sthen
c15b136e13
sync WANTLIB (and in one case, add gettext to LIB_DEPENDS) in dependent ports
...
now that internationalised domain name support has been removed from net/curl
2016-11-04 11:35:18 +00:00
naddy
893e631df0
rename MASTER_SITES_GNUPG to MASTER_SITE_GNUPG, like all the others
2016-10-01 13:56:26 +00:00
jca
be8a942bfb
Drop the gettext module from gnupg.org ports
2016-09-28 19:33:37 +00:00
jca
20949baddd
Extra patch that snuck in.
...
Spotted by Markus Lude.
2016-08-26 15:47:10 +00:00
jca
bfea222448
SECURITY fix for CVE-2016-6313
...
* Fix critical security bug in the RNG [CVE-2016-6313]. An attacker
who obtains 580 bytes from the standard RNG can trivially predict
the next 20 bytes of output. Problem detected by Felix Dörre and
Vladimir Klebanov, KIT.
2016-08-26 08:30:10 +00:00
jca
f30fba0b97
SECURITY update to gnupg-1.4.21
...
CVE-2016-6313: * Fix critical security bug in the RNG [CVE-2016-6313].
An attacker who obtains 580 bytes from the standard RNG can trivially
predict the next 20 bytes of output. Problem detected by Felix
Dörre and Vladimir Klebanov, KIT.
Main behavior changes:
- CAST5 -> AES for symmetric encryption
- MD5 sigs rejected by default
ok danj@
2016-08-26 08:27:48 +00:00
espie
1d55a231e7
add is-branch to all trivial ports that exist as multiple branches.
2016-06-29 16:14:38 +00:00
naddy
b6496a69e5
drop workaround for static linking
2016-03-09 19:52:52 +00:00
sthen
5929e0d97e
WANTLIB sync, missed from the big batch of curl nghttp2
2015-11-06 18:30:31 +00:00
jca
8db7b9c34e
SECURITY update to gnupg-1.4.19
...
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
* Fixed data-dependent timing variations in modular exponentiation
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
are Practical].
This update introduces additional fixes and features, see
http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
ok sthen@
2015-03-01 12:12:54 +00:00
jca
1cbdc38d98
Update to gnupg-1.4.18 and take maintainership.
...
* fix regression in --recv-key {multiple keys}
* cap the sizes for automatic key generation
While here, delete unneeded do-test target.
"looks ok" sthen@, ok daniel@
2015-01-04 22:12:55 +00:00
sthen
472c97a96a
unnecessary param.h
2014-10-13 19:21:16 +00:00
sthen
ea3247717b
update to gnupg-1.4.17
...
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
CVE-2014-4617: DoS due to garbled compressed data packets
2014-06-26 00:30:15 +00:00
jasper
3ea3febc52
remove m68k-related workarounds
2014-03-19 13:40:59 +00:00
pea
f444d84906
Security update to 1.4.16 (CVE-2013-4576)
...
ok jca@, brad@
2013-12-19 21:22:30 +00:00
jca
6aaefa0357
SECURITY update to gnupg-1.4.15, fixes CVE-2013-4402 (infinite recursion
...
parsing compressed packets) and includes the patch we had for
CVE-2013-4242 (Yarom/Falkner flush+reload side-channel attack on RSA
secret keys already had a patch). Input from and ok sthen@
2013-11-16 20:29:00 +00:00
jasper
45606ac347
Security fix for CVE-2013-4242 GnuPG side-channel attack on RSA secret keys
...
ok pea@ sthen@
2013-08-06 19:28:57 +00:00
jca
49d9c2c78e
Introduce MASTER_SITES_GNUPG and reuse it for various GnuPG
...
(sub)projects. http:// urls first, then the primary ftp
site for ''make peek-ftp'', as suggested by sthen@.
ok sthen@
2013-07-12 00:49:23 +00:00
espie
6cd28b2069
grumble, thx fgs@
2013-07-02 16:20:25 +00:00
espie
e9bba84c13
LIB_DEPENDS don't propagate
2013-07-02 08:09:43 +00:00
fgsch
89714f3705
Update mirrors list and move ftp.gnupg.org at the bottom
2013-03-31 19:12:37 +00:00
espie
eae66e4a7b
PERMIT_* / REGRESS->TEST sweep
2013-03-11 11:35:43 +00:00
sthen
f5a323c546
Don't use ${FLAVOR:L}, we only support lower-case flavours now.
...
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
bcallah
d38af15ac6
Fix an "elseif if ..." statement, allowing this to build on mips64*.
...
ok jasper@
2013-02-03 14:52:46 +00:00
sthen
872e4d2976
SECURITY update GnuPG to 1.4.13; earlier versions were vulnerable to memory
...
access violations and public keyring database corruption when importing
manipulated public keys. http://seclists.org/bugtraq/2012/Dec/151
Tweaked from a submission from David Hill.
2012-12-31 16:34:35 +00:00
landry
b1324216b8
Fix on hppa, broken since the PIE switch.
...
mpi/hppa1.1/udiv-qrnnd.S is not PIE-safe, let's use mpi/hppa/udiv-qrnnd.S
instead.
with kettenis@
2012-12-11 21:12:36 +00:00
landry
48209fe2c9
Regen patches
2012-12-11 20:47:45 +00:00
naddy
5e1bcbad44
The American/European/Japanese patents on IDEA have expired. Remove
...
the flavor and just include it by default. ok zinke@
2012-07-12 16:32:47 +00:00
espie
0322fed35a
properly re-conflict gpg1/2. Noticed by naddy@
...
okay ajacoutot@, pea@
2012-01-31 10:51:48 +00:00
ajacoutot
6973ee7fdc
Unbreak the "card" FLAVOR after the libusb->libusb-compat switch, spotted
...
by naddy@ (thanks).
2011-11-13 22:39:50 +00:00
espie
59fa199246
use PKGSPEC, every dependent port uses this
2010-11-26 07:50:07 +00:00
espie
6c283d7e98
new depends
2010-11-20 17:22:40 +00:00
espie
60f17a941b
more WANTLIB
2010-11-11 18:34:59 +00:00
pea
12acb9279b
Bugfixes update to 1.4.11
...
ok benoit@
2010-10-25 12:57:13 +00:00
espie
2ef1026971
USE_GROFF=Yes
2010-10-18 21:41:44 +00:00
jasper
2d4a122bfb
- reset maintainer, requested by reinhard@
2010-09-22 09:02:42 +00:00
pea
412b3e0b05
Avoid conflict with gnupg2. Like this you can install both in the same time.
...
ok aja@, jasper@
2010-07-08 17:01:57 +00:00
dhill
0533acdfff
update to 1.4.10.
...
From Pierre-Emmanuel André <pea@raveland.org>
OK reinhard@
2009-09-15 13:44:41 +00:00
jasper
275e22e63b
SECURITY UPDATE to gnupg 1.4.9
...
http://secunia.com/advisories/29568/
tested by many, thanks!
2008-04-03 10:13:00 +00:00
bernd
5e84793fd4
Update to gnupg-1.4.8. (GPLv3 now)
...
ok steven@
2008-01-30 20:18:09 +00:00
merdely
1997c75349
Remove surrounding quotes in NO_REGRESS/COMMENT*/PERMIT_*
...
From Darrin Chandler
2007-09-15 23:29:57 +00:00
naddy
a220ed62dc
chase wantlib changes after curl update
2007-05-15 15:09:12 +00:00
steven
66d8f55f87
update to 1.4.7
...
feedback and ok bernd@
2007-05-10 11:38:28 +00:00
espie
d4ebcd974d
more base64 checksums
2007-04-05 17:26:05 +00:00
steven
d540626c47
adjust another texinfo file so it does not leave entries behind.
...
rerun makesum while here.
from Moritz Grimm <mlist at scapa.dnsalias.net>
ok espie@
2007-02-22 00:17:09 +00:00
bernd
0435472660
Update to gnupg-1.4.6.
...
ok steven@
2007-01-16 09:50:36 +00:00
deanna
b750309ac5
Security fix:
...
remotely controllable function pointer [CVE-2006-6235]
from Werner Koch via fsf announce
ok steven
2006-12-06 23:11:58 +00:00
bernd
8ebe3474a5
Security fix for a buffer overflow when running gnupg in interactive mode.
...
More info:
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
2006-11-28 10:18:49 +00:00
bernd
f557a7e653
Security update to gnupg-1.4.5. (CVE-2006-3746)
...
This fixes a denial of service vulnerability.
For more information see:
http://secunia.com/advisories/21297/
http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html
okay espie@
2006-08-07 19:59:20 +00:00
espie
444cc3c520
new lib specs
2006-08-03 23:28:11 +00:00