notbugIf you buy from Amazon USA, please support us by using this link.
Port details
libgcrypt General purpose cryptographic library based on the code from GnuPG
1.8.3 security on this many watch lists=262 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: cpm@FreeBSD.org search for ports maintained by this maintainer
Port Added: 14 Oct 2002 12:39:38
License: GPLv2+ LGPL21+
Libgcrypt is a general purpose cryptographic library based on the code from
GnuPG.

It provides functions for all cryptographic building blocks: symmetric ciphers,
hash algorithms, MACs, public key algorithms, large integer functions,
random numbers and a lot of supporting functions.

WWW: https://www.gnupg.org/software/libgcrypt/index.html
SVNWeb : Homepage : PortsMon
    Pseudo-pkg-plist information, but much better, from make generate-plist
    Expand this list (17 items)
  1. /usr/local/share/licenses/libgcrypt-1.8.3/catalog.mk
  2. /usr/local/share/licenses/libgcrypt-1.8.3/LICENSE
  3. /usr/local/share/licenses/libgcrypt-1.8.3/GPLv2+
  4. /usr/local/share/licenses/libgcrypt-1.8.3/LGPL21+
  5. bin/mpicalc
  6. bin/dumpsexp
  7. bin/hmac256
  8. bin/libgcrypt-config
  9. include/gcrypt.h
  10. lib/libgcrypt.a
  11. lib/libgcrypt.so
  12. lib/libgcrypt.so.20
  13. lib/libgcrypt.so.20.2.3
  14. man/man1/hmac256.1.gz
  15. share/aclocal/libgcrypt.m4
  16. @postexec /usr/sbin/service ldconfig restart > /dev/null
  17. @postunexec /usr/sbin/service ldconfig restart > /dev/null
  18. Collapse this list.

To install the port: cd /usr/ports/security/libgcrypt/ && make install clean
To add the package: pkg install libgcrypt

PKGNAME: libgcrypt

distinfo:

TIMESTAMP = 1528899391
SHA256 (libgcrypt-1.8.3.tar.bz2) = 66ec90be036747602f2b48f98312361a9180c97c68a690a5f376fa0f67d0af7c
SIZE (libgcrypt-1.8.3.tar.bz2) = 2989166


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. libgpg-error>=1.25 : security/libgpg-error
  2. makeinfo : print/texinfo
Runtime dependencies:
  1. libgpg-error>=1.25 : security/libgpg-error
  2. indexinfo : print/indexinfo

This port is required by:

for Build for Libraries
  1. audio/forked-daapd
  2. audio/libmtp*
  3. audio/pianobar
  4. biology/ncbi-blast+
  5. comms/svxlink
  6. databases/freetds
  7. databases/freetds-msdblib*
  8. Expand this list (173 items)
  9. databases/libgda4*
  10. databases/libgda4-bdb*
  11. databases/libgda4-jdbc*
  12. databases/libgda4-ldap*
  13. databases/libgda4-mdb*
  14. databases/libgda4-mysql*
  15. databases/libgda4-postgresql*
  16. databases/libgda5
  17. databases/libgda5-bdb
  18. databases/libgda5-jdbc
  19. databases/libgda5-ldap
  20. databases/libgda5-mdb
  21. databases/libgda5-mysql
  22. databases/libgda5-postgresql
  23. databases/libgda5-ui
  24. databases/xtrabackup
  25. deskutils/chmsee*
  26. devel/ccrtp
  27. devel/gvfs
  28. devel/gwenhywfar
  29. devel/gwenhywfar-fox16
  30. devel/gwenhywfar-gtk2
  31. devel/gwenhywfar-gtk3
  32. devel/gwenhywfar-qt4
  33. devel/gwenhywfar-qt5
  34. devel/libsoup
  35. devel/libsoup-gnome
  36. devel/libsoup-reference
  37. devel/libvirt
  38. devel/libzrtpcpp
  39. devel/srecord
  40. emulators/fuse
  41. emulators/fuse-utils
  42. emulators/libspectrum
  43. ftp/filezilla
  44. games/libggz
  45. graphics/frogr
  46. graphics/swfmill
  47. graphics/telak
  48. irc/bitlbee
  49. irc/bitlbee-steam
  50. irc/irssi-otr
  51. irc/weechat
  52. irc/weechat-devel*
  53. japanese/jd*
  54. lang/gnustep-base
  55. mail/anubis
  56. mail/claws-mail
  57. mail/xfce4-mailwatch-plugin
  58. misc/metalink-tools
  59. misc/tellico-kde4
  60. multimedia/kodi
  61. multimedia/libaacs
  62. multimedia/libbdplus
  63. multimedia/libmtp
  64. multimedia/libquvi09
  65. multimedia/totem-pl-parser
  66. multimedia/vlc
  67. multimedia/vlc-qt4
  68. net/clamz*
  69. net/cyphesis*
  70. net/freediameter
  71. net/glib-networking
  72. net/grive*
  73. net/grive2
  74. net/gtk-vnc
  75. net/kget
  76. net/librouteros
  77. net/netatalk
  78. net/netatalk3
  79. net/quagga-re*
  80. net/remmina
  81. net/remmina-plugin-vnc
  82. net/samba4*
  83. net/samba41*
  84. net/tigervnc
  85. net/tigervnc-devel
  86. net/tshark
  87. net/tshark-lite
  88. net/wireshark
  89. net/wireshark-lite
  90. net/wireshark-qt5
  91. net-im/ktp-common-internals
  92. net-im/telegram-purple
  93. net-mgmt/collectd5
  94. net-p2p/gnunet*
  95. net-p2p/ktorrent
  96. net-p2p/libktorrent
  97. net-p2p/libktorrent-kde4
  98. net-p2p/ncdc
  99. polish/kadu
  100. print/cups-base*
  101. print/cups-client*
  102. print/cups-image*
  103. security/dirmngr
  104. security/fiked
  105. security/gcr
  106. security/gnome-keyring
  107. security/gnomint
  108. security/gnupg
  109. security/gnupg20*
  110. security/gnupg22*
  111. security/greenbone-security-assistant*
  112. security/greenbone-security-assistant8
  113. security/greenbone-security-assistant9
  114. security/gsasl
  115. security/kdbx-viewer
  116. security/keepass
  117. security/keepassx-devel
  118. security/keepassx2
  119. security/keepassxc
  120. security/libgnome-keyring
  121. security/libmatekeyring*
  122. security/libotr
  123. security/libotr3
  124. security/libprelude
  125. security/libsecret
  126. security/mate-keyring*
  127. security/monkeysphere
  128. security/opencdk
  129. security/openvas-libnasl*
  130. security/openvas-libraries*
  131. security/openvas-manager*
  132. security/openvas-scanner*
  133. security/openvas8-libraries
  134. security/openvas8-manager
  135. security/openvas8-scanner
  136. security/openvas9-libraries
  137. security/openvas9-manager
  138. security/openvas9-scanner
  139. security/openvpn-auth-radius
  140. security/p5-Crypt-GCrypt
  141. security/pam-pgsql
  142. security/pidgin-otr
  143. security/pinentry-gtk*
  144. security/pinentry-qt*
  145. security/plasma5-kwallet-pam
  146. security/prelude-lml*
  147. security/prelude-manager*
  148. security/seahorse-plugins*
  149. security/seccure
  150. security/shishi
  151. security/suricata
  152. security/vpnc
  153. security/xmlsec1
  154. sysutils/amtc
  155. sysutils/freeipmi
  156. sysutils/fusefs-cryptofs
  157. sysutils/kf5-kwallet
  158. sysutils/openhpi
  159. sysutils/rsyslog5-gnutls*
  160. sysutils/rsyslog6-devel-gnutls*
  161. sysutils/rsyslog6-gnutls*
  162. sysutils/rsyslog8
  163. textproc/libxslt
  164. textproc/p5-XML-LibXSLT
  165. textproc/pdfgrep
  166. textproc/rubygem-nokogiri
  167. www/chromium
  168. www/iridium
  169. www/libmicrohttpd
  170. www/webkit2-gtk3
  171. x11/kde-runtime-kde4
  172. x11/kde4-runtime*
  173. x11/lightdm
  174. x11/yelp
  175. Collapse this list.
* - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...
Configuration Options
===> The following configuration options are available for libgcrypt-1.8.3:
     DOCS=on: Build and/or install documentation
===> Use 'make config' to modify these settings

USES:
cpe libtool makeinfo tar:bzip2

Master Sites:
  1. ftp://ftp.crysys.hu/pub/gnupg/libgcrypt/
  2. ftp://ftp.franken.de/pub/crypt/mirror/ftp.gnupg.org/gcrypt/libgcrypt/
  3. ftp://ftp.freenet.de/pub/ftp.gnupg.org/gcrypt/libgcrypt/
  4. ftp://ftp.gnupg.org/gcrypt/libgcrypt/
  5. ftp://mirror.switch.ch/mirror/gnupg/libgcrypt/
  6. http://gd.tuwien.ac.at/privacy/gnupg/libgcrypt/
  7. http://mirror.tje.me.uk/pub/mirrors/ftp.gnupg.org/libgcrypt/
  8. https://artfiles.org/gnupg.org/libgcrypt/
  9. https://ftp.heanet.ie/mirrors/ftp.gnupg.org/gcrypt/libgcrypt/
  10. https://gnupg.org/ftp/gcrypt/libgcrypt/
  11. https://mirrors.dotsrc.org/gcrypt/libgcrypt/
  12. https://www.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/libgcrypt/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2013-05-03
    Affects: users of security/libgcrypt and any port that depends on it
    Author: ehaupt@FreeBSD.org
    Reason: 
      The libgcrypt port has been updated to 1.5.2 and all shared libraries
      versions have been bumped. So you need to rebuild all applications that
      depend on libgcrypt. Do something like:
    
      # portmaster -r libgcrypt
        or
      # portupgrade -rf libgcrypt
    
      Alternatively, you may install sysutils/bsdadminscripts, run pkg_libchk and
      rebuild all detected ports:
    
      # pkg_libchk | tee /tmp/rebuild
      # awk -F':' '/libgcrypt.so/ {print $1}' /tmp/rebuild | sort | uniq \
    	| xargs portmaster -D
    
    
  • 2011-07-05
    Affects: users of security/libgcrypt and any port that depends on it
    Author: swills@FreeBSD.org
    Reason: 
      The libgcrypt port has been updated to 1.5.0 and all shared libraries
      versions have been bumped. So you need to rebuild all applications that
      depend on libgcrypt. Do something like:
    
      # portmaster -r libgcrypt
        or
      # portupgrade -rf libgcrypt
    
    
  • 2010-07-27
    Affects: users of security/libgcrypt
    Author: wxs@FreeBSD.org
    Reason: 
      libgcrypt has been upgraded to 1.4.6 which has a shared library version
      bump.  You need to reinstall all ports that depend on it.  Use something
      like this:
    
    	portupgrade -rf libgcrypt
    	portmaster -r libgcrypt
    
    
  • 2009-01-07
    Affects: users of security/libgcrypt
    Author: rafan@FreeBSD.org
    Reason: 
      libgcrypt has been upgraded to 1.4.3 which has a shared library version
      bump.  You need to reinstall all ports that depend on it.  Use something
      like this:
    
    	portupgrade -rf libgcrypt
    	portmaster -r libgcrypt
    
    

Number of commits found: 111 (showing only 100 on this page)

1 | 2  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
13 Jun 2018 18:59:05
Original commit files touched by this commit  1.8.3
Revision:472337
cpm search for other commits by this committer
security/libgcrypt: Update to 1.8.3 (bugfix)

- Improve comment in Makefile
- Provide more elaborate port description and update WWW in pkg-descr

Noteworthy changes in version 1.8.3
===================================

   - Use blinding for ECDSA signing to mitigate a novel side-channel
     attack.  [#4011,CVE-2018-0495]

   - Fix incorrect counter overflow handling for GCM when using an IV
     size other than 96 bit.  [#3764]

   - Fix incorrect output of AES-keywrap mode for in-place encryption
(Only the first 15 lines of the commit message are shown above View all of this commit message)
22 Jan 2018 12:32:04
Original commit files touched by this commit  1.8.2
Revision:459647 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: Fix build for powerpc/powerpcspe

- Add the missing check for powerpcspe- and powerpc- in mpi/config.links

Submitted by:	jhibbits
Approved by:	cpm (maintainer)
Differential Revision:	https://reviews.freebsd.org/D13854
15 Dec 2017 22:05:55
Original commit files touched by this commit  1.8.2
Revision:456419 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: update to 1.8.2

- Update libgcrypt to 1.8.2
- Bump library version in pkg-plist

Changelog: https://abi-laboratory.pro/tracker/changelog/libgcrypt/1.8.2/log.html
Binary compatibility report:
https://abi-laboratory.pro/tracker/compat_report/libgcrypt/1.8.1/1.8.2/29a74/abi_compat_report.html

MFH:		2017Q4
30 Aug 2017 15:52:59
Original commit files touched by this commit  1.8.1
Revision:448989 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: update to 1.8.1

- Update libgcrypt to 1.8.1
- Bump library version in pkg-plist

Noteworthy changes in version 1.8.1

 * Bug fixes:

   - Mitigate a local side-channel attack on Curve25519 dubbed "May
     the Fourth be With You".  [CVE-2017-0379] [also in 1.7.9]

   - Add more extra bytes to the pool after reading a seed file.

   - Add the OID SHA384WithECDSA from RFC-7427 to SHA-384.

   - Fix build problems with the Jitter RNG

   - Fix assembler code build problems on Rasbian (ARMv8/AArch32-CE).

Changes: https://abi-laboratory.pro/tracker/changelog/libgcrypt/1.8.1/log.html
Binary compatibility report:
https://abi-laboratory.pro/tracker/compat_report/libgcrypt/1.8.0/1.8.1/31172/abi_compat_report.html

MFH:		2017Q3
Security:	https://vuxml.freebsd.org/freebsd/22f28bb3-8d98-11e7-8c37-e8e0b747a45a.html
01 Aug 2017 12:10:13
Original commit files touched by this commit  1.8.0
Revision:447018 This port version is marked as vulnerable.
cpm search for other commits by this committer
- Fix the command line munging for jitterbase

PR:		220937
Reported by:	O. Hartmann <ohartmann@walstatt.org>
Obtained from:	https://dev.gnupg.org/rCac39522ab08fcd2483edc223334c6ab9d19e91f3
MFH:		2017Q3 (blanket)
28 Jul 2017 21:45:20
Original commit files touched by this commit  1.8.0
Revision:446854 This port version is marked as vulnerable.
jkim search for other commits by this committer
Set MAKEINFO to the full path of makeinfo when USES=makeinfo is set.

PR:		221027
Reviewed by:	mat
Approved by:	portmgr (antoine)
22 Jul 2017 01:05:15
Original commit files touched by this commit  1.8.0
Revision:446350 This port version is marked as vulnerable.
cpm search for other commits by this committer
- Remove unnecessary extra-patch-aarch64 (applied upstream)

Reported by:	Shawn Webb <shawn.webb@hardenedbsd.org> via email
MFH:		2017Q3 (blanket)
21 Jul 2017 10:56:16
Original commit files touched by this commit  1.8.0
Revision:446306 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: update to 1.8.0

- Update libgcrypt to 1.8.0
- Update libgpg-error version required to 1.25
- Bump library version in pkg-plist

Changes: https://lists.gnupg.org/pipermail/gnupg-announce/2017q3/000410.html
Binary compatibility report:
https://abi-laboratory.pro/tracker/compat_report/libgcrypt/1.7.8/1.8.0/d9ddd/abi_compat_report.html

PR:		220858
MFH:		2017Q3
Exp-run by:	antoine
04 Jul 2017 17:38:30
Original commit files touched by this commit  1.7.8
Revision:445028 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: update to 1.7.8

- Update libgcrypt to 1.7.8
- Bump library version in pkg-plist

Noteworthy changes in version 1.7.8

 * Bug fixes:

   - Mitigate a flush+reload side-channel attack on RSA secret keys
     dubbed "Sliding right into disaster".  For details see
     <https://eprint.iacr.org/2017/627>.  [CVE-2017-7526]

Changes: https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
Binary compatibility report:
https://abi-laboratory.pro/tracker/compat_report/libgcrypt/1.7.7/1.7.8/95cc7/abi_compat_report.html

PR:		220382
MFH:		2017Q3
Exp-run by:	antoine
Security:	https://www.vuxml.org/freebsd/ed3bf433-5d92-11e7-aa14-e8e0b747a45a.html
07 Jun 2017 11:35:51
Original commit files touched by this commit  1.7.7
Revision:442829 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: update to 1.7.7

- Update libgcrypt to 1.7.7
- Silence all explicitly called commands
- Update WWW in pkg-descr: use https://
- Bump library version in pkg-plist

Noteworthy changes in version 1.7.7

* Bug fixes:

  - Fix possible timing attack on EdDSA session key.
  - Fix long standing bug in secure memory implementation which could
     lead to a segv on free. [bug#3027].

PR:		219747
MFH:		2017Q2
Exp-run by:	antoine
09 Mar 2017 00:15:57
Original commit files touched by this commit  1.7.6
Revision:435736 This port version is marked as vulnerable.
cpm search for other commits by this committer
- Patch only applies to aarch64. Remove armv6 check.

Reported by:	jbeich
MFH:		2017Q1 (blanket)
28 Feb 2017 12:21:13
Original commit files touched by this commit  1.7.6
Revision:435049 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: fix build on aarch64

libtool: compile:  cc -DHAVE_CONFIG_H -I. -I.. -I../src -I../src
-Wa,--noexecstack -O2 -pipe -fno-strict-aliasing -std=gnu89 -MT
cipher-gcm-armv8-aarch64-ce.lo -MD -MP -MF .deps/cipher-gcm-armv8-aarch64-ce.Tpo
-c cipher-gcm-armv8-aarch64-ce.S  -fPIC -DPIC -o
.libs/cipher-gcm-armv8-aarch64-ce.o
cipher-gcm-armv8-aarch64-ce.S:190:3: error: instruction requires: neon
eor v31.16b, v31.16b, v31.16b
  ^

PR:		217271
Submitted by:	krion
Reported by:	Simon Rozman <simon@rozman.si>
MFH:		2017Q1 (blanket)
23 Jan 2017 12:12:13
Original commit files touched by this commit  1.7.6
Revision:432213 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: update to 1.7.6

Noteworthy changes in version 1.7.6

* Bug fixes:

  - Fix AES CTR self-check detected failure in the SSSE3 based
     implementation.
  - Remove gratuitous select before the getrandom syscall.

PR:		216305
MFH:		2017Q1
Exp-run by:	antoine
23 Dec 2016 15:45:00
Original commit files touched by this commit  1.7.5
Revision:429273 This port version is marked as vulnerable.
cpm search for other commits by this committer
security/libgcrypt: Update to 1.7.5

- Update to 1.7.5
- Remove files useless to install from DOCS
- Remove patch since sparc v8 is not supported on FreeBSD
- Bump library version in pkg-plist

Changelog:
  https://lists.gnupg.org/pipermail/gnupg-announce/2016q4/000399.html

PR:		215236
Approved by:	amdmi3 (mentor)
MFH:		2016Q4
Exp-run by:	antoine
21 Oct 2016 12:51:41
Original commit files touched by this commit  1.7.3
Revision:424411  Sanity Test Failure This port version is marked as vulnerable.
mat search for other commits by this committer
${RM} already has -f.

PR:		213570
Submitted by:	mat
Exp-run by:	antoine
Sponsored by:	Absolight
18 Aug 2016 11:24:48
Original commit files touched by this commit  1.7.3
Revision:420399 This port version is marked as vulnerable.
cpm search for other commits by this committer
- Update to 1.7.3 (security fixes)
- Bump library version in pkg-plist

ref: https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html

Reviewed by:	amdmi3 (mentor)
Approved by:	amdmi3 (mentor)
MFH:	2016Q3
Differential Revision:	D7558
20 Jul 2016 09:09:44
Original commit files touched by this commit  1.7.2
Revision:418828 This port version is marked as vulnerable.
cpm search for other commits by this committer
- Update to 1.7.2
- Bump library version in pkg-plist

Changelog:
  https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000392.html

PR:	211153
Reviewed by:	junovitch (mentor)
Approved by:	junovitch (mentor)
MFH:		2016Q3
Exp-run:	antoine
Differential Revision:	D7221
17 Jun 2016 23:00:27
Original commit files touched by this commit  1.7.1
Revision:417040 This port version is marked as vulnerable.
cpm search for other commits by this committer
- Update to 1.7.1
- Remove unneeded patch (applied upstream)
- Convert to new test framework

  https://lists.gnupg.org/pipermail/gnupg-announce/2016q2/000389.html

PR:		210328
Reviewed by:	amdmi3, junovitch (mentors)
Approved by:	amdmi3, junovitch (mentors)
MFH:		2016Q2
Exp-run:	antoine
Differential Revision:	D6865
23 Apr 2016 10:01:20
Original commit files touched by this commit  1.7.0
Revision:413860 This port version is marked as vulnerable.
cpm search for other commits by this committer
- Update to 1.7.0
- Remove unneeded patches (applied upstream)
- Fix inline assembler error on 9.x
- Fix pkg-plist

Changelog: https://lists.gnupg.org/pipermail/gnupg-announce/2016q2/000386.html

PR:		208907
Approved by:	junovitch (mentor)
Exp-run:	antoine
Differential Revision:	D5989
01 Apr 2016 14:25:18
Original commit files touched by this commit  1.6.5_1
Revision:412349 This port version is marked as vulnerable.
mat search for other commits by this committer
Remove ${PORTSDIR}/ from dependencies, categories r, s, t, and u.

With hat:	portmgr
Sponsored by:	Absolight
28 Mar 2016 23:41:45
Original commit files touched by this commit  1.6.5_1
Revision:412077 This port version is marked as vulnerable.
cpm search for other commits by this committer
- cipher/salsa20.c (selftest): Ensure 16-byte alignment for salsa20
context structure.

- mpi/longlong.h: Fix build on sparc.

PR:		206919
Approved by:	junovitch (mentor)
16 Feb 2016 02:52:56
Original commit files touched by this commit  1.6.5
Revision:408972 This port version is marked as vulnerable.
cpm search for other commits by this committer
- Update libgcrypt to 1.6.5
- Change LICENSE since support has been added for "or later" variants of GNU
licenses.
- Remove needless patch-cipher_salsa20.c

Changes:
  https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html

PR:		207107
Approved by:	junovitch (mentor)
08 Feb 2016 20:54:10
Original commit files touched by this commit  1.6.4_4
Revision:408514 This port version is marked as vulnerable.
cpm search for other commits by this committer
This patch fixes alignment of self-test context in salsa20 required
for amd64 implementation.

Other changes:
   - Regenerate patches to make portlint(1) happy
   - Update MAINTAINER to my @FreeBSD.org address
   - Bump PORTREVISION

PR:		206919
Approved by:	junovitch (mentor)
18 Dec 2015 12:25:01
Original commit files touched by this commit  1.6.4_3
Revision:403961 This port version is marked as vulnerable.
rakuco search for other commits by this committer
Add upstream commit to fix build errors with -pedantic.

This fixes at least devel/ccrtp's build on 9.3, which is currently broken:

  In file included from ccrtp/crypto/gcrypt/gcrypthmac.cpp:23:
  /usr/local/include/gcrypt.h:509: error: comma at end of enumerator list
  /usr/local/include/gcrypt.h:1346: error: comma at end of enumerator list
  Makefile:571: recipe for target 'gcrypthmac.lo' failed

MFH'ing this is not necessary, this bug is only present in libgcrypt 1.6.4.

PR:		205000
Approved by:	maintainer timeout (15 days)
22 Nov 2015 17:33:05
Original commit files touched by this commit  1.6.4_2
Revision:402237 This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: Re-add missing patch

- This patch was removed when updating to 1.6.4, so the patch needs
  to be put back in order to solve the bug 204399.

PR:		204600
Submitted by:	Carlos J. Puga Medina <cpm@fbsd.es> (maintainer)
29 Oct 2015 14:30:24
Original commit files touched by this commit  1.6.4_1
Revision:400464 This port version is marked as vulnerable.
sbruno search for other commits by this committer
Enable the building and installation of the .a version of the library
for static linking.  This affects emulators/qemu-user-static primarily
but will help anyone trying to statically link their applications.

Reviewed by:	tijl cpm@fbsd.es (Maintainer)
27 Oct 2015 15:54:54
Original commit files touched by this commit  1.6.4
Revision:400319 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Update to 1.8.4

Changes:	http://lists.gnupg.org/pipermail/gnupg-announce/2015q3/000375.html
PR:		204003
Submitted by:	Carlos J Puga Medina <cpm@fbsd.es> (maintainer)
20 Sep 2015 19:22:28
Original commit files touched by this commit  1.6.3
Revision:397388 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Drop 8.x support
- Switch to options helpers

Approved by:	portmgr blanket
14 May 2015 10:15:09
Original commit files touched by this commit  1.6.3
Revision:386312 This port version is marked as vulnerable.
mat search for other commits by this committer
MASTER_SITES cleanup.

- Replace ${MASTER_SITE_FOO} with FOO.
- Merge MASTER_SITE_SUBDIR into MASTER_SITES when possible. (This means 99.9%
  of the time.)
- Remove occurrences of MASTER_SITE_LOCAL when no subdirectory was present and
  no hint of what it should be was present.
- Fix some logic.
- And generally, make things more simple and easy to understand.

While there, add magic values to the FESTIVAL, GENTOO, GIMP, GNUPG, QT and
SAMBA macros.

Also, replace some EXTRACT_SUFX occurences with USES=tar:*.

Checked by:	make fetch-urlall-list
With hat:	portmgr
Sponsored by:	Absolight
28 Mar 2015 12:42:09
Original commit files touched by this commit  1.6.3
Revision:382480 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Add CPE information

PR:		198985
Submitted by:	Carlos Jacobo Puga Medina <cpm@fbsd.es> (maintainer)
02 Mar 2015 23:42:00
Original commit files touched by this commit  1.6.3
Revision:380309 This port version is marked as vulnerable.
bapt search for other commits by this committer
Remove Author from pkg-descr and white space fixes
28 Feb 2015 21:11:54
Original commit files touched by this commit  1.6.3
Revision:380161 This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: 1.6.2 -> 1.6.3

Changes:
http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html

PR:		198109
Submitted by:	Carlos Jacobo Puga Medina <cpm@fbsd.es> (maintainer)
07 Feb 2015 07:25:22
Original commit files touched by this commit  1.6.2_1
Revision:378572 This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: fix some issues

- Fix crash at cipher/salsa20.c module on amd64.
- Fix strip shared object.
- Bump PORTREVISION.

PR:		197146
Submitted by:	cpm@fbsd.es (maintainer)
02 Jan 2015 18:46:34
Original commit files touched by this commit  1.6.2
Revision:376062 This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: 1.6.1 -> 1.6.2, bump depends

Changes:
- src/sexp.c (do_vsexp_sscan): Return error for invalid args.
- cipher/md.c (_gcry_md_info): Fix a segv in case of calling
  with wrong parameters.
- cipher/primegen.c (_gcry_generate_elg_prime): Change to return an
  error code, possible NULL deref in call to prime generator.
- cipher/dsa.c (generate): Take care of new return code.
- cipher/elgamal.c (generate): Change to return an error code.  Take
	care of _gcry_generate_elg_prime return code.
- ecc: Support the non-standard 0x40 compression flag for EdDSA.
- mpi: Extend the internal mpi_get_buffer.
- mpi: Fix regression for powerpc-apple-darwin detection.
- Fix bug inhibiting the use of the sentinel attribute in src/gcrypt.h.in
(Only the first 15 lines of the commit message are shown above View all of this commit message)
04 Sep 2014 17:28:35
Original commit files touched by this commit  1.6.1_5
Revision:367293 This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: fix build with GCC on 8.x/amd64, 2nd attempt

Thanks to tijl@ for spotting the Makefile bug.

PR:		192555
Submitted by:	Carlos Jacobo Puga Medina <cpm@fbsd.es>
Approved by:	maintainer (timeout)
02 Sep 2014 20:47:44
Original commit files touched by this commit  1.6.1_4
Revision:367081 This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: fix build without assembler on 8.x/amd64

PR:		192555
Submitted by:	Carlos Jacobo Puga Medina <cpm@fbsd.es>
Approved by:	maintainer (timeout)
05 Aug 2014 22:13:29
Original commit files touched by this commit  1.6.1_3
Revision:364143 This port version is marked as vulnerable.
tijl search for other commits by this committer
Bump PORTREVISION on more ports that depend on libgcrypt after the update
in r363436 and remove the UPDATING entry because it did not guarantee
that all ports were updated nor that they were updated in the right order.
Also remove libgcrypt.la again.

PR:		192342
Approved by:	portmgr (implicit, bump unstaged ports)
02 Aug 2014 21:57:14
Original commit files touched by this commit  1.6.1_2
Revision:363841 This port version is marked as vulnerable.
pi search for other commits by this committer
devel/security: re-add .la file

- py-gnome-extras (and others) depend on it

PR:		192342
Submitted by:	freebsd@johnlevine.com
31 Jul 2014 18:30:51
Original commit files touched by this commit  1.6.1_1
Revision:363648 This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: avoid non-portable use of assembler instruction on amd64

PR:		191256
Submitted by:	arcade@b1t.name
30 Jul 2014 03:57:24
Original commit files touched by this commit  1.6.1
Revision:363436 This port version is marked as vulnerable.
pi search for other commits by this committer
security/libgcrypt: 1.5.3_3 -> 1.6.1

- Update to 1.6.1
- Remove some unneeded patches
- Fix pkg-plist
- report configure bug upstream
  https://bugs.g10code.com/gnupg/issue1668
- report API breakage downstream and find that MacPorts had the same issue
  https://rt.cpan.org/Ticket/Display.html?id=97201
- bump PORTREVISION for dependent ports (approx. 100 ports)
- Thanks to exp-run by antoine@ to find ports that break
- patch ports that would otherwise break
  security/shishi with PR 192164 is already committed
  [1] devel/ccrtp
  [2] editors/abiword
  [3] security/p5-Crypt-GCrypt

PR:		191256, 192162 [1], 192163 [2], 192166 [3]
Submitted by:	Carlos Jacobo Puga Medina <cjpugmed@gmail.com>
Approved by:	maintainer timeout, antoine (exp-run), portmgr (implicit)
15 Jul 2014 16:57:39
Original commit files touched by this commit  1.5.3_3
Revision:361977 This port version is marked as vulnerable.
adamw search for other commits by this committer
Add DOCS to OPTIONS_DEFINE to ports that check for PORT_OPTIONS:MDOCS.
05 Jul 2014 23:19:06
Original commit files touched by this commit  1.5.3_3
Revision:360837 This port version is marked as vulnerable.
sbruno search for other commits by this committer
Added needed ASM instructions for armv6 architecture support.

PR:	190848
Submitted by:	andrew@freebsd.org
Reviewed by:	mat@freebsd.org
25 Jun 2014 08:58:09
Original commit files touched by this commit  1.5.3_2
Revision:359209 This port version is marked as vulnerable.
bapt search for other commits by this committer
Fix build on system built WITHOUT_INFO

With hat:	portmgr
23 Apr 2014 13:25:17
Original commit files touched by this commit  1.5.3_2
Revision:351936 This port version is marked as vulnerable.
tijl search for other commits by this committer
When linking a library libA with a library libB using libtool, if libB.la
exists, libtool will add all libraries libB.la refers to (dependency_libs
field) to the linker command line and store them in the dependency_libs
field of libA.la.  So everything that subsequently links with libA will also
link to these extra libraries.  This causes too much overlinking.

This commit modifies Mk/Uses/libtool.mk so it empties the dependency_libs
field in .la libraries during staging.  However, because .la libraries have
very limited use when dependency_libs is empty it makes sense to completely
remove them during staging.

So with this commit USES=libtool is modified to remove .la libraries and a
new form (USES=libtool:keepla) is introduced in case they need to be kept
(dependency_libs is still emptied).
(Only the first 15 lines of the commit message are shown above View all of this commit message)
01 Apr 2014 13:12:28
Original commit files touched by this commit  1.5.3_1
Revision:349852 This port version is marked as vulnerable.
tijl search for other commits by this committer
- USES=libtool tar:bzip2.
- Enable asm on FreeBSD/i386 >= 10.0.
- Enable asm on FreeBSD/amd64. [1]
- Use MAKE_CMD instead of MAKE to run regression tests.

PR:		ports/187441
Submitted by:	Stoyan Dimov <pr.freebsd.org@registrations.systeem.com> [1]
Approved by:	maintainer timeout (2 weeks)
01 Mar 2014 21:23:14
Original commit files touched by this commit  1.5.3
Revision:346721 This port version is marked as vulnerable.
gerald search for other commits by this committer
Replace USE_GCC=4.2+ by USE_GCC=any. [1]
And USE_GMAKE by USES=gmake where touching a port because of the above.

Approved by:	portmgr (bapt) [1]
14 Dec 2013 05:06:17
Original commit files touched by this commit  1.5.3
Revision:336421 This port version is marked as vulnerable.
koobs search for other commits by this committer
security/libgcrypt: Remove BROKEN on powerpc

- Remove BROKEN on powerpc [1]
- Enable STAGE support

PR:		ports/183066
Submitted by:	jhibbits
Approved by:	maintainer timeout (1 month)
20 Sep 2013 22:55:26
Original commit files touched by this commit  1.5.3
Revision:327769 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
20 Aug 2013 05:31:34
Original commit files touched by this commit  1.5.3
Revision:325029 This port version is marked as vulnerable.
rpaulo (src committer) search for other commits by this committer
Use GCC 4.2+ on armv6.

Reviewed by:	umq
Approved by:	umq
17 Aug 2013 07:56:12
Original commit files touched by this commit  1.5.3
Revision:324830 This port version is marked as vulnerable.
bf search for other commits by this committer
Update security/libgcrypt to 1.5.3 [1], and document the latest gnupg
and libgcrypt vulnerability

PR:		181231
Submitted by:	Hirohisa Yamaguchi (maintainer) [1]
Security:	http://www.vuxml.org/freebsd/689c2bf7-0701-11e3-9a25-002590860428.html
03 May 2013 16:35:25
Original commit files touched by this commit  1.5.2
Revision:317219 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Update to 1.5.2

Changelog:
http://lists.gnupg.org/pipermail/gnupg-announce/2013q1/000324.html (1.5.1)
http://lists.gnupg.org/pipermail/gnupg-announce/2013q2/000325.html (1.5.2)

PR:             177100
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
07 Sep 2012 19:42:03
Original commit files touched by this commit  1.5.0_1
Revision:303822 This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark as broken on powerpc only on -current.  This will unblock gnome,
kde, and other builds on 8 and 9.

Hat:		portmgr
25 Aug 2012 08:33:56
Original commit files touched by this commit  1.5.0_1
 This port version is marked as vulnerable.
novel search for other commits by this committer
- Properly define deprecated functions to remove warnings in other
  ports
- Avoid installing multiple copies of the GPLv2 and LGPL21 licenses
- Bump PORTREVISION

PR:		170488
Submitted by:	Jason E. Hale <bsdkaffee@gmail.com>
Approved by:	Hirohisa Yamaguchi (maintainer)
24 Jul 2012 15:51:27
Original commit files touched by this commit  1.5.0
 This port version is marked as vulnerable.
scheidell search for other commits by this committer
- Mark Broken for ppc
- Remove check for obsolete, unsupported OS version
- pet portlint (space/vs tab, like 41, 44 of Makefile)

PR:		ports/166388
Submitted by:	scheidell@ (me)
Reported by: 	glevand <geoffrey.levand@mail.ru>
Approved by:	maintainer (timeout, 21 days)
05 Nov 2011 17:26:19
Original commit files touched by this commit  1.5.0
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Add a workaround to fix build on FreeBSD 10.0 i386
17 Sep 2011 21:56:22
Original commit files touched by this commit  1.5.0
 This port version is marked as vulnerable.
pawel search for other commits by this committer
Require ligpg-error>=1.8 to build succesfully

PR:             ports/159873
Submitted by:   Michael Scheidell <scheidell@secnap.net>
Approved by:    maintainer, miwi, wen (mentors implicit)
26 Jul 2011 06:54:46
Original commit files touched by this commit  1.5.0
 This port version is marked as vulnerable.
dim search for other commits by this committer
In the AES-NI inline assembly, change instances of 'cmpq' to 'cmpl'.  I
had erroneously assumed this would only be compiled on amd64, but even
then a 64 bit compare is wrong.  The variables referenced in the inline
assembly are all plain int, so 32 bit.

PR:     ports/159147
Pointy hat to:  dim
Requested by:   Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
21 Jul 2011 20:18:45
Original commit files touched by this commit  1.5.0
 This port version is marked as vulnerable.
dim search for other commits by this committer
Building security/libgcrypt 1.5.0 with clang results in errors similar
to the following:

rijndael.c:846:46: error: ambiguous instructions require an explicit suffix
(could be 'cmpb', 'cmpw', 'cmpl', or 'cmpq')
"movdqa 0xa0(%%esi), %%xmm1\n\t"
^
<inline asm>:24:2: note: instantiated into assembly here
cmp $10, -80(%ebp)
^

This is because the 'cmp' instruction lacks a type suffix, and is thus
ambiguous.  Fix this by changing these to 'cmpq'.

PR:     ports/158994
Approved by:    Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
03 Jul 2011 11:39:40
Original commit files touched by this commit  1.5.0
 This port version is marked as vulnerable.
swills search for other commits by this committer
- Update to 1.5.0

PR:             ports/158574
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
04 Dec 2010 07:34:27
Original commit files touched by this commit  1.4.6
 This port version is marked as vulnerable.
ade search for other commits by this committer
Sync to new bsd.autotools.mk
02 Nov 2010 12:18:54
Original commit files touched by this commit  1.4.6
 This port version is marked as vulnerable.
kwm search for other commits by this committer
Fix linking with clang, and give longlong.h a simular treatment like was
done in 9-current so clang can build it on i386.

Update LICENSE block, and remove md5 sum.

PR:             ports/151349
Submitted by:   myself
Approved by:    Yamaguchi Hirohisa <umq@ueo.co.jp> (maintainer)
27 Jul 2010 01:24:39
Original commit files touched by this commit  1.4.6
 This port version is marked as vulnerable.
wxs search for other commits by this committer
Update to 1.4.6.

PR:             ports/148755
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp> (maintainer)
27 Jun 2010 12:57:34
Original commit files touched by this commit  1.4.5_1
 This port version is marked as vulnerable.
stefan search for other commits by this committer
Bump PORTREVISION for latest gettext update. (I'm not sure anyone still needs
it, but it doesn't really hurt, either.)

PR:             147295
Submitted by:   Grzegorz Blach <magik@roorback.net>
Approved by:    maintainer timeout (>3 weeks)
Feature safe:   yes
13 Mar 2010 19:34:23
Original commit files touched by this commit  1.4.5
 This port version is marked as vulnerable.
niels search for other commits by this committer
Upgrade to version 1.4.5

PR:     ports/144312
Submitted by:   Sunpoet Po-Chuan Hsieh <sunpoet at sunpoet.net>
Reviewed by:    Hirohisa Yamaguchi (maintainer)
Approved by:    itetcu (mentor)
02 Aug 2009 19:36:34
Original commit files touched by this commit  1.4.4
 This port version is marked as vulnerable.
mezz search for other commits by this committer
-Repocopy devel/libtool15 -> libtool22 and libltdl15 -> libltdl22.
-Update libtool and libltdl to 2.2.6a.
-Remove devel/libtool15 and devel/libltdl15.
-Fix ports build with libtool22/libltdl22.
-Bump ports that depend on libltdl22 due to shared library version change.
-Explain what to do update in the UPDATING.

It has been tested with GNOME2, XFCE4, KDE3, KDE4 and other many wm/desktop
and applications in the runtime.

With help:      marcus and kwm
Pointyhat-exp:  a few times by pav
Tested by:      pgollucci, "Romain Tartière" <romain@blogreen.org>, and
                a few MarcusCom CVS users. Also, I might have missed a few.
Repocopy by:    marcus
Approved by:    portmgr
23 Jan 2009 15:52:58
Original commit files touched by this commit  1.4.4
 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Update to 1.4.4

PR:             130914
Submitted by:   Hirohisa Yamaguchi <umq at ueo dot co dot jp> (maintainer)
06 Jan 2009 12:59:57
Original commit files touched by this commit  1.4.3
 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Update to 1.4.3
- Pass maintainership to submitter per PR 127224

PR:             ports/127478
Submitted by:   Hirohisa Yamaguchi <umq at ueo.co.jp>
Approved by:    arved (maintainer)
21 Aug 2008 06:18:49
Original commit files touched by this commit  1.4.1_1
 This port version is marked as vulnerable.
rafan search for other commits by this committer
Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
(Only the first 15 lines of the commit message are shown above View all of this commit message)
06 Jun 2008 14:01:07
Original commit files touched by this commit  1.4.1_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
03 May 2008 19:14:02
Original commit files touched by this commit  1.4.1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Update to 1.4.1

PR:             123099
Submitted by:   Hirohisa Yamaguchi
29 Feb 2008 09:32:39
Original commit files touched by this commit  1.4.0
 This port version is marked as vulnerable.
arved search for other commits by this committer
Disable padlock-support on 6.x

PR:             121207
Submitted by:   ale, Mark Andrews
28 Feb 2008 21:44:49
Original commit files touched by this commit  1.4.0
 This port version is marked as vulnerable.
arved search for other commits by this committer
Update to 1.4.0

PR:             118541
Submitted by:   Hirohisa Yamaguchi
24 Sep 2007 00:35:45
Original commit files touched by this commit  1.2.4_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
security/libgcrypt portlint fixes

        1. remove quotes from COMMENT
        2. INSTALLS_SHLIB -> USE_LDCONFIG

PR:             ports/115286
Submitted by:   David Yeske <dyeske@gmail.com>
Approved by:    maintainer timeout
23 Jul 2007 09:36:52
Original commit files touched by this commit  1.2.4_1
 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Set --mandir and --infodir in CONFIGURE_ARGS if the configure script
  supports them.  This is determined by running ``configure --help'' in
  do-configure target and set the shell variable _LATE_CONFIGURE_ARGS
  which is then passed to CONFIGURE_ARGS.
- Remove --mandir and --infodir in ports' Makefile where applicable
  Few ports use REINPLACE_CMD to achieve the same effect, remove them too.
- Correct some manual pages location from PREFIX/man to MANPREFIX/man
- Define INFO_PATH where necessary
- Document that .info files are installed in a subdirectory relative to
  PREFIX/INFO_PATH and slightly change add-plist-info to use INFO_PATH and
  subdirectory detection.

PR:             ports/111470
Approved by:    portmgr
Discussed with: stas (Mk/*), gerald (info related stuffs)
Tested by:      pointyhat exp run
08 Mar 2007 14:12:08
Original commit files touched by this commit  1.2.4_1
 This port version is marked as vulnerable.
jylefort search for other commits by this committer
Track libgpg-error shlib version change.
02 Feb 2007 14:25:54
Original commit files touched by this commit  1.2.4
 This port version is marked as vulnerable.
arved search for other commits by this committer
Update to 1.2.4
28 Jan 2007 09:07:47
Original commit files touched by this commit  1.2.3_1
 This port version is marked as vulnerable.
kris search for other commits by this committer
Use libtool port instead of included one to avoid objformat a.out botch
22 Sep 2006 07:10:31
Original commit files touched by this commit  1.2.3_1
 This port version is marked as vulnerable.
sergei search for other commits by this committer
- Chase libgpg-error version bump [1]
- Add explicit version to libgpg-error dependency where missing [2]
- Bump PORTREVISION [1]

Approved by:    maintainers (arved, lofi, novel,
                ports at mcdermottroe dot com) [1]
Suggested by:   novel, lofi [2]
31 Aug 2006 21:20:52
Original commit files touched by this commit  1.2.3
 This port version is marked as vulnerable.
arved search for other commits by this committer
Update to 1.2.3 (Minor bugfix release)
13 May 2006 04:15:53
Original commit files touched by this commit  1.2.2_1
 This port version is marked as vulnerable.
edwin search for other commits by this committer
Remove USE_REINPLACE from all categories starting with S
03 May 2006 12:55:36
Original commit files touched by this commit  1.2.2_1
 This port version is marked as vulnerable.
sergei search for other commits by this committer
- Chase libgpg-error shlib version bump (.1 -> .2)
- Bump PORTREVISION
23 Feb 2006 10:40:45
Original commit files touched by this commit  1.2.2
 This port version is marked as vulnerable.
ade search for other commits by this committer
Conversion to a single libtool environment.

Approved by:    portmgr (kris)
15 Nov 2005 06:52:12
Original commit files touched by this commit  1.2.2
 This port version is marked as vulnerable.
ade search for other commits by this committer
Mass-conversion to the USE_AUTOTOOLS New World Order.  The code present
in bsd.autotools.mk essentially makes this a no-op given that all the
old variables set a USE_AUTOTOOLS_COMPAT variable, which is parsed in
exactly the same way as USE_AUTOTOOLS itself.

Moreover, USE_AUTOTOOLS has already been extensively tested by the GNOME
team -- all GNOME 2.12.x ports use it.

Preliminary documentation can be found at:
        http://people.FreeBSD.org/~ade/autotools.txt

which is in the process of being SGMLized before introduction into the
Porters Handbook.

Light blue touch-paper.  Run.
08 Nov 2005 12:26:38
Original commit files touched by this commit  1.2.2
 This port version is marked as vulnerable.
arved search for other commits by this committer
Add SHA256 checksums for my ports
18 Oct 2005 17:32:59
Original commit files touched by this commit  1.2.2
 This port version is marked as vulnerable.
arved search for other commits by this committer
Update to 1.2.2

Noteworthy changes are:
 * Made the RNG immune against fork without exec.
 * Minor changes to some function declarations.  Buffer arguments are
   now typed as void pointer.  This should not affect any compilation.
 * A bug in the definition of gcry_cipher_register has been fixed.
27 May 2005 13:53:32
Original commit files touched by this commit  1.2.1_1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Fix build on powerpc
22 Apr 2005 08:30:18
Original commit files touched by this commit  1.2.1_1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Bump PORTREVISION for previous change.

Reported by:    pointyhat
20 Apr 2005 13:41:51
Original commit files touched by this commit  1.2.1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Remove USE_PERL

PR:             80046
Submitted by:   leeym
11 Jan 2005 14:53:12
Original commit files touched by this commit  1.2.1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Update libgcrypt to 1.2.1. Changes:
        * made the code try to lock secure memory pool not only when running as
          root,
        * fixed type usage in Serpent,
        * made the code mix the PID into the entropy pool for better protection
          after a fork,
        * fixed memory leak in RSA.
        * fixed alignment problems in Rijndael,
        * fixed memory leak in gcry_pk_sign(),
        * fixed broken pointer access in gcry_ac_open(),
        * updated the documentation,
        * fixed several other bugs.
Chase Shared library version and bump PORTREVISION of affected ports.
13 Oct 2004 07:59:41
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Use libtool 15
04 Sep 2004 06:28:15
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
arved search for other commits by this committer
 managed to break this just in time for the ports freeze.

Submitted by:   lofi, eik
Approved by:    portmgr (eik)
03 Sep 2004 21:37:40
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Nuke the gnupg sigchecking code. There are bugs and I don't have the time
to work on this now.

PR:             66417
Submitted by:   Lupe Christoph <lupe@lupe-christoph.de>
09 Jul 2004 17:43:11
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
marcus search for other commits by this committer
Apply a big libtool patch to allow porters to use the libtool installed by
the libtoolX ports instead of the one included with each port.  Ports that
set USE_LIBTOOL_VER=X will now use the ports version of libtool instead of
the included version.  To restore previous behavior, use the new macro,
USE_INC_LIBTOOL_VER.  Both macros accept the same argument: a libtool version.

For example, to use the ports version of libtool-1.5, add the following to
your Makefile:

USE_LIBTOOL_VER=        15

To use the included version of libtool with extra hacks provided by
libtool-1.5, add the following to your Makefile:

USE_INC_LIBTOOL_VER=    15

With this change, ports that had to add additional libtool hacks to prevent
.la files from being installed or to fix certain threading issues can now
delete those hacks (after appropriate testing, of course).

PR:             63944
Based on work by:eik and marcus
Approved by:    ade (autotools maintainer)
Tested by:      kris on pointyhat
Bound to be hidden problems:    You bet
12 Jun 2004 14:12:17
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Add EXTRACT_ONLY

Noticed by:     bsdtar
08 May 2004 10:25:51
Original commit files touched by this commit  1.2.0_1
 This port version is marked as vulnerable.
arved search for other commits by this committer
Fix pkg-plist

Reported by:                            kris, markus
Pointy hat (not 216.136.204.22) to:     arved
04 May 2004 06:21:22
Original commit files touched by this commit  1.2.0
 This port version is marked as vulnerable.
arved search for other commits by this committer
Add dependency on ligpg-error

PR:             66228
Submitted by:   michael johnson
03 May 2004 13:57:46
Original commit files touched by this commit  1.2.0
 This port version is marked as vulnerable.
arved search for other commits by this committer
Update libgcrypt to the new stable version 1.2.0
Retire libgcrypt-devel

Switch back to security/libgcrypt and bump PORTREVISION for
- gnutls
- gnutls-devel
- gsasl
- opencdk
- vpnc

libggz:
- Remove dependency on libgcrypt, because the port does not yet
work with the new libgcrypt

libksba:
(Only the first 15 lines of the commit message are shown above View all of this commit message)
18 Mar 2004 15:17:40
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
arved search for other commits by this committer
Add SIZE

Submitted by:   trevor
14 Mar 2004 06:17:56
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
ade search for other commits by this committer
Whoa there, boy, that's a mighty big commit y'all have there...

Begin autotools sanitization sequence by requiring ports to explicitly
specify which version of {libtool,autoconf,automake} they need, erasing
the concept of a "system default".

For ports-in-waiting:

        USE_LIBTOOL=YES         ->      USE_LIBTOOL_VER=13
        USE_AUTOCONF=YES        ->      USE_AUTOCONF_VER=213
        USE_AUTOMAKE=YES        ->      USE_AUTOMAKE_VER=14

Ports attempting to use the old style system after June 1st 2004 will be
sorely disappointed.
06 Feb 2004 11:07:25
Original commit files touched by this commit  1.1.12
 This port version is marked as vulnerable.
arved search for other commits by this committer
Attempt to silence "Annoying Reminder Guy II" by adding NO_LATEST_LINK

Number of commits found: 111 (showing only 100 on this page)

1 | 2  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
moodle31Sep 18
moodle33Sep 18
firefox*Sep 15
firefox-esr*Sep 15
joomla3Sep 15
libxul*Sep 15
linux-firefox*Sep 15
linux-seamonkey*Sep 15
linux-thunderbird*Sep 15
seamonkey*Sep 15
thunderbird*Sep 15
waterfox*Sep 15
mybbSep 13
openjpeg*Sep 13
linux-flashplayerSep 11

13 vulnerabilities affecting 120 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2018-09-18 11:49:15


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 35211
Broken 52
Deprecated 305
Ignore 302
Forbidden 5
Restricted 162
No CDROM 74
Vulnerable 35
Expired 6
Set to expire 291
Interactive 0
new 24 hours 12
new 48 hours15
new 7 days106
new fortnight133
new month3017

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2018 Dan Langille. All rights reserved.