espie
59fa199246
use PKGSPEC, every dependent port uses this
2010-11-26 07:50:07 +00:00
espie
6c283d7e98
new depends
2010-11-20 17:22:40 +00:00
espie
60f17a941b
more WANTLIB
2010-11-11 18:34:59 +00:00
pea
12acb9279b
Bugfixes update to 1.4.11
...
ok benoit@
2010-10-25 12:57:13 +00:00
espie
2ef1026971
USE_GROFF=Yes
2010-10-18 21:41:44 +00:00
jasper
2d4a122bfb
- reset maintainer, requested by reinhard@
2010-09-22 09:02:42 +00:00
pea
412b3e0b05
Avoid conflict with gnupg2. Like this you can install both in the same time.
...
ok aja@, jasper@
2010-07-08 17:01:57 +00:00
dhill
0533acdfff
update to 1.4.10.
...
From Pierre-Emmanuel André <pea@raveland.org>
OK reinhard@
2009-09-15 13:44:41 +00:00
jasper
275e22e63b
SECURITY UPDATE to gnupg 1.4.9
...
http://secunia.com/advisories/29568/
tested by many, thanks!
2008-04-03 10:13:00 +00:00
bernd
5e84793fd4
Update to gnupg-1.4.8. (GPLv3 now)
...
ok steven@
2008-01-30 20:18:09 +00:00
merdely
1997c75349
Remove surrounding quotes in NO_REGRESS/COMMENT*/PERMIT_*
...
From Darrin Chandler
2007-09-15 23:29:57 +00:00
naddy
a220ed62dc
chase wantlib changes after curl update
2007-05-15 15:09:12 +00:00
steven
66d8f55f87
update to 1.4.7
...
feedback and ok bernd@
2007-05-10 11:38:28 +00:00
espie
d4ebcd974d
more base64 checksums
2007-04-05 17:26:05 +00:00
steven
d540626c47
adjust another texinfo file so it does not leave entries behind.
...
rerun makesum while here.
from Moritz Grimm <mlist at scapa.dnsalias.net>
ok espie@
2007-02-22 00:17:09 +00:00
bernd
0435472660
Update to gnupg-1.4.6.
...
ok steven@
2007-01-16 09:50:36 +00:00
deanna
b750309ac5
Security fix:
...
remotely controllable function pointer [CVE-2006-6235]
from Werner Koch via fsf announce
ok steven
2006-12-06 23:11:58 +00:00
bernd
8ebe3474a5
Security fix for a buffer overflow when running gnupg in interactive mode.
...
More info:
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
2006-11-28 10:18:49 +00:00
bernd
f557a7e653
Security update to gnupg-1.4.5. (CVE-2006-3746)
...
This fixes a denial of service vulnerability.
For more information see:
http://secunia.com/advisories/21297/
http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html
okay espie@
2006-08-07 19:59:20 +00:00
espie
444cc3c520
new lib specs
2006-08-03 23:28:11 +00:00
bernd
044eebec20
Update to gnupg-1.4.4.
...
ok reinhard@ (MAINTAINER), "looks good" steven@
2006-07-13 13:11:28 +00:00
bernd
2cfe636d68
Security update! Fixes an integer overflow. (CVE-2006-3082)
...
Detailed information: http://secunia.com/advisories/20783/
Diff from gnupg CVS.
ok sturm@
2006-06-23 11:35:36 +00:00
bernd
edebdd2694
- Update to gnupg-1.4.3
...
- Add ldap FLAVOR
- Describe the FLAVORs in pkg/DESCR
ok steven@
2006-04-12 09:55:24 +00:00
steven
771e8d8886
security update to gnupg-1.4.2.2
...
from gnupg.org:
Signature verification of non-detached signatures may give a positive
result but when extracting the signed data, this data may be prepended
or appended with extra data not covered by the signature. Thus it is
possible for an attacker to take any signed message and inject extra
arbitrary data.
2006-03-10 20:57:50 +00:00
steven
04c4c5f7e5
security update to 1.4.2.1
...
The security issue is caused due to "gpgv" exiting with a return code
of 0 even if the detached signature file did not carry any signature.
This may result in certain scripts that use "gpgv" to conclude that
the signature is correctly verified.
More info: http://secunia.com/advisories/18845/
ok bernd@ pvalchev@
2006-02-22 12:30:52 +00:00
bernd
bcee2da2fc
Since we have swap encryption on OpenBSD, only warn about insecure
...
memory if swap encryption is disabled. (It's enabled by default.)
This supersedes pkg/MESSAGE.
Regen patches with update-patches while I'm here. Bump PKGNAME.
idea and ok espie@
2006-02-06 21:57:56 +00:00
sturm
4a1aae3a0f
sync MESSAGE with reality
...
from Antoine Jacoutot <ajacoutot at lphp.org>
maintainer timeout
2005-10-29 14:59:08 +00:00
martin
71d71fa971
don't build the homegrown assembler modules on m68k platforms
2005-05-17 15:08:34 +00:00
espie
84d7a482c5
minor dependency nits (make sure we don't pick libusb, and readline
...
now pulls in termcap and not ncurses)
2005-04-09 12:43:08 +00:00
robert
57c713e689
SECURITY:
...
update to 1.4.1; fix a openpgp protocol vulnerability
http://www.vuxml.org/openbsd/be6057f4-9ecf-11d9-82a1-00065bd5b0b6.html
2005-03-27 15:16:07 +00:00
alek
ecdd8fbbd5
- Add bzip2 to dependency list (from Okan Demirmen <okan@demirmen.com>)
...
- Fix libintl/libiconv linking
- Don't include bundled libintl headers
- Update WANTLIB marker
- Bump PKGNAME
help & go ahead espie@
2005-02-19 12:10:03 +00:00
kevlo
d91f2621f1
don't use gnupg's own iconv library
2005-02-16 01:40:24 +00:00
sturm
fa8985db98
update to GnuPG 1.4, new FLAVOR "card" to support usb card readers
...
initial version from Chris K. Young <cky at pobox.com>, adapted to
-current by Alec Berryman <alec at thened.net>
ok maintainer reinhard@
2005-01-29 19:27:18 +00:00
naddy
a5a7987485
proper SUPDISTFILES, restore checksums
2005-01-05 19:45:26 +00:00
naddy
ae76d3ea1f
SIZE
2005-01-05 17:21:50 +00:00
alek
6afd22898c
Add WANTLIB markers
2004-12-27 13:28:33 +00:00
espie
caf501cd02
new plists.
...
gnutls depends on lzo.
2004-09-15 18:35:58 +00:00
xsa
ef57ea61fd
new-style MODULES.
2004-08-10 09:26:13 +00:00
naddy
c57363e8fb
fix up MODGNU_CONFIG_GUESS_DIRS
2004-08-04 14:51:31 +00:00
naddy
bd873807a9
remove workaround for gcc2.95/sparc64 optimizer bug: sha1.c compiles fine now
2004-02-24 19:48:16 +00:00
naddy
12b2fb8b20
@dirrm shared directories
2003-12-16 19:52:23 +00:00
naddy
112339c1d4
remove WWW lines
2003-12-15 21:54:59 +00:00
margarida
39cbe2af30
Security fix:
...
Add workaround for GnuPG's ElGamal signing keys bug.
URL: http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html
2003-12-13 03:22:16 +00:00
brad
9f40457b1b
run these tests as part of the regression target.
2003-06-09 17:24:47 +00:00
markus
0ea60760b9
re-add IDEA flavor; ok sturm@
2003-06-03 10:21:33 +00:00
brad
2bbfff1f3a
upgrade to gnupg 1.2.2
...
A bug was discovered in the key validation code. This bug causes keys
with more than one user ID to give all user IDs on the key the amount
of validity given to the most-valid key.
http://marc.theaimsgroup.com/?l=bugtraq&m=105215110111174&w=2
--
MAINTAINER ok
2003-05-27 14:54:43 +00:00
pvalchev
826d00d2e7
adapt to new gas syntax for i386's switch to ELF
2003-04-17 08:24:03 +00:00
reinhard
10eeb924d6
no longer used idea flavour patches
2003-02-14 12:25:32 +00:00
reinhard
40deb6feb3
update MASTER_SITES; inspired by Xavier Santolaria <xsa@ucmb.ulb.ac.be>
2003-02-05 18:35:03 +00:00
pvalchev
de5a1ce02c
cast NULL sentinel to void * so it is 64bit on alpha & sparc64
2002-12-28 23:29:13 +00:00