Commit graph

5500 commits

Author SHA1 Message Date
wiz
8a6bd2ac22 Add patch-a{a,b} to distinfo. 2010-06-03 09:23:34 +00:00
dholland
2132885e98 PR 43393: security/gsasl-1.1 fails to build on solaris 2010-06-03 02:28:31 +00:00
gls
0b5713cc75 This is a Python egg.
Don't hardwire paths in PLIST.

As noted by Ryo HAYASAKA in PR/43405.
2010-06-02 18:31:41 +00:00
taca
068ea7541e Update security/openssl package to 0.9.8o.
OpenSSL CHANGES
 _______________

 Changes between 0.9.8n and 0.9.8o [01 Jun 2010]

  *) Correct a typo in the CMS ASN1 module which can result in invalid memory
     access or freeing data twice (CVE-2010-0742)
     [Steve Henson, Ronald Moesbergen <intercommit@gmail.com>]

  *) Add SHA2 algorithms to SSL_library_init(). SHA2 is becoming far more
     common in certificates and some applications which only call
     SSL_library_init and not OpenSSL_add_all_algorithms() will fail.
     [Steve Henson]

  *) VMS fixes:
     Reduce copying into .apps and .test in makevms.com
     Don't try to use blank CA certificate in CA.com
     Allow use of C files from original directories in maketests.com
     [Steven M. Schweda" <sms@antinode.info>]
2010-06-02 13:30:11 +00:00
bouyer
e9fade7e66 Works fine with python2.6 too. 2010-06-01 21:30:25 +00:00
drochner
686cf38e4c +libgnome-keyring 2010-06-01 11:01:27 +00:00
drochner
2cbb100d21 add libgnome-keyring-2.30.1, a library which was split from gnome-keyring
in gnome-2.30
2010-06-01 10:56:27 +00:00
agc
bd43bee05e Update netpgp to version 3.99.4/20100601
+ avoid possible free() of new value passed to netpgp_setvar(),
  with thanks to Anon Ymous.
+ netpgpkeys(1):  print keys to stdout, not stderr - reported by Anon
  Ymous.
+ fix DSA signatures and verification
+ simplify and shorten the internals of packet processing by getting rid of
  the intermediate pseudo-abstraction layer, which detracted from understanding
  and had no benefit whatsoever. Rename some enums and some definitions.
+ add some checking to new key generation, and don't try to read in
  the keys after writing them - reported by Tyler Retzlaff
+ netpgpverify - avoid the separate codebase, and just use libnetpgp(3)
2010-06-01 06:15:00 +00:00
gls
01ddfc82dc Remove patch-aa 2010-05-31 20:34:58 +00:00
gls
7fd1450500 Update security/py-paramiko to 1.7.6.
pkgsrc changes:
- patches/patch-aa no longer required
- Added LICENSE

Changelog:
ARC4 & CTR support, IP6 support, and various bug fixes (incl. an important
Windows random number generation fix)
2010-05-31 20:30:31 +00:00
manu
9760348130 Update to lasso 2.2.91. From the NEWS file:
2.2.91 - January 26th 2010
--------------------------

A new Perl binding, fix for backward compatibility with old versions of glib,
LassoLogout API is more robust since it does not need anymore for all SP logout
to finish to work, new macro lasso_list_add_new_xml_node, add support for
WS-Security UsernameToken (equivalent of poor man HTTP Digest Authentication),
make public internal APIs: lasso_session_add_assertion,
lasso_session_get_assertion and lasso_session_remove_assertion.

2.2.90 - January 18th 2010
--------------------------

Lots of internal changes and some external one too.

There is a new api to force, forbid or let Lasso sign messages, it is called
lasso_profile_set_signature_hint.

Big overhaul of the ID-WSF 1 and 2 codes, and of the SAML 2.0 profiles. Now all
SAML 2.0 profile use common internal functions from the lasso_saml20_profile_
namespace to handle bindings (SOAP,Redirect,POST,Artifact,PAOS). New internal
API to load SSL keys from many more formats from the public API.

In ID-WSF 2.0, Data Service Template has been simplified, we no more try to
apply queries, it is the responsability of the using code to handle them.

In bindings land, the file bindings/utils.py has been stuffed with utility
function to manipulate 'type' tuple, with are now used to transfer argument and
type description, their schema is (name, C-type, { dictionary of options } ),
they are now used everywhere in the different bindings. We support output
argument in PHP5, Python and Java, i.e. pointer of pointer arguments with are
written to in order to return multiple values. For language where the binding
convert error codes to exceptions (all of them now), the ouput value is
returned as the normal return value of the method, so only one output argument
is handled for now.

We now use GObject-introspection annotations in the documentation to transfer
to the binding generator the necessary metadata about the API (content of
lists, hashtables, wheter pointer are caller/callee owned, can be NULL or if
argument have a default value). The file bindings/override.xml is now
deprecated.

In documentation land, the main reference documentation was reorganizaed and
more symbols have been added to it. Many more functions are documented.

There is now tools to control the evolution of the ABI/API of Lasso.
2010-05-31 16:44:28 +00:00
wiz
d0469478ef Mark as make-jobs-safe again; a comment said the problem was reported
upstream and supposedly fixed in 2.0.6 (pkgsrc is at 2.0.14 now).

Multiple builds with 16 jobs showed no problem.
2010-05-30 08:24:48 +00:00
obache
3b4695922a + py-xmlsec 2010-05-29 06:21:29 +00:00
obache
e5d3c498b9 Import py-xmlsec-0.3.0 as security/py-xmlsec.
Based on PR#42948 by Patrick McPhee.

PyXMLSec is a set of Python bindings for XML Security Library (XMLSec).
2010-05-29 06:20:06 +00:00
obache
596dfa8bfa Add buildlink with libxml2 and libxslt.
shlib linked with those library and pkg-config also notice requirement.
2010-05-29 05:53:04 +00:00
seb
a2ceaccfad Update p5-Module-Signature from version 0.63 to version 0.64.
Pkgsrc changes:
- placate pkglint

Upstream changes:
[Changes for 0.64 - Sun,  9 May 2010 00:50:11 +0200]

* Avoid creating gnupg configuration files for the user invoking Makefile.PL
  (Closes RT#41978).
* Correctly detect the version of gnupg on cygwin and add tests for it
  (Paul Fenwick) (Closes RT#39258).
2010-05-24 16:02:28 +00:00
tez
8f97c4caf2 fix CVE-2010-1321 (MITKRB5-SA-2010-005) and take maintainership 2010-05-20 14:21:23 +00:00
pettai
12637588ce * keychain 2.7.1 (07 May 2010)
- Addition of a "make clean" target. removal of runtests as it is currently
  broken.
- New release process in Makefile and release.sh - keychain release tarball
  will now contain pre-generated keychain, keychain.1 and keychain.spec so
  that users do not need to run "make". Updated README.rst to refer to the
  "source code" as a "release archive" since it contains both source code and
  ready-to-go script and man page.
- GPG fix from Gentoo bug 203871; This fix will fix the issue with pinentry
  starting in the background and not showing up in the terminal.

* keychain 2.7.0 (23 Oct 2009)

- lockfile() replacement from Parallels Inc. OpenVZ code, takelock() rewrite,
  resulting in ~100 line code savings. Default lock timeout set to 5 seconds,
  and now keychain will try to forcefully acquire the lock if the timeout
  aborts, rather than simply failing and aborting.
- MacOS X/BSD improvements: fix sed call in Makefile for MacOS X and presumably
  other *BSD environments. Rename COPYING to COPYING.txt + slight COPYING.txt
  formatting change. Fixed POD errors (removed '=end').
- Disable "Identity added" messages when --quiet is specified.
  (Gentoo bug #250328)
  --help will print output to stdout (Gentoo bug #196060)
  output cleanup and colorization changes - moving away from blue and over to
  cyan as it displays better terminals with black background.
  Also some additional colorization.

* keychain 2.6.9 (26 Jul 2009)

- Close Gentoo bug 222953 fix potential issues with GNU grep, Mac OS X color
  fix when called with --eval.
- Perl 5.10 Makefile fix. Transition README to README.rst (reStructuredText).
  Updated maintainership information.
  Simplified default output
2010-05-18 06:29:31 +00:00
obache
bc61e5a122 LICENSE=2-cluase-bsd 2010-05-17 02:55:18 +00:00
obache
dc1eca1464 + ruby-oauth 2010-05-16 11:46:22 +00:00
obache
c3878e368f Import ruby-oauth-0.4.0 as security/ruby-oauth.
This is a RubyGem for implementing both OAuth clients and servers in Ruby
applications.
2010-05-16 11:45:10 +00:00
pettai
d98e33af66 New better documentation is available, so point to those instead 2010-05-09 19:04:47 +00:00
pettai
4e2875d32b SoftHSM 1.1.4 - 2010-04-06
* Respect --disable-64bit
* Respect $DESTDIR for config files
* The binaries can now show the version number
* softhsm-keyconv could not handle --ttl properly
* Link softhsm static with libsofthsm
* Build libsofthsm.so without version number
* libsofthsm.so is now a loadable module
2010-05-09 18:20:38 +00:00
adam
1d09989d31 Set correct architecture on Darwin 2010-05-08 06:33:41 +00:00
agc
486c5c49cb Upgrade netpgp to version 3.99.2/20100507.
Changes to 3.99.2/20100507

+ add detached armoured signature creation and verification
+ fix manual pages
+ rationalisation of debug messages
2010-05-08 03:45:58 +00:00
ahoka
d7fc9709e7 Drop maintainership on these packages, I am no longer interested. 2010-05-07 08:34:22 +00:00
pettai
0bb4ee0d91 fixed email 2010-05-06 14:56:16 +00:00
pettai
b53b7f02d5 + opendnssec 2010-05-06 13:27:08 +00:00
pettai
bec9df58b9 The OpenDNSSEC project announces the development of Open Source software
that manages the security of domain names on the Internet.
The project intends to drive adoption of Domain Name System Security Extensions
(DNSSEC) to further enhance Internet security.
2010-05-06 12:50:17 +00:00
seb
7c36b3f230 Update p5-IO-Socket-SSL from version 1.32 to version 1.33.
Upstream changes:
v1.33 2010.03.17
- attempt to make t/memleak_bad_handshake.t more stable, it fails
  for unknown reason on various systems
- fix hostname checking: an IP should only be checked against
  subjectAltName GEN_IPADD, never against GEN_DNS or CN.
  Thanks to rusch[AT]genua[DOT]de for bug report
2010-05-05 22:47:20 +00:00
tron
37bcdfe923 Remove an old Mac OS X build fix which now breaks the build. 2010-05-02 16:03:17 +00:00
wiz
b6529bfdae Update to 2.6:
* Noteworthy changes in release 2.6 (2010-04-20) [stable]
- Fix build failure on platforms without support for GNU LD version scripts.
- libtasn1: Simplified implementation of asn1_check_version.
- tests: Improved self-checks.
- Update gnulib files, fix many syntax-check nits, indent code,
  fix license templates.
2010-05-02 11:54:12 +00:00
tonnerre
e55137e0ee Upgrade py-asn1 to version 0.0.11a.
Changes since 0.0.8a:

- Decoder can now treat values of unknown types as opaque OctetString.
- Fix to Set/SetOf type decoder to handle uninitialized scalar SetOf
  components correctly.
- API versioning mechanics retired (pyasn1.v1 -> pyasn1) what makes
  it possible to zip-import pyasn1 sources (used by egg and py2exe).
- Allow any non-zero values in Boolean type BER decoder, as it's in
  accordnance with the standard.
2010-05-01 17:23:36 +00:00
zafer
7cc1239e8a remove pacnet mirror. service down. 2010-04-17 10:39:33 +00:00
taca
f104d35411 Update sudo package from sudo-1.7.2p4 to sudo-1.7.2p6.
Sudo versions 1.7.2p6 and 1.6.9p22 are now available.  These releases
fix a privilege escalation bug in the sudoedit functionality.

Summary:
    A flaw exists in sudo's -e option (aka sudoedit) in sudo versions
    1.6.8 through 1.7.2p5 that may give a user with permission to
    run sudoedit the ability to run arbitrary commands.  This bug
    is related to, but distinct from, CVE 2010-0426.

Sudo versions affected:
    1.6.8 through 1.7.2p5 inclusive.
2010-04-16 15:33:52 +00:00
jakllsch
1cb1d01fc9 SUBDIR+=kstart 2010-04-15 20:26:02 +00:00
jakllsch
f52f7abb89 Import kstart-3.16.
k5start, and krenew are modified versions of kinit which add support
for running as a daemon to maintain a ticket cache, running a
command with credentials from a keytab and maintaining a ticket
cache until that command completes, obtaining AFS tokens (via an
external aklog) after obtaining tickets, and creating an AFS PAG
for a command. They are primarily useful in conjunction with
long-running jobs; for moving ticket handling code out of servers,
cron jobs, or daemons; and to obtain tickets and AFS tokens with
a single command.
2010-04-15 20:23:03 +00:00
tron
23ff5bb14f Update "stunnel" package to version 4.33. Changes since 4.29:
- New features
  - New service-level "libwrap" option for run-time control whether
    /etc/hosts.allow and /etc/hosts.deny are used for access control.
    Disabling libwrap significantly increases performance of stunnel.
  - Log file reopen on USR1 signal was added.
  - Graceful configuration reload with HUP signal on Unix
    and with GUI on Windows.
- Bugfixes
  - Inetd mode fixed
  - Fixed a transfer() loop issue with SSLv2 connections.
  - Fixed a "setsockopt IP_TRANSPARENT" warning with "local" option.
  - Logging subsystem bugfixes and cleanup.
  - Installer bugfixes for Vista and later versions of Windows.
  - FIPS mode can be enabled/disabled at runtime.
2010-04-15 09:57:47 +00:00
joerg
9de6420110 DESTDIR support 2010-04-14 22:45:51 +00:00
elric
3b9c4c06e2 Upgrade to 1.6.1. 2010-04-14 20:15:27 +00:00
elric
dbe729a135 Remove patch-aa as the upstream maintainer (elric@) incorporated it. 2010-04-14 19:27:15 +00:00
schmonz
98da083661 Add and enable knc. 2010-04-14 18:46:26 +00:00
schmonz
293a5f3bcc Add knc, Kerberised NetCat. It works in basically the same way as
either netcat or stunnel except that it is Kerberised. You can use
it to construct client/server applications while keeping the Kerberos
libraries out of your programs address space quickly and easily.
2010-04-14 18:45:47 +00:00
drochner
3f32b1151a update to 2.8.6
changes:
-interoperability improvements (especially for VeriSign)
-misc fixes
-translation updates
2010-04-13 16:31:27 +00:00
drochner
68fa71f9bf update to 2.5
changes:
-Improve GTK-DOC comments
-Updated gnulib files
2010-04-13 16:28:53 +00:00
taca
662d52e488 Update openssl package from 0.9.8m to 0.9.8n.
Changes between 0.9.8m and 0.9.8n [24 Mar 2010]

  *) When rejecting SSL/TLS records due to an incorrect version number, never
     update s->server with a new major version number.  As of
     - OpenSSL 0.9.8m if 'short' is a 16-bit type,
     - OpenSSL 0.9.8f if 'short' is longer than 16 bits,
     the previous behavior could result in a read attempt at NULL when
     receiving specific incorrect SSL/TLS records once record payload
     protection is active.  (CVE-2010-0740)
     [Bodo Moeller, Adam Langley <agl@chromium.org>]

  *) Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
     could be crashed if the relevant tables were not present (e.g. chrooted).
     [Tomas Hoger <thoger@redhat.com>]
2010-04-12 14:19:17 +00:00
seb
2bd8cc3779 Update p5-Module-Signature from version 0.61 to version 0.63.
Upstream changes:
[Changes for 0.63 - Sun, 28 Mar 2010 04:46:27 +0100]

* Fix diagnostic message from Makefile.PL when the user dosn't have gnupg or
  Crypt::OpenPGP (miyagawa).

[Changes for 0.62 - Tue, 23 Mar 2010 22:17:39 +0100]

* Change the default keyserver from the outdated pgp.mit.edu to
  pool.sks-keyservers.net.
2010-04-11 23:55:02 +00:00
jmmv
67e739914a Fix PLIST: add missing locale bn. 2010-04-11 22:19:56 +00:00
markd
11d00df5ac Make sure qmake can be found during the build. 2010-04-09 23:47:19 +00:00
jmmv
64e97d3036 Fix PLIST when installing in Linux. 2010-03-31 10:33:46 +00:00