revoke old keys now.

    * A Russian translation is included again as well as a new
      Belarusian translation.
2003-12-25 14:05:02 +00:00
jmmv
c648dc89c6 Update to 1.0.3:
- Corrected bug in gnutls_bye() which made it return an error code
  of INVALID_REQUEST instead of success.
- Corrected a bug in the GNUTLS_KEY key usage definitions.
2003-12-22 23:08:03 +00:00
jmmv
270644a29f Fix typo. From Min Sik Kim in PR pkg/23827. 2003-12-21 17:24:50 +00:00
xtraeme
ba58b3a6c9 Update to 1.0.2, this also closes PR pkg/23766.
Changes:

	o Corrected a bug in the RSA key generation. This was
	  generating unusable RSA keys.
2003-12-21 10:17:30 +00:00
xtraeme
e4737eba0b This needs gettext-lib's buildlink, reported by Soren Jacobsen PR
pkg/23765. Bump PKGREVISION.
2003-12-21 10:03:42 +00:00
xtraeme
ab17fd92e1 This needs libiconv's buildlink, reported by David Griffith PR pkg/23811.
Bump PKGREVISION.
2003-12-21 09:57:14 +00:00
agc
26dd2c51c8 Avoid some dodgy string pasting - makes this compile with gcc3. 2003-12-19 12:34:30 +00:00
sketch
c9989faa7d Bump PKGREVISION for packages which install files into RUBY_ARCHLIBDIR,
which has changed for Solaris installs.
2003-12-19 12:04:20 +00:00
wiz
4460d163f6 Sort. 2003-12-18 09:47:10 +00:00
xtraeme
3ea02de63c Update to 1.0.1 from Min Sik Kim PR pkg/23754.
Changes since 1.0.0:

- Some minor fixes in the makefiles. They now include CFLAGS
  from libgcrypt or opencdk if installed in a non standard directory.
- Fixed the SRP detection test in gnutls-cli-debug.
- Added gnutls_rsa_params_export_pkcs1() and
  gnutls_rsa_params_import_pkcs1().
2003-12-18 06:04:10 +00:00
heinz
d8f3d3b65d Depend on p5-MIME-Base64 (patch sent to upstream provider) and PKGREVISION++ 2003-12-16 22:32:47 +00:00
martti
5348834ce1 Expand ROOT_USER 2003-12-15 14:10:49 +00:00
wiz
18cf4c55a9 Add and enable gpgme03. 2003-12-14 17:57:58 +00:00
wiz
91af1f6bf9 Mention that this is the 0.3 branch. 2003-12-14 17:57:36 +00:00
wiz
26be669fe0 Depend on gpgme03 package. Bump PKGREVISION. 2003-12-14 17:56:39 +00:00
wiz
430be6e390 Fix DEPENDS and PATH so that only the 0.3.x version
is accepted.
2003-12-14 17:55:23 +00:00
wiz
978951a718 Re-import the previous gpgme version for packages that still use the
older interface.

Does not coexist with newer version, so the PKGNAMEs are intended to
be the same.
2003-12-14 17:51:04 +00:00
wiz
b6e73eb413 Update to 0.7.0:
Noteworthy changes in version 0.7.0 (2003-10-22)
------------------------------------------------

 * Long file operations no longer block GPA, so several operations can be
 run at the same time. This also means GPA does not freeze while an operation
 runs, leading to a more responsive interface.

 * The keyring editor now displays all the subkeys of the currently selected
 key. This is only visible if GPA is in advanced mode (available from the
 preferences dialog).

 * The capabilities of a key (certify, sign, encrypt) are now visible from
 the keyring editor.

 * The keyring editor can now sort keys by any column. By default, they are
 listed in the order they were imported into the keyring (i.e. the same order
 as "gpg --list-keys").

 * The key list is now displayed while it is being filled, allowing for
 faster startup times.

 * A warning dialog is now displayed when an operation slows down due to
 gpg rebuilding the trust database.

 * Imports and exports from files and servers have been separated into
 different dialogs and menu options.

 * Invoking GPA with file names as arguments will open those files in the
 file manager.

 * Cosmetical and minor fixes to the file manager window.

 * GPA now remembers the brief/detailed setting view and restores it
 when GPA is started.

 * Removed all deprecated widgets. GPA is now pure GTK+ 2.2.

 * Fixed a hang on startup on PowerPC machines.

Noteworthy changes in version 0.6.1 (2003-01-29)
------------------------------------------------

 * Added a popup menu to the keyring view, with all the common operations.

 * Keys' expiration dates can be choosen by clicking on a calendar.

 * The key generation dialogs have been revamped to use GTK+2 stock widgets.

 * The passphrase for a key can be changed from the edit key dialog.

 * Revoked user names are properly treated. They are not displayed, save in
 the details notebook, and then they are clearly marked as revoked.

 * GPA now uses the standard GTK+ file selection dialog.

 * Added Swedish translation.

 * Many other bugfixes, including several portability issues.

Noteworthy changes in version 0.6.0 (2002-12-24)
------------------------------------------------

 * GPA now supports GnuPG 1.2 or later, thanks to it's use of GPGME.

 * All the user preferences are set from a single dialog, and automatically
 saved in gpa.conf, including the default keyserver and the use of
 advanced/simple UI mode.

 * The `--advanced-ui' command line options has been removed, as it is
 available within the program itself.

 * The new `-f' and `-k' options can be used to launch the keyring editor,
 the file manager, or both on startup.

 * All the user ID's in a key are now displayed in the `Details' section, and
 in most dialogs.

 * Key signatures are now displayed individually for each User ID, or in a
 global listing for the key.

 * The usual `Copy' and `Paste' commands can be used to import and export keys
 from the clipboard.

 * The `Edit key' option is now only available for private keys. Setting the
 ownertrust of a key is now an independent operation.

 * After every import operation, the user is informed of how many keys have
 been imported.

 * Errors or keyserver operations are now reported to the user.

 * The `Verify file' dialog has been completely revamped to allow
 verification of several files at the same time.

 * Added Japanese, Brazilian Portuguese, Dutch and Spanish translations.

 * The user interface has been updated to use GTK+ 2.0 and stock items.

Noteworthy changes in version 0.5.0 (2002-02-25)
------------------------------------------------

 * The file selection dialog has been significantly changed from the
   standard GTK+ file selection dialog to look more like what users
   of MS-Windows are accustomed to.

 * "Show Details" in the menu of the file manager is now named
   "Verify Signatures", and it is now accessible through an icon in
   the tool bar, too.

 * Keyserver access via a direct HTTP request now allows for
   searching for keys on keyservers.

 * GPAPA's output is now gettext()ified.

 * The standard key is now remembered in `gpa.conf'.

 * The "Sign File" dialog has been simplified.

 * The creation of a backup copy of your public and private keys
   works now. It is remembered in `gpa.conf'. If a backup does not
   yet exist, the user is asked at startup to create one.

 * GPA now has a nice icon in the upper left corner of its window. :-)

 * Many bugfixes (for instance: crashes when signing files and keys,
   handling of spaces in file names, etc.).

 * Makefiles do contain `-mwindows' now to suppress the console
   window.

 * The "Help" menus is now called "Info". The license is displayed
   in the (unofficial) German translation now. (This should be
   improved to honor "locale" settings.)

 * GPA is now ready to compile with GTK+ version 2 once it is
   released.

 * In the key manager, there are now menu entries for key operations.

 * A secret key without a matching public key is now warned about.

 * Keys now can be imported from and exported to the MS Windows
   clipboard.

 * Secret keys can be imported now.

 * When a key is generated, a passphrase which is too stupid is
   warned about.

 * There now is an icon in the tool bar to switch from the keyring
   manager to the file manager.

 * GPA can now be compiled using a standard GNU toolchain.
   In particular it can be cross-compiled from GNU/Linux to
   mingw32/MS-Windows (which is what we did for the GnuPP CD),
   or compiled natively under MS-Windows using CygWin.
2003-12-14 15:12:11 +00:00
wiz
2387ecca31 Update to 0.4.3 (for gpa-0.7.0):
Noteworthy changes in version 0.4.3 (2003-10-06)
------------------------------------------------

 * libgpgme should not be used for threaded programs anymore.  This
   never worked reliably in all cases, because you had to
   be careful about the linking order and libtool wouldn't do that for
   you automatically.  Instead, now you have to link against
   libgpgme-pthread for applications using pthread and libgpgme-pth for
   applications using GNU Pth.

   The old code for automagically detecting the thread library is
   still part of libgpgme, but it is DEPRECATED.

 * There are new automake macros AM_PATH_GPGME_PTH and
   AM_PATH_GPGME_PTHREAD, which support checking for thread-enabled
   versions of GPGME.  They define GPGME_PTH_CFLAGS, GPGME_PTH_LIBS,
   GPGME_PTHREAD_CFLAGS and GPGME_PTHREAD_LIBS respectively.  These
   variables of course also include the configuration for the thread
   package itself.  Alternatively, use libtool.

 * gpgme_strerror_r as a thread safe variant of gpgme_strerror was
   added.

 * gpgme-config doesn't support setting the prefix or exec prefix
   anymore.  I don't think it ever worked correctly, and it seems to
   be pointless.

 * gpgme_get_key fails with GPG_ERR_AMBIGUOUS_NAME if the key ID
   provided was not unique, instead returning the first matching key.

 * gpgme_key_t and gpgme_subkey_t have a new field, can_authenticate,
   that indicates if the key can be used for authentication.

 * gpgme_signature_t's status field is now correctly set to an error
   with error code GPG_ERR_NO_PUBKEY if public key is not found.

 * gpgme_new_signature_t's class field is now an unsigned int, rather
   than an unsigned long (the old class field is preserved for
   backwards compatibility).

 * A new function gpgme_set_locale() is provided to allow configuring
   the locale for the crypto backend.  This is necessary for text
   terminals so that programs like the pinentry can be started with
   the right locale settings for the terminal the application is running
   on, in case the terminal has different settings than the system
   default (for example, if it is a remote terminal).  You are highly
   recommended to call the following functions directly after
   gpgme_check_version:

   #include <locale.h>

   setlocale (LC_ALL, "");
   gpgme_set_locale (NULL, LC_CTYPE, setlocale (LC_CTYPE, NULL));
   gpgme_set_locale (NULL, LC_MESSAGES, setlocale (LC_MESSAGES, NULL));

   GPGME can not do this for you, as setlocale is not thread safe, and
   there is no alternative.

 * The signal action for SIGPIPE is now set to SIG_IGN by
   gpgme_check_version, instead the first time a crypto engine is
   started (which is not well defined).

 * In the output of gpgme_hash_algo_name, change RMD160 to RIPEMD160,
   TIGER to TIGER192, CRC32-RFC1510 to CRC32RFC1510, and CRC24-RFC2440
   to CRC24RFC2440.  For now, these strings can be used as the MIC
   parameter for PGP/MIME (if appropriately modified).


Noteworthy changes in version 0.4.2 (2003-07-30)
------------------------------------------------

 * Allow gpg-error to be in non-standard place when linking the test suite.

 * Configure will fail now if gpg-error can not be found.

 * Fixed initialized memory backed data objects for writing, which
   caused the test program to crash (but only on Mac OS, surprisingly).

 * Eliminate use of C99 constructs.

 * Small improvements to the manual.


Noteworthy changes in version 0.4.1 (2003-06-06)
------------------------------------------------

 This is the release that 0.4.0 should have been.  There are many
 interface changes, please see below for the details.  The changes are
 sometimes the result of new functionality, but more often express a
 paradigm shift.  Others are an overdue cleanup to get GPGME in line
 with the GNU coding standards and to make the interface more
 self-consistent.  Here is an overview on the changes:

 All types have been renamed to conform to the GNU coding standards,
 most of the time by keeping the whole name in lowercase and inserting
 underscores between words.

 All operations consistently only accept input parameters in their
 invocation function, and return only an error code directly.  Further
 information about the result of the operation has to be retrieved
 afterwards by calling one of the result functions.  This unifies the
 synchronous and the asynchronous interface.

 The error values have been completely replaced by a more
 sophisticated model that allows GPGME to transparently and accurately
 report all errors from the other GnuPG components, irregardless of
 process boundaries.  This is achieved by using the library
 libgpg-errors, which is shared by all GnuPG components.  This library
 is now required for GPGME.

 The results of all operations are now provided by pointers to C
 structs rather than by XML structs or in other ways.

 Objects which used to be opaque (for example a key) are now pointers
 to accessible structs, so no accessor functions are necessary.

 Backward compatibility is provided where it was possible without too
 much effort and did not collide with the overall sanitization effort.
 However, this is only for ease of transition.  NO DEPRECATED FUNCTION
 OR DATA TYPE IS CONSIDERED A PART OF THE API OR ABI AND WILL BE
 DROPPED IN THE FUTURE WITHOUT CHANGING THE SONAME OF THE LIBRARY.
 Recommendations how to replace deprecated or removed functionality
 can be found within the description of each change.

 What follows are all changes to the interface and behaviour of GPGME
 in detail.

 * If gpgme.h is included in sources compiled by GCC 3.1 or later,
   deprecated attributes will warn about use of obsolete functions and
   type definitions.  You can suppress these warnings by passing
   -Wno-deprecated-declarations to the gcc command.

 * The following types have been renamed.  The old types are still
   available as aliases, but they are deprecated now:
	[complete list in NEWS file]

 * gpgme_error_t is now identical to gpg_error_t, the error type
   provided by libgpg-error.  More about using libgpg-error with GPGME
   can be found in the manual.  All error symbols have been removed!

 * All functions and types in libgpg-error have been wrapped in GPGME.
   The new types are gpgme_err_code_t and gpgme_err_source_t.  The new
   functions are gpgme_err_code, gpgme_err_source, gpgme_error,
   gpgme_err_make, gpgme_error_from_errno, gpgme_err_make_from_errno,
   gpgme_err_code_from_errno, gpgme_err_code_to_errno,
   gpgme_strsource.

 * GPGME_ATTR_IS_SECRET is not anymore representable as a string.

 * GnuPG 1.2.2 is required.  The progress callback is now also invoked
   for encrypt, sign, encrypt-sign, decrypt, verify, and
   decrypt-verify operations.  For verify operations on detached
   signatures, the progress callback is invoked for both the detached
   signature and the plaintext message, though.

 * gpgme_passphrase_cb_t has been changed to not provide a complete
   description, but the UID hint, passphrase info and a flag
   indicating if this is a repeated attempt individually, so the user
   can compose his own description from this information.

   The passphrase is not returned as a C string, but must be written
   to a file descriptor directly.  This allows for secure passphrase
   entries.

   The return type has been changed to gpgme_error_t value.  This
   allowed to remove the gpgme_cancel function; just return
   the error code GPG_ERR_CANCELED in the passphrase callback directly.

 * gpgme_edit_cb_t has been changed to take a file descriptor argument.
   The user is expected to write the response to the file descriptor,
   followed by a newline.

 * The recipients interface has been removed.  Instead, you use
   NULL-terminated lists of keys for specifying the recipients of an
   encryption operation.  Use the new encryption flag
   GPGME_ENCRYPT_ALWAYS_TRUST if you want to override the validity of
   the keys (but note that in general this is not a good idea).

   This change has been made to the prototypes of gpgme_op_encrypt,
   gpgme_op_encrypt_start, gpgme_op_encrypt_sign and
   gpgme_op_encrypt_sign_start.

   The export interface has been changed to use pattern strings like
   the keylist interface.  Thus, new functions gpgme_op_export_ext and
   gpgme_op_export_ext_start have been added as well.  Now the
   prototypes of gpgme_op_export_start and gpgme_op_export finally
   make sense.

 * gpgme_op_verify and gpgme_op_decrypt_verify don't return a status
   summary anymore.  Use gpgme_get_sig_status to retrieve the individual
   stati.

 * gpgme_io_cb_t changed from a void function to a function returning
   a gpgme_error_t value.  However, it will always return 0, so you
   can safely ignore the return value.

 * A new I/O callback event GPGME_EVENT_START has been added.  The new
   requirement is that you must wait until this event until you are
   allowed to call the I/O callback handlers previously registered for
   this context operation.  Calling I/O callback functions for this
   context operation before the start event happened is unsafe because
   it can lead to race conditions in a multi-threaded environment.

 * The idle function feature has been removed.  It was not precisely
   defined in a multi-threaded environment and is obsoleted by the
   user I/O callback functions.  If you still need a simple way to
   call something while waiting on one or multiple asynchronous
   operations to complete, don't set the HANG flag in gpgme_wait (note
   that this will return to your program more often than the idle
   function did).

 * gpgme_wait can return NULL even if hang is true, if an error
   occurs.  In that case *status contains the error code.

 * gpgme_get_engine_info was radically changed.  Instead an XML
   string, an info structure of the new type gpgme_engine_info_t is
   returned.  This makes it easier and more robust to evaluate the
   information in an application.

 * The new function gpgme_get_protocol_name can be used to convert a
   gpgme_protocol_t value into a string.

 * The status of a context operation is not checked anymore.  Starting
   a new operation will silently cancel the previous one.  Calling a
   function that requires you to have started an operation before without
   doing so is undefined.

 * The FPR argument to gpgme_op_genkey was removed.  Instead, use the
   gpgme_op_genkey_result function to retrieve a gpgme_genkey_result_t
   pointer to a structure which contains the fingerprint.  This also
   works with gpgme_op_genkey_start.  The structure also provides
   other information about the generated keys.

 * The new gpgme_op_import_result function provides detailed
   information about the result of an import operation in
   gpgme_import_result_t and gpgme_import_status_t objects.
   Thus, the gpgme_op_import_ext variant is deprecated.

 * The new gpgme_op_sign_result function provides detailed information
   about the result of a signing operation in gpgme_sign_result_t,
   gpgme_invalid_key_t and gpgme_new_signature_t objects.

 * The new gpgme_op_encrypt_result function provides detailed
   information about the result of an encryption operation in
   a GpgmeEncryptResult object.

 * The new gpgme_op_decrypt_result function provides detailed
   information about the result of a decryption operation in
   a GpgmeDecryptResult object.

 * The new gpgme_op_verify_result function provides detailed
   information about the result of an verify operation in
   a GpgmeVerifyResult object.  Because of this, the GPGME_SIG_STAT_*
   values, gpgme_get_sig_status, gpgme_get_sig_ulong_attr,
   gpgme_get_sig_string_attr and gpgme_get_sig_key are now deprecated,
   and gpgme_get_notation is removed.

 * GpgmeTrustItem objects have now directly accessible data, so the
   gpgme_trust_item_get_string_attr and gpgme_trust_item_get_ulong_attr
   accessor functions are deprecated.  Also, reference counting is
   available through gpgme_trust_item_ref and gpgme_trust_item_unref
   (the gpgme_trust_item_release alias for the latter is deprecated).

 * Keys are not cached internally anymore, so the force_update argument
   to gpgme_get_key has been removed.

 * GpgmeKey objects have now directly accessible data so the
   gpgme_key_get_string_attr, gpgme_key_get_ulong_attr,
   gpgme_key_sig_get_string_attr and gpgme_key_sig_get_ulong_attr
   functions are deprecated.  Also, gpgme_key_release is now
   deprecated.  The gpgme_key_get_as_xml function has been dropped.

 * Because all interfaces using attributes are deprecated, the
   GpgmeAttr data type is also deprecated.

 * The new gpgme_op_keylist_result function provides detailed
   information about the result of a key listing operation in
   a GpgmeKeyListResult object.

 * Now that each function comes with its own result retrieval
   interface, the generic gpgme_get_op_info interface is not useful
   anymore and dropped.

 * The type and mode of data objects is not available anymore.

Noteworthy changes in version 0.4.0 (2002-12-23)
------------------------------------------------

 * Key generation returns the fingerprint of the generated key.

 * New convenience function gpgme_get_key.

 * Supports signatures of user IDs in keys via the new
   GPGME_KEYLIST_MODE_SIGS keylist mode and the
   gpgme_key_sig_get_string_attr and gpgme_key_sig_get_ulong_attr
   interfaces.  The XML info about a key also includes the signatures
   if available.

 * New data object interface, which is more flexible and transparent.

Lots of interface changes, for details see the included
NEWS file.
2003-12-14 15:05:01 +00:00
wiz
4898c670fb Fix gpg-error-config script to return -Wl,-R part too.
Bump PKGREVISION to 1.
2003-12-14 14:57:40 +00:00
wiz
391b5798e6 Bump PKGREVISION for atk library major bump. 2003-12-13 00:45:21 +00:00