head 1.5; access; symbols pkgsrc-2014Q1:1.4.0.88 pkgsrc-2014Q1-base:1.4 pkgsrc-2013Q4:1.4.0.86 pkgsrc-2013Q4-base:1.4 pkgsrc-2013Q3:1.4.0.84 pkgsrc-2013Q3-base:1.4 pkgsrc-2013Q2:1.4.0.82 pkgsrc-2013Q2-base:1.4 pkgsrc-2013Q1:1.4.0.80 pkgsrc-2013Q1-base:1.4 pkgsrc-2012Q4:1.4.0.78 pkgsrc-2012Q4-base:1.4 pkgsrc-2012Q3:1.4.0.76 pkgsrc-2012Q3-base:1.4 pkgsrc-2012Q2:1.4.0.74 pkgsrc-2012Q2-base:1.4 pkgsrc-2012Q1:1.4.0.72 pkgsrc-2012Q1-base:1.4 pkgsrc-2011Q4:1.4.0.70 pkgsrc-2011Q4-base:1.4 pkgsrc-2011Q3:1.4.0.68 pkgsrc-2011Q3-base:1.4 pkgsrc-2011Q2:1.4.0.66 pkgsrc-2011Q2-base:1.4 pkgsrc-2011Q1:1.4.0.64 pkgsrc-2011Q1-base:1.4 pkgsrc-2010Q4:1.4.0.62 pkgsrc-2010Q4-base:1.4 pkgsrc-2010Q3:1.4.0.60 pkgsrc-2010Q3-base:1.4 pkgsrc-2010Q2:1.4.0.58 pkgsrc-2010Q2-base:1.4 pkgsrc-2010Q1:1.4.0.56 pkgsrc-2010Q1-base:1.4 pkgsrc-2009Q4:1.4.0.54 pkgsrc-2009Q4-base:1.4 pkgsrc-2009Q3:1.4.0.52 pkgsrc-2009Q3-base:1.4 pkgsrc-2009Q2:1.4.0.50 pkgsrc-2009Q2-base:1.4 pkgsrc-2009Q1:1.4.0.48 pkgsrc-2009Q1-base:1.4 pkgsrc-2008Q4:1.4.0.46 pkgsrc-2008Q4-base:1.4 pkgsrc-2008Q3:1.4.0.44 pkgsrc-2008Q3-base:1.4 cube-native-xorg:1.4.0.42 cube-native-xorg-base:1.4 pkgsrc-2008Q2:1.4.0.40 pkgsrc-2008Q2-base:1.4 cwrapper:1.4.0.38 pkgsrc-2008Q1:1.4.0.36 pkgsrc-2008Q1-base:1.4 pkgsrc-2007Q4:1.4.0.34 pkgsrc-2007Q4-base:1.4 pkgsrc-2007Q3:1.4.0.32 pkgsrc-2007Q3-base:1.4 pkgsrc-2007Q2:1.4.0.30 pkgsrc-2007Q2-base:1.4 pkgsrc-2007Q1:1.4.0.28 pkgsrc-2007Q1-base:1.4 pkgsrc-2006Q4:1.4.0.26 pkgsrc-2006Q4-base:1.4 pkgsrc-2006Q3:1.4.0.24 pkgsrc-2006Q3-base:1.4 pkgsrc-2006Q2:1.4.0.22 pkgsrc-2006Q2-base:1.4 pkgsrc-2006Q1:1.4.0.20 pkgsrc-2006Q1-base:1.4 pkgsrc-2005Q4:1.4.0.18 pkgsrc-2005Q4-base:1.4 pkgsrc-2005Q3:1.4.0.16 pkgsrc-2005Q3-base:1.4 pkgsrc-2005Q2:1.4.0.14 pkgsrc-2005Q2-base:1.4 pkgsrc-2005Q1:1.4.0.12 pkgsrc-2005Q1-base:1.4 pkgsrc-2004Q4:1.4.0.10 pkgsrc-2004Q4-base:1.4 pkgsrc-2004Q3:1.4.0.8 pkgsrc-2004Q3-base:1.4 pkgsrc-2004Q2:1.4.0.6 pkgsrc-2004Q2-base:1.4 pkgsrc-2004Q1:1.4.0.4 pkgsrc-2004Q1-base:1.4 pkgsrc-2003Q4:1.4.0.2 pkgsrc-2003Q4-base:1.4 netbsd-1-6-1:1.3.0.2 netbsd-1-6-1-base:1.3 netbsd-1-6:1.2.0.8 netbsd-1-6-RELEASE-base:1.2 pkgviews:1.2.0.4 pkgviews-base:1.2 buildlink2:1.2.0.2 buildlink2-base:1.2 netbsd-1-5-PATCH003:1.2 netbsd-1-5-PATCH001:1.1.1.1 pkgsrc-base:1.1.1.1 TNF:1.1.1; locks; strict; comment @# @; 1.5 date 2014.06.10.13.54.30; author joerg; state dead; branches; next 1.4; commitid Bfz6AmAQXMitTYDx; 1.4 date 2003.05.16.17.30.59; author wiz; state Exp; branches; next 1.3; 1.3 date 2002.12.23.21.24.00; author jlam; state Exp; branches; next 1.2; 1.2 date 2002.01.29.17.10.11; author jlam; state Exp; branches; next 1.1; 1.1 date 2000.10.21.18.41.54; author rh; state Exp; branches 1.1.1.1; next ; 1.1.1.1 date 2000.10.21.18.41.54; author rh; state Exp; branches; next ; desc @@ 1.5 log @Remove outdated security/PAM. @ text @$NetBSD: patch-ar,v 1.4 2003/05/16 17:30:59 wiz Exp $ --- modules/pam_unix/support.c.orig Mon Sep 23 13:33:22 2002 +++ modules/pam_unix/support.c @@@@ -6,13 +6,17 @@@@ #define _BSD_SOURCE +#include "../../_pam_aconf.h" + #include #include #include #include #include #include +#ifdef HAVE_SHADOW_H #include +#endif #include #include #include @@@@ -113,6 +117,12 @@@@ int _make_remark(pam_handle_t * pamh, un */ char *PAM_getlogin(void) { +#ifdef USE_GETLOGIN + char *retval = NULL; + retval = getlogin(); + D(("PAM_getlogin retval: %s", retval)); + return retval; +#else struct utmp *ut, line; char *curr_tty, *retval; static char curr_user[sizeof(ut->ut_user) + 4]; @@@@ -135,6 +145,7 @@@@ char *PAM_getlogin(void) D(("PAM_getlogin retval: %s", retval)); return retval; +#endif } /* @@@@ -358,6 +369,7 @@@@ int _unix_blankpasswd(unsigned int ctrl, #endif if (pwd != NULL) { +#ifdef HAVE_GETSPNAM if (strcmp( pwd->pw_passwd, "*NP*" ) == 0) { /* NIS+ */ uid_t save_euid, save_uid; @@@@ -400,6 +412,9 @@@@ int _unix_blankpasswd(unsigned int ctrl, salt = x_strdup(spwdent->sp_pwdp); else salt = x_strdup(pwd->pw_passwd); +#else + salt = x_strdup(pwd->pw_passwd); +#endif } /* Does this user have a password? */ if (salt == NULL) { @@@@ -535,6 +550,7 @@@@ int _unix_verify_password(pam_handle_t * pwd = getpwnam(name); /* Get password file entry... */ if (pwd != NULL) { +#ifdef HAVE_GETSPNAM if (strcmp( pwd->pw_passwd, "*NP*" ) == 0) { /* NIS+ */ uid_t save_euid, save_uid; @@@@ -572,6 +588,9 @@@@ int _unix_verify_password(pam_handle_t * salt = x_strdup(spwdent->sp_pwdp); else salt = x_strdup(pwd->pw_passwd); +#else + salt = x_strdup(pwd->pw_passwd); +#endif } data_name = (char *) malloc(sizeof(FAIL_PREFIX) + strlen(name)); @ 1.4 log @Don't reference an include file that has not been installed yet and uses the correct HAVE_GETSPNAM. From Jeremy C. Reed in PR 21413. @ text @d1 1 a1 1 $NetBSD: patch-ar,v 1.3 2002/12/23 21:24:00 jlam Exp $ @ 1.3 log @Update security/PAM to 0.77. Changes from version 0.75 include: * Numerous bug fixes for most of the PAM modules, including several string length checks and fixes (update recommended!). * fix for legacy behavior of pam_setcred and pam_close_session in the case that pam_authenticate and pam_open_session hadn't been called * pam_unix: - don't zero out password strings during password changing function * pam_wheel: - feature: can use the module to provide wheel access to non-root accounts. * pam_limits: - added '%' domain for maxlogins limiting, now '*' and @@group have the old meaning (every) and '%' the new one (all) - handle negative priority limits (which can apply to the superuser too). * pam_userdb: - require that all of typed password matches that in database * pam_access: - added the 'fieldsep=' argument, made a PAM_RHOST of "" equivalent to NULL Incidentally, cups-1.1.18 will once again do PAM authentication using pam_unix.so if built against PAM-0.77. @ text @d1 1 a1 1 $NetBSD$ d9 1 a9 1 +#include d66 1 a66 1 +#ifdef GETSPNAM @ 1.2 log @Update security/PAM to 0.75. Note that this release contains backwardly incompatible changes to libpam.so; prior versions were buggy so upgrading is highly recommended. Pkgsrc changes from version 0.72 include: * Honor ${PKG_SYSCONFDIR}: the config files are now found in /etc/pam.conf and /etc/pam/*.conf, or in the appropriate ${PKG_SYSCONFBASE} directory. * Convert to use the general INSTALL/DEINSTALL scripts. Changes from version 0.72 include: * bug fixes to almost every PAM module * pam_pwdb replaced with pam_unix * fixed a small security hole (more of a user confusion issue) with the unix and pwdb password helper binaries. * improved handling of the setcred/close_session and update chauthtok stack. *Warning* This is a backwardly incompatible change, but 'more sane' than before. (Bug 129775 - agmorgan) * added support for '/' symbols in pam_time and pam_group config files (support for modern terminal devices). Fixed infinite loop problem with '\\[^\n]' in these files. * added accessconf= feature to pam_access @ text @d3 9 a11 4 --- modules/pam_unix/unix_chkpwd.c.orig Sun Feb 11 01:33:53 2001 +++ modules/pam_unix/unix_chkpwd.c @@@@ -22,8 +22,11 @@@@ #include d13 3 a15 2 #include +#include d17 1 a17 1 +#ifndef BSD d20 26 a45 1 #include d47 16 a62 2 #define MAXPASS 200 /* the maximum length of a password */ @@@@ -94,6 +97,9 @@@@ d64 1 a64 1 endpwent(); d66 9 a74 1 +#ifdef BSD a75 8 +#else if (strcmp(pwd->pw_passwd, "x") == 0) { /* * ...and shadow password file entry for this user, @@@@ -120,6 +126,7 @@@@ salt = x_strdup(pwd->pw_passwd); } } d78 2 a79 2 if (pwd == NULL || salt == NULL) { _log_err(LOG_ALERT, "check pass; user unknown"); @ 1.1 log @Initial revision @ text @d3 1 a3 1 --- modules/pam_unix/unix_chkpwd.c.orig Sat Oct 21 14:30:41 2000 d5 1 a5 1 @@@@ -26,8 +26,11 @@@@ d17 1 a17 1 @@@@ -98,6 +101,9 @@@@ d27 1 a27 1 @@@@ -124,6 +130,7 @@@@ @ 1.1.1.1 log @Initial import of PAM-0.72, a pluggable authentication module mechanism @ text @@