Commit Graph

25 Commits

Author SHA1 Message Date
Baptiste Daroussin
3f9395d599 Remove Author from pkg-descr and white space fixes 2015-03-02 23:41:59 +00:00
Kurt Jaeger
cba03c03e1 security/libgcrypt: 1.6.1 -> 1.6.2, bump depends
Changes:
- src/sexp.c (do_vsexp_sscan): Return error for invalid args.
- cipher/md.c (_gcry_md_info): Fix a segv in case of calling
  with wrong parameters.
- cipher/primegen.c (_gcry_generate_elg_prime): Change to return an
  error code, possible NULL deref in call to prime generator.
- cipher/dsa.c (generate): Take care of new return code.
- cipher/elgamal.c (generate): Change to return an error code.  Take
	care of _gcry_generate_elg_prime return code.
- ecc: Support the non-standard 0x40 compression flag for EdDSA.
- mpi: Extend the internal mpi_get_buffer.
- mpi: Fix regression for powerpc-apple-darwin detection.
- Fix bug inhibiting the use of the sentinel attribute in src/gcrypt.h.in
- Fix building for the x32 target without asm modules in
  mpi/generic/mpi-asm-defs.h: Use a fixed value for the x32 ABI.
- Fix ARM assembly when building __PIC__
- mpi: Fix a subtle bug setting spurious bits with in mpi_set_bit.
  * mpi/mpi-bit.c (_gcry_mpi_set_bit, _gcry_mpi_set_highbit): Clear
    allocated but not used bits before resizing.
  * tests/t-mpi-bits.c (set_bit_with_resize): New.
- Use internal malloc function in fips.c.
  * src/fips.c (check_binary_integrity): s/gcry_malloc/xtrymalloc/.
- pubkey: Re-map all deprecated RSA algo numbers.
- cipher: Fix possible NULL dereference in cipher/md.c for being NULL.
- Fix ARMv6 detection when CFLAGS modify target CPU architecture.

PR:		193264
Approved by:	cpm@fbsd.es (maintainer)
2015-01-02 18:46:33 +00:00
Kurt Jaeger
b95d127471 security/libgcrypt: 1.5.3_3 -> 1.6.1
- Update to 1.6.1
- Remove some unneeded patches
- Fix pkg-plist
- report configure bug upstream
  https://bugs.g10code.com/gnupg/issue1668
- report API breakage downstream and find that MacPorts had the same issue
  https://rt.cpan.org/Ticket/Display.html?id=97201
- bump PORTREVISION for dependent ports (approx. 100 ports)
- Thanks to exp-run by antoine@ to find ports that break
- patch ports that would otherwise break
  security/shishi with PR 192164 is already committed
  [1] devel/ccrtp
  [2] editors/abiword
  [3] security/p5-Crypt-GCrypt

PR:		191256, 192162 [1], 192163 [2], 192166 [3]
Submitted by:	Carlos Jacobo Puga Medina <cjpugmed@gmail.com>
Approved by:	maintainer timeout, antoine (exp-run), portmgr (implicit)
2014-07-30 03:57:23 +00:00
Tijl Coosemans
02a5f6113a - Convert net/libnet to USES=libtool and bump dependent ports
- Add INSTALL_TARGET=install-strip

Approved by:	portmgr (implicit, bump unstaged port)
2014-07-14 15:38:39 +00:00
Adam Weinberger
de9b552061 I experienced catastrophic brain failure and put
PORT_OPTIONS= instead of OPTIONS_DEFINE=. Oops.
2014-05-01 02:33:06 +00:00
Adam Weinberger
4ca54cc2f2 STAGE support, and general cleanups. Some of the changes are a
bit more aggressive, but at this point, if I'm staging your port,
you've likely stopped caring what's done to it.
2014-05-01 01:42:38 +00:00
Baptiste Daroussin
a65ed2e51b Add NO_STAGE all over the place in preparation for the staging support (cat: security) 2013-09-20 22:55:24 +00:00
Emanuel Haupt
2898e3fa0c Chase security/libgcrypt update 2013-05-03 16:36:39 +00:00
Carlo Strub
f87124df63 - Remove A/An in COMMENT
- Trim Header where applicable
2013-03-29 19:33:41 +00:00
Dirk Meyer
fcb98a504a - update libnet to 1.1.6
- build shared lib
- fix dependend ports when libnet.so.8 was linked in
- fix dependend ports when includes where missing
2013-02-18 21:13:02 +00:00
Olli Hauer
87931c6875 -remove MD5 2011-07-03 14:03:52 +00:00
Steve Wills
e0755b977d - Chase the libgcrypt shared lib version 2011-07-03 11:40:49 +00:00
Tilman Keskinoz
4f7173998e Drop Maintainership
PR:		149436
Submitted by:	old maintainer
2010-08-09 13:28:50 +00:00
Wesley Shields
15c1551ea3 Chase security/libgcrypt shlib bump.
PR:		ports/148755
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp>
2010-07-27 01:25:20 +00:00
Erwin Lansing
b3713a5267 Fix INDEX 2009-08-25 07:43:51 +00:00
Felippe de Meirelles Motta
837edb16d9 - Update to 0.0.5.
PR:		ports/137403
Submitted by:	Daniel Roethlisberger <daniel@roe.ch> (maintainer)
2009-08-25 01:14:05 +00:00
Rong-En Fan
af76562086 - Bump PORTREVISION due to share library version bump in security/libgcrypt
PR:		 ports/127478
2009-01-06 13:01:11 +00:00
Pav Lucistnik
efa63f6ba4 - Remove USE_GCC where it can be satisfied with base compiler on following
FreeBSD versions: 5.3 and up, 6.x, 7.x, 8-CURRENT
2008-07-25 14:34:52 +00:00
Edwin Groothuis
090059a210 Bump portrevision due to upgrade of devel/gettext.
The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
2008-06-06 14:17:21 +00:00
Martin Wilke
c0120fa067 - Update MASTER_SITES
PR:		121334
Submitted by:	Daniel Roethlisberger <daniel@roe.ch> (maintainer)
2008-03-14 18:54:35 +00:00
Tilman Keskinoz
6c7eeeeeb4 Chase libgcrypt library version 2008-02-28 21:47:06 +00:00
Pav Lucistnik
eb81a88093 - Patch net/libnet* to versioned libraries and header files, so they can
coexist

PR:		ports/103861
Submitted by:	alepulver
Tested by:	pointyhat
With hat:	portmgr
2007-01-31 14:09:55 +00:00
Edwin Groothuis
28dd10dcb4 Remove USE_REINPLACE from all categories starting with S 2006-05-13 04:15:53 +00:00
Edwin Groothuis
6792a693ba [maintainer] Update security/fiked to 0.0.4, really fix build on 4.x
Port changes:
	 * Set USE_GCC to allow build on FreeBSD 4.x
	 * Add WITHOUT_LIBNET knob
	 * Remove CC fixes, upstream makefile honours CC now
	 * Upgrade to 0.0.4

	Upstream changes:
	 * Support for dropping privileges to unprivileged user
	 * Portability fixes
	 * Bug fixes

RP:		ports/90722
Submitted by:	Daniel Roethlisberger <daniel@roe.ch>
2005-12-21 05:09:38 +00:00
Emanuel Haupt
62ebcfd1d4 Add, security/fiked, a fake IKE PSK+XAUTH daemon based on VPNC.
This is a fake IKE daemon supporting just enough of the standards and Cisco
extensions to attack commonly found insecure Cisco PSK+XAUTH VPN setups.

If you know the pre-shared key, also known as shared secret or group password,
you can impersonate the VPN gateway in IKE phase 1, and learn XAUTH user
credentials in phase 2.

PR:		90372
Submitted by:	Daniel Roethlisberger <daniel@roe.ch>
2005-12-16 20:15:06 +00:00