svn commit: r501144 - in head/security/i2p: . files
Steve Wills
swills at FreeBSD.org
Thu May 9 20:09:09 UTC 2019
Author: swills
Date: Thu May 9 20:09:07 2019
New Revision: 501144
URL: https://svnweb.freebsd.org/changeset/ports/501144
Log:
security/i2p: update to 0.9.40
PR: 237809
Submitted by: Neel Chauhan <neel at neelc.org> (maintainer)
Added:
head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java (contents, props changed)
head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java (contents, props changed)
Deleted:
head/security/i2p/files/patch-apps_streaming_java_src_net_i2p_client_streaming_impl_I2PSocketManagerFull.java
Modified:
head/security/i2p/Makefile (contents, props changed)
head/security/i2p/distinfo (contents, props changed)
Modified: head/security/i2p/Makefile
==============================================================================
--- head/security/i2p/Makefile Thu May 9 20:07:39 2019 (r501143)
+++ head/security/i2p/Makefile Thu May 9 20:09:07 2019 (r501144)
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= i2p
-DISTVERSION= 0.9.38
+DISTVERSION= 0.9.40
CATEGORIES= security java net-p2p
MASTER_SITES= SF/${PORTNAME:tl}/${PORTVERSION} \
http://download.i2p2.no/releases/${PORTVERSION}/ \
Modified: head/security/i2p/distinfo
==============================================================================
--- head/security/i2p/distinfo Thu May 9 20:07:39 2019 (r501143)
+++ head/security/i2p/distinfo Thu May 9 20:09:07 2019 (r501144)
@@ -1,3 +1,3 @@
-TIMESTAMP = 1548602826
-SHA256 (i2psource_0.9.38.tar.bz2) = 65fe327fdd11272a764c9e1c6ae1f38b151cea9003216b861c7ff2b281ca2970
-SIZE (i2psource_0.9.38.tar.bz2) = 30702106
+TIMESTAMP = 1557365594
+SHA256 (i2psource_0.9.40.tar.bz2) = 5d31e0a324dfe429135ac17595b3cab3e81d85d4aa7a720db402dec47bfeda23
+SIZE (i2psource_0.9.40.tar.bz2) = 30808508
Added: head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java Thu May 9 20:09:07 2019 (r501144)
@@ -0,0 +1,11 @@
+--- apps/i2pcontrol/java/com/thetransactioncompany/jsonrpc2/package-info.java.orig 2019-04-17 11:52:29.174848000 -0400
++++ apps/i2pcontrol/java/com/thetransactioncompany/jsonrpc2/package-info.java 2019-04-17 11:55:57.085931000 -0400
+@@ -13,7 +13,7 @@
+ * exception of <i>batching / multicall</i>. This feature is deliberately left
+ * out as it tends to confuse users (judging by posts in the JSON-RPC forum).
+ *
+- * <p>See the <a href="http://www.jsonrpc.org/specification"></a>JSON-RPC 2.0
++ * <p>See the <a href="http://www.jsonrpc.org/specification">JSON-RPC 2.0
+ * specification</a> for more information or write to the
+ * <a href="https://groups.google.com/forum/#!forum/json-rpc">user group</a> if
+ * you have questions.
Added: head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java Thu May 9 20:09:07 2019 (r501144)
@@ -0,0 +1,35 @@
+--- apps/i2pcontrol/java/org/mindrot/jbcrypt/BCrypt.java.orig 2019-04-17 11:58:51.939865000 -0400
++++ apps/i2pcontrol/java/org/mindrot/jbcrypt/BCrypt.java 2019-04-17 11:58:57.299331000 -0400
+@@ -32,25 +32,25 @@
+ * call the hashpw method with a random salt, like this:
+ * <p>
+ * <code>
+- * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt()); <br />
++ * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
+ * </code>
+ * <p>
+ * To check whether a plaintext password matches one that has been
+ * hashed previously, use the checkpw method:
+ * <p>
+ * <code>
+- * if (BCrypt.checkpw(candidate_password, stored_hash))<br />
+- * System.out.println("It matches");<br />
+- * else<br />
+- * System.out.println("It does not match");<br />
++ * if (BCrypt.checkpw(candidate_password, stored_hash))
++ * System.out.println("It matches");
++ * else
++ * System.out.println("It does not match");
+ * </code>
+ * <p>
+ * The gensalt() method takes an optional parameter (log_rounds)
+ * that determines the computational complexity of the hashing:
+ * <p>
+ * <code>
+- * String strong_salt = BCrypt.gensalt(10)<br />
+- * String stronger_salt = BCrypt.gensalt(12)<br />
++ * String strong_salt = BCrypt.gensalt(10)
++ * String stronger_salt = BCrypt.gensalt(12)
+ * </code>
+ * <p>
+ * The amount of work increases exponentially (2**log_rounds), so
More information about the svn-ports-head
mailing list