| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
| |
net)
|
|
|
|
| |
Approved by: portmgr (bdrewery)
|
|
|
|
| |
Most contributors copy an existing port when writing their own so reduce the number of bad examples in the tree.
|
|
|
|
|
| |
PR: 176542
Submitted by: Ports Fury
|
|
|
|
|
|
| |
PR: ports/172042
Submitted by: KATO Tsuguru <tkato432@yahoo.com>
Feature safe: yes
|
|
|
|
| |
With hat: portmgr
|
|
|
|
|
|
|
|
|
|
|
| |
literal name_enable wherever possible, and ${name}_enable
when it's not, to prepare for the demise of set_rcvar().
In cases where I had to hand-edit unusual instances also
modify formatting slightly to be more uniform (and in
some cases, correct). This includes adding some $FreeBSD$
tags, and most importantly moving rcvar= to right after
name= so it's clear that one is derived from the other.
|
|
|
|
|
|
| |
PR: ports/157729
Submitted by: "ports@c0decafe.net" <ports@c0decafe.net> (maintainer)
Approved by: bapt (mentor)
|
| |
|
|
It transmits any kind of IP-based data transparently through the Tor
network on a location hidden basis.
You can think of it as a point-to-multipoint VPN between hidden services.
OnionCat is based on anonymizing transport layers like Tor.
WWW: http://www.cypherpunk.at/onioncat/
PR: ports/146433
Submitted by: "ports@c0decafe.net" <ports@c0decafe.net>
|