stsp
81bd87bb9b
+encfs
2014-01-17 13:30:49 +00:00
ajacoutot
ef0ba3806f
PERMIT_PACKAGE_CDROM is enough.
2014-01-17 10:16:07 +00:00
stsp
aa3120f1b6
Port of encfs, an encrypted filesystem based on FUSE and OpenSSL.
...
With lots of help and patches from syl@.
2014-01-17 10:10:58 +00:00
jasper
2198b4cff5
- update to clamav-0.98.1
...
ok sthen@ (MAINTAINER)
2014-01-15 13:06:47 +00:00
jeremy
7aa034e95f
Bump ruby gem ext ports after change to WANTLIB in ruby.port.mk
2014-01-15 02:13:57 +00:00
jeremy
5d15fd9555
Remove MODRUBY_WANTLIB_m use.
2014-01-15 02:03:53 +00:00
bluhm
f5c80ef1e8
- update p5-Net-SSLeay to 1.57
...
- fix strlen() size check bug, already commited upstream
2014-01-14 19:53:58 +00:00
bluhm
e9f8d8e632
update p5-IO-Socket-SSL to 1.963
2014-01-14 19:32:11 +00:00
dcoppa
f8f954088e
New homepage.
2014-01-13 09:03:21 +00:00
bluhm
df90e3589a
update p5-Net-SSLGlue to 1.051
2014-01-12 23:49:09 +00:00
benoit
279136c1b2
Update to py-paramiko 1.12.1.
2014-01-12 11:02:11 +00:00
jeremy
56a9cca512
Build ruby21-* packages for ruby gem ports with C extensions.
2014-01-11 22:56:03 +00:00
jeremy
dca4d5c9a8
Remove extension source directory from package so that ruby21 FLAVOR
...
packages.
2014-01-11 22:51:01 +00:00
sthen
f7363ec34c
update to yubikey-personalization-gui-3.1.14, minor gui fix to confirmation box
2014-01-11 14:39:45 +00:00
sthen
026133ccb7
minor update to yubikey-personalization-gui-3.1.13
2014-01-10 15:40:22 +00:00
landry
559f7b8b5e
Update to nss 3.15.4, needed by gecko 27.
...
Contains a fix for (CVE-2013-1740): When false start is enabled, libssl
will sometimes return unencrypted, unauthenticated data from PR_Recv
(https://bugzilla.mozilla.org/show_bug.cgi?id=919877 )
See https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.4_release_notes
2014-01-09 20:09:44 +00:00
sthen
83283f6689
missing @newgroup
2014-01-08 22:01:36 +00:00
ajacoutot
4cfe12ac54
Tweak comment; no pkg change.
2014-01-06 08:50:47 +00:00
jasper
4b16ae46ce
use ${MODPY_WANTLIB} and regen WANTLIB while here
2014-01-04 21:20:53 +00:00
ajacoutot
9e8850350e
Update to libgcrypt-1.6.0.
...
tested in a bulk by landry@, thanks.
2014-01-04 08:54:21 +00:00
gsoares
3bb2993c2f
missing RCS id.
2014-01-03 20:20:58 +00:00
ajacoutot
5c530d1205
Update to libtasn1-3.4.
2014-01-03 06:43:06 +00:00
ajacoutot
a545c8ff15
Fix HOMEPAGE.
2014-01-03 06:39:57 +00:00
naddy
611dc52f1c
Drop USE_GROFF since groff and mandoc produce identical output.
2014-01-01 20:46:27 +00:00
sthen
98d1a871be
update to yubikey-personalization-gui-3.1.12
2013-12-30 23:05:53 +00:00
brad
8ad08a32d3
Update to Botan 1.10.6.
...
ok sthen@
2013-12-24 14:39:56 +00:00
jca
2594d8a54c
Update to kc-2.3.2, from maintainer Levai Daniel. Drop the run-deps on
...
p5-HTML-Parser which is only needed to run the pwsafe converter, and
document that in the README. Remove redundant TEST_TARGET while here.
ok sthen@
2013-12-24 12:56:19 +00:00
ajacoutot
6a9cff9737
Update to gnutls-3.2.8.
2013-12-20 21:50:58 +00:00
pea
f444d84906
Security update to 1.4.16 (CVE-2013-4576)
...
ok jca@, brad@
2013-12-19 21:22:30 +00:00
sthen
5ba5552acd
update to Digest::HMAC 1.03, from david hill, ok maintainer
2013-12-18 12:31:58 +00:00
dcoppa
999f401f9b
Update to IO-Socket-SSL-1.962
...
OK bluhm@
2013-12-17 08:14:35 +00:00
dcoppa
7e762280c0
Update to dante-1.4.0
2013-12-12 14:11:36 +00:00
landry
575289e06c
SECURITY update to nss 3.15.3.1.
...
Bug 946351 - Misissued Google certificates from DCSSI
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.3.1_release_notes
2013-12-10 11:17:05 +00:00
ajacoutot
72e1ffed67
Update to gnutls-3.2.7.
2013-12-08 08:31:45 +00:00
naddy
1b01d564f5
Remove parse. Old cruft, doesn't seem to work on LP64, the port
...
hasn't been touched in its 13-year existence except for mechanical
changes. ok jca@, lteo@
2013-12-07 19:55:34 +00:00
naddy
c99e504674
remove -lcompat, which wasn't even needed
2013-12-06 19:32:53 +00:00
jca
b1043a15b0
Don't include <sys/timeb.h> (#ifdef _OpenBSD_ code).
2013-12-06 11:54:48 +00:00
jca
8dfc971e23
Regen patches.
2013-12-06 11:53:05 +00:00
jca
d7c2968222
Don't include <sys/timeb.h>.
2013-12-06 11:27:18 +00:00
dcoppa
9c43ceea81
Update to ccid-1.4.14
2013-12-06 06:35:34 +00:00
naddy
69c5b7d81d
code shared with unzip: timeb was already obsolete on 4.4BSD
2013-12-04 21:10:32 +00:00
espie
80546a87fd
remove redundancies with new filename{url}sufx scheme
2013-12-02 16:25:08 +00:00
jca
0c8e344795
Regen patches and distinfo.
2013-11-30 20:47:49 +00:00
jca
9a5947d8d9
#ifdefs to avoid using stty/gtty and including sgtty.h.
...
This removes the need for libcompat.
Remove USE_GROFF while here, as requested by naddy.
ok naddy@
2013-11-30 20:31:49 +00:00
sthen
7f88db390f
fix homepage, reported by Ross L Richardson
2013-11-29 11:47:09 +00:00
sthen
deb5eeeef9
+sslsplit
2013-11-28 16:49:37 +00:00
sthen
5ef763bbca
import ports/security/sslsplit, ok zhuk@
...
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS
encrypted network connections. Connections are transparently intercepted
through a firewall/network address translation engine and redirected to
SSLsplit.
SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to
the original destination address, while logging all data transmitted.
SSLsplit is intended to be useful for network forensics and penetration
testing.
SSLsplit supports plain TCP, plain SSL, HTTP and HTTPS connections over
both IPv4 and IPv6. For SSL and HTTPS connections, SSLsplit generates
and signs forged X509v3 certificates on-the-fly, based on the original
server certificate subject DN and subjectAltName extension. SSLsplit
fully supports Server Name Indication (SNI) and is able to work with
RSA, DSA and ECDSA keys and DHE and ECDHE cipher suites. SSLsplit can
also use existing certificates of which the private key is available,
instead of generating forged ones. SSLsplit supports NULL-prefix CN
certificates and can deny OCSP requests in a generic way. SSLsplit
removes HPKP response headers in order to prevent public key pinning.
2013-11-28 16:49:10 +00:00
kirby
3034c5092d
- switch to new MASTER_SITES and DISTFILE
...
- correct license
- documentation cleanup
- switch from MESSAGE to README
OK sthen@
2013-11-28 10:54:09 +00:00
sthen
c4b331405d
no point patching a file that is already in ${FILESDIR}
2013-11-26 19:46:52 +00:00
sthen
ed380335ee
include if_var.h to unbreak
2013-11-25 22:23:18 +00:00