2011-02-16 18:45:08 +01:00
|
|
|
# $NetBSD: Makefile,v 1.199 2011/02/16 17:45:08 taca Exp $
|
2000-01-17 06:34:32 +01:00
|
|
|
|
2011-02-16 18:45:08 +01:00
|
|
|
DISTNAME= openssh-5.8p1
|
|
|
|
PKGNAME= openssh-5.8.1
|
2001-10-18 17:20:01 +02:00
|
|
|
SVR4_PKGNAME= ossh
|
2000-01-17 06:34:32 +01:00
|
|
|
CATEGORIES= security
|
2003-09-17 01:06:22 +02:00
|
|
|
MASTER_SITES= ftp://ftp.openssh.com/pub/OpenBSD/OpenSSH/portable/ \
|
2009-05-01 16:27:34 +02:00
|
|
|
ftp://ftp3.usa.openbsd.org/pub/OpenBSD/OpenSSH/portable/ \
|
2003-04-10 22:20:55 +02:00
|
|
|
ftp://gd.tuwien.ac.at/opsys/OpenBSD/OpenSSH/portable/ \
|
2009-05-01 16:27:34 +02:00
|
|
|
ftp://ftp.freenet.de/pub/ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ \
|
|
|
|
ftp://ftp.jaist.ac.jp/pub/OpenBSD/OpenSSH/portable/ \
|
2010-04-17 12:39:33 +02:00
|
|
|
ftp://ftp.belnet.be/packages/openbsd/OpenSSH/portable/
|
2000-08-09 19:47:31 +02:00
|
|
|
# Don't delete the last entry -- it's there if the pkgsrc version is not
|
|
|
|
# up-to-date and the mirrors already removed the old distfile.
|
2000-01-17 06:34:32 +01:00
|
|
|
|
2006-03-04 22:28:51 +01:00
|
|
|
MAINTAINER= pkgsrc-users@NetBSD.org
|
2000-03-07 13:02:35 +01:00
|
|
|
HOMEPAGE= http://www.openssh.com/
|
2001-02-17 18:42:09 +01:00
|
|
|
COMMENT= Open Source Secure shell client and server (remote login program)
|
2000-01-17 06:34:32 +01:00
|
|
|
|
2001-09-28 01:17:41 +02:00
|
|
|
CONFLICTS= sftp-[0-9]*
|
2004-07-25 14:36:03 +02:00
|
|
|
CONFLICTS+= ssh-[0-9]* ssh6-[0-9]*
|
|
|
|
CONFLICTS+= ssh2-[0-9]* ssh2-nox11-[0-9]*
|
2003-07-24 22:59:03 +02:00
|
|
|
CONFLICTS+= openssh+gssapi-[0-9]*
|
2005-04-28 16:11:13 +02:00
|
|
|
CONFLICTS+= lsh>2.0
|
2001-04-12 12:42:52 +02:00
|
|
|
|
2008-04-27 02:34:27 +02:00
|
|
|
PKG_DESTDIR_SUPPORT= user-destdir
|
|
|
|
|
2005-07-16 03:19:06 +02:00
|
|
|
USE_TOOLS+= perl
|
2000-01-17 06:34:32 +01:00
|
|
|
|
Reorganize crypto handling, as discussed on tech-pkg. Remove all
RESTRICTED= variables that were predicated on former U.S. export
regulations. Add CRYPTO=, as necessary, so it's still possible to
exclude all crypto packages from a build by setting MKCRYPTO=no
(but "lintpkgsrc -R" will no longer catch them).
Specifically,
- - All packages which set USE_SSL just lose their RESTRICTED
variable, since MKCRYPTO responds to USE_SSL directly.
- - realplayer7 and ns-flash keep their RESTRICTED, which is based
on license terms, but also gain the CRYPTO variable.
- - srp-client is now marked broken, since the distfile is evidently
no longer available. On this, we're no worse off than before.
[We haven't been mirroring the distfile, or testing the build!]
- - isakmpd gets CRYPTO for RESTRICTED, but remains broken.
- - crack loses all restrictions, as it does not evidently empower
a user to utilize strong encryption (working definition: ability
to encode a message that requires a secret key plus big number
arithmetic to decode).
2000-09-09 21:40:14 +02:00
|
|
|
CRYPTO= yes
|
|
|
|
|
2003-05-06 19:40:18 +02:00
|
|
|
# retain the following line, for IPv6-ready pkgsrc webpage
|
2007-09-08 00:12:10 +02:00
|
|
|
BUILD_DEFS+= IPV6_READY
|
2000-08-19 00:46:29 +02:00
|
|
|
|
2007-07-04 22:54:31 +02:00
|
|
|
PKG_GROUPS_VARS+= OPENSSH_GROUP
|
|
|
|
PKG_USERS_VARS+= OPENSSH_USER
|
|
|
|
BUILD_DEFS+= OPENSSH_CHROOT
|
Update openssh package to 4.4.1 (openssh-4.4p1).
- A few pkglint warning clean up.
- Major changes are here. For complete changes,
see http://www.openssh.com/txt/release-4.4.
Changes since OpenSSH 4.3:
============================
Security bugs resolved in this release:
* Fix a pre-authentication denial of service found by Tavis Ormandy,
that would cause sshd(8) to spin until the login grace time
expired.
* Fix an unsafe signal hander reported by Mark Dowd. The signal
handler was vulnerable to a race condition that could be exploited
to perform a pre-authentication denial of service. On portable
OpenSSH, this vulnerability could theoretically lead to
pre-authentication remote code execution if GSSAPI authentication
is enabled, but the likelihood of successful exploitation appears
remote.
* On portable OpenSSH, fix a GSSAPI authentication abort that could
be used to determine the validity of usernames on some platforms.
This release includes the following new functionality and fixes:
* Implemented conditional configuration in sshd_config(5) using the
"Match" directive. This allows some configuration options to be
selectively overridden if specific criteria (based on user, group,
hostname and/or address) are met. So far a useful subset of post-
authentication options are supported and more are expected to be
added in future releases.
* Add support for Diffie-Hellman group exchange key agreement with a
final hash of SHA256.
* Added a "ForceCommand" directive to sshd_config(5). Similar to the
command="..." option accepted in ~/.ssh/authorized_keys, this forces
the execution of the specified command regardless of what the user
requested. This is very useful in conjunction with the new "Match"
option.
* Add a "PermitOpen" directive to sshd_config(5). This mirrors the
permitopen="..." authorized_keys option, allowing fine-grained
control over the port-forwardings that a user is allowed to
establish.
* Add optional logging of transactions to sftp-server(8).
* ssh(1) will now record port numbers for hosts stored in
~/.ssh/authorized_keys when a non-standard port has been requested.
* Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with
a non-zero exit code) when requested port forwardings could not be
established.
* Extend sshd_config(5) "SubSystem" declarations to allow the
specification of command-line arguments.
* Replacement of all integer overflow susceptible invocations of
malloc(3) and realloc(3) with overflow-checking equivalents.
* Many manpage fixes and improvements
* New portable OpenSSH-specific features:
- Add optional support for SELinux, controlled using the
--with-selinux configure option (experimental)
- Add optional support for Solaris process contracts, enabled
using the --with-solaris-contracts configure option (experimental)
This option will also include SMF metadata in Solaris packages
built using the "make package" target
- Add optional support for OpenSSL hardware accelerators (engines),
enabled using the --with-ssl-engine configure option.
2006-10-31 04:31:19 +01:00
|
|
|
BUILD_DEFS+= VARBASE
|
|
|
|
|
2002-02-05 05:17:31 +01:00
|
|
|
INSTALL_TARGET= install-nokeys
|
|
|
|
PLIST_SRC= # empty
|
|
|
|
|
2005-05-25 21:37:18 +02:00
|
|
|
.include "options.mk"
|
|
|
|
|
2005-03-08 00:29:49 +01:00
|
|
|
.if ${OPSYS} == "Interix"
|
|
|
|
|
2005-07-28 19:54:57 +02:00
|
|
|
# OpenSSH on Interix has some important caveats
|
2005-03-08 00:29:49 +01:00
|
|
|
MESSAGE_SRC= ${.CURDIR}/MESSAGE.Interix
|
2011-02-06 12:31:18 +01:00
|
|
|
BUILDLINK_PASSTHRU_DIRS+= /usr/local/lib/bind
|
2005-03-08 00:29:49 +01:00
|
|
|
CONFIGURE_ENV+= ac_cv_func_openpty=no
|
|
|
|
CONFIGURE_ENV+= ac_cv_type_struct_timespec=yes
|
2006-11-21 18:47:53 +01:00
|
|
|
CPPFLAGS+= -DIOV_MAX=16 # default is INT_MAX, way too large
|
2011-02-06 12:31:18 +01:00
|
|
|
.if exists(/usr/local/include/bind/resolv.h)
|
2005-03-08 00:29:49 +01:00
|
|
|
CPPFLAGS+= -I/usr/local/include/bind
|
2011-02-06 12:31:18 +01:00
|
|
|
BUILDLINK_PASSTHRU_DIRS+= /usr/local/include/bind
|
|
|
|
.elif exists(/usr/local/bind/include/resolv.h)
|
|
|
|
CPPFLAGS+= -I/usr/local/bind/include
|
|
|
|
BUILDLINK_PASSTHRU_DIRS+= /usr/local/bind/include
|
|
|
|
.endif
|
2005-03-08 00:29:49 +01:00
|
|
|
LDFLAGS+= -L/usr/local/lib/bind
|
|
|
|
LIBS+= -lbind -ldb -lcrypt
|
|
|
|
|
|
|
|
.else # not Interix
|
|
|
|
|
2007-02-22 20:26:05 +01:00
|
|
|
PKG_GROUPS= ${OPENSSH_GROUP}
|
2006-04-23 02:12:35 +02:00
|
|
|
PKG_USERS= ${OPENSSH_USER}:${OPENSSH_GROUP}
|
|
|
|
|
|
|
|
PKG_GECOS.${OPENSSH_USER}= sshd privsep pseudo-user
|
|
|
|
PKG_HOME.${OPENSSH_USER}= ${OPENSSH_CHROOT}
|
2002-08-31 12:08:59 +02:00
|
|
|
|
2005-03-08 00:29:49 +01:00
|
|
|
.endif
|
|
|
|
|
2004-11-25 20:25:28 +01:00
|
|
|
SSH_PID_DIR= ${VARBASE}/run # default directory for PID files
|
2001-01-29 12:34:21 +01:00
|
|
|
|
2002-06-25 08:43:50 +02:00
|
|
|
PKG_SYSCONFSUBDIR= ssh
|
2002-06-28 19:10:16 +02:00
|
|
|
|
2000-07-22 10:21:59 +02:00
|
|
|
GNU_CONFIGURE= yes
|
2004-02-21 07:26:41 +01:00
|
|
|
CONFIGURE_ARGS+= --with-mantype=man
|
2005-12-06 00:55:01 +01:00
|
|
|
CONFIGURE_ARGS+= --sysconfdir=${PKG_SYSCONFDIR:Q}
|
|
|
|
CONFIGURE_ARGS+= --with-pid-dir=${SSH_PID_DIR:Q}
|
|
|
|
CONFIGURE_ARGS+= --with-ssl-dir=${SSLBASE:Q}
|
2002-08-28 06:55:18 +02:00
|
|
|
CONFIGURE_ARGS+= --with-tcp-wrappers=${BUILDLINK_PREFIX.tcp_wrappers}
|
2005-03-08 00:29:49 +01:00
|
|
|
|
|
|
|
.if ${OPSYS} != "Interix"
|
2005-12-06 00:55:01 +01:00
|
|
|
CONFIGURE_ARGS+= --with-privsep-path=${OPENSSH_CHROOT:Q}
|
|
|
|
CONFIGURE_ARGS+= --with-privsep-user=${OPENSSH_USER:Q}
|
2005-03-08 00:29:49 +01:00
|
|
|
.endif
|
2002-02-05 05:17:31 +01:00
|
|
|
|
2005-11-14 23:36:17 +01:00
|
|
|
# pkgsrc already enforces a "secure" version of zlib via dependencies,
|
|
|
|
# so skip this bogus version check.
|
|
|
|
CONFIGURE_ARGS+= --without-zlib-version-check
|
|
|
|
|
2003-10-12 12:13:53 +02:00
|
|
|
# the openssh configure script finds and uses ${LD} if defined and
|
|
|
|
# defaults to ${CC} if not. we override LD here, since running the
|
|
|
|
# linker directly results in undefined symbols for obvious reasons.
|
|
|
|
#
|
2004-02-08 00:58:49 +01:00
|
|
|
CONFIGURE_ENV+= LD=${CC:Q}
|
2003-09-23 22:53:52 +02:00
|
|
|
|
2004-04-28 06:00:17 +02:00
|
|
|
# Enable S/Key support on NetBSD, Darwin, and Solaris.
|
|
|
|
.if (${OPSYS} == "NetBSD") || (${OPSYS} == "Darwin") || (${OPSYS} == "SunOS")
|
2004-04-26 01:36:52 +02:00
|
|
|
. include "../../security/skey/buildlink3.mk"
|
2002-08-28 06:55:18 +02:00
|
|
|
CONFIGURE_ARGS+= --with-skey=${BUILDLINK_PREFIX.skey}
|
|
|
|
.else
|
|
|
|
CONFIGURE_ARGS+= --without-skey
|
2002-07-26 11:24:22 +02:00
|
|
|
.endif
|
|
|
|
|
2004-04-28 05:54:08 +02:00
|
|
|
.if (${OPSYS} == "NetBSD") && exists(/usr/include/utmpx.h)
|
2004-04-27 14:30:23 +02:00
|
|
|
# if we have utmpx et al do not try to use login()
|
|
|
|
CONFIGURE_ARGS+= --disable-libutil
|
|
|
|
.endif
|
2004-04-28 05:54:08 +02:00
|
|
|
.if (${OPSYS} == "SunOS") && (${OS_VERSION} == "5.8" || ${OS_VERSION} == "5.9")
|
2004-04-27 14:26:31 +02:00
|
|
|
CONFIGURE_ARGS+= --disable-utmp --disable-wtmp
|
|
|
|
.endif
|
2004-05-02 19:30:37 +02:00
|
|
|
.if ${OPSYS} == "Linux"
|
|
|
|
CONFIGURE_ARGS+= --enable-md5-password
|
|
|
|
.endif
|
2004-04-27 14:26:31 +02:00
|
|
|
|
2000-09-05 11:43:02 +02:00
|
|
|
# The ssh-askpass program is in ${X11BASE}/bin or ${X11PREFIX}/bin depending
|
|
|
|
# on if it's part of the X11 distribution, or if it's installed from pkgsrc
|
2002-02-05 05:17:31 +01:00
|
|
|
# (security/ssh-askpass).
|
2000-08-11 07:19:42 +02:00
|
|
|
#
|
2000-09-05 11:43:02 +02:00
|
|
|
.if exists(${X11BASE}/bin/ssh-askpass)
|
2002-02-05 05:17:31 +01:00
|
|
|
ASKPASS_PROGRAM= ${X11BASE}/bin/ssh-askpass
|
2000-09-05 11:43:02 +02:00
|
|
|
.else
|
2002-02-05 05:17:31 +01:00
|
|
|
ASKPASS_PROGRAM= ${X11PREFIX}/bin/ssh-askpass
|
2000-09-05 11:43:02 +02:00
|
|
|
.endif
|
2005-12-05 21:49:47 +01:00
|
|
|
CONFIGURE_ENV+= ASKPASS_PROGRAM=${ASKPASS_PROGRAM:Q}
|
|
|
|
MAKE_ENV+= ASKPASS_PROGRAM=${ASKPASS_PROGRAM:Q}
|
2000-08-11 07:19:42 +02:00
|
|
|
|
2004-10-24 04:52:15 +02:00
|
|
|
# do the same for xauth
|
|
|
|
.if exists(${X11BASE}/bin/xauth)
|
|
|
|
CONFIGURE_ARGS+= --with-xauth=${X11BASE}/bin/xauth
|
|
|
|
.else
|
|
|
|
CONFIGURE_ARGS+= --with-xauth=${X11PREFIX}/bin/xauth
|
|
|
|
.endif
|
|
|
|
|
2005-08-19 20:12:36 +02:00
|
|
|
CONFS= ssh_config sshd_config moduli
|
2001-06-18 21:54:14 +02:00
|
|
|
|
2002-02-05 05:17:31 +01:00
|
|
|
.if exists(/dev/urandom)
|
2004-05-22 01:00:23 +02:00
|
|
|
. if ${OPSYS} == "NetBSD"
|
2002-02-05 05:17:31 +01:00
|
|
|
MESSAGE_SRC+= ${.CURDIR}/MESSAGE.urandom
|
2004-05-22 01:00:23 +02:00
|
|
|
. endif
|
2002-02-05 05:17:31 +01:00
|
|
|
.else
|
|
|
|
CONFIGURE_ARGS+= --without-random
|
|
|
|
CONFS+= ssh_prng_cmds
|
|
|
|
PLIST_SRC+= ${.CURDIR}/PLIST.prng
|
2001-01-10 17:05:52 +01:00
|
|
|
.endif
|
|
|
|
|
2002-02-05 05:17:31 +01:00
|
|
|
EGDIR= ${PREFIX}/share/examples/${PKGBASE}
|
|
|
|
CONF_FILES= # empty
|
Update openssh package to 4.4.1 (openssh-4.4p1).
- A few pkglint warning clean up.
- Major changes are here. For complete changes,
see http://www.openssh.com/txt/release-4.4.
Changes since OpenSSH 4.3:
============================
Security bugs resolved in this release:
* Fix a pre-authentication denial of service found by Tavis Ormandy,
that would cause sshd(8) to spin until the login grace time
expired.
* Fix an unsafe signal hander reported by Mark Dowd. The signal
handler was vulnerable to a race condition that could be exploited
to perform a pre-authentication denial of service. On portable
OpenSSH, this vulnerability could theoretically lead to
pre-authentication remote code execution if GSSAPI authentication
is enabled, but the likelihood of successful exploitation appears
remote.
* On portable OpenSSH, fix a GSSAPI authentication abort that could
be used to determine the validity of usernames on some platforms.
This release includes the following new functionality and fixes:
* Implemented conditional configuration in sshd_config(5) using the
"Match" directive. This allows some configuration options to be
selectively overridden if specific criteria (based on user, group,
hostname and/or address) are met. So far a useful subset of post-
authentication options are supported and more are expected to be
added in future releases.
* Add support for Diffie-Hellman group exchange key agreement with a
final hash of SHA256.
* Added a "ForceCommand" directive to sshd_config(5). Similar to the
command="..." option accepted in ~/.ssh/authorized_keys, this forces
the execution of the specified command regardless of what the user
requested. This is very useful in conjunction with the new "Match"
option.
* Add a "PermitOpen" directive to sshd_config(5). This mirrors the
permitopen="..." authorized_keys option, allowing fine-grained
control over the port-forwardings that a user is allowed to
establish.
* Add optional logging of transactions to sftp-server(8).
* ssh(1) will now record port numbers for hosts stored in
~/.ssh/authorized_keys when a non-standard port has been requested.
* Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with
a non-zero exit code) when requested port forwardings could not be
established.
* Extend sshd_config(5) "SubSystem" declarations to allow the
specification of command-line arguments.
* Replacement of all integer overflow susceptible invocations of
malloc(3) and realloc(3) with overflow-checking equivalents.
* Many manpage fixes and improvements
* New portable OpenSSH-specific features:
- Add optional support for SELinux, controlled using the
--with-selinux configure option (experimental)
- Add optional support for Solaris process contracts, enabled
using the --with-solaris-contracts configure option (experimental)
This option will also include SMF metadata in Solaris packages
built using the "make package" target
- Add optional support for OpenSSL hardware accelerators (engines),
enabled using the --with-ssl-engine configure option.
2006-10-31 04:31:19 +01:00
|
|
|
.for f in ${CONFS}
|
|
|
|
CONF_FILES+= ${EGDIR}/${f} ${PKG_SYSCONFDIR}/${f}
|
2002-02-05 05:17:31 +01:00
|
|
|
.endfor
|
2002-08-31 12:08:59 +02:00
|
|
|
OWN_DIRS= ${OPENSSH_CHROOT}
|
2002-02-05 05:17:31 +01:00
|
|
|
RCD_SCRIPTS= sshd
|
|
|
|
|
|
|
|
PLIST_SRC+= ${.CURDIR}/PLIST
|
2005-12-05 21:49:47 +01:00
|
|
|
FILES_SUBST+= SSH_PID_DIR=${SSH_PID_DIR:Q}
|
2001-08-17 21:49:08 +02:00
|
|
|
|
Update openssh package to 4.4.1 (openssh-4.4p1).
- A few pkglint warning clean up.
- Major changes are here. For complete changes,
see http://www.openssh.com/txt/release-4.4.
Changes since OpenSSH 4.3:
============================
Security bugs resolved in this release:
* Fix a pre-authentication denial of service found by Tavis Ormandy,
that would cause sshd(8) to spin until the login grace time
expired.
* Fix an unsafe signal hander reported by Mark Dowd. The signal
handler was vulnerable to a race condition that could be exploited
to perform a pre-authentication denial of service. On portable
OpenSSH, this vulnerability could theoretically lead to
pre-authentication remote code execution if GSSAPI authentication
is enabled, but the likelihood of successful exploitation appears
remote.
* On portable OpenSSH, fix a GSSAPI authentication abort that could
be used to determine the validity of usernames on some platforms.
This release includes the following new functionality and fixes:
* Implemented conditional configuration in sshd_config(5) using the
"Match" directive. This allows some configuration options to be
selectively overridden if specific criteria (based on user, group,
hostname and/or address) are met. So far a useful subset of post-
authentication options are supported and more are expected to be
added in future releases.
* Add support for Diffie-Hellman group exchange key agreement with a
final hash of SHA256.
* Added a "ForceCommand" directive to sshd_config(5). Similar to the
command="..." option accepted in ~/.ssh/authorized_keys, this forces
the execution of the specified command regardless of what the user
requested. This is very useful in conjunction with the new "Match"
option.
* Add a "PermitOpen" directive to sshd_config(5). This mirrors the
permitopen="..." authorized_keys option, allowing fine-grained
control over the port-forwardings that a user is allowed to
establish.
* Add optional logging of transactions to sftp-server(8).
* ssh(1) will now record port numbers for hosts stored in
~/.ssh/authorized_keys when a non-standard port has been requested.
* Add an "ExitOnForwardFailure" option to cause ssh(1) to exit (with
a non-zero exit code) when requested port forwardings could not be
established.
* Extend sshd_config(5) "SubSystem" declarations to allow the
specification of command-line arguments.
* Replacement of all integer overflow susceptible invocations of
malloc(3) and realloc(3) with overflow-checking equivalents.
* Many manpage fixes and improvements
* New portable OpenSSH-specific features:
- Add optional support for SELinux, controlled using the
--with-selinux configure option (experimental)
- Add optional support for Solaris process contracts, enabled
using the --with-solaris-contracts configure option (experimental)
This option will also include SMF metadata in Solaris packages
built using the "make package" target
- Add optional support for OpenSSL hardware accelerators (engines),
enabled using the --with-ssl-engine configure option.
2006-10-31 04:31:19 +01:00
|
|
|
SUBST_CLASSES+= patch
|
|
|
|
SUBST_STAGE.patch= pre-configure
|
|
|
|
SUBST_FILES.patch= session.c
|
|
|
|
SUBST_SED.patch= -e '/channel_input_port_forward_request/s/0/ROOTUID/'
|
|
|
|
SUBST_MESSAGE.patch= More patch a file.
|
|
|
|
|
2004-04-28 05:54:08 +02:00
|
|
|
.include "../../devel/zlib/buildlink3.mk"
|
|
|
|
.include "../../security/openssl/buildlink3.mk"
|
|
|
|
.include "../../security/tcp_wrappers/buildlink3.mk"
|
|
|
|
|
Clean this up, sync with the ssh package, and update to
1.2.2 (fixing PR 9304 by David Rankin <drankin@bohemians.lexington.ky.us>.
Changes:
20000125
- Fix NULL pointer dereference in login.c. Fix from Andre Lucas
<andre.lucas@dial.pipex.com>
- Reorder PAM initialisation so it does not mess up lastlog. Reported
by Andre Lucas <andre.lucas@dial.pipex.com>
- Use preformatted manpages on SCO, report from Gary E. Miller
<gem@rellim.com>
- New URL for x11-ssh-askpass.
- Fixpaths was missing /etc/ssh_known_hosts. Report from Jim Knoble
<jmknoble@pobox.com>
- Added 'DESTDIR' option to Makefile to ease package building. Patch from
Jim Knoble <jmknoble@pobox.com>
- Updated RPM spec files to use DESTDIR
20000124
- Pick up version 1.2.2 from OpenBSD CVS (no changes, just version number
increment)
20000123
- OpenBSD CVS:
- [packet.c]
getsockname() requires initialized tolen; andy@guildsoftware.com
- AIX patch from Matt Richards <v2matt@btv.ibm.com> and David Rankin
<drankin@bohemians.lexington.ky.us>
- Fix lastlog support, patch from Andre Lucas <andre.lucas@dial.pipex.com>
20000122
- Fix compilation of bsd-snprintf.c on Solaris, fix from Ben Taylor
<bent@clark.net>
- Merge preformatted manpage patch from Andre Lucas
<andre.lucas@dial.pipex.com>
- Make IPv4 use the default in RPM packages
- Irix uses preformatted manpages
- Missing htons() in bsd-bindresvport.c, fix from Holger Trapp
<Holger.Trapp@Informatik.TU-Chemnitz.DE>
- OpenBSD CVS updates:
- [packet.c]
use getpeername() in packet_connection_is_on_socket(), fixes sshd -i;
from Holger.Trapp@Informatik.TU-Chemnitz.DE
- [sshd.c]
log with level log() not fatal() if peer behaves badly.
- [readpass.c]
instead of blocking SIGINT, catch it ourselves, so that we can clean
the tty modes up and kill ourselves -- instead of our process group
leader (scp, cvs, ...) going away and leaving us in noecho mode.
people with cbreak shells never even noticed..
- [ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh.1 sshd.8]
ie. -> i.e.,
20000120
- Don't use getaddrinfo on AIX
- Update to latest OpenBSD CVS:
- [auth-rsa.c]
- fix user/1056, sshd keeps restrictions; dbt@meat.net
- [sshconnect.c]
- disable agent fwding for proto 1.3, remove abuse of auth-rsa flags.
- destroy keys earlier
- split key exchange (kex) and user authentication (user-auth),
ok: provos@
- [sshd.c]
- no need for poll.h; from bright@wintelcom.net
- disable agent fwding for proto 1.3, remove abuse of auth-rsa flags.
- split key exchange (kex) and user authentication (user-auth),
ok: provos@
- [sshd.c]
- no need for poll.h; from bright@wintelcom.net
- disable agent fwding for proto 1.3, remove abuse of auth-rsa flags.
- split key exchange (kex) and user authentication (user-auth),
ok: provos@
- Big manpage and config file cleanup from Andre Lucas
<andre.lucas@dial.pipex.com>
- Re-added latest (unmodified) OpenBSD manpages
- Doc updates
- NetBSD patch from David Rankin <drankin@bohemians.lexington.ky.us> and
Christos Zoulas <christos@netbsd.org>
20000119
- SCO compile fixes from Gary E. Miller <gem@rellim.com>
- Compile fix from Darren_Hall@progressive.com
- Linux/glibc-2.1.2 takes a *long* time to look up names for AF_UNSPEC
addresses using getaddrinfo(). Added a configure switch to make the
default lookup mode AF_INET
20000118
- Fixed --with-pid-dir option
- Makefile fix from Gary E. Miller <gem@rellim.com>
- Compile fix for HPUX and Solaris from Andre Lucas
<andre.lucas@dial.pipex.com>
2000-01-27 18:12:02 +01:00
|
|
|
post-install:
|
2008-04-27 02:34:27 +02:00
|
|
|
${INSTALL_DATA_DIR} ${DESTDIR}${EGDIR}
|
2005-08-19 20:12:36 +02:00
|
|
|
cd ${WRKSRC}; for file in ${CONFS}; do \
|
2008-04-27 02:34:27 +02:00
|
|
|
${INSTALL_DATA} $${file}.out ${DESTDIR}${EGDIR}/$${file}; \
|
2001-06-18 21:54:14 +02:00
|
|
|
done
|
2005-09-21 20:07:09 +02:00
|
|
|
.if !empty(PKG_OPTIONS:Mpam) && ${OPSYS} == "Linux"
|
2008-04-27 02:34:27 +02:00
|
|
|
${INSTALL_DATA} ${WRKSRC}/contrib/sshd.pam.generic \
|
|
|
|
${DESTDIR}${EGDIR}/sshd.pam
|
2004-05-22 00:54:43 +02:00
|
|
|
.endif
|
2000-01-17 06:34:32 +01:00
|
|
|
|
|
|
|
.include "../../mk/bsd.pkg.mk"
|