Commit graph

28 commits

Author SHA1 Message Date
gdt
74f8cac1f2 Update to 4.1.0.
21 Oct 2014:
- Release 4.1.0
- Modernized autoconf build system
- Use constant-time comparisons where needed
- Use gcrypt secure memory allocation
- Correctly reject attempts to fragment a message into too many pieces
- Fix a missing opdata when sending message fragments
- Don't lose the first user message when REQUIRE_ENCRYPTION is set
- Fix some memory leaks
- Correctly check for children contexts' state when forgetting a context
- API Changes:
  - Added API functions otrl_context_find_recent_instance and
    otrl_context_find_recent_secure_instance.
2014-10-21 11:46:31 +00:00
wiz
e03c03b6dc Recursive PKGREVISION bump for libgcrypt-1.6.0 shlib major bump. 2014-01-01 11:52:02 +00:00
gdt
a1ca1e9878 Adjustt commentabout avoiding O2/SSP bug.
(No non-comment change.)
2012-11-21 01:45:00 +00:00
asau
4840ebad6d Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-03 00:02:33 +00:00
gdt
6515929e3e Update to 4.0.0.
Note that while the protocol is compatible, the API is not, and hence
there will be a pidgin-otr update within minutes.

There is an apparent gcc 4.1.3 -O2/SSP bug, which is avoided by
disabling SSP in libotr (which libotr finds and turns on).  This is
temporary pending more fine-grained control and/or a fix.

Update to libotr 4.0.0.  Note that libotr 4.x is API-incompatible with
libotr 3.x; upstream thinks this is ok, so pkgsrc won't try to work
around it.

24 Aug 2012:
- Release 4.0.0
- Support v3 of the OTR protocol
- The main new feature: sensibly handle the case where a user is logged
  in multiple times to the same IM account
- API changes:
  - instance tags, to support multiple simultaneous logins
  - support for asynchronous private key generation
  - the ability to provide an "extra" symmetric key to applications
    (with forward secrecy)
  - applications can supply a formation conversion callback if they do
    not natively use XHTML-style UTF8 markup
  - error messages formerly provided by libotr are now handled using
    callbacks to the application, for better i18n support
  - otrl_message_sending now handles message fragmentation internally
2012-09-06 00:23:18 +00:00
gdt
72c9067193 Update to 3.2.1.
(This is a security release, but pkgsrc already had patches from
upstream.)

This version corrects two heap overflows reported by our users:

- A small write overflow, reported by Justin Ferguson
- A large read overflow, reported by Ben Hawkes
2012-08-14 22:08:09 +00:00
drochner
e29f04073e att patches from upstream to fix buffer overflow in the base64
decoder which can lead to crashes or potentially code injection
(CVE-2012-3461)
bump PKGREV
2012-08-09 10:06:46 +00:00
dholland
7e751949e4 Set BUILDLINK_ABI_DEPENDS correctly (with +=, not ?=)
It turns out there were a lot of these.
2012-05-07 01:53:12 +00:00
obache
1d9df3258a recursive bump from gettext-lib shlib bump. 2011-04-22 13:41:54 +00:00
joerg
e209761d06 Remove @dirrm entries from PLISTs 2009-06-14 17:28:16 +00:00
joerg
2d1ba244e9 Simply and speed up buildlink3.mk files and processing.
This changes the buildlink3.mk files to use an include guard for the
recursive include. The use of BUILDLINK_DEPTH, BUILDLINK_DEPENDS,
BUILDLINK_PACKAGES and BUILDLINK_ORDER is handled by a single new
variable BUILDLINK_TREE. Each buildlink3.mk file adds a pair of
enter/exit marker, which can be used to reconstruct the tree and
to determine first level includes. Avoiding := for large variables
(BUILDLINK_ORDER) speeds up parse time as += has linear complexity.
The include guard reduces system time by avoiding reading files over and
over again. For complex packages this reduces both %user and %sys time to
half of the former time.
2009-03-20 19:23:50 +00:00
joerg
f605fec2db Mark as destdir ready. 2008-07-14 12:55:56 +00:00
gdt
78c70b383f Update to 3.2.0.
- Added support for one-way authentication using an explicit question,
  based on the SOUPS 2008 user study.
2008-06-17 13:58:08 +00:00
rillig
f3d1383cd6 libgcrypt is needed for building programs, as reported in PR 37361. 2007-11-11 21:53:57 +00:00
gdt
41594ba91b bl3 on gettext-lib, PKGREVISION++ 2007-08-30 17:20:06 +00:00
gdt
bf66f721c7 Update to 3.1.0.
Override libtool; otherwise the distfile libtool inexplicably gets the
wrong shlib version.

Changes since 3.0.0:

- Added fragmentation support for large messages
- Added new method for buddy authentication which does not require the
  (explicit) use of fingerprints.
2007-08-02 11:26:28 +00:00
jlam
c16221a4db Change the format of BUILDLINK_ORDER to contain depth information as well,
and add a new helper target and script, "show-buildlink3", that outputs
a listing of the buildlink3.mk files included as well as the depth at
which they are included.

For example, "make show-buildlink3" in fonts/Xft2 displays:

	zlib
	fontconfig
	    iconv
	    zlib
	    freetype2
	    expat
	freetype2
	Xrender
	    renderproto
2006-07-08 23:10:35 +00:00
jlam
9430e49307 Track information in a new variable BUILDLINK_ORDER that informs us
of the order in which buildlink3.mk files are (recursively) included
by a package Makefile.
2006-07-08 22:38:58 +00:00
rillig
96fc47c14f Aligned the last line of the buildlink3.mk files with the first line, so
that they look nicer.
2006-04-12 10:26:59 +00:00
reed
5abef9be14 Over 1200 files touched but no revisions bumped :)
RECOMMENDED is removed. It becomes ABI_DEPENDS.

BUILDLINK_RECOMMENDED.foo becomes BUILDLINK_ABI_DEPENDS.foo.

BUILDLINK_DEPENDS.foo becomes BUILDLINK_API_DEPENDS.foo.

BUILDLINK_DEPENDS does not change.

IGNORE_RECOMMENDED (which defaulted to "no") becomes USE_ABI_DEPENDS
which defaults to "yes".

Added to obsolete.mk checking for IGNORE_RECOMMENDED.

I did not manually go through and fix any aesthetic tab/spacing issues.

I have tested the above patch on DragonFly building and packaging
subversion and pkglint and their many dependencies.

I have also tested USE_ABI_DEPENDS=no on my NetBSD workstation (where I
have used IGNORE_RECOMMENDED for a long time). I have been an active user
of IGNORE_RECOMMENDED since it was available.

As suggested, I removed the documentation sentences suggesting bumping for
"security" issues.

As discussed on tech-pkg.

I will commit to revbump, pkglint, pkg_install, createbuildlink separately.

Note that if you use wip, it will fail!  I will commit to pkgsrc-wip
later (within day).
2006-04-06 06:21:32 +00:00
salo
8201d5e4be Update to version 3.0.0
From Jason White, via PR pkg/32451

Changes:

- Support for OTR protocol version 2; will still interoperate with version 1
  clients (though with a warning to the user), fixes identity-binding flaw
  http://www.cypherpunks.ca/otr/Protocol-v2-3.0.0.html
2006-02-13 14:44:31 +00:00
joerg
5911def816 Recursive revision bump / recommended bump for gettext ABI change. 2006-02-05 23:08:03 +00:00
gdt
58a5ca2edf remove "BUILDLINK_DEPMETHOD.libotr?= build", because depending
packages can dynamically link libotr and thus must depend on it.

reviewed by wiz@
2005-09-09 23:45:27 +00:00
rillig
96b8e019fa Added a patch to fix void* arithmetic. 2005-07-30 21:30:53 +00:00
gdt
3b5869a4e1 update to 2.0.2:
* src/privkey.c (otrl_privkey_hash_to_human): Avoid writing a
        NUL one byte past the end of the buffer
2005-07-27 19:17:35 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
nathanw
38f0a4f400 I put this package in security, not chat; update the buildlink file to
match.
2005-03-25 17:21:26 +00:00
nathanw
9814b8da9f Initial import of libotr-2.0.1.
This is the portable OTR Messaging Library, as well as the toolkit to
help you forge messages.

Off-the-Record (OTR) Messaging allows you to have private
conversations over instant messaging by providing:

Encryption
    No one else can read your instant messages.
Authentication
    You are assured the correspondent is who you think it is.
Deniability
    The messages you send do not have digital signatures that are
    checkable by a third party. Anyone can forge messages after a
    conversation to make them look like they came from you. However,
    during a conversation, your correspondent is assured the messages
    he sees are authentic and unmodified.
Perfect forward secrecy
    If you lose control of your private keys, no previous conversation
    is compromised.
2005-03-24 21:24:12 +00:00