Commit Graph

156 Commits

Author SHA1 Message Date
jca
d33aed3a4d Update to gnupg-2.2.40
ChangeLog: https://dev.gnupg.org/T6181

Test report from op@, thanks!
2022-10-19 15:59:21 +00:00
jca
8b47bd5e25 Update to gnupg-2.2.39
At least one regression introduced in 2.2.37 is fixed by 2.2.39.

Release notes:
https://dev.gnupg.org/T6159
https://dev.gnupg.org/T6175
2022-09-04 10:04:14 +00:00
jca
677fa37f06 Update to gnupg-2.2.37
Release info:
https://dev.gnupg.org/T6105

Packaging changes:
- need to drop a --css-ref= option unrecognized by base makeinfo.
- no need for gmake
- having the package installed is not needed any more to run the tests
- respect LDFLAGS
2022-08-30 17:27:31 +00:00
jca
e8e4032716 Drop the gpg2 and gpgv2 symlinks that were kept for compat
Make sure your scripts aren't using those!
2022-08-30 16:02:11 +00:00
jca
58d57650f7 SECURITY UPDATE to gnupg-2.2.36
Fix for CVE-2022-34903, other changes:
https://dev.gnupg.org/T5949

Gentle prodding by tj@ who backported patches to address the CVE problem.
Since upstream has published a release, let's use that instead.
2022-07-07 17:18:11 +00:00
jca
5dc15deb46 Teach portroach to ignore gnupg-2.3.* 2022-07-01 09:19:44 +00:00
jca
72301992d8 Update to gnupg-2.2.35
ChangeLog: https://dev.gnupg.org/T5928

Tests & ok bket@ gnezdo@

Since the question came up: we're staying on the 2.2 LTS branch as long
as there is no adamant reason to switch to the public testing 2.3
release, and as long as 2.4 hasn't been published.  For more information
about the release scheme please refer to the gnupg-2.3.0 announcement:

  https://lists.gnupg.org/pipermail/gnupg-announce/2021q2/000458.html
2022-04-30 10:14:19 +00:00
jca
bb66ce0a4a Take maintainership 2022-04-21 18:08:06 +00:00
edd
437fbd99e8 security/gnupg: Update to version 2.2.34.
Prompted by jca@ and OK sthen@. Thanks.

(Also dropping MAINTAINER, as I don't use gpg any more).
2022-03-29 15:28:19 +00:00
naddy
8c0294c2fa drop RCS Ids 2022-03-11 19:53:16 +00:00
tb
2f80debafe security/gnupg: avoid use of *printf %n. joint work with deraadt, with
input from edd
2021-09-21 19:14:37 +00:00
jca
09c7a91e94 Avoid using printf("%n") in mkdefsinc
ok edd@ (maintainer)
2021-08-30 17:09:19 +00:00
jca
2b668c5d48 Update to gnupg-2.2.30
ok gnezdo@ edd@ (maintainer)
2021-08-30 17:04:45 +00:00
sthen
3b5973316b update to gnupg-2.2.29, discussed with / ok jca@ edd@ 2021-07-05 22:14:26 +00:00
jasper
90b47ecfb9 build a debug package
ok edd@ (MAINTAINER)
2021-01-17 15:13:34 +00:00
jca
b59233c341 Remove gnupg-1.4 and replace it with gnupg-2
gnupg-1.4 is not developed actively anymore, and new software expects
a modern "gpg" executable, which leads to pointless patches in the ports
tree.  Move the various users of security/gnupg2 to security/gnupg and
zap patches that forced the use of "gpg2".

Crusade started by edd@ (security/gnupg maintainer), gnupg->gnupg2 test
reports from semarie@, giovanni@ and solene@, input and bulk build by
sthen@.  ok sthen@ edd@ (maintainer)
2020-10-05 19:46:17 +00:00
jca
68cb7c0868 Drop maintainership
Being listed as the maintainer kinda implies that I care, but I don't:
I haven't used gpg1 for years.  In fact, it's been years since I think
this port ought to be removed and the tree should be moved to
security/gnupg2.  But someone has to do that work.
2020-07-05 09:40:19 +00:00
cwen
a177323c68 gnupg: fix the build on macppc with clang:
- add `-fheinous-gnu-extensions' as seen on some other archs
- add a patch to remove the `-Wa,-mppc' flag, because clang's
  integrated assembler was unhappy with it. Proposed by jca@,
  instead of using `-no-integrated-as'.

OK jca@ (maintainer)
2020-04-12 18:29:01 +00:00
visa
ca2b2c29e9 Fix build with clang on mips64.
OK jca@
2019-07-12 02:16:23 +00:00
jca
bcf347998a Move the ports I maintain to PERMIT_PACKAGE 2019-06-22 22:44:06 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
sthen
b17bf3228e update curses WANTLIB entries following the change in base libraries to use soname 2019-05-17 16:19:37 +00:00
sthen
6b8e265514 bump ports known/suspected to be affected by issue with libedit/libreadline
and termcap on lld arches.
2018-11-14 20:48:21 +00:00
naddy
cdcd991d42 enable the included PIC assembly code to fix text relocations on i386 2018-11-11 21:14:33 +00:00
jca
1f7c780c5b SECURITY update to gnupg-1.4.23
Fix for CVE-2017-7526 - Sanitize the diagnostic output of the original
file name in verbose mode.
2018-06-13 06:20:01 +00:00
jca
ae84f94e29 Tweak the HOMEPAGE of gnupg.org ports
- move to https
- use the per-project canonical homepage (reachable thru the main
- homepage; pinentry doesn't seem to have such homepage)

ok pea@ ajacoutot@
2018-01-30 15:06:37 +00:00
jca
3a987693dd Drop unneeded casts in inline asm to fix the build with clang on armv7
Fix from Markus Hennecke (thanks!), similar changes available in
upstream libgcrypt.
2018-01-23 13:54:54 +00:00
naddy
c2e452c096 /dev/srandom has been removed, just use /dev/random as everywhere else 2017-11-01 15:12:16 +00:00
jca
4e0c79b3db Update to gnupg-1.4.22 2017-10-19 16:36:04 +00:00
sthen
8134b256aa fix security/gnupg build on i386+clang with -fheinous-gnu-extensions.
from FreeBSD.  ok jca@
2017-07-27 20:12:47 +00:00
sthen
c15b136e13 sync WANTLIB (and in one case, add gettext to LIB_DEPENDS) in dependent ports
now that internationalised domain name support has been removed from net/curl
2016-11-04 11:35:18 +00:00
naddy
893e631df0 rename MASTER_SITES_GNUPG to MASTER_SITE_GNUPG, like all the others 2016-10-01 13:56:26 +00:00
jca
be8a942bfb Drop the gettext module from gnupg.org ports 2016-09-28 19:33:37 +00:00
jca
20949baddd Extra patch that snuck in.
Spotted by Markus Lude.
2016-08-26 15:47:10 +00:00
jca
bfea222448 SECURITY fix for CVE-2016-6313
* Fix critical security bug in the RNG [CVE-2016-6313].  An attacker
   who obtains 580 bytes from the standard RNG can trivially predict
   the next 20 bytes of output.  Problem detected by Felix Dörre and
   Vladimir Klebanov, KIT.
2016-08-26 08:30:10 +00:00
jca
f30fba0b97 SECURITY update to gnupg-1.4.21
CVE-2016-6313:  * Fix critical security bug in the RNG [CVE-2016-6313].
   An attacker who obtains 580 bytes from the standard RNG can trivially
   predict  the next 20 bytes of output.  Problem detected by Felix
   Dörre and Vladimir Klebanov, KIT.

Main behavior changes:
- CAST5 -> AES for symmetric encryption
- MD5 sigs rejected by default

ok danj@
2016-08-26 08:27:48 +00:00
espie
1d55a231e7 add is-branch to all trivial ports that exist as multiple branches. 2016-06-29 16:14:38 +00:00
naddy
b6496a69e5 drop workaround for static linking 2016-03-09 19:52:52 +00:00
sthen
5929e0d97e WANTLIB sync, missed from the big batch of curl nghttp2 2015-11-06 18:30:31 +00:00
jca
8db7b9c34e SECURITY update to gnupg-1.4.19
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.

* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
   are Practical].

This update introduces additional fixes and features, see

  http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html

ok sthen@
2015-03-01 12:12:54 +00:00
jca
1cbdc38d98 Update to gnupg-1.4.18 and take maintainership.
* fix regression in --recv-key {multiple keys}
* cap the sizes for automatic key generation

While here, delete unneeded do-test target.

"looks ok" sthen@, ok daniel@
2015-01-04 22:12:55 +00:00
sthen
472c97a96a unnecessary param.h 2014-10-13 19:21:16 +00:00
sthen
ea3247717b update to gnupg-1.4.17
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html

CVE-2014-4617: DoS due to garbled compressed data packets
2014-06-26 00:30:15 +00:00
jasper
3ea3febc52 remove m68k-related workarounds 2014-03-19 13:40:59 +00:00
pea
f444d84906 Security update to 1.4.16 (CVE-2013-4576)
ok jca@, brad@
2013-12-19 21:22:30 +00:00
jca
6aaefa0357 SECURITY update to gnupg-1.4.15, fixes CVE-2013-4402 (infinite recursion
parsing compressed packets) and includes the patch we had for
CVE-2013-4242 (Yarom/Falkner flush+reload side-channel attack on RSA
secret keys already had a patch).  Input from and ok sthen@
2013-11-16 20:29:00 +00:00
jasper
45606ac347 Security fix for CVE-2013-4242 GnuPG side-channel attack on RSA secret keys
ok pea@ sthen@
2013-08-06 19:28:57 +00:00
jca
49d9c2c78e Introduce MASTER_SITES_GNUPG and reuse it for various GnuPG
(sub)projects.  http:// urls first, then the primary ftp
site for ''make peek-ftp'', as suggested by sthen@.
ok sthen@
2013-07-12 00:49:23 +00:00
espie
6cd28b2069 grumble, thx fgs@ 2013-07-02 16:20:25 +00:00
espie
e9bba84c13 LIB_DEPENDS don't propagate 2013-07-02 08:09:43 +00:00