aboutsummaryrefslogtreecommitdiff
path: root/security/seccure
diff options
context:
space:
mode:
authorBaptiste Daroussin <bapt@FreeBSD.org>2015-03-02 23:47:17 +0000
committerBaptiste Daroussin <bapt@FreeBSD.org>2015-03-02 23:47:17 +0000
commite5add27dcd8db707209b93dbb742ac0b73a027a0 (patch)
treeaa5cc83c6b2bb7b479576a94e01b30016d586dea /security/seccure
parent3f9395d5998ece19534fc47493b98bfb0a00793b (diff)
downloadports-e5add27dcd8db707209b93dbb742ac0b73a027a0.tar.gz
ports-e5add27dcd8db707209b93dbb742ac0b73a027a0.zip
Notes
Diffstat (limited to 'security/seccure')
-rw-r--r--security/seccure/pkg-descr23
1 files changed, 11 insertions, 12 deletions
diff --git a/security/seccure/pkg-descr b/security/seccure/pkg-descr
index 68511077cc84..18dbdfb102a1 100644
--- a/security/seccure/pkg-descr
+++ b/security/seccure/pkg-descr
@@ -1,16 +1,15 @@
-The seccure toolset implements a selection of asymmetric algorithms
-based on elliptic curve cryptography (ECC). In particular it offers
-public key encryption / decryption, signature generation /
+The seccure toolset implements a selection of asymmetric algorithms
+based on elliptic curve cryptography (ECC). In particular it offers
+public key encryption / decryption, signature generation /
verification and key establishment.
-ECC schemes offer a much better key size to security ratio than
-classical systems (RSA, DSA). Keys are short enough to make direct
-specification of keys on the command line possible (sometimes this
+ECC schemes offer a much better key size to security ratio than
+classical systems (RSA, DSA). Keys are short enough to make direct
+specification of keys on the command line possible (sometimes this
is more convenient than the management of PGP-like key rings).
-seccure builds on this feature and therefore is the tool of choice
-whenever lightweight asymmetric cryptography -- independent of key
-servers, revocation certificates, the Web of Trust or even
-configuration files -- is required.
+seccure builds on this feature and therefore is the tool of choice
+whenever lightweight asymmetric cryptography -- independent of key
+servers, revocation certificates, the Web of Trust or even
+configuration files -- is required.
-Author: B. Poettering
-WWW: http://point-at-infinity.org/seccure/
+WWW: http://point-at-infinity.org/seccure/