Commit graph

131 commits

Author SHA1 Message Date
Cy Schubert
282f47b5a9 security/krb5-devel: update to the latest MIT/KRB5 github commit 2022-02-27 14:27:21 -08:00
Cy Schubert
2c07962829 security/krb5-devel: update to the latest MIT/KRB5 github commit 2022-02-02 08:26:04 -08:00
Cy Schubert
b0baa180a2 security/krb5-devel: update to the latest MIT/KRB5 github commit 2022-01-14 07:57:16 -08:00
Stefan Eßer
bcaf25a8c8 Fix CONFLICTS entries of multiple ports
There have been lots of missing CONFLICTS_INSTALL entries, either
because conflicting ports were added without updating existing ports,
due to name changes of generated packages, due to mis-understanding
the format and semantics of the conflicts entries, or just due to
typoes in package names.

This patch is the result of a comparison of all files contained in
the official packages with each other. This comparison was based on
packages built with default options and may therefore have missed
further conflicts with optionally installed files.

Where possible, version numbers in conflicts entries have been
generalized, some times taking advantage of the fact that a port
cannot conflict with itself (due to logic in bsd.port.mk that
supresses the pattern match result in that case).

A few ports that set the conflicts variables depending on complex
conditions (e.g. port options), have been left unmodified, despite
probably containing outdated package names.

These changes should only affect the installation of locally built
ports, not the package building with poudriere. They should give an
early indication of the install conflict in cases where currently
the pkg command aborts an installation when it detects that an
existing file would be overwritten,

Approved by:	portmgr (implicit)
2022-01-10 16:15:39 +01:00
Cy Schubert
d08481ebd8 security/krb5-devel: update to the latest MIT/KRB5 github commit 2022-01-03 17:16:18 -08:00
Cy Schubert
b963e2d95e security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-12-13 06:37:31 -08:00
Cy Schubert
e264aad0c8 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-11-29 12:55:21 -08:00
Cy Schubert
aa6d4c5f40 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-11-08 10:57:51 -08:00
Cy Schubert
f1789504d1 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-11-01 09:46:25 -07:00
Stefan Eßer
819f25b36d */*: Remove redundant '-[0-9]*' from CONFLICTS
The conflict checks compare the patterns first against the package
names without version (as reported by "pkg query "%n"), then - if
there was no match - agsinst the full package names including the
version (as reported by "pkg query "%n-%v").

Many CONFLICTS definitions used patterns like "bash-[0-9]*" to filter
for the bash package in any version. But that pattern is functionally
identical with just "bash".

Approved by:	portmgr (blanket)
2021-10-29 11:50:18 +02:00
Cy Schubert
d4cc1ef153 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-10-18 10:14:19 -07:00
Rene Ladan
620968a43a cleanup: drop support for EOL FreeBSD 11.X
Search criteria used:
- 11.4
- OSREL*
- OSVER*
- *_FreeBSD_11

Input from:
- adridg: devel/qca-legacy
- jbeich: _WITH_DPRINTF, _WITH_GETLINE, GNU bfd workarounds
- sunpoet: security/p5-*OpenSSL*

Reviewed by:	doceng, kde, multimedia, perl, python, ruby, rust
Differential Revision: https://reviews.freebsd.org/D32008
Test Plan: make index
2021-09-30 23:23:30 +02:00
Cy Schubert
897f9e4cef security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-09-28 07:33:48 -07:00
Cy Schubert
a00085aac5 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-09-13 09:09:30 -07:00
Cy Schubert
a107ca98a0 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-08-30 10:06:30 -07:00
Cy Schubert
6d931e8ef0 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-08-21 07:49:33 -07:00
Cy Schubert
09955ac645 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-08-09 13:15:06 -07:00
Cy Schubert
788aafd535 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-07-21 14:17:31 -07:00
Cy Schubert
8e65299c11 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-07-12 15:26:23 -07:00
Cy Schubert
046fed161f security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-07-05 08:23:56 -07:00
Cy Schubert
9452147c34 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-06-21 07:17:34 -07:00
Cy Schubert
5ccbdb88ae security/krb5-devel: Broken on FreeBSD-11, OpenSSL 1.0.2 not supported
security/krb5-devel fails to build on FreeBSD-11 due to:

main.c:1593:5: error: implicit declaration of function 'OPENSSL_clear_free'
is invalid in C99 [-Werror,-Wimplicit-function-declaration]
    OPENSSL_clear_free(buffer, buffer_len);
2021-06-15 09:29:31 -07:00
Cy Schubert
d69a288a95 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-06-14 09:04:02 -07:00
Cy Schubert
a989dee5e5 security/krb5-devel: update to the latest MIT/KRB5 github commit 2021-06-03 08:01:44 -07:00
Cy Schubert
45ffb6de9c security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-05-17 09:54:19 -07:00
Yasuhiro Kimura
9671981826
*: Remove unnecessary 'port' argument from USES=readline
PR:		248459
Exp-run by:	antoine
2021-05-15 09:14:04 +02:00
Cy Schubert
ca8ddb9881 security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-04-12 11:23:47 -07:00
Cy Schubert
8c8b1dbd41 security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-04-06 23:50:38 -07:00
Mathieu Arnold
135fdeebb9
all: Remove all other $FreeBSD keywords. 2021-04-06 16:31:13 +02:00
Mathieu Arnold
305f148f48
Remove # $FreeBSD$ from Makefiles. 2021-04-06 16:31:07 +02:00
Cy Schubert
e104398900 security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-03-29 18:14:29 +00:00
Cy Schubert
7f00671b1c security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-03-22 18:40:28 +00:00
Cy Schubert
49f5f280b2 security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-03-15 19:37:05 +00:00
Cy Schubert
031ce7eefc security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-03-05 15:47:16 +00:00
Cy Schubert
4b0e4aed70 security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-03-01 19:08:44 +00:00
Cy Schubert
02e5ea9992 security/krb5-devel: update to the latest MIT/KRB5 github commit. 2021-02-19 15:31:19 +00:00
Cy Schubert
8f984519d6 Update to the latest MIT/KRB5 commit on github. 2021-02-16 17:40:38 +00:00
Cy Schubert
9c47cf5285 Update to the latest MIT KRB5 commit on github. 2021-02-02 05:01:20 +00:00
Cy Schubert
bb9b82f871 Update to the latest MIT KRB5 commit on github.
This commit captures KRB5-1.19-beta2. The beta2 announcement on
krbdev is as follows:

MIT krb5-1.19-beta2 is now available for download from

         https://web.mit.edu/kerberos/dist/testing.html

The main MIT Kerberos web page is

         https://web.mit.edu/kerberos/

Please send comments to the krbdev list.  We plan for the final
release to occur in about one month.  The README file contains a more
extensive list of changes.

Major changes in 1.19
---------------------

Administrator experience:

* When a client keytab is present, the GSSAPI krb5 mech will refresh
  credentials even if the current credentials were acquired manually.

* It is now harder to accidentally delete the K/M entry from a KDB.

Developer experience:

* gss_acquire_cred_from() now supports the "password" and "verify"
  options, allowing credentials to be acquired via password and
  verified using a keytab key.

* When an application accepts a GSS security context, the new
  GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor
  both provided matching channel bindings.

* Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self
  requests to identify the desired client principal by certificate.

* PKINIT certauth modules can now cause the hw-authent flag to be set
  in issued tickets.

* The krb5_init_creds_step() API will now issue the same password
  expiration warnings as krb5_get_init_creds_password().

Protocol evolution:

* Added client and KDC support for Microsoft's Resource-Based
  Constrained Delegation, which allows cross-realm S4U2Proxy requests.
  A third-party database module is required for KDC support.

* kadmin/admin is now the preferred server principal name for kadmin
  connections, and the host-based form is no longer created by
  default.  The client will still try the host-based form as a
  fallback.

* Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT
  extension, which causes channel bindings to be required for the
  initiator if the acceptor provided them.  The client will send this
  option if the client_aware_gss_bindings profile option is set.

User experience:

* kinit will now issue a warning if the des3-cbc-sha1 encryption type
  is used in the reply.  This encryption type will be deprecated and
  removed in future releases.

* Added kvno flags --out-cache, --no-store, and --cached-only
  (inspired by Heimdal's kgetcred).
2021-01-24 03:36:48 +00:00
Cy Schubert
9911b9982f Update to the latest MIT KRB5 commit on github. 2021-01-04 19:40:39 +00:00
Cy Schubert
cc735bba8a Update to the latest MIT KRB5 commit on github.
This commit captures KRB5-1.19-beta. The beta announcement on
krbdev is as follows:

MIT krb5-1.19-beta1 is now available for download from

         https://web.mit.edu/kerberos/dist/testing.html

The main MIT Kerberos web page is

         https://web.mit.edu/kerberos/

Please send comments to the krbdev list.  We plan for the final
release to occur in about one month.  The README file contains a more
extensive list of changes.

Major changes in 1.19
---------------------

Administrator experience:

* When a client keytab is present, the GSSAPI krb5 mech will refresh
  credentials even if the current credentials were acquired manually.

* It is now harder to accidentally delete the K/M entry from a KDB.

Developer experience:

* gss_acquire_cred_from() now supports the "password" and "verify"
  options, allowing credentials to be acquired via password and
  verified using a keytab key.

* When an application accepts a GSS security context, the new
  GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor
  both provided matching channel bindings.

* Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self
  requests to identify the desired client principal by certificate.

* PKINIT certauth modules can now cause the hw-authent flag to be set
  in issued tickets.

* The krb5_init_creds_step() API will now issue the same password
  expiration warnings as krb5_get_init_creds_password().

Protocol evolution:

* Added client and KDC support for Microsoft's Resource-Based
  Constrained Delegation, which allows cross-realm S4U2Proxy requests.
  A third-party database module is required for KDC support.

* kadmin/admin is now the preferred server principal name for kadmin
  connections, and the host-based form is no longer created by
  default.  The client will still try the host-based form as a
  fallback.

* Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT
  extension, which causes channel bindings to be required for the
  initiator if the acceptor provided them.  The client will send this
  option if the client_aware_gss_bindings profile option is set.

User experience:

* The default setting of dns_canonicalize_realm is now "fallback".
  Hostnames provided from applications will be tried in principal
  names as given (possibly with shortname qualification), falling back
  to the canonicalized name.

* kinit will now issue a warning if the des3-cbc-sha1 encryption type
  is used in the reply.  This encryption type will be deprecated and
  removed in future releases.

* Added kvno flags --out-cache, --no-store, and --cached-only
  (inspired by Heimdal's kgetcred).
2020-12-01 04:26:23 +00:00
Cy Schubert
91821a5aab Update to the latest MIT KRB5 commit on github. 2020-11-24 04:47:28 +00:00
Cy Schubert
cb24eb07f4 Update to the latest MIT KRB5 commit on github. 2020-11-14 05:59:25 +00:00
Cy Schubert
d3857360de Update to the latest MIT KRB5 commit on github. 2020-11-04 04:46:16 +00:00
Cy Schubert
a531ebe795 Update to the latest MIT KRB5 commit on github. 2020-10-26 16:15:15 +00:00
Cy Schubert
5c1ebcdb2f Update to the latest MIT KRB5 commit on github. 2020-10-19 21:08:51 +00:00
Cy Schubert
68f7e54f49 Update to the latest MIT KRB5 commit on github. 2020-10-01 05:27:49 +00:00
Cy Schubert
140b9d0a02 Update to the latest MIT KRB5 commit on github. 2020-09-24 00:55:06 +00:00
Cy Schubert
f1dbaf301e Update to the latest MIT KRB5 commit on github. 2020-08-05 20:26:43 +00:00
Cy Schubert
0e0beda458 Update to the latest MIT KRB5 commit on github. 2020-06-25 21:09:29 +00:00