blob: 99a60692c5ab1cff41af4c6e9070b2cabc08a28b (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
|
SPELL=krb5
VERSION=1.6.3
SOURCE=$SPELL-$VERSION-signed.tar
SOURCE_RAW=$SPELL-$VERSION.tar.gz
SOURCE_DIRECTORY=$BUILD_DIRECTORY/$SPELL-$VERSION
SOURCE_URL[0]=http://web.mit.edu/kerberos/www/dist/krb5/1.6/$SOURCE
SOURCE_HASH=sha512:5d1e00e54ddfa8cdba3e5ea6a78cccb1abf79433e24f3fcba88c812a8a630d907cab6b89adde73298cfc55f2fac6222d5cf3b836d0fe31268a57e4fde0fb8c27
WEB_SITE=http://web.mit.edu/kerberos/www/
ENTERED=20020215
LICENSE[0]=http://web.mit.edu/kerberos/www/krb5-1.6/krb5-1.6/doc/krb5-install.html#Copyright
PATCHLEVEL=1
SECURITY_PATCH=5
KEYWORDS="security crypto"
SHORT="Kerberos 5 network security protocol"
cat << EOF
Kerberos was created by MIT as a solution to network security problems.
The Kerberos protocol uses strong cryptography so that a client can
prove its identity to a server (and vice versa) across an insecure
network connection. After a client and server has used Kerberos to
prove their identity, they can also encrypt all of their communications
to assure privacy and data integrity as they go about their business.
EOF
|