head	1.4;
access;
symbols
	RELEASE_8_3_0:1.4
	RELEASE_9_0_0:1.4
	RELEASE_7_4_0:1.3
	RELEASE_8_2_0:1.3
	RELEASE_6_EOL:1.3
	RELEASE_8_1_0:1.3
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.2;
locks; strict;
comment	@# @;


1.4
date	2011.07.03.14.03.38;	author ohauer;	state Exp;
branches;
next	1.3;

1.3
date	2010.05.26.08.11.57;	author wen;	state Exp;
branches;
next	1.2;

1.2
date	2009.07.04.22.37.09;	author miwi;	state Exp;
branches;
next	1.1;

1.1
date	2009.05.29.11.56.22;	author miwi;	state Exp;
branches;
next	;


desc
@@


1.4
log
@-remove MD5
@
text
@SHA256 (scrypt-1.1.6.tgz) = dfd0d1a544439265bbb9b58043ad3c8ce50a3987b44a61b1d39fd7a3ed5b7fb8
SIZE (scrypt-1.1.6.tgz) = 83776
@


1.3
log
@- Update to 1.1.6
- Update my mail to FreeBSD
@
text
@a0 1
MD5 (scrypt-1.1.6.tgz) = a35523cd497f7283635ce881db39c2e2
@


1.2
log
@- Update to 1.1.4

PR:		136317
Submitted by:	cperciva@@
@
text
@d1 3
a3 3
MD5 (scrypt-1.1.4.tgz) = c4df85cfd7e165af0a306d04e38bd15d
SHA256 (scrypt-1.1.4.tgz) = a5b956b2b02ea272303d2d1354e55a8a9d8b8831f6518c6adf6be87abf91ce19
SIZE (scrypt-1.1.4.tgz) = 82902
@


1.1
log
@The scrypt key derivation function was originally developed for use in
the Tarsnap online backup system and is designed to be far more secure
against hardware brute-force attacks than alternative functions such as
PBKDF2 or bcrypt.

WWW:   http://www.tarsnap.com/scrypt/

PR:		ports/134961
Submitted by:	Wen Heping <wenheping at gmail.com>
@
text
@d1 3
a3 3
MD5 (scrypt-1.1.3.tgz) = 36d8554574cebe45613273de9bed310a
SHA256 (scrypt-1.1.3.tgz) = 437009b4ac70e4c2477d1ea31ae0ad8218e14eb9d41073ff51d8f074f11a374f
SIZE (scrypt-1.1.3.tgz) = 79571
@

