pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/security/cfs
Module Name: pkgsrc
Committed By: wiz
Date: Mon Sep 26 16:31:20 UTC 2022
Modified Files:
pkgsrc/security/cfs: DESCR Makefile
Log Message:
cfs: reformat DESCR, fix some pkglint
To generate a diff of this commit:
cvs rdiff -u -r1.1 -r1.2 pkgsrc/security/cfs/DESCR
cvs rdiff -u -r1.35 -r1.36 pkgsrc/security/cfs/Makefile
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/security/cfs/DESCR
diff -u pkgsrc/security/cfs/DESCR:1.1 pkgsrc/security/cfs/DESCR:1.2
--- pkgsrc/security/cfs/DESCR:1.1 Thu Nov 1 01:16:34 2001
+++ pkgsrc/security/cfs/DESCR Mon Sep 26 16:31:20 2022
@@ -1,13 +1,14 @@
-CFS pushes encryption services into the UN*X file system. It supports
-secure storage at the system level through a standard UN*X file system
-interface to encrypted files. Users associate a cryptographic key with the
-directories they wish to protect. Files in these directories (as well as
-their pathname components) are transparently encrypted and decrypted with
-the specified key without further user intervention; cleartext is never
-stored on a disk or sent to a remote file server. CFS employs a novel
-combination of DES stream and codebook cipher modes to provide high
-security with good performance on a modern workstation. CFS can use any
-available file system for its underlying storage without modification,
-including remote file servers such as NFS. System management functions,
-such as file backup, work in a normal manner and without knowledge of the
-key.
+CFS pushes encryption services into the UN*X file system. It
+supports secure storage at the system level through a standard UN*X
+file system interface to encrypted files. Users associate a
+cryptographic key with the directories they wish to protect. Files
+in these directories (as well as their pathname components) are
+transparently encrypted and decrypted with the specified key without
+further user intervention; cleartext is never stored on a disk or
+sent to a remote file server. CFS employs a novel combination of
+DES stream and codebook cipher modes to provide high security with
+good performance on a modern workstation. CFS can use any available
+file system for its underlying storage without modification,
+including remote file servers such as NFS. System management
+functions, such as file backup, work in a normal manner and without
+knowledge of the key.
Index: pkgsrc/security/cfs/Makefile
diff -u pkgsrc/security/cfs/Makefile:1.35 pkgsrc/security/cfs/Makefile:1.36
--- pkgsrc/security/cfs/Makefile:1.35 Mon Apr 29 22:24:31 2019
+++ pkgsrc/security/cfs/Makefile Mon Sep 26 16:31:20 2022
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.35 2019/04/29 22:24:31 gdt Exp $
+# $NetBSD: Makefile,v 1.36 2022/09/26 16:31:20 wiz Exp $
DISTNAME= cfs-1.4.1
PKGREVISION= 6
@@ -45,7 +45,7 @@ CFS_SUBST+= getpassword->getpass
CFLAGS+= -DHAVE_GETPASS
CFS_BUILD_SCRIPT= ${WRKSRC}/netbsd_make_with_bad_rpcgen
.elif ${OPSYS} == "SunOS"
-. if !empty(CC_VERSION:Mgcc)
+. if ${CC_VERSION} == gcc
CFLAGS+= -traditional
. endif
CFLAGS+= -DPROTOTYPES=1
@@ -56,7 +56,7 @@ MAKE_ENV+= COMPAT=
MAKE_ENV+= RPCOPTS=
CFS_BUILD_SCRIPT= ${WRKSRC}/make_with_bad_rpcgen
.elif ${OPSYS} == "Linux"
-. if !empty(CC_VERSION:Mgcc)
+. if ${CC_VERSION} == gcc
CFLAGS+= -traditional
. endif
CFLAGS+= -DPROTOTYPES=1
Home |
Main Index |
Thread Index |
Old Index