old
authorMike Frysinger <vapier@gentoo.org>
Sat, 30 Dec 2006 02:02:59 +0000 (02:02 +0000)
committerMike Frysinger <vapier@gentoo.org>
Sat, 30 Dec 2006 02:02:59 +0000 (02:02 +0000)
net-misc/openssh/files/digest-openssh-4.3_p2-r1 [deleted file]
net-misc/openssh/openssh-4.3_p2-r1.ebuild [deleted file]

diff --git a/net-misc/openssh/files/digest-openssh-4.3_p2-r1 b/net-misc/openssh/files/digest-openssh-4.3_p2-r1
deleted file mode 100644 (file)
index b73ff11..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
-MD5 7dd2a6716b81da33af4ca960185fdd1b openssh-4.3p1-hpn11.diff 11024
-RMD160 c3b807437fd9f40f2ab73c52586de194b84cce6e openssh-4.3p1-hpn11.diff 11024
-SHA256 0a0b0e07bd845fdbf2112769c426a3b47b795076c8459f6dbc3e7c9060abb740 openssh-4.3p1-hpn11.diff 11024
-MD5 3611a21a0098c32416d4b8f75232c796 openssh-4.3p2+SecurID_v1.3.2.patch 47650
-RMD160 90c719e8b7576d06bda5fdfb86287bfa577c5e1a openssh-4.3p2+SecurID_v1.3.2.patch 47650
-SHA256 d6fc92a11c23f3fa0c77f50e6d76cb6c6635ae4907df724a12e460b90c90e988 openssh-4.3p2+SecurID_v1.3.2.patch 47650
-MD5 c60e16b0bdf3a825f2a2b501b34cdef4 openssh-4.3p2+x509-5.3.diff.gz 131147
-RMD160 d42a7e14b72bf850b9898e3707582b4b345ca27b openssh-4.3p2+x509-5.3.diff.gz 131147
-SHA256 768c44ae60b57e7571843996255204c1678736fb16616e965844bda982ebd44d openssh-4.3p2+x509-5.3.diff.gz 131147
-MD5 7e9880ac20a9b9db0d3fea30a9ff3d46 openssh-4.3p2.tar.gz 941455
-RMD160 ccd5967e3296347e6dd2be43c3d6caacde2b6833 openssh-4.3p2.tar.gz 941455
-SHA256 4ba757d6c933e7d075b6424124d92d197eb5d91e4a58794596b67f5f0ca21d4f openssh-4.3p2.tar.gz 941455
-MD5 d9eacb819a73daddb3d21ca7aa8e5c25 openssh-lpk-4.3p1-0.3.7.patch 60451
-RMD160 fda93b8ee3ef9b633947784fe84a9eed2acbd325 openssh-lpk-4.3p1-0.3.7.patch 60451
-SHA256 0bcfa28804caf685de2248ddc966666196f6df81d1d058066f2da17714518af4 openssh-lpk-4.3p1-0.3.7.patch 60451
diff --git a/net-misc/openssh/openssh-4.3_p2-r1.ebuild b/net-misc/openssh/openssh-4.3_p2-r1.ebuild
deleted file mode 100644 (file)
index d3613b6..0000000
+++ /dev/null
@@ -1,172 +0,0 @@
-# Copyright 1999-2006 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/openssh/openssh-4.3_p2-r1.ebuild,v 1.19 2006/12/07 08:44:26 flameeyes Exp $
-
-inherit eutils flag-o-matic ccc pam
-
-# Make it more portable between straight releases
-# and _p? releases.
-PARCH=${P/_/}
-
-X509_PATCH="${PARCH}+x509-5.3.diff.gz"
-SECURID_PATCH="${PARCH}+SecurID_v1.3.2.patch"
-LDAP_PATCH="${PARCH/-4.3p2/-lpk-4.3p1}-0.3.7.patch"
-HPN_PATCH="${PARCH/p2/p1}-hpn11.diff"
-
-DESCRIPTION="Port of OpenBSD's free SSH release"
-HOMEPAGE="http://www.openssh.com/"
-SRC_URI="mirror://openbsd/OpenSSH/portable/${PARCH}.tar.gz
-       hpn? ( http://www.psc.edu/networking/projects/hpn-ssh/${HPN_PATCH} )
-       X509? ( http://roumenpetrov.info/openssh/x509-5.3/${X509_PATCH} )
-       smartcard? ( http://www.omniti.com/~jesus/projects/${SECURID_PATCH} )
-       ldap? ( http://www.opendarwin.org/projects/openssh-lpk/files/${LDAP_PATCH} )"
-
-LICENSE="as-is"
-SLOT="0"
-KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
-IUSE="ipv6 static pam tcpd kerberos skey selinux chroot X509 ldap smartcard sftplogging hpn libedit"
-
-RDEPEND="pam? ( virtual/pam )
-       kerberos? ( virtual/krb5 )
-       selinux? ( >=sys-libs/libselinux-1.28 )
-       skey? ( >=app-admin/skey-1.1.5-r1 )
-       ldap? ( net-nds/openldap )
-       libedit? ( dev-libs/libedit )
-       >=dev-libs/openssl-0.9.6d
-       >=sys-libs/zlib-1.2.3
-       smartcard? ( dev-libs/opensc )
-       tcpd? ( >=sys-apps/tcp-wrappers-7.6 )
-       sys-apps/shadow"
-
-DEPEND="${RDEPEND}
-       virtual/os-headers
-       sys-devel/autoconf"
-
-
-PROVIDE="virtual/ssh"
-
-S=${WORKDIR}/${PARCH}
-
-src_unpack() {
-       unpack ${PARCH}.tar.gz
-       cd "${S}"
-
-       sed -i \
-               -e '/_PATH_XAUTH/s:/usr/X11R6/bin/xauth:/usr/bin/xauth:' \
-               pathnames.h || die
-
-       epatch "${FILESDIR}"/openssh-4.3_p2-configure.patch #137921
-       epatch "${FILESDIR}"/openssh-4.3_p1-krb5-typos.patch #124494
-       use X509 && epatch "${DISTDIR}"/${X509_PATCH}
-       use sftplogging && epatch "${FILESDIR}"/openssh-4.2_p1-sftplogging-1.4-gentoo.patch.bz2
-       use chroot && epatch "${FILESDIR}"/openssh-3.9_p1-chroot.patch
-       if use X509 ; then
-               cp "${FILESDIR}"/openssh-4.3_p2-selinux.patch .
-               epatch "${FILESDIR}"/openssh-4.3_p2-selinux.patch.glue ./openssh-4.3_p2-selinux.patch
-       else
-               epatch "${FILESDIR}"/openssh-4.3_p2-selinux.patch
-       fi
-       use smartcard && epatch "${FILESDIR}"/openssh-3.9_p1-opensc.patch
-       if ! use X509 ; then
-               if [[ -n ${SECURID_PATCH} ]] && use smartcard ; then
-                       epatch "${DISTDIR}"/${SECURID_PATCH}
-                       use ldap && epatch "${FILESDIR}"/openssh-4.0_p1-smartcard-ldap-happy.patch
-               fi
-               if use ldap ; then
-                       use sftplogging \
-                               && ewarn "Sorry, sftplogging and ldap don't get along, disabling ldap" \
-                               || epatch "${DISTDIR}"/${LDAP_PATCH}
-               fi
-       elif [[ -n ${SECURID_PATCH} ]] && use smartcard || use ldap ; then
-               ewarn "Sorry, x509 and smartcard/ldap don't get along"
-       fi
-       [[ -n ${HPN_PATCH} ]] && use hpn && epatch "${DISTDIR}"/${HPN_PATCH}
-
-       sed -i '/LD.*ssh-keysign/s:$: '$(bindnow-flags)':' Makefile.in || die "setuid"
-
-       autoconf || die "autoconf failed"
-}
-
-src_compile() {
-       addwrite /dev/ptmx
-       addpredict /etc/skey/skeykeys #skey configure code triggers this
-
-       local myconf
-       # make sure .sbss is large enough
-       use skey && use alpha && append-ldflags -mlarge-data
-       if use ldap ; then
-               filter-flags -funroll-loops
-               myconf="${myconf} --with-ldap"
-       fi
-       use selinux && append-flags -DWITH_SELINUX && append-ldflags -lselinux
-
-       if use static ; then
-               append-ldflags -static
-               use pam && ewarn "Disabling pam support becuse of static flag"
-               myconf="${myconf} --without-pam"
-       else
-               myconf="${myconf} $(use_with pam)"
-       fi
-
-       use ipv6 || myconf="${myconf} --with-ipv4-default"
-
-       econf \
-               --with-ldflags="${LDFLAGS}" \
-               --disable-strip \
-               --sysconfdir=/etc/ssh \
-               --libexecdir=/usr/$(get_libdir)/misc \
-               --datadir=/usr/share/openssh \
-               --disable-suid-ssh \
-               --with-privsep-path=/var/empty \
-               --with-privsep-user=sshd \
-               --with-md5-passwords \
-               $(use_with libedit) \
-               $(use_with kerberos kerberos5 /usr) \
-               $(use_with tcpd tcp-wrappers) \
-               $(use_with skey) \
-               $(use_with smartcard opensc) \
-               ${myconf} \
-               || die "bad configure"
-
-       emake || die "compile problem"
-}
-
-src_install() {
-       make install-nokeys DESTDIR="${D}" || die
-       fperms 600 /etc/ssh/sshd_config
-       dobin contrib/ssh-copy-id
-       newinitd "${FILESDIR}"/sshd.rc6 sshd
-       newconfd "${FILESDIR}"/sshd.confd sshd
-       keepdir /var/empty
-
-       newpamd "${FILESDIR}"/sshd.pam_include sshd
-       dosed "/^#Protocol /s:.*:Protocol 2:" /etc/ssh/sshd_config
-       use pam \
-               && dosed "/^#UsePAM /s:.*:UsePAM yes:" /etc/ssh/sshd_config \
-               && dosed "/^#PasswordAuthentication /s:.*:PasswordAuthentication no:" /etc/ssh/sshd_config
-
-       doman contrib/ssh-copy-id.1
-       dodoc ChangeLog CREDITS OVERVIEW README* TODO sshd_config
-}
-
-pkg_postinst() {
-       enewgroup sshd 22
-       enewuser sshd 22 -1 /var/empty sshd
-
-       ewarn "Remember to merge your config files in /etc/ssh/ and then"
-       ewarn "restart sshd: '/etc/init.d/sshd restart'."
-       ewarn
-       einfo "As of version 3.4 the default is to enable the UsePrivelegeSeparation"
-       einfo "functionality, but please ensure that you do not explicitly disable"
-       einfo "this in your configuration as disabling it opens security holes"
-       einfo
-       einfo "This revision has removed your sshd user id and replaced it with a"
-       einfo "new one with UID 22.  If you have any scripts or programs that"
-       einfo "that referenced the old UID directly, you will need to update them."
-       einfo
-       if use pam ; then
-               einfo "Please be aware users need a valid shell in /etc/passwd"
-               einfo "in order to be allowed to login."
-               einfo
-       fi
-}