summaryrefslogtreecommitdiffstats
path: root/crypto/krb5/DETAILS
blob: 4a132836b8e16fb696b4b2bf7c03687d63bc93de (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
           SPELL=krb5
         VERSION=1.14
  SECURITY_PATCH=17
     SOURCE_HASH=sha512:b33a85b37f6038e34ba4038c9d1cc6a0df027652cbeccd24e39b323a1ed1bc16305099df04654c80ba7e6b56bd3d3c2df95758add888f9ef8535cb78443684ff
            VX=${VERSION%.?}
      SOURCE=$SPELL-$VERSION.tar.gz
SOURCE_DIRECTORY=$BUILD_DIRECTORY/$SPELL-$VERSION
   SOURCE_URL[0]=http://web.mit.edu/kerberos/dist/krb5/${VX}/$SOURCE
        WEB_SITE=http://web.mit.edu/kerberos/www/
         ENTERED=20020215
      LICENSE[0]=http://web.mit.edu/kerberos/www/krb5-1.7/krb5-1.7/doc/krb5-install.html#Copyright
        KEYWORDS="security crypto"
           SHORT="Kerberos 5 network security protocol"
cat << EOF
Kerberos was created by MIT as a solution to network security problems.
The Kerberos protocol uses strong cryptography so that a client can
prove its identity to a server (and vice versa) across an insecure
network connection. After a client and server has used Kerberos to
prove their identity, they can also encrypt all of their communications
to assure privacy and data integrity as they go about their business.
EOF