Commit graph

6008 commits

Author SHA1 Message Date
tez
f4124f9abe add vendor patch 2011-006-patch-r18 from MITKRB5-SA-2011-006
this fixes CVE-2011-1528, CVE-2011-1529 & CVE-2011-4151
2011-10-23 19:58:16 +00:00
ryoon
a15d3c051a Recursive revbump after graphics/ImageMagick update. 2011-10-22 15:00:20 +00:00
hiramatsu
d3f3eef65e Update p5-Authen-Htpasswd to 0.171.
Changes from previous;
0.171  Tue Aug 09 13:09:00 BST 2011
    - re-disting because I failed to notice MYMETA.* in the dist

0.170  Tue Aug 09 12:17:00 BST 2011
    - fix user inflation code to handle arbitrary usernames
2011-10-21 21:09:43 +00:00
hiramatsu
e6ecd16fdb Add HOMEPAGE and LICENSE. 2011-10-21 04:47:22 +00:00
sbd
2661b26475 Deal with the fact that if /usr/include/ndbm.h exists on Linux it probably
belongs to gdbm_compat.  I.E. _don't_ use ndbm on Linux.
2011-10-18 21:59:17 +00:00
dholland
60c25b0fa4 +qca2-gnupg 2011-10-18 01:52:40 +00:00
obache
627d852b1b Relax dependency, Digest-1.00 module was imported into Perl base prior 5.7.1.
Bump PKGREVISION.
2011-10-18 01:06:33 +00:00
obache
2674f3bcba Update p5-Digest-CRC to 0.17.
(Drop dependency on p5-Digest, it is not required even with prior version).

0.17  Sat Aug 27 13:59:31 2011
        - fixed non-xs code, #70535
2011-10-18 01:03:06 +00:00
schnoebe
a7d1b8b1d4 Imported qca2-gnupg from pkgsrc-wip.
Taking a hint from the similarly-named Java Cryptography Architecture,
QCA aims to provide a straightforward and cross-platform crypto
API, using Qt datatypes and conventions. QCA separates the API from
the implementation, using plugins known as Providers. The advantage
of this model is to allow applications to avoid linking to or
explicitly depending on any particular cryptographic library. This
allows one to easily change or upgrade crypto implementations
without even needing to recompile the application. QCA should work
everywhere Qt does, including Windows/Unix/MacOSX.

Capabilities:
TLS, CMS, X.509, RSA, DSA, Diffie-Hellman, PKCS#7, PKCS#12, SHA0,
SHA1, SHA224, SHA256, SHA384, SHA512, MD2, MD4, MD5, RIPEMD160,
Blowfish, DES, 3DES, AES128, AES192, AES256, CAST5, HMAC(SHA1, MD5,
RIPEMD160), PBKDF1(MD2, SHA1), PBKDF2(SHA1)

This is the GnuPG plugin.

Packaged by jfranz@bsdprojects.net.
2011-10-18 00:46:58 +00:00
shattered
43d8d13cfc PR/42039 -- not available for NetBSD 4 and up. 2011-10-17 19:32:24 +00:00
obache
61888303c8 Honor VARBASE and PKG_SYSCONFDIR.
ride on last update.
2011-10-17 09:38:25 +00:00
obache
fd42b8fef6 Update pam-af to 1.0.2.
Bug fix release.
2011-10-17 08:47:51 +00:00
sbd
0637b07a30 No need to check for an interpreter in a perl module. 2011-10-17 00:02:59 +00:00
obache
dfef287860 Allow to accept any Python-2.x. 2011-10-14 13:00:01 +00:00
tron
785f9d0ada Mark as not multiple jobs safe. This fixes random build errors on my
dual core NetBSD/amd64 5.1_STABLE system.
2011-10-08 13:49:14 +00:00
shattered
b9b0692692 PR/29576 -- Use @RCD_SCRIPTS_SHELL@ in rc.d scripts, not /bin/sh 2011-10-07 22:37:02 +00:00
gls
59f09f0a7e Update security/p5-Crypt-DSA to 1.17
1.17 2011.06.16
- Upgrade to Module::Install 1.01
- Added support for OpenSSL 1.0.0 dsaparam format change.
- Requires perl 5.6 now
- Fixes for 64-bit support

While here, fix SA46275, with upstream patch from
https://rt.cpan.org/Public/Bug/Display.html?id=71421
2011-10-06 19:22:02 +00:00
drochner
6651578b0d move a comment to where it makes sense 2011-10-06 18:00:00 +00:00
drochner
64bf8268c3 update to 2.12.11
changes: bugfixes
2011-10-06 17:56:25 +00:00
hiramatsu
ca5a83bc99 Update p5-Data-SimplePassword to 0.07.
Change from previous:
0.07  Wed Feb 23 18:58:18 JST 2011
    * added -u switch to rndpassword(1).
    * optimized for tests.
    * fixed some typos.
2011-10-06 15:33:31 +00:00
hans
4df3a77d37 Look in /usr/sfw to find built-in openssl on SunOS 5.10. 2011-10-04 14:15:35 +00:00
abs
012bfe9443 ensure we disable selinux 2011-10-03 17:19:02 +00:00
agc
d78cfab49d rename the getline() function to nfsbug_getline() using SUBST, so that we
can build on more modern systems.
2011-10-03 05:24:38 +00:00
joerg
7c1538f5be Remove Nessus. The distfiles haven't been provided in a long, long time
by upstream and they haven't been mirrored either.
2011-10-02 18:18:05 +00:00
dholland
bffa68d6c3 Fix MAKE_JOBS build. This does not fix the bulk failure, which I can't
replicate and don't understand.
2011-10-02 05:04:03 +00:00
shattered
e0360cd413 Fix build on -current. 2011-10-01 11:36:11 +00:00
wiz
cefda018db Fix build on systems that define popcount(). 2011-09-29 21:10:32 +00:00
taca
ba3554263a Update F-PROT Antivirus 6.1.0:
f-prot-antivirus6-ws-bin
	f-prot-antivirus6-fs-bin
	f-prot-antivirus6-ms-bin

pkgsrc change:

* Now binary of F-PROT Antivirus are built on NetBSD 4, previously it 2.
  And it works on not only i386 but also amd64 netbsd32 compat.

From CHANGES:

* Scan engine upgraded from 4.5.1 to 4.6.2 with improved detection rates and
  fewer false positives.
* Fixes and clarification in documentatioon.
* New switches introduced in fpscan.
* Bugfix in fpscand resolves some rare issues on OpenBSD.
* Bugfix in fpupdate resolves compatibility issues on some Linux distros.
* Bugfix in fp-milter resolves issues on BSDs.
* Bugfix in fp.so resolves some issues on multiple platforms.
* Bugfix on fpupdate for AIX resolves an rare issue.
* Minor fixes to scan-mail.pl to improve filehandling.
* Minor improvements in the installer.
* Startup scripts improved for several platforms.
2011-09-25 14:13:48 +00:00
obache
3a491daa70 Update ruby-roauth to 0.0.8.
* escape params properly
2011-09-24 05:09:57 +00:00
ryoon
52d0ba2252 The patch in PR pkg/45280 applied.
* Fix build on DragonFly.
* The patches regen.

Tested on DragonFly/i386 2.10.1 and NetBSD/i386 5.99.55.
2011-09-18 14:18:24 +00:00
pettai
41fdc04508 OpenDNSSEC 1.3.2
Bugfixes:
* Bugfix #257: Error in ods-signerd, where a corrupted backup file results
  in an invalid pointer free().
* Signer Engine: Mark that a zone has a valid signer configuration, after
  recovering the zone from the backup files.


OpenDNSSEC 1.3.1

Bugfixes:
* Auditor: Fix 'ZSK in use too long' message to handle new signer behaviour.
* Bugfix #255: RHEL6 patch to contrib/opendnssec.spec. (Rick van Rein)
* Bugfix #256: Make sure argument in "ods-control signer" is not stripped off.
* Bugfix #259: ods-ksmutil: Prevent MySQL username or password being interpreted
  by the shell when running "ods-ksmutil setup".
* Bugfix #260: "ods-ksmutil zone list" now handles empty zonelists.
* Enforcer: Unsigned comparison resulting in wrong error message.
* ods-ksmutil: fixed issue where first ds-seen command run on a zone would work,
  but return an error code and not send a HUP to the enforcerd.
* Signer Engine: A threading issue occasionally puts the default validity
  on NSEC(3) RRs and the denial validity on other RRs.
* Signer Engine: An update command could interrupt the signing process and the
  zone would get missing signatures.
* Signer Engine: Fix an issue where some systems could not copy the zone file.
* Zonefetcher: Check inbound serial in transferred file, to prevent
  redundant zone transfers.
2011-09-17 22:35:25 +00:00
pettai
7ddcfdaf27 SoftHSM 1.3.0
* Can now read CKA_ALWAYS_AUTHENTICATE but does not use it.
* Encryption and decryption using CKM_RSA_PKCS.
* Support X.509 certificates. (Patch from Thomas Calderon)
* Updated backup instructions.
* Only a Security Officer can set CKA_TRUSTED to true.
* The softhsm tool can set the value of CKA_TRUSTED.
* Support Botan 1.10.0.
* Better signing performance with a single element cache for
  the PK_Signer object.
* Document README.MinGW describes how to build on Windows.
  (Text and patches contributed by Jaroslav Imrich)

Bugfixes:
* API changes in Botan created a namespace collision.
* API changes in Botan's state handling.
* BigInt::to_u32bit was accidently dropped in Botan. Adding it
  as a compatibility function to SoftHSM.
* Better exception handling.
* CKF_USER_PIN_COUNT_LOW and CKF_SO_PIN_COUNT_LOW must be set
  if an incorrect PIN has been entered at least once.
* Windows: Detect LoadLibrary.
* Windows: Set CRYPTOKI_EXPORTS.
* Windows: Load library correctly in softhsm.
* Windows: Compatibility function for getpass.
* Windows: Use _putenv and not setenv.
* Windows: Generate the DLL file.
* Windows: The softhsm tool will use the DLL file by default.
* Windows: Log to EventLog.
* Windows: Fix parsing of configuration file.
* Windows: The check program now links with a shared libgcc in order to
  make the exceptions work.

Known issue:
* Firefox does improper setting of CKA_DERIVE attribute during PKCS#12
  import. See https://bugzilla.mozilla.org/show_bug.cgi?id=515663
2011-09-17 21:47:30 +00:00
obache
d9c734e53d +cy2-scram 2011-09-17 11:32:49 +00:00
obache
419d710a21 Update cyrus-sasl to 2.1.25.
Take maintainership.

New in 2.1.25
-------------

* Make sure that a failed authorization doesn't preclude
  further server-side SASL authentication attempts from working.
* Fixed a crash caused by aborted SASL authentication
  and initiation of another one using the same SASL context.
* (Windows) Fixed the random number generator to actually produce random
  output on each run.
* Be protective against calling sasl_server_step once authentication
  has failed (multiple SASL plugins)
* Fixed several bugs in the mech_avail callback handling
  in the server side code.
* Added support for channel bindings
* Added support for ordering SASL mechanisms by strength (on the client side),
  or using the "client_mech_list" option.
* server_idle needs to obey server's SASL mechanism list from the server
  context.
* Better server plugin API mismatch reporting
* Build:
 - Updated config to the latest GNU snapshot
 - Fixed SASL's libtool MacOS/X 64-bit file magic
* New SASL plugin: SCRAM
* New SASL plugin: GS2
* DIGEST-MD5 plugin:
 -  Allow DIGEST-MD5 plugin to be used for client-side and
    server-side HTTP Digest, including running over non-persistent
    connections (RFC 2617)
 - Use the same username for reauthentication cache lookup and update
 - Minimize the number of auxprop lookups in the server side DIGEST-MD5
   plugin for the most common case when authentication and authorization
   identities are the same.
 - Updated digestmd5_server_mech_step2() to be more defensive against
   empty client input.
 - Fixed some memory leaks on failed plugin initialization.
   Prevent potential race condition when freeding plugin state.
   Set the freed reauthentication cache mutex to NULL, to make errors
   due to mutex access after free more obvious.
 - Test against broken UTF-8 based hashes if calculation using special
   ISO-8859-1 code fails.
 - Fixed an interop problem with some LDAP clients ignoring server
   advertised realm and providing their own.
* GSSAPI plugin:
 - Fix to build GSSAPI with Heimdal
 - Properly set serveroutlen to 0 in one place.
   Don't send empty challenge once server context establishment is done,
   as this is in violation of the RFC 2222 and its successor.
 - Don't send maxbuf, if no security layer can be established.
   Added additional checks for buffer lengths.
* LDAPDB plugin:
 - build fixes

New in 2.1.24
-------------

* Order advertised server-side SASL mechanisms per the specified 'mech_list'
  option or by relative "strength"
* Make sure that sasl_set_alloc() has no effect once sasl_client_init()
  or sasl_server_init() is called
* Fixed sasl_set_mutex() to disallow changing mutex management functions
  once sasl_server_init()/sasl_client_init() is called (bug # 3083)
* Removed unused mutexes in lib/client.c and lib/server.c (bug # 3141)
* Added direct support for hashed password to auxprop API
* Don't treat a constraint violation as an error to store an auxprop property
* Extended libsasl (auxprop) to support user deletion
* Extended SASL auxprop_lookup to return error code
* Updated sasl_user_exists() so that it can handle passwordless accounts (e.g. disabled)
* (Windows) Free handles of shared libraries on Windows that were loaded
  but are not SASL plugins (bug # 2089)
* Prevent freeing of common state on a subsequent call to _sasl_common_init.
  Make sure that the last global callback always wins.
* Implemented sasl_client_done()/sasl_server_done()
* Added automatic hostname canonicalization inside libsasl
* Made sasl_config_init() public
* Strip trailing spaces from server config file option values (bug # 3139, bug # 3041)
* Fixed potential buffer overflow in saslautd_verify_password().
* Fixed segfault in dlclose() on HPUX
* Various bugfixes for 64bit platforms
* Fixed bug # 2895 (passing LF to sasl_decode64) in sample/sample-client.c,
  sample/sample-server.c, utils/smtptest.c
* pluginviewer: Code cleanup, improved human readable messages
* Build:
 - (Windows) Updated makefiles to build with VC 8.0 (VC++ 2005)
 - (Windows) Added Windows64 build
 - Updated to use .plugin extension on MacOS
 - Changed 64bit HP-UX build to use .so for shared libraries
* saslauthd:
 - Fixed bug counting double-quotes in username/password in
   auth_rimap.c. Also fixed bug zeroing password.
 - auth_krb.c: improved diagnostic in the k5support_verify_tgt() function.
 - auth_sasldb.c: pid_file_lock is created with a mask of 644 instead of 0644
 - auth_shadow.c: Define _XOPEN_SOURCE before including unistd.h,
   so that crypt is correctly defined
 - auth_getpwent.c: Fixed Solaris build
* SASLDB plugin:
 - Fixed spurious 'user not found' errors caused by an attempt
   to delete a non-existent property
 - Added direct support for hashed password to auxprop API
 - Sleepycat driver:  Return SASL_NOUSER instead of SASL_FAIL when the database
   file doesn't exist
 - Ignore properties starting with '*' in the auxprop store function
* SQL plugin:
 - Added support for SQLITE3
 - Uninitialized variables can cause crash when the searched user is not found
 - Added direct support for hashed password
 - Ignore properties starting with '*' in the auxprop store function
* LDAPDB plugin:
 - Added code to extend LDAPDB into a canon_user plugin in addition
   to its existing auxprop plugin functionality
* PLAIN plugin:
 - Advertise SASL_SEC_PASS_CREDENTIALS feature
* LOGIN plugin:
 - Advertise SASL_SEC_PASS_CREDENTIALS feature
* DIGEST-MD5 plugin:
 - Fixed a memory leak in the DIGEST-MD5 security layer
 - Fixed memory leaks in client-side reauth and other places
 - More detailed error reporting.
 - Fixed parsing of challenges/responses with extra commas.
 - Allow for multiple qop options from the server and require
   a single qop option from the client.
* GSSAPI plugin:
 - Check that params->serverFQDN is not NULL before using strlen on it
 - Make auxprop lookup calls optional
* EXTERNAL plugin:
 - Make auxprop lookup calls optional
* NTLM plugin:
 - allow a comma separated list of servernames in 'ntlm_server' option
 - Fixed crash in calculating NTv2 reponse
* OTP plugin:
 - Don't use a stack variable for an OTP prompt (bug # 2822)
 - Downgrade the failure to store OTP secret to debug level
* KERBEROS_V4 plugin:
 - Make auxprop lookup calls optional
2011-09-17 11:32:02 +00:00
obache
d156436aa3 Bump PKGREVISION from PHP_VERSION_DEFAULT changes. 2011-09-16 05:46:22 +00:00
obache
175e607eee Bump PKGREVISION from RUBY_VERSION_DEFAULT changes. 2011-09-16 02:26:44 +00:00
hans
c9308949bb Split and clean up tommath patches. Requested by wiz. 2011-09-15 13:01:14 +00:00
wiz
fadfa990fb Remove CVS keywords from patch, so that distinfo has a chance of ever
being right.
XXX: this patch should be split up, it contains more than one file.
2011-09-15 09:32:32 +00:00
hiramatsu
fc1966bd61 Update p5-Mozilla-CA to 20110904.
Changes from previous:
  - Remove and distrust DigiNotar
  - Add Certinomis, Root CA Generalitat Valenciana, A-Trust-nQual-03 and TWCA
2011-09-15 06:20:29 +00:00
hans
737b19e37a Use ncurses on SunOS. 2011-09-14 17:39:22 +00:00
hans
48ad78c4dc Explicitly disable language bindings that are available as separate
packages.
2011-09-14 17:34:57 +00:00
hans
cc9c3a4576 Fix build on SunOS. 2011-09-14 17:33:00 +00:00
hans
1ce3514798 The configure check for pam headers doesn't work on SunOS. Fix build by
overriding the check.
2011-09-14 17:31:06 +00:00
shattered
cf15b6a4f7 PR/39646 -- add AES patch, from
http://people.freebsd.org/~tmclaugh/files/ssldump-aes.diff
2011-09-13 17:27:36 +00:00
taca
8247ed8c00 Update ruby-bcrypt package to 3.0.1.
3.0.1
  - create raises an exception if the cost is higher than 31. GH #27
2011-09-13 14:47:25 +00:00
drochner
cf0de9668a fix configure check for libcurl, from John Marshall on the gnupg-devel
mailing list
bump PKGREV
2011-09-12 17:38:33 +00:00
drochner
f69aa00eda update to 2.12.10
changes: bugfixes
2011-09-12 17:31:40 +00:00
wiz
263f02f5b9 Update to 2.4:
NEWS for the 2.4 release

	This is a bugfix release only. It turned out ripemd160 in the
	2.3 release was broken on all big-endian systems, due to a
	missing include of config.h. nettle-2.4 fixes this.

	The library is intended to be binary compatible with
	nettle-2.2 and nettle-2.3. The shared library names are
	libnettle.so.4.3 and libhogweed.so.2.1, with sonames still
	libnettle.so.4 and libhogweed.so.2.

NEWS for the 2.3 release

	* Support for the ripemd-160 hash function.

	* Generates and installs nettle.pc and hogweed.pc files, for
          use with pkg-config. Feedback appreciated. For projects
          using autoconf, the traditional non-pkg-config ways of
          detecting libraries, and setting LIBS and LDFLAGS, is still
          recommended.

	* Fixed a bug which made the testsuite fail in the GCM test on
	  certain platforms. Should not affect any documented features
	  of the library.

	* Reorganization of the code for the various Merkle-Damg
	  hash functions. Some fields in the context structs for md4,
	  md5 and sha1 have been renamed, for consistency.
	  Applications should not peek inside these structs, and the
	  ABI is unchanged.

	* In the manual, fixed mis-placed const in certain function
          prototypes.

	The library is intended to be binary compatible with
	nettle-2.2. The shared library names are libnettle.so.4.2 and
	libhogweed.so.2.1, with sonames still libnettle.so.4 and
	libhogweed.so.2.
2011-09-08 20:22:13 +00:00
drochner
de4be5b666 mozilla has switched to a scheme of explicitly distrusting certificates
in its stable branch (ie firefox-6.0.2) too,
so deal with this in the mozilla-rootcerts script (this is not great -
it depends on syntactic details of the file where it should better
use checksums, but the perl script which is distributed with "curl"
works the same way),
and switch back to the certificate list in CVS HEAD
2011-09-08 19:46:01 +00:00
joerg
d9cb1451c8 Missing commit for new patches 2011-09-08 13:55:06 +00:00