Commit graph

1957 commits

Author SHA1 Message Date
ben
4865884f55 Update the format string in dbase.build.c also.
Fix the format string and types to work on older versions of NetBSD, in
addition to FreeBSD and SunOS.
2003-12-09 19:17:37 +00:00
ben
c03f97f79f In include/config.h, uint32 was by default defined as an unsigned long.
However (because of -DTW_TYPE32='int' being added to CFLAGS for an LP64 fix
in revision 1.3 of patches/patch-aa) uint32 is defined as an unsigned int.
This caused two problems:
1) The format string in include/tripwire.h was not updated to match.
2) On NetBSD, off_t is __int64_t.

I am changing the format string in tripwire.h to match uint32.  I also
changed the type of the variable "size" from uint32 to off_t, and changed
its format string to match intmax_t.

This fixes the sparc64 coredump mentioned in PR 19391.
2003-12-09 15:56:56 +00:00
ben
2acc62fbb9 Actually set MASTER_SITES to site mentioned in revision 1.16. 2003-12-09 15:40:20 +00:00
jschauma
6746cd9e72 Add/enable pinepgp 2003-12-08 17:46:45 +00:00
jschauma
43c699e602 Initial import of PinePGP into pkgsrc:
PinePgp is set of display and sending filters which enables pine to send and
receive signed and/or encrypted e-mails.

Supported are both PGP <http://www.pgp.com/> (version 2.6.x, 5.x and 6.5.x)
and GnuPG <http://www.gnupg.org/> (version 1.0.0 and later).
2003-12-08 17:44:49 +00:00
taca
b7fffbff5a Update pgpdump package to 0.20.
0.20 2003/12/08

* Catching up to 2440bis-09. Bzip2 was supported.

0.19 2003/06/06

* Catching up to 2440bis-08.
* Supporting MINGW32. This is dirty and needs to be refined.
* autotime.h -> types.c
2003-12-08 17:33:41 +00:00
wiz
a6e105fbae Bump PKGREVISION for libogg (or, in 5 cases, libao) updates. 2003-12-08 14:41:38 +00:00
xtraeme
8548d7b6a0 Updated to 1.0.0, provided by Min Sik Kim PR pkg/23661.
Changes:

- Exported the static SRP group parameters.
- Some fixes in the certificate authenticated SRP ciphersuites.
- Improved the support for draft-ietf-tls-srp-05. The two-phase
  handshake is now fully supported without any interaction with
  the application layer (except for a callback).
- Some fixes in the openpgp authentication.
- Removed the Twofish cipher.
- The openssl compatibility layer was moved to gnutls-openssl
  library instead of being included in the gnutls-extra library.
- Added the RIPEMD ciphersuites defined in draft-ietf-tls-openpgp-keys-04.
- Building with openpgp support is now mandatory.
- gnutls4 compatibility header is no longer included by default in
  gnutls.h.
- gnutls8 function usage yelds a deprecation warning in gcc3.
- gnutls_x509_*_set_dn_by_oid() and gnutls_x509_*_get_*_dn_by_oid()
  functions have a raw_flag parameter added.
- The certtool utility can now generate PKCS #12 structures
  without specifying a certificate.
- Added capability to read CRLs to certtool.
- Corrected some functions which return GNUTLS_E_SHORT_MEMORY_BUFFER
  to properly set the required buffer size.
- Corrected a bug in libgcrypt detection.

And more...
2003-12-06 00:52:21 +00:00
xtraeme
ae8947f74c Oops, this patch still is needed. 2003-12-06 00:29:26 +00:00
xtraeme
fe6153dbee Updated to 0.5.3, provided by Min Sik Kim PR pkg/23322.
Changes:

* Added a compile time check for vasprintf.
* The unsigned long types were changed to unsigned int.
* Internal message digest and symmetric crypto library to simplify to
  include parts of OpenCDK into an own application.
* Huge interface and naming changes to enhance the readability of the
  code. Several code cleanups which means some functions are not
  public any longer. No backward compatibility to force client
  applications to change the interface as soon as possible.
* Simplified API for listing keys.
* Extended key node (KBNODE) API to extract attributes more easier.
* Signature sub packet API is now public.
* Read-only support for revocation keys.
* Bug fix to prevent possible DOS memory attack.
* Support for literal partial body packets.

And more...
2003-12-06 00:28:21 +00:00
xtraeme
a44d93e6d7 Updated to 1.1.90, provided by Min Sik Kim PR pkg/23322.
Changes:

 * The use of the GCRY_WEAK_RANDOM level is now deprecated in favor of
   the new gcry_create_nonce function.
 * gcry_sexp_build now supports a "%b" format to include a memory buffer.
 * Minor configuration fixes.
 * Interface changes relative to the 1.1.44 release:
 * Bug fixes and more code cleanups.
 * Enhanced the prime API.
 * Support for the Serpent cipher algorithm.

And more...
2003-12-06 00:26:59 +00:00
xtraeme
50b5b49bb3 Add and enable libgpg-error. 2003-12-05 23:25:26 +00:00
xtraeme
a5ab9aac8b Initial import of libgpg-error-0.6 from pkgsrc-wip, packaged by
Min Sik Kim.

libgpg-error is a library that defines common error values for all
GnuPG components.  Among these are GPG, GPGSM, GPGME, GPG-Agent,
libgcrypt, pinentry, SmartCard Daemon and possibly more in the future.
2003-12-05 23:24:31 +00:00
xtraeme
ec5bf69512 Updated to 0.2.6, provided by Min Sik Kim PR pkg/23269.
Changes since 0.2.4:

Version 0.2.6

- ASN.1 parser accepts these kinds of integer definitions:
  "INTEGER (5 | 10)" and
  "INTEGER (5)"
- Comments start at "--" and finish at the "end of line" or
  with another "--".

Version 0.2.5

- Bug fix in ordering procedure for SET OF and SEQUENCE OF
  types coding.
- Manage structured format (BER encoding) in
  asn1_der_decoding, asn1_decoding_element and
  asn1_der_decoding_startEnd for OCTET STRING type.
- Manage SEQUENCE and SET empty structure.
- Manage "indefinite length method" in asn1_der_decoding,
  asn1_decoding_element and asn1_der_decoding_startEnd
  for the following types:
  SEQUENCE, SEQUENCE OF, SET, and SET OF.
- Bug fix in asn1_read_value with NULL parameter in case
  of BIT STRING
2003-12-05 23:16:20 +00:00
xtraeme
70405ce23c Add and enable nikto. 2003-12-05 17:46:21 +00:00
xtraeme
d259bef697 Initial import of nikto-1.32 from pkgsrc-wip, packaged by Adrian Portelli.
Nikto is a web server scanner which performs comprehensive tests against web
servers for multiple items, including over 2200 potentially dangerous
files/CGIs, versions on over 140 servers, and problems on over 210 servers.
Scan items and plugins are frequently updated and can be automatically
updated (if desired).
2003-12-05 17:45:23 +00:00
ben
f9af6913a6 Replace all uses of mktemp() with mkstemp() and close PR 23640. 2003-12-05 05:40:32 +00:00
heinz
1c2e179f34 Add p5-Net-DNS-SEC 2003-12-04 00:34:59 +00:00
heinz
a5f2b13656 Import of p5-Net-DNS-SEC.
This Perl module implements DNS Resource Record types that are relevant
for DNSSEC operations. The implementation is based on: RFC 2535, RFC
2931 and  the latest draft-ietf-dnsext-delegation-signer-0.xy.txt.
2003-12-04 00:33:02 +00:00
kristerw
f6d8743f8c Change MAINTAINER to "tech-pkg" instead of the previous "packages". 2003-12-03 22:14:45 +00:00
heinz
c74b537b8f Add p5-Crypt-OpenSSL-Bignum, p5-Crypt-OpenSSL-DSA, p5-Crypt-OpenSSL-Random, p5-Crypt-OpenSSL-RSA 2003-12-03 22:10:36 +00:00
heinz
4e9dc28504 Import of p5-Crypt-OpenSSL-DSA.
Crypt::OpenSSL::DSA implements the DSA (Digital Signature Algorithm)
signature verification system.
It is a thin XS wrapper to the DSA functions contained in the
OpenSSL crypto library.
2003-12-03 22:07:21 +00:00
heinz
179e5e3653 Import of p5-Crypt-OpenSSL-RSA.
Crypt::OpenSSL::RSA is a XS Perl module designed to provide basic RSA
functionality by using the RSA functions in the OpenSSL library.
2003-12-03 22:03:22 +00:00
heinz
5754f75464 Import of p5-Crypt-OpenSSL-Random.
Crypt::OpenSSL::Random is a thin XS wrapper around the pseudo-random number
generator functions contained in the OpenSSL crypto library.
2003-12-03 21:56:36 +00:00
heinz
2eb3704ad5 Import of p5-Crypt-OpenSSL-Bignum.
Crypt::OpenSSL::Bignum provides access to OpenSSL multi-precision integer
arithmetic libraries.  Presently, many though not all of the arithmetic
operations that OpenSSL provides are exposed to perl.
In addition, this module can be used to provide access to bignum values
produced by other OpenSSL modules, such as key parameters from
Crypt::OpenSSL::RSA.
2003-12-03 21:50:20 +00:00
ben
fdcd599455 The MASTER_SITES for security/tripwire does not have the tarball available
for download.

I changed MASTER_SITES to match FreeBSD's ports/security/tripwire12.

I verified that the contents of these files are identical using cmp.
2003-12-03 21:18:09 +00:00
heinz
189764b550 Add p5-Digest-BubbleBabble 2003-12-03 19:54:45 +00:00
heinz
5010af6c6c Import of Digest::BubbleBabble 0.1
The Perl module Digest::BubbleBabble can be used to create a fingerprint of
a MD5 or SHA-1 digest in "bubble babble" format. Bubble babble is a method
of representing a message digest as a string of "real" words, to make the
fingerprint easier to remember. The "words" are not necessarily real words,
but they look more like words than a string of hex characters.
2003-12-03 19:53:28 +00:00
xtraeme
d343bfd001 Add and enable gss, gsasl. 2003-12-03 19:24:03 +00:00
xtraeme
75355b0f25 Initial import gsasl-0.0.8 from pkgsrc-wip.
GNU SASL is an implementation of the Simple Authentication and Security Layer
framework and a few common SASL mechanisms. SASL is used by network servers
(e.g., IMAP, SMTP) to request authentication from clients, and in clients to
authenticate against servers.

GNU SASL contains a library (`libgsasl'), a command line utility (`gsasl')
to access the library from the shell, and a manual. The library includes
support for the SASL framework (with authentication functions and application
data privacy and integrity functions) and at least partial support for the
CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN,
NTLM and KERBEROS_V5 mechanisms.
2003-12-03 19:23:13 +00:00
xtraeme
f12455eefa Initial import of gss-0.0.6 from pkgsrc-wip.
GSS is an implementation of the Generic Security Service Application Program
Interface (GSS-API). GSS-API is used by network servers (e.g., IMAP, SMTP) to
provide security security services, e.g., authenticate clients against servers.
GSS consists of a library and a manual.
2003-12-03 19:22:23 +00:00
erh
ff4ab4ac22 Add an empty plist for AIX. 2003-12-03 17:35:43 +00:00
wiz
dfa47a2ed3 Bump date for previous. Fix typo. 2003-12-03 09:31:01 +00:00
martti
ac3fc97117 Updated audit-packages to 1.26
Added support for audit-packages.conf. This file can be used
to define environment variables (e.g. FETCH_ARGS).
2003-12-03 04:58:01 +00:00
reed
ace3815fc7 The PLIST.linux was empty, but should be registering the
libssl.so* and libcrypto.so* files. So added this.
2003-12-03 01:57:08 +00:00
he
2a8b055632 Add a patch to handle systems which have uint64_t but not the UINT64_C
macro.  This could happen with UNIX98-type systems, such as the code on
our netbsd-1-5 branch, and would prevent this package from building on
such systems.  Problem also reported to the original author.
2003-12-01 14:16:17 +00:00
heinz
b35693ec32 Add improved patch for compromised ElGamal signing keys from
gnupg-devel at gnupg org. The old patch didn't completely disable usage
of the compromised keys.
Move the old and new fix to the patches/ directory.
2003-11-27 23:46:36 +00:00
grant
ad3d97c52d Updated p5-Digest-SHA1 to 2.06.
changes since 2.04:

   Release 2.06

   The sha1_transform() function did not check that it was actually
   passed any arguments.

   Complete self-contained documentation included (copied from
   Digest::MD5), since the Digest.pm manpage is not always available.

   Release 2.05

   Added missing cast to support C++ compilation.  Patch by Jan Dubois.

   Document that the sha1_base64 function and the b64digest method
   does not pad their result.
2003-11-27 16:33:30 +00:00
grant
15e119a227 Updated p5-Digest-MD5 to 2.30.
changes since 2.27:

   Release 2.30

   Some tweaks to make the module build on perl-5.004 and
   perl-5.005 again.

   Release 2.29

   Another try.  Forgot to update the test checksums.

   Release 2.28

   Fix minor documentation typo.
2003-11-27 16:32:58 +00:00
tron
44c85b1a1f Apply security patch which disables ElGamal signature keys because they
are vulnerable. Bump package revision to reflect this change.
2003-11-27 09:50:12 +00:00
jlam
dc0392f000 Fix OpenSSL version number parsing. Patch from PR 23532 by Michael van
Elst with style modifications by me.
2003-11-27 05:19:58 +00:00
jlam
49eef2d279 If the built-in OpenSSL software is 0.9.6g, then check whether it
contains the 0.9.6g -> 0.9.6l security fixes pulled up to netbsd-1-6 on
2003-11-07 by checking for the presence of the preprocessor symbol
OPENSSL_HAS_20031107_FIX.  If it does, then allow the built-in OpenSSL to
satisfy dependencies for openssl>=0.9.6l.
2003-11-25 06:56:08 +00:00
wiz
8c00d27d87 Add GCC_REQD=2.95.3 (for 1.5 or older). 2003-11-24 14:15:36 +00:00
wiz
b414a05213 Remove USE_PKGSRC_GCC line -- it is unneeded (compiles fine with both
gcc-2.95.3 and gcc-3.3.2.
2003-11-23 19:45:25 +00:00
jlam
1ace25cc8c Install the saslauthd manpage as cat8/saslauthd.0 as it should be on BSD
systems.
2003-11-21 13:41:58 +00:00
jlam
093834e3eb s/root/@ROOT_USER@/ to be more generally correct. 2003-11-21 10:41:56 +00:00
jschauma
07e126d1f6 textproc/glimpse and security/openssl no longer conflict, as openssl
does no longer install bin/cast.  Noted by Bernhard Riedel.
2003-11-19 02:57:43 +00:00
jschauma
b5425f7502 OpenSSL has not had base64 for a while now, so these two no longer need
to conflict.  Noted by Bernhard Riedel.
2003-11-19 02:52:46 +00:00
xtraeme
47acf3181b Remove harcoded CFLAGS from Makefile, pass our CFLAGS instead.
Patch provided by Christian Biere in PR pkg/23461.

Bump PKGREVISION.
2003-11-18 14:03:14 +00:00
wiz
4c64aceda4 Remove OPENSSL_HAS_*FIX code; corresponding check was removed in
previous commit to this file. Noted superfluous by Todd Vierling.
2003-11-17 15:25:57 +00:00