pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/mail/wmbiff Update "wmbiff" package to version 0.4.19....



details:   https://anonhg.NetBSD.org/pkgsrc/rev/c0c6a0ef5089
branches:  trunk
changeset: 464310:c0c6a0ef5089
user:      tron <tron%pkgsrc.org@localhost>
date:      Sat Dec 06 16:10:48 2003 +0000

description:
Update "wmbiff" package to version 0.4.19. Changes since version 0.4.13:
- Fix test_tlscomm with the right signature for read()
- Another bugfix to IMAP msglst when headers are abnormal.
- Avoid strcpy for overlapping regions.
- Update security.debian.rb for ruby 1.8.
- Bugfix to avoid infinite loop when reading from IMAP.
- Bugfix to msglst to allow capitalized header names.
- Add msglst feature to Pop3 mailboxes. (Paolo Gianrossi)
- Bugfix to OS X keychain use for panther.
- On Mac, ask the keychain for passwords if
  askpass = internal:apple:keychain
- Bugfix to an infinite loop found in the
  TLS interface.
- Checks TLS certificates.  See wmbiffrc(5) for
  details on the certfile option.  Designed to work
  with mutt.
- Show a busy mouse cursor while talking to remote
  servers, to show that wmbiff won't be responsive
  to mouse clicks for a little bit.
- New buttontwo (middle click) action to complement
  action (left mouse click) and fetchcmd (right mouse).
- #'s are now only comments in .wmbiffrc at the
  beginning of lines or following whitespace,
  allowing #'s in (most) passwords.
- AppleScript examples for driving Apple's Mail
  application in sample.wmbiffrc
- Special mailbox action 'msglst' brings up a
  transient window showing message headers from IMAP
  and program output for shell methods.  This is
  intended to be faster than starting up a new
  mail program or re-executing a script.
- Avoid repetitive error messages when disconnected.
- Use conventional -geometry option handling.
- Fix bug in 0.4.15 to re-enable *'s in IMAP passwords.
- Frobnicate internally stored passwords, partially
  obfuscating them in memory.  Not actually more
  secure, but harder to casually discover a password.
- Tighten configuration file lines to more quickly
  detect misconfiguration.  Add the -relax option if
  it is too paranoid.
- Add support for -bg to round out -hi and -fg color
  specifiers.
- Handle building on systems with both posix and gnu
  regex in different but conflicting files.
- Restart wmbiff on SIGUSR1.  You may need to use
  'killall -USR1 wmbiff' if it gets stuck.
- Restart wmbiff on ctrl-shift mouse 1.
Package source related changes:
- Make this work with version 1.1.90 of the "libgcrypt" package.

diffstat:

 mail/wmbiff/Makefile         |   5 ++---
 mail/wmbiff/distinfo         |  10 ++++++----
 mail/wmbiff/patches/patch-ab |  19 ++++++++++++++-----
 mail/wmbiff/patches/patch-ac |  22 ++++++++++++++++++++++
 mail/wmbiff/patches/patch-ad |  13 +++++++++++++
 5 files changed, 57 insertions(+), 12 deletions(-)

diffs (106 lines):

diff -r 165896f234f5 -r c0c6a0ef5089 mail/wmbiff/Makefile
--- a/mail/wmbiff/Makefile      Sat Dec 06 10:06:59 2003 +0000
+++ b/mail/wmbiff/Makefile      Sat Dec 06 16:10:48 2003 +0000
@@ -1,7 +1,6 @@
-# $NetBSD: Makefile,v 1.11 2003/07/13 13:52:28 wiz Exp $
+# $NetBSD: Makefile,v 1.12 2003/12/06 16:10:48 tron Exp $
 
-DISTNAME=      wmbiff-0.4.13
-PKGREVISION=   2
+DISTNAME=      wmbiff-0.4.19
 CATEGORIES=    mail x11 windowmaker
 MASTER_SITES=  $(MASTER_SITE_SOURCEFORGE:=wmbiff/)
 
diff -r 165896f234f5 -r c0c6a0ef5089 mail/wmbiff/distinfo
--- a/mail/wmbiff/distinfo      Sat Dec 06 10:06:59 2003 +0000
+++ b/mail/wmbiff/distinfo      Sat Dec 06 16:10:48 2003 +0000
@@ -1,6 +1,8 @@
-$NetBSD: distinfo,v 1.6 2003/01/31 12:57:07 tron Exp $
+$NetBSD: distinfo,v 1.7 2003/12/06 16:10:48 tron Exp $
 
-SHA1 (wmbiff-0.4.13.tar.gz) = 3e8efffb6a2d0456b88bc4f0f990ffaf41f8fa10
-Size (wmbiff-0.4.13.tar.gz) = 176897 bytes
+SHA1 (wmbiff-0.4.19.tar.gz) = 178ff159eefea22b9420bd7a0a70ea42103f98a4
+Size (wmbiff-0.4.19.tar.gz) = 189405 bytes
 SHA1 (patch-aa) = 2007bd498ef54b6fc9779092bcf0771e41dec8e0
-SHA1 (patch-ab) = 297984c76e062f11ead42a2b834ab9dc81d2bdd5
+SHA1 (patch-ab) = f9de1d26626c6c78c337c5d267f7b4543f218a2b
+SHA1 (patch-ac) = e6084c27e4ec33966fef498f4179fc84becd5203
+SHA1 (patch-ad) = 292cc16faf9c13b0e53f1dd547b170c32f18dbdb
diff -r 165896f234f5 -r c0c6a0ef5089 mail/wmbiff/patches/patch-ab
--- a/mail/wmbiff/patches/patch-ab      Sat Dec 06 10:06:59 2003 +0000
+++ b/mail/wmbiff/patches/patch-ab      Sat Dec 06 16:10:48 2003 +0000
@@ -1,8 +1,8 @@
-$NetBSD: patch-ab,v 1.3 2003/01/31 12:57:08 tron Exp $
+$NetBSD: patch-ab,v 1.4 2003/12/06 16:10:48 tron Exp $
 
---- wmbiff/wmbiff.c.orig       Sat Jan 25 07:02:17 2003
-+++ wmbiff/wmbiff.c    Thu Jan 30 13:30:38 2003
-@@ -24,6 +24,14 @@
+--- wmbiff/wmbiff.c.orig       Sun Nov  9 00:43:50 2003
++++ wmbiff/wmbiff.c    Sat Dec  6 17:04:32 2003
+@@ -25,6 +25,14 @@
  #include <errno.h>
  #include <string.h>
  
@@ -17,7 +17,16 @@
  #include "../wmgeneral/wmgeneral.h"
  #include "../wmgeneral/misc.h"
  
-@@ -363,8 +371,8 @@
+@@ -370,7 +378,7 @@
+                       " Message: %s\n"
+                       " libgcrypt version: %s\n"
+                       " recovering: will fail later if using CRAM-MD5 or APOP authentication.\n",
+-                      zok, gcry_strerror(gcry_errno()), gcry_check_version(NULL));
++                      zok, gcry_strerror(zok), gcry_check_version(NULL));
+       };
+ #endif
+ 
+@@ -384,8 +392,8 @@
                        strcpy(mbox[0].path, m);
                } else if ((m = getenv("USER")) != NULL) {
                        /* we are using MAIL environment var. type mbox */
diff -r 165896f234f5 -r c0c6a0ef5089 mail/wmbiff/patches/patch-ac
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/mail/wmbiff/patches/patch-ac      Sat Dec 06 16:10:48 2003 +0000
@@ -0,0 +1,22 @@
+$NetBSD: patch-ac,v 1.1 2003/12/06 16:10:48 tron Exp $
+
+--- wmbiff/Pop3Client.c.orig   Sun Nov  9 00:43:50 2003
++++ wmbiff/Pop3Client.c        Sat Dec  6 16:57:51 2003
+@@ -281,7 +281,7 @@
+       strcat(buf, " ");
+ 
+ 
+-      gmh = gcry_md_open(GCRY_MD_MD5, GCRY_MD_FLAG_HMAC);
++      (void) gcry_md_open(&gmh, GCRY_MD_MD5, GCRY_MD_FLAG_HMAC);
+       gcry_md_setkey(gmh, PCU.password, strlen(PCU.password));
+       gcry_md_write(gmh, (unsigned char *) buf2, strlen(buf2));
+       gcry_md_final(gmh);
+@@ -323,7 +323,7 @@
+       POP_DM(pc, DEBUG_INFO, "APOP challenge: %s\n", apop_str);
+       strcat(apop_str, PCU.password);
+ 
+-      gmh = gcry_md_open(GCRY_MD_MD5, 0);
++      (void) gcry_md_open(&gmh, GCRY_MD_MD5, 0);
+       gcry_md_write(gmh, (unsigned char *) apop_str, strlen(apop_str));
+       gcry_md_final(gmh);
+       md5 = gcry_md_read(gmh, 0);
diff -r 165896f234f5 -r c0c6a0ef5089 mail/wmbiff/patches/patch-ad
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/mail/wmbiff/patches/patch-ad      Sat Dec 06 16:10:48 2003 +0000
@@ -0,0 +1,13 @@
+$NetBSD: patch-ad,v 1.1 2003/12/06 16:10:48 tron Exp $
+
+--- wmbiff/Imap4Client.c.orig  Sun Nov  9 00:43:50 2003
++++ wmbiff/Imap4Client.c       Sat Dec  6 16:59:14 2003
+@@ -648,7 +648,7 @@
+       strcpy(buf, PCU.userName);
+       strcat(buf, " ");
+       ask_user_for_password(pc, 0);
+-      gmh = gcry_md_open(GCRY_MD_MD5, GCRY_MD_FLAG_HMAC);
++      (void) gcry_md_open(&gmh, GCRY_MD_MD5, GCRY_MD_FLAG_HMAC);
+       DEFROB(PCU.password);
+       gcry_md_setkey(gmh, PCU.password, strlen(PCU.password));
+       ENFROB(PCU.password);



Home | Main Index | Thread Index | Old Index