Next | Query returned 10 messages, browsing 1 to 10 | previous

History of commit frequency

CVS Commit History:


   2020-02-28 12:19:53 by Thomas Klausner | Files touched by this commit (3) | Package updated
Log message:
scrypt: update to 1.3.0nb2.

Enable libscrypt-kdf.
Add bl3.mk file.
   2020-01-18 22:51:16 by Jonathan Perkin | Files touched by this commit (1836)
Log message:
*: Recursive revision bump for openssl 1.1.1.
   2019-11-04 22:13:04 by Roland Illig | Files touched by this commit (118)
Log message:
security: align variable assignments

pkglint -Wall -F --only aligned --only indent -r

No manual corrections.
   2019-09-16 07:13:28 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
scrypt: update to 1.3.0.

Significant changes since 1.2.1:
* In addition to the scrypt command-line utility, a library "libscrypt-kdf"
  can now be built and installed by passing the --enable-libscrypt-kdf option
  to configure.
* On x86 CPUs which support them, RDRAND and SHA extensions are used to
  provide supplemental entropy and speed up hash computations respectively.
* When estimating the amount of available RAM, scrypt ignores RLIMIT_DATA on
  systems which have mmap.
* A new command "scrypt info encfile" prints information about an encrypted
  file without decrypting it.
   2017-04-26 16:55:00 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Updated scrypt to 1.2.1.

Significant changes since 1.2.0:
* A new -v option instructs scrypt to print the key derivation parameters
  it has selected.
* A new --version option prints the version number of the scrypt utility.
* A new -P option make scrypt read the passphrase from standard input; this
  is designed for scripts which pipe a passphrase in from elsewhere.
* A new -f option makes 'scrypt dec' ignore the amount of memory or CPU time
  it thinks decrypting a file will take, and proceed anyway; this may be useful
  in cases where scrypt's estimation is wrong.
* The '-M maxmem' option now accepts "humanized" inputs, e.g., \ 
"-M 1GB".

There are also a variety of less visible changes: Performance improvements
in the SHA256 routines, minor bug and compiler warning fixes, the addition
of a test suite, and some minor code reorganization.
   2016-03-05 12:29:49 by Jonathan Perkin | Files touched by this commit (1813) | Package updated
Log message:
Bump PKGREVISION for security/openssl ABI bump.
   2015-11-04 02:18:12 by Alistair G. Crooks | Files touched by this commit (434)
Log message:
Add SHA512 digests for distfiles for security category

Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-08-23 16:42:31 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
Update to 1.2.0:

Significant changes since 1.1.6:
* You can now specify "-" as the input file, meaning standard input.
* Lots and lots of code reorganization, including changes to the build system.
* scrypt now consults the hw.memsize sysctl on relevant platforms to figure
out how much memory is available.  (This should help on OS X.)
* scrypt now detects and uses AESNI instructions for encryption/decryption.
* scrypt now detects and uses SSE2 instructions automatically (and thus there
is no longer an --enable-sse2 option to the configure script).
   2014-02-26 19:20:11 by Sebastian Wiedenroth | Files touched by this commit (1)
Log message:
Bulk build wants openssl
   2012-10-18 00:17:48 by Fredrik Pettai | Files touched by this commit (4)
Log message:
A simple password-based encryption utility is available as a demonstration
of the scrypt key derivation function. On modern hardware and with default
parameters, the cost of cracking the password on a file encrypted by scrypt
enc is approximately 100 billion times more than the cost of cracking the
same password on a file encrypted by openssl enc; this means that a five-
character password using scrypt is stronger than a ten-character password
using openssl

Next | Query returned 10 messages, browsing 1 to 10 | previous