Date: Sat, 23 Jan 2016 15:13:17 +0000 (UTC) From: Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r406999 - in head/security: . p5-Crypt-Random-TESHA2 Message-ID: <201601231513.u0NFDHfX049124@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: sunpoet Date: Sat Jan 23 15:13:17 2016 New Revision: 406999 URL: https://svnweb.freebsd.org/changeset/ports/406999 Log: - Add p5-Crypt-Random-TESHA2 0.01 Crypt::Random::TESHA2 implements userspace voodoo entropy. You should use a proper O/S supplied entropy source such as /dev/random or the Win32 Crypt API. WWW: http://search.cpan.org/dist/Crypt-Random-TESHA2/ Added: head/security/p5-Crypt-Random-TESHA2/ head/security/p5-Crypt-Random-TESHA2/Makefile (contents, props changed) head/security/p5-Crypt-Random-TESHA2/distinfo (contents, props changed) head/security/p5-Crypt-Random-TESHA2/pkg-descr (contents, props changed) head/security/p5-Crypt-Random-TESHA2/pkg-plist (contents, props changed) Modified: head/security/Makefile Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Sat Jan 23 15:12:54 2016 (r406998) +++ head/security/Makefile Sat Jan 23 15:13:17 2016 (r406999) @@ -543,6 +543,7 @@ SUBDIR += p5-Crypt-RandPasswd SUBDIR += p5-Crypt-Random SUBDIR += p5-Crypt-Random-Source + SUBDIR += p5-Crypt-Random-TESHA2 SUBDIR += p5-Crypt-Rijndael SUBDIR += p5-Crypt-Rijndael_PP SUBDIR += p5-Crypt-SKey Added: head/security/p5-Crypt-Random-TESHA2/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/p5-Crypt-Random-TESHA2/Makefile Sat Jan 23 15:13:17 2016 (r406999) @@ -0,0 +1,21 @@ +# Created by: Sunpoet Po-Chuan Hsieh <sunpoet@FreeBSD.org> +# $FreeBSD$ + +PORTNAME= Crypt-Random-TESHA2 +PORTVERSION= 0.01 +CATEGORIES= security perl5 +MASTER_SITES= CPAN +PKGNAMEPREFIX= p5- + +MAINTAINER= sunpoet@FreeBSD.org +COMMENT= Random numbers using timer/schedule entropy + +LICENSE= ART10 GPLv1 +LICENSE_COMB= dual +LICENSE_FILE= ${WRKSRC}/LICENSE + +NO_ARCH= yes +USE_PERL5= configure +USES= perl5 + +.include <bsd.port.mk> Added: head/security/p5-Crypt-Random-TESHA2/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/p5-Crypt-Random-TESHA2/distinfo Sat Jan 23 15:13:17 2016 (r406999) @@ -0,0 +1,2 @@ +SHA256 (Crypt-Random-TESHA2-0.01.tar.gz) = a0912b42c52be173da528d5527e40d967324bc04ac78d9fc2ddc91ff16fe9633 +SIZE (Crypt-Random-TESHA2-0.01.tar.gz) = 22255 Added: head/security/p5-Crypt-Random-TESHA2/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/p5-Crypt-Random-TESHA2/pkg-descr Sat Jan 23 15:13:17 2016 (r406999) @@ -0,0 +1,4 @@ +Crypt::Random::TESHA2 implements userspace voodoo entropy. You should use a +proper O/S supplied entropy source such as /dev/random or the Win32 Crypt API. + +WWW: http://search.cpan.org/dist/Crypt-Random-TESHA2/ Added: head/security/p5-Crypt-Random-TESHA2/pkg-plist ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/p5-Crypt-Random-TESHA2/pkg-plist Sat Jan 23 15:13:17 2016 (r406999) @@ -0,0 +1,4 @@ +%%SITE_PERL%%/Crypt/Random/TESHA2.pm +%%SITE_PERL%%/Crypt/Random/TESHA2/Config.pm +%%PERL5_MAN3%%/Crypt::Random::TESHA2.3.gz +%%PERL5_MAN3%%/Crypt::Random::TESHA2::Config.3.gz
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201601231513.u0NFDHfX049124>