README file for creating Kerberos

This is the root directory of MIT Project Athena's Kerberos
network authentication service source code.

Please note that the Data Encryption Standard library of this source
code distribution may be subject to export restrictions imposed by the
United States Government.

The Makefiles are set up so that the source tree can be
separate from the tree(s) containing binaries.  We have
found this useful since we have to have separate sets of binaries,
for the IBM RTPC and Vaxstation II machines.

The default value of the root of the Kerberos source tree
(this directory) is /mit/kerberos/src.  You can set it
to something else by specifying, for example, "make SRCDIR=/x/y/z"
if you want the source in /x/y/z.

Here are the steps for building the Kerberos source.

1.  Create a directory to hold the tree of object files,
    say it's /foo/bar/baz.

2.  Cd to that directory and run the command:

	make -f /x/y/z/tools/makeconfig SRCDIR=/x/y/z

    where /x/y/z is the root of the source tree (not necessary
    if the root is /mit/kerberos/src).  This creates the necessary
    directories and copies Makefiles into them.

3.  Cd to util/imake.includes.  Read through config.Imakefile, turning
    on appropriate flags for your installation.  Change SRCTOP appropriately.

    Check that your machine type has a definition in include/osconf.h &
    related files in the source tree (if it doesn't, then you may need to
    create your own; if you get successful results, please post to
    kerberos@athena.mit.edu)

4.  Still in the top of the object directory (/foo/bar/baz
    of Step 1), type "make world" (or "make world  SRCDIR=/x/y/z).

5.  Examine the lib/des/verify output at the end of the "make world"
    output.  Check that the encryption is creating the output it's 
    supposed to.

6.  Run "make install".  You may want to check that programs
    are installed where you want.  Then add the appropriate
    directories to your PATH environment variable.

7.  Follow the instructions Bill Bryant's "Kerberos: Operation Notes"
    about what to do with Kerberos now that you've got it.
