sthen
6db4f14108
update to py3-bcrypt-4.0.1
2022-11-14 11:34:47 +00:00
sthen
716f142842
bump for MODPY_DEFAULT_VERSION_3 change
2022-11-13 15:29:09 +00:00
sthen
6781029335
bump REVISION for ports using rust, so that pkg_add -u for i386 users
...
updates to packages without -znotext (i.e. with text relocations disabled)
makes sense to phessler, semarie, tb
2022-10-28 10:00:45 +00:00
sthen
2206a80000
rename MODPY_PEP517 to MODPY_PYBUILD which is a bit less of a
...
magic-numbers name and more of a nod at the frontend we're actually
using for the build.
2022-09-13 20:56:17 +00:00
sthen
280d0daa2a
update to py3-bcrypt-4.0.0
2022-08-26 20:51:13 +00:00
sthen
abb59a481b
update to py3-bcrypt-3.2.2
2022-05-03 07:57:42 +00:00
naddy
8c0294c2fa
drop RCS Ids
2022-03-11 19:53:16 +00:00
sthen
29389da44c
bump REVISION for switch from Python 3.8 -> 3.9
2021-11-02 00:02:15 +00:00
sthen
926639171e
now that py-paramiko is py3-only, we can update py-bcrypt to 3.2.0
...
which no longer supports py2.
2021-09-08 07:19:52 +00:00
kmos
2795ba2341
Bump the REVISION on all ports that use the python2 version of
...
py-setuptools.
Also change the lang/python module to use the new
devel/py2-setuptools for python2 ports
ok sthen@
2021-05-21 19:50:21 +00:00
sthen
d9cfe4113e
bump REVISION; python 3 default changed to 3.8
2020-07-03 21:12:24 +00:00
sthen
a3e5de8f53
drop maintainer
2020-02-03 20:40:37 +00:00
sthen
d7d2db6646
update to py-bcrypt 3.1.7, basically a noop for us
2019-06-20 14:05:34 +00:00
sthen
9c6e9626b9
s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
...
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
d7f0752227
bump all the py3 things, _SYSTEM_VERSION didn't quite work out how
...
we expected and it's easier|safer to do it this way than fiddle with
pkg_add now. thanks aja for update tests with a quick bulk.
2019-04-28 20:51:26 +00:00
sthen
e3281aea07
update to py-bcrypt 3.1.6
2019-01-19 15:50:39 +00:00
lum
ee1057427c
update to py-bcrypt-3.1.5 and add testing to Makefile. ok sthen@
2018-12-20 17:31:21 +00:00
espie
df1da998a1
remove traces of utf8 encoding in pkg/DESCR
...
bump accordingly
2018-02-27 21:47:38 +00:00
sthen
60fa4bd08e
update to py-bcrypt-3.1.4
2017-11-03 09:54:45 +00:00
sthen
c62bdd48a2
update to py-bcrypt-3.1.3
2017-03-17 08:35:27 +00:00
sthen
d87ef78712
update to py-bcrypt-3.1.2
2017-02-07 14:45:07 +00:00
landry
56db554a9b
bump ports depending on python3 in security
2017-01-03 19:26:14 +00:00
danj
d7f0479858
Unbreak after py-setuptools update. This makes use of MODPY_ABI_TAG
...
ok sthen@
2016-10-29 18:25:56 +00:00
sthen
a3fbf38e5e
update to py-bcrypt-3.1.1
2016-10-11 13:57:08 +00:00
sthen
7d1625895a
update to py-bcrypt-3.1.0
2016-07-01 15:28:44 +00:00
sthen
d2b6e71ae8
BUILD_DEPENDS=${RUN_DEPENDS}, breakage found by kili
2016-01-15 19:58:25 +00:00
sthen
d82ed59233
update to py-bcrypt-2.0.0 (maybe a different codebase or fork; anyway
...
it supports $2b$ which the in-tree version doesn't) and take maintainer
2016-01-15 12:34:14 +00:00
sthen
ee57a78901
bump REVISION for setuptools dep change.
2015-09-29 10:52:28 +00:00
jasper
4ca6024ca2
bump after switch from py3-distribute to py3-setuptools
...
ok rpointel@
2014-09-29 07:02:02 +00:00
rpointel
403fd3e5d7
changed python3 default version so bump revision.
2014-06-03 11:35:12 +00:00
sthen
e99b9c3602
SECURITY update to py-bcrypt 0.4, from Francisco de Borja Lopez Rio
...
- while there, fix WANTLIB and enable python 3 support; by me
Fix concurrency bug reported by Alan Fairless of spideroak.com:
Multiple threads may hash into the same memory area simultaneously.
This may manifest as occasional random authentication failures (as
user-a's password hash is compared to user-b's), but could potentially
be used to bypass password checking by an attacker (user-a attempts
login on user-b's account, while simultaneously flooding auth requests
against user-a's account to overwrite the hash).
2014-03-19 11:15:56 +00:00
sthen
e2954dfa4a
import ports/security/py-bcrypt, ok benoit@
...
py-bcrypt is a Python wrapper of OpenBSD's Blowfish password hashing code,
as described in "A Future-Adaptable Password Scheme" by Niels Provos and
David Mazières.
This system hashes passwords using a version of Bruce Schneier's
Blowfish block cipher with modifications designed to raise the cost of
off-line password cracking and frustrate fast hardware implementation.
The computation cost of the algorithm is parametised, so it can be
increased as computers get faster. The intent is to make a compromise
of a password database less likely to result in an attacker gaining
knowledge of the plaintext passwords (e.g. using John the Ripper).
2013-03-26 21:37:26 +00:00