pkgsrc-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[pkgsrc/trunk]: pkgsrc/security/cfs cfs: reformat DESCR, fix some pkglint
details: https://anonhg.NetBSD.org/pkgsrc/rev/1b41d500c79d
branches: trunk
changeset: 385790:1b41d500c79d
user: wiz <wiz%pkgsrc.org@localhost>
date: Mon Sep 26 16:31:20 2022 +0000
description:
cfs: reformat DESCR, fix some pkglint
diffstat:
security/cfs/DESCR | 27 ++++++++++++++-------------
security/cfs/Makefile | 6 +++---
2 files changed, 17 insertions(+), 16 deletions(-)
diffs (58 lines):
diff -r 77175eadadc1 -r 1b41d500c79d security/cfs/DESCR
--- a/security/cfs/DESCR Mon Sep 26 16:22:10 2022 +0000
+++ b/security/cfs/DESCR Mon Sep 26 16:31:20 2022 +0000
@@ -1,13 +1,14 @@
-CFS pushes encryption services into the UN*X file system. It supports
-secure storage at the system level through a standard UN*X file system
-interface to encrypted files. Users associate a cryptographic key with the
-directories they wish to protect. Files in these directories (as well as
-their pathname components) are transparently encrypted and decrypted with
-the specified key without further user intervention; cleartext is never
-stored on a disk or sent to a remote file server. CFS employs a novel
-combination of DES stream and codebook cipher modes to provide high
-security with good performance on a modern workstation. CFS can use any
-available file system for its underlying storage without modification,
-including remote file servers such as NFS. System management functions,
-such as file backup, work in a normal manner and without knowledge of the
-key.
+CFS pushes encryption services into the UN*X file system. It
+supports secure storage at the system level through a standard UN*X
+file system interface to encrypted files. Users associate a
+cryptographic key with the directories they wish to protect. Files
+in these directories (as well as their pathname components) are
+transparently encrypted and decrypted with the specified key without
+further user intervention; cleartext is never stored on a disk or
+sent to a remote file server. CFS employs a novel combination of
+DES stream and codebook cipher modes to provide high security with
+good performance on a modern workstation. CFS can use any available
+file system for its underlying storage without modification,
+including remote file servers such as NFS. System management
+functions, such as file backup, work in a normal manner and without
+knowledge of the key.
diff -r 77175eadadc1 -r 1b41d500c79d security/cfs/Makefile
--- a/security/cfs/Makefile Mon Sep 26 16:22:10 2022 +0000
+++ b/security/cfs/Makefile Mon Sep 26 16:31:20 2022 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.35 2019/04/29 22:24:31 gdt Exp $
+# $NetBSD: Makefile,v 1.36 2022/09/26 16:31:20 wiz Exp $
DISTNAME= cfs-1.4.1
PKGREVISION= 6
@@ -45,7 +45,7 @@
CFLAGS+= -DHAVE_GETPASS
CFS_BUILD_SCRIPT= ${WRKSRC}/netbsd_make_with_bad_rpcgen
.elif ${OPSYS} == "SunOS"
-. if !empty(CC_VERSION:Mgcc)
+. if ${CC_VERSION} == gcc
CFLAGS+= -traditional
. endif
CFLAGS+= -DPROTOTYPES=1
@@ -56,7 +56,7 @@
MAKE_ENV+= RPCOPTS=
CFS_BUILD_SCRIPT= ${WRKSRC}/make_with_bad_rpcgen
.elif ${OPSYS} == "Linux"
-. if !empty(CC_VERSION:Mgcc)
+. if ${CC_VERSION} == gcc
CFLAGS+= -traditional
. endif
CFLAGS+= -DPROTOTYPES=1
Home |
Main Index |
Thread Index |
Old Index