Commit Graph

32 Commits

Author SHA1 Message Date
sthen
6db4f14108 update to py3-bcrypt-4.0.1 2022-11-14 11:34:47 +00:00
sthen
716f142842 bump for MODPY_DEFAULT_VERSION_3 change 2022-11-13 15:29:09 +00:00
sthen
6781029335 bump REVISION for ports using rust, so that pkg_add -u for i386 users
updates to packages without -znotext (i.e. with text relocations disabled)
makes sense to phessler, semarie, tb
2022-10-28 10:00:45 +00:00
sthen
2206a80000 rename MODPY_PEP517 to MODPY_PYBUILD which is a bit less of a
magic-numbers name and more of a nod at the frontend we're actually
using for the build.
2022-09-13 20:56:17 +00:00
sthen
280d0daa2a update to py3-bcrypt-4.0.0 2022-08-26 20:51:13 +00:00
sthen
abb59a481b update to py3-bcrypt-3.2.2 2022-05-03 07:57:42 +00:00
naddy
8c0294c2fa drop RCS Ids 2022-03-11 19:53:16 +00:00
sthen
29389da44c bump REVISION for switch from Python 3.8 -> 3.9 2021-11-02 00:02:15 +00:00
sthen
926639171e now that py-paramiko is py3-only, we can update py-bcrypt to 3.2.0
which no longer supports py2.
2021-09-08 07:19:52 +00:00
kmos
2795ba2341 Bump the REVISION on all ports that use the python2 version of
py-setuptools.

Also change the lang/python module to use the new
devel/py2-setuptools for python2 ports

ok sthen@
2021-05-21 19:50:21 +00:00
sthen
d9cfe4113e bump REVISION; python 3 default changed to 3.8 2020-07-03 21:12:24 +00:00
sthen
a3e5de8f53 drop maintainer 2020-02-03 20:40:37 +00:00
sthen
d7d2db6646 update to py-bcrypt 3.1.7, basically a noop for us 2019-06-20 14:05:34 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
d7f0752227 bump all the py3 things, _SYSTEM_VERSION didn't quite work out how
we expected and it's easier|safer to do it this way than fiddle with
pkg_add now. thanks aja for update tests with a quick bulk.
2019-04-28 20:51:26 +00:00
sthen
e3281aea07 update to py-bcrypt 3.1.6 2019-01-19 15:50:39 +00:00
lum
ee1057427c update to py-bcrypt-3.1.5 and add testing to Makefile. ok sthen@ 2018-12-20 17:31:21 +00:00
espie
df1da998a1 remove traces of utf8 encoding in pkg/DESCR
bump accordingly
2018-02-27 21:47:38 +00:00
sthen
60fa4bd08e update to py-bcrypt-3.1.4 2017-11-03 09:54:45 +00:00
sthen
c62bdd48a2 update to py-bcrypt-3.1.3 2017-03-17 08:35:27 +00:00
sthen
d87ef78712 update to py-bcrypt-3.1.2 2017-02-07 14:45:07 +00:00
landry
56db554a9b bump ports depending on python3 in security 2017-01-03 19:26:14 +00:00
danj
d7f0479858 Unbreak after py-setuptools update. This makes use of MODPY_ABI_TAG
ok sthen@
2016-10-29 18:25:56 +00:00
sthen
a3fbf38e5e update to py-bcrypt-3.1.1 2016-10-11 13:57:08 +00:00
sthen
7d1625895a update to py-bcrypt-3.1.0 2016-07-01 15:28:44 +00:00
sthen
d2b6e71ae8 BUILD_DEPENDS=${RUN_DEPENDS}, breakage found by kili 2016-01-15 19:58:25 +00:00
sthen
d82ed59233 update to py-bcrypt-2.0.0 (maybe a different codebase or fork; anyway
it supports $2b$ which the in-tree version doesn't) and take maintainer
2016-01-15 12:34:14 +00:00
sthen
ee57a78901 bump REVISION for setuptools dep change. 2015-09-29 10:52:28 +00:00
jasper
4ca6024ca2 bump after switch from py3-distribute to py3-setuptools
ok rpointel@
2014-09-29 07:02:02 +00:00
rpointel
403fd3e5d7 changed python3 default version so bump revision. 2014-06-03 11:35:12 +00:00
sthen
e99b9c3602 SECURITY update to py-bcrypt 0.4, from Francisco de Borja Lopez Rio
- while there, fix WANTLIB and enable python 3 support; by me

Fix concurrency bug reported by Alan Fairless of spideroak.com:
Multiple threads may hash into the same memory area simultaneously.
This may manifest as occasional random authentication failures (as
user-a's password hash is compared to user-b's), but could potentially
be used to bypass password checking by an attacker (user-a attempts
login on user-b's account, while simultaneously flooding auth requests
against user-a's account to overwrite the hash).
2014-03-19 11:15:56 +00:00
sthen
e2954dfa4a import ports/security/py-bcrypt, ok benoit@
py-bcrypt is a Python wrapper of OpenBSD's Blowfish password hashing code,
as described in "A Future-Adaptable Password Scheme" by Niels Provos and
David Mazières.

This system hashes passwords using a version of Bruce Schneier's
Blowfish block cipher with modifications designed to raise the cost of
off-line password cracking and frustrate fast hardware implementation.
The computation cost of the algorithm is parametised, so it can be
increased as computers get faster. The intent is to make a compromise
of a password database less likely to result in an attacker gaining
knowledge of the plaintext passwords (e.g. using John the Ripper).
2013-03-26 21:37:26 +00:00