3873 Commits

Author SHA1 Message Date
robert
e15581192e sync with the recent freebsd pam code 2014-11-25 09:29:46 +00:00
bluhm
4449a69d2d update p5-IO-Socket-SSL to 2.006 2014-11-24 13:22:36 +00:00
benoit
a09df8e9be Update RUN_DEPENDS, bump REVISION
ok ajacoutot@
2014-11-23 14:40:40 +00:00
benoit
68dabccc9e Update to p5-Crypt-OpenSSL-X509-1.805.
ok ajacoutot@
2014-11-23 14:37:14 +00:00
benoit
6a006f924d Update to pgpdump-0.29.
ok ajacoutot@
2014-11-23 09:45:56 +00:00
naddy
68901558ab dependency change from math/p5-Math-BigInt-Pari to p5-Math-BigInt-GMP 2014-11-22 00:10:50 +00:00
sthen
ad5defa998 update to libsodium 1.0.1
- sodium_bin2hex() is now constant-time.
 - crypto_secretbox_detached() now supports overlapping input and output
regions.
 - NaCl's donna_c64 implementation of curve25519 was reading an extra byte
past the end of the buffer containing the base point. This has been
fixed.
2014-11-21 14:30:05 +00:00
sthen
1772b8590f revert this part which shouldn't have been in previous commit 2014-11-19 20:48:51 +00:00
sthen
40ef208661 unbreak following removal of unistd.h include from sys/file.h
this commit does nothing to improve the crappiness of these ports, just
lets them build again.
2014-11-19 20:48:00 +00:00
sthen
9661f0eb5d ensure -current version > -stable version 2014-11-19 11:40:53 +00:00
sthen
167593e9ae SECURITY update to clamav 0.98.5 (crash fixes for various maliciously crafted
files, improved detection of malicious PE files, new file formats)
2014-11-19 00:18:01 +00:00
sthen
5191e28f8a @comment 0-byte .bs file 2014-11-16 19:52:09 +00:00
sthen
a7ed735b35 @comment 0-byte .bs file 2014-11-16 19:51:17 +00:00
bluhm
ae035f9bbf update p5-IO-Socket-SSL to 2.005 2014-11-16 19:42:30 +00:00
sthen
99554087e6 update to pear-Auth-SASL 1.06 2014-11-15 22:13:46 +00:00
benoit
f6f10fdff9 Update to p5-Crypt-Rijndael-1.12.
ok ajacoutot@
2014-11-15 15:15:16 +00:00
benoit
ef51c0c4e4 Update to xmlsec-1.2.20.
ok ajacoutot@
2014-11-15 12:20:55 +00:00
benoit
e660f261cb Update to p5-Crypt-CBC-2.33.
ok ajacoutot@
2014-11-15 10:05:28 +00:00
benoit
d6733fa42b Update to p5-Crypt-OpenSSL-X509-1.804.
ok ajacoutot@
2014-11-15 10:01:51 +00:00
benoit
a1fb6cb350 Update to p5-Digest-MD2-2.04.
ok ajacoutot@
2014-11-15 09:54:43 +00:00
sthen
2dd4eb15ae update to sslsplit-0.4.9 2014-11-13 22:39:58 +00:00
benoit
cca18e5222 Update to p5-Net-SSL-ExpireDate-1.12.
Tweak and ok ajacoutot@
2014-11-13 16:45:16 +00:00
ajacoutot
33cfb368c7 SECURITY update to gnutls-3.2.20. 2014-11-13 09:33:09 +00:00
dcoppa
3b81d85af4 Bugfix update to pcsc-lite-1.8.13 2014-11-11 08:13:28 +00:00
benoit
e18ed16557 Update lynis to 1.6.4.
ok gonzalo@ (maintainer)
2014-11-06 22:07:42 +00:00
dcoppa
f1e155f02f Respect our CFLAGS and remove default optimizations 2014-11-05 09:40:05 +00:00
sthen
c8c02a984b update to polarssl 1.3.9, security fixes (but note that nothing in the ports
tree currently uses this library)

   * Lowest common hash was selected from signature_algorithms extension in
     TLS 1.2 (found by Darren Bane) (introduced in 1.3.8).
   * Remotely-triggerable memory leak when parsing some X.509 certificates
     (server is not affected if it doesn't ask for a client certificate)
     (found using Codenomicon Defensics).
   * Remotely-triggerable memory leak when parsing crafted ClientHello
     (not affected if ECC support was compiled out) (found using Codenomicon
     Defensics).
2014-11-04 19:45:41 +00:00
sthen
4c4be795fc update to yubikey-personalization-gui 3.1.17 2014-11-02 21:55:36 +00:00
zhuk
20345466ed Unify my email in MAINTAINER lines to make portroach happy.
Kindly reminded by jasper@ a week (or two?) ago, sorry for slacking.
2014-11-02 10:33:50 +00:00
sthen
e6d561d9cf update to gpgme 1.5.1 2014-11-01 09:34:40 +00:00
jasper
8209e9a2f6 unify
ok jim@
2014-10-28 08:23:06 +00:00
gonzalo
8c44bfa2a4 Update for Stunnel to 5.06:
Security bugfixes

    OpenSSL DLLs updated to version 1.0.1j.
https://www.openssl.org/news/secadv_20141015.txt
    The insecure SSLv2 protocol is now disabled by default. It can be
enabled with "options = -NO_SSLv2".
    The insecure SSLv3 protocol is now disabled by default. It can be
enabled with "options = -NO_SSLv3".
    Default sslVersion changed to "all" (also in FIPS mode) to
autonegotiate the highest supported TLS version.

New features

    Added missing SSL options to match OpenSSL 1.0.1j.
    New "-options" commandline option to display the list of supported
SSL options.

Bugfixes

    Fixed FORK threading build regression bug.


OK gsoares@ (maintainer) OK schwarze@
2014-10-27 13:16:48 +00:00
jasper
3de35519f6 unify; ok MAINTAINER 2014-10-25 12:08:49 +00:00
bluhm
f37d7b7d2b update p5-IO-Socket-SSL to 2.002 2014-10-24 19:31:39 +00:00
dcoppa
f37db76fa1 sc-hsm: Prevent double-free crash if key generation fails
(upstream git commit 5279bfa2d14d2186b31189748bcf89d908f00512)
2014-10-24 13:44:00 +00:00
nigel
2080ce03ba Update version to 0.72 fix for LibreSSL, deependencies for p5-libww 6.08.
Ok sthen@
2014-10-23 20:02:40 +00:00
pea
31deda19ac Unify address. Spotted by jasper@
ok jasper@, landry@
2014-10-22 14:10:46 +00:00
gonzalo
531b45b193 unify email/name 2014-10-22 13:55:52 +00:00
jasper
94d669b0a8 unify maintainer addresses
ok giovanni@
2014-10-22 13:39:38 +00:00
jasper
04de2aa0e9 unify maintainer addresses
ok MAINTAINER
2014-10-22 13:08:35 +00:00
jasper
c084e6a275 switch to working maintainer address 2014-10-22 09:44:07 +00:00
gonzalo
37fe27badc Update for Lynis to 1.6.3:
http://cisofy.com/changelog/lynis/1.6.3/

Ok benoit@
2014-10-21 13:58:29 +00:00
bluhm
fa7e761610 update p5-IO-Socket-SSL to 2.000, this disables SSLv3 2014-10-17 19:12:00 +00:00
jasper
02802176a2 switch to rspec3
ok jeremy@
2014-10-17 18:34:17 +00:00
jasper
df707ed99e disable rspec2 tests for these ports as rspec2 will be removed shortly.
ok jeremy@
2014-10-17 17:03:26 +00:00
sthen
cc490281be add xca patches from sf bugs; notably http://sourceforge.net/p/xca/patches/14/
which unbreaks it with openssl 1.0.1i's stricter OID checks
2014-10-17 15:10:23 +00:00
sthen
17cbfe801f change xca's default hash to SHA 256 2014-10-17 14:53:55 +00:00
ajacoutot
799cbec8e1 Update to libgpg-error-1.17. 2014-10-16 09:27:14 +00:00
rpe
d5ecd4958c Update to 1.15.1
OK aja@, benoit@ (MAINTAINER)
2014-10-15 17:15:37 +00:00
sthen
e45e6daad9 update to openssl-1.0.1j, build with no-ssl3 2014-10-15 15:01:11 +00:00