head	1.2;
access;
symbols
	RELEASE_8_3_0:1.2
	RELEASE_9_0_0:1.2
	RELEASE_7_4_0:1.2
	RELEASE_8_2_0:1.2
	RELEASE_6_EOL:1.2
	RELEASE_8_1_0:1.2
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.2
	RELEASE_7_2_0:1.2
	RELEASE_7_1_0:1.2
	RELEASE_6_4_0:1.2
	RELEASE_5_EOL:1.2
	RELEASE_7_0_0:1.2
	RELEASE_6_3_0:1.2
	PRE_XORG_7:1.2
	RELEASE_4_EOL:1.2
	RELEASE_6_2_0:1.1;
locks; strict;
comment	@# @;


1.2
date	2006.11.14.12.36.52;	author laszlof;	state Exp;
branches;
next	1.1;

1.1
date	2006.07.11.15.41.19;	author garga;	state Exp;
branches;
next	;


desc
@@


1.2
log
@Correct pkg-plist, and add dependency for cracklib.

PR:		ports/105299
Submitted by:	Bill Moran <wmoran@@collaborativefusion.com> (maintainer)
Approved by:	flz (mentor)
@
text
@include/php/ext/crack/config.h
include/php/ext/crack/php_crack.h
@@dirrm include/php/ext/crack
@


1.1
log
@This package provides an interface to the cracklib (libcrack) libraries that
come standard on most unix-like distributions. This allows you to check
passwords against dictionaries of words to ensure some minimal level of
password security.

From the cracklib README
CrackLib makes literally hundreds of tests to determine whether you've
chosen a bad password.

* It tries to generate words from your username and gecos entry to tries
to match them against what you've chosen.

* It checks for simplistic patterns.

* It then tries to reverse-engineer your password into a dictionary
word, and searches for it in your dictionary.

- after all that, it's PROBABLY a safe(-ish) password. 8-)

WWW: http://pecl.php.net/package/crack

PR:		ports/94244
Submitted by:	Bill Moran <wmoran at collaborativefusion.com>
@
text
@a0 1
include/php/ext/crack
d3 1
a3 1
lib/php/20050922/crack.so
@

