On Sun, Sep 06 2020, Jeremie Courreges-Anglas <j...@openbsd.org> wrote:
> On Sun, Sep 06 2020, Edd Barrett <e...@theunixzoo.co.uk> wrote:
>> Hi,
>>
>> On Sun, Sep 06, 2020 at 01:34:42PM +0100, Stuart Henderson wrote:
>>> > We will also need to add a quirk...
>>> 
>>> Not needed, the stem is the same so they are both considered as long as
>>> a matching pkgpath is declared.
>>
>> Great. That simplifies things a bit.
>>
>>> I think we should just replace security/gnupg with 2.x though.
>>
>> What's the reasoning behind your preference Stuart? I don't have a
>> strong opinion, but it does seem (at least at first glance) simpler to
>> use security/gnupg2 as jca@ suggested.
>
> The cost of this approach is likely just:
> 1. more Makefile tweaks (there are more consumers of
>   security/gnupg2 right now)
> 2. missing history when using cvs log in security/gnupg
>
> I think that we can live with 2. and that in the long run security/gnupg
> is just cleaner.  I dislike cases where the package name and the port
> name don't match.

Looks like Edd and I have been busy. :)

If we want this for the next release, here's a diff that moves
security/gnupg2 to security/gnupg and adapts consumers.  The changes for
the consumers are rather mechanical. Some ports that don't directly
depend on security/gnupg2 had patches to force the use of gpg2,
I cleaned them up while here even if the proposal still installs a gpg2
symlink.

I don't know how many current consumers of security/gnupg would be
broken at build time or runtime after the switch to gnupg-2.x.
Build issues can easily be found by a bulk build.  Regarding runtime
issues we've had a few positive reports but I don't expect coverage for
all security/consumers.

Feedback / oks welcome.

If people agree that we can do this now, Antoine, could you please test
this diff in a bulk build?


Index: security/Makefile
===================================================================
RCS file: /cvs/ports/security/Makefile,v
retrieving revision 1.592
diff -u -p -r1.592 Makefile
--- security/Makefile   14 Sep 2020 22:47:10 -0000      1.592
+++ security/Makefile   18 Sep 2020 23:11:05 -0000
@@ -64,8 +64,6 @@
      SUBDIR += fwknop
      SUBDIR += ghidra
      SUBDIR += gnupg
-     SUBDIR += gnupg,card,ldap
-     SUBDIR += gnupg2
      SUBDIR += gnutls
      SUBDIR += go-crypto
      SUBDIR += go-siphash
Index: mail/enigmail/Makefile
===================================================================
RCS file: /cvs/ports/mail/enigmail/Makefile,v
retrieving revision 1.48
diff -u -p -r1.48 Makefile
--- mail/enigmail/Makefile      16 Sep 2019 06:54:43 -0000      1.48
+++ mail/enigmail/Makefile      18 Sep 2020 23:11:05 -0000
@@ -6,6 +6,7 @@ COMMENT-main =          GnuPG extension for Thun
 COMMENT-seamonkey =    GnuPG extension for Seamonkey
 
 V =            2.1.2
+REVISION =     0
 DISTNAME =     enigmail-${V}
 PKGNAME-main = ${PKGNAME}
 PKGNAME-seamonkey =    enigmail-seamonkey-${V}
@@ -25,7 +26,7 @@ USE_GMAKE =   Yes
 CONFIGURE_STYLE =      gnu
 
 BUILD_DEPENDS =        archivers/zip archivers/unzip
-RUN_DEPENDS =  security/gnupg2
+RUN_DEPENDS =  security/gnupg>=2.2.23p1
 WRKDIST =      ${WRKDIR}/enigmail
 
 # needed for the naming of the libsubprocess.so
Index: mail/mutt/Makefile
===================================================================
RCS file: /cvs/ports/mail/mutt/Makefile,v
retrieving revision 1.140
diff -u -p -r1.140 Makefile
--- mail/mutt/Makefile  31 Aug 2020 16:52:03 -0000      1.140
+++ mail/mutt/Makefile  18 Sep 2020 23:11:05 -0000
@@ -4,6 +4,7 @@ COMMENT=        tty-based e-mail client
 
 DISTNAME=      mutt-1.14.7
 EPOCH=         3
+REVISION=      0
 
 CATEGORIES=    mail
 HOMEPAGE=      http://www.mutt.org/
@@ -97,7 +98,5 @@ post-install:
        mv -f ${PREFIX}/share/doc/mutt/samples/* ${PREFIX}/share/examples/mutt
        cd ${PREFIX}/share/examples/mutt; \
            chmod +x *.sh *.pl mutt_xtitle markdown2html
-       sed -i -e 's,gpg ,${LOCALBASE}/bin/gpg2 ,' \
-           ${PREFIX}/share/examples/mutt/gpg.rc
 
 .include <bsd.port.mk>
Index: mail/neomutt/Makefile
===================================================================
RCS file: /cvs/ports/mail/neomutt/Makefile,v
retrieving revision 1.58
diff -u -p -r1.58 Makefile
--- mail/neomutt/Makefile       10 Sep 2020 08:38:48 -0000      1.58
+++ mail/neomutt/Makefile       18 Sep 2020 23:11:05 -0000
@@ -5,6 +5,7 @@ COMMENT=        tty-based e-mail client, Mutt w
 GH_ACCOUNT=    neomutt
 GH_PROJECT=    neomutt
 GH_TAGNAME=    20200821
+REVISION=      0
 
 CATEGORIES=    mail
 HOMEPAGE=      https://neomutt.org/
Index: mail/neomutt/patches/patch-contrib_gpg_rc
===================================================================
RCS file: mail/neomutt/patches/patch-contrib_gpg_rc
diff -N mail/neomutt/patches/patch-contrib_gpg_rc
--- mail/neomutt/patches/patch-contrib_gpg_rc   26 Oct 2019 19:37:09 -0000      
1.2
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,79 +0,0 @@
-$OpenBSD: patch-contrib_gpg_rc,v 1.2 2019/10/26 19:37:09 sthen Exp $
-
-Index: contrib/gpg.rc
---- contrib/gpg.rc.orig
-+++ contrib/gpg.rc
-@@ -59,61 +59,61 @@
- 
- # decode application/pgp
- #
--set pgp_decode_command="gpg --status-fd=2 %?p?--pinentry-mode loopback 
--passphrase-fd 0? --no-verbose --quiet --batch --output - %f"
-+set pgp_decode_command="gpg2 --status-fd=2 %?p?--pinentry-mode loopback 
--passphrase-fd 0? --no-verbose --quiet --batch --output - %f"
- 
- # Verify a signature
- #
--set pgp_verify_command="gpg --status-fd=2 --no-verbose --quiet --batch 
--output - --verify %s %f"
-+set pgp_verify_command="gpg2 --status-fd=2 --no-verbose --quiet --batch 
--output - --verify %s %f"
- 
- # Decrypt an attachment
- #
--set pgp_decrypt_command="gpg --status-fd=2 %?p?--pinentry-mode loopback 
--passphrase-fd 0? --no-verbose --quiet --batch --output - --decrypt %f"
-+set pgp_decrypt_command="gpg2 --status-fd=2 %?p?--pinentry-mode loopback 
--passphrase-fd 0? --no-verbose --quiet --batch --output - --decrypt %f"
- 
- # Create a PGP/MIME signed attachment
- #
- # set pgp_sign_command="gpg-2comp --comment '' --no-verbose --batch --output 
- %?p?--passphrase-fd 0? --armor --detach-sign --textmode %?a?-u %a? %f"
- #
--set pgp_sign_command="gpg %?p?--pinentry-mode loopback --passphrase-fd 0? 
--no-verbose --batch --quiet --output - --armor --textmode %?a?--local-user %a? 
--detach-sign %f"
-+set pgp_sign_command="gpg2 %?p?--pinentry-mode loopback --passphrase-fd 0? 
--no-verbose --batch --quiet --output - --armor --textmode %?a?--local-user %a? 
--detach-sign %f"
- 
- # Create a application/pgp inline signed message.  This style is obsolete but 
still needed for Hushmail recipients and some MUAs.
- #
- # set pgp_clearsign_command="gpg-2comp --comment '' --no-verbose --batch 
--output - %?p?--passphrase-fd 0? --armor --textmode --clearsign %?a?-u %a? %f"
- #
--set pgp_clearsign_command="gpg %?p?--pinentry-mode loopback --passphrase-fd 
0? --no-verbose --batch --quiet --output - --armor --textmode %?a?--local-user 
%a? --clearsign %f"
-+set pgp_clearsign_command="gpg2 %?p?--pinentry-mode loopback --passphrase-fd 
0? --no-verbose --batch --quiet --output - --armor --textmode %?a?--local-user 
%a? --clearsign %f"
- 
- # Create an encrypted attachment (note that some users include the 
--always-trust option here)
- #
- # set pgp_encrypt_only_command="/usr/libexec/neomutt/pgpewrap gpg-2comp -v 
--batch --output - --encrypt --textmode --armor --always-trust -- -r %r -- %f"
- #
--set pgp_encrypt_only_command="/usr/libexec/neomutt/pgpewrap gpg --batch 
--quiet --no-verbose --output - --textmode --armor --encrypt -- --recipient %r 
-- %f"
-+set pgp_encrypt_only_command="/usr/libexec/neomutt/pgpewrap gpg2 --batch 
--quiet --no-verbose --output - --textmode --armor --encrypt -- --recipient %r 
-- %f"
- 
- # Create an encrypted and signed attachment (note that some users include the 
--always-trust option here)
- #
- # set pgp_encrypt_sign_command="/usr/libexec/neomutt/pgpewrap gpg-2comp 
%?p?--passphrase-fd 0? -v --batch --output - --encrypt --sign %?a?-u %a? 
--armor --always-trust -- -r %r -- %f"
- #
--set pgp_encrypt_sign_command="/usr/libexec/neomutt/pgpewrap gpg 
%?p?--pinentry-mode loopback --passphrase-fd 0? --batch --quiet --no-verbose 
--textmode --output - %?a?--local-user %a? --armor --sign --encrypt -- 
--recipient %r -- %f"
-+set pgp_encrypt_sign_command="/usr/libexec/neomutt/pgpewrap gpg2 
%?p?--pinentry-mode loopback --passphrase-fd 0? --batch --quiet --no-verbose 
--textmode --output - %?a?--local-user %a? --armor --sign --encrypt -- 
--recipient %r -- %f"
- 
- # Import a key into the public key ring
- #
--set pgp_import_command="gpg --no-verbose --import %f"
-+set pgp_import_command="gpg2 --no-verbose --import %f"
- 
- # Export a key from the public key ring
- #
--set pgp_export_command="gpg --no-verbose --armor --export %r"
-+set pgp_export_command="gpg2 --no-verbose --armor --export %r"
- 
- # Verify a key
- #
--set pgp_verify_key_command="gpg --verbose --batch --fingerprint --check-sigs 
%r"
-+set pgp_verify_key_command="gpg2 --verbose --batch --fingerprint --check-sigs 
%r"
- 
- # Read in the public key ring
- # note: the second --with-fingerprint adds fingerprints to subkeys
- #
--set pgp_list_pubring_command="gpg --no-verbose --batch --quiet --with-colons 
--with-fingerprint --with-fingerprint --list-keys %r"
-+set pgp_list_pubring_command="gpg2 --no-verbose --batch --quiet --with-colons 
--with-fingerprint --with-fingerprint --list-keys %r"
- 
- # Read in the secret key ring
- # note: the second --with-fingerprint adds fingerprints to subkeys
- #
--set pgp_list_secring_command="gpg --no-verbose --batch --quiet --with-colons 
--with-fingerprint --with-fingerprint --list-secret-keys %r"
-+set pgp_list_secring_command="gpg2 --no-verbose --batch --quiet --with-colons 
--with-fingerprint --with-fingerprint --list-secret-keys %r"
- 
- # Fetch keys
- # set pgp_getkeys_command="pkspxycwrap %r"
Index: mail/notmuch/notmuch/Makefile
===================================================================
RCS file: /cvs/ports/mail/notmuch/notmuch/Makefile,v
retrieving revision 1.4
diff -u -p -r1.4 Makefile
--- mail/notmuch/notmuch/Makefile       23 Aug 2020 22:16:02 -0000      1.4
+++ mail/notmuch/notmuch/Makefile       18 Sep 2020 23:11:05 -0000
@@ -4,6 +4,7 @@ COMMENT-main =          mail indexer, tagger and
 COMMENT-emacs =                Emacs bindings for notmuch
 
 PKGNAME-main =         notmuch-${V}
+REVISION-main =                0
 PKGNAME-emacs =                notmuch-emacs-${V}
 
 SHARED_LIBS +=         notmuch 0.0
@@ -28,7 +29,7 @@ RUN_DEPENDS-emacs =   devel/desktop-file-u
 BUILD_DEPENDS =                devel/doxygen \
                        devel/py-cffi${MODPY_FLAVOR} \
                        editors/emacs,gtk3 \
-                       security/gnupg2 \
+                       security/gnupg>=2.2.23p1 \
                        shells/bash \
                        shells/bash-completion \
                        textproc/py-sphinx${MODPY_FLAVOR}
Index: mail/notmuch/notmuch/patches/patch-configure
===================================================================
RCS file: /cvs/ports/mail/notmuch/notmuch/patches/patch-configure,v
retrieving revision 1.3
diff -u -p -r1.3 patch-configure
--- mail/notmuch/notmuch/patches/patch-configure        13 Aug 2020 18:21:18 
-0000      1.3
+++ mail/notmuch/notmuch/patches/patch-configure        18 Sep 2020 23:11:05 
-0000
@@ -3,24 +3,6 @@ $OpenBSD: patch-configure,v 1.3 2020/08/
 Index: configure
 --- configure.orig
 +++ configure
-@@ -518,7 +518,7 @@ EOF
-         printf 'No.\nCould not make tempdir for testing session-key 
support.\n'
-         errors=$((errors + 1))
-     elif ${CC} ${CFLAGS} ${gmime_cflags} _check_session_keys.c 
${gmime_ldflags} -o _check_session_keys \
--           && GNUPGHOME=${TEMP_GPG} gpg --batch --quiet --import < 
"$srcdir"/test/gnupg-secret-key.asc \
-+           && GNUPGHOME=${TEMP_GPG} gpg2 --batch --quiet --import < 
"$srcdir"/test/gnupg-secret-key.asc \
-            && SESSION_KEY=$(GNUPGHOME=${TEMP_GPG} ./_check_session_keys) \
-            && [ $SESSION_KEY = 
9:0BACD64099D1468AB07C796F0C0AC4851948A658A15B34E803865E9FC635F2F5 ]
-     then
-@@ -669,7 +669,7 @@ EOF
-         printf 'No.\nCould not make tempdir for testing signature 
verification when decrypting with session keys.\n'
-         errors=$((errors + 1))
-     elif ${CC} ${CFLAGS} ${gmime_cflags} _verify_sig_with_session_key.c 
${gmime_ldflags} -o _verify_sig_with_session_key \
--            && GNUPGHOME=${TEMP_GPG} gpg --batch --quiet --import < 
"$srcdir"/test/gnupg-secret-key.asc \
-+            && GNUPGHOME=${TEMP_GPG} gpg2 --batch --quiet --import < 
"$srcdir"/test/gnupg-secret-key.asc \
-             && rm -f ${TEMP_GPG}/private-keys-v1.d/*.key
-     then
-         if GNUPGHOME=${TEMP_GPG} ./_verify_sig_with_session_key; then
 @@ -721,9 +721,9 @@ if ! pkg-config --exists zlib; then
    rm -f compat/gen_zlib_pc
  fi
Index: mail/notmuch/notmuch/patches/patch-test_test-lib-OPENBSD_sh
===================================================================
RCS file: 
/cvs/ports/mail/notmuch/notmuch/patches/patch-test_test-lib-OPENBSD_sh,v
retrieving revision 1.1.1.1
diff -u -p -r1.1.1.1 patch-test_test-lib-OPENBSD_sh
--- mail/notmuch/notmuch/patches/patch-test_test-lib-OPENBSD_sh 15 May 2020 
08:58:14 -0000      1.1.1.1
+++ mail/notmuch/notmuch/patches/patch-test_test-lib-OPENBSD_sh 18 Sep 2020 
23:11:05 -0000
@@ -3,7 +3,7 @@ $OpenBSD: patch-test_test-lib-OPENBSD_sh
 Index: test/test-lib-OPENBSD.sh
 --- test/test-lib-OPENBSD.sh.orig
 +++ test/test-lib-OPENBSD.sh
-@@ -4,6 +4,10 @@ if command -v gdate >/dev/null
+@@ -4,6 +4,9 @@ if command -v gdate >/dev/null
         date () { gdate "$@"; }
         base64 () { gbase64 "$@"; }
         wc () { gwc "$@"; }
@@ -13,5 +13,4 @@ Index: test/test-lib-OPENBSD.sh
         sha256sum () { gsha256sum "$@"; }
     fi
 +gdb () { egdb "$@"; }
-+gpg () { gpg2 "$@"; }
 +tar () { gtar "$@"; }
Index: mail/notmuch/notmuch/patches/patch-test_test-lib_sh
===================================================================
RCS file: /cvs/ports/mail/notmuch/notmuch/patches/patch-test_test-lib_sh,v
retrieving revision 1.2
diff -u -p -r1.2 patch-test_test-lib_sh
--- mail/notmuch/notmuch/patches/patch-test_test-lib_sh 13 Aug 2020 18:21:19 
-0000      1.2
+++ mail/notmuch/notmuch/patches/patch-test_test-lib_sh 18 Sep 2020 23:11:05 
-0000
@@ -1,7 +1,6 @@
 $OpenBSD: patch-test_test-lib_sh,v 1.2 2020/08/13 18:21:19 sthen Exp $
 
 we don't have libdl
-use gpg2 instead of gpg
 
 Index: test/test-lib.sh
 --- test/test-lib.sh.orig
@@ -14,27 +13,3 @@ Index: test/test-lib.sh
  
  # Protect ourselves from common misconfiguration to export
  # CDPATH into the environment
-@@ -113,11 +112,11 @@ add_gnupg_home ()
-     _gnupg_exit () { gpgconf --kill all 2>/dev/null || true; }
-     at_exit_function _gnupg_exit
-     mkdir -p -m 0700 "$GNUPGHOME"
--    gpg --no-tty --import <$NOTMUCH_SRCDIR/test/gnupg-secret-key.asc 
>"$GNUPGHOME"/import.log 2>&1
-+    gpg2 --no-tty --import <$NOTMUCH_SRCDIR/test/gnupg-secret-key.asc 
>"$GNUPGHOME"/import.log 2>&1
-     test_debug "cat $GNUPGHOME/import.log"
--    if (gpg --quick-random --version >/dev/null 2>&1) ; then
-+    if (gpg2 --quick-random --version >/dev/null 2>&1) ; then
-       echo quick-random >> "$GNUPGHOME"/gpg.conf
--    elif (gpg --debug-quick-random --version >/dev/null 2>&1) ; then
-+    elif (gpg2 --debug-quick-random --version >/dev/null 2>&1) ; then
-       echo debug-quick-random >> "$GNUPGHOME"/gpg.conf
-     fi
-     echo no-emit-version >> "$GNUPGHOME"/gpg.conf
-@@ -125,7 +124,7 @@ add_gnupg_home ()
-     # Change this if we ship a new test key
-     FINGERPRINT="5AEAB11F5E33DCE875DDB75B6D92612D94E46381"
-     SELF_USERID="Notmuch Test Suite <test_su...@notmuchmail.org> (INSECURE!)"
--    printf '%s:6:\n' "$FINGERPRINT" | gpg --quiet --batch --no-tty 
--import-ownertrust
-+    printf '%s:6:\n' "$FINGERPRINT" | gpg2 --quiet --batch --no-tty 
--import-ownertrust
- }
- 
- add_gpgsm_home ()
Index: productivity/mcds/Makefile
===================================================================
RCS file: /cvs/ports/productivity/mcds/Makefile,v
retrieving revision 1.6
diff -u -p -r1.6 Makefile
--- productivity/mcds/Makefile  31 Jan 2020 18:58:43 -0000      1.6
+++ productivity/mcds/Makefile  18 Sep 2020 23:11:06 -0000
@@ -5,7 +5,7 @@ COMMENT =               tty-based CardDav search tool
 V =                    1.6
 DISTNAME =             mcds-${V}
 CATEGORIES =           productivity
-REVISION =             0
+REVISION =             1
 
 MAINTAINER =           Timothy Brown <tbr...@freeshell.org>
 
@@ -17,14 +17,14 @@ WANTLIB =           assuan c curl gpg-error gpgme
 
 MASTER_SITES =         https://github.com/t-brown/mcds/releases/download/v${V}/
 
-BUILD_DEPENDS =                security/gnupg2
+BUILD_DEPENDS =                security/gnupg>=2.2.23p1
 
 LIB_DEPENDS =          devel/gettext,-runtime \
                        net/curl \
                        textproc/libxml \
                        security/gpgme
 
-RUN_DEPENDS =          security/gnupg2
+RUN_DEPENDS =          security/gnupg>=2.2.23p1
 
 CONFIGURE_STYLE =      gnu
 
Index: security/gnupg/Makefile
===================================================================
RCS file: /cvs/ports/security/gnupg/Makefile,v
retrieving revision 1.117
diff -u -p -r1.117 Makefile
--- security/gnupg/Makefile     5 Jul 2020 09:40:19 -0000       1.117
+++ security/gnupg/Makefile     18 Sep 2020 23:11:06 -0000
@@ -1,73 +1,62 @@
-# $OpenBSD: Makefile,v 1.117 2020/07/05 09:40:19 jca Exp $
+# $OpenBSD: Makefile,v 1.71 2020/09/05 10:07:43 jca Exp $
 
-COMMENT=       GNU privacy guard - a free PGP replacement
+COMMENT =      GNU privacy guard - a free PGP replacement
 
-DISTNAME=      gnupg-1.4.23
-REVISION=      4
-CATEGORIES=    security
+DISTNAME =     gnupg-2.2.23
+REVISION =     1
+CATEGORIES =   security
 
-# restrict, not compatible with gnupg-2.
-PKGSPEC =      gnupg-<2
+MASTER_SITES = ${MASTER_SITE_GNUPG:=gnupg/}
 
-MASTER_SITES=  ${MASTER_SITE_GNUPG:=gnupg/}
+HOMEPAGE =     https://www.gnupg.org/
 
-HOMEPAGE=      https://www.gnupg.org/
+MAINTAINER =   Edd Barrett <e...@openbsd.org>
 
-# GPLv3
-PERMIT_PACKAGE=        Yes
+# GPLv3+
+PERMIT_PACKAGE =       Yes
 
-WANTLIB += bz2 c crypto curses curl iconv intl nghttp2 readline ssl z
+WANTLIB += assuan bz2 c gcrypt gnutls gpg-error iconv intl ksba
+WANTLIB += npth pthread readline sqlite3 usb-1.0 z
 
-LIB_DEPENDS=   archivers/bzip2 \
-               devel/gettext,-runtime \
-               net/curl
+EXTRACT_SUFX =                 .tar.bz2
 
-CONFIGURE_STYLE= gnu
-MODGNU_CONFIG_GUESS_DIRS=${WRKSRC}/scripts
-CONFIGURE_ARGS+= --disable-gnupg-iconv
-CONFIGURE_ENV= CPPFLAGS="-I${LOCALBASE}/include" \
-               LDFLAGS="-L${LOCALBASE}/lib"
-MAKE_FLAGS=    LIBINTL="-L${LOCALBASE}/lib -lintl -liconv" \
-               LIBICONV="-L${LOCALBASE}/lib -liconv"
+FLAVORS =              ldap
+FLAVOR ?=
 
-FLAVORS=       card ldap
-FLAVOR?=
-
-.if ${FLAVOR:Mcard}
-LIB_DEPENDS+=          devel/libusb-compat
-WANTLIB +=             usb
-.else
-CONFIGURE_ARGS+=       --disable-card-support --without-libusb
-.endif
+LIB_DEPENDS =          archivers/bzip2 \
+                       databases/sqlite3 \
+                       devel/gettext,-runtime \
+                       devel/libusb1 \
+                       devel/npth>=1.5 \
+                       security/gnutls \
+                       security/libassuan>=2.4.3 \
+                       security/libgcrypt \
+                       security/libksba>=1.3.4
 
 .if ${FLAVOR:Mldap}
-CONFIGURE_ARGS+=       --enable-ldap
-LIB_DEPENDS+=          databases/openldap
-WANTLIB +=             ldap>=8
+CONFIGURE_ARGS +=      --enable-ldap
+WANTLIB +=             lber ldap
+LIB_DEPENDS +=         databases/openldap
 .else
-CONFIGURE_ARGS+=       --disable-ldap
+CONFIGURE_ARGS +=      --disable-ldap
 .endif
 
+RUN_DEPENDS =          security/pinentry
 
-GNUPGDOCFILES= README AUTHORS COPYING THANKS TODO BUGS \
-               doc/DETAILS doc/FAQ doc/OpenPGP doc/HACKING
+TEST_DEPENDS =         ${FULLPKGNAME}:${BUILD_PKGPATH}
+PORTHOME=${WRKDIR}
 
-.include <bsd.port.arch.mk>
-.if (${MACHINE_ARCH} == "i386" || ${MACHINE_ARCH} == "mips64" || \
-     ${MACHINE_ARCH} == "mips64el" || ${MACHINE_ARCH} == "powerpc") \
-     && ${PROPERTIES:Mclang}
-CFLAGS += -fheinous-gnu-extensions
-.endif
+USE_GMAKE =            Yes
 
-.if ${MACHINE_ARCH} == "hppa"
-pre-configure:
-       # mpi/hppa1.1/udiv-qrnnd.S is not PIE-safe
-       mv ${WRKSRC}/mpi/hppa/udiv-qrnnd.S ${WRKSRC}/mpi/hppa1.1/
-.endif
+CONFIGURE_STYLE =      gnu
+CONFIGURE_ENV =        CPPFLAGS="-I${LOCALBASE}/include" \
+                       LDFLAGS="-L${LOCALBASE}/lib"
+CONFIGURE_ARGS +=      --enable-gpgtar \
+                       --enable-wks-tools
 
+# compat symlinks, remove for OpenBSD 7.0?
 post-install:
-       ${INSTALL_DATA_DIR} ${PREFIX}/share/doc/gnupg
-       cd ${WRKSRC}; ${INSTALL_DATA} ${GNUPGDOCFILES} \
-               ${PREFIX}/share/doc/gnupg
+       ln -sf gpg ${PREFIX}/bin/gpg2
+       ln -sf gpgv ${PREFIX}/bin/gpgv2
 
 .include <bsd.port.mk>
Index: security/gnupg/distinfo
===================================================================
RCS file: /cvs/ports/security/gnupg/distinfo,v
retrieving revision 1.32
diff -u -p -r1.32 distinfo
--- security/gnupg/distinfo     13 Jun 2018 06:20:01 -0000      1.32
+++ security/gnupg/distinfo     18 Sep 2020 23:11:06 -0000
@@ -1,2 +1,2 @@
-SHA256 (gnupg-1.4.23.tar.gz) = R9kgsK0Jm9yf/G4bNjK/YXN8Iv1todqZRCmvHF+pURo=
-SIZE (gnupg-1.4.23.tar.gz) = 5218622
+SHA256 (gnupg-2.2.23.tar.bz2) = ELVeSdeLPknx7bWNdUHsva2S3a7riFtvSG7SPRzR2lw=
+SIZE (gnupg-2.2.23.tar.bz2) = 7099806
Index: security/gnupg/patches/patch-cipher_Makefile_in
===================================================================
RCS file: security/gnupg/patches/patch-cipher_Makefile_in
diff -N security/gnupg/patches/patch-cipher_Makefile_in
--- security/gnupg/patches/patch-cipher_Makefile_in     19 Oct 2017 16:36:04 
-0000      1.12
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,13 +0,0 @@
-$OpenBSD: patch-cipher_Makefile_in,v 1.12 2017/10/19 16:36:04 jca Exp $
-Index: cipher/Makefile.in
---- cipher/Makefile.in.orig
-+++ cipher/Makefile.in
-@@ -401,7 +401,7 @@ target_alias = @target_alias@
- top_build_prefix = @top_build_prefix@
- top_builddir = @top_builddir@
- top_srcdir = @top_srcdir@
--AM_CPPFLAGS = -I.. -I$(top_srcdir)/include -I$(top_srcdir)/intl \
-+AM_CPPFLAGS = -I.. -I$(top_srcdir)/include \
-       -I$(top_srcdir)/mpi -I../mpi $(am__append_1)
- noinst_LIBRARIES = libcipher.a
- libcipher_a_SOURCES = cipher.c pubkey.c md.c dynload.c bithelp.h des.c \
Index: security/gnupg/patches/patch-doc_Makefile_in
===================================================================
RCS file: /cvs/ports/security/gnupg/patches/patch-doc_Makefile_in,v
retrieving revision 1.10
diff -u -p -r1.10 patch-doc_Makefile_in
--- security/gnupg/patches/patch-doc_Makefile_in        1 Mar 2015 12:12:54 
-0000       1.10
+++ security/gnupg/patches/patch-doc_Makefile_in        18 Sep 2020 23:11:06 
-0000
@@ -1,12 +1,20 @@
-$OpenBSD: patch-doc_Makefile_in,v 1.10 2015/03/01 12:12:54 jca Exp $
---- doc/Makefile.in.orig       Fri Feb 27 09:37:51 2015
-+++ doc/Makefile.in    Fri Feb 27 22:39:17 2015
-@@ -422,7 +422,7 @@ gnupg1_TEXINFOS = gnupg1.texi
+$OpenBSD: patch-doc_Makefile_in,v 1.4 2020/09/03 21:45:29 edd Exp $
+
+Index: doc/Makefile.in
+--- doc/Makefile.in.orig
++++ doc/Makefile.in
+@@ -476,14 +476,6 @@ libcommontls = ../common/libcommontls.a
+ libcommontlsnpth = ../common/libcommontlsnpth.a
+ examples = examples/README examples/scd-event examples/trustlist.txt  \
+          examples/vsnfd.prf examples/debug.prf                        \
+-         examples/systemd-user/README                                 \
+-         examples/systemd-user/dirmngr.service                        \
+-         examples/systemd-user/dirmngr.socket                         \
+-         examples/systemd-user/gpg-agent.service                      \
+-         examples/systemd-user/gpg-agent.socket                       \
+-         examples/systemd-user/gpg-agent-ssh.socket                   \
+-         examples/systemd-user/gpg-agent-browser.socket               \
+-         examples/systemd-user/gpg-agent-extra.socket                 \
+          examples/gpgconf.conf examples/pwpattern.list
  
- # Need this to avoid building of dvis with automake 1.4
- DVIS = 
--pkgdata_DATA = FAQ
-+#pkgdata_DATA = FAQ
- 
- # we can't add gpg.texi gpgv.texi here because automake does not like them to
- # be built files.
+ helpfiles = help.txt help.be.txt help.ca.txt help.cs.txt              \
Index: security/gnupg/patches/patch-g10_Makefile_in
===================================================================
RCS file: security/gnupg/patches/patch-g10_Makefile_in
diff -N security/gnupg/patches/patch-g10_Makefile_in
--- security/gnupg/patches/patch-g10_Makefile_in        1 Mar 2015 12:12:54 
-0000       1.11
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,12 +0,0 @@
-$OpenBSD: patch-g10_Makefile_in,v 1.11 2015/03/01 12:12:54 jca Exp $
---- g10/Makefile.in.orig       Fri Feb 27 09:37:51 2015
-+++ g10/Makefile.in    Fri Feb 27 22:39:17 2015
-@@ -461,7 +461,7 @@ target_alias = @target_alias@
- top_build_prefix = @top_build_prefix@
- top_builddir = @top_builddir@
- top_srcdir = @top_srcdir@
--AM_CPPFLAGS = -I$(top_srcdir)/include -I$(top_srcdir)/intl \
-+AM_CPPFLAGS = -I$(top_srcdir)/include \
-       @LIBUSB_CPPFLAGS@ $(am__append_1)
- needed_libs = ../cipher/libcipher.a ../mpi/libmpi.a ../util/libutil.a
- other_libs = $(LIBICONV) $(DNSLIBS) $(LIBINTL) $(CAPLIBS)
Index: security/gnupg/patches/patch-keyserver_Makefile_in
===================================================================
RCS file: security/gnupg/patches/patch-keyserver_Makefile_in
diff -N security/gnupg/patches/patch-keyserver_Makefile_in
--- security/gnupg/patches/patch-keyserver_Makefile_in  1 Mar 2015 12:12:54 
-0000       1.10
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,12 +0,0 @@
-$OpenBSD: patch-keyserver_Makefile_in,v 1.10 2015/03/01 12:12:54 jca Exp $
---- keyserver/Makefile.in.orig Fri Feb 27 09:37:52 2015
-+++ keyserver/Makefile.in      Fri Feb 27 22:40:22 2015
-@@ -444,7 +444,7 @@ target_alias = @target_alias@
- top_build_prefix = @top_build_prefix@
- top_builddir = @top_builddir@
- top_srcdir = @top_srcdir@
--AM_CPPFLAGS = -I$(top_srcdir)/include -I$(top_srcdir)/intl
-+AM_CPPFLAGS = -I$(top_srcdir)/include
- EXTRA_SCRIPTS = gpgkeys_mailto
- gpglibexecdir = $(libexecdir)/@PACKAGE@
- gpglibexec_PROGRAMS = @GPGKEYS_LDAP@ @GPGKEYS_HKP@ @GPGKEYS_FINGER@ 
@GPGKEYS_CURL@
Index: security/gnupg/patches/patch-mpi_Makefile_in
===================================================================
RCS file: security/gnupg/patches/patch-mpi_Makefile_in
diff -N security/gnupg/patches/patch-mpi_Makefile_in
--- security/gnupg/patches/patch-mpi_Makefile_in        11 Nov 2018 21:14:33 
-0000      1.4
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,14 +0,0 @@
-$OpenBSD: patch-mpi_Makefile_in,v 1.4 2018/11/11 21:14:33 naddy Exp $
-
-Index: mpi/Makefile.in
---- mpi/Makefile.in.orig
-+++ mpi/Makefile.in
-@@ -713,7 +713,7 @@ uninstall-am:
- # cancel the default rules used by libtool which do not really
- # work and add one to cpp .S files
- .S.o:
--       $(CPP) $(INCLUDES) $(DEFS) $< | grep -v '^#' > _$*.s
-+       $(CPP) $(INCLUDES) $(DEFS) -DPIC $< | grep -v '^#' > _$*.s
-        $(COMPILE) $(AM_CCASFLAGS) -c _$*.s
-        mv -f _$*.o $*.o
- 
Index: security/gnupg/patches/patch-mpi_config_links
===================================================================
RCS file: security/gnupg/patches/patch-mpi_config_links
diff -N security/gnupg/patches/patch-mpi_config_links
--- security/gnupg/patches/patch-mpi_config_links       12 Apr 2020 18:29:01 
-0000      1.7
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,15 +0,0 @@
-$OpenBSD: patch-mpi_config_links,v 1.7 2020/04/12 18:29:01 cwen Exp $
-
-Fix "error: unsupported argument '-mppc' to option 'Wa,'" with clang on macppc
-
-Index: mpi/config.links
---- mpi/config.links.orig
-+++ mpi/config.links
-@@ -234,7 +234,6 @@ case "${host}" in
-        echo '/* configured for {Open,Net}BSD on powerpc */' 
>>./mpi/asm-syntax.h
-        echo '#define ELF_SYNTAX'                 >>./mpi/asm-syntax.h
-        cat   $srcdir/mpi/powerpc32/syntax.h    >>./mpi/asm-syntax.h
--       mpi_sflags="-Wa,-mppc"
-        path="powerpc32"
-        ;;
- 
Index: security/gnupg/patches/patch-mpi_longlong_h
===================================================================
RCS file: security/gnupg/patches/patch-mpi_longlong_h
diff -N security/gnupg/patches/patch-mpi_longlong_h
--- security/gnupg/patches/patch-mpi_longlong_h 23 Jan 2018 13:54:54 -0000      
1.3
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,42 +0,0 @@
-$OpenBSD: patch-mpi_longlong_h,v 1.3 2018/01/23 13:54:54 jca Exp $
-
-Index: mpi/longlong.h
---- mpi/longlong.h.orig
-+++ mpi/longlong.h
-@@ -184,8 +184,8 @@ extern UDItype __udiv_qrnnd ();
- #define add_ssaaaa(sh, sl, ah, al, bh, bl) \
-   __asm__ ("adds %1, %4, %5\n"                                          \
-          "adc  %0, %2, %3"                                            \
--         : "=r" ((USItype)(sh)),                                      \
--           "=&r" ((USItype)(sl))                                      \
-+         : "=r" ((sh)),                                               \
-+           "=&r" ((sl))                                               \
-          : "%r" ((USItype)(ah)),                                      \
-            "rI" ((USItype)(bh)),                                      \
-            "%r" ((USItype)(al)),                                      \
-@@ -193,8 +193,8 @@ extern UDItype __udiv_qrnnd ();
- #define sub_ddmmss(sh, sl, ah, al, bh, bl) \
-   __asm__ ("subs %1, %4, %5\n"                                          \
-          "sbc  %0, %2, %3"                                            \
--         : "=r" ((USItype)(sh)),                                      \
--           "=&r" ((USItype)(sl))                                      \
-+         : "=r" ((sh)),                                               \
-+           "=&r" ((sl))                                               \
-          : "r" ((USItype)(ah)),                                       \
-            "rI" ((USItype)(bh)),                                      \
-            "r" ((USItype)(al)),                                       \
-@@ -221,10 +221,10 @@ extern UDItype __udiv_qrnnd ();
-          : "r0", "r1", "r2" __AND_CLOBBER_CC)
- #else
- #define umul_ppmm(xh, xl, a, b)                                         \
--  __asm__ ("%@ Inlined umul_ppmm\n"                                     \
--         "umull %r1, %r0, %r2, %r3"                                   \
--                 : "=&r" ((USItype)(xh)),                             \
--                   "=r" ((USItype)(xl))                               \
-+  __asm__ ("@ Inlined umul_ppmm\n"                                      \
-+         "umull %1, %0, %2, %3"                                       \
-+                 : "=&r" ((xh)),                                      \
-+                   "=r" ((xl))                                        \
-                  : "r" ((USItype)(a)),                                \
-                    "r" ((USItype)(b))                                 \
-                  : "r0", "r1")
Index: security/gnupg/patches/patch-tools_Makefile_in
===================================================================
RCS file: security/gnupg/patches/patch-tools_Makefile_in
diff -N security/gnupg/patches/patch-tools_Makefile_in
--- security/gnupg/patches/patch-tools_Makefile_in      1 Mar 2015 12:12:54 
-0000       1.11
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,12 +0,0 @@
-$OpenBSD: patch-tools_Makefile_in,v 1.11 2015/03/01 12:12:54 jca Exp $
---- tools/Makefile.in.orig     Fri Feb 27 09:37:52 2015
-+++ tools/Makefile.in  Fri Feb 27 22:39:17 2015
-@@ -430,7 +430,7 @@ top_build_prefix = @top_build_prefix@
- top_builddir = @top_builddir@
- top_srcdir = @top_srcdir@
- EXTRA_DIST = lspgpot ring-a-party mail-signed-keys convert-from-106
--AM_CPPFLAGS = -I$(top_srcdir)/include -I$(top_srcdir)/intl \
-+AM_CPPFLAGS = -I$(top_srcdir)/include \
-       $(am__append_1)
- needed_libs = ../cipher/libcipher.a ../mpi/libmpi.a ../util/libutil.a 
- other_libs = $(LIBICONV) $(LIBINTL) $(CAPLIBS)
Index: security/gnupg/patches/patch-util_Makefile_in
===================================================================
RCS file: security/gnupg/patches/patch-util_Makefile_in
diff -N security/gnupg/patches/patch-util_Makefile_in
--- security/gnupg/patches/patch-util_Makefile_in       1 Mar 2015 12:12:54 
-0000       1.10
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,12 +0,0 @@
-$OpenBSD: patch-util_Makefile_in,v 1.10 2015/03/01 12:12:54 jca Exp $
---- util/Makefile.in.orig      Fri Feb 27 09:37:52 2015
-+++ util/Makefile.in   Fri Feb 27 22:40:53 2015
-@@ -415,7 +415,7 @@ target_alias = @target_alias@
- top_build_prefix = @top_build_prefix@
- top_builddir = @top_builddir@
- top_srcdir = @top_srcdir@
--AM_CPPFLAGS = -I.. -I$(top_srcdir)/include -I$(top_srcdir)/intl
-+AM_CPPFLAGS = -I.. -I$(top_srcdir)/include
- noinst_LIBRARIES = libutil.a libcompat.a
- libutil_a_SOURCES = logger.c fileutil.c miscutil.c strgutil.c ttyio.c \
-       argparse.c memory.c secmem.c errors.c iobuf.c dotlock.c http.c \
Index: security/gnupg/patches/patch-util_secmem_c
===================================================================
RCS file: security/gnupg/patches/patch-util_secmem_c
diff -N security/gnupg/patches/patch-util_secmem_c
--- security/gnupg/patches/patch-util_secmem_c  13 Oct 2014 19:21:16 -0000      
1.5
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,40 +0,0 @@
-$OpenBSD: patch-util_secmem_c,v 1.5 2014/10/13 19:21:16 sthen Exp $
---- util/secmem.c.orig Thu Dec 20 12:22:28 2012
-+++ util/secmem.c      Sun Dec 30 23:27:38 2012
-@@ -36,6 +36,8 @@
- #include <sys/lock.h>
- #endif
- #endif
-+#include <sys/sysctl.h>
-+#include <uvm/uvm_swap_encrypt.h>
- 
- #include "types.h"
- #include "memory.h"
-@@ -91,11 +93,23 @@ static int suspend_warning;
- static void
- print_warn(void)
- {
--  if (!no_warning)
-+  int  mib[3], swapencrypt = 0;
-+  size_t len;
-+
-+  mib[0] = CTL_VM;
-+  mib[1] = VM_SWAPENCRYPT;
-+  mib[2] = SWPENC_ENABLE;
-+
-+  len = sizeof(swapencrypt);
-+
-+  if (sysctl(mib, 3, &swapencrypt, &len, NULL, 0) == -1)
-+    log_info("WARNING: Can't receive vm.swapencrypt.enable sysctl value\n");
-+
-+  if (!no_warning && !swapencrypt)
-     {
--      log_info(_("WARNING: using insecure memory!\n"));
--      log_info(_("please see http://www.gnupg.org/documentation/faqs.html";
--               " for more information\n"));
-+      log_info("WARNING: Using insecure memory!\n");
-+      log_info("Please enable swap encryption via"
-+               " 'sysctl vm.swapencrypt.enable=1'.\n");
-     }
- }
- 
Index: security/gnupg/pkg/DESCR
===================================================================
RCS file: /cvs/ports/security/gnupg/pkg/DESCR,v
retrieving revision 1.9
diff -u -p -r1.9 DESCR
--- security/gnupg/pkg/DESCR    31 Dec 2012 16:34:35 -0000      1.9
+++ security/gnupg/pkg/DESCR    18 Sep 2020 23:11:06 -0000
@@ -1,7 +1,6 @@
-GnuPG is a complete and free replacement for PGP. Because it does
-not use IDEA or RSA it can be used without any restrictions. GnuPG
-is nearly in compliance with RFC2440 (OpenPGP).
-
-Flavors:
-       card - build with OpenPGP card support
-       ldap - build with LDAP keyserver support
+The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication
+and data storage.  It can be used to encrypt data, create digital
+signatures, help authenticating using Secure Shell and to provide a
+framework for public key cryptography.  It includes an advanced key
+management facility and is compliant with the OpenPGP and S/MIME
+standards.
Index: security/gnupg/pkg/PFRAG.ldap
===================================================================
RCS file: /cvs/ports/security/gnupg/pkg/PFRAG.ldap,v
retrieving revision 1.2
diff -u -p -r1.2 PFRAG.ldap
--- security/gnupg/pkg/PFRAG.ldap       15 Sep 2009 13:44:41 -0000      1.2
+++ security/gnupg/pkg/PFRAG.ldap       18 Sep 2020 23:11:06 -0000
@@ -1,2 +1,2 @@
-@comment $OpenBSD: PFRAG.ldap,v 1.2 2009/09/15 13:44:41 dhill Exp $
-@bin libexec/gnupg/gpgkeys_ldap
+@comment $OpenBSD: PFRAG.ldap,v 1.2 2015/01/08 09:06:19 pea Exp $
+@bin libexec/dirmngr_ldap
Index: security/gnupg/pkg/PLIST
===================================================================
RCS file: /cvs/ports/security/gnupg/pkg/PLIST,v
retrieving revision 1.31
diff -u -p -r1.31 PLIST
--- security/gnupg/pkg/PLIST    29 Jun 2016 16:14:44 -0000      1.31
+++ security/gnupg/pkg/PLIST    18 Sep 2020 23:11:06 -0000
@@ -1,62 +1,126 @@
-@comment $OpenBSD: PLIST,v 1.31 2016/06/29 16:14:44 espie Exp $
-@option no-default-conflict
-@option is-branch
-@conflict gnupg-<2
+@comment $OpenBSD: PLIST,v 1.22 2020/09/05 10:07:44 jca Exp $
+@conflict gnupg-<2.2.23p1
 @pkgpath ${BASE_PKGPATH},idea
+@pkgpath security/gnupg2
+@bin bin/dirmngr
+@bin bin/dirmngr-client
 @bin bin/gpg
-bin/gpg-zip
+@bin bin/gpg-agent
+@bin bin/gpg-connect-agent
+@bin bin/gpg-wks-server
+bin/gpg2
+@bin bin/gpgconf
+@bin bin/gpgparsemail
+@bin bin/gpgscm
+@bin bin/gpgsm
 @bin bin/gpgsplit
+@bin bin/gpgtar
 @bin bin/gpgv
-@info info/gnupg1.info
-libexec/gnupg/
-@bin libexec/gnupg/gpgkeys_curl
-@bin libexec/gnupg/gpgkeys_finger
-@bin libexec/gnupg/gpgkeys_hkp
-@man man/man1/gpg-zip.1
+bin/gpgv2
+@bin bin/kbxutil
+@bin bin/watchgnupg
+@info info/gnupg.info
+@bin libexec/gpg-check-pattern
+@bin libexec/gpg-preset-passphrase
+@bin libexec/gpg-protect-tool
+@bin libexec/gpg-wks-client
+@bin libexec/scdaemon
+@man man/man1/dirmngr-client.1
+@man man/man1/gpg-agent.1
+@man man/man1/gpg-connect-agent.1
+@man man/man1/gpg-preset-passphrase.1
+@man man/man1/gpg-wks-client.1
+@man man/man1/gpg-wks-server.1
 @man man/man1/gpg.1
+@man man/man1/gpgconf.1
+@man man/man1/gpgparsemail.1
+@man man/man1/gpgsm.1
+@man man/man1/gpgtar.1
 @man man/man1/gpgv.1
+@man man/man1/scdaemon.1
+@man man/man1/symcryptrun.1
+@man man/man1/watchgnupg.1
+@man man/man7/gnupg.7
+@man man/man8/addgnupghome.8
+@man man/man8/applygnupgdefaults.8
+@man man/man8/dirmngr.8
+sbin/addgnupghome
+sbin/applygnupgdefaults
 share/doc/gnupg/
-share/doc/gnupg/AUTHORS
-share/doc/gnupg/BUGS
-share/doc/gnupg/COPYING
+share/doc/gnupg/DCO
 share/doc/gnupg/DETAILS
 share/doc/gnupg/FAQ
 share/doc/gnupg/HACKING
+share/doc/gnupg/KEYSERVER
 share/doc/gnupg/OpenPGP
 share/doc/gnupg/README
-share/doc/gnupg/THANKS
-share/doc/gnupg/TODO
+share/doc/gnupg/TRANSLATE
+share/doc/gnupg/examples/
+share/doc/gnupg/examples/README
+share/doc/gnupg/examples/debug.prf
+share/doc/gnupg/examples/gpgconf.conf
+share/doc/gnupg/examples/pwpattern.list
+share/doc/gnupg/examples/scd-event
+share/doc/gnupg/examples/trustlist.txt
+share/doc/gnupg/examples/vsnfd.prf
+share/doc/pkg-readmes/${PKGSTEM}
 share/gnupg/
-share/gnupg/options.skel
-share/locale/be/LC_MESSAGES/gnupg.mo
-share/locale/ca/LC_MESSAGES/gnupg.mo
-share/locale/cs/LC_MESSAGES/gnupg.mo
-share/locale/da/LC_MESSAGES/gnupg.mo
-share/locale/de/LC_MESSAGES/gnupg.mo
-share/locale/el/LC_MESSAGES/gnupg.mo
-share/locale/en@boldquot/LC_MESSAGES/gnupg.mo
-share/locale/en@quot/LC_MESSAGES/gnupg.mo
-share/locale/eo/LC_MESSAGES/gnupg.mo
-share/locale/es/LC_MESSAGES/gnupg.mo
-share/locale/et/LC_MESSAGES/gnupg.mo
-share/locale/fi/LC_MESSAGES/gnupg.mo
-share/locale/fr/LC_MESSAGES/gnupg.mo
-share/locale/gl/LC_MESSAGES/gnupg.mo
-share/locale/hu/LC_MESSAGES/gnupg.mo
-share/locale/id/LC_MESSAGES/gnupg.mo
-share/locale/it/LC_MESSAGES/gnupg.mo
-share/locale/ja/LC_MESSAGES/gnupg.mo
-share/locale/nb/LC_MESSAGES/gnupg.mo
-share/locale/nl/LC_MESSAGES/gnupg.mo
-share/locale/pl/LC_MESSAGES/gnupg.mo
-share/locale/pt/LC_MESSAGES/gnupg.mo
-share/locale/pt_BR/LC_MESSAGES/gnupg.mo
-share/locale/ro/LC_MESSAGES/gnupg.mo
-share/locale/ru/LC_MESSAGES/gnupg.mo
-share/locale/sk/LC_MESSAGES/gnupg.mo
-share/locale/sv/LC_MESSAGES/gnupg.mo
-share/locale/tr/LC_MESSAGES/gnupg.mo
-share/locale/uk/LC_MESSAGES/gnupg.mo
-share/locale/zh_CN/LC_MESSAGES/gnupg.mo
-share/locale/zh_TW/LC_MESSAGES/gnupg.mo
+share/gnupg/distsigkey.gpg
+share/gnupg/help.be.txt
+share/gnupg/help.ca.txt
+share/gnupg/help.cs.txt
+share/gnupg/help.da.txt
+share/gnupg/help.de.txt
+share/gnupg/help.el.txt
+share/gnupg/help.eo.txt
+share/gnupg/help.es.txt
+share/gnupg/help.et.txt
+share/gnupg/help.fi.txt
+share/gnupg/help.fr.txt
+share/gnupg/help.gl.txt
+share/gnupg/help.hu.txt
+share/gnupg/help.id.txt
+share/gnupg/help.it.txt
+share/gnupg/help.ja.txt
+share/gnupg/help.nb.txt
+share/gnupg/help.pl.txt
+share/gnupg/help.pt.txt
+share/gnupg/help.pt_BR.txt
+share/gnupg/help.ro.txt
+share/gnupg/help.ru.txt
+share/gnupg/help.sk.txt
+share/gnupg/help.sv.txt
+share/gnupg/help.tr.txt
+share/gnupg/help.txt
+share/gnupg/help.zh_CN.txt
+share/gnupg/help.zh_TW.txt
+share/gnupg/sks-keyservers.netCA.pem
+share/locale/ca/LC_MESSAGES/gnupg2.mo
+share/locale/cs/LC_MESSAGES/gnupg2.mo
+share/locale/da/LC_MESSAGES/gnupg2.mo
+share/locale/de/LC_MESSAGES/gnupg2.mo
+share/locale/el/LC_MESSAGES/gnupg2.mo
+share/locale/en@boldquot/LC_MESSAGES/gnupg2.mo
+share/locale/en@quot/LC_MESSAGES/gnupg2.mo
+share/locale/eo/LC_MESSAGES/gnupg2.mo
+share/locale/es/LC_MESSAGES/gnupg2.mo
+share/locale/et/LC_MESSAGES/gnupg2.mo
+share/locale/fi/LC_MESSAGES/gnupg2.mo
+share/locale/fr/LC_MESSAGES/gnupg2.mo
+share/locale/gl/LC_MESSAGES/gnupg2.mo
+share/locale/hu/LC_MESSAGES/gnupg2.mo
+share/locale/id/LC_MESSAGES/gnupg2.mo
+share/locale/it/LC_MESSAGES/gnupg2.mo
+share/locale/ja/LC_MESSAGES/gnupg2.mo
+share/locale/nb/LC_MESSAGES/gnupg2.mo
+share/locale/pl/LC_MESSAGES/gnupg2.mo
+share/locale/pt/LC_MESSAGES/gnupg2.mo
+share/locale/ro/LC_MESSAGES/gnupg2.mo
+share/locale/ru/LC_MESSAGES/gnupg2.mo
+share/locale/sk/LC_MESSAGES/gnupg2.mo
+share/locale/sv/LC_MESSAGES/gnupg2.mo
+share/locale/tr/LC_MESSAGES/gnupg2.mo
+share/locale/uk/LC_MESSAGES/gnupg2.mo
+share/locale/zh_CN/LC_MESSAGES/gnupg2.mo
+share/locale/zh_TW/LC_MESSAGES/gnupg2.mo
 %%ldap%%
Index: security/gnupg/pkg/README
===================================================================
RCS file: security/gnupg/pkg/README
diff -N security/gnupg/pkg/README
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ security/gnupg/pkg/README   18 Sep 2020 23:11:06 -0000
@@ -0,0 +1,44 @@
+$OpenBSD: README,v 1.4 2018/09/04 12:46:21 espie Exp $
+
++-----------------------------------------------------------------------
+| Running ${PKGSTEM} on OpenBSD
++-----------------------------------------------------------------------
+
+In order to use a card reader other than the few ones supported by
+GnuPG's internal CCID driver, the ccid, pcsc-lite and pcsc-tools packages
+need to be installed.
+
+Example YubiKey 4 Setup Procedure
+=================================
+
+Install required packages, enable and start pcscd(8) PC/SC smartcard daemon:
+
+    # pkg_add ccid pcsc-lite pcsc-tools
+    # rcctl enable pcscd
+    # rcctl start pcscd
+
+Find the reader with YubiKey:
+
+    $ pcsc_scan -n
+    PC/SC device scanner
+    V 1.4.27 (c) 2001-2011, Ludovic Rousseau <ludovic.rouss...@free.fr>
+    Compiled with PC/SC lite version: 1.8.20
+    Using reader plug'n play mechanism
+    Scanning present readers...
+    0: Yubico Yubikey 4 OTP+U2F+CCID 00 00
+
+    Sun Apr 23 15:15:40 2017
+    Reader 0: Yubico Yubikey 4 OTP+U2F+CCID 00 00
+      Card state: Card inserted, Exclusive Mode,
+      ATR: 3B F8 13 00 00 81 31 FE 15 59 75 62 69 6B 65 79 34 D4
+    #Ctrl+C
+
+Configure scdaemon(1) smartcard daemon to use this reader:
+
+    $ echo "reader-port \"Yubico Yubikey 4 OTP+U2F+CCID 00 0\"" >> \
+       ~/.gnupg/scdaemon.conf
+
+Check if the YubiKey is recognized by GnuPG:
+
+    $ gpg2 --card-status
+    Reader ...........: Yubico Yubikey 4 OTP U2F CCID 00 00
Index: security/gopass/Makefile
===================================================================
RCS file: /cvs/ports/security/gopass/Makefile,v
retrieving revision 1.16
diff -u -p -r1.16 Makefile
--- security/gopass/Makefile    1 Aug 2020 14:43:32 -0000       1.16
+++ security/gopass/Makefile    18 Sep 2020 23:11:06 -0000
@@ -4,6 +4,7 @@ COMMENT =       pass compatible password manag
 
 MODGO_MODNAME =        github.com/gopasspw/gopass
 MODGO_VERSION =        v1.9.2
+REVISION =     0
 DISTNAME =     gopass-${MODGO_VERSION}
 
 CATEGORIES =   security
@@ -21,7 +22,7 @@ MODGO_TYPE =  bin
 MODGO_LDFLAGS =        -X "main.version=${MODGO_VERSION}"
 
 RUN_DEPENDS =  devel/git \
-               security/gnupg2
+               security/gnupg>=2.2.23p1
 
 # for tests; some still fail
 PORTHOME =     ${WRKDIR}
Index: security/gpgme/Makefile
===================================================================
RCS file: /cvs/ports/security/gpgme/Makefile,v
retrieving revision 1.57
diff -u -p -r1.57 Makefile
--- security/gpgme/Makefile     24 Aug 2020 16:28:30 -0000      1.57
+++ security/gpgme/Makefile     18 Sep 2020 23:11:06 -0000
@@ -4,6 +4,7 @@ COMMENT-main =          GnuPG Made Easy
 COMMENT-qt =           Qt bindings for GPGme
 
 VERSION =              1.14.0
+REVISION =             0
 DISTNAME =             gpgme-${VERSION}
 PKGNAME-main =         gpgme-${VERSION}
 PKGNAME-qt =           gpgme-qt-${VERSION}
@@ -38,12 +39,8 @@ NOT_FOR_ARCHS-qt =   alpha mips64 sh
 
 CONFIGURE_STYLE =      gnu
 
-# Requires gpgsm (gnupg 2.x) during build, but can run with any gnupg.
-BUILD_DEPENDS =                gnupg->=2:security/gnupg2
-
-# gnupg-* is normally the default anyway, but gnupg1 overrides PKGSPEC
-# so we must be explicit here.
-RUN_DEPENDS =          gnupg-*:security/gnupg
+BUILD_DEPENDS =                security/gnupg>=2.2.23p1
+RUN_DEPENDS =          security/gnupg>=2.2.23p1
 LIB_DEPENDS-main =     ${LIB_DEPENDS:N*qt*} \
                        devel/gettext,-runtime \
                        security/libgpg-error>=1.4 \
@@ -71,12 +68,5 @@ USE_GMAKE =          Yes
 pre-configure:
        ${SUBST_CMD} ${WRKSRC}/lang/cpp/src/GpgmeppConfig.cmake.in.in
        ${SUBST_CMD} ${WRKSRC}/lang/qt/src/QGpgmeConfig.cmake.in.in
-
-# The tests target gpg2. Running with gpg version 1 will give:
-# `./t-support.h:160: GPGME: Invalid crypto engine'
-# https://dev.gnupg.org/T3512
-TEST_DEPENDS +=                security/gnupg2
-pre-build:
-       ln -sf ${LOCALBASE}/bin/gpg2 ${WRKDIR}/bin/gpg
 
 .include <bsd.port.mk>
Index: security/keybase/Makefile
===================================================================
RCS file: /cvs/ports/security/keybase/Makefile,v
retrieving revision 1.25
diff -u -p -r1.25 Makefile
--- security/keybase/Makefile   1 Feb 2020 17:52:39 -0000       1.25
+++ security/keybase/Makefile   18 Sep 2020 23:11:06 -0000
@@ -8,6 +8,7 @@ ONLY_FOR_ARCHS = amd64
 COMMENT =      client for keybase.io
 
 V =            v5.2.0
+REVISION =     0
 DISTNAME =     keybase-${V}
 PKGNAME =      keybase-${V:S/v//}
 EXTRACT_SUFX = .tar.xz
@@ -22,7 +23,7 @@ PERMIT_PACKAGE =      Yes
 
 MASTER_SITES = https://github.com/keybase/client/releases/download/${V}/
 
-RUN_DEPENDS =  security/gnupg2
+RUN_DEPENDS =  security/gnupg>=2.2.23p1
 
 WANTLIB += c pthread
 
Index: security/keyringer/Makefile
===================================================================
RCS file: /cvs/ports/security/keyringer/Makefile,v
retrieving revision 1.7
diff -u -p -r1.7 Makefile
--- security/keyringer/Makefile 8 Oct 2019 12:26:01 -0000       1.7
+++ security/keyringer/Makefile 18 Sep 2020 23:11:06 -0000
@@ -3,7 +3,7 @@
 COMMENT =      manage and share secrets using GnuPG and Git
 
 DISTNAME =     keyringer-0.5.4
-REVISION =     0
+REVISION =     1
 
 CATEGORIES =   security
 
@@ -18,7 +18,7 @@ MASTER_SITES =                https://keyringer.pw/rel
 EXTRACT_SUFX =         .tar.bz2
 
 RUN_DEPENDS =          devel/git \
-                       security/gnupg2 \
+                       security/gnupg>=2.2.23p1 \
                        shells/bash \
                        converters/base64
 
Index: security/keyringer/patches/patch-lib_keyringer_functions
===================================================================
RCS file: /cvs/ports/security/keyringer/patches/patch-lib_keyringer_functions,v
retrieving revision 1.5
diff -u -p -r1.5 patch-lib_keyringer_functions
--- security/keyringer/patches/patch-lib_keyringer_functions    8 Oct 2019 
12:26:01 -0000       1.5
+++ security/keyringer/patches/patch-lib_keyringer_functions    18 Sep 2020 
23:11:06 -0000
@@ -1,7 +1,6 @@
 $OpenBSD: patch-lib_keyringer_functions,v 1.5 2019/10/08 12:26:01 jca Exp $
 
 - no mount -l/tmpfs in OpenBSD
-- use gpg2, upstream seems to rely on gpg being gpg2
 - use date(1) -r instead of GNU date(1) --date=
 
 Index: lib/keyringer/functions
@@ -16,54 +15,7 @@ Index: lib/keyringer/functions
  }
  
  # Setup a temporary file
-@@ -314,9 +314,9 @@ function keyringer_set_env {
-   fi
- 
-   if [ ! -z "$KEYID" ]; then
--    GPG="gpg --quiet --no-encrypt-to -u $KEYID"
-+    GPG="gpg2 --quiet --no-encrypt-to -u $KEYID"
-   else
--    GPG="gpg --quiet --no-encrypt-to"
-+    GPG="gpg2 --quiet --no-encrypt-to"
-   fi
- 
-   # Check keyring config version
-@@ -601,7 +601,7 @@ function keyringer_recv_keys {
-   local recipient="$1"
- 
-   echo "Trying to receive missing key $recipient..."
--  gpg --batch --recv-keys "$recipient"
-+  gpg2 --batch --recv-keys "$recipient"
- }
- 
- # Refresh keys from keyserver
-@@ -611,7 +611,7 @@ function keyringer_refresh_keys {
-   local recipient="$1"
- 
-   echo "Trying to refresh key $recipient..."
--  gpg --batch --recv-keys "$recipient"
-+  gpg2 --batch --recv-keys "$recipient"
- }
- 
- # Check recipient size
-@@ -698,7 +698,7 @@ function keyringer_check_recipients {
- function keyringer_check_recipient_key {
-   local recipient="$1"
- 
--  gpg --list-key "$recipient" &> /dev/null
-+  gpg2 --list-key "$recipient" &> /dev/null
-   if [ "$?" != "0" ]; then
-     if [ "$BASENAME" == "check" ]; then
-       refresh="no"
-@@ -727,14 +727,14 @@ function keyringer_check_expiration {
-   seconds="`date +%s`"
- 
-   # Check the main key
--  expiry="`gpg --with-colons --fixed-list-mode --list-keys "$recipient" | 
grep ^pub | head -n1 | cut -d : -f 7`"
-+  expiry="`gpg2 --with-colons --fixed-list-mode --list-keys "$recipient" | 
grep ^pub | head -n1 | cut -d : -f 7`"
- 
-   # TODO: Time to expire can be configured via repository options.
-   ahead="$((86400 * 30 + $seconds))"
+@@ -734,7 +734,7 @@ function keyringer_check_expiration {
  
    # Check if key is expired
    if [ ! -z "$expiry" ] && [[ "$seconds" -gt "$expiry" ]]; then
@@ -72,7 +24,7 @@ Index: lib/keyringer/functions
  
      if [ "$KEYRINGER_MODE" == "write" ] || [ "$KEYRINGER_MODE" == "readwrite" 
]; then
        echo ", aborting."
-@@ -749,12 +749,12 @@ function keyringer_check_expiration {
+@@ -749,7 +749,7 @@ function keyringer_check_expiration {
    # TODO: Users can be alerted by mail if configured by user preferences.
    # TODO: Outgoing emails can be encrypted.
    if [ "$BASENAME" == "check" ] && [ ! -z "$expiry" ] && [[ "$ahead" -gt 
"$expiry" ]]; then
@@ -81,12 +33,6 @@ Index: lib/keyringer/functions
    fi
  
    # Check the subkeys
-   local subkey=""
--  for subkey in $(gpg --with-colons --fixed-list-mode --list-keys 
"$recipient" | grep ^sub); do
-+  for subkey in $(gpg2 --with-colons --fixed-list-mode --list-keys 
"$recipient" | grep ^sub); do
-     local expiry=$(cut -d : -f 7 <<< "$subkey")
- 
-     if [[ -z "$expiry" ]]; then
 @@ -765,7 +765,7 @@ function keyringer_check_expiration {
        not_expired="1"
  
@@ -96,12 +42,3 @@ Index: lib/keyringer/functions
        fi
      fi
    done
-@@ -851,7 +851,7 @@ function keyringer_create_new_recipients {
-       recipient="`grep -e "^default-key" ~/.gnupg/gpg.conf | cut -d ' ' -f 2`"
- 
-       if [ ! -z "$recipient" ]; then
--        key="`gpg --fingerprint --with-colons $recipient 2> /dev/null`"
-+        key="`gpg2 --fingerprint --with-colons $recipient 2> /dev/null`"
- 
-         if [ "$?" == "0" ]; then
-           fpr="`echo "$key" | grep -e '^fpr:' | head -1 | cut -d : -f 10`"
Index: security/password-store/Makefile
===================================================================
RCS file: /cvs/ports/security/password-store/Makefile,v
retrieving revision 1.7
diff -u -p -r1.7 Makefile
--- security/password-store/Makefile    12 Jul 2019 20:49:09 -0000      1.7
+++ security/password-store/Makefile    18 Sep 2020 23:11:06 -0000
@@ -3,6 +3,7 @@
 COMMENT =      simple password store
 
 DISTNAME =     password-store-1.7.3
+REVISION =     0
 
 CATEGORIES =   security
 
@@ -20,7 +21,7 @@ RUN_DEPENDS = converters/base64 \
                devel/git \
                graphics/libqrencode \
                misc/gnugetopt \
-               security/gnupg2 \
+               security/gnupg>=2.2.23p1 \
                shells/bash \
                sysutils/colortree \
                x11/xclip
Index: security/password-store/patches/patch-src_password-store_sh
===================================================================
RCS file: 
/cvs/ports/security/password-store/patches/patch-src_password-store_sh,v
retrieving revision 1.4
diff -u -p -r1.4 patch-src_password-store_sh
--- security/password-store/patches/patch-src_password-store_sh 19 Jun 2018 
09:39:18 -0000      1.4
+++ security/password-store/patches/patch-src_password-store_sh 18 Sep 2020 
23:11:06 -0000
@@ -2,7 +2,7 @@ $OpenBSD: patch-src_password-store_sh,v 
 Index: src/password-store.sh
 --- src/password-store.sh.orig
 +++ src/password-store.sh
-@@ -323,7 +323,7 @@ cmd_init() {
+@@ -324,7 +324,7 @@ cmd_init() {
                fi
                rmdir -p "${gpg_id%/*}" 2>/dev/null
        else
@@ -11,7 +11,7 @@ Index: src/password-store.sh
                printf "%s\n" "$@" > "$gpg_id"
                local id_print="$(printf "%s, " "$@")"
                echo "Password store initialized for ${id_print%, }${id_path:+ 
($id_path)}"
-@@ -381,7 +381,10 @@ cmd_show() {
+@@ -382,7 +382,10 @@ cmd_show() {
                else
                        echo "${path%\/}"
                fi
@@ -23,7 +23,7 @@ Index: src/password-store.sh
        elif [[ -z $path ]]; then
                die "Error: password store is empty. Try \"pass init\"."
        else
-@@ -393,14 +396,16 @@ cmd_find() {
+@@ -394,14 +397,16 @@ cmd_find() {
        [[ $# -eq 0 ]] && die "Usage: $PROGRAM $COMMAND pass-names..."
        IFS="," eval 'echo "Search Terms: $*"'
        local terms="*$(printf '%s*|*' "$@")"
@@ -42,7 +42,7 @@ Index: src/password-store.sh
                [[ $? -ne 0 ]] && continue
                passfile="${passfile%.gpg}"
                passfile="${passfile#$PREFIX/}"
-@@ -432,7 +437,7 @@ cmd_insert() {
+@@ -433,7 +438,7 @@ cmd_insert() {
  
        [[ $force -eq 0 && -e $passfile ]] && yesno "An entry already exists 
for $path. Overwrite it?"
  
@@ -51,7 +51,7 @@ Index: src/password-store.sh
        set_gpg_recipients "$(dirname -- "$path")"
  
        if [[ $multiline -eq 1 ]]; then
-@@ -466,7 +471,7 @@ cmd_edit() {
+@@ -467,7 +472,7 @@ cmd_edit() {
  
        local path="${1%/}"
        check_sneaky_paths "$path"
Index: security/password-store/patches/patch-src_platform_openbsd_sh
===================================================================
RCS file: 
/cvs/ports/security/password-store/patches/patch-src_platform_openbsd_sh,v
retrieving revision 1.1
diff -u -p -r1.1 patch-src_platform_openbsd_sh
--- security/password-store/patches/patch-src_platform_openbsd_sh       7 Mar 
2017 08:53:17 -0000       1.1
+++ security/password-store/patches/patch-src_platform_openbsd_sh       18 Sep 
2020 23:11:06 -0000
@@ -1,7 +1,8 @@
 $OpenBSD: patch-src_platform_openbsd_sh,v 1.1 2017/03/07 08:53:17 bentley Exp $
---- src/platform/openbsd.sh.orig       Tue Feb 28 14:02:06 2017
-+++ src/platform/openbsd.sh    Tue Feb 28 14:02:18 2017
-@@ -2,39 +2,5 @@
+Index: src/platform/openbsd.sh
+--- src/platform/openbsd.sh.orig
++++ src/platform/openbsd.sh
+@@ -2,40 +2,6 @@
  # Copyright (C) 2015 David Dahlberg <david.dahlb...@fkie.fraunhofer.de>. All 
Rights Reserved.
  # This file is licensed under the GPLv2+. Please see COPYING for more 
information.
  
@@ -41,3 +42,4 @@ $OpenBSD: patch-src_platform_openbsd_sh,
 -
  GETOPT="gnugetopt"
  SHRED="rm -P -f"
+ BASE64="openssl base64"
Index: security/qtpass/Makefile
===================================================================
RCS file: /cvs/ports/security/qtpass/Makefile,v
retrieving revision 1.1.1.1
diff -u -p -r1.1.1.1 Makefile
--- security/qtpass/Makefile    14 Sep 2020 22:46:38 -0000      1.1.1.1
+++ security/qtpass/Makefile    18 Sep 2020 23:11:06 -0000
@@ -5,6 +5,7 @@ COMMENT=        multi-platform GUI for password
 GH_ACCOUNT=    IJHack
 GH_PROJECT=    QtPass
 GH_TAGNAME=    v1.3.2
+REVISION=      0
 PKGNAME=       ${DISTNAME:L}
 
 CATEGORIES=    security x11
@@ -23,7 +24,7 @@ MODULES=      devel/qmake \
                x11/qt5
 
 RUN_DEPENDS=   devel/git \
-               security/gnupg2 \
+               security/gnupg>=2.2.23p1 \
                security/password-store \
                security/pwgen
 
Index: sysutils/duplicity/Makefile
===================================================================
RCS file: /cvs/ports/sysutils/duplicity/Makefile,v
retrieving revision 1.52
diff -u -p -r1.52 Makefile
--- sysutils/duplicity/Makefile 5 Jul 2020 08:53:45 -0000       1.52
+++ sysutils/duplicity/Makefile 18 Sep 2020 23:11:06 -0000
@@ -3,6 +3,7 @@
 COMMENT =              encrypted backup using rsync algorithm
 
 MODPY_EGG_VERSION =    0.8.13
+REVISION =             0
 DISTNAME =             duplicity-${MODPY_EGG_VERSION}
 
 CATEGORIES =           sysutils
@@ -29,7 +30,7 @@ LIB_DEPENDS =         net/librsync
 RUN_DEPENDS =          devel/py-fasteners${MODPY_FLAVOR} \
                        devel/py-future${MODPY_FLAVOR} \
                        net/ncftp \
-                       gnupg->=2:security/gnupg2 \
+                       security/gnupg>=2.2.23p1 \
                        security/py-paramiko${MODPY_FLAVOR}
 
 TEST_DEPENDS =         archivers/gtar \
Index: sysutils/duplicity/patches/patch-duplicity_config_py
===================================================================
RCS file: sysutils/duplicity/patches/patch-duplicity_config_py
diff -N sysutils/duplicity/patches/patch-duplicity_config_py
--- sysutils/duplicity/patches/patch-duplicity_config_py        5 Jul 2020 
08:53:45 -0000       1.1
+++ /dev/null   1 Jan 1970 00:00:00 -0000
@@ -1,14 +0,0 @@
-$OpenBSD: patch-duplicity_config_py,v 1.1 2020/07/05 08:53:45 ajacoutot Exp $
-
-Index: duplicity/config.py
---- duplicity/config.py.orig
-+++ duplicity/config.py
-@@ -95,7 +95,7 @@ are_errors_fatal = {
- # source directory.
- select = None
- 
--gpg_binary = None
-+gpg_binary = 'gpg2'
- 
- # Set to GPGProfile that will be used to compress/uncompress encrypted
- # files.  Replaces encryption_keys, sign_key, and passphrase settings.
Index: sysutils/salt/Makefile
===================================================================
RCS file: /cvs/ports/sysutils/salt/Makefile,v
retrieving revision 1.155
diff -u -p -r1.155 Makefile
--- sysutils/salt/Makefile      9 Aug 2020 10:33:43 -0000       1.155
+++ sysutils/salt/Makefile      18 Sep 2020 23:11:06 -0000
@@ -18,6 +18,7 @@
 COMMENT =              remote execution and configuration management system
 
 MODPY_EGG_VERSION =    3001.1
+REVISION =             0
 DISTNAME =             salt-${MODPY_EGG_VERSION}
 
 CATEGORIES =           sysutils net devel
Index: sysutils/salt/patches/patch-salt_renderers_gpg_py
===================================================================
RCS file: /cvs/ports/sysutils/salt/patches/patch-salt_renderers_gpg_py,v
retrieving revision 1.1
diff -u -p -r1.1 patch-salt_renderers_gpg_py
--- sysutils/salt/patches/patch-salt_renderers_gpg_py   25 Jul 2020 09:25:32 
-0000      1.1
+++ sysutils/salt/patches/patch-salt_renderers_gpg_py   18 Sep 2020 23:11:06 
-0000
@@ -1,25 +0,0 @@
-$OpenBSD: patch-salt_renderers_gpg_py,v 1.1 2020/07/25 09:25:32 jasper Exp $
-
-Attempt to use gpg2 first, falling back to gpg.
-
-Index: salt/renderers/gpg.py
---- salt/renderers/gpg.py.orig
-+++ salt/renderers/gpg.py
-@@ -305,11 +305,12 @@ def _get_gpg_exec():
-     """
-     return the GPG executable or raise an error
-     """
--    gpg_exec = salt.utils.path.which("gpg")
--    if gpg_exec:
--        return gpg_exec
--    else:
--        raise SaltRenderError("GPG unavailable")
-+    for gpg_bin in ['gpg', 'gpg2']:
-+        gpg_exec = salt.utils.path.which(gpg_bin)
-+        if gpg_exec:
-+            return gpg_exec
-+
-+    raise SaltRenderError("GPG unavailable")
- 
- 
- def _get_key_dir():
Index: x11/gnome/gcr/Makefile
===================================================================
RCS file: /cvs/ports/x11/gnome/gcr/Makefile,v
retrieving revision 1.64
diff -u -p -r1.64 Makefile
--- x11/gnome/gcr/Makefile      14 May 2020 14:58:33 -0000      1.64
+++ x11/gnome/gcr/Makefile      18 Sep 2020 23:11:06 -0000
@@ -4,6 +4,7 @@ COMMENT=                library for bits of crypto UI 
 
 GNOME_PROJECT=         gcr
 GNOME_VERSION=         3.36.0
+REVISION=              0
 
 SHARED_LIBS += gck-1                     2.1 # 0.0.0
 SHARED_LIBS += gcr-base-3                3.1 # 1.0.0
@@ -30,8 +31,8 @@ LIB_DEPENDS=          x11/gtk+3 \
                        security/libgcrypt \
                        security/p11-kit
 
-BUILD_DEPENDS=         gnupg->=2:security/gnupg2
-RUN_DEPENDS=           gnupg->=2:security/gnupg2
+BUILD_DEPENDS=         security/gnupg>=2.2.23p1
+RUN_DEPENDS=           security/gnupg>=2.2.23p1
 
 CONFIGURE_ARGS=                -Dgtk_doc=false
 
Index: x11/gnome/libcryptui/Makefile
===================================================================
RCS file: /cvs/ports/x11/gnome/libcryptui/Makefile,v
retrieving revision 1.37
diff -u -p -r1.37 Makefile
--- x11/gnome/libcryptui/Makefile       7 Jul 2019 11:20:52 -0000       1.37
+++ x11/gnome/libcryptui/Makefile       18 Sep 2020 23:11:06 -0000
@@ -4,7 +4,7 @@ COMMENT=        interface components for OpenPG
 
 GNOME_PROJECT= libcryptui
 GNOME_VERSION= 3.12.2
-REVISION=      9
+REVISION=      10
 
 SHARED_LIBS +=  cryptui              2.0      # 0.0
 
@@ -35,9 +35,7 @@ LIB_DEPENDS=  x11/dbus-glib \
 
 CONFIGURE_STYLE=gnu
 
-# security/gpgme depends on either gnupg-1 or gnupg-2; we want 2.X
-BUILD_DEPENDS +=       gnupg->=2:security/gnupg2
-RUN_DEPENDS +=         gnupg->=2:security/gnupg2
-CONFIGURE_ENV +=       ac_cv_path_GNUPG=${LOCALBASE}/bin/gpg2
+BUILD_DEPENDS +=       security/gnupg>=2.2.23p1
+RUN_DEPENDS +=         security/gnupg>=2.2.23p1
 
 .include <bsd.port.mk>
Index: x11/gnome/seahorse/Makefile
===================================================================
RCS file: /cvs/ports/x11/gnome/seahorse/Makefile,v
retrieving revision 1.122
diff -u -p -r1.122 Makefile
--- x11/gnome/seahorse/Makefile 27 Jun 2020 18:14:22 -0000      1.122
+++ x11/gnome/seahorse/Makefile 18 Sep 2020 23:11:06 -0000
@@ -4,6 +4,7 @@ COMMENT=                GNOME encryption interface
 
 GNOME_PROJECT=         seahorse
 GNOME_VERSION=         3.36.2
+REVISION=              0
 
 CATEGORIES=            security
 
@@ -35,9 +36,8 @@ LIB_DEPENDS=          databases/openldap \
                        x11/gnome/libsecret \
                        x11/libhandy
 
-# security/gpgme depends on either gnupg-1 or gnupg-2; we want 2.X
-BUILD_DEPENDS +=       gnupg->=2:security/gnupg2
-RUN_DEPENDS +=         gnupg->=2:security/gnupg2
+BUILD_DEPENDS +=       security/gnupg>=2.2.23p1
+RUN_DEPENDS +=         security/gnupg>=2.2.23p1
 
 DEBUG_PACKAGES=                ${BUILD_PACKAGES}
 
Index: x11/gnome/seahorse-nautilus/Makefile
===================================================================
RCS file: /cvs/ports/x11/gnome/seahorse-nautilus/Makefile,v
retrieving revision 1.33
diff -u -p -r1.33 Makefile
--- x11/gnome/seahorse-nautilus/Makefile        7 Jul 2019 11:20:54 -0000       
1.33
+++ x11/gnome/seahorse-nautilus/Makefile        18 Sep 2020 23:11:06 -0000
@@ -4,7 +4,7 @@ COMMENT=                GnuPG extension for nautilus(1
 
 GNOME_PROJECT=         seahorse-nautilus
 GNOME_VERSION=         3.10.1
-REVISION=              12
+REVISION=              13
 
 CATEGORIES=            security
 
@@ -32,10 +32,8 @@ LIB_DEPENDS=         x11/gnome/gcr \
 
 CONFIGURE_STYLE=       gnu
 
-# security/gpgme depends on either gnupg-1 or gnupg-2; we want 2.X
-BUILD_DEPENDS +=       gnupg->=2:security/gnupg2
-RUN_DEPENDS +=         gnupg->=2:security/gnupg2
-CONFIGURE_ENV +=       ac_cv_path_GNUPG=${LOCALBASE}/bin/gpg2
+BUILD_DEPENDS +=       security/gnupg>=2.2.23p1
+RUN_DEPENDS +=         security/gnupg>=2.2.23p1
 
 post-install:
        rm ${PREFIX}/lib/nautilus/extensions-3.0/*.{a,la}
Index: x11/gnome/seahorse-sharing/Makefile
===================================================================
RCS file: /cvs/ports/x11/gnome/seahorse-sharing/Makefile,v
retrieving revision 1.26
diff -u -p -r1.26 Makefile
--- x11/gnome/seahorse-sharing/Makefile 7 Jul 2019 11:20:54 -0000       1.26
+++ x11/gnome/seahorse-sharing/Makefile 18 Sep 2020 23:11:06 -0000
@@ -4,7 +4,7 @@ COMMENT=                PGP public keys sharing via DN
 
 GNOME_PROJECT=         seahorse-sharing
 GNOME_VERSION=         3.8.0
-REVISION=              10
+REVISION=              11
 
 CATEGORIES=            net security
 
@@ -30,10 +30,8 @@ LIB_DEPENDS=         devel/libsoup \
 
 CONFIGURE_STYLE=       gnu
 
-# security/gpgme depends on either gnupg-1 or gnupg-2; we want 2.X
-BUILD_DEPENDS +=       gnupg->=2:security/gnupg2
-RUN_DEPENDS +=         gnupg->=2:security/gnupg2
-CONFIGURE_ENV +=       ac_cv_path_GNUPG=${LOCALBASE}/bin/gpg2
+BUILD_DEPENDS +=       security/gnupg>=2.2.23p1
+RUN_DEPENDS +=         security/gnupg>=2.2.23p1
 
 FAKE_FLAGS=            sysconfdir=${PREFIX}/share/examples/seahorse-sharing
 
Index: x11/kde-applications/kleopatra/Makefile
===================================================================
RCS file: /cvs/ports/x11/kde-applications/kleopatra/Makefile,v
retrieving revision 1.9
diff -u -p -r1.9 Makefile
--- x11/kde-applications/kleopatra/Makefile     7 Sep 2020 14:49:20 -0000       
1.9
+++ x11/kde-applications/kleopatra/Makefile     18 Sep 2020 23:11:06 -0000
@@ -2,6 +2,7 @@
 
 COMMENT =      certificate manager and a universal crypto GUI
 DISTNAME =     kleopatra-${VERSION}
+REVISION =     0
 CATEGORIES =   security x11
 
 SHARED_LIBS +=  kleopatraclientcore     1.0 # 1.3.0
@@ -24,7 +25,7 @@ MODKDE5_DOCS = yes
 
 MODULES +=     x11/kde-applications
 
-RUN_DEPENDS =  security/gnupg2
+RUN_DEPENDS =  security/gnupg>=2.2.23p1
 BUILD_DEPENDS =        devel/boost
 
 LIB_DEPENDS =  devel/kf5/kauth \


-- 
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE

Reply via email to