# This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # pam_yubico # pam_yubico/Makefile # pam_yubico/distinfo # pam_yubico/pkg-descr # pam_yubico/pkg-message # echo c - pam_yubico mkdir -p pam_yubico > /dev/null 2>&1 echo x - pam_yubico/Makefile sed 's/^X//' >pam_yubico/Makefile << '710b84d5d18db093c3b32bfec8af9bb7' X# $FreeBSD$ X XPORTNAME= pam_yubico XPORTVERSION= 2.12 XCATEGORIES= security XMASTER_SITES= GOOGLE_CODE X XMAINTAINER= matt@mjslabs.com XCOMMENT= PAM module for authenticating with a Yubico YubiKey X XLICENSE= BSD X XLIB_DEPENDS= ykclient:${PORTSDIR}/security/ykclient \ X ykpers-1:${PORTSDIR}/security/ykpers \ X yubikey:${PORTSDIR}/security/libyubikey X XGNU_CONFIGURE= yes XUSE_PKGCONFIG= build X XPLIST_FILES= include/drop_privs.h \ X include/util.h \ X lib/security/pam_yubico.la \ X lib/security/pam_yubico.so XPLIST_DIRS= lib/security X XPROJECTHOST= yubico-pam X XOPTIONS_DEFINE= CR LDAP XCR_DESC= include challenge/response support XOPTIONS_DEFAULT=CR LDAP X X.include X X.if ! ${PORT_OPTIONS:MCR} XCONFIGURE_ARGS+=--without-cr X.else XMAN1= ykpamcfg.1 XPLIST_FILES+= bin/ykpamcfg X.endif X X.if ! ${PORT_OPTIONS:MLDAP} XCONFIGURE_ARGS+=--without-ldap X.endif X Xregression-test: build X @(cd ${WRKSRC}; ${MAKE} check) X Xpost-install: X @${CAT} ${PKGDIR}/pkg-message X X.include 710b84d5d18db093c3b32bfec8af9bb7 echo x - pam_yubico/distinfo sed 's/^X//' >pam_yubico/distinfo << '3f8771f8322edc47d8e2a6c7c209a57f' XSHA256 (pam_yubico-2.12.tar.gz) = b3efb41b72191b2ccb0b9cde691bd4ee6df5d8245254dd4f4c4e4bb8886c25c3 XSIZE (pam_yubico-2.12.tar.gz) = 367164 3f8771f8322edc47d8e2a6c7c209a57f echo x - pam_yubico/pkg-descr sed 's/^X//' >pam_yubico/pkg-descr << '9a213d19305ab13a1ae24657070496c5' XThe Yubico authentication device Yubikey generates one-time passwords that can Xbe used for authentication. This module allows you to use the Yubikey device to Xauthenticate to the PAM system. X XWWW: https://code.google.com/p/yubico-pam/ 9a213d19305ab13a1ae24657070496c5 echo x - pam_yubico/pkg-message sed 's/^X//' >pam_yubico/pkg-message << '0ce61b48a081002ed812e9163a61ce90' X XFor setup instructions on authenticating with your YubiKey, see: Xhttps://github.com/Yubico/yubico-pam/blob/master/README X 0ce61b48a081002ed812e9163a61ce90 exit