# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 # $Id $ PortSystem 1.0 PortGroup github 1.0 github.setup Yubico yubico-pam 2.14 revision 1 checksums rmd160 570cf84ab8117dc04409afda35b7d05c314fcc52 \ sha256 0132d978f68c440623e86dd2b8c2e786e6bee2cfc26adaca058160165d02e61b # I'm explicitly not marking this openmaintainer maintainers cal categories security description PAM module to authenticate against a YubiKey validation server or \ via challenge-response against a local YubiKey long_description \ The Yubico PAM module provides an easy way to integrate the YubiKey \ into your existing user authentication infrastructure. The module can \ be configured to validate YubiKeys against Yubico's YubiCloud \ infrastructure, a custom YubiKey validation server or it can be used \ for offline authentication with newer YubiKeys supporting a \ challenge-response protocol. platforms darwin license BSD depends_build port:pkgconfig depends_lib port:ykpers \ port:yubico-c-client use_autoreconf yes configure.args --with-pam-dir=/usr/lib/pam \ --without-ldap destroot.violate_mtree \ yes post-destroot { # remove header which is unneeded, because there's no software linking # against yubico-pam and which clashes with a system header file delete ${destroot}${prefix}/include/util.h file delete ${destroot}/usr/lib/pam/pam_yubico.la }