head 1.24; access; symbols pkgsrc-2023Q4:1.24.0.32 pkgsrc-2023Q4-base:1.24 pkgsrc-2023Q3:1.24.0.30 pkgsrc-2023Q3-base:1.24 pkgsrc-2023Q2:1.24.0.28 pkgsrc-2023Q2-base:1.24 pkgsrc-2023Q1:1.24.0.26 pkgsrc-2023Q1-base:1.24 pkgsrc-2022Q4:1.24.0.24 pkgsrc-2022Q4-base:1.24 pkgsrc-2022Q3:1.24.0.22 pkgsrc-2022Q3-base:1.24 pkgsrc-2022Q2:1.24.0.20 pkgsrc-2022Q2-base:1.24 pkgsrc-2022Q1:1.24.0.18 pkgsrc-2022Q1-base:1.24 pkgsrc-2021Q4:1.24.0.16 pkgsrc-2021Q4-base:1.24 pkgsrc-2021Q3:1.24.0.14 pkgsrc-2021Q3-base:1.24 pkgsrc-2021Q2:1.24.0.12 pkgsrc-2021Q2-base:1.24 pkgsrc-2021Q1:1.24.0.10 pkgsrc-2021Q1-base:1.24 pkgsrc-2020Q4:1.24.0.8 pkgsrc-2020Q4-base:1.24 pkgsrc-2020Q3:1.24.0.6 pkgsrc-2020Q3-base:1.24 pkgsrc-2020Q2:1.24.0.4 pkgsrc-2020Q2-base:1.24 pkgsrc-2020Q1:1.24.0.2 pkgsrc-2020Q1-base:1.24 pkgsrc-2019Q4:1.23.0.26 pkgsrc-2019Q4-base:1.23 pkgsrc-2019Q3:1.23.0.22 pkgsrc-2019Q3-base:1.23 pkgsrc-2019Q2:1.23.0.20 pkgsrc-2019Q2-base:1.23 pkgsrc-2019Q1:1.23.0.18 pkgsrc-2019Q1-base:1.23 pkgsrc-2018Q4:1.23.0.16 pkgsrc-2018Q4-base:1.23 pkgsrc-2018Q3:1.23.0.14 pkgsrc-2018Q3-base:1.23 pkgsrc-2018Q2:1.23.0.12 pkgsrc-2018Q2-base:1.23 pkgsrc-2018Q1:1.23.0.10 pkgsrc-2018Q1-base:1.23 pkgsrc-2017Q4:1.23.0.8 pkgsrc-2017Q4-base:1.23 pkgsrc-2017Q3:1.23.0.6 pkgsrc-2017Q3-base:1.23 pkgsrc-2017Q2:1.23.0.2 pkgsrc-2017Q2-base:1.23 pkgsrc-2017Q1:1.22.0.2 pkgsrc-2017Q1-base:1.22 pkgsrc-2016Q4:1.21.0.34 pkgsrc-2016Q4-base:1.21 pkgsrc-2016Q3:1.21.0.32 pkgsrc-2016Q3-base:1.21 pkgsrc-2016Q2:1.21.0.30 pkgsrc-2016Q2-base:1.21 pkgsrc-2016Q1:1.21.0.28 pkgsrc-2016Q1-base:1.21 pkgsrc-2015Q4:1.21.0.26 pkgsrc-2015Q4-base:1.21 pkgsrc-2015Q3:1.21.0.24 pkgsrc-2015Q3-base:1.21 pkgsrc-2015Q2:1.21.0.22 pkgsrc-2015Q2-base:1.21 pkgsrc-2015Q1:1.21.0.20 pkgsrc-2015Q1-base:1.21 pkgsrc-2014Q4:1.21.0.18 pkgsrc-2014Q4-base:1.21 pkgsrc-2014Q3:1.21.0.16 pkgsrc-2014Q3-base:1.21 pkgsrc-2014Q2:1.21.0.14 pkgsrc-2014Q2-base:1.21 pkgsrc-2014Q1:1.21.0.12 pkgsrc-2014Q1-base:1.21 pkgsrc-2013Q4:1.21.0.10 pkgsrc-2013Q4-base:1.21 pkgsrc-2013Q3:1.21.0.8 pkgsrc-2013Q3-base:1.21 pkgsrc-2013Q2:1.21.0.6 pkgsrc-2013Q2-base:1.21 pkgsrc-2013Q1:1.21.0.4 pkgsrc-2013Q1-base:1.21 pkgsrc-2012Q4:1.21.0.2 pkgsrc-2012Q4-base:1.21 pkgsrc-2012Q3:1.20.0.8 pkgsrc-2012Q3-base:1.20 pkgsrc-2012Q2:1.20.0.6 pkgsrc-2012Q2-base:1.20 pkgsrc-2012Q1:1.20.0.4 pkgsrc-2012Q1-base:1.20 pkgsrc-2011Q4:1.20.0.2 pkgsrc-2011Q4-base:1.20 pkgsrc-2011Q3:1.19.0.14 pkgsrc-2011Q3-base:1.19 pkgsrc-2011Q2:1.19.0.12 pkgsrc-2011Q2-base:1.19 pkgsrc-2011Q1:1.19.0.10 pkgsrc-2011Q1-base:1.19 pkgsrc-2010Q4:1.19.0.8 pkgsrc-2010Q4-base:1.19 pkgsrc-2010Q3:1.19.0.6 pkgsrc-2010Q3-base:1.19 pkgsrc-2010Q2:1.19.0.4 pkgsrc-2010Q2-base:1.19 pkgsrc-2010Q1:1.19.0.2 pkgsrc-2010Q1-base:1.19 pkgsrc-2009Q4:1.17.0.14 pkgsrc-2009Q4-base:1.17 pkgsrc-2009Q3:1.17.0.12 pkgsrc-2009Q3-base:1.17 pkgsrc-2009Q2:1.17.0.10 pkgsrc-2009Q2-base:1.17 pkgsrc-2009Q1:1.17.0.8 pkgsrc-2009Q1-base:1.17 pkgsrc-2008Q4:1.17.0.6 pkgsrc-2008Q4-base:1.17 pkgsrc-2008Q3:1.17.0.4 pkgsrc-2008Q3-base:1.17 cube-native-xorg:1.17.0.2 cube-native-xorg-base:1.17 pkgsrc-2008Q2:1.16.0.14 pkgsrc-2008Q2-base:1.16 cwrapper:1.16.0.12 pkgsrc-2008Q1:1.16.0.10 pkgsrc-2008Q1-base:1.16 pkgsrc-2007Q4:1.16.0.8 pkgsrc-2007Q4-base:1.16 pkgsrc-2007Q3:1.16.0.6 pkgsrc-2007Q3-base:1.16 pkgsrc-2007Q2:1.16.0.4 pkgsrc-2007Q2-base:1.16 pkgsrc-2007Q1:1.16.0.2 pkgsrc-2007Q1-base:1.16 pkgsrc-2006Q4:1.14.0.6 pkgsrc-2006Q4-base:1.14 pkgsrc-2006Q3:1.14.0.4 pkgsrc-2006Q3-base:1.14 pkgsrc-2006Q2:1.14.0.2 pkgsrc-2006Q2-base:1.14 pkgsrc-2006Q1:1.12.0.2 pkgsrc-2006Q1-base:1.12 pkgsrc-2005Q4:1.9.0.6 pkgsrc-2005Q4-base:1.9 pkgsrc-2005Q3:1.9.0.4 pkgsrc-2005Q3-base:1.9 pkgsrc-2005Q2:1.9.0.2 pkgsrc-2005Q2-base:1.9 pkgsrc-2005Q1:1.5.0.4 pkgsrc-2005Q1-base:1.5 pkgsrc-2004Q4:1.5.0.2 pkgsrc-2004Q4-base:1.5 pkgsrc-2004Q3:1.4.0.4 pkgsrc-2004Q3-base:1.4 pkgsrc-2004Q2:1.4.0.2 pkgsrc-2004Q2-base:1.4 pkgsrc-2004Q1:1.3.0.2 pkgsrc-2004Q1-base:1.3 pkgsrc_base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.24 date 2020.01.26.17.32.04; author rillig; state Exp; branches; next 1.23; commitid 4fBBvoSLJaGd0eUB; 1.23 date 2017.05.10.10.45.26; author jperkin; state Exp; branches; next 1.22; commitid fc1fC7isRA5cCPQz; 1.22 date 2017.01.19.18.52.24; author agc; state Exp; branches; next 1.21; commitid ufZDMu4cgHZdRBCz; 1.21 date 2012.10.23.18.16.35; author asau; state Exp; branches; next 1.20; 1.20 date 2011.12.16.12.54.41; author drochner; state Exp; branches; next 1.19; 1.19 date 2010.03.24.19.43.28; author asau; state Exp; branches; next 1.18; 1.18 date 2010.03.13.04.40.12; author obache; state Exp; branches; next 1.17; 1.17 date 2008.08.17.05.32.12; author dholland; state Exp; branches; next 1.16; 1.16 date 2007.04.01.21.26.48; author wiz; state Exp; branches; next 1.15; 1.15 date 2007.02.15.21.23.55; author rillig; state Exp; branches; next 1.14; 1.14 date 2006.06.16.18.43.18; author jlam; state Exp; branches; next 1.13; 1.13 date 2006.04.05.23.59.33; author salo; state Exp; branches; next 1.12; 1.12 date 2006.03.04.21.30.34; author jlam; state Exp; branches 1.12.2.1; next 1.11; 1.11 date 2006.02.05.23.10.45; author joerg; state Exp; branches; next 1.10; 1.10 date 2005.12.27.22.28.33; author reed; state Exp; branches; next 1.9; 1.9 date 2005.05.22.20.08.30; author jlam; state Exp; branches; next 1.8; 1.8 date 2005.04.30.12.23.42; author drochner; state Exp; branches; next 1.7; 1.7 date 2005.04.28.14.10.04; author wiz; state Exp; branches; next 1.6; 1.6 date 2005.04.11.21.47.13; author tv; state Exp; branches; next 1.5; 1.5 date 2004.10.03.00.18.10; author tv; state Exp; branches 1.5.4.1; next 1.4; 1.4 date 2004.04.25.03.47.56; author snj; state Exp; branches; next 1.3; 1.3 date 2004.02.14.22.41.17; author grant; state Exp; branches; next 1.2; 1.2 date 2004.02.14.15.10.27; author uebayasi; state Exp; branches; next 1.1; 1.1 date 2004.01.12.15.55.11; author drochner; state Exp; branches 1.1.1.1; next ; 1.12.2.1 date 2006.04.06.00.47.01; author snj; state Exp; branches; next ; 1.5.4.1 date 2005.05.12.22.36.02; author snj; state Exp; branches; next ; 1.1.1.1 date 2004.01.12.15.55.11; author drochner; state Exp; branches; next ; desc @@ 1.24 log @all: migrate homepages from http to https pkglint -r --network --only "migrate" As a side-effect of migrating the homepages, pkglint also fixed a few indentations in unrelated lines. These and the new homepages have been checked manually. @ text @# $NetBSD: Makefile,v 1.23 2017/05/10 10:45:26 jperkin Exp $ # DISTNAME= lsh-2.0.4 PKGREVISION= 2 CATEGORIES= security MASTER_SITES= http://www.lysator.liu.se/~nisse/archive/ MASTER_SITES+= ftp://ftp.lysator.liu.se/pub/security/lsh/ MAINTAINER= pkgsrc-users@@NetBSD.org HOMEPAGE= https://www.lysator.liu.se/~nisse/lsh/ COMMENT= SSH2 client/server LICENSE= gnu-gpl-v2 GNU_CONFIGURE= yes USE_TOOLS+= gmake gm4 bash:run REPLACE_BASH+= src/lcp CONFIGURE_ARGS+= --disable-openssl --disable-pam --disable-kerberos INFO_FILES= yes # lcp test depends on /bin/bash and thus fails, others work TEST_TARGET= check # man/man8/sftp-server.8 CONFLICTS+= openssh-[0-9]* openssh+gssapi-[0-9]* # src/nettle/examples/nettle-openssl.c needs des_key* USE_OLD_DES_API= yes .include "../../devel/argp/buildlink3.mk" .include "../../devel/gmp/buildlink3.mk" .include "../../devel/liboop/buildlink3.mk" .include "../../devel/zlib/buildlink3.mk" .include "../../mk/termcap.buildlink3.mk" .include "../../mk/bsd.pkg.mk" @ 1.23 log @Requires termcap. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.22 2017/01/19 18:52:24 agc Exp $ d11 1 a11 1 HOMEPAGE= http://www.lysator.liu.se/~nisse/lsh/ @ 1.22 log @Convert all occurrences (353 by my count) of MASTER_SITES= site1 \ site2 style continuation lines to be simple repeated MASTER_SITES+= site1 MASTER_SITES+= site2 lines. As previewed on tech-pkg. With thanks to rillig for fixing pkglint accordingly. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.21 2012/10/23 18:16:35 asau Exp $ d34 1 @ 1.21 log @Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.20 2011/12/16 12:54:41 drochner Exp $ d7 2 a8 2 MASTER_SITES= http://www.lysator.liu.se/~nisse/archive/ \ ftp://ftp.lysator.liu.se/pub/security/lsh/ @ 1.20 log @-explicitely disable kerberos support to avoid PLIST fluctuations (seen in bulk build) -fix obvious typo in asm code (fixes i386 build) -don't install nettle library to avoid conflict with pkgsrc/nettle bump PKGREV @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.19 2010/03/24 19:43:28 asau Exp $ a14 2 PKG_DESTDIR_SUPPORT= user-destdir @ 1.19 log @Recursive revision bump for GMP update. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.18 2010/03/13 04:40:12 obache Exp $ d5 1 a5 1 PKGREVISION= 1 d20 1 a20 1 CONFIGURE_ARGS+= --disable-openssl --disable-pam @ 1.18 log @Updte lsh to 2.0.4. While here, * set LICENSE=gnu-gpl-v2 * marked as user-destdir installation ready * switch to use system argp * add missing zlib buildlink News for the 2.0.4 release Fixed x11 forwarding bug in the lsh client. News for the 2.0.3 release At startup, lshd now tries to close any spurious open file descriptors. New test case for lshd fd leakage. lshd --daemonic --no-syslog now sets up a proper daemonic environment, except that log messages are still sent to stderr. Improved testing of this feature. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.17 2008/08/17 05:32:12 dholland Exp $ d5 1 @ 1.17 log @This installs a bash script. Handle it properly. PKGREVISION++ @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.16 2007/04/01 21:26:48 wiz Exp $ d4 1 a4 2 DISTNAME= lsh-2.0.2 PKGREVISION= 1 d6 2 a7 1 MASTER_SITES= http://www.lysator.liu.se/~nisse/archive/ d12 3 d31 1 d34 1 @ 1.16 log @Upgrade lsh to version 2 (from lsh2) and remove lsh2. No disagreement on pkgsrc-users. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.9 2006/04/07 15:28:49 jlam Exp $ d5 1 d14 2 a15 1 USE_TOOLS+= gmake gm4 @ 1.15 log @This package has info files. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.14 2006/06/16 18:43:18 jlam Exp $ d4 1 a4 2 DISTNAME= lsh-1.4.3 PKGREVISION= 5 d6 1 a6 1 MASTER_SITES= ftp://ftp.lysator.liu.se/pub/security/lsh/ d10 1 a10 1 COMMENT= SSH2 client/server (version 1 of lsh) d13 2 a14 1 USE_TOOLS+= gmake d17 8 a24 1 .include "options.mk" a27 2 .include "../../devel/zlib/buildlink3.mk" @ 1.14 log @Support checking passwords using either Kerberos or PAM via PKG_OPTIONS. This fixes the PLIST on systems that have PAM natively. Bump the PKGREVISION to 5. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.13 2006/04/05 23:59:33 salo Exp $ d15 1 @ 1.13 log @Backport fix for CVE-2006-0353 from lsh2: "unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys." http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0353 @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.12 2006/03/04 21:30:34 jlam Exp $ d5 1 a5 1 PKGREVISION= 4 d16 2 d20 2 @ 1.12 log @Point MAINTAINER to pkgsrc-users@@NetBSD.org in the case where no developer is officially maintaining the package. The rationale for changing this from "tech-pkg" to "pkgsrc-users" is that it implies that any user can try to maintain the package (by submitting patches to the mailing list). Since the folks most likely to care about the package are the folks that want to use it or are already using it, this would leverage the energy of users who aren't developers. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.11 2006/02/05 23:10:45 joerg Exp $ d5 1 a5 1 PKGREVISION= 3 @ 1.12.2.1 log @Pullup ticket 1329 - requested by salo security fix for lsh Revisions pulled up: - pkgsrc/security/lsh/Makefile 1.13 - pkgsrc/security/lsh/distinfo 1.5 - pkgsrc/security/lsh/patches/patch-ad 1.1 Module Name: pkgsrc Committed By: salo Date: Wed Apr 5 23:59:33 UTC 2006 Modified Files: pkgsrc/security/lsh: Makefile distinfo Added Files: pkgsrc/security/lsh/patches: patch-ad Log Message: Backport fix for CVE-2006-0353 from lsh2: "unix_random.c in lshd for lsh 2.0.1 leaks file descriptors related to the randomness generator, which allows local users to cause a denial of service by truncating the seed file, which prevents the server from starting, or obtain sensitive seed information that could be used to crack keys." @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.13 2006/04/05 23:59:33 salo Exp $ d5 1 a5 1 PKGREVISION= 4 @ 1.11 log @Recursive revision bump / recommended bump for gettext ABI change. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.10 2005/12/27 22:28:33 reed Exp $ d9 1 a9 1 MAINTAINER= tech-pkg@@NetBSD.org @ 1.10 log @Mention this is version 1 in the COMMENT. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.9 2005/05/22 20:08:30 jlam Exp $ d5 1 a5 1 PKGREVISION= 2 @ 1.9 log @Remove USE_GNU_TOOLS and replace with the correct USE_TOOLS definitions: USE_GNU_TOOLS -> USE_TOOLS awk -> gawk m4 -> gm4 make -> gmake sed -> gsed yacc -> bison @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.8 2005/04/30 12:23:42 drochner Exp $ d11 1 a11 1 COMMENT= ssh2 client/server @ 1.8 log @Move the freshly update lsh-2.0.1 into a separate pkg and leave security/lsh at 1.4.3. lsh-2.0.1 has interoperability problems with openssh servers (always gets "Invalid server signature" errors). lsh-1.4.3 is not affected by CAN-2003-0826. Add a patch to address CAN-2005-0814 and bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.6 2005/04/11 21:47:13 tv Exp $ d14 1 a14 1 USE_GNU_TOOLS+= make @ 1.7 log @Update to 2.0.1: News for the 2.0.1 release Fixed denial of service bug in lshd. Fixed a bug in lsh-make-seed, which could make the program go into an infinite loop on read errors. lsh now asks for passwords also in quite (-q) mode, as described in the manual. Control character filtering used to sometimes consider newline as a dangerous control character. Now newlines should be displayed normally. Removed support for the non-standard alias "diffie-hellman-group2-sha1". The standardized name is for this key exchange method is "diffie-hellman-group14-sha1". News for the 2.0 release Several programs have new default behaviour: * lshd enables X11 forwarding by default (lsh still does not). * lsh-keygen generates RSA rather than DSA keys by default. * lsh-writekey encrypts the private key by default, using aes256-cbc. Unless the --server flag is used. Improved the lcp script. It is now installed by default. Implemented the client side of "keyboard-interactive" user authentication. Support keyexchange with diffie-hellman-group14-sha1/diffie-hellman-group2-sha1 (the standardized name is at the moment not decided). Fixes to the utf8 encoder, and in particular interactions between utf8 and control character filtering. News for the 1.5.5 release Added SOCKS-style proxying to lsh and lshg. See the new -D command line option. Supports both SOCKS-4 and SOCKS-5. The lsh client no longer sets its stdio file descriptors into non-blocking mode, which should avoid a bunch of problems. As a consequence, the --cvs-workaround command line option has been deleted. In the user lookup code, lshd now ignores the shadow database if getspnam returns NULL. In the server pty setup code, use the group "system" as a fallback if the group "tty" doesn't exist. This is the case on AIX. (There are however more problems on AIX, which makes it uncertain that lshd will work out of the box). Deleted the --ssh1-fallback option for lshd. I hope ssh1 is dead by now; if it isn't, you have to run ssh1d and lshd on different ports. Deleted code for bug-compatibility with ancient versions of Datafellow's SSH2. There are zero bug-compatibility hacks in this version. News for the 1.5.4 release Added logging of tcpip-forward requests. Includes nettle-1.9, which have had some portability fixes and optimizations. In particular, arcfour on x86 should be much faster. Implemented flow control on the raw ssh connection. Enforce limits on the amount of buffered data waiting to be written to the socket. Moved all destructive string operations to a separate file lsh_string.c, which has exclusive rights of accessing string internals. Should make the code more robust, as buffer size and index calculations elsewhere in the code should hit an assert in lsh_string.c before doing damage. Some general simplification and cleanup of the code. News for the 1.5.3 release Fixed heap buffer overrun with potential remote root compromise. Initial bug report by Bennett Todd. Fixed a similar bug in the check for channel number allocation failure in the handling of channel_open, and in the experimental client SRP code. lshd now has an experimental mode similar to telnet, where it accepts the 'none' authentication method and automatically disables services such as X and TCP forwarding. This can be useful in environment where it's required that /bin/login or some other program handle authentication and session setup (e.g. handle security contexts and so on). News for the 1.5.2 release Encrypted private keys works again. New client escape sequence RET ~ ?, which lists all available escape sequences. Also fixed the werror functions so that they use \r\n to terminate lines when writing to a tty in raw mode. Implemented handling of multiple --interface options to lshd. As a side effect, The -p option must now be given before --interface to have any effect. Connecting to machines with multiple IP-adresses is smarter, it connects to a few addresses at a time, in parallel. Fixed a file descriptor leak in the server tcpip forwarding code. Lots of portability fixes. News for the 1.5.1 release Incompatible change to key format, to comply with the current spki structure draft. You can use the script lsh-upgrade to copy and convert the information in the old .lsh/known-hosts to the new file .lsh/host-acls. The new code uses libspki. Fixed IPv6 bug reported by Simon Kowallik. lshd now does the equivalence of ulimit -n unlimited, this is inherited by processes started upon client requests. If you don't want this, you should use /etc/{profile,login,whatever} to set limits for your users. Do note that PAM-based solutions will NOT work as PAM is used from a separate process that terminates as soon as the authentication is finished (this of course goes for environment variables too). lsh and and lshg now parses options from LSHFLAGS and LSHGFLAGS, these are parsed before and can be overridden by the command line. News for the 1.5 release Implemented the server side of X11 forwarding. Try lshd --x11-forward. There's one known bug: The server may start sending data on the session channel (typically your first shell prompt) before it has sent the reply to the client's "shell" or "exec" request. lsh will complain about, and ignore that data. As part of the X11 hacking, the socket code have been reorganized. Deleted one of the ipv6 configure tests. Now lsh will happily build ipv6 support even if ipv6 is not available at run-time on the build machine. Fixed bug preventing -c none from working. Another bug fix, call setsid even in the non-pty case. Various bug fixes. @ text @d4 2 a5 1 DISTNAME= lsh-2.0.1 d11 1 a11 1 COMMENT= SSH2 client/server a15 8 # man/man8/sftp-server.8 CONFLICTS+= openssh-[0-9]* openssh+gssapi-[0-9]* # src/nettle/examples/nettle-openssl.c needs des_key* USE_OLD_DES_API= yes INFO_FILES= lsh.info nettle.info a17 1 .include "../../security/openssl/buildlink3.mk" @ 1.6 log @Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.5 2004/10/03 00:18:10 tv Exp $ d4 1 a4 2 DISTNAME= lsh-1.4.3 PKGREVISION= 1 d10 1 a10 1 COMMENT= ssh2 client/server d15 8 d25 1 @ 1.5 log @Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10 in the process. (More information on tech-pkg.) Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and installing .la files. Bump PKGREVISION (only) of all packages depending directly on the above via a buildlink3 include. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.4 2004/04/25 03:47:56 snj Exp $ a12 1 USE_BUILDLINK3= yes @ 1.5.4.1 log @Pullup ticket 492 - requested by Lubomir Sedlacik security fix for lsh Revisions pulled up: - pkgsrc/security/lsh/Makefile 1.8 - pkgsrc/security/lsh/distinfo 1.4 - pkgsrc/security/lsh/patches/patch-ac 1.1 Module Name: pkgsrc Committed By: drochner Date: Sat Apr 30 12:23:42 UTC 2005 Modified Files: pkgsrc/security/lsh: Makefile PLIST distinfo Added Files: pkgsrc/security/lsh/patches: patch-ac pkgsrc/security/lsh2: DESCR Makefile PLIST distinfo pkgsrc/security/lsh2/patches: patch-aa patch-ab Log Message: Move the freshly update lsh-2.0.1 into a separate pkg and leave security/lsh at 1.4.3. lsh-2.0.1 has interoperability problems with openssh servers (always gets "Invalid server signature" errors). lsh-1.4.3 is not affected by CAN-2003-0826. Add a patch to address CAN-2005-0814 and bump PKGREVISION. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.8 2005/04/30 12:23:42 drochner Exp $ d5 1 a5 1 PKGREVISION= 2 @ 1.4 log @Convert to buildlink3. @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.3 2004/02/14 22:41:17 grant Exp $ d5 1 @ 1.3 log @USE_GNU_TOOLS should be appended to with += @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.2 2004/02/14 15:10:27 uebayasi Exp $ d12 1 a12 1 USE_BUILDLINK2= yes d16 2 a17 2 .include "../../devel/gmp/buildlink2.mk" .include "../../devel/liboop/buildlink2.mk" @ 1.2 log @USE_GMAKE=yes -> USE_GNU_TOOLS=make @ text @d1 1 a1 1 # $NetBSD: Makefile,v 1.1.1.1 2004/01/12 15:55:11 drochner Exp $ d14 1 a14 1 USE_GNU_TOOLS= make @ 1.1 log @Initial revision @ text @d1 1 a1 1 # $NetBSD$ d14 1 a14 1 USE_GMAKE= yes @ 1.1.1.1 log @add a pkg for lsh-1.4.3, an alternative ssh2 client/server @ text @@