summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2004-04-14Make use of the new USE_DIRS variable, instead of directly depending on thejmmv1-2/+2
*-dirs packages.
2004-04-14Make it a separate warning if downloading the filewiz2-3/+10
failed completely. Welcome to 1.30.
2004-04-12Convert to buildlink3.snj3-28/+21
2004-04-12Convert to buildlink3.snj3-21/+21
2004-04-12Oops. Finish conversion to buildlink3.snj2-20/+18
2004-04-12Convert to buildlink3.snj4-28/+22
2004-04-12No longer used.snj1-20/+0
2004-04-12updated to 20040408. properly validate phase 1 signatureitojun2-7/+7
http://www.vuxml.org/freebsd/d8769838-8814-11d8-90d1-0020ed76ef5a.html
2004-04-11No longer used.snj1-24/+0
2004-04-11No longer used.snj1-33/+0
2004-04-11No longer used.snj1-19/+0
2004-04-11No longer used.snj1-26/+0
2004-04-11Rethink the nroff dilemma:jschauma1-13/+5
only regen on SunOS or AIX - the pre-generated pages _are_ mandoc type pages, so we can use them on more platforms than just Irix.
2004-04-11Add and enable gnustep-sslrh1-1/+2
2004-04-11Initial import of gnustep-ssl-1.9.1, the SSL bundle for gnustep split outrh8-0/+149
from gnustep-base.
2004-04-09Do this the right way: regen audit-packages.0 and then substitute asjschauma2-16/+15
regular
2004-04-09Add a pre-formatted catman page which is only used (copied into place)jschauma2-1/+108
under IRIX. Other OS regen the catman page. This addresses PR pkg/23452. Since just depending on textproc/groff would pull in a large number of packages (such as perl, ghostscript, tiff etc.), and since this is a very important package that should NOT depend on all this gunk, Jeremy C. Reed suggested this solution. Ok agc.
2004-04-09Assume a mail transfer agent (/usr/sbin/sendmail) is installed.reed1-1/+2
This is to make sure that libexec/gnupg/gpgkeys_mailto is installed. (Okay'd by wiz.) This assumes that /usr/sbin/sendmail is sendmail. PKGREVISION is not bumped because package couldn't be made in first place if libexec/gnupg/gpgkeys_mailto was missing.
2004-04-08Convert to bl3.wiz1-8/+8
2004-04-08Use ${PREFIX}/${INFO_DIR} instead of ${PREFIX}/info forreed1-3/+3
info documentation. (Okay'd by jlam.)
2004-04-07If the native OpenSSL contains the security fixes pulled up to thetron1-6/+6
netbsd-1-6 branch on 2004-04-01, then pretend it's openssl-0.9.6m.
2004-04-07Fix wip reference. (hi jlam!)salo1-2/+2
2004-04-04Update to 1.3: Contributed by Stefan Schumacher (stefan net-tex de) inhubertf2-7/+7
private mail, ok'd by lukem. Changes: > Use the URL node and {head,tail}URL edge-attribute and link > to "Web of trust statistics and pathfinder"-Site. > > This site provides a statistical analysis of the key (linked behind > each node) and a path between to keys (linked behind tail and > head of a edge). > > Those URL statements take only affect if one generates IMAP or CMAP > output and uses this on a HTML-Site as imagemap.
2004-04-02Grammar fix.wiz1-3/+3
2004-04-02If the native OpenSSL contains the security fixes pulled up to thejlam1-9/+19
netbsd-1-6 branch on 2004-04-01, then pretend it's openssl-0.9.6m.
2004-04-02gnutls will only configure correctly with 0.5.4 of opencdk, so bump theagc1-2/+2
value of BUILDLINK_DEPENDS.opencdk accordingly.
2004-04-01There is no PKGREVISION less than 1. Just remove it in this case.jlam1-2/+1
2004-04-01Update to 0.6.1:joda8-109/+17
* Fixed cross realm vulnerability * Fixed ARCFOUR suppport * kdc: fix denial of service attack * kdc: stop clients from renewing tickets into the future * bug fixes
2004-04-01Add and enable gnome-keyring.jmmv1-1/+2
2004-04-01Initial import of gnome-keyring, version 0.2.0:jmmv5-0/+115
gnome-keyring is a program that keeps passwords and other secrets for users. It is run as a damon in the session, similar to ssh-agent, and other applications can locate it by an environment variable. The program can manage several keyrings, each with its own master password, and there is also a session keyring which is never stored to disk, but forgotten when the session ends. The library libgnome-keyring is used by applications to integrate with the gnome keyring system. However, at this point the library hasn't been tested and used enough to consider the API to be publically exposed. Therefore use of libgnome-keyring is at the moment limited to internal use in the gnome desktop. However, we hope that the gnome-keyring API will turn out useful and good, so that later it can be made public for any application to use.
2004-04-01update to 2004/4/1 version. drops packet with too big value in length field.itojun2-8/+7
2004-03-31compiler.mk is needed for CC_VERSION checks, not bsd.prefs.mk.sketch1-2/+2
2004-03-31Let KERBEROS imply SASL_USE_GSSAPI.jlam1-3/+5
2004-03-31This package compiles nothing, so set USE_LANGUAGES to the empty value.jlam1-2/+3
2004-03-30Updated security/mit-krb5 to 1.3.2. Changes from version 1.3.1 include:jlam4-31/+23
* Support for AES in GSSAPI has been implemented. This corresponds to the in-progress work in the IETF (CFX). * To avoid compatibility problems, unrecognized TGS options will now be ignored. * 128-bit AES has been added to the default enctypes. * AES cryptosystem now chains IVs. This WILL break backwards compatibility for the kcmd applications, if they are using AES session keys. * Assorted minor bug fixes and plugged memory leaks.
2004-03-30Fix up the krb5-config script to not emit "$(LIBTOOL) --mode=link". Don'tjlam2-1/+14
bother with a PKGREVSION bump since this package is 15 minutes old.
2004-03-30Don't use PKGNAME when setting WRKSRC; use PKGNAME_NOREV instead.jlam1-2/+2
2004-03-30Add and enable security/mit-krb5.jlam1-1/+2
2004-03-30Import MIT Kerberos 5 as security/mit-krb5. This package is partly basedjlam17-0/+765
on the wip/mit-krb5 package by Jeremy Reed, but heavily modified by me to libtoolize the build. Kerberos V5 is an authentication system developed at MIT. It is a network authentication protocol designed to provide strong authentication for client/server applications by using secret-key cryptography. (Kerberos 5 is discussed in RFC 1510.) This package provides Kerberos and GSSAPI (Generic Security Services Application Programming Interface) development headers and libraries. It also includes Kerberos ticket and principal tools, and Kerberized r-services, telnet and ftp services.
2004-03-30Apply the patch from PR pkg/21493. This is now submitted to gnupg.org astv4-6/+48
bug gnupg/293, so grant has blessed it for inclusion in pkgsrc. No more GNU sed build dependency, but the binaries do not change; thus PKGREVISION untouched.
2004-03-30compress USE_GNU_TOOLS onto one line.grant1-4/+2
2004-03-29Update to 0.30 (distfile site changed for newer releases, too):tv2-6/+6
hashcash-0.30 - 04-Mar-2004 - Adam Back <adam@cypherspace.org> * make -cX check multiple X-Hashcash lines until it finds the right one. Bug reported by Kyle Hasselbacher <kyle@toehold.com>. hashcash-0.29 - 04-Mar-2004 - Adam Back <adam@cypherspace.org> * fix prototype mismatch of function hashcash_check in hashcash.h vs libhc.c which caused compile failure on openBSD and freeBSD * change to make it compile on MAC OSX (need to recognize OSX and treat as unix like for headers to include) * change to make it compile on solaris 9 (and POSIX / SVR systems in general). Turns out putenv(3) is more portable than setenv(3) / unsetenv(3) * update sha1 man page to name it sha1-hashcash to avoid collision with openssl sha1(1). By default with openssl there is not actually any program named sha1, rather sha1 is a subprogram of openssl invoked "openssl sha1". However I think it may still be possible to compile that as a separate program or symlink sha1 to openssl to get that. * update sha1 man pages to refer to the other common sha1 implementations. * update LICENSE request
2004-03-29+hashcashtv1-1/+2
2004-03-29 Hashcash is a denial-of-service counter measure tool. It's main currenttv4-0/+38
use is to help hashcash users avoid losing email due to content based and blacklist based anti-spam systems. The hashcash tool allows you to create hashcash tokens to attach to emails you send, and to verify hashcash tokens attached to emails you receive. Email senders attach hashcash tokens with the X-Hashcash: header. Vendors and authors of anti-spam tools are encouraged to exempt mail sent with hashcash from their blacklists and content based filtering rules.
2004-03-29Note the info file for the new info file handling framework.jlam1-1/+2
2004-03-29Fix build on NetBSD sparc64 with perl 5.8.seb2-1/+24
usage of perl's int() causes trouble with perl 5.8.3 (5.8*?) on at least NetBSD sparc64/1.6.2. The perl script openssl-0.9.6m/crypto/bn/bn_prime.pl uses the perl function int() to truncate the return of sqrt() function. On the above mentioned platform this leads to execution error: ... /usr/pkg/bin/perl bn_prime.pl >bn_prime.h Illegal modulus zero at bn_prime.pl line 16. Tracing the problem I've found that this int() usage may be the key of the problem. Please note the following: $ uname -srm; perl -v | grep 'This is perl'; perl -e 'print int(sqrt(3)),"\n"' NetBSD 1.6.2 sparc64 This is perl, v5.8.3 built for sparc64-netbsd 2 And... $ uname -srm; perl -v | grep 'This is perl'; perl -e 'print int(sqrt(3)),"\n"' NetBSD 1.6.2 sparc64 This is perl, v5.6.1 built for sparc64-netbsd 1 Also note that perlfunc(3) warns about int() used for rounding and recommends to use sprintf, printf, POSIX::floor or POSIX::ceil when applicable. My workaround is to use POSIX::floor() instead of int().
2004-03-29Nuke the special libtool handling since the version of libgcrypt injlam1-9/+3
pkgsrc does the right thing with assembler source files.
2004-03-29Update security/cyrus-saslauthd to 2.1.18. Changes from version 2.1.17jlam4-16/+16
include improved LDAP authentication.
2004-03-29Update security/cyrus-sasl2 to 2.1.18. Changes from version 2.1.17jlam20-119/+142
include: * Better error-handling. * Support for Courier-IMAP authdaemond for plaintext password verification. * Fixed resource leaks and buffer overruns. pkgsrc changes include: * SASL_DBTYPE is either "ndbm" or "berkeley" and sets the db format of the sasldb authentication database, defaulting to ndbm. * SASLSOCKETDIR is the location of the saslauthd socket directory. * AUTHDAEMONVAR is the localt of the authdaemond socket directory. * SASL_ENTROPY_SOURCE is a file of random bytes used as a PRNG. This closes PR 24649 and PR 24694.
2004-03-29Match the template builtin.mk file in bsd.builtin.mk, and make the twojlam3-21/+11
packages that use builtin.mk files (graphics/xpm and pkgtools/x11-links) use the new format correctly.