Commit graph

4632 commits

Author SHA1 Message Date
jnemeth
ad43885514 sort 2008-04-20 02:48:38 +00:00
drochner
be979fabcc update to 2.22.1
This switches to the gnome-2.22 release branch.
2008-04-15 18:53:42 +00:00
wiz
8015905674 Update to 1.0:
Ignore temporary build files
make make install install stuff.
Bump NEWS.Debian.
Proposed solution for #462897: unconditionally sync keys between
normal gnupg home and caff gnupg home on startup, to cope with
changed keys.
2008-04-13 22:26:34 +00:00
schmonz
077f92a68f Update to 0.90. From the changelog:
- Added support for chaining modules within the version client library.
  To use this, specify the module string as a list of modules separated
  with commas. For example:

	cvm-command:/path/to/module,cvm-local:/path/to/socket

  This enhancement deprecates the cvm-chain module.

- Introduced an "out of scope" fact, to be used on credential rejection
  results when the supplied credentials are outside of the scope of
  authority of the module. The cvm-vmailmgr and cvm-qmail modules
  report this fact as appropriate, and cvm-chain copies it as
  appropriate from the modules it invokes.

- A random anti-spoofing tag is added to all version 2 client requests.
  Its length is set by $CVM_RANDOM_BYTES and defaults to 8.

- Fixed a bug that caused the domain output to be set incorrectly when
  doing qmail lookups with a domain not in the control files with
  $CVM_QMAIL_ASSUME_LOCAL set.
2008-04-13 06:51:19 +00:00
jlam
841dfa0e7a Convert to use PLIST_VARS instead of manually passing "@comment "
through PLIST_SUBST to the plist module.
2008-04-12 22:42:57 +00:00
wiz
5eb83dd9bc Remove non-standard qt4/lib/pkgconfig directory. Bump PKGREVISION. 2008-04-12 10:35:17 +00:00
jlam
ba8d4b3c72 Remove unnecessary PLIST_SUBST definition -- the PLIST is dynamic through
the use of AUTHLIB_PLIST, so we don't need to comment stuff out.
2008-04-10 20:56:33 +00:00
drochner
2a4296c275 update to 2.22.1
This switches to the gnome-2.22 release branch.
2008-04-10 16:53:44 +00:00
wiz
a865b2e1c4 Fix path in DEPENDS line. 2008-04-10 07:56:09 +00:00
taca
87c3f03083 Fix build problem with hpn-patch option enabled. 2008-04-08 06:36:47 +00:00
joerg
ced3928058 Fix installation. 2008-04-07 18:06:07 +00:00
joerg
37963f36a5 Fix DESTDIR. 2008-04-07 18:04:21 +00:00
joerg
a820e04656 Add missing directories. 2008-04-07 16:45:35 +00:00
markd
c3348303f2 also set KRB5_CONFIG in the case where using builtin but
/usr/bin/krb5-config exists.  Fixes build of imap-uw package with the
kerberos option on NetBSD-current and possibly other platforms.
2008-04-04 21:10:45 +00:00
jlam
6973294f00 Add and enable new ruby-* packages. 2008-04-04 15:33:05 +00:00
jlam
6488c3a1fb Initial import of ruby18-net-ssh-1.1.2 as security/ruby-net-ssh.
Net::SSH is to SSH as Net::Telnet is to Telnet and Net::HTTP is to
HTTP.  Perform non-interactive SSH processing, purely from Ruby!
2008-04-04 15:20:34 +00:00
jlam
5fa529a3b5 Initial import of ruby18-net-sftp-1.1.1 as security/ruby-net-sftp.
Net::SFTP is a pure-Ruby implementation of the SFTP client protocol.
2008-04-04 15:20:28 +00:00
tonnerre
2442cc7499 Fix two vulnerabilities in OpenSSH:
- X11 forwarding information disclosure (CVE-2008-1483)
 - ForceCommand bypass vulnerability
2008-04-03 07:59:08 +00:00
jlam
38a70df401 Don't hardcode "0 0" for the root user and group -- use ${REAL_ROOT_USER}
and ${REAL_ROOT_GROUP} instead.  The pkginstall framework checks for
the name of the user and group, not the uid and gid, when comparing
permissions.  This fixes the following spurious warning from appearing:

    The following files are used by sudo-1.6.9p15 and have
    the wrong ownership and/or permissions:

            /usr/pkg/etc/sudoers (m=0440, o=0, g=0)
2008-04-02 15:06:07 +00:00
taca
e07592e07d Update sudo package to 1.6.9p15.
653) Fixed installation of sudo_noexec.so on AIX.

654) Updated libtool to version 1.5.26.

655) Fixed printing of default SELinux role and type in -V mode.

656) The HOME environment variable is once again preserved by default,
     as per the documentation.
2008-03-29 14:16:58 +00:00
adrianp
ffbce7705e Update to gnupg-1.4.9
Addresses a recent security issue that only impacts 1.4.8 and 2.0.8
* Improved AES encryption performance by more than 20% (on ia32).
  Decryption is also a bit faster.
* Fixed possible memory corruption bug in 1.4.8 while importing
  OpenPGP keys.
2008-03-26 21:20:34 +00:00
tron
ae5dce2428 Add a new option "via-padlock" which enables support for the
VIA PadLock Security Engine:
- The new option is turned on by default.
- The new option is only available on i386 systems except Mac OS X (which
  doesn't work on VIA CPU).
- The new option isn't available on system which uses GCC 3.x because it
  causes build failures. This fixes PR pkg/38197.

Approved by Dieter Baron.
2008-03-26 20:09:43 +00:00
tron
6af1f268fd Readd checksum for "libgcrypt-1.2.4-idea.diff.bz2" which was accidentally
removed in revision 1.22.
2008-03-25 21:39:45 +00:00
wiz
b117f6c81a Remove openssh+gssapi.
It has security problems for a long time now.

Removal was announced on pkgsrc-users on March 13.
2008-03-25 13:44:00 +00:00
seb
bf27fa9cf5 Add a hack for GCC 3.* failing to compile asm() call in
cipher/rijndael.c:do_padlock(): seen with GCC 3.3.3 on NetBSD.
2008-03-16 20:14:38 +00:00
wiz
1b8ea98f12 Sort. 2008-03-16 00:14:01 +00:00
tnn
fd23ed0d29 Fix build with MIPSPro. PR pkg/38210. 2008-03-11 22:19:54 +00:00
tnn
882d3eb4fe Put back a couple of IRIX conditionals the way they used to behave,
e.g. match IRIX 5.x but not 6.x. Some of these may indeed apply to 6.x
too, but let's be conservative. PR pkg/38224.
2008-03-11 18:47:40 +00:00
taca
1b21c85160 Update sudo package to 1.6.9p14.
pkgsrc changes:

- Explict to depends security/heimdal package when kerberos option is
  specified.  PR pkg/37999 should be fixed.

Change:

646) Sudo will now set the nproc resource limit to unlimited on Linux
     systems to work around Linux's setuid() resource limit semantics.
     On PAM systems the resource limits will be reset by pam_limits.so
     before the command is executed.

647) SELinux support that can be used to implement role based access
     control (RBAC).  A role and (optional) type may be specified
     in sudoers or on the command line.  These are then used in the
     security context that the command is run as.

648) Fixed a Kerberos 5 compilation problem with MIT Kerberos.

Sudo 1.6.9p13 released.

649) Fixed an invalid assumption in the PAM conversation function
     introduced in version 1.6.9p9.  The conversation function may
     be called for non-password reading purposes as well.

650) Fixed freeing an uninitialized pointer in -l mode, introduced in
     version 1.6.9p13.

651) Check /etc/sudoers after LDAP even if the user was found in LDAP.
     This allows Defaults options in /etc/sudoers to take effect.

652) Add missing checks for enforcing mode in SELinux RBAC mode.

Sudo 1.6.9p14 released.
2008-03-11 15:52:51 +00:00
wiz
ab973e6cbc Update to 1.4.0:
Noteworthy changes in version 1.4.0 (2007-12-10)
------------------------------------------------

 * New configure option --disable-padlock-support which is mostly
   useful in case of build problems.


Noteworthy changes in version 1.3.2 (2007-12-03)
------------------------------------------------

 * The visibility attribute is now used if supported by the toolchain.

 * The ACE engine of VIA processors is now used for AES-128.

 * The ASN.1 DER template for SHA-224 has been fixed.


Noteworthy changes in version 1.3.1 (2007-10-26)
------------------------------------------------

 * The entire library is now under the LGPL. The helper programs and
   the manual are under the GPL.  Kudos to Peter Gutmann for giving
   permissions to relicense the rndw32 and rndunix modules.

 * The Camellia cipher is now under the LGPL and included by default.

 * Fixed a bug in the detection of symbol prefixes which inhibited the
   build of optimzied assembler code on certain systems.

 * Updated the entropy gatherer for W32.


Noteworthy changes in version 1.3.0 (2007-05-04)
------------------------------------------------

 * Changed the way the RNG gets initialized. This allows to keep it
   uninitialized as long as no random numbers are used.  To override
   this, the new macro gcry_fast_random_poll may be used.  It is in
   general a good idea to spread this macro into the application code
   to make sure that these polls happen often enough.

 * Made the RNG immune against fork without exec.

 * Reading and writing the random seed file is now protected by a
   fcntl style file lock on systems that provide this function.

 * Support for SHA-224 and HMAC using SHA-384 and SHA-512.

 * Support for the SEED cipher.

 * Support for the Camellia cipher.  Note that Camellia is disabled by
   default, and that enabling it changes the license of libgcrypt from
   LGPL to GPL.

 * Support for OFB encryption mode.

 * gcry_mpi_rshift does not anymore truncate the shift count.

 * Reserved algorithm ranges for use by applications.

 * Support for DSA2.

 * The new function gcry_md_debug should be used instead of the
   gcry_md_start_debug and gcry_md_stop_debug macros.

 * New configure option --enable-random-daemon to support a system
   wide random daemon.  The daemon code is experimental and not yet
   very well working.  It will eventually allow to keep a global
   random pool for the sake of short living processes.

 * Non executable stack support is now used by default on systems
   supporting it.

 * Support for Microsoft Windows.

 * Assembler support for the AMD64 architecture.

 * New configure option --enable-mpi-path for optimized builds.

 * Experimental support for ECDSA; should only be used for testing.

 * New control code GCRYCTL_PRINT_CONFIG to print the build
   configuration.

 * Minor changes to some function declarations.  Buffer arguments are
   now typed as void pointer.  This should not affect any compilation.
   Fixed two bugs in return values and clarified documentation.

 * Interface changes relative to the 1.2.0 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 gcry_fast_random_poll	 NEW
 gcry_md_debug           NEW
 gcry_sexp_nth_string    NEW
 GCRY_MD_SHA224          NEW
 GCRY_PK_USAGE_CERT      NEW
 GCRY_PK_USAGE_AUTH      NEW
 GCRY_PK_USAGE_UNKN      NEW
 GCRY_PK_ECDSA           NEW
 GCRY_CIPHER_SEED        NEW
 GCRY_CIPHER_CAMELLIA128 NEW
 GCRY_CIPHER_CAMELLIA192 NEW
 GCRY_CIPHER_CAMELLIA256 NEW
 GCRYCTL_FAKED_RANDOM_P  NEW
 GCRYCTL_PRINT_CONFIG    NEW
 GCRYCTL_SET_RNDEGD_SOCKET  NEW.
 gcry_mpi_scan           CHANGED: Argument BUFFER is now void*.
 gcry_pk_algo_name       CHANGED: Returns "?" instead of NULL.
 gcry_cipher_algo_name   CHANGED: Returns "?" instead of "".
 gcry_pk_spec_t          CHANGED: Element ALIASES is now const ptr.
 gcry_md_write_t         CHANGED: Argument BUF is now a const void*.
 gcry_md_ctl             CHANGED: Argument BUFFER is now void*.
 gcry_cipher_encrypt     CHANGED: Arguments IN and OUT are now void*.
 gcry_cipher_decrypt     CHANGED: Arguments IN and OUT are now void*.
 gcry_sexp_sprint        CHANGED: Argument BUFFER is now void*.
 gcry_create_nonce       CHANGED: Argument BUFFER is now void*.
 gcry_randomize          CHANGED: Argument BUFFER is now void*.
 gcry_cipher_register    CHANGED: Argument ALGORITHM_ID is now int*.
2008-03-07 16:16:22 +00:00
wiz
8e810a2bc9 Recursive PKGREVISION bump for gnutls-2.2.2 update with shlib major bump. 2008-03-06 14:53:47 +00:00
wiz
0cf6fb1a13 Update to 2.2.2:
* Version 2.2.2 (released 2008-02-21)

** Cipher priority string handling now handle strings that starts with NULL.
Thanks to Laurence Withers <l@lwithers.me.uk>.

** Corrected memory leaks in session resuming and DHE ciphersuites. Reported
by Daniel Stenberg.

** Increased the default certificate verification chain limits and allowed
for checks without limitation.

** Corrected the behaviour of gnutls_x509_crt_get_subject_alt_name()
and gnutls_x509_crt_get_subject_alt_name() to not null terminate binary
strings and return the proper size.

** API and ABI modifications:
No changes since last version.

* Version 2.2.1 (released 2008-01-17)

** Prevent linking libextra against previously installed libgnutls.
Tiny patch from "Alon Bar-Lev" <alon.barlev@gmail.com>, see
<http://bugs.gentoo.org/show_bug.cgi?id=202269>.

** Fixes the post_client_hello_function(). The extensions are now parsed
in a callback friendly way.

** Fix for certificate selection in servers with certificate callbacks.

** API and ABI modifications:
No changes since last version.

* Version 2.2.0 (released 2007-12-14)

Major changes compared to the v2.0 branch:

* SRP support aligned with newly published RFC 5054.

* OpenPGP support aligned with newly published RFC 5081.

* Support for DSA2 keys.

* Support for Camellia cipher.

* Support for Opaque PRF Input extension.

* PKCS#8 parser now handle DSA keys.

* Change from GPLv2 to GPLv3 for command-line tools, libgnutls-extra,
etc.  Notice that liblzo2 2.02 is licensed under GPLv2 only.  Earlier
versions, such as 2.01 which is included with GnuTLS, is available under
GPLv2 or later.  If this incompatibility causes problems, we recommend
you to disable LZO using --without-lzo.  LZO compression is not a
standard TLS compression algorithm, so the impact should be minimal.

* Functions for disabling record protocol padding.
Works around bugs on Nokia/Ericsson phones.

* New functions gnutls_priority_set() for setting cipher priorities easily.
Priorities like "COMPAT" also enables other work arounds, such as
disabling padding.

* Other minor improvements and bug fixes.

Minor changes compared to the latest v2.1.8 release candidate:

* Update internal copy of libtasn1 to version 1.2.

* Certtool --verify-chain now handle inputs larger than 64kb.
This fixes the self-test "rsa-md5-collision" under MinGW+Wine with
recent versions of libgcrypt.  The problem was that Wine with the
libgcrypt RNG generates huge amounts of debugging output.

* Translation updates.
Added Dutch translation.  Updated Polish and Swedish translation.

Backwards incompatible API/ABI changes in GnuTLS 2.2
====================================================

To adapt to changes in the TLS extension specifications for OpenPGP
and SRP, the GnuTLS API had to be modified.  This means breaking the
API and ABI backwards compatibility.  That is something we try to
avoid unless it is necessary.  We decided to also remove the already
deprecated stub functions for X.509 to XML conversion and TLS
authorization (see below) when we had the opportunity.

Generally, most applications does not need to be modified.  Just
re-compile them against the latest GnuTLS release, and it should work
fine.

Applications that use the OpenPGP or SRP features needs to be
modified.  Below is a list of the modified APIs and discussion of what
the minimal things you need to modify in your application to make it
work with GnuTLS 2.2.

Note that GnuTLS 2.2 also introduces new APIs -- such as
gnutls_set_priority() that is superior to
gnutls_set_default_priority() -- that you may want to start using.
However, using those new APIs is not required to use GnuTLS 2.2 since
the old functions continue are still supported.  This text only
discuss what you minimally have to modify.

XML related changes
-------------------

The function `gnutls_x509_crt_to_xml' has been removed.  It has been
deprecated and only returned an error code since GnuTLS version
1.2.11.  Nobody has complained, so users doesn't seem to miss the
functionality.  We don't know of any other library to convert X.509
certificates into XML format, but we decided (long ago) that GnuTLS
isn't the right place for this kind of functionality.  If you want
help to find some other library to use here, please explain and
discuss your use case on help-gnutls <at> gnu.org.

TLS Authorization related changes
---------------------------------

Everything related to TLS authorizations have been removed, they were
only stub functions that returned an error code:

 GNUTLS_SUPPLEMENTAL_AUTHZ_DATA
 gnutls_authz_data_format_type_t
 gnutls_authz_recv_callback_func
 gnutls_authz_send_callback_func
 gnutls_authz_enable
 gnutls_authz_send_x509_attr_cert
 gnutls_authz_send_saml_assertion
 gnutls_authz_send_x509_attr_cert_url
 gnutls_authz_send_saml_assertion_url

SRP related changes
-------------------

The callback gnutls_srp_client_credentials_function has a new
prototype, and its semantic has changed.  You need to rewrite the
callback, see the updated function documentation and SRP example code
(doc/examples/ex-client-srp.c and doc/examples/ex-serv-srp.c) for more
information.

The alert codes GNUTLS_A_MISSING_SRP_USERNAME and
GNUTLS_A_UNKNOWN_SRP_USERNAME are no longer used by the SRP
specification, instead the GNUTLS_A_UNKNOWN_PSK_IDENTITY alert is
used.  There are #define's to map the old names to the new.  You may
run into problems if you have a switch-case with cases for both SRP
alerts, since they are now mapped to the same value.  The solution is
to drop the SRP alerts from such switch cases, as they are now
deprecated in favor of GNUTLS_A_UNKNOWN_PSK_IDENTITY.

OpenPGP related changes
-----------------------

The function `gnutls_certificate_set_openpgp_keyserver' have been
removed.  There is no replacement functionality inside GnuTLS.  If you
need keyserver functionality, consider using the GnuPG tools.

All functions, types, and error codes related to OpenPGP trustdb
format have been removed.  The trustdb format is a non-standard
GnuPG-specific format, and we recommend you to use key rings instead.
The following have been removed:
 gnutls_certificate_set_openpgp_trustdb
 gnutls_openpgp_trustdb_init
 gnutls_openpgp_trustdb_deinit
 gnutls_openpgp_trustdb_import
 gnutls_openpgp_key_verify_trustdb
 gnutls_openpgp_trustdb_t
 GNUTLS_E_OPENPGP_TRUSTDB_VERSION_UNSUPPORTED

The following functions has an added parameter of the (new) type
`gnutls_openpgp_crt_fmt_t'.  The type specify the format of the data
(binary or base64).  The functions are:
 gnutls_certificate_set_openpgp_key_file
 gnutls_certificate_set_openpgp_key_mem
 gnutls_certificate_set_openpgp_keyring_mem
 gnutls_certificate_set_openpgp_keyring_file

To improve terminology and align with the X.509 interface, some
functions have been renamed.  Compatibility mappings exists.  The old
and new names of the affected functions and types are:

        Old name                                New name
 gnutls_openpgp_key_t                    gnutls_openpgp_crt_t
 gnutls_openpgp_key_fmt_t                gnutls_openpgp_crt_fmt_t
 gnutls_openpgp_key_status_t             gnutls_openpgp_crt_status_t
 GNUTLS_OPENPGP_KEY                      GNUTLS_OPENPGP_CERT
 GNUTLS_OPENPGP_KEY_FINGERPRINT          GNUTLS_OPENPGP_CERT_FINGERPRINT
 gnutls_openpgp_key_init                 gnutls_openpgp_crt_init
 gnutls_openpgp_key_deinit               gnutls_openpgp_crt_deinit
 gnutls_openpgp_key_import               gnutls_openpgp_crt_import
 gnutls_openpgp_key_export               gnutls_openpgp_crt_export
 gnutls_openpgp_key_get_key_usage        gnutls_openpgp_crt_get_key_usage
 gnutls_openpgp_key_get_fingerprint      gnutls_openpgp_crt_get_fingerprint
 gnutls_openpgp_key_get_pk_algorithm     gnutls_openpgp_crt_get_pk_algorithm
 gnutls_openpgp_key_get_name             gnutls_openpgp_crt_get_name
 gnutls_openpgp_key_get_version          gnutls_openpgp_crt_get_version
 gnutls_openpgp_key_get_creation_time    gnutls_openpgp_crt_get_creation_time
 gnutls_openpgp_key_get_expiration_time  gnutls_openpgp_crt_get_expiration_time
 gnutls_openpgp_key_get_id               gnutls_openpgp_crt_get_id
 gnutls_openpgp_key_check_hostname       gnutls_openpgp_crt_check_hostname
 gnutls_openpgp_send_key                 gnutls_openpgp_send_cert


* Version 2.0.0 (released 2007-09-04)

The following changes have been made since GnuTLS 1.6:

* Support for external RSA/DSA signing for TLS client authentication.
  This allows you to secure the private key better, for example by using
  privilege-separation techniques between the private key and the
  network client/server.

* Support for signing X.509 certificates using RSA with SHA-256/384/512.

* Experimental support for TLS 1.2 (disabled by default).  The TLS 1.2
  specification is not finalized yet, but we implement a draft version
  for testing.

* Support for X.509 Proxy Certificates (RFC 3820)

* Support for Supplemental handshakes messages (RFC 4680).

* Support for TLS authorization extension (draft-housley-tls-authz-extns-07).

* Support for the X.509 'otherName' Subject Altnerative Names (for XMPP).

* Guile bindings for GnuTLS have been added, thanks to Ludovic Courtes.

* Improve logic of gnutls_set_default_priority() which can now be more
  recommended.

* New APIs to enumerate supported algorithms in the library.

* New APIs to access X.509 Certificate extension sequentially.

* New APIs to print X.509 Certificates and CRLs in human readable formats.

* New APIs to extract X.509 Distinguished Names from certificates.

* New APIs to handle pathLenConstraint in X.509 Basic Constraints.

* Certtool can export more than one certificate to PKCS#12.

* Several message translation improvements.

* Instructions and improvements to easily set up a HTTPS test server.

* Included copies updated to Libtasn1 1.1 and OpenCDK 0.6.4.

* Build improvements for Windows, Mac OS X, uClinux, etc.

* GnuTLS is now developed in GIT.

* Improved manual

* Many bugfixes and minor improvements.
2008-03-06 14:52:12 +00:00
jlam
84361e6a3d As of revision 1.2 of termcap.buildlink3.mk, "-ltermcap" is automatically
transformed into the correct set of libraries, so we no longer need to
override the configure script's check for which library has tgetent().
2008-03-04 22:37:46 +00:00
shannonjr
33cef9b4f5 Correct pathname pkgsrc/local to pkgsrc/security. 2008-03-04 15:52:15 +00:00
wiz
8dff0af114 Update to 1.3:
Version 1.3 (released 2008-02-01)
- Handle 'INTEGER { ... } (a..b)' regression.
  Revert parts of earlier fix.  asn1Parser can now again parse src/pkix.asn1.
  The ASN1.c file was generated using Bison 2.3.
- Move examples from src/ to new directory examples/.
- Duplicate copy of divergated pkix.asn removed.
- Merge unnecessary lib/defines.h into lib/int.h.
- Configure no longer tries to use gcc -pipe.
- Update gnulib files.
- Fix mem leak in self-test.

Version 1.2 (released 2007-12-10)
- Update gnulib files.

Version 1.1 (released 2007-08-31)
- Fix bug that made asn1_check_version believe that 1.0 is older than 0.3.10.

Version 1.0 (released 2007-08-31)
- The self-tests, command line tools and build infrastructure have
  been re-licensed from GPLv2 to GPLv3.
- Doc fixes.
- Update gnulib files.

Version 0.3.10 (released 2007-05-25)
- Update gnulib files.
2008-03-04 15:06:42 +00:00
shannonjr
5d67f27acf Added entries for pcsc-lite, ccid, p5-pcsc, pcsc-tools and CoolKey. 2008-03-04 11:37:32 +00:00
shannonjr
4168c23b12 Provides driver support for the CoolKey and Common Access Card (CAC)
smart card used in a Public Key Infrastructure (PKI). The libpkcs11
module allows use of Smart Cards in applications that use mozilla
Network Security Services (NSS).
2008-03-04 11:33:02 +00:00
shannonjr
5a21c9eec3 Provides several tools that are useful when working
with smart cards: csc_scan regularly scans every
PC/SC reader connected to the host and reports when
a card is inserted or removed. ATR_analysis is a Perl
script used to parse the smart card ATR. The
smartcard_list.txt contains ATR of some cards. It is
used by ATR_analysis to find a card model corresponding
to the ATR. The perl script scriptortis used to send
commands to a smart card using a batch file or stdin.
2008-03-04 11:32:15 +00:00
shannonjr
0305335642 This package contains a Perl wrapper to the PC/SC smartcard library
(pcsc-lite) from MUSCLE together with some small examples.
2008-03-04 11:31:04 +00:00
shannonjr
30a5bfae3e This package provides a generic USB CCID (Chip/Smart Card Interface
Devices) driver and  ICCD (Integrated Circuit(s) Card Devices).

See the USB CCID and ICCD specifications from the USB working group.
2008-03-04 11:30:08 +00:00
shannonjr
d6204794ef The purpose of PC/SC Lite is to provide a Windows(R) SCard interface in a
very small form factor for communicating to smartcards and readers.

The PC/SC Lite library is used to connect to the PC/SC daemon from a
client application and provide access to the desired reader.
2008-03-04 11:29:08 +00:00
rillig
ebcb0ce01e Resign from maintaining a lot of packages, so everyone is free to update
them at will.
2008-03-04 11:02:23 +00:00
tonio
1fc4d6fc09 Update ocaml-ssl to 0.4.2
Update provided by Jaap Boender in PR 38145
Release notes not available.

Added a .include bsd.prefs.mk so that MACHINE_ARCH is correctly defined.
2008-03-03 18:14:19 +00:00
shannonjr
9640842eb0 Update to 0.9.11. Changes:
- In case a lot of message were being processed, the heartbeat timer
  could be delayed for a long period of time.
- The old scheduler algorithm could be unfair when certain message priority
  were not available for processing. We now appropriatly handle repartition
  to others priority messages.
- Message of the same priority could be processed in the wrong order when
  on-disk buffers were used.
- No integrity check were performed on orphan on-disk buffer in case of an
  operating system crash. By using the prelude-failover API, we can now
  detect possibly corrupted disk buffer, or resume at the time we stopped
  recovering them.
- New sched-priority and sched-buffer-size configuration options.
- Fix a bug where several relaying plugin instance would only forward
  their message to a single Manager.
2008-03-03 15:15:32 +00:00
shannonjr
39e994d32f Update to 0.9.16.2. Changes:
- Fix bindings for IDMEF 'get_next' functions.
- Make sure we use no additional GnuLib compiler flags when building
  bindings, this fix bindings compilation failure on some architecture
  (Solaris).
2008-03-03 15:13:02 +00:00
bjs
324979ec68 Add libssh2 to category Makefile. 2008-03-02 16:14:34 +00:00
bjs
8740bfa07f Import libssh2-0.18, a library implementing the SSH2 protocol (available
under the revised BSD license).
2008-03-02 14:11:54 +00:00
jlam
ca5929bc04 The "missing-from-system" headers that Heimdal installs are now placed
into ${PREFIX}/include/krb5/roken instead of ${PREFIX}/include/krb5.
This is good because it reduces the likelihood of a conflict with any
other similarly named headers if you simply add -I${PREFIX}/include/krb5
to the compiler command line.

Patch from PR pkg/38119 by charlie.
2008-03-02 06:41:32 +00:00
jlam
9d8755394f Rename termlib.* to termcap.* to better document exactly what packages
are trying to use (the termcap t*() API).
2008-02-29 22:41:13 +00:00
jlam
81dece3fea Update security/heimdal to version 1.1. Changes from version 0.7.2 include:
* Read-only PKCS11 provider built-in to hx509.
 * Better compatibilty with Windows 2008 Server pre-releases and Vista.
 * Add RFC3526 modp group14 as default.
 * Handle [kdc] database = { } entries without realm = stanzas.
 * Add gss_pseudo_random() for mechglue and krb5.
 * Make session key for the krbtgt be selected by the best encryption
   type of the client.
 * Better interoperability with other PK-INIT implementations.
 * Alias support for inital ticket requests.
 * Make ASN.1 library less paranoid to with regard to NUL in string to
   make it inter-operate with MIT Kerberos again.
 * PK-INIT support.
 * HDB extensions support, used by PK-INIT.
 * New ASN.1 compiler.
 * GSS-API mechglue from FreeBSD.
 * Updated SPNEGO to support RFC4178.
 * Support for Cryptosystem Negotiation Extension (RFC 4537).
 * A new X.509 library (hx509) and related crypto functions.
 * A new ntlm library (heimntlm) and related crypto functions.
 * KDC will return the "response too big" error to force TCP retries
   for large (default 1400 bytes) UDP replies.  This is common for
   PK-INIT requests.
 * Libkafs defaults to use 2b tokens.
 * krb5_kuserok() also checks ~/.k5login.d directory for acl files.
 * Fix memory leaks.
 * Bugs fixes
2008-02-28 14:11:55 +00:00