3664 Commits

Author SHA1 Message Date
stsp
81bd87bb9b +encfs 2014-01-17 13:30:49 +00:00
ajacoutot
ef0ba3806f PERMIT_PACKAGE_CDROM is enough. 2014-01-17 10:16:07 +00:00
stsp
aa3120f1b6 Port of encfs, an encrypted filesystem based on FUSE and OpenSSL.
With lots of help and patches from syl@.
2014-01-17 10:10:58 +00:00
jasper
2198b4cff5 - update to clamav-0.98.1
ok sthen@ (MAINTAINER)
2014-01-15 13:06:47 +00:00
jeremy
7aa034e95f Bump ruby gem ext ports after change to WANTLIB in ruby.port.mk 2014-01-15 02:13:57 +00:00
jeremy
5d15fd9555 Remove MODRUBY_WANTLIB_m use. 2014-01-15 02:03:53 +00:00
bluhm
f5c80ef1e8 - update p5-Net-SSLeay to 1.57
- fix strlen() size check bug, already commited upstream
2014-01-14 19:53:58 +00:00
bluhm
e9f8d8e632 update p5-IO-Socket-SSL to 1.963 2014-01-14 19:32:11 +00:00
dcoppa
f8f954088e New homepage. 2014-01-13 09:03:21 +00:00
bluhm
df90e3589a update p5-Net-SSLGlue to 1.051 2014-01-12 23:49:09 +00:00
benoit
279136c1b2 Update to py-paramiko 1.12.1. 2014-01-12 11:02:11 +00:00
jeremy
56a9cca512 Build ruby21-* packages for ruby gem ports with C extensions. 2014-01-11 22:56:03 +00:00
jeremy
dca4d5c9a8 Remove extension source directory from package so that ruby21 FLAVOR
packages.
2014-01-11 22:51:01 +00:00
sthen
f7363ec34c update to yubikey-personalization-gui-3.1.14, minor gui fix to confirmation box 2014-01-11 14:39:45 +00:00
sthen
026133ccb7 minor update to yubikey-personalization-gui-3.1.13 2014-01-10 15:40:22 +00:00
landry
559f7b8b5e Update to nss 3.15.4, needed by gecko 27.
Contains a fix for (CVE-2013-1740): When false start is enabled, libssl
will sometimes return unencrypted, unauthenticated data from PR_Recv
(https://bugzilla.mozilla.org/show_bug.cgi?id=919877)

See https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.4_release_notes
2014-01-09 20:09:44 +00:00
sthen
83283f6689 missing @newgroup 2014-01-08 22:01:36 +00:00
ajacoutot
4cfe12ac54 Tweak comment; no pkg change. 2014-01-06 08:50:47 +00:00
jasper
4b16ae46ce use ${MODPY_WANTLIB} and regen WANTLIB while here 2014-01-04 21:20:53 +00:00
ajacoutot
9e8850350e Update to libgcrypt-1.6.0.
tested in a bulk by landry@, thanks.
2014-01-04 08:54:21 +00:00
gsoares
3bb2993c2f missing RCS id. 2014-01-03 20:20:58 +00:00
ajacoutot
5c530d1205 Update to libtasn1-3.4. 2014-01-03 06:43:06 +00:00
ajacoutot
a545c8ff15 Fix HOMEPAGE. 2014-01-03 06:39:57 +00:00
naddy
611dc52f1c Drop USE_GROFF since groff and mandoc produce identical output. 2014-01-01 20:46:27 +00:00
sthen
98d1a871be update to yubikey-personalization-gui-3.1.12 2013-12-30 23:05:53 +00:00
brad
8ad08a32d3 Update to Botan 1.10.6.
ok sthen@
2013-12-24 14:39:56 +00:00
jca
2594d8a54c Update to kc-2.3.2, from maintainer Levai Daniel. Drop the run-deps on
p5-HTML-Parser which is only needed to run the pwsafe converter, and
document that in the README.  Remove redundant TEST_TARGET while here.
ok sthen@
2013-12-24 12:56:19 +00:00
ajacoutot
6a9cff9737 Update to gnutls-3.2.8. 2013-12-20 21:50:58 +00:00
pea
f444d84906 Security update to 1.4.16 (CVE-2013-4576)
ok jca@, brad@
2013-12-19 21:22:30 +00:00
sthen
5ba5552acd update to Digest::HMAC 1.03, from david hill, ok maintainer 2013-12-18 12:31:58 +00:00
dcoppa
999f401f9b Update to IO-Socket-SSL-1.962
OK bluhm@
2013-12-17 08:14:35 +00:00
dcoppa
7e762280c0 Update to dante-1.4.0 2013-12-12 14:11:36 +00:00
landry
575289e06c SECURITY update to nss 3.15.3.1.
Bug 946351 - Misissued Google certificates from DCSSI
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.3.1_release_notes
2013-12-10 11:17:05 +00:00
ajacoutot
72e1ffed67 Update to gnutls-3.2.7. 2013-12-08 08:31:45 +00:00
naddy
1b01d564f5 Remove parse. Old cruft, doesn't seem to work on LP64, the port
hasn't been touched in its 13-year existence except for mechanical
changes.  ok jca@, lteo@
2013-12-07 19:55:34 +00:00
naddy
c99e504674 remove -lcompat, which wasn't even needed 2013-12-06 19:32:53 +00:00
jca
b1043a15b0 Don't include <sys/timeb.h> (#ifdef _OpenBSD_ code). 2013-12-06 11:54:48 +00:00
jca
8dfc971e23 Regen patches. 2013-12-06 11:53:05 +00:00
jca
d7c2968222 Don't include <sys/timeb.h>. 2013-12-06 11:27:18 +00:00
dcoppa
9c43ceea81 Update to ccid-1.4.14 2013-12-06 06:35:34 +00:00
naddy
69c5b7d81d code shared with unzip: timeb was already obsolete on 4.4BSD 2013-12-04 21:10:32 +00:00
espie
80546a87fd remove redundancies with new filename{url}sufx scheme 2013-12-02 16:25:08 +00:00
jca
0c8e344795 Regen patches and distinfo. 2013-11-30 20:47:49 +00:00
jca
9a5947d8d9 #ifdefs to avoid using stty/gtty and including sgtty.h.
This removes the need for libcompat.
Remove USE_GROFF while here, as requested by naddy.
ok naddy@
2013-11-30 20:31:49 +00:00
sthen
7f88db390f fix homepage, reported by Ross L Richardson 2013-11-29 11:47:09 +00:00
sthen
deb5eeeef9 +sslsplit 2013-11-28 16:49:37 +00:00
sthen
5ef763bbca import ports/security/sslsplit, ok zhuk@
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS
encrypted network connections. Connections are transparently intercepted
through a firewall/network address translation engine and redirected to
SSLsplit.

SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to
the original destination address, while logging all data transmitted.
SSLsplit is intended to be useful for network forensics and penetration
testing.

SSLsplit supports plain TCP, plain SSL, HTTP and HTTPS connections over
both IPv4 and IPv6. For SSL and HTTPS connections, SSLsplit generates
and signs forged X509v3 certificates on-the-fly, based on the original
server certificate subject DN and subjectAltName extension. SSLsplit
fully supports Server Name Indication (SNI) and is able to work with
RSA, DSA and ECDSA keys and DHE and ECDHE cipher suites. SSLsplit can
also use existing certificates of which the private key is available,
instead of generating forged ones. SSLsplit supports NULL-prefix CN
certificates and can deny OCSP requests in a generic way. SSLsplit
removes HPKP response headers in order to prevent public key pinning.
2013-11-28 16:49:10 +00:00
kirby
3034c5092d - switch to new MASTER_SITES and DISTFILE
- correct license
 - documentation cleanup
 - switch from MESSAGE to README
OK sthen@
2013-11-28 10:54:09 +00:00
sthen
c4b331405d no point patching a file that is already in ${FILESDIR} 2013-11-26 19:46:52 +00:00
sthen
ed380335ee include if_var.h to unbreak 2013-11-25 22:23:18 +00:00