Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

uim: PLIST fix #153

Open
wants to merge 1 commit into
base: trunk
Choose a base branch
from
Open

uim: PLIST fix #153

wants to merge 1 commit into from

Conversation

afukumoto
Copy link

inputmethod/uim: fix for make package failure if gtk2 is disabled.

netbsd-srcmastr pushed a commit that referenced this pull request Jan 27, 2025
xca 2.8.0 Sun Oct 13 2024
-------------------------

 * Add SHA3 algorithms to the select box
 * Close #593: App freezes/crashes when trying to export certain keys
 * Close #306 #537: Allow Database-driver options in config file
 * Close #537: macos: Compile mariadb-connector and qsqlmysql
 * Close #152: How can we specify the Cryptographic Service Provider
 * Close #590: MacOS OpenSSL legacy provider not loaded
 * Close #199: Templates and Key Identifiers
 * Close #239: Check existing Name Constraints
 * Add OpenSSL PURPOSE and validation results
 * Close #587: Incomplete refactoring of adapt_explicit_subj
 * Combine #90 and #315 and support UPN in name constraints
 * Close #90, #361: Name Constraints (RFC5280 section 4.2.1.10)
 * Close #296: Proper plurals
 * Close #88: Export to multiple files with common or individual password
 * Close #313: Support JWK export format of certificates
 * Close #359: Symlink to PKCS#11 lib resolved
 * Close #552: issues with icons in gnome dock
 * Close #315 Support UPN type for EAP/802.1X certificate
 * Add korean translation
 * Close #287: template don't save/restore correctly
 * Close #351: a1int::getLong() doesn't handle all error cases
 * Close #401: Write PEM data to a file especially for crlgen
 * Close #548: export certificate: error using child folder
 * Close #391: hide expired and revoked certificates

xca 2.7.0 Tue Aug 27 2024
-------------------------

 * Close #311: Install QT translation files again
 * Close #304: oids.txt not found etc if prefix non-standard
 * Add cmdline option to disable native dialogs
 * Close #364: Export ED25519 private key with password
 * Switch encryption in "Cert+PKCS#8" and "Database dump
   mode from DES3-EDE to AES-256
 * Drop support of encrypted PVK files.
 * Windows/Mac build: switch to QT 6.6.3
 * Close #554: Missing option to disable file association in Windows setup
 * Close #395: Flexible Clipboard Export
 * Close #550: Fix compiling tests issue by providing -pthread link flag.
 * Fix calendar export for CAs
 * Support importing existing OpenVPN TLS Auth keys
 * Fix "Copy extensions from request" function
 * Fix login via PinPad on e.g ReinerSCT
 * Extend #383: tag insecure PFX/PKCS#12 algorithms
 * Close #536: macos include OpenSSL legacy provider
 * Close #532: XCA not in English on macos
 * Close #89: ta.key for OpenVPN tls-auth
 * Close #496: PKCS11 access to AWS CloudHSM failed
 * Yubikey improvements

xca 2.6.0 Mon Feb 26 2024
-------------------------

 * Update documentation of certificate export and remote databases
 * Close #520: Fix permanent processor load
 * Close #518: Export certificates for ovpn file
 * Close #512 #474 #481 #506 #509: SHA1 based MAC for PKCS12
 * Close #458 #511 #503 #500 #494 #484 #482 #475: Support legacy keys
   and automatically transform them if possible.
 * Close #493: Renew Certificate freeze XCA
 * Close #477: paste an encrypted private key results in a crash
 * Fix crash when deleting CA certificates
 * Close #480: add flatpak build information and github action
 * Close #402: Subject Alternative Name not filled by all CN
 * Improve import: Finish multi import when empty
 * Add File extensions in Info.plist supported by XCA
 * Close #384: Quick view of certificates without trying to open XCA
 * Close #459: pass private key password
 * Close #465: Export PEM + Key in one File
 * Close #460: Impossible to import PKCS#12 (RC40_CBC)
 * Make XCA AppStore compliant with -DAPPSTORE_COMPLIANT=ON

xca 2.5.0 Sun Sep 24 2023
-------------------------

 * Close #423: parameter --name is not respected when running with CLI
 * Close #457: Support Qt5 < 5.12 / python3-sphinxcontrib.qthelp
 * Close #440: yellow background makes date text hard to read in dark themes
 * Close #437: loading CRL at startup generates an error
 * Close #444 cannot update template internal name
 * Close #442: asan checks failed
 * Close #446: show more information in Recent Databases
 * Improve/Fix database loading
 * Document vCalendar/ics feature #456
 * Fix possible segfault caused by wrong free()
 * Add Bulgarian translation
 * Close #368: error while creating CRL with CA using EC key (ed25519)
 * Treat CKA_ID as byte array, not Bignum
 * Fix #321 - decryptKey shows OpenSSL error
 * Merge #325 Update entitlement.plist
 * Close #366: Not Responding after upgrade
 * Add Persian translation .ts file to XCA.
 * Close #327: "Dump database" dumps everything to everywhere
 * Close #317: "Please insert card: ..." message
 * Add Indonesian translation
 * Close #283 Nitrokey HSM2 can't create EC keys on 2.4.0
 * Switch from autotools/qmake to cmake
 * Close #278: Miss components to connect remote database
 * Commandline: Add "--list-items" to print a list of database items
 * Close #67: possibility to ignore password prompt from CLI
 * Close #259: Follow the XDG base directory specification
 * Add support for Qt6 and OpenSSL 3.x
 * Drop support for Qt4
 * Drop support for old XCA < 2.0.0 databases
 * Drop support for OpenSSL < 1.1.0

xca 2.4.0 Fri May 07 2021
-------------------------

 * Unify XCA icon (certificate) on all platforms
 * Close #247: Apple silicon (M1) configure fixes
 * Add Microsoft BitLocker extended key usage
 * Disregard OpenSSL 0.9.8 compatibility
 * Add bash completion script
 * Add context sensitive help
 * Convert documentation from linuxdoc/SGML to sphinxdoc
 * Close #258: xca aborts on exit and on access to own templates
 * Close #142: Support Ed25519 Import / Export private SSH2 key
 * Close #142: Support Ed25519: Key-generation, import, export
 * Close #251: AuthorityKeyIdentifier: use issuer:always
 * Change language maintainer of brazilian portuguese
 * Close #230: Change PKCS12 export extension from .p12 to .pfx
 * Close #208: XCA hung when importing EC keys. For example prime256v1
 * Close #210: Make dialog to edit SAN less strict
 * Close #224: Store original path/filename on import
 * Close #213: configure.ac: add description to AC_DEFINE_UNQUOTED
 * Close #172 #46: Multiple OCSP Responders
 * Store default database and recently opened file as UTF8
 * Close #157 Generate and export CRLs from commandline
 * Add command line support for creating CRLs, keys and analyzing items

xca 2.3.0 Wed Apr 29 2020
-------------------------

 * Close #191 OID LN differs warning popups at startup
 * Close #189 Database compaction #189
 * Improve PKCS11 library loading for portable app
 * Refactor native separators / and \ on windows.
 * Support TLS encrypted MariaDB and PostgreSQL connection
 * Close #182: UI not using Windows native theme in 2.2.1 portable
 * Close #70: cant open ics file in ical on macos mojave
 * Close #72: Add checkbox for OCSP staple feature
 * Use DESTDIR instead of destdir when installing. Follows autotools convention.
 * Close #172 #46: Multiple OCSP Responders
 * Close #170 xca-portable-2.2.1 cannot change language
 * Fix certificate assignment when importing a CA certificate
 * Close #163: Show key type/size on column of Certificates tab

xca 2.2.1 Thu Jan 30 2020
-------------------------

 * Close #159 Opening existing database

xca 2.2.0 Wed Jan 29 2020
-------------------------

 * Switch to MSI installer
 * Close #129 Unattended Installation
 * Rename HTTPS templates to TLS and support KU/EKU extensions needed by OpenVPN
 * Close #93 Default output folder / Improve Portable App usability
 * Improve EC Curve selection for key generation.
 * Close #21 Support for ODBC (MSSQL)
 * Close #136 Provide 64bit version of xca
 * Close #156 secp256k1, secp256r1 and NIST-P256
 * Transfer Key Usage and Extended Key Usage critical flags
 * Improve item loading. Inspired by #153
 * Add japanese translation
 * Close #138: Portable Version does not remember paths
 * Close #83: Token selection should not insist on name or serial of the token
 * Close #95: Copy mysql and psql windows dll files into portable app
 * Close #144: Database export has issues with wildcards in internal names
 * Close #143: Hotkey for import
 * Close #140: Certificate renewal with option to preserved serial number
 * Fix possible XCA crash
 * Add Dutch translation
 * Add Chinese translation
 * Add Italian language
 * CLose #120: Mark signed a request doesn't work
 * Close #119: Rename "PostgreSQL 6 and 7" to just "PostgreSQL"
 * Close #116: Duplicate extensions erroneously shown
 * Close #114: SAN - IPv6 address input not working
 * Close #68 Generating large DH params freezes UI
 * Support concurrent database access.
 * Close #91: Change order of "PKCS#11 provider"
 * Extend PEM files by human readable information about the item
 * Support ecdsa SSH public keys
 * Close #98 Add comment at import/export RSA keys from/to SSH public key
 * Close #101: Finish Rename with Enter shows Property Dialog
 * Close #104: Also show sha256 digests of public keys
 * Close #82: Renew CA ROOT Cert
 * Verify imported keys thoroughly
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant