Commit graph

13 commits

Author SHA1 Message Date
jlam
d2601f50d9 Force using the BSD utmp interface on NetBSD until the configure
scripts can be taught how to properly detect our utmpx implementation.
This should fix the build on NetBSD-2.0 and -current.
2004-09-15 15:29:49 +00:00
jlam
06f6c2e864 Apply the patches for security/mit-krb5 that fix MITKRB5-SA-2004-00{2,3}.
Bump the PKGREVISION for this security update.
2004-09-07 01:47:28 +00:00
jlam
9d5426ff76 Change the way that legacy USE_* and FOO_USE_* options are converted
into the bsd.options.mk framework.  Instead of appending to
${PKG_OPTIONS_VAR}, it appends to PKG_DEFAULT_OPTIONS.  This causes
the default options to be the union of PKG_DEFAULT_OPTIONS and any
old USE_* and FOO_USE_* settings.

This fixes PR pkg/26590.
2004-08-22 19:32:51 +00:00
jlam
b460ce1ab5 Convert to use bsd.options.mk. The relevant options variable to set
for each package can be determined by invoking:

	make show-var VARNAME=PKG_OPTIONS_VAR

The old options are still supported unless the variable named in
PKG_OPTIONS_VAR is set within make(1) (usually via /etc/mk.conf).
2004-07-30 21:05:41 +00:00
jlam
48fff8b8ad Bump PKGREVISION for last change. 2004-07-24 13:56:09 +00:00
jlam
dec6dfc605 Honor VARBASE. 2004-07-24 13:55:30 +00:00
jlam
c7e6c1022f Update to security/mit-krb5 to 1.3.4. Major changes from version 1.3.3
include a fix for security advisory [MITKRB-SA-2004-001]:

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-001-an_to_ln.txt

Please read the security advisory to see if you are affected and should
update your MIT krb5 installation.
2004-06-24 14:43:29 +00:00
kristerw
0f9cb70a0b Correct PLIST when not renaming the applications.
Bump PKGREVISION.
2004-05-10 01:20:39 +00:00
kristerw
f19c8f155e Move WRKSRC from the DISTNAME section to silence a pkglint FATAL error. 2004-05-10 01:18:34 +00:00
jlam
f532365632 Updated security/mit-krb5 to 1.3.3. Changes from version 1.3.2 include:
[2284] Fixed accept_sec_context to use a replay cache in the
       GSS_C_NO_CREDENTIAL case.
[2453] The AES string-to-key function no longer returns a pointer to
       stack memory when given a password longer than 64 characters.
[2277] In sendto_kdc, a socket leak on connection failure was fixed.
[2384] A memory leak in the TCP handling code in the KDC has been fixed.
2004-04-26 06:58:28 +00:00
reed
064205289a Use ${PREFIX}/${INFO_DIR} instead of ${PREFIX}/info for
info documentation. (Okay'd by jlam.)
2004-04-08 17:22:59 +00:00
jlam
4db372ebc2 Updated security/mit-krb5 to 1.3.2. Changes from version 1.3.1 include:
* Support for AES in GSSAPI has been implemented.  This corresponds to the
  in-progress work in the IETF (CFX).

* To avoid compatibility problems, unrecognized TGS options will now be
  ignored.

* 128-bit AES has been added to the default enctypes.

* AES cryptosystem now chains IVs.  This WILL break backwards compatibility
  for the kcmd applications, if they are using AES session keys.

* Assorted minor bug fixes and plugged memory leaks.
2004-03-30 20:17:41 +00:00
jlam
80b2de66dd Import MIT Kerberos 5 as security/mit-krb5. This package is partly based
on the wip/mit-krb5 package by Jeremy Reed, but heavily modified by me to
libtoolize the build.

Kerberos V5 is an authentication system developed at MIT. It is a network
authentication protocol designed to provide strong authentication for
client/server applications by using secret-key cryptography. (Kerberos
5 is discussed in RFC 1510.)

This package provides Kerberos and GSSAPI (Generic Security Services
Application Programming Interface) development headers and libraries.
It also includes Kerberos ticket and principal tools, and Kerberized
r-services, telnet and ftp services.
2004-03-30 18:07:17 +00:00