aboutsummaryrefslogtreecommitdiff
path: root/security/cryptlib
diff options
context:
space:
mode:
authorDmitry Marakasov <amdmi3@FreeBSD.org>2016-05-19 10:53:05 +0000
committerDmitry Marakasov <amdmi3@FreeBSD.org>2016-05-19 10:53:05 +0000
commit1f8b48b772b2d0ac0ed48a8259d2117ea3236a90 (patch)
tree06f11bc7b351f3abf3bf5507405afdba5374614e /security/cryptlib
parent4e942b64191e2ef98dce2c5af31047a8640db768 (diff)
downloadports-1f8b48b772b2d0ac0ed48a8259d2117ea3236a90.tar.gz
ports-1f8b48b772b2d0ac0ed48a8259d2117ea3236a90.zip
Notes
Diffstat (limited to 'security/cryptlib')
-rw-r--r--security/cryptlib/pkg-descr16
1 files changed, 8 insertions, 8 deletions
diff --git a/security/cryptlib/pkg-descr b/security/cryptlib/pkg-descr
index 3831ec3314f6..9ff9a67de8fa 100644
--- a/security/cryptlib/pkg-descr
+++ b/security/cryptlib/pkg-descr
@@ -1,14 +1,14 @@
-cryptlib is a powerful security toolkit which allows even inexperienced
-crypto programmers to easily add encryption and authentication services to
-their software. The high-level interface provides anyone with the ability to
-add strong security capabilities to an application in as little as half an
-hour, without needing to know any of the low-level details which make the
-encryption or authentication work. Because of this, cryptlib dramatically
+cryptlib is a powerful security toolkit which allows even inexperienced
+crypto programmers to easily add encryption and authentication services to
+their software. The high-level interface provides anyone with the ability to
+add strong security capabilities to an application in as little as half an
+hour, without needing to know any of the low-level details which make the
+encryption or authentication work. Because of this, cryptlib dramatically
reduces the cost involved in adding security to new or existing applications.
cryptlib provides a standardised interface to a number of popular encryption
-algorithms, as well as providing a high-level interface which hides most of
-the implementation details and provides an operating-system-independent
+algorithms, as well as providing a high-level interface which hides most of
+the implementation details and provides an operating-system-independent
encoding method which makes it easy to transfer secured data from one operating
environment to another.