7557 Commits

Author SHA1 Message Date
abieber
2032874c53 Update ogvt to 1.2.0.
This update switches to a maintained pgp lib.
2022-01-19 12:49:20 +00:00
ajacoutot
7faab3f459 SECURITY update to gnutls-3.7.3. 2022-01-19 12:23:35 +00:00
kirby
4e77296295 update to qtkeychain-0.13.2 2022-01-19 07:39:01 +00:00
ajacoutot
4de21385fc Update to p11-kit-0.24.1. 2022-01-18 10:58:10 +00:00
gonzalo
aeecfaa73e Update for Sn0nit to 0.24.1
OK bcallah@
2022-01-18 09:06:52 +00:00
kmos
ac75d35bdb The pinentry -gnome multipackage fails wanting C++11 on sparc64
C++ should be using ports-gcc anyway. Update it to do so to fix
build on sparc64
2022-01-17 21:31:17 +00:00
tb
3183c91487 security/tcltls: mark broken. This port wasn't updated in 11 years and
hasn't seen a lot of maintenance. An update to 1.7.22 should be easy but
someone has to look into the numerous test failures. Apparently, some of
the dependent ports won't work with newer tcltls.

ok phessler
2022-01-17 08:31:33 +00:00
tb
5b35fa9a6f security/pivy: mark broken. This port includes OpenSSH source from before
the conversion to OpenSSL 1.1 API (Sep 2018). The most recent libcrypto
bump broke its build. Independently of that: that source needs updating
by upstream.

ok phessler
2022-01-17 08:23:08 +00:00
kmos
1a0cfd8f52 Fix build on sparc64 by switching to base-clang ports-gcc 2022-01-16 20:17:54 +00:00
kmos
475038a82e aircrack-ng uses C99. Fix build on sparc64 with the usual c99 fix 2022-01-16 09:24:09 +00:00
kmos
e2a79c221b C++ needs ports-gcc not base-gcc 2022-01-15 21:46:51 +00:00
kn
73a63805e4 link to upstream pull request 2022-01-15 21:40:52 +00:00
tb
bef5b13a94 p5-Net-SSLeay: reinstate the build fixes that were lost in the update.
ok aja
2022-01-15 12:03:04 +00:00
bluhm
e5aad1ab02 update p5-Net-SSLeay to 1.92 2022-01-14 19:58:46 +00:00
tb
25007e7697 py-cryptography: fix build with opaque structs in LibreSSL 3.5 and
adjust tests that test for absence of features we now provide.
2022-01-14 10:59:10 +00:00
tb
28c1275b8a openssl-ruby-tests: use PEM_write_bio_PrivateKey_traditional instead
of reaching into an EVP_PKEY.
2022-01-14 10:57:39 +00:00
tb
1f887f6c0d security/ikeman: fix build with opaque structs in LibreSSL 3.5.
We should probably consider removing this port.

no response from maintainer
2022-01-14 10:56:10 +00:00
sthen
9fa009b143 update to py3-josepy-1.12.0 2022-01-13 17:57:18 +00:00
sthen
6c51e87ae2 update to clamav-0.104.2 2022-01-13 17:47:59 +00:00
bluhm
a58d6439ad On OpenBSD i386 Botan dies with illegal instruction when using AVX2
extensions.  Our kernel does not set the OSXSAVE flag, so Botan
must not use them.  Cherry-pick fix from upstream.
2022-01-13 17:16:58 +00:00
ajacoutot
c9436280b6 Add a no_qt5 PSEUDO_FLAVOR (suggested by sthen@).
Add support for caps-lock warning in the -qt5 subpackage while here.
2022-01-13 14:43:49 +00:00
ajacoutot
48f41bb4c7 Update to pinentry-1.2.0.
Drop -gtk2 subpackage and add a -qt5 one.

ok sthen@ pea@ (maintainer)
2022-01-13 14:12:37 +00:00
tb
3269717130 Update ssh-ldap-helper to 8.0p1
This is the latest version of this tool, based on what Rocky Linux ships.
Red Hat have deprecated this, but their proposed alternative, SSSD is not
currently viable.

The update is ncessary since the previous version (which wasn't updated
since import in 2012) is based on an ancient SSH version that isn't ready
for opaque libcrypto structs.

Untested, but this has a better chance at working than a package that
doesn't build.

ok landry
2022-01-13 09:49:55 +00:00
sebastia
53d2df46ac update 0.0.2 -> 0.0.3 2022-01-12 10:17:13 +00:00
bluhm
09b56d3ebc As LibreSSL defines TLS1_3_VERSION now, IO::Socket::SSL can disable
protocol version TLSv1_3 if needed.  The hack in the test to set
version TLSv1_2 explicitly is no longer necessary.
2022-01-11 13:19:58 +00:00
ajacoutot
4b3ad8b2fa Don't pick up cbindgen. 2022-01-11 12:38:49 +00:00
daniel
eb9950c587 minor tweaks for cyrus-sasl
- update MASTER_SITES as the previous ones no longer work
- use sasl HOMEPAGE instead of HOMEPAGE for the related imapd project
- regen PLIST

ok ajacoutot@ (MAINTAINER)
2022-01-10 23:58:49 +00:00
tb
ec03bd48d8 security/p5-Net-SSLeay: Prepare for upcoming libcrypto bump.
Change the RSA_generate_key() implemenation to the OpenSSL 1.1 API
(it will work with LibreSSL >= 2.7) and adjust a few #ifdefs for
opaque structs in ocsp.h.

ok bluhm (maintainer)
2022-01-10 21:46:20 +00:00
bluhm
f88760c9c1 update p5-IO-Socket-SSL to 2.074 2022-01-10 18:44:58 +00:00
landry
0fa8d09e53 security/nss: update to 3.74, will be required by gecko 97
see https://hg.mozilla.org/projects/nss/file/tip/doc/rst/releases/nss_3_74.rst

remove patches merged upstream (clang 13 compat fix)
2022-01-10 08:22:06 +00:00
bket
4376840f01 Update to mbedtls-2.16.12
Changes: https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12

Tested by martijn@. OK martijn@, tb@
2022-01-08 17:30:38 +00:00
pvk
40932bb3c8 Update vault 1.9.1 -> 1.9.2
Changelog: https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#192
Take maintainership, ok ajacoutot@
2022-01-08 16:18:47 +00:00
sthen
897de5b6bb yubikey-manager: set max version in RDEP for py-fido2 2022-01-07 11:27:26 +00:00
sebastia
9d6ab92634 update to 2022-01-06 2022-01-06 21:26:12 +00:00
jeremy
dbe49dcb07 Build ruby31 versions of gem ext ports by default 2022-01-06 19:06:17 +00:00
tb
1fc1df58c6 Updte tlsfuzzer to 20220105 2022-01-06 13:44:44 +00:00
tb
a08ec7de99 Update to openssl-ruby-tests 20220105
This removes one expected failure after jeremy pushed an acceptable
workaround upstream.
2022-01-06 13:35:55 +00:00
sebastia
17d4a8251d simple update 3.8.18 -> 3.8.20
while there, remove
MODRUBY_REV =  2.7
to switch to default ruby30 FLAVOR
2022-01-04 06:40:17 +00:00
sebastia
63a0be1d42 simple update 0.13.5 -> 0.13.6
while there, switch to ruby30 FLAVOR
2022-01-04 06:38:19 +00:00
sebastia
9dceb8250b simple update 6.2.4 -> 6.2.5 2022-01-02 18:27:25 +00:00
tb
83643a331d Update to openssl-ruby-tests 20211224 2022-01-01 12:10:14 +00:00
ajacoutot
16c4effae8 Update to py3-keyring-23.4.0. 2021-12-30 16:42:59 +00:00
ajacoutot
971a26ec0c Update to kpcli-3.6. 2021-12-29 22:31:52 +00:00
jca
6dc5ffc195 Unbreak on aarch64: don't use -Wa,-march=all
-march=all isn't supported by clang, and it now crashes with llvm 13.
Fix snatched from the FreeBSD bugtracker.

Tested by phessler@, ok phessler@ ajacoutot@ (maintainer)
2021-12-27 19:22:48 +00:00
jturner
0b78874fc4 Update spiped to 1.6.2 2021-12-25 19:58:58 +00:00
sthen
5b1c2ed339 update to py3-requests-aws4auth-1.1.1 2021-12-23 12:05:41 +00:00
sthen
f64a39a836 update to sslscan-2.0.11 2021-12-22 22:53:40 +00:00
bluhm
2072eaf210 update p5-Module-Signature to 0.88 2021-12-21 17:46:49 +00:00
gonzalo
5db7dc18e3 Update for Suricata to 6.0.4
OK rsadoski@ (test also by Yifei Zhan thanks!)
2021-12-21 11:01:07 +00:00
lteo
6c03023488 Bump Ghidra's log4j jar files to 2.17.0 which addresses CVE-2021-45105 2021-12-19 03:36:25 +00:00