aboutsummaryrefslogtreecommitdiffstats
path: root/math/eval
ModeNameSize
-rw-r--r--Makefile777logstatsplainblame
-rw-r--r--distinfo115logstatsplainblame
d---------files144logstatsplain
-rw-r--r--pkg-descr365logstatsplainblame
n class='insertions'>+37 * remove 3 ports: security/sguid-(client|sensor|server)marino2014-08-1740-1983/+0 * Add new port security/sguil (version 0.9.0)marino2014-08-1729-0/+1140 * Fix build on -current.adamw2014-08-171-0/+3 * - Abbreviate MASTER_SITESjhale2014-08-171-3/+3 * security/libfprint: Upgrade version 0.4.0 => 0.5.1marino2014-08-165-5/+38 * Upgrade OpenEXR and ilmbase to 2.2.0.mandree2014-08-163-0/+3 * Update to upstream revision 1614tijl2014-08-166-499/+185 * - Convert PYTHON_FEATURES to USE_PYTHON (which was landed several hours ago)sunpoet2014-08-151-1/+1 * - Use USES=pythonsunpoet2014-08-151-3/+2 * security/bro: Add su flags so pkg initialization worksmarino2014-08-152-12/+6 * - Upgrade to 2.0.26 (minor fixes).kuriyama2014-08-152-6/+5 * Remove DEPRECATED. People are working on this port.cs2014-08-151-2/+0 * - remove workaround for amd64dinoex2014-08-152-2/+2 * security/p5-openxpki: update to 0.20.0.1wg2014-08-144-25/+21 * security/openca-tools-forked: Tools to deal with SCEP and PKCS7 messageswg2014-08-145-0/+36 * Update 1.12.1 --> 1.12.2.cy2014-08-143-22/+13 * Revert r359770:antoine2014-08-132-3/+4 * Horde 3 has been EOLed in April 2012mm2014-08-131-0/+3 * Document new vulnerabilities in www/chromium < 36.0.1985.143rene2014-08-131-0/+36 * - unbreakcs2014-08-132-10/+63 * Update to 1.2.4.kwm2014-08-123-25/+11 * security/p5-openxpki-client-html-mason: deprecatewg2014-08-121-0/+3 * security/p5-openxpki-i18n: update to 0.20.0.1wg2014-08-123-16/+8 * security/stoken: Software Token for UNIX compatible with RSA SecurIDwg2014-08-125-0/+62 * Stage security/pks and pass maintainership to submittermarino2014-08-126-44/+202 * - fix package name s/subversion18/subversion/ohauer2014-08-121-1/+1 * - INSERT URL HEREzi2014-08-121-1/+1 * - document serf CVE-2014-3504ohauer2014-08-121-0/+36 * - document subversion CVE-2014-3522, CVE-2014-3528ohauer2014-08-121-0/+44 * Bump PORTREVISION on all ports that depend on net/GeoIP foradamw2014-08-123-1/+3 * Remove expired port:rene2014-08-125-75/+0 * - new options SSL2 SSL3dinoex2014-08-111-2/+16 * - Update The Glorious Glasgow Haskell Compiler to version 7.8.3pgj2014-08-1197-218/+501 * Update to 2.3cs2014-08-1111-129/+74 * Replace some dependencies on libtool with USES=libtool:build or atijl2014-08-111-3/+1 * Fix typo.osa2014-08-101-1/+1 * Document nginx vulnerability.osa2014-08-101-0/+31 * Convert the Python framework bits to USES=python.mva2014-08-091-1/+0 * security/pwman: 0.4.0 -> 0.4.4pi2014-08-093-12/+14 * Update to 2.4antoine2014-08-094-11/+10 * Build shared library and simplify DOCS optiontijl2014-08-093-62/+33 * - Update to 5.03zi2014-08-092-3/+3 * security/zxid: Upgrade version 1.05 => 1.18marino2014-08-088-126/+78 * - Update to 2.0.4.vsevolod2014-08-072-3/+3 * security/p5-Crypt-SMIME: fix dependency to LOCALBASEpi2014-08-071-1/+2 * Update to 1.01i.delphij2014-08-073-12/+13 * Document OpenSSL multiple vulnerabilities.delphij2014-08-071-0/+76 * security/p5-Crypt-SMIME: fix build dependspi2014-08-071-0/+6 * security/p5-GnuPG-Interface: fix BUILD/RUN dependspi2014-08-071-0/+2 * - Update to 2.34sunpoet2014-08-072-3/+3 * security/p5-openxpki-i18n: update to 0.19.0.1wg2014-08-073-6/+6 * security/p5-openxpki: update to 0.19.0.1wg2014-08-074-25/+24 * Update pgpdump to 0.29johans2014-08-062-3/+3 * Remove USE_GNOME=ltverhack because USES=libtool already handles thattijl2014-08-061-1/+1 * Mark the critical warning as an error, and bump PORTREVISION,mandree2014-08-061-1/+3 * Remove reference to my_init and my_fini. These functions were causinghrs2014-08-062-7/+13 * In some straightforward situations, protect examples behind PORTEXAMPLES,adamw2014-08-064-7/+7 * Bump PORTREVISION on more ports that depend on libgcrypt after the updatetijl2014-08-0615-14/+15 * security/p5-Crypt-SMIME: 0.13 -> 0.14pi2014-08-052-8/+3 * security/p5-openxpki-i18n: update to 0.14.0.1wg2014-08-054-27/+30 * Remove deprecated p5-openxpki ports:wg2014-08-0514-302/+0 * Un-hardcode gccadamw2014-08-051-1/+4 * - Switch to USES=libtoolamdmi32014-08-051-1/+2 * - Switch to USES=libtoolamdmi32014-08-051-1/+2 * - Add CPE supportjhale2014-08-041-1/+3 * Update to 3.16.3bapt2014-08-046-50/+10 * Document CVE-2014-4607 in net/krfb.rakuco2014-08-041-0/+32 * - rename patch filesdinoex2014-08-032-0/+0 * security/p5-openxpki-deployment: mark as deprecatedwg2014-08-031-1/+4 * security/p5-openxpki-client-scep: mark as deprecatedwg2014-08-031-0/+4 * security/p5-openxpki-client: mark as deprecatedwg2014-08-031-0/+4 * security/p5-openxpki-client-html-mason: update to 0.14.0.1wg2014-08-035-85/+76 * security/p5-openxpki: update to 0.14.0.1wg2014-08-036-408/+589 * Mark broken.mandree2014-08-031-0/+5 * security/tinyca: 0.7.5 -> 0.7.6, new distsitepi2014-08-035-12/+253 * Make sure that -export-dynamic is passed to the linker.mandree2014-08-032-3/+6 * Enable WITH_DEBUG=yes.mandree2014-08-031-2/+4 * devel/security: re-add .la filepi2014-08-032-3/+3 * - Document net/samba4* vulnerability: CVE-2014-3560zi2014-08-021-0/+33 * - Add LICENSEsunpoet2014-08-021-2/+4 * - Update to 1.5.1jhale2014-08-023-5/+5 * - Document vulnerability in security/gpgme (CVE-2014-3564)jhale2014-08-021-0/+27 * - Use USES=twistedsunpoet2014-08-021-4/+2 * Add CPEcs2014-08-012-2/+4 * security/libgcrypt: avoid non-portable use of assembler instruction on amd64pi2014-08-011-0/+2 * Update to 20140727antoine2014-08-012-4/+6 * Stage and unbreak by adding missing headers and removing the MD2 code.adamw2014-08-019-26/+58 * Document x11/kdelibs4 vulnerabilityrakuco2014-07-311-0/+30 * - Add LICENSEsunpoet2014-07-313-17/+20 * - Add LICENSEsunpoet2014-07-313-10/+13 * tor -- traffic confirmation attackcs2014-07-311-0/+36 * security/p5-Crypt-SMIME: fix lib and build dependspi2014-07-311-0/+5 * Specify the libkrb5 abi version, otherwise, LIB_DEPEDNS finds it from base, andmat2014-07-301-1/+1 * security/cryptopp: Add patch from pkgsrcmarino2014-07-302-1/+30 * security/libgcrypt: 1.5.3_3 -> 1.6.1pi2014-07-3030-203/+207 * Update tor to 0.2.4.23 and tor-devel to 0.2.5.6-alphabf2014-07-304-8/+6 * Convert some more USE_BZIP2 to USES=tar:bzip2adamw2014-07-3019-19/+19 * Remove the final usages of USE_XZ from the tree, and replace them withadamw2014-07-302-2/+2 * Convert a bunch of USE_XZ to USES=tar:xz.adamw2014-07-304-8/+4 * Repair instances, almost all courtesy of bf ;-), of spacesadamw2014-07-302-2/+2 * - Update to 0.9.14cs2014-07-305-18/+17 * Convert a bunch of EXTRACT_SUFX=... into USES=tar:...adamw2014-07-3032-64/+32 * Fix misapplicationadamw2014-07-301-1/+1 * Convert a bunch of USE_BZIP2 to USES=tar:bzip2adamw2014-07-3013-26/+13 * Rename all patches that contain '::' as a path separator, and useadamw2014-07-3025-0/+0 * Rename security/ patches to reflect the files they modify.adamw2014-07-2976-13/+9 * security/gnutls: Support OPTIONal library dependencieskoobs2014-07-292-11/+23 * security/arirang: Mark broken with Ruby 2.0 or newerswills2014-07-291-1/+7 * Release three ports of snb@marino2014-07-291-1/+1 * Report serious i2p vulnerabilitycs2014-07-291-0/+33 * Remove expired ports:rene2014-07-293-30/+0 * I'll take itcs2014-07-281-1/+1 * - Update to 6.00zi2014-07-284-17/+6 * - Update security/libtasn1 to 4.0novel2014-07-289-13/+16 * security/heimdal: Establish consistency for seed data with base heimdalmarino2014-07-282-1/+12 * security/shishi: fix build with libgcrypt 1.6.xpi2014-07-282-0/+35 * New port: security/p5-Crypt-SMIMEpi2014-07-275-0/+36 * Update to 2.1.0.6antoine2014-07-272-3/+3 * security/pam_abl: Drop maintainership per requestmarino2014-07-261-1/+4 * - document bugzilla Cross Site Request Forgery (CVE-2014-1546)ohauer2014-07-251-0/+30 * - Fix plistbdrewery2014-07-252-1/+2 * - document apache22 CVE entriesohauer2014-07-251-0/+55 * Update to 3.2.16bdrewery2014-07-253-3/+14 * Remove expired ports:rene2014-07-2534-736/+0 * net/openldap24-*:tijl2014-07-25