pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/cfs cfs: reformat DESCR, fix some pkglint



details:   https://anonhg.NetBSD.org/pkgsrc/rev/1b41d500c79d
branches:  trunk
changeset: 385790:1b41d500c79d
user:      wiz <wiz%pkgsrc.org@localhost>
date:      Mon Sep 26 16:31:20 2022 +0000

description:
cfs: reformat DESCR, fix some pkglint

diffstat:

 security/cfs/DESCR    |  27 ++++++++++++++-------------
 security/cfs/Makefile |   6 +++---
 2 files changed, 17 insertions(+), 16 deletions(-)

diffs (58 lines):

diff -r 77175eadadc1 -r 1b41d500c79d security/cfs/DESCR
--- a/security/cfs/DESCR        Mon Sep 26 16:22:10 2022 +0000
+++ b/security/cfs/DESCR        Mon Sep 26 16:31:20 2022 +0000
@@ -1,13 +1,14 @@
-CFS pushes encryption services into the UN*X file system.  It supports
-secure storage at the system level through a standard UN*X file system
-interface to encrypted files.  Users associate a cryptographic key with the
-directories they wish to protect.  Files in these directories (as well as
-their pathname components) are transparently encrypted and decrypted with
-the specified key without further user intervention; cleartext is never
-stored on a  disk or sent to a remote file server.  CFS employs a novel
-combination of DES stream and codebook cipher modes to provide high
-security with good performance on a modern workstation.  CFS can use any
-available file system for its underlying storage without modification,
-including remote file servers such as NFS.  System management functions,
-such as file backup, work in a normal manner and without knowledge of the
-key.
+CFS pushes encryption services into the UN*X file system.  It
+supports secure storage at the system level through a standard UN*X
+file system interface to encrypted files.  Users associate a
+cryptographic key with the directories they wish to protect.  Files
+in these directories (as well as their pathname components) are
+transparently encrypted and decrypted with the specified key without
+further user intervention; cleartext is never stored on a  disk or
+sent to a remote file server.  CFS employs a novel combination of
+DES stream and codebook cipher modes to provide high security with
+good performance on a modern workstation.  CFS can use any available
+file system for its underlying storage without modification,
+including remote file servers such as NFS.  System management
+functions, such as file backup, work in a normal manner and without
+knowledge of the key.
diff -r 77175eadadc1 -r 1b41d500c79d security/cfs/Makefile
--- a/security/cfs/Makefile     Mon Sep 26 16:22:10 2022 +0000
+++ b/security/cfs/Makefile     Mon Sep 26 16:31:20 2022 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.35 2019/04/29 22:24:31 gdt Exp $
+# $NetBSD: Makefile,v 1.36 2022/09/26 16:31:20 wiz Exp $
 
 DISTNAME=              cfs-1.4.1
 PKGREVISION=           6
@@ -45,7 +45,7 @@
 CFLAGS+=               -DHAVE_GETPASS
 CFS_BUILD_SCRIPT=      ${WRKSRC}/netbsd_make_with_bad_rpcgen
 .elif ${OPSYS} == "SunOS"
-.  if !empty(CC_VERSION:Mgcc)
+.  if ${CC_VERSION} == gcc
 CFLAGS+=               -traditional
 .  endif
 CFLAGS+=               -DPROTOTYPES=1
@@ -56,7 +56,7 @@
 MAKE_ENV+=             RPCOPTS=
 CFS_BUILD_SCRIPT=      ${WRKSRC}/make_with_bad_rpcgen
 .elif ${OPSYS} == "Linux"
-.  if !empty(CC_VERSION:Mgcc)
+.  if ${CC_VERSION} == gcc
 CFLAGS+=               -traditional
 .  endif
 CFLAGS+=               -DPROTOTYPES=1



Home | Main Index | Thread Index | Old Index