aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/ocaml-cryptgps/pkg-descr1
-rw-r--r--security/p5-Crypt-OFB/pkg-descr1
-rw-r--r--security/p5-Crypt-OpenSSL-CA/pkg-descr2
-rw-r--r--security/p5-Crypt-Rijndael/pkg-descr1
-rw-r--r--security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr1
-rw-r--r--security/p5-Net-SinFP/pkg-descr1
-rw-r--r--security/p5-Tree-Authz/pkg-descr14
-rw-r--r--security/paperkey/pkg-descr3
-rw-r--r--security/pft/pkg-descr1
-rw-r--r--security/poly1305aes/pkg-descr3
-rw-r--r--security/proxytunnel/pkg-descr1
-rw-r--r--security/revelation/pkg-descr2
-rw-r--r--security/seccure/pkg-descr23
-rw-r--r--security/smap/pkg-descr1
-rw-r--r--security/ssss/pkg-descr3
-rw-r--r--security/steghide/pkg-descr3
-rw-r--r--security/xca/pkg-descr11
-rw-r--r--security/xorsearch/pkg-descr1
18 files changed, 28 insertions, 45 deletions
diff --git a/security/ocaml-cryptgps/pkg-descr b/security/ocaml-cryptgps/pkg-descr
index ea5bed2db424..2bd616af7f29 100644
--- a/security/ocaml-cryptgps/pkg-descr
+++ b/security/ocaml-cryptgps/pkg-descr
@@ -1,4 +1,3 @@
This library implements Blowfish, DES, and Triple-DES.
-Author: Gerd Stolpmann
WWW: http://www.ocaml-programming.de/packages/
diff --git a/security/p5-Crypt-OFB/pkg-descr b/security/p5-Crypt-OFB/pkg-descr
index 772a6216eb7f..acd14cd0156d 100644
--- a/security/p5-Crypt-OFB/pkg-descr
+++ b/security/p5-Crypt-OFB/pkg-descr
@@ -1,5 +1,4 @@
This module is a Perl-only implementation of the OFB mode.
Where OFB stands for Output Feedback Block.
-Author: GUGOD <gugod@gugod.org>
WWW: http://search.cpan.org/dist/Crypt-OFB/
diff --git a/security/p5-Crypt-OpenSSL-CA/pkg-descr b/security/p5-Crypt-OpenSSL-CA/pkg-descr
index e619adc992d0..c3b77fc5dda7 100644
--- a/security/p5-Crypt-OpenSSL-CA/pkg-descr
+++ b/security/p5-Crypt-OpenSSL-CA/pkg-descr
@@ -4,6 +4,6 @@ This package performs the cryptographic operations necessary to issue
X509 certificates and certificate revocation lists (CRLs). It is
implemented as a Perl wrapper around the popular OpenSSL library. All
certificate and CRL extensions supported by OpenSSL are available, and
-then some.
+then some.
WWW: http://search.cpan.org/dist/Crypt-OpenSSL-CA/
diff --git a/security/p5-Crypt-Rijndael/pkg-descr b/security/p5-Crypt-Rijndael/pkg-descr
index 877c7d92e12f..d5181a860ce4 100644
--- a/security/p5-Crypt-Rijndael/pkg-descr
+++ b/security/p5-Crypt-Rijndael/pkg-descr
@@ -2,5 +2,4 @@ Crypt::Rijndael is a Crypt::CBC compliant Rijndael encryption module that
implements the Rijndael cipher, which has just been selected as the new
Advanced Encryption Standard (AES).
-Author: Rafael R. Sevilla <dido@pacific.net.ph>
WWW: http://search.cpan.org/dist/Crypt-Rijndael/
diff --git a/security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr b/security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr
index 3ef7c70777f5..147bde5c41ab 100644
--- a/security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr
+++ b/security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr
@@ -4,5 +4,4 @@ module.
Currently only LOGIN and PLAIN methods are supported.
-Author: Sylvain Cresto <scresto [_at_] gmail.com>
WWW: http://search.cpan.org/dist/Net-Server-Mail-ESMTP-AUTH/
diff --git a/security/p5-Net-SinFP/pkg-descr b/security/p5-Net-SinFP/pkg-descr
index c5e41dea9772..bebc7aaf4907 100644
--- a/security/p5-Net-SinFP/pkg-descr
+++ b/security/p5-Net-SinFP/pkg-descr
@@ -12,5 +12,4 @@ operating system. That is, it only requires one open TCP port, sends
only fully standard TCP packets, and limits the number of tests to 2
or 3 (with only 1 test giving the OS reliably in most cases).
-Author: GomoR <netpkt@gomor.org>
WWW: http://search.cpan.org/dist/Net-SinFP/
diff --git a/security/p5-Tree-Authz/pkg-descr b/security/p5-Tree-Authz/pkg-descr
index 90ba2f469df5..4ccaf7e26edf 100644
--- a/security/p5-Tree-Authz/pkg-descr
+++ b/security/p5-Tree-Authz/pkg-descr
@@ -1,16 +1,16 @@
-Class for inheritable, role-based permissions system (Role Based Access
+Class for inheritable, role-based permissions system (Role Based Access
Control - RBAC).
-Custom methods can be placed on role objects. Authorization can be
-performed either by checking whether the role name matches the required
-name, or by testing (via can) whether the role can perform the method
+Custom methods can be placed on role objects. Authorization can be
+performed either by checking whether the role name matches the required
+name, or by testing (via can) whether the role can perform the method
required.
-Two role are specified by default. At the top, superusers can do anything
-($superuser->can( $action ) always returns a coderef). At the bottom, the
+Two role are specified by default. At the top, superusers can do anything
+($superuser->can( $action ) always returns a coderef). At the bottom, the
base role can do nothing ($base->can( $action ) always returns undef).
-All roles are automatically capable of authorizing actions named for the
+All roles are automatically capable of authorizing actions named for the
singular and plural of the role name.
WWW: http://search.cpan.org/dist/Tree-Authz/
diff --git a/security/paperkey/pkg-descr b/security/paperkey/pkg-descr
index 9bbe10235672..9025ac1783ca 100644
--- a/security/paperkey/pkg-descr
+++ b/security/paperkey/pkg-descr
@@ -4,5 +4,4 @@ From the paperkey README file:
long retention qualities - far longer than the magnetic or optical
means that are generally used to back up computer data.
-Author: David Shaw <dshaw@jabberwocky.com>
-WWW: http://www.jabberwocky.com/software/paperkey/
+WWW: http://www.jabberwocky.com/software/paperkey/
diff --git a/security/pft/pkg-descr b/security/pft/pkg-descr
index 95da79745223..e0345a63cd67 100644
--- a/security/pft/pkg-descr
+++ b/security/pft/pkg-descr
@@ -1,5 +1,4 @@
libPJL- Printer Job Language library
A library and a command-line tool to use PJL- HP Printer Job Language
-Author: FX <fx@phenoelit.de>
WWW: http://www.phenoelit.org/hp/
diff --git a/security/poly1305aes/pkg-descr b/security/poly1305aes/pkg-descr
index 5c2525b61075..538aabf3591a 100644
--- a/security/poly1305aes/pkg-descr
+++ b/security/poly1305aes/pkg-descr
@@ -10,5 +10,4 @@ message receiver checks each authenticator.
There's a mailing list for Poly1305-AES discussions. To subscribe, send
an empty message to poly1305-subscribe@list.cr.yp.to.
-Author: Prof. Daniel J. Bernstein <djb@cr.yp.to>
-WWW: http://cr.yp.to/mac.html
+WWW: http://cr.yp.to/mac.html
diff --git a/security/proxytunnel/pkg-descr b/security/proxytunnel/pkg-descr
index 34c122ea8d6c..865c8ff0c381 100644
--- a/security/proxytunnel/pkg-descr
+++ b/security/proxytunnel/pkg-descr
@@ -1,5 +1,4 @@
A program that connects stdin and stdout to an origin server somewhere in the
Internet through an industry standard HTTPS proxy.
-Author: Jos Visser <josv@osp.nl>, Mark Janssen <maniac@maniac.nl>
WWW: http://proxytunnel.sourceforge.net/
diff --git a/security/revelation/pkg-descr b/security/revelation/pkg-descr
index fc5bfb4b3e85..a0164cee3fd2 100644
--- a/security/revelation/pkg-descr
+++ b/security/revelation/pkg-descr
@@ -3,6 +3,4 @@ under the GNU GPL license. It stores accounts and passwords in a single,
secure place, and gives access to them through a user-friendly graphical
interface.
-Author: Erik Grinaker <erikg-at-codepoet.no>
- Mikel Olasagasti Uranga <mikel@olasagasti.info>
WWW: http://revelation.olasagasti.info/
diff --git a/security/seccure/pkg-descr b/security/seccure/pkg-descr
index 68511077cc84..18dbdfb102a1 100644
--- a/security/seccure/pkg-descr
+++ b/security/seccure/pkg-descr
@@ -1,16 +1,15 @@
-The seccure toolset implements a selection of asymmetric algorithms
-based on elliptic curve cryptography (ECC). In particular it offers
-public key encryption / decryption, signature generation /
+The seccure toolset implements a selection of asymmetric algorithms
+based on elliptic curve cryptography (ECC). In particular it offers
+public key encryption / decryption, signature generation /
verification and key establishment.
-ECC schemes offer a much better key size to security ratio than
-classical systems (RSA, DSA). Keys are short enough to make direct
-specification of keys on the command line possible (sometimes this
+ECC schemes offer a much better key size to security ratio than
+classical systems (RSA, DSA). Keys are short enough to make direct
+specification of keys on the command line possible (sometimes this
is more convenient than the management of PGP-like key rings).
-seccure builds on this feature and therefore is the tool of choice
-whenever lightweight asymmetric cryptography -- independent of key
-servers, revocation certificates, the Web of Trust or even
-configuration files -- is required.
+seccure builds on this feature and therefore is the tool of choice
+whenever lightweight asymmetric cryptography -- independent of key
+servers, revocation certificates, the Web of Trust or even
+configuration files -- is required.
-Author: B. Poettering
-WWW: http://point-at-infinity.org/seccure/
+WWW: http://point-at-infinity.org/seccure/
diff --git a/security/smap/pkg-descr b/security/smap/pkg-descr
index 73082a8b69a8..4f4a2ad2824a 100644
--- a/security/smap/pkg-descr
+++ b/security/smap/pkg-descr
@@ -4,5 +4,4 @@ smap sends off various SIP requests awaiting responses from SIP
enabled DSL router, proxies and user agents. It could be considered
a mashup of nmap and sipsak ;)
-Author: Hendrik Scholz <hscholz@raisdorf.net>
WWW: http://www.wormulon.net/
diff --git a/security/ssss/pkg-descr b/security/ssss/pkg-descr
index 9840badec122..84368e7a4508 100644
--- a/security/ssss/pkg-descr
+++ b/security/ssss/pkg-descr
@@ -6,5 +6,4 @@ The software was written in 2006 by B. Poettering, it links against
the GNU libgmp multiprecision library (version 4.1.4 works well)
and requires the /dev/random entropy source.
-Author: B. Poettering
-WWW: http://point-at-infinity.org/ssss/
+WWW: http://point-at-infinity.org/ssss/
diff --git a/security/steghide/pkg-descr b/security/steghide/pkg-descr
index 16518c4519d2..e8ebbac6e243 100644
--- a/security/steghide/pkg-descr
+++ b/security/steghide/pkg-descr
@@ -7,5 +7,4 @@ in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to
blowfish keys and pseudo-random distribution of hidden bits ("stego bits") in
the container data.
-Author: Stefan Hetzl <shetzl@teleweb.at>
-WWW: http://steghide.sourceforge.net/
+WWW: http://steghide.sourceforge.net/
diff --git a/security/xca/pkg-descr b/security/xca/pkg-descr
index 49f6e509d47a..bfce09749603 100644
--- a/security/xca/pkg-descr
+++ b/security/xca/pkg-descr
@@ -1,9 +1,8 @@
-Graphical certification authority is an interface for managing
-RSA keys and certificates, and the creation and signing of PKCS#10 requests.
-It uses the OpenSSL library and a Berkeley DB for key and certificate storage.
-It supports importing and exporting keys and PEM DER PKCS8 certificates,
-signing and revoking of PEM DER PKCS12, and selection of x509v3 extensions.
+Graphical certification authority is an interface for managing
+RSA keys and certificates, and the creation and signing of PKCS#10 requests.
+It uses the OpenSSL library and a Berkeley DB for key and certificate storage.
+It supports importing and exporting keys and PEM DER PKCS8 certificates,
+signing and revoking of PEM DER PKCS12, and selection of x509v3 extensions.
A tree view of certificates is presented.
-Author: Christian Hohnstaedt <christian@hohnstaedt.de>
WWW: http://www.hohnstaedt.de/xca.html
diff --git a/security/xorsearch/pkg-descr b/security/xorsearch/pkg-descr
index d9d66d694627..42d164066f48 100644
--- a/security/xorsearch/pkg-descr
+++ b/security/xorsearch/pkg-descr
@@ -15,5 +15,4 @@ If the search string is found, XORSearch will print it until the 0
which ever comes first. 50 is the default value, it can be changed
with option -l. Unprintable characters are replaced by a dot.
-Author: Didier Stevens
WWW: http://blog.didierstevens.com/programs/xorsearch/