| Age | Commit message (Collapse) | Author | Files | Lines | |
|---|---|---|---|---|---|
| 2022-06-28 | *: recursive bump for perl 5.36 | wiz | 1 | -2/+2 | |
| 2021-10-26 | security: Replace RMD160 checksums with BLAKE2s checksums | nia | 1 | -2/+2 | |
| All checksums have been double-checked against existing RMD160 and SHA512 hashes Unfetchable distfiles (fetched conditionally?): ./security/cyrus-sasl/distinfo cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2 | |||||
| 2021-10-07 | security: Remove SHA1 hashes for distfiles | nia | 1 | -2/+1 | |
| 2021-05-24 | *: recursive bump for perl 5.34 | wiz | 1 | -1/+2 | |
| 2021-04-27 | p5-Crypt-PBKDF2: clean up Makefile | wiz | 1 | -6/+1 | |
| 2021-04-27 | security/p5-Crypt-PBKDF2: import p5-Crypt-PBKDF2-0.161520 | wiz | 3 | -0/+43 | |
| PBKDF2 is a secure password hashing algorithm that uses the techniques of "key strengthening" to make the complexity of a brute-force attack arbitrarily high. PBKDF2 uses any other cryptographic hash or cipher (by convention, usually HMAC-SHA1, but Crypt::PBKDF2 is fully pluggable), and allows for an arbitrary number of iterations of the hashing function, and a nearly unlimited output hash size (up to 2**32 - 1 times the size of the output of the backend hash). The hash is salted, as any password hash should be, and the salt may also be of arbitrary size. | |||||
