Commit graph

5296 commits

Author SHA1 Message Date
wiz
b16f6d6d2e Update to 1.4.5:
Noteworthy changes in version 1.4.5 (2009-12-11)
------------------------------------------------

 * Fixed minor memory leak in DSA key generation.

 * No more switching to FIPS mode if /proc/version is not readable.

 * Fixed a sigill during Padlock detection on old CPUs.

 * Fixed a hang on some W2000 machines.

 * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3;
   SHA-256 went up by 25%.
2009-12-15 10:40:11 +00:00
agc
cae0b0c1a6 Update netpgp to version 20091210.
Apart from infrastructure changes, there are the following functional ones:

+ Update to version 1.99.14/20091210

+ provide a new netpgp_match_list_keys(3) function to perform a
regular-expression based search of all the keys in the keyring.  If no
pattern is specified to match, then all keys are returned.

+ provide a new netpgp_set_homedir(3) function, and use it to set the
home directory from the library, rather than individually in all the
programs which use the library

+ provide a new netpgp_incvar(3) function which will add a constant
increment (which may be negative) to the value of an internal
variable.  This is primarily used for the verbosity level within the
library, and is again a movement of the function into the library from
the individual programs which use the library

+ move to the specification of an ssh key file by internal variable,
rather than the directory holding an ssh key file

+ autoconf infrastructure changes

+ take a hammer to the _GNU_SOURCE definitions problems

+ don't rely on strnlen(3) being present everywhere

+ add rudimentary support for ssh keys

+ add a netpgp library function - netpgp_get_key(3) - to print a
specific key

+ add functionality to call this function in netpgpkeys(1)

+ add test for netpgp_get_key

+ add a verbose switch to the tst script

+ add netpgp functions to expose the memory signing and verification
functions - netpgp_sign_memory(3) and netpgp_verify_memory(3)

+ coalesced signing and verification ops file functions
2009-12-15 00:06:15 +00:00
agc
aae199a91b Add and enable seccure 2009-12-14 08:01:06 +00:00
agc
4becb70c17 Initial import of seccure-0.4 into the Packages Collection.
The seccure toolset implements a selection of asymmetric
	algorithms based on elliptic curve cryptography (ECC).  In
	particular it offers public key encryption / decryption,
	signature generation / verification and key establishment.

	ECC schemes offer a much better key size to security ratio
	than classical systems (RSA, DSA).  Keys are short enough to
	make direct specification of keys on the command line possible
	(sometimes this is more convenient than the management of
	PGP-like key rings).  seccure builds on this feature and
	therefore is the tool of choice whenever lightweight
	asymmetric cryptography -- independent of key servers,
	revocation certificates, the Web of Trust or even
	configuration files -- is required.
2009-12-14 08:00:05 +00:00
wiz
0d661b71e9 Remove unused file. 2009-12-13 13:19:43 +00:00
martti
2a6f077480 Added support for DESTDIR. 2009-12-13 08:42:26 +00:00
agc
398c8e2d16 Add and enable pam_ssh_agent_auth 2009-12-11 19:49:50 +00:00
heinz
1cfeabbb1e - LICENSE is gnu-gpl-v2
- Added DESTDIR support. All permission settings were kept as before.
- TEMPDIR is now changeable in the Makefile (see patch-ab).
2009-12-11 19:48:21 +00:00
agc
919a5125b7 Initial import of pam_ssh_agent_auth version 0.9.1 into the packages
collection - kudos to Jan Schaumann for pointing it out.

	PAM module which permits authentication for arbitrary services
	via ssh-agent.  Written with sudo in mind, but like any auth
	PAM module, can be used for for many purposes.
2009-12-11 19:48:12 +00:00
abs
9497270e02 +PKG_DESTDIR_SUPPORT= user-destdir 2009-12-10 23:40:00 +00:00
abs
adc35c977d PKG_DESTDIR_SUPPORT=user-destdir 2009-12-10 23:30:53 +00:00
obache
8672aaf4f8 * add --enable-install=${BINOWN} to CONFIGURE_ARGS for user-destdir support
and "root" user-less platforms.
* replace one bash script shbang (for safe side, may bone shell is sufficient).
* fix PLIST for PR 40993.
  add missing entries and back plist vars replaced for Darwin-apple excessively.

Bump PKGREVISION.
2009-12-09 06:26:38 +00:00
obache
c06a2048a1 * user-destdir ready
* should not to set SUBST_CLASSES, add instead to avoid overwrite.
* need to runtime dependency on gettext command, Bump PKGREVISION.
2009-12-09 05:52:30 +00:00
obache
e901cab189 * user-destdir ready
* no need to hard build depend on bison in pkgsrc, USE_TOOLS+=bison instead.
2009-12-09 05:28:13 +00:00
obache
a597abdc19 Should not add to USE_LANGUAGES, set instead.
Should not set to USE_TOOLS, add instead.
2009-12-09 05:22:01 +00:00
obache
ccb72bf4ba Avoid to conflict with stdout/stderr in stdio.h. 2009-12-09 05:19:36 +00:00
obache
39773a0dec user-destdir ready. 2009-12-09 05:18:43 +00:00
taca
39d6605724 Use DIST_SUBDIR since distfiles changed.
No other functional change at all.
2009-12-08 14:39:14 +00:00
joerg
66203fbc59 Fix destdir installation. 2009-12-03 18:44:54 +00:00
joerg
43ed8b2fac Fix @PTHREAD_LIB@ expansion. Bump revision. 2009-12-03 15:22:39 +00:00
fhajny
61327c06e5 The gem file must have changed recently, fixing distinfo 2009-12-03 08:20:02 +00:00
fhajny
98c7c8b9bc Added ruby-net-scp and ruby-net-ssh-gateway 2009-12-02 14:36:08 +00:00
fhajny
ccce7b628b Import ruby18-net-ssh-gateway-1.0.1 as security/ruby-net-ssh-gateway.
Net::SSH::Gateway provides a simple way to connect to servers
behind a firewall or NAT.
2009-12-02 14:35:12 +00:00
fhajny
db45b4354d Import ruby18-net-scp-1.0.2 as security/ruby-net-scp.
Library built on top of Net::SSH that implements the SCP "secure copy"
protocol for transfering files.
2009-12-02 14:33:54 +00:00
fhajny
1441afbe22 Updated ruby-net-sftp to 2.0.4.
New major version, too many changes, see home page.
2009-12-02 14:30:43 +00:00
fhajny
6983562529 Updated ruby-net-ssh to 2.0.16.
New major version, too many changes, see home page.
2009-12-02 14:26:28 +00:00
manu
3a61122d8a Pullup single logout related bugfixes from lasso -current.
On SP initiated logout, the SP x509 certificate was included in the
HTTP redirect URL. First this was an SAML standard violation, and second
it inflated the URL beyond 2038 bytes, which is the maximum length for
IE7 and prior. As a result, SP initated single logout was broken with IE7
and prior versions.
2009-12-01 08:49:46 +00:00
manu
231692b82e Bugfix: NetBSD does not need -ldl n LIBS for dlopen()
This did not prevented xmlsec1 to build but caused trouble in packages
depending on this one
2009-12-01 08:43:52 +00:00
joerg
35c74fc509 Just force calling the compiler as cc to help libtool 2.2. 2009-11-27 13:34:25 +00:00
joerg
531ed31093 Craete libgnutls-extra-config in .buildlink/bin, not the WRAPPER_DIR. 2009-11-26 14:18:26 +00:00
joerg
8a5f9b74e0 Run libtoolize. No need to touch libtool. 2009-11-25 21:43:55 +00:00
joerg
f035782a69 Fix permissions of include files. Fix linkage for systems with openssh
in base. Add destdir support.
2009-11-25 21:11:33 +00:00
joerg
05faea90b9 Repeat after me, do not use bar/.libs/foo.la, use bar/foo.la. 2009-11-25 20:56:03 +00:00
markd
765ba6bbeb Needs qt4-tools to build. (Thanks wiz) 2009-11-25 09:47:10 +00:00
markd
d07c27b212 Add polkit-qt 2009-11-21 20:05:40 +00:00
markd
d0593ee8c3 Import polkit-qt version 0.9.2
Qt Wrapper around PolicyKit
2009-11-21 20:04:06 +00:00
drochner
4f4f3854dc update to 1.2.2
changes:
-Support for the "aes128-ctr", "aes192-ctr", "aes256-ctr" ciphers
-Support for the "arcfour128" cipher
-Fix crash when server sends an invalid SSH_MSG_IGNORE message
2009-11-20 16:45:30 +00:00
drochner
b18fd3a663 update to 1.1.4
The changes since 1.1.3 are mostly limited to minor code and
manual pages markup cleanups (such as for proper formatting on OpenBSD).
2009-11-18 16:59:30 +00:00
wiz
89956e6eae Update to 2.28.1:
seahorse-plugins 2.28.1
-----------------------

    * Add the get-info command to seahorse-agent [Peter Bloomfield]

seahorse-plugins 2.28.0
-----------------------

    * Fix configure script portability [Thomas Klausner]
    * Fix crash in seahorse-preferences [Pablo Castellano]
    * Fix single glib include [Kjartan Maraas]

    Translations
    * bn.po [Jamil Ahmed]
    * br.po [Denis Arnaud]
    * ca@valencia.po [Carles Ferrando]
    * cs.po [Marek Černocký]
    * da.po [Ask H. Larsen]
    * es.po [Jorge Gonzalez]
    * hi.po [Rajesh Ranjan]
    * ko.po [Changwoo Ryu]
    * mai.po [Rajesh Ranjan]
    * ml.po [Ani]
    * nb.po [Kjartan Maraas]
    * pt_BE.po [Og B. Maciel]
    * sr@latin.po [Branko Kokanović]
    * sr.po [Branko Kokanović]
    * te.po [krishnababu k]
    * or.po [Manoj Kumar Giri]
    * uk.po [Maxim V. Dziumanenko]
    * el.po [Kostas Papadimas, Jennie Petoumenou]

seahorse-plugins 2.27.1
-----------------------

    * Clean up socket directory [Adam Schreiber]

    Translations
    * or.po [Manoj Kumar Giri]
2009-11-17 16:05:54 +00:00
tron
45edd37f8a Avoid deprecation warnings under Python:
1.) Use "hashlib" instead of "sha" module if possible.
2.) Use "subprocess" module instead of os.popen3().
Both changes tested with Python 2.4 and 2.6.

Pkgsrc-related improvements:
1.) Support "user-destdir" installation (no changes required).
2.) Set license to "gnu-gpl-v2".
3.) Reduce patches by recording the fact that the manual page gets
    compressed automatically (which "pkgsrc" handles fine) instead
    of trying to prevent that.
2009-11-17 12:23:01 +00:00
tron
bae0a8c45d This package works fine with Python 2.6, remove "PYTHON_VERSIONS_ACCEPTED". 2009-11-17 09:01:43 +00:00
dsainty
5faa6504d0 Add p5-Crypt-ECB 2009-11-17 04:30:29 +00:00
dsainty
88723ec8d7 Import p5-Crypt-ECB-1.45:
This is Crypt::ECB, a Perl-only implementation of the ECB mode.  In
combination with a block cipher such as DES, IDEA or Blowfish, you can encrypt
and decrypt messages of arbitrarily long length.  Though for security reasons
other modes than ECB such as CBC should be preferred.  See textbooks on
cryptography if you want to know why.

In addition to this module you will need to install one or more of the
Crypt::DES, Crypt::IDEA, or Crypt::Blowfish modules.
2009-11-17 04:27:59 +00:00
drochner
a4fd848ae9 update to 1.2.1
many fixes and improvements, notably speed
2009-11-15 20:07:45 +00:00
drochner
62e047b041 update to 1.1.8
changes:
-bugfixes
-API extensions
-documentation improvement
-The encoding of gpgme_data_t objects can affect the output encoding
 of export, sign and encrypt operations now
-Using GPGME_KEYLIST_MODE_LOCAL combined with
 GPGME_KEYLIST_MODE_EXTERN is now supported
2009-11-15 18:41:55 +00:00
hasso
bb1e99726c Update to 0.9.0-beta8 (by Rumko via private mail).
0.9.0-beta8:
- Include spamhaus_drop.dat in the source distribution. Fix installation
  issue (closes #364).

0.9.0-beta7:
- Initial SpamhausDrop plugin implementation, by
  Wes Young <wes@barely3am.com> (closes #363)
- Do not discard --root parameters if prefix is absolute.
- Python 2.4 backward compatibility fixes.
- Handle plugin loading error gracefully.
- Improve WormPlugin accuracy, and make it carry a reference to the
  initial event. The plugin used to alert when seeing an alert to a
  given target, and this same alert going back to the source. This can
  happen in a number of case (example: Netbios alert triggered by Snort)
  As of now, the plugin will wait for the events to be repeated against
  at least 5 differents hosts.
- Dshield CorrelationAlert now handle multiples events. Previously, we
  used to generate a single Dshield CorrelationAlert for each events
  where the source address would match the Dshield database. The plugin
  now generate CorrelationAlert for multiples events received from the
  same source.
2009-11-07 18:30:28 +00:00
tez
0f8d1e1fbb commit patch for PR#36120 2009-11-05 19:16:47 +00:00
adam
f0d5e8c16c Allow building on 64-bit Darwin 2009-11-03 07:28:17 +00:00
wiz
f9123c3045 Simplify awk usage to make it work with nawk, from Matthias Pfaller in
PR 42238.

While here, update to latest certificates from mozilla.
2009-11-03 02:43:55 +00:00
wiz
7bb662a6ae Update to 2.8.5:
* Version 2.8.5 (released 2009-11-02)

** libgnutls: In server side when resuming a session do not overwrite the
** initial session data with the resumed session data.

** libgnutls: Fix PKCS#12 encoding.
The error you would get was "The OID is not supported.".  Problem
introduced for the v2.8.x branch in 2.7.6.

** guile: Compatibility with guile 2.x.
By Ludovic Courtes <ludovic.courtes@laas.fr>.

** tests: Fix expired cert in chainverify self-test.

** tests: Fix time bomb in chainverify self-test.
Reported by Andreas Metzler <ametzler@downhill.at.eu.org> in
<http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3925>.

** API and ABI modifications:
No changes since last version.
2009-11-03 00:15:41 +00:00