summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorDmitry Marakasov <amdmi3@FreeBSD.org>2022-04-01 18:08:31 +0300
committerDmitry Marakasov <amdmi3@FreeBSD.org>2022-04-01 18:09:49 +0300
commit7b4d1f0b36f88f7fee1898a9cc10c2acf261a123 (patch)
tree2abf1c896f8e1fd58b9c4e767d74a5ba36df7259 /security
parentUPDATING: fix trailing whitespace (diff)
*/*: fix trailing whitespace in pkg-descr's
Approved by: portmgr blanket
Diffstat (limited to 'security')
-rw-r--r--security/enchive/pkg-descr6
-rw-r--r--security/erlang-fast_tls/pkg-descr2
-rw-r--r--security/git-secret/pkg-descr16
-rw-r--r--security/greenbone-security-assistant/pkg-descr4
-rw-r--r--security/gvm-libs/pkg-descr4
-rw-r--r--security/gvm/pkg-descr8
-rw-r--r--security/gvmd/pkg-descr8
-rw-r--r--security/nextcloud-twofactor_admin/pkg-descr6
-rw-r--r--security/onionscan/pkg-descr2
-rw-r--r--security/openconnect-gui/pkg-descr2
-rw-r--r--security/openssl-quictls/pkg-descr10
-rw-r--r--security/openvas/pkg-descr4
-rw-r--r--security/pwned-check/pkg-descr6
-rw-r--r--security/py-gvm-tools/pkg-descr14
-rw-r--r--security/py-ospd-openvas/pkg-descr6
-rw-r--r--security/py-python-gvm/pkg-descr10
-rw-r--r--security/py-python-jose/pkg-descr2
-rw-r--r--security/rubygem-sslshake/pkg-descr12
-rw-r--r--security/veracrypt/pkg-descr12
19 files changed, 67 insertions, 67 deletions
diff --git a/security/enchive/pkg-descr b/security/enchive/pkg-descr
index 2389564132e0..c9895c526338 100644
--- a/security/enchive/pkg-descr
+++ b/security/enchive/pkg-descr
@@ -1,6 +1,6 @@
-Enchive is a tool to encrypt files to yourself for long-term archival. It's a
-focused, simple alternative to more complex solutions such as GnuPG or
-encrypted filesystems. Enchive has no external dependencies and is trivial to
+Enchive is a tool to encrypt files to yourself for long-term archival. It's a
+focused, simple alternative to more complex solutions such as GnuPG or
+encrypted filesystems. Enchive has no external dependencies and is trivial to
build for local use. Portability is emphasized over performance.
WWW: https://github.com/skeeto/enchive
diff --git a/security/erlang-fast_tls/pkg-descr b/security/erlang-fast_tls/pkg-descr
index fec7a4b1c84d..1c9ce79bb9bc 100644
--- a/security/erlang-fast_tls/pkg-descr
+++ b/security/erlang-fast_tls/pkg-descr
@@ -1,4 +1,4 @@
-Fast TSL is a native TLS / SSL driver for Erlang / Elixir.
+Fast TSL is a native TLS / SSL driver for Erlang / Elixir.
It is based on OpenSSL, a proven and efficient TLS implementation.
It is designed for efficiency, speed and compliance.
diff --git a/security/git-secret/pkg-descr b/security/git-secret/pkg-descr
index d508fd7c9800..ae0df84231f7 100644
--- a/security/git-secret/pkg-descr
+++ b/security/git-secret/pkg-descr
@@ -1,11 +1,11 @@
-git-secret is a bash tool which stores private data inside a git repo.
-git-secret encrypts tracked files with public keys for users whom you
-trust using gpg, allowing permitted users to access encrypted data
-using their secret keys. With git-secret, changes to access rights are
-made easy and private-public key issues are handled for you. Passwords
-do not need to be changed with git-secret when someone's permission
-is revoked - just remove their key from the keychain using git secret
-killperson their@email.com, and re-encrypt the files, and they won't
+git-secret is a bash tool which stores private data inside a git repo.
+git-secret encrypts tracked files with public keys for users whom you
+trust using gpg, allowing permitted users to access encrypted data
+using their secret keys. With git-secret, changes to access rights are
+made easy and private-public key issues are handled for you. Passwords
+do not need to be changed with git-secret when someone's permission
+is revoked - just remove their key from the keychain using git secret
+killperson their@email.com, and re-encrypt the files, and they won't
be able to decrypt secrets anymore.
WWW: https://git-secret.io/
diff --git a/security/greenbone-security-assistant/pkg-descr b/security/greenbone-security-assistant/pkg-descr
index 7c5e8859d13d..144d7fad51cf 100644
--- a/security/greenbone-security-assistant/pkg-descr
+++ b/security/greenbone-security-assistant/pkg-descr
@@ -1,7 +1,7 @@
-The Greenbone Security Assistant is the web interface developed for the
+The Greenbone Security Assistant is the web interface developed for the
Greenbone Security Manager appliances.
-It connects to the Greenbone Vulnerability Manager GVM to provide a
+It connects to the Greenbone Vulnerability Manager GVM to provide a
full-featured user interface for vulnerability management.
Greenbone Security Assistant consists of GSA - The webpage written in React
diff --git a/security/gvm-libs/pkg-descr b/security/gvm-libs/pkg-descr
index 8c059b236096..9fc94ad78a32 100644
--- a/security/gvm-libs/pkg-descr
+++ b/security/gvm-libs/pkg-descr
@@ -1,7 +1,7 @@
-This is the libraries module for the Greenbone Vulnerability Management
+This is the libraries module for the Greenbone Vulnerability Management
Solution.
-It is used for the Greenbone Security Manager appliances and provides various
+It is used for the Greenbone Security Manager appliances and provides various
functionalities to support the integrated service daemons.
WWW: https://github.com/greenbone/gvm-libs
diff --git a/security/gvm/pkg-descr b/security/gvm/pkg-descr
index 6a2134585c9f..8c152e02cf40 100644
--- a/security/gvm/pkg-descr
+++ b/security/gvm/pkg-descr
@@ -1,15 +1,15 @@
This is the metaport to install GVM applications and libraries.
-When the OpenVAS project was created it only consisted of an engine for
-scanning vulnerabilities. Shortly after Greenbone Networks was funded to
+When the OpenVAS project was created it only consisted of an engine for
+scanning vulnerabilities. Shortly after Greenbone Networks was funded to
achieve professional support for vulnerability scanning. Greenbone started to
lead the development, added several software components and turned OpenVAS into
a vulnerability management solution still keeping the values of free software.
After several years it became obvious that using OpenVAS as the brand name for
the open source project and funding nearly all development of the project was
-not recognized from the outside. Therefore after the release of the OpenVAS 9
-framework it got renamed to Greenbone Vulnerability Management (GVM) and
+not recognized from the outside. Therefore after the release of the OpenVAS 9
+framework it got renamed to Greenbone Vulnerability Management (GVM) and
released as Greenbone Source Edition (GSE).
WWW: https://www.openvas.org/
diff --git a/security/gvmd/pkg-descr b/security/gvmd/pkg-descr
index 08df113ed7c2..ec55e9ed83b0 100644
--- a/security/gvmd/pkg-descr
+++ b/security/gvmd/pkg-descr
@@ -1,9 +1,9 @@
-The Greenbone Vulnerability Manager is the central management service between
+The Greenbone Vulnerability Manager is the central management service between
security scanners and the user clients.
-It manages the storage of any vulnerability management configurations and of
-the scan results. Access to data, control commands and workflows is offered
-via the XML-based Greenbone Management Protocol (GMP). Controlling scanners
+It manages the storage of any vulnerability management configurations and of
+the scan results. Access to data, control commands and workflows is offered
+via the XML-based Greenbone Management Protocol (GMP). Controlling scanners
like OpenVAS is done via the Open Scanner Protocol (OSP).
WWW: https://github.com/greenbone/gvmd
diff --git a/security/nextcloud-twofactor_admin/pkg-descr b/security/nextcloud-twofactor_admin/pkg-descr
index 407cc835f1fc..fb15603a88ff 100644
--- a/security/nextcloud-twofactor_admin/pkg-descr
+++ b/security/nextcloud-twofactor_admin/pkg-descr
@@ -1,6 +1,6 @@
-This two-factor auth (2FA) provider for Nextcloud allows admins to generate
-a one-time code for users to log into a 2FA protected account. This is
-helpful in situations where users have lost access to their other 2FA
+This two-factor auth (2FA) provider for Nextcloud allows admins to generate
+a one-time code for users to log into a 2FA protected account. This is
+helpful in situations where users have lost access to their other 2FA
methods or mandatory 2FA without any previously enabled 2FA provider.
WWW: https://apps.nextcloud.com/apps/twofactor_admin
diff --git a/security/onionscan/pkg-descr b/security/onionscan/pkg-descr
index 56e49d780dfa..009740048e70 100644
--- a/security/onionscan/pkg-descr
+++ b/security/onionscan/pkg-descr
@@ -1,4 +1,4 @@
-OnionScan is a free and open source tool for investigating Onion Services
+OnionScan is a free and open source tool for investigating Onion Services
on the Tor network.
It has two primary goals:
diff --git a/security/openconnect-gui/pkg-descr b/security/openconnect-gui/pkg-descr
index fa4f0d764a99..817a67d25602 100644
--- a/security/openconnect-gui/pkg-descr
+++ b/security/openconnect-gui/pkg-descr
@@ -1,4 +1,4 @@
-This is the GUI client for openconnect VPN. This client is in beta testing
+This is the GUI client for openconnect VPN. This client is in beta testing
phase. It cannot be assumed to provide the required security.
WWW: https://github.com/openconnect/openconnect-gui
diff --git a/security/openssl-quictls/pkg-descr b/security/openssl-quictls/pkg-descr
index 049623bf51c6..563a4900df40 100644
--- a/security/openssl-quictls/pkg-descr
+++ b/security/openssl-quictls/pkg-descr
@@ -1,10 +1,10 @@
-This is a fork of OpenSSL to enable QUIC. This fork adds API that can be
+This is a fork of OpenSSL to enable QUIC. This fork adds API that can be
used by QUIC implementations for connection handshakes.
-There is a community need for a QUIC capable TLS library. This fork is
-intended as stopgap solution to enable higher level frameworks and runtimes
-to use QUIC with the proven and reliable TLS functionality from OpenSSL.
-This fork will be maintained until OpenSSL officially provides reasonable
+There is a community need for a QUIC capable TLS library. This fork is
+intended as stopgap solution to enable higher level frameworks and runtimes
+to use QUIC with the proven and reliable TLS functionality from OpenSSL.
+This fork will be maintained until OpenSSL officially provides reasonable
support for QUIC implementations.
WWW: https://www.github.com/quictls/openssl
diff --git a/security/openvas/pkg-descr b/security/openvas/pkg-descr
index 199d9a6d67ca..36dc1988f378 100644
--- a/security/openvas/pkg-descr
+++ b/security/openvas/pkg-descr
@@ -1,8 +1,8 @@
-This is the Open Vulnerability Assessment Scanner (OpenVAS) of the Greenbone
+This is the Open Vulnerability Assessment Scanner (OpenVAS) of the Greenbone
Vulnerability Management (GVM) Solution.
It is used for the Greenbone Security Manager appliances and is a full-featured
-scan engine that executes a continuously updated and extended feed of Network
+scan engine that executes a continuously updated and extended feed of Network
Vulnerability Tests (NVTs).
WWW: https://github.com/greenbone/openvas
diff --git a/security/pwned-check/pkg-descr b/security/pwned-check/pkg-descr
index 60a265c1099e..2769b48e5b8d 100644
--- a/security/pwned-check/pkg-descr
+++ b/security/pwned-check/pkg-descr
@@ -1,6 +1,6 @@
-Pwned Passwords are hundreds of millions of real world passwords exposed in
+Pwned Passwords are hundreds of millions of real world passwords exposed in
data breaches. This exposure makes them unsuitable for ongoing use as they
-are at much greater risk of being used to take over other accounts.
+are at much greater risk of being used to take over other accounts.
This script offers 2 methods to check whether a password has been exposed
in an uncovered breach:
@@ -11,7 +11,7 @@ in an uncovered breach:
2) Local check against a copy of the pawned passwords database.
Since the local copy of the database requires nearly 20 GB of disk space
-(and a download of more than 10 GB of compressed data) the access via the
+(and a download of more than 10 GB of compressed data) the access via the
online check should be preferred, if the compatible with operational and
security requirements.
diff --git a/security/py-gvm-tools/pkg-descr b/security/py-gvm-tools/pkg-descr
index 391144cde742..ec3d4aebbe6b 100644
--- a/security/py-gvm-tools/pkg-descr
+++ b/security/py-gvm-tools/pkg-descr
@@ -1,12 +1,12 @@
-The Greenbone Vulnerability Management Tools gvm-tools are a collection of
-tools that help with remote controlling a Greenbone Security Manager (GSM)
-appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools
-aid in accessing the communication protocols GMP (Greenbone Management
+The Greenbone Vulnerability Management Tools gvm-tools are a collection of
+tools that help with remote controlling a Greenbone Security Manager (GSM)
+appliance and its underlying Greenbone Vulnerability Manager (GVM). The tools
+aid in accessing the communication protocols GMP (Greenbone Management
Protocol) and OSP (Open Scanner Protocol).
-This module is comprised of interactive and non-interactive clients. The
-programming language Python is supported directly for interactive scripting.
-But it is also possible to issue remote GMP/OSP commands without programming
+This module is comprised of interactive and non-interactive clients. The
+programming language Python is supported directly for interactive scripting.
+But it is also possible to issue remote GMP/OSP commands without programming
in Python.
WWW: https://github.com/greenbone/gvm-tools
diff --git a/security/py-ospd-openvas/pkg-descr b/security/py-ospd-openvas/pkg-descr
index 94ebe1cad5ca..5541e1d01d63 100644
--- a/security/py-ospd-openvas/pkg-descr
+++ b/security/py-ospd-openvas/pkg-descr
@@ -1,8 +1,8 @@
-This is an OSP server implementation to allow GVM to remotely control OpenVAS,
+This is an OSP server implementation to allow GVM to remotely control OpenVAS,
see https://github.com/greenbone/openvas.
-Once running, you need to configure OpenVAS for the Greenbone Vulnerability
-Manager, for example via the web interface Greenbone Security Assistant. Then
+Once running, you need to configure OpenVAS for the Greenbone Vulnerability
+Manager, for example via the web interface Greenbone Security Assistant. Then
you can create scan tasks to use OpenVAS.
WWW: https://github.com/greenbone/ospd-openvas
diff --git a/security/py-python-gvm/pkg-descr b/security/py-python-gvm/pkg-descr
index cabb0edc1574..b8cf14a2f874 100644
--- a/security/py-python-gvm/pkg-descr
+++ b/security/py-python-gvm/pkg-descr
@@ -1,9 +1,9 @@
-The Greenbone Vulnerability Management Python API library (python-gvm) is a
-collection of APIs that help with remote controlling a Greenbone Security
-Manager (GSM) appliance and its underlying Greenbone Vulnerability Manager
-(GVM).
+The Greenbone Vulnerability Management Python API library (python-gvm) is a
+collection of APIs that help with remote controlling a Greenbone Security
+Manager (GSM) appliance and its underlying Greenbone Vulnerability Manager
+(GVM).
-The library essentially abstracts accessing the communication protocols
+The library essentially abstracts accessing the communication protocols
Greenbone Management Protocol (GMP) and Open Scanner Protocol (OSP)
WWW: https://github.com/greenbone/python-gvm
diff --git a/security/py-python-jose/pkg-descr b/security/py-python-jose/pkg-descr
index ea7743d4e993..e02126b6796b 100644
--- a/security/py-python-jose/pkg-descr
+++ b/security/py-python-jose/pkg-descr
@@ -1,6 +1,6 @@
A JOSE implementation in Python
-The JavaScript Object Signing and Encryption (JOSE) technologies - JSON Web
+The JavaScript Object Signing and Encryption (JOSE) technologies - JSON Web
Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), and JSON Web
Algorithms (JWA) - collectively can be used to encrypt and/or sign content
using a variety of algorithms. While the full set of permutations is extremely
diff --git a/security/rubygem-sslshake/pkg-descr b/security/rubygem-sslshake/pkg-descr
index 677eec58f6a7..106e09c15ddf 100644
--- a/security/rubygem-sslshake/pkg-descr
+++ b/security/rubygem-sslshake/pkg-descr
@@ -1,9 +1,9 @@
-This is a library to simulate SSL and TLS handshake from
-SSLv2, SSLv3, to TLS 1.0-1.2. It does not rely on OpenSSL
-and is not designed as a replacement either. It targets full
-support for even older handshakes, which are not available in
-current releases of OpenSSL anymore. It also aims to be executable
-on all systems with a sufficiently modern version of Ruby without
+This is a library to simulate SSL and TLS handshake from
+SSLv2, SSLv3, to TLS 1.0-1.2. It does not rely on OpenSSL
+and is not designed as a replacement either. It targets full
+support for even older handshakes, which are not available in
+current releases of OpenSSL anymore. It also aims to be executable
+on all systems with a sufficiently modern version of Ruby without
any additional requirements or pre-compiled binaries.
WWW: https://github.com/arlimus/sslshake
diff --git a/security/veracrypt/pkg-descr b/security/veracrypt/pkg-descr
index 04348ed4a06d..df90b3ab5b22 100644
--- a/security/veracrypt/pkg-descr
+++ b/security/veracrypt/pkg-descr
@@ -1,21 +1,21 @@
-VeraCrypt is a free open source disk encryption software for Windows, Mac OSX,
-FreeBSD and Linux. Brought to you by IDRIX (https://www.idrix.fr) and based on
+VeraCrypt is a free open source disk encryption software for Windows, Mac OSX,
+FreeBSD and Linux. Brought to you by IDRIX (https://www.idrix.fr) and based on
TrueCrypt 7.1a.
VeraCrypt main features:
- Creates a virtual encrypted disk within a file and mounts it as a real disk.
-- Encrypts an entire partition or storage device such as USB flash drive or
+- Encrypts an entire partition or storage device such as USB flash drive or
hard drive.
-- Encrypts a partition or drive where Windows is installed (pre-boot
+- Encrypts a partition or drive where Windows is installed (pre-boot
authentication).
- Encryption is automatic, real-time(on-the-fly) and transparent.
-- Parallelization and pipelining allow data to be read and written as fast as
+- Parallelization and pipelining allow data to be read and written as fast as
if the drive was not encrypted.
- Encryption can be hardware-accelerated on modern processors.
- Provides plausible deniability, in case an adversary forces you to reveal the
password: Hidden volume (steganography) and hidden operating system.
-- More information about the features of VeraCrypt may be found in the
+- More information about the features of VeraCrypt may be found in the
documentation
WWW: https://www.veracrypt.fr/