summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2003-10-02Set --localstatedir=/var/run/zebra, so that it can be created withkim1-1/+2
the necessary permissions for quagga to create files. The default ${PREFIX} will not have the permissions needed.
2003-10-02Fix mutex locking problems and some funkiness with %fs so that win32 codecsmycroft3-1/+68
work.
2003-10-02Updated postfix to 2.0.16martti1-1/+2
2003-10-02Updated postfix to 2.0.16martti2-9/+9
* bug fixes * new IPv6 patch
2003-10-02Better fix for audio playback -- now xine works pretty for DVD and radiomycroft2-35/+87
playback, at least.
2003-10-02Updated xfce4-minicmd-plugin to 0.2.0martti1-1/+2
2003-10-02Updated xfce4-minicmd-plugin to 0.2.0martti2-5/+5
* TAB completion against history. (Contributed by Eduard Roccatello)
2003-10-02Work around non-termination of the build when using Solaris sed.gavan1-1/+3
2003-10-02Sort.wiz2-13/+13
2003-10-02-mono-0.28recht1-2/+1
2003-10-02Note update of mono to 0.28.recht1-1/+2
2003-10-02Update to 0.28recht7-81/+30
the ususal: new features and fixes notably: New Thread Locking Zoltan removed the big locks we had in the runtime, and now we have a finely grained lock system in the runtime. Runtime hackers can read the included lock matrix document which describes the requirements to use the new fine grained locks in their code. Ahead of Time Compiler Optimizations Zoltan has worked extensively on the Mono ahead-of-time compilation feature (AOT). The AOT code is now considered to be production quality, and also for the first time precompiled code runs faster than JITed code. This resulted in a 13% compilation speed up for the Mono C# compiler, reducing the compile time to 3.185 seconds. A clear goal of the team for the next release is to reach 3.1416 seconds. for a complete list see: http://www.go-mono.com/archive/mono-0.28.html
2003-10-02+mono-0.28salo1-1/+2
2003-10-02Updated xfce4-netload-plugin to 0.2.1martti1-1/+2
2003-10-02Updated xfce4-netload-plugin to 0.2.1martti2-5/+5
* Fixed bug #972: The total value in the tooltip is now displayed with fractional portion * Fixed bug #962: Any errors about wrong configuration are now only displayed in a dialog after changing configuration and not after startup. This should help users whose network device is created after dialing-in.
2003-10-02Added support for FreeBSDmartti3-2/+209
2003-10-02update net/tspc to version 1.0jonb1-1/+2
2003-10-02Upgrade to version 1.0... I'd list all the changes to the file,jonb3-12/+12
but I'm not sure what they are, and the freenet6 site does not appear to have an easy way to get older versions of the files. This is an INTERACTIVE_STAGES= fetch package also, so people might have some difficulty without this update.
2003-10-02note update of p5-GD to 2.07nb1, fix date in openssl updategrant1-2/+3
(hi explorer, jschauma!)
2003-10-02Since libgd requires FreeType2 and JPEG and XPM, we might as well enable ↵explorer3-6/+11
them here too. This makes this package act like it did before it was 'upgraded' several months ago.
2003-10-02openssl should be 0.9.7c - I have patches atjschauma1-2/+2
http://guinness.cs.stevens-tech.edu/~jschauma/netbsd/openssl.diff to be applied after the freeze due to major lib bump.
2003-10-02Note update of openssl to 0.9.6kjschauma1-1/+2
2003-10-02Update to 0.9.6k:jschauma13-269/+52
Changes between 0.9.6j and 0.9.6k [30 Sep 2003] *) Fix various bugs revealed by running the NISCC test suite: Stop out of bounds reads in the ASN1 code when presented with invalid tags (CAN-2003-0543 and CAN-2003-0544). If verify callback ignores invalid public key errors don't try to check certificate signature with the NULL public key. [Steve Henson] *) In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate if the server requested one: as stated in TLS 1.0 and SSL 3.0 specifications. [Steve Henson] *) In ssl3_get_client_hello() (ssl/s3_srvr.c), tolerate additional extra data after the compression methods not only for TLS 1.0 but also for SSL 3.0 (as required by the specification). [Bodo Moeller; problem pointed out by Matthias Loepfe] *) Change X509_certificate_type() to mark the key as exported/exportable when it's 512 *bits* long, not 512 bytes. [Richard Levitte] Changes between 0.9.6i and 0.9.6j [10 Apr 2003] *) Countermeasure against the Klima-Pokorny-Rosa extension of Bleichbacher's attack on PKCS #1 v1.5 padding: treat a protocol version number mismatch like a decryption error in ssl3_get_client_key_exchange (ssl/s3_srvr.c). [Bodo Moeller] *) Turn on RSA blinding by default in the default implementation to avoid a timing attack. Applications that don't want it can call RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING. They would be ill-advised to do so in most cases. [Ben Laurie, Steve Henson, Geoff Thorpe, Bodo Moeller] *) Change RSA blinding code so that it works when the PRNG is not seeded (in this case, the secret RSA exponent is abused as an unpredictable seed -- if it is not unpredictable, there is no point in blinding anyway). Make RSA blinding thread-safe by remembering the creator's thread ID in rsa->blinding and having all other threads use local one-time blinding factors (this requires more computation than sharing rsa->blinding, but avoids excessive locking; and if an RSA object is not shared between threads, blinding will still be very fast). [Bodo Moeller] Changes between 0.9.6h and 0.9.6i [19 Feb 2003] *) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked via timing by performing a MAC computation even if incorrrect block cipher padding has been found. This is a countermeasure against active attacks where the attacker has to distinguish between bad padding and a MAC verification error. (CAN-2003-0078) [Bodo Moeller; problem pointed out by Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion)] Changes between 0.9.6g and 0.9.6h [5 Dec 2002] *) New function OPENSSL_cleanse(), which is used to cleanse a section of memory from it's contents. This is done with a counter that will place alternating values in each byte. This can be used to solve two issues: 1) the removal of calls to memset() by highly optimizing compilers, and 2) cleansing with other values than 0, since those can be read through on certain media, for example a swap space on disk. [Geoff Thorpe] *) Bugfix: client side session caching did not work with external caching, because the session->cipher setting was not restored when reloading from the external cache. This problem was masked, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG (part of SSL_OP_ALL) was set. (Found by Steve Haslam <steve@araqnid.ddts.net>.) [Lutz Jaenicke] *) Fix client_certificate (ssl/s2_clnt.c): The permissible total length of the REQUEST-CERTIFICATE message is 18 .. 34, not 17 .. 33. [Zeev Lieber <zeev-l@yahoo.com>] *) Undo an undocumented change introduced in 0.9.6e which caused repeated calls to OpenSSL_add_all_ciphers() and OpenSSL_add_all_digests() to be ignored, even after calling EVP_cleanup(). [Richard Levitte] *) Change the default configuration reader to deal with last line not being properly terminated. [Richard Levitte] *) Change X509_NAME_cmp() so it applies the special rules on handling DN values that are of type PrintableString, as well as RDNs of type emailAddress where the value has the type ia5String. [stefank@valicert.com via Richard Levitte] *) Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half the job SSL_SESS_CACHE_NO_INTERNAL_LOOKUP was inconsistently doing, define a new flag (SSL_SESS_CACHE_NO_INTERNAL) to be the bitwise-OR of the two for use by the majority of applications wanting this behaviour, and update the docs. The documented behaviour and actual behaviour were inconsistent and had been changing anyway, so this is more a bug-fix than a behavioural change. [Geoff Thorpe, diagnosed by Nadav Har'El] *) Don't impose a 16-byte length minimum on session IDs in ssl/s3_clnt.c (the SSL 3.0 and TLS 1.0 specifications allow any length up to 32 bytes). [Bodo Moeller] *) Fix initialization code race conditions in SSLv23_method(), SSLv23_client_method(), SSLv23_server_method(), SSLv2_method(), SSLv2_client_method(), SSLv2_server_method(), SSLv3_method(), SSLv3_client_method(), SSLv3_server_method(), TLSv1_method(), TLSv1_client_method(), TLSv1_server_method(), ssl2_get_cipher_by_char(), ssl3_get_cipher_by_char(). [Patrick McCormick <patrick@tellme.com>, Bodo Moeller] *) Reorder cleanup sequence in SSL_CTX_free(): only remove the ex_data after the cached sessions are flushed, as the remove_cb() might use ex_data contents. Bug found by Sam Varshavchik <mrsam@courier-mta.com> (see [openssl.org #212]). [Geoff Thorpe, Lutz Jaenicke] *) Fix typo in OBJ_txt2obj which incorrectly passed the content length, instead of the encoding length to d2i_ASN1_OBJECT. [Steve Henson]
2003-10-02Adjustments for NetBSD audio interface...mycroft2-5/+55
* play.samples is in bytes, not frames. (XXX I wonder if we can fix this or it's too late??) * Set blocksize much smaller so that xine thinks the pointer is "real-time".
2003-10-02textproc/aspellitojun1-1/+2
2003-10-02work around to remove dependency to ncurses on netbsd. PR pkg/22992itojun3-6/+18
2003-10-01dig DIST_SUBDIR so that we can build newer version without removingitojun2-4/+6
pkgsrc/distrib/p0f.tgz manually
2003-10-01-p0f-2.0.2recht1-2/+1
2003-10-01Updated p0f to 2.0.2recht1-1/+2
2003-10-01Update to 2.0.2recht5-7/+67
patch provided in PR 22939 by Adrian Portelli Version 2.0.2: -------------- Cleanup of the RST mess in p0fr.fp and p0f.c parser. Added isprint() text preview for -x mode. [BUG] Fixed packet size reporting and matching for packets over 255 bytes (_u8 -> _u16). Extended RST+ACK to also cover plain RST, added some sane explanations of the purpose of each mode. Clarification of the RST vs RST+ACK occurences; test/sendack.c added. Added -R option for RST+ACK fingerprinting. Created an empty database. Moved databases from /etc to /etc/p0f/ Windows memory leak mystery solved. No longer using pcap timeouts for anything. They suck. I first wanted to use SIGALRM with no SA_RESTART, but it's broken on Linux on this particular syscall. Fortunately, I spotted an mis-documented pcap_fileno and can now use select(). I just hope it won't break. Note to self: despite of the documentation saying pcap_open_live with timeout 0 will simply never timeout (which is irrelevant for pcap_loop anyway), it does not work on FreeBSD, inhibiting all packet processing instead. Works fine on Linux. Go figure. Some minor p0fq fixes to prevent warnings. Added some SYN+ACK signatures from rfp (p0fa.fp). Hooray! p0fa.fp is now official. Moved from test/ to ., etc. README updated. [BUG] Fixed the default TTL for IRIX and Tru64 (60), added a note to p0f.fp, fixed TTL checker to also support %30 values. [BUG] Fixed query mode lookup. The old code didn't handle reverse lookups properly. Masquerade scoring data is now available via the query interface. P0fq utility updated to handle this. Dropped /bin/bash from p0frep, /bin/sh would suffice. Added a new -c option for -M and -Q cache size scaling, packet ratio information on Ctrl-C to help estimate the right parameter. Extra masquerade detection flags: -T for threshold, -V for detailed flag breakdown; masquerade reporting now recognizes -r. The new -w option writes all matching packets to a pcap file (regardless of -K and -U settings). Added -M option (unix only until p0f-query.c gets ported). This option enables advanced masquerade detection based on the cyclic buffer used by -Q. Added - signature flag to the config file. Some documentation for the new functionality. [BUG] Cleaned up the -K and -U semantics with -Q. Replaced some single-character printfs with putchars in signature reporting code (should be a tad faster). Added signature check reporting, generic signature count and some other minor tweaks. The new -x option provides a hexadecimal TCP/IP packet dump. Useful when comparing two colliding fingerprints to find some differences not covered by the current quirks set. PPPoE interface is now handled correctly on NetBSD. Added a shoddy manpage and updated makefiles. Removed E quirk and added E to the regular options; removed needless EOL append code from the parser. Breaks the old signature format in some rare cases, but the old quirk is still recognized, and the user will be advised to change it. [BUG] Fixed ? option parsing bug that prevented RISC OS signature from working (and would prevent all ? signatures from working, should there be any other ;-). New signatures and other database additions, of course. [BUG] Fixed a very minor parser bug that could cause it to loop over an unknown option with a declared length of zero. This is not a DoS condition, because the parser would quit the loop after parsing max. 16 options anyway.
2003-10-01Note addition of py-psyco-1.1.1.recht1-1/+2
2003-10-01Add and enable py-psyco.recht1-1/+2
2003-10-01Intial import of py-psyco 1.1.1recht4-0/+67
from the pkgsrc-wip pkg by Michal Pasternak Psyco is a specializing compiler. In a few words let us first see: What you can do with it In short: run your existing Python software much faster, with no change in your source. Think of Psyco as a kind of just-in-time (JIT) compiler, a little bit like Java's, that emit machine code on the fly instead of interpreting your Python program step by step. The result is that your unmodified Python programs run faster. Benefits 2x to 100x speed-ups, typically 4x, with an unmodified Python interpreter and unmodified source code, just a dynamically loadable C extension module. Drawbacks Psyco currently uses quite a lot of memory. It only runs on Intel 386-compatible processors (under any OS) right now. There are some subtle semantic differences (i.e. bugs) with the way Python works; they should not be apparent in most programs.
2003-10-01remove PKGREVISIONitojun1-2/+1
2003-10-01mali/cueitojun1-1/+2
2003-10-01upgrade to 20030922 snapshot. don't SEGV with certain operation (forwarditojun4-259/+6
multiple emails without body), use G1 designation/invocation for 96-char ISO charsets, and other fixes.
2003-10-01Move comment so that this works. Closes PR 23030.wiz1-2/+3
2003-10-01Added ripmime.reed1-1/+2
2003-10-01Added ripmime-1.3.0.4.reed1-2/+2
Extract the attached files out of a MIME encoded email package
2003-10-01Update abcde to 2.1.4nb5:abs4-12/+27
Strip out \r from the end of the CDDB data to make editing easier
2003-10-01ripmime-1.3.0.4 Extract the attached files out of a MIME encoded email packagereed5-0/+44
2003-10-01note revision bump of level9 (NetBSD curses fix)dillo1-2/+2
2003-10-01Apply patch provided by Brett Lymn to make this work with NetBSD's curses.dillo3-9/+36
Bump PKGREVISION.
2003-10-01Do not install man pages in ${PREFIX}/bin.kristerw1-3/+3
2003-10-01Remove duplicated entries for dnetc-netbsd-arm32.tar.gz.kristerw1-3/+1
2003-10-01+ gnustep-0.9.0, gtkmm-2.2.8, mrtg-2.10.5, nut-9.2, tla-1.1.0.5wiz1-3/+7
[replacing arch; pkg/23022], w3m-0.4.2.
2003-10-01Update pkglint to 3.63:abs3-5/+11
perl 5.6.1 realpath() cannot handle files, only directories. Handle this case, with the only downside that if the last component in an include path is a symlink the 'performance boost' duplicate check may not work. Reported by Todd Vierling
2003-10-01Update pkgchk to 1.43abs1-1/+3
1.42: Update -L: Do not reset the logfile at the start of each package. Also try to make the 'tail' of the logfile in the event of an error more useful. Implement -l: List the filename for all binary packages (including the exact dependencies against which each package was built) based on pkgchk.conf. Will abort if a binary package is missing. This can be used (in conjunction with -U and -D) to determine what packages would need to be copied to a remote machine to ensure it was completely up to date. 1.43: Additional duplicate check in -l
2003-10-01Update pkgchk to 1.43:abs2-4/+4
Additional duplicate check in -l
2003-10-01Update pkgchk to 1.42abs3-25/+118
Update -L: Do not reset the logfile at the start of each package. Also try to make the 'tail' of the logfile in the event of an error more useful. Implement -l: List the filename for all binary packages (including the exact dependencies against which each package was built) based on pkgchk.conf. Will abort if a binary package is missing. This can be used (in conjunction with -U and -D) to determine what packages would need to be copied to a remote machine to ensure it was completely up to date.