From owner-svn-ports-all@freebsd.org Fri Apr 3 00:44:59 2020 Return-Path: Delivered-To: svn-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 934ED26D9FF; Fri, 3 Apr 2020 00:44:59 +0000 (UTC) (envelope-from swills@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48th6M0s0zz4BLG; Fri, 3 Apr 2020 00:44:59 +0000 (UTC) (envelope-from swills@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0D53523033; Fri, 3 Apr 2020 00:44:51 +0000 (UTC) (envelope-from swills@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0330ioqh017875; Fri, 3 Apr 2020 00:44:50 GMT (envelope-from swills@FreeBSD.org) Received: (from swills@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0330ioLt017868; Fri, 3 Apr 2020 00:44:50 GMT (envelope-from swills@FreeBSD.org) Message-Id: <202004030044.0330ioLt017868@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: swills set sender to swills@FreeBSD.org using -f From: Steve Wills Date: Fri, 3 Apr 2020 00:44:50 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r530458 - in head/security: . sedutil X-SVN-Group: ports-head X-SVN-Commit-Author: swills X-SVN-Commit-Paths: in head/security: . sedutil X-SVN-Commit-Revision: 530458 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 03 Apr 2020 00:44:59 -0000 Author: swills Date: Fri Apr 3 00:44:49 2020 New Revision: 530458 URL: https://svnweb.freebsd.org/changeset/ports/530458 Log: security/sedutil: create port Self Encrypting Drive utility. This allows encrypting and decrypting drives that use encryption based on the various TCG (Trusted Computing Group) specifications. From the web site: The Drive Trust Alliance software (sedutil) is an Open Source (GPLv3) effort to make Self Encrypting Drive technology freely available to everyone. It is a combination of the two known available Open Source code bases today: msed and OpalTool. The DTA Open Source can be employed freely not only for higher security applications but also for integration in embedded applications such as Automotive, Aerospace, Home Automation, and everywhere where the Data Leakage problem has already become obvious and where it will be obvious. The storage device suppliers are already gearing to give you self-encrypting storage. All you have to do is work with them. For more information: WWW: https://github.com/Drive-Trust-Alliance/sedutil PR: 219408 Submitted by: ken Added: head/security/sedutil/ head/security/sedutil/Makefile (contents, props changed) head/security/sedutil/distinfo (contents, props changed) head/security/sedutil/pkg-descr (contents, props changed) Modified: head/security/Makefile (contents, props changed) Modified: head/security/Makefile ============================================================================== --- head/security/Makefile Fri Apr 3 00:44:41 2020 (r530457) +++ head/security/Makefile Fri Apr 3 00:44:49 2020 (r530458) @@ -1160,6 +1160,7 @@ SUBDIR += secpanel SUBDIR += sectok SUBDIR += secure_delete + SUBDIR += sedutil SUBDIR += setaudit SUBDIR += sha SUBDIR += sha1collisiondetection Added: head/security/sedutil/Makefile ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/sedutil/Makefile Fri Apr 3 00:44:49 2020 (r530458) @@ -0,0 +1,29 @@ +# $FreeBSD$ + +PORTNAME= sedutil +PORTVERSION= 1.12 +CATEGORIES= security + +MAINTAINER= ken@FreeBSD.org +COMMENT= Self Encrypting Drive utility + +LICENSE= GPLv3+ + +USES= gmake pkgconfig + +USE_GITHUB= yes +GH_ACCOUNT= kendmerry +GH_PROJECT= sedutil +GH_TAGNAME= 3122ba0 + +WRKSRC_SUBDIR= freebsd/CLI +ALL_TARGET= build + +PLIST_FILES+= bin/sedutil-cli +SEDUTIL_SD= ${WRKSRC}/dist/Release/CLang-Generic +SEDUTIL_PROG= sedutil-cli + +do-install: + ${INSTALL_PROGRAM} ${SEDUTIL_SD}/${SEDUTIL_PROG} ${STAGEDIR}${PREFIX}/bin + +.include Added: head/security/sedutil/distinfo ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/sedutil/distinfo Fri Apr 3 00:44:49 2020 (r530458) @@ -0,0 +1,3 @@ +TIMESTAMP = 1585874178 +SHA256 (kendmerry-sedutil-1.12-3122ba0_GH0.tar.gz) = 878a791f429624f34ba3764d8138b6b10d4178a87c1d4c7bbae646d110065a6e +SIZE (kendmerry-sedutil-1.12-3122ba0_GH0.tar.gz) = 225126 Added: head/security/sedutil/pkg-descr ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/security/sedutil/pkg-descr Fri Apr 3 00:44:49 2020 (r530458) @@ -0,0 +1,22 @@ +Self Encrypting Drive utility. + +This allows encrypting and decrypting drives that use encryption based on +the various TCG (Trusted Computing Group) specifications. + +From the web site: + + The Drive Trust Alliance software (sedutil) is an Open Source (GPLv3) + effort to make Self Encrypting Drive technology freely available to + everyone. It is a combination of the two known available Open Source code + bases today: msed and OpalTool. + + The DTA Open Source can be employed freely not only for higher security + applications but also for integration in embedded applications such as + Automotive, Aerospace, Home Automation, and everywhere where the Data + Leakage problem has already become obvious and where it will be obvious. + The storage device suppliers are already gearing to give you + self-encrypting storage. All you have to do is work with them. + +For more information: + +WWW: https://github.com/Drive-Trust-Alliance/sedutil