Commit Graph

96 Commits

Author SHA1 Message Date
espie
59fa199246 use PKGSPEC, every dependent port uses this 2010-11-26 07:50:07 +00:00
espie
6c283d7e98 new depends 2010-11-20 17:22:40 +00:00
espie
60f17a941b more WANTLIB 2010-11-11 18:34:59 +00:00
pea
12acb9279b Bugfixes update to 1.4.11
ok benoit@
2010-10-25 12:57:13 +00:00
espie
2ef1026971 USE_GROFF=Yes 2010-10-18 21:41:44 +00:00
jasper
2d4a122bfb - reset maintainer, requested by reinhard@ 2010-09-22 09:02:42 +00:00
pea
412b3e0b05 Avoid conflict with gnupg2. Like this you can install both in the same time.
ok aja@, jasper@
2010-07-08 17:01:57 +00:00
dhill
0533acdfff update to 1.4.10.
From Pierre-Emmanuel André <pea@raveland.org>

OK reinhard@
2009-09-15 13:44:41 +00:00
jasper
275e22e63b SECURITY UPDATE to gnupg 1.4.9
http://secunia.com/advisories/29568/

tested by many, thanks!
2008-04-03 10:13:00 +00:00
bernd
5e84793fd4 Update to gnupg-1.4.8. (GPLv3 now)
ok steven@
2008-01-30 20:18:09 +00:00
merdely
1997c75349 Remove surrounding quotes in NO_REGRESS/COMMENT*/PERMIT_*
From Darrin Chandler
2007-09-15 23:29:57 +00:00
naddy
a220ed62dc chase wantlib changes after curl update 2007-05-15 15:09:12 +00:00
steven
66d8f55f87 update to 1.4.7
feedback and ok bernd@
2007-05-10 11:38:28 +00:00
espie
d4ebcd974d more base64 checksums 2007-04-05 17:26:05 +00:00
steven
d540626c47 adjust another texinfo file so it does not leave entries behind.
rerun makesum while here.

from Moritz Grimm <mlist at scapa.dnsalias.net>

ok espie@
2007-02-22 00:17:09 +00:00
bernd
0435472660 Update to gnupg-1.4.6.
ok steven@
2007-01-16 09:50:36 +00:00
deanna
b750309ac5 Security fix:
remotely controllable function pointer [CVE-2006-6235]
from Werner Koch via fsf announce
ok steven
2006-12-06 23:11:58 +00:00
bernd
8ebe3474a5 Security fix for a buffer overflow when running gnupg in interactive mode.
More info:
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
2006-11-28 10:18:49 +00:00
bernd
f557a7e653 Security update to gnupg-1.4.5. (CVE-2006-3746)
This fixes a denial of service vulnerability.

For more information see:
http://secunia.com/advisories/21297/
http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html

okay espie@
2006-08-07 19:59:20 +00:00
espie
444cc3c520 new lib specs 2006-08-03 23:28:11 +00:00
bernd
044eebec20 Update to gnupg-1.4.4.
ok reinhard@ (MAINTAINER), "looks good" steven@
2006-07-13 13:11:28 +00:00
bernd
2cfe636d68 Security update! Fixes an integer overflow. (CVE-2006-3082)
Detailed information: http://secunia.com/advisories/20783/

Diff from gnupg CVS.

ok sturm@
2006-06-23 11:35:36 +00:00
bernd
edebdd2694 - Update to gnupg-1.4.3
- Add ldap FLAVOR
- Describe the FLAVORs in pkg/DESCR

ok steven@
2006-04-12 09:55:24 +00:00
steven
771e8d8886 security update to gnupg-1.4.2.2
from gnupg.org:
Signature verification of non-detached signatures may give a positive
result but when extracting the signed data, this data may be prepended
or appended with extra data not covered by the signature.  Thus it is
possible for an attacker to take any signed message and inject extra
arbitrary data.
2006-03-10 20:57:50 +00:00
steven
04c4c5f7e5 security update to 1.4.2.1
The security issue is caused due to "gpgv" exiting with a return code
of 0 even if the detached signature file did not carry any signature.
This may result in certain scripts that use "gpgv" to conclude that
the signature is correctly verified.

More info: http://secunia.com/advisories/18845/

ok bernd@ pvalchev@
2006-02-22 12:30:52 +00:00
bernd
bcee2da2fc Since we have swap encryption on OpenBSD, only warn about insecure
memory if swap encryption is disabled. (It's enabled by default.)

This supersedes pkg/MESSAGE.

Regen patches with update-patches while I'm here. Bump PKGNAME.

idea and ok espie@
2006-02-06 21:57:56 +00:00
sturm
4a1aae3a0f sync MESSAGE with reality
from Antoine Jacoutot <ajacoutot at lphp.org>
maintainer timeout
2005-10-29 14:59:08 +00:00
martin
71d71fa971 don't build the homegrown assembler modules on m68k platforms 2005-05-17 15:08:34 +00:00
espie
84d7a482c5 minor dependency nits (make sure we don't pick libusb, and readline
now pulls in termcap and not ncurses)
2005-04-09 12:43:08 +00:00
robert
57c713e689 SECURITY:
update to 1.4.1; fix a openpgp protocol vulnerability
http://www.vuxml.org/openbsd/be6057f4-9ecf-11d9-82a1-00065bd5b0b6.html
2005-03-27 15:16:07 +00:00
alek
ecdd8fbbd5 - Add bzip2 to dependency list (from Okan Demirmen <okan@demirmen.com>)
- Fix libintl/libiconv linking
- Don't include bundled libintl headers
- Update WANTLIB marker
- Bump PKGNAME

help & go ahead espie@
2005-02-19 12:10:03 +00:00
kevlo
d91f2621f1 don't use gnupg's own iconv library 2005-02-16 01:40:24 +00:00
sturm
fa8985db98 update to GnuPG 1.4, new FLAVOR "card" to support usb card readers
initial version from Chris K. Young <cky at pobox.com>, adapted to
-current by Alec Berryman <alec at thened.net>

ok maintainer reinhard@
2005-01-29 19:27:18 +00:00
naddy
a5a7987485 proper SUPDISTFILES, restore checksums 2005-01-05 19:45:26 +00:00
naddy
ae76d3ea1f SIZE 2005-01-05 17:21:50 +00:00
alek
6afd22898c Add WANTLIB markers 2004-12-27 13:28:33 +00:00
espie
caf501cd02 new plists.
gnutls depends on lzo.
2004-09-15 18:35:58 +00:00
xsa
ef57ea61fd new-style MODULES. 2004-08-10 09:26:13 +00:00
naddy
c57363e8fb fix up MODGNU_CONFIG_GUESS_DIRS 2004-08-04 14:51:31 +00:00
naddy
bd873807a9 remove workaround for gcc2.95/sparc64 optimizer bug: sha1.c compiles fine now 2004-02-24 19:48:16 +00:00
naddy
12b2fb8b20 @dirrm shared directories 2003-12-16 19:52:23 +00:00
naddy
112339c1d4 remove WWW lines 2003-12-15 21:54:59 +00:00
margarida
39cbe2af30 Security fix:
Add workaround for GnuPG's ElGamal signing keys bug.
URL: http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html
2003-12-13 03:22:16 +00:00
brad
9f40457b1b run these tests as part of the regression target. 2003-06-09 17:24:47 +00:00
markus
0ea60760b9 re-add IDEA flavor; ok sturm@ 2003-06-03 10:21:33 +00:00
brad
2bbfff1f3a upgrade to gnupg 1.2.2
A bug was discovered in the key validation code.  This bug causes keys
with more than one user ID to give all user IDs on the key the amount
of validity given to the most-valid key.

http://marc.theaimsgroup.com/?l=bugtraq&m=105215110111174&w=2
--
MAINTAINER ok
2003-05-27 14:54:43 +00:00
pvalchev
826d00d2e7 adapt to new gas syntax for i386's switch to ELF 2003-04-17 08:24:03 +00:00
reinhard
10eeb924d6 no longer used idea flavour patches 2003-02-14 12:25:32 +00:00
reinhard
40deb6feb3 update MASTER_SITES; inspired by Xavier Santolaria <xsa@ucmb.ulb.ac.be> 2003-02-05 18:35:03 +00:00
pvalchev
de5a1ce02c cast NULL sentinel to void * so it is 64bit on alpha & sparc64 2002-12-28 23:29:13 +00:00