Samhain is an open source file integrity and host-based intrusion
detection system for Linux and Unix. It can run as a daemon process,
and and thus can remember file changes - contrary to a tool that runs
from cron, if a file is modified you will get only one report, while
subsequent checks of that file will ignore the modification as it is
already reported (unless the file is modified again).
ok jasper@
Crypt::RC5 is a Perl implementation of the RC5 encryption algorithm.
RC5 is a fast block cipher designed by Ronald Rivest for RSA Data Security
(now RSA Security) in 1994. It is a parameterized algorithm with a variable
block size, a variable key size, and a variable number of rounds.
This particular implementation is 32 bit. As such, it is suggested that a
minimum of 12 rounds be performed.
from Olivier Cherrier.
ok gsoares@
changes:
* POD typo fix. (patch by Salvatore Bonaccorso) [RT72600]
* Don't use deprecated shared memory mode (patch by Adam Benjamin)
* Log format. (pointed out by Adam Benjamin)
* command output parsing for newer gnupg (patch by Adam Benjamin)
* Fix for IPv6 introduced in v5.3,
! This is a release to fix IPv6 UDP port scanning as no other tool
! currently exists to do that.
! Beside this, amap is outdated, and nmap should be prefered
* Fixed UDP port scanning for IPv6
* Disabled web update
* added printing of [] brackets around IPv6 addresses (required)
* Fixed a bug in amapcrap that the trigger would not display
correctly
USE_GROFF is not needed and maintainer request drop maintainership.
ok sthen@ ok aja@
MRO::Compat instead of the deprecated module NEXT. Disable TEST_POD as
the POD coverage tests complain about undocumented code.
Catalyst::Plugin::Authentication::Store::DBIC is deprecated. Use
Catalyst::Authentication::Store::DBIx::Class instead.
From Andreas Voegele's repo
rc script not included from the original diff because ipguard needs to
be teached to return the proper code when failing to start.
maintainer timeout
from Gonzalo L. R.
- minitasn1: Upgraded to libtasn1 version 2.12 (pre-release).
- Corrected SRP-RSA ciphersuites when used under TLS 1.2.
- Fixed leaks in key generation.
* renaming libqca to libqca2 for the qca2 port
* removed conflict line from qca2 PLIST
* bumped qca2
* updated conflict line in qca PLIST
* bumped qca2
* updated WANTLIB of qca-ossl and bumped
* hooked qca2 up to the build in the ports/security/Makefile
OK shadchin@, espie@
secure cryptographic hash functions designed by Niels
Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir
Bellare, Tadayoshi Kohno, Jon Callas and Jesse Walker.
This package uses bindings to the optimized C implementation of
Skein. We provide a high-level interface (see module "Crypto.Skein")
to some of the Skein use cases. We also provide a low-level interface
(see module "Crypto.Skein.Internal") should you need to use Skein
in a different way.
Currently we have support for Skein as cryptographic hash function
as Skein as a message authentication code (Skein-MAC). For examples
of how to use this package, see "Crypto.Skein" module documentation.
ok sthen@
that follow either a uniform or normal distribution. The generated
numbers are suitable for use in statistical applications.
The uniform PRNG uses Marsaglia's MWC256 (also known as MWC8222)
multiply-with-carry generator, which has a period of 2^8222 and
fares well in tests of randomness. It is also extremely fast,
between 2 and 3 times faster than the Mersenne Twister.
Compared to the mersenne-random package, this package has a more
convenient API, is faster, and supports more statistical distributions.
ok sthen@
- adjust COMMENT to point out that this includes a password generator
(pwqgen; defaults to reasonably memorable passwords with a decent keyspace).
- manpages are fine with mandoc, so remove USE_GROFF
- adjust whitespace