Commit graph

5593 commits

Author SHA1 Message Date
scottr
2d02de9bae Store the result of dbm_fetch() before dbm_close() (apparently) clobbers it. 2010-03-21 06:54:10 +00:00
scottr
611c7bebbf Work around a bug described in security/39313. 2010-03-21 06:50:13 +00:00
joerg
2a8b6cd50a Needs pkg-config. 2010-03-19 13:28:09 +00:00
taca
3ae836be58 Restrict to php5 with PHP_VERSION_REQD.
These packages are dropped on PHP 5.3 or has build problem.

No functional change.
2010-03-16 11:56:22 +00:00
sno
c4496833a5 Updating security/p5-Net-DNS-SEC from 0.15 to 0.16
pkgsrc changes:
- Adjust dependencies
- Add license definition

Upstream changes:
***0.16 March 12, 2010
   Feature: KEY inherits DNSKEY
   This helps maintenance in one part of the code.

   Feature: keylength methode rt.cpan.org #53468
   Added keylength method for RSA and DSA
   Acknowledgements Hugo Salgado

   Fix: rt.cpan.org #51778
   Empty bitmap would cause error about undefined ARRAY in NSEC/NSEC3.
   Now the code will allow empty bitmaps gracefully

   Feature: New Algorithm Support (rt.cpan.org #51092)
   SHA2 algorithm support, including NSEC3 algorithm parameters updated
   Acknowledgement Jakob Shlyter

   Fix: rt.cpan.org #42089
   NSEC3 Algorithm support in NSEC3 broken
   patch by Wes Hardaker
2010-03-16 10:32:38 +00:00
sno
4468afecb4 Updating security/p5-Authen-SASL from 2.13 to 2.14
Upstream changes:
Authen-SASL 2.14 -- Thu Mar 11 08:21:07 CST 2010
  * Documentation updates  [Yann Kerherve]
  * Added server API description [Yann Kerherve]
  * Bugfixes to LOGIN, PLAIN and DIGEST_MD5 [Yann Kerherve]
  * Added server support for LOGIN, PLAINaand DIGEST_MD5 [Yann Kerherve]
  * Compatiblity with Authen::SASL::XS [Yann Kerherve]
2010-03-16 10:18:00 +00:00
sno
64bb784240 Updating security/p5-Crypt-Eksblowfish from 0.007 to 0.008
pkgsrc changes:
- Adding license definition
- Adjusting dependencies

Upstream changes:
version 0.008; 2010-03-11
  * bugfix: avoid memory leak when returning block to Perl space
  * check for required Perl version at runtime
  * in XS, avoid using "class" as a variable name, for compatibility
    with C++ compilers
  * in Build.PL, explicitly declare configure-time requirements
  * remove bogus "exit 0" from Build.PL
2010-03-16 10:14:56 +00:00
pettai
fc191d5001 + opensaml 2010-03-15 19:44:02 +00:00
pettai
76fe1e89b6 OpenSAML is a set of open source C++ libraries meant to support developers
working with the Security Assertion Markup Language (SAML). OpenSAML 2,
the current version, supports SAML 1.0, 1.1, and 2.0.
2010-03-15 19:40:44 +00:00
schmonz
076150d7a1 Installs shlibs nowadays, so don't default to a build-only dependency. 2010-03-15 03:21:15 +00:00
pettai
0600e1ada2 Take over MAINTAINER 2010-03-14 13:30:02 +00:00
pettai
bd34c0083c Version 0.13.1
* Fixed bug with reading gzipped aide.db files
        * Removed dead ustat code

Version 0.13
        * Added support for selinux and xattr attributes
        * Added support for the Linux Audit System
        * Fixed usage of libgcrypt instead of libmhash
        * Added file locking for output files
        * Fixed bugs

Version 0.12
        * Fixed bugs
        * Allow http/https/ftp URLs through libcurl
        * Support posix_fadvice() to avoid caching files

Version 0.11
        * Fixed many bugs
        * Updated automake/autoconf scripts
        * Use snprintf by Mark Martinec if not in C library
        * Support for more (legacy) Unix systems and cygwin
        * Open files with O_NOATIME on supported Linux systems
        * Added I/ANF/ARF directives
2010-03-14 13:27:10 +00:00
agc
e6a883b55d Update pkgsrc/security/netpgp to 2.99.1/20100313
Changes to 2.99.1/20100313

+ add functionality to parse basic signature subkeys
+ in doing so, add expiration of keys
+ at the same time, add revocation of keys
+ recognise the primary user id, and use it when displaying user ids
+ recognise self signed keys and subkeys
+ rework the indentation of output
+ add the --list-sigs [userid] option to netpgpkeys(1)
+ use memcmp(3) rather than strcmp(3) when checking binary user ids to
  be exported
+ add expiration display to subkey signature output
+ update libnetpgp library version major number to 3
2010-03-14 01:21:03 +00:00
pettai
f1ebe9e4aa + zkt 2010-03-13 19:22:44 +00:00
pettai
ac04a45891 ZKT is a tool to manage keys and signatures for DNSSEC-zones.
The Zone Key Tool consist of two commands:
* dnssec-zkt to create and list dnssec zone keys and
* dnssec-signer to sign a zone and manage the lifetime of the zone signing keys
Both commands are simple wrapper commands around the dnssec-keygen(8) and
dnssec-signzone(8) commands provided by BIND.
2010-03-13 19:19:51 +00:00
pettai
27f4dbb15e + softhsm 2010-03-13 18:02:27 +00:00
pettai
1dab8d36d7 Fixed wip errors 2010-03-13 17:51:26 +00:00
pettai
445d3b8627 SoftHSM is an implementation of a cryptographic store accessible through a
PKCS#11 interface. You can use it to explore PKCS#11 without having a
Hardware Security Module. It is being developed as a part of the OpenDNSSEC
project. SoftHSM uses Botan for its cryptographic operations.
2010-03-13 17:47:56 +00:00
pettai
34bcee2d35 Removed not needed lines (to a removed patch-file) 2010-03-13 09:27:26 +00:00
obache
391b6b03cc Updte lsh to 2.0.4.
While here,
 * set LICENSE=gnu-gpl-v2
 * marked as user-destdir installation ready
 * switch to use system argp
 * add missing zlib buildlink

News for the 2.0.4 release

	Fixed x11 forwarding bug in the lsh client.

News for the 2.0.3 release

	At startup, lshd now tries to close any spurious open file
	descriptors. New test case for lshd fd leakage.

	lshd --daemonic --no-syslog now sets up a proper daemonic
	environment, except that log messages are still sent to
	stderr. Improved testing of this feature.
2010-03-13 04:40:12 +00:00
pettai
ebd962db40 + pam-tacplus 2010-03-12 22:18:42 +00:00
pettai
a641a45121 TACACS+ protocol client library and PAM module in C.
This PAM module support authentication, authorization (account
management) and accounting (session management) performed using
TACACS+ protocol designed by Cisco.
2010-03-12 22:15:27 +00:00
pettai
6783d7e580 Added LICENSE 2010-03-10 15:55:38 +00:00
pettai
78907cb8db Fix MAINTAINER
(also imported from pkgsrc-wip)
2010-03-09 20:04:55 +00:00
pettai
697dfdf2c6 + p5-Authen-TacacsPlus 2010-03-09 19:59:37 +00:00
pettai
55c8752248 Authen::TacacsPlus allows you to authenticate using tacacs+ server 2010-03-09 19:57:42 +00:00
sno
5f723343ee Updating security/p5-Crypt-Blowfish from 2.10nb1 to 2.12
pkgsrc changes:
- Add recommeded minimum version for Crypt::CBC dependency

Upstream changes:
2.12 04 Mar 2010
	- updated Changes to mesh with revision.

2.11  Feb 2010
	- patched _blowfish.c to stop spurious warnings.
	- updated POD
2010-03-08 15:15:57 +00:00
dholland
5afe118fcb Bump PKGREVISION for previous, on the grounds that fixing errno.h affects
more than just the Linux build.
2010-03-08 01:21:59 +00:00
dholland
0c623f1890 Fix Linux build broken since 2006. Two issues: (1) do _FILE_OFFSET_BITS=64
instead of rolling a private _llseek syscall using now-nonexistent type
declarations; (2) as noted in PR 33893 use errno.h instead of "extern int
errno".
2010-03-08 01:21:24 +00:00
spz
3398cfc505 update to latest release
DESTDIRify
ok'd by manu@
2010-03-06 09:07:15 +00:00
agc
e2bcf790a7 Update to netpgp-20100305
+ clean up some lint
+ the obligatory ''build on os x'' fixes - include <inttypes.h>
2010-03-05 19:59:37 +00:00
agc
6682931cf6 Update netpgp to version 1.99.20/20100304 - portability improvements, and bug fixes:
Changes to 1.99.20/20100304

        + move args to some functions around to be consistent
        + use uint*_t where appropriate
        + fix bug in verify memory
        + add documentation to manual pages to show how to do combined
          signing/encryption and decryption/verification
        + make verification of ascii-armoured memory work the same as binary
	+ eliminate use of strdup(3), strcasecmp(3), and strptime(3).
	  NetBSD/pkgsrc PR 42922 applies - need to define
	  _XOPEN_SOURCE and _BSD_SOURCE for newer linux platforms with
	  glibc 2.10.1.  solved a bit differently, by implementing
	  strdup(3) and strcasecmp(3) independently, and using regexps
	  to avoid calling strptime(3).
2010-03-05 16:20:05 +00:00
taca
e683e43cd2 Update php-suhosin package to 0.9.29.
2009-08-15 - 0.9.29

    - Fixing crash bugs with PHP 5.3.0 caused by unexpected NULL in
      EG(active_symbol_table)
    - Added more compatible way to retrieve ext/session globals
    - Increased default length and count limit for POST variables (for
      people not reading docu)

2009-08-14 - 0.9.28

    - Fixed crash bug with PHP 5.2.10 caused by a change in extension
      load order of ext/session
    - Fixed harmless parameter order error in a bogus memset()
    - Disable suhosin.session.cryptua by default because of Internet
      Explorer 8 "features"
    - Added suhosin.executor.include.allow_writable_files which can be
      disabled to disallow inclusion of files writable by the webserver
2010-03-04 15:38:53 +00:00
taca
606736c60b Fix broken PLIST.
(I wonder why "make print-PLIST" generated wrong result before...")

Bump PKGREVISION.
2010-03-01 08:15:40 +00:00
wiz
2d5caecabb Reset maintainer for developers who gave back their commit bit. 2010-02-26 10:28:30 +00:00
taca
3c9d1189e6 Update openssl to 0.9.8m.
The OpenSSL project team is pleased to announce the release of
   version 0.9.8m of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release which implements
   RFC5746 to address renegotiation vulnerabilities mentioned in
   CVE-2009-3555.  For a complete list of changes,
   please see http://www.openssl.org/source/exp/CHANGES.
2010-02-26 03:15:13 +00:00
taca
21668b77cc Update sudo package to 1.7.2p4.
Major changes between version 1.7.2p3 and 1.7.2p4:

    * Fix a bug that could allow users with permission to run sudoedit
      to run arbitrary commands.

Major changes between version 1.7.2p2 and 1.7.2p3:

    * Fix printing of entries with multiple host entries on a single line.

    * Fix use after free when sending error messages via email.

    * Use setrlimit64(), if available, instead of setrlimit() when
      setting AIX resource limits since rlim_t is 32bits.

    * Fix size arg when realloc()ing include stack.

    * Avoid a duplicate fclose() of the sudoers file.
2010-02-26 01:08:38 +00:00
joerg
347a3789e1 Explicitly pull PREFIX/lib into the normal library search path too.
DESTDIR support
2010-02-25 17:55:48 +00:00
joerg
b8a0542135 Reset MAINTAINER, mail bounced. 2010-02-25 14:59:22 +00:00
drochner
0310e7b0b3 +pinentry-qt4 2010-02-25 11:30:50 +00:00
drochner
0aaafc36fb add the qt4 version of the pinentry widget, from Sverre Froyen per PM 2010-02-25 11:30:03 +00:00
agc
f6243d6d55 add licensing info
modern NetBSD has PAM - add a patch so that this is recognised

there is no reason not to run this on modern NetBSD systems - remove the
old NOT_FOR_PLATFORM, since this runs just fine on NetBSD 5.99.20
2010-02-25 07:15:42 +00:00
tez
78465e099c Fix CVE-2009-4212 (MITKRB5-SA-2009-004) using patches from
http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt
(slightly adjusted for older kerberos version)
2010-02-24 19:07:51 +00:00
sno
7673710988 Updating security/p5-IO-Socket-SSL from 1.31 to 1.32
Upstream changes:
v1.32 2010.02.22
- Makefile.PL: die if Scalar::Util has no dualvar support instead of
  only complaining. Thanks to w[DOT]phillip[DOT]moore[AT]gmail[DOT]com
  for reporting.
2010-02-23 19:04:23 +00:00
drochner
8827289918 share some common stuff 2010-02-22 17:20:39 +00:00
drochner
f548d60039 fix a problem with the curses widget and non-UTF8 locales: keys which
used less bytes in the system encoding than in the UTF8 passed to
the caller caused that the passphrase got truncated because only
the input length was accounted for
bump PKGREVISION
2010-02-22 17:19:09 +00:00
sno
ce7c6a139e Updating security/p5-Net-OpenSSH from 0.44 to 0.45
Upstream changes:
0.45  Feb 17, 2010
	- support for taint mode
	- use better IPv6 regexp
	- bug in glob_quoter incorrectly handling empty strings solved
        - document how $SIG{CHLD} can break some methods and add FAQ
        - some typos corrected
	- update copyright notices
2010-02-22 16:38:15 +00:00
sno
18f3021f2a Updating security/p5-Authen-SASL from 2.12nb1 to 2.13
pkgsrc changes:
- Add license definition
- Adjust dependencies
- Add module type

Upstream changes:
Authen-SASL 2.13 -- Thu Sep 24 17:27:47 CDT 2009
  * RT#42191 Only use pass for GSSAPI credentials if it is an object of type GSSAPI::Cred
  * RT#675 Authorization with Authen::SASL::Perl::External
  * Call client_new and server_new inside eval so further plugins can be tried before failing
  * Prefer to use Authen::SASL::XS over Authen::SASL::Cyrus
2010-02-22 15:56:28 +00:00
sno
c0ddb963d3 Updating security/p5-Data-SimplePassword from 0.04nb1 to 0.05
pkgsrc changes:
- Add license definition
- Add module type
- Order dependencies like in META.yml (upstream)

Upstream changes:
0.05  Tue Oct 13 11:04:46 JST 2009
	* added a few new types for rndpassword(1).
	* added 'endless mode' for rndpassword(1).
	* cleaned code & pod up.
2010-02-22 13:32:25 +00:00
obache
ca1b7fc2e4 * add user-destdir support
* set LICENSE=gnu-gpl-v2
2010-02-20 08:25:51 +00:00
joerg
5b19c39792 Use plain CONF_FILES. Bump revision. 2010-02-19 21:31:56 +00:00
joerg
90fe4c79cc Fix ownership. Bump revision. 2010-02-19 21:30:13 +00:00
heinz
0e7ad94193 Added LICENSE information. 2010-02-19 20:16:40 +00:00
joerg
1fba6ebb5e Fix ownership. Bump revision. 2010-02-19 20:16:05 +00:00
joerg
431680282f Use real root user in install script. 2010-02-19 19:23:50 +00:00
joerg
af6c709913 Fix linkage. Honour CFLAGS. Bump revision. 2010-02-19 15:12:04 +00:00
martti
2eafede819 Regenerated some of the patches. 2010-02-19 10:17:33 +00:00
taca
d96bb24b2e Add checksum for hpn-patch. 2010-02-18 16:27:58 +00:00
martti
d8f1564713 Updated OpenSSH to 5.3.1 (pkg/42635 by Fredrik Pettai)
This is a bugfix release, no new features have been added.

Changes since OpenSSH 5.2
=========================

General Bugfixes:

 * Do not limit home directory paths to 256 characters. bz#1615

 * Several minor documentation and correctness fixes.

Portable OpenSSH Bugfixes:

 * This release removes for support for very old versions of Cygwin and
   for Windows 95/98/ME

 * Move the deletion of PAM credentials on logout to after the session
   close. bz#1534

 * Make PrintLastLog work on AIX. bz#1595

 * Avoid compile errors on FreeBSD from conflicts in glob.h. bz#1634

 * Delay dropping of root privileges on AIX so chroot and pam_open_session
   work correctly. bz#1249 and bz#1567

 * Increase client IO buffer on Cygwin to 64K, realising a significant
   performance improvement.

 * Roll back bz#1241 (better handling for expired passwords on Tru64).
   The change broke password logins on some configurations.

 * Accept ENOSYS as a fallback error when attempting atomic
   rename(). bz#1535

 * Fix passing of variables to recursive make(1) invocations on Solaris.
   bz#1505

 * Skip the tcgetattr call on the pty master on Solaris, since it never
   succeeds and can hang if large amounts of data is sent to the slave
   (eg a copy-paste). bz#1528

 * Fix detection of krb5-config. bz#1639

 * Fix test for server-assigned remote forwarding port for non-root users.
   bz#1578

 * Fix detection of libresolv on OSX 10.6.
2010-02-18 08:04:35 +00:00
wiz
fe4da1582a Update to 0.9.3, needed by KDE-4.4. 2010-02-16 14:08:38 +00:00
sno
0c19f364fa Fixing '.orig' relicts being installed after patching 2010-02-16 13:49:22 +00:00
wiz
d1a15f1d2c Update to 1.1.3:
* keylookup:
  + Fixed typo noticed by lintian in manpage keylookup.1.
* caff:
  + Set the Sender header with the email address which is used for the From
    header. This overrides the default value which was set by the
    MIME::Entity Perl module based on the local hostname. (Closes: #556782)
2010-02-16 11:29:42 +00:00
joerg
8204e18749 Use SETUID_ROOT_PERMS and allow building as normal user. Bump revision. 2010-02-15 17:06:18 +00:00
joerg
263a659d19 "as" is a reserved word in Python 2.6+, so don't use it as variable.
Fix a Python interpreter path while here.
2010-02-15 15:57:44 +00:00
joerg
e00fe5592a Needs pkg-config. 2010-02-14 19:17:40 +00:00
joerg
13b803f691 Don't mess with ldconf. 2010-02-14 19:16:25 +00:00
taca
29d3265fe6 It was missing to replace user in scan-mail.pl.
Add FPROT_GROUP and FPROT_USER to proper handling that user.

Bump PKGREVISION.
2010-02-14 10:56:32 +00:00
agc
2a039a0732 Update the netpgp package to version 20100212/1.99.19
Changes to 1.99.19/20100212

	+ plug some memory leaks, from cppcheck via Thomas Klausner (thanks!)
	+ make the singular of time units read correctly
	+ print decryption key info properly when prompting for passphrase

	Changes to 1.99.18/20100211

	small steps, but lots of them - this is the first one.

	+ print out the correct key information when signing files and memory.
	  what used to be printed out was the copy of the public key which is
	  stored as part of the private key. does not address the info shown
	  when decrypting, since that is done in a different way, by callback.
	  this whole part needs to be re-written, but will have to wait for two
	  good hands.

	Changes to 1.99.17/20100206

	+ get rid of last 2 static variables - use the __ops_printstate_t struct
	  passed down
	+ get rid of 3 occurrences in reader.c where an automatic buffer was
	  addressed (as part of a subsequent callback) by a struct field from
	  a calling scope, and only valid within the callback.  Found by
	  Flexelint and phk - many thanks.
	+ print filename/"memory" when time problems occur when validating signatures

	Changes to 1.99.16/20100205

	+ minor simplifications to netpgp(1) internally
	+ fix a bug in netpgp_verify_file where a non-existent file while listing
	  packets would cause a SIGSEGV
	+ add duration arg to netpgp(1), and check for validity when verifying
	  signatures
	+ add birthtime arg to netpgp(1), and check for validity when verifying
	  signatures
	+ add netpgp commands to print pubkey, if desired
	+ allow the passphrase for the signature to be taken from --pass-fd
	+ get rid of static indent value when printing packet contents
	+ print signature validity times when verifying a file's signature
2010-02-13 00:18:47 +00:00
sno
d5ed57e5c6 Updating security/p5-Crypt-OpenPGP from 1.03nb5 to 1.04
pkgsrc changes:
- Adding license definition
- Adding pgp2-compat option which turns on idea dependency (defaultly off)
- Reordering and updating dependencies to cover fixes

Upstream changes:
1.04 2009.12.10
    - Keyring lookup by uid is now case-insensitive to match the behavior
      in GnuPG. Fixes http://rt.cpan.org/Public/Bug/Display.html?id=2225
    - Got rid of a warning in Crypt::OpenPGP::SKSessionKey related to
      broken calculation of the session_key; that session_key value was
      never used, so I removed the code generating the key, hence removing
      the warning. Addresses
      http://rt.cpan.org/Public/Bug/Display.html?id=29950
    - Default key and config file locations (in compatibility mode) now work
      on Windows. Fixes http://rt.cpan.org/Public/Bug/Display.html?id=18815
    - Updated to use Module::Install. Addresses
      http://rt.cpan.org/Public/Bug/Display.html?id=35983 and
      http://rt.cpan.org/Public/Bug/Display.html?id=31411
    - Made all dependencies required, rather than optional based on
      feature packages. Simplifies distribution and packaging, and addresses
      http://rt.cpan.org/Public/Bug/Display.html?id=41426
    - Removed sign() and auto_install() from Makefile.PL.
    - Removed magic svn keywords.
    - Converted test suite to Test::More.
    - Added author tests (xt/) and modified SYNOPSIS for all modules to
      make them pass the compilation test.
2010-02-12 18:26:36 +00:00
sno
66f0ec507d Updating security/p5-Crypt-DSA from 1.16 to 1.16nb1
- Applying fix from RT#49668 (openssl dsaparam output format change in 1.0
  beta 3 breaks Crypt::DSA::KeyChain), see
  https://rt.cpan.org/Ticket/Display.html?id=49668
2010-02-12 18:16:44 +00:00
sno
1a90f9a373 Updating security/p5-Crypt-RIPEMD160 from 0.04nb3 to 0.04nb4
Applying patch from RT #19138 to fix invalid results on 64-Bit platforms
2010-02-12 18:04:54 +00:00
joerg
d57d537324 Bump revision for change of PostgreSQL default version. 2010-02-10 19:34:05 +00:00
joerg
429e956b3f Bump revision for PYTHON_VERSION_DEFAULT change. 2010-02-10 19:17:31 +00:00
zafer
e433021e97 update master_sites 2010-02-09 00:05:48 +00:00
drochner
91bc53357b create relative symlink from the beginning, the pkgsrc absolute->relative
conversion logics has problems
2010-02-08 11:44:39 +00:00
drochner
5ce28323e9 fix spelling of gtk2 default 2010-02-08 11:43:23 +00:00
tnn
c3fe7d6403 Fix wrong directory ownership. Bump PKGREVISION. 2010-02-08 09:41:59 +00:00
drochner
3ef73591a9 put the pinentry variants which depend on a toolkit into seperate
pkgs rather than having their build controlled by options
(no change in the default case)
2010-02-07 15:36:58 +00:00
drochner
364fc77012 add a patch from upstream CVS to fix a bug which could make keys
unusable on passphrase changes
bump PKGREVISION
2010-02-03 10:58:11 +00:00
schmonz
b58b70153b Update to 0.96. From the changelog:
- Added support for checking permissions in cvm-qmail.  See discussion
   of $CVM_QMAIL_CHECK_PERMS in cvm-qmail.html
- Added support for I/O timeouts for cvm-local modules.
- Fixed the SQLite module to copy the row data.
- Fixed cvm-qmail dieing if control/locals is missing.

pkgsrc changes: set LICENSE and support DESTDIR.
2010-02-03 07:06:12 +00:00
sno
43e80bd9a4 Updating security/p5-Net-SSLeay from 1.35nb2 to 1.36
pkgsrc changes:
- Adjusting dependencies
- Removing compatibility patches which are all applied upstream

Upstream changes:
1.36 30.01.2010
	- Fix problems with building on GNU/kFreeBSD, to do with use of pack
	instread of sockaddr_in. Patched by Debian Perl Group. (Closes RT#40144)
	- Fixed a compile problem in t/local/ptr_cast_test.c for some gcc
	versions. Reported by "Ryan McGuigan via RT". (Closes RT#52525)
	- Improved OpenSSL detection on Win32/strawberry perl. Patch provided
	by kmx. (Closes RT#49287)
	- Fix test failures on some 64-bit platforms. (Closes RT#53585)
	- Make X509_NAME_get_text_by_NID return its result without a trailing NUL.
	Patched by Steffen Ullrich. (Closes RT#35754)
	- SSL_set_session_secret_cb required for EAP-FAST is now enabled for both
	SSL_F_SSL_SET_HELLO_EXTENSION and
	SSL_F_SSL_SET_SESSION_TICKET_EXT. The name of this #define
	changed after 0.9.8i. SSL_set_hello_extension is not available after
	0.9.8i.
	- Added SSL_CTX_get_client_CA_list sk_X509_NAME_free sk_X509_NAME_num
	sk_X509_NAME_value SSL_get_client_CA_list, from patch provided by
	Joerg Schneider
	- Added EVP_add_digest and EVP_sha256 (if available)
	- Improve documentation on callback functions.
	- Stop looping forever when writing to broken connections. Patched by
	Martin Mares. (Closes RT#44170)
	- Patches from "Martijn van Beers via RT" to add SSL_SENT_SHUTDOWN
	and SSL_RECEIVED_SHUTDOWN, remove broken URLs,
	and to fix some documentation issues.
	- Various changes to build with OpenSSL 1.0 beta1:
	SSL_SESSION_cmp has been removed
	return type of SSL_CTX_sessions changed in an ugly way
	- Fixed a build problem reported by SISYPHUS:
	On Windows Vista64, ActivePerl 5.10.0 (build 1004, x64), running 'nmake
	test', the process hangs forever when it comes to building the test
	executable (as the executable fails to build).
	- Applied patch from ecmenifee in to improve handling of errors in
	ssl_write_all. (Closes RT#48132)
	- Patch to permit compile and testing on OS/2 submitted by Ilya
	Zakharevich.
	- Fixed compile problems with openssl-1.0.0-beta3 due to MD2 now being
	optional. Reported by paul [...] city-fan.org.
	- Fixed compile problems with openssl-0.9.7 and earlier with undefined
	symbol EVP_sha256. Reported by paul [...] city-fan.org.
	- Fixed a typo reported by Dan Dascalescu.
	- added RIPEMD160 digest function.  Patch provided by dkg.
2010-02-02 20:53:46 +00:00
sno
aff6f16e4f Updating security/p5-Net-OpenSSH from 0.36 to 0.44
Upstream changes:
0.44
	- solve bug on rsync methods not correctly handling
          pass-through options carrying an argument (bug report by
          Daiju Kito)
	- support several verbose levels in rsync methods
	- document spurious warnings that appear when tty => 1 is
          given and stdin is not attached to a tty

0.43  Dec 14, 2009
        - call ssh with -tt instead of -t to force remote tty
          allocation even when stdin is not attached to one locally
          (bug report by Todd E. Rinaldo)

0.42  Dec 5, 2009
        - add FAQ section
	- add commercial support offering
	- add pointer to my wishlist :-)

0.41_03 Nov 16, 2009
	- add testing known_hosts to MANIFEST
	- some bits where missing from 0.40
	- allow also keyboard-interactive authentication when password
          is given (bug report by Todd E. Rinaldo)

0.40  Nov 14, 2009
        - DESTROY was clobbering $@ (bug report by Todd E. Rinaldo)
	- when password authentication is requested add flags to ssh
          master command to disable other auth. options
	- document how to integrate Net::OpenSSH with Expect

0.39  Oct 10, 2009
	- use SIGTERM instead of SIGHUP to kill lazy SSH master
	- on 1_run.t remote commands could be aliased bug (report and
          patch by Danijel Tasov)
	- add methods for external master PID handling
	- add 'all' tag to Net::OpenSSH::Constants
	- check SSH client version from Makefile.PL
	- work around L<Foo::Bar> links in POD being rendered as "the
          Foo::Bar manpage" by some POD backends.

0.38  Sep 25, 2009
        - remove alpha-status warning from docs!
	- add debug support to master killing
        - DESTROY was generating warnings when called before the
          master connection had been established successfully
        - add variable expansion feature
	- minor doc corrections

0.37  Sep 15, 2009
        - add support for stdout_file, stderr_file and stdin_file
          options
2010-02-02 20:18:29 +00:00
tnn
0878d739d6 sprinkle --tag=CC for libtool 2010-02-02 17:09:28 +00:00
joerg
81c00ff6fd Fix rpath. Honour strip settings. 2010-01-31 23:24:24 +00:00
joerg
c9c9c80811 Fix permissions. 2010-01-31 23:13:24 +00:00
joerg
8e45140b6d DESTDIR support 2010-01-30 19:36:35 +00:00
sno
17e17dde7c Updating security/p5-Crypt-OpenSSL-RSA from 0.25nb3 to 0.26
Upstream changes:
0.26  Sun Nov 22 2009 11:01:13
        - Change subclassing test to generate a 512 bit key in order to
          work around an odd issue seen on some 64-bit redhat systems.
          (CPAN bug 45498)
2010-01-29 10:40:20 +00:00
sno
759bbcb51c Updating security/p5-Crypt-Rijndael from 1.08 to 1.09
pkgsrc changes:
- Updating COMMENT to new short description from upstream

Upstream changes:
1.09 - Sun Jan 17 12:00:33 2010
	* Clarify in the Makefile.PL that this is under LGPL.
	* There are no code changes
2010-01-29 10:19:47 +00:00
joerg
aefc21d5b5 DESTDIR support 2010-01-27 22:05:28 +00:00
joerg
ee255fb0ce DESTDIR support. Fix libXt dependency. Bump revision. 2010-01-27 22:03:53 +00:00
joerg
68e4079922 DESTDIR support 2010-01-27 21:59:21 +00:00
joerg
9565bc226e DESTDIR support 2010-01-27 21:47:00 +00:00
joerg
7b75acb6fd DESTDIR support 2010-01-27 21:32:58 +00:00
joerg
c764992617 Supports DESTDIR. 2010-01-27 21:31:43 +00:00
joerg
5d3baae895 DESTDIR support 2010-01-27 20:57:22 +00:00
joerg
4e06aa332b DESTDIR support from Steven Drake. 2010-01-27 18:21:56 +00:00
joerg
693ec8bb16 DESTDIR support 2010-01-27 16:52:13 +00:00
joerg
53e12bf31f DESTDIR support 2010-01-27 16:41:59 +00:00
joerg
71508bac24 DESTDIR support. Fix comment. 2010-01-27 14:28:28 +00:00
joerg
a94751a19b DESTDIR support 2010-01-27 14:27:39 +00:00
sno
fbfca16631 Added security/p5-Authen-Htpasswd version 0.16.1 2010-01-27 10:31:29 +00:00
sno
480d935255 Importing security/p5-Authen-Htpasswd version 0.16.1 as dependency of
scheduled import of www/p5-Catalyst-Authentication-Store-Htpasswd,
which is recommended by the update of editors/p5-Padre-Plugin-Catalyst.

This module provides a convenient, object-oriented interface to Apache-style
.htpasswd files.  It supports passwords encrypted via MD5, SHA1, and crypt,
as well as plain (cleartext) passwords.  Additional fields after username
and password, if present, are accessible via the extra_info array.
2010-01-27 10:31:17 +00:00
heinz
5e3cd069ac Added LICENSE information. 2010-01-24 17:11:17 +00:00
wiz
7e2c799d4e More PKGREVISION bumps of jpeg dependencies.
Identified by parsing the NetBSD-i386-5.0.1/2009Q3 pkg_summary files
and Robert Elz.
2010-01-24 13:26:09 +00:00
joerg
ad0cd93e23 Also works with Python 2.6. 2010-01-23 22:57:05 +00:00
taca
9fabab017b Add a patch from OpenSSL's repositroy to deal with CVE-2009-4355.
Bump PKGREVISION.
2010-01-22 03:35:10 +00:00
heinz
86f04a46d0 Added LICENSE information. 2010-01-21 23:32:10 +00:00
wiz
7f1b5a8a02 Update to 5.48:
5.48  Mon Jan  4 16:32:52 MST 2010
	- fixed "shasum -a0" option (ref. rt.cpan.org #53319)
		-- incorrectly accepted 0 as a valid algorithm
			-- thanks to Zefram for patch
	- updated URL for NIST test vectors
		-- ref. files t/nistbit.t, t/nistbyte.t
			-- thanks to Leon Brocard for patch
2010-01-20 14:54:58 +00:00
wiz
bfa482b61e Update to 4.29:
Version 4.29, 2009.12.02, urgency: MEDIUM:
* New features sponsored by Searchtech Limited http://www.astraweb.com/
  - sessiond, a high performance SSL session cache was built for stunnel.
    A new service-level "sessiond" option was added.  sessiond is
    available for download on ftp://stunnel.mirt.net/stunnel/sessiond/ .
    stunnel clusters will be a lot faster, now!
* Bugfixes
  - "execargs" defaults to the "exec" parameter (thx to Peter Pentchev).
  - Compilation fixes added for AIX and old versions of OpenSSL.
  - Missing "fips" option was added to the manual.

Version 4.28, 2009.11.08, urgency: MEDIUM:
* New features
  - Win32 DLLs for OpenSSL 0.9.8l.
  - Transparent proxy support on Linux kernels >=2.6.28.
    See the manual for details.
  - New socket options to control TCP keepalive on Linux:
    TCP_KEEPCNT, TCP_KEEPIDLE, TCP_KEEPINTVL.
  - SSL options updated for the recent version of OpenSSL library.
* Bugfixes
  - A serious bug in asynchronous shutdown code fixed.
  - Data alignment updated in libwrap.c.
  - Polish manual encoding fixed.
  - Notes on compression implementation in OpenSSL added to the manual.
2010-01-20 14:46:17 +00:00
wiz
f7f637d7dd Update to 1.02:
2010-01-10   Gisle Aas <gisle@ActiveState.com>

   Release 1.02

   Give the distribution a META.yml file
2010-01-20 14:43:21 +00:00
wiz
5d232aa9cc Update to 2.4:
* Noteworthy changes in release 2.4 (2010-01-18) [stable]
- Doc fixes.
- Updated gnulib files.
- Clean up copyright notices.
2010-01-20 11:17:34 +00:00
wiz
7e9f949650 Second try at jpeg-8 recursive PKGREVISION bump. 2010-01-18 09:58:37 +00:00
wiz
672ef23395 Recursive PKGREVISION bump for jpeg update to 8. 2010-01-17 12:02:03 +00:00
sno
43b1352abf Updating security/p5-Crypt-Rijndael from 1.07nb1 to 1.08
pkgsrc changes:
  - Adjusting license definition

Upstream changes:
1.08 - Wed Dec  9 18:20:22 2009
	* Promoting development release to full release.
	* This release mainly clarifies the licensing.

1.07_02 - Tue Nov  4 02:21:27 2008
	* RT #40511: Give a better warning when you try to use tainted
	data as an initialization vector. If anyone wants to use
	tainted data, they can patch the code to accept it.

1.07_01 - Tue Oct 14 08:59:58 2008
	* Clarify that these files are under the Lesser GNU Public License
	(also known as the Library GNU Public License).
2010-01-16 22:28:59 +00:00
heinz
3d08d99d3f Set or updated LICENSE 2010-01-16 19:27:17 +00:00
wiz
13885fd0b0 Remove workaround for compiler bug in gcc2 on sparc64. 2010-01-16 17:57:36 +00:00
tron
212a025fe5 Fix build under Solaris. 2010-01-16 11:23:03 +00:00
agc
0f55e60b0c Update pam_ssh_agent_auth from 0.9.1 to 0.9.2
Changes since previous version:

+ move from GPLv3 to modified-bsd license, with huge thanks to Jamie Beverly
2010-01-15 22:23:48 +00:00
drochner
2651abfdd3 update to 2.0.14
changes:
* The default for --include-cert is now to include all certificates
  in the chain except for the root certificate.
* Numerical values may now be used as an alternative to the
  debug-level keywords.
* The GPGSM --audit-log feature is now more complete.
* GPG now supports DNS lookups for SRV, PKA and CERT on W32.
* New GPGSM option --ignore-cert-extension.
* New and changed passphrases are now created with an iteration count
  requiring about 100ms of CPU work.
2010-01-15 20:15:07 +00:00
drochner
43defa0191 don't depend on gnupg directly, gpgme/bl3 will do this for us, and it
will deal with gnupg1/gnupg2 correctly
bump PKGREVISION
2010-01-15 20:11:34 +00:00
taca
46298023fb Update openssl package to 0.9.8l, fixing security problem.
Approved by agc@.


Changes between 0.9.8k and 0.9.8l  [5 Nov 2009]

 *) Disable renegotiation completely - this fixes a severe security
    problem (CVE-2009-3555) at the cost of breaking all
    renegotiation. Renegotiation can be re-enabled by setting
    SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at
    run-time. This is really not recommended unless you know what
    you're doing.
    [Ben Laurie]
2010-01-15 04:55:30 +00:00
schwarz
4e223b3487 streamlined syntax, using ${SETENV} instead of env. 2010-01-09 14:42:04 +00:00
joerg
b6b0428ae5 Expose the gpg binary gpgme is build against and use that in security/gpa. 2010-01-04 15:09:44 +00:00
schwarz
d2c97acaab improved CC and CFLAGS support 2010-01-03 14:30:37 +00:00
joerg
447f8b9908 Needs pod2man. 2010-01-02 13:58:17 +00:00
he
ec50d671cb Moderate the wording slightly.
OK'ed by agc@
2009-12-28 23:18:09 +00:00
abs
40e5ab26a0 polkit-explicit-grant-helper and polkit-grant-helper should also
be setgid polkit (apparently). Bump pkgrevision
2009-12-27 00:00:55 +00:00
obache
b78b0121e1 Fixes and improvement for Interix
* Not only interix-3, but also treat all interix release, allow to build on SUA.
* Gave up randomized image base, use 0x5e000000, as in mk/platform/Interix.mk.
  It is workaround of PR 42369.
* Use -D_REENTRANT flags for threads.
* replace -Wl,soname= linker flags with -Wl,h, for Interix
2009-12-25 11:58:06 +00:00
joerg
6ed12f0732 Not MAKE_JOBS_SAFE. 2009-12-21 18:58:40 +00:00
joerg
1bc0ffa0cc Mark as broken: as conflicts with its own dependency 2009-12-21 12:06:17 +00:00
taca
54e0f790be Update security/sudo pacakge to 1.7.2p2.
Major changes between sudo 1.7.2p1 and 1.7.2p2:

 * Fixed a a bug where the negation operator in a Cmnd_List
   was not being honored.

 * Sudo no longer produces a parse error when #includedir references
   a directory that contains no valid filenames.

 * The sudo.man.pl and sudoers.man.pl files are now included in
   the distribution for people who wish to regenerate the man pages.

 * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos.

 * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so
   they can be used during authentication.
2009-12-20 07:46:32 +00:00
drochner
24c9b736c7 put back the (non-default) "idea" option which got lost a while ago 2009-12-18 18:54:24 +00:00
drochner
3b935903e3 kill the "idea" option -- gnupg2 uses libgcrypt which used to have
an "idea" option, but that was removed more than a year ago when it
got updated from 1.2 to 1.4
The patch was was used on gnupg2 in the "idea" case was just a four-line
memory initialization fix, there is no point in LICENSE restrictions
due to this, so I've pulled it in as regular patch so that it doesn't
get lost for the case someone fixes idea support in libgcrypt
(which isn't hard).
2009-12-18 17:49:51 +00:00
hasso
a88716b25c Remove removal of the hack which was needed for libtool 1.x.
From Rumko <rumcic at gmail.com> via private mail.
2009-12-18 12:33:25 +00:00
drochner
e014ebe7ae don't install the gpg-zip.1 manpage, avoids CONFLICT with gnupg1,
noticed by OBATA Akio per mail to pkgsrc-users.
This makes most sense to me since gnupg2 doesn't install a gpg-zip
intentionally. Since possible clients of gpg-zip should have a
dependency on gnupg1, we can't take over easily. Once we are sure
that gnupg2 can fully replace gnupg1, we might consider to install
eg symlinks gpg->gpg2 etc and make gnupg1 obsolete, but this needs
careful testing.
2009-12-16 18:52:49 +00:00
wiz
cbc51f294b Add checksum for idea patch. 2009-12-16 09:09:06 +00:00
joerg
a0e6713ee7 Recursive bump for libltdl 2009-12-15 21:54:17 +00:00
drochner
72b5e3d7b0 make s/mime support, which implies use of gnupg2, default,
bump PKGREVISION
2009-12-15 20:17:33 +00:00
drochner
f4e97fa398 update to 2.0.13
changes: many fixes and improvements

reviewed by John R. Shannon

pkgsrc notes:
-since S/MIME support is the biggest difference in functionality over
 gnupg1, enable it per default -- my tests (with the s/mime plugin
 of claws-mail) worked
-left the build against a private libassuan with GNU-pth support
 alone for now, just updated libassuan to 1.0.5. We might build
 pkgsrc/libassuan against pkgsrc/pth at some point, but this needs
 to be checked for side effects. (As this pkg doesn't export a library
 which might propagate the pth dependency, the possibility of
 pthread-pth conflicts should be limited. Other uses of libassuan
 need to be checked.)
2009-12-15 20:10:40 +00:00
drochner
d620f024e0 update to 0.7.6
changes: misc improvements

reviewed by John R. Shannon
2009-12-15 19:50:47 +00:00
drochner
b064321fb2 update to 1.0.3
changes:
* New option --url for the LOOKUP command and dirmngr-client.
* The LOOKUP command does now also consults the local cache.  New
  option --cache-only for it and --local for dirmngr-client.
* Port to Windows completed.
* Improved certificate chain construction.
* Support loading of PEM encoded CRLs via HTTP.
* Client based trust anchors are now supported.
* Configured certificates with the suffix ".der" are now also used.
* Libgcrypt 1.4 is now required.

reviewed by John R. Shannon

pkgsrc notes:
I've left the build against a private libassuan with GNU-pth support
alone for now, just updated libassuan to 1.0.5. We might build
pkgsrc/libassuan against pkgsrc/pth at some point, but this needs
to be checked for side effects. (As this pkg doesn't export a library
which might propagate the pth dependency, the possibility of
pthread-pth conflicts should be limited. Other uses of libassuan
need to be checked.)
Beiing here, support DESTDIR.
2009-12-15 19:43:16 +00:00
drochner
e79733b9a3 update to 1.0.7
changes:
-misc fixes and improvements
-Support DSA
-Support SHA-{384,512} based signature generation
reviewed by John R. Shannon
2009-12-15 19:27:36 +00:00
drochner
d4f0b2de4e minor fixes for gnupg2 support:
-don't pull in gnupg2's "gpgconf" if both gnupg1 and gnupg2 are installed
 but we are building against gnupg1, this caused a build failure
-fix a selftest to work with gnupg2
2009-12-15 19:15:38 +00:00
drochner
38f01fcc52 remove obsolete "hal" dependency, ride on recent update 2009-12-15 14:52:03 +00:00
wiz
f87f8bc629 Update to 2.28.2:
Changes in version 2.28.2 are:
 * Add license to reference documentation.
 * Sent output of g_printerr to syslog.
 * No error when can't unlock login keyring.
 * Fix assertion when comparing attributes.
 * Fix freeing of unallocated memory in test.
 * Don't barf on certificates with unsupported algorithm.
 * Fix some memory leaks.
2009-12-15 14:07:22 +00:00
wiz
50fac7588d Update to 0.61, set LICENSE to public-domain (see below).
[Changes for 0.61]

* Added "=encoding utf8" to POD to fix author name display.
  No functional changes.

[Changes for 0.60]

* LICENSING CHANGE: This compilation and all individual files in it
  are now under the nullary CC0 1.0 Universal terms:

  To the extent possible under law, 唐鳳 has waived all copyright and
  related or neighboring rights to Module-Signature.

* Updated Module::Install to 0.91, prompted by Florian Ragwitz.
2009-12-15 13:28:13 +00:00
wiz
4aa3665c97 Update to 0.42, set LICENSE (still depend on gpg1 for now).
0.42 Wed Sep 30 23:20:58 JST 2009

	* Support for GPG2

0.41_01 Fri Sep 25 02:56:33 JST 2009

	* Beginnings of support for GPG2

0.40_04 Tue Apr 21 19:50:12 JST 2009

    * Use Any::Moose instead of Moose for Mouse celerity (Sartak)

0.40_1 Sat Nov 15 12:35:59 EST 2008
	* [rt.cpan.org #40963] Replace Class::MethodMaker with Moose  (Chris Prather)
2009-12-15 13:18:44 +00:00
wiz
b16f6d6d2e Update to 1.4.5:
Noteworthy changes in version 1.4.5 (2009-12-11)
------------------------------------------------

 * Fixed minor memory leak in DSA key generation.

 * No more switching to FIPS mode if /proc/version is not readable.

 * Fixed a sigill during Padlock detection on old CPUs.

 * Fixed a hang on some W2000 machines.

 * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3;
   SHA-256 went up by 25%.
2009-12-15 10:40:11 +00:00
agc
cae0b0c1a6 Update netpgp to version 20091210.
Apart from infrastructure changes, there are the following functional ones:

+ Update to version 1.99.14/20091210

+ provide a new netpgp_match_list_keys(3) function to perform a
regular-expression based search of all the keys in the keyring.  If no
pattern is specified to match, then all keys are returned.

+ provide a new netpgp_set_homedir(3) function, and use it to set the
home directory from the library, rather than individually in all the
programs which use the library

+ provide a new netpgp_incvar(3) function which will add a constant
increment (which may be negative) to the value of an internal
variable.  This is primarily used for the verbosity level within the
library, and is again a movement of the function into the library from
the individual programs which use the library

+ move to the specification of an ssh key file by internal variable,
rather than the directory holding an ssh key file

+ autoconf infrastructure changes

+ take a hammer to the _GNU_SOURCE definitions problems

+ don't rely on strnlen(3) being present everywhere

+ add rudimentary support for ssh keys

+ add a netpgp library function - netpgp_get_key(3) - to print a
specific key

+ add functionality to call this function in netpgpkeys(1)

+ add test for netpgp_get_key

+ add a verbose switch to the tst script

+ add netpgp functions to expose the memory signing and verification
functions - netpgp_sign_memory(3) and netpgp_verify_memory(3)

+ coalesced signing and verification ops file functions
2009-12-15 00:06:15 +00:00
agc
aae199a91b Add and enable seccure 2009-12-14 08:01:06 +00:00
agc
4becb70c17 Initial import of seccure-0.4 into the Packages Collection.
The seccure toolset implements a selection of asymmetric
	algorithms based on elliptic curve cryptography (ECC).  In
	particular it offers public key encryption / decryption,
	signature generation / verification and key establishment.

	ECC schemes offer a much better key size to security ratio
	than classical systems (RSA, DSA).  Keys are short enough to
	make direct specification of keys on the command line possible
	(sometimes this is more convenient than the management of
	PGP-like key rings).  seccure builds on this feature and
	therefore is the tool of choice whenever lightweight
	asymmetric cryptography -- independent of key servers,
	revocation certificates, the Web of Trust or even
	configuration files -- is required.
2009-12-14 08:00:05 +00:00
wiz
0d661b71e9 Remove unused file. 2009-12-13 13:19:43 +00:00
martti
2a6f077480 Added support for DESTDIR. 2009-12-13 08:42:26 +00:00
agc
398c8e2d16 Add and enable pam_ssh_agent_auth 2009-12-11 19:49:50 +00:00
heinz
1cfeabbb1e - LICENSE is gnu-gpl-v2
- Added DESTDIR support. All permission settings were kept as before.
- TEMPDIR is now changeable in the Makefile (see patch-ab).
2009-12-11 19:48:21 +00:00
agc
919a5125b7 Initial import of pam_ssh_agent_auth version 0.9.1 into the packages
collection - kudos to Jan Schaumann for pointing it out.

	PAM module which permits authentication for arbitrary services
	via ssh-agent.  Written with sudo in mind, but like any auth
	PAM module, can be used for for many purposes.
2009-12-11 19:48:12 +00:00
abs
9497270e02 +PKG_DESTDIR_SUPPORT= user-destdir 2009-12-10 23:40:00 +00:00
abs
adc35c977d PKG_DESTDIR_SUPPORT=user-destdir 2009-12-10 23:30:53 +00:00
obache
8672aaf4f8 * add --enable-install=${BINOWN} to CONFIGURE_ARGS for user-destdir support
and "root" user-less platforms.
* replace one bash script shbang (for safe side, may bone shell is sufficient).
* fix PLIST for PR 40993.
  add missing entries and back plist vars replaced for Darwin-apple excessively.

Bump PKGREVISION.
2009-12-09 06:26:38 +00:00
obache
c06a2048a1 * user-destdir ready
* should not to set SUBST_CLASSES, add instead to avoid overwrite.
* need to runtime dependency on gettext command, Bump PKGREVISION.
2009-12-09 05:52:30 +00:00
obache
e901cab189 * user-destdir ready
* no need to hard build depend on bison in pkgsrc, USE_TOOLS+=bison instead.
2009-12-09 05:28:13 +00:00
obache
a597abdc19 Should not add to USE_LANGUAGES, set instead.
Should not set to USE_TOOLS, add instead.
2009-12-09 05:22:01 +00:00
obache
ccb72bf4ba Avoid to conflict with stdout/stderr in stdio.h. 2009-12-09 05:19:36 +00:00
obache
39773a0dec user-destdir ready. 2009-12-09 05:18:43 +00:00
taca
39d6605724 Use DIST_SUBDIR since distfiles changed.
No other functional change at all.
2009-12-08 14:39:14 +00:00
joerg
66203fbc59 Fix destdir installation. 2009-12-03 18:44:54 +00:00
joerg
43ed8b2fac Fix @PTHREAD_LIB@ expansion. Bump revision. 2009-12-03 15:22:39 +00:00
fhajny
61327c06e5 The gem file must have changed recently, fixing distinfo 2009-12-03 08:20:02 +00:00
fhajny
98c7c8b9bc Added ruby-net-scp and ruby-net-ssh-gateway 2009-12-02 14:36:08 +00:00
fhajny
ccce7b628b Import ruby18-net-ssh-gateway-1.0.1 as security/ruby-net-ssh-gateway.
Net::SSH::Gateway provides a simple way to connect to servers
behind a firewall or NAT.
2009-12-02 14:35:12 +00:00
fhajny
db45b4354d Import ruby18-net-scp-1.0.2 as security/ruby-net-scp.
Library built on top of Net::SSH that implements the SCP "secure copy"
protocol for transfering files.
2009-12-02 14:33:54 +00:00
fhajny
1441afbe22 Updated ruby-net-sftp to 2.0.4.
New major version, too many changes, see home page.
2009-12-02 14:30:43 +00:00
fhajny
6983562529 Updated ruby-net-ssh to 2.0.16.
New major version, too many changes, see home page.
2009-12-02 14:26:28 +00:00
manu
3a61122d8a Pullup single logout related bugfixes from lasso -current.
On SP initiated logout, the SP x509 certificate was included in the
HTTP redirect URL. First this was an SAML standard violation, and second
it inflated the URL beyond 2038 bytes, which is the maximum length for
IE7 and prior. As a result, SP initated single logout was broken with IE7
and prior versions.
2009-12-01 08:49:46 +00:00
manu
231692b82e Bugfix: NetBSD does not need -ldl n LIBS for dlopen()
This did not prevented xmlsec1 to build but caused trouble in packages
depending on this one
2009-12-01 08:43:52 +00:00
joerg
35c74fc509 Just force calling the compiler as cc to help libtool 2.2. 2009-11-27 13:34:25 +00:00
joerg
531ed31093 Craete libgnutls-extra-config in .buildlink/bin, not the WRAPPER_DIR. 2009-11-26 14:18:26 +00:00
joerg
8a5f9b74e0 Run libtoolize. No need to touch libtool. 2009-11-25 21:43:55 +00:00
joerg
f035782a69 Fix permissions of include files. Fix linkage for systems with openssh
in base. Add destdir support.
2009-11-25 21:11:33 +00:00
joerg
05faea90b9 Repeat after me, do not use bar/.libs/foo.la, use bar/foo.la. 2009-11-25 20:56:03 +00:00
markd
765ba6bbeb Needs qt4-tools to build. (Thanks wiz) 2009-11-25 09:47:10 +00:00
markd
d07c27b212 Add polkit-qt 2009-11-21 20:05:40 +00:00
markd
d0593ee8c3 Import polkit-qt version 0.9.2
Qt Wrapper around PolicyKit
2009-11-21 20:04:06 +00:00
drochner
4f4f3854dc update to 1.2.2
changes:
-Support for the "aes128-ctr", "aes192-ctr", "aes256-ctr" ciphers
-Support for the "arcfour128" cipher
-Fix crash when server sends an invalid SSH_MSG_IGNORE message
2009-11-20 16:45:30 +00:00
drochner
b18fd3a663 update to 1.1.4
The changes since 1.1.3 are mostly limited to minor code and
manual pages markup cleanups (such as for proper formatting on OpenBSD).
2009-11-18 16:59:30 +00:00
wiz
89956e6eae Update to 2.28.1:
seahorse-plugins 2.28.1
-----------------------

    * Add the get-info command to seahorse-agent [Peter Bloomfield]

seahorse-plugins 2.28.0
-----------------------

    * Fix configure script portability [Thomas Klausner]
    * Fix crash in seahorse-preferences [Pablo Castellano]
    * Fix single glib include [Kjartan Maraas]

    Translations
    * bn.po [Jamil Ahmed]
    * br.po [Denis Arnaud]
    * ca@valencia.po [Carles Ferrando]
    * cs.po [Marek Černocký]
    * da.po [Ask H. Larsen]
    * es.po [Jorge Gonzalez]
    * hi.po [Rajesh Ranjan]
    * ko.po [Changwoo Ryu]
    * mai.po [Rajesh Ranjan]
    * ml.po [Ani]
    * nb.po [Kjartan Maraas]
    * pt_BE.po [Og B. Maciel]
    * sr@latin.po [Branko Kokanović]
    * sr.po [Branko Kokanović]
    * te.po [krishnababu k]
    * or.po [Manoj Kumar Giri]
    * uk.po [Maxim V. Dziumanenko]
    * el.po [Kostas Papadimas, Jennie Petoumenou]

seahorse-plugins 2.27.1
-----------------------

    * Clean up socket directory [Adam Schreiber]

    Translations
    * or.po [Manoj Kumar Giri]
2009-11-17 16:05:54 +00:00
tron
45edd37f8a Avoid deprecation warnings under Python:
1.) Use "hashlib" instead of "sha" module if possible.
2.) Use "subprocess" module instead of os.popen3().
Both changes tested with Python 2.4 and 2.6.

Pkgsrc-related improvements:
1.) Support "user-destdir" installation (no changes required).
2.) Set license to "gnu-gpl-v2".
3.) Reduce patches by recording the fact that the manual page gets
    compressed automatically (which "pkgsrc" handles fine) instead
    of trying to prevent that.
2009-11-17 12:23:01 +00:00
tron
bae0a8c45d This package works fine with Python 2.6, remove "PYTHON_VERSIONS_ACCEPTED". 2009-11-17 09:01:43 +00:00
dsainty
5faa6504d0 Add p5-Crypt-ECB 2009-11-17 04:30:29 +00:00
dsainty
88723ec8d7 Import p5-Crypt-ECB-1.45:
This is Crypt::ECB, a Perl-only implementation of the ECB mode.  In
combination with a block cipher such as DES, IDEA or Blowfish, you can encrypt
and decrypt messages of arbitrarily long length.  Though for security reasons
other modes than ECB such as CBC should be preferred.  See textbooks on
cryptography if you want to know why.

In addition to this module you will need to install one or more of the
Crypt::DES, Crypt::IDEA, or Crypt::Blowfish modules.
2009-11-17 04:27:59 +00:00
drochner
a4fd848ae9 update to 1.2.1
many fixes and improvements, notably speed
2009-11-15 20:07:45 +00:00
drochner
62e047b041 update to 1.1.8
changes:
-bugfixes
-API extensions
-documentation improvement
-The encoding of gpgme_data_t objects can affect the output encoding
 of export, sign and encrypt operations now
-Using GPGME_KEYLIST_MODE_LOCAL combined with
 GPGME_KEYLIST_MODE_EXTERN is now supported
2009-11-15 18:41:55 +00:00
hasso
bb1e99726c Update to 0.9.0-beta8 (by Rumko via private mail).
0.9.0-beta8:
- Include spamhaus_drop.dat in the source distribution. Fix installation
  issue (closes #364).

0.9.0-beta7:
- Initial SpamhausDrop plugin implementation, by
  Wes Young <wes@barely3am.com> (closes #363)
- Do not discard --root parameters if prefix is absolute.
- Python 2.4 backward compatibility fixes.
- Handle plugin loading error gracefully.
- Improve WormPlugin accuracy, and make it carry a reference to the
  initial event. The plugin used to alert when seeing an alert to a
  given target, and this same alert going back to the source. This can
  happen in a number of case (example: Netbios alert triggered by Snort)
  As of now, the plugin will wait for the events to be repeated against
  at least 5 differents hosts.
- Dshield CorrelationAlert now handle multiples events. Previously, we
  used to generate a single Dshield CorrelationAlert for each events
  where the source address would match the Dshield database. The plugin
  now generate CorrelationAlert for multiples events received from the
  same source.
2009-11-07 18:30:28 +00:00
tez
0f8d1e1fbb commit patch for PR#36120 2009-11-05 19:16:47 +00:00
adam
f0d5e8c16c Allow building on 64-bit Darwin 2009-11-03 07:28:17 +00:00
wiz
f9123c3045 Simplify awk usage to make it work with nawk, from Matthias Pfaller in
PR 42238.

While here, update to latest certificates from mozilla.
2009-11-03 02:43:55 +00:00
wiz
7bb662a6ae Update to 2.8.5:
* Version 2.8.5 (released 2009-11-02)

** libgnutls: In server side when resuming a session do not overwrite the
** initial session data with the resumed session data.

** libgnutls: Fix PKCS#12 encoding.
The error you would get was "The OID is not supported.".  Problem
introduced for the v2.8.x branch in 2.7.6.

** guile: Compatibility with guile 2.x.
By Ludovic Courtes <ludovic.courtes@laas.fr>.

** tests: Fix expired cert in chainverify self-test.

** tests: Fix time bomb in chainverify self-test.
Reported by Andreas Metzler <ametzler@downhill.at.eu.org> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3925>.

** API and ABI modifications:
No changes since last version.
2009-11-03 00:15:41 +00:00
wiz
9e91c6ce6d Update to 2.8.4:
* Version 2.8.4 (released 2009-09-18)

** libgnutls: Enable Camellia ciphers by default.

** libgnutls: Make OpenPGP hostname checking work again.
The patch to resolve the X.509 CN/SAN issue accidentally broken
OpenPGP hostname comparison.

** libgnutls: When printing X.509 certificates, handle XMPP SANs better.
Reported by Howard Chu <hyc@symas.com> in
<https://savannah.gnu.org/support/?106975>.

** API and ABI modifications:
No changes since last version.
2009-10-31 01:16:42 +00:00
wiz
293dd629ff Update to 1.1.2:
* gpgsigs:
     + Added patch from Roland Rosenfeld to support RIPEMD160 checksum.
       (Closes: #533747).
     + Updated man page to mention support for SHA256 and RIPEMD160 checksum.
     + Made removal of nonexistent photos quiet by the use of the force option.
     + Updated generated tex file in latex mode so that it uses the grffile
       package. This allows pdflatex to process our tex file assuming the photos
       are previously converted to PDF. (Closes: #542478)
   * caff: Updated check for the local-user keyids.
     + Moved the current check to a new function get_local_user_keys().
     + Warned the user if a local-user keyid is not listed as a keyid in
       ./caffrc. (Closes: #540165).
   * gpgdir: New upstream release.
   * gpg-mailkeys:
     + The charset for the text of the message is deduced from the charset used
       by ~/.gpg-mailkeysrc and ~/.signature.
       The text message is encoded in quoted printable and thus it requires a
       new dependency on qprint in debian/control. (Closes: #545186)
     + Mentionned both the .gpg-mailkeysrc and .signature files in the manpage.
2009-10-31 00:20:24 +00:00
jym
aa0a9444b6 - create a specific user:group for stunnel
- fix the configuration path and file, so it can use the proper user:group
 and the chroot
- fix some pkglint warnings regarding PKG_OPTIONS: 'pthread' => 'threads',
'libwrap' => 'tcpwrappers' (in accordance to mk/defaults/options.description)

Bump PKGREVISION.
2009-10-30 23:54:52 +00:00