head	1.3;
access;
symbols
	RELEASE_8_3_0:1.3
	RELEASE_9_0_0:1.2;
locks; strict;
comment	@# @;


1.3
date	2012.01.08.01.44.55;	author wxs;	state Exp;
branches;
next	1.2;

1.2
date	2011.05.23.16.05.40;	author wxs;	state Exp;
branches;
next	1.1;

1.1
date	2011.03.07.18.04.49;	author wxs;	state Exp;
branches;
next	;


desc
@@


1.3
log
@- Update to 1.6.
@
text
@SHA256 (yara-python-1.6.tar.gz) = bc1b2cfd51634203041395509aaa248dbfaa027822bd79978c9624d2f2def404
SIZE (yara-python-1.6.tar.gz) = 8780
@


1.2
log
@- Update to 1.5
- Don't hardcode py2.7
- Respect custom LOCALBASE
@
text
@d1 2
a2 2
SHA256 (yara-python-1.5.tar.gz) = 77175498845e49e680022da4812967d041a5937c3daae54285d589e1b856f55a
SIZE (yara-python-1.5.tar.gz) = 8072
@


1.1
log
@Two new ports: security/yara and security/py-yara. The latter is the python
bindings for the former.

"YARA is a tool aimed at helping malware researchers to identify and classify
malware samples. With YARA you can create descriptions of malware families
based on textual or binary patterns contained on samples of those families.
Each description consists of a set of strings and a Boolean expression which
determines its logic."

WWW: http://code.google.com/p/yara-project/
@
text
@d1 2
a2 2
SHA256 (yara-python-1.4a.tar.gz) = 0221b6b5178edc99584fb0e082ebbc454e3e33701112f7041349e547a8aabc66
SIZE (yara-python-1.4a.tar.gz) = 7504
@

