jca
1cbdc38d98
Update to gnupg-1.4.18 and take maintainership.
...
* fix regression in --recv-key {multiple keys}
* cap the sizes for automatic key generation
While here, delete unneeded do-test target.
"looks ok" sthen@, ok daniel@
2015-01-04 22:12:55 +00:00
sthen
472c97a96a
unnecessary param.h
2014-10-13 19:21:16 +00:00
sthen
ea3247717b
update to gnupg-1.4.17
...
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
CVE-2014-4617: DoS due to garbled compressed data packets
2014-06-26 00:30:15 +00:00
jasper
3ea3febc52
remove m68k-related workarounds
2014-03-19 13:40:59 +00:00
pea
f444d84906
Security update to 1.4.16 (CVE-2013-4576)
...
ok jca@, brad@
2013-12-19 21:22:30 +00:00
jca
6aaefa0357
SECURITY update to gnupg-1.4.15, fixes CVE-2013-4402 (infinite recursion
...
parsing compressed packets) and includes the patch we had for
CVE-2013-4242 (Yarom/Falkner flush+reload side-channel attack on RSA
secret keys already had a patch). Input from and ok sthen@
2013-11-16 20:29:00 +00:00
jasper
45606ac347
Security fix for CVE-2013-4242 GnuPG side-channel attack on RSA secret keys
...
ok pea@ sthen@
2013-08-06 19:28:57 +00:00
jca
49d9c2c78e
Introduce MASTER_SITES_GNUPG and reuse it for various GnuPG
...
(sub)projects. http:// urls first, then the primary ftp
site for ''make peek-ftp'', as suggested by sthen@.
ok sthen@
2013-07-12 00:49:23 +00:00
espie
6cd28b2069
grumble, thx fgs@
2013-07-02 16:20:25 +00:00
espie
e9bba84c13
LIB_DEPENDS don't propagate
2013-07-02 08:09:43 +00:00
fgsch
89714f3705
Update mirrors list and move ftp.gnupg.org at the bottom
2013-03-31 19:12:37 +00:00
espie
eae66e4a7b
PERMIT_* / REGRESS->TEST sweep
2013-03-11 11:35:43 +00:00
sthen
f5a323c546
Don't use ${FLAVOR:L}, we only support lower-case flavours now.
...
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
bcallah
d38af15ac6
Fix an "elseif if ..." statement, allowing this to build on mips64*.
...
ok jasper@
2013-02-03 14:52:46 +00:00
sthen
872e4d2976
SECURITY update GnuPG to 1.4.13; earlier versions were vulnerable to memory
...
access violations and public keyring database corruption when importing
manipulated public keys. http://seclists.org/bugtraq/2012/Dec/151
Tweaked from a submission from David Hill.
2012-12-31 16:34:35 +00:00
landry
b1324216b8
Fix on hppa, broken since the PIE switch.
...
mpi/hppa1.1/udiv-qrnnd.S is not PIE-safe, let's use mpi/hppa/udiv-qrnnd.S
instead.
with kettenis@
2012-12-11 21:12:36 +00:00
landry
48209fe2c9
Regen patches
2012-12-11 20:47:45 +00:00
naddy
5e1bcbad44
The American/European/Japanese patents on IDEA have expired. Remove
...
the flavor and just include it by default. ok zinke@
2012-07-12 16:32:47 +00:00
espie
0322fed35a
properly re-conflict gpg1/2. Noticed by naddy@
...
okay ajacoutot@, pea@
2012-01-31 10:51:48 +00:00
ajacoutot
6973ee7fdc
Unbreak the "card" FLAVOR after the libusb->libusb-compat switch, spotted
...
by naddy@ (thanks).
2011-11-13 22:39:50 +00:00
espie
59fa199246
use PKGSPEC, every dependent port uses this
2010-11-26 07:50:07 +00:00
espie
6c283d7e98
new depends
2010-11-20 17:22:40 +00:00
espie
60f17a941b
more WANTLIB
2010-11-11 18:34:59 +00:00
pea
12acb9279b
Bugfixes update to 1.4.11
...
ok benoit@
2010-10-25 12:57:13 +00:00
espie
2ef1026971
USE_GROFF=Yes
2010-10-18 21:41:44 +00:00
jasper
2d4a122bfb
- reset maintainer, requested by reinhard@
2010-09-22 09:02:42 +00:00
pea
412b3e0b05
Avoid conflict with gnupg2. Like this you can install both in the same time.
...
ok aja@, jasper@
2010-07-08 17:01:57 +00:00
dhill
0533acdfff
update to 1.4.10.
...
From Pierre-Emmanuel André <pea@raveland.org>
OK reinhard@
2009-09-15 13:44:41 +00:00
jasper
275e22e63b
SECURITY UPDATE to gnupg 1.4.9
...
http://secunia.com/advisories/29568/
tested by many, thanks!
2008-04-03 10:13:00 +00:00
bernd
5e84793fd4
Update to gnupg-1.4.8. (GPLv3 now)
...
ok steven@
2008-01-30 20:18:09 +00:00
merdely
1997c75349
Remove surrounding quotes in NO_REGRESS/COMMENT*/PERMIT_*
...
From Darrin Chandler
2007-09-15 23:29:57 +00:00
naddy
a220ed62dc
chase wantlib changes after curl update
2007-05-15 15:09:12 +00:00
steven
66d8f55f87
update to 1.4.7
...
feedback and ok bernd@
2007-05-10 11:38:28 +00:00
espie
d4ebcd974d
more base64 checksums
2007-04-05 17:26:05 +00:00
steven
d540626c47
adjust another texinfo file so it does not leave entries behind.
...
rerun makesum while here.
from Moritz Grimm <mlist at scapa.dnsalias.net>
ok espie@
2007-02-22 00:17:09 +00:00
bernd
0435472660
Update to gnupg-1.4.6.
...
ok steven@
2007-01-16 09:50:36 +00:00
deanna
b750309ac5
Security fix:
...
remotely controllable function pointer [CVE-2006-6235]
from Werner Koch via fsf announce
ok steven
2006-12-06 23:11:58 +00:00
bernd
8ebe3474a5
Security fix for a buffer overflow when running gnupg in interactive mode.
...
More info:
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
2006-11-28 10:18:49 +00:00
bernd
f557a7e653
Security update to gnupg-1.4.5. (CVE-2006-3746)
...
This fixes a denial of service vulnerability.
For more information see:
http://secunia.com/advisories/21297/
http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html
okay espie@
2006-08-07 19:59:20 +00:00
espie
444cc3c520
new lib specs
2006-08-03 23:28:11 +00:00
bernd
044eebec20
Update to gnupg-1.4.4.
...
ok reinhard@ (MAINTAINER), "looks good" steven@
2006-07-13 13:11:28 +00:00
bernd
2cfe636d68
Security update! Fixes an integer overflow. (CVE-2006-3082)
...
Detailed information: http://secunia.com/advisories/20783/
Diff from gnupg CVS.
ok sturm@
2006-06-23 11:35:36 +00:00
bernd
edebdd2694
- Update to gnupg-1.4.3
...
- Add ldap FLAVOR
- Describe the FLAVORs in pkg/DESCR
ok steven@
2006-04-12 09:55:24 +00:00
steven
771e8d8886
security update to gnupg-1.4.2.2
...
from gnupg.org:
Signature verification of non-detached signatures may give a positive
result but when extracting the signed data, this data may be prepended
or appended with extra data not covered by the signature. Thus it is
possible for an attacker to take any signed message and inject extra
arbitrary data.
2006-03-10 20:57:50 +00:00
steven
04c4c5f7e5
security update to 1.4.2.1
...
The security issue is caused due to "gpgv" exiting with a return code
of 0 even if the detached signature file did not carry any signature.
This may result in certain scripts that use "gpgv" to conclude that
the signature is correctly verified.
More info: http://secunia.com/advisories/18845/
ok bernd@ pvalchev@
2006-02-22 12:30:52 +00:00
bernd
bcee2da2fc
Since we have swap encryption on OpenBSD, only warn about insecure
...
memory if swap encryption is disabled. (It's enabled by default.)
This supersedes pkg/MESSAGE.
Regen patches with update-patches while I'm here. Bump PKGNAME.
idea and ok espie@
2006-02-06 21:57:56 +00:00
sturm
4a1aae3a0f
sync MESSAGE with reality
...
from Antoine Jacoutot <ajacoutot at lphp.org>
maintainer timeout
2005-10-29 14:59:08 +00:00
martin
71d71fa971
don't build the homegrown assembler modules on m68k platforms
2005-05-17 15:08:34 +00:00
espie
84d7a482c5
minor dependency nits (make sure we don't pick libusb, and readline
...
now pulls in termcap and not ncurses)
2005-04-09 12:43:08 +00:00
robert
57c713e689
SECURITY:
...
update to 1.4.1; fix a openpgp protocol vulnerability
http://www.vuxml.org/openbsd/be6057f4-9ecf-11d9-82a1-00065bd5b0b6.html
2005-03-27 15:16:07 +00:00