3482 Commits

Author SHA1 Message Date
landry
575289e06c SECURITY update to nss 3.15.3.1.
Bug 946351 - Misissued Google certificates from DCSSI
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.3.1_release_notes
2013-12-10 11:17:05 +00:00
ajacoutot
72e1ffed67 Update to gnutls-3.2.7. 2013-12-08 08:31:45 +00:00
naddy
1b01d564f5 Remove parse. Old cruft, doesn't seem to work on LP64, the port
hasn't been touched in its 13-year existence except for mechanical
changes.  ok jca@, lteo@
2013-12-07 19:55:34 +00:00
naddy
c99e504674 remove -lcompat, which wasn't even needed 2013-12-06 19:32:53 +00:00
jca
b1043a15b0 Don't include <sys/timeb.h> (#ifdef _OpenBSD_ code). 2013-12-06 11:54:48 +00:00
jca
8dfc971e23 Regen patches. 2013-12-06 11:53:05 +00:00
jca
d7c2968222 Don't include <sys/timeb.h>. 2013-12-06 11:27:18 +00:00
dcoppa
9c43ceea81 Update to ccid-1.4.14 2013-12-06 06:35:34 +00:00
naddy
69c5b7d81d code shared with unzip: timeb was already obsolete on 4.4BSD 2013-12-04 21:10:32 +00:00
espie
80546a87fd remove redundancies with new filename{url}sufx scheme 2013-12-02 16:25:08 +00:00
jca
0c8e344795 Regen patches and distinfo. 2013-11-30 20:47:49 +00:00
jca
9a5947d8d9 #ifdefs to avoid using stty/gtty and including sgtty.h.
This removes the need for libcompat.
Remove USE_GROFF while here, as requested by naddy.
ok naddy@
2013-11-30 20:31:49 +00:00
sthen
7f88db390f fix homepage, reported by Ross L Richardson 2013-11-29 11:47:09 +00:00
sthen
deb5eeeef9 +sslsplit 2013-11-28 16:49:37 +00:00
sthen
5ef763bbca import ports/security/sslsplit, ok zhuk@
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS
encrypted network connections. Connections are transparently intercepted
through a firewall/network address translation engine and redirected to
SSLsplit.

SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to
the original destination address, while logging all data transmitted.
SSLsplit is intended to be useful for network forensics and penetration
testing.

SSLsplit supports plain TCP, plain SSL, HTTP and HTTPS connections over
both IPv4 and IPv6. For SSL and HTTPS connections, SSLsplit generates
and signs forged X509v3 certificates on-the-fly, based on the original
server certificate subject DN and subjectAltName extension. SSLsplit
fully supports Server Name Indication (SNI) and is able to work with
RSA, DSA and ECDSA keys and DHE and ECDHE cipher suites. SSLsplit can
also use existing certificates of which the private key is available,
instead of generating forged ones. SSLsplit supports NULL-prefix CN
certificates and can deny OCSP requests in a generic way. SSLsplit
removes HPKP response headers in order to prevent public key pinning.
2013-11-28 16:49:10 +00:00
kirby
3034c5092d - switch to new MASTER_SITES and DISTFILE
- correct license
 - documentation cleanup
 - switch from MESSAGE to README
OK sthen@
2013-11-28 10:54:09 +00:00
sthen
c4b331405d no point patching a file that is already in ${FILESDIR} 2013-11-26 19:46:52 +00:00
sthen
ed380335ee include if_var.h to unbreak 2013-11-25 22:23:18 +00:00
sthen
4ca51fa0b8 fix following if header changes, from mikeb 2013-11-25 14:38:01 +00:00
sthen
701c91e413 kill VMEM_WARNING 2013-11-25 14:16:22 +00:00
bluhm
c1182f53ed update p5-IO-Socket-SSL to 1.960
Supports TLSv11, TLSv12.  Uses more secure algorithms.
2013-11-25 14:11:12 +00:00
jca
6aaefa0357 SECURITY update to gnupg-1.4.15, fixes CVE-2013-4402 (infinite recursion
parsing compressed packets) and includes the patch we had for
CVE-2013-4242 (Yarom/Falkner flush+reload side-channel attack on RSA
secret keys already had a patch).  Input from and ok sthen@
2013-11-16 20:29:00 +00:00
benoit
e558b79b2d Update to assl 1.5.0.
from David Hill (maintainer).
2013-11-13 19:41:02 +00:00
landry
b987467b49 SECURITY (f34r!) update to nss 3.15.3.
Fixes CVE-2013-1739 (bug #894370) & CVE-2013-5605 (bug #934016)
Adds support for AES-GCM ciphersuites in 3.15.2 (#bug 880543)

See for more details:
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.2_release_notes
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.3_release_notes
(the latter is not yet complete..)
2013-11-13 10:02:47 +00:00
naddy
725de75f3a move http://www.gnu.org to https 2013-11-09 23:19:01 +00:00
zhuk
af08a11d08 Fix MODTCL_TCLSH_ADJ and MODTCL_WISH_ADJ.
Review, input, okay and prodding to commit by stu@
2013-11-09 18:22:02 +00:00
ajacoutot
0badbe03db Fix comment. 2013-11-08 15:26:05 +00:00
ajacoutot
42efd73dfa Drop bogus CONFIGURE_ARGS. 2013-11-08 10:44:30 +00:00
ajacoutot
e3edfdd3aa Remove SECURITY files. They have served their purpose in the past but
have become pretty useless nowadays (and the pkg tools do not display
them anyway).
Some which contained valuable information have been turned into READMEs.

ok jasper@ sthen@
input/ok naddy@
2013-11-07 07:08:59 +00:00
jca
7b70e464d5 Update to 0.14 which includes our changes (no other code change).
While here:
- drop MAINTAINER per his request
- drop the unhelpful HOMEPAGE in favor of the default one coming with
  the cpan module
- install Crypt/OpenSSL/DSA/Signature.pod for symmetry between man(1)
  and perldoc(1)
- tests now use Digest::SHA which is in base
ok jasper@ (former maintainer)
2013-11-06 09:05:25 +00:00
abieber
24b11f3986 bump to pick up the node libv8 change.
OK sthen@
2013-11-05 16:24:14 +00:00
ajacoutot
d515837275 Remove uneeded LIB_DEPENDS. 2013-11-05 15:46:07 +00:00
jca
1b028617c7 Maintenance update to version 0.06. Remove the unhelpful HOMEPAGE.
ok sthen@
2013-11-04 12:47:13 +00:00
jca
fd21c39401 Remove unhelpful HOMEPAGE and regen distinfo. ok sthen@ 2013-11-04 12:44:34 +00:00
jca
bcd515206c Update to 0.28, which includes the fix for perl 5.14+. No other code change.
Use the (more useful) default HOMEPAGE from the cpan module while here, as
hinted by sthen@.  ok schwarze@ sthen@
2013-11-03 22:14:06 +00:00
sthen
65e9d283d3 fix p5-Crypt-OpenSSL-RSA with Perl >=5.14, from rak at debian, see
https://rt.cpan.org/Public/Bug/Display.html?id=65947
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628636
http://lists.freebsd.org/pipermail/freebsd-ports-bugs/2011-May/211223.html

regen distinfo while there
2013-11-03 14:58:22 +00:00
ajacoutot
d3360cfef6 Update to gnutls-3.2.6. 2013-11-03 00:31:20 +00:00
ajacoutot
04d17f1b94 -Wextra is supported by both our gcc. 2013-11-02 10:43:04 +00:00
benoit
789194b535 Update to py-paramiko 1.12.0. 2013-11-01 07:28:15 +00:00
sthen
27f03b1c52 bump REVISION for any ports using route messages. regen some distinfos and
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
ajacoutot
6972a5b45b Human readable. 2013-10-31 20:07:59 +00:00
schwarze
92d95bf55d Do not run mandoc(1) at build time.
Just install the mdoc(7) source code of the saslauthd(8) manual.
Also regenerate patch-saslauthd_configure.
Bump.

ok ajacoutot@
2013-10-31 19:42:45 +00:00
benoit
8a37551002 +py-ecdsa 2013-10-30 16:35:11 +00:00
benoit
f9ca202f5e Import security/py-ecdsa
This is an easy-to-use implementation of ECDSA cryptography (Elliptic Curve
Digital Signature Algorithm), implemented purely in Python, released under
the MIT license. With this library, you can quickly create keypairs (signing
key and verifying key), sign messages, and verify the signatures. The keys
and signatures are very short, making them easy to handle and incorporate
into other protocols.

ok sthen@
2013-10-30 15:24:54 +00:00
ajacoutot
f0f074dada Fix saslauthd man page display; noticed by aalm@
While here, add missing libgs2 (stupid make plist).
2013-10-30 15:06:46 +00:00
dcoppa
272d4e472d Update to ccid-1.4.13 2013-10-28 15:11:04 +00:00
dcoppa
356ebf4360 Update to pcsc-lite-1.8.10 2013-10-28 15:10:25 +00:00
naddy
672ffe8ebb Don't pick up net/adns if it happens to be installed. ok pea@ 2013-10-27 13:47:50 +00:00
jeremy
e79a176be2 Bump all ruby gem ports supporting rbx FLAVOR due to change to rubinius
gem directory when upgrading rubinius from 1.2.4 to 2.1.1.
2013-10-26 23:55:34 +00:00
jca
bc67f7acc3 Committed upstream. 2013-10-25 13:49:52 +00:00