Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Nov 1998 17:45:56 -0500 (EST)
From:      jake@fastether.net
To:        FreeBSD-gnats-submit@FreeBSD.ORG
Subject:   ports/8774: ports new
Message-ID:  <199811202245.RAA26566@fastether.net>

next in thread | raw e-mail | index | archive | help

>Number:         8774
>Category:       ports
>Synopsis:       change-request
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports
>State:          open
>Quarter:
>Keywords:
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Fri Nov 20 14:30:00 PST 1998
>Last-Modified:
>Originator:     Jake
>Organization:
Fastether.net                               
>Release:        FreeBSD 3.0-CURRENT i386
>Environment:

# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	ssh2
#	ssh2/Makefile
#	ssh2/patches
#	ssh2/pkg
#	ssh2/pkg/PLIST
#	ssh2/pkg/MESSAGE
#	ssh2/pkg/DESCR
#	ssh2/pkg/README
#	ssh2/pkg/COMMENT
#	ssh2/pkg/LICENSING
#	ssh2/files
#	ssh2/files/md5
#	ssh2/files/rsa64.diff
#
echo c - ssh2
mkdir -p ssh2 > /dev/null 2>&1
echo x - ssh2/Makefile
sed 's/^X//' >ssh2/Makefile << 'END-of-ssh2/Makefile'
X# New ports collection makefile for:	ssh2
X# Version required:     1.2.26
X# Date created:		30 Jul 1995
X# Whom:			torstenb@FreeBSD.ORG
X#
X# $Id$
X#
X# Maximal ssh package requires YES values for
X# USE_PERL, USE_TCPWRAP
X#
X
XDISTNAME=       ssh-2.0.11
XCATEGORIES=	security net
XMASTER_SITES=   ftp://ftp.cs.hut.fi/pub/ssh/ \
X		ftp://ftp.funet.fi/pub/unix/security/login/ssh/ \
X		ftp://rzsun2.informatik.uni-hamburg.de/pub/virus/crypt/ripem/ \
X		ftp://ftp.univie.ac.at/security/crypt/cryptography/asymmetric/rsa/
X
XMAINTAINER=	jake@fastether.net
X
X# You can set USA_RESIDENT appropriately in /etc/make.conf if this bugs you..
X
X.if defined(USA_RESIDENT) && ${USA_RESIDENT} == YES
XMASTER_SITES=	\
X	ftp://ftp.achilles.net/pub/security/ssh/ \
X	ftp://ftp.funet.fi/pub/unix/security/login/ssh/ \
X	ftp://nic.funet.fi/pub/crypt/mirrors/ftp.dsi.unimi.it/applied-crypto/ \
X	ftp://rzsun2.informatik.uni-hamburg.de/pub/virus/crypt/ripem/ \
X	ftp://idea.sec.dsi.unimi.it/pub/security/crypt/math/ \
X	ftp://ftp.univie.ac.at/security/crypt/cryptography/asymmetric/rsa/ \
X	ftp://isdec.vc.cvut.cz/pub/security/unimi/crypt/applied-crypto/ \
X	ftp://madhaus.cns.utoronto.ca/pub/ssh \
X	ftp://ftp.cs.hut.fi/pub/ssh/
X
XHAS_CONFIGURE=	defined
XCONFIGURE_SCRIPT=	configure	
XCONFIGURE_ARGS+= --with-rsaref 
XLIB_DEPENDS+=	rsaref.2:${PORTSDIR}/security/rsaref 
XBUILD_DEPENDS+= /nonexistent:${PORTSDIR}/security/rsaref:extract
XRUN_DEPENDS+= sshd:${PREFIX}/bin/sshd
X
X# IDEA does not come with this distribution by default. 
X# For additional ciphers uncomment the following line.
X
X#BUILD_DEPENDS+= SSLeay:${PORTSDIR}/security/SSLeay:extract
X
X.endif
X
X#
X# Use Phil Karn's asm patches to speed up DES on intel.
X# Download by hand from http://www.cryptography.org/cgi-bin/crypto.cgi/ssh/  
X# and put in distfiles directory.
X#
X# Disabled for now, since there's not such a patchkit for 2.0.11 version.
X#.if defined(FAST_DES_PATCHKIT) && ${FAST_DES_PATCHKIT} == YES
X#PATCHFILES=ssh-2.0.11-patchkit
XPATCH_DIST_STRIP=-p1
XPATCH_SITES=ftp://ftp.achilles.net/pub/security/ssh/ \
X#.endif
X
XRESTRICTED=	"Strong Crypto; export-controlled"
XIS_INTERACTIVE=	YES
X
XGNU_CONFIGURE=	YES
X
XCONFIGURE_ARGS+= --with-etcdir=${PREFIX}/etc
X
X#Uncomment if all your users are in their own group and their homedir
X#is writeable by that group.  Beware the security implications!
X#CONFIGURE_ARGS+= --enable-group-writeability
X
X#Uncomment if you want to allow ssh to emulate an unencrypted rsh connection
X#over a secure medium.  This is normally dangerous since it can lead to the
X#disclosure keys and passwords.
X#CONFIGURE_ARGS+= --with-none
X
X.if defined(KRB5_HOME) && exists(${KRB5_HOME})
XCONFIGURE_ARGS+=--with-kerberos5=${KRB5_HOME} --enable-kerberos-tgt-passing
X.endif
X
X# Include support for the SecureID card
X# Warning: untested !
X.if defined(USE_SECUREID) && ${USE_SECUREID} == YES
XCONFIGURE_ARGS+= --with-secureid
X.endif
X
X# Don't use IDEA. IDEA can be freely used for non-commercial use. However,
X# commercial use may require a licence in a number of countries
X# Warning: untested !
X.if defined(DONT_USE_IDEA) && ${DONT_USE_IDEA} == YES
XCONFIGURE_ARGS+= --without-idea
X.endif
X
X.if !exists(${X11BASE}/bin/xauth)
XCONFIGURE_ARGS+= --without-x
X.endif
X
XMAN1= ssh2.1 ssh-keygen2.1 ssh-add2.1 ssh-agent2.1 \
X	scp2.1 sftp2.1
XMAN8= sshd2.8	
X
X#pre-patch:
X#	@${MV} -f ${WRKSRC}/make-ssh-known-hosts.pl \
X#	    ${WRKSRC}/make-ssh-known-hosts.pl.in
X
Xfetch-depends:
X.if !defined(USA_RESIDENT) || ${USA_RESIDENT} != YES && ${USA_RESIDENT} != NO
X	@echo
X	@echo You must set the variable USA_RESIDENT to YES if you are a
X	@echo United States resident, otherwise NO.
X	@echo If you are a US resident then this port must also fetch
X	@echo the RSAREF2 library from sources abroad \(RSA Inc. holds a
X	@echo patent on RSA and public key crypto in general in the United
X	@echo States so using RSA implementations other than RSAREF there
X	@echo may violate US patent law\).
X	@false
X.endif
X
Xpost-install:
X	@if [ ! -f ${PREFIX}/etc/ssh_host_key ]; then \
X		echo "Generating a secret host key..."; \
X		${PREFIX}/bin/ssh-keygen2 -f ${PREFIX}/etc/ssh_host_key -N ""; \
X	fi
X.if !defined(NOMANCOMPRESS)
X	for file in sftp2.1 scp2.1 ssh-add2.1 ssh-agent2.1 \
X	    ssh-keygen2.1 ssh2.1; do \
X		rm -f ${PREFIX}/man/man1/$${file}.gz; \
X		ln -sf $${file}.gz ${PREFIX}/man/man1/$${file}.2.gz; \
X	done
X	rm -f ${PREFIX}/man/man8/sshd2.8.gz
X	ln -sf ssh2.1.2.gz ${PREFIX}/man/man1/slogin.gz
X	ln -sf ssh2.1.2.gz ${PREFIX}/man/man1/slogin2.1.gz
X	ln -sf sshd2.1.2.gz ${PREFIX}/man/man8/sshd.8.gz
X.else
X	${ECHO} Warning---some manpages not installed.  See port Makefile
X.endif
X	@if [ ! -f ${PREFIX}/etc/rc.d/sshd2.sh ]; then \
X		${ECHO} "Installing ${PREFIX}/etc/rc.d/sshd2.sh startup file."; \
X		echo "#!/bin/sh" > ${PREFIX}/etc/rc.d/sshd2.sh; \
X		echo "[ -x ${PREFIX}/sbin/sshd2 ] && ${PREFIX}/sbin/sshd2 && echo -n ' sshd2'" >> ${PREFIX}/etc/rc.d/sshd2.sh; \
X		chmod 751 ${PREFIX}/etc/rc.d/sshd2.sh; \
X		mv ${PREFIX}/etc/rc.d/sshd.sh ${PREFIX}/etc/rc.d/sshd.bak; \
X	fi
X	@if test -r ${PREFIX}/etc/ssh2/sshd2_config ;then \
X		${ECHO} "Installing ssh1 backwards compatability..(needs ssh1.2.6)"; \
X		echo "Ssh1Compatibility   yes" | cat >> ${PREFIX}/etc/ssh2/ssh2_config; \
X		${ECHO} "Ssh1Compatibility   yes -- added"; \
X		echo "Ssh1Path            ${PREFIX}/bin/ssh1" | cat >> ${PREFIX}/etc/ssh2/ssh2_config ; \
X		${ECHO} "Ssh1Path            ${PREFIX}/bin/ssh1 -- added"; \
X		${ECHO} "Installing ssh1d backwards compatability..(needs ssh1.2.6)"; \
X		echo "Ssh1Compatibility   yes" | cat >> ${PREFIX}/etc/ssh2/sshd2_config; \
X		${ECHO} "Ssh1Compatibility   yes --added"; \
X		echo "Sshd1Path           ${PREFIX}/sbin/sshd1" | cat >> ${PREFIX}/etc/ssh2/sshd2_config ; \
X		${ECHO} "Sshd1Path           ${PREFIX}/sbin/sshd1 --added"; \
X		${ECHO} "SSH2 Client and Server SHOULD be backwards compatable now" ; \
X	fi
X.include <bsd.port.mk>
X
X# Following stuff must be after <bsd.port.mk> to expand exists() properly
X
X.if defined(USE_PERL) && ${USE_PERL} == YES || \
X    exists(${PERL5}) && (!defined(USE_PERL) || ${USE_PERL} != NO)
XBUILD_DEPENDS+= perl${PERL_VERSION}:${PORTSDIR}/lang/perl5
XCONFIGURE_ENV+= PERL=${PERL5}
X.else
XCONFIGURE_ENV+= PERL=/replace_it_with_PERL_path
X.endif
X
X# Include tcp-wrapper support (call remote identd)
X.if defined(USE_TCPWRAP) && ${USE_TCPWRAP} == YES || \
X    exists(${PREFIX}/lib/libwrap.a) && \
X    (!defined(USE_TCPWRAP) || ${USE_TCPWRAP} != NO)
XCONFIGURE_ENV+= LDFLAGS=-L${PREFIX}/lib CFLAGS="${CFLAGS} -I${PREFIX}/include"
XCONFIGURE_ARGS+= --with-libwrap
XLIB_DEPENDS+=   wrap.7:${PORTSDIR}/security/tcp_wrapper
X.endif
X
X# Include SOCKS firewall support
X.if defined(USE_SOCKS) && ${USE_SOCKS} == YES
XCONFIGURE_ARGS+= --with-socks="-L${PREFIX}/lib -lsocks5" --with-socks5
X.endif
END-of-ssh2/Makefile
echo c - ssh2/patches
mkdir -p ssh2/patches > /dev/null 2>&1
echo c - ssh2/pkg
mkdir -p ssh2/pkg > /dev/null 2>&1
echo x - ssh2/pkg/PLIST
sed 's/^X//' >ssh2/pkg/PLIST << 'END-of-ssh2/pkg/PLIST'
Xetc/ssh2/sshd2_config
Xetc/ssh2/ssh2_config
Xetc/hostkey
Xetc/hostkey.pub
Xetc/random_seed
Xetc/rc.d/sshd2.sh
Xbin/ssh2
Xbin/scp2
Xbin/sftp2
Xbin/sftp-server2
Xbin/ssh-agent2
Xbin/ssh-keygen2
Xbin/ssh-add2
Xsbin/sshd2
Xman/man1/ssh2.1.gz
Xman/man1/ssh-keygen2.1.gz
Xman/man1/ssh-add2.1.gz
Xman/man1/ssh-agent2.1.gz
Xman/man1/scp2.1.gz
Xman/man1/sftp2.1.gz
Xman/man8/sshd2.8.gz
Xman/man1/ssh-add2.1.2.gz
Xman/man1/ssh-agent2.1.2.gz
Xman/man1/ssh-keygen2.1.2.gz
Xman/man1/ssh2.1.2.gz
X@exec if [ ! -f %D/etc/ssh_host_key ]; then echo "Generating a secret host key.." ; %D/bin/ssh-keygen2 -N "" -f %D/etc/ssh_host_key; fi
END-of-ssh2/pkg/PLIST
echo x - ssh2/pkg/MESSAGE
sed 's/^X//' >ssh2/pkg/MESSAGE << 'END-of-ssh2/pkg/MESSAGE'
XSSH2
X
X* ssh-2.0.11 is compatable with ssh-1 clients 
XBUT NOT BY DEFAULT
X(versions 1.2.26+ tested)
X
X* The Makefile will add the appropriate entries for the backwards compatability.
XTo turn off this behavior, remove the lines below from the sshd2 and ssh2 config 
Xfiles.
X
X* install ssh-1.2.26 prior to installing ssh-2.0.10 
Xif you have not done so. Compatability does not work without it.
X
X* Remove these from your sshd2_config file to disable the compatability:
X
X            Ssh1Compatibility   yes
X
X            Sshd1Path           /usr/local/sbin/sshd1
X
X* Remove these from your ssh2_config file to disable the compatability:
X
X            Ssh1Compatibility   yes
X
X            Ssh1Path            /usr/local/bin/ssh1
X
X
XPlease read the LICENSE information included.
END-of-ssh2/pkg/MESSAGE
echo x - ssh2/pkg/DESCR
sed 's/^X//' >ssh2/pkg/DESCR << 'END-of-ssh2/pkg/DESCR'
XSSH 2.0.11 - bug fixes + TWOFISH support added
X==============
X
X        Timo J. Rinne <tri@ssh.fi>
X	Sami Lehtinen <sjl@ssh.fi>
X        17 September 1998
X	
X	See file LICENSING for licensing terms.
X
X
X   What has changed since ssh 1 ?
X   ------------------------------
X
X      - ssh has been 98% rewritten
X
X      - support other key-exchange methods besides double-encrypting
X        rsa key exchange. The current distribution comes with Diffie-Hellman
X        key exchange.
X
X      - support for DSA and other public key algorithms besides RSA.
X
X      - the protocol is more secure and allows future integration into
X        public key infrastructures
X
X      - the protocol complies with upcoming `secsh' internet standard.
X
X      - support for "subsystems", platform-independent modules that
X        implement particular functions such as file transfers
X
X      - built-in SOCKS support
X
X      - new feature: sftp, the secure file transfer protocol (name will
X        probably change)
X
X
X   Feedback
X   --------
X
X      bugs:   ssh2-bugs@ssh.fi
X      other:  ssh2@ssh.fi
X
X
X
XSSH2 Binaries
X=============
X
X      ssh2            ssh2 client.
X
X      sshd2           ssh2 daemon.
X
X      sftp2           sftp client (needs ssh2). Type "?" in the command line
X                      for help.
X
X      sftp-server2    sftp server (executed by sshd2).
X
X      scp2            scp client
X
X      ssh-keygen2     utility for generating keys. -h for help.
X
X      ssh-add2        add identities to the authentication agent.
X
X      ssh-agent2      the authentication agent
X
X      ssh-askpass2    X11 utility for querying passwords.
END-of-ssh2/pkg/DESCR
echo x - ssh2/pkg/README
sed 's/^X//' >ssh2/pkg/README << 'END-of-ssh2/pkg/README'
XSSH 2.0.11
X==============
X
X        Timo J. Rinne <tri@ssh.fi>
X	Sami Lehtinen <sjl@ssh.fi>
X        16 November 1998
X	
X	See file LICENSING for licensing terms.
X
X	See file SSH2.QUICKSTART for Mr. Yamamoto's guide on
X	installing and using ssh2 and ssh1 in compatibility mode.
X
X   What has changed since ssh 1 ?
X   ------------------------------
X
X      - ssh has been 98% rewritten
X
X      - support other key-exchange methods besides double-encrypting
X        rsa key exchange. The current distribution comes with Diffie-Hellman
X        key exchange.
X
X      - support for DSA and other public key algorithms besides RSA.
X
X      - the protocol is more secure and allows future integration into
X        public key infrastructures
X
X      - the protocol complies with upcoming `secsh' internet standard.
X
X      - support for "subsystems", platform-independent modules that
X        implement particular functions such as file transfers
X
X      - built-in SOCKS support
X
X      - new feature: sftp, the secure file transfer protocol (name will
X        probably change)
X
X
X   Feedback
X   --------
X
X      bugs:   www-form: http://www.ssh.fi/support/bug-report.html
X              email:    ssh2-bugs@ssh.fi
X
X      other: ssh2@ssh.fi
X
X      feature-requests can also be submitted via
X      http://www.ssh.fi/support/feature-request.html
X
XSSH2 Binaries
X=============
X
X      ssh2            ssh2 client.
X
X      sshd2           ssh2 daemon.
X
X      sftp2           sftp client (needs ssh2). Type "?" in the command line
X                      for help.
X
X      sftp-server2    sftp server (executed by sshd2).
X
X      scp2            scp client
X
X      ssh-keygen2     utility for generating keys. -h for help.
X
X      ssh-add2        add identities to the authentication agent.
X
X      ssh-agent2      the authentication agent
X
X      ssh-askpass2    X11 utility for querying passwords.
X
X
X
XInstallation
X============
X
X   1. uncompress the distribution
X   ------------------------------
X
X      > zcat ssh-2.0.x.tar.gz | tar xf -
X
X      This should create a subdirectory ssh-2.0.x.
X
X      > cd ssh-2.0.x
X
X
X   2. compile ssh2
X   ---------------
X
X      Read the NOTES-section found in the end of this file.
X
X      > ./configure
X      > make
X
X      If this fails, find and fix the problem. Report it to ssh2-bugs@ssh.fi.
X      Try again :-)
X
X   3. run the install script
X   -------------------------
X
X      Get a root shell and change to the ssh-2.0.x directory.
X
X      # make install
X
X      This should set everything up and create the host key.
X
X      The old files are moved to *.old names. If you don't want them
X      around, goto apps/ssh and run 
X
X      # make clean-up-old
X
X      which will delete them.
X
X      NOTE: This host key has relatively little entropy. We'll have
X            to actually stir in more randomness to create strong
X            keys. We'll fix this later..
X
X   4. configure sshd2
X   ------------------
X
X      Set up the following files:
X
X
Xssh 2 files
X===========
X
X      Public keys have a .pub suffix, private keys have none. Example:
X
X         id_dsa_1024_a        A 1024-bit DSA private key
X         id_dsa_1024_a.pub    Corresponding public key
X
X      There is no "known_hosts", as in ssh1. The host keys are stored
X      in separate files in ~/.ssh2/hostkeys .
X
X
X   ~/.ssh2/hostkeys/key_xxxx_yyyy.pub
X   -----------------------------
X
X      would be the public host key of the ssh2 daemon running in port xxxx
X      of the host yyyy.
X
X
X   /etc/ssh2/hostkey.pub  and  /etc/ssh2/hostkey
X   -----------------------------------------
X
X      Public and private hostkeys for sshd2. Created by "make install".
X
X
X   ~/.ssh2/identification
X   ----------------------
X
X      Lists the private keys that can be used for authentication.
X
X         # identification
X         IdKey  id_dsa_1024_a
X
X      This means that the private key in the file ~/.ssh2/id_dsa_1024_a
X      is used for public key authentication.
X
X
X   ~/.ssh2/authorization
X   ---------------------
X
X      Lists the public keys that are accepted for authentication on this
X      host.
X
X         # authorization
X         Key     id_dsa_1024_a.pub
X
X      This means that anyone, who holds the matching private key to the
X      public key in the file $USER/.ssh2/id_dsa_1024_a.pub can log in as
X      $USER.
X
X
X   /etc/ssh2/sshd2_config
X   --------------------
X
X      Server configuration file. Copied here by "make install". See man
X      page for details.
X
X      The line:
X
X         subsystem-sftp                  sftp-server
X
X      means that when when a subsystem "sftp" is requested, the
X      command "sftp-server" is started. For example, if our sshd2_config
X      read:
X
X         subsystem-quux                  echo "fiu poks pam"
X
X      the command "ssh2 host -s quux" would simply print the text
X      "fiu poks pam".
X
X
X   ~/.ssh2/ssh2_config
X   -------------------
X
X       Client configuration file. See the global client config file
X       ssh2_config in /etc/ssh2.
X
X
XPlatforms
X=========
X
X	Ssh 2.0 has been reportedly succesfully compiled and
X	run on the following platforms.
X
X	Processor	OS		OS-Versions
X	-------------------------------------------------------------
X	ix86		NetBSD		1.2, 1.3
X	ix86		FreeBSD		2.2.x, 3.0-current
X	ix86		Linux		2.0.34
X	sparc		Solaris		2.6, 2.5.1
X	PowerPC		AIX		4.1, 4.2.x
X	hppa1.1		HPUX		10.20
X	mips		IRIX		6.2
X
XNOTES ON INSTALLATION AND USE
X=============================
X
X	* Use 'scp2 -1' to enable compatibility with scp1.
X
X	* If your system doesn't support, or has a broken version of
X	  non-blocking connect, run ./configure with
X	  -enable-blocking-connect .
X
X	* If you get errors when compiling assembler files, configure
X	  with --disable-asm and recompile.
X
X	* compability with ssh1 works correctly ONLY IF your ssh1-version
X	  is 1.2.26 or better (1.2.26 is the latest). So be sure you have
X	  that!
X
X	* If your Sun boots during a connect to sshd2, do the following.
X	  Fetch the latest patches from Sun, generate a new hostkey with the
X	  patched version, and try again (also, you might want to try
X	  --enable-blocking-connect etc).
X
X	* if configure complains 'configure: error: configuring with X
X	  but xauth not found - aborting', try ./configure --without-x .
X
X	* Use 'ssh-keygen -P' to create keys without passphrases (for
X	  use with rsync etc.).
X
X	* configure option --disable-crypt-asm no longer exists.
X
XKNOWN BUGS
X==========
X
X	* When using the '-p' option together with '-r' option,
X	  directory modification times are not properly set. 
X
X	* Assembler-optimizations don't compile on BSDI. configure
X	  with --disable-asm.
X
X	* Reportedly sshd2 child process can sometimes end up in a
X	  busy loop on the server side, consuming CPU-time. (this has been
X	  reported mainly on Solaris, and some other systems as well). Haven't
X	  been able to reproduce this, so no fix is currently available.
X
X	* Reportedly sshd2 doesn't for correctly to background on some
X	  AIX systems. We haven't been able to reproduce this.
X	
X	* ssh-keygen2 dumps core on Linux/PowerPC environments. This
X	  is probably due to egcs's different arg_list. Matter is
X	  being investigated, and a patch/release will be released as
X	  soon as this bug is found and fixed.
X
X	* With C2 security package, all the C2 charasteristics are not
X	  properly used.
X
XREMEMBER
X========
X
X* Ssh compilation success/failure web-page. You can fill in the reply
X  form about your compilation at
X  <URL:http://www.ssh.fi/tech/ssh_form.html>. You can query about the
X  success/failure database from
X  <URL:http://www.ssh.fi/tech/ssh_query.html>.
X
X* Latest news about ssh can be found in
X  <URL:http://www.ssh.fi/sshprotocols2/>;
X
XTHANKS
X======	
X	...to everyone who contributed to ssh2. If you feel that your
X	name should be in this list, write mail to ssh2@ssh.fi. These
X	are in no particular order.
X
X	Dug Song
X	Andreas Ley
X	Troy Barbee
X	Simon Burge
X	Luigi Pugnetti
X	Youki Kadobayashi
X	Georgi Kuzmanov
X	Hirotaka Yamamoto
X
X	... and everyone else who submitted bug-reports,
X	feature-requests and patches.
X
END-of-ssh2/pkg/README
echo x - ssh2/pkg/COMMENT
sed 's/^X//' >ssh2/pkg/COMMENT << 'END-of-ssh2/pkg/COMMENT'
XSecure shell and ftp client/server ver 2(remote login program).
END-of-ssh2/pkg/COMMENT
echo x - ssh2/pkg/LICENSING
sed 's/^X//' >ssh2/pkg/LICENSING << 'END-of-ssh2/pkg/LICENSING'
XPLEASE READ THESE TERMS CAREFULLY BEFORE USING THIS SOFTWARE
X
XCopyright (C) 1995-1998 SSH Communications Security Ltd., Finland
X<http://www.ssh.fi>.  All rights reserved.  SSH and Secure Shell are
Xtrademarks or registered trademarks of SSH Communications Security Ltd.
X
XTHERE IS NO WARRANTY OF ANY KIND FOR THIS SOFTWARE. THIS SOFTWARE IS FOR
XNON-COMMERCIAL USE ONLY. 
X
XPlease contact Data Fellows <http://www.datafellows.com/>; for commercial
Xlicensing.
X
X==============================================================
X
XLICENSE AGREEMENT 
X
XThis LICENSE is a legal contract between you and SSH Communications
XSecurity Ltd.  This LICENSE grants you certain rights; without a license,
Xyou are not allowed to use, distribute, or modify this software.  BY
XUSING, DOWNLOADING, DISTRIBUTING, OR MODIFYING THE SOFTWARE, YOU ARE
XCONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT.
X
X
XSSH Communications Security may revise these terms at any time and the
Xrevised terms shall apply to the corresponding versions of the SOFTWARE
Xdistributed with the revised terms.
X
X
XFor the purposes of this license agreement,
X
XSOFTWARE shall mean the SSH 2.0 (Secure Shell) software package in source
Xcode or compiled form, its documentation, as distributed with this license
Xagreement, and any other derivative work based on it.
X
XLICENSOR shall mean SSH Communications Security Ltd.
X
XLICENSEE shall mean you, the natural or legal person or organization
Xusing, distributing, or modifying the SOFTWARE under this LICENSE.
X
XNON-COMMERCIAL USE shall mean the following uses of the SOFTWARE: 
X
Xa) any use done outside and without connection to a commercial
X   organization and commercial activity,
X
Xb) use related to leisure time activities by private individuals,
X   including hobbies, games, etc. provided however that such use is not
X   commenced with commercial companies.
X
XUses not considered as NON-COMMERCIAL USE include, but are not
Xlimited to: 
X
Xa) any use where commercial activity is involved and where the use
X   in any way, directly or indirectly, aims at monetary or other
X   commercial benefit,
X
Xb) any use that takes place in commercial, governmental, military,
X   or similar organizations and where a salary or similar monetary
X   compensation is paid, unless the use can be considered to be 
X   EDUCATIONAL USE or is purely for charity.
X
XEDUCATIONAL USE shall include the following uses of the software:
X
Xa) use for receiving education (i.e. students) with the assistance of the
X   SOFTWARE for activities directly related to studying (homework,
X   projects). A monetary or other compensation is allowed to be paid for
X   these activities as long as the primary purpose is education, 
X
Xb) use for giving education (i.e. teachers), including gathering,
X   modifying, and disseminating information,
X
Xc) using the SOFTWARE as teaching material, provided however that the
X   intellectual property rights of the LICENSOR are not infringed.
X
Xd) use for system administration (i.e. administration of computing resources) 
X   in educational institutions.
X
XUses not considered as EDUCATIONAL USE include, but are not limited to:
X
Xa) use by students in projects or activities that are funded or otherwise
X   compensated by commercial organizations and are not directly related to
X   studying,
X
Xb) use for research when the primary occupation of the researcher is not
X   teaching and little or no contribution is given to teaching activities,
X
Xc) administrative tasks in educational institutions (excluding system 
X   administration) when administration is the primary purpose for using the 
X   software. 
X
XRIGHT TO USE FREE OF CHARGE
X
XThe LICENSOR grants the LICENSEE a non-exclusive, non-transferable,
Xroyalty-free, limited right to use the SOFTWARE for NON-COMMERCIAL or
XEDUCATIONAL USE in each and every country where the SOFTWARE can be
Xlegally used, provided at least one of the following applies to the
XLICENSEE:
X
XEVALUATION. The LICENSEE may use the SOFTWARE for a limited time for the
Xpurpose of evaluating the SOFTWARE.  The evaluation period is limited to
Xsixty (60) days from the date hereof for each LICENSEE.
X
XINVIDUALS.  Private natural persons may use the SOFTWARE for personal,
XNON-COMMERCIAL USE.
X
XEDUCATIONAL INSTITUTIONS.  Qualifying non-profit educational institutions
Xmay use the SOFTWARE for educational purposes only, and employees and
Xregistered students of such educational institutions may use the SOFTWARE
Xon their home computers, for NON-COMMERCIAL USE or EDUCATIONAL USE.
XResearch laboratories and other research institutions whose primary
Xpurpose is not education are not considered educational institutions for
Xthe purposes of this LICENSE.
X
XCHARITY ORGANIZATIONS. Institutions or funds whose intention is to help
Xthe needy on charity basis and which do not operate for profit,  including
Xemployees and volunteers of such organizations, may use  the SOFTWARE free
Xof charge for NON-COMMERCIAL USE in activities directly related to the
Xoperations of such an organization.
X
X
XIf none of the above applies to the LICENSEE, commercial licensing of the
XSOFTWARE is required before the LICENSEE can use the SOFTWARE. 
X
X
XRIGHT TO DISTRIBUTE
X
XThe LICENSEE may make and distribute verbatim copies of the SOFTWARE,
Xprovided that the LICENSEE complies with all restrictions and obligations
Xset forth in this LICENSE and that an unmodified copy of this LICENSE is
Xdistributed with the SOFTWARE.
X
XNo fee may be charged for distribution of this SOFTWARE under this
XLICENSE.  However, as an exception, the SOFTWARE may be put on a floppy or
XCD-ROM containing other free software or evaluation software, and a modest
Xfee may be charged for the floppy or CD-ROM, or for a book or magazine
Xcontaining the floppy or CD-ROM.
X
XBundling the SOFTWARE with a primarily commercial product, other than
Xdistributions of free software specifically excluded above, is not allowed
Xunder this LICENSE, and requires separate commercial licensing.
X
X
XRIGHT TO MAKE MODIFICATIONS AND COMPILATIONS
X
XThe LICENSEE may create derived works (modified versions) based on the
XSOFTWARE, and distribute such derived works, provided that
X
X1. any modified versions are conspicuously identified as such, 
X
X2. the derived work does not without permission use the names SSH or
X   Secure Shell, or other trademarks of the LICENSOR or its distributors
X   or agents, 
X
X3. the derived work is distributed under terms identical or not more
X   favorable to this LICENSE and contains a copy of this LICENSE,
X
X4. no copyright notices or other similar intellectual property notices are
X   removed, The LICENSEE shall reproduce and apply any copyright or other
X   property rights notices included on or embedded in Licensed Software to
X   any copies or modifications, in whole or in part, in any form,
X
X5. the modifications do not introduce any security bugs, backdoors, trojan
X   horses, or other malicious code, to the best knowledge of the LICENSEE,
X   and
X
X6. the LICENSEE gives the LICENSOR a non-exclusive, royalty-free right to
X   use, modify, distribute, sublicense and otherwise exploit any such
X   modifications as part of other versions of the SOFTWARE and/or in other
X   products, without separately identifying the parties whose
X   modifications are being used. The LICENSOR shall do its best effort to
X   give due credit to any significant contributions, but gives no warranty
X   thereof. This clause also applies to any modifications to the SOFTWARE
X   (including but not limited to patches, context diffs, etc.) that are
X   published in any 0way, including but not limited to mailing lists,
X   books or other publications, newsgroups, WWW pages, letters, faxes, or
X   e-mail, or otherwise directly or indirectly communicated to SSH
X   Communications Security Ltd, even if they are stored and communicated
X   separately from the SOFTWARE. BY MODIFYING THE SOFTWARE OR DISTRIBUTING
X   SUCH MODIFICATIONS, THE LICENSEE IMPLICITLY GIVES SSH COMMUNICATIONS
X   SECURITY LTD THE RIGHTS SPECIFIED HEREIN TO ANY SUCH MODIFICATIONS.
X
X
XModified versions of the SOFTWARE complying with the terms set out in this
Xsection may be distributed by the LICENSEE under the same terms and
Xconditions set forth for the original SOFTWARE.
X
X
XNO WARRANTY
X
XBECAUSE THE SOFTWARE IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
XTHE SOFTWARE, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
XOTHERWISE STATED IN WRITING, THE LICENSOR PROVIDES THE SOFTWARE "AS IS"
XWITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT
XNOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
XA PARTICULAR PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE
XOF THE PROGRAM LIES WITH THE LICENSEE. SHOULD THE SOFTWARE PROVE
XDEFECTIVE, THE LICENSEE ALONE SHALL ASSUME THE COST OF ALL NECESSARY
XSERVICING, REPAIR OR CORRECTION.
X
XIN NO EVENT UNLESS AGREED TO IN WRITING BY LICENSOR WILL THE LICENSOR BE
XLIABLE TO THE LICENSEE OR ANY THIRD PARTY FOR DAMAGES, INCLUDING ANY
XDIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL
XDAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE
X(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
XSERVICES; LOSS OF USE, INFORMATION, OR PROFITS; OR BUSINESS INTERRUPTION
XOR INFRINGEMENT OF THIRD INDUSTRIAL PROPERTY RIGHT OR SIMILAR), EVEN IF
XTHE LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
X
X
XMAINTENANCE AND SUPPORT
X
XLICENSOR shall have no obligation to provide maintenance or support for
Xthe SOFTWARE.
X
X
XADHERENCE TO LOCAL REGULATIONS REGARDING CRYPTOGRAPHIC SOFTWARE
X
XThe SOFTWARE contains cryptographic algorithms and technology.  Some
Xcountries restrict the export, import, or use of such technologies.
X
XThe LICENSEE accepts full responsibility for its compliance with any
Xregulations pertaining to cryptographic technology, including but not
Xlimited to the United States Export Administration Act and the Wassenaar
Xarrangement.  In no situation shall the LICENSOR be liable for any
Xviolation of such regulations by the LICENSEE.
X
XThe LICENSEE shall be fully responsible for obtaining any information
Xabout the required permits and acquiring the necessary permits that may be
Xrequired by local or other applicable regulations for using or
Xdistributing the SOFTWARE.
X
X
XPATENT LICENSES AND INDEMNIFICATION
X
XThe LICENSEE shall be responsible for obtaining any patent licenses
Xrequired for using the SOFTWARE in any particular country.  The LICENSEE
Xagrees to indemnify and hold the LICENSOR harmless against any claims or
Xawards arising out of LICENSEE's use of the SOFTWARE under this LICENSE.
X
X
XMISCELLANEOUS
X
XNo rights are granted to the SOFTWARE except those expressly set forth
Xherein.  The LICENSEE may not copy, modify, rent, lease, sublicense, or
Xdistribute the SOFTWARE except as expressly provided under this LICENSE.
XAny attempt otherwise to copy, modify, sublicense or distribute the
XSOFTWARE is void, and will automatically terminate LICENSEE's rights under
Xthis LICENSE.
X
XThis LICENSE shall not affect in any way any other confidentiality,
Xlicensing, or other agreement between the LICENSEE and the LICENSOR.
X
X
XTERM AND TERMINATION
X
XThis LICENSE is valid until terminated, and will terminate immediately
Xwithout notice if the LICENSEE is in breach of any of its terms and
Xconditions.  The LICENSEE may terminate this LICENSE at any time by
Xdestroying the SOFTWARE and all copies thereof.
X
XUpon termination of this LICENSE, the LICENSEE must destroy all copies of
Xthe SOFTWARE and any derived works thereof.  Terms and conditions
Xconcerning no warranty, limitation of liability, and indemnification of
Xthe LICENSOR shall survive any termination of this LICENSE.  People or
Xorganizations who received copies of the SOFTWARE from LICENSEE under this
XLICENSE before termination of the LICENSE shall not have their licenses
Xterminated, as long as they remain in full compliance.
X
X
XJURISDICTION
X
XThis LICENSE shall be governed by the laws of Finland.
X
XAny dispute arising out of this Agreement shall be finally settled by
Xarbitration in accordance with the arbitration rules of the Finnish
XCentral Chamber of Commerce in Helsinki. 
X
XThe LICENSOR shall, however, have an option, notwithstanding the
Xarbitration clause above, to initiate legal proceedings based on a breach
Xof this Agreement in any court having jurisdiction over the LICENSEE.
X
X
X
X
END-of-ssh2/pkg/LICENSING
echo c - ssh2/files
mkdir -p ssh2/files > /dev/null 2>&1
echo x - ssh2/files/md5
sed 's/^X//' >ssh2/files/md5 << 'END-of-ssh2/files/md5'
XMD5 (ssh-2.0.11.tar.gz) = 2c93c5fa0cb530178bee8675e92be785
XMD5 (ssh-2.0.10.tar.gz) = ffb3562c814fdba7415373668c26f2e3
XMD5 (rsaref2.tar.gz) = 0b474c97bf1f1c0d27e5a95f1239c08d
END-of-ssh2/files/md5
echo x - ssh2/files/rsa64.diff
sed 's/^X//' >ssh2/files/rsa64.diff << 'END-of-ssh2/files/rsa64.diff'
X*** rsaref2/source/global.h.ORIG	Fri Sep 25 15:37:07 1998
X--- rsaref2/source/global.h	Fri Sep 25 15:37:56 1998
X***************
X*** 19,29 ****
X--- 19,36 ----
X  /* POINTER defines a generic pointer type */
X  typedef unsigned char *POINTER;
X  
X+ #if 0
X  /* UINT2 defines a two byte word */
X  typedef unsigned short int UINT2;
X  
X  /* UINT4 defines a four byte word */
X  typedef unsigned long int UINT4;
X+ #else
X+ #include <sys/types.h>
X+ 
X+ typedef u_int16_t UINT2;
X+ typedef u_int32_t UINT4;
X+ #endif
X  
X  #ifndef NULL_PTR
X  #define NULL_PTR ((POINTER)0)
END-of-ssh2/files/rsa64.diff
exit

>Description:
>How-To-Repeat:
>Fix:
>Audit-Trail:
>Unformatted:

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199811202245.RAA26566>