blob: f387d54e0bc64c6c83c7e252f78b47963ab9533c (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
SPELL=krb5
VERSION=1.7
SOURCE=$SPELL-$VERSION-signed.tar
SOURCE_RAW=$SPELL-$VERSION.tar.gz
SOURCE_DIRECTORY=$BUILD_DIRECTORY/$SPELL-$VERSION
SOURCE_URL[0]=http://web.mit.edu/kerberos/www/dist/krb5/$VERSION/$SOURCE
SOURCE_HASH=sha512:b99367af9592cbb3234b4af2ce503cf989a5e831cba5d99fd5cdb42bd1cc99f99f359d766749f51ef352807ebc0e551a071b78b553ebf9f9d8ea10b20cc4e93a
WEB_SITE=http://web.mit.edu/kerberos/www/
ENTERED=20020215
LICENSE[0]=http://web.mit.edu/kerberos/www/krb5-1.7/krb5-1.7/doc/krb5-install.html#Copyright
PATCHLEVEL=0
SECURITY_PATCH=5
KEYWORDS="security crypto"
SHORT="Kerberos 5 network security protocol"
cat << EOF
Kerberos was created by MIT as a solution to network security problems.
The Kerberos protocol uses strong cryptography so that a client can
prove its identity to a server (and vice versa) across an insecure
network connection. After a client and server has used Kerberos to
prove their identity, they can also encrypt all of their communications
to assure privacy and data integrity as they go about their business.
EOF
|