From owner-cvs-all@FreeBSD.ORG Mon Jun 7 06:59:09 2010 Return-Path: Delivered-To: cvs-all@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id B8A1F106567A; Mon, 7 Jun 2010 06:59:09 +0000 (UTC) (envelope-from miwi@FreeBSD.org) Received: from repoman.freebsd.org (unknown [IPv6:2001:4f8:fff6::29]) by mx1.freebsd.org (Postfix) with ESMTP id A86398FC25; Mon, 7 Jun 2010 06:59:09 +0000 (UTC) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.14.3/8.14.3) with ESMTP id o576x9Ac034307; Mon, 7 Jun 2010 06:59:09 GMT (envelope-from miwi@repoman.freebsd.org) Received: (from miwi@localhost) by repoman.freebsd.org (8.14.3/8.14.3/Submit) id o576x95B034306; Mon, 7 Jun 2010 06:59:09 GMT (envelope-from miwi) Message-Id: <201006070659.o576x95B034306@repoman.freebsd.org> From: Martin Wilke Date: Mon, 7 Jun 2010 06:59:09 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/security Makefile ports/security/p5-Crypt-PBKDF2 Makefile distinfo pkg-descr pkg-plist X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: **OBSOLETE** CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Jun 2010 06:59:09 -0000 miwi 2010-06-07 06:59:09 UTC FreeBSD ports repository Modified files: security Makefile Added files: security/p5-Crypt-PBKDF2 Makefile distinfo pkg-descr pkg-plist Log: PBKDF2 is a secure password hashing algorithm that uses the techniques of "key strengthening" to make the complexity of a brute-force attack arbitrarily high. PBKDF2 uses any other cryptographic hash or cipher (by convention, usually HMAC-SHA1, but Crypt::PBKDF2 is fully pluggable), and allows for an arbitrary number of iterations of the hashing function, and a nearly unlimited output hash size (up to 2**32 - 1 times the size of the output of the backend hash). The hash is salted, as any password hash should be, and the salt may also be of arbitrary size. See also: RFC2898, PKCS#5 version 2.0: http://tools.ietf.org/html/rfc2898 WWW: http://search.cpan.org/dist/Crypt-PBKDF2/ PR: ports/146847 Submitted by: Victor Popov Revision Changes Path 1.1111 +1 -0 ports/security/Makefile 1.1 +43 -0 ports/security/p5-Crypt-PBKDF2/Makefile (new) 1.1 +3 -0 ports/security/p5-Crypt-PBKDF2/distinfo (new) 1.1 +12 -0 ports/security/p5-Crypt-PBKDF2/pkg-descr (new) 1.1 +12 -0 ports/security/p5-Crypt-PBKDF2/pkg-plist (new)