<feed xmlns='http://www.w3.org/2005/Atom'>
<title>buildroot/package/ccrypt, branch 2016.02</title>
<subtitle>OpenPOWER buildroot sources</subtitle>
<id>https://git.raptorcs.com/git/buildroot/atom?h=2016.02</id>
<link rel='self' href='https://git.raptorcs.com/git/buildroot/atom?h=2016.02'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/'/>
<updated>2014-12-28T21:21:16+00:00</updated>
<entry>
<title>package: add hashes for SourceForge-hosted packages</title>
<updated>2014-12-28T21:21:16+00:00</updated>
<author>
<name>Yann E. MORIN</name>
<email>yann.morin.1998@free.fr</email>
</author>
<published>2014-12-28T12:19:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=2ced21f8f982ef199b99ccc1f35dff6611b90c89'/>
<id>urn:sha1:2ced21f8f982ef199b99ccc1f35dff6611b90c89</id>
<content type='text'>
Since SourceForge sometimes serves us faulty tarballs, we can tons of
autobuild failures:
    http://autobuild.buildroot.org/results/9fb/9fba5bf086a4e7a29e5f7156ec43847db7aacfc4/
    http://autobuild.buildroot.org/results/6c8/6c837b244c45ac3b3a887734a371cd6d226cf216/
    ...

Fix that by adding hash files for all SourceForge-hosted packages (thos
etht did not already have it).

We normally prefer to use hashes published by upstream, but hunting them
all one by one is a tedious task, so those hashes were all locally
computed with a script that searched for SF-hosted packages, downloades
the associated tarball, computed the hash, and stored it in the
corresponding .hash file.

Also, SF publishes sha1 hashes, while I used the stronger sha256, since
sha1 is now considered to be relatively weak.

Signed-off-by: "Yann E. MORIN" &lt;yann.morin.1998@free.fr&gt;
Cc: Peter Korsgaard &lt;jacmet@uclibc.org&gt;
Cc: Thomas Petazzoni &lt;thomas.petazzoni@free-electrons.com&gt;
Cc: Maxime Hadjinlian &lt;maxime.hadjinlian@gmail.com&gt;
Cc: Richard Braun &lt;rbraun@sceen.net&gt;
Cc: Nathaniel Roach &lt;nroach44@gmail.com&gt;
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@free-electrons.com&gt;
</content>
</entry>
<entry>
<title>ccrypt/Config.in: indentation cleanup</title>
<updated>2014-09-02T21:37:36+00:00</updated>
<author>
<name>Jerzy Grzegorek</name>
<email>jerzy.grzegorek@trzebnica.net</email>
</author>
<published>2014-09-02T10:22:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=122f47a8531f419c7e85c332d65ff12a4020bbda'/>
<id>urn:sha1:122f47a8531f419c7e85c332d65ff12a4020bbda</id>
<content type='text'>
Signed-off-by: Jerzy Grzegorek &lt;jerzy.grzegorek@trzebnica.net&gt;
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
<entry>
<title>package: remove the trailing slash sign from &lt;PKG&gt;_SITE variable</title>
<updated>2014-07-31T21:17:46+00:00</updated>
<author>
<name>Jerzy Grzegorek</name>
<email>jerzy.grzegorek@trzebnica.net</email>
</author>
<published>2014-07-31T08:46:58+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=c7f4b964718bc5a3329bb730f59e24091ecbc7a2'/>
<id>urn:sha1:c7f4b964718bc5a3329bb730f59e24091ecbc7a2</id>
<content type='text'>
Since the trailing slash is stripped from $($(PKG)_SITE) by pkg-generic.mk:

$(call DOWNLOAD,$($(PKG)_SITE:/=)/$($(PKG)_SOURCE))

so it is redundant.
This patch removes it from $(PKG)_SITE variable for BR consistency.

Signed-off-by: Jerzy Grzegorek &lt;jerzy.grzegorek@trzebnica.net&gt;
Signed-off-by: Thomas Petazzoni &lt;thomas.petazzoni@free-electrons.com&gt;
</content>
</entry>
<entry>
<title>ccrypt: new package</title>
<updated>2014-07-10T08:53:40+00:00</updated>
<author>
<name>David Bachelart</name>
<email>david.bachelart@bbright.com</email>
</author>
<published>2014-07-09T12:33:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/buildroot/commit/?id=e235ff310a4b7b7144b81cf15d06633c6d7d3d14'/>
<id>urn:sha1:e235ff310a4b7b7144b81cf15d06633c6d7d3d14</id>
<content type='text'>
ccrypt is a utility for encrypting and decrypting files and streams.

Signed-off-by: David Bachelart &lt;david.bachelart@bbright.com&gt;
Reviewed-by: Baruch Siach &lt;baruch@tkos.co.il&gt;
Signed-off-by: Peter Korsgaard &lt;peter@korsgaard.com&gt;
</content>
</entry>
</feed>
