./java/jBCrypt [BCrypt library for Java]
[+] Add this package to your ports tracker

[ CVSweb ] [ Homepage ] [ RSS feed ]

Version: 0.4, Package name: jBCrypt-0.4
Maintained by: Stuart Henderson
Master sites:
Description
jBCrypt is a Java implementation of OpenBSD's Blowfish password
hashing code, compatible with the canonical C implementation of the
bcrypt algorithm.

This system hashes passwords using a version of Bruce Schneier's
Blowfish block cipher with modifications designed to raise the cost
of off-line password cracking and frustrate fast hardware implementation.
The computation cost of the algorithm is parametised, so it can be
increased as computers get faster. The intent is to make a compromise
of a password database less likely to result in an attacker gaining
knowledge of the plaintext passwords (e.g. using John the Ripper).


Filesize: 14.812 KB
Version History (View Complete History)
  • (2015-02-06) Updated to version: jBCrypt-0.4
  • (2012-05-23) Package added to openports.se, version jBCrypt-0.3 (created)
[show/hide] View available PLISTS (Can be a lot of data)

CVS Commit History:

   2017-04-21 07:27:47 by Kurt Miller | Files touched by this commit (51)
Log message:
- disconnect devel/jdk/1.7 from the build
- adjust java.port.mk so all 1.7 and lower ports now build with 1.8
- bump revision on affected ports
okay sthen@, ian@, landry@
   2015-02-06 07:12:35 by Stuart Henderson | Files touched by this commit (1)
Log message:
MFC update to jBCrypt 0.4, fixing an integer overflow that occurs with very
large log_rounds values.
   2015-02-06 07:11:47 by Stuart Henderson | Files touched by this commit (2)
Log message:
update to jBCrypt 0.4, fixing an integer overflow that occurs with very
large log_rounds values.
   2015-02-06 07:11:47 by Stuart Henderson | Files touched by this commit (2)
Log message:
update to jBCrypt 0.4, fixing an integer overflow that occurs with very
large log_rounds values.
   2015-01-17 20:16:09 by Christian Weisgerber | Files touched by this commit (3349)
Log message:
Drop remaining MD5/RMD160/SHA1 checksums.