Commit graph

5341 commits

Author SHA1 Message Date
heinz
d653ce6a74 Added LICENSE information. 2010-01-24 17:11:17 +00:00
wiz
319e13628d More PKGREVISION bumps of jpeg dependencies.
Identified by parsing the NetBSD-i386-5.0.1/2009Q3 pkg_summary files
and Robert Elz.
2010-01-24 13:26:09 +00:00
joerg
20dafd5800 Also works with Python 2.6. 2010-01-23 22:57:05 +00:00
taca
ee2930a3bc Add a patch from OpenSSL's repositroy to deal with CVE-2009-4355.
Bump PKGREVISION.
2010-01-22 03:35:10 +00:00
heinz
c286ae7afc Added LICENSE information. 2010-01-21 23:32:10 +00:00
wiz
21a84747a2 Update to 5.48:
5.48  Mon Jan  4 16:32:52 MST 2010
	- fixed "shasum -a0" option (ref. rt.cpan.org #53319)
		-- incorrectly accepted 0 as a valid algorithm
			-- thanks to Zefram for patch
	- updated URL for NIST test vectors
		-- ref. files t/nistbit.t, t/nistbyte.t
			-- thanks to Leon Brocard for patch
2010-01-20 14:54:58 +00:00
wiz
e17d6e3cac Update to 4.29:
Version 4.29, 2009.12.02, urgency: MEDIUM:
* New features sponsored by Searchtech Limited http://www.astraweb.com/
  - sessiond, a high performance SSL session cache was built for stunnel.
    A new service-level "sessiond" option was added.  sessiond is
    available for download on ftp://stunnel.mirt.net/stunnel/sessiond/ .
    stunnel clusters will be a lot faster, now!
* Bugfixes
  - "execargs" defaults to the "exec" parameter (thx to Peter Pentchev).
  - Compilation fixes added for AIX and old versions of OpenSSL.
  - Missing "fips" option was added to the manual.

Version 4.28, 2009.11.08, urgency: MEDIUM:
* New features
  - Win32 DLLs for OpenSSL 0.9.8l.
  - Transparent proxy support on Linux kernels >=2.6.28.
    See the manual for details.
  - New socket options to control TCP keepalive on Linux:
    TCP_KEEPCNT, TCP_KEEPIDLE, TCP_KEEPINTVL.
  - SSL options updated for the recent version of OpenSSL library.
* Bugfixes
  - A serious bug in asynchronous shutdown code fixed.
  - Data alignment updated in libwrap.c.
  - Polish manual encoding fixed.
  - Notes on compression implementation in OpenSSL added to the manual.
2010-01-20 14:46:17 +00:00
wiz
ecc8190b98 Update to 1.02:
2010-01-10   Gisle Aas <gisle@ActiveState.com>

   Release 1.02

   Give the distribution a META.yml file
2010-01-20 14:43:21 +00:00
wiz
52a88647f7 Update to 2.4:
* Noteworthy changes in release 2.4 (2010-01-18) [stable]
- Doc fixes.
- Updated gnulib files.
- Clean up copyright notices.
2010-01-20 11:17:34 +00:00
wiz
91871f449e Second try at jpeg-8 recursive PKGREVISION bump. 2010-01-18 09:58:37 +00:00
wiz
579796a3e5 Recursive PKGREVISION bump for jpeg update to 8. 2010-01-17 12:02:03 +00:00
sno
7b4e351c52 Updating security/p5-Crypt-Rijndael from 1.07nb1 to 1.08
pkgsrc changes:
  - Adjusting license definition

Upstream changes:
1.08 - Wed Dec  9 18:20:22 2009
	* Promoting development release to full release.
	* This release mainly clarifies the licensing.

1.07_02 - Tue Nov  4 02:21:27 2008
	* RT #40511: Give a better warning when you try to use tainted
	data as an initialization vector. If anyone wants to use
	tainted data, they can patch the code to accept it.

1.07_01 - Tue Oct 14 08:59:58 2008
	* Clarify that these files are under the Lesser GNU Public License
	(also known as the Library GNU Public License).
2010-01-16 22:28:59 +00:00
heinz
f6eb5e6f2a Set or updated LICENSE 2010-01-16 19:27:17 +00:00
wiz
662a258e1b Remove workaround for compiler bug in gcc2 on sparc64. 2010-01-16 17:57:36 +00:00
tron
3cf808624e Fix build under Solaris. 2010-01-16 11:23:03 +00:00
agc
ef466379c3 Update pam_ssh_agent_auth from 0.9.1 to 0.9.2
Changes since previous version:

+ move from GPLv3 to modified-bsd license, with huge thanks to Jamie Beverly
2010-01-15 22:23:48 +00:00
drochner
fe61bbf7dd update to 2.0.14
changes:
* The default for --include-cert is now to include all certificates
  in the chain except for the root certificate.
* Numerical values may now be used as an alternative to the
  debug-level keywords.
* The GPGSM --audit-log feature is now more complete.
* GPG now supports DNS lookups for SRV, PKA and CERT on W32.
* New GPGSM option --ignore-cert-extension.
* New and changed passphrases are now created with an iteration count
  requiring about 100ms of CPU work.
2010-01-15 20:15:07 +00:00
drochner
c4e7a43eec don't depend on gnupg directly, gpgme/bl3 will do this for us, and it
will deal with gnupg1/gnupg2 correctly
bump PKGREVISION
2010-01-15 20:11:34 +00:00
taca
1cb789fb37 Update openssl package to 0.9.8l, fixing security problem.
Approved by agc@.


Changes between 0.9.8k and 0.9.8l  [5 Nov 2009]

 *) Disable renegotiation completely - this fixes a severe security
    problem (CVE-2009-3555) at the cost of breaking all
    renegotiation. Renegotiation can be re-enabled by setting
    SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at
    run-time. This is really not recommended unless you know what
    you're doing.
    [Ben Laurie]
2010-01-15 04:55:30 +00:00
schwarz
522df83954 streamlined syntax, using ${SETENV} instead of env. 2010-01-09 14:42:04 +00:00
joerg
967a2464d4 Expose the gpg binary gpgme is build against and use that in security/gpa. 2010-01-04 15:09:44 +00:00
schwarz
de1ea362ef improved CC and CFLAGS support 2010-01-03 14:30:37 +00:00
joerg
de807c0023 Needs pod2man. 2010-01-02 13:58:17 +00:00
he
f1e30ffb41 Moderate the wording slightly.
OK'ed by agc@
2009-12-28 23:18:09 +00:00
abs
fe90ac6faf polkit-explicit-grant-helper and polkit-grant-helper should also
be setgid polkit (apparently). Bump pkgrevision
2009-12-27 00:00:55 +00:00
obache
ee413a6d5a Fixes and improvement for Interix
* Not only interix-3, but also treat all interix release, allow to build on SUA.
* Gave up randomized image base, use 0x5e000000, as in mk/platform/Interix.mk.
  It is workaround of PR 42369.
* Use -D_REENTRANT flags for threads.
* replace -Wl,soname= linker flags with -Wl,h, for Interix
2009-12-25 11:58:06 +00:00
joerg
1d5ac0ccd3 Not MAKE_JOBS_SAFE. 2009-12-21 18:58:40 +00:00
joerg
bab2af9656 Mark as broken: as conflicts with its own dependency 2009-12-21 12:06:17 +00:00
taca
7fb236bb2b Update security/sudo pacakge to 1.7.2p2.
Major changes between sudo 1.7.2p1 and 1.7.2p2:

 * Fixed a a bug where the negation operator in a Cmnd_List
   was not being honored.

 * Sudo no longer produces a parse error when #includedir references
   a directory that contains no valid filenames.

 * The sudo.man.pl and sudoers.man.pl files are now included in
   the distribution for people who wish to regenerate the man pages.

 * Fixed the emulation of krb5_get_init_creds_opt_alloc() for MIT kerberos.

 * When authenticating via PAM, set PAM_RUSER and PAM_RHOST early so
   they can be used during authentication.
2009-12-20 07:46:32 +00:00
drochner
ba10990554 put back the (non-default) "idea" option which got lost a while ago 2009-12-18 18:54:24 +00:00
drochner
5214da8496 kill the "idea" option -- gnupg2 uses libgcrypt which used to have
an "idea" option, but that was removed more than a year ago when it
got updated from 1.2 to 1.4
The patch was was used on gnupg2 in the "idea" case was just a four-line
memory initialization fix, there is no point in LICENSE restrictions
due to this, so I've pulled it in as regular patch so that it doesn't
get lost for the case someone fixes idea support in libgcrypt
(which isn't hard).
2009-12-18 17:49:51 +00:00
hasso
90428bca3a Remove removal of the hack which was needed for libtool 1.x.
From Rumko <rumcic at gmail.com> via private mail.
2009-12-18 12:33:25 +00:00
drochner
44f924529f don't install the gpg-zip.1 manpage, avoids CONFLICT with gnupg1,
noticed by OBATA Akio per mail to pkgsrc-users.
This makes most sense to me since gnupg2 doesn't install a gpg-zip
intentionally. Since possible clients of gpg-zip should have a
dependency on gnupg1, we can't take over easily. Once we are sure
that gnupg2 can fully replace gnupg1, we might consider to install
eg symlinks gpg->gpg2 etc and make gnupg1 obsolete, but this needs
careful testing.
2009-12-16 18:52:49 +00:00
wiz
f392c9b9c9 Add checksum for idea patch. 2009-12-16 09:09:06 +00:00
joerg
3fbb207985 Recursive bump for libltdl 2009-12-15 21:54:17 +00:00
drochner
7cf4ef3d0f make s/mime support, which implies use of gnupg2, default,
bump PKGREVISION
2009-12-15 20:17:33 +00:00
drochner
4c181ca7aa update to 2.0.13
changes: many fixes and improvements

reviewed by John R. Shannon

pkgsrc notes:
-since S/MIME support is the biggest difference in functionality over
 gnupg1, enable it per default -- my tests (with the s/mime plugin
 of claws-mail) worked
-left the build against a private libassuan with GNU-pth support
 alone for now, just updated libassuan to 1.0.5. We might build
 pkgsrc/libassuan against pkgsrc/pth at some point, but this needs
 to be checked for side effects. (As this pkg doesn't export a library
 which might propagate the pth dependency, the possibility of
 pthread-pth conflicts should be limited. Other uses of libassuan
 need to be checked.)
2009-12-15 20:10:40 +00:00
drochner
54adc1fe57 update to 0.7.6
changes: misc improvements

reviewed by John R. Shannon
2009-12-15 19:50:47 +00:00
drochner
138a3d5f81 update to 1.0.3
changes:
* New option --url for the LOOKUP command and dirmngr-client.
* The LOOKUP command does now also consults the local cache.  New
  option --cache-only for it and --local for dirmngr-client.
* Port to Windows completed.
* Improved certificate chain construction.
* Support loading of PEM encoded CRLs via HTTP.
* Client based trust anchors are now supported.
* Configured certificates with the suffix ".der" are now also used.
* Libgcrypt 1.4 is now required.

reviewed by John R. Shannon

pkgsrc notes:
I've left the build against a private libassuan with GNU-pth support
alone for now, just updated libassuan to 1.0.5. We might build
pkgsrc/libassuan against pkgsrc/pth at some point, but this needs
to be checked for side effects. (As this pkg doesn't export a library
which might propagate the pth dependency, the possibility of
pthread-pth conflicts should be limited. Other uses of libassuan
need to be checked.)
Beiing here, support DESTDIR.
2009-12-15 19:43:16 +00:00
drochner
dd6bc89388 update to 1.0.7
changes:
-misc fixes and improvements
-Support DSA
-Support SHA-{384,512} based signature generation
reviewed by John R. Shannon
2009-12-15 19:27:36 +00:00
drochner
d79a6a9a02 minor fixes for gnupg2 support:
-don't pull in gnupg2's "gpgconf" if both gnupg1 and gnupg2 are installed
 but we are building against gnupg1, this caused a build failure
-fix a selftest to work with gnupg2
2009-12-15 19:15:38 +00:00
drochner
0e9d3d2412 remove obsolete "hal" dependency, ride on recent update 2009-12-15 14:52:03 +00:00
wiz
7e7a194e1c Update to 2.28.2:
Changes in version 2.28.2 are:
 * Add license to reference documentation.
 * Sent output of g_printerr to syslog.
 * No error when can't unlock login keyring.
 * Fix assertion when comparing attributes.
 * Fix freeing of unallocated memory in test.
 * Don't barf on certificates with unsupported algorithm.
 * Fix some memory leaks.
2009-12-15 14:07:22 +00:00
wiz
0cd3e9c94f Update to 0.61, set LICENSE to public-domain (see below).
[Changes for 0.61]

* Added "=encoding utf8" to POD to fix author name display.
  No functional changes.

[Changes for 0.60]

* LICENSING CHANGE: This compilation and all individual files in it
  are now under the nullary CC0 1.0 Universal terms:

  To the extent possible under law, 唐鳳 has waived all copyright and
  related or neighboring rights to Module-Signature.

* Updated Module::Install to 0.91, prompted by Florian Ragwitz.
2009-12-15 13:28:13 +00:00
wiz
79b8380d57 Update to 0.42, set LICENSE (still depend on gpg1 for now).
0.42 Wed Sep 30 23:20:58 JST 2009

	* Support for GPG2

0.41_01 Fri Sep 25 02:56:33 JST 2009

	* Beginnings of support for GPG2

0.40_04 Tue Apr 21 19:50:12 JST 2009

    * Use Any::Moose instead of Moose for Mouse celerity (Sartak)

0.40_1 Sat Nov 15 12:35:59 EST 2008
	* [rt.cpan.org #40963] Replace Class::MethodMaker with Moose  (Chris Prather)
2009-12-15 13:18:44 +00:00
wiz
bf16cd60c6 Update to 1.4.5:
Noteworthy changes in version 1.4.5 (2009-12-11)
------------------------------------------------

 * Fixed minor memory leak in DSA key generation.

 * No more switching to FIPS mode if /proc/version is not readable.

 * Fixed a sigill during Padlock detection on old CPUs.

 * Fixed a hang on some W2000 machines.

 * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3;
   SHA-256 went up by 25%.
2009-12-15 10:40:11 +00:00
agc
a08122742d Update netpgp to version 20091210.
Apart from infrastructure changes, there are the following functional ones:

+ Update to version 1.99.14/20091210

+ provide a new netpgp_match_list_keys(3) function to perform a
regular-expression based search of all the keys in the keyring.  If no
pattern is specified to match, then all keys are returned.

+ provide a new netpgp_set_homedir(3) function, and use it to set the
home directory from the library, rather than individually in all the
programs which use the library

+ provide a new netpgp_incvar(3) function which will add a constant
increment (which may be negative) to the value of an internal
variable.  This is primarily used for the verbosity level within the
library, and is again a movement of the function into the library from
the individual programs which use the library

+ move to the specification of an ssh key file by internal variable,
rather than the directory holding an ssh key file

+ autoconf infrastructure changes

+ take a hammer to the _GNU_SOURCE definitions problems

+ don't rely on strnlen(3) being present everywhere

+ add rudimentary support for ssh keys

+ add a netpgp library function - netpgp_get_key(3) - to print a
specific key

+ add functionality to call this function in netpgpkeys(1)

+ add test for netpgp_get_key

+ add a verbose switch to the tst script

+ add netpgp functions to expose the memory signing and verification
functions - netpgp_sign_memory(3) and netpgp_verify_memory(3)

+ coalesced signing and verification ops file functions
2009-12-15 00:06:15 +00:00
agc
e4ec5d2752 Add and enable seccure 2009-12-14 08:01:06 +00:00
agc
bcc5d43161 Initial import of seccure-0.4 into the Packages Collection.
The seccure toolset implements a selection of asymmetric
	algorithms based on elliptic curve cryptography (ECC).  In
	particular it offers public key encryption / decryption,
	signature generation / verification and key establishment.

	ECC schemes offer a much better key size to security ratio
	than classical systems (RSA, DSA).  Keys are short enough to
	make direct specification of keys on the command line possible
	(sometimes this is more convenient than the management of
	PGP-like key rings).  seccure builds on this feature and
	therefore is the tool of choice whenever lightweight
	asymmetric cryptography -- independent of key servers,
	revocation certificates, the Web of Trust or even
	configuration files -- is required.
2009-12-14 08:00:05 +00:00
wiz
8bd8148899 Remove unused file. 2009-12-13 13:19:43 +00:00