Commit graph

6317 commits

Author SHA1 Message Date
pettai
956d7d2539 1.12.2 (5/3/12)
- Bux fix release
   - Rollerd's -alwayssign flag logic had a critical error that could
     have caused a zone to be signed with the wrong ZSK at particular
     points of the ZSK key rolling process.
2012-06-16 21:25:58 +00:00
pettai
4928453dd3 Version 2.12 (released 2012-06-15)
* Only use libyubikey when --with-cr is used.

 * Set correct permissions on tempfile.

 * YubiKey 2.2 contains a bug in challenge-response that makes it output the
   same response to all challenges unless HMAC_LT64 is set. Add warnings to
   ykpamcfg and a warning through conversate in the pam module. Keys programmed
   like this should be reprogrammed with the HMAC_LT64 flag set.
2012-06-16 20:45:33 +00:00
pettai
eac69ed19e Version 1.6.4 (released 2012-05-24)
* Implement option -ooath-id to easily set OATH token identifier.

 * Fix numerous compiler warnings from clang. Thanks to
   Clemens Lang <neverpanic@gmail.com>.
2012-06-16 20:38:51 +00:00
pettai
2a4aab7de0 Version 2.8 (released 2012-06-15)
* ykclient: Add C++ namespace protection.

 * Add multi-server support with curl_multi.
   Enabled by default for YubiCloud servers.
   Settable with the new library function set_template_urls() or
   the urls parameter to ykclient_verify_otp_v2().

 * Remove extra % in ykclient help.

 * Add ca path option to ykclient, --ca.
   Patch from Jay Kline <jay.kline.ctr@hpcmo.hpc.mil>.

 * Make the nonce unique for consecutive calls to the same ykclient handle.

 * Do url encoding of OTP before sending.

 * Fix segfault on curl error.
   Patch from Lee Hinman <lee.hinman.ctr@hpc.mil>
2012-06-16 20:32:05 +00:00
pettai
7043b02f8b Version 1.9 (released 2012-05-31)
* Updated ld-version-script from gnulib to silence warnings.

* Fix out-of-tree builds.
2012-06-16 20:26:12 +00:00
pettai
fa0355ce7e Added sks 2012-06-16 18:59:13 +00:00
pettai
755a438c04 SKS is a new OpenPGP keyserver whose goal is to provide easy to deploy,
decentralized, and highly reliable synchronization.  That means that a key
submitted to one SKS server will quickly be distributed to all key servers,
and even wildly out-of-date servers, or servers that experience spotty
connectivity, can fully synchronize with rest of the system.
2012-06-16 18:55:30 +00:00
taca
6d58c00211 Remove php-mhash which is only supported by PHP 5.2. 2012-06-16 15:09:36 +00:00
taca
849644eed7 Remove php-mhash. 2012-06-16 15:08:56 +00:00
markd
e43be93ef2 Update to KDE SC 4.8.4
Bug fixes.
2012-06-16 04:45:28 +00:00
taca
168d52337a Restrict to PHP 5.2.x and 5.3.x since there is no PHP 5.4.x officialy yet. 2012-06-16 02:59:48 +00:00
sbd
a5f279dac6 Recursive PKGREVISION bump for misc/kdepimlibs4 buildlink addition. 2012-06-14 22:09:28 +00:00
sbd
21792a9296 Recursive PKGREVISION bump for libxml2 buildlink addition. 2012-06-14 07:43:06 +00:00
wiz
f98e8b0585 Add inet6 to default suggested options. It's 2012. 2012-06-12 15:45:54 +00:00
adam
0c824443da Changes 0.64.0:
* authpam.c (callback_pam): Call pam_end() after an authentication attempt.
* Makefile.am: Renamed authstaticlist.h to courierauthstaticlist.h, and
added it to the list of header files that 'make install' puts into
includedir.
* Fix gcc 4.6 warnings
* courier.spec.in: switch to systemd.
* Fix autoconf warnings.
* courier-authlib.spec: Make rmplint happy.
2012-06-09 11:57:20 +00:00
pettai
596f9b920a validns 0.5
Parallelize signature verification (-n option)
2012-06-08 21:58:07 +00:00
fhajny
59de2d2cc4 Add readline support 2012-06-08 12:50:33 +00:00
tez
f3d519bd37 Fix for CVE-2012-1013 from:
ca29094400
2012-06-06 18:17:46 +00:00
wiz
c47ca04822 Update to 2.13:
* Noteworthy changes in release 2.13 (2012-05-31) [stable]
- Updated fix for DER decoding issue to not depend on specific compilers.
- Updated DER decoding check to apply to short form integers as well.
2012-06-03 21:33:26 +00:00
bsiegert
e4057605cd + p5-BSD-arc4random 2012-06-02 14:32:15 +00:00
bsiegert
890fe76cd0 Import BSD::arc4random from wip. From DESCR:
This module provides a Perl API for the BSDs' arc4random(3) suite
of functions and adds a few high-level functions, such as the new
arc4random_uniform(3). The Perl functions are ithreads-safe (only
if threads::shared is required). Scalars can be tied to this pak-
kage, yielding uniformly distributed random numbers with an arbi-
trary upper bound on read access, contributing to the RC4 entropy
pool on write access. An exported global $RANDOM variable returns
15-bit unsigned random numbers, from [0; 32767], similar to mksh.
Furthermore, Perl's internal PRNG is seeded with entropy obtained
from the arc4random generator once on module load time.
2012-06-02 14:29:42 +00:00
taca
5bb6151de0 Update ruby-net-ssh to 2.5.2.
=== 2.5.2 / 25 May 2012

* Fix for Net::SSH::KnownHosts::SUPPORTED_TYPE [Marco Sandrini]

=== 2.5.1 / 24 May 2012

* Added missing file to manifest [Marco Sandrini]

=== 2.5.0 / 24 May 2012

* Implement many algorithms [Ryosuke Yamazaki]
  * Key Exchange
     * diffie-hellman-group14-sha1
     * ecdh-sha2-nistp{256,384,521}
   * Host Key
     * ecdsa-sha2-nistp{256,384,521}
   * Authentication
     * ecdsa-sha2-nistp{256,384,521}
   * HMAC
     * hmac-ripemd160
   * Cipher:
     * aes{128,192,256}-ctr
     * camellia{128,192,256}-ctr
     * blowfish-ctr
     * cast128-ctr
     * 3des-ctr
     * arcfour (has problems with weak keys, and should be used with caution)
     * camellia{128,192,256}-cbc

=== 2.4.0 / 17 May 2012

* Support for JRuby + Pageant + Windows [arturaz]
2012-06-02 01:01:29 +00:00
dholland
584e5f8b4e LIBS.SunOS+=-lsocket -lnsl 2012-06-01 00:16:02 +00:00
imil
eb7e06e6aa add & enable clusterssh 2012-05-31 16:56:08 +00:00
imil
c81e08a7de Initial import of clusterssh, version 4.01.01, into the NetBSD Packages
Collection.

The is the Perl application bundle for ClusterSSH (a.k.a cssh), formally
a GNU tools based project.

ClusterSSH is a tool for making the same change on multiple servers at
the same time.  The 'cssh' command opens an administration console and
an xterm to all specified hosts.  Any text typed into the administration
console is replicated to all windows.  All windows may also be typed into
directly.

This tool is intended for (but not limited to) cluster administration
where the same configuration or commands must be run on each node
within the cluster.  Performing these commands all at once via this
tool ensures all nodes are kept in sync.
2012-05-31 16:54:10 +00:00
imil
fb7c5aa408 Added support for OpenSSH-lpk
The OpenSSH LDAP Public Key patch provides an easy way of centralizing strong
user authentication by using an LDAP server for retrieving public keys instead
of ~/.ssh/authorized_keys.
2012-05-31 11:58:37 +00:00
sno
1c0c936f56 Updating package for CPAN module Net::OpenSSH in security/p5-Net-OpenSSH
from 0.52 to 0.57.

Upstream changes:
0.57  Dec 21, 2011
        - quote equal sign
        - do not quote commas

0.56_01  Dec 8, 2011
        - rsync methods were failing when user was defined (bug report
          by black_fire)
        - detect when the destructor is being called from a different
          thread (bug report by troy99 at PerlMonks)
        - support for Net::OpenSSH::Gateway added

0.55  Dec 6, 2011
        - solve regression from 0.53_03: rsync methods were broken
          because the hostname was not being correctly removed from
          the ssh command passed to rsync (bug report by Mithun
          Ayachit)

0.54  Dec 4, 2011
        - release as stable

0.53_05  Nov 23, 2011
        - scp methods were broken when a user was given (bug report by
          Andrew J. Slezak)
        - add support for verbose option in scp methods
        - implement parse_connections_opts
        - solve bug related to expansion of HOST var when an IPv6
          address was given
        - move FACTORY docs to the right place
        - add FAQ about running remote commands via sudo
        - add sample for Net::Telnet integration
        - add sample for sudo usage reading password from DATA

0.53_04  Sep 2, 2011
        - add default_ssh_opts feature
        - getpwuid may fail, check $home is defined before using it
        - add FAQ entry about MaxSessions limit reached
        - move FACTORY docs to the right place

0.53_03  Aug 18, 2011
        - handling of default_std*_file was broken (bug report and
          patch by Nic Sandfield)
        - keep errors from opening default slave streams
        - add Net::OpenSSH::ConnectionCache package
        - add FACTORY hook
        - place '--' in ssh command after host name
        - add support for die_on_error
        - add support for batch_mode feature
        - typo in sample code corrected (reported by Fernando Sierra)
        - using { stdin_data => [] } was generating warnings

0.53_02  Jul 12, 2011
        - add support for custom login handlers
        - remove SIG{__WARN__} localizations

0.53_01  May 15, 2011
        - quoter and glob_quoter fully rewritten from scratch
        - quoter was not handling "\n" correctly (bug report and work
          around by Skeeve)
        - minor doc improvements
2012-05-31 08:53:04 +00:00
sno
a20e4011cd Updating package for Perl module IO::Socket::SSL from CPAN in
security/p5-IO-Socket-SSL from 1.66 to 1.74.

Upstream changes:
v1.74 2012.05.13
- accept a version of SSLv2/3 as SSLv23, because older documentation
  could be interpreted like this
v1.73 2012.05.11
- make test t/dhe.t hopefully work for more version of openssl
  Thanks to paul[AT]city-fan[DOT]org for providing bug reports and
  testing environment
v1.72 2012.05.10
- set DEFAULT_CIPHER_LIST to ALL:!LOW instead of HIGH:!LOW
  Thanks to dcostas[AT]gmail[DOT]com for problem report
v1.71 2012.05.09
- 1.70 done right. Also don't disable SSLv2 ciphers, SSLv2 support is better
  disabled by the default SSL_version of 'SSLv23:!SSLv2'
v1.70 2012.05.08
- make it possible to disable protols using SSL_version, make SSL_version
  default to 'SSLv23:!SSLv2'
v1.69 2012.05.08
- re-added workaround in t/dhe.t
v1.68 2012.05.07
- remove SSLv2 from default cipher list, which makes failed tests after last
  change work again, fix behvior for empty cipher list (use default)
v1.67 2012.05.07
- https://rt.cpan.org/Ticket/Display.html?id=76929
  thanks to d[DOT]thomas[AT]its[DOT]uq[DOT]edu[DOT]au for reporting
  - if no explicit cipher list is given it will now default to ALL:!LOW instead
    of the openssl default, which usually includes weak ciphers like DES.
  - new config key SSL_honor_cipher_order and documented how to use it to fight
    BEAST attack.
2012-05-31 08:50:01 +00:00
sno
562314dfd4 Updating package for CPAN module Net::SSLeay in security/p5-Net-SSLeay
from 1.45 to 1.48.

Upstream changes since 1.45:
1.48 2012-04-25
     Removed unneeded Debian_CPANTS.txt from MANIFEST.
     Fixed incorrect documentation about the best way to call CTX_set_options.
     Fixed problem that caused Undefined subroutine utf8::encode @
     t/local/33_x509_create_cert.t (on perl 5.6.2). Thanks to kmx.
     In examples and pod documentations, changed #!/usr/local/bin/perl to #!/usr/bin/perl.
     t/local/06_tcpecho.t now tries a number of ports to bind to until
     successful.

1.47 2012-04-04
     Fixed overlong lines in pod, patch from Salvatore Bonaccorso, Debian Perl
     Group
     Fixed spelling errors in pod, patch from Salvatore Bonaccorso, Debian Perl
     Group
     Fixed extra "garbage" files in 1.46 tarball. Patch from kmx.
     Fixed incorrect fail reports on some 64 bit platforms. Patch from paul.
     Fix to avoid FAIL reports from cpantesters with missing openssl
     Use my_snprintf from ppport.h to prevent link failures with perl 5.8 and
     earlier when compiled with MSVC.

1.46 2012-04-03
     Fixed a problem reported by Atoomic:
      When bootstrapping Net::SSleay ( with DynaLoader ) if you override the SIG{DIE} signal, using
      Net::SSLeay will result in an error.
      Recreated META.yml, added META.yml to dist
      Fixed typo: the word "corresponding" was mis-spelled as "coresponding"
       throughout the POD. Patched by kmx.
      Updated META.yml to include repository and bugtracker
     Constants cleanup - removing non existing constants (perhaps from pre-0.9.6 era) - kmx
     Automatic constants.c generation via helper_script/regen_openssl_constants.pl - kmx
     Future changes in constants now under better control via
     t/local/21_constants.t - kmx
     Added missing new files
     Reordering @EXPORT_OK (constants first, functions next) - kmx
     Adding missing 51 constants to @EXPORT_OK + test to keep it in sync - kmx
     Instructions "howto add new constant" added to helper_script/regen_openssl_constants.pl - kmx
     NEWLY INTRODUCED CONSTANTS:
     - Net::SSLeay::ASN1_STRFLGS_ESC_CTRL
     - Net::SSLeay::ASN1_STRFLGS_ESC_MSB
     - Net::SSLeay::ASN1_STRFLGS_ESC_QUOTE
     - Net::SSLeay::ASN1_STRFLGS_RFC2253
     - Net::SSLeay::ERROR_WANT_ACCEPT
     - Net::SSLeay::EVP_PKS_DSA
     - Net::SSLeay::EVP_PKS_EC
     - Net::SSLeay::EVP_PKS_RSA
     - Net::SSLeay::EVP_PKT_ENC
     - Net::SSLeay::EVP_PKT_EXCH
     - Net::SSLeay::EVP_PKT_EXP
     - Net::SSLeay::EVP_PKT_SIGN
     - Net::SSLeay::EVP_PK_DH
     - Net::SSLeay::EVP_PK_DSA
     - Net::SSLeay::EVP_PK_EC
     - Net::SSLeay::EVP_PK_RSA
     - Net::SSLeay::MBSTRING_ASC
     - Net::SSLeay::MBSTRING_BMP
     - Net::SSLeay::MBSTRING_FLAG
     - Net::SSLeay::MBSTRING_UNIV
     - Net::SSLeay::MBSTRING_UTF8
     - Net::SSLeay::OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION
     - Net::SSLeay::OP_CISCO_ANYCONNECT
     - Net::SSLeay::OP_CRYPTOPRO_TLSEXT_BUG
     - Net::SSLeay::OP_LEGACY_SERVER_CONNECT
     - Net::SSLeay::OP_NO_TLSv1_1
     - Net::SSLeay::OP_NO_TLSv1_2
     - Net::SSLeay::OP_SINGLE_ECDH_USE
     - Net::SSLeay::OP_TLS_BLOCK_PADDING_BUG
     - Net::SSLeay::X509_V_FLAG_CHECK_SS_SIGNATURE
     - Net::SSLeay::X509_V_FLAG_EXTENDED_CRL_SUPPORT
     - Net::SSLeay::X509_V_FLAG_POLICY_MASK
     - Net::SSLeay::X509_V_FLAG_USE_DELTAS
     - Net::SSLeay::X509_V_OK
     - Net::SSLeay::XN_FLAG_COMPAT
     - Net::SSLeay::XN_FLAG_DN_REV
     - Net::SSLeay::XN_FLAG_DUMP_UNKNOWN_FIELDS
     - Net::SSLeay::XN_FLAG_FN_ALIGN
     - Net::SSLeay::XN_FLAG_FN_LN
     - Net::SSLeay::XN_FLAG_FN_MASK
     - Net::SSLeay::XN_FLAG_FN_NONE
     - Net::SSLeay::XN_FLAG_FN_OID
     - Net::SSLeay::XN_FLAG_FN_SN
     - Net::SSLeay::XN_FLAG_MULTILINE
     - Net::SSLeay::XN_FLAG_ONELINE
     - Net::SSLeay::XN_FLAG_RFC2253
     - Net::SSLeay::XN_FLAG_SEP_COMMA_PLUS
     - Net::SSLeay::XN_FLAG_SEP_CPLUS_SPC
     - Net::SSLeay::XN_FLAG_SEP_MASK
     - Net::SSLeay::XN_FLAG_SEP_MULTILINE
     - Net::SSLeay::XN_FLAG_SEP_SPLUS_SPC
     - Net::SSLeay::XN_FLAG_SPC_EQ
     A number of tests were present in svn, but missing from MANIFEST, and
        were therefore not included in the dist. Added.
     NEWLY INTRODUCED FUNCTIONS:
     - Net::SSLeay::ASN1_INTEGER_free
     - Net::SSLeay::ASN1_INTEGER_get
     - Net::SSLeay::ASN1_INTEGER_new
     - Net::SSLeay::ASN1_INTEGER_set
     - Net::SSLeay::EVP_PKEY_assign_RSA
     - Net::SSLeay::EVP_PKEY_bits
     - Net::SSLeay::EVP_PKEY_free
     - Net::SSLeay::EVP_PKEY_new
     - Net::SSLeay::EVP_PKEY_size
     - Net::SSLeay::EVP_get_cipherbyname
     - Net::SSLeay::OPENSSL_add_all_algorithms_conf
     - Net::SSLeay::OPENSSL_add_all_algorithms_noconf
     - Net::SSLeay::OpenSSL_add_all_algorithms
     - Net::SSLeay::PEM_get_string_PrivateKey
     - Net::SSLeay::PEM_get_string_X509_CRL
     - Net::SSLeay::PEM_get_string_X509_REQ
     - Net::SSLeay::PEM_read_bio_PrivateKey
     - Net::SSLeay::PEM_read_bio_X509
     - Net::SSLeay::PEM_read_bio_X509_REQ
     - Net::SSLeay::P_ASN1_INTEGER_get_dec
     - Net::SSLeay::P_ASN1_INTEGER_get_hex
     - Net::SSLeay::P_ASN1_INTEGER_set_dec
     - Net::SSLeay::P_ASN1_INTEGER_set_hex
     - Net::SSLeay::P_ASN1_STRING_get
     - Net::SSLeay::P_X509_CRL_add_revoked_serial_hex
     - Net::SSLeay::P_X509_CRL_get_serial
     - Net::SSLeay::P_X509_CRL_set_serial
     - Net::SSLeay::P_X509_REQ_add_extensions
     - Net::SSLeay::P_X509_REQ_get_attr
     - Net::SSLeay::P_X509_add_extensions
     - Net::SSLeay::P_X509_copy_extensions
     - Net::SSLeay::P_X509_get_crl_distribution_points
     - Net::SSLeay::P_X509_get_ext_key_usage
     - Net::SSLeay::P_X509_get_key_usage
     - Net::SSLeay::P_X509_get_netscape_cert_type
     - Net::SSLeay::P_X509_get_pubkey_alg
     - Net::SSLeay::P_X509_get_signature_alg
     - Net::SSLeay::P_PKCS12_load_file
     - Net::SSLeay::X509V3_EXT_print
     - Net::SSLeay::X509_CRL_digest
     - Net::SSLeay::X509_CRL_free
     - Net::SSLeay::X509_CRL_get_issuer
     - Net::SSLeay::X509_CRL_get_lastUpdate
     - Net::SSLeay::X509_CRL_get_nextUpdate
     - Net::SSLeay::X509_CRL_get_version
     - Net::SSLeay::X509_CRL_new
     - Net::SSLeay::X509_CRL_set_issuer_name
     - Net::SSLeay::X509_CRL_set_lastUpdate
     - Net::SSLeay::X509_CRL_set_nextUpdate
     - Net::SSLeay::X509_CRL_set_version
     - Net::SSLeay::X509_CRL_sign
     - Net::SSLeay::X509_CRL_sort
     - Net::SSLeay::X509_CRL_verify
     - Net::SSLeay::X509_EXTENSION_get_critical
     - Net::SSLeay::X509_EXTENSION_get_data
     - Net::SSLeay::X509_EXTENSION_get_object
     - Net::SSLeay::X509_NAME_ENTRY_get_data
     - Net::SSLeay::X509_NAME_ENTRY_get_object
     - Net::SSLeay::X509_NAME_add_entry_by_NID
     - Net::SSLeay::X509_NAME_add_entry_by_OBJ
     - Net::SSLeay::X509_NAME_add_entry_by_txt
     - Net::SSLeay::X509_NAME_cmp
     - Net::SSLeay::X509_NAME_digest
     - Net::SSLeay::X509_NAME_entry_count
     - Net::SSLeay::X509_NAME_get_entry
     - Net::SSLeay::X509_NAME_print_ex
     - Net::SSLeay::X509_REQ_add1_attr_by_NID
     - Net::SSLeay::X509_REQ_digest
     - Net::SSLeay::X509_REQ_free
     - Net::SSLeay::X509_REQ_get_attr_by_NID
     - Net::SSLeay::X509_REQ_get_attr_by_OBJ
     - Net::SSLeay::X509_REQ_get_attr_count
     - Net::SSLeay::X509_REQ_get_pubkey
     - Net::SSLeay::X509_REQ_get_subject_name
     - Net::SSLeay::X509_REQ_get_version
     - Net::SSLeay::X509_REQ_new
     - Net::SSLeay::X509_REQ_set_pubkey
     - Net::SSLeay::X509_REQ_set_subject_name
     - Net::SSLeay::X509_REQ_set_version
     - Net::SSLeay::X509_REQ_sign
     - Net::SSLeay::X509_REQ_verify
     - Net::SSLeay::X509_certificate_type
     - Net::SSLeay::X509_digest
     - Net::SSLeay::X509_get_ext_count
     - Net::SSLeay::X509_get_pubkey
     - Net::SSLeay::X509_get_serialNumber
     - Net::SSLeay::X509_get_version
     - Net::SSLeay::X509_issuer_and_serial_hash
     - Net::SSLeay::X509_issuer_name_hash
     - Net::SSLeay::X509_new
     - Net::SSLeay::X509_pubkey_digest
     - Net::SSLeay::X509_set_issuer_name
     - Net::SSLeay::X509_set_pubkey
     - Net::SSLeay::X509_set_serialNumber
     - Net::SSLeay::X509_set_subject_name
     - Net::SSLeay::X509_set_version
     - Net::SSLeay::X509_sign
     - Net::SSLeay::X509_subject_name_hash
     - Net::SSLeay::X509_verify
     - Net::SSLeay::d2i_X509_CRL_bio
     - Net::SSLeay::d2i_X509_REQ_bio
     - Net::SSLeay::d2i_X509_bio
     - Net::SSLeay::set_tlsext_host_name
     - Net::SSLeay::CTX_set_next_protos_advertised_cb
     - Net::SSLeay::CTX_set_next_proto_select_cb
     - Net::SSLeay::P_next_proto_negotiated
     - Net::SSLeay::P_next_proto_last_status
     Fixed a problem with multiple Safefree of GLOBAL_openssl_mutex when run
     under apache2+mod_perl on recent Debain distros. Removed END and
     openssl_threads_cleanup() since they can be called during thread
     destruction, and not necessarily at process exit time.
     Added missing helper_script/regen_openssl_constants.pl to MANIFEST. Add
     MANIFEST to svn.
     Fixed reported errors about try to plan twice in 21_constants.t on some platforms.
     Removed MANIFEST from svn, improve possibility to use Module::Install in Net-SSleay
     distribution in usual way. new target for make manifest
     Fix 2 issues with CTX_use_PKCS12_file
      1/ leaking memory - missing EVP_PKEY_free + X509_free
      2/ pkcs12 filesize limitation
     Fixed problems with regenerating scripts in Makefile.PL
     Added missing dependencies for SSLeay.o to Makefile.PL
     Added missing test files to svn
     Fixed calling convention for Net::SSLeay::get_shared_ciphers + test + doc update
     Added coding guidelines to SSLeay.xs
     Fix for serial number issue.
     Major patch to refactor callback code to make it more extensible and
     remove duplicate code. Thanks to kmx.
     Fixed a problem in  t/local/07_sslecho.t when running on
     openssl-0.9.6
     Fixed pod parsing errors reported by Olivier Mengué
     Better prevention of leaking SVs in the new callback stuff
     Debug messages in SSLeay.xs can be enabled by: perl Makefile.PL DEFINE=-DSHOW_XS_DEBUG
     Fixing X509_NAME_oneline (calling OPENSSL_free at the right place)
     Fixed a problem with crashing when run under apache2+modssl+modperl on
     Debian Wheezy. Now detects if it is running under ModPerl and uses ModSSLs
     thread locking instead.
     Added more debg printing. Enable with
     	   perl Makefile.PL DEFINE=-DSHOW_XS_DEBUG
     Added NPN support, thanks to kmx
     Added t/local/40_npn_support.t tests for new NPN support
     Fixed some compiler warnings. Courtesy kmx.
     Fixed a problem with Win32 detection. Courtesy kmx.
2012-05-31 08:46:11 +00:00
sno
452c6c3adf Updating package for CPAN module Digest::MD5::File in
security/p5-Digest-MD5-File from 0.07nb3 to 0.08.

pkgsrc changes:
- Digest::MD5 distributed with Perl5 core satisfies dependency, CPAN
  module is not required

Upstream changes:
0.08  Fri Apr  6 19:39:52 2012
    - Address rt 76174 (accept a filename that ends with a space)
    - Address rt 44106 (Documentation issue)
    - Address rt 39898 (Inconsistent results from adddir)
2012-05-31 08:34:42 +00:00
sno
282b5ae2ec Updating package for CPAN module Digest::CRC in security/p5-Digest-CRC
from 0.17 to 0.18.

Upstream changes:
0.18  Sat Nov 12 23:09:05 2011
        - added convenience wrappers for 'cont', #70672
        - fixed few issues in xs code, #70674
        - added openpgparmor support, #72387
2012-05-31 08:29:15 +00:00
adam
5c41303036 Changes 1.8.0:
This is a new major stable release.  Brief changes compared to 1.6.x:
* SAML20 support following RFC 6595.
* OPENID20 support following RFC 6616.
* Added SMTP server examples (for e.g., SCRAM, SAML20, OPENID20).
* Various cleanups, portability and other bug fixes.
See the NEWS entries during the 1.7.x branch for details.
2012-05-30 06:52:58 +00:00
adam
c8cf04a8aa Changes 2.12.19:
* libgnutls: When decoding a PKCS #11 URL the pin-source field is assumed to be
  a file that stores the pin.
* libgnutls: Added strict tests in Diffie-Hellman and SRP key exchange public
  keys.
* minitasn1: Upgraded to libtasn1 version 2.13 (pre-release).
2012-05-30 06:51:37 +00:00
wiz
81c617df6d Update to 2.6:
2.6
===
	* [CVE-2012-2417] Fix LP#985164: insecure ElGamal key generation.
	  (thanks: Legrandin)

	  In the ElGamal schemes (for both encryption and signatures), g is
	  supposed to be the generator of the entire Z^*_p group.  However, in
	  PyCrypto 2.5 and earlier, g is more simply the generator of a random
	  sub-group of Z^*_p.

	  The result is that the signature space (when the key is used for
	  signing) or the public key space (when the key is used for encryption)
	  may be greatly reduced from its expected size of log(p) bits, possibly
	  down to 1 bit (the worst case if the order of g is 2).

	  While it has not been confirmed, it has also been suggested that an
	  attacker might be able to use this fact to determine the private key.

	  Anyone using ElGamal keys should generate new keys as soon as practical.

	  Any additional information about this bug will be tracked at
	  https://bugs.launchpad.net/pycrypto/+bug/985164

	* Huge documentation cleanup (thanks: Legrandin).

	* Added more tests, including test vectors from NIST 800-38A
	  (thanks: Legrandin)

	* Remove broken MODE_PGP, which never actually worked properly.
	  A new mode, MODE_OPENPGP, has been added for people wishing to write
	  OpenPGP implementations.  Note that this does not implement the full
	  OpenPGP specification, only the "OpenPGP CFB mode" part of that
	  specification.
	  https://bugs.launchpad.net/pycrypto/+bug/996814

	* Fix: getPrime with invalid input causes Python to abort with fatal error
	  https://bugs.launchpad.net/pycrypto/+bug/988431

	* Fix: Segfaults within error-handling paths
	  (thanks: Paul Howarth & Dave Malcolm)
	  https://bugs.launchpad.net/pycrypto/+bug/934294

	* Fix: Block ciphers allow empty string as IV
	  https://bugs.launchpad.net/pycrypto/+bug/997464

	* Fix DevURandomRNG to work with Python3's new I/O stack.
	  (thanks: Sebastian Ramacher)

	* Remove automagic dependencies on libgmp and libmpir, let the caller
	  disable them using args.

	* Many other minor bug fixes and improvements (mostly thanks to Legrandin)
2012-05-25 08:28:13 +00:00
pettai
448d8b50ff OpenDNSSEC 1.3.8
* OPENDNSSEC-228: Signer Engine: Make 'ods-signer update' reload signconfs
  even if zonelist has not changed.
* OPENDNSSEC-231: Signer Engine: Allow for Classless IN-ADDR.ARPA names
  (RFC 2317).
* OPENDNSSEC-234: Enforcer: Add indexes for foreign keys in kasp DB. (sqlite
  only, MySQL already has them.)
* OPENDNSSEC-246: Signer Engine: Warn if <Audit/> is in signer configuration,
  but ods-auditor is not installed
* OPENDNSSEC-249: Enforcer: ods-ksmutil: If key export finds nothing to do
  then say so rather than display nothing which might be misinterpreted.

Bugfixes:
* OPENDNSSEC-247: Signer Engine: TTL on NSEC(3) was not updated on SOA
  Minimum change.
* OPENDNSSEC-253: Enforcer: Fix "ods-ksmutil zone delete --all"
2012-05-23 10:09:21 +00:00
pettai
2316f8d166 SoftHSM 1.3.3
* Increased performance by adding more indexes to the database.
* Describe the usage of SO and user PIN in the README.

Bugfixes:
* Detect if a C++ compiler is missing.
2012-05-23 10:05:44 +00:00
joerg
c7bfb89d94 Fix build on NetBSD/amd64, if the kernel was built on a host with 386 in
its name.
2012-05-22 06:00:11 +00:00
marino
10303c9a85 security/botan: Fix DragonFly-*-i386 PLIST 2012-05-20 11:43:33 +00:00
obache
ef509dee9a Add missing dependency on p5-IO-Socket-SSL and p5-libwww (for LWP::UserAgent).
Bump PKGREVISION.
2012-05-17 10:52:48 +00:00
obache
e6d37553d6 Change HOMEPAGE to permalink. 2012-05-17 10:35:14 +00:00
wiz
60b7466218 pkglint cleanup: use standard packlist path. 2012-05-17 10:21:12 +00:00
jnemeth
b78cedd6a3 add and enable p5-AuthCAS 2012-05-17 05:05:37 +00:00
bouyer
d792695085 Inital import of security/p5-AuthCAS version 1.5
AuthCAS aims at providing a Perl API to Yale's Central Authentication System
(CAS). Only a basic Perl library is provided with CAS whereas AuthCAS is a
full object-oriented library.
2012-05-16 15:55:23 +00:00
taca
1b193d34b2 Update sudo package to 1.7.9p1.
Fix seuciry problem of CVE-2012-2337.


What's new in Sudo 1.7.9p1?

 * Fixed a bug when matching against an IP address with an associated
   netmask in the sudoers file.  In certain circumstances, this
   could allow users to run commands on hosts they are not authorized
   for.

What's new in Sudo 1.7.9?

 * Fixed a false positive in visudo strict mode when aliases are
   in use.

 * The line on which a syntax error is reported in the sudoers file
   is now more accurate.  Previously it was often off by a line.

 * The #include and #includedir directives in sudoers now support
   relative paths.  If the path is not fully qualified it is expected
   to be located in the same directory of the sudoers file that is
   including it.

 * visudo will now fix the mode on the sudoers file even if no changes
   are made unless the -f option is specified.

 * The "use_loginclass" sudoers option works properly again.

 * For LDAP-based sudoers, values in the search expression are now
   escaped as per RFC 4515.

 * Fixed a race condition when I/O logging is not enabled that could
   result in tty-generated signals (e.g. control-C) being received
   by the command twice.

 * If none of the standard input, output or error are connected to
   a tty device, sudo will now check its parent's standard input,
   output or error for the tty name on systems with /proc and BSD
   systems that support the KERN_PROC_PID sysctl.  This allows
   tty-based tickets to work properly even when, e.g. standard
   input, output and error are redirected to /dev/null.

 * Fixed a bug where a pattern like "/usr/*" included /usr/bin/ in
   the results, which would be incorrectly be interpreted as if the
   sudoers file had specified a directory.

 * "visudo -c" will now list any include files that were checked
   in addition to the main sudoers file when everything parses OK.

 * Users that only have read-only access to the sudoers file may
   now run "visudo -c".  Previously, write permissions were required
   even though no writing is down in check-only mode.

What's new in Sudo 1.7.8p2?

 * Fixed a crash in the monitor process on Solaris when NOPASSWD
   was specified or when authentication was disabled.
2012-05-16 14:49:55 +00:00
dholland
179fc8a900 Add missing pam.bl3.mk. 2012-05-14 08:03:54 +00:00
dholland
91d072329c Set PKG_DESTDIR_SUPPORT. It looks to me like it should probably just work;
I can't test it though right now due to some kind of JVM lossage.
2012-05-14 05:47:09 +00:00
wiz
f11d5436d1 "Convert" to destdir by moving one line higher up. 2012-05-13 15:23:33 +00:00
wiz
ea61d28556 + ocaml-cryptokit 2012-05-12 17:54:16 +00:00
wiz
ec567f8aff Initial import of ocaml-cryptokit-1.5. Packaged byJaap Boender in PR 41691.
The Cryptokit library for Objective Caml provides a variety of
cryptographic primitives that can be used to implement cryptographic
protocols in security-sensitive applications. The primitives provided
include:

Symmetric-key cryptography: AES, DES, Triple-DES, ARCfour, in ECB,
CBC, CFB and OFB modes. Public-key cryptography: RSA encryption and
signature; Diffie-Hellman key agreement. Hash functions and MACs:
SHA-1, MD5, and MACs based on AES and DES. Random number generation.
Encodings and compression: base 64, hexadecimal, Zlib compression.

Additional ciphers and hashes can easily be used in conjunction
with the library. In particular, basic mechanisms such as chaining
modes, output buffering, and padding are provided by generic classes
that can easily be composed with user-provided ciphers. More
generally, the library promotes a "Lego"-like style of constructing
and composing transformations over character streams.
2012-05-12 17:53:40 +00:00
wiz
4326abf388 Add CONFLICTS with new man-pages package. For details, see
man-pages/Makefile.
2012-05-12 07:37:50 +00:00