summaryrefslogtreecommitdiff
path: root/security/hydan
AgeCommit message (Collapse)AuthorFilesLines
2010-01-17Recursive PKGREVISION bump for jpeg update to 8.wiz1-1/+2
2009-06-14Remove @dirrm entries from PLISTsjoerg1-2/+1
2008-09-29sortobache1-2/+2
2008-09-29Require OpenSSL.obache1-6/+9
While here, add DESTDIR support.
2006-03-04Point MAINTAINER to pkgsrc-users@NetBSD.org in the case where nojlam1-2/+2
developer is officially maintaining the package. The rationale for changing this from "tech-pkg" to "pkgsrc-users" is that it implies that any user can try to maintain the package (by submitting patches to the mailing list). Since the folks most likely to care about the package are the folks that want to use it or are already using it, this would leverage the energy of users who aren't developers.
2005-06-17Create directories before installing files into them.jlam1-1/+3
2005-02-24Add RMD160 digests.agc1-1/+2
2004-09-16Add patches to work around compile problems for this package onhe5-1/+131
NetBSD-1.6.2_STABLE. Gets rid of a parse error when only one argument is given to HDN_WARN, which leaves us with "fprintf(fp, arg, )". This may be a failure of the compiler on this platform to properly do varargs macros, but the changes are noops and gets it building there.
2004-08-13Initial import of hydan-0.13 into the Packages Collection.agc4-0/+59
Hydan steganographically conceals a message into an application. It exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions. It then encodes information in machine code by using the appropriate instructions from each set. Features: - Application filesize remains unchanged - Message is blowfish encrypted with a user-supplied passphrase before being embedded - Encoding rate: 1/110 Primary uses for Hydan: - Covert Communication: embedding data into binaries creates a covert channel that can be used to exchange secret messages. - Signing: a program's cryptographic signature can be embedded into itself. The recipient of the binary can then verify that it has not been tampered with (virus or trojan), and is really from who it claims to be from. This check can be built into the OS for user transparency. - Watermarking: a watermark can be embedded to uniquely identify binaries for copyright purposes, or as part of a DRM scheme. Note: this usage is not recommended as Hydan implements fragile watermarks.