scrypt 1.0.1 → 1.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (4) hide show
  1. data/Gemfile +0 -4
  2. data/lib/scrypt/version.rb +1 -1
  3. data/scrypt.gemspec +2 -0
  4. metadata +19 -6
data/Gemfile CHANGED
@@ -1,8 +1,4 @@
1
1
  source "http://rubygems.org"
2
2
 
3
- group :development do
4
- gem "rspec"
5
- end
6
-
7
3
  # Specify your gem's dependencies in scrypt.gemspec
8
4
  gemspec
@@ -1,3 +1,3 @@
1
1
  module SCrypt
2
- VERSION = "1.0.1"
2
+ VERSION = "1.0.2"
3
3
  end
data/scrypt.gemspec CHANGED
@@ -16,6 +16,8 @@ Gem::Specification.new do |s|
16
16
  alternative functions such as PBKDF2 or bcrypt.
17
17
  EOF
18
18
 
19
+ s.add_development_dependency "rspec"
20
+
19
21
  s.rubyforge_project = "scrypt"
20
22
 
21
23
  s.extensions = ["ext/mri/extconf.rb"]
metadata CHANGED
@@ -1,13 +1,13 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: scrypt
3
3
  version: !ruby/object:Gem::Version
4
- hash: 21
4
+ hash: 19
5
5
  prerelease: false
6
6
  segments:
7
7
  - 1
8
8
  - 0
9
- - 1
10
- version: 1.0.1
9
+ - 2
10
+ version: 1.0.2
11
11
  platform: ruby
12
12
  authors:
13
13
  - Patrick Hogan
@@ -15,10 +15,23 @@ autorequire:
15
15
  bindir: bin
16
16
  cert_chain: []
17
17
 
18
- date: 2010-12-16 00:00:00 -06:00
18
+ date: 2010-12-20 00:00:00 -06:00
19
19
  default_executable:
20
- dependencies: []
21
-
20
+ dependencies:
21
+ - !ruby/object:Gem::Dependency
22
+ name: rspec
23
+ prerelease: false
24
+ requirement: &id001 !ruby/object:Gem::Requirement
25
+ none: false
26
+ requirements:
27
+ - - ">="
28
+ - !ruby/object:Gem::Version
29
+ hash: 3
30
+ segments:
31
+ - 0
32
+ version: "0"
33
+ type: :development
34
+ version_requirements: *id001
22
35
  description: " The scrypt key derivation function is designed to be far \n more secure against hardware brute-force attacks than \n alternative functions such as PBKDF2 or bcrypt.\n"
23
36
  email:
24
37
  - pbhogan@gmail.com