           SPELL=radare2
if [[ "$R2_VERSION" == "stable" ]]
then
         VERSION=0.9
          SOURCE="${SPELL}-${VERSION}.tar.gz"
   SOURCE_URL[0]=http://radare.org/get/${SOURCE}
     SOURCE_HASH=sha512:0e27882f2053b55d3cc4684772e1c20fe6cc1d102617af61166f038b3b8ecb3979b080142314ddae51e58f4d258866e9e6aa00095becaab5434df6019bea6ba9
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
else
         VERSION=SCM
   SOURCE_IGNORE=volatile
  FORCE_DOWNLOAD=on
          SOURCE="${SPELL}-${VERSION}.tar.bz2"
   SOURCE_URL[0]="git://github.com/radare/$SPELL"
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-$VERSION"
fi
        WEB_SITE="http://radare.org"
      LICENSE[0]=GPL
         ENTERED=20110506
           SHORT="open source reverse engineering framework"
cat << EOF
radare is a reverse engineering framework with tools to disassemble, debug,
analyze and manipulate binary files. The tools provided form a unix-like
toolchain.
    * Multi-architecture multi-platform
        - GNU/Linux, BSD, OSX, iPhoneOS, Windows and Solaris
        - x86{32,64}, arm, java, powerpc, mips
        - PE{32,64}, [fat]MACH0{32,64}, ELF{32,64}, CLASS
    * Highly scriptable
        - Batch mode and native plugins with full internal API access
        - Vala, Go, Python, ruby, perl, lua, Java, shellscript, ..
        - Scripting language based in mnemonic commands and macros
    * Hexadecimal editor
        - 64-bit offset support with virtual addressing and section maps
        - Assemble and disassemble from/to many architectures
        - Colorizes opcodes, bytes and debug register changes
        - Print data in various formats (int, float, disasm, timestamp, ..)
        - Search multiple patterns or keywords with binary mask support
        - Checksumming and data analysis of byte blocks
    * IO is wrapped
        - Support Files, disks, processes and streams
        - Virtual addressing with sections and multiple file mapping
        - Handles gdb:// and rap:// remote protocols
    * Debugger support
        - Software and hardware breakpoints
        - Tracing and logging facilities
    * Diffing between two functions or binaries
        - Graphviz friendly code analysis graphs
        - Colorize nodes and edges
    * Code analysis at opcode, basicblock, function levels
        - Embedded simple virtual machine to emulate code
        - Keep track of code and data references
        - Function calls and syscall decompilation
        - Function description, comments and library signatures
EOF
