summaryrefslogtreecommitdiff
path: root/security/cyrus-sasl/Makefile
AgeCommit message (Collapse)AuthorFilesLines
2016-09-11Add 'db6' to supported bdb versions and finally commit ipctype 'doors'richard1-2/+2
for SunOS, while fixing a declaration prototype to match the definition. PR pkg/47436 bump PKGREVISION
2014-10-09Remove SVR4_PKGNAME, per discussion on tech-pkg.wiz1-2/+1
2014-05-07Fix the pkg-config file provided (exec_prefix was undefined).fhajny1-2/+2
Bump PKGREVISION.
2013-07-12Bump PKGREVISION of all packages which create users, to pick up change ofjperkin1-2/+2
sysutils/user_* packages.
2013-03-13Convert SASL_DBTYPE variable to option framework, and add gdbm support.obache1-17/+3
Fixes db name extension in DEINSTALL script for other than ndbm. Bump PKGREVISION.
2012-12-20sasl.h needs stddef.h to be self-contained. Bump revision.joerg1-1/+2
2012-12-16Update cyrus-sasl to 2.1.26.obache1-3/+3
New in 2.1.26 ------------- * Modernize SASL malloc/realloc callback prototypes * Added sasl_config_done() to plug a memory leak when using an application specific config file * Fixed PLAIN/LOGIN authentication failure when using saslauthd with no auxprop plugins (bug # 3590). * unlock the mutex in sasl_dispose if the context was freed by another thread * MINGW32 compatibility patches * Fixed broken logic in get_fqhostname() when abort_if_no_fqdn is 0 * Fixed some memory leaks in libsasl * GSSAPI plugin: - Fixed a segfault in gssapi.c introduced in 2.1.25. - Code refactoring - Added support for GSS-SPNEGO SASL mechanism (Unix only), which is also HTTP capable * GS2 plugin: - Updated GS2 plugin not to lose minor GSS-API status codes on errors * DIGEST-MD5 plugin: - Correctly send "stale" directive to prevent clients from (re)promtping for password - Better handling of HTTP reauthentication cases - fixed some memory leaks * SASLDB plugin: - Added support for BerkleyDB 5.X or later * OTP plugin: - Removed calling of EVP_cleanup() on plugin shutdown in order to prevent TLS from failing in calling applications * SRP plugin: - Removed calling of EVP_cleanup() on plugin shutdown in order to prevent TLS from failing in calling applications * saslauthd: - auth_rimap.c: qstring incorrectly appending the closing double quote, which might be causing crashes - auth_rimap.c: read the whole IMAP greeting - better error reporting from some drivers - fixed some memory leaks
2012-10-23Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.asau1-3/+1
2012-03-03More pcre PKGREVISION bumps.wiz1-1/+3
2012-02-22Revert unintended commits.wiz1-3/+1
2012-02-22Mention putty-devel successor.wiz1-1/+3
2012-02-10Revert previous on popular request.wiz1-3/+1
2012-02-09Compile with PIC flags.wiz1-1/+3
Needed on my 5.99.64/amd64 inside a pbulk (manual build outside doesn't need it, go figure).
2011-10-18Deal with the fact that if /usr/include/ndbm.h exists on Linux it probablysbd1-2/+2
belongs to gdbm_compat. I.E. _don't_ use ndbm on Linux.
2011-09-17Update cyrus-sasl to 2.1.25.obache1-4/+15
Take maintainership. New in 2.1.25 ------------- * Make sure that a failed authorization doesn't preclude further server-side SASL authentication attempts from working. * Fixed a crash caused by aborted SASL authentication and initiation of another one using the same SASL context. * (Windows) Fixed the random number generator to actually produce random output on each run. * Be protective against calling sasl_server_step once authentication has failed (multiple SASL plugins) * Fixed several bugs in the mech_avail callback handling in the server side code. * Added support for channel bindings * Added support for ordering SASL mechanisms by strength (on the client side), or using the "client_mech_list" option. * server_idle needs to obey server's SASL mechanism list from the server context. * Better server plugin API mismatch reporting * Build: - Updated config to the latest GNU snapshot - Fixed SASL's libtool MacOS/X 64-bit file magic * New SASL plugin: SCRAM * New SASL plugin: GS2 * DIGEST-MD5 plugin: - Allow DIGEST-MD5 plugin to be used for client-side and server-side HTTP Digest, including running over non-persistent connections (RFC 2617) - Use the same username for reauthentication cache lookup and update - Minimize the number of auxprop lookups in the server side DIGEST-MD5 plugin for the most common case when authentication and authorization identities are the same. - Updated digestmd5_server_mech_step2() to be more defensive against empty client input. - Fixed some memory leaks on failed plugin initialization. Prevent potential race condition when freeding plugin state. Set the freed reauthentication cache mutex to NULL, to make errors due to mutex access after free more obvious. - Test against broken UTF-8 based hashes if calculation using special ISO-8859-1 code fails. - Fixed an interop problem with some LDAP clients ignoring server advertised realm and providing their own. * GSSAPI plugin: - Fix to build GSSAPI with Heimdal - Properly set serveroutlen to 0 in one place. Don't send empty challenge once server context establishment is done, as this is in violation of the RFC 2222 and its successor. - Don't send maxbuf, if no security layer can be established. Added additional checks for buffer lengths. * LDAPDB plugin: - build fixes New in 2.1.24 ------------- * Order advertised server-side SASL mechanisms per the specified 'mech_list' option or by relative "strength" * Make sure that sasl_set_alloc() has no effect once sasl_client_init() or sasl_server_init() is called * Fixed sasl_set_mutex() to disallow changing mutex management functions once sasl_server_init()/sasl_client_init() is called (bug # 3083) * Removed unused mutexes in lib/client.c and lib/server.c (bug # 3141) * Added direct support for hashed password to auxprop API * Don't treat a constraint violation as an error to store an auxprop property * Extended libsasl (auxprop) to support user deletion * Extended SASL auxprop_lookup to return error code * Updated sasl_user_exists() so that it can handle passwordless accounts (e.g. disabled) * (Windows) Free handles of shared libraries on Windows that were loaded but are not SASL plugins (bug # 2089) * Prevent freeing of common state on a subsequent call to _sasl_common_init. Make sure that the last global callback always wins. * Implemented sasl_client_done()/sasl_server_done() * Added automatic hostname canonicalization inside libsasl * Made sasl_config_init() public * Strip trailing spaces from server config file option values (bug # 3139, bug # 3041) * Fixed potential buffer overflow in saslautd_verify_password(). * Fixed segfault in dlclose() on HPUX * Various bugfixes for 64bit platforms * Fixed bug # 2895 (passing LF to sasl_decode64) in sample/sample-client.c, sample/sample-server.c, utils/smtptest.c * pluginviewer: Code cleanup, improved human readable messages * Build: - (Windows) Updated makefiles to build with VC 8.0 (VC++ 2005) - (Windows) Added Windows64 build - Updated to use .plugin extension on MacOS - Changed 64bit HP-UX build to use .so for shared libraries * saslauthd: - Fixed bug counting double-quotes in username/password in auth_rimap.c. Also fixed bug zeroing password. - auth_krb.c: improved diagnostic in the k5support_verify_tgt() function. - auth_sasldb.c: pid_file_lock is created with a mask of 644 instead of 0644 - auth_shadow.c: Define _XOPEN_SOURCE before including unistd.h, so that crypt is correctly defined - auth_getpwent.c: Fixed Solaris build * SASLDB plugin: - Fixed spurious 'user not found' errors caused by an attempt to delete a non-existent property - Added direct support for hashed password to auxprop API - Sleepycat driver: Return SASL_NOUSER instead of SASL_FAIL when the database file doesn't exist - Ignore properties starting with '*' in the auxprop store function * SQL plugin: - Added support for SQLITE3 - Uninitialized variables can cause crash when the searched user is not found - Added direct support for hashed password - Ignore properties starting with '*' in the auxprop store function * LDAPDB plugin: - Added code to extend LDAPDB into a canon_user plugin in addition to its existing auxprop plugin functionality * PLAIN plugin: - Advertise SASL_SEC_PASS_CREDENTIALS feature * LOGIN plugin: - Advertise SASL_SEC_PASS_CREDENTIALS feature * DIGEST-MD5 plugin: - Fixed a memory leak in the DIGEST-MD5 security layer - Fixed memory leaks in client-side reauth and other places - More detailed error reporting. - Fixed parsing of challenges/responses with extra commas. - Allow for multiple qop options from the server and require a single qop option from the client. * GSSAPI plugin: - Check that params->serverFQDN is not NULL before using strlen on it - Make auxprop lookup calls optional * EXTERNAL plugin: - Make auxprop lookup calls optional * NTLM plugin: - allow a comma separated list of servernames in 'ntlm_server' option - Fixed crash in calculating NTv2 reponse * OTP plugin: - Don't use a stack variable for an OTP prompt (bug # 2822) - Downgrade the failure to store OTP secret to debug level * KERBEROS_V4 plugin: - Make auxprop lookup calls optional
2008-08-12Add DESTDIR support.obache1-5/+7
2007-07-04Make it easier to build and install packages "unprivileged", wherejlam1-2/+3
the owner of all installed files is a non-root user. This change affects most packages that require special users or groups by making them use the specified unprivileged user and group instead. (1) Add two new variables PKG_GROUPS_VARS and PKG_USERS_VARS to unprivileged.mk. These two variables are lists of other bmake variables that define package-specific users and groups. Packages that have user-settable variables for users and groups, e.g. apache and APACHE_{USER,GROUP}, courier-mta and COURIER_{USER,GROUP}, etc., should list these variables in PKG_USERS_VARS and PKG_GROUPS_VARS so that unprivileged.mk can know to set them to ${UNPRIVILEGED_USER} and ${UNPRIVILEGED_GROUP}. (2) Modify packages to use PKG_GROUPS_VARS and PKG_USERS_VARS.
2007-02-22Whitespace cleanup, courtesy of pkglint.wiz1-2/+2
Patch provided by Sergey Svishchev in private mail.
2006-11-02Force to detect correct library when ${SASL_DBTYPE}=="berkeley".obache1-1/+2
Reported by David Carrel in pkgsrc-users@.
2006-04-23Modify packages that set PKG_USERS and PKG_GROUPS to follow the newjlam1-2/+3
syntax as specified in pkgsrc/mk/install/bsd.pkginstall.mk:1.47.
2006-04-18Updated security/cyrus-sasl to 2.1.21. Changes from version 2.1.20 include:jlam1-3/+2
* lib/dlopen.c: log the reason for opendir() failure when loading plugin. * lib/common.c: honor log level setting * sample/sample-client.c, sample/sample-server.c: Fixed several 64 bit portability warnings. * utils/testsuite.c: Fixed several 64 bit portability warnings. * utils/saslpasswd.c: Fixed typo in an auxprop name. * include/saslplug.h, lib/common.c, lib/saslint.h, lib/server.c: Added sasl_server_plugin_info(). * lib/common.c: initialize path in case caller didn't.
2006-04-13Add current contents of security/cyrus-sasl2, starting its movewiz1-0/+71
to security/cyrus-sasl (to make PKGNAME match directory name).
2005-03-28Remove security/cyrus-sasl and security/cy-login. These packagesjlam1-57/+0
tracked the Cyrus SASL 1.5.x releases, which are no longer maintained. Adjust packages to use security/cyrus-sasl2 instead for SASL support. This closes PR pkg/28218 and PR pkg/29736.
2005-01-14Create a pam.buildlink3.mk file that is used by PAM-using packages.jlam1-3/+3
It includes the correct buildlink3.mk file from either Linux-PAM (security/PAM) or OpenPAM (security/openpam) and eventually will support solaris-pam. pam.buildlink3.mk will: * set PAMBASE to the base directory of the PAM files; * set PAM_TYPE to the PAM implementation used. There are two variables that can be used to tweak the selection of the PAM implementation: PAM_DEFAULT is a user-settable variable whose value is the default PAM implementation to use. PAM_ACCEPTED is a package-settable list of PAM implementations that may be used by the package. Modify most packages that include PAM/buildlink3.mk to include pam.buildlink3.mk instead.
2004-12-28The default location of the pkgsrc-installed rc.d scripts is nowreed1-2/+2
under share/examples/rc.d. The variable name already was named RCD_SCRIPTS_EXAMPLEDIR. This is from ideas from Greg Woods and others. Also bumped PKGREVISION for all packages using RCD_SCRIPTS mechanism (as requested by wiz).
2004-10-03Libtool fix for PR pkg/26633, and other issues. Update libtool to 1.5.10tv1-2/+2
in the process. (More information on tech-pkg.) Bump PKGREVISION and BUILDLINK_DEPENDS of all packages using libtool and installing .la files. Bump PKGREVISION (only) of all packages depending directly on the above via a buildlink3 include.
2004-08-22Change the way that legacy USE_* and FOO_USE_* options are convertedjlam1-14/+3
into the bsd.options.mk framework. Instead of appending to ${PKG_OPTIONS_VAR}, it appends to PKG_DEFAULT_OPTIONS. This causes the default options to be the union of PKG_DEFAULT_OPTIONS and any old USE_* and FOO_USE_* settings. This fixes PR pkg/26590.
2004-07-30Convert to use bsd.options.mk. The relevant options variable to setjlam1-14/+34
for each package can be determined by invoking: make show-var VARNAME=PKG_OPTIONS_VAR The old options are still supported unless the variable named in PKG_OPTIONS_VAR is set within make(1) (usually via /etc/mk.conf).
2004-03-26PKGREVISION bump after openssl-security-fix-update to 0.9.6m.wiz1-2/+2
Buildlink files: RECOMMENDED version changed to current version.
2004-03-23bl3ify and convert to use krb5.buildlink3.mk for proper Kerberosjlam1-5/+7
detection and linkage. This fixes PR 24498.
2003-11-12PKGREVISION++ after openssl update.jschauma1-2/+2
2003-08-30Add definitions for DEINSTALL_EXTRA_TMPL and INSTALL_EXTRA_TMPL ifjlam1-1/+4
USE_PKGINSTALL is "YES". bsd.pkg.install.mk will no longer automatically pick up a INSTALL/DEINSTALL script in the package directory and assume that you want it for the corresponding *_EXTRA_TMPL variable.
2003-03-19Rearrange some of the Makefile logic so that we can create Cyrus SASLjlam1-63/+17
plugin packages.
2003-01-28Instead of including bsd.pkg.install.mk directly in a package Makefile,jlam1-3/+2
have it be automatically included by bsd.pkg.mk if USE_PKGINSTALL is set to "YES". This enforces the requirement that bsd.pkg.install.mk be included at the end of a package Makefile. Idea suggested by Julio M. Merino Vidal <jmmv at menta.net>.
2002-12-16On NetBSD use /dev/urandom insted of /dev/random (PR#19275).martti1-2/+2
Bump PKGREVISION.
2002-10-21Fix sasl-config script so that "sasl-config --libs" returns the full listjlam1-2/+2
of libraries and linker flags needed to link against libsasl. Bump PKGREVISION and bump the BUILDLINK_DEPENDS as packages will be needing to use a version of cyrus-sasl with a correct sasl-config.
2002-10-07Use int32_t while dealing with sasldb version not long! This fix cyrus saslseb1-2/+2
on sparc64. Bump PKGREVISION.
2002-09-19Take advantage of the auto-generation and installation of rc.d scripts.jlam1-11/+1
2002-09-18When using bsd.pkg.install.mk, if a DEINSTALL or INSTALL file alreadyjlam1-4/+1
exists, then use it as the default value of DEINSTALL_EXTRA_TMPL or INSTALL_EXTRA_TMPL.
2002-09-07Remove dependency on autoconf/automake and finish buildlink2 conversion.jlam1-9/+1
2002-08-25Merge changes in packages from the buildlink2 branch that havejlam1-6/+7
buildlink2.mk files back into the main trunk. This provides sufficient buildlink2 infrastructure to start merging other packages from the buildlink2 branch that have already been converted to use the buildlink2 framework.
2002-07-31Build and install "saslauthd", a daemon running as root that performsjlam1-12/+20
plaintext password authentication for Cyrus SASL. This will allow daemons _not_ running as root to perform SASL PLAIN authentication (including getpwent and PAM). Bump PKGREVISION to 1.
2002-07-22Use correct homepage.jlam1-2/+2
2002-01-31* Create the link /usr/lib/sasl -> ${PREFIX}/lib/sasl as it's where SASL-jlam1-5/+7
aware applications look for authentication mechanisms by default. * Warn package admin if ${PREFIX}/lib/sasl is non-empty after deinstallation, as it may contain service config files. * Purge use of PKGDIR.
2002-01-31Add USE_PAM to the BUILD_DEFS if it is defined.jlam1-2/+3
2002-01-13Update to 1.5.27. Changes are mostly bugfixes including a fix for theskrll1-3/+2
format string vulnerability described in http://www.securityfocus.com/bid/3498 Closes pkg/15149 from <naoki@fukaumi.org>
2001-12-10Added optional GSSAPI support. To activate this feature, please setmartti1-13/+5
SASL_USE_GSSAPI=YES in /etc/mk.conf
2001-12-04By default, prevent invocation of GNU "auto*" driven by the generatedjlam1-2/+1
Makefiles during the build process by touching various auto{conf,make} source files to make them up-to-date. Packages that require regenerating the configure script and Makefile.in files should make the appropriate calls to auto{conf,make} in a pre-configure target. This allows the various targets listed in ${_CONFIG_PREREQ} to modify the generated files without triggering the GNU auto* tools and having the modifications be overwritten.
2001-12-02bsd.pkg.install.mk calls the INSTALL script at the right timesjlam1-3/+1
automatically, so no need to do it ourselves.
2001-11-29Get rid of manually adding "nbX" to PKGNAME when a pkg was changed inhubertf1-2/+2
pkgsrc. Instead, a new variable PKGREVISION is invented that can get bumped independent of DISTNAME and PKGNAME. Example #1: DISTNAME= foo-X.Y PKGREVISION= Z => PKGNAME= foo-X.YnbZ Example #2: DISTNAME= barthing-X.Y PKGNAME= bar-X.Y PKGREVISION= Z => PKGNAME= bar=X.YnbZ (!) On subsequent changes, only PKGREVISION needs to be bumped, no more risk of getting DISTNAME changed accidentally.