summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2015-12-26Pullup ticket #4877 - requested by cyberpkgsrc-2015Q3bsiegert4-11/+43
security/openssl: security fix Revisions pulled up: - security/openssl/Makefile 1.214-1.216 - security/openssl/PLIST.common 1.26 - security/openssl/distinfo 1.116,1.118 - security/openssl/patches/patch-Makefile.shared 1.3 --- Module Name: pkgsrc Committed By: jperkin Date: Fri Oct 9 11:44:48 UTC 2015 Modified Files: pkgsrc/security/openssl: Makefile Log Message: Force the "linux-elf" Configure target for Linux 32-bit, fixes the build when running with ABI=32 on a 64-bit native host. --- Module Name: pkgsrc Committed By: jperkin Date: Mon Oct 26 09:42:47 UTC 2015 Modified Files: pkgsrc/security/openssl: Makefile distinfo pkgsrc/security/openssl/patches: patch-Makefile.shared Log Message: Support SunOS/clang and pass -h linker argument correctly. Doesn't fully fix the build yet, an additional patch to remove LD_LIBRARY_PATH is required but needs wider testing. --- Module Name: pkgsrc Committed By: jperkin Date: Mon Dec 7 15:57:42 UTC 2015 Modified Files: pkgsrc/security/openssl: Makefile PLIST.common distinfo Log Message: Update security/openssl to 1.0.2e. pkgsrc changes: - We now need to run 'make depend' after configure to pick up algorithm selection changes. Upstream changes: Changes between 1.0.2d and 1.0.2e [3 Dec 2015] *) BN_mod_exp may produce incorrect results on x86_64 There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. This issue was reported to OpenSSL by Hanno Böck. (CVE-2015-3193) [Andy Polyakov] *) Certificate verify crash with missing PSS parameter The signature verification routines will crash with a NULL pointer dereference if presented with an ASN.1 signature using the RSA PSS algorithm and absent mask generation function parameter. Since these routines are used to verify certificate signature algorithms this can be used to crash any certificate verification operation and exploited in a DoS attack. Any application which performs certificate verification is vulnerable including OpenSSL clients and servers which enable client authentication. This issue was reported to OpenSSL by Loïc Jonas Etienne (Qnective AG). (CVE-2015-3194) [Stephen Henson] *) X509_ATTRIBUTE memory leak When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak memory. This structure is used by the PKCS#7 and CMS routines so any application which reads PKCS#7 or CMS data from untrusted sources is affected. SSL/TLS is not affected. This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using libFuzzer. (CVE-2015-3195) [Stephen Henson] *) Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs. This changes the decoding behaviour for some invalid messages, though the change is mostly in the more lenient direction, and legacy behaviour is preserved as much as possible. [Emilia Käsper] *) In DSA_generate_parameters_ex, if the provided seed is too short, return an error [Rich Salz and Ismo Puustinen <ismo.puustinen%intel.com@localhost>]
2015-12-06Pullup ticket #4868 - requested by wizbsiegert5-9/+42
security/keepassx: security fix Revisions pulled up: - security/keepassx/Makefile 1.31 - security/keepassx/distinfo 1.8 - security/keepassx/patches/patch-src_lib_AutoTypeX11.cpp 1.2 - security/keepassx/patches/patch-src_lib_FileDialogs.cpp 1.1 - security/keepassx/patches/patch-src_lib_random.cpp 1.4 --- Module Name: pkgsrc Committed By: wiz Date: Sun Dec 6 14:20:34 UTC 2015 Modified Files: pkgsrc/security/keepassx: Makefile distinfo pkgsrc/security/keepassx/patches: patch-src_lib_AutoTypeX11.cpp patch-src_lib_random.cpp Added Files: pkgsrc/security/keepassx/patches: patch-src_lib_FileDialogs.cpp Log Message: Fix CVE-2015-8378 using the patch from Debian. Bump PKGREVISION. While here, clean up pkglint.
2015-11-22Pullup ticket #4858 - requested by tezbsiegert1-1/+2
security/mit-krb5: build fix Revisions pulled up: - security/mit-krb5/Makefile 1.85 --- Module Name: pkgsrc Committed By: tez Date: Thu Nov 5 19:10:30 UTC 2015 Modified Files: pkgsrc/security/mit-krb5: Makefile Log Message: Fix build in case there is a system version of verto found. No revbump because it failed to build before if there was one. Fixes pkg/50348
2015-10-26Pullup ticket #4843 - requested by joergbsiegert1-1/+2
security/botan-devel: build fix Revisions pulled up: - security/botan-devel/Makefile 1.11 --- Module Name: pkgsrc Committed By: joerg Date: Wed Oct 21 21:29:14 UTC 2015 Modified Files: pkgsrc/security/botan-devel: Makefile Log Message: For amd64 builds, override the automatic CPU detection. It fails on SmartOS for 64bit builds.
2015-09-26Pullup ticket #4816 - requested by agcryoon5-7/+4
security/netpgpverify: bug fix patch security/libnetpgpverify: bug fix patch Revisions pulled up: - pkgsrc/security/netpgpverify: Makefile 1.17 - pkgsrc/security/netpgpverify/files/digest.c 1.4 - pkgsrc/security/netpgpverify/files/misc.c 1.4 - pkgsrc/security/netpgpverify/files/rsa.c 1.4 - pkgsrc/security/netpgpverify/files/verify.h 1.16 --- Module Name: pkgsrc Committed By: agc Date: Fri Sep 25 15:46:58 UTC 2015 Modified Files: pkgsrc/security/netpgpverify: Makefile pkgsrc/security/netpgpverify/files: digest.c misc.c rsa.c verify.h Log Message: Update netpgpverify, and libnetpgpverify, from version 20150911 to version 20150919 Changes: + get rid of unnecessary header inclusion (sys/syslog.h), which gives problems on HP/UX and is unused from Tobias Nygren
2015-09-18Removewiz1-5/+1
PERL5_MODULE_TYPE= Module::Install::Bundled in the hope it fixes PR 50254. While here, remove API depends line that's lower than what's in openssl/bl3.mk.
2015-09-17Don't trigger unnecessary rebuilds.joerg3-7/+7
2015-09-14Add upstream bug report URL.wiz2-4/+4
2015-09-14Fix build on Solaris 11 per PR 50242 by Jörn Clausen.wiz2-1/+21
2015-09-14Update to 3.3.18mef2-7/+6
---------------- * Version 3.3.18 (released 2015-09-12) ** libgnutls: When re-importing CRLs to a trust list ensure that there no duplicate entries. ** certtool: Removed any arbitrary limits imposed on input file sizes and maximum number of certificates imported. ** API and ABI modifications: No changes since last version.
2015-09-13Revbump all packages using Go after the Go update.bsiegert1-1/+2
2015-09-13Add missing stdexcept includes. Add missing libraries for socketjoerg6-6/+88
functions on Solaris. Check privileges for mlock use on Solaris before trying to lock the resource buffer.
2015-09-13Fix PLIST conditional for i386.joerg1-2/+2
2015-09-12mention mozilla-rootcerts-openssltnn1-1/+2
2015-09-12catch up with security/mozilla-rootcertstnn2-20/+31
2015-09-12Update netpgpverify to version 20150911.agc3-6/+11
Changes since previous version (20150901) + Apparently, OS X 10.4 does not have an implementation of le32dec(). Instead, unroll the inline function. Bug report from Sevan - thanks!
2015-09-11Update to 20150804.tnn2-8/+7
Added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT C=DE, O=Deutscher Sparkassen Verlag GmbH, OU=S-TRUST Certification Services, \ CN=S-TRUST Universal Root CA C=FR, O=Certinomis, OU=0002 433998903, CN=Certinomis - Root CA C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden EV Root CA C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden Root CA - G3 C=TR, L=Ankara, \ O=T?RKTRUST Bilgi ?leti?im ve Bili?im G?venli?i Hizmetleri A.?., \ CN=T?RKTRUST Elektronik Sertifika Hizmet Sa?lay?c?s? H5 C=TR, L=Ankara, \ O=T?RKTRUST Bilgi ?leti?im ve Bili?im G?venli?i Hizmetleri A.?., \ CN=T?RKTRUST Elektronik Sertifika Hizmet Sa?lay?c?s? H6 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, \ OU=(c) 2009 Entrust, Inc. - for authorized use only, \ CN=Entrust Root Certification Authority - G2 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, \ OU=(c) 2012 Entrust, Inc. - for authorized use only, \ CN=Entrust Root Certification Authority - EC1 C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Removed: C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Class 2 CA, \ CN=TC TrustCenter Class 2 CA II C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Universal CA, \ CN=TC TrustCenter Universal CA I C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 CA 1 C=TR, O=Elektronik Bilgi Guvenligi A.S., \ CN=e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi CN=SG TRUST SERVICES RACINE, OU=0002 43525289500022, O=SG TRUST SERVICES, C=FR CN=T?RKTRUST Elektronik Sertifika Hizmet Sa?lay?c?s?, C=TR, L=ANKARA, \ O=(c) 2005 T?RKTRUST Bilgi ?leti?im ve Bili?im G?venli?i Hizmetleri A.?.
2015-09-11Note new distfile location, but use nbftp for now.gdt2-2/+6
The new distfile has a bad name and doesn't have the auto* generated files. Given that it's on github, these issues are not likely to be fixed. There has been no upstream release since 2008, so there's really no point in dealing with that until there is. For now, just use MASTER_SITE_BACKUP to avoid the old URL giving errors.
2015-09-11Fix MASTER_SITES.wiz1-2/+2
2015-09-10Update liboauth to 1.0.3prlw13-16/+24
version 1.0.3 - clarify documentation of oauth_curl - fix possible memleak in oauth_curl (only relevant if an error occurs) - fix TOCTOU in oauth_curl_post_file: the file may change between stat() and fopen() version 1.0.2 - fix typos in documentation - add xfree, xstrdup patch from Kedar Sovani - prepare repository migration to github - built-in sha1 support big&little endian - (no changes to the actual library API or ABI) version 1.0.1 - do not url-escape RSA-key for signature version 1.0.0 - fix body-hash example code - mark all oauth_http functions as deprecated - freeze interface definitions for good - enter maintenance/bug-fix only cycle version 0.9.7 - fixed tiny memory leak when oauth_curl_get() fails - fixed double-encoding of plaintext signature version 0.9.6 - fixed typo, do not print a separator before first parameter when serializing url for auth-header. version 0.9.5 - added "built-in" hmac-sha1 hashing (no RSA). - added some CURL options available via enviroment variables - fixed issue with decoding already encoded characters in the base-URL (not parameters). reported by L. Alberto Gimenez
2015-09-09Update HOMEPAGE.gdt1-2/+2
2015-09-09Belatedly add patch missing from previous commit.gdt1-0/+19
2015-09-09Update security/gnupg2 to 2.0.29.wiz6-67/+9
While here, clean up patches. They looked pretty cargo-culty to me and were not commented. File a bug report for one of the remaining ones and link to it from comment. Changes in 2.0.29: Noteworthy changes in version 2.0.29 (2015-09-08) ------------------------------------------------- * gpg: Print a PGP-2 fingerprint again instead of a row of "0". * gpg: Fixed a race condition from multiple several "gpg --verify". * gpg: Print FAILURE status lines to help GPGME. * gpgsm: Fixed a regression in CSR generation. * scdaemon: Fixed problems with some pinpads. * Fixed a few other bugs.
2015-09-09Update security/libgcrypt to 1.6.4:wiz5-175/+6
Noteworthy changes in version 1.6.4 (2015-09-08) [C20/A0/R4] ------------------------------------------------ * Speed up the random number generator by requiring less extra seeding. * New flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. * Always verify a created RSA signature to avoid private key leaks due to hardware failures. * Fix alignment bug in the AESNI code on Windows > 7. * Support FreeBSD 10 and later. * Other minor bug fixes.
2015-09-07Update to 0.29.gdt4-23/+13
Update HOMEPAGE. Set LICENSE. 0.28 2013/06/21 * No significant change. Maintenance purpose only. 0.27 2010/08/12 * Adding Camellia defined in RFC 5581. "Stefan H. Holek" <stefan> * Notation name is always text. Risko Gergely <gergely>
2015-09-07Add patch that belongs in last commitgdt1-0/+17
2015-09-07Update to 0.15.0. Some pkgsrc patches are now upstream. Don'tgdt12-96/+50
install new bash completion files, given a lack of pkgsrc doctrine for where they go. New in 0.15.0; 2015-05-11 * new card drivers AzeDIT 3.5 IsoApplet MaskTech * libopensc allow extended length APDUs accept no output for 'SELECT' MF and 'SELECT' DF_NAME APDUs fixed sc_driver_version check adjusted send/receive size accoriding to card capabilities in iso7816 make SELECT agnosting to sc_path_t's aid * asn1 support multi-bytes tags * pkcs15 reviewed support and tool functions for public key public certs and pubkeys with an auth_id are treated as private * pkcs11 introduced default PKCS#11 provider fetched real value of CKA_LOCAL for pubkey removed inconsistent attributes C_Digest issues no check if buffer too small before update * added support for Travis CI * updated support of EC in libopensc, pkcs15 and pkcs11 * fixed number of warnings, resource leaks, overity-scan issues * macosx target minimum OSX version to 10.7 update the minimal building instructions. locate and target the latest SDK to build against. locate the best newest SDK present on the computer. * build disable Secure Messaging if OpenSSL is not used * tools util_get_pin helper function * PIV Add AES support for PIV General Authenticate fixed invalid bit when writing PIV certificate object with gzipped certificate fixed bad caching behavior of PIV PKCS15 emulator * ePass2003 fixed failure due to re-authenticate of secure messaging when card is accessed by multiple PKCS11 sessions * MyEID EC support for MyEID-v4 card * openpgp extended options for openpgp-tool * asepcos fixed puk handling * sc-hsm support for Koblitz curves secp192k1 and secp256k1 (Bitcoin) improved error detection and reporting in sc-hsm-tool fixed Lc byte in VERIFY PIN block for PC/SC PIN PAD reader fix certificate delete bug * IAS/ECC fixed PKCS#11 compliance issues support for Morpho IAS Agent Card * cardos overwrite content of deleted private key * win32 setup improuvement look & feel custom actions with card registration minidriver impouvement fixed errors and warnings returned by Microsoft quality tool pin-pad support New in 0.14.0; 2014-05-31 * new card driver DNIe * extended existing drivers by support of Swedish eID card (gemsafeV1) EstEID 3.5 (mcrd) * bogus javacard driver removed * build return to the standard use of 'autoconf' CI specific bootstrap script: git commit stamp for the built packages windows friendly compile settings fixed a ton of compiler warnings fence against using EVP_sha256 mech debian packaging templates compile without OpenSSL and without SM enable compiler warnings by default win32 add 'VarFileInfo' block to version-info include to MSI package 'openpgp-tool.exe' 'version-info' resource for each target * macOSX "graphical uninstaller" to distribution DMG update package building to modern tools new tool and SDK paths for OS X 10.8 improved opensc-installer from distribution osx: target 10.9 (a free upgrade to anyone using 10.6+) from now on build 'fat' binaries i386 * common added getpass implementation for non windows * libopensc allow for the pin to be entered on the keypad during issuing introduce 'encoded-content' to the sc_file data general usage method to allocate generalized time * minidriver implemented 'CardChangeAuthenticator', 'CardGetChallenge' and 'CardUnblockPin' improved management of GUID use reader pin pad if available and allowed configuration options for compose GUID refuse create container mechanism add registers file for feitian cards fixed return code in 'CardGetContainerInfo' returned 'tries-left' for blocked card length of stripped data in RSADecrypt * pkcs#11 bind non-recognized card, generic 'init-token' procedure fixed CKA_VALUE of 'public-key' object fix ASN1 encoding issues PIN-NOT-INITIALIZED for the non-user PINs buffers overflow segfault due to the undefined 'application-file' * pkcs15 'direct' public key in PuKDF encoding implement SPKI public key encoding include and maintain minidriver framework data: cmap-record, md-flags, GUID, .. fixed encoding of 'SubjectPublicKeyInfo' DER encoding of 'issuer' and 'subject' PIN validation in 'pkcs15-verify' public key algorithm ECC public key encoding ECC ecpointQ * pkcs15init introduce 'max-unblocks' PIN init parameter keep cert. blob in cert-info data file 'content' and 'prop-attrs' in the card profile in profile more AC operations are parsed fixed NULL pointer dereference error NULL 'store-key' handle ignore if no TokenInfo file to update set EC pubkey parameters from init data * reader-pcsc fixed implicit pin modification pin checking when implicitly given verify/modify pinpad commands * SM common SM 'increase-sequence-counter' procedure move SM APDU procedures to dedicated source file move SM common crypto procedures to the dedicated library * doc documentation for --list-token-slots * default driver do not send possibly arbitrary APDU-s to an unknown card. by default 'default' card driver is disabled * sc-hsm Added support for persistent EC public keys generated from certificate signing requests token label to be set via C_InitToken or sc-hsm-tool unblock PIN using C_InitPIN() initialize EC key params fixed bug that prevents a newly generated 2048 key to show up at the PKCS#11 interface bug when changing SO-PIN with opensc-explorer sc-hsm-tool memory checking and removed warning problem deleting CA certificates sc-hsm public key format returned when generating ECC keys sc-hsm-tool better error handling for non-SmartCard-HSM cards support for DKEK password sharing scheme threshold scheme parameters to manpage crash on Windows when --wrap-key frees memory allocated in opensc.dll * ias simplify the compute signature operation * PIV use SPKI encoding for public key data extract public key from cert if no object on card fix segfault and valgrind issue gen_key to expect the proper PIV Key references * CardOS build for Windows use information from AlgorithmInfo supported CardOS V5.0 * epass2003 key generation allows stricter privkey/pubkey ACLs list_files implemented properly disable padding allow exponents other than 65537 * myeid fixed file-id in myeid.profile * entersafe fix a bug when writing public key * EstEID match card only based on presence of application. * pteid do not call the iso7816 driver get_response operation * myeid support of EC key is broken
2015-09-07Update to 1.4.24.gdt2-7/+6
1.4.24 - 7 August 2015, Ludovic ROUSSEAU - 253 new ATRs - ATR_analysis: better update of the local cache 1.4.23 - 13 September 2014, Ludovic ROUSSEAU - 137 new ATRs
2015-09-07Update to 1.8.14.gdt2-8/+9
1.8.14: Ludovic Rousseau 5 August 2015 - Threading: lock the PC/SC context in a safe way - Threading: lock the card context in a safe way - SCardGetStatusChange(): fix card movement rare bug - Doxygen: . SCardTransmit() may return SCARD_E_INSUFFICIENT_BUFFER . SCardEndTransaction() The disposition IS used and the dwDisposition parameter HAS an effect. . SCardReconnect() do not release locks . fix typos - Move the source code repository from subversion to git - Use asprintf(3) instead of strlcat(3) and strlcpy(3) - Allow to use pcscd in a remote session (polkit issue) - Some other minor improvements and bug corrections pcsc-lite-1.8.13: Ludovic Rousseau 7 November 2014 - fix a systemd + libudev hotplug bug introduced in version 1.8.12. The list of readers was not (yet) available just after the start of pcscd - Make the license more 3-clause BSD like - fix a rare race condition in the (non default) libusb hotplug - Some other minor improvements and bug corrections
2015-09-07Update to .1.4.20.gdt2-8/+7
1.4.20 - 5 August 2015, Ludovic Rousseau - Add support of . ACS ACR1251 Dual Reader . Access IS NFC Smart Module . BIFIT iToken . BLUTRONICS BLUDRIVE II CCID (idProduct: 0x1079) . Generic MultiCard Device . NXP Pegoda 2 N . SafeNet eToken 5100 . SafeNet eToken 7300 . Yubico Yubikey 4 CCID . Yubico Yubikey 4 OTP+CCID . Yubico Yubikey 4 OTP+U2F+CCID . Yubico Yubikey 4 U2F+CCID - Depends on libusb version 1.0.9 instead of 1.0.8 - The O2 Micro Oz776 reader only supports 9600 bps - Change installation directory for Mac OS X El Capitan 10.11 1.4.19 - 13 May 2014, Ludovic Rousseau - Add support of . AK910 CKey (idProduct 0x0001) . AK910 CKey (idProduct 0x0011) . AK910 IDONE . Broadcom Corp 5880 (idProduct: 0x5804) . CASTLES EZCCID Smart Card Reader . Cherry KC 1000 SC . Cherry KC 1000 SC Z . Cherry KC 1000 SC/DI . Cherry KC 1000 SC/DI Z . Cherry TC 1300 . Chicony USB Smart Card Keyboard . Elatec TWN4 SmartCard NFC . Feitian 502-CL . Feitian eJAVA Token . FujitsuTechnologySolutions GmbH Keyboard KB100 SCR . FujitsuTechnologySolutions GmbH Keyboard KB100 SCR eSIG . Hewlett-Packard HP lt4112 Gobi 4G Module . Identive SCT3522CC token . OMNIKEY AG 6121 USB mobile . PIVKey T800 . REINER SCT tanJack Bluetooth . Watchdata USB Key - Add syslog(3) debug for Mac OS X Yosemite. Use: sudo syslog -c "com.apple.ifdreader PID" -d to change the logging level. See also "Change syslog logging level on Yosemite" http://ludovicrousseau.blogspot.com/2015/03/change-syslog-logging-level-on-yosemite.html - Remove ZLP patch for Gemalto IDBridge CT30 and K30. The patch was causing problems with the K50. A new reader firmware (version F) solved the problem so the patch is no more needed. - Fix a memory leak in an error path - some minor bugs removed
2015-09-06Fix up a few more symbol renames, now -Wimplicit-function-declaration clean.jperkin2-5/+5
2015-09-06Update to 1.0.1:wiz2-6/+6
1.0.1 - 2015-09-05 ~~~~~~~~~~~~~~~~~~ * We now ship OS X wheels that statically link OpenSSL by default. When installing a wheel on OS X 10.10+ (and using a Python compiled against the 10.10 SDK) users will no longer need to compile. See :doc:`/installation` for alternate installation methods if required. * Set the default string mask to UTF-8 in the OpenSSL backend to resolve character encoding issues with older versions of OpenSSL. * Several new OpenSSL bindings have been added to support a future pyOpenSSL release. * Raise an error during install on PyPy < 2.6. 1.0+ requires PyPy 2.6+.
2015-09-06Deal with systems defining swap16/swap32 as macros.joerg1-0/+3
2015-09-05Fix PLIST on Darwin. Use MASTER_SITE_PYPI.jperkin2-2/+4
2015-09-03Mark package as broken for OpenBSD, the portable distribution is not intendedsevan1-1/+2
for use on OpenBSD, there is a separate release for that. Reviewed by wiz@
2015-09-03Make sure php-oauth's configure can find pkgsrc libcurl. PKGREVISION++fhajny3-3/+31
2015-09-03I'm not currently using this module, reset MAINTAINER.dsainty1-2/+2
2015-09-02Complete the SHA* symbol renaming. Ride previous bump. Ok agc.jperkin1-16/+16
2015-09-01Update to 2.019mef2-6/+6
--------------- 2.019 2015/09/01 - work around different behavior of getnameinfo from Socket and Socket6 by using a different wrapper depending on which module I use for IPv6. Thanks to bluhm for reporting.
2015-09-01Bump API requirement to 20150901 for the renamed symbols in libnetpgpverifyagc1-2/+2
2015-09-01Update netpgpverify to 20150901agc19-540/+540
+ rename all the symbols I could fine which could conflict with those in libcrypto. requested by joerg
2015-08-31Restore https URL, as discussed with schmonz.wiz1-2/+2
Systems without https support in their fetch tools can get the distfiles from ftp.NetBSD.org.
2015-08-31Go back to using the non-https MASTER_SITES, because NetBSD 6.x'sschmonz1-2/+2
/usr/bin/ftp (at least) can't fetch https URLs, and we verify distfiles by checksum anyway.
2015-08-30Update php-suhosin to 0.9.38.taca2-6/+7
2015-05-21 - 0.9.38 - removed code compatibility for PHP <5.4 (lots of code + ifdefs) - allow https location for suhosin.filter.action - fixed newline detection for suhosin.mail.protect - Added suhosin.upload.max_newlines to protect againt DOS attack via many MIME headers in RFC1867 uploads (CVE-2015-4024) - mail related test cases now work on linux
2015-08-30Update php-ssdeep to 1.0.4.taca2-8/+7
1.0.4 This is a build maintenance release only so there is no need to upgrade. - Make use of --with-libdir so installers can override the lib default (RHEL uses lib64 for example) - Clean up the build script to standardise the code constructs used - Add LICENSE, README and CREDITS to PECL package configuration 1.0.3 Bug #60347 OSX can't build as .so hardcoded
2015-08-30Update ssdeep to 2.13.taca4-15/+15
** Version 2.13 - 24 Apr 2015 * New Features - Added fuzzy_set_total_input_length function to the API. - Added support for files up to 192GB. - Added support for arbitrary length input from the standard input. * Bug Fixes - Fixed issue when comparing hashes from relatively simple files. - Fixed portability issues. ** Version 2.12 - 24 Oct 2014 * Bug Fixes - Fixed issue when comparing identical hashes but with different block sizes.
2015-08-30Update to 2.018:wiz2-6/+6
2.018 2015/08/27 - RT#106687 - startssl.t failed on darwin with old openssl since server requested client certificate but offered also anon ciphers
2015-08-30Update to 1.20:wiz2-6/+6
Noteworthy changes in version 1.20 (2015-08-26) [C16/A16/R0] ----------------------------------------------- * New macros for GCC attributes. * Make es_set_binary actually work for Windows. * Allow building without thread support. * Build without a build timestamp by default. * Interface changes relative to the 1.19 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ GPGRT_VERSION NEW macro. GPGRT_VERSION_NUMBER NEW macro. GPGRT_INLINE NEW macro. GPGRT_GCC_VERSION NEW macro. GPGRT_ATTR_NORETURN NEW macro. GPGRT_ATTR_PRINTF NEW macro. GPGRT_ATTR_NR_PRINTF NEW macro. GPGRT_ATTR_FORMAT_ARG NEW macro. GPGRT_ATTR_SENTINEL NEW macro. GPGRT_ATTR_USED NEW macro. GPGRT_ATTR_UNUSED NEW macro. GPGRT_ATTR_DEPRECATED NEW macro. GPGRT_ATTR_PURE NEW macro. GPGRT_ATTR_MALLOC NEW macro. GPGRT_HAVE_MACRO_FUNCTION NEW macro. GPGRT_HAVE_PRAGMA_GCC_PUSH NEW macro.
2015-08-30Treat dfly like freebsd and bitrig like openbsd.dholland2-5/+6
2015-08-28Update to 3.12.0:wiz3-10/+13
Changes in version 3.12.0 are: * Build fixes Changes in version 3.11.92 are: * This library is now deprecated Changes in version 3.10.1 are: * Updated translations Changes in version 3.10.0 are: * Build fixes Changes in version 3.9.1 are: * Build fixes and tweaks Changes in version 3.8.0 are: * Updated translations Changes in version 3.7.92 are: * Updated translations Changes in version 3.7.91 are: * Build fixes [#691343] Changes in version 3.7.5 are: * Updated translations * Build fixes Changes in version 3.7.2 are: * Share the secure memory pool with libsecret and gcr * Other minor tweaks Changes in version 3.6.0 are: * Updated translations Changes in version 3.5.6 are: * More warnings about attributes not being stored secretly * Build fixes * Updated translations Changes in version 3.5.4 are: * Vala bindings Changes in version 3.5.3 are: * Fix debugging for G_MESSAGES_DEBUG * Some minor fixes to avoid vala regressions