import ports/security/py-bcrypt, ok benoit@

py-bcrypt is a Python wrapper of OpenBSD's Blowfish password hashing code,
as described in "A Future-Adaptable Password Scheme" by Niels Provos and
David Mazières.

This system hashes passwords using a version of Bruce Schneier's
Blowfish block cipher with modifications designed to raise the cost of
off-line password cracking and frustrate fast hardware implementation.
The computation cost of the algorithm is parametised, so it can be
increased as computers get faster. The intent is to make a compromise
of a password database less likely to result in an attacker gaining
knowledge of the plaintext passwords (e.g. using John the Ripper).
This commit is contained in:
sthen 2013-03-26 21:37:26 +00:00
parent dfacbd3e97
commit e2954dfa4a
4 changed files with 47 additions and 0 deletions

View File

@ -0,0 +1,24 @@
# $OpenBSD: Makefile,v 1.1.1.1 2013/03/26 21:37:26 sthen Exp $
COMMENT= bcrypt blowfish password hashing for Python
MODPY_EGG_VERSION= 0.3
DISTNAME= py-bcrypt-${MODPY_EGG_VERSION}
CATEGORIES= security
HOMEPAGE= https://code.google.com/p/py-bcrypt/
# ISC/BSD
PERMIT_PACKAGE_CDROM= Yes
MASTER_SITES= https://py-bcrypt.googlecode.com/files/
MODULES= lang/python
MODPY_SETUPTOOLS= Yes
TEST_DEPENDS= ${BUILD_PKGPATH}
do-test:
cd ${WRKSRC}/test && ${MODPY_BIN} ./test.py
.include <bsd.port.mk>

View File

@ -0,0 +1,2 @@
SHA256 (py-bcrypt-0.3.tar.gz) = rxL5lFTolenkMMdXI8O5QZwLzNDqd4A2YtaprFb2Qls=
SIZE (py-bcrypt-0.3.tar.gz) = 17232

View File

@ -0,0 +1,11 @@
py-bcrypt is a Python wrapper of OpenBSD's Blowfish password hashing code,
as described in "A Future-Adaptable Password Scheme" by Niels Provos and
David Mazières.
This system hashes passwords using a version of Bruce Schneier's
Blowfish block cipher with modifications designed to raise the cost of
off-line password cracking and frustrate fast hardware implementation.
The computation cost of the algorithm is parametised, so it can be
increased as computers get faster. The intent is to make a compromise
of a password database less likely to result in an attacker gaining
knowledge of the plaintext passwords (e.g. using John the Ripper).

View File

@ -0,0 +1,10 @@
@comment $OpenBSD: PLIST,v 1.1.1.1 2013/03/26 21:37:26 sthen Exp $
lib/python${MODPY_VERSION}/site-packages/bcrypt/
lib/python${MODPY_VERSION}/site-packages/bcrypt/__init__.py
lib/python${MODPY_VERSION}/site-packages/bcrypt/__init__.pyc
lib/python${MODPY_VERSION}/site-packages/bcrypt/_bcrypt.so
lib/python${MODPY_VERSION}/site-packages/py_bcrypt-${MODPY_EGG_VERSION}-py${MODPY_VERSION}.egg-info/
lib/python${MODPY_VERSION}/site-packages/py_bcrypt-${MODPY_EGG_VERSION}-py${MODPY_VERSION}.egg-info/PKG-INFO
lib/python${MODPY_VERSION}/site-packages/py_bcrypt-${MODPY_EGG_VERSION}-py${MODPY_VERSION}.egg-info/SOURCES.txt
lib/python${MODPY_VERSION}/site-packages/py_bcrypt-${MODPY_EGG_VERSION}-py${MODPY_VERSION}.egg-info/dependency_links.txt
lib/python${MODPY_VERSION}/site-packages/py_bcrypt-${MODPY_EGG_VERSION}-py${MODPY_VERSION}.egg-info/top_level.txt