svn commit: r501144 - in head/security/i2p: . files

Steve Wills swills at FreeBSD.org
Thu May 9 20:09:09 UTC 2019


Author: swills
Date: Thu May  9 20:09:07 2019
New Revision: 501144
URL: https://svnweb.freebsd.org/changeset/ports/501144

Log:
  security/i2p: update to 0.9.40
  
  PR:		237809
  Submitted by:	Neel Chauhan <neel at neelc.org> (maintainer)

Added:
  head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java   (contents, props changed)
  head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java   (contents, props changed)
Deleted:
  head/security/i2p/files/patch-apps_streaming_java_src_net_i2p_client_streaming_impl_I2PSocketManagerFull.java
Modified:
  head/security/i2p/Makefile   (contents, props changed)
  head/security/i2p/distinfo   (contents, props changed)

Modified: head/security/i2p/Makefile
==============================================================================
--- head/security/i2p/Makefile	Thu May  9 20:07:39 2019	(r501143)
+++ head/security/i2p/Makefile	Thu May  9 20:09:07 2019	(r501144)
@@ -2,7 +2,7 @@
 # $FreeBSD$
 
 PORTNAME=	i2p
-DISTVERSION=	0.9.38
+DISTVERSION=	0.9.40
 CATEGORIES=	security java net-p2p
 MASTER_SITES=	SF/${PORTNAME:tl}/${PORTVERSION} \
 		http://download.i2p2.no/releases/${PORTVERSION}/ \

Modified: head/security/i2p/distinfo
==============================================================================
--- head/security/i2p/distinfo	Thu May  9 20:07:39 2019	(r501143)
+++ head/security/i2p/distinfo	Thu May  9 20:09:07 2019	(r501144)
@@ -1,3 +1,3 @@
-TIMESTAMP = 1548602826
-SHA256 (i2psource_0.9.38.tar.bz2) = 65fe327fdd11272a764c9e1c6ae1f38b151cea9003216b861c7ff2b281ca2970
-SIZE (i2psource_0.9.38.tar.bz2) = 30702106
+TIMESTAMP = 1557365594
+SHA256 (i2psource_0.9.40.tar.bz2) = 5d31e0a324dfe429135ac17595b3cab3e81d85d4aa7a720db402dec47bfeda23
+SIZE (i2psource_0.9.40.tar.bz2) = 30808508

Added: head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/i2p/files/patch-apps_i2pcontrol_java_com_thetransactioncompany_jsonrpc2_package-info.java	Thu May  9 20:09:07 2019	(r501144)
@@ -0,0 +1,11 @@
+--- apps/i2pcontrol/java/com/thetransactioncompany/jsonrpc2/package-info.java.orig	2019-04-17 11:52:29.174848000 -0400
++++ apps/i2pcontrol/java/com/thetransactioncompany/jsonrpc2/package-info.java	2019-04-17 11:55:57.085931000 -0400
+@@ -13,7 +13,7 @@
+  * exception of <i>batching / multicall</i>. This feature is deliberately left
+  * out as it tends to confuse users (judging by posts in the JSON-RPC forum).
+  *
+- * <p>See the <a href="http://www.jsonrpc.org/specification"></a>JSON-RPC 2.0
++ * <p>See the <a href="http://www.jsonrpc.org/specification">JSON-RPC 2.0
+  * specification</a> for more information or write to the
+  * <a href="https://groups.google.com/forum/#!forum/json-rpc">user group</a> if
+  * you have questions.

Added: head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/i2p/files/patch-apps_i2pcontrol_java_org_mindrot_jbcrypt_BCrypt.java	Thu May  9 20:09:07 2019	(r501144)
@@ -0,0 +1,35 @@
+--- apps/i2pcontrol/java/org/mindrot/jbcrypt/BCrypt.java.orig	2019-04-17 11:58:51.939865000 -0400
++++ apps/i2pcontrol/java/org/mindrot/jbcrypt/BCrypt.java	2019-04-17 11:58:57.299331000 -0400
+@@ -32,25 +32,25 @@
+  * call the hashpw method with a random salt, like this:
+  * <p>
+  * <code>
+- * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt()); <br />
++ * String pw_hash = BCrypt.hashpw(plain_password, BCrypt.gensalt());
+  * </code>
+  * <p>
+  * To check whether a plaintext password matches one that has been
+  * hashed previously, use the checkpw method:
+  * <p>
+  * <code>
+- * if (BCrypt.checkpw(candidate_password, stored_hash))<br />
+- *     System.out.println("It matches");<br />
+- * else<br />
+- *     System.out.println("It does not match");<br />
++ * if (BCrypt.checkpw(candidate_password, stored_hash))
++ *     System.out.println("It matches");
++ * else
++ *     System.out.println("It does not match");
+  * </code>
+  * <p>
+  * The gensalt() method takes an optional parameter (log_rounds)
+  * that determines the computational complexity of the hashing:
+  * <p>
+  * <code>
+- * String strong_salt = BCrypt.gensalt(10)<br />
+- * String stronger_salt = BCrypt.gensalt(12)<br />
++ * String strong_salt = BCrypt.gensalt(10)
++ * String stronger_salt = BCrypt.gensalt(12)
+  * </code>
+  * <p>
+  * The amount of work increases exponentially (2**log_rounds), so 


More information about the svn-ports-all mailing list