summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'sys-auth/openpam')
-rw-r--r--sys-auth/openpam/ChangeLog11
-rw-r--r--sys-auth/openpam/Manifest12
-rw-r--r--sys-auth/openpam/files/digest-openpam-20050201-r13
-rw-r--r--sys-auth/openpam/files/openpam-20050201-gentoo.patch176
-rw-r--r--sys-auth/openpam/files/openpam-20050201-nbsd.patch12
-rw-r--r--sys-auth/openpam/metadata.xml5
-rw-r--r--sys-auth/openpam/openpam-20050201-r1.ebuild46
7 files changed, 265 insertions, 0 deletions
diff --git a/sys-auth/openpam/ChangeLog b/sys-auth/openpam/ChangeLog
new file mode 100644
index 000000000000..3134502334b0
--- /dev/null
+++ b/sys-auth/openpam/ChangeLog
@@ -0,0 +1,11 @@
+# ChangeLog for sys-auth/openpam
+# Copyright 1999-2006 Gentoo Foundation; Distributed under the GPL v2
+# $Header: /var/cvsroot/gentoo-x86/sys-auth/openpam/ChangeLog,v 1.1 2006/03/30 17:54:34 flameeyes Exp $
+
+*openpam-20050201-r1 (30 Mar 2006)
+
+ 30 Mar 2006; Diego Pettenò <flameeyes@gentoo.org>
+ +files/openpam-20050201-gentoo.patch, +files/openpam-20050201-nbsd.patch,
+ +metadata.xml, +openpam-20050201-r1.ebuild:
+ Import openpam from gentoo-alt overlay (in sys-auth rather than sys-libs).
+
diff --git a/sys-auth/openpam/Manifest b/sys-auth/openpam/Manifest
new file mode 100644
index 000000000000..afb4cb1bda04
--- /dev/null
+++ b/sys-auth/openpam/Manifest
@@ -0,0 +1,12 @@
+MD5 d27aed5edec3b496da4edcab7576dde4 files/digest-openpam-20050201-r1 250
+RMD160 c7cfee3dae0e691a1af70f7d06fa03531284161e files/digest-openpam-20050201-r1 250
+SHA256 fce2b0553fbe02f5346c97074263c921160c17c3e56925cab10bb4f801ea3704 files/digest-openpam-20050201-r1 250
+MD5 1f429087f685185c153a880dc6124743 files/openpam-20050201-gentoo.patch 6783
+RMD160 82b333084feef282c6b20df224961d658ccaba5c files/openpam-20050201-gentoo.patch 6783
+SHA256 9d360bca2635d4d30ae66cd62be032bc09df5cfae2ced3e602ebfff9dade0612 files/openpam-20050201-gentoo.patch 6783
+MD5 56d3140397d4d682547d53200fcd9884 files/openpam-20050201-nbsd.patch 449
+RMD160 f9d7a48fa48af267bda9766b359314bda884e2af files/openpam-20050201-nbsd.patch 449
+SHA256 5ca47d57dc688dfddb24107026f049f70e520d62acde34b6a395b99b8be90d02 files/openpam-20050201-nbsd.patch 449
+MD5 d894c47c078c6e1082f89b5dd0e45b09 openpam-20050201-r1.ebuild 893
+RMD160 af52657497f9fcfa5cd50f17d65b7e00bc6a8a56 openpam-20050201-r1.ebuild 893
+SHA256 1a752948e9e28334eff1c01fa481acc04048d4598a5e6db68858ab1f66ba9837 openpam-20050201-r1.ebuild 893
diff --git a/sys-auth/openpam/files/digest-openpam-20050201-r1 b/sys-auth/openpam/files/digest-openpam-20050201-r1
new file mode 100644
index 000000000000..2a235fc808ad
--- /dev/null
+++ b/sys-auth/openpam/files/digest-openpam-20050201-r1
@@ -0,0 +1,3 @@
+MD5 a6c4c41e9f47123d841ad85a3e03e061 openpam-20050201.tar.gz 360003
+RMD160 da99df2897b7fd17580ae2474046fc7921973828 openpam-20050201.tar.gz 360003
+SHA256 3961d4a15eab33b52118af1323f1bc1314970097b5dbac32582b0ee50e940248 openpam-20050201.tar.gz 360003
diff --git a/sys-auth/openpam/files/openpam-20050201-gentoo.patch b/sys-auth/openpam/files/openpam-20050201-gentoo.patch
new file mode 100644
index 000000000000..3b37c6fa2a76
--- /dev/null
+++ b/sys-auth/openpam/files/openpam-20050201-gentoo.patch
@@ -0,0 +1,176 @@
+diff -Nur openpam-20050201/include/security/Makefile.am openpam-20050201-gentoo/include/security/Makefile.am
+--- openpam-20050201/include/security/Makefile.am 2005-02-01 00:00:00.000000000 +0100
++++ openpam-20050201-gentoo/include/security/Makefile.am 2005-06-11 12:48:19.038207056 +0200
+@@ -6,4 +6,5 @@
+ pam_appl.h \
+ pam_constants.h \
+ pam_modules.h \
+- pam_types.h
++ pam_types.h \
++ pam_mod_misc.h
+diff -Nur openpam-20050201/include/security/pam_mod_misc.h openpam-20050201-gentoo/include/security/pam_mod_misc.h
+--- openpam-20050201/include/security/pam_mod_misc.h 1970-01-01 01:00:00.000000000 +0100
++++ openpam-20050201-gentoo/include/security/pam_mod_misc.h 2005-06-11 12:48:19.038207056 +0200
+@@ -0,0 +1,56 @@
++/*-
++ * Copyright 1998 Juniper Networks, Inc.
++ * All rights reserved.
++ *
++ * Redistribution and use in source and binary forms, with or without
++ * modification, are permitted provided that the following conditions
++ * are met:
++ * 1. Redistributions of source code must retain the above copyright
++ * notice, this list of conditions and the following disclaimer.
++ * 2. Redistributions in binary form must reproduce the above copyright
++ * notice, this list of conditions and the following disclaimer in the
++ * documentation and/or other materials provided with the distribution.
++ *
++ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
++ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
++ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
++ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
++ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
++ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
++ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
++ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
++ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
++ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
++ * SUCH DAMAGE.
++ *
++ * $FreeBSD: src/lib/libpam/libpam/security/pam_mod_misc.h,v 1.12 2003/05/31 16:56:35 des Exp $
++ */
++
++#ifndef PAM_MOD_MISC_H
++#define PAM_MOD_MISC_H
++
++#include <sys/cdefs.h>
++
++/*
++ * Common option names
++ */
++#define PAM_OPT_NULLOK "nullok"
++#define PAM_OPT_AUTH_AS_SELF "auth_as_self"
++#define PAM_OPT_ECHO_PASS "echo_pass"
++#define PAM_OPT_DEBUG "debug"
++
++__BEGIN_DECLS
++void _pam_verbose_error(pam_handle_t *, int, const char *,
++ const char *, const char *, ...);
++__END_DECLS
++
++#define PAM_LOG(...) \
++ openpam_log(PAM_LOG_DEBUG, __VA_ARGS__)
++
++#define PAM_RETURN(arg) \
++ return (arg)
++
++#define PAM_VERBOSE_ERROR(...) \
++ _pam_verbose_error(pamh, flags, __FILE__, __FUNCTION__, __VA_ARGS__)
++
++#endif
+diff -Nur openpam-20050201/lib/Makefile.am openpam-20050201-gentoo/lib/Makefile.am
+--- openpam-20050201/lib/Makefile.am 2005-02-01 00:00:00.000000000 +0100
++++ openpam-20050201-gentoo/lib/Makefile.am 2005-06-11 12:48:19.038207056 +0200
+@@ -46,6 +46,7 @@
+ pam_verror.c \
+ pam_vinfo.c \
+ pam_vprompt.c \
++ pam_debug_log.c \
+ $(NULL)
+
+ libpam_la_LDFLAGS = -no-undefined -version-info @LIB_MAJ@ @DL_LIBS@
+diff -Nur openpam-20050201/lib/openpam_dynamic.c openpam-20050201-gentoo/lib/openpam_dynamic.c
+--- openpam-20050201/lib/openpam_dynamic.c 2005-02-01 00:00:00.000000000 +0100
++++ openpam-20050201-gentoo/lib/openpam_dynamic.c 2005-06-11 12:48:19.039206904 +0200
+@@ -73,8 +73,21 @@
+ *strrchr(vpath, '.') = '\0';
+ if ((dlh = dlopen(vpath, RTLD_NOW)) == NULL) {
+ openpam_log(PAM_LOG_DEBUG, "%s: %s", vpath, dlerror());
+- FREE(module);
+- return (NULL);
++
++ /* Gentoo Code to handle /lib/security directory */
++ FREE(vpath);
++ if ( asprintf(&vpath, "%s/%s.%d", OPENPAM_MODULES_DIR, path, LIB_MAJ) < 0 )
++ goto buf_err;
++ if ((dlh = dlopen(vpath, RTLD_NOW)) == NULL) {
++ openpam_log(PAM_LOG_DEBUG, "%s: %s", vpath, dlerror());
++ *strrchr(vpath, '.') = '\0';
++ if ((dlh = dlopen(vpath, RTLD_NOW)) == NULL) {
++ openpam_log(PAM_LOG_DEBUG, "%s: %s", vpath, dlerror());
++ FREE(module);
++
++ return (NULL);
++ }
++ }
+ }
+ }
+ FREE(vpath);
+diff -Nur openpam-20050201/lib/pam_debug_log.c openpam-20050201-gentoo/lib/pam_debug_log.c
+--- openpam-20050201/lib/pam_debug_log.c 1970-01-01 01:00:00.000000000 +0100
++++ openpam-20050201-gentoo/lib/pam_debug_log.c 2005-06-11 12:55:17.688562528 +0200
+@@ -0,0 +1,64 @@
++/*-
++ * Copyright 2001 Mark R V Murray
++ * All rights reserved.
++ *
++ * Redistribution and use in source and binary forms, with or without
++ * modification, are permitted provided that the following conditions
++ * are met:
++ * 1. Redistributions of source code must retain the above copyright
++ * notice, this list of conditions and the following disclaimer.
++ * 2. Redistributions in binary form must reproduce the above copyright
++ * notice, this list of conditions and the following disclaimer in the
++ * documentation and/or other materials provided with the distribution.
++ *
++ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
++ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
++ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
++ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
++ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
++ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
++ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
++ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
++ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
++ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
++ * SUCH DAMAGE.
++ */
++
++#include <sys/cdefs.h>
++
++#ifndef __GLIBC__
++#include <libgen.h>
++#endif
++
++#include <stdarg.h>
++#include <stdio.h>
++#include <stdlib.h>
++#include <string.h>
++
++#include <security/pam_appl.h>
++#include <security/openpam.h>
++#include <security/pam_mod_misc.h>
++
++/* Print a verbose error, including the function name and a
++ * cleaned up filename.
++ */
++void
++_pam_verbose_error(pam_handle_t *pamh, int flags,
++ const char *file, const char *function, const char *format, ...)
++{
++ va_list ap;
++ char *fmtbuf, *modname, *period;
++
++ if (!(flags & PAM_SILENT) && !openpam_get_option(pamh, "no_warn")) {
++ modname = basename(file);
++ period = strchr(modname, '.');
++ if (period == NULL)
++ period = strchr(modname, '\0');
++ va_start(ap, format);
++ asprintf(&fmtbuf, "%.*s: %s: %s\n", (int)(period - modname),
++ modname, function, format);
++ pam_verror(pamh, fmtbuf, ap);
++ free(fmtbuf);
++ va_end(ap);
++ }
++}
diff --git a/sys-auth/openpam/files/openpam-20050201-nbsd.patch b/sys-auth/openpam/files/openpam-20050201-nbsd.patch
new file mode 100644
index 000000000000..bc797db8d065
--- /dev/null
+++ b/sys-auth/openpam/files/openpam-20050201-nbsd.patch
@@ -0,0 +1,12 @@
+--- openpam-20050201.orig/lib/pam_debug_log.c 2006-02-18 01:15:39.000000000 -0200
++++ openpam-20050201/lib/pam_debug_log.c 2006-02-18 01:16:30.000000000 -0200
+@@ -47,7 +47,8 @@
+ const char *file, const char *function, const char *format, ...)
+ {
+ va_list ap;
+- char *fmtbuf, *modname, *period;
++ char *fmtbuf;
++ const char *modname, *period;
+
+ if (!(flags & PAM_SILENT) && !openpam_get_option(pamh, "no_warn")) {
+ modname = basename(file);
diff --git a/sys-auth/openpam/metadata.xml b/sys-auth/openpam/metadata.xml
new file mode 100644
index 000000000000..ecedda4aa2cc
--- /dev/null
+++ b/sys-auth/openpam/metadata.xml
@@ -0,0 +1,5 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+<herd>bsd</herd>
+</pkgmetadata>
diff --git a/sys-auth/openpam/openpam-20050201-r1.ebuild b/sys-auth/openpam/openpam-20050201-r1.ebuild
new file mode 100644
index 000000000000..87f0a6ecd235
--- /dev/null
+++ b/sys-auth/openpam/openpam-20050201-r1.ebuild
@@ -0,0 +1,46 @@
+# Copyright 1999-2006 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/sys-auth/openpam/openpam-20050201-r1.ebuild,v 1.1 2006/03/30 17:54:34 flameeyes Exp $
+
+inherit multilib flag-o-matic autotools
+
+DESCRIPTION="Open source PAM library."
+HOMEPAGE="http://www.openpam.org/"
+SRC_URI="mirror://sourceforge/${PN}/${P}.tar.gz"
+
+LICENSE="BSD"
+SLOT="0"
+KEYWORDS="~x86-fbsd"
+IUSE="debug"
+
+RDEPEND="!virtual/pam"
+DEPEND="sys-devel/make
+ dev-lang/perl
+ =sys-devel/automake-1.8*"
+PDEPEND="sys-freebsd/freebsd-pam-modules"
+
+PROVIDE="virtual/pam"
+
+src_unpack() {
+ unpack ${A}
+ cd ${S}
+
+ epatch "${FILESDIR}/${P}-gentoo.patch"
+ epatch "${FILESDIR}/${P}-nbsd.patch"
+ eautomake
+}
+
+src_compile() {
+ econf \
+ --disable-dependency-tracking \
+ --with-modules-dir=/$(get_libdir)/security \
+ ${myconf} || die "econf failed"
+
+ emake || die "emake failed"
+}
+
+src_install() {
+ make DESTDIR=${D} install
+
+ dodoc CREDITS HISTORY MANIFEST RELNOTES README
+}