[20948] trunk/dports/security

source_changes at macosforge.org source_changes at macosforge.org
Tue Dec 12 18:01:29 PST 2006


Revision: 20948
          http://trac.macosforge.org/projects/macports/changeset/20948
Author:   markd at macports.org
Date:     2006-12-12 18:01:29 -0800 (Tue, 12 Dec 2006)

Log Message:
-----------
Closes #11114.  New port.

Added Paths:
-----------
    trunk/dports/security/ophcrack/
    trunk/dports/security/ophcrack/Portfile
    trunk/dports/security/ophcrack/files/
    trunk/dports/security/ophcrack/files/patch-Makefile.in

Added: trunk/dports/security/ophcrack/Portfile
===================================================================
--- trunk/dports/security/ophcrack/Portfile	                        (rev 0)
+++ trunk/dports/security/ophcrack/Portfile	2006-12-13 02:01:29 UTC (rev 20948)
@@ -0,0 +1,43 @@
+# $Id$
+
+PortSystem		1.0
+name			ophcrack
+version			2.3.3
+categories		security
+maintainers		cedric.luthi at gmail.com
+description		Microsoft Windows password cracker
+long_description	Ophcrack is a Windows password cracker based on a time-\
+			memory trade-off using rainbow tables. This is a new variant \
+			of Hellman's original trade-off, with better performance. It \
+			recovers 99.9% of alphanumeric passwords in seconds.
+
+homepage		http://ophcrack.sourceforge.net
+master_sites		sourceforge
+checksums		md5 33eb0e14ab5a196ac168795e38856b8b \
+			sha1 dc83eb2a3d016eee272192e258c860e733538a8e \
+			rmd160 6cc9317f6c24c4d1bfa3a7b348eb759a8b0cac81
+
+depends_lib		port:gtk2
+depends_run		port:bkhive port:samdump2
+patchfiles		patch-Makefile.in
+post-main {
+	if { [string compare ${os.endian} "little"] != 0 } {
+		ui_error "${name} only runs on little-endian machines."
+		exit 1
+	}
+}
+post-activate {
+	ui_msg "****************************************************"
+	ui_msg ""
+	ui_msg "Don't forget to download the tables from"
+	ui_msg "http://lasecwww.epfl.ch/SSTIC04-10k.zip" 
+	ui_msg "or http://lasecwww.epfl.ch/SSTIC04-5k.zip"
+	ui_msg ""
+	ui_msg "and install them in ${prefix}/share/ophcrack/10000"
+	ui_msg "or ${prefix}/share/ophcrack/5000"
+	ui_msg ""
+	ui_msg "SSTIC04-10k (388MB), for PCs with at least 256MB of RAM."
+	ui_msg "SSTIC04-5k (720MB), for PCs with at least 512MB of RAM."
+	ui_msg ""
+	ui_msg "****************************************************"
+}

Added: trunk/dports/security/ophcrack/files/patch-Makefile.in
===================================================================
--- trunk/dports/security/ophcrack/files/patch-Makefile.in	                        (rev 0)
+++ trunk/dports/security/ophcrack/files/patch-Makefile.in	2006-12-13 02:01:29 UTC (rev 20948)
@@ -0,0 +1,40 @@
+--- Makefile.in	2006-10-11 15:54:12.000000000 +0200
++++ Makefile.in	2006-12-11 14:40:47.000000000 +0100
+@@ -602,37 +602,10 @@
+ 	    fi \
+ 	  done \
+ 	fi
+-	@echo "****************************************************"
+-	@echo 
+-	@echo "Don't forget to download the tables from"
+-	@echo "http://lasecwww.epfl.ch/SSTIC04-10k.zip" 
+-	@echo "or http://lasecwww.epfl.ch/SSTIC04-5k.zip"
+-	@echo
+-	@echo "and install them in $(DESTDIR)$(pkgdatadir)/10000"
+-	@echo "or $(DESTDIR)$(pkgdatadir)/5000"
+-	@echo 
+-	@echo "SSTIC04-10k (388MB), for PCs with at least 256MB of RAM."
+-	@echo "SSTIC04-5k (720MB), for PCs with at least 512MB of RAM."
+-	@echo
+-	@echo "****************************************************"
+ 
+ install-exec-local:
+-	if test -d $(srcdir)/linux_tools; then \
+-	  if test -f $(srcdir)/linux_tools/bkhive2; then \
+-	    $(INSTALL_PROGRAM) $(srcdir)/linux_tools/bkhive2 $(bindir); \
+-	  fi ;\
+-	  if test -f $(srcdir)/linux_tools/samdump2; then \
+-	    $(INSTALL_PROGRAM) $(srcdir)/linux_tools/samdump2 $(bindir); \
+-	  fi \
+-	fi
+ 
+ uninstall-local:
+-	if test -f $(bindir)/bkhive2; then \
+-	  rm -f $(bindir)/bkhive2; \
+-	fi ;\
+-	if test -f $(bindir)/samdump2; then \
+-	  rm -f $(bindir)/samdump2; \
+-	fi ;\
+ 	if test -d $(DESTDIR)$(pkgdatadir); then \
+ 	  rm -rf $(DESTDIR)$(pkgdatadir); \
+ 	fi

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.macosforge.org/pipermail/macports-changes/attachments/20061212/24f34cbf/attachment.html


More information about the macports-changes mailing list