summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2017-03-31Recursive bump for gpgme update which removed a support library.wiz11-21/+22
2017-03-31Updated gpgme to 1.8.0.wiz8-56/+31
A library was removed; recursive bump will follow soon. Noteworthy changes in version 1.8.0 (2016-11-16) ------------------------------------------------ * The module of the Python bindings has been renamed to 'gpg'. * New interface to query current software versions. * New feature to use gpg's --{show,override}session-key options. * New interface to set the sender of a mail. * qt: Added Distinguished Name parser from libkleo * The --homedir option is now used with recent gpgconf versions. * On 64 bit Windows systems gpgconf is now properly located. * The internal locking functions have been replaced by libgpg-error locking functions. * Interface changes relative to the 1.7.1 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgme_set_sender NEW. gpgme_get_sender NEW. gpgme_op_query_swdb NEW. gpgme_op_query_swdb_result NEW. gpgme_query_swdb_result_t NEW. gpgme_get_ctx_flag NEW. gpgme_decrypt_result_t EXTENDED: New field session_key. qt: DN NEW. qt: DN::Attribute NEW. qt: Job::context(Job*) NEW. cpp: EngineInfo::Version::Version(const char*) NEW. cpp: EngineInfo::Version::Version() NEW. cpp: SwdbResult NEW. cpp: Context::setSender(const char*) NEW. cpp: Context::getSender() NEW. [c=C28/A17/R0 cpp=C9/A3/R0 qt=C8/A1/R0] Noteworthy changes in version 1.7.1 (2016-10-18) ------------------------------------------------ * Fixed problems with the new language bindings. * New helper function gpgme_addrspec_from_uid. * Use option --exit-on-status-write-error with newer gpg versions. * qt: Missed API from the Qt Binding inclusion has been added again. * qt: abstractimportjob.h is now installed to that ImportJobs can be used again. * qt: Fixed spelling error in API (startReceive). * Interface changes relative to the 1.7.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgme_addrspec_from_uid NEW. qt: WksPublishJob::startRecieve RENAMED to ::startReceive. qt: MultiDeleteJob NEW. qt: AbstractImportJob NEW. qt: SpecialJob NEW. cpp: Signature::key(bool, bool) NEW. cpp: UserID::addrSpecFromString(const char*) NEW. cpp: UserID::addrSpec() NEW. [c=C27/A16/R0 cpp=C8/A2/R0 qt=C7/A0/R0] Noteworthy changes in version 1.7.0 (2016-09-21) ------------------------------------------------ * New language bindings for Python 2 and 3. * New language Bindings for C++ and the Qt-Framework API. * New functions gpgme_op_createkey and gpgme_op_createsubkey to make key creation easier (requires GnuPG 2.1). * New functions gpgme_op_adduid and gpgme_op_revuid to make user id management easier (requires GnuPG 2.1). * New function gpgme_op_keysign to make key signing easier (requires GnuPG 2.1). * New function gpgme_op_interact to replace the now deprecated functions gpgme_op_edit and gpgme_op_card_edit. * New function gpgme_pubkey_algo_string to convert a public key algorithm into a GnuPG 2.1 style string. * Support for GnuPG 2.1's TOFU trust model. * Notation flags are now correctly set on verify. * New global flag "require-gnupg" to set a minimal gnupg version. * More supported items in gpgme_get_dirinfo. * New function gpgme_data_set_flag and flag "size-hint". * New function gpgme_set_ctx_flag and flags "full-status" and "raw-description". * Improved gpgme_data_identify to distinguish more file types. * New flag GPGME_ENCRYPT_SYMMETRIC for gpgme_op_encrypt to allow mixed public key and symmetric encryption. * New field KEYGRIP in gpgme_subkey_t. New fields FPR in gpgme_key_t. * New flag GPGME_DATA_ENCODING_MIME to declare that the encrypted or signed data is a valid MIME part. This is to support future GnuPG versions. * Interface changes relative to the 1.6.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgme_pubkey_algo_string NEW. GPGME_PK_EDDSA NEW. gpgme_set_ctx_flag NEW. gpgme_data_set_flag NEW. gpgme_op_createkey NEW. gpgme_op_createkey_start NEW. gpgme_op_createsubkey NEW. gpgme_op_createsubkey_start NEW. gpgme_op_adduid_start NEW. gpgme_op_adduid NEW. gpgme_op_revuid_start NEW. gpgme_op_revuid NEW. gpgme_op_keysign_start NEW. gpgme_op_keysign NEW. gpgme_op_tofu_policy_start NEW. gpgme_op_tofu_policy NEW. gpgme_op_interact_start NEW. gpgme_op_interact NEW. gpgme_interact_cb_t NEW. gpgme_op_edit_start DEPRECATED. gpgme_op_edit DEPRECATED. gpgme_op_card_edit_start DEPRECATED. gpgme_op_card_edit DEPRECATED. gpgme_edit_cb_t DEPRECATED. gpgme_status_code_t DEPRECATED. gpgme_genkey_result_t EXTENDED: New fields pubkey and seckey. gpgme_signature_t EXTENDED: New field key. gpgme_key_t EXTENDED: New field fpr. gpgme_subkey_t EXTENDED: New field keygrip. gpgme_user_id_t EXTENDED: New field tofu. gpgme_tofu_policy_t NEW. gpgme_tofu_info_t NEW. GPGME_STATUS_KEY_CONSIDERED NEW. GPGME_STATUS_TOFU_USER NEW. GPGME_STATUS_TOFU_STATS NEW. GPGME_STATUS_TOFU_STATS_LONG NEW. GPGME_STATUS_NOTATION_FLAGS NEW. GPGME_KEYLIST_MODE_WITH_TOFU NEW. GPGME_DATA_TYPE_PGP_ENCRYPTED NEW. GPGME_DATA_TYPE_PGP_SIGNATURE NEW. GPGME_DATA_ENCODING_MIME NEW. GPGME_ENCRYPT_SYMMETRIC NEW. GPGME_CREATE_SIGN NEW. GPGME_CREATE_ENCR NEW. GPGME_CREATE_CERT NEW. GPGME_CREATE_AUTH NEW. GPGME_CREATE_NOPASSWD NEW. GPGME_CREATE_SELFSIGNED NEW. GPGME_CREATE_NOSTORE NEW. GPGME_CREATE_WANTPUB NEW. GPGME_CREATE_WANTSEC NEW. GPGME_CREATE_FORCE NEW. GPGME_KEYSIGN_LOCAL NEW. GPGME_KEYSIGN_LFSEP NEW. GPGME_INTERACT_CARD NEW.
2017-03-30Remove erlang-p1_pam in favor of erlang-epam.fhajny1-2/+2
2017-03-30Remove security/erlang-p1_pam. Superseded by security/erlang-epam.fhajny4-33/+0
2017-03-30Update security/erlang-fast_tls to 1.0.11.fhajny3-24/+10
- coveralls:convert_file is not 4 arg function - Resolve vars.config relative to SCRIPT - Comment debug line - Fix a couple typos in the README's macOS/OS X section - Small typo fix on readme - Deprecate hash functions in favor of crypto:hash/2 - Fix certificate decoding to OTP format
2017-03-30Import epam 1.0.2 as security/erlang-epam.fhajny4-0/+36
epam helper for Erlang / Elixir PAM authentication support.
2017-03-23Extra scripts can need bash and perl.leot1-1/+4
Bump PKGREVISION Pointed out by <joerg>'s bulk builds
2017-03-23Extend SHA512 checksums to various files I have on my local distfilejoerg6-6/+12
mirror.
2017-03-23Add SHA512 checksum data.taca3-3/+6
2017-03-23Remove unused/empty distinfo files.joerg6-6/+0
2017-03-21Remove comment -- test failures not repeatable.wiz1-3/+1
2017-03-20Unbreak go-crypto and go-net, they no longer depend on one another.bsiegert4-31/+28
Bump go-crypto and go-tools, which now depends on go-crypto-acme. Fixes PR pkg/52081 breakage.
2017-03-20New package go-crpyto-acme, a spin-off from go-crypto to get rid of thebsiegert5-1/+49
circular dependency from PR pkg/52081.
2017-03-20Add and enable php-pecl-mcrypt.taca1-1/+2
2017-03-20Add pecl version of php-mcrypt for php71.taca3-0/+27
2017-03-20Update security/vault to 0.7.0.fhajny2-7/+7
SECURITY: * Common name not being validated when `exclude_cn_from_sans` option used in `pki` backend DEPRECATIONS/CHANGES: * List Operations Always Use Trailing Slash * PKI Defaults to Unleased Certificates FEATURES: * Replication (Enterprise) * Response Wrapping & Replication in the Vault Enterprise UI * Expanded Access Control Policies * SSH Backend As Certificate Authority IMPROVEMENTS: * api/request: Passing username and password information in API request * audit: Logging the token's use count with authentication response and logging the remaining uses of the client token with request * auth/approle: Support for restricting the number of uses on the tokens issued * auth/aws-ec2: AWS EC2 auth backend now supports constraints for VPC ID, Subnet ID and Region * auth/ldap: Use the value of the `LOGNAME` or `USER` env vars for the username if not explicitly set on the command line when authenticating * audit: Support adding a configurable prefix (such as `@cee`) before each line * core: Canonicalize list operations to use a trailing slash * core: Add option to disable caching on a per-mount level * core: Add ability to require valid client certs in listener config * physical/dynamodb: Implement a session timeout to avoid having to use recovery mode in the case of an unclean shutdown, which makes HA much safer * secret/pki: O (Organization) values can now be set to role-defined values for issued/signed certificates * secret/pki: Certificates issued/signed from PKI backend do not generate leases by default * secret/pki: When using DER format, still return the private key type * secret/pki: Add an intermediate to the CA chain even if it lacks an authority key ID * secret/pki: Add role option to use CSR SANs * secret/ssh: SSH backend as CA to sign user and host certificates * secret/ssh: Support reading of SSH CA public key from `config/ca` endpoint and also return it when CA key pair is generated BUG FIXES: * audit: When auditing headers use case-insensitive comparisons * auth/aws-ec2: Return role period in seconds and not nanoseconds * auth/okta: Fix panic if user had no local groups and/or policies set * command/server: Fix parsing of redirect address when port is not mentioned * physical/postgresql: Fix listing returning incorrect results if there were multiple levels of children Full changelog: https://github.com/hashicorp/vault/blob/v0.7.0/CHANGELOG.md
2017-03-20Update ruby-airbrussh to 1.12.0.taca3-8/+9
## [1.12.0][] (2017-02-10) ### Breaking changes * None ### New features * Add `SSHKit.config.default_runner_config` option that allows overriding default runner configs. ## [1.11.5][] (2016-12-16) ### Bug fixes * Do not prefix `exec` command [PR #378](https://github.com/capistrano/sshkit/pull/378) @dreyks ## [1.11.4][] (2016-11-02) * Use string interpolation for environment variables to avoid escaping issues with sprintf [PR #280](https://github.com/capistrano/sshkit/pull/280) @Sinjo - Chris Sinjakli
2017-03-20Update ruby-airbrussh to 1.1.2taca3-8/+9
## [1.1.2][] (2017-01-02) * Add Ruby 2.4.0 to testing matrix and fix Ruby 2.4 deprecation warnings
2017-03-20Mark go-net and go-crypto as BROKEN, since they DEPEND on each other.wiz1-2/+4
2017-03-17putty: amend patch to use the BSD syntax on BSDs, and the alternatemaya2-6/+9
syntax otherwise -- it has a better chance of working.
2017-03-17Not all the world is GNU configure.wiz1-1/+3
Unbreaks mail/notmuch.
2017-03-17putty: update to 0.68maya7-70/+43
PuTTY 0.68, released today, supports elliptic-curve cryptography for host keys, user authentication keys, and key exchange. Also, for the first time, it comes in a 64-bit Windows version. This update may create a build issue for non-BSD due to ancient functions being different on BSD and SYSV. there's always macros if this fails.
2017-03-16fail2ban: fix build on linux and othersmaya1-1/+3
having an empty SUBST_SED returns usage and a non-zero exit value and the build doesn't continue.
2017-03-16Update go-crypto to 20170317, part of PR pkg/52081.bsiegert4-16/+83
No changelog from upstream but there is a new acme package for Let's Encrypt certificates.
2017-03-15Limit broken openssl.cnf handling to NetBSD only after no response fromjperkin2-6/+7
bsiegert@. There's no reason to pollute other operating systems. Bump PKGREVISION.
2017-03-13+ sqlmapleot1-1/+2
2017-03-13Import sqlmap-1.1.3 as security/sqlmapleot4-0/+1394
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
2017-03-13Updated py-cryptography to 1.8.1.wiz3-36/+10
1.8.1 - 2017-03-10 ~~~~~~~~~~~~~~~~~~ * Fixed macOS wheels to properly link against 1.1.0 rather than 1.0.2. 1.8 - 2017-03-09 ~~~~~~~~~~~~~~~~ * Added support for Python 3.6. * Windows and macOS wheels now link against OpenSSL 1.1.0. * macOS wheels are no longer universal. This change significantly shrinks the size of the wheels. Users on macOS 32-bit Python (if there are any) should migrate to 64-bit or build their own packages. * Changed ASN.1 dependency from ``pyasn1`` to ``asn1crypto`` resulting in a general performance increase when encoding/decoding ASN.1 structures. Also, the ``pyasn1_modules`` test dependency is no longer required. * Added support for :meth:`~cryptography.hazmat.primitives.ciphers.CipherContext.update_into` on :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`. * Added :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKeyWithSerialization.private_bytes` to :class:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKeyWithSerialization`. * Added :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPublicKeyWithSerialization.public_bytes` to :class:`~cryptography.hazmat.primitives.asymmetric.dh.DHPublicKeyWithSerialization`. * :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key` and :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key` now require that ``password`` must be bytes if provided. Previously this was documented but not enforced. * Added support for subgroup order in :doc:`/hazmat/primitives/asymmetric/dh`.
2017-03-13+ py-asn1cryptowiz1-1/+2
2017-03-13Import py-asn1crypto-0.21.1 as security/py-asn1crypto.wiz4-0/+109
Fast ASN.1 parser and serializer with definitions for private keys, public keys, certificates, CRL, OCSP, CMS, PKCS#3, PKCS#7, PKCS#8, PKCS#12, PKCS#5, X.509 and TSP.
2017-03-13Updated py-cryptography_vectors to 1.8.1.wiz3-8/+22
Changes not found, but this comes with new asymmetric DH and DSA files.
2017-03-12Update pear-Crypt_GPG to 1.6.0.taca3-13/+15
1.6.0 2017-02-26 03:26 UTC Changelog: * This release adds GnuPG 2.1 support. * Internal API has been refactored. * Fix Bug #21182: Ignore invalid proc_close() exit code * Fix Bug G#28: Use --batch argument for key imports when no passphrase is provided. * Fix Bug #21151: GPG-AGENT process is not automatically closed when using GnuPG 2.0 * Fix Bug #21152: Ignore time conflicts (by default) * Fixed Bug #21148: Throw bad-passphrase exception instead of key-not-found exception on decryption
2017-03-12pkgrevision bump for changed apache default.maya2-4/+4
bumping any package depending on a pkg with APACHE_PKG_PREFIX but without APACHE_PKG_PREFIX in its PKGNAME.
2017-03-11Update to 0.6.12wen2-7/+7
Upstream changes: 2017-01-26 Dirk Eddelbuettel <edd@debian.org> * DESCRIPTION (Version, Date): Release 0.6.12 2017-01-23 Thierry Onkelinx <thierry.onkelinx@inbo.be> * NAMESPACE: export sha1.function() and sha1.call() * R/sha1.R: - sha1() gains methods for the class "function" and "call" - sha1() gains a ... argument, currently only relevant for "function" - sha1() takes arguments into account for hash for complex, Date and array. Note that this will lead to different hasheS for these classes and for objects containing these classes * man/sha1.rd: update helppage for sha1() * tests/sha1Test.R: update unit tests for sha1() 2017-01-01 Dirk Eddelbuettel <edd@debian.org> * DESCRIPTION (Version, Date): Release 0.6.11 * R/sha1.R (sha1.anova): Added more #nocov marks * src/sha2.c (SHA256_Transform): Idem * tests/AESTest.R (hextextToRaw): Print AES object * tests/AESTest.Rout.save: Updated 2016-12-08 Dirk Eddelbuettel <edd@debian.org> * NAMESPACE: Register (and exported) makeRaw S3 methods * man/makeRaw.Rd: New manual page * tests/hmacTest.R: Direct call to makeRaw() * tests/hmacTest.Rout.save: Ditto * src/digest.c: Additional #nocov tags * src/xxhash.c: Ditto 2016-12-07 Dirk Eddelbuettel <edd@debian.org> * DESCRIPTION (Version, Date): Rolled minor version * README.md: Use shields.io badge for codecov * R/digest.R: Additional #nocov tags * src/sha2.c: Ditto * src/raes.c: Ditto * tests/hmacTest.R: Additional tests * tests/hmacTest.Rout.save: Ditto 2016-11-30 Dirk Eddelbuettel <edd@debian.org> * .travis.yml (before_install): Activate PPA as we (currently) need an updated version of (r-cran)-covr to run coverage * tests/load-unload.R: Comment-out for now as it upsets coverage * tests/digestTest.R: Test two more algorithms * tests/digestTest.Rout.save: Updated reference output * R/digest.R: Added #nocov tags * R/zzz.R (.onUnload): Ditto * src/crc32.c: Ditto * src/pmurhash.c: Ditto * src/raes.c: Ditto * src/sha2.c: Ditto * src/xxhash.c: Ditto 2016-11-26 Dirk Eddelbuettel <edd@debian.org> * .travis.yml (after_success): Integrated Jim Hester's suggestion of activating code coverage sent many moons ago (in PR #12) * .codecov.yml (comment): Added * .Rbuildignore: Exclude .codecov.yml * README.md: Added code coverage badge 2016-10-16 Dirk Eddelbuettel <edd@debian.org> * R/digest.R (digest): Support 'nosharing' option of base::serialize as suggested by Radford Neal whose pqR uses this 2016-08-02 Dirk Eddelbuettel <edd@debian.org> * DESCRIPTION (License): Now GPL (>= 2), cf issue 36 on GH * README.md: Updated badge accordingly 2016-08-02 Dirk Eddelbuettel <edd@debian.org> * DESCRIPTION (Version): Release 0.6.10 * DESCRIPTION (Description): Shortened to one paragraph * DESCRIPTION (BugReports): URL to GH issues added * .travis.yml: Rewritten for run.sh from forked r-travis 2016-07-12 Henrik Bengtsson <hb@aroma-project.org> * src/digest.c: Correct bug with skip and file parameter interaction * tests/digestTest.R: Test code * tests/digestTest.Rout.save: Test reference output * R/zzz.R: Allow for unloading of shared library * tests/load-unload.R: Test code * DESCRIPTION: Rolled minor Version and Date 2016-05-25 Thierry Onkelinx <thierry.onkelinx@inbo.be> * R/sha1.R: Support for pairlist and name * tests/sha1Test.R: Support for pairlist and name * man/sha1.Rd: Support for pairlist, name, complex, array and Date * NAMESPACE: Support for pairlist, name and array * DESCRIPTION: bump version number and date 2016-05-01 Viliam Simko <viliam.simko@gmail.com> * R/sha1.R: Support for complex, Date and array * tests/sha1Test.R: Ditto * NAMESPACE: Ditto 2016-04-27 Dirk Eddelbuettel <edd@debian.org> * DESCRIPTION (Author): Add Qiang Kou to Authors * README.md: Ditto 2016-01-25 Dirk Eddelbuettel <edd@debian.org> * src/digest.c (digest): Use XLENGTH if R >= 3.0.0 (issue #29) 2016-01-11 Thierry Onkelinx <thierry.onkelinx@inbo.be> * R/sha1.R: handle empty list and empty dataframe (#issue 27); take the object class, digits and zapsmall into account (#PR 28) * vignettes/sha1.Rmd: Small edits to reflect changes is sha1() 2016-01-09 Michel Lang <michellang@gmail.com> * R/sha1.R: Add a length check to sha1(), use vapply()
2017-03-11DESCR was maybe a little too descriptive, pkgsrc handles the dependencies.nils1-3/+0
2017-03-10add and enable dehydratednils1-1/+2
2017-03-10Import dehydrated-0.4.0 as security/dehydrated.nils4-0/+77
This is a client for signing certificates with an ACME-server (currently only provided by letsencrypt) implemented as a relatively simple bash-script. It uses the openssl utility for everything related to actually handling keys and certificates, so you need to have that installed. Other dependencies are: curl, sed, grep, mktemp (all found on almost any system, curl being the only exception)
2017-03-08Add ruby-rex-struct2minskim1-1/+2
2017-03-08Import ruby-rex-struct2-0.1.0 as security/ruby-rex-struct2minskim4-0/+44
Ruby Exploitation (Rex) library for generating/manipulating C-Style structs.
2017-03-08Tabs vs spaces!sevan2-21/+21
Unbreak with the Python 3 versions of the package. Heads up by Daniel Jakots.
2017-03-07Patch CVE-2013-7459, obtained from:sevan4-3/+79
https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4 Bump rev. Reviewed by: wiz
2017-03-07py-cryptodome: update to 3.4.5maya4-26/+9
The library can also be compiled using MinGW. Removed use of alloca(). [Security] Removed implementation of deprecated "quick check" feature of PGP block cipher mode. Improved the performance of scrypt by converting some Python to C.
2017-03-05Updated libgpg-error to 1.27.wiz3-8/+9
Noteworthy changes in version 1.27 (2017-02-28) [C22/A22/R0] ----------------------------------------------- * Added a Base64 decoder. * Added support for the sh3 architecture. * Added header gpgrt.h as an alias for gpg-error.h. * Fixed macro GPGRT_GCC_VERSION. * Fixed a race in non-blocking I/O on Windows. * Interface changes relative to the 1.26 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgrt_b64state_t NEW type. gpgrt_b64dec_start NEW. gpgrt_b64dec_proc NEW. gpgrt_b64dec_finish NEW. GPG_ERR_WRONG_NAME NEW. gpgrt.h NEW header.
2017-03-03Create /etc/openssl/openssl.cnf if it does not exist.bsiegert2-2/+7
Otherwise, there is one nonsensical warning on every openssl invocation. I have seen dozens of recipes for NetBSD setups, and each one cargo-cults a "touch openssl.cnf" against that noise. Bump package revision.
2017-02-28Recursive revbump from graphics/libwebpryoon2-4/+4
2017-02-26* Version 3.5.9 (released 2017-02-12)adam3-94/+17
** libgnutls: Removed any references to OpenPGP functionality in documentation, and marked all functions in openpgp.h as deprecated. That functionality is considered deprecated and should not be used for other reason than backwards compatibility. ** libgnutls: Improve detection of AVX support. In certain cases when when the instruction was available on the host, but not on a VM running gnutls, detection could fail causing illegal instruction usage. ** libgnutls: Added support for IDNA2008 for internationalized DNS names. If gnutls is compiled using libidn2 (the latest version is recommended), it will support IDNA2008 instead of the now obsolete IDNA2003 standard. Resolves gitlab issue 150. Based on patch by Tim Ruehsen. ** p11tool: re-use ID from corresponding objects when writing certificates. That is, when writing a certificate which has a corresponding public key, or private key in the token, ensure that we use the same ID for the certificate. ** API and ABI modifications: gnutls_idna_map: Added gnutls_idna_reverse_map: Added
2017-02-26* Noteworthy changes in release 4.10:adam3-16/+14
- Updated gnulib - Removed -Werror from default compiler flags - Fixed undefined behavior when negating integers in _asn1_ltostr(). Issue found by oss-fuzz project (via gnutls): https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=388 - Pass the correct length to _asn1_get_indefinite_length_string in asn1_get_length_ber. This addresses reading 1-byte past the end of data. Issue found by oss-fuzz project (via gnutls): https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=330 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33
2017-02-23Install the manual page and the header file; throw in one buildlink3.mkkleink3-2/+22
for good measure. Bump PKGREVISION.
2017-02-23Recursive bump for libzip shlib major bump.wiz1-2/+2
2017-02-21Update argon2 to 20161029.kleink5-54/+31
# 20161029 * Argon2id added * Better documentation * Dual licensing CC0 / Apache 2.0 * Minor bug fixes (no security issue) # 20160406 * Version 1.3 of Argon2 * Version number in encoded hash * Refactored low-level API * Visibility control for library symbols * Microsoft Visual Studio solution * New bindings * Minor bug and warning fixes (no security issue) # 20151206 * Python bindings * Password read from stdin, instead of being an argument * Compatibility FreeBSD, NetBSD, OpenBSD * Constant-time verification * Minor bug and warning fixes (no security issue)