Age | Commit message (Collapse) | Author | Files | Lines |
|
4+ years worth of patches.
|
|
|
|
Today you need to remember many passwords. You need a password for
the Windows network logon, your e-mail account, your website's FTP
password, online passwords (like website member account), etc. etc.
etc. The list is endless. Also, you should use different passwords
for each account. Because if you use only one password everywhere
and someone gets this password you have a problem... A serious
problem. The thief would have access to your e-mail account, website,
etc. Unimaginable.
KeePass is a free open source password manager, which helps you to
manage your passwords in a secure way. You can put all your passwords
in one database, which is locked with one master key or a key file.
So you only have to remember one single master password or select
the key file to unlock the whole database. The databases are
encrypted using the best and most secure encryption algorithms
currently known (AES and Twofish).
|
|
|
|
|
|
|
|
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
|
|
not be loaded by dlopen(), therefore we remove the useless dependency on
-lpthread
|
|
|
|
ChangeLog Since 2.3.5:
* fix a bug when receiving a signature using the InclusiveNamespaces
PrefixList by copying namespace declaration from upper level at the level of
the signed node.
* fix compilation warning on recent version of GCC
|
|
Indent while here.
|
|
|
|
1.49 2012-09-25
Fixed problem where on some platforms test t/local/07_tcpecho.t would
bail out if it could not bind port 1212. Now now tries a number of ports to bind to until
successful.
Improvements to unsigned casting contributed by Reini Urban.
Improvements to Net::SSLeay::read to make it easier to use with non-blocking IO:
contributed by James Marshall: It modifies
Net::SSLeay::read() to return the result from SSL_read() as the second
return value, if Net::SSLeay::read() is called in list context. Its
behavior should be unchanged if called in scalar or void context. This
result code seems to be required for full support of non-blocking I/O,
since users need to handle SSL_ERR_WANT_READ, SSL_ERROR_WANT_WRITE, etc.
Fixed a problem where t/local/kwalitee.t fails with
Module::CPANTS::Analyse 0.86. Patch from Paul.
Fixed a number of typos patched by Giles.
Fixed a compiler warning from Compiling with gcc-4.4 and -Wall, patched by Giles.
Fixed problems with get_https4: documentation was wrong, $header_ref was
not correctly set and $server_cert was not returned.
Fixed a problem that could cause a Perl exception about no blength
method on undef. Reported by "Stephen J. Smith via RT". https://rt.cpan.org/Ticket/Display.html?id=79309
Added documentation about how to mitigatxe various SSL/TLS
vulnerabilities.
Fixed problem reported by Mike Doherty: SSL_MODE_* are defined in ssl.h,
and should be available as constants, but I do not see them listed in constants.h
|
|
20120823
- Fix test (RT#79129, reported by Sinan Unur)
20120822
- Add mk-ca-bundle.pl from git repository to distribution.
- Add new/additional certificates from the following CAs: Verisign,
UTN-USER, UTN USERFirst, Sonera, NetLock Qualified, SwissSign
Platinum, S-TRUST, ComSign, Actalis, Trustis, StartCom, Buypass.
|
|
v1.77 2012.10.05
- update_peer for IPv6 also, applied fix to
https://rt.cpan.org/Ticket/Display.html?id=79916 by
tlhackque[AT]yahoo[DOT]com
|
|
5.72 Mon Sep 24 15:22:08 MST 2012
- adjusted module installation directory for later Perls
-- As of 5.11 Perl searches 'site' first, so use that
-- ref. INSTALLDIRS in Makefile.PL
-- thanks to Robert Sedlacek for patch
|
|
0.64 2012-08-06 01:23:30
- Drastically simplify Makefile.PL to resolve RT bugs #61249, #61324,
#63553, #68208, and #68084.
- Forgot to update Changes for 0.63, so this version overrides that.
0.61_05 2012-08-04 00:40:22 UTC
- Trying to distinguish between good vs bad zero returns from underlying
SSL_read/SSL_write broke stuff (see RT bug #78695). Revert to previous
behavior.
- Completely re-organize Makefile.PL. I hope these changes will help take
care of RT bugs #61324, #61249, #63553, and #68084 etc. This is not
necessarily finished, but I want to see what happens on CPAN Testers at
this point before making a few other minor changes.
0.60 2012-07-29 21:43:47 UTC
- Release 0.59_03 as 0.60 so distributions can pick up various fixes. The most
important one seems to be bug RT #70565. This should take care of bug RT
#77167
- SSL_read and SSL_write now try to handle incomplete reads/writes (see bug RT
RT #64054). The current test suite does is not very comprehensive, so caution
is recommended at this point. Also, if you have good test cases, I would love
to incorporate them into the distribution.
0.59_03 2012-03-10 00:45:28 UTC
- Bump version number and upload to CPAN.
0.59_02 2012-03-08 16:16:03 UTC
- Forgot to update Changes for 0.59_01. The following is a combined list of
the more important fixes incorporated in both.
- Bug RT #64054: Handle incomplete reads/writes better
- Bug RT #73754: Add LWP::Protocol::https to PREREQ_PM
- Bug RT #73755: Crypt-SSLeay does not verify hosts (yet). Don't let that
cause a failure during tests.
- Streamline t/02-live.t using Try::Tiny and done_testing
- Plus assorted related small changes.
0.58_01 2010-09-08 19:11:39 UTC
- L<text|scheme:...> is not supported in POD for 5.8.5 and earlier.
- TODOs in POD should stand out
- Add /boot/common/ssl and some other directories to unix_ssl_dirs (see bug
#60936).
|
|
0.13
Updated the WRITE() method to use syswrite() and account for
variable buffer sizes in SASL.
|
|
Authen-SASL 2.16 -- Tue Sep 4 11:01:18 CDT 2012
* SASL.pod: fix typo [Peter Marschall]
* Perl.pm: avoid warning on "uninitialized value" [Peter Marschall]
|
|
Upstream changes:
0.14 October 16, 2012
- compiling with -Werror=format-security now works (Jerome Quelin, #48446)
- Use Digest::SHA instead of Digest::SHA1 (Ansgar Burchardt, #60271)
- Security fix, CVE-2009-0129: Missing error check in do_verify (Havard Eidnes, #79958)
|
|
|
|
of the scrypt key derivation function. On modern hardware and with default
parameters, the cost of cracking the password on a file encrypted by scrypt
enc is approximately 100 billion times more than the cost of cracking the
same password on a file encrypted by openssl enc; this means that a five-
character password using scrypt is stronger than a ten-character password
using openssl
|
|
|
|
As soon as qoauth got PKGREV bump, this package could no longer fetch due
to a bad DISTNAME definition. Fix DISTNAME to fix "make fetch".
|
|
Generated file didn't pass -Werror check on gcc4.7. The problem is
well-known and already fixed on the current version of mit-krb5. The
patch added here was taken from upstream.
No revbump necessary, won't change binary on systems that already built it.
|
|
changes:
-better IPv6 support
-bugfixes
-minor improvements
|
|
|
|
* 1.8.14, 2012-07-18
- The malloc allocator would return null instead of throwing in the event of
an allocation failure, which could cause an application crash due to null
pointer dereference where normally an exception would occur.
- Recent versions of OpenSSL include extra information in ECC private keys,
the presence of which caused an exception when such a key was loaded by
botan. The decoding of ECC private keys has been changed to ignore these
fields if they are set.
- AutoSeeded_RNG has been changed to prefer /dev/random over /dev/urandom
- Fix detection of s390x (Debian bug 638347)
|
|
|
|
fixes PR pkg/47043.
|
|
|
|
|
|
In the Makefile, remove PYDISTUTILSPKG=yes, add
.include "../../lang/python/egg.mk", and set PKGREVISION=1.
This fixes errors from "make package" complaining about files
that were installed but not present in the PLIST.
|
|
uses find.pl.
Reported by Jörn Clausen in PR 47036.
|
|
Support for TLSA records.
Support for ILNP (NID, L64, L3, LP) records (untested).
Support for IPSECKEY records.
Handle TYPEXXX for known types correctly.
A number of NSEC3-related bug fixes.
Miscellaneous bug fixes.
|
|
|
|
|
|
are called p5-*.
I hope that's all of them.
|
|
|
|
* Noteworthy changes in release 2.14 (2012-09-24) [stable]
- Added asn1_read_node_value() to obtain a node's value.
This is to deprecate the export of the node_asn internal structure
for the upcoming 3.x release. The ASN1_DATA_NODE type and the
ASN1_ETYPE_* constants were added to support the new function.
|
|
requested by Thomas Klausner.
|
|
Also reported upstream, ref.
https://rt.cpan.org/Public/Bug/Display.html?id=79958
Bump PKGREVISION.
|
|
|
|
|
|
|
|
|
|
or manpage will not displayed correctly with man(1).
It also fixes installation failure for platforms missing `nroff -mandoc'.
Bump PKGREVISION.
|
|
|
|
QOAuth is a library to support interaction with OAuth-powered network services,
such as StatusNet or Twitter, in a Qt way.
|
|
Fixes for minor pkglint warnings
|