# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 # $Id: Portfile 146163 2016-03-01 17:12:29Z cal@macports.org $ PortSystem 1.0 name tor conflicts tor-devel version 0.2.7.6 revision 2 categories security platforms darwin maintainers maclemon.at:macports.org openmaintainer license BSD description anonymizing overlay network for TCP long_description Tor provides a distributed network of servers \ (onion routers). Users bounce their TCP streams \ (web traffic, FTP, SSH, etc.) around the \ routers. This makes it hard for recipients, \ observers, and even the onion routers \ themselves to track the source of the stream. homepage https://www.torproject.org/ master_sites https://dist.torproject.org/ checksums rmd160 a1da04a6c5f72e23cf17a81815b81bed97ce0d9b \ sha256 493a8679f904503048114aca6467faef56861206bab8283d858f37141d95105d depends_lib port:libevent \ path:lib/libssl.dylib:openssl \ port:zlib configure.args --disable-silent-rules test.run yes test.target check livecheck.type regex livecheck.url ${master_sites}?C=M\;O=D livecheck.regex tor-(\\d+\\.\\d+\\.\\d+\\.\\d+)${extract.suffix}