Date: Thu, 9 May 2019 20:09:07 +0000 (UTC) From: Steve Wills <swills@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r501144 - in head/security/i2p: . files Message-ID: <201905092009.x49K97DF036464@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: swills Date: Thu May 9 20:09:07 2019 New Revision: 501144 URL: https://svnweb.freebsd.org/changeset/ports/501144 Log: security/i2p: update to 0.9.40 PR: 237809 Submitted by: Neel Chauhan <neel@neelc.org> (maintainer) Added: head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java (contents, props changed) head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java (contents, props changed) Deleted: head/security/i2p/files/patch-apps_streaming_java_src_net_i2p_client_streaming_impl_I2PSocketManagerFull.java Modified: head/security/i2p/Makefile (contents, props changed) head/security/i2p/distinfo (contents, props changed) Modified: head/security/i2p/Makefile ============================================================================== --- head/security/i2p/Makefile Thu May 9 20:07:39 2019 (r501143) +++ head/security/i2p/Makefile Thu May 9 20:09:07 2019 (r501144) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= i2p -DISTVERSION= 0.9.38 +DISTVERSION= 0.9.40 CATEGORIES= security java net-p2p MASTER_SITES= SF/${PORTNAME:tl}/${PORTVERSION} \ http://download.i2p2.no/releases/${PORTVERSION}/ \ Modified: head/security/i2p/distinfo ============================================================================== --- head/security/i2p/distinfo Thu May 9 20:07:39 2019 (r501143) +++ head/security/i2p/distinfo Thu May 9 20:09:07 2019 (r501144) @@ -1,3 +1,3 @@ -TIMESTAMP = 1548602826 -SHA256 (i2psource_0.9.38.tar.bz2) = 65fe327fdd11272a764c9e1c6ae1f38b151cea9003216b861c7ff2b281ca2970 -SIZE (i2psource_0.9.38.tar.bz2) = 30702106 +TIMESTAMP = 1557365594 +SHA256 (i2psource_0.9.40.tar.bz2) = 5d31e0a324dfe429135ac17595b3cab3e81d85d4aa7a720db402dec47bfeda23 +SIZE (i2psource_0.9.40.tar.bz2) = 30808508 Added: head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java Thu May 9 20:09:07 2019 (r501144) @@ -0,0 +1,11 @@ +--- apps/i2pcontrol/java/com/thetransactioncompany/jsonrpc2/package-info.java.orig 2019-04-17 11:52:29.174848000 -0400 ++++ apps/i2pcontrol/java/com/thetransactioncompany/jsonrpc2/package-info.java 2019-04-17 11:55:57.085931000 -0400 +@@ -13,7 +13,7 @@ + * exception of <i>batching / multicall</i>. This feature is deliberately left + * out as it tends to confuse users (judging by posts in the JSON-RPC forum). + * +- * <p>See the <a href="http://www.jsonrpc.org/specification"></a>JSON-RPC 2.0 ++ * <p>See the <a href="http://www.jsonrpc.org/specification">JSON-RPC 2.0 + * specification</a> for more information or write to the + * <a href="https://groups.google.com/forum/#!forum/json-rpc">user group</a> if + * you have questions. Added: head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java Thu May 9 20:09:07 2019 (r501144) @@ -0,0 +1,35 @@ +--- apps/i2pcontrol/java/org/mindrot/jbcrypt/BCrypt.java.orig 2019-04-17 11:58:51.939865000 -0400 ++++ apps/i2pcontrol/java/org/mindrot/jbcrypt/BCrypt.java 2019-04-17 11:58:57.299331000 -0400 +@@ -32,25 +32,25 @@ + * call the hashpw method with a random salt, like this: + * <p> + * <code> +- * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt()); <br /> ++ * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt()); + * </code> + * <p> + * To check whether a plaintext password matches one that has been + * hashed previously, use the checkpw method: + * <p> + * <code> +- * if (BCrypt.checkpw(candidate_password, stored_hash))<br /> +- * System.out.println("It matches");<br /> +- * else<br /> +- * System.out.println("It does not match");<br /> ++ * if (BCrypt.checkpw(candidate_password, stored_hash)) ++ * System.out.println("It matches"); ++ * else ++ * System.out.println("It does not match"); + * </code> + * <p> + * The gensalt() method takes an optional parameter (log_rounds) + * that determines the computational complexity of the hashing: + * <p> + * <code> +- * String strong_salt = BCrypt.gensalt(10)<br /> +- * String stronger_salt = BCrypt.gensalt(12)<br /> ++ * String strong_salt = BCrypt.gensalt(10) ++ * String stronger_salt = BCrypt.gensalt(12) + * </code> + * <p> + * The amount of work increases exponentially (2**log_rounds), so
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201905092009.x49K97DF036464>