aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorfenner <fenner@FreeBSD.org>2006-02-21 04:50:22 +0800
committerfenner <fenner@FreeBSD.org>2006-02-21 04:50:22 +0800
commitf61cec262256e9b9d3fc4fa4e862c925a25a32fd (patch)
tree13b0958d2f92120b6145c923da7ffe5793356eb5 /security
parent62e4237b8dae3d8837b2085ae8fde00e9dccf911 (diff)
downloadfreebsd-ports-gnome-f61cec262256e9b9d3fc4fa4e862c925a25a32fd.tar.gz
freebsd-ports-gnome-f61cec262256e9b9d3fc4fa4e862c925a25a32fd.tar.zst
freebsd-ports-gnome-f61cec262256e9b9d3fc4fa4e862c925a25a32fd.zip
Update search.cpan.org WWW: entries to have a trailing slash.
Change some URLs from author dirs to dist dirs. The example in the porter's handbook didn't have the trailing slash; mea culpa for not having caught that when it went in.
Diffstat (limited to 'security')
-rw-r--r--security/p5-Authen-Libwrap/pkg-descr2
-rw-r--r--security/p5-Crypt-AppleTwoFish/pkg-descr2
-rw-r--r--security/p5-Crypt-CFB/pkg-descr2
-rw-r--r--security/p5-Crypt-Caesar/pkg-descr2
-rw-r--r--security/p5-Crypt-Chimera/pkg-descr2
-rw-r--r--security/p5-Crypt-Ctr/pkg-descr2
-rw-r--r--security/p5-Crypt-DES_PP/pkg-descr2
-rw-r--r--security/p5-Crypt-Enigma/pkg-descr2
-rw-r--r--security/p5-Crypt-GOST/pkg-descr2
-rw-r--r--security/p5-Crypt-GOST_PP/pkg-descr2
-rw-r--r--security/p5-Crypt-GPG/pkg-descr2
-rw-r--r--security/p5-Crypt-HCE_MD5/pkg-descr2
-rw-r--r--security/p5-Crypt-Imail/pkg-descr2
-rw-r--r--security/p5-Crypt-Khazad/pkg-descr2
-rw-r--r--security/p5-Crypt-License/pkg-descr2
-rw-r--r--security/p5-Crypt-Lite/pkg-descr2
-rw-r--r--security/p5-Crypt-Loki97/pkg-descr2
-rw-r--r--security/p5-Crypt-Rabbit/pkg-descr2
-rw-r--r--security/p5-Crypt-SKey/pkg-descr2
-rw-r--r--security/p5-Crypt-Salt/pkg-descr2
-rw-r--r--security/p5-Crypt-SaltedHash/pkg-descr2
-rw-r--r--security/p5-Crypt-Shark/pkg-descr2
-rw-r--r--security/p5-Crypt-TEA/pkg-descr2
-rw-r--r--security/p5-Crypt-X509/pkg-descr2
-rw-r--r--security/p5-Digest-Adler32/pkg-descr2
-rw-r--r--security/p5-Digest-CRC/pkg-descr2
-rw-r--r--security/p5-Digest-Crc32/pkg-descr2
-rw-r--r--security/p5-Digest-DJB/pkg-descr2
-rw-r--r--security/p5-Digest-DMAC/pkg-descr2
-rw-r--r--security/p5-Digest-EMAC/pkg-descr2
-rw-r--r--security/p5-Digest-Elf/pkg-descr2
-rw-r--r--security/p5-Digest-FNV/pkg-descr2
-rw-r--r--security/p5-Digest-Hashcash/pkg-descr2
-rw-r--r--security/p5-Digest-Haval256/pkg-descr2
-rw-r--r--security/p5-Digest-JHash/pkg-descr2
-rw-r--r--security/p5-Digest-MD5-File/pkg-descr2
-rw-r--r--security/p5-Digest-MD5-Reverse/pkg-descr2
-rw-r--r--security/p5-Digest-ManberHash/pkg-descr2
-rw-r--r--security/p5-Digest-Pearson-PurePerl/pkg-descr2
-rw-r--r--security/p5-Digest-Pearson/pkg-descr2
-rw-r--r--security/p5-Digest-Perl-MD4/pkg-descr2
-rw-r--r--security/p5-Digest-Perl-MD5/pkg-descr2
-rw-r--r--security/p5-Digest-SHA-PurePerl/pkg-descr2
-rw-r--r--security/p5-Digest-SV1/pkg-descr2
-rw-r--r--security/p5-Digest-Tiger/pkg-descr2
-rw-r--r--security/p5-Digest-Whirlpool/pkg-descr2
46 files changed, 46 insertions, 46 deletions
diff --git a/security/p5-Authen-Libwrap/pkg-descr b/security/p5-Authen-Libwrap/pkg-descr
index 8d3c2bc4a753..cf4853bd6296 100644
--- a/security/p5-Authen-Libwrap/pkg-descr
+++ b/security/p5-Authen-Libwrap/pkg-descr
@@ -3,4 +3,4 @@ function from the popular TCP Wrappers security package. This
allows validation of network access from perl programs against
the system-wide hosts.allow file.
-WWW: http://search.cpan.org/dist/Authen-Libwrap
+WWW: http://search.cpan.org/dist/Authen-Libwrap/
diff --git a/security/p5-Crypt-AppleTwoFish/pkg-descr b/security/p5-Crypt-AppleTwoFish/pkg-descr
index 6e498d944983..4cf2df76ce3d 100644
--- a/security/p5-Crypt-AppleTwoFish/pkg-descr
+++ b/security/p5-Crypt-AppleTwoFish/pkg-descr
@@ -7,4 +7,4 @@ what would mainly be processing 16 bytes at a time. This code is part of an
ongoing effort to clone portions of the Apple iTMS in Perl for portability.
See www.hymn-project.org for prior efforts by others.
-WWW: http://search.cpan.org/dist/Crypt-AppleTwoFish
+WWW: http://search.cpan.org/dist/Crypt-AppleTwoFish/
diff --git a/security/p5-Crypt-CFB/pkg-descr b/security/p5-Crypt-CFB/pkg-descr
index 3a99acb1e00f..fcae1d4c182a 100644
--- a/security/p5-Crypt-CFB/pkg-descr
+++ b/security/p5-Crypt-CFB/pkg-descr
@@ -5,4 +5,4 @@ used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports the
add method.
-WWW: http://search.cpan.org/dist/Crypt-CFB
+WWW: http://search.cpan.org/dist/Crypt-CFB/
diff --git a/security/p5-Crypt-Caesar/pkg-descr b/security/p5-Crypt-Caesar/pkg-descr
index 5aa5caf611a9..24a8bdc6c5fe 100644
--- a/security/p5-Crypt-Caesar/pkg-descr
+++ b/security/p5-Crypt-Caesar/pkg-descr
@@ -1,3 +1,3 @@
Crypt::Caesar - Decrypt rot-N strings
-WWW: http://search.cpan.org/dist/Caesar
+WWW: http://search.cpan.org/dist/Caesar/
diff --git a/security/p5-Crypt-Chimera/pkg-descr b/security/p5-Crypt-Chimera/pkg-descr
index 77fabf58b982..e35f9c948654 100644
--- a/security/p5-Crypt-Chimera/pkg-descr
+++ b/security/p5-Crypt-Chimera/pkg-descr
@@ -2,4 +2,4 @@ The Chimera key exchange protocol generates a shared key between two parties.
The protocol was shown to be INSECURE. This module is therefore released for
purely academic curiosity.
-WWW: http://search.cpan.org/dist/Crypt-Chimera
+WWW: http://search.cpan.org/dist/Crypt-Chimera/
diff --git a/security/p5-Crypt-Ctr/pkg-descr b/security/p5-Crypt-Ctr/pkg-descr
index 6f1328d90a3c..165d337e94fb 100644
--- a/security/p5-Crypt-Ctr/pkg-descr
+++ b/security/p5-Crypt-Ctr/pkg-descr
@@ -5,4 +5,4 @@ used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports
the add method.
-WWW: http://search.cpan.org/dist/Crypt-Ctr
+WWW: http://search.cpan.org/dist/Crypt-Ctr/
diff --git a/security/p5-Crypt-DES_PP/pkg-descr b/security/p5-Crypt-DES_PP/pkg-descr
index 69ebb2e9e135..97a20b4e2786 100644
--- a/security/p5-Crypt-DES_PP/pkg-descr
+++ b/security/p5-Crypt-DES_PP/pkg-descr
@@ -20,4 +20,4 @@ processor in order to hack on the sources. This is of no concern
for you if you only want to use the module, the preprocessed
output is always included in the distribution.
-WWW: http://search.cpan.org/dist/Crypt-DES_PP
+WWW: http://search.cpan.org/dist/Crypt-DES_PP/
diff --git a/security/p5-Crypt-Enigma/pkg-descr b/security/p5-Crypt-Enigma/pkg-descr
index 032a6afab126..89223cbb2ed4 100644
--- a/security/p5-Crypt-Enigma/pkg-descr
+++ b/security/p5-Crypt-Enigma/pkg-descr
@@ -6,4 +6,4 @@ The implementation allows for all of the Rotors and Reflectors available to the
real world Enigma to be used. A Steckerboard has also been implemented,
allowing letter substitutions to be made.
-WWW: http://search.cpan.org/dist/Crypt-Enigma
+WWW: http://search.cpan.org/dist/Crypt-Enigma/
diff --git a/security/p5-Crypt-GOST/pkg-descr b/security/p5-Crypt-GOST/pkg-descr
index a95f466d810f..3e04fd13e858 100644
--- a/security/p5-Crypt-GOST/pkg-descr
+++ b/security/p5-Crypt-GOST/pkg-descr
@@ -6,4 +6,4 @@ interface, with the functions described below. It also provides
an interface that is backwards- compatible with Crypt::GOST 0.41,
but its use in new code is discouraged.
-WWW: http://search.cpan.org/dist/Crypt-GOST
+WWW: http://search.cpan.org/dist/Crypt-GOST/
diff --git a/security/p5-Crypt-GOST_PP/pkg-descr b/security/p5-Crypt-GOST_PP/pkg-descr
index df46b6bb2e58..a1ee45e1f4f9 100644
--- a/security/p5-Crypt-GOST_PP/pkg-descr
+++ b/security/p5-Crypt-GOST_PP/pkg-descr
@@ -4,4 +4,4 @@ Union. Please read the Pod documentation contained in the module
itself for additional information, including the rationale behind
the writing of this module.
-WWW: http://search.cpan.org/dist/Crypt-GOST_PP
+WWW: http://search.cpan.org/dist/Crypt-GOST_PP/
diff --git a/security/p5-Crypt-GPG/pkg-descr b/security/p5-Crypt-GPG/pkg-descr
index 1941ce65188a..cff21075aac5 100644
--- a/security/p5-Crypt-GPG/pkg-descr
+++ b/security/p5-Crypt-GPG/pkg-descr
@@ -8,4 +8,4 @@ versions. If you find any such problems, or any bugs or documentation
errors, please do report them to crypt-gpg at neomailbox.com.
-WWW: http://search.cpan.org/dist/Crypt-GPG
+WWW: http://search.cpan.org/dist/Crypt-GPG/
diff --git a/security/p5-Crypt-HCE_MD5/pkg-descr b/security/p5-Crypt-HCE_MD5/pkg-descr
index 6d60d983bfbd..ec98f2200879 100644
--- a/security/p5-Crypt-HCE_MD5/pkg-descr
+++ b/security/p5-Crypt-HCE_MD5/pkg-descr
@@ -12,4 +12,4 @@ cleartext between the two sides.
An example client and server are packaged as modules with
this module. They are used in the tests.
-WWW: http://search.cpan.org/dist/Crypt-HECE_MD5
+WWW: http://search.cpan.org/dist/Crypt-HECE_MD5/
diff --git a/security/p5-Crypt-Imail/pkg-descr b/security/p5-Crypt-Imail/pkg-descr
index cd94809602a4..2fe72b926237 100644
--- a/security/p5-Crypt-Imail/pkg-descr
+++ b/security/p5-Crypt-Imail/pkg-descr
@@ -1,4 +1,4 @@
This package is used to encrypt and decrypt passwords generated by IMail.
See: http://www.ipswitch.com/products/imail_server/
-WWW: http://search.cpan.org/dist/Crypt-Imail
+WWW: http://search.cpan.org/dist/Crypt-Imail/
diff --git a/security/p5-Crypt-Khazad/pkg-descr b/security/p5-Crypt-Khazad/pkg-descr
index 5b04e10cc988..89d003228727 100644
--- a/security/p5-Crypt-Khazad/pkg-descr
+++ b/security/p5-Crypt-Khazad/pkg-descr
@@ -3,4 +3,4 @@ Paulo S. L. M. Barreto, Khazad is a NESSIE finalist for legacy-level block
ciphers. Khazad has many similarities with Rijndael, and has an extremely
high rate of diffusion.
-WWW: http://search.cpan.org/dist/Crypt-Khazad
+WWW: http://search.cpan.org/dist/Crypt-Khazad/
diff --git a/security/p5-Crypt-License/pkg-descr b/security/p5-Crypt-License/pkg-descr
index 16808b74402d..5a3b34f2879b 100644
--- a/security/p5-Crypt-License/pkg-descr
+++ b/security/p5-Crypt-License/pkg-descr
@@ -10,4 +10,4 @@ attached encrypted module is loaded and the seconds remaining until License
expiration are returned or now() in the case of no expiration. Undef is
returned for an expired license (module fails to load).
-WWW: http://search.cpan.org/dist/Crypt-License
+WWW: http://search.cpan.org/dist/Crypt-License/
diff --git a/security/p5-Crypt-Lite/pkg-descr b/security/p5-Crypt-Lite/pkg-descr
index dd67af50f72d..6e2e12830cfc 100644
--- a/security/p5-Crypt-Lite/pkg-descr
+++ b/security/p5-Crypt-Lite/pkg-descr
@@ -11,4 +11,4 @@ are able to make double or tripple-encryption with any data to increase
the security. Decryption works also on hashes that have been encrypted
on a foreign host (try this with an unpatched IDEA installation ;-).
-WWW: http://search.cpan.org/dist/Crypt-Lite
+WWW: http://search.cpan.org/dist/Crypt-Lite/
diff --git a/security/p5-Crypt-Loki97/pkg-descr b/security/p5-Crypt-Loki97/pkg-descr
index 60ee61d79fac..f9bf4d564f01 100644
--- a/security/p5-Crypt-Loki97/pkg-descr
+++ b/security/p5-Crypt-Loki97/pkg-descr
@@ -3,4 +3,4 @@ designed by Lawrie Brown, Josef Pieprzyk, and Jennifer Seberry. The default
key length in this implementation is 128 bits. Loki97 was one of the 15
candidates for the AES.
-WWW: http://search.cpan.org/dist/Crypt-Loki97
+WWW: http://search.cpan.org/dist/Crypt-Loki97/
diff --git a/security/p5-Crypt-Rabbit/pkg-descr b/security/p5-Crypt-Rabbit/pkg-descr
index 8a4ca7f214c3..ee597df8f0ff 100644
--- a/security/p5-Crypt-Rabbit/pkg-descr
+++ b/security/p5-Crypt-Rabbit/pkg-descr
@@ -2,4 +2,4 @@ Rabbit is a new stream cipher based on the properties of counter assisted
stream ciphers, invented by Martin Boesgaard, Mette Vesterager,
Thomas Pedersen, Jesper Christiansen, and Ove Scavenius of Cryptico A/S.
-WWW: http://search.cpan.org/dist/Crypt-Rabbit
+WWW: http://search.cpan.org/dist/Crypt-Rabbit/
diff --git a/security/p5-Crypt-SKey/pkg-descr b/security/p5-Crypt-SKey/pkg-descr
index e3ba17763a1b..8141503dc74b 100644
--- a/security/p5-Crypt-SKey/pkg-descr
+++ b/security/p5-Crypt-SKey/pkg-descr
@@ -9,4 +9,4 @@ of these functions by exporting them in the same manner as `compute' in
the above example.
Most S/Key systems use MD4 hashing, but a few (notably OPIE) use MD5.
-WWW: http://search.cpan.org/dist/Crypt-SKey
+WWW: http://search.cpan.org/dist/Crypt-SKey/
diff --git a/security/p5-Crypt-Salt/pkg-descr b/security/p5-Crypt-Salt/pkg-descr
index 6661a5c189b5..c8c695a93913 100644
--- a/security/p5-Crypt-Salt/pkg-descr
+++ b/security/p5-Crypt-Salt/pkg-descr
@@ -1,4 +1,4 @@
The single exported subroutine in this module is for generating a salt
suitable for being fed to crypt() and other similar functions.
-WWW: http://search.cpan.org/dist/Crypt-Salt
+WWW: http://search.cpan.org/dist/Crypt-Salt/
diff --git a/security/p5-Crypt-SaltedHash/pkg-descr b/security/p5-Crypt-SaltedHash/pkg-descr
index a74004e04352..9f9f65142de3 100644
--- a/security/p5-Crypt-SaltedHash/pkg-descr
+++ b/security/p5-Crypt-SaltedHash/pkg-descr
@@ -3,4 +3,4 @@ salted (or seeded) hashes of clear text data. The original formalization of
this concept comes from RFC-3112 and is extended by the use of different
digital agorithms.
-WWW: http://search.cpan.org/dist/Crypt-SaltedHash
+WWW: http://search.cpan.org/dist/Crypt-SaltedHash/
diff --git a/security/p5-Crypt-Shark/pkg-descr b/security/p5-Crypt-Shark/pkg-descr
index 869bdb2f6adc..378ae686bf6c 100644
--- a/security/p5-Crypt-Shark/pkg-descr
+++ b/security/p5-Crypt-Shark/pkg-descr
@@ -2,4 +2,4 @@ Shark is 64-bit block cipher that accepts a 128-bit key. It was
designed by Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon
Bosselaers, and Erik De Win.
-WWW: http://search.cpan.org/dist/Crypt-Shark
+WWW: http://search.cpan.org/dist/Crypt-Shark/
diff --git a/security/p5-Crypt-TEA/pkg-descr b/security/p5-Crypt-TEA/pkg-descr
index 2fb3f87d04c6..dd163dd2dc9a 100644
--- a/security/p5-Crypt-TEA/pkg-descr
+++ b/security/p5-Crypt-TEA/pkg-descr
@@ -4,4 +4,4 @@ large number of rounds for security, rather than a complex algorithm. It was
developed by David J. Wheeler and Roger M. Needham, and is described at
http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-tea.html .
-WWW: http://search.cpan.org/dist/Crypt-TEA
+WWW: http://search.cpan.org/dist/Crypt-TEA/
diff --git a/security/p5-Crypt-X509/pkg-descr b/security/p5-Crypt-X509/pkg-descr
index c2d919b6a572..94fc6004b725 100644
--- a/security/p5-Crypt-X509/pkg-descr
+++ b/security/p5-Crypt-X509/pkg-descr
@@ -3,4 +3,4 @@ certificate elements. It is based on the generic ASN.1 module by Graham Barr,
on the x509decode example by Norbert Klasen and contributions on the
perl-ldap-dev-Mailinglist by Chriss Ridd.
-WWW: http://search.cpan.org/dist/Crypt-X509
+WWW: http://search.cpan.org/dist/Crypt-X509/
diff --git a/security/p5-Digest-Adler32/pkg-descr b/security/p5-Digest-Adler32/pkg-descr
index 919c33c46fdc..e120cf8a5828 100644
--- a/security/p5-Digest-Adler32/pkg-descr
+++ b/security/p5-Digest-Adler32/pkg-descr
@@ -2,4 +2,4 @@ The Digest::Adler32 module implements the Adler-32 checksum as specified
in RFC 1950. The interface provided by this module is specified in Digest,
but no functional interface is provided.
-WWW: http://search.cpan.org/dist/Digest-Adler32
+WWW: http://search.cpan.org/dist/Digest-Adler32/
diff --git a/security/p5-Digest-CRC/pkg-descr b/security/p5-Digest-CRC/pkg-descr
index d0c6604e8273..4678b5bff5c7 100644
--- a/security/p5-Digest-CRC/pkg-descr
+++ b/security/p5-Digest-CRC/pkg-descr
@@ -1,4 +1,4 @@
The Digest::CRC module calculates CRC sums of all sorts. It contains wrapper
functions with the correct parameters for CRC-CCITT, CRC-16 and CRC-32.
-WWW: http://search.cpan.org/dist/Digest-CRC
+WWW: http://search.cpan.org/dist/Digest-CRC/
diff --git a/security/p5-Digest-Crc32/pkg-descr b/security/p5-Digest-Crc32/pkg-descr
index d4e5dfd9ee20..1da94dc7be3a 100644
--- a/security/p5-Digest-Crc32/pkg-descr
+++ b/security/p5-Digest-Crc32/pkg-descr
@@ -1,4 +1,4 @@
This module provides a perl implementation to generate 32 bits CRC digests for
buffers and files.
-WWW: http://search.cpan.org/dist/Digest-Crc32
+WWW: http://search.cpan.org/dist/Digest-Crc32/
diff --git a/security/p5-Digest-DJB/pkg-descr b/security/p5-Digest-DJB/pkg-descr
index 9caa20a35410..dcc60563de79 100644
--- a/security/p5-Digest-DJB/pkg-descr
+++ b/security/p5-Digest-DJB/pkg-descr
@@ -2,4 +2,4 @@ Digest::DJB is an implementation of D. J. Bernstein's hash which returns a
32-bit unsigned value for any variable-length input string. An equivalent pure
Perl version is also available: Digest::DJB::PurePerl.
-WWW: http://search.cpan.org/dist/Digest-DJB
+WWW: http://search.cpan.org/dist/Digest-DJB/
diff --git a/security/p5-Digest-DMAC/pkg-descr b/security/p5-Digest-DMAC/pkg-descr
index d0176e43ebaf..bd5c3e48fbc8 100644
--- a/security/p5-Digest-DMAC/pkg-descr
+++ b/security/p5-Digest-DMAC/pkg-descr
@@ -20,4 +20,4 @@ as one of the NESSIE winners for Message Authentication Codes, along
with UMAC, TTMAC and HMAC. The current NESSIE specification chooses the
AES as block cipher.
-WWW: http://search.cpan.org/dist/Digest-DMAC
+WWW: http://search.cpan.org/dist/Digest-DMAC/
diff --git a/security/p5-Digest-EMAC/pkg-descr b/security/p5-Digest-EMAC/pkg-descr
index b968c595188c..274306526122 100644
--- a/security/p5-Digest-EMAC/pkg-descr
+++ b/security/p5-Digest-EMAC/pkg-descr
@@ -20,4 +20,4 @@ as one of the NESSIE winners for Message Authentication Codes, along
with UMAC, TTMAC and HMAC. The current NESSIE specification chooses the
AES as block cipher.
-WWW: http://search.cpan.org/dist/Digest-EMAC
+WWW: http://search.cpan.org/dist/Digest-EMAC/
diff --git a/security/p5-Digest-Elf/pkg-descr b/security/p5-Digest-Elf/pkg-descr
index 7f403897cae2..78393343f827 100644
--- a/security/p5-Digest-Elf/pkg-descr
+++ b/security/p5-Digest-Elf/pkg-descr
@@ -2,4 +2,4 @@ Digest::Elf provides an XS based implementation of the ElfHash algorithm.
ElfHash generates resonably 32 bit integer value from a string in a
reasonably short period of time.
-WWW: http://search.cpan.org/dist/Digest-Elf
+WWW: http://search.cpan.org/dist/Digest-Elf/
diff --git a/security/p5-Digest-FNV/pkg-descr b/security/p5-Digest-FNV/pkg-descr
index f1132dbd146e..33daa8886d3d 100644
--- a/security/p5-Digest-FNV/pkg-descr
+++ b/security/p5-Digest-FNV/pkg-descr
@@ -3,4 +3,4 @@ hashing algorithm which allows variable length input strings to be quickly
hashed into unsigned integer values. For more information about this hash,
please visit http://www.isthe.com/chongo/tech/comp/fnv/.
-WWW: http://search.cpan.org/dist/Digest-FNV
+WWW: http://search.cpan.org/dist/Digest-FNV/
diff --git a/security/p5-Digest-Hashcash/pkg-descr b/security/p5-Digest-Hashcash/pkg-descr
index a9f618de7eb0..bb846403046e 100644
--- a/security/p5-Digest-Hashcash/pkg-descr
+++ b/security/p5-Digest-Hashcash/pkg-descr
@@ -2,4 +2,4 @@ This module implements the hashcash hash (or digest, although it's not
clearly a digest). For all your information needs please
visit http://www.hashcash.org.
-WWW: http://search.cpan.org/dist/Digest-Hashcash
+WWW: http://search.cpan.org/dist/Digest-Hashcash/
diff --git a/security/p5-Digest-Haval256/pkg-descr b/security/p5-Digest-Haval256/pkg-descr
index 72a0c937589d..f7abeddf376f 100644
--- a/security/p5-Digest-Haval256/pkg-descr
+++ b/security/p5-Digest-Haval256/pkg-descr
@@ -4,4 +4,4 @@ be 3, 4, or 5, while the hash length can be 128, 160, 192, 224, or 256 bits.
Thus, there are a total of 15 different outputs. For better security, however,
this module implements the 5-round, 256-bit output.
-WWW: http://search.cpan.org/dist/Digest-Haval256
+WWW: http://search.cpan.org/dist/Digest-Haval256/
diff --git a/security/p5-Digest-JHash/pkg-descr b/security/p5-Digest-JHash/pkg-descr
index 3f23c87787c5..320a173aaa07 100644
--- a/security/p5-Digest-JHash/pkg-descr
+++ b/security/p5-Digest-JHash/pkg-descr
@@ -4,4 +4,4 @@ input a message of arbitrary length and produces as output a 32-bit
"message digest" of the input in the form of an unsigned long integer.
See http://burtleburtle.net/bob/hash/doobs.html for more information.
-WWW: http://search.cpan.org/dist/Digest-JHash
+WWW: http://search.cpan.org/dist/Digest-JHash/
diff --git a/security/p5-Digest-MD5-File/pkg-descr b/security/p5-Digest-MD5-File/pkg-descr
index 6fc51dfadbca..d43a087ccc69 100644
--- a/security/p5-Digest-MD5-File/pkg-descr
+++ b/security/p5-Digest-MD5-File/pkg-descr
@@ -1,3 +1,3 @@
Get MD5 sums for files of a given path or content of a given url.
-WWW: http://search.cpan.org/dist/Digest-MD5-File
+WWW: http://search.cpan.org/dist/Digest-MD5-File/
diff --git a/security/p5-Digest-MD5-Reverse/pkg-descr b/security/p5-Digest-MD5-Reverse/pkg-descr
index c25c3554c74e..e42937a326fa 100644
--- a/security/p5-Digest-MD5-Reverse/pkg-descr
+++ b/security/p5-Digest-MD5-Reverse/pkg-descr
@@ -4,4 +4,4 @@ to reverse it.
This module provides functions to search several online MD5 hashes database and
return the results (or return undefined if no match found).
-WWW: http://search.cpan.org/dist/Digest-MD5-Reverse
+WWW: http://search.cpan.org/dist/Digest-MD5-Reverse/
diff --git a/security/p5-Digest-ManberHash/pkg-descr b/security/p5-Digest-ManberHash/pkg-descr
index 2e45622bc8dd..dc06ed3b699e 100644
--- a/security/p5-Digest-ManberHash/pkg-descr
+++ b/security/p5-Digest-ManberHash/pkg-descr
@@ -1,3 +1,3 @@
Digest::ManberHash - a Perl package to calculate Manber Hashes
-WWW: http://search.cpan.org/dist/Digest-ManberHash
+WWW: http://search.cpan.org/dist/Digest-ManberHash/
diff --git a/security/p5-Digest-Pearson-PurePerl/pkg-descr b/security/p5-Digest-Pearson-PurePerl/pkg-descr
index 009d397bc256..9809fcf05770 100644
--- a/security/p5-Digest-Pearson-PurePerl/pkg-descr
+++ b/security/p5-Digest-Pearson-PurePerl/pkg-descr
@@ -6,4 +6,4 @@ suited for data load balancing.
If you prefer a fast implementation, you might want to
consider Digest::Pearson instead.
-WWW: http://search.cpan.org/dist/Digest-Pearson-PurePerl
+WWW: http://search.cpan.org/dist/Digest-Pearson-PurePerl/
diff --git a/security/p5-Digest-Pearson/pkg-descr b/security/p5-Digest-Pearson/pkg-descr
index a9dcd41d5a5d..926db02b1f58 100644
--- a/security/p5-Digest-Pearson/pkg-descr
+++ b/security/p5-Digest-Pearson/pkg-descr
@@ -7,4 +7,4 @@ The implementation is in C, so it is fast. If you prefer a pure Perl version
and can tolerate slower speed, you might want to consider
Digest::Pearson::PurePerl instead.
-WWW: http://search.cpan.org/dist/Digest-MD5-Pearson
+WWW: http://search.cpan.org/dist/Digest-MD5-Pearson/
diff --git a/security/p5-Digest-Perl-MD4/pkg-descr b/security/p5-Digest-Perl-MD4/pkg-descr
index 9f871dc70be6..ad6ba46bb32d 100644
--- a/security/p5-Digest-Perl-MD4/pkg-descr
+++ b/security/p5-Digest-Perl-MD4/pkg-descr
@@ -3,4 +3,4 @@ implementation of MD4 (like `Digest::Perl::MD5'). Because of this, it is
slow but avoids platform specific complications. For efficiency you
should use `Digest::MD4' instead of this module if it is available.
-WWW: http://search.cpan.org/dist/Digest-Perl-MD4
+WWW: http://search.cpan.org/dist/Digest-Perl-MD4/
diff --git a/security/p5-Digest-Perl-MD5/pkg-descr b/security/p5-Digest-Perl-MD5/pkg-descr
index d413c9b197d1..8bf34e80627a 100644
--- a/security/p5-Digest-Perl-MD5/pkg-descr
+++ b/security/p5-Digest-Perl-MD5/pkg-descr
@@ -5,4 +5,4 @@ module if it is available. This module is only usefull for
computers where you cannot install "Digest::MD5" (e.g. lack of a
C-Compiler).
-WWW: http://search.cpan.org/dist/Digest-Perl-MD5
+WWW: http://search.cpan.org/dist/Digest-Perl-MD5/
diff --git a/security/p5-Digest-SHA-PurePerl/pkg-descr b/security/p5-Digest-SHA-PurePerl/pkg-descr
index 532ab73fa06d..b8770bc48e55 100644
--- a/security/p5-Digest-SHA-PurePerl/pkg-descr
+++ b/security/p5-Digest-SHA-PurePerl/pkg-descr
@@ -7,4 +7,4 @@ Digest::SHA::PurePerl is written entirely in Perl. If your platform
has a C compiler, you should install the functionally-equivalent
(but much faster) Digest::SHA module.
-WWW: http://search.cpan.org/dist/Digest-SHA-PurePerl
+WWW: http://search.cpan.org/dist/Digest-SHA-PurePerl/
diff --git a/security/p5-Digest-SV1/pkg-descr b/security/p5-Digest-SV1/pkg-descr
index bf9e19955aa2..91a18755a28f 100644
--- a/security/p5-Digest-SV1/pkg-descr
+++ b/security/p5-Digest-SV1/pkg-descr
@@ -1,3 +1,3 @@
Digest::SV1 - Cryptosleazically strong message digest format
-WWW: http://search.cpan.org/dist/Digest-SV1
+WWW: http://search.cpan.org/dist/Digest-SV1/
diff --git a/security/p5-Digest-Tiger/pkg-descr b/security/p5-Digest-Tiger/pkg-descr
index a9d0e361ea0f..32a2b56bea03 100644
--- a/security/p5-Digest-Tiger/pkg-descr
+++ b/security/p5-Digest-Tiger/pkg-descr
@@ -1,4 +1,4 @@
A perl module that implements the tiger hash, which is believed to be secure
and runs quickly on 64-bit processors.
-WWW: http://search.cpan.org/dist/Digest-Tiger
+WWW: http://search.cpan.org/dist/Digest-Tiger/
diff --git a/security/p5-Digest-Whirlpool/pkg-descr b/security/p5-Digest-Whirlpool/pkg-descr
index 633e6e1ba8f8..981044342a02 100644
--- a/security/p5-Digest-Whirlpool/pkg-descr
+++ b/security/p5-Digest-Whirlpool/pkg-descr
@@ -1,4 +1,4 @@
Digest::Whirlpool - A 512-bit, collision-resistant, one-way hash function
developed by Paulo S. L. M. Barreto and Vincent Rijmen.
-WWW: http://search.cpan.org/dist/Digest-Whirlpool
+WWW: http://search.cpan.org/dist/Digest-Whirlpool/