summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authoradam <adam@pkgsrc.org>2010-11-16 09:53:50 +0000
committeradam <adam@pkgsrc.org>2010-11-16 09:53:50 +0000
commit5433c783067ba87a3d3292c715eecb0757ab9484 (patch)
tree6517adbb0f3183f297588658db34371eb5c1aa6c /security
parent9062c738dff950658b57af046012c7b0705ec9f9 (diff)
downloadpkgsrc-5433c783067ba87a3d3292c715eecb0757ab9484.tar.gz
Changes 186:
* fix for BUG-424: build fails on Darwin
Diffstat (limited to 'security')
-rw-r--r--security/pam-ldap/Makefile6
-rw-r--r--security/pam-ldap/distinfo10
-rw-r--r--security/pam-ldap/patches/patch-ab105
3 files changed, 13 insertions, 108 deletions
diff --git a/security/pam-ldap/Makefile b/security/pam-ldap/Makefile
index b2c3c69c0ac..326a0d4f7bc 100644
--- a/security/pam-ldap/Makefile
+++ b/security/pam-ldap/Makefile
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.34 2010/11/03 11:39:08 adam Exp $
+# $NetBSD: Makefile,v 1.35 2010/11/16 09:53:50 adam Exp $
-DISTNAME= pam_ldap-185
+DISTNAME= pam_ldap-186
PKGNAME= ${DISTNAME:S/_/-/}
-PKGREVISION= 1
CATEGORIES= security
MASTER_SITES= ftp://ftp.padl.com/pub/ \
http://www.padl.com/download/
@@ -25,7 +24,6 @@ CONFIGURE_ARGS+= --with-ldap-secret-file=${PKG_SYSCONFDIR}/ldap.secret
# Fix (workaround?) a bug with openpam/NetBSD
# The bug is described in PR security/39313.
-#
.include "../../mk/bsd.prefs.mk"
.if ${OPSYS} == "NetBSD"
diff --git a/security/pam-ldap/distinfo b/security/pam-ldap/distinfo
index 17788eb70c6..4e00d746b9e 100644
--- a/security/pam-ldap/distinfo
+++ b/security/pam-ldap/distinfo
@@ -1,7 +1,7 @@
-$NetBSD: distinfo,v 1.12 2010/11/03 11:39:08 adam Exp $
+$NetBSD: distinfo,v 1.13 2010/11/16 09:53:50 adam Exp $
-SHA1 (pam_ldap-185.tar.gz) = 56dc89b38697ee50295dde3af52a3785f4a5442f
-RMD160 (pam_ldap-185.tar.gz) = bb8263aff8e9d9c7e6ffb8a1d2c449e488037a7e
-Size (pam_ldap-185.tar.gz) = 163467 bytes
+SHA1 (pam_ldap-186.tar.gz) = abb37c92dde446687272849ed29eb5c0fe1a55a6
+RMD160 (pam_ldap-186.tar.gz) = 54fb6da6560ef1d7082d1e00cfa96286801f40bf
+Size (pam_ldap-186.tar.gz) = 163437 bytes
SHA1 (patch-aa) = 7bfec8025280db30de244c4f5d5b40d8ff30a485
-SHA1 (patch-ab) = fe711cc64cc6e7eb520a3c5a34514fa7e7da9c55
+SHA1 (patch-ab) = 37c084142853baad8949001466e344c6bcebb711
diff --git a/security/pam-ldap/patches/patch-ab b/security/pam-ldap/patches/patch-ab
index 4eef7f829b9..90d6b5530fa 100644
--- a/security/pam-ldap/patches/patch-ab
+++ b/security/pam-ldap/patches/patch-ab
@@ -1,21 +1,8 @@
-$NetBSD: patch-ab,v 1.8 2010/10/28 08:06:19 adam Exp $
+$NetBSD: patch-ab,v 1.9 2010/11/16 09:53:50 adam Exp $
---- pam_ldap.c.orig 2009-11-06 10:29:34.000000000 +0000
+--- pam_ldap.c.orig 2010-11-08 00:58:44.000000000 +0000
+++ pam_ldap.c
-@@ -131,12 +131,7 @@
- #include "pam_ldap.h"
- #include "md5.h"
-
--#if defined(HAVE_SECURITY_PAM_MISC_H) || defined(HAVE_PAM_PAM_MISC_H)
-- /* FIXME: is there something better to check? */
- #define CONST_ARG const
--#else
--#define CONST_ARG
--#endif
-
- #ifndef HAVE_LDAP_MEMFREE
- #define ldap_memfree(x) free(x)
-@@ -3411,7 +3406,7 @@ pam_sm_authenticate (pam_handle_t * pamh
+@@ -3411,7 +3411,7 @@ pam_sm_authenticate (pam_handle_t * pamh
int rc;
const char *username;
char *p;
@@ -24,7 +11,7 @@ $NetBSD: patch-ab,v 1.8 2010/10/28 08:06:19 adam Exp $
int i;
pam_ldap_session_t *session = NULL;
const char *configFile = NULL;
-@@ -3432,6 +3427,8 @@ pam_sm_authenticate (pam_handle_t * pamh
+@@ -3432,6 +3432,8 @@ pam_sm_authenticate (pam_handle_t * pamh
;
else if (!strcmp (argv[i], "debug"))
;
@@ -33,7 +20,7 @@ $NetBSD: patch-ab,v 1.8 2010/10/28 08:06:19 adam Exp $
else
syslog (LOG_ERR, "illegal option %s", argv[i]);
}
-@@ -3445,6 +3442,22 @@ pam_sm_authenticate (pam_handle_t * pamh
+@@ -3445,6 +3447,22 @@ pam_sm_authenticate (pam_handle_t * pamh
return rc;
rc = pam_get_item (pamh, PAM_AUTHTOK, (CONST_ARG void **) &p);
@@ -56,23 +43,7 @@ $NetBSD: patch-ab,v 1.8 2010/10/28 08:06:19 adam Exp $
if (rc == PAM_SUCCESS && (use_first_pass || try_first_pass))
{
rc = _do_authentication (pamh, session, username, p);
-@@ -3707,11 +3720,11 @@ pam_sm_chauthtok (pam_handle_t * pamh, i
- {
- _conv_sendmsg (appconv, "Password change aborted",
- PAM_ERROR_MSG, no_warn);
--#ifdef PAM_AUTHTOK_RECOVERY_ERR
-- return PAM_AUTHTOK_RECOVERY_ERR;
--#else
-+#ifdef PAM_AUTHTOK_RECOVER_ERR
- return PAM_AUTHTOK_RECOVER_ERR;
--#endif /* PAM_AUTHTOK_RECOVERY_ERR */
-+#else
-+ return PAM_AUTHTOK_RECOVERY_ERR;
-+#endif
- }
- else
- {
-@@ -3725,7 +3738,7 @@ pam_sm_chauthtok (pam_handle_t * pamh, i
+@@ -3721,7 +3739,7 @@ pam_sm_chauthtok (pam_handle_t * pamh, i
if (curpass == NULL)
return PAM_MAXTRIES; /* maximum tries exceeded */
else
@@ -81,67 +52,3 @@ $NetBSD: patch-ab,v 1.8 2010/10/28 08:06:19 adam Exp $
}
else
{
-@@ -3753,11 +3766,11 @@ pam_sm_chauthtok (pam_handle_t * pamh, i
- syslog (LOG_ERR,
- "pam_ldap: error getting old authentication token (%s)",
- pam_strerror (pamh, rc));
--#ifdef PAM_AUTHTOK_RECOVERY_ERR
-- return PAM_AUTHTOK_RECOVERY_ERR;
--#else
-+#ifdef PAM_AUTHTOK_RECOVER_ERR
- return PAM_AUTHTOK_RECOVER_ERR;
--#endif /* PAM_AUTHTOK_RECOVERY_ERR */
-+#else
-+ return PAM_AUTHTOK_RECOVERY_ERR;
-+#endif /* PAM_AUTHTOK_RECOVER_ERR */
- }
-
- if (try_first_pass || use_first_pass)
-@@ -3767,11 +3780,11 @@ pam_sm_chauthtok (pam_handle_t * pamh, i
- newpass = NULL;
-
- if (use_first_pass && newpass == NULL)
--#ifdef PAM_AUTHTOK_RECOVERY_ERR
-- return PAM_AUTHTOK_RECOVERY_ERR;
--#else
-+#ifdef PAM_AUTHTOK_RECOVER_ERR
- return PAM_AUTHTOK_RECOVER_ERR;
--#endif /* PAM_AUTHTOK_RECOVERY_ERR */
-+#else
-+ return PAM_AUTHTOK_RECOVERY_ERR;
-+#endif /* PAM_AUTHTOK_RECOVER_ERR */
- }
-
- tries = 0;
-@@ -3821,11 +3834,11 @@ pam_sm_chauthtok (pam_handle_t * pamh, i
- }
- else
- {
--#ifdef PAM_AUTHTOK_RECOVERY_ERR
-- return PAM_AUTHTOK_RECOVERY_ERR;
--#else
-+#ifdef PAM_AUTHTOK_RECOVER_ERR
- return PAM_AUTHTOK_RECOVER_ERR;
--#endif /* PAM_AUTHTOK_RECOVERY_ERR */
-+#else
-+ return PAM_AUTHTOK_RECOVERY_ERR;
-+#endif /* PAM_AUTHTOK_RECOVER_ERR */
- }
-
- if (cmiscptr == NULL)
-@@ -3857,11 +3870,11 @@ pam_sm_chauthtok (pam_handle_t * pamh, i
- {
- _conv_sendmsg (appconv, "Password change aborted",
- PAM_ERROR_MSG, no_warn);
--#ifdef PAM_AUTHTOK_RECOVERY_ERR
-- return PAM_AUTHTOK_RECOVERY_ERR;
--#else
-+#ifdef PAM_AUTHTOK_RECOVER_ERR
- return PAM_AUTHTOK_RECOVER_ERR;
--#endif /* PAM_AUTHTOK_RECOVERY_ERR */
-+#else
-+ return PAM_AUTHTOK_RECOVERY_ERR;
-+#endif /* PAM_AUTHTOK_RECOVER_ERR */
- }
- }
- else if (!strcmp (newpass, miscptr))