summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Collapse)AuthorFilesLines
2015-09-14Add upstream bug report URL.wiz2-4/+4
2015-09-14Fix build on Solaris 11 per PR 50242 by Jörn Clausen.wiz2-1/+21
2015-09-14Update to 3.3.18mef2-7/+6
---------------- * Version 3.3.18 (released 2015-09-12) ** libgnutls: When re-importing CRLs to a trust list ensure that there no duplicate entries. ** certtool: Removed any arbitrary limits imposed on input file sizes and maximum number of certificates imported. ** API and ABI modifications: No changes since last version.
2015-09-13Revbump all packages using Go after the Go update.bsiegert1-1/+2
2015-09-13Add missing stdexcept includes. Add missing libraries for socketjoerg6-6/+88
functions on Solaris. Check privileges for mlock use on Solaris before trying to lock the resource buffer.
2015-09-13Fix PLIST conditional for i386.joerg1-2/+2
2015-09-12mention mozilla-rootcerts-openssltnn1-1/+2
2015-09-12catch up with security/mozilla-rootcertstnn2-20/+31
2015-09-12Update netpgpverify to version 20150911.agc3-6/+11
Changes since previous version (20150901) + Apparently, OS X 10.4 does not have an implementation of le32dec(). Instead, unroll the inline function. Bug report from Sevan - thanks!
2015-09-11Update to 20150804.tnn2-8/+7
Added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT C=DE, O=Deutscher Sparkassen Verlag GmbH, OU=S-TRUST Certification Services, \ CN=S-TRUST Universal Root CA C=FR, O=Certinomis, OU=0002 433998903, CN=Certinomis - Root CA C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden EV Root CA C=NL, O=Staat der Nederlanden, CN=Staat der Nederlanden Root CA - G3 C=TR, L=Ankara, \ O=T?RKTRUST Bilgi ?leti?im ve Bili?im G?venli?i Hizmetleri A.?., \ CN=T?RKTRUST Elektronik Sertifika Hizmet Sa?lay?c?s? H5 C=TR, L=Ankara, \ O=T?RKTRUST Bilgi ?leti?im ve Bili?im G?venli?i Hizmetleri A.?., \ CN=T?RKTRUST Elektronik Sertifika Hizmet Sa?lay?c?s? H6 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, \ OU=(c) 2009 Entrust, Inc. - for authorized use only, \ CN=Entrust Root Certification Authority - G2 C=US, O=Entrust, Inc., OU=See www.entrust.net/legal-terms, \ OU=(c) 2012 Entrust, Inc. - for authorized use only, \ CN=Entrust Root Certification Authority - EC1 C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Removed: C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Class 2 CA, \ CN=TC TrustCenter Class 2 CA II C=DE, O=TC TrustCenter GmbH, OU=TC TrustCenter Universal CA, \ CN=TC TrustCenter Universal CA I C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 CA 1 C=TR, O=Elektronik Bilgi Guvenligi A.S., \ CN=e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi CN=SG TRUST SERVICES RACINE, OU=0002 43525289500022, O=SG TRUST SERVICES, C=FR CN=T?RKTRUST Elektronik Sertifika Hizmet Sa?lay?c?s?, C=TR, L=ANKARA, \ O=(c) 2005 T?RKTRUST Bilgi ?leti?im ve Bili?im G?venli?i Hizmetleri A.?.
2015-09-11Note new distfile location, but use nbftp for now.gdt2-2/+6
The new distfile has a bad name and doesn't have the auto* generated files. Given that it's on github, these issues are not likely to be fixed. There has been no upstream release since 2008, so there's really no point in dealing with that until there is. For now, just use MASTER_SITE_BACKUP to avoid the old URL giving errors.
2015-09-11Fix MASTER_SITES.wiz1-2/+2
2015-09-10Update liboauth to 1.0.3prlw13-16/+24
version 1.0.3 - clarify documentation of oauth_curl - fix possible memleak in oauth_curl (only relevant if an error occurs) - fix TOCTOU in oauth_curl_post_file: the file may change between stat() and fopen() version 1.0.2 - fix typos in documentation - add xfree, xstrdup patch from Kedar Sovani - prepare repository migration to github - built-in sha1 support big&little endian - (no changes to the actual library API or ABI) version 1.0.1 - do not url-escape RSA-key for signature version 1.0.0 - fix body-hash example code - mark all oauth_http functions as deprecated - freeze interface definitions for good - enter maintenance/bug-fix only cycle version 0.9.7 - fixed tiny memory leak when oauth_curl_get() fails - fixed double-encoding of plaintext signature version 0.9.6 - fixed typo, do not print a separator before first parameter when serializing url for auth-header. version 0.9.5 - added "built-in" hmac-sha1 hashing (no RSA). - added some CURL options available via enviroment variables - fixed issue with decoding already encoded characters in the base-URL (not parameters). reported by L. Alberto Gimenez
2015-09-09Update HOMEPAGE.gdt1-2/+2
2015-09-09Belatedly add patch missing from previous commit.gdt1-0/+19
2015-09-09Update security/gnupg2 to 2.0.29.wiz6-67/+9
While here, clean up patches. They looked pretty cargo-culty to me and were not commented. File a bug report for one of the remaining ones and link to it from comment. Changes in 2.0.29: Noteworthy changes in version 2.0.29 (2015-09-08) ------------------------------------------------- * gpg: Print a PGP-2 fingerprint again instead of a row of "0". * gpg: Fixed a race condition from multiple several "gpg --verify". * gpg: Print FAILURE status lines to help GPGME. * gpgsm: Fixed a regression in CSR generation. * scdaemon: Fixed problems with some pinpads. * Fixed a few other bugs.
2015-09-09Update security/libgcrypt to 1.6.4:wiz5-175/+6
Noteworthy changes in version 1.6.4 (2015-09-08) [C20/A0/R4] ------------------------------------------------ * Speed up the random number generator by requiring less extra seeding. * New flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. * Always verify a created RSA signature to avoid private key leaks due to hardware failures. * Fix alignment bug in the AESNI code on Windows > 7. * Support FreeBSD 10 and later. * Other minor bug fixes.
2015-09-07Update to 0.29.gdt4-23/+13
Update HOMEPAGE. Set LICENSE. 0.28 2013/06/21 * No significant change. Maintenance purpose only. 0.27 2010/08/12 * Adding Camellia defined in RFC 5581. "Stefan H. Holek" <stefan> * Notation name is always text. Risko Gergely <gergely>
2015-09-07Add patch that belongs in last commitgdt1-0/+17
2015-09-07Update to 0.15.0. Some pkgsrc patches are now upstream. Don'tgdt12-96/+50
install new bash completion files, given a lack of pkgsrc doctrine for where they go. New in 0.15.0; 2015-05-11 * new card drivers AzeDIT 3.5 IsoApplet MaskTech * libopensc allow extended length APDUs accept no output for 'SELECT' MF and 'SELECT' DF_NAME APDUs fixed sc_driver_version check adjusted send/receive size accoriding to card capabilities in iso7816 make SELECT agnosting to sc_path_t's aid * asn1 support multi-bytes tags * pkcs15 reviewed support and tool functions for public key public certs and pubkeys with an auth_id are treated as private * pkcs11 introduced default PKCS#11 provider fetched real value of CKA_LOCAL for pubkey removed inconsistent attributes C_Digest issues no check if buffer too small before update * added support for Travis CI * updated support of EC in libopensc, pkcs15 and pkcs11 * fixed number of warnings, resource leaks, overity-scan issues * macosx target minimum OSX version to 10.7 update the minimal building instructions. locate and target the latest SDK to build against. locate the best newest SDK present on the computer. * build disable Secure Messaging if OpenSSL is not used * tools util_get_pin helper function * PIV Add AES support for PIV General Authenticate fixed invalid bit when writing PIV certificate object with gzipped certificate fixed bad caching behavior of PIV PKCS15 emulator * ePass2003 fixed failure due to re-authenticate of secure messaging when card is accessed by multiple PKCS11 sessions * MyEID EC support for MyEID-v4 card * openpgp extended options for openpgp-tool * asepcos fixed puk handling * sc-hsm support for Koblitz curves secp192k1 and secp256k1 (Bitcoin) improved error detection and reporting in sc-hsm-tool fixed Lc byte in VERIFY PIN block for PC/SC PIN PAD reader fix certificate delete bug * IAS/ECC fixed PKCS#11 compliance issues support for Morpho IAS Agent Card * cardos overwrite content of deleted private key * win32 setup improuvement look & feel custom actions with card registration minidriver impouvement fixed errors and warnings returned by Microsoft quality tool pin-pad support New in 0.14.0; 2014-05-31 * new card driver DNIe * extended existing drivers by support of Swedish eID card (gemsafeV1) EstEID 3.5 (mcrd) * bogus javacard driver removed * build return to the standard use of 'autoconf' CI specific bootstrap script: git commit stamp for the built packages windows friendly compile settings fixed a ton of compiler warnings fence against using EVP_sha256 mech debian packaging templates compile without OpenSSL and without SM enable compiler warnings by default win32 add 'VarFileInfo' block to version-info include to MSI package 'openpgp-tool.exe' 'version-info' resource for each target * macOSX "graphical uninstaller" to distribution DMG update package building to modern tools new tool and SDK paths for OS X 10.8 improved opensc-installer from distribution osx: target 10.9 (a free upgrade to anyone using 10.6+) from now on build 'fat' binaries i386 * common added getpass implementation for non windows * libopensc allow for the pin to be entered on the keypad during issuing introduce 'encoded-content' to the sc_file data general usage method to allocate generalized time * minidriver implemented 'CardChangeAuthenticator', 'CardGetChallenge' and 'CardUnblockPin' improved management of GUID use reader pin pad if available and allowed configuration options for compose GUID refuse create container mechanism add registers file for feitian cards fixed return code in 'CardGetContainerInfo' returned 'tries-left' for blocked card length of stripped data in RSADecrypt * pkcs#11 bind non-recognized card, generic 'init-token' procedure fixed CKA_VALUE of 'public-key' object fix ASN1 encoding issues PIN-NOT-INITIALIZED for the non-user PINs buffers overflow segfault due to the undefined 'application-file' * pkcs15 'direct' public key in PuKDF encoding implement SPKI public key encoding include and maintain minidriver framework data: cmap-record, md-flags, GUID, .. fixed encoding of 'SubjectPublicKeyInfo' DER encoding of 'issuer' and 'subject' PIN validation in 'pkcs15-verify' public key algorithm ECC public key encoding ECC ecpointQ * pkcs15init introduce 'max-unblocks' PIN init parameter keep cert. blob in cert-info data file 'content' and 'prop-attrs' in the card profile in profile more AC operations are parsed fixed NULL pointer dereference error NULL 'store-key' handle ignore if no TokenInfo file to update set EC pubkey parameters from init data * reader-pcsc fixed implicit pin modification pin checking when implicitly given verify/modify pinpad commands * SM common SM 'increase-sequence-counter' procedure move SM APDU procedures to dedicated source file move SM common crypto procedures to the dedicated library * doc documentation for --list-token-slots * default driver do not send possibly arbitrary APDU-s to an unknown card. by default 'default' card driver is disabled * sc-hsm Added support for persistent EC public keys generated from certificate signing requests token label to be set via C_InitToken or sc-hsm-tool unblock PIN using C_InitPIN() initialize EC key params fixed bug that prevents a newly generated 2048 key to show up at the PKCS#11 interface bug when changing SO-PIN with opensc-explorer sc-hsm-tool memory checking and removed warning problem deleting CA certificates sc-hsm public key format returned when generating ECC keys sc-hsm-tool better error handling for non-SmartCard-HSM cards support for DKEK password sharing scheme threshold scheme parameters to manpage crash on Windows when --wrap-key frees memory allocated in opensc.dll * ias simplify the compute signature operation * PIV use SPKI encoding for public key data extract public key from cert if no object on card fix segfault and valgrind issue gen_key to expect the proper PIV Key references * CardOS build for Windows use information from AlgorithmInfo supported CardOS V5.0 * epass2003 key generation allows stricter privkey/pubkey ACLs list_files implemented properly disable padding allow exponents other than 65537 * myeid fixed file-id in myeid.profile * entersafe fix a bug when writing public key * EstEID match card only based on presence of application. * pteid do not call the iso7816 driver get_response operation * myeid support of EC key is broken
2015-09-07Update to 1.4.24.gdt2-7/+6
1.4.24 - 7 August 2015, Ludovic ROUSSEAU - 253 new ATRs - ATR_analysis: better update of the local cache 1.4.23 - 13 September 2014, Ludovic ROUSSEAU - 137 new ATRs
2015-09-07Update to 1.8.14.gdt2-8/+9
1.8.14: Ludovic Rousseau 5 August 2015 - Threading: lock the PC/SC context in a safe way - Threading: lock the card context in a safe way - SCardGetStatusChange(): fix card movement rare bug - Doxygen: . SCardTransmit() may return SCARD_E_INSUFFICIENT_BUFFER . SCardEndTransaction() The disposition IS used and the dwDisposition parameter HAS an effect. . SCardReconnect() do not release locks . fix typos - Move the source code repository from subversion to git - Use asprintf(3) instead of strlcat(3) and strlcpy(3) - Allow to use pcscd in a remote session (polkit issue) - Some other minor improvements and bug corrections pcsc-lite-1.8.13: Ludovic Rousseau 7 November 2014 - fix a systemd + libudev hotplug bug introduced in version 1.8.12. The list of readers was not (yet) available just after the start of pcscd - Make the license more 3-clause BSD like - fix a rare race condition in the (non default) libusb hotplug - Some other minor improvements and bug corrections
2015-09-07Update to .1.4.20.gdt2-8/+7
1.4.20 - 5 August 2015, Ludovic Rousseau - Add support of . ACS ACR1251 Dual Reader . Access IS NFC Smart Module . BIFIT iToken . BLUTRONICS BLUDRIVE II CCID (idProduct: 0x1079) . Generic MultiCard Device . NXP Pegoda 2 N . SafeNet eToken 5100 . SafeNet eToken 7300 . Yubico Yubikey 4 CCID . Yubico Yubikey 4 OTP+CCID . Yubico Yubikey 4 OTP+U2F+CCID . Yubico Yubikey 4 U2F+CCID - Depends on libusb version 1.0.9 instead of 1.0.8 - The O2 Micro Oz776 reader only supports 9600 bps - Change installation directory for Mac OS X El Capitan 10.11 1.4.19 - 13 May 2014, Ludovic Rousseau - Add support of . AK910 CKey (idProduct 0x0001) . AK910 CKey (idProduct 0x0011) . AK910 IDONE . Broadcom Corp 5880 (idProduct: 0x5804) . CASTLES EZCCID Smart Card Reader . Cherry KC 1000 SC . Cherry KC 1000 SC Z . Cherry KC 1000 SC/DI . Cherry KC 1000 SC/DI Z . Cherry TC 1300 . Chicony USB Smart Card Keyboard . Elatec TWN4 SmartCard NFC . Feitian 502-CL . Feitian eJAVA Token . FujitsuTechnologySolutions GmbH Keyboard KB100 SCR . FujitsuTechnologySolutions GmbH Keyboard KB100 SCR eSIG . Hewlett-Packard HP lt4112 Gobi 4G Module . Identive SCT3522CC token . OMNIKEY AG 6121 USB mobile . PIVKey T800 . REINER SCT tanJack Bluetooth . Watchdata USB Key - Add syslog(3) debug for Mac OS X Yosemite. Use: sudo syslog -c "com.apple.ifdreader PID" -d to change the logging level. See also "Change syslog logging level on Yosemite" http://ludovicrousseau.blogspot.com/2015/03/change-syslog-logging-level-on-yosemite.html - Remove ZLP patch for Gemalto IDBridge CT30 and K30. The patch was causing problems with the K50. A new reader firmware (version F) solved the problem so the patch is no more needed. - Fix a memory leak in an error path - some minor bugs removed
2015-09-06Fix up a few more symbol renames, now -Wimplicit-function-declaration clean.jperkin2-5/+5
2015-09-06Update to 1.0.1:wiz2-6/+6
1.0.1 - 2015-09-05 ~~~~~~~~~~~~~~~~~~ * We now ship OS X wheels that statically link OpenSSL by default. When installing a wheel on OS X 10.10+ (and using a Python compiled against the 10.10 SDK) users will no longer need to compile. See :doc:`/installation` for alternate installation methods if required. * Set the default string mask to UTF-8 in the OpenSSL backend to resolve character encoding issues with older versions of OpenSSL. * Several new OpenSSL bindings have been added to support a future pyOpenSSL release. * Raise an error during install on PyPy < 2.6. 1.0+ requires PyPy 2.6+.
2015-09-06Deal with systems defining swap16/swap32 as macros.joerg1-0/+3
2015-09-05Fix PLIST on Darwin. Use MASTER_SITE_PYPI.jperkin2-2/+4
2015-09-03Mark package as broken for OpenBSD, the portable distribution is not intendedsevan1-1/+2
for use on OpenBSD, there is a separate release for that. Reviewed by wiz@
2015-09-03Make sure php-oauth's configure can find pkgsrc libcurl. PKGREVISION++fhajny3-3/+31
2015-09-03I'm not currently using this module, reset MAINTAINER.dsainty1-2/+2
2015-09-02Complete the SHA* symbol renaming. Ride previous bump. Ok agc.jperkin1-16/+16
2015-09-01Update to 2.019mef2-6/+6
--------------- 2.019 2015/09/01 - work around different behavior of getnameinfo from Socket and Socket6 by using a different wrapper depending on which module I use for IPv6. Thanks to bluhm for reporting.
2015-09-01Bump API requirement to 20150901 for the renamed symbols in libnetpgpverifyagc1-2/+2
2015-09-01Update netpgpverify to 20150901agc19-540/+540
+ rename all the symbols I could fine which could conflict with those in libcrypto. requested by joerg
2015-08-31Restore https URL, as discussed with schmonz.wiz1-2/+2
Systems without https support in their fetch tools can get the distfiles from ftp.NetBSD.org.
2015-08-31Go back to using the non-https MASTER_SITES, because NetBSD 6.x'sschmonz1-2/+2
/usr/bin/ftp (at least) can't fetch https URLs, and we verify distfiles by checksum anyway.
2015-08-30Update php-suhosin to 0.9.38.taca2-6/+7
2015-05-21 - 0.9.38 - removed code compatibility for PHP <5.4 (lots of code + ifdefs) - allow https location for suhosin.filter.action - fixed newline detection for suhosin.mail.protect - Added suhosin.upload.max_newlines to protect againt DOS attack via many MIME headers in RFC1867 uploads (CVE-2015-4024) - mail related test cases now work on linux
2015-08-30Update php-ssdeep to 1.0.4.taca2-8/+7
1.0.4 This is a build maintenance release only so there is no need to upgrade. - Make use of --with-libdir so installers can override the lib default (RHEL uses lib64 for example) - Clean up the build script to standardise the code constructs used - Add LICENSE, README and CREDITS to PECL package configuration 1.0.3 Bug #60347 OSX can't build as .so hardcoded
2015-08-30Update ssdeep to 2.13.taca4-15/+15
** Version 2.13 - 24 Apr 2015 * New Features - Added fuzzy_set_total_input_length function to the API. - Added support for files up to 192GB. - Added support for arbitrary length input from the standard input. * Bug Fixes - Fixed issue when comparing hashes from relatively simple files. - Fixed portability issues. ** Version 2.12 - 24 Oct 2014 * Bug Fixes - Fixed issue when comparing identical hashes but with different block sizes.
2015-08-30Update to 2.018:wiz2-6/+6
2.018 2015/08/27 - RT#106687 - startssl.t failed on darwin with old openssl since server requested client certificate but offered also anon ciphers
2015-08-30Update to 1.20:wiz2-6/+6
Noteworthy changes in version 1.20 (2015-08-26) [C16/A16/R0] ----------------------------------------------- * New macros for GCC attributes. * Make es_set_binary actually work for Windows. * Allow building without thread support. * Build without a build timestamp by default. * Interface changes relative to the 1.19 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ GPGRT_VERSION NEW macro. GPGRT_VERSION_NUMBER NEW macro. GPGRT_INLINE NEW macro. GPGRT_GCC_VERSION NEW macro. GPGRT_ATTR_NORETURN NEW macro. GPGRT_ATTR_PRINTF NEW macro. GPGRT_ATTR_NR_PRINTF NEW macro. GPGRT_ATTR_FORMAT_ARG NEW macro. GPGRT_ATTR_SENTINEL NEW macro. GPGRT_ATTR_USED NEW macro. GPGRT_ATTR_UNUSED NEW macro. GPGRT_ATTR_DEPRECATED NEW macro. GPGRT_ATTR_PURE NEW macro. GPGRT_ATTR_MALLOC NEW macro. GPGRT_HAVE_MACRO_FUNCTION NEW macro. GPGRT_HAVE_PRAGMA_GCC_PUSH NEW macro.
2015-08-30Treat dfly like freebsd and bitrig like openbsd.dholland2-5/+6
2015-08-28Update to 3.12.0:wiz3-10/+13
Changes in version 3.12.0 are: * Build fixes Changes in version 3.11.92 are: * This library is now deprecated Changes in version 3.10.1 are: * Updated translations Changes in version 3.10.0 are: * Build fixes Changes in version 3.9.1 are: * Build fixes and tweaks Changes in version 3.8.0 are: * Updated translations Changes in version 3.7.92 are: * Updated translations Changes in version 3.7.91 are: * Build fixes [#691343] Changes in version 3.7.5 are: * Updated translations * Build fixes Changes in version 3.7.2 are: * Share the secure memory pool with libsecret and gcr * Other minor tweaks Changes in version 3.6.0 are: * Updated translations Changes in version 3.5.6 are: * More warnings about attributes not being stored secretly * Build fixes * Updated translations Changes in version 3.5.4 are: * Vala bindings Changes in version 3.5.3 are: * Fix debugging for G_MESSAGES_DEBUG * Some minor fixes to avoid vala regressions
2015-08-27When replacing a buildlink3.mk inclusion with a plain BUILD_DEPENDS,joerg1-2/+2
it helps to replace BUILDLINK_PREFIX, too. Hi wiz!
2015-08-27Update "p5-Mozilla-CA" package to version 20150826. Changes since 20141217:tron2-8/+7
- Update from Mozilla repository - Update license to match license of data source (MPL 2)
2015-08-27Update 1.5.5 to 1.6.0mef2-6/+6
--------------------- Noteworthy changes in version 1.6.0 (2015-08-26) [C25/A14/R0] ------------------------------------------------ * Added gpgme_set_offline to do a key listinging w/o requiring CRL. * Added gpgme_set_status_cb to allow a user to see some status messages. * Added an export mode for secret keys. * More precise error codes are returned if GnuPG >= 2.1.8 is used. * The passphrase handler for the loopback mode has been improved and may also be used with genkey. * [w32] The standard GnuPG 2.1 install directory is now seached for gpgconf.exe before a registry specified directory and the Gpg4win install directory. * [w32] gpgme-w32spawn.exe will now only be searched in the gpgme DLL directory. * Interface changes relative to the 1.5.1 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgme_set_offline NEW. gpgme_get_offline NEW. gpgme_set_status_cb NEW. gpgme_get_status_cb NEW. GPGME_EXPORT_MODE_SECRET NEW GPGME_EXPORT_MODE_RAW NEW. GPGME_EXPORT_MODE_PKCS12 NEW.
2015-08-26Update to 2.017:wiz2-7/+6
2.017 2015/08/24 - checks for readability of files/dirs for certificates and CA no longer use -r because this is not safe when ACLs are used. Thanks to BBYRD, RT#106295 - new method sock_certificate similar to peer_certificate based on idea of Paul Evans, RT#105733 - get_fingerprint can now take optional certificate as argument and compute the fingerprint of it. Useful in connection with sock_certificate. - check for both EWOULDBLOCK and EAGAIN since these codes are different on some platforms. Thanks to Andy Grundman, RT#106573 - enforce default verification scheme if none was specified, i.e. no longer just warn but accept. If really no verification is wanted a scheme of 'none' must be explicitely specified. - support different cipher suites per SNI hosts
2015-08-23Use BUILD_DEPENDS instead of including buildlink3.mk for docbook-xsl.wiz1-2/+3
2015-08-23Update to 1.2.0:wiz2-8/+7
Significant changes since 1.1.6: * You can now specify "-" as the input file, meaning standard input. * Lots and lots of code reorganization, including changes to the build system. * scrypt now consults the hw.memsize sysctl on relevant platforms to figure out how much memory is available. (This should help on OS X.) * scrypt now detects and uses AESNI instructions for encryption/decryption. * scrypt now detects and uses SSE2 instructions automatically (and thus there is no longer an --enable-sse2 option to the configure script).
2015-08-23Bump PKGREVISION for nettle shlib major bump.wiz27-53/+54