Subversion Repositories

?revision_form?Rev ?revision_input??revision_submit??revision_endform?

Rev 32 | Rev 35 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
10 magnus 1
Source: lsh-utils
2 magnus 2
Section: net
3
Priority: extra
23 magnus 4
Maintainer: Magnus Holmgren <holmgren@debian.org>
5
Uploaders: Stefan Pfetzing <dreamind@dreamind.de>
16 magnus 6
Standards-Version: 3.7.3
32 magnus 7
Build-Depends: cdbs, debhelper (>= 5), dpatch, autotools-dev,
33 magnus 8
 libgmp3-dev, zlib1g-dev | libz-dev, liboop-dev, libxau-dev, nettle-dev,
8 magnus 9
 texinfo (>= 4.2), guile-1.6 | scsh-0.6, heimdal-dev, libwrap0-dev | libwrap-dev,
10
 libpam0g-dev | libpam-dev, libreadline5-dev | libreadline-dev, m4
11 magnus 11
Homepage: http://www.lysator.liu.se/~nisse/lsh/
2 magnus 12
 
13
Package: lsh-utils
14
Architecture: any
31 magnus 15
Depends: nettle-bin, ${shlibs:Depends}, ${misc:Depends}
19 magnus 16
Suggests: lsh-server, lsh-client, lsh-doc
2 magnus 17
Description: Secure Shell v2 (SSH2) protocol utilities
13 magnus 18
 lsh is GNU GPL'd implementation of the Secure Shell protocol version
19
 2 (SSH2). The SSH (Secure SHell) protocol is a secure replacement for
20
 rlogin, rsh and rcp.
2 magnus 21
 .
13 magnus 22
 This package contains the lsh utilities. This includes programs such
23
 as lsh-keygen, lsh-writekey (both programs for public/private key
24
 generation), lsh-authorize (for automatic remote key authentication),
25
 ssh-conv (utilities for converting between various public & private
26
 key formats), and a number of other utilities for use with both the
27
 lsh server and client.
2 magnus 28
 .
13 magnus 29
 In some countries it may be illegal to use any encryption at all
30
 without a special permit.
2 magnus 31
 
32
Package: lsh-server
33
Architecture: any
34
Provides: ssh-server
31 magnus 35
Depends: lsh-utils (= ${binary:Version}), ${shlibs:Depends}, ${misc:Depends}, debconf (>= 1.2.0) | debconf-2.0
2 magnus 36
Conflicts: lsh-utils (<< 1.0.2-3)
19 magnus 37
Suggests: lsh-client | openssh-client, lsh-doc
2 magnus 38
Description: Secure Shell v2 (SSH2) protocol server
39
 lsh is GNU GPL'd implementation of the Secure Shell
40
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
41
 is a secure replacement for rlogin, rsh and rcp.
42
 .
43
 This package contains the lsh server, lshd. This package is required
44
 to allow SSH2 logins to the local machine.
45
 .
46
 In some countries it may be illegal to use any encryption
47
 at all without a special permit.
48
 
49
Package: lsh-client
50
Architecture: any
31 magnus 51
Depends: nettle-bin, ${shlibs:Depends}, ${misc:Depends}, lsh-utils (= ${binary:Version})
9 magnus 52
Conflicts: lsh-utils (<< 2.0.4-dfsg-1)
53
Replaces: lsh-utils (<< 2.0.4-dfsg-1)
19 magnus 54
Suggests: lsh-doc
2 magnus 55
Description: Secure Shell v2 (SSH2) protocol client
56
 lsh is GNU GPL'd implementation of the Secure Shell
57
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
58
 is a secure replacement for rlogin, rsh and rcp.
59
 .
13 magnus 60
 This package contains the lsh client used to log in to a remote lsh
61
 or ssh2 server.
2 magnus 62
 .
63
 In some countries it may be illegal to use any encryption
64
 at all without a special permit.
65
 
66
Package: lsh-doc
67
Architecture: all
68
Section: doc
30 magnus 69
Depends: dpkg (>= 1.15.4) | install-info
2 magnus 70
Suggests: lsh-utils, lsh-server, lsh-client
9 magnus 71
Conflicts: lsh-utils (<< 1.0.2-3), lsh-utils-doc (<< 2.0.4-dfsg-1)
72
Replaces: lsh-utils-doc (<< 2.0.4-dfsg-1)
2 magnus 73
Description: Secure Shell v2 (SSH2) client / server / utilities documentation
74
 lsh is GNU GPL'd implementation of the Secure Shell
75
 protocol version 2 (SSH2). The SSH (Secure SHell) protocol
76
 is a secure replacement for rlogin, rsh and rcp.
77
 .
78
 This package contains the lsh documentation, including info
79
 pages, manpages about the various protocols which lsh uses,
80
 as well as various documents about lsh internals, protocols
81
 and general lsh development.
82
 .
83
 In some countries it may be illegal to use any encryption
84
 at all without a special permit.