Commit graph

5723 commits

Author SHA1 Message Date
wiz
7e05f222be Remove configure override for funopen detection.
Aleksey Cheusov reports in PR 43519 that this fixes a problem on Linux,
and the function is still properly detected on NetBSD-5.99.31..
2010-06-25 22:11:10 +00:00
obache
55970ad7a8 * fixes DESTDIR installation
* define TEST_TARGET.
2010-06-25 06:28:09 +00:00
joerg
e51cf4c45c Fix dependency pattern 2010-06-19 14:21:57 +00:00
taca
b240294d0c Update F-PROT Antivirus to 6.0.3.1.
pkgsrc changes:

* Fix PKGNAME to really intended to.
* Some permission problem with using scan-mail.pl


6.0.3 (Initially NetBSD only):

 - Scanning inside NSIS (Nullsoft) installer files

 - Generic IFRAME exploit detection

 - Numerous additions to the Eldorado heuristic engine, making it
   significantly more powerful than before - Scanning of 7-Zip, ACE
   and "solid RAR" archives - Improved scanning of JavaScript files

 - List of detected malware now includes Eldorado heuristic detections

 - Much faster initial loading of ANTIVIR.DEF

  - Scan engine updated
2010-06-16 22:27:03 +00:00
pettai
c4eb363ac8 OpenDNSSEC 1.1.0:
* Partial Auditor added
* Dnsruby-1.46 required
* Improved error messages when the system runs out of keys
* Optimise communication of signconfs for multiple zones sharing keys.
  Group zones in zonelist.xml by policy to get this benefit.
* Bugreport #101: Signer Engine now maintains its own pidfile.
* Jitter redefined: now in the range of [-jitter, ..., +jitter]
* Optimized sorter: quicksorter (sorter becomes obsolete).
* Optimized zone_reader, includes nseccing/nsec3ing (nseccer and nsec3er
  become obsolete).
* Enable database selection using --with-database-backend={sqlite3|mysql}
* Enable the EPP-client using --enable-eppclient
  For sending DS RR to the parent zone (experimental)
* Turn NSEC3 OptOut off by default
* Install kasp2html XML stylesheet
* Add simple kasp2html conversion script
* DNSKEY records communicated to an external script if configured
* The command 'ods-signer restart' is removed.
* Signer Engine now also reuses signatures after a change in NSEC(3)
  configuration or rolling keys.
* Quicksorter defaults to class IN.

And a lot of bugfixes...
2010-06-16 00:19:08 +00:00
pettai
299d59a534 courier-authlib-0.63.0:
* authldapescape.c: Factor out LDAP string escape function.
* authldap.schema: Various fixes
* authldap.ldif (olcObjectClasses): Create LDIF format schema from
  authldap.schema
* authoption.c (auth_getoptionenvint): For account options that
  are parsed to an int, an option value that begins with t, T, y, or Y
  is evaluated as 1, other alphabetic values as 0; so that 'true'
  or 'yes' get evaluated as 1.

(See the Changelog for the previous releases)

Based on patch(es) from PR pkg/42989 by Brian Candler
2010-06-15 23:10:44 +00:00
drochner
2bc030fefa fix build against gnome-keyring-2.30, should fix PR pkg/43479
by Greg Oster
being here, disable avahi support which is mostly useless
2010-06-15 16:32:11 +00:00
wiz
d69edc3fa4 Remove patch-aa, upstream's Simon Josefsson said:
The patch looks wrong to me, though, because stdint.h should be
generated in lib/gllib/ if the system does not have it (or if it is not
correct), and the -I's should make the code find the local file instead.
Thus, the code should be able to unconditionally include the header
file.
2010-06-15 12:25:50 +00:00
taca
b90020b8ef Add hpn-patch for OpenSSH 5.5p1.
No PKGREVISION bump since this option never worked
with OpenSSH 5.5p1 before.
2010-06-15 03:11:52 +00:00
jnemeth
1c55f55e8f PR/43470 - Jack Lloyd -- update DESCR
While here, do some minor delinting and set LICENSE.
2010-06-14 18:27:54 +00:00
wiz
f45a09f8f6 PKGREVISION bump for png-1.4.x shlib change.
(missed those and *emacs* the first time round because they pull
in their png dependencies via default-on options; they were included
in the test bulk build though)
2010-06-14 15:33:12 +00:00
wiz
e8d8834f6a Bump PKGREVISION for libpng shlib name change.
Also add some patches to remove use of deprecated symbols and fix other
problems when looking for or compiling against libpng-1.4.x.
2010-06-13 22:43:46 +00:00
wiz
95e615c646 Fix installation with latest gnome-doc-utils and depend on it. 2010-06-12 14:13:17 +00:00
martti
4e27aff6a3 Updated security/openssh to 5.5.1
Lots of changes, including

 * After a transition period of about 10 years, this release disables
   SSH protocol 1 by default. Clients and servers that need to use the
   legacy protocol must explicitly enable it in ssh_config / sshd_config
   or on the command-line.

 * Remove the libsectok/OpenSC-based smartcard code and add support for
   PKCS#11 tokens. This support is automatically enabled on all
   platforms that support dlopen(3) and was inspired by patches written
   by Alon Bar-Lev. Details in the ssh(1) and ssh-add(1) manpages.

 * Add support for certificate authentication of users and hosts using a
   new, minimal OpenSSH certificate format (not X.509). Certificates
   contain a public key, identity information and some validity
   constraints and are signed with a standard SSH public key using
   ssh-keygen(1). CA keys may be marked as trusted in authorized_keys
   or via a TrustedUserCAKeys option in sshd_config(5) (for user
   authentication), or in known_hosts (for host authentication).

   Documentation for certificate support may be found in ssh-keygen(1),
   sshd(8) and ssh(1) and a description of the protocol extensions in
   PROTOCOL.certkeys.

 * Added a 'netcat mode' to ssh(1): "ssh -W host:port ..." This connects
   stdio on the client to a single port forward on the server. This
   allows, for example, using ssh as a ProxyCommand to route connections
   via intermediate servers. bz#1618
2010-06-11 20:41:41 +00:00
drochner
a9e8813c6e update to 2.30.1
This switches to the gnome-2.30 release branch

pkgsrc note: temporarily add a dependency on libgnome-keyring which
was split out of the old gnome-keyring pkg, so that client pkgs
get the same as before
2010-06-11 13:45:50 +00:00
wiz
435d0e3dae Need pkg-config, add it to tools. 2010-06-10 21:18:16 +00:00
pettai
e3f00da3f7 Corrected PLIST 2010-06-08 12:02:21 +00:00
wiz
743c02520a Update to 1.8:
Noteworthy changes in version 1.8 (2010-05-06)
----------------------------------------------

 * Support for WindowsCE.

 * New option --list for gpg-error.

 * Interface changes relative to the 1.7 release:
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 GPG_ERR_NOT_ENABLED           NEW.
 GPG_ERR_SOURCE_G13            NEW.
 GPG_ERR_NO_ENGINE             NEW.
 gpg_err_set_errno             NEW.
2010-06-08 10:15:32 +00:00
obache
d3d7334aaa Update xmlsec1 to 1.2.16.
* May 26 2010
  Changes in XML Security Library 1.2.16 release:
    * New xmlsec-gcrypt library.
    * xmlsec-gcrypt: Added RSA with SHA1/SHA256/SHA384/SHA512/MD5/RIPEMD160, DSA
      with SHA1, AES/DES KW support.
    * xmlsec-gnutls: Added X509 support and converted the library to use xmlsec-
      crypt library for all crypto operations.
    * xmlsec-mscrypto: RSA/OAEP and AES/DES KW support.
    * Several minor bug fixes and code cleanups.
* April 29 2010
  Changes in XML Security Library 1.2.15 release:
    * xmlsec-mscrypto: Added HMAC with MD5, SHA1, SHA256/384/512; RSA with MD5,
      SHA256/384/512 support.
    * xmlsec-mscrypto: Converted to Unicode (the non-Unicode builds are still
      available as compile time option).
    * xmlsec-nss: Added MD5 and SHA256/384/512 support for digest, HMAC and RSA
      (the new minimum required version for NSS library is 3.9).
    * xmlsec-gnutls: Added SHA256/384/512 for digest and HMAC; MD5 and RIPEMD160
      digests support (the new minimum required version for GnuTLS library is
      2.8.0).
    * Fixed typo: "Copyrigth" should be "Copyright".
    * Several critical bug fixes and code cleanups.
* December 5 2009
  Changes in XML Security Library 1.2.14 release:
    * XMLSec library is switched from built-in LTDL library to the system LTDL
      library on Linux/Unix and native calls on Windows to fix security issue
       (CVE-2009-3736) in LTDL.
    * Fixed minor bugs (see log for complete list).
2010-06-06 12:36:11 +00:00
obache
087589d065 remove obsoleted @dirrm. 2010-06-06 11:52:31 +00:00
manu
129ac552e7 Update to 1.1, which allows to select what timeframe should be validated:
assertion and/or session
2010-06-05 20:36:30 +00:00
wiz
1ccb64e2ed Update to 2.7:
* Noteworthy changes in release 2.7 (2010-05-20) [stable]
- Doc: Build a PDF manual using GTK-PDC.
- Doc: Fix of asn1_check_version, documentation was missing from last release.
- Build: Avoid warnings about ignored visibility attributes on Windows.
2010-06-05 10:53:25 +00:00
taca
9ece180735 Update security/sudo package to 1.7.2p7.
For more detail: http://www.sudo.ws/sudo/alerts/secure_path.html

Summary:
    Sudo "secure path" feature works by replacing the PATH environment
    variable with a value specified in the sudoers file, or at
    compile time if the --with-secure-path configure option is used.
    The flaw is that sudo only replaces the first instance of PATH
    in the environment.  If the program being run through sudo uses
    the last instance of PATH in the environment, an attacker may
    be able to avoid the "secure path" restrictions.

Sudo versions affected:
    Sudo 1.3.1 through 1.6.9p22 and Sudo 1.7.0 through 1.7.2p6.
2010-06-03 14:53:14 +00:00
wiz
cc01fa5056 Add patch-a{a,b} to distinfo. 2010-06-03 09:23:34 +00:00
dholland
38f0cbd0be PR 43393: security/gsasl-1.1 fails to build on solaris 2010-06-03 02:28:31 +00:00
gls
4aeb031c84 This is a Python egg.
Don't hardwire paths in PLIST.

As noted by Ryo HAYASAKA in PR/43405.
2010-06-02 18:31:41 +00:00
taca
cecfa38f9a Update security/openssl package to 0.9.8o.
OpenSSL CHANGES
 _______________

 Changes between 0.9.8n and 0.9.8o [01 Jun 2010]

  *) Correct a typo in the CMS ASN1 module which can result in invalid memory
     access or freeing data twice (CVE-2010-0742)
     [Steve Henson, Ronald Moesbergen <intercommit@gmail.com>]

  *) Add SHA2 algorithms to SSL_library_init(). SHA2 is becoming far more
     common in certificates and some applications which only call
     SSL_library_init and not OpenSSL_add_all_algorithms() will fail.
     [Steve Henson]

  *) VMS fixes:
     Reduce copying into .apps and .test in makevms.com
     Don't try to use blank CA certificate in CA.com
     Allow use of C files from original directories in maketests.com
     [Steven M. Schweda" <sms@antinode.info>]
2010-06-02 13:30:11 +00:00
bouyer
da727b047f Works fine with python2.6 too. 2010-06-01 21:30:25 +00:00
drochner
1449332db7 +libgnome-keyring 2010-06-01 11:01:27 +00:00
drochner
648258f66f add libgnome-keyring-2.30.1, a library which was split from gnome-keyring
in gnome-2.30
2010-06-01 10:56:27 +00:00
agc
1ddac943f4 Update netpgp to version 3.99.4/20100601
+ avoid possible free() of new value passed to netpgp_setvar(),
  with thanks to Anon Ymous.
+ netpgpkeys(1):  print keys to stdout, not stderr - reported by Anon
  Ymous.
+ fix DSA signatures and verification
+ simplify and shorten the internals of packet processing by getting rid of
  the intermediate pseudo-abstraction layer, which detracted from understanding
  and had no benefit whatsoever. Rename some enums and some definitions.
+ add some checking to new key generation, and don't try to read in
  the keys after writing them - reported by Tyler Retzlaff
+ netpgpverify - avoid the separate codebase, and just use libnetpgp(3)
2010-06-01 06:15:00 +00:00
gls
cf70dc220f Remove patch-aa 2010-05-31 20:34:58 +00:00
gls
2bc4a85957 Update security/py-paramiko to 1.7.6.
pkgsrc changes:
- patches/patch-aa no longer required
- Added LICENSE

Changelog:
ARC4 & CTR support, IP6 support, and various bug fixes (incl. an important
Windows random number generation fix)
2010-05-31 20:30:31 +00:00
manu
b9925728de Update to lasso 2.2.91. From the NEWS file:
2.2.91 - January 26th 2010
--------------------------

A new Perl binding, fix for backward compatibility with old versions of glib,
LassoLogout API is more robust since it does not need anymore for all SP logout
to finish to work, new macro lasso_list_add_new_xml_node, add support for
WS-Security UsernameToken (equivalent of poor man HTTP Digest Authentication),
make public internal APIs: lasso_session_add_assertion,
lasso_session_get_assertion and lasso_session_remove_assertion.

2.2.90 - January 18th 2010
--------------------------

Lots of internal changes and some external one too.

There is a new api to force, forbid or let Lasso sign messages, it is called
lasso_profile_set_signature_hint.

Big overhaul of the ID-WSF 1 and 2 codes, and of the SAML 2.0 profiles. Now all
SAML 2.0 profile use common internal functions from the lasso_saml20_profile_
namespace to handle bindings (SOAP,Redirect,POST,Artifact,PAOS). New internal
API to load SSL keys from many more formats from the public API.

In ID-WSF 2.0, Data Service Template has been simplified, we no more try to
apply queries, it is the responsability of the using code to handle them.

In bindings land, the file bindings/utils.py has been stuffed with utility
function to manipulate 'type' tuple, with are now used to transfer argument and
type description, their schema is (name, C-type, { dictionary of options } ),
they are now used everywhere in the different bindings. We support output
argument in PHP5, Python and Java, i.e. pointer of pointer arguments with are
written to in order to return multiple values. For language where the binding
convert error codes to exceptions (all of them now), the ouput value is
returned as the normal return value of the method, so only one output argument
is handled for now.

We now use GObject-introspection annotations in the documentation to transfer
to the binding generator the necessary metadata about the API (content of
lists, hashtables, wheter pointer are caller/callee owned, can be NULL or if
argument have a default value). The file bindings/override.xml is now
deprecated.

In documentation land, the main reference documentation was reorganizaed and
more symbols have been added to it. Many more functions are documented.

There is now tools to control the evolution of the ABI/API of Lasso.
2010-05-31 16:44:28 +00:00
wiz
a8b7f81812 Mark as make-jobs-safe again; a comment said the problem was reported
upstream and supposedly fixed in 2.0.6 (pkgsrc is at 2.0.14 now).

Multiple builds with 16 jobs showed no problem.
2010-05-30 08:24:48 +00:00
obache
c34ff8c51b + py-xmlsec 2010-05-29 06:21:29 +00:00
obache
4057a0d332 Import py-xmlsec-0.3.0 as security/py-xmlsec.
Based on PR#42948 by Patrick McPhee.

PyXMLSec is a set of Python bindings for XML Security Library (XMLSec).
2010-05-29 06:20:06 +00:00
obache
c36b95f3a9 Add buildlink with libxml2 and libxslt.
shlib linked with those library and pkg-config also notice requirement.
2010-05-29 05:53:04 +00:00
seb
840ad63bbc Update p5-Module-Signature from version 0.63 to version 0.64.
Pkgsrc changes:
- placate pkglint

Upstream changes:
[Changes for 0.64 - Sun,  9 May 2010 00:50:11 +0200]

* Avoid creating gnupg configuration files for the user invoking Makefile.PL
  (Closes RT#41978).
* Correctly detect the version of gnupg on cygwin and add tests for it
  (Paul Fenwick) (Closes RT#39258).
2010-05-24 16:02:28 +00:00
tez
ec67e0d1e7 fix CVE-2010-1321 (MITKRB5-SA-2010-005) and take maintainership 2010-05-20 14:21:23 +00:00
pettai
41e61b6afb * keychain 2.7.1 (07 May 2010)
- Addition of a "make clean" target. removal of runtests as it is currently
  broken.
- New release process in Makefile and release.sh - keychain release tarball
  will now contain pre-generated keychain, keychain.1 and keychain.spec so
  that users do not need to run "make". Updated README.rst to refer to the
  "source code" as a "release archive" since it contains both source code and
  ready-to-go script and man page.
- GPG fix from Gentoo bug 203871; This fix will fix the issue with pinentry
  starting in the background and not showing up in the terminal.

* keychain 2.7.0 (23 Oct 2009)

- lockfile() replacement from Parallels Inc. OpenVZ code, takelock() rewrite,
  resulting in ~100 line code savings. Default lock timeout set to 5 seconds,
  and now keychain will try to forcefully acquire the lock if the timeout
  aborts, rather than simply failing and aborting.
- MacOS X/BSD improvements: fix sed call in Makefile for MacOS X and presumably
  other *BSD environments. Rename COPYING to COPYING.txt + slight COPYING.txt
  formatting change. Fixed POD errors (removed '=end').
- Disable "Identity added" messages when --quiet is specified.
  (Gentoo bug #250328)
  --help will print output to stdout (Gentoo bug #196060)
  output cleanup and colorization changes - moving away from blue and over to
  cyan as it displays better terminals with black background.
  Also some additional colorization.

* keychain 2.6.9 (26 Jul 2009)

- Close Gentoo bug 222953 fix potential issues with GNU grep, Mac OS X color
  fix when called with --eval.
- Perl 5.10 Makefile fix. Transition README to README.rst (reStructuredText).
  Updated maintainership information.
  Simplified default output
2010-05-18 06:29:31 +00:00
obache
86fb06cc13 LICENSE=2-cluase-bsd 2010-05-17 02:55:18 +00:00
obache
e83795dbcb + ruby-oauth 2010-05-16 11:46:22 +00:00
obache
3450cb043a Import ruby-oauth-0.4.0 as security/ruby-oauth.
This is a RubyGem for implementing both OAuth clients and servers in Ruby
applications.
2010-05-16 11:45:10 +00:00
pettai
2d6777e7df New better documentation is available, so point to those instead 2010-05-09 19:04:47 +00:00
pettai
35505d26d7 SoftHSM 1.1.4 - 2010-04-06
* Respect --disable-64bit
* Respect $DESTDIR for config files
* The binaries can now show the version number
* softhsm-keyconv could not handle --ttl properly
* Link softhsm static with libsofthsm
* Build libsofthsm.so without version number
* libsofthsm.so is now a loadable module
2010-05-09 18:20:38 +00:00
adam
c3815a563b Set correct architecture on Darwin 2010-05-08 06:33:41 +00:00
agc
a962abfd36 Upgrade netpgp to version 3.99.2/20100507.
Changes to 3.99.2/20100507

+ add detached armoured signature creation and verification
+ fix manual pages
+ rationalisation of debug messages
2010-05-08 03:45:58 +00:00
ahoka
87d7892e4c Drop maintainership on these packages, I am no longer interested. 2010-05-07 08:34:22 +00:00
pettai
6462e1c535 fixed email 2010-05-06 14:56:16 +00:00
pettai
dd5700843a + opendnssec 2010-05-06 13:27:08 +00:00
pettai
9bcbd303b0 The OpenDNSSEC project announces the development of Open Source software
that manages the security of domain names on the Internet.
The project intends to drive adoption of Domain Name System Security Extensions
(DNSSEC) to further enhance Internet security.
2010-05-06 12:50:17 +00:00
seb
98e8211f03 Update p5-IO-Socket-SSL from version 1.32 to version 1.33.
Upstream changes:
v1.33 2010.03.17
- attempt to make t/memleak_bad_handshake.t more stable, it fails
  for unknown reason on various systems
- fix hostname checking: an IP should only be checked against
  subjectAltName GEN_IPADD, never against GEN_DNS or CN.
  Thanks to rusch[AT]genua[DOT]de for bug report
2010-05-05 22:47:20 +00:00
tron
5b43f7bd45 Remove an old Mac OS X build fix which now breaks the build. 2010-05-02 16:03:17 +00:00
wiz
b92c5ccc4d Update to 2.6:
* Noteworthy changes in release 2.6 (2010-04-20) [stable]
- Fix build failure on platforms without support for GNU LD version scripts.
- libtasn1: Simplified implementation of asn1_check_version.
- tests: Improved self-checks.
- Update gnulib files, fix many syntax-check nits, indent code,
  fix license templates.
2010-05-02 11:54:12 +00:00
tonnerre
7280a8807a Upgrade py-asn1 to version 0.0.11a.
Changes since 0.0.8a:

- Decoder can now treat values of unknown types as opaque OctetString.
- Fix to Set/SetOf type decoder to handle uninitialized scalar SetOf
  components correctly.
- API versioning mechanics retired (pyasn1.v1 -> pyasn1) what makes
  it possible to zip-import pyasn1 sources (used by egg and py2exe).
- Allow any non-zero values in Boolean type BER decoder, as it's in
  accordnance with the standard.
2010-05-01 17:23:36 +00:00
zafer
0c1c4ea190 remove pacnet mirror. service down. 2010-04-17 10:39:33 +00:00
taca
eecb625d79 Update sudo package from sudo-1.7.2p4 to sudo-1.7.2p6.
Sudo versions 1.7.2p6 and 1.6.9p22 are now available.  These releases
fix a privilege escalation bug in the sudoedit functionality.

Summary:
    A flaw exists in sudo's -e option (aka sudoedit) in sudo versions
    1.6.8 through 1.7.2p5 that may give a user with permission to
    run sudoedit the ability to run arbitrary commands.  This bug
    is related to, but distinct from, CVE 2010-0426.

Sudo versions affected:
    1.6.8 through 1.7.2p5 inclusive.
2010-04-16 15:33:52 +00:00
jakllsch
226d0ebfd9 SUBDIR+=kstart 2010-04-15 20:26:02 +00:00
jakllsch
2418d05171 Import kstart-3.16.
k5start, and krenew are modified versions of kinit which add support
for running as a daemon to maintain a ticket cache, running a
command with credentials from a keytab and maintaining a ticket
cache until that command completes, obtaining AFS tokens (via an
external aklog) after obtaining tickets, and creating an AFS PAG
for a command. They are primarily useful in conjunction with
long-running jobs; for moving ticket handling code out of servers,
cron jobs, or daemons; and to obtain tickets and AFS tokens with
a single command.
2010-04-15 20:23:03 +00:00
tron
a2ddd612f9 Update "stunnel" package to version 4.33. Changes since 4.29:
- New features
  - New service-level "libwrap" option for run-time control whether
    /etc/hosts.allow and /etc/hosts.deny are used for access control.
    Disabling libwrap significantly increases performance of stunnel.
  - Log file reopen on USR1 signal was added.
  - Graceful configuration reload with HUP signal on Unix
    and with GUI on Windows.
- Bugfixes
  - Inetd mode fixed
  - Fixed a transfer() loop issue with SSLv2 connections.
  - Fixed a "setsockopt IP_TRANSPARENT" warning with "local" option.
  - Logging subsystem bugfixes and cleanup.
  - Installer bugfixes for Vista and later versions of Windows.
  - FIPS mode can be enabled/disabled at runtime.
2010-04-15 09:57:47 +00:00
joerg
0065d19519 DESTDIR support 2010-04-14 22:45:51 +00:00
elric
3a65b980e7 Upgrade to 1.6.1. 2010-04-14 20:15:27 +00:00
elric
ac3861e5c1 Remove patch-aa as the upstream maintainer (elric@) incorporated it. 2010-04-14 19:27:15 +00:00
schmonz
3d4737103a Add and enable knc. 2010-04-14 18:46:26 +00:00
schmonz
edba6041b4 Add knc, Kerberised NetCat. It works in basically the same way as
either netcat or stunnel except that it is Kerberised. You can use
it to construct client/server applications while keeping the Kerberos
libraries out of your programs address space quickly and easily.
2010-04-14 18:45:47 +00:00
drochner
ed9b7d21b9 update to 2.8.6
changes:
-interoperability improvements (especially for VeriSign)
-misc fixes
-translation updates
2010-04-13 16:31:27 +00:00
drochner
49243015e1 update to 2.5
changes:
-Improve GTK-DOC comments
-Updated gnulib files
2010-04-13 16:28:53 +00:00
taca
ff53f07b54 Update openssl package from 0.9.8m to 0.9.8n.
Changes between 0.9.8m and 0.9.8n [24 Mar 2010]

  *) When rejecting SSL/TLS records due to an incorrect version number, never
     update s->server with a new major version number.  As of
     - OpenSSL 0.9.8m if 'short' is a 16-bit type,
     - OpenSSL 0.9.8f if 'short' is longer than 16 bits,
     the previous behavior could result in a read attempt at NULL when
     receiving specific incorrect SSL/TLS records once record payload
     protection is active.  (CVE-2010-0740)
     [Bodo Moeller, Adam Langley <agl@chromium.org>]

  *) Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL
     could be crashed if the relevant tables were not present (e.g. chrooted).
     [Tomas Hoger <thoger@redhat.com>]
2010-04-12 14:19:17 +00:00
seb
3e8d4a95a8 Update p5-Module-Signature from version 0.61 to version 0.63.
Upstream changes:
[Changes for 0.63 - Sun, 28 Mar 2010 04:46:27 +0100]

* Fix diagnostic message from Makefile.PL when the user dosn't have gnupg or
  Crypt::OpenPGP (miyagawa).

[Changes for 0.62 - Tue, 23 Mar 2010 22:17:39 +0100]

* Change the default keyserver from the outdated pgp.mit.edu to
  pool.sks-keyservers.net.
2010-04-11 23:55:02 +00:00
jmmv
5da5ac4a19 Fix PLIST: add missing locale bn. 2010-04-11 22:19:56 +00:00
markd
c1322afdc9 Make sure qmake can be found during the build. 2010-04-09 23:47:19 +00:00
jmmv
9e5b6dcbef Fix PLIST when installing in Linux. 2010-03-31 10:33:46 +00:00
joerg
2cd7bd2623 Apply some sense to the build system by always linking the .la archives
in src/lib as that is the location it wants to pick it up. Work around
the dependencies in other places by symlinking to that, effectively
reverting the direction. Link telnet(d) consistently. Add DESTDIR support.
2010-03-26 21:44:59 +00:00
taca
807dc7a634 Add a patch for Fix for CVE-2010-0740, DoS problem.
http://www.openssl.org/news/secadv_20100324.txt

Bump PKGREVISION.
2010-03-26 00:20:49 +00:00
asau
00708ce7e3 Recursive revision bump for GMP update. 2010-03-24 19:43:21 +00:00
joerg
c25bd5edc4 Install data files to share/examples to make sure they end up in the
binary package. Fixes DESTDIR installation at the same time. Bump revision.
2010-03-23 18:01:47 +00:00
wiz
e903a8d9fe Reset maintainer, lost his commit bit. 2010-03-23 15:37:56 +00:00
wiz
a4eec2f4cc Reset maintainer, developer lost his commit bit. 2010-03-21 16:29:38 +00:00
jdolecek
6c7b6037ed use PHP_VERSIONS_ACCEPTED=52 rather then PHP_VERSIONS_REQD=5 for packages,
which are PHP 5.2.* only
2010-03-21 11:20:41 +00:00
scottr
4f81f242b8 Store the result of dbm_fetch() before dbm_close() (apparently) clobbers it. 2010-03-21 06:54:10 +00:00
scottr
26f426bb9d Work around a bug described in security/39313. 2010-03-21 06:50:13 +00:00
joerg
baa4330bd1 Needs pkg-config. 2010-03-19 13:28:09 +00:00
taca
2b17414848 Restrict to php5 with PHP_VERSION_REQD.
These packages are dropped on PHP 5.3 or has build problem.

No functional change.
2010-03-16 11:56:22 +00:00
sno
b514ea696f Updating security/p5-Net-DNS-SEC from 0.15 to 0.16
pkgsrc changes:
- Adjust dependencies
- Add license definition

Upstream changes:
***0.16 March 12, 2010
   Feature: KEY inherits DNSKEY
   This helps maintenance in one part of the code.

   Feature: keylength methode rt.cpan.org #53468
   Added keylength method for RSA and DSA
   Acknowledgements Hugo Salgado

   Fix: rt.cpan.org #51778
   Empty bitmap would cause error about undefined ARRAY in NSEC/NSEC3.
   Now the code will allow empty bitmaps gracefully

   Feature: New Algorithm Support (rt.cpan.org #51092)
   SHA2 algorithm support, including NSEC3 algorithm parameters updated
   Acknowledgement Jakob Shlyter

   Fix: rt.cpan.org #42089
   NSEC3 Algorithm support in NSEC3 broken
   patch by Wes Hardaker
2010-03-16 10:32:38 +00:00
sno
1dd37278d6 Updating security/p5-Authen-SASL from 2.13 to 2.14
Upstream changes:
Authen-SASL 2.14 -- Thu Mar 11 08:21:07 CST 2010
  * Documentation updates  [Yann Kerherve]
  * Added server API description [Yann Kerherve]
  * Bugfixes to LOGIN, PLAIN and DIGEST_MD5 [Yann Kerherve]
  * Added server support for LOGIN, PLAINaand DIGEST_MD5 [Yann Kerherve]
  * Compatiblity with Authen::SASL::XS [Yann Kerherve]
2010-03-16 10:18:00 +00:00
sno
041d021411 Updating security/p5-Crypt-Eksblowfish from 0.007 to 0.008
pkgsrc changes:
- Adding license definition
- Adjusting dependencies

Upstream changes:
version 0.008; 2010-03-11
  * bugfix: avoid memory leak when returning block to Perl space
  * check for required Perl version at runtime
  * in XS, avoid using "class" as a variable name, for compatibility
    with C++ compilers
  * in Build.PL, explicitly declare configure-time requirements
  * remove bogus "exit 0" from Build.PL
2010-03-16 10:14:56 +00:00
pettai
c2d26d1715 + opensaml 2010-03-15 19:44:02 +00:00
pettai
af3a83cf05 OpenSAML is a set of open source C++ libraries meant to support developers
working with the Security Assertion Markup Language (SAML). OpenSAML 2,
the current version, supports SAML 1.0, 1.1, and 2.0.
2010-03-15 19:40:44 +00:00
schmonz
9d2a5fef96 Installs shlibs nowadays, so don't default to a build-only dependency. 2010-03-15 03:21:15 +00:00
pettai
fe4a64ae77 Take over MAINTAINER 2010-03-14 13:30:02 +00:00
pettai
e4efd05340 Version 0.13.1
* Fixed bug with reading gzipped aide.db files
        * Removed dead ustat code

Version 0.13
        * Added support for selinux and xattr attributes
        * Added support for the Linux Audit System
        * Fixed usage of libgcrypt instead of libmhash
        * Added file locking for output files
        * Fixed bugs

Version 0.12
        * Fixed bugs
        * Allow http/https/ftp URLs through libcurl
        * Support posix_fadvice() to avoid caching files

Version 0.11
        * Fixed many bugs
        * Updated automake/autoconf scripts
        * Use snprintf by Mark Martinec if not in C library
        * Support for more (legacy) Unix systems and cygwin
        * Open files with O_NOATIME on supported Linux systems
        * Added I/ANF/ARF directives
2010-03-14 13:27:10 +00:00
agc
0a67c9b56f Update pkgsrc/security/netpgp to 2.99.1/20100313
Changes to 2.99.1/20100313

+ add functionality to parse basic signature subkeys
+ in doing so, add expiration of keys
+ at the same time, add revocation of keys
+ recognise the primary user id, and use it when displaying user ids
+ recognise self signed keys and subkeys
+ rework the indentation of output
+ add the --list-sigs [userid] option to netpgpkeys(1)
+ use memcmp(3) rather than strcmp(3) when checking binary user ids to
  be exported
+ add expiration display to subkey signature output
+ update libnetpgp library version major number to 3
2010-03-14 01:21:03 +00:00
pettai
cc1c98cfd2 + zkt 2010-03-13 19:22:44 +00:00
pettai
3024e03f99 ZKT is a tool to manage keys and signatures for DNSSEC-zones.
The Zone Key Tool consist of two commands:
* dnssec-zkt to create and list dnssec zone keys and
* dnssec-signer to sign a zone and manage the lifetime of the zone signing keys
Both commands are simple wrapper commands around the dnssec-keygen(8) and
dnssec-signzone(8) commands provided by BIND.
2010-03-13 19:19:51 +00:00
pettai
a69024cc0a + softhsm 2010-03-13 18:02:27 +00:00
pettai
9f4ca60dd0 Fixed wip errors 2010-03-13 17:51:26 +00:00
pettai
30ae9b24fa SoftHSM is an implementation of a cryptographic store accessible through a
PKCS#11 interface. You can use it to explore PKCS#11 without having a
Hardware Security Module. It is being developed as a part of the OpenDNSSEC
project. SoftHSM uses Botan for its cryptographic operations.
2010-03-13 17:47:56 +00:00
pettai
998432bee5 Removed not needed lines (to a removed patch-file) 2010-03-13 09:27:26 +00:00
obache
66a3fea37a Updte lsh to 2.0.4.
While here,
 * set LICENSE=gnu-gpl-v2
 * marked as user-destdir installation ready
 * switch to use system argp
 * add missing zlib buildlink

News for the 2.0.4 release

	Fixed x11 forwarding bug in the lsh client.

News for the 2.0.3 release

	At startup, lshd now tries to close any spurious open file
	descriptors. New test case for lshd fd leakage.

	lshd --daemonic --no-syslog now sets up a proper daemonic
	environment, except that log messages are still sent to
	stderr. Improved testing of this feature.
2010-03-13 04:40:12 +00:00
pettai
99e5c9bbae + pam-tacplus 2010-03-12 22:18:42 +00:00
pettai
ff26987d56 TACACS+ protocol client library and PAM module in C.
This PAM module support authentication, authorization (account
management) and accounting (session management) performed using
TACACS+ protocol designed by Cisco.
2010-03-12 22:15:27 +00:00
pettai
69bdba2349 Added LICENSE 2010-03-10 15:55:38 +00:00
pettai
f7644057f3 Fix MAINTAINER
(also imported from pkgsrc-wip)
2010-03-09 20:04:55 +00:00
pettai
3a2258ffd7 + p5-Authen-TacacsPlus 2010-03-09 19:59:37 +00:00
pettai
d1b87f4214 Authen::TacacsPlus allows you to authenticate using tacacs+ server 2010-03-09 19:57:42 +00:00
sno
4c142c3cc1 Updating security/p5-Crypt-Blowfish from 2.10nb1 to 2.12
pkgsrc changes:
- Add recommeded minimum version for Crypt::CBC dependency

Upstream changes:
2.12 04 Mar 2010
	- updated Changes to mesh with revision.

2.11  Feb 2010
	- patched _blowfish.c to stop spurious warnings.
	- updated POD
2010-03-08 15:15:57 +00:00
dholland
26fb5f1281 Bump PKGREVISION for previous, on the grounds that fixing errno.h affects
more than just the Linux build.
2010-03-08 01:21:59 +00:00
dholland
0ef866ecdb Fix Linux build broken since 2006. Two issues: (1) do _FILE_OFFSET_BITS=64
instead of rolling a private _llseek syscall using now-nonexistent type
declarations; (2) as noted in PR 33893 use errno.h instead of "extern int
errno".
2010-03-08 01:21:24 +00:00
spz
39a80d4c97 update to latest release
DESTDIRify
ok'd by manu@
2010-03-06 09:07:15 +00:00
agc
dc900b3dd2 Update to netpgp-20100305
+ clean up some lint
+ the obligatory ''build on os x'' fixes - include <inttypes.h>
2010-03-05 19:59:37 +00:00
agc
3e5c30ffeb Update netpgp to version 1.99.20/20100304 - portability improvements, and bug fixes:
Changes to 1.99.20/20100304

        + move args to some functions around to be consistent
        + use uint*_t where appropriate
        + fix bug in verify memory
        + add documentation to manual pages to show how to do combined
          signing/encryption and decryption/verification
        + make verification of ascii-armoured memory work the same as binary
	+ eliminate use of strdup(3), strcasecmp(3), and strptime(3).
	  NetBSD/pkgsrc PR 42922 applies - need to define
	  _XOPEN_SOURCE and _BSD_SOURCE for newer linux platforms with
	  glibc 2.10.1.  solved a bit differently, by implementing
	  strdup(3) and strcasecmp(3) independently, and using regexps
	  to avoid calling strptime(3).
2010-03-05 16:20:05 +00:00
taca
2824a1b75d Update php-suhosin package to 0.9.29.
2009-08-15 - 0.9.29

    - Fixing crash bugs with PHP 5.3.0 caused by unexpected NULL in
      EG(active_symbol_table)
    - Added more compatible way to retrieve ext/session globals
    - Increased default length and count limit for POST variables (for
      people not reading docu)

2009-08-14 - 0.9.28

    - Fixed crash bug with PHP 5.2.10 caused by a change in extension
      load order of ext/session
    - Fixed harmless parameter order error in a bogus memset()
    - Disable suhosin.session.cryptua by default because of Internet
      Explorer 8 "features"
    - Added suhosin.executor.include.allow_writable_files which can be
      disabled to disallow inclusion of files writable by the webserver
2010-03-04 15:38:53 +00:00
taca
e85dd22b44 Fix broken PLIST.
(I wonder why "make print-PLIST" generated wrong result before...")

Bump PKGREVISION.
2010-03-01 08:15:40 +00:00
wiz
aeaceb273d Reset maintainer for developers who gave back their commit bit. 2010-02-26 10:28:30 +00:00
taca
4864e4cfe7 Update openssl to 0.9.8m.
The OpenSSL project team is pleased to announce the release of
   version 0.9.8m of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release which implements
   RFC5746 to address renegotiation vulnerabilities mentioned in
   CVE-2009-3555.  For a complete list of changes,
   please see http://www.openssl.org/source/exp/CHANGES.
2010-02-26 03:15:13 +00:00
taca
0a17064336 Update sudo package to 1.7.2p4.
Major changes between version 1.7.2p3 and 1.7.2p4:

    * Fix a bug that could allow users with permission to run sudoedit
      to run arbitrary commands.

Major changes between version 1.7.2p2 and 1.7.2p3:

    * Fix printing of entries with multiple host entries on a single line.

    * Fix use after free when sending error messages via email.

    * Use setrlimit64(), if available, instead of setrlimit() when
      setting AIX resource limits since rlim_t is 32bits.

    * Fix size arg when realloc()ing include stack.

    * Avoid a duplicate fclose() of the sudoers file.
2010-02-26 01:08:38 +00:00
joerg
e8721a5922 Explicitly pull PREFIX/lib into the normal library search path too.
DESTDIR support
2010-02-25 17:55:48 +00:00
joerg
20a9a3f65f Reset MAINTAINER, mail bounced. 2010-02-25 14:59:22 +00:00
drochner
b8cdabc86c +pinentry-qt4 2010-02-25 11:30:50 +00:00
drochner
0b423e35c2 add the qt4 version of the pinentry widget, from Sverre Froyen per PM 2010-02-25 11:30:03 +00:00
agc
aa787a3c78 add licensing info
modern NetBSD has PAM - add a patch so that this is recognised

there is no reason not to run this on modern NetBSD systems - remove the
old NOT_FOR_PLATFORM, since this runs just fine on NetBSD 5.99.20
2010-02-25 07:15:42 +00:00
tez
203778c883 Fix CVE-2009-4212 (MITKRB5-SA-2009-004) using patches from
http://web.mit.edu/kerberos/advisories/2009-004-patch_1.6.3.txt
(slightly adjusted for older kerberos version)
2010-02-24 19:07:51 +00:00
sno
6ad05df340 Updating security/p5-IO-Socket-SSL from 1.31 to 1.32
Upstream changes:
v1.32 2010.02.22
- Makefile.PL: die if Scalar::Util has no dualvar support instead of
  only complaining. Thanks to w[DOT]phillip[DOT]moore[AT]gmail[DOT]com
  for reporting.
2010-02-23 19:04:23 +00:00
drochner
dc2bb271f6 share some common stuff 2010-02-22 17:20:39 +00:00
drochner
23a6f645f0 fix a problem with the curses widget and non-UTF8 locales: keys which
used less bytes in the system encoding than in the UTF8 passed to
the caller caused that the passphrase got truncated because only
the input length was accounted for
bump PKGREVISION
2010-02-22 17:19:09 +00:00
sno
8e2107029a Updating security/p5-Net-OpenSSH from 0.44 to 0.45
Upstream changes:
0.45  Feb 17, 2010
	- support for taint mode
	- use better IPv6 regexp
	- bug in glob_quoter incorrectly handling empty strings solved
        - document how $SIG{CHLD} can break some methods and add FAQ
        - some typos corrected
	- update copyright notices
2010-02-22 16:38:15 +00:00
sno
11b7664dc5 Updating security/p5-Authen-SASL from 2.12nb1 to 2.13
pkgsrc changes:
- Add license definition
- Adjust dependencies
- Add module type

Upstream changes:
Authen-SASL 2.13 -- Thu Sep 24 17:27:47 CDT 2009
  * RT#42191 Only use pass for GSSAPI credentials if it is an object of type GSSAPI::Cred
  * RT#675 Authorization with Authen::SASL::Perl::External
  * Call client_new and server_new inside eval so further plugins can be tried before failing
  * Prefer to use Authen::SASL::XS over Authen::SASL::Cyrus
2010-02-22 15:56:28 +00:00
sno
430983d4b2 Updating security/p5-Data-SimplePassword from 0.04nb1 to 0.05
pkgsrc changes:
- Add license definition
- Add module type
- Order dependencies like in META.yml (upstream)

Upstream changes:
0.05  Tue Oct 13 11:04:46 JST 2009
	* added a few new types for rndpassword(1).
	* added 'endless mode' for rndpassword(1).
	* cleaned code & pod up.
2010-02-22 13:32:25 +00:00
obache
eb62928ccd * add user-destdir support
* set LICENSE=gnu-gpl-v2
2010-02-20 08:25:51 +00:00
joerg
36881c04df Use plain CONF_FILES. Bump revision. 2010-02-19 21:31:56 +00:00
joerg
802b079bd0 Fix ownership. Bump revision. 2010-02-19 21:30:13 +00:00
heinz
6979f45443 Added LICENSE information. 2010-02-19 20:16:40 +00:00
joerg
097c8b3f6b Fix ownership. Bump revision. 2010-02-19 20:16:05 +00:00
joerg
df7f875ab6 Use real root user in install script. 2010-02-19 19:23:50 +00:00
joerg
52fcee4dfa Fix linkage. Honour CFLAGS. Bump revision. 2010-02-19 15:12:04 +00:00
martti
adc840d965 Regenerated some of the patches. 2010-02-19 10:17:33 +00:00
taca
167d1cdd3b Add checksum for hpn-patch. 2010-02-18 16:27:58 +00:00
martti
cd59ee0c20 Updated OpenSSH to 5.3.1 (pkg/42635 by Fredrik Pettai)
This is a bugfix release, no new features have been added.

Changes since OpenSSH 5.2
=========================

General Bugfixes:

 * Do not limit home directory paths to 256 characters. bz#1615

 * Several minor documentation and correctness fixes.

Portable OpenSSH Bugfixes:

 * This release removes for support for very old versions of Cygwin and
   for Windows 95/98/ME

 * Move the deletion of PAM credentials on logout to after the session
   close. bz#1534

 * Make PrintLastLog work on AIX. bz#1595

 * Avoid compile errors on FreeBSD from conflicts in glob.h. bz#1634

 * Delay dropping of root privileges on AIX so chroot and pam_open_session
   work correctly. bz#1249 and bz#1567

 * Increase client IO buffer on Cygwin to 64K, realising a significant
   performance improvement.

 * Roll back bz#1241 (better handling for expired passwords on Tru64).
   The change broke password logins on some configurations.

 * Accept ENOSYS as a fallback error when attempting atomic
   rename(). bz#1535

 * Fix passing of variables to recursive make(1) invocations on Solaris.
   bz#1505

 * Skip the tcgetattr call on the pty master on Solaris, since it never
   succeeds and can hang if large amounts of data is sent to the slave
   (eg a copy-paste). bz#1528

 * Fix detection of krb5-config. bz#1639

 * Fix test for server-assigned remote forwarding port for non-root users.
   bz#1578

 * Fix detection of libresolv on OSX 10.6.
2010-02-18 08:04:35 +00:00
wiz
faf5e14654 Update to 0.9.3, needed by KDE-4.4. 2010-02-16 14:08:38 +00:00
sno
a5b47b4854 Fixing '.orig' relicts being installed after patching 2010-02-16 13:49:22 +00:00
wiz
48c3df3a9a Update to 1.1.3:
* keylookup:
  + Fixed typo noticed by lintian in manpage keylookup.1.
* caff:
  + Set the Sender header with the email address which is used for the From
    header. This overrides the default value which was set by the
    MIME::Entity Perl module based on the local hostname. (Closes: #556782)
2010-02-16 11:29:42 +00:00
joerg
4b5df7f172 Use SETUID_ROOT_PERMS and allow building as normal user. Bump revision. 2010-02-15 17:06:18 +00:00
joerg
681fde1497 "as" is a reserved word in Python 2.6+, so don't use it as variable.
Fix a Python interpreter path while here.
2010-02-15 15:57:44 +00:00
joerg
3fdc894f5e Needs pkg-config. 2010-02-14 19:17:40 +00:00
joerg
a5fc5fb3a2 Don't mess with ldconf. 2010-02-14 19:16:25 +00:00
taca
5f11e73618 It was missing to replace user in scan-mail.pl.
Add FPROT_GROUP and FPROT_USER to proper handling that user.

Bump PKGREVISION.
2010-02-14 10:56:32 +00:00
agc
255d4a5b23 Update the netpgp package to version 20100212/1.99.19
Changes to 1.99.19/20100212

	+ plug some memory leaks, from cppcheck via Thomas Klausner (thanks!)
	+ make the singular of time units read correctly
	+ print decryption key info properly when prompting for passphrase

	Changes to 1.99.18/20100211

	small steps, but lots of them - this is the first one.

	+ print out the correct key information when signing files and memory.
	  what used to be printed out was the copy of the public key which is
	  stored as part of the private key. does not address the info shown
	  when decrypting, since that is done in a different way, by callback.
	  this whole part needs to be re-written, but will have to wait for two
	  good hands.

	Changes to 1.99.17/20100206

	+ get rid of last 2 static variables - use the __ops_printstate_t struct
	  passed down
	+ get rid of 3 occurrences in reader.c where an automatic buffer was
	  addressed (as part of a subsequent callback) by a struct field from
	  a calling scope, and only valid within the callback.  Found by
	  Flexelint and phk - many thanks.
	+ print filename/"memory" when time problems occur when validating signatures

	Changes to 1.99.16/20100205

	+ minor simplifications to netpgp(1) internally
	+ fix a bug in netpgp_verify_file where a non-existent file while listing
	  packets would cause a SIGSEGV
	+ add duration arg to netpgp(1), and check for validity when verifying
	  signatures
	+ add birthtime arg to netpgp(1), and check for validity when verifying
	  signatures
	+ add netpgp commands to print pubkey, if desired
	+ allow the passphrase for the signature to be taken from --pass-fd
	+ get rid of static indent value when printing packet contents
	+ print signature validity times when verifying a file's signature
2010-02-13 00:18:47 +00:00
sno
a64733a567 Updating security/p5-Crypt-OpenPGP from 1.03nb5 to 1.04
pkgsrc changes:
- Adding license definition
- Adding pgp2-compat option which turns on idea dependency (defaultly off)
- Reordering and updating dependencies to cover fixes

Upstream changes:
1.04 2009.12.10
    - Keyring lookup by uid is now case-insensitive to match the behavior
      in GnuPG. Fixes http://rt.cpan.org/Public/Bug/Display.html?id=2225
    - Got rid of a warning in Crypt::OpenPGP::SKSessionKey related to
      broken calculation of the session_key; that session_key value was
      never used, so I removed the code generating the key, hence removing
      the warning. Addresses
      http://rt.cpan.org/Public/Bug/Display.html?id=29950
    - Default key and config file locations (in compatibility mode) now work
      on Windows. Fixes http://rt.cpan.org/Public/Bug/Display.html?id=18815
    - Updated to use Module::Install. Addresses
      http://rt.cpan.org/Public/Bug/Display.html?id=35983 and
      http://rt.cpan.org/Public/Bug/Display.html?id=31411
    - Made all dependencies required, rather than optional based on
      feature packages. Simplifies distribution and packaging, and addresses
      http://rt.cpan.org/Public/Bug/Display.html?id=41426
    - Removed sign() and auto_install() from Makefile.PL.
    - Removed magic svn keywords.
    - Converted test suite to Test::More.
    - Added author tests (xt/) and modified SYNOPSIS for all modules to
      make them pass the compilation test.
2010-02-12 18:26:36 +00:00
sno
b50112fe8f Updating security/p5-Crypt-DSA from 1.16 to 1.16nb1
- Applying fix from RT#49668 (openssl dsaparam output format change in 1.0
  beta 3 breaks Crypt::DSA::KeyChain), see
  https://rt.cpan.org/Ticket/Display.html?id=49668
2010-02-12 18:16:44 +00:00
sno
1e1753272a Updating security/p5-Crypt-RIPEMD160 from 0.04nb3 to 0.04nb4
Applying patch from RT #19138 to fix invalid results on 64-Bit platforms
2010-02-12 18:04:54 +00:00
joerg
3b5d2041bb Bump revision for change of PostgreSQL default version. 2010-02-10 19:34:05 +00:00
joerg
3a06eb96bf Bump revision for PYTHON_VERSION_DEFAULT change. 2010-02-10 19:17:31 +00:00
zafer
4e2ea81be8 update master_sites 2010-02-09 00:05:48 +00:00
drochner
a8ad3a21ab create relative symlink from the beginning, the pkgsrc absolute->relative
conversion logics has problems
2010-02-08 11:44:39 +00:00
drochner
f9d1b2040d fix spelling of gtk2 default 2010-02-08 11:43:23 +00:00
tnn
3c17d9043a Fix wrong directory ownership. Bump PKGREVISION. 2010-02-08 09:41:59 +00:00
drochner
409d5fe274 put the pinentry variants which depend on a toolkit into seperate
pkgs rather than having their build controlled by options
(no change in the default case)
2010-02-07 15:36:58 +00:00
drochner
e7ed3dfc76 add a patch from upstream CVS to fix a bug which could make keys
unusable on passphrase changes
bump PKGREVISION
2010-02-03 10:58:11 +00:00
schmonz
88d5c1db5d Update to 0.96. From the changelog:
- Added support for checking permissions in cvm-qmail.  See discussion
   of $CVM_QMAIL_CHECK_PERMS in cvm-qmail.html
- Added support for I/O timeouts for cvm-local modules.
- Fixed the SQLite module to copy the row data.
- Fixed cvm-qmail dieing if control/locals is missing.

pkgsrc changes: set LICENSE and support DESTDIR.
2010-02-03 07:06:12 +00:00
sno
960b63a939 Updating security/p5-Net-SSLeay from 1.35nb2 to 1.36
pkgsrc changes:
- Adjusting dependencies
- Removing compatibility patches which are all applied upstream

Upstream changes:
1.36 30.01.2010
	- Fix problems with building on GNU/kFreeBSD, to do with use of pack
	instread of sockaddr_in. Patched by Debian Perl Group. (Closes RT#40144)
	- Fixed a compile problem in t/local/ptr_cast_test.c for some gcc
	versions. Reported by "Ryan McGuigan via RT". (Closes RT#52525)
	- Improved OpenSSL detection on Win32/strawberry perl. Patch provided
	by kmx. (Closes RT#49287)
	- Fix test failures on some 64-bit platforms. (Closes RT#53585)
	- Make X509_NAME_get_text_by_NID return its result without a trailing NUL.
	Patched by Steffen Ullrich. (Closes RT#35754)
	- SSL_set_session_secret_cb required for EAP-FAST is now enabled for both
	SSL_F_SSL_SET_HELLO_EXTENSION and
	SSL_F_SSL_SET_SESSION_TICKET_EXT. The name of this #define
	changed after 0.9.8i. SSL_set_hello_extension is not available after
	0.9.8i.
	- Added SSL_CTX_get_client_CA_list sk_X509_NAME_free sk_X509_NAME_num
	sk_X509_NAME_value SSL_get_client_CA_list, from patch provided by
	Joerg Schneider
	- Added EVP_add_digest and EVP_sha256 (if available)
	- Improve documentation on callback functions.
	- Stop looping forever when writing to broken connections. Patched by
	Martin Mares. (Closes RT#44170)
	- Patches from "Martijn van Beers via RT" to add SSL_SENT_SHUTDOWN
	and SSL_RECEIVED_SHUTDOWN, remove broken URLs,
	and to fix some documentation issues.
	- Various changes to build with OpenSSL 1.0 beta1:
	SSL_SESSION_cmp has been removed
	return type of SSL_CTX_sessions changed in an ugly way
	- Fixed a build problem reported by SISYPHUS:
	On Windows Vista64, ActivePerl 5.10.0 (build 1004, x64), running 'nmake
	test', the process hangs forever when it comes to building the test
	executable (as the executable fails to build).
	- Applied patch from ecmenifee in to improve handling of errors in
	ssl_write_all. (Closes RT#48132)
	- Patch to permit compile and testing on OS/2 submitted by Ilya
	Zakharevich.
	- Fixed compile problems with openssl-1.0.0-beta3 due to MD2 now being
	optional. Reported by paul [...] city-fan.org.
	- Fixed compile problems with openssl-0.9.7 and earlier with undefined
	symbol EVP_sha256. Reported by paul [...] city-fan.org.
	- Fixed a typo reported by Dan Dascalescu.
	- added RIPEMD160 digest function.  Patch provided by dkg.
2010-02-02 20:53:46 +00:00
sno
4dd9b7d6b2 Updating security/p5-Net-OpenSSH from 0.36 to 0.44
Upstream changes:
0.44
	- solve bug on rsync methods not correctly handling
          pass-through options carrying an argument (bug report by
          Daiju Kito)
	- support several verbose levels in rsync methods
	- document spurious warnings that appear when tty => 1 is
          given and stdin is not attached to a tty

0.43  Dec 14, 2009
        - call ssh with -tt instead of -t to force remote tty
          allocation even when stdin is not attached to one locally
          (bug report by Todd E. Rinaldo)

0.42  Dec 5, 2009
        - add FAQ section
	- add commercial support offering
	- add pointer to my wishlist :-)

0.41_03 Nov 16, 2009
	- add testing known_hosts to MANIFEST
	- some bits where missing from 0.40
	- allow also keyboard-interactive authentication when password
          is given (bug report by Todd E. Rinaldo)

0.40  Nov 14, 2009
        - DESTROY was clobbering $@ (bug report by Todd E. Rinaldo)
	- when password authentication is requested add flags to ssh
          master command to disable other auth. options
	- document how to integrate Net::OpenSSH with Expect

0.39  Oct 10, 2009
	- use SIGTERM instead of SIGHUP to kill lazy SSH master
	- on 1_run.t remote commands could be aliased bug (report and
          patch by Danijel Tasov)
	- add methods for external master PID handling
	- add 'all' tag to Net::OpenSSH::Constants
	- check SSH client version from Makefile.PL
	- work around L<Foo::Bar> links in POD being rendered as "the
          Foo::Bar manpage" by some POD backends.

0.38  Sep 25, 2009
        - remove alpha-status warning from docs!
	- add debug support to master killing
        - DESTROY was generating warnings when called before the
          master connection had been established successfully
        - add variable expansion feature
	- minor doc corrections

0.37  Sep 15, 2009
        - add support for stdout_file, stderr_file and stdin_file
          options
2010-02-02 20:18:29 +00:00
tnn
14b2544237 sprinkle --tag=CC for libtool 2010-02-02 17:09:28 +00:00
joerg
3ee04332c3 Fix rpath. Honour strip settings. 2010-01-31 23:24:24 +00:00
joerg
08f74d4840 Fix permissions. 2010-01-31 23:13:24 +00:00
joerg
f9978cf975 DESTDIR support 2010-01-30 19:36:35 +00:00
sno
d58b53fa67 Updating security/p5-Crypt-OpenSSL-RSA from 0.25nb3 to 0.26
Upstream changes:
0.26  Sun Nov 22 2009 11:01:13
        - Change subclassing test to generate a 512 bit key in order to
          work around an odd issue seen on some 64-bit redhat systems.
          (CPAN bug 45498)
2010-01-29 10:40:20 +00:00
sno
60f86f0208 Updating security/p5-Crypt-Rijndael from 1.08 to 1.09
pkgsrc changes:
- Updating COMMENT to new short description from upstream

Upstream changes:
1.09 - Sun Jan 17 12:00:33 2010
	* Clarify in the Makefile.PL that this is under LGPL.
	* There are no code changes
2010-01-29 10:19:47 +00:00
joerg
b7362024b6 DESTDIR support 2010-01-27 22:05:28 +00:00
joerg
8b9636fd05 DESTDIR support. Fix libXt dependency. Bump revision. 2010-01-27 22:03:53 +00:00
joerg
87920b72f9 DESTDIR support 2010-01-27 21:59:21 +00:00
joerg
e5c0037f21 DESTDIR support 2010-01-27 21:47:00 +00:00
joerg
2898ec35f6 DESTDIR support 2010-01-27 21:32:58 +00:00
joerg
fd7f52ccb1 Supports DESTDIR. 2010-01-27 21:31:43 +00:00
joerg
3df47416d5 DESTDIR support 2010-01-27 20:57:22 +00:00
joerg
ff1bb81e90 DESTDIR support from Steven Drake. 2010-01-27 18:21:56 +00:00
joerg
b7f3604848 DESTDIR support 2010-01-27 16:52:13 +00:00
joerg
f8370c59e2 DESTDIR support 2010-01-27 16:41:59 +00:00
joerg
f18d81aefb DESTDIR support. Fix comment. 2010-01-27 14:28:28 +00:00
joerg
37b687298e DESTDIR support 2010-01-27 14:27:39 +00:00
sno
181b1cc6dc Added security/p5-Authen-Htpasswd version 0.16.1 2010-01-27 10:31:29 +00:00
sno
b7693d1e87 Importing security/p5-Authen-Htpasswd version 0.16.1 as dependency of
scheduled import of www/p5-Catalyst-Authentication-Store-Htpasswd,
which is recommended by the update of editors/p5-Padre-Plugin-Catalyst.

This module provides a convenient, object-oriented interface to Apache-style
.htpasswd files.  It supports passwords encrypted via MD5, SHA1, and crypt,
as well as plain (cleartext) passwords.  Additional fields after username
and password, if present, are accessible via the extra_info array.
2010-01-27 10:31:17 +00:00
heinz
d653ce6a74 Added LICENSE information. 2010-01-24 17:11:17 +00:00
wiz
319e13628d More PKGREVISION bumps of jpeg dependencies.
Identified by parsing the NetBSD-i386-5.0.1/2009Q3 pkg_summary files
and Robert Elz.
2010-01-24 13:26:09 +00:00
joerg
20dafd5800 Also works with Python 2.6. 2010-01-23 22:57:05 +00:00
taca
ee2930a3bc Add a patch from OpenSSL's repositroy to deal with CVE-2009-4355.
Bump PKGREVISION.
2010-01-22 03:35:10 +00:00
heinz
c286ae7afc Added LICENSE information. 2010-01-21 23:32:10 +00:00
wiz
21a84747a2 Update to 5.48:
5.48  Mon Jan  4 16:32:52 MST 2010
	- fixed "shasum -a0" option (ref. rt.cpan.org #53319)
		-- incorrectly accepted 0 as a valid algorithm
			-- thanks to Zefram for patch
	- updated URL for NIST test vectors
		-- ref. files t/nistbit.t, t/nistbyte.t
			-- thanks to Leon Brocard for patch
2010-01-20 14:54:58 +00:00
wiz
e17d6e3cac Update to 4.29:
Version 4.29, 2009.12.02, urgency: MEDIUM:
* New features sponsored by Searchtech Limited http://www.astraweb.com/
  - sessiond, a high performance SSL session cache was built for stunnel.
    A new service-level "sessiond" option was added.  sessiond is
    available for download on ftp://stunnel.mirt.net/stunnel/sessiond/ .
    stunnel clusters will be a lot faster, now!
* Bugfixes
  - "execargs" defaults to the "exec" parameter (thx to Peter Pentchev).
  - Compilation fixes added for AIX and old versions of OpenSSL.
  - Missing "fips" option was added to the manual.

Version 4.28, 2009.11.08, urgency: MEDIUM:
* New features
  - Win32 DLLs for OpenSSL 0.9.8l.
  - Transparent proxy support on Linux kernels >=2.6.28.
    See the manual for details.
  - New socket options to control TCP keepalive on Linux:
    TCP_KEEPCNT, TCP_KEEPIDLE, TCP_KEEPINTVL.
  - SSL options updated for the recent version of OpenSSL library.
* Bugfixes
  - A serious bug in asynchronous shutdown code fixed.
  - Data alignment updated in libwrap.c.
  - Polish manual encoding fixed.
  - Notes on compression implementation in OpenSSL added to the manual.
2010-01-20 14:46:17 +00:00
wiz
ecc8190b98 Update to 1.02:
2010-01-10   Gisle Aas <gisle@ActiveState.com>

   Release 1.02

   Give the distribution a META.yml file
2010-01-20 14:43:21 +00:00
wiz
52a88647f7 Update to 2.4:
* Noteworthy changes in release 2.4 (2010-01-18) [stable]
- Doc fixes.
- Updated gnulib files.
- Clean up copyright notices.
2010-01-20 11:17:34 +00:00
wiz
91871f449e Second try at jpeg-8 recursive PKGREVISION bump. 2010-01-18 09:58:37 +00:00
wiz
579796a3e5 Recursive PKGREVISION bump for jpeg update to 8. 2010-01-17 12:02:03 +00:00
sno
7b4e351c52 Updating security/p5-Crypt-Rijndael from 1.07nb1 to 1.08
pkgsrc changes:
  - Adjusting license definition

Upstream changes:
1.08 - Wed Dec  9 18:20:22 2009
	* Promoting development release to full release.
	* This release mainly clarifies the licensing.

1.07_02 - Tue Nov  4 02:21:27 2008
	* RT #40511: Give a better warning when you try to use tainted
	data as an initialization vector. If anyone wants to use
	tainted data, they can patch the code to accept it.

1.07_01 - Tue Oct 14 08:59:58 2008
	* Clarify that these files are under the Lesser GNU Public License
	(also known as the Library GNU Public License).
2010-01-16 22:28:59 +00:00
heinz
f6eb5e6f2a Set or updated LICENSE 2010-01-16 19:27:17 +00:00
wiz
662a258e1b Remove workaround for compiler bug in gcc2 on sparc64. 2010-01-16 17:57:36 +00:00
tron
3cf808624e Fix build under Solaris. 2010-01-16 11:23:03 +00:00
agc
ef466379c3 Update pam_ssh_agent_auth from 0.9.1 to 0.9.2
Changes since previous version:

+ move from GPLv3 to modified-bsd license, with huge thanks to Jamie Beverly
2010-01-15 22:23:48 +00:00
drochner
fe61bbf7dd update to 2.0.14
changes:
* The default for --include-cert is now to include all certificates
  in the chain except for the root certificate.
* Numerical values may now be used as an alternative to the
  debug-level keywords.
* The GPGSM --audit-log feature is now more complete.
* GPG now supports DNS lookups for SRV, PKA and CERT on W32.
* New GPGSM option --ignore-cert-extension.
* New and changed passphrases are now created with an iteration count
  requiring about 100ms of CPU work.
2010-01-15 20:15:07 +00:00
drochner
c4e7a43eec don't depend on gnupg directly, gpgme/bl3 will do this for us, and it
will deal with gnupg1/gnupg2 correctly
bump PKGREVISION
2010-01-15 20:11:34 +00:00
taca
1cb789fb37 Update openssl package to 0.9.8l, fixing security problem.
Approved by agc@.


Changes between 0.9.8k and 0.9.8l  [5 Nov 2009]

 *) Disable renegotiation completely - this fixes a severe security
    problem (CVE-2009-3555) at the cost of breaking all
    renegotiation. Renegotiation can be re-enabled by setting
    SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at
    run-time. This is really not recommended unless you know what
    you're doing.
    [Ben Laurie]
2010-01-15 04:55:30 +00:00
schwarz
522df83954 streamlined syntax, using ${SETENV} instead of env. 2010-01-09 14:42:04 +00:00
joerg
967a2464d4 Expose the gpg binary gpgme is build against and use that in security/gpa. 2010-01-04 15:09:44 +00:00
schwarz
de1ea362ef improved CC and CFLAGS support 2010-01-03 14:30:37 +00:00
joerg
de807c0023 Needs pod2man. 2010-01-02 13:58:17 +00:00
he
f1e30ffb41 Moderate the wording slightly.
OK'ed by agc@
2009-12-28 23:18:09 +00:00
abs
fe90ac6faf polkit-explicit-grant-helper and polkit-grant-helper should also
be setgid polkit (apparently). Bump pkgrevision
2009-12-27 00:00:55 +00:00
obache
ee413a6d5a Fixes and improvement for Interix
* Not only interix-3, but also treat all interix release, allow to build on SUA.
* Gave up randomized image base, use 0x5e000000, as in mk/platform/Interix.mk.
  It is workaround of PR 42369.
* Use -D_REENTRANT flags for threads.
* replace -Wl,soname= linker flags with -Wl,h, for Interix
2009-12-25 11:58:06 +00:00
joerg
1d5ac0ccd3 Not MAKE_JOBS_SAFE. 2009-12-21 18:58:40 +00:00
joerg
bab2af9656 Mark as broken: as conflicts with its own dependency 2009-12-21 12:06:17 +00:00
taca
7fb236bb2b Update security/sudo pacakge to 1.7.2p2.
Major changes between sudo 1.7.2p1 and 1.7.2p2:

 * Fixed a a bug where the negation operator in a Cmnd_List
   was not being honored.

 * Sudo no longer produces a parse error when #includedir references
   a directory that contains no valid filenames.

 * The sudo.man.pl and sudoers.man.pl files are now included in
   the distribution for people who wish to regenerate the man pages.

 * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos.

 * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so
   they can be used during authentication.
2009-12-20 07:46:32 +00:00
drochner
ba10990554 put back the (non-default) "idea" option which got lost a while ago 2009-12-18 18:54:24 +00:00
drochner
5214da8496 kill the "idea" option -- gnupg2 uses libgcrypt which used to have
an "idea" option, but that was removed more than a year ago when it
got updated from 1.2 to 1.4
The patch was was used on gnupg2 in the "idea" case was just a four-line
memory initialization fix, there is no point in LICENSE restrictions
due to this, so I've pulled it in as regular patch so that it doesn't
get lost for the case someone fixes idea support in libgcrypt
(which isn't hard).
2009-12-18 17:49:51 +00:00
hasso
90428bca3a Remove removal of the hack which was needed for libtool 1.x.
From Rumko <rumcic at gmail.com> via private mail.
2009-12-18 12:33:25 +00:00
drochner
44f924529f don't install the gpg-zip.1 manpage, avoids CONFLICT with gnupg1,
noticed by OBATA Akio per mail to pkgsrc-users.
This makes most sense to me since gnupg2 doesn't install a gpg-zip
intentionally. Since possible clients of gpg-zip should have a
dependency on gnupg1, we can't take over easily. Once we are sure
that gnupg2 can fully replace gnupg1, we might consider to install
eg symlinks gpg->gpg2 etc and make gnupg1 obsolete, but this needs
careful testing.
2009-12-16 18:52:49 +00:00
wiz
f392c9b9c9 Add checksum for idea patch. 2009-12-16 09:09:06 +00:00
joerg
3fbb207985 Recursive bump for libltdl 2009-12-15 21:54:17 +00:00
drochner
7cf4ef3d0f make s/mime support, which implies use of gnupg2, default,
bump PKGREVISION
2009-12-15 20:17:33 +00:00
drochner
4c181ca7aa update to 2.0.13
changes: many fixes and improvements

reviewed by John R. Shannon

pkgsrc notes:
-since S/MIME support is the biggest difference in functionality over
 gnupg1, enable it per default -- my tests (with the s/mime plugin
 of claws-mail) worked
-left the build against a private libassuan with GNU-pth support
 alone for now, just updated libassuan to 1.0.5. We might build
 pkgsrc/libassuan against pkgsrc/pth at some point, but this needs
 to be checked for side effects. (As this pkg doesn't export a library
 which might propagate the pth dependency, the possibility of
 pthread-pth conflicts should be limited. Other uses of libassuan
 need to be checked.)
2009-12-15 20:10:40 +00:00
drochner
54adc1fe57 update to 0.7.6
changes: misc improvements

reviewed by John R. Shannon
2009-12-15 19:50:47 +00:00
drochner
138a3d5f81 update to 1.0.3
changes:
* New option --url for the LOOKUP command and dirmngr-client.
* The LOOKUP command does now also consults the local cache.  New
  option --cache-only for it and --local for dirmngr-client.
* Port to Windows completed.
* Improved certificate chain construction.
* Support loading of PEM encoded CRLs via HTTP.
* Client based trust anchors are now supported.
* Configured certificates with the suffix ".der" are now also used.
* Libgcrypt 1.4 is now required.

reviewed by John R. Shannon

pkgsrc notes:
I've left the build against a private libassuan with GNU-pth support
alone for now, just updated libassuan to 1.0.5. We might build
pkgsrc/libassuan against pkgsrc/pth at some point, but this needs
to be checked for side effects. (As this pkg doesn't export a library
which might propagate the pth dependency, the possibility of
pthread-pth conflicts should be limited. Other uses of libassuan
need to be checked.)
Beiing here, support DESTDIR.
2009-12-15 19:43:16 +00:00
drochner
dd6bc89388 update to 1.0.7
changes:
-misc fixes and improvements
-Support DSA
-Support SHA-{384,512} based signature generation
reviewed by John R. Shannon
2009-12-15 19:27:36 +00:00
drochner
d79a6a9a02 minor fixes for gnupg2 support:
-don't pull in gnupg2's "gpgconf" if both gnupg1 and gnupg2 are installed
 but we are building against gnupg1, this caused a build failure
-fix a selftest to work with gnupg2
2009-12-15 19:15:38 +00:00
drochner
0e9d3d2412 remove obsolete "hal" dependency, ride on recent update 2009-12-15 14:52:03 +00:00
wiz
7e7a194e1c Update to 2.28.2:
Changes in version 2.28.2 are:
 * Add license to reference documentation.
 * Sent output of g_printerr to syslog.
 * No error when can't unlock login keyring.
 * Fix assertion when comparing attributes.
 * Fix freeing of unallocated memory in test.
 * Don't barf on certificates with unsupported algorithm.
 * Fix some memory leaks.
2009-12-15 14:07:22 +00:00
wiz
0cd3e9c94f Update to 0.61, set LICENSE to public-domain (see below).
[Changes for 0.61]

* Added "=encoding utf8" to POD to fix author name display.
  No functional changes.

[Changes for 0.60]

* LICENSING CHANGE: This compilation and all individual files in it
  are now under the nullary CC0 1.0 Universal terms:

  To the extent possible under law, 唐鳳 has waived all copyright and
  related or neighboring rights to Module-Signature.

* Updated Module::Install to 0.91, prompted by Florian Ragwitz.
2009-12-15 13:28:13 +00:00
wiz
79b8380d57 Update to 0.42, set LICENSE (still depend on gpg1 for now).
0.42 Wed Sep 30 23:20:58 JST 2009

	* Support for GPG2

0.41_01 Fri Sep 25 02:56:33 JST 2009

	* Beginnings of support for GPG2

0.40_04 Tue Apr 21 19:50:12 JST 2009

    * Use Any::Moose instead of Moose for Mouse celerity (Sartak)

0.40_1 Sat Nov 15 12:35:59 EST 2008
	* [rt.cpan.org #40963] Replace Class::MethodMaker with Moose  (Chris Prather)
2009-12-15 13:18:44 +00:00
wiz
bf16cd60c6 Update to 1.4.5:
Noteworthy changes in version 1.4.5 (2009-12-11)
------------------------------------------------

 * Fixed minor memory leak in DSA key generation.

 * No more switching to FIPS mode if /proc/version is not readable.

 * Fixed a sigill during Padlock detection on old CPUs.

 * Fixed a hang on some W2000 machines.

 * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3;
   SHA-256 went up by 25%.
2009-12-15 10:40:11 +00:00
agc
a08122742d Update netpgp to version 20091210.
Apart from infrastructure changes, there are the following functional ones:

+ Update to version 1.99.14/20091210

+ provide a new netpgp_match_list_keys(3) function to perform a
regular-expression based search of all the keys in the keyring.  If no
pattern is specified to match, then all keys are returned.

+ provide a new netpgp_set_homedir(3) function, and use it to set the
home directory from the library, rather than individually in all the
programs which use the library

+ provide a new netpgp_incvar(3) function which will add a constant
increment (which may be negative) to the value of an internal
variable.  This is primarily used for the verbosity level within the
library, and is again a movement of the function into the library from
the individual programs which use the library

+ move to the specification of an ssh key file by internal variable,
rather than the directory holding an ssh key file

+ autoconf infrastructure changes

+ take a hammer to the _GNU_SOURCE definitions problems

+ don't rely on strnlen(3) being present everywhere

+ add rudimentary support for ssh keys

+ add a netpgp library function - netpgp_get_key(3) - to print a
specific key

+ add functionality to call this function in netpgpkeys(1)

+ add test for netpgp_get_key

+ add a verbose switch to the tst script

+ add netpgp functions to expose the memory signing and verification
functions - netpgp_sign_memory(3) and netpgp_verify_memory(3)

+ coalesced signing and verification ops file functions
2009-12-15 00:06:15 +00:00
agc
e4ec5d2752 Add and enable seccure 2009-12-14 08:01:06 +00:00
agc
bcc5d43161 Initial import of seccure-0.4 into the Packages Collection.
The seccure toolset implements a selection of asymmetric
	algorithms based on elliptic curve cryptography (ECC).  In
	particular it offers public key encryption / decryption,
	signature generation / verification and key establishment.

	ECC schemes offer a much better key size to security ratio
	than classical systems (RSA, DSA).  Keys are short enough to
	make direct specification of keys on the command line possible
	(sometimes this is more convenient than the management of
	PGP-like key rings).  seccure builds on this feature and
	therefore is the tool of choice whenever lightweight
	asymmetric cryptography -- independent of key servers,
	revocation certificates, the Web of Trust or even
	configuration files -- is required.
2009-12-14 08:00:05 +00:00
wiz
8bd8148899 Remove unused file. 2009-12-13 13:19:43 +00:00
martti
f346219c81 Added support for DESTDIR. 2009-12-13 08:42:26 +00:00
agc
3a2b3053f4 Add and enable pam_ssh_agent_auth 2009-12-11 19:49:50 +00:00
heinz
755473d898 - LICENSE is gnu-gpl-v2
- Added DESTDIR support. All permission settings were kept as before.
- TEMPDIR is now changeable in the Makefile (see patch-ab).
2009-12-11 19:48:21 +00:00
agc
a26891ad80 Initial import of pam_ssh_agent_auth version 0.9.1 into the packages
collection - kudos to Jan Schaumann for pointing it out.

	PAM module which permits authentication for arbitrary services
	via ssh-agent.  Written with sudo in mind, but like any auth
	PAM module, can be used for for many purposes.
2009-12-11 19:48:12 +00:00
abs
31552f1d1f +PKG_DESTDIR_SUPPORT= user-destdir 2009-12-10 23:40:00 +00:00
abs
f32f73b59e PKG_DESTDIR_SUPPORT=user-destdir 2009-12-10 23:30:53 +00:00
obache
b0e1602754 * add --enable-install=${BINOWN} to CONFIGURE_ARGS for user-destdir support
and "root" user-less platforms.
* replace one bash script shbang (for safe side, may bone shell is sufficient).
* fix PLIST for PR 40993.
  add missing entries and back plist vars replaced for Darwin-apple excessively.

Bump PKGREVISION.
2009-12-09 06:26:38 +00:00
obache
d3f6a8a8b5 * user-destdir ready
* should not to set SUBST_CLASSES, add instead to avoid overwrite.
* need to runtime dependency on gettext command, Bump PKGREVISION.
2009-12-09 05:52:30 +00:00
obache
006d8ca4f0 * user-destdir ready
* no need to hard build depend on bison in pkgsrc, USE_TOOLS+=bison instead.
2009-12-09 05:28:13 +00:00
obache
65532c13d9 Should not add to USE_LANGUAGES, set instead.
Should not set to USE_TOOLS, add instead.
2009-12-09 05:22:01 +00:00
obache
4cb6959aca Avoid to conflict with stdout/stderr in stdio.h. 2009-12-09 05:19:36 +00:00
obache
bf896a13cd user-destdir ready. 2009-12-09 05:18:43 +00:00
taca
5ea3e03910 Use DIST_SUBDIR since distfiles changed.
No other functional change at all.
2009-12-08 14:39:14 +00:00
joerg
9cff7002d3 Fix destdir installation. 2009-12-03 18:44:54 +00:00
joerg
0e603164cb Fix @PTHREAD_LIB@ expansion. Bump revision. 2009-12-03 15:22:39 +00:00
fhajny
f7df177959 The gem file must have changed recently, fixing distinfo 2009-12-03 08:20:02 +00:00
fhajny
48614116f0 Added ruby-net-scp and ruby-net-ssh-gateway 2009-12-02 14:36:08 +00:00
fhajny
162fbd2edd Import ruby18-net-ssh-gateway-1.0.1 as security/ruby-net-ssh-gateway.
Net::SSH::Gateway provides a simple way to connect to servers
behind a firewall or NAT.
2009-12-02 14:35:12 +00:00