head	1.3;
access;
symbols
	RELEASE_8_3_0:1.3
	RELEASE_9_0_0:1.2;
locks; strict;
comment	@# @;


1.3
date	2012.01.08.01.44.23;	author wxs;	state Exp;
branches;
next	1.2;

1.2
date	2011.05.23.15.54.10;	author wxs;	state Exp;
branches;
next	1.1;

1.1
date	2011.03.07.18.04.49;	author wxs;	state Exp;
branches;
next	;


desc
@@


1.3
log
@Update to 1.6.

While here, fix build with clang by setting USE_CSTD=gnu89.
@
text
@SHA256 (yara-1.6.tar.gz) = af92ac3481212245944561888f6b128cc13fe736fbabf90cc80c26f6179bc9f3
SIZE (yara-1.6.tar.gz) = 523880
@


1.2
log
@- Update to 1.5.
- Switch to devel/re2 instead of PCRE.
@
text
@d1 2
a2 2
SHA256 (yara-1.5.tar.gz) = de9827abd884e79282461dec878254f537c141110e7e2c9e7b4091ecd7ad7666
SIZE (yara-1.5.tar.gz) = 586642
@


1.1
log
@Two new ports: security/yara and security/py-yara. The latter is the python
bindings for the former.

"YARA is a tool aimed at helping malware researchers to identify and classify
malware samples. With YARA you can create descriptions of malware families
based on textual or binary patterns contained on samples of those families.
Each description consists of a set of strings and a Boolean expression which
determines its logic."

WWW: http://code.google.com/p/yara-project/
@
text
@d1 2
a2 2
SHA256 (yara-1.4.tar.gz) = c040cc139030e49f736200d3a951922d417fc660cf4c81484ff1ca1a06f83952
SIZE (yara-1.4.tar.gz) = 462125
@

