Package: libpam-ssh
Version: 1.91.0-6
Severity: wishlist
Tags: patch

For better readability, wrap your text to 80 columns under README.Debian

Patch attached.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-1-686
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages libpam-ssh depends on:
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libpam0g                    0.76-22      Pluggable Authentication Modules l
ii  libssl0.9.7                 0.9.7e-3     SSL shared libraries

-- no debconf information

-- 
Jesus Climent                                      info:www.pumuki.org
Unix SysAdm|Linux User #66350|Debian Developer|2.6.10|Helsinki Finland
GPG: 1024D/86946D69 BB64 2339 1CAA 7064 E429  7E18 66FC 1D7F 8694 6D69

Thank you for pressing the self destruct button.
                --[Computer] (Spaceballs)
--- README.Debian       2005-01-24 22:13:33.000000000 +0200
+++ /tmp/README.Debian  2005-02-06 22:04:56.000000000 +0200
@@ -17,10 +17,11 @@
 
 pam-ssh-auth must be included after @include common-auth.
 
-If you have more than one ssh key (with the same or empty passphrase), you 
have to link them
-to ~/.ssh/is_dsa{1,2,3} in order to make pam-ssh try to use them. Basically 
you could have
-four keys : ~/.ssh/is_dsa, ~/.ssh/is_dsa1 and so on.
+If you have more than one ssh key (with the same or empty passphrase), you have
+to link them to ~/.ssh/is_dsa{1,2,3} in order to make pam-ssh try to use them.
+Basically you could have four keys : ~/.ssh/is_dsa, ~/.ssh/is_dsa1 and so on.
 
-Theses keys are added automatically : id_dsa,id_rsa,identity,id_dsa1,id_dsa2 
and id_dsa3
+Theses keys are added automatically : id_dsa,id_rsa,identity,id_dsa1,id_dsa2
+and id_dsa3
 
  -- Aurelien Labrosse <[EMAIL PROTECTED]>, Sun, 15 Feb 2004 19:59:55 +0100

Reply via email to