Author: arekm                        Date: Fri Aug 29 11:53:47 2008 GMT
Module: SPECS                         Tag: HEAD
---- Log message:
- up to 0.4

---- Files affected:
SPECS:
   php-pecl-crack.spec (1.21 -> 1.22) 

---- Diffs:

================================================================
Index: SPECS/php-pecl-crack.spec
diff -u SPECS/php-pecl-crack.spec:1.21 SPECS/php-pecl-crack.spec:1.22
--- SPECS/php-pecl-crack.spec:1.21      Thu Feb  7 09:55:00 2008
+++ SPECS/php-pecl-crack.spec   Fri Aug 29 13:53:42 2008
@@ -4,12 +4,12 @@
 Summary:       %{_modname} - checks if password is vulnerable to dictionary 
attacks
 Summary(pl.UTF-8):     %{_modname} - sprawdzanie czy hasło jest podatne na 
ataki słownikowe
 Name:          php-pecl-%{_modname}
-Version:       0.3
-Release:       4
+Version:       0.4
+Release:       1
 License:       PHP
 Group:         Development/Languages/PHP
 Source0:       http://pecl.php.net/get/%{_modname}-%{version}.tgz
-# Source0-md5: 43a3dc3e4f2d16bf1e30ccea0d384183
+# Source0-md5: 7cfe9df99f546cf6bd55b535d71e3b1f
 Patch0:                %{name}-m4_fixes.patch
 URL:           http://pecl.php.net/package/crack/
 BuildRequires: cracklib-devel
@@ -80,7 +80,10 @@
 All persons listed below can be reached at <cvs_login>@pld-linux.org
 
 $Log$
-Revision 1.21  2008/02/07 08:55:00  ankry
+Revision 1.22  2008/08/29 11:53:42  arekm
+- up to 0.4
+
+Revision 1.21  2008-02-07 08:55:00  ankry
 - unix -> Unix, gpl -> GPL, etc.
 
 Revision 1.20  2007/02/12 22:09:12  glen
================================================================

---- CVS-web:
    
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/SPECS/php-pecl-crack.spec?r1=1.21&r2=1.22&f=u

_______________________________________________
pld-cvs-commit mailing list
[email protected]
http://lists.pld-linux.org/mailman/listinfo/pld-cvs-commit

Reply via email to