138 Commits

Author SHA1 Message Date
visa
ca2b2c29e9 Fix build with clang on mips64.
OK jca@
2019-07-12 02:16:23 +00:00
jca
bcf347998a Move the ports I maintain to PERMIT_PACKAGE 2019-06-22 22:44:06 +00:00
naddy
ebf751b927 Update gettext to 0.20.1.
Follow the upstream recommendations for packagers and switch to
multi-packages:
devel/gettext       -> devel/gettext,-runtime
devel/gettext-tools -> devel/gettext,-tools
(new)                  devel/gettext,-textstyle
2019-05-20 22:15:00 +00:00
sthen
b17bf3228e update curses WANTLIB entries following the change in base libraries to use soname 2019-05-17 16:19:37 +00:00
sthen
6b8e265514 bump ports known/suspected to be affected by issue with libedit/libreadline
and termcap on lld arches.
2018-11-14 20:48:21 +00:00
naddy
cdcd991d42 enable the included PIC assembly code to fix text relocations on i386 2018-11-11 21:14:33 +00:00
jca
1f7c780c5b SECURITY update to gnupg-1.4.23
Fix for CVE-2017-7526 - Sanitize the diagnostic output of the original
file name in verbose mode.
2018-06-13 06:20:01 +00:00
jca
ae84f94e29 Tweak the HOMEPAGE of gnupg.org ports
- move to https
- use the per-project canonical homepage (reachable thru the main
- homepage; pinentry doesn't seem to have such homepage)

ok pea@ ajacoutot@
2018-01-30 15:06:37 +00:00
jca
3a987693dd Drop unneeded casts in inline asm to fix the build with clang on armv7
Fix from Markus Hennecke (thanks!), similar changes available in
upstream libgcrypt.
2018-01-23 13:54:54 +00:00
naddy
c2e452c096 /dev/srandom has been removed, just use /dev/random as everywhere else 2017-11-01 15:12:16 +00:00
jca
4e0c79b3db Update to gnupg-1.4.22 2017-10-19 16:36:04 +00:00
sthen
8134b256aa fix security/gnupg build on i386+clang with -fheinous-gnu-extensions.
from FreeBSD.  ok jca@
2017-07-27 20:12:47 +00:00
sthen
c15b136e13 sync WANTLIB (and in one case, add gettext to LIB_DEPENDS) in dependent ports
now that internationalised domain name support has been removed from net/curl
2016-11-04 11:35:18 +00:00
naddy
893e631df0 rename MASTER_SITES_GNUPG to MASTER_SITE_GNUPG, like all the others 2016-10-01 13:56:26 +00:00
jca
be8a942bfb Drop the gettext module from gnupg.org ports 2016-09-28 19:33:37 +00:00
jca
20949baddd Extra patch that snuck in.
Spotted by Markus Lude.
2016-08-26 15:47:10 +00:00
jca
bfea222448 SECURITY fix for CVE-2016-6313
* Fix critical security bug in the RNG [CVE-2016-6313].  An attacker
   who obtains 580 bytes from the standard RNG can trivially predict
   the next 20 bytes of output.  Problem detected by Felix Dörre and
   Vladimir Klebanov, KIT.
2016-08-26 08:30:10 +00:00
jca
f30fba0b97 SECURITY update to gnupg-1.4.21
CVE-2016-6313:  * Fix critical security bug in the RNG [CVE-2016-6313].
   An attacker who obtains 580 bytes from the standard RNG can trivially
   predict  the next 20 bytes of output.  Problem detected by Felix
   Dörre and Vladimir Klebanov, KIT.

Main behavior changes:
- CAST5 -> AES for symmetric encryption
- MD5 sigs rejected by default

ok danj@
2016-08-26 08:27:48 +00:00
espie
1d55a231e7 add is-branch to all trivial ports that exist as multiple branches. 2016-06-29 16:14:38 +00:00
naddy
b6496a69e5 drop workaround for static linking 2016-03-09 19:52:52 +00:00
sthen
5929e0d97e WANTLIB sync, missed from the big batch of curl nghttp2 2015-11-06 18:30:31 +00:00
jca
8db7b9c34e SECURITY update to gnupg-1.4.19
* Use ciphertext blinding for Elgamal decryption [CVE-2014-3591].
  See http://www.cs.tau.ac.il/~tromer/radioexp/ for details.

* Fixed data-dependent timing variations in modular exponentiation
  [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
   are Practical].

This update introduces additional fixes and features, see

  http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html

ok sthen@
2015-03-01 12:12:54 +00:00
jca
1cbdc38d98 Update to gnupg-1.4.18 and take maintainership.
* fix regression in --recv-key {multiple keys}
* cap the sizes for automatic key generation

While here, delete unneeded do-test target.

"looks ok" sthen@, ok daniel@
2015-01-04 22:12:55 +00:00
sthen
472c97a96a unnecessary param.h 2014-10-13 19:21:16 +00:00
sthen
ea3247717b update to gnupg-1.4.17
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html

CVE-2014-4617: DoS due to garbled compressed data packets
2014-06-26 00:30:15 +00:00
jasper
3ea3febc52 remove m68k-related workarounds 2014-03-19 13:40:59 +00:00
pea
f444d84906 Security update to 1.4.16 (CVE-2013-4576)
ok jca@, brad@
2013-12-19 21:22:30 +00:00
jca
6aaefa0357 SECURITY update to gnupg-1.4.15, fixes CVE-2013-4402 (infinite recursion
parsing compressed packets) and includes the patch we had for
CVE-2013-4242 (Yarom/Falkner flush+reload side-channel attack on RSA
secret keys already had a patch).  Input from and ok sthen@
2013-11-16 20:29:00 +00:00
jasper
45606ac347 Security fix for CVE-2013-4242 GnuPG side-channel attack on RSA secret keys
ok pea@ sthen@
2013-08-06 19:28:57 +00:00
jca
49d9c2c78e Introduce MASTER_SITES_GNUPG and reuse it for various GnuPG
(sub)projects.  http:// urls first, then the primary ftp
site for ''make peek-ftp'', as suggested by sthen@.
ok sthen@
2013-07-12 00:49:23 +00:00
espie
6cd28b2069 grumble, thx fgs@ 2013-07-02 16:20:25 +00:00
espie
e9bba84c13 LIB_DEPENDS don't propagate 2013-07-02 08:09:43 +00:00
fgsch
89714f3705 Update mirrors list and move ftp.gnupg.org at the bottom 2013-03-31 19:12:37 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
f5a323c546 Don't use ${FLAVOR:L}, we only support lower-case flavours now.
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
bcallah
d38af15ac6 Fix an "elseif if ..." statement, allowing this to build on mips64*.
ok jasper@
2013-02-03 14:52:46 +00:00
sthen
872e4d2976 SECURITY update GnuPG to 1.4.13; earlier versions were vulnerable to memory
access violations and public keyring database corruption when importing
manipulated public keys.  http://seclists.org/bugtraq/2012/Dec/151

Tweaked from a submission from David Hill.
2012-12-31 16:34:35 +00:00
landry
b1324216b8 Fix on hppa, broken since the PIE switch.
mpi/hppa1.1/udiv-qrnnd.S is not PIE-safe, let's use mpi/hppa/udiv-qrnnd.S
instead.
with kettenis@
2012-12-11 21:12:36 +00:00
landry
48209fe2c9 Regen patches 2012-12-11 20:47:45 +00:00
naddy
5e1bcbad44 The American/European/Japanese patents on IDEA have expired. Remove
the flavor and just include it by default.  ok zinke@
2012-07-12 16:32:47 +00:00
espie
0322fed35a properly re-conflict gpg1/2. Noticed by naddy@
okay ajacoutot@, pea@
2012-01-31 10:51:48 +00:00
ajacoutot
6973ee7fdc Unbreak the "card" FLAVOR after the libusb->libusb-compat switch, spotted
by naddy@ (thanks).
2011-11-13 22:39:50 +00:00
espie
59fa199246 use PKGSPEC, every dependent port uses this 2010-11-26 07:50:07 +00:00
espie
6c283d7e98 new depends 2010-11-20 17:22:40 +00:00
espie
60f17a941b more WANTLIB 2010-11-11 18:34:59 +00:00
pea
12acb9279b Bugfixes update to 1.4.11
ok benoit@
2010-10-25 12:57:13 +00:00
espie
2ef1026971 USE_GROFF=Yes 2010-10-18 21:41:44 +00:00
jasper
2d4a122bfb - reset maintainer, requested by reinhard@ 2010-09-22 09:02:42 +00:00
pea
412b3e0b05 Avoid conflict with gnupg2. Like this you can install both in the same time.
ok aja@, jasper@
2010-07-08 17:01:57 +00:00
dhill
0533acdfff update to 1.4.10.
From Pierre-Emmanuel André <pea@raveland.org>

OK reinhard@
2009-09-15 13:44:41 +00:00