aboutsummaryrefslogtreecommitdiff
path: root/security/Makefile
Commit message (Collapse)AuthorAgeFilesLines
* security/openssl-quictls: Remove expired portRene Ladan43 hours1-1/+0
| | | | 2025-12-31 security/openssl-quictls: Upstream project has been archived, use security/quictls
* security/py-serpico: New port: Security scanner for FreeBSD packages and ↵Jesús Daniel Colmenares Oviedo2026-01-241-0/+1
| | | | | | | | | | | releases serpico is a security scanner for FreeBSD packages and releases that compares the versions against a list of versions marked as vulnerable, then displays vulnerability information in a JSON-compact format for easy analysis by other security tools. WWW: https://github.com/DtxdF/serpico
* security/himitsu: create new portpara2026-01-211-0/+1
| | | | | | | | | | Himitsu is a secure secret storage system for Unix-like systems. It provides an arbitrary key/value store (where values may be secret) and a query language for manipulating the key store. WWW: https://himitsustore.org PR: 292475
* security/p5-Digest-SipHash: new portEugene Grosbein2026-01-181-0/+1
| | | | | | | Perl XS interface to the SipHash algorithm. This module does only one thing - calculates the SipHash value of the given string.
* security/pam_worker: new portBaptiste Daroussin2026-01-141-0/+1
| | | | | PAM-modules is a collection of useful PAM modules and command line utilities for checking PAM authentication and other management groups.
* [NEW PORT] security/py-k5test: Library for setting up self-contained ↵Siva Mahadevan2026-01-091-0/+1
| | | | | | | Kerberos 5 environments Co-authored-by: Michael Osipov <michaelo@FreeBSD.org> PR: 278820
* security/voa: addCharlie Li2026-01-041-0/+1
|
* */*php81*: SunsetMuhammad Moinur Rahman2025-12-311-2/+0
|
* security/nextcloud-passman: Remove expired portRene Ladan2025-12-311-1/+0
| | | | 2025-12-31 security/nextcloud-passman: Upstream unmaintained
* security/rkhunter: Remove expired portRene Ladan2025-12-311-1/+0
| | | | 2025-12-31 security/rkhunter: Project abandoned in 2009
* security/krb5-120: Remove expired portRene Ladan2025-12-311-1/+0
| | | | 2025-12-31 security/krb5-120: Now that MIT KRB5 1.22 is GA 1.20 is EOL
* security/tls-check: Remove expired portRene Ladan2025-12-311-1/+0
| | | | 2025-12-31 security/tls-check: Obsolete tool and relies on deprecated libraries
* security/clamtk: Remove expired portRene Ladan2025-12-311-1/+0
| | | | 2025-12-30 security/clamtk: Maintainer has retired
* Add security/keepass-diff: CLI-tool to diff two Keepass (.kdbx) filesHiroo Ono2025-12-301-0/+1
| | | | PR: 291900
* security/rubygem-openssl3: Add rubygem-openssl3 3.3.2 (copied from ↵Po-Chuan Hsieh2025-12-191-0/+1
| | | | | | rubygem-openssl) - Add PORTSCOUT
* java/autofirma: [new port]. Digital signature applicationFernando Apesteguía2025-12-121-0/+1
| | | | | | | | | Autofirma is a java application used to sign digital documents. It is the official application of the Spanish Government and as such it is required to perform many online tasks with the Administration. Reviewed by: michaelo@ Differential Revision: https://reviews.freebsd.org/D53807
* security/vault-medusa: New Port: Medusa: export secrets from Vault or OpenBaoSébastien Santoro2025-11-181-0/+1
| | | | PR: 281865
* security/radamsa: Ressurect the port and update to 0.7Gleb Popov2025-11-171-0/+1
|
* security/opkssh: New port: Tool which enables SSH to be used with OpenID ConnectJesús Daniel Colmenares Oviedo2025-11-161-0/+1
| | | | | | | | | | | opkssh is a tool which enables ssh to be used with OpenID Connect allowing SSH access to be managed via identities like alice@example.com instead of long-lived SSH keys. It does not replace SSH, but instead generates SSH public keys containing PK Tokens and configures sshd to verify them. These PK Tokens contain standard OpenID Connect ID Tokens. This protocol builds on the OpenPubkey which adds user public keys to OpenID Connect without breaking compatibility with existing OpenID Provider.
* security/gitlab-analyzers-secrets: added gitlab secret detection scannerMatthias Fechner2025-11-151-0/+1
|
* security/py-pyopenssl: Move security/py-openssl to security/py-pyopensslPo-Chuan Hsieh2025-11-111-1/+1
| | | | | | | | - Update WWW - Convert to USE_PYTHON=pep517 - Clean up Makefile - Bump PORTREVISION for package change - Bump PORTREVISION of dependent ports for dependency change
* security/rhonabwy: Remove expired portRene Ladan2025-11-011-1/+0
| | | | 2025-10-31 security/rhonabwy: Upstream repository has been archived on Nov 11, 2024
* security/p5-Crypt-URandom-Token: New port: Generate secure strings for ↵Tomohiro Hosaka2025-10-301-0/+1
| | | | | | | | | | | | | passwords, secrets and similar This module provides a secure way to generate a random token for passwords and similar using Crypt::URandom as the source of random bits. WWW: https://metacpan.org/dist/Crypt-URandom-Token PR: 290569 Reported by: Tomohiro Hosaka <bokutin@bokut.in> (new maintainer)
* www/gitlab: fix regression from 5028178941fc081cd43354ea03ceda365a12f73dMatthias Fechner2025-10-191-0/+2
| | | | | this fixes a depedency conflict with rubygem-logger which was added into package security/rubygem-omniauth which conflicts with rubygem-logger-gitlab
* security/py-google-cloud-kms: Add port: Python client for Google Cloud Key ↵Hiroki Tagato2025-10-151-0/+1
| | | | | | | | | | | | | | | | Management Service Google Cloud Key Management Service: a cloud-hosted key management service that lets you manage cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys. Cloud KMS is integrated with Cloud IAM and Cloud Audit Logging so that you can manage permissions on individual keys and monitor how these are used. Use Cloud KMS to protect secrets and other sensitive data that you need to store in Google Cloud Platform. WWW: https://pypi.org/project/google-cloud-kms/
* security/iddawc: Remove expired portRene Ladan2025-10-141-1/+0
| | | | 2025-10-13 security/iddawc: Upstream repo archived on Nov 11, 2024
* security/py-cart: New port: CaRT Neutering formatYuri Victorovich2025-10-071-0/+1
|
* security/py-guardpost: New port: Framework to handle authentication and ↵Yuri Victorovich2025-10-061-0/+1
| | | | authorization
* security/py-certipy: New port: Utility to create and sign CAs and certificatesYuri Victorovich2025-10-031-0/+1
|
* security/openssl32: Remove expired portMatthias Andree2025-10-011-1/+0
| | | | | | 2025-09-30 security/openssl32: Please use security/openssl35 (LTS) There are no users of this port any more.
* security/openssl32: Revert "Remove expired port"Matthias Andree2025-10-011-0/+1
| | | | | | | | This reverts commit 38010f8c963447fe75bb7965f62e61e8f0e37c87. I am removing the patch because it contains unapproved changes to Mk/ while the approval for the following is pending: PR: 289938
* security/botan2: Remove expired portMatthias Andree2025-10-011-1/+0
| | | | | | | | 2025-03-31 security/botan2: End of life 2024-12-31 upstream, consider migrating to security/botan3 With keepass286 moved to botan3 and softhsm2 using OpenSSL by default, we can strip softhsm2's botan2 non-default option and remove botan2 from the tree.
* security/openssl32: Remove expired portMatthias Andree2025-10-011-1/+0
| | | | | | | | 2025-09-30 security/openssl32: Please use security/openssl35 (LTS) At the same time, update Mk/ infrastructure to remove traces of openssl31 (forgotten at the time when we removed it) and openssl32, and fill in openssl34 openssl35 openssl36 instead.
* security/p5-openxpki-clca: hook into the buildRobert Clausecker2025-09-291-0/+1
| | | | | | | I keep forgetting to do that with 3rd party patches. Reported by: antoine Event: EuroBSDcon 2025
* security/py-python-nmap: Add new portYusuf Yaman2025-09-281-0/+1
| | | | | PR: 289288 Event: EuroBSDCon 2025
* security/interactsh: New port, interactsh 1.2.4Danilo Egea Gondolfo2025-09-151-0/+1
| | | | | | Interactsh is a tool designed to detect vulnerabilities that cause external interactions. https://github.com/projectdiscovery/interactsh
* security/py-signxml: Add py-signxml 4.2.0Po-Chuan Hsieh2025-09-071-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | SignXML is an implementation of the W3C XML Signature standard in Python. This standard (also known as "XMLDSig") is used to provide payload security in SAML 2.0, XAdES, EBICS, and WS-Security, among other uses. The standard is defined in the W3C Recommendation XML Signature Syntax and Processing Version 1.1. SignXML implements all of the required components of the Version 1.1 standard, and most recommended ones. Its features are: - Use of a libxml2-based XML parser configured to defend against common XML attacks when verifying signatures - Extensions to allow signing with and verifying X.509 certificate chains, including hostname/CN validation - Extensions to sign and verify XAdES signatures - Support for exclusive XML canonicalization with inclusive prefixes (InclusiveNamespaces PrefixList, required to verify signatures generated by some SAML implementations) - Modern Python compatibility (3.9-3.13+ and PyPy) - Well-supported, portable, reliable dependencies: lxml and cryptography - Comprehensive testing (including the XMLDSig interoperability suite) and continuous integration - Simple interface with useful, ergonomic, and secure defaults (no network calls, XSLT or XPath transforms) - Compactness, readability, and extensibility
* Revert: "security/yubioath-desktop: Remove expired port"Rene Ladan2025-09-041-0/+1
| | | | | | | This reverts commit c33d916020276f1442482674cb93575201975256. security/py-yubikey-manager no longer depends on security/libu2f-host since commit 0708111995957ebffe65a018c997be9b7d3d681c
* Revert: "security/yubikey-manager-qt: Remove expired port"Rene Ladan2025-09-041-0/+1
| | | | | | | | | This reverts commit 5aaae75d74b38beb1391200f9b29d00904b240df. security/py-yubikey-manager no longer depends on security/libu2f-host since commit 0708111995957ebffe65a018c997be9b7d3d681c Reported by: Jan Henrik Sylvester <me@janh.de>
* security/openssl36: Add new OpenSSL 3.6 ALPHABernard Spil2025-09-031-0/+1
| | | | * Not for production use
* security/libu2f-host: Remove expired portRene Ladan2025-09-021-1/+0
| | | | 2025-05-31 security/libu2f-host: This project is deprecated and is no longer being maintained. libfido2 is a new project with support for U2F and FIDO2. Use security/libfido2 instead
* security/p5-Data-Entropy: Remove expired portRene Ladan2025-09-021-1/+0
| | | | 2025-05-31 security/p5-Data-Entropy: The maintainer of this distribution has indicated that it is deprecated and no longer suitable for use
* security/p5-Dancer2-Plugin-Passphrase: Remove expired portRene Ladan2025-09-021-1/+0
| | | | 2025-09-01 security/p5-Dancer2-Plugin-Passphrase: Depends on expired security/p5-Data-Entropy
* security/p5-Dancer-Plugin-Passphrase: Remove expired portRene Ladan2025-09-021-1/+0
| | | | 2025-09-01 security/p5-Dancer-Plugin-Passphrase: Depends on expired security/p5-Data-Entropy
* security/yubioath-desktop: Remove expired portRene Ladan2025-09-021-1/+0
| | | | 2025-09-01 security/yubioath-desktop: Depends on expired security/libu2f-host via security/py-yubikey-manager
* security/yubikey-manager-qt: Remove expired portRene Ladan2025-09-021-1/+0
| | | | 2025-09-01 security/yubikey-manager-qt: Depends on expired security/libu2f-host via security/py-yubikey-manager
* security/py-onlykey: Remove expired portRene Ladan2025-09-021-1/+0
| | | | 2025-09-01 security/py-onlykey: Depends on expired security/libu2f-host
* security/p5-Dancer-Plugin-Auth-Extensible-Provider-Usergroup: Remove expired ↵Rene Ladan2025-09-021-1/+0
| | | | | | port 2025-09-01 security/p5-Dancer-Plugin-Auth-Extensible-Provider-Usergroup: Depends on expired security/p5-Data-Entropy via security/p5-Dancer-Plugin-Passphrase
* security/p5-Dancer2-Plugin-Auth-Extensible-Provider-Usergroup: Remove ↵Rene Ladan2025-09-021-1/+0
| | | | | | expired port 2025-09-01 security/p5-Dancer2-Plugin-Auth-Extensible-Provider-Usergroup: Depends on expired security/p5-Data-Entropy via security/p5-Dancer2-Plugin-Passphrase
* security/py-nitrokey: New port: Python SDK for Nitrokey devicesThibault Payet2025-08-261-0/+1
| | | | | | | | | | | | | | | | | | | | The Nitrokey Python SDK can be used to use and configure Nitrokey devices. The SDK supports these devices and features: * Nitrokey 3 - device and bootloader management (nitrokey.nk3) - admin app (nitrokey.trussed.admin_app) - provisioner app (nitrokey.trussed.provisioner_app) - secrets app (nitrokey.nk3.secrets_app) * Nitrokey Passkey - device and bootloader management (nitrokey.nkpk) - admin app (nitrokey.trussed.admin_app) - provisioner app (nitrokey.trussed.provisioner_app) https://github.com/Nitrokey/nitrokey-sdk-py/ https://pypi.org/project/nitrokey/ PR: 288823