Commit graph

6559 commits

Author SHA1 Message Date
pettai
b528341ccd This is a pure python implementation of the DES encryption algorithm.
It is in pure python to avoid portability issues, since most DES
implementations are programmed in C (for performance reasons).

Triple DES class is also implemented, utilising the DES base. Triple DES
is either DES-EDE3 with a 24 byte key, or DES-EDE2 with a 16 byte key.
See the "About triple DES" section below more info on this algorithm.

The code below is not written for speed or performance, so not for those
needing a fast des implementation, but rather a handy portable solution
ideal for small usage.
2012-11-04 21:57:11 +00:00
joerg
323960c934 Don't order function pointers directly. Don't use non-literals as format
strings. Fix return type of intermediate used for return value of
wcrtomb.
2012-11-01 19:32:44 +00:00
wiz
8d33bfd93c Update HOMEPAGE, from diro@nixsyspaus.org in PR 47148. 2012-10-31 22:45:47 +00:00
wen
6acdcf18fb Update to 2.31
Upstream changes:
2.31    Tue Oct 30 07:03:40 EDT 2012
	- Fixes to regular expressions to avoid rare failures to
          correctly strip padding in decoded messages.
        - Add padding type = "none".
        - Both fixes contributed by Bas van Sisseren.
2012-10-30 14:35:37 +00:00
markd
9866bf5db7 Update to 0.4.3
4+ years worth of patches.
2012-10-28 02:00:50 +00:00
wiz
44cbb90d8b + KeePass. 2012-10-27 22:19:01 +00:00
wiz
8a9de37b40 Import KeePass-2.20.1 as security/KeePass.
Today you need to remember many passwords. You need a password for
the Windows network logon, your e-mail account, your website's FTP
password, online passwords (like website member account), etc. etc.
etc. The list is endless. Also, you should use different passwords
for each account. Because if you use only one password everywhere
and someone gets this password you have a problem... A serious
problem. The thief would have access to your e-mail account, website,
etc. Unimaginable.

KeePass is a free open source password manager, which helps you to
manage your passwords in a secure way. You can put all your passwords
in one database, which is locked with one master key or a key file.
So you only have to remember one single master password or select
the key file to unlock the whole database. The databases are
encrypted using the best and most secure encryption algorithms
currently known (AES and Twofish).
2012-10-27 22:18:50 +00:00
wiz
f531cf3fcd Add comments to patches. 2012-10-27 17:39:12 +00:00
joerg
eaf5600a7b Use void for a few functions that need it. 2012-10-26 20:24:19 +00:00
joerg
f96e4c6b58 Allow unprivileged build on NetBSD, if bind is in base. 2012-10-24 16:05:15 +00:00
manu
756fd1358b Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shall
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
2012-10-24 09:01:40 +00:00
manu
7edb0c3452 Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shall
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
2012-10-24 08:33:51 +00:00
asau
40b91e7ab9 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
manu
ff862ac29f Upgrade to lasso 2.3.6 in order to completely fix the libxml 2.9 dependency
ChangeLog Since 2.3.5:
 * fix a bug when receiving a signature using the InclusiveNamespaces
   PrefixList by copying namespace declaration from upper level at the level of
   the signed node.
 * fix compilation warning on recent version of GCC
2012-10-23 18:16:15 +00:00
schmonz
8f0dc12cf1 Restore INSTALLATION_DIRS and krb5.buildlink3.mk, lost in previous.
Indent while here.
2012-10-23 13:02:08 +00:00
elric
724dd1746f Update to knc 1.7. 2012-10-23 06:04:28 +00:00
wiz
2bcdfec626 Update to 1.49:
1.49 2012-09-25
     Fixed problem where on some platforms test t/local/07_tcpecho.t would
     bail out if it could not bind port 1212. Now now tries a number of ports to bind to until
     successful.
     Improvements to  unsigned casting contributed by Reini Urban.
     Improvements to Net::SSLeay::read to make it easier to use with non-blocking IO:
      contributed by James Marshall:  It modifies
      Net::SSLeay::read() to return the result from SSL_read() as the second
      return value, if Net::SSLeay::read() is called in list context.  Its
      behavior should be unchanged if called in scalar or void context.  This
      result code seems to be required for full support of non-blocking I/O,
      since users need to handle SSL_ERR_WANT_READ, SSL_ERROR_WANT_WRITE, etc.
      Fixed a problem where t/local/kwalitee.t fails with
       Module::CPANTS::Analyse 0.86. Patch from Paul.
      Fixed a number of typos patched by Giles.
      Fixed a compiler warning from Compiling with gcc-4.4 and -Wall, patched by Giles.
      Fixed problems with get_https4: documentation was wrong, $header_ref was
       not correctly set and $server_cert was not returned.
      Fixed a problem that could cause a Perl exception about no blength
      method on undef. Reported by "Stephen J. Smith via RT". https://rt.cpan.org/Ticket/Display.html?id=79309
      Added documentation about how to mitigatxe various SSL/TLS
     vulnerabilities.
     Fixed problem reported by Mike Doherty: SSL_MODE_* are defined in ssl.h,
     and should be available as constants, but I do not see them listed in constants.h
2012-10-21 22:28:16 +00:00
wiz
63d4534896 Update to 20120823. Replace interpreter in installed file.
20120823
  - Fix test (RT#79129, reported by Sinan Unur)

20120822
  - Add mk-ca-bundle.pl from git repository to distribution.
  - Add new/additional certificates from the following CAs: Verisign,
    UTN-USER, UTN USERFirst, Sonera, NetLock Qualified, SwissSign
    Platinum, S-TRUST, ComSign, Actalis, Trustis, StartCom, Buypass.
2012-10-21 22:25:19 +00:00
wiz
baa31dc007 Update to 1.77:
v1.77 2012.10.05
- update_peer for IPv6 also, applied fix to
  https://rt.cpan.org/Ticket/Display.html?id=79916 by
  tlhackque[AT]yahoo[DOT]com
2012-10-21 22:22:36 +00:00
wiz
40d3c54b03 Update to 5.72:
5.72  Mon Sep 24 15:22:08 MST 2012
	- adjusted module installation directory for later Perls
		-- As of 5.11 Perl searches 'site' first, so use that
			-- ref. INSTALLDIRS in Makefile.PL
		-- thanks to Robert Sedlacek for patch
2012-10-21 22:20:40 +00:00
wiz
216ba55f22 Update to 0.64:
0.64 2012-08-06 01:23:30

- Drastically simplify Makefile.PL to resolve RT bugs #61249, #61324,
  #63553, #68208, and #68084.

- Forgot to update Changes for 0.63, so this version overrides that.


0.61_05 2012-08-04 00:40:22 UTC

- Trying to distinguish between good vs bad zero returns from underlying
  SSL_read/SSL_write broke stuff (see RT bug #78695). Revert to previous
  behavior.

- Completely re-organize Makefile.PL. I hope these changes will help take
  care of RT bugs #61324, #61249, #63553, and #68084 etc. This is not
  necessarily finished, but I want to see what happens on CPAN Testers at
  this point before making a few other minor changes.

0.60 2012-07-29 21:43:47 UTC

- Release 0.59_03 as 0.60 so distributions can pick up various fixes. The most
  important one seems to be bug RT #70565. This should take care of bug RT
  #77167

- SSL_read and SSL_write now try to handle incomplete reads/writes (see bug RT
  RT #64054). The current test suite does is not very comprehensive, so caution
  is recommended at this point. Also, if you have good test cases, I would love
  to incorporate them into the distribution.

0.59_03 2012-03-10 00:45:28 UTC

- Bump version number and upload to CPAN.


0.59_02 2012-03-08 16:16:03 UTC

- Forgot to update Changes for 0.59_01. The following is a combined list of
  the more important fixes incorporated in both.

- Bug RT #64054: Handle incomplete reads/writes better

- Bug RT #73754: Add LWP::Protocol::https to PREREQ_PM

- Bug RT #73755: Crypt-SSLeay does not verify hosts (yet). Don't let that
  cause a failure during tests.

- Streamline t/02-live.t using Try::Tiny and done_testing

- Plus assorted related small changes.

0.58_01 2010-09-08 19:11:39 UTC

- L<text|scheme:...> is not supported in POD for 5.8.5 and earlier.
- TODOs in POD should stand out
- Add /boot/common/ssl and some other directories to unix_ssl_dirs (see bug
  #60936).
2012-10-21 22:19:14 +00:00
wiz
d4a974c4db Update to 0.13:
0.13
Updated the WRITE() method to use syswrite() and account for
variable buffer sizes in SASL.
2012-10-21 22:16:43 +00:00
wiz
61869bb86f Update to 2.16:
Authen-SASL 2.16 -- Tue Sep  4 11:01:18 CDT 2012

  * SASL.pod: fix typo [Peter Marschall]
  * Perl.pm: avoid warning on "uninitialized value" [Peter Marschall]
2012-10-21 22:14:51 +00:00
wen
ab9ceeb5f9 Update to 0.14
Upstream changes:
0.14  October 16, 2012
	- compiling with -Werror=format-security now works (Jerome Quelin, #48446)
	- Use Digest::SHA instead of Digest::SHA1 (Ansgar Burchardt, #60271)
	- Security fix, CVE-2009-0129: Missing error check in do_verify (Havard Eidnes, #79958)
2012-10-20 14:25:58 +00:00
pettai
1c3d937865 Added scrypt 2012-10-17 22:18:56 +00:00
pettai
2281e8547b A simple password-based encryption utility is available as a demonstration
of the scrypt key derivation function. On modern hardware and with default
parameters, the cost of cracking the password on a file encrypted by scrypt
enc is approximately 100 billion times more than the cost of cracking the
same password on a file encrypted by openssl enc; this means that a five-
character password using scrypt is stronger than a ten-character password
using openssl
2012-10-17 22:17:47 +00:00
adam
e871bbb82b MASTER_SITES fix 2012-10-12 15:37:12 +00:00
marino
1b71fe7899 security/qoauth: Fix DISTNAME and thus fetch
As soon as qoauth got PKGREV bump, this package could no longer fetch due
to a bad DISTNAME definition.  Fix DISTNAME to fix "make fetch".
2012-10-12 11:06:59 +00:00
marino
da604f2b06 security/mit-krb5: Fix build for gcc 4.7
Generated file didn't pass -Werror check on gcc4.7.  The problem is
well-known and already fixed on the current version of mit-krb5.  The
patch added here was taken from upstream.

No revbump necessary, won't change binary on systems that already built it.
2012-10-12 08:06:25 +00:00
drochner
e02daaded0 update to 3.0.24
changes:
-better IPv6 support
-bugfixes
-minor improvements
2012-10-10 11:44:30 +00:00
adam
ed93f0ca47 Revbump after updating graphics/pango 2012-10-08 23:00:34 +00:00
pettai
3329c5ef3f Update to Botan 1.8.14:
* 1.8.14, 2012-07-18

- The malloc allocator would return null instead of throwing in the event of
  an allocation failure, which could cause an application crash due to null
  pointer dereference where normally an exception would occur.
- Recent versions of OpenSSL include extra information in ECC private keys,
  the presence of which caused an exception when such a key was loaded by
  botan. The decoding of ECC private keys has been changed to ignore these
  fields if they are set.
- AutoSeeded_RNG has been changed to prefer /dev/random over /dev/urandom
- Fix detection of s390x (Debian bug 638347)
2012-10-08 20:46:38 +00:00
jaapb
be0a6937d1 Revision bump associated with the update of lang/ocaml to version 4. 2012-10-08 15:18:20 +00:00
obache
ce8cd25418 PKGNAME_NOREV must be used for DISTNAME.
fixes PR pkg/47043.
2012-10-07 12:31:13 +00:00
adam
9bab063ade Small clean-up 2012-10-05 20:01:23 +00:00
cheusov
f7d8bd898d CONFLICTS between lang/sr and security/srm 2012-10-05 17:17:04 +00:00
apb
35a3d960ea In the PLIST, add four files in ${PYSITELIB}/${EGG_INFODIR}.
In the Makefile, remove PYDISTUTILSPKG=yes, add
.include "../../lang/python/egg.mk", and set PKGREVISION=1.

This fixes errors from "make package" complaining about files
that were installed but not present in the PLIST.
2012-10-05 10:14:46 +00:00
wiz
8fd7e9c34c Add build dependency on p5-Perl4-CoreLibs, needed since a script
uses find.pl.
Reported by Jörn Clausen in PR 47036.
2012-10-05 09:36:31 +00:00
pettai
762273f8cc validns 0.6
Support for TLSA records.
        Support for ILNP (NID, L64, L3, LP) records (untested).
        Support for IPSECKEY records.
        Handle TYPEXXX for known types correctly.
        A number of NSEC3-related bug fixes.
        Miscellaneous bug fixes.
2012-10-04 20:30:57 +00:00
cheusov
fb1ffebcad Bump revision for packages with changed CONFLICTS (PYTHON_SELF_CONFLICT) 2012-10-04 00:21:58 +00:00
cheusov
2144a22c15 CONFLICTS between python modules 2012-10-03 23:40:35 +00:00
wiz
3184463075 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
adam
ae11b3ecb6 ClamAV 0.97.6 includes minor bug fixes and detection improvements. 2012-10-03 10:39:13 +00:00
wiz
e67687a4f4 Update to 2.14:
* Noteworthy changes in release 2.14 (2012-09-24) [stable]
- Added asn1_read_node_value() to obtain a node's value.
  This is to deprecate the export of the node_asn internal structure
  for the upcoming 3.x release.  The ASN1_DATA_NODE type and the
  ASN1_ETYPE_* constants were added to support the new function.
2012-10-02 17:36:00 +00:00
tron
78f9c75877 Mass recursive bump after the dependence fix of the "cairo" package
requested by Thomas Klausner.
2012-10-02 17:10:28 +00:00
he
8f9acab0f0 Apply a fix for CVE-2009-0129, taken from Debian's problem report.
Also reported upstream, ref.
  https://rt.cpan.org/Public/Bug/Display.html?id=79958
Bump PKGREVISION.
2012-10-02 07:58:00 +00:00
adam
3919eb3582 Fix building on Darwin 2012-09-28 12:31:59 +00:00
obache
fdae8ad45c add patches for libxml2>=2.9.0, new buffer structure. 2012-09-28 11:59:18 +00:00
obache
61adbcc0a3 LICENSE=gnu-gpl-v2 2012-09-28 11:52:22 +00:00
obache
fff6231f2b missing parts of recursive revbump for gnutls update. 2012-09-23 10:47:45 +00:00
obache
f911730ab3 Install man source into $(mandir)/man8 instead of catman for saslauthd(8),
or manpage will not displayed correctly with man(1).
It also fixes installation failure for platforms missing `nroff -mandoc'.

Bump PKGREVISION.
2012-09-22 06:20:21 +00:00
jaapb
57d0741dde Added my missing package subdirectories to category Makefiles. 2012-09-20 06:44:28 +00:00
jaapb
5cefb433ae Added qoauth 1.0.1 as security/qoauth.
QOAuth is a library to support interaction with OAuth-powered network services,
such as StatusNet or Twitter, in a Qt way.
2012-09-16 20:03:31 +00:00
cheusov
8ef2b417bd CONFLICTS with gethost-[0-9]*; ++pkgrevision
Fixes for minor pkglint warnings
2012-09-16 19:24:24 +00:00
cheusov
56539b1eaf CONFLICTS with STk-[0-9]*; ++pkgrevision
Set LICENSE
Fix pkglint warnings
2012-09-16 18:02:55 +00:00
taca
73c1ca8e38 Make this package to ruby18 (Ruby 1.8.7) only. 2012-09-16 16:35:13 +00:00
dholland
3bff22b5bf Fix this properly; retrieve the random pool size the same way rndctl(8)
does. Thanks to tls@ for pointers. PKGREVISION -> 2.
2012-09-16 04:33:43 +00:00
dholland
56896f9d15 Deploy a gross hack to make this buildable on -current and maybe -6.
XXX: This should be reverted and done a different way, or maybe not at all;
XXX: this package should probably be reviewed for soundness.
2012-09-16 03:21:47 +00:00
obache
7c38d37fd9 Recursive bump from mysql51-client library changed to use openssl. 2012-09-15 15:03:21 +00:00
obache
8ace00dcd8 recursive bump from libffi shlib major bump
(additionaly, reset PKGREVISION of qt4-* sub packages from base qt4 update)
2012-09-15 10:03:29 +00:00
taca
cbe3836f8d Update F-PROT Antivirus to 6.2.2.
Quote from release announce:

The only changes in this version are licensing information updates in the
documentation.
2012-09-14 15:50:26 +00:00
cheusov
05c7e39a8c Remove emacs from dependencies because it may be used
by other programs. One example is ssmtp. ++pkgrevision
2012-09-14 13:20:22 +00:00
jperkin
6a22aa2336 USE_TOOLS+= xgettext 2012-09-12 11:28:48 +00:00
dholland
f17eaf9fb2 USE_TOOLS+=yacc 2012-09-11 19:46:57 +00:00
cheusov
5a576fe58e CONFLICTS with heimdal, libdes and arla; ++pkgrevision 2012-09-09 18:02:43 +00:00
abs
7cbdc65938 Updated security/p5-pcsc to 1.4.12
2011-03-06  Ludovic Rousseau  <rousseau@debian>

	* README: release 1.4.12

	* PCSC.xs: Also check for SVt_PVIV and not just SVt_IV.

	Fixes Debian bug #613722 "libpcsc-perl: GetStatusChange error after print"

	* PCSC.xs, PCSC.pm, test.pl: Use lines of less than 80 columns

2010-10-27  Ludovic Rousseau  <rousseau@debian>

	* create_distrib.sh: compress using bzip2 instead of gzip

	* README: release 1.4.11

	* PCSCperl.h: SCardCancelTransaction() is no more present in pcsc-lite

	* PCSC.pm, PCSC.pod, PCSC.xs, PCSCperl.h:
	SCardSetTimout is no more present in pcsc-lite > 1.6.4
	It was a pcsc-lite specific and deprecated function

2010-08-18  Ludovic Rousseau  <rousseau@debian>

	* PCSCperl.h:
	use SCARD_READERSTATE * instead of LPSCARD_READERSTATE since is not
	define in pcsc-lite < 1.6.3

	* README: release 1.4.10

	* PCSC.pm, PCSC.xs, PCSCperl.h, README: Update copyright date

	* create_distrib.sh: Allow more than one digit in the version numbers

	* PCSC.xs, PCSCperl.h:
	Use LPSCARD_READERSTATE instead of LPSCARD_READERSTATE_A since it is no
	more defined in pcsc-lite >= 1.6.2

2010-06-30  Ludovic Rousseau  <rousseau@debian>

	* README: release 1.4.9

	* PCSC.pm, PCSC.pod, PCSC.xs: sort constants in alphabetical order

	* PCSC.pod, PCSC.xs:
	SCARD_E_UNSUPPORTED_FEATURE is not specific to pcsc-lite but is also
	available on Windows

	* PCSC.pm, PCSC.pod, PCSC.xs:
	SCARD_W_INSERTED_CARD is no more defined in pcsc-lite 1.6.0 and then
	pcsc-perl failed to build. It was an error code specific to pcsc-lite.

2010-01-03  Ludovic Rousseau  <rousseau@debian>

	* Card/Card.pod: fix spelling error

2009-09-23  Ludovic Rousseau  <rousseau@debian>

	* README: release 1.4.8

	* Card/Card.pod: Correct 3 bugs signaled by podchecker

2009-09-06  Ludovic Rousseau  <rousseau@debian>

	* PCSC.xs:
	PCSC.xs:853: warning: format ‘%d’ expects type ‘int’, but argument 2 has type ‘long unsigned int’

2008-09-28  Ludovic Rousseau  <rousseau@debian>

	* PCSC.pod: example code for GetStatusChange()
2012-09-09 13:27:21 +00:00
cheusov
ea3d84b207 Add CONFLICTS with kth-krb4 (lib/libsl.so) 2012-09-09 09:23:06 +00:00
adam
e7608643ab Revbump after updating graphics/cairo 2012-09-07 19:16:05 +00:00
obache
293298f6b1 Update ruby-oauth to 0.4.7.
=== 0.4.7 2012-09-03

* Fix merging paths if the path is not empty
* Set a configurable timeout for all requests (Rick Olson)
* Fix nested hash params in Consumer#request (Ernie Miller)
2012-09-06 12:30:44 +00:00
sno
4e0d388fe7 Changing all PERL5_MODULE_TYPE from Module::Install to M::I::Bundled,
Module::Install is for Authors only.

Bumping revision
2012-09-03 11:16:19 +00:00
obache
633708150d Recursive bump from boost-libs update. 2012-08-29 11:22:09 +00:00
dholland
8f10ca11fd Not MAKE_JOBS_SAFE. 2012-08-29 09:05:31 +00:00
wiz
d24da612d4 Explicitly disable guile. PR 46830 by Sergey Litvinov. 2012-08-24 13:36:52 +00:00
marino
95c0e86f35 Recursive PKGREVISION bump for tcl and tk upgrade to 8.5.12 2012-08-21 23:49:18 +00:00
marino
dba74c080c security/tcl-tls: Add tcl 8.5 support
The PLIST was hardcoded for libtls150.so.  Build With tcl 8.5, the
generated library becomes libtls85.so.  Use the tcl Makefile.version
file to generate a PLIST_SUBST variable to make this future-proof.
2012-08-21 21:56:13 +00:00
adam
810c47f2a9 Changes 1.10.3:
This is a bugfix release.
* Fix KDC uninitialized pointer vulnerabilities that could lead to a denial of
  service [CVE-2012-1014] or remote code execution [CVE-2012-1015].
* Correctly use default_tgs_enctypes instead of default_tkt_enctypes for TGS
  requests.
2012-08-20 08:16:26 +00:00
ryoon
08d62b2732 Recursive revbump from graphics/libwebp update.
Thank you, obache@.
2012-08-18 08:49:40 +00:00
drochner
0ac7c9c382 sync w/ base pkg 2012-08-15 17:48:44 +00:00
drochner
7f6410c859 update to 0.8.2
changes:
* New SETTIMEOUT command for the qt4 pinentry.
* Wide character support for the curses pinentry.
* Various bug fixes.
2012-08-15 17:47:56 +00:00
wiz
fa1910b167 Update to 1.6 from Jaap Boender in PR 46800:
This update of ocaml-cryptokit to its newest version, 1.6. does
not actually change anything in the functionality of the software.
Upstream, the build system has changed, and there are also a few
changes to the package (most notably, removal of the PLIST.opt in
favour of the PLIST_VARS system)
2012-08-15 08:24:58 +00:00
drochner
a1e371645f update to 2012.55
changes: fix a use-after-free bug which could be used to potentially
execute arbitrary code with root privileges, provided that the user
has been authenticated using a public key and also that a command
restriction is enforced (the "command" option must be used in
the authorized_keys file)
2012-08-13 17:47:26 +00:00
wiz
3ebfad8824 Bump PKGREVISION for fix in librsvg/buildlink3.mk. 2012-08-13 14:25:37 +00:00
pettai
f0e589c0b1 OpenDNSSEC 1.3.10
Bugfixes:
* SUPPORT-30: RRSIGs are left in the signed zone when authoritative RRsets
  become glue [OPENDNSSEC-282].
* OPENDNSSEC-261: Ldns fails to parse RR that seems syntactically correct.
  Was due to memory allocation issues. Provided better log message.
* OPENDNSSEC-285: Signer segfault for 6 or more -v options
* OPENDNSSEC-298: Only unlink existing pidfile on exit if we wrote it.
* OPENDNSSEC-303: Return if open/parse of zonelist.xml fails in ksmutil.c
  update_zones() and cmd_listzone().
* OPENDNSSEC-304: Signer Engine: Check pidfile on startup, if pidfile exists
  and corresponding process is running, then complain and exit.
* Signer seems to hang on a ods-signer command. Shutdown client explicitly
  with shutdown().
* opendnssec.spec file removed
2012-08-13 13:50:06 +00:00
marino
5ccf30c047 security/aide06: Fix regression caused by bison 2.6.x
Bison 2.6.x+ handles the yydebug functionality differently by predefining
YYDEBUG.  The yacc logic is not expecting YYDEBUG to be defined without
an value, so it breaks on an "#if YYDEBUG" macro in a few places.

In order to make this work with pre-2.6 bison as well as current versions,
hard code the inclusion of debug symbols.  It doesn't hurt anything and
it fixes the package.
2012-08-12 09:15:07 +00:00
agc
7202859ef1 add and enable dhbitty 2012-08-11 17:44:46 +00:00
agc
206f0ed215 Import dhbitty-20120812 into the Packages Collection.
dhbitty is a small public key encryption program written in C.  It
	uses elliptic curve Diffie-Hellman in the form of Curve25519 to
	establish a shared secret between two users, and uses that secret to
	symmetrically encrypt and authenticate messages.

	There are no private key files; only passphrases.  Never lose that
	pesky thing again.

	Both the sender and the receiver can decrypt a message.  In fact,
	there is no distinction between sender and receiver.  Both passphrases
	must be strong.

	There is no signing.  A similarly useful form of authentication occurs
	using only DH.  dhbitty attempts to be as simple as possible.  It is
	not optimized, but achieves a comfortable speed for most uses.  It
	does not use floating point numbers, or integers longer than 32 bits.
	It does not contain more algorithms than are needed.

Example

   This is how Alice generates her public key with dhbitty:
$ dhbitty generate alice_public_key.txt
username:passphrase (this is visible!): alice:Keyfiles be damned!
Done.

   Bob will do the same thing:
$ dhbitty generate bob_public_key.txt
username:passphrase (this is visible!): bob:Bob's Spectacular Passphrase
Done.

   Alice will publish her alice_public_key.txt, and Bob will publish his bob_public_key.txt. They can now access each other's
   public keys. (But they should be careful that Eve cannot surreptitiously replace either public key with her own!)

   Alice wants to send files to Bob. She packages them into a .tar archive (or any other type of archive with timestamps), along
   with her message. Then she uses dhbitty:
$ dhbitty encrypt bob_public_key.txt files_to_bob.tar files_to_bob.tar.dhbt
username:passphrase (this is visible!): alice:Keyfiles be damned!
Done.

   Alice sends files_to_bob.tar.dhbt to Bob. Bob will use dhbitty to decrypt this archive:
$ dhbitty decrypt files_to_bob.tar.dhbt files_to_bob.tar
username:passphrase (this is visible!): bob:Bob's Spectacular Passphrase
This is the public key of file's secondary owner:
0002f02b318c307bac07f3148a33c975cea04b79a870f0a5c7771cd38cc1986e
Done.

   Bob can verify that the public key dhbitty just gave him indeed is Alice's public key. He unpacks the now-decrypted archive to
   access the files Alice sent to him.

   In practice, Alice and Bob should use a system like diceware to pick passphrases, in order to be confident of their strength.
   Seven words picked using diceware is a good choice.
2012-08-11 17:43:46 +00:00
jmmv
dbe36493a1 Update to 1.0: use distfile provided by upstream. 2012-08-11 17:09:43 +00:00
marino
06560370f4 security/isakmpd: Mark NOT-FOR-DRAGONFLY
DragonFly users are referred to the security/racoon2 instead.
2012-08-11 14:20:55 +00:00
marino
1f04ab1257 security/mit-krb5: USE_TOOLS+= msgfmt
Note: Nobody that uses git from pkgsrc can install this package.
It conflicts with security/heimdal which is sucked in by dependencies
of scmgit-base.  Since the default way of acquiring pkgsrc on
DragonFly is via git, which is provided by the releases and daily
snapshots, effectively this can't be installed by DragonFly users.

Solving the conflict with heimdal, if possible, would be nice.
2012-08-09 20:15:20 +00:00
drochner
911770e2c6 update to 3.0.22
changes: bugfixes
2012-08-09 18:58:11 +00:00
obache
7cb824b26f Improve detection of __sync_add_and_fetch, avoid compiler optimization.
Fixes PR 46779.
2012-08-07 13:54:21 +00:00
obache
b8d6e4640f Bump PKGREVISION for change of PostgreSQL default version to 9.1. 2012-08-05 10:02:09 +00:00
jperkin
cee83ff46e Avoid conflict between gets() and std::gets().
Fixes build on at least Solaris.
2012-08-02 09:37:32 +00:00
reed
855ebf79de needs newer dbus to build 2012-07-28 21:48:17 +00:00
drochner
69cdaa913c update to 3.0.21
changes
-DTLS improvements
-bugfixes
2012-07-24 18:34:06 +00:00
obache
acbdda68a5 Update ruby-simple_oauth to 0.1.9.
bug fixes.
2012-07-22 12:38:41 +00:00
wiz
8b9c7c315c Remove "WWW: URL" from DESCR. Common in FreeBSD ports, but in pkgsrc the
URL should be as HOMEPAGE in the Makefile.
2012-07-21 20:07:59 +00:00
fhajny
e9bcea3c0a Add back hashes for HPN, dropped in the last commit 2012-07-20 14:17:23 +00:00
adam
4b099cdc54 Changes 7.6.4:
Bug fixes
2012-07-20 09:58:36 +00:00
marino
7c01492829 security/zkt: Fix DragonFly regression
When this package was updated to version 1.1, it stopped building on
DragonFly.  The main issue is that DragonFly doesn't have bind in its
base.  NetBSD does, so it zkt finds it there, but otherwise it needs
the configuration switch --enable-binutil-path to be used.  This was
added for DragonFly to point at ${PREFIX}/sbin.

zkt requires bind to be installed in order to build.  Unlike other
packages like python, postgresql, and ruby where the mk.conf can
define a version otherwise a default is used, no such mechanism
exists to hand the four separate bind packages (at least I don't know
about one).  So the inclusion of bind99 is a hack I'm not too proud
of, but I don't have a better solution.  With it, it builds in clean
environments like pbulk chroot and Tinderbox.  If an individual user
is building from source, they'll be smart enough to comment out this
include if another version of bind is already installed (zkt will
fail on a bind build conflict).

I suspect DragonFly is rather unique in not having bind in base, so
for now this is left as a DragonFly-specific section.  Something
like net/bind99/builtin.mk could possibly be used to determine if
no builtin bind is available and thus follow DragonFly approach.  I
shall leave it to others to decide.
2012-07-18 20:44:38 +00:00
marino
3c58e1e2a1 security/openvas-libraries: Fix regression due to upgrade to gnutils 3.0
GNUTLS deprecated gnutils_transport_set_lowat function in version 2.12.0
and finally removed it with version 3.0, breaking any packages that
still reference it.

The lowat feature is now disabled permanently I think.
The patch uses the GNUTLS_VERSION_NUMBER macro to appropriately conceal
the function reference.  The same patch is widely seen on the 'net with
other packages that use gnutls like OpenVAS.
2012-07-18 09:52:44 +00:00
jperkin
42b919c077 Fix install on at least Solaris. 2012-07-18 09:48:10 +00:00
cheusov
f91e90a6cf Take maintainership. FUKAUMI Naoki didn't object. 2012-07-17 23:19:19 +00:00
cheusov
14ace21090 starttls.{el,elc} files are not provided by the package anymore. The problem
is starttls's implementation is incompatible with emacs 22, 23 and probably
24 too, as a result sending emails with ssl/tls authorization fail due to
this
conflict.  emacs-21 has its own starttls.el too and I believe it is also
sufficient. I wonder if someone still uses emacs-20 and its smtpmail.el for
sending emails. This change was tested on NetBSD-6 and emacs-{22,23}.

starttls package now DEPENDS on emacs-[0-9]*, that is any emacs flavour is
good enough

Set LICENSE to gnu-gpl-v2

++pkgrevision
2012-07-17 18:08:02 +00:00
marino
aeba6e8356 security/libgpg-error: Disable NLS on i386-DragonFly
It seems that I386 DragonFly (x86_64 is okay), invoking libintl's
bindtextdomain causes pkgsrc's libintl to segfault on a thread
locking operation.  Anything linking with libgpg-error on i386
will consequently core dump.

Recognizing this treating the symptom, this patch disabled NLS on
I386 DragonFly.
2012-07-17 16:01:10 +00:00
adam
087f302985 MASTER_SITES cosmetic change 2012-07-16 19:13:23 +00:00
adam
e0d8895900 Changes 1.10.2:
This is a bugfix release.
* Fix an interop issue with Windows Server 2008 R2 Read-Only Domain Controllers.
* Update a workaround for a glibc bug that would cause DNS PTR queries to occur
  even when rdns = false.
* Fix a kadmind denial of service issue (null pointer dereference), which could
  only be triggered by an administrator with the "create" privilege.
  [CVE-2012-1013]

Changes 1.10.1:
This is a bugfix release.
* Fix access controls for KDB string attributes [CVE-2012-1012]
* Make the ASN.1 encoding of key version numbers interoperate with Windows
  Read-Only Domain Controllers
* Avoid generating spurious password expiry warnings in cases where the KDC
  sends an account expiry time without a password expiry time.
2012-07-16 19:12:33 +00:00
cheusov
caf662e3db Fix a segfault of starttls(1) when run without arguments
Add LICENSE
++pkgrevision
2012-07-15 11:12:21 +00:00
wiz
0e2c441278 Recursive bump for startup-notification* dependency change, requested
by Obache.
2012-07-15 08:22:46 +00:00
wiz
fb2cb2d652 Update to 0.4.6, from Jaap Boender.
0.4.6 (2011-10-16)
=====
* Added write_certificate function.
* Remove support for SSLv2, which was dropped upstream (thanks Dario Teixeira).
* Added support for compiling under Win32 (thanks David Allsopp), see
  README.win32.
* Check for pthreads in configure.

0.4.5 (2011-03-01)
=====
* Use pthread mutexes for locking thread-safe version of ssl.

0.4.4 (2010-01-06)
=====
* Use SSL_CTX_use_certificate_chain_file instead of
  SSL_CTX_use_certificate_file.
* Added support for --enable-debugging configure option.
* Don't link with unix library and don't build in custom mode.

0.4.3 (2008-12-18)
=====
* Don't use blocking sections in finalizers since it causes segfaults (thanks
  Grégoire Henry and Stéphane Glondu).
2012-07-14 21:23:49 +00:00
chs
ec74df8fa6 update required version to 2.4, the new gnutls needs it. 2012-07-09 04:50:12 +00:00
sbd
8b9d50ff08 Add missing zlib buildlink.
Bump PKGREVISION.
2012-07-08 09:56:09 +00:00
sno
808519a68a Updating package for Perl 5 module Digest::MD5 in security/p5-Digest-MD5
from 2.51nb1 to 2.52.

Upstream changes:
2012-06-08   Gisle Aas <gisle@ActiveState.com>

   Gisle Aas (3):
      Wrong version number in the changelog
      The t/threads.t was missing from the MANIFEST
      Update expected digests for files

   Andrew Fresh (1):
      Remove double the

   Lyle Hopkins (1):
      Digest::Perl::MD5 OO fallback didn't work [RT#66634]

   Peter J. Acklam (1):
      Fix typos (spelling errors) in cpan/Digest-MD5/*

   Shlomi Fish (1):
      Modernize the code in the POD.

   Zefram (1):
      Makes Digest::MD5 work on Perl 5.6 [RT#75032]
2012-07-06 13:22:13 +00:00
sno
ca67bdba9e Updating package for Perl 5 module IO::Socket::SSL in
security/p5-IO-Socket-SSL from 1.74 to 1.76.

Upstream changes:
v1.76 2012.06.18
- no longer depend on Socket.pm 1.95 for inet_pton, but use Socket6.pm if
  no current Socket.pm is available. Thanks to paul[AT]city-fan[DOT]org
  for pointing out the problem and providing first patch
v1.75 2012.06.15
- made it possible to explicitly disable TLSv11 and TLSv12 in SSL_version
2012-07-06 13:19:11 +00:00
drochner
5dec50dedb revbump for libpreluse requirement bump 2012-07-05 16:09:18 +00:00
drochner
cd66720cd6 revursive revbump for gnutls update 2012-07-05 16:07:18 +00:00
drochner
cd9b627226 more PKGREV bumps for gnutls update 2012-07-05 15:44:06 +00:00
drochner
c844dabc0e make this build with gnutls-3, bump PKGREV 2012-07-05 15:42:55 +00:00
drochner
341d76d0e0 update to 3.4.1
This switches to the gnome-3.4 branch
(Seems to be source and binary compatible to the 2.32 one, no need
to keep the old version.)
2012-07-04 20:10:25 +00:00
schwarz
d5c2804398 patch away special paths for MacOS X since they are not supported by pkgsrc.
Treat MacOS X just like any other UNIX system.
2012-07-03 18:37:55 +00:00
schwarz
199abe63c8 added LICENSE information 2012-07-03 18:36:56 +00:00
drochner
a6f7292569 update to 3.0,20
This switches to the new stable release branch.
2012-07-02 18:53:02 +00:00
drochner
f33839ff50 update to 2.0.3
changes:
-fix for pipe servers
-build system improvements
2012-07-02 16:59:40 +00:00
drochner
0568b1ca8d update to 1.12.20
changes: bugfixes:
-Fixed memory leak in PKCS #8 key import
-Check key identifiers when checking for an issuer

pkgsrc note: This is just a last checkpoint on the 2.x branch, in case
 it will be needed for the Q2 branch. Will update to 3.x RSN.
2012-07-02 16:30:01 +00:00
adam
866b730e71 Revbump after updating boost 2012-07-02 13:37:35 +00:00
adam
416ae8a156 Changes 0.97.5:
* libclamav: Scan output at end of truncated tar
* libclamav: Fix handling of tar file with malformed header
* libclamav: Scan chm with invalid handling
* freshclam: give custom dbs higher priority during update
* libclamav: detect read races and abort the scan with an error
* libclamav/pe.c: drop old header check
2012-07-02 07:12:58 +00:00
gls
a5fd794a31 Update security/py-ssh to 1.7.14
Upstream changes:
-----------------

## ssh 1.7.14 (2012-05-07)

* #15: Implemented parameter substitution in SSHConfig, matching the
  implementation of `ssh_config(5)`. Thanks to Olle Lundberg for the patch.
* #24: Switch some internal type checking to use `isinstance` to help prevent
  problems with client libraries using subclasses of builtin types. Thanks to
  Alex Morega for the patch.
* [Fabric #562](https://github.com/fabric/fabric/issues/562): Agent forwarding
  would error out (with `Authentication response too long`) or freeze, when more
  than one remote connection to the local agent was active at the same time.
  This has been fixed. Thanks to Steven McDonald for assisting in
  troubleshooting/patching, and to GitHub user `@lynxis` for providing the
  final version of the patch.
2012-07-01 19:24:34 +00:00
dholland
49cfd098d9 Add desktopdb.mk and bump PKGREVISION for 118 packages as reported by
pkglint. If any of these are wrong for some reason, please revert/adjust.
2012-07-01 19:05:10 +00:00
dholland
54ef30d063 Mask this on apache24 as it doesn't compile. 2012-06-30 20:20:44 +00:00
taca
b97f01f64b Update F-PROT Antivirus packages to 6.2.1.
===
F-PROT Antivirus for Unix, version 6.2.1

Compatibility for older Linux distros improved (glibc 2.3 for 32 bit version and glibc 2.4 for 64 bit version)

Compatibility for older Solaris/SunOS version improved (both 32 and 64 bit versions are compatible with solaris 8 now)

64 bit FreeBSD now supported

===
F-PROT Antivirus for Unix, version 6.2.0

Scan engine upgraded from 4.6.2 to 4.6.5 with improved detection rates and fewer false positives.

Multiple issues with the mail scanners have been fixed.

===
F-PROT Antivirus for Unix, version 6.1.1

fpupdate fix to prevent crash on certain 64 bit Linux systems.
2012-06-29 14:49:38 +00:00
jperkin
a31ffeddd6 Add missing INSTALLATION_DIRS. 2012-06-24 07:20:23 +00:00
dholland
69dab7c470 Honor pkgsrc LIBS. 2012-06-23 23:07:20 +00:00
pettai
2393a8f9db OpenDNSSEC 1.3.9
* OPENDNSSEC-277: Enforcer: Performance optimisation of database access.

Bugfixes:
* SUPPORT-27: ods-ksmutil: simplify zone delete so that it only marks keys as
  dead (rather than actually removing them). Leave the key removal to purge
  jobs.

(Ok'ed by wiz@)
2012-06-21 12:46:12 +00:00
dholland
497f3196ea Not MAKE_JOBS_SAFE. 2012-06-16 23:45:39 +00:00
dholland
e8f3fdc890 Add patch I've been carrying around to fix the MAKE_JOBS build. 2012-06-16 23:21:14 +00:00
pettai
c0a767c33e zkt 1.1 -- 30. Jan 2012
* misc  Release numbering changed to three level "major.minor.revison" scheme
* bug   REMOVE_HOLD_TIME was set to 10 days only (Thanks to Chris Thompson)
* doc   Improved README file (Thanks to Jan-Piet Mens)
* misc  Fix of some typos in log messages
* bug   Fixed error in rollover.c (return code of genfirstkey() wasn't checked)
* misc  Default of KeySetDir changed from NULL to ".." (best for hierarchical mode)
        Default Sig Lifetime changed from 10 days to 3 weeks (21 days)
        Default ZSK lifetime changed from 3 months to 4 times the sig lifetime
        Default KSK lifetime changed from 1 year to 2 years
        Parameter checks in checkconfig() adapted.
        KSK random device changed back from /dev/urandom to BIND default
        (Be aware of some possibly long delay in key generation)
* func  New configure option to set the bind utility path manually (--enable-bindutil_path)
        BIND_UTIL_PATH in config_zkt.h will no longer used
* bug   If nsec3 is turned on and KeyAlgo (or AddKeyAlgo) is RSHASHA1
        or DSA, genkey() uses algorithm type NSECRSASHA1 or NSEC3DSA instead.
* bug   Error in printconfigdiff() fixed. (Thanks to Holger Wirtz)
* func  Description added to (some of the) dnssec.conf parameters
* func  Adding a patch from Hrant Dadivanyan to always pre-publish ZSKs
* misc  Config file syntax changed to parameter names without underscores.
        zkt-conf uses ZKT_VERSION string as config version
* bug   "make install-man" now installs all man page
* bug   Bug fixed in zfparse.c. zkt-conf was unable to detect an already
        included dnskey.db file if another file was included.
* misc  destination dnssec-zkt removed from Makefile.in
* func  dki_prt_managedkeys() added to dki.c
        zkt_list_managedkeys() added to zkt.c
        zkt-ls has new option -M to print out a list of managed-keys
* bug   Bug fixed in the config parser (zconf.c). Couldn't parse
        agorithm RSASHA512 correctly (Thanks to Michael Sinatra)
2012-06-16 22:55:25 +00:00
dholland
5e4ffdca7a Remove 52 from PHP_VERSIONS_ACCEPTED. 2012-06-16 22:34:23 +00:00
pettai
b1d9ddffcf pam-krb5 4.6
* Add an anon_fast option that attempts anonymous authentication
    (generally implemented via anonymous PKINIT inside the Kerberos
    library) and then, if successful, uses those credentials for FAST
    armor.  If fast_ccache and anon_fast are both specified, anonymous
    authentication will be used as a fallback if the specified FAST ticket
    cache doesn't exist.  Based on patches from Yair Yarom.
  * Add a user_realm option to only set the realm for unqualified user
    principals.  This differs from the existing realm option in that realm
    also changes the default realm for authorization decisions and for
    verification of credentials.  Update the realm option documentation to
    clarify the differences and remove incorrect information.  Patch from
    Roland C. Dowdeswell.
  * Add a no_prompt option to suppress the PAM module's prompt for the
    user's password and defer all prompting to the Kerberos library.  This
    allows the Kerberos library to have complete control of the prompting
    process, which may be desireable if authentication mechanisms other
    than password are in use.  Be aware that, with this option set, the
    PAM module has no control over the contents of the prompt and cannot
    store the user's password in the PAM data.  Based on a patch by Yair
    Yarom.
  * Add a silent option to force the module to behave as if the
    application had passed in PAM_SILENT and suppress text messages and
    errors from the Kerberos library.  Patch from Yair Yarom.
  * Add preliminary support for Kerberos trace logging via a trace option
    that enables trace logging if supported by the underlying Kerberos
    library.  The option takes as an argument the file name to which to
    log trace output.  This option does not yet work with any released
    version of Kerberos, but may work with the next release of MIT
    Kerberos.
  * MIT Kerberos does not add a colon and space to its password prompts,
    but Heimdal does.  pam-krb5 previously unconditionally added a colon
    and space, resulting in doubled colons with Heimdal.  Work around this
    inconsistency by not adding the colon and space if already present.
  * Fix alt_auth_map support to preserve the realm of the authentication
    identity when forming the alternate authentication principal, matching
    the documentation.
  * Document that the alt_auth_map format may contain a realm to force all
    mapped principals to be in that realm.  In that case, don't add the
    realm of the authentication identity.  Note that this can be used as a
    simple way to attempt authentication in an alternate realm first and
    then fall back to the local realm, although any complex attempt at
    authentication in multiple realms should instead run the module
    multiple times with different realm settings.
  * Avoid a NULL pointer dereference if krb5_init_context fails.
  * Fix initialization of time values in the module configuration on
    platforms (like S/390X) where krb5_deltat is not equivalent to long.
  * Close a memory leak when search_k5login is set but the user has no
    .k5login file.
  * Close several memory leaks in alt_auth_map support.
  * Suppress bogus error messages about unknown option for the realm
    option.  The option was being parsed and honored despite the error.
  * Retry authentication under try_first_pass on several other errors in
    addition to decrypt integrity check errors to handle a wider array of
    possible "password incorrect" error messages from the KDC.
  * Update to rra-c-util 4.4:
  * Update to C TAP Harness 1.12:
2012-06-16 22:15:23 +00:00
pettai
c9399c2f6c Add pam.bl3.mk. 2012-06-16 22:06:34 +00:00
dholland
55564af8a1 +gnome-keyring-sharp 2012-06-16 22:01:17 +00:00
dholland
75befa2938 Import gnome-keyring-sharp from wip (with only a couple trivial adjustments)
so f-spot can use it.
2012-06-16 22:00:23 +00:00
pettai
332ae8608f 1.3.6
* Added libpam-runtime support for debian
* Added use_first_pass and try_first_pass option, thanks to Luc Ducazu <lducazu@gmail.com>
* Changed e-mail adres to jeroen@jeroennijhof.nl
* Improved accounting, added cmd attribute for command logging
* Added tac_acct_flag2str()
* Renamed tac_account_read, tac_account_send to tac_acct_read and tac_acct_send
* pam_tacplus.spec.in: fixed static library path and pam_tacplus.so location
* Debian packaging improvements
2012-06-16 21:59:41 +00:00
pettai
315cec48e3 1.12.2 (5/3/12)
- Bux fix release
   - Rollerd's -alwayssign flag logic had a critical error that could
     have caused a zone to be signed with the wrong ZSK at particular
     points of the ZSK key rolling process.
2012-06-16 21:25:58 +00:00
pettai
79686a6afa Version 2.12 (released 2012-06-15)
* Only use libyubikey when --with-cr is used.

 * Set correct permissions on tempfile.

 * YubiKey 2.2 contains a bug in challenge-response that makes it output the
   same response to all challenges unless HMAC_LT64 is set. Add warnings to
   ykpamcfg and a warning through conversate in the pam module. Keys programmed
   like this should be reprogrammed with the HMAC_LT64 flag set.
2012-06-16 20:45:33 +00:00
pettai
7fb5b4ca15 Version 1.6.4 (released 2012-05-24)
* Implement option -ooath-id to easily set OATH token identifier.

 * Fix numerous compiler warnings from clang. Thanks to
   Clemens Lang <neverpanic@gmail.com>.
2012-06-16 20:38:51 +00:00
pettai
fc216b0fa6 Version 2.8 (released 2012-06-15)
* ykclient: Add C++ namespace protection.

 * Add multi-server support with curl_multi.
   Enabled by default for YubiCloud servers.
   Settable with the new library function set_template_urls() or
   the urls parameter to ykclient_verify_otp_v2().

 * Remove extra % in ykclient help.

 * Add ca path option to ykclient, --ca.
   Patch from Jay Kline <jay.kline.ctr@hpcmo.hpc.mil>.

 * Make the nonce unique for consecutive calls to the same ykclient handle.

 * Do url encoding of OTP before sending.

 * Fix segfault on curl error.
   Patch from Lee Hinman <lee.hinman.ctr@hpc.mil>
2012-06-16 20:32:05 +00:00
pettai
a71490339a Version 1.9 (released 2012-05-31)
* Updated ld-version-script from gnulib to silence warnings.

* Fix out-of-tree builds.
2012-06-16 20:26:12 +00:00
pettai
77c262527f Added sks 2012-06-16 18:59:13 +00:00
pettai
38fe534e54 SKS is a new OpenPGP keyserver whose goal is to provide easy to deploy,
decentralized, and highly reliable synchronization.  That means that a key
submitted to one SKS server will quickly be distributed to all key servers,
and even wildly out-of-date servers, or servers that experience spotty
connectivity, can fully synchronize with rest of the system.
2012-06-16 18:55:30 +00:00
taca
dc9064040d Remove php-mhash which is only supported by PHP 5.2. 2012-06-16 15:09:36 +00:00