[56741] trunk/dports/perl/p5-crypt-appletwofish/Portfile
Ryan Schmidt
ryandesign at macports.org
Wed Sep 2 00:04:02 PDT 2009
On Sep 1, 2009, at 19:05, narf_tm at macports.org wrote:
> Revision: 56741
> http://trac.macports.org/changeset/56741
> Author: narf_tm at macports.org
> Date: 2009-09-01 17:05:02 -0700 (Tue, 01 Sep 2009)
> Log Message:
> -----------
> Added missing dependency.
If you want to make whitespace changes, please do so in a separate
commit from functional changes (such as adding a dependency).
Otherwise it's difficult to see from the diff what functional changes
you made.
When you add a library or runtime dependency, you should probably
increase the revision so that everybody who already has the port gets
that new dependency properly recorded in their registry. I increased
the revision in r56787.
> Modified Paths:
> --------------
> trunk/dports/perl/p5-crypt-appletwofish/Portfile
>
> Modified: trunk/dports/perl/p5-crypt-appletwofish/Portfile
> ===================================================================
> --- trunk/dports/perl/p5-crypt-appletwofish/Portfile 2009-09-02
> 00:00:51 UTC (rev 56740)
> +++ trunk/dports/perl/p5-crypt-appletwofish/Portfile 2009-09-02
> 00:05:02 UTC (rev 56741)
> @@ -1,20 +1,22 @@
> # $Id$
>
> -PortSystem 1.0
> -PortGroup perl5 1.0
> +PortSystem 1.0
> +PortGroup perl5 1.0
>
> -perl5.setup Crypt-AppleTwoFish 0.051
> -maintainers narf_tm openmaintainer
> -description two Apple iTMS/iTunes key descrambling algorithms
> -long_description The first algorithm appears to have only
> cursory \
> - resemblance to Bruce Schneier's blowfish and
> twofish \
> - algorithms in that it too has a table-based
> decoder. \
> - The second algorithm is more standard
> encryption using \
> - S-box type permutations and lookup tables, and
> might \
> - have started out something like Twofish or
> Blowfish.
> +perl5.setup Crypt-AppleTwoFish 0.051
> +maintainers narf_tm openmaintainer
> +description two Apple iTMS/iTunes key descrambling
> algorithms
> +long_description The first algorithm appears to have only
> cursory \
> + resemblance to Bruce Schneier's blowfish and
> twofish \
> + algorithms in that it too has a table-based
> decoder. \
> + The second algorithm is more standard
> encryption using \
> + S-box type permutations and lookup tables,
> and might \
> + have started out something like Twofish or
> Blowfish.
>
> -platforms darwin
> +platforms darwin
>
> -checksums md5 b37a913ad65a66a8b039d577e7c3b83b \
> - sha1 21122281f52938960270cdff3baebd58f3250b79 \
> - rmd160 a3056423752533c1255a98e6476cffe2602e1b36
> +checksums md5 b37a913ad65a66a8b039d577e7c3b83b \
> + sha1 21122281f52938960270cdff3baebd58f3250b79 \
> + rmd160 a3056423752533c1255a98e6476cffe2602e1b36
> +
> +depends_lib-append port:p5-digest-sha
More information about the macports-dev
mailing list