Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 May 2009 13:22:07 GMT
From:      Wen Heping <wenheping@gmail.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/134961: [NEW PORT]security/scrypt:Key Derivation Function
Message-ID:  <200905261322.n4QDM7kS052930@www.freebsd.org>
Resent-Message-ID: <200905261330.n4QDU1Tw092485@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         134961
>Category:       ports
>Synopsis:       [NEW PORT]security/scrypt:Key Derivation Function
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Tue May 26 13:30:01 UTC 2009
>Closed-Date:
>Last-Modified:
>Originator:     Wen Heping
>Release:        FreeBSD 8.0-Current
>Organization:
ChangAn Middle School
>Environment:
FreeBSD fb8.wenjing.com 8.0-CURRENT FreeBSD 8.0-CURRENT #4: Fri Apr 10 16:36:28 HKT 2009     root@fb8.wenjing.com:/usr/obj/usr/src/sys/wen1  i386
>Description:
The scrypt key derivation function was originally developed for use in
the Tarsnap online backup system and is designed to be far more secure
against hardware brute-force attacks than alternative functions such as
PBKDF2 or bcrypt.

WWW:   http://www.tarsnap.com/scrypt/
>How-To-Repeat:

>Fix:


Patch attached with submission follows:

# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	scrypt
#	scrypt/pkg-descr
#	scrypt/distinfo
#	scrypt/Makefile
#
echo c - scrypt
mkdir -p scrypt > /dev/null 2>&1
echo x - scrypt/pkg-descr
sed 's/^X//' >scrypt/pkg-descr << '8f243f3fe5492e89263cbd50a0d2719e'
XThe scrypt key derivation function was originally developed for use in
Xthe Tarsnap online backup system and is designed to be far more secure
Xagainst hardware brute-force attacks than alternative functions such as
XPBKDF2 or bcrypt.
X
XWWW:   http://www.tarsnap.com/scrypt/
8f243f3fe5492e89263cbd50a0d2719e
echo x - scrypt/distinfo
sed 's/^X//' >scrypt/distinfo << 'd517551dea1e0e2ce29aec55edf8ae3e'
XMD5 (scrypt-1.1.3.tgz) = 36d8554574cebe45613273de9bed310a
XSHA256 (scrypt-1.1.3.tgz) = 437009b4ac70e4c2477d1ea31ae0ad8218e14eb9d41073ff51d8f074f11a374f
XSIZE (scrypt-1.1.3.tgz) = 79571
d517551dea1e0e2ce29aec55edf8ae3e
echo x - scrypt/Makefile
sed 's/^X//' >scrypt/Makefile << '0c3188280117fda06860b5239417f61a'
X# New ports collection makefile for:	scrypt
X# Date created:				26 May, 2009
X# Whom:					Wen Heping <wenheping@gmail.com>
X#
X# $FreeBSD$
X#
X
XPORTNAME=	scrypt
XPORTVERSION=	1.1.3
XCATEGORIES=	security
XMASTER_SITES=	http://www.tarsnap.com/scrypt/
XEXTRACT_SUFX=	.tgz
X
XMAINTAINER=	wenheping@gmail.com
XCOMMENT=	Key Derivation Function
X
XGNU_CONFIGURE=	yes
XUSE_GMAKE=	yes
XUSE_LDCONFIG=	yes
XPLIST_FILES=	bin/scrypt
X
XMAN1=	scrypt.1
X
X.include <bsd.port.mk>
0c3188280117fda06860b5239417f61a
exit



>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200905261322.n4QDM7kS052930>