7246 Commits

Author SHA1 Message Date
bket
ca25809794 Update to rhash-1.4.2
Changelog: https://github.com/rhash/RHash/blob/v1.4.2/ChangeLog

OK rsadowski@
2021-12-11 11:50:55 +00:00
sthen
8a36d67da8 update to zaproxy-2.11.1 2021-12-11 10:09:54 +00:00
sthen
1323e2a998 Backout previous opendnssec changes to cope with it wanting to use
constants from ldns for a different purpose, that ldns doesn't really
want to expose on non-EdXXX builds.

Bodge it in ldns instead by supporting the same USE_EDxxx cpp macros
that opendnssec uses. Looks to me like ldns are trying to replace them
with something harder to mess about with.

Hopefully the various parts of nlnetlabs responsible for these two
pieces of software will talk to each other and figure something out.

Hopefully this should fix ed25519 with opendnssec as found by an
anonymous reporter on ports@.
2021-12-08 23:57:35 +00:00
jca
de58d3b435 Various encfs fixes (llvm 13 fix included)
- llvm 13 fix: correct destructor signature
- more accurate HOMEPAGE, previous is now broken
- respect CFLAGS/CXXFLAGS instead of clobbering them
- fix tests with a ninjutsu trick
2021-12-08 11:48:06 +00:00
landry
8379364a22 security/nss: fix build with llvm 13
applies https://phabricator.services.mozilla.com/D130309 to fix #1738028

llvm 13 is more picky with -Werror,-Wunused-but-set-variable

requested by naddy@
2021-12-07 16:07:25 +00:00
sthen
3205483167 update to py3-oauthlib-3.1.1, from Johan Huldtgren 2021-12-07 10:44:34 +00:00
op
3fe96c8e15 +veracrypt 2021-12-06 19:03:02 +00:00
op
c0bdd1ab9b import veracrypt-1.25.4
VeraCrypt is a free open source disk encryption software for
Windows, Mac OSX and Linux.

From Tietoturvamies, thanks!

OK sthen@
2021-12-06 19:02:18 +00:00
tb
b015199246 security/p5-Crypt-OpenSSL-RSA: fix build with opaque RSA in LibreSSL 3.5. 2021-12-04 21:37:58 +00:00
tb
0356c29630 security/sslsplit: use a few OpenSSL 1.1 codepaths to fix the build
with opaque structs in libcrypto. Also skip a couple of tests for
old OpenSSL that will no longer compile with recent LibreSSL.
2021-12-04 12:06:14 +00:00
tb
0919a1aedf security/aircrack-ng: force use of OpenSSL 1.1 code path to fix build
with opaque HMAC_CTX in upcoming libcrypto bump.
2021-12-04 11:44:41 +00:00
tb
164fffecb2 security/encfs: neuter compat shims that break the build with opaque
HMAC_CTX in preparation for upcoming libcrypto bump.
2021-12-04 11:35:34 +00:00
tb
7202a074b9 security/dsniff: fix build with opaque RSA in LibreSSL 3.5. Based
on Debian's patchset with a couple of minor tweaks. Add some missing
includes to make this compile without warnings.

ok sthen
2021-12-04 11:27:19 +00:00
tb
c5960539e8 nss: unbreak build: the clang 13 fix breaks on -current.
error: unknown warning option '-Werror=unused-but-set-variable'; did you mean '-Werror=unused-const-variable'? [-Werror,-Wunknown-warning-option]
2021-12-02 10:31:14 +00:00
landry
70b4b80121 security/nss: security update to 3.73
Fixes https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/

from jca@
2021-12-02 08:25:05 +00:00
abieber
8717125c51 Update rbw to 1.4.1
- remove patches as they seem to not be needed now \o/

Full log of changes: https://git.tozt.net/rbw/log/
2021-12-01 00:04:13 +00:00
sthen
89de7b7b4b update to gopass-1.13.0 2021-11-30 11:01:31 +00:00
sthen
bce1babcfd update to libretls-3.4.2 2021-11-30 09:15:47 +00:00
sthen
1e8d4fe411 update to py3-pyscard-2.0.2 2021-11-29 22:01:53 +00:00
sthen
d734a56cd8 update to scanlogd-2.2.8 2021-11-29 21:59:29 +00:00
sthen
e2df2949d2 unbreak opendnssec following ldns update, ok tb@ pvk@
opendnssec assumes that all ldns >=1.7 have Ed25519/Ed448 but this isn't
correct. In ldns >= 1.8 the constants related to Ed25519/Ed448 are _not_
available unless those features are available, so builds trying to use
them will fail (previously this was a runtime failure).

opendnssec's autoconf script sets USE_ED25519/USE_ED448 (hardcoded to 1)
but doesn't actually use them in code. Change the code to use them, and
hardcode to 0 for now. Should check LDNS_BUILD_CONFIG_USE_ED25519 and
LDNS_BUILD_CONFIG_USE_ED448 on 1.8+.
2021-11-28 10:37:04 +00:00
tb
281fabca83 Update py3-fastecdsa to 2.2.3 2021-11-27 23:25:38 +00:00
sthen
159cc0d24b update to py3-gnupg-0.4.8 2021-11-26 08:17:35 +00:00
tb
1dbe07e906 py-cryptography: unbreak build. The code assumes that if OPENSSL_NO_CT
is defined then the SCT struct exists. Beck added OPENSSL_NO_CT to
opensslfeatures.h but the struct will only exist after the next bump.

Reported by & ok aja semarie
2021-11-26 07:59:42 +00:00
sthen
85454d1539 update to py3-keyring-23.3.0 2021-11-25 09:24:38 +00:00
sthen
2d90063472 update to py3-acme-1.21.0/certbot-1.21.0 2021-11-20 14:41:41 +00:00
landry
d3b5eaa2d6 +{print/py-pylatex,security/py-hvac,devel/py-ordered-set},python3 2021-11-20 08:24:48 +00:00
landry
6fa1428819 import security/py-hvac 0.11.2, from Maintainer Mikolaj Kucharski
HVAC allows accessing secrets stored in a Vault directly from
Python code.

An access token must be created first, using a separate tool
like vault or vault-client.

ok sthen@
2021-11-20 08:22:34 +00:00
sthen
51456a243c update to py3-josepy-1.11.0 2021-11-18 09:20:48 +00:00
tb
21707c3b84 net/ctunnel: avoid upcoming build failure by using EVP_CIPHER_CTX_new()
instead of a naked calloc(). The better fix would be a update to 0.8;
in the interim land this.

ok pea (maintainer)
2021-11-17 14:13:10 +00:00
tb
77e04bed9f -luacrypto 2021-11-17 10:40:55 +00:00
tb
37af46211f security/luacrypto: retire. Version in ports is from 2011, last upstream
version is from 2013. Doesn't compile with OpenSSL 1.1.
A useful alternative may be https://github.com/wahern/luaossl

ok kn, kmos; sthen agrees
2021-11-17 10:40:19 +00:00
sthen
f73d394826 remove pear-* ports, they are no longer used by other ports and many
are outdated. ok benoit@ ajacoutot@

These are library classes written in PHP for various functionality and
used to be needed to support PHP applications in the ports tree (things
like roundcube, horde and others used them) but all of this type of
software in ports now uses bundled dependencies. For development,
typically a language-specific dependency manager (like www/composer)
is used rather than OS packages.

www/pear (providing pear itself and pear-utils) is still kept.
2021-11-15 13:47:28 +00:00
tb
9bb79d35dd security/botan: port BlockCipher/HashFunction classes to OpenSSL 1.1 API.
ok bluhm (maintainer)
2021-11-14 18:43:44 +00:00
sthen
2e2180c22b regen patches 2021-11-14 12:40:28 +00:00
sthen
bf5b5d1075 adjust the pledge string in gopass:
+-	if err := protect.Pledge("stdio rpath wpath cpath tty proc exec"); err != nil {
++	if err := protect.Pledge("stdio rpath wpath cpath fattr tty proc exec"); err != nil {

during "gopass fsck" if files or directories are encountered with
permissions that are too wide, it will use syscall.Chmod to fix too-open
permissions on files or directories. wpath is not enough for this, fattr
is needed.
2021-11-13 21:58:30 +00:00
tb
81b516f474 security/lastpass-cli: Use OpenSSL 1.1 API path to avoid upcoming build
breakage.

tested/ok bket (maintainer)
2021-11-13 19:41:10 +00:00
tb
790ddd7e55 security/libssh2: compile with HAVE_OPAQUE_STRUCTS to avoid upcoming
breakage. Regen patch while there.

ok benoit (maintainer)
2021-11-13 19:36:14 +00:00
sthen
cf2349cd10 update to gopass-1.12.8 2021-11-13 00:25:44 +00:00
bluhm
87301d575c update botan2 to 2.18.2 2021-11-12 22:02:50 +00:00
sthen
6c7fcaeaf7 @comment the gpgrt.info file in libgpg-error, it's not the world's most
useful documentation file, and triggers an annoying pkg_add warning message
ok aja@ (maintainer)
2021-11-12 20:55:21 +00:00
ajacoutot
a78f6919c5 Update to libtasn1-4.18.0. 2021-11-12 08:13:06 +00:00
tb
3d70442139 security/p5-IO-Socket-SSL: disable two tests that fail due to the fact
that we no longer allow creation of certificates containing illegal
sandns names (x509_alt.c r1.3, r1.5).

ok bluhm
beck agrees with the approach
2021-11-11 18:32:08 +00:00
sthen
3b8e5308e4 update to py3-argon2-cffi-21.1.0 2021-11-11 09:03:19 +00:00
sthen
10d1b0039b garbage-collect old dependencies no longer used by py-cryptography 2021-11-08 14:46:55 +00:00
sthen
371cc0c6db fix pkgname 2021-11-08 14:30:53 +00:00
sthen
c09544505e update to py3-service-identity-21.1.0 2021-11-08 14:19:32 +00:00
sthen
0e1184b4bc build up SUPDISTFILES from MODCARGO_CRATES so that !rust arches don't
fail on "Extra file 'cargo/XXX"
2021-11-08 14:17:04 +00:00
ajacoutot
fcba761211 Update to libgpg-error-1.43. 2021-11-05 08:02:58 +00:00
sthen
4f03df76ef update to clamav-0.104.1 2021-11-03 22:22:14 +00:00