Based on my diff from 2019 and reminded by the diff from Josh Grosse.
Other chabges:
- landry@ drops MAINTAINER
- switch HOMEPAGE to HTTPS
- add comments about PROJ support and running regression tests
OK landry@
Comment:
C++ library to parse/format/validate phone numbers
Description:
Google's common C++ library for parsing, formatting, and validating
international phone numbers.
Maintainer: The OpenBSD ports mailing-list <ports@openbsd.org>
WWW: https://github.com/google/libphonenumber
Tweak and OK sthen@
Release notes:
https://github.com/arvidn/libtorrent/releases/tag/v1.2.13
- remove autotools and use CONFIGURE_STYLE = gnu now that default C++
standard is detected. see:
https://github.com/arvidn/libtorrent/pull/5026
- major bump because check_sym reports removed symbols
- carry ${FILESDIR}/setup.py from 1.2.11 because 1.2.12 relies on
boost-build
- remove patches/patch-configure_ac
- Uses ${MODPY_EGG_VERSION} and SUBST_CMD in setup.py to only have to
update version in one place (from sthen@)
- Uses ${MODPY_BIN} in ${FILESDIR}/setup.py (from sthen@)
- Remove -L{LOCALBASE}/lib in ${FILESDIR}/setup.py. Python bindings
incorrectly linked -ltorrent-rasterbar with
/usr/local/lib/libtorrent-rasterbar.so.3.0 instead of the freshly
built ${WRKSRC}/src/.libs/libtorrent-rasterbar.so.4.0.
rsadowski@ reviewed older version of this diff
thfr@ gave feedback on using check_sym and deprecation not necessitating
major bump
sthen@ gave feedback on python bits in setup.py
ok mariani@ who also tested deluge (older version of this diff) and
qbittorrent
This causes it not to package due to a missing RUN_DEPENDS in p5-Moose.
While working on fixing the other, at least let this build and provide
a better error at runtime.
Noticed by naddy@
PBKDF2 is a secure password hashing algorithm that uses the techniques of
"key strengthening" to make the complexity of a brute-force attack arbitrarily
high. PBKDF2 uses any other cryptographic hash or cipher (by convention,
usually HMAC-SHA1, but Crypt::PBKDF2 is fully pluggable), and allows for an
arbitrary number of iterations of the hashing function, and a nearly unlimited
output hash size (up to 2**32 - 1 times the size of the output of the backend
hash). The hash is salted, as any password hash should be, and the salt may
also be of arbitrary size.
From MAINTAINER wen heping <wenheping2000 () hotmail ! com>
OK (with tweaks from) bluhm@
Digest::SHA3 is a complete implementation of the NIST SHA-3 cryptographic hash
function, as specified in Draft FIPS 202 (SHA-3 Standard: Permutation-Based
Hash and Extendable-Output Functions).
From MAINTAINER wen heping <wenheping2000 () hotmail ! com>
OK (with tweaks from) bluhm@