Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-current.git;a=commitdiff;h=63de71029a186901b5c3a7c715ed81677095cb20

commit 63de71029a186901b5c3a7c715ed81677095cb20
Author: Devil505 <devil505li...@gmail.com>
Date:   Wed Oct 26 18:21:32 2011 +0200

cyrus-sasl-2.1.25-1-i686
* version bump
* removed useless patches

diff --git a/source/network/cyrus-sasl/FrugalBuild 
b/source/network/cyrus-sasl/FrugalBuild
index 1156768..032871b 100644
--- a/source/network/cyrus-sasl/FrugalBuild
+++ b/source/network/cyrus-sasl/FrugalBuild
@@ -2,8 +2,8 @@
# Maintainer: Karoly CZOVEK <sli...@rei.keni.hu>

pkgname=cyrus-sasl
-pkgver=2.1.23
-pkgrel=5
+pkgver=2.1.25
+pkgrel=1
pkgdesc="SASL Authentication mechanism"
url="http://ftp.andrew.cmu.edu/pub/cyrus-mail/";
depends=('openssl>=1.0.0' 'gdbm')
@@ -11,16 +11,14 @@ backup=(etc/sysconfig/saslauthd)
groups=('network')
archs=('i686' 'x86_64' 'ppc' 'arm')
source=(ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-$pkgver.tar.gz \
-       $pkgname-2.1.21-checkpw.patch psql.patch rc.saslauthd saslauthd \
-       README.Frugalware cyrus-sasl-2.1.22-gcc44.patch)
+       psql.patch rc.saslauthd saslauthd \
+       README.Frugalware)
up2date="lynx -dump 'http://ftp.andrew.cmu.edu/pub/cyrus-mail/?M=D'|grep 
cyrus-sasl.*tar.gz$|sed -n 's/.*-\(.*\)\.t.*/\1/;1 p'"
-sha1sums=('5df33a6788d6cd8329b109eff777c6cfae1a21bd' \
-          '60949a168c99b445298b3af786dae6e1b0f129d9' \
+sha1sums=('b6c34426012d9b5d448d5646cbecd818a5eeacbf' \
'b4eeaf03a4b672f3153e0b5ef2eec59802d0214d' \
'0b360c2c59175f8a3f53d9a5ef63b60eb332bd69' \
'f3c648fa7e5d9047bd051abbf70e3532abaa0fad' \
-          '50150f268a1c3fd6de37ed88606ba8937f6f2b34' \
-          'f28fa18955d7720dba5b3363c2291ced4f869278')
+          '50150f268a1c3fd6de37ed88606ba8937f6f2b34')

subpkgs=("$pkgname-sql" "$pkgname-gssapiv2" "saslauthd")
subdescs=("$pkgname mysql, postgresql and sqlite plugin." "$pkgname gssapiv2 
plugin." \
diff --git a/source/network/cyrus-sasl/cyrus-sasl-2.1.21-checkpw.patch 
b/source/network/cyrus-sasl/cyrus-sasl-2.1.21-checkpw.patch
deleted file mode 100644
index f7bf44b..0000000
--- a/source/network/cyrus-sasl/cyrus-sasl-2.1.21-checkpw.patch
+++ /dev/null
@@ -1,170 +0,0 @@
-diff -ur ../cyrus-sasl-2.1.19.orig/lib/Makefile.in ./lib/Makefile.in
---- ../cyrus-sasl-2.1.19.orig/lib/Makefile.in  2004-07-02 21:40:15.000000000 
+0200
-+++ ./lib/Makefile.in  2004-09-07 13:21:22.746680576 +0200
-@@ -120,7 +120,7 @@
- JAVA_TRUE = @JAVA_TRUE@
- LDFLAGS = @LDFLAGS@
- LIBOBJS = @LIBOBJS@
--LIBS = @LIBS@
-+LIBS = -lcrypt @LIBS@
- LIBTOOL = @LIBTOOL@
- LIB_CRYPT = @LIB_CRYPT@
- LIB_DES = @LIB_DES@
-diff -ur ../cyrus-sasl-2.1.19.orig/lib/checkpw.c ./lib/checkpw.c
---- ../cyrus-sasl-2.1.19.orig/lib/checkpw.c    2004-03-17 14:58:13.000000000 
+0100
-+++ ./lib/checkpw.c    2004-09-07 13:21:12.645916147 +0200
-@@ -94,6 +94,23 @@
- # endif
- #endif
-
-+/******************************
-+ * crypt(3) patch start       *
-+ ******************************/
-+char *crypt(const char *key, const char *salt);
-+
-+/* cleartext password formats */
-+#define PASSWORD_FORMAT_CLEARTEXT 1
-+#define PASSWORD_FORMAT_CRYPT 2
-+#define PASSWORD_FORMAT_CRYPTTRAD 3
-+#define PASSWORD_SALT_BUF_LEN 22
-+
-+/* weeds out crypt(3) password's salt */
-+int _sasl_get_salt (char *dest, char *src, int format);
-+
-+/******************************
-+ * crypt(3) patch stop        *
-+ ******************************/
-
- /* we store the following secret to check plaintext passwords:
-  *
-@@ -143,7 +160,51 @@
-                                      "*cmusaslsecretPLAIN",
-                                      NULL };
-     struct propval auxprop_values[3];
--
-+
-+      /******************************
-+       * crypt(3) patch start       *
-+       * for password format check  *
-+       ******************************/
-+    sasl_getopt_t *getopt;
-+    void *context;
-+    const char *p = NULL;
-+      /**
-+       * MD5: 12 char salt
-+       * BLOWFISH: 16 char salt
-+       */
-+      char salt[PASSWORD_SALT_BUF_LEN];
-+      int password_format;
-+
-+      /* get password format from auxprop configuration */
-+      if (_sasl_getcallback(conn, SASL_CB_GETOPT, &getopt, &context) == 
SASL_OK) {
-+              getopt(context, NULL, "password_format", &p, NULL);
-+      }
-+
-+      /* set password format */
-+      if (p) {
-+              /*
-+              memset(pass_format_str, '\0', PASSWORD_FORMAT_STR_LEN);
-+              strncpy(pass_format_str, p, (PASSWORD_FORMAT_STR_LEN - 1));
-+              */
-+              /* modern, modular crypt(3) */
-+              if (strncmp(p, "crypt", 11) == 0)
-+                      password_format = PASSWORD_FORMAT_CRYPT;
-+              /* traditional crypt(3) */
-+              else if (strncmp(p, "crypt_trad", 11) == 0)
-+                      password_format = PASSWORD_FORMAT_CRYPTTRAD;
-+              /* cleartext password */
-+              else
-+                      password_format = PASSWORD_FORMAT_CLEARTEXT;
-+      } else {
-+              /* cleartext password */
-+              password_format = PASSWORD_FORMAT_CLEARTEXT;
-+      }
-+
-+      /******************************
-+       * crypt(3) patch stop        *
-+       * for password format check  *
-+       ******************************/
-+
-     if (!conn || !userstr)
-       return SASL_BADPARAM;
-
-@@ -180,14 +241,31 @@
-       goto done;
-     }
-
--    /* At the point this has been called, the username has been canonified
--     * and we've done the auxprop lookup.  This should be easy. */
--    if(auxprop_values[0].name
--       && auxprop_values[0].values
--       && auxprop_values[0].values[0]
--       && !strcmp(auxprop_values[0].values[0], passwd)) {
--      /* We have a plaintext version and it matched! */
--      return SASL_OK;
-+
-+      /******************************
-+       * crypt(3) patch start       *
-+       ******************************/
-+
-+      /* get salt */
-+      _sasl_get_salt(salt, (char *) auxprop_values[0].values[0], 
password_format);
-+
-+      /* crypt(3)-ed password? */
-+      if (password_format != PASSWORD_FORMAT_CLEARTEXT) {
-+              /* compare password */
-+              if (auxprop_values[0].name && auxprop_values[0].values && 
auxprop_values[0].values[0] && strcmp(crypt(passwd, salt), 
auxprop_values[0].values[0]) == 0)
-+                      return SASL_OK;
-+              else
-+                      ret = SASL_BADAUTH;
-+      }
-+      else if (password_format == PASSWORD_FORMAT_CLEARTEXT) {
-+              /* compare passwords */
-+              if (auxprop_values[0].name && auxprop_values[0].values && 
auxprop_values[0].values[0] && strcmp(auxprop_values[0].values[0], passwd) == 0)
-+                      return SASL_OK;
-+              else
-+                      ret = SASL_BADAUTH;
-+      /******************************
-+       * crypt(3) patch stop        *
-+       ******************************/
-     } else if(auxprop_values[1].name
-             && auxprop_values[1].values
-             && auxprop_values[1].values[0]) {
-@@ -975,3 +1053,37 @@
- #endif
-     { NULL, NULL }
- };
-+
-+/* weeds out crypt(3) password's salt */
-+int _sasl_get_salt (char *dest, char *src, int format) {
-+      int num;        /* how many characters is salt long? */
-+      switch (format) {
-+              case PASSWORD_FORMAT_CRYPT:
-+                      /* md5 crypt */
-+                      if (src[1] == '1')
-+                              num = 12;
-+                      /* blowfish crypt */
-+                      else if (src[1] == '2')
-+                              num = (src[1] == '2' && src[2] == 'a') ? 17 : 
16;
-+                      /* traditional crypt */
-+                      else
-+                              num = 2;
-+                      break;
-+
-+              case PASSWORD_FORMAT_CRYPTTRAD:
-+                      num = 2;
-+                      break;
-+
-+              default:
-+                      return 1;
-+      }
-+
-+      /* destroy destination */
-+      memset(dest, '\0', (num + 1));
-+
-+      /* copy salt to destination */
-+      strncpy(dest, src, num);
-+
-+      return 1;
-+}
-+
diff --git a/source/network/cyrus-sasl/cyrus-sasl-2.1.22-gcc44.patch 
b/source/network/cyrus-sasl/cyrus-sasl-2.1.22-gcc44.patch
deleted file mode 100644
index 274f89c..0000000
--- a/source/network/cyrus-sasl/cyrus-sasl-2.1.22-gcc44.patch
+++ /dev/null
@@ -1,23 +0,0 @@
-http://bugs.gentoo.org/248738
-
-diff -Naurp cyrus-sasl-2.1.22-orig/plugins/digestmd5.c 
cyrus-sasl-2.1.22/plugins/digestmd5.c
---- cyrus-sasl-2.1.22-orig/plugins/digestmd5.c 2006-05-17 10:46:17.000000000 
-0600
-+++ cyrus-sasl-2.1.22/plugins/digestmd5.c      2008-11-24 23:39:11.000000000 
-0600
-@@ -2715,7 +2715,7 @@ static sasl_server_plug_t digestmd5_serv
-       "DIGEST-MD5",                   /* mech_name */
- #ifdef WITH_RC4
-       128,                            /* max_ssf */
--#elif WITH_DES
-+#elif defined(WITH_DES)
-       112,
- #else
-       1,
-@@ -4034,7 +4034,7 @@ static sasl_client_plug_t digestmd5_clie
-       "DIGEST-MD5",
- #ifdef WITH_RC4                               /* mech_name */
-       128,                            /* max ssf */
--#elif WITH_DES
-+#elif defined(WITH_DES)
-       112,
- #else
-       1,
_______________________________________________
Frugalware-git mailing list
Frugalware-git@frugalware.org
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to