FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
gnupg1 1.4.16_1 security on this many watch lists=27 search for ports that depend on this port An older version of this port was marked as vulnerable.
The GNU Privacy Guard
Maintained by: kuriyama@FreeBSD.org search for ports maintained by this maintainer
Port Added: 09 Dec 2006 08:37:20
License: not specified in port


GnuPG is a complete and free replacement for PGP.

Because it does not use the patented IDEA algorithm, it can be used
without any restrictions.  GnuPG is an RFC2440 (OpenPGP) compliant
application.

WWW: http://www.gnupg.org/

kuriyama@FreeBSD.org
SVNWeb : Main Web Site : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only required dependencies information. Optional dependencies are not covered.

Required To Build:
  1. devel/gmake
Required Libraries:
  1. ftp/curl
  2. devel/gettext

This port is required by:

for Build for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

To install the port: cd /usr/ports/security/gnupg1/ && make install clean
To add the package: pkg install security/gnupg1


Configuration Options
===> The following configuration options are available for gnupg1-1.4.16_1:
     CURL=on: use libcurl for the keyserver interface
     DOCS=on: Build and/or install documentation
     LDAP=off: LDAP keyserver interface
     LIBICONV=off: use libiconv
     LIBUSB=off: use libusb
     NLS=on: Native Language Support
     SUID_GPG=off: install GPG with suid
===> Use 'make config' to modify these settings

Master Sites:
  1. ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/distfiles/
  2. ftp://ftp.crysys.hu/pub/gnupg/gnupg/
  3. ftp://ftp.franken.de/pub/crypt/mirror/ftp.gnupg.org/gcrypt/gnupg/
  4. ftp://ftp.freenet.de/pub/ftp.gnupg.org/gcrypt/gnupg/
  5. ftp://ftp.gnupg.org/gcrypt/gnupg/
  6. ftp://ftp.hi.is/pub/mirrors/gnupg/gnupg/
  7. ftp://ftp.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/gnupg/
  8. ftp://ftp.sunet.se/pub/security/gnupg/gnupg/
  9. ftp://mirror.cict.fr/gnupg/gnupg/
  10. ftp://mirror.switch.ch/mirror/gnupg/gnupg/
  11. http://artfiles.org/gnupg.org/gnupg/
  12. http://dotsrc.org/gnupg/
  13. http://ftp.heanet.ie/mirrors/ftp.gnupg.org/gcrypt/gnupg/
  14. http://mirror.tje.me.uk/pub/mirrors/ftp.gnupg.org/gnupg/
  15. http://www.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/gnupg/
Port Moves
  • port moved here from security/gnupg-idea on 2013-04-26
    REASON: Modules now included in gnupg 1.4.13

Number of commits found: 40

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
25 Mar 2014 12:15:54
Original commit files touched by this commit  1.4.16_1
Revision:349132
madpilot search for other commits by this committer
Bump PORTREVISION, forgotten in previous commit.

Noticed by:	mat
25 Mar 2014 07:24:42
Original commit files touched by this commit  1.4.16
Revision:349108
madpilot search for other commits by this committer
- Really disable iconv support when LIBICONV option is not selected [1]
  This fixes build on 10 and head when libiconv is installed and
  LIBICONV option is disabled

While here:

- Convert to USES gmake and USES tar [2]
- Convert to new LIB_DEPENDS format [2]

Reported by:	Mike Harding <mvharding@gmail.com> (via email)
Approved by:	portmgr (bapt, implicit) [1]
Approved by:	implicit portmgr@ blanket approval [2]
05 Feb 2014 13:58:42
Original commit files touched by this commit  1.4.16
Revision:342704
miwi search for other commits by this committer
- Stage support
18 Dec 2013 15:14:56
Original commit files touched by this commit  1.4.16
Revision:336839
kuriyama search for other commits by this committer
- Upgrade to 1.4.16 (security fix).

References: http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000337.html
05 Dec 2013 11:19:00
Original commit files touched by this commit  1.4.15
Revision:335659 This port version is marked as vulnerable.
mat search for other commits by this committer
Fixup pkgname.

PR:		ports/184444
Submitted by:	mat
Approved by:	portmgr (bapt)
05 Oct 2013 15:41:25
Original commit files touched by this commit  1.4.15
Revision:329469 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Revert NO_STAGE because packaging failure with PKGNG.
05 Oct 2013 09:35:03
Original commit files touched by this commit  1.4.15
Revision:329430 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.15 (security, VuXML entry will follow).
- Use $STAGEDIR.
20 Sep 2013 22:55:26
Original commit files touched by this commit  1.4.14
Revision:327769 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
25 Jul 2013 13:12:27
Original commit files touched by this commit  1.4.14
Revision:323640 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.14.

Security: http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html

I'll write vuxml entry later.
11 Jul 2013 16:26:27
Original commit files touched by this commit  1.4.13_1
Revision:322783 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Update to 7.31.0
- Bump PORTREVISION for ftp/curl shlib change
- Add TEST_DEPENDS
- Convert to new options framework
- Adjust options:
  - Add COOKIES
  - Add CYASSL, NSS, POLARSSL, THREADED_RESOLVER, TLS_SRP [1]
  - Add GSSAPI and SPNEGO [2]
  - Remove KERBEROS4
  - Rename LIBIDN to IDN
  - Remove TRACKMEMORY [1]
- Sort option handler
- Add SLAVEDIRS: ftp/curl-hiphop
- Cosmetic change
- Cleanup Makefile header
- While I'm here, fix typo (PORTREVSION) in x11-wm/ede/Makefile

Changes:	http://curl.haxx.se/changes.html
PR:		ports/172325 (-exp run), ports/177369 (based on) [1]
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> [1], hrs (via email) [2]
Exp run by:	miwi
30 Apr 2013 06:28:27
Original commit files touched by this commit  1.4.13
Revision:316883 This port version is marked as vulnerable.
jgh search for other commits by this committer
- convert ports to USES= gettext

Approved by:	portmgr (bapt@)
28 Apr 2013 21:02:40
Refresh Original commit files touched by this commit
Revision:316749  Sanity Test Failure
bapt search for other commits by this committer
Convert security to new options framework
27 Apr 2013 18:25:25
Original commit files touched by this commit  1.4.13
Revision:316683 This port version is marked as vulnerable.
mva search for other commits by this committer
- Convert USE_ICONV=yes to USES=iconv
- Change USE_GNOME=pkgconfig|gnomehack to USES=pathfix|pkgconfig and
  USE_GETTEXT=yes to USES=gettext while here
18 Mar 2013 11:40:04
Original commit files touched by this commit  1.4.13
Revision:314556 This port version is marked as vulnerable.
bapt search for other commits by this committer
Fix a long standing bug of lib/charset.alias being overwritten, modified, and
badly tracked by ports.

Make lib/charset.alias a file only provided by converters/libiconv
Create a new USES: charsetfix, that will modify in post patch the Makefile.in to
prevent a port from modifying/overwritting the charset.alias file during make
install.
Prevent devel/gettext from installing that files.
Fix a couple of ports that actually touch charset.alias during the build phase.

Based on a patch by ale
(http://lists.freebsd.org/pipermail/freebsd-gnome/2012-October/027747.html)

Approved by:	kwm (gnome)
Exp-run by:	miwi
27 Dec 2012 13:57:57
Original commit files touched by this commit  1.4.13
Revision:309541 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix build on more recent current.

PR:		ports/173678
Submitted by:	swills
21 Dec 2012 00:42:25
Original commit files touched by this commit  1.4.13
Revision:309335 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.13 (minor bugfixes).
31 Jan 2012 00:56:24
Original commit files touched by this commit  1.4.12
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.14.12 (minor bugfixes).
29 Jan 2012 14:44:06
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix build on 10-current (i386) [1]
- Fix build with clang by using CFLAGS+=-std=c89.

PR:             ports/163898 [1]
Submitted by:   swills [1]
09 Nov 2011 15:26:04
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Remove WITH_FBSD10_FIX, is no longer needed
29 Oct 2011 10:03:08
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Fix build on FreeBSD 10

Reported by:    pointyhat
03 Jul 2011 14:03:52
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
ohauer search for other commits by this committer
-remove MD5
19 Oct 2010 00:36:14
Original commit files touched by this commit  1.4.11
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.11 (minor bugfixes).

References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2010q4/000303.html
02 Jun 2010 01:56:47
Original commit files touched by this commit  1.4.10_2
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Attempt to fix build on powerpc.

Hat:            portmgr
31 May 2010 02:01:56
Original commit files touched by this commit  1.4.10_2
 This port version is marked as vulnerable.
ade search for other commits by this committer
Bounce PORTREVISION for gettext-related ports.  Have fun, ya'll.
03 Apr 2010 10:44:36
Original commit files touched by this commit  1.4.10_1
 This port version is marked as vulnerable.
roam search for other commits by this committer
Chase the ftp/curl shlib version bump.
04 Sep 2009 10:06:46
Original commit files touched by this commit  1.4.10
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.10.
09 Mar 2009 17:15:43
Original commit files touched by this commit  1.4.9_2
  Sanity Test Failure This port version is marked as vulnerable.
stas search for other commits by this committer
- Chase libusb20 rename in r189585.
- Mark sane-backends broken on current due to changes
  in USB stack.

Reviewed by:    thompsa (old version), miwi
Tested by:      miwi
23 Jan 2009 15:43:14
Original commit files touched by this commit  1.4.9_2
 This port version is marked as vulnerable.
roam search for other commits by this committer
Bump the version of the curl shared library after the ftp/curl update
to 7.19.2.
Bump PORTREVISION, even on the ports that do not have a versioned
dependency, since the binaries will most probably still stop working.
06 Jan 2009 17:59:31
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
pav search for other commits by this committer
- Remove conditional checks for FreeBSD 5.x and older
21 Aug 2008 06:18:49
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
rafan search for other commits by this committer
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
(Only the first 15 lines of the commit message are shown above View all of this commit message)
11 Aug 2008 12:27:53
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix plist with NOPORTDOCS.

Reported by:    QA Tindy (itetcu)
06 Jun 2008 14:01:07
Original commit files touched by this commit  1.4.9_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
26 Apr 2008 23:51:41
Original commit files touched by this commit  1.4.9
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 1.4.9

Notes:
        This update fixes a possible security vulnerability
        involving memory corruption from importing malicious
        keys.

PR:             122349 / 122155
Submitted by:   Nick Barkas <snb@threerings.net> / Hirohisa Yamaguchi
<umq@ueo.co.jp>
Approved by:    maintainer timeout
Security:      
http://www.vuxml.org/freebsd/30394651-13e1-11dd-bab7-0016179b2dd5.html
12 Jan 2008 08:53:44
Original commit files touched by this commit  1.4.8
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.8 (GPL3).

PR:             ports/118894
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
04 Oct 2007 06:00:24
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove always-false/true conditions based on OSVERSION 500000
23 Jul 2007 09:36:52
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Set --mandir and --infodir in CONFIGURE_ARGS if the configure script
  supports them.  This is determined by running ``configure --help'' in
  do-configure target and set the shell variable _LATE_CONFIGURE_ARGS
  which is then passed to CONFIGURE_ARGS.
- Remove --mandir and --infodir in ports' Makefile where applicable
  Few ports use REINPLACE_CMD to achieve the same effect, remove them too.
- Correct some manual pages location from PREFIX/man to MANPREFIX/man
- Define INFO_PATH where necessary
- Document that .info files are installed in a subdirectory relative to
  PREFIX/INFO_PATH and slightly change add-plist-info to use INFO_PATH and
  subdirectory detection.

PR:             ports/111470
Approved by:    portmgr
Discussed with: stas (Mk/*), gerald (info related stuffs)
Tested by:      pointyhat exp run
19 May 2007 20:32:57
Original commit files touched by this commit  1.4.7_1
 This port version is marked as vulnerable.
flz search for other commits by this committer
- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
06 Mar 2007 09:06:19
Original commit files touched by this commit  1.4.7
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.7.
  Add safety seatbelt for inserting additional text in signed OpenPGP message.

References:    
http://lists.gnupg.org/pipermail/gnupg-devel/2007-March/023687.html,
               
http://lists.gnupg.org/pipermail/gnupg-devel/2007-March/023686.html
25 Dec 2006 03:49:00
Original commit files touched by this commit  1.4.6_3
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- I forgot to bump PORTREVISION to sync with security/gnupg as of
  before 2.0 upgrade.
- Add a patch to fix info/dir entry in gnupg1.info [1].
- Recover symlink during removing this port after installing
  security/gnupg (2.0) (I forgot to add this before...).

PR:             ports/106819 [1]
Submitted by:   Dmitry A Grigorovich <odip@bionet.nsc.ru>
09 Dec 2006 08:36:48
Original commit files touched by this commit  1.4.6
 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Chase security/gnupg upgrade (but still 1.4.6) after repocopy.
  (not connected in ../Makefile)
- Tweak installation directory for documents to avoid conflict against
  coming gnupg upgrade (2.0.1).

I'm still testing my patch to upgrade to 2.0.1, so please wait. :-)

Number of commits found: 40

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
bugzilla40*Apr 18
bugzilla40*Apr 18
bugzilla42*Apr 18
bugzilla42*Apr 18
bugzilla44*Apr 18
bugzilla44*Apr 18
curlApr 11
dbus-glibApr 11
libaudiofileApr 11
linux-f10-curlApr 11
linux-f10-dbus-glibApr 11
linux-f10-libaudiofileApr 11
linux-f10-nas-libsApr 11
linux-f10-openldapApr 11
mingw32-openssl*Apr 11

13 vulnerabilities affecting 18 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24367
Broken 181
Deprecated 90
Ignore 535
Forbidden 6
Restricted 263
No CDROM 108
Vulnerable 29
Expired 8
Set to expire 77
Interactive 22
new 24 hours 1
new 48 hours2
new 7 days15
new fortnight39
new month142

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.