head	1.2;
access;
symbols
	RELEASE_8_3_0:1.2
	RELEASE_9_0_0:1.2
	RELEASE_7_4_0:1.1
	RELEASE_8_2_0:1.1
	RELEASE_6_EOL:1.1
	RELEASE_8_1_0:1.1
	RELEASE_7_3_0:1.1
	RELEASE_8_0_0:1.1
	RELEASE_7_2_0:1.1
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1
	RELEASE_7_0_0:1.1
	RELEASE_6_3_0:1.1
	PRE_XORG_7:1.1
	RELEASE_4_EOL:1.1
	RELEASE_6_2_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2011.07.03.14.03.27;	author ohauer;	state Exp;
branches;
next	1.1;

1.1
date	2006.07.11.15.41.19;	author garga;	state Exp;
branches;
next	;


desc
@@


1.2
log
@-remove MD5
@
text
@SHA256 (PECL/crack-0.4.1.tgz) = d9ba43b3678fb46db0eee659d9e000e9bad682bc7702d33f6d7e293d7f6f08ad
SIZE (PECL/crack-0.4.1.tgz) = 25143
@


1.1
log
@This package provides an interface to the cracklib (libcrack) libraries that
come standard on most unix-like distributions. This allows you to check
passwords against dictionaries of words to ensure some minimal level of
password security.

From the cracklib README
CrackLib makes literally hundreds of tests to determine whether you've
chosen a bad password.

* It tries to generate words from your username and gecos entry to tries
to match them against what you've chosen.

* It checks for simplistic patterns.

* It then tries to reverse-engineer your password into a dictionary
word, and searches for it in your dictionary.

- after all that, it's PROBABLY a safe(-ish) password. 8-)

WWW: http://pecl.php.net/package/crack

PR:		ports/94244
Submitted by:	Bill Moran <wmoran at collaborativefusion.com>
@
text
@a0 1
MD5 (PECL/crack-0.4.1.tgz) = e64224cef6c8181f90cc669dae5dfe17
@

