summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2012-10-28Update to 0.4.3markd6-106/+109
4+ years worth of patches.
2012-10-27+ KeePass.wiz1-1/+2
2012-10-27Import KeePass-2.20.1 as security/KeePass.wiz4-0/+68
Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem... A serious problem. The thief would have access to your e-mail account, website, etc. Unimaginable. KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish).
2012-10-27Add comments to patches.wiz4-7/+16
2012-10-26Use void for a few functions that need it.joerg6-15/+96
2012-10-24Allow unprivileged build on NetBSD, if bind is in base.joerg1-2/+8
2012-10-24Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shallmanu5-3/+103
not be loaded by dlopen(), therefore we remove the useless dependency on -lpthread
2012-10-24Restore opensc-pkcs11.so functionnality on NetBSD-6.0. libpthread shallmanu5-4/+49
not be loaded by dlopen(), therefore we remove the useless dependency on -lpthread
2012-10-23Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.asau368-1019/+368
2012-10-23Upgrade to lasso 2.3.6 in order to completely fix the libxml 2.9 dependencymanu11-218/+680
ChangeLog Since 2.3.5: * fix a bug when receiving a signature using the InclusiveNamespaces PrefixList by copying namespace declaration from upper level at the level of the signed node. * fix compilation warning on recent version of GCC
2012-10-23Restore INSTALLATION_DIRS and krb5.buildlink3.mk, lost in previous.schmonz1-9/+12
Indent while here.
2012-10-23Update to knc 1.7.elric3-35/+7
2012-10-21Update to 1.49:wiz2-7/+6
1.49 2012-09-25 Fixed problem where on some platforms test t/local/07_tcpecho.t would bail out if it could not bind port 1212. Now now tries a number of ports to bind to until successful. Improvements to unsigned casting contributed by Reini Urban. Improvements to Net::SSLeay::read to make it easier to use with non-blocking IO: contributed by James Marshall: It modifies Net::SSLeay::read() to return the result from SSL_read() as the second return value, if Net::SSLeay::read() is called in list context. Its behavior should be unchanged if called in scalar or void context. This result code seems to be required for full support of non-blocking I/O, since users need to handle SSL_ERR_WANT_READ, SSL_ERROR_WANT_WRITE, etc. Fixed a problem where t/local/kwalitee.t fails with Module::CPANTS::Analyse 0.86. Patch from Paul. Fixed a number of typos patched by Giles. Fixed a compiler warning from Compiling with gcc-4.4 and -Wall, patched by Giles. Fixed problems with get_https4: documentation was wrong, $header_ref was not correctly set and $server_cert was not returned. Fixed a problem that could cause a Perl exception about no blength method on undef. Reported by "Stephen J. Smith via RT". https://rt.cpan.org/Ticket/Display.html?id=79309 Added documentation about how to mitigatxe various SSL/TLS vulnerabilities. Fixed problem reported by Mike Doherty: SSL_MODE_* are defined in ssl.h, and should be available as constants, but I do not see them listed in constants.h
2012-10-21Update to 20120823. Replace interpreter in installed file.wiz2-7/+7
20120823 - Fix test (RT#79129, reported by Sinan Unur) 20120822 - Add mk-ca-bundle.pl from git repository to distribution. - Add new/additional certificates from the following CAs: Verisign, UTN-USER, UTN USERFirst, Sonera, NetLock Qualified, SwissSign Platinum, S-TRUST, ComSign, Actalis, Trustis, StartCom, Buypass.
2012-10-21Update to 1.77:wiz2-7/+6
v1.77 2012.10.05 - update_peer for IPv6 also, applied fix to https://rt.cpan.org/Ticket/Display.html?id=79916 by tlhackque[AT]yahoo[DOT]com
2012-10-21Update to 5.72:wiz2-7/+6
5.72 Mon Sep 24 15:22:08 MST 2012 - adjusted module installation directory for later Perls -- As of 5.11 Perl searches 'site' first, so use that -- ref. INSTALLDIRS in Makefile.PL -- thanks to Robert Sedlacek for patch
2012-10-21Update to 0.64:wiz3-22/+6
0.64 2012-08-06 01:23:30 - Drastically simplify Makefile.PL to resolve RT bugs #61249, #61324, #63553, #68208, and #68084. - Forgot to update Changes for 0.63, so this version overrides that. 0.61_05 2012-08-04 00:40:22 UTC - Trying to distinguish between good vs bad zero returns from underlying SSL_read/SSL_write broke stuff (see RT bug #78695). Revert to previous behavior. - Completely re-organize Makefile.PL. I hope these changes will help take care of RT bugs #61324, #61249, #63553, and #68084 etc. This is not necessarily finished, but I want to see what happens on CPAN Testers at this point before making a few other minor changes. 0.60 2012-07-29 21:43:47 UTC - Release 0.59_03 as 0.60 so distributions can pick up various fixes. The most important one seems to be bug RT #70565. This should take care of bug RT #77167 - SSL_read and SSL_write now try to handle incomplete reads/writes (see bug RT RT #64054). The current test suite does is not very comprehensive, so caution is recommended at this point. Also, if you have good test cases, I would love to incorporate them into the distribution. 0.59_03 2012-03-10 00:45:28 UTC - Bump version number and upload to CPAN. 0.59_02 2012-03-08 16:16:03 UTC - Forgot to update Changes for 0.59_01. The following is a combined list of the more important fixes incorporated in both. - Bug RT #64054: Handle incomplete reads/writes better - Bug RT #73754: Add LWP::Protocol::https to PREREQ_PM - Bug RT #73755: Crypt-SSLeay does not verify hosts (yet). Don't let that cause a failure during tests. - Streamline t/02-live.t using Try::Tiny and done_testing - Plus assorted related small changes. 0.58_01 2010-09-08 19:11:39 UTC - L<text|scheme:...> is not supported in POD for 5.8.5 and earlier. - TODOs in POD should stand out - Add /boot/common/ssl and some other directories to unix_ssl_dirs (see bug #60936).
2012-10-21Update to 0.13:wiz2-7/+6
0.13 Updated the WRITE() method to use syswrite() and account for variable buffer sizes in SASL.
2012-10-21Update to 2.16:wiz2-7/+6
Authen-SASL 2.16 -- Tue Sep 4 11:01:18 CDT 2012 * SASL.pod: fix typo [Peter Marschall] * Perl.pm: avoid warning on "uninitialized value" [Peter Marschall]
2012-10-20Update to 0.14wen4-46/+6
Upstream changes: 0.14 October 16, 2012 - compiling with -Werror=format-security now works (Jerome Quelin, #48446) - Use Digest::SHA instead of Digest::SHA1 (Ansgar Burchardt, #60271) - Security fix, CVE-2009-0129: Missing error check in do_verify (Havard Eidnes, #79958)
2012-10-17Added scryptpettai1-1/+2
2012-10-17A simple password-based encryption utility is available as a demonstrationpettai4-0/+31
of the scrypt key derivation function. On modern hardware and with default parameters, the cost of cracking the password on a file encrypted by scrypt enc is approximately 100 billion times more than the cost of cracking the same password on a file encrypted by openssl enc; this means that a five- character password using scrypt is stronger than a ten-character password using openssl
2012-10-12MASTER_SITES fixadam1-2/+2
2012-10-12security/qoauth: Fix DISTNAME and thus fetchmarino1-1/+1
As soon as qoauth got PKGREV bump, this package could no longer fetch due to a bad DISTNAME definition. Fix DISTNAME to fix "make fetch".
2012-10-12security/mit-krb5: Fix build for gcc 4.7marino3-1/+209
Generated file didn't pass -Werror check on gcc4.7. The problem is well-known and already fixed on the current version of mit-krb5. The patch added here was taken from upstream. No revbump necessary, won't change binary on systems that already built it.
2012-10-10update to 3.0.24drochner3-8/+9
changes: -better IPv6 support -bugfixes -minor improvements
2012-10-08Revbump after updating graphics/pangoadam32-64/+64
2012-10-08Update to Botan 1.8.14:pettai3-9/+7
* 1.8.14, 2012-07-18 - The malloc allocator would return null instead of throwing in the event of an allocation failure, which could cause an application crash due to null pointer dereference where normally an exception would occur. - Recent versions of OpenSSL include extra information in ECC private keys, the presence of which caused an exception when such a key was loaded by botan. The decoding of ECC private keys has been changed to ignore these fields if they are set. - AutoSeeded_RNG has been changed to prefer /dev/random over /dev/urandom - Fix detection of s390x (Debian bug 638347)
2012-10-08Revision bump associated with the update of lang/ocaml to version 4.jaapb5-8/+10
2012-10-07PKGNAME_NOREV must be used for DISTNAME.obache1-2/+2
fixes PR pkg/47043.
2012-10-05Small clean-upadam1-7/+2
2012-10-05CONFLICTS between lang/sr and security/srmcheusov1-1/+4
2012-10-05In the PLIST, add four files in ${PYSITELIB}/${EGG_INFODIR}.apb2-4/+8
In the Makefile, remove PYDISTUTILSPKG=yes, add .include "../../lang/python/egg.mk", and set PKGREVISION=1. This fixes errors from "make package" complaining about files that were installed but not present in the PLIST.
2012-10-05Add build dependency on p5-Perl4-CoreLibs, needed since a scriptwiz1-1/+4
uses find.pl. Reported by Jörn Clausen in PR 47036.
2012-10-04validns 0.6pettai3-13/+12
Support for TLSA records. Support for ILNP (NID, L64, L3, LP) records (untested). Support for IPSECKEY records. Handle TYPEXXX for known types correctly. A number of NSEC3-related bug fixes. Miscellaneous bug fixes.
2012-10-04Bump revision for packages with changed CONFLICTS (PYTHON_SELF_CONFLICT)cheusov2-4/+4
2012-10-03CONFLICTS between python modulescheusov2-2/+5
2012-10-03Bump all packages that use perl, or depend on a p5-* package, orwiz116-189/+232
are called p5-*. I hope that's all of them.
2012-10-03ClamAV 0.97.6 includes minor bug fixes and detection improvements.adam2-6/+6
2012-10-02Update to 2.14:wiz3-7/+8
* Noteworthy changes in release 2.14 (2012-09-24) [stable] - Added asn1_read_node_value() to obtain a node's value. This is to deprecate the export of the node_asn internal structure for the upcoming 3.x release. The ASN1_DATA_NODE type and the ASN1_ETYPE_* constants were added to support the new function.
2012-10-02Mass recursive bump after the dependence fix of the "cairo" packagetron32-62/+64
requested by Thomas Klausner.
2012-10-02Apply a fix for CVE-2009-0129, taken from Debian's problem report.he4-3/+43
Also reported upstream, ref. https://rt.cpan.org/Public/Bug/Display.html?id=79958 Bump PKGREVISION.
2012-09-28Fix building on Darwinadam3-51/+18
2012-09-28add patches for libxml2>=2.9.0, new buffer structure.obache5-4/+91
2012-09-28LICENSE=gnu-gpl-v2obache1-1/+2
2012-09-23missing parts of recursive revbump for gnutls update.obache6-12/+12
2012-09-22Install man source into $(mandir)/man8 instead of catman for saslauthd(8),obache3-2/+23
or manpage will not displayed correctly with man(1). It also fixes installation failure for platforms missing `nroff -mandoc'. Bump PKGREVISION.
2012-09-20Added my missing package subdirectories to category Makefiles.jaapb1-1/+2
2012-09-16Added qoauth 1.0.1 as security/qoauth.jaapb5-0/+61
QOAuth is a library to support interaction with OAuth-powered network services, such as StatusNet or Twitter, in a Qt way.
2012-09-16CONFLICTS with gethost-[0-9]*; ++pkgrevisioncheusov1-4/+7
Fixes for minor pkglint warnings