4735 Commits

Author SHA1 Message Date
sthen
75aae4b81c update to certbot/py-acme 0.9.3 2016-10-14 09:46:14 +00:00
sthen
505d6b2e34 update to certbot/py-acme 0.9.2 2016-10-13 10:09:28 +00:00
jca
d14e3b6cba Standard Makefile layout
ok gsoares@ (maintainer)
2016-10-11 18:36:13 +00:00
jca
3b5dd38d45 Use standard Makefile layout 2016-10-11 15:53:26 +00:00
sthen
b51d53f1c2 update to certbot/py-acme 0.9.1
add a little script to client/files/ for people wanting to move to acme-client
and retain their old key
2016-10-11 15:06:41 +00:00
sthen
a3fbf38e5e update to py-bcrypt-3.1.1 2016-10-11 13:57:08 +00:00
sthen
79acd5b98c update to py-cryptography-1.5.2 2016-10-11 11:34:50 +00:00
ajacoutot
071697cc73 Split sqlite3 support into its own FLAVOR. 2016-10-10 12:25:20 +00:00
ajacoutot
2501d05c80 Update to gnutls-3.4.16. 2016-10-10 08:15:05 +00:00
dcoppa
89ae065d97 Update to wpa_supplicant-2.6
Tested by pascal@ and Laurence Tratt
feedback by sthen@
2016-10-07 14:44:03 +00:00
bluhm
c7ab72deac update p5-IO-Socket-SSL to 2.038 2016-10-06 16:49:31 +00:00
landry
fc050c27fc Update to nss 3.27, required by gecko 50.
See
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.27_release_notes

Note that a bunch of CA's were removed, but not WoSign, because it owns
StartSSL/StartCOM.. see
https://docs.google.com/document/d/1C6BlmbeQfn4a9zydVi2UvjBGv6szuSB4sMYUcVrR8vQ/preview
and https://wiki.mozilla.org/CA:WoSign_Issues for details. Anyway, we
know the CA model is broken, right ?

Bump major, functions added/removed...
2016-10-06 12:10:22 +00:00
ajacoutot
eb91596e0c Update to libnettle-3.3. 2016-10-03 08:00:46 +00:00
danj
8508022c61 Update to py-oauthlib-2.0.0
From Johan Huldtgren (maintainer)
2016-10-01 15:20:08 +00:00
naddy
893e631df0 rename MASTER_SITES_GNUPG to MASTER_SITE_GNUPG, like all the others 2016-10-01 13:56:26 +00:00
naddy
c326edce1b The ${PROJECT}.googlecode.com/files/ master sites are no longer
accessible, but the distfiles are still available at an archive URL.
Introduce MASTER_SITE_GOOGLECODE and use it for all affected ports.

ok czarkoff@ danj@ sthen@
2016-10-01 11:54:14 +00:00
dcoppa
dcd5c5b478 Merge "allow building against libressl" (upstream git commit
7b9bd6003082a60bbc4452f048ca8a7b839025f1), and remove local workaround.
2016-09-30 13:48:38 +00:00
dcoppa
836c27bc19 Update to ccid-1.4.25 2016-09-30 13:32:19 +00:00
jca
be8a942bfb Drop the gettext module from gnupg.org ports 2016-09-28 19:33:37 +00:00
sthen
3994a363bf update to OpenSSL 1.0.2j, "A bug fix which included a CRL sanity check
was added to OpenSSL 1.1.0 but was omitted from OpenSSL 1.0.2i. As a
result any attempt to use CRLs in OpenSSL 1.0.2i will crash with a null
pointer exception."

(not moved to 1.1.0 yet, so today's critical fix for CVE-2016-6309
doesn't apply).
2016-09-26 11:11:42 +00:00
sthen
647777dd4b gnupg2 needs a LIB_DEPENDS on databases/sqlite3, missed in previous run because
this didn't start pulling in sqlite until the 2.1.15 update.
2016-09-24 07:32:32 +00:00
sthen
564c6c344a Cope with moving sqlite3 back to ports. 2016-09-23 09:16:52 +00:00
sthen
b8ae22262a security update to OpenSSL 1.0.2i
major library bump because dtls1_clear_record_buffer() was removed
2016-09-22 21:18:06 +00:00
millert
053fb64160 Update to sudo 1.8.18 2016-09-21 12:31:34 +00:00
sthen
6ad8220f49 update to dropbear-2016.74, fixes include a format string vulnerability
(CVE-2016-7406) and a problem importing malicious OpenSSH keys (CVE-2016-7407)
both of which could result in arbitrary code running as root in some conditions
(though the worst one requires usernames including '%' which is uncommon with
OpenBSD as adduser and useradd reject this, however it is possible by editing
the password file directly). See https://matt.ucc.asn.au/dropbear/CHANGES for
more details.
2016-09-21 10:06:27 +00:00
dcoppa
5a16d3f4a1 Fix the pkg-config file 2016-09-20 12:56:15 +00:00
edd
5ccdccbeca Update gpa to 0.9.9.
OK jca@
2016-09-19 17:20:05 +00:00
edd
8d00cb2bec Update pinentry to 0.9.7.
OK jca@
2016-09-19 17:16:32 +00:00
edd
781bdc3db0 Update gpgme to 1.6.0.
OK jca@
2016-09-19 17:13:55 +00:00
edd
bd8ed90e4f Update gnupg2 to 2.1.15.
OK jca@
2016-09-19 17:09:37 +00:00
edd
b9bf394999 Update libksba to 1.3.5.
OK jca@
2016-09-19 17:04:55 +00:00
edd
4e16a349e5 Update libassuan to 2.4.3.
OK jca@
2016-09-19 17:02:15 +00:00
abieber
908cf6c9de Fix build on i386 (found by sthen@). I will push upstream as well.
OK jasper@
2016-09-19 14:39:35 +00:00
ajacoutot
678b518015 Update to py-libnacl-1.5.0. 2016-09-17 12:02:36 +00:00
bluhm
658d713966 update p5-Module-Signature to 0.81 2016-09-15 22:03:36 +00:00
abieber
c748f37d09 + keybase 2016-09-14 23:47:01 +00:00
rpointel
7c3ec1d04f update yara to 3.5.0.
ok benoit@.
2016-09-14 20:40:53 +00:00
naddy
bac38152ca replace libiconv module 2016-09-13 18:52:05 +00:00
naddy
3fddca680e replace libiconv module 2016-09-12 20:58:39 +00:00
naddy
03993be59c replace libiconv module 2016-09-12 11:45:57 +00:00
ajacoutot
5558c792d3 First pass at pre-entively fixing ports that would break once guenther's header
pollution diff is in.

lang/squeak/vm does not build but it's due to the recent audio changes
games/xbattle: also fixes some conflicting implicit decl
print/hplip: also fixes some conflicting implicit decl
2016-09-10 13:03:40 +00:00
dcoppa
83041725ac Make pkcs15-tool --dump object formatting consistent
(upstream git commit 678f2bb1a65e5848dffc995f63e81d1f8092352f)
2016-09-09 14:57:33 +00:00
abieber
3c81e423f5 Import keybase client, a command line tool for working with keybase.io!
OK awolk@, suggestions from edd@
2016-09-09 14:11:43 +00:00
ajacoutot
c39ebfbe30 SECURITY update to gnutls-3.4.15.
- GnuTLS-SA-2016-3
- http://lists.gnutls.org/pipermail/gnutls-devel/2016-September/008146.html
2016-09-09 07:24:48 +00:00
rpointel
e8861f9a1a small update to 1.7.06 2016-09-09 05:31:39 +00:00
sthen
fb5f44b13f WANTLIB+=pthread for libsodium, pointed out by nigel@ 2016-09-06 11:43:12 +00:00
sthen
24986b5799 update to py-cryptography 1.4 2016-09-04 17:49:06 +00:00
landry
1c7255b5eb Update to nss 3.26.
See
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.26_release_notes,
notables changes:

- the letsencrypt CA (ISRG Root X1) root certificate was added
- NPN is disabled and ALPN is enabled by default
2016-09-04 08:55:13 +00:00
sthen
7493a8abae update to oath-toolkit-2.6.2 2016-09-03 14:23:38 +00:00
sthen
d01c5964a3 update to xmlsec-1.2.22 2016-09-03 14:23:37 +00:00