Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 9 | Rev 11 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
10 magnus 1
Source: lsh-utils
2 magnus 2
Section: net
3
Priority: extra
4
Maintainer: Simon Law <sfllaw@debian.org>
5
Uploaders: Stefan Pfetzing <dreamind@dreamind.de>,
6
 Magnus Holmgren <magnus@kibibyte.se>
7
Standards-Version: 3.7.2
8 magnus 8
Build-Depends: cdbs, debhelper (>= 4.1.16), dpatch, autotools-dev,
9
 libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, libnettle-dev,
10
 texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev,
11
 libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4
2 magnus 12
 
13
Package: lsh-utils
14
Architecture: any
15
Depends: lsh-client, ${shlibs:Depends}
16
Recommends: lsh-server
6 magnus 17
Suggests: lsh-doc
2 magnus 18
Description: Secure Shell v2 (SSH2) protocol utilities
19
 lsh is GNU GPL'd implementation of the Secure Shell
20
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
21
 is a secure replacement for rlogin, rsh and rcp.
22
 .
23
 This package contains the lsh utilities. This includes
24
 programs such as lsh-keygen, lsh-writekey (both programs
25
 for public/private key generation), lsh-authorize (for
26
 automatic remote key authentication), sexp-conv and ssh-conv
27
 (utilities for converting between various public & private
28
 key formats), and a number of other utilities for use with
29
 both the lsh server and client.
30
 .
31
 In some countries it may be illegal to use any encryption
32
 at all without a special permit.
33
 
34
Package: lsh-server
35
Architecture: any
36
Provides: ssh-server
37
Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, debconf (>= 1.2.0) | debconf-2.0
38
Conflicts: lsh-utils (<< 1.0.2-3)
39
Suggests: lsh-client | openssh-client
40
Description: Secure Shell v2 (SSH2) protocol server
41
 lsh is GNU GPL'd implementation of the Secure Shell
42
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
43
 is a secure replacement for rlogin, rsh and rcp.
44
 .
45
 This package contains the lsh server, lshd. This package is required
46
 to allow SSH2 logins to the local machine.
47
 .
48
 In some countries it may be illegal to use any encryption
49
 at all without a special permit.
50
 
51
Package: lsh-client
52
Architecture: any
53
Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}
9 magnus 54
Conflicts: lsh-utils (<< 2.0.4-dfsg-1)
55
Replaces: lsh-utils (<< 2.0.4-dfsg-1)
2 magnus 56
Description: Secure Shell v2 (SSH2) protocol client
57
 lsh is GNU GPL'd implementation of the Secure Shell
58
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
59
 is a secure replacement for rlogin, rsh and rcp.
60
 .
61
 This package contains the lsh client. This package is
62
 required to log into a remote lsh or ssh2 server. Please
63
 note that the client binary is normally called 'lsh' rather
64
 than 'lshc', but as there is already a 'lsh' binary in
65
 Debian (the Limited SHell - see the 'lsh' package), the
66
 client binary has been renamed to 'lshc'. All the other
67
 program names remain as normal.
68
 .
69
 In some countries it may be illegal to use any encryption
70
 at all without a special permit.
71
 
72
Package: lsh-doc
73
Architecture: all
74
Section: doc
75
Suggests: lsh-utils, lsh-server, lsh-client
9 magnus 76
Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1)
77
Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1)
2 magnus 78
Description: Secure Shell v2 (SSH2) client / server / utilities documentation
79
 lsh is GNU GPL'd implementation of the Secure Shell
80
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
81
 is a secure replacement for rlogin, rsh and rcp.
82
 .
83
 This package contains the lsh documentation, including info
84
 pages, manpages about the various protocols which lsh uses,
85
 as well as various documents about lsh internals, protocols
86
 and general lsh development.
87
 .
88
 In some countries it may be illegal to use any encryption
89
 at all without a special permit.