DIRB is a Web Content Scanner. It looks for hidden Web Objects. It
basically works by launching a dictionary based attack against a web
server and analizing the response. DIRB main purpose is to help in web
application auditing.
ok rpointel@ a while ago
to match the visibility of max_align_t between C and C++.
GCC 4.9 defaults to C89 and does not accept the "restrict" keyword
by default. This causes a configure check to add -std=gnu99 to the
compiler flags. Since max_align_t is from C11, the -std=gnu99 flag
removes it from visibility and gnutls's copy of gnulib then provides
its own replacement definition of max_align_t. When gnutls builds
its C++ library, the C++ visibility rules are different. The
max_align_t from stddef.h reappears and collides with the gnulib
replacement.
some existing COMPILER lines with arch restrictions etc. In the usual
case this is now using "COMPILER = base-clang ports-gcc base-gcc" on
ports with c++ libraries in WANTLIB.
This is basically intended to be a noop on architectures using clang
as the system compiler, but help with other architectures where we
currently have many ports knocked out due to building with an unsuitable
compiler -
- some ports require c++11/newer so the GCC version in base that is used
on these archirtectures is too old.
- some ports have conflicts where an executable is built with one compiler
(e.g. gcc from base) but a library dependency is built with a different
one (e.g. gcc from ports), resulted in mixing incompatible libraries in the
same address space.
devel/gmp is intentionally skipped as it's on the path to building gcc -
the c++ library there is unused in ports (and not built by default upstream)
so intending to disable building gmpcxx in a future commit.
libssl internals. This effectively takes the OpenSSL 1.1 code path
instead of the OpenSSL 1.0 code path, and will allow for further
libssl clean up.
with and OK jsing@
This release contains fixes for mutliple issues, ranging from stack based
buffer overflows to out of bounds reads and writes on the heap. They can
be triggered by malicious smartcards sending malformed responses to APDU
commands. A detailed description can be found at X41-2018-002
<https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/>.
While here, replace hardcoded 0644 with ${NONBINMODE} and adjust the
default PKCS11 provider path to opensc-pkcs11.so so pkcs11-tool(1) works
without having to it pass it `--module' all the time.
OK sthen rsadowski