summaryrefslogtreecommitdiff
path: root/security/cyrus-sasl2
diff options
context:
space:
mode:
Diffstat (limited to 'security/cyrus-sasl2')
-rw-r--r--security/cyrus-sasl2/Makefile147
-rw-r--r--security/cyrus-sasl2/distinfo2
-rw-r--r--security/cyrus-sasl2/files/Sendmail.README41
-rw-r--r--security/cyrus-sasl2/files/patch-ab137
-rw-r--r--security/cyrus-sasl2/files/patch-ag15
-rw-r--r--security/cyrus-sasl2/files/patch-ah9
-rw-r--r--security/cyrus-sasl2/files/patch-ai321
-rw-r--r--security/cyrus-sasl2/files/patch-aj46
-rw-r--r--security/cyrus-sasl2/files/patch-ak30
-rw-r--r--security/cyrus-sasl2/files/pwcheck.sh31
-rw-r--r--security/cyrus-sasl2/pkg-comment1
-rw-r--r--security/cyrus-sasl2/pkg-deinstall39
-rw-r--r--security/cyrus-sasl2/pkg-descr36
-rw-r--r--security/cyrus-sasl2/pkg-install99
-rw-r--r--security/cyrus-sasl2/pkg-message15
-rw-r--r--security/cyrus-sasl2/pkg-plist67
-rw-r--r--security/cyrus-sasl2/scripts/configure.sasl94
17 files changed, 0 insertions, 1130 deletions
diff --git a/security/cyrus-sasl2/Makefile b/security/cyrus-sasl2/Makefile
deleted file mode 100644
index 6c55ae2e3a57..000000000000
--- a/security/cyrus-sasl2/Makefile
+++ /dev/null
@@ -1,147 +0,0 @@
-# New ports collection makefile for: cyrus-sasl
-# Date created: Nov 1 1999
-# Whom: hetzels@westbend.net
-#
-# $FreeBSD$
-#
-
-PORTNAME= cyrus-sasl
-PORTVERSION= 1.5.24
-PORTREVISION= 7
-CATEGORIES= security
-MASTER_SITES= ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/ \
- ${MASTER_SITE_LOCAL} \
- ftp://ftp.hanse.de/sites/transit/mirror/ftp.andrew.cmu.edu/pub/cyrus-mail/
-MASTER_SITE_SUBDIR= stb/mirror/ftp.andrew.cmu.edu/pub/cyrus-mail
-
-PATCH_SITES= http://www.imasy.or.jp/~ume/ipv6/
-PATCHFILES= ${DISTNAME}-ipv6-20010321.diff.gz
-
-MAINTAINER= hetzels@westbend.net
-
-USE_OPENSSL= YES
-
-INSTALLS_SHLIB= yes
-
-MAN3= sasl.3 sasl_authorize_t.3 sasl_callbacks.3 sasl_checkpass.3 \
- sasl_client_init.3 sasl_client_new.3 sasl_client_start.3 \
- sasl_client_step.3 sasl_decode.3 sasl_done.3 sasl_encode.3 \
- sasl_errstring.3 sasl_getopt_t.3 sasl_getpath_t.3 \
- sasl_getprop.3 sasl_getsecret_t.3 sasl_getsimple_t.3 \
- sasl_listmech.3 sasl_log_t.3 sasl_server_init.3 \
- sasl_server_new.3 sasl_server_start.3 sasl_server_step.3 \
- sasl_setprop.3 sasl_usererr.3
-MAN8= sasldblistusers.8 saslpasswd.8
-
-USE_AUTOMAKE= YES
-USE_LIBTOOL= YES
-AUTOHEADER= autoheader
-AUTOMAKE= automake --add-missing --include-deps
-
-CONFIGURE_ARGS= --sysconfdir=${PREFIX}/etc \
- --with-plugindir=${PREFIX}/lib/sasl \
- --with-dbpath=${PREFIX}/etc/sasldb \
- --includedir=${PREFIX}/include/sasl \
- --enable-static \
- --enable-login \
- --with-pwcheck=/var/pwcheck \
- --with-dblib=ndbm \
- --with-rc4=openssl
-
-SCRIPTS_ENV= WRKDIRPREFIX="${WRKDIRPREFIX}" \
- PREFIX="${PREFIX}" \
- TOUCH="${TOUCH}" \
- MKDIR="${MKDIR}" \
- ENABLE_DB3="${ENABLE_DB3}" \
- ENABLE_MYSQL="${ENABLE_MYSQL}" \
- ENABLE_LDAP="${ENABLE_LDAP}"
-
-# ENABLE_* variables can be used by depending ports to enable options.
-
-# JavaSASL needs someone to look at to get it to build
-#JAVADIR= jdk1.1.8
-#JAVALIBDIR= ${PREFIX}/${JAVADIR}/lib/i386/green_threads/
-
-#.if defined(USE_JAVA) || exists(${LOCALBASE}/${JAVADIR}/bin/java)
-#BUILD_DEPENDS= ${LOCALBASE}/${JAVADIR}/bin/java:${PORTSDIR}/java/jdk
-#CONFIGURE_ARGS+= --with-java \
-# --with-javabase=${LOCALBASE}/include
-#
-#CONFIGURE_ENV= JAVAC="${LOCALBASE}/${JAVADIR}/bin/javac" \
-# JAVAH="${LOCALBASE}/${JAVADIR}/bin/javah" \
-# JAVADOC="${LOCALBASE}/${JAVADIR}/bin/javadoc"
-#.endif
-
-.if defined(KRB5_HOME) && exists(${KRB5_HOME})
-CONFIGURE_ARGS+= --enable-gssapi=${KRB5_HOME}
-.elif defined(HEIMDAL_HOME) && exists(${HEIMDAL_HOME})
-CONFIGURE_ARGS+= --enable-gssapi=${HEIMDAL_HOME}
-.else
-CONFIGURE_ARGS+= --disable-gssapi
-GSSAPI= "@comment "
-.endif
-
-.if exists(/usr/lib/libkrb.a)
-CONFIGURE_ARGS+= --enable-krb4
-.else
-CONFIGURE_ARGS+= --disable-krb4
-EBONES= "@comment "
-.endif
-
-CONFIGURE_ENV+= LOCALBASE=${LOCALBASE} \
- OPENSSLINC=${OPENSSLINC} \
- OPENSSLLIB=${OPENSSLLIB}
-
-DOCS= AUTHORS COPYING ChangeLog INSTALL NEWS README TODO
-
-DOC2= draft-leach-digest-sasl-05.txt \
- draft-newman-auth-scram-03.txt \
- rfc1321.txt rfc2095.txt rfc2104.txt \
- rfc2222.txt rfc2245.txt
-
-HTDOCS= gssapi index programming sysadmin
-
-PLIST_SUB= PREFIX=${PREFIX} \
- GSSAPI=${GSSAPI} \
- EBONES=${EBONES} \
- DOCSDIR=${DOCSDIR:S/^${PREFIX}\///} \
-
-pre-fetch:
- @${SETENV} ${SCRIPTS_ENV} ${SH} ${SCRIPTDIR}/configure.sasl
-
-pre-configure:
- @(cd ${WRKSRC} && ${AUTOHEADER})
-
-# Create Cyrus user and group
-pre-install:
- @${SH} ${PKGINSTALL} ${PKGNAME} PRE-INSTALL
-
-post-install:
- @${SED} -e "/%%PREFIX%%/s##${PREFIX}#g" ${FILESDIR}/pwcheck.sh \
- > ${PREFIX}/etc/rc.d/pwcheck.sh
- @${CHMOD} 755 ${PREFIX}/etc/rc.d/pwcheck.sh
- ${INSTALL} -d -m 770 -o cyrus -g cyrus /var/pwcheck
-.if !defined(NOPORTDOCS)
- @${MKDIR} ${DOCSDIR}/html
-.for file in ${DOCS}
- @${INSTALL_DATA} ${WRKSRC}/${file} ${DOCSDIR}
-.endfor
-.for file in ${DOC2}
- @${INSTALL_DATA} ${WRKSRC}/doc/${file} ${DOCSDIR}
-.endfor
- @${INSTALL_DATA} ${FILESDIR}/Sendmail.README ${DOCSDIR}
-.for file in ${HTDOCS}
- @${INSTALL_DATA} ${WRKSRC}/doc/${file}.html ${DOCSDIR}
-.endfor
-.endif
- @PKG_PREFIX=${PREFIX} BATCH=${BATCH} ${SH} ${PKGINSTALL} ${PKGNAME} POST-INSTALL
- @${CAT} ${PKGMESSAGE}
-
-post-clean:
- @${RM} -f ${WRKDIRPREFIX}${.CURDIR}/Makefile.inc
-
-.if exists(${WRKDIRPREFIX}${.CURDIR}/Makefile.inc)
-.include "${WRKDIRPREFIX}${.CURDIR}/Makefile.inc"
-.endif
-
-.include <bsd.port.mk>
diff --git a/security/cyrus-sasl2/distinfo b/security/cyrus-sasl2/distinfo
deleted file mode 100644
index 1b1e11d6810f..000000000000
--- a/security/cyrus-sasl2/distinfo
+++ /dev/null
@@ -1,2 +0,0 @@
-MD5 (cyrus-sasl-1.5.24.tar.gz) = ac3837c071c258b80021325936db2583
-MD5 (cyrus-sasl-1.5.24-ipv6-20010321.diff.gz) = a306953c91d9fbf2f4676ef394b38449
diff --git a/security/cyrus-sasl2/files/Sendmail.README b/security/cyrus-sasl2/files/Sendmail.README
deleted file mode 100644
index a7dd2267c39d..000000000000
--- a/security/cyrus-sasl2/files/Sendmail.README
+++ /dev/null
@@ -1,41 +0,0 @@
-How to enable SMTP AUTH with FreeBSD default Sendmail 8.11
-
-1) Add the following to /etc/make.conf:
-
- # Add SMTP AUTH support to Sendmail
- SENDMAIL_CFLAGS+= -I/usr/local/include/sasl -DSASL -D_FFR_UNSAFE_SASL
- SENDMAIL_LDFLAGS+= -L/usr/local/lib
- SENDMAIL_LDADD+= -lsasl
-
-2) Rebuild FreeBSD (make buildworld, ...)
-
-3) Create /usr/local/lib/sasl/Sendmail.conf with the following.
-
- pwcheck_method: pwcheck
-
-4) Add the following to your sendmail.mc file:
-
- TRUST_AUTH_MECH(`DIGEST-MD5 CRAM-MD5')dnl
- define(`confAUTH_MECHANISMS',`DIGEST-MD5 CRAM-MD5')dnl
- define(`confDONT_BLAME_SENDMAIL',`GroupReadableSASLFile')dnl
- define(`confRUN_AS_USER',`root:mail')dnl
-
- ----
-
- Additional AUTH Mechanisms are LOGIN, PLAIN, GSSAPI, and KERBEROS_V4.
- These can be added to TRUST_AUTH_MECH and confAUTH_MECHANISMS as a space
- seperated list. You may want to restrict LOGIN, and PLAIN authentication
- methods for use with STARTTLS, as the password is not encrypted when
- passed to sendmail.
-
- LOGIN is required for Outlook Express users. "My server requires
- authentication" needs to be checked in the accounts properties to
- use SASL Authentication.
-
- PLAIN is required for Netscape Communicator users. By default Netscape
- Communicator will use SASL Authentication when sendmail is compiled with
- SASL.
-
- The DONT_BLAME_SENDMAIL option GroupReadableSASLFile is needed when you
- are using cyrus-imapd and sendmail on the same server that requires access
- to the sasldb database.
diff --git a/security/cyrus-sasl2/files/patch-ab b/security/cyrus-sasl2/files/patch-ab
deleted file mode 100644
index 403d1b8c8ace..000000000000
--- a/security/cyrus-sasl2/files/patch-ab
+++ /dev/null
@@ -1,137 +0,0 @@
---- configure.in.orig Thu Jul 20 21:35:01 2000
-+++ configure.in Thu Nov 16 09:07:00 2000
-@@ -66,8 +66,9 @@
- dnl check for -R, etc. switch
- CMU_GUESS_RUNPATH_SWITCH
- dnl let's just link against local. otherwise we never find anything useful.
--CPPFLAGS="-I/usr/local/include ${CPPFLAGS}"
--CMU_ADD_LIBPATH("/usr/local/lib")
-+CPPFLAGS="-I${OPENSSLINC} -I${OPENSSLINC}/openssl ${CPPFLAGS}"
-+CMU_ADD_LIBPATH("${OPENSSLLIB}")
-+CMU_ADD_LIBPATH("${LOCALBASE}/lib")
-
- AM_DISABLE_STATIC
-
-@@ -232,6 +233,13 @@
- SASL_DB_BACKEND="db_${dblib}.lo"
- AC_DEFINE(SASL_BERKELEYDB)
- SASL_DB_LIB="-ldb"
-+ for db3loc in ${prefix} /usr/local /usr
-+ do
-+ if test -d ${db3loc}/include/db3; then
-+ CPPFLAGS="-I${db3loc}/include/db3 $CPPFLAGS"
-+ break
-+ fi
-+ done
- ;;
- *)
- AC_MSG_WARN([Disabling SASL authentication database support])
-@@ -310,6 +318,88 @@
- fi
- AM_CONDITIONAL(PWCHECK, test "$with_pwcheck" != no)
-
-+dnl MySQL
-+AC_ARG_WITH(mysql, [ --with-mysql=PATH enable authentication from MySQL database [no] ],
-+ with_mysql=$withval,
-+ with_mysql=no)
-+
-+if test -z "$with_mysql"; then
-+ for mysqlloc in lib/mysql lib
-+ do
-+ if test -f ${prefix}/${mysqlloc}/libmysqlclient.a; then
-+ with_mysql="${prefix}"
-+ break
-+ elif test -f /usr/local/${mysqlloc}/libmysqlclient.a; then
-+ with_mysql="/usr/local"
-+ break
-+ elif test -f /usr/${mysqlloc}/libmysqlclient.a; then
-+ with_mysql="/usr"
-+ break
-+ fi
-+ done
-+fi
-+
-+LIB_MYSQL=""
-+case "$with_mysql" in
-+ no) true;;
-+ ""|yes) AC_CHECK_LIB(mysqlclient, mysql_select_db,
-+ AC_DEFINE(HAVE_MYSQL)
-+ LIB_MYSQL="-lmysqlclient",
-+ with_mysql=no);;
-+ *) if test -d ${with_mysql}/include/mysql; then
-+ CPPFLAGS="$CPPFLAGS -I${with_mysql}/include/mysql"
-+ else
-+ CPPFLAGS="$CPPFLAGS -I${with_mysql}/include"
-+ fi
-+ if test -d ${with_mysql}/lib/mysql; then
-+ LDFLAGS="$LDFLAGS -L${with_mysql}/lib/mysql"
-+ fi
-+ AC_DEFINE(HAVE_MYSQL)
-+ LIB_MYSQL="-lmysqlclient";;
-+esac
-+AC_SUBST(LIB_MYSQL)
-+
-+dnl LDAP
-+AC_ARG_WITH(ldap, [ --with-ldap=PATH enable authentication from LDAP [no] ],
-+ with_ldap=$withval,
-+ with_ldap=no)
-+
-+if test -z "$with_ldap"; then
-+ for ldaploc in lib/ldap lib
-+ do
-+ if test -f ${prefix}/${ldaploc}/libldap.a; then
-+ with_ldap="${prefix}"
-+ break
-+ elif test -f /usr/local/${ldaploc}/libldap.a; then
-+ with_ldap="/usr/local"
-+ break
-+ elif test -f /usr/${ldaploc}/libldap.a; then
-+ with_ldap="/usr"
-+ break
-+ fi
-+ done
-+fi
-+
-+LIB_LDAP=""
-+case "$with_ldap" in
-+ no) true;;
-+ ""|yes) AC_CHECK_LIB(ldap, ldap_open,
-+ AC_DEFINE(HAVE_LDAP)
-+ LIB_LDAP="-lldap -llber",
-+ with_ldap=no);;
-+ *) if test -d ${with_ldap}/include/ldap; then
-+ CPPFLAGS="${CPPFLAGS} -I${with_ldap}/include/ldap"
-+ else
-+ CPPFLAGS="${CPPFLAGS} -I${with_ldap}/include"
-+ fi
-+ if test -d ${with_ldap}/lib/ldap; then
-+ LDFLAGS="$LDFLAGS -L${with_ldap}/lib/ldap"
-+ fi
-+ AC_DEFINE(HAVE_LDAP)
-+ LIB_LDAP="-lldap -llber";;
-+esac
-+AC_SUBST(LIB_LDAP)
-+
- dnl CRAM-MD5
- AC_ARG_ENABLE(cram, [ --enable-cram enable CRAM-MD5 authentication [yes] ],
- cram=$enableval,
-@@ -434,11 +524,15 @@
- fi
-
- if test "$with_des" != no; then
-+ case "$host_os" in
-+ freebsd*)
-+ COM_ERR="-lcom_err"
-+ ;;
-+ esac
- AC_CHECK_HEADER(krb.h,
-- AC_CHECK_LIB(krb, krb_mk_priv, COM_ERR="",
-- AC_CHECK_LIB(krb, krb_mk_priv, COM_ERR="-lcom_err",
-- AC_WARN(No Kerberos V4 found); krb4=no, -ldes -lcom_err),
-- -ldes),
-+ AC_CHECK_LIB(krb, krb_mk_priv,:,
-+ AC_WARN(No Kerberos V4 found); krb4=no,
-+ -ldes $COM_ERR),
- AC_WARN(No Kerberos V4 found); krb4=no)
- else
- AC_WARN(No DES library found for Kerberos V4 support)
diff --git a/security/cyrus-sasl2/files/patch-ag b/security/cyrus-sasl2/files/patch-ag
deleted file mode 100644
index 591a08e66ab5..000000000000
--- a/security/cyrus-sasl2/files/patch-ag
+++ /dev/null
@@ -1,15 +0,0 @@
---- acconfig.h.orig Wed Jul 5 11:59:25 2000
-+++ acconfig.h Fri Sep 15 20:56:28 2000
-@@ -84,6 +84,12 @@
- /* do we have PAM for plaintext password checking? */
- #undef HAVE_PAM
-
-+/* do we have MySQL for plaintext password checking? */
-+#undef HAVE_MYSQL
-+
-+/* do we have LDAP for plaintext password checking? */
-+#undef HAVE_LDAP
-+
- /* what flavor of GSSAPI are we using? */
- #undef HAVE_GSS_C_NT_HOSTBASED_SERVICE
-
diff --git a/security/cyrus-sasl2/files/patch-ah b/security/cyrus-sasl2/files/patch-ah
deleted file mode 100644
index deb47e550737..000000000000
--- a/security/cyrus-sasl2/files/patch-ah
+++ /dev/null
@@ -1,9 +0,0 @@
---- lib/Makefile.am.orig Thu Jul 20 21:35:02 2000
-+++ lib/Makefile.am Fri Sep 15 20:56:28 2000
-@@ -53,5 +53,5 @@
- EXTRA_libsasl_la_SOURCES = db_none.c db_ndbm.c db_gdbm.c db_berkeley.c db_testw32.c
- libsasl_la_LDFLAGS = -version-info $(sasl_version)
- libsasl_la_DEPENDENCIES = $(SASL_DB_BACKEND) @LTLIBOBJS@
--libsasl_la_LIBADD = @LTLIBOBJS@ $(SASL_DB_BACKEND) $(SASL_DB_LIB) $(SASL_DL_LIB) $(PLAIN_LIBS)
-+libsasl_la_LIBADD = @LTLIBOBJS@ $(SASL_DB_BACKEND) $(SASL_DB_LIB) $(SASL_DL_LIB) $(PLAIN_LIBS) ${LIB_LDAP} ${LIB_MYSQL}
- # PLAIN_LIBS are linked in for sasl_checkpass
diff --git a/security/cyrus-sasl2/files/patch-ai b/security/cyrus-sasl2/files/patch-ai
deleted file mode 100644
index ea925f0e9f6f..000000000000
--- a/security/cyrus-sasl2/files/patch-ai
+++ /dev/null
@@ -1,321 +0,0 @@
---- lib/checkpw.c.orig Wed Jul 19 20:24:13 2000
-+++ lib/checkpw.c Tue Oct 31 20:52:21 2000
-@@ -95,10 +95,19 @@
- #include <sys/un.h>
- #ifdef HAVE_UNISTD_H
- #include <unistd.h>
--#endif
-+#endif /* HAVE_UNISTD_H */
-
- extern int errno;
--#endif
-+#endif /* HAVE_PWCHECK */
-+
-+#ifdef HAVE_MYSQL
-+#include <mysql.h>
-+#endif /* HAVE_MYSQL */
-+
-+#ifdef HAVE_LDAP
-+#include <lber.h>
-+#include <ldap.h>
-+#endif /* HAVE_LDAP */
-
- #ifdef HAVE_KRB
-
-@@ -170,12 +179,20 @@
- memcpy (&temp_key, "kerberos", 8);
- des_fixup_key_parity (&temp_key);
- des_key_sched (&temp_key, schedule);
-+#ifdef __FreeBSD__
-+ des_cbc_cksum ((const unsigned char *)password, &ivec, passlen, schedule, &ivec);
-+#else
- des_cbc_cksum ((des_cblock *)password, &ivec, passlen, schedule, &ivec);
-+#endif
-
- memcpy (&temp_key, &ivec, sizeof temp_key);
- des_fixup_key_parity (&temp_key);
- des_key_sched (&temp_key, schedule);
-+#ifdef __FreeBSD__
-+ des_cbc_cksum ((const unsigned char *)password, key, passlen, schedule, &ivec);
-+#else
- des_cbc_cksum ((des_cblock *)password, key, passlen, schedule, &ivec);
-+#endif
-
- des_fixup_key_parity (key);
-
-@@ -210,10 +227,17 @@
- return (str);
- }
-
-+#ifdef __FreeBSD__
-+static int use_key(const char *user __attribute__((unused)),
-+ char *instance __attribute__((unused)),
-+ const char *realm __attribute__((unused)),
-+ const void *key, des_cblock *returned_key)
-+#else
- static int use_key(char *user __attribute__((unused)),
- char *instance __attribute__((unused)),
- char *realm __attribute__((unused)),
- void *key, des_cblock *returned_key)
-+#endif
- {
- memcpy (returned_key, key, sizeof(des_cblock));
- return 0;
-@@ -838,7 +862,7 @@
-
-
- /* pwcheck daemon-authenticated login */
--static int pwcheck_verify_password(sasl_conn_t *conn,
-+static int pwcheck_verify_password(sasl_conn_t *conn __attribute__((unused)),
- const char *userid,
- const char *passwd,
- const char *service __attribute__((unused)),
-@@ -853,8 +877,10 @@
- static char response[1024];
- int start, n;
- char pwpath[1024];
-+#if 0 /* Not used */
- sasl_getopt_t *getopt;
- void *context;
-+#endif
-
- if (reply) { *reply = NULL; }
-
-@@ -902,6 +928,224 @@
-
- #endif
-
-+#ifdef HAVE_MYSQL
-+/* DMZ mysql auth 12/29/1999
-+ * Updated to 1.5.24 by SWH 09/12/2000
-+ * changed to malloc qbuf Simon Loader 10/21/2000
-+ */
-+#ifdef USE_CRYPT_PASSWORD
-+#define QUERY_STRING "select %s from %s where %s = '%s' and %s = password('%s')"
-+#else
-+#define QUERY_STRING "select %s from %s where %s = '%s' and %s = '%s'"
-+#endif
-+
-+static int mysql_verify_password(sasl_conn_t *conn,
-+ const char *userid,
-+ const char *password,
-+ const char *service __attribute__((unused)),
-+ const char *user_realm __attribute__((unused)),
-+ const char **reply)
-+{
-+ unsigned int numrows;
-+ MYSQL mysql,*sock;
-+ MYSQL_RES *result;
-+ char *qbuf;
-+ char *db_user="",
-+ *db_passwd="",
-+ *db_host="",
-+ *db_uidcol="",
-+ *db_pwcol="",
-+ *db_database="",
-+ *db_table="";
-+ sasl_getopt_t *getopt;
-+ void *context;
-+
-+ if (!userid || !password) {
-+ return SASL_BADPARAM;
-+ }
-+ if (reply) { *reply = NULL; }
-+
-+ /* check to see if the user configured a mysqluser/passwd/host/etc */
-+ if (_sasl_getcallback(conn, SASL_CB_GETOPT, &getopt, &context) == SASL_OK) {
-+ getopt(context, NULL, "mysql_user", (const char **) &db_user, NULL);
-+ if (!db_user) db_user = "";
-+ getopt(context, NULL, "mysql_passwd", (const char **) &db_passwd, NULL);
-+ if (!db_passwd) db_passwd = "";
-+ getopt(context, NULL, "mysql_host", (const char **) &db_host, NULL);
-+ if (!db_host) db_host = "";
-+ getopt(context, NULL, "mysql_database", (const char **) &db_database, NULL);
-+ if (!db_database) db_database = "";
-+ getopt(context, NULL, "mysql_table", (const char **) &db_table, NULL);
-+ if (!db_table) db_table = "";
-+ getopt(context, NULL, "mysql_uidcol", (const char **) &db_uidcol, NULL);
-+ if (!db_uidcol) db_uidcol = "";
-+ getopt(context, NULL, "mysql_pwdcol", (const char **) &db_pwcol, NULL);
-+ if (!db_pwcol) db_pwcol = "";
-+ }
-+
-+ if (!(sock = mysql_connect(&mysql,db_host,db_user,db_passwd)))
-+ {
-+ if (reply) { *reply = "cannot connect to MySQL server"; }
-+ return SASL_FAIL;
-+ }
-+
-+ if (mysql_select_db(sock,db_database) < 0)
-+ {
-+ mysql_close(sock);
-+ if (reply) { *reply = "cannot select MySQL database"; }
-+ return SASL_FAIL;
-+ }
-+ /* select DB_UIDCOL from DB_TABLE where DB_UIDCOL = 'userid' AND DB_PWCOL = password('password') */
-+ if ( (qbuf = (char *)malloc(strlen(QUERY_STRING)+strlen(db_uidcol)
-+ +strlen(db_table)+strlen(db_uidcol)
-+ +strlen(userid)+strlen(db_pwcol)
-+ +strlen(password)+1)) == NULL ) {
-+ if (reply) { *reply = "cannot malloc memory for sql query"; }
-+ return SASL_FAIL;
-+ }
-+ sprintf(qbuf,QUERY_STRING,db_uidcol,db_table,db_uidcol,userid,db_pwcol,password);
-+ if (mysql_query(sock,qbuf) < 0 || !(result=mysql_store_result(sock)))
-+ {
-+ free(qbuf);
-+ mysql_close(sock);
-+ return SASL_FAIL;
-+ }
-+
-+ if (result) //There were some rows found
-+ {
-+ if ((numrows = mysql_affected_rows(&mysql)) != 1)
-+ {
-+ mysql_free_result(result);
-+ mysql_close(sock);
-+ if ((numrows > 1) && (reply)) { *reply = "Detected duplicate entries for user"; }
-+ free(qbuf);
-+ return SASL_BADAUTH;
-+ } else {
-+ free(qbuf);
-+ mysql_free_result(result);
-+ mysql_close(sock);
-+ return SASL_OK;
-+ }
-+ }
-+ free(qbuf);
-+ mysql_free_result(result);
-+ mysql_close(sock);
-+ return SASL_BADAUTH;
-+}
-+#endif /* HAVE_MYSQL */
-+
-+#ifdef HAVE_LDAP
-+/* simon@surf.org.uk LDAP auth 07/11/2000
-+ * Updated to 1.5.24 by SWH 09/12/2000
-+ * changed to use malloc and simplify the auth by Simon@surf.org.uk 10/21/2000
-+ */
-+
-+#define LDAP_SERVER "localhost"
-+#define LDAP_BASEDN "o=JOFA, c=UK"
-+#define LDAP_UIDATTR "uid"
-+
-+#ifndef TRUE
-+# define TRUE 1
-+# define FALSE 0
-+#endif
-+
-+static int ldap_isdigits(char *value)
-+{
-+ char *ptr;
-+ int num = TRUE;
-+
-+ for (ptr = value; *ptr != '\0' && num != FALSE; ptr++) {
-+ if (!isdigit(*ptr))
-+ num = FALSE;
-+ }
-+
-+ return num;
-+}
-+
-+static int ldap_verify_password(sasl_conn_t *conn,
-+ const char *userid,
-+ const char *password,
-+ const char *service __attribute__((unused)),
-+ const char *user_realm __attribute__((unused)),
-+ const char **reply)
-+{
-+
-+ LDAP *ld;
-+ char *dn,
-+ *ldap_server="",
-+ *ldap_basedn="",
-+ *ldap_uidattr="",
-+ *port_num="";
-+ int ldap_port = LDAP_PORT;
-+ sasl_getopt_t *getopt;
-+ void *context;
-+
-+ /* If the password is NULL, reject the login...
-+ * Otherwise the bind will succed as a reference bind. Not good...
-+ */
-+ if (!userid || !password)
-+ {
-+ return SASL_BADPARAM;
-+ }
-+
-+ if (reply) { *reply = NULL; }
-+
-+ /* check to see if the user configured a mysqluser/passwd/host/etc */
-+ if (_sasl_getcallback(conn, SASL_CB_GETOPT, &getopt, &context) == SASL_OK) {
-+ getopt(context, NULL, "ldap_server", (const char **) &ldap_server, NULL);
-+ if (!ldap_server) ldap_server = LDAP_SERVER;
-+ getopt(context, NULL, "ldap_basedn", (const char **) &ldap_basedn, NULL);
-+ if (!ldap_basedn) {
-+ if (reply) { *reply = "ldap_basedn not defined"; }
-+ return SASL_BADPARAM;
-+ }
-+ getopt(context, NULL, "ldap_uidattr", (const char **) &ldap_uidattr, NULL);
-+ if (!ldap_uidattr) ldap_uidattr = LDAP_UIDATTR;
-+ getopt(context, NULL, "ldap_port", (const char **) &port_num, NULL);
-+ if (!port_num) {
-+ ldap_port = LDAP_PORT;
-+ } else if (!ldap_isdigits(port_num)) {
-+ if (reply) { *reply = "ldap_port - invalid value"; }
-+ return SASL_BADPARAM;
-+ } else {
-+ ldap_port = atoi(port_num);
-+ }
-+ }
-+
-+ /* Open the LDAP connection. */
-+ if ((ld = ldap_open(ldap_server, ldap_port)) == NULL)
-+ {
-+ if (reply) { *reply = "cannot connect to LDAP server"; }
-+ return SASL_FAIL;
-+ }
-+
-+ if ( (dn = (char *)malloc(strlen(ldap_uidattr)
-+ +strlen(userid)+strlen(ldap_basedn)+3)) == NULL ) {
-+ if (reply) { *reply = "cannnot allocate memory for ldap dn"; }
-+ return SASL_FAIL;
-+ }
-+ /* Generate a dn that we will try and login with */
-+ sprintf(dn,"%s=%s,%s", ldap_uidattr,userid,ldap_basedn);
-+
-+ /*
-+ * Just try and bind with the dn we have been given
-+ * In most cases the basedn is correct.
-+ * If this is not so I have a version or that too
-+ * Simon@surf.org.uk
-+ */
-+ if (ldap_simple_bind_s(ld,dn,(char *)password) != LDAP_SUCCESS) {
-+ free(dn);
-+ ldap_unbind(ld);
-+ return SASL_BADAUTH;
-+ }
-+
-+ free(dn);
-+ ldap_unbind(ld);
-+ return SASL_OK;
-+}
-+
-+#endif /* HAVE_LDAP */
-+
- struct sasl_verify_password_s _sasl_verify_password[] = {
- { "sasldb", &sasldb_verify_password },
- #ifdef HAVE_KRB
-@@ -921,6 +1165,12 @@
- #endif
- #ifdef HAVE_PWCHECK
- { "pwcheck", &pwcheck_verify_password },
-+#endif
-+#ifdef HAVE_MYSQL
-+ { "mysql", &mysql_verify_password },
-+#endif
-+#ifdef HAVE_LDAP
-+ { "ldap", &ldap_verify_password },
- #endif
- { NULL, NULL }
- };
diff --git a/security/cyrus-sasl2/files/patch-aj b/security/cyrus-sasl2/files/patch-aj
deleted file mode 100644
index 569384a100d4..000000000000
--- a/security/cyrus-sasl2/files/patch-aj
+++ /dev/null
@@ -1,46 +0,0 @@
---- doc/sysadmin.html.orig Wed Jul 12 21:59:51 2000
-+++ doc/sysadmin.html Fri Sep 15 20:56:28 2000
-@@ -171,6 +171,43 @@
- <dt><i>pwcheck</i><dd> checks passwords with the use of a seperate,
- helper daemon. <b>needs to be documented.</b><p>
-
-+<dt><i>mysql</i><dd> A MySQL database can be used for plaintext
-+ password checking by setting "pwcheck_method" to "mysql".<p>
-+
-+ <p>The following SASL options are used for MySQL Authentication:<p>
-+
-+ <dl>
-+ <dd>mysql_user: &lt;user&gt;</dd>
-+ <dd>mysql_passwd: &lt;cleartext pw&gt;</dd>
-+ <dd>mysql_host: &lt;host&gt;</dd>
-+ <dd>mysql_database: &lt;database&gt;</dd>
-+ <dd>mysql_table: &lt;table&gt;</dd>
-+ <dd>mysql_uidcol: &lt;username col&gt;</dd>
-+ <dd>mysql_pwdcol: &lt;password col&gt;</dd>
-+ </dl>
-+
-+ <p>MySQL pwcheck_method created by <a href="mailto:dmz@dmzs.com">David Matthew Zendzian</a>
-+ the original patch may be found at <a href="http://www.dmzs.com/~dmz/projects/cyrus/">http://www.dmzs.com/~dmz/projects/cyrus/</a>.<p>
-+
-+<dt><i>ldap</i><dd> A LDAP server can be used for plaintext password
-+ checking by setting "pwcheck_method" to "ldap".<p>
-+
-+ <p>The following SASL options are used for LDAP Authentication:<p>
-+
-+ <dl>
-+ <dd>ldap_server: &lt;LDAP Server [localhost]&gt;
-+ <dd>ldap_basedn: &lt;LDAP base dn&gt;
-+ <dd>ldap_uidattr: &lt;LDAP uid attribute [uid]&gt;
-+ <dd>ldap_port: &lt;LDAP port [389]&gt;
-+ </dl>
-+
-+ <p>It is a requirement that "ldap_basedn" be set to the appropriate
-+ value for your site<br>
-+ (ex. ldap_basedn: o=surf, c=UK)<p>
-+
-+ <p>LDAP pwcheck_method created by <a href="mailto:simon@surf.org.uk">Simon@surf.org.uk</a>
-+ the original patch may be found at <a href="http://www.surf.org.uk/">http://www.surf.org.uk/</a>.<p>
-+
- <dt><i>write your own</i><dd> Last, but not least, the most flexible
- method of authentication for PLAIN is to write your own. If you do
- so, any application that calls the "<tt>sasl_checkpass()</tt>"
diff --git a/security/cyrus-sasl2/files/patch-ak b/security/cyrus-sasl2/files/patch-ak
deleted file mode 100644
index ecbd20ca3239..000000000000
--- a/security/cyrus-sasl2/files/patch-ak
+++ /dev/null
@@ -1,30 +0,0 @@
---- plugins/kerberos4.c.orig Wed Apr 19 11:18:48 2000
-+++ plugins/kerberos4.c Sat Sep 16 18:49:20 2000
-@@ -696,8 +696,13 @@
-
- /* decrypt; verify checksum */
-
-+#ifdef __FreeBSD__
-+ des_pcbc_encrypt((const unsigned char *)in,
-+ (unsigned char *)in,
-+#else
- des_pcbc_encrypt((des_cblock *)in,
- (des_cblock *)in,
-+#endif
- clientinlen,
- text->init_keysched,
- &text->session,
-@@ -1192,8 +1197,13 @@
- }
- sout[len]=0;
-
-+#ifdef __FreeBSD__
-+ des_pcbc_encrypt((const unsigned char *)sout,
-+ (unsigned char *)sout,
-+#else
- des_pcbc_encrypt((des_cblock *)sout,
- (des_cblock *)sout,
-+#endif
- len,
- text->init_keysched,
- (des_cblock *)text->session,
diff --git a/security/cyrus-sasl2/files/pwcheck.sh b/security/cyrus-sasl2/files/pwcheck.sh
deleted file mode 100644
index ba07b9fc580a..000000000000
--- a/security/cyrus-sasl2/files/pwcheck.sh
+++ /dev/null
@@ -1,31 +0,0 @@
-#!/bin/sh
-#
-# $FreeBSD$
-#
-
-PREFIX=%%PREFIX%%
-
-case "$1" in
-
-start)
- if [ -x ${PREFIX}/sbin/pwcheck ]
- then
- ${PREFIX}/sbin/pwcheck & && echo -n " pwcheck"
- fi
- ;;
-
-stop)
- if [ -r /var/run/pwcheck.pid ]
- then
- kill `cat /var/run/pwcheck.pid` && echo -n " pwcheck"
- rm /var/run/pwcheck.pid
- fi
- ;;
-
-*)
- echo "usage: $0 {start|stop}" 1>&2
- exit 64
- ;;
-
-esac
-
diff --git a/security/cyrus-sasl2/pkg-comment b/security/cyrus-sasl2/pkg-comment
deleted file mode 100644
index d3823b87bff0..000000000000
--- a/security/cyrus-sasl2/pkg-comment
+++ /dev/null
@@ -1 +0,0 @@
-RFC 2222 SASL (Simple Authentication and Security Layer)
diff --git a/security/cyrus-sasl2/pkg-deinstall b/security/cyrus-sasl2/pkg-deinstall
deleted file mode 100644
index 2ee2b8bca882..000000000000
--- a/security/cyrus-sasl2/pkg-deinstall
+++ /dev/null
@@ -1,39 +0,0 @@
-#!/bin/sh
-#
-# $FreeBSD$
-#
-# Created by: hetzels@westbend.net
-
-#set -vx
-
-PKG_BATCH=${BATCH:=NO}
-
-PKG_PREFIX=${PKG_PREFIX:=/usr/local}
-
-# delete sasldb database
-
-delete_sasldb() {
- [ -f %D/etc/sasldb.db -a ! -s %D/etc/sasldb.db ] && rm %D/etc/sasldb.db
-}
-
-# This should really be uninstalled by Sendmail
-
-sendmail_conf() {
- if [ -f ${PKG_PREFIX}/lib/sasl/Sendmail.conf ]; then
- echo "pwcheck_method: pwcheck" > ${PKG_PREFIX}/lib/sasl/Sendmail.conf.tmp
- if cmp -s ${PKG_PREFIX}/lib/sasl/Sendmail.conf ${PKG_PREFIX}/lib/sasl/Sendmail.conf.tmp; then
- rm -f ${PKG_PREFIX}/lib/sasl/Sendmail.conf
- fi
- rm -f ${PKG_PREFIX}/lib/sasl/Sendmail.conf.tmp
- fi
-}
-
-case $2 in
- DEINSTALL)
- delete_sasldb
- sendmail_conf
- ;;
- POST-DEINSTALL)
- ;;
-
-esac
diff --git a/security/cyrus-sasl2/pkg-descr b/security/cyrus-sasl2/pkg-descr
deleted file mode 100644
index f7549fbbe0a7..000000000000
--- a/security/cyrus-sasl2/pkg-descr
+++ /dev/null
@@ -1,36 +0,0 @@
-The Cyrus SASL (Simple Authentication and Security Layer)
-
-SASL is the Simple Authentication and Security Layer, a method
-for adding authentication support to connection-based protocols.
-To use SASL, a protocol includes a command for identifying and
-authenticating a user to a server and for optionally negotiating
-protection of subsequent protocol interactions. If its use is
-negotiated, a security layer is inserted between the protocol
-and the connection.
-
-FEATURES
---------
-The following mechanisms are included in this distribution:
-ANONYMOUS
-CRAM-MD5
-DIGEST-MD5
-GSSAPI (MIT Kerberos 5 or Heimdal Kerberos 5)
-KERBEROS_V4
-PLAIN
-
-The library can use a Berkeley DB, gdbm or ndbm file on the server
-side to store per-user authentication secrets. The utility saslpasswd
-has been included for adding authentication secrets to the file.
-
-PLAIN can either check /etc/passwd, Kerberos V4, use PAM, or the sasl
-secrets database. By default PAM is used if PAM is found, then
-Kerberos, finally /etc/passwd (non-shadow). This is tweakable in the
-configuration file. Please see
-"${PREFIX}/share/doc/sasl/sysadmin.html".
-
-The sample directory contains two programs which provide a reference
-for using the library, as well as making it easy to test a mechanism
-on the command line. See "${PREFIX}/share/doc/sasl/programming.html"
-for more information.
-
-WWW: http://asg.web.cmu.edu/sasl/
diff --git a/security/cyrus-sasl2/pkg-install b/security/cyrus-sasl2/pkg-install
deleted file mode 100644
index 816c8132ac4d..000000000000
--- a/security/cyrus-sasl2/pkg-install
+++ /dev/null
@@ -1,99 +0,0 @@
-#!/bin/sh
-#
-# $FreeBSD$
-#
-# Created by: stb@FreeBSD.org for the cyrus imap server
-# Added to the cyrus-sasl port by hetzels@westbend.net
-
-#set -vx
-
-PKG_BATCH=${BATCH:=NO}
-
-PKG_PREFIX=${PKG_PREFIX:=/usr/local}
-
-#
-# create 'cyrus' user and group before installing
-#
-
-create_user() {
- if [ ! -x /usr/sbin/pw ]; then
- echo "*** Please add a user and a group named \`cyrus' before installing this package."
- exit 69
- fi
-
- if ! pw show group cyrus -q >/dev/null; then
- gid=60
- while pw show group -g ${gid} -q >/dev/null; do
- gid=`expr ${gid} + 1`
- done
- if ! pw add group cyrus -g ${gid}; then
- e=$?
- echo "*** Failed to add group \`cyrus'. Please add it manually."
- exit ${e}
- fi
- echo "*** Added group \`cyrus' (id ${gid})"
- else
- gid=`pw show group cyrus 2>/dev/null | cut -d: -f3`
- fi
-
- if [ -x /sbin/nologin ]; then
- shell=/sbin/nologin
- else
- shell=/nonexistent
- fi
- if ! pw show user cyrus -q >/dev/null; then
- uid=60
- while pw show user -u ${uid} -q >/dev/null; do
- uid=`expr ${uid} + 1`
- done
- if ! pw add user cyrus -u ${uid} -g ${gid} -d "/nonexistent" \
- -c "the cyrus mail server" -s "${shell}" -p "*" \
- ; then
- e=$?
- echo "*** Failed to add user \`cyrus'. Please add it manually."
- exit ${e}
- fi
- echo "*** Added user \`cyrus' (id ${uid})"
- else
- if ! pw mod user cyrus -g ${gid} -d "/nonexistent" \
- -c "the cyrus mail server" -s "${shell}" -p "*" \
- ; then
- e=$?
- echo "*** Failed to update user \`cyrus'."
- exit ${e}
- fi
- echo "*** Updated user \`cyrus'."
- fi
- if ! pw group mod cyrus -m daemon; then
- echo "*** can't add user \`daemon' to group \`cyrus'"
- fi
-}
-
-create_sasldb() {
- if [ ! -f ${PGK_PREFIX}/etc/sasldb.db ]; then
- touch ${PKG_PREFIX}/etc/sasldb.db
- chown cyrus:mail ${PKG_PREFIX}/etc/sasldb.db
- chmod 640 ${PKG_PREFIX}/etc/sasldb.db
- fi
-}
-
-# This should really be installed by Sendmail
-
-sendmail_conf() {
- if [ ! -f ${PKG_PREFIX}/lib/sasl/Sendmail.conf ]; then
- echo "pwcheck_method: pwcheck" > ${PKG_PREFIX}/lib/sasl/Sendmail.conf
- fi
-}
-
-case $2 in
- PRE-INSTALL)
- create_user
- ;;
- POST-INSTALL)
- if [ "${PKG_BATCH}" = "NO" ]; then
- create_sasldb
- sendmail_conf
- fi
- ;;
-
-esac
diff --git a/security/cyrus-sasl2/pkg-message b/security/cyrus-sasl2/pkg-message
deleted file mode 100644
index 1016d9655c5a..000000000000
--- a/security/cyrus-sasl2/pkg-message
+++ /dev/null
@@ -1,15 +0,0 @@
-PREFIX/etc/cyrusdb.db now needs to be created
-before applications that depend on SASL are used.
-
- su cyrus
- PREFIX/sbin/saslpasswd -c userid
-
-You will also need to start the pwcheck daemon:
-
- PREFIX/etc/rc.d/pwcheck.sh start
-
-Read the documentation in PREFIX/share/doc/SASL
-
-How to enable SMTP AUTH with system Sendmail 8.11 - Sendmail.README
-
-How to use LDAP or MySQL for passwords - see html/sysadmin.html
diff --git a/security/cyrus-sasl2/pkg-plist b/security/cyrus-sasl2/pkg-plist
deleted file mode 100644
index 8eeb026c7fee..000000000000
--- a/security/cyrus-sasl2/pkg-plist
+++ /dev/null
@@ -1,67 +0,0 @@
-@unexec [ -r /var/run/pwcheck.pid ] && %D/etc/rc.d/pwcheck.sh stop && echo " stopped."
-etc/rc.d/pwcheck.sh
-include/sasl/hmac-md5.h
-include/sasl/md5.h
-include/sasl/md5global.h
-include/sasl/sasl.h
-include/sasl/saslplug.h
-include/sasl/saslutil.h
-@dirrm include/sasl
-lib/libsasl.a
-lib/libsasl.so
-lib/libsasl.so.8
-lib/sasl/libanonymous.a
-lib/sasl/libanonymous.so
-lib/sasl/libanonymous.so.1
-lib/sasl/libcrammd5.a
-lib/sasl/libcrammd5.so
-lib/sasl/libcrammd5.so.1
-lib/sasl/libdigestmd5.a
-lib/sasl/libdigestmd5.so
-lib/sasl/libdigestmd5.so.0
-%%GSSAPI%%lib/sasl/libgssapiv2.a
-%%GSSAPI%%lib/sasl/libgssapiv2.so
-%%GSSAPI%%lib/sasl/libgssapiv2.so.1
-%%EBONES%%lib/sasl/libkerberos4.a
-%%EBONES%%lib/sasl/libkerberos4.so
-%%EBONES%%lib/sasl/libkerberos4.so.1
-lib/sasl/liblogin.a
-lib/sasl/liblogin.so
-lib/sasl/liblogin.so.0
-lib/sasl/libplain.a
-lib/sasl/libplain.so
-lib/sasl/libplain.so.1
-sbin/sasldblistusers
-sbin/saslpasswd
-sbin/pwcheck
-%%PORTDOCS%%%%DOCSDIR%%/AUTHORS
-%%PORTDOCS%%%%DOCSDIR%%/COPYING
-%%PORTDOCS%%%%DOCSDIR%%/ChangeLog
-%%PORTDOCS%%%%DOCSDIR%%/INSTALL
-%%PORTDOCS%%%%DOCSDIR%%/NEWS
-%%PORTDOCS%%%%DOCSDIR%%/README
-%%PORTDOCS%%%%DOCSDIR%%/Sendmail.README
-%%PORTDOCS%%%%DOCSDIR%%/TODO
-%%PORTDOCS%%%%DOCSDIR%%/draft-leach-digest-sasl-05.txt
-%%PORTDOCS%%%%DOCSDIR%%/draft-newman-auth-scram-03.txt
-%%PORTDOCS%%%%DOCSDIR%%/rfc1321.txt
-%%PORTDOCS%%%%DOCSDIR%%/rfc2095.txt
-%%PORTDOCS%%%%DOCSDIR%%/rfc2104.txt
-%%PORTDOCS%%%%DOCSDIR%%/rfc2222.txt
-%%PORTDOCS%%%%DOCSDIR%%/rfc2245.txt
-%%PORTDOCS%%%%DOCSDIR%%/gssapi.html
-%%PORTDOCS%%%%DOCSDIR%%/index.html
-%%PORTDOCS%%%%DOCSDIR%%/programming.html
-%%PORTDOCS%%%%DOCSDIR%%/sysadmin.html
-%%PORTDOCS%%@dirrm %%DOCSDIR%%/html
-%%PORTDOCS%%@dirrm %%DOCSDIR%%
-@dirrm lib/sasl
-@mode ug=rwx,o=
-@cwd /var
-@exec mkdir pwcheck
-@exec chown cyrus:cyrus pwcheck
-@exec chmod o= pwcheck
-@comment This file gets created by the pwcheck program
-@unexec rm -f /var/pwcheck/pwcheck
-@dirrm pwcheck
-@cwd %%PREFIX%%
diff --git a/security/cyrus-sasl2/scripts/configure.sasl b/security/cyrus-sasl2/scripts/configure.sasl
deleted file mode 100644
index 9af2b47675df..000000000000
--- a/security/cyrus-sasl2/scripts/configure.sasl
+++ /dev/null
@@ -1,94 +0,0 @@
-#!/bin/sh
-# $FreeBSD$
-
-if [ -f ${WRKDIRPREFIX}${CURDIR}/Makefile.inc ]; then
- exit
-fi
-
-tempfile=`mktemp -t checklist`
-
-if [ "${BATCH}" ]; then
- if [ "x${ENABLE_DB3}" = "xYES" ]; then
- OPTIONS=\"DB3\"
- fi
- if [ "x${ENABLE_MYSQL}" = "xYES" ]; then
- OPTIONS="${OPTIONS} \"MySQL\""
- fi
- if [ "x${ENABLE_LDAP}" = "xYES" ]; then
- OPTIONS="${OPTIONS} \"OpenLDAP\""
- fi
- if [ "x${OPTIONS}" != "x" ]; then
- set ${OPTIONS}
- fi
-else
- if [ "x${ENABLE_DB3}" = "xYES" -o -f ${PREFIX}/lib/libdb3.so ] ; then
- SET_DB3="ON"
- else
- SET_DB3="OFF"
- fi
- if [ "x${ENABLE_MYSQL}" = "xYES" -o -f ${PREFIX}/lib/mysql/libmysqlclient.so ] ; then
- SET_MYSQL="ON"
- else
- SET_MYSQL="OFF"
- fi
- if [ "x${ENABLE_LDAP}" = "xYES" -o \
- -f ${PREFIX}/lib/libldap.so -a -f ${PREFIX}/lib/liblber.so ] ; then
- SET_LDAP="ON"
- else
- SET_LDAP="OFF"
- fi
-
- /usr/bin/dialog --title "Additional SASL options" --clear \
- --checklist "\n\
-Please select desired options:" -1 -1 16 \
-DB3 "Berkeley DB package, revision 3" ${SET_DB3} \
-MySQL "MySQL password Authentication" ${SET_MYSQL} \
-OpenLDAP "OpenLDAP password Authentication" ${SET_LDAP} \
-2> $tempfile
-
- retval=$?
-
- if [ -s $tempfile ]; then
- set `cat $tempfile`
- fi
- rm -f $tempfile
-
- case $retval in
- 0) if [ -z "$*" ]; then
- echo "Nothing selected"
- fi
- ;;
- 1) echo "Cancel pressed."
- exit 1
- ;;
- esac
-fi
-
-${MKDIR} ${WRKDIRPREFIX}${CURDIR}
-exec > ${WRKDIRPREFIX}${CURDIR}/Makefile.inc
-
-echo "PREFIX= ${PREFIX}"
-
-while [ "$1" ]; do
- case $1 in
- \"DB3\")
- echo "LIB_DEPENDS+= db3.2:\${PORTSDIR}/databases/db3"
- echo "CONFIGURE_ARGS+=--with-dblib=berkeley"
- ;;
- \"MySQL\")
- echo "LIB_DEPENDS+= mysqlclient.10:\${PORTSDIR}/databases/mysql323-client"
- echo "CONFIGURE_ARGS+=--with-mysql=\${PREFIX}"
- ;;
- \"OpenLDAP\")
- echo "LIB_DEPENDS+= ldap.1:\${PORTSDIR}/net/openldap"
- echo "LIB_DEPENDS+= lber.1:\${PORTSDIR}/net/openldap"
- echo "CONFIGURE_ARGS+=--with-ldap=\${PREFIX}"
- ;;
- *)
- echo "Invalid option(s): $*" > /dev/stderr
- rm -f ${WRKDIRPREFIX}${CURDIR}/Makefile.inc
- exit 1
- ;;
- esac
- shift
-done