GET /api/v1/ports/?format=api&ordering=-created_at&page=529
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 50658,
    "next": "https://ports.macports.org/api/v1/ports/?format=api&ordering=-created_at&page=530",
    "previous": "https://ports.macports.org/api/v1/ports/?format=api&ordering=-created_at&page=528",
    "results": [
        {
            "name": "policykit",
            "portdir": "security/policykit",
            "version": "0.121",
            "license": "LGPL-2+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://gitlab.freedesktop.org/polkit/polkit",
            "description": "PolicyKit is an application-level toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes",
            "long_description": "PolicyKit is an application-level toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "devans",
                    "github": "dbevans",
                    "ports_count": 2625
                }
            ],
            "variants": [
                "docs",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-14",
                        "docbook-xml-4.5",
                        "docbook-xsl-nons",
                        "libxslt",
                        "gettext",
                        "meson",
                        "ninja",
                        "pkgconfig",
                        "gobject-introspection",
                        "docbook-xml-4.1.2"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "glib2",
                        "duktape",
                        "dbus"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "accountsservice",
                        "gconf",
                        "policykit-gnome",
                        "polkit-qt",
                        "polkit-qt5-devel",
                        "gnome-applets",
                        "gnome-control-center",
                        "gnome-panel",
                        "gnome-settings-daemon"
                    ]
                }
            ]
        },
        {
            "name": "pkcs11-helper",
            "portdir": "security/pkcs11-helper",
            "version": "1.29.0",
            "license": "GPL-2+ and BSD",
            "platforms": "darwin freebsd",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/OpenSC/pkcs11-helper",
            "description": "Library that simplifies the interaction with PKCS#11 providers for end-user applications using a simple API and optional OpenSSL engine",
            "long_description": "Library that simplifies the interaction with PKCS#11 providers for end-user applications using a simple API and optional OpenSSL engine",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "automake",
                        "pkgconfig",
                        "clang-17",
                        "autoconf",
                        "libtool"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl11",
                        "gnutls"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "gnupg-pkcs11-scd",
                        "qca-pkcs11",
                        "qca-qt5-pkcs11"
                    ]
                }
            ]
        },
        {
            "name": "pinentry",
            "portdir": "security/pinentry",
            "version": "1.3.2",
            "license": "GPL-2+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://gnupg.org/software/pinentry/",
            "description": "Passphrase entry dialog utilizing the Assuan protocol",
            "long_description": "This is a collection of simple PIN or passphrase entry dialogs in a secure manner.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "ionic",
                    "github": "Ionic",
                    "ports_count": 24
                }
            ],
            "variants": [
                "gtk2",
                "gnome3",
                "qt4",
                "qt5",
                "fltk",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libassuan",
                        "libgpg-error",
                        "ncurses",
                        "libiconv"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "lastpass-cli",
                        "gnupg2"
                    ]
                }
            ]
        },
        {
            "name": "pidgin-otr",
            "portdir": "security/pidgin-otr",
            "version": "4.0.2",
            "license": "GPL-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.cypherpunks.ca/otr/",
            "description": "Off-the-Record Plugin for Pidgin",
            "long_description": "This is a pidgin plugin which implements Off-the-Record (OTR) Messaging. OTR allows you to have private conversations over IM by providing: - Encryption - No one else can read your instant messages. - Authentication - You are assured the correspondent is who you think it is. - Deniability - The messages you send do _not_ have digital signatures that are checkable by a third party. Anyone can forge messages after a conversation to make them look like they came from you. However, _during_ a conversation, your correspondent is assured the messages he sees are authentic and unmodified. - Perfect forward secrecy - If you lose control of your private keys, no previous conversation is compromised.",
            "active": true,
            "categories": [
                "net",
                "security",
                "chat"
            ],
            "maintainers": [
                {
                    "name": "rsync",
                    "github": "",
                    "ports_count": 3
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-17",
                        "libtool",
                        "pkgconfig",
                        "intltool",
                        "autoconf",
                        "automake",
                        "gettext"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libotr",
                        "gettext-runtime",
                        "pidgin"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pgpdump",
            "portdir": "security/pgpdump",
            "version": "0.35",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.mew.org/~kazu/proj/pgpdump/en/",
            "description": "PGP packet visualizer",
            "long_description": "pgpdump is a PGP packet visualizer which displays the packet format of OpenPGP (RFC 2440 + bis) and PGP version 2 (RFC 1991).",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-13"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "bzip2",
                        "zlib"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pgp",
            "portdir": "security/pgp",
            "version": "50i",
            "license": "Restrictive",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.pgpi.org/",
            "description": "Public-Key encryption for the masses",
            "long_description": "PGP 5.0 contains support for new encryption methods (most notably DSS/Diffie-Hellman), and built-in keyserver support. Also, the command line has been redesigned to be more Unix and scripting friendly. Note: this software is old; you probably want gnupg or gnupg2 instead.",
            "active": false,
            "categories": [
                "security",
                "mail"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-9.0"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pdfparser",
            "portdir": "security/pdfparser",
            "version": "0.7.6",
            "license": "public-domain",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://blog.didierstevens.com/programs/pdf-tools/#pdfid",
            "description": "parse a PDF document to identify the fundamental elements used",
            "long_description": "parse a PDF document to identify the fundamental elements used",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-14"
                    ]
                },
                {
                    "type": "extract",
                    "ports": [
                        "unzip"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pdfid",
            "portdir": "security/pdfid",
            "version": "0.2.10",
            "license": "public-domain",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://blog.didierstevens.com/programs/pdf-tools/#pdfid",
            "description": "Tool to test a PDF file",
            "long_description": "Tool to test a PDF file",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "extract",
                    "ports": [
                        "unzip"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pbc",
            "portdir": "security/pbc",
            "version": "1.0.0",
            "license": "LGPL-3",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://crypto.stanford.edu/pbc/",
            "description": "The Pairing-Based Cryptography Library",
            "long_description": "The Pairing-Based Cryptography Library \n\nPairing-based cryptography is a relatively young area of cryptography that revolves around a certain function with special properties. \n\nThe PBC (Pairing-Based Cryptography) library is a free C library built on the GMP library that performs the mathematical operations underlying pairing-based cryptosystems. \n\nThe PBC library is designed to be the backbone of implementations of pairing-based cryptosystems, thus speed and portability are important goals. It provides routines such as elliptic curve generation, elliptic curve arithmetic and pairing computation. Thanks to the GMP library, despite being written in C, pairings times are reasonable.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "gmp"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "cpabe",
                        "libbswabe"
                    ]
                }
            ]
        },
        {
            "name": "pass-update",
            "portdir": "security/pass-update",
            "version": "2.2.1",
            "license": "GPL-2",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/roddhjav/pass-update",
            "description": "A pass extension that provides a convenient solution to update an existing password.",
            "long_description": "A pass extension that provides a convenient solution to update an existing password.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "judaew",
                    "github": "judaew",
                    "ports_count": 652
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "coreutils",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "pass"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "pass"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pass-otp",
            "portdir": "security/pass-otp",
            "version": "1.2.0",
            "license": "GPL-3",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/tadfisher/pass-otp",
            "description": "A pass extension for managing one-time-password (OTP) tokens",
            "long_description": "A pass extension for managing one-time-password (OTP) tokens",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "loic-github",
                    "github": "lpefferkorn",
                    "ports_count": 1
                },
                {
                    "name": "judaew",
                    "github": "judaew",
                    "ports_count": 652
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-14"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "qrencode",
                        "oath-toolkit",
                        "pass"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pass-import",
            "portdir": "security/pass-import",
            "version": "0.1",
            "license": "GPL-2+",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/roddhjav/pass-import",
            "description": "A generic importer extension for the standard unix password manager pass.",
            "long_description": "A generic importer extension for the standard unix password manager pass.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "coreutils",
                        "clang-17"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "pass"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pass",
            "portdir": "security/pass",
            "version": "1.7.4",
            "license": "GPL-2+",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.passwordstore.org/",
            "description": "pass is the standard unix password manager",
            "long_description": "pass is the standard unix password manager",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "judaew",
                    "github": "judaew",
                    "ports_count": 652
                }
            ],
            "variants": [
                "external_gpg"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-16"
                    ]
                },
                {
                    "type": "extract",
                    "ports": [
                        "xz"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "util-linux",
                        "gnupg2",
                        "tree",
                        "qrencode",
                        "git"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "pass-import",
                        "pass-update"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "pass-otp",
                        "pass-update"
                    ]
                }
            ]
        },
        {
            "name": "paperkey",
            "portdir": "security/paperkey",
            "version": "1.6",
            "license": "GPL-3+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.jabberwocky.com/software/paperkey/",
            "description": "An OpenPGP key archiver",
            "long_description": "A reasonable way to achieve a long term backup of OpenPGP keys is to print them out on paper. Paper and ink have amazingly long retention qualities - far longer than the magnetic or optical means that are generally used to back up computer data.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "larryv",
                    "github": "larryv",
                    "ports_count": 48
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-9.0"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pam-u2f",
            "portdir": "security/pam-u2f",
            "version": "1.4.0",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://developers.yubico.com/pam-u2f/",
            "description": "Pluggable Authentication Module (PAM) for U2F",
            "long_description": "The PAM U2F module provides an easy way to integrate the Yubikey (or other U2F-compliant authenticators) into your existing user authentication infrastructure. PAM is used by GNU/Linux, Solaris and Mac OS X for user authentication.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "l2dy",
                    "github": "l2dy",
                    "ports_count": 97
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18",
                        "autoconf",
                        "automake",
                        "gengetopt",
                        "libtool",
                        "pkgconfig",
                        "asciidoc"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libfido2"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "pam-google-authenticator",
            "portdir": "security/pam-google-authenticator",
            "version": "1.11",
            "license": "apache-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/google/google-authenticator-libpam",
            "description": "Pluggable Authentication Module for Google Authenticator",
            "long_description": "The Google Authenticator PAM module provides an easy way use Google's 2FA (via Google Authenticator app) to your existing user authentication infrastructure.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "eborisch",
                    "github": "eborisch",
                    "ports_count": 221
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "autoconf",
                        "automake",
                        "libtool",
                        "clang-17"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "qrencode"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "p11-kit",
            "portdir": "security/p11-kit",
            "version": "0.26.1",
            "license": "Permissive",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/p11-glue/p11-kit",
            "description": "PKCS#11 module discovery and loading",
            "long_description": "Provides a way to load and enumerate PKCS#11 modules and a standard configuration setup for installing PKCS#11 modules in such a way that they are discoverable.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "doc",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "python313",
                        "gettext",
                        "pkgconfig",
                        "clang-18"
                    ]
                },
                {
                    "type": "extract",
                    "ports": [
                        "xz"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libffi",
                        "libtasn1",
                        "libxslt",
                        "gettext-runtime"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "curl-ca-bundle"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "build",
                    "ports": [
                        "pkcs11-provider"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "gnutls",
                        "gnutls-devel",
                        "VLC2",
                        "libVLC2",
                        "glib-networking",
                        "openconnect",
                        "gcr",
                        "redwax-tool"
                    ]
                }
            ]
        },
        {
            "name": "outguess",
            "portdir": "security/outguess",
            "version": "0.4",
            "license": "BSD-old and Noncommercial and IJG",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/resurrecting-open-source-projects/outguess",
            "description": "steganographic tool",
            "long_description": "OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. In the next paragraphs, images will be used as concrete example of data objects, though OutGuess can use any kind of data, as long as a handler is provided.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "autoconf",
                        "automake",
                        "libtool",
                        "clang-12"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "ophcrack",
            "portdir": "security/ophcrack",
            "version": "3.8.0",
            "license": "(GPL-2+ or OpenSSLException)",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://ophcrack.sourceforge.io",
            "description": "Microsoft Windows password cracker",
            "long_description": "Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "gui",
                "tables",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-9.0"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl",
                        "expat"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "openvas-server",
            "portdir": "security/openvas-server",
            "version": "2.0.3",
            "license": "(GPL-2 or OpenSSLException)",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.openvas.org/",
            "description": "Open Vulnerability Assessment System server",
            "long_description": "OpenVAS is the Open Vulnerability Assessment System. This port is the server component.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-15"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openvas-libnasl",
                        "xorg-libX11"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "openvas-plugins"
                    ]
                }
            ]
        },
        {
            "name": "openvas-plugins",
            "portdir": "security/openvas-plugins",
            "version": "1.0.7",
            "license": "(GPL-2 or OpenSSLException)",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.openvas.org/",
            "description": "Open Vulnerability Assessment System plugins",
            "long_description": "OpenVAS is the Open Vulnerability Assessment System. This port contains the plugins used by the server component.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "gsed",
                        "clang-15"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "glib2",
                        "openvas-server"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "openvas-libraries",
            "portdir": "security/openvas-libraries",
            "version": "2.0.4",
            "license": "(GPL-2 or OpenSSLException)",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.openvas.org/",
            "description": "Open Vulnerability Assessment System libraries",
            "long_description": "OpenVAS is the Open Vulnerability Assessment System. This port contains the libraries used by the server component.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-15"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "gnutls",
                        "gettext",
                        "libpcap",
                        "libgcrypt",
                        "glib2"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "openvas-libnasl"
                    ]
                }
            ]
        },
        {
            "name": "openvas-libnasl",
            "portdir": "security/openvas-libnasl",
            "version": "2.0.2",
            "license": "(GPL-2 or OpenSSLException)",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.openvas.org/",
            "description": "Open Vulnerability Assessment System NASL library",
            "long_description": "OpenVAS is the Open Vulnerability Assessment System. This port contains the Nessus Attack Scripting Language (NASL) library used by the server component.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "bison",
                        "pkgconfig",
                        "gsed",
                        "clang-15"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "gpgme",
                        "openvas-libraries"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "openvas-server"
                    ]
                }
            ]
        },
        {
            "name": "openvas-client",
            "portdir": "security/openvas-client",
            "version": "2.0.5",
            "license": "(GPL-2 or OpenSSLException)",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.openvas.org/",
            "description": "Open Vulnerability Assessment System client",
            "long_description": "OpenVAS is the Open Vulnerability Assessment System. This port is the client component.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "clang-15"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl",
                        "gtk2",
                        "gd2"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "opensc",
            "portdir": "security/opensc",
            "version": "0.26.1",
            "license": "LGPL-2.1",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/OpenSC/OpenSC",
            "description": "Tools and libraries for smart cards",
            "long_description": "OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitate their use in security applications such as authentication, mail encryption and digital signatures. OpenSC implements the PKCS#11 API so applications supporting this API (such as Mozilla Firefox and Thunderbird) can use it. On the card OpenSC implements the PKCS#15 standard and aims to be compatible with every software/card that does so, too.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "eac",
                "p11kit",
                "readline",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-17",
                        "pkgconfig",
                        "docbook-xsl-nons",
                        "help2man",
                        "libxslt",
                        "autoconf",
                        "automake",
                        "gengetopt",
                        "libtool"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "readline",
                        "openpace",
                        "openssl3",
                        "zlib"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "build",
                    "ports": [
                        "pkcs11-provider"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "sequoia-keystore"
                    ]
                }
            ]
        },
        {
            "name": "openpgpsdk",
            "portdir": "security/openpgpsdk",
            "version": "0.9",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://openpgp.nominet.org.uk/",
            "description": "OpenPGP library SDK",
            "long_description": "The OpenPGP SDK project provides an open source library, written in C, which implements the OpenPGP specification.",
            "active": true,
            "categories": [
                "devel",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "doc"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "perl5",
                        "gnupg2",
                        "clang-14"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "bzip2",
                        "openssl",
                        "zlib",
                        "cunit"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "openpace",
            "portdir": "security/openpace",
            "version": "1.1.3",
            "license": "GPL-3",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/frankmorgner/openpace",
            "description": "Cryptographic library for EAC version 2",
            "long_description": "OpenPACE implements Extended Access Control (EAC) version 2 as specified in BSI TR-03110.",
            "active": true,
            "categories": [
                "security",
                "libs"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "gengetopt",
                        "pkgconfig",
                        "help2man",
                        "clang-17"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl3"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "opensc"
                    ]
                }
            ]
        },
        {
            "name": "openfpc",
            "portdir": "security/openfpc",
            "version": "0.1a",
            "license": "GPL-2+",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://code.google.com/p/openfpc/",
            "description": "lightweight full-packet network traffic recorder & buffering tool",
            "long_description": "OpenFPC is a set of scripts that combine to provide a lightweight full-packet network traffic recorder & buffering tool. Its design goal is to allow non-expert users to deploy a distributed network traffic recorder on COTS hardware while integrating into existing alert and log tools.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-14"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "perl5.34"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "oauth2-proxy",
            "portdir": "security/oauth2-proxy",
            "version": "7.13.0",
            "license": "MIT",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://oauth2-proxy.github.io/oauth2-proxy",
            "description": "A reverse proxy that provides authentication with Google, GitHub or other providers.",
            "long_description": "A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1023
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "oath-toolkit",
            "portdir": "security/oath-toolkit",
            "version": "2.6.13",
            "license": "GPL-3+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.nongnu.org/oath-toolkit/",
            "description": "The OATH Toolkit contains a shared library, command line tool, and PAM module for one-time password authentication.",
            "long_description": "The OATH Toolkit contains a shared library, command line tool, and PAM module that makes it possible to build one-time password authentication systems. Supported technologies include the event-based HOTP algorithm and the time-based TOTP algorithm. OATH is the Open AuTHentication organization which specify the algorithms.",
            "active": true,
            "categories": [
                "devel",
                "security"
            ],
            "maintainers": [
                {
                    "name": "arno+macports",
                    "github": "fracai",
                    "ports_count": 14
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "pkgconfig",
                        "gtk-doc",
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libtool",
                        "xmlsec",
                        "libxml2"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "run",
                    "ports": [
                        "pass-otp"
                    ]
                }
            ]
        },
        {
            "name": "nsrllookup",
            "portdir": "security/nsrllookup",
            "version": "1.4.2",
            "license": "ISC",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://rjhansen.github.io/nsrllookup/",
            "description": "Look up hashes in the NSRL",
            "long_description": "Look up hashes in the National Software Reference Library database of hashes",
            "active": true,
            "categories": [
                "sysutils",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal",
                "debug"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "cmake",
                        "clang-16"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "boost176"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "nbtscan",
            "portdir": "security/nbtscan",
            "version": "1.7.2",
            "license": "GPL-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/resurrecting-open-source-projects/nbtscan",
            "description": "Scan networks for NetBIOS name information",
            "long_description": "NBTscan is a program for scanning IP networks for NetBIOS name information. It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "autoconf",
                        "automake",
                        "libtool",
                        "clang-17"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "nasty",
            "portdir": "security/nasty",
            "version": "0.6",
            "license": "GPL-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://www.vanheusden.com/nasty/",
            "description": "passphrase revovery helper for PGP and GPG keys",
            "long_description": "Nasty is a program that helps you to recover the passphrase of your PGP or GPG-key in case you forget or lost it. This tool will not help if you have no clue about the passphrase!",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "gpgme",
                        "pth"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "name-that-hash",
            "portdir": "security/name-that-hash",
            "version": "1.10.0",
            "license": "GPL-3",
            "platforms": "{darwin any}",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://nth.skerritt.blog",
            "description": "The Modern Hash Identification System",
            "long_description": "Don't know what type of hash it is? Name That Hash will name that hash type! Identify MD5, SHA256 and 3000+ other hashes.",
            "active": true,
            "categories": [
                "security",
                "python"
            ],
            "maintainers": [
                {
                    "name": "harensdeveloper",
                    "github": "harens",
                    "ports_count": 39
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18",
                        "py314-build",
                        "py314-installer",
                        "py314-poetry-core"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "python314"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "py314-click",
                        "py314-rich"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "run",
                    "ports": [
                        "search-that-hash"
                    ]
                }
            ]
        },
        {
            "name": "murk",
            "portdir": "security/murk",
            "version": "0.3",
            "license": "BSD-old",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://murk.sourceforge.net/",
            "description": "rsync friendly encryption tool",
            "long_description": "rsync friendly encryption that runs on the unix command line. Encrypt a file and backup the changes to an untrusted host.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "ctags",
                        "clang-9.0"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "bzip2",
                        "openssl10"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "mkcert",
            "portdir": "security/mkcert",
            "version": "1.4.4",
            "license": "BSD",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/FiloSottile/mkcert",
            "description": "A simple zero-config tool to make locally trusted development certificates with any names you'd like",
            "long_description": "mkcert is a simple tool for making locally-trusted development certificates. It requires no configuration. Using certificates from real certificate authorities (CAs) for development can be dangerous or impossible (for hosts like localhost or 127.0.0.1), but self-signed certificates cause trust errors. Managing your own CA is the best solution, but usually involves arcane commands, specialized knowledge and manual steps. mkcert automatically creates and installs a local CA in the system root store, and generates locally-trusted certificates.",
            "active": true,
            "categories": [
                "devel",
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1023
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-17"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "run",
                    "ports": [
                        "ddev"
                    ]
                }
            ]
        },
        {
            "name": "minisign",
            "portdir": "security/minisign",
            "version": "0.12",
            "license": "ISC",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://jedisct1.github.io/minisign/",
            "description": "a dead simple tool to sign files and verify digital signatures",
            "long_description": "Minisign is a dead simple tool to sign files and verify digital signatures.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "l2dy",
                    "github": "l2dy",
                    "ports_count": 97
                }
            ],
            "variants": [
                "debug",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "cmake",
                        "pkgconfig",
                        "clang-17"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "libsodium"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "mfa",
            "portdir": "security/mfa",
            "version": "20210617",
            "license": "MIT",
            "platforms": "darwin freebsd linux",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/k-saiki/mfa",
            "description": "Generate TOTP(Time-based One-time Password) token with CLI.",
            "long_description": "Generate TOTP(Time-based One-time Password) token with CLI.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "herby.gillot",
                    "github": "herbygillot",
                    "ports_count": 1023
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "go",
                        "clang-17"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "metasploit3",
            "portdir": "security/metasploit3",
            "version": "3.0",
            "license": "unknown",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://metasploit.com/",
            "description": "Tools and information for security research and pentesting",
            "long_description": "The Metasploit Project goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This framework was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information are provided for legal security research and testing purposes only.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-9.0"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "readline",
                        "ruby",
                        "rb-rails"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "metasploit2",
            "portdir": "security/metasploit2",
            "version": "2.7",
            "license": "(Artistic-1 or GPL-2) and GPL-2+ and APSL-1.1 and Noncommercial and Restrictive",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://metasploit.com/",
            "description": "Tools and information for security research and pentesting",
            "long_description": "The Metasploit Project goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This framework was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information are provided for legal security research and testing purposes only.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-14"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "perl5.34",
                        "p5.34-net-ssleay",
                        "p5.34-term-readline-gnu"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "medusa",
            "portdir": "security/medusa",
            "version": "2.2",
            "license": "(GPL-2 or OpenSSLException)",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.foofus.net/~jmk/medusa/medusa.html",
            "description": "speedy, massively parallel, modular, login brute-forcer",
            "long_description": "Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application. Thread-based parallel testing: Brute-force testing can be performed against multiple hosts, users or passwords concurrently. Flexible user input: Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing. Modular design: Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.",
            "active": true,
            "categories": [
                "net",
                "security"
            ],
            "maintainers": [
                {
                    "name": "normen",
                    "github": "Gminfly",
                    "ports_count": 11
                }
            ],
            "variants": [
                "subversion",
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-16",
                        "automake",
                        "libtool",
                        "pkgconfig",
                        "autoconf"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "openssl10",
                        "subversion",
                        "libssh2"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "md5deep",
            "portdir": "security/md5deep",
            "version": "4.4",
            "license": "public-domain and GPL-2+ and LGPL-2.1+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/jessek/hashdeep",
            "description": "Recursively compute digests on files/directories",
            "long_description": "md5deep and hashdeep are a cross-platform set of programs to recursively compute MD5, SHA-1, or SHA-256 message digests on an arbitrary number of files.",
            "active": true,
            "categories": [
                "sysutils",
                "security"
            ],
            "maintainers": [],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "autoconf",
                        "automake",
                        "libtool",
                        "clang-17"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "makepasswd",
            "portdir": "security/makepasswd",
            "version": "1.10-13",
            "license": "GPL-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://packages.debian.org/stable/source/makepasswd",
            "description": "generate and encrypt passwords",
            "long_description": "A port of Rob Levin's makepasswd tool.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "perl5_28",
                "perl5_30",
                "perl5_32",
                "perl5_34"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-14"
                    ]
                },
                {
                    "type": "extract",
                    "ports": [
                        "xz"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "perl5.34"
                    ]
                },
                {
                    "type": "run",
                    "ports": [
                        "p5.34-bytes-random-secure",
                        "p5.34-crypt-passwdmd5",
                        "p5.34-getopt-long"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "lynis",
            "portdir": "security/lynis",
            "version": "3.1.6",
            "license": "GPL-3",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://cisofy.com/lynis/",
            "description": "Security and system auditing tool to harden systems",
            "long_description": "Lynis is a battle-tested security tool for systems running Linux, macOS, or Unix-based operating system. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open source software with the GPL license and available since 2007.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "newtonne.github",
                    "github": "newtonne",
                    "ports_count": 5
                }
            ],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "logwatch",
            "portdir": "security/logwatch",
            "version": "7.14",
            "license": "MIT",
            "platforms": "any",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://logwatch.sourceforge.net",
            "description": "system log analyzer and reporter",
            "long_description": "Logwatch is a customizable log analysis system. Logwatch parses through your system's logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require. Logwatch is easy to use and will work right out of the package on most systems.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "khindenburg",
                    "github": "kurthindenburg",
                    "ports_count": 433
                }
            ],
            "variants": [
                "perl5_30",
                "perl5_32",
                "perl5_34",
                "perl5_36",
                "perl5_38"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-18"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "perl5.34",
                        "p5.34-html-parser"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "logsurfer",
            "portdir": "security/logsurfer",
            "version": "1.6b",
            "license": "GPL-2+",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://www.crypt.gen.nz/logsurfer/",
            "description": "monitors system logs in real-time and reports on the occurrence of events",
            "long_description": "similar to the well-known swatch program on which it is based, but offers a number of advanced features which swatch does not support. Logsurfer is capable of grouping related log entries together - for instance, when a system boots it usually creates a high number of log messages.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "mat",
                    "github": "",
                    "ports_count": 1
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-9.0"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "logsentry",
            "portdir": "security/logsentry",
            "version": "1.1.1",
            "license": "GPL-2",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "http://sourceforge.net/projects/sentrytools",
            "description": "logfile auditing tool (previously logcheck)",
            "long_description": "Logsentry is a scheduled auditing tool that scans system log files for security violations and unusual activity. Reports of suspicious log entries are mailed to a specified user (usually root). Logsentry was formerly known as logcheck.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-9.0"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "log2timeline",
            "portdir": "security/log2timeline",
            "version": "0.65",
            "license": "GPL-3+",
            "platforms": "{darwin any}",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://code.google.com/archive/p/log2timeline/",
            "description": "framework for automatic creation of a super timeline",
            "long_description": "log2timeline provides a single tool to parse various log files and artifacts found on suspect systems (and supporting systems, such as network equipment) and produces a timeline that can be analysed by forensic investigators/analysts.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [],
            "variants": [
                "perl5_30",
                "perl5_32",
                "perl5_28",
                "perl5_34"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "clang-16"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "p5.34-archive-zip",
                        "p5.34-carp-assert",
                        "p5.34-data-hexify",
                        "p5.34-date-manip",
                        "p5.34-datetime-format-strptime",
                        "p5.34-datetime-timezone",
                        "p5.34-dbd-sqlite",
                        "p5.34-dbi",
                        "p5.34-digest-crc",
                        "p5.34-file-mork",
                        "p5.34-gtk2",
                        "perl5.34",
                        "p5.34-html-scrubber",
                        "p5.34-image-exiftool",
                        "p5.34-libwww-perl",
                        "p5.34-mac-propertylist",
                        "p5.34-net-pcap",
                        "p5.34-netpacket",
                        "p5.34-params-validate",
                        "p5.34-parse-win32registry",
                        "p5.34-version",
                        "p5.34-xml-entities",
                        "p5.34-xml-libxml",
                        "p5.34-html-parser"
                    ]
                }
            ],
            "depends_on": []
        },
        {
            "name": "libyubikey",
            "portdir": "security/libyubikey",
            "version": "1.13",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://github.com/Yubico/yubico-c",
            "description": "Low-level library for decrypting and parsing Yubikey One-Time Passwords (OTP) in C.",
            "long_description": "Low-level library for decrypting and parsing Yubikey One-Time Passwords (OTP) in C.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "snc",
                    "github": "nerdling",
                    "ports_count": 157
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "autoconf",
                        "automake",
                        "libtool",
                        "asciidoc",
                        "docbook-xsl-nons",
                        "libxslt",
                        "clang-17"
                    ]
                }
            ],
            "depends_on": [
                {
                    "type": "lib",
                    "ports": [
                        "yubico-c-client",
                        "ykpers"
                    ]
                }
            ]
        },
        {
            "name": "libu2f-server",
            "portdir": "security/libu2f-server",
            "version": "1.1.0",
            "license": "BSD",
            "platforms": "darwin",
            "epoch": 0,
            "replaced_by": null,
            "homepage": "https://developers.yubico.com/libu2f-server/",
            "description": "Yubico Universal 2nd Factor (U2F) Server C Library",
            "long_description": "This is a C library that implements the server-side of the U2F protocol. More precisely, it provides an API for generating the JSON blobs required by U2F devices to perform the U2F Registration and U2F Authentication operations, and functionality for verifying the cryptographic operations.",
            "active": true,
            "categories": [
                "security"
            ],
            "maintainers": [
                {
                    "name": "l2dy",
                    "github": "l2dy",
                    "ports_count": 97
                }
            ],
            "variants": [
                "universal"
            ],
            "dependencies": [
                {
                    "type": "build",
                    "ports": [
                        "help2man",
                        "gengetopt",
                        "pkgconfig",
                        "clang-9.0",
                        "check"
                    ]
                },
                {
                    "type": "extract",
                    "ports": [
                        "xz"
                    ]
                },
                {
                    "type": "lib",
                    "ports": [
                        "json-c",
                        "openssl"
                    ]
                }
            ],
            "depends_on": []
        }
    ]
}