           SPELL=otpw
if [[ $OTPW_VER == 1.3 ]]; then
         VERSION=1.3
          SOURCE=$SPELL-$VERSION.tar.gz
   SOURCE_URL[0]=http://www.cl.cam.ac.uk/~mgk25/download/${SOURCE}
     SOURCE_HASH=sha512:998f47a27b7f5692c559fb64c1e0719ce9fb30b592bb7c19ee66d62d0fe6307213d5fe35b2d13c66a4a02afd178fe2567396a1ce7004e9ca8e5ffeea9fab6f78
else
         VERSION=1.4
          SOURCE=$SPELL-snapshot.tar.gz
   SOURCE_URL[0]=http://www.cl.cam.ac.uk/~mgk25/download/$SOURCE
     SOURCE_HASH=sha512:01772f3ad27c9934874c82744f9cb767a40eefa665cebda22c0b62a4882ff4ef12ce0aa07f327a3bf9aa3fcff8f4b61c21856697061f44802ab9ca5fcf9cfa82
fi
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}"
        WEB_SITE="http://www.cl.cam.ac.uk/~mgk25/otpw.html"
      LICENSE[0]=GPL
         ENTERED=20071106
           SHORT="A one-time password login package"
cat << EOF
The OTPW package consists of the one-time-password generator otpw-gen plus
two verification routines otpw_prepare() and otpw_verify() that can easily
be added to programs such as login or ftpd on POSIX systems. For platforms
that support the Pluggable Authentication Method (PAM) interface, a suitable
wrapper is included as well. Login software extended this way will allow
reasonably secure user authentication over insecure network lines. The user
carries a password list on paper. The scheme is designed to be robust against
theft of the paper list and race-for-the-last-letter attacks. Cryptographic
hash values of the one-time passwords are stored for verification in the
user’s home directory.
EOF
