6573 Commits

Author SHA1 Message Date
sthen
c5dd769114 update to py-cryptography 2.9.2 2020-06-12 12:26:17 +00:00
ajacoutot
99e8be1a30 Missing DEP on devel/py-wheel. 2020-06-12 12:00:43 +00:00
ajacoutot
a47e91ca08 Update to py3-rsa-4.2. 2020-06-12 09:45:54 +00:00
jasper
e8b7441779 update to py-PyNaCl-1.4.0 2020-06-11 20:00:55 +00:00
ajacoutot
b63f31388e Update to py3-rsa-4.1.
Make it py3 only.
2020-06-11 06:48:45 +00:00
tb
b28928b109 Update to tlsfuzzer 20200610. 2020-06-10 22:11:48 +00:00
sebastia
0bc078026b Update 3.8.1 -> 3.8.2 2020-06-10 19:50:49 +00:00
sebastia
9cffff2804 update 0.10.0 -> 0.10.1 2020-06-10 19:50:10 +00:00
jasper
b57aec03f5 update to boofuzz-0.2.0 2020-06-10 07:13:13 +00:00
jasper
39567b34b2 bump after libxslt dependency changed 2020-06-09 07:14:44 +00:00
robert
1ac4a4f70c update to 1.1 2020-06-08 18:05:38 +00:00
jmatthew
1ddbae0266 +pivy 2020-06-08 10:58:33 +00:00
jmatthew
7549cc7d6f import pivy-0.6.0
Pivy is an implementation of a simple PIV client with minimal dependencies.
It contains a pivy-tool binary which can conduct basic operations using
PIV cards, and the pivy-agent, which implements the SSH agent protocol as
a drop-in replacement for the OpenSSH ssh-agent command (except that the
keys it contains are always on a PIV card).

"PIV cards" notably includes Yubico Yubikey devices such as the NEO and
Yubikey4, which can store up to 24 keys by using the "retired key" slots
(which this agent supports).

ok (and much help from) sthen@
2020-06-08 10:42:59 +00:00
sthen
0e4d138bc8 update to minisign-0.9 2020-06-07 08:05:42 +00:00
sthen
b20edba856 update to xca-2.3.0 2020-06-06 20:40:49 +00:00
sthen
4929b0adac update to certbot 1.5.0 2020-06-06 20:23:48 +00:00
tb
65e35e28ed Update to py-tlsfuzzer-20200604 2020-06-06 19:30:00 +00:00
tb
f1a7dcecf4 Enable debug package for OpenSSL 1.1.
ok sthen
2020-06-05 16:47:57 +00:00
ajacoutot
ba9ac0c8ed SECURITY update to gnutls-3.6.14. 2020-06-04 09:08:22 +00:00
landry
7a26dd3b5f Update to nss 3.53, requirement for gecko 78.
See https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes
2020-06-02 15:18:09 +00:00
ajacoutot
2622248db0 Handle AddTrust External Root CA certificate expiration; from upstream. 2020-06-01 14:38:18 +00:00
jasper
10d8da9a24 - switch to python3
- install a few more example scripts
- add missing crc32c dependency (spotted with 'boo open')
2020-05-31 12:07:09 +00:00
ajacoutot
b6b622e854 Update to libgpg-error-1.38. 2020-05-31 10:43:11 +00:00
ajacoutot
0458155fb0 Fix HOMEPAGE. 2020-05-31 08:04:37 +00:00
sthen
ba36fd3bde update to uacme 1.4 2020-05-30 17:20:43 +00:00
jasper
b1a67a0628 update to fierce-1.4.0
from purplerain@secbsd.org, thanks!
2020-05-30 12:09:31 +00:00
ajacoutot
c323eab17a Update to vault-1.4.2. 2020-05-28 09:32:25 +00:00
sthen
753d46e2c6 security/amap: fix HOMEPAGE/MASTER_SITES and license marker, slightly based
on a diff from purplerain@secbsd.org
2020-05-26 22:20:48 +00:00
sthen
e883400adb regen plist 2020-05-26 22:17:54 +00:00
sthen
3be3f4df6a fix MASTER_SITES, add a HOMEPAGE, correct license marker.
prompted by a diff from purplerain@secbsd.org
2020-05-26 22:14:54 +00:00
sebastia
6883842bdf update to 2020-05-26 2020-05-26 21:32:14 +00:00
sthen
fb3673a65c yubikey-manager: backport 149560689, "Better error handling when failing
to open CCID context"
2020-05-23 23:01:25 +00:00
sthen
d56f655e1f yubikey-manager: update deps for ${MODPY_FLAVOR} 2020-05-23 21:56:49 +00:00
sthen
39c990978a switch py-fido2 to py-fido2,python3
add py-pyscard,python3 which was never added in the first place
2020-05-23 21:56:21 +00:00
sthen
3026c1f1a4 update to git checkout of py-fido2 which has some OpenBSD support
(added in f2451e8aeba) - some hangs seen, but it's better than not being
implemented at all.

switch MODPY_FLAVOR to FLAVOR=python3 while there, and sync py-pyscard dep.
2020-05-23 21:55:55 +00:00
sthen
f1ca354653 py-pyscard: switch from MODPY_VERSION to FLAVOR=python3 2020-05-23 21:54:05 +00:00
sthen
ebb41ca4a5 clamav: remove stray \ which was masking FAKE_FLAGS 2020-05-23 21:26:08 +00:00
tb
ddd5c9a752 Undo a stupid thinko that broke the build.
reported by naddy
2020-05-21 22:23:34 +00:00
sthen
487d440729 clamav: set OBJC="${CC}" to use clang on clang arches, rather than
trying to auto detect, which picks up gcc on those base-clang arches
which still install gcc (which I think is now causing more problems
than it solves).

Fixes a build problem reported by solene@ on i386 with old /usr/bin/gcc
present after the installer auto-removed old gcc-libs.
2020-05-21 21:05:21 +00:00
tb
3f4ec7fb7e Update to py3-tlsfuzzer-20200513 2020-05-21 10:21:22 +00:00
landry
31eb0ebd27 Update to nss 3.52.1, reqd by fx 77.0b8.
See
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes

Fixes https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2020-12399 'Force
a fixed length for DSA exponentiation' (bug details not public)
2020-05-20 08:43:09 +00:00
jeremy
d9392c1793 Remove building of Ruby 2.5 gem ports by default 2020-05-19 15:34:55 +00:00
landry
0f14e68bb9 Update to botan2 2.14.0.
ok bluhm@ (MAINTAINER) tb@
2020-05-18 13:17:42 +00:00
kn
a8cf740bb8 Remove unmaintained and now comercial nipper ports
nipper and libnipper became comercial over ten years ago and have not been
updated ever since;  HOMEPAGE doesn't even mention them any longer.

Pointed out by Marcus MERIGHI <mcmer-openbsd at tor dot at>, thanks!
OK sthen jca
2020-05-17 10:36:17 +00:00
ajacoutot
77839cabf6 SECURITY update to cracklib-2.9.7 and remove useless py bindings.
- CVE-2016-6318

ok benoit@ (maintainer)
2020-05-16 14:03:39 +00:00
sthen
6793a5e360 update to clamav-0.102.3
- [CVE-2020-3327](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327):
  Fix a vulnerability in the ARJ archive parsing module in ClamAV 0.102.2 that
  could cause a Denial-of-Service (DoS) condition. Improper bounds checking of
  an unsigned variable results in an out-of-bounds read which causes a crash.

  Special thanks to Daehui Chang and Fady Othman for helping identify the ARJ
  parsing vulnerability.

- [CVE-2020-3341](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341):
  Fix a vulnerability in the PDF parsing module in ClamAV 0.101 - 0.102.2 that
  could cause a Denial-of-Service (DoS) condition. Improper size checking of
  a buffer used to initialize AES decryption routines results in an out-of-
  bounds read which may cause a crash. Bug found by OSS-Fuzz.

- Fix "Attempt to allocate 0 bytes" error when parsing some PDF documents.

- Fix a couple of minor memory leaks.

- Updated libclamunrar to UnRAR 5.9.2.
2020-05-16 12:25:10 +00:00
ajacoutot
4ab4f85ac5 Move to py3. 2020-05-16 10:41:32 +00:00
ajacoutot
cf345daf79 Add bash completions.
ok bket@ (maintainer)
2020-05-15 14:46:37 +00:00
gonzalo
dad38fc64d Update for Suricata to 5.0.3
https://suricata-ids.org/2020/04/28/suricata-5-0-3-released/

OK jasper@
2020-05-15 09:17:39 +00:00
benoit
0e6e0063b4 Update to pdfcrack-0.19. 2020-05-15 06:56:35 +00:00