Commit graph

3753 commits

Author SHA1 Message Date
joerg
6ce3737746 Add DragonFly support. 2006-02-17 14:43:49 +00:00
martti
e9f3e44177 Fixed warnings found by pkglint -Wall. 2006-02-17 07:43:36 +00:00
joerg
9d87c73a0e Include sys/time.h before sys/resource.h to fix build on DragonFly. 2006-02-16 18:31:06 +00:00
tron
d303bbebdc Readd checksum for "idea.c.gz" which got lost during the last update. 2006-02-15 22:26:46 +00:00
heinz
e7c8a59547 Updated to version 0.22.
Pkgsrc changes:
  - Removed almost all warnings in MESSAGE.

Changes since version 0.21:
===========================
0.22  Mon Nov 15 2005 21:13:20
        - Add public_decrypt, private_encrypt methods, contributed
          by Paul G. Weiss <paul@weiss.name>
        - Some changes to help builds on Redhat9
        - Remove deprecated methods:
          * the no-arg new constructor - use new_from_public_key,
            new_from_private_key or Crypt::OpenSSL::RSA->generate_key instead
          * load_public_key - use new_from_public_key
          * load_private_key - use new_from_private_key
          * generate_key as an instance method - use it as a class constructor
            method instead.
          * set_padding_mode - use use_no_padding, use_pkcs1_padding,
            use_pkcs1_oaep_padding, or use_sslv23_padding instead.
          * get_padding_mode
        - Eliminate all(most all) memory leaks.
        - fix email address
        - Stop returning true from methods just to indicate success.
        - Change default public exponent from 65535 to 65537
2006-02-15 22:22:19 +00:00
heinz
314650a33d Updated to version 0.13.
Pkgsrc changes:
  none

Relevant changes since version 0.11:
=============================================
- Removed all use of strlen() in DSA.xs so signatures with nulls,
  as commonly generated with sha1, could be signed/verified,
  and added more tests
2006-02-15 22:08:19 +00:00
heinz
68984764ad Updated to version 0.13.
Pkgsrc changes:
  - Removed dependency on p5-Math-Pari, p5-Crypt-Random, p5-Class-Loader.

Changes since version 0.12:
===========================
0.13  2005.05.26
    - Rewrote to use Math::BigInt instead of Math::Pari, including patches
      from Brad Fitzpatrick for a replacement for the isprime function
      (both using pure Perl and an external gp program).
    - Added optional Content argument to Crypt::DSA::Key->new, to specify
      serialized Content to be deserialized.
    - Added Signature serialization and deserialization of ASN.1-encoded
      structures.
    - Added ability to do key generation using an external openssl binary.
      Thanks to Brad Fitzpatrick for the patch.
    - Signature object now has better get/set acccessors.
    - Use Module::Install instead of hand-coded Makefile.PL.
2006-02-15 20:42:54 +00:00
drochner
a544d6f73f update to 1.4.2.1
this fixes a false positive signature verification if only the exit
code of "gpgv" or "gpg --verify" is used
2006-02-15 19:10:20 +00:00
salo
3252f3b962 PKGREVISION should've been bumped, DEPENDS changed.
and it should never go backwards..
2006-02-15 13:46:10 +00:00
rillig
5740707b65 Fixed all pkglint warnings. 2006-02-15 13:43:35 +00:00
heinz
bc0f47682a Revert the bump of PKGREVISION. It's unnecessary since the package works as
before.
2006-02-15 00:05:04 +00:00
heinz
96326abe2c Added missing dependency on p5-Crypt-DES. 2006-02-15 00:02:11 +00:00
heinz
1c7e3e4399 Updated to version 1.57.
Pkgsrc changes:
  - Removed (now unnecessary) patch-aa.

Changes since version 1.50:
===========================
1.57                                                          Oct 20, 2005
 * Updated POD documentation and added POD syntax and coverage
   tests using Test::Pod and Pod::Coverage.
1.56                                                         July 05, 2005
 * Removed references to the mailing list and added support for
   an optional commercial license.
1.55                                                     February 18, 2005
 * Fixed a bug ::DataFormat::i2osp(), wherein there was an encoding problem
   when the most significant byte is 0x0100. Reported and patched by
   <jbarkdull@yahoo.com> <rt.cpan.org: Bug #11495>
 * Fixed warnings in t/15-benchmark.t
1.51                                                     February 25, 2003
 * In Crypt::RSA::encrypt() and decrypt() added a check to ensure the
   blocksize is greater than 0. Blocksize can be smaller than 0 if the RSA
   key modulus is too small for a particular encoding.
2006-02-14 23:45:47 +00:00
rillig
4e7f179dff Fixed ISO C90 violation. 2006-02-14 01:13:32 +00:00
rillig
ecc788c565 Perl is needed for the configure script. 2006-02-14 01:04:32 +00:00
wiz
03bb2f7deb Allow nb versions of openssl-0.9.7i too. 2006-02-13 21:52:10 +00:00
reed
7b322f7847 Add buildlink3.mk file. Needed by Aleksandar Simic
for his ne7ssh package. As discussed on pkgsrc-wip-discuss
list.
2006-02-13 17:19:42 +00:00
drochner
e346783358 "configure" checks for libtasn1>=0.2.18, so require it explicitely 2006-02-13 11:04:54 +00:00
heinz
d05f0f86dc Updated to version 1.21.
Relevant changes since version 1.1:
===================================
No useful list of changes provided. "diff" shows mainly internal cleanup.
2006-02-12 23:13:49 +00:00
xtraeme
b36bf56512 ENOTIME to mantain these packages, feel free to pick it up if you are
insterested.
2006-02-12 15:24:14 +00:00
heinz
776b76ad4b Updated to version 1.06.
Changes since version 1.02:
======================================
There is no list of changes. Changes I found so far:
- Used htons() from netinet/in.h to simplify handling of different endianness
  between platforms.
- Some changes in test.pl
2006-02-12 02:46:50 +00:00
heinz
55108ef547 Updated to version 2.05.
Relevant changes since version 2.03:
====================================
  des.h was renamed to _des.h in an attempt to solve the build-on-Solaris
  problem.

  all references to des_ were changed to _des_ since the 2.04 release didn't
  seem to fix the problem on Solaris.
2006-02-12 02:26:08 +00:00
heinz
94e8997573 Updated to version 1.03.
Relevant changes since version 1.02:
=====================================
1.03  22 May 2005
        - make it work in taintmode
2006-02-12 01:55:23 +00:00
heinz
35effe103a Updated to version 1.25.
Relevant changes since version 1.13:
====================================
 - fixed circular reference between Crypt::Random and Crypt::Random::Generator
   causing 'Undefined subroutine' errors.
 - Made "forbidden division t_REAL % t_INT" error disappear.
 - Workaround for Math::Pari's serialization problem.
 - Added a Uniform option to makerandom() and makerandom_itv() that
   doesn't set the high bit of the generated random, and produces
   a number uniformally distributed in the interval. Thanks to Len
   Budney for pointing this out.
2006-02-12 01:50:05 +00:00
heinz
e87f1bec7f Updated to version 2.15.
Relevant changes since version 2.08:
=====================================
- RandomIV in message header overrides manually-supplied -salt, as one
  would expect it should.
- Added OpenSSL compatibility
- Salt and IV generators take advantage of /dev/urandom device, if available
- Added regression test for PCBC mode
- Fixed bug reported by Joshua Brown that caused certain length
  strings to not encrypt properly if ending in a "0" character.
- Fixed Rijndael compat problems
2006-02-12 00:52:20 +00:00
salo
711b5325d2 Update to version 3.4p1
From Jason White via PR pkg/32780

Changes:

Security bugs resolved in this release:

 * CVE-2006-0225: scp (as does rcp, on which it is based) invoked a
   subshell to perform local to local, and remote to remote copy
   operations. This subshell exposed filenames to shell expansion
   twice; allowing a local attacker to create filenames containing
   shell metacharacters that, if matched by a wildcard, could lead
   to execution of attacker-specified commands with the privilege of
   the user running scp (Bugzilla #1094)

This is primarily a bug-fix release, only one new feature has been
added:

 * Add support for tunneling arbitrary network packets over a
   connection between an OpenSSH client and server via tun(4) virtual
   network interfaces. This allows the use of OpenSSH (4.3+) to create
   a true VPN between the client and server providing real network
   connectivity at layer 2 or 3. This feature is experimental and is
   currently supported on OpenBSD, Linux, NetBSD (IPv4 only) and
   FreeBSD. Other operating systems with tun/tap interface capability
   may be added in future portable OpenSSH releases. Please refer to
   the README.tun file in the source distribution for further details
   and usage examples.

Some of the other bugs resolved and internal improvements are:

 * Reduce default key length for new DSA keys generated by ssh-keygen
   back to 1024 bits. DSA is not specified for longer lengths and does
   not fully benefit from simply making keys longer. As per FIPS 186-2
   Change Notice 1, ssh-keygen will refuse to generate a new DSA key
   smaller or larger than 1024 bits

 * Fixed X forwarding failing to start when a the X11 client is executed
   in background at the time of session exit (Bugzilla #1086)

 * Change ssh-keygen to generate a protocol 2 RSA key when invoked
   without arguments (Bugzilla #1064)

 * Fix timing variance for valid vs. invalid accounts when attempting
   Kerberos authentication (Bugzilla #975)

 * Ensure that ssh always returns code 255 on internal error (Bugzilla
   #1137)

 * Cleanup wtmp files on SIGTERM when not using privsep (Bugzilla #1029)

 * Set SO_REUSEADDR on X11 listeners to avoid problems caused by
   lingering sockets from previous session (X11 applications can
   sometimes not connect to 127.0.0.1:60xx) (Bugzilla #1076)

 * Ensure that fds 0, 1 and 2 are always attached in all programs, by
   duping /dev/null to them if necessary.

 * Xauth list invocation had bogus "." argument (Bugzilla #1082)

 * Remove internal assumptions on key exchange hash algorithm and output
   length, preparing OpenSSH for KEX methods with alternate hashes.

 * Ignore junk sent by a server before it sends the "SSH-" banner
   (Bugzilla #1067)

 * The manpages has been significantly improves and rearranged, in
   addition to other specific manpage fixes:
   #1037 - Man page entries for -L and -R should mention -g.
   #1077 - Descriptions for "ssh -D" and DynamicForward should mention
           they can specify "bind_address" optionally.
   #1088 - Incorrect descriptions in ssh_config man page for
           ControlMaster=no.
   #1121 - Several corrections for ssh_agent manpages

 * Lots of cleanups, including fixes to memory leaks on error paths
   (Bugzilla #1109, #1110, #1111 and more) and possible crashes (#1092)

 * Portable OpenSSH-specific fixes:

   - Pass random seed during re-exec for each connection: speeds up
     processing of new connections on platforms using the OpenSSH's
     builtin entropy collector (ssh-rand-helper)

   - PAM fixes and improvements:
     #1045 - Missing option for ignoring the /etc/nologin file
     #1087 - Show PAM password expiry message from LDAP on login
     #1028 - Forward final non-query conversations to client
     #1126 - Prevent user from being forced to change an expired
             password repeatedly on AIX in some PAM configurations.
     #1045 - Do not check /etc/nologin when PAM is enabled, instead
             allow PAM to handle it. Note that on platforms using
             PAM, the pam_nologin module should be used in sshd's
             session stack in order to maintain past behaviour

   - Portability-related fixes:
     #989 - Fix multiplexing regress test on Solaris
     #1097 - Cross-compile fixes.
     #1096 - ssh-keygen broken on HPUX.
     #1098 - $MAIL being set incorrectly for HPUX server login.
     #1104 - Compile error on Tru64 Unix 4.0f
     #1106 - Updated .spec file and startup for SuSE.
     #1122 - Use _GNU_SOURCE define in favor of __USE_GNU, fixing
             compilation problems on glibc 2.4
2006-02-12 00:13:55 +00:00
ben
239bad1f87 Update fprot-workstation-bin to 4.6.6. Addresses PR#32776
Change MAINTAINER to tech-pkg.  Stop using PKGREVISION in DISTNAME.
Notable changes include:

* Postfix config has been changed so TLS is not used internally, that is
  when communicating with scan-mail.pl.  TLS can nevertheless be used
  when communicating with the outside world on port 25.
* f-protd has been tweaked for better performance
* A bug in f-protd when using the 'id=' argument was fixed
* A format string bug in f-protd which could cause malformed xml report
  was fixed
* f-prot-milter's logging changed to facilitate more useful error logs
* Fixed startup/shutdown routine for f-prot-milter in scan-mail.pl
* .wmf scanning improved
* A bug in the .hqx scanner on x86 cpu's was fixed
* A bug in the .msl scanner was fixed
* Fixed a bug in .cab and lzh handling
* A race issue with OLE documents was fixed.
2006-02-11 20:11:01 +00:00
joerg
14a8fc2553 Don't hard-wire -lpthread into gpgme-config, it breaks e.g. mail/balsa2
on DragonFly. Bump revision.
2006-02-11 14:11:07 +00:00
drochner
6ef154571c update libtasn1 to 0.2.18 and gnutls to 1.3.4,
fixes possible DOS (crash by invalid DER input) "GNUTLS-SA-2006-1"
2006-02-10 12:39:25 +00:00
shannonjr
2de4fb3c5f Update to 0.9.3. Changes:
- Only send TLS alert if there is one queued, fix a possible crash.
- Emit warning if prelude-failover problem arise.
- Improve error handling.
- Improve db plugin log option, "-" now mean stdout.
- Various bug fixes.
2006-02-09 11:01:57 +00:00
shannonjr
cb4efc3c00 Update to 0.9.4. Changes:
- Fix for filtering IDMEF field using the '!=' operator, which resulted in
  filtering of events where the field did not exist (#129).
- Implement a "move" command in preludedb-admin.
- When SQL query logging is enabled, log the time taken to execute the query.
- Improve plugin API by making it opaque so that existing plugin don't break
  if we add more SQL plugin function.
- Verbose error reporting, make the plugin error API viable for more drivers.
- Fix error reporting from perl and python bindings.
- Make libpreludedb header files c++ compiler friendly.
- Enforce listed IDMEF value ordering. IDMEF value were sometime unordered
  because of an uninitialized list position problem.
2006-02-08 16:35:18 +00:00
shannonjr
422f3dd3aa Update to 0.9.5. Changes:
- More TLS cleanup.
- Application can now report error without using specific prelude_client
  error reporting function.
- More work and improved verbose error reporting.
- Fix compilation problem with prelude_error_is_verbose() (#130).
Compilation problem on NetBSD 1.6 and OpenBSD has been fixed so patch-ad
is deleted.
2006-02-08 09:58:46 +00:00
lha
ae3b03d6dd http://www.pdc.kth.se/heimdal/releases/0.7.2/
http://www.pdc.kth.se/heimdal/advisory/2006-02-06/

Changes in Heimdal 0.7.2

* Fix security problem in rshd that enable an attacker to overwrite
  and change ownership of any file that root could write.
* Fix a DOS in telnetd. The attacker could force the server to crash
  in a NULL de-reference before the user logged in, resulting in inetd
  turning telnetd off because it forked too fast.
* Make gss_acquire_cred(GSS_C_ACCEPT) check that the requested name
  exists in the keytab before returning success. This allows servers
  to check if its even possible to use GSSAPI.
* Fix receiving end of token delegation for GSS-API. It still wrongly
  uses subkey for sending for compatibility reasons, this will change
  in 0.8.
* telnetd, login and rshd are now more verbose in logging failed and
  successful logins.
* Bug fixes
2006-02-07 12:20:52 +00:00
joerg
5911def816 Recursive revision bump / recommended bump for gettext ABI change. 2006-02-05 23:08:03 +00:00
shannonjr
64282fe5d3 Fix build problem on NetBSD 1.6, and possibly other operating systems, where
ENOTSUP is not defined.
2006-02-05 13:23:14 +00:00
rillig
9ca8fc9dfa Use BSD_INSTALL_* instead of INSTALL_*. 2006-02-05 01:30:55 +00:00
rillig
14a69d7967 Added botan. 2006-02-05 01:26:56 +00:00
rillig
d3ffdfe7f0 Imported botan from .
Botan (formerly OpenCL) aims to be a portable, easy to use, and efficient
C++ crypto library. It currently supports the following algorithms:

    Public Key Algorithms: Diffie-Hellman, DSA, ElGamal, Nyberg-Rueppel,
        Rabin-Williams, RSA
    Block Ciphers: Blowfish, CAST256, CAST5, CS-Cipher, DES, GOST, IDEA,
        Lion, Luby-Rackoff, MISTY1, RC2, RC5, RC6, Rijndael, SAFER-SK128,
        Serpent, SHARK, Skipjack, Square, TEA, Threeway, Twofish, XTEA
    Stream Ciphers: ARC4, ISAAC, SEAL
    Hash Functions: HAVAL, MD2, MD4, MD5, RIPEMD-128, RIPEMD-160, SHA-1,
        SHA2-256, SHA2-512, Tiger, Whirlpool
    MACs: EMAC, HMAC, MD5-MAC, ANSI X9.19 MAC
    Misc: Adler32, CRC24, CRC32, Randpool, X9.17 RNG
    Cipher Modes: CBC w/ Padding, CTS, CFB, OFB, Counter

Packaged by Aleksandar Simic <asimic@gmail.com>.
2006-02-05 01:25:12 +00:00
adrianp
b35d239cf2 Update PLIST that was missed in the recent update 2006-02-05 00:27:16 +00:00
adrianp
3840d7f7ba Update to 0.11
> -server implementation development. I won't document it before it even works.
> -small bug corrected when connecting to sun ssh servers.
> -channel wierdness corrected (writing huge data packets)
> -channel_read_nonblocking added
> -channel bug where stderr wasn't correctly read fixed.
> -sftp_file_set_nonblocking added. It's now possible to have nonblocking SFTP IO
> -connect_status callback.
> -priv.h contains the internal functions, libssh.h the public interface
> -options_set_timeout (thx marcelo) really working.
> -tcp tunneling through channel_open_forward.
> -channel_request_exec()
> -channel_request_env()
> -ssh_get_pubkey_hash()
> -ssh_is_server_known()
> -ssh_write_known_host()
> -options_set_ssh_dir
> -how could this happen ! there weren't any channel_close !
> -nasty channel_free bug resolved.
> -removed the unsigned long all around the code. use only u8,u32 & u64.
> -it now compiles and runs under amd64 !
> -channel_request_exec()
> -channel_request_env()
> -ssh_get_pubkey_hash()
> -ssh_is_server_known()
> -ssh_write_known_host()
> -options_set_ssh_dir
> -how could this happen ! there weren't any channel_close !
> -nasty channel_free bug resolved.
> -removed the unsigned long all around the code. use only u8,u32 & u64.
> -it now compiles and runs under amd64 !
> -channel_request_pty_size
> -channel_change_pty_size
> -options_copy()
> -ported the doc to an HTML file.
> -small bugfix in packet.c
> -prefixed error constants with SSH_
> -sftp_stat, sftp_lstat, sftp_fstat. thanks Michel Bardiaux for the patch.
> -again channel number mismatch fixed.
> -fixed a bug in ssh_select making the select fail when a signal has been caught.
> -keyboard-interactive authentication working.
2006-02-05 00:20:17 +00:00
adrianp
fbe36b6a17 Update to 5.2
> Release 5.2
> ###########
> * Again again some fixed for the ssh2 module. This is the last try. If it
>   finally does not work reliable, I am throwing out that library!
>   Thanks to bykhe@mymail.ch for the patch
> * Added a new module: VMWare-Auth! Thanks to david.maciejak@gmail.com!
>
>
> Release 5.1
> ###########
> * Again some fixed for the ssh2 module. Sorry. And still it might not work
>   in all occasions. The libssh is not as mature as we all wish it would be :-(
> * HYDRA_PROXY_AUTH was never used ... weird that nobody reported that. fixed.
> * Fixed bug in the base64 encoding function
> * Added an md5.h include which is needed since openssl 0.9.8
> * Added an enhacement to the FTP module, thanks to piotr_sobolewski@o2.pl
> * Fixed a bug when not using passwords and just -e n/s
>
>
> Release 5.0
> ###########
> ! THIS IS A THC - TAX - 10TH ANNIVERSARY RELEASE ! HAVE FUN !
> * Increadible speed-up for most modules :-)
> * Added module for PC-Anywhere, thanks to david.maciejak(at)kyxar.fr!
> * Added module for SVN, thanks to david.maciejak(at)kyxar.fr!
> * Added --disable-xhydra option to configure, thanks to david.maciejak(at)kyxar.
> fr!
>   - he is becoming the top supporter :-)
> * Added module for SIP (VoIP), thanks to gh0st(at)staatsfeind.org
> * Added support for newer sap r/3 rfcsdk
> * Added check to the telnet module to work with Cisco AAA
> * Fix for the VNC module, thanks to xmag
> * Small enhancement to the mysql plugin by pjohnson(at)bosconet.org
>
>
> Release 4.7
> ###########
> * Updated ssh2 support to libssh v0.11 - you *must* use this version if
>   you want to use ssh2! download from http://www.0xbadc0de.be/?part=libssh
>   This hopefully fixes problems on/against Sun machines.
>   After fixing, I also received a patch from david maciejak - thanks :-)
> * Added an attack module for rlogin and rsh, thanks to
>   david.maciejak(at)kyxar.fr!
> * Added an attack module for the postgres database, thanks to
>   diaul(at)devilopers.org! (and again: david maciejak sent on in as well)
> * JoMo-Kun sent in an update for his smbnt module. cool new features:
>   win2k native mode, xp anonymous account detection, machine name as password
> * Hopefully made VNC 3.7 protocol versions to work. please report.
> * Switched http and https service module to http-head, http-get and
>   https-get, https-head. Some web servers want HEAD, others only GET
> * An initial password for cisco-enable is now not required anymore. Some
>   people had console access without password, so this was necessary.
> * Fixed a bug in xhydra which did not allow custom ports > 100
> ! Soon to come: v5.0 - some cool new features to arrive on your pentest
>   machine!
2006-02-05 00:18:29 +00:00
wiz
2fd3200308 Add x11 option to ssh2 package.
Remove obsolete ssh2-nox11 package.
Replaces PR 32716 by Tracy Di Marco White.
2006-02-04 00:33:17 +00:00
xtraeme
83c21bc372 Remove gnustep-ssl (hi adam) 2006-02-01 02:51:16 +00:00
shannonjr
a1e02088fa Corrected problem in rc.subr script preventing PID referencing commands
from working.
2006-01-31 18:25:43 +00:00
shannonjr
9a8296d666 Update to 0.9.2. Changes:
- prelude-manager has been updated to check the loaded revocation
  list, if available. This was needed since the recent prelude-adduser
  addition allowing to create analyzer revocation list.
- Remove line size limitation on specified IDMEF-criteria.
- Remove all ancillary groups as well as setgid-ing.
- Fix idmef-criteria-filter option conflict.
- Fix a possible crash if no listen address is specified, but a
  reverse relay is used.
- Much better error reporting.
Prelude-Manager is a high availability server that accepts secured
connections from distributed sensors or other managers and saves
received events to a media specified by the user (database, logfile,
mail, etc).
2006-01-31 17:54:10 +00:00
shannonjr
b46d18bf32 Update to 0.9.3. Changes:
- More accurate error reporting in preludedb-admin.
- Fix NULL error in case the buffer is too small, truncate.
- Fix license notice, stating clearly that linking from a program
  using a GPL compatible license is allowed. Required for Debian package
  inclusion.
The PreludeDB Library provides an abstraction layer upon the type and
the format of the database used to store IDMEF alerts.
2006-01-31 17:51:36 +00:00
shannonjr
68ec7443f1 Update to 0.9.2. Changes:
- Get rid of the 1024 characters per line limitation (defined as per
  the syslog RFC), since LML is not limited to parsing input from syslog
  anymore.
- Handle events in Clamav logging format as well as syslog.
- Abstracted Squid chain regex to allow parsing of data directly
  from Squid log files.
- Introduced support for openhostapd.
- Began expanding rulesets with additional_data and vendor-specific
  classification data.
- Various ruleset updates and bug fixes.

Prelude-LML is a signature based log analyzer monitoring logfile and
received syslog messages for suspicious activity. It handle events
generated by a large set of components, including but not limited to:
BigIP, Grsecurity, Honeyd, ipchains, Netfilter, ipfw, Nokia ipso,
Nagios, Norton Antivirus Corporate Edition, NTsyslog, PAM, Portsentry,
Postfix, Proftpd, ssh, etc.
2006-01-31 10:46:31 +00:00
shannonjr
aa2cd422bc Update to 0.9.4. Changes:
- Some useful API addition.
- Much improved, verbose error reporting.
- Cleaned up TLS handling, various bugfix.
- In case an error occur when verifying the peer certificate,
  notify the peer about the failure.

The Prelude Library is the glue that binds all aspects of Prelude
together. It is a library which enables Prelude components to
communicate with the Prelude Manager. It also makes it easy for third
party software to be made 'Prelude Aware' (able to communicate with
Prelude components). It provide common, useful features used by every
sensor.
2006-01-31 10:44:45 +00:00
joerg
6993145e20 OpenSSL 0.9.7 doesn't work with unsigned char in this parts, so try
to conditionalize it for OpenSSL 0.9.8 and newer.
2006-01-31 09:47:04 +00:00
adam
40debec691 Removed, because SSL functionality and bundle is already present in gnustep-base 2006-01-29 21:35:40 +00:00
adam
b309c06d58 Changes 2.2.6:
* Bug fixes
2006-01-29 17:05:54 +00:00
shannonjr
01ee86e337 Added several new prelude packages: libprelude, libpreludedb, prelude-lml,
prelude-manager, and py-prewikka.
2006-01-29 16:04:22 +00:00
shannonjr
a22c5267d6 Prelude is a hybrid IDS consisting of multiple
sensors, managers, and a display console. This
is the display console.

This is one of several new Prelude packages.
2006-01-29 16:00:44 +00:00
shannonjr
cc0f1ca830 Prelude is a hybrid IDS consisting of multiple
sensors, managers, and a display console. This
is the manager. The Manager (there can be several
in an IDS network) accepts secured connections
from sensors and saves the alerts that Sensors
emit. This package installs the manager so that
mySql is used for alert storage.

This is one of several new Prelude packages.
2006-01-29 15:57:49 +00:00
shannonjr
ea1490c7aa Prelude is a hybrid IDS consisting of multiple
sensors, managers, and a display console.
Prelude-lml is the log file analyzer. It scans
system log files and generates IDMEF alerts to
the prelude-manager based on signature rulesets.

This is one of sever new Prelude packages.
2006-01-29 15:56:42 +00:00
shannonjr
8586b15a4e Prelude is a hybrid IDS consisting of multiple
sensors, managers, and a display console. This
is Prelude DB Library. It allow the interface
allowing Prelude to use a DBMS for alert storage.
While libprelude support a choice of MySQL or
postgreSQL, this package uses MySQL because it
was nearly an order of magnitude faster during
test operation.

This is one of several new packages in the Prelude family.
2006-01-29 15:55:25 +00:00
shannonjr
33cbcbfe63 Prelude is a hybrid IDS consisting of multiple
sensors, managers, and a display console. LibPrelude
is the glue that binds all aspects of Prelude together.
LibPrelude is a library which enables Prelude
components to communicate in a standard IDMEF method.

This is one of several new packages in the Prelude family.
2006-01-29 15:54:04 +00:00
ben
20eb0603c5 Fix another typo. Will avoid this problem in the future with pkglint. 2006-01-28 15:15:39 +00:00
ben
a6527a54a8 Correct typo in distinfo. 2006-01-28 00:19:56 +00:00
joerg
2646e50baa DragonFly has libutil.h like FreeBSD. Include sys/time.h to get
struct timeval on DragonFly. Use BSD_INSTALL_PROGRAM, removing
the unportable -r flag at the same time. Fix build with newer
OpenSSL versions by including openssl/sha.h explicitly.
2006-01-27 18:08:10 +00:00
joerg
9d2800c9e7 Needs openssl/md5.h. 2006-01-27 17:48:22 +00:00
joerg
67630b6afe Fix errno. Replace uchar_t usage with unsigned char directly, the file
got patched anyway. Add DragonFly. Nuke some more prototypes in files
already touched.
2006-01-27 17:33:55 +00:00
joerg
601ef90e28 Make the setup.py hack a bit more likely to work:
/usr/pkg/include and /usr/include can appear in any order, PREFIX can be
!= /usr/pkg.

XXX Why this hack and not split + filter to remove the include pathes?
2006-01-27 17:13:56 +00:00
markd
2fdc490240 If using a system builtin heimdal and that heimdal doesn't have a
krb5-config then create one to use in the buildlink tree.  Useful
for packages that expect krb5-config to exist to determine kerberos
existence/locations.
2006-01-26 22:46:15 +00:00
ben
cfb3b40116 Fix typo in distinfo. This addresses PR#32639 and is related to PR#32620. 2006-01-26 14:32:33 +00:00
ben
43d7d70728 Update fprot-workstation-bin to version 4.6.5.
This addresses pr/32620, using the patch provided by Christian Gall.

Notable changes include:
* Fixed an endless loop encountered in a corrupted WMF sample.
* A bug in the ELF scanner could cause a crash.
* Using a symlink as a path element to f-protd could cause f-protd not to
  start.
* A race issue with startproc (start-stop-daemon in LSB terms) could lead
  to old DEF files being used by f-protd even after updates.
* UPX packed files could cause crash on Solaris/sparc.
* Better handling for corrupt mime files.
* A bug in MS office scanner on big-endian platforms was fixed.
* Anomy extended to do content-type fingerprinting which allows
  scan-mail.pl to block attachments with false extension based on their
  'real' extensions,
  e.g. .wmf files claiming to be .jpg or .png files.
* A bug in scan-mail.pl's rc-script, which could cause problems in Debian
  when shutting scan-mail.pl down, has been fixed.
* Tweaks and optimizations should improve scanning speed by appr. 15-40%
  over previous releases.
* Engine version 3.16.10 will now try to scan zip files which falsly claim
  to use 64-bit compression methods. 64 bit compression is not supported,
  but the scanner will now try to scan those files using 32 bit methods.
* Improved handling of some types of corrupt files, which were previously
  skipped with I/O error.
* A corrupt arj file could crash the scanner. This has been fixed.
* Fixed a bug in scan-mail.pl where attachments would sometimes be left in
  quarantine.
* Trying to scan a device special file now results in non-zero exit code.
* Scanning of redirected stdin is now possible, e.g. 'f-prot /dev/fd/0 <
  /path/to/file'
2006-01-26 04:48:26 +00:00
jlam
699a4aaefb Force Heimdal to compile its own compile_et by telling the configure
script not to find any system-installed compile_et.

(This should really be done by using our own PATH that doesn't include
any system paths, but we're not quite ready to do that yet.)
2006-01-25 03:47:51 +00:00
wiz
def1995d7e security/heimdal and net/openafs conflict because of:
bin/compile_et
bin/kpasswd
bin/pagsh

Addresses PR 32610 and PR 32612 by Ola Eriksson.
2006-01-24 18:56:23 +00:00
wiz
e48cb1d6fe security/heimdal and arla conflict with each other because of:
bin/mk_cmds
lib/libroken.la
lib/libsl.la
lib/libss.la
man/man3/arg_printusage.3
man/man3/getarg.3

Addresses PR 32610 and PR 32611 by Ola Eriksson.
2006-01-24 18:55:21 +00:00
wiz
768c589c29 Bump BUILDLINK_RECOMMENDED of textproc/expat to 2.0.0 because
of the shlib major bump.
PKGREVISION++ for the dependencies.
2006-01-24 07:31:52 +00:00
recht
87d6f18252 update to 1.9
Patch submitted in PR 32598 by pancake <at> phreaker <dot> net

In other words:
- Add more checks and fixups on the engine.
- More keywords in wordlists database.
- Add new mode called 'silent mode'
- more charsets availables for gendict
- add some more examples
- add fine tuning for words in NEC=200
2006-01-23 07:51:47 +00:00
schwarz
9139d90c38 extended patch-aa to make sure Makefile will honor pkgsrc's CFLAGS settings 2006-01-22 22:01:38 +00:00
wiz
bb55c1bb23 Update to 2.11:
2006-01-18   Gisle Aas

   Release 2.11

   Internal cleanup to avoid some compiler warnings.
2006-01-22 20:31:29 +00:00
jlam
758d912e33 Update package Makefile now that bsd.pkg.extract.mk is using the
"extract" script for extraction.  Many cases where a custom EXTRACT_CMD
simply copied the distfile into the work directory are no longer
needed.  The extract script also hides differences between pax and
tar behind a common command-line interface, so we no longer need code
that's conditional on whether EXTRACT_USING is tar or pax.
2006-01-21 18:57:40 +00:00
wiz
3215ff4d7f long != time_t on x86_64; add patch trying to fix resulting build problem. 2006-01-20 22:09:11 +00:00
wiz
be524c46d9 Drop trailing whitespace. 2006-01-20 22:08:35 +00:00
adam
138d487004 Changes 1.3.3:
** New API to access the TLS master secret.
When possible, you should use the TLS PRF functions instead.

** Improved handling when multiple libraries use GnuTLS at the same time.
Now gnutls_global_init() can be called multiple times, and
gnutls_global_deinit() will only deallocate the structure when it has
been called as many times as gnutls_global_init() was called.

** Added a self test of TLS resume functionality.

** Fix crash in TLS resume code, caused by TLS/IA changes.

** Add 'const' keywords in various places, from Frediano ZIGLIO.

** The code was indented again, including the external header files.

** API and ABI modifications:
New functions to retrieve the master secret value:
  gnutls_session_get_master_secret

Add a 'const' keyword to existing API:
  gnutls_x509_crq_get_challenge_password
2006-01-20 21:14:04 +00:00
joerg
5a50bc13ef Use x11.b3.mk instead of setting USE_X11BASE. Suggested by wiz@ 2006-01-20 21:02:51 +00:00
joerg
30c4d198d1 Always set USE_X11BASE, which is needed when neither GTK nor Qt is
specified. Bump revision due to changed dependencies.
2006-01-20 20:45:42 +00:00
wiz
b8a2a98b06 Complete move of p5-SSLeay to p5-Crypt-SSLeay 2006-01-20 20:39:06 +00:00
wiz
1ca4593f2e Re-import security/p5-SSLeay as security/p5-Crypt-SSLeay, to
make the directory name match PKGNAME.
2006-01-20 20:08:53 +00:00
jmmv
d971a332da Drop maintainership. I can't seriously be the maintainer of so many
packages - specially of packages that I haven't touched for a long
while or those that other people can handle better than me.
2006-01-20 16:15:52 +00:00
joerg
878a8b95fc Fix GCC 3.4+: __FUNCTION__ doesn't permit string concat, like __func__. 2006-01-20 01:06:22 +00:00
joerg
875d86835f Fix errno. 2006-01-20 00:55:35 +00:00
joerg
1b3b894f21 Patch configure's libtool.m4 fragment for DragonFly. 2006-01-20 00:43:04 +00:00
joerg
2033572e6e va_arg has to consider int promotion of char. 2006-01-20 00:37:45 +00:00
joerg
2ccbb422f9 Use sa_family_t hack only on NetBSD, other platforms might be added
later if necessary.
2006-01-20 00:24:42 +00:00
joerg
f6dc798549 Try to catch up with OpenSSL 0.9.8 API. 2006-01-20 00:21:27 +00:00
joerg
ed68fd5c17 DragonFly support. 2006-01-19 23:58:28 +00:00
joerg
48e94040e3 Prefer NAME_MAX over MAXNAMLEN. 2006-01-19 23:53:54 +00:00
joerg
049b514627 limits.h is ISO C, unconditionally include it. Keep conditional for
sys/syslimits.h though.
2006-01-19 23:42:11 +00:00
joerg
942c825670 Add DragonFly support. 2006-01-19 23:39:19 +00:00
jlam
6fbe86c997 Remove unnecessary DECOMPRESS_CMD setting, which is automatically taken
care if in bsd.pkg.extract.mk based on the EXTRACT_SUFX.
2006-01-19 23:00:24 +00:00
adrianp
274d494b20 Update to 1.8
Grab maintainership
From the ChangeLog (Summarised)
>         * ike-backoff-patterns: Added backoff patterns for Netgear ProSafe
>           and Netgear ADSL Firewall Router.  Submitted by Paul Askew.
>         * ike-scan.c, ike-scan.h, configure.ac: Added new --writepkttofile
>           option.  This option writes the output packet to the specified file
>           rather than sending it to the remote host.  It is intended for
>           debugging and testing purposes, to allow the IKE packet to be
>           easily checked.  This option is not documented, because it is
>           designed purely for testing.
>         * check-packet: New test to check IKE scan packet data.  Currently
>           tests two sample packets: one default proposal, and one custom
>           proposal.
>         * ike-scan.c: Added --exchange option to allow the exchange field
>           in the ISAKMP header to be set to arbitrary values.
>         * ike-scan.c, isakmp.c: Added --hdrflags and --hdrmsgid options to
>           allow Flags and MsgID fields in the ISAKMP header to be specified.
>         * ike-scan.c: Added --cookie option to allow the initiator cookie in
>           the ISAKMP header to be set to a static value.
>         * ike-scan.c, isakmp.c: Add --spisize option to allow a random SPI
>           of the specified size to be added to the proposal payload.
>         * ike-vendor-ids: Added 16 new Vendor IDs, and revised some comments
>           on existing entries.
>         * ike-scan.c: Added --doi (-D) and --situation (-S) options to allow
>           the DOI and Situation in the SA of the outbound packets to be changed
>           from the default of DOI_IPSEC and SIT_IDENTITY_ONLY.
>         * ike-scan.c: Added --protocol (-j) and --transid (-k) options to
>           allow the proposal protocol and transform id of the outbound packets
>           to be changed from the defaults.
>         * ike-scan.c: Added --certreq (-C) option to add a
>           CertificateRequest payload to the outgoing packet.
>         * ike-scan.c: Added --headerlen (-L) option to allow the ISAKMP header
>           length to be manually specified.  Normally, ike-scan will
>           automatically calculate the correct length; however, you can use this
>           option if you want to use an incorrect length value instead.
>         * ike-scan.c, isakmp.c: Added --mbz (-Z) option to allow the value for
>           the reserved (MBZ) fields to be set to non-zero values.  Doing so
>           will make the outgoing packet non-RFC compliant.
>         * ike-scan.c, isakmp.c: Added --headerver (-E) option to allow the
>           version field in the ISAKMP header to be altered from the default of
>           0x10 (v1.0).
>         * ike-scan.c: Added --bandwidth (-B) option to allow the outgoing
>           bandwidth to be specified directly instead of using --interval.
>           The --bandwidth option calculates the appropriate interval setting,
>           taking into account the size of the packet.
>         * ike-scan.c: Added --noncelen (-c) option to allow the length of the
>           nonce data to be changed.  This is only applicable to aggressive
>           mode.
2006-01-18 21:37:01 +00:00
heinz
3bae5aea8f Updated to version 4.40.
This fixes PR pkg/30290 by Nicolas Joly so the latest DAT files are working
again.

- Moved included DAT-files to shares/examples/uvscan/.
- Works with PKG_CONFIG=no.
- PDF manual included in share/doc/uvscan/.
- Some small improvements to update_dat.sh:
    Option "-h" shows the available options.
    All the "exit" statements use distinct values.
    Fixed a small logic bug (-z vs. -n).

Changes according to McAfee's website:
-   Includes technology to combat the latest and
    future threats.
-   Improved detection and cleaning.
-   Support for many more Packed Executable formats
    in which known malware is often re-packaged
    for obfuscation purposes.
-   Specific detection and reporting of files
    compressed or packaged with known suspicious
    applications.
-   Enhancements to the emergency DAT file (EXTRA.DAT)
    structure allowing a larger DAT file size.
-   Enhancements to enable scanning of non-standard
    ZIP archives.
2006-01-15 22:27:27 +00:00
adrianp
91f591c243 Add PYTHONINSPECT to the list of environment variables to clean
Fix for http://secunia.com/advisories/18358/
Bump to nb1
2006-01-15 11:32:06 +00:00
wiz
b65cbc2359 Update to 0.13.1, based on patches from recht@ via tech-pkg.
Additionally, fix it to compile against openssl-0.9.7i, the
current pkgsrc version; due to its way of checking compatibility,
py-m2crypto is extremely picky about constness.
If this works with other versions too, just add them to the pattern.

 Changes since 0.12/0.11
-------------------------
- Patches from Artur Frysiak. Thanks Artur.
  = Allow using a passphrase callback in class SMIME.
  = Added method get0_signers to class PKCS7, which retrieves signers'
    certificates from a PKCS7 blob.
  = Added methods as_pem and save_pem to class X509.
  = Added file version.py.
  = Allow SSL.Context.load_verify_locations to accept both 'cafile' and
    'capath'.
- Fixed BIO.read() not reading until EOF. Thanks to Egil Muller
  for suggestion.
- Honour 'mode' parameter in SSL.Connection.makefile. Thanks again to Egil
  Muller.
- Roger Binns contributed epydoc-generated docs for M2Crypto. Thanks Roger.
- Peter Teniz contributed patches to create X.509 requests and certificates.
  Thanks Peter.
- Updated Medusa to 0.54.
- Make various OpenSSL bignum functions (written long ago) available to Python.
2006-01-14 23:07:26 +00:00
ghen
9598e44942 Use mk/mysql.buildlink3.mk instead of databases/mysqlX-client/bl3.mk,
same for pgsql.bl3.mk.  Bump PKGREVISION.  Ok by wiz.
2006-01-10 12:39:03 +00:00
wiz
44d5c12556 Does not need qt3-tools at runtime.
Change to build dependency and bump PKGREVISION.
2006-01-09 20:45:44 +00:00
cube
fa24fed649 Sync with latest sudo release (1.6.8pl12). The actual diff is one line
long.  PR#32378 by Stefan Krüger.

Changes:
     Added PS4 and SHELLOPTS to the list of variables to remove from
     the environment.     (Already in pkgsrc)
     Added JAVA_TOOL_OPTIONS to the list of variables to remove from
     the environment.
     Added PERLLIB, PERL5LIB and PERL5OPT to the list of variables to
     remove from the environment.     (Already in pkgsrc)
2006-01-09 15:53:40 +00:00
xtraeme
eadc9131c8 Bump PKGREVISION due to mysql.buildlink3.mk changes (default mysql
pkg has been changed to 5.x). Reminded by wiz... thanks.
2006-01-08 18:35:08 +00:00
joerg
cc3a3f0ab8 Use SUBST framework. gtar used as run time depency -> added, revision
bumped.
2006-01-06 16:44:04 +00:00
wiz
751d30d637 DEPENDS and PKGREVISION bumps because db4's library name changed. 2006-01-06 15:10:01 +00:00
shannonjr
1e98093f39 Update to 1.9.20. This is a bugfix release. 2006-01-06 11:05:18 +00:00
shannonjr
7d4498232c Update to 0.9.3. This is a bug fix release. 2006-01-06 10:21:33 +00:00
shannonjr
1d61d6adb1 Update to 0.9.13. This is a bug fix release. 2006-01-06 09:55:52 +00:00
joerg
c1cf303452 Fix compilation with OpenSSL 0.9.8. 2006-01-05 19:00:11 +00:00
ghen
455345bb5b Change the default for BUILDLINK_DEPMETHOD.qt3-tools from "full" to "build",
without affecting packages that are currently using it.

Packages which previously didn't set BUILDLINK_DEPMETHOD to neither "full" nor
"build" now set it to "full", but should be checked whether they really need it
(comment added).  Packages which previously set it to "build" now don't set it
anymore.

Ok by jlam, wiz.
2006-01-05 10:08:58 +00:00
schmonz
42428df5a0 Express these packages' brokenness with BROKEN_IN=pkgsrc-2005Q4
rather than PKG_FAIL_REASON, so that they provide useful error
messages in build logs, and so that they continue to work on platforms
where they aren't broken.
2006-01-04 04:29:05 +00:00
adrianp
c717f9c7a6 Add:
security/base
2006-01-03 21:10:39 +00:00
adrianp
00ae2c0b89 The Basic Analysis and Security Engine (BASE) is a PHP-based analysis
engine to search and process a database of security events generated by
various IDSes, firewalls, and network monitoring tools.  The features currently
include:

o Query-builder and search interface for finding alerts matching
  on alert meta information (e.g. signature, detection time) as well as
  the underlying network evidence (e.g. source/destination address, ports,
  payload, or flags).

o Packet viewer (decoder) will graphically display the layer-3 and
  layer-4 packet information of logged alerts

o Alert management by providing constructs to logically group alerts
  to create incidents (alert groups), deleting the handled alerts or
  false positives, exporting to email for collaboration, or archiving of
  alerts to transfer them between alert databases.

o Chart and statistic generation based on time, sensor, signature, protocol,
  IP address, TCP/UDP ports, or classification
2006-01-03 21:09:44 +00:00
taca
435219cbd2 Bump PKGREVISION by update of ruby18-base package. 2006-01-03 15:07:28 +00:00
taca
dccd827fac Stop handling DIST_SUBDIR default for Ruby based packages.
Second, update distinfo and/or stop using USE_RUBY_DIST_SUBDIR in Makefiles.
2006-01-03 14:25:49 +00:00
jlam
d219a04c13 Update security/courier-authlib to 0.58. Changes from version 0.57 include:
* Re-enable pam_acct_mgmt hook.
	* Add support for shadow password expiration.
	* Configurable daemon socket timeout,
	* Add a section for LDAP environment variable options.
	* Replace LDAP_SERVER and LDAP_PORT settings with LDAP_URI,
	  which obsoletes LDAP_TLS.
	* Fix LDAP error checking.
2006-01-03 03:50:45 +00:00
joerg
9316d2ca37 strnstr exists on DragonFly, use the system version instead of the
conflicting local version.
2006-01-02 22:40:19 +00:00
schmonz
5704d2a38a Add hack to fix build on OS X with BIND9 system resolver. 2006-01-02 19:49:01 +00:00
adrianp
ec2258fddc Update chkrootkit to 0.46a
Add a MESSAGE about false-positive results on non-supported platforms
Helps to address PR# 31813 reported by Eric Mumpower
From the README:
02/22/2005 - Version 0.45  chkproc.c: better support for Linux
                           threads.  New rootkit detected: Fu,
                           Kenga3, ESRK.  New test: chkutmp.  -n
                           option improvement.  Minor bug fixes.
10/26/2005 - Version 0.46  chkproc.c: more fixes to better support
                           Linux threads. chkutmp.c: improved
                           execution speed.  chkwtmp.c: segfault
                           fixed.  New rootkit detected: rootedoor.
                           Mac OS X support added.  Minor bug fixes.
10/28/2005 - Version 0.46a chkproc.c: bug fix for FreeBSD: chkproc
                           was sending a SIGXFSZ (kill -25) to init,
			   causing a reboot.
2006-01-02 18:42:18 +00:00
wiz
8aeccee461 Update to 2.36:
2005-11-30   Gisle Aas

   Release 2.36

   Fix documentation typo.



2005-11-26   Gisle Aas

   Release 2.35

   Forgot to incorporate fixes already applied to bleadperl :-(
     - doc typo
     - consting
     - unused my_na
     - USE_HEAP_INSTEAD_OF_STACK for Symbian



2005-11-26   Gisle Aas

   Release 2.34

   Document that it is now easy to generate different messages that produce the
   same MD5 digest.

   Use XSLoader; perl-5.6 is now required.

   Tweaks to the processing of $? after running the test program.
2006-01-01 22:29:57 +00:00
wiz
2b5cb4e3db Update to 1.14:
2005-11-26   Gisle Aas

   Release 1.14

   Documentation tweaks.
2006-01-01 22:19:44 +00:00
wiz
f61c002199 Recursive PKGREVISION bump for gnutls shlib major bump.
Bump BUILDLINK_RECOMMENDED.
2005-12-31 12:32:31 +00:00
wiz
c3de76fa9d Update to 1.3.2 bumped library major version -- bump BUILDLINK_RECOMMENDED. 2005-12-31 11:20:11 +00:00
wiz
814835f51a Update to 0.4.6:
Changes in version 0.4.6 are:
* Confirm password when selecting new password
2005-12-31 00:09:56 +00:00
wiz
29458ff754 Update to 1.3.2:
* Version 1.3.2 (released 2005-12-15)

** GnuTLS now support TLS Inner application (TLS/IA).
This is per draft-funk-tls-inner-application-extension-01.  This
functionality is added to libgnutls-extra, so it is licensed under the
GNU General Public License.

** New APIs to access the TLS Pseudo-Random-Function (PRF).
The PRF is used by some protocols building on TLS, such as EAP-PEAP
and EAP-TTLS.  One function to access the raw PRF and one to access
the PRF seeded with the client/server random fields are provided.
Suggested by Jouni Malinen <jkmaline@cc.hut.fi>.

** New APIs to acceess the client and server random fields in a session.
These fields can be useful by protocols using TLS.  Note that these
fields are typically used as input to the TLS PRF, and if this is your
intended use, you should use the TLS PRF API that use the
client/server random field directly.  Suggested by Jouni Malinen
<jkmaline@cc.hut.fi>.

** Internal type cleanups.
The uint8, uint16, uint32 types have been replaced by uint8_t,
uint16_t, uint32_t.  Gnulib is used to guarantee the presence of
correct types on platforms that lack them.  The uint type have been
replaced by unsigned.

** API and ABI modifications:
New functions to invoke the TLS Pseudo-Random-Function (PRF):
  gnutls_prf
  gnutls_prf_raw

New functions to retrieve the session's client and server random values:
  gnutls_session_get_server_random
  gnutls_session_get_client_random

New function, to perform TLS/IA handshake:
  gnutls_ia_handshake

New function to decide whether to do a TLS/IA handshake:
  gnutls_ia_handshake_p

New functions to allocate a TLS/IA credential:
  gnutls_ia_allocate_client_credentials
  gnutls_ia_free_client_credentials
  gnutls_ia_allocate_server_credentials
  gnutls_ia_free_server_credentials

New functions to handle the AVP callback:
  gnutls_ia_set_client_avp_function
  gnutls_ia_set_client_avp_ptr
  gnutls_ia_get_client_avp_ptr
  gnutls_ia_set_server_avp_function
  gnutls_ia_set_server_avp_ptr
  gnutls_ia_get_server_avp_ptr

New functions, to toggle TLS/IA application phases:
  gnutls_ia_require_inner_phase

New function to mix session keys with inner secret:
  gnutls_ia_permute_inner_secret

Low-level API (used internally by gnutls_ia_handshake):
  gnutls_ia_endphase_send
  gnutls_ia_send
  gnutls_ia_recv

New functions that can be used after successful TLS/IA negotiation:
  gnutls_ia_generate_challenge
  gnutls_ia_extract_inner_secret

Enum type with TLS/IA modes:
  gnutls_ia_mode_t

Enum type with TLS/IA packet types:
  gnutls_ia_apptype_t

Enum values for TLS/IA alerts:
  GNUTLS_A_INNER_APPLICATION_FAILURE
  GNUTLS_A_INNER_APPLICATION_VERIFICATION

New error codes, to signal when an application phase has finished:
  GNUTLS_E_WARNING_IA_IPHF_RECEIVED
  GNUTLS_E_WARNING_IA_FPHF_RECEIVED

New error code to signal TLS/IA verify failure:
  GNUTLS_E_IA_VERIFY_FAILED

* Version 1.3.1 (released 2005-12-08)

** Support for DHE-PSK cipher suites has been added.
This method offers perfect forward secrecy.

** Fix gnutls-cli STARTTLS hang when SIGINT is sent too quickly, thanks to
Otto Maddox <ottomaddox@fastmail.fm> and Nozomu Ando <nand@mac.com>.

** Corrected a bug in certtool for 64 bit machines. Reported
by Max Kellermann <max@duempel.org>.

** New function to set a X.509 private key and certificate pairs, and/or
CRLs, from an PKCS#12 file, suggested by Emile van Bergen
<emile@e-advies.nl>.

The integrity of the PKCS#12 file is protected through a password
based MAC; public-key based signatures for integrity protection are
not supported.  PKCS#12 bags may be encrypted using password derived
symmetric keys, public-key based encryption is not supported.  The
PKCS#8 keys may be encrypted using passwords.  The API use the same
password for all operations.  We believe that any more flexibility
create too much complexity that would hurt overall security, but may
add more PKCS#12 related APIs if real-world experience indicate
otherwise.

** gnutls_x509_privkey_import_pkcs8 now accept unencrypted PEM PKCS#8 keys,
reported by Emile van Bergen <emile@e-advies.nl>.
This will enable "certtool -k -8" to parse those keys.

** Certtool now generate keys in unencrypted PKCS#8 format for empty passwords.
Use "certtool -p -8" and press press enter at the prompt.  Earlier,
certtool would have encrypted the key using an empty password.

** Certtool now accept --password for --key-info and encrypted PKCS#8 keys.
Earlier it would have prompted the user for it, even if --password was
supplied.

** Added self test of PKCS#8 parsing.
Unencrypted and encrypted (pbeWithSHAAnd3-KeyTripleDES-CBC and
pbeWithSHAAnd40BitRC2-CBC) formats are tested.  The test is in
tests/pkcs8.

** API and ABI modifications:
New function to set X.509 credentials from a PKCS#12 file:
  gnutls_certificate_set_x509_simple_pkcs12_file

New gnutls_kx_algorithm_t enum type:
  GNUTLS_KX_DHE_PSK

New API to return session data (better data types than
gnutls_session_get_data):
  gnutls_session_get_data2

New API to set PSK Diffie-Hellman parameters:
  gnutls_psk_set_server_dh_params

* Version 1.3.0 (2005-11-15)

** Support for TLS Pre-Shared Key (TLS-PSK) ciphersuites have been added.
This add several new APIs, see below.  Read the updated manual for
more information.  A new self test "pskself" has been added, that will
test this functionality.

** The session resumption data are now system independent.

** The code has been re-indented to conform to the GNU coding style.

** Removed the RIPEMD ciphersuites.

** Added a discussion of the internals of gnutls in manual.

** Fixes for Tru64 UNIX 4.0D that lack MAP_FAILED, from Albert Chin.

** Remove trailing comma in enums, for IBM C v6, from Albert Chin.

** Make sure config.h is included first in a few files, from Albert Chin.

** Don't use C++ comments ("//") as they are invalid, from Albert Chin.

** Don't install SRP programs and man pages if --disable-srp-authentication,
from Albert Chin.

** API and ABI modifications:
New gnutls_kx_algorithm_t key exchange type: GNUTLS_KX_PSK

New gnutls_credentials_type_t credential type:
  GNUTLS_CRD_PSK

New credential types:
  gnutls_psk_server_credentials_t
  gnutls_psk_client_credentials_t

New functions to allocate PSK credentials:
  gnutls_psk_allocate_client_credentials
  gnutls_psk_free_client_credentials
  gnutls_psk_free_server_credentials
  gnutls_psk_allocate_server_credentials

New enum type for PSK key flags:
  gnutls_psk_key_flags

New function prototypes for credential callback:
  gnutls_psk_client_credentials_function
  gnutls_psk_server_credentials_function

New function to set PSK username and key:
  gnutls_psk_set_client_credentials

New function to set PSK passwd file:
  gnutls_psk_set_server_credentials_file

New function to extract PSK user in server:
  gnutls_psk_server_get_username

New functions to set PSK callback:
  gnutls_psk_set_server_credentials_function
  gnutls_psk_set_client_credentials_function

Use size_t instead of int for output size parameter:
  gnutls_srp_base64_encode
  gnutls_srp_base64_decode
2005-12-31 00:02:58 +00:00
agc
1d11f1bba1 Use an ${OPSYS}-specific message file for DragonFly, to get the right
local security information.

With thanks to Joerg Sonnenberger for the DragonFly help, and Trevor
Kendall for the original report.
2005-12-29 23:47:55 +00:00
kim
245cd1880b Avoid changing FS as it triggers an odd bug on some awk versions, with
incorrect field calculation for the second field if the first field is
numeric and there are only 2 fields total in the input record (line).

The buggy awk was in 2.99.* and early 3.99.*, and identifies itself as
awk version 20030729.  However, not all awk's with this version number
exhibit the problem (so it could be related to a library used by awk).

Recent 3.99.* builds don't have this problem, and the awk versio on
them is also much more recent.
2005-12-29 16:09:42 +00:00
jlam
dc9594e09d Remove USE_PKGINSTALL from pkgsrc now that mk/install/pkginstall.mk
automatically detects whether we want the pkginstall machinery to be
used by the package Makefile.
2005-12-29 06:21:30 +00:00
reed
b1302e5c43 Fix typo in DESCR.
Reword COMMENT (which also removes the typo).
2005-12-28 17:57:14 +00:00
reed
5e3987319b Add to description:
It includes a server, client and tools to generate server keys
 and to convert OpenSSH keys for Dropbear.
2005-12-27 23:46:51 +00:00
reed
bc76e08889 Use PKGMANDIR instead of hard-coded "man".
(No PKGREVISION bump because this is the default setting.)
2005-12-27 23:44:25 +00:00
reed
ea09735a45 Update patch to also use PKGMANDIR instead of "man" for the
MANDIR in the makefile.
2005-12-27 23:40:04 +00:00
reed
7c9b31870e Mention this is version 1 in the COMMENT. 2005-12-27 22:28:33 +00:00
joerg
856ac1a469 Add some more OpenSSL 0.9.7 fixes for DragonFly. 2005-12-27 22:28:08 +00:00
cube
b1be4f9165 Enable security/CSP. 2005-12-27 20:57:16 +00:00
cube
c789667891 Initial import of CSP, version 0.32, into the NetBSD Packages Collection. If
you think you might have read the openssl man pages one time too much for
your own sanity, you might like this package.

Certificate Service Provider is a perl wrapper around openssl that allows you
to run multiple simple certificate authorities (CAs).  CSP is designed to be
simple (almost to a fault) and is ideally suited to small PKIs (< 1000
entities) where security is paramount.  CSP is meant to be run on isolated,
offline computers while still allowing CRLs and certificate repositories to be
easily published.

The package includes a patch that lets the program run out-of-the-box,
without setting up CSPHOME and OPENSSL in the environment.  Defining them
is of course still permitted.
2005-12-27 20:56:17 +00:00
reed
2688ef6242 Remove paragraph about "MAILING LISTS". 2005-12-27 19:27:48 +00:00
reed
253ef99212 Sort. 2005-12-27 18:29:18 +00:00
seb
37d945e229 Lower expectations, both others' and mine: relinquish stewardship 2005-12-27 13:54:57 +00:00
schmonz
463f43526a Mark packages for pkgsrc-2005Q4 that don't build on NetBSD/i386
3.0. If one of these is important to you, please fix it in time
for pkgsrc-2006Q1, or it may be removed.
2005-12-26 23:39:30 +00:00
jlam
183c016e0d Add a non-conflicting definition for load_rc_config_var so that
platforms with older versions of /etc/rc.subr can run smbd.sh and
winbindd.sh without updating /etc/rc.subr.

Bump PKGREVISION to 2.
2005-12-21 04:17:49 +00:00
jlam
2558c0291d Change my MAINTAINER email address to the one I've been using for
pkgsrc work.
2005-12-17 05:20:21 +00:00
reed
08f031e16d Add security patch from
http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2005q4/000312.html

Noted by waldeck of hk2.uwaterloo.ca via pkgsrc-bugs.

Bump PKGREVISION.

Tested build on NetBSD and Linux. Tested dropbear server on NetBSD.

(This is during a freeze. Other stuff to be done later:
update to latest version. Install man pages. Mention "client" in
COMMENT and DESCR. Use CONF_FILES and sysconfdir. And maybe install the
"scp" tool also.)
2005-12-14 18:00:12 +00:00
joerg
c17a7eac38 Reset maintainer, mail server unreachable for one week. 2005-12-13 20:00:38 +00:00
bad
ab83ae98bf Update fwbuilder and libfwbuilder to 2.0.10.
Bugs fixed since 2.0.9:

    * bug #1349326 "ulogd option does not work". There was a typo in the
      class iptAdvancedDialog ( 'useULOG' instead of 'use_ULOG' )
    * bug #1315892: "fwbuilder crashes on missing OS template" The GUI
      crashed if user added new hostOS or firewall platform template under
      resources/os or resources/platforms, then reinstalled the package (and
      therefore lost their custom template files), then tried to open
      firewall or host OS settings dialog for the object using new template.
    * bug #1305933: "fwbuilder/Solaris: compilation errors". Another case of
      implicit type conversion QString->string which does not compile on
      systems with QT built w/o STL support.
    * bug #1304878: fwbuilder: signal.h required (Solaris). Using
      'AC_CHECK_HEADERS([signal.h])' in configure.in to check for the
      appropriate #include.
    * bug #1304764: "configure script: Sun make check fails". Need to use
      ${MAKE-make} instead of $ac_make when checking for GNU make.
    * bug #1304785: "fwbuilder - Solaris has no libutil". Using better way
      to check whether we need to link with libutil.



Bugs fixed in policy compiler for iptables since 2.0.9:

    * bug #1342495: "SNAT with address range". Compiler used to print
      warning "Adding virtual addresses for NAT is not supported for
      address range" even if adding virtual addresses for NAT was turned off.
    * bug #1313420: "OUTPUT chain is built wrong under certain conditions."
      Rules that have firewall in SRC and DST, while DST has negation,
      should be split so that the second generated rule goes into OUTPUT
      chain rather than FORWARD
2005-12-12 20:25:09 +00:00
joerg
1f6a39a84e First step at reworking Linux binary packages.
Change most pkgs to depend on either
emulators/suse_linux/Makefile.application (normal pkgs) or
Makefile.common (suse91 and suse themselves) to filter out Operating
Systems without Linux ABI support. Use CPU masks to limit the pkg to
supported platforms.
2005-12-12 14:43:23 +00:00
joerg
8d2e87a969 Since I don't want to hack around with config.*, patch amap to not
use the bundled pcre, but devel/pcre instead.
2005-12-11 19:21:36 +00:00
salo
3fe45256b1 Compile with the OpenSSL in NetBSD-current.
Patch from ssldump bug tracker, via <veego>.
2005-12-11 18:29:53 +00:00
salo
aab35a3fe8 Compile with the OpenSSL in NetBSD-current.
Patch from Debian bug tracker, via <veego>.
2005-12-11 18:26:03 +00:00
joerg
2140a7b833 Add DragonFly support. 2005-12-08 19:21:57 +00:00
joerg
acc26f4f54 Use NetBSD rules for DragonFly as well. Don't include both, net/bpf.h
and pcap.h, on DragonFly.
2005-12-08 19:14:47 +00:00
joerg
3983272167 Fix errno. 2005-12-08 19:08:28 +00:00
joerg
049c30ab6c Fix errno. 2005-12-08 18:37:53 +00:00
joerg
5b5148fb84 Fix OpenSSL test, it doesn't work out of the box on DragonFly
due to missing size_t.
2005-12-08 18:21:16 +00:00
joerg
e6533be81b Fix errno. Don't declare sys_nerr on FreeBSD and DragonFly. 2005-12-08 18:02:07 +00:00
joerg
a0b5618c74 Use FreeBSD config.h fragment on FreeBSD and DragonFly. 2005-12-08 17:46:16 +00:00
joerg
82b7232a70 Fix errno. 2005-12-08 17:36:56 +00:00
peter
967be747db Also check for the pfvar.h file in the subdirectory 'pf', DragonFly installs
it there.
2005-12-07 12:06:26 +00:00
peter
b41243c12c Change ONLY_FOR_PLATFORM to NetBSD 2.x. NetBSD 3 has pf in base so this
pkg is redundant on that version and on -current it doesn't even build
without errors.
2005-12-07 12:03:16 +00:00
wiz
1b71dba17d Add and enable p5-Crypt-SmbHash 2005-12-06 22:54:51 +00:00
wiz
2d062e0745 Import p5-Crypt-SmbHash-0.12 from pkgsrc-wip, packaged by Murray Armfield:
This module provides functions to generate LM/NT hashes used in Samba's
'password' files, like smbpasswd.
2005-12-06 22:53:24 +00:00
rillig
579e977969 Ran "pkglint --autofix", which corrected some of the quoting issues in
CONFIGURE_ARGS.
2005-12-05 23:55:01 +00:00
rillig
b71a1d488b Fixed pkglint warnings. The warnings are mostly quoting issues, for
example MAKE_ENV+=FOO=${BAR} is changed to MAKE_ENV+=FOO=${BAR:Q}. Some
other changes are outlined in

    http://mail-index.netbsd.org/tech-pkg/2005/12/02/0034.html
2005-12-05 20:49:47 +00:00
wiz
2baa0ef5e4 Just dirrm the docs dir -- nothing should add files there. 2005-12-03 20:19:04 +00:00
wiz
85674b6dbf Create installation directory to fix bulk build. 2005-12-03 20:18:52 +00:00
peter
e0f65041ed Add detection for pf from OpenBSD 3.8. 2005-12-02 12:23:45 +00:00
wiz
f40cea8002 Split multipatch into multiple patches. 2005-12-01 20:19:57 +00:00
wiz
f2a3f52f08 Do not suggest rsaref (testing artifact). 2005-12-01 20:18:29 +00:00
wiz
d6925aea5d Convert to options framework. 2005-12-01 20:17:48 +00:00
wiz
321a09857a Bump PKGREVISION for libgsf dependencies, and BUILDLINK_DEPENDS because
of the libgsf shlib major bump and associated BUILDLINK_DEPENDS bump.
2005-11-25 21:23:14 +00:00
wiz
9ef3264b2a Update to 5.31:
5.31  Mon Sep  5 00:52:42 MST 2005
	- added standard tests for pod and pod-coverage checking
	- inserted subtest to check for failure when using
		unrecognized SHA algorithm

5.30  Sat Aug 20 16:46:08 MST 2005
	- updated docs with recent NIST statement on SHA-1
		-- advises use of larger and stronger hash functions
			(i.e. SHA-224/256/384/512) for new developments

5.29  Sun Aug 14 04:48:34 MST 2005
	- added explicit casts in "shaload" routine (ref. "ldvals")
		-- thanks to E. Allen Smith for pointing out SGI compiler
			warnings on IPxx-irix platforms
	- updated docs with cautionary note about SHA-1
2005-11-23 22:40:48 +00:00
wiz
3b0cb2a3c6 Update to 1.13:
2005-10-18   Gisle Aas

   Release 1.13

   Fixed documentation typo.
2005-11-23 22:29:51 +00:00
wiz
e4827da336 Depend on p5-Sort-Versions instead of p5-SortVersions.
Bump PKGREVISION.
2005-11-22 22:43:03 +00:00
tron
e8de42870e Update "ipsec-tools" package to version 0.6.3. Changes since 0.6.1:
- Various bug fixes
- ISAKMP mode config works without Xauth

This update fixes the security vulnerability reported in SA17668.
2005-11-22 16:22:47 +00:00
agc
fd7082ab6c Update audit-packages to version 1.41
Fix PR 31957 - only report that we're using @PKG_SYSCONFDIR@/audit-packages.conf
if we're in verbose mode.
2005-11-21 10:39:50 +00:00
ben
fa28150ed7 Update fprot-workstation-bin to version 4.6.2. Changes include:
o       A small bug was fixed in the check-updates.pl program where the updater
        wouldn't find the DEF files to update.
o       Bug in CHM mini-scanner which could lead to crashes was fixed
o       f-prot-milter wouldn't run on Solaris 10 because of library issues
o       Fixes an issue where the scanner would sometimes mis-identify .alr
	files as base64 coded executables
o       Fix where '-list' option to f-prot would not list the filenames of
        text-based archives, such as MIME containers.
o       Fix where certain executables would be mis-identified as UPX packed
o       Fix where UTF8 coded text files would not be scanned
o       Fix a crash issue when scanning .chm files containing strange header
	values
o	Updated error message when access is denied to files due to user
	permission problems
o       F-Prot 4.6.0 contains scanning engine version 3.16.7 which improves
	detection capabilities significantly and improves several scanning
	methods along with bugfixes.
2005-11-21 02:06:50 +00:00
agc
f92e1c8edc Add and enable md4-collision and md5-collision 2005-11-18 23:45:01 +00:00
agc
e7baec03e4 Initial import of md4-collision-20051118, a program to calculate md4 collisions.
MD4 Collision Generation

	Faster implementation of techniques described in Cryptanalysis for
	Hash Functions MD4 and RIPEMD, by Xiaoyun Wang, et al.

	Average runtime on P4 1.6ghz - 5 seconds
2005-11-18 23:43:05 +00:00
agc
25ce7a67ab Initial import of md5-collision-20051118, a program to calculate md5 collisions.
MD5 Collision Generation

	Faster implementation of techniques in How to Break MD5 and Other Hash
	Functions, by Xiaoyun Wang, et al.

	Old (Wang, et al.) average run time on IBM P690 supercomputer - 1 hour
	New average run time on P4 1.6ghz PC - 45 minutes
2005-11-18 23:42:03 +00:00
wiz
94c8489395 Update to 20050615:
2005-06-15 04:10  nolan

	* src/serializers.cpp:
	  readCBC wasn't allocating enough memory for the buffer when the
	  string's length was a multiple of 8. This was fixed by adding
	  one.

2005-06-15 03:32  nolan

	* src/serializers.cpp:
	  Fixed a memory leak in readCBC

2005-02-07 18:04  nolan

	* src/: aboutdlg.ui, manualdlg.ui, newpassphrasedlg.ui,
	  passphrasedlg.ui, preferencesdlg.ui, pwordeditdlg.ui,
	  startupdlgbase.ui: Added accelerators

2004-12-09 01:51  nolan

	* release/Makefile: Removed signing from all

2004-12-09 01:49  nolan

	* src/safelistview.cpp: Root is no longer decorated

2004-12-09 01:48  nolan

	* images/help.png: Copied from Psi

2004-12-06 11:03  nolan

	* src/: mypasswordsafe.ui, mypasswordsafe.ui.h, safe.cpp,
	  safelistview.cpp, safelistview.hpp: Added in place group renaming
	  Safe emits changed() now MyPasswordSafe is connected to
	  Safe::changed() Added savingEnabled() slot to MyPasswordSafe

2004-12-06 08:38  nolan

	* src/: mypasswordsafe.ui, safelistview.cpp: Added icon to
	  passwords

2004-12-06 08:38  nolan

	* MyPasswordSafe.pro, images/configure.png, images/editcopy.png,
	  images/editcopy_1.png, images/fetch_user.png,
	  images/file_locked.png, images/folder_new.png: Added and redid
	  some images

2004-12-06 08:14  nolan

	* Makefile, README: Updated README Increased minor version number

2004-12-06 08:07  nolan

	* src/crypto/: bfproxy.cpp, bfproxy.hpp, cryptointerface.hpp: Added
	  copyright notice

2004-12-06 07:34  nolan

	* src/: safeserializer.cpp, serializers.cpp, serializers.hpp: Used
	  #ifdef instead of #if

2004-12-06 07:32  nolan

	* MyPasswordSafe.pro, src/encryptedstring.cpp,
	  src/encryptedstring.hpp, src/myutil.cpp, src/myutil.hpp,
	  src/safe.cpp, src/safe.hpp, src/safeserializer.cpp,
	  src/serializers.cpp, src/serializers.hpp, src/xmlserializer.cpp,
	  src/crypto/bfproxy.cpp, src/crypto/bfproxy.hpp,
	  src/crypto/blowfish.cpp, src/crypto/blowfish.h,
	  src/crypto/cryptointerface.hpp, src/crypto/sha1.cpp,
	  src/crypto/sha1.h, src/pwsafe/PW_BlowFish.cpp,
	  src/pwsafe/PW_BlowFish.h, src/pwsafe/Util.cpp,
	  test/bfproxytest.build, test/bfproxytest.cpp: Moved the
	  serializers off of Password Safe's blowfish and sha1 code Created
	  a proxy class for Blowfish Created two serializers for big endian
	  machines to open the borked safes Made EncryptedString use a
	  single encryption object

2004-12-06 01:16  nolan

	* src/startupdlgbase.ui: Changed the shadow and shape of banner

2004-12-06 01:14  nolan

	* release/Makefile: Added about_banner swapping Renamed 'upload' to
	  'release' All just compiles, no more uploading

2004-12-06 01:01  nolan

	* src/aboutdlg.ui: Added logo to license

2004-12-06 01:00  nolan

	* images/: about_banner.png, about_banner.src.png: Branded about
	  logo Created an unbranded src logo

2004-11-30 16:26  nolan

	* images/edit_remove.png: Switched it to a minus sign again, but
	  it's based off of the new plus sign

2004-11-29 22:35  nolan

	* uuid-1.0.0/: Makefile, config.status: [no log message]

2004-11-29 22:35  nolan

	* images/: button_ok.png, edit_add.png, edit_remove.png,
	  fileclose.png: Copied better icons from Psi

2004-11-02 17:17  nolan

	* src/: mypasswordsafe.ui, mypasswordsafe.ui.h: Connected helpAbout

2004-11-02 17:17  nolan

	* MyPasswordSafe.pro: Removed some spaces

2004-11-02 16:51  nolan

	* images/: fileclose.png, lock.png: Added

2004-11-02 16:51  nolan

	* Makefile: Removed domainname

2004-11-02 16:37  nolan

	* src/safelistview.cpp: The username is copied to the clipboard on
	  a drag

2004-11-02 16:28  nolan

	* Makefile: Inced version

2004-11-02 16:27  nolan

	* README: Added headers and -jN

2004-11-02 16:25  nolan

	* src/: aboutdlg.ui, aboutdlg.ui.h, main.cpp, mypasswordsafe.ui,
	  mypasswordsafe.ui.h: The license gets displayed the first time
	  MyPS is ran

2004-11-02 15:57  nolan

	* src/: main.cpp, mypasswordsafe.ui, mypasswordsafe.ui.h: Made
	  locking hide the main window Locking no longer prompts on a
	  change of virtual desktops

2004-11-02 01:38  nolan

	* src/mypasswordsafe.ui.h: [no log message]

2004-11-01 18:42  nolan

	* src/: mypasswordsafe.ui, mypasswordsafe.ui.h, startupdlgbase.ui,
	  startupdlgbase.ui.h: The password widget gets focus after an
	  action is selected Set the startup dialog's icon Changed a couple
	  of the action items' text Default action sets the default safe

2004-11-01 18:23  nolan

	* MyPasswordSafe.pro, src/myendian.h, src/myutil.hpp,
	  src/startupdlgbase.ui.h, src/crypto/blowfish.cpp,
	  src/crypto/blowfish.h, src/crypto/sha1.cpp, src/crypto/sha1.h,
	  src/pwsafe/PwsPlatform.h: Added new crypto

2004-11-01 16:54  nolan

	* MyPasswordSafe.pro, src/encryptedstring.cpp,
	  src/encryptedstring.hpp, src/serializers.cpp,
	  src/pwsafe/PW_BlowFish.cpp, src/pwsafe/PW_sha1.cpp,
	  src/pwsafe/PW_sha1.h, src/pwsafe/Util.cpp, src/pwsafe/Util.h,
	  src/pwsafe/sha1.cpp, src/pwsafe/sha1.h: Renamed sha1 Changed the
	  #includes

2004-11-01 16:50  nolan

	* README: Removed Boost and added trademark and copyright info

2004-11-01 16:49  nolan

	* MyPasswordSafe.pro, README: [no log message]

2004-11-01 16:48  nolan

	* MyPasswordSafe.pro: Changed BlowFish to PW_BlowFish

2004-11-01 16:48  nolan

	* src/pwsafe/: BlowFish.cpp, BlowFish.h, PW_BlowFish.cpp,
	  PW_BlowFish.h: Renamed

2004-11-01 16:44  nolan

	* COPYING: [no log message]

2004-11-01 16:34  nolan

	* src/: encryptedstring.cpp, encryptedstring.hpp, exception.hpp,
	  main.cpp, mypasswordsafe.ui.h, myutil.cpp, myutil.hpp,
	  newpassphrasedlg.ui.h, passphrasedlg.ui.h, plaintextlizer.cpp,
	  plaintextlizer.hpp, preferencesdlg.ui.h, pwordeditdlg.ui.h,
	  safe.cpp, safe.hpp, safedragobject.cpp, safedragobject.hpp,
	  safelistview.cpp, safelistview.hpp, safeserializer.cpp,
	  safeserializer.hpp, securedstring.cpp, securedstring.hpp,
	  serializers.cpp, serializers.hpp, smartptr.cpp, smartptr.hpp,
	  startupdlg.cpp, startupdlgbase.ui.h, uuid.cpp, uuid.hpp,
	  xmlserializer.cpp, xmlserializer.hpp: Changed the header

2004-11-01 16:01  nolan

	* src/aboutdlg.ui: Changed license to GPL

2004-11-01 16:01  nolan

	* MyPasswordSafe.pro: [no log message]

2004-11-01 12:53  nolan

	* src/: mypasswordsafe.ui.h, passphrasedlg.ui.h,
	  preferencesdlg.ui.h, pwordeditdlg.ui.h: Changed SGS to SG

2004-11-01 12:44  nolan

	* src/: encryptedstring.cpp, encryptedstring.hpp, main.cpp,
	  plaintextlizer.cpp, safe.cpp, safe.hpp, safelistview.cpp,
	  safeserializer.cpp, safeserializer.hpp, securedstring.cpp,
	  securedstring.hpp, serializers.cpp, serializers.hpp,
	  smartptr.cpp, smartptr.hpp, uuid.cpp, uuid.hpp,
	  xmlserializer.hpp: Changed Semantic Gap Solutions to Semantic Gap
	  (TM)

2004-11-01 12:39  nolan

	* src/: safe.cpp, safelistview.cpp, smartptr.cpp, smartptr.hpp:
	  Replaced assert w/ Q_ASSERT Added headers to smartptr.?pp

2004-11-01 12:35  nolan

	* src/main.cpp: ifdefed out a print statement

2004-11-01 12:34  nolan

	* src/mypasswordsafe.ui.h: browseForSafe uses QFileDialog's static
	  methods

2004-11-01 12:10  nolan

	* src/: aboutdlg.ui, manualdlg.ui, mypasswordsafe.ui,
	  mypasswordsafe.ui.h, newpassphrasedlg.ui: Changed icons New safes
	  won't ask to be saved when they're closed Changed MyPS's icon

2004-11-01 12:10  nolan

	* images/: button_cancel.png, button_ok.png, configure.png,
	  contexthelp.png, edit.png, editcut.png, exit.png, fileopen.png,
	  filesave.png, filesaveas.png, folder_new.png, help.png, redo.png,
	  undo.png: Switched to 16x16 images

2004-11-01 12:09  nolan

	* MyPasswordSafe.pro: [no log message]

2004-10-31 07:32  nolan

	* src/pwsafe/: PwsPlatform.h, Util.h: Refactored the endian.h
	  inclusion

2004-10-31 07:32  nolan

	* src/: mypasswordsafe.ui.h, safelistview.cpp: Changed the default
	  column sizes

2004-10-31 01:38  nolan

	* src/: aboutdlg.ui, manualdlg.ui: Added a two contributors to
	  credits Changed Semantic Gap (TM) Solutions to Semantic Gap (TM)

2004-10-31 01:22  nolan

	* release/Makefile: Added upload

2004-10-31 01:07  nolan

	* src/pwsafe/Util.h: Added endian.h for __APPLE__

2004-10-30 09:41  nolan

	* MyPasswordSafe.pro, src/newpassphrasedlg.ui,
	  src/passphrasedlg.ui, src/preferencesdlg.ui, src/pwordeditdlg.ui,
	  src/startupdlgbase.ui: Added icons to buttons

2004-10-30 09:15  nolan

	* src/: passphrasedlg.ui, startupdlgbase.ui: Changed the dialog
	  sizes

2004-10-30 08:58  nolan

	* images/keys.png: Readded

2004-10-30 08:58  nolan

	* MyPasswordSafe.pro, images/keys.png, src/passphrasedlg.ui,
	  src/startupdlgbase.ui: Added keys Changed source files to use
	  keys.png

2004-10-30 08:44  nolan

	* images/keys.png: new icon

2004-10-22 19:14  nolan

	* doc/sshots/mainwindow.jpg, src/serializers.cpp: Groupnames are
	  converted from UTF8

2004-10-11 05:27  nolan

	* Makefile, src/pwsafe/PwsPlatform.h, src/pwsafe/Util.h: Applied
	  contributed patches

2004-10-03 22:04  nolan

	* src/: mypasswordsafe.ui.h, safedragobject.cpp,
	  safedragobject.hpp, safelistview.cpp, safelistview.hpp: Did some
	  work so MyPS wouldn't segfault when dragging onto another app

2004-10-03 22:03  nolan

	* MyPasswordSafe.pro: Removed spaces added by Designer

2004-10-01 22:40  nolan

	* Makefile: Increased version number Added check for HOST

2004-10-01 22:26  nolan

	* src/: aboutdlg.ui, mypasswordsafe.ui, mypasswordsafe.ui.h,
	  newpassphrasedlg.ui, passphrasedlg.ui, plaintextlizer.cpp,
	  preferencesdlg.ui, pwordeditdlg.ui, safedragobject.cpp,
	  safelistview.cpp, safelistview.hpp, safeserializer.cpp,
	  xmlserializer.cpp, xmlserializer.hpp: Added some file headers
	  Changed the button order on some dialogs Added drag and drop
	  Finished XmlSerializer
2005-11-17 22:12:37 +00:00
wiz
4ac4b1232e regen. 2005-11-16 22:57:43 +00:00
wiz
b73bd2c841 Improve usage. Add -K description. 2005-11-16 22:57:24 +00:00
wiz
6d59768b31 Various improvements:
Describe -K. Improve -i description. Sort options in SYNOPSIS. Remove
superfluous .Pp. Add EXIT STATUS section. Remove trailing whitespace.
Bump date for new -i.
2005-11-16 22:54:58 +00:00
erh
2ef746f045 Add several new command line options so audit-packages can be used as part of
the improved ALLOW_VULNERABILITIES support.  This now has the ability to:
  -p : Only check a single package
  -i : Provide a list of vulnerabilities to ignore
  -K : Specify an alternate pkg dbdir.
Bump the version to 0.40.
2005-11-16 20:47:55 +00:00
rillig
01511ed447 Added an empty line at line 2. 2005-11-15 14:30:19 +00:00
grant
1463e5e337 stop openssh from complaining about zlib version numbers, as pkgsrc
already enforces a "secure" version of zlib via dependencies.
2005-11-14 22:36:17 +00:00
wiz
3b21cdb13b Update to 1.2.9:
* Version 1.2.9 (2005-11-07)
- Documentation was updated and improved.
- RSA-MD2 is now supported for verifying digital signatures.
- Due to cryptographic advances, verifying untrusted X.509
  certificates signed with RSA-MD2 or RSA-MD5 will now fail with a
  GNUTLS_CERT_INSECURE_ALGORITHM verification output.  For
  applications that must remain interoperable, you can use the
  GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2 or GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD5
  flags when verifying certificates.  Naturally, this is not
  recommended default behaviour for applications.  To enable the
  broken algorithms, call gnutls_certificate_set_verify_flags with the
  proper flag, to change the verification mode used by
  gnutls_certificate_verify_peers2.
- Make it possible to send empty data through gnutls_record_send,
  to align with the send(2) API.
- Some changes in the certificate receiving part of handshake to prevent
  some possible errors with non-blocking servers.
- Added numeric version symbols to permit simple CPP-based feature
  tests, suggested by Daniel Stenberg <daniel@haxx.se>.
- The (experimental) low-level crypto alternative to libgcrypt used
  earlier (Nettle) has been replaced with crypto code from gnulib.
  This leads to easier re-use of these components in other projects,
  leading to more review and simpler maintenance.  The new configure
  parameter --with-builtin-crypto replace the old --with-nettle, and
  must be used if you wish to enable this functionality.  See README
  under "Experimental" for more information.  Internally, GnuTLS has
  been updated to use the new "Generic Crypto" API in gl/gc.h.  The
  API is similar to the old crypto/gc.h, because the gnulib code were
  based on GnuTLS's gc.h.
- Fix compiler warning in the "anonself" self test.
- API and ABI modifications:
gnutls_x509_crt_list_verify: Added 'const' to prototype in <gnutls/x509.h>.
                             This doesn't reflect a change in behaviour,
                             so we don't break backwards compatibility.
GNUTLS_MAC_MD2: New gnutls_mac_algorithm_t value.
GNUTLS_DIG_MD2: New gnutls_digest_algorithm_t value.
GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD2,
GNUTLS_VERIFY_ALLOW_SIGN_RSA_MD5: New gnutls_certificate_verify_flags values.
                                  Use when calling
                                  gnutls_x509_crt_list_verify,
                                  gnutls_x509_crt_verify, or
                                  gnutls_certificate_set_verify_flags.
GNUTLS_CERT_INSECURE_ALGORITHM: New gnutls_certificate_status_t value,
                                used when broken signature algorithms
                                is used (currently RSA-MD2/MD5).
LIBGNUTLS_VERSION_MAJOR,
LIBGNUTLS_VERSION_MINOR,
LIBGNUTLS_VERSION_PATCH,
LIBGNUTLS_VERSION_NUMBER: New CPP symbols, indicating the GnuTLS
			  version number, can be used for feature existence
			  tests.
2005-11-14 18:17:49 +00:00
adrianp
8382f588a5 Update sudo to nb2 to address the recent secuity issue:
- http://www.sudo.ws/sudo/alerts/perl_env.html

- Add "PERLLIB", "PERL5LIB" and the "PERL5OPT" to the list of
  environment variables to be cleaned.
2005-11-12 14:17:45 +00:00
tv
a365d0dd5b Include devel/sysexits bl3. 2005-11-08 03:55:24 +00:00
tv
dd47e790f2 Skip two more setgroups(3) instances on Interix; openssh now builds again. 2005-11-07 19:50:20 +00:00
tv
a814d22796 Fix typo in Interix-specific bit. 2005-11-07 19:35:23 +00:00
jlam
1d76e7b039 Only install the authldap.schema file if the "ldap" package option is
specified.
2005-11-07 16:43:49 +00:00
taca
95b07c8ffd Revive hpn-patch distfile. 2005-11-07 04:53:24 +00:00
tv
5bb126ef55 Use LTCONFIG_OVERRIDE. Besides making "configure" faster, this avoids an
odd case where cyrus-sasl2 attempts to load /dev/null via shell "." command,
which won't work on Interix as /dev/null is not set as executable there.
2005-11-04 19:36:57 +00:00
joerg
70f2766f42 Don't depend on -lpthread as name of the thread library,
check in configure using PTHREAD_LIBS / PTHREAD_LDFLAGS and use
them to link libgpgme_thread as well.
2005-11-04 17:16:34 +00:00
tv
c01377db77 Change the __dead patches into the form I'm submitting back to the
openssh-portable team (elide the extra cpp macro level).
2005-11-04 15:45:03 +00:00
tv
4ef9a85e1d SETGROUPS_NOOP disappeared, so we're relying only on HAVE_INTERIX in those
specific cases.
2005-11-04 15:27:34 +00:00
tv
699eb89b64 regen 2005-11-04 14:47:32 +00:00
tv
7c1f538eff Add more Interix fixes: Need prototype for strtoll(), and two more
instances of setgroups() that are not usable on that platform.
2005-11-04 14:47:17 +00:00
rillig
3c728add0c Fixed wrong use of WRKSRC. Converted explicit ${SED} substitution to
appropriate SUBST_* definitions.
2005-11-04 11:22:24 +00:00
rillig
cceabcb629 Fixed wrong usage of WRKSRC. 2005-11-03 20:41:43 +00:00
tv
910669efc3 Forgot distinfo in previous commit. 2005-11-03 16:52:09 +00:00