summaryrefslogtreecommitdiffstats
path: root/crypto/krb5/DETAILS
blob: f387d54e0bc64c6c83c7e252f78b47963ab9533c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
           SPELL=krb5
         VERSION=1.7
          SOURCE=$SPELL-$VERSION-signed.tar
      SOURCE_RAW=$SPELL-$VERSION.tar.gz
SOURCE_DIRECTORY=$BUILD_DIRECTORY/$SPELL-$VERSION
   SOURCE_URL[0]=http://web.mit.edu/kerberos/www/dist/krb5/$VERSION/$SOURCE
     SOURCE_HASH=sha512:b99367af9592cbb3234b4af2ce503cf989a5e831cba5d99fd5cdb42bd1cc99f99f359d766749f51ef352807ebc0e551a071b78b553ebf9f9d8ea10b20cc4e93a
        WEB_SITE=http://web.mit.edu/kerberos/www/
         ENTERED=20020215
      LICENSE[0]=http://web.mit.edu/kerberos/www/krb5-1.7/krb5-1.7/doc/krb5-install.html#Copyright
      PATCHLEVEL=0
  SECURITY_PATCH=5
        KEYWORDS="security crypto"
           SHORT="Kerberos 5 network security protocol"
cat << EOF
Kerberos was created by MIT as a solution to network security problems.
The Kerberos protocol uses strong cryptography so that a client can
prove its identity to a server (and vice versa) across an insecure
network connection. After a client and server has used Kerberos to
prove their identity, they can also encrypt all of their communications
to assure privacy and data integrity as they go about their business.
EOF