notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Ukraine
FreshPorts needs to find a new hosting provide willing to take a 2U chassis and host it free of charge. This is part of the FreshPorts project. Preferably in the Austin area. This is not a primary server, but it used for development.
Port details
gnupg Complete and free PGP implementation
2.3.3_3 security on this many watch lists=397 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout Version of this port present on the latest quarterly branch.
Maintainer: adridg@FreeBSD.org search for ports maintained by this maintainer
Port Added: unknown
Last Update: 2022-03-28 19:17:34
Commit Hash: 6936b34
People watching this port, also watch:: libiconv, gmake, expat, unzip, png
License: GPLv3 LGPL3
Description:
SVNWeb : git : Homepage
pkg-plist: as obtained via: make generate-plist
Expand this list (141 items)
Collapse this list.
  1. /usr/local/share/licenses/gnupg-2.3.3_3/catalog.mk
  2. /usr/local/share/licenses/gnupg-2.3.3_3/LICENSE
  3. /usr/local/share/licenses/gnupg-2.3.3_3/GPLv3
  4. /usr/local/share/licenses/gnupg-2.3.3_3/LGPL3
  5. bin/dirmngr
  6. bin/dirmngr-client
  7. bin/gpg-agent
  8. bin/gpg-card
  9. bin/gpg-connect-agent
  10. bin/gpg-wks-client
  11. bin/gpg-wks-server
  12. @comment @(,,4555) bin/gpg2
  13. bin/gpg2
  14. bin/gpgconf
  15. bin/gpgparsemail
  16. bin/gpgscm
  17. bin/gpgsm
  18. bin/gpgsplit2
  19. bin/gpgtar
  20. bin/gpgv2
  21. bin/kbxutil
  22. bin/watchgnupg
  23. @comment libexec/dirmngr_ldap
  24. libexec/gpg-check-pattern
  25. libexec/gpg-pair-tool
  26. libexec/gpg-preset-passphrase
  27. libexec/gpg-protect-tool
  28. libexec/gpg-wks-client
  29. libexec/keyboxd
  30. libexec/scdaemon
  31. man/man1/dirmngr-client.1.gz
  32. man/man1/gpg-agent.1.gz
  33. man/man1/gpg-card.1.gz
  34. man/man1/gpg-check-pattern.1.gz
  35. man/man1/gpg-connect-agent.1.gz
  36. man/man1/gpg-preset-passphrase.1.gz
  37. man/man1/gpg-wks-client.1.gz
  38. man/man1/gpg-wks-server.1.gz
  39. man/man1/gpg2.1.gz
  40. man/man1/gpgconf.1.gz
  41. man/man1/gpgparsemail.1.gz
  42. man/man1/gpgsm.1.gz
  43. man/man1/gpgtar.1.gz
  44. man/man1/gpgv2.1.gz
  45. man/man1/scdaemon.1.gz
  46. man/man1/watchgnupg.1.gz
  47. man/man7/gnupg.7.gz
  48. man/man8/addgnupghome.8.gz
  49. man/man8/applygnupgdefaults.8.gz
  50. man/man8/dirmngr.8.gz
  51. sbin/addgnupghome
  52. sbin/applygnupgdefaults
  53. share/doc/gnupg/DCO
  54. share/doc/gnupg/DETAILS
  55. share/doc/gnupg/FAQ
  56. share/doc/gnupg/HACKING
  57. share/doc/gnupg/KEYSERVER
  58. share/doc/gnupg/OpenPGP
  59. share/doc/gnupg/README
  60. share/doc/gnupg/TRANSLATE
  61. share/doc/gnupg/examples/Automatic.prf
  62. share/doc/gnupg/examples/README
  63. share/doc/gnupg/examples/VS-NfD.prf
  64. share/doc/gnupg/examples/common.conf
  65. share/doc/gnupg/examples/debug.prf
  66. share/doc/gnupg/examples/gpgconf.conf
  67. share/doc/gnupg/examples/pwpattern.list
  68. share/doc/gnupg/examples/qualified.txt
  69. share/doc/gnupg/examples/scd-event
  70. share/doc/gnupg/examples/systemd-user/README
  71. share/doc/gnupg/examples/systemd-user/dirmngr.service
  72. share/doc/gnupg/examples/systemd-user/dirmngr.socket
  73. share/doc/gnupg/examples/systemd-user/gpg-agent-browser.socket
  74. share/doc/gnupg/examples/systemd-user/gpg-agent-extra.socket
  75. share/doc/gnupg/examples/systemd-user/gpg-agent-ssh.socket
  76. share/doc/gnupg/examples/systemd-user/gpg-agent.service
  77. share/doc/gnupg/examples/systemd-user/gpg-agent.socket
  78. share/doc/gnupg/examples/trustlist.txt
  79. share/doc/gnupg/help.be.txt
  80. share/doc/gnupg/help.ca.txt
  81. share/doc/gnupg/help.cs.txt
  82. share/doc/gnupg/help.da.txt
  83. share/doc/gnupg/help.de.txt
  84. share/doc/gnupg/help.el.txt
  85. share/doc/gnupg/help.eo.txt
  86. share/doc/gnupg/help.es.txt
  87. share/doc/gnupg/help.et.txt
  88. share/doc/gnupg/help.fi.txt
  89. share/doc/gnupg/help.fr.txt
  90. share/doc/gnupg/help.gl.txt
  91. share/doc/gnupg/help.hu.txt
  92. share/doc/gnupg/help.id.txt
  93. share/doc/gnupg/help.it.txt
  94. share/doc/gnupg/help.ja.txt
  95. share/doc/gnupg/help.nb.txt
  96. share/doc/gnupg/help.pl.txt
  97. share/doc/gnupg/help.pt.txt
  98. share/doc/gnupg/help.pt_BR.txt
  99. share/doc/gnupg/help.ro.txt
  100. share/doc/gnupg/help.ru.txt
  101. share/doc/gnupg/help.sk.txt
  102. share/doc/gnupg/help.sv.txt
  103. share/doc/gnupg/help.tr.txt
  104. share/doc/gnupg/help.txt
  105. share/doc/gnupg/help.zh_CN.txt
  106. share/doc/gnupg/help.zh_TW.txt
  107. share/gnupg/distsigkey.gpg
  108. share/gnupg/sks-keyservers.netCA.pem
  109. share/locale/ca/LC_MESSAGES/gnupg2.mo
  110. share/locale/cs/LC_MESSAGES/gnupg2.mo
  111. share/locale/da/LC_MESSAGES/gnupg2.mo
  112. share/locale/de/LC_MESSAGES/gnupg2.mo
  113. share/locale/el/LC_MESSAGES/gnupg2.mo
  114. share/locale/en@boldquot/LC_MESSAGES/gnupg2.mo
  115. share/locale/en@quot/LC_MESSAGES/gnupg2.mo
  116. share/locale/eo/LC_MESSAGES/gnupg2.mo
  117. share/locale/es/LC_MESSAGES/gnupg2.mo
  118. share/locale/et/LC_MESSAGES/gnupg2.mo
  119. share/locale/fi/LC_MESSAGES/gnupg2.mo
  120. share/locale/fr/LC_MESSAGES/gnupg2.mo
  121. share/locale/gl/LC_MESSAGES/gnupg2.mo
  122. share/locale/hu/LC_MESSAGES/gnupg2.mo
  123. share/locale/id/LC_MESSAGES/gnupg2.mo
  124. share/locale/it/LC_MESSAGES/gnupg2.mo
  125. share/locale/ja/LC_MESSAGES/gnupg2.mo
  126. share/locale/nb/LC_MESSAGES/gnupg2.mo
  127. share/locale/pl/LC_MESSAGES/gnupg2.mo
  128. share/locale/pt/LC_MESSAGES/gnupg2.mo
  129. share/locale/ro/LC_MESSAGES/gnupg2.mo
  130. share/locale/ru/LC_MESSAGES/gnupg2.mo
  131. share/locale/sk/LC_MESSAGES/gnupg2.mo
  132. share/locale/sv/LC_MESSAGES/gnupg2.mo
  133. share/locale/tr/LC_MESSAGES/gnupg2.mo
  134. share/locale/uk/LC_MESSAGES/gnupg2.mo
  135. share/locale/zh_CN/LC_MESSAGES/gnupg2.mo
  136. share/locale/zh_TW/LC_MESSAGES/gnupg2.mo
  137. @postexec [ -e %D/bin/gpg ] || ln -sf gpg2 %D/bin/gpg
  138. @postunexec [ -e %D/bin/gpg ] || rm -f %D/bin/gpg
  139. @owner
  140. @group
  141. @mode
Collapse this list.
Dependency lines:
  • gnupg>0:security/gnupg
Conflicts:
CONFLICTS:
  • dirmngr
Conflicts Matches:
There are no Conflicts Matches for this port. This is usually an error.
To install the port:
cd /usr/ports/security/gnupg/ && make install clean
To add the package, run one of these commands:
  • pkg install security/gnupg
  • pkg install gnupg
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.
PKGNAME: gnupg
Flavors: there is no flavor information for this port.
distinfo:
Packages (timestamps in pop-ups are UTC):
gnupg
ABIlatestquarterly
FreeBSD:11:aarch642.2.10_12.2.20
FreeBSD:11:amd642.3.22.3.2
FreeBSD:11:armv62.1.132.2.23
FreeBSD:11:i3862.3.22.3.2
FreeBSD:11:mips--
FreeBSD:11:mips64--
FreeBSD:12:aarch642.2.10_12.3.3_3
FreeBSD:12:amd642.3.3_32.3.3_3
FreeBSD:12:armv62.2.10_12.2.23
FreeBSD:12:armv72.2.10_12.2.23
FreeBSD:12:i3862.3.3_32.3.3_3
FreeBSD:12:mips--
FreeBSD:12:mips64--
FreeBSD:12:powerpc64-2.2.27
FreeBSD:13:aarch642.3.3_32.3.3_3
FreeBSD:13:amd642.3.3_32.3.3_3
FreeBSD:13:armv62.2.272.3.3_3
FreeBSD:13:armv72.3.3_32.3.3_3
FreeBSD:13:i3862.3.3_32.3.3_3
FreeBSD:13:mips--
FreeBSD:13:mips64--
FreeBSD:13:powerpc64-2.3.2
FreeBSD:13:riscv64-2.3.3_3
FreeBSD:14:aarch642.3.3_3-
FreeBSD:14:amd642.3.3_3-
FreeBSD:14:armv62.3.3_3-
FreeBSD:14:armv72.3.3_3-
FreeBSD:14:i3862.3.3_3-
FreeBSD:14:mips--
FreeBSD:14:mips64--
FreeBSD:14:powerpc642.3.0-
FreeBSD:14:riscv642.3.3_2-
 

Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. gmake>=4.3 : devel/gmake
  2. makeinfo : print/texinfo
  3. pkgconf>=1.3.0_1 : devel/pkgconf
  4. msgfmt : devel/gettext-tools
Runtime dependencies:
  1. pinentry : security/pinentry
  2. indexinfo : print/indexinfo
Library dependencies:
  1. libassuan.so : security/libassuan
  2. libgcrypt.so : security/libgcrypt
  3. libgpg-error.so : security/libgpg-error
  4. libksba.so : security/libksba
  5. libnpth.so : devel/npth
  6. libgnutls.so : security/gnutls
  7. libreadline.so.8 : devel/readline
  8. libsqlite3.so : databases/sqlite3
  9. libintl.so : devel/gettext-runtime
This port is required by:
for Build
  1. devel/subversion
  2. mail/mutt
  3. mail/pine-pgp-filters
  4. mail/sqwebmail
  5. news/inn
  6. news/inn-current
  7. security/clamav-unofficial-sigs
Expand this list (18 items / 11 hidden - sorry, this count includes any deleted ports)
  1. Collapse this list).
  2. security/gcr
  3. security/gpa
  4. security/gpgme
  5. security/libcryptui
  6. security/p5-GnuPG-Interface
  7. security/p5-Module-Signature
  8. security/p5-PGP-Sign
  9. security/seahorse
  10. Collapse this list.

Deleted ports which required this port:

Expand this list of 3 deleted ports
  1. emulators/pipelight*
  2. news/inn-CURRENT*
  3. security/openpgpsdk*
  4. Collapse this list of deleted ports.
for Run
  1. chinese/tin
  2. deskutils/py-paperless
  3. devel/geany-plugin-pg
  4. devel/qca
  5. devel/subversion
  6. mail/ez-pine-gpg
  7. mail/mutt
Expand this list (66 items / 59 hidden - sorry, this count includes any deleted ports)
  1. Collapse this list).
  2. mail/pine-pgp-filters
  3. mail/sqwebmail
  4. mail/sylpheed
  5. news/inn
  6. news/inn-current
  7. news/tin
  8. security/aespipe
  9. security/clamav-unofficial-sigs
  10. security/git-crypt
  11. security/git-remote-gcrypt
  12. security/git-secret
  13. security/gopass
  14. security/gpa
  15. security/gpg-gui
  16. security/gpg-tui
  17. security/gpgme
  18. security/gtkpasman
  19. security/gvmd
  20. security/kgpg
  21. security/libcryptui
  22. security/monkeysphere
  23. security/p5-GnuPG-Interface
  24. security/p5-Module-Signature
  25. security/p5-PGP-Sign
  26. security/py-muacrypt
  27. security/rubygem-gpgr
  28. security/seahorse
  29. security/signing-party
  30. security/spm
  31. sysutils/debootstrap
  32. sysutils/duplicity
  33. sysutils/password-store
  34. sysutils/zogftw
  35. www/py-woob
  36. Collapse this list.

Deleted ports which required this port:

Expand this list of 25 deleted ports
  1. devel/qca-legacy*
  2. devel/qca-qt5*
  3. emulators/pipelight*
  4. emulators/playonbsd*
  5. irc/py-gozerbot*
  6. mail/enigmail*
  7. mail/enigmail-seamonkey*
  8. mail/enigmail-thunderbird*
  9. mail/enigmail-thunderbird-esr*
  10. mail/enigmail-thunderbird3*
  11. mail/horde-dimp*
  12. mail/horde-mimp*
  13. mail/horde3-dimp*
  14. mail/horde3-imp*
  15. mail/horde3-mimp*
  16. mail/thunderbird-esr*
  17. misc/kdeutils3*
  18. news/inn-CURRENT*
  19. security/kgpg-kde4*
  20. security/scamp*
  21. security/sguil*
  22. security/sguil-client*
  23. sysutils/duplicity-devel*
  24. sysutils/duplicity07*
  25. www/py-weboob*
  26. Collapse this list of deleted ports.
* - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

Configuration Options:
Options name:

USES:

FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (11 items)
Collapse this list.
  1. ftp://ftp.crysys.hu/pub/gnupg/gnupg/
  2. ftp://ftp.franken.de/pub/crypt/mirror/ftp.gnupg.org/gcrypt/gnupg/
  3. ftp://ftp.freenet.de/pub/ftp.gnupg.org/gcrypt/gnupg/
  4. ftp://ftp.gnupg.org/gcrypt/gnupg/
  5. ftp://mirror.switch.ch/mirror/gnupg/gnupg/
  6. http://mirror.tje.me.uk/pub/mirrors/ftp.gnupg.org/gnupg/
  7. https://artfiles.org/gnupg.org/gnupg/
  8. https://ftp.heanet.ie/mirrors/ftp.gnupg.org/gcrypt/gnupg/
  9. https://gnupg.org/ftp/gcrypt/gnupg/
  10. https://mirrors.dotsrc.org/gcrypt/gnupg/
  11. https://www.mirrorservice.org/sites/ftp.gnupg.org/gcrypt/gnupg/
Collapse this list.
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2018-01-07
    Affects: users of security/gnupg and mail/mutt and mail/neomutt
    Author: adamw@FreeBSD.org
    Reason: 
      The invocation for gpg from mutt/neomutt changed between gnupg-2.0
      (which has expired and is now removed) and gnupg-2.2 (the current
      version in the tree). Unless you're using gpgme, PGP-related
      commands may fail in (neo)mutt.
    
      In all cases, users are strongly urged to use security/gpgme to take
      care of the setup for you. If you prefer to roll your own, the
      following muttrc/neomuttrc entry has been reported to work:
    
      pgp_decrypt_command="gpg2 %?p?--passphrase-fd 0 --pinentry-mode=loopback? --no-verbose --batch --output - %f"
    
      See muttrc(5), neomuttrc(5), mutt.org, and neomutt.org for instructions
      on (neo)mutt's gpg and gpgme instructions.
    
    
Expand this list (1 items)
  • 2017-08-28
    Affects: users of security/gnupg
    Author: adamw@FreeBSD.org
    Reason: 
      security/gnupg has become the new stable version of GnuPG. This is
      an LTS branch. gnupg20 will reach EOL at the end of the year, and all
      gnupg20 users should migrate to gnupg22.
    
      See https://gnupg.org/faq/whats-new-in-2.1.html for important changes.
    
    
  • Collapse this list.
Port Moves
  • port moved here from security/gnupg20 on 2018-01-01
    REASON: Has expired: Will reach EOL upstream on 2017-12-31

  • port moved here from security/gnupg22 on 2017-09-19
    REASON: Removed, security/gnupg is now gnupg22

Number of commits found: 268 (showing only 100 on this page)

«  1 | 2 | 3  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
20 Nov 2014 05:11:21
Original commit files touched by this commit Revision:372835  2.1.0 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade security/gnupg to 2.1.0 (modern release) and copy previous
  as security/gnupg20 (stable release).
- Set PINENTRY as default option.
13 Nov 2014 09:02:57
Original commit files touched by this commit Revision:372514  2.0.26_1 This port version is marked as vulnerable.
antoine search for other commits by this committer
Cleanup plist
16 Sep 2014 13:44:13
Original commit files touched by this commit Revision:368312  2.0.26_1 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Drop .la files for security/libksba, no dependees require them
- Bump dependent ports as .so version has changed

Approved by:	portmgr blanket
14 Aug 2014 22:16:17
Original commit files touched by this commit Revision:364873  2.0.26 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.26 (minor fixes).
05 Aug 2014 22:13:29
Original commit files touched by this commit Revision:364143  2.0.25_2 This port version is marked as vulnerable.
tijl search for other commits by this committer
Bump PORTREVISION on more ports that depend on libgcrypt after the update
in r363436 and remove the UPDATING entry because it did not guarantee
that all ports were updated nor that they were updated in the right order.
Also remove libgcrypt.la again.

PR:		192342
Approved by:	portmgr (implicit, bump unstaged ports)
24 Jul 2014 18:34:16
Original commit files touched by this commit Revision:362835  2.0.25_1 This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
30 Jun 2014 22:44:52
Original commit files touched by this commit Revision:359936  2.0.25 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.25 (bugfix).
- Fix STD_SOCKET option argument [1].

PR:		ports/191150 [1]
Submitted by:	mazhe@alkumuna.eu [1]
24 Jun 2014 14:42:42
Original commit files touched by this commit Revision:359088  2.0.24 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.24 (security).
- Explicitly depends on libgpg-error>=1.11 [1]
- Turn on PINENTRY option by default [2]
  (I don't like this, but by popular demand for years...)

Submitted by:	dereckson@gmail.com [1], sbruno [2]
PR:		ports/138424 [1], ports/189394 [2]
03 Jun 2014 16:57:23
Original commit files touched by this commit Revision:356379  2.0.23 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Convert to new LIB_DEPENDS format
- Use USES=tar:bzip2

Approved by:	portmgr (blanket)
03 Jun 2014 12:19:50
Original commit files touched by this commit Revision:356333  2.0.23 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.23 (minor enhancement).
02 Dec 2013 12:05:46
Original commit files touched by this commit Revision:335479  2.0.22 This port version is marked as vulnerable.
mat search for other commits by this committer
Fix KDNS option.

Reported by:	geoffroy desvernay
Pointy hat to:	mat
29 Nov 2013 15:16:28
Original commit files touched by this commit Revision:335188  2.0.22 This port version is marked as vulnerable.
mat search for other commits by this committer
Convert to new options framekwork.

maintainer timeout.

PR:		ports/183955
Submitted by:	mat
14 Nov 2013 05:37:22
Original commit files touched by this commit Revision:333739  2.0.22 This port version is marked as vulnerable.
eadler search for other commits by this committer
Fix build with KDNS: --with-adns must be passed to configure.

PR:		ports/183113
Submitted by:	Erick Turnquist <jhujhiti@adjectivism.org>
Approved by:	maintainer timeout (3 weeks)
06 Oct 2013 15:04:10
Original commit files touched by this commit Revision:329582  2.0.22 This port version is marked as vulnerable.
antoine search for other commits by this committer
Fix staging:
- add man pages to the plist
- remove pkg-install and pkg-message from post-install
  (the gpg symlink creation was violating stage)
- re-add INFO to Makefile
- use @mode instead of chmod to allow packaging setuid as user

While here, USE_GMAKE->USES=gmake, use OPTIONS_SUB instead of PLIST_SUB
and use %%PORTDOCS%% for help files as they do not exist with --disable-doc

Approved by:	Jun Kuriyama (maintainer)
05 Oct 2013 09:34:12
Original commit files touched by this commit Revision:329429  2.0.22 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade 2.0.22 (security, VuXML entry will follow).
- Pet portlint about pkg-plist.
- Use $STAGEDIR.
- Turn setuid knob to OptionsNG [1]

PR:		ports/181495 [1]
Submitted by:	Matthew Luckie <mjl@luckie.org.nz> [1]
20 Sep 2013 22:55:26
Original commit files touched by this commit Revision:327769  2.0.21 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
security)
19 Aug 2013 13:29:43
Original commit files touched by this commit Revision:324990  2.0.21 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.21 (minor improvements).
11 Jul 2013 16:26:27
Original commit files touched by this commit Revision:322783  2.0.20_1 This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Update to 7.31.0
- Bump PORTREVISION for ftp/curl shlib change
- Add TEST_DEPENDS
- Convert to new options framework
- Adjust options:
  - Add COOKIES
  - Add CYASSL, NSS, POLARSSL, THREADED_RESOLVER, TLS_SRP [1]
  - Add GSSAPI and SPNEGO [2]
  - Remove KERBEROS4
  - Rename LIBIDN to IDN
  - Remove TRACKMEMORY [1]
- Sort option handler
- Add SLAVEDIRS: ftp/curl-hiphop
- Cosmetic change
- Cleanup Makefile header
- While I'm here, fix typo (PORTREVSION) in x11-wm/ede/Makefile

Changes:	http://curl.haxx.se/changes.html
PR:		ports/172325 (-exp run), ports/177369 (based on) [1]
Submitted by:	Hirohisa Yamaguchi <umq@ueo.co.jp> [1], hrs (via email) [2]
Exp run by:	miwi
11 May 2013 01:38:42
Original commit files touched by this commit Revision:317847  2.0.20 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.20.
03 May 2013 16:36:41
Original commit files touched by this commit Revision:317220  2.0.19_4 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Chase security/libgcrypt update
29 Apr 2013 16:43:05
Original commit files touched by this commit Revision:316831  2.0.19_3 This port version is marked as vulnerable.
rene search for other commits by this committer
In preparation of removing devel/libusb (expires 2013-04-30), remove it
from these ports.

Other changes:
- convert Makefile header
- convert to optionsNG
- remove indefinite article from comment
- drop support for FreeBSD < 8.0
- pet portlint (leave library ABI versions in LIB_DEPENDS)
- net-mgmt/spectools: change option name from GTK to GTK2 to use default
  description from bsd.options.desc.mk

Approved by:	portmgr (bapt)
27 Apr 2013 18:25:25
Original commit files touched by this commit Revision:316683  2.0.19_3 This port version is marked as vulnerable.
mva search for other commits by this committer
- Convert USE_ICONV=yes to USES=iconv
- Change USE_GNOME=pkgconfig|gnomehack to USES=pathfix|pkgconfig and
  USE_GETTEXT=yes to USES=gettext while here
24 Apr 2013 18:10:32
Original commit files touched by this commit Revision:316464  2.0.19_3 This port version is marked as vulnerable.
ak search for other commits by this committer
- Convert USE_GETTEXT to USES (part 3)

Approved by:	portmgr (bapt)
27 Dec 2012 14:04:18
Original commit files touched by this commit Revision:309542  2.0.19_3 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix with NOPORTDOCS=yes [1,2]
- Fix CURL option handled incorrectly [3,4]

PR:		ports/170543 [1], ports/171848 [2], ports/171370 [3], ports/174075 [4]
Submitted by:	Rainer Duffner <rainer@ultra-secure.de> [1], Konstantinos
Koukopoulos <koukopoulos@gmail.com> [2], John Marshall
<john.marshall@riverwillow.com.au> [3], Phil Pennock <phil.pennock@globnix.org>
[4]
13 Aug 2012 14:17:35
Original commit files touched by this commit   2.0.19_2 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Revert previous tty patch until matured.
05 Aug 2012 09:41:58
Original commit files touched by this commit   2.0.19_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Convert to OptionsNG.
- Don't install gpg-zip.1 manpage as gpg-zip script is not installed
  [1].
- Fix /dev/tty brokenness [2].

PR:		ports/170327 [1], ports/170269 [2]
Submitted by:	Alfred Bartsch <bartsch@dssgmbh.de> [1],
	  	Ben Cottrell <tamino@wolfhut.org> [2]
04 May 2012 11:07:46
Original commit files touched by this commit   2.0.19 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Add optional dependency on security/pinentry port.

I'd like to keep this port (and package built on pointyhat) having
simple dependencies.  So this knob is off by default.

PR:             ports/156287, ports/164333
Submitted by:   Joseph Olatt <joji@eskimo.com>, Oliver Herold <oh@fixmbr.de>
04 May 2012 07:27:37
Original commit files touched by this commit   2.0.19 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix (and sort) plist with NLS option.

PR:             ports/167546
Submitted by:   Dima Panov <fluffy@Fluffy.Khv.RU>
27 Mar 2012 10:03:39
Original commit files touched by this commit   2.0.19 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.19.

Feature safe:   yes
26 Sep 2011 14:49:01
Original commit files touched by this commit   2.0.18_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix libcurl detection.

PR:             ports/160535
Submitted by    John Marshall <john.marshall@riverwillow.com.au>
05 Aug 2011 00:35:25
Original commit files touched by this commit   2.0.18 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.18:
  - Support the SSH confirm flag and show SSH fingerprints in ssh
    related pinentries.
  - Improved dirmngr/gpgsm interaction for OCSP.
  - Allow generation of card keys up to 4096 bit.

- Improve for port:
  - Remove patch that was incorporated into this release.
  - Remove redundant BUILD_DEPENDS.
  - Patching should be done in a -patch target. Silence the REINPLACE.

Submitted by:   dougb
PR:             ports/159520
14 Jul 2011 08:19:00
Original commit files touched by this commit   2.0.17_3 This port version is marked as vulnerable.
dougb search for other commits by this committer
Add a patch to handle an ABI change relative to libgcrypt 1.5

Confirmed upstream:
http://lists.gnupg.org/pipermail/gnupg-users/2011-July/042333.html

PR:             ports/158674
Submitted by:   Mark Atkinson <atkin901@gmail.com>
Approved by:    early maintainer timeout/portmgr (pav)
03 Jul 2011 11:40:49
Original commit files touched by this commit   2.0.17_2 This port version is marked as vulnerable.
swills search for other commits by this committer
- Chase the libgcrypt shared lib version
27 Mar 2011 19:03:02
Original commit files touched by this commit   2.0.17_1 This port version is marked as vulnerable.
dougb search for other commits by this committer
Update libksba to 1.2.0, and update dependent ports.
The patch also adds a verify target for the PGP signature
of the distfile.

Noteworthy changes in version 1.2.0 (2011-03-01)
------------------------------------------------

* New functions to allow the creation of X.509 certificates.

This release adds features required by the GnuPG 2.1 development
version.

PR:             ports/155506
Submitted by:   me
Approved by:    maintainer timeout
08 Feb 2011 03:40:16
Original commit files touched by this commit   2.0.17 This port version is marked as vulnerable.
dougb search for other commits by this committer
Version 2.0.17 was released on 2011-01-13:

What's New
===========
* Allow more hash algorithms with the OpenPGP v2 card.
* The gpg-agent now tests for a new gpg-agent.conf on a HUP.
* Fixed output of "gpgconf --check-options".
* Fixed a bug where Scdaemon sends a signal to Gpg-agent running in
  non-daemon mode.
* Fixed TTY management for pinentries and session variable update
  problem.
* Minor bug fixes.

For the port:
Camellia stopped being a configure option in 2.0.12
Fix minor typo for GPGSM OPTION
Minor plist update for 2.0.17

files/patch-keybox-blob.c seems to be no longer needed [2]

PR:             ports/153984
Submitted by:   me
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp> [2]
Approved by:    maintainer timeout (24 days)
Feature safe:   yes
14 Jan 2011 07:42:11
Original commit files touched by this commit   2.0.16_6 This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix the shared library version number for libassuan to reflect what
the authors intended by adding:

USE_AUTOTOOLS=  libtool
USE_GNOME=      ltverhack

to security/libassuan/Makefile.

Update the libassuan shared library version number and/or bump
PORTREVISION in the dependent ports.

Requested by:   ale
Feature safe:   yes
22 Dec 2010 19:16:12
Original commit files touched by this commit   2.0.16_5 This port version is marked as vulnerable.
dougb search for other commits by this committer
Update libassuan to version 2.0.1:

* Input and output notification handler can now really access the
  parsed fd as stated in the manual.

* Cleaned up the logging.

Bump PORTREVISION and libassuan version number in related ports
16 Dec 2010 14:16:46
Original commit files touched by this commit   2.0.16_4 This port version is marked as vulnerable.
glarkin search for other commits by this committer
- Chase libksba shlib version bump in directly-dependent ports

Reported by:            ale and others via private email
Another pointy to:      glarkin
16 Dec 2010 02:34:07
Original commit files touched by this commit   2.0.16_3 This port version is marked as vulnerable.
glarkin search for other commits by this committer
- Chase security/libksba shlib version bump

Requested by:   kwm
Pointyhat to:   glarkin
19 Nov 2010 03:34:08
Original commit files touched by this commit   2.0.16_2 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix WITH_SUID_GPG knob.

PR:             152359
Submitted by:   sunpoet
27 Jul 2010 01:25:20
Original commit files touched by this commit   2.0.16_2 This port version is marked as vulnerable.
wxs search for other commits by this committer
Chase security/libgcrypt shlib bump.

PR:             ports/148755
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
23 Jul 2010 13:43:26
Original commit files touched by this commit   2.0.16_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix $LICENSE_FILE [1].
- Fix realloc bug in GPGSM (not affected GPG itself) [2].

PR:             ports/148817 [1]
Submitted by:   Anonymous <swell.k@gmail.com> [1]
Security:      
http://lists.gnupg.org/pipermail/gnupg-announce/2010q3/000302.html [2]
20 Jul 2010 14:01:50
Original commit files touched by this commit   2.0.16 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.16.
- Add license info.

PR:             ports/148756
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
17 Jun 2010 21:33:29
Original commit files touched by this commit   2.0.15 This port version is marked as vulnerable.
dougb search for other commits by this committer
Update to version 2.0.15, which has the following changes:
 * New command --passwd for GPG.
 * Fixes a regression in 2.0.14 which prevented unprotection of new
   or changed gpg-agent passphrases.
 * Make use of libassuan 2.0 which is available as a DSO.

For the port:
 * Since libassuan is now a shared lib, move it LIB_DEPENDS
 * Remove now-spurious CONFLICTS

Approved by:    maintainer
14 Jun 2010 05:17:52
Original commit files touched by this commit   2.0.14_3 This port version is marked as vulnerable.
dougb search for other commits by this committer
Fix port name on the LEFT side of the : for BUILD_DEPENDS

While I'm here update to the current version of libassuan-1 (1.0.5)
14 Jun 2010 00:42:52
Original commit files touched by this commit   2.0.14_3 This port version is marked as vulnerable.
dougb search for other commits by this committer
Update security/libassuan to version 2.0.0, which is required by gnupg 2.0.15

Unfortunately version 2.0.0 is largely incompatible with version 1.x, so it
is necessary to have a stopgap measure while ports that depend on libassuan
can be updated. In conversation with the maintainers of the dependent ports
it was originally considered ideal to prepare updates for the ports first,
then upgrade everything to libassuan 2.x en masse. Since no action has
arisen on that front, go with plan B:

Copy security/libassuan to security/libassuan-1, and update the dependent
ports accordingly. Because this is (intended to be) a _temporary_ measure,
and because no updates for libassuan 1.x are anticipated, and because the
hope is that it can be removed sooner rather than later, it's a copy instead
of a repocopy.
31 May 2010 02:01:56
Original commit files touched by this commit   2.0.14_2 This port version is marked as vulnerable.
ade search for other commits by this committer
Bounce PORTREVISION for gettext-related ports.  Have fun, ya'll.
03 Apr 2010 10:44:36
Original commit files touched by this commit   2.0.14_1 This port version is marked as vulnerable.
roam search for other commits by this committer
Chase the ftp/curl shlib version bump.
16 Jan 2010 06:27:17
Original commit files touched by this commit   2.0.14 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Unbreak on 9-current (utmpx).

PR:             ports/142865, ports/142871
Submitted by:   garga, keramida
Tested on:      9-current, 8.0
22 Dec 2009 08:24:33
Original commit files touched by this commit   2.0.14 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.14.
05 Sep 2009 15:22:50
Original commit files touched by this commit   2.0.13 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.13.
18 Jul 2009 09:03:43
Original commit files touched by this commit   2.0.12 This port version is marked as vulnerable.
miwi search for other commits by this committer
Add security/pinentry-qt4 to the list of pinentry dialogs.

PR:             136097
Submitted by:   makc@
Approved by:    maintainer timeout
17 Jun 2009 14:59:03
Original commit files touched by this commit   2.0.12 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.12.
- Turn on Camellia option (rfc5581 published).

PR:             ports/135668
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
09 Mar 2009 17:15:43
Original commit files touched by this commit   2.0.11  Sanity Test Failure This port version is marked as vulnerable.
stas search for other commits by this committer
- Chase libusb20 rename in r189585.
- Mark sane-backends broken on current due to changes
  in USB stack.

Reviewed by:    thompsa (old version), miwi
Tested by:      miwi
04 Mar 2009 14:27:11
Original commit files touched by this commit   2.0.11 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 2.0.11 (minor fixes).
23 Jan 2009 15:43:14
Original commit files touched by this commit   2.0.10_2 This port version is marked as vulnerable.
roam search for other commits by this committer
Bump the version of the curl shared library after the ftp/curl update
to 7.19.2.
Bump PORTREVISION, even on the ports that do not have a versioned
dependency, since the binaries will most probably still stop working.
20 Jan 2009 23:49:58
Original commit files touched by this commit   2.0.10_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Add notice about CAMELLIA option (for testing only) [1].
- Turn CAMELLIA off by default for above reason.

Suggested by:   dougb [1]
13 Jan 2009 01:24:47
Original commit files touched by this commit   2.0.10 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 2.0.10.

PR:             ports/130430
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
Announcement:  
https://lists.gnupg.org/pipermail/gnupg-announce/2009q1/000284.html
06 Jan 2009 13:01:11
Original commit files touched by this commit   2.0.9_3 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Bump PORTREVISION due to share library version bump in security/libgcrypt

PR:              ports/127478
27 Jul 2008 15:13:59
Original commit files touched by this commit   2.0.9_2 This port version is marked as vulnerable.
timur search for other commits by this committer
Make WITHOUT_NLS actually work
06 Jun 2008 14:01:07
Original commit files touched by this commit   2.0.9_1 This port version is marked as vulnerable.
edwin search for other commits by this committer
Bump portrevision due to upgrade of devel/gettext.

The affected ports are the ones with gettext as a run-dependency
according to ports/INDEX-7 (5007 of them) and the ones with USE_GETTEXT
in Makefile (29 of them).

PR:             ports/124340
Submitted by:   edwin@
Approved by:    portmgr (pav)
26 Apr 2008 23:48:43
Original commit files touched by this commit   2.0.9 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Update to 2.0.9

Notes:
        This update fixes a possible security vulnerability involving
        memory corruption from importing malicious keys.

PR:             122114/122349
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp> / Nick Barkas
<snb@threerings.net>
Approved by:    maintainer timeout
Security:      
http://www.vuxml.org/freebsd/30394651-13e1-11dd-bab7-0016179b2dd5.html
04 Mar 2008 22:57:42
Original commit files touched by this commit   2.0.8 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.8.
- Change dependency versions.
- NLS option back again.
- Make GPGSM option off by default (to avoid ldap dependency in package).

PR:             ports/118895
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
28 Feb 2008 21:47:06
Original commit files touched by this commit   2.0.4_1 This port version is marked as vulnerable.
arved search for other commits by this committer
Chase libgcrypt library version
13 Oct 2007 11:10:09
Original commit files touched by this commit   2.0.4 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Add a note "require LDAP" in GPGSM knob for $OPTIONS.  This may help
  to reduce confusion when "WITHOUT_LDAP and WITH_GPGSM selected, but
  OpenLDAP dependency exists" situcation.

PR:             ports/116558
Reported by:    Jo Rhett <jrhett@netconsonance.com>
03 Sep 2007 04:31:51
Original commit files touched by this commit   2.0.4 This port version is marked as vulnerable.
novel search for other commits by this committer
Backout the commit with addition of pinentry as a run dependency because
it needs discussion.
02 Sep 2007 11:08:10
Original commit files touched by this commit   2.0.4 This port version is marked as vulnerable.
novel search for other commits by this committer
Add RUN_DEPEND on security/pinentry because gpg is almost useless
without it.

PR:             115760
Submitted by:   novel
Approved by:    maintainer timeout (1 week, linimon ok)
13 Aug 2007 07:57:48
Original commit files touched by this commit   2.0.4 This port version is marked as vulnerable.
novel search for other commits by this committer
Resurrect handy WITH_SUID_GPG knob.

PR:             114926
Submitted by:   novel
Approved by:    maintainer timeout
23 Jul 2007 09:36:52
Original commit files touched by this commit   2.0.4 This port version is marked as vulnerable.
rafan search for other commits by this committer
- Set --mandir and --infodir in CONFIGURE_ARGS if the configure script
  supports them.  This is determined by running ``configure --help'' in
  do-configure target and set the shell variable _LATE_CONFIGURE_ARGS
  which is then passed to CONFIGURE_ARGS.
- Remove --mandir and --infodir in ports' Makefile where applicable
  Few ports use REINPLACE_CMD to achieve the same effect, remove them too.
- Correct some manual pages location from PREFIX/man to MANPREFIX/man
- Define INFO_PATH where necessary
- Document that .info files are installed in a subdirectory relative to
  PREFIX/INFO_PATH and slightly change add-plist-info to use INFO_PATH and
  subdirectory detection.

PR:             ports/111470
Approved by:    portmgr
Discussed with: stas (Mk/*), gerald (info related stuffs)
Tested by:      pointyhat exp run
16 Jun 2007 03:20:28
Original commit files touched by this commit   2.0.4 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 2.0.4 (maintainance release with a few minor enhancements).

PR:             ports/113676
Submitted by:   Hirohisa Yamaguchi <umq@ueo.co.jp>
30 Mar 2007 01:05:06
Original commit files touched by this commit   2.0.3 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix breakage on WITHOUT_NLS=t condition by forcing --enable-nls in
  configure args which I fogot in previous commit.

Reported by:    kris
08 Mar 2007 21:20:17
Original commit files touched by this commit   2.0.3 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.3 (including same safety belt as of 1.4.7).

References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2007q1/000251.html
08 Mar 2007 14:12:08
Original commit files touched by this commit   2.0.2_1 This port version is marked as vulnerable.
jylefort search for other commits by this committer
Track libgpg-error shlib version change.
03 Feb 2007 03:08:21
Original commit files touched by this commit   2.0.2 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 2.0.2.
14 Jan 2007 07:27:47
Original commit files touched by this commit   2.0.1_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix breakage.
14 Jan 2007 07:03:52
Original commit files touched by this commit   2.0.1_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Make GPGSM dependency optional (then we can use this port without LDAP
  dependency). [1]
- Remove libpth hack in configure since this problem was fixed in 2.0.1. [2]
- Remove silly conflict detections which breaks BATCH building [2],[3]
- Check libassuan package version (to avoid using old lib) [4]

PR:             ports/107185 (I'm still working on NLS problem) [2],
                ports/107349 [3]
Submitted by:   Brian Minard <bminard@flatfoot.ca> [1],
                dougb [2],
                Ulrich Spoerlein <uspoerlein@gmail.com> [3],
                Ian Lister <freebsd-ports@lister.dnsalias.net> [4]
25 Dec 2006 03:09:17
Original commit files touched by this commit   2.0.1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Force USE_GETTEXT=YES (remove from OPTIONS) because 2.0.x cannot be
  compiled without libintl.so (I didn't notice this by hidden
  dependencies).

PR:                     ports/107089
Investigated with:      Roland Smith <rsmith@xs4all.nl>
25 Dec 2006 03:00:00
Original commit files touched by this commit   2.0.1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Force USE_GETTEXT=YES (remove from OPTIONS) because 2.0.x cannot be
  compiled without libintl.so (I didn't notice this by hidden
  dependencies).

PR:                     ports/107089
Investigated with:      Roland Smith <rsmith@xs4all.nl>
21 Dec 2006 15:13:49
Original commit files touched by this commit   2.0.1 This port version is marked as vulnerable.
lofi search for other commits by this committer
gnupg-devel and gnupg-2.x conflict.
21 Dec 2006 13:31:56
Original commit files touched by this commit   2.0.1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade gnupg to 2.0.1.  Old stable version (1.4.6) was repocopied
  to security/gnupg1.

Thanks to:      dougb, lofi
13 Dec 2006 12:41:36
Original commit files touched by this commit   1.4.6_2 This port version is marked as vulnerable.
roam search for other commits by this committer
Update the ftp/curl port to 7.16.0.
Bump PORTREVISION of all dependent ports.
Fix the build errors in the few ports that still use the long deprecated,
and now obsoleted, cURL options.

Thanks to everyone who took the time to look over the patch!

Discussed on:   -ports
08 Dec 2006 09:25:31
Original commit files touched by this commit   1.4.6_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Unbreak locale.

PR:             ports/106456
Submitted by:   jjuanino@gmail.com
07 Dec 2006 00:34:17
Original commit files touched by this commit   1.4.6 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.6 (including security fix).

Security:       CVE-2006-6235
References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
27 Nov 2006 22:37:42
Original commit files touched by this commit   1.4.5_2 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix buffer overflow.

References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
05 Oct 2006 13:37:17
Original commit files touched by this commit   1.4.5_1 This port version is marked as vulnerable.
roam search for other commits by this committer
Fix GnuPG's hidden dependency on cURL - add cURL support to OPTIONS and
either explicitly depend on it, or disable it in the configure options.

PR:             103427
Silence from:   kuriyama (maintainer)
07 Sep 2006 02:19:12
Original commit files touched by this commit   1.4.5 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Fix WITH_LIBICONV to work correctly.
- Add WITH_USB to OPTIONS.

PR:             ports/101311
Submitted by:   Helge Oldach <gnupgaug06@oldach.net>
17 Aug 2006 19:39:48
Original commit files touched by this commit   1.4.5 This port version is marked as vulnerable.
garga search for other commits by this committer
- Remove NOPORTDOCS from OPTIONS since the correct is check NOPORTDOCS and
  not WITH(OUT)_NOPORTDOCS
- Use PORTDOCS and clean pkg-plist
- Add NLS to OPTIONS as on by default and move the check after
  bsd.port.pre.mk
- Add --with-ldap=${LOCALBASE} because it was not finding ldap libs without
  this

PR:             ports/101318
Submitted by:   garga
Approved by:    maintainer timeout (14 days)
02 Aug 2006 01:34:30
Original commit files touched by this commit   1.4.5 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.5.
  (fixes 2 more possible memory allocation attacks).
- Enable OPTIONS [1].

Security:      
http://lists.gnupg.org/pipermail/gnupg-announce/2006q3/000229.html
PR:             ports/93540 [1]
Submitted by:   Pawel Wieleba <P.Wieleba@iem.pw.edu.pl> [1]
25 Jun 2006 23:32:36
Original commit files touched by this commit   1.4.4 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.4.
  (fixes user ID handling bug).

Security:      
http://lists.gnupg.org/pipermail/gnupg-announce/2006q2/000226.html
03 Apr 2006 12:57:58
Original commit files touched by this commit   1.4.3 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
- Upgrade to 1.4.3.
- Handle hidden dependency on libusb (1).

Submitted by:   Peter Pentchev <roam@ringlet.net> (1)
09 Mar 2006 22:44:35
Original commit files touched by this commit   1.4.2.2 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Update to 1.4.2.2.

Security:       GnuPG does not detect injection of unsigned data
References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
Probbed by:     simon
Approved by:    portmgr (erwin)
15 Feb 2006 08:56:51
Original commit files touched by this commit   1.4.2.1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 1.4.2.1.

Security:       False positive signature verification in GnuPG
References:    
http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000211.html
Prodded by:     simon
22 Jan 2006 02:50:55
Original commit files touched by this commit   1.4.2_1 This port version is marked as vulnerable.
edwin search for other commits by this committer
Replace ugly "@unexec rmdir %D... 2>/dev/null || true" with @dirrmtry

Approved by:    krion@
PR:             ports/88711 (related)
16 Dec 2005 02:16:59
Original commit files touched by this commit   1.4.2_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Add SHA256.

PR:             ports/90105
Submitted by:   Thomas Vogt <thomas@bsdunix.ch>
16 Dec 2005 02:16:11
Original commit files touched by this commit   1.4.2_1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix the problem in --batch mode.

Obtained from: 
http://cvs.gnupg.org/cgi-bin/viewcvs.cgi/trunk/g10/keygen.c?rev=3853&r1=3852&r2=3853
PR:             ports/90105
Submitted by:   Thomas Vogt <thomas@bsdunix.ch>
01 Aug 2005 11:17:24
Original commit files touched by this commit   1.4.2 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Fix build failure on 4.x.

Reported by:    "Sander Holthaus - Orange XL" <info@orangexl.com>
31 Jul 2005 22:31:11
Original commit files touched by this commit   1.4.2 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 1.4.2.

PR:             ports/84289
Submitted by:   Vasil Dimov <vd@datamax.bg>
24 Apr 2005 04:42:08
Original commit files touched by this commit   1.4.1 This port version is marked as vulnerable.
kuriyama search for other commits by this committer
Upgrade to 1.4.1.

PR:             ports/80157
Submitted by:   Vasil Dimov <vd@datamax.bg>
Kindly knocked by:      dougb
12 Apr 2005 03:26:57
Original commit files touched by this commit   1.4.0_1 This port version is marked as vulnerable.
obrien search for other commits by this committer
At Kris's request, back out the MACHINE_ARCH spelling correction until
after 5.4-RELEASE.
11 Apr 2005 08:04:41
Original commit files touched by this commit   1.4.0_1 This port version is marked as vulnerable.
obrien search for other commits by this committer
Assist getting more ports working on AMD64 by obeying the
Ports Collection documentation and use 'ARCH' rather than 'MACHINE_ARCH'.

Number of commits found: 268 (showing only 100 on this page)

«  1 | 2 | 3  »