notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
Port details
gnupg Complete and free PGP implementation
2.4.6 security on this many watch lists=403 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 2.4.5_1Version of this port present on the latest quarterly branch.
Maintainer: adridg@FreeBSD.org search for ports maintained by this maintainer
Port Added: unknown
Last Update: 2024-11-22 05:14:39
Commit Hash: dd1496c
People watching this port, also watch:: libiconv, gmake, expat, png, freetype2
License: GPLv3 LGPL3
WWW:
https://www.gnupg.org/
Description:
GnuPG is a complete and free replacement for PGP. This is the "stable" version. GnuPG allows encrypting and signing your data and communication, and features a versatile key management system as well as access modules for many public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications.
Homepage    cgit ¦ Codeberg ¦ GitHub ¦ GitLab ¦ SVNWeb - no subversion history for this port

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
Expand this list (137 items)
Collapse this list.
  1. /usr/local/share/licenses/gnupg-2.4.6/catalog.mk
  2. /usr/local/share/licenses/gnupg-2.4.6/LICENSE
  3. /usr/local/share/licenses/gnupg-2.4.6/GPLv3
  4. /usr/local/share/licenses/gnupg-2.4.6/LGPL3
  5. bin/dirmngr
  6. bin/dirmngr-client
  7. bin/gpg-agent
  8. bin/gpg-card
  9. bin/gpg-connect-agent
  10. bin/gpg-mail-tube
  11. bin/gpg-wks-client
  12. bin/gpg-wks-server
  13. @comment @(,,4555) bin/gpg2
  14. bin/gpg2
  15. bin/gpgconf
  16. bin/gpgparsemail
  17. bin/gpgscm
  18. bin/gpgsm
  19. bin/gpgsplit2
  20. bin/gpgtar
  21. bin/gpgv2
  22. bin/kbxutil
  23. bin/watchgnupg
  24. @comment libexec/dirmngr_ldap
  25. libexec/gpg-auth
  26. libexec/gpg-check-pattern
  27. libexec/gpg-pair-tool
  28. libexec/gpg-preset-passphrase
  29. libexec/gpg-protect-tool
  30. libexec/gpg-wks-client
  31. libexec/keyboxd
  32. libexec/scdaemon
  33. share/man/man1/dirmngr-client.1.gz
  34. share/man/man1/gpg-agent.1.gz
  35. share/man/man1/gpg-card.1.gz
  36. share/man/man1/gpg-check-pattern.1.gz
  37. share/man/man1/gpg-connect-agent.1.gz
  38. share/man/man1/gpg-mail-tube.1.gz
  39. share/man/man1/gpg-preset-passphrase.1.gz
  40. share/man/man1/gpg-wks-client.1.gz
  41. share/man/man1/gpg-wks-server.1.gz
  42. share/man/man1/gpg2.1.gz
  43. share/man/man1/gpgconf.1.gz
  44. share/man/man1/gpgparsemail.1.gz
  45. share/man/man1/gpgsm.1.gz
  46. share/man/man1/gpgtar.1.gz
  47. share/man/man1/gpgv2.1.gz
  48. share/man/man1/scdaemon.1.gz
  49. share/man/man1/watchgnupg.1.gz
  50. share/man/man7/gnupg.7.gz
  51. share/man/man8/addgnupghome.8.gz
  52. share/man/man8/applygnupgdefaults.8.gz
  53. share/man/man8/dirmngr.8.gz
  54. sbin/addgnupghome
  55. sbin/applygnupgdefaults
  56. share/doc/gnupg/DCO
  57. share/doc/gnupg/DETAILS
  58. share/doc/gnupg/FAQ
  59. share/doc/gnupg/HACKING
  60. share/doc/gnupg/KEYSERVER
  61. share/doc/gnupg/OpenPGP
  62. share/doc/gnupg/README
  63. share/doc/gnupg/TRANSLATE
  64. share/doc/gnupg/examples/README
  65. share/doc/gnupg/examples/common.conf
  66. share/doc/gnupg/examples/gpgconf.conf
  67. share/doc/gnupg/examples/gpgconf.rnames
  68. share/doc/gnupg/examples/pwpattern.list
  69. share/doc/gnupg/examples/qualified.txt
  70. share/doc/gnupg/examples/scd-event
  71. share/doc/gnupg/examples/trustlist.txt
  72. share/doc/gnupg/help.be.txt
  73. share/doc/gnupg/help.ca.txt
  74. share/doc/gnupg/help.cs.txt
  75. share/doc/gnupg/help.da.txt
  76. share/doc/gnupg/help.de.txt
  77. share/doc/gnupg/help.el.txt
  78. share/doc/gnupg/help.eo.txt
  79. share/doc/gnupg/help.es.txt
  80. share/doc/gnupg/help.et.txt
  81. share/doc/gnupg/help.fi.txt
  82. share/doc/gnupg/help.fr.txt
  83. share/doc/gnupg/help.gl.txt
  84. share/doc/gnupg/help.hu.txt
  85. share/doc/gnupg/help.id.txt
  86. share/doc/gnupg/help.it.txt
  87. share/doc/gnupg/help.ja.txt
  88. share/doc/gnupg/help.nb.txt
  89. share/doc/gnupg/help.pl.txt
  90. share/doc/gnupg/help.pt.txt
  91. share/doc/gnupg/help.pt_BR.txt
  92. share/doc/gnupg/help.ro.txt
  93. share/doc/gnupg/help.ru.txt
  94. share/doc/gnupg/help.sk.txt
  95. share/doc/gnupg/help.sv.txt
  96. share/doc/gnupg/help.tr.txt
  97. share/doc/gnupg/help.txt
  98. share/doc/gnupg/help.zh_CN.txt
  99. share/doc/gnupg/help.zh_TW.txt
  100. share/gnupg/distsigkey.gpg
  101. share/gnupg/sks-keyservers.netCA.pem
  102. share/locale/ca/LC_MESSAGES/gnupg2.mo
  103. share/locale/cs/LC_MESSAGES/gnupg2.mo
  104. share/locale/da/LC_MESSAGES/gnupg2.mo
  105. share/locale/de/LC_MESSAGES/gnupg2.mo
  106. share/locale/el/LC_MESSAGES/gnupg2.mo
  107. share/locale/en@boldquot/LC_MESSAGES/gnupg2.mo
  108. share/locale/en@quot/LC_MESSAGES/gnupg2.mo
  109. share/locale/eo/LC_MESSAGES/gnupg2.mo
  110. share/locale/es/LC_MESSAGES/gnupg2.mo
  111. share/locale/et/LC_MESSAGES/gnupg2.mo
  112. share/locale/fi/LC_MESSAGES/gnupg2.mo
  113. share/locale/fr/LC_MESSAGES/gnupg2.mo
  114. share/locale/gl/LC_MESSAGES/gnupg2.mo
  115. share/locale/hu/LC_MESSAGES/gnupg2.mo
  116. share/locale/id/LC_MESSAGES/gnupg2.mo
  117. share/locale/it/LC_MESSAGES/gnupg2.mo
  118. share/locale/ja/LC_MESSAGES/gnupg2.mo
  119. share/locale/nb/LC_MESSAGES/gnupg2.mo
  120. share/locale/nl/LC_MESSAGES/gnupg2.mo
  121. share/locale/pl/LC_MESSAGES/gnupg2.mo
  122. share/locale/pt/LC_MESSAGES/gnupg2.mo
  123. share/locale/ro/LC_MESSAGES/gnupg2.mo
  124. share/locale/ru/LC_MESSAGES/gnupg2.mo
  125. share/locale/sk/LC_MESSAGES/gnupg2.mo
  126. share/locale/sv/LC_MESSAGES/gnupg2.mo
  127. share/locale/tr/LC_MESSAGES/gnupg2.mo
  128. share/locale/uk/LC_MESSAGES/gnupg2.mo
  129. share/locale/zh_CN/LC_MESSAGES/gnupg2.mo
  130. share/locale/zh_TW/LC_MESSAGES/gnupg2.mo
  131. @postexec [ -e %D/bin/gpg ] || ln -sf gpg2 %D/bin/gpg
  132. @postunexec [ -e %D/bin/gpg ] || rm -f %D/bin/gpg
  133. @postexec [ -e %D/share/man/man1/gpg.1.gz ] || ln -sf gpg2.1.gz %D/share/man/man1/gpg.1.gz
  134. @postunexec [ -e %D/share/man/man1/gpg.1.gz ] || rm -f %D/share/man/man1/gpg.1.gz
  135. @owner
  136. @group
  137. @mode
Collapse this list.
Dependency lines:
  • gnupg>0:security/gnupg
Conflicts:
CONFLICTS:
  • dirmngr
To install the port:
cd /usr/ports/security/gnupg/ && make install clean
To add the package, run one of these commands:
  • pkg install security/gnupg
  • pkg install gnupg
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: gnupg
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1730927376 SHA256 (gnupg-2.4.6.tar.bz2) = 95acfafda7004924a6f5c901677f15ac1bda2754511d973bb4523e8dd840e17a SIZE (gnupg-2.4.6.tar.bz2) = 8011304

Packages (timestamps in pop-ups are UTC):
gnupg
ABIaarch64amd64armv6armv7i386powerpcpowerpc64powerpc64le
FreeBSD:13:latest2.4.5_12.4.5_12.2.272.4.5_12.4.5_1---
FreeBSD:13:quarterly2.4.5_12.4.5_1-2.4.5_12.4.5_12.4.3_42.4.3_42.4.3_4
FreeBSD:14:latest2.4.5_12.4.5_12.3.82.4.5_12.4.5_12.3.8-2.3.8
FreeBSD:14:quarterly2.4.5_12.4.5_1-2.4.5_12.4.5_12.4.3_42.4.3_42.4.3_4
FreeBSD:15:latest2.4.5_12.4.5_1n/a2.4.5_1n/a2.4.3_52.4.3_52.4.4
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. msgfmt : devel/gettext-tools
  2. gmake>=4.4.1 : devel/gmake
  3. makeinfo : print/texinfo
  4. pkgconf>=1.3.0_1 : devel/pkgconf
  5. gettext-runtime>=0.22_1 : devel/gettext-runtime
  6. autoconf>=2.72 : devel/autoconf
  7. automake>=1.17 : devel/automake
Runtime dependencies:
  1. pinentry : security/pinentry
  2. indexinfo : print/indexinfo
Library dependencies:
  1. libassuan.so : security/libassuan
  2. libgcrypt.so : security/libgcrypt
  3. libgpg-error.so : security/libgpg-error
  4. libksba.so : security/libksba
  5. libnpth.so : devel/npth
  6. libgnutls.so : security/gnutls
  7. libreadline.so.8 : devel/readline
  8. libsqlite3.so : databases/sqlite3
  9. libintl.so : devel/gettext-runtime
This port is required by:
for Build
  1. devel/subversion
  2. devel/subversion-lts
  3. mail/cone
  4. mail/mutt
  5. mail/pine-pgp-filters
  6. mail/sqwebmail
  7. news/inn
Expand this list (21 items / 14 hidden - sorry, this count includes any deleted ports)
  1. Collapse this list).
  2. news/inn-current
  3. security/clamav-unofficial-sigs
  4. security/gcr
  5. security/gcr3
  6. security/gpa
  7. security/gpgme
  8. security/libcryptui
  9. security/p5-GnuPG-Interface
  10. security/p5-Module-Signature
  11. security/p5-PGP-Sign
  12. security/seahorse
  13. Collapse this list.

Deleted ports which required this port:

Expand this list of 3 deleted ports
  1. emulators/pipelight*
  2. news/inn-CURRENT*
  3. security/openpgpsdk*
  4. Collapse this list of deleted ports.
for Run
  1. deskutils/py-paperless
  2. deskutils/py-paperless-ngx
  3. devel/geany-plugin-pg
  4. devel/qca
  5. devel/subversion
  6. devel/subversion-lts
  7. emulators/playonbsd
Expand this list (71 items / 64 hidden - sorry, this count includes any deleted ports)
  1. Collapse this list).
  2. mail/cone
  3. mail/ez-pine-gpg
  4. mail/mutt
  5. mail/pine-pgp-filters
  6. mail/sqwebmail
  7. mail/sylpheed
  8. net-im/mastodon
  9. news/inn
  10. news/inn-current
  11. news/tin
  12. security/aespipe
  13. security/clamav-unofficial-sigs
  14. security/git-crypt
  15. security/git-remote-gcrypt
  16. security/git-secret
  17. security/gopass
  18. security/gpa
  19. security/gpg-gui
  20. security/gpg-tui
  21. security/gpgme
  22. security/gtkpasman
  23. security/gvmd
  24. security/kgpg
  25. security/libcryptui
  26. security/monkeysphere
  27. security/p5-GnuPG-Interface
  28. security/p5-Module-Signature
  29. security/p5-PGP-Sign
  30. security/py-muacrypt
  31. security/rubygem-gpgr
  32. security/seahorse
  33. security/signing-party
  34. security/spm
  35. security/transcrypt
  36. sysutils/debootstrap
  37. sysutils/duplicity
  38. sysutils/password-store
  39. sysutils/zogftw
  40. www/py-woob
  41. Collapse this list.

Deleted ports which required this port:

Expand this list of 25 deleted ports
  1. chinese/tin*
  2. devel/qca-legacy*
  3. devel/qca-qt5*
  4. emulators/pipelight*
  5. irc/py-gozerbot*
  6. mail/enigmail*
  7. mail/enigmail-seamonkey*
  8. mail/enigmail-thunderbird*
  9. mail/enigmail-thunderbird-esr*
  10. mail/enigmail-thunderbird3*
  11. mail/horde-dimp*
  12. mail/horde-mimp*
  13. mail/horde3-dimp*
  14. mail/horde3-imp*
  15. mail/horde3-mimp*
  16. mail/thunderbird-esr*
  17. misc/kdeutils3*
  18. news/inn-CURRENT*
  19. security/kgpg-kde4*
  20. security/scamp*
  21. security/sguil*
  22. security/sguil-client*
  23. sysutils/duplicity-devel*
  24. sysutils/duplicity07*
  25. www/py-weboob*
  26. Collapse this list of deleted ports.
* - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

Configuration Options:
===> The following configuration options are available for gnupg-2.4.6: DOCS=on: Build and/or install documentation GNUTLS=on: SSL/TLS support via GnuTLS LARGE_RSA=off: Enable support for 8192-bit RSA keys LDAP=off: LDAP keyserver interface NLS=on: Native Language Support SCDAEMON=on: Enable Smartcard daemon (with libusb) SUID_GPG=off: Install GPG as SUID root WKS_SERVER=on: Install the Web Key Service server ===> Use 'make config' to modify these settings
Options name:
security_gnupg
USES:
autoreconf compiler:c11 cpe gettext-tools gmake iconv makeinfo pkgconfig readline sqlite tar:bzip2 gettext
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (4 items)
Collapse this list.
  1. http://www.ring.gr.jp/pub/net/gnupg/gnupg/
  2. https://gnupg.org/ftp/gcrypt/gnupg/
  3. https://mirrors.dotsrc.org/gcrypt/gnupg/
  4. https://www.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/gnupg/
Collapse this list.

Number of commits found: 284 (showing only 100 on this page)

«  1 | 2 | 3  »  

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
2.1.7
17 Aug 2015 01:47:46
Revision:394433Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Add more signature (locally verified).

PR:		ports/202312
Submitted by:	igorz@yandex.ru
2.1.7
11 Aug 2015 22:50:18
Revision:393983Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.1.7 (minor fixes).
2.1.6
20 Jul 2015 13:01:34
Revision:392566Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix build WITHOUT=NLS.

Sponsored by:	Absolight
2.1.6
02 Jul 2015 14:10:32
Revision:391147Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.1.6 (minor bugfixes).

Announce:	https://lists.gnupg.org/pipermail/gnupg-announce/2015q3/000370.html
2.1.5
13 Jun 2015 07:34:05
Revision:389326Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.1.5 (bugfixes, minor enhancements).
2.1.4_1
24 May 2015 12:55:13
Revision:387262Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Update dist signature file.

Old one has "Werner Koch (dist sig)" only (287 bytes).  New one adds
"NIIBE Yutaka (GnuPG Release Key) <gniibe@fsij.org>" signature (574 bytes).

I verified both of signature files.

Reported by:	Lena@lena.kiev.ua
2.1.4_1
19 May 2015 14:16:25
Revision:386777Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 2.1.4 (bugfixes since 2.1.2).
2.1.2_1
18 May 2015 23:54:32
Revision:386725Original commit files touched by this commit This port version is marked as vulnerable.
olgeni search for other commits by this committer
Add references to security/pinentry-tty.
2.1.2_1
14 May 2015 10:15:09
Revision:386312Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
2.1.2_1
13 Apr 2015 02:55:30
Revision:383891Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Add CPE information [1].
- Fix accidentally linking devel/readline if installed [2].

# I'm working on 2.1.3 update, but it requires LDAP header even if
# disabled.  Stay tuned (or patches are welcome).

PR:		ports/198849 [1], ports/198036 and ports/198354 [2]
Submitted by:	shun.fbsd.pr@dropcut.net [1], amdmi3 and jf@fahrner.name [2]
2.1.2
18 Feb 2015 22:31:00
Revision:379323Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.1.2 (bugfixes).
2.1.1_1
16 Feb 2015 20:48:30
Revision:379107Original commit files touched by this commit This port version is marked as vulnerable.
zi search for other commits by this committer
- Fix version requirement for security/libgpg-error BUILD_DEPEND
2.1.1_1
02 Jan 2015 18:46:34
Revision:376062Original commit files touched by this commit This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: 1.6.1 -> 1.6.2, bump depends

Changes:
- src/sexp.c (do_vsexp_sscan): Return error for invalid args.
- cipher/md.c (_gcry_md_info): Fix a segv in case of calling
  with wrong parameters.
- cipher/primegen.c (_gcry_generate_elg_prime): Change to return an
  error code, possible NULL deref in call to prime generator.
- cipher/dsa.c (generate): Take care of new return code.
- cipher/elgamal.c (generate): Change to return an error code.  Take
	care of _gcry_generate_elg_prime return code.
- ecc: Support the non-standard 0x40 compression flag for EdDSA.
- mpi: Extend the internal mpi_get_buffer.
- mpi: Fix regression for powerpc-apple-darwin detection.
- Fix bug inhibiting the use of the sentinel attribute in src/gcrypt.h.in
(Only the first 15 lines of the commit message are shown above View all of this commit message)
2.1.1
28 Dec 2014 14:04:03
Revision:375723Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.1.1 and various fixes.

Sorry for mess at introducing 2.1.0.  This branch is *modern* release,
and please use security/gnupg{1,20} for stable gpg.  Patches are welcome
to use DEFAULT_VERSIONS. :-)

PR:		ports/195489, ports/195931, ports/195459, ports/196301
Submitted by:	rakuco, Matthew West <freebsd@r.zeeb.org>, Phil Pennock
<freebsd@phil.spodhuis.org>, tijl
2.1.0_1
24 Dec 2014 17:46:50
Revision:375475Original commit files touched by this commit This port version is marked as vulnerable.
gjb search for other commits by this committer
Update security/gnupg*/pkg-message to reflect
reality.

Sponsored by:	The FreeBSD Foundation
2.1.0_1
22 Nov 2014 09:55:13
Revision:373043Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Turn pinentry dependency mandatory, not option. [1]
- Remove gpg-zip.1.gz manpage which command is not installed. [2]

PR:		ports/194788 [1], ports/195229 [2]
Submitted by:	donaldcallen@gmail.com [1], crest@sahiro.org [2]
2.1.0
20 Nov 2014 05:11:21
Revision:372835Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade security/gnupg to 2.1.0 (modern release) and copy previous
  as security/gnupg20 (stable release).
- Set PINENTRY as default option.
2.0.26_1
13 Nov 2014 09:02:57
Revision:372514Original commit files touched by this commit This port version is marked as vulnerable.
antoine search for other commits by this committer
Cleanup plist
2.0.26_1
16 Sep 2014 13:44:13
Revision:368312Original commit files touched by this commit This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Drop .la files for security/libksba, no dependees require them
- Bump dependent ports as .so version has changed

Approved by:	portmgr blanket
2.0.26
14 Aug 2014 22:16:17
Revision:364873Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.26 (minor fixes).
2.0.25_2
05 Aug 2014 22:13:29
Revision:364143Original commit files touched by this commit This port version is marked as vulnerable.
tijl search for other commits by this committer
Bump PORTREVISION on more ports that depend on libgcrypt after the update
in r363436 and remove the UPDATING entry because it did not guarantee
that all ports were updated nor that they were updated in the right order.
Also remove libgcrypt.la again.

PR:		192342
Approved by:	portmgr (implicit, bump unstaged ports)
2.0.25_1
24 Jul 2014 18:34:16
Revision:362835Original commit files touched by this commit This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
2.0.25
30 Jun 2014 22:44:52
Revision:359936Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.25 (bugfix).
- Fix STD_SOCKET option argument [1].

PR:		ports/191150 [1]
Submitted by:	mazhe@alkumuna.eu [1]
2.0.24
24 Jun 2014 14:42:42
Revision:359088Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.24 (security).
- Explicitly depends on libgpg-error>=1.11 [1]
- Turn on PINENTRY option by default [2]
  (I don't like this, but by popular demand for years...)

Submitted by:	dereckson@gmail.com [1], sbruno [2]
PR:		ports/138424 [1], ports/189394 [2]
2.0.23
03 Jun 2014 16:57:23
Revision:356379Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Convert to new LIB_DEPENDS format
- Use USES=tar:bzip2

Approved by:	portmgr (blanket)
2.0.23
03 Jun 2014 12:19:50
Revision:356333Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.23 (minor enhancement).
2.0.22
02 Dec 2013 12:05:46
Revision:335479Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix KDNS option.

Reported by:	geoffroy desvernay
Pointy hat to:	mat
2.0.22
29 Nov 2013 15:16:28
Revision:335188Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Convert to new options framekwork.

maintainer timeout.

PR:		ports/183955
Submitted by:	mat
2.0.22
14 Nov 2013 05:37:22
Revision:333739Original commit files touched by this commit This port version is marked as vulnerable.
eadler search for other commits by this committer
Fix build with KDNS: --with-adns must be passed to configure.

PR:		ports/183113
Submitted by:	Erick Turnquist <jhujhiti@adjectivism.org>
Approved by:	maintainer timeout (3 weeks)
2.0.22
06 Oct 2013 15:04:10
Revision:329582Original commit files touched by this commit This port version is marked as vulnerable.
antoine search for other commits by this committer
Fix staging:
- add man pages to the plist
- remove pkg-install and pkg-message from post-install
  (the gpg symlink creation was violating stage)
- re-add INFO to Makefile
- use @mode instead of chmod to allow packaging setuid as user

While here, USE_GMAKE->USES=gmake, use OPTIONS_SUB instead of PLIST_SUB
and use %%PORTDOCS%% for help files as they do not exist with --disable-doc

Approved by:	Jun Kuriyama (maintainer)
2.0.22
05 Oct 2013 09:34:12
Revision:329429Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade 2.0.22 (security, VuXML entry will follow).
- Pet portlint about pkg-plist.
- Use $STAGEDIR.
- Turn setuid knob to OptionsNG [1]

PR:		ports/181495 [1]
Submitted by:	Matthew Luckie <mjl@luckie.org.nz> [1]
2.0.21
20 Sep 2013 22:55:26
Revision:327769Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
2.0.21
19 Aug 2013 13:29:43
Revision:324990Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.21 (minor improvements).
2.0.20_1
11 Jul 2013 16:26:27
Revision:322783Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Update to 7.31.0
- Bump PORTREVISION for ftp/curl shlib change
- Add TEST_DEPENDS
- Convert to new options framework
- Adjust options:
  - Add COOKIES
  - Add CYASSL, NSS, POLARSSL, THREADED_RESOLVER, TLS_SRP [1]
  - Add GSSAPI and SPNEGO [2]
  - Remove KERBEROS4
  - Rename LIBIDN to IDN
  - Remove TRACKMEMORY [1]
- Sort option handler
- Add SLAVEDIRS: ftp/curl-hiphop
- Cosmetic change
- Cleanup Makefile header
- While I'm here, fix typo (PORTREVSION) in x11-wm/ede/Makefile

Changes:	http://curl.haxx.se/changes.html
PR:		ports/172325 (-exp run), ports/177369 (based on) [1]
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> [1], hrs (via email) [2]
Exp run by:	miwi
2.0.20
11 May 2013 01:38:42
Revision:317847Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.20.
2.0.19_4
03 May 2013 16:36:41
Revision:317220Original commit files touched by this commit This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Chase security/libgcrypt update
2.0.19_3
29 Apr 2013 16:43:05
Revision:316831Original commit files touched by this commit This port version is marked as vulnerable.
rene search for other commits by this committer
In preparation of removing devel/libusb (expires 2013-04-30), remove it
from these ports.

Other changes:
- convert Makefile header
- convert to optionsNG
- remove indefinite article from comment
- drop support for FreeBSD < 8.0
- pet portlint (leave library ABI versions in LIB_DEPENDS)
- net-mgmt/spectools: change option name from GTK to GTK2 to use default
  description from bsd.options.desc.mk

Approved by:	portmgr (bapt)
2.0.19_3
27 Apr 2013 18:25:25
Revision:316683Original commit files touched by this commit This port version is marked as vulnerable.
mva search for other commits by this committer
- Convert USE_ICONV=yes to USES=iconv
- Change USE_GNOME=pkgconfig|gnomehack to USES=pathfix|pkgconfig and
  USE_GETTEXT=yes to USES=gettext while here
2.0.19_3
24 Apr 2013 18:10:32
Revision:316464Original commit files touched by this commit This port version is marked as vulnerable.
ak search for other commits by this committer
- Convert USE_GETTEXT to USES (part 3)

Approved by:	portmgr (bapt)
2.0.19_3
27 Dec 2012 14:04:18
Revision:309542Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix with NOPORTDOCS=yes [1,2]
- Fix CURL option handled incorrectly [3,4]

PR:		ports/170543 [1], ports/171848 [2], ports/171370 [3], ports/174075 [4]
Submitted by:	Rainer Duffner <rainer@ultra-secure.de> [1], Konstantinos
Koukopoulos <koukopoulos@gmail.com> [2], John Marshall
<john.marshall@riverwillow.com.au> [3], Phil Pennock <phil.pennock@globnix.org>
[4]
2.0.19_2
13 Aug 2012 14:17:35
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Revert previous tty patch until matured.
2.0.19_1
05 Aug 2012 09:41:58
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Convert to OptionsNG.
- Don't install gpg-zip.1 manpage as gpg-zip script is not installed
  [1].
- Fix /dev/tty brokenness [2].

PR:		ports/170327 [1], ports/170269 [2]
Submitted by:	Alfred Bartsch <bartsch@dssgmbh.de> [1],
	  	Ben Cottrell <tamino@wolfhut.org> [2]
2.0.19
04 May 2012 11:07:46
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Add optional dependency on security/pinentry port.

I'd like to keep this port (and package built on pointyhat) having
simple dependencies.  So this knob is off by default.

PR:             ports/156287, ports/164333
Submitted by:   Joseph Olatt <joji@eskimo.com>, Oliver Herold <oh@fixmbr.de>
2.0.19
04 May 2012 07:27:37
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix (and sort) plist with NLS option.

PR:             ports/167546
Submitted by:   Dima Panov <fluffy@Fluffy.Khv.RU>
2.0.19
27 Mar 2012 10:03:39
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.19.

Feature safe:   yes
2.0.18_1
26 Sep 2011 14:49:01
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix libcurl detection.

PR:             ports/160535
Submitted by    John Marshall <john.marshall@riverwillow.com.au>
2.0.18
05 Aug 2011 00:35:25
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.18:
  - Support the SSH confirm flag and show SSH fingerprints in ssh
    related pinentries.
  - Improved dirmngr/gpgsm interaction for OCSP.
  - Allow generation of card keys up to 4096 bit.

- Improve for port:
  - Remove patch that was incorporated into this release.
  - Remove redundant BUILD_DEPENDS.
  - Patching should be done in a -patch target. Silence the REINPLACE.

Submitted by:   dougb
PR:             ports/159520
2.0.17_3
14 Jul 2011 08:19:00
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Add a patch to handle an ABI change relative to libgcrypt 1.5

Confirmed upstream:
http://lists.gnupg.org/pipermail/gnupg-users/2011-July/042333.html

PR:             ports/158674
Submitted by:   Mark Atkinson <atkin901@gmail.com>
Approved by:    early maintainer timeout/portmgr (pav)
2.0.17_2
03 Jul 2011 11:40:49
Original commit files touched by this commit This port version is marked as vulnerable.
swills search for other commits by this committer
- Chase the libgcrypt shared lib version
2.0.17_1
27 Mar 2011 19:03:02
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Update libksba to 1.2.0, and update dependent ports.
The patch also adds a verify target for the PGP signature
of the distfile.

Noteworthy changes in version 1.2.0 (2011-03-01)
------------------------------------------------

* New functions to allow the creation of X.509 certificates.

This release adds features required by the GnuPG 2.1 development
version.

PR:             ports/155506
Submitted by:   me
Approved by:    maintainer timeout
2.0.17
08 Feb 2011 03:40:16
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Version 2.0.17 was released on 2011-01-13:

What's New
===========
* Allow more hash algorithms with the OpenPGP v2 card.
* The gpg-agent now tests for a new gpg-agent.conf on a HUP.
* Fixed output of "gpgconf --check-options".
* Fixed a bug where Scdaemon sends a signal to Gpg-agent running in
  non-daemon mode.
* Fixed TTY management for pinentries and session variable update
  problem.
* Minor bug fixes.

For the port:
Camellia stopped being a configure option in 2.0.12
Fix minor typo for GPGSM OPTION
Minor plist update for 2.0.17

files/patch-keybox-blob.c seems to be no longer needed [2]

PR:             ports/153984
Submitted by:   me
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp> [2]
Approved by:    maintainer timeout (24 days)
Feature safe:   yes
2.0.16_6
14 Jan 2011 07:42:11
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix the shared library version number for libassuan to reflect what
the authors intended by adding:

USE_AUTOTOOLS=  libtool
USE_GNOME=      ltverhack

to security/libassuan/Makefile.

Update the libassuan shared library version number and/or bump
PORTREVISION in the dependent ports.

Requested by:   ale
Feature safe:   yes
2.0.16_5
22 Dec 2010 19:16:12
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Update libassuan to version 2.0.1:

* Input and output notification handler can now really access the
  parsed fd as stated in the manual.

* Cleaned up the logging.

Bump PORTREVISION and libassuan version number in related ports
2.0.16_4
16 Dec 2010 14:16:46
Original commit files touched by this commit This port version is marked as vulnerable.
glarkin search for other commits by this committer
- Chase libksba shlib version bump in directly-dependent ports

Reported by:            ale and others via private email
Another pointy to:      glarkin
2.0.16_3
16 Dec 2010 02:34:07
Original commit files touched by this commit This port version is marked as vulnerable.
glarkin search for other commits by this committer
- Chase security/libksba shlib version bump

Requested by:   kwm
Pointyhat to:   glarkin
2.0.16_2
19 Nov 2010 03:34:08
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix WITH_SUID_GPG knob.

PR:             152359
Submitted by:   sunpoet
2.0.16_2
27 Jul 2010 01:25:20
Original commit files touched by this commit This port version is marked as vulnerable.
wxs search for other commits by this committer
Chase security/libgcrypt shlib bump.

PR:             ports/148755
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
2.0.16_1
23 Jul 2010 13:43:26
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix $LICENSE_FILE [1].
- Fix realloc bug in GPGSM (not affected GPG itself) [2].

PR:             ports/148817 [1]
Submitted by:   Anonymous <swell.k@gmail.com> [1]
Security:      
http://lists.gnupg.org/pipermail/gnupg-announce/2010q3/000302.html [2]
2.0.16
20 Jul 2010 14:01:50
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.16.
- Add license info.

PR:             ports/148756
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
2.0.15
17 Jun 2010 21:33:29
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Update to version 2.0.15, which has the following changes:
 * New command --passwd for GPG.
 * Fixes a regression in 2.0.14 which prevented unprotection of new
   or changed gpg-agent passphrases.
 * Make use of libassuan 2.0 which is available as a DSO.

For the port:
 * Since libassuan is now a shared lib, move it LIB_DEPENDS
 * Remove now-spurious CONFLICTS

Approved by:    maintainer
2.0.14_3
14 Jun 2010 05:17:52
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix port name on the LEFT side of the : for BUILD_DEPENDS

While I'm here update to the current version of libassuan-1 (1.0.5)
2.0.14_3
14 Jun 2010 00:42:52
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Update security/libassuan to version 2.0.0, which is required by gnupg 2.0.15

Unfortunately version 2.0.0 is largely incompatible with version 1.x, so it
is necessary to have a stopgap measure while ports that depend on libassuan
can be updated. In conversation with the maintainers of the dependent ports
it was originally considered ideal to prepare updates for the ports first,
then upgrade everything to libassuan 2.x en masse. Since no action has
arisen on that front, go with plan B:

Copy security/libassuan to security/libassuan-1, and update the dependent
ports accordingly. Because this is (intended to be) a _temporary_ measure,
and because no updates for libassuan 1.x are anticipated, and because the
hope is that it can be removed sooner rather than later, it's a copy instead
of a repocopy.
2.0.14_2
31 May 2010 02:01:56
Original commit files touched by this commit This port version is marked as vulnerable.
ade search for other commits by this committer
Bounce PORTREVISION for gettext-related ports.  Have fun, ya'll.
2.0.14_1
03 Apr 2010 10:44:36
Original commit files touched by this commit This port version is marked as vulnerable.
roam search for other commits by this committer
Chase the ftp/curl shlib version bump.
2.0.14
16 Jan 2010 06:27:17
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Unbreak on 9-current (utmpx).

PR:             ports/142865, ports/142871
Submitted by:   garga, keramida
Tested on:      9-current, 8.0
2.0.14
22 Dec 2009 08:24:33
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.14.
2.0.13
05 Sep 2009 15:22:50
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.13.
2.0.12
18 Jul 2009 09:03:43
Original commit files touched by this commit This port version is marked as vulnerable.
miwi search for other commits by this committer
Add security/pinentry-qt4 to the list of pinentry dialogs.

PR:             136097
Submitted by:   makc@
Approved by:    maintainer timeout
2.0.12
17 Jun 2009 14:59:03
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.12.
- Turn on Camellia option (rfc5581 published).

PR:             ports/135668
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
2.0.11
09 Mar 2009 17:15:43
Original commit files touched by this commit Sanity Test Failure This port version is marked as vulnerable.
stas search for other commits by this committer
- Chase libusb20 rename in r189585.
- Mark sane-backends broken on current due to changes
  in USB stack.

Reviewed by:    thompsa (old version), miwi
Tested by:      miwi
2.0.11
04 Mar 2009 14:27:11
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 2.0.11 (minor fixes).
2.0.10_2
23 Jan 2009 15:43:14
Original commit files touched by this commit This port version is marked as vulnerable.
roam search for other commits by this committer
Bump the version of the curl shared library after the ftp/curl update
to 7.19.2.
Bump PORTREVISION, even on the ports that do not have a versioned
dependency, since the binaries will most probably still stop working.
2.0.10_1
20 Jan 2009 23:49:58
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Add notice about CAMELLIA option (for testing only) [1].
- Turn CAMELLIA off by default for above reason.

Suggested by:   dougb [1]
2.0.10
13 Jan 2009 01:24:47
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 2.0.10.

PR:             ports/130430
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
Announcement:  
https://lists.gnupg.org/pipermail/gnupg-announce/2009q1/000284.html
2.0.9_3
06 Jan 2009 13:01:11
Original commit files touched by this commit This port version is marked as vulnerable.
rafan search for other commits by this committer
- Bump PORTREVISION due to share library version bump in security/libgcrypt

PR:              ports/127478
2.0.9_2
27 Jul 2008 15:13:59
Original commit files touched by this commit This port version is marked as vulnerable.
timur search for other commits by this committer
Make WITHOUT_NLS actually work
2.0.9_1
06 Jun 2008 14:01:07
Original commit files touched by this commit This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
2.0.9
26 Apr 2008 23:48:43
Original commit files touched by this commit This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 2.0.9

Notes:
        This update fixes a possible security vulnerability involving
        memory corruption from importing malicious keys.

PR:             122114/122349
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp> / Nick Barkas
<snb@threerings.net>
Approved by:    maintainer timeout
Security:      
http://www.vuxml.org/freebsd/30394651-13e1-11dd-bab7-0016179b2dd5.html
2.0.8
04 Mar 2008 22:57:42
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.8.
- Change dependency versions.
- NLS option back again.
- Make GPGSM option off by default (to avoid ldap dependency in package).

PR:             ports/118895
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
2.0.4_1
28 Feb 2008 21:47:06
Original commit files touched by this commit This port version is marked as vulnerable.
arved search for other commits by this committer
Chase libgcrypt library version
2.0.4
13 Oct 2007 11:10:09
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Add a note "require LDAP" in GPGSM knob for $OPTIONS.  This may help
  to reduce confusion when "WITHOUT_LDAP and WITH_GPGSM selected, but
  OpenLDAP dependency exists" situcation.

PR:             ports/116558
Reported by:    Jo Rhett <jrhett@netconsonance.com>
2.0.4
03 Sep 2007 04:31:51
Original commit files touched by this commit This port version is marked as vulnerable.
novel search for other commits by this committer
Backout the commit with addition of pinentry as a run dependency because
it needs discussion.
2.0.4
02 Sep 2007 11:08:10
Original commit files touched by this commit This port version is marked as vulnerable.
novel search for other commits by this committer
Add RUN_DEPEND on security/pinentry because gpg is almost useless
without it.

PR:             115760
Submitted by:   novel
Approved by:    maintainer timeout (1 week, linimon ok)
2.0.4
13 Aug 2007 07:57:48
Original commit files touched by this commit This port version is marked as vulnerable.
novel search for other commits by this committer
Resurrect handy WITH_SUID_GPG knob.

PR:             114926
Submitted by:   novel
Approved by:    maintainer timeout
2.0.4
23 Jul 2007 09:36:52
Original commit files touched by this commit This port version is marked as vulnerable.
rafan search for other commits by this committer
- Set --mandir and --infodir in CONFIGURE_ARGS if the configure script
  supports them.  This is determined by running ``configure --help'' in
  do-configure target and set the shell variable _LATE_CONFIGURE_ARGS
  which is then passed to CONFIGURE_ARGS.
- Remove --mandir and --infodir in ports' Makefile where applicable
  Few ports use REINPLACE_CMD to achieve the same effect, remove them too.
- Correct some manual pages location from PREFIX/man to MANPREFIX/man
- Define INFO_PATH where necessary
- Document that .info files are installed in a subdirectory relative to
  PREFIX/INFO_PATH and slightly change add-plist-info to use INFO_PATH and
  subdirectory detection.

PR:             ports/111470
Approved by:    portmgr
Discussed with: stas (Mk/*), gerald (info related stuffs)
Tested by:      pointyhat exp run
2.0.4
16 Jun 2007 03:20:28
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 2.0.4 (maintainance release with a few minor enhancements).

PR:             ports/113676
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
2.0.3
30 Mar 2007 01:05:06
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix breakage on WITHOUT_NLS=t condition by forcing --enable-nls in
  configure args which I fogot in previous commit.

Reported by:    kris
2.0.3
08 Mar 2007 21:20:17
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.3 (including same safety belt as of 1.4.7).

References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2007q1/000251.html
2.0.2_1
08 Mar 2007 14:12:08
Original commit files touched by this commit This port version is marked as vulnerable.
jylefort search for other commits by this committer
Track libgpg-error shlib version change.
2.0.2
03 Feb 2007 03:08:21
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.2.
2.0.1_1
14 Jan 2007 07:27:47
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix breakage.
2.0.1_1
14 Jan 2007 07:03:52
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Make GPGSM dependency optional (then we can use this port without LDAP
  dependency). [1]
- Remove libpth hack in configure since this problem was fixed in 2.0.1. [2]
- Remove silly conflict detections which breaks BATCH building [2],[3]
- Check libassuan package version (to avoid using old lib) [4]

PR:             ports/107185 (I'm still working on NLS problem) [2],
                ports/107349 [3]
Submitted by:   Brian Minard <bminard@flatfoot.ca> [1],
                dougb [2],
                Ulrich Spoerlein <uspoerlein@gmail.com> [3],
                Ian Lister <freebsd-ports@lister.dnsalias.net> [4]
2.0.1
25 Dec 2006 03:09:17
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Force USE_GETTEXT=YES (remove from OPTIONS) because 2.0.x cannot be
  compiled without libintl.so (I didn't notice this by hidden
  dependencies).

PR:                     ports/107089
Investigated with:      Roland Smith <rsmith@xs4all.nl>
2.0.1
25 Dec 2006 03:00:00
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Force USE_GETTEXT=YES (remove from OPTIONS) because 2.0.x cannot be
  compiled without libintl.so (I didn't notice this by hidden
  dependencies).

PR:                     ports/107089
Investigated with:      Roland Smith <rsmith@xs4all.nl>
2.0.1
21 Dec 2006 15:13:49
Original commit files touched by this commit This port version is marked as vulnerable.
lofi search for other commits by this committer
gnupg-devel and gnupg-2.x conflict.
2.0.1
21 Dec 2006 13:31:56
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade gnupg to 2.0.1.  Old stable version (1.4.6) was repocopied
  to security/gnupg1.

Thanks to:      dougb, lofi
1.4.6_2
13 Dec 2006 12:41:36
Original commit files touched by this commit This port version is marked as vulnerable.
roam search for other commits by this committer
Update the ftp/curl port to 7.16.0.
Bump PORTREVISION of all dependent ports.
Fix the build errors in the few ports that still use the long deprecated,
and now obsoleted, cURL options.

Thanks to everyone who took the time to look over the patch!

Discussed on:   -ports
1.4.6_1
08 Dec 2006 09:25:31
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Unbreak locale.

PR:             ports/106456
Submitted by:   jjuanino@gmail.com
1.4.6
07 Dec 2006 00:34:17
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.6 (including security fix).

Security:       CVE-2006-6235
References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
1.4.5_2
27 Nov 2006 22:37:42
Original commit files touched by this commit This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix buffer overflow.

References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html

Number of commits found: 284 (showing only 100 on this page)

«  1 | 2 | 3  »