diff options
Diffstat (limited to 'security')
46 files changed, 46 insertions, 46 deletions
diff --git a/security/p5-Authen-Libwrap/pkg-descr b/security/p5-Authen-Libwrap/pkg-descr index 8d3c2bc4a753..cf4853bd6296 100644 --- a/security/p5-Authen-Libwrap/pkg-descr +++ b/security/p5-Authen-Libwrap/pkg-descr @@ -3,4 +3,4 @@ function from the popular TCP Wrappers security package. This allows validation of network access from perl programs against the system-wide hosts.allow file. -WWW: http://search.cpan.org/dist/Authen-Libwrap +WWW: http://search.cpan.org/dist/Authen-Libwrap/ diff --git a/security/p5-Crypt-AppleTwoFish/pkg-descr b/security/p5-Crypt-AppleTwoFish/pkg-descr index 6e498d944983..4cf2df76ce3d 100644 --- a/security/p5-Crypt-AppleTwoFish/pkg-descr +++ b/security/p5-Crypt-AppleTwoFish/pkg-descr @@ -7,4 +7,4 @@ what would mainly be processing 16 bytes at a time. This code is part of an ongoing effort to clone portions of the Apple iTMS in Perl for portability. See www.hymn-project.org for prior efforts by others. -WWW: http://search.cpan.org/dist/Crypt-AppleTwoFish +WWW: http://search.cpan.org/dist/Crypt-AppleTwoFish/ diff --git a/security/p5-Crypt-CFB/pkg-descr b/security/p5-Crypt-CFB/pkg-descr index 3a99acb1e00f..fcae1d4c182a 100644 --- a/security/p5-Crypt-CFB/pkg-descr +++ b/security/p5-Crypt-CFB/pkg-descr @@ -5,4 +5,4 @@ used, as long as it supports the blocksize and keysize methods. Any hash function in the Digest:: class can be used, as long as it supports the add method. -WWW: http://search.cpan.org/dist/Crypt-CFB +WWW: http://search.cpan.org/dist/Crypt-CFB/ diff --git a/security/p5-Crypt-Caesar/pkg-descr b/security/p5-Crypt-Caesar/pkg-descr index 5aa5caf611a9..24a8bdc6c5fe 100644 --- a/security/p5-Crypt-Caesar/pkg-descr +++ b/security/p5-Crypt-Caesar/pkg-descr @@ -1,3 +1,3 @@ Crypt::Caesar - Decrypt rot-N strings -WWW: http://search.cpan.org/dist/Caesar +WWW: http://search.cpan.org/dist/Caesar/ diff --git a/security/p5-Crypt-Chimera/pkg-descr b/security/p5-Crypt-Chimera/pkg-descr index 77fabf58b982..e35f9c948654 100644 --- a/security/p5-Crypt-Chimera/pkg-descr +++ b/security/p5-Crypt-Chimera/pkg-descr @@ -2,4 +2,4 @@ The Chimera key exchange protocol generates a shared key between two parties. The protocol was shown to be INSECURE. This module is therefore released for purely academic curiosity. -WWW: http://search.cpan.org/dist/Crypt-Chimera +WWW: http://search.cpan.org/dist/Crypt-Chimera/ diff --git a/security/p5-Crypt-Ctr/pkg-descr b/security/p5-Crypt-Ctr/pkg-descr index 6f1328d90a3c..165d337e94fb 100644 --- a/security/p5-Crypt-Ctr/pkg-descr +++ b/security/p5-Crypt-Ctr/pkg-descr @@ -5,4 +5,4 @@ used, as long as it supports the blocksize and keysize methods. Any hash function in the Digest:: class can be used, as long as it supports the add method. -WWW: http://search.cpan.org/dist/Crypt-Ctr +WWW: http://search.cpan.org/dist/Crypt-Ctr/ diff --git a/security/p5-Crypt-DES_PP/pkg-descr b/security/p5-Crypt-DES_PP/pkg-descr index 69ebb2e9e135..97a20b4e2786 100644 --- a/security/p5-Crypt-DES_PP/pkg-descr +++ b/security/p5-Crypt-DES_PP/pkg-descr @@ -20,4 +20,4 @@ processor in order to hack on the sources. This is of no concern for you if you only want to use the module, the preprocessed output is always included in the distribution. -WWW: http://search.cpan.org/dist/Crypt-DES_PP +WWW: http://search.cpan.org/dist/Crypt-DES_PP/ diff --git a/security/p5-Crypt-Enigma/pkg-descr b/security/p5-Crypt-Enigma/pkg-descr index 032a6afab126..89223cbb2ed4 100644 --- a/security/p5-Crypt-Enigma/pkg-descr +++ b/security/p5-Crypt-Enigma/pkg-descr @@ -6,4 +6,4 @@ The implementation allows for all of the Rotors and Reflectors available to the real world Enigma to be used. A Steckerboard has also been implemented, allowing letter substitutions to be made. -WWW: http://search.cpan.org/dist/Crypt-Enigma +WWW: http://search.cpan.org/dist/Crypt-Enigma/ diff --git a/security/p5-Crypt-GOST/pkg-descr b/security/p5-Crypt-GOST/pkg-descr index a95f466d810f..3e04fd13e858 100644 --- a/security/p5-Crypt-GOST/pkg-descr +++ b/security/p5-Crypt-GOST/pkg-descr @@ -6,4 +6,4 @@ interface, with the functions described below. It also provides an interface that is backwards- compatible with Crypt::GOST 0.41, but its use in new code is discouraged. -WWW: http://search.cpan.org/dist/Crypt-GOST +WWW: http://search.cpan.org/dist/Crypt-GOST/ diff --git a/security/p5-Crypt-GOST_PP/pkg-descr b/security/p5-Crypt-GOST_PP/pkg-descr index df46b6bb2e58..a1ee45e1f4f9 100644 --- a/security/p5-Crypt-GOST_PP/pkg-descr +++ b/security/p5-Crypt-GOST_PP/pkg-descr @@ -4,4 +4,4 @@ Union. Please read the Pod documentation contained in the module itself for additional information, including the rationale behind the writing of this module. -WWW: http://search.cpan.org/dist/Crypt-GOST_PP +WWW: http://search.cpan.org/dist/Crypt-GOST_PP/ diff --git a/security/p5-Crypt-GPG/pkg-descr b/security/p5-Crypt-GPG/pkg-descr index 1941ce65188a..cff21075aac5 100644 --- a/security/p5-Crypt-GPG/pkg-descr +++ b/security/p5-Crypt-GPG/pkg-descr @@ -8,4 +8,4 @@ versions. If you find any such problems, or any bugs or documentation errors, please do report them to crypt-gpg at neomailbox.com. -WWW: http://search.cpan.org/dist/Crypt-GPG +WWW: http://search.cpan.org/dist/Crypt-GPG/ diff --git a/security/p5-Crypt-HCE_MD5/pkg-descr b/security/p5-Crypt-HCE_MD5/pkg-descr index 6d60d983bfbd..ec98f2200879 100644 --- a/security/p5-Crypt-HCE_MD5/pkg-descr +++ b/security/p5-Crypt-HCE_MD5/pkg-descr @@ -12,4 +12,4 @@ cleartext between the two sides. An example client and server are packaged as modules with this module. They are used in the tests. -WWW: http://search.cpan.org/dist/Crypt-HECE_MD5 +WWW: http://search.cpan.org/dist/Crypt-HECE_MD5/ diff --git a/security/p5-Crypt-Imail/pkg-descr b/security/p5-Crypt-Imail/pkg-descr index cd94809602a4..2fe72b926237 100644 --- a/security/p5-Crypt-Imail/pkg-descr +++ b/security/p5-Crypt-Imail/pkg-descr @@ -1,4 +1,4 @@ This package is used to encrypt and decrypt passwords generated by IMail. See: http://www.ipswitch.com/products/imail_server/ -WWW: http://search.cpan.org/dist/Crypt-Imail +WWW: http://search.cpan.org/dist/Crypt-Imail/ diff --git a/security/p5-Crypt-Khazad/pkg-descr b/security/p5-Crypt-Khazad/pkg-descr index 5b04e10cc988..89d003228727 100644 --- a/security/p5-Crypt-Khazad/pkg-descr +++ b/security/p5-Crypt-Khazad/pkg-descr @@ -3,4 +3,4 @@ Paulo S. L. M. Barreto, Khazad is a NESSIE finalist for legacy-level block ciphers. Khazad has many similarities with Rijndael, and has an extremely high rate of diffusion. -WWW: http://search.cpan.org/dist/Crypt-Khazad +WWW: http://search.cpan.org/dist/Crypt-Khazad/ diff --git a/security/p5-Crypt-License/pkg-descr b/security/p5-Crypt-License/pkg-descr index 16808b74402d..5a3b34f2879b 100644 --- a/security/p5-Crypt-License/pkg-descr +++ b/security/p5-Crypt-License/pkg-descr @@ -10,4 +10,4 @@ attached encrypted module is loaded and the seconds remaining until License expiration are returned or now() in the case of no expiration. Undef is returned for an expired license (module fails to load). -WWW: http://search.cpan.org/dist/Crypt-License +WWW: http://search.cpan.org/dist/Crypt-License/ diff --git a/security/p5-Crypt-Lite/pkg-descr b/security/p5-Crypt-Lite/pkg-descr index dd67af50f72d..6e2e12830cfc 100644 --- a/security/p5-Crypt-Lite/pkg-descr +++ b/security/p5-Crypt-Lite/pkg-descr @@ -11,4 +11,4 @@ are able to make double or tripple-encryption with any data to increase the security. Decryption works also on hashes that have been encrypted on a foreign host (try this with an unpatched IDEA installation ;-). -WWW: http://search.cpan.org/dist/Crypt-Lite +WWW: http://search.cpan.org/dist/Crypt-Lite/ diff --git a/security/p5-Crypt-Loki97/pkg-descr b/security/p5-Crypt-Loki97/pkg-descr index 60ee61d79fac..f9bf4d564f01 100644 --- a/security/p5-Crypt-Loki97/pkg-descr +++ b/security/p5-Crypt-Loki97/pkg-descr @@ -3,4 +3,4 @@ designed by Lawrie Brown, Josef Pieprzyk, and Jennifer Seberry. The default key length in this implementation is 128 bits. Loki97 was one of the 15 candidates for the AES. -WWW: http://search.cpan.org/dist/Crypt-Loki97 +WWW: http://search.cpan.org/dist/Crypt-Loki97/ diff --git a/security/p5-Crypt-Rabbit/pkg-descr b/security/p5-Crypt-Rabbit/pkg-descr index 8a4ca7f214c3..ee597df8f0ff 100644 --- a/security/p5-Crypt-Rabbit/pkg-descr +++ b/security/p5-Crypt-Rabbit/pkg-descr @@ -2,4 +2,4 @@ Rabbit is a new stream cipher based on the properties of counter assisted stream ciphers, invented by Martin Boesgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen, and Ove Scavenius of Cryptico A/S. -WWW: http://search.cpan.org/dist/Crypt-Rabbit +WWW: http://search.cpan.org/dist/Crypt-Rabbit/ diff --git a/security/p5-Crypt-SKey/pkg-descr b/security/p5-Crypt-SKey/pkg-descr index e3ba17763a1b..8141503dc74b 100644 --- a/security/p5-Crypt-SKey/pkg-descr +++ b/security/p5-Crypt-SKey/pkg-descr @@ -9,4 +9,4 @@ of these functions by exporting them in the same manner as `compute' in the above example. Most S/Key systems use MD4 hashing, but a few (notably OPIE) use MD5. -WWW: http://search.cpan.org/dist/Crypt-SKey +WWW: http://search.cpan.org/dist/Crypt-SKey/ diff --git a/security/p5-Crypt-Salt/pkg-descr b/security/p5-Crypt-Salt/pkg-descr index 6661a5c189b5..c8c695a93913 100644 --- a/security/p5-Crypt-Salt/pkg-descr +++ b/security/p5-Crypt-Salt/pkg-descr @@ -1,4 +1,4 @@ The single exported subroutine in this module is for generating a salt suitable for being fed to crypt() and other similar functions. -WWW: http://search.cpan.org/dist/Crypt-Salt +WWW: http://search.cpan.org/dist/Crypt-Salt/ diff --git a/security/p5-Crypt-SaltedHash/pkg-descr b/security/p5-Crypt-SaltedHash/pkg-descr index a74004e04352..9f9f65142de3 100644 --- a/security/p5-Crypt-SaltedHash/pkg-descr +++ b/security/p5-Crypt-SaltedHash/pkg-descr @@ -3,4 +3,4 @@ salted (or seeded) hashes of clear text data. The original formalization of this concept comes from RFC-3112 and is extended by the use of different digital agorithms. -WWW: http://search.cpan.org/dist/Crypt-SaltedHash +WWW: http://search.cpan.org/dist/Crypt-SaltedHash/ diff --git a/security/p5-Crypt-Shark/pkg-descr b/security/p5-Crypt-Shark/pkg-descr index 869bdb2f6adc..378ae686bf6c 100644 --- a/security/p5-Crypt-Shark/pkg-descr +++ b/security/p5-Crypt-Shark/pkg-descr @@ -2,4 +2,4 @@ Shark is 64-bit block cipher that accepts a 128-bit key. It was designed by Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, and Erik De Win. -WWW: http://search.cpan.org/dist/Crypt-Shark +WWW: http://search.cpan.org/dist/Crypt-Shark/ diff --git a/security/p5-Crypt-TEA/pkg-descr b/security/p5-Crypt-TEA/pkg-descr index 2fb3f87d04c6..dd163dd2dc9a 100644 --- a/security/p5-Crypt-TEA/pkg-descr +++ b/security/p5-Crypt-TEA/pkg-descr @@ -4,4 +4,4 @@ large number of rounds for security, rather than a complex algorithm. It was developed by David J. Wheeler and Roger M. Needham, and is described at http://www.ftp.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-tea.html . -WWW: http://search.cpan.org/dist/Crypt-TEA +WWW: http://search.cpan.org/dist/Crypt-TEA/ diff --git a/security/p5-Crypt-X509/pkg-descr b/security/p5-Crypt-X509/pkg-descr index c2d919b6a572..94fc6004b725 100644 --- a/security/p5-Crypt-X509/pkg-descr +++ b/security/p5-Crypt-X509/pkg-descr @@ -3,4 +3,4 @@ certificate elements. It is based on the generic ASN.1 module by Graham Barr, on the x509decode example by Norbert Klasen and contributions on the perl-ldap-dev-Mailinglist by Chriss Ridd. -WWW: http://search.cpan.org/dist/Crypt-X509 +WWW: http://search.cpan.org/dist/Crypt-X509/ diff --git a/security/p5-Digest-Adler32/pkg-descr b/security/p5-Digest-Adler32/pkg-descr index 919c33c46fdc..e120cf8a5828 100644 --- a/security/p5-Digest-Adler32/pkg-descr +++ b/security/p5-Digest-Adler32/pkg-descr @@ -2,4 +2,4 @@ The Digest::Adler32 module implements the Adler-32 checksum as specified in RFC 1950. The interface provided by this module is specified in Digest, but no functional interface is provided. -WWW: http://search.cpan.org/dist/Digest-Adler32 +WWW: http://search.cpan.org/dist/Digest-Adler32/ diff --git a/security/p5-Digest-CRC/pkg-descr b/security/p5-Digest-CRC/pkg-descr index d0c6604e8273..4678b5bff5c7 100644 --- a/security/p5-Digest-CRC/pkg-descr +++ b/security/p5-Digest-CRC/pkg-descr @@ -1,4 +1,4 @@ The Digest::CRC module calculates CRC sums of all sorts. It contains wrapper functions with the correct parameters for CRC-CCITT, CRC-16 and CRC-32. -WWW: http://search.cpan.org/dist/Digest-CRC +WWW: http://search.cpan.org/dist/Digest-CRC/ diff --git a/security/p5-Digest-Crc32/pkg-descr b/security/p5-Digest-Crc32/pkg-descr index d4e5dfd9ee20..1da94dc7be3a 100644 --- a/security/p5-Digest-Crc32/pkg-descr +++ b/security/p5-Digest-Crc32/pkg-descr @@ -1,4 +1,4 @@ This module provides a perl implementation to generate 32 bits CRC digests for buffers and files. -WWW: http://search.cpan.org/dist/Digest-Crc32 +WWW: http://search.cpan.org/dist/Digest-Crc32/ diff --git a/security/p5-Digest-DJB/pkg-descr b/security/p5-Digest-DJB/pkg-descr index 9caa20a35410..dcc60563de79 100644 --- a/security/p5-Digest-DJB/pkg-descr +++ b/security/p5-Digest-DJB/pkg-descr @@ -2,4 +2,4 @@ Digest::DJB is an implementation of D. J. Bernstein's hash which returns a 32-bit unsigned value for any variable-length input string. An equivalent pure Perl version is also available: Digest::DJB::PurePerl. -WWW: http://search.cpan.org/dist/Digest-DJB +WWW: http://search.cpan.org/dist/Digest-DJB/ diff --git a/security/p5-Digest-DMAC/pkg-descr b/security/p5-Digest-DMAC/pkg-descr index d0176e43ebaf..bd5c3e48fbc8 100644 --- a/security/p5-Digest-DMAC/pkg-descr +++ b/security/p5-Digest-DMAC/pkg-descr @@ -20,4 +20,4 @@ as one of the NESSIE winners for Message Authentication Codes, along with UMAC, TTMAC and HMAC. The current NESSIE specification chooses the AES as block cipher. -WWW: http://search.cpan.org/dist/Digest-DMAC +WWW: http://search.cpan.org/dist/Digest-DMAC/ diff --git a/security/p5-Digest-EMAC/pkg-descr b/security/p5-Digest-EMAC/pkg-descr index b968c595188c..274306526122 100644 --- a/security/p5-Digest-EMAC/pkg-descr +++ b/security/p5-Digest-EMAC/pkg-descr @@ -20,4 +20,4 @@ as one of the NESSIE winners for Message Authentication Codes, along with UMAC, TTMAC and HMAC. The current NESSIE specification chooses the AES as block cipher. -WWW: http://search.cpan.org/dist/Digest-EMAC +WWW: http://search.cpan.org/dist/Digest-EMAC/ diff --git a/security/p5-Digest-Elf/pkg-descr b/security/p5-Digest-Elf/pkg-descr index 7f403897cae2..78393343f827 100644 --- a/security/p5-Digest-Elf/pkg-descr +++ b/security/p5-Digest-Elf/pkg-descr @@ -2,4 +2,4 @@ Digest::Elf provides an XS based implementation of the ElfHash algorithm. ElfHash generates resonably 32 bit integer value from a string in a reasonably short period of time. -WWW: http://search.cpan.org/dist/Digest-Elf +WWW: http://search.cpan.org/dist/Digest-Elf/ diff --git a/security/p5-Digest-FNV/pkg-descr b/security/p5-Digest-FNV/pkg-descr index f1132dbd146e..33daa8886d3d 100644 --- a/security/p5-Digest-FNV/pkg-descr +++ b/security/p5-Digest-FNV/pkg-descr @@ -3,4 +3,4 @@ hashing algorithm which allows variable length input strings to be quickly hashed into unsigned integer values. For more information about this hash, please visit http://www.isthe.com/chongo/tech/comp/fnv/. -WWW: http://search.cpan.org/dist/Digest-FNV +WWW: http://search.cpan.org/dist/Digest-FNV/ diff --git a/security/p5-Digest-Hashcash/pkg-descr b/security/p5-Digest-Hashcash/pkg-descr index a9f618de7eb0..bb846403046e 100644 --- a/security/p5-Digest-Hashcash/pkg-descr +++ b/security/p5-Digest-Hashcash/pkg-descr @@ -2,4 +2,4 @@ This module implements the hashcash hash (or digest, although it's not clearly a digest). For all your information needs please visit http://www.hashcash.org. -WWW: http://search.cpan.org/dist/Digest-Hashcash +WWW: http://search.cpan.org/dist/Digest-Hashcash/ diff --git a/security/p5-Digest-Haval256/pkg-descr b/security/p5-Digest-Haval256/pkg-descr index 72a0c937589d..f7abeddf376f 100644 --- a/security/p5-Digest-Haval256/pkg-descr +++ b/security/p5-Digest-Haval256/pkg-descr @@ -4,4 +4,4 @@ be 3, 4, or 5, while the hash length can be 128, 160, 192, 224, or 256 bits. Thus, there are a total of 15 different outputs. For better security, however, this module implements the 5-round, 256-bit output. -WWW: http://search.cpan.org/dist/Digest-Haval256 +WWW: http://search.cpan.org/dist/Digest-Haval256/ diff --git a/security/p5-Digest-JHash/pkg-descr b/security/p5-Digest-JHash/pkg-descr index 3f23c87787c5..320a173aaa07 100644 --- a/security/p5-Digest-JHash/pkg-descr +++ b/security/p5-Digest-JHash/pkg-descr @@ -4,4 +4,4 @@ input a message of arbitrary length and produces as output a 32-bit "message digest" of the input in the form of an unsigned long integer. See http://burtleburtle.net/bob/hash/doobs.html for more information. -WWW: http://search.cpan.org/dist/Digest-JHash +WWW: http://search.cpan.org/dist/Digest-JHash/ diff --git a/security/p5-Digest-MD5-File/pkg-descr b/security/p5-Digest-MD5-File/pkg-descr index 6fc51dfadbca..d43a087ccc69 100644 --- a/security/p5-Digest-MD5-File/pkg-descr +++ b/security/p5-Digest-MD5-File/pkg-descr @@ -1,3 +1,3 @@ Get MD5 sums for files of a given path or content of a given url. -WWW: http://search.cpan.org/dist/Digest-MD5-File +WWW: http://search.cpan.org/dist/Digest-MD5-File/ diff --git a/security/p5-Digest-MD5-Reverse/pkg-descr b/security/p5-Digest-MD5-Reverse/pkg-descr index c25c3554c74e..e42937a326fa 100644 --- a/security/p5-Digest-MD5-Reverse/pkg-descr +++ b/security/p5-Digest-MD5-Reverse/pkg-descr @@ -4,4 +4,4 @@ to reverse it. This module provides functions to search several online MD5 hashes database and return the results (or return undefined if no match found). -WWW: http://search.cpan.org/dist/Digest-MD5-Reverse +WWW: http://search.cpan.org/dist/Digest-MD5-Reverse/ diff --git a/security/p5-Digest-ManberHash/pkg-descr b/security/p5-Digest-ManberHash/pkg-descr index 2e45622bc8dd..dc06ed3b699e 100644 --- a/security/p5-Digest-ManberHash/pkg-descr +++ b/security/p5-Digest-ManberHash/pkg-descr @@ -1,3 +1,3 @@ Digest::ManberHash - a Perl package to calculate Manber Hashes -WWW: http://search.cpan.org/dist/Digest-ManberHash +WWW: http://search.cpan.org/dist/Digest-ManberHash/ diff --git a/security/p5-Digest-Pearson-PurePerl/pkg-descr b/security/p5-Digest-Pearson-PurePerl/pkg-descr index 009d397bc256..9809fcf05770 100644 --- a/security/p5-Digest-Pearson-PurePerl/pkg-descr +++ b/security/p5-Digest-Pearson-PurePerl/pkg-descr @@ -6,4 +6,4 @@ suited for data load balancing. If you prefer a fast implementation, you might want to consider Digest::Pearson instead. -WWW: http://search.cpan.org/dist/Digest-Pearson-PurePerl +WWW: http://search.cpan.org/dist/Digest-Pearson-PurePerl/ diff --git a/security/p5-Digest-Pearson/pkg-descr b/security/p5-Digest-Pearson/pkg-descr index a9dcd41d5a5d..926db02b1f58 100644 --- a/security/p5-Digest-Pearson/pkg-descr +++ b/security/p5-Digest-Pearson/pkg-descr @@ -7,4 +7,4 @@ The implementation is in C, so it is fast. If you prefer a pure Perl version and can tolerate slower speed, you might want to consider Digest::Pearson::PurePerl instead. -WWW: http://search.cpan.org/dist/Digest-MD5-Pearson +WWW: http://search.cpan.org/dist/Digest-MD5-Pearson/ diff --git a/security/p5-Digest-Perl-MD4/pkg-descr b/security/p5-Digest-Perl-MD4/pkg-descr index 9f871dc70be6..ad6ba46bb32d 100644 --- a/security/p5-Digest-Perl-MD4/pkg-descr +++ b/security/p5-Digest-Perl-MD4/pkg-descr @@ -3,4 +3,4 @@ implementation of MD4 (like `Digest::Perl::MD5'). Because of this, it is slow but avoids platform specific complications. For efficiency you should use `Digest::MD4' instead of this module if it is available. -WWW: http://search.cpan.org/dist/Digest-Perl-MD4 +WWW: http://search.cpan.org/dist/Digest-Perl-MD4/ diff --git a/security/p5-Digest-Perl-MD5/pkg-descr b/security/p5-Digest-Perl-MD5/pkg-descr index d413c9b197d1..8bf34e80627a 100644 --- a/security/p5-Digest-Perl-MD5/pkg-descr +++ b/security/p5-Digest-Perl-MD5/pkg-descr @@ -5,4 +5,4 @@ module if it is available. This module is only usefull for computers where you cannot install "Digest::MD5" (e.g. lack of a C-Compiler). -WWW: http://search.cpan.org/dist/Digest-Perl-MD5 +WWW: http://search.cpan.org/dist/Digest-Perl-MD5/ diff --git a/security/p5-Digest-SHA-PurePerl/pkg-descr b/security/p5-Digest-SHA-PurePerl/pkg-descr index 532ab73fa06d..b8770bc48e55 100644 --- a/security/p5-Digest-SHA-PurePerl/pkg-descr +++ b/security/p5-Digest-SHA-PurePerl/pkg-descr @@ -7,4 +7,4 @@ Digest::SHA::PurePerl is written entirely in Perl. If your platform has a C compiler, you should install the functionally-equivalent (but much faster) Digest::SHA module. -WWW: http://search.cpan.org/dist/Digest-SHA-PurePerl +WWW: http://search.cpan.org/dist/Digest-SHA-PurePerl/ diff --git a/security/p5-Digest-SV1/pkg-descr b/security/p5-Digest-SV1/pkg-descr index bf9e19955aa2..91a18755a28f 100644 --- a/security/p5-Digest-SV1/pkg-descr +++ b/security/p5-Digest-SV1/pkg-descr @@ -1,3 +1,3 @@ Digest::SV1 - Cryptosleazically strong message digest format -WWW: http://search.cpan.org/dist/Digest-SV1 +WWW: http://search.cpan.org/dist/Digest-SV1/ diff --git a/security/p5-Digest-Tiger/pkg-descr b/security/p5-Digest-Tiger/pkg-descr index a9d0e361ea0f..32a2b56bea03 100644 --- a/security/p5-Digest-Tiger/pkg-descr +++ b/security/p5-Digest-Tiger/pkg-descr @@ -1,4 +1,4 @@ A perl module that implements the tiger hash, which is believed to be secure and runs quickly on 64-bit processors. -WWW: http://search.cpan.org/dist/Digest-Tiger +WWW: http://search.cpan.org/dist/Digest-Tiger/ diff --git a/security/p5-Digest-Whirlpool/pkg-descr b/security/p5-Digest-Whirlpool/pkg-descr index 633e6e1ba8f8..981044342a02 100644 --- a/security/p5-Digest-Whirlpool/pkg-descr +++ b/security/p5-Digest-Whirlpool/pkg-descr @@ -1,4 +1,4 @@ Digest::Whirlpool - A 512-bit, collision-resistant, one-way hash function developed by Paulo S. L. M. Barreto and Vincent Rijmen. -WWW: http://search.cpan.org/dist/Digest-Whirlpool +WWW: http://search.cpan.org/dist/Digest-Whirlpool/ |