4078 Commits

Author SHA1 Message Date
sthen
407eeca0ce Fix gpgme BUILD_DEPENDS to explicitly request gnupg 2.x (otherwise it also
matches 1.x).

Fix RUN_DEPENDS to allow either gnupg 1.x or 2.x (gpgme can use either version).

OK aja
2015-01-20 20:43:37 +00:00
sthen
86fd5c1df2 Patch PolarSSL for CVE-2015-1182.
An error during parsing of an ASN.1 sequence (triggerable during certificate
parsing) results in an uninitialized pointer being freed.

https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-04
2015-01-20 09:47:47 +00:00
jca
65c861cbc8 Respect DEBUG=-g and avoid using uninitialized mem. 2015-01-20 02:32:49 +00:00
jca
ef8d3b674e Working MASTER_SITES; .tgz -> .tar.gz; no checksum change 2015-01-20 02:25:30 +00:00
naddy
6dfe1e0668 <sys/socket.h> already exposes struct iovec, no need to include <sys/uio.h>.
Remove now useless (parts of) patches.
2015-01-19 20:44:14 +00:00
sthen
ec48beed94 /usr/include/crypto/des.h was removed as well as /usr/include/des.h 2015-01-18 11:57:22 +00:00
naddy
570aa62a9c Drop remaining MD5/RMD160/SHA1 checksums. 2015-01-18 03:12:39 +00:00
sthen
4b29221a87 add a patch from john-jumbo git to fix build on !amd64 2015-01-17 14:39:52 +00:00
sthen
ace0907db8 update to john-jumbo 1.80-1 2015-01-16 15:40:01 +00:00
sthen
b81fabeb17 adjust security/john-jumbo patches to avoid relying on des.h 2015-01-16 15:02:23 +00:00
sthen
8e3484b080 update to libsodium 1.0.2 2015-01-16 00:29:23 +00:00
bluhm
0b7f790fd0 update p5-IO-Socket-SSL to 2.010 2015-01-15 13:31:05 +00:00
bluhm
3bb9fcdeb9 update p5-IO-Socket-SSL to 2.009 2015-01-14 01:14:19 +00:00
jeremy
9fb556403e Build ruby 2.2 versions of ruby C extension gems by default 2015-01-10 17:35:05 +00:00
robert
bb798d1d9b adopt to new ssh-add -l and ssh-keygen -l format 2015-01-09 18:48:29 +00:00
sthen
a059c9ae72 update to openssl 1.0.1k 2015-01-09 18:36:32 +00:00
sthen
b3ea9f705a +p0f3 2015-01-08 22:03:42 +00:00
sthen
a77dd04035 import security/p0f3 (separate non-conflicting port to p0f as the rewrite uses
different database files than the earlier one / pf / tcpdump), ok giovanni@

P0f is a tool that utilizes an array of sophisticated, purely passive
traffic fingerprinting mechanisms to identify the players behind any
incidental TCP/IP communications (often as little as a single normal SYN)
without interfering in any way. Version 3 is a complete rewrite of the
original codebase, incorporating a significant number of improvements to
network-level fingerprinting, and introducing the ability to reason about
application-level payloads (e.g., HTTP).

The tool can be operated in the foreground or as a daemon, and offers a
simple real-time API (via unix domain sockets) for third-party components
that wish to obtain additional information about the actors they are
talking to.
2015-01-08 22:03:20 +00:00
sthen
7616a8de2b +p5-Chipcard-PCSC
+pcsc-tools
2015-01-08 15:09:28 +00:00
sthen
5160b5e435 import pcsc-tools, ok dcoppa@
This package contains tools used to test a PC/SC driver, card or reader.

- pcsc_scan regularly scans PC/SC readers connected to the host,
and displays information about any cards which are inserted.

- ATR_analysis is a Perl script used to parse the smart card ATR, and
can be called by pcsc_scan.

- scriptor is a Perl script to send commands to a smart card.

- gscriptor is a Perl script with a Gtk-based graphical interface.
(Install the p5-Gtk2 package to use this).
2015-01-08 15:08:53 +00:00
sthen
01fb4783d4 import p5-Chipcard-PCSC, ok dcoppa@
PC/SC represents an abstraction layer to smart card readers. It provides
a communication layer with a wide variety of smart card readers through
a standardized API.

This PCSC perl module implements the Chipcard::PCSC class. Objects of
this class are used to communicate with the PCSC-lite daemon (see pcscd(1)
for more information).

A PCSC object can be used to communicate with more than one reader
through Chipcard::PCSC::Card objects. Please read Chipcard::PCSC::Card
for extended information on how to talk to a smart card reader.
2015-01-08 15:05:53 +00:00
pea
43dcc6361f Update to 2.1.1
help and ok jca@
2015-01-08 09:06:19 +00:00
jca
1cbdc38d98 Update to gnupg-1.4.18 and take maintainership.
* fix regression in --recv-key {multiple keys}
* cap the sizes for automatic key generation

While here, delete unneeded do-test target.

"looks ok" sthen@, ok daniel@
2015-01-04 22:12:55 +00:00
jca
378c360fcf Switch from var/tmp to var/cache.
From Markus Lude, who also takes maintainership.
2015-01-03 18:36:53 +00:00
jca
fda0a0e5a9 Replace py-gnupg-0.3.2 with python-gnupg-0.3.7.
They offer similar functionality but their API isn't compatible.
GnuPGInterface-0.3.2 is unmaintained, unused in our tree and can go
away.  python-gnupg on the other hand could be used by other (future)
ports.

Similar submission from viq, as a brand new port.
ok dcoppa@
2015-01-02 20:12:47 +00:00
landry
e7df1f7194 Mark BROKEN-alpha a bunch of ports that reliably failed (!) to build in
the past 3 bulks, or forever.

Various reasons: no d^Hrecent compiler available, base gcc generating
nice internal compiler errors, no atomic ops, etc, etc.

While here, mark all webkits as BROKEN-hppa, since this also requires
clang or g++ 4.7. Our g++ 4.8 port only builds on
i386|amd64|powerpc|sparc64 anyway...

if you're interested^Wbored to death, full past logs at
http://build-failures.rhaalovely.net/alpha/...
2014-12-30 21:50:24 +00:00
kili
210c38c740 Mark as broken, because an update would require more new hs- ports
(hs-cipher-aes and hs-crypto-random), and I'm not sure wether all
those security/hs-* ports are safe to use anyways.
This also disables the build of depending ports hs-snap and
hs-clientsession.
2014-12-28 12:45:40 +00:00
sthen
f0efd17e1a patch yubiserve to handle yubikey OTPs in upper case (capslock) 2014-12-22 14:10:57 +00:00
sthen
fdf377fc72 add patches to yubiserve: use TLS not SSLv3, allow use of chain certificates 2014-12-22 13:22:39 +00:00
benoit
c4b5dbe8e5 Update to py-paramiko-1.15.2. 2014-12-20 07:52:32 +00:00
kili
b0a4a2c130 Fix plist and bump 2014-12-20 01:43:17 +00:00
kili
dc55ca6890 Fix plist and bump 2014-12-20 01:41:20 +00:00
bluhm
a3742b92d3 update p5-IO-Socket-SSL to 2.008 2014-12-19 17:45:10 +00:00
benoit
f646dc090d +p5-Digest-Perl-MD5
ok ajacoutot@ to import
2014-12-19 17:38:52 +00:00
benoit
d3ea90b22a Import p5-Digest-Perl-MD5.
Perl implementation of Ron Rivests MD5 Algorithm.
2014-12-19 17:35:02 +00:00
kili
58fe149d02 Update to hs-skein-1.0.9.2. 2014-12-18 21:13:21 +00:00
kili
f28deab4aa Update to hs-cryptohash-0.7.10. 2014-12-18 21:12:54 +00:00
kili
2c137114f1 Update plist and bump. 2014-12-18 21:12:12 +00:00
benoit
7514ef33e2 Update to p5-Crypt-SaltedHash-0.09.
remove maintainer, ok ajacoutot@
2014-12-18 09:03:30 +00:00
bluhm
bbfab972a6 Do not depend on net/p5-IO-Socket-IP. The module IO::Socket::IP
0.29 is included in Perl 5.20.1 and installed in base.  The port
will be removed soon.
OK giovanni@ nigel@
2014-12-17 00:15:24 +00:00
pea
d021d4e460 Update to 1.3.2
ok jasper@, jca@
2014-12-16 10:05:27 +00:00
kili
d7d28aaa83 Update to hs-crypto-api-0.13.2. 2014-12-15 20:19:37 +00:00
kili
6a8198db92 Fix plist and bump. 2014-12-15 16:02:14 +00:00
kili
e81b62f22f Fix plists and bump. 2014-12-15 15:14:34 +00:00
sthen
44779848c6 update to sslsplit 0.4.10 2014-12-12 21:51:59 +00:00
ajacoutot
86f0b4db19 Update to gnutls-3.2.21. 2014-12-12 07:05:59 +00:00
ajacoutot
2d6dc45b60 Only setup minimal MODHEIMDAL_WANTLIB. 2014-12-09 15:55:10 +00:00
landry
ffae1f351f bugfix update to nss 3.17.3
See https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes
Passes all regress tests on amd64.
2014-12-06 08:33:29 +00:00
bluhm
12f8662554 update p5-IO-Socket-SSL to 2.007 2014-12-03 22:39:15 +00:00
brad
b70345e22c Eliminate the use of the malloc.h header and/or replace
with stdlib.h.
2014-11-30 05:41:34 +00:00