Commit graph

4 commits

Author SHA1 Message Date
seb
c3f1e700ad Bump the PKGREVISION for all packages which depend directly on perl,
to trigger/signal a rebuild for the transition 5.10.1 -> 5.12.1.

The list of packages is computed by finding all packages which end
up having either of PERL5_USE_PACKLIST, BUILDLINK_API_DEPENDS.perl,
or PERL5_PACKLIST defined in their make setup (tested via
"make show-vars VARNAMES=..."), minus the packages updated after
the perl package update.

sno@ was right after all, obache@ kindly asked and he@ led the
way. Thanks!
2010-08-21 16:32:42 +00:00
sno
041d021411 Updating security/p5-Crypt-Eksblowfish from 0.007 to 0.008
pkgsrc changes:
- Adding license definition
- Adjusting dependencies

Upstream changes:
version 0.008; 2010-03-11
  * bugfix: avoid memory leak when returning block to Perl space
  * check for required Perl version at runtime
  * in XS, avoid using "class" as a variable name, for compatibility
    with C++ compilers
  * in Build.PL, explicitly declare configure-time requirements
  * remove bogus "exit 0" from Build.PL
2010-03-16 10:14:56 +00:00
seb
f7e908e851 Update p5-Crypt-Eksblowfish from version 0.005 to version 0.007.
Pkgsrc changes:
- Adjust dependencies
- Whitespace fix in Makefile to placate pkglint

Upstream changes:
version 0.007; 2009-04-22

  * in XS code, use the correct "PREINIT:" instead of "INIT:" to introduce
    variable declarations

  * test Uklblowfish with long keys

version 0.006; 2009-04-21

  * in C::E::Family, new method "as_class" to work around Crypt::CBC
    brain damage

  * use simpler "parent" pragma in place of "base"

  * in documentation, use the term "truth value" instead of the less
    precise "boolean"

  * drop prototypes from method subs (where the prototypes have no effect)

  * in C::E::Family, abandon use of the "fields" module

  * add casts for pointer target signedness to avoid compiler warnings

  * use full stricture in Build.PL
2009-05-03 06:41:23 +00:00
abs
7971424486 Added security/p5-Crypt-Eksblowfish version 0.005
Eksblowfish is a variant of the Blowfish cipher, modified to make
the key setup very expensive. ("Eks" stands for "expensive key
schedule".) This doesn't make it significantly cryptographically
stronger, but is intended to hinder brute-force attacks. It also
makes it unsuitable for any application requiring key agility. It
was designed by Niels Provos and David Mazieres for password hashing
in OpenBSD. See Crypt::Eksblowfish::Bcrypt for the hash algorithm.
See Crypt::Eksblowfish::Blowfish for the unmodified Blowfish cipher.

Eksblowfish is a parameterised (family-keyed) cipher. It takes a
cost parameter that controls how expensive the key scheduling is.
It also takes a family key, known as the "salt". Cost and salt
parameters together define a cipher family. Within each family, a
key determines an encryption function in the usual way. See
Crypt::Eksblowfish::Family for a way to encapsulate an Eksblowfish
cipher family.
2008-11-07 20:52:54 +00:00