diff options
Diffstat (limited to 'security')
-rw-r--r-- | security/ocaml-cryptgps/pkg-descr | 1 | ||||
-rw-r--r-- | security/p5-Crypt-OFB/pkg-descr | 1 | ||||
-rw-r--r-- | security/p5-Crypt-OpenSSL-CA/pkg-descr | 2 | ||||
-rw-r--r-- | security/p5-Crypt-Rijndael/pkg-descr | 1 | ||||
-rw-r--r-- | security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr | 1 | ||||
-rw-r--r-- | security/p5-Net-SinFP/pkg-descr | 1 | ||||
-rw-r--r-- | security/p5-Tree-Authz/pkg-descr | 14 | ||||
-rw-r--r-- | security/paperkey/pkg-descr | 3 | ||||
-rw-r--r-- | security/pft/pkg-descr | 1 | ||||
-rw-r--r-- | security/poly1305aes/pkg-descr | 3 | ||||
-rw-r--r-- | security/proxytunnel/pkg-descr | 1 | ||||
-rw-r--r-- | security/revelation/pkg-descr | 2 | ||||
-rw-r--r-- | security/seccure/pkg-descr | 23 | ||||
-rw-r--r-- | security/smap/pkg-descr | 1 | ||||
-rw-r--r-- | security/ssss/pkg-descr | 3 | ||||
-rw-r--r-- | security/steghide/pkg-descr | 3 | ||||
-rw-r--r-- | security/xca/pkg-descr | 11 | ||||
-rw-r--r-- | security/xorsearch/pkg-descr | 1 |
18 files changed, 28 insertions, 45 deletions
diff --git a/security/ocaml-cryptgps/pkg-descr b/security/ocaml-cryptgps/pkg-descr index ea5bed2db424..2bd616af7f29 100644 --- a/security/ocaml-cryptgps/pkg-descr +++ b/security/ocaml-cryptgps/pkg-descr @@ -1,4 +1,3 @@ This library implements Blowfish, DES, and Triple-DES. -Author: Gerd Stolpmann WWW: http://www.ocaml-programming.de/packages/ diff --git a/security/p5-Crypt-OFB/pkg-descr b/security/p5-Crypt-OFB/pkg-descr index 772a6216eb7f..acd14cd0156d 100644 --- a/security/p5-Crypt-OFB/pkg-descr +++ b/security/p5-Crypt-OFB/pkg-descr @@ -1,5 +1,4 @@ This module is a Perl-only implementation of the OFB mode. Where OFB stands for Output Feedback Block. -Author: GUGOD <gugod@gugod.org> WWW: http://search.cpan.org/dist/Crypt-OFB/ diff --git a/security/p5-Crypt-OpenSSL-CA/pkg-descr b/security/p5-Crypt-OpenSSL-CA/pkg-descr index e619adc992d0..c3b77fc5dda7 100644 --- a/security/p5-Crypt-OpenSSL-CA/pkg-descr +++ b/security/p5-Crypt-OpenSSL-CA/pkg-descr @@ -4,6 +4,6 @@ This package performs the cryptographic operations necessary to issue X509 certificates and certificate revocation lists (CRLs). It is implemented as a Perl wrapper around the popular OpenSSL library. All certificate and CRL extensions supported by OpenSSL are available, and -then some. +then some. WWW: http://search.cpan.org/dist/Crypt-OpenSSL-CA/ diff --git a/security/p5-Crypt-Rijndael/pkg-descr b/security/p5-Crypt-Rijndael/pkg-descr index 877c7d92e12f..d5181a860ce4 100644 --- a/security/p5-Crypt-Rijndael/pkg-descr +++ b/security/p5-Crypt-Rijndael/pkg-descr @@ -2,5 +2,4 @@ Crypt::Rijndael is a Crypt::CBC compliant Rijndael encryption module that implements the Rijndael cipher, which has just been selected as the new Advanced Encryption Standard (AES). -Author: Rafael R. Sevilla <dido@pacific.net.ph> WWW: http://search.cpan.org/dist/Crypt-Rijndael/ diff --git a/security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr b/security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr index 3ef7c70777f5..147bde5c41ab 100644 --- a/security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr +++ b/security/p5-Net-Server-Mail-ESMTP-AUTH/pkg-descr @@ -4,5 +4,4 @@ module. Currently only LOGIN and PLAIN methods are supported. -Author: Sylvain Cresto <scresto [_at_] gmail.com> WWW: http://search.cpan.org/dist/Net-Server-Mail-ESMTP-AUTH/ diff --git a/security/p5-Net-SinFP/pkg-descr b/security/p5-Net-SinFP/pkg-descr index c5e41dea9772..bebc7aaf4907 100644 --- a/security/p5-Net-SinFP/pkg-descr +++ b/security/p5-Net-SinFP/pkg-descr @@ -12,5 +12,4 @@ operating system. That is, it only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3 (with only 1 test giving the OS reliably in most cases). -Author: GomoR <netpkt@gomor.org> WWW: http://search.cpan.org/dist/Net-SinFP/ diff --git a/security/p5-Tree-Authz/pkg-descr b/security/p5-Tree-Authz/pkg-descr index 90ba2f469df5..4ccaf7e26edf 100644 --- a/security/p5-Tree-Authz/pkg-descr +++ b/security/p5-Tree-Authz/pkg-descr @@ -1,16 +1,16 @@ -Class for inheritable, role-based permissions system (Role Based Access +Class for inheritable, role-based permissions system (Role Based Access Control - RBAC). -Custom methods can be placed on role objects. Authorization can be -performed either by checking whether the role name matches the required -name, or by testing (via can) whether the role can perform the method +Custom methods can be placed on role objects. Authorization can be +performed either by checking whether the role name matches the required +name, or by testing (via can) whether the role can perform the method required. -Two role are specified by default. At the top, superusers can do anything -($superuser->can( $action ) always returns a coderef). At the bottom, the +Two role are specified by default. At the top, superusers can do anything +($superuser->can( $action ) always returns a coderef). At the bottom, the base role can do nothing ($base->can( $action ) always returns undef). -All roles are automatically capable of authorizing actions named for the +All roles are automatically capable of authorizing actions named for the singular and plural of the role name. WWW: http://search.cpan.org/dist/Tree-Authz/ diff --git a/security/paperkey/pkg-descr b/security/paperkey/pkg-descr index 9bbe10235672..9025ac1783ca 100644 --- a/security/paperkey/pkg-descr +++ b/security/paperkey/pkg-descr @@ -4,5 +4,4 @@ From the paperkey README file: long retention qualities - far longer than the magnetic or optical means that are generally used to back up computer data. -Author: David Shaw <dshaw@jabberwocky.com> -WWW: http://www.jabberwocky.com/software/paperkey/ +WWW: http://www.jabberwocky.com/software/paperkey/ diff --git a/security/pft/pkg-descr b/security/pft/pkg-descr index 95da79745223..e0345a63cd67 100644 --- a/security/pft/pkg-descr +++ b/security/pft/pkg-descr @@ -1,5 +1,4 @@ libPJL- Printer Job Language library A library and a command-line tool to use PJL- HP Printer Job Language -Author: FX <fx@phenoelit.de> WWW: http://www.phenoelit.org/hp/ diff --git a/security/poly1305aes/pkg-descr b/security/poly1305aes/pkg-descr index 5c2525b61075..538aabf3591a 100644 --- a/security/poly1305aes/pkg-descr +++ b/security/poly1305aes/pkg-descr @@ -10,5 +10,4 @@ message receiver checks each authenticator. There's a mailing list for Poly1305-AES discussions. To subscribe, send an empty message to poly1305-subscribe@list.cr.yp.to. -Author: Prof. Daniel J. Bernstein <djb@cr.yp.to> -WWW: http://cr.yp.to/mac.html +WWW: http://cr.yp.to/mac.html diff --git a/security/proxytunnel/pkg-descr b/security/proxytunnel/pkg-descr index 34c122ea8d6c..865c8ff0c381 100644 --- a/security/proxytunnel/pkg-descr +++ b/security/proxytunnel/pkg-descr @@ -1,5 +1,4 @@ A program that connects stdin and stdout to an origin server somewhere in the Internet through an industry standard HTTPS proxy. -Author: Jos Visser <josv@osp.nl>, Mark Janssen <maniac@maniac.nl> WWW: http://proxytunnel.sourceforge.net/ diff --git a/security/revelation/pkg-descr b/security/revelation/pkg-descr index fc5bfb4b3e85..a0164cee3fd2 100644 --- a/security/revelation/pkg-descr +++ b/security/revelation/pkg-descr @@ -3,6 +3,4 @@ under the GNU GPL license. It stores accounts and passwords in a single, secure place, and gives access to them through a user-friendly graphical interface. -Author: Erik Grinaker <erikg-at-codepoet.no> - Mikel Olasagasti Uranga <mikel@olasagasti.info> WWW: http://revelation.olasagasti.info/ diff --git a/security/seccure/pkg-descr b/security/seccure/pkg-descr index 68511077cc84..18dbdfb102a1 100644 --- a/security/seccure/pkg-descr +++ b/security/seccure/pkg-descr @@ -1,16 +1,15 @@ -The seccure toolset implements a selection of asymmetric algorithms -based on elliptic curve cryptography (ECC). In particular it offers -public key encryption / decryption, signature generation / +The seccure toolset implements a selection of asymmetric algorithms +based on elliptic curve cryptography (ECC). In particular it offers +public key encryption / decryption, signature generation / verification and key establishment. -ECC schemes offer a much better key size to security ratio than -classical systems (RSA, DSA). Keys are short enough to make direct -specification of keys on the command line possible (sometimes this +ECC schemes offer a much better key size to security ratio than +classical systems (RSA, DSA). Keys are short enough to make direct +specification of keys on the command line possible (sometimes this is more convenient than the management of PGP-like key rings). -seccure builds on this feature and therefore is the tool of choice -whenever lightweight asymmetric cryptography -- independent of key -servers, revocation certificates, the Web of Trust or even -configuration files -- is required. +seccure builds on this feature and therefore is the tool of choice +whenever lightweight asymmetric cryptography -- independent of key +servers, revocation certificates, the Web of Trust or even +configuration files -- is required. -Author: B. Poettering -WWW: http://point-at-infinity.org/seccure/ +WWW: http://point-at-infinity.org/seccure/ diff --git a/security/smap/pkg-descr b/security/smap/pkg-descr index 73082a8b69a8..4f4a2ad2824a 100644 --- a/security/smap/pkg-descr +++ b/security/smap/pkg-descr @@ -4,5 +4,4 @@ smap sends off various SIP requests awaiting responses from SIP enabled DSL router, proxies and user agents. It could be considered a mashup of nmap and sipsak ;) -Author: Hendrik Scholz <hscholz@raisdorf.net> WWW: http://www.wormulon.net/ diff --git a/security/ssss/pkg-descr b/security/ssss/pkg-descr index 9840badec122..84368e7a4508 100644 --- a/security/ssss/pkg-descr +++ b/security/ssss/pkg-descr @@ -6,5 +6,4 @@ The software was written in 2006 by B. Poettering, it links against the GNU libgmp multiprecision library (version 4.1.4 works well) and requires the /dev/random entropy source. -Author: B. Poettering -WWW: http://point-at-infinity.org/ssss/ +WWW: http://point-at-infinity.org/ssss/ diff --git a/security/steghide/pkg-descr b/security/steghide/pkg-descr index 16518c4519d2..e8ebbac6e243 100644 --- a/security/steghide/pkg-descr +++ b/security/steghide/pkg-descr @@ -7,5 +7,4 @@ in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys and pseudo-random distribution of hidden bits ("stego bits") in the container data. -Author: Stefan Hetzl <shetzl@teleweb.at> -WWW: http://steghide.sourceforge.net/ +WWW: http://steghide.sourceforge.net/ diff --git a/security/xca/pkg-descr b/security/xca/pkg-descr index 49f6e509d47a..bfce09749603 100644 --- a/security/xca/pkg-descr +++ b/security/xca/pkg-descr @@ -1,9 +1,8 @@ -Graphical certification authority is an interface for managing -RSA keys and certificates, and the creation and signing of PKCS#10 requests. -It uses the OpenSSL library and a Berkeley DB for key and certificate storage. -It supports importing and exporting keys and PEM DER PKCS8 certificates, -signing and revoking of PEM DER PKCS12, and selection of x509v3 extensions. +Graphical certification authority is an interface for managing +RSA keys and certificates, and the creation and signing of PKCS#10 requests. +It uses the OpenSSL library and a Berkeley DB for key and certificate storage. +It supports importing and exporting keys and PEM DER PKCS8 certificates, +signing and revoking of PEM DER PKCS12, and selection of x509v3 extensions. A tree view of certificates is presented. -Author: Christian Hohnstaedt <christian@hohnstaedt.de> WWW: http://www.hohnstaedt.de/xca.html diff --git a/security/xorsearch/pkg-descr b/security/xorsearch/pkg-descr index d9d66d694627..42d164066f48 100644 --- a/security/xorsearch/pkg-descr +++ b/security/xorsearch/pkg-descr @@ -15,5 +15,4 @@ If the search string is found, XORSearch will print it until the 0 which ever comes first. 50 is the default value, it can be changed with option -l. Unprintable characters are replaced by a dot. -Author: Didier Stevens WWW: http://blog.didierstevens.com/programs/xorsearch/ |