From owner-freebsd-ports-bugs@FreeBSD.ORG Mon Nov 13 18:13:27 2006 Return-Path: X-Original-To: freebsd-ports-bugs@hub.freebsd.org Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D33B116A4C9 for ; Mon, 13 Nov 2006 18:13:27 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id DD4F343DE4 for ; Mon, 13 Nov 2006 18:10:04 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id kADIA1Hn034445 for ; Mon, 13 Nov 2006 18:10:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id kADIA1Zn034443; Mon, 13 Nov 2006 18:10:01 GMT (envelope-from gnats) Resent-Date: Mon, 13 Nov 2006 18:10:01 GMT Resent-Message-Id: <200611131810.kADIA1Zn034443@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Thomas Abthorpe Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B658616A47B for ; Mon, 13 Nov 2006 18:09:52 +0000 (UTC) (envelope-from tabthorpe@goodking.goodking.ca) Received: from tbaytel.net (front1-nwconx.tbaytel.net [216.211.26.153]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0FBE943D9F for ; Mon, 13 Nov 2006 18:07:34 +0000 (GMT) (envelope-from tabthorpe@goodking.goodking.ca) Received: from goodking.goodking.ca ([216.211.48.77] verified) by front1.tbaytel.net (CommuniGate Pro SMTP 5.0.8) with ESMTPS id 59976406 for FreeBSD-gnats-submit@freebsd.org; Mon, 13 Nov 2006 13:07:30 -0500 Received: from goodking.goodking.ca (localhost [127.0.0.1]) by goodking.goodking.ca (8.13.8/8.13.8) with ESMTP id kADI7ATK054197 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 13 Nov 2006 13:07:10 -0500 (EST) (envelope-from tabthorpe@goodking.goodking.ca) Received: (from root@localhost) by goodking.goodking.ca (8.13.8/8.13.8/Submit) id kADI7AtJ054196; Mon, 13 Nov 2006 13:07:10 -0500 (EST) (envelope-from tabthorpe) Message-Id: <200611131807.kADI7AtJ054196@goodking.goodking.ca> Date: Mon, 13 Nov 2006 13:07:10 -0500 (EST) From: Thomas Abthorpe To: FreeBSD-gnats-submit@FreeBSD.org X-Send-Pr-Version: 3.113 Cc: thomas@goodking.ca Subject: ports/105486: [MAINTAINER] security/pear-Crypt_Blowfish: update to 1.1.0.r1 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 13 Nov 2006 18:13:27 -0000 >Number: 105486 >Category: ports >Synopsis: [MAINTAINER] security/pear-Crypt_Blowfish: update to 1.1.0.r1 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: maintainer-update >Submitter-Id: current-users >Arrival-Date: Mon Nov 13 18:10:01 GMT 2006 >Closed-Date: >Last-Modified: >Originator: Thomas Abthorpe >Release: FreeBSD 6.2-PRERELEASE i386 >Organization: GoodKing.Ca >Environment: System: FreeBSD goodking.goodking.ca 6.2-PRERELEASE FreeBSD 6.2-PRERELEASE #1: Wed Nov 8 12:36:28 EST >Description: - Update to 1.1.0.r1 Generated with FreeBSD Port Tools 0.77 >How-To-Repeat: >Fix: --- pear-Crypt_Blowfish-1.1.0.r1.patch begins here --- Index: Makefile =================================================================== RCS file: /home/ncvs/ports/security/pear-Crypt_Blowfish/Makefile,v retrieving revision 1.5 diff -u -r1.5 Makefile --- Makefile 9 Nov 2006 05:27:59 -0000 1.5 +++ Makefile 13 Nov 2006 18:06:24 -0000 @@ -6,8 +6,9 @@ # PORTNAME= Crypt_Blowfish -PORTVERSION= 1.0.1 +PORTVERSION= 1.1.0.r1 CATEGORIES= security www pear +DISTNAME= ${PORTNAME}-${PORTVERSION:S/.r/RC/} MAINTAINER= thomas@goodking.ca COMMENT= PEAR class for blowfish encryption @@ -16,8 +17,26 @@ RUN_DEPENDS= ${BUILD_DEPENDS} CATEGORY= Crypt -FILES= Blowfish.php Blowfish/DefaultKey.php -TESTS= blowfish.phpt vectors.txt +FILES= Blowfish.php \ + Blowfish/CBC.php \ + Blowfish/DefaultKey.php \ + Blowfish/ECB.php \ + Blowfish/MCrypt.php \ + Blowfish/PHP.php +TESTS= blowfish.phpt \ + blowfish_cbc.phpt \ + vectors.txt \ + vectors_cbc.txt + +.if defined(WITH_PHP_MCRYPT) +USE_PHP=mcrypt +.endif + +pre-fetch: + @${ECHO_CMD} "" + @${ECHO_CMD} "You may set envirtonment variable WITH_PHP_MCRYPT to include" + @${ECHO_CMD} "additional MCrypt PHP support" + @${ECHO_CMD} "" post-patch: .for file in ${FILES} Index: distinfo =================================================================== RCS file: /home/ncvs/ports/security/pear-Crypt_Blowfish/distinfo,v retrieving revision 1.3 diff -u -r1.3 distinfo --- distinfo 24 Jan 2006 01:03:19 -0000 1.3 +++ distinfo 13 Nov 2006 18:06:24 -0000 @@ -1,3 +1,3 @@ -MD5 (PEAR/Crypt_Blowfish-1.0.1.tgz) = 93873efe07a267b2b415965994a0af98 -SHA256 (PEAR/Crypt_Blowfish-1.0.1.tgz) = e793daae146491a3dc8000ed732de7f4b9b50d76e91c935807487fdc3d169655 -SIZE (PEAR/Crypt_Blowfish-1.0.1.tgz) = 11954 +MD5 (PEAR/Crypt_Blowfish-1.1.0RC1.tgz) = e81ed11bbb24f4c8b278bd5af0de1884 +SHA256 (PEAR/Crypt_Blowfish-1.1.0RC1.tgz) = d467af9d3ba0b07fd694817930228e6b71060574a1e91c4f320cc6134da3824c +SIZE (PEAR/Crypt_Blowfish-1.1.0RC1.tgz) = 18304 Index: pkg-descr =================================================================== RCS file: /home/ncvs/ports/security/pear-Crypt_Blowfish/pkg-descr,v retrieving revision 1.1 diff -u -r1.1 pkg-descr --- pkg-descr 5 May 2005 19:51:19 -0000 1.1 +++ pkg-descr 13 Nov 2006 18:06:24 -0000 @@ -1,6 +1,5 @@ -PEAR::Crypt_Blowfish allows you to prefore two-way blowfish on the fly using -only PHP. - -This package does not require the Mcrypt PHP extension to work. +PEAR::Crypt_Blowfish allows you to perform two-way blowfish encryption on +the fly using only PHP. This package does not require the MCrypt +PHP extension to work, although it can make use of it if available. WWW: http://pear.php.net/package/Crypt_Blowfish/ --- pear-Crypt_Blowfish-1.1.0.r1.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted: