summaryrefslogtreecommitdiff
path: root/security/fcrackzip (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Remove # $FreeBSD$ from Makefiles.Mathieu Arnold2021-04-061-1/+0
|
* security/fcrackzip: Take MAINTAINERSHIPMuhammad Moinur Rahman2015-06-084-8/+10
| | | | | | | | - Fix pkg-descr - Add LICENSE (GPLv2) - Fix patch files to reflect 'make makepatch' Approved by: stefan (maintainer)
* Support stagingEmanuel Haupt2014-02-271-10/+5
|
* Add NO_STAGE all over the place in preparation for the staging support (cat: ↵Baptiste Daroussin2013-09-201-0/+1
| | | | security)
* - convert to the new perl5 frameworkAndrej Zverev2013-09-111-6/+3
| | | | | | - trim Makefile header Approved by: portmgr (bapt@, blanket)
* Fix typos and make small modifications in COMMENT (according to Porter'sCarlo Strub2012-08-031-1/+1
| | | | | | Handbook) Approved by: portmgr@ (implicit)
* - Add patch to properly escape paths and passwords in shell calls.Stefan Walter2011-05-173-1/+117
| | | | | | | | - While here, remove MD5 from distinfo. Reported by: Keith Waters <keith@waters.co.za> Patch by: Richard Corner Obtained from: https://bugs.launchpad.net/ubuntu/+source/fcrackzip/+bug/350640
* Fix master site and add a mirror.Stefan Walter2009-09-211-1/+2
| | | | | Submitted by: pointyhat via miwi Feature safe: yes
* Chase master site/project homepage.Stefan Walter2009-02-162-2/+2
| | | | Noticed by: pav/pointyhat
* Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.Rong-En Fan2008-08-211-1/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Specifically, newer autoconf (> 2.13) has different semantic of the configure target. In short, one should use --build=CONFIGURE_TARGET instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning and the old semantic may be removed in later autoconf releases. To workaround this issue, many ports hack the CONFIGURE_TARGET variable so that it contains the ``--build='' prefix. To solve this issue, under the fact that some ports still have configure script generated by the old autoconf, we use runtime detection in the do-configure target so that the proper argument can be used. Changes to Mk/*: - Add runtime detection magic in bsd.port.mk - Remove CONFIGURE_TARGET hack in various bsd.*.mk - USE_GNOME=gnometarget is now an no-op Changes to individual ports, other than removing the CONFIGURE_TARGET hack: = pkg-plist changed (due to the ugly CONFIGURE_TARGET prefix in * executables) - comms/gnuradio - science/abinit - science/elmer-fem - science/elmer-matc - science/elmer-meshgen2d - science/elmerfront - science/elmerpost = use x86_64 as ARCH - devel/g-wrap = other changes - print/magicfilter GNU_CONFIGURE -> HAS_CONFIGURE since it's not generated by autoconf Total # of ports modified: 1,027 Total # of ports affected: ~7,000 (set GNU_CONFIGURE to yes) PR: 126524 (obsoletes 52917) Submitted by: rafan Tested on: two pointyhat 7-amd64 exp runs (by pav) Approved by: portmgr (pav)
* Update to 1.0.Stefan Walter2008-08-202-4/+4
| | | | | PR: 126667 Submitted by: "Hirohisa Yamaguchi" <umq@ueo.co.jp>
* - Remove USE_GETOPT_LONG which is a no-op since March 2007Pav Lucistnik2008-03-201-1/+0
|
* Fix build with gcc 4.x.Stefan Walter2007-03-201-0/+10
| | | | Reported by: kris/pointyhat
* Remove USE_REINPLACE from all categories starting with SEdwin Groothuis2006-05-131-1/+0
|
* Convert MAINTAINER to my freebsd.org account.Stefan Walter2006-05-071-1/+1
|
* SHA256ifyEdwin Groothuis2006-01-241-0/+1
| | | | Approved by: krion@
* At Kris's request, back out the MACHINE_ARCH spelling correction untilDavid E. O'Brien2005-04-121-1/+1
| | | | after 5.4-RELEASE.
* Assist getting more ports working on AMD64 by obeying theDavid E. O'Brien2005-04-111-1/+1
| | | | Ports Collection documentation and use 'ARCH' rather than 'MACHINE_ARCH'.
* Add fcrackzip 0.3,Kirill Ponomarev2004-07-173-0/+45
Fcrackzip is a fast and featureful ZIP password cracker, written in portable C (and optional x86 assembly). It allows the user to recover forgotten ZIP archive passwords, using either a brute force or dictionary attack on the provided files. PR: ports/69159 Submitted by: Stefan Walter <sw@gegenunendlich.de>