View | Details | Raw Unified | Return to bug 283994
Collapse All | Expand All

(-)b/security/hidden-lake/Makefile (-2 / +3 lines)
Lines 1-6 Link Here
1
PORTNAME=	hidden-lake
1
PORTNAME=	hidden-lake
2
DISTVERSIONPREFIX=	v
2
DISTVERSIONPREFIX=	v
3
DISTVERSION=	1.8.2
3
DISTVERSION=	1.8.3
4
CATEGORIES=	security net-p2p
4
CATEGORIES=	security net-p2p
5
5
6
MAINTAINER=	alster@vinterdalen.se
6
MAINTAINER=	alster@vinterdalen.se
Lines 13-22 LICENSE_FILE= ${WRKSRC}/LICENSE Link Here
13
USES=		go:1.23,modules
13
USES=		go:1.23,modules
14
14
15
GO_MODULE=	github.com/number571/hidden-lake
15
GO_MODULE=	github.com/number571/hidden-lake
16
GO_TARGET=	./cmd/hla/hla_tcp:hla-tcp \
16
GO_TARGET=	./cmd/hla/hla_tcp:hla_tcp \
17
		./cmd/hlc:hlc \
17
		./cmd/hlc:hlc \
18
		./cmd/hlf:hlf \
18
		./cmd/hlf:hlf \
19
		./cmd/hlm:hlm \
19
		./cmd/hlm:hlm \
20
		./cmd/hlm:hlp \
20
		./cmd/hlr:hlr \
21
		./cmd/hlr:hlr \
21
		./cmd/hls:hls
22
		./cmd/hls:hls
22
23
(-)b/security/hidden-lake/distinfo (-5 / +5 lines)
Lines 1-5 Link Here
1
TIMESTAMP = 1734860802
1
TIMESTAMP = 1736592122
2
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.mod) = ed3357aa38c69af64bcd23253d5277be1832d8c0dbff34f78d8778e9c4475d08
2
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.3/v1.8.3.mod) = e72da809c6a002379cb3a21564748b5595e42289d769f5789c2551308d1a5464
3
SIZE (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.mod) = 339
3
SIZE (go/security_hidden-lake/hidden-lake-v1.8.3/v1.8.3.mod) = 340
4
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.zip) = e65497ea0a3ec6ece0f15959a77f5a86d612eb1c97c36875237d87d45229efde
4
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.3/v1.8.3.zip) = ebb6022ff76763c210b2db6e12fb2ef7ae1edc12b5d87128b8a1a530a801ce1b
5
SIZE (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.zip) = 10617070
5
SIZE (go/security_hidden-lake/hidden-lake-v1.8.3/v1.8.3.zip) = 10878399
(-)b/security/hidden-lake/pkg-descr (+12 lines)
Lines 6-8 composition of several combined services. The HL is a friend-to-friend (F2F) Link Here
6
network, which means building trusted communications. Due to this approach,
6
network, which means building trusted communications. Due to this approach,
7
members of the HL network can avoid spam in their direction, as well as possible
7
members of the HL network can avoid spam in their direction, as well as possible
8
attacks if vulnerabilities are found in the code.
8
attacks if vulnerabilities are found in the code.
9
10
List of applications:
11
12
* Basic:
13
- HLS :: anonymizes traffic using the QB-problem
14
- HLC :: runs many HL services as one application
15
- HLA :: adapts HL traffic to external environments
16
* Applied:
17
- HLM :: messenger with a web interface
18
- HLF :: file sharing with a web interface
19
- HLR :: executes remote access commands
20
- HLP :: ping the node to check the online status
(-)b/security/hidden-lake/pkg-plist (-2 / +2 lines)
Lines 1-7 Link Here
1
bin/hla-tcp
1
bin/hla_tcp
2
bin/hlc
2
bin/hlc
3
bin/hlf
3
bin/hlf
4
bin/hlm
4
bin/hlm
5
bin/hlp
5
bin/hlr
6
bin/hlr
6
bin/hls
7
bin/hls
7
%%PORTDOCS%%%%DOCSDIR%%/CODESTYLE.md
8
%%PORTDOCS%%%%DOCSDIR%%/CODESTYLE.md
8
- 

Return to bug 283994