head 1.111; access; symbols pkgsrc-2023Q4:1.111.0.2 pkgsrc-2023Q4-base:1.111 pkgsrc-2023Q3:1.109.0.4 pkgsrc-2023Q3-base:1.109 pkgsrc-2023Q2:1.109.0.2 pkgsrc-2023Q2-base:1.109 pkgsrc-2023Q1:1.107.0.6 pkgsrc-2023Q1-base:1.107 pkgsrc-2022Q4:1.107.0.4 pkgsrc-2022Q4-base:1.107 pkgsrc-2022Q3:1.107.0.2 pkgsrc-2022Q3-base:1.107 pkgsrc-2022Q2:1.106.0.2 pkgsrc-2022Q2-base:1.106 pkgsrc-2022Q1:1.105.0.2 pkgsrc-2022Q1-base:1.105 pkgsrc-2021Q4:1.104.0.4 pkgsrc-2021Q4-base:1.104 pkgsrc-2021Q3:1.104.0.2 pkgsrc-2021Q3-base:1.104 pkgsrc-2021Q2:1.103.0.2 pkgsrc-2021Q2-base:1.103 pkgsrc-2021Q1:1.102.0.2 pkgsrc-2021Q1-base:1.102 pkgsrc-2020Q4:1.99.0.2 pkgsrc-2020Q4-base:1.99 pkgsrc-2020Q3:1.98.0.2 pkgsrc-2020Q3-base:1.98 pkgsrc-2020Q2:1.97.0.8 pkgsrc-2020Q2-base:1.97 pkgsrc-2020Q1:1.97.0.4 pkgsrc-2020Q1-base:1.97 pkgsrc-2019Q4:1.97.0.6 pkgsrc-2019Q4-base:1.97 pkgsrc-2019Q3:1.97.0.2 pkgsrc-2019Q3-base:1.97 pkgsrc-2019Q2:1.96.0.6 pkgsrc-2019Q2-base:1.96 pkgsrc-2019Q1:1.96.0.4 pkgsrc-2019Q1-base:1.96 pkgsrc-2018Q4:1.96.0.2 pkgsrc-2018Q4-base:1.96 pkgsrc-2018Q3:1.95.0.4 pkgsrc-2018Q3-base:1.95 pkgsrc-2018Q2:1.95.0.2 pkgsrc-2018Q2-base:1.95 pkgsrc-2018Q1:1.93.0.4 pkgsrc-2018Q1-base:1.93 pkgsrc-2017Q4:1.93.0.2 pkgsrc-2017Q4-base:1.93 pkgsrc-2017Q3:1.92.0.4 pkgsrc-2017Q3-base:1.92 pkgsrc-2017Q2:1.89.0.2 pkgsrc-2017Q2-base:1.89 pkgsrc-2017Q1:1.88.0.2 pkgsrc-2017Q1-base:1.88 pkgsrc-2016Q4:1.85.0.2 pkgsrc-2016Q4-base:1.85 pkgsrc-2016Q3:1.84.0.2 pkgsrc-2016Q3-base:1.84 pkgsrc-2016Q2:1.79.0.2 pkgsrc-2016Q2-base:1.79 pkgsrc-2016Q1:1.74.0.2 pkgsrc-2016Q1-base:1.74 pkgsrc-2015Q4:1.73.0.4 pkgsrc-2015Q4-base:1.73 pkgsrc-2015Q3:1.73.0.2 pkgsrc-2015Q3-base:1.73 pkgsrc-2015Q2:1.72.0.4 pkgsrc-2015Q2-base:1.72 pkgsrc-2015Q1:1.72.0.2 pkgsrc-2015Q1-base:1.72 pkgsrc-2014Q4:1.68.0.2 pkgsrc-2014Q4-base:1.68 pkgsrc-2014Q3:1.67.0.2 pkgsrc-2014Q3-base:1.67 pkgsrc-2014Q2:1.61.0.4 pkgsrc-2014Q2-base:1.61 pkgsrc-2014Q1:1.61.0.2 pkgsrc-2014Q1-base:1.61 pkgsrc-2013Q4:1.57.0.4 pkgsrc-2013Q4-base:1.57 pkgsrc-2013Q3:1.57.0.2 pkgsrc-2013Q3-base:1.57 pkgsrc-2013Q2:1.56.0.2 pkgsrc-2013Q2-base:1.56 pkgsrc-2013Q1:1.54.0.4 pkgsrc-2013Q1-base:1.54 pkgsrc-2012Q4:1.54.0.2 pkgsrc-2012Q4-base:1.54 pkgsrc-2012Q3:1.53.0.6 pkgsrc-2012Q3-base:1.53 pkgsrc-2012Q2:1.53.0.4 pkgsrc-2012Q2-base:1.53 pkgsrc-2012Q1:1.53.0.2 pkgsrc-2012Q1-base:1.53 pkgsrc-2011Q4:1.52.0.4 pkgsrc-2011Q4-base:1.52 pkgsrc-2011Q3:1.52.0.2 pkgsrc-2011Q3-base:1.52 pkgsrc-2011Q2:1.50.0.2 pkgsrc-2011Q2-base:1.50 pkgsrc-2011Q1:1.49.0.2 pkgsrc-2011Q1-base:1.49 pkgsrc-2010Q4:1.48.0.2 pkgsrc-2010Q4-base:1.48 pkgsrc-2010Q3:1.47.0.2 pkgsrc-2010Q3-base:1.47 pkgsrc-2010Q2:1.46.0.6 pkgsrc-2010Q2-base:1.46 pkgsrc-2010Q1:1.46.0.4 pkgsrc-2010Q1-base:1.46 pkgsrc-2009Q4:1.46.0.2 pkgsrc-2009Q4-base:1.46 pkgsrc-2009Q3:1.44.0.4 pkgsrc-2009Q3-base:1.44 pkgsrc-2009Q2:1.44.0.2 pkgsrc-2009Q2-base:1.44 pkgsrc-2009Q1:1.43.0.2 pkgsrc-2009Q1-base:1.43 pkgsrc-2008Q4:1.42.0.2 pkgsrc-2008Q4-base:1.42 pkgsrc-2008Q3:1.41.0.8 pkgsrc-2008Q3-base:1.41 cube-native-xorg:1.41.0.6 cube-native-xorg-base:1.41 pkgsrc-2008Q2:1.41.0.4 pkgsrc-2008Q2-base:1.41 cwrapper:1.41.0.2 pkgsrc-2008Q1:1.40.0.2 pkgsrc-2008Q1-base:1.40 pkgsrc-2007Q4:1.39.0.4 pkgsrc-2007Q4-base:1.39 pkgsrc-2007Q3:1.39.0.2 pkgsrc-2007Q3-base:1.39 pkgsrc-2007Q2:1.38.0.2 pkgsrc-2007Q2-base:1.38 pkgsrc-2007Q1:1.37.0.2 pkgsrc-2007Q1-base:1.37 pkgsrc-2006Q4:1.35.0.2 pkgsrc-2006Q4-base:1.35 pkgsrc-2006Q3:1.33.0.2 pkgsrc-2006Q3-base:1.33 pkgsrc-2006Q2:1.30.0.2 pkgsrc-2006Q2-base:1.30 pkgsrc-2006Q1:1.29.0.2 pkgsrc-2006Q1-base:1.29 pkgsrc-2005Q4:1.27.0.2 pkgsrc-2005Q4-base:1.27 pkgsrc-2005Q3:1.26.0.4 pkgsrc-2005Q3-base:1.26 pkgsrc-2005Q2:1.26.0.2 pkgsrc-2005Q2-base:1.26 pkgsrc-2005Q1:1.25.0.2 pkgsrc-2005Q1-base:1.25 pkgsrc-2004Q4:1.24.0.2 pkgsrc-2004Q4-base:1.24 pkgsrc-2004Q3:1.20.0.2 pkgsrc-2004Q3-base:1.20 pkgsrc-2004Q2:1.19.0.2 pkgsrc-2004Q2-base:1.19 pkgsrc-2004Q1:1.14.0.2 pkgsrc-2004Q1-base:1.14 pkgsrc-2003Q4:1.8.0.2 pkgsrc-2003Q4-base:1.8 netbsd-1-6-1:1.3.0.2 netbsd-1-6-1-base:1.3 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.111 date 2023.11.15.15.26.49; author nia; state Exp; branches; next 1.110; commitid TGvxtRXebkPwFIME; 1.110 date 2023.11.15.10.06.12; author adam; state Exp; branches; next 1.109; commitid sOCKHAzMk41mTGME; 1.109 date 2023.06.15.23.41.41; author riastradh; state Exp; branches; next 1.108; commitid 3y4oHsqnGiBkk6tE; 1.108 date 2023.04.07.09.15.55; author adam; state Exp; branches; next 1.107; commitid HBhh8VEEFfzDK9kE; 1.107 date 2022.09.18.08.50.59; author nros; state Exp; branches; next 1.106; commitid P223bXcOIX4R4kUD; 1.106 date 2022.03.29.07.16.00; author adam; state Exp; branches; next 1.105; commitid p79HieK0U1iO65yD; 1.105 date 2022.02.15.09.30.16; author wiz; state Exp; branches; next 1.104; commitid EkhnVUqgQTfNcHsD; 1.104 date 2021.08.30.15.53.43; author wiz; state Exp; branches; next 1.103; commitid wozg6bKfTc98L07D; 1.103 date 2021.04.21.08.28.31; author adam; state Exp; branches; next 1.102; commitid tazX29iPwYkjv8QC; 1.102 date 2021.02.18.10.58.08; author adam; state Exp; branches; next 1.101; commitid A0CPN587jMmbkbIC; 1.101 date 2021.01.29.12.10.03; author wiz; state Exp; branches; next 1.100; commitid AODdxpQ3DenBmCFC; 1.100 date 2021.01.25.09.59.50; author wiz; state Exp; branches; next 1.99; commitid qplMs4Kk5qdaM5FC; 1.99 date 2020.10.31.13.51.24; author wiz; state Exp; branches; next 1.98; commitid 4h4BMiObJvkPO3uC; 1.98 date 2020.07.17.23.22.49; author wiz; state Exp; branches; next 1.97; commitid NHc2yxyOw5MhougC; 1.97 date 2019.09.02.12.10.54; author nia; state Exp; branches; next 1.96; commitid 5nFKFxoZPWcrVqBB; 1.96 date 2018.11.02.23.08.29; author adam; state Exp; branches 1.96.6.1; next 1.95; commitid vIwGeKHX0XRGkqYA; 1.95 date 2018.06.20.06.18.53; author adam; state Exp; branches; next 1.94; commitid Zef3Y62cNbnu5ZGA; 1.94 date 2018.04.21.13.38.07; author wiz; state Exp; branches; next 1.93; commitid 0QhVHzZeuQ3OrjzA; 1.93 date 2017.12.14.08.49.54; author adam; state Exp; branches; next 1.92; commitid C83yApyhc1MXXPiA; 1.92 date 2017.08.27.12.38.36; author adam; state Exp; branches; next 1.91; commitid qgrXqlIZFwbIJQ4A; 1.91 date 2017.07.23.17.27.52; author adam; state Exp; branches; next 1.90; commitid dITFmKWBj5ifsn0A; 1.90 date 2017.07.04.06.55.53; author adam; state Exp; branches; next 1.89; commitid wwwUTy5mudKKzSXz; 1.89 date 2017.06.14.20.18.27; author wiz; state Exp; branches; next 1.88; commitid hjnC5vNjtZCYEnVz; 1.88 date 2017.01.22.12.55.29; author wiz; state Exp; branches; next 1.87; commitid 3tePeEKG4QS2OXCz; 1.87 date 2017.01.19.18.52.23; author agc; state Exp; branches; next 1.86; commitid ufZDMu4cgHZdRBCz; 1.86 date 2016.12.30.00.41.35; author wiz; state Exp; branches; next 1.85; commitid RIy9fEaxsrB7uWzz; 1.85 date 2016.12.12.14.19.39; author wiz; state Exp; branches; next 1.84; commitid OWt0gFSJjSHzAHxz; 1.84 date 2016.09.01.10.19.30; author fhajny; state Exp; branches; next 1.83; commitid jto6DMz0snQ6xzkz; 1.83 date 2016.08.20.19.22.37; author wiz; state Exp; branches; next 1.82; commitid dIhaaQWNTN0EV4jz; 1.82 date 2016.08.17.23.13.11; author maya; state Exp; branches; next 1.81; commitid RyIhL09eOJbKiIiz; 1.81 date 2016.07.16.08.35.52; author wiz; state Exp; branches; next 1.80; commitid 2BmJTV4u7FzDtwez; 1.80 date 2016.07.02.13.24.17; author wiz; state Exp; branches; next 1.79; commitid WMuqbLh5aFD8wKcz; 1.79 date 2016.06.17.11.56.13; author wiz; state Exp; branches 1.79.2.1; next 1.78; commitid VlGQ10gySxKawOaz; 1.78 date 2016.05.15.07.39.12; author ryoon; state Exp; branches; next 1.77; commitid cYWxKtdnKdoL9y6z; 1.77 date 2016.05.14.23.16.43; author ryoon; state Exp; branches; next 1.76; commitid bSsLm5pxCCRinv6z; 1.76 date 2016.04.22.08.28.46; author jperkin; state Exp; branches; next 1.75; commitid jMUVe3v7O7zV9B3z; 1.75 date 2016.04.18.06.19.57; author wiz; state Exp; branches; next 1.74; commitid uRjPFN3VWtinA43z; 1.74 date 2016.02.11.13.36.37; author wiz; state Exp; branches; next 1.73; commitid w1nCk7B2FATH9vUy; 1.73 date 2015.09.09.18.02.15; author wiz; state Exp; branches 1.73.4.1; next 1.72; commitid 5GDM4kkwvoEHBBAy; 1.72 date 2015.03.13.23.00.49; author wiz; state Exp; branches; next 1.71; commitid HdUDof2PgzrU2vdy; 1.71 date 2015.03.13.22.38.08; author gendalia; state Exp; branches; next 1.70; commitid w5eJ2XoIEdLxUudy; 1.70 date 2015.02.28.00.14.25; author wiz; state Exp; branches; next 1.69; commitid xnobY4hdelu2UHby; 1.69 date 2015.01.05.21.56.16; author wiz; state Exp; branches; next 1.68; commitid 5J1IU78pVFebQS4y; 1.68 date 2014.10.09.14.06.52; author wiz; state Exp; branches 1.68.2.1; next 1.67; commitid fBDATFVmQ3454xTx; 1.67 date 2014.08.29.14.22.59; author wiz; state Exp; branches; next 1.66; commitid 3zOOngPZ9F3xtgOx; 1.66 date 2014.08.29.10.29.14; author richard; state Exp; branches; next 1.65; commitid VoIaKmn7WzkZafOx; 1.65 date 2014.08.28.13.38.29; author jperkin; state Exp; branches; next 1.64; commitid vnIZWyVpbR9ug8Ox; 1.64 date 2014.08.21.19.55.08; author wiz; state Exp; branches; next 1.63; commitid ud9fXuZykMgLzgNx; 1.63 date 2014.08.21.19.41.38; author wiz; state Exp; branches; next 1.62; commitid ubDwBT9rjhJ4vgNx; 1.62 date 2014.07.18.10.36.28; author ryoon; state Exp; branches; next 1.61; commitid wA9paYezX4XMzQIx; 1.61 date 2014.02.03.16.51.35; author wiz; state Exp; branches; next 1.60; commitid gC3MXlKOZ7ajXFnx; 1.60 date 2014.01.07.17.18.29; author richard; state Exp; branches; next 1.59; commitid WIELMx1PahbSWckx; 1.59 date 2014.01.02.15.56.11; author richard; state Exp; branches; next 1.58; commitid BHV7HTc8BTPpDyjx; 1.58 date 2014.01.01.11.49.59; author wiz; state Exp; branches; next 1.57; commitid A7mx1NrjLvjllpjx; 1.57 date 2013.07.25.11.51.59; author wiz; state Exp; branches; next 1.56; commitid PKicXdP0G5CdvQYw; 1.56 date 2013.04.21.14.44.53; author wiz; state Exp; branches 1.56.2.1; next 1.55; 1.55 date 2013.04.10.15.17.55; author drochner; state Exp; branches; next 1.54; 1.54 date 2012.10.23.18.16.32; author asau; state Exp; branches; next 1.53; 1.53 date 2012.04.03.15.00.30; author adam; state Exp; branches; next 1.52; 1.52 date 2011.07.15.20.58.56; author drochner; state Exp; branches; next 1.51; 1.51 date 2011.07.13.21.21.52; author adam; state Exp; branches; next 1.50; 1.50 date 2011.04.22.13.42.47; author obache; state Exp; branches; next 1.49; 1.49 date 2011.02.19.00.55.31; author jmcneill; state Exp; branches; next 1.48; 1.48 date 2010.11.13.21.09.02; author shattered; state Exp; branches; next 1.47; 1.47 date 2010.07.23.06.39.03; author adam; state Exp; branches; next 1.46; 1.46 date 2009.12.18.18.54.24; author drochner; state Exp; branches; next 1.45; 1.45 date 2009.12.15.10.40.11; author wiz; state Exp; branches; next 1.44; 1.44 date 2009.05.19.08.59.31; author wiz; state Exp; branches; next 1.43; 1.43 date 2009.01.31.08.53.14; author adam; state Exp; branches; next 1.42; 1.42 date 2008.10.14.11.33.13; author adam; state Exp; branches; next 1.41; 1.41 date 2008.04.29.11.03.50; author wiz; state Exp; branches; next 1.40; 1.40 date 2008.03.07.16.16.22; author wiz; state Exp; branches; next 1.39; 1.39 date 2007.08.29.23.11.37; author wiz; state Exp; branches; next 1.38; 1.38 date 2007.04.28.17.46.21; author tnn; state Exp; branches; next 1.37; 1.37 date 2007.02.03.00.08.51; author wiz; state Exp; branches; next 1.36; 1.36 date 2007.01.30.06.53.32; author wiz; state Exp; branches; next 1.35; 1.35 date 2006.11.05.17.35.58; author joerg; state Exp; branches; next 1.34; 1.34 date 2006.10.04.21.58.14; author wiz; state Exp; branches; next 1.33; 1.33 date 2006.09.06.11.41.41; author markd; state Exp; branches; next 1.32; 1.32 date 2006.09.03.09.03.01; author wiz; state Exp; branches; next 1.31; 1.31 date 2006.08.27.14.23.23; author jdc; state Exp; branches; next 1.30; 1.30 date 2006.03.31.23.56.29; author jlam; state Exp; branches; next 1.29; 1.29 date 2006.03.04.21.30.34; author jlam; state Exp; branches; next 1.28; 1.28 date 2006.02.05.23.10.44; author joerg; state Exp; branches; next 1.27; 1.27 date 2005.10.06.12.20.41; author wiz; state Exp; branches; next 1.26; 1.26 date 2005.04.11.21.47.13; author tv; state Exp; branches; next 1.25; 1.25 date 2005.01.14.11.26.34; author adam; state Exp; branches; next 1.24; 1.24 date 2004.10.23.08.57.33; author shannonjr; state Exp; branches; next 1.23; 1.23 date 2004.10.19.17.43.23; author minskim; state Exp; branches; next 1.22; 1.22 date 2004.10.19.03.24.38; author ben; state Exp; branches; next 1.21; 1.21 date 2004.10.03.00.18.09; author tv; state Exp; branches; next 1.20; 1.20 date 2004.07.02.13.14.27; author jmmv; state Exp; branches; next 1.19; 1.19 date 2004.05.26.05.42.28; author tron; state Exp; branches; next 1.18; 1.18 date 2004.05.23.04.07.41; author snj; state Exp; branches; next 1.17; 1.17 date 2004.05.22.10.07.48; author adam; state Exp; branches; next 1.16; 1.16 date 2004.04.29.15.03.47; author wiz; state Exp; branches; next 1.15; 1.15 date 2004.03.29.07.42.16; author jlam; state Exp; branches; next 1.14; 1.14 date 2004.02.25.15.51.51; author minskim; state Exp; branches; next 1.13; 1.13 date 2004.02.14.17.21.52; author jlam; state Exp; branches; next 1.12; 1.12 date 2004.02.10.00.13.24; author jlam; state Exp; branches; next 1.11; 1.11 date 2004.02.05.00.09.51; author grant; state Exp; branches; next 1.10; 1.10 date 2003.12.21.09.57.14; author xtraeme; state Exp; branches; next 1.9; 1.9 date 2003.12.06.00.26.59; author xtraeme; state Exp; branches; next 1.8; 1.8 date 2003.11.02.19.57.51; author hubertf; state Exp; branches; next 1.7; 1.7 date 2003.08.09.11.21.57; author seb; state Exp; branches; next 1.6; 1.6 date 2003.08.05.10.14.22; author seb; state Exp; branches; next 1.5; 1.5 date 2003.07.17.22.52.57; author grant; state Exp; branches; next 1.4; 1.4 date 2003.05.13.03.07.10; author salo; state Exp; branches; next 1.3; 1.3 date 2003.02.08.23.01.02; author dmcmahill; state Exp; branches; next 1.2; 1.2 date 2003.02.02.22.00.24; author tron; state Exp; branches; next 1.1; 1.1 date 2003.02.02.17.27.48; author tron; state Exp; branches 1.1.1.1; next ; 1.96.6.1 date 2019.09.03.10.37.15; author bsiegert; state Exp; branches; next ; commitid OdAhg5uw5LKqnyBB; 1.79.2.1 date 2016.09.13.18.23.35; author bsiegert; state Exp; branches; next ; commitid ef3uLcbcp5EHP9mz; 1.73.4.1 date 2016.02.27.16.05.26; author bsiegert; state Exp; branches; next ; commitid QljsGlONTOtTszWy; 1.68.2.1 date 2015.03.09.19.37.10; author tron; state Exp; branches; next ; commitid gGdP4chQBvW03Ycy; 1.56.2.1 date 2013.07.26.09.18.09; author tron; state Exp; branches; next ; commitid Mrhrx0XkoyrsCXYw; 1.1.1.1 date 2003.02.02.17.27.48; author tron; state Exp; branches; next ; desc @@ 1.111 log @libgcrypt: Fix building on Darwin/ppc. @ text @# $NetBSD: Makefile,v 1.110 2023/11/15 10:06:12 adam Exp $ DISTNAME= libgcrypt-1.10.3 CATEGORIES= security MASTER_SITES= https://gnupg.org/ftp/gcrypt/libgcrypt/ EXTRACT_SUFX= .tar.bz2 MAINTAINER= pkgsrc-users@@NetBSD.org HOMEPAGE= https://gnupg.org/software/libgcrypt/ COMMENT= GNU cryptographic library LICENSE= gnu-gpl-v2 AND gnu-lgpl-v2.1 USE_LIBTOOL= yes GNU_CONFIGURE= yes TEST_TARGET= check TEXINFO_REQD= 4.0 INFO_FILES= yes .include "../../mk/compiler.mk" .if !empty(PKGSRC_COMPILER:Mclang) CFLAGS+= -fheinous-gnu-extensions .endif SUBST_CLASSES+= rpath SUBST_FILES.rpath= src/libgcrypt-config.in SUBST_STAGE.rpath= pre-configure SUBST_MESSAGE.rpath= Fixing rpath flags SUBST_VARS.rpath= COMPILER_RPATH_FLAG PKGCONFIG_OVERRIDE+= src/libgcrypt.pc.in .include "options.mk" .if ${USE_CROSS_COMPILE:tl} == "yes" CONFIGURE_ARGS+= CC_FOR_BUILD=${NATIVE_CC:Q} # libgpg-error installs scripts in the _target_ system, that are # expected to be run on the _build_ system when compiling downstream # dependencies like libgcrypt. I don't see a way to use pkg-config or # anything reasonable to override this, so, we do the nonsense thing # instead. CONFIGURE_ARGS+= GPGRT_CONFIG=${CROSS_DESTDIR:Q}${LOCALBASE}/bin/gpgrt-config CONFIGURE_ARGS+= GPG_ERROR_CONFIG=${CROSS_DESTDIR:Q}${LOCALBASE}/bin/gpg-error-config .endif .if ${OPSYS} == "Darwin" && ${OPSYS_VERSION} < 100500 . include "../../devel/macports-legacy-support/buildlink3.mk" .endif .if ${MACHINE_PLATFORM:MDarwin-*-powerpc} CPPFLAGS+= -D__powerpc__ .endif BUILDLINK_API_DEPENDS.libgpg-error+= libgpg-error>=1.13 .include "../../security/libgpg-error/buildlink3.mk" .include "../../mk/pthread.buildlink3.mk" .include "../../mk/bsd.pkg.mk" @ 1.110 log @libgcrypt: updated to 1.10.3 Noteworthy changes in version 1.10.3 (2023-11-14) ------------------------------------------------- * Bug fixes: - Fix public key computation for other EdDSA curves. - Remove out of core handler diagnostic in FIPS mode. - Check that the digest size is not zero in gcry_pk_sign_md and gcry_pk_verify_md. - Make store an s-exp with \0 is considered to be binary. - Various constant-time improvements. * Portability: - Use getrandom call only when supported by the platform. - Change the default for --with-libtool-modification to never. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.109 2023/06/15 23:41:41 riastradh Exp $ d47 8 @ 1.109 log @security/libgcrypt: Make this cross-compile. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.108 2023/04/07 09:15:55 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.10.2 d43 2 a44 2 CONFIGURE_ARGS+= GPGRT_CONFIG=${CROSS_DESTDIR:Q}${LOCALBASE:Q}/bin/gpgrt-config CONFIGURE_ARGS+= GPG_ERROR_CONFIG=${CROSS_DESTDIR:Q}${LOCALBASE:Q}/bin/gpg-error-config @ 1.108 log @libgcrypt: updated to 1.10.2 Noteworthy changes in version 1.10.2 (2023-04-06) [C24/A4/R2] ------------------------------------------------- * Bug fixes: - Fix Argon2 for the case output > 64. [rC13b5454d26] - Fix missing HWF_PPC_ARCH_3_10 in HW feature. [rCe073f0ed44] - Fix RSA key generation failure in forced FIPS mode. [T5919] - Fix gcry_pk_hash_verify for explicit hash. [T6066] - Fix a wrong result of gcry_mpi_invm. [T5970] - Allow building with --disable-asm for HPPA. [T5976] - Fix Jitter RNG for building native on Windows. [T5891] - Allow building with -Oz. [T6432] - Enable the fast path to ChaCha20 only when supported. [T6384] - Use size_t to avoid counter overflow in Keccak when directly feeding more than 4GiB. [T6217] * Other: - Do not use secure memory for a DRBG instance. [T5933] - Do not allow PKCS#1.5 padding for encryption in FIPS mode. [T5918] - Fix the behaviour for child process re-seeding in the DRBG. [rC019a40c990] - Allow verification of small RSA signatures in FIPS mode. [T5975] - Allow the use of a shorter salt for KDFs in FIPS mode. [T6039] - Run digest+sign self tests for RSA and ECC in FIPS mode. [rC06c9350165] - Add function-name based FIPS indicator function. GCRYCTL_FIPS_SERVICE_INDICATOR_FUNCTION. This is not considered an ABI changes because the new FIPS features were not yet approved. [rC822ee57f07] - Improve PCT in FIPS mode. [rC285bf54b1a, rC4963c127ae, T6397] - Use getrandom (GRND_RANDOM) in FIPS mode. [rCcf10c74bd9] - Disable RSA-OAEP padding in FIPS mode. [rCe5bfda492a] - Check minimum allowed key size in PBKDF in FIPS mode. [T6039,T6219] - Get maximum 32B of entropy at once in FIPS mode. [rCce0df08bba] - Prefer gpgrt-config when available. [T5034] - Mark AESWRAP as approved FIPS algorithm. [T5512] - Prevent usage of long salt for PSS in FIPS mode. [rCfdd2a8b332] - Prevent usage of X9.31 keygen in FIPS mode. [rC392e0ccd25] - Remove GCM mode from the allowed FIPS indicators. [rC1540698389] - Add explicit FIPS indicators for hash and MAC algorithms. [T6376] @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.107 2022/09/18 08:50:59 nros Exp $ d35 12 @ 1.107 log @Add missing pkg-config override for libgcrypt @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.106 2022/03/29 07:16:00 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.10.1 @ 1.106 log @libgcrypt: updated to 1.10.1 Noteworthy changes in version 1.10.1 (2022-03-28) ------------------------------------------------- * Bug fixes: - Fix minor memory leaks in FIPS mode. - Build fixes for MUSL libc. * Other: - More portable integrity check in FIPS mode. - Add X9.62 OIDs to sha256 and sha512 modules. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.105 2022/02/15 09:30:16 wiz Exp $ d31 2 @ 1.105 log @libgcrypt: update to 1.10.0. Noteworthy changes in version 1.10.0 (2022-02-01) [C24/A4/R0] ------------------------------------------------- * New and extended interfaces: - New control codes to check for FIPS 140-3 approved algorithms. - New control code to switch into non-FIPS mode. - New cipher modes SIV and GCM-SIV as specified by RFC-5297. - Extended cipher mode AESWRAP with padding as specified by RFC-5649. [T5752] - New set of KDF functions. - New KDF modes Argon2 and Balloon. - New functions for combining hashing and signing/verification. [T4894] * Performance: - Improved support for PowerPC architectures. - Improved ECC performance on zSeries/s390x by using accelerated scalar multiplication. - Many more assembler performance improvements for several architectures. * Bug fixes: - Fix Elgamal encryption for other implementations. [R5328,CVE-2021-40528] - Fix alignment problem on macOS. [T5440] - Check the input length of the point in ECDH. [T5423] - Fix an abort in gcry_pk_get_param for "Curve25519". [T5490] * Other features: - The control code GCRYCTL_SET_ENFORCED_FIPS_FLAG is ignored because it is useless with the FIPS 140-3 related changes. - Update of the jitter entropy RNG code. [T5523] - Simplification of the entropy gatherer when using the getentropy system call. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.104 2021/08/30 15:53:43 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.10.0 @ 1.104 log @libgcrypt: update to 1.9.4. Noteworthy changes in version 1.9.4 (2021-08-22) [C23/A3/R4] ------------------------------------------------ * Bug fixes: - Fix Elgamal encryption for other implementations. [#5328,CVE-2021-33560] - Fix alignment problem on macOS. [#5440] - Check the input length of the point in ECDH. [#5423] - Fix an abort in gcry_pk_get_param for "Curve25519". [#5490] * Other features: - Add GCM and CCM to OID mapping table for AES. [a83fb13a3b] @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.103 2021/04/21 08:28:31 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.9.4 @ 1.103 log @libgcrypt: updated to 1.9.3 Noteworthy changes in version 1.9.3 (2021-04-19) ------------------------------------------------ * Bug fixes: - Fix build problems on i386 using gcc-4.7. - Fix checksum calculation in OCB decryption for AES on s390. - Fix a regression in gcry_mpi_ec_add related to certain usages of curve 25519. - Fix a symbol not found problem on Apple M1. - Fix for Apple iOS getentropy peculiarity. - Make keygrip computation work for compressed points. * Performance: - Add x86_64 VAES/AVX2 accelerated implementation of Camellia. - Add x86_64 VAES/AVX2 accelerated implementation of AES. - Add VPMSUMD acceleration for GCM mode on PPC. * Internal changes. - Harden MPI conditional code against EM leakage. - Harden Elgamal by introducing exponent blinding. - Fix memory leaks in the error code paths of EdDSA. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.102 2021/02/18 10:58:08 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.9.3 @ 1.102 log @libgcrypt: updated to 1.9.2 Noteworthy changes in version 1.9.2 (2021-02-17) ------------------------------------------------ * Bug fixes: - Fix build problem for macOS in the random code. - Fix building with --disable-asm on x86. - Check public key for ECDSA verify operation. - Make sure gcry_get_config (NULL) returns a nul-terminated string. - Fix a memory leak in the ECDH code. - Fix a reading beyond end of input buffer in SHA2-avx2. * Other features: - New test driver to allow for standalone regression tests. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.101 2021/01/29 12:10:03 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.9.2 a14 1 a15 1 a18 1 .include "../../mk/bsd.prefs.mk" a20 20 #.if empty(MACHINE_PLATFORM:MNetBSD-*-i386) && \ # empty(MACHINE_PLATFORM:MNetBSD-*-alpha) && \ # empty(MACHINE_PLATFORM:MNetBSD-*-sparc) && \ # empty(MACHINE_PLATFORM:M*-*-hppa) #CONFIGURE_ARGS+= --disable-asm #.endif #CONFIGURE_ARGS+= --disable-aesni-support #.if !empty(MACHINE_PLATFORM:MLinux-*-i386) || \ # !empty(MACHINE_PLATFORM:MSunOS-*-i386) #CONFIGURE_ARGS+= --disable-pclmul-support #.endif # SCO OpenServer 5.0.7/3.2 has no socklen_t, but it is defined in pthread.h # from builtin GNU pth. #.if ${OS_VARIANT} == "SCOOSR5" #CONFIGURE_ENV+= ac_cv_type_socklen_t=yes #CONFIGURE_ENV+= gl_cv_socklen_t_equiv=int #.endif a24 8 #.if (${MACHINE_ARCH} == "x86_64") #. if !empty(CC_VERSION:Mgcc-4.[45].*) #CONFIGURE_ARGS+= --disable-avx2-support #CONFIGURE_ARGS+= --disable-avx-support #CONFIGURE_ENV+= gcry_cv_gcc_inline_asm_avx=no #. endif #.endif @ 1.101 log @libgcrypt: update to 1.9.1. Comment out some old workarounds for configure script/compiler issues, and trust the upstream configure script again until proven wrong. Remove hacks.mk, the grep does not match anything any longer. Noteworthy changes in version 1.9.1 (2021-01-29) [C23/A3/R1] ------------------------------------------------ * Bug fixes: - Fix exploitable bug in hash functions introduced with 1.9.0. [#5275] - Return an error if a negative MPI is used with sexp scan functions. [#4964] - Check for operational FIPS in the random and KDF functions. [#5243] - Fix compile error on ARMv7 with NEON disabled. [#5251] - Fix self-test in KDF module. [#5254] - Improve assembler checks for better LTO support. [#5255] - Fix assember problem on macOS running on M1. [#5157] - Support older macOS without posix_spawn. [#5159] - Fix 32-bit cross build on x86. [#5257] - Fix non-NEON ARM assembly implementation for SHA512. [#5263] - Fix build problems with the cipher_bulk_ops_t typedef. [#5264] - Fix Ed25519 private key handling for preceding ZEROs. [#5267] - Fix overflow in modular inverse implementation. [#5269] - Fix register access for AVX/AVX2 implementations of Blake2. [#5271]. * Performance: - Add optimized cipher and hash functions for s390x/zSeries. - Use hardware bit counting functionx when available. * Internal changes: - The macOS getentropy syscall is used when available. [#5268] - Update DSA functions to match FIPS 186-3. [30ed9593f6] - New self-tests for CMACs and KDFs. [385a89e35b,7a0da24925] - Add bulk cipher functions for OFB and GCM modes. [f12b6788f2,f4e63e92dc] Release-info: https://dev.gnupg.org/T5259 @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.100 2021/01/25 09:59:50 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.9.1 @ 1.100 log @libgcrypt: update to 1.9.0. Noteworthy changes in version 1.9.0 (2021-01-19) [C23/A3/R0] ------------------------------------------------ * New and extended interfaces: - New curves Ed448, X448, and SM2. - New cipher mode EAX. - New cipher algo SM4. - New hash algo SM3. - New hash algo variants SHA512/224 and SHA512/256. - New MAC algos for Blake-2 algorithms, the new SHA512 variants, SM3, SM4 and for a GOST variant. - New convenience function gcry_mpi_get_ui. - gcry_sexp_extract_param understands new format specifiers to directly store to integers and strings. - New function gcry_ecc_mul_point and curve constants for Curve448 and Curve25519. [#4293] - New function gcry_ecc_get_algo_keylen. - New control code GCRYCTL_AUTO_EXPAND_SECMEM to allow growing the secure memory area. Also in 1.8.2 as an undocumented feature. * Performance: - Optimized implementations for Aarch64. - Faster implementations for Poly1305 and ChaCha. Also for PowerPC. [b9a471ccf5,172ad09cbe,#4460] - Optimized implementations of AES and SHA-256 on PowerPC. [#4529,#4530] - Improved use of AES-NI to speed up AES-XTS (6 times faster). [a00c5b2988] - Improved use of AES-NI for OCB. [eacbd59b13,e924ce456d] - Speedup AES-XTS on ARMv8/CE (2.5 times faster). [93503c127a] - New AVX and AVX2 implementations for Blake-2 (1.3/1.4 times faster). [af7fc732f9, da58a62ac1] - Use Intel SHA extension for SHA-1 and SHA-256 (4.0/3.7 times faster). [d02958bd30, 0b3ec359e2] - Use ARMv7/NEON accelerated GCM implementation (3 times faster). [2445cf7431] - Use of i386/SSSE3 for SHA-512 (4.5 times faster on Ryzen 7). [b52dde8609] - Use 64 bit ARMv8/CE PMULL for CRC (7 times faster). [14c8a593ed] - Improve CAST5 (40% to 70% faster). [4ec566b368] - Improve Blowfish (60% to 80% faster). [ced7508c85] * Bug fixes: - Fix infinite loop due to applications using fork the wrong way. [#3491][also in 1.8.4] - Fix possible leak of a few bits of secret primes to pageable memory. [#3848][also in 1.8.4] - Fix possible hang in the RNG (1.8.3 only). [#4034][also in 1.8.4] - Several minor fixes. [#4102,#4208,#4209,#4210,#4211,#4212] [also in 1.8.4] - On Linux always make use of getrandom if possible and then use its /dev/urandom behaviour. [#3894][also in 1.8.4] - Use blinding for ECDSA signing to mitigate a novel side-channel attack. [#4011,CVE-2018-0495] [also in 1.8.3, 1.7.10] - Fix incorrect counter overflow handling for GCM when using an IV size other than 96 bit. [#3764] [also in 1.8.3, 1.7.10] - Fix incorrect output of AES-keywrap mode for in-place encryption on some platforms. [also in 1.8.3, 1.7.10] - Fix the gcry_mpi_ec_curve_point point validation function. [also in 1.8.3, 1.7.10] - Fix rare assertion failure in gcry_prime_check. [also in 1.8.3] - Do not use /dev/srandom on OpenBSD. [also in 1.8.2] - Fix test suite failure on systems with large pages. [#3351] [also in 1.8.2] - Fix test suite to not use mmap on Windows. [also in 1.8.2] - Fix fatal out of secure memory status in the s-expression parser on heavy loaded systems. [also in 1.8.2] - Fix build problems on OpenIndiana et al. [#4818, also in 1.8.6] - Fix GCM bug on arm64 which troubles for example OMEMO. [#4986, also in 1.8.6] - Detect a div-by-zero in a debug helper tool. [#4868, also in 1.8.6] - Use a constant time mpi_inv and related changes. [#4869, partly also in 1.8.6] - Fix mpi_copy to correctly handle flags of opaque MPIs. [also in 1.8.6] - Fix mpi_cmp to consider +0 and -0 the same. [also in 1.8.6] - Fix extra entropy collection via clock_gettime. Note that this fallback code path is not used on any decent hardware. [#4966, also in 1.8.7] - Support opaque MPI with gcry_mpi_print. [#4872, also in 1.8.7] - Allow for a Unicode random seed file on Windows. [#5098, also in 1.8.7] * Other features: - Add OIDs from RFC-8410 as aliases for Ed25519 and Curve25519. [also in 1.8.6] - Add mitigation against ECC timing attack CVE-2019-13626. [#4626] - Internal cleanup of the ECC implementation. - Support reading EC point in compressed format for some curves. [#4951] @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.99 2020/10/31 13:51:24 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.9.0 d24 12 a35 12 .if empty(MACHINE_PLATFORM:MNetBSD-*-i386) && \ empty(MACHINE_PLATFORM:MNetBSD-*-alpha) && \ empty(MACHINE_PLATFORM:MNetBSD-*-sparc) && \ empty(MACHINE_PLATFORM:M*-*-hppa) CONFIGURE_ARGS+= --disable-asm .endif CONFIGURE_ARGS+= --disable-aesni-support .if !empty(MACHINE_PLATFORM:MLinux-*-i386) || \ !empty(MACHINE_PLATFORM:MSunOS-*-i386) CONFIGURE_ARGS+= --disable-pclmul-support .endif d39 4 a42 4 .if ${OS_VARIANT} == "SCOOSR5" CONFIGURE_ENV+= ac_cv_type_socklen_t=yes CONFIGURE_ENV+= gl_cv_socklen_t_equiv=int .endif d48 7 a54 7 .if (${MACHINE_ARCH} == "x86_64") . if !empty(CC_VERSION:Mgcc-4.[45].*) CONFIGURE_ARGS+= --disable-avx2-support CONFIGURE_ARGS+= --disable-avx-support CONFIGURE_ENV+= gcry_cv_gcc_inline_asm_avx=no . endif .endif @ 1.99 log @libgcrypt: update to 1.8.7. Noteworthy changes in version 1.8.7 (2020-10-23) [C22/A2/R8] ------------------------------------------------ * Bug fixes: - Support opaque MPI with gcry_mpi_print. [#4872] - Fix extra entropy collection via clock_gettime. Note that this fallback code path is not used on any decent hardware. [#4966] - Allow for a Unicode random seed file on Windows. [#5098] @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.98 2020/07/17 23:22:49 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.8.7 @ 1.98 log @libgcrypt: update to 1.8.6. Noteworthy changes in version 1.8.6 (2020-07-06) [C22/A2/R6] ------------------------------------------------ * Bug fixes: - Fix build problems on OpenIndiana et al. [#4818] - Fix GCM bug on arm64 which troubles for example OMEMO. [#4986] - Fix wrong code execution in Poly1305 ARM/NEON implementation. [#4833] - Detect a div-by-zero in a debug helper tool. [#4868] - Use a constant time mpi_inv in some cases and change the order mpi_invm is called. [#4869] - Fix mpi_copy to correctly handle flags of opaque MPIs. - Fix mpi_cmp to consider +0 and -0 the same. * Other features: - Add OIDs from RFC-8410 as aliases for Ed25519 and Curve25519. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.97 2019/09/02 12:10:54 nia Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.8.6 @ 1.97 log @libgcrypt: Update to 1.8.5 Noteworthy changes in version 1.8.5 (2019-08-29) [C22/A2/R5] ------------------------------------------------ * Bug fixes: - Add mitigation against an ECDSA timing attack. [#4626,CVE-2019-13627] - Improve ECDSA unblinding. * Other features: - Provide a pkg-config file for libgcrypt. Release-info: https://dev.gnupg.org/T4683 @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.96 2018/11/02 23:08:29 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.8.5 @ 1.96 log @libgcrypt: updated to 1.8.4 Noteworthy changes in version 1.8.4: * Bug fixes: - Fix infinite loop due to applications using fork the wrong way. - Fix possible leak of a few bits of secret primes to pageable memory. - Fix possible hang in the RNG (1.8.3 only). - Several minor fixes. * Performance: - On Linux always make use of getrandom if possible and then use its /dev/urandom behaviour. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.95 2018/06/20 06:18:53 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.8.4 d5 1 a5 1 MASTER_SITES= ftp://ftp.gnupg.org/gcrypt/libgcrypt/ d9 1 a9 1 HOMEPAGE= https://www.gnu.org/software/libgcrypt/ @ 1.96.6.1 log @Pullup ticket #6035 - requested by nia security/libgcrypt: security fix Revisions pulled up: - security/libgcrypt/Makefile 1.97 - security/libgcrypt/PLIST 1.12 - security/libgcrypt/distinfo 1.82 --- Module Name: pkgsrc Committed By: nia Date: Mon Sep 2 12:10:54 UTC 2019 Modified Files: pkgsrc/security/libgcrypt: Makefile PLIST distinfo Log Message: libgcrypt: Update to 1.8.5 Noteworthy changes in version 1.8.5 (2019-08-29) [C22/A2/R5] ------------------------------------------------ * Bug fixes: - Add mitigation against an ECDSA timing attack. [#4626,CVE-2019-13627] - Improve ECDSA unblinding. * Other features: - Provide a pkg-config file for libgcrypt. Release-info: https://dev.gnupg.org/T4683 @ text @d1 1 a1 1 # $NetBSD$ d3 1 a3 1 DISTNAME= libgcrypt-1.8.5 d5 1 a5 1 MASTER_SITES= https://gnupg.org/ftp/gcrypt/libgcrypt/ d9 1 a9 1 HOMEPAGE= https://gnupg.org/software/libgcrypt/ @ 1.95 log @libgcrypt: updated to 1.8.3 version 1.8.3: Bug fixes: - Use blinding for ECDSA signing to mitigate a novel side-channel attack. - Fix incorrect counter overflow handling for GCM when using an IV size other than 96 bit. - Fix incorrect output of AES-keywrap mode for in-place encryption on some platforms. - Fix the gcry_mpi_ec_curve_point point validation function. - Fix rare assertion failure in gcry_prime_check. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.94 2018/04/21 13:38:07 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.8.3 @ 1.94 log @*: gd.tuwien.ac.at/ftp.tuwien.ac.at is gone, remove it from various mastersites @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.93 2017/12/14 08:49:54 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.8.2 @ 1.93 log @libgcrypt: updated to 1.8.2 Noteworthy changes in version 1.8.2: * Bug fixes: - Do not use /dev/srandom on OpenBSD. - Fix test suite failure on systems with large pages. - Fix test suite to not use mmap on Windows. - Fix fatal out of secure memory status in the s-expression parser on heavy loaded systems. * Other: - Backport the auto expand secmem feature from master for use by the forthcoming GnuPG 2.2.4. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.92 2017/08/27 12:38:36 adam Exp $ a5 1 MASTER_SITES+= http://gd.tuwien.ac.at/privacy/gnupg/libgcrypt/ @ 1.92 log @version 1.8.1: Bug fixes: - Mitigate a local side-channel attack on Curve25519 dubbed "May the Fourth be With You". [CVE-2017-0379] [also in 1.7.9] - Add more extra bytes to the pool after reading a seed file. - Add the OID SHA384WithECDSA from RFC-7427 to SHA-384. - Fix build problems with the Jitter RNG - Fix assembler code build problems on Rasbian (ARMv8/AArch32-CE). @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.91 2017/07/23 17:27:52 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.8.1 d20 1 a20 1 INFO_FILES= yes # PLIST @ 1.91 log @version 1.8.0: * New interfaces: - New cipher mode XTS - New hash function Blake-2 - New function gcry_mpi_point_copy. - New function gcry_get_config. - GCRYCTL_REINIT_SYSCALL_CLAMP allows to init nPth after Libgcrypt. - New gobal configuration file /etc/gcrypt/random.conf. * Extended interfaces: - GCRYCTL_PRINT_CONFIG does now also print build information for libgpg-error and the used compiler version. - GCRY_CIPHER_MODE_CFB8 is now supported. - Add Stribog OIDs. * Performance: - A jitter based entropy collector is now used in addition to the other entropy collectors. - Optimized gcry_md_hash_buffers for SHA-256 and SHA-512. - More ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1. - Add ARMv8/AArch32 assembly implementation for Twofish and Camellia. - Add bulk processing implementation for ARMv8/AArch32. - Improve the DRBG performance and sync the code with the Linux version. * Internal changes: - Libgpg-error 1.25 is now required. This avoids stalling of nPth threads due to contention on internal Libgcrypt locks (e.g. the random pool lock). - The system call clamp of libgpg-error is now used to wrap the blocking read of /dev/random. This allows other nPth threads to run while Libgcrypt is gathering entropy. - When secure memory is requested by the MPI functions or by gcry_xmalloc_secure, they do not anymore lead to a fatal error if the secure memory pool is used up. Instead new pools are allocated as needed. These new pools are not protected against being swapped out (mlock can't be used). However, these days this is considered a minor issue and can easily be mitigated by using encrypted swap space. * Bug fixes: - Fix AES CTR self-check detected failure in the SSSE3 based implementation. - Remove gratuitous select before the getrandom syscall. - Fix regression in mlock detection. - Fix GOST 28147 CryptoPro-B S-box. - Fix error code handling of mlock calls. - Fix possible timing attack on EdDSA session key. - Fix long standing bug in secure memory implementation which could lead to a segv on free. - Mitigate a flush+reload side-channel attack on RSA secret keys dubbed "Sliding right into disaster". @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.90 2017/07/04 06:55:53 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.8.0 @ 1.90 log @changes in version 1.7.8: Bug fixes: - Mitigate a flush+reload side-channel attack on RSA secret keys dubbed "Sliding right into disaster". For details see . [CVE-2017-7526] @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.89 2017/06/14 20:18:27 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.7.8 @ 1.89 log @Updated libgcrypt to 1.7.7. Noteworthy changes in version 1.7.7 (2017-06-02) [C21/A1/R7] ------------------------------------------------ * Bug fixes: - Fix possible timing attack on EdDSA session key. - Fix long standing bug in secure memory implementation which could lead to a segv on free. [bug#3027] @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.88 2017/01/22 12:55:29 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.7.7 @ 1.88 log @Updated libgcrypt to 1.7.6. All tests pass. Noteworthy changes in version 1.7.6 (2017-01-18) [C21/A1/R6] ------------------------------------------------ * Bug fixes: - Fix AES CTR self-check detected failure in the SSSE3 based implementation. - Remove gratuitous select before the getrandom syscall. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.87 2017/01/19 18:52:23 agc Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.7.6 @ 1.87 log @Convert all occurrences (353 by my count) of MASTER_SITES= site1 \ site2 style continuation lines to be simple repeated MASTER_SITES+= site1 MASTER_SITES+= site2 lines. As previewed on tech-pkg. With thanks to rillig for fixing pkglint accordingly. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.86 2016/12/30 00:41:35 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.7.5 @ 1.86 log @Updated libgcrypt to 1.7.5. Noteworthy changes in version 1.7.5 (2016-12-15) [C21/A1/R5] ------------------------------------------------ * Bug fixes: - Fix regression in mlock detection [bug#2870]. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.85 2016/12/12 14:19:39 wiz Exp $ d5 2 a6 2 MASTER_SITES= ftp://ftp.gnupg.org/gcrypt/libgcrypt/ \ http://gd.tuwien.ac.at/privacy/gnupg/libgcrypt/ @ 1.85 log @Updated libgcrypt to 1.7.4. Noteworthy changes in version 1.7.4 (2016-12-09) [C21/A1/R4] ------------------------------------------------ * Performance: - More ARMv8/AArch32 improvements for AES, GCM, SHA-256, and SHA-1. - Add ARMv8/AArch32 assembly implementation for Twofish and Camellia. - Add bulk processing implementation for ARMv8/AArch32. - Add Stribog OIDs. - Improve the DRBG performance and sync the code with the Linux version. * Internal changes: - When secure memory is requested by the MPI functions or by gcry_xmalloc_secure, they do not anymore lead to a fatal error if the secure memory pool is used up. Instead new pools are allocated as needed. These new pools are not protected against being swapped out (mlock can't be used). However, these days this is considered a minor issue and can easily be mitigated by using encrypted swap space. * Bug fixes: - Fix GOST 28147 CryptoPro-B S-box. - Fix error code handling of mlock calls. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.84 2016/09/01 10:19:30 fhajny Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.7.4 @ 1.84 log @Use COMPILER_RPATH_FLAG properly. Reconciles libgcrypt-config with Darwin linker. Fixes joyent/pkgsrc#400. Bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.83 2016/08/20 19:22:37 wiz Exp $ d3 1 a3 2 DISTNAME= libgcrypt-1.7.3 PKGREVISION= 1 @ 1.83 log @Depends on libgpg-error-1.13. From David H. Gutteridge in PR 51430. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.82 2016/08/17 23:13:11 maya Exp $ d4 1 d58 6 @ 1.82 log @Update libgcrypt to 1.7.3 Changelog: 2016-08-17 Werner Koch Release 1.7.3. * configure.ac: Set LT version to C21/A1/R3. random: Hash continuous areas in the csprng pool. * random/random-csprng.c (mix_pool): Store the first hash at the end of the pool. random: Improve the diagram showing the random mixing. * random/random-csprng.c (mix_pool): Use DIGESTLEN instead of 20. 2016-07-19 Jussi Kivilinna crc-intel-pclmul: split assembly block to ease register pressure. * cipher/crc-intel-pclmul.c (crc32_less_than_16): Split inline assembly block handling 4 byte input into multiple blocks. rijndael-aesni: split assembly block to ease register pressure. * cipher/rijndael-aesni.c (do_aesni_ctr_4): Use single register constraint for passing 'bige_addb' to assembly block; split first inline assembly block into two parts. 2016-07-14 Jussi Kivilinna Add ARMv8/AArch32 Crypto Extension implementation of AES. * cipher/Makefile.am: Add 'rijndael-armv8-ce.c' and 'rijndael-armv-aarch32-ce.S'. * cipher/rijndael-armv8-aarch32-ce.S: New. * cipher/rijndael-armv8-ce.c: New. * cipher/rijndael-internal.h (USE_ARM_CE): New. (RIJNDAEL_context_s): Add 'use_arm_ce'. * cipher/rijndael.c [USE_ARM_CE] (_gcry_aes_armv8_ce_setkey) (_gcry_aes_armv8_ce_prepare_decryption) (_gcry_aes_armv8_ce_encrypt, _gcry_aes_armv8_ce_decrypt) (_gcry_aes_armv8_ce_cfb_enc, _gcry_aes_armv8_ce_cbc_enc) (_gcry_aes_armv8_ce_ctr_enc, _gcry_aes_armv8_ce_cfb_dec) (_gcry_aes_armv8_ce_cbc_dec, _gcry_aes_armv8_ce_ocb_crypt) (_gcry_aes_armv8_ce_ocb_auth): New. (do_setkey) [USE_ARM_CE]: Add ARM CE/AES HW feature check and key setup for ARM CE. (prepare_decryption, _gcry_aes_cfb_enc, _gcry_aes_cbc_enc) (_gcry_aes_ctr_enc, _gcry_aes_cfb_dec, _gcry_aes_cbc_dec) (_gcry_aes_ocb_crypt, _gcry_aes_ocb_auth) [USE_ARM_CE]: Add ARM CE support. * configure.ac: Add 'rijndael-armv8-ce.lo' and 'rijndael-armv8-aarch32-ce.lo'. Add ARMv8/AArch32 Crypto Extension implementation of GCM. * cipher/Makefile.am: Add 'cipher-gcm-armv8-aarch32-ce.S'. * cipher/cipher-gcm-armv8-aarch32-ce.S: New. * cipher/cipher-gcm.c [GCM_USE_ARM_PMULL] (_gcry_ghash_setup_armv8_ce_pmull, _gcry_ghash_armv8_ce_pmull) (ghash_setup_armv8_ce_pmull, ghash_armv8_ce_pmull): New. (setupM) [GCM_USE_ARM_PMULL]: Enable ARM PMULL implementation if HWF_ARM_PULL HW feature flag is enabled. * cipher/cipher-gcm.h (GCM_USE_ARM_PMULL): New. Add ARMv8/AArch32 Crypto Extension implemenation of SHA-256. * cipher/Makefile.am: Add 'sha256-armv8-aarch32-ce.S'. * cipher/sha256-armv8-aarch32-ce.S: New. * cipher/sha256.c (USE_ARM_CE): New. (sha256_init, sha224_init): Check features for HWF_ARM_SHA1. [USE_ARM_CE] (_gcry_sha256_transform_armv8_ce): New. (transform) [USE_ARM_CE]: Use ARMv8 CE implementation if HW supports. (SHA256_CONTEXT): Add 'use_arm_ce'. * configure.ac: Add 'sha256-armv8-aarch32-ce.lo'. Add ARMv8/AArch32 Crypto Extension implementation of SHA-1. * cipher/Makefile.am: Add 'sha1-armv8-aarch32-ce.S'. * cipher/sha1-armv7-neon.S (_gcry_sha1_transform_armv7_neon): Add missing size. * cipher/sha1-armv8-aarch32-ce.S: New. * cipher/sha1.c (USE_ARM_CE): New. (sha1_init): Check features for HWF_ARM_SHA1. [USE_ARM_CE] (_gcry_sha1_transform_armv8_ce): New. (transform) [USE_ARM_CE]: Use ARMv8 CE implementation if HW supports it. * cipher/sha1.h (SHA1_CONTEXT): Add 'use_arm_ce'. * configure.ac: Add 'sha1-armv8-aarch32-ce.lo'. Add HW feature check for ARMv8 AArch64 and crypto extensions. * configure.ac: Add '--disable-arm-crypto-support'; enable hwf-arm module on 64-bit ARM. (armcryptosupport, gcry_cv_gcc_inline_aarch32_crypto) (gcry_cv_inline_asm_aarch64_neon) (gcry_cv_gcc_inline_asm_aarch64_crypto): New. * src/g10lib.h (HWF_ARM_AES, HWF_ARM_SHA1, HWF_ARM_SHA2) (HWF_ARM_PMULL): New. * src/hwf-arm.c [__aarch64__]: Enable building in AArch64 mode. (feature_map_s): New. [__arm__] (AT_HWCAP, AT_HWCAP2, HWCAP2_AES, HWCAP2_PMULL) (HWCAP2_SHA1, HWCAP2_SHA2, arm_features): New. [__aarch64__] (AT_HWCAP, AT_HWCAP2, HWCAP_ASIMD, HWCAP_AES) (HWCAP_PMULL, HWCAP_SHA1, HWCAP_SHA2, arm_features): New. (get_hwcap): Add reading of 'AT_HWCAP2'; Change auxv use 'unsigned long'. (detect_arm_at_hwcap): Add mapping of HWCAP/HWCAP2 to HWF flags. (detect_arm_proc_cpuinfo): Add mapping of CPU features to HWF flags. (_gcry_hwf_detect_arm): Use __ARM_NEON instead of legacy __ARM_NEON__. * src/hwfeatures.c (hwflist): Add 'arm-aes', 'arm-sha1', 'arm-sha2' and 'arm-pmull'. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.81 2016/07/16 08:35:52 wiz Exp $ d59 1 a59 1 BUILDLINK_API_DEPENDS.libgpg-error+= libgpg-error>=1.11 @ 1.81 log @Updated libgcrypt to 1.7.2. Noteworthy changes in version 1.7.2 (2016-07-14) [C21/A1/R2] ------------------------------------------------ * Bug fixes: - Fix setting of the ECC cofactor if parameters are specified. - Fix memory leak in the ECC code. - Remove debug message about unsupported getrandom syscall. - Fix build problems related to AVX use. - Fix bus errors on ARM for Poly1305, ChaCha20, AES, and SHA-512. * Internal changes: - Improved fatal error message for wrong use of gcry_md_read. - Disallow symmetric encryption/decryption if key is not set. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.80 2016/07/02 13:24:17 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.7.2 @ 1.80 log @Fix assembler problems on ARM. Patches by Michael Plass on tech-pkg/port-arm. Bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.79 2016/06/17 11:56:13 wiz Exp $ d3 1 a3 2 DISTNAME= libgcrypt-1.7.1 PKGREVISION= 1 @ 1.79 log @Updated libgcrypt to 1.7.1. Noteworthy changes in version 1.7.1 (2016-06-15) [C21/A1/R1] ------------------------------------------------ * Bug fixes: - Fix ecc_verify for cofactor support. - Fix portability bug when using gcc with Solaris 9 SPARC. - Build fix for OpenBSD/amd64 - Add OIDs to the Serpent ciphers. * Internal changes: - Use getrandom system call on Linux if available. - Blinding is now also used for RSA signature creation. - Changed names of debug envvars @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.78 2016/05/15 07:39:12 ryoon Exp $ d4 1 @ 1.79.2.1 log @Pullup ticket #5100 - requested by maya security/gnupg: security fix security/libgcrypt: security fix, build fix Revisions pulled up: - security/gnupg/Makefile 1.134 - security/gnupg/distinfo 1.70 - security/libgcrypt/Makefile 1.82-1.84 - security/libgcrypt/buildlink3.mk 1.18 - security/libgcrypt/distinfo 1.67-1.68 - security/libgcrypt/patches/patch-aa 1.9 --- Module Name: pkgsrc Committed By: maya Date: Wed Aug 17 23:05:19 UTC 2016 Modified Files: pkgsrc/security/gnupg: Makefile distinfo Log Message: Update gnupg to 1.4.21 Changelog: 2016-08-17 Werner Koch Release 1.4.21. gpg: Add dummy option --with-subkey-fingerprint. * g10/gpg.c (opts): Add dummy option. build: Create a swdb file during "make distcheck". * Makefile.am (distcheck-hook): New. 2016-08-17 Ineiev po: Update Russian translation. 2016-08-17 Werner Koch random: Hash continuous areas in the csprng pool. * cipher/random.c (mix_pool): Store the first hash at the end of the pool. cipher: Improve readability by using a macro. * cipher/random.c (mix_pool): Use DIGESTLEN instead of 20. 2016-08-09 Daniel Kahn Gillmor gpg: Avoid publishing the GnuPG version by default. * g10/gpg.c (main): initialize opt.emit_version to 0 * doc/gpg.texi: document different default for --emit-version 2016-08-04 Daniel Kahn Gillmor Clean up "allow to" * README, cipher/cipher.c, cipher/pubkey.c, doc/gpg.texi: replace "allow to" with clearer text In standard English, the normal construction is "${XXX} allows ${YYY} to" -- that is, the subject (${XXX}) of the sentence is allowing the object (${YYY}) to do something. When the object is missing, the phrasing sounds awkward, even if the object is implied by context. There's almost always a better construction that isn't as awkward. These changes should make the language a bit clearer. Fix spelling: "occured" should be "occurred" * checks/armor.test, cipher/des.c, g10/ccid-driver.c, g10/pkclist.c, util/regcomp.c, util/regex_internal.c: correct the spelling of "occured" to "occurred" 2016-08-04 NIIBE Yutaka g10: Fix checking key for signature validation. * g10/sig-check.c (signature_check2): Not only subkey, but also primary key should have flags.valid=1. 2016-08-03 Justus Winter Partially revert "g10: Fix another race condition for trustdb access." This amends db246f8b which accidentally included the compiled translation files. 2016-07-09 NIIBE Yutaka gpgv: Tweak default options for extra security. * g10/gpgv.c (main): Set opt.no_sig _cache, so that it doesn't depend on cached status. Similarly, set opt.flags.require_cross_cert for backsig validation for subkey signature. 2016-07-06 NIIBE Yutaka g10: Fix keysize with --expert. * g10/keygen.c (ask_keysize): It's 768 only for DSA. 2016-06-28 NIIBE Yutaka g10: Fix --list-packets. * g10/gpg.c (main): Call set_packet_list_mode after assignment of opt.list_packets. * g10/mainproc.c (do_proc_packets): Don't stop processing with --list-packets as the comment says. * g10/options.h (list_packets): Fix the comment. * g10/parse-packet.c: Fix the condition for opt.list_packets. 2016-06-15 Niibe Yutaka g10: Fix another race condition for trustdb access. * g10/tdbio.c (create_version_record): Call create_hashtable to always make hashtable, together with the version record. (get_trusthashrec): Remove call to create_hashtable. 2016-02-12 NIIBE Yutaka g10: Make sure to have the directory for trustdb. * g10/tdbio.c (tdbio_set_dbname): Return earlier if !CREATE. Check the directory and create it if none before calling take_write_lock. 2016-02-01 Werner Koch Fix possible sign extension problem with newer compilers. * cipher/des.c (READ_64BIT_DATA): Cast to u32 before shifting by 24. * cipher/blowfish.c (do_encrypt_block): Ditto. (do_decrypt_block): Ditto. * cipher/camellia.c (CAMELLIA_RR8): Ditto. * cipher/cast5.c (do_encrypt_block): Ditto. (do_decrypt_block): Ditto. (do_cast_setkey): Ditto. * cipher/twofish.c (INPACK): Ditto. * util/iobuf.c (block_filter): Ditto. 2016-01-26 NIIBE Yutaka g10: Fix iobuf API of filter function for alignment. * include/iobuf.h (struct iobuf_struct): Remove DESC. * util/iobuf.c (iobuf_desc): New. (print_chain, iobuf_close, iobuf_open, iobuf_fdopen, iobuf_sockopen) (iobuf_create, iobuf_append, iobuf_openrw, iobuf_ioctl) (iobuf_push_filter2, pop_filter, underflow): Use iobuf_desc. (file_filter, sock_filter, block_filter): Fill the description. * g10/armor.c, g10/cipher.c, g10/compress-bz2.c, g10/compress.c, g10/encode.c, g10/encr-data.c, g10/mdfilter.c, g10/pipemode.c, g10/progress.c, g10/textfilter.c: Likewise. 2016-01-15 Werner Koch Fix possible AIX problem with sysconf in rndunix. * cipher/rndunix.c [HAVE_STDINT_H]: Include stdint.h. (start_gatherer): Detect misbehaving sysconf. 2016-01-13 NIIBE Yutaka Fix to support git worktree. * Makefile.am: Use -e for testing .git. 2015-12-21 NIIBE Yutaka po: Update Japanese translation. --- Module Name: pkgsrc Committed By: maya Date: Wed Aug 17 23:13:11 UTC 2016 Modified Files: pkgsrc/security/libgcrypt: Makefile buildlink3.mk distinfo Log Message: Update libgcrypt to 1.7.3 Changelog: 2016-08-17 Werner Koch Release 1.7.3. * configure.ac: Set LT version to C21/A1/R3. random: Hash continuous areas in the csprng pool. * random/random-csprng.c (mix_pool): Store the first hash at the end of the pool. random: Improve the diagram showing the random mixing. * random/random-csprng.c (mix_pool): Use DIGESTLEN instead of 20. 2016-07-19 Jussi Kivilinna crc-intel-pclmul: split assembly block to ease register pressure. * cipher/crc-intel-pclmul.c (crc32_less_than_16): Split inline assembly block handling 4 byte input into multiple blocks. rijndael-aesni: split assembly block to ease register pressure. * cipher/rijndael-aesni.c (do_aesni_ctr_4): Use single register constraint for passing 'bige_addb' to assembly block; split first inline assembly block into two parts. 2016-07-14 Jussi Kivilinna Add ARMv8/AArch32 Crypto Extension implementation of AES. * cipher/Makefile.am: Add 'rijndael-armv8-ce.c' and 'rijndael-armv-aarch32-ce.S'. * cipher/rijndael-armv8-aarch32-ce.S: New. * cipher/rijndael-armv8-ce.c: New. * cipher/rijndael-internal.h (USE_ARM_CE): New. (RIJNDAEL_context_s): Add 'use_arm_ce'. * cipher/rijndael.c [USE_ARM_CE] (_gcry_aes_armv8_ce_setkey) (_gcry_aes_armv8_ce_prepare_decryption) (_gcry_aes_armv8_ce_encrypt, _gcry_aes_armv8_ce_decrypt) (_gcry_aes_armv8_ce_cfb_enc, _gcry_aes_armv8_ce_cbc_enc) (_gcry_aes_armv8_ce_ctr_enc, _gcry_aes_armv8_ce_cfb_dec) (_gcry_aes_armv8_ce_cbc_dec, _gcry_aes_armv8_ce_ocb_crypt) (_gcry_aes_armv8_ce_ocb_auth): New. (do_setkey) [USE_ARM_CE]: Add ARM CE/AES HW feature check and key setup for ARM CE. (prepare_decryption, _gcry_aes_cfb_enc, _gcry_aes_cbc_enc) (_gcry_aes_ctr_enc, _gcry_aes_cfb_dec, _gcry_aes_cbc_dec) (_gcry_aes_ocb_crypt, _gcry_aes_ocb_auth) [USE_ARM_CE]: Add ARM CE support. * configure.ac: Add 'rijndael-armv8-ce.lo' and 'rijndael-armv8-aarch32-ce.lo'. Add ARMv8/AArch32 Crypto Extension implementation of GCM. * cipher/Makefile.am: Add 'cipher-gcm-armv8-aarch32-ce.S'. * cipher/cipher-gcm-armv8-aarch32-ce.S: New. * cipher/cipher-gcm.c [GCM_USE_ARM_PMULL] (_gcry_ghash_setup_armv8_ce_pmull, _gcry_ghash_armv8_ce_pmull) (ghash_setup_armv8_ce_pmull, ghash_armv8_ce_pmull): New. (setupM) [GCM_USE_ARM_PMULL]: Enable ARM PMULL implementation if HWF_ARM_PULL HW feature flag is enabled. * cipher/cipher-gcm.h (GCM_USE_ARM_PMULL): New. Add ARMv8/AArch32 Crypto Extension implemenation of SHA-256. * cipher/Makefile.am: Add 'sha256-armv8-aarch32-ce.S'. * cipher/sha256-armv8-aarch32-ce.S: New. * cipher/sha256.c (USE_ARM_CE): New. (sha256_init, sha224_init): Check features for HWF_ARM_SHA1. [USE_ARM_CE] (_gcry_sha256_transform_armv8_ce): New. (transform) [USE_ARM_CE]: Use ARMv8 CE implementation if HW supports. (SHA256_CONTEXT): Add 'use_arm_ce'. * configure.ac: Add 'sha256-armv8-aarch32-ce.lo'. Add ARMv8/AArch32 Crypto Extension implementation of SHA-1. * cipher/Makefile.am: Add 'sha1-armv8-aarch32-ce.S'. * cipher/sha1-armv7-neon.S (_gcry_sha1_transform_armv7_neon): Add missing size. * cipher/sha1-armv8-aarch32-ce.S: New. * cipher/sha1.c (USE_ARM_CE): New. (sha1_init): Check features for HWF_ARM_SHA1. [USE_ARM_CE] (_gcry_sha1_transform_armv8_ce): New. (transform) [USE_ARM_CE]: Use ARMv8 CE implementation if HW supports it. * cipher/sha1.h (SHA1_CONTEXT): Add 'use_arm_ce'. * configure.ac: Add 'sha1-armv8-aarch32-ce.lo'. Add HW feature check for ARMv8 AArch64 and crypto extensions. * configure.ac: Add '--disable-arm-crypto-support'; enable hwf-arm module on 64-bit ARM. (armcryptosupport, gcry_cv_gcc_inline_aarch32_crypto) (gcry_cv_inline_asm_aarch64_neon) (gcry_cv_gcc_inline_asm_aarch64_crypto): New. * src/g10lib.h (HWF_ARM_AES, HWF_ARM_SHA1, HWF_ARM_SHA2) (HWF_ARM_PMULL): New. * src/hwf-arm.c [__aarch64__]: Enable building in AArch64 mode. (feature_map_s): New. [__arm__] (AT_HWCAP, AT_HWCAP2, HWCAP2_AES, HWCAP2_PMULL) (HWCAP2_SHA1, HWCAP2_SHA2, arm_features): New. [__aarch64__] (AT_HWCAP, AT_HWCAP2, HWCAP_ASIMD, HWCAP_AES) (HWCAP_PMULL, HWCAP_SHA1, HWCAP_SHA2, arm_features): New. (get_hwcap): Add reading of 'AT_HWCAP2'; Change auxv use 'unsigned long'. (detect_arm_at_hwcap): Add mapping of HWCAP/HWCAP2 to HWF flags. (detect_arm_proc_cpuinfo): Add mapping of CPU features to HWF flags. (_gcry_hwf_detect_arm): Use __ARM_NEON instead of legacy __ARM_NEON__. * src/hwfeatures.c (hwflist): Add 'arm-aes', 'arm-sha1', 'arm-sha2' and 'arm-pmull'. --- Module Name: pkgsrc Committed By: wiz Date: Sat Aug 20 19:22:37 UTC 2016 Modified Files: pkgsrc/security/libgcrypt: Makefile Log Message: Depends on libgpg-error-1.13. >From David H. Gutteridge in PR 51430. --- Module Name: pkgsrc Committed By: fhajny Date: Thu Sep 1 10:19:30 UTC 2016 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo pkgsrc/security/libgcrypt/patches: patch-aa Log Message: Use COMPILER_RPATH_FLAG properly. Reconciles libgcrypt-config with Darwin linker. Fixes joyent/pkgsrc#400. Bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.79 2016/06/17 11:56:13 wiz Exp $ d3 1 a3 2 DISTNAME= libgcrypt-1.7.3 PKGREVISION= 1 a56 6 SUBST_CLASSES+= rpath SUBST_FILES.rpath= src/libgcrypt-config.in SUBST_STAGE.rpath= pre-configure SUBST_MESSAGE.rpath= Fixing rpath flags SUBST_VARS.rpath= COMPILER_RPATH_FLAG d59 1 a59 1 BUILDLINK_API_DEPENDS.libgpg-error+= libgpg-error>=1.13 @ 1.78 log @Fix netbsd-6 build Patch from nonaka@@, thank you. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.77 2016/05/14 23:16:43 ryoon Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.7.0 @ 1.77 log @Fix _gcry_sha1_transform_amd64_avx undefined reference error under NetBSD/amd64 6 and CentOS 6. * Explicitly disable AVX and AVX2 for GCC 4.4 and 4.5 @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.76 2016/04/22 08:28:46 jperkin Exp $ d23 1 @ 1.76 log @Use --disable-pclmul-support on Linux and SunOS i386, the inline assembly does not compile on either. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.75 2016/04/18 06:19:57 wiz Exp $ d48 7 @ 1.75 log @Update libgcrypt to 1.7.0. Noteworthy changes in version 1.7.0 (2016-04-15) [C21/A1/R0] ------------------------------------------------ * New algorithms and modes: - SHA3-224, SHA3-256, SHA3-384, SHA3-512, and MD2 hash algorithms. - SHAKE128 and SHAKE256 extendable-output hash algorithms. - ChaCha20 stream cipher. - Poly1305 message authentication algorithm - ChaCha20-Poly1305 Authenticated Encryption with Associated Data mode. - OCB mode. - HMAC-MD2 for use by legacy applications. * New curves for ECC: - Curve25519. - sec256k1. - GOST R 34.10-2001 and GOST R 34.10-2012. * Performance: - Improved performance of KDF functions. - Assembler optimized implementations of Blowfish and Serpent on ARM. - Assembler optimized implementation of 3DES on x86. - Improved AES using the SSSE3 based vector permutation method by Mike Hamburg. - AVX/BMI is used for SHA-1 and SHA-256 on x86. This is for SHA-1 about 20% faster than SSSE3 and more than 100% faster than the generic C implementation. - 40% speedup for SHA-512 and 72% for SHA-1 on ARM Cortex-A8. - 60-90% speedup for Whirlpool on x86. - 300% speedup for RIPE MD-160. - Up to 11 times speedup for CRC functions on x86. * Other features: - Improved ECDSA and FIPS 186-4 compliance. - Support for Montgomery curves. - gcry_cipher_set_sbox to tweak S-boxes of the gost28147 cipher algorithm. - gcry_mpi_ec_sub to subtract two points on a curve. - gcry_mpi_ec_decode_point to decode an MPI into a point object. - Emulation for broken Whirlpool code prior to 1.6.0. [from 1.6.1] - Flag "pkcs1-raw" to enable PCKS#1 padding with a user supplied hash part. - Parameter "saltlen" to set a non-default salt length for RSA PSS. - A SP800-90A conforming DRNG replaces the former X9.31 alternative random number generator. - Map deprecated RSA algo number to the RSA algo number for better backward compatibility. [from 1.6.2] - Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. [from 1.6.3] - Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. [from 1.6.3] - Flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. [from 1.6.4] - Speed up the random number generator by requiring less extra seeding. [from 1.6.4] - Always verify a created RSA signature to avoid private key leaks due to hardware failures. [from 1.6.4] - Mitigate side-channel attack on ECDH with Weierstrass curves [CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for details. [from 1.6.5] * Internal changes: - Moved locking out to libgpg-error. - Support of the SYSROOT envvar in the build system. - Refactor some code. - The availability of a 64 bit integer type is now mandatory. * Bug fixes: - Fixed message digest lookup by OID (regression in 1.6.0). - Fixed a build problem on NetBSD - Fixed memory leaks in ECC code. - Fixed some asm build problems and feature detection bugs. * Interface changes relative to the 1.6.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gcry_cipher_final NEW macro. GCRY_CIPHER_MODE_CFB8 NEW constant. GCRY_CIPHER_MODE_OCB NEW. GCRY_CIPHER_MODE_POLY1305 NEW. gcry_cipher_set_sbox NEW macro. gcry_mac_get_algo NEW. GCRY_MAC_HMAC_MD2 NEW. GCRY_MAC_HMAC_SHA3_224 NEW. GCRY_MAC_HMAC_SHA3_256 NEW. GCRY_MAC_HMAC_SHA3_384 NEW. GCRY_MAC_HMAC_SHA3_512 NEW. GCRY_MAC_POLY1305 NEW. GCRY_MAC_POLY1305_AES NEW. GCRY_MAC_POLY1305_CAMELLIA NEW. GCRY_MAC_POLY1305_SEED NEW. GCRY_MAC_POLY1305_SERPENT NEW. GCRY_MAC_POLY1305_TWOFISH NEW. gcry_md_extract NEW. GCRY_MD_FLAG_BUGEMU1 NEW [from 1.6.1]. GCRY_MD_GOSTR3411_CP NEW. GCRY_MD_SHA3_224 NEW. GCRY_MD_SHA3_256 NEW. GCRY_MD_SHA3_384 NEW. GCRY_MD_SHA3_512 NEW. GCRY_MD_SHAKE128 NEW. GCRY_MD_SHAKE256 NEW. gcry_mpi_ec_decode_point NEW. gcry_mpi_ec_sub NEW. GCRY_PK_EDDSA NEW constant. GCRYCTL_GET_TAGLEN NEW. GCRYCTL_SET_SBOX NEW. GCRYCTL_SET_TAGLEN NEW. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.74 2016/02/11 13:36:37 wiz Exp $ d32 5 @ 1.74 log @Update libgcrypt to 1.6.5: Noteworthy changes in version 1.6.5 (2016-02-09) [C20/A0/R5] ------------------------------------------------ * Mitigate side-channel attack on ECDH with Weierstrass curves [CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for details. * Fix build problem on Solaris. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.73 2015/09/09 18:02:15 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.6.5 @ 1.73 log @Update security/libgcrypt to 1.6.4: Noteworthy changes in version 1.6.4 (2015-09-08) [C20/A0/R4] ------------------------------------------------ * Speed up the random number generator by requiring less extra seeding. * New flag "no-keytest" for ECC key generation. Due to a bug in the parser that flag will also be accepted but ignored by older version of Libgcrypt. * Always verify a created RSA signature to avoid private key leaks due to hardware failures. * Fix alignment bug in the AESNI code on Windows > 7. * Support FreeBSD 10 and later. * Other minor bug fixes. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.72 2015/03/13 23:00:49 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.6.4 @ 1.73.4.1 log @Pullup ticket #4928 - requested by sevan security/libgcrypt: security fix Revisions pulled up: - security/libgcrypt/Makefile 1.74 - security/libgcrypt/distinfo 1.62 --- Module Name: pkgsrc Committed By: wiz Date: Thu Feb 11 13:36:37 UTC 2016 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo Log Message: Update libgcrypt to 1.6.5: Noteworthy changes in version 1.6.5 (2016-02-09) [C20/A0/R5] ------------------------------------------------ * Mitigate side-channel attack on ECDH with Weierstrass curves [CVE-2015-7511]. See http://www.cs.tau.ac.IL/~tromer/ecdh/ for details. * Fix build problem on Solaris. @ text @d1 1 a1 1 # $NetBSD$ d3 1 a3 1 DISTNAME= libgcrypt-1.6.5 @ 1.72 log @Fix previous. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.71 2015/03/13 22:38:08 gendalia Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.6.3 @ 1.71 log @libgpg-error needs to be >= version 1.11. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.70 2015/02/28 00:14:25 wiz Exp $ d46 1 a46 1 BUILDLINK_API_DPENDS.libgpg-error+= libgpg-error>=1.11:../../security/libgpg-error @ 1.70 log @Update to 1.6.3: Noteworthy changes in version 1.6.3 (2015-02-27) [C20/A0/R3] ------------------------------------------------ * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. * Improved asm support for older toolchains. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.69 2015/01/05 21:56:16 wiz Exp $ d43 1 d46 1 @ 1.69 log @Replace patch-ab with upstream version, see http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=817472358a093438e802380caecf7139406400cf;hp=8c5eee51d9a25b143e41ffb7ff4a6b2a29b82d83 Bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.68 2014/10/09 14:06:52 wiz Exp $ d3 1 a3 2 DISTNAME= libgcrypt-1.6.2 PKGREVISION= 3 @ 1.68 log @Remove pkgviews: don't set PKG_INSTALLATION_TYPES in Makefiles. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.67 2014/08/29 14:22:59 wiz Exp $ d4 1 a4 1 PKGREVISION= 2 @ 1.68.2.1 log @Pullup ticket #4637 - requested by wiz security/libgcrypt: security update Revisions pulled up: - security/libgcrypt/Makefile 1.69-1.70 - security/libgcrypt/distinfo 1.55-1.56 - security/libgcrypt/patches/patch-ab deleted - security/libgcrypt/patches/patch-random_rndunix.c 1.1 --- Module Name: pkgsrc Committed By: wiz Date: Mon Jan 5 21:56:16 UTC 2015 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo Added Files: pkgsrc/security/libgcrypt/patches: patch-random_rndunix.c Removed Files: pkgsrc/security/libgcrypt/patches: patch-ab Log Message: Replace patch-ab with upstream version, see http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=817472358a093438e802380caecf7139406400cf;hp=8c5eee51d9a25b143e41ffb7ff4a6b2a29b82d83 Bump PKGREVISION. --- Module Name: pkgsrc Committed By: wiz Date: Sat Feb 28 00:14:25 UTC 2015 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo Log Message: Update to 1.6.3: Noteworthy changes in version 1.6.3 (2015-02-27) [C20/A0/R3] ------------------------------------------------ * Use ciphertext blinding for Elgamal decryption [CVE-2014-3591]. See http://www.cs.tau.ac.il/~tromer/radioexp/ for details. * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical]. * Improved asm support for older toolchains. @ text @d1 1 a1 1 # $NetBSD$ d3 2 a4 1 DISTNAME= libgcrypt-1.6.3 @ 1.67 log @Remove ten year old patch for Solaris 9/sparc/gcc that was never fed upstream. If this patch is still necessary for you, please discuss at https://bugs.g10code.com/gnupg/issue1703 Bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.66 2014/08/29 10:29:14 richard Exp $ a14 2 PKG_INSTALLATION_TYPES= overwrite pkgviews a32 1 @ 1.66 log @reinstate patch-configure as upstream patch not yet in [1.6.2] release. http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=43376891c01f4aff1fbfb23beafebb5adfd0868c revbump to pick it up. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.65 2014/08/28 13:38:29 jperkin Exp $ d4 1 a4 1 PKGREVISION= 1 @ 1.65 log @Explicitly disable SSSE3 support on SunOS, it doesn't build. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.64 2014/08/21 19:55:08 wiz Exp $ d4 1 a34 3 .if ${OPSYS} == "SunOS" CONFIGURE_ENV+= gcry_cv_gcc_inline_asm_ssse3=no .endif @ 1.64 log @Update HOMEPAGE. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.63 2014/08/21 19:41:38 wiz Exp $ d34 4 @ 1.63 log @Update to 1.6.2. Add a comment to patch. Noteworthy changes in version 1.6.2 (2014-08-21) [C20/A0/R2] ------------------------------------------------ * Map deprecated RSA algo number to the RSA algo number for better backward compatibility. * Support a 0x40 compression prefix for EdDSA. * Improve ARM hardware feature detection and building. * Fix powerpc-apple-darwin detection * Fix building for the x32 ABI platform. * Support building using the latest mingw-w64 toolchain. * Fix some possible NULL deref bugs. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.62 2014/07/18 10:36:28 ryoon Exp $ d10 1 a10 1 HOMEPAGE= http://directory.fsf.org/project/libgcrypt/ @ 1.62 log @Fix build under SCO OpenServer 5.0.7/3.2. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.61 2014/02/03 16:51:35 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.6.1 @ 1.61 log @Update to 1.6.1. Remove lots of integrated patches. Noteworthy changes in version 1.6.1 (2014-01-29) ------------------------------------------------ * Added emulation for broken Whirlpool code prior to 1.6.0. * Improved performance of KDF functions. * Improved ECDSA compliance. * Fixed locking for Windows and non-ELF Pthread systems (regression in 1.6.0) * Fixed message digest lookup by OID (regression in 1.6.0). * Fixed a build problem on NetBSD. * Fixed memory leaks in ECC code. * Fixed some asm build problems and feature detection bugs. * Interface changes relative to the 1.6.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ GCRY_MD_FLAG_BUGEMU1 NEW (minor API change). @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.60 2014/01/07 17:18:29 richard Exp $ d34 7 @ 1.60 log @revise recent -Wa,--divide usage for SunOS to allow only SunOS x86_64 and naturally non-gcc/non-gas builds by patching configure instead (adapted from configure.ac in the works upstream). @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.59 2014/01/02 15:56:11 richard Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.6.0 @ 1.59 log @cipher/sha1-ssse3-amd64.S suffers a supposedly "infamous" problem wherein expressions containing a '/' (divide) are problematic because according to the SUN x86 Assembly Language Reference Manual, '/' should be treated as starting comments. To get over this, gas has '--divide' do not treat `/' as a comment character @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.58 2014/01/01 11:49:59 wiz Exp $ a25 2 CPPFLAGS.SunOS+= -Wa,--divide @ 1.58 log @Update to 1.6.0: Noteworthy changes in version 1.6.0 (2013-12-16) ------------------------------------------------ * Removed the long deprecated gcry_ac interface. Thus Libgcrypt is not anymore ABI compatible to previous versions if they used the ac interface. * Removed the module register subsystem. * The deprecated message digest debug macros have been removed. Use gcry_md_debug instead. * Removed deprecated control codes. * Improved performance of most cipher algorithms as well as for the SHA family of hash functions. * Added support for the IDEA cipher algorithm. * Added support for the Salsa20 and reduced Salsa20/12 stream ciphers. * Added limited support for the GOST 28147-89 cipher algorithm. * Added support for the GOST R 34.11-94 and R 34.11-2012 (Stribog) hash algorithms. * Added a random number generator to directly use the system's RNG. Also added an interface to prefer the use of a specified RNG. * Added support for the SCRYPT algorithm. * Mitigated the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See [CVE-2013-4242]. * Added support for Deterministic DSA as per RFC-6969. * Added support for curve Ed25519. * Added a scatter gather hash convenience function. * Added several MPI amd SEXP helper functions. * Added support for negative numbers to gcry_mpi_print, gcry_mpi_aprint and gcry_mpi_scan. * The algorithm ids GCRY_PK_ECDSA and GCRY_PK_ECDH are now deprecated. Use GCRY_PK_ECC if you need an algorithm id. * Changed gcry_pk_genkey for "ecc" to only include the curve name and not the parameters. The flag "param" may be used to revert this. * Added a feature to globally disable selected hardware features. * Added debug helper functions. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.57 2013/07/25 11:51:59 wiz Exp $ d26 2 @ 1.57 log @Update to 1.5.3: Noteworthy changes in version 1.5.3 (2013-07-25) ------------------------------------------------ * Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See . @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.56 2013/04/21 14:44:53 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.5.3 @ 1.56 log @Update to 1.5.2. XXX: lots of patches without comments, and not upstreamed it seems. Noteworthy changes in version 1.5.2 (2013-04-18) ------------------------------------------------ * Added support for IDEA. * Made the Padlock code work again (regression since 1.5.0). * Fixed alignment problems for Serpent. * Fixed two bugs in ECC computations. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.55 2013/04/10 15:17:55 drochner Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.5.2 @ 1.56.2.1 log @Pullup ticket #4188 - requested by wiz security/libgcrypt: security update Revisions pulled up: - security/libgcrypt/Makefile 1.57 - security/libgcrypt/distinfo 1.39 --- Module Name: pkgsrc Committed By: wiz Date: Thu Jul 25 11:51:59 UTC 2013 Modified Files: pkgsrc/security/libgcrypt: Makefile distinfo Log Message: Update to 1.5.3: Noteworthy changes in version 1.5.3 (2013-07-25) ------------------------------------------------ * Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See . @ text @d1 1 a1 1 # $NetBSD$ d3 1 a3 1 DISTNAME= libgcrypt-1.5.3 @ 1.55 log @update to 1.5.1 changes: minor fixes @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.54 2012/10/23 18:16:32 asau Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.5.1 a7 3 # don't remove this -- see options.mk DISTFILES= ${DISTNAME}${EXTRACT_SUFX} DIST_SUBDIR= ${PKGNAME_NOREV} @ 1.54 log @Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.53 2012/04/03 15:00:30 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.5.0 @ 1.53 log @Fix building with clang on i386 (PR#46177) @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.52 2011/07/15 20:58:56 drochner Exp $ a17 1 PKG_DESTDIR_SUPPORT= user-destdir @ 1.52 log @disable AESNI support for now, until we have a method to tell whether the assembler supports the needed SSE commands, to allow building on NetBSD-5, in response to a report by Marc Baudoin to pkgsrc-users @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.51 2011/07/13 21:21:52 adam Exp $ d38 4 @ 1.51 log @Changes 1.5.0: * New function gcry_kdf_derive implementing OpenPGP S2K algorithms and PBKDF2. * Support for WindowsCE. * Support for ECDH. * Support for OAEP and PSS methods as described by RFC-3447. * Fixed PKCS v1.5 code to always return the leading zero. * New format specifiers "%M" and "%u" for gcry_sexp_build. * Support opaque MPIs with "%m" and "%M" in gcry_sexp_build. * New functions gcry_pk_get_curve and gcry_pk_get_param to map ECC parameters to a curve name and to retrieve parameter values. * gcry_mpi_cmp applied to opaque values has a defined semantic now. * Uses the Intel AES-NI instructions if available. * The use of the deprecated Alternative Public Key Interface (gcry_ac_*) will now print compile time warnings. * The module register subsystem has been deprecated. This subsystem is not flexible enough and would always require ABI changes to extend the internal interfaces. It will eventually be removed. Please contact us on the gcrypt-devel mailing list to discuss whether you really need this feature or how it can be replaced by an internal plugin mechanism. * CTR mode may now be used with data chunks of arbitrary length. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.50 2011/04/22 13:42:47 obache Exp $ d36 1 @ 1.50 log @recursive bump from gettext-lib shlib bump. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.49 2011/02/19 00:55:31 jmcneill Exp $ d3 1 a3 2 DISTNAME= libgcrypt-1.4.6 PKGREVISION= 2 @ 1.49 log @don't enable padlock support on NetBSD by default, it crashes on padlock capable CPUs @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.48 2010/11/13 21:09:02 shattered Exp $ d4 1 a4 1 PKGREVISION= 1 @ 1.48 log @Follow HTTP redirects to new HOMEPAGEs and/or MASTER_SITES. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.47 2010/07/23 06:39:03 adam Exp $ d4 1 @ 1.47 log @Changes in version 1.4.6: * New variants of the TIGER algorithm. * New cipher algorithm mode for AES-WRAP. * Interface changes relative to the 1.4.2 release: GCRY_MD_TIGER1 NEW. GCRY_MD_TIGER2 NEW. GCRY_CIPHER_MODE_AESWRAP NEW. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.46 2009/12/18 18:54:24 drochner Exp $ d13 1 a13 1 HOMEPAGE= http://directory.fsf.org/security/libgcrypt.html @ 1.46 log @put back the (non-default) "idea" option which got lost a while ago @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.45 2009/12/15 10:40:11 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.4.5 @ 1.45 log @Update to 1.4.5: Noteworthy changes in version 1.4.5 (2009-12-11) ------------------------------------------------ * Fixed minor memory leak in DSA key generation. * No more switching to FIPS mode if /proc/version is not readable. * Fixed a sigill during Padlock detection on old CPUs. * Fixed a hang on some W2000 machines. * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3; SHA-256 went up by 25%. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.44 2009/05/19 08:59:31 wiz Exp $ d8 3 @ 1.44 log @Use standard location for LICENSE line (in MAINTAINER/HOMEPAGE/COMMENT block). Uncomment some commented out LICENSE lines while here. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.43 2009/01/31 08:53:14 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.4.4 d12 1 a12 2 #LICENSE= gnu-gpl-v2 gnu-lgpl-v21 @ 1.43 log @Changes 1.4.4: * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. This functionality has been in Libgcrypt since 1.3.0. * MD5 may now be used in non-enforced fips mode. * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. * In fips mode, RSA keys are now generated using the X9.31 algorithm and DSA keys using the FIPS 186-2 algorithm. * The transient-key flag is now also supported for DSA key generation. DSA domain parameters may be given as well. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.42 2008/10/14 11:33:13 adam Exp $ d12 2 a25 2 #LICENSE= gnu-gpl-v2 gnu-lgpl-v21 @ 1.42 log @Changes 1.4.3: * Try to auto-initialize Libgcrypt to minimize the effect of applications not doing that correctly. This is not a perfect solution but given that many applicationion would totally fail without such a hack, we try to help at least with the most common cases. Folks, please read the manual to learn how to properly initialize Libgcrypt! * Auto-initialize the secure memory to 32k instead of aborting the process. * Log fatal errors via syslog. * Changed the name and the semantics of the fips mode config file. * Add convenience macro gcry_fips_mode_active. * More self-tests. * Documentation cleanups. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.41 2008/04/29 11:03:50 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.4.3 @ 1.41 log @Update to 1.4.1: Noteworthy changes in version 1.4.1 (2008-04-25) ------------------------------------------------ * Fixed a bug introduced by 1.3.1 which led to the comsumption of far too much entropy for the intial seeding. * Improved AES performance for CFB and CBC modes. * Removed build problems for the Padlock support. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.40 2008/03/07 16:16:22 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.4.1 d7 1 @ 1.40 log @Update to 1.4.0: Noteworthy changes in version 1.4.0 (2007-12-10) ------------------------------------------------ * New configure option --disable-padlock-support which is mostly useful in case of build problems. Noteworthy changes in version 1.3.2 (2007-12-03) ------------------------------------------------ * The visibility attribute is now used if supported by the toolchain. * The ACE engine of VIA processors is now used for AES-128. * The ASN.1 DER template for SHA-224 has been fixed. Noteworthy changes in version 1.3.1 (2007-10-26) ------------------------------------------------ * The entire library is now under the LGPL. The helper programs and the manual are under the GPL. Kudos to Peter Gutmann for giving permissions to relicense the rndw32 and rndunix modules. * The Camellia cipher is now under the LGPL and included by default. * Fixed a bug in the detection of symbol prefixes which inhibited the build of optimzied assembler code on certain systems. * Updated the entropy gatherer for W32. Noteworthy changes in version 1.3.0 (2007-05-04) ------------------------------------------------ * Changed the way the RNG gets initialized. This allows to keep it uninitialized as long as no random numbers are used. To override this, the new macro gcry_fast_random_poll may be used. It is in general a good idea to spread this macro into the application code to make sure that these polls happen often enough. * Made the RNG immune against fork without exec. * Reading and writing the random seed file is now protected by a fcntl style file lock on systems that provide this function. * Support for SHA-224 and HMAC using SHA-384 and SHA-512. * Support for the SEED cipher. * Support for the Camellia cipher. Note that Camellia is disabled by default, and that enabling it changes the license of libgcrypt from LGPL to GPL. * Support for OFB encryption mode. * gcry_mpi_rshift does not anymore truncate the shift count. * Reserved algorithm ranges for use by applications. * Support for DSA2. * The new function gcry_md_debug should be used instead of the gcry_md_start_debug and gcry_md_stop_debug macros. * New configure option --enable-random-daemon to support a system wide random daemon. The daemon code is experimental and not yet very well working. It will eventually allow to keep a global random pool for the sake of short living processes. * Non executable stack support is now used by default on systems supporting it. * Support for Microsoft Windows. * Assembler support for the AMD64 architecture. * New configure option --enable-mpi-path for optimized builds. * Experimental support for ECDSA; should only be used for testing. * New control code GCRYCTL_PRINT_CONFIG to print the build configuration. * Minor changes to some function declarations. Buffer arguments are now typed as void pointer. This should not affect any compilation. Fixed two bugs in return values and clarified documentation. * Interface changes relative to the 1.2.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gcry_fast_random_poll NEW gcry_md_debug NEW gcry_sexp_nth_string NEW GCRY_MD_SHA224 NEW GCRY_PK_USAGE_CERT NEW GCRY_PK_USAGE_AUTH NEW GCRY_PK_USAGE_UNKN NEW GCRY_PK_ECDSA NEW GCRY_CIPHER_SEED NEW GCRY_CIPHER_CAMELLIA128 NEW GCRY_CIPHER_CAMELLIA192 NEW GCRY_CIPHER_CAMELLIA256 NEW GCRYCTL_FAKED_RANDOM_P NEW GCRYCTL_PRINT_CONFIG NEW GCRYCTL_SET_RNDEGD_SOCKET NEW. gcry_mpi_scan CHANGED: Argument BUFFER is now void*. gcry_pk_algo_name CHANGED: Returns "?" instead of NULL. gcry_cipher_algo_name CHANGED: Returns "?" instead of "". gcry_pk_spec_t CHANGED: Element ALIASES is now const ptr. gcry_md_write_t CHANGED: Argument BUF is now a const void*. gcry_md_ctl CHANGED: Argument BUFFER is now void*. gcry_cipher_encrypt CHANGED: Arguments IN and OUT are now void*. gcry_cipher_decrypt CHANGED: Arguments IN and OUT are now void*. gcry_sexp_sprint CHANGED: Argument BUFFER is now void*. gcry_create_nonce CHANGED: Argument BUFFER is now void*. gcry_randomize CHANGED: Argument BUFFER is now void*. gcry_cipher_register CHANGED: Argument ALGORITHM_ID is now int*. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.39 2007/08/29 23:11:37 wiz Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.4.0 @ 1.39 log @Add support for idea option. From Blair Sadewitz in private mail, with some cleanup. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.38 2007/04/28 17:46:21 tnn Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.2.4 d23 2 @ 1.38 log @PR 36233: Make libgcrypt build on NetBSD/hp700. From David H. Gutteridge. Also makes it build on HP-UX and Linux/hppa, tested by me. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.37 2007/02/03 00:08:51 wiz Exp $ d32 2 @ 1.37 log @Update to 1.2.4: Noteworthy changes in version 1.2.4 (2007-02-01) ------------------------------------------------ * Fixed a bug in the memory allocator which could have been the reason for some of non-duplicable bugs. * Other minor bug fixes. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.36 2007/01/30 06:53:32 wiz Exp $ d27 2 a28 1 empty(MACHINE_PLATFORM:MNetBSD-*-sparc) @ 1.36 log @Put macro argument in parentheses. From Naoto Morishima in PR 35519. Bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.35 2006/11/05 17:35:58 joerg Exp $ d3 1 a3 2 DISTNAME= libgcrypt-1.2.3 PKGREVISION= 2 d21 1 a21 1 INFO_FILES= # PLIST @ 1.35 log @DESTDIR support. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.34 2006/10/04 21:58:14 wiz Exp $ d4 1 a4 1 PKGREVISION= 1 @ 1.34 log @Update MASTER_SITES and/or HOMEPAGE, from Sergey Svishchev. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.33 2006/09/06 11:41:41 markd Exp $ d14 1 @ 1.33 log @libgcrypt 1.2.3 may have fixed the name of the random device on NetBSD but it broke the name of the urandom device. Bump PKGREVISION @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.32 2006/09/03 09:03:01 wiz Exp $ d10 1 a10 1 HOMEPAGE= http://www.gnu.org/directory/security/libgcrypt.html @ 1.32 log @Update to 1.2.3: Noteworthy changes in version 1.2.3 (2006-08-28) ------------------------------------------------ * Rewrote gcry_mpi_rshift to allow arbitrary shift counts. * Minor bug fixes. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.31 2006/08/27 14:23:23 jdc Exp $ d4 1 @ 1.31 log @Also enable assembler files for NetBSD-*-sparc. Makes this package build on NetBSD/sparc. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.30 2006/03/31 23:56:29 jlam Exp $ d3 1 a3 2 DISTNAME= libgcrypt-1.2.2 PKGREVISION= 1 @ 1.30 log @List the info pages directly in the PLIST and ensure that we honor PKGINFODIR. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.29 2006/03/04 21:30:34 jlam Exp $ d26 2 a27 1 empty(MACHINE_PLATFORM:MNetBSD-*-alpha) @ 1.29 log @Point MAINTAINER to pkgsrc-users@@NetBSD.org in the case where no developer is officially maintaining the package. The rationale for changing this from "tech-pkg" to "pkgsrc-users" is that it implies that any user can try to maintain the package (by submitting patches to the mailing list). Since the folks most likely to care about the package are the folks that want to use it or are already using it, this would leverage the energy of users who aren't developers. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.28 2006/02/05 23:10:44 joerg Exp $ d21 1 a21 1 INFO_FILES= gcrypt.info @ 1.28 log @Recursive revision bump / recommended bump for gettext ABI change. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.27 2005/10/06 12:20:41 wiz Exp $ d9 1 a9 1 MAINTAINER= tech-pkg@@NetBSD.org @ 1.27 log @Update to 1.2.2: Noteworthy changes in version 1.2.2 (2005-10-05} ------------------------------------------------ * Made the RNG immune against fork without exec. * Minor changes to some function declarations. Buffer arguments are now typed as void pointer. This should not affect any compilation. * A bug in the definition of gcry_cipher_register has been fixed. * Interface changes relative to the 1.2.1 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gcry_cipher_encrypt CHANGED: Arguments IN and OUT are now void*. gcry_cipher_decrypt CHANGED: Arguments IN and OUT are now void*. gcry_create_nonce CHANGED: Argument BUFFER is now void*. gcry_md_ctl CHANGED: Argument BUFFER is now void*. gcry_sexp_sprint CHANGED: Argument BUFFER is now void*. gcry_mpi_scan CHANGED: Argument BUFFER is now void*. gcry_cipher_register CHANGED: Argument ALGORITHM_ID is now int*. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.26 2005/04/11 21:47:13 tv Exp $ d4 1 @ 1.26 log @Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.25 2005/01/14 11:26:34 adam Exp $ d3 1 a3 1 DISTNAME= libgcrypt-1.2.1 @ 1.25 log @Changes 1.2.1: * Portability fixes, memory allocation fixes and other minor things. * Support to build as a W32 static library. * Changed the way the RNG gets initialized. This allows to keep it uninitialized as long as no random numbers are used. To override this, the new macro gcry_fast_random_poll may be used. It is in general a good idea to spread this macro into the application code to make sure that these polls happen often enough. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.24 2004/10/23 08:57:33 shannonjr Exp $ a13 1 USE_BUILDLINK3= yes @ 1.24 log @Re: pkg/27317 The header gcrypt.h references struct timeval without including sys/time.h. Added the patch summitted with PR that adds an include for sys/time.h. Bumped PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.23 2004/10/19 17:43:23 minskim Exp $ d3 1 a3 2 DISTNAME= libgcrypt-1.2.0 PKGREVISION= 3 d14 3 a16 3 USE_BUILDLINK3= YES USE_LIBTOOL= YES GNU_CONFIGURE= YES d18 1 a18 1 TEST_TARGET= check @ 1.23 log @This package never uses the gettext library directly. The dependency on gettext-lib should be taken care of by libgpg-error. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.22 2004/10/19 03:24:38 ben Exp $ d4 1 a4 1 PKGREVISION= 2 @ 1.22 log @Add dependency on gettext-lib to provide libintl for platforms that do not have it built in. May address PR#27292. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.21 2004/10/03 00:18:09 tv Exp $ a30 1 .include "../../devel/gettext-lib/buildlink3.mk" @ 1.21 log @Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10 in the process. (More information on tech-pkg.) Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and installing .la files. Bump PKGREVISION (only) of all packages depending directly on the above via a buildlink3 include. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.20 2004/07/02 13:14:27 jmmv Exp $ d31 1 @ 1.20 log @When exec'ing child processes (netstat and vmstat), make sure the standard file descriptors (0, 1, 2) are open. This avoids multiple warnings issued under NetBSD about running set[ug]id programs with those descriptors closed. Fixes PR pkg/26079; although it talks about gaim, the problem is here, in libgcrypt. Bump PKGREVISION to 1. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.19 2004/05/26 05:42:28 tron Exp $ d4 1 a4 1 PKGREVISION= 1 @ 1.19 log @Remove me as maintainer of this package. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.18 2004/05/23 04:07:41 snj Exp $ d4 1 @ 1.18 log @Fix MASTER_SITES. From Robert Elz in PR pkg/25681. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.17 2004/05/22 10:07:48 adam Exp $ d8 1 a8 1 MAINTAINER= tron@@NetBSD.org @ 1.17 log @Changes 1.2.0 * First stable release. Changes 1.1.94 * The support for multi-threaded users goes into its third incarnation. We removed compile time support for thread libraries. To support the thread library of your choice, you have to set up callback handlers at initialization time. New data structures, a new control command, and default initializers are provided for this purpose. * Interface changes relative to the 1.1.93 release: libgcrypt-config --thread OBSOLETE libgcrypt-pth.la REMOVED libgcrypt-pthread.la REMOVED GCRYCTL_SET_THREAD_CBS NEW struct gcrypt_thread_cbs NEW enum gcry_thread_option NEW GCRY_THREAD_OPTION_PTH_IMPL NEW GCRY_THREAD_OPTION_PTHREAD_IMPL NEW Changes 1.1.93 * The automatic thread library detection has finally been removed. From now on, only linking explicitely to libgcrypt, libgcrypt-pth or libgcrypt-pthread is supported. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.16 2004/04/29 15:03:47 wiz Exp $ d5 2 a6 2 MASTER_SITES= ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/ \ http://gd.tuwien.ac.at/privacy/gnupg/alpha/libgcrypt/ @ 1.16 log @Disable the pth-test, since it doesn't work correctly (bl3 problem?) on systems still needing pth. @ text @d1 1 a1 2 # $NetBSD: Makefile,v 1.15 2004/03/29 07:42:16 jlam Exp $ # d3 1 a3 1 DISTNAME= libgcrypt-1.1.92 d14 3 a16 5 USE_BUILDLINK3= YES USE_LIBTOOL= YES GNU_CONFIGURE= YES CONFIGURE_ARGS+= --without-pth-test a31 5 .if defined(PTHREAD_TYPE) && (${PTHREAD_TYPE} == "native") CONFIGURE_ARGS+= --without-pth .endif @ 1.15 log @Nuke the special libtool handling since the version of libgcrypt in pkgsrc does the right thing with assembler source files. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.14 2004/02/25 15:51:51 minskim Exp $ d19 2 @ 1.14 log @Update libgcrypt to 1.1.92. Changes since 1.1.90: - Included a limited implementation of RFC2268. - Changed API of the gcry_ac_ functions. - Code cleanups and minor bug fixes. - Interface changes: GCRY_CIPHER_RFC2268_40 NEW. gcry_ac_data_set CHANGED: New argument FLAGS. gcry_ac_data_get_name CHANGED: New argument FLAGS. gcry_ac_data_get_index CHANGED: New argument FLAGS. cry_ac_key_pair_generate CHANGED: New and reordered arguments. gcry_ac_key_test CHANGED: New argument HANDLE. gcry_ac_key_get_nbits CHANGED: New argument HANDLE. gcry_ac_key_get_grip CHANGED: New argument HANDLE. gcry_ac_data_search REMOVED. gcry_ac_data_add REMOVED. GCRY_AC_DATA_FLAG_NO_BLINDING REMOVED. GCRY_AC_FLAG_NO_BLINDING NEW: Replaces above. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.13 2004/02/14 17:21:52 jlam Exp $ a25 4 # Our "libtool" doesn't like the crafted ".lo" files with the assembly # implementations. So we use the bundled "libtool" for NetBSD-i386 ELF # and ours otherwise. # a28 3 LIBTOOL_OVERRIDE+= libtool .else LIBTOOL_OVERRIDE= # empty d31 1 d33 1 a37 1 .include "../../security/libgpg-error/buildlink3.mk" @ 1.13 log @LIBTOOL_OVERRIDE and SHLIBTOOL_OVERRIDE are now lists of shell globs relative to ${WRKSRC}. Remove redundant LIBTOOL_OVERRIDE settings that are automatically handled by the default setting in bsd.pkg.mk. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.12 2004/02/10 00:13:24 jlam Exp $ d4 1 a4 2 DISTNAME= libgcrypt-1.1.90 PKGREVISION= 1 d13 2 @ 1.12 log @bl3ify and remove libiconv and gettext-lib buildlink files. This package really only needs gettext-lib through libgpg-error, and doesn't need libiconv at all unless it uses the pkgsrc gettext-lib. The gettext-lib buildlink3.mk file combined with the buildlink3 framework is considerably better at detecting this than the buildlink2.mk, which broke in a lot of instances. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.11 2004/02/05 00:09:51 grant Exp $ d32 3 a34 1 LIBTOOL_OVERRIDE+= ${WRKSRC}/libtool @ 1.11 log @this needs libintl, so explicitly include gettext-lib/buildlink2.mk. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.10 2003/12/21 09:57:14 xtraeme Exp $ d14 1 a14 1 USE_BUILDLINK2= YES d28 3 a30 1 .if ${MACHINE_GNU_PLATFORM} != i386--netbsdelf && ${MACHINE_GNU_PLATFORM} != alpha--netbsd d35 2 a36 1 .if exists(/usr/include/pthread.h) d40 1 a40 5 .include "../../converters/libiconv/buildlink2.mk" .include "../../devel/gettext-lib/buildlink2.mk" .include "../../security/libgpg-error/buildlink2.mk" .include "../../mk/pthread.buildlink2.mk" @ 1.10 log @This needs libiconv's buildlink, reported by David Griffith PR pkg/23811. Bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.9 2003/12/06 00:26:59 xtraeme Exp $ d38 1 @ 1.9 log @Updated to 1.1.90, provided by Min Sik Kim PR pkg/23322. Changes: * The use of the GCRY_WEAK_RANDOM level is now deprecated in favor of the new gcry_create_nonce function. * gcry_sexp_build now supports a "%b" format to include a memory buffer. * Minor configuration fixes. * Interface changes relative to the 1.1.44 release: * Bug fixes and more code cleanups. * Enhanced the prime API. * Support for the Serpent cipher algorithm. And more... @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.8 2003/11/02 19:57:51 hubertf Exp $ d5 1 d37 1 a37 1 .include "../../mk/pthread.buildlink2.mk" d40 1 @ 1.8 log @Fix "libgcrypt-config --libs" to add -Wl,-R. Bump to 1.1.12nb1. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.7 2003/08/09 11:21:57 seb Exp $ d4 1 a4 2 DISTNAME= libgcrypt-1.1.12 PKGREVISION= 1 d31 7 @ 1.7 log @USE_NEW_TEXINFO is unnecessary now. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.6 2003/08/05 10:14:22 seb Exp $ d5 1 @ 1.6 log @Convert to USE_NEW_TEXINFO. Fix PLIST for missing info files. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.5 2003/07/17 22:52:57 grant Exp $ a18 1 USE_NEW_TEXINFO= YES @ 1.5 log @s/netbsd.org/NetBSD.org/ @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.4 2003/05/13 03:07:10 salo Exp $ d19 1 a19 1 TEXINFO_OVERRIDE= YES d21 1 a32 1 .include "../../mk/texinfo.mk" @ 1.4 log @Updated to version 1.1.12. Based on a patch sent by Juan RP via PR pkg/21559. Changes: - DESCR has 80 columns - style nits 1.1.12: ======= - gcry_pk_sign, gcry_pk_verify and gcry_pk_encrypt can now handle an optional pkcs1 flags parameter in the S-expression. A similar flag may be passed to gcry_pk_decrypt but it is only syntactically implemented. - New convenience macro gcry_md_get_asnoid. - There is now some real stuff in the manual. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.3 2003/02/08 23:01:02 dmcmahill Exp $ d9 1 a9 1 MAINTAINER= tron@@netbsd.org @ 1.3 log @do not disable asm on alpha. fixes recently noted compile problems @ text @d1 2 a2 1 # $NetBSD: Makefile,v 1.2 2003/02/02 22:00:24 tron Exp $ d4 1 a4 1 DISTNAME= libgcrypt-1.1.11 d11 1 a11 1 COMMENT= GNU's cryptographic library d13 5 a17 4 USE_BUILDLINK2= YES USE_LIBTOOL= YES GNU_CONFIGURE= YES TEST_TARGET= check @ 1.2 log @Set "USE_LIBTOOL" even if we use the bundled "libtool" so that buildlink2 will do the right thing. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.1.1.1 2003/02/02 17:27:48 tron Exp $ d15 1 d25 1 a25 1 .if ${MACHINE_GNU_PLATFORM} != i386--netbsdelf @ 1.1 log @Initial revision @ text @d1 1 a1 1 # $NetBSD$ d13 1 a24 1 USE_LIBTOOL= YES @ 1.1.1.1 log @Import new "libgcrypt" package: GNU's cryptographic library This fixes PR pkg/19732 by Juan RP. @ text @@