From owner-svn-ports-head@freebsd.org Tue Nov 26 03:21:47 2019 Return-Path: Delivered-To: svn-ports-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0D0201C55E7; Tue, 26 Nov 2019 03:21:47 +0000 (UTC) (envelope-from adamw@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 47MThp6c5Bz4J7Q; Tue, 26 Nov 2019 03:21:46 +0000 (UTC) (envelope-from adamw@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id C70981EEEE; Tue, 26 Nov 2019 03:21:46 +0000 (UTC) (envelope-from adamw@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id xAQ3Lkcj054358; Tue, 26 Nov 2019 03:21:46 GMT (envelope-from adamw@FreeBSD.org) Received: (from adamw@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id xAQ3LklI054357; Tue, 26 Nov 2019 03:21:46 GMT (envelope-from adamw@FreeBSD.org) Message-Id: <201911260321.xAQ3LklI054357@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: adamw set sender to adamw@FreeBSD.org using -f From: Adam Weinberger Date: Tue, 26 Nov 2019 03:21:46 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r518443 - head/security/gnupg X-SVN-Group: ports-head X-SVN-Commit-Author: adamw X-SVN-Commit-Paths: head/security/gnupg X-SVN-Commit-Revision: 518443 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Nov 2019 03:21:47 -0000 Author: adamw Date: Tue Nov 26 03:21:46 2019 New Revision: 518443 URL: https://svnweb.freebsd.org/changeset/ports/518443 Log: gnupg: Update to 2.2.18 * gpg: Changed the way keys are detected on a smartcards; this allows the use of non-OpenPGP cards. In the case of a not very likely regression the new option --use-only-openpgp-card is available. [#4681] * gpg: The commands --full-gen-key and --quick-gen-key now allow direct key generation from supported cards. [#4681] * gpg: Prepare against chosen-prefix SHA-1 collisions in key signatures. This change removes all SHA-1 based key signature newer than 2019-01-19 from the web-of-trust. Note that this includes all key signature created with dsa1024 keys. The new option --allow-weak-key-signatues can be used to override the new and safer behaviour. [#4755,CVE-2019-14855] * gpg: Improve performance for import of large keyblocks. [#4592] * gpg: Implement a keybox compression run. [#4644] * gpg: Show warnings from dirmngr about redirect and certificate problems (details require --verbose as usual). * gpg: Allow to pass the empty string for the passphrase if the '--passphase=' syntax is used. [#4633] * gpg: Fix printing of the KDF object attributes. * gpg: Avoid surprises with --locate-external-key and certain --auto-key-locate settings. [#4662] * gpg: Improve selection of best matching key. [#4713] * gpg: Delete key binding signature when deletring a subkey. [#4665,#4457] * gpg: Fix a potential loss of key sigantures during import with self-sigs-only active. [#4628] * gpg: Silence "marked as ultimately trusted" diagnostics if option --quiet is used. [#4634] * gpg: Silence some diagnostics during in key listsing even with option --verbose. [#4627] * gpg, gpgsm: Change parsing of agent's pkdecrypt results. [#4652] * gpgsm: Support AES-256 keys. * gpgsm: Fix a bug in triggering a keybox compression run if --faked-system-time is used. * dirmngr: System CA certificates are no longer used for the SKS pool if GNUTLS instead of NTBTLS is used as TLS library. [#4594] * dirmngr: On Windows detect usability of IPv4 and IPv6 interfaces to avoid long timeouts. [#4165] * scd: Fix BWI value for APDU level transfers to make Gemalto Ezio Shield and Trustica Cryptoucan work. [#4654,#4566] * wkd: gpg-wks-client --install-key now installs the required policy file. Release-info: https://dev.gnupg.org/T4684 Modified: head/security/gnupg/Makefile head/security/gnupg/distinfo Modified: head/security/gnupg/Makefile ============================================================================== --- head/security/gnupg/Makefile Tue Nov 26 02:48:11 2019 (r518442) +++ head/security/gnupg/Makefile Tue Nov 26 03:21:46 2019 (r518443) @@ -1,8 +1,7 @@ # $FreeBSD$ PORTNAME= gnupg -PORTVERSION= 2.2.17 -PORTREVISION= 4 +PORTVERSION= 2.2.18 CATEGORIES= security MASTER_SITES= GNUPG Modified: head/security/gnupg/distinfo ============================================================================== --- head/security/gnupg/distinfo Tue Nov 26 02:48:11 2019 (r518442) +++ head/security/gnupg/distinfo Tue Nov 26 03:21:46 2019 (r518443) @@ -1,3 +1,3 @@ -TIMESTAMP = 1562687164 -SHA256 (gnupg-2.2.17.tar.bz2) = afa262868e39b651a2db4c071fba90415154243e83a830ca00516f9a807fd514 -SIZE (gnupg-2.2.17.tar.bz2) = 6717554 +TIMESTAMP = 1574737329 +SHA256 (gnupg-2.2.18.tar.bz2) = 30d37ce2ca55b2b9b61480b2a175a3b22066ab41cd3f84688448919b566dec0a +SIZE (gnupg-2.2.18.tar.bz2) = 6740621