aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authoreadler <eadler@FreeBSD.org>2013-03-29 00:28:59 +0800
committereadler <eadler@FreeBSD.org>2013-03-29 00:28:59 +0800
commit3ed7e5832a752d963b037d8017ec4d3a42ea9bfd (patch)
tree02d4462d3bb1265765e1fe1d3f6bc4b0ac3c771d /security
parentdeec7fa8ba51a5c6b12c0efc27422d190e4c73ff (diff)
downloadfreebsd-ports-gnome-3ed7e5832a752d963b037d8017ec4d3a42ea9bfd.tar.gz
freebsd-ports-gnome-3ed7e5832a752d963b037d8017ec4d3a42ea9bfd.tar.zst
freebsd-ports-gnome-3ed7e5832a752d963b037d8017ec4d3a42ea9bfd.zip
Style: tab -> space.
Most contributors copy an existing port when writing their own so reduce the number of bad examples in the tree.
Diffstat (limited to 'security')
-rw-r--r--security/aescrypt/pkg-descr2
-rw-r--r--security/ddos_scan/pkg-descr2
-rw-r--r--security/dirbuster/pkg-descr2
-rw-r--r--security/gcipher/pkg-descr2
-rw-r--r--security/gpass/pkg-descr2
-rw-r--r--security/libpreludedb/pkg-descr2
-rw-r--r--security/linux-pam-docs/pkg-descr2
-rw-r--r--security/matrixssl/pkg-descr2
-rw-r--r--security/ocaml-cryptgps/pkg-descr2
-rw-r--r--security/openvas-client/pkg-descr2
-rw-r--r--security/openvas-libnasl/pkg-descr2
-rw-r--r--security/openvas-libraries/pkg-descr2
-rw-r--r--security/openvas-plugins/pkg-descr2
-rw-r--r--security/openvas-server/pkg-descr2
-rw-r--r--security/pbc/pkg-descr2
-rw-r--r--security/pear-Auth_OpenID/pkg-descr2
-rw-r--r--security/poly1305aes/pkg-descr2
-rw-r--r--security/revelation/pkg-descr2
-rw-r--r--security/super/pkg-descr2
-rw-r--r--security/vinetto/pkg-descr2
20 files changed, 20 insertions, 20 deletions
diff --git a/security/aescrypt/pkg-descr b/security/aescrypt/pkg-descr
index 52b758a06d43..898844a51c17 100644
--- a/security/aescrypt/pkg-descr
+++ b/security/aescrypt/pkg-descr
@@ -12,4 +12,4 @@ From the aescrypt README.html:
done external to this program.
Author: Eric Lee Green <eric@estinc.com>
-WWW: http://aescrypt.sourceforge.net/
+WWW: http://aescrypt.sourceforge.net/
diff --git a/security/ddos_scan/pkg-descr b/security/ddos_scan/pkg-descr
index 48949394c451..de99805f3fc4 100644
--- a/security/ddos_scan/pkg-descr
+++ b/security/ddos_scan/pkg-descr
@@ -18,4 +18,4 @@ them, see:
http://staff.washington.edu/dittrich/misc/tfn.analysis
http://staff.washington.edu/dittrich/misc/stacheldraht.analysis
-WWW: http://staff.washington.edu/dittrich/misc/ddos/
+WWW: http://staff.washington.edu/dittrich/misc/ddos/
diff --git a/security/dirbuster/pkg-descr b/security/dirbuster/pkg-descr
index aff96f9656b9..7d9336571393 100644
--- a/security/dirbuster/pkg-descr
+++ b/security/dirbuster/pkg-descr
@@ -4,4 +4,4 @@ is the case now of what looks like a web server in a state of default
installation is actually not, and has pages and applications hidden
within. DirBuster attempts to find these.
-WWW: http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
+WWW: http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
diff --git a/security/gcipher/pkg-descr b/security/gcipher/pkg-descr
index ac5c5ec0b8f1..ea0059c1c432 100644
--- a/security/gcipher/pkg-descr
+++ b/security/gcipher/pkg-descr
@@ -3,4 +3,4 @@ algorithms. It can run as either a GUI, a command-line application, or
a network proxy.
Author: Shannon -jj Behrens <jjinux@yahoo.com>
-WWW: http://gcipher.sourceforge.net
+WWW: http://gcipher.sourceforge.net
diff --git a/security/gpass/pkg-descr b/security/gpass/pkg-descr
index 8286a1124862..da00e85166d8 100644
--- a/security/gpass/pkg-descr
+++ b/security/gpass/pkg-descr
@@ -16,4 +16,4 @@ Features:
direct from GPass
Author: Kouji TAKAO <kouji -at- netlab.jp>
-WWW: http://projects.netlab.jp/gpass/
+WWW: http://projects.netlab.jp/gpass/
diff --git a/security/libpreludedb/pkg-descr b/security/libpreludedb/pkg-descr
index 2e09e580d8df..65056eb8cfe3 100644
--- a/security/libpreludedb/pkg-descr
+++ b/security/libpreludedb/pkg-descr
@@ -3,4 +3,4 @@ to be very modular, distributed, rock solid and fast.
This library provides a framework for easy access to the Prelude database.
-WWW: http://www.prelude-ids.org/
+WWW: http://www.prelude-ids.org/
diff --git a/security/linux-pam-docs/pkg-descr b/security/linux-pam-docs/pkg-descr
index d84d72901fec..053f5131e35a 100644
--- a/security/linux-pam-docs/pkg-descr
+++ b/security/linux-pam-docs/pkg-descr
@@ -6,4 +6,4 @@ This documantation consists of following three guides for
PS/HTML/TXT versions are available.
-WWW: http://www.kernel.org/pub/linux/libs/pam/
+WWW: http://www.kernel.org/pub/linux/libs/pam/
diff --git a/security/matrixssl/pkg-descr b/security/matrixssl/pkg-descr
index 80d35e8de262..5993fcbac9d7 100644
--- a/security/matrixssl/pkg-descr
+++ b/security/matrixssl/pkg-descr
@@ -3,4 +3,4 @@ small footprint applications and devices. PeerSec Networks offers a fully
supported, commercial version as well as an open source version that is
available for download.
-WWW: http://www.matrixssl.org/
+WWW: http://www.matrixssl.org/
diff --git a/security/ocaml-cryptgps/pkg-descr b/security/ocaml-cryptgps/pkg-descr
index da49e1fa998d..ea5bed2db424 100644
--- a/security/ocaml-cryptgps/pkg-descr
+++ b/security/ocaml-cryptgps/pkg-descr
@@ -1,4 +1,4 @@
This library implements Blowfish, DES, and Triple-DES.
Author: Gerd Stolpmann
-WWW: http://www.ocaml-programming.de/packages/
+WWW: http://www.ocaml-programming.de/packages/
diff --git a/security/openvas-client/pkg-descr b/security/openvas-client/pkg-descr
index 250f4bad0e3d..e9d8dae6787f 100644
--- a/security/openvas-client/pkg-descr
+++ b/security/openvas-client/pkg-descr
@@ -3,4 +3,4 @@ security scanner with associated tools like a graphical user fontend. The core
is a server component with a set of network vulnerability tests (NVTs) to
detect security problems in remote systems and applications.
-WWW: http://www.openvas.org/
+WWW: http://www.openvas.org/
diff --git a/security/openvas-libnasl/pkg-descr b/security/openvas-libnasl/pkg-descr
index 250f4bad0e3d..e9d8dae6787f 100644
--- a/security/openvas-libnasl/pkg-descr
+++ b/security/openvas-libnasl/pkg-descr
@@ -3,4 +3,4 @@ security scanner with associated tools like a graphical user fontend. The core
is a server component with a set of network vulnerability tests (NVTs) to
detect security problems in remote systems and applications.
-WWW: http://www.openvas.org/
+WWW: http://www.openvas.org/
diff --git a/security/openvas-libraries/pkg-descr b/security/openvas-libraries/pkg-descr
index 250f4bad0e3d..e9d8dae6787f 100644
--- a/security/openvas-libraries/pkg-descr
+++ b/security/openvas-libraries/pkg-descr
@@ -3,4 +3,4 @@ security scanner with associated tools like a graphical user fontend. The core
is a server component with a set of network vulnerability tests (NVTs) to
detect security problems in remote systems and applications.
-WWW: http://www.openvas.org/
+WWW: http://www.openvas.org/
diff --git a/security/openvas-plugins/pkg-descr b/security/openvas-plugins/pkg-descr
index 250f4bad0e3d..e9d8dae6787f 100644
--- a/security/openvas-plugins/pkg-descr
+++ b/security/openvas-plugins/pkg-descr
@@ -3,4 +3,4 @@ security scanner with associated tools like a graphical user fontend. The core
is a server component with a set of network vulnerability tests (NVTs) to
detect security problems in remote systems and applications.
-WWW: http://www.openvas.org/
+WWW: http://www.openvas.org/
diff --git a/security/openvas-server/pkg-descr b/security/openvas-server/pkg-descr
index 250f4bad0e3d..e9d8dae6787f 100644
--- a/security/openvas-server/pkg-descr
+++ b/security/openvas-server/pkg-descr
@@ -3,4 +3,4 @@ security scanner with associated tools like a graphical user fontend. The core
is a server component with a set of network vulnerability tests (NVTs) to
detect security problems in remote systems and applications.
-WWW: http://www.openvas.org/
+WWW: http://www.openvas.org/
diff --git a/security/pbc/pkg-descr b/security/pbc/pkg-descr
index 3bd7cd6a0eeb..19b9178c4b84 100644
--- a/security/pbc/pkg-descr
+++ b/security/pbc/pkg-descr
@@ -12,4 +12,4 @@ goals. It provides routines such as elliptic curve generation, elliptic
curve arithmetic and pairing computation. Thanks to the GMP library,
despite being written in C, pairings times are reasonable.
-WWW: http://crypto.stanford.edu/pbc/
+WWW: http://crypto.stanford.edu/pbc/
diff --git a/security/pear-Auth_OpenID/pkg-descr b/security/pear-Auth_OpenID/pkg-descr
index d5ea3a68ff95..e4c6d5aa24a5 100644
--- a/security/pear-Auth_OpenID/pkg-descr
+++ b/security/pear-Auth_OpenID/pkg-descr
@@ -2,4 +2,4 @@ The PHP OpenID library lets you enable OpenID authentication on sites built
using PHP. It features the OpenID consumer, Store implementations, and an
OpenID server.
-WWW: http://openidenabled.com/php-openid/
+WWW: http://openidenabled.com/php-openid/
diff --git a/security/poly1305aes/pkg-descr b/security/poly1305aes/pkg-descr
index 099e793b3f35..5c2525b61075 100644
--- a/security/poly1305aes/pkg-descr
+++ b/security/poly1305aes/pkg-descr
@@ -11,4 +11,4 @@ There's a mailing list for Poly1305-AES discussions. To subscribe, send
an empty message to poly1305-subscribe@list.cr.yp.to.
Author: Prof. Daniel J. Bernstein <djb@cr.yp.to>
-WWW: http://cr.yp.to/mac.html
+WWW: http://cr.yp.to/mac.html
diff --git a/security/revelation/pkg-descr b/security/revelation/pkg-descr
index 7d9d34ed9013..fc5bfb4b3e85 100644
--- a/security/revelation/pkg-descr
+++ b/security/revelation/pkg-descr
@@ -5,4 +5,4 @@ interface.
Author: Erik Grinaker <erikg-at-codepoet.no>
Mikel Olasagasti Uranga <mikel@olasagasti.info>
-WWW: http://revelation.olasagasti.info/
+WWW: http://revelation.olasagasti.info/
diff --git a/security/super/pkg-descr b/security/super/pkg-descr
index ebd5b8919686..7c1dbb902970 100644
--- a/security/super/pkg-descr
+++ b/security/super/pkg-descr
@@ -17,4 +17,4 @@ The design philosophy behind super is two-fold:
can be hard to break, and super provides that wrapper so that
even a non-trusted user can use the scripts.
-WWW: http://www.ucolick.org/~will/#super
+WWW: http://www.ucolick.org/~will/#super
diff --git a/security/vinetto/pkg-descr b/security/vinetto/pkg-descr
index 200106f2ef75..333894b70591 100644
--- a/security/vinetto/pkg-descr
+++ b/security/vinetto/pkg-descr
@@ -13,4 +13,4 @@ and associated metada remain stored in the Thumbs.db file. So, the data
contained in those Thumbs.db files are an helpful source of information
for the forensics investigator.
-WWW: http://vinetto.sourceforge.net/
+WWW: http://vinetto.sourceforge.net/