Commit graph

5723 commits

Author SHA1 Message Date
obache
bc84a2aa35 DragonFly also not require extra libs for OpenSSL. 2010-12-25 11:35:06 +00:00
kefren
c774f5de04 Fix Makefiles SUBDIRs for clamav and amavis-perl, amavisd-new changes 2010-12-24 07:24:54 +00:00
kefren
c383a7ae06 Remove amavis-perl and amavisd-new from security/. They are now moved
into pkgsrc/mail. Part of PR/32554
2010-12-24 07:23:35 +00:00
kefren
41826c09c8 Move clamav into security/. No objections on tech-pkg@
Part of PR/32554
2010-12-24 07:11:05 +00:00
christos
9b7f580d42 de to 1.6.0 from Anon Ymous
Changes since 1.1:

** gsasl: Add --no-cb to disable use of TLS channel bindings.
** build: Use silent build rules via automake.
    Use 'make V=99' to see the command lines used.
** Update gnulib files.
** gsasl: Support for TLS channel bindings.
    Requires GnuTLS 2.11.4 or later for the gnutls_session_channel_binding
    function.  Used by the SCRAM-SHA-1-PLUS mechanism.
** doc: Mention new property GSASL_CB_TLS_UNIQUE and SCRAM-SHA-1-PLUS.
** tests: Added self-tests for SCRAM-SHA-1-PLUS.
** gsasl: Avoid fixed size buffers.
    This caused problems on Windows where the BUFSIZ was too small for
    some line lengths with GS2-KRB5.
** tests: Fix error strings to be more unique.
** doc: Added section on how to build with MIT Kerberos for Windows.
** doc: Added PDF version of API reference manual.
    See doc/reference/gsasl.pdf.
** i18n: Updated translations.
    Thanks to Benno Schulenberg.
** doc: Explain GS2-related changes.
** doc: GTK-DOC manual improved.
    Now almost all symbols and types are explained.
** gsasl: Fix crash when getaddrinfo does not get a canonical name.
** gsasl: Improve error message when server rejects authentication.
** tests: Self checks are improved.
** gsasl: Improve application data throughput.
    Patch from Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de> in
    <http://thread.gmane.org/gmane.comp.gnu.gsasl.general/256>.
** Improve MinGW builds.
** doc: Fix doc/cyclo/ output.
** tests/crypto: Also test newly added SHA-1 interfaces.
** tests/scram: Also test GSASL_SCRAM_SALTED_PASSWORD case.
    This code path triggered a crash in v1.3.
** i18n: Added Finnish translation.
    Thanks to Jorma Karvonen <karvonen.jorma@gmail.com>.
** Experimental support for SCRAM-SHA-1 added.
    Please test it but don't put it into production use, the RFC have not
    been finalized yet.  For this reason, the mechanism priority list is
    such that SCRAM-SHA-1 will never be selected over any other mechanism
    (including PLAIN, CRAM-MD5, and DIGEST-MD5).  When it has been tested
    further, we'll make SCRAM-SHA-1 the preferred mechanism after GSSAPI.
** gsasl: Fix libintl-related build errors on MinGW.
    Tiny patch from "carlo.bramix" <carlo.bramix@libero.it>.
** doc: Typo fixes to manual.
    Based on report by Marco Maggi <marco.maggi-ipsu@poste.it> in
    <http://thread.gmane.org/gmane.comp.gnu.gsasl.general/222>.
** tests: Rewrite basic self test using modern API.
** tests: New self-test 'crypto' to increase code coverage.
** gsasl: Fix out of bounds write when in IMAP/SMTP mode.
    Reported by Enrico Scholz <enrico.scholz@informatik.tu-chemnitz.de> in
    <http://thread.gmane.org/gmane.comp.gnu.gsasl.general/230>.
** doc: Rewritten introduction material.
** doc: Improved sections for the info manual.
    We now follow the advice given by the texinfo manual on which
    directory categories to use.  In particular, libgsasl moved from the
    'GNU Libraries' section to the 'Software libraries' as GNU SASL, and
    'Invoking gsasl' moved from 'GNU utilities' to 'Security'.
** examples: Removed unneeded 'ctx' parameter from client_authenticate.
** Building with many warning flags now requires --enable-gcc-warnings.
    This avoids crying wolf for normal compiles.
** New configure parameters to set packaging specific information.
    The parameters are --with-packager, --with-packager-version, and
    --with-packager-bug-reports.  See
    <http://article.gmane.org/gmane.comp.lib.gnulib.bugs/17791> for more
    details.
2010-12-23 18:03:48 +00:00
dsainty
1f40f3a084 Mechanically replace references to graphics/jpeg with the suitable
alternative from mk/jpeg.buildlink3.mk

This allows selection of an alternative jpeg library (namely the x86 MMX,
SSE, SSE2 accelerated libjpeg-turbo) via JPEG_DEFAULT=libjpeg-turbo, and
follows the current standard model for alternatives (fam, motif, fuse etc).

The mechanical edits were applied via the following script:

#!/bin/sh
for d in */*; do
  [ -d "$d" ] || continue
  for i in "$d/"Makefile* "$d/"*.mk; do
    case "$i" in *.orig|*"*"*) continue;; esac
    out="$d/x"
    sed -e 's;graphics/jpeg/buildlink3\.mk;mk/jpeg.buildlink3.mk;g' \
        -e 's;BUILDLINK_PREFIX\.jpeg;JPEGBASE;g' \
        < "$i" > "$out"
    if cmp -s "$i" "$out"; then
      rm -f "$out"
    else
      echo "Edited $i"
      mv -f "$i" "$i.orig" && mv "$out" "$i"
    fi
  done
done
2010-12-23 11:44:24 +00:00
wiz
7303e9dadb Set LICENSE. 2010-12-20 11:55:17 +00:00
wiz
b6e693d49a Set LICENSE. 2010-12-20 10:00:56 +00:00
taca
70bb03ade5 Update php-suhosin pacakge to 0.9.32.1.
2010-07-23 - 0.9.32.1

    - Fixed missing header file resulting in compile errors

2010-07-23 - 0.9.32

    - Added support for memory_limit > 2GB
    - Fixed missing header file resulting in wrong php_combined_lcg()
      prototype being used
    - Improved random number seed generation more by adding /dev/urandom juice

2010-03-28 - 0.9.31

    - Fix ZTS build of session.c
    - Increased session identifier entropy by using /dev/urandom if available

2010-03-25 - 0.9.30

    - Added line ending characters %0a and %0d to the list of
      dangerous characters handled
      by suhosin.server.encode and suhosin.server.strip
    - Fixed crash bug with PHP 5.3.x and session module (due to
      changed session globals struct)
    - Added ! protection to PHP session serializer
    - Fixed simulation mode now also affects (dis)allowed functions
    - Fixed missing return (1); in random number generator replacements
    - Fixed random number generator replacement error case behaviour
      in PHP 5.3.x
    - Fixed error case handling in function_exists() PHP 5.3.x
    - Merged changes/fixes in import_request_variables()/extract()
      from upstream PHP
    - Fixed suhosin_header_handler to be PHP 5.3.x compatible
    - Merge fixes and new features of PHP's file upload code to suhosin
2010-12-19 02:22:15 +00:00
shannonjr
2d84f1efdd Backported security fix from Version 1.6.6 of pcsc-lite. The fix bounds the
value of a pointer, prior to a memcpy(), to prevent a buffer overflow.
2010-12-17 17:00:35 +00:00
obache
880707dc5b Bump PKGREVISION from icu shlib major bump. 2010-12-17 07:36:08 +00:00
drochner
032ef02efb add patch from upstream to protect for possible buffer overflows from
rogue cards (SA42658)
2010-12-16 18:00:59 +00:00
riz
3a41b48a3e Explicitly pass "--cpu=i386" when MACHINE_ARCH is i386 in order for
this to build properly under Mac OS X "Snow Leopard" on a 64-bit host.
Fixes PR pkg/44191 by me.
2010-12-15 21:52:15 +00:00
tron
da81e5cc97 Get this close to build under Mac OS X by removing some horrible use
of the C pre-processor.
2010-12-13 16:03:20 +00:00
wiz
710aa0672f Add TEST_TARGET. 2010-12-13 10:33:24 +00:00
wiz
6a2126023e Update to 1.7.6:
The following changes have been made between John 1.7.5.1 and 1.7.6:

* Generic crypt(3) support (enabled with "--format=crypt") has been added for
auditing password hash types supported by the system but not yet supported by
John's own optimized cryptographic routines (such as "SHA-crypt" and SunMD5).
* Optional parallelization of the above has been implemented by means of OpenMP
along with glibc's crypt_r(3) or Solaris' MT-safe crypt(3C).
* Optional parallelization of John's own optimized code for the OpenBSD-style
Blowfish-based crypt(3) (bcrypt) hashes with OpenMP has been added.
* A more suitable version of 32-bit x86 assembly code for Blowfish is now
chosen on Core i7 and similar CPUs (when they happen to run a 32-bit build).
* More optimal DES S-box expressions for PowerPC with AltiVec (making use of
the conditional select operation) contributed by Dumplinger Boy (Dango-Chu)
have been integrated.
* The bitslice DES C source code has been reworked to allow for the use of
arbitrary SIMD intrinsics, which was previously only implemented for AltiVec
as a special case.
* Support for SSE2 and MMX intrinsics with bitslice DES (as an alternative to
the supplied assembly code) has been added (currently only enabled for SSE2 on
x86-64 when compiling with GCC 4.4+).
* Support for mixed-type longer virtual vectors (such as SSE2+MMX, SSE2+ALU,
AltiVec+ALU, and other combinations) with bitslice DES has been added (not
enabled by default yet, primarily intended for easy benchmarks on future CPUs,
with future compiler versions, with even more SIMD instruction sets, and with
different DES S-box expressions that might be available in the future).
* The obsolete 32-bit SPARC assembly implementation of DES has been dropped.
* The loader will now detect password hashes specified on a line on their own,
not only as part of an /etc/passwd or PWDUMP format file.
* When run in "--stdin" mode and reading candidate passwords from a terminal
(to be typed by the user), John will no longer mess with the terminal settings.
* John will now restore terminal settings not only on normal termination or
interrupt, but also when forcibly interrupted with two Ctrl-C keypresses.

The following changes have been made between John 1.7.5 and 1.7.5.1:

* A new numeric variable has been added to the word mangling rules engine:
"p" for position of the character last found with the "/" or "%" commands.

The following changes have been made between John 1.7.4.2 and 1.7.5:

* Support for the use of "--format" along with "--show" or "--make-charset" has
been added.
* The choice of .rec and .log filenames for custom session names has been made
more intuitive.
* Support for "\r" (character lists with repeats) and "\p0" (reference to the
immediately preceding character list/range) has been added to the word mangling
rules preprocessor.
* The undefined and undocumented behavior of some subtle word mangling rules
preprocessor constructs has been changed to arguably be more sensible.
* Some bugs were fixed, most notably JtR crashing on no password hashes loaded
(bug introduced in 1.7.4.2).

The following changes have been made between John 1.7.4 and 1.7.4.2:

* Major performance improvements for processing of very large password files
or sets of files, especially with salt-less or same-salt hashes, achieved
primarily through introduction of two additional hash table sizes (64K and 1M
entries), changes to the loader, and smarter processing of successful guesses
(to accommodate getting thousands of hashes successfully cracked per second).
* Many default buffer and hash table sizes have been increased and thresholds
for the use of hash tables lowered, meaning that John will now tend to use
more memory to achieve better speed (unless it is told not to with the
"--save-memory" option).
* Some previously missed common website passwords found on public lists of
"top N passwords" have been added to the bundled common passwords list.
* Some bugs introduced in 1.7.4 and affecting wordlist mode's elimination of
consecutive duplicate candidate passwords have been fixed.

The following changes have been made between John 1.7.3.4 and 1.7.4:

* Support for back-references and "parallel" ranges has been added to the
word mangling rules preprocessor.
* The notion of numeric variables (to be used for character positions
and substring lengths along with numeric constants supported previously)
has been introduced into the rules engine.  Two pre-defined variables
("l" for initial or updated word's length and "m" for initial or
memorized word's last character position) and 11 user-defined variables
("a" through "k") have been added.  Additionally, there's a new numeric
constant: "z" for "infinite" position or length.
* New rule commands have been added: "A" (append, insert, or prefix with a
string), "X" (extract a substring from memory and insert), "v" (subtract
and assign to a numeric variable).
* New rule reject flags have been added: ":" (no-op, for use along with the
"parallel" ranges feature of the preprocessor) and "p" (reject unless word
pair commands are allowed, for sharing of the same ruleset between "single
crack" and wordlist modes).
* Processing of word mangling rules has been made significantly faster in
multiple ways (caching of the current length, less copying of data, code
and data placement changes for better branch prediction and L1 cache usage,
compiler-friendly use of local variables, code micro-optimizations,
removal of no-op rule commands in an initial pass).
* The default rulesets for "single crack" and wordlist modes have been
revised to make use of the new features, for speed, to produce fewer
duplicates, and to attempt additional kinds of candidate passwords (such
as for years 2010 through 2019 with "year-based" rules).
* The idle priority emulation code has been optimized for lower overhead when
there appears to be no other demand for CPU time.
* The default for the Idle setting has been changed from N to Y.

The following changes have been made between John 1.7.3.1 and 1.7.3.4:

* "make check" has been implemented (for Unix-like systems only).
* The "--test" option will now take an optional argument - the duration of each
benchmark in seconds.
* Section .note.GNU-stack has been added to all assembly files to avoid the
stack area unnecessarily being made executable on Linux systems that use this
mechanism.
* Some very minor bugs that did not affect normal operation have been fixed.
* Some unimportant compiler warnings have been fixed, a source code comment has
been made more verbose and more complete.
2010-12-13 10:32:35 +00:00
wiz
31302fc06f Update to 2.10.4:
* Version 2.10.4 (released 2010-12-06)

** gnutls-serv: Corrected a buffer overflow. Reported and patch by Tomas Mraz.

** libgnutls: Use ASN1_NULL when writing parameters for RSA signatures.
This makes us comply with RFC3279. Reported by Michael Rommel.

** libgnutls: Reverted default behavior for verification and
introduced GNUTLS_VERIFY_DO_NOT_ALLOW_X509_V1_CA_CRT. Thus by default
V1 trusted CAs are allowed, unless the new flag is specified.

** minitasn1: Updated to Libtasn1 2.9.

** API and ABI modifications:
No changes since last version.
2010-12-12 11:58:53 +00:00
wiz
9f3407461d Update to 2.9:
* Noteworthy changes in release 2.9 (2010-12-06) [stable]
- tests: Link to gnulib to avoid build error related to 'rpl_ftello' on Solaris.
  Reported by Dagobert Michelsen.
- doc: Fix bug reporting address to point at help-libtasn1@gnu.org.
- doc: Fix Returns: documentation in Texinfo.  Reported by Jeffrey Walton.
- build: Update gnulib files.
2010-12-12 11:37:27 +00:00
gls
bf26b205cb Update security/p5-IO-Socket-SSL to 1.35
Security fix

v1.35 2010.12.06
- if verify_mode is not VERIFY_NONE and the ca_file/ca_path cannot be
verified as valid it will no longer fall back to VERIFY_NONE but throw
an error. Thanks to Salvatore Bonaccorso and Daniel Kahn Gillmor for
pointing out the problem, see also
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058
2010-12-07 20:15:00 +00:00
gls
36160bc2a7 Direct MASTER_SITES to pypi.org, as the original MASTER_SITE doesn't host the
distfile anymore. Add DIST_SUBDIR to force re-download of the tarball, which
content has been modified.

While here, switch DEPENDS to py-crypto instead of py-amkCrypto.

Bump PKG_REVISION.
2010-12-06 22:22:08 +00:00
adam
67c5c9ef32 Detect builtin MIT Kerberos on Mac OS X 10.6.x 2010-12-05 21:56:55 +00:00
gls
863ba719f6 Update py-crypto to version 2.3
pkgsrc changes:
 - add a patch to fix an hardcoded interpreter path
 - add a patch to actually find gmp library.
 - add CONFLICTS with py-amkCrypto, both have files in common.

upstream changes:

2.3
===
* Fix NameError when attempting to use deprecated getRandomNumber()
function.
* _slowmath: Compute RSA u parameter when it's not given to
RSA.construct. This makes _slowmath behave the same as _fastmath in
this regard.
* Make RSA.generate raise a more user-friendly exception message when
the user tries to generate a bogus-length key.

2.2
===
* Deprecated Crypto.Util.number.getRandomNumber(), which had confusing
semantics.  It's been replaced by getRandomNBitInteger and
getRandomInteger.  (Thanks: Lorenz Quack)
* Better isPrime() and getPrime() implementations that do a real
Rabin-Miller probabilistic primality test (not the phony test we did
before with fixed bases).  (Thanks: Lorenz Quack)
* getStrongPrime() implementation for generating RSA primes.
(Thanks: Lorenz Quack)
* Support for importing and exporting RSA keys in DER and PEM format
(Thanks: Legrandin)
* Fix PyCrypto when floor division (python -Qnew) is enabled.
* When building using gcc, use -std=c99 for compilation.  This should
fix building on FreeBSD and NetBSD.
2010-12-05 17:13:09 +00:00
tez
9c348d6b44 add fix for CVE-2010-1323 from
http://web.mit.edu/kerberos/advisories/2010-007-patch-r15.txt
2010-12-03 20:11:31 +00:00
taca
83bbb51224 Update openssl package to 0.9.8q.
OpenSSL version 0.9.8q released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8q of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release. For a complete
   list of changes, please see

       http://www.openssl.org/source/exp/CHANGES.

   The most significant changes are:

      o Fix for security issue CVE-2010-4180
      o Fix for CVE-2010-4252
2010-12-03 00:17:21 +00:00
wiz
385e002b2a Update to 0.9.4: no list of changes found. 2010-12-02 16:13:53 +00:00
wiz
3499d7be81 Update to 2.0.3. List of changes not found. 2010-12-02 15:03:56 +00:00
wiz
c6a4ea899c Update to 0.50:
0.50  Nov 21, 2010
        - shell_quote in t/1_run.t was escaping '_' (bug report by
          Andreas J. König)
	- some typos corrected
        - initial implementation of scp_cat
2010-12-02 12:26:19 +00:00
wiz
76b16e925a Update to 1.34:
v1.34 2010.11.01
- schema http for certificate verification changed to
  wildcards_in_cn=1, because according to rfc2818 this is valid and
  also seen in the wild
- if upgrading socket from inet to ssl fails due to handshake problems
  the socket gets downgraded, but is still open.
  See https://rt.cpan.org/Ticket/Display.html?id=61466
- deprecate kill_socket, just use close()
2010-12-02 12:25:04 +00:00
wiz
ecb3e78865 Update to 2.51:
2010-09-30   Gisle Aas <gisle@ActiveState.com>

   Release 2.51

   Florian Ragwitz (1):
      Fix compilation with c++ compilers

   Gisle Aas (1):
      Fix repository specification in META.yml



2010-09-25   Gisle Aas <gisle@ActiveState.com>

   Release 2.50

   Chris 'BinGOs' Williams (1):
      Amended tests to work with perl core.

   Florian Ragwitz (3):
      Attach context pointers using sv magic
      Add failing test for thread cloning
      Clone MD5 contexts on thread cloning
      get_md5_ctx should never return anything but a valid pointer

   Gisle Aas (1):
      perl-5.6 no longer supported

   Jesse Vincent (1):
      Preserve utf8ness of argument [RT#44927]
2010-12-02 12:22:58 +00:00
wiz
abac0aa67c Update to 0.16:
0.16  Wed Sep 29 08:11:42 2010
        - fixed crc64 support for non-xs case, #61490, #61491
2010-12-02 12:22:07 +00:00
obache
21964a9977 Fixes build with OPENSSL_NO_MD2. 2010-11-30 07:12:49 +00:00
drochner
f0c61d0def update to 2.30.1
This switches to the gnome-2.32 release branch.
(compile-tested only; the old version didn't build anymore)
2010-11-29 12:56:20 +00:00
drochner
de7f3e8f42 update to 2.32.0
This switches to the gnome-2.32 release branch.
2010-11-28 12:57:50 +00:00
shattered
833bf67ecc Install manpages in man/, not share/man/ 2010-11-28 10:47:40 +00:00
agc
978258d152 add and enable libtomcrypt 2010-11-27 06:13:25 +00:00
agc
132d12edaa Import libtomcrypt (version 1.17) into the packages collection.
LibTomCrypt is a fairly comprehensive, modular and portable
	cryptographic toolkit that provides developers with a vast array of
	well known published block ciphers, one-way hash functions, chaining
	modes, pseudo-random number generators, public key cryptography and a
	plethora of other routines.  LibTomCrypt has been designed from the
	ground up to be very simple to use.  It has a modular and standard API
	that allows new ciphers, hashes and PRNGs to be added or removed
	without change to the overall end application.  It features easy to
	use functions and a complete user manual which has many source snippet
	examples.

	* Block Ciphers
	    * Blowfish
	    * XTEA
	    * RC5
	    * RC6
	    * SAFER+
	    * Rijndael (aka AES)
	    * Twofish
	    * SAFER (K64, SK64, K128, SK128)
	    * RC2
	    * DES, 3DES
	    * CAST5
	    * Noekeon
	    * Skipjack
	    * Anubis (with optional tweak as proposed by the developers)
	    * Khazad
	    * KASUMI
	    * SEED
	* Chaining Modes
	    * ECB
	    * CBC
	    * OFB
	    * CFB
	    * CTR
	    * IEEE LRW mode
	    * F8 Chaining Mode
	* One-Way Hash Functions
	    * MD2
	    * MD4
	    * MD5
	    * SHA-1
	    * SHA-224/256/384/512
	    * TIGER-192
	    * RIPE-MD 128/160/256/320
	    * WHIRLPOOL
	* Message Authentication
	    * FIPS-198 HMAC (supports all hashes)
	    * CMAC, also known as OMAC1 (supports all ciphers)
	    * PMAC Authentication
	    * F9-MAC
	    * Pelican MAC
	* Message Encrypt+Authenticate Modes
	    * EAX Mode
	    * OCB Mode
	    * CCM Mode (NIST spec)
	    * GCM Mode (IEEE spec)
	* Pseudo-Random Number Generators
	    * Yarrow (based algorithm)
	    * RC4
	    * Support for /dev/random, /dev/urandom and the Win32 CSP RNG
	    * Fortuna
	    * SOBER-128
	* Public Key Algorithms
	    * RSA (using PKCS #1 v1.5 and v2.1)
	    * ECC (EC-DSA X9.62 signatures, X9.63 EC-DH)
		  o With fast Fixed Point ECC support as well
		  o X9.63 import/export of public keys
	    * DSA (Users make their own groups)
	    * The math routines are pluggable which means you can use your own
	      math provider if you want.
	* Other standards
	    * PKCS #1 (v1.5 and v2.1 padding)
	    * PKCS #5
	    * ASN.1 DER
2010-11-27 06:11:57 +00:00
drochner
86be3a7ef6 update to 1.1.0
change: New functions to fix a leak in dirmngr
2010-11-26 18:00:17 +00:00
drochner
2069879c55 update to 2.10.3
changes: bugfixes
2010-11-26 17:56:14 +00:00
drochner
16cf750011 update to 1.10
change: 3 error codes added
2010-11-26 17:55:21 +00:00
obache
1c2474795f define missing PKGCONFIG_OVERRIDE. 2010-11-18 12:09:54 +00:00
taca
f8a37f7e9a Update security/openssl package to 0.9.8p.
OpenSSL version 0.9.8p released
   ===============================

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8p of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release which addresses
   CVE-2010-3864. For a complete list of changes,
   please see http://www.openssl.org/source/exp/CHANGES.
2010-11-17 00:52:25 +00:00
drochner
714df7b568 update to 2.32.0
This switches to the gnome-2.32 release branch.
2010-11-16 13:10:53 +00:00
adam
52d99912dd Changes 186:
* fix for BUG-424: build fails on Darwin
2010-11-16 09:53:50 +00:00
abs
9987fa4b3a PKGREVISION bumps for changes to gtk2, librsvg, libbonobo and libgnome 2010-11-15 22:56:08 +00:00
obache
4df37b6c5f Shlib major bumped from 3 to 4 at update of ImageMagick-6.6.4.1.
Bump ABI_DEPENDS (and recursive bump).
2010-11-14 14:05:57 +00:00
shattered
3b05a61c76 Follow HTTP redirects to new HOMEPAGEs and/or MASTER_SITES. 2010-11-13 21:08:54 +00:00
obache
d8b3ca0f9b reset maintainer, he does not use this package anymore. 2010-11-11 11:42:20 +00:00
adam
6ed847acc6 pkglint fixes 2010-11-10 10:37:48 +00:00
agc
7719e6d6fa add and enable libpbc 2010-11-09 03:34:32 +00:00
agc
52f6ebf0c7 Initial import of security/libpbc-0.5.10 into the Packages Collection.
The PBC (Pairing-Based Cryptography) library is a free C library built
	on the GMP library that performs the mathematical operations
	underlying pairing-based cryptosystems.

	It provides routines such as elliptic curve generation, elliptic curve
	arithmetic and pairing computation.

	The API is abstract enough that the PBC library can be used even if
	the programmer possesses only an elementary understanding of pairings.
	There is no need to learn about elliptic curves or much of number
	theory.  (The minimum requirement is some knowledge of cyclic groups
	and properties of the pairing.)

	      Boneh-Lynn-Shacham short signatures
	      Hess identity-based signatures
	      Joux tripartite Diffie-Hellman
	      Paterson identity-based signatures
	      Yuan-Li identity-based authenticated key agreement
	      Zhang-Kim identity-based blind/ring signatures
	      Zhang-Safavi-Naini-Susilo signatures
2010-11-09 03:33:28 +00:00