Update of /cvsroot/fink/dists/10.2/unstable/crypto/finkinfo
In directory usw-pr-cvs1:/tmp/cvs-serv22069
Added Files:
openssh-3.5p1-1.info openssh-3.5p1-1.patch
Log Message:
new upstream version
--- NEW FILE: openssh-3.5p1-1.info ---
Package: openssh
Version: 3.5p1
Revision: 1
Maintainer: Max Horn <[EMAIL PROTECTED]>
Depends: daemonic (>= 20010902-1), openssl (>= 0.9.6c-1)
BuildDepends: openssl-dev, libxml2, gdbm, gmp, expat, tcltk-dev
Source: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%v.tar.gz
Source-MD5: 42bd78508d208b55843c84dd54dea848
Patch: %f.patch
ConfigureParams: --with-pid-dir=%p/var/run --sysconfdir=%p/etc/ssh
--mandir=%p/share/man --libexecdir=%p/lib --with-xauth=/usr/X11R6/bin/xauth
--with-default-path=%p/bin:/usr/bin:/bin:%p/sbin:/usr/sbin:/sbin:/usr/X11R6/bin
--with-md5-passwords
InstallScript: <<
make install DESTDIR=%d
sed 's/^X11Forwarding.*/X11Forwarding yes/' <%i/etc/ssh/sshd_config
>%i/etc/ssh/sshd_config.tmp
mv -f %i/etc/ssh/sshd_config.tmp %i/etc/ssh/sshd_config
<<
DocFiles: README LICENCE CREDITS WARNING.RNG
ConfFiles: %p/etc/ssh/ssh_config %p/etc/ssh/sshd_config
#
DaemonicName: ssh
DaemonicFile: <<
<service>
<description>SSH secure login server</description>
<message>OpenSSH secure login server</message>
<daemon name="sshd">
<executable background="yes">%p/sbin/sshd</executable>
<!-- the daemon will background itself, but may take a while
to start up to the point where it does so -->
<prerun>
if [ ! -f "%p/etc/ssh/ssh_host_key" ]; then
%p/bin/ssh-keygen -t rsa1 -f %p/etc/ssh/ssh_host_key -N "" -C `hostname`
fi
if [ ! -f %p/etc/ssh/ssh_host_dsa_key ]; then
%p/bin/ssh-keygen -t dsa -f %p/etc/ssh/ssh_host_dsa_key -N "" -C `hostname`
fi
if [ ! -f %p/etc/ssh/ssh_host_rsa_key ]; then
%p/bin/ssh-keygen -t rsa -f %p/etc/ssh/ssh_host_rsa_key -N "" -C `hostname`
fi
</prerun>
<configfile>%p/etc/ssh/sshd_config</configfile>
<pidfile>%p/var/run/sshd.pid</pidfile>
</daemon>
</service>
<<
PostInstScript: <<
# re-create /var directory (works around a nasty bug in rev 1 of this package)
test ! -e /var && ln -s /private/var /var
# update init script if necessary
daemonic install ssh
<<
PreRmScript: <<
# clean up
if [ $1 != "upgrade" ]; then
daemonic remove ssh
fi
<<
#
Description: Secure shell (remote login) client and server
DescUsage: <<
If you have host keys in /etc and want to continue using them, copy
them to /sw/etc/ssh (or wherever you installed Fink).
To run the SSH server from this package, first make sure the system's
server is disabled (SSHSERVER=-NO- in /etc/hostconfig). Then, run
'daemonic enable ssh' as root. That will create a startup item that
starts sshd after the next reboot.
To disable the server, run 'daemonic disable ssh' as root. This will
not kill a running server at this time. If you don't know how to kill
the server yourself, reboot the machine to get rid of it.
<<
DescPort: <<
The patch places a fake config.cache file in the build directory to
disable the broken getaddrinfo() function (and friends). With this
fix, incoming X11 forwarding finally works (and it's enabled by
default now).
Previous versions by Christoph Pfisterer.
<<
License: BSD
Homepage: http://www.openssh.com/
--- NEW FILE: openssh-3.5p1-1.patch ---
diff -ru openssh-3.4p1/configure openssh-3.4p1-patched/configure
--- openssh-3.4p1/configure 2002-06-26 16:08:18.000000000 +0200
+++ openssh-3.4p1-patched/configure 2002-06-27 16:02:40.000000000 +0200
@@ -15309,7 +15309,7 @@
# Looking for programs, paths and files
-PRIVSEP_PATH=/var/empty
+PRIVSEP_PATH='${prefix}/var/empty'
# Check whether --with-privsep-path or --without-privsep-path was given.
if test "${with_privsep_path+set}" = set; then
-------------------------------------------------------
This sf.net email is sponsored by: viaVerio will pay you up to
$1,000 for every account that you consolidate with us.
http://ad.doubleclick.net/clk;4749864;7604308;v?
http://www.viaverio.com/consolidator/osdn.cfm
_______________________________________________
Fink-commits mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/fink-commits