3702 Commits

Author SHA1 Message Date
schwarze
0851962df3 Update to Authen::NTLM 1.09 (minor bugfix release); ok gsoares@
I'm quite happy that nobody forces me to use NTLM any longer,
and i'm certainly not using it voluntarily, so drop MAINTAINER.
2014-09-06 15:49:50 +00:00
ajacoutot
cc8992816d Update to p11-kit-0.20.5. 2014-09-06 07:21:05 +00:00
benoit
bf3dd6282c Update zebedee to 2.5.3. 2014-09-06 07:09:34 +00:00
benoit
83556ea0f3 Update cracklib to 2.9.1. 2014-09-05 16:43:20 +00:00
jasper
4e48ba8d2c PORTSCOUT -> PORTROACH 2014-09-05 14:45:02 +00:00
dcoppa
3bef63c4a0 Fix validation of EAPOL-Key length with AES key wrap
(upstream git commit b7c61c9d4e968e7254112631a9f6a1a1f8ef6f7f)

pkg/README: avoid confusion, we were talking about so many interfaces...
2014-09-05 13:18:41 +00:00
rpe
504759a7e3 Update py-M2Crypto to 0.22.3
- remove obsolete patches
- set HOMEPAGE to Github, previous one is not reachable
- remove post-build target because tests are not distributed anymore

OK aja@
2014-09-04 21:41:43 +00:00
benoit
9b94e2edf4 Update pdfcrack to 0.14. 2014-09-04 11:48:36 +00:00
ajacoutot
1f0be00195 Make sure not to pick-up libexecinfo if installed.
spotted by espie@
2014-09-04 08:20:16 +00:00
ajacoutot
ea3b05a720 Add PORTSCOUT entries. 2014-09-03 09:55:19 +00:00
sthen
c0f362b91c fix following removal of BIND from base; pick up tools from the package instead 2014-09-03 08:54:41 +00:00
sthen
b8d82fe4c7 update to sslsplit 0.4.8 2014-09-02 19:45:53 +00:00
dcoppa
f2af671cce Update to wpa_supplicant-2.2
Tested by pascal@ and myself.
I also take maintainership, as per sthen's request.
2014-09-02 13:04:34 +00:00
pea
dcbb0d9cbf Update to 2.0.26
ok dcoppa@
2014-09-01 08:42:01 +00:00
jturner
a074bf5986 Update to reop 2.1.0.
"Newer, better, bolder. v2 is now ready to go I think. The encrypted
message format is possibly more secure in some scenarios. For backwards
compat, a -1 option is available."
2014-08-31 14:21:12 +00:00
jturner
67f09a8889 Update spiped to 1.4.0.
Includes code cleanup and bug fixes plus a new -g option to drop
connections if another host is using -f.
2014-08-31 14:15:56 +00:00
jasper
d099caff2e Remove MASTER_SITES=${MASTER_SITE_BACKUP} which is already taken care of by bsd.port.mk 2014-08-30 21:54:07 +00:00
ajacoutot
8d28dad502 Cope with openssl(1) move from /usr/sbin to /usr/bin
ok landry@
2014-08-27 06:58:00 +00:00
naddy
1460185cd7 * Fix the build after OpenBSD has gained blkcnt_t.
* Bump revision because the type of blkcnt_t has changed.
* Drop unneeded USE_GROFF.

ok benoit@
2014-08-26 19:16:53 +00:00
kirby
58a70ff8ae add rc script for scanlogd
OK ajacoutot@
2014-08-26 15:51:14 +00:00
kirby
023dd3e6ae drop MASTER_SITES. it's already set with GH_* 2014-08-26 08:03:33 +00:00
ajacoutot
5391d667e0 Update to gnutls-3.2.17. 2014-08-25 16:27:56 +00:00
ajacoutot
b22dcf3d08 Update to libgcrypt-1.6.2. 2014-08-25 16:27:25 +00:00
ajacoutot
6c43f6457f Update to libtasn1-4.1. 2014-08-25 16:27:00 +00:00
sthen
0fdd9ac774 update to libsodium-0.70, for new features see
https://github.com/jedisct1/libsodium/releases/tag/0.7.0
2014-08-24 22:25:03 +00:00
zhuk
cb88cc0f5e Bump after changing a few IEEE 802.11 ioctls. 2014-08-24 18:05:17 +00:00
landry
3953b2777e Another missing bump after ocaml change.. 2014-08-23 06:54:18 +00:00
kili
edea600f6e More bumps due to lang/ocaml pkgname change. 2014-08-22 22:49:07 +00:00
bluhm
fd50d63c96 - update p5-Net-SSLeay to 1.66
- change license from OpenSSL to Perl
2014-08-22 20:42:57 +00:00
landry
d1366585d7 Fix build on sparc64.
In the 'you didnt think openssl was that insane' series, it tries to use
m4 -B 8192 to generate some sparc asm from an m4 file.
Unsurprisingly, our m4 doesn't support -B, it's not even in gm4's manpage,
and gm4 info page says this about -B :
     These options are present for compatibility with System V `m4', but
     do nothing in this implementation.  They may disappear in future
     releases, and issue a warning to that effect.

I'm glad openssl can be built with System V m4..
2014-08-22 07:59:54 +00:00
gsoares
05bfcfc5de update to 5.03
OK kili@
2014-08-22 02:22:25 +00:00
sthen
5d6de15498 security update to OpenSSL 1.0.1i 2014-08-21 23:15:57 +00:00
ajacoutot
1bf8689917 Update to gnutls-3.2.16. 2014-08-21 12:37:27 +00:00
ajacoutot
bd0519ffbf Update to p11-kit-0.20.4. 2014-08-21 10:38:27 +00:00
ajacoutot
bc195bd4b8 Better MASTER_SITES. 2014-08-20 07:18:25 +00:00
jca
624c0d6cb7 SECURITY update to polarssl-1.3.8
- includes a fix for CVE-2014-4911 (DoS)
- delete patches committed upstream
- unbreak sparc64
- new features, see ChangeLog
Regress tests pass on amd64 and sparc64.
ok sthen@

Note that no port uses it yet.
2014-08-18 20:50:28 +00:00
jasper
8b8254e550 sort 2014-08-15 12:24:46 +00:00
ajacoutot
c1ea8858c3 Fix MODHEIMDAL_LIB_DEPENDS. 2014-08-15 07:56:42 +00:00
jturner
983fb41953 Update reop to 1.1.1 2014-08-15 00:53:51 +00:00
ajacoutot
bf716a7943 +py-keyring
+py-secretstorage
2014-08-14 20:00:22 +00:00
ajacoutot
01bafd8ab1 Import py-keyring-3.8.
The Python keyring lib provides a easy way to access the system keyring
service from python. It can be used in any application that needs safe
password storage.
<...>

ok jasper@
2014-08-14 19:59:01 +00:00
ajacoutot
4d61fd5cc7 Import py-secretstorage-2.1.1.
This module provides a way for securely storing passwords and other
secrets. It uses D-Bus Secret Service API that is supported by GNOME
Keyring and KSecretsService.

ok jasper@
2014-08-14 19:57:49 +00:00
henning
68d032a28f SUBDIR += p5-File-Scan-ClamAV 2014-08-14 14:37:37 +00:00
henning
523f31e770 perl client lib for clamav's clamd; help & ok sthen 2014-08-14 14:36:49 +00:00
ajacoutot
9f7b16e48d Tweaks, no pkg change. 2014-08-14 06:40:00 +00:00
ajacoutot
b5996d34b0 Update to libpwquality-1.2.4. 2014-08-14 06:38:51 +00:00
dcoppa
8c4616a36b Fix: onepin-opensc-pkcs11.so belongs to PFRAG.shared 2014-08-13 11:22:39 +00:00
dcoppa
6ff7d2ab3c Update to opensc-0.14.0 2014-08-13 06:18:47 +00:00
espie
fba99f4fde more appropriate uses of INSTALL_PROGRAM.
Unhardcode chown.
2014-08-10 10:11:47 +00:00
espie
92816cd8fc use more specific version of SUBST_* where appropriate 2014-08-10 09:58:04 +00:00