head 1.7; access; symbols pkgsrc-2023Q4:1.7.0.18 pkgsrc-2023Q4-base:1.7 pkgsrc-2023Q3:1.7.0.16 pkgsrc-2023Q3-base:1.7 pkgsrc-2023Q2:1.7.0.14 pkgsrc-2023Q2-base:1.7 pkgsrc-2023Q1:1.7.0.12 pkgsrc-2023Q1-base:1.7 pkgsrc-2022Q4:1.7.0.10 pkgsrc-2022Q4-base:1.7 pkgsrc-2022Q3:1.7.0.8 pkgsrc-2022Q3-base:1.7 pkgsrc-2022Q2:1.7.0.6 pkgsrc-2022Q2-base:1.7 pkgsrc-2022Q1:1.7.0.4 pkgsrc-2022Q1-base:1.7 pkgsrc-2021Q4:1.7.0.2 pkgsrc-2021Q4-base:1.7 pkgsrc-2021Q3:1.5.0.36 pkgsrc-2021Q3-base:1.5 pkgsrc-2021Q2:1.5.0.34 pkgsrc-2021Q2-base:1.5 pkgsrc-2021Q1:1.5.0.32 pkgsrc-2021Q1-base:1.5 pkgsrc-2020Q4:1.5.0.30 pkgsrc-2020Q4-base:1.5 pkgsrc-2020Q3:1.5.0.28 pkgsrc-2020Q3-base:1.5 pkgsrc-2020Q2:1.5.0.24 pkgsrc-2020Q2-base:1.5 pkgsrc-2020Q1:1.5.0.4 pkgsrc-2020Q1-base:1.5 pkgsrc-2019Q4:1.5.0.26 pkgsrc-2019Q4-base:1.5 pkgsrc-2019Q3:1.5.0.22 pkgsrc-2019Q3-base:1.5 pkgsrc-2019Q2:1.5.0.20 pkgsrc-2019Q2-base:1.5 pkgsrc-2019Q1:1.5.0.18 pkgsrc-2019Q1-base:1.5 pkgsrc-2018Q4:1.5.0.16 pkgsrc-2018Q4-base:1.5 pkgsrc-2018Q3:1.5.0.14 pkgsrc-2018Q3-base:1.5 pkgsrc-2018Q2:1.5.0.12 pkgsrc-2018Q2-base:1.5 pkgsrc-2018Q1:1.5.0.10 pkgsrc-2018Q1-base:1.5 pkgsrc-2017Q4:1.5.0.8 pkgsrc-2017Q4-base:1.5 pkgsrc-2017Q3:1.5.0.6 pkgsrc-2017Q3-base:1.5 pkgsrc-2017Q2:1.5.0.2 pkgsrc-2017Q2-base:1.5 pkgsrc-2017Q1:1.4.0.12 pkgsrc-2017Q1-base:1.4 pkgsrc-2016Q4:1.4.0.10 pkgsrc-2016Q4-base:1.4 pkgsrc-2016Q3:1.4.0.8 pkgsrc-2016Q3-base:1.4 pkgsrc-2016Q2:1.4.0.6 pkgsrc-2016Q2-base:1.4 pkgsrc-2016Q1:1.4.0.4 pkgsrc-2016Q1-base:1.4 pkgsrc-2015Q4:1.4.0.2 pkgsrc-2015Q4-base:1.4 pkgsrc-2015Q3:1.3.0.22 pkgsrc-2015Q3-base:1.3 pkgsrc-2015Q2:1.3.0.20 pkgsrc-2015Q2-base:1.3 pkgsrc-2015Q1:1.3.0.18 pkgsrc-2015Q1-base:1.3 pkgsrc-2014Q4:1.3.0.16 pkgsrc-2014Q4-base:1.3 pkgsrc-2014Q3:1.3.0.14 pkgsrc-2014Q3-base:1.3 pkgsrc-2014Q2:1.3.0.12 pkgsrc-2014Q2-base:1.3 pkgsrc-2014Q1:1.3.0.10 pkgsrc-2014Q1-base:1.3 pkgsrc-2013Q4:1.3.0.8 pkgsrc-2013Q4-base:1.3 pkgsrc-2013Q3:1.3.0.6 pkgsrc-2013Q3-base:1.3 pkgsrc-2013Q2:1.3.0.4 pkgsrc-2013Q2-base:1.3 pkgsrc-2013Q1:1.3.0.2 pkgsrc-2013Q1-base:1.3 pkgsrc-2012Q4:1.2.0.24 pkgsrc-2012Q4-base:1.2 pkgsrc-2012Q3:1.2.0.22 pkgsrc-2012Q3-base:1.2 pkgsrc-2012Q2:1.2.0.20 pkgsrc-2012Q2-base:1.2 pkgsrc-2012Q1:1.2.0.18 pkgsrc-2012Q1-base:1.2 pkgsrc-2011Q4:1.2.0.16 pkgsrc-2011Q4-base:1.2 pkgsrc-2011Q3:1.2.0.14 pkgsrc-2011Q3-base:1.2 pkgsrc-2011Q2:1.2.0.12 pkgsrc-2011Q2-base:1.2 pkgsrc-2011Q1:1.2.0.10 pkgsrc-2011Q1-base:1.2 pkgsrc-2010Q4:1.2.0.8 pkgsrc-2010Q4-base:1.2 pkgsrc-2010Q3:1.2.0.6 pkgsrc-2010Q3-base:1.2 pkgsrc-2010Q2:1.2.0.4 pkgsrc-2010Q2-base:1.2 pkgsrc-2010Q1:1.2.0.2 pkgsrc-2010Q1-base:1.2 pkgsrc-2009Q4:1.1.1.1.0.2 pkgsrc-2009Q4-base:1.1.1.1 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.7 date 2021.10.26.11.18.00; author nia; state Exp; branches; next 1.6; commitid PNswNV9GDLZeojeD; 1.6 date 2021.10.07.14.54.44; author nia; state Exp; branches; next 1.5; commitid nfjKlj1wTplMcTbD; 1.5 date 2017.05.31.23.31.13; author agc; state Exp; branches; next 1.4; commitid SomOqx9iZamIaBTz; 1.4 date 2015.11.04.01.18.09; author agc; state Exp; branches; next 1.3; commitid agUNgZr58GM2fIHy; 1.3 date 2013.03.02.17.57.53; author joerg; state Exp; branches; next 1.2; 1.2 date 2010.01.31.23.24.24; author joerg; state Exp; branches; next 1.1; 1.1 date 2009.12.14.08.00.05; author agc; state Exp; branches 1.1.1.1; next ; 1.1.1.1 date 2009.12.14.08.00.05; author agc; state Exp; branches; next ; desc @@ 1.7 log @security: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes Unfetchable distfiles (fetched conditionally?): ./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2 @ text @$NetBSD: distinfo,v 1.6 2021/10/07 14:54:44 nia Exp $ BLAKE2s (seccure-0.4.tar.gz) = a01e7176e3c52b793373bc7acef4b6fd311f17b3f00263ce7c185411517efd59 SHA512 (seccure-0.4.tar.gz) = 3372ecc473677a50822de39dfb62c449f1c03fd19c8f0bf72838d6dce452960bd1ca80ac8987c0e1f1874b515c94776ba2f26886150756f00c8bd849cfbfefa7 Size (seccure-0.4.tar.gz) = 31881 bytes SHA1 (patch-aa) = 91c83d4583d28cade721c105e52fd0535b7a0171 SHA1 (patch-seccure.c) = 61ff85bc1e6d4d7ec59903328ec079d176ba4e92 @ 1.6 log @security: Remove SHA1 hashes for distfiles @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.5 2017/05/31 23:31:13 agc Exp $ d3 1 a3 1 RMD160 (seccure-0.4.tar.gz) = fc35fdf69372c39b20a67c5341b1e36ce6bf8e9f @ 1.5 log @rework the link stage in the Makefile to specify -lgcrypt after all the object files, in an attempt to fix undefined references to all libgcrypt functions in Linux bulk build @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.4 2015/11/04 01:18:09 agc Exp $ a2 1 SHA1 (seccure-0.4.tar.gz) = 883e335f58cc36279c33493ab219f4940a46dab8 @ 1.4 log @Add SHA512 digests for distfiles for security category Problems found locating distfiles: Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz Package libidea: missing distfile libidea-0.8.2b.tar.gz Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2 Package uvscan: missing distfile vlp4510e.tar.Z Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.3 2013/03/02 17:57:53 joerg Exp $ d7 1 a7 1 SHA1 (patch-aa) = 4813ab5c58779c490a0e96314333b90397df97cd @ 1.3 log @Flatten a variable size union to a alloca'd buffer. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.2 2010/01/31 23:24:24 joerg Exp $ d5 1 @ 1.2 log @Fix rpath. Honour strip settings. @ text @d1 1 a1 1 $NetBSD: distinfo,v 1.1.1.1 2009/12/14 08:00:05 agc Exp $ d7 1 @ 1.1 log @Initial revision @ text @d1 1 a1 1 $NetBSD$ d6 1 a6 1 SHA1 (patch-aa) = 1a83424f90b94e38ccbb4c1d0fa210032c4aab65 @ 1.1.1.1 log @Initial import of seccure-0.4 into the Packages Collection. The seccure toolset implements a selection of asymmetric algorithms based on elliptic curve cryptography (ECC). In particular it offers public key encryption / decryption, signature generation / verification and key establishment. ECC schemes offer a much better key size to security ratio than classical systems (RSA, DSA). Keys are short enough to make direct specification of keys on the command line possible (sometimes this is more convenient than the management of PGP-like key rings). seccure builds on this feature and therefore is the tool of choice whenever lightweight asymmetric cryptography -- independent of key servers, revocation certificates, the Web of Trust or even configuration files -- is required. @ text @@