Update of /cvsroot/fink/dists/10.2/unstable/crypto/finkinfo
In directory usw-pr-cvs1:/tmp/cvs-serv30219
Added Files:
stunnel-egd-3.22-1.info
Log Message:
ready for 10.2
--- NEW FILE: stunnel-egd-3.22-1.info ---
Package: stunnel-egd
Version: 3.22
Revision: 1
Maintainer: Thomas Diemer <[EMAIL PROTECTED]>
Depends: egd, openssl
BuildDepends: openssl-dev
Conflicts: stunnel
Replaces: stunnel
Source: http://www.stunnel.org/download/stunnel/src/stunnel-%v.tar.gz
CompileScript: <<
./configure %c
make stunnel
<<
ConfigureParams: --with-ssl=%p --with-egd-socket=/tmp/egdsocket
--with-pem-dir=%p/var/stunnel
InstallScript: <<
mkdir -p %i/sbin
mkdir -p %i/var/stunnel
mkdir -p %i/share/man/man8
chmod a=rwx,+t %i/var/stunnel
install -c -m 711 stunnel %i/sbin
install -c -m 644 stunnel.8 %i/share/man/man8
<<
DocFiles: BUGS COPY* CREDITS FAQ HISTORY PORTS README TODO *.html
Description: Tool to encrypt TCP connections
DescDetail: <<
Allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer). It
can
allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, LDAP, etc) by
having
it provide the encryption, requiring no changes to the daemon's code.
<<
DescUsage: <<
To use stunnel you first need to start the egd telling it to output random numbers in
an
socket-file: /tmp/egdsocket. use: /sw/bin/egd.pl /tmp/egdsocket to do this.
If you want to use stunnel to secure services you need an .pem file. To have it
seperated
from the openssl files it is stored in /sw/var/stunnel. You can easily create it using
openssl.
e.g. /sw/bin/openssl req -rand /tmp/egdsocket -new -x509 -days 365 -nodes -out
/sw/var/stunnel/stunnel.pem -keyout /sw/var/stunnel/stunnel.pem
then /sw/bin/openssl x509 -subject -dates -fingerprint -noout -in
/sw/var/stunnel/stunnel.pem
Note that before creating the privat key you must run /sw/bin/egd.pl /tmp/egdsocket to
get
enough random bytes.
<<
DescPort: <<
Needs to be compiled with an path to an egd socket file because there is no
/dev/*random in MacOSX 10.0.x. If you have Mac OSX.1 you should consider not using
stunnel-egd.
I used /tmp/egdsocket.
To avoid interactivity in the install process there must be no .pem file created.
This has to be done later if stunnel is meant to be used secure services, could
be needed in some cases stunnel is used as client.
<<
License: GPL
Homepage: http://www.stunnel.org
-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Fink-commits mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/fink-commits