summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2011-06-04Pullup ticket #3447 - requested by tezsbd3-3/+31
security/openssl security fix Revisions pulled up: - security/openssl/Makefile 1.156 - security/openssl/distinfo 1.81 - security/openssl/patches/patch-crypto_ecdsa_ecs__ossl.c 1.1 --- Module Name: pkgsrc Committed By: tez Date: Tue May 31 17:18:42 UTC 2011 Modified Files: pkgsrc/security/openssl: Makefile distinfo Added Files: pkgsrc/security/openssl/patches: patch-crypto_ecdsa_ecs__ossl.c Log Message: Add protection against ECDSA timing attacks as mentioned in the paper by Billy Bob Brumley and Nicola Tuveri, see: http://eprint.iacr.org/2011/232.pdf [Billy Bob Brumley and Nicola Tuveri] (patch confirmed in upstream cvs)
2011-05-20Pullup ticket #3431 - requested by tacatron2-4/+36
security/openssh: bug fix update Revisions pulled up: - security/openssh/Makefile 1.201-1.202 - security/openssh/files/sshd.sh 1.12-1.13 --- Module Name: pkgsrc Committed By: taca Date: Mon May 16 05:06:49 UTC 2011 Modified Files: pkgsrc/security/openssh: Makefile pkgsrc/security/openssh/files: sshd.sh Log Message: Maintenance of openssh pacakge: 1. Add support for check and create ECDSA host key for SSH protocol version 2. 2. Disable use of strnvis(3) on NetBSD. NetBSD current after 2011/03/12 has strnvis(3), but it has different argument from OpenBSD (and other system). Bump PKGREVISION. --- Module Name: pkgsrc Committed By: taca Date: Tue May 17 03:26:52 UTC 2011 Modified Files: pkgsrc/security/openssh: Makefile pkgsrc/security/openssh/files: sshd.sh Log Message: Don't always try to create ecdsa key which depends on OpenSSL's version. Bump PKGREVISION.
2011-05-15Pullup ticket #3430 - requested by tacasbd2-7/+7
security/openssh security update Revisions pulled up: - security/openssh/Makefile 1.200 - security/openssh/distinfo 1.80 --- Module Name: pkgsrc Committed By: taca Date: Sun May 15 04:17:15 UTC 2011 Modified Files: pkgsrc/security/openssh: Makefile distinfo Log Message: Update openssh package to 5.8.2 (5.8p2). 20110403 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec] [contrib/suse/openssh.spec] Prepare for 5.8p2 release. - (djm) [version.h] crank version - Release 5.8p2 20110329 - (djm) [entropy.c] closefrom() before running ssh-rand-helper; leftover fds noticed by tmraz AT redhat.com 20110221 - (dtucker) [contrib/cygwin/ssh-host-config] From Corinna: revamp of the Cygwin-specific service installer script ssh-host-config. The actual functionality is the same, the revisited version is just more exact when it comes to check for problems which disallow to run certain aspects of the script. So, part of this script and the also rearranged service helper script library "csih" is to check if all the tools required to run the script are available on the system. The new script also is more thorough to inform the user why the script failed. Patch from vinschen at redhat com. 20110206 - (dtucker) [openbsd-compat/port-linux.c] Bug #1851: fix syntax error in selinux code. Patch from Leonardo Chiquitto - (dtucker) [contrib/cygwin/ssh-{host,user}-config] Add ECDSA key generation and simplify. Patch from Corinna Vinschen.
2011-04-16Pullup ticket #3415 - requested by teztron5-11/+33
security/mit-krb5: security patch Revisions pulled up: - security/mit-krb5/Makefile 1.52-1.53 - security/mit-krb5/buildlink3.mk 1.11 - security/mit-krb5/builtin.mk 1.7 - security/mit-krb5/distinfo 1.28-1.29 - security/mit-krb5/patches/patch-ck 1.1 --- Module Name: pkgsrc Committed By: tez Date: Fri Apr 8 17:30:35 UTC 2011 Modified Files: pkgsrc/security/mit-krb5: builtin.mk Log Message: Add builtin support for SunOS per PR#44597 --- Module Name: pkgsrc Committed By: tez Date: Sat Apr 9 00:16:18 UTC 2011 Modified Files: pkgsrc/security/mit-krb5: Makefile buildlink3.mk distinfo Added Files: pkgsrc/security/mit-krb5/patches: patch-ck Log Message: correct openssl dependency (it needs >=0.9.8) correct BUILDLINK_API_DEPENDS.mit-krb5 fix building where libtool chokes on "--version-info : " (at least OS X) --- Module Name: pkgsrc Committed By: tez Date: Thu Apr 14 19:37:26 UTC 2011 Modified Files: pkgsrc/security/mit-krb5: Makefile distinfo Log Message: fix MITKRB5-SA-2011-004 (CVE-2011-0285) DOS in kadmind
2011-04-01Let this package build on post-POSIX getline() systems.agc5-4/+120
Also include the relevant (static) libraries, where necessary, to allow link-editing.
2011-04-01Use solaris64 rather than solaris for ABI=64 build using gcc in SunOStez1-3/+3
fixes PR#44769
2011-04-01Update to 1.2.17, for security reasons.wiz6-50/+9
* Preparations for 1.2.17 release * Fixed security issue with libxslt (CVE-2011-1425, reported by Nicolas Gregoire) * Fixed pkcs12 file loading (based on patch from Andre de Souza Pinto) * Fixed comments (based on patch from Wolfgang Woehl) * Fixed extra quotes in configure (bug #631258) * Fixed configure issue with empty --with-libxml/libxsl and config scripts in /bin directory * Fixed gcrypt init/shutdown (patch from Roumen)
2011-04-01Fix PKGNAME to have "60" instead of "6", to avoid making it appear verywiz1-4/+4
old and triggering a vulnerability match. Suggested by obache. Reset PKGREVISION, since the version is newer than the old one. Set LICENSE.
2011-03-31Be consistent in the way we quote the '#' characteragc3-6/+6
2011-03-31The '#' character is kinda special to makefiles - re-work the comment fieldagc1-2/+2
so that we don't have any '#' chars in it. Avoids the following: % grep COMMENT Makefile COMMENT= Cryptographic store accessible through a PKCS#11 interface % pkg_info softhsm Information for softhsm-1.2.0: Comment: Cryptographic store accessible through a PKCS
2011-03-24* fix make target dependency to man page aliases (arg_printusage.3) will beobache5-9/+50
always installed. * add user-destdir installation support.
2011-03-24Use bsdtar for extract, or result in corrupted file name with certain tar.obache2-4/+6
Bump PKGREVISION.
2011-03-23update PLIST. arg_printusage.3 is gone.zafer1-2/+1
2011-03-23revert unwanted commit accidently.obache1-3/+1
2011-03-23remove needless assignment, it break strict-aliasing.obache3-4/+23
2011-03-23bsd.fast.prefs.mk should not be included from packages.obache1-2/+2
2011-03-23Kerberos V5 is an authentication system developed at MIT. It is a networktez5-0/+110
authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography. (Kerberos 5 is discussed in RFC 1510.) This package provides MIT Kerberos applications and servers for telnet, the r-services and ftp. These were recently split from the mit-krb5 package due to upstream making the same split.
2011-03-22remove 3 more old patches that got missedtez3-82/+0
2011-03-22Update MIT Kerberos to v1.8.3 with the latest security patches up to andtez64-2393/+481
including MITKRB5-SA-2011-003. Please see http://web.mit.edu/kerberos/ for the change logs since v1.4.2 Note that the r-services, telnetd and ftpd services and the related client applications are now in a separate pacakge security/mit-krb5-appl.
2011-03-22add mit-krb5-appl (split out of mit-krb5)tez1-1/+2
2011-03-22looks like "make mps" may have been missed...abs1-4/+4
2011-03-22Update sudo pacakge to 1.7.5.taca3-28/+30
* pkgsrc change: trying to use user-destdir. What's new in Sudo 1.7.5? * When using visudo in check mode, a file named "-" may be used to check sudoers data on the standard input. * Sudo now only fetches shadow password entries when using the password database directly for authentication. * Password and group entries are now cached using the same key that was used to look them up. This fixes a problem when looking up entries by name if the name in the retrieved entry does not match the name used to look it up. This may happen on some systems that do case insensitive lookups or that truncate long names. * GCC will no longer display warnings on glibc systems that use the warn_unused_result attribute for write(2) and other system calls. * If a PAM account management module denies access, sudo now prints a more useful error message and stops trying to validate the user. * Fixed a potential hang on idle systems when the sudo-run process exits immediately. * Sudo now includes a copy of zlib that will be used on systems that do not have zlib installed. * The --with-umask-override configure flag has been added to enable the "umask_override" sudoers Defaults option at build time. * Sudo now unblocks all signals on startup to avoid problems caused by the parent process changing the default signal mask. * LDAP Sudoers entries may now specify a time period for which the entry is valid. This requires an updated sudoers schema that includes the sudoNotBefore and sudoNotAfter attributes. Support for timed entries must be explicitly enabled in the ldap.conf file. Based on changes from Andreas Mueller. * LDAP Sudoers entries may now specify a sudoOrder attribute that determines the order in which matching entries are applied. The last matching entry is used, just like file-based sudoers. This requires an updated sudoers schema that includes the sudOrder attribute. Based on changes from Andreas Mueller. * When run as sudoedit, or when given the -e flag, sudo now treats command line arguments as pathnames. This means that slashes in the sudoers file entry must explicitly match slashes in the command line arguments. As a result, and entry such as: user ALL = sudoedit /etc/* will allow editing of /etc/motd but not /etc/security/default. * NETWORK_TIMEOUT is now an alias for BIND_TIMELIMIT in ldap.conf for compatibility with OpenLDAP configuration files. * The LDAP API TIMEOUT parameter is now honored in ldap.conf. * The I/O log directory may now be specified in the sudoers file. * Sudo will no longer refuse to run if the sudoers file is writable by root. * Sudo now performs command line escaping for "sudo -s" and "sudo -i" after validating the command so the sudoers entries do not need to include the backslashes. * Logging and email sending are now done in the locale specified by the "sudoers_locale" setting ("C" by default). Email send by sudo now includes MIME headers when "sudoers_locale" is not "C". * The configure script has a new option, --disable-env-reset, to allow one to change the default for the sudoers Default setting "env_reset" at compile time. * When logging "sudo -l command", sudo will now prepend "list " to the command in the log line to distinguish between an actual command invocation in the logs. * Double-quoted group and user names may now include escaped double quotes as part of the name. Previously this was a parse error. * Sudo once again restores the state of the signal handlers it modifies before executing the command. This allows sudo to be used with the nohup command. * Resuming a suspended shell now works properly when I/O logging is not enabled (the I/O logging case was already correct).
2011-03-21OpenDNSSEC 1.2.1:pettai4-11/+21
* ldns 1.6.9 is required for bugfixes. * dnsruby-1.52 required for bugfixes. Bugfixes: * Auditor: 'make check' now works when srcdir != builddir. * Auditor: Include the 'make check' files in the tarball. * Enforcer: Fix the migration script for SQLite. * Enforcer: Increase size of keypairs(id) field in MySQL to allow more than 32767 keys; see MIGRATION for details. * Enforcer: Minor change to NOT_READY_KEY error message. * libhsm: Increase the maximum number of attached HSM:s from 10 to 100. * ods-ksmutil: Send trivial MySQL messages to stdout when exporting zonelist etc. Otherwise the resulting XML needs to be edited by hand. * ods-control: Fix for Bourne shell. * Signer Engine: Prevent race condition when setting up the workers and the command handler. * Signer Engine: Check if the signature exists before recycling it. * Signer Engine: Quit when there are errors in the configuration. * Signer Engine: Enable core dump on failure. * Signer Engine: Explicitly close down log msg with null. * Signer Engine: Backup state after writing output. * Signer Engine: Allow update of serial if internal structure is not initialized.
2011-03-20Add user-destdir installatin support.obache1-1/+4
2011-03-20Add user-destdir installation support.obache1-8/+10
2011-03-20Add user-destdir installation support.obache1-12/+12
2011-03-19Update ap-modsecurity2 to 2.5.13, partly from Matthew Sporleder indholland3-39/+45
PR 44745, rest by me. pkgsrc changes: - fix up deps - fix Apache module handling - DESTDIR support XXX: The DESTDIR support has to bypass apxs because as far as I can tell XXX: apxs -i doesn't know how to handle DESTDIRs. Various Apache modules XXX: do this in various different ways. Someone(TM) should teach apxs -i XXX: about DESTDIRs and fix up all the abuse. The infrastructure for XXX: Apache modules could use some rototilling as well. 29 Nov 2010 - 2.5.13 -------------------- * Cleaned up some mlogc code and debugging output. * Remove the ability to use a relative path to a piped audit logger (i.e. mlogc) as Apache does not support it in their piped loggers and it was breaking Windows and probably other platforms that use spaces in filesystem paths. Discovered by Tom Donovan. * Fix memory leak freeing regex. Discovered by Tom Donovan. * Fix some portability issues on Windows. * Fixed Geo lookup concurrent connections bug * Fixed Skip/SkipAfter chain bug * Added new setvar Lua API to be used into Lua scripts * Added PCRE messages indicates each rule that exceed match limits * Added new Base64 transformation function called base64DecodeEx, which can decode base64 data skipping special characters. * Add SecReadStateLimit to limit the number of concurrent threads in BUSY connections per ip address * Fixed redirect action was not expanding macros in chained rules 04 Feb 2010 - 2.5.12 -------------------- * Fixed SecUploadFileMode to set the correct mode. * Fixed nolog,auditlog/noauditlog/nolog controls for disruptive actions. * Added additional file info definitions introduced in APR 0.9.5 so that build will work with older APRs (IBM HTTP Server v6). * Added SecUploadFileLimit to limit the number of uploaded file parts that will be processed in a multipart POST. The default is 100. * Fixed path normalization to better handle backreferences that extend above root directories. Reported by Sogeti/ESEC R&D. * Trim whitespace around phrases used with @pmFromFile and allow for both LF and CRLF terminated lines. * Allow for more robust parsing for multipart header folding. Reported by Sogeti/ESEC R&D. * Fixed failure to match internally set TX variables with regex (TX:/.../) syntax. * Fixed failure to log full internal TX variable names and populate MATCHED_VAR* vars. * Enabled PCRE "studying" by default. This is now a configure-time option. * Added PCRE match limits (SecPcreMatchLimit/SecPcreMatchLimitRecursion) to aide in REDoS type attacks. A rule that goes over the limits will set TX:MSC_PCRE_LIMITS_EXCEEDED. It is intended that the next major release of ModSecurity (2.6.x) will move these flags to a dedicated collection. * Reduced default PCRE match limits reducing impact of REDoS on poorly written regex rules. Reported by Sogeti/ESEC R&D. * Fixed memory leak in v1 cookie parser. Reported by Sogeti/ESEC R&D. * Now support macro expansion in numeric operators (@eq, @ge, @lt, etc.) * Update copyright to 2010. * Reserved 700,000-799,999 IDs for Ivan Ristic. * Fixed SecAction not working when CONNECT request method is used (MODSEC-110). [Ivan Ristic] * Do not escape quotes in macro resolution and only escape NUL in setenv values. 04 Nov 2009 - 2.5.11 -------------------- * Added a new multipart flag, MULTIPART_INVALID_QUOTING, which will be set true if any invalid quoting is found during multipart parsing. * Fixed parsing quoted strings in multipart Content-Disposition headers. Discovered by Stefan Esser. * Cleanup persistence database locking code. * Added warning during configure if libcurl is found linked against gnutls for SSL. The openssl lib is recommended as gnutls has proven to cause issues with mutexes and may crash. * Cleanup some mlogc (over)logging. * Do not log output filter errors in the error log. * Moved output filter to run before other stock filters (mod_deflate, mod_cache, mod_expires, mod_filter) to avoid analyzing modified data in the response. Patch originally submitted by Ivan Ristic. 18 Sep 2009 - 2.5.10 -------------------- * Cleanup mlogc so that it builds on Windows. * Added more detailed messages to replace "Unknown error" in filters. * Added SecAuditLogDirMode and SecAuditLogFileMode to allow fine tuning auditlog permissions (especially with mpm-itk). * Cleanup SecUploadFileMode implementation. * Cleanup build scripts. * Fixed crash on configuration if SecMarker is used before any rules. * Fixed SecRuleUpdateActionById so that it will work on chain starters. * Cleanup build system for mlogc. * Allow mlogc to periodically flush memory pools. * Using nolog,auditlog will now log the "Message:" line to the auditlog, but nothing to the error log. Prior versions dropped the "Message:" line from both logs. To do this now, just use "nolog" or "nolog,noauditlog". * Forced mlogc to use SSLv3 to avoid some potential auto negotiation issues with some libcurl versions. * Fixed mlogc issue seen on big endian machines where content type could be listed as zero. * Removed extra newline from audit log message line when logging XML errors. This was causing problems parsing audit logs. * Fixed @pm/@pmFromFile case insensitivity. * Truncate long parameters in log message for "Match of ... against ... required" messages. * Correctly resolve chained rule actions in logs. * Cleanup some code for portability. * AIX does not support hidden visibility with xlc compiler. * Allow specifying EXTRA_CFLAGS during configure to override gcc specific values for non-gcc compilers. * Populate GEO:COUNTRY_NAME and GEO:COUNTRY_CONTINENT as documented. * Handle a newer geo database more gracefully, avoiding a potential crash for new countries that ModSecurity is not yet aware. * Allow checking &GEO "@eq 0" for a failed @geoLookup. * Fixed mlogc global mutex locking issue and added more debugging output. * Cleaned up build dependencies and configure options.
2011-03-19Sort.dholland1-11/+11
2011-03-19* additional missing clean up after removal of libxml option.obache3-26/+6
* pass to configure more preferred variables.
2011-03-19* improve fetch messageobache1-7/+8
* add user-destdir installation support * fixes installation on platforms where ROOT_USER != "root".
2011-03-19Only suggest download of DEFAULT_DISTFILES, or other files may need to beobache1-2/+2
downloaded from other sites than MASTER_SITES.
2011-03-19Add user-destdir installation support.obache1-1/+11
2011-03-19Convert to usual style of "used by" comment.obache1-6/+5
2011-03-19* MAKE_JOBS_SAFE=noobache1-1/+7
* Note commented-out LICENSE (GNU EMACS GENERAL PUBLIC LICENSE) * Add user-destdir installation support.
2011-03-19* LICENSE=original-bsdobache2-6/+18
* Add user-destdir installation support. * Let to binary package same as installed from source Bump PKGREVISION.
2011-03-19LICENSE=gnu-gpl-v2obache1-1/+2
2011-03-19Marked as USER_DESTDIR ready.obache1-3/+5
2011-03-18service suspended. prevent timeout. fetch from backup.zafer3-6/+6
2011-03-18update master_siteszafer1-3/+2
2011-03-121.8:pettai2-7/+6
- New Features: - zonesigner, rollerd - Made changes so that these tools are more compatible with recent versions of Bind - The zone_errors configuration parameter allows a zone- specific maximum to be set. Once exceeded, that zone will be skipped rather than allowing rollover to continue. - blinkenlights - Recognizes when rollerd abruptly quits, so error messages aren't spewed interminably. - ZonFile::Fast - Fixed parsing of DS records containing spaces and parsing of mname and rname SOA fields - Added support for parsing KEY records - keyrec.pm - Made changes to properly lock keyrec files before writing to them. - Begun process of deprecating keyrec_open(). - mapper: - added a new option: --node-size for mapping complex zones. - dnspktflow: - added two new options: --layout-style for selecting the layout style to use --node-size for mapping complex zones. - Add new (default) option to cluster authoritative nodes together to help better understand the relationships between traffic patterns and authoritative name server/zone arrangement. - libval: - Now distributed with the Root TA. - Added stricter checks for openssl SHA-256 support in configure. - Added several improvements that allow the validator to lookup information within provably insecure zones that do not handle EDNS0 requests nicely. This includes adding support for turning off EDNS0 when traversing a name hierarchy that leads to a provably insecure zone, EDNS0 fallback support, and additional checks to check the sanity of response data. - Fixed certain bugs in CNAME handling and in the validation of proofs accompanying wildcard responses, referrals and alias chains. - Fixed support for RSADSA and RSASHA-512 signature validation. - Mac OSX: - Added a Ports file for mac ports - updated the fink build spec - many other miscellaneous bug fixes and improvements.
2011-03-12Fix build + installation errors.pettai2-3/+4
2011-03-12zkt 1.0 -- 15. June 2010pettai3-12/+34
* feat "/dev/urandom" check added to checkconfig() * feat Config compability switch (-C) added to zkt-conf * feat zkt-ls has a new switch -s to change sorting of domains from subdomain before parent to subdomain below the parent * feat "zkt-ls -T" prints only parent trust anchor zkt 1.0rc1 -- 1. Apr 2010 (The 1.0 release was sponsored by DOMINIC(r) ) * feat Several config parameter are printed now in a more consistent and user friendly form. SerialFormat "Incremental" could be abbreviated as "inc" on input. * bug use of AC_ARG_ENABLE macros changed in a way that it is possible to use it as a "--disable-FEATURE" switch. * port no longer checking for malloc() in configue script. Mainly because it checks only if malloc(0) is allowed and we do not need this. * port --disable-color-mode added to configure script * bug Makro PRINT_AGE_OF_YEAR renamed to PRINT_AGE_WITH_YEAR in configure.ac * misc man page zkt-keyman added * misc New command zkt-keyman added as replacement for dnssec-zkt's key management functionality * misc man page zkt-ls added * port Check for ncurses added to Makefile.in * misc Color mode (Option -C) added to zkt-ls (experimental) New source file tcap.c. * misc Deprecate "single linked list" version of ZKT. The binary tree version is the default for years, so the VERSION string does no longer contain a "T". Now, if someone insist on the single link list version (configure --disable-tree) a "S" is added to the version string. Anyway, the code for the single link list version does no longer have the same functionality and will be removed in one of the later releases. * misc New command zkt-ls added as replacement for dnssec-zkt's key listing functionality * func New key algorithms RSASHA256 and RSAHSHA512 added to dki.[ch] and zconf.c New parameter NSEC3 added. Now it's possible to configure an NSEC3_OPTOUT zone. * bug Token parsing function gettok() fixed to recognize tokens with dashes ("zone-statistics" was seen as "zone"). Thanks to Andreas Baess for finding this bug. * bug Fixed bug in (re)salting dynamic zones. sig_zone() and gensalt() needs parameter change for this * func New option -a added to zkt-conf * func In zconf.c CONF_TIMEINT parameter are now able to recognize "unset" values (which is represented internaly as 0) * func Set Max_TTL to sig lifetime for dynamic zones or if Max_TTL is less than 1. max_ttl checks in checkconfig() fixed. * func printconfigdiff() added to zconf.c and used by zkt-conf. Now local configs are printed as diff to site wide config. * misc man page zkt-signer.8 changed to new command syntax * func Per domain logging added. Use parameter LogDomainDir to enable it. For more details see file README.logging. * func distribute.sh supports new action type "distkeys" but is currently not used * misc LOG_FNAMETMPL changed and moved from config_zkt.h to log.h * misc Default soa serial format changed from "Incremental" to "Unixtime" * func dnssec-signer command renamed to zkt-signer. Man page updated. * func New command zkt-conf added as replacement for dnssec-zkt -Z * misc timeint2str() is now global (zconf.c) * func zfparse.c - a rudimentary zone file parser scans minimum and maximum ttl values; adds $INCLUDE dnskey.db zkt 0.99d -- Not released * func Option SIG_DnsKeyKSK for DNSKEY signing with KSK only added * misc BIND 9.7 compability
2011-03-11add some clarification about the difference between OpenSSL and GnuTLS,drochner1-2/+9
and guidance for users of the latter
2011-03-11Changes 1.2.0:adam3-16/+29
* New functions to allow the creation of X.509 certificates. * Interface changes relative to the 1.1.0 release: ksba_certreq_set_serial NEW ksba_certreq_set_issuer NEW ksba_certreq_set_validity NEW ksba_certreq_set_siginfo NEW
2011-03-11Fix building on Mac OS X; added LICENCEadam3-16/+29
2011-03-10update to 0.53.1drochner3-31/+8
changes: -misc fixes and improvements -build against system libtommath/crypt
2011-03-10build shared lib, bump PKGREVdrochner6-8/+118
2011-03-09fix installed pkgconfig .pc file: Don't refer to zlib.pc -- thisdrochner3-2/+24
fails with system libz. We propagate a dependency per bl3 file, this should be sufficient. bump PKGREV
2011-03-07Changes 2.10.5:adam2-6/+6
* libgnutls: Corrected verification of finished messages. * libgnutls: Corrected signature generation and verification in the Certificate Verify message when in TLS 1.2. * pkg-config gnutls.pc improvements. * API and ABI modifications: No changes since last version.
2011-03-05buildlink3.mk fixadam1-2/+3