pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/cyrus-saslauthd Update security/cyrus-saslaut...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/7383e157f59d
branches:  trunk
changeset: 511644:7383e157f59d
user:      jlam <jlam%pkgsrc.org@localhost>
date:      Tue Apr 18 17:42:59 2006 +0000

description:
Update security/cyrus-saslauthd to 2.1.21.  Changes from version 2.1.20
include:

* saslauthd/lak.c: leak fix from Igor Brezac
* saslauthd/krbtf.c: updated from CMUCS
* saslauthd/auth_krb5.c: log the krb5 error return if get_creds fails
* saslauthd/auth_krb5.c, saslauthd/auth_krb4.c,
  saslauthd/krbtf.h (added), saslauthd/krbtf.c (added),
  saslauthd/cfile.h (added), saslauthd/cfile.c (added),
  saslauthd/Makefile.am: Kerberos V4/V5 alternate keytab
  in saslauthd, plus common code merging (from David Eckhardt
  via Dale Moore)
* saslauthd/auth_krb5.c: verify against the service we
  were passed. needs to be made configurable.

diffstat:

 security/cyrus-saslauthd/Makefile         |    4 +-
 security/cyrus-saslauthd/distinfo         |   15 +-
 security/cyrus-saslauthd/patches/patch-aa |    6 +-
 security/cyrus-saslauthd/patches/patch-ab |    6 +-
 security/cyrus-saslauthd/patches/patch-ae |   49 ++++
 security/cyrus-saslauthd/patches/patch-af |  323 ++++++++++++++++++++++++++++++
 security/cyrus-saslauthd/patches/patch-ag |   23 ++
 7 files changed, 412 insertions(+), 14 deletions(-)

diffs (truncated from 471 to 300 lines):

diff -r cf9f364b2248 -r 7383e157f59d security/cyrus-saslauthd/Makefile
--- a/security/cyrus-saslauthd/Makefile Tue Apr 18 17:42:12 2006 +0000
+++ b/security/cyrus-saslauthd/Makefile Tue Apr 18 17:42:59 2006 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.30 2006/03/14 16:00:41 jlam Exp $
+# $NetBSD: Makefile,v 1.31 2006/04/18 17:42:59 jlam Exp $
 
-DISTNAME=      cyrus-sasl-2.1.20
+DISTNAME=      cyrus-sasl-2.1.21
 PKGNAME=       ${DISTNAME:S/sasl/saslauthd/}
 CATEGORIES=    security
 MASTER_SITES=  ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/ \
diff -r cf9f364b2248 -r 7383e157f59d security/cyrus-saslauthd/distinfo
--- a/security/cyrus-saslauthd/distinfo Tue Apr 18 17:42:12 2006 +0000
+++ b/security/cyrus-saslauthd/distinfo Tue Apr 18 17:42:59 2006 +0000
@@ -1,9 +1,12 @@
-$NetBSD: distinfo,v 1.6 2005/02/24 13:10:05 agc Exp $
+$NetBSD: distinfo,v 1.7 2006/04/18 17:42:59 jlam Exp $
 
-SHA1 (cyrus-sasl-2.1.20.tar.gz) = d1eec5644c4e87edb95fa5ab8bf124cfdf277eb6
-RMD160 (cyrus-sasl-2.1.20.tar.gz) = 45f8d9e91e5ba4840f57d2f0526b8f41f90bbb8c
-Size (cyrus-sasl-2.1.20.tar.gz) = 1775163 bytes
-SHA1 (patch-aa) = 1a4b8fd35e1888fcdf6eb1cef3cc6ae95c816acd
-SHA1 (patch-ab) = 8123e54b10b7094f73604c5ad055d0bfeb8fa0ac
+SHA1 (cyrus-sasl-2.1.21.tar.gz) = 6449f730c963d29d43600a95373a6e2db52d6d66
+RMD160 (cyrus-sasl-2.1.21.tar.gz) = 93e0e1868453c5781602b5cce23e746b8823a26b
+Size (cyrus-sasl-2.1.21.tar.gz) = 1584931 bytes
+SHA1 (patch-aa) = c507c791d94772909f8e56a1b81de17ebdb6c245
+SHA1 (patch-ab) = 1e410456cbe5d8711a08638038733f5513b917fb
 SHA1 (patch-ac) = 79267ad3e175632728e43fb2ba159ab411e7ff3c
 SHA1 (patch-ad) = c14defd79e6e0cec153be004fff3016ad6f0e731
+SHA1 (patch-ae) = de944306bcc8609a3353bf713876e0d42c9d05f9
+SHA1 (patch-af) = 0477e862dbc10d67fb0b82862eea612c81e46e39
+SHA1 (patch-ag) = d0dbe55b9a91ed49e2e43c2ef44e141ac86a83c7
diff -r cf9f364b2248 -r 7383e157f59d security/cyrus-saslauthd/patches/patch-aa
--- a/security/cyrus-saslauthd/patches/patch-aa Tue Apr 18 17:42:12 2006 +0000
+++ b/security/cyrus-saslauthd/patches/patch-aa Tue Apr 18 17:42:59 2006 +0000
@@ -1,8 +1,8 @@
-$NetBSD: patch-aa,v 1.3 2005/02/21 22:10:18 adam Exp $
+$NetBSD: patch-aa,v 1.4 2006/04/18 17:42:59 jlam Exp $
 
---- Makefile.am.orig   2004-10-19 23:48:20.000000000 +0000
+--- Makefile.am.orig   2005-01-10 00:39:54.000000000 -0500
 +++ Makefile.am
-@@ -28,11 +28,8 @@ INCLUDES    = -I$(top_srcdir)/include -I$(t
+@@ -29,11 +29,8 @@ INCLUDES    = -I$(top_srcdir)/include -I$(t
  DEFS            = @DEFS@ -DSASLAUTHD_CONF_FILE_DEFAULT=\"@sysconfdir@/saslauthd.conf\" -I. -I$(srcdir) -I..
  
  
diff -r cf9f364b2248 -r 7383e157f59d security/cyrus-saslauthd/patches/patch-ab
--- a/security/cyrus-saslauthd/patches/patch-ab Tue Apr 18 17:42:12 2006 +0000
+++ b/security/cyrus-saslauthd/patches/patch-ab Tue Apr 18 17:42:59 2006 +0000
@@ -1,8 +1,8 @@
-$NetBSD: patch-ab,v 1.4 2005/02/21 22:10:18 adam Exp $
+$NetBSD: patch-ab,v 1.5 2006/04/18 17:42:59 jlam Exp $
 
---- Makefile.in.orig   2004-10-24 20:21:14.000000000 +0000
+--- Makefile.in.orig   2005-05-15 01:59:08.000000000 -0400
 +++ Makefile.in
-@@ -606,14 +606,11 @@ uninstall-am: uninstall-info-am uninstal
+@@ -611,14 +611,11 @@ uninstall-am: uninstall-info-am uninstal
        uninstall-sbinPROGRAMS
  
  
diff -r cf9f364b2248 -r 7383e157f59d security/cyrus-saslauthd/patches/patch-ae
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/security/cyrus-saslauthd/patches/patch-ae Tue Apr 18 17:42:59 2006 +0000
@@ -0,0 +1,49 @@
+$NetBSD: patch-ae,v 1.1 2006/04/18 17:42:59 jlam Exp $
+
+--- configure.in.orig  2005-05-07 00:54:18.000000000 -0400
++++ configure.in
+@@ -80,20 +80,36 @@ if test "$authsasldb" != no; then
+   SASL_DB_LIB="$SASL_DB_LIB ../sasldb/.libs/libsasldb.al"
+ fi
+ 
+-AC_ARG_WITH(pam, [  --with-pam=DIR          use PAM (rooted in DIR) [yes] ],
+-      with_pam=$withval,
+-      with_pam=yes)
++AC_ARG_WITH(pam, [  --with-pam=DIR          use PAM (rooted in DIR) [[yes]] ],
++        with_pam=$withval,
++        with_pam=yes)
+ if test "$with_pam" != no; then
+   if test -d $with_pam; then
+     CPPFLAGS="$CPPFLAGS -I${with_pam}/include"
+     LDFLAGS="$LDFLAGS -L${with_pam}/lib"
+   fi
++  AC_CHECK_HEADERS(security/pam_appl.h pam/pam_appl.h)
+   cmu_save_LIBS="$LIBS"
+-  AC_CHECK_LIB(pam, pam_start, [
+-        AC_CHECK_HEADER(security/pam_appl.h,,
+-                        with_pam=no)],
+-              with_pam=no, $SASL_DL_LIB)
+-  LIBS="$cmu_save_LIBS"
++  AC_CHECK_FUNC(pam_start, :,
++        LIBS="-lpam $LIBS"
++        AC_TRY_LINK([[
++#include <sys/types.h>
++#ifdef HAVE_PAM_PAM_APPL_H
++#include <pam/pam_appl.h>
++#endif
++#ifdef HAVE_SECURITY_PAM_H
++#include <security/pam_appl.h>
++#endif]],[[
++const char *service="foo";
++const char *user="bar";
++pam_handle_t *pamh;
++struct pam_conv *conv;
++int baz;
++baz = pam_start(service, user, conv, &pamh);
++return 0;
++]], LIBPAM="-lpam")
++)
++  LIBS="$cmu_save_LIBS $LIBPAM"
+ fi
+ 
+ AC_ARG_WITH(ipctype, [  --with-ipctype={unix,doors}    use ipctype [unix] ],
diff -r cf9f364b2248 -r 7383e157f59d security/cyrus-saslauthd/patches/patch-af
--- /dev/null   Thu Jan 01 00:00:00 1970 +0000
+++ b/security/cyrus-saslauthd/patches/patch-af Tue Apr 18 17:42:59 2006 +0000
@@ -0,0 +1,323 @@
+$NetBSD: patch-af,v 1.1 2006/04/18 17:42:59 jlam Exp $
+
+--- configure.orig     2006-04-18 13:03:08.000000000 -0400
++++ configure
+@@ -9322,75 +9322,23 @@ if test "$with_pam" != no; then
+     CPPFLAGS="$CPPFLAGS -I${with_pam}/include"
+     LDFLAGS="$LDFLAGS -L${with_pam}/lib"
+   fi
+-  cmu_save_LIBS="$LIBS"
+-  echo "$as_me:$LINENO: checking for pam_start in -lpam" >&5
+-echo $ECHO_N "checking for pam_start in -lpam... $ECHO_C" >&6
+-if test "${ac_cv_lib_pam_pam_start+set}" = set; then
+-  echo $ECHO_N "(cached) $ECHO_C" >&6
+-else
+-  ac_check_lib_save_LIBS=$LIBS
+-LIBS="-lpam $SASL_DL_LIB $LIBS"
+-cat >conftest.$ac_ext <<_ACEOF
+-#line $LINENO "configure"
+-/* confdefs.h.  */
+-_ACEOF
+-cat confdefs.h >>conftest.$ac_ext
+-cat >>conftest.$ac_ext <<_ACEOF
+-/* end confdefs.h.  */
+ 
+-/* Override any gcc2 internal prototype to avoid an error.  */
+-#ifdef __cplusplus
+-extern "C"
+-#endif
+-/* We use char because int might match the return type of a gcc2
+-   builtin and then its argument prototype would still apply.  */
+-char pam_start ();
+-int
+-main ()
+-{
+-pam_start ();
+-  ;
+-  return 0;
+-}
+-_ACEOF
+-rm -f conftest.$ac_objext conftest$ac_exeext
+-if { (eval echo "$as_me:$LINENO: \"$ac_link\"") >&5
+-  (eval $ac_link) 2>&5
+-  ac_status=$?
+-  echo "$as_me:$LINENO: \$? = $ac_status" >&5
+-  (exit $ac_status); } &&
+-         { ac_try='test -s conftest$ac_exeext'
+-  { (eval echo "$as_me:$LINENO: \"$ac_try\"") >&5
+-  (eval $ac_try) 2>&5
+-  ac_status=$?
+-  echo "$as_me:$LINENO: \$? = $ac_status" >&5
+-  (exit $ac_status); }; }; then
+-  ac_cv_lib_pam_pam_start=yes
+-else
+-  echo "$as_me: failed program was:" >&5
+-sed 's/^/| /' conftest.$ac_ext >&5
+ 
+-ac_cv_lib_pam_pam_start=no
+-fi
+-rm -f conftest.$ac_objext conftest$ac_exeext conftest.$ac_ext
+-LIBS=$ac_check_lib_save_LIBS
+-fi
+-echo "$as_me:$LINENO: result: $ac_cv_lib_pam_pam_start" >&5
+-echo "${ECHO_T}$ac_cv_lib_pam_pam_start" >&6
+-if test $ac_cv_lib_pam_pam_start = yes; then
+-
+-        if test "${ac_cv_header_security_pam_appl_h+set}" = set; then
+-  echo "$as_me:$LINENO: checking for security/pam_appl.h" >&5
+-echo $ECHO_N "checking for security/pam_appl.h... $ECHO_C" >&6
+-if test "${ac_cv_header_security_pam_appl_h+set}" = set; then
++for ac_header in security/pam_appl.h pam/pam_appl.h
++do
++as_ac_Header=`echo "ac_cv_header_$ac_header" | $as_tr_sh`
++if eval "test \"\${$as_ac_Header+set}\" = set"; then
++  echo "$as_me:$LINENO: checking for $ac_header" >&5
++echo $ECHO_N "checking for $ac_header... $ECHO_C" >&6
++if eval "test \"\${$as_ac_Header+set}\" = set"; then
+   echo $ECHO_N "(cached) $ECHO_C" >&6
+ fi
+-echo "$as_me:$LINENO: result: $ac_cv_header_security_pam_appl_h" >&5
+-echo "${ECHO_T}$ac_cv_header_security_pam_appl_h" >&6
++echo "$as_me:$LINENO: result: `eval echo '${'$as_ac_Header'}'`" >&5
++echo "${ECHO_T}`eval echo '${'$as_ac_Header'}'`" >&6
+ else
+   # Is the header compilable?
+-echo "$as_me:$LINENO: checking security/pam_appl.h usability" >&5
+-echo $ECHO_N "checking security/pam_appl.h usability... $ECHO_C" >&6
++echo "$as_me:$LINENO: checking $ac_header usability" >&5
++echo $ECHO_N "checking $ac_header usability... $ECHO_C" >&6
+ cat >conftest.$ac_ext <<_ACEOF
+ #line $LINENO "configure"
+ /* confdefs.h.  */
+@@ -9399,7 +9347,7 @@ cat confdefs.h >>conftest.$ac_ext
+ cat >>conftest.$ac_ext <<_ACEOF
+ /* end confdefs.h.  */
+ $ac_includes_default
+-#include <security/pam_appl.h>
++#include <$ac_header>
+ _ACEOF
+ rm -f conftest.$ac_objext
+ if { (eval echo "$as_me:$LINENO: \"$ac_compile\"") >&5
+@@ -9425,8 +9373,8 @@ echo "$as_me:$LINENO: result: $ac_header
+ echo "${ECHO_T}$ac_header_compiler" >&6
+ 
+ # Is the header present?
+-echo "$as_me:$LINENO: checking security/pam_appl.h presence" >&5
+-echo $ECHO_N "checking security/pam_appl.h presence... $ECHO_C" >&6
++echo "$as_me:$LINENO: checking $ac_header presence" >&5
++echo $ECHO_N "checking $ac_header presence... $ECHO_C" >&6
+ cat >conftest.$ac_ext <<_ACEOF
+ #line $LINENO "configure"
+ /* confdefs.h.  */
+@@ -9434,7 +9382,7 @@ _ACEOF
+ cat confdefs.h >>conftest.$ac_ext
+ cat >>conftest.$ac_ext <<_ACEOF
+ /* end confdefs.h.  */
+-#include <security/pam_appl.h>
++#include <$ac_header>
+ _ACEOF
+ if { (eval echo "$as_me:$LINENO: \"$ac_cpp conftest.$ac_ext\"") >&5
+   (eval $ac_cpp conftest.$ac_ext) 2>conftest.er1
+@@ -9467,10 +9415,10 @@ echo "${ECHO_T}$ac_header_preproc" >&6
+ # So?  What about this header?
+ case $ac_header_compiler:$ac_header_preproc in
+   yes:no )
+-    { echo "$as_me:$LINENO: WARNING: security/pam_appl.h: accepted by the compiler, rejected by the preprocessor!" >&5
+-echo "$as_me: WARNING: security/pam_appl.h: accepted by the compiler, rejected by the preprocessor!" >&2;}
+-    { echo "$as_me:$LINENO: WARNING: security/pam_appl.h: proceeding with the preprocessor's result" >&5
+-echo "$as_me: WARNING: security/pam_appl.h: proceeding with the preprocessor's result" >&2;}
++    { echo "$as_me:$LINENO: WARNING: $ac_header: accepted by the compiler, rejected by the preprocessor!" >&5
++echo "$as_me: WARNING: $ac_header: accepted by the compiler, rejected by the preprocessor!" >&2;}
++    { echo "$as_me:$LINENO: WARNING: $ac_header: proceeding with the preprocessor's result" >&5
++echo "$as_me: WARNING: $ac_header: proceeding with the preprocessor's result" >&2;}
+     (
+       cat <<\_ASBOX
+ ## ------------------------------------ ##
+@@ -9481,12 +9429,12 @@ _ASBOX
+       sed "s/^/$as_me: WARNING:     /" >&2
+     ;;
+   no:yes )
+-    { echo "$as_me:$LINENO: WARNING: security/pam_appl.h: present but cannot be compiled" >&5
+-echo "$as_me: WARNING: security/pam_appl.h: present but cannot be compiled" >&2;}
+-    { echo "$as_me:$LINENO: WARNING: security/pam_appl.h: check for missing prerequisite headers?" >&5
+-echo "$as_me: WARNING: security/pam_appl.h: check for missing prerequisite headers?" >&2;}
+-    { echo "$as_me:$LINENO: WARNING: security/pam_appl.h: proceeding with the preprocessor's result" >&5
+-echo "$as_me: WARNING: security/pam_appl.h: proceeding with the preprocessor's result" >&2;}
++    { echo "$as_me:$LINENO: WARNING: $ac_header: present but cannot be compiled" >&5
++echo "$as_me: WARNING: $ac_header: present but cannot be compiled" >&2;}
++    { echo "$as_me:$LINENO: WARNING: $ac_header: check for missing prerequisite headers?" >&5
++echo "$as_me: WARNING: $ac_header: check for missing prerequisite headers?" >&2;}
++    { echo "$as_me:$LINENO: WARNING: $ac_header: proceeding with the preprocessor's result" >&5
++echo "$as_me: WARNING: $ac_header: proceeding with the preprocessor's result" >&2;}
+     (
+       cat <<\_ASBOX
+ ## ------------------------------------ ##
+@@ -9497,29 +9445,157 @@ _ASBOX
+       sed "s/^/$as_me: WARNING:     /" >&2
+     ;;
+ esac
+-echo "$as_me:$LINENO: checking for security/pam_appl.h" >&5
+-echo $ECHO_N "checking for security/pam_appl.h... $ECHO_C" >&6
+-if test "${ac_cv_header_security_pam_appl_h+set}" = set; then
++echo "$as_me:$LINENO: checking for $ac_header" >&5
++echo $ECHO_N "checking for $ac_header... $ECHO_C" >&6
++if eval "test \"\${$as_ac_Header+set}\" = set"; then
+   echo $ECHO_N "(cached) $ECHO_C" >&6
+ else
+-  ac_cv_header_security_pam_appl_h=$ac_header_preproc
++  eval "$as_ac_Header=$ac_header_preproc"
+ fi
+-echo "$as_me:$LINENO: result: $ac_cv_header_security_pam_appl_h" >&5
+-echo "${ECHO_T}$ac_cv_header_security_pam_appl_h" >&6
++echo "$as_me:$LINENO: result: `eval echo '${'$as_ac_Header'}'`" >&5
++echo "${ECHO_T}`eval echo '${'$as_ac_Header'}'`" >&6
+ 
+ fi
+-if test $ac_cv_header_security_pam_appl_h = yes; then
+-  :
++if test `eval echo '${'$as_ac_Header'}'` = yes; then
++  cat >>confdefs.h <<_ACEOF



Home | Main Index | Thread Index | Old Index