Commit graph

5961 commits

Author SHA1 Message Date
wiz
559b3af444 Update to 2.4:
NEWS for the 2.4 release

	This is a bugfix release only. It turned out ripemd160 in the
	2.3 release was broken on all big-endian systems, due to a
	missing include of config.h. nettle-2.4 fixes this.

	The library is intended to be binary compatible with
	nettle-2.2 and nettle-2.3. The shared library names are
	libnettle.so.4.3 and libhogweed.so.2.1, with sonames still
	libnettle.so.4 and libhogweed.so.2.

NEWS for the 2.3 release

	* Support for the ripemd-160 hash function.

	* Generates and installs nettle.pc and hogweed.pc files, for
          use with pkg-config. Feedback appreciated. For projects
          using autoconf, the traditional non-pkg-config ways of
          detecting libraries, and setting LIBS and LDFLAGS, is still
          recommended.

	* Fixed a bug which made the testsuite fail in the GCM test on
	  certain platforms. Should not affect any documented features
	  of the library.

	* Reorganization of the code for the various Merkle-Damg
	  hash functions. Some fields in the context structs for md4,
	  md5 and sha1 have been renamed, for consistency.
	  Applications should not peek inside these structs, and the
	  ABI is unchanged.

	* In the manual, fixed mis-placed const in certain function
          prototypes.

	The library is intended to be binary compatible with
	nettle-2.2. The shared library names are libnettle.so.4.2 and
	libhogweed.so.2.1, with sonames still libnettle.so.4 and
	libhogweed.so.2.
2011-09-08 20:22:13 +00:00
drochner
0b08870926 mozilla has switched to a scheme of explicitly distrusting certificates
in its stable branch (ie firefox-6.0.2) too,
so deal with this in the mozilla-rootcerts script (this is not great -
it depends on syntactic details of the file where it should better
use checksums, but the perl script which is distributed with "curl"
works the same way),
and switch back to the certificate list in CVS HEAD
2011-09-08 19:46:01 +00:00
joerg
a948e3601a Missing commit for new patches 2011-09-08 13:55:06 +00:00
joerg
95bfd3f6f4 Do not use nested functions. Add missing prototypes. Bump revision. 2011-09-08 00:17:03 +00:00
joerg
8901c5a3f6 Strictler template usage. Bump revision. 2011-09-08 00:15:50 +00:00
cheusov
4c437dc2ba Pass --tag=CC to libtool. This fixes build failure 2011-09-05 20:23:52 +00:00
obache
4d8040a337 simplify MASTER_SITES. 2011-09-04 06:55:09 +00:00
hiramatsu
f1567a15c3 Update p5-IO-Socket-SSL to 1.44.
Changes from 1.35:

v1.44 2011.05.27
- fix invalid call to inet_pton in verify_hostname_of_cert when
  identity should be verified as ipv6 address, because it contains
  colon.
v1.43_1 2011.05.12
- try to make t/nonblock.t more stable, especially on Mac OS X
v1.43 2011.05.11
- fix t/nonblock.t
- stability improvements t/inet6.t
v1.42 2011.05.10
- add SSL_create_ctx_callback to have a way to adjust context on
  creation. https://rt.cpan.org/Ticket/Display.html?id=67799
- describe problem of fake memory leak because of big session cache
  and how to fix it, see https://rt.cpan.org/Ticket/Display.html?id=68073
v1.41 2011.05.09
- fix issue in stop_SSL where it did not issue a shutdown of the
  SSL connection if it first received the shutdown from the other
  side. Thanks to fencingleo[AT]gmail[DOT]com for reporting
- try to make t/nonblock.t more reliable, at least report the real
  cause of ssl connection errors
v1.40 2011.05.02
- integrated patch from GAAS to get IDN support from URI.
  https://rt.cpan.org/Ticket/Display.html?id=67676
v1.39_1 2011.05.02
- fix in exampel/async_https_server.
  Thanks to DetlefPilzecker[AT]web[DOT]de for reporting
v1.39 2011.03.03
- fixed documentation of http verification: wildcards in cn is allowed
v1.38_1 2011.01.24
- close should undef _SSL_fileno, because the fileno is no longer
  valid (SSL connection and socket are closed)
v1.38 2011.01.18
- fixed wildcards_in_cn setting for http (wrongly set in 1.34 to 1
  instead of anywhere). Thanks to dagolden[AT]cpan[DOT]org for
  reporting
  https://rt.cpan.org/Ticket/Display.html?id=64864
v1.37 2010.12.09
- don't complain about invalid certificate locations if user explicitly
  set SSL_ca_path and SSL_ca_file to undef. Assume that user knows what
  he is doing and will work around the problems by itself.
  http://rt.cpan.org/Ticket/Display.html?id=63741
v1.36 2010.12.08
- update documentation for SSL_verify_callback based on
  https://rt.cpan.org/Ticket/Display.html?id=63743
  https://rt.cpan.org/Ticket/Display.html?id=63740
2011-09-04 05:03:53 +00:00
hiramatsu
c4f99f053c Add p5-Mozilla-CA. 2011-09-04 04:41:01 +00:00
hiramatsu
0b251a7a83 Import perl module Mozilla::CA as security/p5-Mozilla-CA.
Mozilla::CA provides a copy of Mozilla's bundle of Certificate
Authority certificates in a form that can be consumed by modules and
libraries based on OpenSSL.
2011-09-04 04:39:42 +00:00
shattered
85acbea9cf PR/38394 -- disable KAFS detection for mit-krb5 2011-09-01 19:24:01 +00:00
drochner
3a2c5b4628 update to the version distributed with firefox-6.0.1, in response
to the recent discovery of false certificates from diginotar
(Recent versions from the source repository don't work, see the
comment in Makefile.)
2011-08-31 11:42:43 +00:00
jym
af83d2e8b8 Remove stunnel/ component from SYSCONFDIR path. /stunnel/ is already
set in PKG_SYSCONFDIR variable, so it is passed down to Makefile.
Configuration final path ends up being etc/stunnel/stunnel/stunnel.conf,
which is wrong.
2011-08-31 08:26:15 +00:00
tron
3d9e5ffecc Fix linking error under Mac OS X caused by duplicate definition of
a bunch of global variables.
2011-08-25 20:17:25 +00:00
taca
fd836b8de6 Update ruby-net-ssh to 2.2.1.
=== 2.2.1 / 24 Aug 2011

* Do not prompt any passphrases before trying all identities from
  agent. [musybite]
  (see: http://net-ssh.lighthouseapp.com/projects/36253-net-ssh/tickets/30)
2011-08-25 15:32:05 +00:00
taca
5af5a59075 Update ruby-bcrypt to 3.0.0.
3.0.0 Aug 24, 2011
  - Bcrypt C implementation replaced with a public domain implementation.
  - License changed to MIT
2011-08-25 15:31:01 +00:00
tron
2df29faf96 Reset maintainer. 2011-08-25 07:20:44 +00:00
tron
61abe9f5e8 Update "stunnel" package to version 4.42. Changes since version 4.39:
- New features
  - New verify level 0 to request and ignore peer certificate.  This
    feature is useful with the new Windows GUI menu to save cached peer
    certificate chains, as SSL client certificates are not sent by default.
  - Manual page has been updated.
  - Removed support for changing Windows Service name with "service" option.
  - Hardcoded 2048-bit DH parameters are used as a fallback if DH parameters
    are not provided in stunnel.pem.
  - Default "ciphers" value updated to prefer ECDH:
    "ALL:!SSLv2:!aNULL:!EXP:!LOW:-MEDIUM:RC4:+HIGH".
  - Default ECDH curve updated to "prime256v1".
  - Removed support for temporary RSA keys (used in obsolete export ciphers).
- Bugfixes
  - The -quiet commandline option was applied to *all* message boxes.
  - Silent install (/S option) no longer attempts to create stunnel.pem.
2011-08-24 17:56:50 +00:00
obache
c5d8a2a356 Recursive bump from gdbm shlib bump. 2011-08-23 13:06:45 +00:00
wiz
cd2533457e Update to 2.12.9:
* Version 2.12.9 (released 2011-08-21)

** libgnutls-extra: Replaced enumeration with unsigned
int, in openssl.h to make it identical to the 3.0.0 version.
This shouldn't introduce binary incompatibility.

** libgnutls: When asking for a PIN multiple times, the
flags in the callback were not being updated to reflect
for PIN low count or final try.

** API and ABI modifications:
GNUTLS_PKCS11_PIN_WRONG: New flag for PIN callback
2011-08-22 15:14:58 +00:00
wiz
50cacd0bcf Update to 2.2. Update LICENSE (see below).
NEWS for the 2.2 release

	Licensing change:

	* Relicensed as LGPL v2.1 or later (user's option).

	* Replaced blowfish and serpent implementation. New code is
          based on the LGPLed code in libgcrypt.

	New features:

	* Support for Galois/Counter Mode (GCM).

	* New interface for enumerating (most) available algorithms,
	  contributed by Daniel Kahn Gillmor.

	* New tool nettle-hash. Can generate hash digests using any
	  supported hash function, with output compatible with md5sum
	  and friends from GNU coreutils. Checking (like md5sum -c)
	  not yet implemented.

	Bug fixes:

	* The old serpent code had a byte order bug (introduced by
	  yours truly about ten years ago). New serpent implementation
	  does not interoperate with earlier versions of nettle.

	* Fixed ABI-dependent libdir default for Linux-based systems
	  which do not follow the Linux File Hierarchy Standard, e.g.,
	  Debian GNU/Linux.

	Optimizations:

	* x86_64 implemention of serpent.

	* x86_64 implemention of camellia.

	* Optimized memxor using word rather than byte operations.
          Both generic C and x86_64 assembler.

	* Eliminated a memcpy for in-place CBC decrypt.

	Miscellaneous:

	* In command line tools, no longer support -? for requesting
          help, since using it without shell quoting is a dangerous
          habit. Use long option --help instead.

	The shared library names are libnettle.so.4.1 and
	libhogweed.so.2.1, with sonames libnettle.so.4 and
	libhogweed.so.2.
2011-08-22 15:09:21 +00:00
obache
4ef1a6458d * fixes DEPENDS setting (missing `+').
* use perl5/module.mk and its stuff for perl module build
* using packlist, so PLIST entries for perl modules are not required.
* PKG_SYSCONFSUBDIR is handled automatically, no need to be in PLIST.
* fix substitute handling with USE_DESTDIR=yes.

Bump PKGREVISION.
2011-08-19 12:16:33 +00:00
taca
2055f47af4 Update sudo pacakge to 1.7.7. It is maintenance release.
What's new in Sudo 1.7.7

 * I/O logging is now supported for commands run in background mode
   (using sudo's -b flag).

 * Group ownership of the sudoers file is now only enforced when
   the file mode on sudoers allows group readability or writability.

 * Visudo now checks the contents of an alias and warns about cycles
   when the alias is expanded.

 * If the user specifes a group via sudo's -g option that matches
   the target user's group in the password database, it is now
   allowed even if no groups are present in the Runas_Spec.

 * "sudo -i command" now works correctly with the bash version
   2.0 and higher.  Previously, the .bash_profile would not be
   sourced prior to running the command unless bash was built with
   NON_INTERACTIVE_LOGIN_SHELLS defined.

 * Multi-factor authentication is now supported on AIX.

 * Added support for non-RFC 4517 compliant LDAP servers that require
   that seconds be present in a timestamp, such as Tivoli Directory Server.

 * If the group vector is to be preserved, the PATH search for the
   command is now done with the user's original group vector.

 * For LDAP-based sudoers, the "runas_default" sudoOption now works
   properly in a sudoRole that contains a sudoCommand.

 * Spaces in command line arguments for "sudo -s" and "sudo -i" are
    now escaped with a backslash when checking the sudoers file.
2011-08-18 12:45:05 +00:00
taca
98fe0d49fb Update ruby-net-ssh pacakge to 2.2.0.
=== 2.2.0 / 16 Aug 2011

* Add support for forward a local UNIX domain socket to a remote
  TCP socket. [Mark Imbriaco]
2011-08-18 12:39:03 +00:00
taca
eb19e34f91 I forgot to update distinfo about latest patch file addition
(patch-atomicio.c).  Noted by wiz@ via private mail.

Bump PKGREVISION.
2011-08-18 09:22:01 +00:00
wiz
0fe496737b + p5-Digest-Perl-MD5. 2011-08-16 22:30:41 +00:00
wiz
6fd70b410f Initial import of p5-Digest-Perl-MD5-1.8:
Perl implementation of Ron Rivests MD5 Algorithm.
2011-08-16 22:30:06 +00:00
wiz
8b050f7561 Do not unwrap gpgme-config; it broke the script because the unwrapping
stage removed a
	-I/usr/include|-I/include)
line from a case statement.
Bump PKGREVISION.
2011-08-14 20:47:05 +00:00
wiz
8972a5da7a Insists on libassuan2-2.0.2, so make it depend on that version. 2011-08-14 19:47:37 +00:00
obache
9b0c7b655d Revision bump after updating perl5 to 5.14.1. 2011-08-14 14:42:45 +00:00
adam
b874f74c18 Changes 1.3.1:
* Ported to Windows CE.
* Detect GPG versions not supporting ---passwd.
2011-08-11 11:15:00 +00:00
adam
eac8399df5 Changes 2.12.8:
* libgnutls: PKCS-11 back-end was replaced by p11-kit
* libgnutls: gcrypt: replaced occurences of gcry_sexp_nth_mpi (..., 0)
  with gcry_sexp_nth_mpi (..., GCRYMPI_FMT_USG) to fix errors with 1.5.0.
* libgnutls: Verify that a certificate liste specified using
  gnutls_certificate_set_x509_key*(), is sorted according to TLS specification
* libgnutls: Added GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED flag for
  gnutls_x509_crt_list_import. It checks whether the list to be imported is
  properly sorted.
* libgnutls: writev_emu: stop on the first incomplete write.
* libgnutls: Fix zlib handling in gnutls.pc.
* certtool: bug fixes in certificate request generation.
* API and ABI modifications: GNUTLS_X509_CRT_LIST_FAIL_IF_UNSORTED:
  New element in gnutls_certificate_import_flags
2011-08-11 11:03:35 +00:00
adam
2120ebdb47 Changes 2.0.18:
* Bug fix for newer versions of Libgcrypt.
* Support the SSH confirm flag and show SSH fingerprints in ssh
  related pinentries.
* Improved dirmngr/gpgsm interaction for OCSP.
* Allow generation of card keys up to 4096 bit.
2011-08-11 10:46:10 +00:00
adam
1971eefe3e Changes 2.0.2:
* A new flag may now be used to convey comments via assuan_transact.
* A new flag value may now be used to disable logging.
* The gpgcedev.c driver now provides a log device.
* It is now possible to overwrite socket and connect functions in
  struct assuan_system_hooks.
2011-08-11 10:34:21 +00:00
taca
785f909b45 Add a patch to avoid SSP side effect as NetBSD current.
Bump PKGREVISION.
2011-08-10 15:21:02 +00:00
obache
124499eba4 fix the last change of DEPENDS pattern for p5-Digest-SHA.
PR#45228.
2011-08-10 00:09:35 +00:00
obache
5fa07df301 As noted in Changes 1.03, depend on p5-Digest-SHA instead of p5-Digest-SHA1. 2011-08-09 08:20:36 +00:00
adam
8119396030 Changes 0.02:
* Fixed a bug affecting input strings with an odd number of
  characters. Thanks to Ken T Takusagawa for the report.
* Cleaned up Makefile.PL.
* Removed magic svn keywords.
* Added author tests (xt/) and modified SYNOPSIS for all modules to
  make them pass the compilation test.
2011-08-09 07:31:42 +00:00
adam
5bff705405 Revision bump after updating perl to 5.14.1 2011-08-09 07:29:33 +00:00
adam
76ec9da84b Changes 1.03:
* Depend on Digest::SHA instead of Digest::SHA1
* Document the blocksize argument
2011-08-09 07:28:33 +00:00
adam
c0eb9401b5 Revision bump after updating perl to 5.14.1 2011-08-09 07:23:31 +00:00
adam
8c99b7f3a8 Changes 5.62:
* removed unnecessary loading of MIME::Base64 module

Changes 5.61:
* corrected bug in 'algorithm' method
* fixed -x option in Makefile.PL
  -- not often used since it deliberately excludes all 64-bit SHA transforms
* addressed minor documentation oversights

Changes 5.60:
* added new SHA-512/224 and SHA-512/256 transforms
  -- ref. NIST Draft FIPS 180-4 (February 2011)
* simplified shasum by removing duplicative text
* improved efficiency of Addfile
  -- expensive -T test now occurs only in portable mode

Changes 5.50:
* adopted convention that '-' always means STDIN
  -- actual filename '-' accessed as './-'
  -- accords with behavior of sha1sum/md5sum
* corrected undefined subroutine oversight in shasum
  -- inadvertent migration of _bail() from SHA.pm
2011-08-09 07:22:02 +00:00
adam
fbf136f4f2 Revision bump after updating perl to 5.14.1 2011-08-09 07:18:14 +00:00
joerg
e40df8b335 Deal with c99 inline semantics. 2011-08-02 17:11:00 +00:00
joerg
0d7bb28b0e Fix prototype. 2011-08-02 17:09:21 +00:00
gls
ade8d81612 Adds the symbols _kdc_db_fetch and _kdc_free_ent to global
visibility, so that they can be referenced from kdc/digest-service.
Fixes build on Dragonfly. From Alex Hornung in PR pkg/45195.
2011-07-31 21:21:01 +00:00
pettai
f62a56a836 Changes since 1.6.0:
* [SANTUARIO-268] - TXFMXPathFilter->evaluateExpr crashes on Windows
* [SANTUARIO-270] - DSIGObject::load method crashes for ds:Object without Id att
ribute
* [SANTUARIO-271] - Bug when signing files with big RSA keys
* [SANTUARIO-272] - Memory bug inside XENCCipherImpl::deSerialise
* [SANTUARIO-274] - Function cleanURIEscapes always throws XSECException, when a
ny escape sequence occurs
* [SANTUARIO-275] - Function isHexDigit doesn't recognize invalid escape sequenc
es.
* [SANTUARIO-276] - Percent-encoded multibyte (UTF-8) sequences unrecognized
* [SANTUARIO-280] - RSA-OAEP handler only allows SHA-1 digests
2011-07-28 23:33:31 +00:00
pettai
4e3f4cd21e Update fixes CVE-2011-2516
(See http://shibboleth.internet2.edu/secadv/secadv_20110706.txt for details)
2011-07-28 22:44:36 +00:00
pettai
0015bb84d3 Change MASTER_SITES to the new distribution point 2011-07-27 22:23:43 +00:00
pettai
5eecaa0066 Delete patch that is not needed 2011-07-27 05:33:03 +00:00