pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/sks 1.1.5



details:   https://anonhg.NetBSD.org/pkgsrc/rev/1227e96336f5
branches:  trunk
changeset: 635319:1227e96336f5
user:      pettai <pettai%pkgsrc.org@localhost>
date:      Tue Jun 03 08:28:50 2014 +0000

description:
1.1.5
  - Fixes for machine-readable indices. Key expiration times are now read
    from self-signatures on the key's UIDs. In addition, instead of 8-digit
    key IDs, index entries now return the most specific key ID possible:
    16-digit key ID for V3 keys, and the full fingerprint for V4 keys.
  - Add metadata information (number of keys, number of files,
    checksums, etc) to key dump. This allows for information on the
    key dump ahead of download/import, and direct verification of checksums
    using md5sum -c <metadata-file>.
  - Replaced occurrances of the deprecated operator 'or' with '||' (BB issue #2)
  - Upgraded to cryptlib-1.7 and own changes are now packaged as separate
    patches that is installed during 'make'. Added the SHA-3 algorithm, Keccak
  - Option max_matches was setting max_internal_matches. Fixed (BB issue #4)
  - op=hget now supports option=mr for completeness (BB issue #17)
  - Add CORS header to web server responses. Allows JavaScript code to
    interact with keyservers, for example the OpenPGP.js project.
  - Change the default hkp_address and recon_address to making the
    default configuration support IPv6. (Requires OCaml 3.11.0 or newer)
  - Only use '-warn-error A' if the source is marked as development as per
    the version suffix (+) (part of BB Issue #2)
  - Reduce logging verbosity for debug level lower than 6 for (i) bad requests,
    and (ii) no results found (removal of HTTP headers in log) (BB Issue #13)
  - Add additional OIDs for ECC RFC6637 style implementations
    (brainpool and secp256k1) (BB Issue #25) and fix issue for 32 bit arches.
  - Fix a non-persistent cross-site scripting possibility resulting from
    improper input sanitation before writing to client. (BB Issue #26 | CVE-2014-3207)

diffstat:

 security/sks/Makefile                |   7 +++----
 security/sks/distinfo                |  10 ++++------
 security/sks/patches/patch-mArray.ml |  13 -------------
 security/sks/patches/patch-prime.ml  |  13 -------------
 4 files changed, 7 insertions(+), 36 deletions(-)

diffs (70 lines):

diff -r 4b784897cf9f -r 1227e96336f5 security/sks/Makefile
--- a/security/sks/Makefile     Tue Jun 03 07:11:52 2014 +0000
+++ b/security/sks/Makefile     Tue Jun 03 08:28:50 2014 +0000
@@ -1,10 +1,9 @@
-# $NetBSD: Makefile,v 1.9 2014/05/29 23:37:26 wiz Exp $
+# $NetBSD: Makefile,v 1.10 2014/06/03 08:28:50 pettai Exp $
 #
 
-DISTNAME=      sks-1.1.4
-PKGREVISION=   2
+DISTNAME=      sks-1.1.5
 CATEGORIES=    security
-MASTER_SITES=  http://cdn.bitbucket.org/skskeyserver/sks-keyserver/downloads/
+MASTER_SITES=  https://bitbucket.org/skskeyserver/sks-keyserver/downloads/
 EXTRACT_SUFX=  .tgz
 
 MAINTAINER=    pkgsrc-users%NetBSD.org@localhost
diff -r 4b784897cf9f -r 1227e96336f5 security/sks/distinfo
--- a/security/sks/distinfo     Tue Jun 03 07:11:52 2014 +0000
+++ b/security/sks/distinfo     Tue Jun 03 08:28:50 2014 +0000
@@ -1,11 +1,9 @@
-$NetBSD: distinfo,v 1.3 2013/11/11 15:14:13 is Exp $
+$NetBSD: distinfo,v 1.4 2014/06/03 08:28:50 pettai Exp $
 
-SHA1 (sks-1.1.4.tgz) = d0b3b387653115d106ebbcae13aeda06f0034909
-RMD160 (sks-1.1.4.tgz) = 4b6deb6610c8f43e55b3172761904cf2e06e18b2
-Size (sks-1.1.4.tgz) = 345249 bytes
+SHA1 (sks-1.1.5.tgz) = a353426e99de3fb02bf93b953f574335a9f2a590
+RMD160 (sks-1.1.5.tgz) = f47543870313f6bd0868e702849eb717aa045d67
+Size (sks-1.1.5.tgz) = 362941 bytes
 SHA1 (patch-aa) = 04f74c6f141d71e3b0cd45e68896be93dffd0b7c
 SHA1 (patch-ab) = 919846f9c31a89f23430081dbad853d088dcb7e5
 SHA1 (patch-ac) = 0fbe22e67681970521ae66ca1903e9e95eda52ad
 SHA1 (patch-ad) = f96b913bc7ad6b5bd11a51569fc28ee042b1667c
-SHA1 (patch-mArray.ml) = 8f375f9ad5e83608510d18a77e879d2de0fd3c74
-SHA1 (patch-prime.ml) = 00be3cb4e410e0ef57e4debe975f2629c5cd0664
diff -r 4b784897cf9f -r 1227e96336f5 security/sks/patches/patch-mArray.ml
--- a/security/sks/patches/patch-mArray.ml      Tue Jun 03 07:11:52 2014 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,13 +0,0 @@
-$NetBSD: patch-mArray.ml,v 1.1 2013/11/11 15:14:13 is Exp $
-
---- mArray.ml.orig     2012-10-07 19:59:39.000000000 +0000
-+++ mArray.ml
-@@ -57,7 +57,7 @@ let for_all ~f:test array =
-   Array.fold_left ~f:(fun a b -> a && (test b)) ~init:true array
- 
- let exists ~f:test array =
--  Array.fold_left ~f:(fun a b -> a or (test b)) ~init:false array
-+  Array.fold_left ~f:(fun a b -> a || (test b)) ~init:false array
- 
- let mem el array =
-   let length = Array.length array in
diff -r 4b784897cf9f -r 1227e96336f5 security/sks/patches/patch-prime.ml
--- a/security/sks/patches/patch-prime.ml       Tue Jun 03 07:11:52 2014 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,13 +0,0 @@
-$NetBSD: patch-prime.ml,v 1.1 2013/11/11 15:14:13 is Exp $
-
---- prime.ml.orig      2012-10-07 19:59:39.000000000 +0000
-+++ prime.ml
-@@ -87,7 +87,7 @@ let miller_rabin rfunc n t =
-   let test () =
-     let a = randrange rfunc two (n -! one) in
-     let y = Number.powmod a r n in
--    if y =! one or y =! neg_one then Prime
-+    if y =! one || y =! neg_one then Prime
-     else
-       let rec loop y j =
-         if y =! neg_one then Prime



Home | Main Index | Thread Index | Old Index