visa
ca2b2c29e9
Fix build with clang on mips64.
...
OK jca@
2019-07-12 02:16:23 +00:00
jca
bcf347998a
Move the ports I maintain to PERMIT_PACKAGE
2019-06-22 22:44:06 +00:00
naddy
ebf751b927
Update gettext to 0.20.1.
...
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new) devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
sthen
b17bf3228e
update curses WANTLIB entries following the change in base libraries to use soname
2019-05-17 16:19:37 +00:00
sthen
6b8e265514
bump ports known/suspected to be affected by issue with libedit/libreadline
...
and termcap on lld arches.
2018-11-14 20:48:21 +00:00
naddy
cdcd991d42
enable the included PIC assembly code to fix text relocations on i386
2018-11-11 21:14:33 +00:00
jca
1f7c780c5b
SECURITY update to gnupg-1.4.23
...
Fix for CVE-2017-7526 - Sanitize the diagnostic output of the original
file name in verbose mode.
2018-06-13 06:20:01 +00:00
jca
ae84f94e29
Tweak the HOMEPAGE of gnupg.org ports
...
- move to https
- use the per-project canonical homepage (reachable thru the main
- homepage; pinentry doesn't seem to have such homepage)
ok pea@ ajacoutot@
2018-01-30 15:06:37 +00:00
jca
3a987693dd
Drop unneeded casts in inline asm to fix the build with clang on armv7
...
Fix from Markus Hennecke (thanks!), similar changes available in
upstream libgcrypt.
2018-01-23 13:54:54 +00:00
naddy
c2e452c096
/dev/srandom has been removed, just use /dev/random as everywhere else
2017-11-01 15:12:16 +00:00
jca
4e0c79b3db
Update to gnupg-1.4.22
2017-10-19 16:36:04 +00:00
sthen
8134b256aa
fix security/gnupg build on i386+clang with -fheinous-gnu-extensions.
...
from FreeBSD. ok jca@
2017-07-27 20:12:47 +00:00
sthen
c15b136e13
sync WANTLIB (and in one case, add gettext to LIB_DEPENDS) in dependent ports
...
now that internationalised domain name support has been removed from net/curl
2016-11-04 11:35:18 +00:00
naddy
893e631df0
rename MASTER_SITES_GNUPG to MASTER_SITE_GNUPG, like all the others
2016-10-01 13:56:26 +00:00
jca
be8a942bfb
Drop the gettext module from gnupg.org ports
2016-09-28 19:33:37 +00:00
jca
20949baddd
Extra patch that snuck in.
...
Spotted by Markus Lude.
2016-08-26 15:47:10 +00:00
jca
bfea222448
SECURITY fix for CVE-2016-6313
...
* Fix critical security bug in the RNG [CVE-2016-6313]. An attacker
who obtains 580 bytes from the standard RNG can trivially predict
the next 20 bytes of output. Problem detected by Felix Dörre and
Vladimir Klebanov, KIT.
2016-08-26 08:30:10 +00:00
jca
f30fba0b97
SECURITY update to gnupg-1.4.21
...
CVE-2016-6313: * Fix critical security bug in the RNG [CVE-2016-6313].
An attacker who obtains 580 bytes from the standard RNG can trivially
predict the next 20 bytes of output. Problem detected by Felix
Dörre and Vladimir Klebanov, KIT.
Main behavior changes:
- CAST5 -> AES for symmetric encryption
- MD5 sigs rejected by default
ok danj@
2016-08-26 08:27:48 +00:00
espie
1d55a231e7
add is-branch to all trivial ports that exist as multiple branches.
2016-06-29 16:14:38 +00:00
naddy
b6496a69e5
drop workaround for static linking
2016-03-09 19:52:52 +00:00
sthen
5929e0d97e
WANTLIB sync, missed from the big batch of curl nghttp2
2015-11-06 18:30:31 +00:00
jca
8db7b9c34e
SECURITY update to gnupg-1.4.19
...
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.
* Fixed data-dependent timing variations in modular exponentiation
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
are Practical].
This update introduces additional fixes and features, see
http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
ok sthen@
2015-03-01 12:12:54 +00:00
jca
1cbdc38d98
Update to gnupg-1.4.18 and take maintainership.
...
* fix regression in --recv-key {multiple keys}
* cap the sizes for automatic key generation
While here, delete unneeded do-test target.
"looks ok" sthen@, ok daniel@
2015-01-04 22:12:55 +00:00
sthen
472c97a96a
unnecessary param.h
2014-10-13 19:21:16 +00:00
sthen
ea3247717b
update to gnupg-1.4.17
...
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
CVE-2014-4617: DoS due to garbled compressed data packets
2014-06-26 00:30:15 +00:00
jasper
3ea3febc52
remove m68k-related workarounds
2014-03-19 13:40:59 +00:00
pea
f444d84906
Security update to 1.4.16 (CVE-2013-4576)
...
ok jca@, brad@
2013-12-19 21:22:30 +00:00
jca
6aaefa0357
SECURITY update to gnupg-1.4.15, fixes CVE-2013-4402 (infinite recursion
...
parsing compressed packets) and includes the patch we had for
CVE-2013-4242 (Yarom/Falkner flush+reload side-channel attack on RSA
secret keys already had a patch). Input from and ok sthen@
2013-11-16 20:29:00 +00:00
jasper
45606ac347
Security fix for CVE-2013-4242 GnuPG side-channel attack on RSA secret keys
...
ok pea@ sthen@
2013-08-06 19:28:57 +00:00
jca
49d9c2c78e
Introduce MASTER_SITES_GNUPG and reuse it for various GnuPG
...
(sub)projects. http:// urls first, then the primary ftp
site for ''make peek-ftp'', as suggested by sthen@.
ok sthen@
2013-07-12 00:49:23 +00:00
espie
6cd28b2069
grumble, thx fgs@
2013-07-02 16:20:25 +00:00
espie
e9bba84c13
LIB_DEPENDS don't propagate
2013-07-02 08:09:43 +00:00
fgsch
89714f3705
Update mirrors list and move ftp.gnupg.org at the bottom
2013-03-31 19:12:37 +00:00
espie
eae66e4a7b
PERMIT_* / REGRESS->TEST sweep
2013-03-11 11:35:43 +00:00
sthen
f5a323c546
Don't use ${FLAVOR:L}, we only support lower-case flavours now.
...
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
bcallah
d38af15ac6
Fix an "elseif if ..." statement, allowing this to build on mips64*.
...
ok jasper@
2013-02-03 14:52:46 +00:00
sthen
872e4d2976
SECURITY update GnuPG to 1.4.13; earlier versions were vulnerable to memory
...
access violations and public keyring database corruption when importing
manipulated public keys. http://seclists.org/bugtraq/2012/Dec/151
Tweaked from a submission from David Hill.
2012-12-31 16:34:35 +00:00
landry
b1324216b8
Fix on hppa, broken since the PIE switch.
...
mpi/hppa1.1/udiv-qrnnd.S is not PIE-safe, let's use mpi/hppa/udiv-qrnnd.S
instead.
with kettenis@
2012-12-11 21:12:36 +00:00
landry
48209fe2c9
Regen patches
2012-12-11 20:47:45 +00:00
naddy
5e1bcbad44
The American/European/Japanese patents on IDEA have expired. Remove
...
the flavor and just include it by default. ok zinke@
2012-07-12 16:32:47 +00:00
espie
0322fed35a
properly re-conflict gpg1/2. Noticed by naddy@
...
okay ajacoutot@, pea@
2012-01-31 10:51:48 +00:00
ajacoutot
6973ee7fdc
Unbreak the "card" FLAVOR after the libusb->libusb-compat switch, spotted
...
by naddy@ (thanks).
2011-11-13 22:39:50 +00:00
espie
59fa199246
use PKGSPEC, every dependent port uses this
2010-11-26 07:50:07 +00:00
espie
6c283d7e98
new depends
2010-11-20 17:22:40 +00:00
espie
60f17a941b
more WANTLIB
2010-11-11 18:34:59 +00:00
pea
12acb9279b
Bugfixes update to 1.4.11
...
ok benoit@
2010-10-25 12:57:13 +00:00
espie
2ef1026971
USE_GROFF=Yes
2010-10-18 21:41:44 +00:00
jasper
2d4a122bfb
- reset maintainer, requested by reinhard@
2010-09-22 09:02:42 +00:00
pea
412b3e0b05
Avoid conflict with gnupg2. Like this you can install both in the same time.
...
ok aja@, jasper@
2010-07-08 17:01:57 +00:00
dhill
0533acdfff
update to 1.4.10.
...
From Pierre-Emmanuel André <pea@raveland.org>
OK reinhard@
2009-09-15 13:44:41 +00:00