head	1.53;
access;
symbols
	RELEASE_8_3_0:1.50
	RELEASE_9_0_0:1.49
	RELEASE_7_4_0:1.44
	RELEASE_8_2_0:1.44
	RELEASE_6_EOL:1.42
	RELEASE_8_1_0:1.41
	RELEASE_7_3_0:1.38
	RELEASE_8_0_0:1.38
	RELEASE_7_2_0:1.38
	RELEASE_7_1_0:1.38
	RELEASE_6_4_0:1.38
	RELEASE_5_EOL:1.38
	RELEASE_7_0_0:1.37
	RELEASE_6_3_0:1.37
	PRE_XORG_7:1.33
	RELEASE_4_EOL:1.32
	RELEASE_6_2_0:1.31
	RELEASE_6_1_0:1.29
	RELEASE_5_5_0:1.29
	RELEASE_6_0_0:1.26
	RELEASE_5_4_0:1.24
	RELEASE_4_11_0:1.24
	RELEASE_5_3_0:1.21
	RELEASE_4_10_0:1.20
	RELEASE_5_2_1:1.18
	RELEASE_5_2_0:1.18
	RELEASE_4_9_0:1.18
	RELEASE_5_1_0:1.16
	RELEASE_4_8_0:1.15
	RELEASE_5_0_0:1.15
	RELEASE_4_7_0:1.14
	RELEASE_4_6_2:1.12
	RELEASE_4_6_1:1.12
	RELEASE_4_6_0:1.12
	RELEASE_5_0_DP1:1.10
	RELEASE_4_5_0:1.8
	RELEASE_4_4_0:1.7
	RELEASE_4_3_0:1.7
	RELEASE_4_2_0:1.6
	RELEASE_4_1_1:1.6
	RELEASE_4_1_0:1.6
	krb5_1_2:1.5
	krb5_1_1_1:1.4
	RELEASE_3_5_0:1.4
	RELEASE_4_0_0:1.4
	RELEASE_3_4_0:1.3
	RELEASE_3_3_0:1.2
	krb5_1_0_6:1.2
	RELEASE_3_2_0:1.1.1.1
	RELEASE_3_1_0:1.1.1.1
	RELEASE_2_2_8:1.1.1.1
	RELEASE_3_0_0:1.1.1.1
	RELEASE_2_2_7:1.1.1.1
	krb5_1_0_5:1.1.1.1
	VIDRINE:1.1.1;
locks; strict;
comment	@# @;


1.53
date	2013.02.22.20.12.54;	author svnexp;	state Exp;
branches;
next	1.52;

1.52
date	2013.01.22.04.45.59;	author svnexp;	state Exp;
branches;
next	1.51;

1.51
date	2012.11.03.18.59.37;	author cy;	state Exp;
branches;
next	1.50;

1.50
date	2011.12.14.04.31.21;	author cy;	state Exp;
branches;
next	1.49;

1.49
date	2011.11.16.20.38.49;	author cy;	state Exp;
branches;
next	1.48;

1.48
date	2011.06.30.04.03.11;	author cy;	state Exp;
branches;
next	1.47;

1.47
date	2011.04.14.00.39.25;	author cy;	state Exp;
branches;
next	1.46;

1.46
date	2011.03.25.00.19.02;	author cy;	state Exp;
branches;
next	1.45;

1.45
date	2011.02.11.01.04.09;	author cy;	state Exp;
branches;
next	1.44;

1.44
date	2010.12.23.01.04.41;	author cy;	state Exp;
branches;
next	1.43;

1.43
date	2010.12.02.02.09.23;	author cy;	state Exp;
branches;
next	1.42;

1.42
date	2010.08.05.22.37.11;	author cy;	state Exp;
branches;
next	1.41;

1.41
date	2010.05.25.05.14.15;	author cy;	state Exp;
branches;
next	1.40;

1.40
date	2010.04.26.03.48.42;	author cy;	state Exp;
branches;
next	1.39;

1.39
date	2010.04.26.03.23.07;	author cy;	state Exp;
branches;
next	1.38;

1.38
date	2008.03.19.19.26.53;	author cy;	state Exp;
branches;
next	1.37;

1.37
date	2007.10.23.03.41.37;	author cy;	state Exp;
branches;
next	1.36;

1.36
date	2007.09.11.23.52.19;	author cy;	state Exp;
branches;
next	1.35;

1.35
date	2007.07.11.16.51.31;	author cy;	state Exp;
branches;
next	1.34;

1.34
date	2007.06.26.23.01.44;	author cy;	state Exp;
branches;
next	1.33;

1.33
date	2007.04.23.22.10.09;	author cy;	state Exp;
branches;
next	1.32;

1.32
date	2007.01.10.05.06.45;	author cy;	state Exp;
branches;
next	1.31;

1.31
date	2006.09.17.00.48.42;	author cy;	state Exp;
branches;
next	1.30;

1.30
date	2006.07.14.18.37.11;	author cy;	state Exp;
branches;
next	1.29;

1.29
date	2006.01.24.01.03.06;	author edwin;	state Exp;
branches;
next	1.28;

1.28
date	2005.11.18.00.38.05;	author cy;	state Exp;
branches;
next	1.27;

1.27
date	2005.10.04.22.09.08;	author cy;	state Exp;
branches;
next	1.26;

1.26
date	2005.04.23.01.49.07;	author cy;	state Exp;
branches;
next	1.25;

1.25
date	2005.04.13.03.05.17;	author cy;	state Exp;
branches;
next	1.24;

1.24
date	2004.12.21.01.38.02;	author cy;	state Exp;
branches;
next	1.23;

1.23
date	2004.12.21.00.24.18;	author cy;	state Exp;
branches;
next	1.22;

1.22
date	2004.10.20.20.20.06;	author cy;	state Exp;
branches;
next	1.21;

1.21
date	2004.06.11.23.08.57;	author cy;	state Exp;
branches;
next	1.20;

1.20
date	2004.04.07.00.28.04;	author cy;	state Exp;
branches;
next	1.19;

1.19
date	2004.02.28.21.25.21;	author cy;	state Exp;
branches;
next	1.18;

1.18
date	2003.08.08.23.35.18;	author cy;	state Exp;
branches;
next	1.17;

1.17
date	2003.08.08.01.20.18;	author cy;	state Exp;
branches;
next	1.16;

1.16
date	2003.05.07.03.47.49;	author cy;	state Exp;
branches;
next	1.15;

1.15
date	2002.11.16.00.02.13;	author cy;	state Exp;
branches;
next	1.14;

1.14
date	2002.09.25.17.50.00;	author cy;	state Exp;
branches;
next	1.13;

1.13
date	2002.09.13.13.46.47;	author cy;	state Exp;
branches;
next	1.12;

1.12
date	2002.05.03.02.20.17;	author cy;	state Exp;
branches;
next	1.11;

1.11
date	2002.05.02.14.30.24;	author cy;	state Exp;
branches;
next	1.10;

1.10
date	2002.03.18.22.52.43;	author cy;	state Exp;
branches;
next	1.9;

1.9
date	2002.03.01.13.23.47;	author cy;	state Exp;
branches;
next	1.8;

1.8
date	2002.01.16.03.17.24;	author cy;	state Exp;
branches;
next	1.7;

1.7
date	2001.03.02.17.33.55;	author nectar;	state Exp;
branches;
next	1.6;

1.6
date	2000.06.30.17.41.25;	author nectar;	state Exp;
branches;
next	1.5;

1.5
date	2000.06.24.01.48.10;	author nectar;	state Exp;
branches;
next	1.4;

1.4
date	2000.01.16.19.10.54;	author nectar;	state Exp;
branches;
next	1.3;

1.3
date	99.10.04.14.32.22;	author nectar;	state Exp;
branches;
next	1.2;

1.2
date	99.05.27.02.08.16;	author nectar;	state Exp;
branches;
next	1.1;

1.1
date	98.07.06.02.28.39;	author nectar;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	98.07.06.02.28.39;	author nectar;	state Exp;
branches;
next	;


desc
@@


1.53
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/312788
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@SHA256 (krb5-1.11.1-signed.tar) = 3a230ff6a7f8775752292e9303d3fa8a801a353301bc24d80b860d99f9d20768
SIZE (krb5-1.11.1-signed.tar) = 11663360
@


1.52
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/310802
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@d1 2
a2 2
SHA256 (krb5-1.11-signed.tar) = fe37fb93b398db98a1b23f814673ea2ae4b90138f85e1a4027ef639456a78651
SIZE (krb5-1.11-signed.tar) = 11653120
@


1.51
log
@SVN rev 306935 on 2012-11-03 18:59:37Z by cy

Update krb5 1.9.2 --> 1.10.3

Feature safe:	yes
@
text
@d1 2
a2 2
SHA256 (krb5-1.10.3-signed.tar) = fc48f9f985bf04aa91c239dae0daaa0509c85b61b2d172d9d65ab0c52bcea3cf
SIZE (krb5-1.10.3-signed.tar) = 11530240
@


1.50
log
@Apply patch for MITKRB5-SA-2011-007, KDC null pointer dereference in TGS
handling.

PR:		163272
Submitted by:	zi
Security:	6c7d9a35-2608-11e1-89b4-001ec9578670
Feature safe:	yes
@
text
@d1 2
a2 4
SHA256 (krb5-1.9.2-signed.tar) = 96b213345b02862b5fef61ef1dd26f643f07e4207496c35179cea35ddb7ae68c
SIZE (krb5-1.9.2-signed.tar) = 12185600
SHA256 (2011-007-patch.txt) = 0b0413e175e81b5fb7497f3351341066644431d72663bb1cba9d59b715669486
SIZE (2011-007-patch.txt) = 1417
@


1.49
log
@Update 1.9.1 --> 1.9.2. This is a bugfix release.

Feature safe:	yes
@
text
@d3 2
@


1.48
log
@Update 1.9 --> 1.9.1.

PR:		158520
Submitted by:	Ryan Steinmetz <rpsfa@@rit.edu>
@
text
@d1 2
a2 2
SHA256 (krb5-1.9.1-signed.tar) = 525e258aa7401427a5a9edee0051f83b6151bf96a979ca526393932c90484c8e
SIZE (krb5-1.9.1-signed.tar) = 11888640
@


1.47
log
@Apply patch for MITKRB5-SA-2011-004, kadmind invalid pointer free()
[CVE-2011-0285]

Security:	MITKRB5-SA-2011-004, CVE-2011-0285
Feature safe:	yes
@
text
@d1 2
a2 10
SHA256 (krb5-1.9-signed.tar) = c30e012226f04943411dbb28d303d1a488955af74eb7d1ab50d6f4f21a6e1d06
SIZE (krb5-1.9-signed.tar) = 11888640
SHA256 (2011-001-patch.txt) = 25f50e9406a36525b5f727041c9d584ef3f188fa5d3a39b4e63d1a853219a9e2
SIZE (2011-001-patch.txt) = 632
SHA256 (2011-002-patch.txt) = 1b3ccea9022527c36e153c5d89ecfd9609a111e235b1d0430e1fcc6933e76e48
SIZE (2011-002-patch.txt) = 6663
SHA256 (2011-003-patch.txt) = bf93bbaf5d502f5b5bdcfa612e36c3828d3be869b154545bad1c7109f4eedae4
SIZE (2011-003-patch.txt) = 544
SHA256 (2011-004-patch.txt) = 6a972da0e87dce82e801590a7bdcca300a5b31ed569f834e0a6634a185a9aac0
SIZE (2011-004-patch.txt) = 1154
@


1.46
log
@Apply patch for MITKRB5-SA-2011-003, KDC vulnerable to double-free when
PKINIT enabled.

Obtained from:	http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-003.txt
Security:	MITKRB5-SA-2011-003, CVE-2011-0284
Feature safe:	yes
@
text
@d9 2
@


1.45
log
@Apply fixes for kpropd denial of service (MITKRB5-SA-2011-001) and KDC
denial of service (MITKRB5-SA-2011-002).

Security:	MITKRB5-SA-2011-001 (CVE-2010-4022),
		MITKRB5-SA-2011-002 (CVE-2011-0281)
@
text
@d7 2
@


1.44
log
@Update from 1.8.3_2 to 1.9.
@
text
@d3 4
a6 4
SHA256 (2010-006-patch.txt) = 7d9fbfffdaa0cde0ca499ccbb2cf09a6c7253e537755bbf6da9e08715fd9a474
SIZE (2010-006-patch.txt) = 1066
SHA256 (2010-007-patch.txt) = ec08fca9738b5fae619154379ae0158531cb630b6f25551c14d87313c2d2a5f0
SIZE (2010-007-patch.txt) = 7908
@


1.43
log
@Fix security vulnerabilities CVE-2010-1324, CVE-2010-1323, CVE-2010-4020,
CVE-2010-4021, and CVE-2010-1322.

PR:		152755
Submitted by:	wollman
Security:	CVE-2010-1324, CVE-2010-1323, CVE-2010-4020, CVE-2010-4021,
		and CVE-2010-1322.
Feature safe:	Yes
@
text
@d1 2
a2 2
SHA256 (krb5-1.8.3-signed.tar) = 2c5988ddd8b409134cd0e77e9ce8f762605ce8d8fb0aa22f6500f53381567019
SIZE (krb5-1.8.3-signed.tar) = 11642880
@


1.42
log
@Update to 1.8.3.

PR:		149299
Submitted by:	gwollman
@
text
@a0 1
MD5 (krb5-1.8.3-signed.tar) = 7c5f38e31ee744cb538eed2301096b93
d3 4
@


1.41
log
@Apply patch for MIT KRB5 security vulnerability MITKRB5-SA-2010-005.

PR:		146939
Submitted by:	wollman
Security:	MIT krb5 Security Advisory 2010-005
@
text
@d1 3
a3 6
MD5 (krb5-1.8.1-signed.tar) = e29a78b108c4687f7e7937110d1d0415
SHA256 (krb5-1.8.1-signed.tar) = 470c486ec5580d12f2a72cde059e3bdfa567cf96215b724fec5a3b6cfa7eebb9
SIZE (krb5-1.8.1-signed.tar) = 11632640
MD5 (2010-005-patch.txt) = 4fc65f831afbd9fe6bb428774251e2b2
SHA256 (2010-005-patch.txt) = 02d778775bf3f7576f5cf7a9a1a3d14ccf1654b71c77a6a4e00a7bd5b775b221
SIZE (2010-005-patch.txt) = 670
@


1.40
log
@Welcome the new krb5-1.8.1. Significant changes include the removal of
the MIT KRB5 applications (now in a separate tarball and port).
@
text
@d4 3
@


1.39
log
@MFkrb5-17.
@
text
@d1 3
a3 3
MD5 (krb5-1.7-signed.tar) = 9f7b3402b4731a7fa543db193bf1b564
SHA256 (krb5-1.7-signed.tar) = a370cae8386e8b82b309c44a220542af78cbcbb42028fb3c2224eae6dba1ffd5
SIZE (krb5-1.7-signed.tar) = 12226560
@


1.38
log
@Fixes for multiple vulnerabilities.

Security:	US-CERT Technical Cyber Security Alert TA08-079B --
			MIT Kerberos Updates for Multiple Vulnerabilities
		US-CERT Vulnerability Note VU#895609,
		US-CERT Vulnerability Note VU#374121
		MIT krb5 Security Advisory 2008-001
		MIT krb5 Security Advisory 2008-002
@
text
@d1 3
a3 6
MD5 (krb5-1.6.3-signed.tar) = 2dc1307686eb1c2bf1ab08ea805dad46
SHA256 (krb5-1.6.3-signed.tar) = 7a1bd7d4bd326828c8ee382ed2b69ccd6c58762601df897d6a32169d84583d2a
SIZE (krb5-1.6.3-signed.tar) = 11909120
MD5 (2008-001-patch.txt) = 3bbb7a6a7738c086f5d5dfcf09da9cbb
SHA256 (2008-001-patch.txt) = 4d02be765ff12d21ddf1cfa170e5ff4067e9c364a401d7e06ece329566139736
SIZE (2008-001-patch.txt) = 10854
@


1.37
log
@Update 1.6.2 --> 1.6.3

Security:	fix CVE-2007-3999, CVE-2007-4743 svc_auth_gss.c buffer overflow
		fix CVE-2007-4000 modify_policy vulnerability

Also:		add PKINIT support
@
text
@d4 3
@


1.36
log
@Patch for MIT krb5 Security Advisory 2007-006 - kadmind RPC lib buffer
overflow, uninitialized pointer
Security:	MIT krb5 Security Advisory 2007-006
@
text
@d1 3
a3 6
MD5 (krb5-1.6.2-signed.tar) = 45dedeb7180347a8b0d824f2874b2693
SHA256 (krb5-1.6.2-signed.tar) = 6301b297fcf2f2218ccc5a315e1d8068c9d8ab0b22fd1f3726a0120bc3df6f1c
SIZE (krb5-1.6.2-signed.tar) = 14643200
MD5 (2007-006-patch.txt) = 077ce2f2d01c6e792a1c790a95373cfb
SHA256 (2007-006-patch.txt) = fa32c9f8a82d44ef8fc2a0a6b8294e70ce29c1a75fc2c3d2c0fa7e0e5556e9fc
SIZE (2007-006-patch.txt) = 1552
@


1.35
log
@Update 1.6.1 --> 1.6.2
@
text
@d4 3
@


1.34
log
@Patches for:

MITKRB5-SA-2007-004: kadmind affected by multiple RPC library vulnerabilities
MITKRB5-SA-2007-005: kadmind vulnerable to buffer overflow

Security:	US CERT Technical Cyber Security Alert TA07-177A --
		MIT Kerberos Vulnerabilities
@
text
@d1 3
a3 9
MD5 (krb5-1.6.1-signed.tar) = 6052c437226ea0a04a37f656f1a079b9
SHA256 (krb5-1.6.1-signed.tar) = 30a20d1b0a302486011ffba31d53bd6135e1e18b53811670e3f33b8f7ef83259
SIZE (krb5-1.6.1-signed.tar) = 14643200
MD5 (2007-004-patch.txt) = 56757c4f70c80becab823c2a5c6ff3bd
SHA256 (2007-004-patch.txt) = 7d3f41ececed08e460d4553d6b4ecf48788a213a2ccb480553482b52e85c21ff
SIZE (2007-004-patch.txt) = 2690
MD5 (2007-005-patch.txt) = 66aac0732f0ceb6bd4a03a3e74abdf4c
SHA256 (2007-005-patch.txt) = 2220126e34f635ac19fd6edadd3bea2829d983618c58af5131bc4fbf9d4d65bb
SIZE (2007-005-patch.txt) = 3269
@


1.33
log
@Update from 1.6 to 1.6.1.
@
text
@d4 6
@


1.32
log
@Update 1.5.1 --> 1.6

Security:	MITKRB5-SA-2006-002,  MITKRB5-SA-2006-003, and
		US-CERT Technical Cyber Security Alert TA07-009B
@
text
@d1 3
a3 3
MD5 (krb5-1.6-signed.tar) = a365e39ff7d39639556c2797a0e1c3f4
SHA256 (krb5-1.6-signed.tar) = fe3dbb53f22cde38b6bc27ed14e706d2cf4e686a0078d8ae2610283906e26ebb
SIZE (krb5-1.6-signed.tar) = 12062720
@


1.31
log
@Update krb5-1.5 --> krb5-1.5.1

Submitted by:	Paul Vixie <paul@@vix.com>
@
text
@d1 3
a3 3
MD5 (krb5-1.5.1-signed.tar) = c8618ca9d87f794b8d71d447a202e12d
SHA256 (krb5-1.5.1-signed.tar) = af3011fee19c696fac4e7a7d85365b4351d98cbee57a9d45f6c229c72aca8fb5
SIZE (krb5-1.5.1-signed.tar) = 10065920
@


1.30
log
@Update 1.4.3 --> 1.5
@
text
@d1 3
a3 3
MD5 (krb5-1.5-signed.tar) = 5be6ec9d69cc73339e5bfda421eea5bc
SHA256 (krb5-1.5-signed.tar) = ac8e85284d9997807406938bc9f785c7997fd6eb5e6a2a5807b3d6cba62137b1
SIZE (krb5-1.5-signed.tar) = 9984000
@


1.29
log
@SHA256ify

Approved by: krion@@
@
text
@d1 3
a3 3
MD5 (krb5-1.4.3-signed.tar) = 6c805139a4108fbb82fa4adba557a448
SHA256 (krb5-1.4.3-signed.tar) = 86f246877cc912ae6a82b6bb16217e54ec31fe46ae33a39a42b3f062bb5e6cbe
SIZE (krb5-1.4.3-signed.tar) = 7290880
@


1.28
log
@Update 1.4.2 --> 1.4.3
@
text
@d2 1
@


1.27
log
@Update 1.4.1 --> 1.4.2
@
text
@d1 2
a2 2
MD5 (krb5-1.4.2-signed.tar) = d2c2e15b44fee2756b564dd1022fb1c3
SIZE (krb5-1.4.2-signed.tar) = 6696960
@


1.26
log
@Update 1.4 --> 1.4.1.

Package list fixup when KRB5_KRB4_COMPAT is not specified.
@
text
@d1 2
a2 2
MD5 (krb5-1.4.1-signed.tar) = 617e0071fa5b74ab4116f064678af551
SIZE (krb5-1.4.1-signed.tar) = 6666240
@


1.25
log
@Update 1.3.6 --> 1.4
@
text
@d1 2
a2 2
MD5 (krb5-1.4-signed.tar) = 2fa56607677544e3a27b42f7cfa1155b
SIZE (krb5-1.4-signed.tar) = 6625280
@


1.24
log
@Update 1.3.5 --> 1.3.6
@
text
@d1 2
a2 2
MD5 (krb5-1.3.6-signed.tar) = 18d5a6a8e1cce120536718d39a052a87
SIZE (krb5-1.3.6-signed.tar) = 6533120
@


1.23
log
@Crypto-publish.org no longer maintains a current release of MIT-KRB5.
Remove code to alternatively fetch from that site.
@
text
@d1 2
a2 2
MD5 (krb5-1.3.5.tar) = 8da4179bfd929eebc9f005fb427db1a0
SIZE (krb5-1.3.5.tar) = 6522880
@


1.22
log
@Update 1.3.4 --> 1.3.5
@
text
@a2 2
MD5 (krb5-1.3.1.tar.gz) = 73f868cf65bec56d7c718834ca5665fd
SIZE (krb5-1.3.1.tar.gz) = 6157946
@


1.21
log
@Update KRB5 1.3.3 --> 1.3.4
@
text
@d1 2
a2 2
MD5 (krb5-1.3.4.tar) = 33fdee0c5e78f67a18a781dee31e3e19
SIZE (krb5-1.3.4.tar) = 6369280
@


1.20
log
@Update 1.3.2 --> 1.3.3
@
text
@d1 2
a2 2
MD5 (krb5-1.3.3.tar) = 9c872750fce0f4ff64e0325e278ce882
SIZE (krb5-1.3.3.tar) = 6359040
@


1.19
log
@- Update MIT KRB5 1.3.1 --> 1.3.2. (As crypto-publish.org does not have
  1.3.2 yet, when USE_KRB5_TARBALL=CRYPTO-PUBLISH is specified, 1.3.1
  will be installed.)

- Add SIZE to distinfo
@
text
@d1 2
a2 2
MD5 (krb5-1.3.2.tar) = e8c3de8ede73b1a117e6519aa17e4412
SIZE (krb5-1.3.2.tar) = 6328320
@


1.18
log
@Update 1.3 --> 1.3.1
@
text
@d1 2
a2 1
MD5 (krb5-1.3.1.tar) = 514ef9f6a2d390625e8aae7c972e4831
d4 1
@


1.17
log
@Update 1.2.8 --> 1.3
@
text
@d1 2
a2 2
MD5 (krb5-1.3.tar) = efe46a338f74e02796f07d53815273c6
MD5 (krb5-1.3.tar.gz) = e435813481fc9b4e7f73ebda1537cbd2
@


1.16
log
@Update 1.2.7 --> 1.2.8.
@
text
@d1 2
a2 2
MD5 (krb5-1.2.8.tar) = cbb87396f8a166b6e5dd8b2b0cb3fe29
MD5 (krb5-1.2.8.tar.gz) = 99b840431ad2926de66d143cdd9307eb
@


1.15
log
@Update 1.2.6 --> 1.2.7

Note:	Since crypto-publish.org does not yet have krb5-1.2.7 up on their
	website, fetch from their site has been temporarily disabled.
@
text
@d1 2
a2 1
MD5 (krb5-1.2.7.tar) = c09755f5fb9bc30d93050bd89ef0562b
@


1.14
log
@Crypto-publish.org has finally put krb5-1.2.6 up on their site. The
patch reimplements code to fetch MIT Kerberos from their site when
USA_RESIDENT=NO.

Approved by:	kris
@
text
@d1 1
a1 2
MD5 (krb5-1.2.6.tar) = 88a94d357c63e0c6b902f3e7cffe397c
MD5 (krb5-1.2.6.tar.gz) = 9723ca51368f8fbfcc52927d50dda7ac
@


1.13
log
@Update 1.2.5 --> 1.2.6

Note:	Since crypto-publish.org does not yet have krb5-1.2.6 up on their
	website, fetch from their site has been temporarily disabled.
@
text
@d2 1
@


1.12
log
@Now that www.crypto-publish.org has put the latest version of MIT KRB5
up on their website again, reimplementation of the Makefile patch that
fetched the the tarball from their site for users outside of the US
(originally in Makefile rev 1.29).  USA_RESIDENT=YES still supports
manual fetching from web.mit.edu.
@
text
@d1 1
a1 2
MD5 (krb5-1.2.5.tar) = c91d4fbbe616a28b1652be5eb0a9e5ae
MD5 (krb5-1.2.5.tar.gz) = 980c7935b27281e65367c538366776ab
@


1.11
log
@Upgrade 1.2.4 --> 1.2.5
@
text
@d2 1
@


1.10
log
@MIT currently distributes their KRB5 distribution in a tarball (.tar)
that contains the distribution itself, in a tar.gz file, and a signature
certificate, contained in a detached .tar.gz.asc file.  Prior to this
patch, users installing MIT KRB5 had to extract the tarball into
/usr/ports/distfiles, then proceed with the installation.  This caused
confusion among those installing the port.  This patch addresses the
problem by extracting the .tar.gz file from the tarball, then unpacking
the .tar.gz file before continuing with the build.
@
text
@d1 1
a1 1
MD5 (krb5-1.2.4.tar) = 2ac3d6245c7690f0f377c8710091d651
@


1.9
log
@Update 1.2.3 --> 1.2.4
@
text
@d1 1
a1 1
MD5 (krb5-1.2.4.tar.gz) = 663add9b5942be74a86fa860a3fa4167
@


1.8
log
@Update 1.2.2 -> 1.2.3
@
text
@d1 1
a1 1
MD5 (krb5-1.2.3.tar.gz) = 1e93aed5e6ae13eb4b5b5278b1a6ab46
@


1.7
log
@Update 1.2.1 -> 1.2.2
@
text
@d1 1
a1 1
MD5 (krb5-1.2.2.tar.gz) = 57d1bf3a3c68ee8af64e31a46799551c
@


1.6
log
@Update 1.2 -> 1.2.1.  From the announcement:

  The MIT Kerberos Team announces the availibility of MIT Kerberos 5
  Release 1.2.1.  This is primarily a bugfix release.  Changes include:

  * A bug in the gssapi library that prevented kadmin clients from
    working has been fixed.  For some reason this was not caught during
    beta testing.

  * login.c now correctly sets the default ccache name.

  * A memory leak in conv_princ.c has been fixed.
@
text
@d1 1
a1 1
MD5 (krb5-1.2.1.tar) = a20d10cd42e0fdd0a3c825e0a1e2e08a
@


1.5
log
@Update 1.1.1 -> 1.2
@
text
@d1 1
a1 1
MD5 (krb5-1.2.tar) = 5da59d934f14a7bdbde07446d78d7878
@


1.4
log
@Update 1.1 -> 1.1.1
@
text
@d1 1
a1 1
MD5 (krb5-1.1.1.tar) = 33ab7d6e99fc09787f0ecce21df46086
@


1.3
log
@Update 1.0.6 -> 1.1
@
text
@d1 1
a1 1
MD5 (krb5-1.1.tar) = 7a2c9796f40cd5d0c71e4caa75d2aa7b
@


1.2
log
@Update 1.0.5 -> 1.0.6
@
text
@d1 1
a1 3
MD5 (krb5/krb5-1.0.6.src.tar.gz) = fb7de72ffba768ffe977a4b2022f7900
MD5 (krb5/krb5-1.0.6.doc.tar.gz) = ff7777d2319e68f0d86975dcac66ac43
MD5 (krb5/krb5-1.0.6.crypto.tar.gz) = a77c493a986ecddbd76d5bd1559bf468
@


1.1
log
@Initial revision
@
text
@d1 3
a3 3
MD5 (krb5/krb5-1.0.5.src.tar.gz) = 97b523ba3c3f0b6a703691daadb2d85c
MD5 (krb5/krb5-1.0.5.doc.tar.gz) = 6eadfe9cff088bc5cc704b720c3883f6
MD5 (krb5/krb5-1.0.5.crypto.tar.gz) = 2303ee0ebd08fad1945365f4cbb310d6
@


1.1.1.1
log
@New port, KerberosV 1.0.5.
PR:		ports/6870
Submitted by:	Jacques Vidrine <n@@nectar.com>
@
text
@@
