Commit graph

188061 commits

Author SHA1 Message Date
tron
9eecf6a5de Build with generic FPU code under Mac OS X Lion as the assembler code
causes linker errors.
2012-06-17 07:17:57 +00:00
dholland
366b3499a6 Needs curses, not just termcap. Not bumping revision since it won't have
built since the previous bump, except where curses and termcap pull in
the same depends, in which case it doesn't matter.
2012-06-17 02:55:47 +00:00
dholland
6a338434ef Adding yacc to TOOLS broke the NetBSD build because the yacc configure
test is thoroughly messed up. Work around the problem by forcing it to
run yacc from $PATH.
2012-06-17 02:47:58 +00:00
tron
4c2c0df62d Add a hack to work around a compiler bug under Mac OS X Lion. 2012-06-17 00:22:10 +00:00
tron
7beeb76e96 Add a hack to work around a compiler bug under Mac OS X Lion. 2012-06-17 00:10:40 +00:00
agc
3b02eb3914 Note the start of the freeze for new functionality and infrastructure
changes, in preparation for pkgsrc-2012Q2.

There will be one more change forthcoming, to be made to the
infrastructure related to shared libraries - it will be discussed and
reviewed on the mailing lists prior to commit.
2012-06-17 00:07:53 +00:00
dholland
d8014ca40b Not MAKE_JOBS_SAFE. 2012-06-16 23:45:39 +00:00
dholland
8944672d59 Add patch I've been carrying around to fix the MAKE_JOBS build. 2012-06-16 23:21:14 +00:00
wiz
bc6c6a6638 Remove unnecessary include. 2012-06-16 23:06:07 +00:00
wiz
4f06bf62cf Fix build on NetBSD-current with libexecinfo. 2012-06-16 23:05:41 +00:00
pettai
363cd3090b Updated security/zkt to 1.1.0 2012-06-16 22:55:53 +00:00
pettai
c1163104ad zkt 1.1 -- 30. Jan 2012
* misc  Release numbering changed to three level "major.minor.revison" scheme
* bug   REMOVE_HOLD_TIME was set to 10 days only (Thanks to Chris Thompson)
* doc   Improved README file (Thanks to Jan-Piet Mens)
* misc  Fix of some typos in log messages
* bug   Fixed error in rollover.c (return code of genfirstkey() wasn't checked)
* misc  Default of KeySetDir changed from NULL to ".." (best for hierarchical mode)
        Default Sig Lifetime changed from 10 days to 3 weeks (21 days)
        Default ZSK lifetime changed from 3 months to 4 times the sig lifetime
        Default KSK lifetime changed from 1 year to 2 years
        Parameter checks in checkconfig() adapted.
        KSK random device changed back from /dev/urandom to BIND default
        (Be aware of some possibly long delay in key generation)
* func  New configure option to set the bind utility path manually (--enable-bindutil_path)
        BIND_UTIL_PATH in config_zkt.h will no longer used
* bug   If nsec3 is turned on and KeyAlgo (or AddKeyAlgo) is RSHASHA1
        or DSA, genkey() uses algorithm type NSECRSASHA1 or NSEC3DSA instead.
* bug   Error in printconfigdiff() fixed. (Thanks to Holger Wirtz)
* func  Description added to (some of the) dnssec.conf parameters
* func  Adding a patch from Hrant Dadivanyan to always pre-publish ZSKs
* misc  Config file syntax changed to parameter names without underscores.
        zkt-conf uses ZKT_VERSION string as config version
* bug   "make install-man" now installs all man page
* bug   Bug fixed in zfparse.c. zkt-conf was unable to detect an already
        included dnskey.db file if another file was included.
* misc  destination dnssec-zkt removed from Makefile.in
* func  dki_prt_managedkeys() added to dki.c
        zkt_list_managedkeys() added to zkt.c
        zkt-ls has new option -M to print out a list of managed-keys
* bug   Bug fixed in the config parser (zconf.c). Couldn't parse
        agorithm RSASHA512 correctly (Thanks to Michael Sinatra)
2012-06-16 22:55:25 +00:00
dholland
ed7688d974 Remove 52 from PHP_VERSIONS_ACCEPTED. 2012-06-16 22:34:23 +00:00
wiz
4544c2b96c Updated multimedia/gmplayer to 1.1nb1 2012-06-16 22:29:06 +00:00
wiz
ca6f56a96e Ryosuke Moro reports in PR 46605 that gmplayer now looks for its skins
somewhere else. Adapt it. Bump PKGREVISION.
2012-06-16 22:28:56 +00:00
wiz
1ff5e095f5 It's gnu/bin, not bin/gnu. From HITOSHI OSADA in PR 46607 2012-06-16 22:22:54 +00:00
pettai
eacb4d6bfc Updated security/pam-krb5 to 4.6 2012-06-16 22:16:02 +00:00
pettai
3a38288d0b pam-krb5 4.6
* Add an anon_fast option that attempts anonymous authentication
    (generally implemented via anonymous PKINIT inside the Kerberos
    library) and then, if successful, uses those credentials for FAST
    armor.  If fast_ccache and anon_fast are both specified, anonymous
    authentication will be used as a fallback if the specified FAST ticket
    cache doesn't exist.  Based on patches from Yair Yarom.
  * Add a user_realm option to only set the realm for unqualified user
    principals.  This differs from the existing realm option in that realm
    also changes the default realm for authorization decisions and for
    verification of credentials.  Update the realm option documentation to
    clarify the differences and remove incorrect information.  Patch from
    Roland C. Dowdeswell.
  * Add a no_prompt option to suppress the PAM module's prompt for the
    user's password and defer all prompting to the Kerberos library.  This
    allows the Kerberos library to have complete control of the prompting
    process, which may be desireable if authentication mechanisms other
    than password are in use.  Be aware that, with this option set, the
    PAM module has no control over the contents of the prompt and cannot
    store the user's password in the PAM data.  Based on a patch by Yair
    Yarom.
  * Add a silent option to force the module to behave as if the
    application had passed in PAM_SILENT and suppress text messages and
    errors from the Kerberos library.  Patch from Yair Yarom.
  * Add preliminary support for Kerberos trace logging via a trace option
    that enables trace logging if supported by the underlying Kerberos
    library.  The option takes as an argument the file name to which to
    log trace output.  This option does not yet work with any released
    version of Kerberos, but may work with the next release of MIT
    Kerberos.
  * MIT Kerberos does not add a colon and space to its password prompts,
    but Heimdal does.  pam-krb5 previously unconditionally added a colon
    and space, resulting in doubled colons with Heimdal.  Work around this
    inconsistency by not adding the colon and space if already present.
  * Fix alt_auth_map support to preserve the realm of the authentication
    identity when forming the alternate authentication principal, matching
    the documentation.
  * Document that the alt_auth_map format may contain a realm to force all
    mapped principals to be in that realm.  In that case, don't add the
    realm of the authentication identity.  Note that this can be used as a
    simple way to attempt authentication in an alternate realm first and
    then fall back to the local realm, although any complex attempt at
    authentication in multiple realms should instead run the module
    multiple times with different realm settings.
  * Avoid a NULL pointer dereference if krb5_init_context fails.
  * Fix initialization of time values in the module configuration on
    platforms (like S/390X) where krb5_deltat is not equivalent to long.
  * Close a memory leak when search_k5login is set but the user has no
    .k5login file.
  * Close several memory leaks in alt_auth_map support.
  * Suppress bogus error messages about unknown option for the realm
    option.  The option was being parsed and honored despite the error.
  * Retry authentication under try_first_pass on several other errors in
    addition to decrypt integrity check errors to handle a wider array of
    possible "password incorrect" error messages from the KDC.
  * Update to rra-c-util 4.4:
  * Update to C TAP Harness 1.12:
2012-06-16 22:15:23 +00:00
pettai
a47e0c263a Add pam.bl3.mk. 2012-06-16 22:06:34 +00:00
dholland
6ee9ea3486 Add gnome-keyring-sharp. No version bump as it wasn't (and still isn't)
actually buildable.
2012-06-16 22:06:02 +00:00
dholland
1c12b0aadb gnome-keyring-sharp 2012-06-16 22:03:26 +00:00
dholland
e81d420427 +gnome-keyring-sharp 2012-06-16 22:01:17 +00:00
dholland
0f9463f6ac Import gnome-keyring-sharp from wip (with only a couple trivial adjustments)
so f-spot can use it.
2012-06-16 22:00:23 +00:00
pettai
7d751bad45 Updated security/pam-tacplus to 1.3.6 2012-06-16 22:00:13 +00:00
pettai
3ac4b134f3 1.3.6
* Added libpam-runtime support for debian
* Added use_first_pass and try_first_pass option, thanks to Luc Ducazu <lducazu@gmail.com>
* Changed e-mail adres to jeroen@jeroennijhof.nl
* Improved accounting, added cmd attribute for command logging
* Added tac_acct_flag2str()
* Renamed tac_account_read, tac_account_send to tac_acct_read and tac_acct_send
* pam_tacplus.spec.in: fixed static library path and pam_tacplus.so location
* Debian packaging improvements
2012-06-16 21:59:41 +00:00
pettai
d8108aa267 Updated security/dnssec-tools to 1.12.2 2012-06-16 21:26:48 +00:00
pettai
956d7d2539 1.12.2 (5/3/12)
- Bux fix release
   - Rollerd's -alwayssign flag logic had a critical error that could
     have caused a zone to be signed with the wrong ZSK at particular
     points of the ZSK key rolling process.
2012-06-16 21:25:58 +00:00
dholland
93c7564dbd -emacs-24.1 2012-06-16 21:08:06 +00:00
dholland
8247788011 emacs24, emacs24-nox11 2012-06-16 21:07:52 +00:00
dholland
17fb0ff3f9 +emacs24, emacs24-nox11 2012-06-16 21:07:08 +00:00
dholland
ef191f26d2 Mark this broken until emacs25 snapshots become available. Removing
the package until then seems stupid.
2012-06-16 21:06:17 +00:00
dholland
34ce24c23c Add emacs24. Change the logic for emacs-snapshot to be emacs25, which it
presumably will be once the necessary upstream stuff appears.
2012-06-16 21:04:56 +00:00
dholland
a63c9c82d6 Add emacs24-nox11 package, based on emacs-nox11 (which is currently
emacs23) but attached to emacs24.
2012-06-16 21:04:16 +00:00
dholland
baf70d58c0 Add emacs24 package, based on wip/emacs-rc. 2012-06-16 21:03:41 +00:00
tron
039e4f8fd6 Fix 32 bit build under Mac OS X Lion. 2012-06-16 20:52:18 +00:00
pettai
dbb1d20854 Updated security/pam-yubico to 2.12 2012-06-16 20:47:01 +00:00
pettai
4928453dd3 Version 2.12 (released 2012-06-15)
* Only use libyubikey when --with-cr is used.

 * Set correct permissions on tempfile.

 * YubiKey 2.2 contains a bug in challenge-response that makes it output the
   same response to all challenges unless HMAC_LT64 is set. Add warnings to
   ykpamcfg and a warning through conversate in the pam module. Keys programmed
   like this should be reprogrammed with the HMAC_LT64 flag set.
2012-06-16 20:45:33 +00:00
pettai
7650911c43 Updated security/ykpers to 1.6.4 2012-06-16 20:39:19 +00:00
pettai
eac69ed19e Version 1.6.4 (released 2012-05-24)
* Implement option -ooath-id to easily set OATH token identifier.

 * Fix numerous compiler warnings from clang. Thanks to
   Clemens Lang <neverpanic@gmail.com>.
2012-06-16 20:38:51 +00:00
pettai
30569a71f5 Updated security/ykclient to 2.8 2012-06-16 20:33:44 +00:00
pettai
3caf0b288d Updated security/libyubikey to 1.9 2012-06-16 20:33:18 +00:00
pettai
2a4aab7de0 Version 2.8 (released 2012-06-15)
* ykclient: Add C++ namespace protection.

 * Add multi-server support with curl_multi.
   Enabled by default for YubiCloud servers.
   Settable with the new library function set_template_urls() or
   the urls parameter to ykclient_verify_otp_v2().

 * Remove extra % in ykclient help.

 * Add ca path option to ykclient, --ca.
   Patch from Jay Kline <jay.kline.ctr@hpcmo.hpc.mil>.

 * Make the nonce unique for consecutive calls to the same ykclient handle.

 * Do url encoding of OTP before sending.

 * Fix segfault on curl error.
   Patch from Lee Hinman <lee.hinman.ctr@hpc.mil>
2012-06-16 20:32:05 +00:00
pettai
7043b02f8b Version 1.9 (released 2012-05-31)
* Updated ld-version-script from gnulib to silence warnings.

* Fix out-of-tree builds.
2012-06-16 20:26:12 +00:00
pettai
c80911dc97 Updated mail/opendkim to 2.5.2 2012-06-16 20:20:55 +00:00
pettai
ed4ff7d258 2.5.2 2012/04/09
Fix bug #SF3496208: Replace stats/opendkim-genstats with a perl
                script so it's far more efficient.
        Fix bug #SF3514793: Pass proper flags to libdb when creating
                temporary LDAP caches.  Problem noted by Sergey Romanov.
        Fix a crash bug when using LocalADSP with a message with no
                parseable From: field.  Problem noted by John Merriam.
        Fix a crash bug when using LDAP with authentication when LDAPAuthUser
                is not defined.
        STATS: Fix bug #SF3510729: Convert stats/opendkim-gengraphs to a perl
                script.

2.5.1           2012/03/15
        Fix bug #SF3496131: Fix query cache build problem.
        Fix bug #SF3500660: Add Date: header field to generated reports.
        BUILD: A few subsidiary libraries need to know about -lresolv on
                systems that need it.  Reported by Scott Kitterman.
        STATS: Add "-E" command line flag to opendkim-importstats, forcing
                an abort on any input error.

2.5.0           2012/02/29
        #####################################################################
        ###                                                               ###
        ###  This release is dedicated to the memory of J.D. Falk, a      ###
        ###  tireless champion of anti-abuse technology and collaboration ###
        ###  and a founding member of the Board of the Trusted Domain     ###
        ###  Project, a participant in related IETF work, and a long-time ###
        ###  particpant and supporter of MAAWG.  J.D. was taken by cancer ###
        ###  on November 16, 2011.  His enthusiasm and perspective for    ###
        ###  all of this work will be sorely missed.                      ###
        ###                                                               ###
        #####################################################################
        Feature request #SF3385816: Discontinue DomainKeys support.
        Feature request #SF3393282: Update ARF output per
                draft-ietf-marf-authfailure-report-03 et seq.
        Feature request #SF3406814: Add ability to invoke chroot().
        Feature request #SF3477908: Update DKIM reporting per
                draft-ietf-marf-dkim-reporting-10.
        Add "WeakSyntaxChecks" suppressing some short-circuiting error checks
                on syntax.
        Allow a set of test files to be passed via "-t" rather than just one.
        Add _FFR_REPUTATION, and several new support libraries (in the
                libut/ and reputation/ directories) for doing DKIM-based
                reputation evaluations of arriving messages.  Full
                documentation of the algorithms will appear in an upcoming
                white paper.  This also includes several new configuration
                options that make use of reputation data pulled from servers:
                        ReputationCache
                        ReputationCacheTTL
                        ReputationLimits
                        ReputationLowTime
                        ReputationMinimum
                        ReputationLimitModifiers
                        ReputationRatios
                        ReputationSpamCheck
                        ReputationTimeFactor
                For now these are briefly documented in reputation/README.
                As this subsystem matures, they will be fully documented in
                opendkim.conf(5).
        Fix bug #SF3471520: Don't crash when the first line of a configuration
                file is an "Include" instruction.
        Fix bug #SF3475149: Apply RFC2254 encoding to LDAP queries.
        LIBOPENDKIM: Feature request #SF3317160: Per RFC6376, remove
                granularity checks.
        LIBOPENDKIM: Feature request #SF3385768: Add dkim_privkey_load(),
                allowing validation of a private key before reaching
                end-of-message.
        LIBOPENDKIM: Feature request #SF3423226: Copy header field name lists
                instead of using the caller's copy.
        LIBOPENDKIM: Update list of header fields that should be signed
                per RFC6376.
        LIBOPENDKIM: Don't report the absence of "c=" as an error, since
                there is a default.
        LIBOPENDKIM: Add DKIM_SIG_CHECK() macro.  Suggested by Heikki
                Gruner.
        LIBAR: Fix bug #SF2917856: Rename "ar.h" to "async-resolv.h" since
                "ar.h" is already in common use.
        STATS: Feature request #SF3397903: Drop all support for data needed
                for the DKIM Implementation Report, as it has been completed.
                Leave stuff that's useful for reputation R&D.
        STATS: Feature request #SF3402857: Modify opendkim-spam to be able
                to write update records to statistics files.
        STATS: Feature request #SF3439384: Make opendkim-importstats more
                backend-agnostic.
        TOOLS: Add opendkim-testmsg, for signing/verifying messages without
                all the milter code being invoked.
        CONTRIB: Add LDAP documentation and examples.
2012-06-16 20:20:15 +00:00
bsiegert
8ec322d1f9 Comment out dependency on sysutils/user for user and group management.
The user package was removed two years ago :/.
Let's see how we can handle this better on MirBSD.
2012-06-16 20:13:06 +00:00
asau
b350e96b15 Updated lang/yap to 6.2.2 2012-06-16 19:35:11 +00:00
asau
f20d03fe1e Update to Yap 6.2.2
In terms of the core YAP, most changes are small bug fixes. They include

- better support for 64 bits in win64,
- some fixes to the garbage collector
- OSX Lion compilation
- wide char support
- bug in copy_term when some variables have attributes
- fixes to lam interface
- C-interface and SWI support
- over-optimisation of =/2.
- arithmetic exceptions
- write_canonical (Ulrich)
- retracting may not follow lu semantics
- minor predicate import bug.

There has been a lot of progress in ProbLog and cplint.
2012-06-16 19:34:49 +00:00
plunky
8c33f4359a since in recent NetBSD, the /etc/rc.d/sdpd script was merged into
/etc/rc.d/bluetooth we should try to REQUIRE the correct script.
2012-06-16 19:28:19 +00:00
pettai
fa0355ce7e Added sks 2012-06-16 18:59:13 +00:00