pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/security/cfs



Module Name:    pkgsrc
Committed By:   wiz
Date:           Mon Sep 26 16:31:20 UTC 2022

Modified Files:
        pkgsrc/security/cfs: DESCR Makefile

Log Message:
cfs: reformat DESCR, fix some pkglint


To generate a diff of this commit:
cvs rdiff -u -r1.1 -r1.2 pkgsrc/security/cfs/DESCR
cvs rdiff -u -r1.35 -r1.36 pkgsrc/security/cfs/Makefile

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/security/cfs/DESCR
diff -u pkgsrc/security/cfs/DESCR:1.1 pkgsrc/security/cfs/DESCR:1.2
--- pkgsrc/security/cfs/DESCR:1.1       Thu Nov  1 01:16:34 2001
+++ pkgsrc/security/cfs/DESCR   Mon Sep 26 16:31:20 2022
@@ -1,13 +1,14 @@
-CFS pushes encryption services into the UN*X file system.  It supports
-secure storage at the system level through a standard UN*X file system
-interface to encrypted files.  Users associate a cryptographic key with the
-directories they wish to protect.  Files in these directories (as well as
-their pathname components) are transparently encrypted and decrypted with
-the specified key without further user intervention; cleartext is never
-stored on a  disk or sent to a remote file server.  CFS employs a novel
-combination of DES stream and codebook cipher modes to provide high
-security with good performance on a modern workstation.  CFS can use any
-available file system for its underlying storage without modification,
-including remote file servers such as NFS.  System management functions,
-such as file backup, work in a normal manner and without knowledge of the
-key.
+CFS pushes encryption services into the UN*X file system.  It
+supports secure storage at the system level through a standard UN*X
+file system interface to encrypted files.  Users associate a
+cryptographic key with the directories they wish to protect.  Files
+in these directories (as well as their pathname components) are
+transparently encrypted and decrypted with the specified key without
+further user intervention; cleartext is never stored on a  disk or
+sent to a remote file server.  CFS employs a novel combination of
+DES stream and codebook cipher modes to provide high security with
+good performance on a modern workstation.  CFS can use any available
+file system for its underlying storage without modification,
+including remote file servers such as NFS.  System management
+functions, such as file backup, work in a normal manner and without
+knowledge of the key.

Index: pkgsrc/security/cfs/Makefile
diff -u pkgsrc/security/cfs/Makefile:1.35 pkgsrc/security/cfs/Makefile:1.36
--- pkgsrc/security/cfs/Makefile:1.35   Mon Apr 29 22:24:31 2019
+++ pkgsrc/security/cfs/Makefile        Mon Sep 26 16:31:20 2022
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.35 2019/04/29 22:24:31 gdt Exp $
+# $NetBSD: Makefile,v 1.36 2022/09/26 16:31:20 wiz Exp $
 
 DISTNAME=              cfs-1.4.1
 PKGREVISION=           6
@@ -45,7 +45,7 @@ CFS_SUBST+=           getpassword->getpass
 CFLAGS+=               -DHAVE_GETPASS
 CFS_BUILD_SCRIPT=      ${WRKSRC}/netbsd_make_with_bad_rpcgen
 .elif ${OPSYS} == "SunOS"
-.  if !empty(CC_VERSION:Mgcc)
+.  if ${CC_VERSION} == gcc
 CFLAGS+=               -traditional
 .  endif
 CFLAGS+=               -DPROTOTYPES=1
@@ -56,7 +56,7 @@ MAKE_ENV+=            COMPAT=
 MAKE_ENV+=             RPCOPTS=
 CFS_BUILD_SCRIPT=      ${WRKSRC}/make_with_bad_rpcgen
 .elif ${OPSYS} == "Linux"
-.  if !empty(CC_VERSION:Mgcc)
+.  if ${CC_VERSION} == gcc
 CFLAGS+=               -traditional
 .  endif
 CFLAGS+=               -DPROTOTYPES=1



Home | Main Index | Thread Index | Old Index