Commit Graph

56 Commits

Author SHA1 Message Date
ajacoutot
5c286b8833 Major update to gnutls-3.0.21.
ok jasper@
2012-07-08 09:02:10 +00:00
ajacoutot
ed9f7f03ac Bugfix update to gnutls-2.12.20.
* fixed memory leak in PKCS #8 key import
2012-07-05 06:36:59 +00:00
jasper
9041fc74ae - these patches (or chunks) are not needed anymore since arpa/inet.h -r1.12 2012-06-26 14:40:06 +00:00
ajacoutot
a0e734b938 Bugfix update to gnutls-2.12.19. 2012-05-09 08:06:53 +00:00
ajacoutot
94ead82f69 Use MASTER_SITE_GNU. 2012-04-04 06:27:38 +00:00
sthen
b7b9359510 update to gnutls 2.2.18, OK ajacoutot@
- minitasn1: Upgraded to libtasn1 version 2.12 (pre-release).
- Corrected SRP-RSA ciphersuites when used under TLS 1.2.
- Fixed leaks in key generation.
2012-03-21 16:05:36 +00:00
ajacoutot
e182004240 Minor update to gnutls-2.12.17. 2012-03-06 16:37:49 +00:00
ajacoutot
226cf67bc3 Minor update to gnutls-2.12.16.
* corrected functionality of gnutls_record_get_direction()
2012-01-09 14:03:59 +00:00
ajacoutot
74fb5c138b Sort PLIST. 2011-12-30 11:17:08 +00:00
ajacoutot
797204e9b7 SECURITY update to gnutls-2.12.14.
Fix a possible buffer overflow.
2011-11-21 14:48:09 +00:00
ajacoutot
0efec4bcbd Small bugfix update to gnutls-2.12.12. 2011-10-21 15:38:15 +00:00
ajacoutot
c057cd387b Bugfix update to gnutls-2.12.11.
* libgnutls: Memory leak fixes in credentials private key deinitialization.
* libgnutls: Allow CA importing of 0 certificates to succeed.
2011-10-03 15:32:24 +00:00
ajacoutot
d62a7dfc68 Bugfix update to gnutls-2.12.10. 2011-09-08 11:36:36 +00:00
ajacoutot
5ae5f28d6c Bugfix update to gnutls-2.12.9. 2011-08-22 09:13:04 +00:00
ajacoutot
94deac9daf Bugfix update to gnutls-2.12.7. 2011-06-21 09:55:43 +00:00
kili
27f99a5541 --disable-silent-rules is now added to CONFIGURE_ARGS per default,
if CONFIGURE_STYLE = gnu.
2011-06-02 17:09:31 +00:00
ajacoutot
b5d6ad6a2e Maintenance update to gnutls-2.12.5. 2011-05-17 19:08:08 +00:00
ajacoutot
4079be8ce1 Bugfix update to gnutls-2.12.3.
Incidentally fixes a build breakage when libgcrypt wasn't installed as
spotted by jasper@
2011-05-04 15:48:10 +00:00
ajacoutot
058f1aab39 Major update to gnutls-2.12.2.
tested by landry@ in a bulk, thanks!
ok jasper@ landry@
2011-04-15 16:09:39 +00:00
ajacoutot
ac2199ffa2 Fix pkg-config file.
This unbreaks libprelude as reported by Markus Lude.
2011-03-10 15:38:58 +00:00
ajacoutot
327fe0b3b1 Bugfix update to gnutls-2.10.5. 2011-03-10 07:16:45 +00:00
ajacoutot
54f37fc488 Bugfix update to gnutls-2.10.4. 2010-12-12 16:29:59 +00:00
espie
6c283d7e98 new depends 2010-11-20 17:22:40 +00:00
ajacoutot
047bbb7432 Maintainance update gnutls-2.10.2. 2010-10-25 17:28:00 +00:00
espie
2ef1026971 USE_GROFF=Yes 2010-10-18 21:41:44 +00:00
ajacoutot
af02cbf50b Major update to gnutls-2.10.1.
tested by landry@ in a bulk, thanks!
2010-08-31 20:01:41 +00:00
sthen
6548c7a188 add missing wantlibs, new-style lib_depends/revision, bump 2010-08-25 20:27:16 +00:00
stephan
4c2ea5fe3d revert to 1.24, prodded by espie@ - we are in lock. 2010-08-03 11:49:44 +00:00
lum
635a93cf55 LIB_DEPEND + WANTLIB clean up. 2010-08-03 09:05:13 +00:00
ajacoutot
a5fb4a5577 Update to gnutls-2.8.6. 2010-04-20 21:10:32 +00:00
ajacoutot
e94483b047 Update to gnutls-2.8.5. 2010-03-21 10:19:42 +00:00
kili
63f5ae82e8 Forcibly disable guile.
No effect with the version of guile we've currently in the tree.
2009-10-11 13:17:00 +00:00
ajacoutot
296215a637 Major update to gnutls-2.8.4.
A bulk is about to start with this update and any fallout will be dealt
with during p2k9.

'put it in' jasper@
2009-10-09 23:05:20 +00:00
sthen
64fa08b62b move to archivers/lzo2, bump 2009-07-24 14:37:23 +00:00
ajacoutot
1d9a5ac1f0 - maintainance update to gnutls-2.6.6
Fixes several bugs, and possible memory corruptions and crashes.
2009-05-12 07:50:57 +00:00
ajacoutot
07dc25beed - bugfix update to gnutls-2.6.5
tested on amd64 by pea@, thanks
regress is still happy
2009-05-01 10:37:22 +00:00
ajacoutot
7e83f84b37 - bugfix update to gnutls-2.6.2
a bug was introduced with previous security release

ok naddy@
2008-11-18 09:01:53 +00:00
jasper
c17dc39d1f - SECURITY UPDATE of gnutls to 2.6.1
fixes CVE-2008-4989: GnuTLS Library X.509 Certificate Chain Validation
Vulnerability

ok landry@ naddy@
2008-11-12 17:09:25 +00:00
landry
6e9ff6c8b0 Update gnutls to 2.6.0.
Use in-tree security/libtasn1 and archivers/lzo instead of the included ones.
Backport a patch from upstream git to fix symbol conflicts.

ok naddy@ ajacoutot@
2008-10-26 10:50:37 +00:00
landry
61e6d9d80c Long due update to GnuTLS 2.0.4, based on a submission by Giovanni Bechis.
Reformat DESCR, remove unneeded patches and LIB*ALIAS goo, reformat Makefile
Tested by many, thanks naddy for alpha, kili for zaurus and powerpc, okan
for amd64 and sparc64, sthen for sparc64 and others i forgot.
Ports depending on it have been vastly tested, thanks sthen for iksemel,
aanriot for prelude, Sebastian Reitenbach for heartbeat, and surely others.

ok kili@ okan@
2007-12-03 20:57:33 +00:00
merdely
1997c75349 Remove surrounding quotes in NO_REGRESS/COMMENT*/PERMIT_*
From Darrin Chandler
2007-09-15 23:29:57 +00:00
espie
d4ebcd974d more base64 checksums 2007-04-05 17:26:05 +00:00
jolan
4d65225fd7 remove Jim Geovedi as maintainer from all ports' Makefiles per his
request.
2007-03-15 11:30:07 +00:00
espie
444cc3c520 new lib specs 2006-08-03 23:28:11 +00:00
sturm
7c759dbddd SHARED_LIBS
USE_LIBTOOL where appropriate
2005-12-24 20:52:58 +00:00
robert
224b85f035 SECURITY:
update gnutls to 1.0.25; regen patches while i am here
http://www.vuxml.org/openbsd/086072e4-c180-11d9-aaa3-00065bd5b0b6.html

ok Jim Geovedi (maintainer)
2005-05-11 11:16:07 +00:00
alek
2ce519b792 - LIB_DEPENDS=archivers/lzo is not needed as this port uses included
version of lzo library
- Bump PKGNAME
2005-02-21 17:15:43 +00:00
naddy
ae76d3ea1f SIZE 2005-01-05 17:21:50 +00:00
alek
6afd22898c Add WANTLIB markers 2004-12-27 13:28:33 +00:00
robert
f3cf746bb3 SECURITY:
upgrade to 1.0.20;

Mr.   Hornik   has   discovered  error  in  X.509  certificate chain
verification procedure in GnuTLS library. The certificate chain should
be verified from last root certificate to the first certificate.
Otherwise  a lot of unauthorized CPU processing can be forced to check
certificate signatures signed with arbitrary RSA/DSA keys chosen by
attacker.;

ok maintainer
2004-09-22 08:06:40 +00:00