Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 150 | Rev 154 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
10 magnus 1
Source: lsh-utils
2 magnus 2
Section: net
151 magnus 3
Priority: optional
23 magnus 4
Maintainer: Magnus Holmgren <holmgren@debian.org>
5
Uploaders: Stefan Pfetzing <dreamind@dreamind.de>
144 magnus 6
Standards-Version: 3.9.8
150 magnus 7
Build-Depends: dpkg-dev (>= 1.15.7), debhelper (>= 9.20160709), dh-autoreconf, automake,
149 magnus 8
 libgmp-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, nettle-dev (>= 3.4~), nettle-bin,
135 magnus 9
 texinfo (>= 4.2), libkrb5-dev, libwrap0-dev | libwrap-dev,
67 magnus 10
 libpam0g-dev | libpam-dev, libreadline-dev, m4
11 magnus 11
Homepage: http://www.lysator.liu.se/~nisse/lsh/
2 magnus 12
 
13
Package: lsh-utils
14
Architecture: any
62 magnus 15
Depends: nettle-bin (>= 2.0-2), ${shlibs:Depends}, ${misc:Depends}
19 magnus 16
Suggests: lsh-server, lsh-client, lsh-doc
2 magnus 17
Description: Secure Shell v2 (SSH2) protocol utilities
102 magnus 18
 lsh is a GPLed implementation of the Secure SHell protocol version 2
19
 (SSH2), a secure replacement for rlogin, rsh, and rcp.
2 magnus 20
 .
13 magnus 21
 This package contains the lsh utilities. This includes programs such
22
 as lsh-keygen, lsh-writekey (both programs for public/private key
23
 generation), lsh-authorize (for automatic remote key authentication),
102 magnus 24
 ssh-conv (utilities for converting between various public and private
13 magnus 25
 key formats), and a number of other utilities for use with both the
26
 lsh server and client.
2 magnus 27
 .
13 magnus 28
 In some countries it may be illegal to use any encryption at all
29
 without a special permit.
2 magnus 30
 
31
Package: lsh-server
32
Architecture: any
33
Provides: ssh-server
146 magnus 34
Depends: lsh-utils (= ${binary:Version}),
140 magnus 35
 lsb-base (>= 3.0-6), ${shlibs:Depends}, ${misc:Depends}
19 magnus 36
Suggests: lsh-client | openssh-client, lsh-doc
2 magnus 37
Description: Secure Shell v2 (SSH2) protocol server
102 magnus 38
 lsh is a GPLed implementation of the Secure SHell protocol version 2
39
 (SSH2), a secure replacement for rlogin, rsh, and rcp.
2 magnus 40
 .
41
 This package contains the lsh server, lshd. This package is required
42
 to allow SSH2 logins to the local machine.
43
 .
44
 In some countries it may be illegal to use any encryption
45
 at all without a special permit.
46
 
47
Package: lsh-client
48
Architecture: any
62 magnus 49
Depends: nettle-bin, lsh-utils (= ${binary:Version}),
50
 ${shlibs:Depends}, ${misc:Depends}
76 magnus 51
Breaks: lsh-utils (<< 2.0.4-dfsg-1)
9 magnus 52
Replaces: lsh-utils (<< 2.0.4-dfsg-1)
19 magnus 53
Suggests: lsh-doc
2 magnus 54
Description: Secure Shell v2 (SSH2) protocol client
102 magnus 55
 lsh is a GPLed implementation of the Secure SHell protocol version 2
56
 (SSH2), a secure replacement for rlogin, rsh, and rcp.
2 magnus 57
 .
13 magnus 58
 This package contains the lsh client used to log in to a remote lsh
102 magnus 59
 or SSH2 server.
2 magnus 60
 .
61
 In some countries it may be illegal to use any encryption
62
 at all without a special permit.
63
 
64
Package: lsh-doc
65
Architecture: all
66
Section: doc
113 magnus 67
Depends: ${misc:Depends}
2 magnus 68
Suggests: lsh-utils, lsh-server, lsh-client
76 magnus 69
Conflicts: lsh-utils (<< 1.0.2-3)
70
Breaks: lsh-utils-doc (<< 2.0.4-dfsg-1)
9 magnus 71
Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1)
102 magnus 72
Description: Secure Shell v2 (SSH2) documentation
73
 lsh is a GPLed implementation of the Secure SHell protocol version 2
74
 (SSH2), a secure replacement for rlogin, rsh, and rcp.
2 magnus 75
 .
76
 This package contains the lsh documentation, including info
102 magnus 77
 pages and manpages about the various protocols which lsh uses,
78
 as well as various documents about lsh internals, protocols,
2 magnus 79
 and general lsh development.
80
 .
81
 In some countries it may be illegal to use any encryption
82
 at all without a special permit.