Commit graph

6456 commits

Author SHA1 Message Date
wen
6acdcf18fb Update to 2.31
Upstream changes:
2.31    Tue Oct 30 07:03:40 EDT 2012
	- Fixes to regular expressions to avoid rare failures to
          correctly strip padding in decoded messages.
        - Add padding type = "none".
        - Both fixes contributed by Bas van Sisseren.
2012-10-30 14:35:37 +00:00
markd
9866bf5db7 Update to 0.4.3
4+ years worth of patches.
2012-10-28 02:00:50 +00:00
wiz
44cbb90d8b + KeePass. 2012-10-27 22:19:01 +00:00
wiz
8a9de37b40 Import KeePass-2.20.1 as security/KeePass.
Today you need to remember many passwords. You need a password for
the Windows network logon, your e-mail account, your website's FTP
password, online passwords (like website member account), etc. etc.
etc. The list is endless. Also, you should use different passwords
for each account. Because if you use only one password everywhere
and someone gets this password you have a problem... A serious
problem. The thief would have access to your e-mail account, website,
etc. Unimaginable.

KeePass is a free open source password manager, which helps you to
manage your passwords in a secure way. You can put all your passwords
in one database, which is locked with one master key or a key file.
So you only have to remember one single master password or select
the key file to unlock the whole database. The databases are
encrypted using the best and most secure encryption algorithms
currently known (AES and Twofish).
2012-10-27 22:18:50 +00:00
wiz
f531cf3fcd Add comments to patches. 2012-10-27 17:39:12 +00:00
joerg
eaf5600a7b Use void for a few functions that need it. 2012-10-26 20:24:19 +00:00
joerg
f96e4c6b58 Allow unprivileged build on NetBSD, if bind is in base. 2012-10-24 16:05:15 +00:00
manu
756fd1358b Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shall
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
2012-10-24 09:01:40 +00:00
manu
7edb0c3452 Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shall
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
2012-10-24 08:33:51 +00:00
asau
40b91e7ab9 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 18:16:19 +00:00
manu
ff862ac29f Upgrade to lasso 2.3.6 in order to completely fix the libxml 2.9 dependency
ChangeLog Since 2.3.5:
 * fix a bug when receiving a signature using the InclusiveNamespaces
   PrefixList by copying namespace declaration from upper level at the level of
   the signed node.
 * fix compilation warning on recent version of GCC
2012-10-23 18:16:15 +00:00
schmonz
8f0dc12cf1 Restore INSTALLATION_DIRS and krb5.buildlink3.mk, lost in previous.
Indent while here.
2012-10-23 13:02:08 +00:00
elric
724dd1746f Update to knc 1.7. 2012-10-23 06:04:28 +00:00
wiz
2bcdfec626 Update to 1.49:
1.49 2012-09-25
     Fixed problem where on some platforms test t/local/07_tcpecho.t would
     bail out if it could not bind port 1212. Now now tries a number of ports to bind to until
     successful.
     Improvements to  unsigned casting contributed by Reini Urban.
     Improvements to Net::SSLeay::read to make it easier to use with non-blocking IO:
      contributed by James Marshall:  It modifies
      Net::SSLeay::read() to return the result from SSL_read() as the second
      return value, if Net::SSLeay::read() is called in list context.  Its
      behavior should be unchanged if called in scalar or void context.  This
      result code seems to be required for full support of non-blocking I/O,
      since users need to handle SSL_ERR_WANT_READ, SSL_ERROR_WANT_WRITE, etc.
      Fixed a problem where t/local/kwalitee.t fails with
       Module::CPANTS::Analyse 0.86. Patch from Paul.
      Fixed a number of typos patched by Giles.
      Fixed a compiler warning from Compiling with gcc-4.4 and -Wall, patched by Giles.
      Fixed problems with get_https4: documentation was wrong, $header_ref was
       not correctly set and $server_cert was not returned.
      Fixed a problem that could cause a Perl exception about no blength
      method on undef. Reported by "Stephen J. Smith via RT". https://rt.cpan.org/Ticket/Display.html?id=79309
      Added documentation about how to mitigatxe various SSL/TLS
     vulnerabilities.
     Fixed problem reported by Mike Doherty: SSL_MODE_* are defined in ssl.h,
     and should be available as constants, but I do not see them listed in constants.h
2012-10-21 22:28:16 +00:00
wiz
63d4534896 Update to 20120823. Replace interpreter in installed file.
20120823
  - Fix test (RT#79129, reported by Sinan Unur)

20120822
  - Add mk-ca-bundle.pl from git repository to distribution.
  - Add new/additional certificates from the following CAs: Verisign,
    UTN-USER, UTN USERFirst, Sonera, NetLock Qualified, SwissSign
    Platinum, S-TRUST, ComSign, Actalis, Trustis, StartCom, Buypass.
2012-10-21 22:25:19 +00:00
wiz
baa31dc007 Update to 1.77:
v1.77 2012.10.05
- update_peer for IPv6 also, applied fix to
  https://rt.cpan.org/Ticket/Display.html?id=79916 by
  tlhackque[AT]yahoo[DOT]com
2012-10-21 22:22:36 +00:00
wiz
40d3c54b03 Update to 5.72:
5.72  Mon Sep 24 15:22:08 MST 2012
	- adjusted module installation directory for later Perls
		-- As of 5.11 Perl searches 'site' first, so use that
			-- ref. INSTALLDIRS in Makefile.PL
		-- thanks to Robert Sedlacek for patch
2012-10-21 22:20:40 +00:00
wiz
216ba55f22 Update to 0.64:
0.64 2012-08-06 01:23:30

- Drastically simplify Makefile.PL to resolve RT bugs #61249, #61324,
  #63553, #68208, and #68084.

- Forgot to update Changes for 0.63, so this version overrides that.


0.61_05 2012-08-04 00:40:22 UTC

- Trying to distinguish between good vs bad zero returns from underlying
  SSL_read/SSL_write broke stuff (see RT bug #78695). Revert to previous
  behavior.

- Completely re-organize Makefile.PL. I hope these changes will help take
  care of RT bugs #61324, #61249, #63553, and #68084 etc. This is not
  necessarily finished, but I want to see what happens on CPAN Testers at
  this point before making a few other minor changes.

0.60 2012-07-29 21:43:47 UTC

- Release 0.59_03 as 0.60 so distributions can pick up various fixes. The most
  important one seems to be bug RT #70565. This should take care of bug RT
  #77167

- SSL_read and SSL_write now try to handle incomplete reads/writes (see bug RT
  RT #64054). The current test suite does is not very comprehensive, so caution
  is recommended at this point. Also, if you have good test cases, I would love
  to incorporate them into the distribution.

0.59_03 2012-03-10 00:45:28 UTC

- Bump version number and upload to CPAN.


0.59_02 2012-03-08 16:16:03 UTC

- Forgot to update Changes for 0.59_01. The following is a combined list of
  the more important fixes incorporated in both.

- Bug RT #64054: Handle incomplete reads/writes better

- Bug RT #73754: Add LWP::Protocol::https to PREREQ_PM

- Bug RT #73755: Crypt-SSLeay does not verify hosts (yet). Don't let that
  cause a failure during tests.

- Streamline t/02-live.t using Try::Tiny and done_testing

- Plus assorted related small changes.

0.58_01 2010-09-08 19:11:39 UTC

- L<text|scheme:...> is not supported in POD for 5.8.5 and earlier.
- TODOs in POD should stand out
- Add /boot/common/ssl and some other directories to unix_ssl_dirs (see bug
  #60936).
2012-10-21 22:19:14 +00:00
wiz
d4a974c4db Update to 0.13:
0.13
Updated the WRITE() method to use syswrite() and account for
variable buffer sizes in SASL.
2012-10-21 22:16:43 +00:00
wiz
61869bb86f Update to 2.16:
Authen-SASL 2.16 -- Tue Sep  4 11:01:18 CDT 2012

  * SASL.pod: fix typo [Peter Marschall]
  * Perl.pm: avoid warning on "uninitialized value" [Peter Marschall]
2012-10-21 22:14:51 +00:00
wen
ab9ceeb5f9 Update to 0.14
Upstream changes:
0.14  October 16, 2012
	- compiling with -Werror=format-security now works (Jerome Quelin, #48446)
	- Use Digest::SHA instead of Digest::SHA1 (Ansgar Burchardt, #60271)
	- Security fix, CVE-2009-0129: Missing error check in do_verify (Havard Eidnes, #79958)
2012-10-20 14:25:58 +00:00
pettai
1c3d937865 Added scrypt 2012-10-17 22:18:56 +00:00
pettai
2281e8547b A simple password-based encryption utility is available as a demonstration
of the scrypt key derivation function. On modern hardware and with default
parameters, the cost of cracking the password on a file encrypted by scrypt
enc is approximately 100 billion times more than the cost of cracking the
same password on a file encrypted by openssl enc; this means that a five-
character password using scrypt is stronger than a ten-character password
using openssl
2012-10-17 22:17:47 +00:00
adam
e871bbb82b MASTER_SITES fix 2012-10-12 15:37:12 +00:00
marino
1b71fe7899 security/qoauth: Fix DISTNAME and thus fetch
As soon as qoauth got PKGREV bump, this package could no longer fetch due
to a bad DISTNAME definition.  Fix DISTNAME to fix "make fetch".
2012-10-12 11:06:59 +00:00
marino
da604f2b06 security/mit-krb5: Fix build for gcc 4.7
Generated file didn't pass -Werror check on gcc4.7.  The problem is
well-known and already fixed on the current version of mit-krb5.  The
patch added here was taken from upstream.

No revbump necessary, won't change binary on systems that already built it.
2012-10-12 08:06:25 +00:00
drochner
e02daaded0 update to 3.0.24
changes:
-better IPv6 support
-bugfixes
-minor improvements
2012-10-10 11:44:30 +00:00
adam
ed93f0ca47 Revbump after updating graphics/pango 2012-10-08 23:00:34 +00:00
pettai
3329c5ef3f Update to Botan 1.8.14:
* 1.8.14, 2012-07-18

- The malloc allocator would return null instead of throwing in the event of
  an allocation failure, which could cause an application crash due to null
  pointer dereference where normally an exception would occur.
- Recent versions of OpenSSL include extra information in ECC private keys,
  the presence of which caused an exception when such a key was loaded by
  botan. The decoding of ECC private keys has been changed to ignore these
  fields if they are set.
- AutoSeeded_RNG has been changed to prefer /dev/random over /dev/urandom
- Fix detection of s390x (Debian bug 638347)
2012-10-08 20:46:38 +00:00
jaapb
be0a6937d1 Revision bump associated with the update of lang/ocaml to version 4. 2012-10-08 15:18:20 +00:00
obache
ce8cd25418 PKGNAME_NOREV must be used for DISTNAME.
fixes PR pkg/47043.
2012-10-07 12:31:13 +00:00
adam
9bab063ade Small clean-up 2012-10-05 20:01:23 +00:00
cheusov
f7d8bd898d CONFLICTS between lang/sr and security/srm 2012-10-05 17:17:04 +00:00
apb
35a3d960ea In the PLIST, add four files in ${PYSITELIB}/${EGG_INFODIR}.
In the Makefile, remove PYDISTUTILSPKG=yes, add
.include "../../lang/python/egg.mk", and set PKGREVISION=1.

This fixes errors from "make package" complaining about files
that were installed but not present in the PLIST.
2012-10-05 10:14:46 +00:00
wiz
8fd7e9c34c Add build dependency on p5-Perl4-CoreLibs, needed since a script
uses find.pl.
Reported by Jörn Clausen in PR 47036.
2012-10-05 09:36:31 +00:00
pettai
762273f8cc validns 0.6
Support for TLSA records.
        Support for ILNP (NID, L64, L3, LP) records (untested).
        Support for IPSECKEY records.
        Handle TYPEXXX for known types correctly.
        A number of NSEC3-related bug fixes.
        Miscellaneous bug fixes.
2012-10-04 20:30:57 +00:00
cheusov
fb1ffebcad Bump revision for packages with changed CONFLICTS (PYTHON_SELF_CONFLICT) 2012-10-04 00:21:58 +00:00
cheusov
2144a22c15 CONFLICTS between python modules 2012-10-03 23:40:35 +00:00
wiz
3184463075 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
adam
ae11b3ecb6 ClamAV 0.97.6 includes minor bug fixes and detection improvements. 2012-10-03 10:39:13 +00:00
wiz
e67687a4f4 Update to 2.14:
* Noteworthy changes in release 2.14 (2012-09-24) [stable]
- Added asn1_read_node_value() to obtain a node's value.
  This is to deprecate the export of the node_asn internal structure
  for the upcoming 3.x release.  The ASN1_DATA_NODE type and the
  ASN1_ETYPE_* constants were added to support the new function.
2012-10-02 17:36:00 +00:00
tron
78f9c75877 Mass recursive bump after the dependence fix of the "cairo" package
requested by Thomas Klausner.
2012-10-02 17:10:28 +00:00
he
8f9acab0f0 Apply a fix for CVE-2009-0129, taken from Debian's problem report.
Also reported upstream, ref.
  https://rt.cpan.org/Public/Bug/Display.html?id=79958
Bump PKGREVISION.
2012-10-02 07:58:00 +00:00
adam
3919eb3582 Fix building on Darwin 2012-09-28 12:31:59 +00:00
obache
fdae8ad45c add patches for libxml2>=2.9.0, new buffer structure. 2012-09-28 11:59:18 +00:00
obache
61adbcc0a3 LICENSE=gnu-gpl-v2 2012-09-28 11:52:22 +00:00
obache
fff6231f2b missing parts of recursive revbump for gnutls update. 2012-09-23 10:47:45 +00:00
obache
f911730ab3 Install man source into $(mandir)/man8 instead of catman for saslauthd(8),
or manpage will not displayed correctly with man(1).
It also fixes installation failure for platforms missing `nroff -mandoc'.

Bump PKGREVISION.
2012-09-22 06:20:21 +00:00
jaapb
57d0741dde Added my missing package subdirectories to category Makefiles. 2012-09-20 06:44:28 +00:00
jaapb
5cefb433ae Added qoauth 1.0.1 as security/qoauth.
QOAuth is a library to support interaction with OAuth-powered network services,
such as StatusNet or Twitter, in a Qt way.
2012-09-16 20:03:31 +00:00