5715 Commits

Author SHA1 Message Date
naddy
84174f9106 bump for package path change devel/gmp -> devel/gmp,-main 2018-11-02 18:48:39 +00:00
gonzalo
86c248fa6d Update for Lynis to 2.7.0 2018-11-01 14:22:42 +00:00
abieber
651dd0f257 Bump keybase to the latest.
OK gonzalo@
2018-10-30 13:56:10 +00:00
landry
10d2d3e679 Update to nss 3.40, required by gecko 64.
Cf https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.40_release_notes
2018-10-29 15:56:41 +00:00
ajacoutot
d9643a91ff Update to libgcrypt-1.8.4. 2018-10-27 16:12:26 +00:00
sthen
813d2e28fc drop php 7.0 and scaffolding, the default has already been switched to 7.1 2018-10-26 21:22:01 +00:00
jeremy
ecdd34f345 Bump related ports after default ruby version switch. 2018-10-26 16:16:24 +00:00
jsing
eb9f847d2c Get the MAC secret size from the TLS cipher, rather than reaching into
libssl internals. While here also take more of the OpenSSL 1.1 API code
paths.

ok tb@
2018-10-24 17:16:19 +00:00
sthen
25f0e460f2 Add COMPILER lines to c++ ports which currently use the default. Adjust
some existing COMPILER lines with arch restrictions etc. In the usual
case this is now using "COMPILER = base-clang ports-gcc base-gcc" on
ports with c++ libraries in WANTLIB.

This is basically intended to be a noop on architectures using clang
as the system compiler, but help with other architectures where we
currently have many ports knocked out due to building with an unsuitable
compiler -

- some ports require c++11/newer so the GCC version in base that is used
on these archirtectures is too old.

- some ports have conflicts where an executable is built with one compiler
(e.g. gcc from base) but a library dependency is built with a different
one (e.g. gcc from ports), resulted in mixing incompatible libraries in the
same address space.

devel/gmp is intentionally skipped as it's on the path to building gcc -
the c++ library there is unused in ports (and not built by default upstream)
so intending to disable building gmpcxx in a future commit.
2018-10-24 14:27:57 +00:00
bket
dcd987cf95 Update to easy-rsa-3.0.5.
This version adds support for LibreSSL. While here switch HOMEPAGE to
https.

OK sthen@
2018-10-24 11:23:12 +00:00
bluhm
e2328564b1 Get the MAC secret size from the cipher, rather than reaching into
libssl internals.  This effectively takes the OpenSSL 1.1 code path
instead of the OpenSSL 1.0 code path, and will allow for further
libssl clean up.
with and OK jsing@
2018-10-23 19:42:47 +00:00
jasper
ec6db39f19 update to libssh-0.8.4
this addresses https://www.libssh.org/security/advisories/CVE-2018-10933.txt

ok rpointel@ (MAINTAINER)
2018-10-23 19:28:18 +00:00
jasper
13eba78cb5 update to py-scp-0.12.1 2018-10-23 18:59:56 +00:00
rpointel
9e2504f291 update pdf-parser to 0.6.9. 2018-10-23 09:04:01 +00:00
rpointel
cee1334777 update oledump to 0.0.38. 2018-10-23 08:44:22 +00:00
bluhm
ad1c2e686a update botan2 to 2.8.0 2018-10-22 21:28:52 +00:00
ajacoutot
5585df027e Update to vault-0.11.3. 2018-10-20 12:58:46 +00:00
jasper
def7161c44 update to suricata-update-1.0.0rc2 2018-10-19 20:17:00 +00:00
rpointel
9379b9fb8d update theHarvester to 3.0. 2018-10-17 09:19:44 +00:00
rpointel
f336441a3b update sqlmap to 1.2.10.
ok gonzalo@.
2018-10-17 08:18:24 +00:00
rsadowski
d266dcbdcd disable git searching at build-time and add python as build only depend.
ok sthen
2018-10-16 17:51:53 +00:00
sthen
6dc86aa8fe update to p5-Crypt-OpenSSL-PKCS10-0.16 2018-10-16 13:59:46 +00:00
rsadowski
510c3abb4b fix pkg update process, add @pkgpath to security/gpgme
After dividing gpgme into -main and -qt I forgot to set @pkgpath in the -main
PLIST.

Issue noticed by Markus Lude. Thanks!

ok espie@
2018-10-09 13:40:51 +00:00
rsadowski
e9780f5bcf set COMPILER and -std=c++11; Unbreak sparc64 build
OK feinerer@ (maintainer)
2018-10-09 07:09:53 +00:00
ajacoutot
886400262d Needs python to build.
ok bket@
2018-10-08 11:58:07 +00:00
sthen
ba4275499f move to a gopass snapshot which unbreaks build following the go update.
runtime is flaky for me but ok robert@ who says it works for him
2018-10-06 16:33:51 +00:00
gonzalo
c4364d8ff2 Update for Lynis to 2.6.9
OK benoit@
2018-10-05 08:23:26 +00:00
sthen
be78d0efa1 security update to clamav-0.100.2 2018-10-03 22:05:57 +00:00
kn
5dab2b09f2 Add missing glib2 dependency
Spotted by aja, OK sthen
2018-10-02 20:30:07 +00:00
bket
274a0da46d Update to mbedtls-2.13.0.
libmbedtls requires a bump as a symbol has been removed (and new ones
have been added).

OK sthen@
2018-10-02 15:13:04 +00:00
denis
af75a41059 +ssss 2018-10-01 11:41:19 +00:00
denis
284e17db03 import ssss-0.5
ssss is an implementation of Shamir's Secret Sharing Scheme.

OK sthen@
With input from solene@ and sthen@
2018-10-01 11:39:44 +00:00
kn
b2bac2d5a3 Update to OpenSC-0.19
This release contains fixes for mutliple issues, ranging from stack based
buffer overflows to out of bounds reads and writes on the heap.  They can
be triggered by malicious smartcards sending malformed responses to APDU
commands. A detailed description can be found at X41-2018-002
<https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/>.

While here, replace hardcoded 0644 with ${NONBINMODE} and adjust the
default PKCS11 provider path to opensc-pkcs11.so so pkcs11-tool(1) works
without having to it pass it `--module' all the time.

OK sthen rsadowski
2018-09-29 11:19:16 +00:00
sthen
9a798e665c add php71/72 flavours for pecl-* ports 2018-09-28 22:24:24 +00:00
sthen
9e53e485ef replace hardcoded 7.0 with ${MODPHP_VERSION} 2018-09-28 21:22:39 +00:00
tb
d968a86225 Trivial update. This way it's easier to be sure we're up-to-date.
No change in the packaged .json files. Surprisingly, the
libcrypto/wycheproof tests still pass.

ok sthen
2018-09-28 15:08:13 +00:00
jsing
ca9f8eeac1 Update security/go-crypto for Go 1.11 release. 2018-09-23 17:22:13 +00:00
ajacoutot
a11425a6ab Fix memory leak with the Squid Kerberos authentication helper.
from Markus Moelle via Matthias Pitzl
2018-09-18 11:39:08 +00:00
pea
7bc2fcedab Update to 2.2.10
ok sthen@
2018-09-18 10:07:19 +00:00
bluhm
08d932d0b3 update p5-IO-Socket-SSL to 2.060 2018-09-17 14:14:29 +00:00
ajacoutot
ee3efe3b08 Use a specific version of security/py-rsa. 2018-09-17 08:52:39 +00:00
ajacoutot
65a1246b08 Update to vault-0.11.1. 2018-09-15 07:26:43 +00:00
sthen
9e8c5f919b update to xca-2.1.1 2018-09-14 16:02:37 +00:00
sthen
55915de896 +acme-client 2018-09-11 10:35:34 +00:00
sthen
a1085cb248 import ports/security/acme-client, the original version with a different
config style, which still has DNS-01.  ok landry@

---
acme-client is a client for the ACME protocol used by the Let's Encrypt CA.
It uses isolated processes for various operations - network code doesn't
have access to the filesystem, etc - this is enforced by pledge(2).

acme-client is present in the OpenBSD base system. This package is for the
original version, which uses a different configuration interface (CLI rather
than configuration file). It also supports the DNS-01 challenge type which
is not currently available in the version in the base system.

The executable is installed as "eacme-client".
---
2018-09-11 10:35:12 +00:00
sthen
36d9be75ed update to XCA 2.1.0
- the database format has changed from an internal format to sqlite3,
this is automatic but it's recommended to make an extra backup of old files
first.
2018-09-10 21:03:42 +00:00
bluhm
834461e45f +p5-Crypt-Curve25519
+p5-CryptX
2018-09-09 15:05:48 +00:00
bluhm
bf57ffa396 import p5-CryptX 0.061
from Charlene Wendling; OK bcallah@

Comment:
cryptographic toolkit for Perl

Description:
CryptX is a fairly comprehensive cryptographic toolkit that provides
a vast array of well-known symmetric, block, and stream ciphers,
authenticated encryption modes, hash functions, checksums, MAC,
public key cryptography, PRNG, and more.
2018-09-09 15:03:58 +00:00
bluhm
f57c47c69c import p5-Crypt-Curve25519 0.06
from Charlene Wendling; OK bcallah@

Comment:
generate shared secret using ECDH function

Description:
Crypt::Curve25519 is a state-of-the-art Diffie-Hellman function
suitable for a wide variety of applications.
Given a user's 32-byte secret key, Crypt::Curve25519 computes the
user's 32-byte public key. Given the user's 32-byte secret key and
another user's 32-byte public key, Crypt::Curve25519 computes a
32-byte secret shared by the two users. This secret can then be
used to authenticate and encrypt messages between the two users.
2018-09-09 14:18:08 +00:00
gsoares
5e283e5b33 update to 0.7
feedback,tweaks from sthen+danj thanks
OK sthen@
2018-09-08 17:21:14 +00:00